libssh4-0.9.8-150400.3.6.1<>,x|ep9|C./:7f2`NE%=킠6dO⭂-!(4ʢ<0qh^r R`6نdmJ}Hf>鿷"!oxJfKWf k#T؟99Z|k0,<՞T+ߥBQp=2@ >DPf#ʻM Mp&?Z6p]M@=ZJe,8=F,, "DH-b>ѱ >@A?Ad   ) .4<T ` l   0pf(8+9 T+: +>=`@=oF=~G=H=I=X=Y=\>]>0^>mb>c?\d?e?f?l?u?v@w@x@y@zA`ApAtAzAClibssh40.9.8150400.3.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)eh04-ch2aXSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64cA큤eeeb;eyb;ed8de1de99dac250a47a25048e9d20d7af1c00f644da7962d7ae8f7e1954ae5295b6a58ab69d7687d9486b4a859ebfc00fff25b0942cc51239ada2702ae69d1b3c8f4a21066d2e1bbe8dd80c461f0e67bff300bc0173b5592069594b14cf0f2a6a94b4bba2afad75a1cb7fa433559babcd09213dad861edf62177bfce35c17aalibssh.so.4.8.9rootrootrootrootrootrootrootrootrootrootrootrootlibssh-0.9.8-150400.3.6.1.src.rpmlibssh.so.4()(64bit)libssh.so.4(LIBSSH_4_5_0)(64bit)libssh.so.4(LIBSSH_4_6_0)(64bit)libssh.so.4(LIBSSH_4_7_0)(64bit)libssh.so.4(LIBSSH_4_8_0)(64bit)libssh.so.4(LIBSSH_4_8_1)(64bit)libssh4libssh4(x86-64)@@@@@@@@@@@@@@@@@@@ @    /sbin/ldconfig/sbin/ldconfigld-linux-x86-64.so.2()(64bit)ld-linux-x86-64.so.2(GLIBC_2.3)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1d)(64bit)libgssapi_krb5.so.2()(64bit)libgssapi_krb5.so.2(gssapi_krb5_2_MIT)(64bit)libssh-configlibz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.9.83.0.4-14.6.0-14.0-15.2-14.14.3eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@adam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./sbin/ldconfig/sbin/ldconfigh04-ch2a 17093065970.9.8-150400.3.6.10.9.8-150400.3.6.1libssh.so.4libssh.so.4.8.9libssh4AUTHORSChangeLogREADME/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libssh4/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32835/SUSE_SLE-15-SP4_Update/9850c19a44a9b3ec779ffbc6155eaab2-libssh.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=bedb755dc0789d155ad81d0582f545209536e6f3, strippeddirectoryASCII textPPPPPPPPPPRRRRR R R R R RRRRRRRRRRR|c_Ma(w1;utf-84de4fc3bd2f5ae6fabb02dc679a2bc7aeff5222f6af9fa9a45f2c901bda19392?7zXZ !t/D2C]"k%wd涻L,%:4;S5j8l42rن=PV*^Zup)Ojq,BU 76K,y@'RܒLrJ5($9_Q7>헳FXC3rLF$oǕɷ밼_4&GmYk9FJ T(?-@|Tm2;YI{k9I3/-Cn?]ݭm)m~#Ve<1fOpYd4k7w- UM*5d0\:`I= z2kMT>a(D)g//szrU/'V1, ,J{u]/PP猙1r.r`MW4sLi8#,h-;1G)a*es ]DJ+YܬCYGA*vߙBaּZVtX#mql".xhձcS}"bW(wUæ.n{:iE,hB& 59A|LNIBޒ.F4N66j$N*g܀ ~7KN4uxsn&T8WS7:;Hz4HXu[]_-brDO e||zϐ+WۅؙZf&|Ξ6PMHQa0 fJ -}{IOpe͐b-a*(!UG njŞ]sj:1͖eyfS~"NWP*xF-Bz~ꊝ]=) f_a9BA|uPmrnx^Ztr#|9SAl_xVJ!o/ Bxʵ[ǻhBdV UƸ ‰imUKtn MA0HKwz#j [(ќAuo5 'fh]ΛvmW9LP G3 nT`x-8W7GA6ڧQ=4}*lߋCtb`{"A4w%yAfaG&sslVJTȕ^&W ŵ!ֺH͔-2˂Zu3g =V 5 иhH+ +$F% QZwdVmXiە{F,͞ NO0RӜI(6p`r1AH"5#w45$nO^ep[€%ٯvhKC[)ż|% 3s*k饇w@c)LWcRB (6Z6+*iAyWcHhӴS-ޙ:Ub\&zzh-0uz_huP[Uz/2W dQW-݊n Ho. 풱N;ZcdcD!IB y=6suPX&ai!0d +/!5_G5*t=*jrp'S$}e!e#>hL\E_M~mzGf [D* y=_e@8i^7DgB. ;mdK4IT[$l%;J5EY K._4}U1?wT‰b&s6صū;s]ys)T9}޴:hIf: |WS_&a&YcSz(+S ۱m=ONmw.g芩Ք|f.Ӡ:KDM߿f6"D%Ң3-Ik 20=9vֱm'_ڸ߄ZzOװ$rSo,?~-Oԩˁxj/ |n=`CbEy:cʼnehsgrat9%/ 4f0Q)B %2 ^f }׍k%. A ,?n4voRIX'n[ؔ^A' p}g֐б-6*+53VW8|DP,6|c9ԅ{pyZʟ&&{ ~*>:*1+C) ^Uٶ>D?QU'<[FS "wz7hc &!I`N^ӐJZ<.WQ IX p>@N&eƏ-.sAwB%L8tFoe1^a@S=x#G-߮qQJ#ӥڧz6͂tQxZ1-ygh!8hYɀ?g$[q6w*^kӃ{n8;)TC1c$CN4C[4avG\/N4_5?xqcƕJcȄ"B7]jh ܲmb5wsOWCPBKVa_8 Si0qMrnk)*hm=fZ}56ܳiEGf1 6MdmZNiBDʿR!hG83 ;KCu(PpPؑdgp|ޖ@2~l:Fue2C EzRbeAB5O!~$5y_&#zzLKrNwj=zCpjlc5%1ưuk& 4c9|fk0gggx)‘q~h9 z,raiTJ#54(9~Hy )#"'Xvm#+~Eؖ,Y@8!*VϽ`e3y1D_$r=7']\i0רOF`bg:Z-UDO89x4&Dh`6Ij b^>@]+F9r#vL^#.РYP5E nV?m,-u XiRᄒf2v/wNpEr dO%>V Y22 r _ke~FƳT0WAbM uK*!؉0U4:c;mԶm}l U7]=pF-e*VWg])ݹ_Oυ۬f:ϽNg[b?BS%2|zf6e\SG!ʭ[T$글U!Vj /:_/Fba5QB7>q 8ڃ0 qB?YƱX^xo5Er%=n=5#xJ v`D'}6 g[dwn{cHZ`xϰZ Q.s: p&bLv Ph⤑oUg!U-#mE;r>2|Ӻj-4T^,U1|V_HUx ~8F<9A; F6Cj@gH<^1 1(˲]yY wY>@\EB^&4Cs[,m )6KO# =FmR?&"_aeįcLi(׎v ZlM#YߦTE^cg>T* ('^C6$LH{W|6=`Ԍt:y 8lo{7l?ʽ'&)'vKUen"HqAϜf |XBn42D|D}{(B 7j,L$n}-ETۈtúIe9oQQT{Hܔ1xC.3FIn,zq)l}yLHb(w1P b ǿ,- tU I|h+2P*Idzve[3&ѾתqH1\ OuK ~ҍO 0S9M-CKXc NfP bvmtzIF+ʿX -lQӫ"t4)UMc̆qvT1Za&ORE 2"gbXs% 0,BI<;.3A;=CS]^Di61쉰ޖ VIOb*<=K|➷b[=U<],02E̱,u7FOGDz2MVvW]!S[^m*°jm3 eD<GFnJؚ ;,8yd>8# RE`9Κ^VԚvE?R+1h{ ~ V@6Yn]ghqHf 5d@U=ZQ\kRn;?{H'P'` xHiT!v|#-d0|t|Wp``cbIװfYYa4[Wrz{3r[~۹Uci'^uq?CI̗ge1@+SZ2FaCo^Zˢ MG-!0ʁ R28 S c5ޚyzR%= d=F'Ʒmm%Y2 NԿ!t `I#5.fx0##h{ Vϲ)$ ~_|E,x &;,gv8s_PUbWh28n Pj@5 G~-*G_jJLf˛ewT>l/@] o\C^ne ~eeurŎRhfى9y;Ejn1LGMg &vA!v̧b QJ^{g5^gy,͜ubr A0ZD$its7766BGM؀A{ZAo圯pΛ,<]7EVǍ`S[vyR7qd7E@H$l$ʮ@P}n}P8dPFKmH l"0ql:G}Bxf];ȫRaI`* (; 'jб2kUiWMJNѭ~J1ʦn)+vS$ϫ6s;ژ|p e0pĄ -7I;Ȏ^WC}}MQ$2)?-յ./(h+f*4 K3 _="m|6mcujY,1džKGds?&+QjЛ5OέcmC׉9i`0*&R[Sjh'у@c:xKv|sȪe2l7CQ~ A8L%VU[I/t؃or秒9ȯKuϐ)Jh^Ҟi&.)>Pq["I:^b Ϡ2Q]'VÌO_׻+c%3 =M SQ{m #EPYLV57I9a(.$DJ [fe8J|.`Q/x;EDW},{$`nyM~mV2Ym-I|lO[6rH>Xg93@(YOS'Y]fFvTdh9?r)-v0ʝCtIՙo3Ӂ29_5̡%[4Aw'Ii2 +5`C{`0n/O|K)I@^I{;~< 3Kx@xά(436.6(^NfwФCa`9b/nD$ y G6gP/ef!G-!n%%_!Yٳڨgr2`Gh *^0$Y|%b)@+ Й#Yd@u\\b%Uiz'ܝ= 8 )K1RU;p=z%E 49l1"ӡp}.p蛟quջ bY)Pcf:!( 9K |۳LIi1lۏ%aB?/S"_Qq9$_J_̸{d*vl8H_MxkTRcYX@8bKRݏyi)덙kh m5JkgR_97N8Bb#W/۶AsiTTrԲC3PK?y~M'p/fFDeYx;bgxORBG4B!kޠ4xX\0̦ұ6dS":D8UeZ*@ 9Eh+0#DXmYι-d$E&泄n"70^\Ӏ8z+h,'qpzp>ѦCw 1zpT?]\1t~Q͇PmB^F S u_e Y )=V#]r=Iyobd?D?r]3׻_d|Fֳ8YR[=;6bfݸ6}7c)B-Bsf&PK0c~u$+ Hb r'Q'c`QP~4SQɣ-T@qs6_Բl RFS j?WxV")5oC5\PHCd V-^Q=N?Iݻg/ihb!1яnr\{UgXLQקM\m7Bݡ\Gxg~sET.͂!K eKlZ@Z/M@x |nh{7sN@\W AɨHX$DJ9z c|4E6vF,4(Io6{a[\K?ԮR<΃ `gq"<ɥZl3¨UhQ_4R(9N{6+;ȿvP~}t&N*cАp3qnc>$+7ߠ yZq} Xi\5LL Dvw>َ$N˱ǵG+Pń馯JnKW!d UAc g;=`} {&Q׈tlwESI^}GpR䬱".2yA`9H^(kx@]A(*\GN9 &g#tU;+2B"^ؤGM ne tu긠&Y6Z4ѥ%A4髳%|jQ;Xx"C>" X9^!W* >"A5y?rd&h)aj ӰF7x"E)NK=r' Cb α7 `sPí:B}&cgrAHmҫ4Plp` (vɚX SPzJ#R7釖C%R oQDFC$M%ͅ}'=c&rmfсrWHА54!jQ+tjiaLJUՒeإ+S5s*F%&@X\