libssh4-0.9.8-150600.11.3.1<>,؉h]{hp9|YM#Ǖjye6_@lءߏy3fpr|zWd,7OCiA( &Ηk`Jb>eux[^K՘8w?}​#8%fV؟ؠ䘮U暺["^okoz"FGh~q st@C?Cd   * .4<T ` l   0l-(d8l,9 ,: a,>?~@?F?G?H?I?X?Y@\@8]@P^@b@cA|dAeBfBlBuBvB4wBxByCzC|CCCCClibssh40.9.8150600.11.3.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)h]{hh01-ch3aHSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64cA큤h]{gh]{gh]{hb;eyb;62a15e581f5faeda3dd0d85f972b582fc39737eb6b01faa560baa7df372eee1a95b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.3.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(x86-64)@@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-x86-64.so.2()(64bit)ld-linux-x86-64.so.2(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@lucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh01-ch3a 17509569040.9.8-150600.11.3.10.9.8-150600.11.3.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:39446/SUSE_SLE-15-SP6_Update/93ae19cb0636a882d664e6e22707e4b8-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4058c0adfc0fd867abc023bc937a3ffa2d14423e, strippeddirectoryASCII textPPPPPPPPPPRRRR RR RRR R R RRRRRRRRZz왦~Jr?y'; # HaXK^ޕ 4uK.J&o)Z ?:N̜sA<,RB73$aio4-xqE&P@}D,7?`}QhZF[{yܾ@5McvgR*oGjN$+  #jT(\{ &dՒwk^$ރedp$).5O~!nNahU9.nC0*Z/Ļ^+MNkf Ӑxd {{Z1ifZeb@znX:A]}M1F>ӣ!u7H陈7-BwF,Ch\Dی.u@P=o\1Il!IA>{f{b'o!,R /G߃qIKe R{0N/xkqmFyAY\b#iu+8=#_#ݴΓRSWw4[j |ɘ$aNĨ fⱦݔ\^jXO ,YͤA' RĴ3"EF#/ρ2'UWJ`9á5eJ_ J@żC;DuO mx-$j%~)'?xc$UM$np}_۾-ߣSJtj]nF?fjQrOL@Jė7M̈\nڣV>q)1vWNzW?Z-xg*Fle ^1WذTㅓOjW.ja^қ#\:$Է22z'%]IxGsSͽmȈwq9z2WQ;@T3 _z aOL1r l/uiBR|<|q򘪥eŋ\Ԣ{]yG_@m"߸L9yaѶ$vfW;=00j2 tyɭCJѣ;vEFZReGsQJ=wjC#ua_rSFzɅh|D얕 #n?׍Rs>\^мCz8,XDfa{,郌#9*p15wIx7awXl):ǰ+! HºX?p! 8u. N[SV@uGFF?R eQp%pnnnT(ߧ"W֯eM6RXv.e6v75Z/ecQ[x>ӺsT*oά6ڱPm{W%gQ˗/P)au*)OMq(ɵEQ"?&(9 y6ZGvɛf)!vv髺Ji髢/ |۶.?dof}Sg&["ZܡMNVNB;,Fװ&Wk0f$u!"ԉS둿M UI`]̲G"͔+AŒŲ;DA6q4V4%!8/:[0jTO26rDy]R[-6}vD"/Vܓ)uBʈw`3RWMn GY>$r#/'㟜ZI//Z^??A_7]:e-Dp´.P>Ә<b?zg~3̘n- n캰X_n+Qof ;[p\ y{d:č6k( \ߝp6/8+{]zBpGRzYAy˟! ?EߺGAPDځB eTi7mV"ak ;r93dɱ)'=d\5d<qoтDY Z(6;2ڶ l+r](ØER#hƄ؅!x"wD7,K+*|S5O #qc}3c2 IPyh;o!< %`C2'}(/2.srmR0:3#$7m] U m]UthXT8ciC}!Ews ܭ)_B4\[QFH#v,L`0B=8a,sRGRf38FyZ9 6B&\mOX,ymc(ࠖJYJ`xh&WgSOpcS)#n+R+1>rTWNL+V!{VSg(ѪlYB5cXt&<0Qp=D;4aVHYltE)- /#/AP$sߙط>M Xd;,m* uuqNa_C$E%ӼF N- F r7}|mJ_jJ6pRR_0u ·D\a@lp; ,ZY=]E\h] \{j1ZvX`հdn4C['6Ko9F ^(UsR 'lcEt:^o" f)\HQRC??7"L;kϛz%e'&iJèi-5-Ʊ .UiG{ <^NCqwI>)0 E!F+.4K C?:n=b/ q[u )e8f,9g@nPv͈]JW׊cBE(0flɦsT0.'ؕw:v%';'7kۇXÒ%~{kBeiV,*M7gSFUGt/3 1DRy%DC졗ֹft{Ѐx(4 "K m> qd DzsB#bVge۹<_ AѱKL}Fzbq+!ۓ4kYvA(f`n^f{ͦIiXNIhb7 Xў\5/ޢ" HGexrŸMi"]@l-]y#ґ#{oxܝUf:״U|1_ l doڒNlHbndo#}9mhgj2}m'PE8!a"N 6:t: x.GaHa(cj ^T[*|)A(u5eN zQxa`4n\y'G"(2[M0d@I(o9 7&3ݐA\c=]av%eL}P3T,["Ր#A&cEqzRRP1;ӿqoE:|sM闑>X57b1<5@/x z"v??a}{­9*17â 5()v{ϐMHq*nX;M DX.2<)8E<_>aS=.4O=;׸L_q4MBGv9v6x$ HOe=Y^sb8clI2 Gɩ'=]Nt':} o`vjͤ8 maݠQK È("I=5^3JSez+zNV0S>t,:eFe;ʵc2KKT1Z0Ҡao=msIb+MG*{H=\"2QdDioBfE`g" @yWfF /ܤL̐;kpԆ"(D/w+2_W3g$0%CTG v [5;'-A 6o&-8Fr7~eAszT3$)L0-qFZ`5.~<36aV X :T|Uj5osۺS`i^`K/ą Rs,m#̔Lo8OZ='|6ɠbr#v(QJjTU? dTxBF uO&=Y[mώZ!Oi83-;YZ; J/Ǣ+?H\;uJSjFM?s:$͝z+ǔԡBBoA !2*8r;,ѶV/k|H*:I(F|OL9N6[T[?Ob@{ lTj0Z2WǾGCnϠܣVR b\WQ[>Br!`.b\FyHF?B0rpcLm6UlFXD{>M:| źG6mooiC1Z1XBa&}s0ȬtM!O΋TAA6ڟuH1LCx7Re_ 9=MPq]#: c5&SVp 8siA87FY-Z{)-VSP^r8yf +W,̡g}esE6+^zKȰҠWds&LxAEl}v|FCSM3->!>(T >N2vz/.f!JmHо28icͮ~F0!Ky\Ϩ<:wwa-kbͨ6?P;-Q ǔE`dc|r+za?I=2Ƹ~ReWEx]ީ L.5#q"A(L-D㙝/>5*9cei|4[ c)6&L%6֍4> LC)(; [I⇸'L0,xv2rj Α>2SMgJe/$ÃZOIWy/:s/~}c.VfB(WU$L*;wz鶁O3҂vo3㩹^Oags1I.fPun[̆Ѧ3CPDSwмw)Q4]tYAmJK/eMp8{Of r"&[ӺKLi!AaX 6sF wF䑛^mQ7lj u ;^_!^1*7 izoPm EuC,PUJ`DKqc(;4tvu=L/zɉoh9=L#),MS9'bpR *em]9 q)X>)ܭ+vבLB&!.̺"@[F|[5<ý8 knAnOG1CW{^e֨].ܛp`s>Z*f; ;P6#/t#u\S#|n-hv \esgƬHĕq[*p!ꨑ:pIT,ݏڴ2'L #u sMxm I56{0Ze 9k;!3g 1t 5T ^ԣ{"aPj> ! kE \me+UǗd} TtoD\p#rqv_ o}]A8 Ψ'6ߦˌR`jYOYٓeBjM nXt4=Kvq՚ExYk:X4`3ȟzP'!sWQm[Z( .dVx,~ǣAwM0ONhI:)1["NrTоKo%{f"KDf^y-k[b`]M/JSn,R&  Dd)0#d4L3wƏ67nt6^04 }Dqң ݵ 8b֧VkpΘM'SA} >8qCGNryljjJF [3$;9*eBZw  iQlik9"mAR禿X ܁U8p-vaS|ZuV' FWv<@m佦w?C%K"xcEv*o;,kZ(7Cpc~VKӟ Fm8gy8*R*x /x;K88hH$C69lSʔw8/n<=-mcir1Ur+?=T <&B"<[w{dx,KEȫkd< ʒb3<JJҠI5oK9z6lpՀ\4v.ϼ6JSH+GSzy ƸW?Ry+= i_-vG@S-l+?S.Ǝ a`y!놤{dBc%PS6h@jh%c.1CR&2,##UtZ}G[K^-Fp_޷!c?!6.{x#i}Z'e %3Dx!R _edO8Pu*@bX):F7zU2T:ABӑ}AkH!LH {xCAp3`ROW[ˑ2إ7=R'n]:f`am#7G{*ﳆT^+DX_D)ƣCpwq?@xsEsP9[A)>싙Ig(xT%[2\%PJXUeӉya3)s0k|/rL|4`>9%T&x!/Gŋ.LJX N ]fD+:Z@y?A>0"؈/^2BE Ņ40<{!?jDž'6m'sFJ)kC)YrߍJȸodφ2q/f}l!X =OJ \еaIi O>N GbAy8ɾlN(ғ=ro*Y$dS]c 60'P%Eg("vWJFs9Y K6S S#OA>n,wumiƙ5LZo}܌d2Z t8Ch뇷b4lZoQcVt].9/BeZ܀?76``YsY}lG(>jجx{Xpog]&`@ޤ+qL\e OXͨ??qC_FRQfC1/X>z]^^VKϝְzmd_@ ' iIQ| M=!Pc?g׍+Y^ȹ5XdX]>5^U?Kf 54Ip<]q~('`0- =iz:~SPx27Okʹ:zIs05rWb/^5~Fe{.N;<}j%V}@)5/0(~)NUAI5# 2p*DYTcPwNCx-m2'ħbQ[AS\/he%6x]j+ ^Y@no|yٖNL͂/_wfAEO(Ćx\Wf !Gg-9bOFi>dPܱ7èX%bŃB VM^g:bDyF{]P0=~$'30L</ia#}!Iyw l+[;&f [E:'N:jԁٖGX{c cvb*9%kOFǹWokD#\tk{eh_ڪN3wn,^Tլ3A7G^FQ4It CG_(͈N7z*cXj2҅ƦdC\4uSw*G~x9V{73 SKc/C,)w ϵ=5bOEGWY ! a0J֯o6.P] -|AD/+|kۑhA_/z$`<8%b\}Csi*͓UoƁƁÍ[_)lw_FS :+'F&!DnҒAk0!4ߔy2Dd\>[TBN-`+ZvNaJX?*Cx@%-2n21;FQY= ޔ(\ZkL[W!_bS.̬۟ Blp39j=sOA-5i*MiՖ_q W}Q;#VI,o/\']x"gc*h |[)s[{"3ToB R CBԏb[J'^X;.dڧQ%Ns06@pn5'zҋwLDg8Y/ V15CD06:5 |Ir%D{쒸cV7*ZJ^ޑ+m>3]X'K~/n?.^#+v2`I>l[e_b4Yn4JHJN#s2 zz-0Bɸ+`pZ3ョqН#$':c]6ƒf`#\'JJh[ ˉ}c:^!*oJAƊo( 3}(FT? ܁'8V% B7^fN]Fb~4$6blvBij6ZR[_WڏR{9Rd'S;5z[pzqP cʥkv˜vreאHxgxA _f!x,w^'Ñ+6s=E:H/*aB(玻 2+| h6ә 1X(3J#3VXf%^P'/D|v|hFh0hzĦDOH9Deg~3s4v$'qǔ3rނP`vx<.YW/U#SFcRzZwNQ7N"ַSmýD+:|6tdЉPOy%i5Q2>fSG,d,T\ |WY8]%|@_W%'?Ѓ_s-/EW< nD,7O\1 khRօOJ/o>^y hP^8&n,ȶʙ0$CG:HQ3%YGT^ heP-ÃSM5IFȾ|60A/x 2eO%A@6`>4@3۫DT>K3V"S a><z {=|tdxSڈTz_# N'qo_z2{p`R;(>/ѻG@Q,xyOE-nCY?7^ڶ0\QU_ˆE2S(;顿G]z$٦-hdsR#nփK.;ߩsmwCE%QU"-?fv{犌`K.VD7hH+P7 v۝e&嗼y\|)5O9CpJ\8?*izW&>2 뻱C19"F –<[54v.)|*63.^z/ *Ym߄reyM%qAuY%!PIĬ1 _/VBMe20jD3Ue ;g5T-ru+[-3~5#J#ʇ~I-;K3_t3FH)rp170vS]?c ` P}2c;H_T,kkڦ^t7ϝJBp']r%ǖv'jg ^MuF:fM^zh2YB0637GfmkM&$#fdd赍e'B (GGxQ}lul0vEMe))OO@ݗ#cY.BASk\suٰ@xbgGz̘<=*-j*#Aix"&n]]ŢHqn@# &MW$ X/n4v]LhI::̕~@h o6QdJG |C.4Q+ш)E~~pA\Mk錒NRFch s{ hvתN,zgOSY6 fz*fHax<wfgL Xm@P™3` Q.:5<@EJsw&ɡX:]Ev͇ <<Ar.h'jKHx 5-D R!t(Hmm՟RrO7:}~Ffm7_;3lYb.eCrt!cJ5>mvhϭ+hZxLf؂7c+ PF^/Wyp"h9HjjMLQ?$AoU) 5jc݁(pjtMH6$F p+3d.K"gac3&Ez k@r+]4ɓEGl#ja:(KRt nǿ1דsosQj TF6uCoolvT%ss5nޫV4l$9(ŌEzj5Qf J V L07ZI˂ X%qo_I@4g%hrk@N ۂmIXoipD%a/y?dx;P^ٞOgeL9QKTklUɼ>?#ΖzMJ:bqTch;H |I"b΋)C_U6[cv{e>vbʽ@LFxB۔@YvȬ?hJk/' r>7:_P\ \2%|FZDk) t=٣LjQ>[z֥I\cx<30F JCmɥnP <^k hߗ]+i z 3wnmokT*]\7vge YzD+ζөv%u u*f%lږK!PFK K $>(`#<a:|V8Y|KL9ʼn?syXI Ŷ YZ