jsch-demo-0.2.15-150200.11.13.1 >  A e̮p9|6Za:Ɏܵ1s8Sa񳔳5񌽙e`=hN'_sJo>Ұޮ=N9p}fiAtA{HYUHഃ%x| gaKVs.,.cR(Oށјnx @kpwC|zEW] Hё^fh7N &sFPQ,ZsK M8z{ Gs8a0a4146e6c91a437abfacaa1f63f61a5f21f086cc8c8a0a77401d5157ce489edf9fad243b5be9d1ad9f5446dc919d37dabefe3ce̮p9|^ aOe #Sɛ4+{ *1 Q3U0oӍV$9hF^1"-M#׋%cTZ i'ʐɌ'+|W&4W&4I)F, _Dh%FW OtKE-l*K4~ n $BWmk9>p;N@?N0d  " C!BO e$ ^     )  H  M   x   ( 8  9 H : FHhGH|HHIIdXIYI\I]J^KbKcLdMeMfMlMuM0vMzMMMMN,Cjsch-demo0.2.15150200.11.13.1Pure Java implementation of SSH2JSch allows you to connect to an sshd server and use port forwarding, X11 forwarding, file transfer, etc., and you can integrate its functionality into your own Java programs.e̒h04-ch2a(!SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/Javahttps://github.com/mwiede/jsch/linuxnoarch.&{? p$`C` GA큤ȇ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-0.2.15-150200.11.13.1.src.rpmjsch-demo    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1e@d{+@b5^k@^k@]@Y@Y:Y@XN@U hgkenion@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comtchvatal@suse.comdziolkowski@suse.comguoyunhebrave@gmail.comtchvatal@suse.com- Upgrade to version 0.2.15, which includes fix for SSH protocol vulnerability (bsc#1218134, CVE-2023-48795) * Changes in 0.2.15: + Address CVE-2023-48795 by adding support for new strict key exchange extension + Add support for ext-info-in-auth@openssh.com extension + Introduce two new config options to control usage of the new strict key exchange extension: ~ enable_strict_kex (set to yes by default) ~ require_strict_kex (set to no by default) ~ If either option (or both) is enabled, then JSch will attempt to use the new strict key exchange extension. ~ If the require_strict_kex option is enabled and JSch detects the server does not support it, then JSch will terminate the connection and throw an exception. ~ If the require_strict_kex option is not enabled and JSch detects the server does not support it, then JSch will fallback and proceed with the connection without using the new extension. + This gives users the ability to enable a strong security posture if needed and avoid proceeding with connections to potentially insecure servers. * Changes in 0.2.14: + #450 use Socket.connect() with a timeout that has been supported since Java 1.4 instead of using old method of creating a separate thread and joining to that thread with timeout * Changes in 0.2.13: + #411 Add flush operation from Fix added is/jsch#39, with new config option to allow disabling in case it causes regressions. + #403 add a warning when Channel.getInputStream() or Channel.getExtInputStream() is called after Channel.connect(). * Changes in 0.2.12: + Further refine previous fixes for windows line endings in PEM keys + #392 replace call to BigInteger.intValueExact to remain compatible with android api 30 + Introduce JSchSessionDisconnectException to allow the reasonCode to be retrieved without String parsing + Introduce specific JSchException for HostKey related failures * Changes in 0.2.11: + update dependencies changes + #369 fix multi-line PEM key parsing to work with windows line endings due to regression from previous fix for #362. * Changes in 0.2.10: + Fix new Java 21 compiler warning: possible 'this' escape before subclass is fully initialized + Tweak OSGi bundle manifest to allow Log4j 3 + #362 fix PEM key parsing to work with windows line endings + #361 guard against UIKeyboardInteractive implementations that include NULL elements in the String[] returned from promptKeyboardInteractive() + Add a default implmentation of the deprecated decrypt() method to the Identity interface that throws an UnsupportedOperationException- Migrate from com.jcraft:jsch to com.github.mwiede:jsch fork (bsc#1211955) * Alias to the old artifact since the new one is drop-in replacement * Keep the old OSGi bundle symbolic name to avoid extensive patching of eclipse stack - Upgrade to version 0.2.9 * Changes of 0.2.9 + various improvements, #295 ~ #293 allow UserAuthNone to be extended. ~ Make JGSS module optional. ~ Tweak OSGi bundle manifest: ~ Avoid self-import. ~ Mark JGSS as optional. ~ Loosen import versions of dependencies. ~ Correctly adhere to the Multi-release JAR spec by ensuring all public classes under versioned directories preside over classes present in the top-level directory. ~ Eliminate stray System.err.println() calls. ~ Change PageantConnector to use JNA's built-in support for User32.SendMessage(). + Improve error handling in InputStream.close() for SFTP channels, #331 * Changes of 0.2.8 + activate sourcecode formatting, #247 + build improvements, #279 + #287 add algorithm type information to algorithm negotiation logs, #290 + wrap NoClassDefFoundError's for invalid private keys, #289 and [#290] * Changes of 0.2.7 + #265 change buffer_margin computation to be dynamic based upon the MAC to allow connections that advertise small maximum packet sizes. + #266 fix PuTTY key parsing to work with unix line endings. + Add support for ECDSA and EdDSA type PuTTY keys. + #71 add support for PuTTY version 3 format keys. ~ Encrypted PuTTY version 3 format keys requires Bouncy Castle (bcprov-jdk18on). + Eliminate KeyPairDeferred and instead change handling of OpenSSH V1 type keys to be more like other KeyPair types. + Be more vigilant about clearing private key data. + Improve PKCS8 key handling and add support for PKCS5 2.1 encryption. + Add support for ECDSA type PKCS8 keys. + Add support for SCrypt type KDF for PKCS8 keys. ~ PKCS8 keys using SCrypt requires Bouncy Castle (bcprov-jdk18on). + Add support for EdDSA type PKCS8 keys. ~ EdDSA type PKCS8 keys requires Bouncy Castle (bcprov-jdk18on). + Attempt to authenticate using other signature algorithms supported by the same public key. ~ Allow this behavior to be disabled via try_additional_pubkey_algorithms config option. ° Some servers incorrectly respond with SSH_MSG_USERAUTH_PK_OK to an initial auth query that they don't actually support for RSA keys. + Add a new config option enable_pubkey_auth_query to allow skipping auth queries and proceed directly to attempting full SSH_MSG_USERAUTH_REQUEST's. + Add a new config option enable_auth_none to control whether an initial auth request for the method none is sent to detect all supported auth methods available on the server. * Changes of 0.2.6 + Include host alias instead of the real host in messages and exceptions, #257 + Fix missing keySize set when loading V1 RSA keys, #258 + Enhancement to present KeyPair.getKeyTypeString() method, #259 * Changes of 0.2.5 + Explictly free resources in Compression implementations, #241 + Fix integration test failures on Apple Silicon by skipping OpenSSH 7.4 tests, #227 + generate osgi bundle manifest data for jar #248, #249 * Changes of 0.2.4 + Improved excepton handling by @norrisjeremy in #200 * Changes of 0.2.3 + #188 fix private key length checks for ssh-ed25519 and ssh-ed448, #189 * Changes of 0.2.2 + setup jdk for code-ql analysis, #151 + misc improvements, #152 + Fixing Issue #131, #134 + Update link to bcrypt, #157 * Changes of 0.2.1 + Allow to set a Logger per JSch-instance rather than a VM-wide one, #128 + Preliminary changes prior to Javadoc work, #126 + remove check to allow setting any filename encoding with any server version #137, #142 * Changes of 0.2.0 + Disable RSA/SHA1 signature algorithm by default #75 + Add basic Logger implementations that can be optionally utilized with JSch.setLogger(): ~ JulLogger, using java.util.logging.Logger ~ JplLogger, using Java 9's JEP 264 ~ Log4j2Logger, using Apache Log4j 2 ~ Slf4jLogger, using SLF4J + Fix client version to be compliant with RFC 4253 section 4.2 by not including minus sign characters #115 + Add java.util.zip based compression implementation #114 ~ This is based upon the CompressionJUZ implementation posted to the JSch-users mailing list in 2012 by the original JSch author ~ The existing JZlib implementation remains the default to maintain strict RFC 4253 section 6.2 compliance ° To use the new implementation globally, execute JSch.setConfig("zlib@openssh.com", "com.jcraft.jsch.juz.Compression") + JSch.setConfig("zlib", "com.jcraft.jsch.juz.Compression") ° To use the new implementation per session, execute session.setConfig("zlib@openssh.com", "com.jcraft.jsch.juz.Compression") + session.setConfig("zlib", "com.jcraft.jsch.juz.Compression") * Changes of 0.1.72 + Switch chacha20-poly1305@openssh.com algorithm to a pure Bouncy Castle based implementation + implement openssh config behavior to handle append, prepend and removal of algorithms #104 * Changes of 0.1.71 + Address #98 by restoring JSch.VERSION * Changes of 0.1.70 + Address #89 by fixing rare ECDSA signature validation issue + Address #93 by always setting the "want reply" flag for "env" type channel requests to false * Changes of 0.1.69 + Address #83 by sending CR LF at the end of the identification string + Fix earlier change for #76 that failed to correctly make the "Host" keyword case-insensitive + Fix PageantConnector struct class visibility #86 * Changes of 0.1.68 + Added support for the rijndael-cbc@lysator.liu.se algorithm + Added support for the hmac-ripemd160, hmac-ripemd160@openssh.com and hmac-ripemd160-etm@openssh.com algorithms using Bouncy Castle + Added support for various algorithms from RFC 4253 and RFC 4344 using Bouncy Castle ~ cast128-cbc ~ cast128-ctr ~ twofish-cbc ~ twofish128-cbc ~ twofish128-ctr ~ twofish192-cbc ~ twofish192-ctr ~ twofish256-cbc ~ twofish256-ctr + Added support for the seed-cbc@ssh.com algorithm using Bouncy Castle * Changes of 0.1.67 + Added support for the blowfish-ctr algorithm from RFC 4344 + Fix bug where ext-info-c was incorrectly advertised during rekeying ~ According to RFC 8308 section 2.1, ext-info-c should only advertised during the first key exchange + Address #77 by attempting to add compatibility with older Bouncy Castle releases * Changes of 0.1.66 + Added support for RFC 8308 extension negotiation and server-sig-algs extension ~ This support is enabled by default, but can be controlled via the enable_server_sig_algs config option (or jsch.enable_server_sig_algs system property) ~ When enabled and a server-sig-algs message is received from the server, the algorithms included by the server and also present in the PubkeyAcceptedKeyTypes config option will be attempted first when using publickey authentication ~ Additionally if the server is detected as OpenSSH version 7.4, the rsa-sha2-256 and rsa-sha2-512 algorithms will be added to the received server-sig-algs as a workaround for OpenSSH bug 2680 + Added support for various algorithms supported by Tectia (ssh.com): ~ diffie-hellman-group14-sha224@ssh.com ~ diffie-hellman-group14-sha256@ssh.com ~ diffie-hellman-group15-sha256@ssh.com ~ diffie-hellman-group15-sha384@ssh.com ~ diffie-hellman-group16-sha384@ssh.com ~ diffie-hellman-group16-sha512@ssh.com ~ diffie-hellman-group18-sha512@ssh.com ~ diffie-hellman-group-exchange-sha224@ssh.com ~ diffie-hellman-group-exchange-sha384@ssh.com ~ diffie-hellman-group-exchange-sha512@ssh.com ~ hmac-sha224@ssh.com ~ hmac-sha256@ssh.com ~ hmac-sha256-2@ssh.com ~ hmac-sha384@ssh.com ~ hmac-sha512@ssh.com ~ ssh-rsa-sha224@ssh.com ~ ssh-rsa-sha256@ssh.com ~ ssh-rsa-sha384@ssh.com ~ ssh-rsa-sha512@ssh.com + Added support for SHA224 to FingerprintHash + Fixing #52 + Deprecate void setFilenameEncoding(String encoding) in favor of void setFilenameEncoding(Charset encoding) in ChannelSftp + Added support for rsa-sha2-256 and rsa-rsa2-512 algorithms to ChannelAgentForwarding + Address #65 by adding ssh-agent support derived from jsch-agent-proxy ~ See examples/JSchWithAgentProxy.java for simple example ~ ssh-agent support requires either Java 16's JEP 380 or the addition of junixsocket to classpath ~ Pageant support is untested and requires the addition of JNA to classpath + Added support for the following algorithms with older Java releases by using Bouncy Castle: ~ ssh-ed25519 ~ ssh-ed448 ~ curve25519-sha256 ~ curve25519-sha256@libssh.org ~ curve448-sha512 ~ chacha20-poly1305@openssh.com * Changes of 0.1.65 + Added system properties to allow manipulation of various crypto algorithms used by default + Integrated JZlib, allowing use of zlib@openssh.com and zlib compressions without the need to provide the JZlib jar-file + Modularized the jar-file for use with Java 9 or newer + Added runtime controls for the min/max/preferred sizes used for diffie-hellman-group-exchange-sha256 and diffie-hellman-group-exchange-sha1 + Renamed PubkeyAcceptedKeyTypes config to PubkeyAcceptedAlgorithms to match recent changes in OpenSSH (PubkeyAcceptedKeyTypes is still accepted for backward compatibility) + Reduced number of algorithms that are runtime checked by default via CheckCiphers, CheckMacs, CheckKExes and CheckSignatures to improve runtime performance * Changes of 0.1.64 + #55 bug fix * Changes of 0.1.63 + fix for #42 * Changes 0.1.62 + #13 reject HostKey with some servers + #20 Include TestBCrypt.java unit test + #21 Misc cleanup + #27 Update Testcontainers to newest version to fix test failures + #34 NPE with openssh v1 format * Changes 0.1.61 + Add support for chacha20-poly1305@openssh.com, ssh-ed25519, ssh-ed448, curve448-sha512, diffie-hellman-group15-sha512 and diffie-hellman-group17-sha512. This makes use of the new EdDSA feature added in Java 15's JEP 339. #17 + added integration test for public key authentication #19 * Changes of 0.1.60 + support for openssh-v1-private-key format + Fix bug with AEAD ciphers when compression is used. #15 * Changes of 0.1.59 + fixing issue #6 (originally from https://sourceforge.net/p/jsch/mailman/message/36872566/) * Changes of 0.1.58 + adds support for more algorithms, see #4 * Changes of 0.1.57 + support for rsa-sha2-256 and rsa-sha2-512. #1 * Changes of 0.1.56 + support for direct-streamlocal@openssh.com (see SocketForwardingL.java) - Removed patches: * jsch-0.1.54-sourcetarget.patch * jsch-osgi-manifest.patch + both problems are handled differently in the new version - Added patches: * jsch-junixsocket.patch + disable building with dependency that we don't have * jsch-log4j.patch + disable building with log4j support in order to avoid a huge build cycle- Modified patch: * jsch-0.1.54-sourcetarget.patch + build with source/target levels 8- Version 0.1.55- Added patch: * jsch-osgi-manifest.patch + create the osgi manifest during the ant build + replaces the MANIFEST.MF file - Miscellaneous clean-up- Remove reference to the parent from pom file, since we are not building with maven- Added patch: * jsch-0.1.54-sourcetarget.patch - Specify java source and target levels to 1.6, in order to allow building with jdk9- Build with full java, does not compile with gcj- New build dependency: javapackages-local- Version 0.1.54- Fix build with new javapackages-toolsh04-ch2a 1706282130 0.2.15-150200.11.13.1jschAES.javaChangePassphrase.javaCompression.javaDaemon.javaExec.javaJSchWithAgentProxy.javaJumpHosts.javaKeyGen.javaKnownHosts.javaLogger.javaOpenSSHConfig.javaPortForwardingL.javaPortForwardingR.javaREADMEScpFrom.javaScpTo.javaScpToNoneCipher.javaSftp.javaShell.javaSocketForwardingL.javaStreamForwarding.javaSubsystem.javaSudo.javaUserAuthKI.javaUserAuthPubKey.javaViaHTTP.javaViaSOCKS5.javaX11Forwarding.java/usr/share//usr/share/jsch/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32264/SUSE_SLE-15-SP2_Update/ca866b4feaf6d8be9ce4fe2569d6eb52-jsch.SUSE_SLE-15-SP2_Updatecpioxz5noarch-suse-linuxdirectoryC source, ASCII textASCII textR%~Rayutf-86f15ec795b6ff04f3d8586ef9d8e7820e3dae4b83d681a76bea0bb6858759d52?P7zXZ !t/80] crt:bLL $(Plz݊ %XBFYvwwR~ ~;P8+{n0Fnh=٩į OaFjNvH .uBaZv%&ń.*'" qhMlBv˘~EWhGyu xB(?/evרxׁ3B2.8g +RZH|0knjFafcmBaEq3N-'$,ᢧc':eCr*zɣ^!%19TT BɌΆOy;FPI&n{}AC7QchyVܛиb=54(SWɖ n%_NG^^w\QAyd?wv ]1SLJ1ŷung7b`k[ᑡxh H9ۛLGbRBUli8e2nx/ AI;> }< ̱Ip۹ښ{ÿ,anfUi0؇J7uBiHHq+i5i %mSDD=᧟1e#1V(惢9)^K>7O!rZ67cq;9}ltp:$Ӊ~944:L0\] -il=)V+."\~PL^u "+|#lsYw`Kߑ(y¯u#+EeEvf)1l7'VST"u9 <$Q8 ?bφ{>-]LS:K#XxL% )4RX3phdX !@ZY;0ws]d[XKs/b "}We=>moO! EPG{cͮCw!NKK uw8hh|/qnIH/!SJKb*dfG(lD:fR+Vо$O/!{~E2$iyX}XIvOSԣ!PĮ /MNPɩPY)t":VZ@Nz`êp(B|fse,ǟ0bI7vP<ŴYG"zњ0D \j&++Ljki2)~N倠!=K*Fu6F^-duz=163{P5 !&spJw[.Z⺔aze@9.ig $#u,=;-|F P]+I穽J6d]ghX?ϮsG_.IizgL#K1.u3c%Ou*y 适Ap1Xyg kMyѭrXG յ?e<e@T-CS+6Ou?5ht{I3~ğFu[|ԩޜBd6`!}ri+ ȏ&kh g׸}پǃ9qhblK|N]W rMQ8^KI.$KTP8$} flm4^# N‘~IzzL5LȆHQcY]1,g6 (E;JI)A5"]<8iX}GcH0;I?Ё*ʗ.]GZ*xiá)O Ͻ.iWçHD~B%*_$h+mJf.*c=)LI_ ,t I 'nc%$k8j|x=9H;)ôW̓u%T*˔a7 `u+gW"oGXZ䂶wHwPN*h3c˃B{9 ,Esq{0E Qkl JTӵf%j#:F"ΗBR,Ey'Zo*b l$*i%.Pγ@aWd!N'HD Adٜa_=S֗~_ph;Irnw i^ȅ)삤s4pwj))-F5B&fOݙ^䫲rx+e8q!ҠʶHi^(:M/Hw[6!PxCU}i83%M0ѿ^ q9qJL~eƯ%M"hll!'=kywaƂgsNNc/LT,J![^z`7+w ]@yQ.fMKU@㏁[l)(4S| (!r2l4$-1HRq2BBMv/_ A; '<%XiDZy *AR>S+߅0)<ԣ\ h<#wt kX =,DN9|5;*=q< >%20/ X>-Q6\0 nT)V ao%7y~4C%r6&o[E P.At)Z܅Q$}5>ŐHԧ6ŭ2'",]#š 8o;QZô5D$vmؒ܄Bf8gԍCcnKfLZ(5 ZP9Y6rXcy-yA|,j^^: ϝT7ph5J8)ŊXei"9u;`J"%8+cKҡ ?`|$y{MYF>9Q.A)08T;gG,[27ƙt쟼Ty1rGJʃ!Q1xA&6ˑ$wDxy>鿭 grymOءHù3ep,F O.dʹ{ZXn 37T*2NjcXa09KzhX]&iCB0%gE\W#z\6fL}8N ՕBQYځi3gg$Go7 x&ݠֆ|bĽoL_!ϖsH^Xnh>CquЕMZ0mUsmOe9_yܻ7`{PV*pK깝g?0hH6OHx)mǽj91+?Eqk[2T%F%kAY$غfn$c]fbP_3ea]d=TรalЙ"~Yj4U]ro@&ӧVqՐUjg82dnH2mULYQz/s|Zv_@BNO"jkj+^hmp8IЧZ~F(Y=MH(DDɲ2vEH4G|3#GZ 6|ad_ŇzyњbLWuk!k֩`d dɀ,rl լȌ <&y%v .(ůagu:&Q2k\cEv(KC'|(0@"-HIx7Gx`AdFZJ 3|cY8U܋N Cp6u.=#a,6ٺ2Έ03`*c7Ⱥ3"X:ڋpClj{823J iLCi2{+~o>6ظAy~ {m`ݱ!Qթ*N2k9<^CYſg* ;/bԛv8T^pRRpč-MNVdŸlgq֬+4ƃrNes0"@_:xOh+[0F (+?0vyb N8}?`\XWJCf5Yv~2zTٻsq^؝ZiQkVOLKQebŽs0Λox,JQ]tF79b1h'xt([Вu-[fjA>x3/G[\*v? %͒ yCe""c l1t <5M\$ay87bZ~`?r/۩R<ۿ.[*¼rs1ϖET|c#6) X!hJqJװG_M C@Hʶ[6Xd<*oND0H qj绡(_Ri]Gh;5[wY1:0 iWGpXjvZ³ˑ?6Z]|V5 L~No] 2$gTWr2b,n6N!>)qJEbqrWSDvvZt׀%#NIuM+;^~69]I#j}96ʹ[iDkɦ>*@gBDBY/uTZR~ٙKO:EPwq۷شYE;U1cxbqmua0؁a|[>a#ΎaS߃i[[t0GhF/#1]Q(J_neq^$}n.;4(]gֳH!yF58;C]X i TK+2 QHn8MÙQ\&WmA/Qt c[fcL-г^s<~[E' )y)kQy_xWUbv7C"liTqg` ؜l&ܨd33kU+`Hk(J1wJk3|D[6Sm}҆81Sn Yg-qŢ7=b;j}#w\DV;#C) Swiecj`o9?%@*gz 4|qî _r |+CNVfu]O3D\(R Ű߸wÞb| 8*o-6̞Zkh`k[2$(2]<3Z@3Qmeg S,!Bg=6M8;E<'ZEd6̶ mS8jDmv}\5ns**6I܍Or̜v8V•$任1y sV*,Tc1ɼZD\HuOb1wNc c+ ̔X!OC}4K}5hojLj yroAOaiޡձ}[c;nvJg,MjŅtQ8|puj4Z?mi49s)&d CrT=Ɍ3oϡs^a꾱6!՞75P{ O'si=~ }Hd'+ {ݻuIeayRewHi;"pWš c4e3CO>WW6\nIYpT+os{ :g--ll*V*yuR6r,PQ~k*۷%eax{)b3?mux▞hD@eRUq?3u v#Cmx'\|65 Yđ Q7)TD+ʑ:+Ÿcz+]}}LmD[HNɦn J9E\xc8Vߑfre^SWgrZ2D4 X+ɷdrnD\!cX¶e`upRQ\r! MMыnn!~IL+izx&p1Q;x=^~E8H?,sTA̴kV$G6{nUgeO?+f /gi}'m:dWڡI :l.o(%1FV n^c2:Ce<B 9T,|cTtr.el#KNڲ369Zלޝ||,fM((.GƜO94yJ%ϛ(ˊ;TC%藜IJ~f oN8z[ʶ|Vݺ O.&? Ymn6JorK4m2uPkniɵwK0"¢pK\V>3wrT0tN\ 9ϥ$ ?e uuZPu-j5do }l@@06$UJw~S`.{!x[p&80wDY1a0B|?>khd%Q5f$&.+y "dTl?tj'Qe>{e欲tfY5R,u!5Ɍ)o_StS~JRm)ual`sb{hS^5*)6uTrZt` ㉷6AΟ˪S#o/7Ivͪ7R&5apcPȓ.p>ӆf]K NTGu[_W3:? ;u7]qN<1izuui</Fdcd\R ʓ0 *|qs@Fb]ɪ%"G]sKa6E7Vdjz Yr~HLvKUs͕$P*`{[6i9p1w'ʑZ ZP/4*f-j\=1v bSf!Z.,5`N2.QgD7+G'twWyT2 >9,ϖ B.$Q]; i *E/ i\X'e_f^̒g|1ZL?S[''d ^ @i·i9= WyDnhXnkX'_Fc2gU%ZIy0 %*a5^.iݼ[\٠ Ǭ'y]7FySO @0-~ ,giF[^VUnQ$-/T*JZ0VTQYpzU4O-+ZDV1'Sa