libssh4-0.9.8-150600.11.3.1<>,h]{xp9|Z k<(4b2Iab',I;d"B̴qZpBBnT12k!fmAD+rIXU#ոtKyiteߘ&\?Xߡ|9͂dgҥ}iZ2d#J-o+L/x.Ma5iԹ>@C?Cd   * .4<T ` l   0Tj(8,9T,: ,>>@>F>G>H?I?X?$Y?D\?t]?^?b@c@dA9eA>fAAlACuAXvApwBxB0yBHzBBBBCClibssh40.9.8150600.11.3.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)h]{xh02-armsrv3SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxaarch64cA큤h]{wh]{wh]{xb;eyb;ed7e2e27d0b02b0f38c5c56d219fe58ce935177531f54076b0d393fcbb77807195b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.3.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(aarch-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@lucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh02-armsrv3 17509569200.9.8-150600.11.3.10.9.8-150600.11.3.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39446/SUSE_SLE-15-SP6_Update/93ae19cb0636a882d664e6e22707e4b8-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=bdc1d298d457dc6e2555635f89f6cd119ea43bb1, strippeddirectoryASCII textPPPPPPPPPPRRRR RRR R R RR RR']CVJ3utf-879de498e49a079c8aabc06e2abc766e75dfec5ddab8259c9a952591db3ec7fad?7zXZ !t/N{>]"k%nd涻L,%:wx?%&N1 Mr b|Woۺktu/;tkKIˈ\dN]**ݰ{mt65[߿liߢ@wIG9?A` @rbKs kι]d %R*W h]R˔)dw'*a;ȁ$=` NGX 5;ˊ+f@ 4mL]${DA4xwDsl8]) M?>v")BJ&p`G AX;nSE,az+!Swjp]|ѦbP&{ǯ@ڲjJĚrͰś^!Aٜ̍Y$ɻ^B ]_&ܨRVaCU"#}᧎8@ ֖k NbY=ynUEIerϾ֟{k߿ΐ!ݛ~u5W!F{8Vሑ buѵ5F(3_-Tzik=v KSS:{&.&'|D\,shb~1I7eYMniv${C8@Q; 90\z :Ub$@+ ՜-h(6s%(ƙP>&e:KU+G?xu{^@ !Wgtv~(y燾'^֯?a+(4! 6+|kvݰop,a{X@Lrk JO} cl|ٵ67q蹋fn(/23q+>*M<6淁S .f0= |OR^!X96yjs8Ͱ3GTaU'=DD\^ -DRž=Ю֫I9ET؀D0GWw,XPC>j2E ‰ol~"]H F&zܺ3.'}ؔ5σ5C\OlaZKaJ}LuQgjL"4΁++~q BQd q'fLyrt~;щg &V(Ea1X.ނ&ن?iSTZ Gb<4aaM.: =۴쟊Ԑ"ȉt*l>b̒(3AqqDtZWyP%vo|8w6 N z 7x}<'J]Uq!%H\GHm5*%MW;]8:>cѝ5CTXx'8&/!!W+((~+#ta0'h.1 y韧/ 6%82n2xa>Pr"X{}S>ZPhmzsFE]3**xR܃Q %2(R*p`dE@*(D zƬqj gn{r.*Ή E"FޟN%pw?Cf20l. @4 3A=o z$.Π®{[B%~dmZڴƆwhk H"Hv0q6Fkeєj>MIӰݠ^%)xG:;wf h o*KyÇ{ :܇,xܖ]gz m~`/)/Qfmlv 򓓻8]|74d+iNK%3>|d% $ip'$ܩ؝(+;Q qjCl2V%L _ 5xL s"\(.DL\G]BCR} /9d[(*da_?`bb `gbk OI1&;W%le%q/q9uM% k;#:4C=r#`2/=p2=JFb^6pқ# +.iώ6}c :zոZ(m >`4]`/LfYxXTKZ ! aXx/ۢ~pڿi8w6MO5e=vb8zAzY̮p}sV!7/ t2 gb|_Ӑ뻚[̒/:9"?ۧRzC+ip$ JCB?z n3 nbHxK]; >'񩉩=I ć$uSkH`:Wt Qץ n?#W7;cö,T|Fwb˛Y(L' j^J@ ̞Q gATS~0_F!Dj}0_uˌqUsrcMƆ&V;itPܸŸ.}lNx*;:C58(a[jHMD"Q2PivWśuNF]`3M=]!"J)^bNݒ($$Uj(iI|t }ex$=Rxntd9hn 5g}x~Kv0W4/><[d4Tt,0,;=)6p ݪmH78 Ix`7.d/?&mwzR.;CAM8IGzKO,k1}xBr=\-~w@f)AΈg9 EtLtL28^\X.U=c-ăU5CT(\U%g#Zɕ$8C \_ Kq+9R=:ޠE"ʔȁeɧU]oQQRK?EqIae*[լwe"ÎF}i^->zSUcipVs`Y[$ke]L2j>>M"33.0/CiLX}H>P @ ݶDgv|Qb C-Om.dt]KǑ"mjJf?D.JDnN!܍7|2C.ךb|ђh(5,iLfQSF`BP'ɓX}AD 9H5  vo 4/4I01Mآ"c~{s(XND'[9^9IhG@kIeeCvh 0:i1=d`dVC*-^+-_Ott1޾c@UЦ cEr򒗝Z_8De5ݪ2cʂXPӄsa"}\}R{vx<郋gJ)( QzA*շlB5rd'd0 Ar; YJ3yuDȭcyDtn>%9vh!;Ŭ3g"(@uR}pœ/U"ׂ+b'c1IIVa $8%r gyDBf:-w|a,P Ց1eNxi"aPȓNF^.v :߂]gXc&T(u兄GjtP?x-HL;H?x8:nVp`%pݴ=;G *=7!RzB\$ MjB?_B_yMs b Qfs2v$UA`m \96o9mJ,'m |.uY=u\MK6=;4a@G>{W QW,k7`:9soIݱ"t,ob0@"e~VĀsɬgf6l ؖ%o?yGf_ @ oq[=Quitr.oKDa"K&/ MϬ`(<;\e W SrO(0ڠlo81䊣4k{OBca=y7~},z]tVͼK~U:0ruCF ==鈛d bǽSI{e8 %Q ޹El ЫI5܎;~R;} pݴ]ZN6Ve$8DKئcx߿0}9jFqskYat.2pPJHʄgVOO#A(֌=n_-UQL iy. .HΪt2)PI\1nnwD7<]+7 bam:w;(T +;pWb{^Œ45f1v: +#*ZB^pqWE 6_ѻbG').Uh!=UF]ZYzN+#|T/" ;'`x&ΐ7wf?pL$B*E&C g$PftZz1I<ɓV1J)4ջg9Go86 gKhju*eDBRkL/Q'U ْ=e̿WԴ%plx@ؾŎ򂣫J3ajt--Z?GD\g=:g4ݭzښ+LFOev=Ȑ~1óq:C 4FrRN0 PKg Zf'^ jd۷4WJ%2Hbe4;Ϸ^)RQxyfdyuNI|@ +5]8=tk)7e4I@$s'ϡǘ7J\~7ψќe||F:]inc+*ض$kW\"ݨJ9T%.g@_Zr] jo?u;_4ǡ8Ykv}$vg + X] f;5DDӒtj$O{&l@okD74VSlTgr;\p7=FU\5p5r_:"^sFYP,KӳPVh&(/Ggo%{ngĸ vb7fUIhv m>x-6Wi^1?u]]XdqN]^GĻg,Z -~s؇Y. |<);L4!o8JHGŘsVZpg2s& _m e/_Q=;#K-UB3U נ ^<۵)G~+4Ÿ1ޥHFj0*yyǴ2Gvy5n$mEP2.՞fH-E D5dtkHuHL~ż/3p-C^ލmґe )a&XW޿@:;ݒ:K%rDiF%(|VR~DVضJ̿F5LWk*JcR%^8\u}GkCIʨňA p/ 6CS.Bna(S%M ԃjHkz/oR\|e!Yc!nq4h&oVcvk_{ Kmq—I gyK!G fJ\醸0jPʧ\Xڽ*0P$vbG8|(-\pU\ A#UW|ާRX9 QPTULSt:kl\DƑPA,?8ψǧo.>?SDCl'ԞE]^8GL#y D^wcn\VPՋq Xwk4Lg;Jܜ@66N[>㗡Hڱ!O`qFo\][^|SHrDrv?L.{cL9+3t3h"E0a0fAhmEЏ ۊb^eL5w&cP5(w8;˽@T]B 5St[$oJ:3qěVO-|!v9]0W@z޼@`%/ Ѵn9v͔9T2Xϼ7[VG̶{4Þ_Hcp-IEvUv5{G oX/9ӯT{Ug{qm<ծ3̺oI7L/sHr7غm-=c:<KOKvXIJ.hR[U-JyjwgJkJXjTQ"3EqDe/.*-w`,7Дr\ IeѫIH¬ٰq]cꮹtp'Υ~N&W}G'] >AJ܇Yš`"zrd3l Ҭy].+ 9=L@!'^x<$x=nƢX;Eo)lB"/KSRCx/H]jBUa4ĥ>Cv3V:27μ_rgGD zgwOZZEieڙ3Wt{DQp/%\!F] /$fs}.)xf}:c DLh'[BKa JچT%3"8|q>Pւ;1O[ ?k0 9;-@DE!*%kB[蟤QZjZ` njDň$[1 Qi;K;KN0 qIm}VãoD,4@ 6 mp 0l1@H)Np; ?}bI, WjkBgb,5VQW}9:>OsCYeJ|cw;z8$p.H76Aۭm]܂Mb5ֶ-utC#1hsjl| yѦ˄f4YY`au ]?^>OT|FfWyz "fpDEWaٓ̍k!G+u(龐wHw$!ϳ{tkΡҹÏef$X*0u_~`)!6Y3޻k#,?.YSqܳC_K̈́_gx u]Qmr~@ޣ7 JIԟ;o`+ ]s6k/e_^o6խG9Mcهv7s2^ꜰ ̯#o=]\c3bx3A]18ȿQ `J` "9RUkL&'m=8B:vBxT0 ;HlGI40Pi-!^i?bhե$Eu Nϫz_:@!D-E{mm99Qݔam/H?K ) \3uX- %"/aBCSPY߷J# %p^d |?R|`^vZ9 7XΑ⃐* PcIkVoA$wu$<((F<+ H*[}֯UC-<+`C^&O7d.53R%M[W`6|G~)s_q$_%^LhKRnV=gI'$.nR %c`e]^oc$!֗zrS[Yݒb `(+E1P̋$m(-ܒSyht)U3w$<%/2ωf%aO4>X-9"$ k&ޤ/S Ώi1 {SOaq]i!b`GamWO`0XRV*N ]0mlؾq&&`xe V qD "kL>*m" `δ>AoS/qbH ^Ռ&kz5E0|rLՆzv1͚\sގe!#|5Ǎ!X'?Mif|VyZ`cm8梢zpLLcE*Ѽ?P9B&b8Dİy.n56 4C.%%8|ήG杣4|Xo˜];)ΖVzw*%&~u1R].{sUKޜ1BG5\u#g4m=Iq0Bòu $=۶XnmHqM[,W\Jpܠo7pR1TI⟪+{{js_r@]]HzV_KB$0Cݻ3_*ٰd+Azb?"F >L! 9Af,@}P p5?Z-}1w81R?tdgiN*qʳ08šU΅=Cׄ/짂DSg]!}0=*趔Ԕ>iX)N2U\KG gf=y,;ob'lq"׌8I^t":9 d]i" NbU­_v4W4,u.Yhbr'mL*.zVQ!`Q} z B%J0n08=H<@@3V[|8[2HZQ^SZ0.7IyW(V'j u_?:*o٘QiI ^ZNAa(OLGUU!h(ޚ9 c\@j%lq{[p E (pϡߓ:ؒTk>8-N- A]!wwU5$:O@ ]!{(hDkVr")]6oN̞om\(5}3!ӧE)] fH(.j G.J[Үj9oH8sC@SCR`}u^2u*Un>9s}II1Pnܳ߼#a0zG9#C_!&yc Weň/L2} 0 uPZT-acJ=VI a!M_auR5kZZUzȃbxE[t啘;JWa'3oZe`ÇY>H}iakeXrAa8S[6 ONv&OpH/![?߶q>TáM^ ~gK@\V'Љ R,!nB.R5;@*ox#szmQPS($%U? 42W9Z\n]{i2W8ˍm H kT<atGIÔ!0`=#}Ң?n" $,xx-fnrC=kJj9 g,({ CwO/:PLh nLC :/BU|G$@m-} 㿭P\e4 9v?;ׄ{01LcSb?~,{3sfiv(-M6~ؿSqQx*Wl!5?eN#@~{'&!uNϿ3񞃉,~f48o.VytR ҆n=@gq1+7p:. ⚏BS67o~P wqi|[v[d~.TWqS!qQ [w[$2"ƗKLE*%_,F>_.<Z̍ ɮ'1ӋH #rUsf<:tWo5Ntǹt4Kx11>t,YB@$I 0i}KSmw4) #YŃ{|k…q:[~Nj38}1ސUvIBԯtJs)es|^:VM-[=+l/mU = 'y;\IDt(1hSp$APBp$E#f/Rk+e@F08C]<5PToj^uXpWM( J6U>Uڣ+MDCE$j;sb[w`(BB3ΉBϯ3fN/mȢx'n97ɃnÖښV@[cb:x==|$}h9yb! f(M`+T_\W TC帻muduM.cYqUEml"ie6@`9!{; RPp8';:+L$n‚[mֿj{