libssh4-32bit-0.9.8-150600.11.6.1<>, hBp9|ekܬخɎ<3.'Y.O5GY(u63FPhGE@ KV8 ~_}%D t 9/L WCŊ&H3WHˠuD .9>ޤ65"Nurſt궉e^Ug{JGtr(,]{/*ZIwo5!uEom%иCమ ԦFcEsj1[nÚԉ2OyT,Rbln_]n7>>C8?C(d $ 0  28?PX \ ` h  $e(8.9X.: .>?G?H?I?X?Y?\@ ]@(^@Db@NcA dAeAfAlAuAvAwBHxBPyBX BBBC$Clibssh4-32bit0.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hBh01-ch4aSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64/sbin/ldconfighBhB96dde1f54d690ae41d4ab68b69962e3dd336fe0165ed2850f610cea3273517a1libssh.so.4.8.9rootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4libssh.so.4(LIBSSH_4_5_0)libssh.so.4(LIBSSH_4_6_0)libssh.so.4(LIBSSH_4_7_0)libssh.so.4(LIBSSH_4_8_0)libssh.so.4(LIBSSH_4_8_1)libssh4-32bitlibssh4-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@    /bin/shld-linux.so.2ld-linux.so.2(GLIBC_2.3)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.27)libc.so.6(GLIBC_2.28)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.33)libc.so.6(GLIBC_2.38)libc.so.6(GLIBC_2.4)libcrypto.so.3libcrypto.so.3(OPENSSL_3.0.0)libgssapi_krb5.so.2libgssapi_krb5.so.2(gssapi_krb5_2_MIT)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./bin/sh0.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3d3399ede526d6d56928bd9ec25b29f46df69ace, stripped PPPPPPPPPPRRRRRR R RR RRRR R RRRRRRRRutf-8d1cd3ed25041d3965add7d662d13228f1c6e90b86d7af6cc281b41c3d83df122? 7zXZ !t/}^]"k%]d涻Lph:Xݦy2lE9E@鲅FTJ,]^r$4"na/K$*[ҲjKˡ*u+„9M˺ɆDD nr|D)~>v[S2 `;$.)4ߙ-8<48HOC<|7ZUz3z" k] :heC05r ]<3F;^ .JhT؎+@Uj@ |We2gHB;l Lѡr_M2E*{(٦yh\1F<+dKk:u'oJ_iezΝDŽ}=*"s;3gsBܛ}KY{`QawnF*xtZעtD_x2D+HJp`uDkZ}[LI2~usOmH}\D/aYqϯ1Yߨr_2!*(/o"}_ aƉ @<L{X6vf8I.,zx_ /aay X1b׉t?|"Lց1`hDy {yw m>/SQ\_$4*eBR齚2el _3ĵp/cԅ+\Mb8f^s8fXY0%T't]wٻhZ܀Zېr,:~jC6üq r|І 7WwHKZ}n~- $]V~pT,'iE#YjvHȆ(C׫V0~4dS KЉ?䢃M|,萘tBKqsl:gHlN Ew> fȦ<{h"7߳-ϙk|H@JJJ] R8ZU^ g@\K{}x,ͪ[AXŪbi _NcQB1>ו-b4 Oױybu=Ec{EX8G \D{hh䝱AFXA2;ًJ~+Zpz0P[0Q+ mOYQxx_vzs)3:/(Bb EkzB&e j*{D^5u >(zh]Тb##F?H:@O40>)ܚ# 42.P[fFF-}{[ ,~!e0+ΆP $ r߲>xj\o"'1emd^i?+t rrȵ~"oß40jS Ř`3[LFB8ޕOfԎv]+h'!E%#hvb[_#R+&bq e GP:ju$x)8ӎt:= w;^^Q󖑧;UPpuXimMyl᝚ tu ́{lA:zQf!32 q<`,Pf*[_fKLzr"lGc!Zz䚯XLV-ji(IYRG4)s`vkN=J͆lw5%Qj4Lg :~dyW찏 CTJA@ok9(afc^ >O@`~LCP}&H GMg{ðNi#|mZ/a|x:??d@zvG>h'I ef+;\@r3{_ ;rI+)lR)^z%كe4Xpiސl2rz\۴ӿ3|k'8cÀ VAZ86 / 6 oD$KL=fRU z?!.jdJPź(V /DAISJlװ%{@/\S eby#;O;n'aNbY58q a|Q+-=lʭ‡`%x!73 zpFĽi̢Ua}mD =Z}|{"f xms/l׷Zn1D@ ~&Ĝ8"n=! L3IYu#*Z}6Ix}^>(GB";/| yFYulQмoaۿz+`ttC2lq(g݉CgἽ'p)@ARmM=LJrs!Ibٟibi&`o&^E=^|"`O/~8Fj SaygM˴j߸m Cw pu"꓍vR0br)H,N NO~\3޷=84a F|5TLK\Y1xbʌ/pz+!YJz/gB|hϵP@_@S~kWyC,I{q/g>|o /i>jZDm *ʊ-R|m`K /vJL&C:jbvRpbޢK^> [Ҁq\{H-> ?_/+ b0[:^8QL.A$rQ`lK#(+޲mqV=Մ֛0 2r=XʝDžN)b |Um-uc;EVO1@?z"K|'ށ ־I8=(a ҌS.T6>9rbA]QylΟrPlZN{`t*yxZ'X٨&疱dd$ƴj:f%$R~y:ix]XHg{!p/NH뎖_c9ᏼuԏ:w5?%Bp+v6|Qw5EGAałQU{'{i;Q(b%MNIF@)z7J3wq I,jr&B \´Imtf:*|pGF'>Gw{>g{At./xZV6Ca@`jS)=fkx!h4s&)5yzBn!fC){PJ9is浓1 *!CaPsMB C`t60#j 1v1@WQk{A ((@weR~م= "ɮT{&ol1kcQz>a.Hz Prm[UM3L΍?gx4HUۄ0ɒly@S:64Pg {;P O0CW[}TL`T6[i!k'%ʮQ!Ex!l76 Wbpt"nQ]E[s2 ķbv2ֆNa5 ȶzq` J`L֑jk~o/ 5my1LhLE0MS'zub$I.rwhۈ5Rl"OL9~X6خ-`@rbkbC W XEh]`pf_ĵP+ /)ܘ0ʯh+Nl&ٛΈl_ G T5b.D >h[Zn&a˻4@==c 'd!MFA f @~_U),SNGšP?cݚK*'$0/e_ 6"Rl?zX'XP8}OJ"B5f6dCd]PCof*Ġh׳'6bx)" _brRWZ3&R ; .o}b)W+?7j =<7{Ic8d"< 版{[k FJ3r->Rg>URY QCKmbg۫km* '.-sa->qtP~!J܌@80l B|2 Pkv]64.RE M ,$anz/QDI3[ uUڂ`!/CSlp]?5A?3 y 9)X(`[Yn:jZ 9NT.2gUYeFMEvb5w*YkLVwvIiGtIe#T ӧwB+?P6TO(+qS,2J]@g5\5]TGA_lKFUW:>Udd6c#F"hkn'i!~L򏰬/0„rT 2 {j Seǽ^q/ cYc;rYۃ. !?+ A-R]_fmCH mYy lƭOalZSM1eS+sɂ5B/3(6|$S!Z'd^0 M~{]ntc&h`7&GY+9†!Te*''O;gpvbAC1紏]v2riBlKCI!߃ Y\ [ORҏUayȓ+slٓƀ\)m4.=rMÿ=^6S)t'tkC~&pOͅD4m;@)6 J܊l8JG~\!{n曾[Yn)w7T?LFe"eԿN enw^zyRE}pCj~ڌ$Hq4ǃNfy#TL: : ]/E\ʉn%R%.Q+lZZ|?BMKkN}0am[ݎވ ?AFG ^Ɂ/!b1H"y~@nWav+ŸK5wXz23n-茅*cUr5 P[#Lezƽl[gbG]78,5b"NfeȬYWi\2-'V{5f p2YZ8sjW"*nP*hP0LI- {J=C´MAPѳwZ{]n/`e75,,mVw̱ka=%:B~V vٲGfZ/|XՠXUH[A?@=F(V 6+'(`pWi^@~-~ #0@퇪aa>.<ӌRH)pVC(h7計p ? #( ^˿b=ݻJw݋4sȝK! pϽx:?n~ `gB6Pӈ6硇wҷ,u2"-ن:%Q-$~M_Pȧ=-oe)anX7?Prr-FD?~q>i#Sus' 411@U*@CO,]fmّ {e28+sj_OܦX8)n,x퇟k|=%1{$ ] [ І3G2 ?EX̲uݳx|i݉K.nɋF%i[H^ky6:^F*g,rfS={raxjdōTivCeʊb}W' 7cUq\{,,+ɧ_ZO'\95mw$>}59Q.*3366ѐ/[ZLh!(kz?2&NOu/(rSHC|I65Ť`2XA.кk\5g)jdڵ鄄14d ŠQ$ :[UhFM˟gk}`]U飥k =!U?zeyb.3 =۵f$4협V8fDw]C(El@&lN&FCozgRas-DrNoa)2tX%,_VQ.T;:&N rl.D0DMʼn l05"o?JZ_J~ӫmr`afGn/vQ@jÌs #HR=XB7_X,D]I'?0PQ^M O cIkm1o)}F;YveQ؋6{q7yi#FyMW!B*N_Tz_ ~:Ghh)@*J\pp5Ňm'~OFuO#T;[tc}Bʠcde_%<.59W[I{t/r0Q!, `~Z-Va<8df#1ŸK +L`%)S=s9l0)g$ؗŲ޻5:y"GuSDӍLqq r!0YOK@ٶ2):xpy!"-cF=Pe)aX0d,s;iNW$.7mɧ,E7kQ"VvԲ>F- 0C=UG!#yaRPVPar8_GxX:R@1ߛ>;1L!}79W>YG]4C=;<sS&Fw&m38_]+Dthck59EI8]?KJCkp$u-^q%7,SV:5`=aFvso?R ?dJ"CxWrc]:-}RA0}ieBP_ZpVt’7dJcʻ[0p\LNf(: &BZn(4[,]+@k!tPR2M5 Y۩1v%eWb j0*pQC'X;2Q~vuOYęks xV)^>wrʕy*6XGF j8f¸FͿ(aTYF δ2c}߮ )궪]X3y'Mbjᗒ`>fڡtiVęCLͺ߿-ϋkNmuY6`ܳ?O|iAǵ.r#8<ݓ;>PahzC uħ.8gw-ɵ4L?PSf-)zи};cg>^ U AyR{`fszl fݱ^,Dꅎ%ĵK42H' 3:뤈QHBK% 9B!v&p_ RD-OO4Sr'*G-z ' eL4C+>-WD%VAh< tGG:{pOt(`9Kvh&݊F ɏ1gڞ@878oS4$aܑ$|mc!gB )ۛ v̱9tZuJbL;͘ sQ v;Wl3_qIT6rj#\trH]ϺqGs";!' f_9D72 .7or*aJxfE(q`ٷ/]&lZJfUNp]} ݜl IZ~|`YWMi+B'~yKHf(_{O륅qgow?W4E4Cf]\e$*/7审 1>`N˛Πh[!2i/Laxl7[?AǴ>>2چA_@2ns( id~J6/$h"D:% _"]d`0)B~lNݓ.K=^Y5, w:\0@iHò)j <,ׇ*͊-e %Ts!\|,Eb)N F x/&6 z%e3>*@Ot-24/Zm;iye*IO:#b|,ƒ{3 <-iZ|f?YT+[:I<zI[ ȵn?ASQ^}>}O#sNgGYv[A废]OgyeߡE˼9\6aANu|k*`V;N'HPZP/ȫ C=S?1䗋5KHP-μP9圎5]Cs#iӷ_ɱ4L0-jA]$ GTɢу@m!8yflIbbυ[ d7)O Mm7cc gQtyڦ`z# ޙD)>+ 챀P!~fxBd26!N*#:_M %"z6V1) b:Ay-6Qө,EMq?xuEtc\UK ͇*@t, qqeQeXw6I!y՚vʙ8aD̼6&}+VX#`62 MKó%kDdXCJ=Whʃd͇$)D :Gm⨔ 4b^&=S]/CNaZGϻ(p9puŽ>&#v0SH!Bm 'GC#E}q{&1OIM3lvo6çD5ß=!)xG]:aHK&|3D3Ao+D&mt-9PHn'%p Np4f;g:󕿞'6`pBa|.їȏt7ӤxRqFcr,;P)(N54D]13Ud<6za˅f!aכWάB/8fbL/k.%nFbP{8bfR;h6}3 kv(= +-aOSeaCY ޷1L(53yCխFe?V̠-w^kY6?l+$^8rvA9Y(uA}JLcv>!> · nNܲ{ٟx'ξO E\Ub"Owu7'T-.5.:G2Bh/X~0+R;wK}A~"ekTa_Q1dXG(އ JD)cLFW Ĝ0(MkiJJq`a\Hn3m e-@~Ig=8BhvN (y.쮁۪gŴ: p*)8^D[Bo{ά uܝkdT]{.%rbn.֍6"L(^LJI6(xBr89Utn{+[Wr٦J SK;KGo׿f~{2.9pE3wf[R2. Ɖ 2k@|U%*2/|<m{LdfFn"D9.jYM4Z¨󁏥\iacOZ аEXqDzer1Hn Kmqbq"RmuĊ(Ī]Cj^0\ FXq,.ǁF!h &)k0¼r9ځΊ1糃Y?B;d/{.&G:mNhIG1 +$|4 Jr'$*k' '᜗!?`Ǭoar(FmX#U&@nS0BJ)}Rk,3<ۓHRrN{ETxr7߼5`C9oVc 2En-?^z^ima%TՑKIQss/u7fCKZ ZTS9=twh4D :d 77h6{W 3$\eolA QzEҭTҪ^!lI S]O}ESxR:Wě[wLhBZ+3VZPk|N0DVe7b*%CH7D֛7`&8 VYj0Z'^| u\=Wt Q_mTaZ7dvL3$d?`.CĖUk+HScU&7MEk6 LxɣϧV{xwRb!@CO3D!?hPƮk,՟W$p'#2{%/Y=u,ڗ޴ 16fĵt6bV5$3oCMc`Іy[pӣ.QsnϢbȫpV#<#:ݷ+r߁ f+&:eEP%aZ( qQ'i+;M:ٻReu>]sP.v\\9oa6Y-x3% qZ"0 z+fV"8>k-."-$I._F ZGQf9>gP?y%hu]ܢح3qX qBYFiU¼6\{88C\ :YLȷ7j )wv_|S{~4eԥp~Oǯ"'Mi+\%gh[)}R@t[B:::SS"U:w$M֪~{}̻MFhu3yx' R[Q'pjoYHUkV͑!L&/VPz.R{Ob(<g"i_j8f|E& bEУ JǑ> ;1#ZE{QG{d:k֝b*( ,yЧphZjZ =.5<;ɀutQqma0rr]BeeIAalǫ\E ;EׄCA>aSyO \㴕ypEkt!J>}Jux [=b5 XS|Qbiˇcw-2C$SZ`\sUO3έ$pT}KKK"m [~p#\&.SDoU.@(+״*[ZH3ʧ~M!/;gO:_sj#o}ߙ9ӬAk%յFSܟV# K\P6›j%|yW6aj{ M25>‹JQQ V 1';IrI?z@Udifwt?d۠kfοk%_s"Ʊ.L @h,uxTU0{~l%aaAhe~Gi-0Yj:2^tC9xÞ64F=٢k}6WmυQ'/Ѷ5ԍ&;\S(@pҽ:ǂsm"h"h[,BcR$Om j}J)|O|MvXLNˋ繜 #$&cGu@> ꛢe[ (xJzLE:X=O fSg)+I¢7Oz cxv"λW3Djz|$`9H6OyfBQaPIc~x~NtS%4ksm=3 ?qjA}m`fְeRR]vdn!*!38a& >]¼&a!cB0q](j`Σ$UP9[̤l‰~ C?Gr}'m^$h,\;&%H0g C(6äUOxx?躺q_*$qf [A$k;V2Q+(ވY[Kl1wq%H4: ur-i+H!S`{{eլC?VԿ*/ѭ!]Ӭ~"8"i:y">`p *QRWUuG4:'ۈ/kGXđ,7ĕŶ͎Jo^g q[ʀle-5zR=x, 8qAR5Ex2T:d> RgMQx+kZ6"Gͧg?o<8{p؃ Q!^)W ? NͮJ ~t{,F@nbOqPӗxubs#ulHw j@&穫O4%?XnJt&µm l]5Pld9O{,Mev5;0&\?2;9Egn9lg3yn(_wGU]״jvQ('OPoi.iuBk'߮l]zO_;I27Q|4G^*6ԞS_/{.ڀRJ7!T{ƸK]R$ \(K$7rϗ}˴iBɾH2,ZYZ9( DĮw۱5~|/t4AyD}UǐFxAMe=g"a[?$GAE,3콧ǟ:w ` FbwPT1%*ڙU_JI$bTfmq<\(Hk8PG{Cq顿d,2)։y%[c¨NE?@dA敟gx0l⺒XQfRDnIŝRZy3劦7Oоix<|߇@J~]s7d㪧:sn/$?侎ײ)U ". ='JW끹>F;J4"Ov:/g义w ^0ypj̛ۺ+fxn`p wz;]T1O+ aϢfU7mX0fm;Q~6y;3Hb,FpbyQ0grȖń({Epp=LPmnvPrzWnͱ?~i2&OhY/w'6Ar4ι* J84Z/sƖCr{@ЦfWJ(uLMt1ukT6Lc0-?khp"rFUK񴖔ԺIK+*YiDG||UU>Ν̞ Q,z7Ǚwi1)r+ҵ6'oiyUOŀySI7I$ Z!u]gpŵ9@)IM?,:FcGZ>ezm(mir=2qqI:9X7H<5u\!]MA\0C9|`9L n.IrRa3 PR͘l\uBSG7#=X݊ F!`B51q0/ j8+K>oؖF\+y % M-S8ZX :6 rOh.̖-UK1DeA ϞP}{8%<#̈ _Xތ;,ыe5jӡC舂۳z M <+GypoY XZ ,[m)g4rW}BnPvB|4-pH*mrM =o{A+qv{Dt!IZ\C ~Ƥ 0`-"ͼ,_qbYB!v \7[Si=ck.2pܳ(:#VA0.U8JC֎(F5zQ l,H'{H ʈt@KaS JAk>SZhcE]R cBJ1ny>1 Τ)pI`Z%-6@HMLt݅uRQ~EVqb sgoNY2byξnbw岷br]TX ]w`^4,8rEs<0ѰxRRtx|IEcgX KJli !=rX]dr:5Q/'#NrPHX#gI)ۧl#<*xvA mk*n=&߳DCSGlz였Y*2ozbkO4|5[Љ6WB%C(B}I%ys.vxңwU3F&ժoiL-̩UΙEoU6冄r@ oo. α䁜ư]2vdSEQt[A3z ˶1UVXydICrD,2Q?koPAx YZ