libssh4-0.9.8-150600.11.6.1<>,hCp9|gg*Vy{F epP,<4 b1Ck)phv݈B([k`zr֤d,w]&_eלH5ޔMӛF_ &#vѽ}ŏi9+(,=1yGc]8~moK CmS iFwk>@E?Ed   * .4<T ` l   0h(*84.9.: U.>AF@AUFAdGAxHAIAXAYA\B]B^BUbBcCDdCeCfClCuCvCwDxDyDzE@EPETEZEClibssh40.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hCs390zp36SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxs390xLcA큤hChChCb;eyb;dfb39b349f8bf2b8cb60a140ba25b834480ec909a4795999e8aa7e3aae539e2695b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(s390-64)@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigs390zp36 17582827230.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=7c4469b4500cccf9917dcf1cf4fa992c93a83309, strippeddirectoryASCII textPPPPPPPPPPRRR RR RR R RR RRRRRRRRPtiIutf-812eb6cb1777bc77c50056f7ebaf74f5a048f155608122fa80a69d9074ca2266c?7zXZ !t/TCf]"k%nd涻L,%:wx :Og<2[c}ӄ-=3va_LF}>9ZcNN^#!4/p[|wڧO,Vʻ -3|ңȤE}ؑ:Xň`0Ow̷NQXWxx))>$LNS %R>80Iw?ᡬOgY/EiOͪ!LZdkmlgξ>5q vz|#?w#dAB뿲Awp>4D6$iTUauбXS8*p,QeNP ԍW`WLXb`]ɫ"0hQa0E*A&zŊ`D~v>놴=H`~*#gcOOЅAS^l[l|Oœ}ӛ<礇'So K Cy^/>sjUVj%-Y-gH!SZ,l35aЭpc^uԨ vav$y;߬w5|e߮%Z(ZEī?msi .h[/;63T/e+TQ>.$%)! z `^:}qnNk`gΛ<4 R&T .Y|M4 p%+ŧ/P53DcMlMB6vϿ c%qx>^se$ʋIm]ÏE _G#ڙ YRdкZڐب?śx&&|Y |i3C8qi&"tbC*bZ;_ʑ[x^P5odƇ׷P*^-?g!+ j'TONzRv (P$Dd 9P0$a!h~>~VA`'&y5k =\ 8Wۋvy~.(\W v_xeg+Ȼ/Ibdʄ;nB`UGrc(!{T$UԷڒJsw<#uo?QpB$IꀝL,&{;Sς)}LsT:ǀ^urRH9`x7/hj3beAv0:">]sPk ny+E LK q=Cr]%bC&f")*^,Bk\owoahx_I3va@W)Z*45܇: M2Xݕ@!.@ _be og*~-?/ҡ!H\~NZD erҷh!78ZscOO5hv:0Ce@Ԏ挟{s4P]m/<Z\v-LCv1ihc1 y$c_fiXk`1x|lP_\x F-H32ᖡ .lq ?JO7tDŻѼKĘ" (gpkN9Zg8叆w3^R]x<ΐ$"T6fIKs+S/r,Hk߈('u@G g8ƒs HIW,2/:&Ԣ)}u-&Q;4֒2r9$:8\,q($@ahf _鐾RaГ uCId&|Qi>%vEp8]#H'_.:WiYVm \ZoU2 p GF*G{+>>-OLNͷiIN} !Ѭڢ&,#/HHɢ J%O?=S[BDc!<} l8-PONMMG.-j--blR|79uq}C."f,rFH,_ p Hb>F9ll5Γ!2YmNR-X2,P+{іw)N=E`+X qVcYyu&g+ZEox!9IA"&0bpM#&~6yhf bWiCB$znabF_Q$TD? S PfuUf5}HZtbCOWLQhͻo!Yw2~z!\؎Z-xyMTNn۪#GyCgȕ01mgl DM9qߙG Xo5'ׂ k  -şpEfVVl>q?n=G̚"A/ʟ+=)m^`ǼcS&M: t77zJsS3;YC@Vw!\ gRJ,k\P+TYp a$j; o1tHuӁtpI$"攕@.үlO+f_pJpqHuZy>>eh"zh㫤.L>N5"VX*&xb+n7lDA~yйs!>#T&D$Vę-<rξ@9! 9;0r }*e"ޤ7~2Ovl Tҷĺ'ݐ0sD.֌!AgC;q'n𕃠*|=umawA[ͥ|fJzA8.{ُ8=*$j{eu\Ƭ\xpqĖh(`qU]0O.TO@C-8b\d6><|)U_ 9U}^bXʤ\A\@7^I _zo]6Ό`N$8%[ɼ*)%֡nvl2?:ufs6Ң GG:n-%6Qۖ!ajngN}$vw2r/W%6tJgMXrxL|yaϷ\<4qB1t^˱cw!]kX-1S}-5+_2Ge|義O8n|5L/oڞPM_T'̟W' &&7-\z  4lJTu:V&K״{ͪ4ôNpѦ{;1#y9r?a֌n0%X!MJsdw#MtJr!׼$-Q%Z(ZIgid `hpd5yrb$w=Mo>3P-== HDڨֱ»[Gjk G%I_VEB>UN(Ғ~CTI_7l~B?mk[|1fM55IHW|W f)Ȑ Zܣ("NI,20DX5 >id]usO*=T0+\ӽc31CSi,ڛ0!q+%$Td;k6 ehE0vT#r!y.'%*[Y{D@OU킯:WmϑH/'q^g;(B[ؾ!Wca/=7_ d 'W\d4R*(kV u D2 5g4Bl̘|Sņ9^hſjBt Nw>Z/o8f"efy|/E(oQ<1v |KYoh1 WI|~c}Sݣąno*R k0⚾~Fq|FQ_MwI7W`*ύ5YsI#VDme!PAϬNEϛL.jo21"pS"C-k^Dq) tٝm8 W~3Mp`F|UpL6(6Ab& ;:U滘.gY Q@f]g/ ri)Bwe<^PF*gLqpACf,9`႔Had=kOȎU/!Ipɬ:z'U8卩ٺٱBV˦Z_/h!d=7iqOƹ:;NkҬ 2ljF[F=ɜ nhȦ^n: ǃϞ2p5h|o|nR4QSc6Mu|dogl3sFppE}9Oȼ2k~be*dH8j- fzh-Um 8Bd}+Iqw0vqzCxDD1Gք`ٚ#JW`Yf.%tm&ZHgқ pUm m)uxGf%sEW!" >M^ץg(C^(I8+p_wtMꜷТY"0BE맒:C ua_X{w [^>~=Rj]J桤=`!cp0aD%h*|1[de<c^ IXH&,.'IV\𵗮TuzԀDBԧI͂H0_Z[K2B)qI΄/R&~ki@(ܝ{@we=᝞O}]0b>% {eSFz k$. ~t=Saҳ=Ns\Ic U#CыʲKq;i~;I sg#iV^WGaN~vD#4gp`0X[u)Hz=Njx/ ޫ,͝~zx\/Ia(Çyt9Rl?'W] 1O[t1{W[r;||ͧS1nK-?=Tn;XϓꐏkY9$DiGWCtF,wKLE-5SdgF)*1BxtGw>uRV_ Vc-NdI-A-cqw{ӽ~į4I# 6ƝR\ <>Itb8\iF%KT8S74Fqsy:J!bE`ɜGbz6GZђgGWO@K,/ uM` |Pf٪E8&Gb.7 =R*,ߐV*)rfune @={K0+$>D& ޙNo؅#P-K 7&[[Ui \#![8t$feSBט.}TQW D&:ɂ_^/⻄G ƌ$@e3s[1]7t> I34)3C9WcmV DH;$+Q̰;pr t2!RVW/jy%\+vCneҠpgS탍ll*^|< @ nNbjܓa~T t 'ݶf|0ÇjtΛ!,w4X3ƢnW_=c\g؋!ŸٿIb`##;]mouY_T~ȿ *, /B&7ͼ=RE{ăf_ۚkRԋsԀQK,?^9'HLdi^e.Q < _#V A1HfIW9XGU8%>@]R!.2bHᾞӄx|N`UWGͰ*Nkc^dߏT( t'kAc܈d,=]ؕQ4-|ո!^,Tv+W瓊FXZmjV+{*9ҏ}NUxSp!It:HeW${K(ZcS#KHj ~Bmj 5TJ7"Wc"8լa HyˎD @kURc _R.}a\5[)0 c:?G'EQĺ#MdY&dP AE$F:}h$L_4d)̿:Bzx "N:Z4KLo/Yc< (HX^9M,3K&#@۹4oL;H%.tqzlAQK tK:u{Û/Vp T?e 3E͍.PB@0 m_8$uk%lcl^&:ae㵌9?{#ߘ1j:YPWwC3dOm4(rWU!rQR_?Unb| y8ٱnit *֗z.v՝$v@^ѫd%X½mrjirBw߼i?+-^>%0_o~{X@U-!ћ;z_ n)u"dtԹ-"v蚶0%{c.?4`Զt=Ve@j"@l H:~buG!Ke`{-z8ھT,]·QESBWtÁc;Jx7cCJDdz= {pzk?ESP$zr߾͋h<@}_,rn"\-o +Q0]A;sKivne'Ɇkų-ݚa`*M'.BDp`-޸O@QS;|m Q.`hKAGQLe: kS&} 6)yKG`Qm MbtE:ʯ,:=Þ}tV+A!3\_jeψ'k_dʊAyLR6\4grTq3;.u}Of- '"2tkyߞWi:dp hsFGm~me*0&J} d̆veۃK6QM{HV4|gucUL ![@vA7jP-*T$F>!>i3Ψ=gyńtz{Z WQѯ޽lk&Rog\k @D/șйh9ޏ |UL7w@\`8fspM9 P&ϋGR0-H%;lRߝKX'%J0L4}:U7L{~W*D ϮvQVbYCo39y]ܷq)nmvJP'a~4єi°[rzYB{haJi]cL#LRD ͽI ǀ z1S@f-'!IR|?1.1o U! oчzjH?-l6FɀdN}G"&KUWA>\ˈȂ Ҋe aN⻘pWPuUuܴ"&rvh(-~oFз [j >HLz*~u|jxW|,ޜ%A͚A[ž,uiMe;- /*%ک:U4@[Cp.F$rneJ+Q\ZrsȭP'9̫sݤ>d4q1!AƐjUHrէYSZp:!;>9 ĨYwt]*9(s tcyIXjFA&W3asEsqȺŝOoE9֋{/:$LT`POKox!90̧ATvռ<25 >D2pe!Sbt{mqsC&诠}:^PC3[m,scNL,,\}'k'"Vu#Dl+֔YmMVKoО͊pQ֚RPxnWh ?߲H v!wzhwTn$Aq t @HZ{7vpW.W~ď*I a_H7&MSOhD$F8-%җ*AgN\[[S YߠQ824L\/xKJT2sy ?,0}ըoG!``TEDZQs8 +}2bZR^=QՅЊG+YA@D0B)=WtTDalq"C vZFfqr򳻇En5+/i0۫&ל[HM7ҷQ *f4ϱRŪv:?bZ)i+/ɹLl;%E>b*xM- #/jwq 嬫}!]8,JݛL}:- e]r)%YkRl\o<;gd`)BYisN![9H1j1* n&jm>ʛxs#A%ˈ| Spi+Wff = m^cP3Q1˲\lVcu=tZo{ˏu%4uf8E@wvf0qin^38nVHάKD=ݚ[*{Ϯ[sW,cq(;IC*Ҏ6RNHZDgR&T׃ǜ' }¡>΢p/gI̦0E 2ѾL)NcFꍌi&ѽhZwtʋ3VtC`r찹\b8FIl=E : }6c:&Ԍ3X&kJelhgʼc>,dd)94Y;Ma. rP_>(MCzM}JGjBhJlzipu Mn G I)OjK4sTVޫ!w}rhZdYT<O DjaT?HQHd^%2(KM-'q%WeTۦUvgaNrG@ȑawB/gZ Q!S7^)XHtIy_ 6Tn.$w$CZgR@'nLJ@[fR` $̸k2YzYqLHEc֕I\bI,ތ\S&tWR{]-輜y;ULmYђs6d&Fk*)O٭J1MFr¶$ӫmVeܶk Kaš"cz6Ɲj$+vI^4Gow @+IMKpz|m[ee58sY$/ Iq5/?[ 1qvWIx`o*%ar[Iey Hp394?a]dh 5Uǰ(f6<_8^"mu.{&# LJmPI$2di׉ȴ(_T,q^ׂwO\wpY Z.OІHUHdGzdwNF0v)VƊ# VvTwha5v Fo*b9eʂ>V\M#ChMć$댯ח1b RH5͉Bpd7e y.q֨!xr '9pTeq04>3*V̲/kڦ2$"kz8}Ɲ$&5oh]O375AA1D(bx6_ шj+L>B*SP` fM6BA: w-2MFF•&lҎ$[l4Y^Ü[1~8;i&GB9x0cw6s;NjԜS5[PVb[QޡL"nkL/5uR S]`*9p/u-ໂ?\ނvaSp@z̸S1"ڡm&kP&kjH]>@CaK+:q ƤU 8fA~nY g}N+!]mn7BGSͽ^Fy;2gl8_4oĿ֤Swvz"^~0.BH ԨZ'Z]rG I8"h,^.?A\#9MK{@4kPu!\Ppdc+ 1 #yFԲMͦڍlC3 -J@F'|t= &Z^$|_&P;s9,l1 J5ZaDP'UBJ2Ńi(W! ? JϭSi";9{NDVIxO,U%#^B9DpH$DO s6δ"X+AhARr.,Q8"v^S*[J^6*)jMC3 B|\#Ǹ,h6Pg_W&Ӓ9P|A4)xG{= #;P; Ȧŋ% pljM_w/ߛBb!V& 蔰w`X'qZU/3) 0GRoס3)h92rp€XVhWh U)@᣿_a94R\x-1csތa*tBJ8Y;UdlEWy(Q&2=vI8i9E b(y8l(o%n? `c4XrNA5| &APgn&0)u`?uFB f"Ric )*_prRtR˭fu=$KRiߖa"&SH=1~IVU$jO˲VJYÕ rqX%q:$|zVjX|Zn]x3Y^WMi]ٿ~yIߙOUĩdoJȜٴ#ۂ]!:pvfV!QDhWN̈1_w] nms%1K O9-du~ "M0ܛk{_yōQ4LNc/F@S& `׋&ur3I#!pOXY[JFD/:ޑ%:"[5KptA+i'cEu<|.flSaD!VLe2#A yzALg*s-jFJõ[k$}@Bȯi?%e=>Ås6dFp/PP8+Иj!\޹A1-}ڵ j!P[qKަR %Wa0öLF*lj}aASz߸U2QG09IgcfAUUHe ! : o_FrTxoE,V.:n@rT2WꖡeOүѥZūYڱ6rt(]^5ߜgUY*DwW'ٻ,k(ސ7} |spa[?{2], S1mֆ顭K)8zŽؼ9"a.3 JU)wnBqk.Ipp4Z .26@3kJOEv=>$F ."<XKY0.&[<r-·p C~]H/_u>n iG{a $uYcmSp8#M6&$ ,QHܫW3x K@ME|N}3-= ~:[HtxČX*e#k9GfoUVOApy<[?Eknռ<3=x g=j#v[(Uxd;L"a 7=fRsSNU9ީ ͘]d[W` NuEۢ&Wnn$š44m:d1t[2Pԗ8!~0-i `,yj 1*h‘bIw_2d|t*6L-(+n.D3A9Tέi@ @T5#aE$3 4 #3Wr׫#zq3~r.idn"˛<w7Tڗgcbʖ|SD[Q fYeefv~]]]Uc%z@>.']%tJ.X_"V92[81B@7,@nN\2 >ŜyNω GYy٦Ř#>ܠG<`7 ݗQ T^WI'+TW0etm\ GÂQ)i AFvl 4_~}/"UwrLV.U$c3Yjʱ`Y2_Hʒ>s;sξSJ2/7B  ql?>- "6x;D>FiH2! M52W̵ٜ]@lxz(JȔ^Np@gNRؐXABT,A^>p!p۾1ni}ch3^ zFS#(\9[RwU| Ġ,ۓ`_Ι3zq^q' wwq~nl `&CE;|=9,H< uz8%8%Wua1q󅧒97k~?1$,δ&`xb!Uw7G<,7eNVY9Ś%s^Ħ4Wa[ 87z=e"RTI?sXv|*/a$ >T?8~euEHu ܼh;Aؕ]AGyJ="W⻒w7^8rQF})mھ걮kǢ%J*c}Tݕ PўUv{4M$L53߲HC^ -۞wA{mcƯsÖX|g{'܃gdkrtK3oƟE/jnS2F:`bfc:d!f\GXY:v6Gw rӌMlWøFLBa짼dLNPbkAb!xHzsEsQu^F8S,YKhn<-ZZJ\r3zAXeW[Xސ5U]IF'Qs>v*gUEm'!PԤΝ1:IxPgp2l*v~k`o 4ÂZob@UO[Y/>cT xm08˩fۀ k K+ Ag#C2s.Q9H-S`3eѪ:9c6W|ny#@/:Qc3vR߂hFOA钴eF߹yFpyR%~ЀVE$D .&2o*߈l]F(wc8V.a0ԀepvշaM-9/A&bsb3P-{)&\߃s6()H!t n:`sϱNx7C*2 ͉bLa}j̣O b.JFMq~hqsd;:1R%‹*ٚ{j5BTMӯp1_;?Tf`ߦ1 N%Q(BB% LY>w?tv5f@ JLP74(&ӎۖn2bF1(2pG,wZz1cWܜA^`t -J-Y89hl6&VFlE 咞k˙B* R5ڋ 7atf*QQdFe52HnX`KΣ"{L Ċa;k#E3 YZ