libssh2-1-1.11.0-150000.4.22.1<>,0eCp9|ϥ4k>a<b"C~(֛] 5VFMqfS ?0@BC~N@LƃJnQGE% B`?ȁr veEg/q5\DƢh5 W`&653IJέ(6̨-|rL_GqQKMzIX3rA5n:qexCWQhKtoB4x~fͮL29zGpT?<2gC>@I|?Ild  ! J 04Mn{     2 DLV`   (>8H9:>F8@FGFFVGFpHFxIFXFYF\F]F^FbFcGdHeHfHlHuH4vH<wHxHyHzI II I&IhClibssh2-11.11.0150000.4.22.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.eCibs-power9-11SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://www.libssh2.org/linuxppc64lee;e<67133414faa980dc6cdb9b38a0bf8e5820c490305120fbf550085377074ddea6libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.11.0-150000.4.22.1.src.rpmlibssh2-1libssh2-1(ppc-64)libssh2.so.1()(64bit)@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1ee;d@daA@_@_G@]@\\@\MZ]@YTYA%@VIUzU.@otto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdavid.anes@suse.compmonreal@suse.comdimstar@opensuse.orgpmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040] * Add the keyring file: libssh2_org.keyring * Rebase libssh2-ocloexec.patch * Remove libssh2_org-CVE-2020-22218.patch- Security fix: [bsc#1214527, CVE-2020-22218] * The function _libssh2_packet_add() allows to access out of bounds memory. * Add libssh2_org-CVE-2020-22218.patch- Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch- Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version.- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patches: * libssh2-ocloexec.patch * libssh2_org-CVE-2019-17498.patch - Remove patches fixed in this version: libssh2_org-CVE-2019-3855.patch libssh2_org-CVE-2019-3856.patch libssh2_org-CVE-2019-3857.patch libssh2_org-CVE-2019-3858.patch libssh2_org-CVE-2019-3859.patch libssh2_org-CVE-2019-3859-fix.patch libssh2_org-CVE-2019-3860.patch libssh2_org-CVE-2019-3861.patch libssh2_org-CVE-2019-3862.patch libssh2_org-CVE-2019-3863.patch- Drop man and groff BuildRequires: both are no longer used in current versions.- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types/sbin/ldconfig/sbin/ldconfigibs-power9-11 17030641311.11.0-150000.4.22.11.11.0-150000.4.22.1libssh2.so.1libssh2.so.1.0.1/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:31955/SUSE_SLE-15_Update/4690c3e3ef3d5589f213a6b5fa521482-libssh2_org.SUSE_SLE-15_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=bde6fe33c1f89dce11e6a529082c667029edf03d, strippedPRRRRRRӸpyq-futf-885d91caaac177fb82591bb2dd2af7159395313337a3f2bf58bc0d8e2e2f9dbcb?7zXZ !t/iBJ]"k%]d涻eQQG^"*@8sXPϱq=ʀg!Y= SwplaAZd NRCۿv9Hsp?o%nDV5 ݚ %^uú^  3V1o,8}M'B#1ʁ"~b r%ӫ/j:xPP ^&eGi*:4WZ䊠M2v"5a;4'`M*&ECnKehIcjO6p}@βA6~uR=cxL#lDu|}Lە(D_]r6uF'4n,,jcgӭ͔n2RhJ% %S'ـ4Q > $-M0n&e;bJ:8R_H/vЗr%(9H`V++:#T*dm%2sa"w"sC5/#Qځez7j3߶@!hĚ@/SV4>!`f&3P^pzz]3D@BZþċ 7_fj\DƧaWSӆjw?I/ag}-x͖IǴI꺫HYZfuLvsVk)Y{o崎Fgb UjQfard`J7jс!3RʫueMo͚@X  )ә1? k[d1C Ąx(\Ðq*ܑ "B-uGCYtƭ-ܓ[%ͽlU;~P$0{z}dMHjVմL8p "Y4&'8NjRsPHidh]]1bWU3&Q+ beR~aϖTBEa4;Մh:GpGNsBPyD: Papau352<˺#8=,*y ᴓ@yGWzf9ܯ&߂1|xG=:\:G\Ly|ΐI"d_-j'EY,xB<ʝ2Ä!=9R6S[$Aޥݲ1'<J6W'v:C[n/%p6iFi(u%rys"7M~6)8 2D6H1ϥzq4y۞]bZؿڭSsS%+DA9m@@?Igӫ9n^yS'J0 ,U|D|q\e2c5$[5)Z`X~;i׾NJre)ϥmÄUŽxb*!6gD}Y(w :1ݼex`mv/ŤYž!κʵvPfWE- .T׻2g-ťHrSF.K=@_qiD7V8P/XEas\G@ʩ?*6`"&7cZx8U!h&@x(}FNjح5hyA5"3*"P߈zC3K iLS) X|gώ5ڥ:'R6[a O޿F)#NX)T7ڸqc &<3gM3<AV9}ڮlWsZ|7LݜP+Zs ʑz%I`}/0kFWts,o,Ež^f>C/{W6R`tܞ`V lkgK6,Y+hyɞG&5KJFuȉC qUKP`YzNnd|o(ګ*!AԕU3km ? RZq~Tmy:Tc Aza2DT@p.srrAXGSJ:m IΨ$BT[ut g.KMd΂I2],@\Ne@ӧa_*^1muVZK0PSVCm>a\>sVͬT{~48C^VU9U%6fy"\/\ O,3qd ȣ] aL)7ǮSN?M4ptb>̬@IC>`Vzr#p2hNub 8&ZB`tFp2k̫7tFGq0iC]T7̌pYRE Ȕ7awZK@Zكu/ dbeH>' 5eOok 0Wc9ఎph`>AYW2׿{82ѽuv6ߴ#˭B&^gtݎ4,<NݙI܏Mm}FA``xy#O Bl5mF# u&d8a*F@D*BP/<֎9&h72vvR:;eοsZީal< uǁlgM͞qdvfK*u5V&=,;ا1.mxPxL?0`fR}uWDgV@: }CۨiD?[N2^ R98#ƒli]]Smq̸aޮLr< J YGxHΦ8{Ϻ,&D V߅ZWDgu3o1mhDTKA%p3^Q1OwAK#j+e+^;[ #OuD"b dW0KɮA:wC!Ln\,RՎjWJ$D ХKXYl=eH\ktCMA \9ʭW萆[OFJߌ?869F/TI(DfiUG.BrXMQq9@`vbC4"M)9dh(Z$Y 5AlggV+%*Ɵ! H J)‚x(ܒ<*d_q.M'ɪjց> jiP:15]y5oRth:^!9} ])q5 x7֔Ru> #{qq1L(zUdЕ˧*&Rc~;]sBFc)d |SU%Z2-G?-,Kixz%PيhfI?Zc][6v.{Eo;(JU-'oU˛b,U]+_dDRšTcv:½X-|ŅI'*B/wTZ~U>-y~L?+b(J&Depɲ\OjC?ts7zkHsXi7Uюf[uipj}twP OgZX]cӵd$_̛ۅu0-uiLe9LmNXV1$AN& ;M'u2< 1psɼQP$>'#&4V`g; |Ayn4}̸~rSC8֑زIB&dۤ^ƌDњ;t8^,FJu+b7j"U , $,ULH]rr14Vo44;I_x[cjgỔ0)$z=&;rك\+7fr=ݟA8%&m2i4BtǶVu[}QQ=f-n1^Kz`qa@¢@ >RhxJoYl3 , @r#66"EHAwt)I pEpQD rڐ֤tdDԆg ]fۙgQ|h+xmS#%7T,:9r𝀚}VOcKM1ik@Q' [g+Ј:t*UTFۓαVVۓ> \ '"!]gqJIay*}ѩ&h8 qd SN}4 !/ b'I`m٨X(FfS$!f5r٧õ/ɷ6Gnj|a-Z$ِj5~Y'U`]#>ג"h*7϶fWz0I9j!% ]S8 n _ C(i8Qa?E!2TpZ5}V2}t8|{o Sb 'ָԮ&)IE _e{F|Rh<@}L&:A#-䤧Xwzۂ wh5hRB< :L)izܹ݌Dٯ~; ;I.dK,=vA+>Xjc FGD0/7"ocve1+B1n~( irc\=A 25цJhQq)fpt:v_aQ&~U[#WZfwh4b-׫UQ\5*-wy͔[xʓ(sRN"F3ou{7 kOg:9K y)K= hkʅ(fzR`iR_Zh0\1yzmYIA2 )R&"À}V A^m3dmRNDc^(ebh밠w y]9Cwώs.-L*#.TC*n(ΙzmPs@)cӣ:s;"U5sgܷk~ÍA@mU Pɻ!0.tA;k3\tP9 dVIQ5Y&x_MUf:o(o1<lh(x3uzqӂV\o1| W- OіI|W87u#74Oy/)0 L vOYDB#>/λB>a Rŏ˿xo5;'a#Bw~N{ֹoTZ; Y+l PڿKAlC'v*/62O2Qn/K2EZO |Ւ\Pq5] d ;uHQ-Sg\)Xa[]EQb Xc GT d Mνl5+\MY_ZA^w(`/A ǣuڊ%.(|$^8bq _4l.ZDUO#?Cڪ8V;$RSJh6H)lwMzZD)#&TB6'ӧrkBIƄeTo /)S5)  `:Pi |˖<`U9Ha!YOCsV &"1{+X7b\jVqêXgL@gx1P B~6,#M~1*tfDH0쫜oYw^u3&Z2GM3 U1*A327(İppo6?x&4Il^x K%F5mgn!Ox6{>PFlrV yqgvZn5j`;) 9%̗oC$ \Q'+}C%ğcq PЫcZ0j;u0dN䆓g 9_1*kqffi2bB22(2Rl/Pf@ܓuM̤c5++d.!Xr& + @׋ALGju3i* z!XE2;H xqċpG!%h8FDEmz746([}^RA$>m)T\0c檑;DK>1E3tЉ~w%v #̰r2 Zv9S'j[)7'(3Z)kGݻ'MKK#nFrm^:ɱ,z0ZzS lЮ`˂-0XD xjyZZܧRk2SZrT֪_DH'~F yi( +IM'S~j>'gGw>v ;Tk~),^7&RJ`|W3VS4gĠ$~HM Su bWǷ$,ըqyCX0ŃBe# jusayf׫=}q?pR"(PL]> ]i ƴ@N钲^hpnj(ү LOzBHCMD)x%ӷV4 ʸ_Π1Q NANO97M򶿘H}>WSQ_ X |h6~Tp Q -m5pvE#;u^ 7`8ghiVY~Gt.Fީ(H aigR^Ix/lĉ?3h^?^ϙnrȇϣɬ(k!?.*Z>-&K!nA\a0ǫ-o0 }N@?pC#qJq"p7oPL7.Pvv pع4=^wr#A)aK\حŘ>.ߒBP討 ~ؔ٨B|jfƹˎ8 O?8(#N%?d9lԭgt^Cu7JTa/ϰ*(\[+钿& z׎5d5~M6;-ٽ҄>3t=tCD54+ϯ9ዘkB,|RzyOQ 숸cU:A ֲՌIR/<ԅ"w#k7*raDZw k /$dz;n{VՍZr?z9vd=<I*A"ɭ>pL)gܫNG1p ^;^t,Bˢ$3,벹>y"a^AHŽ>'OZf9Ӈ9%?&|o6M.7,ɒ~ 935 #g[{LOa3烐3?(t)~RœٌQ pR`\*9{XOֳu% GD "T.L (>!y4(惨; W}<#(.TU  LIä$!Z%fCbn!J *M'.'-$ G4p,9Sdn JaJʞ (Q"p=wwV:\]l8{N55PP ٍIk^*&XX>MZ%b(s(]* x۳3w%Y<9vUSta:_#lG6fi8Q.a1MWQlX˄D2A#d:q.\f7z8ZgATˆNuX!.ogxI۫xYidjVOYy$ ]q8փ؋mSNqKՅ#;lΟqm苋dˇ$5Z"N*)Uz. 戮.$5ŤSy4F]e(ߥ" *7bEsn9.M[zzdťI} XWg3Q&<R )ie52]2 On:+/\GLPIP*diu1{5IVe8jh OؿRCkl!H}u۪r*PBV񈕀BR=b#){-&cJfu𹦃6۸˶Ot~֗NstRJ֙ݙMTHjO+KeZ F]!Bh .cj^Bue;ǎw7Oʁcp.]@,zȖᝉ L#ٍ fܰ Nq_ޙ%Կm{&8IߓOq}q6uiIzlL rSC,;R0toJ<6&R4A[swcBC>g3MmT)$g DFidĻDƵUzEK6"}P-uϿ~/X)~$r_{N쇂a 8NP|:4' :+T} >=A03ak0"-},L7')$Cp$*0g+V[=]87U[ 'HIg׽ED^:q6,{$/SŪV!5|3yʖy 3_l,鍬SP]^r'Py^50xްQHvYmZ<1JWtbaK"-r.UB|<s6 c 0i) %,>Z728@}vW ֬efmnzakBd1û}HA:fh1xM>|t4b+wLša2$1ć&4&1T N#^n9bv`r)2l+0n5ow_*Cs&^\ZΏW@71򟽈|phʤqgdQPC"#-Z%\ VP$K\k zIH/w!w߅M!ExD&@. J PsWEWIxjk#XϗMsibGs,;HϲiAhVya3bkv-xrg[57pQv׋1NX[kcz g|*fד(X? Ű`G4 =\3KzN={ @dj?WXV1ӌ.h,3{!TXD={6HYE-zQZ`_b6яYc+|)0Qiaiò '׈\j6k!@a :);dJډ;s`$'Xۿ&es !V$J{PON\ZHQذiLQJqGy]JU`^mu\eMyxmC8j)֭?0kJSgҟkCoF4kB:ԎuXlֵ[psQ EZB.TClMl*Pa/ hքBe v@ey*OI0/p^Q]@G!*{exRmrA׮ua>oyJ ։Dm(8r#粃p\ 4fߟf8x91N `qeE^D(}20@ImgfҗJV‚4?7z῏8$(E;rt7Vd3Ɏ(\N ѹ- _ TC9k^VO~^D ս;~c˿*ccĀwABЊX00)Hm">dlM{D7CVcx*&T*$Is}vѵrkCބja$quj_ m'$xnU#gAŵsvL]@ ºYU1$6^g 3Z~B}Zhw,oXD)#P.E;эd\E[#tpf{RԊBݑXLRܧ&I̓] pD;z+{gu31:%Ḏ-.87^{H{bS$õ FO,Ze"W|AD8DZZ`5ꉩ>|{k+L-oium# 3̐"_gC WȟuP|=Rp{C6fS#ؖ~H:WF4*2{!5knɧkT C KqwΌ9*ST8I6;<bqA OS6׍5<>'xyLz/,9r_@1^ f"s8AXelZ)4g8$k{#(仌qnT|>y~ ;DtThn뻼I>u҃ (E| >.Ao̊gÀ#t;d,3.[\y{VhܫuSԉstcW+ n;W2Bϼ -re24*zʮT[#V7bd=7b\Ț' PKfm?s-?%@Tn} 8P4%2ۥ8GYk<1d5" .HJ(| iRJk/Ymw910CL\>l2{DЈY_%Fx{H<6Rڶդ"z's+t_~^^h+4SAL \lWٮvTнwINZ@5mJsm˭BUbr)#`=wL'~3t8cj<%@jiq|Qۨ?)Zx2?!4X~bb÷ho-p9Qt pߛ"u}#cA&ޫ Cm#&jLZFN''P2Lx|XU̸*\*[y-}qЕ |DS A*:Լ"!~+K,tɈv'>wAr)ЖeJseo?|2׌H?a9|p U*_2! e!SkIlIK cbf<5C"mPh+Ek up:3EsQɤky=bE!AzdEGrXKK;EYZ5b1 RT0&^>O6F eɞD*:ߢ(sKz\nR(>XO;×,U}4lO̳s,.O'fD䋳y1Gm//{@5 QяE{?0( pٰ\&M?7tAe$#!%37du>e|+qjvs _g' 낒 MFe Nh*Gc_ׇ;/{p@fdtpC< 1b `L ލݙ+g~5mJ4Aڣ<Cup/ԭ'E<Dc!,-B΂){JG;'u$=1gAҜy 8Bulnn^U6cV=ggmGc<V0%t (Qn *0=_JW_)bs96#'Q mBr4 6NO3o$Xj:mYGi? F͝J4O @"_" ߛSdi$yUIeZNdO=)-ecyseEHj_+ƅqü޾8ͫ,*^28U~ Rُf,SN֊*>3_ě*'/\~im^Xζ0+iߧ#4Jy4VM>^pn&!|͑%HKJIu$aDZxI˴$ WahFλ#ڮj>؜ig=X@Wjf}+e1ɑ+/dn#qUѪX^q_g(L]N?;>i~c)ÁQI"bT?['c\ YD@='"#7 = o(B ,q23W :.MI" 4? WڎD2EFW9wn'O\Q3vXUGgדѭ Ŏ,y=R`apZEngXM2T\yaƑ( P~`DojtZB2+K^dr -"o ~کJ3!!٫_Eil ф̆UJzܙL~v@moLgr[;h.0Bn.'zևɝ>F=fd\c0Bfr8f Pk dn1*)i4h3Ӕ{0,1T|;f>C>GH ;7sOcV:Ys^ px`( $[4})reō̿'-ddUBZvwB2Z"mb݌!oڛB<_`Rr E kI0(5gު`wVZh!hi;Sݍ>m1@ȴƎ.:0FB.$sSM_bc4 &a_r?M>aÜ*݄wm٧St8&dȨиtؑڬD=N@SlXڎARɮYo{N/ZW&ԺV$g !vQ1W}ET5q\!0;1D E@;Ʀ-󵥞M'KEfd{K 78ؾ-AӂS*\ɽh̢$ *+:zt I$-74vx.Z|sP<3WMQ\U'p 5N8iq]ȟǺTcv M -j2ݷt`. zSCq2ttN^&=>!z*7&28삛Ajvyh+8"RhJdjGf'iRxt8r+Ji=S0.5&\尛Ί9 5YAM$