libssh4-32bit-0.9.8-150400.3.6.1<>,zep9|J nC)2de9a!EjƐd0Q+҈t`S%.jfuD(/QժpL Vke/QgJ_bKwp8z*I&@6BU  ?nO+ 34arjچ5L#|;:49EjtJMBZbSD fFc{Z)#8UT_VY-r( tOz( v>>???d # /  28?PX \ ` h  ((8+9+: +>;G;H;I;X;Y;\;];^<b<"c<d=ae=ff=il=ku=v=w>x>$y>,!>>>>Clibssh4-32bit0.9.8150400.3.6.1SSH libraryAn SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)eh03-ch2dSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/System/Librarieshttps://www.libssh.orglinuxx86_64/sbin/ldconfigeeadd6fafe8dea29f514bfe78ebd39c5d89ff6d7a7b65efd1ee51855c49fa0c64flibssh.so.4.8.9rootrootrootrootlibssh-0.9.8-150400.3.6.1.src.rpmlibssh.so.4libssh.so.4(LIBSSH_4_5_0)libssh.so.4(LIBSSH_4_6_0)libssh.so.4(LIBSSH_4_7_0)libssh.so.4(LIBSSH_4_8_0)libssh.so.4(LIBSSH_4_8_1)libssh4-32bitlibssh4-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@@    /bin/shld-linux.so.2ld-linux.so.2(GLIBC_2.3)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.15)libc.so.6(GLIBC_2.17)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.27)libc.so.6(GLIBC_2.28)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.7)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libcrypto.so.1.1(OPENSSL_1_1_1)libcrypto.so.1.1(OPENSSL_1_1_1d)libgssapi_krb5.so.2libgssapi_krb5.so.2(gssapi_krb5_2_MIT)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3eqe@a'@_h_^ ^@^K]]7@]@]]%@]@\t@\@\w@\s\ac\4\(@[@[[@[@[[r@[qr[m~@Zw@Z?YYXh@X@XGV @UUUPUJ@UB@T@T@adam.majer@suse.dewolfgang.frisch@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgdimstar@opensuse.orgasn@cryptomilk.orgasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgidonmez@suse.comjmcdonough@suse.comcoolo@suse.comasn@cryptomilk.orgtchvatal@suse.compmonrealgonzalez@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgvcizek@suse.comasn@cryptomilk.orgasn@cryptomilk.orgasn@cryptomilk.orgjmcdonough@suse.comfabian@ritter-vogt.devcizek@suse.comastieger@suse.comasn@cryptomilk.orgasn@cryptomilk.orgjengelh@inai.deasn@cryptomilk.orgtchvatal@suse.comasn@cryptomilk.orgasn@cryptomilk.orgdmueller@suse.comasn@cryptomilk.orgcoolo@suse.comasn@cryptomilk.org- Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385) * Added libssh-fix-ipv6-hostname-regression.patch- Update to version 0.9.8 * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code- Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6- Add missing BR for openssh needed for tests- update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite- Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699)- Drop the hack to pull curl-mini: we moved the split a bit higher up and now have a non-curl linked variant of cmake in openSUSE:Factory.- Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer- Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved for internal use.- Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)- Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)- Split out configuration to separate package to not mess up the library packaging and coinstallation- Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch - Add libssh client and server config files- Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage- Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch- Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini- Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector- Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org- Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh.- Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling- Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL- Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets- Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch- Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12- Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel- Remove the libssh_threads.so symlink- Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection- Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch- Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch- add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch- add package keyring and verify source signature- Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion- Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch- Update descriptions. Drop redundant pkgconfig require (it's autodetected).- Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply- Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency- Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen()- Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation- add gcc5-fixes.patch: Fix build against GCC 5.x- Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows- removing argument from popd - add baselibs.conf as source- Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks./bin/sh0.9.8-150400.3.6.10.9.8-150400.3.6.1libssh.so.4libssh.so.4.8.9/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32835/SUSE_SLE-15-SP4_Update/9850c19a44a9b3ec779ffbc6155eaab2-libssh.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=c8ae6ff1b19fdd40f0a4abf17399505d810704ea, stripped!PPPPPPPPPPRRRRRRRR RR R R RRRR RRRRRRRutf-865b665b07cc4e33577a199da7cd93267e1ba033acb039729d20d369fdc8542e2? 7zXZ !t/Ha75]"k%k4ÚfB@XiM>0u TF}!L=,2t<(NrZn5)$)^oPWm%vQלּ4JP]T L2njOMQ5lх2ũ%]YiʠrߎZ&]$BdM_.44:h Eqxow2WיmeU~EvNl~}K/reķM[lgK `%sx~<2' Z1ͮs՜1'ߪSo'"ݰ;GlV(yKɟ7ZmڔyN˜tW4{Æ낲M>mJ`ejZuOp@.{MoXRO{#!< TBDpԤ> 3;+wwwCg0BgTr^N\S@ód6W[x~M?]7fC뷨İ+.)>Ct'߈2 D]N#pH@G).n}"K~6Gj0I翴:nB mX׵]̓שĈ3>5eNvF׸ a3@:;`kLQ*ձl>R並yavn\UBpW]nfnZ/9N3`C/狃 |;;@J&J`;ݭ40S,?5/oJ>>[9_퐃DIz1^h> W1-BXk+Öh`SݤIG,k2-k6b "#e3W~ 50&gPPBSq?*ÐV<(xN"0W0r")] |jAzn/U+Z{ɷ:!Cv*}k7t `C oBА&ޓl,q'P*X4?r-(DfL#w_%Eˆ{x2:3_Bi8ҔȈeYӒ /*EFPԫlXSBu,Ġ0_]m˿%5 VC }S[G)A:@ފ|,! mY~u#ؕ>qu3+Zl[KWxQ vbjdS&o1G𥠭ck)RFH2Hb4;cOjv]Q~ȄZH+w9˩0+kRο~'U.v3Ud.+[$~F9xLz,WҚBbuZpk8|⊎Bͩ-RR ,Jn9͉܋̽PJ1lRCcW~m.n[P⇦|{2֊A#Ǧm# 2z0B$|}+f"j˜%@\7i8 >%#t`B=~xxOXB.M|􌱽L@]Tɜq3Uh^5 EU<D590-p=etA )eb %5rbt;'ki2춮4!9 >R,`## (7MDC(g# !,1Ko]aHh渧t<)X8&V>Q*-#n0@Z?Y/pZ&^ڭH݅ڈ7$nAAu,`}_\V+zK@.D 6!-ᶓ^>$7j#LS #|B_ťz,6m qn1 ^Df6K!ܡr|rD4Kǁ%Ԍ6tOu\;wW Y8%nȅdel226L`VBNsB%õ>6%>752I;sjL-jN0~W{3a%Ʌmⶶ) r*Wq -sJmRo3G8dΠQma%}%*EY}.CVUT`|r8h-S֕Օ-U&p&bt8:2OЁd? %{NU<};Wy2XJ&3b,z.#ZhAwyv8ϴ#4vИ1s4Ko1]Vbw3'$/85M N}kNHIRlIPf4Իb6'?ĝ4^F~'qS>6|mM0$M Pb1W:giP4p!⺜n$ x/Po|v~GJ96ٵL ong+R=[!`Ћk̹,AH<U9a "55$̏|zsABӨpPn7'1r/ >=7D*I߭h*&Jǩ,j䠶bi{9헦7prZt\ֲ q}i,.C0I7Nh!E3chf<ćJ$3QNQ INlrOk։:omH8R?3A%/~0T\&D  (]e*FAiT7 (?7%sbjSsc|a.n3 X}VR2 m7T*&?z G?I9)jɣ i Dc=Ķ`pApߙqcrL*LғsܣǦz^aђ = #R0r%RIW'2F!\}R~ra{0eـ2doqGPY{ϸ2H(2@ߥAC*uWd5$h3?YW詨w^֜eoX$FBUu(DgQ {Mő2;}mp23I5k6U.;~k'tf Jc,[Zї˿ƍ=?1RDxoA$yl!*>.-R]W⧕>$$\. -"'fͤoGE NHBce¬V5Zx&9fN sQKޡxXta, Si /9$^;ns+@ 4w_ =#~p8"qt-]✤V{K&"DT{Mt=شŶ<"hGfsEʫ14D9ҹU"g PMb0F+GX "h Iйr͈؂ŜJW^̱NnOmҞ@C(VD׆sonsaF@9o]KnJCvߍǓYS6: 3 &'p0!Yɸ{`:hJ(I5fTdZhK!VZt8G焷؄-10G3@`\ *'N,6p@q@@dZU\ ѱR2KPı?s,ЪN9EvˠU"^\.p, I.EehY k2\{?Hc(Ti)hR ]l`'u7}s` Ѵ,P!{62e%n%Pc m@dsd@_dhZY\hpxu%~kzX8Z2fTJ}a ='3CNiԟ<`&swn*YƷ7*4!Moxyj뤏VQzMQo՗Q0>KZv;N::ΆzumfMdn|}J \ ):W2ᗞW݈xWs*j& Ga{7q /7;Z=[96I {`3T;U\'rv,2>DHO sE{;hdk;j69=1 ^ #mշz;MQg05{Z?%z5YX[] ?%0YsNA` Zs/Bⓔno.2P*sS<{(}\7wy>t.Q 0JfKq"c~MM{?bgOָ0G,ϔvMK NTu!˩9 gT%jѿ`rb.羌ЛbC]J0ZgW\-$X&_&HwMӲh.RbpYҝ zSFM^*cԑR8O*A:mJGY1HU p&Vz#wouW扯Lm1VmN+mmGm!3qtۥyw-L:lݔ\0iy^cI/oC~*H5voU/E)lɝ\Mǣf 0'ӌS,|w%tSfք^^|J_t*gRU{L-mfex՝BV )r4.i:^ȏXt iT՛v úK9n6m Z)\+U7C*)JbP)""v _xz9?Gti9"H]52ɢBnFۥ}UCP;pcj4a ݄`lm㎊C/z6*$mOdp>{jbG[Cl VDR UgQȦ A3|L!S1/xF:ށ2Jx3т8g M}TFy2iS{~9$`8.¥Sznovld*xGmgC>/Jc)OX r '$m`%A_#j{{"#[:ѺS-|E.%m~g |i̺be~~VqzhXP-iJ^cӸV2uƶC}Rea>1mqW3Ӟ/0&( ZHL@=dszQvbEj2G\DG`DlQ s?M/)uvVkLe? +6,/94dY ]mf;R"yqw q ֒{_*tA3L~6GpD=(Z4\5i7,V;zS.b{ؑ͢C8+9% u{v6 yRX01V8= "::+$⁙^!?f97A ,;W[.CB[/WAhK v&>pT.h_~ITb]2)T6xoe,q#ED(wBL,dž&#sMسJk9,TzT^H(Ѣtt}賊l;mոrg^θb?@{IP}|TQ;&I=ʫ(ےY*xza<-a!|c?PЅ̸j-b.R, u!$E2zFσFHXU5q],X3X7brg;QƋ1|&>jɕm\Q~[/-4:SN% \g}:8S bi0)=36U%szo aj4}=oP2w*=~ha Gfٿh]mk,>z0˃[2WN%܁7p^ns|'x>mk Pʘ,q>*jBAKuyi.߂'"֒r𝜵?*WcҁE4T³wp> BiCI1! ˪^)j*@~Pz.XD͗Sf&nFJ(CBrN:i'OLamKC*$1A'm}VI#k?-gьP ` xdZU~>n]F+OY/A5R,.{8tYU8e+>`T:vX|j"y`CCc' 5r so˯﭂`F*$HDV}qE3t|u;X( I.^ N[1W6~Y'#6Y!n?x|д-y}D&EH[*Ƭc="⵻ksI1?8U?T rvP,R_Ɯu8FlS<^B-Nq-So=3C+e 4/e wFYTa . %dp 1řIv!8]5Ǣ>l1_; tEeeJ+0橼wLo~?䘫mSL0yLHUAǬ4WY$s6ܔuk`?wDi6I=ֶkX͔\̸Aёb4OUUwaB%48nSP$4F,8FղgOΌT%.Bu %?z*Wqq>l'Wx_0e. 9H9]Y!>5]`n)|Fz/xRߐ+p֣FHis:`8"1ѷ[lp׶c\2S1( @4epFأ{UxDd%Shp:uzk]𩢥mzXiV4bwNaT}nG7)yyK2k?mSgm~&=:fOlRTB{8vޑcnޝR"tB:|Z:= I)^ɉ]c}Q&r*n z >{^ ,΋1<*(p)$m59<Z'xۚ½R.QO>ٰx{ʋc]~`+9/0 \B9vl s=$7#V? hwǯ*˰*V3BI-ZPVHFc2*}3ѶoU,-9V:ϻ0/m zCU dZs>XYp!;~60C/r{Ah<鱓#9j7G`2`Z7Rm w1՟ cL1Z"7%mr }4 pCPbXb׈"J:8mb8@ԁK]Q;q{U3]e.3{< ] P=j6,wk9>UXœC7 ՟Wq wzaR:wFY.vl.δ2 #y6-"C4Vx \1^g?C SㆿMN泤Pk}8/ĩ;dTH+h1|D^^&ƴxIš,Yu27 ̛SA[CL Ro:k$'>QM̾Ek͎A hS$)bV+pΦ Cðb񗠥bwOdzuԸgw>}`妄ou?%2`Kˈ1{=Z"ݠCNdNCR5` ʑh{r0 @x^;hZ[V["1"b upJ݈U1,+#nv/VrɣP_O<Dm~0MwRa[th#D ZvuVsw~: +6ʿ$͞l=!G]ã樌3FP=Y=W`ʺQ *2) ,ND)~P< d!AVX?(Ëa)ا:b/l^XGjp TDUxg?ŔkI|V@~ˎM'3?GtSW7}R縶g;a9*qVSlNq[i^)YɃTԦ$wGyi|7 ν!AΝ噓-`#b9aX~!aT)6wUz-{QB:D7Su{r)2ن´ߑF=l?=0P']=#Ǘ:yI窃 p+e5bT렿ے(M!Qgrk{-$M("N7Ɣg4zg+#~8t:8/LA;ߡĬ ul>[kq!F[.dz WW~0_/!)3 m!LGJ*2+.8NaC|gW|uLvA}*On:hY s K*M8Tu!+ >45W}}sr;FӴUȧ}nDV9A(vd IEP|4a J)G^ˡnWbL YZ