libssh4-0.9.8-150400.3.6.1;>+u4ep9|+0 xR1YlF(jVyIwGqE;R!Xj-kFe ZtГxƩ2opW34LlTDĘ.\51ﱤ!!q?)! o-r fk}Ӄ Q*ljИ#e@En-umY3Q}1ˏ=K~Q479_-åx!RpG_>@@?@d   )  28@X d p   4Xo(8+9T+: +><`@`d>e>f>l>u?v?w?x?y@z@`@p@t@z@Clibssh40.9.8150400.3.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)eibs-power9-15 LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxppc64le 8cA큤eeeb;eyb;1666330df961f29135007854d198154753fbcfcc71e25068efff4ffaf341287395b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150400.3.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(ppc-64)@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld64.so.2()(64bit)ld64.so.2(GLIBC_2.22)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1d)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@adam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigibs-power9-15 17093065840.9.8-150400.3.6.10.9.8-150400.3.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32835/SUSE_SLE-15-SP4_Update/9850c19a44a9b3ec779ffbc6155eaab2-libssh.SUSE_SLE-15-SP4_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=af91828305325f25fb21aa96a7d14c80da68dce4, strippeddirectoryASCII textPPPPPPPPPPRR R R R RRRRRR RR99IGutf-8ac7827e04a1598e79d390a9d3f716dcdc5602c47d680208f731f58d703276ff8?7zXZ !t/B/]"k%wd涻L,%:4;S5j {.y+ԅn5| uTw'p>Jz-nۄ i3bZGql<ޅʓEe!x%43u8{E M&Sܦ[ıp8 Щ`,o3zz#vص5fdu\D,ҶPЍ聹3k^aɊ˯[˃nxȕ #}L~EaSxϐ@V~&gyG>u58WLՍ=.=.Mo/?ѢH}sWGs>Q^;HW}A{7-)^؈H } +k+4+͕eV;ERFBپ⥿ӹg-0&Ms.b)&RAoudnݔ~i9E6EU+I؅f.ʆYqwja3lcc i -hg6ߞ׫\d췸&}nhue,%6ez6*p4ܼ,>0~))=t5 W`8WT@g({Qhӗ&_E\lo=ϙ *Ph;8tP^j4g5A]ʈL4HO!]M۬۔R (J2\6z۩R{/?|Zl'3jXyd2Nl&xOeh줟Rd Gί!G{}#N.>pbߥ̛i7r|HQ)B17žed|ya;f?mnv!&x5r+?1˫٠̴y}$yM523RzN9&<NNM4"4ĥ 5Y @T8sQv"p1q\_fQ!٩kAd'D ϜzJ^?*.gG<2<4%׍K20EF.Ig;[=-BsQSFd'YF b~;G4*= ;2]X&*!#<б4#XW{y1'ǘmoJcmOx79LhWdFk(?0EnZVs\:j5mvr;>2@/L,MGКP'h i\!s밿|!)@Aq2Q3DjtW^4.ԗr<1CdԔ AriZ2n驁OPifyS;uo/uW ] S~&ٰkﴉ*?!C-g[g5jVjp |`;FB eP<G=ǩ'N&|Ӯk{@>\y }C N NfB?m8VYOhC_NB.4VTPXͫE~&`w]6bf 4*ktx.U9?ƣG %UCʆĦάНBس3~+1R'_|6vVO_%DYfC7faU3=LTTeԿ{ 4pHۯO`hQK9#[@`FWtC*.^;_|"4GxjVlr TeJXҺTcY弪sI&N/W|/-N T=.Yޝ)w5ڻ7˼f큛A5s{( Kx&edȍDtcC3p2㉣64Wt꒣^[i8~+pxjJ;Mj8%{oJ'Pc/;QXz$7}/?yKS/2crwUSݷsTOyۓ DSTyLGCC5lDCu-L]&S_:kơM%~+Ņ9磒/z{Zf6M9*-of"EEϬv(+NjRE$2(Dsˊ"GoPo1ɷˀy#'$U!í"sNBd ݽ)$a$T /%EF4P^)F=bDg(\\ CZwen9p]6jk<Į 6#(b4;I] yE{~~)EJZ Eq=>Q9:8\d\ST8>tI鳑  u-udzlW$TwJ R#jKAP؇־[;zGtf)@OyJBh s8P $%,T#xlHQ&fHp (A=:2T6@k(DĎ->$}c6S 1qЁ$M F͌JB~Q5ffpT~s_v,Os_ "8_}r^H@}<IS;1!/=0NK1Ա٥g(a]mryt4?ٙ0TnS`29X ԞəR-~5eQD%\o1 5n5 i2Gqx/#Cz F˓S9~eS wus=y +ťfґT;n/@B7uK co} ̀p=&Se$-<޴)In6FtN= ՇߖD|t3h`-#o>)lԢ6 SG H:(⧰5bR>=χ>%x "AgAKdlqK*AV;HqiB` Mi!S2&kٗx|T] ]d1WJI5z ދJT]y3SvZ:f8zroLV8{F,|#pV٦oK3]ƕ~/hBqO??h9LdIŝXdlPO&vĆ>s$O폣uk[@=M8>iA4n) jDL1U'WY8hlP*yލxu=G)"k$>#e` "$ȑ/B?CWHC^ozI7gThM a6az9,KduNӡEFy&ӝv4ۀy?Q[߄ sޚUCnH0WhЄmXf>s>iE*q<K>ˮn|>b؂KlȪ>wZd4#N+0k4 ʈ_Cc _7siX"֒WO> ^^V Ad{A؞iRش]yp]!Fׁxߦ&{`0iW#czTu E%O;\|q 80 OP} !BtR0*Hg9"ˏˁ "j,A~7Қ Lxn]c I"Ey'̶hd}EMVcxpRGqB7'yL9+.SS=-GW$C10q'238=1mp;90(`C?b KqW%pi j@ٓ<2Kdj>g/f\\5mYtj;:,FOL!8bc=4Xc,l|&[hMvu'777[*J=/W9<{7%c2gW{E/>w@}?9Oi6V$v8F=p8'vrGDeI&=2I-+bI' y0Tiӧ ]Eji(ӂr74^/M&SqT}H0.+|\͸]p8pz0OreC`) df]k3zccҧ4Tl>ZTA~PY |OPLlExWza=~Zz̳>hKFausK+Cf.LJkqJ'4V}J=ئfOH1Ѽ[m2 _Jcy"iE2CVV/~ r[x@ZJ} /D[1)5 jin?Bb8,j4nߤ|⏉5W9&+i*@vVlLbBd?x&/x`AV7lNA$=R- yWǡW!:}:/A:vmÊM3&9M($/AxZo:`Xwo!47D{%A^O_ FSfar֏3,&xw_#FUn67рlO "ukęՕ0k67%B0?3Vf!lf +`ic\(-{S R}ϼB=f+O+cM:R^p9oa JԴZf=RFWx y"$;:l}(Hp,Uua=Ah"#~ix*y,3V'>G<>;G*c!aCp.M[1G @9WB V9\:z86T [RO]N g$3]56sK abWȵ:331ӛ( ˁߕYF9! -5ŨY?,n ? "4[z #"p&gg7.I6P5BqVtrPBv3Je3Z&_ &]9V7U.!~,pZ`oN+s-z1!MiCnᤍT!quTp"1|˯WGﲕ@)^m~SRw|gRV)_r0ws/PCVH*x>iJފE;<Io SjO/XLP5K C*k *ud4=Q_؜,1 8ҧBHݻDjc] M`sjaB/H( (eY(2_ A?_"j䦁ݞ$W )ZWe%qg3U-BXߟay  @%QU&e[~zr.XPzsI5KvUtQv@ΠB-*?\&0X58,`~O~hŘgx;NG1.Qw[}PJ$2*.j-Ss wvA/Zş7#K)ރ7o q+Qy+hy ;Agkkqșw6^[Oٛ?ҙZ53x4'~eAL\kAs%M 6-!d7v%= &s'ū] MzP2;V M Ī^\à̴ 0\tV>+f{4QM o֟k:sT3rDo*1"PINB3s,9RpR9BYDGZh س 𘻼/^z7vgy¦'kYaL7V΁uKJ{N1 WLl[ t6v o}O'T/PK_Њ[8a@@1U)`Dfq)k/?Ȯ=AAӃAv5CG%ّoh&w:S&KjD)kkʭW()<Jl\K¤'?$OeF^sy:FweZ&`5M!)w`>L{jymlT#n4y`s;Z u)=Y+ =|v*E HY/j*8G(=yC؇v?%l/MML#e 3&kF!nUg(K%NCJuƻdzJA Aɰ P*,y8*QgP0ҕ'~@aYo[";&9ý3;';=PV;t/(ůJ՝ۭ邋QېC.N9ɴJNSЙ^kspMBq^]D<9 7a7}G"Чf4OE:2~ggm<!bݵJh{Kہ?%JL/x\NZixBA[e#a|@7sw}ޭ'g}Wk SwW2)dNE?11hzhNS eW[ud@Oxܢx#gL:6\-pӰFQsWlJW1InF7$Ķ̅[^ gL$iZh}DVl}4iHpilID둻x &3_/}M#()jW96pC1ɛ&q1O.۴b1wPey\A(9_+Y26Ѐen+Zi˙c]nXz *UU$jkFc#g0^Lp YeMQhr^ ?bi[)|RaQ&e/DИ+J^zD %P\;zy5!dUCJUscݭ]w`$?Gzƹ^J%+کr9st4d? HBJ{V0o7쥸XfoB)w4?#:x$N:4懝͌Ym* 944:/qM(tͮV GuQ^XT\.PP18,?q*+ 4T/wʯێ[M:'o\B^^$*D|/82Z[zfm$TwZm=&Pq3!R3ݓ:3k$Ǒ ؃"q}^,;'Dƒ#޸s+( +qcO`yr0ѿM# ҿ ;Pk1 zGC/7|]Jy)/l-HX}xLo>6g@B9; J@h6 ^&C>Q:Z5G6j3uB;,猐NVDN@m0βcj-v|d&@% 9#gsޅQB2q8{^;/@6g.qdt[͝.j0YroV/Dsb[LQtrXfقG{ob"Bb踛\I0NxE$(*w٠(,F֭&*TjI6 ~Bty ="Rk?RW ,5 : 0wi'$atGPڋƴ:/3 ŎFv@Ɯ55B.[BTwLRQa/t{j}`.].D c;4jЧC{;f'"DjEI&u12]㯚PHژψ5_Xa|c7go](ߞHC?c@촺 )VB"10k?±|^oZ 1$v]-|vYwBʆxS8cRk i.10Tt9{ԥ!:PNڢ<+gX~V eOx'5I)mI pAA_i1e]:3 k}Ƈiq ,n`F^\jy;y_xЫH8ݗMBTNN OK%w˦8H;AFc0tQxv GOpˢjs Gim3CN]95*%ɫX^6^ǑEc0|]c]Uh q3m%0ld6Ni),Ti|*R[VċE{RV:PtQ^`)#(wRV{댻PB_D({V7QjS:p:kHNE{uU+RH,A6,pYʒܸUl9Tó'M߰x 3?5j+ [rp:NDM#ñ?z`SO'3Be.Q .mIf^̄sUTtKplꆶlC:R'TMʾy!ѯ ra}JXh\CZMʊhR= @bnߚQR`hwy*0Iyֽ@z@ >zJ-\0[ww>rd" 0"Ŀ_;ZSӡ+fJphR=)!3Z7|'^)X,5 5VijU0[|#i<3c *ΚސО+^JP&Ҍnn>x焢$$-E3}+lsdH+Lޭ!} vظ銗2_ik~$rۃRξ_!Msw+p'tHMLE M~FCږȂ,Esy&iZe, w,{ 7PrFϊ7Ė[+ %0lRc?ЊT?grܩ=M8Ǟ 4A7žUH&ir(o lwT0 ]hѹwBEޙnzy)9`_,Ml%i\پ/7a$) -G$iLS(wg PR| ,W-" y=k~6 ?aL,#9gC)ݎ~w K7Ԉ,(Lih$0 9C l/kèqx,!G`"c#miFs8m.hIY>DCv[iْ6z]mBF+:OIVz"LC7۱Ņ lHD5 e!6_t ay~O>Ka؉6@3Y4-ӏcl+'5RgLza=]@Mx{`95(e_Nv ‡DWrRʉxdʪ֍S7jIf+mK5A!1<~W=)Z>1 CS!d$V(T$|okeov)~sΓ>O%Y~$$;sX'V=9¾Twd@E6 ^{ r* x l`U: YZ