openssh-askpass-5.1p1-40.15>t  DH`pI6AԸ/=„x,'݃0#kiKx٩ط:xk[=Gށ R7?ws\Dg#LNVD0܉A>utwg &d>Ph2ڌPvfƢ-Y`юX%g~sgl{E+d" [gp!u;O3־@_\7%*)Tp:I@\):u }"Ԡ!c9e433a6c8b17268ec3b07fae7e57d9472690d79I6AԸ/=„ ."aϦJ~egV|!jW'ཇ,|=CS}cXT0tߋk^Bms,c R O5xTwV_W$b_|Լ E[Fm$x|qX6M/3Ip?Ҝ'jR-&5*U ( J@tx9kiQyͺ^;1d 0J!4 @Mn4ﹹSTjFf#E*>6:?:d  VX\dhv    ,  0Dx(8%9%: %F8G8H8I9X9Y9\9(]9<^9b9c:Vd:e:f:k:l:z:Copenssh-askpass5.1p140.15A passphrase dialog for OpenSSH and the X Window SystemSsh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. This package contains an X Window System passphrase dialog for OpenSSH. Authors: -------- Aaron Campbell Bob Beck Markus Friedl Niels Provos Theo de Raadt Dug Song Ben Taylor Chip Salzenberg Chris Saia Dan Brosemer Jim Knoble Marc G. Fournier Nalin Dahyabhai Niels Kristian Bech Jensen Phil Hands Thomas Neumann Tudor Bosman Damien Miller I6Abuild229openSUSE 11.1openSUSEBSD 3-Clause; X11/MIThttp://bugs.opensuse.orgProductivity/Networking/SSHhttp://www.openssh.com/linuxi586 u$$I6AI6AI6AI6AI6Abdbfa461ba080a4390f73ac644c8b2268b3c12e829ac7623e862664c5a849401089ecec74cd107beeaa9b2fb76d880e182a3f79c9796e121a8e311e725e9df8fx11-ssh-askpass.1x.gzrootrootrootrootrootrootrootrootrootrootopenssh-5.1p1-40.15.src.rpmopenssh:/usr/lib/ssh/ssh-askpassopenssh-askpassJJ@@@@@@@@@@@Jopensshrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libICE.so.6libSM.so.6libX11.so.6libXt.so.6libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)rpmlib(PayloadIsLzma)5.1p14.0-13.0.4-14.4.2-14.4.2.3I"@IHe@HM@H@HH@GGu@G@G~GcGY5GVG F&@F@FF;@E{@E@E@E@E4@E@E~Ed;ES@EPu@EG:E+@E"PE-@D D@D@Dp@anicka@suse.czanicka@suse.czanicka@suse.czcoolo@suse.deprusnak@suse.czanicka@suse.czwerner@suse.deanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.cznadvornik@suse.czanicka@suse.czanicka@suse.czanicka@suse.cznadvornik@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czanicka@suse.czro@suse.deanicka@suse.czpostadal@suse.czpostadal@suse.czpostadal@suse.czkukuk@suse.depostadal@suse.czpostadal@suse.czpostadal@suse.cz- fix printing banner (bnc#443380)- call pam functions in the right order (bnc#438292) - mention default forwarding of locale settings in README.SuSE (bnc#434799)- remove pam_resmgr from sshd.pamd (bnc#422619)- fix fillup macro usage- enabled SELinux support [Fate#303662]- update to 5.1p1 * sshd(8): Avoid X11 man-in-the-middle attack on HP/UX (and possibly other platforms) when X11UseLocalhost=no * Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1) and ssh-keygen(1). Visual fingerprinnt display is controlled by a new ssh_config(5) option "VisualHostKey". * sshd_config(5) now supports CIDR address/masklen matching in "Match address" blocks, with a fallback to classic wildcard matching. * sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys from="..." restrictions, also with a fallback to classic wildcard matching. * Added an extended test mode (-T) to sshd(8) to request that it write its effective configuration to stdout and exit. Extended test mode also supports the specification of connection parameters (username, source address and hostname) to test the application of sshd_config(5) Match rules. * ssh(1) now prints the number of bytes transferred and the overall connection throughput for SSH protocol 2 sessions when in verbose mode (previously these statistics were displayed for protocol 1 connections only). * sftp-server(8) now supports extension methods statvfs@openssh.com and fstatvfs@openssh.com that implement statvfs(2)-like operations. * sftp(1) now has a "df" command to the sftp client that uses the statvfs@openssh.com to produce a df(1)-like display of filesystem space and inode utilisation (requires statvfs@openssh.com support on the server) * Added a MaxSessions option to sshd_config(5) to allow control of the number of multiplexed sessions supported over a single TCP connection. This allows increasing the number of allowed sessions above the previous default of 10, disabling connection multiplexing (MaxSessions=1) or disallowing login/shell/subsystem sessions entirely (MaxSessions=0). * Added a no-more-sessions@openssh.com global request extension that is sent from ssh(1) to sshd(8) when the client knows that it will never request another session (i.e. when session multiplexing is disabled). This allows a server to disallow further session requests and terminate the session in cases where the client has been hijacked. * ssh-keygen(1) now supports the use of the -l option in combination with -F to search for a host in ~/.ssh/known_hosts and display its fingerprint. * ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of "rsa1". * Added an AllowAgentForwarding option to sshd_config(8) to control whether authentication agent forwarding is permitted. Note that this is a loose control, as a client may install their own unofficial forwarder. * ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when receiving network data, resulting in a ~10% speedup * ssh(1) and sshd(8) will now try additional addresses when connecting to a port forward destination whose DNS name resolves to more than one address. The previous behaviour was to try the only first address and give up if that failed. (bz#383) * ssh(1) and sshd(8) now support signalling that channels are half-closed for writing, through a channel protocol extension notification "eow@openssh.com". This allows propagation of closed file descriptors, so that commands such as: "ssh -2 localhost od /bin/ls | true" do not send unnecessary data over the wire. (bz#85) * sshd(8): increased the default size of ssh protocol 1 ephemeral keys from 768 to 1024 bits. * When ssh(1) has been requested to fork after authentication ("ssh -f") with ExitOnForwardFailure enabled, delay the fork until after replies for any -R forwards have been seen. Allows for robust detection of -R forward failure when using -f. (bz#92) * "Match group" blocks in sshd_config(5) now support negation of groups. E.g. "Match group staff,!guests" (bz#1315) * sftp(1) and sftp-server(8) now allow chmod-like operations to set set[ug]id/sticky bits. (bz#1310) * The MaxAuthTries option is now permitted in sshd_config(5) match blocks. * Multiplexed ssh(1) sessions now support a subset of the ~ escapes that are available to a primary connection. (bz#1331) * ssh(1) connection multiplexing will now fall back to creating a new connection in most error cases. (bz#1439 bz#1329) * Added some basic interoperability tests against Twisted Conch. * Documented OpenSSH's extensions to and deviations from the published SSH protocols (the PROTOCOL file in the distribution) * Documented OpenSSH's ssh-agent protocol (PROTOCOL.agent). * bugfixes - remove gssapi_krb5-fix patch- Handle pts slave lines like utemper- update to 5.0p1 * CVE-2008-1483: Avoid possible hijacking of X11-forwarded connections by refusing to listen on a port unless all address families bind successfully. - remove CVE-2008-1483 patch- update to 4.9p1 * Disable execution of ~/.ssh/rc for sessions where a command has been forced by the sshd_config ForceCommand directive. Users who had write access to this file could use it to execute abritrary commands. This behaviour was documented, but was an unsafe default and an extra hassle for administrators. * Added chroot(2) support for sshd(8), controlled by a new option "ChrootDirectory". Please refer to sshd_config(5) for details, and please use this feature carefully. (bz#177 bz#1352) * Linked sftp-server(8) into sshd(8). The internal sftp server is used when the command "internal-sftp" is specified in a Subsystem or ForceCommand declaration. When used with ChrootDirectory, the internal sftp server requires no special configuration of files inside the chroot environment. Please refer to sshd_config(5) for more information. * Added a "no-user-rc" option for authorized_keys to disable execution of ~/.ssh/rc * Added a protocol extension method "posix-rename@openssh.com" for sftp-server(8) to perform POSIX atomic rename() operations. (bz#1400) * Removed the fixed limit of 100 file handles in sftp-server(8). The server will now dynamically allocate handles up to the number of available file descriptors. (bz#1397) * ssh(8) will now skip generation of SSH protocol 1 ephemeral server keys when in inetd mode and protocol 2 connections are negotiated. This speeds up protocol 2 connections to inetd-mode servers that also allow Protocol 1 (bz#440) * Accept the PermitRootLogin directive in a sshd_config(5) Match block. Allows for, e.g. permitting root only from the local network. * Reworked sftp(1) argument splitting and escaping to be more internally consistent (i.e. between sftp commands) and more consistent with sh(1). Please note that this will change the interpretation of some quoted strings, especially those with embedded backslash escape sequences. (bz#778) * Support "Banner=none" in sshd_config(5) to disable sending of a pre-login banner (e.g. in a Match block). * ssh(1) ProxyCommands are now executed with $SHELL rather than /bin/sh. * ssh(1)'s ConnectTimeout option is now applied to both the TCP connection and the SSH banner exchange (previously it just covered the TCP connection). This allows callers of ssh(1) to better detect and deal with stuck servers that accept a TCP connection but don't progress the protocol, and also makes ConnectTimeout useful for connections via a ProxyCommand. * Many new regression tests, including interop tests against PuTTY's plink. * Support BSM auditing on Mac OS X * bugfixes - remove addrlist, pam_session_close, strict-aliasing-fix patches (not needed anymore)- fix CVE-2008-1483 (bnc#373527)- fix privileges of a firewall definition file [#351193]- add patch calling pam with root privileges [#334559] - drop pwname-home patch [#104773]- fix race condition in xauth patch- update to 4.7p1 * Add "-K" flag for ssh to set GSSAPIAuthentication=yes and GSSAPIDelegateCredentials=yes. This is symmetric with -k * make scp try to skip FIFOs rather than blocking when nothing is listening. * increase default channel windows * put the MAC list into a display * many bugfixes- block SIGALRM only during calling syslog() [#331032]- fixed checking of an untrusted cookie, CVE-2007-4752 [#308521]- fix blocksigalrm patch to set old signal mask after writing the log in every case [#304819]- avoid generating ssh keys when a non-standard location is configured [#281228]- fixed typo in sshd.fw [#293764]- fixed default for ChallengeResponseAuthentication [#255374]- update to 4.6p1 * sshd now allows the enabling and disabling of authentication methods on a per user, group, host and network basis via the Match directive in sshd_config. * Allow multiple forwarding options to work when specified in a PermitOpen directive * Clear SIGALRM when restarting due to SIGHUP. Prevents stray signal from taking down sshd if a connection was pending at the time SIGHUP was received * hang on exit" when background processes are running at the time of exit on a ttyful/login session * some more bugfixes- fix path for firewall definition- add support for Linux audit (FATE #120269)- add firewall definition [#246921], FATE #300687, source: sshd.fw- disable SSHv1 protocol in default configuration [#231808]- update to 4.5p1 * Use privsep_pw if we have it, but only require it if we absolutely need it. * Correctly check for bad signatures in the monitor, otherwise the monitor and the unpriv process can get out of sync. * Clear errno before calling the strtol functions. * exit instead of doing a blocking tcp send if we detect a client/server timeout, since the tcp sendqueue might be already full (of alive requests) * include signal.h, errno.h, sys/in.h * some more bugfixes- fixed README.SuSE [#223025]- backport security fixes from openssh 4.5 (#219115)- fix manpage permissions- fix gssapi_krb5-fix patch [#215615] - fix xauth patch- fixed building openssh from src.rpm [#176528] (gssapi_krb5-fix.patch)- updated to version 4.4p1 [#208662] * fixed pre-authentication DoS, that would cause sshd(8) to spin until the login grace time expired * fixed unsafe signal hander, which was vulnerable to a race condition that could be exploited to perform a pre-authentication DoS * fixed a GSSAPI authentication abort that could be used to determine the validity of usernames on some platforms * implemented conditional configuration in sshd_config(5) using the "Match" directive * added support for Diffie-Hellman group exchange key agreement with a final hash of SHA256 * added a "ForceCommand", "PermitOpen" directive to sshd_config(5) * added optional logging of transactions to sftp-server(8) * ssh(1) will now record port numbers for hosts stored in ~/.ssh/authorized_keys when a non-standard port has been requested * added an "ExitOnForwardFailure" option to cause ssh(1) to exit (with a non-zero exit code) when requested port forwardings could not be established * extended sshd_config(5) "SubSystem" declarations to allow the specification of command-line arguments - removed obsoleted patches: autoconf-fix.patch, dos-fix.patch - fixed gcc issues (gcc-fix.patch)- fixed DoS by CRC compensation attack detector [#206917] (dos-fix.patch) - fixed client NULL deref on protocol error - cosmetic fix in init script [#203826]- sshd.pamd: Add pam_loginuid, move pam_nologin to a better position- fixed path for xauth [#198676]- fixed build with X11R7- updated to version 4.3p2 * experimental support for tunneling network packets via tun(4) - removed obsoleted patches: pam-error.patch, CVE-2006-0225.patch, scp.patch, sigalarm.patchbuild22 1228292558,j,j,j,j,j5.1p1-40.15ssh-askpassx11-ssh-askpassSshAskpassssh-askpass.1x.gzx11-ssh-askpass.1x.gz/usr/lib/ssh//usr/share/X11/app-defaults//usr/share/man/man1/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gsrcrep:2d383a989b4bf93a072f526744de38d7-opensshcpiolzma2i586i586-suse-linuxշ?.L!lסYj?] b2ҍ]o C57|j0lQ\1˩o`'{,WWh!{ʅĐ9pE/bnN0([EcJL͎>CWRaلy:r8嵳zK/H=Mcsjʖ8XLV\GPуD|Ё+]2   O̕c)Mj9_t5&#r֟2$4UȐ2]2*^!rv/v ҧosTس9ǚbUB{%rx-~ IE4Ձ.j M5Tj!C$䫢m3Wh0^5Z#AɎ|[1iݼ#'EE=S^!Z>=Ht Z@7q^v9>ZV`';rspx9q+7a1|޹FJh2KKHDSMkk%dS!&atjN9U#(@o,\u%pE/Z>ߓ΍R 5oy SETFafGYgiX(аAE L$lvdcsƀ=C'K(uSAj1v EY&S"eXKF]$ ewOڈhswgW̢jhiG}ItCDln_^"aCwwkta9j"xS\Ww9Y_r}'ju9A2`FnMt\dD7b$26bZ(zuEFpN+X81: P^=:Eb蕡mzݞ#*F4CǕ:~qgDZJcG ?%bUKM@& F )dORƢD* c`)}P7,2 E[KT:WQMrH݅;ҮjzYܹch+M4x8iz1+¸lYJk~MgyB~;1*kHՙCw.ߖ zpBXm–Px5 l;_ܟL*J]MgKqJPK|Axʹ~7i~sl^"Z,Q#18 !8֮ʹ%pXġ-67'Ӧ .ghPZm#+DYE٩ fcwt*JfU}Vk>wS5`L"9:Y> L>+ocKG,(tf]2T\l׍"hi\M3]lA&*"[@XD}ƺzgڐJEH _pdcƉb}|}Qy_جfULQy6'~OapJE Z b&avJg ,HլJ>&U&GتL0ihV38Ǡ$@B%^DڴLUoX2Gb'ٮ|ɾDf b4_罢}= 5+C̔N΢|N#+WBw_3 ?vq[~r [ !72cݓkfÛs WG8#^I3 q_# ]J a|b!S_ڈIR~ݘt,PE߂&xtZY 16 $*PiMr6 k Bga;@&Tn@Llm/3/54: 8*d%4 EeCaފ0 NiIiL' m#)+Do||!O1b38R \ co x/߀~Z2λg!ῷkbnkMm/%yO4>'pmqņz)w) NbTn=*(Vig~U~p b^'Az?JabB3v/%ttt)݀1UnU)<7qgv+R\b06+W*'q=DrNJRtR/kK'4AV4w?dy%2+|$@^L iLRԓH;#`: rLog1/e} o/%i]2`ogna4y;]G?*zCU;0vB 7(4C]߃~,$| aq2 ђ~͠l㚤+4UvصZT=Hcw^aTiua@_sbյ>cv%_4`.hJjq/Bf`+kN;LvC6㕷짽_‣$}ŎJ7y'JuH47?Rr.\\_o-qATvmk*q\5ey@z>둼w+ .+תZ9"1:J1VkOc};ǾPZ^)8Zǵ4JL^q " g]&rDJsz"t6A8Xw5wa Y/_%_ڜlߔR+<]Hn2lt1PP#<ȝyv f8_Yr[)fxĦRx3Ԉ!p-ss9IXJJ ;P߮ck哘%O &HRеZRzN}Iݰ". @!iɅ Zvϯ*O 1߫וMzv2NElZs\&;zLѝ<j]C@]Ƽޮ?u ulnQK (q(_Dw|nC4,rؓ0mQ =EUQn>SϠ-SтƱY%U]:p`%n3FG?t^bXXExWڬiTfAXBֲt8fV/h<$D]#z/dmY܏ # %×gl7C.zԉ pE+ zCݻ=ty-5 We6"H]׋T2熉,&.Fήfx,ln>? je=6P}Uwk;s&\HK@S/+;X3?`(y0WhI_?R3_OA\uPz*젫I|&wgHBFgț'UNEd~c/d7d^:t`ggCݵQ@:k.t"\z?>`^59X[~rotէ )./$AC8J+~:9zU߁b3dIpA3ǒF6sN>mCrTSӔŜ9YNw׹F^ziכ+%ef (7Ii~/y-{%bfUԸիxY,8(ݵj]l3 П -?]DŽAe7:Y^_ Ӆ@qc5\GufzaI- ':Uwo)x;! =__;Dbm߹g;5Kq?k}.WGFiXc., -'&sGg6<tFݠz!gyp=@yeFMZ|y^yAͶB>bJt@1*sqizYeb0gY_Ot5 !Vs#'롧?/n-mf#j"l8TՂi |97 QqWbJs^Ts{\떦Em9TeD}PtgY٩;f}lO*|қI$ӥKvK܊0GK8zg- NZ;HO*%M\Waya ^ŭ!P,47wdLUvX*g Lܲg s_O{AX7N^ <۠-x7g䘓hehKM PcJ^ܯD=V ڡx:qK4U} L[.\^{{ن<8@޾S]/ǡ1`j=ݬ8AyUZ4 |3rH\h5ӜoRf~Ė:HQ38Rld-!]5mXyĒ\χDE?jC 9(z(s/J]'OJHAe&p%|ynP"ٜyvnv[%pK+q(n_8Nm`g!02xLž.C F &0ehr ."t/oMYR~cj\b`sBGoo8ay'S)E7QV@.SMػ&:ώd/{kgLKB P ^D'D Nk'ƒa𶲯{뫛s2UHȂ#|s\VP('s;|M}h靏$sdɻ%X$=0ѣ7Ԫ N0#er{^aAR~mr&R*m<ޯt&)58oבPhߡ Ʌm蹐:KcUi%2|Ed㒭>S]Tx 4i&m,74  ĿZNE䭴5g?0]?~t=Џ#aE 󚥜b~ ݓ&pf JĦ6N^bx|$i5#LnNQTך* xΆK(*Nƙu);:TpςDcG=s lC|LYVOdyˣxVQV^*P3dpTzm =7-\Vv" 6BV}0Wǒ|+N\ĝqbuh U7 C]w7`?1]H32WPLnCތt 8 cbPTPY=jl.[5UkdA+YgZop}&3Z贉sh#ɋOv8팚07 G3p5_4B)Gmn@MvS[SCGϊF4wiō% K)U%|{t]i3lt~UWYI|+TL2ՉYV =+aK&! ق5p{!twdV!w68 K=.CPL*fD{OT$6:MDGƬ@K5#ȘN#kzYݞ 2̎ rZ>#Yۼ!EPI{&^ rb-7>KKJ7mџ!v)|1i6_찢VڵX@Dk-˃!l5{7 TRW:VL_4; CA!j=Q85li B+nh+X|P"(> k:6S-eة87ޗ'»eb8czZ|p(cis=_istIYpoY yK`)p9W% &{qYDd C2|ȳV#cJ-q+Ŀ"^r-EMj @ Lѧcʦ6LmB}=,MҊ3"IW"Fŕ j^R(*>o:COhK @"x@G9}uFdvOd$j/ UingnCvl+5(&ĤeDGwGrJʋGaN><=:/(ׅf$$;VP1#aok$>"~jļc +΢+&ƘnMR{D o[sqR P B;nH?3]z [/oVJDRj |h<3H&*IM,k43w\;uAxl\  Y')'N%xԵ- wk:g{6k㙁.kIwo04}F5U؀se@[uxrbOמs|PZTMZQ֩e-m0xތn^͝:<E(oBDf@eAH32~ I`EA}d(Q8e|FA&.<&~A{כsg:wٵ!.XG-(Hڄwm:t_qoͱX&bq^n9hq&ACxGš>b';"ýT[u63UXP>Qi@]OArxZ JY]q[iY),ńeQ=rUqE=GN%#A~홏ft*5gtAdmtuΤTx7HO0ϐhA5ld峡yѪ皟QyZ3{"u(3c2СfsO7c޺~ơM 7Q6g3r g U(*617rYRߍnx9"Qg֛ c#tQ5ի8>Ob6HytwOd w ![(MshQj>wũ!5(q%b%|?n,;Bn l^20 JVq)3 +rV&8T=գz_7`t~e`>-~ẈYMoou?J 6yPtz}ql@+WK竎N9vgve~>4!ǻ*cPD(r [YBcea_j 3S`k-)^\Z$św;T L/ˍ_^a$C]ab4 cJmt=Wva *98 o#Q]p0Z܌C]bOe#!P[)E2Qi]~KXyak2\)2ڍ%>!/ykJE?'+O:xb 7GrLZ?m*# YIξ`hC:]_A' lQc aPTXX1eئ\6\6%Ιb"m/>&g Gu0Nh;~BvKaלYQ>dwQ`pӝa5^a%pFJɆ1O不"*V$XRKŁy(ILnEC:e' 3YLouJH{hDO2V xG2?沠1~_g{Ww8R= 3E/ ;/rw&`u&9u}2ӏSREqK-w]NDʧo ՎbI(5ӗq̼*.xsp,մgXEr=ɭI遰0Eu`+|h##[hPhzdΐM&8D]yiC,.VEgiݩΖ2G2`IdAcj=ys0[m4Nc8f_эjWssǗ3BT>d7OZxg?~.",&51?rvx1;61ٓWq!O\T4[8sodDquZ4jX32^GESZc@ٛϧ>5p. z µDWk*ǎJ(%KAN&fr[ Z[;3_I,y?uJnŷZ}\P+f"IG[0V lnJ7=]$a8m&Ib_)jwiTVnf:եian `U;y '.\i]lq baDkͱֱz%|"5 8LKĒ,UbxAqi+8,`]z l c!)bzC/g5l~@LVI J+2alH\]zݩ8{ժHe;|V_yPZ t4L[_f=@("DmR]qSR@6Zm(FrпH"z,^0Z0rQl~AY>\DІk۶]6 ̏tHmo>8Tn3Pcl>x;rB)(vq=h ”ٺAƛ_hRph$`86eY'^i?Oi,z.eϾpva9:CJr tUua ivdsf0(\KMwpR4]b`,)n kbdeJMO `#[׉ɅPp ǾEluÓ[ym'ܱޖA9H'<\#H.[HG0D? (hѣtWQ:LTt~fA;I<@\2bmR~N DivL!]3/ >vjY2ye!BeSjY ^Dp5.Y~+*7>^Ag<ۿx+EbG0vɲ5Z C:|HK2*= ʒ ȺŽY|h닪ֲȴ%sk,S&%+,t1;QzUo_+*~3`ןZ0<h>b7ge&֓OBO/-qHsY퇣ݧ-` 4 #u7 -K#"giwf(|/t` 0~_ Ẋ}/ڪFcߣ~2 a\#IɲzẀ&֫m n@*9Tz-n5Q]]&BGOwpnnKZVoĈQ5{#`BRA)pb)0 :HƌYWU^)5SK \X`ˈ2TS3hRP#q:21>%|0qH8&P[ѫs+T()v9;|iF5qq<74&93G>2%,qNP,tƇZ &[]AE7++b'PmtC+č^t|7͏ 3ޙOE@f>d.4m=v &׿ 4)X8}RuClZf㼎 ?^TȿI!*M (JL c_G[ kj/exy(_d\KZV~ 4ytFSpT!_ zۭ2 5>,lajnN4ʄ EBoXli p`<>cNNxUQg^|}@nI}e"¿[=LG7Cu("ii-8v*% kI .R-l*~=ٶTTw3)ZGЇ8k_̓3|ei}{3M܋Mz@MS)+-P?ʷBR߮O1U0{}Ybk8i ^ .9.ހ2jS5hdM±.EoxEz <4pdd;DD*uYň"$L (PzZ{e)6=nmių>xLrқuHѸ+7Qok䥘sϤs^O-[nʰ1b6tbXR3T0tN*+\B;%@wNI8^\`IT Ìm"~&dT8 ^- yWMYVS`RHg R|߼ %bUaOЊWxmlD܍Wl}kaS8Xj8H< p9=J #OE=:8~A&.OBs_6Hތ ^cR_֋F$7ǰqgX9wRj>2UrȰy#s[ϙjQކiaN{yӀ8~hp֐k '˗ӈ[#l(7r݋5VBp4~UxF -S| BfP)gT{\.#j ̹6@>ڔ0KK VsIn$Hloq-r>kt܊ rf& mU੷z{=GFKجoDB 3G_'3]l}鎦-:fV8t_d+::@~ecLːTՙSs[ wH*zYxEtԇ [`%'X@H٢^3 JnTxk }m2AF^z"4sY!Y:&7/jZ;KnJ.nw/f̑Nv٫ci1x 9GA#pX.6j#n1Ҙn1c2N]+:k5'ZommX>BJb]b2ǺQq%zE^0;{Sh4LAD9Gg~&VuIl)rYʝEnŨ|18?H0iyc? Tļ:S[mLrk! ;vc8RŝǝUk7 3؀om8dZwq9N Tj)|;Ֆsy㎻?- 7x;I%|'g 塎9HBjt|\[.b`߉] VD[c !e