libssh4-0.9.8-150600.11.9.1<>,(i2Rp9|yp5VMÛuq6\:, \9sH`o}%Q=]x#^`f-N~0|i*Ha飕l`oǡ$- IJtDkx#$,]^!<Ф0Q.^ 錜6pk [g%{M{Kwp4Tx1Mu KqQ~\m~T:,̞j ntH&]'H^pU 3 >@Ix?Ihd   * .4<T ` l   0h(*84/9/: k/>E @EFE*GE@HEXIEpXExYE\E]E^FbFccG dGeGfGlGuGvGwHhxHyHzIIII"IdClibssh40.9.8150600.11.9.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)i2Rs390zp38SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxs390xLcA큤i2Qi2Qi2Qb;eyb;f6de5aa73ed83413128f95dbca93c9d76c38da5eb96622d986c46c9494b673e095b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.9.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(s390-64)@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3io@hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fixes: * CVE-2026-0964: SCP Protocol Path Traversal in ssh_scp_pull_request() (bsc#1258049) * CVE-2026-0965: Possible Denial of Service when parsing unexpected configuration files (bsc#1258045) * CVE-2026-0966: Buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054) * CVE-2026-0967: Specially crafted patterns could cause DoS (bsc#1258081) * CVE-2026-0968: OOB Read in sftp_parse_longname() (bsc#1258080) * Add patches: - libssh-CVE-2026-0964-scp-Reject-invalid-paths-received-thro.patch - libssh-CVE-2026-0965-config-Do-not-attempt-to-read-non-regu.patch - libssh-CVE-2026-0966-misc-Avoid-heap-buffer-underflow-in-ss.patch - libssh-CVE-2026-0966-tests-Test-coverage-for-ssh_get_hexa.patch - libssh-CVE-2026-0966-doc-Update-guided-tour-to-use-SHA256-f.patch - libssh-CVE-2026-0967-match-Avoid-recursive-matching-ReDoS.patch - libssh-CVE-2026-0968-sftp-Sanitize-input-handling-in-sftp_p.patch- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigs390zp38 17709922100.9.8-150600.11.9.10.9.8-150600.11.9.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:42761/SUSE_SLE-15-SP6_Update/7200c6c40d8e1c282b314a4d553a485d-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=e9b79d75a5fdfc0071a750eef3193d0cb3b5d3f2, strippeddirectoryASCII textPPPPPPPPPPRRR RR RR R RR RRRRRRRRw`sW>s=v3mX<utf-812248f5cf805be951c594699f2a9ca5a894d28906b3cfc23a0a60c00d25493e9?7zXZ !t/l[H]"k%{U}d涻L,%:'Ȃ{(4]7Yދgc?6 )j${_>PDDݤ#b^ ,]_oӌeYB.ږ4Ib*?3JZALy"**x?22)I$ ڮ)yl%hli5YbIL$9EOv .P?suNǠ*|WFGDPϹU|et7ih%aX oLI5AT1(*6s;R|e5=4@@b}M5خ+f|DZz9yxufyPHhiN=¸{d 3YtVJL]Y&>'J<8F`:W;;m"4,c*m:þNQmB"~L(,ݿqHF ~uLXUe8Vٚas40Kj:JSm LM6 A+՚ioƘ'i %SMV%@-#91v Z?Q5?:[(|ZQh#ƁDATe] H&jz\PR1|QL`mQ}MZFP v9"| sB_Ši"o@hc~˂PDpžja֖ Hn|P7Ų<66:Zt Z$@g :Qx2ɚ7Ҁ9%z:dfmUjhtr=XN Z^@WwOm$'K Jr՟5wfk0cN=,0/1MAխ\m$z 8=pyɸWy_T_YoL3GvnFt]p8uo|'*f kyC޹S#=jk#UHNt4#n^:fYPʲ\2 NGHZSuqt|\;|~S&~ բ; Qz} qon-oL#aWM֛_QsF|Dg{"|VQpWIUUO!ʆc8M14+$A&P@f%6~}LGuM凝-T}BSmdqZth ,UTUY(#_1?$_}7GQ"l%zh RZo4egG-)>Wz-^Pc|u.(Clz@<@L,T=1NM烢O'CjkTM:u!N\u(/4e*uL‚eL~.@4^ǭW/`E+ 2gޣ0ݐD: _R`|핓rt(N?K9pi0raVjީITW֊?k $:n1ʎCDϞ*ĢP/ 3vr{ow&r"/ȉ\T\U]ݜBrEN-&8$JiרrO( ccZ]&Yfe \[Ub-~B;z7vE˖P-`ysC*9j-2y&LeS1йνDouĝ]}=%dmz_sUЧeQmĭ]-9JBf˲Zo?J̖/0N8ׁ$5q.۩<֘["HLUF^%0БDKmlRA%Rc#F mr\sK`B1T~[,rQlT ucàNUU$_t~[qlzGo6$MZ>}?aY"K" +1%XܾOCV`Rc%HdGp,D%:Bw`l@Nt3Y{:A cJ8f77vH{i8IxG@2]oVI'-g㙹Lo7ݧ+Z H\j{f0CgDب9+^lQ2ߖ1;v6d!f-"):wGv̳X( ВH}锉}CHpW62{H^ǥN% ,^/B8[Li~L-nQ},pG2j+{ }겋 Q@нIWo_c yՏe! \Űf7dXef{7s$:bIɎD355[H*#ПFC oмc&n39(>ׂ%mS`ql{+QŒr/6"`<$}Yޙy<[0'|jjP@IgXPiU@o!^JtT' 0znDa LKPA )K/.=x Us^JRTª=u6 QhAlѻA $/ 9qPCCZBSUq*;NsS۩ mw  EcƳݎ%59N ttxz quvBj`${"`[{0:F~ֽ14& ~SGC>M@3>Avh=0LU`Fv7+"v[D_ rH*ܨbfͦX|m=cK]pœrwXՖ.^F#Qx>%VHm81LWc6{v"֬opW9oOTх  `2He$zNه\8'1 _ Ⱥc~UЕYjY 'RH [OC"+Y9H]}K.ڊׂ@O^ƛT' W!0ՋeooӎI$O1+񬌃jwò^`*پBk}r%+gf[0n@ ђNV {3}:bfX KX Mq}9;5>O_ءcО!u_,lR0W+JA8>~qʢ4M; fcibRDʣ`bazrR2M;Y9K4 }RLxT.Г(I!(!&Hҿw!gu Qv:r,O-;!Ѿ5y#,ח +G 4A,B_pmʭ7/"߆4H8ض""5VH#k w_%@,x A"AOރGr%<"/wO&bWSD(3*\$E ]C h'ܻ:uĢ#`h9zHORNRYr0;BϢk<ܢ9Q$< !OkntENE8ڱ fF֎L(ѭEZnvb+%=S}l9 ~ڍWv}=^ _6|q%њ'przo[qo{A}Hc+ <ǡʎCя(g7 \%tQ,_TaK]H_ylMmnGz`MZ⣤fXèv#GX4rؙp|J{9SI7E0t x8ŽO!K|* N=rzE?rbn/R=c Ma߳ɊoKyq 3M S#ѝ-=}qѧB cx]Ge@7U-ou~4U'bR! 5ICAU=(P'Q[7c*T{4 2 Ơv@uR쳜]PfSU עjI5+IU˩א'aKc4 V]%}މ*6H|X\L4V##hП[ʤj!W]pQS,ACc檎fn$BP[ݔ,5]h\yh~G [" upʑ\H<*8}EIP΁,x,bj@rLfVF@yaO9)XbǥtrB;XrhpWCީvO%(W?fW1U[o9_HsX)oDpordr^,u;]SBk܋B*ftxkF( .J2LNjv% (1,o]Fa- *HIR=jbѱ塍"ƭN1+KmXlCc'ԸZ:- WY_v>ψcH靵 a(BW$Wh96z ⴻxc.Onp'bC/Gq/skxd/o`Edűw0]3xuLw 1*m.gsƼ w ~tUn&A!9N`~qDcPxg[w!xP=~]=x F6_q)ds rOkrz|<]N7# zYzV9o9B*zR qOj 0YaW CBb!ןʶZ-&L(-085Wё׾P&Nѷ(+ԺHxOisT(+^NiʚGC}9Zo yƌ)En30h<a1|V. H6G|#A-E[Rd2Omlj"w+]/U8D,ވa׵\Ӭ;WЌBYF 1 JfT&dc߼ƐH /):lS@B /־9utg6,YN@GKXve >?no{mkQ *4V rȅqt[&rw 9(>ݢQdwlM!NE^LZVI>hTR/r 8KנMMPQnt2t;}/^j-9.ed:&ć^& ZQo'n| wq8S~S9g^gO/(aKqRӉ;sĖT,:@9TNԱWmRm`M4~{ h@5; YC_:e mɄޫC]֧F4c;ZDd~lMc5NKfDZrFv+6MHKj9r2tClCs,d$O0ĖOW'7!G}rnd-sl(S&&4mΩt !p "-Pf6ƶr{zWY\6Akgi#,&bRk\۫2;ڎ$^'BU.Gq a (!29hQ~ *.ڋEg `ꕌr/ *Zy1dFGwQ6e u0,^ $7,?Xʢ*8ktݤg&dwbPKK]G ɯ kݪpn^Tl\K0 0j$IL]k%mOOFlcߑ&+kLӞe"7lT"z@->ΘaX#^Tc?_B(,zpya$ z53Uʵ CT 2J+\F]B9qe﮺q˦>̂k3L<5fT3(6ʿOtA 6p@XusK5D`KFt^<M` bGrljU.uv"dO %>ny%u oX2O$,$ð11d_c"̷4֚*B~%R9b|مQevr6܏fjpCmPdt׊`7*QJC%p5"TWV]~)66ZU5 Ӟb&g[*$B1HD!kiM8hVKp[ꥊFl\u/q09 1q~Tad{%`?]y{_ܳ2qWA{ ^~;Sl/wh>fϭ%HH\m _/ߵR^<:1(T|q}ޘ732w* r|`|F>(IBen ÎuIָcI9[^߯?yu5Om`҈+SL}]QC}"GՐݑp=륺꫋{<[ i0D{ʤoU۟ `Uȇ\4חYӮOWz/XڪαVkv@ *ml]I7mqY_hWO?Gt3+?PC$)|̟.js yXX)$_i>$<ˀj&EeRdĵ͵7._џ[85Z;Pwa`O}wM&jA V x| .֑vɼ*mP@2x>9r/_4׉*Kp, |Xض0 0Ur;Ț/;"$;\z!,)q:.Fs@3/W(H?M-%b,)+ څ +Ӈan5HgY^:)-UA2)\ rӸ1|s N?.AHa2LEHeֽ!"?nU((>Do Z=[[D0iMc簮$Bw/`i\<Ǒ>1s쩶3ԾMIQպ"DeJʑ݈xt ϨtXyƫ,Qj}_w<@'((z1^Pn,긕LiT OzZG+n.LRy['JKTN^ &S%^0OH=|<$w 6cRǑo8Tk5>'y h_٦w+N|VI .xHp;GW5}W"z{иh *aU7Q6\8;=ÈFH l9>wG}3F^ψdvmoۦ-)ut-I'A a)~{5ÓɞXO("6g26NL { :l%@91IOA>@yp5ņS ۗ|še6ӡfr|*h<%Ng{DWqF^94J}g&7 N`[#A•k|־˯ *TCR$H w-B<+n]2 _3.9"J8x?7fuQӔ#` %Kȭ_0a8k*4\PQU5΢8Dv:;eTrHUHpCHHc}riQ\gFj_ n-4cs,cr髜Z⮶Y SLA<3n`-=(g2Iok}q7gO< }(*ٯ8wyvD UhJVȄ ݡ/Y>@;G'i9[o#:~o=)mT?NmSgLe,TbG\s&9g;=Gpgh ;3`Ukh7KMŒr]4E[YX V 4M_A iZjD{S*V!^iż6\1x0՗sfMlbócQXIK߂f{nHqX +NEIK;GBʑczqTΤ9gK>e7u /MҤ/.lԟZ]cq`?:O-SǽχaŪU©.ۤL&[3ިp툣G"nYUjk>M\\?UȳaF$t~)Sҳg{:I:]8V6sNP/(.uW/`tEvK#J$+U k6yTL`(aߥ{vҊqQF'`n9-{ٲrOkp;$s[J6<lDg_zEU&Mm3=ܨ=^SW/37kF p!hSbT5K+nlbty2'Co }ѓE="=q?(樹/w3qb\fYadyS=OTڝOCjLP@3(x0v&6"w}EPKCd+Xw[H+fL۽!zƱt2\R1v]9d*Bpr{j=NvCb.~FoblU"aYK#$<9γ0̜DK(0J޸`VpY'|P4p ZU2Qޞd HeF}m΁u?o̬{ I57 sϹ3:Go/=<`MCKCN"4R/D&.3#sM@=}V1r8U.BWc3'3Bc3[a *W_{^&|oHw>dQn:wbze.1hB,*5F4|#3rDnZwJqj #xKU~pt@Cg}ܑ8D4 &!f !m##0/g*rx=UQ[!zXd#pV†Rf .WrXq E#_ a8K9`)۳3A`Ј/d `(YbƟ%m_unk`!3 #'o\i! Џ5Ac+-pKkMAXHr7TCuQ_!Dp~\$)Q^]cVW61̇(Ńx ('+c;RQiiG5ԂQ? ऎQYGW%ǹؽ93=FPh 䌟ZK⟐Xe芐(-W4_ǫԢ6D*!SULӦ9c{=NK/mϊGF]3'-+;:4s"j@B^r p-hKӘNiSGbTUdm~AqV-$U35Cx( !^ޣL$xD sx+EfYGD6Ţ  oc3$ ?ށ\P7C`914<9B)MQ#!2RIx6 ][10=Sc\FCxef0{ZD4;]ja lOOeH76lWޜ. `';`&ČME Bg0?{\֞m'7it%bQWmSGu6;4bӊO˅p\9XRȞ綄߸cF[ˌWMI6Hpps^]Ν_y?ݑMMG暌WׅL\H߸gN7xԸMP|׋mB%;(o#o3TFMD8omʄ˛fz _s-Q {)\a'ύxͻ( 3ܯQ XY}=lYl6nC +Ŋ !]zyoSE ?tRpf(^?񺱧+L~YyДę"O+f.ȷz5i>%$;6_=fINBzcAKSnV>TϊѶ!mW{&dFMa ԿeLJI3€8dV eS~5DM+s$qqʨ͕wx&%MA{%9N`im~")= vO-5 ``j}h-ƈN( IJc`jxRF R %BQY0Ko(<-J|!p)do~]$zTv~!$OnIv?9x߶)J.ūκ޳LHibˇ\8Md#iˡ;`L|q 03 \:W*w9o+WJf_`Y$VyNȨeb=8~FIPn4ϧw8suxn3GpZӟ,utqh/y!ӟ;+ĵ64c0v(w)jpVU>l$lthSK⼯BnsjSH3'!)ܔp :b G:§.wPͿQLK?Lh#q؅@~·I/B, );b0agbvo]c@y2g*Jdg>B붡Z ~[zJf6Ydd>PJD\Wvm썃8;5p_yڕ("&enk,diNO/NKSyݞҴY(4ImJ(%l\c{dAmDZbm<h6Mu%IުCsoѧ+8h Q`eo{5}\9B#H zWevQIVtY#:`k$]" tT EK)6=41`dhN!|OI+\ë P_h7Ȕʨ![dR D}X2r C횏x&>gT.5[ck|նxN8>cYkX!tŐhPT;%Qrʅ?fI}:ej5V77LeMG>I.uݏ.igMոz^upwQI5XC-,\Ǫd_U_D"Atu ^ڐ??@)!euix|/!2uG1&"Al4so2hMI ¯E/?!:/<R.l jᶃA7<T܇H9 1eʜ*z+ )>{QI.2`=e̥TNK1*EjZɰlY >~`|r)٣`U5ͤ?.J8R?~ iL7Nq{6+2WBnpQ5 L.^ +;2 .3WP.!au.G !"f iJ.H˧s pEksVRʯ 5Yd \5z*-K8M/DmeMs>g;OSӷv4"W~r]90ߖDԞ?=n(۸ G\)S'\-_\ %Y~ZE\ɎE̾`V嶯e/~ov(ĵayruQL ( 2c<m'P 1oF+e|0hVGm=h?yF]<`t7.Cbm/-IBq;d]EA,EяSL7=|[,˿exDrN"~X:XÀjQ8o+~14L5JB$c:M(]rq t 1YObGfT3>Rg5+RܘRgp~:Þcvim 7Iة6N1Æ rD&˰Fa -H'zS ˲rG7C[fWZ4KQaf&k^hsn 6^ҩm7pG@RU~wDZc &ZpG(8tbp@}fF&4xcj>G՜d:BaaCQr_0i[K0R|ptM}Hm ?y/Df끁_?>Ɇ >;hƠz^jSh ,Bآ21Qdba9z+ͣe,vH?,H[ڻ3`dqi+xahl[7Qᜇ[@Q)<?JPyU'5 ˮh"tV[Q' V2ڳ?џdĨ+)p?Y^BLݻO_{G0cyġO9nP0W28D]͑FDP k~>HD}ے=ཿjXUڅr\M>|~7|{S߸@| fE'WJ"2zX,혞#oLɸ X<3c}R]2z N!>t{zP\ Ց\[ai͹9L$.:EZ"=ˬی}<Ál3LIa8ãQr":ù?ǭu{N_ک9+N/Qztē.!rI,D`]bS]N*`wV_g]Hr "sha樘ӑ THޅvJI0{:gW \LN(NK6jpܤqcac ੴ@(kEH͸՗W<ӮO$.rUZ+\jc1 n9;{~EJ+l jo^Y$āfujf8J+ÈABy&vc9dW]V `@°5_p~xR39éi1lygeFV$FGWbIFН9O5@HďAF?&h ~JRl=f.씟U0R8c8w?<Gpb|4h׺^4̫1J5#fl\ZfG8idr6ygQN3Jյ5!cd4ϖP_J1jGRR]1MQyM)- XBQ` Y,H(ԲGHMހέD QTl7'եnq۬% _":+4py3*GW뒱- i(FNyAw8` N>., [29#4a*Nzؖ44]lVoO&d5KUqeK Uk\R2$[3}ճ٪iwc헸#w 7wF.M3ܔw"!NCoڇ (j#g\;u+.Y 1=uP'ESr04f3JUF"{,XPW:C\gXfJ2U]2í>Dp;2zE턈fM¥ oB 1['=.=mO3'ZoMäR.ra۪Ykcjj~uulH 5_S#QuI-;TMqHf/Z3Y-[t~/;XSvhcd2;ۀZ0lHcdv7_%Wt`;@PXmSaGܙݩ*nk@SNmВ/nXDv"xI:>l8C_SZ4%@@*X e(0$5d'X9]Ux5ŀ<T tLj|e ib gmcG7@1 ?[HzR옺X=S/زgBy*=ob-sBYq\Ѱ7uKR#NCUmkua/i Ľ_6}wN>d|'(TS\24KT!.W@^nQ 6 mr*-_ Li%OD|fpq;j=! fU_hSN7SFL2CU ʣF8A/h'StoJcm^f9W\i1!Q9 X* *зFk]\S,Q[nn"1Mȗ@ă[~ J7D B՝"eNiZ6_U@̴K]f'-m †ÓSv(C mCͲ]tp%1!m4wc6jwYMqcY,*ã܄N)bӜFf[`$p1oЗpk|s)J%WDׯ-*nog?}uH˗ 4͔+]#XK94:Zv|(k6CI>? bȦ=_$"d'[? 2+ $FPAp+qlתE n3iV:%CmM(:AFtu>RZ[joäp#;%݊&U"c!FՎqËF͏U֭+sX?^u OBStFHaVek3!S&&Yi6.L/dNC RE굋=0˃z>@ M8g܉oc:#y241bY30mb U]x$p首uUjN{`uf~f;4g#0KCծ.~NYKêlɻ5XC^oE Mtؖ;1J/y4A b&-g7M'֠X(>Kk/ rx.|V+Db"R)Ui{my ^k,%ؾadzqu-xRaBh yl,P sJ1L쏑2wՠ}wpgFDZd\)5!PP< m о (KėmZە6b-~6oU%*aK|v"?v()qs2ϪՈIdRlTJaOѕȆDu5zڙi!I;$@ޥvW DA^j.;^Z"ĜWbE|}y%ѝi?[ $Ӝvi]p{2ſ3y]]ʓvK>d<NIO= \Ґ/+imiKz#i?[wݿ*kZpn-ESN=S0ﱿB} #`2ׁR gL{.8)ՑoEHl긾<%;\D15? Nv.uư*94[Q`csINq#+ gk1_pZC^6WcBqjG9w^Qw#$y^jeW-2{0vrp:<DWWDj>kdH0>T&:+;FQ!:ದb,wC7F2?z{ R{xvqA6c{a+Tݶ|QX.z+4TGÓ Po5MK̰8}s;[ F"_1T'Jm #s!Gr(^e|:7A0vz@'q0;\U}WA:\Ed7nl\΃Դ > [Zro@bpSB5ÊvOa-Omi0>R;AƑ戇BN 9W8[w_ӯ7RH˘@VZ @uY-8i҉;r3"z&/I&=rF]DQٻ@ZrtiE,#F#{kלM B N+9 LI6FPVUdfeA/Xi>bts *'q]m4ڞK&9j5_H]$!06rk]%^^mzrKƄ8$ _^Å}$4s}ݔewI¿Lg5z"t=FB*cy`\<^j7TQU,:}lE؃xҡtgZ&TcG%A!f*M ˋ-fչi3ǸԻÂ?Rk bh=8G~sjHGM O͹ &OEۄ##c"tFI Ix/g]$rT׊&cߠS'K!¬'[67l=!60dYsQ{ W6gYSԾ7j8@TX:BeQ<4  ?(zɄ#LR}ݔpDĂPURue>`TcPcD,HЛ %"DXi_tJ8tQ7fPAiQS|rZٺ~\MnQ/]x;G s+e㠗(8U) a7|u#vА 7&>ʳ{+Rty4C=4*|QҨrP4 aphLGy^. plI_ѷi