libssh4-0.9.8-150600.11.3.1<>,h]{p9|8"V*NcwMo&9k)mL*zU#=}+Ew)ڻ#HmhI PG .nf p- gkKHhB pH9 ?R\a>q wkeeDÂ89Mq &тN'24CI'8%+8a&ű(Da/Gx5po Qwh)rk1p=ñʵg0 >@C?Cd   * .4<T ` l   0h(*84,9,: ),>?F@?UF?dG?xH?I?X?Y?\@]@^@Ub@cADdAeAfAlAuAvAwBxByBzC@CPCTCZCClibssh40.9.8150600.11.3.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)h]{s390zl32SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxs390xLcA큤h]{h]{h]{b;eyb;9676272cd88c64965e252fc1ca228d538eb56009e301e41057c41262d8f030ff95b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.3.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(s390-64)@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.1()(64bit)ld64.so.1(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@lucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigs390zl32 17509570090.9.8-150600.11.3.10.9.8-150600.11.3.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39446/SUSE_SLE-15-SP6_Update/93ae19cb0636a882d664e6e22707e4b8-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5s390x-suse-linuxELF 64-bit MSB shared object, IBM S/390, version 1 (SYSV), dynamically linked, BuildID[sha1]=2724b3851c619c5119471ba3413c21b9d81f81e4, strippeddirectoryASCII textPPPPPPPPPPRRR RR RR R RR RRRRRRRR MDGF`^0yutf-8ae06a2821e9d8788297208b4a419e831795ac020f70efd12e9af89cb71a82ed8?7zXZ !t/Q@]"k%nd涻L,%:wx :Og<2[c}ӄ07r, ]ށyrf0 G!J2Y+邿xgTY zu 3 3 afU( L񈞲 i--KQ΀Hs3r~VhToai T3c;#|Zf}I`uIz4^gu\ &"+%xϭ/Cp cƱd*BC)ӁHRa#u{t̢+E<˙'brDG;]冷nlG3aRƁ2DjT_/O;j[u;*Kt!rRׯ׻MJt$${jME"&' U)]ZSŴG 6@-e:m:FWYҒ  0Q4o2:_쳛eZ\i_g;LMQFIC%EKڥmu&b|!C_۶n2e֦#ػ4gU6 @'8)GV-4>FPzK'd*}0S~k#U>FfPVإ8BBH։ [),.MA,ͤ9 M&!>Q?-S-T"ri Y]W\0<-[ڝúngKz6R/b.iN|= _^jc&b~Bxʄ2r@O q;@s[٩*Y+>ᴇ\کVslԍ52jl7Vܸ{YIKM H0ʥd,Yō:DS)ܲs%ʓv.7k d2{`י'O6H}RA5d5:-: nW됃<(ͣΉHŴs!]iLu!$4:, 8|k94-TE2huO8{((9yC#MyKnGb"B]d kc )@0!]+A~驖tUA-,{j;mե!v:Z,FFҕqHٛkEyU bJ,C]aKgTlRee7ΖIU0r9i1h+LmXEO]8i[iVyAb maaIN5KyV@C8 gqqTF~%k\"1{gSiو @OɁn$+) rˌ fiNOL|nn{OlA~m 4I1*@eܼu@?v;8M :f1C wx4/8Q7K[=ebpdNPʗ9>hԤuOQy₝ɓ(FǬa @xfL`NqsuÏB7QRXHN<Tj{jcp[Q_"x޷Ap02Vx.D6aȑzC[QD&Ys:ٹ.fyj8 9bL(ɣr~#ŭ n`zGcDiDnHګ;X/ƧmAhפj#B,> Sy։&=M '3ߪ$[#Af_M/6Gv`%3R&ͫ/* HKȢw#J>wB?*\x%7XY,{װ1%WYPi 5oL=Öm٣!ҾhV=qxo聾Dׅ|c^Ba =TAjAb.vabg~jP ݛIІ6*aDƜn\{]t hČqWqKwʁC'ƴ ..3T2 -0͞X5gOH,dCHT" F4=!C,yċ}Ȯ,7Bԛ/|}[(:ol@QyN4|$\ Eˆ [J""Tnolq 1fu7r,W? \%#Yΐ;m@!U]-}ӠD-cT;+.dҹ~Ե|PLߒPw=D2ߊ}rXbAjop5NSqW2PS]yUD͍*k 5-YMN}_pp'jjo-ďϞ 淛ACdzwo?!Bp8ԔYk!r<' sM}i(Әz7Ygr[k1](ݎ~=Jȁ'Ʋ*ٱN'nݳa6) o':Vq{MMtlZ[)px/+BIx{85f<~}7SNFY?{ʯ'7 HMILj*-,mI{]WOt*evp#cDP@f@WO;pNHK88rpm/޲bsX q96v)@\M2`CAS u4d|FcLד[P1Sn"T{*ASɤvW)3('YhV}4_b&i DݛXpiVxc$ǫ`Mh8w/`lk +^?x7GRx];-zW+҄ zk1+f5lK^wW°Ŷa@{~3񎝸|oF/L/V+UX_!.58)D쮸{d؏vK9yċV6ǿދUӹ$@ etC'_+{08qٰdOkX"z96ih?dgL\.瀪捐nIx_3>Z>H_q}TJlE-NB+I"}`ϰ:5+.sj?5^q@XUAہnĞ opV< ӳtBAf 3wv+zfLʹ]v?I9^HzS)p+%DVn?fHtZ sR .O#w{*qm"SE)b΂K2=*W!"!i*i㡀PL _Ykg7}]j(&_Q'|קx Hz$y KxTh-7L'23N++INmXmxaP_ά~ IzUDya~s 9z͹{tZhmΝK7)!,8wh 갉ٵ2?v "szX`$>lα^%Qo!gJ1@d_XwΌ@R' l?I`tШW\M 6'-Ėrls`0"^w8ҕlȣٞʓ(=. /j};_C|?Ћva 5xśoD 79RN3̀./@C>nZ/|-FC٬{"/9{=L ,xa1wHL#S= FR3XvQl? zkc?Aٗm!"MhF{ЗTooِ{D59ŇLNy:D}(bҟИ۷縖42 L!.-` y/Skƃ ^36,m M~"1VLJW0*r5Hm[n`,>0Vڂu{I]3)f1u/(D?Wlf i|J`,P~*8P6˒ld~3mGS +v}%R|^ cT[umR?U)̊@XD aK7QD_%]Tbj^̨k dvS[X1P;H*M)ӗ F7UR%~1&ȟQIvSC?~_H3ON#λ+FHR5' At^ҏ/;Bt{ʑ,oj={P%fP"WntE^&28(뻟 r!օHX6pu2 pב̕btD;ZZ?!/;^iI/+ڪb.j@p/?b_/Դ-:Ib/ yW.>3\G&CHr+ BV-򺕛:|&U\ *sB|禿Z H`4i"PF&u=*gT}Mhwl VDM|-<.,Lj/KF$SnW]cOBfJqchi0b/25Uivev[?n%]+.\ပ\BB{plŜHGraH!Hr!OyyNK9T2d =\m% UU f{**EY9\dzWk8|[ հu*9NM?sW@RIKêom*^y9RBy7N|K8 h%a{Qzlq#- A/.jS,Oej'X$p*dHw̆nmԨeu ^TK qI_ԑ N>qel)=CMcڡ/,B+4*{-(&1 bYA5Z~>]%l/} \ X(+X+d++/_y (J_B˥69KW IMz7' Ыs=?D}XyWin-"wR@ⅺ)3ؑ=ߧdi(u$Y<+lqԠVՐ[}Jv4+eM0E-hx`-;uMMKAIsOe= rsD#+Ð^{A\Rpljr]߈.FmEtNy|:ʎO5OjNu NJۤƭ.sKQD v7 z%:-þ7R>WgBI(WJN}mؖG5Y;Ku1X_+N,rx{Y%مEjOX6f6`.Umsdߟl n\gvp`6}9n讑O MM35o?H1aѥ.%)ďWa'J0 ůeDj8sO#:va6m<7,d:0CԬCMDs+ڐkϴ5xb8` BJbP</Ida-֘Y F~c ODNh\?2< @Uù~`"ՖNfMy*_~D\ VsNsW hyTfr8,jعh99a4^iKv]WF)aZ V=2 hV}#0!@{:OD &OPgޔ * ڝraR("s&h`{H=Df'F+' p~?ϋmoiaÁf6QҝUmm! q:al4Φէ+CtteY69 tGv/4xlH)xnBZa*ǽyhM̳ю`'S`n*fuΨAooDJwԙ`cphNv&7.n"!H#<w{ C/W+[ l *7" R.Y!m^[^g_?IMrXЮJg _ hqKoCsJ.L8۩.;#7@*x z`YTe<޳*XhO&np  9 uXkcdyműϨM _@_~7nx=%a[4ڳ%.zO靿R+ux2E BJD-Rt t!zр3C'`[CxШ8UBYn_CEJ(nT\MX]mv G~uD9=IcvEv~95"`Jn034EIo)Vfkr?7E[7Aɰ&tʡOXjX0{ |:Wrn66yBL9/]rn; ڝ|^/*˅WNC<(<Nx+4{%H$6aeRÈ]6O9~jY(xWg4rf|~.#r 2f@4L*Q!T,śX&)+eGVIÙ im|iƌG>+Fg[jG_6^A1Ǧ>Zp1Uvj"U sr ?iš4}8td D#7q'Nc24Ά!S))5{{EŖRx/1=S $eh! Yla|٣xyI/bSvǓ:}o˻mujNZ)ٶH#vn/}7 qΎLO`L-rփ ƜȗU`?]%w:*6 &_WtOC!6a;:t F=J@XlbއA}dy7eYv)-L9k^낙JX{rdZJGӷцfA#)rDt$ǐX<}#䖪9b%.ElA71pl%>X6ƚ]$AK 1DءJ{f!3 yE,`HdPw\uqxI7rÎ3]Y9E(a0]KK@yjL:ǑǨY2<߻ qw,i 1݆Ƅ7BS\~8Zolس<ؾQ|V;ﱱtX0GRgg|~C~;F:kfNv;j48wKKho} O9q^v7V7[B@/^zg roMϿ#Bb&X?/Ռ/s@fLr[>12.?Y_2>h=+Gȟu,Jy& 3Lg\`ӌOs  \E̪wEVxS Ӳ[VTHe(M`Ef?vuR[Z Xl B7n3FZ1 ^s wDYD:d[kyrbD-;j9qjӓ=Wqqe' JYċڈf#Q{~ WScavGTa~kFU4匱ې9te׽8](M:/!w08Ji0)3]R3'~J}ߐ}>yXLe$g,4"bVHzG4ObxIr26Z0w+{5;? sSQw}W✻{VoOUs&y^a2`%N_k9a锲 n ՞RxF^b]KwbR3 |am2BҠGMg?\j:"Hܷ7t:,z_ E +^^X؄km1ݼ< 8&.Z!~S_rsLT1(  Cp.#О–W[t4<8br,nN`1(}v!4c`s?MhZy[*G͸c@[o?/ziOJg/~ ؖ CN?)9-Ce V(̫ieϚ(W e>Gݬ%(bYp)Ip~ڥn&I=rH3BћOTD粀/ *t?+M\޳]j!XwZ FܱT]aZ0"KNxv`!k ݗ=2s~8R5:cZ?'h`bac:ēOy`QA5d ;%?b,~S}(pBXy׌'r8SJ8 ᐍMyO"oɡwH^rrN׫$VqHJ&aMtx4bi֩`X.D'JqSӓ#]x~jtΟl%.z< R,F+ƇZJݗ/ңL;?f .7|ez*)jj.AaGn0|^[W< =);'y/ts"@?nZ Gvxӥy(V3"s0 p1UdBX9s,c[5%[7 *D%?8[F<;ͣEnJBzzv~{ê.yuݿ顩g~cA{]+${)`sG2,#T̫="x$ G-9-2S~|DTwҪXD6tw'ȧF S9r_XUGpmXib̋ 3ͼB)kRϐknK̴<S)4_ pX&Tsj9aaofʡ(|BR8V2AlW[҉fR]hUJM&=nxDG\giL&d~b %RV2~mO,!T' 4wZ-%hP ޭaE/B.?bRwzI>$5׼sMM]#@7b\;[220Y5v0i W|(v~DHqqg<\ID蓋oZ {guMo« DϹwz/-exH+|U1&]}3Q%Lwuplo+99j&T$CĔ=C0z\ gԚE,\~Դt(bZhǂ0Z7Lttn[+9ZCFyO{fbTEkGZӅ82úccNDd@~e,_ q1*<=v 5{*c %gmsE7_fO#U<-&%Qzi^䃩K<_`\ݝ'1NDNOZ h:itaȘ]_` [KĖWKQT~&WS8-8 Ѻ5ݚr\='x08$1 + ^%:5K6?mU &rRBT*#':t ^Od+Q'zk ^r :h9*`.TEUQcZAq}ωq>7}9_dYC\tĝ@8^&qLlRJN#2e<@Qi3)ѤRI8hLcsq5JrB m B砩 -{#|ۍ~r;5$aD` P5巽0j9N"==\R _6VLH'n8m5'&P'FEw.Z'׃?b^i{#lV^7b->Ȋn[>1ﴎ{Ix A 삔`\?P`퓐~3Jhي i)T?Q}\Vޛb#oqN`aiWe7ǃ~ܫDgN u!,1%SV>ip7ZБ:ɘ#OZvdCY \Ί,LWDiiD$M1g@WA]`vjT68 r0{DȻX3#HSFtc(㭉rƤX0[ C/gՔE @3>7Ȥs I}& IՆGY'