libssh4-0.9.8-150600.11.6.1<>,thBp9|+$x{#Nq5"jNy rDmL] }1 6F>rqI'6n,|"ׇ ML"C(FW0щ~LA&*N( jg쎥[3}P23A]\?#uN0hw 0s9!93~$U9~F-n—;?WO_qY9D،M4i;ɲ- :e(%IH >@E?Ed   * .4<T ` l   0TR(8.9D.: .>@@@F@G@H@IAXA YA,\A\]At^AbAcBdC!eC&fC)lC+uC@vCXwDxD,yDDzDDDDDClibssh40.9.8150600.11.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)hBmourvedre LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxppc64le 8cA큤hBhBhBb;eyb;189512e842b30cd36594eb9b5ca0c825530331a88cf4305fb58f5db52648d42995b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150600.11.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(ppc-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.2()(64bit)ld64.so.2(GLIBC_2.22)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.33)(64bit)libc.so.6(GLIBC_2.38)(64bit)libcrypto.so.3()(64bit)libcrypto.so.3(OPENSSL_3.0.0)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3hEh@h[eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@pmonreal@suse.compmonreal@suse.comlucas.mulling@suse.comadam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Security fix: [CVE-2025-8277, bsc#1249375] * Memory Exhaustion via Repeated Key Exchange * Add patches: - libssh-CVE-2025-8277-packet-Adjust-packet-filter-to-work-wh.patch - libssh-CVE-2025-8277-Fix-memory-leak-of-unused-ephemeral-ke.patch - libssh-CVE-2025-8277-ecdh-Free-previously-allocated-pubkeys.patch- Security fix: [CVE-2025-8114, bsc#1246974] * NULL pointer dereference when calculating session ID during KEX * Add libssh-CVE-2025-8114.patch- Fix CVE-2025-5318: Likely read beyond bounds in sftp server handle management (bsc#1245311) * Add patch libssh-CVE-2025-5318.patch - Fix CVE-2025-4877: Write beyond bounds in binary to base64 conversion functions (bsc#1245309) * Add patch libssh-CVE-2025-4877.patch - Fix CVE-2025-4878: Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * Add patches: - libssh-CVE-2025-4878-1.patch - libssh-CVE-2025-4878-2.patch - Fix CVE-2025-5372: ssh_kdf() returns a success code on certain failures (bsc#1245314) * Add patch libssh-CVE-2025-5372.patch- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigmourvedre 17582824860.9.8-150600.11.6.10.9.8-150600.11.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:40696/SUSE_SLE-15-SP6_Update/b00fabf2a3433bba0184a0048082acc6-libssh.SUSE_SLE-15-SP6_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=acea5d741e39f06ede3136bf60382f8671f2e97e, strippeddirectoryASCII textPPPPPPPPPPRRRR RRR R R RR RR6nTI?Ƣ0utf-898f4df89ddf05c0d1c5e5997c01f4b3dc8ab309dfcf8888ef7476b1da1fefe18?7zXZ !t/_ K]"k%nd涻L,%:wx;EJK2{EP2ԊtA~w1ˣqx@{ y"_^D<-Xzm?NlL8- bwMo汘y:Zeѵ-ݽp^lŽj)0V(YV'{D bdz)[WZxZwP̗"6eɧi=~:ZXB^iT W&`̄,!-osͳQuIj!f=6{-"dMH~2JW惮!\#euDjm1EaRom|`$>ib! )y!Cut+_{p8i% A.5ovg+S]k1xTzO O])c i\N;s},C4(-ז|^&Q6ۃ;HT 憎;㒂jfLD%;4,ta'[J{<):`7W\xBJG8%P"! п9 I-O^ݖr֋ >iZU1Cs%fp!wb/Wvk( 'Vw_Xee^ B H%=y> \tEW4GSֻqK94cV:QHDa?: k'BL(|+6 <?yg?`W삄kV[őħ.RgM:Vr{ ^\u”dOn#vCn~ D:p&oEd\:RJsf͡a cY^<@"u&&Їr!~A^5nҰ3?n?x4ZJV_v9o+`ӧ;_`=.eR,Ƣy5[ve꬞K^:y^sN0KNoO TEf̭4x2*'BE6igpsgY!vFctҗ`NO2X뗟ЧeD 1VL%BtFw\80Jlg?ﱩVkU0<7R j`(v s\kxe+XY$oސu^_ J I"f&X)!0 aq&-,#~8y4uV^ Ks8Cx!lJ$!cZ I]prd,45 n?a036ickԨ@4z~AG-kBR udz?$Qe&qI/'Lɸ;Ԙi =[I5/ cGy/!v Nf- {!ȊXdl>/- fԲ~ɼƹ]&V%n9'IyÂ8E&3@.J4op2nxNTq 7Ccw9YِǎjmRhiyX(>xMY,/'`Q3vF:HZw*AA;`]\UP76hQLl_'76' 5M*VX nY3s2 9sma"@i=|s mn ^{Pý%1H%&*7)KNqg*:񄭼;XC`H7W&RR^(2c02Ic6>mbJkZUWi3+zn s_Q-!G`ۨȋ Rs,FseEn9,Ѯ hP2#Zptjgh/-OVB4ZĴ&e0$JhF. rZIA2W1l[؏ؕ;~qc)%Dw&=CIܒfN&MLԶǝ$4NB3EMݹΞǀ$X1EK b5#lwhe*,F84u?++N}q<X ta5/_vQ h(g4bh/ <*g,?ӽǎ"%)jAXM5ok ˍ佄 ze~? bK28g!O8R%y Ume;uִ8LeB6+2p zv$t]lp*e5-;󉄠WWlCm1\1jY#NdžD=ٱtuOv@auƞ:K@O)@*bņdu2vqڏ<bz՘.Xjy3"& K pvZ! Fk"h0o ܾ%,o +mfvAQI(c!0βv$q)#dm`5q,aQX̮vIfCyzMb{hRme6C9. i9p ][V FDS *p0CtW.v irWmH8`.֐zaJF΢O [$/Y8a$qZt!rV6f\zTX_% UVϦy#Mv^FD )-]>奉ڠ^x[,Q]#쵖;]όx Vݥ)LZG6/-x[ldp{S&מJ~֋ jbg߶qI^ٹsWhRHHW{))t䮷%n+kpQ< &BӘjt͗c{ڭ%js#yPr1FKzz!Βlc~8Z~G=V Exs0'XMm o'ܮG7}+jCI7BQ?4C*-+t|E,.Nh [AӏXzBOhe<_ 悠urXTa@CD=bv| b|wTMma3?TBcT =M2/K Ý<=*,k鋃`ZcIGPe 2\ :24&owrqxٟUv.YQ[逎y^mn^/zCfqnC%#٢%@WzwyGmgm AWÐ{]PB61KL8⭻[Nׅ$Fw2{6?瑡WXٔ_4Hoߚ ccG:. >^QΤtq9}=Fnk9jpWDTNr!B579V8)fnG >C"u'0}aa!׵q +H[/~n;`~Q1RY: e#j< ]#69"q  @"g{ Ry0A&y`!,3;#JZz\oXxey&nv֬aJ6[MJC8# Uc&H,r>5Ր2z5.WKϴAԑ{V1.Dwnh;FLR@*7ғQK *S 7N}ܹư5N^(p?lW\]?زKl˜FQ ӥ\~ sQTD}$r51c%f !ʚMDN3q%0]XZ"ܳ0BLBIk0JB~,q,4r̠ 3[Ox:~!ёN5AhHDk ;;t+W6i]]K;A?é L&EdofXXbP54KT X c QَaU)kl&Rx^6ab,e0jL+*2(R Ǐ6kZ9Y_'&rWYK@@U)с>B!sP=zD_j nŋp J]nزP"^oQmM e#б}i8N59 >x)Mp3DIcTu0T/&СA4s<8Ndz81O׸;h ReϜ>qq^Q1vyp")Et=Fn,Q'vDc 71R1Oo?(4=T`>#qBuL̐6 5M?&i:ZX_j⤌-ɯ<GQPҲ^x_P&Pi͋fLnڑKCB!G91ٷr"gdf L]i&8@TOGӑ/Y!`ep牼%:y}shY9"䞖Da`-N`sXGstR gq^3 ;*#AJdܨ/G RuKȂh1`W 7CNqMmMWcQ4u/1(~`yf_4s=&%T󙩫Pʑ.pFu-m5)+LQ>" NրKYḞUup[ߕPrxk:KG91䲺]|tw1>rkQȶ/t4L([ۣ6^g2>>tq##9+32~ӹ5)T6M4X۰ M:ݗٽ3:$ԏ΄gS#&wPpƺO:=He$E4tz2d{HKu_/eHXQpy+xY8jD,XJavi aN7tze_0Z$z˂xA_N!  Ʀ-{y5$Ԛ9X@ջvx~w;IU %Jtxt߇%D)ԃn ;xڎe<JXu\@nȝ}nOFWl&d7{yt@?X m1xoIs-[ !=4جtYڇl:mC.Q|6̜8N-0<[s^CNo&ke6C >+gЅSpbHCִZ!!U;^uiNQEu?vB<"&>j (ub@%ܽyb'B3[4a:Q08QLQB\y]G}?L+ $n:F&[9o,l|t)E |vC^p2+d3>t< :7 a*v;TԱۅ$EX_Y xgN[_9kqD/=2l$~)bV>7rPn ZOEyOh]`Iy/5gmcAnžxXxI.nu7}WoC~|ېʯ]wj,\*!5"ff_6l.i<,(|7sרâs虳 '2›Z`EJ9#d}+i{:S0Bj2"ࣰsbSE5E_k =:_ #ۊGY9Hv({bN\\*N `ޫ|)O-Ftf.($_ %eC_oN3Ey3&q RS>.VLv(_9aq{cIrW  ._lfcz͗U']m(m2jxع8 9HW 1{CD BgQ- 4 Gf^FlzEx#r2WV2MlyzKj;'2+p*f.ofH>*DB%o|Sڞ^ Au9i~^< ~˕#j咽"crYq0dfZ;Y\t"vEtSr O\&oǕ^1T&3,:'s8Uty`D0$k[wY :Q{Fr%>f&_ɀ s˞ipM_R X`G{\l,M2ĺ%$h"G3 8"KhDiENem}+Wnzl6y ےm!`;werєgc+й^VҐE䉰#g"4n>O?Qk= X?þ_{Pe@K,.DtJ?#Wn.:-IGs0d;VqNq]D*r]zu݋ E1އ `Mϕ^F߂oT2U5qcr1lI>F׈{Zzgs)~A.xbZ7L@P.[okZ0yAY=;_< /iR g`9%V?vHV>r}Ai-AC vuVM\ D:s>̈́}a?E2AU^6XnnJ)*( ް&G>Y!Z];K5$w;r aOǾ_4y̘E6I!ʩQ P5۔/BL7Z {d䏫4"EYl~$.pm(~%/R^@|XzSǰ\Y}弱YeOw 6˭=ɪ6;EQB aɻE@x>Mltſ#W%W,\ Q U0oa|?@㞸 o,N:!\w6mC}M šk:tJ"u(J27I0mz ջ}%Č1;`" R\>z,%d5wD$m&XjD+{##_#M0g S.Iۚc%7i˳$ݖQ<PĶlVOALÁfֺwb5֦><z>!~m4itXW}Fgch*10jU]t}}[G#.xqI] gGMOki`d-ZMIʫ!4?XU尺Yx3sl.87pu%z|c7?LVo#ȧ7Բ먝市NSB.t\Zy݁m:ZY񃂹@Ź!#Lv^Xc0k@GF:bvk'gNqu9)X#nD2/\0\7@vL?LfNъrַSrRE!*~~5OºR`n Vj#OMS=̍-!I t9RQ,)/j.p -a:mL?YЬwׇmKztsּ1)E5堔[[oƞpk#`^ya0M5LN4\"xqf@Sc$ҒAcޓK!ƨ_ /&uf,o}'(fϓb߿ ٖO Cs6h5FAaGEVB6jU!ھv]j?P@V0AW<ؤKR;#7źwp)hp$""e "ÐZKTƫSo=d\YWOGrHO:M1.~FfN$y!y/S9p mNJ XՒ|ʂXZTxKqR_ :҂b_cYZ *P(Ă ofhߐ#Edx+ħv#S[4*ɘIi;sǃ:RF Iac=u7LT,&wũh8~iJxG6\Sq00bA؈/PAv t ^fToϋ i#ڻ!pQr @*.` SAUKR u|%WO$z؎t1]bgtW88+x:5,, LwnSX;`@`%03`Op*J䨏#$I 0.KN9!IwwE#1]q:tvY-uHϞ){&ß䛰»㕩 e%m'WN׭}n@*qC~h! ⺦*,zDxF+4؆-ctogQEFbQ sAp|l#~!i+u 6[*3 Vgfy9k ,6Ȓ0)ˉ;>N]{jYwa'cV*Yoh+ [A۶ddt3jDe1yw.*kYw#%!kKb]Pw;cߋ;;H_HGU40G{G|P*Yt@﯀I&g:t9/B9gD}qr`R/=dDРլ+%&BIj9cbe]x t$ibyX܅;jƟ窥j嵛10h(>Fm6ڢ Gv nӒT/W0~yƣ/g RSSĽ"k<)r܆#J)@PD$/aҳovt`>m[:X/f9QN 4\Gw0Bvj0Li B*"mݍ1=R? Mr]n3eI_۽?VЋ+2]d7 :ɜX\(c`{QZjUgM6o+i)0WU9;\zܚDXP@qk!Pu@(<bKs:(t#gZ5Vwҹ^?aO#ԾR Ί^ÇC7P; z `ߊ+k]yTͷ=ayhoMc CT:{\lr\&)f~0Zsؒ~:8)}fR Bo$-dyF*촕ӣ[„s*2x,k-[G\[kT9d=H4S33ϦEK /8XWBk!M7Rj$wf8.Fr r?[.}B@z!<6.FA!1 #^®Mb0x:{IXXیϓA)`>3e !0%Ծ.r.ۧ}D.ʞJ@Fr(p&dӚlnnRěu +iʮXwbHjFՔIKSZ/Pԃ q׏}H`1knք'˒Q 0N"۴ƉDiЊ<*y7v*>if" X~Y/1n8CH?cq(<'Ό8K0sFT6^}k|ZU.6C۲)AXx$sk:ڶq+rP->t To%)#yǮ]n( 0oۈ1<ϖLerΦ; @T+Դos{]WQ]c+oD !MK' n@!TF2clա#Q 룚a[7Y#yu8oZbYl$R|V`ꨬ &8<cwan#h"5G<5z<(ldtAM=ffEe3/,j,8*JT73 9RH@׈baF߯;f[nLe mS^rjv‹O/"QTJ?LL={pe<!&5Szb|2`dNG0zsaeX,i>ߝZ}v&ԏdI4{D{m`oQZ`21fPQ2**( ڲm TETH%}҉A6O%j5FC=M9P[[e-1Wʯmr5 ^DKN_#%"cM/)r #u"Ufaع,wX[AuZ&*d8)Z* ;Kӭ;񐏉nў)?uAeˇolarÀ+Wѹ=A4 w+씑 Ȩ-7 #J$bi/B<{L dN| VpdXZ5XcG }CGUe:a>ږM:>^c˼P!~WAnXX . .yE\J,%I&| T c%pV~J׹A|zdnPhv-YPy@ hOcS3CڕhylzG&sd:01lv]hA#rRA^5F2FC&~_u25?ŷvPT֯LWecW;N͠0aFS&l$2"Zڤǻ<.Ev(ɖEJUM429;8DT_r$a2^M!h}kS]MWY ƞ;=ZCA0g F޹bå[Ӝ^{k ;YOzz:W[Zwg5~1 R7k=j=MOtn :#Yke=1n\S<̼ 3I f3C;0=.lbިA|NbKUVZC8.2H~6 jY`~t,gA%^V%DbAޫda!7;:KEeQRʬX󚄭F0Œr`Y򠐃74񮇨XO³wk ]l]lm״$ࢵw=wW[Fbck% ˘'xHEU;3JvW480w+#/cdp>ruZD5;JKܗ> %P^{6I2ܗiH(qvQdX 8k$7Tw|U>hXMߦX}c֙BbNDe  Z)j ҇E=Lk=KZqĮrirA:zJx@w輌X!BB3X.uNn>be4OCþL 0{d"y;1)ઙ8!}]EÇm%ې8L21 wg^sp״\6"P9PExj}&)c_JYDUs^^Ci+}|;_#(~X6nh`Šv,$bjң(2^oW2Ifn]?SX*͚k дPtih]YSv t'̹ Oc7u (3od YZ