Obs/bin/ObsDep/content/Powershell/Roles/Common/AzureStackPXE.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module NetSecurity # Installs the AzureStackPXE service on the local machine function Install-AzureStackPXE { Param( [Parameter(Mandatory = $true)] $logFile, [Parameter(Mandatory = $true)] $configurationFile, [Parameter(Mandatory = $false)] $idempotent ) $ErrorActionPreference = "Stop" $serviceName = "AzureStackPXE" # Get the path to where the Network Boot Server binaries are unpacked $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer" # Setup the Network Boot Server service, but don't start it just yet $service = Get-Service -Name $serviceName -ErrorAction Ignore # Remove the service if it already exists (unless this is an idempotent run) if ($service -ne $null -and $idempotent -eq $false) { # Stop service before attempting to remove it Write-Verbose "$serviceName service already exists, stopping and removing" Stop-Service -Name $serviceName -ErrorAction Ignore & "sc.exe" "delete" "$serviceName" } try { # Setup the service if this is not an idempotent run, or if the service didn't previously exist if ($service -eq $null -or $idempotent -eq $false) { Write-Verbose "Installing service $serviceName" New-Service -Name $serviceName -BinaryPathName "$binaryPath\NetworkBootServer.exe -log:$logFile -config:$configurationFile" -DisplayName "Azure Stack Network Boot Server" -StartupType Manual # Restart the service for first, second and subsequent failures after 5000 milliseconds. Reset after 1 day. Write-Verbose "Configuring recovery mechanism for Azure Stack Network Boot Service: '$serviceName'" $out = sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400 if ($LASTEXITCODE -ne 0) { Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)" } else { Write-Verbose "[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)" } # Log the recovery settings $out = sc.exe qfailure $serviceName if ($LASTEXITCODE -ne 0) { Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe qfailure $serviceName]:`n $($out | Out-String)" } else { Write-Verbose "[sc.exe qfailure $serviceName]:`n $($out | Out-String)" } } } catch { throw "Could not create $serviceName service ($_)" } } # Configures firewall rules for the AzureStackPXE service on the local machine function Set-AzureStackPXEFirewallRules { $ErrorActionPreference = "Stop" # The firewall service needs to be started for this to work $firewallServiceName = "MpsSvc" $firewallService = Get-Service -Name $firewallServiceName -ErrorAction Ignore # Exit if the firewall service could not be found if ($firewallService -eq $null) { Write-Verbose "Could not locate the firewall service, exiting" return } # Save initial state of the firewall service, we want to leave it in the same state on exit $firewallServiceStatus = $firewallService.Status # Start service if not already running if ($firewallServiceStatus -ne "Running") { Write-Verbose "Firewall service is stopped, starting temporarily so we can apply rules." Start-Service -Name $firewallService -ErrorAction Ignore } # Remove existing firewall rules. These are relatively inexpensive operations, so we can remove and re-add on idempotent runs Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore # Allow inbound DHCP traffic to ports 67 and 4011 from remote ports 67, 68 and 4011 New-NetFirewallRule -Direction In -Name "AzureStackPXE_DHCP_Inbound" -DisplayName "Azure Stack Network Boot Server DHCP (Inbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 | Out-Null # Allow inbound TFTP traffic to port 69 from any remote port New-NetFirewallRule -Direction In -Name "AzureStackPXE_TFTP_Inbound" -DisplayName "Azure Stack Network Boot Server TFTP (Inbound)" -Protocol UDP -LocalPort 69 | Out-Null # Allow outbound DHCP traffic only from the AzureStackPXE service (local ports 67 and 4011) to remote ports 67, 68 and 4011 New-NetFirewallRule -Direction Out -Name "AzureStackPXE_DHCP_Outbound" -DisplayName "Azure Stack Network Boot Server DHCP (Outbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 -Service "AzureStackPXE" | Out-Null # Allow outbound TFTP traffic only from the AzureStackPXE service (local port 69) to any remote port New-NetFirewallRule -Direction Out -Name "AzureStackPXE_TFTP_Outbound" -DisplayName "Azure Stack Network Boot Server TFTP (Outbound)" -Protocol UDP -LocalPort 69 -Service "AzureStackPXE" | Out-Null # Restore firewall service to its initial state if ($firewallServiceStatus -eq "Stopped") { Write-Verbose "Stopping firewall service." Stop-Service -Name $firewallService -ErrorAction Ignore } } # Loads the AzureStackPXEConfiguration object from the specified JSON file function Get-AzureStackPXEConfiguration { Param( [Parameter(Mandatory = $true)] $configurationFile ) $json = Get-Content -Path $configurationFile return CreateAzureStackPXEConfiguration($json) } # Creates a new (empty) AzureStackPXEConfiguration object function New-AzureStackPXEConfiguration { $config = CreateAzureStackPXEConfiguration -json $null return $config } # Loads the specified AzureStackPXE assembly function Use-AzureStackPXEAssembly { Param( [Parameter(Mandatory = $true)] $Type ) $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer" if(!(Test-Path $binaryPath)) { $binaryPath = Join-Path "$PSScriptRoot\..\..\" "NetworkBootServer" } $binaryPath = Join-Path $binaryPath "$Type.dll" try { Write-Verbose "Loading assembly $binaryPath" Add-Type -Path $binaryPath | Out-Null } catch { throw "Failed to load assembly $binaryPath ($_)" } } # Creates a PXE configuration object and deserializes its contents from JSON if specified function CreateAzureStackPXEConfiguration { Param( [Parameter(Mandatory = $false)] $json ) # Deserialize configuration object from JSON if specified, or create a new instance otherwise if ($json -ne $null) { $pxeConfig = [Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration]::Deserialize($json) # Deserialization should throw an exception on failure, adding a null check for safety if ($pxeConfig -eq $null) { throw "Failed to deserialize AzureStackPXE configuration" } return $pxeConfig } else { $typeName = "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration" Write-Verbose "Creating new instance of $typeName" $pxeConfig = New-Object -TypeName $typeName if ($pxeConfig -eq $null) { throw "Failed to create instance of $typeName" } return $pxeConfig } } # Creates a new instance of Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient, for the purpose of adding # it to a Configuration object. The client is an in-memory instance and is not sent to the REST endpoint of the service function New-AzureStackPXEClientInstance { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot ) # Create instance of PXEClient $pxeClient = New-Object -TypeName "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient" $pxeClient.ClientIdentifier = $ClientIdentifier $pxeClient.BootBehavior = $BootBehavior $pxeClient.SetToDefaultAfterBoot = $SetToDefaultAfterBoot return $pxeClient } # Builds a HTTP URI for the specified server and port function GetRESTEndpoint { Param( [Parameter(Mandatory = $false)] $PxeServer = "localhost", [Parameter(Mandatory = $false)] $Port = 9000, [Parameter(Mandatory = $false)] $Api = "pxe" ) return "http://$PxeServer" + ":" + "$Port/$Api" } # Uses the AzureStackPXE REST API to get all clients known to the boot server function Get-AzureStackPXEClients { Param( [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $clients = (Invoke-WebRequest -Uri "$uri/pxeclient" -Method Get -TimeoutSec 60 -UseBasicParsing -UseDefaultCredentials -Verbose -ErrorAction Stop).Content | ConvertFrom-Json return $clients } catch { throw "Failed to get PXE clients ($_)" } } # Uses the AzureStackPXE REST API to set the properties of a PXE client function Set-AzureStackPXEClient { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot, [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $json = @{ clientIdentifier = $ClientIdentifier bootBehavior = $BootBehavior setToDefaultAfterBoot = $SetToDefaultAfterBoot } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/pxeclient" -Method Put -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "PXE client $ClientIdentifier updated successfully" } catch { throw "Failed to update PXE client $ClientIdentifier ($_)" } } # Uses the AzureStackPXE REST API to add a PXE client to the known clients list function New-AzureStackPXEClient { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot, [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $json = @{ clientIdentifier = $ClientIdentifier bootBehavior = $BootBehavior setToDefaultAfterBoot = $SetToDefaultAfterBoot } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/pxeclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "PXE client $ClientIdentifier created successfully" } catch { throw "Failed to create PXE client $ClientIdentifier ($_)" } } # Tests whether the AzureStackPXE service has been installed and all BareMetal nodes setup for PXE boot function Test-AzureStackPxeDeployed { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop # Get physical nodes from BaseMetal role $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $serviceName = "AzureStackPXE" # Cloud Role $cloudRole = $Parameters.Roles['Cloud'].PublicConfiguration # OEM Model info $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model # Account info $securityInfo = $cloudRole.PublicInfo.SecurityInfo $bareMetalUser = $securityInfo.HardwareUsers.User | Where-Object -Property Role -EQ 'BareMetalAdmin' $bareMetalCredential = $Parameters.GetCredential($bareMetalUser.Credential) # Check that the PXE service has been installed and is currently running if ((Get-Service $serviceName -ErrorAction SilentlyContinue).Status -eq "Running") { # Use AzureStackPXE REST API to get a list of PXE clients Write-Verbose "Getting a list of known PXE clients." $existingPxeClients = Get-AzureStackPXEClients foreach ($node in $physicalMachinesRole.Nodes.Node) { # Check that the node is setup for PXE boot by MAC address or machine id $nodeSetupForPxe = $false if([string]::IsNullOrEmpty($node.MacAddress)) { # Determine the machine UUID from the BMC $currentClientIdentifier = Get-SmBiosGuid -BmcIP $node.BmcIPAddress -Credential $bareMetalCredential -OEMModel $OEMModel -OOBProtocol $node.OOBProtocol -NodeInstance $node.NodeInstance -NodeName $node.Name $currentClientIdentifier=$device.guid.Replace("-","") } else { $currentClientIdentifier = $node.MacAddress } foreach ($existingPxeClient in $existingPxeClients) { if ($existingPxeClient.ClientIdentifier -eq $currentClientIdentifier) { Write-Verbose "Node $($node.Name) $currentClientIdentifier has already been setup for PXE boot." $nodeSetupForPxe = $true break } } # At least one node has not been setup for PXE, return 'false' if ($nodeSetupForPxe -eq $false) { Write-Verbose "Node $($node.Name) $currentClientIdentifier has not been setup for PXE boot." return $false } } # All nodes have been setup for PXE, return 'true' return $true } # AzureStackPXE service not installed, or not running - return 'false' return $false } function Update-AzureStackPxeBootImage { Param( [Parameter(Mandatory = $true)] $BootImage, [Parameter(Mandatory = $false)] [Boolean] $Force = $true ) $ErrorActionPreference = "Stop" # Create RemoteInstall folder if it doesn't exist $remoteInstallFolderPath = "$env:SystemDrive\RemoteInstall" if ((Test-Path $remoteInstallFolderPath) -eq $false) { $null = mkdir $remoteInstallFolderPath -Force } # Create RemoteInstall\x64\Images folder if it doesn't exist $remoteInstallImagesFolderPath = "$remoteInstallFolderPath\Boot\x64\Images" if ((Test-Path $remoteInstallImagesFolderPath) -eq $false) { $null = mkdir $remoteInstallImagesFolderPath -Force } # Make a copy of the WIM image to RemoteInstall\Images. Make sure the image is named "boot.wim", as this is # how the BCD file references it $bootImageLocalPath = "$remoteInstallFolderPath\Boot\x64\Images\boot.wim" Write-Verbose "Copying updated PXE server boot image from $BootImage to $bootImageLocalPath" if ((Test-Path $bootImageLocalPath) -eq $false -or $Force) { Write-Verbose "Copying $BootImage to local file $bootImageLocalPath." Copy-Item -Path $BootImage -Destination "$bootImageLocalPath" -Force } else { Write-Verbose "Skip copying boot image $BootImage locally, as it already exists as $bootImageLocalPath." } } # Uses the AzureStackPXE REST API to create a DHCP client reservation function New-AzureStackDHCPReservation { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $IPAddress, [Parameter(Mandatory = $false)] $DhcpServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe" $json = @{ MAC = $ClientIdentifier IP = $IPAddress } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/dhcpclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "DHCP reservation $ClientIdentifier -> $IPAddress created successfully" } catch { throw "Failed to create DHCP reservation for client $ClientIdentifier ($_)" } } # Uses the AzureStackPXE REST API to remove an existing DHCP client reservation function Remove-AzureStackDHCPReservation { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $false)] $DhcpServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe" Invoke-WebRequest -Uri "$uri/dhcpclient?id=$ClientIdentifier" -Method Delete -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "DHCP reservation for client $ClientIdentifier removed successfully" } catch { throw "Failed to remove DHCP reservation for client $ClientIdentifier ($_)" } } # Generates a random password with the specified minimum and maximum length function New-RandomPassword { param( [Parameter(Mandatory=$false)] [int] $Minlength = 14, [Parameter(Mandatory=$false)] [int] $Maxlength = 18 ) $ErrorActionPreference = 'Stop' $lowerCaseLetters = 'abcdefghkmnprstuvwxyz' $upperCaseLetters = 'ABCDEFGHKLMNPRSTUVWXY' $numbers = '1234567890' $specialCharacters = '!-_#' $allCharacters = $lowerCaseLetters + $upperCaseLetters + $numbers + $specialCharacters $randomLower = Get-Random -Maximum $lowerCaseLetters.length $randomUpper = Get-Random -Maximum $upperCaseLetters.length $randomNumber = Get-Random -Maximum $numbers.length $randomSpecial = Get-Random -Maximum $specialCharacters.length $password = @() if($MinLength -lt 7) { throw "MinLength cannot be less than 7." } $maxLength = $Maxlength - 3 $minLength = $MinLength - 4 $passwordLength = Get-Random -Minimum $Minlength -Maximum $maxlength $randomAllArray = 1 ..$passwordLength | ForEach-Object { Get-Random -Maximum $allCharacters.length } $password += $allCharacters[$randomAllArray] # Guarantee at least one of each type is used. $password += $lowerCaseLetters[$randomLower] $password += $upperCaseLetters[$randomUpper] $password += $numbers[$randomNumber] $password += $specialCharacters[$randomSpecial] # Sort so that all the guaranteed values are not at the end. $sortedPassword = $password | Sort-Object { Get-Random } $stringPassword = $sortedPassword -Join '' ConvertTo-SecureString -String $stringPassword -AsPlainText -Force } # Get SmBios Guid from BMC IP Address. function Get-SmBiosGuid { [CmdletBinding()] Param ( [Parameter(Mandatory=$true)] [string] $BmcIP, [Parameter(Mandatory = $true)] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [string] $OEMModel, [Parameter(Mandatory=$false)] [string] $NodeName, [Parameter(Mandatory=$false)] [string] $NodeInstance, [Parameter(Mandatory=$false)] [string] $OOBProtocol ) $ErrorActionPreference = 'Stop' if (@("Virtual Machine", "Hyper-V") -notcontains $OEMModel) { $paramHash = @{} if ($OOBProtocol) { $paramHash += @{ OOBProtocol = $OOBProtocol } } if ($NodeInstance) { $paramHash += @{ NodeInstance = $NodeInstance } } Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll" -Force Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" -Force # Retrieve the machine UUID from the BMC $device = Get-IpmiDeviceSystemGuid -TargetAddress $BmcIP -Credential $Credential @paramHash } else { $device = Invoke-Command -ComputerName $BmcIP -Credential $Credential -ArgumentList $NodeName -ErrorAction Stop -ScriptBlock { param($NodeName) $hostVm = Get-VM $NodeName Trace-Execution "Retrieved the VM $hostVm, getting the VMManagementServiceInstance" $vmId = $hostVm.VMId $VMManagementServiceInstance = Get-CimInstance -ClassName "Msvm_VirtualSystemManagementService" -Namespace "root\virtualization\v2" Trace-Execution "Retrieved VMManagementServiceInstance, Getting the CimInstance of the VM" $vmInstance = Get-CimInstance -ClassName Msvm_ComputerSystem -Namespace "root\virtualization\v2" | where { $_.Name -like $vmId } Trace-Execution "Retrieved the VM CimInstance, Getting the VMSettingData" $VMSettingData = Get-CimAssociatedInstance -InputObject $vmInstance -ResultClassName "Msvm_VirtualSystemSettingData" -Association "Msvm_SettingsDefineState" Trace-Execution "Retrieved the VMSettingData, now aggregating and returning SmBios information" [System.Guid]::Parse($VMSettingData.BIOSGUID) } } if ($device) { $SMBiosGuid = $device.Guid.Replace("-", "") Trace-Execution "Retrieved the SMBios Guid $SMBiosGuid from BMC IP $BmcIP" } else { Trace-Error "Failed to retrieve the SMBios Guid from BMC IP $BmcIP" } return $SMBiosGuid } Export-ModuleMember -Function Install-AzureStackPXE Export-ModuleMember -Function Set-AzureStackPXEFirewallRules Export-ModuleMember -Function Get-AzureStackPXEConfiguration Export-ModuleMember -Function New-AzureStackPXEConfiguration Export-ModuleMember -Function Get-AzureStackPXEClients Export-ModuleMember -Function New-AzureStackPXEClient Export-ModuleMember -Function New-AzureStackPXEClientInstance Export-ModuleMember -Function New-AzureStackDHCPReservation Export-ModuleMember -Function Remove-AzureStackDHCPReservation Export-ModuleMember -Function Set-AzureStackPXEClient Export-ModuleMember -Function Test-AzureStackPxeDeployed Export-ModuleMember -Function Update-AzureStackPxeBootImage Export-ModuleMember -Function Use-AzureStackPXEAssembly Export-ModuleMember -Function New-RandomPassword Export-ModuleMember -Function Get-SmBiosGuid # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA/m7/2fXzY4eKR # fqAxZjDf8w0JdbfwpID4WAonGQvuOaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfk # eC/aF0XNC8MFQ9Bsu4MhmwQCeH1/+dTd2uoUDMJDMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEATEkZUXm94ndlajVcedZI9NxMtZZHimMwh/Ke # Nspr1gbTRilL27EhKU4T6iqk/Jr6XGMHB1xIIYeP5xCoLt0fea12sh/XR4pAqMFT # Rui9jZVv4Xp/e1/9++O5IjemDMjplOZOE0oA8gHpTyOgF31BwKxkiCO5byLMO39w # uEzmnz2i8widvV4+FR5yPrW95VmiAOrmW5wO+aCORIgc83p1oInxgN/kOWYkq/Me # S++BmrPmzlX/dHXDDdG7+XM8q4lxnbyvwarSO0xF5d+x4SFp55KCGSDOpz+ZII1g # 3u4TEIGOZQmD5B+Op/OYeVZfrF1ocB2sdXNLTVOQFKutlT9ZYqGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB/HQKHD2MH8wrUoLD5AxzZxpTs7LmJ4ZBY # xCjPR6WhBQIGZeeoE92dGBMyMDI0MDMxMTE4MTgyNi45MTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZlmfjAi # GA8yMDI0MDMxMTExMTYxNFoYDzIwMjQwMzEyMTExNjE0WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpmWZ+AgEAMAoCAQACAg8eAgH/MAcCAQACAhL0MAoCBQDpmrf+ # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAAcbAXx8X0tBj9wnmikwjVT # d98uRHkrqMk8xsgKo9QRCrKyzXvEfty8jd+gKj/X5NZ47Kc4Vkb+9ZZMuijML3be # MeFmdrmJNBtQm2JnCmOHR0ZjGpTOVGpBz3+hs0Ukl4IpQNbgVN45u1J0ty5yekJp # ExdK/K99neHjcDh43kmR7W9ItwZWSySQU0MGHq5cV/rqPjscnausfTtKWzG3ZFep # aSHqS3kKSWXSvAW43kulKjyWgkzCUDTnrQMQrfksuBWe7FXcKgO04JACLyP595bO # xZumEHYkjkMco+uqXVzXKt+vwhlWRFvUuBN+/Ian3sLf3xs98sfFF+zG3tTGfBkx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AeqaJHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBagvyDJot4JysAxYtPBPAz # uYmSdj0tCYiPIjOYkdEcyDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmP # odXjZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg4iGe # ly1SmvrVSgxEk2f1t3oBbsL8vnFhQYpEzDqDlmUwDQYJKoZIhvcNAQELBQAEggIA # hepRwoA3XdQFqteYQ1tPUkjowAJHNe/9W3Oh45C1v2FcdhS2vSXtNa+iprFqkaeL # ZTHR+tkEIktB5fdnvZwLIEiPCYrnlMXBEBHCvyHT0/WmVhQcnyzEj6K76PiMCGWM # 0R1edMjoNW7pwS8snMDKFtDqOChNK8QSl8lOHrwdgv0NSQ24Yy1lS5AEYpsZv9Qq # bEbPg68iL1QsHGZUv/0ujDooChj4e0qp+E/f+58RPiL15mVl58ZTvI2PGXdZuMZq # uvjOLVyZCnfW/H2JJguPMx0P+3UFR292/jn3zG3bO/qmC4NHzHNWhAZaEjV9FHnr # hu3B1zb2ZptfahYS8wLk2J0vnlW+5rApAaINWl7sZx+GB9Bf4mE2ujH15C+OsrjH # M0Zn0lSDfZb+kssMJyC3UEIeCWqiWpn9hDJHTtEOLXztG7L8mDcVuxejKAohbnJs # M8thx+9T6p0Ii7Pwq3T9SsvnWPT9ai02rgKskW3WLiitbss6z9S+6wRrPXGa6EZT # UdXuel7wE3GJRt3CHFptgu0YgF8vKJqbhe5HtYccoyq4jLFBDDCWiJJBTo8iaaHO # xBQYHZtagWZJCa0G5h5D+ZN/9tfh4LrJPBckAY6J1RJN7x15KuI0UF85D83Akcwp # 3gvg18x8ri1CPnFGjULHMT6rMALLQWRSztdoqzyrkGQ= # SIG # End signature block |