libssh2-1-32bit-1.11.0-150200.9.2.1<>,4fp9|  :9Zd ]zc%7QcQ&(b%LM*tU|̿𾳟JgT)0B]R* )4ݓ=-jӅ80m[煽6/}\"ӑX,z]ЭtU-8:؁LX R/y8d>P/kWO  !ܰ,o]@5rv_Q5 %64z=_a 8OaCRM&b$ve>AL?Lpd & O $04Mn{     B T\fp((89 :>I7BI?GIPHIXII`XIdYItZI[I\I]I^IbIcJdK$eK)fK,lK.uK@vKHwKxKyK L L$L*LlClibssh2-1-32bit1.11.0150200.9.2.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.fh01-ch3bxSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://www.libssh2.org/linuxx86_64/sbin/ldconfigxffefef44b0f46fda847d89f552579cd29fba067c4bd733f42560eae8be9b585a83libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.11.0-150200.9.2.1.src.rpmlibssh2-1-32bitlibssh2-1-32bit(x86-32)libssh2-32bitlibssh2.so.1@@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.25)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libcrypto.so.1.1(OPENSSL_1_1_1)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1f @eee;d@daA@_@_G@]@\\@\MZ]@YTYA%@VIUzU.@pmonreal@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdavid.anes@suse.compmonreal@suse.comdimstar@opensuse.orgpmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Fix an issue with Encrypt-then-MAC family. [bsc#1221622] * Test the ETM feature in the remote end's configuration when receiving data. Upstream issue: #1331. * Add libssh2_org-ETM-remote.patch- Always add the KEX pseudo-methods "ext-info-c" and "kex-strict-c-v00@openssh.com" when configuring custom method list. [bsc#1218971, CVE-2023-48795] * The strict-kex extension is announced in the list of available KEX methods. However, when the default KEX method list is modified or replaced, the extension is not added back automatically. * Add libssh2_org-CVE-2023-48795-ext.patch- Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040] * Add the keyring file: libssh2_org.keyring * Rebase libssh2-ocloexec.patch * Remove libssh2_org-CVE-2020-22218.patch- Security fix: [bsc#1214527, CVE-2020-22218] * The function _libssh2_packet_add() allows to access out of bounds memory. * Add libssh2_org-CVE-2020-22218.patch- Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch- Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version.- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patches: * libssh2-ocloexec.patch * libssh2_org-CVE-2019-17498.patch - Remove patches fixed in this version: libssh2_org-CVE-2019-3855.patch libssh2_org-CVE-2019-3856.patch libssh2_org-CVE-2019-3857.patch libssh2_org-CVE-2019-3858.patch libssh2_org-CVE-2019-3859.patch libssh2_org-CVE-2019-3859-fix.patch libssh2_org-CVE-2019-3860.patch libssh2_org-CVE-2019-3861.patch libssh2_org-CVE-2019-3862.patch libssh2_org-CVE-2019-3863.patch- Drop man and groff BuildRequires: both are no longer used in current versions.- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types/bin/shlibssh2-32bit1.11.0-150200.9.2.11.11.0-150200.9.2.11.11.0 1.11.0libssh2.so.1libssh2.so.1.0.1/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:34684/SUSE_SLE-15-SP2_Update/46c5ea33ef99278175b344836cd73591-libssh2_org.SUSE_SLE-15-SP2_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=7b51c57467a6eedb8e8d34e5577587c4208c5af9, stripped PRRRRRRRR R R R Rutf-848c001c02829c5b48dfb8483067bf923a9c5fa42c9b5d71af8a15d429ea99759?7zXZ !t/<_9]"k%fkkd.|aEU #k]v7Vc %[1Ųro,q\Xu&SAPx?e5Oѿy`PBh>?PQO. ,]dĢ_8*u )v@iXX)o<=,FSuwo|{B6ew<d, $?ɩz E,*桉ӊ'poyJ A5+`Cy(v`"`Vrώ˼͓3F[zª褋9-QurxsX?[)Kh/|K''| ]cL%7%f~s;&ZM@˛`nJ.b9cj,ghf[&ZfhJ "t z=6(z®- hD$VXÛ~=axf%ԙI(͎ mh~;x-4Y)M\!T|_lM1Ѥ`/Lχ>M=Y4QU`d+%t #.1-9%;x2D1x! P]0EYHNX5[<<;G+/;wqz,&쪨F?iqGįzh9I,0s<,.N5%UTߗoL$t@OMv̿ 䔩"L4{!fޠ.#zW~p+?~!.ru:m9&{(yYlwıyy Vzc' }|f Q#E &#_C?4>@ZP~q#:=},-# ̉%k2T00;TFM{D_ Ϟ Ynwh{u #5 /y+eB!%)w(Il Ěſ)8 x%[`fԒM#A64N]"G《8&i͇<:QqcgKUXzn+}MVl&ݥ<9i{IΩ8UR7"U&9#]-m51C#PyEZ.JQeaV y!Q%PvrDIv6dBD~SSq%F(Q-J$*=8 f<\sT : Mp_1(vGQ7PE[UEª,r12۾"n݌c\ݯqi7G,~tѬGpe m=?%'V@HRpP%!k05Ձu?*Vdʒ,d:gXf={8 que-K$U< 4!-B$!ڊM$ O*̤X)lY[[m.bO~z3 ڪ:Hzlyv,ii* m?$'.[@gj1[r9Aq톷}z2?3AnN6{ڦ+{ jSWM:"}[v7-YoZ=1%dF<  A  ^x>+Ti ݟ R|.B|)/L#A&Pbf,MNo6RTM9 Wp6uFm,XMl}į] 9H'Ȝ(Xn·}sjX[uRް:O:C-OH7D ,J]6\I=jV7 C郋s? RyJrH45YCy.NvV b_W,K;Y) 97= q|d Oh5dfKf1*lDu<>Ix-XUΐp(7h:,ԓaRcߨ8Vid*Ab/,:E@(xJʧ.l5čDB…Y-~f3}l|*MҰ1cޟ3O3K-VVf@4ԓ7 $m6:Np5ߴ(äފaER$ *H5\5Ρg u[c)=vx45(" Ye煐Hw/3 [&hSe#UNv9]BꍴJUX>conYOWIZ Yt߼q`?_nTȉPG5ҤiQ6{nA_2F'JVNR>_z2(R4-ÙY/iQ(H6]m ]*X91F/uEEcw.ES=(c/s^7]( [(o:ZV'vÆ3J8td+LIK;[]4-@U*jM*TN{JZT85[s2HsiOoVWg2.lH'@Ts]VXwٵ!7+!5m!T3 9dv+[ƫ`Q%8\i2 3njtİ@sƸ~#d=#+G[@nO SgR/%,0A1](|Y*QEJUtP\e2M-A|-(r?ϛڅ w`Y/~CT((HPc[9  B h9qj6Ees{W%{6?F.iҧLTH/H&]Q0{ntX X-)>%,熕Sϼ1Y@D47*^5(aI;-MsG)"kS~$!tΎM ^N7Um>M"n :,%11~25t A\>sS4Á/nuE-dO-[@Q1NLK{ }X"FcF\^ LTL{ %`%wVQs{u3mR_<9y@ NA'B;T qx#2| &[J%#˹P/tR߾\4ů R*bI8o]ykzrJ߹9?)"Ԛ_R}9*| X y%=8zUU"rJ ӘtMaJ6;c/DNNʓG;.X\&c?cu,zs]th+ dWXSesUmQA5]-Ҳ0DQ>ɤMg&Ze)Gos.S?7hv+.UzD9J>C}| Be* %:@aޢVvRs͜R1](? }Ay!3zu5N-7=hu)*X -Wy•7Jw\ 2L#{n},Db Jo"U=X՟p=GMޚXkDҔd0!EP<,Ұ|Ȼ//QIspۗzL5QjlWoolavԠt ,Hl{ey%?Y! p-t#ά0fM]~uޔ/[3؋Mڔ0oCnNc)P@ւBt$+KmzTZo 'Fb"5Apmj#l?jy`Q$Etk\1I_/m_J˻%BBdq(1u N~BڸjoJfZMk#lM t%)?jy®GqtDKM ?a"[|8wؿ)q5Au47ڍI>74E٭v.nz`>c".ź$WGcԻ".4?I!ks @^ie% G:g;=Ah׾nu) x0lN}P˪kZg$L388M,u*-٤K'ȁ/nݤK3I;m=Xv}lWykI@U3>" uiRh(1C>Rp}ɮm KP8?5>lRiURD|~uj <}.Զû5Z?jv5l>ޗN&9?{懲1ꌆ+$ӡclT ѸJқky Kv:`|79x B1OBL[ps9vR[~ rsMIbJvuΨ+| /8%֔bdv14]H065J_ԤE&*a>\QZlAN!5;]3W'W(y~J т5:ъՠަe iƴMB ,[fȩPJoN/+#y4FAhM>HQQmqr xNPy7=kjA1FՠÒע Uc^wҏ;l0ˡ%Iۡ؍񲳓.Hj<攓M){ؤv'Ev1UJy_|E)\GkOnXF竂R])Keo4HD;liNELyˮ7}}q קC@,lTY F@ {h5#+V%Gc`Qt`SXU-_NԘT69g͜YSckI xA(3 KT6L Ra(H6R}OB]4Mih]6PN\I` n&F4PXm2+41|7-G2o䡧d6l OcXa¯qc`e$ycJfjr} D[da7o9I#]%RN#m!)"=N-+X?d죓s؛SEp-~OlQ8w 4zq ѡIM `oɑ[f WiXS&-;s|eL]+W;k-޷-| ;xm0핚P܏t^7yE.X|\ AL*5;r w޵GS"2X Q5$v5AvD`OP =,Ա{bl_5#˾\ıΑxs'/Ǘ'VKTtPu%ϟw s->5 ֵ" C%.4rl9GZA,nѱKDh ?r`XF6q;:~C@Qt2y)ikB7ۑ{xX"|KHsb귮,Юaftu;x=%KrOXq?_sʥ@p(# 9qed֓ &5o'ZseUDRA[Isj$?V" əϭlMH/4o.Ñ_ 8nOn5RͪSjUޑ b/(_)hlB#hM4. ,@Ndѱ'cUsK# WQ36Wj)^sٵ04[ޯmՁ晴DqmfV%=$;Dkc9VFHV65Z}$Ňuw->I𲴍Nc,ۗRZ# چcZowz"Jn DzN% ibӦ'_O0*Nn/=ᘕό%yFR {dz1߃fr=,F60'3\9OI [ͷl:m$rJNM4nؿRzALY%M5y3ԅ)&Oʝ#oUit^xĿ/(ԛvKfQy#p0@ְܴhZێ32x; >ɔ ] : ],Ӳky3ǧ3dR]VM1sW\4&y8bΘ$lIgz 7(jx`fϭY@Z2I^Դ.4deG7ʀk;_эE8N?=K%pbt]YH-9`;-Q.Ͼa0I#n+*Y_./ 3.l5R?D}+Z̏0u%`yߒJ 0Iϸ \o:!KG:0GYѢ䩆Հ`la[a9x)84er]d-`}հq[+WmZDo9#JBd|{$a<8 ='h}`خ5w dMJJ(J4h7I>LzU?lahPYr#k\st{0Ҍc'p:[FV}.KLE+ wWr%U&gʏ:y]M:o;8GspU 70SS[C//FsId(4uE"`ZR `q!X,d n4X@>?Ë)) kliD_*5 R: m>}NCgc(=e v_jFq'5Dnx?`VaL%K¦Agר;u<27@YD]e %E,HIĢ/Uw$=NYo[kI,]i܀ rFԜ> N;Xb澭#.ilp[NRѬ;mzj~^UPW}6-.IAKsye[h%Hq{ ~O)bƚAFzVĝ;°ek)U, K '$$]__,q ϡ]A+eDG@ɫ Md-%&+˛?s/+ڍfy?JKMJqX<rmFc$qv塱W\OO(hiqcr#J6 :H|k!p=Z ?JVz1?6!eabTP:Iq>f5D4efKs?Wn^Rr z 7 hqg)Y*_[C^@kz(MY4s$.u!aYԋ}3BdUTx+aF a.Xsf'^iB*`S׎hV+#]Ȯ|9AQ1XÜo}x>axj-y ƩR?|JF@"ayr=ޕnL 2u Q)b@7`:؞< ~AucH u2)&V6p+{Xf{7(+;WIgciˊ23xwރ?{UB. <=MkU~k/Tp!7OlBۓo]dKv*вM7'P{sD/^>;$s4S'i՘8EWX]a_mC6]qc0M*i= G Ln)ryf敐P;+9 ͹{nD*bV9ʀl!(ڂ^3J:B_)Ŝ%]􀹬9Ckh T CΏ/qe:*߇4=ܮV} L^bKna)R&R>Fё $ty=p+g8,([S >E ^` [,%Cb;WаI$ j^6*M?(ʎ9b䚳ˢre]qXNfu)Aa.6/rlY|~J r$fTUlҙ؎M4815 +.fBH’g~:3(蹈J2+WB-(ȯ+tmY>G3gOU|0;mgМݖpfM05312B,~,R0>VƧ7<'z5w[H<T MI$ v; \o~6bJ \8ϵKHlr/=}m_\֢F{^Ly9l:%*nO#88HP}sB ]'L=@E6ժWrX?tt{Iu؈恾=&㙡eKm@]dn.ə@Tt{T q+0 ͖0ŗco[_WطiU$_\0:|;E>b?|] x}zl2]MPdOCg$ {R'`rč{0w&F@ѥIJ@♧5Ԗ\n;Q{w`R_0uXW鱗5&Ŗa':%&q[W kcIv>R (F{+GQGTY Q"FZFNrU#g:}^*MXzKԻ"{`,B?2[ 3=5ʏPIueΈ8lmLKϐ)@,6@t`pB+rc%[k_B{b#p"4>6mOE ۷b **yp1ZD>EKf /;ؿ *k)HQp߸L B_f0Z`SZpJ)`Y# .ק |pK}N_#/yx1^Z%/ a{4IT*7ʴMBnmE#/Dgآz!L NZUOvAr3"N0ZۼG0ۘ~a(6pg?iME?coJuAoc^8Ð;Ò= !p :43`H18uρ \Fk 6t9soI{3LS{$} n*@,Ȩ.D8ĠBhr4x܁?hBc`_֕ǍGN(yK3fX%%$q2n?{T11U/yC#΀'4,Esj.OJ0ĺ%i ֳ>:ӱE{ 3KiQ)zm}"JRHNؕq9`s d ЬNvkABolmvN~8P±ruº4;C,:e[X  ڴ[=@0FpL˟NׄL.!ǚ?t3xKV斢d,-FpţHuR‡ #5 ߁hB+ٺd_DW| kuzw,G\Gs.Z%wLKX}q{a>~QMsɽ-IC.;:_4~TՅC:{ӽԇC6޺F灮Z"jU1(J?؞p%8] yq'B+%FZsK 3PhC <,sŴ ҟ L|WZ9ax똃]Wc7ku,9VLqkHjɷ&c 4TBGr"kršƯ7aDhx4PH 7̗QukRwWRSjLA=wkiY&~q9&'L9䇵K.7]A}ȎB|]`}a~[X`>;fDn+Nҵd6JGͤI)eZJQ\77_um43 kC<Rat0],C@9@źac2ZWH{Iw,rSEL_4G`]}p}ѭ|;3n76d0릶-K۴Z 2:I/#*Â="ZW3ZGakVC/y7uk "xv ɗ~{hгw7C J tDV .N*&DQ1E$4N>ͱ7GP+)=[=bQT6kuae^D @}pbɂ@  w&S儺0.8^z 5T_ZҰ7w4 Eg84*x 4`wU pt+{iyOYl?6a$jʒ$?_D>׽0"yǐ*fxBfv߽%{πb~2GA|qYΌW @x* L5('a[8?1FP.po#Jq8Vo uG,s,``7-NS `ZWyQo/xx^bKRSWjM/ƙ*|"⥖b;amp8cՏ-/ܰțmb]%X]f>EzJ%u7mnfZ֢6hҗ#ZC/îB0cu7HJpEnD󗏏[P/f&sLҶ]hu-ŏL.Nx0ƲHePZUL1PRZ- q5y!a)N?`BVJ+(J*>I).Z`q,R wxp[Df˅!)S2'yR\DoD.U'Eԕ#L4mܩ֍敘Tݸ$BےU1* L&q QH춬@jx˗c)e<Aez.$~M/O0JPhb,)gʢq4͗\6$x%+՝|j#uX/"&q 0J̬z>>/+';gwدe`PQY Iq9V0NϐQc>KtV)ّ0J_.@zL>kfGkŊu_;Ki!BEH)RuH_ϜsKFŖ ڼn:%3h'J=,(*\%3\~a9:w|>ia#׋]{_5̒_TOU` ?H" -z&K1c=&nu}\+?z``p4r1urE1kKqNƋV RأG_ \k$ `% ɳ*?-qMʄm)qO*gX@4 =!D.s ]ˏNf21 ϓDcԶk4kI(nEҊ@ݠ?*,>r敿ϧ/J"۠F"@[m<]T;(A}Kn`ȁz> XoL4Ceވ':o[1[BvC8`>Mmle}D7S-MrtQl5;Btt!N 3FthÐm)`{XEQVR 5#|+:6M)S6/RP`9E _.d2@z-PH`P(HM g](JhJ[橐V? AI^&jb8b-AQ͚[Ƒm`8Z/Saf^cU~\9]6yd1=ƼHtRO qzNNruc&4C(woQ.iKWl&0%r*\ 0"_:=ަE &pxTD8ԆiǣzVaR{QU vw1.>#]tJKUvD!*\bDՂ0Trd9T5ۀL(jݜ-S,I654sHU9lBdUˬu(҉ 'I5WJASX)r#*ෘ\N+VOJJOv㒙܆r*3@*#UQJxYczћ'6pfgg(2 LZeH-6!YcƗ^u ?oſP&Y\U@3W'賤3uw/VhC*n?Qv F,"kKkC/,ۊ<L*~̀$ 6}11jbUvZ "q[;G3'Ic-9?3h!У#%Ý ENj³&&R:s8f|$u?Pn9ބ.d_(:1?s8PJG\O+@TtM<=%xd9iV~XږGFMzך؛),L^XmIQX-@.DrĊ}䭖dW8 Qem~-%A Ѯ.9#ꌢ|mٟ@g)ziUCAF99xǒzVo]'ΝB._ 8nn_gCRH%e"~Yfn+ ,\C)쯄"SZs(b ﺠO}D3{|e##J&13])k"`z(м"%N*{Ɗ5YaqRMÏ`i ʘ(y>k~vb*ϸzV.ItH1DRH|8 j3f9KZ&v_] U?Z8KOfn` .f:ꡱ9!^vsm"E)qRG5:c7B8'@XG,Ǜ=-Ŭ?gc9#k]v,aQmLvtd4*37IEVht7W}^8ly5eQq,j !>:=j~e[>n?#>+]&ȷ *ZoK8>iϬ͕_C[rb7.^F')2n"ɀxeZpdSb!r 0K}7g?ujT65Վ؂&@Ul|+y.E|ɶm&tI\= $;l``i̶>^78ot!oKĉl)8lR);bxy•S8&V,j\y(ƪѦ`j)H{T'ȣ.IKh1%9GFY{'04Pj7F^6!*7BĹ@_k+{OmJajrnyoxḂ_=ͮz灅D qyӎL,}xpYx=',@Z6%hCR Vi|>"oPԛI-o, ЌKPlLVw|;(Gͱ#n;gAAeknI=f@@z6s-+BO;e0@"wčY;eD?׏E]D4cvx7gwZBH{vS}Y82M ϾۂBPxdSGuL`ᏐA<u#Ml!B\4J<;gEZˏء':1-!BBm(,0O݆qU8Qcn$$)g9OC8@g|Y^# xi.IelLKsPfN;ciR Y-BNc]EH{UH^6`wŽP$a |\vsZiy7_&G9 C>J_ 1qW ݎSN { k+&.fWtRk#0>;̶PB$j.MΈz'",ECi;[!$Et?t|~98Ot|r ¥)OaS!!7dNℲ-|QG'|aj>1O 'HT>-J@ᄐag}gG8r;qBIwRZ&fNSBEeG5rx0k͑9VxN_V8s蘺M9#C.TP#vlty}Ƽ#E#Mq `g4NC CbA3Qrv N{^_5T:fW0]&OȽ.ѹG<5'H |[Y+edx^.R > 'Yu* 7 F*[}~4Ba1Ikp);\qPxq}~%e#V5ב}lBp.]b:r8wǮE9AaٞO3W yk7lբA,}ثA9fWo2;7Xw5.OMW78Qt{@bSYBן'e`zG ?pjpòueur֌BRM2Yg|xczqjc].]J( -{˴\C?/Q{ gv J35VuĮُ[Y_-n֕Stm| a0f]"=1z&b4Nr%mBTr|yPxy1$$`mjEe ҧ#IJ-P]IюXBU[bībX+ԑCůF \ Cq{>nB(4z ؟jwg OmK_.Zzy{|` f /&kQCp5D2|} wl UR#TW g.g!~ !-n钥uT7X5NjIۍy'!ը*Iv  9t\Hyɂ3*O>jkXAϖQ Gg{3+yqRfe.^ְm\E  OOCPg8|ڬWQkwV'-DAap׳Y OV>J;i5[m[l ͬ$qZa[6f}Jq? i|lpcIp0U~ g`;,1W^$"W*GiXK&`QW(L6!I*_l)iNhp4kvc2^@tlXWTbhE090Mv>)y/0-LYL"cw=vJ\q,„@4pcIk-Nu>iy1mp!>P%a>|#AWM"{J %4*y ,GKvws%V{`ݗ -,w͇OmxEI`Lg2tbs ?@iH0܈0qګWg{c>=T.NCsF-<}%pJ~OoTTA>i {puA)ػ4߷b@K[WnsCꁥg]o>AU l -qk SW˜ Y1R#+qR-`uc*5恼x]$^/R`V?O'}8R۶i-,NƢݴ9ՕڅTUfq;[E z^Bi?\8TRˮߏ*1qW{QֶD;oep"i*6"1/jFmyzп\ν]Ԥ+aH-3gaS֟*^zȘ;OXNSÞYAU}h)rΙ%/\4*wӷͿY2I C 4?z@Z+|/Wea/v41Л AKL[מ]$0f<.SOu4-wO;%A~` L} P_z}[;]RbI"WVkKWog2 >P>μQ%]"HK`v AWõH PUݘZB"VH,.k :8~&|@{WG֤򗔛LpmXT6*(Z%PnҬRa={Yu2GJ@m)FK~Jέ0 (ll6S+k%-E"UeRzW$aK2`,RƏ·`[z2.(-XQu@@˜./'=ע)h`'r8uQkh3ok"*m*W /-JnNfPty@tj7\O׿U+1MbauA&փ {c5pE/761hr5ʌB rrbP Cpu5 FpyIH0`ff43CyXD$u úk}eYO2ldSaЧ؃1{zzcpcLK$n!3n4N~J* :{V%.U n?ޢ5Ԓ T & 9QUe2 x@]_CK9pF#_g*"*+|ؤgnOlj'u<3N*> T>-kb^^mf2P َ2=hް b+Qg) eicWM*>RIϧ`n?S>iB;K[G`w[KZNMf6T/40כ؀?46/ҭ?cK篺lDX6 t%'&Չ?~}gpt,wjWS${h٪< %q~.'f]!ݱ(Mk{ns`0sB<8YAQ=SV@GyS7J 9. .UȩVƢ1&]ϦJ,McP lR?R_p@ܡ~ٴe+rz!TB^j2o#P{Udi9YbIsB=FX¼aQѷ3ci>I) 0u^]4SzH{wgq9) A y3G5¦љ oNh}ha_GfC YZ