Obs/bin/ObsDep/content/Powershell/Roles/Common/AzureStackPXE.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module NetSecurity # Installs the AzureStackPXE service on the local machine function Install-AzureStackPXE { Param( [Parameter(Mandatory = $true)] $logFile, [Parameter(Mandatory = $true)] $configurationFile, [Parameter(Mandatory = $false)] $idempotent ) $ErrorActionPreference = "Stop" $serviceName = "AzureStackPXE" # Get the path to where the Network Boot Server binaries are unpacked $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer" # Setup the Network Boot Server service, but don't start it just yet $service = Get-Service -Name $serviceName -ErrorAction Ignore # Remove the service if it already exists (unless this is an idempotent run) if ($service -ne $null -and $idempotent -eq $false) { # Stop service before attempting to remove it Write-Verbose "$serviceName service already exists, stopping and removing" Stop-Service -Name $serviceName -ErrorAction Ignore & "sc.exe" "delete" "$serviceName" } try { # Setup the service if this is not an idempotent run, or if the service didn't previously exist if ($service -eq $null -or $idempotent -eq $false) { Write-Verbose "Installing service $serviceName" New-Service -Name $serviceName -BinaryPathName "$binaryPath\NetworkBootServer.exe -log:$logFile -config:$configurationFile" -DisplayName "Azure Stack Network Boot Server" -StartupType Manual # Restart the service for first, second and subsequent failures after 5000 milliseconds. Reset after 1 day. Write-Verbose "Configuring recovery mechanism for Azure Stack Network Boot Service: '$serviceName'" $out = sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400 if ($LASTEXITCODE -ne 0) { Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)" } else { Write-Verbose "[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)" } # Log the recovery settings $out = sc.exe qfailure $serviceName if ($LASTEXITCODE -ne 0) { Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe qfailure $serviceName]:`n $($out | Out-String)" } else { Write-Verbose "[sc.exe qfailure $serviceName]:`n $($out | Out-String)" } } } catch { throw "Could not create $serviceName service ($_)" } } # Configures firewall rules for the AzureStackPXE service on the local machine function Set-AzureStackPXEFirewallRules { $ErrorActionPreference = "Stop" # The firewall service needs to be started for this to work $firewallServiceName = "MpsSvc" $firewallService = Get-Service -Name $firewallServiceName -ErrorAction Ignore # Exit if the firewall service could not be found if ($firewallService -eq $null) { Write-Verbose "Could not locate the firewall service, exiting" return } # Save initial state of the firewall service, we want to leave it in the same state on exit $firewallServiceStatus = $firewallService.Status # Start service if not already running if ($firewallServiceStatus -ne "Running") { Write-Verbose "Firewall service is stopped, starting temporarily so we can apply rules." Start-Service -Name $firewallService -ErrorAction Ignore } # Remove existing firewall rules. These are relatively inexpensive operations, so we can remove and re-add on idempotent runs Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore # Allow inbound DHCP traffic to ports 67 and 4011 from remote ports 67, 68 and 4011 New-NetFirewallRule -Direction In -Name "AzureStackPXE_DHCP_Inbound" -DisplayName "Azure Stack Network Boot Server DHCP (Inbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 | Out-Null # Allow inbound TFTP traffic to port 69 from any remote port New-NetFirewallRule -Direction In -Name "AzureStackPXE_TFTP_Inbound" -DisplayName "Azure Stack Network Boot Server TFTP (Inbound)" -Protocol UDP -LocalPort 69 | Out-Null # Allow outbound DHCP traffic only from the AzureStackPXE service (local ports 67 and 4011) to remote ports 67, 68 and 4011 New-NetFirewallRule -Direction Out -Name "AzureStackPXE_DHCP_Outbound" -DisplayName "Azure Stack Network Boot Server DHCP (Outbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 -Service "AzureStackPXE" | Out-Null # Allow outbound TFTP traffic only from the AzureStackPXE service (local port 69) to any remote port New-NetFirewallRule -Direction Out -Name "AzureStackPXE_TFTP_Outbound" -DisplayName "Azure Stack Network Boot Server TFTP (Outbound)" -Protocol UDP -LocalPort 69 -Service "AzureStackPXE" | Out-Null # Restore firewall service to its initial state if ($firewallServiceStatus -eq "Stopped") { Write-Verbose "Stopping firewall service." Stop-Service -Name $firewallService -ErrorAction Ignore } } # Loads the AzureStackPXEConfiguration object from the specified JSON file function Get-AzureStackPXEConfiguration { Param( [Parameter(Mandatory = $true)] $configurationFile ) $json = Get-Content -Path $configurationFile return CreateAzureStackPXEConfiguration($json) } # Creates a new (empty) AzureStackPXEConfiguration object function New-AzureStackPXEConfiguration { $config = CreateAzureStackPXEConfiguration -json $null return $config } # Loads the specified AzureStackPXE assembly function Use-AzureStackPXEAssembly { Param( [Parameter(Mandatory = $true)] $Type ) $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer" if(!(Test-Path $binaryPath)) { $binaryPath = Join-Path "$PSScriptRoot\..\..\" "NetworkBootServer" } $binaryPath = Join-Path $binaryPath "$Type.dll" try { Write-Verbose "Loading assembly $binaryPath" Add-Type -Path $binaryPath | Out-Null } catch { throw "Failed to load assembly $binaryPath ($_)" } } # Creates a PXE configuration object and deserializes its contents from JSON if specified function CreateAzureStackPXEConfiguration { Param( [Parameter(Mandatory = $false)] $json ) # Deserialize configuration object from JSON if specified, or create a new instance otherwise if ($json -ne $null) { $pxeConfig = [Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration]::Deserialize($json) # Deserialization should throw an exception on failure, adding a null check for safety if ($pxeConfig -eq $null) { throw "Failed to deserialize AzureStackPXE configuration" } return $pxeConfig } else { $typeName = "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration" Write-Verbose "Creating new instance of $typeName" $pxeConfig = New-Object -TypeName $typeName if ($pxeConfig -eq $null) { throw "Failed to create instance of $typeName" } return $pxeConfig } } # Creates a new instance of Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient, for the purpose of adding # it to a Configuration object. The client is an in-memory instance and is not sent to the REST endpoint of the service function New-AzureStackPXEClientInstance { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot ) # Create instance of PXEClient $pxeClient = New-Object -TypeName "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient" $pxeClient.ClientIdentifier = $ClientIdentifier $pxeClient.BootBehavior = $BootBehavior $pxeClient.SetToDefaultAfterBoot = $SetToDefaultAfterBoot return $pxeClient } # Builds a HTTP URI for the specified server and port function GetRESTEndpoint { Param( [Parameter(Mandatory = $false)] $PxeServer = "localhost", [Parameter(Mandatory = $false)] $Port = 9000, [Parameter(Mandatory = $false)] $Api = "pxe" ) return "http://$PxeServer" + ":" + "$Port/$Api" } # Uses the AzureStackPXE REST API to get all clients known to the boot server function Get-AzureStackPXEClients { Param( [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $clients = (Invoke-WebRequest -Uri "$uri/pxeclient" -Method Get -TimeoutSec 60 -UseBasicParsing -UseDefaultCredentials -Verbose -ErrorAction Stop).Content | ConvertFrom-Json return $clients } catch { throw "Failed to get PXE clients ($_)" } } # Uses the AzureStackPXE REST API to set the properties of a PXE client function Set-AzureStackPXEClient { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot, [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $json = @{ clientIdentifier = $ClientIdentifier bootBehavior = $BootBehavior setToDefaultAfterBoot = $SetToDefaultAfterBoot } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/pxeclient" -Method Put -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "PXE client $ClientIdentifier updated successfully" } catch { throw "Failed to update PXE client $ClientIdentifier ($_)" } } # Uses the AzureStackPXE REST API to add a PXE client to the known clients list function New-AzureStackPXEClient { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $BootBehavior, [Parameter(Mandatory = $true)] $SetToDefaultAfterBoot, [Parameter(Mandatory = $false)] $PxeServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $PxeServer $json = @{ clientIdentifier = $ClientIdentifier bootBehavior = $BootBehavior setToDefaultAfterBoot = $SetToDefaultAfterBoot } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/pxeclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "PXE client $ClientIdentifier created successfully" } catch { throw "Failed to create PXE client $ClientIdentifier ($_)" } } # Tests whether the AzureStackPXE service has been installed and all BareMetal nodes setup for PXE boot function Test-AzureStackPxeDeployed { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop # Get physical nodes from BaseMetal role $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $serviceName = "AzureStackPXE" # Cloud Role $cloudRole = $Parameters.Roles['Cloud'].PublicConfiguration # OEM Model info $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model # Account info $securityInfo = $cloudRole.PublicInfo.SecurityInfo $bareMetalUser = $securityInfo.HardwareUsers.User | Where-Object -Property Role -EQ 'BareMetalAdmin' $bareMetalCredential = $Parameters.GetCredential($bareMetalUser.Credential) # Check that the PXE service has been installed and is currently running if ((Get-Service $serviceName -ErrorAction SilentlyContinue).Status -eq "Running") { # Use AzureStackPXE REST API to get a list of PXE clients Write-Verbose "Getting a list of known PXE clients." $existingPxeClients = Get-AzureStackPXEClients foreach ($node in $physicalMachinesRole.Nodes.Node) { # Check that the node is setup for PXE boot by MAC address or machine id $nodeSetupForPxe = $false if([string]::IsNullOrEmpty($node.MacAddress)) { # Determine the machine UUID from the BMC $currentClientIdentifier = Get-SmBiosGuid -BmcIP $node.BmcIPAddress -Credential $bareMetalCredential -OEMModel $OEMModel -OOBProtocol $node.OOBProtocol -NodeInstance $node.NodeInstance -NodeName $node.Name $currentClientIdentifier=$device.guid.Replace("-","") } else { $currentClientIdentifier = $node.MacAddress } foreach ($existingPxeClient in $existingPxeClients) { if ($existingPxeClient.ClientIdentifier -eq $currentClientIdentifier) { Write-Verbose "Node $($node.Name) $currentClientIdentifier has already been setup for PXE boot." $nodeSetupForPxe = $true break } } # At least one node has not been setup for PXE, return 'false' if ($nodeSetupForPxe -eq $false) { Write-Verbose "Node $($node.Name) $currentClientIdentifier has not been setup for PXE boot." return $false } } # All nodes have been setup for PXE, return 'true' return $true } # AzureStackPXE service not installed, or not running - return 'false' return $false } function Update-AzureStackPxeBootImage { Param( [Parameter(Mandatory = $true)] $BootImage, [Parameter(Mandatory = $false)] [Boolean] $Force = $true ) $ErrorActionPreference = "Stop" # Create RemoteInstall folder if it doesn't exist $remoteInstallFolderPath = "$env:SystemDrive\RemoteInstall" if ((Test-Path $remoteInstallFolderPath) -eq $false) { $null = mkdir $remoteInstallFolderPath -Force } # Create RemoteInstall\x64\Images folder if it doesn't exist $remoteInstallImagesFolderPath = "$remoteInstallFolderPath\Boot\x64\Images" if ((Test-Path $remoteInstallImagesFolderPath) -eq $false) { $null = mkdir $remoteInstallImagesFolderPath -Force } # Make a copy of the WIM image to RemoteInstall\Images. Make sure the image is named "boot.wim", as this is # how the BCD file references it $bootImageLocalPath = "$remoteInstallFolderPath\Boot\x64\Images\boot.wim" Write-Verbose "Copying updated PXE server boot image from $BootImage to $bootImageLocalPath" if ((Test-Path $bootImageLocalPath) -eq $false -or $Force) { Write-Verbose "Copying $BootImage to local file $bootImageLocalPath." Copy-Item -Path $BootImage -Destination "$bootImageLocalPath" -Force } else { Write-Verbose "Skip copying boot image $BootImage locally, as it already exists as $bootImageLocalPath." } } # Uses the AzureStackPXE REST API to create a DHCP client reservation function New-AzureStackDHCPReservation { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $true)] $IPAddress, [Parameter(Mandatory = $false)] $DhcpServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe" $json = @{ MAC = $ClientIdentifier IP = $IPAddress } | ConvertTo-Json Invoke-WebRequest -Uri "$uri/dhcpclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "DHCP reservation $ClientIdentifier -> $IPAddress created successfully" } catch { throw "Failed to create DHCP reservation for client $ClientIdentifier ($_)" } } # Uses the AzureStackPXE REST API to remove an existing DHCP client reservation function Remove-AzureStackDHCPReservation { Param( [Parameter(Mandatory = $true)] $ClientIdentifier, [Parameter(Mandatory = $false)] $DhcpServer = "localhost" ) $ErrorActionPreference = "Stop" try { $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe" Invoke-WebRequest -Uri "$uri/dhcpclient?id=$ClientIdentifier" -Method Delete -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose Write-Verbose "DHCP reservation for client $ClientIdentifier removed successfully" } catch { throw "Failed to remove DHCP reservation for client $ClientIdentifier ($_)" } } # Generates a random password with the specified minimum and maximum length function Create-RandomPassword { param( [Parameter(Mandatory=$false)] [int] $Minlength = 14, [Parameter(Mandatory=$false)] [int] $Maxlength = 18 ) $ErrorActionPreference = 'Stop' $lowerCaseLetters = 'abcdefghkmnprstuvwxyz' $upperCaseLetters = 'ABCDEFGHKLMNPRSTUVWXY' $numbers = '1234567890' $specialCharacters = '!-_#' $allCharacters = $lowerCaseLetters + $upperCaseLetters + $numbers + $specialCharacters $randomLower = Get-Random -Maximum $lowerCaseLetters.length $randomUpper = Get-Random -Maximum $upperCaseLetters.length $randomNumber = Get-Random -Maximum $numbers.length $randomSpecial = Get-Random -Maximum $specialCharacters.length $password = @() if($MinLength -lt 7) { throw "MinLength cannot be less than 7." } $maxLength = $Maxlength - 3 $minLength = $MinLength - 4 $passwordLength = Get-Random -Minimum $Minlength -Maximum $maxlength $randomAllArray = 1 ..$passwordLength | ForEach-Object { Get-Random -Maximum $allCharacters.length } $password += $allCharacters[$randomAllArray] # Guarantee at least one of each type is used. $password += $lowerCaseLetters[$randomLower] $password += $upperCaseLetters[$randomUpper] $password += $numbers[$randomNumber] $password += $specialCharacters[$randomSpecial] # Sort so that all the guaranteed values are not at the end. $sortedPassword = $password | Sort-Object { Get-Random } $stringPassword = $sortedPassword -Join '' ConvertTo-SecureString -String $stringPassword -AsPlainText -Force } # Get SmBios Guid from BMC IP Address. function Get-SmBiosGuid { [CmdletBinding()] Param ( [Parameter(Mandatory=$true)] [string] $BmcIP, [Parameter(Mandatory = $true)] [PSCredential] $Credential, [Parameter(Mandatory=$true)] [string] $OEMModel, [Parameter(Mandatory=$false)] [string] $NodeName, [Parameter(Mandatory=$false)] [string] $NodeInstance, [Parameter(Mandatory=$false)] [string] $OOBProtocol ) $ErrorActionPreference = 'Stop' if ($OEMModel -notmatch "Hyper-V") { $paramHash = @{} if ($OOBProtocol) { $paramHash += @{ OOBProtocol = $OOBProtocol } } if ($NodeInstance) { $paramHash += @{ NodeInstance = $NodeInstance } } Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll" -Force Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" -Force # Retrieve the machine UUID from the BMC $device = Get-IpmiDeviceSystemGuid -TargetAddress $BmcIP -Credential $Credential @paramHash } else { ### Temporary fix - only for virutal environments, remove the change after the fix of bug: 2363555 Trace-Execution "Adding trusted host entry " Set-Item WSMan:\localhost\Client\TrustedHosts -Value "*" -Force ### $device = Invoke-Command -ComputerName $BmcIP -Credential $Credential -ArgumentList $NodeName -ErrorAction Stop -ScriptBlock { param($NodeName) $hostVm = Get-VM $NodeName Trace-Execution "Retrieved the VM $hostVm, getting the VMManagementServiceInstance" $vmId = $hostVm.VMId $VMManagementServiceInstance = Get-CimInstance -ClassName "Msvm_VirtualSystemManagementService" -Namespace "root\virtualization\v2" Trace-Execution "Retrieved VMManagementServiceInstance, Getting the CimInstance of the VM" $vmInstance = Get-CimInstance -ClassName Msvm_ComputerSystem -Namespace "root\virtualization\v2" | where { $_.Name -like $vmId } Trace-Execution "Retrieved the VM CimInstance, Getting the VMSettingData" $VMSettingData = Get-CimAssociatedInstance -InputObject $vmInstance -ResultClassName "Msvm_VirtualSystemSettingData" -Association "Msvm_SettingsDefineState" Trace-Execution "Retrieved the VMSettingData, now aggregating and returning SmBios information" [System.Guid]::Parse($VMSettingData.BIOSGUID) } } if ($device) { $SMBiosGuid = $device.Guid.Replace("-", "") Trace-Execution "Retrieved the SMBios Guid $SMBiosGuid from BMC IP $BmcIP" } else { Trace-Error "Failed to retrieve the SMBios Guid from BMC IP $BmcIP" } return $SMBiosGuid } Export-ModuleMember -Function Install-AzureStackPXE Export-ModuleMember -Function Set-AzureStackPXEFirewallRules Export-ModuleMember -Function Get-AzureStackPXEConfiguration Export-ModuleMember -Function New-AzureStackPXEConfiguration Export-ModuleMember -Function Get-AzureStackPXEClients Export-ModuleMember -Function New-AzureStackPXEClient Export-ModuleMember -Function New-AzureStackPXEClientInstance Export-ModuleMember -Function New-AzureStackDHCPReservation Export-ModuleMember -Function Remove-AzureStackDHCPReservation Export-ModuleMember -Function Set-AzureStackPXEClient Export-ModuleMember -Function Test-AzureStackPxeDeployed Export-ModuleMember -Function Update-AzureStackPxeBootImage Export-ModuleMember -Function Use-AzureStackPXEAssembly Export-ModuleMember -Function Create-RandomPassword Export-ModuleMember -Function Get-SmBiosGuid # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKs38k65oftXzS # +mBaIyExe0SSN/VVQNmFZy1V+v3l/KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILXIEIKyjK6xUL9Qr6qskm5o # Mdx9MBUgv5czcCKQ0fELMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAIuQRE/oJtcerj7diXQnTj2sI6ocoGvuHB7jDprYQiq3j5nPD60QPjS0V # KR16C24EFc1cO03M87AkZ1I+CqsRwmsmWfQORyqvpW0dbWpQV/5IPfv2jcXG7r/V # j86eX5ab3kAeNZWbKhZknZKZuYQAb7UY4C4FdDT6RWS6tu8Pew0eDAtnHiNedURn # VVfx6+YzqIctU4+HwIFZiiqMkv0T+H2M28AuFfx1Ru5HR1JwgMWlbW066CQJjr4o # IJMH9MciZ/+/7st2RYeAKa2SU86xs7jcU54SPgaLSSlOtK4R/E/s6MntRAAzYplO # MHH5R5FCAss/0ph47RrAtsww+8AghaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBNnu+a7/GLPR4GCMBhyoKK7FU4AOFmePamtf/RJqhUlQIGZbqk0SYD # GBMyMDI0MDIxMjE0MDkzMy44NDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA # 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/ # fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly # OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc # Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgDk3APFT/C9jL3CsyyqcvSBDaxgPlozSOM133ZYAns1owgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao # MA0GCSqGSIb3DQEBCwUABIICAKMW1Vgce97bC7uLAp4guLlxI53r/QS0EwR6knk/ # 9kAnuTqfm2uk/ZgRLFdjSjvFGKUM1M179jQN/YBZUiMislPNNp8c4gs2C1KsCsTK # sKrEmcfK2hFPG7dkFh4+nVjRAFXp1nEH05MdmC+cIr/oCfQ1/FmiqgGilo98Jgn9 # a/4NLNd1qnj0LKuHvv7NNJWuutUbGqnUBeWCV2fuS3ce1EdOrQnnP/rGW6SE3U3s # ulhFXRRQHb8QMyHadaCfzqduL8Xnoh0hNJFucxw1IkLPEnbHYLtJnQnDQhARqRDr # wMwOBWmKMiE1Ld2G/N23ym6mK375oo52DwOIS0WfcKgdf0/ASpJ8U2xOlZef1BDl # 5vACHjYrXGl84GxRdLAuNC9Yc7XYQkuPq70B7w/xmmjnJdSYZk19lkvPFEng/0aE # oMs1gCQnMThKl2Yi7Sl7iqG/iS/JCDRmYMp8ESkS6dxKO7hQvsbIehyDbMrAcqkJ # CiKV4mb8Yn+dnePPa4kHS6eOxbIQh8qgPgTuKB42Z7ffRfQo52HrojwYU3VL3Mi2 # pUlLK3sYgAVzWPFGJxrUK2XqL6/MJ0dy9cZ1BqEez3UnvO41Fu3rlNjkzpgUAv5/ # oOw1afRzQrt6WTCw5ngjVHQZLed4DZnkmhZWEAHHW50cYcrNUBQGb9/qfKc2thJa # lC5q # SIG # End signature block |