libssh4-0.9.8-150600.11.6.1<>,|hBp9|0X\cTb&\6B 瀤GR!³%~W`#}K%,j,Ѻ44CU&fivx N[ =Dz$0$ [2!ODzց\R0яl@Jo^5B.kZsxNj)џ&}RPssĒ!5)i}"&h'ʬS83ᖋB+-Pr&}¬o[> 5]Y>@E?Ed   * .4<T ` l   0l-(d8l.9 $.: .>A~@AFAGAHAIAXAYB\B8]BP^BbBcC|dCeDfDlDuDvD4wDxDyEzE|EEEEClibssh40.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hBh04-ch1bHSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64cA큤hBhBhBb;eyb;2349e9b7038bb6e4fb352f4c7397f9eb4273b00af706b5340cdf45227dda064095b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(x86-64)@@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-x86-64.so.2()(64bit)ld-linux-x86-64.so.2(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh04-ch1b 17582824450.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=78498bd091444e367ae0b717ee534bc1ce6b9a0f, strippeddirectoryASCII textPPPPPPPPPPRRRR RR RRR R R RRRRRRRR>-(za`Uutf-8bad68b56c9ec6a4d3ca9845709d130b710f996fa263112c7b2ec5c596c2541aa?7zXZ !t/g^S&]"k%nd涻L,%:wxj6>z왦~Jr?y8͊N@Zn讻z^LZ ]ŨFzni/)zMԗZei(hy/ Κ=u$ Ct̀&+>B k ̡gsVEU3?wƻ;Ƒ4?Trp9v8snH'zJ ^KH{1;-Gk>F9 C4poE je +N>;i=n59]]bp 4Nu+e5Y^1K{9PPЈ)1 >Җc6<9W"ɐyG&-y<'j2v1ҏīV*R "S^%XV_in\Auw5rȂ_t#I_FX\.yEs|SAu֩JY|/gܧHp@P9Dw Z]וPt;mڼj c ^ K"ؐ4yG0C5G1E1#waMiZه<F/!˟E.VjA!\֘)-rcݫCc-]YsAN?SVϢ75M+ Ӱ=CPp&AKfNhö)\z z?T(kˠc{neᓭ98:kW$w"?p;*ǯlP|/ߝKP$F_eGڃKWt0ER[x6^ vw3tcˍ,GF0͊IqQ^ܻtk= LH7Th/G7c(E05Eg Ku vLiοqbq\E'AO_~-`hIyb鳌FC6jxK%#Qq0*&r4'{JްSL `!71E~>P)Utd | WkL2U"I pd2BT &Nj҄ Bֆ Ar-J6@ϥjQکZ* ${`ªOGk|yfDak֦+Mk|,߬'$ 1EQlt K4oC +vZ<0A l\t@i1v$ &Siq.NMgV"Y*4ԺbrwHΪ:#s}C*[7ϔىBܠn"5U=`\Mg w]C A:{DHV:ɍ"J-3vD합r+D(|Zﴖ*4#X8+.UF8mrQʘŦwt%*l냅t4Қi'6d^ 9Kq6߶hfQɯi[ݪ.wB1:[Q8ۗǼ c¢adSr[~ *w1AoԀܽ[ņ57I|Vs4fg@y^GRgi )&#/vJdY1s6buaηYnV(fvX=<)vAh{z?1ܹu>=R=xlNl'm ÚҜO u#:\* ~OWJ6-7b3ȩ5ɢ>%8=!Vvw~jrpQKW&yr!}[9q֛t|^r&}uC6fs'_}5$Fg/bĵf_GV2Eg.\sŵf7dd3¥غfG.]lu;7jA͕+^X2dNr ._YTҠ$N4&GU"YDs Ľ QLfҢq3(qXYgX(qt$˲ ?J(Б_3;]hݤSujAe_SKUl *Hf)Jb{-((  Љ--c`:X|pyJpt&YNuᅯ-QJԐp|w8<30gyQ{?Ӈt[bH:lPMvM7ךgMfo ņ$a.ɛ l.tTV&GƾyaݗkyP7!.elkM_ùpfco>iSiuZ.0q;!]ן@ZcY$[%AZu #2^;q˩,IAx" M0 ۱34 S&i#"4vŊ=@F\j81قN^ x$IʳVΔÚg_[d~KI̯Bǣ[$D&IɂYSmZU~_/ _"/KKOT)7WWpކHgLABZoA"kg({"Nj0;IzygࠆWTHC`[3"[yloMϙH䁒\a;0.r3-mk=-=[J94 bfaҔ9i\`3!<ԗiE@_1D!׀J^7X=mr"urXE$c0i6 &3%WTF>6 `xv/b X'[˴Mt>mXe^]޽ETC_RB.\ZHHC}Bu{RZ:r\[ZLՉ["1uT#=Y.lѧo|T9 16PL1<}KdO½)kXvTZp"16띋B d.#h5W"73XWV_D_j_4[VD9Q74#_j e4#7Ϟ%lrƀWL# 4wG2xh*lpOP Moza?bt&/^~Z=w bAR (u>Ub!CI$r\ykw%%Wb6'`c͛cyõr^T Rs?Qxϕ*:wbLd+Iv;B#AX҇δ-`\ cdعYqU0^{yрn/&7d-zM E~*QPP_EzߗWSzsvQ{>,O҈z@ț mbQtD^:{PE 814W]ەh<! Eu{\W}DDÍ0r46xEV=wc4ZMSS;vP p#%g) >MG;0edGHg$0fӁ Z.HmU_S {/?F6a('dj?y-c_m{@z'̜h}jcf p\sV^w(`CGӇĶc2 غ/MsSUB+kI} N`@@s^"pI43\FfɯUÙ蜰2&A0l>.(Bͱe/jё XAOX=v3xǒ6ݓPcc4 .jz\eT]3Y&i%T7f`HIv||ÚdU^$,t]?Ec'B> Υ[@9B|mZN+ Cm5Tґם?cTOUrA|J<ݦchnŚꝂL' ǽ'|(ߵ"c U9DKlAZ}>H?lĘ[asDm6ox3)'||ac++_D`bbesL#:yxlH`t*Kڐ&͂ pKf#Xy ץ,V7[+%u^)~ոDsqς >t9޿[!SipEo,bEڰ(x?*9XĻWf~ǔOrEas2UN:8#:2^a(THKe !LrzJgՠpX1ł HPf+f6fi"Z4C1Nby1.ߜX<rpBvKx(܅56mȵyf+pB_A#()_I cG+4 <7a M?N? ň3IcF .Y5B*HVJv>oEEgBAƦMCިe1'/Ebyѡ_Xvrɟ w ;PH:M ؿg( UcvmL0LP w$%?I28qG.`[k$e$e*c#>} ,SiD `&KVG Q솻c'PT`p[U{d9Kr#IM->K[Im{fc_ct|9~aMUi)HZ\Wƈ;F]UAUYb#1!Tc ({w80ro ["lv|V-"`2(&ʼU v{(w2a4"}􅓜YӾgڞ1 1-qCgXRI MEdFnFn^l /ztVSBS<),IкA.&A>-~TO*5O{.&ǛW1m7N&T!ZmmIrK[ks/-Q?Vagɽw .lIn=w6|ā;T]u3[Ipe$b YB Rh}[)ʷVPbEf8H@MqOs7uՔjl6:tLx+RJKPm[)/q)p֊jh*|Fˉ%ÿk>tLVՄ8|QCHZrk>,LE~_`tSb6Gn8*e򓯎n@U x[j^ ko3rq$!*Mz=5dslvkW:з`$ @u7E+ѧ-0iU]o&VpX-6- ΊB(ۣQiOxz4 >lKŪw;qp LhE *j Ԋ-}LdB&o[?7D^/Q<&y3 }r8z,^Exi3xb$$c/.k/Rl$MPFNQmIP񤍟LTÎT+ݩ}g o~[14w$7| X>yͅsw\lE6l~ [GM2FMzׯrv=Cp]GisHrZ L΢܃ˎD_28J^,P6#u QMhQUX4g}£LWg]/l![14 K0m(B-Knqbg @.[!ӞyQ)P!CxCtt| ?:5aǛԵ'| vժP3id75]1is_up9X S AA'3v`7'Y\I c"u.]ࣚngKy6 8kH/Ms2kӎTۍɷ=dפժ,c~O}-qZ- ˎktoRSWT.HuVI'J Ku[Hi\֍ac05an͐i/tfJ'-KZO{Ó KGIHb/ܔ'H{NKF< gV<{%|?- @9}Yj|⥥&uS0vWY<Wr3 FG[ִܣ1D{_w|O]-R?u5rES x*1[,|,c|XS?$*3 w;܀(MJu c 9'ʏk^"{8\FWk-Frxh%ΊҢɰ nDoτV w]#dL30I%1mH%݄Uµ>Lq1cɵd3>ItfYsxAِ[5ڝHK6l|qQN ڸCن;>=Q$"q#?N/\%28u7s} h_U6Q qaA$!EzDSt ݝo0l_ם_37+fʈk?a|Z(7pAte3lI! ! K>#dR6v$ek iN_qetcBVk_Øj3#>,l /-/-a #d#VZ=U)P~ԥ`D_)u^7({#:;EeلhY.޻ˉCY)="y6.JRrA s{?Q\ߒ2&lN/ ߵI_7 pd=tIc;!PtmfFsz1 Z$LFAs`` OOM'ܔ hL9JQR ̧0L7h槁O&_oS;5c7|unw6r1.XjA Jqu)"`HF4QpŊBけ,n*83X??7QGk-gc4Yb-nʄ%BO.2 [{:-2o1Y{$GsɁJ!8ݶ'僃ψdH3yvƌm6poI,T::([uhiؑat77`7^\ rFb*Q&L=gG; UsU㬕?`;ۏAS45x kpd7 Q.qhc' )jOL gC1|/_QSp%=:6.!og+@+f,b}G ӞYv6!S ڤ6#^ު i4J;gvNC0TwgQQSM L SjRٍtM[t4ֶ1KwQ!Y!/8 @71iR R)kp,!( 6_d_d\ 9;1VG_[Ixz!S~&R)_`UNߥ,ϤA F Epaƨ/(}q} 4k?kG>J_Bި6(GLp}QB-#.T1/C}Z+<p SI#ӭ`#ٳ "95zw]́fz)2:\kVe\oH^د&Aiz#@5zCN6K+ؒi ֠t;š?+T~+ۭ'ZݠL l7\S/\^7c.j>bcEzQ}ڡgZeܯ@k GkmcaF8%h1h*+=FR"[,"OnAf,h8fz$3xMVeç}`ϖ{;[qNXs ۮPiD$Pp ]cڡT\DYKg%|mol?HVHXNm7kQe'2t ϋ)p!ӌ; *oyA♋)-ufm/o DTc63 `}-kX骼KbPCOX 6u]Ewp7 1"V7$ N_fhm_ƂtcCU&\Me GbG\qX#cj$G1$G.puFHKgW-cd!ZF4u OHSu| iau\K?ľ[*4R2+ac6;;"ca.h4=*1vaVCdO,C61"pɜԞ0Oω9ӵOe|e$bick"@ac[vS5[jC%i"`&GMN <nP,b6NGglq-FTNI7;tȍ^!~xV1TX %JFS36pNkaB[5t + $T[eSq '}c%_3طR"W+tp+#AGʒ,D9 lO ,>?s V{cn t|&tCHvjSkC}1,O^WcB' {0d)I@=ҾbU9Ǡcu2 5j?B PW?+y`y xJe h0)# ,< S2:3 LN6 e@ˮNs.S!tEr-dF [W٤a`_ `c]9i6l}}z!QG"65 `k'Ɉw"*Gǔxw֓T3m:Z]!<A$.~pi%;hn[Pkeu[픢P(~Tb@ؕ$ N E^o֮ʼ7,}Zes7:Ma%Kvp91}'0T^@:) NIŸW۝;~B~jEJ,,:9қ7$OTKR֦~:(k'2=rA5yg5Tn9EaכL/M3^bI xb#FاqRd_9*6W]ߙk|}с&n9]߆ZnDiX?au FqQzmُ vP^f [z)V]aie ,C3d%e#SDRho`0Mfbg-N苠{ $i@5oa?l˲`Z)O DI2ovAV@F tSZ`ct@Ѐ\:mALV𡁨[m8#R*Dj -˒{5Izf(f&+z%)c4Wdy8Kɦ4؁@|:a+a &Rl ʵ~WfH8l)%͛!^fw{]nR_`MB<7$:g9#3K`'%sZ ~H^!I~̽ȸWVl*X<\fMvݒ{?)g8E~nUTh׷9:͢=_>|L~5H-7%ib*;t7  է%MKk\8g)Hѿ_dxF&a|$ۋ9Km6_Jcq^اxPf,Ezc_{|Fa|ӢⷍC3wXۛ}_'zDM{/o`]ᝋ]Մ=o] ^yo񖰛IYg2#3*;Ոyg<ٰ|6>5_-ZHˤ[>2ޖdиS+,!+ӹ }vwbiԀ'Z9OcVָq=ǣ2 G~#"Rx.aɚ<ǰPXR1=%Na_C8sNZuXOܕv:)LWV'~9~0g<&-hf~[L8ܧbK֡ aZT߽~{Mr֝{9]ՇH0cuu\G~>XN>q ?EfR/SJ=Q <(}h3rhSth`%xbYV# ЉͶ7F[k4~e "!@Rkaq4X=gd4adPPqa26d!bE>']w]7`Ӝ֥k} ƞzMZ_w_ +DUr y*ڹ;l9d}ARK;RngSXRoNDLmmaQKnEml<~Yw%LnAvd7D^ QaLDv"`fS]8*go,QbܰrZK#Έh}6>@CF`f)8MG&WY^́t-q7Ihn_ס@b~FZtI ^I+p(yIC'K1<Th ,KxJ6>XS~u|ʩ>iG7>=#x0mB%M8.y(Â4et=,F̀ZBȝ%gL2f2ylcFQPDmSFH͕Y- g!/ƩIZ%—')]s_DT)K^>:NPσ{fh>]e[Aԋ3?`T!_+d]ݝu MbE #[P5@Y05mM`T+B%z؜yukQHZ݅YFNhVFyqa&V\dT㴈|'VW;s<q>;;L_֤}˥1Qc>ZxU4 {i/mLiae;Kz]EBg2.EVf/e3QS*9]qMPGbk¶R&WFzCk,>::?)dn{"U!bi WW.iȢ-<K`G)Zzf f>)jW H:vC]kٚ?䮚AS~ 뺜<"9IIm|-l6T+k<uKC68LyA2qƦyg5`G!;HHvec  eFGحPiS{:(Ï8ISŬ-Ҽ?@1^b kCeܝ=)>3wCw ] SaRR?M/( 7֥JiHjYN “o#9D$amרQVB+e"_ߘTNh@{ )E9%.tTrݻq 8j~Z)5_)V\U]7vbjOTT* bZՙAW8ex =Z:dXM& {fk)3Yk ]Ez<>OJZ8DeqYdϿq3SEQ~@#~i5o&')һ@^Ӭ09sV=xuʘlErq}?hdzGh%'Ŵiz?Si57 bj 5T|Rk%wޭΌ 4?>1cO%aѭښfLgZ)0|8;k%SƉӽ0h104@1-*YQ˂$ƕɫ}3cU,*r56!9O6T#| ԨH_M s\姦|ϋtJZ& qr9hX0|l42ՠ},qT Ѱ?jozisӛ3}˿1ip̡OsihPwi%nkW9fCJz9!qZơh[Tf2xmp\;,9vuo_j)J=J)gkQƦvۥ+1`~Dae$mS h,O1p&vspCSi)c`=BNBS\ 2{gj-<ãE9@±2:Qq%hlIB^ B.(PE$tf|9yp-1WN8_v;iuHū1 N̓djGڦ^ YZ