libssh4-0.9.8-150600.11.3.1<>, h]{p9|JtrUswU2`WT 8Fus'i].hܛ_V8nփ1rbi5xޔ} 3 | @C?Cd   *  28@X d p   4XV(8,9@,: ,>>@>F>G>H>I? X?Y?4\?d]?|^?b?c@dA)eA.fA1lA3uAHvA`wBxB4yBLzBBBBCClibssh40.9.8150600.11.3.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)h]{ibs-power9-22 LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxppc64le 8cA큤h]{h]{h]{b;eyb;cb975a148fdbf2520625dad7a8e2d837200d25894741a6e7a3e9a3665708a84995b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.3.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(ppc-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.2()(64bit)ld64.so.2(GLIBC_2.22)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@lucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigibs-power9-22 17509569360.9.8-150600.11.3.10.9.8-150600.11.3.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39446/SUSE_SLE-15-SP6_Update/93ae19cb0636a882d664e6e22707e4b8-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=3b4d23c0ae33cfca333d7929d3dddb0ba6e20f73, strippeddirectoryASCII textPPPPPPPPPPRRRR RRR R R RR RR;rݛؤ6{P@YcEo}'3E Em'7eG8_F}3&dS[ Lg '?ɌISW3Q~qd,U$q|xfϔs D4 A%qhͧ5&пyO7C獭Pll'6Q606#7߱Gib54j\#(@$F_`gj(%NZkܺ_"'={eo!nYvvs/r#N ;^̠h J? נnw$ݤ5x8ûR'\k3IA([+lŵ3h6/c@9[B/&_HNFMB["|3:yXcjo|k {=  8"Ex78\HQےƻJtt(~GwҠ)dpk`2'2owfř2ɰEۇ1t kv i0r;,w.:քVE%+;-*qYך-q*`W򪞤 -1?ÌptbGF^| +D}Ժ[f.>SZ=C[۽tW$i7C~ 2yD6Ѯ]*p3O?׼$r<)O>֖@[/;Un Y^AEV 4MzMWGXdr[+Ud4 J{LG;c~Ihy+쩗/{>X7*" JP$4N%" %1_FS-рl ъhp<+*T~>2Ԧk򤍒^c7(9"X_Hqz8frA#ͬ@|l'ū2hP- 'd +;e,NTi8IF³.w$>4r 7ma wkQ)ߊiYgc)=S/I ;ׇ-F/甪(A>v_?Pz w$Xdj+Ԏ; ʜhwKXXqg8 vcA7 UlH:lv& HzO\N(BeNTѻ@=< bDA5 V=W0gޑDYGt Un}cCvHelck>/w9Aj,Pp61Q&&^Suk'8sDa`QSv"AYDV,9#ժzQw!>T( W-Jū 3:`&OQX9?71o9y{ᜂƃ]|. \mwBߓw05Mj'k&0g,, (' 3Ĉ])Xq2<X wS7#AoF/(z4 t kRRы Ћl\ p83(Gs 3 zxg V{1ӳ6п7Ud8qnc"+]t-cRCֻb-kYjio\f^o;_;Rz^E5@;8غF@+W ܋?ö Oq4E9 XoHH|6ԫEFmeg:C'gɎ4K_B7;} }t|,;Ӻ0c(ϭb  XP @h! ug8e K+^,X?bu]Fm5'ʾpCaM2R8&ºj]ȳ\x ,[M h81}U7v-2ԷIEha"e "v3ëp$]i6d[+^&ΦAyS wslg pN߶#?va5߷"v[>׍Q+ZbZ,Mskpq@(:=U7gM@hK*Pb_T-|S˿tc~5|.i8"_¤b%fggʹ睥2+ثjZa*{k䅧a]u>KSFp`t^Q>w[LvZݏ2Jp+Ю m@!诪mZ}Vj5l>|?AhlU޲G(M7zI c6gkpaa5fK@le:GMb"nb[ kҦ0tx8EE쇥6L:QY!3ΜV @,L3|gߙqg{ EGBC~Y@ Ԥ}KJwgb,PsN1dVOrq#+qBRk~F9"%IǞ&?:IJ,"dQT&K1>3\-ĜiN1+x0 #h gY| ?RkYcL~J 9,M{cm rc*ϿSQ>B2A-:asYYVEͧ& wHҴ gXi ]W;ăX'EeOXx] 8LTO[T3nRb OlH\îf ק JwH$ѳ9nhIv|,BpՙnѾْV FoA&Jtތ^2q[)TVmKk0+# HRnSՉl=g)KOBtg-k_Rw>.D!3Nb"s 667_gϑ:YWj#;|,SKᄄ'Ȅٙ9,FW-OU? a}@28txjHڷ < l.d.r5xq׋m{ oJüU̵o^WBF0+6 `%/ϔ9v)QP3;brț^n_f=7iMp|+ zs{X:)? #HHIe;+ParrlWu :>ord#D2yNZdr٘8E|\$p&8e Vfk4 ^M]=zzQ8i@\bs1IlM  QԥK@(eqp}J\Jex|UX\jyz=KBbp:yձin}7. K8wgT>7怭0%uى|4 T@>FbOU<K233t|􂶺u2X_]9@PMJхJ1b|Dtҗ#̏;l~l, x^B42Bǡt3W@7OL6QS ϮyFXu 01~2q򼙆KzEK;èC*gz# H#Re:|FYC۾=D*PStlvpXPpBoh:92^;SHs Hm5 <1}; t b`BjV% ު{LhvU{c{  .|%CǍs+mNwAU\c{/ׁ>J|G8EhQF>[M D7MzndT}nPxX>ASb&G^ #ZU4BwqT+Q-K^3<'y{3K;X;HAe1WL뱻b^BR sCIg;YaL'w8E0n#y]F,F :w/u+$/=葉?,፣9\T Fʝ91v,-+rm,j78~`##!לRlgjXGI+Dx3zxW3rPKEV7_[ssyl2݉LE8p9Dot*+X2 J+o7Ћ_/=ƪ&x!e~}`R|r5 8١5+ް?yR} QP]8nz XXemwot2^mQwrCzRC* L =7>!v{s[@z\$ `jē886{ڮ@8n_uU׉a[5dlTP@P0futǬfJ˜,n49',gusiӓFexJ̈Fֆ 3R,8v.vVo4r_) ʅRh"bE4W'hA}~$%![0z/- D @I8(%/N{j5Ly;C_i?Aʍ_ Iw_ĀR=%9|tꑄYE e@TΤMAhHBVEW(cU'ԉc7sfʹK8Ϝ`Q`G nHG& 1<:(3LʐW TCu1(Sg{71>cݪ B7'MO+n]poVN&d-\,{Q iYl+~gLj 0%(`<ؙu溈QǞ5W=^1&enC%1*i/?I8 *+tLFb.`}R z8wEy Oޅ>3 FӃ,^W|TxeR{i;34gE;9EW߆z<߿dp+)lvA.rOؒiZXQL-Z cuJUwӮƿ|p.CľO |8M\{IEJsa"ÆEF(9rO-;ެl*9("맿rplL,|$Gy$AmBZFY@eLCQAVT*&Z|be<e ɒP6$#WCK寺5K) z`ZUҎ#WM׳aY2 &ʰ bpcÜhl:0RKC4b92ڠ|\hw]+)?u\u`K.yn ?3㐹n"n gj-ė١/X?T1HX,x{)ljaՎnU!yh-xY#okzx> GYMJ!>z@ tƏDWPo(AMQS67 ƁU؉u')Tr&N eKP%eipjd:p"?2wI3:e/-hݣp1# #+BB;B3w~bq~>FwDoB<3Bou-)vɶQ<ׅ>Ώ9'XzH#]F]dy@@3\L/e%+W"Oǂ!)h g~x@o{ ީ+6L)Ku9(GC^ۡOq4~;-]㦑_4'Msa۲c!I_TۈBJw$a .q֛Q$d%)pvq2pL=羆QwHp ,Yt0@ dQUz+2Dv3zDB ǎ9EصsaI;AH*ʰ+ PJ絑ѥ[ܴ H武g ,45tCc/Nك;cּ3z:m f!Ի>Qlh=fH>G`NBv]j3K&Aq4 g[e _neOPŦP_m "1iOS\([< &h n_S͇dzA"V/)UwmVjMoRL&Q#OwPylyms˨TCr@!4ֶ):a~HF GLN.v"D99 V]W*-.E>7>Z;'YpU2rh2䤛H3/9˩$ačh!Zʦ^@Y#]g플X['@ZBnP<0kObZfjwU|5 q1r{ dz1v"Tk;-8FeP` 9L\t*|^m3z֕^o['fZ^N[4 ZS} Z^1v߮p'`6ea]lq':2 ۯ?&lՑ<$2i@n= 12#-A,.oӜRHT3瞤vÆ1Zɗ{Z&ᚱ9l^^aX(zI9ŭ&D~_ e3o%XN yf[,vΞ(V>@ +5zoTMd!qZprX;rd6CTaa?d@8^v5r~&LL'H P˻f=|9R ]^JAa4x@]b'De1qH)U~7AAKh4ؠ!>d" ԅL5 !';TWc;䜑#"]Rh} ct*--~svT>ǟU*fO4 36vI"B=s9j< 9, *gm#+oxkӾN ,e]uS=xX-c"2`J4U9óWL0&.-~'0p.&m=c1&.SveEȱډ(dfY3mwCOE]CUFEmBLR"دDQ|8<`HLp KFOf3y0`Gה00wޡmm뵄s; ٝT¶ӟ3] Zw5TB/Lvz_tܻ^'V"K%LN: @Ief.&x?Ihǿ/BZnNcJbPm@ݓ\Ϋ%}m-Sr| hkbl|C W?H (g/k .O U'_}y{!߅C[?H`Vm\s0y>~IbOv)s2bkeߵZڌkBRݕ-$dG(>T,K6+!ComE@JѩՎ&~~6 |FσES1ʴ& }1 p+RנjNO#JcƓ+󡐌dNQQjvkƏ2x,KەJ V Il-5*$N`wX="pmE9\X3XP"*?WVg4҉ޟPH[0D(֢ApV/I)v%mz?` T=kTڏgc29rKDb۲-M5%xu y |:D;"W}e&P:l@9,QMhXVH]]QK}a!~h~4K\c_,^敹~%{x t|/,%@X]+$%tоr,{l!yO)ޑc"6l5c%DJcMjSdwݒ**PR`u*f >vֻ`6ܼ` <D@" ,rNe\04[&46'de, &zUEU&̐>2?0pΏZŏhG-BA|ͧ8uF4`bX[83ELd#q,>auT3$z[K Bv zRHq^MY:}.5HS%FYω@ݎ/E!p~^[6Ew8`|c-ܳ+][Z# GB@A_;Iʄ\u2X:u)̪1e`-D9'iDPAeiڽrmD ?uSk\@|Zjp=3g0< `WOq+WI5X6%hSOm} &`,@Śt E_ h+(B+⌦ֵt5@-^8z+dkHؼؘQ H8?85_}WBb)cs.Wy KP͸KevCժAxsq=2ؠ.t:3rJ]*]4s AՖyLl{zA3ͭf(%MTύ gͰI=yy+0-Lifa}kmꍭ:9fS!$^r߰.[QUQږRb٤}BB"Vt BK>AD?=7}ӅsJ¢cuWX%Cn< $\ݫ*5XfaL]vk~˛=Lc1ڙr eO67/oo HO|Cɕ(B`6-[dw2͘q"`&g$b9WXՙ mkfG]dcψ7M%+"1KG6?"J/Tv aTw30ǑΟwY ΕOmO7Nh JkJwl&/\ˍ0&Ĝys)Wu0s~]ge\`%Hw?m3XQy+Y"k7Џ"ˎM#h)uSн]!1~/Ѹ`͟_9(k[jP0lnWMu$yNLQհmYQ72%HNؔ٬6+B#uAcG06duIśa>O-u o0YNZ,iǦ>$w#3;xSvDeb1q xE ֛{Mq !K'W>􅌩%cv\lJÑd Wf*JmC^$-_g3`s[1|#$$pb檸U;DQIBQbNiĜMTY|XTe AދюVL~lqT31bnog8cL%1ٟS걺L4jcT*ù],㫂#DDlC:, BU^,,xunk%zVд $XfS1CbRz` a[iM$#M=ϯ;m ~$i2|+مĞO1)~0q4Ё K4i5-W^ ?#!뱸CPcE3hŠcTcyL^OdqpjA7oMuMR"yXdpHeOҒXgc<߂7oL,"-'ӭMS ˍg4xtpk(pY 2dyHgTVuSr<x2@,Տ ^'B{! ›Oz5,Bz\XdnD2&O/8cB$5W1JJ_۵?5'*վ_wt!>j~GbZ7_cHBV >au~JTxJ(4@}eCҡW3 bFzZ{LaUυ2 *4DfGz`.?{lzh8@~>lz5'J$K;u@RK]I:04ݧqTDvF"R_In5K2)dbndu&Es>U)XFi"=1im. -K5͑&ޯϜ3\zTwsQYZ ԶWw$:S6q(x%1$:7Tkrd[E6< lac҉wpF-6 (+& b YZ