libssh2-1-1.11.0-150200.9.2.1<>,fp9|k KVU@0;O }S2I/ A|wDr(+rNPgv:Wzq[6IbȾLl6u3w{[K=>f>@L4?L$d   I,0Ijw     . @HR\  = (b8l9:3>H@HFIGIHI$II,XI0YI<\Ih]Ip^IbIcJCdJeJfJlJuJvJwKxKyKzKKKKL Clibssh2-11.11.0150200.9.2.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.fibs-power9-17SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://www.libssh2.org/linuxppc64leffa3e71dd74843de37b7d01df3e4bf8a5dc34d122951c098f5f4019737ae89b166libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.11.0-150200.9.2.1.src.rpmlibssh2-1libssh2-1(ppc-64)libssh2.so.1()(64bit)@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.25)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1f @eee;d@daA@_@_G@]@\\@\MZ]@YTYA%@VIUzU.@pmonreal@suse.compmonreal@suse.comotto.hollmann@suse.compmonreal@suse.compmonreal@suse.compmonreal@suse.comdavid.anes@suse.compmonreal@suse.comdimstar@opensuse.orgpmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comdimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.com- Fix an issue with Encrypt-then-MAC family. [bsc#1221622] * Test the ETM feature in the remote end's configuration when receiving data. Upstream issue: #1331. * Add libssh2_org-ETM-remote.patch- Always add the KEX pseudo-methods "ext-info-c" and "kex-strict-c-v00@openssh.com" when configuring custom method list. [bsc#1218971, CVE-2023-48795] * The strict-kex extension is announced in the list of available KEX methods. However, when the default KEX method list is modified or replaced, the extension is not added back automatically. * Add libssh2_org-CVE-2023-48795-ext.patch- Security fix: [bsc#1218127, CVE-2023-48795] * Add 'strict KEX' to fix CVE-2023-48795 "Terrapin Attack" * Add libssh2_org-CVE-2023-48795.patch- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040] * Add the keyring file: libssh2_org.keyring * Rebase libssh2-ocloexec.patch * Remove libssh2_org-CVE-2020-22218.patch- Security fix: [bsc#1214527, CVE-2020-22218] * The function _libssh2_packet_add() allows to access out of bounds memory. * Add libssh2_org-CVE-2020-22218.patch- Update to 1.11.0: * Enhancements and bugfixes - Adds support for encrypt-then-mac (ETM) MACs - Adds support for AES-GCM crypto protocols - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys - Adds support for RSA certificate authentication - Adds FIDO support with *_sk() functions - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends - Adds Agent Forwarding and libssh2_agent_sign() - Adds support for Channel Signal message libssh2_channel_signal_ex() - Adds support to get the user auth banner message libssh2_userauth_banner() - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519, AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex() - Adds wolfSSL support to CMake file - Adds mbedTLS 3.x support - Adds LibreSSL 3.5 support - Adds support for CMake "unity" builds - Adds CMake support for building shared and static libs in a single pass - Adds symbol hiding support to CMake - Adds support for libssh2.rc for all build tools - Adds .zip, .tar.xz and .tar.bz2 release tarballs - Enables ed25519 key support for LibreSSL 3.7.0 or higher - Improves OpenSSL 1.1 and 3 compatibility - Now requires OpenSSL 1.0.2 or newer - Now requires CMake 3.1 or newer - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs - SFTP: No longer has a packet limit when reading a directory - SFTP: now parses attribute extensions if they exist - SFTP: no longer will busy loop if SFTP fails to initialize - SFTP: now clear various errors as expected - SFTP: no longer skips files if the line buffer is too small - SCP: add option to not quote paths - SCP: Enables 64-bit offset support unconditionally - Now skips leading \r and \n characters in banner_receive() - Enables secure memory zeroing with all build tools on all platforms - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive - Speed up base64 encoding by 7x - Assert if there is an attempt to write a value that is too large - WinCNG: fix memory leak in _libssh2_dh_secret() - Added protection against possible null pointer dereferences - Agent now handles overly large comment lengths - Now ensure KEX replies don't include extra bytes - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER - Fixed possible buffer overflow in keyboard interactive code path - Fixed overlapping memcpy() - Fixed Windows UWP builds - Fixed DLL import name - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows - Support for building with gcc versions older than 8 - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files - Restores ANSI C89 compliance - Enabled new compiler warnings and fixed/silenced them - Improved error messages - Now uses CIFuzz - Numerous minor code improvements - Improvements to CI builds - Improvements to unit tests - Improvements to doc files - Improvements to example files - Removed "old gex" build option - Removed no-encryption/no-mac builds - Removed support for NetWare and Watcom wmake build files * Rebase libssh2-ocloexec.patch- Bump to version 1.10.0 Enhancements and bugfixes: * support ECDSA certificate authentication * fix detailed _libssh2_error being overwritten by generic errors * unified error handling * fix _libssh2_random() silently discarding errors * don't error if using keys without RSA * avoid OpenSSL latent error in FIPS mode * fix EVP_Cipher interface change in openssl 3 * fix potential overwrite of buffer when reading stdout of command * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data * correct a typo which may lead to stack overflow * fix random big number generation to match openssl * added key exchange group16-sha512 and group18-sha512. * add support for an OSS Fuzzer fuzzing target * adds support for ECDSA for both key exchange and host key algorithms * clean up curve25519 code * update the min, preferred and max DH group values based on RFC 8270. * changed type of LIBSSH2_FX_* constants to unsigned long * added diffie-hellman-group14-sha256 kex * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x. * fixes crash with delayed compression option using Bitvise server. * adds support for PKIX key reading * use new API to parse data in packet_x11_open() for better bounds checking. * double the static buffer size when reading and writing known hosts * improved bounds checking in packet_queue_listener * improve message parsing (CVE-2019-17498) * improve bounds checking in kex_agree_methods() * adding SSH agent forwarding. * fix agent forwarding message, updated example. * added integration test code and cmake target. Added example to cmake list. * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero. * add an EWOULDBLOCK check for better portability * fix off by one error when loading public keys with no id * fix use-after-free crash on reinitialization of openssl backend * preserve error info from agent_list_identities() * make sure the error code is set in _libssh2_channel_open() * fixed misspellings * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type` * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type - Rebased patch libssh2-ocloexec.path - Removed patch libssh2_org-CVE-2019-17498.patch: the security fix is already included in the latest version.- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922] Enhancements and bugfixes: * adds ECDSA keys and host key support when using OpenSSL * adds ED25519 key and host key support when using OpenSSL 1.1.1 * adds OpenSSH style key file reading * adds AES CTR mode support when using WinCNG * adds PEM passphrase protected file support for Libgcrypt and WinCNG * adds SHA256 hostkey fingerprint * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() * adds explicit zeroing of sensitive data in memory * adds additional bounds checks to network buffer reads * adds the ability to use the server default permissions when creating sftp directories * adds support for building with OpenSSL no engine flag * adds support for building with LibreSSL * increased sftp packet size to 256k * fixed oversized packet handling in sftp * fixed building with OpenSSL 1.1 * fixed a possible crash if sftp stat gets an unexpected response * fixed incorrect parsing of the KEX preference string value * fixed conditional RSA and AES-CTR support * fixed a small memory leak during the key exchange process * fixed a possible memory leak of the ssh banner string * fixed various small memory leaks in the backends * fixed possible out of bounds read when parsing public keys from the server * fixed possible out of bounds read when parsing invalid PEM files * no longer null terminates the scp remote exec command * now handle errors when diffie hellman key pair generation fails * improved building instructions * improved unit tests - Rebased patches: * libssh2-ocloexec.patch * libssh2_org-CVE-2019-17498.patch - Remove patches fixed in this version: libssh2_org-CVE-2019-3855.patch libssh2_org-CVE-2019-3856.patch libssh2_org-CVE-2019-3857.patch libssh2_org-CVE-2019-3858.patch libssh2_org-CVE-2019-3859.patch libssh2_org-CVE-2019-3859-fix.patch libssh2_org-CVE-2019-3860.patch libssh2_org-CVE-2019-3861.patch libssh2_org-CVE-2019-3862.patch libssh2_org-CVE-2019-3863.patch- Drop man and groff BuildRequires: both are no longer used in current versions.- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Version update to 1.8.2: [bsc#1130103] Bug fixes: * Fixed the misapplied userauth patch that broke 1.8.1 * moved the MAX size declarations from the public header- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types/sbin/ldconfig/sbin/ldconfigibs-power9-17 17204313671.11.0-150200.9.2.11.11.0-150200.9.2.1libssh2.so.1libssh2.so.1.0.1/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:34684/SUSE_SLE-15-SP2_Update/46c5ea33ef99278175b344836cd73591-libssh2_org.SUSE_SLE-15-SP2_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=67d6a316a41471c89bdba18043c7e3ffd4d54d2b, strippedPRRRRRRRh]:#!=utf-81f3ef320d69bc3d2cad1da4eeca2f5acf8f5d28600916911f39997cb0384b556?7zXZ !t/ໟgC]"k%]d涻eQQG^"DQ_N*&1[ɻ'A-piݗQ;"TVI|Dњz4V^dr T=Yahqy+t㈩{@8cl.W4wz;Mǹe5rJi ʤݟ]ݙYAB1<~ԗ"U{x$:!3h777SDdgzgXWR|ݚZj28.'$-U1b2{ +00 zU`IgX <%{4ZYb3?/B b[|ԨӐ57'+8Y(!*@9&}>)NCIs0FK?C#\1oq X81P̬&t*IH 2[F\\L`fB{V?/{0Vn'4XmeN؊W45ְ$6T;n)06bc,ġiih0ߢ@90eQt|(p s԰^PE) IwA2n{z>'\+_2 -Kg: lFz]?İ?2:OR u"`1 "'mZL8./% A4Ӑ\I3l?6ݒR0#fd=*AD_jM$OE:u{-;؀rN}x^.;ջ`(Ua0^a1># 7s*ʍOoM$t~-9ioi{/XZ&CjcjR el*|k0D)TP|4} |#p]ߓWqJwn9Ƴ5P6 gJ1fjAJ %aWLW" d.c_Y޵bG3wa} i;}J-Q UeNj2 a$xawCޙӾhPq'^|OeU!<!1`d ?`b|.b9 ySg[8|ɞnZtόxc |/4VBe}&@g򽬴flqz HEkq(I\@Yo0&;L>L pwo7~[tM&Ac\\81s@H+%Μ8▬?/ C+.zqRO:l4$M΋4uTxgzpM5I|.v!u\nQ"!<]9є7j5]eJi!IM (C sq5sw9)0:ݪ$uP9=a~yv@Uo*ٟ[hJۭҫRNjEAL7c*T՗Ĥ@p _)j~)$c;$=rjqf#,~% ^#fB$ $ƩP ڤNpEȇ Y{ULI7[R|͉I5̅w4j*MAFAFi&K%c]3YΘ"46f 2v=V;FCC'3l("7i=W'm2 Cg`Fq?"]B"d<)F5' hoXTŒړ֯_ɸoM)4F gPlt_CSFKd1tU$=)x;Dп_7_L&oi餢wѯxkXxYǃ\"i?&ZG> =X;ٴnpS_a(/g"r0#[E@ l@6m_6n;xc`GF8v}k=l|Pp|fqfu2 D\t6f8:ͷ;RGYpmݞ%wsw#s``C7vliܡZh(>iVءvBKźtQ=n\<[wyW5؞\L!L%$ w v#NK|rrZG߈rsA- 3b綐CɄg?n;L:ɊIs<E,H5+4jҘ۾\~Gܑ/WэlD\ik4v,hP4=y ^lSP>4A[񟬞G=9O=ȨDPs nm#`I4 >%0r?h05s ݎG>jvwWM:=c3I gu@`d7luPxOgphw;4`DnS>W+pN834⬒J=l3[*2& 3~O3Ug廈Owq5":vs& Jqݬ.#Dj g!yB2;S=,:%ȴND7,I᤮\*O;=o#2r!8( V־{.uorz4͠`(layǽιmڝϬ i oH&x>Es r 2~h )-g"K& DhfJ*l \bwa8{AF*nX~ݧ\E_U[H(8ЛLwi㪞sR魡dCs>2cd6vSHXLx`䆠EYZ0Ɗew+jhQ)wu]CFn * 15yy"2_`۬t-r Z= 7x .3MS#0įhV.K@M@P14pTI+QL1P7ܕ8*G{9"ϗq"/7$qly:A, L-9:!l@ w+ Q"iX%)ly?ag%}]ZbcaR67'>y** \Ufo&O"D|TѼ( r;% pwSZ?B|^+=߀^:/ߌ5wcm<|;++nG,zZDoݙ yu!a.Bm7g)]i#%;/OɥwqA]_<^}7"gXJW]q,q}t,qF.hZ =XOѶ'9hV&vz6L9UY>z\i΅fX1Q0S&TP t~KE0Z,(s9 qI}Ļ!w,vB\Nܶ' };D+{*16H=.-:JaY!W5%GFߺz.m.s]DE߀XB $ [1,NͨpJ_/Xvȑɤn6NЮ՞7ŏE2Ar(!@+GcĪ0LZ?š_=PBFͤhhCދ4NFfy'•iw&ڟ^@9+_:B1}Jyv5!Y*2R&pc4ѕ 齜~}aE0k# Lp,܈slK+ 0^DWঢ়PsƸ4p] Ff4f nG E_>̉NMeWrA.l \'^ K*mE3 ErW=RZ\ k:v[7@gb[l=E<\D;HD/&yK鈒WgI mHR8BX'YmPt%[_'lVx :ى2b 2B)f猎tb==O$8L 1BE ]xnj] F{<ʂe4=YW&[!W ? }IlwFR|xדMKk_X̥!( 0fBIbߒ阝w}a#UBo_uKbEYzHOk4ϓ/?'{{/ۑ}|RaP3Jꄟ<;4[L9i]PFݎ鼑|Wi w9;kx|c+ e4+hu0P(Tޕ_i'l˕p-ˣYhmu|_9HC.W2@=Ļ3l0NT$0Q/{ImW0dLY/U7},z@q\C̺cak78RSX9@FFȘVm7bȴ- %gZ= V>Uf}mb n~;4up\a .ӝvΐU㮣$ipLXhG3}2-<8fνY3\߶=V*;Syt `gLE5tt3:UK Z/~4H [Q+ɳQ_HNrfn1 ^&He}7.#^6 =cV$/(A:G e@>۴-NMMQ-XU05BџRZtXW d~ ɟ=sz6`Vz 1PbntVfda#0_sGbh׏,qGvu2zϡ;#lvM`׳w3pZIVc$ݜ!dyn˧zoV)۴jlLXW^_Iݳ!KW[Hf'3ba"7;l ;y*~oW6 KIfRd"JD=W[M)HNUzdWEl\5DPr傓NȔk2~_rrBoU9ΊwRt.(qZ%2`lV+q!f %-.d.ťdZ=)2Ѿ [o#%-q1K^?فEǘePumbQ=ߪJE, :;bAv{- WDV2ңKo?PkdOzspU9tyBEQs'+T>g4*nNooWg іC*IjMʵgxr('9Cn!ŧ+?ڝ͢ z?N*Nj-x=ANuG]^Sd&Vȫ ?;2-#O-Ӻސ`ju'Y':s-2ii 6|5wF)sdw#j}do0EJ;ZYt caX×>Ҳv*>F wo}JɅoeƟ>ZAQ yFWRp9+DBP(i2"Hs%j8+řc(Iײ"t: X \,CpCyt_DiE;IJ[cۘ.W;UN|uiV$m_%MfbOլmA YJ>wN| ,fm94n]k5t[ȴܬ*j:Y?w)J~vgԭpoǧu)<'; f,7]D^-]ƴCnEF{g7Xʶ'"ξԑ{O=cQ IZYIJA-G#?Ty]jjowXf#œ4vrT(C!ac efFsG4NtQ~5 C1K,Nl%ʥ*.nL'hLZ ϡy1XU~q[~JuE2k(ja Bh -4ݪ{#錙 Xwq$E#MOats9pJq[W"+aDjd.L<=fӽGe~E++b=Tw ߶m4S JuDRECo/.F0:B7c/ze_nEڑAϳp2!ԗ j 9!ۇQK^wi ^a kL?]X(ɥzR cdIbwggFjoGIԅ[u-J/iPz&hI y|EC]G∱xcrUo]ҪO1Rbi Nԝ Q* |vx쟚b!c8Xz9o8MC\*2ϧIx] ZH3Kl18׺Xfzi΍w\4ѻ| Lq]y[ACq~ [Bz@Mig)S/bך }dY7+59e'Juv 7˛ W.u}7i_ٙ3(y7߶Ʃ')-FH8~%xL|JwT]OЀ5XbNktCa U(Ro4+A6xrx-' !ق!1߹yJ 't!&m)_ӆAzބALD繞0XibX![)pH2pVrʶU@m8}{Ix]>-^g]?L ϭjm82J-hf,V¼MeIt1"oVZL~?V-kŷrpzXp߄3zb*ё/";nhB+S}#?b#3ܮS?5l@ܽ~W;BRSJ";( jdIiTwy-3Yjz0RV鹻Uc80L(Ykk5vfx>>#/=LL8}K+ *Wz0E;% 2sQ"nuS7<SURhXYLH·@ 9_1ȿ]T &=Aϖ` 2OXC.2c2] {HQ5U[#,?6 1dZ/;FE1{+gFHhMĩ}$v[95`0}@@QHs|"X6v@=ʡ0\/z2WTpMB`^[΂>0W<:aLSdɷݟ ZUN 79GWEhc`WL2̨n-m7QntћqMl:Vz})>PU`kG|E+v{ґ6@VևZV*^cUMs rlD蛾s6yb Pgw`K\|f1=?G g<I*F%.x+!n[Vb: m†{5ť Xדi[#gx\e^,aVV=I-1Aؠ7i].$6C?*Tc"`3ULjT *Z/4{J#q"jK&G`sk-c,v2"'ɭPz8mZ|>K"]=(?ݼ6EȨ 6}Z+ ͆ԅ,jm|.GV#(tG Tqzf\(>Os|-+. G4p.%>#E8t1 ^Հ܁`$but1]HұU]l;x r(7c!ʆXQ~[`}et/,8d%2EZ!b6bf6DUL1dSVy{¨(!<ov6wbGSgpA̪Q?F1rܮ`h>#9-Ky~LQ:O+ D+wi3^36yޯbl*6vBPjb |KvS')5q~O,FCu}&hhS8+9߽|-&'C-,l:랸:BۍMl%?Yk£RtB `>[FW4.rS<ڢ@^iŇ%N ΢ iБX|g}L Lq\cVK1[Ԕg%^N Y);x秫?q6cT^i+rk2(+w_&B O;e( '.F YfZ-D•hn5%\McE,' F2e=0$Aլ9m]x}'9PR~[,kfkf)*t hP7"jUp!;넺I U h04G!@-m<}i:x{/Mg*V+^2J՟,Dpl;#2:qX:mvHSʙۍ"y5_($֬s*2sŃI"al@ Ilss+MD$*k0!Ou233#7-`rRz# @N)x)na' =\2!^}\OL[C|0C\U}dBi n}tVf}38.bI5bhԸsх K.I`Y9g0Ӂ7^p'7\1 싙e!-\hoؗ ^yxo(Hzayr|ʆl؛ތ]uQ8a"Z &Y{W~= B _ TG:Wˠ5 Tciޒ5@ 5lйvz}'QnŊ 9(h,wV,_!x򶤼-~U#>[/b6HiD tEYLtV.7į{LUDiLJʯWRULP0n9AyD lcCh;b9z\EZ>)԰T%I4:V=+y}M,0(WP8 P7WIQ"]A6HEg(haݞQOJQ&h9Ԫlo<V8,ڐ[=Sԍ!(k^mTХiC><@7s VK`ڛ7BA143%۰ՖZSjTyA9EmPtz~=,N{U|B?w*KmKҧu`';]D<>e*񓬹ڂC 'qǵ,Sf QmY`79tB ʫd's~T5/z@c!2AXs)/Rϯ$$f%mݾ=תy m BiA^5e}=5:}!`>1J)IPMTd;ީ3i\yC5hgeMjW}K⼩aũR{{3%" >=VkfDNT[<P]ec~!yri`v1ND B]%)"])CVPtMg m.l)bH g LP_LvW9>jL͂r#XzǙS&K mςB>VHߢZ2Yl_Ogʼnü _ijhK^o1rOP>B,n5JIlHzOiL 3VܾEi!X?W9F-4*Be[_R[܃Q-ҔYql*@^ݕ*D9Osߒ #"!yż琊r4гfOkfR8][衜>Io&7`HjUB"SmWUIS[/k_[-Cоwܛg3/hgKǬzkzb&&#_#y'I 0d4VC.6'[8k(r ҡnP-z. !LԇG%Ϸ]N/A },C gL0o49n|-hRQ)HOq/gKyKi2c;!`qoH&XYN- N$ߟcn#X-d۱ TA^nDnH!f' 32Qޙnǟ:sx0%,ưZ=&AN/WU#UF[4&6D8[ř'QZ}$5+n*q>2ϯ0H/27IJ aU̾H1&/]jt\3$|Ðc y@O0ink^\%y߼+j/}K56t/7.R1flLM|鏣H$8m2w kbkH@ܣtN j!fQ箤l*d\AJ\ Dn6\M{`TaZ3y96osP:fg5ZIYr0D3Sk&^v~Te@4kߴ*Ó.|A5ֻ߯Y6MP9X ]rnForr!dJONY'T*̠!;Gd<ݯV͎m#-^7XeAYW|Fgۛv>3gS6%8[YL.>J`9! }t7r_| dWN[ݲ$/ʄNzx##_f$5WSZ_a@`kWԬ\(kk\q8D H|+Hkٖr$OTݤo`Oy(Bek9ʯ亮-xV* MODt_ `}Rnd8 ɞ]U0)NIIr>QaY>mҠzT]Pi6w$4 y$WkǍnM}k.bEkW983ErMlyArs!]x鞔[46ׅQ\}fm݋/y@gYwTcQ-\m 8W^D"SezS a3-:SfV{$pzZB u˗Ў 6&uMS>6}b穪 G04%DΈ3_ƴY13 Roanp_I&H'M"NwD!饩{B<7pgя7Ǥ?%PYHH"F,iEENcEZA)9p7A/ѯ<[&8_B 4LW/i\V`H?r+gxarcMjYJ4~j;@MJ?qgIJKʈ[?Fԟ9{ KKqAjNz>3w-ꙺ*pSpɮ᪸2f:K6utw+%jpv0lgfTmJ 7%yU`74z:!C2B"!wK=;v? KG LD:{6?\([6Bs\"I>>Hmc> #ޒSƹ"nAfXj&~,JaB 371f1b" ADK΁:̆éCKmo\Hevɻ!mcFRAJa+_hy:sjmzhh[ F51?IM1T6$+ݰX/ݚ wTd^GHnR=8[OA hgӧ[^ MsS_t8޶x!!`<{_zCfdˤ tɸn+TtqQu &6#/>orujՕSOxEc5'hqV;ּqD EɔMHʀ'/ L4#rO/ !9aUKW2tP,=߇鉯Qw&Vv tjw1|N_ '/lEw. yGJAr,QFo, ( 49UcH}nGFaڒ_a?+Mk |SK41w~- 1|',/A?A~EF'fe-މ2ܞ{9}lsr|e#9SMt#/sM1''Agn7ߚuzY&I˛ᾭGK,3rA"qmj&-D=TOBNj>3f D.Dq~V(K}/s:"lIX^εSe͐و]{HpM$+[EC ɦUYxVa&3DGv32#Fwu)iӵ)j?T'Z`FE;n_tUߣ%ض HRCY2\PXTXҕ4~}Ku6l(r/@bFZ%=R}e@7}q~˽: #inކ@zu..O[d_LOxpx0)Fk F4yAf"p%cS 9W̓~Q=à v3m\[D2Vc&SkkqYpYj,J4fϣc<zJ[.[ eg,ü[AlUq '{Շ.efnz_e#V4WA~-~%ulj/mR27Rꢶ}W[{2eҙSK AWH"4 6x) %Wyz2 4;rͷL`"q?zTC8D8oE+P0aJ\GAi9 ,դFD'dÀeDr)=.AU&w7og~"s5y3K?,joA3I*t\Hj M낪>GʐbLyj1<22H9 U(s!jOܡ{Wb̷nrڝ~-sEJ~ٛ(!0D5F4aۺA_f4C:ov棋@q^aw^Ox`rB_xwKċP8{Z) -XGgDKP{mAϠbrvE%YrZM;^7C}{@W SeW{h rHdN!c֮@\P%R 7#s*141j(&hJtİ2o+FnX#:4Ucʁj CoAMO0$awߊv\1) :AoA<6eD rDTL;}]y*bNoX(l|fFy6hfmleŹl64 1à Eg7i/izne:Uމ`a /c腘 muhlgF| zX+|ErUF m"zgm] Q!ADo/Og v͉()*W]O'،q\91q}O<;ӚDKyH^hsq} WX DGQ-!/?eNxe€(hs#d_O34-K|m9H8*ʦն⅐<9LIߍ5k.cwx\R]Yv]շeTHtOw$-B}\gse]{Rv4нuA\u3;r#l bge8 zpC'M?ƓG/^ꔶ QV{A>uKAJ%$g]=O@4w}g^-a y6 l )ZVˇ7դe{>D$f{Ă7)cG!Ԫ#/We6<% C` ,׏0|}ž8 GH3cm 粆%l_&Ds(\yy?^L; оyKC+M^.LX|b3r è}53b۬Foõ*Q Ajh t{}{'*>#8f1rzKTwuPc[m@,ZO =0sp^* St$s A⼴{^fF{)N߆"T>Zw!lrQKwU. ;iɱi`I!RŴٯ?@/ƒ/hGG-#wS^gp4ۥdo4=Yi-joDOzht;ƿ2SQ)m-fE/ѣ38*+MNbh6-}g ҃gyMUs e'ATirP Slf|n 7 0vm&H@ρQ3lфc#~bE >2iF0 U\"?&c2V @޻^C53L&tf/WQVoV|q9X vv>yJ,pg6R,[0k= mS\(bu\tÈ,u!'VY\ۣμޓltv:J#e~vڞcD~O/v؛3k/ʗ`PG<)XAvn#Sٮ*QܑH O%]$'d;^mꑩ%Jܩ4S뱉X@>}]dC=LET9SWL=~4t8pIã&1Dg6$"nl[)))(l Y/ l$j[XΔomm&[9]55vպJsBH<&ؑ$Lȴy!CS~):q%?TMAj{ħ%H>29o[X6ĩLYځ:D'bѳJFPl;Lo(/tܮ|S:YE^^ٶz?3 s\<҈C#uۗ+H ڒ/'DMm`["=mC>  qX>N/|m]V8ªwJu8|o^#9M`WVۼVZ#0V; dnV@$a(2}AW Ep4T.FvC ˒#o*P 9r^~[<’G!̏!  q  ׾CGc:e^GvPT69N#nq>)\ Dǎh}>=;u6gp]8bkz^-Rb#t cT9w ̘k ڮE$ /^̛6Ї2xFua@ 2l3>垫Y BM87Ҹ`%x/%{vw mBC~ vFO#)!vF{>Ks}ٷ~ JyL+R srЊ!񩖜*ę[z8"s `]4Q2Jgx {şMsN4%6bYݪTn S4SHh^0~D$&\>")aUzMxI%~O-'´vv4vezƗOc K0bpּp4?qAxr1|k@E<z$ES!lygLaZ(AJ&>{ӾuwȔsF'!蜛N>5q&LN~VԽx!~&6^f&QL]9`wT2X۸}!5fy;$@(䫑Oj?2Wn5R$.1mi t->~H |32*6oTC'(|Zɝ '-Z Oa!QD-0A!bi"Bqc>ِCBK?\ tP)%2MlKj|B9 q :;`u:"g>Qa,($DN(+l5x%(SVطPFL&ɓX d7C%G&)m~RIEG jNBuV·cR.| ~Y,u׷(lʔIT]2=##p+5_c/OGʋj[Ml0:TQvtkZ7vVGVmp3y(w۰?%UTy-fD*2ٳ.NfWʃ0o$|wYhdOW 1FDqtGr' ,1KGR5lR5vYԾOԖsx}p E]?}z7\~(2U?HC׬,=X߀  Y8d }v+- MLR,C1s%!DX:>LGA_ q{f(Rk{?5FeL=ОX퓛)^'?jI /i름ÿzӉ7>GoŻȉ5F1ܤ9:0Pk2=ɏ""Fmyeɞ"η,5YvݿK]࡬e Xf2bme X`uWN#~x3tm3$ @~0S!DE[bϴ/#*jZW$9ُW@Pn &߳M ^#sMrNE*x8:Fp6Ҏ(o/=H#`[˳COZ!%]QFNB <..G>L"fhz>t[Y*L@ lMĴOHd;\IG<0@Ym26Fl&ݖbY4?_(^x+(:vxsߕsRi1O,V3jDKOcX=I YZ