libssh4-0.9.8-150400.3.6.1<>,~\ep9|gX6$^n#EDL5-7N^ƚ\:yvћsw j6l3rwF)o3:NI> Fcd7G4Tb*>rg}pX87$-ϝBCEMW$swu =b8o sx K]ijFy,N.秹fef6>@@?@d   ) .4<T ` l   0T(8+9h+: +>td>e>f>l>u?v?,w?x?y@z@`@p@t@z@Clibssh40.9.8150400.3.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)eh02-armsrv2SUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxaarch64cA큤eeeb;eyb;d5480c90b861da647225d19e99adddf13d0341495e058fa25c746a3c1bfa0bb095b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150400.3.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(aarch-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1d)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@adam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh02-armsrv2 17093066010.9.8-150400.3.6.10.9.8-150400.3.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32835/SUSE_SLE-15-SP4_Update/9850c19a44a9b3ec779ffbc6155eaab2-libssh.SUSE_SLE-15-SP4_Updatedrpmxz5aarch64-suse-linuxELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=71beaea490974f14107af1ef03fa4b14c9c8605c, strippeddirectoryASCII textPPPPPPPPPPRR R R R RRRRRR RR2SW@v4utf-806603ae123c5525b704bea07497be06e7392c18e013c6a7b8646f08809d86643?7zXZ !t/K9#]"k%{U}d涻L,%:ޱѰѡf]9*t8U⬓S$m tqTyHT" ѯUua!k R-Pet\8LKa)Bg9<g |cUKn]%[P`|kf0P$^!Q BcdU$"mܧl7__ q g@AH^cK) Pب9*p2xs r>  T⹒jџ媵dޥIc8pr -AMijvt0b FhY4 _pΞOSZ*A~{`G/Xޥ0^N6C{Zhz "5d]#y<.~͸&Phm灄wi9Z%h.[2sU/EZ;F&cH k)$"TcChBua ѡ0_oٔX2J̷tؒsJK`IY#]B )vK;XodMo#qL2ݝږYZ`{`L*JNj)oqB)|nj}~߱"JJQia~䢽Eu?%>x1iuKgFvl^&YKQp6E"lLN@ tt_9;mپڀGɊjOcXDư4#]W*H\҆ O DToL~uh=!M Q>5yJOLLzd<ݧêkՙo-6t$Lb*?}B{O)6{G_>*b_Z CiJ>|± ?b¾e}jA#*T ~QGTMQwSN?8cm H#V᷑hDw+c7<չ m|ڽX CHcQ!XiO(\h;(QHczΛDX956LtKvCSk޴Fued-iO|&ģz|8~,?_F+ANƴQisnx=)WԿJX9WV-BgRh,7gk_d2p01g1+}o*X(-t /-᳑et!x9bAńeq<p  C$2_59O[- ÁRe'_!WKkDπ!9i%ۏJRp*xcLUř-`ƖY6ZoF{Ѡ9RHъ:֨1!>ieF{U8@2y)PJO0v`sXjc%MR(Ne>. Dquq+'$t6L5[x;}ġh60񴣒u<ת8l".H}$Ǖ)~)B̋Y"Qz0"a#5߰YaUsSd~.'"F3EK(*J}MA@NBzM;mPizuF_"KR]XN}ogUݐ٬VE)6UmL%o}_(*]!v9{V6m1t3K޸Z[@ZSӞ@0a + KP8`ҪNm~VRcCT r!x-\IHuyl(wr)^׸w4u> vL=dy||?-6#='EGQy j\YmF)gŽԛ{dĴ2O[܂Gu9 3խHJh{+Pmrt3BT "N\w*'hA\Hd"T1)7cl 1$Sf2a ތI Sj/;G}Ɯ/韷סlqaL/W fC5׽3r ;+Ӈs <1.5zCĭ4hBy?O𱽄އohJNd\:eJ !A`~uԺ.'#VH t>,B Y&\,ӡh87jsB@nM 0PULdߟG*k6}%")d-__YU[t݁ vC9Üu{3}'﭂W=5YMooڐCffvMDq|dڕn]@z9T_[{:7!E.8.Tsv8Ϯc]nq^sAo[^eT#v-)fYC yz^-t㔈-1=01߅5b RJqzdTuBfWAb 3?/h'q_]:GV Yt2@{WQOINWU F:NҧhIHҿ8 >9νkڰI$UN%ς^jA*.Zj(ģW d0θ;[Tt{ȴKқ?emo&(oh2ZZEsV<.) 9NXL"1@} .J;%nR;{.5Z O gt1 &f@,$~`g!uQ&Y%r$C:C t 5UAS]уlK5E(5z&ҧ~z̖ }LYfER23{,1/B{^ڊ["'#R6@A>=۪\9Nyh7@<'Ea̜*L>V Cy୆=XR!m٪@W\gf;[_ͼlmObkk$O!M ʝ$+(a[hw<~[ i[7;j[#;z@6H86eEU讻S3 pzְeI}y-VLԳMl˳\YNJ/x闕Z}`}a!찋wJ$iUUF@ 1lWI\ [.1ꆾOzdɲ?(oj X?gԢ(;Y3V=:;\#w>Oop1rnů?" Yؘxz,5+9҃,RYO WUV_Rꄁ~HsIլ5Ak=gd|P&cE:o$ @y `ET-7j ,Ԧ6>5sEX6B~׮<7 5װէNSC ՐՉ0 K"BA@l6>y'ϭLr8P@9g"4b0[!+uCϧ6@U䞼fGf[0>5j*<$m o8uMZ=r+qSω+Hl$ z yFℵ:%TstS)^~"Vq ;'D},b #ܝU#;çSHnBt&3_gk_Ps"f $)r&[Kh&m` .︮VOeO9S4%\fxoeVcϟٱHE頲{9'rܩpvcL!(΋ hτ`_ۥdzEd8Ic1H-o$|Md$/ 0:]tT[LNQ'ؒEUYN(/חH-k_6jvoǬǡ,il7vH^*(K*I(<63 S[CS`iahW!ҎhU-Z:,3s+rvWic1*/TowvΟV,dJW8 X?F Fo _R!q)Fg;[U_,Ph1Eez !#M 6يP| p3a-?A7/P} qiQ1maY$wx\rż?:"`j{JǻFWWN7P2S8sLK!:1ȠTLy\)DimH^rb}\4@w<sG}̡w1o.~#0e W A2nB>2rd4c i=ƳAz/!.nwU6ZK j0b\Z} #ȟ8ᛓC`ߕT*Dm\uZ[iXף Y9+=l%_z: QJ͔$ [H 88=IO%U/{C}uWI̊\ux`8/-r}1ds!G~ {aц+ynG | j#D$|0ڙJc\0ֱuw jz6B#6aFf/$@_eH ,%)): 8Yy&3qz. yg>5A%53ZMo ]-&":~|ybȘU2_YD4mhՊ]H55n{55'VsqF0 Lz]޻|zO PS:8;9ʨ^\C3Lp f<ݴ|aA}97sٶN4Q~ wjs{FZTN cuQ>.:Wi iXXxkYcc-V~KG)uG0D cH?fE4n'hB.z* {Zlj7gޑ(ViX%::f9 Fw^7RMd-ޠ`Эn <߬)`͘{RN]/bOPhֶup%c"ݣ#ĸG?5ͱ4 |OX+?@"@s݆z>j: 4bW)p߿b@ى3`$xogr)-PN Wtz hC8pê/eVf *|$wN/O x\RܙƳ[06H/WGJfvg1j'Ύ:IOJ9̫7.t)ݼZJ9ո]6 >p r=_v&=`lo@b{܌\"RĆ)@W|6d3 Dr)TG0ՇBLY͜h7vC~1 r*Zou(VƣrZ76nnc:EBkjRs!Ak7L&Hx#s2^BvS}qf}{KH?v'|>HlPRikqoPRߕa)q% [:N7!,|A:҆B:":zE5L2F#dp%ڱs=6=>sTYZ0'm, Ɍp 7ux(MYa. /!-AӞqp5u88 ]T_â瑿yګe[wޟs-HI|2%8'A{0TAdֲfC5¿%0}CvPP*6ր߀|,VNhZp+GM!4W.ܹ^׭<'t1)FIWr9x[a]_! U59#*ftWH Ai4wՕ7^29gQ+/;U q:ܯlÙ[ܓ⍆rpj.i <,&sR|:=)Zav˫VS͠=RO>܍j<fqeZdQG ,CE>}f{,,>n.E`덒 5SO6 +g&Wcdi{@ Hu3p~c5h=frO QaZRr,URq:Z⩷LnrZ?,~DrK&[p|[ʜ1L+i3QGWY2%Sܾ& 8r]8,KI|Xh#1zyD" r rd7۫/6}8 5%NO%%iuv'N`\UYi;K9*tKV@w}$j}Q~ Df/oW#@CVKcb #KE 2Pt0h$gͣh))AT~WY zM=ܡO%?~2]6UR}9js .;/;hamsXNiPY$F i&{,@HLljjuʳfLSvr [bfgghNiR4#‹sN.u԰LpTHU|7v ߉S=6s "- ,b7UA;vZaӋ'NiL7-!wvnN`UUYe n" tY~ kspnaG#uE(gh+ę+ιf?}YqZ]^Γ%8S!VBnf㝯o)tx12-e_y L_ǃc$yFNH\W6mf>;#v1CuU3S#w9xu!< cNGA͚1 quU//yE-q\P'Y-H0=|($=3 y$rdKY>~ jn) d{cbxTz*!h3aL 5[sĢ<v\^]A =8h!@_OF<2>#VZ4.܌l̵ i S7+ 8CyƉ_i~DzR3Eᓖ&i.ɖe F@?}J =u Wy^ecE{ {_v^7Fvbe2D/p;RHM 6`_JIrxJQm=2r mF 3mdӆl+ [6>^jsB]kp0kmG-QeM}U0^}H6SCǾ'Az#٪$Q0}#>wʵ\9Gi g Ƈ@$rs_73TCF#娟 gP6P(ɚqÝy.3΋ ¯Յ7ӓgcQ1_Ѿop0؀ګ_>9yt$9fnGefǥlVUjeSԮ 61 _BY΢ŋ1ׄɿ)f`^Jr(9 lͷyMm8[aiuo6yN4Ii1mXitjm{@I8 l%{]W -S{"[Bα|]Ŝ8kWL(Vt>e%V Wi]cOH1Aʲ?(9I1S@+VGxq,ݚ)|vLX$Q}K?Boե:goWDžX(I!nB:sd\M҉=IځPGף<f4<\^y}eBժ,I. zUO8ߒ`,Z ^Maoe TÌpJu UQTEb3p]xFE_cnLeXAJfц󎖬SO>S*mOYF 6gbJ#}o D `73K}gt&bCu)a6.pss2CLhG:FZ}d>(~ǚc:MT@^2EԎp/ OtuR/wN'mSdgu$yX&!~5h972΍^4B$ÌEU3 0l_]\I[--jPH\]aVBrh!lJ(,HG.2}NOʫzmPsU:&”SX͑[y "wL'Lh  [%pDx,aG7naN36Xf˻U/j lYr h/+n銢4AwMJj"fQ @&Vld>#7qA,w,Etآg髆jDv*TMI fUF.Ԯwj#كZ$C}ɤ=>gwjX )m'x*WHGaR!"EGp݄=k æB }S)Qr # T;-K7)&Fj&tU{ O,UN(W"=yl,2.{(`;Wh`pQ. r1.آ_;$7^#B9('pXH~x.G$>l^oq4Ul}.CXq=-\ Mzz}2$n}"<g&6#B I{h6.~~QIßљQtm$">:{-:Ng.ܪz0P2cuTE p#dze >:ќI+nGsaCBmP;&4'T 8+mu{o3S^Nejaf Pev h|5QF'xwXvGlЃG, B[MU>vST;#Q)ޝ03.j܇A!_ 3U~rw;a6m'h)%5gU Eh>㉄ T EfaZ0Kݶ,䥰:r_q}GI.lḚ+Qb\&K~VhcuD,@)+/pWK|w'(kppaZѲÜ?;(l5t.zXeO ^c;E3B @fw-a98lSq#Lu^ZѹDXR>Q[0LQ㴟l-#QO,7פ,EA N/ƥ$r}.A c/BX K$mQ#視Q+OZ( # 튖?sT#;xLG֚ψcEw=d.݂ fv*CR Ph*b~9szvۏd%_ e=q{ӣ[*_X)yEUn1s*EiMyί@*f뢱K^"$&LJCGz² \|b>߂[ Ua~3;zST(U9GPW"?SaqXj+@(i0yŠL>"͛36g`r?'s!Ꮻi7\ʒ=X@>],+fOõJ^X*=#vaɮzZ鮳'")}e kc>(s}Qdj%8FPcsߏHV|ǛF;_4|V;,fqҹR^%̆z7Kʪqd`-)Wl-fӑ ^A.GgIJQl) xUB=Ait &_X١0]oVm͛t"L#hNv`TQRve%eGQ;_'m4=ܓ*AcU 1 x@t}-bEi-_I\/Ipq?*ؾv!yA ֲW'o9no'mVD{|;4J+QlC'V"V\)ez49Ig'V-ݹ[be8DNԡmĵCh)Ӆٮ$=Mz{!tI={/;x#<\CN9oM r/? 0($q&:=[]}(_ݨ( O+F׆* BfӸdZ%bz,Q!dOSAtz@q>0KGiԐ%ajVB ! ŷp1-pM$NA6 !X.@]2:9 ~L aR_8%O4#c^>S3Gi1 ֚ؐ.킍I9bJT@!ЬfV|'7BsGehR#TlW0gB#K()a#OU,ޚE8綾 Qu]OYϡ|RNTkH&^P.}m `O *| c (;KYܽhU(O=RLFFk8kBRk5׵GZsrc YZ