Obs/bin/ObsDep/content/Powershell/Roles/Common/DscHelper.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module -ErrorAction Stop -Name "$PSScriptRoot\..\..\Common\Helpers.psm1" -DisableNameChecking -Verbose:$false | Out-Null Import-Module -ErrorAction Stop -Name "$PSScriptRoot\RoleHelpers.psm1" -DisableNameChecking -Verbose:$false | Out-Null # This certificate is used for encyrpting credentials passed in a DSC MOF. function GetDscEncryptionCert { $ErrorActionPreference = 'Stop' # If the cert exists, return it. If not, create it and then return it. $cert = Get-ChildItem Cert:\LocalMachine\My | % {if ($_.Subject -like '*DscEncryptionCert*') {$_}} if (!$cert) { $cert = New-SelfSignedCertificate -Type DocumentEncryptionCertLegacyCsp -DnsName 'DscEncryptionCert' -HashAlgorithm SHA256 -CertStoreLocation "Cert:\LocalMachine\My" -KeyLength '4096' } return $cert } # This certificate is used for signing DSC MOFs. Security best practices (and, indeed, the # certificate management infrastructure) insist that you use different certificates for # encryption and signing. function GetDscSigningCert { $ErrorActionPreference = 'Stop' # If the cert exists, return it. If not, create it and then return it. $cert = Get-ChildItem Cert:\LocalMachine\My | % {if ($_.Subject -like '*DscSigningCert*') {$_}} if (!$cert) { $cert = New-SelfSignedCertificate -Type CodeSigningCert -DnsName 'DscSigningCert' -HashAlgorithm SHA256 -KeyLength '4096' } return $cert } <# This function exports the DSC Encryption and signing certificates, as PFX files with the private keys. This is necessary because the DSC engine insists that the private key be on the target node, with the public key used for encryption or signing. The assumption is that this will be generated on the target node and then the cert will be sent back to the machine generating the target state MOFs. This would be fine, except that we need to use the MOFs we're generating before the machines running DSC connect to a network. So we're generating the cert in the DVM or the Seed Ring, and then writing it into the image that will then boot later. To do this, we need to encrypt the PFX file using a password. We can't use AD to deliver the secret, again because the target node won't have connected to a network before this is used. This function writes the relatively random string used as the password. We delete both the PFX files and the password used before the images attach to a network, but just to be sure that there is no attack path, we use a different password for every deployment, P&U cycle, scale-out, etc. #> function ExportDscDecryptionCert { param ( [Parameter(Mandatory)] [string] $DestinationPath ) $ErrorActionPreference = 'Stop' $certPassword = [String]::Empty 1..16 | % {$certPassword += ([char](get-random -Minimum 33 -Maximum 126))} $certSecurePassword = ConvertTo-SecureString -String $certPassword -AsPlainText -Force $destinationFile = Join-Path -Path $DestinationPath -ChildPath DscCertPassword.txt $certPassword | Set-Content -Path $destinationFile -Force $cert = GetDscEncryptionCert Write-Verbose -Verbose "Exporting DSC Encryption Certificate with Private key to $DestinationPath" $destinationFile = Join-Path -Path $DestinationPath -ChildPath DscEncryption.pfx Export-PfxCertificate -Cert $cert -FilePath $destinationFile -Password $certSecurePassword -Force $cert = GetDscSigningCert Write-Verbose -Verbose "Exporting DSC Signing Certificate with Private key to $DestinationPath" $destinationFile = Join-Path -Path $DestinationPath -ChildPath DscSigning.pfx Export-PfxCertificate -Cert $cert -FilePath $destinationFile -Password $certSecurePassword -Force } function RemoveExportedDscDecryptionCert { param ( [Parameter(Mandatory)] [string] $Path ) $ErrorActionPreference = "Stop" Remove-Item -Path "$Path\DscCertPassword.txt" -Force -ErrorAction SilentlyContinue Remove-Item -Path "$Path\DscEncryption.pfx" -Force -ErrorAction SilentlyContinue Remove-Item -Path "$Path\DscSigning.pfx" -Force -ErrorAction SilentlyContinue } # This function signs a Configuration which is expressed as a MOF. function SignDscConfiguration { param ( [Parameter(Mandatory)] [string] $MofPath ) $ErrorActionPreference = 'Stop' Write-Verbose -Verbose "Signing $MofPath" $dscSigningCert = GetDscSigningCert $null = Set-AuthenticodeSignature -Certificate $dscSigningCert ` -HashAlgorithm SHA256 ` -FilePath $MofPath ` -Force } # This function returns a password, encrypted with the DSC Encryption key function GetEncryptedPassword { param ( [Parameter(Mandatory)] [pscredential] $Credential ) $ErrorActionPreference = 'Stop' $cleartext = $Credential.GetNetworkCredential().Password $cleartext | Protect-CmsMessage -To "CN=DscEncryptionCert" } # This function builds the right files in an image to finish a DSC configuration # when the machine boots for the first time. function PrepareDSCFirstBoot { param ( [Parameter(Mandatory)] [System.String] $MountPath, [Parameter(Mandatory = $false)] [psobject[]] $PartialConfigList, [switch] $WaitForTimeSyncBeforeDSC ) $ErrorActionPreference = "Stop" # Install a SetupComplete.cmd which will force DSC to resolve secondary partial configurations. $setupDir = Join-Path -Path $MountPath -ChildPath "Windows\Setup" New-Item -Path $setupDir -ItemType Directory -Force $scriptsDir = Join-Path -Path $setupDir -ChildPath Scripts New-Item -Path $scriptsDir -ItemType Directory -Force Write-Verbose -Verbose "Placing SetupComplete.cmd in $scriptsDir" Copy-Item -Path (Join-Path -Path "$PSScriptRoot\..\Common" -ChildPath SetupComplete.cmd) ` -Destination (Join-Path -Path $scriptsDir -ChildPath SetupComplete.cmd) ` -Force # Make a directory full of stuff necessary for applying all the DSC partial configs. $dscDirectory = Join-Path -Path $MountPath -ChildPath DSCConfigs New-Item -Path $dscDirectory -ItemType Directory -Force Write-Verbose -Verbose "Placing DSC collateral in $dscDirectory" Copy-Item -Path $PSScriptRoot\..\Common\CompleteBootDSC.ps1 -Destination $dscDirectory -Force Copy-Item -Path $PSScriptRoot\..\Common\DscMetaconfig.psm1 -Destination $dscDirectory -Force Copy-Item -Path $PSScriptRoot\..\..\Common\Helpers.psm1 -Destination $dscDirectory -Force Copy-Item -Path $PSScriptRoot\..\..\Common\Tracer.psm1 -Destination $dscDirectory -Force if ($WaitForTimeSyncBeforeDSC) { Copy-Item -Path $PSScriptRoot\..\Common\WaitForTimeSyncBeforeDSC.ps1 -Destination $dscDirectory -Force } # Get the DSC Encryption Cert and place it in the image. ExportDscDecryptionCert -DestinationPath $dscDirectory if ($PSBoundParameters.ContainsKey('PartialConfigList')) { # Write the partial config list where the machine will find it. $partialConfigListFile = Join-Path -Path $dscDirectory -ChildPath DscPartialConfigList.xml Write-Verbose -Verbose "Writing list of $($partialConfigList.Count) partial configs into $partialConfigListFile" $xmlString = "<PartialConfigurations>" foreach($partialConfig in $PartialConfigList) { $xmlString += "<PartialConfiguration Name=`"$($partialConfig.Name)`" Phase=`"$($partialConfig.Phase)`" />" } $xmlString += "</PartialConfigurations>" $xmlString | Set-Content -Path $partialConfigListFile -Force } } # Helper function to write a DSC status configuration file. This file will be used to find out where the # status file will be written. The status file and its contents help deployment/update determine if DSC configuration is complete # on a remote machine. function Add-DSCStatusConfigFile { param( [Parameter(Mandatory=$True)] [string] $Version, [Parameter(Mandatory=$True)] [string] $DSCStatusConfigFolder ) $ErrorActionPreference = "Stop" Write-Verbose "Injecting DSC status configuration file in $DSCStatusConfigFolder" $configString = @" <Configuration> <TargetShares> <TargetShare PrimaryPath="C:\CompleteBootDSCStatus" /> </TargetShares> <Version>$Version</Version> </Configuration> "@ if((Test-Path -Path $DSCStatusConfigFolder) -eq $false) { $null = New-Item -Path $DSCStatusConfigFolder -ItemType Directory -Force } $configFilePath = Join-Path -Path $DSCStatusConfigFolder -ChildPath "CompleteBootDscStatusConfig.xml" $configString | Out-File $configFilePath -Force } <# .Synopsis Function to wait for ping, CIM, recent OS installation (with a deployment artifact) and WinRM to be available on a machine .Parameter StartTime The start time of the operation, used to check that OS boot time was strictly after the wait period. .Parameter StopTime The stop time for the wait operation after which the operation is considered failed. .Parameter NodeArray A list of physical/Virtual machine nodes to wait. .Parameter Version Current version being deployed or the version to which the stamp is being updated .Parameter DSCStatusFolder Folder where the DSC completion status will be written .Parameter TargetNodeNotInDomain Indicates that the target node is not domain-joined, so we cannot check its DSC status file using the default mechanism of admin SMB share path (\\node\C$\CompleteBootDSCStatus\node.version.xml). #> function Wait-ForDSCComplete { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [string[]] $NodeArray, [Parameter(Mandatory=$true)] [string] $Version, [Parameter(Mandatory=$false)] [string] $DSCStatusFolder = "C:\CompleteBootDSCStatus", [Parameter(Mandatory=$false)] [bool] $TargetNodeNotInDomain = $false, [Parameter(Mandatory=$false)] [pscredential] $Credential ) $ErrorActionPreference = "Stop" $remainingNodes = $NodeArray $failedNodes = [System.Collections.Generic.Dictionary[string, string[]]]::new() do { foreach ($node in $NodeArray) { $dscStatusFileName = $node + "." + $Version + ".xml" $dscStatusFilePath = Join-Path -Path $DSCStatusFolder -ChildPath $dscStatusFileName $remoteDscStatusFilePath = Join-Path -Path "\\$node" -ChildPath ($dscStatusFilePath.Replace(":","$")) # Check if the SetupComplete is still processing. # If the DSC status file exists for this specific version, then skip and move on to the next node $statusFilePresent = $false $statusFilePresentOnHost = $false # In case of VMs where AD is not set up, the status file is accessed via remote session with explicit credentials. # For example this will be applicable to DC VM on one node. if($TargetNodeNotInDomain) { Trace-Execution "Testing for presence of $dscStatusFilePath on $env:COMPUTERNAME" $statusFilePresentOnHost = Test-Path -Path $dscStatusFilePath $statusFilePresent = $statusFilePresentOnHost if(-not $statusFilePresent) { Trace-Execution "Testing for presence of $dscStatusFilePath on $node" try { $currentVM = Get-VM -Name $node -ComputerName $env:COMPUTERNAME if($currentVM.State -eq "Running") { $statusFilePresent = Invoke-Command -VMName $node -Credential $Credential -ScriptBlock { Test-Path -Path $using:dscStatusFilePath } -ErrorAction Stop } } catch { Trace-Warning "Failed to get the DSC Status file from: $node. Reporting this as a warning as the node might not be up. Failure details: $_" } } } else { try { $remoteDscStatusFilePathParent = Split-Path $remoteDscStatusFilePath -Parent Trace-Execution "Creating PS drive 'DscStatusFileTempPSDrive' with root $remoteDscStatusFilePathParent and user $($Credential.UserName)." New-PSDrive -Name DscStatusFileTempPSDrive -PSProvider FileSystem -Root $remoteDscStatusFilePathParent -Credential $Credential -ErrorAction Stop } catch { Trace-Warning "Could not create PS drive 'DscStatusFileTempPSDrive' with root '$remoteDscStatusFilePathParent'. Failure details: $_" } $StatusFile = Get-ChildItem -Path $remoteDscStatusFilePathParent -ErrorAction Ignore if($StatusFile) { $statusFilePresent = $true } else { $statusFilePresent = $false } } # If status file is not present, keep loopin, else read the contents of the file if (!$statusFilePresent) { Trace-Execution "$node is still being deployed. It will be reachable once OS deployment is complete and execution of SetupComplete script has ended." } else { $statusXml = $null # If the file exists, check the status in the file # If the completed file was previously copied on to the host, read the status from there. # Avoid going over PSDirect as the local admin account might have been disabled. if($TargetNodeNotInDomain) { $statusXml = [xml] ( Invoke-Command -VMName $node -ScriptBlock { Get-Content -Path $using:dscStatusFilePath } -Credential $Credential) } else { $statusfileName = Get-ChildItem -Path $remoteDscStatusFilePathParent $statusXml = [xml] ( Get-Content -Path $statusfileName.FullName ) } $status = $statusXml.DeploymentDSC.Status if($status -eq "Started") { Trace-Execution "$node has finished OS deployment, but is still processing SetupComplete." } elseif(($status -eq "Completed") -or ($status -eq 'Failed')) { Trace-Execution "$node has finished SetupComplete with status: $status" # Create copy of the file locally. This is to avoid reaching out to the VM again in case of consistency check if($TargetNodeNotInDomain) { Trace-Execution "Creating copy of the file locally" New-Item -Type Directory -Path (Split-Path $dscStatusFilePath) -Force | Out-Null $statusXml.InnerXml | Out-File $dscStatusFilePath -Force } $remainingNodes = $remainingNodes -ne $node if ($status -eq 'Failed') { if ($null -eq $statusXml.DeploymentDSC.ResourcesNotInDesiredState.ResourceId) { Trace-Error "DSC failed to converge on $node, but no additional details were found in the status XML. Check C:\Windows\SetupComplete.log on $node to determine whether DSC was configured and started properly." } $failedNodes[$node] = $statusXml.DeploymentDSC.ResourcesNotInDesiredState.ResourceId } else { # Test binary hashes at First Boot end Test-BinaryHash -FileSystemRoot "\\$node\c$" -OutputFileName 'firstBootEndHash.json' -BaselineFileName 'baselineHash.json' } } else { Trace-Execution "Unknown status reported for $node . The expected values are Started, Completed and Failed. Value reported was: $status" } } Trace-Execution "Removing PS drive 'DscStatusFileTempPSDrive'." Get-PSDrive -Name DscStatusFileTempPSDrive -ErrorAction SilentlyContinue | Remove-PSDrive } if (-not $remainingNodes) { break } $NodeArray = $remainingNodes Start-Sleep -Seconds 30 } until ([DateTime]::Now -gt $StopTime) if ($failedNodes.Count -ne 0) { $stringBuilder = [System.Text.StringBuilder]::new("DSC failed to converge on one or more nodes.") foreach ($node in $failedNodes.Keys) { $stringBuilder.AppendLine("Resources not in desired state on ${node}: " + [string]::Join((", ", $failedNodes[$node]))) } Trace-Error $stringBuilder.ToString() } $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if ($remainingNodes) { Trace-Error "Deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $(($remainingNodes) -join ',') ." } else { $nodesString = $NodeArray -join "," Trace-Execution "Deployment has completed on all nodes: $nodesString" } } # Tests if DSC has completed and completed status has been written on at least one of the orchestrators. function Test-ForDSCComplete { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [pscredential] $Credential, [Parameter(Mandatory=$true)] [string] $NodeName, [Parameter(Mandatory=$true)] [string] $Version, [Parameter(Mandatory=$false)] [string] $DSCStatusFolder = "C:\CompleteBootDSCStatus" ) $statusFilePresent = $false $dscStatusFileName = $NodeName + "." + $Version + ".xml" $dscStatusFilePath = Join-Path -Path $DSCStatusFolder -ChildPath $dscStatusFileName $remoteDscStatusFilePath = Join-Path -Path "\\$NodeName" -ChildPath ($dscStatusFilePath.Replace(":","$")) Trace-Execution "DSC status file path on node: $remoteDscStatusFilePath" $statusFilePresent = Test-Path -Path $remoteDscStatusFilePath -ErrorAction Ignore try { if ($statusFilePresent) { $statusXml = [xml] ( Get-Content -Path $remoteDscStatusFilePath ) $status = $statusXml.DeploymentDSC.Status if ($status -eq "Completed") { Trace-Execution "Status for the node was set to Completed. The node was already created with expected version hence returning True." return $true } } } catch { Trace-Execution "Encountered an exception reading status file from path: $remoteDscStatusFilePath. Exception: $_" } return $false } <# .Synopsis Revoke access to the CompleteBootDSCShare .Parameter ComputerName The computer that is to be granted access. .Parameter DomainAdminCredentials Credentials for the domain admin #> function Revoke-CompleteBootDSCShareAccess { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string[]] $ComputerName, [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $cloudRole = $Parameters.Roles["Cloud"].PublicConfiguration $securityInfo = $cloudRole.PublicInfo.SecurityInfo $domainAdminUser = $securityInfo.DomainUsers.User | Where-Object Role -EQ "DomainAdmin" $domainAdminCredential = $Parameters.GetCredential($domainAdminUser.Credential) Start-ParallelWorkAndWait -ComputerName $ComputerName -Credential $domainAdminCredential -ScriptBlock { $DSCStatusFileShareAccessRules = Get-SmbShareAccess -Name "CompleteBootDSCStatus" foreach($DSCStatusFileShareAccessRule in $DSCStatusFileShareAccessRules) { $accessPermission = $DSCStatusFileShareAccessRule.AccessRight if ($accessPermission -eq "Change" -or $accessPermission -eq "Read" -or $accessPermission -eq "Full") { Revoke-SmbShareAccess -Name $DSCStatusFileShareAccessRule.Name -AccountName $DSCStatusFileShareAccessRule.AccountName -Force } } } } <# .Synopsis Remove the DSC status file for a specific computer with a specific build installed .Parameter ComputerName The computer that is to be removed the DSC status file. .Parameter Version The build version #> function Remove-DSCStatusFile { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $ComputerName, [Parameter(Mandatory=$true)] [string] $Version ) $ErrorActionPreference = "Stop" $dscStatusFileName = $ComputerName + "." + $Version + ".xml" $remoteDscStatusFilePath = "\\$ComputerName\C$\CompleteBootDSCStatus\$dscStatusFileName" try { if(Test-Path $remoteDscStatusFilePath -ErrorAction Ignore) { Remove-Item -Path $remoteDscStatusFilePath -Force -Confirm:$false } } catch { Trace-Warning "Could not remove $remoteDscStatusFilePath. Error: $_" } } <# .SYNOPSIS Reset partial configurations on all nodes to clean up any stale references to Script resources in existing configurations. #> function Reset-PartialConfigurationsOnNode { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = "Stop" $nodeName = @( Get-ExecutionContextNodeName -Parameters $Parameters ) if (-not $nodeName -or $nodeName.Count -gt 1) { throw "Invalid node information specified in the execution context: [$nodeName]" } Trace-Execution "Checking for presence of DscMetaconfig.psm1 on $nodeName." $modulePath = "\\$nodeName\C$\DSCConfigs\DscMetaconfig.psm1" if (-not (Test-Path $modulePath)) { Trace-Execution "Copying DscMetaconfig.psm1 to $nodeName." Copy-Item $PSScriptRoot\DscMetaConfig.psm1 $modulePath -Force } Trace-Execution "Cleaning up configuration on $nodeName." Invoke-Command -ComputerName $nodeName -ScriptBlock ${function:Reset-PartialConfigurations} } <# .SYNOPSIS Clean up of partial configurations is done by updating the meta configuration. We set the meta config to point to a single known resource that works, and start the DSC configuration, which removes all other partial configs from the store. Then we reset the partial configuration list in the meta configuration to ensure new configs pushed to the node are valid. This function is intended to be invoked in a remote session to a target node. #> function Reset-PartialConfigurations { $ErrorActionPreference = "Stop" $VerbosePreference = "Continue" # Helper function to update meta configuration. function Set-MetaConfig ($CertThumbprint, $PartialList) { Import-Module C:\DSCConfigs\DscMetaconfig.psm1 $metaMofPath = Join-Path ([IO.Path]::GetTempPath()) ([IO.Path]::GetRandomFileName()) Trace-Execution "Creating new temp path for meta configuration: $metaMofPath" New-Item -Path $metaMofPath -Type Directory -Force Trace-Execution "Generating meta configuration to only reference $PartialList configuration." MetaMof -OutputPath $metaMofPath -CredentialEncryptionThumbprint $CertThumbprint -PartialConfigList $PartialList $lcmConfig = $false $timeout = (Get-Date).AddMinutes(10) do { try { Trace-Execution "Setting LCM configuration from $metaMofPath" Set-DscLocalConfigurationManager -Path $metaMofPath -Force -ErrorAction Stop $lcmConfig = $true } catch { $errorMessage = $_.Exception.Message Trace-Execution "Error setting LCM configuration : '$errorMessage'" Start-Sleep 30 } } until ($lcmConfig -or (Get-Date) -gt $timeout) if (-not $lcmConfig) { throw "Failed to set LCM configuration. Last error: $errorMessage" } } # Collect current LCM settings, which will be used to set/reset the meta configuration. $lcm = Get-DscLocalConfigurationManager $encryptionThumbprint = $lcm.CertificateID if (-not $encryptionThumbprint) { Write-Warning "CertificateID on the LCM was not set. Retrieving Thumbprint of certificate in the local store." $encryptionThumbprint = Get-ChildItem Cert:\LocalMachine\My | ? Subject -match "DscEncryptionCertificate" | select -First 1 | % Thumbprint if (-not $encryptionThumbprint) { throw "Failed to get thumpbrint of DSC encryption certificate from LCM or the local store." } } Trace-Execution "Got encryption certificate thumbprint: $encryptionThumbprint." Trace-Execution "Resetting configuration." Set-MetaConfig -CertThumbprint $encryptionThumbprint -PartialList $null } Export-ModuleMember -Function Add-DSCStatusConfigFile Export-ModuleMember -Function ExportDscDecryptionCert Export-ModuleMember -Function GetDscEncryptionCert Export-ModuleMember -Function GetEncryptedPassword Export-ModuleMember -Function PrepareDSCFirstBoot Export-ModuleMember -Function Remove-DSCStatusFile Export-ModuleMember -Function RemoveExportedDscDecryptionCert Export-ModuleMember -Function Reset-PartialConfigurationsOnNode Export-ModuleMember -Function Revoke-CompleteBootDSCShareAccess Export-ModuleMember -Function SignDscConfiguration Export-ModuleMember -Function Test-ForDSCComplete Export-ModuleMember -Function Wait-ForDSCComplete # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCsVFz3ZvYILEYe # oe7/QEloWAK6kHZCKP4fcpgQH0yiGaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIF31rr1LW7o98t04beM3J2eG # NRREdAd4EObJZHY0M+ITMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAWckDKpmiDxNXtF5/RgqxBNC9xjvL/AtjfocXHwyGKxE+78WYh8g2fbGF # S0qF787wLAUVzeptKs0b5eJPMTFmd1nC02qIZ+6eRIEPnDMLz813zJe5tp/l1eVf # Gkfoh1g2oruMb+2ss1Jy4Xjdiy3C60B9mI3jSHVslGurxgEYiQFDDF/RPG5Gzck/ # gAE65atKb6mjlQ6/BaFsPNkUyiLKy0uOn+KvMoA7nZQKXLhcnK5xAA/qbnNssodE # 3e0lZf0LaBZkRa2CPwWPbQm+ph+Iu8FrzgITIrKzhzbam7U+K9RfvC7eke6+rUDO # b1jZU5VbnfA7jJbJmKKrshANHyFX2aGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAjh64FMujTOYJYwbuR4QMbeg8xw4Dcg9q2SL3PXQg1GQIGZr3/TCsO # GBMyMDI0MDgxOTE3Mjg1MS4zOTdaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCowns0IQsBAAEAAAH+MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjQwMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvLwhFxWlqA43olsE4PCe # gZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62YHUieIQXw+0u4qlay4AN # 3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv07O18i2HjDyLuywYyKA9F # mWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9BCGVRdHW9lmPMrrUlPWi # YV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnTdcfP6T8Mir0HrwTTtV2h # 2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT81ZC2aHN7exEDmmbiWss # jGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX/uDVtY9pvL4j8aEWS49h # KUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B454eGJhL0fwUTRbgyCbp # LgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQyahGZDL/vWAVjX5b8Jzhly # 9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xbeOETAOn7OT9D3UGt0q+K # iWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOnF7Dgj8a60KQT9QgfJfwX # nr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRvznuJ9SU2 # g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAiT4NUvO2lw+0 # dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8LqxsH4GWCPTztc3tr8AgBv # sYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPkMA3DAxVq4SSR8y+TRC2G # cOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze+sbqSn8cekduMZdLyHJk # 3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtTlNkq3bx1iyWg7N7jGZAB # RWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIRVkWsMyEAdoP9dqfaZzwX # GmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTRzZZEw82FupF3viXNR3DV # OlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ2e+sBUh62KVTlhEsQRHZ # RwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz9SvCjIKSxCZFCNv/zpKI # lsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObDfU4h/O/0vmbF3BMR+45r # AZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7FRnHEAAr06sflqZ8eeV3F # uDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQLWVG9JuGxgLRXseggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOptw5YwIhgPMjAyNDA4MTkxMzEzNThaGA8yMDI0MDgyMDEzMTM1OFowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6m3DlgIBADAKAgEAAgIQjgIB/zAHAgEAAgIT # azAKAgUA6m8VFgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQChXAS483RL # NhvWjmqx1bVA9exW8pw7rTb9nCXYnAeiNEparolYgj99SFSPQejdNcxQW7VJEUr8 # u1y4CA30RsFMUco/ccAtAJT17dHJSThkT3C36VNvNslZeTOUfIvzlafEOc33/hH1 # MLHrZyFJBzP3eDafal+INyQC35VRoNl5JF+C03g9SrqJgklFVz78MyYOIH2UmcHV # Lynv/fG2k+0+OCEdbA4tMUHEnI26ZEe3xaQYlq0fsaeQJ5AvfyZ5S5J7kqgcIsme # jWptfAg9olTWiQuwJMhqVgD6GNsl/7ZNxDekhvhQENlwviq2t/zErOsJCkDmFkNh # jeOaNp6DBmeCMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg/Yv/Jsv6 # pvMrf0SCEoNvyTrI+++8MAgHUQnNleBj6FEwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0WtkCstyh0eTCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/tCowns0IQsBAAEA # AAH+MCIEIFcrka7UyBhic4GcmXbI0TWIxmbgEeCWRdMgC44sDIRtMA0GCSqGSIb3 # DQEBCwUABIICAIxjMHAQLS/JM3MMoQ/i0RXXzXotI+Ch9LIBKQG1Ryb/GWWYTqQo # 6xUDPY5hNhpvQgU1YQHT07gM0lx3Z8kw+wyClOvqlhGHxHUhoVrcE/o8Kf47dFt8 # bNa1mU61gA1/5ErugvF0Yoe0XdzEelKx7IkUrkTPQ1kSk6HHRwFKs7tAl/qzYfSR # oSRYDXoJ7AOG9sy5kVOJppIcZ6yZae/yCvuo2CBgQRQTRqgV4HDzwEW9eu+UXNtB # xWExtecuMFmVFl4NtaedNP5SdvwsSxSJ8Xq0PBkYQjDjWDVzim9o61CP8tV5cTwo # IieWvOG4sr11gCmprgteZmaHx6fJCFRD1n2OPu3Qfx09XSzuVUni/C2ogDsOaLDU # DckJjy3S7NIUN0nIwclpS+wBBVIyhhIQfo0c2vn+wLWLjaUOoi+bqca+PlB3y9Yc # WPQxCC+zAH26dHouP0CjdwXc8pTxjG3QvnZwkxwoyRMmbw+IFSO0B8S0VeK2u8Ou # 3BwAR26KaaM3c3kFN5RvUGr09aryPh49Z2o1C41f4U/nWhfyo6WrE8pvxVpbybpf # 44S6E/xFglqkdPokwVb2LMTlm0mUFvJf0/95tGH+4DMbpWjAseXjU1/nMtCxJAxM # PsVk9Q3WR9usyKsJzA0lJMFsUM22CfEyGKDMrxbPIyVvLEDqPxZpEllf # SIG # End signature block |