libssh4-32bit-0.9.8-150600.11.6.1<>,~hBp9|TU61)lg9 ܦ21qo< Xbs 2KXZ%g \kgb5J`M6|@ɗ9/߳rDZYm5n7&' ]un#-#tH gdtAI"K&X\HtYF~4_-(ֈ4voIB6fʘS! r0sJЬ3n+ԋ .XYx'˹.쥽֑SQ< @&>>C8?C(d $ 0  28?PX \ ` h  $e(8.9X.: .>?G?H?I?X?Y?\@ ]@(^@Db@NcA dAeAfAlAuAvAwBHxBPyBX BBBC$Clibssh4-32bit0.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hBh01-ch4aSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64/sbin/ldconfighBhB96dde1f54d690ae41d4ab68b69962e3dd336fe0165ed2850f610cea3273517a1libssh.so.4.8.9rootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4libssh.so.4(LIBSSH_4_5_0)libssh.so.4(LIBSSH_4_6_0)libssh.so.4(LIBSSH_4_7_0)libssh.so.4(LIBSSH_4_8_0)libssh.so.4(LIBSSH_4_8_1)libssh4-32bitlibssh4-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@    /bin/shld-linux.so.2ld-linux.so.2(GLIBC_2.3)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.27)libc.so.6(GLIBC_2.28)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.33)libc.so.6(GLIBC_2.38)libc.so.6(GLIBC_2.4)libcrypto.so.3libcrypto.so.3(OPENSSL_3.0.0)libgssapi_krb5.so.2libgssapi_krb5.so.2(gssapi_krb5_2_MIT)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./bin/sh0.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3d3399ede526d6d56928bd9ec25b29f46df69ace, stripped PPPPPPPPPPRRRRRR R RR RRRR R RRRRRRRRutf-8d1cd3ed25041d3965add7d662d13228f1c6e90b86d7af6cc281b41c3d83df122? 7zXZ !t/F&7 ]"k%k4ÚfB@XiMIìa'>$bx>VWVhCcj'#z!n8&y3$Ӧb԰Cm14^v[iy-Ԁ@W 7U?B-&#EӇ,}VʓYT=_*ߑuZTe¼U=4S-CS630vtTH U*r9"5[nsk M+$0G? VɇJ>ܿ5&7zN C _wMJɈN|Hcŏ;}Uncoa!> qYnm3Ez{6`0ʱiiD,ώ%;O-e'FQ %/2,_1zaB.aْxd)f@'|NsmYC[xxy-rTM5Zjgؘ(@b 1;_,x\1s9>eblb{,Va-ɽ=ڨ:"R؎͍\ʌ@K~p!ˇy~&z$fL(iN iFS>VhVig2xqL廆 Ga Av%褛 W*k*@{#I1Ȝ'tPO 28{1>щ 멤iּiGGP.^e6*JFRKۿ| ,^8oT}JPwWeRKh8fd*;"w2^'imP}&nל+Lz2u a{/l@9[ɴH[\mͿ%!˔adR x@]"[T_% ټOi{r1},@E%b)P%Aƒ7wOu|*Ob8< l#}!օ"i[D}Ꮘ>쵭b!v%2%^.{ e4o\(ˎ+gurNAHGuM"-fUE>n ib."z:{!*oK`f䋤`a}zR.`ՠcbvDEWs 0RVPָ=ܸ PlG@o)qi jF'2RI^.^i͑4B=t{\A)˜ !ܕv$슭{N* kUvǟmf9bg! oaOnq>񢼓Y 蟬ov)zQСnTy*,kS3ؽ&TƔƛ1_4 Kvt$2]i"}G0HE1t1cגY qaZBﺰ0Ez]x gF%n";6%:%%ĶTo:tT8hƺO|w˪XǞj}j>H*V w*y@kLD(ϗ Gr`cئj""eݗWDgr9I.D^Eܦ@?~i8=Ҍ=|;.2,φ 8Q5 Epap”hXP*(29ԪYdͫ#^[a[gA˺okEJzg56B dat*FC+& Y~`GMuA7`19ej)0TvMs/է p}Pa eH,S̎&拒eȋq^;'HF{РÇn.Wn}9,9&N~8O1!Dk+ gCIp,3cSGUk3mYJms_=@-ߥV[_z &վˏ 'h9b>Pbwn/9 &i YQx/qA#P*$n_v]ZgS-":9L/GOl3p0 Їm9||ȥG.uw69|7G2Es#|P;K_GTRYj/Vtp}9 K&  EEǃ"T`ߐU/=i}i_੃ H|fB\H_G~vG@/s8!$Rd:$ ീwQL>bޜ?qs)j?U|3|ksz!f_q`%/td40j渂267)R|[Gl&VK`4MC@dc+@?~dZ|xV/kn'l*6?!X55[jm5RTM_COG>Y7YW!nVTzbs)G?4)YVp 2KHiԩbYAHY[W!s{_n,s$V`f\] Ƹh?:i2"I)E d1])NeI&=T&}0I"`}uSks|\)*?=_>=C?0w ֈ}rqDwBŋ' `v]BFL HqN1K/M4JM8 ӪRwϬ͇43Ԉ󈘁kO1)WG8ĐJF&4xG ,FVeK{,AAAB2Jc%ibn Z_xHwxW$SjBA[QgrU ? 4Ƹ!鑥^ H^4RM n\IoH y"eGr4!TO0V:Iu:21sT`Bh^0)9h$.Ts1EMnl\n\,TID4 Fͬo[UD*VE@*_wS$E%pO9nH1rR=%gig㿯w*ُG)m/ģm;71өPي7)qgSKx:;Yz\ ,!ȲcΙ>8A!]blbCqvQh0#dKoD<Nij>$.EDHsu{_eZxSULj@mݙݬ$z搟}$C ʬBh}GBDUɵw~Am)ab޼JMQATʷqCҋC . y!ҦiwB9."[7ҳgAؘ6}1G"u2l?iz.촛I"QѰ<-rt-Jm4u9&"bG좥58"mWkWH>r $L )KXәo|ϙ6m,2w}?F !8 \-ctb3uڜ\9 O MoT@>6<%S+(ʸ\J~WئO?sXєEmk0"@&levRvtu96\Xw3RF| HЕ82*[XQlI47[t7@pݑO '@VtL&!G/!PKX~#v젂ua\M*wqg˞ZY‰%_07ZEMXO澷",>1#dLWCm䑕wXGt{׈}AH`nxO"+/(~*\љh#YQvCH龌)!J|ς PJtNrܖ+4B8se)=qs_ A'S1$z00^c l{̠^!OZ>҄|εYZX0 o?iY+yTz  q4|6lAOHrfp6 O?â:T0k;{"=WcVM&~IU(A*/,DqݤCIk+[IYv0WB>!9 , +|%<\a#3Ɍ̙i!/[V0Հuw':9Ĉͣ2箷Ub&2opCpԏulJA=!H*syBKq4c2[J[t[? {N"D)60GؽJ(逭BU?-Ʉ>Xhb͙RKwo_ ;y“jYPTq g$HK!Rfq1ծ IedYp(K Ԕ-m>M2k4TPY,S=VJyvPhX2+KjuV LӔ٘V.ғ(5 u}wA53Zz#+ q*7_A@\FqzZ ]< mWT%p׫e}D)k~f({|D|<_  L+tϿWOT>e9kwI4mkx<ǔR6 ?>RFOwټ3ce z`~Эv Bn6$F[vX."mqQ ^W"}єDM߼N.]ǓUJx[wxsf?qM؜[U.L?1/eA`vG#7io=YݍH4ykgϾ;Cc(".$g7:,5yKrun$bUd Mε, }/h?}lvK7&Ur ˆk0p*roZơ"ۿrrk  !NpqM>Fp6Éc2%O+nk{_6B1JMaJ(oW2s 3` nQG(4>k!{MI#Gew*d -r3G'hQ(`VzD$\v-j`{8t55i=cwqTx# 0dyfc! V9D - ^9ZGY (FoJ"^%&)5PjntE Mz=gޱiGLY$ Pβ1> J9P_p&L.я L'I4|Ng,Ef8^3*AGP 6ד"J?kڿ]̄$R6QTR'm v4 ,bzS,,^:WE d$:Y{Nx  <"=bM ֥Bn?cpMэLK|Tm[h^T|e7t֡Y su@ 6˗Ǫty?Kafʆ=K!ӥG?٢Cn˪X WuBDcleaocE@b+VP!XPbqׂSݓ Vn pR- &P&wVs"ry0}ns|,S#׌Td'~RBsϏ* l$ڐ24Uc31m1,]|rb%&>z!lf\;؜RYܧ`|[G.'F.Ӈ}%1{M)1UU3Ӊ*ݚXGs&[IP:qW2T$ὖm]JC#-rLek|Z)Ԋȫ u +u`c0 2]}aIy 2Y%ҘDc[2aaOt,KND'ZvV)5(em\֊vV0?˹>8 Ng}W՟4ɶFde Bb5GroY<@O_È9{[.j\#SvIQdjXѺvto;*O-q_ޝ\nSZ֠aZ'쏙Op +()%uA忢Pȸ=!t}4Z(W"~[kl|@sܽF]9Ox"Â=ƆYfI8.TIU{䚁j e U+(uX6:zqibǣ)p2luBmxK쒒d!\#M4%aV'8.'!Nnf2gF8>-0Ob}W@L<ipFK]YL]ɗ˩iWM$AR6CpU4ߺP (9rzV v392UYvbI 2pLCHj:pVsW8t1e4|B>yŘٗ{/ _*FG4H*0$=*r*''0Q@BO`sM& 1yI8i*X0V_v~/[/m޵ʙa:(QVDhj=&ߗH|7P8ӮuK]_H,eطώqlVRfs֬*w2.|PrP#ٗ%Zkֆ>&{w vF@S_2N:_RR+{7L4EWeWv >bffNHf HR ^"MtW-2g>m e?iϻu&8b9vI&J.ˍJ ut]2ΞJF.nle(<9F,<:P?YCDozZC;lOk^m,)XE$AE7t@{~A Qo#]ހW{/ 1.bhtR["?3:rqVf+A8 ?[Z٨+&ۓޔi5j9y>f[[9퉴$d!el(63ksX|[S)}")H'gѼCs0\4yEPE\6%Q ;l9e9xcGRkexn_'B p rAc֝ꇷkS)I!3}kd"8 A* J8,b+CJLWӶxlcJofu}0:lhX*2Wu21oXt;fʖNHMb>O0h\&&ӝ1sS] iut}L1GIĴrW <VY뜴Ze'v\si vhI#@>23 預E髥m 01BnY e:W8U2Q}9' yqύohRSB)Y Ubu'_P_@CNXZNؤ~0] t0C ٚgf'+A:?ejlQbb'-8+UWq]3Sv.}<zq_[?"gAR)Bf&hD4D:^``&cmR\M8Ns I*WWcX[KUh,bťpP8>o5 @ NxOwq=a '.wCl +kNco0yH†aϮJsFXVՌi8?=<_U/k[ $8Dud5V֗ǠXɠV` MT31=Oձ>6o{Ox].2!aFɻ_Jk;5<1& |buInzVC1 N:9 hᘣ"*(Y묩r+N,,]䶇%E۝0uLgGq Og=) m;E  ;b0Z՛'?nsW2ɴ< R~t9FwO%v}$#P0޼U{MCC7Y1Wco+%ɫx_NZS95'?S bPcBClf.x:0)@iT*RiFl ,h kGLjKm&Ƈ9̸b .&-]mayW 6;:Bc-v2BG_ lEV4V Rjtb kyd& Σ=hoZ 7U1|t_u9D).߉j, g)t Fd|}9&qK,s!"%ft3(d>C $h"WgE\ <>E~25p$n:c_Ay"`oѣ1ʹ/'*k',q{#%&kdu&I}57)egKYSD ) 5b{-"l" x xb]kaNX: xL+7ѕ::j>c Im0FqGpGj+B&%]rü.GJFkGYW 4Sdfpp&[Ph&VY*5sT QIQ" ٢,$*g֜}gcdEqwR}вh4Q*^ 7`݌7n9ީ~"0ZM2fZ[g{qaMxX6gCI䜿5ϙ(n fhe!yl/WaDOP;[H3J#(KO?p,ʚę-3RHe^:5>\7SH p|P j.NZe#o(!$\QӋ^ibS:*[Ɋc=!zߟ#J_C >(Q ٥a&G~KXRң9՟"83o'{;HJ4`X_}ܤjprLӌz@r}T+ל%)Hp~M/1fʓ8X4$TNcNs" 44oxuB*Rˎ 瘻x#KdS=. V5#B<=۸S;އޟ0L0dK<5*IKц%$8Kǒ@?|-z:VkۡC pio}b}p,LҘ{sYyUA;g!_{IIއ$@0b$f|Q{}a`kv}w_>WDәV#йJG2zc+C5iacSUrԛw{I٦+$(o-r\Aَ8RL[L>-O-︋vPnGWZ5/y}oTF,+kKcaM3OdVv3i-rG JFj>0 G*dQWǀ w1T|-6f'ޗ0rً! uiaS7|'F?^RD9޻tfylU TcmFbؓ~ܭ+>]#h(|'Ge c j2Nj(!QK? c )򺞿4xjc[RЀblxt\ (dV/p''q z_Uˋ\qAxs_MwDwx *W >65~CaRF25YR@gkpYD8m2~ndfW뻢dB85#F2:m!h*bq mjN#Y. $&1z\9]0mY 3T *_gnuɣ% J5"ܗ؉L⠈ D\ೇ"C%.,-CIW~d$s bQS' _qئCWd#z ;g%g>E ɫ l'y k8؎9;tO}a_MQb1/8k9Uy>hE(N!4 ։O 3.,OQTqArjCFA$s6n\7ն YZ