libssh2-1-32bit-1.11.0-150000.4.22.1<>, e5p9|cTd|Nlݣp1s[^Hm|8Fo<:8'r0|7!<_LcfxXg7Aa$,ڮ4gJ^4ɍr]Y >erꫬgqR_HZWӘ&Ht|& F`W6H[ l<zw$YXXί#`t&$_:zWIS\=5j:ة(:>AI?Id ' P $04Mn{     B T\fp(p(89:;>FBFGFHFIFXFYFZG[G\G ]G^G2bG<cGdHxeH}fHlHuHvHwI0xI8yI@ IpItIzIClibssh2-1-32bit1.11.0150000.4.22.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.e5h03-ch2dyBSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://www.libssh2.org/linuxx86_64/sbin/ldconfigy<e5e5abf0a486ebd3efd696affe6526e4db06e6074ff2e717988af1a6d0413720a085libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.11.0-150000.4.22.1.src.rpmlibssh2-1-32bitlibssh2-1-32bit(x86-32)libssh2-32bitlibssh2.so.1@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1ee;d@daA@_@_G@]@\\@\MZ]@YTYA%@VIUzU.@otto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdavid.anes@suse.compmonreal@suse.comdimstar@opensuse.orgpmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040] * Add the keyring file: libssh2_org.keyring * Rebase libssh2-ocloexec.patch * Remove libssh2_org-CVE-2020-22218.patch- Security fix: [bsc#1214527, CVE-2020-22218] * The function _libssh2_packet_add() allows to access out of bounds memory. * Add libssh2_org-CVE-2020-22218.patch- Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch- Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version.- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patches: * libssh2-ocloexec.patch * libssh2_org-CVE-2019-17498.patch - Remove patches fixed in this version: libssh2_org-CVE-2019-3855.patch libssh2_org-CVE-2019-3856.patch libssh2_org-CVE-2019-3857.patch libssh2_org-CVE-2019-3858.patch libssh2_org-CVE-2019-3859.patch libssh2_org-CVE-2019-3859-fix.patch libssh2_org-CVE-2019-3860.patch libssh2_org-CVE-2019-3861.patch libssh2_org-CVE-2019-3862.patch libssh2_org-CVE-2019-3863.patch- Drop man and groff BuildRequires: both are no longer used in current versions.- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types/bin/shlibssh2-32bit1.11.0-150000.4.22.11.11.0-150000.4.22.11.11.0 1.11.0libssh2.so.1libssh2.so.1.0.1/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31955/SUSE_SLE-15_Update/4690c3e3ef3d5589f213a6b5fa521482-libssh2_org.SUSE_SLE-15_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=ae5ce8375a3b3249c10bf262474a7efce1bbee40, stripped PRRRRRRRR R R Rutf-8d488e706b1bbb2a79a8105b00e6ff346ecc16e983f3fbb7983050a0f57391264?7zXZ !t/yJ]"k%fkkd.|aEU #k%GReUIҦ)~H]i:dD=]: AK6SFo7.OPM4;eІ%!"ADr*/590@-lC_ /DnJWa '?Z2Zz3 &N`z^G$ۯ5Ƒ[֡.@' t{fU1k,oWwtۖOPe-ˈbdxZ 3* dؙ]0xU Rث yWjT>cL?:]ggOa R+z1ZՂS\ve_s5Y(m$S|9Ds>5t xO$8Ô:][ѡ^zӻUlp13ۻ'V%s2+os'p1E$Q˾ %ݪ_@'ĊI':,@P>)OwIbKVqFs!Yh}s"uBi#OiY~!;ʲ.x]5⒦O :RЋrxa@̻U_Ę(hBaэ \R?XsRc6b#4Yqٯ% UzkkZ@}ZYz⎿XLãV`( \lu;p?.22kD~jD6p(\; ?2N 8WW5<;@Ҩ/vfR VU|eLi. {Nqd}8Q}nWD'']yz50iR<`B}JSa~m#Ec7l%)ŀ^!ݝS,NcW2_ pp5 qz0 ?ǬXqrQsBDRሬ)/1/M/A5A.ZL,/dZ?0aqJNx]ى| B:z?zjH&}1#tQ|>9O0fCY*q^s30IUhCV$filhXG*+YƁXV7 =a/rE qY!.⮹Q}AW6BS:1` FE/nqyX5*)Vq:Y5˔Y"92Cf{1|+BX,,p$ߖѢ=/CfVK:3z"q8nax|epMVݱm%P2&?  NV8, A^JR% ԣ-kYj # Ѧ]cQ/ vh]BS{"b!R U$ ?=$n?JFn #dw߶G< Z\.^?6nd -\vʪh{kAY&21qb#%AXRCx&CkoF(%(U:a2}6֓aESqn)\ү|V+qnASg *+ZX&\(.54{z䕔`ې 4:*-둞ܒ>&'aQ*Ni pR&Gr(reЦE?$zjղ=*ĵ ȩp=?/L?<=/T ~/c:žjd4H(`{u̺{m:&&;Emj֫d/내|+Vev{K³ͭ|Ӡ'9̶E']l1h4)߂ٕXW*i3,г`46S۽FqdѬaxD.O),+lcP)U%Ԥʗ/^h&8hrf231at%gt+ oIlQ]Q ˶8ܐ@y*mQZSQi1kߏd5ʎ#%0r1#s2_/7Tѹ\JF2t0ՃWYv ަd SuP) k=L-vvx;xo2%#9Y͸$y!хJj١z͑Ye^;<<?`S{&]y='*6I@W-/:.f臂lCrghbm`ݗN)׎,*&74MW*n՞qwR"AL%@ƝR9~mza:;YC@G:=Fط[LfwURr^̮?Ng XGn¨8)rӰpёQD99$'._G/1m?,: _tAl}zFՕ(B۠Tn.~\ 8>h$`_kT-Srn[cSJ) :m;'pw ϝiLhӭ  K ݉fS9ĒמC+#:ޯ|'"K66da_,e0+aRI7ZYd?C#+U@M۳=9O,ZBZ.ܠv>|NQE&+bxIUaV" _AƯ{0g)r%q!YX4NvFa\&U;MEB}#g{Ϩj`3:Gk˄J \r~\7vw[g{nuԷ,MgQǰ:y}ˌΚ84|,/\W\**DeÙ&2Mu)wr0V.|ŏU;5w:*犇Te"5Cv*7Uk; crH@!-9>l R^|ƋUEoezMAYE<%YT8.ߋW@y>0:>R| ^CJv,m! t#0eNWq1}Lmkk1Q k밙 ^r"8@RM-8Ql;YRoGcˇQ̽V6t2}zyGpr{. ܤY.cWA~^UG \X) _ VMɐj0Ge'5X?w|m&\ƃ>]*\ڧ  8O=.qӮqvI Jt9=_ DO((B @8Rvl &v $;1OC; BAf з13yh Ƒ[^BZ&yE?6X\:GRGL64o^q+_X/c F%쩇ANB6M1p tVvϓb=c^U '^gr|,7ȿQvzN*ITsffpA #UcƁ.|feqX;ZjqVo`ux/0 @ ܩOƲu˲-pF#~1W )Z+$1T8'ʭtԴ؜IzQj]qwvKT B Lni&Ӿ%xcҔ>H1c dOaO1>j+ 7NJ5a*乏Ț^)Qޙc.ML1&^e yn"EP +cb~kHT_3_u0X7};iʜrBM{=3yF6!E;E,N:ӠNjsu0U*YGhV ˦O=>a܏\Ff!#qKdsG^( {]?qAK>˳M@1>0jvR_ M[ ֘whghLҩEl5 ^헪ӍJГѓ_y1?FҢ%E/;{cuzʑVǤ=r=|n^`ypDZd4. ^uD]*x| 'T%nb^a0\5(re#?m]qh˖.{).߳G&\;7AZ\dl8_ҵF2u)8-hr%o ['thhwK=wI5JGR4Eԡ_tn2QxZ^-ΗEgg 2FS0գ휱9Hmt\*ltQv OLsօ+̄TO fɢ UB|p/y= PjLc> ԷMT|q~HHakkI׼q M%ơ} < ƵͲ;:+,KoPh) ׮ol\~tzQ| u&&gIiH$9\#r*jZNƒC曙ə#!Rߊ/װ|"'e˅S_1f@ })ckJ;5S4=&Ef`>.WKdiu"gz ķHud/ڦXŝv¡C1%iȒ%9߾^{Nz[qWVX&k7Sӆ8%3Z6ˠ'xWOc!lj5fW\=3I /ⴒq-(еK-B4g֭y:-n9RO Q@48X<2_3BjH L^~P v_?T"&3pͻ¶6 "DaTv.*acR }Q'ۋ0߸TӓfG[Wz)OS=Lכւ)vpX[nNKDhhd&bHyYӜ %4!Y)/ЌyZ|> 7PQ-6v9Կ0`"-ǶD/-w!!<`5mzbƍ ub+a7ir01V5!/Q^Yg|uCqR?M6#|njb3PCÿTa|YNܵKtb,*yUAg!7,}h QŸ?+"Xc+TWVӑdY VJ8ѩDiymEM|n9rF?o*7mL*M":v8 )n4g^?_EH(k8,SٔQ{^@mGx I'J5+2Fb+C.~NmԦc y䅼̇B0`΋!sBaܿ<GKzMq.RqЦLrgCthL9*$ We"&CrZ R|B}loXTMɘ!c$RC/|c"fIyE"t.U˵VCڑfs#?Fj籐Hpg1˼?v,T+DݳEBGLR3[ 8{я{-#*].%;ʡGooCic2Dҗ|ٯ3~Z}iqqdZp7Uĥ~CD&I*7qW26 wO}}TET%M!h?l1zٿf7n\1:rH e-0;C[{)h^@ԝko д9cۀUiEe,MʙBU!妽wCO`=+1 I NZU9r <@s|<Ԣ?`+Rt.!SnXkh>y!0T%P~Zt qԭ~Rj,uY}$'t%w)_RFʍSUdĪXFוś|#1星 =\JRK֞zZ]b@ Z}4厌E %fQ %"w u nʛL&ँ F\Z]d BZVmČWC兓U:] Zv_p('&rsT ރE]ޞT/`puޗ5 UOvMl^h wk ?Ȟ!64uQ"؛r,JrJf^&ui|j#˹eduP,kA&ԥ9۱0}lY#"GtDڿFxҼIFٻ4کzPrPjDD6QH:}3)ž%P\X= Rrjb>CTY#C/D7U~]/fDZ~ tZ jdJ)Z^E]+KUKF6kMaqj+joC#1V׽Y36RhNȽ[93 KwQw%!=KJl QnکpRKGBΛ"S`e Եe헖+j1;?جStg\ƹCJ8= mnr'n7C6rտӕ" _#&<~)IDqM)vsCpK !l--33Pl{&V>;}yC7_jӳv]7ż#k's%_ FPf[4,N.OCq5c# t%9I:O3Y / B u:Ѐ:L-. JkdZʖȊW f&8[ܩs0W"eo'0I!P_cdPjz7;ruy,4:rP!i1 LsKspVRgZV_Uֳ/axs^'#;$+cNxB- KL+yZDN~ [)^m©@0?I4Rf0 T"3C'jH@/ay#z<<ֺKbWMkˊ3n*}w2,A㙑vZٚ vHfz4{3R+x9l/᷸Ae<4v&Fj HSoiuߊv-yf.p&-G6XJ^5,{&Jüc70n?QOs%PPDPV0j;BhؗD7lݘCB0B {-E1IKTGb*\ "<`hia\)%?#v5D$VwX`ѻ>kMӗ1/JF#%I ;=CXdς^l|7u ݻ*ԫ ;sznkU}(rkEbٯw黂xtFR%O=wO ؚaLDS\쭔n4]m"mqrPfQPsC7:+SvP{ 摗:4~M? $i~2Sұp=!? mE1!mYa$8܈:m,8teǏ0ϾUWSEh{&,ie:mVc{6<2!#$ *<-N0Ǘ,<#^G S'4'*KGS5ep;0^iЉiE3V1C$8Q+yZn_ ཱུ 9zH+gMJ?E$-4qtҐ$ɉ( צOdƝFh߬*gK mg!QSMMM#^>A` - Qd2ՖgwU޾A=(;!/+ "yFQODr: -HϐP|[~3(R\wcN=WBAF@Vѡ=NQwkŷcVцi79rQ4Q#ywV~ < Ffr ҩ4ϲdW-+|F(iNh+8 &k\lm.vq S9}؅f*I< VBZCYNLM4I5Ge1"(iX!M%DLD7 tլe Tه@#IPU9"\%wOȿ #Rv^@Y9t?b䳷: pL[# )X{gie`Tǟԗ׿~!d,uͬ1vͽY@K J9T;79N` aˬlQ"W32iL洪Rkڣ&5h@jeAIq쒋FaL ,Kn >?a\+Ge`.~"s^0uPg'.-,yL]&%|zh:nNyE;Z9]B*Yc-=i(+:2ĄɬpO*q]xEUHWӗMe5ːv5B +񂻸B~ˁ:[fP?uC6sii$ϭO6bPVQE-9R62{4 .Kuaq@fAQ1corќCϊm~D"ƈ[B| ^n$H-Vb#h<LXx&46gjRogb>BVIGɖ?a2gB23G0UE/.I2j^L+Bjo(dvwKȱeဏugv9j j7x6rkUʖ1Pq#h`7ෲsJ4X$}@S c)y\E_}(L/l/H‚E> [F` :_xGE\1B>)VԼ k(QԾ6/dcMLƨQ"S䀸K/流Vq 4%q ~.)Op<d20D|Q uOTo7pRNm[*e+>UK? '[;%/%i#FA]yx:D{ܿ.b{̘(VLqND%<"UBɪƑkkULW#QBPV=bL" 1Y Q֠ {gXOI|hwAƒ `,8E睐[dǎ k&<`e6wpbTEC5#X7=[oL 2 6jzP׷嶬3̭V8|yݭ5`CBu4Ai9ela@4PPڄp"̲>ѼTn<1$T,NJ6͗ށtCZ/?#rL"WK_>|4LZ<6 +5b F3@X/Cry'+n5qA%}ʾ^>l^r܃WN{Yl]oZפvKdtK`6(LQn@c*lɻNz݄*0ӓ/OAC'U1gh'Q{a6 O R+Ղ=;#<ƩR@8+qc~BIT v_,mv)*&!#JnZkҋZi&S6TeM2H#^;n:ګ* )% vzޓ^U wM4 wvn.Ż-[tÚﴸ 쟖XǴ֍ VZ(/R'ՍU!$ok[x/Ut9i kia l1E8)so58ɿWJEឋP}F&3B!<6=_npa{A9N8#лn͉ 38J %r-&0!1]YdVT#nv=>9u)^u)!}NHQlt*C0JЋ QZq~cw\P}fA|+~o`@R 3d Lh\7%qs|q6iޚGwrf$5|D.$CcJ;I[׌B";C8A;ڒ;E\c Yo/48?Fٻh{((?~aHpB;\ `X/ʃ [=\fYԮ7r+*q%GM"U~) 7ֆPTǭ;aa!^:p)`om)xCz|CwzNray/ȿ>2%٦MfxLPÉ\!JUwT -'3N[ 5pR 0Jhu u{PT ?50B4RBpiKwP0頯 л43.,'W<OՀ,fG`@GYy ~Zi]ϝQ+Fo!g;{Sz5ⵑ푧FP=| Lhx@*szߥS]kҰE|݇K+O0:!JWBѪ"yfxu+"Tg5@flٕ2Uڐtъҭc=x9k# #`]}S-#](?֟w1J799TK9VoS5W?(؈0/e˷Bq#('С?t;zX$ڒu;R MU%D;̝I,Q%gt A<9˩KR#:(Z YYD-}wYϷPR"[eב̿BD>`#Y';rB䛏 {ϙö5Ӻ6ɲX>5.Rdže<:&͛ otqv9Ӗ̜TNkށDlSPwG/GfLz~Ih0Q>@cc$Tl*X|T+ daX/-A)jQha`c_,d=tmBU%31wgm W x ºgi5Rםnl ?͓ zAd kL9\R-vк̲F"T/wѠtԢ38n: /@&rn9/;A8fVrp4 p6LIfAo3E' xvpe%V_a2TK`AEJ=M,4Ӗ2ɷof-&Fʶ@ d@ Ř, q5 ^"&Wa1@p__rF 3`Y4J nAUjRBX͠w~ߙx, #nP`Q~h$`SN#7ޚŋ8gp)(e@;P0'9/ k'G<ϗ @/*V`VPwMvd8 3c[9o/aqg"e