Utils.psm1
Import-Module $PSScriptRoot\ClusUtils.psm1 Import-Module $PSScriptRoot\Logger.psm1 Import-Module $PSScriptRoot\PsHelper.psm1 function Copy-FileToRemote { param( [parameter(Mandatory=$true)][string] $srcPath, [parameter(Mandatory=$true)][string] $srcFile, [parameter(Mandatory=$true)][string] $destMachine, [parameter(Mandatory=$true)][pscredential] $destMachineCred, [parameter(Mandatory=$true)][string] $destDirectory ) $s = New-ReliablePsSession -ComputerName $destMachine -Credential $destMachineCred try { $fileExist = Invoke-Command -Session $s -ScriptBlock { param($destDirectory, $destFile) if (-not $(Test-Path $destDirectory)) { New-Item $destDirectory -ItemType Directory -Force -ErrorAction Stop | Out-Null return $false } $dest = Join-Path $destDirectory $destFile Test-Path $dest } -ArgumentList ($destDirectory, $srcFile) -ErrorAction Stop if ($fileExist) { return } $src = Join-Path $srcPath $srcFile if (Test-IsCsvPath -path $destDirectory) { Copy-Item -Path $src -Destination $destDirectory return } $fileSharePath = Join-Path "\\$destMachine" $destDirectory.Replace(":","$") if (Test-Path $fileSharePath) { Copy-Item -Path $src -Destination $fileSharePath return } Copy-Item -Path $src -Destination $destDirectory -ToSession $s } finally { if ($s -ne $null ) { $s | Remove-PSSession } } } function Test-FileExist { param( [parameter(Mandatory=$true)][string] $path ) if (-not $(Test-Path $path)) { throw "File $path not found" } } function Test-VMSwitchExist { param( [array] $computerName, [pscredential] $credential = [pscredential]::Empty, [string] $switchName ) $err = Invoke-Command -ComputerName $computerName -credential $credential -ScriptBlock { param($switchName) if($(Get-VMSwitch -Name $switchName -ErrorAction SilentlyContinue) -eq $null) { return "$(hostName)" } } -ArgumentList $switchName -ErrorAction Stop if ($err -ne $null) { throw "Switch $switchName not found on host(s) $err" } } function Test-InternetConnectivity { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty, [string] $srcAddress ) Write-TraceLog "Test-InternetConnectivity: Testing on $computerName from $srcAddress" $result = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock { param($srcAddress) $destIP = (Resolve-DnsName bing.com -Type A -ErrorAction SilentlyContinue | Select -First 1).IPAddress if ($destIP -eq $null) { return $false } if ([string]::IsNullOrEmpty($srcAddress)) { $result = ping $destIP -n 2 } else { $result = ping -S $srcAddress $destIP -n 2 } if (($result | Select-String "unreachable" | Select -First 1) -ne $null) { return $false } return ($result | Select-String "Received = 0") -eq $null } -ArgumentList ($srcAddress) return $result -eq $true } function Resolve-InternetSwitch { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty ) $switches = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock { $switches = (Get-VMSwitch).Name return $switches } foreach ($s in $switches) { Write-TraceLog "Resolve-InternetSwitch: Checking switch $s on computer $computerName" $ips = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock { param($s) $nics = (Get-VMNetworkAdapter -SwitchName $s -ManagementOS).name $allProbableOutBoundIPs = @() foreach ($n in $nics) { $adapter = Get-NetAdapter | Where-Object {$_.Name -like "*$n*" -and $_.Status -eq "up"}; if ($adapter -eq $null) { continue } $ip = (Get-NetIPAddress -InterfaceIndex $adapter.ifIndex -AddressFamily IPv4 -ErrorAction SilentlyContinue | ` Where-Object {-not ($_.IPaddress.StartsWith("169"))}).IPAddress | Select -First 1 if ($ip -ne $null) { $allProbableOutBoundIPs += $ip } } return $allProbableOutBoundIPs } -ArgumentList($s) foreach($ip in $ips) { $result = Test-InternetConnectivity -srcAddress $ip -computerName $computerName -credential $credential if ($result) { Write-TraceLog "Resolve-InternetSwitch: Switch $s on computer $computerName selected" return $s } } } Write-TraceLog "Resolve-SdnSwitch: No suitable internet switch found on computer $computerName" } function New-InternetSwitch { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty, [string] $name ) $iswitch = Resolve-InternetSwitch -computerName $computerName -credential $credential if ($iswitch -ne $null) { return $true } $ifIndex = Get-InternetAdapterIndex -computerName $computerName -credential $credential if ($ifIndex -eq $null) { return $false } $scriptBlock = { param($ifIndex, $name) $ifdesc = (Get-NetAdapter -InterfaceIndex $ifIndex).InterfaceDescription # remove any existing switch with the same name, in case there is a stale one remove-vmswitch -name $name -ErrorAction SilentlyContinue new-vmswitch -Name $name -InterfaceDescription $ifdesc | out-null } Invoke-ReliableCommand -ComputerName $computerName -credential $credential ` -ScriptBlock $scriptBlock -ArgumentList @($ifIndex, $name) return $true } function Resolve-SdnSwitch { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty ) $result = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock { $allSwitches = Get-VMSwitch -ErrorAction SilentlyContinue foreach ($s in $allSwitches) { foreach($e in $s.Extensions) { if ($e.Name -eq "Microsoft Azure VFP Switch Extension" -and $e.Enabled -eq $true) { $sdnSwitch = $s.Name } } } # if there is VFP enabled switch, use it if (-not [String]::IsNullOrEmpty($sdnSwitch)) { return $sdnSwitch, "VFP" } # if there is a switch on mellanox nic, use it. A common pattern for test setups. $sdnSwitch = ($allSwitches | ` Where-Object { $_.NetAdapterInterfaceDescriptions -ilike "*Mellanox*" }).Name if (-not [String]::IsNullOrEmpty($sdnSwitch)) { return $sdnSwitch, "MellanoxNic" } # best effort, a common pattern for naming sdn switch in test setups. $sdnSwitch = ($allSwitches | ` Where-Object {$_.Name -ilike "*sdnswitch*"}).Name if (-not [String]::IsNullOrEmpty($sdnSwitch)) { return $sdnSwitch, "NamePattern" } } if ($result -ne $null -and -not [String]::IsNullOrEmpty($result[0])) { Write-TraceLog "Resolve-SdnSwitch: Selected $($result[0]) on computer $computerName, Reason $($result[1])" return $result[0] } Write-TraceLog "Resolve-SdnSwitch: No suitable sdn switch found on computer $computerName" } function New-SdnSwitch { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty, [string] $name ) $sdnswitch = Resolve-SdnSwitch -computerName $computerName -credential $credential if ($sdnswitch -ne $null) { return $true } $scriptBlock = { param($name) $mellanoxNic = (Get-NetAdapter -InterfaceDescription *Mellanox* | Sort-Object -Property InterfaceDescription | Where-Object {$_.Status -eq "Up"} | Select-Object -Last 2).InterfaceDescription if ($mellanoxNic -eq $null) { return $false } remove-vmswitch -name $name -ErrorAction SilentlyContinue new-vmswitch -Name $name -InterfaceDescription $mellanoxNic | out-null return $true } $result = Invoke-ReliableCommand -ComputerName $computerName -credential $credential ` -ScriptBlock $scriptBlock -ArgumentList @($name) return $result } function Disable-LinkLocalNics { param ( [string] $computerName = (hostname), [pscredential] $credential = [pscredential]::Empty ) $scriptBlock = { $indexes = (Get-NetIPAddress | Where-Object {$_.IPaddress.StartsWith("169") }).InterfaceIndex foreach($index in $indexes) { $netAdapter = Get-NetAdapter -InterfaceIndex $index -ErrorAction SilentlyContinue if ($netAdapter.Name -ilike "*SMB*") { continue } if ($netAdapter -ne $null) { $netAdapter | Disable-NetAdapter -ErrorAction SilentlyContinue -Confirm:$false } } } Invoke-ReliableCommand -computerName $computerName -credential $credential -scriptblock $scriptBlock } function Get-InternetAdapterIndex { param( [array]$computerName, [pscredential] $credential = [pscredential]::Empty ) $scriptBlock = { $retry = 0 while ($true) { try { $dnsRes = Resolve-DnsName bing.com -Type A -ErrorAction Stop -DnsOnly | select -First 1 break } catch { if ($retry -lt 3) { $retry++ Write-Error "Failed to resolve dns, retrying" Start-Sleep 1 continue } Write-Error "Failed to resolve dns halting. Make sure the machine has internet access" Write-Error $_ -ErrorAction Stop } } $ip = $dnsRes.IpAddress $corpInterface = (Test-NetConnection -ErrorAction SilentlyContinue).InterfaceAlias if ($corpInterface -eq $null) { $connect = Test-NetConnection -ComputerName $ip -Port 80 $corpInterface = $connect.InterfaceAlias } $adapter = Get-NetAdapter -Name $corpInterface -ErrorAction Stop return $adapter.ifIndex } $index = Invoke-ReliableCommand -computerName $computerName -credential $credential -scriptblock $scriptBlock return $index } function Update-CorpNicDnsServerAddress { param( [array]$hosts, [pscredential] $credential = [pscredential]::Empty, [array] $dnsServers ) if ($dnsServers -eq $null -or $dnsServers.Count -eq 0) { return } $updateDns = { param( $index, [array]$dnsServers ) Set-DnsClientServerAddress -ServerAddresses $dnsServers -InterfaceIndex $index -ErrorAction Stop -Verbose } $getIfIndex = { [array]$ifIndexes = (Get-DnsClientServerAddress | ` Where-Object { $_.AddressFamily -eq 2 -and $_.ServerAddresses.Count -gt 0}).InterfaceIndex | ` Select-Object -Unique return $ifIndexes } $hosts | ForEach-Object { Write-TraceLog "Update-CorpNicDnsServerAddress: Host ($_), fetching adapters to update" $ifIndexes = Invoke-ReliableCommand -computerName $_ -credential $credential -scriptblock $getIfIndex foreach($ifIndex in $ifIndexes) { Write-TraceLog "Update-HostDnsServerAddress: Host ($_) adapter $ifIndex with dns $dnsServers" Invoke-ReliableCommand -computerName $_ -credential $credential -scriptblock $updateDns -ArgumentList @($ifIndex, $dnsServers) } } } function Get-NextMacAddress { param( [String] $MacAddress ) return ("{0:X12}" -f ([convert]::ToInt64($MacAddress.ToUpper().Replace(":", "").Replace("-", ""), 16) + 1)).Insert(2, "-").Insert(5, "-").Insert(8, "-").Insert(11, "-").Insert(14, "-") } function Restart-LanmanWorkstationService { Write-TraceLog "Restart-LanmanWorkstationService: Restarting LanmanWorkstation service" Get-SmbMapping | Remove-SmbMapping -Force | Out-Null Restart-Service LanmanWorkstation -Force | Out-Null $notStarted = $true $retryCount = 10 while($notStarted) { $retryCount-- Write-TraceLog "Restart-LanmanWorkstationService: Waiting for LanmanWorkstation service to start" Start-Sleep 5 $notStarted = (get-service LanmanWorkstation).Status -ne "Running" if ($retryCount -lt 0) { throw "Restart-LanmanWorkstationService: Failed waiting for LanmanWorkstation service to start" } } } function Connect-SMBShare { param ( [Parameter(Mandatory=$true)] [pscredential] $Credential, [Parameter(Mandatory=$true)] [string] $RemotePath, [Parameter(Mandatory=$false)] [switch] $RestartLanManServer ) Write-TraceLog "Connect-SMBShare: Connecting to $RemotePath, User: $($Credential.UserName)" # net use sometimes hung with multiple connections etc, restart the service to fix it if ($RestartLanManServer.IsPresent) { Restart-LanmanWorkstationService } $retry = $true while($true) { try { New-SmbMapping -RemotePath $RemotePath -UserName $($Credential.UserName) -Password $($Credential.GetNetworkCredential().Password) -Persistent $true | Out-Null break } catch { Write-TraceLog "Connect-SMBShare: Failed to connect to $RemotePath" Write-TraceLog "Connect-SMBShare: Error $_" if ($_.Exception.Message -like "*Multiple connections to a server*" -and $retry) { $retry = $false Write-TraceLog "Connect-SMBShare: restarting lanmanworkstation service and retry" Restart-LanmanWorkstationService continue } return $false } } if($(Test-Path $RemotePath)) { Write-TraceLog "Connect-SMBShare: Connected to $RemotePath" } else { Write-TraceLog "Connect-SMBShare: Failed to connect to $RemotePath" return $false } return $true } function Get-VMHostName { param ( [Parameter(Mandatory=$true)] [array] $Computers, [Parameter(Mandatory=$true)] [pscredential] $Credential, [Parameter(Mandatory=$true)] [string] $VMName ) foreach($c in $Computers) { $scriptBlock = { param($VMName) $vm = Get-VM -Name $VMName -ErrorAction SilentlyContinue return ($vm -ne $null) } $result = Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock $scriptBlock -ArgumentList $VMName if ($result) { return $c } } return $null } function Install-SshKey { param( [Parameter(Mandatory=$true)] [array] $Computers, [Parameter(Mandatory=$true)] [pscredential] $Credential, [Parameter(Mandatory=$true)] [string] $SshKey, [Parameter(Mandatory=$true)] [string] $KeyPath ) $scriptBlock = { param($SshKey, $KeyPath, $KeyUser) $startLine = "-----BEGIN OPENSSH PRIVATE KEY-----`n" $endLine = "-----END OPENSSH PRIVATE KEY-----`n" $content = $startLine $SshKey.Replace(" ", "`n") | ForEach-Object { $content+= $_ } $content += "`n" $content += $endLine Remove-Item $KeyPath -ErrorAction SilentlyContinue $Utf8NoBomEncoding = New-Object System.Text.UTF8Encoding $False [System.IO.File]::WriteAllLines($KeyPath, $content, $Utf8NoBomEncoding) $acl = Get-Acl $KeyPath $acl.SetAccessRuleProtection($true,$false) $accessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($KeyUser, "FullControl", "Allow") $acl.SetAccessRule($accessRule) $acl | Set-Acl $KeyPath } foreach($c in $Computers) { Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock $scriptBlock -ArgumentList @($SshKey, $KeyPath, $Credential.UserName) | Out-Null } } function Enable-DefaultFirewallRules { param( [Parameter(Mandatory=$true)] [array] $ComputerName, [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty ) foreach($c in $ComputerName) { Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock { Import-Module NetSecurity Set-NetFirewallRule -Name "FPS-*" -enabled True } } } function Remove-NCResources { param( [Parameter(Mandatory=$true)] [string] $NCUri, [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty ) Write-TraceLog "Remove-NCResources: Removing NC resources" $nics = Get-NetworkControllerNetworkInterface -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($nic in $nics) { if ($nic.ResourceId -ilike "*gw*backend" -or $nic.ResourceId -ilike "*gw*frontend") { continue } Write-TraceLog "Remove-NCResources: Removing nic $($nic.ResourceId)" Remove-NetworkControllerNetworkInterface -ConnectionUri $NCUri -ResourceId $nic.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $vnets = Get-NetworkControllerVirtualNetwork -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($vnet in $vnets) { Write-TraceLog "Remove-NCResources: Removing vnet $($vnet.ResourceId)" Remove-NetworkControllerVirtualNetwork -ConnectionUri $NCUri -ResourceId $vnet.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $lbs = Get-NetworkControllerLoadBalancer -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($lb in $lbs) { Write-TraceLog "Remove-NCResources: Removing lb $($lb.ResourceId)" Remove-NetworkControllerLoadBalancer -ConnectionUri $NCUri -ResourceId $lb.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $vgs = Get-NetworkControllerVirtualGateway -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($vg in $vgs) { Write-TraceLog "Remove-NCResources: Removing vg $($vg.ResourceId)" Remove-NetworkControllerVirtualGateway -ConnectionUri $NCUri -ResourceId $vg.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $firewalls = Get-NetworkControllerAccessControlList -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($rule in $firewalls) { Write-TraceLog "Remove-NCResources: Removing firewall $($rule.ResourceId)" Remove-NetworkControllerAccessControlList -ConnectionUri $NCUri -ResourceId $rule.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $lnets = Get-NetworkControllerLogicalNetwork -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($lnet in $lnets) { if ($lnet.ResourceId -ieq "HNVPA" -or $lnet.ResourceId -ieq "PublicVip" -or $lnet.ResourceId -eq "PrivateVip") { continue } Write-TraceLog "Remove-NCResources: Removing lnet $($lnet.ResourceId)" Remove-NetworkControllerLogicalNetwork -ConnectionUri $NCUri -ResourceId $lnet.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } $publicIps = Get-NetworkControllerPublicIPAddress -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException foreach($publicIp in $publicIps) { Write-TraceLog "Remove-NCResources: Removing public ip $($publicIp.ResourceId)" Remove-NetworkControllerPublicIPAddress -ConnectionUri $NCUri -ResourceId $publicIp.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException } } function Enable-HostStorageNetwork { <# .SYNOPSIS Enables RDMA on the host and creates vnics for RDMA traffic #> param( [Parameter(Mandatory=$true)] [Array] $ComputerName, [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty, [Parameter(Mandatory=$true)] [string] $switchName ) $scriptBlock ={ param($switchName) $team = Get-VMSwitch -name $switchName | Get-VMSwitchTeam -ErrorAction SilentlyContinue if ($team -eq $null) { return } $rdmaNics = Get-NetAdapter -ErrorAction SilentlyContinue | ` Where-Object { $_.ComponentID -eq "vms_mp" } | ` Get-NetAdapterRdma -ErrorAction SilentlyContinue | Where-Object {$_.Enabled -eq $True } if ($rdmaNics -ne $null -and $rdmaNics.Count -gt 0) { return } $state = (Get-WindowsFeature -Name "Data-Center-Bridging" ).InstallState if ($state -ne "Installed") { Install-WindowsFeature -Name "Data-Center-Bridging" } $nicDesc = $team.NetAdapterInterfaceDescription $nics = (Get-NetAdapter | Where-Object { $nicDesc -contains $_.InterfaceDescription }).Name $policy = Get-NetQosPolicy -Name "SMB" -ErrorAction SilentlyContinue if ($policy -eq $null) { New-NetQosPolicy "SMB" -NetDirectPortMatchCondition 445 -PriorityValue8021Action 3 Enable-NetQosFlowControl -priority 3 } $trafficClass = Get-NetQosTrafficClass "SMB" -ErrorAction SilentlyContinue if ($trafficClass -eq $null) { New-NetQosTrafficClass "SMB" -priority 3 -bandwidthpercentage 50 -algorithm ETS } Enable-NetAdapterQos -InterfaceAlias $nics Set-NetQosDcbxSetting -InterfaceAlias $_ -Willing $false -Confirm:$false $defaultPolicy = Get-NetQosPolicy -Name "DEFAULT" -ErrorAction SilentlyContinue if ($defaultPolicy -eq $null) { New-NetQosPolicy "DEFAULT" -Default -PriorityValue8021Action 0 Disable-NetQosFlowControl -priority 0,1,2,4,5,6,7 } Enable-NetAdapterRdma $nics $smbNic1 = Get-VMNetworkAdapter -Name "SMB1" -ManagementOS -ErrorAction SilentlyContinue if ($smbNic1 -eq $null) { Add-VMNetworkAdapter -SwitchName $switchName -Name "SMB1" -managementOS } $smbNic2 = Get-VMNetworkAdapter -Name "SMB2" -ManagementOS -ErrorAction SilentlyContinue if ($smbNic2 -eq $null) { Add-VMNetworkAdapter -SwitchName $switchName -Name "SMB2" -managementOS } Disable-NetAdapterBinding -Name "vEthernet (SMB1)","vEthernet (SMB2)" -DisplayName "Internet Protocol Version 4 (TCP/IPv4)" Enable-NetAdapterRDMA -Name "vEthernet (SMB1)","vEthernet (SMB2)" } foreach($c in $ComputerName) { Write-TraceLog "Enable-HostStorageNetwork: Enabling host storage network on $c, switch $switchName" $s = New-ReliablePsSession -ComputerName $c -Credential $Credential Invoke-Command -Session $s -ScriptBlock $scriptBlock -ArgumentList @($switchName) | Out-Null } } function Invoke-PowershellCommandOnVm { param( [ValidateNotNullOrEmpty()] [string] $vmName, [ValidateNotNullOrEmpty()] [string] $hostName, [ValidateNotNullOrEmpty()] [string] $cmd, [pscredential] $hostCred, [pscredential] $vmCred ) Invoke-PowershellCommandOnVmInternal -vmName $vmName ` -hostName $hostName ` -hostCred $hostCred ` -vmCred $vmCred ` -scriptBlock $scriptBlock ` -cmd $cmd } function Get-HostProcessorCount { $logicalCores = ((Get-CimInstance -ClassName Win32_Processor).NumberOfLogicalProcessors | Measure-Object -Sum).Sum return $logicalCores } function Get-HostMemory { return [Math]::Round((Get-WmiObject -Class Win32_ComputerSystem).TotalPhysicalMemory / 1GB) } function Disable-IPv6AutoConfig { param( [Parameter(Mandatory=$true)] [array] $ComputerName, [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty ) foreach($c in $ComputerName) { Write-TraceLog "Disable-IPv6AutoConfig: Disabling IPv6 on $c" Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock { [array]$interfaces = Get-NetIpInterface | Where-Object { $_.AddressFamily -eq "IPv6" -and $_.RouterDiscovery -eq "Enabled"} if ($interfaces.Count -eq 0) { return } foreach($iface in $interfaces) { if ($iface.ifIndex -eq 1) { continue } Set-NetIpInterface -InterfaceIndex $iface.ifIndex -RouterDiscovery Disabled } } } } function Parse-TurnkeyBoolean { <# .SYNOPSIS Parses a string to a boolean value .Parameter value The string to parse #> param( [string] $value ) if ($value -eq "true" -or $value -eq "1") { return $true } return $false } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAn9hR415xgSFCa # w5k16rfyX8X+Wgea2ovI0f7rGdtMM6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILhOntrFO0RDIpWWHXy81rrn # bpkID6eTvHIR7yBMVPfSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOPkrNTwg8aHJqfDWiqNwiWMrDak6OIniP+XhZIqG2AIqkTpKmPOoAwa1 # dk0IWLIjHQqmYWfAUoShN2rA/22lRK9KZM/9EYwYJRd+kaP3PZBDzxgMRgfGT4DL # +gt3kGqN2F4BlE7zGQjYA9lbuqv6aBIDwEAg1l62C9HrP85g6HM5WKY+NuzqXeIo # TM2hrZm1w6G4jsbVjCQ1ZQCfqA7yIlhQvC/9VzDYMuePeioBNpayB4I2jF7dwIWc # PJtZ3FSDoxXhgtF4ICas0CbVM15IVl4G496KMcf7N4Y7Wz4hU16crU6iaqjyZNd+ # xi0mEoYKs7xinNRgA1oNqsGvxYZq0aGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAppD9+Wgs7pTCkOp9EGXa8/iyEJKuv6Ojs0Q+kegrwTAIGZ9xapUT7 # GBMyMDI1MDMyMDIwMTEyNS4zODVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAgTY4A4HlzJYmAABAAACBDANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yNTAxMzAxOTQy # NDdaFw0yNjA0MjIxOTQyNDdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDw3Sbcee2d66vkWGTIXhfGqqgQGxQXTnq44XlUvNzF # St7ELtO4B939jwZFX7DrRt/4fpzGNkFdGpc7EL5S86qKYv360eXjW+fIv1lAqDD3 # 1d/p8Ai9/AZz8M95zo0rDpK2csz9WAyR9FtUDx52VOs9qP3/pgpHvgUvD8s6/3KN # ITzms8QC1tJ3TMw1cRn9CZgVIYzw2iD/ZvOW0sbF/DRdgM8UdtxjFIKTXTaI/bJh # sQge3TwayKQ2j85RafFFVCR5/ChapkrBQWGwNFaPzpmYN46mPiOvUxriISC9nQ/G # rDXUJWzLDmchrmr2baABJevvw31UYlTlLZY6zUmjkgaRfpozd+Glq9TY2E3Dglr6 # PtTEKgPu2hM6v8NiU5nTvxhDnxdmcf8UN7goeVlELXbOm7j8yw1xM9IyyQuUMWko # rBaN/5r9g4lvYkMohRXEYB0tMaOPt0FmZmQMLBFpNRVnXBTa4haXvn1adKrvTz8V # lfnHxkH6riA/h2AlqYWhv0YULsEcHnaDWgqA29ry+jH097MpJ/FHGHxk+d9kH2L5 # aJPpAYuNmMNPB7FDTPWAx7Apjr/J5MhUx0i07gV2brAZ9J9RHi+fMPbS+Qm4AonC # 5iOTj+dKCttVRs+jKKuO63CLwqlljvnUCmuSavOX54IXOtKcFZkfDdOZ7cE4DioP # 1QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBp1dktAcGpW/Km6qm+vu4M1GaJfMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBecv6sRw2HTLMyUC1WJJ+FR+DgA9Jkv0lG # sIt4y69CmOj8R63oFbhSmcdpakxqNbr8v9dyTb4RDyNqtohiiXbtrXmQK5X7y/Q+ # +F0zMotTtTpTPvG3eltyV/LvO15mrLoNQ7W4VH58aLt030tORxs8VnAQQF5BmQQM # Oua+EQgH4f1F4uF6rl3EC17JBSJ0wjHSea/n0WYiHPR0qkz/NRAf8lSUUV0gbIMa # wGIjn7+RKyCr+8l1xdNkK/F0UYuX3hG0nE+9Wc0L4A/enluUN7Pa9vOV6Vi3BOJS # T0RY/ax7iZ45leM8kqCw7BFPcTIkWzxpjr2nCtirnkw7OBQ6FNgwIuAvYNTU7r60 # W421YFOL5pTsMZcNDOOsA01xv7ymCF6zknMGpRHuw0Rb2BAJC9quU7CXWbMbAJLd # Z6XINKariSmCX3/MLdzcW5XOycK0QhoRNRf4WqXRshEBaY2ymJvHO48oSSY/kpuY # vBS3ljAAuLN7Rp8jWS7t916paGeE7prmrP9FJsoy1LFKmFnW+vg43ANhByuAEXq9 # Cay5o7K2H5NFnR5wj/SLRKwK1iyUX926i1TEviEiAh/PVyJbAD4koipig28p/6HD # uiYOZ0wUkm/a5W8orIjoOdU3XsJ4i08CfNp5I73CsvB5QPYMcLpF9NO/1LvoQAw3 # UPdL55M5HTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQC6 # PYHRw9+9SH+1pwy6qzVG3k9lbqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA64bZJTAiGA8yMDI1MDMyMDE4MTI1 # M1oYDzIwMjUwMzIxMTgxMjUzWjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDrhtkl # AgEAMAkCAQACATcCAf8wBwIBAAICElgwCgIFAOuIKqUCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAFrS1v/WF4ifamzHMOFX48bI8VIfb8zaDOnEy6JEkgrXg # HAKqQwHKcyp0YQnHiO2xWg2+yzUTluT2EnBlukJrHuauL5VFcPevfcM+Njvfoztm # uS9f6Mcwv6YEoBKtR2JEkuOITNSIK0z0+XPfLtt7Thj26NSB2OeLcx8wEh5WUPzc # zt/JJ3dOSi+lE1xTJQqOJIak3K+SzTYU+WwEXduHeCgpOdGXBWYJd/ZbC362EHkf # RaHef4eC5SobTiqL8FInodw5x89mP1weqH3Qr2PdYMs1vb1diQ5r1gYgWdMpZQj4 # QVhTzTwzOD9yRU/zqCqMIohnGO1OT+iT8jZoUgylfjGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACBNjgDgeXMliYAAEAAAIE # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIJDcKYZnWk+K/Udx5JB/KYzqWlYlLUCCOUKvoI76lasN # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg+e14Zf1bCrxV0kzqaN/HUYQm # y7v/qRTqXRJLmtx5uf4wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAgTY4A4HlzJYmAABAAACBDAiBCC1Pef9ENLWxLUApVTYkoODSXSe # 1LiwmdPw5A9DX2weEjANBgkqhkiG9w0BAQsFAASCAgDKQBnsV3BqqgcNHT1C+ddM # JXqduRbF7xXu2c5IOnxRpsWig7Cz6RGjGKmhLC7rb/phrhMftYmunCWt1PTRZax3 # arqu1xaxjDD48IKSNnBh9XiOXySoVpVg25IoudozMzjAzPFsDN6Fn4bMSDh0Qf8Y # qOhkOOEdMYHbL6+nOG2GWhj/p5vOl0XR32JaMQRBViKTwvITvHPnxEzU6l1ZQ5q+ # TKMM/+LzIsSplClRsSsoSv/cvji8VQ6ObpRZGeLtLMIveBAOQfpDBfJloAcdYwXl # ppa0yiF//sHvSexUyliI7H3NLd7ZKcQMGdg2hLMlpmqVk2NKXr9+eRmXpAJyTauf # 4I8GxFCVcN5DdEX1W/vlzhIj9cjEM7wu29i38RdphMo54quOt6ZaRV47hLVspqbq # ksmfkir2B1jJ1XSmf2mVbz3/KRskWYhXIqCc2AH0Ue57XKU3+b0NFmEqHaV6S5xb # PmdFgNqgSaxK6SIs8qLLUp/x/ZvPTdja1LUapVqUJ1OMKd5sURpCo8maQVrrdQmx # m+u7Aew83n5LO1KfzZovQ0EoECuuUePRQi+szeSZujqERtCTazPu6yDUgkr+GQ3E # tgqa4lDpXIssyHfwQg/ip+guXO/R9o5OIFWSQIEPzJ4cNxtFxXi72shiEetGk9Ng # wxSGqlBFV59KTi1EN7B8hg== # SIG # End signature block |