libssh4-0.9.8-150600.11.6.1<>,hBp9|CY}gcJh5~íN<\nvpfŤ:՝e,.)S>y'cO25´Zs/a^x|cwqP:3dO;;eQHELb C nyȸtlL;Dq'KZfP-,(=T!x{f.zbA%O>@E?Ed   * .4<T ` l   0Tj(8.9\.: .>@@@F@G@HAIAXA$YAD\At]A^AbBcBdC9eC>fCAlCCuCXvCpwDxD0yDHzDDDDEClibssh40.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hBh02-armsrv1SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxaarch64cA큤hBhBhBb;eyb;ae7a51ca6ef9efd813c1719191f01c3f996e36122aea08175fe153272ddcf52e95b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(aarch-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh02-armsrv1 17582824470.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b33cc47290c5ebce458e164f1165ded0ce2f6124, strippeddirectoryASCII textPPPPPPPPPPRRRR RRR R R RR RR\o4>cutf-83a91f6814df0e5f66804a91df38345de80b1f2324fc79fcee3478e9df39032db?7zXZ !t/VE]"k%nd涻L,%:wx?%&N1 4R i~COiaAt.[(p , F4|U,}Y|S5l68MɆC8MD)j't@/V?7کWku$6vΥ`S=]lrR҉ALpWS"MV0e,&Vh 6zwizIԧ@è/&b=21<+9҈p]V߂v檐5W{v́GpM7{b223t{NF˧ڿdk'ͷfh8 } (K&LɌpW0\PGw=]@I~Ux?0ÚЮ5ֿ Y{0Pgy/֪ԆIi P9;TČR8:VA<83 G%9p1ǂ=i'f oI;]bbF~<]麝ÏF-\H=+k.(<=#~4hro4W% €CG3N(s~> ih@+T ADN=F6m֜h8^~pzUc;9@-±QzvRyQgp\SP/J&礻4D`ұxvQ {b+g7c *i'@$ AU}eRȑ$+O.q OT.ލ1d ~J JxcOF.A|cu DdYp>!YL*3[^]Qh=`-Z>vuq:!YVԶy[|} c_;)N*}2<'BI|%HGDjO]{=EcϵHutMK-Əءtd J: *#cs}f5>"#46gԜޜGk ABS ~x拆a|(nQ'bQ%XNz)*}o"52qjcOUcLdx4<&sqD4msxxn=տX)qy\E9vց-2qJ(N16{/w{`ìFޞ\#tKciL%C$ e*I[4ϕE`q AO+QTbO.IZY On9;E MP: æ$d_ ؕ4jPn!0˧T$(F5n%a} h37`jmt\`nq!.d#i1 eӨbJ! #(¤$ZCcS% 1sAՒ 1CT3_5ߒ[9fFf@'B6N0): 2*-yU(8o_ Iˉ]z^#g( Ir}%b?E f {3X} v8rYli1j=L3ghp`@{pZOP%:8 t~מmG<'rz֪V ~UP ,L1zkt@}&\rd :K_AoQsxvߌ,|5Q%#:AM x[HAϛ_\V ܚ$g;5<7\a'5D#90#<.i!(^yW &B4'0.04EuH8*Y`)U^G)2D෠j3̀Fq6g 2Eܟ=1t7jBn+njΊRia8#)[)YdʟK[ iV`)K>*T"rOW\ewo/`/iB9\aK!.g%s{z7K(<f鬵+ڮN>=c@8z;3l`{ūbʐƧmP^FRZg<Ǽ;r2Mؤ>@z@=<1h5x,t2Mknj|? L+~U^S݄2ȨJ=XuD ;*TfpyρZ !nLġ*#gD? SЊb66tMDc,Eґ`Vk))5+!==)d`&Ex~] TB&>SHO#)=[S .E^&.QItZF q]?/ #wsaxדQ5Q'=2NQ*t3 z͸Ζ0b4^|`XӸ6; ¼"?t;hq B-R!y}>QO 93+"5oWPm6lw 9pkЍ;=HyiOprqRòG>|97a'r0FǐС$k |I?Q450w F;!H]G3ǖA1DxIcIGxq}3bBv~E⦆srLޒ@GT}lWJtb>=a'yzE9_?9 qǙP"p*` Ny͓r͢06xq;)S譭-j)#嘲儋7 nuw/FK9ɡ fO+IJвžNn2 x7YcnlJ܀n @l kyO{W."h)<-y|HӡM4=hWjY(`o%p4VCLxH gw>.cI"z3{lYF sYu>T ]_"Sc|VP,X\$ eBQqZfd(`t E+j#3x\%,*Wj/azR"\-ZJA-*͠ҙ4MTiJϳ\<'Hto!c%y&ǬmV( ֢m ;[Dw *]ë?nqq#'c pXì?(b4#:A# }pz)OB`΄78} ‚qc\}sDx+t3qO?~VWϬ+ЧHO9er4cKoY[M2ķ|*Ld.2$+SmAV*;ύ$QbzJۖjf":,07LG)f)mwtsnUb]N?<ɓpj:(jʻVsEw5*{wV/tm1y脕( l ۄ{UѦmZ^!tI}Η }-B0\ّmf#RQ9ߋ=Bf6rBZ6pU I+j#8^*(ݐڔ}&lj<R}&#v뻀.`6O/skP+aeCiNׇ种"FʨV cĕK <.ՠng.9X =8 \CcH =tvj7ž>&5G/8/uA`]h avji*y\Ss]9d+ʌ4^,qQ4 yXop$_B9A9s.O!ဪ"gEo:{rrKhykY QyC,n|7'HJip"-FM կǺ- bRzU`-N} b$h{I>DrChI}mq~:NJ tU/HUY$zs;5y:T|e IX~4pcsG A7`.{eR?Vk_6T 9/A[ դ'(Eܑ9G_>C]+wa=Z j@\uu$[;D)4Ggr-{RUulx>-v&#K45˯vek2?(7^|, B@0 N b6iyV:p'FkM0 rkpTPєްp.JMw8O.y[ݥ7333FWiPUt Na> ^9h ޾ZFi3½VZةtHJ#@N71~,[@L+'%K}_&wZFC@Duy?~<8ZO ( lȍ;0SzY0]NATHdyG𾛒2R4[Zc R4?~JzHhzkB{lg0>w I,ՅJyI)~(_B7<2 'Ihl`Y,)h\+5r1$^G 3Nڙ: I!ec.Z6}VHL!/.Ep~^ڔ*D A?+H +"YcBn C&^rth4TBI;|z z2kKA5;83u6+14sQIP@iIA3_G;p~(.-gzަ 8!r.< *5 ȍaM v5t>zZ<hpB]-Ծ/kNV9 ]ro6tF Щ *ɕr|(P}|SedGiL 瞵d[M@ k{q?H[Bʥ_W&@Iw$?+;֗dě3Ÿ9y=0bQ=*[JX^Ĵ=}[2TmzYYֽ}ȯ4TRp[5oV61!@t4G,8 ݍ&Ffdx†G&37MN#Mwa19@;|ߢ(^~tә5a [kF{C$?_R%괠hL k4gE6M*s/doܙK#-hib}_¡q_C): H8_|7Yg{ߨ#rӽXgy]@EHLxӲ)shr;i{G^43ɛLwtb}䢽nvwMˡNs48)Zep~d|z[a1W~ŗ* Bc65so`aiv%z/F:0Jm'YA}5^C,z!m8LNWUkށЕ#S!;98+V t)98'C3 B 8:-tPaSrӽ.sv+3½6&o]=U ժG8U{wηl*kn79' m%d'=hLtq٩ODyn[Q.0w^0騢y25k@Cl [ Go]lIIOX-vhHFIM ψ#}l TTy1}0HVB`bZފv])0dFt_'ao*s ddpV0{.ʛp.ſ%s-c׬  p?8-o>fjFX༁ͩ"+#%'8 i 3{Wm~z|swO_fP䴏FqoJ h+"lL{ky3s_Z~N/:EE8*TۙYrk+}H- 2NK%J<;}'k+߃4`I8{bE .QAٳ M߯iu˦kg#nfκɯQS`#ek(H5QбւJT#25br/I/zGjdec %*,Ôn$6s팈2g1fnDtdqK̕cLCsWsT1;M1*Sva n%㬒0Z*T20B nkp?BM8(}A+"| !^%23eUׁr_}TiL?\;ȽօT޶j}7OGVGpHŃ,IG]a8כ<0gc:Lj;4$Od>~F; Հ ES[CPs$t]8\dvus|Y&e!#K: ~OQ~O?Mq~BϘ&bPq,v1DZ&Hݐ F%W%5gm>x$6$݀\ p;e.StW7{.[,a~g$ߙ{晁D7|Z#[HI_}2~3 z5IOAHX44=[3vyWF{+B{K{Wԍ$p{=e$85cu]f/j,Fڨf4(ֳC x/v1*G]kv2:pwok5Ӂ;NFi A)l0'p6V@}*AeA^niq,x8xBvs(3v.ޢ]N-R$ӱndou 7BFQO!iL:  ,<: M4!rT|M-B rO9%3gd[bGË& \uBsIsVH %ݶ Ig~jyKE7l/y0-Uy8st'9ҍQ>*x0BB cg-+ܹAh>蒙 PHε1! 7~[PUI^@~sk=L1͢,"}E'Qq,n S]Qa b:>@OlMʽ77͢@JK >,bN"H(1CS2jI|fX]{AAn@ЀBԃ1`n@ F ū9 F;:VkC:FrS;?XZ'Oƌ0w$if9~X6(H#D_k>HZ]Fo$'Dx,YazzT\48@x![l޾^kd#$2֤_;@vڭCN9P* 'k$jKdtJiR!XHYZU)|2rD4ͯ7WZk :yga=wFJ ϲ-b16ם^2}vPҮFsy? zMrLB6ps:; ֩>1Gb_Q/*O`G+9Y[(xYsv4)zxviL`$PLca~EsIj*zH&VH"$amGZ y~)Bf4 s:sb^~j:ݥ7{>4FG$I =N/ y^7VDMnMmBA /]]p] )|: y&91`PHr,hs`2W%;fɧ ^=!U@ykci(}cжF"J݂D0ű׿&G%w`d)̟bx:* ;F ̢#l/OEMqNR6fo,Φ2ƚ!6V>S=&1+kfNX̮b9p?$ZfIE HcDzrN>iPzg3.81QK@SbFگ0E.PեN,fD[\3i_ĩ,yT|[Ņ!dbIvɅ0(+'flAi+~Ҙ!K`_G'QK[!<?6u- er/ W;@#q7ޝ$1Kˀ+K>4jGn Z &Ltٺl?|WFt~-33&byYU + LTzS?a7+>{˛ @e Dn.1g`V-5 y9>$?ʭʔz֓d(% BmnAzTX"Vs`5E !E7O$KT=qPCѻo =P̀]B0 zRa&`Hp/@]CR5QNƽ. <6Ju2>0`}C63C➝f0f;ewL[A86"+.BwB'mc^BU3j7r -Q^ss"p ϻ/ t} \ aG? :{#qK7TG+tmіΓsLEܬLc鿓+>AyĦG0&oǼYw+ w񨤓өAdU*s\S Q:+^KeaD[ ͫ&Sbs78-wǙHU.@5"u`_6UA,\WM&"U8w;^ {閜(o%R:\1_ܛm^nhJdH5gvXGO^xe<% kTA-H4sl&?peӡ,>BBũ3숺P&.Gz %3&.3+bi bs +n(;&_e*kdrҍU-$,5P AV l m3#qyZ0:^JS) cǐy a yHR(At^iv6jڹf^z.KF[/`V&2-J tr1q5vCoDQt2 Z#v:,w=eIZ^9؜eeD皪Q&u ǫbk=HB^ ȇihМ-ܠN.qjtC%zzԒh4FEQk]mCv&t[ 3R^@KXEP^L :.%w1s gyShZU/J*ıiVptgw{7kwc  T򎞀$Ǚ&ήp4FGzƿ78k% "FJum9_zRZXfiĩdt:34C&:#Q?;]FEZ!+ey=s{/rF-E Bjb*>_][.bP76[]P%<9WV/Lz?fM$:$zQ”Јm㒏~:3udl^iFr;]Z* +Zлqڟ' ,D߬g 2DqW juL0 YwG<>zuͻ`.BvuYT*) awZhj:^ĨFh&"_KN/jeaK{NflPk_I{t<>jg$nZF_Ԋí3'C#B>ŮY}dx'ZL"DɃM6;*#%eB@d R/+)т;w>>{;\  ^ JaWS<&Y@%o/+ubKcYь|@8e$9S#IJ)b/ ވF 7ى7&i6`'0e-SbYVJJ'{>AkO Llf $|l}9/Rg ZyGc:~6S!B2Aa |]Ʈ<!W&Ңm"c[;b]kݞHu{e5*s;mx6-~Pa ]LxwP#2ɸEB)EkUlC>[5:+U]y5o2Xl8t@4Tު p[1U z(Sz׫da&"nsG*<®YhcL3[22Q_\!7#wjRRDb񃹌2_1_0.UŹ6`IXg.ۦȯD=Eh_OݖW#uʥM䭯:PaU:9gayxkN5]gE5ܟ-ْz"I6U-L9KEXQ2\?wKm #(c#%  nך3ILHHFżc}d(5Vǯ9AE'osZ1R K넋q"O?b$^u4L@oDgJd)'Y*lJOinHs=rܕŐG^%s9$n tn^(Ş=ǒGcV9!ֻRJ#÷̋Z@):cw viFBiox*0gw}Jl})=를X qB1SpE!_Za@8rk?Q BU%>,YU4] f ڶ]և9ߤEj2Ng-~ Q5s|`48tS>p㠼,ϱ+NdI|[~d,FؔA;˳ ':h<{;}crɕ MDulVdh#wȽh3Fln'z.*IcQ%R>Nt]@:TfѳmW$)h]cyszt:]umsLBYѠXlfIZޮ`FQ8^*ĬNU#t?gI49= |ߣ AZ.xq{'2̱4qi:NلQ-^`K(K̭32ť!(_:LXEڔH`oP Z}PaG(MgrC)-5;i:dumh@]!]ǃ Sf&/oD?pjfV#>Lcp8PL dH= iW;_ZJGTZ Lţ- Y2,4W!Y134Y_ ,* /I!h ]? ^70#,q@ ߜKqxuP[?dF?i"R)KX`< q߆%M%Ga B29hd|ND. !`c~@N-zTHWʺG38䚇“ϑ[''7 ÜԂ{ÓحiJCGD`%1*yCj'm{bX,S>} }RD.%PO<ĸ)Ĕ&>) M MQDS]}"அͶkY'Ы$G^A)_mQf<HnTUQCR˾I|)6r)4ݖ?JR -nX>stGzK3n 쟨ą2t4wy) o~t<4wJ4%N]}!nql2W!fre&yӓ^!L-Y*)x.BNMOL\,2w79YG9 -o9U0O.$1ffS,?ɏWsŒ 3 ζiGbjX SF }{P${zۚEq8li{໨LAˀΡ| IRBئJ᱃#W<[J8DwgIQEt^VQ S{F*W8{u4¸DyF(u&Xϵ~f@e`4-Z/&;Ÿmj>FLOAdص10T+~s}}u&ߵ-& 嫏p`((dZC?:)OǷEh/Bm_HmcWaM@QK)\B&{yEγ+ika{(#H_X}TaU7yi*(č[^c[Mft$J>/sOձ~ #d"e6'O$8)i(eلS 5" E}O:ε/f#7ф灯*Y\2%EYE{(P}Ӝr̀{ys|'1v+mXVZ1\~$,AzY#Y&Uo[!" 㭑* <@)])dTݐ5[2}E~ỽFw(rM^aMaz:]."u,ې]#<~bSK"B?UPּnJ; Q/SWj&>UD9z;L zxU`0xlfUk̆{0Y9yюShBPc1 ϒ~1gK6_X(|&pS$LQm,Bݫ>RN/VÝ#TˆmqZFP'1W&6)w2GGl e8E 2!"n۠C<+$j+1:Q5pjdn.@:{aL5ԭP%tجQ/ݒ~rqcY)캁e@54Fԗ`3}dE JLMҋɋ#;zN9M~hLfcZOrLhIO=VdMVk4aga||N? oQь^SܓD jp].#z ZbjL DEJ\Q,_JEq*|,SF"-5?;zړ܃\un^ $i.;HV$,jGDKKOxgdG z:%„g"5xt_7wj@#~ZY?!0"EEb61bH|\(ϝUk嶉&LuE'Zפּe Zj2τcSȇg%vK Um%AM=X%h离+ ZZ҆)'G@GjTzIXN{?&ޒ0>ѭE.'|;XYལRԪ4pUݯչ}C3q$k{ƒL1R8S|r>N,B'w?GYMYeAvF# [bs<}ʝr<'!3G2z2Ba4읟 \!bV_~vb_l۪Je =P#&r ΂ \rm3{<#6PNjU5 YZ