From 6d5142e831535b7d03ad7cae32cdd8e7a93f2dd9 Mon Sep 17 00:00:00 2001 From: Frank Brehm Date: Mon, 20 Jan 2025 09:50:31 +0100 Subject: [PATCH 1/1] Initial commit --- .gitignore | 57 + .updated | 4 + DIR_COLORS | 214 + DIR_COLORS.lightbgcolor | 216 + GREP_COLORS | 4 + NetworkManager/NetworkManager.conf | 52 + .../system-connections/enp1s0.nmconnection | 18 + X11/xinit/xinitrc.d/50-systemd-user.sh | 15 + X11/xorg.conf.d/00-keyboard.conf | 9 + aliases | 97 + alternatives/apropos | 1 + alternatives/apropos.1.gz | 1 + alternatives/arptables | 1 + alternatives/arptables-helper | 1 + alternatives/arptables-man | 1 + alternatives/arptables-restore | 1 + alternatives/arptables-restore-man | 1 + alternatives/arptables-save | 1 + alternatives/arptables-save-man | 1 + alternatives/cifs-idmap-plugin | 1 + alternatives/ebtables | 1 + alternatives/ebtables-man | 1 + alternatives/ebtables-restore | 1 + alternatives/ebtables-save | 1 + alternatives/ip6tables | 1 + alternatives/ip6tables-restore | 1 + alternatives/ip6tables-save | 1 + alternatives/iptables | 1 + alternatives/iptables-restore | 1 + alternatives/iptables-save | 1 + alternatives/ld | 1 + alternatives/libnssckbi.so.x86_64 | 1 + alternatives/llvm-config-16 | 1 + alternatives/man | 1 + alternatives/man.1.gz | 1 + alternatives/pgsql-clusterdb | 1 + alternatives/pgsql-clusterdbman | 1 + alternatives/pgsql-createdb | 1 + alternatives/pgsql-createdbman | 1 + alternatives/pgsql-createuser | 1 + alternatives/pgsql-createuserman | 1 + alternatives/pgsql-dropdb | 1 + alternatives/pgsql-dropdbman | 1 + alternatives/pgsql-dropuser | 1 + alternatives/pgsql-dropuserman | 1 + alternatives/pgsql-ld-conf | 1 + alternatives/pgsql-pg_basebackup | 1 + alternatives/pgsql-pg_basebackupman | 1 + alternatives/pgsql-pg_dump | 1 + alternatives/pgsql-pg_dumpall | 1 + alternatives/pgsql-pg_dumpallman | 1 + alternatives/pgsql-pg_dumpman | 1 + alternatives/pgsql-pg_restore | 1 + alternatives/pgsql-pg_restoreman | 1 + alternatives/pgsql-psql | 1 + alternatives/pgsql-psqlman | 1 + alternatives/pgsql-reindexdb | 1 + alternatives/pgsql-reindexdbman | 1 + alternatives/pgsql-vacuumdb | 1 + alternatives/pgsql-vacuumdbman | 1 + alternatives/soelim | 1 + alternatives/soelim.1.gz | 1 + alternatives/whatis | 1 + alternatives/whatis.1.gz | 1 + anacrontab | 16 + audit/audit-stop.rules | 8 + audit/audit.rules | 6 + audit/auditd.conf | 40 + audit/rules.d/audit.rules | 13 + authselect/user-nsswitch.conf | 70 + bash_completion.d/authselect-completion.sh | 214 + bash_completion.d/redefine_filedir | 66 + bashrc | 89 + bindresvport.blacklist | 18 + byobu/backend | 4 + byobu/socketdir | 11 + chrony.conf | 50 + chrony.keys | 13 + cifs-utils/idmap-plugin | 1 + colordiffrc | 30 + containers/policy.json | 32 + containers/registries.conf | 79 + .../registries.conf.d/000-shortnames.conf | 151 + .../001-rhel-shortnames.conf | 5382 ++++++++ .../002-rhel-shortnames-overrides.conf | 10 + containers/registries.d/default.yaml | 28 + .../registry.access.redhat.com.yaml | 3 + .../registries.d/registry.redhat.io.yaml | 3 + containers/storage.conf | 157 + cron.d/0hourly | 5 + cron.daily/etckeeper | 8 + cron.deny | 0 cron.hourly/0anacron | 25 + crontab | 15 + crypto-policies/back-ends/bind.config | 1 + crypto-policies/back-ends/gnutls.config | 1 + crypto-policies/back-ends/java.config | 1 + crypto-policies/back-ends/javasystem.config | 1 + crypto-policies/back-ends/krb5.config | 1 + crypto-policies/back-ends/libreswan.config | 1 + crypto-policies/back-ends/libssh.config | 1 + crypto-policies/back-ends/nss.config | 1 + crypto-policies/back-ends/openssh.config | 1 + .../back-ends/opensshserver.config | 1 + crypto-policies/back-ends/openssl.config | 1 + crypto-policies/back-ends/openssl_fips.config | 1 + crypto-policies/back-ends/opensslcnf.config | 1 + crypto-policies/config | 1 + crypto-policies/state/CURRENT.pol | 36 + crypto-policies/state/current | 1 + crypttab | 0 csh.cshrc | 66 + csh.login | 44 + dbus-1/session.conf | 19 + dbus-1/system.conf | 19 + dbus-1/system.d/teamd.conf | 12 + default/grub | 8 + default/useradd | 9 + depmod.d/dist.conf | 6 + dhcp/dhclient.d/chrony.sh | 27 + dnf/dnf.conf | 6 + dnf/modules.d/postgresql.module | 5 + dnf/plugins/copr.conf | 11 + dnf/plugins/debuginfo-install.conf | 3 + dnf/protected.d/dnf.conf | 1 + dnf/protected.d/grub2-pc.conf | 1 + dnf/protected.d/grub2-tools-minimal.conf | 1 + dnf/protected.d/setup.conf | 1 + dnf/protected.d/sudo.conf | 1 + dnf/protected.d/systemd.conf | 2 + dnf/protected.d/yum.conf | 1 + dnf/vars/contentdir | 1 + dnf/vars/rltype | 1 + dnf/vars/sigcontentdir | 1 + dnf/vars/stream | 1 + dracut.conf | 3 + environment | 0 etckeeper/commit.d/10vcs-test | 17 + etckeeper/commit.d/20store-metadata | 1 + etckeeper/commit.d/30bzr-add | 8 + etckeeper/commit.d/30darcs-add | 14 + etckeeper/commit.d/30git-add | 8 + etckeeper/commit.d/30hg-addremove | 8 + etckeeper/commit.d/50vcs-commit | 142 + etckeeper/commit.d/99push | 14 + etckeeper/commit.d/README | 3 + etckeeper/daily | 17 + etckeeper/etckeeper.conf | 45 + etckeeper/init.d/10restore-metadata | 14 + etckeeper/init.d/20restore-etckeeper | 22 + etckeeper/init.d/40vcs-init | 18 + etckeeper/init.d/50vcs-ignore | 4 + etckeeper/init.d/50vcs-perm | 12 + etckeeper/init.d/50vcs-pre-commit-hook | 80 + etckeeper/init.d/60darcs-deleted-symlinks | 48 + etckeeper/init.d/70vcs-add | 27 + etckeeper/init.d/README | 13 + etckeeper/list-installed.d/50list-installed | 38 + etckeeper/post-install.d/50vcs-commit | 94 + etckeeper/post-install.d/README | 2 + etckeeper/pre-commit.d/20warn-problem-files | 31 + etckeeper/pre-commit.d/30store-metadata | 171 + etckeeper/pre-commit.d/README | 2 + etckeeper/pre-install.d/10packagelist | 5 + etckeeper/pre-install.d/50uncommitted-changes | 15 + etckeeper/pre-install.d/README | 3 + etckeeper/unclean.d/50test | 12 + etckeeper/unclean.d/README | 2 + etckeeper/uninit.d/01prompt | 20 + etckeeper/uninit.d/50remove-metadata | 6 + etckeeper/uninit.d/50vcs-uninit | 54 + etckeeper/uninit.d/README | 2 + etckeeper/update-ignore.d/01update-ignore | 225 + etckeeper/update-ignore.d/README | 2 + etckeeper/vcs.d/50vcs-cmd | 11 + ethertypes | 39 + exports | 0 filesystems | 10 + firewalld/firewalld.conf | 103 + firewalld/lockdown-whitelist.xml | 7 + firewalld/zones/public.xml | 9 + fstab | 17 + fuse.conf | 2 + gitconfig | 13 + groff/site-tmac/man.local | 4 + groff/site-tmac/mdoc.local | 4 + group | 47 + group- | 46 + grub.d/00_header | 381 + grub.d/01_users | 11 + grub.d/08_fallback_counting | 24 + grub.d/10_linux | 586 + grub.d/10_reset_boot_success | 25 + grub.d/12_menu_auto_hide | 35 + grub.d/14_menu_show_once | 13 + grub.d/20_linux_xen | 372 + grub.d/20_ppc_terminfo | 114 + grub.d/30_os-prober | 319 + grub.d/30_uefi-firmware | 39 + grub.d/40_custom | 5 + grub.d/41_custom | 9 + grub.d/README | 11 + grub2.cfg | 1 + gshadow | 47 + gshadow- | 46 + gss/mech.d/gssproxy.conf | 4 + gssproxy/24-nfs-server.conf | 7 + gssproxy/99-nfs-client.conf | 10 + gssproxy/gssproxy.conf | 1 + host.conf | 1 + hostname | 1 + hosts | 2 + idmapd.conf | 169 + inittab | 16 + inputrc | 42 + iproute2/bpf_pinning | 6 + iproute2/ematch_map | 8 + iproute2/group | 2 + iproute2/nl_protos | 23 + iproute2/rt_dsfield | 43 + iproute2/rt_protos | 25 + iproute2/rt_realms | 13 + iproute2/rt_scopes | 11 + iproute2/rt_tables | 11 + issue | 3 + issue.net | 2 + kdump.conf | 194 + keys/ima/centosimarelease-9.der | Bin 0 -> 726 bytes keys/ima/redhatimarelease-9.der | Bin 0 -> 727 bytes keys/ima/rocky-imarelease.der | Bin 0 -> 1013 bytes krb5.conf | 31 + krb5.conf.d/crypto-policies | 1 + krb5.conf.d/kcm_default_ccache | 12 + ld.so.conf | 1 + ld.so.conf.d/postgresql-pgdg-libs.conf | 1 + libaudit.conf | 7 + libnl/classid | 45 + libnl/pktloc | 76 + libreport/events.d/collect_dnf.conf | 24 + libssh/libssh_client.config | 4 + libssh/libssh_server.config | 2 + libuser.conf | 89 + locale.conf | 1 + localtime | 1 + login.defs | 278 + logrotate.conf | 23 + logrotate.d/btmp | 7 + logrotate.d/chrony | 8 + logrotate.d/dnf | 7 + logrotate.d/firewalld | 7 + logrotate.d/kvm_stat | 11 + logrotate.d/redis | 9 + logrotate.d/rsyslog | 12 + logrotate.d/sssd | 13 + logrotate.d/wtmp | 8 + lvm/backup/rl | 144 + .../system.devices-20241125.150254.0004 | 6 + lvm/devices/system.devices | 6 + lvm/lvm.conf | 2504 ++++ lvm/lvmlocal.conf | 57 + lvm/profile/cache-mq.profile | 20 + lvm/profile/cache-smq.profile | 14 + lvm/profile/command_profile_template.profile | 74 + lvm/profile/lvmdbusd.profile | 50 + lvm/profile/metadata_profile_template.profile | 24 + lvm/profile/thin-generic.profile | 4 + lvm/profile/thin-performance.profile | 4 + lvm/profile/vdo-small.profile | 23 + machine-id | 1 + magic | 3 + makedumpfile.conf.sample | 149 + man_db.conf | 132 + mke2fs.conf | 59 + mock/alma+epel-8-aarch64.cfg | 7 + mock/alma+epel-8-ppc64le.cfg | 7 + mock/alma+epel-8-x86_64.cfg | 7 + mock/alma+epel-9-aarch64.cfg | 5 + mock/alma+epel-9-ppc64le.cfg | 5 + mock/alma+epel-9-s390x.cfg | 5 + mock/alma+epel-9-x86_64.cfg | 5 + mock/almalinux-8-aarch64.cfg | 6 + mock/almalinux-8-ppc64le.cfg | 6 + mock/almalinux-8-x86_64.cfg | 6 + mock/almalinux-9-aarch64.cfg | 6 + mock/almalinux-9-ppc64le.cfg | 6 + mock/almalinux-9-s390x.cfg | 6 + mock/almalinux-9-x86_64.cfg | 6 + mock/amazonlinux-2-aarch64.cfg | 5 + mock/amazonlinux-2-x86_64.cfg | 5 + mock/amazonlinux-2023-aarch64.cfg | 4 + mock/amazonlinux-2023-x86_64.cfg | 4 + mock/anolis-8-aarch64.cfg | 5 + mock/anolis-8-x86_64.cfg | 5 + mock/centos-stream+epel-10-aarch64.cfg | 8 + mock/centos-stream+epel-10-ppc64le.cfg | 8 + mock/centos-stream+epel-10-s390x.cfg | 8 + mock/centos-stream+epel-10-x86_64.cfg | 8 + mock/centos-stream+epel-8-aarch64.cfg | 8 + mock/centos-stream+epel-8-ppc64le.cfg | 10 + mock/centos-stream+epel-8-x86_64.cfg | 8 + mock/centos-stream+epel-9-aarch64.cfg | 8 + mock/centos-stream+epel-9-ppc64le.cfg | 10 + mock/centos-stream+epel-9-s390x.cfg | 8 + mock/centos-stream+epel-9-x86_64.cfg | 8 + mock/centos-stream+epel-next-8-aarch64.cfg | 10 + mock/centos-stream+epel-next-8-ppc64le.cfg | 12 + mock/centos-stream+epel-next-8-x86_64.cfg | 10 + mock/centos-stream+epel-next-9-aarch64.cfg | 9 + mock/centos-stream+epel-next-9-ppc64le.cfg | 11 + mock/centos-stream+epel-next-9-s390x.cfg | 9 + mock/centos-stream+epel-next-9-x86_64.cfg | 9 + mock/centos-stream-10-aarch64.cfg | 6 + mock/centos-stream-10-ppc64le.cfg | 6 + mock/centos-stream-10-s390x.cfg | 6 + mock/centos-stream-10-x86_64.cfg | 6 + mock/centos-stream-8-aarch64.cfg | 7 + mock/centos-stream-8-ppc64le.cfg | 9 + mock/centos-stream-8-x86_64.cfg | 7 + mock/centos-stream-9-aarch64.cfg | 6 + mock/centos-stream-9-ppc64le.cfg | 8 + mock/centos-stream-9-s390x.cfg | 6 + mock/centos-stream-9-x86_64.cfg | 6 + mock/chroot-aliases.cfg | 80 + mock/circlelinux+epel-8-aarch64.cfg | 7 + mock/circlelinux+epel-8-ppc64le.cfg | 7 + mock/circlelinux+epel-8-x86_64.cfg | 7 + mock/circlelinux+epel-9-aarch64.cfg | 5 + mock/circlelinux+epel-9-ppc64le.cfg | 5 + mock/circlelinux+epel-9-s390x.cfg | 5 + mock/circlelinux+epel-9-x86_64.cfg | 5 + mock/circlelinux-8-aarch64.cfg | 6 + mock/circlelinux-8-ppc64le.cfg | 6 + mock/circlelinux-8-x86_64.cfg | 6 + mock/circlelinux-9-aarch64.cfg | 6 + mock/circlelinux-9-ppc64le.cfg | 6 + mock/circlelinux-9-s390x.cfg | 6 + mock/circlelinux-9-x86_64.cfg | 6 + mock/custom-1-aarch64.cfg | 5 + mock/custom-1-armhfp.cfg | 5 + mock/custom-1-i386.cfg | 5 + mock/custom-1-ppc64.cfg | 5 + mock/custom-1-ppc64le.cfg | 5 + mock/custom-1-s390.cfg | 5 + mock/custom-1-s390x.cfg | 5 + mock/custom-1-x86_64.cfg | 5 + mock/default.cfg | 1 + mock/eol/anolis-7-aarch64.cfg | 5 + mock/eol/anolis-7-x86_64.cfg | 5 + mock/eol/centos+epel-7-aarch64.cfg | 6 + mock/eol/centos+epel-7-ppc64.cfg | 6 + mock/eol/centos+epel-7-ppc64le.cfg | 7 + mock/eol/centos+epel-7-x86_64.cfg | 7 + mock/eol/centos+epel-8-aarch64.cfg | 6 + mock/eol/centos+epel-8-ppc64le.cfg | 6 + mock/eol/centos+epel-8-x86_64.cfg | 6 + mock/eol/centos-6-i386.cfg | 5 + mock/eol/centos-6-x86_64.cfg | 5 + mock/eol/centos-7-aarch64.cfg | 5 + mock/eol/centos-7-ppc64.cfg | 5 + mock/eol/centos-7-ppc64le.cfg | 5 + mock/eol/centos-7-x86_64.cfg | 5 + mock/eol/centos-8-aarch64.cfg | 5 + mock/eol/centos-8-ppc64le.cfg | 5 + mock/eol/centos-8-x86_64.cfg | 5 + mock/eol/epel-5-i386.cfg | 60 + mock/eol/epel-5-x86_64.cfg | 60 + mock/eol/epel-6-i386.cfg | 5 + mock/eol/epel-6-x86_64.cfg | 5 + mock/eol/epel-7-ppc64le.cfg | 1 + mock/eol/epel-7-x86_64.cfg | 1 + mock/eol/epelplayground-8-aarch64.cfg | 6 + mock/eol/epelplayground-8-ppc64le.cfg | 6 + mock/eol/epelplayground-8-x86_64.cfg | 6 + mock/eol/fedora-25-aarch64.cfg | 89 + mock/eol/fedora-25-armhfp.cfg | 89 + mock/eol/fedora-25-i386.cfg | 89 + mock/eol/fedora-25-ppc64.cfg | 89 + mock/eol/fedora-25-ppc64le.cfg | 89 + mock/eol/fedora-25-s390x.cfg | 89 + mock/eol/fedora-25-x86_64.cfg | 89 + mock/eol/fedora-26-aarch64.cfg | 89 + mock/eol/fedora-26-armhfp.cfg | 89 + mock/eol/fedora-26-i386.cfg | 89 + mock/eol/fedora-26-ppc64.cfg | 89 + mock/eol/fedora-26-ppc64le.cfg | 89 + mock/eol/fedora-26-s390x.cfg | 89 + mock/eol/fedora-26-x86_64.cfg | 89 + mock/eol/fedora-27-aarch64.cfg | 89 + mock/eol/fedora-27-armhfp.cfg | 95 + mock/eol/fedora-27-i386.cfg | 89 + mock/eol/fedora-27-ppc64.cfg | 89 + mock/eol/fedora-27-ppc64le.cfg | 89 + mock/eol/fedora-27-s390x.cfg | 89 + mock/eol/fedora-27-x86_64.cfg | 89 + mock/eol/fedora-28-aarch64.cfg | 90 + mock/eol/fedora-28-armhfp.cfg | 96 + mock/eol/fedora-28-i386.cfg | 90 + mock/eol/fedora-28-ppc64.cfg | 90 + mock/eol/fedora-28-ppc64le.cfg | 90 + mock/eol/fedora-28-s390x.cfg | 90 + mock/eol/fedora-28-x86_64.cfg | 90 + mock/eol/fedora-29-aarch64.cfg | 4 + mock/eol/fedora-29-armhfp.cfg | 4 + mock/eol/fedora-29-i386.cfg | 4 + mock/eol/fedora-29-ppc64le.cfg | 4 + mock/eol/fedora-29-s390x.cfg | 4 + mock/eol/fedora-29-x86_64.cfg | 4 + mock/eol/fedora-30-aarch64.cfg | 4 + mock/eol/fedora-30-armhfp.cfg | 4 + mock/eol/fedora-30-i386.cfg | 4 + mock/eol/fedora-30-ppc64le.cfg | 4 + mock/eol/fedora-30-s390x.cfg | 4 + mock/eol/fedora-30-x86_64.cfg | 4 + mock/eol/fedora-31-aarch64.cfg | 5 + mock/eol/fedora-31-armhfp.cfg | 5 + mock/eol/fedora-31-i386.cfg | 5 + mock/eol/fedora-31-ppc64le.cfg | 5 + mock/eol/fedora-31-s390x.cfg | 5 + mock/eol/fedora-31-x86_64.cfg | 5 + mock/eol/fedora-32-aarch64.cfg | 5 + mock/eol/fedora-32-armhfp.cfg | 5 + mock/eol/fedora-32-i386.cfg | 5 + mock/eol/fedora-32-ppc64le.cfg | 5 + mock/eol/fedora-32-s390x.cfg | 5 + mock/eol/fedora-32-x86_64.cfg | 5 + mock/eol/fedora-33-aarch64.cfg | 5 + mock/eol/fedora-33-armhfp.cfg | 5 + mock/eol/fedora-33-i386.cfg | 5 + mock/eol/fedora-33-ppc64le.cfg | 5 + mock/eol/fedora-33-s390x.cfg | 5 + mock/eol/fedora-33-x86_64.cfg | 5 + mock/eol/fedora-34-aarch64.cfg | 5 + mock/eol/fedora-34-armhfp.cfg | 5 + mock/eol/fedora-34-i386.cfg | 5 + mock/eol/fedora-34-ppc64le.cfg | 5 + mock/eol/fedora-34-s390x.cfg | 5 + mock/eol/fedora-34-x86_64.cfg | 5 + mock/eol/fedora-35-aarch64.cfg | 5 + mock/eol/fedora-35-armhfp.cfg | 5 + mock/eol/fedora-35-i386.cfg | 5 + mock/eol/fedora-35-ppc64le.cfg | 5 + mock/eol/fedora-35-s390x.cfg | 5 + mock/eol/fedora-35-x86_64.cfg | 5 + mock/eol/fedora-36-aarch64.cfg | 5 + mock/eol/fedora-36-armhfp.cfg | 5 + mock/eol/fedora-36-i386.cfg | 5 + mock/eol/fedora-36-ppc64le.cfg | 5 + mock/eol/fedora-36-s390x.cfg | 5 + mock/eol/fedora-36-x86_64.cfg | 5 + mock/eol/fedora-37-aarch64.cfg | 5 + mock/eol/fedora-37-i386.cfg | 5 + mock/eol/fedora-37-ppc64le.cfg | 5 + mock/eol/fedora-37-s390x.cfg | 5 + mock/eol/fedora-37-x86_64.cfg | 5 + mock/eol/fedora-38-aarch64.cfg | 5 + mock/eol/fedora-38-i386.cfg | 5 + mock/eol/fedora-38-ppc64le.cfg | 5 + mock/eol/fedora-38-s390x.cfg | 5 + mock/eol/fedora-38-x86_64.cfg | 5 + mock/eol/fedora-39-aarch64.cfg | 5 + mock/eol/fedora-39-i386.cfg | 5 + mock/eol/fedora-39-ppc64le.cfg | 5 + mock/eol/fedora-39-s390x.cfg | 5 + mock/eol/fedora-39-x86_64.cfg | 5 + mock/eol/mageia-6-armv5tl.cfg | 5 + mock/eol/mageia-6-armv7hl.cfg | 5 + mock/eol/mageia-6-i586.cfg | 5 + mock/eol/mageia-6-x86_64.cfg | 5 + mock/eol/mageia-7-aarch64.cfg | 5 + mock/eol/mageia-7-armv7hl.cfg | 5 + mock/eol/mageia-7-i586.cfg | 5 + mock/eol/mageia-7-x86_64.cfg | 5 + mock/eol/openmandriva-4.0-aarch64.cfg | 5 + mock/eol/openmandriva-4.0-armv7hnl.cfg | 5 + mock/eol/openmandriva-4.0-i686.cfg | 5 + mock/eol/openmandriva-4.0-x86_64.cfg | 5 + mock/eol/openmandriva-4.1-i686.cfg | 5 + mock/eol/openmandriva-cooker-i686.cfg | 5 + mock/eol/openmandriva-rolling-i686.cfg | 5 + mock/eol/opensuse-leap-15.0-aarch64.cfg | 46 + mock/eol/opensuse-leap-15.0-x86_64.cfg | 47 + mock/eol/opensuse-leap-15.1-aarch64.cfg | 55 + mock/eol/opensuse-leap-15.1-x86_64.cfg | 55 + mock/eol/opensuse-leap-15.2-aarch64.cfg | 56 + mock/eol/opensuse-leap-15.2-x86_64.cfg | 56 + mock/eol/opensuse-leap-15.3-aarch64.cfg | 5 + mock/eol/opensuse-leap-15.3-ppc64le.cfg | 5 + mock/eol/opensuse-leap-15.3-s390x.cfg | 5 + mock/eol/opensuse-leap-15.3-x86_64.cfg | 5 + mock/eol/opensuse-leap-15.4-aarch64.cfg | 5 + mock/eol/opensuse-leap-15.4-ppc64le.cfg | 5 + mock/eol/opensuse-leap-15.4-s390x.cfg | 5 + mock/eol/opensuse-leap-15.4-x86_64.cfg | 5 + mock/eol/oraclelinux+epel-7-aarch64.cfg | 7 + mock/eol/oraclelinux+epel-7-x86_64.cfg | 7 + mock/eol/rhel-6-x86_64.cfg | 5 + mock/eol/templates/anolis-7.tpl | 51 + mock/eol/templates/centos-6.tpl | 90 + mock/eol/templates/centos-7.tpl | 97 + mock/eol/templates/centos-8.tpl | 124 + mock/eol/templates/epel-6.tpl | 34 + mock/eol/templates/epel-7.tpl | 32 + mock/eol/templates/epelplayground-8.tpl | 29 + mock/eol/templates/fedora-29.tpl | 160 + mock/eol/templates/fedora-30.tpl | 168 + mock/eol/templates/mageia-6.tpl | 72 + mock/eol/templates/mageia-7.tpl | 74 + mock/eol/templates/openmandriva-4.0.tpl | 71 + mock/eol/templates/opensuse-leap-15.3.tpl | 84 + mock/eol/templates/opensuse-leap-15.4.tpl | 84 + mock/eol/templates/rhel-6.tpl | 70 + mock/epel-10-aarch64.cfg | 1 + mock/epel-10-ppc64le.cfg | 1 + mock/epel-10-s390x.cfg | 1 + mock/epel-10-x86_64.cfg | 1 + mock/eurolinux-8-aarch64.cfg | 5 + mock/eurolinux-8-i686.cfg | 5 + mock/eurolinux-8-x86_64.cfg | 5 + mock/eurolinux-9-aarch64.cfg | 5 + mock/eurolinux-9-i686.cfg | 5 + mock/eurolinux-9-x86_64.cfg | 5 + mock/fedora-40-aarch64.cfg | 5 + mock/fedora-40-i386.cfg | 5 + mock/fedora-40-ppc64le.cfg | 5 + mock/fedora-40-s390x.cfg | 5 + mock/fedora-40-x86_64.cfg | 5 + mock/fedora-41-aarch64.cfg | 5 + mock/fedora-41-i386.cfg | 5 + mock/fedora-41-ppc64le.cfg | 5 + mock/fedora-41-s390x.cfg | 5 + mock/fedora-41-x86_64.cfg | 5 + mock/fedora-42-aarch64.cfg | 1 + mock/fedora-42-i386.cfg | 1 + mock/fedora-42-ppc64le.cfg | 1 + mock/fedora-42-s390x.cfg | 1 + mock/fedora-42-x86_64.cfg | 1 + mock/fedora-eln-aarch64.cfg | 5 + mock/fedora-eln-ppc64le.cfg | 5 + mock/fedora-eln-s390x.cfg | 5 + mock/fedora-eln-x86_64.cfg | 5 + mock/fedora-rawhide-aarch64.cfg | 4 + mock/fedora-rawhide-i386.cfg | 4 + mock/fedora-rawhide-ppc64le.cfg | 4 + mock/fedora-rawhide-s390x.cfg | 4 + mock/fedora-rawhide-x86_64.cfg | 4 + mock/hermetic-build.cfg | 38 + mock/logging.ini | 84 + mock/mageia-10-aarch64.cfg | 1 + mock/mageia-10-armv7hl.cfg | 1 + mock/mageia-10-i686.cfg | 1 + mock/mageia-10-x86_64.cfg | 1 + mock/mageia-8-aarch64.cfg | 5 + mock/mageia-8-armv7hl.cfg | 5 + mock/mageia-8-i586.cfg | 5 + mock/mageia-8-x86_64.cfg | 5 + mock/mageia-9-aarch64.cfg | 5 + mock/mageia-9-armv7hl.cfg | 5 + mock/mageia-9-i586.cfg | 5 + mock/mageia-9-x86_64.cfg | 5 + mock/mageia-cauldron-aarch64.cfg | 4 + mock/mageia-cauldron-armv7hl.cfg | 4 + mock/mageia-cauldron-i686.cfg | 4 + mock/mageia-cauldron-x86_64.cfg | 4 + mock/navy-8-x86_64.cfg | 4 + mock/openeuler-20.03-aarch64.cfg | 5 + mock/openeuler-20.03-x86_64.cfg | 5 + mock/openeuler-22.03-aarch64.cfg | 5 + mock/openeuler-22.03-x86_64.cfg | 5 + mock/openeuler-24.03-aarch64.cfg | 5 + mock/openeuler-24.03-x86_64.cfg | 5 + mock/openmandriva-4.1-aarch64.cfg | 5 + mock/openmandriva-4.1-armv7hnl.cfg | 5 + mock/openmandriva-4.1-x86_64.cfg | 5 + mock/openmandriva-cooker-aarch64.cfg | 5 + mock/openmandriva-cooker-armv7hnl.cfg | 5 + mock/openmandriva-cooker-x86_64.cfg | 5 + mock/openmandriva-rolling-aarch64.cfg | 5 + mock/openmandriva-rolling-armv7hnl.cfg | 5 + mock/openmandriva-rolling-x86_64.cfg | 5 + mock/opensuse-leap-15.5-aarch64.cfg | 5 + mock/opensuse-leap-15.5-ppc64le.cfg | 5 + mock/opensuse-leap-15.5-s390x.cfg | 5 + mock/opensuse-leap-15.5-x86_64.cfg | 5 + mock/opensuse-tumbleweed-aarch64.cfg | 5 + mock/opensuse-tumbleweed-i586.cfg | 5 + mock/opensuse-tumbleweed-ppc64.cfg | 5 + mock/opensuse-tumbleweed-ppc64le.cfg | 5 + mock/opensuse-tumbleweed-s390x.cfg | 5 + mock/opensuse-tumbleweed-x86_64.cfg | 5 + mock/oraclelinux+epel-8-aarch64.cfg | 7 + mock/oraclelinux+epel-8-x86_64.cfg | 7 + mock/oraclelinux+epel-9-aarch64.cfg | 7 + mock/oraclelinux+epel-9-x86_64.cfg | 7 + mock/oraclelinux-7-aarch64.cfg | 5 + mock/oraclelinux-7-x86_64.cfg | 5 + mock/oraclelinux-8-aarch64.cfg | 5 + mock/oraclelinux-8-x86_64.cfg | 5 + mock/oraclelinux-9-aarch64.cfg | 5 + mock/oraclelinux-9-x86_64.cfg | 5 + mock/rhel+epel-8-aarch64.cfg | 5 + mock/rhel+epel-8-ppc64le.cfg | 5 + mock/rhel+epel-8-s390x.cfg | 5 + mock/rhel+epel-8-x86_64.cfg | 5 + mock/rhel+epel-9-aarch64.cfg | 5 + mock/rhel+epel-9-ppc64le.cfg | 5 + mock/rhel+epel-9-s390x.cfg | 5 + mock/rhel+epel-9-x86_64.cfg | 5 + mock/rhel-7-aarch64.cfg | 6 + mock/rhel-7-ppc64.cfg | 6 + mock/rhel-7-ppc64le.cfg | 8 + mock/rhel-7-s390x.cfg | 6 + mock/rhel-7-x86_64.cfg | 6 + mock/rhel-8-aarch64.cfg | 4 + mock/rhel-8-ppc64le.cfg | 6 + mock/rhel-8-s390x.cfg | 4 + mock/rhel-8-x86_64.cfg | 4 + mock/rhel-9-aarch64.cfg | 4 + mock/rhel-9-ppc64le.cfg | 6 + mock/rhel-9-s390x.cfg | 4 + mock/rhel-9-x86_64.cfg | 4 + mock/rocky+epel-8-aarch64.cfg | 7 + mock/rocky+epel-8-x86_64.cfg | 7 + mock/rocky+epel-9-aarch64.cfg | 5 + mock/rocky+epel-9-ppc64le.cfg | 5 + mock/rocky+epel-9-s390x.cfg | 5 + mock/rocky+epel-9-x86_64.cfg | 5 + mock/rocky-8-aarch64.cfg | 5 + mock/rocky-8-x86_64.cfg | 5 + mock/rocky-9-aarch64.cfg | 6 + mock/rocky-9-ppc64le.cfg | 6 + mock/rocky-9-s390x.cfg | 6 + mock/rocky-9-x86_64.cfg | 6 + mock/site-defaults.cfg | 11 + mock/templates/almalinux-8.tpl | 151 + mock/templates/almalinux-9.tpl | 151 + mock/templates/amazonlinux-2.tpl | 27 + mock/templates/amazonlinux-2023.tpl | 52 + mock/templates/anolis-8.tpl | 49 + mock/templates/centos-stream-10.tpl | 125 + mock/templates/centos-stream-8.tpl | 158 + mock/templates/centos-stream-9.tpl | 108 + mock/templates/circlelinux-8.tpl | 152 + mock/templates/circlelinux-9.tpl | 251 + mock/templates/custom-1.tpl | 28 + mock/templates/epel-10.tpl | 40 + mock/templates/epel-8.tpl | 84 + mock/templates/epel-9.tpl | 60 + mock/templates/epel-next-8.tpl | 57 + mock/templates/epel-next-9.tpl | 57 + mock/templates/eurolinux-8.tpl | 68 + mock/templates/eurolinux-9.tpl | 67 + mock/templates/fedora-branched.tpl | 110 + mock/templates/fedora-eln.tpl | 392 + mock/templates/fedora-rawhide.tpl | 87 + mock/templates/mageia-branched.tpl | 74 + mock/templates/mageia-cauldron.tpl | 53 + mock/templates/navy-8.tpl | 86 + mock/templates/openeuler-20.03.tpl | 70 + mock/templates/openeuler-22.03.tpl | 80 + mock/templates/openeuler-24.03.tpl | 80 + mock/templates/openmandriva-branched.tpl | 74 + mock/templates/openmandriva-cooker.tpl | 52 + mock/templates/openmandriva-rolling.tpl | 54 + mock/templates/opensuse-leap-15.5.tpl | 85 + mock/templates/opensuse-tumbleweed.tpl | 69 + mock/templates/oraclelinux-7.tpl | 66 + mock/templates/oraclelinux-8.tpl | 68 + mock/templates/oraclelinux-9.tpl | 68 + mock/templates/oraclelinux-epel-8.tpl | 14 + mock/templates/oraclelinux-epel-9.tpl | 14 + mock/templates/rhel-7.tpl | 75 + mock/templates/rhel-8.tpl | 66 + mock/templates/rhel-9.tpl | 66 + mock/templates/rocky-8.tpl | 193 + mock/templates/rocky-9.tpl | 255 + modprobe.d/firewalld-sysctls.conf | 1 + modprobe.d/lockd.conf | 23 + motd.d/10-banner | 6 + netconfig | 19 + networks | 3 + nfs.conf | 101 + nfsmount.conf | 144 + nftables/main.nft | 64 + nftables/nat.nft | 38 + nftables/osf/pf.os | 703 + nftables/router.nft | 16 + nsswitch.conf | 70 + openldap/ldap.conf | 28 + os-release | 1 + pam.d/config-util | 8 + pam.d/crond | 11 + pam.d/fingerprint-auth | 19 + pam.d/login | 16 + pam.d/mock | 13 + pam.d/other | 5 + pam.d/passwd | 5 + pam.d/password-auth | 18 + pam.d/postgresql | 3 + pam.d/postlogin | 8 + pam.d/remote | 15 + pam.d/runuser | 5 + pam.d/runuser-l | 5 + pam.d/screen | 2 + pam.d/smartcard-auth | 19 + pam.d/sshd | 17 + pam.d/sssd-shadowutils | 6 + pam.d/su | 15 + pam.d/su-l | 6 + pam.d/sudo | 5 + pam.d/sudo-i | 6 + pam.d/system-auth | 18 + pam.d/systemd-user | 14 + pam.d/vlock | 3 + passwd | 27 + passwd- | 26 + pki/ca-trust/README | 4 + pki/ca-trust/ca-legacy.conf | 24 + pki/ca-trust/extracted/README | 12 + pki/ca-trust/extracted/edk2/README | 13 + pki/ca-trust/extracted/edk2/cacerts.bin | Bin 0 -> 164317 bytes pki/ca-trust/extracted/java/README | 17 + pki/ca-trust/extracted/java/cacerts | Bin 0 -> 164985 bytes pki/ca-trust/extracted/openssl/README | 18 + .../extracted/openssl/ca-bundle.trust.crt | 11094 +++++++++++++++ pki/ca-trust/extracted/pem/README | 21 + .../extracted/pem/directory-hash/002c0b4f.0 | 1 + .../extracted/pem/directory-hash/01419da9.0 | 1 + .../extracted/pem/directory-hash/0179095f.0 | 1 + .../extracted/pem/directory-hash/02265526.0 | 1 + .../extracted/pem/directory-hash/04f60c28.0 | 1 + .../extracted/pem/directory-hash/062cdee6.0 | 1 + .../extracted/pem/directory-hash/064e0aa9.0 | 1 + .../extracted/pem/directory-hash/068570d1.0 | 1 + .../extracted/pem/directory-hash/06dc52d5.0 | 1 + .../extracted/pem/directory-hash/073bfcc5.0 | 1 + .../extracted/pem/directory-hash/08063a00.0 | 1 + .../extracted/pem/directory-hash/09789157.0 | 1 + .../extracted/pem/directory-hash/0a775a30.0 | 1 + .../extracted/pem/directory-hash/0b1b94ef.0 | 1 + .../extracted/pem/directory-hash/0b9bc432.0 | 1 + .../extracted/pem/directory-hash/0bf05006.0 | 1 + .../extracted/pem/directory-hash/0d69c7e1.0 | 1 + .../extracted/pem/directory-hash/0f5dc4f3.0 | 1 + .../extracted/pem/directory-hash/0f6fa695.0 | 1 + .../extracted/pem/directory-hash/1001acf7.0 | 1 + .../extracted/pem/directory-hash/10531352.0 | 1 + .../extracted/pem/directory-hash/106f3e4d.0 | 1 + .../extracted/pem/directory-hash/128f4b91.0 | 1 + .../extracted/pem/directory-hash/14bc7599.0 | 1 + .../extracted/pem/directory-hash/18856ac4.0 | 1 + .../extracted/pem/directory-hash/1ae85e5e.0 | 1 + .../extracted/pem/directory-hash/1b0f7e5c.0 | 1 + .../extracted/pem/directory-hash/1cef98f5.0 | 1 + .../extracted/pem/directory-hash/1d3472b9.0 | 1 + .../extracted/pem/directory-hash/1df5a75f.0 | 1 + .../extracted/pem/directory-hash/1e08bfd1.0 | 1 + .../extracted/pem/directory-hash/1e09d511.0 | 1 + .../extracted/pem/directory-hash/1e1eab7c.0 | 1 + .../extracted/pem/directory-hash/1e8e7201.0 | 1 + .../extracted/pem/directory-hash/1ec40989.0 | 1 + .../extracted/pem/directory-hash/1f58a078.0 | 1 + .../extracted/pem/directory-hash/219d9499.0 | 1 + .../extracted/pem/directory-hash/228f89db.0 | 1 + .../extracted/pem/directory-hash/23f4c490.0 | 1 + .../extracted/pem/directory-hash/244b5494.0 | 1 + .../extracted/pem/directory-hash/252252d2.0 | 1 + .../extracted/pem/directory-hash/2923b3f9.0 | 1 + .../extracted/pem/directory-hash/2add47b6.0 | 1 + .../extracted/pem/directory-hash/2ae6433e.0 | 1 + .../extracted/pem/directory-hash/2b349938.0 | 1 + .../extracted/pem/directory-hash/2c63f966.0 | 1 + .../extracted/pem/directory-hash/2d21b73c.0 | 1 + .../extracted/pem/directory-hash/2d9dafe4.0 | 1 + .../extracted/pem/directory-hash/302904dd.0 | 1 + .../extracted/pem/directory-hash/304d27c3.0 | 1 + .../extracted/pem/directory-hash/31188b5e.0 | 1 + .../extracted/pem/directory-hash/32888f65.0 | 1 + .../extracted/pem/directory-hash/33ee480d.0 | 1 + .../extracted/pem/directory-hash/34d996fb.0 | 1 + .../extracted/pem/directory-hash/35105088.0 | 1 + .../extracted/pem/directory-hash/3513523f.0 | 1 + .../extracted/pem/directory-hash/399e7759.0 | 1 + .../extracted/pem/directory-hash/3ad48a91.0 | 1 + .../extracted/pem/directory-hash/3afde786.0 | 1 + .../extracted/pem/directory-hash/3bde41ac.0 | 1 + .../extracted/pem/directory-hash/3c860d51.0 | 1 + .../extracted/pem/directory-hash/3c899c73.0 | 1 + .../extracted/pem/directory-hash/3c9a4d3b.0 | 1 + .../extracted/pem/directory-hash/3e359ba6.0 | 1 + .../extracted/pem/directory-hash/3e7271e8.0 | 1 + .../extracted/pem/directory-hash/3fb36b73.0 | 1 + .../extracted/pem/directory-hash/40193066.0 | 1 + .../extracted/pem/directory-hash/4042bcee.0 | 1 + .../extracted/pem/directory-hash/40547a79.0 | 1 + .../extracted/pem/directory-hash/406c9bb1.0 | 1 + .../extracted/pem/directory-hash/41a3f684.0 | 1 + .../extracted/pem/directory-hash/455f1b52.0 | 1 + .../extracted/pem/directory-hash/48a195d8.0 | 1 + .../extracted/pem/directory-hash/48bec511.0 | 1 + .../extracted/pem/directory-hash/4b718d9b.0 | 1 + .../extracted/pem/directory-hash/4be590e0.0 | 1 + .../extracted/pem/directory-hash/4bfab552.0 | 1 + .../extracted/pem/directory-hash/4c3982f2.0 | 1 + .../extracted/pem/directory-hash/4f316efb.0 | 1 + .../extracted/pem/directory-hash/4fd49c6c.0 | 1 + .../extracted/pem/directory-hash/5046c355.0 | 1 + .../extracted/pem/directory-hash/52b525c7.0 | 1 + .../extracted/pem/directory-hash/53a1b57a.0 | 1 + .../extracted/pem/directory-hash/5443e9e3.0 | 1 + .../extracted/pem/directory-hash/54657681.0 | 1 + .../extracted/pem/directory-hash/57bcb2da.0 | 1 + .../extracted/pem/directory-hash/583d0756.0 | 1 + .../extracted/pem/directory-hash/5860aaa6.0 | 1 + .../extracted/pem/directory-hash/5931b5bc.0 | 1 + .../extracted/pem/directory-hash/595e996b.0 | 1 + .../extracted/pem/directory-hash/5a3f0ff8.0 | 1 + .../extracted/pem/directory-hash/5acf816d.0 | 1 + .../extracted/pem/directory-hash/5ad8a5d6.0 | 1 + .../extracted/pem/directory-hash/5cd81ad7.0 | 1 + .../extracted/pem/directory-hash/5e98733a.0 | 1 + .../extracted/pem/directory-hash/5f15c80c.0 | 1 + .../extracted/pem/directory-hash/5f47b495.0 | 1 + .../extracted/pem/directory-hash/5f618aec.0 | 1 + .../extracted/pem/directory-hash/5f9a69fa.0 | 1 + .../extracted/pem/directory-hash/5fdd185d.0 | 1 + .../extracted/pem/directory-hash/607986c7.0 | 1 + .../extracted/pem/directory-hash/60afe812.0 | 1 + .../extracted/pem/directory-hash/6187b673.0 | 1 + .../extracted/pem/directory-hash/626dceaf.0 | 1 + .../extracted/pem/directory-hash/63a2c897.0 | 1 + .../extracted/pem/directory-hash/653b494a.0 | 1 + .../extracted/pem/directory-hash/68dd7389.0 | 1 + .../extracted/pem/directory-hash/69105f4f.0 | 1 + .../extracted/pem/directory-hash/6b03dec0.0 | 1 + .../extracted/pem/directory-hash/6b483515.0 | 1 + .../extracted/pem/directory-hash/6b99d060.0 | 1 + .../extracted/pem/directory-hash/6d41d539.0 | 1 + .../extracted/pem/directory-hash/6f7454b3.0 | 1 + .../extracted/pem/directory-hash/6fa5da56.0 | 1 + .../extracted/pem/directory-hash/706f604c.0 | 1 + .../extracted/pem/directory-hash/749e9e03.0 | 1 + .../extracted/pem/directory-hash/75680d2e.0 | 1 + .../extracted/pem/directory-hash/75d1b2ed.0 | 1 + .../extracted/pem/directory-hash/76579174.0 | 1 + .../extracted/pem/directory-hash/76faf6c0.0 | 1 + .../extracted/pem/directory-hash/7719f463.0 | 1 + .../extracted/pem/directory-hash/773e07ad.0 | 1 + .../extracted/pem/directory-hash/7892ad52.0 | 1 + .../extracted/pem/directory-hash/7a3adc42.0 | 1 + .../extracted/pem/directory-hash/7a780d93.0 | 1 + .../extracted/pem/directory-hash/7a7c655d.0 | 1 + .../extracted/pem/directory-hash/7a819ef2.0 | 1 + .../extracted/pem/directory-hash/7e067d03.0 | 1 + .../extracted/pem/directory-hash/7f3d5d1d.0 | 1 + .../extracted/pem/directory-hash/7fa05551.0 | 1 + .../extracted/pem/directory-hash/8160b96c.0 | 1 + .../extracted/pem/directory-hash/81b9768f.0 | 1 + .../extracted/pem/directory-hash/81f2d2b1.0 | 1 + .../extracted/pem/directory-hash/82223c44.0 | 1 + .../extracted/pem/directory-hash/8312c4c1.0 | 1 + .../extracted/pem/directory-hash/83e9984f.0 | 1 + .../extracted/pem/directory-hash/8508e720.0 | 1 + .../extracted/pem/directory-hash/85cde254.0 | 1 + .../extracted/pem/directory-hash/86212b19.0 | 1 + .../extracted/pem/directory-hash/865fbdf9.0 | 1 + .../extracted/pem/directory-hash/869fbf79.0 | 1 + .../extracted/pem/directory-hash/8794b4e3.0 | 1 + .../extracted/pem/directory-hash/882de061.0 | 1 + .../extracted/pem/directory-hash/88950faa.0 | 1 + .../extracted/pem/directory-hash/89c02a45.0 | 1 + .../extracted/pem/directory-hash/8cb5ee0f.0 | 1 + .../extracted/pem/directory-hash/8d10a21f.0 | 1 + .../extracted/pem/directory-hash/8d6437c3.0 | 1 + .../extracted/pem/directory-hash/8d86cdd1.0 | 1 + .../extracted/pem/directory-hash/8d89cda1.0 | 1 + .../extracted/pem/directory-hash/8f103249.0 | 1 + .../extracted/pem/directory-hash/9046744a.0 | 1 + .../extracted/pem/directory-hash/90c5a3c8.0 | 1 + .../extracted/pem/directory-hash/9282e51c.0 | 1 + .../extracted/pem/directory-hash/930ac5d2.0 | 1 + .../extracted/pem/directory-hash/9339512a.0 | 1 + .../extracted/pem/directory-hash/93851c9e.0 | 1 + .../extracted/pem/directory-hash/93bc0acc.0 | 1 + .../extracted/pem/directory-hash/9479c8c3.0 | 1 + .../extracted/pem/directory-hash/9482e63a.0 | 1 + .../extracted/pem/directory-hash/9576d26b.0 | 1 + .../extracted/pem/directory-hash/9591a472.0 | 1 + .../extracted/pem/directory-hash/95aff9e3.0 | 1 + .../extracted/pem/directory-hash/9846683b.0 | 1 + .../extracted/pem/directory-hash/985c1f52.0 | 1 + .../extracted/pem/directory-hash/988a38cb.0 | 1 + .../extracted/pem/directory-hash/98aaf404.0 | 1 + .../extracted/pem/directory-hash/99e1b953.0 | 1 + .../extracted/pem/directory-hash/9aef356c.0 | 1 + .../extracted/pem/directory-hash/9b46e03d.0 | 1 + .../extracted/pem/directory-hash/9b5697b0.0 | 1 + .../extracted/pem/directory-hash/9bf03295.0 | 1 + .../extracted/pem/directory-hash/9c8dfbd4.0 | 1 + .../extracted/pem/directory-hash/9d04f354.0 | 1 + .../extracted/pem/directory-hash/9d6523ce.0 | 1 + .../extracted/pem/directory-hash/9ef4a08a.0 | 1 + .../extracted/pem/directory-hash/9f727ac7.0 | 1 + .../pem/directory-hash/ACCVRAIZ1.pem | 44 + .../pem/directory-hash/AC_RAIZ_FNMT-RCM.pem | 32 + .../AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem | 16 + .../ANF_Secure_Server_Root_CA.pem | 34 + .../Actalis_Authentication_Root_CA.pem | 33 + .../directory-hash/AffirmTrust_Commercial.pem | 20 + .../directory-hash/AffirmTrust_Networking.pem | 20 + .../directory-hash/AffirmTrust_Premium.pem | 31 + .../AffirmTrust_Premium_ECC.pem | 13 + .../pem/directory-hash/Amazon_Root_CA_1.pem | 20 + .../pem/directory-hash/Amazon_Root_CA_2.pem | 31 + .../pem/directory-hash/Amazon_Root_CA_3.pem | 12 + .../pem/directory-hash/Amazon_Root_CA_4.pem | 13 + .../directory-hash/Atos_TrustedRoot_2011.pem | 21 + .../Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem | 14 + .../Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem | 31 + ...icacion_Firmaprofesional_CIF_A62634068.pem | 35 + .../directory-hash/BJCA_Global_Root_CA1.pem | 32 + .../directory-hash/BJCA_Global_Root_CA2.pem | 14 + .../Baltimore_CyberTrust_Root.pem | 21 + .../Buypass_Class_2_Root_CA.pem | 31 + .../Buypass_Class_3_Root_CA.pem | 31 + .../pem/directory-hash/CA_Disig_Root_R2.pem | 31 + .../pem/directory-hash/CFCA_EV_ROOT.pem | 32 + .../COMODO_Certification_Authority.pem | 25 + .../COMODO_ECC_Certification_Authority.pem | 16 + .../COMODO_RSA_Certification_Authority.pem | 34 + .../pem/directory-hash/Certainly_Root_E1.pem | 13 + .../pem/directory-hash/Certainly_Root_R1.pem | 31 + .../extracted/pem/directory-hash/Certigna.pem | 22 + .../pem/directory-hash/Certigna_Root_CA.pem | 36 + .../pem/directory-hash/Certum_EC-384_CA.pem | 15 + .../Certum_Trusted_Network_CA.pem | 22 + .../Certum_Trusted_Network_CA_2.pem | 34 + .../directory-hash/Certum_Trusted_Root_CA.pem | 33 + .../CommScope_Public_Trust_ECC_Root-01.pem | 14 + .../CommScope_Public_Trust_ECC_Root-02.pem | 14 + .../CommScope_Public_Trust_RSA_Root-01.pem | 31 + .../CommScope_Public_Trust_RSA_Root-02.pem | 31 + .../Comodo_AAA_Services_root.pem | 25 + .../D-TRUST_BR_Root_CA_1_2020.pem | 18 + .../D-TRUST_EV_Root_CA_1_2020.pem | 18 + .../D-TRUST_Root_Class_3_CA_2_2009.pem | 25 + .../D-TRUST_Root_Class_3_CA_2_EV_2009.pem | 25 + .../DigiCert_Assured_ID_Root_CA.pem | 22 + .../DigiCert_Assured_ID_Root_G2.pem | 22 + .../DigiCert_Assured_ID_Root_G3.pem | 15 + .../DigiCert_Global_Root_CA.pem | 22 + .../DigiCert_Global_Root_G2.pem | 22 + .../DigiCert_Global_Root_G3.pem | 15 + .../DigiCert_High_Assurance_EV_Root_CA.pem | 23 + .../DigiCert_TLS_ECC_P384_Root_G5.pem | 14 + .../DigiCert_TLS_RSA4096_Root_G5.pem | 31 + .../DigiCert_Trusted_Root_G4.pem | 32 + ...rust.net_Premium_2048_Secure_Server_CA.pem | 25 + .../Entrust_Root_Certification_Authority.pem | 27 + ...ust_Root_Certification_Authority_-_EC1.pem | 18 + ...rust_Root_Certification_Authority_-_G2.pem | 25 + ...rust_Root_Certification_Authority_-_G4.pem | 36 + .../FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem | 16 + .../directory-hash/GDCA_TrustAUTH_R5_ROOT.pem | 32 + .../pem/directory-hash/GLOBALTRUST_2020.pem | 32 + .../pem/directory-hash/GTS_Root_R1.pem | 31 + .../pem/directory-hash/GTS_Root_R2.pem | 31 + .../pem/directory-hash/GTS_Root_R3.pem | 13 + .../pem/directory-hash/GTS_Root_R4.pem | 13 + .../GlobalSign_ECC_Root_CA_-_R4.pem | 12 + .../GlobalSign_ECC_Root_CA_-_R5.pem | 14 + .../pem/directory-hash/GlobalSign_Root_CA.pem | 21 + .../GlobalSign_Root_CA_-_R3.pem | 21 + .../GlobalSign_Root_CA_-_R6.pem | 32 + .../directory-hash/GlobalSign_Root_E46.pem | 13 + .../directory-hash/GlobalSign_Root_R46.pem | 31 + .../directory-hash/Go_Daddy_Class_2_CA.pem | 24 + ..._Daddy_Root_Certificate_Authority_-_G2.pem | 23 + .../HARICA_TLS_ECC_Root_CA_2021.pem | 15 + .../HARICA_TLS_RSA_Root_CA_2021.pem | 33 + ..._Research_Institutions_ECC_RootCA_2015.pem | 17 + ..._and_Research_Institutions_RootCA_2015.pem | 35 + .../pem/directory-hash/HiPKI_Root_CA_-_G1.pem | 31 + .../Hongkong_Post_Root_CA_3.pem | 34 + .../pem/directory-hash/ISRG_Root_X1.pem | 31 + .../pem/directory-hash/ISRG_Root_X2.pem | 14 + .../IdenTrust_Commercial_Root_CA_1.pem | 31 + .../IdenTrust_Public_Sector_Root_CA_1.pem | 31 + .../pem/directory-hash/Izenpe.com.pem | 34 + .../Microsec_e-Szigno_Root_CA_2009.pem | 24 + ...ft_ECC_Root_Certificate_Authority_2017.pem | 15 + ...ft_RSA_Root_Certificate_Authority_2017.pem | 33 + ...ER_Global_Root_Certification_Authority.pem | 33 + ...k_Arany__Class_Gold__F__tan__s__tv__ny.pem | 24 + .../OISTE_WISeKey_Global_Root_GB_CA.pem | 22 + .../OISTE_WISeKey_Global_Root_GC_CA.pem | 15 + .../directory-hash/QuoVadis_Root_CA_1_G3.pem | 31 + .../pem/directory-hash/QuoVadis_Root_CA_2.pem | 33 + .../directory-hash/QuoVadis_Root_CA_2_G3.pem | 31 + .../pem/directory-hash/QuoVadis_Root_CA_3.pem | 38 + .../directory-hash/QuoVadis_Root_CA_3_G3.pem | 31 + ...om_EV_Root_Certification_Authority_ECC.pem | 16 + ...EV_Root_Certification_Authority_RSA_R2.pem | 34 + ...L.com_Root_Certification_Authority_ECC.pem | 16 + ...L.com_Root_Certification_Authority_RSA.pem | 34 + .../SSL.com_TLS_ECC_Root_CA_2022.pem | 14 + .../SSL.com_TLS_RSA_Root_CA_2022.pem | 32 + .../pem/directory-hash/SZAFIR_ROOT_CA2.pem | 21 + ..._Public_Server_Authentication_Root_E46.pem | 14 + ..._Public_Server_Authentication_Root_R46.pem | 32 + .../directory-hash/SecureSign_RootCA11.pem | 21 + .../pem/directory-hash/SecureTrust_CA.pem | 22 + .../pem/directory-hash/Secure_Global_CA.pem | 22 + .../Security_Communication_ECC_RootCA1.pem | 14 + .../Security_Communication_RootCA2.pem | 21 + .../Security_Communication_RootCA3.pem | 32 + .../directory-hash/Starfield_Class_2_CA.pem | 24 + ...rfield_Root_Certificate_Authority_-_G2.pem | 23 + ...rvices_Root_Certificate_Authority_-_G2.pem | 24 + .../directory-hash/SwissSign_Gold_CA_-_G2.pem | 33 + .../SwissSign_Silver_CA_-_G2.pem | 33 + .../T-TeleSec_GlobalRoot_Class_2.pem | 23 + .../T-TeleSec_GlobalRoot_Class_3.pem | 23 + ..._Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem | 26 + .../directory-hash/TWCA_Global_Root_CA.pem | 31 + .../TWCA_Root_Certification_Authority.pem | 21 + .../Telekom_Security_TLS_ECC_Root_2020.pem | 15 + .../Telekom_Security_TLS_RSA_Root_2023.pem | 33 + .../directory-hash/TeliaSonera_Root_CA_v1.pem | 30 + .../pem/directory-hash/Telia_Root_CA_v2.pem | 32 + .../TrustAsia_Global_Root_CA_G3.pem | 33 + .../TrustAsia_Global_Root_CA_G4.pem | 15 + ...ustwave_Global_Certification_Authority.pem | 34 + ...lobal_ECC_P256_Certification_Authority.pem | 15 + ...lobal_ECC_P384_Certification_Authority.pem | 17 + .../pem/directory-hash/TunTrust_Root_CA.pem | 33 + .../UCA_Extended_Validation_Root.pem | 31 + .../pem/directory-hash/UCA_Global_G2_Root.pem | 31 + .../USERTrust_ECC_Certification_Authority.pem | 16 + .../USERTrust_RSA_Certification_Authority.pem | 34 + .../directory-hash/XRamp_Global_CA_Root.pem | 25 + .../extracted/pem/directory-hash/a2c66da8.0 | 1 + .../extracted/pem/directory-hash/a3418fda.0 | 1 + .../extracted/pem/directory-hash/a716d4ed.0 | 1 + .../extracted/pem/directory-hash/a81e292b.0 | 1 + .../extracted/pem/directory-hash/a89d74c2.0 | 1 + .../extracted/pem/directory-hash/a94d09e5.0 | 1 + .../extracted/pem/directory-hash/a9d40e02.0 | 1 + .../extracted/pem/directory-hash/ab5346f4.0 | 1 + .../extracted/pem/directory-hash/ab59055e.0 | 1 + .../extracted/pem/directory-hash/aee5f10d.0 | 1 + .../extracted/pem/directory-hash/b0e59380.0 | 1 + .../extracted/pem/directory-hash/b0ed035a.0 | 1 + .../extracted/pem/directory-hash/b0f3e76e.0 | 1 + .../extracted/pem/directory-hash/b1159c4c.0 | 1 + .../extracted/pem/directory-hash/b30d5fda.0 | 1 + .../extracted/pem/directory-hash/b3fb433b.0 | 1 + .../extracted/pem/directory-hash/b433981b.0 | 1 + .../extracted/pem/directory-hash/b66938e9.0 | 1 + .../extracted/pem/directory-hash/b727005e.0 | 1 + .../extracted/pem/directory-hash/b74d2bd5.0 | 1 + .../extracted/pem/directory-hash/b7a5b843.0 | 1 + .../extracted/pem/directory-hash/b7db1890.0 | 1 + .../extracted/pem/directory-hash/b81b93f0.0 | 1 + .../extracted/pem/directory-hash/b872f2b4.0 | 1 + .../extracted/pem/directory-hash/b92fd57f.0 | 1 + .../extracted/pem/directory-hash/b936d1c6.0 | 1 + .../extracted/pem/directory-hash/ba8887ce.0 | 1 + .../extracted/pem/directory-hash/bc3f2570.0 | 1 + .../extracted/pem/directory-hash/bd43e1dd.0 | 1 + .../extracted/pem/directory-hash/bdacca6f.0 | 1 + .../extracted/pem/directory-hash/bf53fb88.0 | 1 + .../extracted/pem/directory-hash/bf64f35b.0 | 1 + .../extracted/pem/directory-hash/c01eb047.0 | 1 + .../extracted/pem/directory-hash/c28a8a30.0 | 1 + .../extracted/pem/directory-hash/c44cc0c0.0 | 1 + .../extracted/pem/directory-hash/c491639e.0 | 1 + .../extracted/pem/directory-hash/c559d742.0 | 1 + .../extracted/pem/directory-hash/c7f1359b.0 | 1 + .../extracted/pem/directory-hash/c90bc37d.0 | 1 + .../pem/directory-hash/ca-bundle.crt | 1 + .../pem/directory-hash/ca-certificates.crt | 1 + .../extracted/pem/directory-hash/ca6e4ad9.0 | 1 + .../extracted/pem/directory-hash/cb1c3204.0 | 1 + .../extracted/pem/directory-hash/cbb3f32b.0 | 1 + .../extracted/pem/directory-hash/cbf06781.0 | 1 + .../extracted/pem/directory-hash/cc450945.0 | 1 + .../extracted/pem/directory-hash/ccc52f49.0 | 1 + .../extracted/pem/directory-hash/cd58d51e.0 | 1 + .../extracted/pem/directory-hash/cd8c0d63.0 | 1 + .../extracted/pem/directory-hash/ce5e74ef.0 | 1 + .../pem/directory-hash/certSIGN_ROOT_CA.pem | 20 + .../directory-hash/certSIGN_Root_CA_G2.pem | 31 + .../extracted/pem/directory-hash/cf701eeb.0 | 1 + .../extracted/pem/directory-hash/d06393bb.0 | 1 + .../extracted/pem/directory-hash/d16a5865.0 | 1 + .../extracted/pem/directory-hash/d18e9066.0 | 1 + .../extracted/pem/directory-hash/d39b0a2c.0 | 1 + .../extracted/pem/directory-hash/d41b5e2a.0 | 1 + .../extracted/pem/directory-hash/d4c339cb.0 | 1 + .../extracted/pem/directory-hash/d4dae3dd.0 | 1 + .../extracted/pem/directory-hash/d52c538d.0 | 1 + .../extracted/pem/directory-hash/d59297b8.0 | 1 + .../extracted/pem/directory-hash/d6325660.0 | 1 + .../extracted/pem/directory-hash/d7746a63.0 | 1 + .../extracted/pem/directory-hash/d7e8dc79.0 | 1 + .../extracted/pem/directory-hash/d887a5bb.0 | 1 + .../extracted/pem/directory-hash/d96b65e2.0 | 1 + .../extracted/pem/directory-hash/da0cfd1d.0 | 1 + .../extracted/pem/directory-hash/da7377f6.0 | 1 + .../extracted/pem/directory-hash/dbc54cab.0 | 1 + .../extracted/pem/directory-hash/dbff3a01.0 | 1 + .../extracted/pem/directory-hash/dc4d6a89.0 | 1 + .../extracted/pem/directory-hash/dc99f41e.0 | 1 + .../extracted/pem/directory-hash/dd8e9d41.0 | 1 + .../extracted/pem/directory-hash/ddcda989.0 | 1 + .../extracted/pem/directory-hash/de6d66f3.0 | 1 + .../extracted/pem/directory-hash/dfc0fe80.0 | 1 + .../directory-hash/e-Szigno_Root_CA_2017.pem | 15 + .../extracted/pem/directory-hash/e071171e.0 | 1 + .../extracted/pem/directory-hash/e113c810.0 | 1 + .../extracted/pem/directory-hash/e13665f9.0 | 1 + .../extracted/pem/directory-hash/e18bfb83.0 | 1 + .../extracted/pem/directory-hash/e35234b1.0 | 1 + .../extracted/pem/directory-hash/e36a6752.0 | 1 + .../extracted/pem/directory-hash/e442e424.0 | 1 + .../extracted/pem/directory-hash/e48193cf.0 | 1 + .../extracted/pem/directory-hash/e73d606e.0 | 1 + .../extracted/pem/directory-hash/e7c037b4.0 | 1 + .../extracted/pem/directory-hash/e7dd1bc4.0 | 1 + .../extracted/pem/directory-hash/e8651083.0 | 1 + .../extracted/pem/directory-hash/e868b802.0 | 1 + .../extracted/pem/directory-hash/e8de2f56.0 | 1 + .../ePKI_Root_Certification_Authority.pem | 33 + .../extracted/pem/directory-hash/ecccd8db.0 | 1 + .../extracted/pem/directory-hash/ed39abd0.0 | 1 + .../extracted/pem/directory-hash/ed858448.0 | 1 + .../extracted/pem/directory-hash/edcbddb5.0 | 1 + .../extracted/pem/directory-hash/ee37c333.0 | 1 + .../extracted/pem/directory-hash/ee532fd5.0 | 1 + .../extracted/pem/directory-hash/ee64a828.0 | 1 + .../extracted/pem/directory-hash/eed8c118.0 | 1 + .../extracted/pem/directory-hash/ef954a4e.0 | 1 + .../emSign_ECC_Root_CA_-_C3.pem | 14 + .../emSign_ECC_Root_CA_-_G3.pem | 15 + .../directory-hash/emSign_Root_CA_-_C1.pem | 21 + .../directory-hash/emSign_Root_CA_-_G1.pem | 22 + .../extracted/pem/directory-hash/f013ecaf.0 | 1 + .../extracted/pem/directory-hash/f058632f.0 | 1 + .../extracted/pem/directory-hash/f081611a.0 | 1 + .../extracted/pem/directory-hash/f0c70a8d.0 | 1 + .../extracted/pem/directory-hash/f0cd152c.0 | 1 + .../extracted/pem/directory-hash/f249de83.0 | 1 + .../extracted/pem/directory-hash/f30dd6ad.0 | 1 + .../extracted/pem/directory-hash/f387163d.0 | 1 + .../extracted/pem/directory-hash/f39fc864.0 | 1 + .../extracted/pem/directory-hash/f459871d.0 | 1 + .../extracted/pem/directory-hash/f51bb24c.0 | 1 + .../extracted/pem/directory-hash/f8fc53da.0 | 1 + .../extracted/pem/directory-hash/fa5da96b.0 | 1 + .../extracted/pem/directory-hash/fb5fa911.0 | 1 + .../extracted/pem/directory-hash/fb717492.0 | 1 + .../extracted/pem/directory-hash/fc5a8f99.0 | 1 + .../extracted/pem/directory-hash/fd08c599.0 | 1 + .../extracted/pem/directory-hash/fd64f3fc.0 | 1 + .../extracted/pem/directory-hash/fde84897.0 | 1 + .../extracted/pem/directory-hash/fe8a2cd8.0 | 1 + .../extracted/pem/directory-hash/feffd413.0 | 1 + .../extracted/pem/directory-hash/ff34af3f.0 | 1 + .../extracted/pem/directory-hash/ffa7f1eb.0 | 1 + .../pem/directory-hash/vTrus_ECC_Root_CA.pem | 14 + .../pem/directory-hash/vTrus_Root_CA.pem | 31 + .../extracted/pem/email-ca-bundle.pem | 2889 ++++ .../extracted/pem/objsign-ca-bundle.pem | 8647 ++++++++++++ pki/ca-trust/extracted/pem/tls-ca-bundle.pem | 3949 ++++++ pki/ca-trust/source/README | 20 + pki/ca-trust/source/ca-bundle.legacy.crt | 1 + pki/java/cacerts | 1 + pki/mock/README.txt | 7 + pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL | 41 + pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 | 29 + pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 | 31 + pki/rpm-gpg/RPM-GPG-KEY-Rocky-9-Testing | 52 + pki/rpm-gpg/RPM-GPG-KEY-redhat-beta | 29 + pki/rpm-gpg/RPM-GPG-KEY-redhat-release | 66 + pki/tls/cert.pem | 1 + pki/tls/certs/ca-bundle.crt | 1 + pki/tls/certs/ca-bundle.trust.crt | 1 + pki/tls/ct_log_list.cnf | 9 + pki/tls/fips_local.cnf | 1 + pki/tls/openssl.cnf | 402 + printcap | 7 + profile | 78 + profile.d/bash_completion.sh | 16 + profile.d/colorgrep.csh | 11 + profile.d/colorgrep.sh | 7 + profile.d/colorls.csh | 63 + profile.d/colorls.sh | 53 + profile.d/colorxzgrep.csh | 5 + profile.d/colorxzgrep.sh | 4 + profile.d/colorzgrep.csh | 9 + profile.d/colorzgrep.sh | 6 + .../console-login-helper-messages-profile.sh | 1 + profile.d/csh.local | 1 + profile.d/debuginfod.csh | 16 + profile.d/debuginfod.sh | 12 + profile.d/fbrehm.sh | 148 + profile.d/gawk.csh | 11 + profile.d/gawk.sh | 31 + profile.d/lang.csh | 109 + profile.d/lang.sh | 91 + profile.d/less.csh | 15 + profile.d/less.sh | 8 + profile.d/sh.local | 1 + profile.d/which2.csh | 3 + profile.d/which2.sh | 28 + protocols | 162 + rc.d/init.d/README | 27 + rc.d/rc.local | 14 + rc.local | 1 + redhat-release | 1 + redis/redis.conf | 2053 +++ redis/sentinel.conf | 341 + request-key.conf | 41 + request-key.d/id_resolver.conf | 9 + resolv.conf | 5 + rocky-release | 1 + rocky-release-upstream | 1 + rpc | 70 + rsyslog.conf | 81 + rwtab.d/gssproxy | 1 + rwtab.d/logrotate | 1 + rwtab.d/sssd | 1 + screenrc | 216 + security/access.conf | 122 + security/chroot.conf | 4 + security/console.apps/config-util | 2 + security/console.apps/mock | 6 + security/console.handlers | 17 + security/console.perms | 25 + security/faillock.conf | 62 + security/group.conf | 106 + security/limits.conf | 61 + security/namespace.conf | 31 + security/namespace.init | 25 + security/opasswd | 0 security/pam_env.conf | 73 + security/pwhistory.conf | 21 + security/pwquality.conf | 79 + security/sepermit.conf | 11 + security/time.conf | 65 + selinux/.config_backup | 29 + selinux/config | 29 + selinux/semanage.conf | 60 + selinux/targeted/.policy.sha512 | 1 + selinux/targeted/booleans.subs_dist | 54 + selinux/targeted/contexts/customizable_types | 14 + selinux/targeted/contexts/dbus_contexts | 6 + selinux/targeted/contexts/default_contexts | 15 + selinux/targeted/contexts/default_type | 6 + selinux/targeted/contexts/failsafe_context | 1 + selinux/targeted/contexts/files/file_contexts | 6672 +++++++++ .../targeted/contexts/files/file_contexts.bin | Bin 0 -> 597999 bytes .../contexts/files/file_contexts.homedirs | 227 + .../contexts/files/file_contexts.homedirs.bin | Bin 0 -> 21219 bytes .../contexts/files/file_contexts.local | 0 .../contexts/files/file_contexts.subs | 0 .../contexts/files/file_contexts.subs_dist | 24 + selinux/targeted/contexts/files/media | 3 + selinux/targeted/contexts/initrc_context | 1 + selinux/targeted/contexts/lxc_contexts | 7 + selinux/targeted/contexts/openssh_contexts | 1 + selinux/targeted/contexts/removable_context | 1 + selinux/targeted/contexts/securetty_types | 4 + selinux/targeted/contexts/sepgsql_contexts | 40 + selinux/targeted/contexts/snapperd_contexts | 1 + selinux/targeted/contexts/systemd_contexts | 1 + selinux/targeted/contexts/userhelper_context | 1 + selinux/targeted/contexts/users/guest_u | 8 + selinux/targeted/contexts/users/root | 11 + selinux/targeted/contexts/users/staff_u | 12 + selinux/targeted/contexts/users/sysadm_u | 14 + selinux/targeted/contexts/users/unconfined_u | 11 + selinux/targeted/contexts/users/user_u | 10 + selinux/targeted/contexts/users/xguest_u | 9 + .../targeted/contexts/virtual_domain_context | 2 + .../targeted/contexts/virtual_image_context | 2 + selinux/targeted/contexts/x_contexts | 105 + selinux/targeted/policy/policy.33 | Bin 0 -> 3582388 bytes selinux/targeted/setrans.conf | 19 + selinux/targeted/seusers | 2 + services | 11473 ++++++++++++++++ sestatus.conf | 18 + shadow | 27 + shadow- | 26 + shells | 6 + skel/.bash_logout | 2 + skel/.bash_profile | 8 + skel/.bashrc | 27 + ssh/moduli | 450 + ssh/ssh_config | 55 + ssh/ssh_config.d/50-redhat.conf | 15 + ssh/ssh_host_ecdsa_key | 8 + ssh/ssh_host_ecdsa_key.pub | 1 + ssh/ssh_host_ed25519_key | 7 + ssh/ssh_host_ed25519_key.pub | 1 + ssh/ssh_host_rsa_key | 38 + ssh/ssh_host_rsa_key.pub | 1 + ssh/sshd_config | 131 + ssh/sshd_config.d/01-permitrootlogin.conf | 3 + ssh/sshd_config.d/50-redhat.conf | 22 + ssh/sshd_config.rpmnew | 130 + ssl/cert.pem | 1 + ssl/certs | 1 + ssl/ct_log_list.cnf | 1 + ssl/openssl.cnf | 1 + subgid | 1 + subgid- | 0 subuid | 1 + subuid- | 0 sudo-ldap.conf | 86 + sudo.conf | 124 + sudoers | 120 + sysconfig/anaconda | 5 + sysconfig/chronyd | 2 + sysconfig/cpupower | 3 + sysconfig/crond | 3 + sysconfig/firewalld | 3 + sysconfig/irqbalance | 44 + sysconfig/kdump | 56 + sysconfig/kernel | 6 + sysconfig/man-db | 10 + sysconfig/network | 1 + sysconfig/network-scripts/readme-ifcfg-rh.txt | 31 + sysconfig/nftables.conf | 8 + sysconfig/rpcbind | 3 + sysconfig/rsyslog | 5 + sysconfig/run-parts | 0 sysconfig/selinux | 1 + sysconfig/sshd | 10 + sysctl.conf | 10 + sysctl.d/99-sysctl.conf | 1 + system-release | 1 + system-release-cpe | 1 + systemd/coredump.conf | 24 + systemd/journald.conf | 47 + systemd/logind.conf | 49 + systemd/networkd.conf | 28 + systemd/pstore.conf | 17 + systemd/sleep.conf | 27 + systemd/system.conf | 77 + .../basic.target.wants/microcode.service | 1 + systemd/system/ctrl-alt-del.target | 1 + .../dbus-org.fedoraproject.FirewallD1.service | 1 + .../dbus-org.freedesktop.network1.service | 1 + ...dbus-org.freedesktop.nm-dispatcher.service | 1 + systemd/system/dbus.service | 1 + systemd/system/default.target | 1 + .../getty.target.wants/getty@tty1.service | 1 + systemd/system/getty@.service.d/noclear.conf | 2 + .../NetworkManager.service | 1 + .../multi-user.target.wants/auditd.service | 1 + .../multi-user.target.wants/chronyd.service | 1 + ...per-messages-gensnippet-os-release.service | 1 + .../multi-user.target.wants/crond.service | 1 + .../multi-user.target.wants/firewalld.service | 1 + .../irqbalance.service | 1 + .../multi-user.target.wants/kdump.service | 1 + .../multi-user.target.wants/nfs-client.target | 1 + .../postgresql-16.service | 1 + .../multi-user.target.wants/redis.service | 1 + .../multi-user.target.wants/remote-fs.target | 1 + .../multi-user.target.wants/rpcbind.service | 1 + .../multi-user.target.wants/rsyslog.service | 1 + .../multi-user.target.wants/sshd.service | 1 + .../multi-user.target.wants/sssd.service | 1 + .../systemd-networkd.service | 1 + .../NetworkManager-wait-online.service | 1 + .../systemd-networkd-wait-online.service | 1 + .../redis-sentinel.service.d/limit.conf | 14 + systemd/system/redis.service.d/limit.conf | 14 + .../remote-fs.target.wants/nfs-client.target | 1 + .../system/sockets.target.wants/dbus.socket | 1 + .../sockets.target.wants/dm-event.socket | 1 + .../sockets.target.wants/rpcbind.socket | 1 + .../sockets.target.wants/sssd-kcm.socket | 1 + .../systemd-networkd.socket | 1 + .../sysinit.target.wants/lvm2-lvmpolld.socket | 1 + .../sysinit.target.wants/lvm2-monitor.service | 1 + .../nis-domainname.service | 1 + .../selinux-autorelabel-mark.service | 1 + .../systemd-network-generator.service | 1 + .../timers.target.wants/dnf-makecache.timer | 1 + .../timers.target.wants/logrotate.timer | 1 + systemd/user.conf | 50 + .../systemd-tmpfiles-setup.service | 1 + systemd/user/dbus.service | 1 + systemd/user/sockets.target.wants/dbus.socket | 1 + .../systemd-tmpfiles-clean.timer | 1 + tpm2-tss/fapi-config.json | 9 + tpm2-tss/fapi-profiles/P_ECCP256SHA256.json | 40 + tpm2-tss/fapi-profiles/P_RSA2048SHA256.json | 54 + udev/udev.conf | 11 + vconsole.conf | 2 + vimrc | 147 + vimrc.orig | 128 + virc | 35 + wgetrc | 137 + xattr.conf | 24 + xdg/systemd/user | 1 + yum.conf | 1 + yum.repos.d/epel-cisco-openh264.repo | 33 + yum.repos.d/epel-next-testing.repo | 30 + yum.repos.d/epel-next.repo | 30 + yum.repos.d/epel-testing.repo | 30 + yum.repos.d/epel.repo | 30 + yum.repos.d/frank-brehm.repo | 7 + yum.repos.d/pgdg-redhat-all.repo | 360 + yum.repos.d/pgdg-redhat-all.repo.rpmnew | 400 + yum.repos.d/rocky-addons.repo | 177 + yum.repos.d/rocky-devel.repo | 30 + yum.repos.d/rocky-extras.repo | 65 + yum.repos.d/rocky.repo | 93 + yum.repos.d/rocky.repo.rpmnew | 93 + yum/pluginconf.d | 1 + yum/protected.d | 1 + yum/vars | 1 + 1426 files changed, 85675 insertions(+) create mode 100644 .gitignore create mode 100644 .updated create mode 100644 DIR_COLORS create mode 100644 DIR_COLORS.lightbgcolor create mode 100644 GREP_COLORS create mode 100644 NetworkManager/NetworkManager.conf create mode 100644 NetworkManager/system-connections/enp1s0.nmconnection create mode 100755 X11/xinit/xinitrc.d/50-systemd-user.sh create mode 100644 X11/xorg.conf.d/00-keyboard.conf create mode 100644 aliases create mode 120000 alternatives/apropos create mode 120000 alternatives/apropos.1.gz create mode 120000 alternatives/arptables create mode 120000 alternatives/arptables-helper create mode 120000 alternatives/arptables-man create mode 120000 alternatives/arptables-restore create mode 120000 alternatives/arptables-restore-man create mode 120000 alternatives/arptables-save create mode 120000 alternatives/arptables-save-man create mode 120000 alternatives/cifs-idmap-plugin create mode 120000 alternatives/ebtables create mode 120000 alternatives/ebtables-man create mode 120000 alternatives/ebtables-restore create mode 120000 alternatives/ebtables-save create mode 120000 alternatives/ip6tables create mode 120000 alternatives/ip6tables-restore create mode 120000 alternatives/ip6tables-save create mode 120000 alternatives/iptables create mode 120000 alternatives/iptables-restore create mode 120000 alternatives/iptables-save create mode 120000 alternatives/ld create mode 120000 alternatives/libnssckbi.so.x86_64 create mode 120000 alternatives/llvm-config-16 create mode 120000 alternatives/man create mode 120000 alternatives/man.1.gz create mode 120000 alternatives/pgsql-clusterdb create mode 120000 alternatives/pgsql-clusterdbman create mode 120000 alternatives/pgsql-createdb create mode 120000 alternatives/pgsql-createdbman create mode 120000 alternatives/pgsql-createuser create mode 120000 alternatives/pgsql-createuserman create mode 120000 alternatives/pgsql-dropdb create mode 120000 alternatives/pgsql-dropdbman create mode 120000 alternatives/pgsql-dropuser create mode 120000 alternatives/pgsql-dropuserman create mode 120000 alternatives/pgsql-ld-conf create mode 120000 alternatives/pgsql-pg_basebackup create mode 120000 alternatives/pgsql-pg_basebackupman create mode 120000 alternatives/pgsql-pg_dump create mode 120000 alternatives/pgsql-pg_dumpall create mode 120000 alternatives/pgsql-pg_dumpallman create mode 120000 alternatives/pgsql-pg_dumpman create mode 120000 alternatives/pgsql-pg_restore create mode 120000 alternatives/pgsql-pg_restoreman create mode 120000 alternatives/pgsql-psql create mode 120000 alternatives/pgsql-psqlman create mode 120000 alternatives/pgsql-reindexdb create mode 120000 alternatives/pgsql-reindexdbman create mode 120000 alternatives/pgsql-vacuumdb create mode 120000 alternatives/pgsql-vacuumdbman create mode 120000 alternatives/soelim create mode 120000 alternatives/soelim.1.gz create mode 120000 alternatives/whatis create mode 120000 alternatives/whatis.1.gz create mode 100644 anacrontab create mode 100644 audit/audit-stop.rules create mode 100644 audit/audit.rules create mode 100644 audit/auditd.conf create mode 100644 audit/rules.d/audit.rules create mode 100644 authselect/user-nsswitch.conf create mode 100644 bash_completion.d/authselect-completion.sh create mode 100644 bash_completion.d/redefine_filedir create mode 100644 bashrc create mode 100644 bindresvport.blacklist create mode 100644 byobu/backend create mode 100644 byobu/socketdir create mode 100644 chrony.conf create mode 100644 chrony.keys create mode 120000 cifs-utils/idmap-plugin create mode 100644 colordiffrc create mode 100644 containers/policy.json create mode 100644 containers/registries.conf create mode 100644 containers/registries.conf.d/000-shortnames.conf create mode 100644 containers/registries.conf.d/001-rhel-shortnames.conf create mode 100644 containers/registries.conf.d/002-rhel-shortnames-overrides.conf create mode 100644 containers/registries.d/default.yaml create mode 100644 containers/registries.d/registry.access.redhat.com.yaml create mode 100644 containers/registries.d/registry.redhat.io.yaml create mode 100644 containers/storage.conf create mode 100644 cron.d/0hourly create mode 100755 cron.daily/etckeeper create mode 100644 cron.deny create mode 100755 cron.hourly/0anacron create mode 100644 crontab create mode 120000 crypto-policies/back-ends/bind.config create mode 120000 crypto-policies/back-ends/gnutls.config create mode 120000 crypto-policies/back-ends/java.config create mode 120000 crypto-policies/back-ends/javasystem.config create mode 120000 crypto-policies/back-ends/krb5.config create mode 120000 crypto-policies/back-ends/libreswan.config create mode 120000 crypto-policies/back-ends/libssh.config create mode 120000 crypto-policies/back-ends/nss.config create mode 120000 crypto-policies/back-ends/openssh.config create mode 120000 crypto-policies/back-ends/opensshserver.config create mode 120000 crypto-policies/back-ends/openssl.config create mode 120000 crypto-policies/back-ends/openssl_fips.config create mode 120000 crypto-policies/back-ends/opensslcnf.config create mode 100644 crypto-policies/config create mode 100644 crypto-policies/state/CURRENT.pol create mode 100644 crypto-policies/state/current create mode 100644 crypttab create mode 100644 csh.cshrc create mode 100644 csh.login create mode 100644 dbus-1/session.conf create mode 100644 dbus-1/system.conf create mode 100644 dbus-1/system.d/teamd.conf create mode 100644 default/grub create mode 100644 default/useradd create mode 100644 depmod.d/dist.conf create mode 100755 dhcp/dhclient.d/chrony.sh create mode 100644 dnf/dnf.conf create mode 100644 dnf/modules.d/postgresql.module create mode 100644 dnf/plugins/copr.conf create mode 100644 dnf/plugins/debuginfo-install.conf create mode 100644 dnf/protected.d/dnf.conf create mode 100644 dnf/protected.d/grub2-pc.conf create mode 100644 dnf/protected.d/grub2-tools-minimal.conf create mode 100644 dnf/protected.d/setup.conf create mode 100644 dnf/protected.d/sudo.conf create mode 100644 dnf/protected.d/systemd.conf create mode 100644 dnf/protected.d/yum.conf create mode 100644 dnf/vars/contentdir create mode 100644 dnf/vars/rltype create mode 100644 dnf/vars/sigcontentdir create mode 100644 dnf/vars/stream create mode 100644 dracut.conf create mode 100644 environment create mode 100755 etckeeper/commit.d/10vcs-test create mode 120000 etckeeper/commit.d/20store-metadata create mode 100755 etckeeper/commit.d/30bzr-add create mode 100755 etckeeper/commit.d/30darcs-add create mode 100755 etckeeper/commit.d/30git-add create mode 100755 etckeeper/commit.d/30hg-addremove create mode 100755 etckeeper/commit.d/50vcs-commit create mode 100755 etckeeper/commit.d/99push create mode 100644 etckeeper/commit.d/README create mode 100755 etckeeper/daily create mode 100644 etckeeper/etckeeper.conf create mode 100755 etckeeper/init.d/10restore-metadata create mode 100755 etckeeper/init.d/20restore-etckeeper create mode 100755 etckeeper/init.d/40vcs-init create mode 100755 etckeeper/init.d/50vcs-ignore create mode 100755 etckeeper/init.d/50vcs-perm create mode 100755 etckeeper/init.d/50vcs-pre-commit-hook create mode 100755 etckeeper/init.d/60darcs-deleted-symlinks create mode 100755 etckeeper/init.d/70vcs-add create mode 100644 etckeeper/init.d/README create mode 100755 etckeeper/list-installed.d/50list-installed create mode 100755 etckeeper/post-install.d/50vcs-commit create mode 100644 etckeeper/post-install.d/README create mode 100755 etckeeper/pre-commit.d/20warn-problem-files create mode 100755 etckeeper/pre-commit.d/30store-metadata create mode 100644 etckeeper/pre-commit.d/README create mode 100755 etckeeper/pre-install.d/10packagelist create mode 100755 etckeeper/pre-install.d/50uncommitted-changes create mode 100644 etckeeper/pre-install.d/README create mode 100755 etckeeper/unclean.d/50test create mode 100644 etckeeper/unclean.d/README create mode 100755 etckeeper/uninit.d/01prompt create mode 100755 etckeeper/uninit.d/50remove-metadata create mode 100755 etckeeper/uninit.d/50vcs-uninit create mode 100644 etckeeper/uninit.d/README create mode 100755 etckeeper/update-ignore.d/01update-ignore create mode 100644 etckeeper/update-ignore.d/README create mode 100755 etckeeper/vcs.d/50vcs-cmd create mode 100644 ethertypes create mode 100644 exports create mode 100644 filesystems create mode 100644 firewalld/firewalld.conf create mode 100644 firewalld/lockdown-whitelist.xml create mode 100644 firewalld/zones/public.xml create mode 100644 fstab create mode 100644 fuse.conf create mode 100644 gitconfig create mode 100644 groff/site-tmac/man.local create mode 100644 groff/site-tmac/mdoc.local create mode 100644 group create mode 100644 group- create mode 100755 grub.d/00_header create mode 100755 grub.d/01_users create mode 100755 grub.d/08_fallback_counting create mode 100755 grub.d/10_linux create mode 100755 grub.d/10_reset_boot_success create mode 100755 grub.d/12_menu_auto_hide create mode 100755 grub.d/14_menu_show_once create mode 100755 grub.d/20_linux_xen create mode 100755 grub.d/20_ppc_terminfo create mode 100755 grub.d/30_os-prober create mode 100755 grub.d/30_uefi-firmware create mode 100755 grub.d/40_custom create mode 100755 grub.d/41_custom create mode 100644 grub.d/README create mode 120000 grub2.cfg create mode 100644 gshadow create mode 100644 gshadow- create mode 100644 gss/mech.d/gssproxy.conf create mode 100644 gssproxy/24-nfs-server.conf create mode 100644 gssproxy/99-nfs-client.conf create mode 100644 gssproxy/gssproxy.conf create mode 100644 host.conf create mode 100644 hostname create mode 100644 hosts create mode 100644 idmapd.conf create mode 100644 inittab create mode 100644 inputrc create mode 100644 iproute2/bpf_pinning create mode 100644 iproute2/ematch_map create mode 100644 iproute2/group create mode 100644 iproute2/nl_protos create mode 100644 iproute2/rt_dsfield create mode 100644 iproute2/rt_protos create mode 100644 iproute2/rt_realms create mode 100644 iproute2/rt_scopes create mode 100644 iproute2/rt_tables create mode 100644 issue create mode 100644 issue.net create mode 100644 kdump.conf create mode 100644 keys/ima/centosimarelease-9.der create mode 100644 keys/ima/redhatimarelease-9.der create mode 100644 keys/ima/rocky-imarelease.der create mode 100644 krb5.conf create mode 120000 krb5.conf.d/crypto-policies create mode 100644 krb5.conf.d/kcm_default_ccache create mode 100644 ld.so.conf create mode 120000 ld.so.conf.d/postgresql-pgdg-libs.conf create mode 100644 libaudit.conf create mode 100644 libnl/classid create mode 100644 libnl/pktloc create mode 100644 libreport/events.d/collect_dnf.conf create mode 100644 libssh/libssh_client.config create mode 100644 libssh/libssh_server.config create mode 100644 libuser.conf create mode 100644 locale.conf create mode 120000 localtime create mode 100644 login.defs create mode 100644 logrotate.conf create mode 100644 logrotate.d/btmp create mode 100644 logrotate.d/chrony create mode 100644 logrotate.d/dnf create mode 100644 logrotate.d/firewalld create mode 100644 logrotate.d/kvm_stat create mode 100644 logrotate.d/redis create mode 100644 logrotate.d/rsyslog create mode 100644 logrotate.d/sssd create mode 100644 logrotate.d/wtmp create mode 100644 lvm/backup/rl create mode 100644 lvm/devices/backup/system.devices-20241125.150254.0004 create mode 100644 lvm/devices/system.devices create mode 100644 lvm/lvm.conf create mode 100644 lvm/lvmlocal.conf create mode 100644 lvm/profile/cache-mq.profile create mode 100644 lvm/profile/cache-smq.profile create mode 100644 lvm/profile/command_profile_template.profile create mode 100644 lvm/profile/lvmdbusd.profile create mode 100644 lvm/profile/metadata_profile_template.profile create mode 100644 lvm/profile/thin-generic.profile create mode 100644 lvm/profile/thin-performance.profile create mode 100644 lvm/profile/vdo-small.profile create mode 100644 machine-id create mode 100644 magic create mode 100644 makedumpfile.conf.sample create mode 100644 man_db.conf create mode 100644 mke2fs.conf create mode 100644 mock/alma+epel-8-aarch64.cfg create mode 100644 mock/alma+epel-8-ppc64le.cfg create mode 100644 mock/alma+epel-8-x86_64.cfg create mode 100644 mock/alma+epel-9-aarch64.cfg create mode 100644 mock/alma+epel-9-ppc64le.cfg create mode 100644 mock/alma+epel-9-s390x.cfg create mode 100644 mock/alma+epel-9-x86_64.cfg create mode 100644 mock/almalinux-8-aarch64.cfg create mode 100644 mock/almalinux-8-ppc64le.cfg create mode 100644 mock/almalinux-8-x86_64.cfg create mode 100644 mock/almalinux-9-aarch64.cfg create mode 100644 mock/almalinux-9-ppc64le.cfg create mode 100644 mock/almalinux-9-s390x.cfg create mode 100644 mock/almalinux-9-x86_64.cfg create mode 100644 mock/amazonlinux-2-aarch64.cfg create mode 100644 mock/amazonlinux-2-x86_64.cfg create mode 100644 mock/amazonlinux-2023-aarch64.cfg create mode 100644 mock/amazonlinux-2023-x86_64.cfg create mode 100644 mock/anolis-8-aarch64.cfg create mode 100644 mock/anolis-8-x86_64.cfg create mode 100644 mock/centos-stream+epel-10-aarch64.cfg create mode 100644 mock/centos-stream+epel-10-ppc64le.cfg create mode 100644 mock/centos-stream+epel-10-s390x.cfg create mode 100644 mock/centos-stream+epel-10-x86_64.cfg create mode 100644 mock/centos-stream+epel-8-aarch64.cfg create mode 100644 mock/centos-stream+epel-8-ppc64le.cfg create mode 100644 mock/centos-stream+epel-8-x86_64.cfg create mode 100644 mock/centos-stream+epel-9-aarch64.cfg create mode 100644 mock/centos-stream+epel-9-ppc64le.cfg create mode 100644 mock/centos-stream+epel-9-s390x.cfg create mode 100644 mock/centos-stream+epel-9-x86_64.cfg create mode 100644 mock/centos-stream+epel-next-8-aarch64.cfg create mode 100644 mock/centos-stream+epel-next-8-ppc64le.cfg create mode 100644 mock/centos-stream+epel-next-8-x86_64.cfg create mode 100644 mock/centos-stream+epel-next-9-aarch64.cfg create mode 100644 mock/centos-stream+epel-next-9-ppc64le.cfg create mode 100644 mock/centos-stream+epel-next-9-s390x.cfg create mode 100644 mock/centos-stream+epel-next-9-x86_64.cfg create mode 100644 mock/centos-stream-10-aarch64.cfg create mode 100644 mock/centos-stream-10-ppc64le.cfg create mode 100644 mock/centos-stream-10-s390x.cfg create mode 100644 mock/centos-stream-10-x86_64.cfg create mode 100644 mock/centos-stream-8-aarch64.cfg create mode 100644 mock/centos-stream-8-ppc64le.cfg create mode 100644 mock/centos-stream-8-x86_64.cfg create mode 100644 mock/centos-stream-9-aarch64.cfg create mode 100644 mock/centos-stream-9-ppc64le.cfg create mode 100644 mock/centos-stream-9-s390x.cfg create mode 100644 mock/centos-stream-9-x86_64.cfg create mode 100644 mock/chroot-aliases.cfg create mode 100644 mock/circlelinux+epel-8-aarch64.cfg create mode 100644 mock/circlelinux+epel-8-ppc64le.cfg create mode 100644 mock/circlelinux+epel-8-x86_64.cfg create mode 100644 mock/circlelinux+epel-9-aarch64.cfg create mode 100644 mock/circlelinux+epel-9-ppc64le.cfg create mode 100644 mock/circlelinux+epel-9-s390x.cfg create mode 100644 mock/circlelinux+epel-9-x86_64.cfg create mode 100644 mock/circlelinux-8-aarch64.cfg create mode 100644 mock/circlelinux-8-ppc64le.cfg create mode 100644 mock/circlelinux-8-x86_64.cfg create mode 100644 mock/circlelinux-9-aarch64.cfg create mode 100644 mock/circlelinux-9-ppc64le.cfg create mode 100644 mock/circlelinux-9-s390x.cfg create mode 100644 mock/circlelinux-9-x86_64.cfg create mode 100644 mock/custom-1-aarch64.cfg create mode 100644 mock/custom-1-armhfp.cfg create mode 100644 mock/custom-1-i386.cfg create mode 100644 mock/custom-1-ppc64.cfg create mode 100644 mock/custom-1-ppc64le.cfg create mode 100644 mock/custom-1-s390.cfg create mode 100644 mock/custom-1-s390x.cfg create mode 100644 mock/custom-1-x86_64.cfg create mode 120000 mock/default.cfg create mode 100644 mock/eol/anolis-7-aarch64.cfg create mode 100644 mock/eol/anolis-7-x86_64.cfg create mode 100644 mock/eol/centos+epel-7-aarch64.cfg create mode 100644 mock/eol/centos+epel-7-ppc64.cfg create mode 100644 mock/eol/centos+epel-7-ppc64le.cfg create mode 100644 mock/eol/centos+epel-7-x86_64.cfg create mode 100644 mock/eol/centos+epel-8-aarch64.cfg create mode 100644 mock/eol/centos+epel-8-ppc64le.cfg create mode 100644 mock/eol/centos+epel-8-x86_64.cfg create mode 100644 mock/eol/centos-6-i386.cfg create mode 100644 mock/eol/centos-6-x86_64.cfg create mode 100644 mock/eol/centos-7-aarch64.cfg create mode 100644 mock/eol/centos-7-ppc64.cfg create mode 100644 mock/eol/centos-7-ppc64le.cfg create mode 100644 mock/eol/centos-7-x86_64.cfg create mode 100644 mock/eol/centos-8-aarch64.cfg create mode 100644 mock/eol/centos-8-ppc64le.cfg create mode 100644 mock/eol/centos-8-x86_64.cfg create mode 100644 mock/eol/epel-5-i386.cfg create mode 100644 mock/eol/epel-5-x86_64.cfg create mode 100644 mock/eol/epel-6-i386.cfg create mode 100644 mock/eol/epel-6-x86_64.cfg create mode 120000 mock/eol/epel-7-ppc64le.cfg create mode 120000 mock/eol/epel-7-x86_64.cfg create mode 100644 mock/eol/epelplayground-8-aarch64.cfg create mode 100644 mock/eol/epelplayground-8-ppc64le.cfg create mode 100644 mock/eol/epelplayground-8-x86_64.cfg create mode 100644 mock/eol/fedora-25-aarch64.cfg create mode 100644 mock/eol/fedora-25-armhfp.cfg create mode 100644 mock/eol/fedora-25-i386.cfg create mode 100644 mock/eol/fedora-25-ppc64.cfg create mode 100644 mock/eol/fedora-25-ppc64le.cfg create mode 100644 mock/eol/fedora-25-s390x.cfg create mode 100644 mock/eol/fedora-25-x86_64.cfg create mode 100644 mock/eol/fedora-26-aarch64.cfg create mode 100644 mock/eol/fedora-26-armhfp.cfg create mode 100644 mock/eol/fedora-26-i386.cfg create mode 100644 mock/eol/fedora-26-ppc64.cfg create mode 100644 mock/eol/fedora-26-ppc64le.cfg create mode 100644 mock/eol/fedora-26-s390x.cfg create mode 100644 mock/eol/fedora-26-x86_64.cfg create mode 100644 mock/eol/fedora-27-aarch64.cfg create mode 100644 mock/eol/fedora-27-armhfp.cfg create mode 100644 mock/eol/fedora-27-i386.cfg create mode 100644 mock/eol/fedora-27-ppc64.cfg create mode 100644 mock/eol/fedora-27-ppc64le.cfg create mode 100644 mock/eol/fedora-27-s390x.cfg create mode 100644 mock/eol/fedora-27-x86_64.cfg create mode 100644 mock/eol/fedora-28-aarch64.cfg create mode 100644 mock/eol/fedora-28-armhfp.cfg create mode 100644 mock/eol/fedora-28-i386.cfg create mode 100644 mock/eol/fedora-28-ppc64.cfg create mode 100644 mock/eol/fedora-28-ppc64le.cfg create mode 100644 mock/eol/fedora-28-s390x.cfg create mode 100644 mock/eol/fedora-28-x86_64.cfg create mode 100644 mock/eol/fedora-29-aarch64.cfg create mode 100644 mock/eol/fedora-29-armhfp.cfg create mode 100644 mock/eol/fedora-29-i386.cfg create mode 100644 mock/eol/fedora-29-ppc64le.cfg create mode 100644 mock/eol/fedora-29-s390x.cfg create mode 100644 mock/eol/fedora-29-x86_64.cfg create mode 100644 mock/eol/fedora-30-aarch64.cfg create mode 100644 mock/eol/fedora-30-armhfp.cfg create mode 100644 mock/eol/fedora-30-i386.cfg create mode 100644 mock/eol/fedora-30-ppc64le.cfg create mode 100644 mock/eol/fedora-30-s390x.cfg create mode 100644 mock/eol/fedora-30-x86_64.cfg create mode 100644 mock/eol/fedora-31-aarch64.cfg create mode 100644 mock/eol/fedora-31-armhfp.cfg create mode 100644 mock/eol/fedora-31-i386.cfg create mode 100644 mock/eol/fedora-31-ppc64le.cfg create mode 100644 mock/eol/fedora-31-s390x.cfg create mode 100644 mock/eol/fedora-31-x86_64.cfg create mode 100644 mock/eol/fedora-32-aarch64.cfg create mode 100644 mock/eol/fedora-32-armhfp.cfg create mode 100644 mock/eol/fedora-32-i386.cfg create mode 100644 mock/eol/fedora-32-ppc64le.cfg create mode 100644 mock/eol/fedora-32-s390x.cfg create mode 100644 mock/eol/fedora-32-x86_64.cfg create mode 100644 mock/eol/fedora-33-aarch64.cfg create mode 100644 mock/eol/fedora-33-armhfp.cfg create mode 100644 mock/eol/fedora-33-i386.cfg create mode 100644 mock/eol/fedora-33-ppc64le.cfg create mode 100644 mock/eol/fedora-33-s390x.cfg create mode 100644 mock/eol/fedora-33-x86_64.cfg create mode 100644 mock/eol/fedora-34-aarch64.cfg create mode 100644 mock/eol/fedora-34-armhfp.cfg create mode 100644 mock/eol/fedora-34-i386.cfg create mode 100644 mock/eol/fedora-34-ppc64le.cfg create mode 100644 mock/eol/fedora-34-s390x.cfg create mode 100644 mock/eol/fedora-34-x86_64.cfg create mode 100644 mock/eol/fedora-35-aarch64.cfg create mode 100644 mock/eol/fedora-35-armhfp.cfg create mode 100644 mock/eol/fedora-35-i386.cfg create mode 100644 mock/eol/fedora-35-ppc64le.cfg create mode 100644 mock/eol/fedora-35-s390x.cfg create mode 100644 mock/eol/fedora-35-x86_64.cfg create mode 100644 mock/eol/fedora-36-aarch64.cfg create mode 100644 mock/eol/fedora-36-armhfp.cfg create mode 100644 mock/eol/fedora-36-i386.cfg create mode 100644 mock/eol/fedora-36-ppc64le.cfg create mode 100644 mock/eol/fedora-36-s390x.cfg create mode 100644 mock/eol/fedora-36-x86_64.cfg create mode 100644 mock/eol/fedora-37-aarch64.cfg create mode 100644 mock/eol/fedora-37-i386.cfg create mode 100644 mock/eol/fedora-37-ppc64le.cfg create mode 100644 mock/eol/fedora-37-s390x.cfg create mode 100644 mock/eol/fedora-37-x86_64.cfg create mode 100644 mock/eol/fedora-38-aarch64.cfg create mode 100644 mock/eol/fedora-38-i386.cfg create mode 100644 mock/eol/fedora-38-ppc64le.cfg create mode 100644 mock/eol/fedora-38-s390x.cfg create mode 100644 mock/eol/fedora-38-x86_64.cfg create mode 100644 mock/eol/fedora-39-aarch64.cfg create mode 100644 mock/eol/fedora-39-i386.cfg create mode 100644 mock/eol/fedora-39-ppc64le.cfg create mode 100644 mock/eol/fedora-39-s390x.cfg create mode 100644 mock/eol/fedora-39-x86_64.cfg create mode 100644 mock/eol/mageia-6-armv5tl.cfg create mode 100644 mock/eol/mageia-6-armv7hl.cfg create mode 100644 mock/eol/mageia-6-i586.cfg create mode 100644 mock/eol/mageia-6-x86_64.cfg create mode 100644 mock/eol/mageia-7-aarch64.cfg create mode 100644 mock/eol/mageia-7-armv7hl.cfg create mode 100644 mock/eol/mageia-7-i586.cfg create mode 100644 mock/eol/mageia-7-x86_64.cfg create mode 100644 mock/eol/openmandriva-4.0-aarch64.cfg create mode 100644 mock/eol/openmandriva-4.0-armv7hnl.cfg create mode 100644 mock/eol/openmandriva-4.0-i686.cfg create mode 100644 mock/eol/openmandriva-4.0-x86_64.cfg create mode 100644 mock/eol/openmandriva-4.1-i686.cfg create mode 100644 mock/eol/openmandriva-cooker-i686.cfg create mode 100644 mock/eol/openmandriva-rolling-i686.cfg create mode 100644 mock/eol/opensuse-leap-15.0-aarch64.cfg create mode 100644 mock/eol/opensuse-leap-15.0-x86_64.cfg create mode 100644 mock/eol/opensuse-leap-15.1-aarch64.cfg create mode 100644 mock/eol/opensuse-leap-15.1-x86_64.cfg create mode 100644 mock/eol/opensuse-leap-15.2-aarch64.cfg create mode 100644 mock/eol/opensuse-leap-15.2-x86_64.cfg create mode 100644 mock/eol/opensuse-leap-15.3-aarch64.cfg create mode 100644 mock/eol/opensuse-leap-15.3-ppc64le.cfg create mode 100644 mock/eol/opensuse-leap-15.3-s390x.cfg create mode 100644 mock/eol/opensuse-leap-15.3-x86_64.cfg create mode 100644 mock/eol/opensuse-leap-15.4-aarch64.cfg create mode 100644 mock/eol/opensuse-leap-15.4-ppc64le.cfg create mode 100644 mock/eol/opensuse-leap-15.4-s390x.cfg create mode 100644 mock/eol/opensuse-leap-15.4-x86_64.cfg create mode 100644 mock/eol/oraclelinux+epel-7-aarch64.cfg create mode 100644 mock/eol/oraclelinux+epel-7-x86_64.cfg create mode 100644 mock/eol/rhel-6-x86_64.cfg create mode 100644 mock/eol/templates/anolis-7.tpl create mode 100644 mock/eol/templates/centos-6.tpl create mode 100644 mock/eol/templates/centos-7.tpl create mode 100644 mock/eol/templates/centos-8.tpl create mode 100644 mock/eol/templates/epel-6.tpl create mode 100644 mock/eol/templates/epel-7.tpl create mode 100644 mock/eol/templates/epelplayground-8.tpl create mode 100644 mock/eol/templates/fedora-29.tpl create mode 100644 mock/eol/templates/fedora-30.tpl create mode 100644 mock/eol/templates/mageia-6.tpl create mode 100644 mock/eol/templates/mageia-7.tpl create mode 100644 mock/eol/templates/openmandriva-4.0.tpl create mode 100644 mock/eol/templates/opensuse-leap-15.3.tpl create mode 100644 mock/eol/templates/opensuse-leap-15.4.tpl create mode 100644 mock/eol/templates/rhel-6.tpl create mode 120000 mock/epel-10-aarch64.cfg create mode 120000 mock/epel-10-ppc64le.cfg create mode 120000 mock/epel-10-s390x.cfg create mode 120000 mock/epel-10-x86_64.cfg create mode 100644 mock/eurolinux-8-aarch64.cfg create mode 100644 mock/eurolinux-8-i686.cfg create mode 100644 mock/eurolinux-8-x86_64.cfg create mode 100644 mock/eurolinux-9-aarch64.cfg create mode 100644 mock/eurolinux-9-i686.cfg create mode 100644 mock/eurolinux-9-x86_64.cfg create mode 100644 mock/fedora-40-aarch64.cfg create mode 100644 mock/fedora-40-i386.cfg create mode 100644 mock/fedora-40-ppc64le.cfg create mode 100644 mock/fedora-40-s390x.cfg create mode 100644 mock/fedora-40-x86_64.cfg create mode 100644 mock/fedora-41-aarch64.cfg create mode 100644 mock/fedora-41-i386.cfg create mode 100644 mock/fedora-41-ppc64le.cfg create mode 100644 mock/fedora-41-s390x.cfg create mode 100644 mock/fedora-41-x86_64.cfg create mode 120000 mock/fedora-42-aarch64.cfg create mode 120000 mock/fedora-42-i386.cfg create mode 120000 mock/fedora-42-ppc64le.cfg create mode 120000 mock/fedora-42-s390x.cfg create mode 120000 mock/fedora-42-x86_64.cfg create mode 100644 mock/fedora-eln-aarch64.cfg create mode 100644 mock/fedora-eln-ppc64le.cfg create mode 100644 mock/fedora-eln-s390x.cfg create mode 100644 mock/fedora-eln-x86_64.cfg create mode 100644 mock/fedora-rawhide-aarch64.cfg create mode 100644 mock/fedora-rawhide-i386.cfg create mode 100644 mock/fedora-rawhide-ppc64le.cfg create mode 100644 mock/fedora-rawhide-s390x.cfg create mode 100644 mock/fedora-rawhide-x86_64.cfg create mode 100644 mock/hermetic-build.cfg create mode 100644 mock/logging.ini create mode 120000 mock/mageia-10-aarch64.cfg create mode 120000 mock/mageia-10-armv7hl.cfg create mode 120000 mock/mageia-10-i686.cfg create mode 120000 mock/mageia-10-x86_64.cfg create mode 100644 mock/mageia-8-aarch64.cfg create mode 100644 mock/mageia-8-armv7hl.cfg create mode 100644 mock/mageia-8-i586.cfg create mode 100644 mock/mageia-8-x86_64.cfg create mode 100644 mock/mageia-9-aarch64.cfg create mode 100644 mock/mageia-9-armv7hl.cfg create mode 100644 mock/mageia-9-i586.cfg create mode 100644 mock/mageia-9-x86_64.cfg create mode 100644 mock/mageia-cauldron-aarch64.cfg create mode 100644 mock/mageia-cauldron-armv7hl.cfg create mode 100644 mock/mageia-cauldron-i686.cfg create mode 100644 mock/mageia-cauldron-x86_64.cfg create mode 100644 mock/navy-8-x86_64.cfg create mode 100644 mock/openeuler-20.03-aarch64.cfg create mode 100644 mock/openeuler-20.03-x86_64.cfg create mode 100644 mock/openeuler-22.03-aarch64.cfg create mode 100644 mock/openeuler-22.03-x86_64.cfg create mode 100644 mock/openeuler-24.03-aarch64.cfg create mode 100644 mock/openeuler-24.03-x86_64.cfg create mode 100644 mock/openmandriva-4.1-aarch64.cfg create mode 100644 mock/openmandriva-4.1-armv7hnl.cfg create mode 100644 mock/openmandriva-4.1-x86_64.cfg create mode 100644 mock/openmandriva-cooker-aarch64.cfg create mode 100644 mock/openmandriva-cooker-armv7hnl.cfg create mode 100644 mock/openmandriva-cooker-x86_64.cfg create mode 100644 mock/openmandriva-rolling-aarch64.cfg create mode 100644 mock/openmandriva-rolling-armv7hnl.cfg create mode 100644 mock/openmandriva-rolling-x86_64.cfg create mode 100644 mock/opensuse-leap-15.5-aarch64.cfg create mode 100644 mock/opensuse-leap-15.5-ppc64le.cfg create mode 100644 mock/opensuse-leap-15.5-s390x.cfg create mode 100644 mock/opensuse-leap-15.5-x86_64.cfg create mode 100644 mock/opensuse-tumbleweed-aarch64.cfg create mode 100644 mock/opensuse-tumbleweed-i586.cfg create mode 100644 mock/opensuse-tumbleweed-ppc64.cfg create mode 100644 mock/opensuse-tumbleweed-ppc64le.cfg create mode 100644 mock/opensuse-tumbleweed-s390x.cfg create mode 100644 mock/opensuse-tumbleweed-x86_64.cfg create mode 100644 mock/oraclelinux+epel-8-aarch64.cfg create mode 100644 mock/oraclelinux+epel-8-x86_64.cfg create mode 100644 mock/oraclelinux+epel-9-aarch64.cfg create mode 100644 mock/oraclelinux+epel-9-x86_64.cfg create mode 100644 mock/oraclelinux-7-aarch64.cfg create mode 100644 mock/oraclelinux-7-x86_64.cfg create mode 100644 mock/oraclelinux-8-aarch64.cfg create mode 100644 mock/oraclelinux-8-x86_64.cfg create mode 100644 mock/oraclelinux-9-aarch64.cfg create mode 100644 mock/oraclelinux-9-x86_64.cfg create mode 100644 mock/rhel+epel-8-aarch64.cfg create mode 100644 mock/rhel+epel-8-ppc64le.cfg create mode 100644 mock/rhel+epel-8-s390x.cfg create mode 100644 mock/rhel+epel-8-x86_64.cfg create mode 100644 mock/rhel+epel-9-aarch64.cfg create mode 100644 mock/rhel+epel-9-ppc64le.cfg create mode 100644 mock/rhel+epel-9-s390x.cfg create mode 100644 mock/rhel+epel-9-x86_64.cfg create mode 100644 mock/rhel-7-aarch64.cfg create mode 100644 mock/rhel-7-ppc64.cfg create mode 100644 mock/rhel-7-ppc64le.cfg create mode 100644 mock/rhel-7-s390x.cfg create mode 100644 mock/rhel-7-x86_64.cfg create mode 100644 mock/rhel-8-aarch64.cfg create mode 100644 mock/rhel-8-ppc64le.cfg create mode 100644 mock/rhel-8-s390x.cfg create mode 100644 mock/rhel-8-x86_64.cfg create mode 100644 mock/rhel-9-aarch64.cfg create mode 100644 mock/rhel-9-ppc64le.cfg create mode 100644 mock/rhel-9-s390x.cfg create mode 100644 mock/rhel-9-x86_64.cfg create mode 100644 mock/rocky+epel-8-aarch64.cfg create mode 100644 mock/rocky+epel-8-x86_64.cfg create mode 100644 mock/rocky+epel-9-aarch64.cfg create mode 100644 mock/rocky+epel-9-ppc64le.cfg create mode 100644 mock/rocky+epel-9-s390x.cfg create mode 100644 mock/rocky+epel-9-x86_64.cfg create mode 100644 mock/rocky-8-aarch64.cfg create mode 100644 mock/rocky-8-x86_64.cfg create mode 100644 mock/rocky-9-aarch64.cfg create mode 100644 mock/rocky-9-ppc64le.cfg create mode 100644 mock/rocky-9-s390x.cfg create mode 100644 mock/rocky-9-x86_64.cfg create mode 100644 mock/site-defaults.cfg create mode 100644 mock/templates/almalinux-8.tpl create mode 100644 mock/templates/almalinux-9.tpl create mode 100644 mock/templates/amazonlinux-2.tpl create mode 100644 mock/templates/amazonlinux-2023.tpl create mode 100644 mock/templates/anolis-8.tpl create mode 100644 mock/templates/centos-stream-10.tpl create mode 100644 mock/templates/centos-stream-8.tpl create mode 100644 mock/templates/centos-stream-9.tpl create mode 100644 mock/templates/circlelinux-8.tpl create mode 100644 mock/templates/circlelinux-9.tpl create mode 100644 mock/templates/custom-1.tpl create mode 100644 mock/templates/epel-10.tpl create mode 100644 mock/templates/epel-8.tpl create mode 100644 mock/templates/epel-9.tpl create mode 100644 mock/templates/epel-next-8.tpl create mode 100644 mock/templates/epel-next-9.tpl create mode 100644 mock/templates/eurolinux-8.tpl create mode 100644 mock/templates/eurolinux-9.tpl create mode 100644 mock/templates/fedora-branched.tpl create mode 100644 mock/templates/fedora-eln.tpl create mode 100644 mock/templates/fedora-rawhide.tpl create mode 100644 mock/templates/mageia-branched.tpl create mode 100644 mock/templates/mageia-cauldron.tpl create mode 100644 mock/templates/navy-8.tpl create mode 100644 mock/templates/openeuler-20.03.tpl create mode 100644 mock/templates/openeuler-22.03.tpl create mode 100644 mock/templates/openeuler-24.03.tpl create mode 100644 mock/templates/openmandriva-branched.tpl create mode 100644 mock/templates/openmandriva-cooker.tpl create mode 100644 mock/templates/openmandriva-rolling.tpl create mode 100644 mock/templates/opensuse-leap-15.5.tpl create mode 100644 mock/templates/opensuse-tumbleweed.tpl create mode 100644 mock/templates/oraclelinux-7.tpl create mode 100644 mock/templates/oraclelinux-8.tpl create mode 100644 mock/templates/oraclelinux-9.tpl create mode 100644 mock/templates/oraclelinux-epel-8.tpl create mode 100644 mock/templates/oraclelinux-epel-9.tpl create mode 100644 mock/templates/rhel-7.tpl create mode 100644 mock/templates/rhel-8.tpl create mode 100644 mock/templates/rhel-9.tpl create mode 100644 mock/templates/rocky-8.tpl create mode 100644 mock/templates/rocky-9.tpl create mode 100644 modprobe.d/firewalld-sysctls.conf create mode 100644 modprobe.d/lockd.conf create mode 100644 motd.d/10-banner create mode 100644 netconfig create mode 100644 networks create mode 100644 nfs.conf create mode 100644 nfsmount.conf create mode 100644 nftables/main.nft create mode 100644 nftables/nat.nft create mode 100644 nftables/osf/pf.os create mode 100644 nftables/router.nft create mode 100644 nsswitch.conf create mode 100644 openldap/ldap.conf create mode 120000 os-release create mode 100644 pam.d/config-util create mode 100644 pam.d/crond create mode 100644 pam.d/fingerprint-auth create mode 100644 pam.d/login create mode 100644 pam.d/mock create mode 100644 pam.d/other create mode 100644 pam.d/passwd create mode 100644 pam.d/password-auth create mode 100644 pam.d/postgresql create mode 100644 pam.d/postlogin create mode 100644 pam.d/remote create mode 100644 pam.d/runuser create mode 100644 pam.d/runuser-l create mode 100644 pam.d/screen create mode 100644 pam.d/smartcard-auth create mode 100644 pam.d/sshd create mode 100644 pam.d/sssd-shadowutils create mode 100644 pam.d/su create mode 100644 pam.d/su-l create mode 100644 pam.d/sudo create mode 100644 pam.d/sudo-i create mode 100644 pam.d/system-auth create mode 100644 pam.d/systemd-user create mode 100644 pam.d/vlock create mode 100644 passwd create mode 100644 passwd- create mode 100644 pki/ca-trust/README create mode 100644 pki/ca-trust/ca-legacy.conf create mode 100644 pki/ca-trust/extracted/README create mode 100644 pki/ca-trust/extracted/edk2/README create mode 100644 pki/ca-trust/extracted/edk2/cacerts.bin create mode 100644 pki/ca-trust/extracted/java/README create mode 100644 pki/ca-trust/extracted/java/cacerts create mode 100644 pki/ca-trust/extracted/openssl/README create mode 100644 pki/ca-trust/extracted/openssl/ca-bundle.trust.crt create mode 100644 pki/ca-trust/extracted/pem/README create mode 120000 pki/ca-trust/extracted/pem/directory-hash/002c0b4f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/01419da9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0179095f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/02265526.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/04f60c28.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/062cdee6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/064e0aa9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/068570d1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/06dc52d5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/073bfcc5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/08063a00.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/09789157.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0a775a30.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0b1b94ef.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0b9bc432.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0bf05006.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0d69c7e1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0f5dc4f3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/0f6fa695.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1001acf7.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/10531352.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/106f3e4d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/128f4b91.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/14bc7599.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/18856ac4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1ae85e5e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1b0f7e5c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1cef98f5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1d3472b9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1df5a75f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1e08bfd1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1e09d511.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1e1eab7c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1e8e7201.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1ec40989.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/1f58a078.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/219d9499.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/228f89db.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/23f4c490.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/244b5494.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/252252d2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2923b3f9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2add47b6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2ae6433e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2b349938.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2c63f966.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2d21b73c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/2d9dafe4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/302904dd.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/304d27c3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/31188b5e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/32888f65.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/33ee480d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/34d996fb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/35105088.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3513523f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/399e7759.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3ad48a91.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3afde786.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3bde41ac.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3c860d51.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3c899c73.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3c9a4d3b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3e359ba6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3e7271e8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/3fb36b73.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/40193066.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4042bcee.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/40547a79.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/406c9bb1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/41a3f684.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/455f1b52.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/48a195d8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/48bec511.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4b718d9b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4be590e0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4bfab552.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4c3982f2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4f316efb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/4fd49c6c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5046c355.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/52b525c7.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/53a1b57a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5443e9e3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/54657681.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/57bcb2da.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/583d0756.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5860aaa6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5931b5bc.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/595e996b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5a3f0ff8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5acf816d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5ad8a5d6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5cd81ad7.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5e98733a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5f15c80c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5f47b495.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5f618aec.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5f9a69fa.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/5fdd185d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/607986c7.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/60afe812.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6187b673.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/626dceaf.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/63a2c897.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/653b494a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/68dd7389.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/69105f4f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6b03dec0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6b483515.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6b99d060.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6d41d539.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6f7454b3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/6fa5da56.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/706f604c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/749e9e03.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/75680d2e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/75d1b2ed.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/76579174.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/76faf6c0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7719f463.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/773e07ad.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7892ad52.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7a3adc42.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7a780d93.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7a7c655d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7a819ef2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7e067d03.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7f3d5d1d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/7fa05551.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8160b96c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/81b9768f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/81f2d2b1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/82223c44.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8312c4c1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/83e9984f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8508e720.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/85cde254.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/86212b19.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/865fbdf9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/869fbf79.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8794b4e3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/882de061.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/88950faa.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/89c02a45.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8cb5ee0f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8d10a21f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8d6437c3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8d86cdd1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8d89cda1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/8f103249.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9046744a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/90c5a3c8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9282e51c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/930ac5d2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9339512a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/93851c9e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/93bc0acc.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9479c8c3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9482e63a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9576d26b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9591a472.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/95aff9e3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9846683b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/985c1f52.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/988a38cb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/98aaf404.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/99e1b953.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9aef356c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9b46e03d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9b5697b0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9bf03295.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9c8dfbd4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9d04f354.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9d6523ce.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9ef4a08a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/9f727ac7.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/ACCVRAIZ1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/ANF_Secure_Server_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Actalis_Authentication_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Commercial.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Networking.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium_ECC.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_2011.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Baltimore_CyberTrust_Root.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_2_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_3_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CA_Disig_Root_R2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CFCA_EV_ROOT.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/COMODO_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/COMODO_ECC_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/COMODO_RSA_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_E1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_R1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certigna.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certigna_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certum_EC-384_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA_2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-01.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-02.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-01.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-02.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Comodo_AAA_Services_root.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/D-TRUST_BR_Root_CA_1_2020.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/D-TRUST_EV_Root_CA_1_2020.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_2009.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_EV_2009.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_High_Assurance_EV_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_ECC_P384_Root_G5.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_RSA4096_Root_G5.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/DigiCert_Trusted_Root_G4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Entrust.net_Premium_2048_Secure_Server_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_EC1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GDCA_TrustAUTH_R5_ROOT.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GLOBALTRUST_2020.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R5.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R6.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_E46.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_R46.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Class_2_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Root_Certificate_Authority_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_ECC_Root_CA_2021.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_RSA_Root_CA_2021.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/HiPKI_Root_CA_-_G1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Hongkong_Post_Root_CA_3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Commercial_Root_CA_1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Public_Sector_Root_CA_1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Izenpe.com.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Microsec_e-Szigno_Root_CA_2009.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Microsoft_ECC_Root_Certificate_Authority_2017.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Microsoft_RSA_Root_Certificate_Authority_2017.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/NAVER_Global_Root_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GB_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GC_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_1_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_ECC.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_ECC.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_RSA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_ECC_Root_CA_2022.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_RSA_Root_CA_2022.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SZAFIR_ROOT_CA2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_E46.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_R46.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SecureSign_RootCA11.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SecureTrust_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Secure_Global_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Security_Communication_ECC_RootCA1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Starfield_Class_2_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Starfield_Root_Certificate_Authority_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Starfield_Services_Root_Certificate_Authority_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SwissSign_Gold_CA_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/SwissSign_Silver_CA_-_G2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TWCA_Global_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TWCA_Root_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_ECC_Root_2020.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_RSA_Root_2023.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TeliaSonera_Root_CA_v1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Telia_Root_CA_v2.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G4.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P256_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P384_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/TunTrust_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/UCA_Extended_Validation_Root.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/UCA_Global_G2_Root.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/USERTrust_ECC_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/USERTrust_RSA_Certification_Authority.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/XRamp_Global_CA_Root.pem create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a2c66da8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a3418fda.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a716d4ed.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a81e292b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a89d74c2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a94d09e5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/a9d40e02.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ab5346f4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ab59055e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/aee5f10d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b0e59380.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b0ed035a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b0f3e76e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b1159c4c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b30d5fda.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b3fb433b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b433981b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b66938e9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b727005e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b74d2bd5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b7a5b843.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b7db1890.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b81b93f0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b872f2b4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b92fd57f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/b936d1c6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ba8887ce.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/bc3f2570.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/bd43e1dd.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/bdacca6f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/bf53fb88.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/bf64f35b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c01eb047.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c28a8a30.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c44cc0c0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c491639e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c559d742.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c7f1359b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/c90bc37d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ca-bundle.crt create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ca-certificates.crt create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ca6e4ad9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cb1c3204.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cbb3f32b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cbf06781.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cc450945.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ccc52f49.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cd58d51e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cd8c0d63.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ce5e74ef.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/certSIGN_ROOT_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/certSIGN_Root_CA_G2.pem create mode 120000 pki/ca-trust/extracted/pem/directory-hash/cf701eeb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d06393bb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d16a5865.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d18e9066.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d39b0a2c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d41b5e2a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d4c339cb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d4dae3dd.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d52c538d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d59297b8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d6325660.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d7746a63.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d7e8dc79.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d887a5bb.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/d96b65e2.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/da0cfd1d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/da7377f6.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dbc54cab.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dbff3a01.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dc4d6a89.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dc99f41e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dd8e9d41.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ddcda989.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/de6d66f3.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/dfc0fe80.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/e-Szigno_Root_CA_2017.pem create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e071171e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e113c810.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e13665f9.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e18bfb83.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e35234b1.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e36a6752.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e442e424.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e48193cf.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e73d606e.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e7c037b4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e7dd1bc4.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e8651083.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e868b802.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/e8de2f56.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/ePKI_Root_Certification_Authority.pem create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ecccd8db.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ed39abd0.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ed858448.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/edcbddb5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ee37c333.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ee532fd5.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ee64a828.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/eed8c118.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ef954a4e.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_C3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_G3.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_C1.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_G1.pem create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f013ecaf.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f058632f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f081611a.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f0c70a8d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f0cd152c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f249de83.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f30dd6ad.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f387163d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f39fc864.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f459871d.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f51bb24c.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/f8fc53da.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fa5da96b.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fb5fa911.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fb717492.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fc5a8f99.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fd08c599.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fd64f3fc.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fde84897.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/fe8a2cd8.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/feffd413.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ff34af3f.0 create mode 120000 pki/ca-trust/extracted/pem/directory-hash/ffa7f1eb.0 create mode 100644 pki/ca-trust/extracted/pem/directory-hash/vTrus_ECC_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/directory-hash/vTrus_Root_CA.pem create mode 100644 pki/ca-trust/extracted/pem/email-ca-bundle.pem create mode 100644 pki/ca-trust/extracted/pem/objsign-ca-bundle.pem create mode 100644 pki/ca-trust/extracted/pem/tls-ca-bundle.pem create mode 100644 pki/ca-trust/source/README create mode 120000 pki/ca-trust/source/ca-bundle.legacy.crt create mode 120000 pki/java/cacerts create mode 100644 pki/mock/README.txt create mode 100644 pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL create mode 100644 pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 create mode 100644 pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 create mode 100644 pki/rpm-gpg/RPM-GPG-KEY-Rocky-9-Testing create mode 100644 pki/rpm-gpg/RPM-GPG-KEY-redhat-beta create mode 100644 pki/rpm-gpg/RPM-GPG-KEY-redhat-release create mode 120000 pki/tls/cert.pem create mode 120000 pki/tls/certs/ca-bundle.crt create mode 120000 pki/tls/certs/ca-bundle.trust.crt create mode 100644 pki/tls/ct_log_list.cnf create mode 120000 pki/tls/fips_local.cnf create mode 100644 pki/tls/openssl.cnf create mode 100644 printcap create mode 100644 profile create mode 100644 profile.d/bash_completion.sh create mode 100644 profile.d/colorgrep.csh create mode 100644 profile.d/colorgrep.sh create mode 100644 profile.d/colorls.csh create mode 100644 profile.d/colorls.sh create mode 100644 profile.d/colorxzgrep.csh create mode 100644 profile.d/colorxzgrep.sh create mode 100644 profile.d/colorzgrep.csh create mode 100644 profile.d/colorzgrep.sh create mode 120000 profile.d/console-login-helper-messages-profile.sh create mode 100644 profile.d/csh.local create mode 100644 profile.d/debuginfod.csh create mode 100644 profile.d/debuginfod.sh create mode 100644 profile.d/fbrehm.sh create mode 100644 profile.d/gawk.csh create mode 100644 profile.d/gawk.sh create mode 100644 profile.d/lang.csh create mode 100644 profile.d/lang.sh create mode 100644 profile.d/less.csh create mode 100644 profile.d/less.sh create mode 100644 profile.d/sh.local create mode 100644 profile.d/which2.csh create mode 100644 profile.d/which2.sh create mode 100644 protocols create mode 100644 rc.d/init.d/README create mode 100644 rc.d/rc.local create mode 120000 rc.local create mode 120000 redhat-release create mode 100644 redis/redis.conf create mode 100644 redis/sentinel.conf create mode 100644 request-key.conf create mode 100644 request-key.d/id_resolver.conf create mode 100644 resolv.conf create mode 100644 rocky-release create mode 100644 rocky-release-upstream create mode 100644 rpc create mode 100644 rsyslog.conf create mode 100644 rwtab.d/gssproxy create mode 100644 rwtab.d/logrotate create mode 100644 rwtab.d/sssd create mode 100644 screenrc create mode 100644 security/access.conf create mode 100644 security/chroot.conf create mode 100644 security/console.apps/config-util create mode 100644 security/console.apps/mock create mode 100644 security/console.handlers create mode 100644 security/console.perms create mode 100644 security/faillock.conf create mode 100644 security/group.conf create mode 100644 security/limits.conf create mode 100644 security/namespace.conf create mode 100755 security/namespace.init create mode 100644 security/opasswd create mode 100644 security/pam_env.conf create mode 100644 security/pwhistory.conf create mode 100644 security/pwquality.conf create mode 100644 security/sepermit.conf create mode 100644 security/time.conf create mode 100644 selinux/.config_backup create mode 100644 selinux/config create mode 100644 selinux/semanage.conf create mode 100644 selinux/targeted/.policy.sha512 create mode 100644 selinux/targeted/booleans.subs_dist create mode 100644 selinux/targeted/contexts/customizable_types create mode 100644 selinux/targeted/contexts/dbus_contexts create mode 100644 selinux/targeted/contexts/default_contexts create mode 100644 selinux/targeted/contexts/default_type create mode 100644 selinux/targeted/contexts/failsafe_context create mode 100644 selinux/targeted/contexts/files/file_contexts create mode 100644 selinux/targeted/contexts/files/file_contexts.bin create mode 100644 selinux/targeted/contexts/files/file_contexts.homedirs create mode 100644 selinux/targeted/contexts/files/file_contexts.homedirs.bin create mode 100644 selinux/targeted/contexts/files/file_contexts.local create mode 100644 selinux/targeted/contexts/files/file_contexts.subs create mode 100644 selinux/targeted/contexts/files/file_contexts.subs_dist create mode 100644 selinux/targeted/contexts/files/media create mode 100644 selinux/targeted/contexts/initrc_context create mode 100644 selinux/targeted/contexts/lxc_contexts create mode 100644 selinux/targeted/contexts/openssh_contexts create mode 100644 selinux/targeted/contexts/removable_context create mode 100644 selinux/targeted/contexts/securetty_types create mode 100644 selinux/targeted/contexts/sepgsql_contexts create mode 100644 selinux/targeted/contexts/snapperd_contexts create mode 100644 selinux/targeted/contexts/systemd_contexts create mode 100644 selinux/targeted/contexts/userhelper_context create mode 100644 selinux/targeted/contexts/users/guest_u create mode 100644 selinux/targeted/contexts/users/root create mode 100644 selinux/targeted/contexts/users/staff_u create mode 100644 selinux/targeted/contexts/users/sysadm_u create mode 100644 selinux/targeted/contexts/users/unconfined_u create mode 100644 selinux/targeted/contexts/users/user_u create mode 100644 selinux/targeted/contexts/users/xguest_u create mode 100644 selinux/targeted/contexts/virtual_domain_context create mode 100644 selinux/targeted/contexts/virtual_image_context create mode 100644 selinux/targeted/contexts/x_contexts create mode 100644 selinux/targeted/policy/policy.33 create mode 100644 selinux/targeted/setrans.conf create mode 100644 selinux/targeted/seusers create mode 100644 services create mode 100644 sestatus.conf create mode 100644 shadow create mode 100644 shadow- create mode 100644 shells create mode 100644 skel/.bash_logout create mode 100644 skel/.bash_profile create mode 100644 skel/.bashrc create mode 100644 ssh/moduli create mode 100644 ssh/ssh_config create mode 100644 ssh/ssh_config.d/50-redhat.conf create mode 100644 ssh/ssh_host_ecdsa_key create mode 100644 ssh/ssh_host_ecdsa_key.pub create mode 100644 ssh/ssh_host_ed25519_key create mode 100644 ssh/ssh_host_ed25519_key.pub create mode 100644 ssh/ssh_host_rsa_key create mode 100644 ssh/ssh_host_rsa_key.pub create mode 100644 ssh/sshd_config create mode 100644 ssh/sshd_config.d/01-permitrootlogin.conf create mode 100644 ssh/sshd_config.d/50-redhat.conf create mode 100644 ssh/sshd_config.rpmnew create mode 120000 ssl/cert.pem create mode 120000 ssl/certs create mode 120000 ssl/ct_log_list.cnf create mode 120000 ssl/openssl.cnf create mode 100644 subgid create mode 100644 subgid- create mode 100644 subuid create mode 100644 subuid- create mode 100644 sudo-ldap.conf create mode 100644 sudo.conf create mode 100644 sudoers create mode 100644 sysconfig/anaconda create mode 100644 sysconfig/chronyd create mode 100644 sysconfig/cpupower create mode 100644 sysconfig/crond create mode 100644 sysconfig/firewalld create mode 100644 sysconfig/irqbalance create mode 100644 sysconfig/kdump create mode 100644 sysconfig/kernel create mode 100644 sysconfig/man-db create mode 100644 sysconfig/network create mode 100644 sysconfig/network-scripts/readme-ifcfg-rh.txt create mode 100644 sysconfig/nftables.conf create mode 100644 sysconfig/rpcbind create mode 100644 sysconfig/rsyslog create mode 100644 sysconfig/run-parts create mode 120000 sysconfig/selinux create mode 100644 sysconfig/sshd create mode 100644 sysctl.conf create mode 120000 sysctl.d/99-sysctl.conf create mode 120000 system-release create mode 100644 system-release-cpe create mode 100644 systemd/coredump.conf create mode 100644 systemd/journald.conf create mode 100644 systemd/logind.conf create mode 100644 systemd/networkd.conf create mode 100644 systemd/pstore.conf create mode 100644 systemd/sleep.conf create mode 100644 systemd/system.conf create mode 120000 systemd/system/basic.target.wants/microcode.service create mode 120000 systemd/system/ctrl-alt-del.target create mode 120000 systemd/system/dbus-org.fedoraproject.FirewallD1.service create mode 120000 systemd/system/dbus-org.freedesktop.network1.service create mode 120000 systemd/system/dbus-org.freedesktop.nm-dispatcher.service create mode 120000 systemd/system/dbus.service create mode 120000 systemd/system/default.target create mode 120000 systemd/system/getty.target.wants/getty@tty1.service create mode 100644 systemd/system/getty@.service.d/noclear.conf create mode 120000 systemd/system/multi-user.target.wants/NetworkManager.service create mode 120000 systemd/system/multi-user.target.wants/auditd.service create mode 120000 systemd/system/multi-user.target.wants/chronyd.service create mode 120000 systemd/system/multi-user.target.wants/console-login-helper-messages-gensnippet-os-release.service create mode 120000 systemd/system/multi-user.target.wants/crond.service create mode 120000 systemd/system/multi-user.target.wants/firewalld.service create mode 120000 systemd/system/multi-user.target.wants/irqbalance.service create mode 120000 systemd/system/multi-user.target.wants/kdump.service create mode 120000 systemd/system/multi-user.target.wants/nfs-client.target create mode 120000 systemd/system/multi-user.target.wants/postgresql-16.service create mode 120000 systemd/system/multi-user.target.wants/redis.service create mode 120000 systemd/system/multi-user.target.wants/remote-fs.target create mode 120000 systemd/system/multi-user.target.wants/rpcbind.service create mode 120000 systemd/system/multi-user.target.wants/rsyslog.service create mode 120000 systemd/system/multi-user.target.wants/sshd.service create mode 120000 systemd/system/multi-user.target.wants/sssd.service create mode 120000 systemd/system/multi-user.target.wants/systemd-networkd.service create mode 120000 systemd/system/network-online.target.wants/NetworkManager-wait-online.service create mode 120000 systemd/system/network-online.target.wants/systemd-networkd-wait-online.service create mode 100644 systemd/system/redis-sentinel.service.d/limit.conf create mode 100644 systemd/system/redis.service.d/limit.conf create mode 120000 systemd/system/remote-fs.target.wants/nfs-client.target create mode 120000 systemd/system/sockets.target.wants/dbus.socket create mode 120000 systemd/system/sockets.target.wants/dm-event.socket create mode 120000 systemd/system/sockets.target.wants/rpcbind.socket create mode 120000 systemd/system/sockets.target.wants/sssd-kcm.socket create mode 120000 systemd/system/sockets.target.wants/systemd-networkd.socket create mode 120000 systemd/system/sysinit.target.wants/lvm2-lvmpolld.socket create mode 120000 systemd/system/sysinit.target.wants/lvm2-monitor.service create mode 120000 systemd/system/sysinit.target.wants/nis-domainname.service create mode 120000 systemd/system/sysinit.target.wants/selinux-autorelabel-mark.service create mode 120000 systemd/system/sysinit.target.wants/systemd-network-generator.service create mode 120000 systemd/system/timers.target.wants/dnf-makecache.timer create mode 120000 systemd/system/timers.target.wants/logrotate.timer create mode 100644 systemd/user.conf create mode 120000 systemd/user/basic.target.wants/systemd-tmpfiles-setup.service create mode 120000 systemd/user/dbus.service create mode 120000 systemd/user/sockets.target.wants/dbus.socket create mode 120000 systemd/user/timers.target.wants/systemd-tmpfiles-clean.timer create mode 100644 tpm2-tss/fapi-config.json create mode 100644 tpm2-tss/fapi-profiles/P_ECCP256SHA256.json create mode 100644 tpm2-tss/fapi-profiles/P_RSA2048SHA256.json create mode 100644 udev/udev.conf create mode 100644 vconsole.conf create mode 100644 vimrc create mode 100644 vimrc.orig create mode 100644 virc create mode 100644 wgetrc create mode 100644 xattr.conf create mode 120000 xdg/systemd/user create mode 120000 yum.conf create mode 100644 yum.repos.d/epel-cisco-openh264.repo create mode 100644 yum.repos.d/epel-next-testing.repo create mode 100644 yum.repos.d/epel-next.repo create mode 100644 yum.repos.d/epel-testing.repo create mode 100644 yum.repos.d/epel.repo create mode 100644 yum.repos.d/frank-brehm.repo create mode 100644 yum.repos.d/pgdg-redhat-all.repo create mode 100644 yum.repos.d/pgdg-redhat-all.repo.rpmnew create mode 100644 yum.repos.d/rocky-addons.repo create mode 100644 yum.repos.d/rocky-devel.repo create mode 100644 yum.repos.d/rocky-extras.repo create mode 100644 yum.repos.d/rocky.repo create mode 100644 yum.repos.d/rocky.repo.rpmnew create mode 120000 yum/pluginconf.d create mode 120000 yum/protected.d create mode 120000 yum/vars diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..576e938 --- /dev/null +++ b/.gitignore @@ -0,0 +1,57 @@ +# begin section managed by etckeeper (do not edit this section by hand) + +# new and old versions of conffiles, stored by dpkg +*.dpkg-* +# new and old versions of conffiles, stored by ucf +*.ucf-* + +# old versions of files +*.old + +# mount(8) records system state here, no need to store these +blkid.tab +blkid.tab.old + +# some other files in /etc that typically do not need to be tracked +nologin +ld.so.cache +prelink.cache +mtab +mtab.fuselock +.pwd.lock +*.LOCK +network/run +adjtime +udev/hwdb.bin +lvm/cache +lvm/archive +X11/xdm/authdir/authfiles/* +ntp.conf.dhcp +.initctl +webmin/fsdump/*.status +webmin/webmin/oscache +apparmor.d/cache/* +service/*/supervise/* +service/*/log/supervise/* +sv/*/supervise/* +sv/*/log/supervise/* +*.elc +*.pyc +*.pyo +init.d/.depend.* +openvpn/openvpn-status.log +cups/subscriptions.conf +cups/subscriptions.conf.O +fake-hwclock.data +check_mk/logwatch.state + +# editor temp files +*~ +.*.sw? +.sw? +\#*\# +DEADJOE + +# end section managed by etckeeper +motd +*.bak diff --git a/.updated b/.updated new file mode 100644 index 0000000..d60b908 --- /dev/null +++ b/.updated @@ -0,0 +1,4 @@ +# This file was created by systemd-update-done. Its only +# purpose is to hold a timestamp of the time this directory +# was updated. See man:systemd-update-done.service(8). +TIMESTAMP_NSEC=1732542343571754730 diff --git a/DIR_COLORS b/DIR_COLORS new file mode 100644 index 0000000..84f2417 --- /dev/null +++ b/DIR_COLORS @@ -0,0 +1,214 @@ +# This file goes in the /etc directory, and must be world readable. +# You can copy this file to .dir_colors in your $HOME directory to override +# the system defaults. + +# Configuration file for dircolors, a utility to help you set the +# LS_COLORS environment variable used by GNU ls with the --color option. + +# Copyright (C) 1996-2020 Free Software Foundation, Inc. +# Copying and distribution of this file, with or without modification, +# are permitted provided the copyright notice and this notice are preserved. + +# The keywords COLOR, OPTIONS, and EIGHTBIT (honored by the +# slackware version of dircolors) are recognized but ignored. + +# For compatibility, the pattern "^COLOR.*none" is recognized as a way to +# disable colorization. See https://bugzilla.redhat.com/1349579 for details. + +# Below are TERM entries, which can be a glob patterns, to match +# against the TERM environment variable to determine if it is colorizable. +TERM Eterm +TERM ansi +TERM *color* +TERM con[0-9]*x[0-9]* +TERM cons25 +TERM console +TERM cygwin +TERM dtterm +TERM gnome +TERM hurd +TERM jfbterm +TERM konsole +TERM kterm +TERM linux +TERM linux-c +TERM mlterm +TERM putty +TERM rxvt* +TERM screen* +TERM st +TERM terminator +TERM tmux* +TERM vt100 +TERM xterm* + +# Below are the color init strings for the basic file types. +# One can use codes for 256 or more colors supported by modern terminals. +# The default color codes use the capabilities of an 8 color terminal +# with some additional attributes as per the following codes: +# Attribute codes: +# 00=none 01=bold 04=underscore 05=blink 07=reverse 08=concealed +# Text color codes: +# 30=black 31=red 32=green 33=yellow 34=blue 35=magenta 36=cyan 37=white +# Background color codes: +# 40=black 41=red 42=green 43=yellow 44=blue 45=magenta 46=cyan 47=white +#NORMAL 00 # no color code at all +#FILE 00 # regular file: use no color at all +RESET 0 # reset to "normal" color +DIR 01;34 # directory +LINK 01;36 # symbolic link. (If you set this to 'target' instead of a + # numerical value, the color is as for the file pointed to.) +MULTIHARDLINK 00 # regular file with more than one link +FIFO 40;33 # pipe +SOCK 01;35 # socket +DOOR 01;35 # door +BLK 40;33;01 # block device driver +CHR 40;33;01 # character device driver +ORPHAN 40;31;01 # symlink to nonexistent file, or non-stat'able file ... +MISSING 01;37;41 # ... and the files they point to +SETUID 37;41 # file that is setuid (u+s) +SETGID 30;43 # file that is setgid (g+s) +CAPABILITY 30;41 # file with capability +STICKY_OTHER_WRITABLE 30;42 # dir that is sticky and other-writable (+t,o+w) +OTHER_WRITABLE 34;42 # dir that is other-writable (o+w) and not sticky +STICKY 37;44 # dir with the sticky bit set (+t) and not other-writable + +# This is for files with execute permission: +EXEC 01;32 + +# List any file extensions like '.gz' or '.tar' that you would like ls +# to colorize below. Put the extension, a space, and the color init string. +# (and any comments you want to add after a '#') + +# If you use DOS-style suffixes, you may want to uncomment the following: +#.cmd 01;32 # executables (bright green) +#.exe 01;32 +#.com 01;32 +#.btm 01;32 +#.bat 01;32 +# Or if you want to colorize scripts even if they do not have the +# executable bit actually set. +#.sh 01;32 +#.csh 01;32 + + # archives or compressed (bright red) +.tar 01;31 +.tgz 01;31 +.arc 01;31 +.arj 01;31 +.taz 01;31 +.lha 01;31 +.lz4 01;31 +.lzh 01;31 +.lzma 01;31 +.tlz 01;31 +.txz 01;31 +.tzo 01;31 +.t7z 01;31 +.zip 01;31 +.z 01;31 +.dz 01;31 +.gz 01;31 +.lrz 01;31 +.lz 01;31 +.lzo 01;31 +.xz 01;31 +.zst 01;31 +.tzst 01;31 +.bz2 01;31 +.bz 01;31 +.tbz 01;31 +.tbz2 01;31 +.tz 01;31 +.deb 01;31 +.rpm 01;31 +.jar 01;31 +.war 01;31 +.ear 01;31 +.sar 01;31 +.rar 01;31 +.alz 01;31 +.ace 01;31 +.zoo 01;31 +.cpio 01;31 +.7z 01;31 +.rz 01;31 +.cab 01;31 +.wim 01;31 +.swm 01;31 +.dwm 01;31 +.esd 01;31 + +# image formats +.jpg 01;35 +.jpeg 01;35 +.mjpg 01;35 +.mjpeg 01;35 +.gif 01;35 +.bmp 01;35 +.pbm 01;35 +.pgm 01;35 +.ppm 01;35 +.tga 01;35 +.xbm 01;35 +.xpm 01;35 +.tif 01;35 +.tiff 01;35 +.png 01;35 +.svg 01;35 +.svgz 01;35 +.mng 01;35 +.pcx 01;35 +.mov 01;35 +.mpg 01;35 +.mpeg 01;35 +.m2v 01;35 +.mkv 01;35 +.webm 01;35 +.webp 01;35 +.ogm 01;35 +.mp4 01;35 +.m4v 01;35 +.mp4v 01;35 +.vob 01;35 +.qt 01;35 +.nuv 01;35 +.wmv 01;35 +.asf 01;35 +.rm 01;35 +.rmvb 01;35 +.flc 01;35 +.avi 01;35 +.fli 01;35 +.flv 01;35 +.gl 01;35 +.dl 01;35 +.xcf 01;35 +.xwd 01;35 +.yuv 01;35 +.cgm 01;35 +.emf 01;35 + +# https://wiki.xiph.org/MIME_Types_and_File_Extensions +.ogv 01;35 +.ogx 01;35 + +# audio formats +.aac 01;36 +.au 01;36 +.flac 01;36 +.m4a 01;36 +.mid 01;36 +.midi 01;36 +.mka 01;36 +.mp3 01;36 +.mpc 01;36 +.ogg 01;36 +.ra 01;36 +.wav 01;36 + +# https://wiki.xiph.org/MIME_Types_and_File_Extensions +.oga 01;36 +.opus 01;36 +.spx 01;36 +.xspf 01;36 diff --git a/DIR_COLORS.lightbgcolor b/DIR_COLORS.lightbgcolor new file mode 100644 index 0000000..6402854 --- /dev/null +++ b/DIR_COLORS.lightbgcolor @@ -0,0 +1,216 @@ +# Configuration file for the color ls utility - modified for lighter backgrounds + +# This file goes in the /etc directory, and must be world readable. +# You can copy this file to .dir_colors in your $HOME directory to override +# the system defaults. + +# Configuration file for dircolors, a utility to help you set the +# LS_COLORS environment variable used by GNU ls with the --color option. + +# Copyright (C) 1996-2020 Free Software Foundation, Inc. +# Copying and distribution of this file, with or without modification, +# are permitted provided the copyright notice and this notice are preserved. + +# The keywords COLOR, OPTIONS, and EIGHTBIT (honored by the +# slackware version of dircolors) are recognized but ignored. + +# For compatibility, the pattern "^COLOR.*none" is recognized as a way to +# disable colorization. See https://bugzilla.redhat.com/1349579 for details. + +# Below are TERM entries, which can be a glob patterns, to match +# against the TERM environment variable to determine if it is colorizable. +TERM Eterm +TERM ansi +TERM *color* +TERM con[0-9]*x[0-9]* +TERM cons25 +TERM console +TERM cygwin +TERM dtterm +TERM gnome +TERM hurd +TERM jfbterm +TERM konsole +TERM kterm +TERM linux +TERM linux-c +TERM mlterm +TERM putty +TERM rxvt* +TERM screen* +TERM st +TERM terminator +TERM tmux* +TERM vt100 +TERM xterm* + +# Below are the color init strings for the basic file types. +# One can use codes for 256 or more colors supported by modern terminals. +# The default color codes use the capabilities of an 8 color terminal +# with some additional attributes as per the following codes: +# Attribute codes: +# 00=none 01=bold 04=underscore 05=blink 07=reverse 08=concealed +# Text color codes: +# 30=black 31=red 32=green 33=yellow 34=blue 35=magenta 36=cyan 37=white +# Background color codes: +# 40=black 41=red 42=green 43=yellow 44=blue 45=magenta 46=cyan 47=white +#NORMAL 00 # no color code at all +#FILE 00 # regular file: use no color at all +RESET 0 # reset to "normal" color +DIR 00;34 # directory +LINK 00;36 # symbolic link. (If you set this to 'target' instead of a + # numerical value, the color is as for the file pointed to.) +MULTIHARDLINK 00 # regular file with more than one link +FIFO 40;33 # pipe +SOCK 00;35 # socket +DOOR 00;35 # door +BLK 40;33;01 # block device driver +CHR 40;33;01 # character device driver +ORPHAN 40;31;01 # symlink to nonexistent file, or non-stat'able file ... +MISSING 01;37;41 # ... and the files they point to +SETUID 37;41 # file that is setuid (u+s) +SETGID 30;43 # file that is setgid (g+s) +CAPABILITY 30;41 # file with capability +STICKY_OTHER_WRITABLE 30;42 # dir that is sticky and other-writable (+t,o+w) +OTHER_WRITABLE 34;42 # dir that is other-writable (o+w) and not sticky +STICKY 37;44 # dir with the sticky bit set (+t) and not other-writable + +# This is for files with execute permission: +EXEC 00;32 + +# List any file extensions like '.gz' or '.tar' that you would like ls +# to colorize below. Put the extension, a space, and the color init string. +# (and any comments you want to add after a '#') + +# If you use DOS-style suffixes, you may want to uncomment the following: +#.cmd 01;32 # executables (bright green) +#.exe 01;32 +#.com 01;32 +#.btm 01;32 +#.bat 01;32 +# Or if you want to colorize scripts even if they do not have the +# executable bit actually set. +#.sh 01;32 +#.csh 01;32 + + # archives or compressed (bright red) +.tar 00;31 +.tgz 00;31 +.arc 00;31 +.arj 00;31 +.taz 00;31 +.lha 00;31 +.lz4 00;31 +.lzh 00;31 +.lzma 00;31 +.tlz 00;31 +.txz 00;31 +.tzo 00;31 +.t7z 00;31 +.zip 00;31 +.z 00;31 +.dz 00;31 +.gz 00;31 +.lrz 00;31 +.lz 00;31 +.lzo 00;31 +.xz 00;31 +.zst 00;31 +.tzst 00;31 +.bz2 00;31 +.bz 00;31 +.tbz 00;31 +.tbz2 00;31 +.tz 00;31 +.deb 00;31 +.rpm 00;31 +.jar 00;31 +.war 00;31 +.ear 00;31 +.sar 00;31 +.rar 00;31 +.alz 00;31 +.ace 00;31 +.zoo 00;31 +.cpio 00;31 +.7z 00;31 +.rz 00;31 +.cab 00;31 +.wim 00;31 +.swm 00;31 +.dwm 00;31 +.esd 00;31 + +# image formats +.jpg 00;35 +.jpeg 00;35 +.mjpg 00;35 +.mjpeg 00;35 +.gif 00;35 +.bmp 00;35 +.pbm 00;35 +.pgm 00;35 +.ppm 00;35 +.tga 00;35 +.xbm 00;35 +.xpm 00;35 +.tif 00;35 +.tiff 00;35 +.png 00;35 +.svg 00;35 +.svgz 00;35 +.mng 00;35 +.pcx 00;35 +.mov 00;35 +.mpg 00;35 +.mpeg 00;35 +.m2v 00;35 +.mkv 00;35 +.webm 00;35 +.webp 00;35 +.ogm 00;35 +.mp4 00;35 +.m4v 00;35 +.mp4v 00;35 +.vob 00;35 +.qt 00;35 +.nuv 00;35 +.wmv 00;35 +.asf 00;35 +.rm 00;35 +.rmvb 00;35 +.flc 00;35 +.avi 00;35 +.fli 00;35 +.flv 00;35 +.gl 00;35 +.dl 00;35 +.xcf 00;35 +.xwd 00;35 +.yuv 00;35 +.cgm 00;35 +.emf 00;35 + +# https://wiki.xiph.org/MIME_Types_and_File_Extensions +.ogv 00;35 +.ogx 00;35 + +# audio formats +.aac 00;36 +.au 00;36 +.flac 00;36 +.m4a 00;36 +.mid 00;36 +.midi 00;36 +.mka 00;36 +.mp3 00;36 +.mpc 00;36 +.ogg 00;36 +.ra 00;36 +.wav 00;36 + +# https://wiki.xiph.org/MIME_Types_and_File_Extensions +.oga 00;36 +.opus 00;36 +.spx 00;36 +.xspf 00;36 diff --git a/GREP_COLORS b/GREP_COLORS new file mode 100644 index 0000000..1ef53a6 --- /dev/null +++ b/GREP_COLORS @@ -0,0 +1,4 @@ +# Configuration file for the color grep utility + +# 'none' shuts colorization off. +#COLOR none diff --git a/NetworkManager/NetworkManager.conf b/NetworkManager/NetworkManager.conf new file mode 100644 index 0000000..287c9d0 --- /dev/null +++ b/NetworkManager/NetworkManager.conf @@ -0,0 +1,52 @@ +# Configuration file for NetworkManager. +# +# See "man 5 NetworkManager.conf" for details. +# +# The directories /usr/lib/NetworkManager/conf.d/ and /run/NetworkManager/conf.d/ +# can contain additional .conf snippets installed by packages. These files are +# read before NetworkManager.conf and have thus lowest priority. +# The directory /etc/NetworkManager/conf.d/ can contain additional .conf +# snippets. Those snippets are merged last and overwrite the settings from this main +# file. +# +# The files within one conf.d/ directory are read in asciibetical order. +# +# You can prevent loading a file /usr/lib/NetworkManager/conf.d/NAME.conf +# by having a file NAME.conf in either /run/NetworkManager/conf.d/ or /etc/NetworkManager/conf.d/. +# Likewise, snippets from /run can be prevented from loading by placing +# a file with the same name in /etc/NetworkManager/conf.d/. +# +# If two files define the same key, the one that is read afterwards will overwrite +# the previous one. + +[main] +#plugins=keyfile,ifcfg-rh + + +[logging] +# When debugging NetworkManager, enabling debug logging is of great help. +# +# Logfiles contain no passwords and little sensitive information. But please +# check before posting the file online. You can also personally hand over the +# logfile to a NM developer to treat it confidential. Meet us on #nm on Libera.Chat. +# +# You can also change the log-level at runtime via +# $ nmcli general logging level TRACE domains ALL +# However, usually it's cleaner to enable debug logging +# in the configuration and restart NetworkManager so that +# debug logging is enabled from the start. +# +# You will find the logfiles in syslog, for example via +# $ journalctl -u NetworkManager +# +# Please post full logfiles for bug reports without pre-filtering or truncation. +# Also, for debugging the entire `journalctl` output can be interesting. Don't +# limit unnecessarily with `journalctl -u`. Exceptions are if you are worried +# about private data. Check before posting logfiles! +# +# Note that debug logging of NetworkManager can be quite verbose. Some messages +# might be rate-limited by the logging daemon (see RateLimitIntervalSec, RateLimitBurst +# in man journald.conf). Please disable rate-limiting before collecting debug logs! +# +#level=TRACE +#domains=ALL diff --git a/NetworkManager/system-connections/enp1s0.nmconnection b/NetworkManager/system-connections/enp1s0.nmconnection new file mode 100644 index 0000000..b178993 --- /dev/null +++ b/NetworkManager/system-connections/enp1s0.nmconnection @@ -0,0 +1,18 @@ +[connection] +id=enp1s0 +uuid=929847a1-194b-3e4f-8d02-ca7e994ea05f +type=ethernet +autoconnect-priority=-999 +interface-name=enp1s0 +timestamp=1668667499 + +[ethernet] + +[ipv4] +method=auto + +[ipv6] +addr-gen-mode=eui64 +method=auto + +[proxy] diff --git a/X11/xinit/xinitrc.d/50-systemd-user.sh b/X11/xinit/xinitrc.d/50-systemd-user.sh new file mode 100755 index 0000000..839e75f --- /dev/null +++ b/X11/xinit/xinitrc.d/50-systemd-user.sh @@ -0,0 +1,15 @@ +#!/usr/bin/sh +# SPDX-License-Identifier: LGPL-2.1-or-later +# +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it +# under the terms of the GNU Lesser General Public License as published by +# the Free Software Foundation; either version 2.1 of the License, or +# (at your option) any later version. + +systemctl --user import-environment DISPLAY XAUTHORITY + +if command -v dbus-update-activation-environment >/dev/null 2>&1; then + dbus-update-activation-environment DISPLAY XAUTHORITY +fi diff --git a/X11/xorg.conf.d/00-keyboard.conf b/X11/xorg.conf.d/00-keyboard.conf new file mode 100644 index 0000000..c217c6f --- /dev/null +++ b/X11/xorg.conf.d/00-keyboard.conf @@ -0,0 +1,9 @@ +# Written by systemd-localed(8), read by systemd-localed and Xorg. It's +# probably wise not to edit this file manually. Use localectl(1) to +# instruct systemd-localed to update it. +Section "InputClass" + Identifier "system-keyboard" + MatchIsKeyboard "on" + Option "XkbLayout" "de" + Option "XkbVariant" "nodeadkeys" +EndSection diff --git a/aliases b/aliases new file mode 100644 index 0000000..5d7b9e2 --- /dev/null +++ b/aliases @@ -0,0 +1,97 @@ +# +# Aliases in this file will NOT be expanded in the header from +# Mail, but WILL be visible over networks or from /bin/mail. +# +# >>>>>>>>>> The program "newaliases" must be run after +# >> NOTE >> this file is updated for any changes to +# >>>>>>>>>> show through to sendmail. +# + +# Basic system aliases -- these MUST be present. +mailer-daemon: postmaster +postmaster: root + +# General redirections for pseudo accounts. +bin: root +daemon: root +adm: root +lp: root +sync: root +shutdown: root +halt: root +mail: root +news: root +uucp: root +operator: root +games: root +gopher: root +ftp: root +nobody: root +radiusd: root +nut: root +dbus: root +vcsa: root +canna: root +wnn: root +rpm: root +nscd: root +pcap: root +apache: root +webalizer: root +dovecot: root +fax: root +quagga: root +radvd: root +pvm: root +amandabackup: root +privoxy: root +ident: root +named: root +xfs: root +gdm: root +mailnull: root +postgres: root +sshd: root +smmsp: root +postfix: root +netdump: root +ldap: root +squid: root +ntp: root +mysql: root +desktop: root +rpcuser: root +rpc: root +nfsnobody: root +pcp: root + +ingres: root +system: root +toor: root +manager: root +dumper: root +abuse: root + +newsadm: news +newsadmin: news +usenet: news +ftpadm: ftp +ftpadmin: ftp +ftp-adm: ftp +ftp-admin: ftp +www: webmaster +webmaster: root +noc: root +security: root +hostmaster: root +info: postmaster +marketing: postmaster +sales: postmaster +support: postmaster + + +# trap decode to catch security attacks +decode: root + +# Person who should get root's mail +#root: marc diff --git a/alternatives/apropos b/alternatives/apropos new file mode 120000 index 0000000..b969a50 --- /dev/null +++ b/alternatives/apropos @@ -0,0 +1 @@ +/usr/bin/apropos.man-db \ No newline at end of file diff --git a/alternatives/apropos.1.gz b/alternatives/apropos.1.gz new file mode 120000 index 0000000..c64b8ac --- /dev/null +++ b/alternatives/apropos.1.gz @@ -0,0 +1 @@ +/usr/share/man/man1/apropos.man-db.1.gz \ No newline at end of file diff --git a/alternatives/arptables b/alternatives/arptables new file mode 120000 index 0000000..f8fcc7b --- /dev/null +++ b/alternatives/arptables @@ -0,0 +1 @@ +/usr/sbin/arptables-nft \ No newline at end of file diff --git a/alternatives/arptables-helper b/alternatives/arptables-helper new file mode 120000 index 0000000..583ad4b --- /dev/null +++ b/alternatives/arptables-helper @@ -0,0 +1 @@ +/usr/libexec/arptables-nft-helper \ No newline at end of file diff --git a/alternatives/arptables-man b/alternatives/arptables-man new file mode 120000 index 0000000..8428beb --- /dev/null +++ b/alternatives/arptables-man @@ -0,0 +1 @@ +/usr/share/man/man8/arptables-nft.8.gz \ No newline at end of file diff --git a/alternatives/arptables-restore b/alternatives/arptables-restore new file mode 120000 index 0000000..95e87dc --- /dev/null +++ b/alternatives/arptables-restore @@ -0,0 +1 @@ +/usr/sbin/arptables-nft-restore \ No newline at end of file diff --git a/alternatives/arptables-restore-man b/alternatives/arptables-restore-man new file mode 120000 index 0000000..31a32ce --- /dev/null +++ b/alternatives/arptables-restore-man @@ -0,0 +1 @@ +/usr/share/man/man8/arptables-nft-restore.8.gz \ No newline at end of file diff --git a/alternatives/arptables-save b/alternatives/arptables-save new file mode 120000 index 0000000..9bb1596 --- /dev/null +++ b/alternatives/arptables-save @@ -0,0 +1 @@ +/usr/sbin/arptables-nft-save \ No newline at end of file diff --git a/alternatives/arptables-save-man b/alternatives/arptables-save-man new file mode 120000 index 0000000..681ddf5 --- /dev/null +++ b/alternatives/arptables-save-man @@ -0,0 +1 @@ +/usr/share/man/man8/arptables-nft-save.8.gz \ No newline at end of file diff --git a/alternatives/cifs-idmap-plugin b/alternatives/cifs-idmap-plugin new file mode 120000 index 0000000..b301650 --- /dev/null +++ b/alternatives/cifs-idmap-plugin @@ -0,0 +1 @@ +/usr/lib64/cifs-utils/cifs_idmap_sss.so \ No newline at end of file diff --git a/alternatives/ebtables b/alternatives/ebtables new file mode 120000 index 0000000..8d5f660 --- /dev/null +++ b/alternatives/ebtables @@ -0,0 +1 @@ +/usr/sbin/ebtables-nft \ No newline at end of file diff --git a/alternatives/ebtables-man b/alternatives/ebtables-man new file mode 120000 index 0000000..a0ba3da --- /dev/null +++ b/alternatives/ebtables-man @@ -0,0 +1 @@ +/usr/share/man/man8/ebtables-nft.8.gz \ No newline at end of file diff --git a/alternatives/ebtables-restore b/alternatives/ebtables-restore new file mode 120000 index 0000000..c2e5813 --- /dev/null +++ b/alternatives/ebtables-restore @@ -0,0 +1 @@ +/usr/sbin/ebtables-nft-restore \ No newline at end of file diff --git a/alternatives/ebtables-save b/alternatives/ebtables-save new file mode 120000 index 0000000..600f8c2 --- /dev/null +++ b/alternatives/ebtables-save @@ -0,0 +1 @@ +/usr/sbin/ebtables-nft-save \ No newline at end of file diff --git a/alternatives/ip6tables b/alternatives/ip6tables new file mode 120000 index 0000000..4c913e2 --- /dev/null +++ b/alternatives/ip6tables @@ -0,0 +1 @@ +/usr/sbin/ip6tables-nft \ No newline at end of file diff --git a/alternatives/ip6tables-restore b/alternatives/ip6tables-restore new file mode 120000 index 0000000..46918a9 --- /dev/null +++ b/alternatives/ip6tables-restore @@ -0,0 +1 @@ +/usr/sbin/ip6tables-nft-restore \ No newline at end of file diff --git a/alternatives/ip6tables-save b/alternatives/ip6tables-save new file mode 120000 index 0000000..04525f0 --- /dev/null +++ b/alternatives/ip6tables-save @@ -0,0 +1 @@ +/usr/sbin/ip6tables-nft-save \ No newline at end of file diff --git a/alternatives/iptables b/alternatives/iptables new file mode 120000 index 0000000..c55fd50 --- /dev/null +++ b/alternatives/iptables @@ -0,0 +1 @@ +/usr/sbin/iptables-nft \ No newline at end of file diff --git a/alternatives/iptables-restore b/alternatives/iptables-restore new file mode 120000 index 0000000..9553657 --- /dev/null +++ b/alternatives/iptables-restore @@ -0,0 +1 @@ +/usr/sbin/iptables-nft-restore \ No newline at end of file diff --git a/alternatives/iptables-save b/alternatives/iptables-save new file mode 120000 index 0000000..051d68b --- /dev/null +++ b/alternatives/iptables-save @@ -0,0 +1 @@ +/usr/sbin/iptables-nft-save \ No newline at end of file diff --git a/alternatives/ld b/alternatives/ld new file mode 120000 index 0000000..08404ca --- /dev/null +++ b/alternatives/ld @@ -0,0 +1 @@ +/usr/bin/ld.bfd \ No newline at end of file diff --git a/alternatives/libnssckbi.so.x86_64 b/alternatives/libnssckbi.so.x86_64 new file mode 120000 index 0000000..c914916 --- /dev/null +++ b/alternatives/libnssckbi.so.x86_64 @@ -0,0 +1 @@ +/usr/lib64/pkcs11/p11-kit-trust.so \ No newline at end of file diff --git a/alternatives/llvm-config-16 b/alternatives/llvm-config-16 new file mode 120000 index 0000000..4b0a1f2 --- /dev/null +++ b/alternatives/llvm-config-16 @@ -0,0 +1 @@ +/usr/bin/llvm-config-64 \ No newline at end of file diff --git a/alternatives/man b/alternatives/man new file mode 120000 index 0000000..933628e --- /dev/null +++ b/alternatives/man @@ -0,0 +1 @@ +/usr/bin/man.man-db \ No newline at end of file diff --git a/alternatives/man.1.gz b/alternatives/man.1.gz new file mode 120000 index 0000000..84b4fd4 --- /dev/null +++ b/alternatives/man.1.gz @@ -0,0 +1 @@ +/usr/share/man/man1/man.man-db.1.gz \ No newline at end of file diff --git a/alternatives/pgsql-clusterdb b/alternatives/pgsql-clusterdb new file mode 120000 index 0000000..11ced32 --- /dev/null +++ b/alternatives/pgsql-clusterdb @@ -0,0 +1 @@ +/usr/pgsql-16/bin/clusterdb \ No newline at end of file diff --git a/alternatives/pgsql-clusterdbman b/alternatives/pgsql-clusterdbman new file mode 120000 index 0000000..3dd67a4 --- /dev/null +++ b/alternatives/pgsql-clusterdbman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/clusterdb.1 \ No newline at end of file diff --git a/alternatives/pgsql-createdb b/alternatives/pgsql-createdb new file mode 120000 index 0000000..4f4d052 --- /dev/null +++ b/alternatives/pgsql-createdb @@ -0,0 +1 @@ +/usr/pgsql-16/bin/createdb \ No newline at end of file diff --git a/alternatives/pgsql-createdbman b/alternatives/pgsql-createdbman new file mode 120000 index 0000000..c6d848e --- /dev/null +++ b/alternatives/pgsql-createdbman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/createdb.1 \ No newline at end of file diff --git a/alternatives/pgsql-createuser b/alternatives/pgsql-createuser new file mode 120000 index 0000000..a467396 --- /dev/null +++ b/alternatives/pgsql-createuser @@ -0,0 +1 @@ +/usr/pgsql-16/bin/createuser \ No newline at end of file diff --git a/alternatives/pgsql-createuserman b/alternatives/pgsql-createuserman new file mode 120000 index 0000000..8ac659e --- /dev/null +++ b/alternatives/pgsql-createuserman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/createuser.1 \ No newline at end of file diff --git a/alternatives/pgsql-dropdb b/alternatives/pgsql-dropdb new file mode 120000 index 0000000..84c8b64 --- /dev/null +++ b/alternatives/pgsql-dropdb @@ -0,0 +1 @@ +/usr/pgsql-16/bin/dropdb \ No newline at end of file diff --git a/alternatives/pgsql-dropdbman b/alternatives/pgsql-dropdbman new file mode 120000 index 0000000..0ba026a --- /dev/null +++ b/alternatives/pgsql-dropdbman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/dropdb.1 \ No newline at end of file diff --git a/alternatives/pgsql-dropuser b/alternatives/pgsql-dropuser new file mode 120000 index 0000000..d958bee --- /dev/null +++ b/alternatives/pgsql-dropuser @@ -0,0 +1 @@ +/usr/pgsql-16/bin/dropuser \ No newline at end of file diff --git a/alternatives/pgsql-dropuserman b/alternatives/pgsql-dropuserman new file mode 120000 index 0000000..3493df1 --- /dev/null +++ b/alternatives/pgsql-dropuserman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/dropuser.1 \ No newline at end of file diff --git a/alternatives/pgsql-ld-conf b/alternatives/pgsql-ld-conf new file mode 120000 index 0000000..78b8af5 --- /dev/null +++ b/alternatives/pgsql-ld-conf @@ -0,0 +1 @@ +/usr/pgsql-16/share/postgresql-16-libs.conf \ No newline at end of file diff --git a/alternatives/pgsql-pg_basebackup b/alternatives/pgsql-pg_basebackup new file mode 120000 index 0000000..85685ae --- /dev/null +++ b/alternatives/pgsql-pg_basebackup @@ -0,0 +1 @@ +/usr/pgsql-16/bin/pg_basebackup \ No newline at end of file diff --git a/alternatives/pgsql-pg_basebackupman b/alternatives/pgsql-pg_basebackupman new file mode 120000 index 0000000..eb10fc4 --- /dev/null +++ b/alternatives/pgsql-pg_basebackupman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/pg_basebackup.1 \ No newline at end of file diff --git a/alternatives/pgsql-pg_dump b/alternatives/pgsql-pg_dump new file mode 120000 index 0000000..824b054 --- /dev/null +++ b/alternatives/pgsql-pg_dump @@ -0,0 +1 @@ +/usr/pgsql-16/bin/pg_dump \ No newline at end of file diff --git a/alternatives/pgsql-pg_dumpall b/alternatives/pgsql-pg_dumpall new file mode 120000 index 0000000..c58f411 --- /dev/null +++ b/alternatives/pgsql-pg_dumpall @@ -0,0 +1 @@ +/usr/pgsql-16/bin/pg_dumpall \ No newline at end of file diff --git a/alternatives/pgsql-pg_dumpallman b/alternatives/pgsql-pg_dumpallman new file mode 120000 index 0000000..e53db53 --- /dev/null +++ b/alternatives/pgsql-pg_dumpallman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/pg_dumpall.1 \ No newline at end of file diff --git a/alternatives/pgsql-pg_dumpman b/alternatives/pgsql-pg_dumpman new file mode 120000 index 0000000..27f5d8e --- /dev/null +++ b/alternatives/pgsql-pg_dumpman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/pg_dump.1 \ No newline at end of file diff --git a/alternatives/pgsql-pg_restore b/alternatives/pgsql-pg_restore new file mode 120000 index 0000000..52f84d3 --- /dev/null +++ b/alternatives/pgsql-pg_restore @@ -0,0 +1 @@ +/usr/pgsql-16/bin/pg_restore \ No newline at end of file diff --git a/alternatives/pgsql-pg_restoreman b/alternatives/pgsql-pg_restoreman new file mode 120000 index 0000000..47c47e5 --- /dev/null +++ b/alternatives/pgsql-pg_restoreman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/pg_restore.1 \ No newline at end of file diff --git a/alternatives/pgsql-psql b/alternatives/pgsql-psql new file mode 120000 index 0000000..5ca902e --- /dev/null +++ b/alternatives/pgsql-psql @@ -0,0 +1 @@ +/usr/pgsql-16/bin/psql \ No newline at end of file diff --git a/alternatives/pgsql-psqlman b/alternatives/pgsql-psqlman new file mode 120000 index 0000000..a1dffd3 --- /dev/null +++ b/alternatives/pgsql-psqlman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/psql.1 \ No newline at end of file diff --git a/alternatives/pgsql-reindexdb b/alternatives/pgsql-reindexdb new file mode 120000 index 0000000..334da51 --- /dev/null +++ b/alternatives/pgsql-reindexdb @@ -0,0 +1 @@ +/usr/pgsql-16/bin/reindexdb \ No newline at end of file diff --git a/alternatives/pgsql-reindexdbman b/alternatives/pgsql-reindexdbman new file mode 120000 index 0000000..e6917bc --- /dev/null +++ b/alternatives/pgsql-reindexdbman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/reindexdb.1 \ No newline at end of file diff --git a/alternatives/pgsql-vacuumdb b/alternatives/pgsql-vacuumdb new file mode 120000 index 0000000..d65e7d6 --- /dev/null +++ b/alternatives/pgsql-vacuumdb @@ -0,0 +1 @@ +/usr/pgsql-16/bin/vacuumdb \ No newline at end of file diff --git a/alternatives/pgsql-vacuumdbman b/alternatives/pgsql-vacuumdbman new file mode 120000 index 0000000..368369c --- /dev/null +++ b/alternatives/pgsql-vacuumdbman @@ -0,0 +1 @@ +/usr/pgsql-16/share/man/man1/vacuumdb.1 \ No newline at end of file diff --git a/alternatives/soelim b/alternatives/soelim new file mode 120000 index 0000000..6a37a27 --- /dev/null +++ b/alternatives/soelim @@ -0,0 +1 @@ +/usr/bin/soelim.groff \ No newline at end of file diff --git a/alternatives/soelim.1.gz b/alternatives/soelim.1.gz new file mode 120000 index 0000000..dadbf37 --- /dev/null +++ b/alternatives/soelim.1.gz @@ -0,0 +1 @@ +/usr/share/man/man1/soelim.groff.1.gz \ No newline at end of file diff --git a/alternatives/whatis b/alternatives/whatis new file mode 120000 index 0000000..553948e --- /dev/null +++ b/alternatives/whatis @@ -0,0 +1 @@ +/usr/bin/whatis.man-db \ No newline at end of file diff --git a/alternatives/whatis.1.gz b/alternatives/whatis.1.gz new file mode 120000 index 0000000..f5a8579 --- /dev/null +++ b/alternatives/whatis.1.gz @@ -0,0 +1 @@ +/usr/share/man/man1/whatis.man-db.1.gz \ No newline at end of file diff --git a/anacrontab b/anacrontab new file mode 100644 index 0000000..78c6f8c --- /dev/null +++ b/anacrontab @@ -0,0 +1,16 @@ +# /etc/anacrontab: configuration file for anacron + +# See anacron(8) and anacrontab(5) for details. + +SHELL=/bin/sh +PATH=/sbin:/bin:/usr/sbin:/usr/bin +MAILTO=root +# the maximal random delay added to the base delay of the jobs +RANDOM_DELAY=45 +# the jobs will be started during the following hours only +START_HOURS_RANGE=3-22 + +#period in days delay in minutes job-identifier command +1 5 cron.daily nice run-parts /etc/cron.daily +7 25 cron.weekly nice run-parts /etc/cron.weekly +@monthly 45 cron.monthly nice run-parts /etc/cron.monthly diff --git a/audit/audit-stop.rules b/audit/audit-stop.rules new file mode 100644 index 0000000..7e23cff --- /dev/null +++ b/audit/audit-stop.rules @@ -0,0 +1,8 @@ +# These rules are loaded when the audit daemon stops +# if configured to do so. + +# Disable auditing +-e 0 + +# Delete all rules +-D diff --git a/audit/audit.rules b/audit/audit.rules new file mode 100644 index 0000000..d3d6609 --- /dev/null +++ b/audit/audit.rules @@ -0,0 +1,6 @@ +## This file is automatically generated from /etc/audit/rules.d +-D +-b 8192 +-f 1 +--backlog_wait_time 60000 + diff --git a/audit/auditd.conf b/audit/auditd.conf new file mode 100644 index 0000000..26760cd --- /dev/null +++ b/audit/auditd.conf @@ -0,0 +1,40 @@ +# +# This file controls the configuration of the audit daemon +# + +local_events = yes +write_logs = yes +log_file = /var/log/audit/audit.log +log_group = root +log_format = ENRICHED +flush = INCREMENTAL_ASYNC +freq = 50 +max_log_file = 8 +num_logs = 5 +priority_boost = 4 +name_format = NONE +##name = mydomain +max_log_file_action = ROTATE +space_left = 75 +space_left_action = SYSLOG +verify_email = yes +action_mail_acct = root +admin_space_left = 50 +admin_space_left_action = SUSPEND +disk_full_action = SUSPEND +disk_error_action = SUSPEND +use_libwrap = yes +##tcp_listen_port = 60 +tcp_listen_queue = 5 +tcp_max_per_addr = 1 +##tcp_client_ports = 1024-65535 +tcp_client_max_idle = 0 +transport = TCP +krb5_principal = auditd +##krb5_key_file = /etc/audit/audit.key +distribute_network = no +q_depth = 2000 +overflow_action = SYSLOG +max_restarts = 10 +plugin_dir = /etc/audit/plugins.d +end_of_event_timeout = 2 diff --git a/audit/rules.d/audit.rules b/audit/rules.d/audit.rules new file mode 100644 index 0000000..b86d66f --- /dev/null +++ b/audit/rules.d/audit.rules @@ -0,0 +1,13 @@ +## First rule - delete all +-D + +## Increase the buffers to survive stress events. +## Make this bigger for busy systems +-b 8192 + +## This determine how long to wait in burst of events +--backlog_wait_time 60000 + +## Set failure mode to syslog +-f 1 + diff --git a/authselect/user-nsswitch.conf b/authselect/user-nsswitch.conf new file mode 100644 index 0000000..447bdae --- /dev/null +++ b/authselect/user-nsswitch.conf @@ -0,0 +1,70 @@ +# +# /etc/nsswitch.conf +# +# Name Service Switch config file. This file should be +# sorted with the most-used services at the beginning. +# +# Valid databases are: aliases, ethers, group, gshadow, hosts, +# initgroups, netgroup, networks, passwd, protocols, publickey, +# rpc, services, and shadow. +# +# Valid service provider entries include (in alphabetical order): +# +# compat Use /etc files plus *_compat pseudo-db +# db Use the pre-processed /var/db files +# dns Use DNS (Domain Name Service) +# files Use the local files in /etc +# hesiod Use Hesiod (DNS) for user lookups +# +# See `info libc 'NSS Basics'` for more information. +# +# Commonly used alternative service providers (may need installation): +# +# ldap Use LDAP directory server +# myhostname Use systemd host names +# mymachines Use systemd machine names +# mdns*, mdns*_minimal Use Avahi mDNS/DNS-SD +# resolve Use systemd resolved resolver +# sss Use System Security Services Daemon (sssd) +# systemd Use systemd for dynamic user option +# winbind Use Samba winbind support +# wins Use Samba wins support +# wrapper Use wrapper module for testing +# +# Notes: +# +# 'sssd' performs its own 'files'-based caching, so it should generally +# come before 'files'. +# +# WARNING: Running nscd with a secondary caching service like sssd may +# lead to unexpected behaviour, especially with how long +# entries are cached. +# +# Installation instructions: +# +# To use 'db', install the appropriate package(s) (provide 'makedb' and +# libnss_db.so.*), and place the 'db' in front of 'files' for entries +# you want to be looked up first in the databases, like this: +# +# passwd: db files +# shadow: db files +# group: db files + +# In order of likelihood of use to accelerate lookup. +passwd: sss files systemd +shadow: files +group: sss files systemd +hosts: files dns myhostname +services: files sss +netgroup: sss +automount: files sss + +aliases: files +ethers: files +gshadow: files +# Allow initgroups to default to the setting for group. +# initgroups: files +networks: files dns +protocols: files +publickey: files +rpc: files diff --git a/bash_completion.d/authselect-completion.sh b/bash_completion.d/authselect-completion.sh new file mode 100644 index 0000000..84a63c9 --- /dev/null +++ b/bash_completion.d/authselect-completion.sh @@ -0,0 +1,214 @@ +# +# Authors: +# Tomas Halman +# +# Copyright (C) 2019 Red Hat +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see . +# +# +# provides autocompletion for authselect command +# + +_authselect_completions() +{ + local COMMANDS + local command + local possibleopts + + function is_valid_command() { + local cmd + + for cmd in "${COMMANDS[@]}"; do + if [[ "$cmd" = "$1" ]]; then + return 0 + fi + done + return 1 + } + + function get_command() { + local opt + + if [[ $COMP_CWORD -lt 2 ]] ; then + return + fi + for opt in "${COMP_WORDS[@]:0:$COMP_CWORD}"; do + if is_valid_command "$opt"; then + echo "$opt" + return + fi + done + } + + function get_command_param() { + local havecmd=0 + local len=${#COMP_WORDS[@]}-1 + + if [[ "$command" = "" ]]; then + return + fi + havecmd=0 + for (( i=0; i<$len; i++ )); do + if [[ "$havecmd" = "1" ]] ; then + if [[ "${COMP_WORDS[$i]}" =~ ^[-=] || "${COMP_WORDS[$i-1]}" = "=" ]] ; then + continue + fi + echo "${COMP_WORDS[$i]}" + return + fi + if [[ "${COMP_WORDS[$i]}" = "$command" ]] ; then + havecmd=1 + fi + done + } + + function get_profile() { + case "$command" in + select|show|requirements|test|list-features) + get_command_param + ;; + enable-feature|disable-feature) + authselect current 2>/dev/null | head -n1 | cut -d" " -f3 + ;; + esac + } + + function get_command_keywords() { + local profile + + case "$command" in + select|requirements|test) + profile="$(get_profile)" + if [[ "$profile" != "" ]] ; then + authselect list-features "$profile" 2>/dev/null + fi + ;; + esac + } + + function get_command_options() { + if [[ "${COMP_WORDS[$COMP_CWORD]}" =~ ^- ]] ; then + case "$command" in + select) + echo "--force --quiet --nobackup --backup=" + ;; + apply-changes|disable-feature) + echo "--backup=" + ;; + enable-feature) + echo "--backup= --quiet" + ;; + current|backup-list) + echo "--raw" + ;; + create-profile) + echo "--vendor --base-on= --base-on-default" \ + "--symlink-meta --symlink-nsswitch --symlink-pam" \ + "--symlink-dconf --symlink=" + ;; + test) + echo "--all --nsswitch --system-auth --password-auth" \ + "--smartcard-auth --fingerprint-auth --postlogin" \ + "--dconf-db --dconf-lock" + ;; + esac + fi + } + + function get_global_options() { + if [[ "${COMP_WORDS[$COMP_CWORD]}" =~ ^- ]] ; then + echo "--debug --trace --warn --help" + fi + } + + function get_option_params() { + local opt + + if [[ $COMP_CWORD -gt 2 && "${COMP_WORDS[$COMP_CWORD-1]}" = "=" ]] ; then + opt="${COMP_WORDS[$COMP_CWORD-2]}" + else + if [[ $COMP_CWORD -gt 1 ]] ; then + opt="${COMP_WORDS[$COMP_CWORD-1]}" + fi + fi + case "$opt" in + --base-on) + authselect list 2>/dev/null | cut -d" " -f2 + ;; + --symlink) + echo "dconf-db dconf-locks fingerprint-auth nsswitch.conf" \ + "password-auth postlogin smartcard-auth system-auth" \ + "README REQUIREMENTS" + ;; + esac + + } + + function get_command_params() { + local i + local profile + + if [[ "$command" = "" ]]; then + return + fi + for (( i=$COMP_CWORD-1; i>1; i-- )); do + opt="${COMP_WORDS[$i]}" + if [[ "$opt" = "$command" ]] ; then + break + fi + if [[ "$opt" =~ ^[-=] || "${COMP_WORDS[$i-1]}" = "=" ]] ; then + continue + fi + return + done + case "$command" in + select|show|requirements|test|list-features) + authselect list 2>/dev/null | cut -d" " -f2 + ;; + backup-remove|backup-restore) + authselect backup-list 2>/dev/null | cut -d" " -f1 + ;; + enable-feature|disable-feature) + profile="$(get_profile)" + if [[ "$profile" != "" ]] ; then + authselect list-features "$profile" 2>/dev/null + fi + ;; + esac + } + + COMMANDS=(select apply-changes list list-features show requirements current + check test enable-feature disable-feature create-profile + backup-list backup-remove backup-restore) + + possibleopts="$(get_option_params)" + if [[ "$possibleopts" != "" ]]; then + if [[ "${COMP_WORDS[$COMP_CWORD]}" = "=" ]]; then + COMPREPLY=($(compgen -W "$possibleopts")) + else + COMPREPLY=($(compgen -W "$possibleopts" -- "${COMP_WORDS[$COMP_CWORD]}")) + fi + else + command="$(get_command)" + if [[ "$command" = "" ]]; then + possibleopts="$(get_global_options) ${COMMANDS[@]}" + else + possibleopts="$(get_global_options) $(get_command_params) $(get_command_keywords) $(get_command_options)" + fi + COMPREPLY=($(compgen -W "$possibleopts" -- "${COMP_WORDS[$COMP_CWORD]}")) + fi +} + +complete -F _authselect_completions authselect diff --git a/bash_completion.d/redefine_filedir b/bash_completion.d/redefine_filedir new file mode 100644 index 0000000..f285bb2 --- /dev/null +++ b/bash_completion.d/redefine_filedir @@ -0,0 +1,66 @@ +# This is a copy of the _filedir function in bash_completion, included +# and (re)defined separately here because some versions of Adobe +# Reader, if installed, are known to override this function with an +# incompatible version, causing various problems. +# +# https://bugzilla.redhat.com/677446 +# http://forums.adobe.com/thread/745833 + +_filedir() +{ + local IFS=$'\n' + + _tilde "${cur-}" || return + + local -a toks + local reset arg=${1-} + + if [[ $arg == -d ]]; then + reset=$(shopt -po noglob) + set -o noglob + toks=($(compgen -d -- "${cur-}")) + IFS=' ' + $reset + IFS=$'\n' + else + local quoted + _quote_readline_by_ref "${cur-}" quoted + + # Munge xspec to contain uppercase version too + # https://lists.gnu.org/archive/html/bug-bash/2010-09/msg00036.html + # news://news.gmane.io/4C940E1C.1010304@case.edu + local xspec=${arg:+"!*.@($arg|${arg^^})"} plusdirs=() + + # Use plusdirs to get dir completions if we have a xspec; if we don't, + # there's no need, dirs come along with other completions. Don't use + # plusdirs quite yet if fallback is in use though, in order to not ruin + # the fallback condition with the "plus" dirs. + local opts=(-f -X "$xspec") + [[ $xspec ]] && plusdirs=(-o plusdirs) + [[ ${COMP_FILEDIR_FALLBACK-} || -z ${plusdirs-} ]] || + opts+=("${plusdirs[@]}") + + reset=$(shopt -po noglob) + set -o noglob + toks+=($(compgen "${opts[@]}" -- $quoted)) + IFS=' ' + $reset + IFS=$'\n' + + # Try without filter if it failed to produce anything and configured to + [[ -n ${COMP_FILEDIR_FALLBACK-} && -n $arg && ${#toks[@]} -lt 1 ]] && { + reset=$(shopt -po noglob) + set -o noglob + toks+=($(compgen -f ${plusdirs+"${plusdirs[@]}"} -- $quoted)) + IFS=' ' + $reset + IFS=$'\n' + } + fi + + if ((${#toks[@]} != 0)); then + # 2>/dev/null for direct invocation, e.g. in the _filedir unit test + compopt -o filenames 2>/dev/null + COMPREPLY+=("${toks[@]}") + fi +} # _filedir() diff --git a/bashrc b/bashrc new file mode 100644 index 0000000..b0740cb --- /dev/null +++ b/bashrc @@ -0,0 +1,89 @@ +# /etc/bashrc + +# System wide functions and aliases +# Environment stuff goes in /etc/profile + +# It's NOT a good idea to change this file unless you know what you +# are doing. It's much better to create a custom.sh shell script in +# /etc/profile.d/ to make custom changes to your environment, as this +# will prevent the need for merging in future updates. + +# Prevent doublesourcing +if [ -z "$BASHRCSOURCED" ]; then + BASHRCSOURCED="Y" + + # are we an interactive shell? + if [ "$PS1" ]; then + if [ -z "$PROMPT_COMMAND" ]; then + case $TERM in + xterm*|vte*) + if [ -e /etc/sysconfig/bash-prompt-xterm ]; then + PROMPT_COMMAND=/etc/sysconfig/bash-prompt-xterm + else + PROMPT_COMMAND='printf "\033]0;%s@%s:%s\007" "${USER}" "${HOSTNAME%%.*}" "${PWD/#$HOME/\~}"' + fi + ;; + screen*) + if [ -e /etc/sysconfig/bash-prompt-screen ]; then + PROMPT_COMMAND=/etc/sysconfig/bash-prompt-screen + else + PROMPT_COMMAND='printf "\033k%s@%s:%s\033\\" "${USER}" "${HOSTNAME%%.*}" "${PWD/#$HOME/\~}"' + fi + ;; + *) + [ -e /etc/sysconfig/bash-prompt-default ] && PROMPT_COMMAND=/etc/sysconfig/bash-prompt-default + ;; + esac + fi + # Turn on parallel history + shopt -s histappend + history -a + # Turn on checkwinsize + shopt -s checkwinsize + [ "$PS1" = "\\s-\\v\\\$ " ] && PS1="[\u@\h \W]\\$ " + # You might want to have e.g. tty in prompt (e.g. more virtual machines) + # and console windows + # If you want to do so, just add e.g. + # if [ "$PS1" ]; then + # PS1="[\u@\h:\l \W]\\$ " + # fi + # to your custom modification shell script in /etc/profile.d/ directory + fi + + if ! shopt -q login_shell ; then # We're not a login shell + # Need to redefine pathmunge, it gets undefined at the end of /etc/profile + pathmunge () { + case ":${PATH}:" in + *:"$1":*) + ;; + *) + if [ "$2" = "after" ] ; then + PATH=$PATH:$1 + else + PATH=$1:$PATH + fi + esac + } + + # Set default umask for non-login shell only if it is set to 0 + [ `umask` -eq 0 ] && umask 022 + + SHELL=/bin/bash + # Only display echos from profile.d scripts if we are no login shell + # and interactive - otherwise just process them to set envvars + for i in /etc/profile.d/*.sh; do + if [ -r "$i" ]; then + if [ "$PS1" ]; then + . "$i" + else + . "$i" >/dev/null + fi + fi + done + + unset i + unset -f pathmunge + fi + +fi +# vim:ts=4:sw=4 diff --git a/bindresvport.blacklist b/bindresvport.blacklist new file mode 100644 index 0000000..67ff771 --- /dev/null +++ b/bindresvport.blacklist @@ -0,0 +1,18 @@ +# +# This file contains a list of port numbers between 600 and 1024, +# which should not be used by bindresvport. bindresvport is mostly +# called by RPC services. This mostly solves the problem, that a +# RPC service uses a well known port of another service. +# +623 # ASF, used by IPMI on some cards +631 # cups +636 # ldaps +664 # Secure ASF, used by IPMI on some cards +749 # Kerberos V kadmin +774 # rpasswd +873 # rsyncd +921 # lwresd +992 # SSL-enabled telnet +993 # imaps +994 # irc +995 # pops diff --git a/byobu/backend b/byobu/backend new file mode 100644 index 0000000..d71e61c --- /dev/null +++ b/byobu/backend @@ -0,0 +1,4 @@ +# BYOBU_BACKEND can currently be "screen" or "tmux" +# Override this on a per-user basis by editing "$BYOBU_CONFIG_DIR/backend" +# or by launching either "byobu-screen" or "byobu-tmux" instead of "byobu". +BYOBU_BACKEND="tmux" diff --git a/byobu/socketdir b/byobu/socketdir new file mode 100644 index 0000000..05ab041 --- /dev/null +++ b/byobu/socketdir @@ -0,0 +1,11 @@ +# Set the location of the socket directory that byobu will use. +# On Debian/Ubuntu systems, this is in /var/run/screen, but on +# other distros, it might be elsewhere, such as /tmp/screens +# depending on your compilation. +# +# This file will be sourced by both shell scripts and python code, +# so please ensure that: +# * the variable name is SOCKETDIR +# * there is no space around the "=" +# * and that the path value is quoted +SOCKETDIR="/var/run/screen" diff --git a/chrony.conf b/chrony.conf new file mode 100644 index 0000000..c3d0f5a --- /dev/null +++ b/chrony.conf @@ -0,0 +1,50 @@ +# Use public servers from the pool.ntp.org project. +# Please consider joining the pool (https://www.pool.ntp.org/join.html). +pool 2.rocky.pool.ntp.org iburst + +# Use NTP servers from DHCP. +sourcedir /run/chrony-dhcp + +# Record the rate at which the system clock gains/losses time. +driftfile /var/lib/chrony/drift + +# Allow the system clock to be stepped in the first three updates +# if its offset is larger than 1 second. +makestep 1.0 3 + +# Enable kernel synchronization of the real-time clock (RTC). +rtcsync + +# Enable hardware timestamping on all interfaces that support it. +#hwtimestamp * + +# Increase the minimum number of selectable sources required to adjust +# the system clock. +#minsources 2 + +# Allow NTP client access from local network. +#allow 192.168.0.0/16 + +# Serve time even if not synchronized to a time source. +#local stratum 10 + +# Require authentication (nts or key option) for all NTP sources. +#authselectmode require + +# Specify file containing keys for NTP authentication. +keyfile /etc/chrony.keys + +# Save NTS keys and cookies. +ntsdumpdir /var/lib/chrony + +# Insert/delete leap seconds by slewing instead of stepping. +#leapsecmode slew + +# Get TAI-UTC offset and leap seconds from the system tz database. +leapsectz right/UTC + +# Specify directory for log files. +logdir /var/log/chrony + +# Select which information is logged. +#log measurements statistics tracking diff --git a/chrony.keys b/chrony.keys new file mode 100644 index 0000000..65b6be2 --- /dev/null +++ b/chrony.keys @@ -0,0 +1,13 @@ +# This is an example chrony keys file. It enables authentication of NTP +# packets with symmetric keys when its location is specified by the keyfile +# directive in chrony.conf(5). It should be readable only by root and the +# user under which chronyd is running. +# +# Don't use the example keys! It's recommended to generate random keys using +# the chronyc keygen command. + +# Examples of valid keys: + +#1 MD5 AVeryLongAndRandomPassword +#2 MD5 HEX:12114855C7931009B4049EF3EFC48A139C3F989F +#3 SHA1 HEX:B2159C05D6A219673A3B7E896B6DE07F6A440995 diff --git a/cifs-utils/idmap-plugin b/cifs-utils/idmap-plugin new file mode 120000 index 0000000..b53a5fc --- /dev/null +++ b/cifs-utils/idmap-plugin @@ -0,0 +1 @@ +/etc/alternatives/cifs-idmap-plugin \ No newline at end of file diff --git a/colordiffrc b/colordiffrc new file mode 100644 index 0000000..e0598ed --- /dev/null +++ b/colordiffrc @@ -0,0 +1,30 @@ +# Example colordiffrc file for dark backgrounds +# +# Set banner=no to suppress authorship info at top of +# colordiff output +banner=no +# By default, when colordiff output is being redirected +# to a file, it detects this and does not colour-highlight +# To make the patch file *include* colours, change the option +# below to 'yes' +color_patches=no +# Sometimes it can be useful to specify which diff command to +# use: that can be specified here +diff_cmd=diff +# +# available colours are: white, yellow, green, blue, +# cyan, red, magenta, black, +# darkwhite, darkyellow, darkgreen, +# darkblue, darkcyan, darkred, +# darkmagenta, darkblack +# +# Can also specify 'none', 'normal' or 'off' which are all +# aliases for the same thing, namely "don't colour highlight +# this, use the default output colour" +# +plain=off +newtext=darkgreen +oldtext=darkred +diffstuff=darkcyan +cvsstuff=cyan +difffile=white diff --git a/containers/policy.json b/containers/policy.json new file mode 100644 index 0000000..eb5934e --- /dev/null +++ b/containers/policy.json @@ -0,0 +1,32 @@ +{ + "default": [ + { + "type": "insecureAcceptAnything" + } + ], + "transports": { + "docker": { + "registry.access.redhat.com": [ + { + "type": "signedBy", + "keyType": "GPGKeys", + "keyPaths": ["/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release", "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta"] + } + ], + "registry.redhat.io": [ + { + "type": "signedBy", + "keyType": "GPGKeys", + "keyPaths": ["/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release", "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta"] + } + ] + }, + "docker-daemon": { + "": [ + { + "type": "insecureAcceptAnything" + } + ] + } + } +} diff --git a/containers/registries.conf b/containers/registries.conf new file mode 100644 index 0000000..d966aea --- /dev/null +++ b/containers/registries.conf @@ -0,0 +1,79 @@ +# For more information on this configuration file, see containers-registries.conf(5). +# +# NOTE: RISK OF USING UNQUALIFIED IMAGE NAMES +# We recommend always using fully qualified image names including the registry +# server (full dns name), namespace, image name, and tag +# (e.g., registry.redhat.io/ubi8/ubi:latest). Pulling by digest (i.e., +# quay.io/repository/name@digest) further eliminates the ambiguity of tags. +# When using short names, there is always an inherent risk that the image being +# pulled could be spoofed. For example, a user wants to pull an image named +# `foobar` from a registry and expects it to come from myregistry.com. If +# myregistry.com is not first in the search list, an attacker could place a +# different `foobar` image at a registry earlier in the search list. The user +# would accidentally pull and run the attacker's image and code rather than the +# intended content. We recommend only adding registries which are completely +# trusted (i.e., registries which don't allow unknown or anonymous users to +# create accounts with arbitrary names). This will prevent an image from being +# spoofed, squatted or otherwise made insecure. If it is necessary to use one +# of these registries, it should be added at the end of the list. +# +# # An array of host[:port] registries to try when pulling an unqualified image, in order. + +unqualified-search-registries = ["registry.access.redhat.com", "registry.redhat.io", "docker.io"] + +# [[registry]] +# # The "prefix" field is used to choose the relevant [[registry]] TOML table; +# # (only) the TOML table with the longest match for the input image name +# # (taking into account namespace/repo/tag/digest separators) is used. +# # +# # The prefix can also be of the form: *.example.com for wildcard subdomain +# # matching. +# # +# # If the prefix field is missing, it defaults to be the same as the "location" field. +# prefix = "example.com/foo" +# +# # If true, unencrypted HTTP as well as TLS connections with untrusted +# # certificates are allowed. +# insecure = false +# +# # If true, pulling images with matching names is forbidden. +# blocked = false +# +# # The physical location of the "prefix"-rooted namespace. +# # +# # By default, this is equal to "prefix" (in which case "prefix" can be omitted +# # and the [[registry]] TOML table can only specify "location"). +# # +# # Example: Given +# # prefix = "example.com/foo" +# # location = "internal-registry-for-example.net/bar" +# # requests for the image example.com/foo/myimage:latest will actually work with the +# # internal-registry-for-example.net/bar/myimage:latest image. +# +# # The location can be empty iff prefix is in a +# # wildcarded format: "*.example.com". In this case, the input reference will +# # be used as-is without any rewrite. +# location = internal-registry-for-example.com/bar" +# +# # (Possibly-partial) mirrors for the "prefix"-rooted namespace. +# # +# # The mirrors are attempted in the specified order; the first one that can be +# # contacted and contains the image will be used (and if none of the mirrors contains the image, +# # the primary location specified by the "registry.location" field, or using the unmodified +# # user-specified reference, is tried last). +# # +# # Each TOML table in the "mirror" array can contain the following fields, with the same semantics +# # as if specified in the [[registry]] TOML table directly: +# # - location +# # - insecure +# [[registry.mirror]] +# location = "example-mirror-0.local/mirror-for-foo" +# [[registry.mirror]] +# location = "example-mirror-1.local/mirrors/foo" +# insecure = true +# # Given the above, a pull of example.com/foo/image:latest will try: +# # 1. example-mirror-0.local/mirror-for-foo/image:latest +# # 2. example-mirror-1.local/mirrors/foo/image:latest +# # 3. internal-registry-for-example.net/bar/image:latest +# # in order, and use the first one that exists. +short-name-mode = "enforcing" diff --git a/containers/registries.conf.d/000-shortnames.conf b/containers/registries.conf.d/000-shortnames.conf new file mode 100644 index 0000000..54303c9 --- /dev/null +++ b/containers/registries.conf.d/000-shortnames.conf @@ -0,0 +1,151 @@ +[aliases] + # almalinux + "almalinux" = "docker.io/library/almalinux" + "almalinux-minimal" = "docker.io/library/almalinux-minimal" + # Amazon Linux + "amazonlinux" = "public.ecr.aws/amazonlinux/amazonlinux" + # Arch Linux + "archlinux" = "docker.io/library/archlinux" + # centos + "centos" = "quay.io/centos/centos" + # containers + "skopeo" = "quay.io/skopeo/stable" + "buildah" = "quay.io/buildah/stable" + "podman" = "quay.io/podman/stable" + "hello" = "quay.io/podman/hello" + "hello-world" = "quay.io/podman/hello" + # docker + "alpine" = "docker.io/library/alpine" + "docker" = "docker.io/library/docker" + "registry" = "docker.io/library/registry" + "swarm" = "docker.io/library/swarm" + # Fedora + "fedora-bootc" = "registry.fedoraproject.org/fedora-bootc" + "fedora-minimal" = "registry.fedoraproject.org/fedora-minimal" + "fedora" = "registry.fedoraproject.org/fedora" + # Gentoo + "gentoo" = "docker.io/gentoo/stage3" + # openSUSE + "opensuse/tumbleweed" = "registry.opensuse.org/opensuse/tumbleweed" + "opensuse/tumbleweed-dnf" = "registry.opensuse.org/opensuse/tumbleweed-dnf" + "opensuse/tumbleweed-microdnf" = "registry.opensuse.org/opensuse/tumbleweed-microdnf" + "opensuse/leap" = "registry.opensuse.org/opensuse/leap" + "opensuse/busybox" = "registry.opensuse.org/opensuse/busybox" + "tumbleweed" = "registry.opensuse.org/opensuse/tumbleweed" + "tumbleweed-dnf" = "registry.opensuse.org/opensuse/tumbleweed-dnf" + "tumbleweed-microdnf" = "registry.opensuse.org/opensuse/tumbleweed-microdnf" + "leap" = "registry.opensuse.org/opensuse/leap" + "leap-dnf" = "registry.opensuse.org/opensuse/leap-dnf" + "leap-microdnf" = "registry.opensuse.org/opensuse/leap-microdnf" + "tw-busybox" = "registry.opensuse.org/opensuse/busybox" + # OTel (Open Telemetry) - opentelemetry.io + "otel/autoinstrumentation-go" = "docker.io/otel/autoinstrumentation-go" + "otel/autoinstrumentation-nodejs" = "docker.io/otel/autoinstrumentation-nodejs" + "otel/autoinstrumentation-python" = "docker.io/otel/autoinstrumentation-python" + "otel/autoinstrumentation-java" = "docker.io/otel/autoinstrumentation-java" + "otel/autoinstrumentation-dotnet" = "docker.io/otel/autoinstrumentation-dotnet" + "otel/opentelemetry-collector" = "docker.io/otel/opentelemetry-collector" + "otel/opentelemetry-collector-contrib" = "docker.io/otel/opentelemetry-collector-contrib" + "otel/opentelemetry-collector-contrib-dev" = "docker.io/otel/opentelemetry-collector-contrib-dev" + "otel/opentelemetry-collector-k8s" = "docker.io/otel/opentelemetry-collector-k8s" + "otel/opentelemetry-operator" = "docker.io/otel/opentelemetry-operator" + "otel/opentelemetry-operator-bundle" = "docker.io/otel/opentelemetry-operator-bundle" + "otel/operator-opamp-bridge" = "docker.io/otel/operator-opamp-bridge" + "otel/semconvgen" = "docker.io/otel/semconvgen" + "otel/weaver" = "docker.io/otel/weaver" + # SUSE + "suse/sle15" = "registry.suse.com/suse/sle15" + "suse/sles12sp5" = "registry.suse.com/suse/sles12sp5" + "suse/sles12sp4" = "registry.suse.com/suse/sles12sp4" + "suse/sles12sp3" = "registry.suse.com/suse/sles12sp3" + "sle15" = "registry.suse.com/suse/sle15" + "sles12sp5" = "registry.suse.com/suse/sles12sp5" + "sles12sp4" = "registry.suse.com/suse/sles12sp4" + "sles12sp3" = "registry.suse.com/suse/sles12sp3" + "bci/bci-base" = "registry.suse.com/bci/bci-base" + "bci/bci-micro" = "registry.suse.com/bci/bci-micro" + "bci/bci-minimal" = "registry.suse.com/bci/bci-minimal" + "bci/bci-busybox" = "registry.suse.com/bci/bci-busybox" + # Red Hat Enterprise Linux + "rhel" = "registry.access.redhat.com/rhel" + "rhel6" = "registry.access.redhat.com/rhel6" + "rhel7" = "registry.access.redhat.com/rhel7" + "rhel7.9" = "registry.access.redhat.com/rhel7.9" + "rhel-atomic" = "registry.access.redhat.com/rhel-atomic" + "rhel9-bootc" = "registry.redhat.io/rhel9/rhel-bootc" + "rhel-minimal" = "registry.access.redhat.com/rhel-minimal" + "rhel-init" = "registry.access.redhat.com/rhel-init" + "rhel7-atomic" = "registry.access.redhat.com/rhel7-atomic" + "rhel7-minimal" = "registry.access.redhat.com/rhel7-minimal" + "rhel7-init" = "registry.access.redhat.com/rhel7-init" + "rhel7/rhel" = "registry.access.redhat.com/rhel7/rhel" + "rhel7/rhel-atomic" = "registry.access.redhat.com/rhel7/rhel7/rhel-atomic" + "ubi7/ubi" = "registry.access.redhat.com/ubi7/ubi" + "ubi7/ubi-minimal" = "registry.access.redhat.com/ubi7-minimal" + "ubi7/ubi-init" = "registry.access.redhat.com/ubi7-init" + "ubi7" = "registry.access.redhat.com/ubi7" + "ubi7-init" = "registry.access.redhat.com/ubi7-init" + "ubi7-minimal" = "registry.access.redhat.com/ubi7-minimal" + "rhel8" = "registry.access.redhat.com/ubi8" + "rhel8-init" = "registry.access.redhat.com/ubi8-init" + "rhel8-minimal" = "registry.access.redhat.com/ubi8-minimal" + "rhel8-micro" = "registry.access.redhat.com/ubi8-micro" + "ubi8" = "registry.access.redhat.com/ubi8" + "ubi8-minimal" = "registry.access.redhat.com/ubi8-minimal" + "ubi8-init" = "registry.access.redhat.com/ubi8-init" + "ubi8-micro" = "registry.access.redhat.com/ubi8-micro" + "ubi8/ubi" = "registry.access.redhat.com/ubi8/ubi" + "ubi8/ubi-minimal" = "registry.access.redhat.com/ubi8-minimal" + "ubi8/ubi-init" = "registry.access.redhat.com/ubi8-init" + "ubi8/ubi-micro" = "registry.access.redhat.com/ubi8-micro" + "ubi8/podman" = "registry.access.redhat.com/ubi8/podman" + "ubi8/buildah" = "registry.access.redhat.com/ubi8/buildah" + "ubi8/skopeo" = "registry.access.redhat.com/ubi8/skopeo" + "rhel9" = "registry.access.redhat.com/ubi9" + "rhel9-init" = "registry.access.redhat.com/ubi9-init" + "rhel9-minimal" = "registry.access.redhat.com/ubi9-minimal" + "rhel9-micro" = "registry.access.redhat.com/ubi9-micro" + "ubi9" = "registry.access.redhat.com/ubi9" + "ubi9-minimal" = "registry.access.redhat.com/ubi9-minimal" + "ubi9-init" = "registry.access.redhat.com/ubi9-init" + "ubi9-micro" = "registry.access.redhat.com/ubi9-micro" + "ubi9/ubi" = "registry.access.redhat.com/ubi9/ubi" + "ubi9/ubi-minimal" = "registry.access.redhat.com/ubi9-minimal" + "ubi9/ubi-init" = "registry.access.redhat.com/ubi9-init" + "ubi9/ubi-micro" = "registry.access.redhat.com/ubi9-micro" + "ubi9/podman" = "registry.access.redhat.com/ubi9/podman" + "ubi9/buildah" = "registry.access.redhat.com/ubi9/buildah" + "ubi9/skopeo" = "registry.access.redhat.com/ubi9/skopeo" + # Rocky Linux + "rockylinux" = "quay.io/rockylinux/rockylinux" + # Debian + "debian" = "docker.io/library/debian" + # Kali Linux + "kali-bleeding-edge" = "docker.io/kalilinux/kali-bleeding-edge" + "kali-dev" = "docker.io/kalilinux/kali-dev" + "kali-experimental" = "docker.io/kalilinux/kali-experimental" + "kali-last-release" = "docker.io/kalilinux/kali-last-release" + "kali-rolling" = "docker.io/kalilinux/kali-rolling" + # Ubuntu + "ubuntu" = "docker.io/library/ubuntu" + # Oracle Linux + "oraclelinux" = "container-registry.oracle.com/os/oraclelinux" + # busybox + "busybox" = "docker.io/library/busybox" + # php + "php" = "docker.io/library/php" + # python + "python" = "docker.io/library/python" + # rust + "rust" = "docker.io/library/rust" + # node + "node" = "docker.io/library/node" + # Grafana Labs + "grafana/agent" = "docker.io/grafana/agent" + "grafana/grafana" = "docker.io/grafana/grafana" + "grafana/k6" = "docker.io/grafana/k6" + "grafana/loki" = "docker.io/grafana/loki" + "grafana/mimir" = "docker.io/grafana/mimir" + "grafana/oncall" = "docker.io/grafana/oncall" + "grafana/pyroscope" = "docker.io/grafana/pyroscope" + "grafana/tempo" = "docker.io/grafana/tempo" diff --git a/containers/registries.conf.d/001-rhel-shortnames.conf b/containers/registries.conf.d/001-rhel-shortnames.conf new file mode 100644 index 0000000..0f56fff --- /dev/null +++ b/containers/registries.conf.d/001-rhel-shortnames.conf @@ -0,0 +1,5382 @@ +[aliases] +"21analytics/21travel" = "registry.21analytics.ch/21analytics/21travel" +"3scale-amp2/3scale-auth-wasm-rhel8" = "registry.redhat.io/3scale-amp2/3scale-auth-wasm-rhel8" +"3scale-amp2/3scale-rhel7-operator" = "registry.redhat.io/3scale-amp2/3scale-rhel7-operator" +"3scale-amp2/apicast-gateway-rhel8" = "registry.redhat.io/3scale-amp2/apicast-gateway-rhel8" +"3scale-amp2/apicast-rhel7-operator" = "registry.redhat.io/3scale-amp2/apicast-rhel7-operator" +"3scale-amp2/backend-rhel8" = "registry.redhat.io/3scale-amp2/backend-rhel8" +"3scale-amp2/memcached-rhel7" = "registry.redhat.io/3scale-amp2/memcached-rhel7" +"3scale-amp2/searchd-rhel7" = "registry.redhat.io/3scale-amp2/searchd-rhel7" +"3scale-amp2/system-rhel7" = "registry.redhat.io/3scale-amp2/system-rhel7" +"3scale-amp2/toolbox-rhel8" = "registry.redhat.io/3scale-amp2/toolbox-rhel8" +"3scale-amp2/zync-rhel8" = "registry.redhat.io/3scale-amp2/zync-rhel8" +"3scale-amp2/zync-rhel9" = "registry.redhat.io/3scale-amp2/zync-rhel9" +"3scale-mas/3scale-rhel7-operator" = "registry.redhat.io/3scale-mas/3scale-rhel7-operator" +"3scale-mas/apicast-rhel7-operator" = "registry.redhat.io/3scale-mas/apicast-rhel7-operator" +"3scale-mas/backend-rhel8" = "registry.redhat.io/3scale-mas/backend-rhel8" +"3scale-mas/marin3r-operator-bundle" = "registry.redhat.io/3scale-mas/marin3r-operator-bundle" +"3scale-mas/marin3r-rhel8-operator" = "registry.redhat.io/3scale-mas/marin3r-rhel8-operator" +"3scale-mas/memcached-rhel7" = "registry.redhat.io/3scale-mas/memcached-rhel7" +"3scale-mas/searchd-rhel7" = "registry.redhat.io/3scale-mas/searchd-rhel7" +"3scale-mas/system-rhel7" = "registry.redhat.io/3scale-mas/system-rhel7" +"3scale-mas/toolbox-rhel8" = "registry.redhat.io/3scale-mas/toolbox-rhel8" +"3scale-mas/zync-rhel8" = "registry.redhat.io/3scale-mas/zync-rhel8" +"3scale-mas/zync-rhel9" = "registry.redhat.io/3scale-mas/zync-rhel9" +"5f7d444f29373868204229e0/corent-jtrac-application" = "registry.connect.redhat.com/5f7d444f29373868204229e0/corent-jtrac-application" +"5f7d444f29373868204229e0/corent-jtrac-operator" = "registry.connect.redhat.com/5f7d444f29373868204229e0/corent-jtrac-operator" +"5f7d444f29373868204229e0/corent-operator-bundle" = "registry.connect.redhat.com/5f7d444f29373868204229e0/corent-operator-bundle" +"5gc/controller-amf-amf-comm-mp" = "artnj.zte.com.cn/5gc/controller-amf-amf-comm-mp" +"5gc/vru-amf-comm" = "artnj.zte.com.cn/5gc/vru-amf-comm" +"5gc/vru-amf-comm-mp" = "artnj.zte.com.cn/5gc/vru-amf-comm-mp" +"5gc/vru-amf-mp" = "artnj.zte.com.cn/5gc/vru-amf-mp" +"5gc/vru-arch-sync" = "artnj.zte.com.cn/5gc/vru-arch-sync" +"5gc/vru-http-lb" = "artnj.zte.com.cn/5gc/vru-http-lb" +"5gc/vru-http-lb-mp" = "artnj.zte.com.cn/5gc/vru-http-lb-mp" +"5gc/vru-ips" = "artnj.zte.com.cn/5gc/vru-ips" +"5gc/vru-ips-mp" = "artnj.zte.com.cn/5gc/vru-ips-mp" +"5gc/vru-oam-ccmf" = "artnj.zte.com.cn/5gc/vru-oam-ccmf" +"5gc/vru-oam-gateway" = "artnj.zte.com.cn/5gc/vru-oam-gateway" +"5gc/vru-oam-main" = "artnj.zte.com.cn/5gc/vru-oam-main" +"5gc/vru-oam-postgres" = "artnj.zte.com.cn/5gc/vru-oam-postgres" +"5gc/vru-oam-umf" = "artnj.zte.com.cn/5gc/vru-oam-umf" +"5gc/vru-oam-upgrade" = "artnj.zte.com.cn/5gc/vru-oam-upgrade" +"5gc/vru-sig" = "artnj.zte.com.cn/5gc/vru-sig" +"5gc/vru-sig-mp" = "artnj.zte.com.cn/5gc/vru-sig-mp" +"5gc/vru-tmsp-amu" = "artnj.zte.com.cn/5gc/vru-tmsp-amu" +"5gc/vru-tmsp-mgt" = "artnj.zte.com.cn/5gc/vru-tmsp-mgt" +"5gc/vru-tmsp-mp" = "artnj.zte.com.cn/5gc/vru-tmsp-mp" +"5gc/vru-tmsp-rosng" = "artnj.zte.com.cn/5gc/vru-tmsp-rosng" +"5gc/vru-tmsp-smc" = "artnj.zte.com.cn/5gc/vru-tmsp-smc" +"61725cc480cc9b10e9278631/vsphere-kubernetes-drivers-operator" = "registry.connect.redhat.com/61725cc480cc9b10e9278631/vsphere-kubernetes-drivers-operator" +"a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/frontend" = "artifacts.geta12.com/a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/frontend" +"a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/server" = "artifacts.geta12.com/a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/server" +"a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/server-init" = "artifacts.geta12.com/a12-docker/com.mgmtp.a12.projecttemplate/ubi-template-test-only/server-init" +"a5f1f0cc7ac3db90370970f9b/tawon" = "registry.connect.redhat.com/a5f1f0cc7ac3db90370970f9b/tawon" +"aarna/amcop" = "registry.connect.redhat.com/aarna/amcop" +"abdul_ansari/icashpro" = "quay.io/abdul_ansari/icashpro" +"abinitio/cooperating-system-runtime-operator" = "registry.connect.redhat.com/abinitio/cooperating-system-runtime-operator" +"abinitio/runtime-operator-bundle" = "registry.connect.redhat.com/abinitio/runtime-operator-bundle" +"ac/acwsp-svc-ubi8" = "pubdockerregistry.incognito.com/ac/acwsp-svc-ubi8" +"acidaes/businessnext-app" = "docker.io/acidaes/businessnext-app" +"acidaes/datanext.pyspark_engine" = "docker.io/acidaes/datanext.pyspark_engine" +"ac/ipms-svc-ubi8" = "pubdockerregistry.incognito.com/ac/ipms-svc-ubi8" +"ac/ndp-svc-ubi8" = "pubdockerregistry.incognito.com/ac/ndp-svc-ubi8" +"ac/wmc-svc-ubi8" = "pubdockerregistry.incognito.com/ac/wmc-svc-ubi8" +"adc-openshift/advantage-code" = "platform2.hclets.com:9876/adc-openshift/advantage-code" +"address-parsing-service" = "bds-docker-release.jfrog.io/address-parsing-service" +"admin-site" = "bds-docker-release.jfrog.io/admin-site" +"advanced-cluster-security/rhacs-central-db-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-central-db-rhel8" +"advanced-cluster-security/rhacs-collector-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8" +"advanced-cluster-security/rhacs-collector-slim-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8" +"advanced-cluster-security/rhacs-main-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8" +"advanced-cluster-security/rhacs-operator-bundle" = "registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle" +"advanced-cluster-security/rhacs-rhel8-operator" = "registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator" +"advanced-cluster-security/rhacs-roxctl-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8" +"advanced-cluster-security/rhacs-scanner-db-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8" +"advanced-cluster-security/rhacs-scanner-db-slim-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8" +"advanced-cluster-security/rhacs-scanner-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8" +"advanced-cluster-security/rhacs-scanner-slim-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8" +"advanced-cluster-security/rhacs-scanner-v4-db-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-db-rhel8" +"advanced-cluster-security/rhacs-scanner-v4-rhel8" = "registry.redhat.io/advanced-cluster-security/rhacs-scanner-v4-rhel8" +"aerospike/aerospike-kubernetes-init" = "registry.connect.redhat.com/aerospike/aerospike-kubernetes-init" +"aerospike/aerospike-kubernetes-operator-bundle-rhmp" = "registry.connect.redhat.com/aerospike/aerospike-kubernetes-operator-bundle-rhmp" +"aerospike/aerospike-kubernetes-operator" = "registry.connect.redhat.com/aerospike/aerospike-kubernetes-operator" +"aerospike/aerospike-server-enterprise-ubi8" = "registry.connect.redhat.com/aerospike/aerospike-server-enterprise-ubi8" +"agile-lab/wasp-consumers-batch" = "registry.connect.redhat.com/agile-lab/wasp-consumers-batch" +"agile-lab/wasp-consumers-streaming" = "registry.connect.redhat.com/agile-lab/wasp-consumers-streaming" +"agile-lab/wasp-db" = "registry.connect.redhat.com/agile-lab/wasp-db" +"agile-lab/wasp-master" = "registry.connect.redhat.com/agile-lab/wasp-master" +"agile-lab/wasp-producers" = "registry.connect.redhat.com/agile-lab/wasp-producers" +"aip/base" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/base" +"aip/caddy" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/caddy" +"aip/datasync" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/datasync" +"aip/hivemetastore" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/hivemetastore" +"aip/ignite" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/ignite" +"aip/keycloak" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/keycloak" +"aip/portal-8.2.5_221029" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/portal-8.2.5_221029" +"aip/rafm-8.2.5_221029" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/rafm-8.2.5_221029" +"aip/sparkjobmanager" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/sparkjobmanager" +"aip/wafplatform-xb8.2.5_221031" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/aip/wafplatform-xb8.2.5_221031" +"ais/general-policy" = "harbor.adesso-insure.de/ais/general-policy" +"ais/health-claims" = "harbor.adesso-insure.de/ais/health-claims" +"ais/health-policy" = "harbor.adesso-insure.de/ais/health-policy" +"ais/igovinterface" = "harbor.adesso-insure.de/ais/igovinterface" +"ais/insure-partner" = "harbor.adesso-insure.de/ais/insure-partner" +"ais/partner-hbd" = "harbor.adesso-insure.de/ais/partner-hbd" +"ais/partner-single" = "harbor.adesso-insure.de/ais/partner-single" +"ais/partner-sts" = "harbor.adesso-insure.de/ais/partner-sts" +"ais/partner-vms" = "harbor.adesso-insure.de/ais/partner-vms" +"ais/paytras" = "harbor.adesso-insure.de/ais/paytras" +"ais/pslife" = "harbor.adesso-insure.de/ais/pslife" +"ais-redhat-cert/insure-partner-oracle" = "docker.ext-repo.adesso-group.com/ais-redhat-cert/insure-partner-oracle" +"ais-redhat-cert/ubi-8/openjdk-8/jboss-7.3.0/patch-7.3.7/insure-proposal-oracle" = "docker.ext-repo.adesso-group.com/ais-redhat-cert/ubi-8/openjdk-8/jboss-7.3.0/patch-7.3.7/insure-proposal-oracle" +"akeyless/base-rhel" = "docker.io/akeyless/base-rhel" +"ako/ako-operator" = "projects.registry.vmware.com/ako/ako-operator" +"alachisoft-ncache/alachisoft-ncache" = "registry.connect.redhat.com/alachisoft-ncache/alachisoft-ncache" +"albo/aws-load-balancer-controller-rhel8" = "registry.redhat.io/albo/aws-load-balancer-controller-rhel8" +"albo/aws-load-balancer-operator-bundle" = "registry.redhat.io/albo/aws-load-balancer-operator-bundle" +"albo/aws-load-balancer-rhel8-operator" = "registry.redhat.io/albo/aws-load-balancer-rhel8-operator" +"alcide/kaudit-operator-bundle" = "registry.connect.redhat.com/alcide/kaudit-operator-bundle" +"alcide/kaudit-operator" = "docker.io/alcide/kaudit-operator" +"allegroai/trains-server-operator" = "registry.connect.redhat.com/allegroai/trains-server-operator" +"allegroai/trains-server" = "registry.connect.redhat.com/allegroai/trains-server" +"altair/slc" = "registry.connect.redhat.com/altair/slc" +"amazing-chalice-243510/dex" = "eu.gcr.io/amazing-chalice-243510/dex" +"amq7/amq-broker-init-rhel8" = "registry.redhat.io/amq7/amq-broker-init-rhel8" +"amq7/amq-broker-rhel8-operator-bundle" = "registry.redhat.io/amq7/amq-broker-rhel8-operator-bundle" +"amq7/amq-broker-rhel8-operator" = "registry.redhat.io/amq7/amq-broker-rhel8-operator" +"amq7/amq-broker-rhel8" = "registry.redhat.io/amq7/amq-broker-rhel8" +"amq7/amq-interconnect-operator" = "registry.redhat.io/amq7/amq-interconnect-operator" +"amq7/amq-interconnect" = "registry.access.redhat.com/amq7/amq-interconnect" +"amq-streams/bridge-rhel8" = "registry.redhat.io/amq-streams/bridge-rhel8" +"amq-streams/bridge-rhel9" = "registry.redhat.io/amq-streams/bridge-rhel9" +"amq-streams/drain-cleaner-rhel8" = "registry.redhat.io/amq-streams/drain-cleaner-rhel8" +"amq-streams/drain-cleaner-rhel9" = "registry.redhat.io/amq-streams/drain-cleaner-rhel9" +"amq-streams/kafka-34-rhel8" = "registry.redhat.io/amq-streams/kafka-34-rhel8" +"amq-streams/kafka-35-rhel8" = "registry.redhat.io/amq-streams/kafka-35-rhel8" +"amq-streams/kafka-36-rhel8" = "registry.redhat.io/amq-streams/kafka-36-rhel8" +"amq-streams/kafka-36-rhel9" = "registry.redhat.io/amq-streams/kafka-36-rhel9" +"amq-streams/kafka-37-rhel9" = "registry.redhat.io/amq-streams/kafka-37-rhel9" +"amq-streams/maven-builder-rhel9" = "registry.redhat.io/amq-streams/maven-builder-rhel9" +"amq-streams/strimzi-operator-bundle" = "registry.redhat.io/amq-streams/strimzi-operator-bundle" +"amq-streams/strimzi-rhel8-operator" = "registry.redhat.io/amq-streams/strimzi-rhel8-operator" +"amq-streams/strimzi-rhel9-operator" = "registry.redhat.io/amq-streams/strimzi-rhel9-operator" +"anchore/anchore-enterprise-bundle" = "registry.connect.redhat.com/anchore/anchore-enterprise-bundle" +"anchore/anchore-enterprise-operator" = "registry.connect.redhat.com/anchore/anchore-enterprise-operator" +"anchore/engine0" = "registry.connect.redhat.com/anchore/engine0" +"anchore/enterprise-operator" = "registry.connect.redhat.com/anchore/enterprise-operator" +"anchore/enterprise" = "registry.connect.redhat.com/anchore/enterprise" +"anchore/enterprise-ui" = "registry.connect.redhat.com/anchore/enterprise-ui" +"andrianrf0202/backoffice-be" = "quay.io/andrianrf0202/backoffice-be" +"andrianrf0202/backoffice" = "quay.io/andrianrf0202/backoffice" +"andrianrf0202/bpjstk-service" = "quay.io/andrianrf0202/bpjstk-service" +"andrianrf0202/bpjstk-simulator" = "quay.io/andrianrf0202/bpjstk-simulator" +"andrianrf0202/cob-be" = "quay.io/andrianrf0202/cob-be" +"andrianrf0202/digibank-be" = "quay.io/andrianrf0202/digibank-be" +"andrianrf0202/iso-client" = "quay.io/andrianrf0202/iso-client" +"andrianrf0202/iso-server" = "quay.io/andrianrf0202/iso-server" +"andrianrf0202/vcs-be" = "quay.io/andrianrf0202/vcs-be" +"ansible-automation-platform-24/aap-must-gather-rhel8" = "registry.redhat.io/ansible-automation-platform-24/aap-must-gather-rhel8" +"ansible-automation-platform-24/ansible-builder-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ansible-builder-rhel8" +"ansible-automation-platform-24/ansible-builder-rhel9" = "registry.redhat.io/ansible-automation-platform-24/ansible-builder-rhel9" +"ansible-automation-platform-24/ansible-python-base-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ansible-python-base-rhel8" +"ansible-automation-platform-24/ansible-python-base-rhel9" = "registry.redhat.io/ansible-automation-platform-24/ansible-python-base-rhel9" +"ansible-automation-platform-24/ansible-python-toolkit-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ansible-python-toolkit-rhel8" +"ansible-automation-platform-24/ansible-python-toolkit-rhel9" = "registry.redhat.io/ansible-automation-platform-24/ansible-python-toolkit-rhel9" +"ansible-automation-platform-24/controller-rhel8-operator" = "registry.redhat.io/ansible-automation-platform-24/controller-rhel8-operator" +"ansible-automation-platform-24/controller-rhel8" = "registry.redhat.io/ansible-automation-platform-24/controller-rhel8" +"ansible-automation-platform-24/de-minimal-rhel8" = "registry.redhat.io/ansible-automation-platform-24/de-minimal-rhel8" +"ansible-automation-platform-24/de-minimal-rhel9" = "registry.redhat.io/ansible-automation-platform-24/de-minimal-rhel9" +"ansible-automation-platform-24/de-supported-rhel8" = "registry.redhat.io/ansible-automation-platform-24/de-supported-rhel8" +"ansible-automation-platform-24/de-supported-rhel9" = "registry.redhat.io/ansible-automation-platform-24/de-supported-rhel9" +"ansible-automation-platform-24/eda-controller-rhel8-operator" = "registry.redhat.io/ansible-automation-platform-24/eda-controller-rhel8-operator" +"ansible-automation-platform-24/eda-controller-rhel8" = "registry.redhat.io/ansible-automation-platform-24/eda-controller-rhel8" +"ansible-automation-platform-24/eda-controller-ui-rhel8" = "registry.redhat.io/ansible-automation-platform-24/eda-controller-ui-rhel8" +"ansible-automation-platform-24/ee-29-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ee-29-rhel8" +"ansible-automation-platform-24/ee-minimal-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ee-minimal-rhel8" +"ansible-automation-platform-24/ee-minimal-rhel9" = "registry.redhat.io/ansible-automation-platform-24/ee-minimal-rhel9" +"ansible-automation-platform-24/ee-supported-rhel8" = "registry.redhat.io/ansible-automation-platform-24/ee-supported-rhel8" +"ansible-automation-platform-24/ee-supported-rhel9" = "registry.redhat.io/ansible-automation-platform-24/ee-supported-rhel9" +"ansible-automation-platform-24/hub-rhel8-operator" = "registry.redhat.io/ansible-automation-platform-24/hub-rhel8-operator" +"ansible-automation-platform-24/hub-rhel8" = "registry.redhat.io/ansible-automation-platform-24/hub-rhel8" +"ansible-automation-platform-24/hub-web-rhel8" = "registry.redhat.io/ansible-automation-platform-24/hub-web-rhel8" +"ansible-automation-platform-24/lightspeed-rhel8-operator" = "registry.redhat.io/ansible-automation-platform-24/lightspeed-rhel8-operator" +"ansible-automation-platform-24/lightspeed-rhel8" = "registry.redhat.io/ansible-automation-platform-24/lightspeed-rhel8" +"ansible-automation-platform-24/platform-resource-rhel8-operator" = "registry.redhat.io/ansible-automation-platform-24/platform-resource-rhel8-operator" +"ansible-automation-platform-24/platform-resource-runner-rhel8" = "registry.redhat.io/ansible-automation-platform-24/platform-resource-runner-rhel8" +"ansible-automation-platform/ansible-builder-rhel8" = "registry.redhat.io/ansible-automation-platform/ansible-builder-rhel8" +"ansible-automation-platform/ansible-builder-rhel9" = "registry.redhat.io/ansible-automation-platform/ansible-builder-rhel9" +"ansible-automation-platform/ee-29-rhel8" = "registry.redhat.io/ansible-automation-platform/ee-29-rhel8" +"ansible-automation-platform/ee-minimal-rhel8" = "registry.redhat.io/ansible-automation-platform/ee-minimal-rhel8" +"ansible-automation-platform/ee-minimal-rhel9" = "registry.redhat.io/ansible-automation-platform/ee-minimal-rhel9" +"ansible-automation-platform/platform-operator-bundle" = "registry.redhat.io/ansible-automation-platform/platform-operator-bundle" +"apache-tika" = "bds-docker-release.jfrog.io/apache-tika" +"apicurio/apicurio-registry-kafkasql-rhel8" = "registry.redhat.io/apicurio/apicurio-registry-kafkasql-rhel8" +"apicurio/apicurio-registry-operator-bundle" = "registry.redhat.io/apicurio/apicurio-registry-operator-bundle" +"apicurio/apicurio-registry-rhel8-operator" = "registry.redhat.io/apicurio/apicurio-registry-rhel8-operator" +"apicurio/apicurio-registry-sql-rhel8" = "registry.redhat.io/apicurio/apicurio-registry-sql-rhel8" +"apimatic/apimatic-codegen-operator-bundle" = "registry.connect.redhat.com/apimatic/apimatic-codegen-operator-bundle" +"apimatic/apimatic-codegen-operator-ubi8" = "registry.connect.redhat.com/apimatic/apimatic-codegen-operator-ubi8" +"apimatic/apimatic-codegen-ubi8" = "registry.connect.redhat.com/apimatic/apimatic-codegen-ubi8" +"aporeto/enforcerd" = "registry.connect.redhat.com/aporeto/enforcerd" +"appdynamics/appdynamics-cloud-operator-bundle" = "registry.connect.redhat.com/appdynamics/appdynamics-cloud-operator-bundle" +"appdynamics/appdynamics-cloud-operator" = "registry.connect.redhat.com/appdynamics/appdynamics-cloud-operator" +"appdynamics/cluster-agent-operator-bundle" = "registry.connect.redhat.com/appdynamics/cluster-agent-operator-bundle" +"appdynamics/cluster-agent-operator" = "registry.connect.redhat.com/appdynamics/cluster-agent-operator" +"appdynamics/cluster-agent" = "registry.connect.redhat.com/appdynamics/cluster-agent" +"appdynamics/java-agent" = "registry.connect.redhat.com/appdynamics/java-agent" +"appdynamics/machine-agent-analytics" = "registry.connect.redhat.com/appdynamics/machine-agent-analytics" +"appdynamics/machine-agent-netviz" = "registry.connect.redhat.com/appdynamics/machine-agent-netviz" +"appdynamics/nodejs-agent-operator" = "registry.connect.redhat.com/appdynamics/nodejs-agent-operator" +"appranix/apx-controller" = "registry.connect.redhat.com/appranix/apx-controller" +"appranix/apx-manager" = "registry.connect.redhat.com/appranix/apx-manager" +"appranix/apx-operator-bundle" = "registry.connect.redhat.com/appranix/apx-operator-bundle" +"appranix/apx-operator" = "registry.connect.redhat.com/appranix/apx-operator" +"aquasec/aquasec-operator-bundle" = "registry.connect.redhat.com/aquasec/aquasec-operator-bundle" +"aquasec/aquasec" = "registry.connect.redhat.com/aquasec/aquasec" +"aquasec/cloud-connector" = "registry.connect.redhat.com/aquasec/cloud-connector" +"aquasec/console" = "registry.connect.redhat.com/aquasec/console" +"aquasec/database" = "registry.connect.redhat.com/aquasec/database" +"aquasec/enforcer" = "registry.connect.redhat.com/aquasec/enforcer" +"aquasec/gateway" = "registry.connect.redhat.com/aquasec/gateway" +"aquasec/kube-bench" = "registry.connect.redhat.com/aquasec/kube-bench" +"aquasec/kube-enforcer" = "registry.connect.redhat.com/aquasec/kube-enforcer" +"aquasec/scanner" = "registry.connect.redhat.com/aquasec/scanner" +"aquasec/starboard" = "registry.connect.redhat.com/aquasec/starboard" +"arangodb/arangodb-exporter" = "registry.connect.redhat.com/arangodb/arangodb-exporter" +"arangodb/enterprise" = "registry.connect.redhat.com/arangodb/enterprise" +"arangodb/kube-arangodb-bundle" = "registry.connect.redhat.com/arangodb/kube-arangodb-bundle" +"arangodb/kube-arangodb" = "registry.connect.redhat.com/arangodb/kube-arangodb" +"arista/openstack13" = "registry.connect.redhat.com/arista/openstack13" +"armory/armory-operator-bundle" = "registry.connect.redhat.com/armory/armory-operator-bundle" +"armory/armory-operator" = "registry.connect.redhat.com/armory/armory-operator" +"armory/clouddriver" = "registry.connect.redhat.com/armory/clouddriver" +"armory/deck" = "registry.connect.redhat.com/armory/deck" +"armory/dinghy" = "registry.connect.redhat.com/armory/dinghy" +"armory/echo" = "registry.connect.redhat.com/armory/echo" +"armory/fiat" = "registry.connect.redhat.com/armory/fiat" +"armory/front50" = "registry.connect.redhat.com/armory/front50" +"armory/gate" = "registry.connect.redhat.com/armory/gate" +"armory/halyard-armory" = "registry.connect.redhat.com/armory/halyard-armory" +"armory/igor" = "registry.connect.redhat.com/armory/igor" +"armory/kayenta" = "registry.connect.redhat.com/armory/kayenta" +"armory/orca" = "registry.connect.redhat.com/armory/orca" +"armory/redis" = "registry.connect.redhat.com/armory/redis" +"armory/rosco" = "registry.connect.redhat.com/armory/rosco" +"armory/terraformer" = "registry.connect.redhat.com/armory/terraformer" +"arrcus/arcorch-backend" = "quay.io/arrcus/arcorch-backend" +"arrcus/arcorch-init" = "quay.io/arrcus/arcorch-init" +"arrcus/arcorch-term" = "quay.io/arrcus/arcorch-term" +"arrcus/arcorch-ui" = "quay.io/arrcus/arcorch-ui" +"atomicorp/atomicorp-aeo-hub-bundle" = "registry.connect.redhat.com/atomicorp/atomicorp-aeo-hub-bundle" +"atomicorp/atomicorp-aeo-hub" = "registry.connect.redhat.com/atomicorp/atomicorp-aeo-hub" +"atomicorp/atomicorp-aeo-v6" = "registry.connect.redhat.com/atomicorp/atomicorp-aeo-v6" +"atomicorp/ossec-hids-server" = "registry.connect.redhat.com/atomicorp/ossec-hids-server" +"auto-update-service" = "bds-docker-release.jfrog.io/auto-update-service" +"axibase/atsd" = "registry.connect.redhat.com/axibase/atsd" +"axibase/collector" = "registry.connect.redhat.com/axibase/collector" +"axual/api-gateway" = "registry.axual.io/axual/api-gateway" +"axual/axual-api" = "registry.axual.io/axual/axual-api" +"axual/axual-frontend" = "registry.axual.io/axual/axual-frontend" +"axual/axual-organization-mgmt" = "registry.axual.io/axual/axual-organization-mgmt" +"axual/keystore-provider" = "registry.axual.io/axual/keystore-provider" +"axual/metrics-exposer" = "registry.axual.io/axual/metrics-exposer" +"axual/topic-browse" = "registry.axual.io/axual/topic-browse" +"azul/zulu-jdk-6u113" = "registry.connect.redhat.com/azul/zulu-jdk-6u113" +"azul/zulu-jdk-7u191" = "registry.connect.redhat.com/azul/zulu-jdk-7u191" +"azul/zulu-jdk-8u181" = "registry.connect.redhat.com/azul/zulu-jdk-8u181" +"bacula-enterprise/bacula-enterprise-openshift-plugin-1260" = "registry.connect.redhat.com/bacula-enterprise/bacula-enterprise-openshift-plugin-1260" +"balabit/syslog-ng-ose" = "registry.connect.redhat.com/balabit/syslog-ng-ose" +"beamsinc/test-outbound-repo2" = "registry.connect.redhat.com/beamsinc/test-outbound-repo2" +"beamsinc/test-outbound-repo" = "registry.connect.redhat.com/beamsinc/test-outbound-repo" +"bigid/bigid-config-service" = "registry.connect.redhat.com/bigid/bigid-config-service" +"bigid/bigid-corr-new" = "registry.connect.redhat.com/bigid/bigid-corr-new" +"bigid/bigid-data-catalog" = "registry.connect.redhat.com/bigid/bigid-data-catalog" +"bigid/bigid-me-agent" = "registry.connect.redhat.com/bigid/bigid-me-agent" +"bigid/bigid-ml" = "registry.connect.redhat.com/bigid/bigid-ml" +"bigid/bigid-ner" = "registry.connect.redhat.com/bigid/bigid-ner" +"bigid/bigid-operator-bundle" = "registry.connect.redhat.com/bigid/bigid-operator-bundle" +"bigid/bigid-operator" = "registry.connect.redhat.com/bigid/bigid-operator" +"bigid/bigid-orch" = "registry.connect.redhat.com/bigid/bigid-orch" +"bigid/bigid-rabbitmq" = "registry.connect.redhat.com/bigid/bigid-rabbitmq" +"bigid/bigid-reports" = "registry.connect.redhat.com/bigid/bigid-reports" +"bigid/bigid-scanner" = "registry.connect.redhat.com/bigid/bigid-scanner" +"bigid/bigid-ui" = "registry.connect.redhat.com/bigid/bigid-ui" +"bigid/bigid-web" = "registry.connect.redhat.com/bigid/bigid-web" +"blackducksoftware/blackduck-connector-operator-bundle" = "registry.connect.redhat.com/blackducksoftware/blackduck-connector-operator-bundle" +"blackducksoftware/blackduck-connector-operator" = "registry.connect.redhat.com/blackducksoftware/blackduck-connector-operator" +"blackducksoftware/opssight-core" = "registry.connect.redhat.com/blackducksoftware/opssight-core" +"blackducksoftware/opssight-image-getter" = "registry.connect.redhat.com/blackducksoftware/opssight-image-getter" +"blackducksoftware/opssight-image-processor" = "registry.connect.redhat.com/blackducksoftware/opssight-image-processor" +"blackducksoftware/opssight-pod-processor" = "registry.connect.redhat.com/blackducksoftware/opssight-pod-processor" +"blackducksoftware/opssight-scanner" = "registry.connect.redhat.com/blackducksoftware/opssight-scanner" +"blackducksoftware/synopsys-operator-bundle" = "registry.connect.redhat.com/blackducksoftware/synopsys-operator-bundle" +"blackducksoftware/synopsys-operator" = "registry.connect.redhat.com/blackducksoftware/synopsys-operator" +"bleemeo/bleemeo-agent" = "registry.connect.redhat.com/bleemeo/bleemeo-agent" +"c12e/cortex5-catalog" = "registry.connect.redhat.com/c12e/cortex5-catalog" +"c12e/cortex5-fabric-operator" = "registry.connect.redhat.com/c12e/cortex5-fabric-operator" +"c12e/cortex-accounts-service" = "registry.connect.redhat.com/c12e/cortex-accounts-service" +"c12e/cortex-actions-service" = "registry.connect.redhat.com/c12e/cortex-actions-service" +"c12e/cortex-admin-ui" = "registry.connect.redhat.com/c12e/cortex-admin-ui" +"c12e/cortex-agents-service" = "registry.connect.redhat.com/c12e/cortex-agents-service" +"c12e/cortex-catalog-service" = "registry.connect.redhat.com/c12e/cortex-catalog-service" +"c12e/cortex-certifai-console" = "registry.connect.redhat.com/c12e/cortex-certifai-console" +"c12e/cortex-certifai-operator-bundle" = "registry.connect.redhat.com/c12e/cortex-certifai-operator-bundle" +"c12e/cortex-certifai-operator" = "registry.connect.redhat.com/c12e/cortex-certifai-operator" +"c12e/cortex-certifai-policy-chooser" = "registry.connect.redhat.com/c12e/cortex-certifai-policy-chooser" +"c12e/cortex-certifai-reference-model-server" = "registry.connect.redhat.com/c12e/cortex-certifai-reference-model-server" +"c12e/cortex-certifai-reporting-etl" = "registry.connect.redhat.com/c12e/cortex-certifai-reporting-etl" +"c12e/cortex-certifai-scan-manager" = "registry.connect.redhat.com/c12e/cortex-certifai-scan-manager" +"c12e/cortex-certifai-scanner" = "registry.connect.redhat.com/c12e/cortex-certifai-scanner" +"c12e/cortex-connections-service" = "registry.connect.redhat.com/c12e/cortex-connections-service" +"c12e/cortex-connection-type-loader" = "registry.connect.redhat.com/c12e/cortex-connection-type-loader" +"c12e/cortex-datasets-service" = "registry.connect.redhat.com/c12e/cortex-datasets-service" +"c12e/cortex-docs" = "registry.connect.redhat.com/c12e/cortex-docs" +"c12e/cortex-fabric-operator-bundle" = "registry.connect.redhat.com/c12e/cortex-fabric-operator-bundle" +"c12e/cortex-fabric-operator" = "registry.connect.redhat.com/c12e/cortex-fabric-operator" +"c12e/cortex-graph" = "registry.connect.redhat.com/c12e/cortex-graph" +"c12e/cortex-healthcare-hub-operator-bundle" = "registry.connect.redhat.com/c12e/cortex-healthcare-hub-operator-bundle" +"c12e/cortex-healthcare-hub-operator" = "registry.connect.redhat.com/c12e/cortex-healthcare-hub-operator" +"c12e/cortex-hub-operator-bundle" = "registry.connect.redhat.com/c12e/cortex-hub-operator-bundle" +"c12e/cortex-hub-operator" = "registry.connect.redhat.com/c12e/cortex-hub-operator" +"c12e/cortex-hub" = "registry.connect.redhat.com/c12e/cortex-hub" +"c12e/cortex-kong-service" = "registry.connect.redhat.com/c12e/cortex-kong-service" +"c12e/cortex-logs-service" = "registry.connect.redhat.com/c12e/cortex-logs-service" +"c12e/cortex-metrics" = "registry.connect.redhat.com/c12e/cortex-metrics" +"c12e/cortex-models-service" = "registry.connect.redhat.com/c12e/cortex-models-service" +"c12e/cortex-processor-gateway" = "registry.connect.redhat.com/c12e/cortex-processor-gateway" +"c12e/cortex-sessions" = "registry.connect.redhat.com/c12e/cortex-sessions" +"calico/apiserver" = "quay.io/calico/apiserver" +"calico/cni" = "quay.io/calico/cni" +"calico/csi" = "quay.io/calico/csi" +"calico/dikastes" = "quay.io/calico/dikastes" +"calico/flannel-migration-controller" = "quay.io/calico/flannel-migration-controller" +"calico/kube-controllers" = "quay.io/calico/kube-controllers" +"calico/node-driver-registrar" = "quay.io/calico/node-driver-registrar" +"calico/node" = "quay.io/calico/node" +"calico/pod2daemon-flexvol" = "quay.io/calico/pod2daemon-flexvol" +"calico/typha" = "quay.io/calico/typha" +"calyptia/fluent-bit" = "registry.connect.redhat.com/calyptia/fluent-bit" +"cambridgesemantics/anzograph-db" = "registry.connect.redhat.com/cambridgesemantics/anzograph-db" +"cambridgesemantics/anzograph-frontend" = "registry.connect.redhat.com/cambridgesemantics/anzograph-frontend" +"cambridgesemantics/anzograph-operator-bundle" = "registry.connect.redhat.com/cambridgesemantics/anzograph-operator-bundle" +"cambridgesemantics/anzograph-operator" = "registry.connect.redhat.com/cambridgesemantics/anzograph-operator" +"cambridgesemantics/anzograph" = "registry.connect.redhat.com/cambridgesemantics/anzograph" +"cambridgesemantics/anzo-microservices-leader" = "registry.connect.redhat.com/cambridgesemantics/anzo-microservices-leader" +"cambridgesemantics/anzo-operator-bundle" = "registry.connect.redhat.com/cambridgesemantics/anzo-operator-bundle" +"cambridgesemantics/anzo-operator" = "registry.connect.redhat.com/cambridgesemantics/anzo-operator" +"cambridgesemantics/anzo" = "registry.connect.redhat.com/cambridgesemantics/anzo" +"cambridgesemantics/anzo-unstructured-operator-bundle" = "registry.connect.redhat.com/cambridgesemantics/anzo-unstructured-operator-bundle" +"cambridgesemantics/anzo-unstructured-worker" = "registry.connect.redhat.com/cambridgesemantics/anzo-unstructured-worker" +"cambridgesemantics/unstructured-operator" = "registry.connect.redhat.com/cambridgesemantics/unstructured-operator" +"can-avanseus/can-app" = "registry.connect.redhat.com/can-avanseus/can-app" +"can-avanseus/canapp" = "registry.connect.redhat.com/can-avanseus/canapp" +"can-avanseus/can-operator" = "registry.connect.redhat.com/can-avanseus/can-operator" +"can-avanseus/can" = "registry.connect.redhat.com/can-avanseus/can" +"can-avanseus/can-vbi" = "registry.connect.redhat.com/can-avanseus/can-vbi" +"can-avanseus/can-workerapp" = "registry.connect.redhat.com/can-avanseus/can-workerapp" +"can-avanseus/casapp" = "registry.connect.redhat.com/can-avanseus/casapp" +"can-avanseus/ldap" = "registry.connect.redhat.com/can-avanseus/ldap" +"can-avanseus/predictioncontroller" = "registry.connect.redhat.com/can-avanseus/predictioncontroller" +"can-avanseus/predictionworker" = "registry.connect.redhat.com/can-avanseus/predictionworker" +"can-avanseus/vbi" = "registry.connect.redhat.com/can-avanseus/vbi" +"captivateioltd/rabbitmq" = "registry.connect.redhat.com/captivateioltd/rabbitmq" +"carbonetes/operator-bundle" = "registry.connect.redhat.com/carbonetes/operator-bundle" +"carbonetes/operator" = "registry.connect.redhat.com/carbonetes/operator" +"castai-hub/library/agent-rh-ubi" = "us-docker.pkg.dev/castai-hub/library/agent-rh-ubi" +"catalogicsoftware/cloudcasa-amds-kagent" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-amds-kagent" +"catalogicsoftware/cloudcasa-bundle" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-bundle" +"catalogicsoftware/cloudcasa-operator" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-operator" +"catalogicsoftware/cloudcasa-trivy" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-trivy" +"catalogicsoftware/cloudcasa-velero-plugin-for-aws" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero-plugin-for-aws" +"catalogicsoftware/cloudcasa-velero-plugin-for-csi" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero-plugin-for-csi" +"catalogicsoftware/cloudcasa-velero-plugin-for-gcp" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero-plugin-for-gcp" +"catalogicsoftware/cloudcasa-velero-plugin-for-microsoft-azure" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero-plugin-for-microsoft-azure" +"catalogicsoftware/cloudcasa-velero-plugin" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero-plugin" +"catalogicsoftware/cloudcasa-velero" = "registry.connect.redhat.com/catalogicsoftware/cloudcasa-velero" +"ca/uma-admin-operator-bundle" = "registry.connect.redhat.com/ca/uma-admin-operator-bundle" +"ca/uma-operator-bundle" = "registry.connect.redhat.com/ca/uma-operator-bundle" +"ca/uma-operator" = "registry.connect.redhat.com/ca/uma-operator" +"ca/uma-team-operator-bundle" = "registry.connect.redhat.com/ca/uma-team-operator-bundle" +"ca/universalmonitoragent" = "registry.connect.redhat.com/ca/universalmonitoragent" +"ccn/zxun-umac-amf" = "registry.zte.com.cn/ccn/zxun-umac-amf" +"cdt-common-rns/nifi-ca-server" = "us.icr.io/cdt-common-rns/nifi-ca-server" +"cdt-common-rns/nifi-registry" = "us.icr.io/cdt-common-rns/nifi-registry" +"cdt-common-rns/nifi" = "us.icr.io/cdt-common-rns/nifi" +"cdt-common-rns/zookeeper" = "us.icr.io/cdt-common-rns/zookeeper" +"certified/active-mq" = "euaiditinfracr.azurecr.io/certified/active-mq" +"certified/fluent-bit" = "euaiditinfracr.azurecr.io/certified/fluent-bit" +"certified/idit-mono" = "euaiditinfracr.azurecr.io/certified/idit-mono" +"certified/test-connection" = "euaiditinfracr.azurecr.io/certified/test-connection" +"cert-manager/cert-manager-operator-bundle" = "registry.redhat.io/cert-manager/cert-manager-operator-bundle" +"cert-manager/cert-manager-operator-rhel9" = "registry.redhat.io/cert-manager/cert-manager-operator-rhel9" +"cert-manager/jetstack-cert-manager-acmesolver-rhel9" = "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9" +"cert-manager/jetstack-cert-manager-rhel9" = "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9" +"chandeshwar_mishra/sodsrvc" = "quay.io/chandeshwar_mishra/sodsrvc" +"checkmarx/kics" = "registry.connect.redhat.com/checkmarx/kics" +"cisco/cisco-vts262-ga" = "registry.connect.redhat.com/cisco/cisco-vts262-ga" +"citrix/admagent-operator-bundle" = "registry.connect.redhat.com/citrix/admagent-operator-bundle" +"citrix/citrix-adc-istio-ingress-gateway" = "registry.connect.redhat.com/citrix/citrix-adc-istio-ingress-gateway" +"citrix/citrix-adc-metrics-exporter" = "registry.connect.redhat.com/citrix/citrix-adc-metrics-exporter" +"citrix/citrixadcsidecar" = "registry.connect.redhat.com/citrix/citrixadcsidecar" +"citrix/citrix-api-gateway-bundle" = "registry.connect.redhat.com/citrix/citrix-api-gateway-bundle" +"citrix/citrix-api-gateway" = "registry.connect.redhat.com/citrix/citrix-api-gateway" +"citrix/citrix-cpx-istio-sidecar-injector" = "registry.connect.redhat.com/citrix/citrix-cpx-istio-sidecar-injector" +"citrix/citrix-ingress-controller" = "registry.connect.redhat.com/citrix/citrix-ingress-controller" +"citrix/citrix-k8s-cpx-ingress-bundle" = "registry.connect.redhat.com/citrix/citrix-k8s-cpx-ingress-bundle" +"citrix/citrix-k8s-cpx-ingress-controller" = "registry.connect.redhat.com/citrix/citrix-k8s-cpx-ingress-controller" +"citrix/citrix-k8s-ingress-bundle" = "registry.connect.redhat.com/citrix/citrix-k8s-ingress-bundle" +"citrix/citrix-k8s-ingress-controller" = "registry.connect.redhat.com/citrix/citrix-k8s-ingress-controller" +"citrix/citrix-multi-cluster-ingress-controller" = "registry.connect.redhat.com/citrix/citrix-multi-cluster-ingress-controller" +"citrix/istioingressgateway-bundle" = "registry.connect.redhat.com/citrix/istioingressgateway-bundle" +"citrix/istioingressgateway" = "registry.connect.redhat.com/citrix/istioingressgateway" +"citrix/istiosidecarcitrix-bundle" = "registry.connect.redhat.com/citrix/istiosidecarcitrix-bundle" +"citrix/netscaler-adm-agent-operator" = "registry.connect.redhat.com/citrix/netscaler-adm-agent-operator" +"citrix/netscaler-bundle" = "registry.connect.redhat.com/citrix/netscaler-bundle" +"citrix/netscaler-operator" = "registry.connect.redhat.com/citrix/netscaler-operator" +"cloudark/kubeplus-helmer1" = "registry.connect.redhat.com/cloudark/kubeplus-helmer1" +"cloudark/kubeplus-mutating-webhook-helper" = "registry.connect.redhat.com/cloudark/kubeplus-mutating-webhook-helper" +"cloudark/kubeplus-mutating-webhook" = "registry.connect.redhat.com/cloudark/kubeplus-mutating-webhook" +"cloudark/kubeplus-operator-bundle" = "registry.connect.redhat.com/cloudark/kubeplus-operator-bundle" +"cloudark/kubeplus-platform-operator" = "registry.connect.redhat.com/cloudark/kubeplus-platform-operator" +"cloudark/kubeplus-webhook-cert-setup" = "registry.connect.redhat.com/cloudark/kubeplus-webhook-cert-setup" +"cloudhedge/activity-service" = "registry.connect.redhat.com/cloudhedge/activity-service" +"cloudhedge/analytics-service" = "registry.connect.redhat.com/cloudhedge/analytics-service" +"cloudhedge/auth-gateway-service" = "registry.connect.redhat.com/cloudhedge/auth-gateway-service" +"cloudhedge/aws-k8s-service" = "registry.connect.redhat.com/cloudhedge/aws-k8s-service" +"cloudhedge/ch-operator" = "registry.connect.redhat.com/cloudhedge/ch-operator" +"cloudhedge/ch-user-guide" = "registry.connect.redhat.com/cloudhedge/ch-user-guide" +"cloudhedge/ci-service" = "registry.connect.redhat.com/cloudhedge/ci-service" +"cloudhedge/cloudhegde-operator-bundle" = "registry.connect.redhat.com/cloudhedge/cloudhegde-operator-bundle" +"cloudhedge/cloud-infra-service" = "registry.connect.redhat.com/cloudhedge/cloud-infra-service" +"cloudhedge/cloud-lease-service" = "registry.connect.redhat.com/cloudhedge/cloud-lease-service" +"cloudhedge/core-engine" = "registry.connect.redhat.com/cloudhedge/core-engine" +"cloudhedge/discover-service-linux" = "registry.connect.redhat.com/cloudhedge/discover-service-linux" +"cloudhedge/discover-service-windows" = "registry.connect.redhat.com/cloudhedge/discover-service-windows" +"cloudhedge/distribute-service" = "registry.connect.redhat.com/cloudhedge/distribute-service" +"cloudhedge/gc-k8s-service" = "registry.connect.redhat.com/cloudhedge/gc-k8s-service" +"cloudhedge/infra-usage-analysis-engine" = "registry.connect.redhat.com/cloudhedge/infra-usage-analysis-engine" +"cloudhedge/k8s-helm-service" = "registry.connect.redhat.com/cloudhedge/k8s-helm-service" +"cloudhedge/license-service" = "registry.connect.redhat.com/cloudhedge/license-service" +"cloudhedge/logging-agent" = "registry.connect.redhat.com/cloudhedge/logging-agent" +"cloudhedge/logging-service" = "registry.connect.redhat.com/cloudhedge/logging-service" +"cloudhedge/notification-service" = "registry.connect.redhat.com/cloudhedge/notification-service" +"cloudhedge/openshift-service" = "registry.connect.redhat.com/cloudhedge/openshift-service" +"cloudhedge/report-service" = "registry.connect.redhat.com/cloudhedge/report-service" +"cloudhedge/repository-service" = "registry.connect.redhat.com/cloudhedge/repository-service" +"cloudhedge/transform-service-linux" = "registry.connect.redhat.com/cloudhedge/transform-service-linux" +"cloudhedge/transform-service-windows" = "registry.connect.redhat.com/cloudhedge/transform-service-windows" +"cloudhedge/vault-service" = "registry.connect.redhat.com/cloudhedge/vault-service" +"cloudhedge/webapp" = "registry.connect.redhat.com/cloudhedge/webapp" +"cloudnative-pg/cloudnative-pg" = "ghcr.io/cloudnative-pg/cloudnative-pg" +"cluster-observability-operator/coo-console-logging-plugin-rhel8" = "registry.redhat.io/cluster-observability-operator/coo-console-logging-plugin-rhel8" +"cnvrg/cnvrg-operator" = "docker.io/cnvrg/cnvrg-operator" +"cnvrg-core/app" = "registry.connect.redhat.com/cnvrg-core/app" +"cnvrg-core/bundle" = "registry.connect.redhat.com/cnvrg-core/bundle" +"cnvrg-core/cnvrg" = "registry.connect.redhat.com/cnvrg-core/cnvrg" +"cnvrg/core" = "docker.io/cnvrg/core" +"cnvrg-core/operator" = "registry.connect.redhat.com/cnvrg-core/operator" +"cockroachdb/cockroachdb-operator-bundle-marketplace" = "registry.connect.redhat.com/cockroachdb/cockroachdb-operator-bundle-marketplace" +"cockroachdb/cockroachdb-operator-bundle" = "registry.connect.redhat.com/cockroachdb/cockroachdb-operator-bundle" +"cockroachdb/cockroachdb-operator" = "registry.connect.redhat.com/cockroachdb/cockroachdb-operator" +"cockroachdb/cockroach" = "registry.connect.redhat.com/cockroachdb/cockroach" +"cockroachdb/request-cert" = "registry.connect.redhat.com/cockroachdb/request-cert" +"commvault-hedvig/hedvig-operator1" = "registry.connect.redhat.com/commvault-hedvig/hedvig-operator1" +"commvault-hedvig/hedvig-operator" = "registry.connect.redhat.com/commvault-hedvig/hedvig-operator" +"compliance/oc-compliance-rhel8" = "registry.redhat.io/compliance/oc-compliance-rhel8" +"compliance/openshift-compliance-content-rhel8" = "registry.redhat.io/compliance/openshift-compliance-content-rhel8" +"compliance/openshift-compliance-openscap-rhel8" = "registry.redhat.io/compliance/openshift-compliance-openscap-rhel8" +"compliance/openshift-compliance-operator-bundle" = "registry.redhat.io/compliance/openshift-compliance-operator-bundle" +"compliance/openshift-compliance-rhel8-operator" = "registry.redhat.io/compliance/openshift-compliance-rhel8-operator" +"compliance/openshift-file-integrity-operator-bundle" = "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle" +"compliance/openshift-file-integrity-rhel8-operator" = "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator" +"compliance/openshift-security-profiles-operator-bundle" = "registry.redhat.io/compliance/openshift-security-profiles-operator-bundle" +"compliance/openshift-security-profiles-rhel8-operator" = "registry.redhat.io/compliance/openshift-security-profiles-rhel8-operator" +"compliance/openshift-selinuxd-rhel8" = "registry.redhat.io/compliance/openshift-selinuxd-rhel8" +"compliance/openshift-selinuxd-rhel9" = "registry.redhat.io/compliance/openshift-selinuxd-rhel9" +"config-service" = "bds-docker-release.jfrog.io/config-service" +"confluentinc/confluent-for-kubernetes-v2" = "registry.connect.redhat.com/confluentinc/confluent-for-kubernetes-v2" +"confluentinc/confluent-init-container" = "docker.io/confluentinc/confluent-init-container" +"confluentinc/confluent-operator" = "docker.io/confluentinc/confluent-operator" +"confluentinc/cp-enterprise-control-center" = "docker.io/confluentinc/cp-enterprise-control-center" +"confluentinc/cp-kafka-rest" = "docker.io/confluentinc/cp-kafka-rest" +"confluentinc/cp-ksqldb-server" = "docker.io/confluentinc/cp-ksqldb-server" +"confluentinc/cp-schema-registry" = "docker.io/confluentinc/cp-schema-registry" +"confluentinc/cp-server-connect" = "docker.io/confluentinc/cp-server-connect" +"confluentinc/cp-server" = "docker.io/confluentinc/cp-server" +"confluentinc/cp-zookeeper" = "docker.io/confluentinc/cp-zookeeper" +"container-native-virtualization/aaq-controller-rhel9" = "registry.redhat.io/container-native-virtualization/aaq-controller-rhel9" +"container-native-virtualization/aaq-operator-rhel9" = "registry.redhat.io/container-native-virtualization/aaq-operator-rhel9" +"container-native-virtualization/aaq-server-rhel9" = "registry.redhat.io/container-native-virtualization/aaq-server-rhel9" +"container-native-virtualization/bridge-marker" = "registry.redhat.io/container-native-virtualization/bridge-marker" +"container-native-virtualization/bridge-marker-rhel9" = "registry.redhat.io/container-native-virtualization/bridge-marker-rhel9" +"container-native-virtualization/cluster-network-addons-operator" = "registry.redhat.io/container-native-virtualization/cluster-network-addons-operator" +"container-native-virtualization/cluster-network-addons-operator-rhel9" = "registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9" +"container-native-virtualization/cnv-containernetworking-plugins" = "registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins" +"container-native-virtualization/cnv-containernetworking-plugins-rhel9" = "registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9" +"container-native-virtualization/cnv-must-gather-rhel8" = "registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8" +"container-native-virtualization/cnv-must-gather-rhel9" = "registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9" +"container-native-virtualization/hco-bundle-registry" = "registry.redhat.io/container-native-virtualization/hco-bundle-registry" +"container-native-virtualization/hco-bundle-registry-rhel9" = "registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9" +"container-native-virtualization/hostpath-csi-driver" = "registry.redhat.io/container-native-virtualization/hostpath-csi-driver" +"container-native-virtualization/hostpath-csi-driver-rhel8" = "registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8" +"container-native-virtualization/hostpath-csi-driver-rhel9" = "registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9" +"container-native-virtualization/hostpath-provisioner-operator-rhel9" = "registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9" +"container-native-virtualization/hostpath-provisioner-rhel8-operator" = "registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator" +"container-native-virtualization/hostpath-provisioner-rhel8" = "registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8" +"container-native-virtualization/hostpath-provisioner-rhel9" = "registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9" +"container-native-virtualization/hyperconverged-cluster-operator" = "registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator" +"container-native-virtualization/hyperconverged-cluster-operator-rhel9" = "registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9" +"container-native-virtualization/hyperconverged-cluster-webhook-rhel8" = "registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8" +"container-native-virtualization/hyperconverged-cluster-webhook-rhel9" = "registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9" +"container-native-virtualization/kubemacpool" = "registry.redhat.io/container-native-virtualization/kubemacpool" +"container-native-virtualization/kubemacpool-rhel9" = "registry.redhat.io/container-native-virtualization/kubemacpool-rhel9" +"container-native-virtualization/kubernetes-nmstate-handler-rhel8" = "registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8" +"container-native-virtualization/kubesecondarydns-rhel9" = "registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9" +"container-native-virtualization/kubevirt-apiserver-proxy-rhel9" = "registry.redhat.io/container-native-virtualization/kubevirt-apiserver-proxy-rhel9" +"container-native-virtualization/kubevirt-common-instancetypes-rhel9" = "registry.redhat.io/container-native-virtualization/kubevirt-common-instancetypes-rhel9" +"container-native-virtualization/kubevirt-console-plugin" = "registry.redhat.io/container-native-virtualization/kubevirt-console-plugin" +"container-native-virtualization/kubevirt-console-plugin-rhel9" = "registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9" +"container-native-virtualization/kubevirt-cpu-model-nfd-plugin" = "registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin" +"container-native-virtualization/kubevirt-cpu-node-labeller" = "registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller" +"container-native-virtualization/kubevirt-kvm-info-nfd-plugin" = "registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin" +"container-native-virtualization/kubevirt-ssp-operator" = "registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator" +"container-native-virtualization/kubevirt-ssp-operator-rhel9" = "registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9" +"container-native-virtualization/kubevirt-template-validator" = "registry.redhat.io/container-native-virtualization/kubevirt-template-validator" +"container-native-virtualization/kubevirt-template-validator-rhel9" = "registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9" +"container-native-virtualization/kubevirt-v2v-conversion" = "registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion" +"container-native-virtualization/kubevirt-vmware" = "registry.redhat.io/container-native-virtualization/kubevirt-vmware" +"container-native-virtualization/libguestfs-tools" = "registry.redhat.io/container-native-virtualization/libguestfs-tools" +"container-native-virtualization/libguestfs-tools-rhel9" = "registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9" +"container-native-virtualization/mtq-controller-rhel9" = "registry.redhat.io/container-native-virtualization/mtq-controller-rhel9" +"container-native-virtualization/mtq-lock-server-rhel9" = "registry.redhat.io/container-native-virtualization/mtq-lock-server-rhel9" +"container-native-virtualization/mtq-operator-rhel9" = "registry.redhat.io/container-native-virtualization/mtq-operator-rhel9" +"container-native-virtualization/multus-dynamic-networks-rhel9" = "registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9" +"container-native-virtualization/node-maintenance-operator" = "registry.redhat.io/container-native-virtualization/node-maintenance-operator" +"container-native-virtualization/ovs-cni-marker" = "registry.redhat.io/container-native-virtualization/ovs-cni-marker" +"container-native-virtualization/ovs-cni-plugin" = "registry.redhat.io/container-native-virtualization/ovs-cni-plugin" +"container-native-virtualization/ovs-cni-plugin-rhel9" = "registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9" +"container-native-virtualization/pr-helper-rhel9" = "registry.redhat.io/container-native-virtualization/pr-helper-rhel9" +"container-native-virtualization/sidecar-shim-rhel9" = "registry.redhat.io/container-native-virtualization/sidecar-shim-rhel9" +"container-native-virtualization/virt-api" = "registry.redhat.io/container-native-virtualization/virt-api" +"container-native-virtualization/virt-api-rhel9" = "registry.redhat.io/container-native-virtualization/virt-api-rhel9" +"container-native-virtualization/virt-artifacts-server" = "registry.redhat.io/container-native-virtualization/virt-artifacts-server" +"container-native-virtualization/virt-artifacts-server-rhel9" = "registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9" +"container-native-virtualization/virt-cdi-apiserver" = "registry.redhat.io/container-native-virtualization/virt-cdi-apiserver" +"container-native-virtualization/virt-cdi-apiserver-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9" +"container-native-virtualization/virt-cdi-cloner" = "registry.redhat.io/container-native-virtualization/virt-cdi-cloner" +"container-native-virtualization/virt-cdi-cloner-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9" +"container-native-virtualization/virt-cdi-controller" = "registry.redhat.io/container-native-virtualization/virt-cdi-controller" +"container-native-virtualization/virt-cdi-controller-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9" +"container-native-virtualization/virt-cdi-importer" = "registry.redhat.io/container-native-virtualization/virt-cdi-importer" +"container-native-virtualization/virt-cdi-importer-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9" +"container-native-virtualization/virt-cdi-operator" = "registry.redhat.io/container-native-virtualization/virt-cdi-operator" +"container-native-virtualization/virt-cdi-operator-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9" +"container-native-virtualization/virt-cdi-uploadproxy" = "registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy" +"container-native-virtualization/virt-cdi-uploadproxy-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9" +"container-native-virtualization/virt-cdi-uploadserver" = "registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver" +"container-native-virtualization/virt-cdi-uploadserver-rhel9" = "registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9" +"container-native-virtualization/virt-controller" = "registry.redhat.io/container-native-virtualization/virt-controller" +"container-native-virtualization/virt-controller-rhel9" = "registry.redhat.io/container-native-virtualization/virt-controller-rhel9" +"container-native-virtualization/virt-handler" = "registry.redhat.io/container-native-virtualization/virt-handler" +"container-native-virtualization/virt-handler-rhel9" = "registry.redhat.io/container-native-virtualization/virt-handler-rhel9" +"container-native-virtualization/virtio-win" = "registry.redhat.io/container-native-virtualization/virtio-win" +"container-native-virtualization/virtio-win-rhel9" = "registry.redhat.io/container-native-virtualization/virtio-win-rhel9" +"container-native-virtualization/virt-launcher" = "registry.redhat.io/container-native-virtualization/virt-launcher" +"container-native-virtualization/virt-launcher-rhel9" = "registry.redhat.io/container-native-virtualization/virt-launcher-rhel9" +"container-native-virtualization/virt-operator" = "registry.redhat.io/container-native-virtualization/virt-operator" +"container-native-virtualization/virt-operator-rhel9" = "registry.redhat.io/container-native-virtualization/virt-operator-rhel9" +"container-native-virtualization/vm-console-proxy-rhel9" = "registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9" +"container-native-virtualization/vm-import-controller" = "registry.redhat.io/container-native-virtualization/vm-import-controller" +"container-native-virtualization/vm-import-controller-rhel8" = "registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8" +"container-native-virtualization/vm-import-operator-rhel8" = "registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8" +"container-native-virtualization/vm-import-virtv2v-rhel8" = "registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8" +"containous/traefikee-operator-bundle" = "registry.connect.redhat.com/containous/traefikee-operator-bundle" +"containous/traefikee-operator" = "registry.connect.redhat.com/containous/traefikee-operator" +"containous/traefikee" = "registry.connect.redhat.com/containous/traefikee" +"contrail-container-prod/contrail-cert-init" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-cert-init" +"contrail-container-prod/contrail-cni-init" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-cni-init" +"contrail-container-prod/contrail-control" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-control" +"contrail-container-prod/contrail-etcd" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-etcd" +"contrail-container-prod/contrail-init" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-init" +"contrail-container-prod/contrail-k8s-apiserver" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-k8s-apiserver" +"contrail-container-prod/contrail-k8s-controller" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-k8s-controller" +"contrail-container-prod/contrail-k8s-deployer" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-k8s-deployer" +"contrail-container-prod/contrail-k8s-kubemanager" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-k8s-kubemanager" +"contrail-container-prod/contrail-telemetry-exporter" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-telemetry-exporter" +"contrail-container-prod/contrail-vrouter-agent" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-vrouter-agent" +"contrail-container-prod/contrail-vrouter-kernel-init-dpdk" = "enterprise-hub.juniper.net/contrail-container-prod/contrail-vrouter-kernel-init-dpdk" +"contrail-nightly/tf-operator" = "hub.juniper.net/contrail-nightly/tf-operator" +"contrastsecurity/java-agent" = "registry.connect.redhat.com/contrastsecurity/java-agent" +"coralogix/coralogix-fluentd" = "registry.connect.redhat.com/coralogix/coralogix-fluentd" +"coralogix/coralogix-operator-manifests-bundle" = "registry.connect.redhat.com/coralogix/coralogix-operator-manifests-bundle" +"coralogix/coralogix-operator" = "registry.connect.redhat.com/coralogix/coralogix-operator" +"coscale/coscale-agent" = "registry.connect.redhat.com/coscale/coscale-agent" +"costmanagement/costmanagement-metrics-operator-bundle" = "registry.redhat.io/costmanagement/costmanagement-metrics-operator-bundle" +"costmanagement/costmanagement-metrics-rhel8-operator" = "registry.redhat.io/costmanagement/costmanagement-metrics-rhel8-operator" +"couchbase/admission-controller" = "registry.connect.redhat.com/couchbase/admission-controller" +"couchbase/exporter" = "registry.connect.redhat.com/couchbase/exporter" +"couchbase/fluent-bit" = "registry.connect.redhat.com/couchbase/fluent-bit" +"couchbase/operator-bundle" = "registry.connect.redhat.com/couchbase/operator-bundle" +"couchbase/operator-certification" = "registry.connect.redhat.com/couchbase/operator-certification" +"couchbase/operator" = "registry.connect.redhat.com/couchbase/operator" +"couchbase/operator-rhmp" = "registry.connect.redhat.com/couchbase/operator-rhmp" +"couchbase/server" = "registry.connect.redhat.com/couchbase/server" +"couchbase/sync-gateway" = "registry.connect.redhat.com/couchbase/sync-gateway" +"cp/apic/ibm-apiconnect-management-juhu" = "cp.icr.io/cp/apic/ibm-apiconnect-management-juhu" +"cp/appc/acecc-connector-auth-service-prod" = "cp.stg.icr.io/cp/appc/acecc-connector-auth-service-prod" +"cp/appc/acecc-content-server" = "cp.stg.icr.io/cp/appc/acecc-content-server" +"cp/appc/acecc-content-server-prod" = "cp.stg.icr.io/cp/appc/acecc-content-server-prod" +"cp/appc/acecc-dashboard" = "cp.stg.icr.io/cp/appc/acecc-dashboard" +"cp/appc/acecc-dashboard-prod" = "cp.stg.icr.io/cp/appc/acecc-dashboard-prod" +"cp/appc/acecc-designerflows" = "cp.stg.icr.io/cp/appc/acecc-designerflows" +"cp/appc/acecc-designerflows-prod" = "cp.stg.icr.io/cp/appc/acecc-designerflows-prod" +"cp/appc/acecc-designer-runtime-prod" = "cp.stg.icr.io/cp/appc/acecc-designer-runtime-prod" +"cp/appc/acecc-designer-ui-prod" = "cp.stg.icr.io/cp/appc/acecc-designer-ui-prod" +"cp/appc/acecc-ecp-prod" = "cp.icr.io/cp/appc/acecc-ecp-prod" +"cp/appc/acecc-flowdoc-authoring-prod" = "cp.stg.icr.io/cp/appc/acecc-flowdoc-authoring-prod" +"cp/appc/acecc-flow-test-manager-prod" = "cp.stg.icr.io/cp/appc/acecc-flow-test-manager-prod" +"cp/appc/acecc-mapping-assist-prod" = "cp.stg.icr.io/cp/appc/acecc-mapping-assist-prod" +"cp/appc/acecc-proxy-prod" = "cp.stg.icr.io/cp/appc/acecc-proxy-prod" +"cp/appc/ace-server" = "cp.stg.icr.io/cp/appc/ace-server" +"cp/appc/ace-server-prod" = "cp.stg.icr.io/cp/appc/ace-server-prod" +"cp/appc/appconnect-operator" = "cp.stg.icr.io/cp/appc/appconnect-operator" +"cp/appc/appconnect-operator-init" = "cp.stg.icr.io/cp/appc/appconnect-operator-init" +"cp/cp4a/ads/ads-buildservice" = "cp.icr.io/cp/cp4a/ads/ads-buildservice" +"cp/cp4a/ads/ads-credentials" = "cp.icr.io/cp/cp4a/ads/ads-credentials" +"cp/cp4a/ads/ads-download" = "cp.icr.io/cp/cp4a/ads/ads-download" +"cp/cp4a/ads/ads-front" = "cp.icr.io/cp/cp4a/ads/ads-front" +"cp/cp4a/ads/ads-gitservice" = "cp.icr.io/cp/cp4a/ads/ads-gitservice" +"cp/cp4a/ads/ads-parsing" = "cp.icr.io/cp/cp4a/ads/ads-parsing" +"cp/cp4a/ads/ads-restapi" = "cp.icr.io/cp/cp4a/ads/ads-restapi" +"cp/cp4a/ads/ads-rrintegration" = "cp.icr.io/cp/cp4a/ads/ads-rrintegration" +"cp/cp4a/ads/ads-run" = "cp.icr.io/cp/cp4a/ads/ads-run" +"cp/cp4a/ads/ads-runtime" = "cp.icr.io/cp/cp4a/ads/ads-runtime" +"cp/cp4a/ban/navigator" = "cp.icr.io/cp/cp4a/ban/navigator" +"cp/cp4a/ban/navigator-sso" = "cp.icr.io/cp/cp4a/ban/navigator-sso" +"cp/cp4a/fncm/cmis" = "cp.icr.io/cp/cp4a/fncm/cmis" +"cp/cp4a/fncm/cpe" = "cp.icr.io/cp/cp4a/fncm/cpe" +"cp/cp4a/fncm/css" = "cp.icr.io/cp/cp4a/fncm/css" +"cp/cp4a/fncm/extshare" = "cp.icr.io/cp/cp4a/fncm/extshare" +"cp/cp4a/fncm/graphql" = "cp.icr.io/cp/cp4a/fncm/graphql" +"cp/cp4a/fncm/taskmgr" = "cp.icr.io/cp/cp4a/fncm/taskmgr" +"cp/cp4a/icp4a-operator" = "cp.icr.io/cp/cp4a/icp4a-operator" +"cp/cp4a/pfs/pfs-bpd-database-init-prod" = "cp.icr.io/cp/cp4a/pfs/pfs-bpd-database-init-prod" +"cp/cp4a/pfs/pfs-elasticsearch-prod" = "cp.icr.io/cp/cp4a/pfs/pfs-elasticsearch-prod" +"cp/cp4a/pfs/pfs-init-prod" = "cp.icr.io/cp/cp4a/pfs/pfs-init-prod" +"cp/cp4a/pfs/pfs-nginx-prod" = "cp.icr.io/cp/cp4a/pfs/pfs-nginx-prod" +"cp/cp4a/pfs/pfs-prod" = "cp.icr.io/cp/cp4a/pfs/pfs-prod" +"cp/cp4a/ums/ums" = "cp.icr.io/cp/cp4a/ums/ums" +"cp/cpd/aios-bias-service" = "cp.icr.io/cp/cpd/aios-bias-service" +"cp/cpd/aios-bkpi-combined-services" = "cp.icr.io/cp/cpd/aios-bkpi-combined-services" +"cp/cpd/aios-common-api" = "cp.icr.io/cp/cpd/aios-common-api" +"cp/cpd/aios-common-api-nlp" = "cp.icr.io/cp/cpd/aios-common-api-nlp" +"cp/cpd/aios-configuration-service" = "cp.icr.io/cp/cpd/aios-configuration-service" +"cp/cpd/aios-dashboard" = "cp.icr.io/cp/cpd/aios-dashboard" +"cp/cpd/aios-datamart-service-api" = "cp.icr.io/cp/cpd/aios-datamart-service-api" +"cp/cpd/aios-etcd" = "cp.icr.io/cp/cpd/aios-etcd" +"cp/cpd/aios-fast-path" = "cp.icr.io/cp/cpd/aios-fast-path" +"cp/cpd/aios-feedback-service" = "cp.icr.io/cp/cpd/aios-feedback-service" +"cp/cpd/aios-kafka" = "cp.icr.io/cp/cpd/aios-kafka" +"cp/cpd/aios-kubectl" = "cp.icr.io/cp/cpd/aios-kubectl" +"cp/cpd/aios-migration-tool" = "cp.icr.io/cp/cpd/aios-migration-tool" +"cp/cpd/aios-ml-gateway-discovery" = "cp.icr.io/cp/cpd/aios-ml-gateway-discovery" +"cp/cpd/aios-ml-gateway-service" = "cp.icr.io/cp/cpd/aios-ml-gateway-service" +"cp/cpd/aios-nginx-local" = "cp.icr.io/cp/cpd/aios-nginx-local" +"cp/cpd/aios-orch-notifications-service" = "cp.icr.io/cp/cpd/aios-orch-notifications-service" +"cp/cpd/aios-payload-logging-service-api" = "cp.icr.io/cp/cpd/aios-payload-logging-service-api" +"cp/cpd/aios-payload-logging-service" = "cp.icr.io/cp/cpd/aios-payload-logging-service" +"cp/cpd/aios-redis" = "cp.icr.io/cp/cpd/aios-redis" +"cp/cpd/aios-zoo-keeper" = "cp.icr.io/cp/cpd/aios-zoo-keeper" +"cp/cpd/asset-files-api" = "cp.icr.io/cp/cpd/asset-files-api" +"cp/cpd/autoai_kb_3.1-py379-g1" = "cp.icr.io/cp/cpd/autoai_kb_3.1-py379-g1" +"cp/cpd/catalog_master" = "cp.icr.io/cp/cpd/catalog_master" +"cp/cpd/cp4d-tiller" = "cp.icr.io/cp/cpd/cp4d-tiller" +"cp/cpd/cp4d-zen-admin" = "cp.icr.io/cp/cpd/cp4d-zen-admin" +"cp/cpd/cpdoperator" = "cp.icr.io/cp/cpd/cpdoperator" +"cp/cpd/cpd-operator-init" = "cp.icr.io/cp/cpd/cpd-operator-init" +"cp/cpd/dap-base-job" = "cp.icr.io/cp/cpd/dap-base-job" +"cp/cpd/dap-dashboards-api" = "cp.icr.io/cp/cpd/dap-dashboards-api" +"cp/cpd/dataview-api-service" = "cp.icr.io/cp/cpd/dataview-api-service" +"cp/cpd/dc-main" = "cp.icr.io/cp/cpd/dc-main" +"cp/cpd/dd-init" = "cp.icr.io/cp/cpd/dd-init" +"cp/cpd/dd-scenario-api" = "cp.icr.io/cp/cpd/dd-scenario-api" +"cp/cpd/dd-scenario-ui" = "cp.icr.io/cp/cpd/dd-scenario-ui" +"cp/cpd/drift" = "cp.icr.io/cp/cpd/drift" +"cp/cpd/dsx-requisite" = "cp.icr.io/cp/cpd/dsx-requisite" +"cp/cpd/dv-api" = "cp.icr.io/cp/cpd/dv-api" +"cp/cpd/dv-extension-translations" = "cp.icr.io/cp/cpd/dv-extension-translations" +"cp/cpd/dv-unified-console" = "cp.icr.io/cp/cpd/dv-unified-console" +"cp/cpd/environments" = "cp.icr.io/cp/cpd/environments" +"cp/cpd/environments-init-job" = "cp.icr.io/cp/cpd/environments-init-job" +"cp/cpd/etcd-ubi" = "cp.icr.io/cp/cpd/etcd-ubi" +"cp/cpd/event-logger-api" = "cp.icr.io/cp/cpd/event-logger-api" +"cp/cpd/explainability" = "cp.icr.io/cp/cpd/explainability" +"cp/cpd/flow-api" = "cp.icr.io/cp/cpd/flow-api" +"cp/cpd/flow-session" = "cp.icr.io/cp/cpd/flow-session" +"cp/cpd/flow-ui" = "cp.icr.io/cp/cpd/flow-ui" +"cp/cpd/ibm-db2z-addon" = "cp.icr.io/cp/cpd/ibm-db2z-addon" +"cp/cpd/ibm-db2z-svp" = "cp.icr.io/cp/cpd/ibm-db2z-svp" +"cp/cpd/ibm-db2z-uc" = "cp.icr.io/cp/cpd/ibm-db2z-uc" +"cp/cpd/ibm-db2z-ui" = "cp.icr.io/cp/cpd/ibm-db2z-ui" +"cp/cpd/icp4data-nginx-repo" = "cp.icr.io/cp/cpd/icp4data-nginx-repo" +"cp/cpd/icp4d-requisite" = "cp.icr.io/cp/cpd/icp4d-requisite" +"cp/cpd/icpd-requisite" = "cp.icr.io/cp/cpd/icpd-requisite" +"cp/cpd/influxdb" = "cp.icr.io/cp/cpd/influxdb" +"cp/cpd/instascan-ap-analysis-service" = "cp.icr.io/cp/cpd/instascan-ap-analysis-service" +"cp/cpd/instascan-api-server" = "cp.icr.io/cp/cpd/instascan-api-server" +"cp/cpd/instascan-ap-service" = "cp.icr.io/cp/cpd/instascan-ap-service" +"cp/cpd/instascan-ap-tika" = "cp.icr.io/cp/cpd/instascan-ap-tika" +"cp/cpd/instascan-doc-preview-service" = "cp.icr.io/cp/cpd/instascan-doc-preview-service" +"cp/cpd/instascan-ds-manager" = "cp.icr.io/cp/cpd/instascan-ds-manager" +"cp/cpd/instascan-nginx" = "cp.icr.io/cp/cpd/instascan-nginx" +"cp/cpd/instascan-openjdk" = "cp.icr.io/cp/cpd/instascan-openjdk" +"cp/cpd/instascan-postgres" = "cp.icr.io/cp/cpd/instascan-postgres" +"cp/cpd/instascan-vault" = "cp.icr.io/cp/cpd/instascan-vault" +"cp/cpd/jobs-api" = "cp.icr.io/cp/cpd/jobs-api" +"cp/cpd/jobs-trigger" = "cp.icr.io/cp/cpd/jobs-trigger" +"cp/cpd/jobs-ui" = "cp.icr.io/cp/cpd/jobs-ui" +"cp/cpd/jupyter-notebooks-converter" = "cp.icr.io/cp/cpd/jupyter-notebooks-converter" +"cp/cpd/kubectlclient" = "cp.icr.io/cp/cpd/kubectlclient" +"cp/cpd/mlrepositoryservicehydra" = "cp.icr.io/cp/cpd/mlrepositoryservicehydra" +"cp/cpd/model-operation-service-scheduling" = "cp.icr.io/cp/cpd/model-operation-service-scheduling" +"cp/cpd/model-risk-management" = "cp.icr.io/cp/cpd/model-risk-management" +"cp/cpd/model_viewer" = "cp.icr.io/cp/cpd/model_viewer" +"cp/cpd/ngp-projects-api" = "cp.icr.io/cp/cpd/ngp-projects-api" +"cp/cpd/notebooks" = "cp.icr.io/cp/cpd/notebooks" +"cp/cpd/portal-common-api" = "cp.icr.io/cp/cpd/portal-common-api" +"cp/cpd/portal-dashboards" = "cp.icr.io/cp/cpd/portal-dashboards" +"cp/cpd/portal-job-manager" = "cp.icr.io/cp/cpd/portal-job-manager" +"cp/cpd/portal-main" = "cp.icr.io/cp/cpd/portal-main" +"cp/cpd/portal-ml-dl" = "cp.icr.io/cp/cpd/portal-ml-dl" +"cp/cpd/portal-notifications" = "cp.icr.io/cp/cpd/portal-notifications" +"cp/cpd/pre-installer" = "cp.icr.io/cp/cpd/pre-installer" +"cp/cpd/privatecloud-dsx-hi-proxy" = "cp.icr.io/cp/cpd/privatecloud-dsx-hi-proxy" +"cp/cpd/privatecloud-redis-repo" = "cp.icr.io/cp/cpd/privatecloud-redis-repo" +"cp/cpd/privatecloud-spawner-api-k8s" = "cp.icr.io/cp/cpd/privatecloud-spawner-api-k8s" +"cp/cpd/privatecloud-usermgmt" = "cp.icr.io/cp/cpd/privatecloud-usermgmt" +"cp/cpd/privatecloud-utils-api" = "cp.icr.io/cp/cpd/privatecloud-utils-api" +"cp/cpd/shaper-preinstall" = "cp.icr.io/cp/cpd/shaper-preinstall" +"cp/cpd/shaper-server" = "cp.icr.io/cp/cpd/shaper-server" +"cp/cpd/spaces" = "cp.icr.io/cp/cpd/spaces" +"cp/cpd/spaces-ui" = "cp.icr.io/cp/cpd/spaces-ui" +"cp/cpd/spark-hb-control-plane" = "cp.icr.io/cp/cpd/spark-hb-control-plane" +"cp/cpd/spark-hb-db-spec" = "cp.icr.io/cp/cpd/spark-hb-db-spec" +"cp/cpd/spark-hb-helm-repo" = "cp.icr.io/cp/cpd/spark-hb-helm-repo" +"cp/cpd/spark-hb-jkg" = "cp.icr.io/cp/cpd/spark-hb-jkg" +"cp/cpd/spark-hb-nginx" = "cp.icr.io/cp/cpd/spark-hb-nginx" +"cp/cpd/spark-hb-python" = "cp.icr.io/cp/cpd/spark-hb-python" +"cp/cpd/spark-hb-rsyslog-sidecar" = "cp.icr.io/cp/cpd/spark-hb-rsyslog-sidecar" +"cp/cpd/spark-hb-truststore-util" = "cp.icr.io/cp/cpd/spark-hb-truststore-util" +"cp/cpd/wdp-dataprep" = "cp.icr.io/cp/cpd/wdp-dataprep" +"cp/cpd/wdp-dataview" = "cp.icr.io/cp/cpd/wdp-dataview" +"cp/cpd/wdp-dataview-secrets-job" = "cp.icr.io/cp/cpd/wdp-dataview-secrets-job" +"cp/cpd/wdp-shaper" = "cp.icr.io/cp/cpd/wdp-shaper" +"cp/cpd/wml-autoai-kb" = "cp.icr.io/cp/cpd/wml-autoai-kb" +"cp/cpd/wml-automl-obm-hybrid-pipeline" = "cp.icr.io/cp/cpd/wml-automl-obm-hybrid-pipeline" +"cp/cpd/wml-aux" = "cp.icr.io/cp/cpd/wml-aux" +"cp/cpd/wml-cp4d-3.5-upgrade" = "cp.icr.io/cp/cpd/wml-cp4d-3.5-upgrade" +"cp/cpd/wml-deployment-agent" = "cp.icr.io/cp/cpd/wml-deployment-agent" +"cp/cpd/wml-deployment-envoy" = "cp.icr.io/cp/cpd/wml-deployment-envoy" +"cp/cpd/wml-deployment-manager" = "cp.icr.io/cp/cpd/wml-deployment-manager" +"cp/cpd/wml-deployment-runtime-py37-1" = "cp.icr.io/cp/cpd/wml-deployment-runtime-py37-1" +"cp/cpd/wml-federated-learning" = "cp.icr.io/cp/cpd/wml-federated-learning" +"cp/cpd/wml-os-runtimes-do" = "cp.icr.io/cp/cpd/wml-os-runtimes-do" +"cp/cpd/wml-preinstall-secret" = "cp.icr.io/cp/cpd/wml-preinstall-secret" +"cp/cpd/wmlrepositoryv4" = "cp.icr.io/cp/cpd/wmlrepositoryv4" +"cp/cpd/wml-rt-ac201903-py368-g1" = "cp.icr.io/cp/cpd/wml-rt-ac201903-py368-g1" +"cp/cpd/wml-rt-ac201903-py368-g2" = "cp.icr.io/cp/cpd/wml-rt-ac201903-py368-g2" +"cp/cpd/wml-rt-ac201903-py368-g3" = "cp.icr.io/cp/cpd/wml-rt-ac201903-py368-g3" +"cp/cpd/wml-rt-autoai_kb_3.0-py3612-g1" = "cp.icr.io/cp/cpd/wml-rt-autoai_kb_3.0-py3612-g1" +"cp/cpd/wml-rt-autoai_kb_3.2-py379-g1" = "cp.icr.io/cp/cpd/wml-rt-autoai_kb_3.2-py379-g1" +"cp/cpd/wml-rt-bd-spss18.1" = "cp.icr.io/cp/cpd/wml-rt-bd-spss18.1" +"cp/cpd/wml-rt-hybrid" = "cp.icr.io/cp/cpd/wml-rt-hybrid" +"cp/cpd/wml-rt-init-dep-service-py" = "cp.icr.io/cp/cpd/wml-rt-init-dep-service-py" +"cp/cpd/wml-rt-mc3-py368-g2" = "cp.icr.io/cp/cpd/wml-rt-mc3-py368-g2" +"cp/cpd/wml-rt-mc3-py379-g1" = "cp.icr.io/cp/cpd/wml-rt-mc3-py379-g1" +"cp/cpd/wml-rt-mc3-py379-g2" = "cp.icr.io/cp/cpd/wml-rt-mc3-py379-g2" +"cp/cpd/wml-rt-mllib2.3" = "cp.icr.io/cp/cpd/wml-rt-mllib2.3" +"cp/cpd/wml-rt-mllib2.4" = "cp.icr.io/cp/cpd/wml-rt-mllib2.4" +"cp/cpd/wml-rt-od-spss18.1" = "cp.icr.io/cp/cpd/wml-rt-od-spss18.1" +"cp/cpd/wmltrainingservicehydra" = "cp.icr.io/cp/cpd/wmltrainingservicehydra" +"cp/cpd/wslocal-rstudio-init" = "cp.icr.io/cp/cpd/wslocal-rstudio-init" +"cp/cpd/wslocal-runtime-py36cuda" = "cp.icr.io/cp/cpd/wslocal-runtime-py36cuda" +"cp/cpd/wslocal-runtime-py36main" = "cp.icr.io/cp/cpd/wslocal-runtime-py36main" +"cp/cpd/wslocal-runtime-py37cuda" = "cp.icr.io/cp/cpd/wslocal-runtime-py37cuda" +"cp/cpd/wslocal-runtime-py37main" = "cp.icr.io/cp/cpd/wslocal-runtime-py37main" +"cp/cpd/wslocal-runtime-r36" = "cp.icr.io/cp/cpd/wslocal-runtime-r36" +"cp/cpd/wslocal-runtime-rstudio" = "cp.icr.io/cp/cpd/wslocal-runtime-rstudio" +"cp/cpd/wslocal-runtime-shiny" = "cp.icr.io/cp/cpd/wslocal-runtime-shiny" +"cp/cpd/zen-audit" = "cp.icr.io/cp/cpd/zen-audit" +"cp/cpd/zen-core-api" = "cp.icr.io/cp/cpd/zen-core-api" +"cp/cpd/zen-core" = "cp.icr.io/cp/cpd/zen-core" +"cp/cpd/zen-database-core" = "icr.io/cp/cpd/zen-database-core" +"cp/cpd/zen-databases-catalog-db2oltp" = "icr.io/cp/cpd/zen-databases-catalog-db2oltp" +"cp/cpd/zen-databases-catalog-db2wh" = "icr.io/cp/cpd/zen-databases-catalog-db2wh" +"cp/cpd/zen-databases-catalog-dbaaservice" = "icr.io/cp/cpd/zen-databases-catalog-dbaaservice" +"cp/cpd/zen-databases" = "icr.io/cp/cpd/zen-databases" +"cp/cpd/zen-data-sorcerer" = "cp.icr.io/cp/cpd/zen-data-sorcerer" +"cp/cpd/zen-meta-couchdb" = "cp.icr.io/cp/cpd/zen-meta-couchdb" +"cp/cpd/zen-watchdog" = "cp.icr.io/cp/cpd/zen-watchdog" +"cp/datapower/datapower-cp4i" = "cp.icr.io/cp/datapower/datapower-cp4i" +"cp/datapower/datapower-deved" = "cp.icr.io/cp/datapower/datapower-deved" +"cp/datapower/datapower-prod" = "cp.icr.io/cp/datapower/datapower-prod" +"cp/datastage/ds-entitlement-image" = "cp.icr.io/cp/datastage/ds-entitlement-image" +"cp/datastage/ds-nginx-proxy" = "cp.icr.io/cp/datastage/ds-nginx-proxy" +"cp/datastage-ent/ds-ent-entitlement-image" = "cp.icr.io/cp/datastage-ent/ds-ent-entitlement-image" +"cp/fbr/guardian-application-service" = "cp.icr.io/cp/fbr/guardian-application-service" +"cp/fbr/guardian-backup-location" = "cp.icr.io/cp/fbr/guardian-backup-location" +"cp/fbr/guardian-backup-policy" = "cp.icr.io/cp/fbr/guardian-backup-policy" +"cp/fbr/guardian-backup-service" = "cp.icr.io/cp/fbr/guardian-backup-service" +"cp/fbr/guardian-job-manager" = "cp.icr.io/cp/fbr/guardian-job-manager" +"cp/fbr/guardian-transaction-manager" = "cp.icr.io/cp/fbr/guardian-transaction-manager" +"cp/fbr/guardian-transaction-manager-minio" = "cp.icr.io/cp/fbr/guardian-transaction-manager-minio" +"cp/fbr/guardian-transaction-manager-worker" = "cp.stg.icr.io/cp/fbr/guardian-transaction-manager-worker" +"cp/iaf-elasticsearch-proxy" = "cp.icr.io/cp/iaf-elasticsearch-proxy" +"cp/iaf-health-service" = "cp.icr.io/cp/iaf-health-service" +"cp/iaf-ui-customization" = "cp.icr.io/cp/iaf-ui-customization" +"cp/ibm-cpq/cpq-ifs-agent" = "cp.icr.io/cp/ibm-cpq/cpq-ifs-agent" +"cp/ibm-cpq/cpq-ifs-app" = "cp.icr.io/cp/ibm-cpq/cpq-ifs-app" +"cp/ibm-cpq/cpq-ifs-base" = "cp.icr.io/cp/ibm-cpq/cpq-ifs-base" +"cp/ibm-cpq/cpq-oc-app" = "cp.icr.io/cp/ibm-cpq/cpq-oc-app" +"cp/ibm-cpq/cpq-vm-app" = "cp.icr.io/cp/ibm-cpq/cpq-vm-app" +"cp/ibm-cpq/cpq-vmoc-base" = "cp.icr.io/cp/ibm-cpq/cpq-vmoc-base" +"cp/ibm-eventstreams-admin" = "cp.icr.io/cp/ibm-eventstreams-admin" +"cp/ibm-eventstreams-admin-ui" = "cp.icr.io/cp/ibm-eventstreams-admin-ui" +"cp/ibm-eventstreams-apicurio" = "cp.icr.io/cp/ibm-eventstreams-apicurio" +"cp/ibm-eventstreams-jmxtrans" = "cp.icr.io/cp/ibm-eventstreams-jmxtrans" +"cp/ibm-eventstreams-kafka" = "cp.icr.io/cp/ibm-eventstreams-kafka" +"cp/ibm-eventstreams-metrics-collector" = "cp.icr.io/cp/ibm-eventstreams-metrics-collector" +"cp/ibm-eventstreams-rest-producer" = "cp.icr.io/cp/ibm-eventstreams-rest-producer" +"cp/ibm-eventstreams-schema-proxy" = "cp.icr.io/cp/ibm-eventstreams-schema-proxy" +"cp/ibm-eventstreams-schema-registry-avro" = "cp.icr.io/cp/ibm-eventstreams-schema-registry-avro" +"cp/ibm-eventstreams-schema-registry" = "cp.icr.io/cp/ibm-eventstreams-schema-registry" +"cp/ibm-eventstreams-session-store" = "cp.icr.io/cp/ibm-eventstreams-session-store" +"cp/ibm-itx-rs" = "cp.icr.io/cp/ibm-itx-rs" +"cp/ibm-oms-enterprise/om-agent" = "cp.icr.io/cp/ibm-oms-enterprise/om-agent" +"cp/ibm-oms-enterprise/om-app" = "cp.icr.io/cp/ibm-oms-enterprise/om-app" +"cp/ibm-oms-enterprise/om-base" = "cp.icr.io/cp/ibm-oms-enterprise/om-base" +"cp/ibm-oms-professional/om-agent" = "cp.icr.io/cp/ibm-oms-professional/om-agent" +"cp/ibm-oms-professional/om-app" = "cp.icr.io/cp/ibm-oms-professional/om-app" +"cp/ibm-oms-professional/om-base" = "cp.icr.io/cp/ibm-oms-professional/om-base" +"cp/ibm-watson-discovery/cnm-api" = "us.icr.io/cp/ibm-watson-discovery/cnm-api" +"cp/ibm-watson-discovery/cnm-dbinit" = "us.icr.io/cp/ibm-watson-discovery/cnm-dbinit" +"cp/ibm-watson-discovery/configure-etcd" = "us.icr.io/cp/ibm-watson-discovery/configure-etcd" +"cp/ibm-watson-discovery/configure-postgres" = "us.icr.io/cp/ibm-watson-discovery/configure-postgres" +"cp/ibm-watson-discovery/custom-crawler-sdk" = "us.icr.io/cp/ibm-watson-discovery/custom-crawler-sdk" +"cp/ibm-watson-discovery/disco-ranker-server" = "us.icr.io/cp/ibm-watson-discovery/disco-ranker-server" +"cp/ibm-watson-discovery/discovery-ranker-rest-service" = "us.icr.io/cp/ibm-watson-discovery/discovery-ranker-rest-service" +"cp/ibm-watson-discovery/haywire" = "us.icr.io/cp/ibm-watson-discovery/haywire" +"cp/ibm-watson-discovery/icp-jks-gen" = "us.icr.io/cp/ibm-watson-discovery/icp-jks-gen" +"cp/ibm-watson-discovery/icp-util" = "us.icr.io/cp/ibm-watson-discovery/icp-util" +"cp/ibm-watson-discovery/kg-gensim-nonroot-user" = "us.icr.io/cp/ibm-watson-discovery/kg-gensim-nonroot-user" +"cp/ibm-watson-discovery/kg-induction" = "us.icr.io/cp/ibm-watson-discovery/kg-induction" +"cp/ibm-watson-discovery/kg-modelmesh" = "us.icr.io/cp/ibm-watson-discovery/kg-modelmesh" +"cp/ibm-watson-discovery/logging-server" = "us.icr.io/cp/ibm-watson-discovery/logging-server" +"cp/ibm-watson-discovery/model-mesh" = "us.icr.io/cp/ibm-watson-discovery/model-mesh" +"cp/ibm-watson-discovery/opencontent-icp-cert-gen-1" = "cp.icr.io/cp/ibm-watson-discovery/opencontent-icp-cert-gen-1" +"cp/ibm-watson-discovery/opencontent-postgres-stolon" = "us.icr.io/cp/ibm-watson-discovery/opencontent-postgres-stolon" +"cp/ibm-watson-discovery/ranker-monitor-agent" = "us.icr.io/cp/ibm-watson-discovery/ranker-monitor-agent" +"cp/ibm-watson-discovery/ranker-training" = "us.icr.io/cp/ibm-watson-discovery/ranker-training" +"cp/ibm-watson-discovery/rhubi-statsd-exporter" = "us.icr.io/cp/ibm-watson-discovery/rhubi-statsd-exporter" +"cp/ibm-watson-discovery/sdu-spark-db-init" = "us.icr.io/cp/ibm-watson-discovery/sdu-spark-db-init" +"cp/ibm-watson-discovery/sdu-spark" = "us.icr.io/cp/ibm-watson-discovery/sdu-spark" +"cp/ibm-watson-discovery/sentence-classification-gpu" = "us.icr.io/cp/ibm-watson-discovery/sentence-classification-gpu" +"cp/ibm-watson-discovery/sentence-classification" = "us.icr.io/cp/ibm-watson-discovery/sentence-classification" +"cp/ibm-watson-discovery/tooling" = "us.icr.io/cp/ibm-watson-discovery/tooling" +"cp/ibm-watson-discovery/training-agent" = "us.icr.io/cp/ibm-watson-discovery/training-agent" +"cp/ibm-watson-discovery/training-data-crud" = "us.icr.io/cp/ibm-watson-discovery/training-data-crud" +"cp/ibm-watson-discovery/training-master" = "us.icr.io/cp/ibm-watson-discovery/training-master" +"cp/ibm-watson-discovery/training-rest" = "us.icr.io/cp/ibm-watson-discovery/training-rest" +"cp/ibm-watson-discovery/watson-nlp-models" = "us.icr.io/cp/ibm-watson-discovery/watson-nlp-models" +"cp/ibm-watson-discovery/wd-adminapp" = "us.icr.io/cp/ibm-watson-discovery/wd-adminapp" +"cp/ibm-watson-discovery/wd-api" = "us.icr.io/cp/ibm-watson-discovery/wd-api" +"cp/ibm-watson-discovery/wd-hdp" = "us.icr.io/cp/ibm-watson-discovery/wd-hdp" +"cp/ibm-watson-discovery/wd-ingestion-api" = "us.icr.io/cp/ibm-watson-discovery/wd-ingestion-api" +"cp/ibm-watson-discovery/wd-ingestion" = "us.icr.io/cp/ibm-watson-discovery/wd-ingestion" +"cp/ibm-watson-discovery/wd-management" = "us.icr.io/cp/ibm-watson-discovery/wd-management" +"cp/ibm-watson-discovery/wd-migrator" = "us.icr.io/cp/ibm-watson-discovery/wd-migrator" +"cp/ibm-watson-discovery/wd-minerapp" = "us.icr.io/cp/ibm-watson-discovery/wd-minerapp" +"cp/ibm-watson-discovery/wd-nginx" = "us.icr.io/cp/ibm-watson-discovery/wd-nginx" +"cp/ibm-watson-discovery/wd-orchestrator" = "us.icr.io/cp/ibm-watson-discovery/wd-orchestrator" +"cp/ibm-watson-discovery/wd-rapi" = "us.icr.io/cp/ibm-watson-discovery/wd-rapi" +"cp/ibm-watson-discovery/wd-stateless-api-model-runtime" = "us.icr.io/cp/ibm-watson-discovery/wd-stateless-api-model-runtime" +"cp/ibm-watson-discovery/wd-stateless-api-rest-proxy" = "us.icr.io/cp/ibm-watson-discovery/wd-stateless-api-rest-proxy" +"cp/ibm-watson-discovery/wd-utils" = "us.icr.io/cp/ibm-watson-discovery/wd-utils" +"cp/ibm-watson-discovery/wd-webpagecleaner" = "us.icr.io/cp/ibm-watson-discovery/wd-webpagecleaner" +"cp/ibm-watson-discovery/wd-wksml" = "us.icr.io/cp/ibm-watson-discovery/wd-wksml" +"cp/ibm-watson-discovery/wks-ene-expand" = "us.icr.io/cp/ibm-watson-discovery/wks-ene-expand" +"cp/ibm-watson-discovery/wks-glimpse-ene-builder" = "us.icr.io/cp/ibm-watson-discovery/wks-glimpse-ene-builder" +"cp/ibm-watson-discovery/wks-ibmjdk8-rhubi8" = "us.icr.io/cp/ibm-watson-discovery/wks-ibmjdk8-rhubi8" +"cp/ibp-ca" = "cp.icr.io/cp/ibp-ca" +"cp/ibp-ccenv" = "cp.icr.io/cp/ibp-ccenv" +"cp/ibp-chaincode-launcher" = "cp.icr.io/cp/ibp-chaincode-launcher" +"cp/ibp-console" = "cp.icr.io/cp/ibp-console" +"cp/ibp-couchdb" = "cp.icr.io/cp/ibp-couchdb" +"cp/ibp-crdwebhook" = "cp.icr.io/cp/ibp-crdwebhook" +"cp/ibp-deployer" = "cp.icr.io/cp/ibp-deployer" +"cp/ibp-fluentd" = "cp.icr.io/cp/ibp-fluentd" +"cp/ibp-goenv" = "cp.icr.io/cp/ibp-goenv" +"cp/ibp-grpcweb" = "cp.icr.io/cp/ibp-grpcweb" +"cp/ibp-init" = "cp.icr.io/cp/ibp-init" +"cp/ibp-javaenv" = "cp.icr.io/cp/ibp-javaenv" +"cp/ibp-nodeenv" = "cp.icr.io/cp/ibp-nodeenv" +"cp/ibp-orderer" = "cp.icr.io/cp/ibp-orderer" +"cp/ibp-peer" = "cp.icr.io/cp/ibp-peer" +"cp/ibp-utilities" = "cp.icr.io/cp/ibp-utilities" +"cp/icp4i" = "cp.icr.io/cp/icp4i" +"cp/icp4i-od-agent" = "cp.stg.icr.io/cp/icp4i-od-agent" +"cp/icp4i-od-agent-prod" = "cp.stg.icr.io/cp/icp4i-od-agent-prod" +"cp/icp4i-od-collector" = "cp.stg.icr.io/cp/icp4i-od-collector" +"cp/icp4i-od-collector-prod" = "cp.stg.icr.io/cp/icp4i-od-collector-prod" +"cp/icpa/icpa-installer" = "cp.icr.io/cp/icpa/icpa-installer" +"cp/icpa/icpa-landing" = "cp.icr.io/cp/icpa/icpa-landing" +"cp/icpa/icpa-operator-registry" = "cp.icr.io/cp/icpa/icpa-operator-registry" +"cp/isf/baas-minio" = "cp.stg.icr.io/cp/isf/baas-minio" +"cp/isf/callhomeclient" = "cp.stg.icr.io/cp/isf/callhomeclient" +"cp/isf/eventmanager" = "cp.stg.icr.io/cp/isf/eventmanager" +"cp/isf/eventmanager-snmp3" = "cp.stg.icr.io/cp/isf/eventmanager-snmp3" +"cp/isf/fusion-ui-app" = "cp.stg.icr.io/cp/isf/fusion-ui-app" +"cp/isf/fusion-ui" = "cp.icr.io/cp/isf/fusion-ui" +"cp/isf/isf-application-operator" = "cp.stg.icr.io/cp/isf/isf-application-operator" +"cp/isf/isf-bkprstr-operator" = "cp.stg.icr.io/cp/isf/isf-bkprstr-operator" +"cp/isf/isf-compute-fw-updater" = "cp.icr.io/cp/isf/isf-compute-fw-updater" +"cp/isf/isf-compute-operator" = "cp.stg.icr.io/cp/isf/isf-compute-operator" +"cp/isf/isf-data-protection-operator" = "cp.stg.icr.io/cp/isf/isf-data-protection-operator" +"cp/isf/isf-ics-operator" = "cp.stg.icr.io/cp/isf/isf-ics-operator" +"cp/isf/isf-installer-operator" = "cp.stg.icr.io/cp/isf/isf-installer-operator" +"cp/isf/isf-metrodr-operator" = "cp.icr.io/cp/isf/isf-metrodr-operator" +"cp/isf/isf-network-fw-updater" = "cp.icr.io/cp/isf/isf-network-fw-updater" +"cp/isf/isf-network-operator" = "cp.stg.icr.io/cp/isf/isf-network-operator" +"cp/isf/isf-node-exporter" = "cp.stg.icr.io/cp/isf/isf-node-exporter" +"cp/isf/isf-proxy" = "cp.stg.icr.io/cp/isf/isf-proxy" +"cp/isf/isf-serviceability-operator" = "cp.stg.icr.io/cp/isf/isf-serviceability-operator" +"cp/isf/isf-snmp-exporter" = "cp.stg.icr.io/cp/isf/isf-snmp-exporter" +"cp/isf/isf-storage-operator" = "cp.stg.icr.io/cp/isf/isf-storage-operator" +"cp/isf/isf-storage-services" = "cp.stg.icr.io/cp/isf/isf-storage-services" +"cp/isf/isf-ui-operator" = "cp.stg.icr.io/cp/isf/isf-ui-operator" +"cp/isf/isf-update-operator" = "cp.stg.icr.io/cp/isf/isf-update-operator" +"cp/isf/isf-utils" = "cp.icr.io/cp/isf/isf-utils" +"cp/isf/logcollector" = "cp.stg.icr.io/cp/isf/logcollector" +"cp/isf/ramen-operator" = "cp.icr.io/cp/isf/ramen-operator" +"cp/isf-sds/isf-cns-operator" = "cp.stg.icr.io/cp/isf-sds/isf-cns-operator" +"cp/isf-sds/isf-prereq-operator" = "cp.stg.icr.io/cp/isf-sds/isf-prereq-operator" +"cp/isf/spp-dp-operator" = "cp.stg.icr.io/cp/isf/spp-dp-operator" +"cp/knowledge-studio/aql-web-tooling" = "cp.icr.io/cp/knowledge-studio/aql-web-tooling" +"cp/knowledge-studio/aql-web-tooling-proxy" = "cp.icr.io/cp/knowledge-studio/aql-web-tooling-proxy" +"cp/knowledge-studio/dispatcher" = "cp.icr.io/cp/knowledge-studio/dispatcher" +"cp/knowledge-studio/frontend-icp" = "cp.icr.io/cp/knowledge-studio/frontend-icp" +"cp/knowledge-studio/jobq" = "cp.icr.io/cp/knowledge-studio/jobq" +"cp/knowledge-studio/model-management-api" = "cp.icr.io/cp/knowledge-studio/model-management-api" +"cp/knowledge-studio/model-mesh" = "cp.icr.io/cp/knowledge-studio/model-mesh" +"cp/knowledge-studio/opencontent-bats" = "cp.icr.io/cp/knowledge-studio/opencontent-bats" +"cp/knowledge-studio/opencontent-common-utils" = "cp.icr.io/cp/knowledge-studio/opencontent-common-utils" +"cp/knowledge-studio/opencontent-etcd-3" = "cp.icr.io/cp/knowledge-studio/opencontent-etcd-3" +"cp/knowledge-studio/opencontent-icp-cert-gen-1" = "cp.icr.io/cp/knowledge-studio/opencontent-icp-cert-gen-1" +"cp/knowledge-studio/opencontent-minio-client" = "cp.icr.io/cp/knowledge-studio/opencontent-minio-client" +"cp/knowledge-studio/opencontent-minio" = "cp.icr.io/cp/knowledge-studio/opencontent-minio" +"cp/knowledge-studio/opencontent-mongodb-3" = "cp.icr.io/cp/knowledge-studio/opencontent-mongodb-3" +"cp/knowledge-studio/opencontent-mongodb-config-copy" = "cp.icr.io/cp/knowledge-studio/opencontent-mongodb-config-copy" +"cp/knowledge-studio/opencontent-mongodb-install" = "cp.icr.io/cp/knowledge-studio/opencontent-mongodb-install" +"cp/knowledge-studio/opencontent-postgres-stolon" = "cp.icr.io/cp/knowledge-studio/opencontent-postgres-stolon" +"cp/knowledge-studio/sbsep" = "cp.icr.io/cp/knowledge-studio/sbsep" +"cp/knowledge-studio/sireg" = "cp.icr.io/cp/knowledge-studio/sireg" +"cp/knowledge-studio/sire-train-facade" = "cp.icr.io/cp/knowledge-studio/sire-train-facade" +"cp/knowledge-studio/sire-train-runtime" = "cp.icr.io/cp/knowledge-studio/sire-train-runtime" +"cp/knowledge-studio/watson-gateway" = "cp.icr.io/cp/knowledge-studio/watson-gateway" +"cp/knowledge-studio/wks-ene-expand" = "cp.icr.io/cp/knowledge-studio/wks-ene-expand" +"cp/knowledge-studio/wks-glimpse-ene-builder" = "cp.icr.io/cp/knowledge-studio/wks-glimpse-ene-builder" +"cp/knowledge-studio/wks-ibmjdk8-rhubi8" = "cp.icr.io/cp/knowledge-studio/wks-ibmjdk8-rhubi8" +"cp/knowledge-studio/wks-operator" = "cp.icr.io/cp/knowledge-studio/wks-operator" +"cp/knowledge-studio/wks-pginit" = "cp.icr.io/cp/knowledge-studio/wks-pginit" +"cp/knowledge-studio/wkstoolbox" = "cp.icr.io/cp/knowledge-studio/wkstoolbox" +"cp/mdc" = "cp.icr.io/cp/mdc" +"cpopen/ibm-catalog-helm-test" = "icr.io/cpopen/ibm-catalog-helm-test" +"cpopen/ibmcloud-object-storage-driver" = "icr.io/cpopen/ibmcloud-object-storage-driver" +"cpopen/ibmcloud-object-storage-plugin" = "icr.io/cpopen/ibmcloud-object-storage-plugin" +"cpopen/ibm-operator-catalog" = "icr.io/cpopen/ibm-operator-catalog" +"cp/openscale/aios-bias-service" = "cp.icr.io/cp/openscale/aios-bias-service" +"cp/openscale/aios-bias-service-ppc64le" = "cp.icr.io/cp/openscale/aios-bias-service-ppc64le" +"cp/openscale/aios-bkpi-combined-services" = "cp.icr.io/cp/openscale/aios-bkpi-combined-services" +"cp/openscale/aios-common-api" = "cp.icr.io/cp/openscale/aios-common-api" +"cp/openscale/aios-common-api-nlp" = "cp.icr.io/cp/openscale/aios-common-api-nlp" +"cp/openscale/aios-common-api-nlp-ppc64le" = "cp.icr.io/cp/openscale/aios-common-api-nlp-ppc64le" +"cp/openscale/aios-common-api-ppc64le" = "cp.icr.io/cp/openscale/aios-common-api-ppc64le" +"cp/openscale/aios-configuration-service" = "cp.icr.io/cp/openscale/aios-configuration-service" +"cp/openscale/aios-configuration-service-ppc64le" = "cp.icr.io/cp/openscale/aios-configuration-service-ppc64le" +"cp/openscale/aios-dashboard" = "cp.icr.io/cp/openscale/aios-dashboard" +"cp/openscale/aios-datamart-service-api" = "cp.icr.io/cp/openscale/aios-datamart-service-api" +"cp/openscale/aios-datamart-service-api-ppc64le" = "cp.icr.io/cp/openscale/aios-datamart-service-api-ppc64le" +"cp/openscale/aios-etcd" = "cp.icr.io/cp/openscale/aios-etcd" +"cp/openscale/aios-etcd-ppc64le" = "cp.icr.io/cp/openscale/aios-etcd-ppc64le" +"cp/openscale/aios-fast-path" = "cp.icr.io/cp/openscale/aios-fast-path" +"cp/openscale/aios-fast-path-ppc64le" = "cp.icr.io/cp/openscale/aios-fast-path-ppc64le" +"cp/openscale/aios-feedback-service" = "cp.icr.io/cp/openscale/aios-feedback-service" +"cp/openscale/aios-kafka" = "cp.icr.io/cp/openscale/aios-kafka" +"cp/openscale/aios-kafka-ppc64le" = "cp.icr.io/cp/openscale/aios-kafka-ppc64le" +"cp/openscale/aios-kubectl" = "cp.icr.io/cp/openscale/aios-kubectl" +"cp/openscale/aios-kubectl-ppc64le" = "cp.icr.io/cp/openscale/aios-kubectl-ppc64le" +"cp/openscale/aios-migration-tool" = "cp.icr.io/cp/openscale/aios-migration-tool" +"cp/openscale/aios-ml-gateway-discovery" = "cp.icr.io/cp/openscale/aios-ml-gateway-discovery" +"cp/openscale/aios-ml-gateway-discovery-ppc64le" = "cp.icr.io/cp/openscale/aios-ml-gateway-discovery-ppc64le" +"cp/openscale/aios-ml-gateway-service" = "cp.icr.io/cp/openscale/aios-ml-gateway-service" +"cp/openscale/aios-ml-gateway-service-ppc64le" = "cp.icr.io/cp/openscale/aios-ml-gateway-service-ppc64le" +"cp/openscale/aios-nginx-local" = "cp.icr.io/cp/openscale/aios-nginx-local" +"cp/openscale/aios-nginx-local-ppc64le" = "cp.icr.io/cp/openscale/aios-nginx-local-ppc64le" +"cp/openscale/aios-orch-notifications-service" = "cp.icr.io/cp/openscale/aios-orch-notifications-service" +"cp/openscale/aios-payload-logging-service-api" = "cp.icr.io/cp/openscale/aios-payload-logging-service-api" +"cp/openscale/aios-payload-logging-service-api-ppc64le" = "cp.icr.io/cp/openscale/aios-payload-logging-service-api-ppc64le" +"cp/openscale/aios-payload-logging-service" = "cp.icr.io/cp/openscale/aios-payload-logging-service" +"cp/openscale/aios-redis" = "cp.icr.io/cp/openscale/aios-redis" +"cp/openscale/aios-redis-ppc64le" = "cp.icr.io/cp/openscale/aios-redis-ppc64le" +"cp/openscale/aios-zoo-keeper" = "cp.icr.io/cp/openscale/aios-zoo-keeper" +"cp/openscale/aios-zoo-keeper-ppc64le" = "cp.icr.io/cp/openscale/aios-zoo-keeper-ppc64le" +"cp/openscale/drift" = "cp.icr.io/cp/openscale/drift" +"cp/openscale/explainability" = "cp.icr.io/cp/openscale/explainability" +"cp/openscale/model-operation-service-scheduling" = "cp.icr.io/cp/openscale/model-operation-service-scheduling" +"cp/openscale/model-operation-service-scheduling-ppc64le" = "cp.icr.io/cp/openscale/model-operation-service-scheduling-ppc64le" +"cp/openscale/model-risk-management" = "cp.icr.io/cp/openscale/model-risk-management" +"cp/openscale/model-risk-management-ppc64le" = "cp.icr.io/cp/openscale/model-risk-management-ppc64le" +"cp/sppc/baas-cert-monitor" = "cp.icr.io/cp/sppc/baas-cert-monitor" +"cp/sppc/baas-controller" = "cp.icr.io/cp/sppc/baas-controller" +"cp/sppc/baas-kafka-operator" = "cp.icr.io/cp/sppc/baas-kafka-operator" +"cp/sppc/baas-minio" = "cp.icr.io/cp/sppc/baas-minio" +"cp/sppc/baas-scheduler" = "cp.icr.io/cp/sppc/baas-scheduler" +"cp/sppc/baas-spp-agent" = "cp.icr.io/cp/sppc/baas-spp-agent" +"cp/sppc/baas-transaction-manager" = "cp.icr.io/cp/sppc/baas-transaction-manager" +"cp/sppc/baas-transaction-manager-redis" = "cp.icr.io/cp/sppc/baas-transaction-manager-redis" +"cp/sppc/baas-transaction-manager-worker" = "cp.icr.io/cp/sppc/baas-transaction-manager-worker" +"cp/voice-gateway-dvt" = "cp.icr.io/cp/voice-gateway-dvt" +"cp/watson-aiops/core-tests" = "cp.icr.io/cp/watson-aiops/core-tests" +"cp/watson-aiops/data-preprocessing-mtworkflow" = "cp.icr.io/cp/watson-aiops/data-preprocessing-mtworkflow" +"cp/watson-aiops/flink-core" = "cp.icr.io/cp/watson-aiops/flink-core" +"cp/watson-aiops/jobmonitor" = "cp.icr.io/cp/watson-aiops/jobmonitor" +"cp/watson-aiops/model-train-console" = "cp.icr.io/cp/watson-aiops/model-train-console" +"cp/watson-aiops/opencontent-common-utils" = "cp.icr.io/cp/watson-aiops/opencontent-common-utils" +"cp/watson-aiops/opencontent-elasticsearch-7" = "cp.icr.io/cp/watson-aiops/opencontent-elasticsearch-7" +"cp/watson-aiops/opencontent-icp-cert-gen-1" = "cp.icr.io/cp/watson-aiops/opencontent-icp-cert-gen-1" +"cp/watson-assistant/analytics" = "cp.icr.io/cp/watson-assistant/analytics" +"cp/watson-assistant/assistant-operator" = "cp.icr.io/cp/watson-assistant/assistant-operator" +"cp/watson-assistant/clu-controller" = "cp.icr.io/cp/watson-assistant/clu-controller" +"cp/watson-assistant/clu-embedding-service" = "cp.icr.io/cp/watson-assistant/clu-embedding-service" +"cp/watson-assistant/clu_embedding_service" = "cp.icr.io/cp/watson-assistant/clu_embedding_service" +"cp/watson-assistant/clu-serving" = "cp.icr.io/cp/watson-assistant/clu-serving" +"cp/watson-assistant/clu-training" = "cp.icr.io/cp/watson-assistant/clu-training" +"cp/watson-assistant/conan-tools" = "cp.icr.io/cp/watson-assistant/conan-tools" +"cp/watson-assistant/dialog" = "cp.icr.io/cp/watson-assistant/dialog" +"cp/watson-assistant/dvt-bdd-ubi" = "cp.icr.io/cp/watson-assistant/dvt-bdd-ubi" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.counts" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.counts" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.precomputed" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.precomputed" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.word_embeddings" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.en.word_embeddings" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.es" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.es" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.fr" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.fr" +"cp/watson-assistant/improve-recommendations-data-embeddings-ubi.ja" = "cp.icr.io/cp/watson-assistant/improve-recommendations-data-embeddings-ubi.ja" +"cp/watson-assistant/improve-recommendations-engine-x86_64" = "cp.icr.io/cp/watson-assistant/improve-recommendations-engine-x86_64" +"cp/watson-assistant/improve-recommendations-mongo-ubi" = "cp.icr.io/cp/watson-assistant/improve-recommendations-mongo-ubi" +"cp/watson-assistant/litelinks-grpc" = "cp.icr.io/cp/watson-assistant/litelinks-grpc" +"cp/watson-assistant/model-mesh" = "cp.icr.io/cp/watson-assistant/model-mesh" +"cp/watson-assistant/model-mesh-tfsa" = "cp.icr.io/cp/watson-assistant/model-mesh-tfsa" +"cp/watson-assistant/objectstore-py4j-bridge" = "cp.icr.io/cp/watson-assistant/objectstore-py4j-bridge" +"cp/watson-assistant/opencontent-bats" = "cp.icr.io/cp/watson-assistant/opencontent-bats" +"cp/watson-assistant/opencontent-common-utils" = "cp.icr.io/cp/watson-assistant/opencontent-common-utils" +"cp/watson-assistant/opencontent-etcd-3" = "cp.icr.io/cp/watson-assistant/opencontent-etcd-3" +"cp/watson-assistant/opencontent-icp-cert-gen-1" = "cp.icr.io/cp/watson-assistant/opencontent-icp-cert-gen-1" +"cp/watson-assistant/opencontent-minio-client" = "cp.icr.io/cp/watson-assistant/opencontent-minio-client" +"cp/watson-assistant/opencontent-minio" = "cp.icr.io/cp/watson-assistant/opencontent-minio" +"cp/watson-assistant/opencontent-mongodb-3" = "cp.icr.io/cp/watson-assistant/opencontent-mongodb-3" +"cp/watson-assistant/opencontent-mongodb-config-copy" = "cp.icr.io/cp/watson-assistant/opencontent-mongodb-config-copy" +"cp/watson-assistant/opencontent-mongodb-exporter" = "cp.icr.io/cp/watson-assistant/opencontent-mongodb-exporter" +"cp/watson-assistant/opencontent-mongodb-install" = "cp.icr.io/cp/watson-assistant/opencontent-mongodb-install" +"cp/watson-assistant/opencontent-postgres-stolon" = "cp.icr.io/cp/watson-assistant/opencontent-postgres-stolon" +"cp/watson-assistant/opencontent-redis-3" = "cp.icr.io/cp/watson-assistant/opencontent-redis-3" +"cp/watson-assistant/openentities-serving" = "cp.icr.io/cp/watson-assistant/openentities-serving" +"cp/watson-assistant/recommends-rest-x86_64" = "cp.icr.io/cp/watson-assistant/recommends-rest-x86_64" +"cp/watson-assistant/servicedesk-integration" = "cp.icr.io/cp/watson-assistant/servicedesk-integration" +"cp/watson-assistant/sireg" = "cp.icr.io/cp/watson-assistant/sireg" +"cp/watson-assistant/sireg-model-ubi" = "cp.icr.io/cp/watson-assistant/sireg-model-ubi" +"cp/watson-assistant/skill-search" = "cp.icr.io/cp/watson-assistant/skill-search" +"cp/watson-assistant/spellcheck-server-image" = "cp.icr.io/cp/watson-assistant/spellcheck-server-image" +"cp/watson-assistant/spellcheck-server-image-en-icp" = "cp.icr.io/cp/watson-assistant/spellcheck-server-image-en-icp" +"cp/watson-assistant/spellcheck-server-image-fr-icp" = "cp.icr.io/cp/watson-assistant/spellcheck-server-image-fr-icp" +"cp/watson-assistant/store" = "cp.icr.io/cp/watson-assistant/store" +"cp/watson-assistant/store-sync" = "cp.icr.io/cp/watson-assistant/store-sync" +"cp/watson-assistant/sync-resources" = "cp.icr.io/cp/watson-assistant/sync-resources" +"cp/watson-assistant/system-entities" = "cp.icr.io/cp/watson-assistant/system-entities" +"cp/watson-assistant/tensorflow-model-upload" = "cp.icr.io/cp/watson-assistant/tensorflow-model-upload" +"cp/watson-assistant/tensorflow-serving" = "cp.icr.io/cp/watson-assistant/tensorflow-serving" +"cp/watson-assistant/training-master" = "cp.icr.io/cp/watson-assistant/training-master" +"cp/watson-assistant/ui" = "cp.icr.io/cp/watson-assistant/ui" +"cp/watson-assistant/watson-gateway" = "cp.icr.io/cp/watson-assistant/watson-gateway" +"cp/watson-discovery/cnm-seer" = "cp.icr.io/cp/watson-discovery/cnm-seer" +"cp/watson-discovery/objectstore-toolbox" = "cp.icr.io/cp/watson-discovery/objectstore-toolbox" +"cp/watson-discovery/po-box" = "cp.icr.io/cp/watson-discovery/po-box" +"cp/watson-discovery/wd-elastic-plugins" = "cp.icr.io/cp/watson-discovery/wd-elastic-plugins" +"cp/watson-discovery/wd-indexer" = "cp.icr.io/cp/watson-discovery/wd-indexer" +"cp/watson-discovery/wd-rcm" = "cp.icr.io/cp/watson-discovery/wd-rcm" +"cp/watson-speech/generic-models" = "cp.stg.icr.io/cp/watson-speech/generic-models" +"criticalmanufacturing/connectiot" = "criticalmanufacturing.io/criticalmanufacturing/connectiot" +"criticalmanufacturing/edge-forward-proxy" = "criticalmanufacturing.io/criticalmanufacturing/edge-forward-proxy" +"criticalmanufacturing/envmanager" = "criticalmanufacturing.io/criticalmanufacturing/envmanager" +"criticalmanufacturing/grafana" = "criticalmanufacturing.io/criticalmanufacturing/grafana" +"criticalmanufacturing/help" = "criticalmanufacturing.io/criticalmanufacturing/help" +"criticalmanufacturing/host" = "criticalmanufacturing.io/criticalmanufacturing/host" +"criticalmanufacturing/messagebus" = "criticalmanufacturing.io/criticalmanufacturing/messagebus" +"criticalmanufacturing/securityportal" = "criticalmanufacturing.io/criticalmanufacturing/securityportal" +"criticalmanufacturing/traefik-forwardauth" = "criticalmanufacturing.io/criticalmanufacturing/traefik-forwardauth" +"criticalmanufacturing/ui" = "criticalmanufacturing.io/criticalmanufacturing/ui" +"crowdstrike/falcon-operator-bundle" = "registry.connect.redhat.com/crowdstrike/falcon-operator-bundle" +"crowdstrike/falcon-operator-bundle-rhmp" = "registry.connect.redhat.com/crowdstrike/falcon-operator-bundle-rhmp" +"crowdstrike/falcon-operator" = "registry.connect.redhat.com/crowdstrike/falcon-operator" +"crunchydata/crunchy-pgadmin4" = "registry.connect.redhat.com/crunchydata/crunchy-pgadmin4" +"crunchydata/crunchy-pgbackrest" = "registry.connect.redhat.com/crunchydata/crunchy-pgbackrest" +"crunchydata/crunchy-pgbackrest-repo" = "registry.connect.redhat.com/crunchydata/crunchy-pgbackrest-repo" +"crunchydata/crunchy-pgbadger" = "registry.connect.redhat.com/crunchydata/crunchy-pgbadger" +"crunchydata/crunchy-pgbouncer" = "registry.connect.redhat.com/crunchydata/crunchy-pgbouncer" +"crunchydata/crunchy-postgres-exporter" = "registry.connect.redhat.com/crunchydata/crunchy-postgres-exporter" +"crunchydata/crunchy-postgres-gis-ha" = "registry.connect.redhat.com/crunchydata/crunchy-postgres-gis-ha" +"crunchydata/crunchy-postgres-gis" = "registry.connect.redhat.com/crunchydata/crunchy-postgres-gis" +"crunchydata/crunchy-postgres-ha" = "registry.connect.redhat.com/crunchydata/crunchy-postgres-ha" +"crunchydata/crunchy-postgres" = "registry.connect.redhat.com/crunchydata/crunchy-postgres" +"crunchydata/crunchy-upgrade" = "registry.connect.redhat.com/crunchydata/crunchy-upgrade" +"crunchydata/pgo-apiserver" = "registry.connect.redhat.com/crunchydata/pgo-apiserver" +"crunchydata/pgo-client" = "registry.connect.redhat.com/crunchydata/pgo-client" +"crunchydata/pgo-deployer" = "registry.connect.redhat.com/crunchydata/pgo-deployer" +"crunchydata/pgo-event" = "registry.connect.redhat.com/crunchydata/pgo-event" +"crunchydata/pgo-rmdata" = "registry.connect.redhat.com/crunchydata/pgo-rmdata" +"crunchydata/pgo-scheduler" = "registry.connect.redhat.com/crunchydata/pgo-scheduler" +"crunchydata/postgres-operator-bundle-marketplace" = "registry.connect.redhat.com/crunchydata/postgres-operator-bundle-marketplace" +"crunchydata/postgres-operator-bundle" = "registry.connect.redhat.com/crunchydata/postgres-operator-bundle" +"crunchydata/postgres-operator" = "registry.connect.redhat.com/crunchydata/postgres-operator" +"custom-metrics-autoscaler/custom-metrics-autoscaler-adapter-rhel8" = "registry.redhat.io/custom-metrics-autoscaler/custom-metrics-autoscaler-adapter-rhel8" +"custom-metrics-autoscaler/custom-metrics-autoscaler-admission-webhooks-rhel8" = "registry.redhat.io/custom-metrics-autoscaler/custom-metrics-autoscaler-admission-webhooks-rhel8" +"custom-metrics-autoscaler/custom-metrics-autoscaler-operator-bundle" = "registry.redhat.io/custom-metrics-autoscaler/custom-metrics-autoscaler-operator-bundle" +"custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8-operator" = "registry.redhat.io/custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8-operator" +"custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8" = "registry.redhat.io/custom-metrics-autoscaler/custom-metrics-autoscaler-rhel8" +"cyberark/conjur-k8s-csi-driver" = "registry.connect.redhat.com/cyberark/conjur-k8s-csi-driver" +"cyberark/conjur-nginx" = "registry.connect.redhat.com/cyberark/conjur-nginx" +"cyberark/conjur-openshift-authenticator" = "registry.connect.redhat.com/cyberark/conjur-openshift-authenticator" +"cyberark/conjur-openshift-follower-configurator" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-configurator" +"cyberark/conjur-openshift-follower-conjur" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-conjur" +"cyberark/conjur-openshift-follower-failover-rebaser" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-failover-rebaser" +"cyberark/conjur-openshift-follower-info" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-info" +"cyberark/conjur-openshift-follower-nginx" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-nginx" +"cyberark/conjur-openshift-follower-operator-bundle" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-operator-bundle" +"cyberark/conjur-openshift-follower-operator" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-operator" +"cyberark/conjur-openshift-follower-postgres" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-postgres" +"cyberark/conjur-openshift-follower-syslog-ng" = "registry.connect.redhat.com/cyberark/conjur-openshift-follower-syslog-ng" +"cyberark/conjur" = "registry.connect.redhat.com/cyberark/conjur" +"cyberark/secretless-broker" = "registry.connect.redhat.com/cyberark/secretless-broker" +"cyberark/secrets-provider-for-k8s" = "registry.connect.redhat.com/cyberark/secrets-provider-for-k8s" +"cyber-armor/ca-controller" = "registry.connect.redhat.com/cyber-armor/ca-controller" +"cyber-armor/ca-dashboard-connector" = "registry.connect.redhat.com/cyber-armor/ca-dashboard-connector" +"cyber-armor/ca-operator-bundle" = "registry.connect.redhat.com/cyber-armor/ca-operator-bundle" +"cyber-armor/ca-operator" = "registry.connect.redhat.com/cyber-armor/ca-operator" +"cyber-armor/cyberarmor-controlpanel-connector" = "registry.connect.redhat.com/cyber-armor/cyberarmor-controlpanel-connector" +"cyber-armor/notification-service" = "registry.connect.redhat.com/cyber-armor/notification-service" +"cyber-armor/ocimage-service" = "registry.connect.redhat.com/cyber-armor/ocimage-service" +"cyber-armor/oracle-service" = "registry.connect.redhat.com/cyber-armor/oracle-service" +"datacore-software/openstack-cinder-volume-datacore-rhosp-16-1" = "registry.connect.redhat.com/datacore-software/openstack-cinder-volume-datacore-rhosp-16-1" +"datadog/datadog-agent" = "registry.connect.redhat.com/datadog/datadog-agent" +"datadog/operator" = "registry.connect.redhat.com/datadog/operator" +"data-explorer" = "us.icr.io/data-explorer" +"datagrid/datagrid-8-prod-operator-bundle" = "registry.redhat.io/datagrid/datagrid-8-prod-operator-bundle" +"datagrid/datagrid-8-rhel9-operator" = "registry.redhat.io/datagrid/datagrid-8-rhel9-operator" +"datagrid/datagrid-8-rhel9" = "registry.redhat.io/datagrid/datagrid-8-rhel9" +"data-integration-service" = "bds-docker-release.jfrog.io/data-integration-service" +"dataprovider-manager-service" = "bds-docker-release.jfrog.io/dataprovider-manager-service" +"datascience/chatbot/multi-lingual-bot/ui_frontend" = "dockerregistry.hsenidmobile.com:443/datascience/chatbot/multi-lingual-bot/ui_frontend" +"data-service" = "bds-docker-release.jfrog.io/data-service" +"datastage-ent/ds-nginx-proxy" = "cp.icr.io/datastage-ent/ds-nginx-proxy" +"datastax/cassandra" = "registry.connect.redhat.com/datastax/cassandra" +"datastax/cass-config-builder" = "registry.connect.redhat.com/datastax/cass-config-builder" +"datastax/cass-operator-bundle" = "registry.connect.redhat.com/datastax/cass-operator-bundle" +"datastax/cass-operator" = "registry.connect.redhat.com/datastax/cass-operator" +"datastax/dse-server" = "registry.connect.redhat.com/datastax/dse-server" +"datastax/system-logger" = "registry.connect.redhat.com/datastax/system-logger" +"datera/rhosp13-openstack-cinder-volume-datera" = "registry.connect.redhat.com/datera/rhosp13-openstack-cinder-volume-datera" +"datera/rhosp16-openstack-cinder-volume-datera" = "registry.connect.redhat.com/datera/rhosp16-openstack-cinder-volume-datera" +"dbap-rulesengine-1" = "495408234213.dkr.ecr.us-east-1.amazonaws.com/dbap-rulesengine-1" +"ddn/exascaler-csi-driver-operator-controller" = "quay.io/ddn/exascaler-csi-driver-operator-controller" +"ddn/exascaler-csi-file-driver" = "registry.connect.redhat.com/ddn/exascaler-csi-file-driver" +"ddn/exascaler-openshift-file-driver" = "quay.io/ddn/exascaler-openshift-file-driver" +"ddosify/alaz" = "registry.connect.redhat.com/ddosify/alaz" +"dell-emc/connectivity-client-docker-k8s" = "registry.connect.redhat.com/dell-emc/connectivity-client-docker-k8s" +"dellemc/csi-isilon" = "docker.io/dellemc/csi-isilon" +"dell-emc/csi-isilon" = "registry.connect.redhat.com/dell-emc/csi-isilon" +"dell-emc/csi-metadata-retriever" = "registry.connect.redhat.com/dell-emc/csi-metadata-retriever" +"dellemc/csi-powermax" = "docker.io/dellemc/csi-powermax" +"dell-emc/csi-powermax" = "registry.connect.redhat.com/dell-emc/csi-powermax" +"dellemc/csi-powerstore" = "docker.io/dellemc/csi-powerstore" +"dell-emc/csi-powerstore" = "registry.connect.redhat.com/dell-emc/csi-powerstore" +"dellemc/csi-unity" = "docker.io/dellemc/csi-unity" +"dell-emc/csi-unity" = "registry.connect.redhat.com/dell-emc/csi-unity" +"dellemc/csi-vxflexos" = "docker.io/dellemc/csi-vxflexos" +"dell-emc/csi-vxflexos" = "registry.connect.redhat.com/dell-emc/csi-vxflexos" +"dell-emc/csm-authorization-sidecar" = "registry.connect.redhat.com/dell-emc/csm-authorization-sidecar" +"dell-emc/csm-metrics-powerflex" = "registry.connect.redhat.com/dell-emc/csm-metrics-powerflex" +"dell-emc/csm-metrics-powermax" = "registry.connect.redhat.com/dell-emc/csm-metrics-powermax" +"dell-emc/csm-metrics-powerscale" = "registry.connect.redhat.com/dell-emc/csm-metrics-powerscale" +"dell-emc/csm-topology" = "registry.connect.redhat.com/dell-emc/csm-topology" +"dell-emc/dell-csiop-bundle-110" = "registry.connect.redhat.com/dell-emc/dell-csiop-bundle-110" +"dellemc/dell-csi-operator" = "docker.io/dellemc/dell-csi-operator" +"dell-emc/dell-csi-replicator" = "registry.connect.redhat.com/dell-emc/dell-csi-replicator" +"dell-emc/dell-csm-operator-bundle" = "registry.connect.redhat.com/dell-emc/dell-csm-operator-bundle" +"dellemc/dell-csm-operator" = "docker.io/dellemc/dell-csm-operator" +"dell-emc/dell-csm-operator" = "registry.connect.redhat.com/dell-emc/dell-csm-operator" +"dell-emc/dell-replication-controller" = "registry.connect.redhat.com/dell-emc/dell-replication-controller" +"dellemc/openstack-cinder-volume-dellemc" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-dellemc" +"dellemc/openstack-cinder-volume-dellemc-rhosp14" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-dellemc-rhosp14" +"dellemc/openstack-cinder-volume-dellemc-rhosp15" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-dellemc-rhosp15" +"dellemc/openstack-cinder-volume-dellemc-rhosp16" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-dellemc-rhosp16" +"dellemc/openstack-cinder-volume-dellemc-rhosp17" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-dellemc-rhosp17" +"dellemc/openstack-cinder-volume-pmax-rhosp16" = "registry.connect.redhat.com/dellemc/openstack-cinder-volume-pmax-rhosp16" +"dellemc/openstack-manila-share-dellemc" = "registry.connect.redhat.com/dellemc/openstack-manila-share-dellemc" +"dellemc/openstack-manila-share-dellemc-rhosp14" = "registry.connect.redhat.com/dellemc/openstack-manila-share-dellemc-rhosp14" +"dellemc/openstack-manila-share-dellemc-rhosp15" = "registry.connect.redhat.com/dellemc/openstack-manila-share-dellemc-rhosp15" +"dellemc/openstack-manila-share-dellemc-rhosp16" = "registry.connect.redhat.com/dellemc/openstack-manila-share-dellemc-rhosp16" +"dell-emc/podmon" = "registry.connect.redhat.com/dell-emc/podmon" +"dellemc/rhosp13-cinder-volume-dellemc-vxflexos" = "registry.connect.redhat.com/dellemc/rhosp13-cinder-volume-dellemc-vxflexos" +"dellemc/rhosp13-glance-api-dellemc-vxflexos" = "registry.connect.redhat.com/dellemc/rhosp13-glance-api-dellemc-vxflexos" +"dellemc/rhosp13-nova-compute-dellemc-vxflexos" = "registry.connect.redhat.com/dellemc/rhosp13-nova-compute-dellemc-vxflexos" +"densify/container-data-collection-forwarder" = "registry.connect.redhat.com/densify/container-data-collection-forwarder" +"densify/densify-operator-bundle" = "registry.connect.redhat.com/densify/densify-operator-bundle" +"densify/densify-operator" = "registry.connect.redhat.com/densify/densify-operator" +"deployhub/deployhub-pro" = "registry.connect.redhat.com/deployhub/deployhub-pro" +"deployhub/deployhub" = "registry.connect.redhat.com/deployhub/deployhub" +"depsecure/agentserver" = "registry.jihulab.com/depsecure/agentserver" +"devspaces/code-rhel8" = "registry.redhat.io/devspaces/code-rhel8" +"devspaces/configbump-rhel8" = "registry.redhat.io/devspaces/configbump-rhel8" +"devspaces/dashboard-rhel8" = "registry.redhat.io/devspaces/dashboard-rhel8" +"devspaces/devfileregistry-rhel8" = "registry.redhat.io/devspaces/devfileregistry-rhel8" +"devspaces/devspaces-operator-bundle" = "registry.redhat.io/devspaces/devspaces-operator-bundle" +"devspaces/devspaces-rhel8-operator" = "registry.redhat.io/devspaces/devspaces-rhel8-operator" +"devspaces/imagepuller-rhel8" = "registry.redhat.io/devspaces/imagepuller-rhel8" +"devspaces/machineexec-rhel8" = "registry.redhat.io/devspaces/machineexec-rhel8" +"devspaces/pluginregistry-rhel8" = "registry.redhat.io/devspaces/pluginregistry-rhel8" +"devspaces/server-rhel8" = "registry.redhat.io/devspaces/server-rhel8" +"devspaces/traefik-rhel8" = "registry.redhat.io/devspaces/traefik-rhel8" +"devspaces/udi-rhel8" = "registry.redhat.io/devspaces/udi-rhel8" +"dh2i/dxe" = "docker.io/dh2i/dxe" +"digital-ai/deploy-operator" = "registry.connect.redhat.com/digital-ai/deploy-operator" +"digital-ai/release-operator" = "registry.connect.redhat.com/digital-ai/release-operator" +"digitalbanking" = "bankbuddy.azurecr.io/digitalbanking" +"digital/rhel/core/backoffice" = "tecdigitalacr.azurecr.io/digital/rhel/core/backoffice" +"digital/rhel/core/cpg" = "tecdigitalacr.azurecr.io/digital/rhel/core/cpg" +"digital/rhel/core/engine" = "tecdigitalacr.azurecr.io/digital/rhel/core/engine" +"digital/rhel/core/view" = "tecdigitalacr.azurecr.io/digital/rhel/core/view" +"digital/rhel/techbank/api" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/api" +"digital/rhel/techbank/audit" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/audit" +"digital/rhel/techbank/authserver" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/authserver" +"digital/rhel/techbank/backoffice-api" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/backoffice-api" +"digital/rhel/techbank/backoffice" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/backoffice" +"digital/rhel/techbank/i18n" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/i18n" +"digital/rhel/techbank/limits" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/limits" +"digital/rhel/techbank/safeway" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/safeway" +"digital/rhel/techbank/staff-management" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/staff-management" +"digital/rhel/techbank/web" = "tecdigitalacr.azurecr.io/digital/rhel/techbank/web" +"discovery/discovery-server-rhel9" = "registry.redhat.io/discovery/discovery-server-rhel9" +"documents-service" = "bds-docker-release.jfrog.io/documents-service" +"drivescale/flexvolume" = "registry.connect.redhat.com/drivescale/flexvolume" +"dvo/deployment-validation-operator-bundle" = "registry.redhat.io/dvo/deployment-validation-operator-bundle" +"dvo/deployment-validation-rhel8-operator" = "registry.redhat.io/dvo/deployment-validation-rhel8-operator" +"dynatrace/dynatrace-oneagent-operator-bundle" = "registry.connect.redhat.com/dynatrace/dynatrace-oneagent-operator-bundle" +"dynatrace/dynatrace-oneagent-operator" = "registry.connect.redhat.com/dynatrace/dynatrace-oneagent-operator" +"dynatrace/dynatrace-operator-bundle-marketplace" = "registry.connect.redhat.com/dynatrace/dynatrace-operator-bundle-marketplace" +"dynatrace/dynatrace-operator-bundle" = "registry.connect.redhat.com/dynatrace/dynatrace-operator-bundle" +"dynatrace/dynatrace-operator" = "registry.connect.redhat.com/dynatrace/dynatrace-operator" +"dynatrace/oneagent" = "registry.connect.redhat.com/dynatrace/oneagent" +"eaa" = "docker.mycom-osi.com/eaa" +"eamli/eamli-operator-bundle" = "registry.connect.redhat.com/eamli/eamli-operator-bundle" +"edgelabs/ai-sensor" = "registry.connect.redhat.com/edgelabs/ai-sensor" +"edo/external-dns-operator-bundle" = "registry.redhat.io/edo/external-dns-operator-bundle" +"edo/external-dns-rhel8-operator" = "registry.redhat.io/edo/external-dns-rhel8-operator" +"edo/external-dns-rhel8" = "registry.redhat.io/edo/external-dns-rhel8" +"eginnovations/universal-agent-operator" = "registry.connect.redhat.com/eginnovations/universal-agent-operator" +"elastic/apm" = "registry.connect.redhat.com/elastic/apm" +"elastic/auditbeat" = "registry.connect.redhat.com/elastic/auditbeat" +"elastic/eck-operator" = "registry.connect.redhat.com/elastic/eck-operator" +"elastic/eck" = "registry.connect.redhat.com/elastic/eck" +"elastic/elastic-agent" = "registry.connect.redhat.com/elastic/elastic-agent" +"elastic/elasticsearch" = "registry.connect.redhat.com/elastic/elasticsearch" +"elastic/enterprise-search" = "registry.connect.redhat.com/elastic/enterprise-search" +"elastic/filebeat" = "registry.connect.redhat.com/elastic/filebeat" +"elastic/heartbeat" = "registry.connect.redhat.com/elastic/heartbeat" +"elastic/journalbeat" = "registry.connect.redhat.com/elastic/journalbeat" +"elastic/kibana" = "registry.connect.redhat.com/elastic/kibana" +"elastic/logstash" = "registry.connect.redhat.com/elastic/logstash" +"elastic/metricbeat" = "registry.connect.redhat.com/elastic/metricbeat" +"elos/erynis-bundle" = "registry.connect.redhat.com/elos/erynis-bundle" +"elos/erynis-operator" = "registry.connect.redhat.com/elos/erynis-operator" +"entando/entando-431" = "registry.connect.redhat.com/entando/entando-431" +"entando/entando-de-app-eap" = "registry.connect.redhat.com/entando/entando-de-app-eap" +"entando/entando-eap71-openshift-imagick" = "registry.connect.redhat.com/entando/entando-eap71-openshift-imagick" +"entando/entando-operator" = "registry.connect.redhat.com/entando/entando-operator" +"entando/entando-redhat-sso" = "registry.connect.redhat.com/entando/entando-redhat-sso" +"enterprisedb/cloudnative-pg" = "registry.connect.redhat.com/enterprisedb/cloudnative-pg" +"enterprisedb/cloud-native-postgresql" = "registry.connect.redhat.com/enterprisedb/cloud-native-postgresql" +"enterprisedb/pg4k-pgd" = "registry.connect.redhat.com/enterprisedb/pg4k-pgd" +"epsagon/epsagon-operator" = "registry.connect.redhat.com/epsagon/epsagon-operator" +"eweb/cloudnfv" = "registry.connect.redhat.com/eweb/cloudnfv" +"exateapigator" = "oneartifactoryexate.azurecr.io/exateapigator" +"exfo/uverifier" = "registry.connect.redhat.com/exfo/uverifier" +"ezoo/ezoodb_trial" = "registry.cn-beijing.aliyuncs.com/ezoo/ezoodb_trial" +"f4k1p1n4/netapp-spark-operator-controller" = "public.ecr.aws/f4k1p1n4/netapp-spark-operator-controller" +"f4k1p1n4/spark" = "public.ecr.aws/f4k1p1n4/spark" +"f5networks/cntr-ingress-svcs" = "registry.connect.redhat.com/f5networks/cntr-ingress-svcs" +"f5networks/f5-ipam-controller-operator-bundle" = "registry.connect.redhat.com/f5networks/f5-ipam-controller-operator-bundle" +"f5networks/f5-ipam-controller-operator" = "registry.connect.redhat.com/f5networks/f5-ipam-controller-operator" +"f5networks/f5-ipam-controller" = "registry.connect.redhat.com/f5networks/f5-ipam-controller" +"f5networks/k8s-bigip-ctlr-operator-bundle" = "registry.connect.redhat.com/f5networks/k8s-bigip-ctlr-operator-bundle" +"f5networks/k8s-bigip-ctlr-operator" = "registry.connect.redhat.com/f5networks/k8s-bigip-ctlr-operator" +"f5networks/k8s-bigip-ctlr" = "registry.connect.redhat.com/f5networks/k8s-bigip-ctlr" +"fai/api-console" = "registry.iytcloud.com/fai/api-console" +"faithwmh/wmh" = "registry.cn-hangzhou.aliyuncs.com/faithwmh/wmh" +"falcon-container/us-1/release/falcon-sensor" = "registry.crowdstrike.com/falcon-container/us-1/release/falcon-sensor" +"falcon-imageanalyzer/us-1/release/falcon-imageanalyzer" = "registry.crowdstrike.com/falcon-imageanalyzer/us-1/release/falcon-imageanalyzer" +"falcon-kac/us-1/release/falcon-kac" = "registry.crowdstrike.com/falcon-kac/us-1/release/falcon-kac" +"falcon-sensor/us-1/release/falcon-sensor" = "registry.crowdstrike.com/falcon-sensor/us-1/release/falcon-sensor" +"feedstock/rabbitmq3" = "registry.connect.redhat.com/feedstock/rabbitmq3" +"findability-sciences/fp-predict-plus-operator-bundle" = "registry.connect.redhat.com/findability-sciences/fp-predict-plus-operator-bundle" +"findability-sciences/fp-predict-plus-operator" = "registry.connect.redhat.com/findability-sciences/fp-predict-plus-operator" +"findability-sciences/fp-predict-plus" = "registry.connect.redhat.com/findability-sciences/fp-predict-plus" +"findability-sciences/platform-ubi" = "us.icr.io/findability-sciences/platform-ubi" +"fiware/orion-ld" = "quay.io/fiware/orion-ld" +"flomesh/curl-ubi8" = "quay.io/flomesh/curl-ubi8" +"flomesh/flomesh-console-ubi8" = "quay.io/flomesh/flomesh-console-ubi8" +"flomesh/fsm-bootstrap-ubi8" = "quay.io/flomesh/fsm-bootstrap-ubi8" +"flomesh/fsm-cluster-connector-ubi8" = "quay.io/flomesh/fsm-cluster-connector-ubi8" +"flomesh/fsm-ingress-pipy-ubi8" = "quay.io/flomesh/fsm-ingress-pipy-ubi8" +"flomesh/fsm-manager-ubi8" = "quay.io/flomesh/fsm-manager-ubi8" +"flomesh/fsm-proxy-init-ubi8" = "quay.io/flomesh/fsm-proxy-init-ubi8" +"flomesh/osm-edge-bootstrap-ubi8" = "quay.io/flomesh/osm-edge-bootstrap-ubi8" +"flomesh/osm-edge-controller-ubi8" = "quay.io/flomesh/osm-edge-controller-ubi8" +"flomesh/osm-edge-crds-ubi8" = "quay.io/flomesh/osm-edge-crds-ubi8" +"flomesh/osm-edge-healthcheck-ubi8" = "quay.io/flomesh/osm-edge-healthcheck-ubi8" +"flomesh/osm-edge-injector-ubi8" = "quay.io/flomesh/osm-edge-injector-ubi8" +"flomesh/osm-edge-preinstall-ubi8" = "quay.io/flomesh/osm-edge-preinstall-ubi8" +"flomesh/osm-edge-sidecar-init-ubi8" = "quay.io/flomesh/osm-edge-sidecar-init-ubi8" +"flomesh/pipy-repo-ubi8" = "quay.io/flomesh/pipy-repo-ubi8" +"flomesh/pipy-ubi8" = "quay.io/flomesh/pipy-ubi8" +"flomesh/toolbox-ubi8" = "quay.io/flomesh/toolbox-ubi8" +"flux/flux-operator" = "registry.connect.redhat.com/flux/flux-operator" +"flux/helm-controller" = "registry.connect.redhat.com/flux/helm-controller" +"flux/image-automation-controller" = "registry.connect.redhat.com/flux/image-automation-controller" +"flux/image-reflector-controller" = "registry.connect.redhat.com/flux/image-reflector-controller" +"flux/kustomize-controller" = "registry.connect.redhat.com/flux/kustomize-controller" +"flux/notification-controller" = "registry.connect.redhat.com/flux/notification-controller" +"flux/source-controller" = "registry.connect.redhat.com/flux/source-controller" +"fortanix/ccm-node-agent-dcap-operator-bundle" = "registry.connect.redhat.com/fortanix/ccm-node-agent-dcap-operator-bundle" +"fortanix/ccm-node-agent-dcap-operator" = "registry.connect.redhat.com/fortanix/ccm-node-agent-dcap-operator" +"fortanix/ccm-node-agent-operator-bundle" = "registry.connect.redhat.com/fortanix/ccm-node-agent-operator-bundle" +"fortanix/ccm-node-agent-operator" = "registry.connect.redhat.com/fortanix/ccm-node-agent-operator" +"fortanix/ccm-node-agent-ubi7" = "registry.connect.redhat.com/fortanix/ccm-node-agent-ubi7" +"fortanix/k8s-sdkms-cert-setup" = "registry.hub.docker.com/fortanix/k8s-sdkms-cert-setup" +"fortanix/k8s-sdkms-secret-agent" = "registry.hub.docker.com/fortanix/k8s-sdkms-secret-agent" +"fortanix/k8s-sdkms-secrets-injector" = "registry.hub.docker.com/fortanix/k8s-sdkms-secrets-injector" +"fortanix/multi-platform-registration-ubi8" = "registry.connect.redhat.com/fortanix/multi-platform-registration-ubi8" +"fortanix/sgx-software-installer-ubi7" = "registry.connect.redhat.com/fortanix/sgx-software-installer-ubi7" +"fortytwolabs/i-am42/adapter" = "quay.io/fortytwolabs/i-am42/adapter" +"fortytwolabs/i-am42" = "quay.io/fortytwolabs/i-am42" +"fujitsueap/fujitsu-software-enterprise-application-platform-launcher" = "quay.io/fujitsueap/fujitsu-software-enterprise-application-platform-launcher" +"fujitsu/fujitsu-cinder-volume" = "registry.connect.redhat.com/fujitsu/fujitsu-cinder-volume" +"fujitsu/fujitsu-enterprise-postgres-13-backup" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-backup" +"fujitsu/fujitsu-enterprise-postgres-13-exporter" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-exporter" +"fujitsu/fujitsu-enterprise-postgres-13-operator" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-operator" +"fujitsu/fujitsu-enterprise-postgres-13-pgpool2" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-pgpool2" +"fujitsu/fujitsu-enterprise-postgres-13-restore" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-restore" +"fujitsu/fujitsu-enterprise-postgres-13-server" = "quay.io/fujitsu/fujitsu-enterprise-postgres-13-server" +"fujitsu/fujitsu-enterprise-postgres-14-backup" = "quay.io/fujitsu/fujitsu-enterprise-postgres-14-backup" +"fujitsu/fujitsu-enterprise-postgres-14-pgpool2" = "quay.io/fujitsu/fujitsu-enterprise-postgres-14-pgpool2" +"fujitsu/fujitsu-enterprise-postgres-14-restore" = "quay.io/fujitsu/fujitsu-enterprise-postgres-14-restore" +"fujitsu/fujitsu-enterprise-postgres-14-server" = "quay.io/fujitsu/fujitsu-enterprise-postgres-14-server" +"fujitsu/fujitsu-enterprise-postgres-14-upgrade" = "quay.io/fujitsu/fujitsu-enterprise-postgres-14-upgrade" +"fujitsu/fujitsu-enterprise-postgres-15-backup" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-backup" +"fujitsu/fujitsu-enterprise-postgres-15-backup-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-backup-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-15-pgpool2" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-pgpool2" +"fujitsu/fujitsu-enterprise-postgres-15-pgpool2-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-pgpool2-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-15-restore" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-restore" +"fujitsu/fujitsu-enterprise-postgres-15-restore-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-restore-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-15-server" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-server" +"fujitsu/fujitsu-enterprise-postgres-15-server-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-server-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-15-upgrade" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-upgrade" +"fujitsu/fujitsu-enterprise-postgres-15-upgrade-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-15-upgrade-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-backup" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-backup" +"fujitsu/fujitsu-enterprise-postgres-16-backup-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-backup-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-pgpool2" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-pgpool2" +"fujitsu/fujitsu-enterprise-postgres-16-pgpool2-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-pgpool2-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-restore" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-restore" +"fujitsu/fujitsu-enterprise-postgres-16-restore-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-restore-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-server" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-server" +"fujitsu/fujitsu-enterprise-postgres-16-server-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-server-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-upgrade" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-upgrade" +"fujitsu/fujitsu-enterprise-postgres-16-upgrade-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-upgrade-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-16-utils" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-utils" +"fujitsu/fujitsu-enterprise-postgres-16-utils-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-16-utils-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-cronjob" = "quay.io/fujitsu/fujitsu-enterprise-postgres-cronjob" +"fujitsu/fujitsu-enterprise-postgres-cronjob-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-cronjob-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-exporter" = "quay.io/fujitsu/fujitsu-enterprise-postgres-exporter" +"fujitsu/fujitsu-enterprise-postgres-exporter-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-exporter-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-fluentbit" = "quay.io/fujitsu/fujitsu-enterprise-postgres-fluentbit" +"fujitsu/fujitsu-enterprise-postgres-fluentbit-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-fluentbit-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-fluentd" = "quay.io/fujitsu/fujitsu-enterprise-postgres-fluentd" +"fujitsu/fujitsu-enterprise-postgres-fluentd-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-fluentd-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-operator" = "quay.io/fujitsu/fujitsu-enterprise-postgres-operator" +"fujitsu/fujitsu-enterprise-postgres-operator-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-operator-with-cryptographic-module" +"fujitsu/fujitsu-enterprise-postgres-utils" = "quay.io/fujitsu/fujitsu-enterprise-postgres-utils" +"fujitsu/fujitsu-enterprise-postgres-utils-with-cryptographic-module" = "quay.io/fujitsu/fujitsu-enterprise-postgres-utils-with-cryptographic-module" +"fujitsu-postgres/fujitsu-enterprise-postgres-13-bundle" = "registry.connect.redhat.com/fujitsu-postgres/fujitsu-enterprise-postgres-13-bundle" +"fujitsu-postgres/fujitsu-enterprise-postgres-operator-bundle" = "registry.connect.redhat.com/fujitsu-postgres/fujitsu-enterprise-postgres-operator-bundle" +"fujitsu-postgres/fujitsu-enterprise-postgres-operator-with-cryptographic-module" = "registry.connect.redhat.com/fujitsu-postgres/fujitsu-enterprise-postgres-operator-with-cryptographic-module" +"fujitsu/rhosp13-fujitsu-cinder-volume-161" = "registry.connect.redhat.com/fujitsu/rhosp13-fujitsu-cinder-volume-161" +"fujitsu/rhosp15-fujitsu-cinder-volume-161" = "registry.connect.redhat.com/fujitsu/rhosp15-fujitsu-cinder-volume-161" +"fujitsu/rhosp161-fujitsu-cinder-volume-16" = "registry.connect.redhat.com/fujitsu/rhosp161-fujitsu-cinder-volume-16" +"fujitsu/rhosp162-fujitsu-cinder-volume-17" = "registry.connect.redhat.com/fujitsu/rhosp162-fujitsu-cinder-volume-17" +"fuse7/fuse-apicurito-generator-rhel8" = "registry.redhat.io/fuse7/fuse-apicurito-generator-rhel8" +"fuse7/fuse-apicurito-rhel8-operator-bundle" = "registry.redhat.io/fuse7/fuse-apicurito-rhel8-operator-bundle" +"fuse7/fuse-apicurito-rhel8-operator" = "registry.redhat.io/fuse7/fuse-apicurito-rhel8-operator" +"fuse7/fuse-apicurito-rhel8" = "registry.redhat.io/fuse7/fuse-apicurito-rhel8" +"fuse7/fuse-console-rhel8-operator-bundle" = "registry.redhat.io/fuse7/fuse-console-rhel8-operator-bundle" +"fuse7/fuse-console-rhel8-operator" = "registry.redhat.io/fuse7/fuse-console-rhel8-operator" +"fuse7/fuse-console-rhel8" = "registry.redhat.io/fuse7/fuse-console-rhel8" +"fuse7/fuse-eap-openshift-jdk11-rhel8" = "registry.redhat.io/fuse7/fuse-eap-openshift-jdk11-rhel8" +"fuse7/fuse-eap-openshift-jdk17-rhel8" = "registry.redhat.io/fuse7/fuse-eap-openshift-jdk17-rhel8" +"fuse7/fuse-java-openshift-jdk11-rhel8" = "registry.redhat.io/fuse7/fuse-java-openshift-jdk11-rhel8" +"fuse7/fuse-java-openshift-jdk17-rhel8" = "registry.redhat.io/fuse7/fuse-java-openshift-jdk17-rhel8" +"fuse7/fuse-java-openshift-rhel8" = "registry.redhat.io/fuse7/fuse-java-openshift-rhel8" +"fuse7/fuse-karaf-openshift-jdk11-rhel8" = "registry.redhat.io/fuse7/fuse-karaf-openshift-jdk11-rhel8" +"fuse7/fuse-karaf-openshift-jdk17-rhel8" = "registry.redhat.io/fuse7/fuse-karaf-openshift-jdk17-rhel8" +"fuse7/fuse-karaf-openshift-rhel8" = "registry.redhat.io/fuse7/fuse-karaf-openshift-rhel8" +"gatekeeper/gatekeeper-operator-bundle" = "registry.redhat.io/gatekeeper/gatekeeper-operator-bundle" +"gatekeeper/gatekeeper-rhel8-operator" = "registry.redhat.io/gatekeeper/gatekeeper-rhel8-operator" +"gatekeeper/gatekeeper-rhel8" = "registry.redhat.io/gatekeeper/gatekeeper-rhel8" +"gatekeeper/gatekeeper-rhel9-operator" = "registry.redhat.io/gatekeeper/gatekeeper-rhel9-operator" +"gatekeeper/gatekeeper-rhel9" = "registry.redhat.io/gatekeeper/gatekeeper-rhel9" +"gate-service" = "bds-docker-release.jfrog.io/gate-service" +"gateway-service" = "bds-docker-release.jfrog.io/gateway-service" +"genuitec/codetogether" = "registry.connect.redhat.com/genuitec/codetogether" +"geogo/kriyam-analytics" = "quay.io/geogo/kriyam-analytics" +"gigamon/gigamon-gigavue-uctc-cntlr" = "docker.io/gigamon/gigamon-gigavue-uctc-cntlr" +"gigamon/gigamon-gigavue-uctc-tap" = "docker.io/gigamon/gigamon-gigavue-uctc-tap" +"gigamon/uct-controller" = "docker.io/gigamon/uct-controller" +"gigamon/uct-tap" = "docker.io/gigamon/uct-tap" +"gigaspaces/insightedge-enterprise-operator" = "registry.connect.redhat.com/gigaspaces/insightedge-enterprise-operator" +"gigaspaces/insightedge" = "registry.connect.redhat.com/gigaspaces/insightedge" +"gigaspaces/xap-enterprise-14-0" = "registry.connect.redhat.com/gigaspaces/xap-enterprise-14-0" +"gigaspaces/xap" = "registry.connect.redhat.com/gigaspaces/xap" +"gitlab/gitlab-operator-bundle" = "registry.connect.redhat.com/gitlab/gitlab-operator-bundle" +"gitlab/gitlab-runner-helper" = "registry.connect.redhat.com/gitlab/gitlab-runner-helper" +"gitlab/gitlab-runner-operator" = "registry.connect.redhat.com/gitlab/gitlab-runner-operator" +"gitlab/gitlab-runner" = "registry.connect.redhat.com/gitlab/gitlab-runner" +"gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-helper-ocp" = "registry.gitlab.com/gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-helper-ocp" +"gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-ocp" = "registry.gitlab.com/gitlab-org/ci-cd/gitlab-runner-ubi-images/gitlab-runner-ocp" +"gluufederation/config-init" = "registry.connect.redhat.com/gluufederation/config-init" +"gluufederation/key-rotation" = "registry.connect.redhat.com/gluufederation/key-rotation" +"gluufederation/opendj" = "registry.connect.redhat.com/gluufederation/opendj" +"gluufederation/oxauth" = "registry.connect.redhat.com/gluufederation/oxauth" +"gluufederation/oxpassport" = "registry.connect.redhat.com/gluufederation/oxpassport" +"gluufederation/oxshibboleth" = "registry.connect.redhat.com/gluufederation/oxshibboleth" +"gluufederation/oxtrust" = "registry.connect.redhat.com/gluufederation/oxtrust" +"grafana/openshift-cloud-log-forwarder-bundle" = "registry.connect.redhat.com/grafana/openshift-cloud-log-forwarder-bundle" +"granulate/sagent" = "registry.connect.redhat.com/granulate/sagent" +"gtsoftware/ivory-server" = "registry.connect.redhat.com/gtsoftware/ivory-server" +"gtsoftware/ivory-service-architect-operator-bundle" = "registry.connect.redhat.com/gtsoftware/ivory-service-architect-operator-bundle" +"guardicore/centra" = "registry.connect.redhat.com/guardicore/centra" +"guiseai-retail/apparel-logo" = "registry.connect.redhat.com/guiseai-retail/apparel-logo" +"guise-digital-signage/age-and-gender" = "registry.gitlab.com/guise-digital-signage/age-and-gender" +"gurolakman/ad" = "docker.io/gurolakman/ad" +"gurolakman/alarmutils" = "docker.io/gurolakman/alarmutils" +"gurolakman/apim" = "docker.io/gurolakman/apim" +"gurolakman/canvas" = "docker.io/gurolakman/canvas" +"gurolakman/churnin" = "docker.io/gurolakman/churnin" +"gurolakman/cm" = "docker.io/gurolakman/cm" +"gurolakman/cmpf" = "docker.io/gurolakman/cmpf" +"gurolakman/cms" = "docker.io/gurolakman/cms" +"gurolakman/cspbase" = "docker.io/gurolakman/cspbase" +"gurolakman/dgw" = "docker.io/gurolakman/dgw" +"gurolakman/dmid" = "docker.io/gurolakman/dmid" +"gurolakman/ecs" = "docker.io/gurolakman/ecs" +"gurolakman/eqm" = "docker.io/gurolakman/eqm" +"gurolakman/flexiblelicensing" = "docker.io/gurolakman/flexiblelicensing" +"gurolakman/george" = "docker.io/gurolakman/george" +"gurolakman/hpi" = "docker.io/gurolakman/hpi" +"gurolakman/ics" = "docker.io/gurolakman/ics" +"gurolakman/ipsmgw" = "docker.io/gurolakman/ipsmgw" +"gurolakman/lcgw" = "docker.io/gurolakman/lcgw" +"gurolakman/mgw" = "docker.io/gurolakman/mgw" +"gurolakman/ngeqm" = "docker.io/gurolakman/ngeqm" +"gurolakman/ngssm" = "docker.io/gurolakman/ngssm" +"gurolakman/ngssm-repo" = "docker.io/gurolakman/ngssm-repo" +"gurolakman/noncanvas" = "docker.io/gurolakman/noncanvas" +"gurolakman/oam" = "docker.io/gurolakman/oam" +"gurolakman/p4m" = "docker.io/gurolakman/p4m" +"gurolakman/platform" = "docker.io/gurolakman/platform" +"gurolakman/rbtbe" = "docker.io/gurolakman/rbtbe" +"gurolakman/rbt" = "docker.io/gurolakman/rbt" +"gurolakman/rsc" = "docker.io/gurolakman/rsc" +"gurolakman/sc" = "docker.io/gurolakman/sc" +"gurolakman/scrmngr" = "docker.io/gurolakman/scrmngr" +"gurolakman/see" = "docker.io/gurolakman/see" +"gurolakman/sgw" = "docker.io/gurolakman/sgw" +"gurolakman/smartalert" = "docker.io/gurolakman/smartalert" +"gurolakman/smsc" = "docker.io/gurolakman/smsc" +"gurolakman/smsf-configuration" = "docker.io/gurolakman/smsf-configuration" +"gurolakman/smsf-dispatcher" = "docker.io/gurolakman/smsf-dispatcher" +"gurolakman/smsf-momt" = "docker.io/gurolakman/smsf-momt" +"gurolakman/smsf-registration" = "docker.io/gurolakman/smsf-registration" +"gurolakman/smsoneapigw" = "docker.io/gurolakman/smsoneapigw" +"gurolakman/ssm" = "docker.io/gurolakman/ssm" +"gurolakman/tsn" = "docker.io/gurolakman/tsn" +"gurolakman/ussdbr" = "docker.io/gurolakman/ussdbr" +"gurolakman/ussigw-configuration" = "docker.io/gurolakman/ussigw-configuration" +"gurolakman/ussigw-core" = "docker.io/gurolakman/ussigw-core" +"gurolakman/vm" = "docker.io/gurolakman/vm" +"h2oai/driverlessai-rhelubi7" = "registry.connect.redhat.com/h2oai/driverlessai-rhelubi7" +"h2oai/h2o-operator-bundle" = "registry.connect.redhat.com/h2oai/h2o-operator-bundle" +"h2oai/h2o-operator" = "registry.connect.redhat.com/h2oai/h2o-operator" +"h2oai/h2o" = "registry.connect.redhat.com/h2oai/h2o" +"haproxytech/haproxy" = "registry.connect.redhat.com/haproxytech/haproxy" +"harperdb/harperdb-openshift" = "registry.hub.docker.com/harperdb/harperdb-openshift" +"hashicorp/consul-dataplane-fips" = "registry.connect.redhat.com/hashicorp/consul-dataplane-fips" +"hashicorp/consul-dataplane" = "registry.connect.redhat.com/hashicorp/consul-dataplane" +"hashicorp/consul-enterprise-fips" = "registry.connect.redhat.com/hashicorp/consul-enterprise-fips" +"hashicorp/consul-enterprise" = "registry.connect.redhat.com/hashicorp/consul-enterprise" +"hashicorp/consul-k8s-control-plane-fips" = "registry.connect.redhat.com/hashicorp/consul-k8s-control-plane-fips" +"hashicorp/consul-k8s-control-plane" = "registry.connect.redhat.com/hashicorp/consul-k8s-control-plane" +"hashicorp/consul-k8s" = "registry.connect.redhat.com/hashicorp/consul-k8s" +"hashicorp/consul" = "registry.connect.redhat.com/hashicorp/consul" +"hashicorp/vault-enterprise-fips" = "registry.connect.redhat.com/hashicorp/vault-enterprise-fips" +"hashicorp/vault-enterprise" = "registry.connect.redhat.com/hashicorp/vault-enterprise" +"hashicorp/vault-k8s" = "registry.connect.redhat.com/hashicorp/vault-k8s" +"hashicorp/vault" = "registry.connect.redhat.com/hashicorp/vault" +"hashicorp/vault-secrets-operator-bundle" = "registry.connect.redhat.com/hashicorp/vault-secrets-operator-bundle" +"hashicorp/vault-secrets-operator" = "registry.connect.redhat.com/hashicorp/vault-secrets-operator" +"hazelcast/hazelcast-3-rhel7" = "registry.connect.redhat.com/hazelcast/hazelcast-3-rhel7" +"hazelcast/hazelcast-4-rhel8" = "registry.connect.redhat.com/hazelcast/hazelcast-4-rhel8" +"hazelcast/hazelcast-enterprise-4-rhel8" = "registry.connect.redhat.com/hazelcast/hazelcast-enterprise-4-rhel8" +"hazelcast/hazelcast-enterprise-5-rhel8" = "registry.connect.redhat.com/hazelcast/hazelcast-enterprise-5-rhel8" +"hazelcast/hazelcast-jet-enterprise-4" = "registry.connect.redhat.com/hazelcast/hazelcast-jet-enterprise-4" +"hazelcast/hazelcast-jet-management-center-4" = "registry.connect.redhat.com/hazelcast/hazelcast-jet-management-center-4" +"hazelcast/management-center-3-rhel7" = "registry.connect.redhat.com/hazelcast/management-center-3-rhel7" +"hazelcast/management-center-4-rhel8" = "registry.connect.redhat.com/hazelcast/management-center-4-rhel8" +"hazelcast/management-center-5-rhel8" = "registry.connect.redhat.com/hazelcast/management-center-5-rhel8" +"headspin/headspin-operator-bundle" = "registry.connect.redhat.com/headspin/headspin-operator-bundle" +"headspin/headspin-operator" = "registry.connect.redhat.com/headspin/headspin-operator" +"headspin/hspusher" = "registry.connect.redhat.com/headspin/hspusher" +"hedvig/proxy" = "registry.connect.redhat.com/hedvig/proxy" +"heremaps/here-service-operator-bundle" = "registry.connect.redhat.com/heremaps/here-service-operator-bundle" +"heremaps/here-service-operator" = "registry.connect.redhat.com/heremaps/here-service-operator" +"hitachi/hspc-csi-driver" = "registry.connect.redhat.com/hitachi/hspc-csi-driver" +"hitachi/hspc-csi-provisioner" = "registry.connect.redhat.com/hitachi/hspc-csi-provisioner" +"hitachi/hspc-log-monitor" = "registry.connect.redhat.com/hitachi/hspc-log-monitor" +"hitachi/hspc-operator-bundle" = "registry.connect.redhat.com/hitachi/hspc-operator-bundle" +"hitachi/hspc-operator" = "registry.connect.redhat.com/hitachi/hspc-operator" +"hitachi/rhosp13-openstack-cinder-volume-hbsd" = "registry.connect.redhat.com/hitachi/rhosp13-openstack-cinder-volume-hbsd" +"hitachi/rhosp14-openstack-cinder-volume-hbsd" = "registry.connect.redhat.com/hitachi/rhosp14-openstack-cinder-volume-hbsd" +"hpe3parcinder/hpe3parcinder16" = "registry.connect.redhat.com/hpe3parcinder/hpe3parcinder16" +"hpe3parcinder/hpe3parcinder" = "registry.connect.redhat.com/hpe3parcinder/hpe3parcinder" +"hpe3parcinder/openstack-cinder-volume-hpe3parcinder16-1" = "registry.connect.redhat.com/hpe3parcinder/openstack-cinder-volume-hpe3parcinder16-1" +"hpe3parcinder/openstack-cinder-volume-hpe3parcinder16-2" = "registry.connect.redhat.com/hpe3parcinder/openstack-cinder-volume-hpe3parcinder16-2" +"hpe3parcinder/openstack-cinder-volume-hpe3parcinder17-1" = "registry.connect.redhat.com/hpe3parcinder/openstack-cinder-volume-hpe3parcinder17-1" +"hpestorage/alletra-6000-and-nimble-csp" = "registry.connect.redhat.com/hpestorage/alletra-6000-and-nimble-csp" +"hpestorage/alletra-9000-primera-and-3par-csp" = "registry.connect.redhat.com/hpestorage/alletra-9000-primera-and-3par-csp" +"hpestorage/csi-driver-operator-bundle" = "registry.connect.redhat.com/hpestorage/csi-driver-operator-bundle" +"hpestorage/csi-driver-operator" = "registry.connect.redhat.com/hpestorage/csi-driver-operator" +"hpestorage/csi-driver" = "registry.connect.redhat.com/hpestorage/csi-driver" +"hpestorage/hpe3parprimera-csp" = "registry.connect.redhat.com/hpestorage/hpe3parprimera-csp" +"hpestorage/nfs-provisioner" = "registry.connect.redhat.com/hpestorage/nfs-provisioner" +"hpestorage/nimble-csp" = "registry.connect.redhat.com/hpestorage/nimble-csp" +"hpestorage/xspc-csi-driver-operator" = "registry.connect.redhat.com/hpestorage/xspc-csi-driver-operator" +"hpestorage/xspc-csi-driver" = "registry.connect.redhat.com/hpestorage/xspc-csi-driver" +"hpestorage/xspc-csi-operator-bundle" = "registry.connect.redhat.com/hpestorage/xspc-csi-operator-bundle" +"hrvestigo/vestigo-issuing-api-ubi8" = "docker.io/hrvestigo/vestigo-issuing-api-ubi8" +"hytrust/ht-getkey1" = "registry.connect.redhat.com/hytrust/ht-getkey1" +"i2i/amf-app-ubi9" = "quay.io/i2i/amf-app-ubi9" +"i2i/ausf-app-ubi9" = "quay.io/i2i/ausf-app-ubi9" +"i2i/nrf-app-ubi9" = "quay.io/i2i/nrf-app-ubi9" +"i2i/nssf-app-ubi9" = "quay.io/i2i/nssf-app-ubi9" +"i2i/pcf-app-ubi9" = "quay.io/i2i/pcf-app-ubi9" +"i2i/smf-app-ubi9" = "quay.io/i2i/smf-app-ubi9" +"i2i/udm-app-ubi9" = "quay.io/i2i/udm-app-ubi9" +"i2i/udr-app-ubi9" = "quay.io/i2i/udr-app-ubi9" +"i2i/upf-app-ubi8" = "quay.io/i2i/upf-app-ubi8" +"ibmappgateway/ibm-application-gateway-operator" = "icr.io/ibmappgateway/ibm-application-gateway-operator" +"ibm/appsody-application-operator" = "registry.connect.redhat.com/ibm/appsody-application-operator" +"ibm/appsody-operator-certified-bundle" = "registry.connect.redhat.com/ibm/appsody-operator-certified-bundle" +"ibm/aspera-hsts-aej" = "registry.connect.redhat.com/ibm/aspera-hsts-aej" +"ibm/aspera-hsts-ascp-server" = "registry.connect.redhat.com/ibm/aspera-hsts-ascp-server" +"ibm/aspera-hsts-asperanode" = "registry.connect.redhat.com/ibm/aspera-hsts-asperanode" +"ibm/aspera-hsts-catalog" = "registry.connect.redhat.com/ibm/aspera-hsts-catalog" +"ibm/aspera-hsts-configurator" = "registry.connect.redhat.com/ibm/aspera-hsts-configurator" +"ibm/aspera-hsts-election" = "registry.connect.redhat.com/ibm/aspera-hsts-election" +"ibm/aspera-hsts-engine" = "registry.connect.redhat.com/ibm/aspera-hsts-engine" +"ibm/aspera-hsts-kms" = "registry.connect.redhat.com/ibm/aspera-hsts-kms" +"ibm/aspera-hsts-operator" = "registry.connect.redhat.com/ibm/aspera-hsts-operator" +"ibm/aspera-hsts-scheduler" = "registry.connect.redhat.com/ibm/aspera-hsts-scheduler" +"ibm/aspera-hsts-tcp-proxy" = "registry.connect.redhat.com/ibm/aspera-hsts-tcp-proxy" +"ibm/aspera-hsts-utils" = "registry.connect.redhat.com/ibm/aspera-hsts-utils" +"ibm-bamoe/bamoe-businesscentral-monitoring-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-businesscentral-monitoring-rhel8" +"ibm-bamoe/bamoe-businesscentral-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-businesscentral-rhel8" +"ibm-bamoe/bamoe-controller-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-controller-rhel8" +"ibm-bamoe/bamoe-dashbuilder-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-dashbuilder-rhel8" +"ibm-bamoe/bamoe-kieserver-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-kieserver-rhel8" +"ibm-bamoe/bamoe-kogito-builder-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-kogito-builder-rhel8" +"ibm-bamoe/bamoe-kogito-rhel8-operator-bundle" = "registry.redhat.io/ibm-bamoe/bamoe-kogito-rhel8-operator-bundle" +"ibm-bamoe/bamoe-kogito-rhel8-operator" = "registry.redhat.io/ibm-bamoe/bamoe-kogito-rhel8-operator" +"ibm-bamoe/bamoe-kogito-runtime-jvm-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-kogito-runtime-jvm-rhel8" +"ibm-bamoe/bamoe-operator-bundle" = "registry.redhat.io/ibm-bamoe/bamoe-operator-bundle" +"ibm-bamoe/bamoe-process-migration-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-process-migration-rhel8" +"ibm-bamoe/bamoe-rhel8-operator" = "registry.redhat.io/ibm-bamoe/bamoe-rhel8-operator" +"ibm-bamoe/bamoe-smartrouter-rhel8" = "registry.redhat.io/ibm-bamoe/bamoe-smartrouter-rhel8" +"ibm/cadvisor-ppc64le" = "registry.connect.redhat.com/ibm/cadvisor-ppc64le" +"ibm/caffe" = "registry.connect.redhat.com/ibm/caffe" +"ibm/cassandra-ppc64le" = "registry.connect.redhat.com/ibm/cassandra-ppc64le" +"ibmcom/acecc-ecp" = "docker.io/ibmcom/acecc-ecp" +"ibmcom/acecc-proxy" = "docker.io/ibmcom/acecc-proxy" +"ibmcom/cem-operator" = "docker.io/ibmcom/cem-operator" +"ibmcom/datapower" = "docker.io/ibmcom/datapower" +"ibmcom/datapower-operator-conversion-webhook" = "docker.io/ibmcom/datapower-operator-conversion-webhook" +"ibmcom/datapower-operator" = "docker.io/ibmcom/datapower-operator" +"ibmcom/dependency-based-build" = "docker.io/ibmcom/dependency-based-build" +"ibmcom" = "docker.io/ibmcom" +"ibmcom/ibm-eventstreams-operator" = "docker.io/ibmcom/ibm-eventstreams-operator" +"ibmcom/ibm-eventstreams-operator-init" = "docker.io/ibmcom/ibm-eventstreams-operator-init" +"ibmcom/ibm-itx-rs-operator" = "docker.io/ibmcom/ibm-itx-rs-operator" +"ibmcom/ibm-mq-operator" = "docker.io/ibmcom/ibm-mq-operator" +"ibmcom/ibm-sample-panamax-operator" = "docker.io/ibmcom/ibm-sample-panamax-operator" +"ibmcom/ibm-storage-odf-operator" = "docker.io/ibmcom/ibm-storage-odf-operator" +"ibmcom/ibp-operator" = "docker.io/ibmcom/ibp-operator" +"ibmcom/mq" = "docker.io/ibmcom/mq" +"ibm/compare-and-comply" = "registry.connect.redhat.com/ibm/compare-and-comply" +"ibmcom/voice-agent-tester" = "docker.io/ibmcom/voice-agent-tester" +"ibmcom/voice-gateway-codec-g729" = "docker.io/ibmcom/voice-gateway-codec-g729" +"ibmcom/voice-gateway-mr" = "docker.io/ibmcom/voice-gateway-mr" +"ibmcom/voice-gateway-sms" = "docker.io/ibmcom/voice-gateway-sms" +"ibmcom/voice-gateway-so" = "docker.io/ibmcom/voice-gateway-so" +"ibmcom/voice-gateway-stt-adapter" = "docker.io/ibmcom/voice-gateway-stt-adapter" +"ibmcom/voice-gateway-tts-adapter" = "docker.io/ibmcom/voice-gateway-tts-adapter" +"ibm/couchdb2" = "registry.connect.redhat.com/ibm/couchdb2" +"ibm/couchdb-operator-mgmt" = "registry.connect.redhat.com/ibm/couchdb-operator-mgmt" +"ibm/couchdb-operator" = "registry.connect.redhat.com/ibm/couchdb-operator" +"ibm-edge/airgap-download-ui" = "registry.connect.redhat.com/ibm-edge/airgap-download-ui" +"ibm-edge/airgap-service" = "registry.connect.redhat.com/ibm-edge/airgap-service" +"ibm-edge/airgap-uploader" = "registry.connect.redhat.com/ibm-edge/airgap-uploader" +"ibm-edge/bas-operator-dashboard" = "registry.connect.redhat.com/ibm-edge/bas-operator-dashboard" +"ibm-edge/behavior-analytics-services-operator-bundle" = "registry.connect.redhat.com/ibm-edge/behavior-analytics-services-operator-bundle" +"ibm-edge/behavior-analytics-services-operator" = "registry.connect.redhat.com/ibm-edge/behavior-analytics-services-operator" +"ibm-edge/data-explorer-dashboard" = "registry.connect.redhat.com/ibm-edge/data-explorer-dashboard" +"ibm-edge/data-explorer-operator-bundle" = "registry.connect.redhat.com/ibm-edge/data-explorer-operator-bundle" +"ibm-edge/data-explorer-operator" = "registry.connect.redhat.com/ibm-edge/data-explorer-operator" +"ibm-edge/event-api" = "registry.connect.redhat.com/ibm-edge/event-api" +"ibm-edge/event-reader" = "registry.connect.redhat.com/ibm-edge/event-reader" +"ibm-edge/event-scheduler" = "registry.connect.redhat.com/ibm-edge/event-scheduler" +"ibm-edge/growth-stack-base" = "registry.connect.redhat.com/ibm-edge/growth-stack-base" +"ibm-edge/growth-stack-operator-bundle" = "registry.connect.redhat.com/ibm-edge/growth-stack-operator-bundle" +"ibm-edge/growth-stack-operator" = "registry.connect.redhat.com/ibm-edge/growth-stack-operator" +"ibm-edge/node-red-backup-restore" = "registry.connect.redhat.com/ibm-edge/node-red-backup-restore" +"ibm-edge/nodered-backup-restore" = "registry.connect.redhat.com/ibm-edge/nodered-backup-restore" +"ibm-edge/node-red-operator-bundle" = "registry.connect.redhat.com/ibm-edge/node-red-operator-bundle" +"ibm-edge/node-red-operator-bundle-rhm" = "registry.connect.redhat.com/ibm-edge/node-red-operator-bundle-rhm" +"ibm-edge/node-red-operator" = "registry.connect.redhat.com/ibm-edge/node-red-operator" +"ibm-edge/nodered-operator" = "registry.connect.redhat.com/ibm-edge/nodered-operator" +"ibm-edge/node-red" = "registry.connect.redhat.com/ibm-edge/node-red" +"ibm-edge/nodered" = "registry.connect.redhat.com/ibm-edge/nodered" +"ibm-edge/pgo-client" = "registry.connect.redhat.com/ibm-edge/pgo-client" +"ibm-edge/prometheus-scheduler" = "registry.connect.redhat.com/ibm-edge/prometheus-scheduler" +"ibm-edge/reverse-proxy" = "registry.connect.redhat.com/ibm-edge/reverse-proxy" +"ibm-edge/store-api" = "registry.connect.redhat.com/ibm-edge/store-api" +"ibm-edge/uds-operator-dashboard" = "registry.connect.redhat.com/ibm-edge/uds-operator-dashboard" +"ibm/fluentd1" = "registry.connect.redhat.com/ibm/fluentd1" +"ibm/gerrit3" = "registry.connect.redhat.com/ibm/gerrit3" +"ibm/grafana-ppc64le" = "registry.connect.redhat.com/ibm/grafana-ppc64le" +"ibm/guardium-external-s-tap-v113" = "registry.connect.redhat.com/ibm/guardium-external-s-tap-v113" +"ibm/iao-bundle" = "registry.connect.redhat.com/ibm/iao-bundle" +"ibm/iao-mb-broker-service" = "registry.connect.redhat.com/ibm/iao-mb-broker-service" +"ibm/iao-operator" = "registry.connect.redhat.com/ibm/iao-operator" +"ibm/iao-orchestrator-service" = "registry.connect.redhat.com/ibm/iao-orchestrator-service" +"ibm/iao-pgo-util" = "registry.connect.redhat.com/ibm/iao-pgo-util" +"ibm/iao-util" = "registry.connect.redhat.com/ibm/iao-util" +"ibm/ibm-acecc-configurator-dev" = "registry.connect.redhat.com/ibm/ibm-acecc-configurator-dev" +"ibm/ibm-acecc-configurator-prod" = "registry.connect.redhat.com/ibm/ibm-acecc-configurator-prod" +"ibm/ibm-application-gateway-operator-bundle" = "registry.connect.redhat.com/ibm/ibm-application-gateway-operator-bundle" +"ibm/ibm-block-csi-operator-bundle" = "registry.connect.redhat.com/ibm/ibm-block-csi-operator-bundle" +"ibm/ibm-block-csi-operator" = "registry.connect.redhat.com/ibm/ibm-block-csi-operator" +"ibm/ibm-cex-device-plugin-cm" = "registry.connect.redhat.com/ibm/ibm-cex-device-plugin-cm" +"ibm/ibmjava8-jre-ubi8-minimal" = "registry.connect.redhat.com/ibm/ibmjava8-jre-ubi8-minimal" +"ibm/ibmjava8-jre-ubi8" = "registry.connect.redhat.com/ibm/ibmjava8-jre-ubi8" +"ibm/ibmjava8-sdk-ubi8-minimal" = "registry.connect.redhat.com/ibm/ibmjava8-sdk-ubi8-minimal" +"ibm/ibmjava8-sdk-ubi8" = "registry.connect.redhat.com/ibm/ibmjava8-sdk-ubi8" +"ibm/ibmjava8-sfj-ubi8" = "registry.connect.redhat.com/ibm/ibmjava8-sfj-ubi8" +"ibm/ibm-semeru-runtime-certified-jdk-11-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-11-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jdk-11-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-11-ubi" +"ibm/ibm-semeru-runtime-certified-jdk-17-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-17-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jdk-17-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-17-ubi" +"ibm/ibm-semeru-runtime-certified-jdk-21-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-21-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jdk-21-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jdk-21-ubi" +"ibm/ibm-semeru-runtime-certified-jre-11-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-11-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jre-11-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-11-ubi" +"ibm/ibm-semeru-runtime-certified-jre-17-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-17-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jre-17-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-17-ubi" +"ibm/ibm-semeru-runtime-certified-jre-21-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-21-ubi-minimal" +"ibm/ibm-semeru-runtime-certified-jre-21-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-certified-jre-21-ubi" +"ibm/ibm-semeru-runtime-open-11-jre-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-11-jre-ubi-min" +"ibm/ibm-semeru-runtime-open-11-jre-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-11-jre-ubi" +"ibm/ibm-semeru-runtime-open-17-jdk-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-17-jdk-ubi-min" +"ibm/ibm-semeru-runtime-open-17-jdk-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-17-jdk-ubi" +"ibm/ibm-semeru-runtime-open-17-jre-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-17-jre-ubi-min" +"ibm/ibm-semeru-runtime-open-17-jre-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-17-jre-ubi" +"ibm/ibm-semeru-runtime-open-jdk-11-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-11-ubi-minimal" +"ibm/ibm-semeru-runtime-open-jdk-11-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-11-ubi" +"ibm/ibm-semeru-runtime-open-jdk-21-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-21-ubi-min" +"ibm/ibm-semeru-runtime-open-jdk-21-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-21-ubi" +"ibm/ibm-semeru-runtime-open-jdk-8-ubi-minimal" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-8-ubi-minimal" +"ibm/ibm-semeru-runtime-open-jdk-8-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jdk-8-ubi" +"ibm/ibm-semeru-runtime-open-jre-21-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jre-21-ubi-min" +"ibm/ibm-semeru-runtime-open-jre-21-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jre-21-ubi" +"ibm/ibm-semeru-runtime-open-jre-8-ubi-min" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jre-8-ubi-min" +"ibm/ibm-semeru-runtime-open-jre-8-ubi" = "registry.connect.redhat.com/ibm/ibm-semeru-runtime-open-jre-8-ubi" +"ibm/ibm-spectrum-scale-csi-driver" = "registry.connect.redhat.com/ibm/ibm-spectrum-scale-csi-driver" +"ibm/ibm-spectrum-scale-csi-operator-bundle" = "registry.connect.redhat.com/ibm/ibm-spectrum-scale-csi-operator-bundle" +"ibm/ibm-spectrum-scale-csi-operator" = "registry.connect.redhat.com/ibm/ibm-spectrum-scale-csi-operator" +"ibm/ibm-storage-odf-operator-bundle" = "registry.connect.redhat.com/ibm/ibm-storage-odf-operator-bundle" +"ibm/ibm-storage-odf-operator" = "registry.connect.redhat.com/ibm/ibm-storage-odf-operator" +"ibm/influxdb" = "registry.connect.redhat.com/ibm/influxdb" +"ibm/keda-ppc64le" = "registry.connect.redhat.com/ibm/keda-ppc64le" +"ibm/memcached-ppc64le" = "registry.connect.redhat.com/ibm/memcached-ppc64le" +"ibm/modelbuilder-augmentor" = "registry.connect.redhat.com/ibm/modelbuilder-augmentor" +"ibm/modelbuilder-auth-service" = "registry.connect.redhat.com/ibm/modelbuilder-auth-service" +"ibm/modelbuilder-bundle" = "registry.connect.redhat.com/ibm/modelbuilder-bundle" +"ibm/modelbuilder-bundle-rhm" = "registry.connect.redhat.com/ibm/modelbuilder-bundle-rhm" +"ibm/modelbuilder-cv-training-service" = "registry.connect.redhat.com/ibm/modelbuilder-cv-training-service" +"ibm/modelbuilder-image-server" = "registry.connect.redhat.com/ibm/modelbuilder-image-server" +"ibm/modelbuilder-operator" = "registry.connect.redhat.com/ibm/modelbuilder-operator" +"ibm/modelbuilder-pgo-util" = "registry.connect.redhat.com/ibm/modelbuilder-pgo-util" +"ibm/modelbuilder-util" = "registry.connect.redhat.com/ibm/modelbuilder-util" +"ibm/odm-dbserver" = "registry.connect.redhat.com/ibm/odm-dbserver" +"ibm/odm-decisioncenter" = "registry.connect.redhat.com/ibm/odm-decisioncenter" +"ibm/odm-decisionrunner" = "registry.connect.redhat.com/ibm/odm-decisionrunner" +"ibm/odm-decisionserverconsole" = "registry.connect.redhat.com/ibm/odm-decisionserverconsole" +"ibm/odm-decisionserverruntime" = "registry.connect.redhat.com/ibm/odm-decisionserverruntime" +"ibm/open-liberty-containers" = "registry.connect.redhat.com/ibm/open-liberty-containers" +"ibm/open-liberty-operator-bundle" = "registry.connect.redhat.com/ibm/open-liberty-operator-bundle" +"ibm/open-liberty-operator-controller" = "registry.connect.redhat.com/ibm/open-liberty-operator-controller" +"ibm/open-liberty-operator" = "registry.connect.redhat.com/ibm/open-liberty-operator" +"ibm/open-liberty-samples" = "registry.connect.redhat.com/ibm/open-liberty-samples" +"ibm/pai4sk" = "registry.connect.redhat.com/ibm/pai4sk" +"ibm/pytorch" = "registry.connect.redhat.com/ibm/pytorch" +"ibm/redis3" = "registry.connect.redhat.com/ibm/redis3" +"ibm/runtime-component-operator-bundle" = "registry.connect.redhat.com/ibm/runtime-component-operator-bundle" +"ibm/runtime-component-operator" = "registry.connect.redhat.com/ibm/runtime-component-operator" +"ibm/spectrum-symphony-operator-bundle" = "registry.connect.redhat.com/ibm/spectrum-symphony-operator-bundle" +"ibm/spectrum-symphony-operator" = "registry.connect.redhat.com/ibm/spectrum-symphony-operator" +"ibm/spectrum-symphony" = "registry.connect.redhat.com/ibm/spectrum-symphony" +"ibm/tensorflow" = "registry.connect.redhat.com/ibm/tensorflow" +"ibm/tidb-ppc64le" = "registry.connect.redhat.com/ibm/tidb-ppc64le" +"ibm/trans-advisor-operator-bundle" = "registry.connect.redhat.com/ibm/trans-advisor-operator-bundle" +"ibm/trans-advisor-operator" = "registry.connect.redhat.com/ibm/trans-advisor-operator" +"ibm/transformation-advisor-operator-testproject" = "registry.connect.redhat.com/ibm/transformation-advisor-operator-testproject" +"ibm-usa/fluent-bit" = "registry.connect.redhat.com/ibm-usa/fluent-bit" +"ibm/verify-access-operator" = "registry.connect.redhat.com/ibm/verify-access-operator" +"ibm/verify-directory-operator" = "registry.connect.redhat.com/ibm/verify-directory-operator" +"ibm/verify-operator-bundle" = "registry.connect.redhat.com/ibm/verify-operator-bundle" +"ibm/wmlce" = "registry.connect.redhat.com/ibm/wmlce" +"ibm/xgboost" = "registry.connect.redhat.com/ibm/xgboost" +"icij-db" = "bds-docker-release.jfrog.io/icij-db" +"identity-config/dex-operator-rhel8" = "registry.redhat.io/identity-config/dex-operator-rhel8" +"identity-config/mgmt-operator-bundle" = "registry.redhat.io/identity-config/mgmt-operator-bundle" +"identity-config/mgmt-rhel8-operator" = "registry.redhat.io/identity-config/mgmt-rhel8-operator" +"identity-service" = "bds-docker-release.jfrog.io/identity-service" +"illumio/cven" = "quay.io/illumio/cven" +"illumio/kubelink" = "quay.io/illumio/kubelink" +"infinidat/infinibox-csidriver-certified" = "registry.connect.redhat.com/infinidat/infinibox-csidriver-certified" +"infinidat/infinibox-operator-certified" = "registry.connect.redhat.com/infinidat/infinibox-operator-certified" +"infinidat/infinibox-prometheus-certified" = "registry.connect.redhat.com/infinidat/infinibox-prometheus-certified" +"infinidat/openstack-cinder-volume-infinidat-plugin" = "registry.connect.redhat.com/infinidat/openstack-cinder-volume-infinidat-plugin" +"infinidat/openstack-cinder-volume-infinidat-plugin-rhosp-17-1" = "registry.connect.redhat.com/infinidat/openstack-cinder-volume-infinidat-plugin-rhosp-17-1" +"influxdata/influxdb-1x" = "registry.connect.redhat.com/influxdata/influxdb-1x" +"influxdata/telegraf-1x" = "registry.connect.redhat.com/influxdata/telegraf-1x" +"infoblox/rhosp13-infoblox-ipam-agent" = "registry.connect.redhat.com/infoblox/rhosp13-infoblox-ipam-agent" +"instana/agent" = "registry.connect.redhat.com/instana/agent" +"instana/instana-agent-operator-bundle" = "registry.connect.redhat.com/instana/instana-agent-operator-bundle" +"instana/instana-agent-operator" = "registry.connect.redhat.com/instana/instana-agent-operator" +"instana/instana-agent-operator-rhmp" = "registry.connect.redhat.com/instana/instana-agent-operator-rhmp" +"integration/camel-k-rhel8-operator-bundle" = "registry.redhat.io/integration/camel-k-rhel8-operator-bundle" +"integration/camel-k-rhel8-operator" = "registry.redhat.io/integration/camel-k-rhel8-operator" +"integration/service-registry-kafkasql-rhel8" = "registry.redhat.io/integration/service-registry-kafkasql-rhel8" +"integration/service-registry-rhel8-operator-metadata" = "registry.redhat.io/integration/service-registry-rhel8-operator-metadata" +"integration/service-registry-rhel8-operator" = "registry.redhat.io/integration/service-registry-rhel8-operator" +"integration/service-registry-sql-rhel8" = "registry.redhat.io/integration/service-registry-sql-rhel8" +"intel/aikit-operator-bundle-marketplace" = "registry.connect.redhat.com/intel/aikit-operator-bundle-marketplace" +"intel/aikit-operator-bundle" = "registry.connect.redhat.com/intel/aikit-operator-bundle" +"intel/aikit-operator" = "registry.connect.redhat.com/intel/aikit-operator" +"intel-ethernet-operator/intel-ethernet-operator-flowconfig-daemon" = "quay.io/intel-ethernet-operator/intel-ethernet-operator-flowconfig-daemon" +"intel-ethernet-operator/intel-ethernet-operator-labeler" = "quay.io/intel-ethernet-operator/intel-ethernet-operator-labeler" +"intel-ethernet-operator/intel-ethernet-operator-manager" = "quay.io/intel-ethernet-operator/intel-ethernet-operator-manager" +"intel/intel-data-center-gpu-driver-container" = "registry.connect.redhat.com/intel/intel-data-center-gpu-driver-container" +"intel/intel-deviceplugin-operator" = "registry.connect.redhat.com/intel/intel-deviceplugin-operator" +"intel/intel-device-plugins-operator-bundle" = "registry.connect.redhat.com/intel/intel-device-plugins-operator-bundle" +"intel/intel-ethernet-operator-bundle" = "registry.connect.redhat.com/intel/intel-ethernet-operator-bundle" +"intel/intel-ethernet-operator-daemon" = "docker.io/intel/intel-ethernet-operator-daemon" +"intel/intel-ethernet-operator-flowconfig-daemon" = "docker.io/intel/intel-ethernet-operator-flowconfig-daemon" +"intel/intel-ethernet-operator-labeler" = "docker.io/intel/intel-ethernet-operator-labeler" +"intel/intel-ethernet-operator-manager" = "docker.io/intel/intel-ethernet-operator-manager" +"intel/intel-gpu-initcontainer" = "registry.connect.redhat.com/intel/intel-gpu-initcontainer" +"intel/intel-gpu-plugin" = "registry.connect.redhat.com/intel/intel-gpu-plugin" +"intel/intel-kubernetes-power-manager-bundle" = "registry.connect.redhat.com/intel/intel-kubernetes-power-manager-bundle" +"intel/intel-qat-initcontainer" = "registry.connect.redhat.com/intel/intel-qat-initcontainer" +"intel/intel-qat-plugin" = "registry.connect.redhat.com/intel/intel-qat-plugin" +"intel/intel-sgx-initcontainer" = "registry.connect.redhat.com/intel/intel-sgx-initcontainer" +"intel/intel-sgx-plugin" = "registry.connect.redhat.com/intel/intel-sgx-plugin" +"intel/n3000-daemon" = "registry.connect.redhat.com/intel/n3000-daemon" +"intel/n3000-driver" = "registry.connect.redhat.com/intel/n3000-driver" +"intel/n3000-labeler" = "registry.connect.redhat.com/intel/n3000-labeler" +"intel/n3000-monitoring" = "registry.connect.redhat.com/intel/n3000-monitoring" +"intel/n3000-operator-bundle" = "registry.connect.redhat.com/intel/n3000-operator-bundle" +"intel/n3000-operator" = "registry.connect.redhat.com/intel/n3000-operator" +"intel/oneapi-aikit" = "registry.connect.redhat.com/intel/oneapi-aikit" +"intel/openvino-dev" = "registry.connect.redhat.com/intel/openvino-dev" +"intel/openvino-model-server" = "registry.connect.redhat.com/intel/openvino-model-server" +"intel/openvino-runtime" = "registry.connect.redhat.com/intel/openvino-runtime" +"intel/ovms-operator-bundle" = "registry.connect.redhat.com/intel/ovms-operator-bundle" +"intel/ovms-operator" = "registry.connect.redhat.com/intel/ovms-operator" +"intel/ovms-operator-rhmp-bundle" = "registry.connect.redhat.com/intel/ovms-operator-rhmp-bundle" +"intel/pmem-csi-driver-os" = "registry.connect.redhat.com/intel/pmem-csi-driver-os" +"intel/pmem-csi-operator-os" = "registry.connect.redhat.com/intel/pmem-csi-operator-os" +"intel/power-node-agent_ocp-4.13" = "docker.io/intel/power-node-agent_ocp-4.13" +"intel/power-operator_ocp-4.13" = "docker.io/intel/power-operator_ocp-4.13" +"intel/sriov-fec-daemon" = "registry.connect.redhat.com/intel/sriov-fec-daemon" +"intel/sriov-fec-operator-bundle" = "registry.connect.redhat.com/intel/sriov-fec-operator-bundle" +"intel/sriov-fec-operator" = "registry.connect.redhat.com/intel/sriov-fec-operator" +"intel/tensorflow-mpi-horovod" = "registry.connect.redhat.com/intel/tensorflow-mpi-horovod" +"intel/tensorflow" = "registry.connect.redhat.com/intel/tensorflow" +"internet-access-service" = "bds-docker-release.jfrog.io/internet-access-service" +"intracom-telecom/apiserver-ubi" = "registry.connect.redhat.com/intracom-telecom/apiserver-ubi" +"intracom-telecom/dashboard-ubi8" = "registry.connect.redhat.com/intracom-telecom/dashboard-ubi8" +"intracom-telecom/dashboard-ubi" = "registry.connect.redhat.com/intracom-telecom/dashboard-ubi" +"intracom-telecom/dc-agent-rhel8" = "registry.connect.redhat.com/intracom-telecom/dc-agent-rhel8" +"intracom-telecom/dc-agent-rhel" = "registry.connect.redhat.com/intracom-telecom/dc-agent-rhel" +"intracom-telecom/orchestrator-rhel8" = "registry.connect.redhat.com/intracom-telecom/orchestrator-rhel8" +"intracom-telecom/orchestrator-rhel" = "registry.connect.redhat.com/intracom-telecom/orchestrator-rhel" +"introspective-networks/smokevpn1" = "registry.connect.redhat.com/introspective-networks/smokevpn1" +"isovalent/cilium-ee-olm-metadata" = "registry.connect.redhat.com/isovalent/cilium-ee-olm-metadata" +"isovalent/cilium-ee-olm" = "registry.connect.redhat.com/isovalent/cilium-ee-olm" +"isovalent/cilium-olm-metadata" = "registry.connect.redhat.com/isovalent/cilium-olm-metadata" +"isovalent/cilium-olm" = "registry.connect.redhat.com/isovalent/cilium-olm" +"isovalent/cilium" = "registry.connect.redhat.com/isovalent/cilium" +"isovalent/operator-generic" = "registry.connect.redhat.com/isovalent/operator-generic" +"isv-saas/verify-operator" = "icr.io/isv-saas/verify-operator" +"itservicenet/nextcloud" = "registry.connect.redhat.com/itservicenet/nextcloud" +"izac-349007/izacdocker/rhel/certificates-secret-watcher" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/certificates-secret-watcher" +"izac-349007/izacdocker/rhel/client" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/client" +"izac-349007/izacdocker/rhel/consumeroffsetsparser" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/consumeroffsetsparser" +"izac-349007/izacdocker/rhel/eventview" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/eventview" +"izac-349007/izacdocker/rhel/flink-base-rhel" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flink-base-rhel" +"izac-349007/izacdocker/rhel/flink-cluster-watcher" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flink-cluster-watcher" +"izac-349007/izacdocker/rhel/flink-k8s-batch-submitter" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flink-k8s-batch-submitter" +"izac-349007/izacdocker/rhel/flow" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flow" +"izac-349007/izacdocker/rhel/flow-checkpoint-utils" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flow-checkpoint-utils" +"izac-349007/izacdocker/rhel/flowkafkastreams" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flowkafkastreams" +"izac-349007/izacdocker/rhel/flow-utils" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flow-utils" +"izac-349007/izacdocker/rhel/flow-validator" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/flow-validator" +"izac-349007/izacdocker/rhel/metadata" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/metadata" +"izac-349007/izacdocker/rhel/profile-job-scheduler" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/profile-job-scheduler" +"izac-349007/izacdocker/rhel/profilekafkastreams" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/profilekafkastreams" +"izac-349007/izacdocker/rhel/profile-kafka-to-postgres" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/profile-kafka-to-postgres" +"izac-349007/izacdocker/rhel/profile-metrics-api" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/profile-metrics-api" +"izac-349007/izacdocker/rhel/queryconsumeroffsets" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/queryconsumeroffsets" +"izac-349007/izacdocker/rhel/server" = "asia-south1-docker.pkg.dev/izac-349007/izacdocker/rhel/server" +"jboss-amq-6/amq63-openshift" = "registry.access.redhat.com/jboss-amq-6/amq63-openshift" +"jboss-eap-7/eap74-openjdk11-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk11-openshift-rhel8" +"jboss-eap-7/eap74-openjdk11-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk11-runtime-openshift-rhel8" +"jboss-eap-7/eap74-openjdk17-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk17-openshift-rhel8" +"jboss-eap-7/eap74-openjdk17-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk17-runtime-openshift-rhel8" +"jboss-eap-7/eap74-openjdk8-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk8-openshift-rhel8" +"jboss-eap-7/eap74-openjdk8-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap74-openjdk8-runtime-openshift-rhel8" +"jboss-eap-7/eap-xp4-openjdk11-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap-xp4-openjdk11-openshift-rhel8" +"jboss-eap-7/eap-xp4-openjdk11-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap-xp4-openjdk11-runtime-openshift-rhel8" +"jboss-eap-7/eap-xp4-openjdk17-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap-xp4-openjdk17-openshift-rhel8" +"jboss-eap-7/eap-xp4-openjdk17-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-7/eap-xp4-openjdk17-runtime-openshift-rhel8" +"jboss-eap-8/eap8-openjdk17-builder-openshift-rhel8" = "registry.redhat.io/jboss-eap-8/eap8-openjdk17-builder-openshift-rhel8" +"jboss-eap-8/eap8-openjdk17-runtime-openshift-rhel8" = "registry.redhat.io/jboss-eap-8/eap8-openjdk17-runtime-openshift-rhel8" +"jboss-eap/eap-operator-bundle" = "registry.redhat.io/jboss-eap/eap-operator-bundle" +"jboss-eap/eap-rhel8-operator" = "registry.redhat.io/jboss-eap/eap-rhel8-operator" +"jboss-fuse-6/fis-java-openshift" = "registry.access.redhat.com/jboss-fuse-6/fis-java-openshift" +"jboss-fuse-6/fis-karaf-openshift" = "registry.access.redhat.com/jboss-fuse-6/fis-karaf-openshift" +"jboss-webserver-5/jws58-openjdk11-openshift-rhel8" = "registry.redhat.io/jboss-webserver-5/jws58-openjdk11-openshift-rhel8" +"jboss-webserver-5/jws58-openjdk17-openshift-rhel8" = "registry.redhat.io/jboss-webserver-5/jws58-openjdk17-openshift-rhel8" +"jboss-webserver-5/jws58-openjdk8-openshift-rhel8" = "registry.redhat.io/jboss-webserver-5/jws58-openjdk8-openshift-rhel8" +"jboss-webserver-5/jws5-operator-bundle" = "registry.redhat.io/jboss-webserver-5/jws5-operator-bundle" +"jboss-webserver-5/jws5-rhel8-operator" = "registry.redhat.io/jboss-webserver-5/jws5-rhel8-operator" +"jboss-webserver-6/jws60-openjdk17-openshift-rhel8" = "registry.redhat.io/jboss-webserver-6/jws60-openjdk17-openshift-rhel8" +"jennifersoft/java-agent" = "registry.connect.redhat.com/jennifersoft/java-agent" +"jetstack/cert-manager-operator-bundle" = "registry.connect.redhat.com/jetstack/cert-manager-operator-bundle" +"jfrog/artifactory-operator-bundle" = "registry.connect.redhat.com/jfrog/artifactory-operator-bundle" +"jfrog/artifactory-operator" = "registry.connect.redhat.com/jfrog/artifactory-operator" +"jfrog/artifactory-pro" = "registry.connect.redhat.com/jfrog/artifactory-pro" +"jfrog/init" = "registry.connect.redhat.com/jfrog/init" +"jfrog/pipelines-api" = "registry.connect.redhat.com/jfrog/pipelines-api" +"jfrog/pipelines-init" = "registry.connect.redhat.com/jfrog/pipelines-init" +"jfrog/pipelines-installer" = "registry.connect.redhat.com/jfrog/pipelines-installer" +"jfrog/pipelines-micro" = "registry.connect.redhat.com/jfrog/pipelines-micro" +"jfrog/pipelines-node" = "registry.connect.redhat.com/jfrog/pipelines-node" +"jfrog/pipelines-operator-bundle" = "registry.connect.redhat.com/jfrog/pipelines-operator-bundle" +"jfrog/pipelines-operator" = "registry.connect.redhat.com/jfrog/pipelines-operator" +"jfrog/pipelines-rabbitmq" = "registry.connect.redhat.com/jfrog/pipelines-rabbitmq" +"jfrog/pipelines-router" = "registry.connect.redhat.com/jfrog/pipelines-router" +"jfrog/pipelines-vault-init" = "registry.connect.redhat.com/jfrog/pipelines-vault-init" +"jfrog/pipelines-vault" = "registry.connect.redhat.com/jfrog/pipelines-vault" +"jfrog/pipelines-www" = "registry.connect.redhat.com/jfrog/pipelines-www" +"jfrog/xray-analysis" = "registry.connect.redhat.com/jfrog/xray-analysis" +"jfrog/xray-indexer" = "registry.connect.redhat.com/jfrog/xray-indexer" +"jfrog/xray-operator-bundle" = "registry.connect.redhat.com/jfrog/xray-operator-bundle" +"jfrog/xray-operator" = "registry.connect.redhat.com/jfrog/xray-operator" +"jfrog/xray-persist" = "registry.connect.redhat.com/jfrog/xray-persist" +"jfrog/xray-rabbitmq" = "registry.connect.redhat.com/jfrog/xray-rabbitmq" +"jfrog/xray-router" = "registry.connect.redhat.com/jfrog/xray-router" +"jfrog/xray-server" = "registry.connect.redhat.com/jfrog/xray-server" +"jinfonet/jreport-server15" = "registry.connect.redhat.com/jinfonet/jreport-server15" +"joget/joget-dx7-eap7" = "registry.connect.redhat.com/joget/joget-dx7-eap7" +"joget/joget-dx8-eap7" = "registry.connect.redhat.com/joget/joget-dx8-eap7" +"joget/joget-dx8-operator-bundle" = "registry.connect.redhat.com/joget/joget-dx8-operator-bundle" +"joget/joget-dx8-operator-bundle-rhmp" = "registry.connect.redhat.com/joget/joget-dx8-operator-bundle-rhmp" +"joget/joget-dx8-operator" = "registry.connect.redhat.com/joget/joget-dx8-operator" +"joget/joget-dx-operator-bundle" = "registry.connect.redhat.com/joget/joget-dx-operator-bundle" +"joget/joget-dx-operator-bundle-rhmp" = "registry.connect.redhat.com/joget/joget-dx-operator-bundle-rhmp" +"joget/joget-dx-operator" = "registry.connect.redhat.com/joget/joget-dx-operator" +"juniper/cn2" = "registry.connect.redhat.com/juniper/cn2" +"k9v9d5v2/accuknox-operator" = "public.ecr.aws/k9v9d5v2/accuknox-operator" +"k9v9d5v2/agents-operator" = "public.ecr.aws/k9v9d5v2/agents-operator" +"k9v9d5v2/discovery-engine-discover" = "public.ecr.aws/k9v9d5v2/discovery-engine-discover" +"k9v9d5v2/discovery-engine-hardening" = "public.ecr.aws/k9v9d5v2/discovery-engine-hardening" +"k9v9d5v2/discovery-engine-offloader" = "public.ecr.aws/k9v9d5v2/discovery-engine-offloader" +"k9v9d5v2/discovery-engine-sumengine" = "public.ecr.aws/k9v9d5v2/discovery-engine-sumengine" +"k9v9d5v2/feeder-service" = "public.ecr.aws/k9v9d5v2/feeder-service" +"k9v9d5v2/policy-enforcement-agent" = "public.ecr.aws/k9v9d5v2/policy-enforcement-agent" +"k9v9d5v2/shared-informer-agent" = "public.ecr.aws/k9v9d5v2/shared-informer-agent" +"kaitlam/admin-tools" = "quay.io/kaitlam/admin-tools" +"kaitlam/arm" = "quay.io/kaitlam/arm" +"kaitlam/cfgpull" = "quay.io/kaitlam/cfgpull" +"kaitlam/collector" = "quay.io/kaitlam/collector" +"kaitlam/dbfi" = "quay.io/kaitlam/dbfi" +"kaitlam/dbfm" = "quay.io/kaitlam/dbfm" +"kaitlam/dbft" = "quay.io/kaitlam/dbft" +"kaitlam/echos" = "quay.io/kaitlam/echos" +"kaitlam/gsm" = "quay.io/kaitlam/gsm" +"kaitlam/hmp" = "quay.io/kaitlam/hmp" +"kaitlam/ice" = "quay.io/kaitlam/ice" +"kaitlam/ifxr" = "quay.io/kaitlam/ifxr" +"kaitlam/ims" = "quay.io/kaitlam/ims" +"kaitlam/k8sag" = "quay.io/kaitlam/k8sag" +"kaitlam/kernel" = "quay.io/kaitlam/kernel" +"kaitlam/lida" = "quay.io/kaitlam/lida" +"kaitlam/lipa" = "quay.io/kaitlam/lipa" +"kaitlam/logos" = "quay.io/kaitlam/logos" +"kaitlam/mm1c" = "quay.io/kaitlam/mm1c" +"kaitlam/mm1s" = "quay.io/kaitlam/mm1s" +"kaitlam/mm3c" = "quay.io/kaitlam/mm3c" +"kaitlam/mm3s" = "quay.io/kaitlam/mm3s" +"kaitlam/mm4c" = "quay.io/kaitlam/mm4c" +"kaitlam/mm4s" = "quay.io/kaitlam/mm4s" +"kaitlam/mm7c" = "quay.io/kaitlam/mm7c" +"kaitlam/mm7s" = "quay.io/kaitlam/mm7s" +"kaitlam/mmk" = "quay.io/kaitlam/mmk" +"kaitlam/mmr" = "quay.io/kaitlam/mmr" +"kaitlam/msgapi" = "quay.io/kaitlam/msgapi" +"kaitlam/mta" = "quay.io/kaitlam/mta" +"kaitlam/netconfgw" = "quay.io/kaitlam/netconfgw" +"kaitlam/nrfag" = "quay.io/kaitlam/nrfag" +"kaitlam/oamzoo" = "quay.io/kaitlam/oamzoo" +"kaitlam/orion" = "quay.io/kaitlam/orion" +"kaitlam/pag" = "quay.io/kaitlam/pag" +"kaitlam/pusa" = "quay.io/kaitlam/pusa" +"kaitlam/redis" = "quay.io/kaitlam/redis" +"kaitlam/replicator" = "quay.io/kaitlam/replicator" +"kaitlam/restgw" = "quay.io/kaitlam/restgw" +"kaitlam/scn" = "quay.io/kaitlam/scn" +"kaitlam/sgs" = "quay.io/kaitlam/sgs" +"kaitlam/shark" = "quay.io/kaitlam/shark" +"kaitlam/slc" = "quay.io/kaitlam/slc" +"kaitlam/smog" = "quay.io/kaitlam/smog" +"kaitlam/smpp" = "quay.io/kaitlam/smpp" +"kaitlam/smtp" = "quay.io/kaitlam/smtp" +"kaitlam/snmpag" = "quay.io/kaitlam/snmpag" +"kaitlam/sodia" = "quay.io/kaitlam/sodia" +"kaitlam/sol" = "quay.io/kaitlam/sol" +"kaitlam/sonas" = "quay.io/kaitlam/sonas" +"kaitlam/spooler" = "quay.io/kaitlam/spooler" +"kaitlam/stn" = "quay.io/kaitlam/stn" +"kaitlam/ucp" = "quay.io/kaitlam/ucp" +"kaitlam/vesag" = "quay.io/kaitlam/vesag" +"kaitlam/zookeeper" = "quay.io/kaitlam/zookeeper" +"kasten/admin" = "registry.connect.redhat.com/kasten/admin" +"kasten/aggregatedapis" = "registry.connect.redhat.com/kasten/aggregatedapis" +"kasten/ambassador" = "registry.connect.redhat.com/kasten/ambassador" +"kasten/auth" = "registry.connect.redhat.com/kasten/auth" +"kasten/bloblifecyclemanager" = "registry.connect.redhat.com/kasten/bloblifecyclemanager" +"kasten/catalog" = "registry.connect.redhat.com/kasten/catalog" +"kasten/cephtool" = "registry.connect.redhat.com/kasten/cephtool" +"kasten/configmap-reload" = "registry.connect.redhat.com/kasten/configmap-reload" +"kasten/config" = "registry.connect.redhat.com/kasten/config" +"kasten/controllermanager" = "registry.connect.redhat.com/kasten/controllermanager" +"kasten/crypto" = "registry.connect.redhat.com/kasten/crypto" +"kasten/dashboardbff" = "registry.connect.redhat.com/kasten/dashboardbff" +"kasten/datamover" = "registry.connect.redhat.com/kasten/datamover" +"kasten/dex" = "registry.connect.redhat.com/kasten/dex" +"kasten/emissary" = "registry.connect.redhat.com/kasten/emissary" +"kasten/events" = "registry.connect.redhat.com/kasten/events" +"kasten/executor" = "registry.connect.redhat.com/kasten/executor" +"kasten/frontend" = "registry.connect.redhat.com/kasten/frontend" +"kasten/garbagecollector" = "registry.connect.redhat.com/kasten/garbagecollector" +"kasten/gateway" = "registry.connect.redhat.com/kasten/gateway" +"kasten/grafana" = "registry.connect.redhat.com/kasten/grafana" +"kasten-images/jobsqueue" = "gcr.io/kasten-images/jobsqueue" +"kasten/init" = "registry.connect.redhat.com/kasten/init" +"kasten/jobs" = "registry.connect.redhat.com/kasten/jobs" +"kasten/k10-operator-paygo" = "registry.connect.redhat.com/kasten/k10-operator-paygo" +"kasten/k10-operator" = "registry.connect.redhat.com/kasten/k10-operator" +"kasten/k10tools" = "registry.connect.redhat.com/kasten/k10tools" +"kasten/kanister" = "registry.connect.redhat.com/kasten/kanister" +"kasten/kanister-tools" = "registry.connect.redhat.com/kasten/kanister-tools" +"kasten/kasten-paygo-rhmp-bundle" = "registry.connect.redhat.com/kasten/kasten-paygo-rhmp-bundle" +"kasten/kasten-rhmp-bundle" = "registry.connect.redhat.com/kasten/kasten-rhmp-bundle" +"kasten/kasten-term-rhmp-bundle" = "registry.connect.redhat.com/kasten/kasten-term-rhmp-bundle" +"kasten/logging" = "registry.connect.redhat.com/kasten/logging" +"kasten/mccontrollermanager" = "registry.connect.redhat.com/kasten/mccontrollermanager" +"kasten/metering" = "registry.connect.redhat.com/kasten/metering" +"kasten/metric-sidecar" = "registry.connect.redhat.com/kasten/metric-sidecar" +"kasten/prometheus" = "registry.connect.redhat.com/kasten/prometheus" +"kasten/repositories" = "registry.connect.redhat.com/kasten/repositories" +"kasten/restorectl" = "registry.connect.redhat.com/kasten/restorectl" +"kasten/state" = "registry.connect.redhat.com/kasten/state" +"kasten/upgrade" = "registry.connect.redhat.com/kasten/upgrade" +"kasten/vbrintegrationapi" = "registry.connect.redhat.com/kasten/vbrintegrationapi" +"kathreftis/authsrvc" = "quay.io/kathreftis/authsrvc" +"kathreftis/regsrvc" = "quay.io/kathreftis/regsrvc" +"kathreftis/samlsrvc" = "quay.io/kathreftis/samlsrvc" +"kathreftis/workflowsrvc" = "quay.io/kathreftis/workflowsrvc" +"kmm/kernel-module-management-hub-operator-bundle" = "registry.redhat.io/kmm/kernel-module-management-hub-operator-bundle" +"kmm/kernel-module-management-hub-rhel9-operator" = "registry.redhat.io/kmm/kernel-module-management-hub-rhel9-operator" +"kmm/kernel-module-management-must-gather-rhel9" = "registry.redhat.io/kmm/kernel-module-management-must-gather-rhel9" +"kmm/kernel-module-management-operator-bundle" = "registry.redhat.io/kmm/kernel-module-management-operator-bundle" +"kmm/kernel-module-management-rhel9-operator" = "registry.redhat.io/kmm/kernel-module-management-rhel9-operator" +"kmm/kernel-module-management-signing-rhel9" = "registry.redhat.io/kmm/kernel-module-management-signing-rhel9" +"kmm/kernel-module-management-webhook-server-rhel9" = "registry.redhat.io/kmm/kernel-module-management-webhook-server-rhel9" +"kmm/kernel-module-management-worker-rhel9" = "registry.redhat.io/kmm/kernel-module-management-worker-rhel9" +"knol" = "hyc-emerging-tech-team-knol-docker-local.artifactory.swg-devops.com/knol" +"kong/gateway-operator-bundle" = "registry.connect.redhat.com/kong/gateway-operator-bundle" +"kong/kong-ingress-controller" = "registry.connect.redhat.com/kong/kong-ingress-controller" +"kong/kong-offline-operator1-bundle-marketplace" = "registry.connect.redhat.com/kong/kong-offline-operator1-bundle-marketplace" +"kong/kong-offline-operator1-bundle" = "registry.connect.redhat.com/kong/kong-offline-operator1-bundle" +"kong/kong-offline-operator1" = "registry.connect.redhat.com/kong/kong-offline-operator1" +"kong/kong-operator1" = "registry.connect.redhat.com/kong/kong-operator1" +"kong/kong" = "registry.connect.redhat.com/kong/kong" +"kong/ubi-kuma-cni" = "registry.connect.redhat.com/kong/ubi-kuma-cni" +"kong/ubi-kuma-cp" = "registry.connect.redhat.com/kong/ubi-kuma-cp" +"kong/ubi-kumactl" = "registry.connect.redhat.com/kong/ubi-kumactl" +"kong/ubi-kuma-dp" = "registry.connect.redhat.com/kong/ubi-kuma-dp" +"kovair/kovairdevops" = "registry.connect.redhat.com/kovair/kovairdevops" +"kove/kove-agent" = "quay.io/kove/kove-agent" +"kove/kove-client-drivers" = "quay.io/kove/kove-client-drivers" +"kove/kove-compatibility-detection" = "quay.io/kove/kove-compatibility-detection" +"kove/kove-container-hook" = "quay.io/kove/kove-container-hook" +"kove/kove-operator" = "registry.connect.redhat.com/kove/kove-operator" +"kove/kove-xmem" = "quay.io/kove/kove-xmem" +"kryptonite/api-gateway-openshift-demo" = "harbor.progressoft.io/kryptonite/api-gateway-openshift-demo" +"kryptonite/beneficiary-openshift-demo" = "harbor.progressoft.io/kryptonite/beneficiary-openshift-demo" +"kryptonite/cash-management-openshift-demo" = "harbor.progressoft.io/kryptonite/cash-management-openshift-demo" +"kryptonite/checks-openshift-demo" = "harbor.progressoft.io/kryptonite/checks-openshift-demo" +"kryptonite/corpay-castlemock-openshift-demo" = "harbor.progressoft.io/kryptonite/corpay-castlemock-openshift-demo" +"kryptonite/corpay-docs-openshift-demo" = "harbor.progressoft.io/kryptonite/corpay-docs-openshift-demo" +"kryptonite/corpay-frontend-bank-shell-openshift" = "harbor.progressoft.io/kryptonite/corpay-frontend-bank-shell-openshift" +"kryptonite/corpay-frontend-corporate-shell-openshift" = "harbor.progressoft.io/kryptonite/corpay-frontend-corporate-shell-openshift" +"kryptonite/corpay-utility-openshift-demo" = "harbor.progressoft.io/kryptonite/corpay-utility-openshift-demo" +"kryptonite/correspondence-openshift-demo" = "harbor.progressoft.io/kryptonite/correspondence-openshift-demo" +"kryptonite/data-management-openshift-demo" = "harbor.progressoft.io/kryptonite/data-management-openshift-demo" +"kryptonite/files-parser-openshift-demo" = "harbor.progressoft.io/kryptonite/files-parser-openshift-demo" +"kryptonite/fixed-deposits-and-loans-openshift-demo" = "harbor.progressoft.io/kryptonite/fixed-deposits-and-loans-openshift-demo" +"kryptonite/idm-openshift-demo" = "harbor.progressoft.io/kryptonite/idm-openshift-demo" +"kryptonite/oab-integration-openshift-demo" = "harbor.progressoft.io/kryptonite/oab-integration-openshift-demo" +"kryptonite/payments-openshift-demo" = "harbor.progressoft.io/kryptonite/payments-openshift-demo" +"kubearmor/k9v9d5v2" = "registry.connect.redhat.com/kubearmor/k9v9d5v2" +"kubearmor/kubearmor-controller" = "docker.io/kubearmor/kubearmor-controller" +"kubearmor/kubearmor-init" = "docker.io/kubearmor/kubearmor-init" +"kubearmor/kubearmor-operator" = "registry.connect.redhat.com/kubearmor/kubearmor-operator" +"kubearmor/kubearmor-relay-server" = "docker.io/kubearmor/kubearmor-relay-server" +"kubearmor/kubearmor-snitch" = "docker.io/kubearmor/kubearmor-snitch" +"kubearmor/kubearmor-ubi" = "docker.io/kubearmor/kubearmor-ubi" +"kubecost1/cost-model" = "gcr.io/kubecost1/cost-model" +"kubecost1/frontend" = "gcr.io/kubecost1/frontend" +"kubecost/operator" = "registry.connect.redhat.com/kubecost/operator" +"kube-descheduler-operator/descheduler-rhel9" = "registry.redhat.io/kube-descheduler-operator/descheduler-rhel9" +"kube-descheduler-operator/kube-descheduler-operator-bundle" = "registry.redhat.io/kube-descheduler-operator/kube-descheduler-operator-bundle" +"kube-descheduler-operator/kube-descheduler-rhel9-operator" = "registry.redhat.io/kube-descheduler-operator/kube-descheduler-rhel9-operator" +"kubemq/kubemq-bridges" = "registry.connect.redhat.com/kubemq/kubemq-bridges" +"kubemq/kubemq-operator-bundle" = "registry.connect.redhat.com/kubemq/kubemq-operator-bundle" +"kubemq/kubemq-operator" = "registry.connect.redhat.com/kubemq/kubemq-operator" +"kubemq/kubemq-sources" = "registry.connect.redhat.com/kubemq/kubemq-sources" +"kubemq/kubemq-targets" = "registry.connect.redhat.com/kubemq/kubemq-targets" +"kubemq/kubemq-uni" = "registry.connect.redhat.com/kubemq/kubemq-uni" +"kubevious/backend-ubi" = "docker.io/kubevious/backend-ubi" +"kubevious/collector-ubi" = "docker.io/kubevious/collector-ubi" +"kubevious/guard-ubi" = "docker.io/kubevious/guard-ubi" +"kubevious/operator" = "registry.connect.redhat.com/kubevious/operator" +"kubevious/parser-ubi" = "docker.io/kubevious/parser-ubi" +"kubevious/redisearch-ubi" = "docker.io/kubevious/redisearch-ubi" +"kubevious/ui-ubi" = "docker.io/kubevious/ui-ubi" +"kx/kdb" = "registry.connect.redhat.com/kx/kdb" +"labsai/eddi-operator-bundle" = "registry.connect.redhat.com/labsai/eddi-operator-bundle" +"labsai/eddi-operator" = "registry.connect.redhat.com/labsai/eddi-operator" +"labsai/eddi" = "registry.connect.redhat.com/labsai/eddi" +"lacework/lacework-agent" = "registry.connect.redhat.com/lacework/lacework-agent" +"layers/splunk/splunk/7.3-redhat/images/sha256-55050c2097d994abc0e6d1c9f7fd0f0c2fb5f4019a9b1e094ffdf33a70a" = "hub.docker.com/layers/splunk/splunk/7.3-redhat/images/sha256-55050c2097d994abc0e6d1c9f7fd0f0c2fb5f4019a9b1e094ffdf33a70a" +"lcodetechnologies/mobinfinity" = "docker.io/lcodetechnologies/mobinfinity" +"leaksignal/leaksignal-operator-img" = "registry.connect.redhat.com/leaksignal/leaksignal-operator-img" +"leaksignal/leaksignal-operator" = "registry.connect.redhat.com/leaksignal/leaksignal-operator" +"library/cnbr-auth" = "bastion.okd4.hatech.com.cn/library/cnbr-auth" +"lichen/api" = "us.icr.io/lichen/api" +"lichen/home" = "us.icr.io/lichen/home" +"lichen/metastore" = "us.icr.io/lichen/metastore" +"lichen/ontomerge" = "us.icr.io/lichen/ontomerge" +"lichen/profiler" = "us.icr.io/lichen/profiler" +"lichen/studio" = "us.icr.io/lichen/studio" +"lichen/synapse" = "us.icr.io/lichen/synapse" +"lightbend/akka-cluster-demo" = "registry.connect.redhat.com/lightbend/akka-cluster-demo" +"lightbitslabs/lightbits-operator" = "registry.connect.redhat.com/lightbitslabs/lightbits-operator" +"linbit/drbd-9" = "registry.connect.redhat.com/linbit/drbd-9" +"linbit/linstor-controller" = "registry.connect.redhat.com/linbit/linstor-controller" +"linbit/linstor-operator-bundle" = "registry.connect.redhat.com/linbit/linstor-operator-bundle" +"linbit/linstor-operator" = "registry.connect.redhat.com/linbit/linstor-operator" +"linbit/linstor-satellite" = "registry.connect.redhat.com/linbit/linstor-satellite" +"loadcore/agent-controller" = "prod.harbor.keysight.digital/loadcore/agent-controller" +"loadcore/agent-diagnostics-service" = "prod.harbor.keysight.digital/loadcore/agent-diagnostics-service" +"loadcore/appsec-data-model" = "prod.harbor.keysight.digital/loadcore/appsec-data-model" +"loadcore/appsec-resource-service" = "prod.harbor.keysight.digital/loadcore/appsec-resource-service" +"loadcore/ati-updates-job" = "prod.harbor.keysight.digital/loadcore/ati-updates-job" +"loadcore/calibration-service" = "prod.harbor.keysight.digital/loadcore/calibration-service" +"loadcore/config-service" = "prod.harbor.keysight.digital/loadcore/config-service" +"loadcore/dataseq-service" = "prod.harbor.keysight.digital/loadcore/dataseq-service" +"loadcore/fluent-bit" = "prod.harbor.keysight.digital/loadcore/fluent-bit" +"loadcore/jobs-service" = "prod.harbor.keysight.digital/loadcore/jobs-service" +"loadcore/kcos-auth-proxy" = "prod.harbor.keysight.digital/loadcore/kcos-auth-proxy" +"loadcore/kcos-eula" = "prod.harbor.keysight.digital/loadcore/kcos-eula" +"loadcore/kcos-ingress-ubi-image" = "prod.harbor.keysight.digital/loadcore/kcos-ingress-ubi-image" +"loadcore/kcos-keycloak-init-container" = "prod.harbor.keysight.digital/loadcore/kcos-keycloak-init-container" +"loadcore/kcos-keycloak-postgresql" = "prod.harbor.keysight.digital/loadcore/kcos-keycloak-postgresql" +"loadcore/kcos-keycloak" = "prod.harbor.keysight.digital/loadcore/kcos-keycloak" +"loadcore/kcos-licensing-hostid-vmuuid" = "prod.harbor.keysight.digital/loadcore/kcos-licensing-hostid-vmuuid" +"loadcore/kcos-licensing" = "prod.harbor.keysight.digital/loadcore/kcos-licensing" +"loadcore/kcos-logging-framework" = "prod.harbor.keysight.digital/loadcore/kcos-logging-framework" +"loadcore/kcos-neo4j-apoc-ubi" = "prod.harbor.keysight.digital/loadcore/kcos-neo4j-apoc-ubi" +"loadcore/kcos-roads" = "prod.harbor.keysight.digital/loadcore/kcos-roads" +"loadcore/kcos-roads-schema" = "prod.harbor.keysight.digital/loadcore/kcos-roads-schema" +"loadcore/kcos-system-diagnostics" = "prod.harbor.keysight.digital/loadcore/kcos-system-diagnostics" +"loadcore/keysight-ati-updates-bundle" = "registry.connect.redhat.com/loadcore/keysight-ati-updates-bundle" +"loadcore/keysight-ati-updates" = "prod.harbor.keysight.digital/loadcore/keysight-ati-updates" +"loadcore/keysight-kcos-framework-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-framework-bundle" +"loadcore/keysight-kcos-framework" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-framework" +"loadcore/keysight-kcos-ingress-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-ingress-bundle" +"loadcore/keysight-kcos-ingress" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-ingress" +"loadcore/keysight-kcos-licensing-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-licensing-bundle" +"loadcore/keysight-kcos-licensing" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-licensing" +"loadcore/keysight-kcos-roads-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-roads-bundle" +"loadcore/keysight-kcos-roads" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-roads" +"loadcore/keysight-kcos-roads-schema-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-roads-schema-bundle" +"loadcore/keysight-kcos-roads-schema" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-roads-schema" +"loadcore/keysight-kcos-sso-bundle" = "registry.connect.redhat.com/loadcore/keysight-kcos-sso-bundle" +"loadcore/keysight-kcos-sso" = "prod.harbor.keysight.digital/loadcore/keysight-kcos-sso" +"loadcore/keysight-keycloak-operator" = "prod.harbor.keysight.digital/loadcore/keysight-keycloak-operator" +"loadcore/keysight-loadcore-agents-bundle" = "registry.connect.redhat.com/loadcore/keysight-loadcore-agents-bundle" +"loadcore/keysight-loadcore-agents" = "prod.harbor.keysight.digital/loadcore/keysight-loadcore-agents" +"loadcore/keysight-load-core-bundle" = "registry.connect.redhat.com/loadcore/keysight-load-core-bundle" +"loadcore/keysight-load-core" = "prod.harbor.keysight.digital/loadcore/keysight-load-core" +"loadcore/keysight-nats-operator-bundle" = "registry.connect.redhat.com/loadcore/keysight-nats-operator-bundle" +"loadcore/keysight-nats-operator" = "prod.harbor.keysight.digital/loadcore/keysight-nats-operator" +"loadcore/keysight-nimbusmosaic-dusim-bundle" = "registry.connect.redhat.com/loadcore/keysight-nimbusmosaic-dusim-bundle" +"loadcore/keysight-nimbusmosaic-dusim" = "prod.harbor.keysight.digital/loadcore/keysight-nimbusmosaic-dusim" +"loadcore/keysight-rest-api-browser-v1-bundle" = "registry.connect.redhat.com/loadcore/keysight-rest-api-browser-v1-bundle" +"loadcore/keysight-rest-api-browser-v1" = "prod.harbor.keysight.digital/loadcore/keysight-rest-api-browser-v1" +"loadcore/keysight-wap-appsec-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-appsec-bundle" +"loadcore/keysight-wap-appsec" = "prod.harbor.keysight.digital/loadcore/keysight-wap-appsec" +"loadcore/keysight-wap-core-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-core-bundle" +"loadcore/keysight-wap-core" = "prod.harbor.keysight.digital/loadcore/keysight-wap-core" +"loadcore/keysight-wap-db-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-db-bundle" +"loadcore/keysight-wap-db" = "prod.harbor.keysight.digital/loadcore/keysight-wap-db" +"loadcore/keysight-wap-diagnostics-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-diagnostics-bundle" +"loadcore/keysight-wap-diagnostics" = "prod.harbor.keysight.digital/loadcore/keysight-wap-diagnostics" +"loadcore/keysight-wap-logging-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-logging-bundle" +"loadcore/keysight-wap-logging" = "prod.harbor.keysight.digital/loadcore/keysight-wap-logging" +"loadcore/keysight-wap-migration-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-migration-bundle" +"loadcore/keysight-wap-migration" = "prod.harbor.keysight.digital/loadcore/keysight-wap-migration" +"loadcore/keysight-wap-msg-broker-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-msg-broker-bundle" +"loadcore/keysight-wap-msg-broker" = "prod.harbor.keysight.digital/loadcore/keysight-wap-msg-broker" +"loadcore/keysight-wap-notifications-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-notifications-bundle" +"loadcore/keysight-wap-notifications" = "prod.harbor.keysight.digital/loadcore/keysight-wap-notifications" +"loadcore/keysight-wap-stats-dashboards-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-stats-dashboards-bundle" +"loadcore/keysight-wap-stats-dashboards" = "prod.harbor.keysight.digital/loadcore/keysight-wap-stats-dashboards" +"loadcore/keysight-wap-storage-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-storage-bundle" +"loadcore/keysight-wap-storage" = "prod.harbor.keysight.digital/loadcore/keysight-wap-storage" +"loadcore/keysight-wap-test-core-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-test-core-bundle" +"loadcore/keysight-wap-test-core" = "prod.harbor.keysight.digital/loadcore/keysight-wap-test-core" +"loadcore/keysight-wap-ui-bundle" = "registry.connect.redhat.com/loadcore/keysight-wap-ui-bundle" +"loadcore/keysight-wap-ui" = "prod.harbor.keysight.digital/loadcore/keysight-wap-ui" +"loadcore/keysight-websocket-service-bundle" = "registry.connect.redhat.com/loadcore/keysight-websocket-service-bundle" +"loadcore/keysight-websocket-service" = "prod.harbor.keysight.digital/loadcore/keysight-websocket-service" +"loadcore/license-service" = "prod.harbor.keysight.digital/loadcore/license-service" +"loadcore/licensing-chisel-tunnel" = "prod.harbor.keysight.digital/loadcore/licensing-chisel-tunnel" +"loadcore/loadcore-agent" = "prod.harbor.keysight.digital/loadcore/loadcore-agent" +"loadcore/loadcore" = "registry.connect.redhat.com/loadcore/loadcore" +"loadcore/migration-service" = "prod.harbor.keysight.digital/loadcore/migration-service" +"loadcore/nats" = "prod.harbor.keysight.digital/loadcore/nats" +"loadcore/nats-server-config-reloader" = "prod.harbor.keysight.digital/loadcore/nats-server-config-reloader" +"loadcore/nats-streaming" = "prod.harbor.keysight.digital/loadcore/nats-streaming" +"loadcore/neo4j-ubi-image" = "prod.harbor.keysight.digital/loadcore/neo4j-ubi-image" +"loadcore/nimbusmosaic-countersmodule" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-countersmodule" +"loadcore/nimbusmosaic-gateway" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-gateway" +"loadcore/nimbusmosaic-mobility" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-mobility" +"loadcore/nimbusmosaic-perspective" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-perspective" +"loadcore/nimbusmosaic-testexecutor" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-testexecutor" +"loadcore/nimbusmosaic-testmanagerconnector" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-testmanagerconnector" +"loadcore/nimbusmosaic-testprojecteditor" = "prod.harbor.keysight.digital/loadcore/nimbusmosaic-testprojecteditor" +"loadcore/notification-service" = "prod.harbor.keysight.digital/loadcore/notification-service" +"loadcore/postgresql-ubi-image" = "prod.harbor.keysight.digital/loadcore/postgresql-ubi-image" +"loadcore/rest-api-browser-ui-v1" = "prod.harbor.keysight.digital/loadcore/rest-api-browser-ui-v1" +"loadcore/rest-browser-helper" = "prod.harbor.keysight.digital/loadcore/rest-browser-helper" +"loadcore/rest-stats-service" = "prod.harbor.keysight.digital/loadcore/rest-stats-service" +"loadcore/result-service" = "prod.harbor.keysight.digital/loadcore/result-service" +"loadcore/session-manager" = "prod.harbor.keysight.digital/loadcore/session-manager" +"loadcore/shell-operator-ubi" = "prod.harbor.keysight.digital/loadcore/shell-operator-ubi" +"loadcore/stats-dashboard-service" = "prod.harbor.keysight.digital/loadcore/stats-dashboard-service" +"loadcore/stats" = "prod.harbor.keysight.digital/loadcore/stats" +"loadcore/stats-ui-base" = "prod.harbor.keysight.digital/loadcore/stats-ui-base" +"loadcore/test-results-service" = "prod.harbor.keysight.digital/loadcore/test-results-service" +"loadcore/traffic-controller" = "prod.harbor.keysight.digital/loadcore/traffic-controller" +"loadcore/wap-db-diagnostics-service" = "prod.harbor.keysight.digital/loadcore/wap-db-diagnostics-service" +"loadcore/wap-elasticsearch" = "prod.harbor.keysight.digital/loadcore/wap-elasticsearch" +"loadcore/wap-minio-mc" = "prod.harbor.keysight.digital/loadcore/wap-minio-mc" +"loadcore/wap-minio" = "prod.harbor.keysight.digital/loadcore/wap-minio" +"loadcore/wap-ose-cli" = "prod.harbor.keysight.digital/loadcore/wap-ose-cli" +"loadcore/wap-rhel8-toolbox" = "prod.harbor.keysight.digital/loadcore/wap-rhel8-toolbox" +"loadcore/wap-ui" = "prod.harbor.keysight.digital/loadcore/wap-ui" +"loadcore/wireless-data-model" = "prod.harbor.keysight.digital/loadcore/wireless-data-model" +"loc-devops/operator-bundle" = "registry.connect.redhat.com/loc-devops/operator-bundle" +"loc-devops/operator" = "registry.connect.redhat.com/loc-devops/operator" +"logging-service" = "466932663284.dkr.ecr.ap-southeast-1.amazonaws.com/logging-service" +"loxilb-io/kube-loxilb-operator" = "registry.connect.redhat.com/loxilb-io/kube-loxilb-operator" +"loxilb-io/kube-loxilb-ubi8" = "ghcr.io/loxilb-io/kube-loxilb-ubi8" +"lucep/omnipath" = "registry.connect.redhat.com/lucep/omnipath" +"lvms4/lvms-must-gather-rhel8" = "registry.redhat.io/lvms4/lvms-must-gather-rhel8" +"lvms4/lvms-must-gather-rhel9" = "registry.redhat.io/lvms4/lvms-must-gather-rhel9" +"lvms4/lvms-operator-bundle" = "registry.redhat.io/lvms4/lvms-operator-bundle" +"lvms4/lvms-rhel8-operator" = "registry.redhat.io/lvms4/lvms-rhel8-operator" +"lvms4/lvms-rhel9-operator" = "registry.redhat.io/lvms4/lvms-rhel9-operator" +"lvms4/topolvm-rhel8" = "registry.redhat.io/lvms4/topolvm-rhel8" +"lvms4/topolvm-rhel9" = "registry.redhat.io/lvms4/topolvm-rhel9" +"m5gcrhcert/amf-ap" = "quay.io/m5gcrhcert/amf-ap" +"m5gcrhcert/amf-comm" = "quay.io/m5gcrhcert/amf-comm" +"m5gcrhcert/amf-ee" = "quay.io/m5gcrhcert/amf-ee" +"m5gcrhcert/amf-gtpc-iwf" = "quay.io/m5gcrhcert/amf-gtpc-iwf" +"m5gcrhcert/amf-mt" = "quay.io/m5gcrhcert/amf-mt" +"m5gcrhcert/amf-n2-iwf" = "quay.io/m5gcrhcert/amf-n2-iwf" +"m5gcrhcert/amf-pathmgmt" = "quay.io/m5gcrhcert/amf-pathmgmt" +"m5gcrhcert/amf-slicemanagement" = "quay.io/m5gcrhcert/amf-slicemanagement" +"m5gcrhcert/ausf" = "quay.io/m5gcrhcert/ausf" +"m5gcrhcert/cim" = "quay.io/m5gcrhcert/cim" +"m5gcrhcert/ksync" = "quay.io/m5gcrhcert/ksync" +"m5gcrhcert/nrf-at" = "quay.io/m5gcrhcert/nrf-at" +"m5gcrhcert/nrf-discovery" = "quay.io/m5gcrhcert/nrf-discovery" +"m5gcrhcert/nrf-expiration" = "quay.io/m5gcrhcert/nrf-expiration" +"m5gcrhcert/nrf-mgmt" = "quay.io/m5gcrhcert/nrf-mgmt" +"m5gcrhcert/nrf-sn" = "quay.io/m5gcrhcert/nrf-sn" +"m5gcrhcert/nssf-avail" = "quay.io/m5gcrhcert/nssf-avail" +"m5gcrhcert/nssf-slicesel" = "quay.io/m5gcrhcert/nssf-slicesel" +"m5gcrhcert/pcf-am" = "quay.io/m5gcrhcert/pcf-am" +"m5gcrhcert/pcf-diam-iwf" = "quay.io/m5gcrhcert/pcf-diam-iwf" +"m5gcrhcert/pcf-eval-policy" = "quay.io/m5gcrhcert/pcf-eval-policy" +"m5gcrhcert/pcf-gw" = "quay.io/m5gcrhcert/pcf-gw" +"m5gcrhcert/pcf-mgmt" = "quay.io/m5gcrhcert/pcf-mgmt" +"m5gcrhcert/pcf-sm" = "quay.io/m5gcrhcert/pcf-sm" +"m5gcrhcert/pcf-ue" = "quay.io/m5gcrhcert/pcf-ue" +"m5gcrhcert/smf-ctf" = "quay.io/m5gcrhcert/smf-ctf" +"m5gcrhcert/smf-eef" = "quay.io/m5gcrhcert/smf-eef" +"m5gcrhcert/smf-gw" = "quay.io/m5gcrhcert/smf-gw" +"m5gcrhcert/smf-ipm" = "quay.io/m5gcrhcert/smf-ipm" +"m5gcrhcert/smf-n4-iwf" = "quay.io/m5gcrhcert/smf-n4-iwf" +"m5gcrhcert/smf-pdu" = "quay.io/m5gcrhcert/smf-pdu" +"m5gcrhcert/smf-plc" = "quay.io/m5gcrhcert/smf-plc" +"m5gcrhcert/smf-restore" = "quay.io/m5gcrhcert/smf-restore" +"m5gcrhcert/ts-coordinator" = "quay.io/m5gcrhcert/ts-coordinator" +"m5gcrhcert/ts-exp" = "quay.io/m5gcrhcert/ts-exp" +"m5gcrhcert/ts-man" = "quay.io/m5gcrhcert/ts-man" +"m5gcrhcert/udm-ee" = "quay.io/m5gcrhcert/udm-ee" +"m5gcrhcert/udm-mt" = "quay.io/m5gcrhcert/udm-mt" +"m5gcrhcert/udm-notify" = "quay.io/m5gcrhcert/udm-notify" +"m5gcrhcert/udm-sdm" = "quay.io/m5gcrhcert/udm-sdm" +"m5gcrhcert/udm-ueau" = "quay.io/m5gcrhcert/udm-ueau" +"m5gcrhcert/udm-uecm" = "quay.io/m5gcrhcert/udm-uecm" +"m5gcrhcert/udr-app" = "quay.io/m5gcrhcert/udr-app" +"m5gcrhcert/udr-exp" = "quay.io/m5gcrhcert/udr-exp" +"m5gcrhcert/udr-notify" = "quay.io/m5gcrhcert/udr-notify" +"m5gcrhcert/udr-policy" = "quay.io/m5gcrhcert/udr-policy" +"m5gcrhcert/udr-polling" = "quay.io/m5gcrhcert/udr-polling" +"m5gcrhcert/udr-provision" = "quay.io/m5gcrhcert/udr-provision" +"m5gcrhcert/udr-subs" = "quay.io/m5gcrhcert/udr-subs" +"m5gcrhcert/udsf-mgmt" = "quay.io/m5gcrhcert/udsf-mgmt" +"m5gcrhcert/udsf" = "quay.io/m5gcrhcert/udsf" +"m5gcrhcert/udsf-util" = "quay.io/m5gcrhcert/udsf-util" +"m5gcrhcert/upf" = "quay.io/m5gcrhcert/upf" +"mahesh_kumar/armour365" = "quay.io/mahesh_kumar/armour365" +"mahesh_kumar/assist365" = "quay.io/mahesh_kumar/assist365" +"mahesh_kumar/aura365" = "quay.io/mahesh_kumar/aura365" +"mahesh_kumar/automate365" = "quay.io/mahesh_kumar/automate365" +"manta-ubi8/manta-dataflow" = "repo.getmanta.com/manta-ubi8/manta-dataflow" +"manta-ubi8/mantaflow-operator-bundle" = "registry.connect.redhat.com/manta-ubi8/mantaflow-operator-bundle" +"manta-ubi8/mantaflow-operator" = "repo.getmanta.com/manta-ubi8/mantaflow-operator" +"manta-ubi8" = "repo.getmanta.com/manta-ubi8" +"mantisnet/tawon" = "quay.io/mantisnet/tawon" +"maprtech/csi-kdfplugin" = "registry.connect.redhat.com/maprtech/csi-kdfplugin" +"maprtech/csi-kdfprovisioner" = "registry.connect.redhat.com/maprtech/csi-kdfprovisioner" +"maprtech/csi-nfsplugin" = "registry.connect.redhat.com/maprtech/csi-nfsplugin" +"maprtech/hpe-ezmeral-csi-operator-bundle" = "registry.connect.redhat.com/maprtech/hpe-ezmeral-csi-operator-bundle" +"maprtech/hpe-ezmeral-csi-operator" = "registry.connect.redhat.com/maprtech/hpe-ezmeral-csi-operator" +"martin_joy/bridgenas" = "quay.io/martin_joy/bridgenas" +"martin_joy/conclair" = "quay.io/martin_joy/conclair" +"mas-accelerators/aimodelfactory-operator" = "icr.io/mas-accelerators/aimodelfactory-operator" +"mattermost/mattermost-410-enterprise-edition" = "registry.connect.redhat.com/mattermost/mattermost-410-enterprise-edition" +"mattermost/mattermost-enterprise-edition-5" = "registry.connect.redhat.com/mattermost/mattermost-enterprise-edition-5" +"mayadata/m-apiserver" = "registry.connect.redhat.com/mayadata/m-apiserver" +"mayadata/m-exporter" = "registry.connect.redhat.com/mayadata/m-exporter" +"mcallisterpetr/spm-central" = "docker.io/mcallisterpetr/spm-central" +"mcallisterpetr/spm-user" = "docker.io/mcallisterpetr/spm-user" +"mcallisterpetr/tcc-web-ui" = "docker.io/mcallisterpetr/tcc-web-ui" +"mcallisterpetr/tetrate-rsync" = "docker.io/mcallisterpetr/tetrate-rsync" +"memsql/node" = "registry.connect.redhat.com/memsql/node" +"memsql/operator-bundle" = "registry.connect.redhat.com/memsql/operator-bundle" +"memsql/operator" = "registry.connect.redhat.com/memsql/operator" +"memsql/quickstart" = "registry.connect.redhat.com/memsql/quickstart" +"memverge/memory-machine-operator-bundle" = "registry.connect.redhat.com/memverge/memory-machine-operator-bundle" +"migration-toolkit-virtualization/mtv-api-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-api-rhel9" +"migration-toolkit-virtualization/mtv-console-plugin-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-console-plugin-rhel9" +"migration-toolkit-virtualization/mtv-controller-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-controller-rhel8" +"migration-toolkit-virtualization/mtv-controller-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-controller-rhel9" +"migration-toolkit-virtualization/mtv-must-gather-api-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-api-rhel8" +"migration-toolkit-virtualization/mtv-must-gather-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-must-gather-rhel8" +"migration-toolkit-virtualization/mtv-openstack-populator-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-openstack-populator-rhel9" +"migration-toolkit-virtualization/mtv-operator-bundle" = "registry.redhat.io/migration-toolkit-virtualization/mtv-operator-bundle" +"migration-toolkit-virtualization/mtv-ova-provider-server-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-ova-provider-server-rhel9" +"migration-toolkit-virtualization/mtv-populator-controller-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-populator-controller-rhel9" +"migration-toolkit-virtualization/mtv-rhel8-operator" = "registry.redhat.io/migration-toolkit-virtualization/mtv-rhel8-operator" +"migration-toolkit-virtualization/mtv-rhv-populator-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-rhv-populator-rhel8" +"migration-toolkit-virtualization/mtv-ui-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-ui-rhel8" +"migration-toolkit-virtualization/mtv-validation-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-validation-rhel8" +"migration-toolkit-virtualization/mtv-validation-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-validation-rhel9" +"migration-toolkit-virtualization/mtv-virt-v2v-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-rhel8" +"migration-toolkit-virtualization/mtv-virt-v2v-rhel9" = "registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-rhel9" +"migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8" = "registry.redhat.io/migration-toolkit-virtualization/mtv-virt-v2v-warm-rhel8" +"minio/directpv" = "registry.connect.redhat.com/minio/directpv" +"minio/minio-operator1-marketplace" = "registry.connect.redhat.com/minio/minio-operator1-marketplace" +"minio/minio-operator1" = "registry.connect.redhat.com/minio/minio-operator1" +"mongo" = "bds-docker-release.jfrog.io/mongo" +"mongodb/enterprise-database" = "registry.connect.redhat.com/mongodb/enterprise-database" +"mongodb/enterprise-operator-bundle" = "registry.connect.redhat.com/mongodb/enterprise-operator-bundle" +"mongodb/enterprise-operator" = "registry.connect.redhat.com/mongodb/enterprise-operator" +"mongodb/init-appdb" = "registry.connect.redhat.com/mongodb/init-appdb" +"mongodb/mongodb-agent" = "registry.connect.redhat.com/mongodb/mongodb-agent" +"mongodb/mongodb-atlas-kubernetes-operator" = "quay.io/mongodb/mongodb-atlas-kubernetes-operator" +"mongodb/mongodb-enterprise-appdb-database" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-appdb-database" +"mongodb/mongodb-enterprise-appdb" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-appdb" +"mongodb/mongodb-enterprise-init-appdb" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-init-appdb" +"mongodb/mongodb-enterprise-init-database" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-init-database" +"mongodb/mongodb-enterprise-init-ops-manager" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-init-ops-manager" +"mongodb/mongodb-enterprise-ops-manager" = "registry.connect.redhat.com/mongodb/mongodb-enterprise-ops-manager" +"montier/od1" = "registry.connect.redhat.com/montier/od1" +"mpaas/appcenter" = "securtity-test-registry.cn-hangzhou.cr.aliyuncs.com/mpaas/appcenter" +"mpaas/mcube" = "securtity-test-registry.cn-hangzhou.cr.aliyuncs.com/mpaas/mcube" +"mpaas/mss" = "securtity-test-registry.cn-hangzhou.cr.aliyuncs.com/mpaas/mss" +"mpaas/yunpushcore" = "securtity-test-registry.cn-hangzhou.cr.aliyuncs.com/mpaas/yunpushcore" +"mrhcert/4gcucp" = "quay.io/mrhcert/4gcucp" +"mrhcert/4g_cuup" = "quay.io/mrhcert/4g_cuup" +"mrhcert/4g-du-rhubi" = "quay.io/mrhcert/4g-du-rhubi" +"mrhcert/5gdu_updated" = "quay.io/mrhcert/5gdu_updated" +"mrhcert/cscf/ims-r_11_0_12_2-v2" = "quay.io/mrhcert/cscf/ims-r_11_0_12_2-v2" +"mrhcert/cucp_gnb_mgr" = "quay.io/mrhcert/cucp_gnb_mgr" +"mrhcert/cucp_sctp_e1_iwf" = "quay.io/mrhcert/cucp_sctp_e1_iwf" +"mrhcert/cucp_sctp_f1_iwf" = "quay.io/mrhcert/cucp_sctp_f1_iwf" +"mrhcert/cucp_sctp_x2_iwf" = "quay.io/mrhcert/cucp_sctp_x2_iwf" +"mrhcert/cucp_ue_conn_mgr" = "quay.io/mrhcert/cucp_ue_conn_mgr" +"mrhcert/cuup_bccsvc" = "quay.io/mrhcert/cuup_bccsvc" +"mrhcert/cuup_gwsvc" = "quay.io/mrhcert/cuup_gwsvc" +"mrhcert/cuup_intfmgrsvc" = "quay.io/mrhcert/cuup_intfmgrsvc" +"mrhcert/cuup_iwfsvc" = "quay.io/mrhcert/cuup_iwfsvc" +"mrhcert/cuup_srmsvc" = "quay.io/mrhcert/cuup_srmsvc" +"mrhcert/du" = "quay.io/mrhcert/du" +"mrhcert/gnb_mgr" = "quay.io/mrhcert/gnb_mgr" +"mrhcert/ims/mtas" = "quay.io/mrhcert/ims/mtas" +"mrhcert/ims/rediam" = "quay.io/mrhcert/ims/rediam" +"mrhcert/ims/regt" = "quay.io/mrhcert/ims/regt" +"mrhcert/ims/resip" = "quay.io/mrhcert/ims/resip" +"mrhcert/ims/ress7" = "quay.io/mrhcert/ims/ress7" +"mrhcert/ims/sm" = "quay.io/mrhcert/ims/sm" +"mrhcert/ims/vlbfe" = "quay.io/mrhcert/ims/vlbfe" +"mrhcert/init_container_ubi" = "quay.io/mrhcert/init_container_ubi" +"mrhcert/mtcil-22.3.1_p5/cim" = "quay.io/mrhcert/mtcil-22.3.1_p5/cim" +"mrhcert/mtcil-22.3.1_p5/config-service" = "quay.io/mrhcert/mtcil-22.3.1_p5/config-service" +"mrhcert/mtcil-22.3.1_p5/etcd" = "quay.io/mrhcert/mtcil-22.3.1_p5/etcd" +"mrhcert/mtcil-22.3.1_p5/fmaas" = "quay.io/mrhcert/mtcil-22.3.1_p5/fmaas" +"mrhcert/mtcil-22.3.1_p5/kafka" = "quay.io/mrhcert/mtcil-22.3.1_p5/kafka" +"mrhcert/mtcil-22.3.1_p5/mtcil-svc-init" = "quay.io/mrhcert/mtcil-22.3.1_p5/mtcil-svc-init" +"mrhcert/mtcil-22.3.1_p5/tmaas" = "quay.io/mrhcert/mtcil-22.3.1_p5/tmaas" +"mrhcert/mtcil-22.3.1_p5/tpaas" = "quay.io/mrhcert/mtcil-22.3.1_p5/tpaas" +"mrhcert/mtcil-22.3.1_p5/zk" = "quay.io/mrhcert/mtcil-22.3.1_p5/zk" +"mrhcert/nginx-bccsvc" = "quay.io/mrhcert/nginx-bccsvc" +"mrhcert/nginx-dalsvc" = "quay.io/mrhcert/nginx-dalsvc" +"mrhcert/nginx-dprmsvc" = "quay.io/mrhcert/nginx-dprmsvc" +"mrhcert/nginx-du" = "quay.io/mrhcert/nginx-du" +"mrhcert/nginx-gwsvc" = "quay.io/mrhcert/nginx-gwsvc" +"mrhcert/nginx-intfmgrsvc" = "quay.io/mrhcert/nginx-intfmgrsvc" +"mrhcert/nginx-iwfsvc" = "quay.io/mrhcert/nginx-iwfsvc" +"mrhcert/nginx" = "quay.io/mrhcert/nginx" +"mrhcert/nginx-sctp_e1_iwf" = "quay.io/mrhcert/nginx-sctp_e1_iwf" +"mrhcert/nginx-sctp_f1_iwf" = "quay.io/mrhcert/nginx-sctp_f1_iwf" +"mrhcert/nginx-sctp_ng_client_iwf" = "quay.io/mrhcert/nginx-sctp_ng_client_iwf" +"mrhcert/nginx-sctp_xn_iwf" = "quay.io/mrhcert/nginx-sctp_xn_iwf" +"mrhcert/nginx-srmsvc" = "quay.io/mrhcert/nginx-srmsvc" +"mrhcert/nginx-ue_conn_mgr" = "quay.io/mrhcert/nginx-ue_conn_mgr" +"mrhcert/sctp_e1_iwf" = "quay.io/mrhcert/sctp_e1_iwf" +"mrhcert/sctp_f1_iwf" = "quay.io/mrhcert/sctp_f1_iwf" +"mrhcert/sctp_x2_iwf" = "quay.io/mrhcert/sctp_x2_iwf" +"mrhcert/uag/gtre-reugt-r_2_1_14_0-v1" = "quay.io/mrhcert/uag/gtre-reugt-r_2_1_14_0-v1" +"mrhcert/uag/init_container_ubi" = "quay.io/mrhcert/uag/init_container_ubi" +"mrhcert/uag/mp-v-r_1_1_18_0-v1" = "quay.io/mrhcert/uag/mp-v-r_1_1_18_0-v1" +"mrhcert/uag/sc-r_2_1_14_0-v3" = "quay.io/mrhcert/uag/sc-r_2_1_14_0-v3" +"mrhcert/uag/sipre-resip-r_2_1_14_0-v1" = "quay.io/mrhcert/uag/sipre-resip-r_2_1_14_0-v1" +"mrhcert/uag/sm-r_2_0_14_2-v1" = "quay.io/mrhcert/uag/sm-r_2_0_14_2-v1" +"mrhcert/uag/upc-r_2_1_14_0-v1" = "quay.io/mrhcert/uag/upc-r_2_1_14_0-v1" +"mrhcert/uag/vlbfe-v-r_1_0_35_0-v2" = "quay.io/mrhcert/uag/vlbfe-v-r_1_0_35_0-v2" +"mrhcert/ue_conn_mgr" = "quay.io/mrhcert/ue_conn_mgr" +"mssql/rhel/server" = "mcr.microsoft.com/mssql/rhel/server" +"mta/mta-admin-addon-rhel8" = "registry.redhat.io/mta/mta-admin-addon-rhel8" +"mta/mta-analyzer-addon-rhel9" = "registry.redhat.io/mta/mta-analyzer-addon-rhel9" +"mta/mta-analyzer-lsp-rhel9" = "registry.redhat.io/mta/mta-analyzer-lsp-rhel9" +"mta/mta-cli-rhel9" = "registry.redhat.io/mta/mta-cli-rhel9" +"mta/mta-hub-rhel8" = "registry.redhat.io/mta/mta-hub-rhel8" +"mta/mta-hub-rhel9" = "registry.redhat.io/mta/mta-hub-rhel9" +"mta/mta-operator-bundle" = "registry.redhat.io/mta/mta-operator-bundle" +"mta/mta-pathfinder-rhel8" = "registry.redhat.io/mta/mta-pathfinder-rhel8" +"mta/mta-pathfinder-rhel9" = "registry.redhat.io/mta/mta-pathfinder-rhel9" +"mta/mta-rhel8-operator" = "registry.redhat.io/mta/mta-rhel8-operator" +"mta/mta-ui-rhel8" = "registry.redhat.io/mta/mta-ui-rhel8" +"mta/mta-ui-rhel9" = "registry.redhat.io/mta/mta-ui-rhel9" +"mta/mta-windup-addon-rhel8" = "registry.redhat.io/mta/mta-windup-addon-rhel8" +"mta/mta-windup-addon-rhel9" = "registry.redhat.io/mta/mta-windup-addon-rhel9" +"mta/mta-windup-shim-rhel9" = "registry.redhat.io/mta/mta-windup-shim-rhel9" +"mtr/mtr-operator-bundle" = "registry.redhat.io/mtr/mtr-operator-bundle" +"mtr/mtr-rhel8-operator" = "registry.redhat.io/mtr/mtr-rhel8-operator" +"mtr/mtr-web-container-rhel8" = "registry.redhat.io/mtr/mtr-web-container-rhel8" +"mtr/mtr-web-executor-container-rhel8" = "registry.redhat.io/mtr/mtr-web-executor-container-rhel8" +"mulesoft/rtf-agent-ubi" = "rtf-runtime-registry.kprod.msap.io/mulesoft/rtf-agent-ubi" +"multicluster-engine/addon-manager-rhel8" = "registry.redhat.io/multicluster-engine/addon-manager-rhel8" +"multicluster-engine/addon-manager-rhel9" = "registry.redhat.io/multicluster-engine/addon-manager-rhel9" +"multicluster-engine/agent-service-rhel8" = "registry.redhat.io/multicluster-engine/agent-service-rhel8" +"multicluster-engine/apiserver-network-proxy-rhel8" = "registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel8" +"multicluster-engine/apiserver-network-proxy-rhel9" = "registry.redhat.io/multicluster-engine/apiserver-network-proxy-rhel9" +"multicluster-engine/assisted-image-service-rhel8" = "registry.redhat.io/multicluster-engine/assisted-image-service-rhel8" +"multicluster-engine/assisted-installer-agent-rhel8" = "registry.redhat.io/multicluster-engine/assisted-installer-agent-rhel8" +"multicluster-engine/assisted-installer-controller-rhel8" = "registry.redhat.io/multicluster-engine/assisted-installer-controller-rhel8" +"multicluster-engine/assisted-installer-reporter-rhel8" = "registry.redhat.io/multicluster-engine/assisted-installer-reporter-rhel8" +"multicluster-engine/assisted-installer-rhel8" = "registry.redhat.io/multicluster-engine/assisted-installer-rhel8" +"multicluster-engine/assisted-service-8-rhel8" = "registry.redhat.io/multicluster-engine/assisted-service-8-rhel8" +"multicluster-engine/assisted-service-9-rhel9" = "registry.redhat.io/multicluster-engine/assisted-service-9-rhel9" +"multicluster-engine/aws-encryption-provider-rhel8" = "registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel8" +"multicluster-engine/aws-encryption-provider-rhel9" = "registry.redhat.io/multicluster-engine/aws-encryption-provider-rhel9" +"multicluster-engine/backplane-rhel8-operator" = "registry.redhat.io/multicluster-engine/backplane-rhel8-operator" +"multicluster-engine/backplane-rhel9-operator" = "registry.redhat.io/multicluster-engine/backplane-rhel9-operator" +"multicluster-engine/cluster-api-provider-agent-rhel8" = "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel8" +"multicluster-engine/cluster-api-provider-agent-rhel9" = "registry.redhat.io/multicluster-engine/cluster-api-provider-agent-rhel9" +"multicluster-engine/cluster-api-provider-aws-rhel8" = "registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel8" +"multicluster-engine/cluster-api-provider-aws-rhel9" = "registry.redhat.io/multicluster-engine/cluster-api-provider-aws-rhel9" +"multicluster-engine/cluster-api-provider-azure-rhel8" = "registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel8" +"multicluster-engine/cluster-api-provider-azure-rhel9" = "registry.redhat.io/multicluster-engine/cluster-api-provider-azure-rhel9" +"multicluster-engine/cluster-api-provider-kubevirt-rhel8" = "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel8" +"multicluster-engine/cluster-api-provider-kubevirt-rhel9" = "registry.redhat.io/multicluster-engine/cluster-api-provider-kubevirt-rhel9" +"multicluster-engine/cluster-api-rhel8" = "registry.redhat.io/multicluster-engine/cluster-api-rhel8" +"multicluster-engine/cluster-api-rhel9" = "registry.redhat.io/multicluster-engine/cluster-api-rhel9" +"multicluster-engine/clusterclaims-controller-rhel8" = "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel8" +"multicluster-engine/clusterclaims-controller-rhel9" = "registry.redhat.io/multicluster-engine/clusterclaims-controller-rhel9" +"multicluster-engine/cluster-curator-controller-rhel8" = "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel8" +"multicluster-engine/cluster-curator-controller-rhel9" = "registry.redhat.io/multicluster-engine/cluster-curator-controller-rhel9" +"multicluster-engine/cluster-image-set-controller-rhel8" = "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel8" +"multicluster-engine/cluster-image-set-controller-rhel9" = "registry.redhat.io/multicluster-engine/cluster-image-set-controller-rhel9" +"multicluster-engine/clusterlifecycle-state-metrics-rhel8" = "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel8" +"multicluster-engine/clusterlifecycle-state-metrics-rhel9" = "registry.redhat.io/multicluster-engine/clusterlifecycle-state-metrics-rhel9" +"multicluster-engine/cluster-proxy-addon-rhel8" = "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel8" +"multicluster-engine/cluster-proxy-addon-rhel9" = "registry.redhat.io/multicluster-engine/cluster-proxy-addon-rhel9" +"multicluster-engine/cluster-proxy-rhel8" = "registry.redhat.io/multicluster-engine/cluster-proxy-rhel8" +"multicluster-engine/cluster-proxy-rhel9" = "registry.redhat.io/multicluster-engine/cluster-proxy-rhel9" +"multicluster-engine/console-mce-rhel8" = "registry.redhat.io/multicluster-engine/console-mce-rhel8" +"multicluster-engine/console-mce-rhel9" = "registry.redhat.io/multicluster-engine/console-mce-rhel9" +"multicluster-engine/discovery-rhel8" = "registry.redhat.io/multicluster-engine/discovery-rhel8" +"multicluster-engine/discovery-rhel9" = "registry.redhat.io/multicluster-engine/discovery-rhel9" +"multicluster-engine/hive-rhel8" = "registry.redhat.io/multicluster-engine/hive-rhel8" +"multicluster-engine/hive-rhel9" = "registry.redhat.io/multicluster-engine/hive-rhel9" +"multicluster-engine/hypershift-addon-rhel8-operator" = "registry.redhat.io/multicluster-engine/hypershift-addon-rhel8-operator" +"multicluster-engine/hypershift-addon-rhel9-operator" = "registry.redhat.io/multicluster-engine/hypershift-addon-rhel9-operator" +"multicluster-engine/hypershift-cli-rhel8" = "registry.redhat.io/multicluster-engine/hypershift-cli-rhel8" +"multicluster-engine/hypershift-cli-rhel9" = "registry.redhat.io/multicluster-engine/hypershift-cli-rhel9" +"multicluster-engine/hypershift-deployment-controller-rhel8" = "registry.redhat.io/multicluster-engine/hypershift-deployment-controller-rhel8" +"multicluster-engine/hypershift-rhel8-operator" = "registry.redhat.io/multicluster-engine/hypershift-rhel8-operator" +"multicluster-engine/hypershift-rhel9-operator" = "registry.redhat.io/multicluster-engine/hypershift-rhel9-operator" +"multicluster-engine/image-based-install-rhel9" = "registry.redhat.io/multicluster-engine/image-based-install-rhel9" +"multicluster-engine/klusterlet-operator-bundle" = "registry.redhat.io/multicluster-engine/klusterlet-operator-bundle" +"multicluster-engine/kube-rbac-proxy-mce-rhel8" = "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel8" +"multicluster-engine/kube-rbac-proxy-mce-rhel9" = "registry.redhat.io/multicluster-engine/kube-rbac-proxy-mce-rhel9" +"multicluster-engine/managedcluster-import-controller-rhel8" = "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel8" +"multicluster-engine/managedcluster-import-controller-rhel9" = "registry.redhat.io/multicluster-engine/managedcluster-import-controller-rhel9" +"multicluster-engine/managed-serviceaccount-rhel8" = "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel8" +"multicluster-engine/managed-serviceaccount-rhel9" = "registry.redhat.io/multicluster-engine/managed-serviceaccount-rhel9" +"multicluster-engine/mce-operator-bundle" = "registry.redhat.io/multicluster-engine/mce-operator-bundle" +"multicluster-engine/multicloud-manager-rhel8" = "registry.redhat.io/multicluster-engine/multicloud-manager-rhel8" +"multicluster-engine/multicloud-manager-rhel9" = "registry.redhat.io/multicluster-engine/multicloud-manager-rhel9" +"multicluster-engine/must-gather-rhel8" = "registry.redhat.io/multicluster-engine/must-gather-rhel8" +"multicluster-engine/must-gather-rhel9" = "registry.redhat.io/multicluster-engine/must-gather-rhel9" +"multicluster-engine/placement-rhel8" = "registry.redhat.io/multicluster-engine/placement-rhel8" +"multicluster-engine/placement-rhel9" = "registry.redhat.io/multicluster-engine/placement-rhel9" +"multicluster-engine/provider-credential-controller-rhel8" = "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel8" +"multicluster-engine/provider-credential-controller-rhel9" = "registry.redhat.io/multicluster-engine/provider-credential-controller-rhel9" +"multicluster-engine/registration-operator-rhel8" = "registry.redhat.io/multicluster-engine/registration-operator-rhel8" +"multicluster-engine/registration-operator-rhel9" = "registry.redhat.io/multicluster-engine/registration-operator-rhel9" +"multicluster-engine/registration-rhel8" = "registry.redhat.io/multicluster-engine/registration-rhel8" +"multicluster-engine/registration-rhel9" = "registry.redhat.io/multicluster-engine/registration-rhel9" +"multicluster-engine/work-rhel8" = "registry.redhat.io/multicluster-engine/work-rhel8" +"multicluster-engine/work-rhel9" = "registry.redhat.io/multicluster-engine/work-rhel9" +"multicluster-globalhub/multicluster-globalhub-agent-rhel8" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel8" +"multicluster-globalhub/multicluster-globalhub-agent-rhel9" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-agent-rhel9" +"multicluster-globalhub/multicluster-globalhub-grafana-rhel8" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel8" +"multicluster-globalhub/multicluster-globalhub-grafana-rhel9" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-grafana-rhel9" +"multicluster-globalhub/multicluster-globalhub-manager-rhel8" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel8" +"multicluster-globalhub/multicluster-globalhub-manager-rhel9" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-manager-rhel9" +"multicluster-globalhub/multicluster-globalhub-operator-bundle" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-operator-bundle" +"multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-postgres-exporter-rhel9" +"multicluster-globalhub/multicluster-globalhub-rhel8-operator" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel8-operator" +"multicluster-globalhub/multicluster-globalhub-rhel9-operator" = "registry.redhat.io/multicluster-globalhub/multicluster-globalhub-rhel9-operator" +"munahaf/icr-java-ubi8" = "docker.io/munahaf/icr-java-ubi8" +"nastel/nastel-activemq" = "registry.connect.redhat.com/nastel/nastel-activemq" +"nastel/nastel-ap-domain" = "registry.connect.redhat.com/nastel/nastel-ap-domain" +"nastel/nastel-domain" = "registry.connect.redhat.com/nastel/nastel-domain" +"nastel/nastel-kafka" = "registry.connect.redhat.com/nastel/nastel-kafka" +"nastel/nastel-solr" = "registry.connect.redhat.com/nastel/nastel-solr" +"nastel/nastel-storm" = "registry.connect.redhat.com/nastel/nastel-storm" +"nastel/nastel-zookeeper" = "registry.connect.redhat.com/nastel/nastel-zookeeper" +"nastel/navigator-cm" = "registry.connect.redhat.com/nastel/navigator-cm" +"nastel/navigator-operator-bundle" = "registry.connect.redhat.com/nastel/navigator-operator-bundle" +"nastel/navigator-operator" = "registry.connect.redhat.com/nastel/navigator-operator" +"nastel/navigator-ui" = "registry.connect.redhat.com/nastel/navigator-ui" +"nastel/navigator-wgs" = "registry.connect.redhat.com/nastel/navigator-wgs" +"nastel/xray-cep" = "registry.connect.redhat.com/nastel/xray-cep" +"nastel/xray-dbapi-solr" = "registry.connect.redhat.com/nastel/xray-dbapi-solr" +"nastel/xray-ml" = "registry.connect.redhat.com/nastel/xray-ml" +"nastel/xray-operator-bundle" = "registry.connect.redhat.com/nastel/xray-operator-bundle" +"nastel/xray-operator" = "registry.connect.redhat.com/nastel/xray-operator" +"nastel/xray-storm" = "registry.connect.redhat.com/nastel/xray-storm" +"nastel/xray-ui" = "registry.connect.redhat.com/nastel/xray-ui" +"navops-command/web-ui-v13" = "registry.connect.redhat.com/navops-command/web-ui-v13" +"nbde-tang-server/tang-operator-bundle" = "registry.redhat.io/nbde-tang-server/tang-operator-bundle" +"nbde-tang-server/tang-rhel9-operator" = "registry.redhat.io/nbde-tang-server/tang-rhel9-operator" +"nearbyone/api-gateway" = "registry.nearbycomputing.com/nearbyone/api-gateway" +"nearbyone/cert-watcher" = "registry.nearbycomputing.com/nearbyone/cert-watcher" +"nearbyone/conn-artist" = "registry.nearbycomputing.com/nearbyone/conn-artist" +"nearbyone/db-init" = "registry.nearbycomputing.com/nearbyone/db-init" +"nearbyone/device-manager" = "registry.nearbycomputing.com/nearbyone/device-manager" +"nearbyone/external/etcd-io/etcd" = "registry.nearbycomputing.com/nearbyone/external/etcd-io/etcd" +"nearbyone/external/oryd/hydra" = "registry.nearbycomputing.com/nearbyone/external/oryd/hydra" +"nearbyone/external/oryd/keto" = "registry.nearbycomputing.com/nearbyone/external/oryd/keto" +"nearbyone/external/oryd/kratos" = "registry.nearbycomputing.com/nearbyone/external/oryd/kratos" +"nearbyone/external/oryd/oathkeeper" = "registry.nearbycomputing.com/nearbyone/external/oryd/oathkeeper" +"nearbyone/invite-user" = "registry.nearbycomputing.com/nearbyone/invite-user" +"nearbyone/kubectl" = "registry.nearbycomputing.com/nearbyone/kubectl" +"nearbyone/mark-hydration" = "registry.nearbycomputing.com/nearbyone/mark-hydration" +"nearbyone/okto-apiserver" = "registry.nearbycomputing.com/nearbyone/okto-apiserver" +"nearbyone/okto-controllermanager" = "registry.nearbycomputing.com/nearbyone/okto-controllermanager" +"nearbyone/okto-eventlogger" = "registry.nearbycomputing.com/nearbyone/okto-eventlogger" +"nearbyone/sally-upload" = "registry.nearbycomputing.com/nearbyone/sally-upload" +"nearbyone/service-manager" = "registry.nearbycomputing.com/nearbyone/service-manager" +"nearbyone/settings" = "registry.nearbycomputing.com/nearbyone/settings" +"nearbyone/user-buster" = "registry.nearbycomputing.com/nearbyone/user-buster" +"nearbyone/web" = "registry.nearbycomputing.com/nearbyone/web" +"nearbyone/wget" = "registry.nearbycomputing.com/nearbyone/wget" +"nearform/nearform-s2i-nodejs10" = "registry.connect.redhat.com/nearform/nearform-s2i-nodejs10" +"nearform/nearform-s2i-nodejs11" = "registry.connect.redhat.com/nearform/nearform-s2i-nodejs11" +"nearform/nearform-s2i-nodejs8" = "registry.connect.redhat.com/nearform/nearform-s2i-nodejs8" +"nebulon/csi-driver" = "quay.io/nebulon/csi-driver" +"nec/exastro-it-automation" = "registry.connect.redhat.com/nec/exastro-it-automation" +"nec/nspc-csi-driver" = "registry.connect.redhat.com/nec/nspc-csi-driver" +"nec/nspc-operator-bundle" = "registry.connect.redhat.com/nec/nspc-operator-bundle" +"nec/nspc-operator" = "registry.connect.redhat.com/nec/nspc-operator" +"nec/sanstoragecsi-operator-bundle" = "registry.connect.redhat.com/nec/sanstoragecsi-operator-bundle" +"nec/sanstoragecsi-operator" = "registry.connect.redhat.com/nec/sanstoragecsi-operator" +"nec/webotx-express" = "registry.connect.redhat.com/nec/webotx-express" +"nec/webotx-operator-bundle" = "registry.connect.redhat.com/nec/webotx-operator-bundle" +"nec/webotx-operator" = "registry.connect.redhat.com/nec/webotx-operator" +"nepravee/cmm-aimcpps" = "quay.io/nepravee/cmm-aimcpps" +"nepravee/cmm-aimctcs" = "quay.io/nepravee/cmm-aimctcs" +"nepravee/cmm-aimdbs" = "quay.io/nepravee/cmm-aimdbs" +"nepravee/cmm-aimeems" = "quay.io/nepravee/cmm-aimeems" +"nepravee/cmm-aimfds" = "quay.io/nepravee/cmm-aimfds" +"nepravee/cmm-aimipds" = "quay.io/nepravee/cmm-aimipds" +"nepravee/cmm-aimipps" = "quay.io/nepravee/cmm-aimipps" +"nepravee/cmm-aimlihs" = "quay.io/nepravee/cmm-aimlihs" +"nepravee/cmm-aimmlis" = "quay.io/nepravee/cmm-aimmlis" +"nepravee/cmm-aimnwds" = "quay.io/nepravee/cmm-aimnwds" +"nepravee/cmm-aimpaps" = "quay.io/nepravee/cmm-aimpaps" +"nepravee/cmm-aimpcms" = "quay.io/nepravee/cmm-aimpcms" +"nepravee/cmm-aimrcis" = "quay.io/nepravee/cmm-aimrcis" +"nepravee/cmm-aimucds" = "quay.io/nepravee/cmm-aimucds" +"nepravee/cmm-alms" = "quay.io/nepravee/cmm-alms" +"nepravee/cmm-init" = "quay.io/nepravee/cmm-init" +"nepravee/cmm-necc" = "quay.io/nepravee/cmm-necc" +"nepravee/cmm-operator" = "quay.io/nepravee/cmm-operator" +"netapp/acc-operator-21-12-59" = "registry.connect.redhat.com/netapp/acc-operator-21-12-59" +"netapp/acc-operator-22-03-29" = "registry.connect.redhat.com/netapp/acc-operator-22-03-29" +"netapp/acc-operator-22-8-0" = "registry.connect.redhat.com/netapp/acc-operator-22-8-0" +"netapp/acc-operator-bundle" = "registry.connect.redhat.com/netapp/acc-operator-bundle" +"netapp/ads-operator-bundle" = "registry.connect.redhat.com/netapp/ads-operator-bundle" +"netapp/netapp-supported-apache-spark-on-openshift-operator" = "registry.connect.redhat.com/netapp/netapp-supported-apache-spark-on-openshift-operator" +"network-observability/network-observability-cli-rhel9" = "registry.redhat.io/network-observability/network-observability-cli-rhel9" +"network-observability/network-observability-console-plugin-rhel9" = "registry.redhat.io/network-observability/network-observability-console-plugin-rhel9" +"network-observability/network-observability-ebpf-agent-rhel9" = "registry.redhat.io/network-observability/network-observability-ebpf-agent-rhel9" +"network-observability/network-observability-flowlogs-pipeline-rhel9" = "registry.redhat.io/network-observability/network-observability-flowlogs-pipeline-rhel9" +"network-observability/network-observability-operator-bundle" = "registry.redhat.io/network-observability/network-observability-operator-bundle" +"network-observability/network-observability-rhel9-operator" = "registry.redhat.io/network-observability/network-observability-rhel9-operator" +"neuvector/allinone" = "registry.connect.redhat.com/neuvector/allinone" +"neuvector/controller" = "registry.connect.redhat.com/neuvector/controller" +"neuvector/enforcer" = "registry.connect.redhat.com/neuvector/enforcer" +"neuvector/manager" = "registry.connect.redhat.com/neuvector/manager" +"neuvector/neuvector-operator-bundle-marketplace" = "registry.connect.redhat.com/neuvector/neuvector-operator-bundle-marketplace" +"neuvector/neuvector-operator-bundle" = "registry.connect.redhat.com/neuvector/neuvector-operator-bundle" +"neuvector/neuvector-operator" = "registry.connect.redhat.com/neuvector/neuvector-operator" +"neuvector/scanner" = "registry.connect.redhat.com/neuvector/scanner" +"newrelic-openshift/java-agent" = "registry.connect.redhat.com/newrelic-openshift/java-agent" +"newrelic-openshift/newrelic-infra-agent" = "registry.connect.redhat.com/newrelic-openshift/newrelic-infra-agent" +"newrelic-openshift/newrelic-infrastructure-k8s-1" = "registry.connect.redhat.com/newrelic-openshift/newrelic-infrastructure-k8s-1" +"newrelic-openshift/newrelic-python-agent" = "registry.connect.redhat.com/newrelic-openshift/newrelic-python-agent" +"nexenta/rhosp13-openstack-cinder-volume-nexenta" = "registry.connect.redhat.com/nexenta/rhosp13-openstack-cinder-volume-nexenta" +"nextlabs/controlcenter" = "registry.connect.redhat.com/nextlabs/controlcenter" +"nextlabs/pc" = "registry.connect.redhat.com/nextlabs/pc" +"nfv-ri/images/apiserver-ubi8" = "europe-docker.pkg.dev/nfv-ri/images/apiserver-ubi8" +"nfv-ri/images/apiserver-ubi" = "europe-docker.pkg.dev/nfv-ri/images/apiserver-ubi" +"nfv-ri/images/dashboard-ubi8" = "europe-docker.pkg.dev/nfv-ri/images/dashboard-ubi8" +"nfv-ri/images/dashboard-ubi" = "europe-docker.pkg.dev/nfv-ri/images/dashboard-ubi" +"nfv-ri/images/dc-agent-rhel8" = "europe-docker.pkg.dev/nfv-ri/images/dc-agent-rhel8" +"nfv-ri/images/dc-agent-rhel" = "europe-docker.pkg.dev/nfv-ri/images/dc-agent-rhel" +"nfv-ri/images/orchestrator-rhel8" = "europe-docker.pkg.dev/nfv-ri/images/orchestrator-rhel8" +"nfv-ri/images/orchestrator-rhel" = "europe-docker.pkg.dev/nfv-ri/images/orchestrator-rhel" +"nginx/nginx-ingress-operator-bundle" = "registry.connect.redhat.com/nginx/nginx-ingress-operator-bundle" +"nginx/nginx-ingress-operator" = "quay.io/nginx/nginx-ingress-operator" +"nginx/nginx-ingress" = "quay.io/nginx/nginx-ingress" +"nirmata/enterprise-kyverno" = "registry.connect.redhat.com/nirmata/enterprise-kyverno" +"nirmata/enterprise-kyverno-rhmp" = "registry.connect.redhat.com/nirmata/enterprise-kyverno-rhmp" +"nirmata/kyvernopre" = "registry.connect.redhat.com/nirmata/kyvernopre" +"nirmata/kyverno" = "registry.connect.redhat.com/nirmata/kyverno" +"nodesource/nsolid-console-rhel7-latest" = "registry.connect.redhat.com/nodesource/nsolid-console-rhel7-latest" +"nodesource/nsolid-rhel7-latest" = "registry.connect.redhat.com/nodesource/nsolid-rhel7-latest" +"noiro/acc-provision-operator" = "quay.io/noiro/acc-provision-operator" +"noiro/aci-containers-controller" = "quay.io/noiro/aci-containers-controller" +"noiro/aci-containers-host" = "quay.io/noiro/aci-containers-host" +"noiro/aci-containers-operator" = "quay.io/noiro/aci-containers-operator" +"noiro/cnideploy" = "quay.io/noiro/cnideploy" +"noiro/openstack-ciscoaci-aim" = "registry.connect.redhat.com/noiro/openstack-ciscoaci-aim" +"noiro/openstack-ciscoaci-lldp" = "registry.connect.redhat.com/noiro/openstack-ciscoaci-lldp" +"noiro/openstack-ciscoaci-neutron-opflex" = "registry.connect.redhat.com/noiro/openstack-ciscoaci-neutron-opflex" +"noiro/openstack-ciscoaci-opflex" = "registry.connect.redhat.com/noiro/openstack-ciscoaci-opflex" +"noiro/openstack-heat-engine-ciscoaci" = "registry.connect.redhat.com/noiro/openstack-heat-engine-ciscoaci" +"noiro/openstack-horizon-ciscoaci" = "registry.connect.redhat.com/noiro/openstack-horizon-ciscoaci" +"noiro/openstack-neutron-server-ciscoaci" = "registry.connect.redhat.com/noiro/openstack-neutron-server-ciscoaci" +"noiro/openvswitch" = "quay.io/noiro/openvswitch" +"noiro/opflex" = "quay.io/noiro/opflex" +"nokia-ni/fss-fsc-cert" = "quay.io/nokia-ni/fss-fsc-cert" +"nokia-ni/fss-fsc-cni" = "quay.io/nokia-ni/fss-fsc-cni" +"nokia-ni/fss-fsc-manager" = "quay.io/nokia-ni/fss-fsc-manager" +"notes-service" = "bds-docker-release.jfrog.io/notes-service" +"novisystems/fusionanalytics-operator" = "registry.connect.redhat.com/novisystems/fusionanalytics-operator" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-10" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-17" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-19" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-3" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-5" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-7" +"nuagenetworks/rhosp13-openstack-heat-api-6-0-9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-6-0-9" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-10" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-17" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-19" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-3" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-5" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-7" +"nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-api-cfn-6-0-9" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-10" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-17" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-19" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-3" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-5" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-7" +"nuagenetworks/rhosp13-openstack-heat-engine-6-0-9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-heat-engine-6-0-9" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-horizon-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-horizon-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-10" +"nuagenetworks/rhosp13-openstack-horizon-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-17" +"nuagenetworks/rhosp13-openstack-horizon-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-19" +"nuagenetworks/rhosp13-openstack-horizon-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-3" +"nuagenetworks/rhosp13-openstack-horizon-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-5" +"nuagenetworks/rhosp13-openstack-horizon-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-7" +"nuagenetworks/rhosp13-openstack-horizon-6-0-9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-horizon-6-0-9" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-10" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-17" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-19" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-3" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-5" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-7" +"nuagenetworks/rhosp13-openstack-neutron-server-6-0-9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-neutron-server-6-0-9" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u16" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u16" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u17" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u3" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u4" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u4" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u5" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u6" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u6" +"nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u9" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-5-4-1-u9" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-10" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-10" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-17" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-17" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-19" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-19" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-3" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-3" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-5" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-5" +"nuagenetworks/rhosp13-openstack-nova-compute-6-0-7" = "registry.connect.redhat.com/nuagenetworks/rhosp13-openstack-nova-compute-6-0-7" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-1" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-2" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-3" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-6" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-7" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-9" +"nuagenetworks/rhosp16-openstack-heat-api-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-10-latest" +"nuagenetworks/rhosp16-openstack-heat-api-20-5-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-5-2" +"nuagenetworks/rhosp16-openstack-heat-api-20-5-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-20-5-3" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-1" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-2" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-3" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-5" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-6" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-7" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-9" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-10-latest" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-5-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-5-2" +"nuagenetworks/rhosp16-openstack-heat-api-cfn-20-5-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-api-cfn-20-5-3" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-1" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-2" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-3" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-5" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-6" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-7" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-9" +"nuagenetworks/rhosp16-openstack-heat-engine-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-10-latest" +"nuagenetworks/rhosp16-openstack-heat-engine-20-5-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-5-2" +"nuagenetworks/rhosp16-openstack-heat-engine-20-5-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-heat-engine-20-5-3" +"nuagenetworks/rhosp16-openstack-horizon-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-1" +"nuagenetworks/rhosp16-openstack-horizon-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-2" +"nuagenetworks/rhosp16-openstack-horizon-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-3" +"nuagenetworks/rhosp16-openstack-horizon-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-5" +"nuagenetworks/rhosp16-openstack-horizon-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-6" +"nuagenetworks/rhosp16-openstack-horizon-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-7" +"nuagenetworks/rhosp16-openstack-horizon-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-9" +"nuagenetworks/rhosp16-openstack-horizon-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-10-latest" +"nuagenetworks/rhosp16-openstack-horizon-20-5-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-5-2" +"nuagenetworks/rhosp16-openstack-horizon-20-5-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-5-3" +"nuagenetworks/rhosp16-openstack-horizon-20-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-horizon-20-latest" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-1" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-2" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-3" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-5" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-6" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-7" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-9" +"nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-openvswitch-agent-20-10-latest" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-1" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-2" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-3" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-5" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-6" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-7" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-9" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-9" +"nuagenetworks/rhosp16-openstack-neutron-server-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-10-latest" +"nuagenetworks/rhosp16-openstack-neutron-server-20-5-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-5-2" +"nuagenetworks/rhosp16-openstack-neutron-server-20-5-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-neutron-server-20-5-3" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-1" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-1" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-2" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-2" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-3" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-3" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-5" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-5" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-6" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-6" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-7" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-7" +"nuagenetworks/rhosp16-openstack-nova-compute-20-10-latest" = "registry.connect.redhat.com/nuagenetworks/rhosp16-openstack-nova-compute-20-10-latest" +"nutanix/ntnx-csi-os" = "registry.connect.redhat.com/nutanix/ntnx-csi-os" +"nutanix/nutanix-csi-operator-bundle" = "registry.connect.redhat.com/nutanix/nutanix-csi-operator-bundle" +"nutanix/nutanix-csi-operator" = "registry.connect.redhat.com/nutanix/nutanix-csi-operator" +"nuxeo/nuxeo" = "registry.connect.redhat.com/nuxeo/nuxeo" +"nvidia/cloud-native/gpu-operator-validator" = "nvcr.io/nvidia/cloud-native/gpu-operator-validator" +"nvidia/container-toolkit" = "docker.io/nvidia/container-toolkit" +"nvidia/dcgm-exporter" = "docker.io/nvidia/dcgm-exporter" +"nvidia/driver" = "docker.io/nvidia/driver" +"nvidia/gpu-feature-discovery" = "nvcr.io/nvidia/gpu-feature-discovery" +"nvidia/gpu-operator-bundle" = "registry.connect.redhat.com/nvidia/gpu-operator-bundle" +"nvidia/gpu-operator" = "nvcr.io/nvidia/gpu-operator" +"nvidia/k8s-device-plugin" = "docker.io/nvidia/k8s-device-plugin" +"nvidia-network-operator/nvidia-network-operator" = "registry.connect.redhat.com/nvidia-network-operator/nvidia-network-operator" +"nvidia/samples" = "docker.io/nvidia/samples" +"nvmesh-management" = "registry.excelero.com/nvmesh-management" +"oadp/oadp-kubevirt-velero-plugin-rhel8" = "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8" +"oadp/oadp-kubevirt-velero-plugin-rhel9" = "registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel9" +"oadp/oadp-mustgather-rhel8" = "registry.redhat.io/oadp/oadp-mustgather-rhel8" +"oadp/oadp-mustgather-rhel9" = "registry.redhat.io/oadp/oadp-mustgather-rhel9" +"oadp/oadp-operator-bundle" = "registry.redhat.io/oadp/oadp-operator-bundle" +"oadp/oadp-registry-rhel8" = "registry.redhat.io/oadp/oadp-registry-rhel8" +"oadp/oadp-rhel8-operator" = "registry.redhat.io/oadp/oadp-rhel8-operator" +"oadp/oadp-rhel9-operator" = "registry.redhat.io/oadp/oadp-rhel9-operator" +"oadp/oadp-velero-plugin-for-aws-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8" +"oadp/oadp-velero-plugin-for-aws-rhel9" = "registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel9" +"oadp/oadp-velero-plugin-for-csi-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8" +"oadp/oadp-velero-plugin-for-csi-rhel9" = "registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel9" +"oadp/oadp-velero-plugin-for-gcp-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8" +"oadp/oadp-velero-plugin-for-gcp-rhel9" = "registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel9" +"oadp/oadp-velero-plugin-for-microsoft-azure-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8" +"oadp/oadp-velero-plugin-for-microsoft-azure-rhel9" = "registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel9" +"oadp/oadp-velero-plugin-for-vsm-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-for-vsm-rhel8" +"oadp/oadp-velero-plugin-rhel8" = "registry.redhat.io/oadp/oadp-velero-plugin-rhel8" +"oadp/oadp-velero-plugin-rhel9" = "registry.redhat.io/oadp/oadp-velero-plugin-rhel9" +"oadp/oadp-velero-restic-restore-helper-rhel8" = "registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8" +"oadp/oadp-velero-restic-restore-helper-rhel9" = "registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel9" +"oadp/oadp-velero-rhel8" = "registry.redhat.io/oadp/oadp-velero-rhel8" +"oadp/oadp-velero-rhel9" = "registry.redhat.io/oadp/oadp-velero-rhel9" +"oadp/oadp-volume-snapshot-mover-rhel8" = "registry.redhat.io/oadp/oadp-volume-snapshot-mover-rhel8" +"obs/hdm/db2u/db2u.auxiliary.auth" = "icr.io/obs/hdm/db2u/db2u.auxiliary.auth" +"obs/hdm/db2u/db2u.graph" = "icr.io/obs/hdm/db2u/db2u.graph" +"obs/hdm/db2u/db2u" = "icr.io/obs/hdm/db2u/db2u" +"obs/hdm/db2u/db2u.instdb" = "icr.io/obs/hdm/db2u/db2u.instdb" +"obs/hdm/db2u/db2u.rest" = "icr.io/obs/hdm/db2u/db2u.rest" +"obs/hdm/db2u/db2u.tools" = "icr.io/obs/hdm/db2u/db2u.tools" +"obs/hdm/db2u-operator" = "icr.io/obs/hdm/db2u-operator" +"oceanbasedev/oceanbase" = "quay.io/oceanbasedev/oceanbase" +"ocm-cli-clients/ocm-cli-rhel9" = "registry.redhat.io/ocm-cli-clients/ocm-cli-rhel9" +"ocp-tools-4/jenkins-agent-base-rhel8" = "registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8" +"ocp-tools-4/jenkins-rhel8" = "registry.redhat.io/ocp-tools-4/jenkins-rhel8" +"ocp-tools-4/odo-init-container-rhel8" = "registry.access.redhat.com/ocp-tools-4/odo-init-container-rhel8" +"octarinesec/idcontroller" = "registry.connect.redhat.com/octarinesec/idcontroller" +"odf4/cephcsi-rhel8" = "registry.redhat.io/odf4/cephcsi-rhel8" +"odf4/cephcsi-rhel9" = "registry.redhat.io/odf4/cephcsi-rhel9" +"odf4/mcg-cli-rhel9" = "registry.redhat.io/odf4/mcg-cli-rhel9" +"odf4/mcg-core-rhel8" = "registry.redhat.io/odf4/mcg-core-rhel8" +"odf4/mcg-core-rhel9" = "registry.redhat.io/odf4/mcg-core-rhel9" +"odf4/mcg-operator-bundle" = "registry.redhat.io/odf4/mcg-operator-bundle" +"odf4/mcg-rhel8-operator" = "registry.redhat.io/odf4/mcg-rhel8-operator" +"odf4/mcg-rhel9-operator" = "registry.redhat.io/odf4/mcg-rhel9-operator" +"odf4/ocs-client-console-rhel9" = "registry.redhat.io/odf4/ocs-client-console-rhel9" +"odf4/ocs-client-operator-bundle" = "registry.redhat.io/odf4/ocs-client-operator-bundle" +"odf4/ocs-client-rhel8-operator" = "registry.redhat.io/odf4/ocs-client-rhel8-operator" +"odf4/ocs-client-rhel9-operator" = "registry.redhat.io/odf4/ocs-client-rhel9-operator" +"odf4/ocs-metrics-exporter-rhel8" = "registry.redhat.io/odf4/ocs-metrics-exporter-rhel8" +"odf4/ocs-metrics-exporter-rhel9" = "registry.redhat.io/odf4/ocs-metrics-exporter-rhel9" +"odf4/ocs-must-gather-rhel8" = "registry.redhat.io/odf4/ocs-must-gather-rhel8" +"odf4/ocs-operator-bundle" = "registry.redhat.io/odf4/ocs-operator-bundle" +"odf4/ocs-rhel8-operator" = "registry.redhat.io/odf4/ocs-rhel8-operator" +"odf4/ocs-rhel9-operator" = "registry.redhat.io/odf4/ocs-rhel9-operator" +"odf4/odf-cli-rhel9" = "registry.redhat.io/odf4/odf-cli-rhel9" +"odf4/odf-console-rhel8" = "registry.redhat.io/odf4/odf-console-rhel8" +"odf4/odf-console-rhel9" = "registry.redhat.io/odf4/odf-console-rhel9" +"odf4/odf-cosi-sidecar-rhel9" = "registry.redhat.io/odf4/odf-cosi-sidecar-rhel9" +"odf4/odf-csi-addons-rhel8-operator" = "registry.redhat.io/odf4/odf-csi-addons-rhel8-operator" +"odf4/odf-csi-addons-rhel9-operator" = "registry.redhat.io/odf4/odf-csi-addons-rhel9-operator" +"odf4/odf-csi-addons-sidecar-rhel8" = "registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8" +"odf4/odf-csi-addons-sidecar-rhel9" = "registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9" +"odf4/odf-multicluster-console-rhel8" = "registry.redhat.io/odf4/odf-multicluster-console-rhel8" +"odf4/odf-multicluster-console-rhel9" = "registry.redhat.io/odf4/odf-multicluster-console-rhel9" +"odf4/odf-multicluster-operator-bundle" = "registry.redhat.io/odf4/odf-multicluster-operator-bundle" +"odf4/odf-multicluster-rhel8-operator" = "registry.redhat.io/odf4/odf-multicluster-rhel8-operator" +"odf4/odf-multicluster-rhel9-operator" = "registry.redhat.io/odf4/odf-multicluster-rhel9-operator" +"odf4/odf-must-gather-rhel9" = "registry.redhat.io/odf4/odf-must-gather-rhel9" +"odf4/odf-operator-bundle" = "registry.redhat.io/odf4/odf-operator-bundle" +"odf4/odf-prometheus-operator-bundle" = "registry.redhat.io/odf4/odf-prometheus-operator-bundle" +"odf4/odf-rhel8-operator" = "registry.redhat.io/odf4/odf-rhel8-operator" +"odf4/odf-rhel9-operator" = "registry.redhat.io/odf4/odf-rhel9-operator" +"odf4/odr-cluster-operator-bundle" = "registry.redhat.io/odf4/odr-cluster-operator-bundle" +"odf4/odr-hub-operator-bundle" = "registry.redhat.io/odf4/odr-hub-operator-bundle" +"odf4/odr-recipe-operator-bundle" = "registry.redhat.io/odf4/odr-recipe-operator-bundle" +"odf4/odr-rhel8-operator" = "registry.redhat.io/odf4/odr-rhel8-operator" +"odf4/odr-rhel9-operator" = "registry.redhat.io/odf4/odr-rhel9-operator" +"odf4/rook-ceph-operator-bundle" = "registry.redhat.io/odf4/rook-ceph-operator-bundle" +"odf4/rook-ceph-rhel8-operator" = "registry.redhat.io/odf4/rook-ceph-rhel8-operator" +"odf4/rook-ceph-rhel9-operator" = "registry.redhat.io/odf4/rook-ceph-rhel9-operator" +"odf4/volume-replication-rhel8-operator" = "registry.redhat.io/odf4/volume-replication-rhel8-operator" +"od/ibm-integration-operations-dashboard-operator" = "icr.com/od/ibm-integration-operations-dashboard-operator" +"od/icp4i-od-agent" = "icr.com/od/icp4i-od-agent" +"od/icp4i-od-api-proxy" = "icr.com/od/icp4i-od-api-proxy" +"od/icp4i-od-collector" = "icr.com/od/icp4i-od-collector" +"od/icp4i-od-config-db" = "icr.com/od/icp4i-od-config-db" +"od/icp4i-od-housekeeping" = "icr.com/od/icp4i-od-housekeeping" +"od/icp4i-od-install-assist" = "icr.com/od/icp4i-od-install-assist" +"od/icp4i-od-legacy-ui" = "icr.com/od/icp4i-od-legacy-ui" +"od/icp4i-od-oidc-configurator" = "icr.com/od/icp4i-od-oidc-configurator" +"od/icp4i-od-registration-endpoint" = "icr.com/od/icp4i-od-registration-endpoint" +"od/icp4i-od-registration-processor" = "icr.com/od/icp4i-od-registration-processor" +"od/icp4i-od-reports" = "icr.com/od/icp4i-od-reports" +"od/icp4i-od-store" = "icr.com/od/icp4i-od-store" +"od/icp4i-od-store-retention" = "icr.com/od/icp4i-od-store-retention" +"od/icp4i-od-ui-manager" = "icr.com/od/icp4i-od-ui-manager" +"od/icp4i-od-ui-proxy" = "icr.com/od/icp4i-od-ui-proxy" +"odinecnf/odinepathfinder/odinepathfinder" = "ghcr.io/odinecnf/odinepathfinder/odinepathfinder" +"ogaye/ogaye-operator-bundle" = "registry.connect.redhat.com/ogaye/ogaye-operator-bundle" +"ogaye/ogaye" = "registry.connect.redhat.com/ogaye/ogaye" +"ongresinc/stackgres/stackgres/admin-ui" = "registry.gitlab.com/ongresinc/stackgres/stackgres/admin-ui" +"ongresinc/stackgres/stackgres/jobs" = "registry.gitlab.com/ongresinc/stackgres/stackgres/jobs" +"ongresinc/stackgres/stackgres/operator" = "registry.gitlab.com/ongresinc/stackgres/stackgres/operator" +"ongresinc/stackgres/stackgres/restapi" = "registry.gitlab.com/ongresinc/stackgres/stackgres/restapi" +"ongres/kubectl" = "docker.io/ongres/kubectl" +"ongres/stackgres-1" = "registry.connect.redhat.com/ongres/stackgres-1" +"ongres/stackgres-certified-1" = "registry.connect.redhat.com/ongres/stackgres-certified-1" +"opdev/operator-certification-operator-bundle" = "registry.connect.redhat.com/opdev/operator-certification-operator-bundle" +"opdev/operator-certification-operator" = "quay.io/opdev/operator-certification-operator" +"opencloudio/alertmanager" = "quay.io/opencloudio/alertmanager" +"opencloudio/audit-garbage-collector" = "quay.io/opencloudio/audit-garbage-collector" +"opencloudio/audit-policy-controller" = "quay.io/opencloudio/audit-policy-controller" +"opencloudio/audit-syslog-service" = "quay.io/opencloudio/audit-syslog-service" +"opencloudio/collectd-exporter" = "quay.io/opencloudio/collectd-exporter" +"opencloudio/common-service-operator-amd64" = "quay.io/opencloudio/common-service-operator-amd64" +"opencloudio/common-service-operator-ppc64le" = "quay.io/opencloudio/common-service-operator-ppc64le" +"opencloudio/common-service-operator" = "quay.io/opencloudio/common-service-operator" +"opencloudio/common-web-ui" = "quay.io/opencloudio/common-web-ui" +"opencloudio/configmap-reload" = "quay.io/opencloudio/configmap-reload" +"opencloudio/curl-ppc64le" = "quay.io/opencloudio/curl-ppc64le" +"opencloudio/curl" = "quay.io/opencloudio/curl" +"opencloudio/dashboard-controller" = "quay.io/opencloudio/dashboard-controller" +"opencloudio/fluentd" = "quay.io/opencloudio/fluentd" +"opencloudio/grafana-ocpthanos-proxy" = "quay.io/opencloudio/grafana-ocpthanos-proxy" +"opencloudio/grafana" = "quay.io/opencloudio/grafana" +"opencloudio/iam-policy-administration" = "quay.io/opencloudio/iam-policy-administration" +"opencloudio/iam-policy-controller" = "quay.io/opencloudio/iam-policy-controller" +"opencloudio/iam-policy-decision" = "quay.io/opencloudio/iam-policy-decision" +"opencloudio/ibm-auditlogging-operator" = "quay.io/opencloudio/ibm-auditlogging-operator" +"opencloudio/ibm-catalog-ui-operator" = "quay.io/opencloudio/ibm-catalog-ui-operator" +"opencloudio/ibm-cert-manager-operator" = "quay.io/opencloudio/ibm-cert-manager-operator" +"opencloudio/ibm-commonui-operator" = "quay.io/opencloudio/ibm-commonui-operator" +"opencloudio/ibm-cs-upgrade-to3.4" = "quay.io/opencloudio/ibm-cs-upgrade-to3.4" +"opencloudio/ibm-cs-webhook-ppc64le" = "quay.io/opencloudio/ibm-cs-webhook-ppc64le" +"opencloudio/ibm-cs-webhook" = "quay.io/opencloudio/ibm-cs-webhook" +"opencloudio/ibm-dashboard-data-collector" = "quay.io/opencloudio/ibm-dashboard-data-collector" +"opencloudio/ibm-elastic-stack-operator" = "quay.io/opencloudio/ibm-elastic-stack-operator" +"opencloudio/ibm-events-kafka-2.6.0" = "quay.io/opencloudio/ibm-events-kafka-2.6.0" +"opencloudio/ibm-events-operator" = "quay.io/opencloudio/ibm-events-operator" +"opencloudio/ibm-healthcheck-operator" = "quay.io/opencloudio/ibm-healthcheck-operator" +"opencloudio/ibm-helm-api-operator" = "quay.io/opencloudio/ibm-helm-api-operator" +"opencloudio/ibm-helm-repo-operator" = "quay.io/opencloudio/ibm-helm-repo-operator" +"opencloudio/ibm-iam-operator" = "quay.io/opencloudio/ibm-iam-operator" +"opencloudio/ibm-ingress-nginx-operator" = "quay.io/opencloudio/ibm-ingress-nginx-operator" +"opencloudio/ibm-licensing-operator" = "quay.io/opencloudio/ibm-licensing-operator" +"opencloudio/ibm-licensing" = "quay.io/opencloudio/ibm-licensing" +"opencloudio/ibm-management-ingress-operator" = "quay.io/opencloudio/ibm-management-ingress-operator" +"opencloudio/ibm-metering-operator" = "quay.io/opencloudio/ibm-metering-operator" +"opencloudio/ibm-mongodb-exporter-ppc64le" = "quay.io/opencloudio/ibm-mongodb-exporter-ppc64le" +"opencloudio/ibm-mongodb-exporter" = "quay.io/opencloudio/ibm-mongodb-exporter" +"opencloudio/ibm-mongodb-install-ppc64le" = "quay.io/opencloudio/ibm-mongodb-install-ppc64le" +"opencloudio/ibm-mongodb-install" = "quay.io/opencloudio/ibm-mongodb-install" +"opencloudio/ibm-mongodb-operator" = "quay.io/opencloudio/ibm-mongodb-operator" +"opencloudio/ibm-mongodb-ppc64le" = "quay.io/opencloudio/ibm-mongodb-ppc64le" +"opencloudio/ibm-mongodb" = "quay.io/opencloudio/ibm-mongodb" +"opencloudio/ibm-monitoring-exporters-operator" = "quay.io/opencloudio/ibm-monitoring-exporters-operator" +"opencloudio/ibm-monitoring-grafana-operator" = "quay.io/opencloudio/ibm-monitoring-grafana-operator" +"opencloudio/ibm-monitoring-prometheusext-operator" = "quay.io/opencloudio/ibm-monitoring-prometheusext-operator" +"opencloudio/ibm-namespace-scope-operator" = "quay.io/opencloudio/ibm-namespace-scope-operator" +"opencloudio/ibm-platform-api-operator" = "quay.io/opencloudio/ibm-platform-api-operator" +"opencloudio/ibm-secretshare-operator-amd64" = "quay.io/opencloudio/ibm-secretshare-operator-amd64" +"opencloudio/ibm-secretshare-operator-ppc64le" = "quay.io/opencloudio/ibm-secretshare-operator-ppc64le" +"opencloudio/ibm-secretshare-operator" = "quay.io/opencloudio/ibm-secretshare-operator" +"opencloudio/icp-audit-service" = "quay.io/opencloudio/icp-audit-service" +"opencloudio/icp-catalog-ui-ppc64le" = "quay.io/opencloudio/icp-catalog-ui-ppc64le" +"opencloudio/icp-catalog-ui" = "quay.io/opencloudio/icp-catalog-ui" +"opencloudio/icp-cert-manager-acmesolver-ppc64le" = "quay.io/opencloudio/icp-cert-manager-acmesolver-ppc64le" +"opencloudio/icp-cert-manager-acmesolver" = "quay.io/opencloudio/icp-cert-manager-acmesolver" +"opencloudio/icp-cert-manager-cainjector-ppc64le" = "quay.io/opencloudio/icp-cert-manager-cainjector-ppc64le" +"opencloudio/icp-cert-manager-cainjector" = "quay.io/opencloudio/icp-cert-manager-cainjector" +"opencloudio/icp-cert-manager-controller-ppc64le" = "quay.io/opencloudio/icp-cert-manager-controller-ppc64le" +"opencloudio/icp-cert-manager-controller" = "quay.io/opencloudio/icp-cert-manager-controller" +"opencloudio/icp-cert-manager-webhook-ppc64le" = "quay.io/opencloudio/icp-cert-manager-webhook-ppc64le" +"opencloudio/icp-cert-manager-webhook" = "quay.io/opencloudio/icp-cert-manager-webhook" +"opencloudio/icp-configmap-watcher-ppc64le" = "quay.io/opencloudio/icp-configmap-watcher-ppc64le" +"opencloudio/icp-configmap-watcher" = "quay.io/opencloudio/icp-configmap-watcher" +"opencloudio/icp-elasticsearch-oss-ppc64le" = "quay.io/opencloudio/icp-elasticsearch-oss-ppc64le" +"opencloudio/icp-elasticsearch-oss" = "quay.io/opencloudio/icp-elasticsearch-oss" +"opencloudio/icp-filebeat-oss-ppc64le" = "quay.io/opencloudio/icp-filebeat-oss-ppc64le" +"opencloudio/icp-filebeat-oss" = "quay.io/opencloudio/icp-filebeat-oss" +"opencloudio/icp-helm-api-ppc64le" = "quay.io/opencloudio/icp-helm-api-ppc64le" +"opencloudio/icp-helm-api" = "quay.io/opencloudio/icp-helm-api" +"opencloudio/icp-helm-repo-ppc64le" = "quay.io/opencloudio/icp-helm-repo-ppc64le" +"opencloudio/icp-helm-repo" = "quay.io/opencloudio/icp-helm-repo" +"opencloudio/icp-helm-rudder-ppc64le" = "quay.io/opencloudio/icp-helm-rudder-ppc64le" +"opencloudio/icp-helm-rudder" = "quay.io/opencloudio/icp-helm-rudder" +"opencloudio/icp-iam-onboarding" = "quay.io/opencloudio/icp-iam-onboarding" +"opencloudio/icp-identity-manager" = "quay.io/opencloudio/icp-identity-manager" +"opencloudio/icp-identity-provider" = "quay.io/opencloudio/icp-identity-provider" +"opencloudio/icp-initcontainer-ppc64le" = "quay.io/opencloudio/icp-initcontainer-ppc64le" +"opencloudio/icp-initcontainer" = "quay.io/opencloudio/icp-initcontainer" +"opencloudio/icp-kibana-oss-ppc64le" = "quay.io/opencloudio/icp-kibana-oss-ppc64le" +"opencloudio/icp-kibana-oss" = "quay.io/opencloudio/icp-kibana-oss" +"opencloudio/icp-logstash-oss-ppc64le" = "quay.io/opencloudio/icp-logstash-oss-ppc64le" +"opencloudio/icp-logstash-oss" = "quay.io/opencloudio/icp-logstash-oss" +"opencloudio/icp-management-ingress" = "quay.io/opencloudio/icp-management-ingress" +"opencloudio/icp-memcached-ppc64le" = "quay.io/opencloudio/icp-memcached-ppc64le" +"opencloudio/icp-memcached" = "quay.io/opencloudio/icp-memcached" +"opencloudio/icp-oidcclient-watcher" = "quay.io/opencloudio/icp-oidcclient-watcher" +"opencloudio/icp-platform-api-ppc64le" = "quay.io/opencloudio/icp-platform-api-ppc64le" +"opencloudio/icp-platform-api" = "quay.io/opencloudio/icp-platform-api" +"opencloudio/icp-platform-auth" = "quay.io/opencloudio/icp-platform-auth" +"opencloudio/icp-secret-watcher" = "quay.io/opencloudio/icp-secret-watcher" +"opencloudio/indices-cleaner-ppc64le" = "quay.io/opencloudio/indices-cleaner-ppc64le" +"opencloudio/indices-cleaner" = "quay.io/opencloudio/indices-cleaner" +"opencloudio/kube-state-metrics" = "quay.io/opencloudio/kube-state-metrics" +"opencloudio/logging-pki-init-ppc64le" = "quay.io/opencloudio/logging-pki-init-ppc64le" +"opencloudio/logging-pki-init" = "quay.io/opencloudio/logging-pki-init" +"opencloudio/metering-data-manager-ppc64le" = "quay.io/opencloudio/metering-data-manager-ppc64le" +"opencloudio/metering-data-manager" = "quay.io/opencloudio/metering-data-manager" +"opencloudio/metering-mcmui-ppc64le" = "quay.io/opencloudio/metering-mcmui-ppc64le" +"opencloudio/metering-mcmui" = "quay.io/opencloudio/metering-mcmui" +"opencloudio/metering-report-ppc64le" = "quay.io/opencloudio/metering-report-ppc64le" +"opencloudio/metering-report" = "quay.io/opencloudio/metering-report" +"opencloudio/metering-ui-ppc64le" = "quay.io/opencloudio/metering-ui-ppc64le" +"opencloudio/metering-ui" = "quay.io/opencloudio/metering-ui" +"opencloudio/must-gather" = "quay.io/opencloudio/must-gather" +"opencloudio/must-gather-service" = "quay.io/opencloudio/must-gather-service" +"opencloudio/node-exporter" = "quay.io/opencloudio/node-exporter" +"opencloudio/odlm-amd64" = "quay.io/opencloudio/odlm-amd64" +"opencloudio/odlm-ppc64le" = "quay.io/opencloudio/odlm-ppc64le" +"opencloudio/odlm" = "quay.io/opencloudio/odlm" +"opencloudio/prometheus-config-reloader" = "quay.io/opencloudio/prometheus-config-reloader" +"opencloudio/prometheus-controller" = "quay.io/opencloudio/prometheus-controller" +"opencloudio/prometheus-exporter" = "quay.io/opencloudio/prometheus-exporter" +"opencloudio/prometheus" = "quay.io/opencloudio/prometheus" +"opencloudio" = "quay.io/opencloudio" +"opencloudio/system-healthcheck-service-ppc64le" = "quay.io/opencloudio/system-healthcheck-service-ppc64le" +"opencloudio/system-healthcheck-service" = "quay.io/opencloudio/system-healthcheck-service" +"opencloudio/tiller-ppc64le" = "quay.io/opencloudio/tiller-ppc64le" +"opencloudio/tiller" = "quay.io/opencloudio/tiller" +"openkunlun/kunlun-dapr" = "registry.connect.redhat.com/openkunlun/kunlun-dapr" +"openkunlun/kunlun-pilot" = "registry.connect.redhat.com/openkunlun/kunlun-pilot" +"openkunlun/kunlun-proxy" = "registry.connect.redhat.com/openkunlun/kunlun-proxy" +"openlegacy-corp/as400rpc-operator" = "registry.connect.redhat.com/openlegacy-corp/as400rpc-operator" +"openlegacy-corp/db2-zos-db-nocode" = "registry.connect.redhat.com/openlegacy-corp/db2-zos-db-nocode" +"openlegacy-corp/db2-zos-db-operator" = "registry.connect.redhat.com/openlegacy-corp/db2-zos-db-operator" +"openlegacy-corp/db2-zos-db" = "registry.connect.redhat.com/openlegacy-corp/db2-zos-db" +"openlegacy-corp/hub-enterprise-ansible-operator-bundle" = "registry.connect.redhat.com/openlegacy-corp/hub-enterprise-ansible-operator-bundle" +"openlegacy-corp/hub-enterprise-ansible-operator" = "registry.connect.redhat.com/openlegacy-corp/hub-enterprise-ansible-operator" +"openlegacy-corp/hub-enterprise-db-migration" = "registry.connect.redhat.com/openlegacy-corp/hub-enterprise-db-migration" +"openlegacy-corp/hub-enterprise-keycloak" = "registry.connect.redhat.com/openlegacy-corp/hub-enterprise-keycloak" +"openlegacy-corp/hub-enterprise" = "registry.connect.redhat.com/openlegacy-corp/hub-enterprise" +"openlegacy-corp/hub-light" = "registry.connect.redhat.com/openlegacy-corp/hub-light" +"openlegacy-corp/ibm-mq-nocode" = "registry.connect.redhat.com/openlegacy-corp/ibm-mq-nocode" +"openlegacy-corp/ibm-mq-operator" = "registry.connect.redhat.com/openlegacy-corp/ibm-mq-operator" +"openlegacy-corp/ibm-mq" = "registry.connect.redhat.com/openlegacy-corp/ibm-mq" +"openlegacy-corp/mf-cics-tg-nocode" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-tg-nocode" +"openlegacy-corp/mf-cics-tg-operator" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-tg-operator" +"openlegacy-corp/mf-cics-tg" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-tg" +"openlegacy-corp/mf-cics-ts-nocode" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-ts-nocode" +"openlegacy-corp/mf-cics-ts-operator" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-ts-operator" +"openlegacy-corp/mf-cics-ts" = "registry.connect.redhat.com/openlegacy-corp/mf-cics-ts" +"openlegacy-corp/mf-ims-dc-nocode" = "registry.connect.redhat.com/openlegacy-corp/mf-ims-dc-nocode" +"openlegacy-corp/mf-ims-dc-operator" = "registry.connect.redhat.com/openlegacy-corp/mf-ims-dc-operator" +"openlegacy-corp/mf-ims-dc" = "registry.connect.redhat.com/openlegacy-corp/mf-ims-dc" +"openlegacy-corp/mf-vsam-rpc-nocode" = "registry.connect.redhat.com/openlegacy-corp/mf-vsam-rpc-nocode" +"openlegacy-corp/mf-vsam-rpc-operator" = "registry.connect.redhat.com/openlegacy-corp/mf-vsam-rpc-operator" +"openlegacy-corp/mf-vsam-rpc" = "registry.connect.redhat.com/openlegacy-corp/mf-vsam-rpc" +"openlegacy-corp/nocode" = "registry.connect.redhat.com/openlegacy-corp/nocode" +"openlegacy-corp/oracle-db-nocode" = "registry.connect.redhat.com/openlegacy-corp/oracle-db-nocode" +"openlegacy-corp/oracle-db-operator" = "registry.connect.redhat.com/openlegacy-corp/oracle-db-operator" +"openlegacy-corp/oracle-db" = "registry.connect.redhat.com/openlegacy-corp/oracle-db" +"openlegacy-corp/rest-rpc-nocode" = "registry.connect.redhat.com/openlegacy-corp/rest-rpc-nocode" +"openlegacy-corp/rest-rpc-operator" = "registry.connect.redhat.com/openlegacy-corp/rest-rpc-operator" +"openlegacy-corp/rest-rpc" = "registry.connect.redhat.com/openlegacy-corp/rest-rpc" +"openlegacy-corp/sap-rfc-nocode" = "registry.connect.redhat.com/openlegacy-corp/sap-rfc-nocode" +"openlegacy-corp/sap-rfc-operator" = "registry.connect.redhat.com/openlegacy-corp/sap-rfc-operator" +"openlegacy-corp/sap-rfc" = "registry.connect.redhat.com/openlegacy-corp/sap-rfc" +"openlegacy-corp/soap-rpc-nocode" = "registry.connect.redhat.com/openlegacy-corp/soap-rpc-nocode" +"openlegacy-corp/soap-rpc-operator" = "registry.connect.redhat.com/openlegacy-corp/soap-rpc-operator" +"openlegacy-corp/soap-rpc" = "registry.connect.redhat.com/openlegacy-corp/soap-rpc" +"openlegacy-corp/sybase-db-nocode" = "registry.connect.redhat.com/openlegacy-corp/sybase-db-nocode" +"openlegacy-corp/sybase-db-operator" = "registry.connect.redhat.com/openlegacy-corp/sybase-db-operator" +"openlegacy-corp/sybase-db" = "registry.connect.redhat.com/openlegacy-corp/sybase-db" +"openlegacy-corp/temenos-tafc-nocode" = "registry.connect.redhat.com/openlegacy-corp/temenos-tafc-nocode" +"openlegacy-corp/temenos-tafc-operator" = "registry.connect.redhat.com/openlegacy-corp/temenos-tafc-operator" +"openlegacy-corp/temenos-tafc" = "registry.connect.redhat.com/openlegacy-corp/temenos-tafc" +"opennode/waldur-homeport2" = "registry.connect.redhat.com/opennode/waldur-homeport2" +"opennode/waldur-mastermind2" = "registry.connect.redhat.com/opennode/waldur-mastermind2" +"openscale/aios-dashboard-ppc64le" = "cp.icr.io/openscale/aios-dashboard-ppc64le" +"openscale/aios-feedback-service-ppc64le" = "cp.icr.io/openscale/aios-feedback-service-ppc64le" +"openshift3/apb-base" = "registry.access.redhat.com/openshift3/apb-base" +"openshift3/apb-tools" = "registry.access.redhat.com/openshift3/apb-tools" +"openshift3/automation-broker-apb" = "registry.access.redhat.com/openshift3/automation-broker-apb" +"openshift3/grafana" = "registry.access.redhat.com/openshift3/grafana" +"openshift3/image-inspector" = "registry.access.redhat.com/openshift3/image-inspector" +"openshift3/kuryr-cni" = "registry.redhat.io/openshift3/kuryr-cni" +"openshift3/kuryr-controller" = "registry.access.redhat.com/openshift3/kuryr-controller" +"openshift3/logging-elasticsearch" = "registry.access.redhat.com/openshift3/logging-elasticsearch" +"openshift3/logging-fluentd" = "registry.access.redhat.com/openshift3/logging-fluentd" +"openshift3/mariadb-apb" = "registry.access.redhat.com/openshift3/mariadb-apb" +"openshift3/mediawiki-apb" = "registry.access.redhat.com/openshift3/mediawiki-apb" +"openshift3/mediawiki" = "registry.access.redhat.com/openshift3/mediawiki" +"openshift3/metrics-heapster" = "registry.access.redhat.com/openshift3/metrics-heapster" +"openshift3/mysql-apb" = "registry.access.redhat.com/openshift3/mysql-apb" +"openshift3/node" = "registry.access.redhat.com/openshift3/node" +"openshift3/oauth-proxy" = "registry.access.redhat.com/openshift3/oauth-proxy" +"openshift3/ose-ansible" = "registry.access.redhat.com/openshift3/ose-ansible" +"openshift3/ose-ansible-service-broker" = "registry.access.redhat.com/openshift3/ose-ansible-service-broker" +"openshift3/ose-cli" = "registry.access.redhat.com/openshift3/ose-cli" +"openshift3/ose-cluster-autoscaler" = "registry.access.redhat.com/openshift3/ose-cluster-autoscaler" +"openshift3/ose-cluster-capacity" = "registry.access.redhat.com/openshift3/ose-cluster-capacity" +"openshift3/ose-cluster-monitoring-operator" = "registry.access.redhat.com/openshift3/ose-cluster-monitoring-operator" +"openshift3/ose-control-plane" = "registry.access.redhat.com/openshift3/ose-control-plane" +"openshift3/ose-deployer" = "registry.access.redhat.com/openshift3/ose-deployer" +"openshift3/ose-docker-builder" = "registry.access.redhat.com/openshift3/ose-docker-builder" +"openshift3/ose-docker-registry" = "registry.access.redhat.com/openshift3/ose-docker-registry" +"openshift3/ose-egress-dns-proxy" = "registry.access.redhat.com/openshift3/ose-egress-dns-proxy" +"openshift3/ose-egress-http-proxy" = "registry.access.redhat.com/openshift3/ose-egress-http-proxy" +"openshift3/ose-egress-router" = "registry.access.redhat.com/openshift3/ose-egress-router" +"openshift3/ose-federation" = "registry.access.redhat.com/openshift3/ose-federation" +"openshift3/ose-haproxy-router" = "registry.access.redhat.com/openshift3/ose-haproxy-router" +"openshift3/ose-hyperkube" = "registry.access.redhat.com/openshift3/ose-hyperkube" +"openshift3/ose-hypershift" = "registry.access.redhat.com/openshift3/ose-hypershift" +"openshift3/ose-keepalived-ipfailover" = "registry.access.redhat.com/openshift3/ose-keepalived-ipfailover" +"openshift3/ose-kube-rbac-proxy" = "registry.access.redhat.com/openshift3/ose-kube-rbac-proxy" +"openshift3/ose-kube-state-metrics" = "registry.access.redhat.com/openshift3/ose-kube-state-metrics" +"openshift3/ose-kuryr-cni" = "registry.redhat.io/openshift3/ose-kuryr-cni" +"openshift3/ose-kuryr-controller" = "registry.redhat.io/openshift3/ose-kuryr-controller" +"openshift3/ose-logging-curator5" = "registry.access.redhat.com/openshift3/ose-logging-curator5" +"openshift3/ose-logging-elasticsearch5" = "registry.access.redhat.com/openshift3/ose-logging-elasticsearch5" +"openshift3/ose-logging-elasticsearch" = "registry.access.redhat.com/openshift3/ose-logging-elasticsearch" +"openshift3/ose-logging-eventrouter" = "registry.access.redhat.com/openshift3/ose-logging-eventrouter" +"openshift3/ose-logging-fluentd" = "registry.access.redhat.com/openshift3/ose-logging-fluentd" +"openshift3/ose-logging-kibana5" = "registry.access.redhat.com/openshift3/ose-logging-kibana5" +"openshift3/ose-metrics-heapster" = "registry.access.redhat.com/openshift3/ose-metrics-heapster" +"openshift3/ose-metrics-schema-installer" = "registry.access.redhat.com/openshift3/ose-metrics-schema-installer" +"openshift3/ose-metrics-server" = "registry.access.redhat.com/openshift3/ose-metrics-server" +"openshift3/ose-node" = "registry.access.redhat.com/openshift3/ose-node" +"openshift3/ose-operator-lifecycle-manager" = "registry.access.redhat.com/openshift3/ose-operator-lifecycle-manager" +"openshift3/ose-pod" = "registry.access.redhat.com/openshift3/ose-pod" +"openshift3/ose-prometheus-config-reloader" = "registry.access.redhat.com/openshift3/ose-prometheus-config-reloader" +"openshift3/ose-recycler" = "registry.access.redhat.com/openshift3/ose-recycler" +"openshift3/ose" = "registry.access.redhat.com/openshift3/ose" +"openshift3/ose-service-catalog" = "registry.access.redhat.com/openshift3/ose-service-catalog" +"openshift3/ose-template-service-broker" = "registry.access.redhat.com/openshift3/ose-template-service-broker" +"openshift3/ose-tests" = "registry.access.redhat.com/openshift3/ose-tests" +"openshift3/ose-web-console" = "registry.access.redhat.com/openshift3/ose-web-console" +"openshift3/postgresql-apb" = "registry.access.redhat.com/openshift3/postgresql-apb" +"openshift3/prometheus-alertmanager" = "registry.access.redhat.com/openshift3/prometheus-alertmanager" +"openshift3/prometheus-node-exporter" = "registry.access.redhat.com/openshift3/prometheus-node-exporter" +"openshift3/prometheus" = "registry.access.redhat.com/openshift3/prometheus" +"openshift3/registry-console" = "registry.access.redhat.com/openshift3/registry-console" +"openshift4/aws-kms-encryption-provider-rhel9" = "registry.redhat.io/openshift4/aws-kms-encryption-provider-rhel9" +"openshift4/bare-metal-event-relay-operator-bundle" = "registry.redhat.io/openshift4/bare-metal-event-relay-operator-bundle" +"openshift4/bare-metal-event-relay-rhel9-operator" = "registry.redhat.io/openshift4/bare-metal-event-relay-rhel9-operator" +"openshift4/baremetal-hardware-event-proxy-rhel9" = "registry.redhat.io/openshift4/baremetal-hardware-event-proxy-rhel9" +"openshift4/cloud-event-proxy-rhel8" = "registry.redhat.io/openshift4/cloud-event-proxy-rhel8" +"openshift4/cloud-network-config-controller-rhel8" = "registry.redhat.io/openshift4/cloud-network-config-controller-rhel8" +"openshift4/cloud-network-config-controller-rhel9" = "registry.redhat.io/openshift4/cloud-network-config-controller-rhel9" +"openshift4/cnf-tests-rhel8" = "registry.redhat.io/openshift4/cnf-tests-rhel8" +"openshift4/container-networking-plugins-microshift-rhel9" = "registry.redhat.io/openshift4/container-networking-plugins-microshift-rhel9" +"openshift4/driver-toolkit-rhel8" = "registry.redhat.io/openshift4/driver-toolkit-rhel8" +"openshift4/driver-toolkit-rhel9" = "registry.redhat.io/openshift4/driver-toolkit-rhel9" +"openshift4/egress-router-cni-alt-rhel8" = "registry.redhat.io/openshift4/egress-router-cni-alt-rhel8" +"openshift4/egress-router-cni-rhel8" = "registry.redhat.io/openshift4/egress-router-cni-rhel8" +"openshift4/egress-router-cni-rhel9" = "registry.redhat.io/openshift4/egress-router-cni-rhel9" +"openshift4/frr-rhel8" = "registry.redhat.io/openshift4/frr-rhel8" +"openshift4/frr-rhel9" = "registry.redhat.io/openshift4/frr-rhel9" +"openshift4/ingress-node-firewall-operator-bundle" = "registry.redhat.io/openshift4/ingress-node-firewall-operator-bundle" +"openshift4/ingress-node-firewall" = "registry.redhat.io/openshift4/ingress-node-firewall" +"openshift4/ingress-node-firewall-rhel8-operator" = "registry.redhat.io/openshift4/ingress-node-firewall-rhel8-operator" +"openshift4/ingress-node-firewall-rhel9-operator" = "registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator" +"openshift4/ingress-node-firewall-rhel9" = "registry.redhat.io/openshift4/ingress-node-firewall-rhel9" +"openshift4/kubernetes-nmstate-operator-bundle" = "registry.redhat.io/openshift4/kubernetes-nmstate-operator-bundle" +"openshift4/kubernetes-nmstate-rhel8-operator" = "registry.redhat.io/openshift4/kubernetes-nmstate-rhel8-operator" +"openshift4/kubernetes-nmstate-rhel9-operator" = "registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator" +"openshift4/kubevirt-csi-driver-rhel8" = "registry.redhat.io/openshift4/kubevirt-csi-driver-rhel8" +"openshift4/kubevirt-csi-driver-rhel9" = "registry.redhat.io/openshift4/kubevirt-csi-driver-rhel9" +"openshift4/lifecycle-agent-operator-bundle" = "registry.redhat.io/openshift4/lifecycle-agent-operator-bundle" +"openshift4/lifecycle-agent-rhel9-operator" = "registry.redhat.io/openshift4/lifecycle-agent-rhel9-operator" +"openshift4/metallb-operator-bundle" = "registry.redhat.io/openshift4/metallb-operator-bundle" +"openshift4/metallb-rhel8-operator" = "registry.redhat.io/openshift4/metallb-rhel8-operator" +"openshift4/metallb-rhel8" = "registry.redhat.io/openshift4/metallb-rhel8" +"openshift4/metallb-rhel9-operator" = "registry.redhat.io/openshift4/metallb-rhel9-operator" +"openshift4/metallb-rhel9" = "registry.redhat.io/openshift4/metallb-rhel9" +"openshift4/nmstate-console-plugin-rhel8" = "registry.redhat.io/openshift4/nmstate-console-plugin-rhel8" +"openshift4/nmstate-console-plugin-rhel9" = "registry.redhat.io/openshift4/nmstate-console-plugin-rhel9" +"openshift4/noderesourcetopology-scheduler-container-rhel8" = "registry.redhat.io/openshift4/noderesourcetopology-scheduler-container-rhel8" +"openshift4/noderesourcetopology-scheduler-rhel9" = "registry.redhat.io/openshift4/noderesourcetopology-scheduler-rhel9" +"openshift4/numaresources-must-gather-rhel9" = "registry.redhat.io/openshift4/numaresources-must-gather-rhel9" +"openshift4/numaresources-operator-bundle" = "registry.redhat.io/openshift4/numaresources-operator-bundle" +"openshift4/numaresources-rhel8-operator" = "registry.redhat.io/openshift4/numaresources-rhel8-operator" +"openshift4/numaresources-rhel9-operator" = "registry.redhat.io/openshift4/numaresources-rhel9-operator" +"openshift4/openshift-route-controller-manager-rhel8" = "registry.redhat.io/openshift4/openshift-route-controller-manager-rhel8" +"openshift4/openshift-route-controller-manager-rhel9" = "registry.redhat.io/openshift4/openshift-route-controller-manager-rhel9" +"openshift4/openshift-telco-core-rds-rhel9" = "registry.redhat.io/openshift4/openshift-telco-core-rds-rhel9" +"openshift4/ose-alibaba-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-alibaba-cloud-controller-manager-rhel8" +"openshift4/ose-alibaba-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-alibaba-cloud-controller-manager-rhel9" +"openshift4/ose-alibaba-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-alibaba-machine-controllers-rhel8" +"openshift4/ose-alibaba-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-alibaba-machine-controllers-rhel9" +"openshift4/ose-ansible-operator" = "registry.redhat.io/openshift4/ose-ansible-operator" +"openshift4/ose-aws-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8" +"openshift4/ose-aws-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel9" +"openshift4/ose-aws-cluster-api-controllers-rhel8" = "registry.redhat.io/openshift4/ose-aws-cluster-api-controllers-rhel8" +"openshift4/ose-aws-cluster-api-controllers-rhel9" = "registry.redhat.io/openshift4/ose-aws-cluster-api-controllers-rhel9" +"openshift4/ose-aws-machine-controllers" = "registry.redhat.io/openshift4/ose-aws-machine-controllers" +"openshift4/ose-aws-pod-identity-webhook-rhel8" = "registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8" +"openshift4/ose-aws-pod-identity-webhook-rhel9" = "registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel9" +"openshift4/ose-azure-cluster-api-controllers-rhel8" = "registry.redhat.io/openshift4/ose-azure-cluster-api-controllers-rhel8" +"openshift4/ose-azure-cluster-api-controllers-rhel9" = "registry.redhat.io/openshift4/ose-azure-cluster-api-controllers-rhel9" +"openshift4/ose-azure-disk-csi-driver-rhel8-operator" = "registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8-operator" +"openshift4/ose-azure-disk-csi-driver-rhel9-operator" = "registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel9-operator" +"openshift4/ose-azure-machine-controllers" = "registry.redhat.io/openshift4/ose-azure-machine-controllers" +"openshift4/ose-azure-workload-identity-webhook-rhel8" = "registry.redhat.io/openshift4/ose-azure-workload-identity-webhook-rhel8" +"openshift4/ose-azure-workload-identity-webhook-rhel9" = "registry.redhat.io/openshift4/ose-azure-workload-identity-webhook-rhel9" +"openshift4/ose-baremetal-machine-controllers" = "registry.redhat.io/openshift4/ose-baremetal-machine-controllers" +"openshift4/ose-baremetal-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-baremetal-machine-controllers-rhel9" +"openshift4/ose-baremetal-runtimecfg-rhel8" = "registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8" +"openshift4/ose-baremetal-runtimecfg-rhel9" = "registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel9" +"openshift4/ose-cli-artifacts-alt-rhel8" = "registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8" +"openshift4/ose-cli-artifacts" = "registry.redhat.io/openshift4/ose-cli-artifacts" +"openshift4/ose-cli-artifacts-rhel9" = "registry.redhat.io/openshift4/ose-cli-artifacts-rhel9" +"openshift4/ose-cli" = "registry.redhat.io/openshift4/ose-cli" +"openshift4/ose-cli-rhel9" = "registry.redhat.io/openshift4/ose-cli-rhel9" +"openshift4/ose-cloud-credential-operator" = "registry.redhat.io/openshift4/ose-cloud-credential-operator" +"openshift4/ose-cloud-credential-rhel9-operator" = "registry.redhat.io/openshift4/ose-cloud-credential-rhel9-operator" +"openshift4/ose-cloud-event-proxy" = "registry.redhat.io/openshift4/ose-cloud-event-proxy" +"openshift4/ose-cloud-event-proxy-rhel8" = "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel8" +"openshift4/ose-cloud-event-proxy-rhel9" = "registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9" +"openshift4/ose-cluster-authentication-operator" = "registry.redhat.io/openshift4/ose-cluster-authentication-operator" +"openshift4/ose-cluster-authentication-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-authentication-rhel9-operator" +"openshift4/ose-cluster-autoscaler-operator" = "registry.redhat.io/openshift4/ose-cluster-autoscaler-operator" +"openshift4/ose-cluster-autoscaler" = "registry.redhat.io/openshift4/ose-cluster-autoscaler" +"openshift4/ose-cluster-autoscaler-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-autoscaler-rhel9-operator" +"openshift4/ose-cluster-autoscaler-rhel9" = "registry.redhat.io/openshift4/ose-cluster-autoscaler-rhel9" +"openshift4/ose-cluster-baremetal-operator-rhel8" = "registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8" +"openshift4/ose-cluster-baremetal-operator-rhel9" = "registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel9" +"openshift4/ose-cluster-bootstrap" = "registry.redhat.io/openshift4/ose-cluster-bootstrap" +"openshift4/ose-cluster-bootstrap-rhel9" = "registry.redhat.io/openshift4/ose-cluster-bootstrap-rhel9" +"openshift4/ose-cluster-capacity" = "registry.redhat.io/openshift4/ose-cluster-capacity" +"openshift4/ose-cluster-capacity-rhel9" = "registry.redhat.io/openshift4/ose-cluster-capacity-rhel9" +"openshift4/ose-cluster-capi-operator-container-rhel8" = "registry.redhat.io/openshift4/ose-cluster-capi-operator-container-rhel8" +"openshift4/ose-cluster-capi-rhel8-operator" = "registry.redhat.io/openshift4/ose-cluster-capi-rhel8-operator" +"openshift4/ose-cluster-capi-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-capi-rhel9-operator" +"openshift4/ose-cluster-cloud-controller-manager-operator-rhel8" = "registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8" +"openshift4/ose-cluster-cloud-controller-manager-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-rhel9-operator" +"openshift4/ose-cluster-config-api-rhel9" = "registry.redhat.io/openshift4/ose-cluster-config-api-rhel9" +"openshift4/ose-cluster-config-operator" = "registry.redhat.io/openshift4/ose-cluster-config-operator" +"openshift4/ose-cluster-config-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-config-rhel9-operator" +"openshift4/ose-cluster-control-plane-machine-set-operator-rhel8" = "registry.redhat.io/openshift4/ose-cluster-control-plane-machine-set-operator-rhel8" +"openshift4/ose-cluster-control-plane-machine-set-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-control-plane-machine-set-rhel9-operator" +"openshift4/ose-cluster-dns-operator" = "registry.redhat.io/openshift4/ose-cluster-dns-operator" +"openshift4/ose-cluster-dns-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-dns-rhel9-operator" +"openshift4/ose-cluster-etcd-rhel8-operator" = "registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator" +"openshift4/ose-cluster-etcd-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-etcd-rhel9-operator" +"openshift4/ose-cluster-image-registry-operator" = "registry.redhat.io/openshift4/ose-cluster-image-registry-operator" +"openshift4/ose-cluster-image-registry-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-image-registry-rhel9-operator" +"openshift4/ose-cluster-ingress-operator" = "registry.redhat.io/openshift4/ose-cluster-ingress-operator" +"openshift4/ose-cluster-ingress-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-ingress-rhel9-operator" +"openshift4/ose-cluster-kube-apiserver-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator" +"openshift4/ose-cluster-kube-apiserver-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-apiserver-rhel9-operator" +"openshift4/ose-cluster-kube-cluster-api-rhel8-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-cluster-api-rhel8-operator" +"openshift4/ose-cluster-kube-cluster-api-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-cluster-api-rhel9-operator" +"openshift4/ose-cluster-kube-controller-manager-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator" +"openshift4/ose-cluster-kube-controller-manager-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-rhel9-operator" +"openshift4/ose-cluster-kube-descheduler-operator-bundle" = "registry.redhat.io/openshift4/ose-cluster-kube-descheduler-operator-bundle" +"openshift4/ose-cluster-kube-descheduler-rhel8-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-descheduler-rhel8-operator" +"openshift4/ose-cluster-kube-scheduler-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator" +"openshift4/ose-cluster-kube-scheduler-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-scheduler-rhel9-operator" +"openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator" +"openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel9-operator" +"openshift4/ose-cluster-machine-approver" = "registry.redhat.io/openshift4/ose-cluster-machine-approver" +"openshift4/ose-cluster-machine-approver-rhel9" = "registry.redhat.io/openshift4/ose-cluster-machine-approver-rhel9" +"openshift4/ose-cluster-monitoring-operator" = "registry.redhat.io/openshift4/ose-cluster-monitoring-operator" +"openshift4/ose-cluster-monitoring-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-monitoring-rhel9-operator" +"openshift4/ose-cluster-network-operator" = "registry.redhat.io/openshift4/ose-cluster-network-operator" +"openshift4/ose-cluster-network-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-network-rhel9-operator" +"openshift4/ose-cluster-nfd-operator-bundle" = "registry.redhat.io/openshift4/ose-cluster-nfd-operator-bundle" +"openshift4/ose-cluster-nfd-operator" = "registry.redhat.io/openshift4/ose-cluster-nfd-operator" +"openshift4/ose-cluster-nfd-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-nfd-rhel9-operator" +"openshift4/ose-cluster-node-tuning-operator" = "registry.redhat.io/openshift4/ose-cluster-node-tuning-operator" +"openshift4/ose-cluster-node-tuning-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-node-tuning-rhel9-operator" +"openshift4/ose-cluster-openshift-apiserver-operator" = "registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator" +"openshift4/ose-cluster-openshift-apiserver-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-rhel9-operator" +"openshift4/ose-cluster-openshift-controller-manager-operator" = "registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator" +"openshift4/ose-cluster-openshift-controller-manager-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-rhel9-operator" +"openshift4/ose-cluster-policy-controller-rhel8" = "registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8" +"openshift4/ose-cluster-policy-controller-rhel9" = "registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel9" +"openshift4/ose-clusterresourceoverride-operator-bundle" = "registry.redhat.io/openshift4/ose-clusterresourceoverride-operator-bundle" +"openshift4/ose-clusterresourceoverride-rhel8-operator" = "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8-operator" +"openshift4/ose-clusterresourceoverride-rhel8" = "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel8" +"openshift4/ose-clusterresourceoverride-rhel9-operator" = "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator" +"openshift4/ose-clusterresourceoverride-rhel9" = "registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9" +"openshift4/ose-cluster-samples-operator" = "registry.redhat.io/openshift4/ose-cluster-samples-operator" +"openshift4/ose-cluster-samples-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-samples-rhel9-operator" +"openshift4/ose-cluster-storage-operator" = "registry.redhat.io/openshift4/ose-cluster-storage-operator" +"openshift4/ose-cluster-storage-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-storage-rhel9-operator" +"openshift4/ose-cluster-update-keys" = "registry.redhat.io/openshift4/ose-cluster-update-keys" +"openshift4/ose-cluster-update-keys-rhel9" = "registry.redhat.io/openshift4/ose-cluster-update-keys-rhel9" +"openshift4/ose-cluster-version-operator" = "registry.redhat.io/openshift4/ose-cluster-version-operator" +"openshift4/ose-cluster-version-rhel9-operator" = "registry.redhat.io/openshift4/ose-cluster-version-rhel9-operator" +"openshift4/ose-configmap-reloader" = "registry.redhat.io/openshift4/ose-configmap-reloader" +"openshift4/ose-configmap-reloader-rhel9" = "registry.redhat.io/openshift4/ose-configmap-reloader-rhel9" +"openshift4/ose-console-operator" = "registry.redhat.io/openshift4/ose-console-operator" +"openshift4/ose-console" = "registry.redhat.io/openshift4/ose-console" +"openshift4/ose-console-rhel9-operator" = "registry.redhat.io/openshift4/ose-console-rhel9-operator" +"openshift4/ose-console-rhel9" = "registry.redhat.io/openshift4/ose-console-rhel9" +"openshift4/ose-container-networking-plugins-rhel8" = "registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8" +"openshift4/ose-container-networking-plugins-rhel9" = "registry.redhat.io/openshift4/ose-container-networking-plugins-rhel9" +"openshift4/ose-coredns" = "registry.redhat.io/openshift4/ose-coredns" +"openshift4/ose-coredns-rhel9" = "registry.redhat.io/openshift4/ose-coredns-rhel9" +"openshift4/ose-csi-driver-manila-rhel8-operator" = "registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator" +"openshift4/ose-csi-driver-manila-rhel8" = "registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8" +"openshift4/ose-csi-driver-manila-rhel9-operator" = "registry.redhat.io/openshift4/ose-csi-driver-manila-rhel9-operator" +"openshift4/ose-csi-driver-manila-rhel9" = "registry.redhat.io/openshift4/ose-csi-driver-manila-rhel9" +"openshift4/ose-csi-driver-nfs-rhel8" = "registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8" +"openshift4/ose-csi-driver-nfs-rhel9" = "registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel9" +"openshift4/ose-csi-driver-shared-resource-mustgather-rhel8" = "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel8" +"openshift4/ose-csi-driver-shared-resource-mustgather-rhel9" = "registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9" +"openshift4/ose-csi-external-attacher" = "registry.redhat.io/openshift4/ose-csi-external-attacher" +"openshift4/ose-csi-external-attacher-rhel8" = "registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8" +"openshift4/ose-csi-external-attacher-rhel9" = "registry.redhat.io/openshift4/ose-csi-external-attacher-rhel9" +"openshift4/ose-csi-external-provisioner" = "registry.redhat.io/openshift4/ose-csi-external-provisioner" +"openshift4/ose-csi-external-provisioner-rhel8" = "registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8" +"openshift4/ose-csi-external-provisioner-rhel9" = "registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel9" +"openshift4/ose-csi-external-resizer" = "registry.redhat.io/openshift4/ose-csi-external-resizer" +"openshift4/ose-csi-external-snapshotter" = "registry.redhat.io/openshift4/ose-csi-external-snapshotter" +"openshift4/ose-csi-livenessprobe" = "registry.redhat.io/openshift4/ose-csi-livenessprobe" +"openshift4/ose-csi-livenessprobe-rhel8" = "registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8" +"openshift4/ose-csi-livenessprobe-rhel9" = "registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel9" +"openshift4/ose-csi-node-driver-registrar" = "registry.redhat.io/openshift4/ose-csi-node-driver-registrar" +"openshift4/ose-csi-node-driver-registrar-rhel8" = "registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8" +"openshift4/ose-csi-node-driver-registrar-rhel9" = "registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel9" +"openshift4/ose-csi-snapshot-controller" = "registry.redhat.io/openshift4/ose-csi-snapshot-controller" +"openshift4/ose-csi-snapshot-controller-rhel8" = "registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8" +"openshift4/ose-csi-snapshot-controller-rhel9" = "registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel9" +"openshift4/ose-csi-snapshot-validation-webhook-rhel8" = "registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8" +"openshift4/ose-csi-snapshot-validation-webhook-rhel9" = "registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel9" +"openshift4/ose-deployer" = "registry.redhat.io/openshift4/ose-deployer" +"openshift4/ose-deployer-rhel9" = "registry.redhat.io/openshift4/ose-deployer-rhel9" +"openshift4/ose-docker-builder" = "registry.redhat.io/openshift4/ose-docker-builder" +"openshift4/ose-docker-builder-rhel9" = "registry.redhat.io/openshift4/ose-docker-builder-rhel9" +"openshift4/ose-docker-registry" = "registry.redhat.io/openshift4/ose-docker-registry" +"openshift4/ose-docker-registry-rhel9" = "registry.redhat.io/openshift4/ose-docker-registry-rhel9" +"openshift4/ose-egress-dns-proxy" = "registry.redhat.io/openshift4/ose-egress-dns-proxy" +"openshift4/ose-egress-dns-proxy-rhel9" = "registry.redhat.io/openshift4/ose-egress-dns-proxy-rhel9" +"openshift4/ose-egress-http-proxy" = "registry.redhat.io/openshift4/ose-egress-http-proxy" +"openshift4/ose-egress-http-proxy-rhel9" = "registry.redhat.io/openshift4/ose-egress-http-proxy-rhel9" +"openshift4/ose-egress-router" = "registry.redhat.io/openshift4/ose-egress-router" +"openshift4/ose-egress-router-rhel9" = "registry.redhat.io/openshift4/ose-egress-router-rhel9" +"openshift4/ose-etcd" = "registry.redhat.io/openshift4/ose-etcd" +"openshift4/ose-etcd-rhel9" = "registry.redhat.io/openshift4/ose-etcd-rhel9" +"openshift4/ose-gcp-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8" +"openshift4/ose-gcp-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel9" +"openshift4/ose-gcp-cluster-api-controllers-rhel8" = "registry.redhat.io/openshift4/ose-gcp-cluster-api-controllers-rhel8" +"openshift4/ose-gcp-cluster-api-controllers-rhel9" = "registry.redhat.io/openshift4/ose-gcp-cluster-api-controllers-rhel9" +"openshift4/ose-gcp-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-gcp-machine-controllers-rhel8" +"openshift4/ose-haproxy-router" = "registry.redhat.io/openshift4/ose-haproxy-router" +"openshift4/ose-haproxy-router-rhel9" = "registry.redhat.io/openshift4/ose-haproxy-router-rhel9" +"openshift4/ose-helm-operator" = "registry.redhat.io/openshift4/ose-helm-operator" +"openshift4/ose-helm-rhel9-operator" = "registry.redhat.io/openshift4/ose-helm-rhel9-operator" +"openshift4/ose-hyperkube" = "registry.redhat.io/openshift4/ose-hyperkube" +"openshift4/ose-hyperkube-rhel9" = "registry.redhat.io/openshift4/ose-hyperkube-rhel9" +"openshift4/ose-ibmcloud-cluster-api-controllers-rhel8" = "registry.redhat.io/openshift4/ose-ibmcloud-cluster-api-controllers-rhel8" +"openshift4/ose-ibmcloud-cluster-api-controllers-rhel9" = "registry.redhat.io/openshift4/ose-ibmcloud-cluster-api-controllers-rhel9" +"openshift4/ose-ibm-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-ibm-cloud-controller-manager-rhel8" +"openshift4/ose-ibm-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-ibm-cloud-controller-manager-rhel9" +"openshift4/ose-ibmcloud-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-ibmcloud-machine-controllers-rhel8" +"openshift4/ose-ibmcloud-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-ibmcloud-machine-controllers-rhel9" +"openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8" = "registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8" +"openshift4/ose-ibm-vpc-block-csi-driver-rhel8" = "registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-rhel8" +"openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator" = "registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-rhel9-operator" +"openshift4/ose-ibm-vpc-block-csi-driver-rhel9" = "registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-rhel9" +"openshift4/ose-ibm-vpc-node-label-updater-rhel8" = "registry.redhat.io/openshift4/ose-ibm-vpc-node-label-updater-rhel8" +"openshift4/ose-ibm-vpc-node-label-updater-rhel9" = "registry.redhat.io/openshift4/ose-ibm-vpc-node-label-updater-rhel9" +"openshift4/ose-image-customization-controller-rhel8" = "registry.redhat.io/openshift4/ose-image-customization-controller-rhel8" +"openshift4/ose-image-customization-controller-rhel9" = "registry.redhat.io/openshift4/ose-image-customization-controller-rhel9" +"openshift4/ose-insights-rhel8-operator" = "registry.redhat.io/openshift4/ose-insights-rhel8-operator" +"openshift4/ose-insights-rhel9-operator" = "registry.redhat.io/openshift4/ose-insights-rhel9-operator" +"openshift4/ose-installer-altinfra-rhel8" = "registry.redhat.io/openshift4/ose-installer-altinfra-rhel8" +"openshift4/ose-installer-altinfra-rhel9" = "registry.redhat.io/openshift4/ose-installer-altinfra-rhel9" +"openshift4/ose-installer-artifacts" = "registry.redhat.io/openshift4/ose-installer-artifacts" +"openshift4/ose-installer-artifacts-rhel9" = "registry.redhat.io/openshift4/ose-installer-artifacts-rhel9" +"openshift4/ose-installer" = "registry.redhat.io/openshift4/ose-installer" +"openshift4/ose-installer-rhel9" = "registry.redhat.io/openshift4/ose-installer-rhel9" +"openshift4/ose-keepalived-ipfailover" = "registry.redhat.io/openshift4/ose-keepalived-ipfailover" +"openshift4/ose-keepalived-ipfailover-rhel9" = "registry.redhat.io/openshift4/ose-keepalived-ipfailover-rhel9" +"openshift4/ose-kube-proxy" = "registry.redhat.io/openshift4/ose-kube-proxy" +"openshift4/ose-kube-proxy-rhel9" = "registry.redhat.io/openshift4/ose-kube-proxy-rhel9" +"openshift4/ose-kube-rbac-proxy" = "registry.redhat.io/openshift4/ose-kube-rbac-proxy" +"openshift4/ose-kube-rbac-proxy-rhel9" = "registry.redhat.io/openshift4/ose-kube-rbac-proxy-rhel9" +"openshift4/ose-kubernetes-nmstate-handler-rhel8" = "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel8" +"openshift4/ose-kubernetes-nmstate-handler-rhel9" = "registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9" +"openshift4/ose-kube-state-metrics" = "registry.redhat.io/openshift4/ose-kube-state-metrics" +"openshift4/ose-kube-state-metrics-rhel9" = "registry.redhat.io/openshift4/ose-kube-state-metrics-rhel9" +"openshift4/ose-kube-storage-version-migrator-rhel8" = "registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8" +"openshift4/ose-kube-storage-version-migrator-rhel9" = "registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel9" +"openshift4/ose-kuryr-cni-rhel8" = "registry.redhat.io/openshift4/ose-kuryr-cni-rhel8" +"openshift4/ose-kuryr-controller-rhel8" = "registry.redhat.io/openshift4/ose-kuryr-controller-rhel8" +"openshift4/ose-libvirt-machine-controllers" = "registry.redhat.io/openshift4/ose-libvirt-machine-controllers" +"openshift4/ose-libvirt-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-libvirt-machine-controllers-rhel9" +"openshift4/ose-local-storage-diskmaker" = "registry.redhat.io/openshift4/ose-local-storage-diskmaker" +"openshift4/ose-local-storage-diskmaker-rhel9" = "registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9" +"openshift4/ose-local-storage-mustgather-rhel8" = "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel8" +"openshift4/ose-local-storage-mustgather-rhel9" = "registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9" +"openshift4/ose-local-storage-operator-bundle" = "registry.redhat.io/openshift4/ose-local-storage-operator-bundle" +"openshift4/ose-local-storage-operator" = "registry.redhat.io/openshift4/ose-local-storage-operator" +"openshift4/ose-local-storage-rhel9-operator" = "registry.redhat.io/openshift4/ose-local-storage-rhel9-operator" +"openshift4/ose-local-storage-static-provisioner" = "registry.redhat.io/openshift4/ose-local-storage-static-provisioner" +"openshift4/ose-machine-api-operator" = "registry.redhat.io/openshift4/ose-machine-api-operator" +"openshift4/ose-machine-api-provider-openstack-rhel8" = "registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel8" +"openshift4/ose-machine-api-provider-openstack-rhel9" = "registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel9" +"openshift4/ose-machine-api-rhel9-operator" = "registry.redhat.io/openshift4/ose-machine-api-rhel9-operator" +"openshift4/ose-machine-config-operator" = "registry.redhat.io/openshift4/ose-machine-config-operator" +"openshift4/ose-machine-config-rhel9-operator" = "registry.redhat.io/openshift4/ose-machine-config-rhel9-operator" +"openshift4/ose-machine-os-images-rhel8" = "registry.redhat.io/openshift4/ose-machine-os-images-rhel8" +"openshift4/ose-machine-os-images-rhel9" = "registry.redhat.io/openshift4/ose-machine-os-images-rhel9" +"openshift4/ose-mdns-publisher-rhel8" = "registry.redhat.io/openshift4/ose-mdns-publisher-rhel8" +"openshift4/ose-metallb-operator-bundle" = "registry.redhat.io/openshift4/ose-metallb-operator-bundle" +"openshift4/ose-monitoring-plugin-rhel8" = "registry.redhat.io/openshift4/ose-monitoring-plugin-rhel8" +"openshift4/ose-monitoring-plugin-rhel9" = "registry.redhat.io/openshift4/ose-monitoring-plugin-rhel9" +"openshift4/ose-multus-admission-controller" = "registry.redhat.io/openshift4/ose-multus-admission-controller" +"openshift4/ose-multus-admission-controller-rhel9" = "registry.redhat.io/openshift4/ose-multus-admission-controller-rhel9" +"openshift4/ose-multus-cni-alt-rhel8" = "registry.redhat.io/openshift4/ose-multus-cni-alt-rhel8" +"openshift4/ose-multus-cni-microshift-rhel9" = "registry.redhat.io/openshift4/ose-multus-cni-microshift-rhel9" +"openshift4/ose-multus-cni" = "registry.redhat.io/openshift4/ose-multus-cni" +"openshift4/ose-multus-cni-rhel9" = "registry.redhat.io/openshift4/ose-multus-cni-rhel9" +"openshift4/ose-must-gather" = "registry.redhat.io/openshift4/ose-must-gather" +"openshift4/ose-must-gather-rhel9" = "registry.redhat.io/openshift4/ose-must-gather-rhel9" +"openshift4/ose-networking-console-plugin-rhel9" = "registry.redhat.io/openshift4/ose-networking-console-plugin-rhel9" +"openshift4/ose-network-metrics-daemon-rhel8" = "registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8" +"openshift4/ose-network-metrics-daemon-rhel9" = "registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel9" +"openshift4/ose-node-feature-discovery" = "registry.redhat.io/openshift4/ose-node-feature-discovery" +"openshift4/ose-node-feature-discovery-rhel9" = "registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9" +"openshift4/ose-nutanix-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-nutanix-cloud-controller-manager-rhel8" +"openshift4/ose-nutanix-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-nutanix-cloud-controller-manager-rhel9" +"openshift4/ose-nutanix-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-nutanix-machine-controllers-rhel8" +"openshift4/ose-nutanix-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-nutanix-machine-controllers-rhel9" +"openshift4/ose-oauth-proxy" = "registry.redhat.io/openshift4/ose-oauth-proxy" +"openshift4/ose-oauth-proxy-rhel9" = "registry.redhat.io/openshift4/ose-oauth-proxy-rhel9" +"openshift4/ose-oauth-server-rhel8" = "registry.redhat.io/openshift4/ose-oauth-server-rhel8" +"openshift4/ose-oauth-server-rhel9" = "registry.redhat.io/openshift4/ose-oauth-server-rhel9" +"openshift4/ose-openshift-apiserver-rhel8" = "registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8" +"openshift4/ose-openshift-apiserver-rhel9" = "registry.redhat.io/openshift4/ose-openshift-apiserver-rhel9" +"openshift4/ose-openshift-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8" +"openshift4/ose-openshift-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel9" +"openshift4/ose-openshift-proxy-pull-test-rhel8" = "registry.redhat.io/openshift4/ose-openshift-proxy-pull-test-rhel8" +"openshift4/ose-openstack-cinder-csi-driver-rhel8-operator" = "registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator" +"openshift4/ose-openstack-cinder-csi-driver-rhel8" = "registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8" +"openshift4/ose-openstack-cinder-csi-driver-rhel9-operator" = "registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel9-operator" +"openshift4/ose-openstack-cinder-csi-driver-rhel9" = "registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel9" +"openshift4/ose-openstack-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8" +"openshift4/ose-openstack-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel9" +"openshift4/ose-openstack-machine-controllers" = "registry.redhat.io/openshift4/ose-openstack-machine-controllers" +"openshift4/ose-operator-lifecycle-manager" = "registry.redhat.io/openshift4/ose-operator-lifecycle-manager" +"openshift4/ose-operator-lifecycle-manager-rhel9" = "registry.redhat.io/openshift4/ose-operator-lifecycle-manager-rhel9" +"openshift4/ose-operator-marketplace" = "registry.redhat.io/openshift4/ose-operator-marketplace" +"openshift4/ose-operator-marketplace-rhel9" = "registry.redhat.io/openshift4/ose-operator-marketplace-rhel9" +"openshift4/ose-operator-registry" = "registry.redhat.io/openshift4/ose-operator-registry" +"openshift4/ose-operator-registry-rhel9" = "registry.redhat.io/openshift4/ose-operator-registry-rhel9" +"openshift4/ose-operator-sdk-rhel8" = "registry.redhat.io/openshift4/ose-operator-sdk-rhel8" +"openshift4/ose-operator-sdk-rhel9" = "registry.redhat.io/openshift4/ose-operator-sdk-rhel9" +"openshift4/ose-ovirt-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8" +"openshift4/ose-ovirt-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel9" +"openshift4/ose-ovn-kubernetes-microshift-rhel9" = "registry.redhat.io/openshift4/ose-ovn-kubernetes-microshift-rhel9" +"openshift4/ose-ovn-kubernetes" = "registry.redhat.io/openshift4/ose-ovn-kubernetes" +"openshift4/ose-ovn-kubernetes-rhel9" = "registry.redhat.io/openshift4/ose-ovn-kubernetes-rhel9" +"openshift4/ose-pod" = "registry.redhat.io/openshift4/ose-pod" +"openshift4/ose-pod-rhel9" = "registry.redhat.io/openshift4/ose-pod-rhel9" +"openshift4/ose-powervs-block-csi-driver-operator-rhel8" = "registry.redhat.io/openshift4/ose-powervs-block-csi-driver-operator-rhel8" +"openshift4/ose-powervs-block-csi-driver-rhel8" = "registry.redhat.io/openshift4/ose-powervs-block-csi-driver-rhel8" +"openshift4/ose-powervs-block-csi-driver-rhel9-operator" = "registry.redhat.io/openshift4/ose-powervs-block-csi-driver-rhel9-operator" +"openshift4/ose-powervs-block-csi-driver-rhel9" = "registry.redhat.io/openshift4/ose-powervs-block-csi-driver-rhel9" +"openshift4/ose-powervs-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-powervs-cloud-controller-manager-rhel8" +"openshift4/ose-powervs-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-powervs-cloud-controller-manager-rhel9" +"openshift4/ose-powervs-machine-controllers-rhel8" = "registry.redhat.io/openshift4/ose-powervs-machine-controllers-rhel8" +"openshift4/ose-powervs-machine-controllers-rhel9" = "registry.redhat.io/openshift4/ose-powervs-machine-controllers-rhel9" +"openshift4/ose-prometheus-alertmanager" = "registry.redhat.io/openshift4/ose-prometheus-alertmanager" +"openshift4/ose-prometheus-alertmanager-rhel9" = "registry.redhat.io/openshift4/ose-prometheus-alertmanager-rhel9" +"openshift4/ose-prometheus-config-reloader" = "registry.redhat.io/openshift4/ose-prometheus-config-reloader" +"openshift4/ose-prometheus-config-reloader-rhel9" = "registry.redhat.io/openshift4/ose-prometheus-config-reloader-rhel9" +"openshift4/ose-prometheus-node-exporter" = "registry.redhat.io/openshift4/ose-prometheus-node-exporter" +"openshift4/ose-prometheus-node-exporter-rhel9" = "registry.redhat.io/openshift4/ose-prometheus-node-exporter-rhel9" +"openshift4/ose-prometheus-operator-admission-webhook-rhel8" = "registry.redhat.io/openshift4/ose-prometheus-operator-admission-webhook-rhel8" +"openshift4/ose-prometheus-operator-admission-webhook-rhel9" = "registry.redhat.io/openshift4/ose-prometheus-operator-admission-webhook-rhel9" +"openshift4/ose-prometheus" = "registry.redhat.io/openshift4/ose-prometheus" +"openshift4/ose-prometheus-rhel9" = "registry.redhat.io/openshift4/ose-prometheus-rhel9" +"openshift4/ose-prom-label-proxy" = "registry.redhat.io/openshift4/ose-prom-label-proxy" +"openshift4/ose-prom-label-proxy-rhel9" = "registry.redhat.io/openshift4/ose-prom-label-proxy-rhel9" +"openshift4/ose-ptp-operator-bundle" = "registry.redhat.io/openshift4/ose-ptp-operator-bundle" +"openshift4/ose-sdn-rhel8" = "registry.redhat.io/openshift4/ose-sdn-rhel8" +"openshift4/ose-sdn-rhel9" = "registry.redhat.io/openshift4/ose-sdn-rhel9" +"openshift4/ose-service-ca-operator" = "registry.redhat.io/openshift4/ose-service-ca-operator" +"openshift4/ose-service-ca-rhel9-operator" = "registry.redhat.io/openshift4/ose-service-ca-rhel9-operator" +"openshift4/ose-sriov-dp-admission-controller-rhel9" = "registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9" +"openshift4/ose-sriov-infiniband-cni" = "registry.redhat.io/openshift4/ose-sriov-infiniband-cni" +"openshift4/ose-sriov-infiniband-cni-rhel9" = "registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9" +"openshift4/ose-sriov-network-config-daemon-rhel9" = "registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9" +"openshift4/ose-sriov-network-device-plugin-rhel9" = "registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9" +"openshift4/ose-sriov-network-operator-bundle" = "registry.redhat.io/openshift4/ose-sriov-network-operator-bundle" +"openshift4/ose-sriov-network-rhel9-operator" = "registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator" +"openshift4/ose-sriov-network-webhook" = "registry.redhat.io/openshift4/ose-sriov-network-webhook" +"openshift4/ose-sriov-network-webhook-rhel9" = "registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9" +"openshift4/ose-sriov-operator-must-gather" = "registry.redhat.io/openshift4/ose-sriov-operator-must-gather" +"openshift4/ose-telemeter" = "registry.redhat.io/openshift4/ose-telemeter" +"openshift4/ose-telemeter-rhel9" = "registry.redhat.io/openshift4/ose-telemeter-rhel9" +"openshift4/ose-tests" = "registry.redhat.io/openshift4/ose-tests" +"openshift4/ose-tests-rhel9" = "registry.redhat.io/openshift4/ose-tests-rhel9" +"openshift4/ose-tools-rhel8" = "registry.redhat.io/openshift4/ose-tools-rhel8" +"openshift4/ose-tools-rhel9" = "registry.redhat.io/openshift4/ose-tools-rhel9" +"openshift4/ose-vertical-pod-autoscaler-operator-bundle" = "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-operator-bundle" +"openshift4/ose-vertical-pod-autoscaler-rhel8-operator" = "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8-operator" +"openshift4/ose-vertical-pod-autoscaler-rhel8" = "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel8" +"openshift4/ose-vertical-pod-autoscaler-rhel9-operator" = "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator" +"openshift4/ose-vertical-pod-autoscaler-rhel9" = "registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9" +"openshift4/ose-vsphere-cloud-controller-manager-rhel8" = "registry.redhat.io/openshift4/ose-vsphere-cloud-controller-manager-rhel8" +"openshift4/ose-vsphere-cloud-controller-manager-rhel9" = "registry.redhat.io/openshift4/ose-vsphere-cloud-controller-manager-rhel9" +"openshift4/ose-vsphere-cluster-api-controllers-rhel8" = "registry.redhat.io/openshift4/ose-vsphere-cluster-api-controllers-rhel8" +"openshift4/ose-vsphere-cluster-api-controllers-rhel9" = "registry.redhat.io/openshift4/ose-vsphere-cluster-api-controllers-rhel9" +"openshift4/ose-vsphere-problem-detector-rhel8" = "registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel8" +"openshift4/ose-vsphere-problem-detector-rhel9" = "registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel9" +"openshift4/ovirt-csi-driver-rhel7" = "registry.redhat.io/openshift4/ovirt-csi-driver-rhel7" +"openshift4/ovirt-csi-driver-rhel8-operator" = "registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator" +"openshift4/ovirt-csi-driver-rhel8" = "registry.redhat.io/openshift4/ovirt-csi-driver-rhel8" +"openshift4/ovirt-csi-driver-rhel9-operator" = "registry.redhat.io/openshift4/ovirt-csi-driver-rhel9-operator" +"openshift4/ovirt-csi-driver-rhel9" = "registry.redhat.io/openshift4/ovirt-csi-driver-rhel9" +"openshift4/performance-addon-operator-bundle-registry-container-rhel8" = "registry.redhat.io/openshift4/performance-addon-operator-bundle-registry-container-rhel8" +"openshift4/performance-addon-operator-must-gather-rhel8" = "registry.redhat.io/openshift4/performance-addon-operator-must-gather-rhel8" +"openshift4/performance-addon-rhel8-operator" = "registry.redhat.io/openshift4/performance-addon-rhel8-operator" +"openshift4/ptp-must-gather-rhel8" = "registry.redhat.io/openshift4/ptp-must-gather-rhel8" +"openshift4/ptp-must-gather-rhel9" = "registry.redhat.io/openshift4/ptp-must-gather-rhel9" +"openshift4/recert-rhel9" = "registry.redhat.io/openshift4/recert-rhel9" +"openshift4/sriov-cni-rhel9" = "registry.redhat.io/openshift4/sriov-cni-rhel9" +"openshift4/topology-aware-lifecycle-manager-aztp-rhel9" = "registry.redhat.io/openshift4/topology-aware-lifecycle-manager-aztp-rhel9" +"openshift4/topology-aware-lifecycle-manager-operator-bundle" = "registry.redhat.io/openshift4/topology-aware-lifecycle-manager-operator-bundle" +"openshift4/topology-aware-lifecycle-manager-precache-rhel9" = "registry.redhat.io/openshift4/topology-aware-lifecycle-manager-precache-rhel9" +"openshift4/topology-aware-lifecycle-manager-recovery-rhel9" = "registry.redhat.io/openshift4/topology-aware-lifecycle-manager-recovery-rhel9" +"openshift4/topology-aware-lifecycle-manager-rhel9-operator" = "registry.redhat.io/openshift4/topology-aware-lifecycle-manager-rhel9-operator" +"openshift4-wincw/windows-machine-config-operator-bundle" = "registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle" +"openshift4-wincw/windows-machine-config-rhel8-operator" = "registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator" +"openshift4-wincw/windows-machine-config-rhel9-operator" = "registry.redhat.io/openshift4-wincw/windows-machine-config-rhel9-operator" +"openshift4/ztp-site-generate-rhel8" = "registry.redhat.io/openshift4/ztp-site-generate-rhel8" +"openshift_5gcore/amf" = "shirley6603.top:5901/openshift_5gcore/amf" +"openshift_5gcore/ausf" = "shirley6603.top:5901/openshift_5gcore/ausf" +"openshift_5gcore/pcf" = "shirley6603.top:5901/openshift_5gcore/pcf" +"openshift_5gcore/smf" = "shirley6603.top:5901/openshift_5gcore/smf" +"openshift_5gcore/udm" = "shirley6603.top:5901/openshift_5gcore/udm" +"openshift_5gcore/upf" = "shirley6603.top:5901/openshift_5gcore/upf" +"openshift-builds/openshift-builds-controller-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel8" +"openshift-builds/openshift-builds-controller-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-controller-rhel9" +"openshift-builds/openshift-builds-git-cloner-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel8" +"openshift-builds/openshift-builds-git-cloner-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-git-cloner-rhel9" +"openshift-builds/openshift-builds-image-bundler-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel8" +"openshift-builds/openshift-builds-image-bundler-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-image-bundler-rhel9" +"openshift-builds/openshift-builds-image-processing-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel8" +"openshift-builds/openshift-builds-image-processing-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-image-processing-rhel9" +"openshift-builds/openshift-builds-operator-bundle" = "registry.redhat.io/openshift-builds/openshift-builds-operator-bundle" +"openshift-builds/openshift-builds-rhel8-operator" = "registry.redhat.io/openshift-builds/openshift-builds-rhel8-operator" +"openshift-builds/openshift-builds-rhel9-operator" = "registry.redhat.io/openshift-builds/openshift-builds-rhel9-operator" +"openshift-builds/openshift-builds-shared-resource-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-rhel9" +"openshift-builds/openshift-builds-shared-resource-webhook-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-shared-resource-webhook-rhel9" +"openshift-builds/openshift-builds-triggers-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-triggers-rhel8" +"openshift-builds/openshift-builds-waiters-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel8" +"openshift-builds/openshift-builds-waiters-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-waiters-rhel9" +"openshift-builds/openshift-builds-webhook-rhel8" = "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel8" +"openshift-builds/openshift-builds-webhook-rhel9" = "registry.redhat.io/openshift-builds/openshift-builds-webhook-rhel9" +"openshift-gitops-1/argocd-rhel8" = "registry.redhat.io/openshift-gitops-1/argocd-rhel8" +"openshift-gitops-1/console-plugin-rhel8" = "registry.redhat.io/openshift-gitops-1/console-plugin-rhel8" +"openshift-gitops-1/dex-rhel8" = "registry.redhat.io/openshift-gitops-1/dex-rhel8" +"openshift-gitops-1/gitops-operator-bundle" = "registry.redhat.io/openshift-gitops-1/gitops-operator-bundle" +"openshift-gitops-1/gitops-rhel8-operator" = "registry.redhat.io/openshift-gitops-1/gitops-rhel8-operator" +"openshift-gitops-1/gitops-rhel8" = "registry.redhat.io/openshift-gitops-1/gitops-rhel8" +"openshift-gitops-1/kam-delivery-rhel8" = "registry.redhat.io/openshift-gitops-1/kam-delivery-rhel8" +"openshift-logging/cluster-logging-operator-bundle" = "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle" +"openshift-logging/cluster-logging-rhel8-operator" = "registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator" +"openshift-logging/cluster-logging-rhel9-operator" = "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator" +"openshift-logging/elasticsearch6-rhel8" = "registry.redhat.io/openshift-logging/elasticsearch6-rhel8" +"openshift-logging/elasticsearch6-rhel9" = "registry.redhat.io/openshift-logging/elasticsearch6-rhel9" +"openshift-logging/elasticsearch-operator-bundle" = "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle" +"openshift-logging/elasticsearch-proxy-rhel8" = "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8" +"openshift-logging/elasticsearch-proxy-rhel9" = "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9" +"openshift-logging/elasticsearch-rhel8-operator" = "registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator" +"openshift-logging/elasticsearch-rhel9-operator" = "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator" +"openshift-logging/eventrouter-rhel8" = "registry.redhat.io/openshift-logging/eventrouter-rhel8" +"openshift-logging/eventrouter-rhel9" = "registry.redhat.io/openshift-logging/eventrouter-rhel9" +"openshift-logging/fluentd-rhel8" = "registry.redhat.io/openshift-logging/fluentd-rhel8" +"openshift-logging/fluentd-rhel9" = "registry.redhat.io/openshift-logging/fluentd-rhel9" +"openshift-logging/kibana6-rhel8" = "registry.redhat.io/openshift-logging/kibana6-rhel8" +"openshift-logging/log-file-metric-exporter-rhel8" = "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8" +"openshift-logging/log-file-metric-exporter-rhel9" = "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9" +"openshift-logging/logging-curator5-rhel8" = "registry.redhat.io/openshift-logging/logging-curator5-rhel8" +"openshift-logging/logging-curator5-rhel9" = "registry.redhat.io/openshift-logging/logging-curator5-rhel9" +"openshift-logging/logging-loki-rhel8" = "registry.redhat.io/openshift-logging/logging-loki-rhel8" +"openshift-logging/logging-loki-rhel9" = "registry.redhat.io/openshift-logging/logging-loki-rhel9" +"openshift-logging/logging-view-plugin-rhel8" = "registry.redhat.io/openshift-logging/logging-view-plugin-rhel8" +"openshift-logging/logging-view-plugin-rhel9" = "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9" +"openshift-logging/loki-operator-bundle" = "registry.redhat.io/openshift-logging/loki-operator-bundle" +"openshift-logging/loki-rhel8-operator" = "registry.redhat.io/openshift-logging/loki-rhel8-operator" +"openshift-logging/loki-rhel9-operator" = "registry.redhat.io/openshift-logging/loki-rhel9-operator" +"openshift-logging/lokistack-gateway-rhel8" = "registry.redhat.io/openshift-logging/lokistack-gateway-rhel8" +"openshift-logging/lokistack-gateway-rhel9" = "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9" +"openshift-logging/opa-openshift-rhel8" = "registry.redhat.io/openshift-logging/opa-openshift-rhel8" +"openshift-logging/opa-openshift-rhel9" = "registry.redhat.io/openshift-logging/opa-openshift-rhel9" +"openshift-logging/vector-rhel8" = "registry.redhat.io/openshift-logging/vector-rhel8" +"openshift-logging/vector-rhel9" = "registry.redhat.io/openshift-logging/vector-rhel9" +"openshift/mirror-registry-rhel8" = "registry.redhat.io/openshift/mirror-registry-rhel8" +"openshift-pipelines/pipelines-chains-controller-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-chains-controller-rhel8" +"openshift-pipelines/pipelines-cli-opc-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-cli-opc-rhel8" +"openshift-pipelines/pipelines-cli-tkn-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-cli-tkn-rhel8" +"openshift-pipelines/pipelines-console-plugin-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-console-plugin-rhel8" +"openshift-pipelines/pipelines-controller-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-controller-rhel8" +"openshift-pipelines/pipelines-entrypoint-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-entrypoint-rhel8" +"openshift-pipelines/pipelines-events-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-events-rhel8" +"openshift-pipelines/pipelines-git-init-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-git-init-rhel8" +"openshift-pipelines/pipelines-hub-api-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-hub-api-rhel8" +"openshift-pipelines/pipelines-hub-db-migration-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-hub-db-migration-rhel8" +"openshift-pipelines/pipelines-hub-ui-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-hub-ui-rhel8" +"openshift-pipelines/pipelines-imagedigestexporter-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-imagedigestexporter-rhel8" +"openshift-pipelines/pipelines-kubeconfigwriter-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-kubeconfigwriter-rhel8" +"openshift-pipelines/pipelines-manual-approval-gate-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-manual-approval-gate-rhel8" +"openshift-pipelines/pipelines-nop-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-nop-rhel8" +"openshift-pipelines/pipelines-operator-bundle" = "registry.redhat.io/openshift-pipelines/pipelines-operator-bundle" +"openshift-pipelines/pipelines-operator-proxy-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-operator-proxy-rhel8" +"openshift-pipelines/pipelines-operator-webhook-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-operator-webhook-rhel8" +"openshift-pipelines/pipelines-pipelines-as-code-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-pipelines-as-code-rhel8" +"openshift-pipelines/pipelines-pullrequest-init-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-pullrequest-init-rhel8" +"openshift-pipelines/pipelines-resolvers-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-resolvers-rhel8" +"openshift-pipelines/pipelines-results-api-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-results-api-rhel8" +"openshift-pipelines/pipelines-results-watcher-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-results-watcher-rhel8" +"openshift-pipelines/pipelines-rhel8-operator" = "registry.redhat.io/openshift-pipelines/pipelines-rhel8-operator" +"openshift-pipelines/pipelines-serve-tkn-cli-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-serve-tkn-cli-rhel8" +"openshift-pipelines/pipelines-triggers-controller-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-triggers-controller-rhel8" +"openshift-pipelines/pipelines-triggers-core-interceptors-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-triggers-core-interceptors-rhel8" +"openshift-pipelines/pipelines-triggers-eventlistenersink-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-triggers-eventlistenersink-rhel8" +"openshift-pipelines/pipelines-triggers-webhook-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-triggers-webhook-rhel8" +"openshift-pipelines/pipelines-webhook-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-webhook-rhel8" +"openshift-pipelines/pipelines-workingdirinit-rhel8" = "registry.redhat.io/openshift-pipelines/pipelines-workingdirinit-rhel8" +"openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9" +"openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9" +"openshift-sandboxed-containers/osc-monitor-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9" +"openshift-sandboxed-containers/osc-must-gather-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9" +"openshift-sandboxed-containers/osc-operator-bundle" = "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle" +"openshift-sandboxed-containers/osc-podvm-builder-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9" +"openshift-sandboxed-containers/osc-podvm-payload-rhel9" = "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9" +"openshift-sandboxed-containers/osc-rhel9-operator" = "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator" +"openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle" = "registry.redhat.io/openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle" +"openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8" = "registry.redhat.io/openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8" +"openshift-secondary-scheduler-operator/secondary-scheduler-rhel9-operator" = "registry.redhat.io/openshift-secondary-scheduler-operator/secondary-scheduler-rhel9-operator" +"openshift-serverless-1/client-kn-rhel8" = "registry.redhat.io/openshift-serverless-1/client-kn-rhel8" +"openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8" +"openshift-serverless-1/eventing-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8" +"openshift-serverless-1/eventing-in-memory-channel-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8" +"openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8" +"openshift-serverless-1/eventing-istio-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-istio-controller-rhel8" +"openshift-serverless-1/eventing-kafka-broker-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-controller-rhel8" +"openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8" +"openshift-serverless-1/eventing-kafka-broker-post-install-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-post-install-rhel8" +"openshift-serverless-1/eventing-kafka-broker-receiver-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-receiver-rhel8" +"openshift-serverless-1/eventing-kafka-broker-webhook-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-webhook-rhel8" +"openshift-serverless-1/eventing-mtbroker-filter-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8" +"openshift-serverless-1/eventing-mtbroker-ingress-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8" +"openshift-serverless-1/eventing-mtchannel-broker-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8" +"openshift-serverless-1/eventing-mtping-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8" +"openshift-serverless-1/eventing-storage-version-migration-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8" +"openshift-serverless-1/eventing-webhook-rhel8" = "registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8" +"openshift-serverless-1/func-utils-rhel8" = "registry.redhat.io/openshift-serverless-1/func-utils-rhel8" +"openshift-serverless-1/ingress-rhel8-operator" = "registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator" +"openshift-serverless-1/knative-rhel8-operator" = "registry.redhat.io/openshift-serverless-1/knative-rhel8-operator" +"openshift-serverless-1/kn-cli-artifacts-rhel8" = "registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8" +"openshift-serverless-1/kourier-control-rhel8" = "registry.redhat.io/openshift-serverless-1/kourier-control-rhel8" +"openshift-serverless-1/logic-data-index-ephemeral-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-data-index-ephemeral-rhel8" +"openshift-serverless-1/logic-data-index-postgresql-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-data-index-postgresql-rhel8" +"openshift-serverless-1/logic-jobs-service-ephemeral-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-jobs-service-ephemeral-rhel8" +"openshift-serverless-1/logic-jobs-service-postgresql-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-jobs-service-postgresql-rhel8" +"openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8" +"openshift-serverless-1/logic-operator-bundle" = "registry.redhat.io/openshift-serverless-1/logic-operator-bundle" +"openshift-serverless-1/logic-rhel8-operator" = "registry.redhat.io/openshift-serverless-1/logic-rhel8-operator" +"openshift-serverless-1/logic-swf-builder-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-swf-builder-rhel8" +"openshift-serverless-1/logic-swf-devmode-rhel8" = "registry.redhat.io/openshift-serverless-1/logic-swf-devmode-rhel8" +"openshift-serverless-1/net-istio-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8" +"openshift-serverless-1/net-istio-webhook-rhel8" = "registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8" +"openshift-serverless-1/serverless-operator-bundle" = "registry.redhat.io/openshift-serverless-1/serverless-operator-bundle" +"openshift-serverless-1/serverless-rhel8-operator" = "registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator" +"openshift-serverless-1/serving-activator-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-activator-rhel8" +"openshift-serverless-1/serving-autoscaler-hpa-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8" +"openshift-serverless-1/serving-autoscaler-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8" +"openshift-serverless-1/serving-controller-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-controller-rhel8" +"openshift-serverless-1/serving-domain-mapping-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8" +"openshift-serverless-1/serving-domain-mapping-webhook-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8" +"openshift-serverless-1/serving-queue-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-queue-rhel8" +"openshift-serverless-1/serving-storage-version-migration-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8" +"openshift-serverless-1/serving-webhook-rhel8" = "registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8" +"openshift-serverless-1/svls-must-gather-rhel8" = "registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8" +"openshift-service-mesh/3scale-auth-wasm-rhel8" = "registry.redhat.io/openshift-service-mesh/3scale-auth-wasm-rhel8" +"openshift-service-mesh/grafana-rhel8" = "registry.redhat.io/openshift-service-mesh/grafana-rhel8" +"openshift-service-mesh/istio-cni-rhel8" = "registry.redhat.io/openshift-service-mesh/istio-cni-rhel8" +"openshift-service-mesh/istio-must-gather-rhel8" = "registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8" +"openshift-service-mesh/istio-rhel8-operator-metadata" = "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator-metadata" +"openshift-service-mesh/istio-rhel8-operator" = "registry.redhat.io/openshift-service-mesh/istio-rhel8-operator" +"openshift-service-mesh/kiali-ossmc-rhel8" = "registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8" +"openshift-service-mesh/kiali-prod-operator-metadata-rhel8" = "registry.redhat.io/openshift-service-mesh/kiali-prod-operator-metadata-rhel8" +"openshift-service-mesh/kiali-rhel8-operator" = "registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator" +"openshift-service-mesh/kiali-rhel8" = "registry.redhat.io/openshift-service-mesh/kiali-rhel8" +"openshift-service-mesh/pilot-rhel8" = "registry.redhat.io/openshift-service-mesh/pilot-rhel8" +"openshift-service-mesh/prometheus-rhel8" = "registry.redhat.io/openshift-service-mesh/prometheus-rhel8" +"openshift-service-mesh/proxyv2-rhel8" = "registry.redhat.io/openshift-service-mesh/proxyv2-rhel8" +"openshift-service-mesh/ratelimit-rhel8" = "registry.redhat.io/openshift-service-mesh/ratelimit-rhel8" +"openshift-update-service/cincinnati-operator-bundle" = "registry.redhat.io/openshift-update-service/cincinnati-operator-bundle" +"openshift-update-service/openshift-update-service-rhel8-operator" = "registry.redhat.io/openshift-update-service/openshift-update-service-rhel8-operator" +"openshift-update-service/openshift-update-service-rhel8" = "registry.redhat.io/openshift-update-service/openshift-update-service-rhel8" +"openziti/ziti-host-v0" = "registry.connect.redhat.com/openziti/ziti-host-v0" +"operatr-io/kpow-operator-bundle" = "registry.connect.redhat.com/operatr-io/kpow-operator-bundle" +"operatr-io/kpow" = "registry.connect.redhat.com/operatr-io/kpow" +"opscruise/opscruise-awsgw" = "registry.connect.redhat.com/opscruise/opscruise-awsgw" +"opscruise/opscruise-azuregw" = "registry.connect.redhat.com/opscruise/opscruise-azuregw" +"opscruise/opscruise-gcpgw" = "registry.connect.redhat.com/opscruise/opscruise-gcpgw" +"opscruise/opscruise-k8sgw" = "registry.connect.redhat.com/opscruise/opscruise-k8sgw" +"opscruise/opscruise-loggw" = "registry.connect.redhat.com/opscruise/opscruise-loggw" +"opscruise/opscruise-node-exporter" = "registry.connect.redhat.com/opscruise/opscruise-node-exporter" +"opscruise/opscruise-promgw" = "registry.connect.redhat.com/opscruise/opscruise-promgw" +"opscruise/opscruise-tracegw" = "registry.connect.redhat.com/opscruise/opscruise-tracegw" +"opsmx/spinnaker-operator-bundle" = "registry.connect.redhat.com/opsmx/spinnaker-operator-bundle" +"opsmx/spinnaker-operator" = "registry.connect.redhat.com/opsmx/spinnaker-operator" +"opsmx/ubi8-oes-clouddriver" = "registry.connect.redhat.com/opsmx/ubi8-oes-clouddriver" +"opsmx/ubi8-oes-deck" = "registry.connect.redhat.com/opsmx/ubi8-oes-deck" +"opsmx/ubi8-oes-echo" = "registry.connect.redhat.com/opsmx/ubi8-oes-echo" +"opsmx/ubi8-oes-fiat" = "registry.connect.redhat.com/opsmx/ubi8-oes-fiat" +"opsmx/ubi8-oes-front50" = "registry.connect.redhat.com/opsmx/ubi8-oes-front50" +"opsmx/ubi8-oes-gate" = "registry.connect.redhat.com/opsmx/ubi8-oes-gate" +"opsmx/ubi8-oes-igor" = "registry.connect.redhat.com/opsmx/ubi8-oes-igor" +"opsmx/ubi8-oes-kayenta" = "registry.connect.redhat.com/opsmx/ubi8-oes-kayenta" +"opsmx/ubi8-oes-minio" = "registry.connect.redhat.com/opsmx/ubi8-oes-minio" +"opsmx/ubi8-oes-monitoring" = "registry.connect.redhat.com/opsmx/ubi8-oes-monitoring" +"opsmx/ubi8-oes-operator-halyard" = "registry.connect.redhat.com/opsmx/ubi8-oes-operator-halyard" +"opsmx/ubi8-oes-orca" = "registry.connect.redhat.com/opsmx/ubi8-oes-orca" +"opsmx/ubi8-oes-redis" = "registry.connect.redhat.com/opsmx/ubi8-oes-redis" +"opsmx/ubi8-oes-rosco" = "registry.connect.redhat.com/opsmx/ubi8-oes-rosco" +"opsmx/ubi8-spinnaker-operator" = "registry.connect.redhat.com/opsmx/ubi8-spinnaker-operator" +"orientdb/orientdb-community" = "registry.connect.redhat.com/orientdb/orientdb-community" +"orionx/operator-manager" = "registry.connect.redhat.com/orionx/operator-manager" +"oscargcervantes/rtf-agent-operator" = "registry.connect.redhat.com/oscargcervantes/rtf-agent-operator" +"oscargcervantes/runtime-fabric-operator" = "registry.connect.redhat.com/oscargcervantes/runtime-fabric-operator" +"ospid-627904f807c06bb948c71e73/habana-ai-operator" = "registry.connect.redhat.com/ospid-627904f807c06bb948c71e73/habana-ai-operator" +"ospid-627904f807c06bb948c71e73/habana-ai" = "registry.connect.redhat.com/ospid-627904f807c06bb948c71e73/habana-ai" +"outcoldsolutions/collectorforopenshift" = "registry.connect.redhat.com/outcoldsolutions/collectorforopenshift" +"outlyer/agent2" = "registry.connect.redhat.com/outlyer/agent2" +"owldq/owldq-operator" = "registry.connect.redhat.com/owldq/owldq-operator" +"owl-hadoop-cdh/owl-agent" = "gcr.io/owl-hadoop-cdh/owl-agent" +"owl-hadoop-cdh/owl-web" = "gcr.io/owl-hadoop-cdh/owl-web" +"owl-hadoop-cdh/postgres" = "gcr.io/owl-hadoop-cdh/postgres" +"owl-hadoop-cdh/spark" = "gcr.io/owl-hadoop-cdh/spark" +"pachyderm/backup-handler" = "registry.connect.redhat.com/pachyderm/backup-handler" +"pachyderm/console" = "registry.connect.redhat.com/pachyderm/console" +"pachyderm/etcd" = "registry.connect.redhat.com/pachyderm/etcd" +"pachyderm/init-utils" = "registry.connect.redhat.com/pachyderm/init-utils" +"pachyderm/pachd" = "registry.connect.redhat.com/pachyderm/pachd" +"pachyderm/pachyderm-bundle" = "registry.connect.redhat.com/pachyderm/pachyderm-bundle" +"pachyderm/pachyderm-bundle-rhmp" = "registry.connect.redhat.com/pachyderm/pachyderm-bundle-rhmp" +"pachyderm/pachyderm-operator" = "registry.connect.redhat.com/pachyderm/pachyderm-operator" +"pachyderm/pgbouncer" = "registry.connect.redhat.com/pachyderm/pgbouncer" +"pachyderm/worker" = "registry.connect.redhat.com/pachyderm/worker" +"paloalto/not-applicable" = "registry.connect.redhat.com/paloalto/not-applicable" +"paloalto/pcc-operator" = "registry.connect.redhat.com/paloalto/pcc-operator" +"pcashx/primecashx" = "registry.connect.redhat.com/pcashx/primecashx" +"pennant_tech/plf-api" = "quay.io/pennant_tech/plf-api" +"pennant_tech/plf-hcm" = "quay.io/pennant_tech/plf-hcm" +"pennant_tech/plf-web" = "quay.io/pennant_tech/plf-web" +"perceptilabs/perceptilabs-core-1" = "registry.connect.redhat.com/perceptilabs/perceptilabs-core-1" +"perceptilabs/perceptilabs-frontend-1" = "registry.connect.redhat.com/perceptilabs/perceptilabs-frontend-1" +"perceptilabs/perceptilabs-operator-bundle" = "registry.connect.redhat.com/perceptilabs/perceptilabs-operator-bundle" +"perceptilabs/perceptilabs-operator" = "registry.connect.redhat.com/perceptilabs/perceptilabs-operator" +"perceptilabs/perceptilabs-rygg-1" = "registry.connect.redhat.com/perceptilabs/perceptilabs-rygg-1" +"percona/percona-postgresql-operator-bundle-marketplace" = "registry.connect.redhat.com/percona/percona-postgresql-operator-bundle-marketplace" +"percona/percona-postgresql-operator-bundle" = "registry.connect.redhat.com/percona/percona-postgresql-operator-bundle" +"percona/percona-postgresql-operator-containers" = "registry.connect.redhat.com/percona/percona-postgresql-operator-containers" +"percona/percona-postgresql-operator" = "registry.connect.redhat.com/percona/percona-postgresql-operator" +"percona/percona-server-mongodb-operator-bundle" = "registry.connect.redhat.com/percona/percona-server-mongodb-operator-bundle" +"percona/percona-server-mongodb-operator-bundle-rhmp" = "registry.connect.redhat.com/percona/percona-server-mongodb-operator-bundle-rhmp" +"percona/percona-xtradb-cluster-operator-bundle-rhmp" = "registry.connect.redhat.com/percona/percona-xtradb-cluster-operator-bundle-rhmp" +"percona/percona-xtradb-cluster-operator" = "registry.connect.redhat.com/percona/percona-xtradb-cluster-operator" +"phoenixop/phoenix-operator-rhel7" = "docker.io/phoenixop/phoenix-operator-rhel7" +"pingcap/tidb-2point1" = "registry.connect.redhat.com/pingcap/tidb-2point1" +"pingcap/tidb-operator-1" = "registry.connect.redhat.com/pingcap/tidb-operator-1" +"pingidentity/pingaccess" = "registry.connect.redhat.com/pingidentity/pingaccess" +"pingidentity/pingfederate" = "registry.connect.redhat.com/pingidentity/pingfederate" +"portshift/clair-db" = "registry.connect.redhat.com/portshift/clair-db" +"portshift/clair" = "registry.connect.redhat.com/portshift/clair" +"portshift/dockle" = "registry.connect.redhat.com/portshift/dockle" +"portshift/gopassivedns" = "registry.connect.redhat.com/portshift/gopassivedns" +"portshift/k8s-upgrader" = "registry.connect.redhat.com/portshift/k8s-upgrader" +"portshift/klar" = "registry.connect.redhat.com/portshift/klar" +"portshift/operator-bundle" = "registry.connect.redhat.com/portshift/operator-bundle" +"portshift/operator" = "registry.connect.redhat.com/portshift/operator" +"portshift/portshift-k8s-agent" = "registry.connect.redhat.com/portshift/portshift-k8s-agent" +"portshift/portshift-kafka-authz" = "registry.connect.redhat.com/portshift/portshift-kafka-authz" +"portworx/openstorage-operator" = "registry.connect.redhat.com/portworx/openstorage-operator" +"portworx/portworx-certified-bundle" = "registry.connect.redhat.com/portworx/portworx-certified-bundle" +"portworx/px-monitor" = "registry.connect.redhat.com/portworx/px-monitor" +"prajyor925/external-repo" = "quay.io/prajyor925/external-repo" +"primekey/ejbca-ce" = "registry.connect.redhat.com/primekey/ejbca-ce" +"product/nedatabridge/nedb-data-connect-kafka/main" = "docker-proxy.nextevolution.de/product/nedatabridge/nedb-data-connect-kafka/main" +"product/nedbsap/nedbsap/master" = "docker-proxy.nextevolution.de/product/nedbsap/nedbsap/master" +"product/nees" = "docker-proxy.nextevolution.de/product/nees" +"progressoft/artemis-openshift" = "docker.io/progressoft/artemis-openshift" +"projects/ppl40-certify/ppl-admin-api-ubi8" = "quay.unit.vn/projects/ppl40-certify/ppl-admin-api-ubi8" +"projects/ppl40-certify/ppl-api-ubi8" = "quay.unit.vn/projects/ppl40-certify/ppl-api-ubi8" +"projects/ppl40-certify/rh/ppl-admin-fe-ubi8" = "quay.unit.vn/projects/ppl40-certify/rh/ppl-admin-fe-ubi8" +"projects/ppl40-certify/rh/ppl-api-fe-ubi8" = "quay.unit.vn/projects/ppl40-certify/rh/ppl-api-fe-ubi8" +"prophetstor/alameda-admission-ubi" = "registry.connect.redhat.com/prophetstor/alameda-admission-ubi" +"prophetstor/alameda-ai-dispatcher" = "registry.connect.redhat.com/prophetstor/alameda-ai-dispatcher" +"prophetstor/alameda-ai" = "registry.connect.redhat.com/prophetstor/alameda-ai" +"prophetstor/alameda-analyzer-ubi" = "registry.connect.redhat.com/prophetstor/alameda-analyzer-ubi" +"prophetstor/alameda-datahub-ubi" = "registry.connect.redhat.com/prophetstor/alameda-datahub-ubi" +"prophetstor/alameda-evictioner-ubi" = "registry.connect.redhat.com/prophetstor/alameda-evictioner-ubi" +"prophetstor/alameda-executor-ubi" = "registry.connect.redhat.com/prophetstor/alameda-executor-ubi" +"prophetstor/alameda-grafana" = "registry.connect.redhat.com/prophetstor/alameda-grafana" +"prophetstor/alameda-influxdb" = "registry.connect.redhat.com/prophetstor/alameda-influxdb" +"prophetstor/alameda-notifier-ubi" = "registry.connect.redhat.com/prophetstor/alameda-notifier-ubi" +"prophetstor/alameda-operator-ubi" = "registry.connect.redhat.com/prophetstor/alameda-operator-ubi" +"prophetstor/alameda-rabbitmq" = "registry.connect.redhat.com/prophetstor/alameda-rabbitmq" +"prophetstor/alameda-recommender-ubi" = "registry.connect.redhat.com/prophetstor/alameda-recommender-ubi" +"prophetstor/fedemeter-api-ubi" = "registry.connect.redhat.com/prophetstor/fedemeter-api-ubi" +"prophetstor/fedemeter-influxdb" = "registry.connect.redhat.com/prophetstor/fedemeter-influxdb" +"prophetstor/federatorai-agent-app" = "registry.connect.redhat.com/prophetstor/federatorai-agent-app" +"prophetstor/federatorai-agent-gpu" = "registry.connect.redhat.com/prophetstor/federatorai-agent-gpu" +"prophetstor/federatorai-agent-preloader" = "registry.connect.redhat.com/prophetstor/federatorai-agent-preloader" +"prophetstor/federatorai-agent-ubi" = "registry.connect.redhat.com/prophetstor/federatorai-agent-ubi" +"prophetstor/federatorai-dashboard-backend" = "registry.connect.redhat.com/prophetstor/federatorai-dashboard-backend" +"prophetstor/federatorai-dashboard-frontend" = "registry.connect.redhat.com/prophetstor/federatorai-dashboard-frontend" +"prophetstor/federatorai-data-adapter" = "registry.connect.redhat.com/prophetstor/federatorai-data-adapter" +"prophetstor/federatorai-operator-bundle-marketplace" = "registry.connect.redhat.com/prophetstor/federatorai-operator-bundle-marketplace" +"prophetstor/federatorai-operator-bundle" = "registry.connect.redhat.com/prophetstor/federatorai-operator-bundle" +"prophetstor/federatorai-operator" = "registry.connect.redhat.com/prophetstor/federatorai-operator" +"prophetstor/federatorai-rest-ubi" = "registry.connect.redhat.com/prophetstor/federatorai-rest-ubi" +"prophetstor/federatorai-tool" = "registry.connect.redhat.com/prophetstor/federatorai-tool" +"public-api-service" = "bds-docker-release.jfrog.io/public-api-service" +"public/venafi-images/vcp-operator" = "registry.venafi.cloud/public/venafi-images/vcp-operator" +"pue/oracle-database-operator" = "registry.connect.redhat.com/pue/oracle-database-operator" +"purestorage/openstack-cinder-volume-pure-rhosp-13" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-13" +"purestorage/openstack-cinder-volume-pure-rhosp-14" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-14" +"purestorage/openstack-cinder-volume-pure-rhosp-15" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-15" +"purestorage/openstack-cinder-volume-pure-rhosp-16-1" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-16-1" +"purestorage/openstack-cinder-volume-pure-rhosp-16-2" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-16-2" +"purestorage/openstack-cinder-volume-pure-rhosp-16" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-16" +"purestorage/openstack-cinder-volume-pure-rhosp-17-0" = "registry.connect.redhat.com/purestorage/openstack-cinder-volume-pure-rhosp-17-0" +"quarkus/mandrel-23-rhel8" = "registry.access.redhat.com/quarkus/mandrel-23-rhel8" +"quarkus/mandrel-for-jdk-21-rhel8" = "registry.access.redhat.com/quarkus/mandrel-for-jdk-21-rhel8" +"quay/clair-rhel8" = "registry.redhat.io/quay/clair-rhel8" +"quay/quay-bridge-operator-bundle" = "registry.redhat.io/quay/quay-bridge-operator-bundle" +"quay/quay-bridge-operator-rhel8" = "registry.redhat.io/quay/quay-bridge-operator-rhel8" +"quay/quay-bridge-rhel9-operator" = "registry.redhat.io/quay/quay-bridge-rhel9-operator" +"quay/quay-builder-qemu-rhcos-rhel8" = "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8" +"quay/quay-builder-rhel8" = "registry.redhat.io/quay/quay-builder-rhel8" +"quay/quay-container-security-operator-bundle" = "registry.redhat.io/quay/quay-container-security-operator-bundle" +"quay/quay-container-security-operator-rhel8" = "registry.redhat.io/quay/quay-container-security-operator-rhel8" +"quay/quay-container-security-rhel8-operator" = "registry.redhat.io/quay/quay-container-security-rhel8-operator" +"quay/quay-operator-bundle" = "registry.redhat.io/quay/quay-operator-bundle" +"quay/quay-operator-rhel8" = "registry.redhat.io/quay/quay-operator-rhel8" +"quay/quay-rhel8-operator" = "registry.redhat.io/quay/quay-rhel8-operator" +"quay/quay-rhel8" = "registry.redhat.io/quay/quay-rhel8" +"questlabs/alloy-docs" = "registry.gitlab.com/questlabs/alloy-docs" +"questlabs/alloy-frontend" = "registry.gitlab.com/questlabs/alloy-frontend" +"questlabs/alloy-notification" = "registry.gitlab.com/questlabs/alloy-notification" +"questlabs/alloy-operator-image" = "registry.connect.redhat.com/questlabs/alloy-operator-image" +"questlabs/alloy-operator" = "registry.connect.redhat.com/questlabs/alloy-operator" +"questlabs/alloy-workflow" = "registry.gitlab.com/questlabs/alloy-workflow" +"questlabs/data-quality-quarkus" = "registry.gitlab.com/questlabs/data-quality-quarkus" +"r6security/phoenix-operator" = "registry.connect.redhat.com/r6security/phoenix-operator" +"r6security/phoenix-operatorv071" = "registry.connect.redhat.com/r6security/phoenix-operatorv071" +"rafay/cluster-controller-redhat" = "registry.rafay-edge.net/rafay/cluster-controller-redhat" +"rafay/rafay-connector-redhat" = "registry.rafay-edge.net/rafay/rafay-connector-redhat" +"rafay/rafay-kubectl" = "registry.rafay-edge.net/rafay/rafay-kubectl" +"rafay/rafay-relay-agent-redhat" = "registry.rafay-edge.net/rafay/rafay-relay-agent-redhat" +"randoli/app-insights-operator" = "registry.connect.redhat.com/randoli/app-insights-operator" +"randoli/app-insights" = "registry.connect.redhat.com/randoli/app-insights" +"r/anodot/prometheus-remote-write" = "hub.docker.com/r/anodot/prometheus-remote-write" +"raysyncsup/raysync" = "docker.io/raysyncsup/raysync" +"rcem/alerter" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/alerter" +"rcem/featurefactory" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/featurefactory" +"rcem/helmtest" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/helmtest" +"rcem/rcem-aip" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/rcem-aip" +"rcem/tracer" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/tracer" +"rcem/tracerwireshark" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/rcem/tracerwireshark" +"react_admin_panel_ubi" = "pegpanamaxinc.azurecr.io/react_admin_panel_ubi" +"realmethods/realmethods12" = "registry.connect.redhat.com/realmethods/realmethods12" +"rebaca/abot-analytics" = "registry.connect.redhat.com/rebaca/abot-analytics" +"rebaca/abot-baseimage" = "registry.connect.redhat.com/rebaca/abot-baseimage" +"rebaca/abot-bdd" = "registry.connect.redhat.com/rebaca/abot-bdd" +"rebaca/abot-gui" = "registry.connect.redhat.com/rebaca/abot-gui" +"rebaca/abot-mongodb" = "registry.connect.redhat.com/rebaca/abot-mongodb" +"rebaca/abot-nginx" = "registry.connect.redhat.com/rebaca/abot-nginx" +"rebaca/abot-operator-bundle" = "registry.connect.redhat.com/rebaca/abot-operator-bundle" +"rebaca/abot-operator" = "registry.connect.redhat.com/rebaca/abot-operator" +"rebaca/abot-rabbitmq" = "registry.connect.redhat.com/rebaca/abot-rabbitmq" +"rebaca/abot-stacks" = "registry.connect.redhat.com/rebaca/abot-stacks" +"rebaca/abot-tcpdump" = "registry.connect.redhat.com/rebaca/abot-tcpdump" +"redhat/cnbr-core" = "harbor.hatech.com.cn:31009/redhat/cnbr-core" +"redhat/istorm-cm" = "harbor.hatech.com.cn:31009/redhat/istorm-cm" +"redhat/istorm-dr" = "harbor.hatech.com.cn:31009/redhat/istorm-dr" +"redhat-isv-containers/6569461370d0ddf6d824f1c8" = "quay.io/redhat-isv-containers/6569461370d0ddf6d824f1c8" +"redhat-isv-containers/65699ce040576c7356c090dc" = "quay.io/redhat-isv-containers/65699ce040576c7356c090dc" +"redhat-isv-containers/6569ac1370d0ddf6d8268a37" = "quay.io/redhat-isv-containers/6569ac1370d0ddf6d8268a37" +"redhat-isv-containers/656b30d2db0be9703fb40345" = "quay.io/redhat-isv-containers/656b30d2db0be9703fb40345" +"redhat-isv-containers/656b42075a016422d6a5f03e" = "quay.io/redhat-isv-containers/656b42075a016422d6a5f03e" +"redhat-isv-containers/656b4c8974831f99737f95c1" = "quay.io/redhat-isv-containers/656b4c8974831f99737f95c1" +"redhat-isv-containers/656b4f6b8c1661e1bbf7d0ba" = "quay.io/redhat-isv-containers/656b4f6b8c1661e1bbf7d0ba" +"redhat-isv-containers/656b505c12e4ea1a43420686" = "quay.io/redhat-isv-containers/656b505c12e4ea1a43420686" +"redhat-isv-containers/656d238b70d0ddf6d83167b8" = "quay.io/redhat-isv-containers/656d238b70d0ddf6d83167b8" +"redhat-isv-containers/656d277674831f9973847961" = "quay.io/redhat-isv-containers/656d277674831f9973847961" +"redhat-isv-containers/656d284a16c3065777e1ae6c" = "quay.io/redhat-isv-containers/656d284a16c3065777e1ae6c" +"redhat-isv-containers/656d2a0b19954c72013b862c" = "quay.io/redhat-isv-containers/656d2a0b19954c72013b862c" +"redhat-isv-containers/656d2fd519954c72013b9b05" = "quay.io/redhat-isv-containers/656d2fd519954c72013b9b05" +"redhat-isv-containers/656d3345a269ce71b3051b3b" = "quay.io/redhat-isv-containers/656d3345a269ce71b3051b3b" +"redhat-isv-containers/656fcf27ac55e2060b11bb01" = "quay.io/redhat-isv-containers/656fcf27ac55e2060b11bb01" +"redhat-isv-containers/656fcf33b86b6315fcab3199" = "quay.io/redhat-isv-containers/656fcf33b86b6315fcab3199" +"redhat-isv-containers/656fd1727611783060e52112" = "quay.io/redhat-isv-containers/656fd1727611783060e52112" +"redhat-isv-containers/656fd464804c0eca1ca07f0a" = "quay.io/redhat-isv-containers/656fd464804c0eca1ca07f0a" +"redhat-isv-containers/656fd4fe12ef2abe7742d8d7" = "quay.io/redhat-isv-containers/656fd4fe12ef2abe7742d8d7" +"redhat-isv-containers/656fd5ba3321894fa888a199" = "quay.io/redhat-isv-containers/656fd5ba3321894fa888a199" +"redhat-isv-containers/656fd6be804c0eca1ca089bb" = "quay.io/redhat-isv-containers/656fd6be804c0eca1ca089bb" +"redhat-isv-containers/656fd975244cdce2726147b1" = "quay.io/redhat-isv-containers/656fd975244cdce2726147b1" +"redhat-isv-containers/656fdb8e416587dd5339251d" = "quay.io/redhat-isv-containers/656fdb8e416587dd5339251d" +"redhat-isv-containers/656fe2dfcd7c7dd425b78019" = "quay.io/redhat-isv-containers/656fe2dfcd7c7dd425b78019" +"redhat-isv-containers/656fe432416587dd5339649e" = "quay.io/redhat-isv-containers/656fe432416587dd5339649e" +"redhat-isv-containers/656fe584b523a7a5f15d6a1e" = "quay.io/redhat-isv-containers/656fe584b523a7a5f15d6a1e" +"redhat-isv-containers/656fe6f5697f4795030db387" = "quay.io/redhat-isv-containers/656fe6f5697f4795030db387" +"redhat-isv-containers/656fec5398765237cee6ea3d" = "quay.io/redhat-isv-containers/656fec5398765237cee6ea3d" +"redhat-isv-containers/657008267611783060e62cce" = "quay.io/redhat-isv-containers/657008267611783060e62cce" +"redhat-isv-containers/6570095d12ef2abe7743dc2f" = "quay.io/redhat-isv-containers/6570095d12ef2abe7743dc2f" +"redhat-isv-containers/65700a8c244cdce272623ea9" = "quay.io/redhat-isv-containers/65700a8c244cdce272623ea9" +"redhat-isv-containers/65700aa5361c50f70c6601f6" = "quay.io/redhat-isv-containers/65700aa5361c50f70c6601f6" +"redhat-isv-containers/65700be6ac55e2060b12e20e" = "quay.io/redhat-isv-containers/65700be6ac55e2060b12e20e" +"redhat-isv-containers/65700beac99c718c0a8827db" = "quay.io/redhat-isv-containers/65700beac99c718c0a8827db" +"redhat-isv-containers/65700d3098765237cee77c03" = "quay.io/redhat-isv-containers/65700d3098765237cee77c03" +"redhat-isv-containers/65700d75697f4795030e6378" = "quay.io/redhat-isv-containers/65700d75697f4795030e6378" +"redhat-isv-containers/65700ed9d40cd072052a2192" = "quay.io/redhat-isv-containers/65700ed9d40cd072052a2192" +"redhat-isv-containers/6571cf7a7e81a39b7ff19ba5" = "quay.io/redhat-isv-containers/6571cf7a7e81a39b7ff19ba5" +"redhat-isv-containers/657811d9a5f1dcf1d363e680" = "quay.io/redhat-isv-containers/657811d9a5f1dcf1d363e680" +"redhat-isv-containers/657823d4e17f1b3194483009" = "quay.io/redhat-isv-containers/657823d4e17f1b3194483009" +"redhat-isv-containers/6578345dcd4f6988c20bdb15" = "quay.io/redhat-isv-containers/6578345dcd4f6988c20bdb15" +"redhat-isv-containers/657843a2cd4f6988c20c2237" = "quay.io/redhat-isv-containers/657843a2cd4f6988c20c2237" +"redhat-isv-containers/65784a7ecb11fa8c69b3d924" = "quay.io/redhat-isv-containers/65784a7ecb11fa8c69b3d924" +"redhat-isv-containers/65784ed80439519164005e15" = "quay.io/redhat-isv-containers/65784ed80439519164005e15" +"redhat-isv-containers/657855b66826d40bf38ddf5d" = "quay.io/redhat-isv-containers/657855b66826d40bf38ddf5d" +"redhat-isv-containers/65785955a5f1dcf1d36553d1" = "quay.io/redhat-isv-containers/65785955a5f1dcf1d36553d1" +"redhat-isv-containers/65786711c2dc53e0edbc90ac" = "quay.io/redhat-isv-containers/65786711c2dc53e0edbc90ac" +"redhat-isv-containers/6578ff48cb11fa8c69b7936d" = "quay.io/redhat-isv-containers/6578ff48cb11fa8c69b7936d" +"redhat-isv-containers/659382579fe38b78f58ee641" = "quay.io/redhat-isv-containers/659382579fe38b78f58ee641" +"redhat-isv-containers/65938550d3b97b303abf26bf" = "quay.io/redhat-isv-containers/65938550d3b97b303abf26bf" +"redhat-isv-containers/6593871b3fa5a46153268c91" = "quay.io/redhat-isv-containers/6593871b3fa5a46153268c91" +"redhat-isv-containers/659389033331c9a57c37f950" = "quay.io/redhat-isv-containers/659389033331c9a57c37f950" +"redhat-isv-containers/6593a0f2767e285f246ba4ed" = "quay.io/redhat-isv-containers/6593a0f2767e285f246ba4ed" +"redhat-isv-containers/6593cb523331c9a57c38c491" = "quay.io/redhat-isv-containers/6593cb523331c9a57c38c491" +"redhat-isv-containers/6593d2f32ef929c45e19cd12" = "quay.io/redhat-isv-containers/6593d2f32ef929c45e19cd12" +"redhat-isv-containers/6593d67d9fec273791e02b29" = "quay.io/redhat-isv-containers/6593d67d9fec273791e02b29" +"redhat-isv-containers/6593d9462ef929c45e19e2c3" = "quay.io/redhat-isv-containers/6593d9462ef929c45e19e2c3" +"redhat-isv-containers/6593dc42a6f126a7a0f4ca68" = "quay.io/redhat-isv-containers/6593dc42a6f126a7a0f4ca68" +"redhat-isv-containers/6593e10f62f81d4190ec30b2" = "quay.io/redhat-isv-containers/6593e10f62f81d4190ec30b2" +"redhat-isv-containers/6593e9d52f9c605c28bc5f1e" = "quay.io/redhat-isv-containers/6593e9d52f9c605c28bc5f1e" +"redhat-isv-containers/6593f0b39fe38b78f5904c5d" = "quay.io/redhat-isv-containers/6593f0b39fe38b78f5904c5d" +"redhat-isv-containers/659765402cb8ad8b53953985" = "quay.io/redhat-isv-containers/659765402cb8ad8b53953985" +"redhat-isv-containers/65976a9f0750222428341501" = "quay.io/redhat-isv-containers/65976a9f0750222428341501" +"redhat-isv-containers/659771454e841c3e821a3d1f" = "quay.io/redhat-isv-containers/659771454e841c3e821a3d1f" +"redhat-isv-containers/659774bbafcbb1a9c2afa84f" = "quay.io/redhat-isv-containers/659774bbafcbb1a9c2afa84f" +"redhat-isv-containers/6597a5484bc09770558123d1" = "quay.io/redhat-isv-containers/6597a5484bc09770558123d1" +"redhat-isv-containers/6597c95a0844403ed4548316" = "quay.io/redhat-isv-containers/6597c95a0844403ed4548316" +"redhat-isv-containers/6597f28d0844403ed4551b7b" = "quay.io/redhat-isv-containers/6597f28d0844403ed4551b7b" +"redhat-isv-containers/6597f3798aaf172b4d840805" = "quay.io/redhat-isv-containers/6597f3798aaf172b4d840805" +"redhat-isv-containers/65981725b910c97a7d3ed12c" = "quay.io/redhat-isv-containers/65981725b910c97a7d3ed12c" +"redhat-isv-containers/6598172f1e737e29a073f5ee" = "quay.io/redhat-isv-containers/6598172f1e737e29a073f5ee" +"redhat-isv-containers/6598187d6d5a58e028b93e97" = "quay.io/redhat-isv-containers/6598187d6d5a58e028b93e97" +"redhat-isv-containers/65981a41c5ab4e10e27cf05e" = "quay.io/redhat-isv-containers/65981a41c5ab4e10e27cf05e" +"redhat-isv-containers/65981acd8f89716795f60391" = "quay.io/redhat-isv-containers/65981acd8f89716795f60391" +"redhat-isv-containers/65981af9c5ab4e10e27cf2d3" = "quay.io/redhat-isv-containers/65981af9c5ab4e10e27cf2d3" +"redhat-isv-containers/65981bf9499b2d04ab624f0e" = "quay.io/redhat-isv-containers/65981bf9499b2d04ab624f0e" +"redhat-isv-containers/65981c236d5a58e028b94d81" = "quay.io/redhat-isv-containers/65981c236d5a58e028b94d81" +"redhat-isv-containers/65981cb14e841c3e821c9e8b" = "quay.io/redhat-isv-containers/65981cb14e841c3e821c9e8b" +"redhat-isv-containers/65981cda4e841c3e821c9efc" = "quay.io/redhat-isv-containers/65981cda4e841c3e821c9efc" +"redhat-isv-containers/659d317c3ce54d826106bb02" = "quay.io/redhat-isv-containers/659d317c3ce54d826106bb02" +"redhat-isv-containers/659d3296b69daf685ec572a9" = "quay.io/redhat-isv-containers/659d3296b69daf685ec572a9" +"redhat-isv-containers/659d3721e5a565f5d33fef00" = "quay.io/redhat-isv-containers/659d3721e5a565f5d33fef00" +"redhat-isv-containers/659d372fa5e39a3a88cdde5f" = "quay.io/redhat-isv-containers/659d372fa5e39a3a88cdde5f" +"redhat-isv-containers/659d397cc7fa9648d8841d2f" = "quay.io/redhat-isv-containers/659d397cc7fa9648d8841d2f" +"redhat-isv-containers/659d3981a5e39a3a88cdf141" = "quay.io/redhat-isv-containers/659d3981a5e39a3a88cdf141" +"redhat-isv-containers/659d3a39728ee2088f483953" = "quay.io/redhat-isv-containers/659d3a39728ee2088f483953" +"redhat-isv-containers/659d3a5d88c6b79c785ea7a8" = "quay.io/redhat-isv-containers/659d3a5d88c6b79c785ea7a8" +"redhat-isv-containers/659d3ae0021dd7ad9802aefc" = "quay.io/redhat-isv-containers/659d3ae0021dd7ad9802aefc" +"redhat-isv-containers/659d3af41333d14b27ef2771" = "quay.io/redhat-isv-containers/659d3af41333d14b27ef2771" +"redhat-isv-containers/659d4726d0126d6fc333f2a4" = "quay.io/redhat-isv-containers/659d4726d0126d6fc333f2a4" +"redhat-isv-containers/659d472eb69daf685ec5d427" = "quay.io/redhat-isv-containers/659d472eb69daf685ec5d427" +"redhat-isv-containers/659d4732a5e39a3a88ce2cb9" = "quay.io/redhat-isv-containers/659d4732a5e39a3a88ce2cb9" +"redhat-isv-containers/659d473755365bdd7a73ee3f" = "quay.io/redhat-isv-containers/659d473755365bdd7a73ee3f" +"redhat-isv-containers/659d4750a5e39a3a88ce2d3a" = "quay.io/redhat-isv-containers/659d4750a5e39a3a88ce2d3a" +"redhat-isv-containers/659d47dda5e39a3a88ce2f7f" = "quay.io/redhat-isv-containers/659d47dda5e39a3a88ce2f7f" +"redhat-isv-containers/659d47eee5a565f5d3403edb" = "quay.io/redhat-isv-containers/659d47eee5a565f5d3403edb" +"redhat-isv-containers/659d4963728ee2088f487a3a" = "quay.io/redhat-isv-containers/659d4963728ee2088f487a3a" +"redhat-isv-containers/659d497b5698ab26aad621dd" = "quay.io/redhat-isv-containers/659d497b5698ab26aad621dd" +"redhat-isv-containers/659deed1c7fa9648d8873fee" = "quay.io/redhat-isv-containers/659deed1c7fa9648d8873fee" +"redhat-isv-containers/659deedd88c6b79c7861cb53" = "quay.io/redhat-isv-containers/659deedd88c6b79c7861cb53" +"redhat-isv-containers/659def80d0126d6fc336e912" = "quay.io/redhat-isv-containers/659def80d0126d6fc336e912" +"redhat-isv-containers/659def96c7fa9648d887429c" = "quay.io/redhat-isv-containers/659def96c7fa9648d887429c" +"redhat-isv-containers/659df0c5728ee2088f4b67cf" = "quay.io/redhat-isv-containers/659df0c5728ee2088f4b67cf" +"redhat-isv-containers/659df0d555365bdd7a76e4d5" = "quay.io/redhat-isv-containers/659df0d555365bdd7a76e4d5" +"redhat-isv-containers/659df157021dd7ad9805d9e0" = "quay.io/redhat-isv-containers/659df157021dd7ad9805d9e0" +"redhat-isv-containers/659df16b3ce54d82610a11bc" = "quay.io/redhat-isv-containers/659df16b3ce54d82610a11bc" +"redhat-isv-containers/659df2267321964e8da1a5ca" = "quay.io/redhat-isv-containers/659df2267321964e8da1a5ca" +"redhat-isv-containers/659df3dfd0126d6fc336f597" = "quay.io/redhat-isv-containers/659df3dfd0126d6fc336f597" +"redhat-isv-containers/659df3fcd0126d6fc336f5f4" = "quay.io/redhat-isv-containers/659df3fcd0126d6fc336f5f4" +"redhat-isv-containers/65a8f8e5e4b4b7f8ba391180" = "quay.io/redhat-isv-containers/65a8f8e5e4b4b7f8ba391180" +"redhat-isv-containers/65a8fc948880185b80294705" = "quay.io/redhat-isv-containers/65a8fc948880185b80294705" +"redhat-isv-containers/65a8ffe8e4b4b7f8ba393307" = "quay.io/redhat-isv-containers/65a8ffe8e4b4b7f8ba393307" +"redhat-isv-containers/65a905bbfa37c7625d8238ad" = "quay.io/redhat-isv-containers/65a905bbfa37c7625d8238ad" +"redhat-isv-containers/65a9098865b5ea6b18bc5be9" = "quay.io/redhat-isv-containers/65a9098865b5ea6b18bc5be9" +"redhat-isv-containers/65a9114d8880185b80299d0a" = "quay.io/redhat-isv-containers/65a9114d8880185b80299d0a" +"redhat-isv-containers/65a9186e96c67b6383cc3db9" = "quay.io/redhat-isv-containers/65a9186e96c67b6383cc3db9" +"redhat-isv-containers/65a91b8e65b5ea6b18bcae2b" = "quay.io/redhat-isv-containers/65a91b8e65b5ea6b18bcae2b" +"redhat-isv-containers/65a9c5467fb20d02d1d74253" = "quay.io/redhat-isv-containers/65a9c5467fb20d02d1d74253" +"redhat-isv-containers/65a9c8980666a2896c23ebae" = "quay.io/redhat-isv-containers/65a9c8980666a2896c23ebae" +"redhat-isv-containers/65b48316bf3e0fbe59fbb43c" = "quay.io/redhat-isv-containers/65b48316bf3e0fbe59fbb43c" +"redhat/orion-gui-controller-all-in-one" = "harbor.virtaitech.com/redhat/orion-gui-controller-all-in-one" +"redhat/orionx-operator" = "harbor.virtaitech.com/redhat/orionx-operator" +"redhat/redhat-operator-index" = "registry.redhat.io/redhat/redhat-operator-index" +"redhat-test/test-non-hosted" = "registry.connect.redhat.com/redhat-test/test-non-hosted" +"redislabs/gesher" = "registry.connect.redhat.com/redislabs/gesher" +"redislabs/redis-enterprise-operator-bundle-marketplace" = "registry.connect.redhat.com/redislabs/redis-enterprise-operator-bundle-marketplace" +"redislabs/redis-enterprise-operator-bundle" = "registry.connect.redhat.com/redislabs/redis-enterprise-operator-bundle" +"redislabs/redis-enterprise-operator" = "registry.connect.redhat.com/redislabs/redis-enterprise-operator" +"redislabs/redis-enterprise" = "registry.connect.redhat.com/redislabs/redis-enterprise" +"redislabs/services-manager" = "registry.connect.redhat.com/redislabs/services-manager" +"redteamobile-tse/redteamobile-entitlement" = "registry.connect.redhat.com/redteamobile-tse/redteamobile-entitlement" +"regulaforensics/docreader" = "registry.connect.redhat.com/regulaforensics/docreader" +"regulaforensics/face-api" = "registry.connect.redhat.com/regulaforensics/face-api" +"r/entando/app-builder" = "registry.hub.docker.com/r/entando/app-builder" +"r/entando/entando-component-manager" = "registry.hub.docker.com/r/entando/entando-component-manager" +"r/entando/entando-k8s-app-controller" = "registry.hub.docker.com/r/entando/entando-k8s-app-controller" +"r/entando/entando-k8s-app-plugin-link-controller" = "registry.hub.docker.com/r/entando/entando-k8s-app-plugin-link-controller" +"r/entando/entando-k8s-cluster-infrastructure-controller" = "registry.hub.docker.com/r/entando/entando-k8s-cluster-infrastructure-controller" +"r/entando/entando-k8s-composite-app-controller" = "registry.hub.docker.com/r/entando/entando-k8s-composite-app-controller" +"r/entando/entando-k8s-database-service-controller" = "registry.hub.docker.com/r/entando/entando-k8s-database-service-controller" +"r/entando/entando-k8s-dbjob" = "registry.hub.docker.com/r/entando/entando-k8s-dbjob" +"r/entando/entando-k8s-keycloak-controller" = "registry.hub.docker.com/r/entando/entando-k8s-keycloak-controller" +"r/entando/entando-k8s-plugin-controller" = "registry.hub.docker.com/r/entando/entando-k8s-plugin-controller" +"r/entando/entando-k8s-service" = "registry.hub.docker.com/r/entando/entando-k8s-service" +"repository/docker/corentrepo/corent_jtrac" = "hub.docker.com/repository/docker/corentrepo/corent_jtrac" +"repository/docker/corentrepo/corentjtrac" = "hub.docker.com/repository/docker/corentrepo/corentjtrac" +"repository/docker/corentrepo/jtrac-operator" = "hub.docker.com/repository/docker/corentrepo/jtrac-operator" +"repository/docker/gigamon/gcb-cntlr" = "hub.docker.com/repository/docker/gigamon/gcb-cntlr" +"repository/docker/gigamon/gcb-http" = "hub.docker.com/repository/docker/gigamon/gcb-http" +"repository/opencloudio/ibm-monitoring-grafana-operator" = "quay.io/repository/opencloudio/ibm-monitoring-grafana-operator" +"rhacm2/acm-cluster-permission-rhel8" = "registry.redhat.io/rhacm2/acm-cluster-permission-rhel8" +"rhacm2/acm-cluster-permission-rhel9" = "registry.redhat.io/rhacm2/acm-cluster-permission-rhel9" +"rhacm2/acm-cluster-proxy-rhel8" = "registry.redhat.io/rhacm2/acm-cluster-proxy-rhel8" +"rhacm2/acm-governance-policy-addon-controller-rhel8" = "registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel8" +"rhacm2/acm-governance-policy-addon-controller-rhel9" = "registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9" +"rhacm2/acm-governance-policy-framework-addon-rhel8" = "registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel8" +"rhacm2/acm-governance-policy-framework-addon-rhel9" = "registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9" +"rhacm2/acm-grafana-rhel8" = "registry.redhat.io/rhacm2/acm-grafana-rhel8" +"rhacm2/acm-grafana-rhel9" = "registry.redhat.io/rhacm2/acm-grafana-rhel9" +"rhacm2/acm-must-gather-rhel8" = "registry.redhat.io/rhacm2/acm-must-gather-rhel8" +"rhacm2/acm-must-gather-rhel9" = "registry.redhat.io/rhacm2/acm-must-gather-rhel9" +"rhacm2/acm-prometheus-config-reloader-rhel8" = "registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel8" +"rhacm2/acm-prometheus-config-reloader-rhel9" = "registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9" +"rhacm2/acm-prometheus-rhel8" = "registry.redhat.io/rhacm2/acm-prometheus-rhel8" +"rhacm2/acm-prometheus-rhel9" = "registry.redhat.io/rhacm2/acm-prometheus-rhel9" +"rhacm2/acm-search-indexer-rhel8" = "registry.redhat.io/rhacm2/acm-search-indexer-rhel8" +"rhacm2/acm-search-indexer-rhel9" = "registry.redhat.io/rhacm2/acm-search-indexer-rhel9" +"rhacm2/acm-search-v2-api-rhel8" = "registry.redhat.io/rhacm2/acm-search-v2-api-rhel8" +"rhacm2/acm-search-v2-api-rhel9" = "registry.redhat.io/rhacm2/acm-search-v2-api-rhel9" +"rhacm2/acm-search-v2-rhel8" = "registry.redhat.io/rhacm2/acm-search-v2-rhel8" +"rhacm2/acm-search-v2-rhel9" = "registry.redhat.io/rhacm2/acm-search-v2-rhel9" +"rhacm2/acm-volsync-addon-controller-rhel8" = "registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel8" +"rhacm2/acm-volsync-addon-controller-rhel9" = "registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9" +"rhacm2/cert-policy-controller-rhel8" = "registry.redhat.io/rhacm2/cert-policy-controller-rhel8" +"rhacm2/cert-policy-controller-rhel9" = "registry.redhat.io/rhacm2/cert-policy-controller-rhel9" +"rhacm2/cluster-backup-rhel8-operator" = "registry.redhat.io/rhacm2/cluster-backup-rhel8-operator" +"rhacm2/cluster-backup-rhel9-operator" = "registry.redhat.io/rhacm2/cluster-backup-rhel9-operator" +"rhacm2/cluster-proxy-addon-rhel8" = "registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8" +"rhacm2/config-policy-controller-rhel8" = "registry.redhat.io/rhacm2/config-policy-controller-rhel8" +"rhacm2/config-policy-controller-rhel9" = "registry.redhat.io/rhacm2/config-policy-controller-rhel9" +"rhacm2/console-rhel8" = "registry.redhat.io/rhacm2/console-rhel8" +"rhacm2/console-rhel9" = "registry.redhat.io/rhacm2/console-rhel9" +"rhacm2/endpoint-monitoring-rhel8-operator" = "registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator" +"rhacm2/endpoint-monitoring-rhel9-operator" = "registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator" +"rhacm2/gatekeeper-operator-bundle" = "registry.redhat.io/rhacm2/gatekeeper-operator-bundle" +"rhacm2/gatekeeper-rhel8-operator" = "registry.redhat.io/rhacm2/gatekeeper-rhel8-operator" +"rhacm2/gatekeeper-rhel8" = "registry.redhat.io/rhacm2/gatekeeper-rhel8" +"rhacm2/governance-policy-propagator-rhel8" = "registry.redhat.io/rhacm2/governance-policy-propagator-rhel8" +"rhacm2/governance-policy-propagator-rhel9" = "registry.redhat.io/rhacm2/governance-policy-propagator-rhel9" +"rhacm2/governance-policy-spec-sync-rhel8" = "registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8" +"rhacm2/governance-policy-status-sync-rhel8" = "registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8" +"rhacm2/governance-policy-template-sync-rhel8" = "registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8" +"rhacm2/grafana-dashboard-loader-rhel8" = "registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8" +"rhacm2/grafana-dashboard-loader-rhel9" = "registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9" +"rhacm2/iam-policy-controller-rhel8" = "registry.redhat.io/rhacm2/iam-policy-controller-rhel8" +"rhacm2/iam-policy-controller-rhel9" = "registry.redhat.io/rhacm2/iam-policy-controller-rhel9" +"rhacm2/insights-client-rhel8" = "registry.redhat.io/rhacm2/insights-client-rhel8" +"rhacm2/insights-client-rhel9" = "registry.redhat.io/rhacm2/insights-client-rhel9" +"rhacm2/insights-metrics-rhel8" = "registry.redhat.io/rhacm2/insights-metrics-rhel8" +"rhacm2/insights-metrics-rhel9" = "registry.redhat.io/rhacm2/insights-metrics-rhel9" +"rhacm2/klusterlet-addon-controller-rhel8" = "registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8" +"rhacm2/klusterlet-addon-controller-rhel9" = "registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9" +"rhacm2/klusterlet-addon-rhel8-operator" = "registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator" +"rhacm2/kube-rbac-proxy-rhel8" = "registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8" +"rhacm2/kube-rbac-proxy-rhel9" = "registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9" +"rhacm2/kube-state-metrics-rhel8" = "registry.redhat.io/rhacm2/kube-state-metrics-rhel8" +"rhacm2/kube-state-metrics-rhel9" = "registry.redhat.io/rhacm2/kube-state-metrics-rhel9" +"rhacm2/lighthouse-agent-rhel8" = "registry.redhat.io/rhacm2/lighthouse-agent-rhel8" +"rhacm2/lighthouse-agent-rhel9" = "registry.redhat.io/rhacm2/lighthouse-agent-rhel9" +"rhacm2/lighthouse-coredns-rhel8" = "registry.redhat.io/rhacm2/lighthouse-coredns-rhel8" +"rhacm2/lighthouse-coredns-rhel9" = "registry.redhat.io/rhacm2/lighthouse-coredns-rhel9" +"rhacm2/management-ingress-rhel8" = "registry.redhat.io/rhacm2/management-ingress-rhel8" +"rhacm2/memcached-exporter-rhel8" = "registry.redhat.io/rhacm2/memcached-exporter-rhel8" +"rhacm2/memcached-exporter-rhel9" = "registry.redhat.io/rhacm2/memcached-exporter-rhel9" +"rhacm2/memcached-rhel8" = "registry.redhat.io/rhacm2/memcached-rhel8" +"rhacm2/memcached-rhel9" = "registry.redhat.io/rhacm2/memcached-rhel9" +"rhacm2/metrics-collector-rhel8" = "registry.redhat.io/rhacm2/metrics-collector-rhel8" +"rhacm2/metrics-collector-rhel9" = "registry.redhat.io/rhacm2/metrics-collector-rhel9" +"rhacm2/multicloud-integrations-rhel8" = "registry.redhat.io/rhacm2/multicloud-integrations-rhel8" +"rhacm2/multicloud-integrations-rhel9" = "registry.redhat.io/rhacm2/multicloud-integrations-rhel9" +"rhacm2/multiclusterhub-repo-rhel8" = "registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8" +"rhacm2/multiclusterhub-rhel8" = "registry.redhat.io/rhacm2/multiclusterhub-rhel8" +"rhacm2/multiclusterhub-rhel9" = "registry.redhat.io/rhacm2/multiclusterhub-rhel9" +"rhacm2/multicluster-observability-rhel8-operator" = "registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator" +"rhacm2/multicluster-observability-rhel9-operator" = "registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator" +"rhacm2/multicluster-operators-application-rhel8" = "registry.redhat.io/rhacm2/multicluster-operators-application-rhel8" +"rhacm2/multicluster-operators-application-rhel9" = "registry.redhat.io/rhacm2/multicluster-operators-application-rhel9" +"rhacm2/multicluster-operators-channel-rhel8" = "registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8" +"rhacm2/multicluster-operators-channel-rhel9" = "registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9" +"rhacm2/multicluster-operators-subscription-rhel8" = "registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8" +"rhacm2/multicluster-operators-subscription-rhel9" = "registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9" +"rhacm2/nettest-rhel8" = "registry.redhat.io/rhacm2/nettest-rhel8" +"rhacm2/nettest-rhel9" = "registry.redhat.io/rhacm2/nettest-rhel9" +"rhacm2/node-exporter-rhel8" = "registry.redhat.io/rhacm2/node-exporter-rhel8" +"rhacm2/node-exporter-rhel9" = "registry.redhat.io/rhacm2/node-exporter-rhel9" +"rhacm2/observatorium-rhel8-operator" = "registry.redhat.io/rhacm2/observatorium-rhel8-operator" +"rhacm2/observatorium-rhel8" = "registry.redhat.io/rhacm2/observatorium-rhel8" +"rhacm2/observatorium-rhel9-operator" = "registry.redhat.io/rhacm2/observatorium-rhel9-operator" +"rhacm2/observatorium-rhel9" = "registry.redhat.io/rhacm2/observatorium-rhel9" +"rhacm2/prometheus-alertmanager-rhel8" = "registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8" +"rhacm2/prometheus-alertmanager-rhel9" = "registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9" +"rhacm2/prometheus-rhel8" = "registry.redhat.io/rhacm2/prometheus-rhel8" +"rhacm2/prometheus-rhel9" = "registry.redhat.io/rhacm2/prometheus-rhel9" +"rhacm2/rbac-query-proxy-rhel8" = "registry.redhat.io/rhacm2/rbac-query-proxy-rhel8" +"rhacm2/rbac-query-proxy-rhel9" = "registry.redhat.io/rhacm2/rbac-query-proxy-rhel9" +"rhacm2/redisgraph-tls-rhel8" = "registry.redhat.io/rhacm2/redisgraph-tls-rhel8" +"rhacm2/search-aggregator-rhel8" = "registry.redhat.io/rhacm2/search-aggregator-rhel8" +"rhacm2/search-api-rhel8" = "registry.redhat.io/rhacm2/search-api-rhel8" +"rhacm2/search-collector-rhel8" = "registry.redhat.io/rhacm2/search-collector-rhel8" +"rhacm2/search-collector-rhel9" = "registry.redhat.io/rhacm2/search-collector-rhel9" +"rhacm2/search-rhel8" = "registry.redhat.io/rhacm2/search-rhel8" +"rhacm2/subctl-rhel8" = "registry.redhat.io/rhacm2/subctl-rhel8" +"rhacm2/subctl-rhel9" = "registry.redhat.io/rhacm2/subctl-rhel9" +"rhacm2/submariner-addon-rhel8" = "registry.redhat.io/rhacm2/submariner-addon-rhel8" +"rhacm2/submariner-addon-rhel9" = "registry.redhat.io/rhacm2/submariner-addon-rhel9" +"rhacm2/submariner-gateway-rhel8" = "registry.redhat.io/rhacm2/submariner-gateway-rhel8" +"rhacm2/submariner-gateway-rhel9" = "registry.redhat.io/rhacm2/submariner-gateway-rhel9" +"rhacm2/submariner-globalnet-rhel8" = "registry.redhat.io/rhacm2/submariner-globalnet-rhel8" +"rhacm2/submariner-globalnet-rhel9" = "registry.redhat.io/rhacm2/submariner-globalnet-rhel9" +"rhacm2/submariner-networkplugin-syncer-rhel8" = "registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8" +"rhacm2/submariner-operator-bundle" = "registry.redhat.io/rhacm2/submariner-operator-bundle" +"rhacm2/submariner-rhel8-operator" = "registry.redhat.io/rhacm2/submariner-rhel8-operator" +"rhacm2/submariner-rhel9-operator" = "registry.redhat.io/rhacm2/submariner-rhel9-operator" +"rhacm2/submariner-route-agent-rhel8" = "registry.redhat.io/rhacm2/submariner-route-agent-rhel8" +"rhacm2/submariner-route-agent-rhel9" = "registry.redhat.io/rhacm2/submariner-route-agent-rhel9" +"rhacm2/thanos-receive-controller-rhel8" = "registry.redhat.io/rhacm2/thanos-receive-controller-rhel8" +"rhacm2/thanos-receive-controller-rhel9" = "registry.redhat.io/rhacm2/thanos-receive-controller-rhel9" +"rhacm2/thanos-rhel8" = "registry.redhat.io/rhacm2/thanos-rhel8" +"rhacm2/thanos-rhel9" = "registry.redhat.io/rhacm2/thanos-rhel9" +"rhacm2/volsync-mover-rclone-rhel8" = "registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8" +"rhacm2/volsync-mover-restic-rhel8" = "registry.redhat.io/rhacm2/volsync-mover-restic-rhel8" +"rhacm2/volsync-mover-rsync-rhel8" = "registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8" +"rhacm2/volsync-mover-syncthing-rhel8" = "registry.redhat.io/rhacm2/volsync-mover-syncthing-rhel8" +"rhacm2/volsync-operator-bundle" = "registry.redhat.io/rhacm2/volsync-operator-bundle" +"rhacm2/volsync-rhel8" = "registry.redhat.io/rhacm2/volsync-rhel8" +"rhacm2/volsync-rhel9" = "registry.redhat.io/rhacm2/volsync-rhel9" +"rhbac-4/hawtio-operator-bundle" = "registry.redhat.io/rhbac-4/hawtio-operator-bundle" +"rhbac-4/hawtio-rhel8-operator" = "registry.redhat.io/rhbac-4/hawtio-rhel8-operator" +"rhbac-4/hawtio-rhel8" = "registry.redhat.io/rhbac-4/hawtio-rhel8" +"rhbk/keycloak-operator-bundle" = "registry.redhat.io/rhbk/keycloak-operator-bundle" +"rhbk/keycloak-rhel9-operator" = "registry.redhat.io/rhbk/keycloak-rhel9-operator" +"rhbk/keycloak-rhel9" = "registry.redhat.io/rhbk/keycloak-rhel9" +"rhceph/ansible-runner-rhel8" = "registry.redhat.io/rhceph/ansible-runner-rhel8" +"rhceph/grafana-rhel9" = "registry.redhat.io/rhceph/grafana-rhel9" +"rhceph/keepalived-rhel8" = "registry.redhat.io/rhceph/keepalived-rhel8" +"rhceph/keepalived-rhel9" = "registry.redhat.io/rhceph/keepalived-rhel9" +"rhceph/rhceph-3-dashboard-rhel7" = "registry.access.redhat.com/rhceph/rhceph-3-dashboard-rhel7" +"rhceph/rhceph-3-rhel7" = "registry.access.redhat.com/rhceph/rhceph-3-rhel7" +"rhceph/rhceph-4-dashboard-rhel8" = "registry.redhat.io/rhceph/rhceph-4-dashboard-rhel8" +"rhceph/rhceph-4-rhel8" = "registry.redhat.io/rhceph/rhceph-4-rhel8" +"rhceph/rhceph-5-dashboard-rhel8" = "registry.redhat.io/rhceph/rhceph-5-dashboard-rhel8" +"rhceph/rhceph-5-rhel8" = "registry.redhat.io/rhceph/rhceph-5-rhel8" +"rhceph/rhceph-6-dashboard-rhel9" = "registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9" +"rhceph/rhceph-6-rhel9" = "registry.redhat.io/rhceph/rhceph-6-rhel9" +"rhceph/rhceph-7-rhel9" = "registry.redhat.io/rhceph/rhceph-7-rhel9" +"rhceph/rhceph-haproxy-rhel8" = "registry.redhat.io/rhceph/rhceph-haproxy-rhel8" +"rhceph/rhceph-haproxy-rhel9" = "registry.redhat.io/rhceph/rhceph-haproxy-rhel9" +"rhceph/rhceph-promtail-rhel9" = "registry.redhat.io/rhceph/rhceph-promtail-rhel9" +"rhceph/snmp-notifier-rhel8" = "registry.redhat.io/rhceph/snmp-notifier-rhel8" +"rhceph/snmp-notifier-rhel9" = "registry.redhat.io/rhceph/snmp-notifier-rhel9" +"rh-certification/ehr-v4" = "docker.better.care/rh-certification/ehr-v4" +"rhcertification/redhat-certification-baremetal" = "registry.redhat.io/rhcertification/redhat-certification-baremetal" +"rh-certified-tritium" = "923420404585.dkr.ecr.us-west-2.amazonaws.com/rh-certified-tritium" +"rhdh/rhdh-hub-rhel9" = "registry.redhat.io/rhdh/rhdh-hub-rhel9" +"rhdh/rhdh-operator-bundle" = "registry.redhat.io/rhdh/rhdh-operator-bundle" +"rhdh/rhdh-rhel9-operator" = "registry.redhat.io/rhdh/rhdh-rhel9-operator" +"rhel8/buildah" = "registry.redhat.io/rhel8/buildah" +"rhel8/cups" = "registry.redhat.io/rhel8/cups" +"rhel8/dotnet-60" = "registry.redhat.io/rhel8/dotnet-60" +"rhel8/dotnet-60-runtime" = "registry.redhat.io/rhel8/dotnet-60-runtime" +"rhel8/dotnet-80" = "registry.redhat.io/rhel8/dotnet-80" +"rhel8/dotnet-80-runtime" = "registry.redhat.io/rhel8/dotnet-80-runtime" +"rhel8/flatpak-runtime" = "registry.redhat.io/rhel8/flatpak-runtime" +"rhel8/flatpak-sdk" = "registry.redhat.io/rhel8/flatpak-sdk" +"rhel8/gcc-toolset-12-toolchain" = "registry.redhat.io/rhel8/gcc-toolset-12-toolchain" +"rhel8/gcc-toolset-13-toolchain" = "registry.redhat.io/rhel8/gcc-toolset-13-toolchain" +"rhel8/go-toolset" = "registry.redhat.io/rhel8/go-toolset" +"rhel8/grafana" = "registry.redhat.io/rhel8/grafana" +"rhel8/httpd-24" = "registry.redhat.io/rhel8/httpd-24" +"rhel8/mariadb-1011" = "registry.access.redhat.com/rhel8/mariadb-1011" +"rhel8/mariadb-103" = "registry.redhat.io/rhel8/mariadb-103" +"rhel8/mariadb-105" = "registry.redhat.io/rhel8/mariadb-105" +"rhel8/memcached" = "registry.redhat.io/rhel8/memcached" +"rhel8/mysql-80" = "registry.redhat.io/rhel8/mysql-80" +"rhel8/net-snmp" = "registry.redhat.io/rhel8/net-snmp" +"rhel8/nginx-122" = "registry.redhat.io/rhel8/nginx-122" +"rhel8/nginx-124" = "registry.access.redhat.com/rhel8/nginx-124" +"rhel8/nodejs-18-minimal" = "registry.redhat.io/rhel8/nodejs-18-minimal" +"rhel8/nodejs-18" = "registry.redhat.io/rhel8/nodejs-18" +"rhel8/nodejs-20-minimal" = "registry.redhat.io/rhel8/nodejs-20-minimal" +"rhel8/nodejs-20" = "registry.redhat.io/rhel8/nodejs-20" +"rhel8/pause" = "registry.redhat.io/rhel8/pause" +"rhel8/pcp" = "registry.redhat.io/rhel8/pcp" +"rhel8/perl-526" = "registry.redhat.io/rhel8/perl-526" +"rhel8/perl-532" = "registry.redhat.io/rhel8/perl-532" +"rhel8/php-74" = "registry.redhat.io/rhel8/php-74" +"rhel8/php-80" = "registry.redhat.io/rhel8/php-80" +"rhel8/php-82" = "registry.access.redhat.com/rhel8/php-82" +"rhel8/podman" = "registry.redhat.io/rhel8/podman" +"rhel8/postgresql-12" = "registry.redhat.io/rhel8/postgresql-12" +"rhel8/postgresql-13" = "registry.redhat.io/rhel8/postgresql-13" +"rhel8/postgresql-15" = "registry.redhat.io/rhel8/postgresql-15" +"rhel8/postgresql-16" = "registry.access.redhat.com/rhel8/postgresql-16" +"rhel8/python-27" = "registry.redhat.io/rhel8/python-27" +"rhel8/python-311" = "registry.redhat.io/rhel8/python-311" +"rhel8/python-312" = "registry.access.redhat.com/rhel8/python-312" +"rhel8/python-36" = "registry.redhat.io/rhel8/python-36" +"rhel8/python-39" = "registry.redhat.io/rhel8/python-39" +"rhel8/redis-6" = "registry.redhat.io/rhel8/redis-6" +"rhel8/rhel-guest-image" = "registry.redhat.io/rhel8/rhel-guest-image" +"rhel8/rsyslog" = "registry.redhat.io/rhel8/rsyslog" +"rhel8/ruby-25" = "registry.redhat.io/rhel8/ruby-25" +"rhel8/ruby-31" = "registry.redhat.io/rhel8/ruby-31" +"rhel8/ruby-33" = "registry.redhat.io/rhel8/ruby-33" +"rhel8/s2i-base" = "registry.redhat.io/rhel8/s2i-base" +"rhel8/s2i-core" = "registry.redhat.io/rhel8/s2i-core" +"rhel8/skopeo" = "registry.redhat.io/rhel8/skopeo" +"rhel8/support-tools" = "registry.redhat.io/rhel8/support-tools" +"rhel8/toolbox" = "registry.access.redhat.com/rhel8/toolbox" +"rhel8/varnish-6" = "registry.redhat.io/rhel8/varnish-6" +"rhel9/buildah" = "registry.redhat.io/rhel9/buildah" +"rhel9/cups" = "registry.redhat.io/rhel9/cups" +"rhel9/flatpak-runtime" = "registry.redhat.io/rhel9/flatpak-runtime" +"rhel9/flatpak-sdk" = "registry.redhat.io/rhel9/flatpak-sdk" +"rhel9/gcc-toolset-12-toolchain" = "registry.redhat.io/rhel9/gcc-toolset-12-toolchain" +"rhel9/gcc-toolset-13-toolchain" = "registry.redhat.io/rhel9/gcc-toolset-13-toolchain" +"rhel9/go-toolset" = "registry.redhat.io/rhel9/go-toolset" +"rhel9/grafana" = "registry.redhat.io/rhel9/grafana" +"rhel9/httpd-24" = "registry.redhat.io/rhel9/httpd-24" +"rhel9/keylime-registrar" = "registry.redhat.io/rhel9/keylime-registrar" +"rhel9/keylime-verifier" = "registry.redhat.io/rhel9/keylime-verifier" +"rhel9/mariadb-1011" = "registry.access.redhat.com/rhel9/mariadb-1011" +"rhel9/mariadb-105" = "registry.redhat.io/rhel9/mariadb-105" +"rhel9/memcached" = "registry.redhat.io/rhel9/memcached" +"rhel9/mysql-80" = "registry.redhat.io/rhel9/mysql-80" +"rhel9/net-snmp" = "registry.redhat.io/rhel9/net-snmp" +"rhel9/nginx-120" = "registry.redhat.io/rhel9/nginx-120" +"rhel9/nginx-122" = "registry.redhat.io/rhel9/nginx-122" +"rhel9/nginx-124" = "registry.access.redhat.com/rhel9/nginx-124" +"rhel9/nodejs-18-minimal" = "registry.redhat.io/rhel9/nodejs-18-minimal" +"rhel9/nodejs-18" = "registry.redhat.io/rhel9/nodejs-18" +"rhel9/nodejs-20-minimal" = "registry.redhat.io/rhel9/nodejs-20-minimal" +"rhel9/nodejs-20" = "registry.redhat.io/rhel9/nodejs-20" +"rhel9/pcp" = "registry.redhat.io/rhel9/pcp" +"rhel9/perl-532" = "registry.redhat.io/rhel9/perl-532" +"rhel9/php-80" = "registry.redhat.io/rhel9/php-80" +"rhel9/php-81" = "registry.redhat.io/rhel9/php-81" +"rhel9/php-82" = "registry.access.redhat.com/rhel9/php-82" +"rhel9/podman" = "registry.redhat.io/rhel9/podman" +"rhel9/postgresql-13" = "registry.redhat.io/rhel9/postgresql-13" +"rhel9/postgresql-15" = "registry.redhat.io/rhel9/postgresql-15" +"rhel9/postgresql-16" = "registry.access.redhat.com/rhel9/postgresql-16" +"rhel9/python-311" = "registry.redhat.io/rhel9/python-311" +"rhel9/python-312" = "registry.access.redhat.com/rhel9/python-312" +"rhel9/python-39" = "registry.redhat.io/rhel9/python-39" +"rhel9/redis-6" = "registry.redhat.io/rhel9/redis-6" +"rhel9/redis-7" = "registry.redhat.io/rhel9/redis-7" +"rhel9/rhel-guest-image" = "registry.redhat.io/rhel9/rhel-guest-image" +"rhel9/rsyslog" = "registry.redhat.io/rhel9/rsyslog" +"rhel9/ruby-30" = "registry.redhat.io/rhel9/ruby-30" +"rhel9/ruby-31" = "registry.redhat.io/rhel9/ruby-31" +"rhel9/ruby-33" = "registry.access.redhat.com/rhel9/ruby-33" +"rhel9/s2i-base" = "registry.redhat.io/rhel9/s2i-base" +"rhel9/s2i-core" = "registry.redhat.io/rhel9/s2i-core" +"rhel9/skopeo" = "registry.redhat.io/rhel9/skopeo" +"rhel9/squid" = "registry.redhat.io/rhel9/squid" +"rhel9/support-tools" = "registry.redhat.io/rhel9/support-tools" +"rhel9/tang" = "registry.redhat.io/rhel9/tang" +"rhel9/toolbox" = "registry.redhat.io/rhel9/toolbox" +"rhel9/varnish-6" = "registry.redhat.io/rhel9/varnish-6" +"rhel-timemachine-container/timemachine-operator-bundle" = "registry.connect.redhat.com/rhel-timemachine-container/timemachine-operator-bundle" +"rhel-timemachine-container/timemachine-operator-bundle-rhmp" = "registry.connect.redhat.com/rhel-timemachine-container/timemachine-operator-bundle-rhmp" +"rhel-timemachine-container/timemachine-operator" = "registry.connect.redhat.com/rhel-timemachine-container/timemachine-operator" +"rhel-timemachine-container/virtual-clock-testing-tool" = "registry.connect.redhat.com/rhel-timemachine-container/virtual-clock-testing-tool" +"rh-marketplace/ibm-data-reporter-operator-bundle" = "registry.connect.redhat.com/rh-marketplace/ibm-data-reporter-operator-bundle" +"rh-marketplace/ibm-metrics-operator-bundle" = "registry.connect.redhat.com/rh-marketplace/ibm-metrics-operator-bundle" +"rh-marketplace/marketplace-csi-driver" = "quay.io/rh-marketplace/marketplace-csi-driver" +"rh-marketplace/marketplace-dataset-operator" = "quay.io/rh-marketplace/marketplace-dataset-operator" +"rh-marketplace/mongodb-enterprise-advanced-ibm-bundle" = "registry.connect.redhat.com/rh-marketplace/mongodb-enterprise-advanced-ibm-bundle" +"rh-marketplace/redhat-marketplace-authcheck" = "quay.io/rh-marketplace/redhat-marketplace-authcheck" +"rh-marketplace/redhat-marketplace-data-service" = "quay.io/rh-marketplace/redhat-marketplace-data-service" +"rh-marketplace/redhat-marketplace-metric-state" = "quay.io/rh-marketplace/redhat-marketplace-metric-state" +"rh-marketplace/redhat-marketplace-operator" = "quay.io/rh-marketplace/redhat-marketplace-operator" +"rh-marketplace/redhat-marketplace-reporter" = "quay.io/rh-marketplace/redhat-marketplace-reporter" +"rh-marketplace/rh-dataset-operator-bundle" = "registry.connect.redhat.com/rh-marketplace/rh-dataset-operator-bundle" +"rh-marketplace/rh-marketplace-bundle" = "registry.connect.redhat.com/rh-marketplace/rh-marketplace-bundle" +"rhm-labs/arcade-app" = "registry.connect.redhat.com/rhm-labs/arcade-app" +"rhm-labs/arcade-operator-bundle" = "registry.connect.redhat.com/rhm-labs/arcade-operator-bundle" +"rhm-labs/arcade-operator" = "registry.connect.redhat.com/rhm-labs/arcade-operator" +"rhmtc/openshift-migration-controller-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-controller-rhel8" +"rhmtc/openshift-migration-hook-runner-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8" +"rhmtc/openshift-migration-legacy-rhel8-operator" = "registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator" +"rhmtc/openshift-migration-log-reader-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8" +"rhmtc/openshift-migration-must-gather-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8" +"rhmtc/openshift-migration-operator-bundle" = "registry.redhat.io/rhmtc/openshift-migration-operator-bundle" +"rhmtc/openshift-migration-registry-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-registry-rhel8" +"rhmtc/openshift-migration-rhel8-operator" = "registry.redhat.io/rhmtc/openshift-migration-rhel8-operator" +"rhmtc/openshift-migration-rsync-transfer-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8" +"rhmtc/openshift-migration-ui-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-ui-rhel8" +"rhmtc/openshift-migration-velero-plugin-for-aws-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8" +"rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8" +"rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8" +"rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8" +"rhmtc/openshift-migration-velero-restic-restore-helper-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8" +"rhmtc/openshift-migration-velero-rhel8" = "registry.redhat.io/rhmtc/openshift-migration-velero-rhel8" +"rhmtc/openshift-velero-plugin-rhel8" = "registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8" +"rhoai/odh-codeflare-operator-rhel8" = "registry.redhat.io/rhoai/odh-codeflare-operator-rhel8" +"rhoai/odh-dashboard-rhel8" = "registry.redhat.io/rhoai/odh-dashboard-rhel8" +"rhoai/odh-data-science-pipelines-argo-argoexec-rhel8" = "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-argoexec-rhel8" +"rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8" = "registry.redhat.io/rhoai/odh-data-science-pipelines-argo-workflowcontroller-rhel8" +"rhoai/odh-data-science-pipelines-operator-controller-rhel8" = "registry.redhat.io/rhoai/odh-data-science-pipelines-operator-controller-rhel8" +"rhoai/odh-kf-notebook-controller-rhel8" = "registry.redhat.io/rhoai/odh-kf-notebook-controller-rhel8" +"rhoai/odh-kuberay-operator-controller-rhel8" = "registry.redhat.io/rhoai/odh-kuberay-operator-controller-rhel8" +"rhoai/odh-kueue-controller-rhel8" = "registry.redhat.io/rhoai/odh-kueue-controller-rhel8" +"rhoai/odh-mlmd-grpc-server-rhel8" = "registry.redhat.io/rhoai/odh-mlmd-grpc-server-rhel8" +"rhoai/odh-ml-pipelines-api-server-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-rhel8" +"rhoai/odh-ml-pipelines-api-server-v2-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-api-server-v2-rhel8" +"rhoai/odh-ml-pipelines-artifact-manager-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-artifact-manager-rhel8" +"rhoai/odh-ml-pipelines-cache-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-cache-rhel8" +"rhoai/odh-ml-pipelines-driver-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-driver-rhel8" +"rhoai/odh-ml-pipelines-launcher-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-launcher-rhel8" +"rhoai/odh-ml-pipelines-persistenceagent-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-rhel8" +"rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8" +"rhoai/odh-ml-pipelines-scheduledworkflow-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-rhel8" +"rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8" = "registry.redhat.io/rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8" +"rhoai/odh-mm-rest-proxy-rhel8" = "registry.redhat.io/rhoai/odh-mm-rest-proxy-rhel8" +"rhoai/odh-model-controller-rhel8" = "registry.redhat.io/rhoai/odh-model-controller-rhel8" +"rhoai/odh-modelmesh-rhel8" = "registry.redhat.io/rhoai/odh-modelmesh-rhel8" +"rhoai/odh-modelmesh-runtime-adapter-rhel8" = "registry.redhat.io/rhoai/odh-modelmesh-runtime-adapter-rhel8" +"rhoai/odh-modelmesh-serving-controller-rhel8" = "registry.redhat.io/rhoai/odh-modelmesh-serving-controller-rhel8" +"rhoai/odh-notebook-controller-rhel8" = "registry.redhat.io/rhoai/odh-notebook-controller-rhel8" +"rhoai/odh-operator-base-rhel8" = "registry.redhat.io/rhoai/odh-operator-base-rhel8" +"rhoai/odh-operator-bundle" = "registry.redhat.io/rhoai/odh-operator-bundle" +"rhoai/odh-rhel8-operator" = "registry.redhat.io/rhoai/odh-rhel8-operator" +"rhoai/odh-trustyai-service-operator-rhel8" = "registry.redhat.io/rhoai/odh-trustyai-service-operator-rhel8" +"rhoai/odh-trustyai-service-rhel8" = "registry.redhat.io/rhoai/odh-trustyai-service-rhel8" +"rhosdt/jaeger-agent-rhel8" = "registry.redhat.io/rhosdt/jaeger-agent-rhel8" +"rhosdt/jaeger-all-in-one-rhel8" = "registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8" +"rhosdt/jaeger-collector-rhel8" = "registry.redhat.io/rhosdt/jaeger-collector-rhel8" +"rhosdt/jaeger-es-index-cleaner-rhel8" = "registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8" +"rhosdt/jaeger-es-rollover-rhel8" = "registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8" +"rhosdt/jaeger-ingester-rhel8" = "registry.redhat.io/rhosdt/jaeger-ingester-rhel8" +"rhosdt/jaeger-operator-bundle" = "registry.redhat.io/rhosdt/jaeger-operator-bundle" +"rhosdt/jaeger-query-rhel8" = "registry.redhat.io/rhosdt/jaeger-query-rhel8" +"rhosdt/jaeger-rhel8-operator" = "registry.redhat.io/rhosdt/jaeger-rhel8-operator" +"rhosdt/opentelemetry-collector-rhel8" = "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8" +"rhosdt/opentelemetry-operator-bundle" = "registry.redhat.io/rhosdt/opentelemetry-operator-bundle" +"rhosdt/opentelemetry-rhel8-operator" = "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator" +"rhosdt/opentelemetry-target-allocator-rhel8" = "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8" +"rhosdt/tempo-gateway-opa-rhel8" = "registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8" +"rhosdt/tempo-gateway-rhel8" = "registry.redhat.io/rhosdt/tempo-gateway-rhel8" +"rhosdt/tempo-operator-bundle" = "registry.redhat.io/rhosdt/tempo-operator-bundle" +"rhosdt/tempo-query-rhel8" = "registry.redhat.io/rhosdt/tempo-query-rhel8" +"rhosdt/tempo-rhel8-operator" = "registry.redhat.io/rhosdt/tempo-rhel8-operator" +"rhosdt/tempo-rhel8" = "registry.redhat.io/rhosdt/tempo-rhel8" +"rhoso-edpm-beta/ee-openstack-ansible-ee-rhel9" = "registry.redhat.io/rhoso-edpm-beta/ee-openstack-ansible-ee-rhel9" +"rhoso-edpm/ee-openstack-ansible-ee-rhel9" = "registry.redhat.io/rhoso-edpm/ee-openstack-ansible-ee-rhel9" +"rhosp-rhel8/openstack-aodh-api" = "registry.redhat.io/rhosp-rhel8/openstack-aodh-api" +"rhosp-rhel8/openstack-aodh-base" = "registry.redhat.io/rhosp-rhel8/openstack-aodh-base" +"rhosp-rhel8/openstack-aodh-evaluator" = "registry.redhat.io/rhosp-rhel8/openstack-aodh-evaluator" +"rhosp-rhel8/openstack-aodh-listener" = "registry.redhat.io/rhosp-rhel8/openstack-aodh-listener" +"rhosp-rhel8/openstack-aodh-notifier" = "registry.redhat.io/rhosp-rhel8/openstack-aodh-notifier" +"rhosp-rhel8/openstack-barbican-api" = "registry.redhat.io/rhosp-rhel8/openstack-barbican-api" +"rhosp-rhel8/openstack-barbican-base" = "registry.redhat.io/rhosp-rhel8/openstack-barbican-base" +"rhosp-rhel8/openstack-barbican-keystone-listener" = "registry.redhat.io/rhosp-rhel8/openstack-barbican-keystone-listener" +"rhosp-rhel8/openstack-barbican-worker" = "registry.redhat.io/rhosp-rhel8/openstack-barbican-worker" +"rhosp-rhel8/openstack-base" = "registry.redhat.io/rhosp-rhel8/openstack-base" +"rhosp-rhel8/openstack-ceilometer-base" = "registry.redhat.io/rhosp-rhel8/openstack-ceilometer-base" +"rhosp-rhel8/openstack-ceilometer-central" = "registry.redhat.io/rhosp-rhel8/openstack-ceilometer-central" +"rhosp-rhel8/openstack-ceilometer-compute" = "registry.redhat.io/rhosp-rhel8/openstack-ceilometer-compute" +"rhosp-rhel8/openstack-ceilometer-ipmi" = "registry.redhat.io/rhosp-rhel8/openstack-ceilometer-ipmi" +"rhosp-rhel8/openstack-ceilometer-notification" = "registry.redhat.io/rhosp-rhel8/openstack-ceilometer-notification" +"rhosp-rhel8/openstack-cinder-api" = "registry.redhat.io/rhosp-rhel8/openstack-cinder-api" +"rhosp-rhel8/openstack-cinder-backup" = "registry.redhat.io/rhosp-rhel8/openstack-cinder-backup" +"rhosp-rhel8/openstack-cinder-base" = "registry.redhat.io/rhosp-rhel8/openstack-cinder-base" +"rhosp-rhel8/openstack-cinder-scheduler" = "registry.redhat.io/rhosp-rhel8/openstack-cinder-scheduler" +"rhosp-rhel8/openstack-cinder-volume" = "registry.redhat.io/rhosp-rhel8/openstack-cinder-volume" +"rhosp-rhel8/openstack-collectd" = "registry.redhat.io/rhosp-rhel8/openstack-collectd" +"rhosp-rhel8/openstack-cron" = "registry.redhat.io/rhosp-rhel8/openstack-cron" +"rhosp-rhel8/openstack-dependencies" = "registry.redhat.io/rhosp-rhel8/openstack-dependencies" +"rhosp-rhel8/openstack-ec2-api" = "registry.redhat.io/rhosp-rhel8/openstack-ec2-api" +"rhosp-rhel8/openstack-etcd" = "registry.redhat.io/rhosp-rhel8/openstack-etcd" +"rhosp-rhel8/openstack-glance-api" = "registry.redhat.io/rhosp-rhel8/openstack-glance-api" +"rhosp-rhel8/openstack-gnocchi-api" = "registry.redhat.io/rhosp-rhel8/openstack-gnocchi-api" +"rhosp-rhel8/openstack-gnocchi-base" = "registry.redhat.io/rhosp-rhel8/openstack-gnocchi-base" +"rhosp-rhel8/openstack-gnocchi-metricd" = "registry.redhat.io/rhosp-rhel8/openstack-gnocchi-metricd" +"rhosp-rhel8/openstack-gnocchi-statsd" = "registry.redhat.io/rhosp-rhel8/openstack-gnocchi-statsd" +"rhosp-rhel8/openstack-haproxy" = "registry.redhat.io/rhosp-rhel8/openstack-haproxy" +"rhosp-rhel8/openstack-heat-all" = "registry.redhat.io/rhosp-rhel8/openstack-heat-all" +"rhosp-rhel8/openstack-heat-api-cfn" = "registry.redhat.io/rhosp-rhel8/openstack-heat-api-cfn" +"rhosp-rhel8/openstack-heat-api" = "registry.redhat.io/rhosp-rhel8/openstack-heat-api" +"rhosp-rhel8/openstack-heat-base" = "registry.redhat.io/rhosp-rhel8/openstack-heat-base" +"rhosp-rhel8/openstack-heat-engine" = "registry.redhat.io/rhosp-rhel8/openstack-heat-engine" +"rhosp-rhel8/openstack-horizon" = "registry.redhat.io/rhosp-rhel8/openstack-horizon" +"rhosp-rhel8/openstack-ironic-api" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-api" +"rhosp-rhel8/openstack-ironic-base" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-base" +"rhosp-rhel8/openstack-ironic-conductor" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-conductor" +"rhosp-rhel8/openstack-ironic-inspector" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-inspector" +"rhosp-rhel8/openstack-ironic-neutron-agent" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-neutron-agent" +"rhosp-rhel8/openstack-ironic-pxe" = "registry.redhat.io/rhosp-rhel8/openstack-ironic-pxe" +"rhosp-rhel8/openstack-iscsid" = "registry.redhat.io/rhosp-rhel8/openstack-iscsid" +"rhosp-rhel8/openstack-keepalived" = "registry.redhat.io/rhosp-rhel8/openstack-keepalived" +"rhosp-rhel8/openstack-keystone" = "registry.redhat.io/rhosp-rhel8/openstack-keystone" +"rhosp-rhel8/openstack-manila-api" = "registry.redhat.io/rhosp-rhel8/openstack-manila-api" +"rhosp-rhel8/openstack-manila-base" = "registry.redhat.io/rhosp-rhel8/openstack-manila-base" +"rhosp-rhel8/openstack-manila-scheduler" = "registry.redhat.io/rhosp-rhel8/openstack-manila-scheduler" +"rhosp-rhel8/openstack-manila-share" = "registry.redhat.io/rhosp-rhel8/openstack-manila-share" +"rhosp-rhel8/openstack-mariadb" = "registry.redhat.io/rhosp-rhel8/openstack-mariadb" +"rhosp-rhel8/openstack-memcached" = "registry.redhat.io/rhosp-rhel8/openstack-memcached" +"rhosp-rhel8/openstack-mistral-api" = "registry.redhat.io/rhosp-rhel8/openstack-mistral-api" +"rhosp-rhel8/openstack-mistral-base" = "registry.redhat.io/rhosp-rhel8/openstack-mistral-base" +"rhosp-rhel8/openstack-mistral-engine" = "registry.redhat.io/rhosp-rhel8/openstack-mistral-engine" +"rhosp-rhel8/openstack-mistral-event-engine" = "registry.redhat.io/rhosp-rhel8/openstack-mistral-event-engine" +"rhosp-rhel8/openstack-mistral-executor" = "registry.redhat.io/rhosp-rhel8/openstack-mistral-executor" +"rhosp-rhel8/openstack-multipathd" = "registry.redhat.io/rhosp-rhel8/openstack-multipathd" +"rhosp-rhel8/openstack-neutron-agent-base" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-agent-base" +"rhosp-rhel8/openstack-neutron-base" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-base" +"rhosp-rhel8/openstack-neutron-dhcp-agent" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-dhcp-agent" +"rhosp-rhel8/openstack-neutron-l3-agent" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-l3-agent" +"rhosp-rhel8/openstack-neutron-metadata-agent-ovn" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-metadata-agent-ovn" +"rhosp-rhel8/openstack-neutron-metadata-agent" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-metadata-agent" +"rhosp-rhel8/openstack-neutron-openvswitch-agent" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-openvswitch-agent" +"rhosp-rhel8/openstack-neutron-server-ovn" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-server-ovn" +"rhosp-rhel8/openstack-neutron-server" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-server" +"rhosp-rhel8/openstack-neutron-sriov-agent" = "registry.redhat.io/rhosp-rhel8/openstack-neutron-sriov-agent" +"rhosp-rhel8/openstack-nova-api" = "registry.redhat.io/rhosp-rhel8/openstack-nova-api" +"rhosp-rhel8/openstack-nova-base" = "registry.redhat.io/rhosp-rhel8/openstack-nova-base" +"rhosp-rhel8/openstack-nova-compute-ironic" = "registry.redhat.io/rhosp-rhel8/openstack-nova-compute-ironic" +"rhosp-rhel8/openstack-nova-compute" = "registry.redhat.io/rhosp-rhel8/openstack-nova-compute" +"rhosp-rhel8/openstack-nova-conductor" = "registry.redhat.io/rhosp-rhel8/openstack-nova-conductor" +"rhosp-rhel8/openstack-novajoin-base" = "registry.redhat.io/rhosp-rhel8/openstack-novajoin-base" +"rhosp-rhel8/openstack-novajoin-notifier" = "registry.redhat.io/rhosp-rhel8/openstack-novajoin-notifier" +"rhosp-rhel8/openstack-novajoin-server" = "registry.redhat.io/rhosp-rhel8/openstack-novajoin-server" +"rhosp-rhel8/openstack-nova-libvirt" = "registry.redhat.io/rhosp-rhel8/openstack-nova-libvirt" +"rhosp-rhel8/openstack-nova-novncproxy" = "registry.redhat.io/rhosp-rhel8/openstack-nova-novncproxy" +"rhosp-rhel8/openstack-nova-scheduler" = "registry.redhat.io/rhosp-rhel8/openstack-nova-scheduler" +"rhosp-rhel8/openstack-octavia-api" = "registry.redhat.io/rhosp-rhel8/openstack-octavia-api" +"rhosp-rhel8/openstack-octavia-base" = "registry.redhat.io/rhosp-rhel8/openstack-octavia-base" +"rhosp-rhel8/openstack-octavia-health-manager" = "registry.redhat.io/rhosp-rhel8/openstack-octavia-health-manager" +"rhosp-rhel8/openstack-octavia-housekeeping" = "registry.redhat.io/rhosp-rhel8/openstack-octavia-housekeeping" +"rhosp-rhel8/openstack-octavia-worker" = "registry.redhat.io/rhosp-rhel8/openstack-octavia-worker" +"rhosp-rhel8/openstack-ovn-base" = "registry.redhat.io/rhosp-rhel8/openstack-ovn-base" +"rhosp-rhel8/openstack-ovn-controller" = "registry.redhat.io/rhosp-rhel8/openstack-ovn-controller" +"rhosp-rhel8/openstack-ovn-nb-db-server" = "registry.redhat.io/rhosp-rhel8/openstack-ovn-nb-db-server" +"rhosp-rhel8/openstack-ovn-northd" = "registry.redhat.io/rhosp-rhel8/openstack-ovn-northd" +"rhosp-rhel8/openstack-ovn-sb-db-server" = "registry.redhat.io/rhosp-rhel8/openstack-ovn-sb-db-server" +"rhosp-rhel8/openstack-panko-api" = "registry.redhat.io/rhosp-rhel8/openstack-panko-api" +"rhosp-rhel8/openstack-placement-api" = "registry.redhat.io/rhosp-rhel8/openstack-placement-api" +"rhosp-rhel8/openstack-qdrouterd" = "registry.redhat.io/rhosp-rhel8/openstack-qdrouterd" +"rhosp-rhel8/openstack-rabbitmq" = "registry.redhat.io/rhosp-rhel8/openstack-rabbitmq" +"rhosp-rhel8/openstack-redis" = "registry.redhat.io/rhosp-rhel8/openstack-redis" +"rhosp-rhel8/openstack-rsyslog" = "registry.redhat.io/rhosp-rhel8/openstack-rsyslog" +"rhosp-rhel8/openstack-swift-account" = "registry.redhat.io/rhosp-rhel8/openstack-swift-account" +"rhosp-rhel8/openstack-swift-base" = "registry.redhat.io/rhosp-rhel8/openstack-swift-base" +"rhosp-rhel8/openstack-swift-container" = "registry.redhat.io/rhosp-rhel8/openstack-swift-container" +"rhosp-rhel8/openstack-swift-object" = "registry.redhat.io/rhosp-rhel8/openstack-swift-object" +"rhosp-rhel8/openstack-swift-proxy-server" = "registry.redhat.io/rhosp-rhel8/openstack-swift-proxy-server" +"rhosp-rhel8/openstack-tempest" = "registry.redhat.io/rhosp-rhel8/openstack-tempest" +"rhosp-rhel8/openstack-tripleoclient" = "registry.redhat.io/rhosp-rhel8/openstack-tripleoclient" +"rhosp-rhel8/openstack-zaqar-wsgi" = "registry.redhat.io/rhosp-rhel8/openstack-zaqar-wsgi" +"rhosp-rhel8/osp-director-agent" = "registry.redhat.io/rhosp-rhel8/osp-director-agent" +"rhosp-rhel8/osp-director-downloader" = "registry.redhat.io/rhosp-rhel8/osp-director-downloader" +"rhosp-rhel8/osp-director-operator-bundle" = "registry.redhat.io/rhosp-rhel8/osp-director-operator-bundle" +"rhosp-rhel8/osp-director-operator" = "registry.redhat.io/rhosp-rhel8/osp-director-operator" +"rhosp-rhel9/openstack-aodh-api" = "registry.redhat.io/rhosp-rhel9/openstack-aodh-api" +"rhosp-rhel9/openstack-aodh-base" = "registry.redhat.io/rhosp-rhel9/openstack-aodh-base" +"rhosp-rhel9/openstack-aodh-evaluator" = "registry.redhat.io/rhosp-rhel9/openstack-aodh-evaluator" +"rhosp-rhel9/openstack-aodh-listener" = "registry.redhat.io/rhosp-rhel9/openstack-aodh-listener" +"rhosp-rhel9/openstack-aodh-notifier" = "registry.redhat.io/rhosp-rhel9/openstack-aodh-notifier" +"rhosp-rhel9/openstack-barbican-api" = "registry.redhat.io/rhosp-rhel9/openstack-barbican-api" +"rhosp-rhel9/openstack-barbican-base" = "registry.redhat.io/rhosp-rhel9/openstack-barbican-base" +"rhosp-rhel9/openstack-barbican-keystone-listener" = "registry.redhat.io/rhosp-rhel9/openstack-barbican-keystone-listener" +"rhosp-rhel9/openstack-barbican-worker" = "registry.redhat.io/rhosp-rhel9/openstack-barbican-worker" +"rhosp-rhel9/openstack-base" = "registry.redhat.io/rhosp-rhel9/openstack-base" +"rhosp-rhel9/openstack-ceilometer-base" = "registry.redhat.io/rhosp-rhel9/openstack-ceilometer-base" +"rhosp-rhel9/openstack-ceilometer-central" = "registry.redhat.io/rhosp-rhel9/openstack-ceilometer-central" +"rhosp-rhel9/openstack-ceilometer-compute" = "registry.redhat.io/rhosp-rhel9/openstack-ceilometer-compute" +"rhosp-rhel9/openstack-ceilometer-ipmi" = "registry.redhat.io/rhosp-rhel9/openstack-ceilometer-ipmi" +"rhosp-rhel9/openstack-ceilometer-notification" = "registry.redhat.io/rhosp-rhel9/openstack-ceilometer-notification" +"rhosp-rhel9/openstack-cinder-api" = "registry.redhat.io/rhosp-rhel9/openstack-cinder-api" +"rhosp-rhel9/openstack-cinder-backup" = "registry.redhat.io/rhosp-rhel9/openstack-cinder-backup" +"rhosp-rhel9/openstack-cinder-base" = "registry.redhat.io/rhosp-rhel9/openstack-cinder-base" +"rhosp-rhel9/openstack-cinder-scheduler" = "registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler" +"rhosp-rhel9/openstack-cinder-volume" = "registry.redhat.io/rhosp-rhel9/openstack-cinder-volume" +"rhosp-rhel9/openstack-collectd" = "registry.redhat.io/rhosp-rhel9/openstack-collectd" +"rhosp-rhel9/openstack-cron" = "registry.redhat.io/rhosp-rhel9/openstack-cron" +"rhosp-rhel9/openstack-dependencies" = "registry.redhat.io/rhosp-rhel9/openstack-dependencies" +"rhosp-rhel9/openstack-designate-api" = "registry.redhat.io/rhosp-rhel9/openstack-designate-api" +"rhosp-rhel9/openstack-designate-backend-bind9" = "registry.redhat.io/rhosp-rhel9/openstack-designate-backend-bind9" +"rhosp-rhel9/openstack-designate-base" = "registry.redhat.io/rhosp-rhel9/openstack-designate-base" +"rhosp-rhel9/openstack-designate-central" = "registry.redhat.io/rhosp-rhel9/openstack-designate-central" +"rhosp-rhel9/openstack-designate-mdns" = "registry.redhat.io/rhosp-rhel9/openstack-designate-mdns" +"rhosp-rhel9/openstack-designate-producer" = "registry.redhat.io/rhosp-rhel9/openstack-designate-producer" +"rhosp-rhel9/openstack-designate-sink" = "registry.redhat.io/rhosp-rhel9/openstack-designate-sink" +"rhosp-rhel9/openstack-designate-worker" = "registry.redhat.io/rhosp-rhel9/openstack-designate-worker" +"rhosp-rhel9/openstack-etcd" = "registry.redhat.io/rhosp-rhel9/openstack-etcd" +"rhosp-rhel9/openstack-frr" = "registry.redhat.io/rhosp-rhel9/openstack-frr" +"rhosp-rhel9/openstack-glance-api" = "registry.redhat.io/rhosp-rhel9/openstack-glance-api" +"rhosp-rhel9/openstack-gnocchi-api" = "registry.redhat.io/rhosp-rhel9/openstack-gnocchi-api" +"rhosp-rhel9/openstack-gnocchi-base" = "registry.redhat.io/rhosp-rhel9/openstack-gnocchi-base" +"rhosp-rhel9/openstack-gnocchi-metricd" = "registry.redhat.io/rhosp-rhel9/openstack-gnocchi-metricd" +"rhosp-rhel9/openstack-gnocchi-statsd" = "registry.redhat.io/rhosp-rhel9/openstack-gnocchi-statsd" +"rhosp-rhel9/openstack-haproxy" = "registry.redhat.io/rhosp-rhel9/openstack-haproxy" +"rhosp-rhel9/openstack-heat-all" = "registry.redhat.io/rhosp-rhel9/openstack-heat-all" +"rhosp-rhel9/openstack-heat-api-cfn" = "registry.redhat.io/rhosp-rhel9/openstack-heat-api-cfn" +"rhosp-rhel9/openstack-heat-api" = "registry.redhat.io/rhosp-rhel9/openstack-heat-api" +"rhosp-rhel9/openstack-heat-base" = "registry.redhat.io/rhosp-rhel9/openstack-heat-base" +"rhosp-rhel9/openstack-heat-engine" = "registry.redhat.io/rhosp-rhel9/openstack-heat-engine" +"rhosp-rhel9/openstack-horizon" = "registry.redhat.io/rhosp-rhel9/openstack-horizon" +"rhosp-rhel9/openstack-ironic-api" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-api" +"rhosp-rhel9/openstack-ironic-base" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-base" +"rhosp-rhel9/openstack-ironic-conductor" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-conductor" +"rhosp-rhel9/openstack-ironic-inspector" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-inspector" +"rhosp-rhel9/openstack-ironic-neutron-agent" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-neutron-agent" +"rhosp-rhel9/openstack-ironic-pxe" = "registry.redhat.io/rhosp-rhel9/openstack-ironic-pxe" +"rhosp-rhel9/openstack-iscsid" = "registry.redhat.io/rhosp-rhel9/openstack-iscsid" +"rhosp-rhel9/openstack-keystone" = "registry.redhat.io/rhosp-rhel9/openstack-keystone" +"rhosp-rhel9/openstack-manila-api" = "registry.redhat.io/rhosp-rhel9/openstack-manila-api" +"rhosp-rhel9/openstack-manila-base" = "registry.redhat.io/rhosp-rhel9/openstack-manila-base" +"rhosp-rhel9/openstack-manila-scheduler" = "registry.redhat.io/rhosp-rhel9/openstack-manila-scheduler" +"rhosp-rhel9/openstack-manila-share" = "registry.redhat.io/rhosp-rhel9/openstack-manila-share" +"rhosp-rhel9/openstack-mariadb" = "registry.redhat.io/rhosp-rhel9/openstack-mariadb" +"rhosp-rhel9/openstack-memcached" = "registry.redhat.io/rhosp-rhel9/openstack-memcached" +"rhosp-rhel9/openstack-multipathd" = "registry.redhat.io/rhosp-rhel9/openstack-multipathd" +"rhosp-rhel9/openstack-neutron-agent-base" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-agent-base" +"rhosp-rhel9/openstack-neutron-base" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-base" +"rhosp-rhel9/openstack-neutron-dhcp-agent" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-dhcp-agent" +"rhosp-rhel9/openstack-neutron-l3-agent" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-l3-agent" +"rhosp-rhel9/openstack-neutron-metadata-agent-ovn" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-metadata-agent-ovn" +"rhosp-rhel9/openstack-neutron-metadata-agent" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-metadata-agent" +"rhosp-rhel9/openstack-neutron-openvswitch-agent" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-openvswitch-agent" +"rhosp-rhel9/openstack-neutron-server" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-server" +"rhosp-rhel9/openstack-neutron-sriov-agent" = "registry.redhat.io/rhosp-rhel9/openstack-neutron-sriov-agent" +"rhosp-rhel9/openstack-nova-api" = "registry.redhat.io/rhosp-rhel9/openstack-nova-api" +"rhosp-rhel9/openstack-nova-base" = "registry.redhat.io/rhosp-rhel9/openstack-nova-base" +"rhosp-rhel9/openstack-nova-compute-ironic" = "registry.redhat.io/rhosp-rhel9/openstack-nova-compute-ironic" +"rhosp-rhel9/openstack-nova-compute" = "registry.redhat.io/rhosp-rhel9/openstack-nova-compute" +"rhosp-rhel9/openstack-nova-conductor" = "registry.redhat.io/rhosp-rhel9/openstack-nova-conductor" +"rhosp-rhel9/openstack-novajoin-base" = "registry.redhat.io/rhosp-rhel9/openstack-novajoin-base" +"rhosp-rhel9/openstack-novajoin-notifier" = "registry.redhat.io/rhosp-rhel9/openstack-novajoin-notifier" +"rhosp-rhel9/openstack-novajoin-server" = "registry.redhat.io/rhosp-rhel9/openstack-novajoin-server" +"rhosp-rhel9/openstack-nova-libvirt" = "registry.redhat.io/rhosp-rhel9/openstack-nova-libvirt" +"rhosp-rhel9/openstack-nova-novncproxy" = "registry.redhat.io/rhosp-rhel9/openstack-nova-novncproxy" +"rhosp-rhel9/openstack-nova-scheduler" = "registry.redhat.io/rhosp-rhel9/openstack-nova-scheduler" +"rhosp-rhel9/openstack-octavia-api" = "registry.redhat.io/rhosp-rhel9/openstack-octavia-api" +"rhosp-rhel9/openstack-octavia-base" = "registry.redhat.io/rhosp-rhel9/openstack-octavia-base" +"rhosp-rhel9/openstack-octavia-health-manager" = "registry.redhat.io/rhosp-rhel9/openstack-octavia-health-manager" +"rhosp-rhel9/openstack-octavia-housekeeping" = "registry.redhat.io/rhosp-rhel9/openstack-octavia-housekeeping" +"rhosp-rhel9/openstack-octavia-worker" = "registry.redhat.io/rhosp-rhel9/openstack-octavia-worker" +"rhosp-rhel9/openstack-ovn-base" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-base" +"rhosp-rhel9/openstack-ovn-bgp-agent" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-bgp-agent" +"rhosp-rhel9/openstack-ovn-controller" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-controller" +"rhosp-rhel9/openstack-ovn-nb-db-server" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-nb-db-server" +"rhosp-rhel9/openstack-ovn-northd" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-northd" +"rhosp-rhel9/openstack-ovn-sb-db-server" = "registry.redhat.io/rhosp-rhel9/openstack-ovn-sb-db-server" +"rhosp-rhel9/openstack-placement-api" = "registry.redhat.io/rhosp-rhel9/openstack-placement-api" +"rhosp-rhel9/openstack-qdrouterd" = "registry.redhat.io/rhosp-rhel9/openstack-qdrouterd" +"rhosp-rhel9/openstack-rabbitmq" = "registry.redhat.io/rhosp-rhel9/openstack-rabbitmq" +"rhosp-rhel9/openstack-redis" = "registry.redhat.io/rhosp-rhel9/openstack-redis" +"rhosp-rhel9/openstack-rsyslog" = "registry.redhat.io/rhosp-rhel9/openstack-rsyslog" +"rhosp-rhel9/openstack-swift-account" = "registry.redhat.io/rhosp-rhel9/openstack-swift-account" +"rhosp-rhel9/openstack-swift-base" = "registry.redhat.io/rhosp-rhel9/openstack-swift-base" +"rhosp-rhel9/openstack-swift-container" = "registry.redhat.io/rhosp-rhel9/openstack-swift-container" +"rhosp-rhel9/openstack-swift-object" = "registry.redhat.io/rhosp-rhel9/openstack-swift-object" +"rhosp-rhel9/openstack-swift-proxy-server" = "registry.redhat.io/rhosp-rhel9/openstack-swift-proxy-server" +"rhosp-rhel9/openstack-tempest" = "registry.redhat.io/rhosp-rhel9/openstack-tempest" +"rhosp-rhel9/openstack-tripleoclient" = "registry.redhat.io/rhosp-rhel9/openstack-tripleoclient" +"rhosp-rhel9/openstack-unbound" = "registry.redhat.io/rhosp-rhel9/openstack-unbound" +"rhosp-rhel9/osp-director-agent" = "registry.redhat.io/rhosp-rhel9/osp-director-agent" +"rhosp-rhel9/osp-director-downloader" = "registry.redhat.io/rhosp-rhel9/osp-director-downloader" +"rhosp-rhel9/osp-director-operator-bundle" = "registry.redhat.io/rhosp-rhel9/osp-director-operator-bundle" +"rhosp-rhel9/osp-director-operator" = "registry.redhat.io/rhosp-rhel9/osp-director-operator" +"rhpam-7/rhpam-businesscentral-monitoring-rhel8" = "registry.redhat.io/rhpam-7/rhpam-businesscentral-monitoring-rhel8" +"rhpam-7/rhpam-businesscentral-rhel8" = "registry.redhat.io/rhpam-7/rhpam-businesscentral-rhel8" +"rhpam-7/rhpam-controller-rhel8" = "registry.redhat.io/rhpam-7/rhpam-controller-rhel8" +"rhpam-7/rhpam-dashbuilder-rhel8" = "registry.redhat.io/rhpam-7/rhpam-dashbuilder-rhel8" +"rhpam-7/rhpam-kieserver-rhel8" = "registry.redhat.io/rhpam-7/rhpam-kieserver-rhel8" +"rhpam-7/rhpam-kogito-builder-rhel8" = "registry.redhat.io/rhpam-7/rhpam-kogito-builder-rhel8" +"rhpam-7/rhpam-kogito-rhel8-operator-bundle" = "registry.redhat.io/rhpam-7/rhpam-kogito-rhel8-operator-bundle" +"rhpam-7/rhpam-kogito-rhel8-operator" = "registry.redhat.io/rhpam-7/rhpam-kogito-rhel8-operator" +"rhpam-7/rhpam-kogito-runtime-jvm-rhel8" = "registry.redhat.io/rhpam-7/rhpam-kogito-runtime-jvm-rhel8" +"rhpam-7/rhpam-operator-bundle" = "registry.redhat.io/rhpam-7/rhpam-operator-bundle" +"rhpam-7/rhpam-process-migration-rhel8" = "registry.redhat.io/rhpam-7/rhpam-process-migration-rhel8" +"rhpam-7/rhpam-rhel8-operator" = "registry.redhat.io/rhpam-7/rhpam-rhel8-operator" +"rhpam-7/rhpam-smartrouter-rhel8" = "registry.redhat.io/rhpam-7/rhpam-smartrouter-rhel8" +"rh-sso-7/sso76-openshift-rhel8" = "registry.redhat.io/rh-sso-7/sso76-openshift-rhel8" +"rh-sso-7/sso7-rhel8-init-container" = "registry.redhat.io/rh-sso-7/sso7-rhel8-init-container" +"rh-sso-7/sso7-rhel8-operator-bundle" = "registry.redhat.io/rh-sso-7/sso7-rhel8-operator-bundle" +"rh-sso-7/sso7-rhel8-operator" = "registry.redhat.io/rh-sso-7/sso7-rhel8-operator" +"rhtas/certificate-transparency-rhel9" = "registry.redhat.io/rhtas/certificate-transparency-rhel9" +"rhtas/cosign-rhel9" = "registry.redhat.io/rhtas/cosign-rhel9" +"rhtas/ec-rhel9" = "registry.redhat.io/rhtas/ec-rhel9" +"rhtas/fulcio-rhel9" = "registry.redhat.io/rhtas/fulcio-rhel9" +"rhtas/gitsign-rhel9" = "registry.redhat.io/rhtas/gitsign-rhel9" +"rhtas/rekor-cli-rhel9" = "registry.redhat.io/rhtas/rekor-cli-rhel9" +"rhtas/rekor-search-ui-rhel9" = "registry.redhat.io/rhtas/rekor-search-ui-rhel9" +"rhtas/rekor-server-rhel9" = "registry.redhat.io/rhtas/rekor-server-rhel9" +"rhtas/rhtas-rhel9-operator" = "registry.redhat.io/rhtas/rhtas-rhel9-operator" +"rhtas/trillian-logserver-rhel9" = "registry.redhat.io/rhtas/trillian-logserver-rhel9" +"rhtas/trillian-logsigner-rhel9" = "registry.redhat.io/rhtas/trillian-logsigner-rhel9" +"rhtas/tuf-server-rhel9" = "registry.redhat.io/rhtas/tuf-server-rhel9" +"rhtpa/rhtpa-guac-rhel9" = "registry.redhat.io/rhtpa/rhtpa-guac-rhel9" +"rhtpa/rhtpa-trustification-service-rhel9" = "registry.redhat.io/rhtpa/rhtpa-trustification-service-rhel9" +"r/ibmcom/configurable-service-broker" = "hub.docker.com/r/ibmcom/configurable-service-broker" +"r/ibmcom/websphere-traditional" = "hub.docker.com/r/ibmcom/websphere-traditional" +"r/nscop/ncss12607" = "docker.io/r/nscop/ncss12607" +"robinio/robin-operator" = "registry.connect.redhat.com/robinio/robin-operator" +"robinio/robin-storage-enterprise" = "registry.connect.redhat.com/robinio/robin-storage-enterprise" +"robinio/robin-storage-express" = "registry.connect.redhat.com/robinio/robin-storage-express" +"robinio/robin-storage" = "registry.connect.redhat.com/robinio/robin-storage" +"robinio/robin-storage-trial" = "registry.connect.redhat.com/robinio/robin-storage-trial" +"rocketchat/rocketchat-apb" = "registry.connect.redhat.com/rocketchat/rocketchat-apb" +"rocketchat/rocketchat-operator-bundle" = "registry.connect.redhat.com/rocketchat/rocketchat-operator-bundle" +"rocketchat/rocketchat" = "registry.connect.redhat.com/rocketchat/rocketchat" +"rookout/rookout-k8s-operator" = "registry.connect.redhat.com/rookout/rookout-k8s-operator" +"rookout/rookout-operator" = "registry.connect.redhat.com/rookout/rookout-operator" +"router" = "bds-docker-release.jfrog.io/router" +"rtf/runtime-fabric-operator" = "registry.connect.redhat.com/rtf/runtime-fabric-operator" +"run-ai-prod/operator" = "gcr.io/run-ai-prod/operator" +"runai/runai-ocp-cluster-installer" = "registry.connect.redhat.com/runai/runai-ocp-cluster-installer" +"run-once-duration-override-operator/run-once-duration-override-operator-bundle" = "registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-operator-bundle" +"run-once-duration-override-operator/run-once-duration-override-operator-rhel8" = "registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-operator-rhel8" +"run-once-duration-override-operator/run-once-duration-override-rhel8" = "registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-rhel8" +"run-once-duration-override-operator/run-once-duration-override-rhel9-operator" = "registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-rhel9-operator" +"run-once-duration-override-operator/run-once-duration-override-rhel9" = "registry.redhat.io/run-once-duration-override-operator/run-once-duration-override-rhel9" +"sa" = "162015117822.dkr.ecr.eu-west-1.amazonaws.com/sa" +"sac/sac-api-rest-ubi8" = "pubdockerregistry.incognito.com/sac/sac-api-rest-ubi8" +"sac/sac-api-soap-ubi8" = "pubdockerregistry.incognito.com/sac/sac-api-soap-ubi8" +"sac/sac-api-tmf-ubi8" = "pubdockerregistry.incognito.com/sac/sac-api-tmf-ubi8" +"sac/sac-jms-consumer-ubi8" = "pubdockerregistry.incognito.com/sac/sac-jms-consumer-ubi8" +"sac/sac-notification-service-ubi8" = "pubdockerregistry.incognito.com/sac/sac-notification-service-ubi8" +"sac/sac-radius-consumer-ubi8" = "pubdockerregistry.incognito.com/sac/sac-radius-consumer-ubi8" +"sac/sac-service-scheduler-ubi8" = "pubdockerregistry.incognito.com/sac/sac-service-scheduler-ubi8" +"sac/sac-snmp-trap-consumer-ubi8" = "pubdockerregistry.incognito.com/sac/sac-snmp-trap-consumer-ubi8" +"sac/sac-svc-ubi8" = "pubdockerregistry.incognito.com/sac/sac-svc-ubi8" +"sac/sac-tools-ubi8" = "pubdockerregistry.incognito.com/sac/sac-tools-ubi8" +"sac/sac-ui-ubi8" = "pubdockerregistry.incognito.com/sac/sac-ui-ubi8" +"sahumohan/fistack/fi_startup" = "quay.io/sahumohan/fistack/fi_startup" +"sanjeev_thukral/findout" = "quay.io/sanjeev_thukral/findout" +"sanjeev_thukral/findout_tags_predictor" = "quay.io/sanjeev_thukral/findout_tags_predictor" +"sanjeev_thukral/visionbee" = "quay.io/sanjeev_thukral/visionbee" +"scaleout/stateserver" = "registry.connect.redhat.com/scaleout/stateserver" +"scality/swift-scality-backend" = "registry.connect.redhat.com/scality/swift-scality-backend" +"seagate/seagate-exos-x-csi" = "registry.connect.redhat.com/seagate/seagate-exos-x-csi" +"search-service" = "bds-docker-release.jfrog.io/search-service" +"sedcowti/listing-api-gateway" = "docker.io/sedcowti/listing-api-gateway" +"seldonio/alibi-detect-server" = "registry.connect.redhat.com/seldonio/alibi-detect-server" +"seldonio/alibiexplainer" = "registry.connect.redhat.com/seldonio/alibiexplainer" +"seldonio/kubectl" = "registry.connect.redhat.com/seldonio/kubectl" +"seldonio/mc-ubi" = "registry.connect.redhat.com/seldonio/mc-ubi" +"seldonio/mlflowserver-grpc" = "registry.connect.redhat.com/seldonio/mlflowserver-grpc" +"seldonio/mlflowserver" = "registry.connect.redhat.com/seldonio/mlflowserver" +"seldonio/mlflowserver-rest" = "registry.connect.redhat.com/seldonio/mlflowserver-rest" +"seldonio/mlserver" = "registry.connect.redhat.com/seldonio/mlserver" +"seldonio/mlserver-sc" = "registry.connect.redhat.com/seldonio/mlserver-sc" +"seldonio/mlserver-sc-slim" = "registry.connect.redhat.com/seldonio/mlserver-sc-slim" +"seldonio/mock-classifier" = "registry.connect.redhat.com/seldonio/mock-classifier" +"seldonio/rclone-storage-initializer" = "registry.connect.redhat.com/seldonio/rclone-storage-initializer" +"seldonio/seldon-batch-processor" = "registry.connect.redhat.com/seldonio/seldon-batch-processor" +"seldonio/seldon-core-executor" = "registry.connect.redhat.com/seldonio/seldon-core-executor" +"seldonio/seldon-core-operator-bundle" = "registry.connect.redhat.com/seldonio/seldon-core-operator-bundle" +"seldonio/seldon-core-operator" = "registry.connect.redhat.com/seldonio/seldon-core-operator" +"seldonio/seldon-deploy-operator-bundle" = "registry.connect.redhat.com/seldonio/seldon-deploy-operator-bundle" +"seldonio/seldon-deploy-operator" = "registry.connect.redhat.com/seldonio/seldon-deploy-operator" +"seldonio/seldon-deploy" = "registry.connect.redhat.com/seldonio/seldon-deploy" +"seldonio/seldon-engine" = "registry.connect.redhat.com/seldonio/seldon-engine" +"seldonio/seldon-loadtester" = "registry.connect.redhat.com/seldonio/seldon-loadtester" +"seldonio/seldon-request-logger" = "registry.connect.redhat.com/seldonio/seldon-request-logger" +"seldonio/sklearnserver-grpc" = "registry.connect.redhat.com/seldonio/sklearnserver-grpc" +"seldonio/sklearnserver" = "registry.connect.redhat.com/seldonio/sklearnserver" +"seldonio/sklearnserver-rest" = "registry.connect.redhat.com/seldonio/sklearnserver-rest" +"seldonio/storage-initializer" = "registry.connect.redhat.com/seldonio/storage-initializer" +"seldonio/tensorflow-serving" = "registry.connect.redhat.com/seldonio/tensorflow-serving" +"seldonio/tfproxy-grpc" = "registry.connect.redhat.com/seldonio/tfproxy-grpc" +"seldonio/tfproxy" = "registry.connect.redhat.com/seldonio/tfproxy" +"seldonio/tfproxy-rest" = "registry.connect.redhat.com/seldonio/tfproxy-rest" +"seldonio/xgboostserver-grpc" = "registry.connect.redhat.com/seldonio/xgboostserver-grpc" +"seldonio/xgboostserver" = "registry.connect.redhat.com/seldonio/xgboostserver" +"seldonio/xgboostserver-rest" = "registry.connect.redhat.com/seldonio/xgboostserver-rest" +"sematext/agent" = "registry.connect.redhat.com/sematext/agent" +"sematext/logagent" = "registry.connect.redhat.com/sematext/logagent" +"sematext/sematext-agent-docker" = "registry.connect.redhat.com/sematext/sematext-agent-docker" +"sematext/sematext-operator-bundle" = "registry.connect.redhat.com/sematext/sematext-operator-bundle" +"sematext/sematext-operator" = "registry.connect.redhat.com/sematext/sematext-operator" +"senseforth/ai-chatbot" = "registry.connect.redhat.com/senseforth/ai-chatbot" +"sensu/sensu" = "registry.connect.redhat.com/sensu/sensu" +"service-interconnect/skupper-config-sync-rhel9" = "registry.redhat.io/service-interconnect/skupper-config-sync-rhel9" +"service-interconnect/skupper-controller-podman-container-rhel9" = "registry.redhat.io/service-interconnect/skupper-controller-podman-container-rhel9" +"service-interconnect/skupper-controller-podman-rhel9" = "registry.redhat.io/service-interconnect/skupper-controller-podman-rhel9" +"service-interconnect/skupper-flow-collector-rhel9" = "registry.redhat.io/service-interconnect/skupper-flow-collector-rhel9" +"service-interconnect/skupper-operator-bundle" = "registry.redhat.io/service-interconnect/skupper-operator-bundle" +"service-interconnect/skupper-router-rhel9" = "registry.redhat.io/service-interconnect/skupper-router-rhel9" +"service-interconnect/skupper-service-controller-rhel9" = "registry.redhat.io/service-interconnect/skupper-service-controller-rhel9" +"service-interconnect/skupper-site-controller-rhel9" = "registry.redhat.io/service-interconnect/skupper-site-controller-rhel9" +"signalfx-inc/smart-agent" = "registry.connect.redhat.com/signalfx-inc/smart-agent" +"silicom/gpsd" = "quay.io/silicom/gpsd" +"silicom/grpc-tsyncd" = "quay.io/silicom/grpc-tsyncd" +"silicomltd/silicom-sts-operator" = "registry.connect.redhat.com/silicomltd/silicom-sts-operator" +"silicom/phc2sys" = "quay.io/silicom/phc2sys" +"silicom/sts-operator" = "quay.io/silicom/sts-operator" +"silicom/sts-plugin" = "quay.io/silicom/sts-plugin" +"silicom/tsyncd" = "quay.io/silicom/tsyncd" +"sixfusion/openshift-collector1" = "registry.connect.redhat.com/sixfusion/openshift-collector1" +"slcorp/rtview-dataserver" = "registry.connect.redhat.com/slcorp/rtview-dataserver" +"smartvista/public/svip-backend" = "repo.bpcbt.com/smartvista/public/svip-backend" +"smartvista/public/svip-frontend" = "repo.bpcbt.com/smartvista/public/svip-frontend" +"smartvista/public/svip-initdb" = "repo.bpcbt.com/smartvista/public/svip-initdb" +"smilecdr/smilecdr" = "registry.connect.redhat.com/smilecdr/smilecdr" +"snapt/snaptadc" = "registry.connect.redhat.com/snapt/snaptadc" +"snyk/kubernetes-monitor" = "registry.connect.redhat.com/snyk/kubernetes-monitor" +"snyk/kubernetes-operator-bundle" = "registry.connect.redhat.com/snyk/kubernetes-operator-bundle" +"snyk/kubernetes-operator" = "registry.connect.redhat.com/snyk/kubernetes-operator" +"solace/pubsubplus-eventbroker-operator-bundle" = "registry.connect.redhat.com/solace/pubsubplus-eventbroker-operator-bundle" +"solace/pubsubplus-eventbroker-operator" = "registry.connect.redhat.com/solace/pubsubplus-eventbroker-operator" +"solace/pubsubplus-prometheus-exporter" = "registry.connect.redhat.com/solace/pubsubplus-prometheus-exporter" +"solace/pubsubplus-standard" = "registry.connect.redhat.com/solace/pubsubplus-standard" +"sonatype/nexus-iq-server" = "registry.connect.redhat.com/sonatype/nexus-iq-server" +"sonatype/nexus-repository-ha-operator-bundle" = "registry.connect.redhat.com/sonatype/nexus-repository-ha-operator-bundle" +"sonatype/nexus-repository-manager" = "registry.connect.redhat.com/sonatype/nexus-repository-manager" +"sosivio/operator-bundle" = "registry.connect.redhat.com/sosivio/operator-bundle" +"soterosoft/detect-api" = "quay.io/soterosoft/detect-api" +"soterosoft/nifi" = "quay.io/soterosoft/nifi" +"soterosoft/redis-bloom" = "quay.io/soterosoft/redis-bloom" +"soterosoft/sotero-api" = "quay.io/soterosoft/sotero-api" +"soterosoft/sotero-tenant-mh" = "quay.io/soterosoft/sotero-tenant-mh" +"soterosoft/sotero-tools" = "quay.io/soterosoft/sotero-tools" +"soterosoft/sotero-ui" = "quay.io/soterosoft/sotero-ui" +"soterosoft/sqlproxy" = "quay.io/soterosoft/sqlproxy" +"soterosoft/tenant-api" = "quay.io/soterosoft/tenant-api" +"source-to-image/source-to-image-rhel8" = "registry.redhat.io/source-to-image/source-to-image-rhel8" +"splunk/sck101" = "registry.connect.redhat.com/splunk/sck101" +"splunk/splunk" = "docker.io/splunk/splunk" +"splunk/splunk-operator" = "docker.io/splunk/splunk-operator" +"spotinst/ocean-operator" = "docker.io/spotinst/ocean-operator" +"srsran/srsran-cu-du-ubi8" = "registry.connect.redhat.com/srsran/srsran-cu-du-ubi8" +"ss8inc/ccpag" = "quay.io/ss8inc/ccpag" +"ss8inc/xcipio-img-5gcmdf3" = "quay.io/ss8inc/xcipio-img-5gcmdf3" +"stackable/airflow" = "docker.stackable.tech/stackable/airflow" +"stackable/commons-operator" = "docker.stackable.tech/stackable/commons-operator" +"stackable/druid" = "docker.stackable.tech/stackable/druid" +"stackable/hadoop" = "docker.stackable.tech/stackable/hadoop" +"stackable/hbase" = "docker.stackable.tech/stackable/hbase" +"stackable/hive" = "docker.stackable.tech/stackable/hive" +"stackable/kafka" = "docker.stackable.tech/stackable/kafka" +"stackable/listener-operator" = "registry.connect.redhat.com/stackable/listener-operator" +"stackable/nifi" = "docker.stackable.tech/stackable/nifi" +"stackable/opa" = "docker.stackable.tech/stackable/opa" +"stackable/secret-operator" = "registry.connect.redhat.com/stackable/secret-operator" +"stackable/spark-k8s" = "docker.stackable.tech/stackable/spark-k8s" +"stackable/stackable-apache-airflow-operator" = "registry.connect.redhat.com/stackable/stackable-apache-airflow-operator" +"stackable/stackable-apache-druid-operator" = "registry.connect.redhat.com/stackable/stackable-apache-druid-operator" +"stackable/stackable-apache-hbase-operator" = "registry.connect.redhat.com/stackable/stackable-apache-hbase-operator" +"stackable/stackable-apache-hdfs-operator" = "registry.connect.redhat.com/stackable/stackable-apache-hdfs-operator" +"stackable/stackable-apache-hive-operator" = "registry.connect.redhat.com/stackable/stackable-apache-hive-operator" +"stackable/stackable-apache-kafka-operator" = "registry.connect.redhat.com/stackable/stackable-apache-kafka-operator" +"stackable/stackable-apache-nifi-operator" = "registry.connect.redhat.com/stackable/stackable-apache-nifi-operator" +"stackable/stackable-apache-spark-k8s-operator" = "registry.connect.redhat.com/stackable/stackable-apache-spark-k8s-operator" +"stackable/stackable-apache-superset-operator" = "registry.connect.redhat.com/stackable/stackable-apache-superset-operator" +"stackable/stackable-apache-zookeeper-operator" = "registry.connect.redhat.com/stackable/stackable-apache-zookeeper-operator" +"stackable/stackable-commons-operator" = "registry.connect.redhat.com/stackable/stackable-commons-operator" +"stackable/stackable-opa-operator" = "registry.connect.redhat.com/stackable/stackable-opa-operator" +"stackable/stackable-trino-operator" = "registry.connect.redhat.com/stackable/stackable-trino-operator" +"stackable/superset" = "docker.stackable.tech/stackable/superset" +"stackable/trino" = "docker.stackable.tech/stackable/trino" +"stackable/zookeeper" = "docker.stackable.tech/stackable/zookeeper" +"stackgres/admin-ui" = "docker.io/stackgres/admin-ui" +"stackgres/cluster-controller" = "docker.io/stackgres/cluster-controller" +"stackgres/distributedlogs-controller" = "docker.io/stackgres/distributedlogs-controller" +"stackgres/jobs" = "docker.io/stackgres/jobs" +"stackgres/operator" = "docker.io/stackgres/operator" +"stackgres/restapi" = "docker.io/stackgres/restapi" +"stakater/mto-common" = "registry.connect.redhat.com/stakater/mto-common" +"stakater/mto-console" = "registry.connect.redhat.com/stakater/mto-console" +"stakater/mto-gateway" = "registry.connect.redhat.com/stakater/mto-gateway" +"stakater/mto-keycloak" = "registry.connect.redhat.com/stakater/mto-keycloak" +"stakater/tenant-operator-0" = "registry.connect.redhat.com/stakater/tenant-operator-0" +"stakater/tenant-operator" = "registry.connect.redhat.com/stakater/tenant-operator" +"starburst/hive" = "registry.connect.redhat.com/starburst/hive" +"starburst/keda-trino-scaler" = "registry.connect.redhat.com/starburst/keda-trino-scaler" +"starburst/presto-init" = "registry.connect.redhat.com/starburst/presto-init" +"starburst/presto-operator-bundle" = "registry.connect.redhat.com/starburst/presto-operator-bundle" +"starburst/starburst-enterprise-helm-operator-bundle-certified" = "registry.connect.redhat.com/starburst/starburst-enterprise-helm-operator-bundle-certified" +"starburst/starburst-enterprise-helm-operator-bundle" = "registry.connect.redhat.com/starburst/starburst-enterprise-helm-operator-bundle" +"starburst/starburst-enterprise-helm-operator-paygo-bundle-certified" = "registry.connect.redhat.com/starburst/starburst-enterprise-helm-operator-paygo-bundle-certified" +"starburst/starburst-enterprise-helm-operator" = "registry.connect.redhat.com/starburst/starburst-enterprise-helm-operator" +"starburst/starburst-enterprise-init" = "registry.connect.redhat.com/starburst/starburst-enterprise-init" +"starburst/starburst-enterprise" = "registry.connect.redhat.com/starburst/starburst-enterprise" +"steamngin/rubicon-operator-bundle" = "registry.connect.redhat.com/steamngin/rubicon-operator-bundle" +"steamngin/stealserver-operator-bundle" = "registry.connect.redhat.com/steamngin/stealserver-operator-bundle" +"stf/prometheus-webhook-snmp-rhel8" = "registry.redhat.io/stf/prometheus-webhook-snmp-rhel8" +"stf/service-telemetry-operator-bundle" = "registry.redhat.io/stf/service-telemetry-operator-bundle" +"stf/service-telemetry-rhel8-operator" = "registry.redhat.io/stf/service-telemetry-rhel8-operator" +"stf/sg-bridge-rhel8" = "registry.redhat.io/stf/sg-bridge-rhel8" +"stf/sg-core-rhel8" = "registry.redhat.io/stf/sg-core-rhel8" +"stf/smart-gateway-operator-bundle" = "registry.redhat.io/stf/smart-gateway-operator-bundle" +"stf/smart-gateway-rhel8-operator" = "registry.redhat.io/stf/smart-gateway-rhel8-operator" +"stonebranch/stonebranch-operator-bundle" = "registry.connect.redhat.com/stonebranch/stonebranch-operator-bundle" +"stonebranch/stonebranch-operator" = "registry.connect.redhat.com/stonebranch/stonebranch-operator" +"stonebranch/universalagent66" = "registry.connect.redhat.com/stonebranch/universalagent66" +"stonebranch/universal-agent" = "registry.connect.redhat.com/stonebranch/universal-agent" +"storageos/api-manager" = "registry.connect.redhat.com/storageos/api-manager" +"storageos/cluster-operator2-bundle" = "registry.connect.redhat.com/storageos/cluster-operator2-bundle" +"storageos/cluster-operator2" = "registry.connect.redhat.com/storageos/cluster-operator2" +"storageos/cluster-operator" = "registry.connect.redhat.com/storageos/cluster-operator" +"storageos/csi-attacher" = "registry.connect.redhat.com/storageos/csi-attacher" +"storageos/csi-cluster-driver-registrar" = "registry.connect.redhat.com/storageos/csi-cluster-driver-registrar" +"storageos/csi-livenessprobe" = "registry.connect.redhat.com/storageos/csi-livenessprobe" +"storageos/csi-node-driver-registrar" = "registry.connect.redhat.com/storageos/csi-node-driver-registrar" +"storageos/csi-provisioner" = "registry.connect.redhat.com/storageos/csi-provisioner" +"storageos/csi-resizer" = "registry.connect.redhat.com/storageos/csi-resizer" +"storageos/init" = "registry.connect.redhat.com/storageos/init" +"storageos/kube-scheduler" = "registry.connect.redhat.com/storageos/kube-scheduler" +"storageos/nfs" = "registry.connect.redhat.com/storageos/nfs" +"storageos/node" = "registry.connect.redhat.com/storageos/node" +"store/marklogicdb/marklogic-server" = "docker.io/store/marklogicdb/marklogic-server" +"storware/sbr-node" = "registry.connect.redhat.com/storware/sbr-node" +"storware/sbr-operator-bundle-rhmp" = "registry.connect.redhat.com/storware/sbr-operator-bundle-rhmp" +"storware/sbr-operator" = "registry.connect.redhat.com/storware/sbr-operator" +"storware/sbr-server" = "registry.connect.redhat.com/storware/sbr-server" +"storware/vprotect-init" = "registry.connect.redhat.com/storware/vprotect-init" +"storware/vprotect-node" = "registry.connect.redhat.com/storware/vprotect-node" +"storware/vprotect-operator-bundle" = "registry.connect.redhat.com/storware/vprotect-operator-bundle" +"storware/vprotect-operator" = "registry.connect.redhat.com/storware/vprotect-operator" +"storware/vprotect-server" = "registry.connect.redhat.com/storware/vprotect-server" +"streamnative/bookkeeper-operator-bundle" = "registry.connect.redhat.com/streamnative/bookkeeper-operator-bundle" +"streamnative/bookkeeper" = "registry.connect.redhat.com/streamnative/bookkeeper" +"streamnative/function-mesh-bundle" = "registry.connect.redhat.com/streamnative/function-mesh-bundle" +"streamnative/function-mesh" = "registry.connect.redhat.com/streamnative/function-mesh" +"streamnativeio/pulsar-resources-operator" = "quay.io/streamnativeio/pulsar-resources-operator" +"streamnativeio/sn-operator" = "quay.io/streamnativeio/sn-operator" +"streamnative/pulsar-operator-bundle" = "registry.connect.redhat.com/streamnative/pulsar-operator-bundle" +"streamnative/pulsar-operator" = "registry.connect.redhat.com/streamnative/pulsar-operator" +"streamnative/pulsar-resources-operator-bundle" = "registry.connect.redhat.com/streamnative/pulsar-resources-operator-bundle" +"streamnative/sn-operator-bundle" = "registry.connect.redhat.com/streamnative/sn-operator-bundle" +"streamnative/zookeeper-operator-bundle" = "registry.connect.redhat.com/streamnative/zookeeper-operator-bundle" +"streamnative/zookeeper-operator" = "registry.connect.redhat.com/streamnative/zookeeper-operator" +"sumologic/autoinstrumentation-dotnet" = "registry.connect.redhat.com/sumologic/autoinstrumentation-dotnet" +"sumologic/autoinstrumentation-java" = "registry.connect.redhat.com/sumologic/autoinstrumentation-java" +"sumologic/autoinstrumentation-nodejs" = "registry.connect.redhat.com/sumologic/autoinstrumentation-nodejs" +"sumologic/autoinstrumentation-python" = "registry.connect.redhat.com/sumologic/autoinstrumentation-python" +"sumologic/busybox" = "registry.connect.redhat.com/sumologic/busybox" +"sumologic/fluent-bit" = "registry.connect.redhat.com/sumologic/fluent-bit" +"sumologic/kube-rbac-proxy" = "registry.connect.redhat.com/sumologic/kube-rbac-proxy" +"sumologic/kubernetes-fluentd" = "registry.connect.redhat.com/sumologic/kubernetes-fluentd" +"sumologic/kubernetes-setup" = "registry.connect.redhat.com/sumologic/kubernetes-setup" +"sumologic/kubernetes-tools-kubectl" = "registry.connect.redhat.com/sumologic/kubernetes-tools-kubectl" +"sumologic/kube-state-metrics" = "registry.connect.redhat.com/sumologic/kube-state-metrics" +"sumologic/metrics-server" = "registry.connect.redhat.com/sumologic/metrics-server" +"sumologic/nginx-unprivileged" = "registry.connect.redhat.com/sumologic/nginx-unprivileged" +"sumologic/node-exporter" = "registry.connect.redhat.com/sumologic/node-exporter" +"sumologic/opentelemetry-collector-contrib" = "registry.connect.redhat.com/sumologic/opentelemetry-collector-contrib" +"sumologic/opentelemetry-collector" = "registry.connect.redhat.com/sumologic/opentelemetry-collector" +"sumologic/opentelemetry-operator" = "registry.connect.redhat.com/sumologic/opentelemetry-operator" +"sumologic/prometheus-config-reloader" = "registry.connect.redhat.com/sumologic/prometheus-config-reloader" +"sumologic/prometheus-operator" = "registry.connect.redhat.com/sumologic/prometheus-operator" +"sumologic/prometheus" = "registry.connect.redhat.com/sumologic/prometheus" +"sumologic/sumologic-kubernetes-collection-helm-operator-bundle-marketplace" = "registry.connect.redhat.com/sumologic/sumologic-kubernetes-collection-helm-operator-bundle-marketplace" +"sumologic/sumologic-kubernetes-collection-helm-operator-bundle" = "registry.connect.redhat.com/sumologic/sumologic-kubernetes-collection-helm-operator-bundle" +"sumologic/sumologic-kubernetes-collection-helm-operator" = "registry.connect.redhat.com/sumologic/sumologic-kubernetes-collection-helm-operator" +"sumologic/sumologic-otel-collector" = "registry.connect.redhat.com/sumologic/sumologic-otel-collector" +"sumologic/tailing-sidecar-operator" = "registry.connect.redhat.com/sumologic/tailing-sidecar-operator" +"sumologic/tailing-sidecar" = "registry.connect.redhat.com/sumologic/tailing-sidecar" +"sumologic/telegraf-operator" = "registry.connect.redhat.com/sumologic/telegraf-operator" +"sumologic/telegraf" = "registry.connect.redhat.com/sumologic/telegraf" +"sumologic/thanos" = "registry.connect.redhat.com/sumologic/thanos" +"sysdig/agent" = "registry.connect.redhat.com/sysdig/agent" +"takebishi/devicegateway" = "registry.connect.redhat.com/takebishi/devicegateway" +"tetrate/tsb/bridge-migration" = "docker.cloudsmith.io/tetrate/tsb/bridge-migration" +"tetrate/tsb/bridge-server" = "docker.cloudsmith.io/tetrate/tsb/bridge-server" +"tetrate/tsb/iam-jwt" = "docker.cloudsmith.io/tetrate/tsb/iam-jwt" +"tetrate/tsb/iam-server" = "docker.cloudsmith.io/tetrate/tsb/iam-server" +"tetrate/tsb/mpc-server" = "docker.cloudsmith.io/tetrate/tsb/mpc-server" +"tetrate/tsb/ngac-agent" = "docker.cloudsmith.io/tetrate/tsb/ngac-agent" +"tetrate/tsb/ngac-server" = "docker.cloudsmith.io/tetrate/tsb/ngac-server" +"tetrate/tsb/onboarding-operator-server" = "docker.cloudsmith.io/tetrate/tsb/onboarding-operator-server" +"tetrate/tsb/onboarding-plane-server" = "docker.cloudsmith.io/tetrate/tsb/onboarding-plane-server" +"tetrate/tsb/onboarding-repository-server" = "docker.cloudsmith.io/tetrate/tsb/onboarding-repository-server" +"tetrate/tsb/spm-central" = "docker.cloudsmith.io/tetrate/tsb/spm-central" +"tetrate/tsb/spm-user" = "docker.cloudsmith.io/tetrate/tsb/spm-user" +"tetrate/tsb/tcc-web-ui" = "docker.cloudsmith.io/tetrate/tsb/tcc-web-ui" +"tetrate/tsb/teamsync-job" = "docker.cloudsmith.io/tetrate/tsb/teamsync-job" +"tetrate/tsb/tetrate-envsubst" = "docker.cloudsmith.io/tetrate/tsb/tetrate-envsubst" +"tetrate/tsb/tsboperator-server" = "docker.cloudsmith.io/tetrate/tsb/tsboperator-server" +"tetrate/tsb/xcpd" = "docker.cloudsmith.io/tetrate/tsb/xcpd" +"tetrate/tsb/xcp-operator" = "docker.cloudsmith.io/tetrate/tsb/xcp-operator" +"thalesciphertrust/ciphertrust-transparent-encryption-kubernetes" = "docker.io/thalesciphertrust/ciphertrust-transparent-encryption-kubernetes" +"thalescpl/ciphertrust-transparent-encryption-kubernetes-operator-bundle" = "registry.connect.redhat.com/thalescpl/ciphertrust-transparent-encryption-kubernetes-operator-bundle" +"thalescpl/lunaclient-operator-bundle" = "registry.connect.redhat.com/thalescpl/lunaclient-operator-bundle" +"thalescpl/lunaclient" = "registry.connect.redhat.com/thalescpl/lunaclient" +"thestormforge/optimize-controller-ubi8" = "registry.connect.redhat.com/thestormforge/optimize-controller-ubi8" +"thestormforge/stormforge-optimize" = "registry.connect.redhat.com/thestormforge/stormforge-optimize" +"thewalnutai/vega-audit" = "docker.io/thewalnutai/vega-audit" +"thewalnutai/vega-coa" = "docker.io/thewalnutai/vega-coa" +"thewalnutai/vega-extraction" = "docker.io/thewalnutai/vega-extraction" +"thewalnutai/vega-workflow" = "docker.io/thewalnutai/vega-workflow" +"tigera/operator-init" = "quay.io/tigera/operator-init" +"tigera/operator" = "registry.connect.redhat.com/tigera/operator" +"tmax/jeus7-0-0-5-das-openshift" = "registry.connect.redhat.com/tmax/jeus7-0-0-5-das-openshift" +"tmax/jeus8-0-0-0-das-openshift" = "registry.connect.redhat.com/tmax/jeus8-0-0-0-das-openshift" +"tmax/tibero6-06-openshift" = "registry.connect.redhat.com/tmax/tibero6-06-openshift" +"tonyfieit/ibmz-mongodb-ee-operator-bundle" = "registry.connect.redhat.com/tonyfieit/ibmz-mongodb-ee-operator-bundle" +"tonyfieit/ibmz-mongodb-operator-bundle" = "registry.connect.redhat.com/tonyfieit/ibmz-mongodb-operator-bundle" +"tremolosecurity/activemq" = "registry.connect.redhat.com/tremolosecurity/activemq" +"tremolosecurity/openunison-operator-bundle" = "registry.connect.redhat.com/tremolosecurity/openunison-operator-bundle" +"tremolosecurity/openunison-operator" = "registry.connect.redhat.com/tremolosecurity/openunison-operator" +"tremolosecurity/openunison-s2i-10" = "registry.connect.redhat.com/tremolosecurity/openunison-s2i-10" +"tremolosecurity/unison-10" = "registry.connect.redhat.com/tremolosecurity/unison-10" +"triggermesh/aws-event-sources-operator-bundle-rhmp" = "registry.connect.redhat.com/triggermesh/aws-event-sources-operator-bundle-rhmp" +"trilio/analyzer" = "registry.connect.redhat.com/trilio/analyzer" +"trilio/backup-cleaner" = "registry.connect.redhat.com/trilio/backup-cleaner" +"trilio/backup-retention" = "registry.connect.redhat.com/trilio/backup-retention" +"trilio/backup-scheduler" = "registry.connect.redhat.com/trilio/backup-scheduler" +"trilio/control-plane-init" = "registry.connect.redhat.com/trilio/control-plane-init" +"trilio/control-plane" = "registry.connect.redhat.com/trilio/control-plane" +"trilio/conversion-controller" = "registry.connect.redhat.com/trilio/conversion-controller" +"triliodata/control-plane" = "quay.io/triliodata/control-plane" +"triliodata/datamover" = "quay.io/triliodata/datamover" +"triliodata/dex" = "quay.io/triliodata/dex" +"triliodata/event-stack" = "quay.io/triliodata/event-stack" +"triliodata/k8s-triliovault-operator" = "quay.io/triliodata/k8s-triliovault-operator" +"trilio/datamover" = "registry.connect.redhat.com/trilio/datamover" +"triliodata/nats" = "quay.io/triliodata/nats" +"triliodata/operator-webhook-init" = "quay.io/triliodata/operator-webhook-init" +"trilio/datastore-attacher" = "registry.connect.redhat.com/trilio/datastore-attacher" +"triliodata/web" = "quay.io/triliodata/web" +"trilio/dex" = "registry.connect.redhat.com/trilio/dex" +"trilio/event-stack" = "registry.connect.redhat.com/trilio/event-stack" +"trilio/exporter" = "registry.connect.redhat.com/trilio/exporter" +"trilio/hook-executor" = "registry.connect.redhat.com/trilio/hook-executor" +"trilio/ingress-controller" = "registry.connect.redhat.com/trilio/ingress-controller" +"trilio/k8s-triliovault-operator" = "registry.connect.redhat.com/trilio/k8s-triliovault-operator" +"trilio/metamover" = "registry.connect.redhat.com/trilio/metamover" +"trilio/minio" = "registry.connect.redhat.com/trilio/minio" +"trilio/nats" = "registry.connect.redhat.com/trilio/nats" +"trilio/target-browser" = "registry.connect.redhat.com/trilio/target-browser" +"trilio/trilio-admission-webhook" = "registry.connect.redhat.com/trilio/trilio-admission-webhook" +"trilio/trilio-datamover-api" = "registry.connect.redhat.com/trilio/trilio-datamover-api" +"trilio/trilio-datamover" = "registry.connect.redhat.com/trilio/trilio-datamover" +"trilio/trilio-horizon-plugin" = "registry.connect.redhat.com/trilio/trilio-horizon-plugin" +"trilio/trilio-init" = "registry.connect.redhat.com/trilio/trilio-init" +"trilio/trilio-webhook-init" = "registry.connect.redhat.com/trilio/trilio-webhook-init" +"trilio/trilio-wlm" = "registry.connect.redhat.com/trilio/trilio-wlm" +"trilio/web-backend" = "registry.connect.redhat.com/trilio/web-backend" +"trilio/web" = "registry.connect.redhat.com/trilio/web" +"truong82/microak-br" = "docker.io/truong82/microak-br" +"tufin/kite" = "registry.connect.redhat.com/tufin/kite" +"tufin/monitor" = "registry.connect.redhat.com/tufin/monitor" +"tufin/orca-operator-bundle" = "registry.connect.redhat.com/tufin/orca-operator-bundle" +"tufin/orca-operator" = "registry.connect.redhat.com/tufin/orca-operator" +"turbonomic/action-orchestrator" = "registry.connect.redhat.com/turbonomic/action-orchestrator" +"turbonomic/api" = "registry.connect.redhat.com/turbonomic/api" +"turbonomic/auth" = "registry.connect.redhat.com/turbonomic/auth" +"turbonomic/clustermgr" = "registry.connect.redhat.com/turbonomic/clustermgr" +"turbonomic/consul" = "registry.connect.redhat.com/turbonomic/consul" +"turbonomic/cost" = "registry.connect.redhat.com/turbonomic/cost" +"turbonomic/db" = "registry.connect.redhat.com/turbonomic/db" +"turbonomic/extractor" = "registry.connect.redhat.com/turbonomic/extractor" +"turbonomic/grafana" = "registry.connect.redhat.com/turbonomic/grafana" +"turbonomic/group" = "registry.connect.redhat.com/turbonomic/group" +"turbonomic/history" = "registry.connect.redhat.com/turbonomic/history" +"turbonomic/kafka" = "registry.connect.redhat.com/turbonomic/kafka" +"turbonomic/kibitzer" = "registry.connect.redhat.com/turbonomic/kibitzer" +"turbonomic/kubeturbo-operator-bundle" = "registry.connect.redhat.com/turbonomic/kubeturbo-operator-bundle" +"turbonomic/kubeturbo-operator" = "registry.connect.redhat.com/turbonomic/kubeturbo-operator" +"turbonomic/kubeturbo" = "registry.connect.redhat.com/turbonomic/kubeturbo" +"turbonomic/market" = "registry.connect.redhat.com/turbonomic/market" +"turbonomic/mediation-acims" = "registry.connect.redhat.com/turbonomic/mediation-acims" +"turbonomic/mediation-actionscript" = "registry.connect.redhat.com/turbonomic/mediation-actionscript" +"turbonomic/mediation-actionstream-kafka" = "registry.connect.redhat.com/turbonomic/mediation-actionstream-kafka" +"turbonomic/mediation-apic" = "registry.connect.redhat.com/turbonomic/mediation-apic" +"turbonomic/mediation-appdynamics" = "registry.connect.redhat.com/turbonomic/mediation-appdynamics" +"turbonomic/mediation-appinsights" = "registry.connect.redhat.com/turbonomic/mediation-appinsights" +"turbonomic/mediation-awsbilling" = "registry.connect.redhat.com/turbonomic/mediation-awsbilling" +"turbonomic/mediation-awscloudbilling" = "registry.connect.redhat.com/turbonomic/mediation-awscloudbilling" +"turbonomic/mediation-awscost" = "registry.connect.redhat.com/turbonomic/mediation-awscost" +"turbonomic/mediation-awslambda" = "registry.connect.redhat.com/turbonomic/mediation-awslambda" +"turbonomic/mediation-aws" = "registry.connect.redhat.com/turbonomic/mediation-aws" +"turbonomic/mediation-azurebilling" = "registry.connect.redhat.com/turbonomic/mediation-azurebilling" +"turbonomic/mediation-azurecost" = "registry.connect.redhat.com/turbonomic/mediation-azurecost" +"turbonomic/mediation-azureea" = "registry.connect.redhat.com/turbonomic/mediation-azureea" +"turbonomic/mediation-azure" = "registry.connect.redhat.com/turbonomic/mediation-azure" +"turbonomic/mediation-azuresp" = "registry.connect.redhat.com/turbonomic/mediation-azuresp" +"turbonomic/mediation-azurevolumes" = "registry.connect.redhat.com/turbonomic/mediation-azurevolumes" +"turbonomic/mediation-baremetal" = "registry.connect.redhat.com/turbonomic/mediation-baremetal" +"turbonomic/mediation-compellent" = "registry.connect.redhat.com/turbonomic/mediation-compellent" +"turbonomic/mediation-datadog" = "registry.connect.redhat.com/turbonomic/mediation-datadog" +"turbonomic/mediation-dynatrace" = "registry.connect.redhat.com/turbonomic/mediation-dynatrace" +"turbonomic/mediation-flexera" = "registry.connect.redhat.com/turbonomic/mediation-flexera" +"turbonomic/mediation-gcpbilling" = "registry.connect.redhat.com/turbonomic/mediation-gcpbilling" +"turbonomic/mediation-gcpcost" = "registry.connect.redhat.com/turbonomic/mediation-gcpcost" +"turbonomic/mediation-gcpproject" = "registry.connect.redhat.com/turbonomic/mediation-gcpproject" +"turbonomic/mediation-gcpsa" = "registry.connect.redhat.com/turbonomic/mediation-gcpsa" +"turbonomic/mediation-hds" = "registry.connect.redhat.com/turbonomic/mediation-hds" +"turbonomic/mediation-horizon" = "registry.connect.redhat.com/turbonomic/mediation-horizon" +"turbonomic/mediation-hpe3par" = "registry.connect.redhat.com/turbonomic/mediation-hpe3par" +"turbonomic/mediation-hyperflex" = "registry.connect.redhat.com/turbonomic/mediation-hyperflex" +"turbonomic/mediation-hyperv" = "registry.connect.redhat.com/turbonomic/mediation-hyperv" +"turbonomic/mediation-ibmstorage-flashsystem" = "registry.connect.redhat.com/turbonomic/mediation-ibmstorage-flashsystem" +"turbonomic/mediation-instana" = "registry.connect.redhat.com/turbonomic/mediation-instana" +"turbonomic/mediation-intersighthyperflex" = "registry.connect.redhat.com/turbonomic/mediation-intersighthyperflex" +"turbonomic/mediation-intersight" = "registry.connect.redhat.com/turbonomic/mediation-intersight" +"turbonomic/mediation-intersightucs" = "registry.connect.redhat.com/turbonomic/mediation-intersightucs" +"turbonomic/mediation-istio" = "registry.connect.redhat.com/turbonomic/mediation-istio" +"turbonomic/mediation-jboss" = "registry.connect.redhat.com/turbonomic/mediation-jboss" +"turbonomic/mediation-jvm" = "registry.connect.redhat.com/turbonomic/mediation-jvm" +"turbonomic/mediation-mssql" = "registry.connect.redhat.com/turbonomic/mediation-mssql" +"turbonomic/mediation-mysql" = "registry.connect.redhat.com/turbonomic/mediation-mysql" +"turbonomic/mediation-netapp" = "registry.connect.redhat.com/turbonomic/mediation-netapp" +"turbonomic/mediation-netflow" = "registry.connect.redhat.com/turbonomic/mediation-netflow" +"turbonomic/mediation-newrelic" = "registry.connect.redhat.com/turbonomic/mediation-newrelic" +"turbonomic/mediation-nutanix" = "registry.connect.redhat.com/turbonomic/mediation-nutanix" +"turbonomic/mediation-oneview" = "registry.connect.redhat.com/turbonomic/mediation-oneview" +"turbonomic/mediation-oracle" = "registry.connect.redhat.com/turbonomic/mediation-oracle" +"turbonomic/mediation-powervm" = "registry.connect.redhat.com/turbonomic/mediation-powervm" +"turbonomic/mediation-pure" = "registry.connect.redhat.com/turbonomic/mediation-pure" +"turbonomic/mediation-scaleio" = "registry.connect.redhat.com/turbonomic/mediation-scaleio" +"turbonomic/mediation-servicenow" = "registry.connect.redhat.com/turbonomic/mediation-servicenow" +"turbonomic/mediation-snmp" = "registry.connect.redhat.com/turbonomic/mediation-snmp" +"turbonomic/mediation-tanium" = "registry.connect.redhat.com/turbonomic/mediation-tanium" +"turbonomic/mediation-terraform" = "registry.connect.redhat.com/turbonomic/mediation-terraform" +"turbonomic/mediation-tetration" = "registry.connect.redhat.com/turbonomic/mediation-tetration" +"turbonomic/mediation-tomcat" = "registry.connect.redhat.com/turbonomic/mediation-tomcat" +"turbonomic/mediation-ucsdirector" = "registry.connect.redhat.com/turbonomic/mediation-ucsdirector" +"turbonomic/mediation-ucs" = "registry.connect.redhat.com/turbonomic/mediation-ucs" +"turbonomic/mediation-udt" = "registry.connect.redhat.com/turbonomic/mediation-udt" +"turbonomic/mediation-vcenterbrowsing" = "registry.connect.redhat.com/turbonomic/mediation-vcenterbrowsing" +"turbonomic/mediation-vcenter" = "registry.connect.redhat.com/turbonomic/mediation-vcenter" +"turbonomic/mediation-vmax" = "registry.connect.redhat.com/turbonomic/mediation-vmax" +"turbonomic/mediation-vmm" = "registry.connect.redhat.com/turbonomic/mediation-vmm" +"turbonomic/mediation-vplex" = "registry.connect.redhat.com/turbonomic/mediation-vplex" +"turbonomic/mediation-webhook" = "registry.connect.redhat.com/turbonomic/mediation-webhook" +"turbonomic/mediation-weblogic" = "registry.connect.redhat.com/turbonomic/mediation-weblogic" +"turbonomic/mediation-websphere" = "registry.connect.redhat.com/turbonomic/mediation-websphere" +"turbonomic/mediation-wmi" = "registry.connect.redhat.com/turbonomic/mediation-wmi" +"turbonomic/mediation-xen" = "registry.connect.redhat.com/turbonomic/mediation-xen" +"turbonomic/mediation-xtremio" = "registry.connect.redhat.com/turbonomic/mediation-xtremio" +"turbonomic/nginx" = "registry.connect.redhat.com/turbonomic/nginx" +"turbonomic/plan-orchestrator" = "registry.connect.redhat.com/turbonomic/plan-orchestrator" +"turbonomic/prometurbo-marketplace" = "registry.connect.redhat.com/turbonomic/prometurbo-marketplace" +"turbonomic/prometurbo-operator-bundle" = "registry.connect.redhat.com/turbonomic/prometurbo-operator-bundle" +"turbonomic/prometurbo-operator" = "registry.connect.redhat.com/turbonomic/prometurbo-operator" +"turbonomic/prometurbo" = "registry.connect.redhat.com/turbonomic/prometurbo" +"turbonomic/repository" = "registry.connect.redhat.com/turbonomic/repository" +"turbonomic/rsyslog" = "registry.connect.redhat.com/turbonomic/rsyslog" +"turbonomic/t8c-operator-bundle" = "registry.connect.redhat.com/turbonomic/t8c-operator-bundle" +"turbonomic/t8c-operator" = "registry.connect.redhat.com/turbonomic/t8c-operator" +"turbonomic/t8c-tsc-client-operator-bundle" = "registry.connect.redhat.com/turbonomic/t8c-tsc-client-operator-bundle" +"turbonomic/topology-processor" = "registry.connect.redhat.com/turbonomic/topology-processor" +"turbonomic/turbodif" = "registry.connect.redhat.com/turbonomic/turbodif" +"turbonomic/ui" = "registry.connect.redhat.com/turbonomic/ui" +"turbonomic/zookeeper" = "registry.connect.redhat.com/turbonomic/zookeeper" +"turnium/sdwan-controller" = "registry.multapplied.net/turnium/sdwan-controller" +"turnium/sdwan-hostrouter" = "registry.multapplied.net/turnium/sdwan-hostrouter" +"ubi7/go-toolset" = "registry.access.redhat.com/ubi7/go-toolset" +"ubi8/buildah" = "registry.access.redhat.com/ubi8/buildah" +"ubi8/dotnet-60" = "registry.access.redhat.com/ubi8/dotnet-60" +"ubi8/dotnet-60-runtime" = "registry.access.redhat.com/ubi8/dotnet-60-runtime" +"ubi8/dotnet-80" = "registry.access.redhat.com/ubi8/dotnet-80" +"ubi8/dotnet-80-runtime" = "registry.access.redhat.com/ubi8/dotnet-80-runtime" +"ubi8/go-toolset" = "registry.access.redhat.com/ubi8/go-toolset" +"ubi8/httpd-24" = "registry.access.redhat.com/ubi8/httpd-24" +"ubi8-init" = "registry.access.redhat.com/ubi8-init" +"ubi8-micro" = "registry.access.redhat.com/ubi8-micro" +"ubi8-minimal" = "registry.access.redhat.com/ubi8-minimal" +"ubi8/nginx-122" = "registry.access.redhat.com/ubi8/nginx-122" +"ubi8/nginx-124" = "registry.access.redhat.com/ubi8/nginx-124" +"ubi8/nodejs-18-minimal" = "registry.access.redhat.com/ubi8/nodejs-18-minimal" +"ubi8/nodejs-18" = "registry.access.redhat.com/ubi8/nodejs-18" +"ubi8/nodejs-20-minimal" = "registry.access.redhat.com/ubi8/nodejs-20-minimal" +"ubi8/nodejs-20" = "registry.access.redhat.com/ubi8/nodejs-20" +"ubi8/openjdk-11" = "registry.access.redhat.com/ubi8/openjdk-11" +"ubi8/openjdk-11-runtime" = "registry.access.redhat.com/ubi8/openjdk-11-runtime" +"ubi8/openjdk-17" = "registry.access.redhat.com/ubi8/openjdk-17" +"ubi8/openjdk-17-runtime" = "registry.access.redhat.com/ubi8/openjdk-17-runtime" +"ubi8/openjdk-21" = "registry.access.redhat.com/ubi8/openjdk-21" +"ubi8/openjdk-21-runtime" = "registry.access.redhat.com/ubi8/openjdk-21-runtime" +"ubi8/openjdk-8" = "registry.access.redhat.com/ubi8/openjdk-8" +"ubi8/openjdk-8-runtime" = "registry.access.redhat.com/ubi8/openjdk-8-runtime" +"ubi8/pause" = "registry.access.redhat.com/ubi8/pause" +"ubi8/perl-526" = "registry.access.redhat.com/ubi8/perl-526" +"ubi8/perl-532" = "registry.access.redhat.com/ubi8/perl-532" +"ubi8/php-74" = "registry.access.redhat.com/ubi8/php-74" +"ubi8/php-80" = "registry.access.redhat.com/ubi8/php-80" +"ubi8/php-82" = "registry.access.redhat.com/ubi8/php-82" +"ubi8/podman" = "registry.access.redhat.com/ubi8/podman" +"ubi8/python-27" = "registry.access.redhat.com/ubi8/python-27" +"ubi8/python-311" = "registry.access.redhat.com/ubi8/python-311" +"ubi8/python-312" = "registry.access.redhat.com/ubi8/python-312" +"ubi8/python-36" = "registry.access.redhat.com/ubi8/python-36" +"ubi8/python-39" = "registry.access.redhat.com/ubi8/python-39" +"ubi8" = "registry.access.redhat.com/ubi8" +"ubi8/ruby-25" = "registry.access.redhat.com/ubi8/ruby-25" +"ubi8/ruby-31" = "registry.access.redhat.com/ubi8/ruby-31" +"ubi8/ruby-33" = "registry.access.redhat.com/ubi8/ruby-33" +"ubi8/s2i-base" = "registry.access.redhat.com/ubi8/s2i-base" +"ubi8/s2i-core" = "registry.access.redhat.com/ubi8/s2i-core" +"ubi8/skopeo" = "registry.access.redhat.com/ubi8/skopeo" +"ubi8/toolbox" = "registry.access.redhat.com/ubi8/toolbox" +"ubi8/ubi-init" = "registry.access.redhat.com/ubi8/ubi-init" +"ubi8/ubi-micro" = "registry.access.redhat.com/ubi8/ubi-micro" +"ubi8/ubi-minimal" = "registry.access.redhat.com/ubi8/ubi-minimal" +"ubi8/ubi" = "registry.access.redhat.com/ubi8/ubi" +"ubi9/buildah" = "registry.access.redhat.com/ubi9/buildah" +"ubi9/go-toolset" = "registry.access.redhat.com/ubi9/go-toolset" +"ubi9/httpd-24" = "registry.access.redhat.com/ubi9/httpd-24" +"ubi9-init" = "registry.access.redhat.com/ubi9-init" +"ubi9-micro" = "registry.access.redhat.com/ubi9-micro" +"ubi9-minimal" = "registry.access.redhat.com/ubi9-minimal" +"ubi9/nginx-120" = "registry.access.redhat.com/ubi9/nginx-120" +"ubi9/nginx-122" = "registry.access.redhat.com/ubi9/nginx-122" +"ubi9/nginx-124" = "registry.access.redhat.com/ubi9/nginx-124" +"ubi9/nodejs-18-minimal" = "registry.access.redhat.com/ubi9/nodejs-18-minimal" +"ubi9/nodejs-18" = "registry.access.redhat.com/ubi9/nodejs-18" +"ubi9/nodejs-20-minimal" = "registry.access.redhat.com/ubi9/nodejs-20-minimal" +"ubi9/nodejs-20" = "registry.access.redhat.com/ubi9/nodejs-20" +"ubi9/openjdk-11" = "registry.access.redhat.com/ubi9/openjdk-11" +"ubi9/openjdk-11-runtime" = "registry.access.redhat.com/ubi9/openjdk-11-runtime" +"ubi9/openjdk-17" = "registry.access.redhat.com/ubi9/openjdk-17" +"ubi9/openjdk-17-runtime" = "registry.access.redhat.com/ubi9/openjdk-17-runtime" +"ubi9/openjdk-21" = "registry.access.redhat.com/ubi9/openjdk-21" +"ubi9/openjdk-21-runtime" = "registry.access.redhat.com/ubi9/openjdk-21-runtime" +"ubi9/perl-532" = "registry.access.redhat.com/ubi9/perl-532" +"ubi9/php-80" = "registry.access.redhat.com/ubi9/php-80" +"ubi9/php-81" = "registry.access.redhat.com/ubi9/php-81" +"ubi9/php-82" = "registry.access.redhat.com/ubi9/php-82" +"ubi9/podman" = "registry.access.redhat.com/ubi9/podman" +"ubi9/python-311" = "registry.access.redhat.com/ubi9/python-311" +"ubi9/python-312" = "registry.access.redhat.com/ubi9/python-312" +"ubi9/python-39" = "registry.access.redhat.com/ubi9/python-39" +"ubi9" = "registry.access.redhat.com/ubi9" +"ubi9/ruby-30" = "registry.access.redhat.com/ubi9/ruby-30" +"ubi9/ruby-31" = "registry.access.redhat.com/ubi9/ruby-31" +"ubi9/ruby-33" = "registry.access.redhat.com/ubi9/ruby-33" +"ubi9/s2i-base" = "registry.access.redhat.com/ubi9/s2i-base" +"ubi9/s2i-core" = "registry.access.redhat.com/ubi9/s2i-core" +"ubi9/skopeo" = "registry.access.redhat.com/ubi9/skopeo" +"ubi9/toolbox" = "registry.access.redhat.com/ubi9/toolbox" +"ubi9/ubi-init" = "registry.access.redhat.com/ubi9/ubi-init" +"ubi9/ubi-micro" = "registry.access.redhat.com/ubi9/ubi-micro" +"ubi9/ubi-minimal" = "registry.access.redhat.com/ubi9/ubi-minimal" +"ubi9/ubi" = "registry.access.redhat.com/ubi9/ubi" +"ubi/infer/iotc-console-ui" = "shazdevops.azurecr.io/ubi/infer/iotc-console-ui" +"ums/ums-svc-ubi8" = "pubdockerregistry.incognito.com/ums/ums-svc-ubi8" +"unblu-spark-7/collaboration-server-7" = "registry.connect.redhat.com/unblu-spark-7/collaboration-server-7" +"unblu-spark-7/haproxy-2" = "registry.connect.redhat.com/unblu-spark-7/haproxy-2" +"unblu-spark-7/nginx-1" = "registry.connect.redhat.com/unblu-spark-7/nginx-1" +"u/stonebranch/repository/docker/stonebranch/image-ubi8-sb-6.6.0.1-linux-2.6-x86_64" = "registry.connect.redhat.com/u/stonebranch/repository/docker/stonebranch/image-ubi8-sb-6.6.0.1-linux-2.6-x86_64" +"vacava/rapidbiz-operator-bundle" = "registry.connect.redhat.com/vacava/rapidbiz-operator-bundle" +"vacava/rapidbiz-operator" = "registry.connect.redhat.com/vacava/rapidbiz-operator" +"vacava/rapidbiz" = "registry.connect.redhat.com/vacava/rapidbiz" +"valicyber/apache-httpd" = "registry.connect.redhat.com/valicyber/apache-httpd" +"valicyber/zerolock-rhel8-bi" = "registry.connect.redhat.com/valicyber/zerolock-rhel8-bi" +"venafi/vcp-operator" = "registry.connect.redhat.com/venafi/vcp-operator" +"veritas-technologies/infoscale-csi-plugin" = "registry.connect.redhat.com/veritas-technologies/infoscale-csi-plugin" +"veritas-technologies/infoscale-csi" = "registry.connect.redhat.com/veritas-technologies/infoscale-csi" +"veritas-technologies/infoscale-dr-manager-bundle" = "registry.connect.redhat.com/veritas-technologies/infoscale-dr-manager-bundle" +"veritas-technologies/infoscale-dr-manager" = "registry.connect.redhat.com/veritas-technologies/infoscale-dr-manager" +"veritas-technologies/infoscale-dr-operator" = "registry.connect.redhat.com/veritas-technologies/infoscale-dr-operator" +"veritas-technologies/infoscale-fencing" = "registry.connect.redhat.com/veritas-technologies/infoscale-fencing" +"veritas-technologies/infoscale-license" = "registry.connect.redhat.com/veritas-technologies/infoscale-license" +"veritas-technologies/infoscale-licensing-operator-bundle" = "registry.connect.redhat.com/veritas-technologies/infoscale-licensing-operator-bundle" +"veritas-technologies/infoscale-licensing-operator" = "registry.connect.redhat.com/veritas-technologies/infoscale-licensing-operator" +"veritas-technologies/infoscale-operator-bundle" = "registry.connect.redhat.com/veritas-technologies/infoscale-operator-bundle" +"veritas-technologies/infoscale-operator" = "registry.connect.redhat.com/veritas-technologies/infoscale-operator" +"veritas-technologies/infoscale" = "registry.connect.redhat.com/veritas-technologies/infoscale" +"veritas-technologies/infoscale-sds-operator-bundle" = "registry.connect.redhat.com/veritas-technologies/infoscale-sds-operator-bundle" +"veritas-technologies/infoscale-sds-operator" = "registry.connect.redhat.com/veritas-technologies/infoscale-sds-operator" +"veritas-technologies/infoscale-sds" = "registry.connect.redhat.com/veritas-technologies/infoscale-sds" +"veritas-technologies/infoscale-toolset" = "registry.connect.redhat.com/veritas-technologies/infoscale-toolset" +"veritas-technologies/infoscale-vxfen" = "registry.connect.redhat.com/veritas-technologies/infoscale-vxfen" +"veritas-technologies/netbackupdatamover" = "registry.connect.redhat.com/veritas-technologies/netbackupdatamover" +"veritas-technologies/netbackupkops" = "registry.connect.redhat.com/veritas-technologies/netbackupkops" +"veritas-technologies/rhosp-16-1-nbosdm-10-0" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-1-nbosdm-10-0" +"veritas-technologies/rhosp-16-1-nbosdmapi-10-0" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-1-nbosdmapi-10-0" +"veritas-technologies/rhosp-16-1-nbos-horizonplugin-10-0" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-1-nbos-horizonplugin-10-0" +"veritas-technologies/rhosp-16-2-nbosdm-10-1-1" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdm-10-1-1" +"veritas-technologies/rhosp-16-2-nbosdm-10-3" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdm-10-3" +"veritas-technologies/rhosp-16-2-nbosdm-10-4" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdm-10-4" +"veritas-technologies/rhosp-16-2-nbosdmapi-10-1-1" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdmapi-10-1-1" +"veritas-technologies/rhosp-16-2-nbosdmapi-10-3" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdmapi-10-3" +"veritas-technologies/rhosp-16-2-nbosdmapi-10-4" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbosdmapi-10-4" +"veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-1-1" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-1-1" +"veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-3" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-3" +"veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-4" = "registry.connect.redhat.com/veritas-technologies/rhosp-16-2-nbos-horizonplugin-10-4" +"vfunction/vfunction-mysql" = "registry.connect.redhat.com/vfunction/vfunction-mysql" +"vfunction/vfunction-nginx" = "registry.connect.redhat.com/vfunction/vfunction-nginx" +"vfunction/vfunction-server-operator-bundle-marketplace" = "registry.connect.redhat.com/vfunction/vfunction-server-operator-bundle-marketplace" +"vfunction/vfunction-server-operator-bundle" = "registry.connect.redhat.com/vfunction/vfunction-server-operator-bundle" +"vfunction/vfunction-server-operator" = "registry.connect.redhat.com/vfunction/vfunction-server-operator" +"vfunction/vfunction-storage" = "registry.connect.redhat.com/vfunction/vfunction-storage" +"vfunction/vfunction-vfapi-dm" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-dm" +"vfunction/vfunction-vfapi-idp" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-idp" +"vfunction/vfunction-vfapi-measurements" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-measurements" +"vfunction/vfunction-vfapi-organizations" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-organizations" +"vfunction/vfunction-vfapi-otlp" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-otlp" +"vfunction/vfunction-vfapi-parser" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-parser" +"vfunction/vfunction-vfapi-users" = "registry.connect.redhat.com/vfunction/vfunction-vfapi-users" +"virtuozzo/ploop1" = "registry.connect.redhat.com/virtuozzo/ploop1" +"vitagroupag/ehrbase" = "registry.connect.redhat.com/vitagroupag/ehrbase" +"vmware/nsx-container-plugin-operator" = "docker.io/vmware/nsx-container-plugin-operator" +"voltdb/redhat" = "docker.io/voltdb/redhat" +"vsphere_kubernetes_driver_operator/vdo" = "projects.registry.vmware.com/vsphere_kubernetes_driver_operator/vdo" +"wa/hcl-workload-automation-agent-dynamic" = "hclcr.io/wa/hcl-workload-automation-agent-dynamic" +"wa/hcl-workload-automation-console" = "hclcr.io/wa/hcl-workload-automation-console" +"wa/hcl-workload-automation-server" = "hclcr.io/wa/hcl-workload-automation-server" +"wavefronthq/antrea-ocp-operator" = "registry.connect.redhat.com/wavefronthq/antrea-ocp-operator" +"wavefronthq/antrea-openshift-operator" = "registry.connect.redhat.com/wavefronthq/antrea-openshift-operator" +"wavefronthq/nsx-ncp-operator-bundle" = "registry.connect.redhat.com/wavefronthq/nsx-ncp-operator-bundle" +"wavefronthq/proxy" = "registry.connect.redhat.com/wavefronthq/proxy" +"wavefronthq/wavefront-kubernetes-collector" = "registry.connect.redhat.com/wavefronthq/wavefront-kubernetes-collector" +"web-terminal/web-terminal-exec-rhel8" = "registry.redhat.io/web-terminal/web-terminal-exec-rhel8" +"web-terminal/web-terminal-rhel8-operator" = "registry.redhat.io/web-terminal/web-terminal-rhel8-operator" +"web-terminal/web-terminal-tooling-rhel8" = "registry.redhat.io/web-terminal/web-terminal-tooling-rhel8" +"whitedotspace/eamli/registry/eamli-ui" = "registry.gitlab.com/whitedotspace/eamli/registry/eamli-ui" +"whitedotspace/eamli/registry/eamli-web" = "registry.gitlab.com/whitedotspace/eamli/registry/eamli-web" +"whitedotspace/eamli/registry/keycloak-realm" = "registry.gitlab.com/whitedotspace/eamli/registry/keycloak-realm" +"whitedotspace/eamli/registry/model-store" = "registry.gitlab.com/whitedotspace/eamli/registry/model-store" +"whitedotspace/eamli/registry/user-service" = "registry.gitlab.com/whitedotspace/eamli/registry/user-service" +"wmalyk28/cloudnfv-runtime" = "quay.io/wmalyk28/cloudnfv-runtime" +"wmalyk28/cnfv-op" = "quay.io/wmalyk28/cnfv-op" +"workload-availability/fence-agents-remediation-operator-bundle" = "registry.redhat.io/workload-availability/fence-agents-remediation-operator-bundle" +"workload-availability/fence-agents-remediation-rhel8-operator" = "registry.redhat.io/workload-availability/fence-agents-remediation-rhel8-operator" +"workload-availability/machine-deletion-remediation-operator-bundle" = "registry.redhat.io/workload-availability/machine-deletion-remediation-operator-bundle" +"workload-availability/machine-deletion-remediation-rhel8-operator" = "registry.redhat.io/workload-availability/machine-deletion-remediation-rhel8-operator" +"workload-availability/node-healthcheck-must-gather-rhel8" = "registry.redhat.io/workload-availability/node-healthcheck-must-gather-rhel8" +"workload-availability/node-healthcheck-operator-bundle" = "registry.redhat.io/workload-availability/node-healthcheck-operator-bundle" +"workload-availability/node-healthcheck-rhel8-operator" = "registry.redhat.io/workload-availability/node-healthcheck-rhel8-operator" +"workload-availability/node-maintenance-must-gather-rhel8" = "registry.redhat.io/workload-availability/node-maintenance-must-gather-rhel8" +"workload-availability/node-maintenance-operator-bundle" = "registry.redhat.io/workload-availability/node-maintenance-operator-bundle" +"workload-availability/node-maintenance-rhel8-operator" = "registry.redhat.io/workload-availability/node-maintenance-rhel8-operator" +"workload-availability/node-remediation-console-rhel8" = "registry.redhat.io/workload-availability/node-remediation-console-rhel8" +"workload-availability/self-node-remediation-must-gather-rhel8" = "registry.redhat.io/workload-availability/self-node-remediation-must-gather-rhel8" +"workload-availability/self-node-remediation-operator-bundle" = "registry.redhat.io/workload-availability/self-node-remediation-operator-bundle" +"workload-availability/self-node-remediation-rhel8-operator" = "registry.redhat.io/workload-availability/self-node-remediation-rhel8-operator" +"xebialabs/central-configuration" = "docker.io/xebialabs/central-configuration" +"xebialabs/deploy-operator" = "docker.io/xebialabs/deploy-operator" +"xebialabs/deploy-task-engine" = "docker.io/xebialabs/deploy-task-engine" +"xebialabs/release-operator" = "docker.io/xebialabs/release-operator" +"xebialabs/xl-deploy" = "docker.io/xebialabs/xl-deploy" +"xebialabs/xl-release" = "registry.connect.redhat.com/xebialabs/xl-release" +"xsky/xsky-csi-iscsi-driver" = "registry.connect.redhat.com/xsky/xsky-csi-iscsi-driver" +"xsky/xsky-csi-nfs-driver" = "registry.connect.redhat.com/xsky/xsky-csi-nfs-driver" +"yash/yashone2" = "registry.connect.redhat.com/yash/yashone2" +"yokesh_kumar/access-api" = "quay.io/yokesh_kumar/access-api" +"yugabytedb/yugabyte-platform-operator-bundle" = "registry.connect.redhat.com/yugabytedb/yugabyte-platform-operator-bundle" +"yugabytedb/yugabyte-platform-operator" = "registry.connect.redhat.com/yugabytedb/yugabyte-platform-operator" +"yugabytedb/yugabyte-platform" = "registry.connect.redhat.com/yugabytedb/yugabyte-platform" +"yugabytedb/yugabyte" = "registry.connect.redhat.com/yugabytedb/yugabyte" +"yugabyte/yugaware-ubi" = "quay.io/yugabyte/yugaware-ubi" +"zabbix/zabbix-agent2-50" = "registry.connect.redhat.com/zabbix/zabbix-agent2-50" +"zabbix/zabbix-agent2-54" = "registry.connect.redhat.com/zabbix/zabbix-agent2-54" +"zabbix/zabbix-agent2-60" = "registry.connect.redhat.com/zabbix/zabbix-agent2-60" +"zabbix/zabbix-agent2-62" = "registry.connect.redhat.com/zabbix/zabbix-agent2-62" +"zabbix/zabbix-agent2-64" = "registry.connect.redhat.com/zabbix/zabbix-agent2-64" +"zabbix/zabbix-agent-50" = "registry.connect.redhat.com/zabbix/zabbix-agent-50" +"zabbix/zabbix-agent-54" = "registry.connect.redhat.com/zabbix/zabbix-agent-54" +"zabbix/zabbix-agent-60" = "registry.connect.redhat.com/zabbix/zabbix-agent-60" +"zabbix/zabbix-agent-62" = "registry.connect.redhat.com/zabbix/zabbix-agent-62" +"zabbix/zabbix-agent-64" = "registry.connect.redhat.com/zabbix/zabbix-agent-64" +"zabbix/zabbix-appliance-40" = "registry.connect.redhat.com/zabbix/zabbix-appliance-40" +"zabbix/zabbix-appliance-42" = "registry.connect.redhat.com/zabbix/zabbix-appliance-42" +"zabbix/zabbix-appliance-50" = "registry.connect.redhat.com/zabbix/zabbix-appliance-50" +"zabbix/zabbix-java-gateway-44" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-44" +"zabbix/zabbix-java-gateway-50" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-50" +"zabbix/zabbix-java-gateway-54" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-54" +"zabbix/zabbix-java-gateway-60" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-60" +"zabbix/zabbix-java-gateway-62" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-62" +"zabbix/zabbix-java-gateway-64" = "registry.connect.redhat.com/zabbix/zabbix-java-gateway-64" +"zabbix/zabbix-operator-certified-44" = "registry.connect.redhat.com/zabbix/zabbix-operator-certified-44" +"zabbix/zabbixoperator-certified-bundle-marketplace" = "registry.connect.redhat.com/zabbix/zabbixoperator-certified-bundle-marketplace" +"zabbix/zabbixoperator-certified-bundle" = "registry.connect.redhat.com/zabbix/zabbixoperator-certified-bundle" +"zabbix/zabbixoperator-certified" = "registry.connect.redhat.com/zabbix/zabbixoperator-certified" +"zabbix/zabbix-proxy-mysql-44" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-44" +"zabbix/zabbix-proxy-mysql-50" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-50" +"zabbix/zabbix-proxy-mysql-54" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-54" +"zabbix/zabbix-proxy-mysql-60" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-60" +"zabbix/zabbix-proxy-mysql-62" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-62" +"zabbix/zabbix-proxy-mysql-64" = "registry.connect.redhat.com/zabbix/zabbix-proxy-mysql-64" +"zabbix/zabbix-proxy-sqlite-50" = "registry.connect.redhat.com/zabbix/zabbix-proxy-sqlite-50" +"zabbix/zabbix-proxy-sqlite-54" = "registry.connect.redhat.com/zabbix/zabbix-proxy-sqlite-54" +"zabbix/zabbix-proxy-sqlite-60" = "registry.connect.redhat.com/zabbix/zabbix-proxy-sqlite-60" +"zabbix/zabbix-proxy-sqlite-62" = "registry.connect.redhat.com/zabbix/zabbix-proxy-sqlite-62" +"zabbix/zabbix-proxy-sqlite-64" = "registry.connect.redhat.com/zabbix/zabbix-proxy-sqlite-64" +"zabbix/zabbix-server-mysql-50" = "registry.connect.redhat.com/zabbix/zabbix-server-mysql-50" +"zabbix/zabbix-server-mysql-54" = "registry.connect.redhat.com/zabbix/zabbix-server-mysql-54" +"zabbix/zabbix-server-mysql-60" = "registry.connect.redhat.com/zabbix/zabbix-server-mysql-60" +"zabbix/zabbix-server-mysql-62" = "registry.connect.redhat.com/zabbix/zabbix-server-mysql-62" +"zabbix/zabbix-server-mysql-64" = "registry.connect.redhat.com/zabbix/zabbix-server-mysql-64" +"zabbix/zabbix-server-pgsql-64" = "registry.connect.redhat.com/zabbix/zabbix-server-pgsql-64" +"zabbix/zabbix-snmptraps-50" = "registry.connect.redhat.com/zabbix/zabbix-snmptraps-50" +"zabbix/zabbix-snmptraps-54" = "registry.connect.redhat.com/zabbix/zabbix-snmptraps-54" +"zabbix/zabbix-snmptraps-60" = "registry.connect.redhat.com/zabbix/zabbix-snmptraps-60" +"zabbix/zabbix-snmptraps-62" = "registry.connect.redhat.com/zabbix/zabbix-snmptraps-62" +"zabbix/zabbix-snmptraps-64" = "registry.connect.redhat.com/zabbix/zabbix-snmptraps-64" +"zabbix/zabbix-web-mysql-44" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-44" +"zabbix/zabbix-web-mysql-50" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-50" +"zabbix/zabbix-web-mysql-54" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-54" +"zabbix/zabbix-web-mysql-60" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-60" +"zabbix/zabbix-web-mysql-62" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-62" +"zabbix/zabbix-web-mysql-64" = "registry.connect.redhat.com/zabbix/zabbix-web-mysql-64" +"zabbix/zabbix-web-pgsql-64" = "registry.connect.redhat.com/zabbix/zabbix-web-pgsql-64" +"zabbix/zabbix-web-service-54" = "registry.connect.redhat.com/zabbix/zabbix-web-service-54" +"zabbix/zabbix-web-service-60" = "registry.connect.redhat.com/zabbix/zabbix-web-service-60" +"zabbix/zabbix-web-service-62" = "registry.connect.redhat.com/zabbix/zabbix-web-service-62" +"zabbix/zabbix-web-service-64" = "registry.connect.redhat.com/zabbix/zabbix-web-service-64" +"zadara/csi" = "registry.connect.redhat.com/zadara/csi" +"zextras/carbonio" = "registry.connect.redhat.com/zextras/carbonio" +"zte/ccnfs-operator" = "registry.connect.redhat.com/zte/ccnfs-operator" +"zts/xcrypt-operator-1-bundle-rhmp" = "registry.connect.redhat.com/zts/xcrypt-operator-1-bundle-rhmp" diff --git a/containers/registries.conf.d/002-rhel-shortnames-overrides.conf b/containers/registries.conf.d/002-rhel-shortnames-overrides.conf new file mode 100644 index 0000000..feb6551 --- /dev/null +++ b/containers/registries.conf.d/002-rhel-shortnames-overrides.conf @@ -0,0 +1,10 @@ +[aliases] +"skopeo" = "registry.access.redhat.com/ubi8/skopeo" +"ubi8/skopeo" = "registry.access.redhat.com/ubi8/skopeo" +"rhel9/skopeo" = "registry.redhat.io/rhel9/skopeo" +"buildah" = "registry.access.redhat.com/ubi8/buildah" +"ubi8/buildah" = "registry.access.redhat.com/ubi8/buildah" +"rhel9/buildah" = "registry.redhat.io/rhel9/buildah" +"podman" = "registry.access.redhat.com/ubi8/podman" +"ubi8/podman" = "registry.access.redhat.com/ubi8/podman" +"rhel9/podman" = "registry.redhat.io/rhel9/podman" diff --git a/containers/registries.d/default.yaml b/containers/registries.d/default.yaml new file mode 100644 index 0000000..a7f3d28 --- /dev/null +++ b/containers/registries.d/default.yaml @@ -0,0 +1,28 @@ +# This is a default registries.d configuration file. You may +# add to this file or create additional files in registries.d/. +# +# lookaside: for reading/writing simple signing signatures +# lookaside-staging: for writing simple signing signatures, preferred over lookaside +# +# lookaside and lookaside-staging take a value of the following: +# lookaside: {schema}://location +# +# For reading signatures, schema may be http, https, or file. +# For writing signatures, schema may only be file. + +# The default locations are built-in, for both reading and writing: +# /var/lib/containers/sigstore for root, or +# ~/.local/share/containers/sigstore for non-root users. +default-docker: +# lookaside: https://… +# lookaside-staging: file:///… + +# The 'docker' indicator here is the start of the configuration +# for docker registries. +# +# docker: +# +# privateregistry.com: +# lookaside: https://privateregistry.com/sigstore/ +# lookaside-staging: /mnt/nfs/privateregistry/sigstore + diff --git a/containers/registries.d/registry.access.redhat.com.yaml b/containers/registries.d/registry.access.redhat.com.yaml new file mode 100644 index 0000000..b426a4b --- /dev/null +++ b/containers/registries.d/registry.access.redhat.com.yaml @@ -0,0 +1,3 @@ +docker: + registry.access.redhat.com: + sigstore: https://access.redhat.com/webassets/docker/content/sigstore diff --git a/containers/registries.d/registry.redhat.io.yaml b/containers/registries.d/registry.redhat.io.yaml new file mode 100644 index 0000000..35f2c61 --- /dev/null +++ b/containers/registries.d/registry.redhat.io.yaml @@ -0,0 +1,3 @@ +docker: + registry.redhat.io: + sigstore: https://registry.redhat.io/containers/sigstore diff --git a/containers/storage.conf b/containers/storage.conf new file mode 100644 index 0000000..b8680ac --- /dev/null +++ b/containers/storage.conf @@ -0,0 +1,157 @@ +# This file is the configuration file for all tools +# that use the containers/storage library. The storage.conf file +# overrides all other storage.conf files. Container engines using the +# container/storage library do not inherit fields from other storage.conf +# files. +# +# Note: The storage.conf file overrides other storage.conf files based on this precedence: +# /usr/containers/storage.conf +# /etc/containers/storage.conf +# $HOME/.config/containers/storage.conf +# $XDG_CONFIG_HOME/containers/storage.conf (If XDG_CONFIG_HOME is set) +# See man 5 containers-storage.conf for more information +# The "container storage" table contains all of the server options. +[storage] + +# Default Storage Driver, Must be set for proper operation. +driver = "overlay" + +# Temporary storage location +runroot = "/run/containers/storage" + +# Priority list for the storage drivers that will be tested one +# after the other to pick the storage driver if it is not defined. +# driver_priority = ["overlay", "btrfs"] + +# Primary Read/Write location of container storage +# When changing the graphroot location on an SELINUX system, you must +# ensure the labeling matches the default locations labels with the +# following commands: +# semanage fcontext -a -e /var/lib/containers/storage /NEWSTORAGEPATH +# restorecon -R -v /NEWSTORAGEPATH +graphroot = "/var/lib/containers/storage" + +# Optional alternate location of image store if a location separate from the +# container store is required. If set, it must be different than graphroot. +# imagestore = "" + + +# Storage path for rootless users +# +# rootless_storage_path = "$HOME/.local/share/containers/storage" + +# Transient store mode makes all container metadata be saved in temporary storage +# (i.e. runroot above). This is faster, but doesn't persist across reboots. +# Additional garbage collection must also be performed at boot-time, so this +# option should remain disabled in most configurations. +# transient_store = true + +[storage.options] +# Storage options to be passed to underlying storage drivers + +# AdditionalImageStores is used to pass paths to additional Read/Only image stores +# Must be comma separated list. +additionalimagestores = [ +] + +# Allows specification of how storage is populated when pulling images. This +# option can speed the pulling process of images compressed with format +# zstd:chunked. Containers/storage looks for files within images that are being +# pulled from a container registry that were previously pulled to the host. It +# can copy or create a hard link to the existing file when it finds them, +# eliminating the need to pull them from the container registry. These options +# can deduplicate pulling of content, disk storage of content and can allow the +# kernel to use less memory when running containers. + +# containers/storage supports four keys +# * enable_partial_images="true" | "false" +# Tells containers/storage to look for files previously pulled in storage +# rather then always pulling them from the container registry. +# * use_hard_links = "false" | "true" +# Tells containers/storage to use hard links rather then create new files in +# the image, if an identical file already existed in storage. +# * ostree_repos = "" +# Tells containers/storage where an ostree repository exists that might have +# previously pulled content which can be used when attempting to avoid +# pulling content from the container registry +# * convert_images = "false" | "true" +# If set to true, containers/storage will convert images to a +# format compatible with partial pulls in order to take advantage +# of local deduplication and hard linking. It is an expensive +# operation so it is not enabled by default. +pull_options = {enable_partial_images = "false", use_hard_links = "false", ostree_repos=""} + +# Root-auto-userns-user is a user name which can be used to look up one or more UID/GID +# ranges in the /etc/subuid and /etc/subgid file. These ranges will be partitioned +# to containers configured to create automatically a user namespace. Containers +# configured to automatically create a user namespace can still overlap with containers +# having an explicit mapping set. +# This setting is ignored when running as rootless. +# root-auto-userns-user = "storage" +# +# Auto-userns-min-size is the minimum size for a user namespace created automatically. +# auto-userns-min-size=1024 +# +# Auto-userns-max-size is the maximum size for a user namespace created automatically. +# auto-userns-max-size=65536 + +[storage.options.overlay] +# ignore_chown_errors can be set to allow a non privileged user running with +# a single UID within a user namespace to run containers. The user can pull +# and use any image even those with multiple uids. Note multiple UIDs will be +# squashed down to the default uid in the container. These images will have no +# separation between the users in the container. Only supported for the overlay +# and vfs drivers. +#ignore_chown_errors = "false" + +# Inodes is used to set a maximum inodes of the container image. +# inodes = "" + +# Path to an helper program to use for mounting the file system instead of mounting it +# directly. +#mount_program = "/usr/bin/fuse-overlayfs" + +# mountopt specifies comma separated list of extra mount options +mountopt = "nodev,metacopy=on" + +# Set to skip a PRIVATE bind mount on the storage home directory. +# skip_mount_home = "false" + +# Set to use composefs to mount data layers with overlay. +# use_composefs = "false" + +# Size is used to set a maximum size of the container image. +# size = "" + +# ForceMask specifies the permissions mask that is used for new files and +# directories. +# +# The values "shared" and "private" are accepted. +# Octal permission masks are also accepted. +# +# "": No value specified. +# All files/directories, get set with the permissions identified within the +# image. +# "private": it is equivalent to 0700. +# All files/directories get set with 0700 permissions. The owner has rwx +# access to the files. No other users on the system can access the files. +# This setting could be used with networked based homedirs. +# "shared": it is equivalent to 0755. +# The owner has rwx access to the files and everyone else can read, access +# and execute them. This setting is useful for sharing containers storage +# with other users. For instance have a storage owned by root but shared +# to rootless users as an additional store. +# NOTE: All files within the image are made readable and executable by any +# user on the system. Even /etc/shadow within your image is now readable by +# any user. +# +# OCTAL: Users can experiment with other OCTAL Permissions. +# +# Note: The force_mask Flag is an experimental feature, it could change in the +# future. When "force_mask" is set the original permission mask is stored in +# the "user.containers.override_stat" xattr and the "mount_program" option must +# be specified. Mount programs like "/usr/bin/fuse-overlayfs" present the +# extended attribute permissions to processes within containers rather than the +# "force_mask" permissions. +# +# force_mask = "" diff --git a/cron.d/0hourly b/cron.d/0hourly new file mode 100644 index 0000000..1ab8c17 --- /dev/null +++ b/cron.d/0hourly @@ -0,0 +1,5 @@ +# Run the hourly jobs +SHELL=/bin/bash +PATH=/sbin:/bin:/usr/sbin:/usr/bin +MAILTO=root +01 * * * * root run-parts /etc/cron.hourly diff --git a/cron.daily/etckeeper b/cron.daily/etckeeper new file mode 100755 index 0000000..123d680 --- /dev/null +++ b/cron.daily/etckeeper @@ -0,0 +1,8 @@ +#!/usr/bin/sh +set -e +if [ -e /etc/etckeeper/daily ] && [ -e /etc/etckeeper/etckeeper.conf ]; then + . /etc/etckeeper/etckeeper.conf + if [ "$AVOID_DAILY_AUTOCOMMITS" != "1" ]; then + /etc/etckeeper/daily + fi +fi diff --git a/cron.deny b/cron.deny new file mode 100644 index 0000000..e69de29 diff --git a/cron.hourly/0anacron b/cron.hourly/0anacron new file mode 100755 index 0000000..4afff8f --- /dev/null +++ b/cron.hourly/0anacron @@ -0,0 +1,25 @@ +#!/usr/bin/sh +# Check whether 0anacron was run today already +if test -r /var/spool/anacron/cron.daily; then + day=`cat /var/spool/anacron/cron.daily` +fi +if [ `date +%Y%m%d` = "$day" ]; then + exit 0 +fi + +# Do not run jobs when on battery power +online=1 +for psupply in /sys/class/power_supply/* ; do + if [ `cat "$psupply/type" 2>/dev/null`x = Mainsx ] && [ -f "$psupply/online" ]; then + if [ `cat "$psupply/online" 2>/dev/null`x = 1x ]; then + online=1 + break + else + online=0 + fi + fi +done +if [ $online = 0 ]; then + exit 0 +fi +/usr/sbin/anacron -s diff --git a/crontab b/crontab new file mode 100644 index 0000000..c380767 --- /dev/null +++ b/crontab @@ -0,0 +1,15 @@ +SHELL=/bin/bash +PATH=/sbin:/bin:/usr/sbin:/usr/bin +MAILTO=root + +# For details see man 4 crontabs + +# Example of job definition: +# .---------------- minute (0 - 59) +# | .------------- hour (0 - 23) +# | | .---------- day of month (1 - 31) +# | | | .------- month (1 - 12) OR jan,feb,mar,apr ... +# | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat +# | | | | | +# * * * * * user-name command to be executed + diff --git a/crypto-policies/back-ends/bind.config b/crypto-policies/back-ends/bind.config new file mode 120000 index 0000000..ffbe0e5 --- /dev/null +++ b/crypto-policies/back-ends/bind.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/bind.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/gnutls.config b/crypto-policies/back-ends/gnutls.config new file mode 120000 index 0000000..c59c36d --- /dev/null +++ b/crypto-policies/back-ends/gnutls.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/gnutls.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/java.config b/crypto-policies/back-ends/java.config new file mode 120000 index 0000000..c5ded3a --- /dev/null +++ b/crypto-policies/back-ends/java.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/java.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/javasystem.config b/crypto-policies/back-ends/javasystem.config new file mode 120000 index 0000000..114d928 --- /dev/null +++ b/crypto-policies/back-ends/javasystem.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/javasystem.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/krb5.config b/crypto-policies/back-ends/krb5.config new file mode 120000 index 0000000..dfa92ca --- /dev/null +++ b/crypto-policies/back-ends/krb5.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/krb5.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/libreswan.config b/crypto-policies/back-ends/libreswan.config new file mode 120000 index 0000000..bad1a34 --- /dev/null +++ b/crypto-policies/back-ends/libreswan.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/libreswan.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/libssh.config b/crypto-policies/back-ends/libssh.config new file mode 120000 index 0000000..9aeef89 --- /dev/null +++ b/crypto-policies/back-ends/libssh.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/libssh.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/nss.config b/crypto-policies/back-ends/nss.config new file mode 120000 index 0000000..c1452bb --- /dev/null +++ b/crypto-policies/back-ends/nss.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/nss.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/openssh.config b/crypto-policies/back-ends/openssh.config new file mode 120000 index 0000000..8cc67ec --- /dev/null +++ b/crypto-policies/back-ends/openssh.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/openssh.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/opensshserver.config b/crypto-policies/back-ends/opensshserver.config new file mode 120000 index 0000000..0dd0619 --- /dev/null +++ b/crypto-policies/back-ends/opensshserver.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/opensshserver.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/openssl.config b/crypto-policies/back-ends/openssl.config new file mode 120000 index 0000000..632d1b3 --- /dev/null +++ b/crypto-policies/back-ends/openssl.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/openssl.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/openssl_fips.config b/crypto-policies/back-ends/openssl_fips.config new file mode 120000 index 0000000..db7d61c --- /dev/null +++ b/crypto-policies/back-ends/openssl_fips.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/openssl_fips.txt \ No newline at end of file diff --git a/crypto-policies/back-ends/opensslcnf.config b/crypto-policies/back-ends/opensslcnf.config new file mode 120000 index 0000000..4740381 --- /dev/null +++ b/crypto-policies/back-ends/opensslcnf.config @@ -0,0 +1 @@ +/usr/share/crypto-policies/DEFAULT/opensslcnf.txt \ No newline at end of file diff --git a/crypto-policies/config b/crypto-policies/config new file mode 100644 index 0000000..1b2860b --- /dev/null +++ b/crypto-policies/config @@ -0,0 +1 @@ +DEFAULT diff --git a/crypto-policies/state/CURRENT.pol b/crypto-policies/state/CURRENT.pol new file mode 100644 index 0000000..91d8a10 --- /dev/null +++ b/crypto-policies/state/CURRENT.pol @@ -0,0 +1,36 @@ +# Policy DEFAULT dump +# +# Do not parse the contents of this file with automated tools, +# it is provided for review convenience only. +# +# Baseline values for all scopes: +cipher = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CTR AES-128-CBC +group = X25519 SECP256R1 X448 SECP521R1 SECP384R1 FFDHE-2048 FFDHE-3072 FFDHE-4096 FFDHE-6144 FFDHE-8192 +hash = SHA2-256 SHA2-384 SHA2-512 SHA3-256 SHA3-384 SHA3-512 SHA2-224 SHA3-224 SHAKE-256 +key_exchange = ECDHE RSA DHE DHE-RSA PSK DHE-PSK ECDHE-PSK RSA-PSK ECDHE-GSS DHE-GSS +mac = AEAD HMAC-SHA2-256 HMAC-SHA1 UMAC-128 HMAC-SHA2-384 HMAC-SHA2-512 +protocol = +sign = ECDSA-SHA3-256 ECDSA-SHA2-256 ECDSA-SHA2-256-FIDO ECDSA-SHA3-384 ECDSA-SHA2-384 ECDSA-SHA3-512 ECDSA-SHA2-512 EDDSA-ED25519 EDDSA-ED25519-FIDO EDDSA-ED448 RSA-PSS-SHA3-256 RSA-PSS-SHA2-256 RSA-PSS-SHA3-384 RSA-PSS-SHA2-384 RSA-PSS-SHA3-512 RSA-PSS-SHA2-512 RSA-PSS-RSAE-SHA3-256 RSA-PSS-RSAE-SHA2-256 RSA-PSS-RSAE-SHA3-384 RSA-PSS-RSAE-SHA2-384 RSA-PSS-RSAE-SHA3-512 RSA-PSS-RSAE-SHA2-512 RSA-SHA3-256 RSA-SHA2-256 RSA-SHA3-384 RSA-SHA2-384 RSA-SHA3-512 RSA-SHA2-512 ECDSA-SHA2-224 RSA-PSS-SHA2-224 RSA-SHA2-224 ECDSA-SHA3-224 RSA-PSS-SHA3-224 RSA-SHA3-224 +arbitrary_dh_groups = 1 +min_dh_size = 2048 +min_dsa_size = 2048 +min_rsa_size = 2048 +sha1_in_certs = 0 +ssh_certs = 1 +min_ec_size = 256 +etm = ANY +__ems = DEFAULT +# Scope-specific properties derived for select backends: +cipher@gnutls = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC +protocol@gnutls = TLS1.3 TLS1.2 DTLS1.2 +cipher@java-tls = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC +protocol@java-tls = TLS1.3 TLS1.2 DTLS1.2 +mac@krb5 = HMAC-SHA2-384 HMAC-SHA2-256 AEAD UMAC-128 HMAC-SHA2-512 HMAC-SHA1 +protocol@libreswan = IKEv2 +cipher@libssh = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR +cipher@nss = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC +protocol@nss = TLS1.3 TLS1.2 DTLS1.2 +cipher@openssh-client = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR +cipher@openssh-server = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CTR AES-128-GCM AES-128-CCM AES-128-CTR +cipher@openssl = AES-256-GCM AES-256-CCM CHACHA20-POLY1305 AES-256-CBC AES-128-GCM AES-128-CCM AES-128-CBC +protocol@openssl = TLS1.3 TLS1.2 DTLS1.2 diff --git a/crypto-policies/state/current b/crypto-policies/state/current new file mode 100644 index 0000000..1b2860b --- /dev/null +++ b/crypto-policies/state/current @@ -0,0 +1 @@ +DEFAULT diff --git a/crypttab b/crypttab new file mode 100644 index 0000000..e69de29 diff --git a/csh.cshrc b/csh.cshrc new file mode 100644 index 0000000..8f169a1 --- /dev/null +++ b/csh.cshrc @@ -0,0 +1,66 @@ +# /etc/cshrc +# +# csh configuration for all shell invocations. + +# Set default umask for non-login shell only if it is set to 0 +if ( `umask` == 0 ) then + umask 022 +endif + +if ($?prompt) then + if ($?tcsh) then + set promptchars='$#' + set prompt='[%n@%m %c]%# ' + # make completion work better by default + set autolist + else + set prompt=\[$user@`/usr/bin/hostname`\]\$\ + endif +endif + +if ( $?tcsh ) then + bindkey "^[[3~" delete-char +endif + +bindkey "^R" i-search-back +set echo_style = both +set histdup = erase +set savehist = (1024 merge) + +if ($?prompt) then + if ($?TERM) then + switch($TERM) + case xterm*: + if ($?tcsh) then + set prompt='%{\033]0;%n@%m:%c\007%}[%n@%m %c]%# ' + endif + breaksw + case screen: + if ($?tcsh) then + set prompt='%{\033k%n@%m:%c\033\\%}[%n@%m %c]%# ' + endif + breaksw + default: + breaksw + endsw + endif +endif + +setenv MAIL "/var/spool/mail/$USER" + +# Check if we aren't a loginshell and do stuff if we aren't +if (! $?loginsh) then + if ( -d /etc/profile.d ) then + set nonomatch + foreach i ( /etc/profile.d/*.csh ) + if ( -r "$i" ) then + if ($?prompt) then + source "$i" + else + source "$i" >&/dev/null + endif + endif + end + unset i nonomatch + endif +endif diff --git a/csh.login b/csh.login new file mode 100644 index 0000000..3a8e5ce --- /dev/null +++ b/csh.login @@ -0,0 +1,44 @@ +# /etc/csh.login + +# System wide environment and startup programs, for login setup + +if ( ! ${?PATH} ) then + if ( $uid == 0 ) then + setenv PATH "/usr/local/sbin:/usr/sbin:/usr/local/bin:/usr/bin" + else + setenv PATH "/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin" + endif +else + #add sbin directories to the path + foreach p ( /usr/local/sbin /usr/sbin ) + switch (":${PATH}:") + case "*:${p}:*": + breaksw + default: + if ( $uid == 0 ) then + set path = ( ${p} ${path:q} ) + else + set path = ( ${path:q} ${p} ) + endif + breaksw + endsw + end + unset p +endif + +setenv HOSTNAME `/usr/bin/hostname` +set history=1000 + +if ( -d /etc/profile.d ) then + set nonomatch + foreach i ( /etc/profile.d/*.csh /etc/profile.d/csh.local ) + if ( -r "$i" ) then + if ($?prompt) then + source "$i" + else + source "$i" >& /dev/null + endif + endif + end + unset i nonomatch +endif diff --git a/dbus-1/session.conf b/dbus-1/session.conf new file mode 100644 index 0000000..ebb2c51 --- /dev/null +++ b/dbus-1/session.conf @@ -0,0 +1,19 @@ + + + diff --git a/dbus-1/system.conf b/dbus-1/system.conf new file mode 100644 index 0000000..ec19776 --- /dev/null +++ b/dbus-1/system.conf @@ -0,0 +1,19 @@ + + + diff --git a/dbus-1/system.d/teamd.conf b/dbus-1/system.d/teamd.conf new file mode 100644 index 0000000..20366ea --- /dev/null +++ b/dbus-1/system.d/teamd.conf @@ -0,0 +1,12 @@ + + + + + + + + + + + diff --git a/default/grub b/default/grub new file mode 100644 index 0000000..5a0bf6a --- /dev/null +++ b/default/grub @@ -0,0 +1,8 @@ +GRUB_TIMEOUT=5 +GRUB_DISTRIBUTOR="$(sed 's, release .*$,,g' /etc/system-release)" +GRUB_DEFAULT=saved +GRUB_DISABLE_SUBMENU=true +GRUB_TERMINAL_OUTPUT="console" +GRUB_CMDLINE_LINUX="resume=/dev/mapper/rl-swap rd.lvm.lv=rl/root rd.lvm.lv=rl/swap" +GRUB_DISABLE_RECOVERY="true" +GRUB_ENABLE_BLSCFG=true diff --git a/default/useradd b/default/useradd new file mode 100644 index 0000000..4e81146 --- /dev/null +++ b/default/useradd @@ -0,0 +1,9 @@ +# useradd defaults file +GROUP=100 +HOME=/home +INACTIVE=-1 +EXPIRE= +SHELL=/bin/bash +SKEL=/etc/skel +CREATE_MAIL_SPOOL=yes + diff --git a/depmod.d/dist.conf b/depmod.d/dist.conf new file mode 100644 index 0000000..8513288 --- /dev/null +++ b/depmod.d/dist.conf @@ -0,0 +1,6 @@ +# +# depmod.conf +# + +# override default search ordering for kmod packaging +search updates extra built-in weak-updates diff --git a/dhcp/dhclient.d/chrony.sh b/dhcp/dhclient.d/chrony.sh new file mode 100755 index 0000000..6d054fe --- /dev/null +++ b/dhcp/dhclient.d/chrony.sh @@ -0,0 +1,27 @@ +#!/usr/bin/bash + +CHRONY_SOURCEDIR=/run/chrony-dhcp +SERVERFILE=$CHRONY_SOURCEDIR/$interface.sources + +chrony_config() { + # Disable modifications if called from a NM dispatcher script + [ -n "$NM_DISPATCHER_ACTION" ] && return 0 + + rm -f "$SERVERFILE" + if [ "$PEERNTP" != "no" ]; then + mkdir -p $CHRONY_SOURCEDIR + for server in $new_ntp_servers; do + echo "server $server ${NTPSERVERARGS:-iburst}" >> "$SERVERFILE" + done + /usr/bin/chronyc reload sources > /dev/null 2>&1 || : + fi +} + +chrony_restore() { + [ -n "$NM_DISPATCHER_ACTION" ] && return 0 + + if [ -f "$SERVERFILE" ]; then + rm -f "$SERVERFILE" + /usr/bin/chronyc reload sources > /dev/null 2>&1 || : + fi +} diff --git a/dnf/dnf.conf b/dnf/dnf.conf new file mode 100644 index 0000000..3d08d07 --- /dev/null +++ b/dnf/dnf.conf @@ -0,0 +1,6 @@ +[main] +gpgcheck=1 +installonly_limit=3 +clean_requirements_on_remove=True +best=True +skip_if_unavailable=False diff --git a/dnf/modules.d/postgresql.module b/dnf/modules.d/postgresql.module new file mode 100644 index 0000000..f23a49b --- /dev/null +++ b/dnf/modules.d/postgresql.module @@ -0,0 +1,5 @@ +[postgresql] +name=postgresql +stream= +profiles= +state=disabled diff --git a/dnf/plugins/copr.conf b/dnf/plugins/copr.conf new file mode 100644 index 0000000..bc29926 --- /dev/null +++ b/dnf/plugins/copr.conf @@ -0,0 +1,11 @@ +[fedora] +hostname = copr.fedorainfracloud.org +protocol = https +port = 443 + +# To add another Copr hub, make a new section with its hostname, protocol and port. +# (protocol and port are optional and their default values are `https` and `443` respectively). +# [name-of-hub] +# hostname = hub-hostname +# protocol = https (optional) +# port = 443 (optional) diff --git a/dnf/plugins/debuginfo-install.conf b/dnf/plugins/debuginfo-install.conf new file mode 100644 index 0000000..9617ac9 --- /dev/null +++ b/dnf/plugins/debuginfo-install.conf @@ -0,0 +1,3 @@ +[main] +enabled=1 +autoupdate=0 diff --git a/dnf/protected.d/dnf.conf b/dnf/protected.d/dnf.conf new file mode 100644 index 0000000..6148f6c --- /dev/null +++ b/dnf/protected.d/dnf.conf @@ -0,0 +1 @@ +dnf diff --git a/dnf/protected.d/grub2-pc.conf b/dnf/protected.d/grub2-pc.conf new file mode 100644 index 0000000..3f164ee --- /dev/null +++ b/dnf/protected.d/grub2-pc.conf @@ -0,0 +1 @@ +grub2-pc diff --git a/dnf/protected.d/grub2-tools-minimal.conf b/dnf/protected.d/grub2-tools-minimal.conf new file mode 100644 index 0000000..cb93c8c --- /dev/null +++ b/dnf/protected.d/grub2-tools-minimal.conf @@ -0,0 +1 @@ +grub2-tools-minimal diff --git a/dnf/protected.d/setup.conf b/dnf/protected.d/setup.conf new file mode 100644 index 0000000..146f275 --- /dev/null +++ b/dnf/protected.d/setup.conf @@ -0,0 +1 @@ +setup diff --git a/dnf/protected.d/sudo.conf b/dnf/protected.d/sudo.conf new file mode 100644 index 0000000..7864d0d --- /dev/null +++ b/dnf/protected.d/sudo.conf @@ -0,0 +1 @@ +sudo diff --git a/dnf/protected.d/systemd.conf b/dnf/protected.d/systemd.conf new file mode 100644 index 0000000..39426d7 --- /dev/null +++ b/dnf/protected.d/systemd.conf @@ -0,0 +1,2 @@ +systemd +systemd-udev diff --git a/dnf/protected.d/yum.conf b/dnf/protected.d/yum.conf new file mode 100644 index 0000000..f42afee --- /dev/null +++ b/dnf/protected.d/yum.conf @@ -0,0 +1 @@ +yum diff --git a/dnf/vars/contentdir b/dnf/vars/contentdir new file mode 100644 index 0000000..6e5d36b --- /dev/null +++ b/dnf/vars/contentdir @@ -0,0 +1 @@ +pub/rocky diff --git a/dnf/vars/rltype b/dnf/vars/rltype new file mode 100644 index 0000000..8b13789 --- /dev/null +++ b/dnf/vars/rltype @@ -0,0 +1 @@ + diff --git a/dnf/vars/sigcontentdir b/dnf/vars/sigcontentdir new file mode 100644 index 0000000..67a581f --- /dev/null +++ b/dnf/vars/sigcontentdir @@ -0,0 +1 @@ +pub/sig diff --git a/dnf/vars/stream b/dnf/vars/stream new file mode 100644 index 0000000..0a472b5 --- /dev/null +++ b/dnf/vars/stream @@ -0,0 +1 @@ +9-stream diff --git a/dracut.conf b/dracut.conf new file mode 100644 index 0000000..d6317a0 --- /dev/null +++ b/dracut.conf @@ -0,0 +1,3 @@ +# PUT YOUR CONFIG IN separate files +# in /etc/dracut.conf.d named ".conf" +# SEE man dracut.conf(5) for options diff --git a/environment b/environment new file mode 100644 index 0000000..e69de29 diff --git a/etckeeper/commit.d/10vcs-test b/etckeeper/commit.d/10vcs-test new file mode 100755 index 0000000..64eef7d --- /dev/null +++ b/etckeeper/commit.d/10vcs-test @@ -0,0 +1,17 @@ +#!/usr/bin/sh +set -e + +not_enabled_warning() { + echo "etckeeper warning: etckeeper is not yet enabled for $(pwd)" >&2 + echo "etckeeper warning: run etckeeper init to enable it" >&2 +} + +if [ "$VCS" = git ] && [ ! -d .git ]; then + not_enabled_warning +elif [ "$VCS" = hg ] && [ ! -d .hg ]; then + not_enabled_warning +elif [ "$VCS" = bzr ] && [ ! -d .bzr ]; then + not_enabled_warning +elif [ "$VCS" = darcs ] && [ ! -d _darcs ]; then + not_enabled_warning +fi diff --git a/etckeeper/commit.d/20store-metadata b/etckeeper/commit.d/20store-metadata new file mode 120000 index 0000000..5698d64 --- /dev/null +++ b/etckeeper/commit.d/20store-metadata @@ -0,0 +1 @@ +../pre-commit.d/30store-metadata \ No newline at end of file diff --git a/etckeeper/commit.d/30bzr-add b/etckeeper/commit.d/30bzr-add new file mode 100755 index 0000000..c8337ee --- /dev/null +++ b/etckeeper/commit.d/30bzr-add @@ -0,0 +1,8 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = bzr ] && [ -d .bzr ]; then + if ! bzr add -q .; then + echo "etckeeper warning: bzr add failed" >&2 + fi +fi diff --git a/etckeeper/commit.d/30darcs-add b/etckeeper/commit.d/30darcs-add new file mode 100755 index 0000000..8c1c17c --- /dev/null +++ b/etckeeper/commit.d/30darcs-add @@ -0,0 +1,14 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = darcs ] && [ -d _darcs ]; then + rc=0 + res=$( darcs add -qr . 2>&1 ) || rc=$? + if test $rc -ne 0; then + if ! test $rc -eq 2 -a "${res%No files were added}" != "$res"; then + printf "%s" "$res" + echo "etckeeper warning: darcs add failed" >&2 + fi + fi + unset rc res +fi diff --git a/etckeeper/commit.d/30git-add b/etckeeper/commit.d/30git-add new file mode 100755 index 0000000..51771da --- /dev/null +++ b/etckeeper/commit.d/30git-add @@ -0,0 +1,8 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ] && [ -d .git ]; then + if ! git add --all; then + echo "etckeeper warning: git add --all" >&2 + fi +fi diff --git a/etckeeper/commit.d/30hg-addremove b/etckeeper/commit.d/30hg-addremove new file mode 100755 index 0000000..88dc334 --- /dev/null +++ b/etckeeper/commit.d/30hg-addremove @@ -0,0 +1,8 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = hg ] && [ -d .hg ]; then + if ! hg addremove .; then + echo "etckeeper warning: hg addremove failed" >&2 + fi +fi diff --git a/etckeeper/commit.d/50vcs-commit b/etckeeper/commit.d/50vcs-commit new file mode 100755 index 0000000..79f65b1 --- /dev/null +++ b/etckeeper/commit.d/50vcs-commit @@ -0,0 +1,142 @@ +#!/usr/bin/sh +set -e + +cleanup () { + if [ -n "$logfile" ]; then + rm -f "$logfile" + fi +} +if [ -n "$1" ]; then + trap cleanup EXIT + logfile="$(mktemp -t etckeeper-$VCS.XXXXXXXXXX)" + if [ "x$1" = "x--stdin" ]; then + cat > "$logfile" + else + sed '1s/^-m \{0,1\}//' >"$logfile" <<-EOF + $* + EOF + fi +else + logfile="" +fi + +hostname=`hostname 2>/dev/null || cat /etc/hostname` +hostname="${hostname%%.*}" +dnsdomainname=`dnsdomainname 2>/dev/null || true` +if [ -n "$dnsdomainname" ]; then + hostname="$hostname.$dnsdomainname" +fi + +ORIG_USER=$USER +USER= +if [ -n "$SUDO_USER" ]; then + USER="$SUDO_USER" +else + # try to check tty ownership, in case user su'd to root + TTY="$(tty 2>/dev/null || true)" + if [ -n "$TTY" ] && [ -c "$TTY" ]; then + USER="$(find "$TTY" -printf "%u")" + fi +fi + +if [ "$VCS" = git ] && [ -d .git ]; then + # When not su'd to root, still set environment variables, + # since git's own code to determine the author and committer + # has several edge cases where it fails and would prevent the + # commit. + if [ -z "$USER" ]; then + USER="$(whoami)" + fi + if [ -n "$USER" ]; then + # Use user.name and user.email from the gitconfig belonging + # to USER. + USER_HOME="$(getent passwd "$USER" | cut -d: -f6)" + if [ -n "$USER_HOME" ] && [ -e "$USER_HOME/.gitconfig" ]; then + if [ -z "$GIT_AUTHOR_NAME" ]; then + GIT_AUTHOR_NAME="$(git config -f "$USER_HOME/.gitconfig" user.name)" || true + export GIT_AUTHOR_NAME + fi + if [ -z "$GIT_AUTHOR_EMAIL" ]; then + GIT_AUTHOR_EMAIL="$(git config -f "$USER_HOME/.gitconfig" user.email)" || true + export GIT_AUTHOR_EMAIL + fi + fi + if [ -z "$GIT_AUTHOR_NAME" ] || [ -z "$GIT_AUTHOR_EMAIL" ]; then + if [ -n "$USER_HOME" ] && [ -e "$USER_HOME/.config/git/config" ]; then + if [ -z "$GIT_AUTHOR_NAME" ]; then + GIT_AUTHOR_NAME="$(git config -f "$USER_HOME/.config/git/config" user.name)" || true + export GIT_AUTHOR_NAME + fi + if [ -z "$GIT_AUTHOR_EMAIL" ]; then + GIT_AUTHOR_EMAIL="$(git config -f "$USER_HOME/.config/git/config" user.email)" || true + export GIT_AUTHOR_EMAIL + fi + fi + fi + + if [ -z "$GIT_COMMITTER_EMAIL" ]; then + GIT_COMMITTER_EMAIL="$(git config --global user.email)" || true + export GIT_COMMITTER_EMAIL + fi + if [ -z "$GIT_AUTHOR_NAME" ]; then + GIT_AUTHOR_NAME="$USER" + export GIT_AUTHOR_NAME + fi + if [ -z "$GIT_AUTHOR_EMAIL" ]; then + GIT_AUTHOR_EMAIL="$USER@$hostname" + export GIT_AUTHOR_EMAIL + fi + if [ -z "$GIT_COMMITTER_EMAIL" ]; then + GIT_COMMITTER_EMAIL=`whoami`"@$hostname" + export GIT_COMMITTER_EMAIL + fi + fi + + # gc ten times more frequently than the default + # (unless some other config is set) + GIT_GC_OPTIONS= + if ! git config gc.auto >/dev/null; then + GIT_GC_OPTIONS="-c gc.auto=670" + fi + + if [ -n "$logfile" ]; then + git $GIT_GC_OPTIONS commit $GIT_COMMIT_OPTIONS -F "$logfile" + else + git $GIT_GC_OPTIONS commit $GIT_COMMIT_OPTIONS + fi +elif [ "$VCS" = hg ] && [ -d .hg ]; then + if [ -n "$USER" ]; then + LOGNAME="$USER" + export LOGNAME + fi + if [ -z "$HGUSER" ]; then + HGUSER="$USER@$hostname" + export HGUSER + fi + if [ -n "$logfile" ]; then + hg commit $HG_COMMIT_OPTIONS -l "$logfile" + else + hg commit $HG_COMMIT_OPTIONS + fi +elif [ "$VCS" = bzr ] && [ -d .bzr ]; then + if [ -z "$EMAIL" ] && [ -n "$USER" ]; then + EMAIL="$USER <$USER@$hostname>" + export EMAIL + else + bzr whoami >/dev/null 2>&1 || export EMAIL="$ORIG_USER <$ORIG_USER@$hostname>" + fi + if [ -n "$logfile" ]; then + bzr commit $BZR_COMMIT_OPTIONS -F "$logfile" + else + bzr commit --quiet $BZR_COMMIT_OPTIONS + fi +elif [ "$VCS" = darcs ] && [ -d _darcs ]; then + if [ -z "$USER" ]; then + USER=root + fi + if [ -n "$logfile" ]; then + darcs record --author="$USER" $DARCS_COMMIT_OPTIONS --logfile="$logfile" + else + darcs record --author="$USER" $DARCS_COMMIT_OPTIONS + fi +fi diff --git a/etckeeper/commit.d/99push b/etckeeper/commit.d/99push new file mode 100755 index 0000000..1e11444 --- /dev/null +++ b/etckeeper/commit.d/99push @@ -0,0 +1,14 @@ +#!/usr/bin/sh +if [ -n "$PUSH_REMOTE" ]; then + if [ "$VCS" = git ] && [ -d .git ]; then + for REMOTE in $PUSH_REMOTE; do + git push "$REMOTE" || true + done + elif [ "$VCS" = hg ] && [ -d .hg ]; then + for REMOTE in $PUSH_REMOTE; do + hg push "$REMOTE" || true + done + else + echo "PUSH_REMOTE not yet supported for $VCS" >&2 + fi +fi diff --git a/etckeeper/commit.d/README b/etckeeper/commit.d/README new file mode 100644 index 0000000..25d0d45 --- /dev/null +++ b/etckeeper/commit.d/README @@ -0,0 +1,3 @@ +Files in this directory are run when there might be changes to commit. +(Before and after packages are installed, upgraded, etc.) +They should commit changes and new files in /etc to repository. diff --git a/etckeeper/daily b/etckeeper/daily new file mode 100755 index 0000000..8655084 --- /dev/null +++ b/etckeeper/daily @@ -0,0 +1,17 @@ +#!/usr/bin/sh +# Script that can be run daily to autocommit /etc changes. +set -e +if [ -x /usr/bin/etckeeper ] && [ -e /etc/etckeeper/etckeeper.conf ]; then + # avoid autocommit if an install run is in progress + lockfile=/var/cache/etckeeper/packagelist.pre-install + if [ -e "$lockfile" ] && [ -n "$(find "$lockfile" -mtime +1)" ]; then + rm -f "$lockfile" # stale + fi + if [ ! -e "$lockfile" ]; then + AVOID_SPECIAL_FILE_WARNING=1 + export AVOID_SPECIAL_FILE_WARNING + if etckeeper unclean; then + etckeeper commit "daily autocommit" >/dev/null + fi + fi +fi diff --git a/etckeeper/etckeeper.conf b/etckeeper/etckeeper.conf new file mode 100644 index 0000000..2d9a61b --- /dev/null +++ b/etckeeper/etckeeper.conf @@ -0,0 +1,45 @@ +# The VCS to use. +#VCS="hg" +VCS="git" +#VCS="bzr" +#VCS="darcs" + +# Options passed to git commit when run by etckeeper. +GIT_COMMIT_OPTIONS="" + +# Options passed to hg commit when run by etckeeper. +HG_COMMIT_OPTIONS="" + +# Options passed to bzr commit when run by etckeeper. +BZR_COMMIT_OPTIONS="" + +# Options passed to darcs record when run by etckeeper. +DARCS_COMMIT_OPTIONS="-a" + +# Etckeeper includes both a cron job and a systemd timer, which each +# can commit exiting changes to /etc automatically once per day. +# To enable the systemd timer, run: systemctl enable etckeeper.timer +# The cron job is enabled by default; to disable it, uncomment this next line. +#AVOID_DAILY_AUTOCOMMITS=1 + +# Uncomment the following to avoid special file warning +# (the option is enabled automatically for daily autocommits regardless). +#AVOID_SPECIAL_FILE_WARNING=1 + +# Uncomment to avoid etckeeper committing existing changes to +# /etc before installation. It will cancel the installation, +# so you can commit the changes by hand. +#AVOID_COMMIT_BEFORE_INSTALL=1 + +# The high-level package manager that's being used. +# (apt, pacman, pacman-g2, yum, dnf, zypper, apk, xbps, emerge, cave, etc) +HIGHLEVEL_PACKAGE_MANAGER=dnf + +# The low-level package manager that's being used. +# (dpkg, rpm, pacman, pacmatic, pacman-g2, apk, xbps, cave, qlist, etc) +LOWLEVEL_PACKAGE_MANAGER=rpm + +# To push each commit to a remote, put the name of the remote here. +# (eg, "origin" for git). Space-separated lists of multiple remotes +# also work (eg, "origin gitlab github" for git). +PUSH_REMOTE="" diff --git a/etckeeper/init.d/10restore-metadata b/etckeeper/init.d/10restore-metadata new file mode 100755 index 0000000..0a4b1b6 --- /dev/null +++ b/etckeeper/init.d/10restore-metadata @@ -0,0 +1,14 @@ +#!/usr/bin/sh +set -e + +# Note that metastore doesn't check that the .metastore file only changes +# perms of files in the current directory. It's ok to trust the .metastore +# file won't do anything shady, because, as documented, etckeeper-init +# should only be run on repositories you trust. +if [ -e .metadata ]; then + if command -v metastore >/dev/null; then + metastore --apply --mtime + else + echo "etckeeper warning: legacy .metastore file is present but metastore is not installed" >&2 + fi +fi diff --git a/etckeeper/init.d/20restore-etckeeper b/etckeeper/init.d/20restore-etckeeper new file mode 100755 index 0000000..21fed44 --- /dev/null +++ b/etckeeper/init.d/20restore-etckeeper @@ -0,0 +1,22 @@ +#!/usr/bin/sh +set -e + +# Used by .etckeeper to run a command if the file it acts on +# (the last parameter) exists. +maybe () { + command="$1" + shift 1 + + if eval [ -e "\"\$$#\"" ]; then + "$command" "$@" + fi +} + +# Yes, this runs code from the repository. As documented, etckeeper-init +# should only be run on repositories you trust. +if [ -e .etckeeper ]; then + . ./.etckeeper +else + touch .etckeeper + chmod 600 .etckeeper +fi diff --git a/etckeeper/init.d/40vcs-init b/etckeeper/init.d/40vcs-init new file mode 100755 index 0000000..39f43f7 --- /dev/null +++ b/etckeeper/init.d/40vcs-init @@ -0,0 +1,18 @@ +#!/usr/bin/sh +set -e + +description="$(hostname 2>/dev/null || cat /etc/hostname) /etc repository" +if [ "$VCS" = git ] && [ ! -e .git ]; then + git init + echo "$description" > .git/description +elif [ "$VCS" = hg ] && [ ! -e .hg ]; then + hg init + echo "[web]" > .hg/hgrc + echo "description = $description" >> .hg/hgrc +elif [ "$VCS" = bzr ] && [ ! -e .bzr ]; then + bzr init + bzr nick "$description" +elif [ "$VCS" = darcs ] && [ ! -e _darcs ]; then + darcs initialize + echo "$description" > _darcs/prefs/motd +fi diff --git a/etckeeper/init.d/50vcs-ignore b/etckeeper/init.d/50vcs-ignore new file mode 100755 index 0000000..59c834e --- /dev/null +++ b/etckeeper/init.d/50vcs-ignore @@ -0,0 +1,4 @@ +#!/usr/bin/sh +set -e + +etckeeper update-ignore -a || true diff --git a/etckeeper/init.d/50vcs-perm b/etckeeper/init.d/50vcs-perm new file mode 100755 index 0000000..b283a5c --- /dev/null +++ b/etckeeper/init.d/50vcs-perm @@ -0,0 +1,12 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ]; then + chmod 700 .git +elif [ "$VCS" = hg ]; then + chmod 700 .hg +elif [ "$VCS" = bzr ]; then + chmod 700 .bzr +elif [ "$VCS" = darcs ]; then + chmod 700 _darcs +fi diff --git a/etckeeper/init.d/50vcs-pre-commit-hook b/etckeeper/init.d/50vcs-pre-commit-hook new file mode 100755 index 0000000..28c97d0 --- /dev/null +++ b/etckeeper/init.d/50vcs-pre-commit-hook @@ -0,0 +1,80 @@ +#!/usr/bin/sh +set -e + +case "$VCS" in + git) + if [ -x .git/hooks/pre-commit ]; then + if ! grep -q "etckeeper pre-commit" .git/hooks/pre-commit; then + echo "etckeeper warning: .git/hooks/pre-commit needs to be manually modified to run: etckeeper pre-commit -d `pwd`" >&2 + fi + else + cat >.git/hooks/pre-commit <&2 + fi + else + touch .hg/hgrc + cat >>.hg/hgrc <&2 + fi + else + cat >_darcs/prefs/defaults < "$patternsfile" || true + grep -Evf "$patternsfile" + rm -f "$patternsfile" + unset patternsfile + else + cat - + fi +} + + +if [ "$VCS" = darcs ];then + NOVCS='. -path ./.git -prune -o -path ./.bzr -prune -o -path ./.hg -prune -o -path ./_darcs -prune -o' + + # We assume that if .etckeeper is empty this is the first run + if [ -s .etckeeper ]; then + linksindex="$( mktemp -t etckeeper-$VCS.XXXXXXXXXX )" + grep '^ln -s' .etckeeper | while IFS="'" read n n n link n; do + printf "%s\n" "$link" >> "$linksindex" + done + + # Warn about symbolic links that shouldn't exist + if links=$( find $NOVCS -type l -print | filter_ignore | grep -vFf "$linksindex" ); then + printf "%s\n%s\n" \ + "The following symbolic links should not exist:" \ + "$links" >&2 + fi + + rm -f "$linksindex" + unset links linksindex + fi + +fi diff --git a/etckeeper/init.d/70vcs-add b/etckeeper/init.d/70vcs-add new file mode 100755 index 0000000..942da65 --- /dev/null +++ b/etckeeper/init.d/70vcs-add @@ -0,0 +1,27 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ]; then + if ! git add .; then + echo "etckeeper warning: git add failed" >&2 + fi +elif [ "$VCS" = hg ]; then + if ! hg add .; then + echo "etckeeper warning: hg add failed" >&2 + fi +elif [ "$VCS" = bzr ]; then + if ! bzr add .; then + echo "etckeeper warning: bzr add failed" >&2 + fi +elif [ "$VCS" = darcs ]; then + # Don't warn if all the files were already added. + rc=0 + res=$( darcs add -qr . 2>&1 ) || rc=$? + if test $rc -ne 0; then + if ! test $rc -eq 2 -a "${res%No files were added}" != "$res"; then + printf "%s" "$res" + echo "etckeeper warning: darcs add failed" >&2 + fi + fi + unset rc res +fi diff --git a/etckeeper/init.d/README b/etckeeper/init.d/README new file mode 100644 index 0000000..90aec67 --- /dev/null +++ b/etckeeper/init.d/README @@ -0,0 +1,13 @@ +Executable files in this directory are run to initialise the working directory +for use by etckeeper. If the working directory is not already in version +control, that includes setting up the version control, but not actually +committing anything. If the working directory is in version control, +it includes applying stored metadata to the checked out files in the +working directory. + +Please be careful to *never* overwrite existing files/directories +in the working directory (or use absolute care when doing so). If a file +you need to write already exists, check if its contents are sane, and +if not, emit a warning on stderr. + +If initialisation fails, exit nonzero and no later files will be run. diff --git a/etckeeper/list-installed.d/50list-installed b/etckeeper/list-installed.d/50list-installed new file mode 100755 index 0000000..dc927f4 --- /dev/null +++ b/etckeeper/list-installed.d/50list-installed @@ -0,0 +1,38 @@ +#!/usr/bin/sh +if [ "$1" = fmt ]; then + # If the list format changes, change the fmt + if [ "$LOWLEVEL_PACKAGE_MANAGER" = dpkg ]; then + echo 2 + else + echo "" + fi +else + # Keep the sort order the same at all times. + LC_COLLATE=C + export LC_COLLATE + unset LC_ALL + + # Output to stdout a *sorted* list of all currently installed + # (or removed but still with config-files) packages, in the + # format "package version\n" (or something similar). + if [ "$LOWLEVEL_PACKAGE_MANAGER" = dpkg ]; then + dpkg-query -W -f '${Status}\t${Package} ${Version} ${Architecture}\n' | \ + grep -E '(ok installed|ok config-files)' | cut -f2,3 + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = rpm ]; then + rpm -qa --qf "%|epoch?{%{epoch}}:{0}|:%{name}-%{version}-%{release}.%{arch}\n" | sort + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = pacman ]; then + pacman -Q + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = pacmatic ]; then + pacmatic -Q + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = pkgng ]; then + pkg info -E "*" + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = apk ]; then + apk info -v | sort + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = xbps ]; then + xbps-query -l | awk '{print $2}' | sed -r 's/-([^-]+)$/ \1/g;' + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = qlist ]; then + qlist -ICv + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = cave ]; then + cave print-packages -r installed + fi +fi diff --git a/etckeeper/post-install.d/50vcs-commit b/etckeeper/post-install.d/50vcs-commit new file mode 100755 index 0000000..8b72135 --- /dev/null +++ b/etckeeper/post-install.d/50vcs-commit @@ -0,0 +1,94 @@ +#!/usr/bin/sh +set -e + +pl="/var/cache/etckeeper/packagelist" + +# Parent process is etckeeper +# (Only procps ps is currently supported, others will fail, +# so this may end up empty.) +ETCKEEPER_PID=$( ps --no-headers -o ppid "${PPID}" 2>/dev/null | sed 's/^ *//' ) + +# Find the parent of etckeeper and get the command line of the process +if ! [ -z "${ETCKEEPER_PID}" ]; then + ETCKEEPER_PPID=$( ps --no-headers -o ppid "${ETCKEEPER_PID}" | sed 's/^ *//' ) + ETCKEEPER_PARENT_COMMAND_LINE=$( ps --no-headers -o args "${ETCKEEPER_PPID}" ) +fi + +get_changes () { + if [ "$VCS" = git ]; then + git diff --stat | grep '|' | cut -d'|' -f1 | cut -b2- + git ls-files --exclude-standard --others + fi + if [ "$VCS" = hg ]; then + hg status --no-status + fi + if [ "$VCS" = bzr ]; then + bzr status -S | cut -b5- + fi + if [ "$VCS" = darcs ]; then + # ignore ' file -> file' lines for moved files + # trim ' -M +N rP' from change summary + darcs whatsnew --summary | grep -v '^ .* -> ' | cut -d' ' -f2- | sed 's/ [-+r][0-9]\+//g;s/^\.\///' + # lines beginning with 'a' show unversioned files + darcs whatsnew --look-for-adds --boring --summary | grep '^a' | cut -d' ' -f2- | sed 's/^\.\///' + fi +} + +get_changed_packages () { + if [ "$LOWLEVEL_PACKAGE_MANAGER" = dpkg ]; then + get_changes | sed 's/^/\/etc\//;s/\s*$//' | xargs -d '\n' dpkg 2>/dev/null -S | cut -d':' -f1 | sed 's/, /\n/g' + fi + if [ "$LOWLEVEL_PACKAGE_MANAGER" = rpm ]; then + # if output contains file path, file was not found + get_changes | sed 's/^/\/etc\//;s/\s*$//' | xargs -d '\n' rpm --qf '%{NAME}\n' -qf | grep -v "/etc/" + fi + # is it even possible to use pacmatic without pacman? + if [ "$LOWLEVEL_PACKAGE_MANAGER" = pacman -o "$LOWLEVEL_PACKAGE_MANAGER" = pacmatic ]; then + get_changes | sed 's/^/\/etc\//;s/\s*$//' | xargs -d '\n' pacman 2>/dev/null -Qo | rev | cut -d' ' -f1-2 | rev | cut -d' ' -f1 + fi + if [ "$LOWLEVEL_PACKAGE_MANAGER" = pkgng ]; then + get_changes | sed 's/^/\/etc\//;s/\s*$//' | xargs -d '\n' pkg which --quiet | rev | cut -d'-' -f2- | rev + fi + if [ "$LOWLEVEL_PACKAGE_MANAGER" = xbps ]; then + get_changes | sed 's/^/\/etc\//;s/\s*$//' | xargs -d '\n' xbps-query -o | cut -d':' -f1 + fi +} + +if etckeeper unclean; then + if [ -z "${ETCKEEPER_PARENT_COMMAND_LINE}" ]; then + message="committing changes in /etc after $HIGHLEVEL_PACKAGE_MANAGER run" + else + message="committing changes in /etc made by \"$ETCKEEPER_PARENT_COMMAND_LINE\"" + fi + + set +e + if [ -e $pl.pre-install ] && [ "$(cat $pl.fmt 2>/dev/null || true)" = "$(etckeeper list-installed fmt)" ]; then + ( + echo "$message" + echo + get_changed_packages | sort | uniq > $pl.found-pkgs + if [ -s $pl.found-pkgs ]; then + sed -i 's/^/^[-+]/;s/$/ /' $pl.found-pkgs + etckeeper list-installed | diff -U0 $pl.pre-install - | tail -n+4 | grep -E '^[-+]' | grep -f $pl.found-pkgs > $pl.found-packages + if [ -s $pl.found-packages ]; then + echo "Packages with configuration changes:" + cat $pl.found-packages || true + echo + fi + fi + echo "Package changes:" + etckeeper list-installed | diff -U0 $pl.pre-install - | tail -n+4 | grep -E '^[-+]' || true + ) | etckeeper commit --stdin + else + etckeeper commit "$(printf "$message")" + fi + status=$? + set -e + + if [ "$status" != 0 ]; then + echo "warning: etckeeper failed to commit changes in /etc using $VCS" >&2 + fi +fi + +rm -f $pl.pre-install $pl.fmt +rm -f $pl.found-pkgs $pl.found-packages diff --git a/etckeeper/post-install.d/README b/etckeeper/post-install.d/README new file mode 100644 index 0000000..62f4f9c --- /dev/null +++ b/etckeeper/post-install.d/README @@ -0,0 +1,2 @@ +Files in this directory are run after packages are installed, upgraded, etc. +They should commit changes and new files in /etc to repository. diff --git a/etckeeper/pre-commit.d/20warn-problem-files b/etckeeper/pre-commit.d/20warn-problem-files new file mode 100755 index 0000000..a494b5e --- /dev/null +++ b/etckeeper/pre-commit.d/20warn-problem-files @@ -0,0 +1,31 @@ +#!/usr/bin/sh +set -e + +# (Note that when using this, the find expression must end with +# -print or -exec, else the excluded directories will actually be +# printed!) +NOVCS='. -path ./.git -prune -o -path ./.bzr -prune -o -path ./.hg -prune -o -path ./_darcs -prune -o' + +if [ "$VCS" = bzr ] || [ "$VCS" = darcs ]; then + special=$(find $NOVCS ! -type d ! -type f ! -type l -print) || true + hardlinks=$(find $NOVCS -type f ! -links 1 -print) || true +elif [ "$VCS" = hg ]; then + special=$(find $NOVCS ! -type d ! -type f ! -type l -print) || true + hardlinks=$(find $NOVCS -type f ! -links 1 -exec hg status {} \; -print) || true +elif [ "$VCS" = git ]; then + special=$(find $NOVCS ! -type d ! -type f ! -type l -exec git ls-files --exclude-standard --cached --others {} + -print) || true + hardlinks=$(find $NOVCS -type f ! -links 1 -exec git ls-files --exclude-standard --cached --others {} + -print) || true +else + special="" +fi + +if [ -n "$special" ] && [ -z "$AVOID_SPECIAL_FILE_WARNING" ]; then + echo "etckeeper warning: special files could cause problems with $VCS:" >&2 + echo "$special" >&2 +fi +if [ -n "$hardlinks" ] && [ -z "$AVOID_SPECIAL_FILE_WARNING" ]; then + echo "etckeeper warning: hardlinked files could cause problems with $VCS:" >&2 + echo "$hardlinks" >&2 +fi + +true diff --git a/etckeeper/pre-commit.d/30store-metadata b/etckeeper/pre-commit.d/30store-metadata new file mode 100755 index 0000000..0dfa937 --- /dev/null +++ b/etckeeper/pre-commit.d/30store-metadata @@ -0,0 +1,171 @@ +#!/usr/bin/sh +set -e + +# Keep the sort order the same at all times. +LC_COLLATE=C +export LC_COLLATE +unset LC_ALL + +filter_ignore() { + case "$VCS" in + darcs) ignorefile=.darcsignore ;; + git) ignorefile=.gitignore ;; + esac + + if [ -n "$ignorefile" ] && [ -e "$ignorefile" ]; then + listfile="$( mktemp -t etckeeper-$VCS.XXXXXXXXXX )" + case "$VCS" in + darcs) + LC_CTYPE=C grep -v '^[[:space:]]*\(#\|$\)' "$ignorefile" > "$listfile" || true + LC_CTYPE=C grep -Evf "$listfile" + ;; + git) + (git ls-files -oi --exclude-standard; git ls-files -oi --exclude-standard --directory) | sort | uniq > "$listfile" || true + if [ -s "$listfile" ]; then + sed 's/^\.\///' | LC_CTYPE=C grep -xFvf "$listfile" + else + cat - + fi + ;; + esac + rm -f "$listfile" + unset listfile + else + cat - + fi +} + +shellquote() { + # Single quotes text, escaping existing single quotes. + sed -e "s/'/'\"'\"'/g" -e "s/^/'/" -e "s/$/'/" +} + +generate_metadata() { + # This function generates the script commands to fix any file + # ownerships that aren't owner=root, group=root, as well as to + # store the permissions of files. + # The script is produced on stdout. Errors go to stderr. + # + # The script can use a 'maybe' function, which only runs a command + # if the file in its last argument exists. + + # We want files in the directory containing VCS data + # but we want find to ignore the VCS files themselves. + # + # (Note that when using this, the find expression must end with + # -print or -exec, else the excluded directories will actually be + # printed!) + NOVCS='. -path ./.git -prune -o -path ./.bzr -prune -o -path ./.hg -prune -o -path ./_darcs -prune -o' + + if [ "$VCS" = git ] || [ "$VCS" = hg ]; then + # These version control systems do not track directories, + # so empty directories must be stored specially. + find $NOVCS -type d -empty -print | + sort | shellquote | sed -e "s/^/mkdir -p /" + fi + + if [ "$VCS" = darcs ]; then + # This version control system does not track symlinks, + # so they must be stored specially. + find $NOVCS -type l -print | sort | filter_ignore | while read link; do + dest=$( readlink "$link" ) + printf "ln -sf '%s' '%s'\n" "$(echo "$dest" | shellquote)" "$(echo "$link" | shellquote)" + done + fi + + # Store things that don't have the default user or group. + # Store all file modes, in case the user has an unusual umask. + find $NOVCS \( -type f -or -type d \) -print | filter_ignore | sort | maybe_chmod_chown + + # We don't handle xattrs. + # Maybe check for getfattr/setfattr and use them if they're available? +} + +maybe_chmod_chown() { + if command -v perl >/dev/null; then + perl -ne ' + BEGIN { $q=chr(39) } + sub uidname { + my $want=shift; + if (exists $uidcache{$want}) { + return $uidcache{$want}; + } + my $name=scalar getpwuid($want); + return $uidcache{$want}=defined $name ? $name : $want; + } + sub gidname { + my $want=shift; + if (exists $gidcache{$want}) { + return $gidcache{$want}; + } + my $name=scalar getgrgid($want); + return $gidcache{$want}=defined $name ? $name : $want; + } + chomp; + my @stat=stat($_); + my $mode = $stat[2]; + my $uid = $stat[4]; + my $gid = $stat[5]; + s/$q/$q"$q"$q/g; # escape single quotes + s/^/$q/; + s/$/$q/; + if ($uid != $>) { + printf "maybe chown $q%s$q %s\n", uidname($uid), $_; + } + if ($gid != $)) { + printf "maybe chgrp $q%s$q %s\n", gidname($gid), $_; + } + printf "maybe chmod %04o %s\n", $mode & 07777, $_; + ' + return $? + else + # fallback if perl isn't present + euid=$(id -u) + egid=$(id -g) + q="'" + while read x; do + stat=$(stat -c "%f:%u:%g:%a:%U:%G" "$x") + IFS=":" read mode uid gid perm uname gname < .etckeeper + echo >> .etckeeper + + # Make sure the file is not readable by others, since it can leak + # information about contents of non-readable directories in /etc. + chmod 700 .etckeeper + + generate_metadata >> .etckeeper + + # stage the file as part of the current commit + if [ "$VCS" = git ]; then + # this will do nothing if the metadata file is unchanged. + git add .etckeeper + fi + # hg, bzr and darcs add not done, they will automatically + # include the file in the current commit +fi diff --git a/etckeeper/pre-commit.d/README b/etckeeper/pre-commit.d/README new file mode 100644 index 0000000..051d094 --- /dev/null +++ b/etckeeper/pre-commit.d/README @@ -0,0 +1,2 @@ +This is run by a git pre-commit hook before committing changes to the +repository. This can be used for storing metadata, and for sanity checks. diff --git a/etckeeper/pre-install.d/10packagelist b/etckeeper/pre-install.d/10packagelist new file mode 100755 index 0000000..79858ac --- /dev/null +++ b/etckeeper/pre-install.d/10packagelist @@ -0,0 +1,5 @@ +#!/usr/bin/sh +# This list will be later used when committing. +mkdir -p /var/cache/etckeeper/ +etckeeper list-installed > /var/cache/etckeeper/packagelist.pre-install +etckeeper list-installed fmt > /var/cache/etckeeper/packagelist.fmt diff --git a/etckeeper/pre-install.d/50uncommitted-changes b/etckeeper/pre-install.d/50uncommitted-changes new file mode 100755 index 0000000..6ba6116 --- /dev/null +++ b/etckeeper/pre-install.d/50uncommitted-changes @@ -0,0 +1,15 @@ +#!/usr/bin/sh +set -e + +if etckeeper unclean; then + if [ "$AVOID_COMMIT_BEFORE_INSTALL" = 1 ]; then + echo "" >&2 + echo "** etckeeper detected uncommitted changes in /etc prior to $HIGHLEVEL_PACKAGE_MANAGER run" >&2 + echo "** Aborting $HIGHLEVEL_PACKAGE_MANAGER run. Manually commit and restart." >&2 + echo "" >&2 + exit 1 + fi + if ! etckeeper commit "saving uncommitted changes in /etc prior to $HIGHLEVEL_PACKAGE_MANAGER run"; then + echo "warning: etckeeper failed to commit changes in /etc using $VCS" >&2 + fi +fi diff --git a/etckeeper/pre-install.d/README b/etckeeper/pre-install.d/README new file mode 100644 index 0000000..a3b5a57 --- /dev/null +++ b/etckeeper/pre-install.d/README @@ -0,0 +1,3 @@ +Files in this directory are run before packages are installed, upgraded, +etc. This is mostly used for sanity checks, ie, does /etc have any +uncommitted changes? diff --git a/etckeeper/unclean.d/50test b/etckeeper/unclean.d/50test new file mode 100755 index 0000000..8a73c29 --- /dev/null +++ b/etckeeper/unclean.d/50test @@ -0,0 +1,12 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ]; then + [ -d .git ] && [ -n "`git status --porcelain`" ] +elif [ "$VCS" = hg ]; then + [ -d .hg ] && ! hg status 2>&1 | wc -l | grep -q "^0$" +elif [ "$VCS" = bzr ]; then + [ -d .bzr ] && ! bzr version-info --custom --template="{clean}\n" | grep -q "^1$" +elif [ "$VCS" = darcs ]; then + [ -d _darcs ] && darcs whatsnew -l >/dev/null +fi diff --git a/etckeeper/unclean.d/README b/etckeeper/unclean.d/README new file mode 100644 index 0000000..74bfbdd --- /dev/null +++ b/etckeeper/unclean.d/README @@ -0,0 +1,2 @@ +Files in this directory are used to test if the working copy has +uncommitted changes. diff --git a/etckeeper/uninit.d/01prompt b/etckeeper/uninit.d/01prompt new file mode 100755 index 0000000..ba1f5c5 --- /dev/null +++ b/etckeeper/uninit.d/01prompt @@ -0,0 +1,20 @@ +#!/usr/bin/sh +set -e + +if [ "$1" != "-f" ]; then + echo "** Warning: This will DESTROY all recorded history for $ETCKEEPER_DIR," + echo "** including the $VCS repository." + echo "" + printf "Are you sure you want to do this? [yN] " + read answer + case "$answer" in + [Yy]*) + echo "Proceeding.." + exit 0 + ;; + *) + echo "Aborting etckeeper uninit." + exit 1 + ;; + esac +fi diff --git a/etckeeper/uninit.d/50remove-metadata b/etckeeper/uninit.d/50remove-metadata new file mode 100755 index 0000000..1349d52 --- /dev/null +++ b/etckeeper/uninit.d/50remove-metadata @@ -0,0 +1,6 @@ +#!/usr/bin/sh +set -e + +# Files generated by etckeeper to store metadata the VCS cannot preserve. +rm -f .etckeeper +rm -f .metadata # only generated by old versions diff --git a/etckeeper/uninit.d/50vcs-uninit b/etckeeper/uninit.d/50vcs-uninit new file mode 100755 index 0000000..1f03416 --- /dev/null +++ b/etckeeper/uninit.d/50vcs-uninit @@ -0,0 +1,54 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ]; then + rm -rf .git + file=.gitignore +elif [ "$VCS" = hg ]; then + rm -rf .hg + file=.hgignore +elif [ "$VCS" = bzr ]; then + rm -rf .bzr + file=.bzrignore +elif [ "$VCS" = darcs ]; then + rm -rf _darcs + file=.darcsignore +fi + +managed_by_etckeeper="managed by etckeeper" + +if ! grep -q "$managed_by_etckeeper" "$file"; then + exit 0 +else + realfile="$file" + if command -v mktemp >/dev/null; then + tempfile="mktemp" + elif command -v tempfile >/dev/null; then + tempfile="tempfile" + else + echo "etckeeper warning: can't find tempfile or mktemp" >&2 + exit 1 + fi + file=$($tempfile) + otherentries= + skipping= + while read -r line; do + if echo "$line" | grep -q "$managed_by_etckeeper"; then + if [ ! "$skipping" ]; then + skipping=1 + else + skipping= + fi + elif [ ! "$skipping" ]; then + echo "$line" >> "$file" + otherentries=1 + fi + done <"$realfile" + + if [ "$otherentries" ]; then + mv -f "$file" "$realfile" + else + rm -f "$file" + rm -f "$realfile" + fi +fi diff --git a/etckeeper/uninit.d/README b/etckeeper/uninit.d/README new file mode 100644 index 0000000..d1a4eaa --- /dev/null +++ b/etckeeper/uninit.d/README @@ -0,0 +1,2 @@ +Executable files in this directory are run to uninitialise the working +directory, removing files added by `etckeeper init`. diff --git a/etckeeper/update-ignore.d/01update-ignore b/etckeeper/update-ignore.d/01update-ignore new file mode 100755 index 0000000..d75388a --- /dev/null +++ b/etckeeper/update-ignore.d/01update-ignore @@ -0,0 +1,225 @@ +#!/usr/bin/sh +set -e + +if [ "$VCS" = git ]; then + dir=.git + file=.gitignore +elif [ "$VCS" = hg ]; then + dir=.hg + file=.hgignore +elif [ "$VCS" = bzr ]; then + dir=.bzr + file=.bzrignore +elif [ "$VCS" = darcs ]; then + dir=_darcs + file=.darcsignore +else + echo "etckeeper: unsupported VCS $VCS" >&2 + exit 1 +fi + +if [ ! -d "$dir" ]; then + exit 0 +fi + +managed_by_etckeeper="managed by etckeeper" + +nl() { + echo >>"$file" +} + +comment() { + comment="$1" + echo "# $comment" >>"$file" +} + +ignore() { + glob="$1" + + case "$VCS" in + git) + # escape "#" in ignores, as otherwise it may + # be considered a comment + echo "$glob" | sed 's/#/\\#/g' >>"$file" + ;; + bzr) + echo "$glob" >>"$file" + ;; + hg) + # rather than converting the glob to a regexp, just + # configure hg to use globs + if [ -z "$hg_syntax_printed" ]; then + comment "use glob syntax" + echo "syntax: glob" >>"$file" + nl + hg_syntax_printed=1 + fi + echo "$glob" | sed 's/#/\\#/g' >>"$file" + ;; + darcs) + # darcs doesn't understand globs, so we need to + # translate them into regexs. Not a complete converter, + # but suitable for given globs. + if [ "${glob%\*}" != "$glob" ]; then + glob="${glob%\*}" + else + glob="$glob"'($|/)' + fi + if [ "${glob#\*}" != "$glob" ]; then + glob="${glob#\*}" + else + glob='(^|/)'"$glob" + fi + glob="$( printf %s $glob | sed -e 's/\./\\./g;s/\*/[^\/]*/g;s/\?/[^\/]/g' )" + echo "$glob" >>"$file" + esac +} + +writefile () { + comment "begin section $managed_by_etckeeper (do not edit this section by hand)" + nl + + if [ "$VCS" = darcs ]; then + darcs setpref boringfile .darcsignore + fi + + if [ "$LOWLEVEL_PACKAGE_MANAGER" = dpkg ]; then + comment "new and old versions of conffiles, stored by dpkg" + ignore "*.dpkg-*" + comment "new and old versions of conffiles, stored by ucf" + ignore "*.ucf-*" + nl + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = "rpm" ]; then + comment "new and old versions of conffiles, stored by apt/rpm" + ignore "*.rpmnew" + ignore "*.rpmorig" + ignore "*.rpmsave" + nl + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = "pacman-g2" -o "$LOWLEVEL_PACKAGE_MANAGER" = "pacman" -o "$LOWLEVEL_PACKAGE_MANAGER" = "pacmatic" ]; then + comment "new and old versions of conffiles, stored by pacman" + ignore "*.pacnew" + ignore "*.pacorig" + ignore "*.pacsave" + nl + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = "apk" ]; then + comment "new versions of conffiles, stored by apk" + ignore "*.apk-new" + nl + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = "xbps" ]; then + comment "new versions of conffiles, stored by xbps" + ignore "*.new-*_[0-9]*" + nl + elif [ "$LOWLEVEL_PACKAGE_MANAGER" = "qlist" -o "$LOWLEVEL_PACKAGE_MANAGER" = "cave" ]; then + comment "new and old versions of conffiles, stored by emerge" + ignore "._cfg*" + nl + fi + + comment "old versions of files" + ignore "*.old" + # Not currently ignored as admins tend to rely on these files. + #ignore "passwd-" + #ignore "group-" + #ignore "shadow-" + #ignore "gshadow-" + nl + + comment "mount(8) records system state here, no need to store these" + ignore blkid.tab + ignore blkid.tab.old + nl + + comment "some other files in /etc that typically do not need to be tracked" + ignore nologin + ignore ld.so.cache + ignore prelink.cache + ignore mtab + ignore mtab.fuselock + ignore .pwd.lock + ignore "*.LOCK" + ignore network/run + ignore adjtime + ignore udev/hwdb.bin + ignore lvm/cache + ignore lvm/archive + ignore "X11/xdm/authdir/authfiles/*" + ignore ntp.conf.dhcp + ignore .initctl + ignore "webmin/fsdump/*.status" + ignore "webmin/webmin/oscache" + ignore "apparmor.d/cache/*" + ignore "service/*/supervise/*" + ignore "service/*/log/supervise/*" + ignore "sv/*/supervise/*" + ignore "sv/*/log/supervise/*" + ignore "*.elc" + ignore "*.pyc" + ignore "*.pyo" + ignore "init.d/.depend.*" + ignore "openvpn/openvpn-status.log" + ignore "cups/subscriptions.conf" + ignore "cups/subscriptions.conf.O" + ignore "fake-hwclock.data" + ignore "check_mk/logwatch.state" + nl + + comment "editor temp files" + ignore "*~" + ignore ".*.sw?" + ignore ".sw?" + ignore "#*#" + ignore DEADJOE + + nl + comment "end section $managed_by_etckeeper" +} + +if [ -e "$file" ]; then + if ! grep -q "$managed_by_etckeeper" "$file"; then + if [ "$1" != "-a" ]; then + echo "etckeeper: "$file" does not contain \"$managed_by_etckeeper\" comment; not updating" + exit 1 + else + echo "etckeeper: "$file" exists but does not contain \"$managed_by_etckeeper\" comment; updating" + writefile + exit 0 + fi + fi + realfile="$file" + if command -v mktemp >/dev/null; then + tempfile="mktemp" + elif command -v tempfile >/dev/null; then + tempfile="tempfile" + else + echo "etckeeper warning: can't find tempfile or mktemp" >&2 + fi + file=$($tempfile) + + # preserve permissions and ownership + cp -fp "$realfile" "$file" + cat /dev/null >"$file" + + ( + skipping= + while read -r line; do + if echo "$line" | grep -q "$managed_by_etckeeper"; then + if [ ! "$skipping" ]; then + skipping=1 + else + skipping= + writefile + fi + elif [ ! "$skipping" ]; then + echo "$line" >> "$file" + fi + done + if [ "$skipping" ]; then + # reached end of file w/o ending block + writefile + fi + ) <"$realfile" + + mv -f "$file" "$realfile" +else + writefile +fi diff --git a/etckeeper/update-ignore.d/README b/etckeeper/update-ignore.d/README new file mode 100644 index 0000000..a573135 --- /dev/null +++ b/etckeeper/update-ignore.d/README @@ -0,0 +1,2 @@ +Executable files in this directory are run to update the VCS ignore file, +or create it if it does not exist. diff --git a/etckeeper/vcs.d/50vcs-cmd b/etckeeper/vcs.d/50vcs-cmd new file mode 100755 index 0000000..28ce68d --- /dev/null +++ b/etckeeper/vcs.d/50vcs-cmd @@ -0,0 +1,11 @@ +#!/usr/bin/sh +set -e + +# check whether we can locate the vcs binary +if [ -n "$VCS" ] && command -v "$VCS" > /dev/null; then + # pass commands to the VCS application + $VCS "$@" +else + echo "error: VCS ($VCS) not set or not in PATH" >&2 + exit 1 +fi diff --git a/ethertypes b/ethertypes new file mode 100644 index 0000000..813177b --- /dev/null +++ b/ethertypes @@ -0,0 +1,39 @@ +# +# Ethernet frame types +# This file describes some of the various Ethernet +# protocol types that are used on Ethernet networks. +# +# This list could be found on: +# http://www.iana.org/assignments/ethernet-numbers +# http://www.iana.org/assignments/ieee-802-numbers +# +# ... #Comment +# +IPv4 0800 ip ip4 # Internet IP (IPv4) +X25 0805 +ARP 0806 ether-arp # +FR_ARP 0808 # Frame Relay ARP [RFC1701] +BPQ 08FF # G8BPQ AX.25 Ethernet Packet +DEC 6000 # DEC Assigned proto +DNA_DL 6001 # DEC DNA Dump/Load +DNA_RC 6002 # DEC DNA Remote Console +DNA_RT 6003 # DEC DNA Routing +LAT 6004 # DEC LAT +DIAG 6005 # DEC Diagnostics +CUST 6006 # DEC Customer use +SCA 6007 # DEC Systems Comms Arch +TEB 6558 # Trans Ether Bridging [RFC1701] +RAW_FR 6559 # Raw Frame Relay [RFC1701] +RARP 8035 # Reverse ARP [RFC903] +AARP 80F3 # Appletalk AARP +ATALK 809B # Appletalk +802_1Q 8100 8021q 1q 802.1q dot1q # 802.1Q Virtual LAN tagged frame +IPX 8137 # Novell IPX +NetBEUI 8191 # NetBEUI +IPv6 86DD ip6 # IP version 6 +PPP 880B # PPP +ATMMPOA 884C # MultiProtocol over ATM +PPP_DISC 8863 # PPPoE discovery messages +PPP_SES 8864 # PPPoE session messages +ATMFATE 8884 # Frame-based ATM Transport over Ethernet +LOOP 9000 loopback # loop proto diff --git a/exports b/exports new file mode 100644 index 0000000..e69de29 diff --git a/filesystems b/filesystems new file mode 100644 index 0000000..45bdb1c --- /dev/null +++ b/filesystems @@ -0,0 +1,10 @@ +ext4 +ext3 +ext2 +nodev proc +nodev devpts +iso9660 +vfat +hfs +hfsplus +* diff --git a/firewalld/firewalld.conf b/firewalld/firewalld.conf new file mode 100644 index 0000000..28345a1 --- /dev/null +++ b/firewalld/firewalld.conf @@ -0,0 +1,103 @@ +# firewalld config file + +# default zone +# The default zone used if an empty zone string is used. +# Default: public +DefaultZone=public + +# Clean up on exit +# If set to no or false the firewall configuration will not get cleaned up +# on exit or stop of firewalld. +# Default: yes +CleanupOnExit=yes + +# Clean up kernel modules on exit +# If set to yes or true the firewall related kernel modules will be +# unloaded on exit or stop of firewalld. This might attempt to unload +# modules not originally loaded by firewalld. +# Default: no +CleanupModulesOnExit=no + +# Lockdown +# If set to enabled, firewall changes with the D-Bus interface will be limited +# to applications that are listed in the lockdown whitelist. +# The lockdown whitelist file is lockdown-whitelist.xml +# Default: no +Lockdown=no + +# IPv6_rpfilter +# Performs reverse path filtering (RPF) on IPv6 packets as per RFC 3704. +# Possible values: +# - strict: Performs "strict" filtering as per RFC 3704. This check +# verifies that the in ingress interface is the same interface +# that would be used to send a packet reply to the source. That +# is, ingress == egress. +# - loose: Performs "loose" filtering as per RFC 3704. This check only +# verifies that there is a route back to the source through any +# interface; even if it's not the same one on which the packet +# arrived. +# - strict-forward: This is almost identical to "strict", but does not perform +# RPF for packets targeted to the host (INPUT). +# - loose-forward: This is almost identical to "loose", but does not perform +# RPF for packets targeted to the host (INPUT). +# - no: RPF is completely disabled. +# +# The rp_filter for IPv4 is controlled using sysctl. +# Note: This feature has a performance impact. See man page FIREWALLD.CONF(5) +# for details. +# Default: strict +IPv6_rpfilter=strict + +# IndividualCalls +# Do not use combined -restore calls, but individual calls. This increases the +# time that is needed to apply changes and to start the daemon, but is good for +# debugging. +# Default: no +IndividualCalls=no + +# LogDenied +# Add logging rules right before reject and drop rules in the INPUT, FORWARD +# and OUTPUT chains for the default rules and also final reject and drop rules +# in zones. Possible values are: all, unicast, broadcast, multicast and off. +# Default: off +LogDenied=off + +# FirewallBackend +# Selects the firewall backend implementation. +# Choices are: +# - nftables (default) +# - iptables (iptables, ip6tables, ebtables and ipset) +# Note: The iptables backend is deprecated. It will be removed in a future +# release. +FirewallBackend=nftables + +# FlushAllOnReload +# Flush all runtime rules on a reload. In previous releases some runtime +# configuration was retained during a reload, namely; interface to zone +# assignment, and direct rules. This was confusing to users. To get the old +# behavior set this to "no". +# Default: yes +FlushAllOnReload=yes + +# ReloadPolicy +# Policy during reload. By default all traffic except for established +# connections is dropped while the rules are updated. Set to "DROP", "REJECT" +# or "ACCEPT". Alternatively, specify it per table, like +# "OUTPUT:ACCEPT,INPUT:DROP,FORWARD:REJECT". +# Default: ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP +ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP + +# RFC3964_IPv4 +# As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that +# correspond to IPv4 addresses that should not be routed over the public +# internet. +# Defaults to "yes". +RFC3964_IPv4=yes + +# NftablesTableOwner +# If set to yes, the generated nftables rule set will be owned exclusively by +# firewalld. This prevents other entities from mistakenly (or maliciously) +# modifying firewalld's rule set. If you intentionally modify firewalld's +# rules, then you will have to set this to "no". +# Defaults to "yes". +NftablesTableOwner=yes diff --git a/firewalld/lockdown-whitelist.xml b/firewalld/lockdown-whitelist.xml new file mode 100644 index 0000000..0a13f66 --- /dev/null +++ b/firewalld/lockdown-whitelist.xml @@ -0,0 +1,7 @@ + + + + + + + diff --git a/firewalld/zones/public.xml b/firewalld/zones/public.xml new file mode 100644 index 0000000..62bc751 --- /dev/null +++ b/firewalld/zones/public.xml @@ -0,0 +1,9 @@ + + + Public + For use in public areas. You do not trust the other computers on networks to not harm your computer. Only selected incoming connections are accepted. + + + + + diff --git a/fstab b/fstab new file mode 100644 index 0000000..30e02a1 --- /dev/null +++ b/fstab @@ -0,0 +1,17 @@ + +# +# /etc/fstab +# Created by anaconda on Thu Nov 17 06:54:07 2022 +# +# Accessible filesystems, by reference, are maintained under '/dev/disk/'. +# See man pages fstab(5), findfs(8), mount(8) and/or blkid(8) for more info. +# +# After editing this file, run 'systemctl daemon-reload' to update systemd +# units generated from this file. +# +/dev/mapper/rl-root / xfs defaults 0 0 +UUID=5b6a4900-ebc8-4e2a-87b6-8246e43aaf75 /boot ext4 defaults 1 2 +/dev/mapper/rl-home /home xfs defaults 0 0 +/dev/mapper/rl-opt /opt xfs defaults 0 0 +/dev/mapper/rl-var /var xfs defaults 0 0 +/dev/mapper/rl-swap none swap defaults 0 0 diff --git a/fuse.conf b/fuse.conf new file mode 100644 index 0000000..cd4c6bd --- /dev/null +++ b/fuse.conf @@ -0,0 +1,2 @@ +# mount_max = 1000 +# user_allow_other diff --git a/gitconfig b/gitconfig new file mode 100644 index 0000000..b5db2b4 --- /dev/null +++ b/gitconfig @@ -0,0 +1,13 @@ +[init] + defaultBranch = main +[user] + name = Frank Brehm + email = frank@brehm-online.com +[color] + ui = true +[push] + default = simple +[pager] + branch = false +[core] + pager = less -RF diff --git a/groff/site-tmac/man.local b/groff/site-tmac/man.local new file mode 100644 index 0000000..3030a84 --- /dev/null +++ b/groff/site-tmac/man.local @@ -0,0 +1,4 @@ +.\" -*- nroff -*- +.\" +.\" This file is loaded after an-old.tmac. +.\" Put any local modifications to an-old.tmac here. diff --git a/groff/site-tmac/mdoc.local b/groff/site-tmac/mdoc.local new file mode 100644 index 0000000..bfc0c3b --- /dev/null +++ b/groff/site-tmac/mdoc.local @@ -0,0 +1,4 @@ +.\" -*- nroff -*- +.\" +.\" This file is loaded after doc.tmac. +.\" Put any local modifications to doc.tmac here. diff --git a/group b/group new file mode 100644 index 0000000..5e252be --- /dev/null +++ b/group @@ -0,0 +1,47 @@ +root:x:0: +bin:x:1: +daemon:x:2: +sys:x:3: +adm:x:4: +tty:x:5: +disk:x:6: +lp:x:7: +mem:x:8: +kmem:x:9: +wheel:x:10:frank +cdrom:x:11: +mail:x:12: +man:x:15: +dialout:x:18: +floppy:x:19: +games:x:20: +tape:x:33: +video:x:39: +ftp:x:50: +lock:x:54: +audio:x:63: +users:x:100:frank +nobody:x:65534: +utmp:x:22: +utempter:x:35: +input:x:999: +kvm:x:36: +render:x:998: +systemd-journal:x:190: +systemd-coredump:x:997: +dbus:x:81: +tss:x:59: +ssh_keys:x:996: +sssd:x:995: +sshd:x:74: +chrony:x:994: +sgx:x:993: +systemd-oom:x:992: +frank:x:1000: +mock:x:135: +postgres:x:26: +redis:x:991: +systemd-network:x:192: +screen:x:84: +rpc:x:32: +rpcuser:x:29: diff --git a/group- b/group- new file mode 100644 index 0000000..c85f8eb --- /dev/null +++ b/group- @@ -0,0 +1,46 @@ +root:x:0: +bin:x:1: +daemon:x:2: +sys:x:3: +adm:x:4: +tty:x:5: +disk:x:6: +lp:x:7: +mem:x:8: +kmem:x:9: +wheel:x:10:frank +cdrom:x:11: +mail:x:12: +man:x:15: +dialout:x:18: +floppy:x:19: +games:x:20: +tape:x:33: +video:x:39: +ftp:x:50: +lock:x:54: +audio:x:63: +users:x:100:frank +nobody:x:65534: +utmp:x:22: +utempter:x:35: +input:x:999: +kvm:x:36: +render:x:998: +systemd-journal:x:190: +systemd-coredump:x:997: +dbus:x:81: +tss:x:59: +ssh_keys:x:996: +sssd:x:995: +sshd:x:74: +chrony:x:994: +sgx:x:993: +systemd-oom:x:992: +frank:x:1000: +mock:x:135: +postgres:x:26: +redis:x:991: +systemd-network:x:192: +screen:x:84: +rpc:x:32: diff --git a/grub.d/00_header b/grub.d/00_header new file mode 100755 index 0000000..740af6f --- /dev/null +++ b/grub.d/00_header @@ -0,0 +1,381 @@ +#!/usr/bin/sh +set -e + +# grub-mkconfig helper script. +# Copyright (C) 2006,2007,2008,2009,2010 Free Software Foundation, Inc. +# +# GRUB is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# GRUB is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GRUB. If not, see . + +prefix="/usr" +exec_prefix="/usr" +datarootdir="/usr/share" +grub_lang=`echo $LANG | cut -d . -f 1` + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR="${datarootdir}/locale" + +. "$pkgdatadir/grub-mkconfig_lib" + +if [ "x${SUSE_BTRFS_SNAPSHOT_BOOTING}" = "xtrue" ] && + [ "x${GRUB_FS}" = "xbtrfs" ] ; then + cat < /dev/null ; then + font_path="${path}" + else + continue + fi + break 2 + done + done + if [ -n "${font_path}" ] ; then + cat << EOF +if [ x\$feature_default_font_path = xy ] ; then + font=unicode +else +EOF + # Make the font accessible + prepare_grub_to_access_device `${grub_probe} --target=device "${font_path}"` + cat << EOF + font="`make_system_path_relative_to_its_root "${font_path}"`" +fi + +if loadfont \$font ; then +EOF + else + cat << EOF +if loadfont unicode ; then +EOF + fi + fi + + cat << EOF + set gfxmode=${GRUB_GFXMODE} + load_video + insmod gfxterm +EOF + +# Gettext variables and module +if [ "x${LANG}" != "xC" ] && [ "x${LANG}" != "x" ]; then + cat << EOF + set locale_dir=\$prefix/locale + set lang=${grub_lang} + insmod gettext +EOF +fi + +cat <&2 + + prepare_grub_to_access_device `${grub_probe} --target=device "$GRUB_THEME"` + cat << EOF +insmod gfxmenu +EOF + themedir="`dirname "$GRUB_THEME"`" + for x in "$themedir"/*.pf2 "$themedir"/f/*.pf2; do + if [ -f "$x" ]; then + cat << EOF +loadfont (\$root)`make_system_path_relative_to_its_root $x` +EOF + fi + done + if [ x"`echo "$themedir"/*.jpg`" != x"$themedir/*.jpg" ] || [ x"`echo "$themedir"/*.jpeg`" != x"$themedir/*.jpeg" ]; then + cat << EOF +insmod jpeg +EOF + fi + if [ x"`echo "$themedir"/*.png`" != x"$themedir/*.png" ]; then + cat << EOF +insmod png +EOF + fi + if [ x"`echo "$themedir"/*.tga`" != x"$themedir/*.tga" ]; then + cat << EOF +insmod tga +EOF + fi + + cat << EOF +set theme=(\$root)`make_system_path_relative_to_its_root $GRUB_THEME` +export theme +EOF + elif [ "x$GRUB_BACKGROUND" != x ] && [ -f "$GRUB_BACKGROUND" ] \ + && is_path_readable_by_grub "$GRUB_BACKGROUND"; then + gettext_printf "Found background: %s\n" "$GRUB_BACKGROUND" >&2 + case "$GRUB_BACKGROUND" in + *.png) reader=png ;; + *.tga) reader=tga ;; + *.jpg|*.jpeg) reader=jpeg ;; + *) gettext "Unsupported image format" >&2; echo >&2; exit 1 ;; + esac + prepare_grub_to_access_device `${grub_probe} --target=device "$GRUB_BACKGROUND"` + cat << EOF +insmod $reader +background_image -m stretch `make_system_path_relative_to_its_root "$GRUB_BACKGROUND"` +EOF + fi +fi + +make_timeout () +{ + if [ "x${3}" != "x" ] ; then + timeout="${2}" + style="${3}" + elif [ "x${1}" != "x" ] && [ "x${1}" != "x0" ] ; then + # Handle the deprecated GRUB_HIDDEN_TIMEOUT scheme. + timeout="${1}" + if [ "x${2}" != "x0" ] ; then + grub_warn "$(gettext "Setting GRUB_TIMEOUT to a non-zero value when GRUB_HIDDEN_TIMEOUT is set is no longer supported.")" + fi + if [ "x${GRUB_HIDDEN_TIMEOUT_QUIET}" = "xtrue" ] ; then + style="hidden" + verbose= + else + style="countdown" + verbose=" --verbose" + fi + else + # No hidden timeout, so treat as GRUB_TIMEOUT_STYLE=menu + timeout="${2}" + style="menu" + fi + cat << EOF +if [ x\$feature_timeout_style = xy ] ; then + set timeout_style=${style} + set timeout=${timeout} +EOF + if [ "x${style}" = "xmenu" ] ; then + cat << EOF +# Fallback normal timeout code in case the timeout_style feature is +# unavailable. +else + set timeout=${timeout} +EOF + else + cat << EOF +# Fallback hidden-timeout code in case the timeout_style feature is +# unavailable. +elif sleep${verbose} --interruptible ${timeout} ; then + set timeout=0 +EOF + fi + cat << EOF +fi +EOF +} + +if [ "x$GRUB_BUTTON_CMOS_ADDRESS" != "x" ]; then + cat <. + +prefix="/usr" +exec_prefix="/usr" +datarootdir="/usr/share" + +. "$pkgdatadir/grub-mkconfig_lib" + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR="${datarootdir}/locale" + +CLASS="--class gnu-linux --class gnu --class os --unrestricted" + +if [ "x${GRUB_DISTRIBUTOR}" = "x" ] ; then + OS="$(eval $(grep PRETTY_NAME /etc/os-release) ; echo ${PRETTY_NAME})" + CLASS="--class $(eval $(grep '^ID_LIKE=\|^ID=' /etc/os-release) ; [ -n "${ID_LIKE}" ] && echo ${ID_LIKE} || echo ${ID}) ${CLASS}" +else + OS="${GRUB_DISTRIBUTOR}" + CLASS="--class $(echo ${GRUB_DISTRIBUTOR} | tr 'A-Z' 'a-z' | cut -d' ' -f1|LC_ALL=C sed 's,[^[:alnum:]_],_,g') ${CLASS}" +fi + +# loop-AES arranges things so that /dev/loop/X can be our root device, but +# the initrds that Linux uses don't like that. +case ${GRUB_DEVICE} in + /dev/loop/*|/dev/loop[0-9]) + GRUB_DEVICE=`losetup ${GRUB_DEVICE} | sed -e "s/^[^(]*(\([^)]\+\)).*/\1/"` + ;; +esac + +# Default to disabling partition uuid support to maintian compatibility with +# older kernels. +GRUB_DISABLE_LINUX_PARTUUID=${GRUB_DISABLE_LINUX_PARTUUID-true} + +# btrfs may reside on multiple devices. We cannot pass them as value of root= parameter +# and mounting btrfs requires user space scanning, so force UUID in this case. +if ( [ "x${GRUB_DEVICE_UUID}" = "x" ] && [ "x${GRUB_DEVICE_PARTUUID}" = "x" ] ) \ + || ( [ "x${GRUB_DISABLE_LINUX_UUID}" = "xtrue" ] \ + && [ "x${GRUB_DISABLE_LINUX_PARTUUID}" = "xtrue" ] ) \ + || ( ! test -e "/dev/disk/by-uuid/${GRUB_DEVICE_UUID}" \ + && ! test -e "/dev/disk/by-partuuid/${GRUB_DEVICE_PARTUUID}" ) \ + || ( test -e "${GRUB_DEVICE}" && uses_abstraction "${GRUB_DEVICE}" lvm ); then + LINUX_ROOT_DEVICE=${GRUB_DEVICE} +elif [ "x${GRUB_DEVICE_UUID}" = "x" ] \ + || [ "x${GRUB_DISABLE_LINUX_UUID}" = "xtrue" ]; then + LINUX_ROOT_DEVICE=PARTUUID=${GRUB_DEVICE_PARTUUID} +else + LINUX_ROOT_DEVICE=UUID=${GRUB_DEVICE_UUID} +fi + +case x"$GRUB_FS" in + xbtrfs) + if [ "x${SUSE_BTRFS_SNAPSHOT_BOOTING}" = "xtrue" ]; then + GRUB_CMDLINE_LINUX="${GRUB_CMDLINE_LINUX} \${extra_cmdline}" + else + rootsubvol="`make_system_path_relative_to_its_root /`" + rootsubvol="${rootsubvol#/}" + if [ "x${rootsubvol}" != x ]; then + GRUB_CMDLINE_LINUX="rootflags=subvol=${rootsubvol} ${GRUB_CMDLINE_LINUX}" + fi + fi;; + xzfs) + rpool=`${grub_probe} --device ${GRUB_DEVICE} --target=fs_label 2>/dev/null || true` + bootfs="`make_system_path_relative_to_its_root / | sed -e "s,@$,,"`" + LINUX_ROOT_DEVICE="ZFS=${rpool}${bootfs%/}" + ;; +esac + +populate_header_warn() +{ +if [ "x${BLS_POPULATE_MENU}" = "xtrue" ]; then + bls_parser="10_linux script" +else + bls_parser="blscfg command" +fi +cat </dev/null)) || : + + echo "${files[@]}" +} + +update_bls_cmdline() +{ + local cmdline="root=${LINUX_ROOT_DEVICE} ro ${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" + local -a files=($(get_sorted_bls)) + + if [ -w /etc/kernel ] && + [[ ! -f /etc/kernel/cmdline || + /etc/kernel/cmdline -ot /etc/default/grub ]]; then + # anaconda has the correct information to create this during install; + # afterward, grubby will take care of syncing on updates. If the user + # has modified /etc/default/grub, try to cope. + echo "$cmdline" > /etc/kernel/cmdline + fi + + for bls in "${files[@]}"; do + local options="${cmdline}" + if [ -z "${bls##*debug*}" ]; then + options="${options} ${GRUB_CMDLINE_LINUX_DEBUG}" + fi + options="$(echo "${options}" | sed -e 's/\//\\\//g')" + sed -i -e "s/^options.*/options ${options}/" "${blsdir}/${bls}.conf" + done +} + +populate_menu() +{ + local -a files=($(get_sorted_bls)) + + gettext_printf "Generating boot entries from BLS files...\n" >&2 + + for bls in "${files[@]}"; do + read_config "${blsdir}/${bls}.conf" + + menu="${menu}menuentry '${title}' ${grub_arg} --id=${bls} {\n" + menu="${menu}\t linux ${linux} ${options}\n" + if [ -n "${initrd}" ] ; then + menu="${menu}\t initrd ${boot_prefix}${initrd}\n" + fi + menu="${menu}}\n\n" + done + # The printf command seems to be more reliable across shells for special character (\n, \t) evaluation + printf "$menu" +} + +# Make BLS the default if GRUB_ENABLE_BLSCFG was not set and grubby is not installed. +if [ -z "${GRUB_ENABLE_BLSCFG}" ] && ! command -v new-kernel-pkg >/dev/null; then + GRUB_ENABLE_BLSCFG="true" +fi + +if [ "x${GRUB_ENABLE_BLSCFG}" = "xtrue" ]; then + if [ x$dirname = x/ ]; then + if [ -z "${prepare_root_cache}" ]; then + prepare_grub_to_access_device ${GRUB_DEVICE} + fi + else + if [ -z "${prepare_boot_cache}" ]; then + prepare_grub_to_access_device ${GRUB_DEVICE_BOOT} + fi + fi + + if [ -d /sys/firmware/efi ]; then + bootefi_device="`${grub_probe} --target=device /boot/efi/`" + prepare_grub_to_access_device_with_variable boot ${bootefi_device} + else + boot_device="`${grub_probe} --target=device /boot/`" + prepare_grub_to_access_device_with_variable boot ${boot_device} + fi + + arch="$(uname -m)" + if [ "x${arch}" = "xppc64le" ] && [ -d /sys/firmware/opal ]; then + + BLS_POPULATE_MENU="true" + petitboot_path="/sys/firmware/devicetree/base/ibm,firmware-versions/petitboot" + + if test -e ${petitboot_path}; then + read -r -d '' petitboot_version < ${petitboot_path} + petitboot_version="$(echo ${petitboot_version//v})" + + if test -n ${petitboot_version}; then + major_version="$(echo ${petitboot_version} | cut -d . -f1)" + minor_version="$(echo ${petitboot_version} | cut -d . -f2)" + + re='^[0-9]+$' + if [[ $major_version =~ $re ]] && [[ $minor_version =~ $re ]] && + ([[ ${major_version} -gt 1 ]] || + [[ ${major_version} -eq 1 && + ${minor_version} -ge 8 ]]); then + BLS_POPULATE_MENU="false" + fi + fi + fi + fi + + populate_header_warn + + cat << EOF +# The kernelopts variable should be defined in the grubenv file. But to ensure that menu +# entries populated from BootLoaderSpec files that use this variable work correctly even +# without a grubenv file, define a fallback kernelopts variable if this has not been set. +# +# The kernelopts variable in the grubenv file can be modified using the grubby tool or by +# executing the grub2-mkconfig tool. For the latter, the values of the GRUB_CMDLINE_LINUX +# and GRUB_CMDLINE_LINUX_DEFAULT options from /etc/default/grub file are used to set both +# the kernelopts variable in the grubenv file and the fallback kernelopts variable. +if [ -z "\${kernelopts}" ]; then + set kernelopts="root=${LINUX_ROOT_DEVICE} ro ${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" +fi +EOF + + if [ "x${GRUB_UPDATE_BLS_CMDLINE}" = "xyes" ] || [[ -d /run/install ]]; then + # only update the bls cmdline if the user specifically requests it or _anytime_ + # in the installer environment: /run/install directory only exists during the + # installation and not in cloud images, so this should get all the boot params + # from /etc/default/grub into BLS snippets + update_bls_cmdline + fi + + if [ "x${BLS_POPULATE_MENU}" = "xtrue" ]; then + populate_menu + else + cat << EOF + +insmod blscfg +blscfg +EOF + fi + + if [ "x${GRUB_GRUBENV_UPDATE}" = "xyes" ]; then + blsdir="/boot/loader/entries" + [ -d "${blsdir}" ] && GRUB_BLS_FS="$(${grub_probe} --target=fs ${blsdir})" + if [ "x${GRUB_BLS_FS}" = "xbtrfs" ] || [ "x${GRUB_BLS_FS}" = "xzfs" ]; then + blsdir=$(make_system_path_relative_to_its_root "${blsdir}") + if [ "x${blsdir}" != "x/loader/entries" ] && [ "x${blsdir}" != "x/boot/loader/entries" ]; then + ${grub_editenv} - set blsdir="${blsdir}" + fi + fi + + if [ -n "${GRUB_EARLY_INITRD_LINUX_CUSTOM}" ]; then + ${grub_editenv} - set early_initrd="${GRUB_EARLY_INITRD_LINUX_CUSTOM}" + fi + + if [ -n "${GRUB_DEFAULT_DTB}" ]; then + ${grub_editenv} - set devicetree="${GRUB_DEFAULT_DTB}" + fi + + if [ -n "${GRUB_SAVEDEFAULT}" ]; then + ${grub_editenv} - set save_default="${GRUB_SAVEDEFAULT}" + fi + fi + + exit 0 +fi + +mktitle () +{ + local title_type + local version + local OS_NAME + local OS_VERS + + title_type=$1 && shift + version=$1 && shift + + OS_NAME="$(eval $(grep ^NAME= /etc/os-release) ; echo ${NAME})" + OS_VERS="$(eval $(grep ^VERSION= /etc/os-release) ; echo ${VERSION})" + + case $title_type in + recovery) + title=$(printf '%s (%s) %s (recovery mode)' \ + "${OS_NAME}" "${version}" "${OS_VERS}") + ;; + *) + title=$(printf '%s (%s) %s' \ + "${OS_NAME}" "${version}" "${OS_VERS}") + ;; + esac + echo -n ${title} +} + +title_correction_code= + +linux_entry () +{ + os="$1" + version="$2" + type="$3" + isdebug="$4" + args="$5" + + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${GRUB_DEVICE}")" + fi + + if [ x$type != xsimple ] ; then + title=$(mktitle "$type" "$version") + if [ x"$title" = x"$GRUB_ACTUAL_DEFAULT" ] || [ x"Previous Linux versions>$title" = x"$GRUB_ACTUAL_DEFAULT" ]; then + replacement_title="$(echo "Advanced options for ${OS}" | sed 's,>,>>,g')>$(echo "$title" | sed 's,>,>>,g')" + quoted="$(echo "$GRUB_ACTUAL_DEFAULT" | grub_quote)" + title_correction_code="${title_correction_code}if [ \"x\$default\" = '$quoted' ]; then default='$(echo "$replacement_title" | grub_quote)'; fi;" + fi + if [ x$isdebug = xdebug ]; then + title="$title${GRUB_LINUX_DEBUG_TITLE_POSTFIX}" + fi + echo "menuentry '$(echo "$title" | grub_quote)' ${CLASS} \$menuentry_id_option 'gnulinux-$version-$type-$boot_device_id' {" | sed "s/^/$submenu_indentation/" + else + echo "menuentry '$(echo "$os" | grub_quote)' ${CLASS} \$menuentry_id_option 'gnulinux-simple-$boot_device_id' {" | sed "s/^/$submenu_indentation/" + fi + if [ x$type != xrecovery ] ; then + save_default_entry | grub_add_tab + fi + + # Use ELILO's generic "efifb" when it's known to be available. + # FIXME: We need an interface to select vesafb in case efifb can't be used. + if [ "x$GRUB_GFXPAYLOAD_LINUX" = x ]; then + echo " load_video" | sed "s/^/$submenu_indentation/" + if grep -qx "CONFIG_FB_EFI=y" "${config}" 2> /dev/null \ + && grep -qx "CONFIG_VT_HW_CONSOLE_BINDING=y" "${config}" 2> /dev/null; then + echo " set gfxpayload=keep" | sed "s/^/$submenu_indentation/" + fi + else + if [ "x$GRUB_GFXPAYLOAD_LINUX" != xtext ]; then + echo " load_video" | sed "s/^/$submenu_indentation/" + fi + echo " set gfxpayload=$GRUB_GFXPAYLOAD_LINUX" | sed "s/^/$submenu_indentation/" + fi + + echo " insmod gzio" | sed "s/^/$submenu_indentation/" + + if [ x$dirname = x/ ]; then + if [ -z "${prepare_root_cache}" ]; then + prepare_root_cache="$(prepare_grub_to_access_device ${GRUB_DEVICE} | grub_add_tab)" + fi + printf '%s\n' "${prepare_root_cache}" | sed "s/^/$submenu_indentation/" + else + if [ -z "${prepare_boot_cache}" ]; then + prepare_boot_cache="$(prepare_grub_to_access_device ${GRUB_DEVICE_BOOT} | grub_add_tab)" + fi + printf '%s\n' "${prepare_boot_cache}" | sed "s/^/$submenu_indentation/" + fi + message="$(gettext_printf "Loading Linux %s ..." ${version})" + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$message" | grub_quote)' + linux ${rel_dirname}/${basename} root=${linux_root_device_thisversion} ro ${args} +EOF + if test -n "${initrd}" ; then + # TRANSLATORS: ramdisk isn't identifier. Should be translated. + message="$(gettext_printf "Loading initial ramdisk ...")" + initrd_path= + for i in ${initrd}; do + initrd_path="${initrd_path} ${rel_dirname}/${i}" + done + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$message" | grub_quote)' + initrd $(echo $initrd_path) +EOF + fi + if test -n "${fdt}" ; then + message="$(gettext_printf "Loading fdt ...")" + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$message" | grub_quote)' + devicetree ${rel_dirname}/${fdt} +EOF + fi + sed "s/^/$submenu_indentation/" << EOF +} +EOF +} + +machine=`uname -m` +case "x$machine" in + xi?86 | xx86_64) + list= + for i in /boot/vmlinuz-* /vmlinuz-* /boot/kernel-* ; do + if grub_file_is_not_garbage "$i" ; then list="$list $i" ; fi + done ;; + *) + list= + for i in /boot/vmlinuz-* /boot/vmlinux-* /vmlinuz-* /vmlinux-* /boot/kernel-* ; do + if grub_file_is_not_garbage "$i" ; then list="$list $i" ; fi + done ;; +esac + +case "$machine" in + i?86) GENKERNEL_ARCH="x86" ;; + mips|mips64) GENKERNEL_ARCH="mips" ;; + mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;; + arm*) GENKERNEL_ARCH="arm" ;; + *) GENKERNEL_ARCH="$machine" ;; +esac + +prepare_boot_cache= +prepare_root_cache= +boot_device_id= +title_correction_code= + +# Extra indentation to add to menu entries in a submenu. We're not in a submenu +# yet, so it's empty. In a submenu it will be equal to '\t' (one tab). +submenu_indentation="" + +is_top_level=true +while [ "x$list" != "x" ] ; do + linux=`version_find_latest $list` + gettext_printf "Found linux image: %s\n" "$linux" >&2 + + basename=`basename $linux` + dirname=`dirname $linux` + rel_dirname=`make_system_path_relative_to_its_root $dirname` + version=`echo $basename | sed -e "s,^[^0-9]*-,,g"` + alt_version=`echo $version | sed -e "s,\.old$,,g"` + linux_root_device_thisversion="${LINUX_ROOT_DEVICE}" + + initrd_early= + for i in ${GRUB_EARLY_INITRD_LINUX_STOCK} \ + ${GRUB_EARLY_INITRD_LINUX_CUSTOM}; do + if test -e "${dirname}/${i}" ; then + initrd_early="${initrd_early} ${i}" + fi + done + + initrd_real= + for i in "initrd.img-${version}" "initrd-${version}.img" "initrd-${version}.gz" \ + "initrd-${version}" "initramfs-${version}.img" \ + "initrd.img-${alt_version}" "initrd-${alt_version}.img" \ + "initrd-${alt_version}" "initramfs-${alt_version}.img" \ + "initramfs-genkernel-${version}" \ + "initramfs-genkernel-${alt_version}" \ + "initramfs-genkernel-${GENKERNEL_ARCH}-${version}" \ + "initramfs-genkernel-${GENKERNEL_ARCH}-${alt_version}"; do + if test -e "${dirname}/${i}" ; then + initrd_real="${i}" + break + fi + done + + initrd= + if test -n "${initrd_early}" || test -n "${initrd_real}"; then + initrd="${initrd_early} ${initrd_real}" + + initrd_display= + for i in ${initrd}; do + initrd_display="${initrd_display} ${dirname}/${i}" + done + if [ "x${GRUB_ENABLE_BLSCFG}" != "xtrue" ]; then + gettext_printf "Found initrd image: %s\n" "$(echo $initrd_display)" >&2 + fi + fi + + fdt= + for i in "dtb-${version}" "dtb-${alt_version}"; do + if test -f "${dirname}/${i}/${GRUB_DEFAULT_DTB}" ; then + fdt="${i}/${GRUB_DEFAULT_DTB}" + break + fi + done + + config= + for i in "${dirname}/config-${version}" "${dirname}/config-${alt_version}" "/etc/kernels/kernel-config-${version}" ; do + if test -e "${i}" ; then + config="${i}" + break + fi + done + + initramfs= + if test -n "${config}" ; then + initramfs=`grep CONFIG_INITRAMFS_SOURCE= "${config}" | cut -f2 -d= | tr -d \"` + fi + + if test -z "${initramfs}" && test -z "${initrd_real}" ; then + # "UUID=" and "ZFS=" magic is parsed by initrd or initramfs. Since there's + # no initrd or builtin initramfs, it can't work here. + if [ "x${GRUB_DEVICE_PARTUUID}" = "x" ] \ + || [ "x${GRUB_DISABLE_LINUX_PARTUUID}" = "xtrue" ]; then + + linux_root_device_thisversion=${GRUB_DEVICE} + else + linux_root_device_thisversion=PARTUUID=${GRUB_DEVICE_PARTUUID} + fi + fi + + # The GRUB_DISABLE_SUBMENU option used to be different than others since it was + # mentioned in the documentation that has to be set to 'y' instead of 'true' to + # enable it. This caused a lot of confusion to users that set the option to 'y', + # 'yes' or 'true'. This was fixed but all of these values must be supported now. + if [ "x${GRUB_DISABLE_SUBMENU}" = xyes ] || [ "x${GRUB_DISABLE_SUBMENU}" = xy ]; then + GRUB_DISABLE_SUBMENU="true" + fi + + if [ "x$is_top_level" = xtrue ] && [ "x${GRUB_DISABLE_SUBMENU}" != xtrue ]; then + linux_entry "${OS}" "${version}" simple standard \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" + if [ "x$GRUB_LINUX_MAKE_DEBUG" = "xtrue" ]; then + linux_entry "${OS}" "${version}" simple debug \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT} ${GRUB_CMDLINE_LINUX_DEBUG}" + fi + + submenu_indentation="$grub_tab" + + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${GRUB_DEVICE}")" + fi + # TRANSLATORS: %s is replaced with an OS name + echo "submenu '$(gettext_printf "Advanced options for %s" "${OS}" | grub_quote)' \$menuentry_id_option 'gnulinux-advanced-$boot_device_id' {" + is_top_level=false + fi + + linux_entry "${OS}" "${version}" advanced standard \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" + if [ "x$GRUB_LINUX_MAKE_DEBUG" = "xtrue" ]; then + linux_entry "${OS}" "${version}" advanced debug \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT} ${GRUB_CMDLINE_LINUX_DEBUG}" + fi + + if [ "x${GRUB_DISABLE_RECOVERY}" != "xtrue" ]; then + linux_entry "${OS}" "${version}" recovery standard \ + "single ${GRUB_CMDLINE_LINUX}" + fi + + list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '` +done + +# If at least one kernel was found, then we need to +# add a closing '}' for the submenu command. +if [ x"$is_top_level" != xtrue ]; then + echo '}' +fi + +echo "$title_correction_code" diff --git a/grub.d/10_reset_boot_success b/grub.d/10_reset_boot_success new file mode 100755 index 0000000..8c00460 --- /dev/null +++ b/grub.d/10_reset_boot_success @@ -0,0 +1,25 @@ +#!/usr/bin/sh -e +# Reset Boot Success +# +# The 08_fallback_counting and 12_menu_auto_hide snippets rely on this one +# and need to be kept in sync. +# +# The boot_success var needs to be set to 1 from userspace to mark a boot successful. +cat << EOF +# Hiding the menu is ok if last boot was ok or if this is a first boot attempt to boot the entry +if [ "\${boot_success}" = "1" -o "\${boot_indeterminate}" = "1" ]; then + set menu_hide_ok=1 +else + set menu_hide_ok=0 +fi +# Reset boot_indeterminate after a successful boot +if [ "\${boot_success}" = "1" ] ; then + set boot_indeterminate=0 +# Avoid boot_indeterminate causing the menu to be hidden more than once +elif [ "\${boot_indeterminate}" = "1" ]; then + set boot_indeterminate=2 +fi +# Reset boot_success for current boot +set boot_success=0 +save_env boot_success boot_indeterminate +EOF diff --git a/grub.d/12_menu_auto_hide b/grub.d/12_menu_auto_hide new file mode 100755 index 0000000..6ce00c6 --- /dev/null +++ b/grub.d/12_menu_auto_hide @@ -0,0 +1,35 @@ +#!/usr/bin/sh +# Menu Auto Hide +# +# This snippet depends on 10_reset_boot_success and needs to be kept in sync. +# +# Disable / skip generating menu-auto-hide config parts on serial terminals +for x in ${GRUB_TERMINAL_INPUT} ${GRUB_TERMINAL_OUTPUT}; do + case "$x" in + serial*) + exit 0 + ;; + esac +done + +cat << EOF +if [ x\$feature_timeout_style = xy ] ; then + if [ "\${menu_show_once}" ]; then + unset menu_show_once + save_env menu_show_once + set timeout_style=menu + set timeout=60 + elif [ "\${menu_auto_hide}" -a "\${menu_hide_ok}" = "1" ]; then + set orig_timeout_style=\${timeout_style} + set orig_timeout=\${timeout} + if [ "\${fastboot}" = "1" ]; then + # timeout_style=menu + timeout=0 avoids the countdown code keypress check + set timeout_style=menu + set timeout=0 + else + set timeout_style=hidden + set timeout=1 + fi + fi +fi +EOF diff --git a/grub.d/14_menu_show_once b/grub.d/14_menu_show_once new file mode 100755 index 0000000..cfbd654 --- /dev/null +++ b/grub.d/14_menu_show_once @@ -0,0 +1,13 @@ +#!/usr/bin/sh +# Force the menu to be shown once, with a timeout of ${menu_show_once_timeout} +# if requested by ${menu_show_once_timeout} being set in the env. +cat << EOF +if [ x\$feature_timeout_style = xy ]; then + if [ "\${menu_show_once_timeout}" ]; then + set timeout_style=menu + set timeout="\${menu_show_once_timeout}" + unset menu_show_once_timeout + save_env menu_show_once_timeout + fi +fi +EOF diff --git a/grub.d/20_linux_xen b/grub.d/20_linux_xen new file mode 100755 index 0000000..48185f3 --- /dev/null +++ b/grub.d/20_linux_xen @@ -0,0 +1,372 @@ +#!/usr/bin/sh +set -e + +# grub-mkconfig helper script. +# Copyright (C) 2006,2007,2008,2009,2010 Free Software Foundation, Inc. +# +# GRUB is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# GRUB is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GRUB. If not, see . + +prefix="/usr" +exec_prefix="/usr" +datarootdir="/usr/share" + +. "$pkgdatadir/grub-mkconfig_lib" + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR="${datarootdir}/locale" + +CLASS="--class gnu-linux --class gnu --class os --class xen" + +if [ "x${GRUB_DISTRIBUTOR}" = "x" ] ; then + OS="$(sed 's, release .*$,,g' /etc/system-release)" +else + OS="${GRUB_DISTRIBUTOR}" + CLASS="--class $(echo ${GRUB_DISTRIBUTOR} | tr 'A-Z' 'a-z' | cut -d' ' -f1|LC_ALL=C sed 's,[^[:alnum:]_],_,g') ${CLASS}" +fi + +# loop-AES arranges things so that /dev/loop/X can be our root device, but +# the initrds that Linux uses don't like that. +case ${GRUB_DEVICE} in + /dev/loop/*|/dev/loop[0-9]) + GRUB_DEVICE=`losetup ${GRUB_DEVICE} | sed -e "s/^[^(]*(\([^)]\+\)).*/\1/"` + ;; +esac + +# Default to disabling partition uuid support to maintian compatibility with +# older kernels. +GRUB_DISABLE_LINUX_PARTUUID=${GRUB_DISABLE_LINUX_PARTUUID-true} + +# btrfs may reside on multiple devices. We cannot pass them as value of root= parameter +# and mounting btrfs requires user space scanning, so force UUID in this case. +if ( [ "x${GRUB_DEVICE_UUID}" = "x" ] && [ "x${GRUB_DEVICE_PARTUUID}" = "x" ] ) \ + || ( [ "x${GRUB_DISABLE_LINUX_UUID}" = "xtrue" ] \ + && [ "x${GRUB_DISABLE_LINUX_PARTUUID}" = "xtrue" ] ) \ + || ( ! test -e "/dev/disk/by-uuid/${GRUB_DEVICE_UUID}" \ + && ! test -e "/dev/disk/by-partuuid/${GRUB_DEVICE_PARTUUID}" ) \ + || ( test -e "${GRUB_DEVICE}" && uses_abstraction "${GRUB_DEVICE}" lvm ); then + LINUX_ROOT_DEVICE=${GRUB_DEVICE} +elif [ "x${GRUB_DEVICE_UUID}" = "x" ] \ + || [ "x${GRUB_DISABLE_LINUX_UUID}" = "xtrue" ]; then + LINUX_ROOT_DEVICE=PARTUUID=${GRUB_DEVICE_PARTUUID} +else + LINUX_ROOT_DEVICE=UUID=${GRUB_DEVICE_UUID} +fi + +# Allow overriding GRUB_CMDLINE_LINUX and GRUB_CMDLINE_LINUX_DEFAULT. +if [ "${GRUB_CMDLINE_LINUX_XEN_REPLACE}" ]; then + GRUB_CMDLINE_LINUX="${GRUB_CMDLINE_LINUX_XEN_REPLACE}" +fi +if [ "${GRUB_CMDLINE_LINUX_XEN_REPLACE_DEFAULT}" ]; then + GRUB_CMDLINE_LINUX_DEFAULT="${GRUB_CMDLINE_LINUX_XEN_REPLACE_DEFAULT}" +fi + +case x"$GRUB_FS" in + xbtrfs) + if [ "x${SUSE_BTRFS_SNAPSHOT_BOOTING}" = "xtrue" ]; then + GRUB_CMDLINE_LINUX="${GRUB_CMDLINE_LINUX} \${extra_cmdline}" + else + rootsubvol="`make_system_path_relative_to_its_root /`" + rootsubvol="${rootsubvol#/}" + if [ "x${rootsubvol}" != x ]; then + GRUB_CMDLINE_LINUX="rootflags=subvol=${rootsubvol} ${GRUB_CMDLINE_LINUX}" + fi + fi;; + xzfs) + rpool=`${grub_probe} --device ${GRUB_DEVICE} --target=fs_label 2>/dev/null || true` + bootfs="`make_system_path_relative_to_its_root / | sed -e "s,@$,,"`" + LINUX_ROOT_DEVICE="ZFS=${rpool}${bootfs%/}" + ;; +esac + +title_correction_code= + +linux_entry () +{ + linux_entry_xsm "$@" false + linux_entry_xsm "$@" true +} +linux_entry_xsm () +{ + os="$1" + version="$2" + xen_version="$3" + type="$4" + args="$5" + xen_args="$6" + xsm="$7" + # If user wants to enable XSM support, make sure there's + # corresponding policy file. + if ${xsm} ; then + xenpolicy="xenpolicy-$xen_version" + if test ! -e "${xen_dirname}/${xenpolicy}" ; then + return + fi + xen_args="$xen_args flask=enforcing" + xen_version="$(gettext_printf "%s (XSM enabled)" "$xen_version")" + # xen_version is used for messages only; actual file is xen_basename + fi + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${GRUB_DEVICE}")" + fi + if [ x$type != xsimple ] ; then + if [ x$type = xrecovery ] ; then + title="$(gettext_printf "%s, with Xen %s and Linux %s (recovery mode)" "${os}" "${xen_version}" "${version}")" + else + title="$(gettext_printf "%s, with Xen %s and Linux %s" "${os}" "${xen_version}" "${version}")" + fi + replacement_title="$(echo "Advanced options for ${OS}" | sed 's,>,>>,g')>$(echo "$title" | sed 's,>,>>,g')" + if [ x"Xen ${xen_version}>$title" = x"$GRUB_ACTUAL_DEFAULT" ]; then + quoted="$(echo "$GRUB_ACTUAL_DEFAULT" | grub_quote)" + title_correction_code="${title_correction_code}if [ \"x\$default\" = '$quoted' ]; then default='$(echo "$replacement_title" | grub_quote)'; fi;" + grub_warn "$(gettext_printf "Please don't use old title \`%s' for GRUB_DEFAULT, use \`%s' (for versions before 2.00) or \`%s' (for 2.00 or later)" "$GRUB_ACTUAL_DEFAULT" "$replacement_title" "gnulinux-advanced-$boot_device_id>gnulinux-$version-$type-$boot_device_id")" + fi + echo "menuentry '$(echo "$title" | grub_quote)' ${CLASS} \$menuentry_id_option 'xen-gnulinux-$version-$type-$boot_device_id' {" | sed "s/^/$submenu_indentation/" + else + title="$(gettext_printf "%s, with Xen hypervisor" "${os}")" + echo "menuentry '$(echo "$title" | grub_quote)' ${CLASS} \$menuentry_id_option 'xen-gnulinux-simple-$boot_device_id' {" | sed "s/^/$submenu_indentation/" + fi + if [ x$type != xrecovery ] ; then + save_default_entry | grub_add_tab | sed "s/^/$submenu_indentation/" + fi + + if [ -z "${prepare_boot_cache}" ]; then + prepare_boot_cache="$(prepare_grub_to_access_device ${GRUB_DEVICE_BOOT} | grub_add_tab)" + fi + printf '%s\n' "${prepare_boot_cache}" | sed "s/^/$submenu_indentation/" + xmessage="$(gettext_printf "Loading Xen %s ..." ${xen_version})" + lmessage="$(gettext_printf "Loading Linux %s ..." ${version})" + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$xmessage" | grub_quote)' + if [ "\$grub_platform" = "pc" -o "\$grub_platform" = "" ]; then + xen_rm_opts= + else + xen_rm_opts="no-real-mode edd=off" + fi + insmod ${xen_module} + ${xen_loader} ${rel_xen_dirname}/${xen_basename} placeholder ${xen_args} \${xen_rm_opts} + echo '$(echo "$lmessage" | grub_quote)' + ${module_loader} ${rel_dirname}/${basename} placeholder root=${linux_root_device_thisversion} ro ${args} +EOF + if test -n "${initrd}" ; then + # TRANSLATORS: ramdisk isn't identifier. Should be translated. + message="$(gettext_printf "Loading initial ramdisk ...")" + initrd_path= + for i in ${initrd}; do + initrd_path="${initrd_path} ${rel_dirname}/${i}" + done + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$message" | grub_quote)' + insmod ${xen_module} + ${module_loader} --nounzip $(echo $initrd_path) +EOF + fi + if test -n "${xenpolicy}" ; then + message="$(gettext_printf "Loading XSM policy ...")" + sed "s/^/$submenu_indentation/" << EOF + echo '$(echo "$message" | grub_quote)' + ${module_loader} ${rel_dirname}/${xenpolicy} +EOF + fi + sed "s/^/$submenu_indentation/" << EOF +} +EOF +} + +linux_list= +for i in /boot/vmlinu[xz]-* /vmlinu[xz]-* /boot/kernel-*; do + if grub_file_is_not_garbage "$i"; then + basename=$(basename $i) + version=$(echo $basename | sed -e "s,^[^0-9]*-,,g") + dirname=$(dirname $i) + config= + for j in "${dirname}/config-${version}" "${dirname}/config-${alt_version}" "/etc/kernels/kernel-config-${version}" ; do + if test -e "${j}" ; then + config="${j}" + break + fi + done + if (grep -qx "CONFIG_XEN_DOM0=y" "${config}" 2> /dev/null || grep -qx "CONFIG_XEN_PRIVILEGED_GUEST=y" "${config}" 2> /dev/null); then linux_list="$linux_list $i" ; fi + fi +done +if [ "x${linux_list}" = "x" ] ; then + exit 0 +fi + +file_is_not_xen_garbage () { + case "$1" in + */xen-syms-*) + return 1;; + */xenpolicy-*) + return 1;; + */*.config) + return 1;; + *) + return 0;; + esac +} + +xen_list= +for i in /boot/xen*; do + if grub_file_is_not_garbage "$i" && file_is_not_xen_garbage "$i" ; then xen_list="$xen_list $i" ; fi +done +prepare_boot_cache= +boot_device_id= + +title_correction_code= + +machine=`uname -m` + +case "$machine" in + i?86) GENKERNEL_ARCH="x86" ;; + mips|mips64) GENKERNEL_ARCH="mips" ;; + mipsel|mips64el) GENKERNEL_ARCH="mipsel" ;; + arm*) GENKERNEL_ARCH="arm" ;; + *) GENKERNEL_ARCH="$machine" ;; +esac + +# Extra indentation to add to menu entries in a submenu. We're not in a submenu +# yet, so it's empty. In a submenu it will be equal to '\t' (one tab). +submenu_indentation="" + +is_top_level=true + +while [ "x${xen_list}" != "x" ] ; do + list="${linux_list}" + current_xen=`version_find_latest $xen_list` + xen_basename=`basename ${current_xen}` + xen_dirname=`dirname ${current_xen}` + rel_xen_dirname=`make_system_path_relative_to_its_root $xen_dirname` + xen_version=`echo $xen_basename | sed -e "s,.gz$,,g;s,^xen-,,g"` + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${GRUB_DEVICE}")" + fi + if [ "x$is_top_level" != xtrue ]; then + echo " submenu '$(gettext_printf "Xen hypervisor, version %s" "${xen_version}" | grub_quote)' \$menuentry_id_option 'xen-hypervisor-$xen_version-$boot_device_id' {" + fi + if ($grub_file --is-arm64-efi $current_xen); then + xen_module="xen_boot" + xen_loader="xen_hypervisor" + module_loader="xen_module" + else + if ($grub_file --is-x86-multiboot2 $current_xen); then + xen_module="multiboot2" + xen_loader="multiboot2" + module_loader="module2" + else + xen_module="multiboot" + xen_loader="multiboot" + module_loader="module" + fi + fi + + initrd_early= + for i in ${GRUB_EARLY_INITRD_LINUX_STOCK} \ + ${GRUB_EARLY_INITRD_LINUX_CUSTOM}; do + if test -e "${xen_dirname}/${i}" ; then + initrd_early="${initrd_early} ${i}" + fi + done + + while [ "x$list" != "x" ] ; do + linux=`version_find_latest $list` + gettext_printf "Found linux image: %s\n" "$linux" >&2 + basename=`basename $linux` + dirname=`dirname $linux` + rel_dirname=`make_system_path_relative_to_its_root $dirname` + version=`echo $basename | sed -e "s,^[^0-9]*-,,g"` + alt_version=`echo $version | sed -e "s,\.old$,,g"` + linux_root_device_thisversion="${LINUX_ROOT_DEVICE}" + + initrd_real= + for i in "initrd.img-${version}" "initrd-${version}.img" "initrd-${version}.gz" \ + "initrd-${version}" "initramfs-${version}.img" \ + "initrd.img-${alt_version}" "initrd-${alt_version}.img" \ + "initrd-${alt_version}" "initramfs-${alt_version}.img" \ + "initramfs-genkernel-${version}" \ + "initramfs-genkernel-${alt_version}" \ + "initramfs-genkernel-${GENKERNEL_ARCH}-${version}" \ + "initramfs-genkernel-${GENKERNEL_ARCH}-${alt_version}" ; do + if test -e "${dirname}/${i}" ; then + initrd_real="$i" + break + fi + done + + initrd= + if test -n "${initrd_early}" || test -n "${initrd_real}"; then + initrd="${initrd_early} ${initrd_real}" + + initrd_display= + for i in ${initrd}; do + initrd_display="${initrd_display} ${dirname}/${i}" + done + gettext_printf "Found initrd image: %s\n" "$(echo $initrd_display)" >&2 + fi + + if test -z "${initrd_real}"; then + # "UUID=" magic is parsed by initrds. Since there's no initrd, it can't work here. + if [ "x${GRUB_DEVICE_PARTUUID}" = "x" ] \ + || [ "x${GRUB_DISABLE_LINUX_PARTUUID}" = "xtrue" ]; then + + linux_root_device_thisversion=${GRUB_DEVICE} + else + linux_root_device_thisversion=PARTUUID=${GRUB_DEVICE_PARTUUID} + fi + fi + + # The GRUB_DISABLE_SUBMENU option used to be different than others since it was + # mentioned in the documentation that has to be set to 'y' instead of 'true' to + # enable it. This caused a lot of confusion to users that set the option to 'y', + # 'yes' or 'true'. This was fixed but all of these values must be supported now. + if [ "x${GRUB_DISABLE_SUBMENU}" = xyes ] || [ "x${GRUB_DISABLE_SUBMENU}" = xy ]; then + GRUB_DISABLE_SUBMENU="true" + fi + + if [ "x$is_top_level" = xtrue ] && [ "x${GRUB_DISABLE_SUBMENU}" != xtrue ]; then + linux_entry "${OS}" "${version}" "${xen_version}" simple \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" "${GRUB_CMDLINE_XEN} ${GRUB_CMDLINE_XEN_DEFAULT}" + + submenu_indentation="$grub_tab$grub_tab" + + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${GRUB_DEVICE}")" + fi + # TRANSLATORS: %s is replaced with an OS name + echo "submenu '$(gettext_printf "Advanced options for %s (with Xen hypervisor)" "${OS}" | grub_quote)' \$menuentry_id_option 'gnulinux-advanced-$boot_device_id' {" + echo " submenu '$(gettext_printf "Xen hypervisor, version %s" "${xen_version}" | grub_quote)' \$menuentry_id_option 'xen-hypervisor-$xen_version-$boot_device_id' {" + is_top_level=false + fi + + linux_entry "${OS}" "${version}" "${xen_version}" advanced \ + "${GRUB_CMDLINE_LINUX} ${GRUB_CMDLINE_LINUX_DEFAULT}" "${GRUB_CMDLINE_XEN} ${GRUB_CMDLINE_XEN_DEFAULT}" + if [ "x${GRUB_DISABLE_RECOVERY}" != "xtrue" ]; then + linux_entry "${OS}" "${version}" "${xen_version}" recovery \ + "single ${GRUB_CMDLINE_LINUX}" "${GRUB_CMDLINE_XEN}" + fi + + list=`echo $list | tr ' ' '\n' | fgrep -vx "$linux" | tr '\n' ' '` + done + if [ x"$is_top_level" != xtrue ]; then + echo ' }' + fi + xen_list=`echo $xen_list | tr ' ' '\n' | fgrep -vx "$current_xen" | tr '\n' ' '` +done + +# If at least one kernel was found, then we need to +# add a closing '}' for the submenu command. +if [ x"$is_top_level" != xtrue ]; then + echo '}' +fi + +echo "$title_correction_code" diff --git a/grub.d/20_ppc_terminfo b/grub.d/20_ppc_terminfo new file mode 100755 index 0000000..a4a902e --- /dev/null +++ b/grub.d/20_ppc_terminfo @@ -0,0 +1,114 @@ +#!/usr/bin/sh +set -e + +# grub-mkconfig helper script. +# Copyright (C) 2006,2007,2008,2009,2010 Free Software Foundation, Inc. +# +# GRUB is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# GRUB is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GRUB. If not, see . + +prefix=/usr +exec_prefix=/usr +bindir=/usr/bin +libdir=/usr/lib +. "/usr/share/grub/grub-mkconfig_lib" + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR=/usr/share/locale + +X=80 +Y=24 +TERMINAL=ofconsole + +argument () { + opt=$1 + shift + + if test $# -eq 0; then + echo "$0: option requires an argument -- '$opt'" 1>&2 + exit 1 + fi + echo $1 +} + +check_terminfo () { + + while test $# -gt 0 + do + option=$1 + shift + + case "$option" in + terminfo | TERMINFO) + ;; + + -g) + NEWXY=`argument $option "$@"` + NEWX=`echo $NEWXY | cut -d x -f 1` + NEWY=`echo $NEWXY | cut -d x -f 2` + + if [ ${NEWX} -ge 80 ] ; then + X=${NEWX} + else + echo "Warning: ${NEWX} is less than the minimum size of 80" + fi + + if [ ${NEWY} -ge 24 ] ; then + Y=${NEWY} + else + echo "Warning: ${NEWY} is less than the minimum size of 24" + fi + + shift + ;; + + *) +# # accept console or ofconsole +# if [ "$option" != "console" -a "$option" != "ofconsole" ] ; then +# echo "Error: GRUB_TERMINFO unknown console: $option" +# exit 1 +# fi +# # perfer console +# TERMINAL=console + # accept ofconsole + if [ "$option" != "ofconsole" ] ; then + echo "Error: GRUB_TERMINFO unknown console: $option" + exit 1 + fi + # perfer console + TERMINAL=ofconsole + ;; + esac + + done + +} + +if ! uname -m | grep -q ppc ; then + exit 0 +fi + +if [ "x${GRUB_TERMINFO}" != "x" ] ; then + F1=`echo ${GRUB_TERMINFO} | cut -d " " -f 1` + + if [ "${F1}" != "terminfo" ] ; then + echo "Error: GRUB_TERMINFO is set to \"${GRUB_TERMINFO}\" The first word should be terminfo." + exit 1 + fi + + check_terminfo ${GRUB_TERMINFO} +fi + +cat << EOF + terminfo -g ${X}x${Y} ${TERMINAL} +EOF diff --git a/grub.d/30_os-prober b/grub.d/30_os-prober new file mode 100755 index 0000000..d074a58 --- /dev/null +++ b/grub.d/30_os-prober @@ -0,0 +1,319 @@ +#!/usr/bin/sh +set -e + +# grub-mkconfig helper script. +# Copyright (C) 2006,2007,2008,2009 Free Software Foundation, Inc. +# +# GRUB is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# GRUB is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GRUB. If not, see . + +prefix="/usr" +exec_prefix="/usr" +datarootdir="/usr/share" + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR="${datarootdir}/locale" + +. "$pkgdatadir/grub-mkconfig_lib" + +if [ "x${GRUB_DISABLE_OS_PROBER}" = "xtrue" ]; then + exit 0 +fi + +if ! command -v os-prober > /dev/null || ! command -v linux-boot-prober > /dev/null ; then + # missing os-prober and/or linux-boot-prober + exit 0 +fi + +OSPROBED="`os-prober | tr ' ' '^' | paste -s -d ' '`" +if [ -z "${OSPROBED}" ] ; then + # empty os-prober output, nothing doing + exit 0 +fi + +osx_entry() { + found_other_os=1 + # TRANSLATORS: it refers on the OS residing on device %s + onstr="$(gettext_printf "(on %s)" "${DEVICE}")" + hints="" + for hint in `"${grub_probe}" --device ${device} --target=efi_hints 2> /dev/null` ; do + hints="${hints} --hint=${hint}" + done + cat << EOF +menuentry '$(echo "${LONGNAME} $onstr" | grub_quote)' --class osx --class darwin --class os \$menuentry_id_option 'osprober-xnu-$2-$(grub_get_device_id "${DEVICE}")' { +EOF + save_default_entry | grub_add_tab + prepare_grub_to_access_device ${DEVICE} | grub_add_tab + cat << EOF + set gfxpayload=keep + load_video + insmod part_gpt + insmod hfsplus + search --no-floppy --fs-uuid --set=root ${hints} $(grub_get_device_id "${DEVICE}") + chainloader (\$root)/System/Library/CoreServices/boot.efi + boot +} +EOF +} + +used_osprober_linux_ids= + +for OS in ${OSPROBED} ; do + DEVICE="`echo ${OS} | cut -d ':' -f 1`" + LONGNAME="`echo ${OS} | cut -d ':' -f 2 | tr '^' ' '`" + LABEL="`echo ${OS} | cut -d ':' -f 3 | tr '^' ' '`" + BOOT="`echo ${OS} | cut -d ':' -f 4`" + if UUID="`${grub_probe} --target=fs_uuid --device ${DEVICE%@*}`"; then + EXPUUID="$UUID" + + if [ x"${DEVICE#*@}" != x ] ; then + EXPUUID="${EXPUUID}@${DEVICE#*@}" + fi + + if [ "x${GRUB_OS_PROBER_SKIP_LIST}" != "x" ] && [ "x`echo ${GRUB_OS_PROBER_SKIP_LIST} | grep -i -e '\b'${EXPUUID}'\b'`" != "x" ] ; then + echo "Skipped ${LONGNAME} on ${DEVICE} by user request." >&2 + continue + fi + fi + + BTRFS="`echo ${OS} | cut -d ':' -f 5`" + if [ "x$BTRFS" = "xbtrfs" ]; then + BTRFSuuid="`echo ${OS} | cut -d ':' -f 6`" + BTRFSsubvol="`echo ${OS} | cut -d ':' -f 7`" + fi + + if [ -z "${LONGNAME}" ] ; then + LONGNAME="${LABEL}" + fi + + # os-prober returns text string followed by optional counter + CLASS="--class $(echo "${LABEL}" | LC_ALL=C sed 's,[[:digit:]]*$,,' | cut -d' ' -f1 | tr 'A-Z' 'a-z' | LC_ALL=C sed 's,[^[:alnum:]_],_,g')" + + gettext_printf "Found %s on %s\n" "${LONGNAME}" "${DEVICE}" >&2 + + case ${BOOT} in + chain) + found_other_os=1 + + onstr="$(gettext_printf "(on %s)" "${DEVICE}")" + cat << EOF +menuentry '$(echo "${LONGNAME} $onstr" | grub_quote)' $CLASS --class os \$menuentry_id_option 'osprober-chain-$(grub_get_device_id "${DEVICE}")' { +EOF + save_default_entry | grub_add_tab + prepare_grub_to_access_device ${DEVICE} | grub_add_tab + + if [ x"`${grub_probe} --device ${DEVICE} --target=partmap`" = xmsdos ]; then + cat << EOF + parttool \${root} hidden- +EOF + fi + + case ${LONGNAME} in + Windows\ Vista*|Windows\ 7*|Windows\ Server\ 2008*) + ;; + *) + cat << EOF + drivemap -s (hd0) \${root} +EOF + ;; + esac + + cat < /dev/null; do + counter=$((counter+1)); + done + if [ -z "$boot_device_id" ]; then + boot_device_id="$(grub_get_device_id "${DEVICE}")" + fi + used_osprober_linux_ids="$used_osprober_linux_ids 'osprober-gnulinux-$LKERNEL-${recovery_params}-$counter-$boot_device_id'" + + if [ -z "${prepare_boot_cache}" ]; then + prepare_boot_cache="$(prepare_grub_to_access_device ${LBOOT} | grub_add_tab)" + fi + + # The GRUB_DISABLE_SUBMENU option used to be different than others since it was + # mentioned in the documentation that has to be set to 'y' instead of 'true' to + # enable it. This caused a lot of confusion to users that set the option to 'y', + # 'yes' or 'true'. This was fixed but all of these values must be supported now. + if [ "x${GRUB_DISABLE_SUBMENU}" = xyes ] || [ "x${GRUB_DISABLE_SUBMENU}" = xy ]; then + GRUB_DISABLE_SUBMENU="true" + fi + + if [ "x$is_top_level" = xtrue ] && [ "x${GRUB_DISABLE_SUBMENU}" != xtrue ]; then + cat << EOF +menuentry '$(echo "$OS $onstr" | grub_quote)' $CLASS --class gnu-linux --class gnu --class os \$menuentry_id_option 'osprober-gnulinux-simple-$boot_device_id' { +EOF + save_default_entry | grub_add_tab + printf '%s\n' "${prepare_boot_cache}" + cat << EOF + linux ${LKERNEL} ${LPARAMS} +EOF + if [ -n "${LINITRD}" ] ; then + cat << EOF + initrd ${LINITRD} +EOF + fi + cat << EOF +} +EOF + echo "submenu '$(gettext_printf "Advanced options for %s" "${OS} $onstr" | grub_quote)' \$menuentry_id_option 'osprober-gnulinux-advanced-$boot_device_id' {" + is_top_level=false + fi + title="${LLABEL} $onstr" + cat << EOF + menuentry '$(echo "$title" | grub_quote)' --class gnu-linux --class gnu --class os \$menuentry_id_option 'osprober-gnulinux-$LKERNEL-${recovery_params}-$boot_device_id' { +EOF + save_default_entry | sed -e "s/^/$grub_tab$grub_tab/" + printf '%s\n' "${prepare_boot_cache}" | grub_add_tab + cat << EOF + linux ${LKERNEL} ${LPARAMS} +EOF + if [ -n "${LINITRD}" ] ; then + cat << EOF + initrd ${LINITRD} +EOF + fi + cat << EOF + } +EOF + if [ x"$title" = x"$GRUB_ACTUAL_DEFAULT" ] || [ x"Previous Linux versions>$title" = x"$GRUB_ACTUAL_DEFAULT" ]; then + replacement_title="$(echo "Advanced options for ${OS} $onstr" | sed 's,>,>>,g')>$(echo "$title" | sed 's,>,>>,g')" + quoted="$(echo "$GRUB_ACTUAL_DEFAULT" | grub_quote)" + title_correction_code="${title_correction_code}if [ \"x\$default\" = '$quoted' ]; then default='$(echo "$replacement_title" | grub_quote)'; fi;" + grub_warn "$(gettext_printf "Please don't use old title \`%s' for GRUB_DEFAULT, use \`%s' (for versions before 2.00) or \`%s' (for 2.00 or later)" "$GRUB_ACTUAL_DEFAULT" "$replacement_title" "gnulinux-advanced-$boot_device_id>gnulinux-$version-$type-$boot_device_id")" + fi + done + if [ x"$is_top_level" != xtrue ]; then + echo '}' + fi + echo "$title_correction_code" + ;; + macosx) + for subdevice in ${DEVICE%[[:digit:]]*}* ; do + parttype="`"${grub_probe}" --device ${device} --target=gpt_parttype "${subdevice}" 2> /dev/null`" + if [[ "$parttype" = "426f6f74-0000-11aa-aa11-00306543ecac" ]]; then + DEVICE="${subdevice}" osx_entry + fi + done + ;; + hurd) + found_other_os=1 + onstr="$(gettext_printf "(on %s)" "${DEVICE}")" + cat << EOF +menuentry '$(echo "${LONGNAME} $onstr" | grub_quote)' --class hurd --class gnu --class os \$menuentry_id_option 'osprober-gnuhurd-/boot/gnumach.gz-false-$(grub_get_device_id "${DEVICE}")' { +EOF + save_default_entry | grub_add_tab + prepare_grub_to_access_device ${DEVICE} | grub_add_tab + grub_device="`${grub_probe} --device ${DEVICE} --target=drive`" + mach_device="`echo "${grub_device}" | sed -e 's/(\(hd.*\),msdos\(.*\))/\1s\2/'`" + grub_fs="`${grub_probe} --device ${DEVICE} --target=fs`" + case "${grub_fs}" in + *fs) hurd_fs="${grub_fs}" ;; + *) hurd_fs="${grub_fs}fs" ;; + esac + cat << EOF + multiboot /boot/gnumach.gz root=device:${mach_device} + module /hurd/${hurd_fs}.static ${hurd_fs} --readonly \\ + --multiboot-command-line='\${kernel-command-line}' \\ + --host-priv-port='\${host-port}' \\ + --device-master-port='\${device-port}' \\ + --exec-server-task='\${exec-task}' -T typed '\${root}' \\ + '\$(task-create)' '\$(task-resume)' + module /lib/ld.so.1 exec /hurd/exec '\$(exec-task=task-create)' +} +EOF + ;; + minix) + found_other_os=1 + cat << EOF +menuentry "${LONGNAME} (on ${DEVICE}, Multiboot)" { +EOF + save_default_entry | sed -e "s/^/\t/" + prepare_grub_to_access_device ${DEVICE} | sed -e "s/^/\t/" + cat << EOF + multiboot /boot/image_latest +} +EOF + ;; + *) + # TRANSLATORS: %s is replaced by OS name. + gettext_printf "%s is not yet supported by grub-mkconfig.\n" " ${LONGNAME}" >&2 + ;; + esac +done + +# We override the results of the menu_auto_hide code here, this is a bit ugly, +# but grub-mkconfig writes out the file linearly, so this is the only way +if [ "${found_other_os}" = "1" ]; then + cat << EOF +# Other OS found, undo autohiding of menu unless menu_auto_hide=2 +if [ "\${orig_timeout_style}" -a "\${menu_auto_hide}" != "2" ]; then + set timeout_style=\${orig_timeout_style} + set timeout=\${orig_timeout} +fi +EOF +fi diff --git a/grub.d/30_uefi-firmware b/grub.d/30_uefi-firmware new file mode 100755 index 0000000..0e60e3d --- /dev/null +++ b/grub.d/30_uefi-firmware @@ -0,0 +1,39 @@ +#!/usr/bin/sh +set -e + +# grub-mkconfig helper script. +# Copyright (C) 2020 Free Software Foundation, Inc. +# +# GRUB is free software: you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# GRUB is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GRUB. If not, see . + +prefix="/usr" +exec_prefix="/usr" +datarootdir="/usr/share" + +export TEXTDOMAIN=grub +export TEXTDOMAINDIR="${datarootdir}/locale" + +. "$pkgdatadir/grub-mkconfig_lib" + +LABEL="UEFI Firmware Settings" + +gettext_printf "Adding boot menu entry for UEFI Firmware Settings ...\n" >&2 + +cat << EOF +if [ "\$grub_platform" = "efi" ]; then + menuentry '$LABEL' \$menuentry_id_option 'uefi-firmware' { + fwsetup + } +fi +EOF diff --git a/grub.d/40_custom b/grub.d/40_custom new file mode 100755 index 0000000..f1d2e50 --- /dev/null +++ b/grub.d/40_custom @@ -0,0 +1,5 @@ +#!/usr/bin/sh +exec tail -n +3 $0 +# This file provides an easy way to add custom menu entries. Simply type the +# menu entries you want to add after this comment. Be careful not to change +# the 'exec tail' line above. diff --git a/grub.d/41_custom b/grub.d/41_custom new file mode 100755 index 0000000..9b3fc15 --- /dev/null +++ b/grub.d/41_custom @@ -0,0 +1,9 @@ +#!/usr/bin/sh +cat < diff --git a/gssproxy/24-nfs-server.conf b/gssproxy/24-nfs-server.conf new file mode 100644 index 0000000..5011e92 --- /dev/null +++ b/gssproxy/24-nfs-server.conf @@ -0,0 +1,7 @@ +[service/nfs-server] + mechs = krb5 + socket = /run/gssproxy.sock + cred_store = keytab:/etc/krb5.keytab + trusted = yes + kernel_nfsd = yes + euid = 0 diff --git a/gssproxy/99-nfs-client.conf b/gssproxy/99-nfs-client.conf new file mode 100644 index 0000000..b4577ba --- /dev/null +++ b/gssproxy/99-nfs-client.conf @@ -0,0 +1,10 @@ +[service/nfs-client] + mechs = krb5 + cred_store = keytab:/etc/krb5.keytab + cred_store = ccache:FILE:/var/lib/gssproxy/clients/krb5cc_%U + cred_store = client_keytab:/var/lib/gssproxy/clients/%U.keytab + cred_usage = initiate + allow_any_uid = yes + trusted = yes + euid = 0 + min_lifetime = 60 diff --git a/gssproxy/gssproxy.conf b/gssproxy/gssproxy.conf new file mode 100644 index 0000000..7f1eddd --- /dev/null +++ b/gssproxy/gssproxy.conf @@ -0,0 +1 @@ +[gssproxy] diff --git a/host.conf b/host.conf new file mode 100644 index 0000000..d1a59f7 --- /dev/null +++ b/host.conf @@ -0,0 +1 @@ +multi on diff --git a/hostname b/hostname new file mode 100644 index 0000000..d2e3394 --- /dev/null +++ b/hostname @@ -0,0 +1 @@ +rocky9 diff --git a/hosts b/hosts new file mode 100644 index 0000000..849c10d --- /dev/null +++ b/hosts @@ -0,0 +1,2 @@ +127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 +::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 diff --git a/idmapd.conf b/idmapd.conf new file mode 100644 index 0000000..2a2f79a --- /dev/null +++ b/idmapd.conf @@ -0,0 +1,169 @@ +[General] +#Verbosity = 0 +# The following should be set to the local NFSv4 domain name +# The default is the host's DNS domain name. +#Domain = local.domain.edu + +# In multi-domain environments, some NFS servers will append the identity +# management domain to the owner and owner_group in lieu of a true NFSv4 +# domain. This option can facilitate lookups in such environments. If +# set to a value other than "none", the nsswitch plugin will first pass +# the name to the password/group lookup function without stripping the +# domain off. If that mapping fails then the plugin will try again using +# the old method (comparing the domain in the string to the Domain value, +# stripping it if it matches, and passing the resulting short name to the +# lookup function). Valid values are "user", "group", "both", and +# "none". The default is "none". +#No-Strip = none + +# Winbind has a quirk whereby doing a group lookup in UPN format +# (e.g. staff@americas.example.com) will cause the group to be +# displayed prefixed with the full domain in uppercase +# (e.g. AMERICAS.EXAMPLE.COM\staff) instead of in the familiar netbios +# name format (e.g. AMERICAS\staff). Setting this option to true +# causes the name to be reformatted before passing it to the group +# lookup function in order to work around this. This setting is +# ignored unless No-Strip is set to either "both" or "group". +# The default is "false". +#Reformat-Group = false + +# The following is a comma-separated list of Kerberos realm +# names that should be considered to be equivalent to the +# local realm, such that @REALM.A can be assumed to +# be the same user as @REALM.B +# If not specified, the default local realm is the domain name, +# which defaults to the host's DNS domain name, +# translated to upper-case. +# Note that if this value is specified, the local realm name +# must be included in the list! +#Local-Realms = + +[Mapping] + +#Nobody-User = nobody +#Nobody-Group = nobody + +[Translation] + +# Translation Method is an comma-separated, ordered list of +# translation methods that can be used. Distributed methods +# include "nsswitch", "umich_ldap", and "static". Each method +# is a dynamically loadable plugin library. +# New methods may be defined and inserted in the list. +# The default is "nsswitch". +#Method = nsswitch + +# Optional. This is a comma-separated, ordered list of +# translation methods to be used for translating GSS +# authenticated names to ids. +# If this option is omitted, the same methods as those +# specified in "Method" are used. +#GSS-Methods = + +#-------------------------------------------------------------------# +# The following are used only for the "static" Translation Method. +#-------------------------------------------------------------------# +[Static] + +# A "static" list of GSS-Authenticated names to +# local user name mappings + +#someuser@REALM = localuser + + +#-------------------------------------------------------------------# +# The following are used only for the "umich_ldap" Translation Method. +#-------------------------------------------------------------------# + +[UMICH_SCHEMA] + +# server information (REQUIRED) +LDAP_server = ldap-server.local.domain.edu + +# the default search base (REQUIRED) +LDAP_base = dc=local,dc=domain,dc=edu + +#-----------------------------------------------------------# +# The remaining options have defaults (as shown) +# and are therefore not required. +#-----------------------------------------------------------# + +# whether or not to perform canonicalization on the +# name given as LDAP_server +#LDAP_canonicalize_name = true + +# absolute search base for (people) accounts +#LDAP_people_base = + +# absolute search base for groups +#LDAP_group_base = + +# Whether to follow ldap referrals +#LDAP_follow_referrals = true + +# Set to true to enable SSL - anything else is not enabled +#LDAP_use_ssl = false + +# Controls the LDAP server certificate validation behavior +# It can take the same values as ldap.conf(5)'s TLS_REQCERT +# tunable +#LDAP_tls_reqcert = "hard" + +# Location of CA certificate, mandatory if LDAP_tls_reqcert +# is not set to "never" +#LDAP_ca_cert = /etc/ldapca.cert + +# SASL mechanism to use while binding to LDAP +#LDAP_sasl_mech = + +# SASL realm to be used for SASL auth +#LDAP_sasl_realm = + +# Authentication identity to be used for SASL auth +#LDAP_sasl_authcid = + +# Authorization identity for SASL auth +#LDAP_sasl_authzid = + +# Cyrus SASL security properties +#LDAP_sasl_secprops = + +# Specifies whether the LDAP server hostname should be canonicalised. +# If set to yes LDAP lib with do a reverse hostname lookup. +# If this is not set the LDAP library's default will be used. +#LDAP_sasl_canonicalize + +# Specifies the kerberos ticket cache to be used +#LDAP_sasl_krb5_ccname = + +# Objectclass mapping information + +# Mapping for the person (account) object class +#NFSv4_person_objectclass = NFSv4RemotePerson + +# Mapping for the nfsv4name attribute the person object +#NFSv4_name_attr = NFSv4Name + +# Mapping for the UID number +#NFSv4_uid_attr = UIDNumber + +# Mapping for the GSSAPI Principal name +#GSS_principal_attr = GSSAuthName + +# Mapping for the account name attribute (usually uid) +# The value for this attribute must match the value of +# the group member attribute - NFSv4_member_attr +#NFSv4_acctname_attr = uid + +# Mapping for the group object class +#NFSv4_group_objectclass = NFSv4RemoteGroup + +# Mapping for the GID attribute +#NFSv4_gid_attr = GIDNumber + +# Mapping for the Group NFSv4 name +#NFSv4_group_attr = NFSv4Name + +# Mapping for the Group member attribute (usually memberUID) +# The value of this attribute must match the value of NFSv4_acctname_attr +#NFSv4_member_attr = memberUID diff --git a/inittab b/inittab new file mode 100644 index 0000000..3f5e83c --- /dev/null +++ b/inittab @@ -0,0 +1,16 @@ +# inittab is no longer used. +# +# ADDING CONFIGURATION HERE WILL HAVE NO EFFECT ON YOUR SYSTEM. +# +# Ctrl-Alt-Delete is handled by /usr/lib/systemd/system/ctrl-alt-del.target +# +# systemd uses 'targets' instead of runlevels. By default, there are two main targets: +# +# multi-user.target: analogous to runlevel 3 +# graphical.target: analogous to runlevel 5 +# +# To view current default target, run: +# systemctl get-default +# +# To set a default target, run: +# systemctl set-default TARGET.target diff --git a/inputrc b/inputrc new file mode 100644 index 0000000..3167531 --- /dev/null +++ b/inputrc @@ -0,0 +1,42 @@ +# do not bell on tab-completion +#set bell-style none + +set meta-flag on +set input-meta on +set convert-meta off +set output-meta on + +# Completed names which are symbolic links to +# directories have a slash appended. +set mark-symlinked-directories on + +$if mode=emacs + +# for linux console and RH/Debian xterm +"\e[1~": beginning-of-line +"\e[4~": end-of-line +# commented out keymappings for pgup/pgdown to reach begin/end of history +#"\e[5~": beginning-of-history +#"\e[6~": end-of-history +"\e[5~": history-search-backward +"\e[6~": history-search-forward +"\e[3~": delete-char +"\e[2~": overwrite-mode +"\e[5C": forward-word +"\e[5D": backward-word +"\e[1;5C": forward-word +"\e[1;5D": backward-word + +# for rxvt +"\e[8~": end-of-line +"\eOc": forward-word +"\eOd": backward-word + +# for non RH/Debian xterm, can't hurt for RH/DEbian xterm +"\eOH": beginning-of-line +"\eOF": end-of-line + +# for freebsd console +"\e[H": beginning-of-line +"\e[F": end-of-line +$endif diff --git a/iproute2/bpf_pinning b/iproute2/bpf_pinning new file mode 100644 index 0000000..2b39c70 --- /dev/null +++ b/iproute2/bpf_pinning @@ -0,0 +1,6 @@ +# +# subpath mappings from mount point for pinning +# +#3 tracing +#4 foo/bar +#5 tc/cls1 diff --git a/iproute2/ematch_map b/iproute2/ematch_map new file mode 100644 index 0000000..4d6bb2f --- /dev/null +++ b/iproute2/ematch_map @@ -0,0 +1,8 @@ +# lookup table for ematch kinds +1 cmp +2 nbyte +3 u32 +4 meta +7 canid +8 ipset +9 ipt diff --git a/iproute2/group b/iproute2/group new file mode 100644 index 0000000..6f000b2 --- /dev/null +++ b/iproute2/group @@ -0,0 +1,2 @@ +# device group names +0 default diff --git a/iproute2/nl_protos b/iproute2/nl_protos new file mode 100644 index 0000000..7c17cf0 --- /dev/null +++ b/iproute2/nl_protos @@ -0,0 +1,23 @@ +# Netlink protocol names mapping + +0 rtnl +1 unused +2 usersock +3 fw +4 tcpdiag +5 nflog +6 xfrm +7 selinux +8 iscsi +9 audit +10 fiblookup +11 connector +12 nft +13 ip6fw +14 dec-rt +15 uevent +16 genl +18 scsi-trans +19 ecryptfs +20 rdma +21 crypto diff --git a/iproute2/rt_dsfield b/iproute2/rt_dsfield new file mode 100644 index 0000000..8f71438 --- /dev/null +++ b/iproute2/rt_dsfield @@ -0,0 +1,43 @@ +# Differentiated field values +# These include the DSCP and unused bits +0x0 default +# Newer RFC2597 values +0x28 AF11 +0x30 AF12 +0x38 AF13 +0x48 AF21 +0x50 AF22 +0x58 AF23 +0x68 AF31 +0x70 AF32 +0x78 AF33 +0x88 AF41 +0x90 AF42 +0x98 AF43 +# Older values RFC2474 +0x20 CS1 +0x40 CS2 +0x60 CS3 +0x80 CS4 +0xA0 CS5 +0xC0 CS6 +0xE0 CS7 +# RFC 2598 +0xB8 EF + +# Deprecated values dropped upstream +# Kept in RHEL for backwards-compatibility +0x00 default +0x10 lowdelay +0x08 throughput +0x04 reliability +# This value overlap with ECT, do not use it! +0x02 mincost +# These values seems do not want to die, Cisco likes them by a strange reason. +0x20 priority +0x40 immediate +0x60 flash +0x80 flash-override +0xa0 critical +0xc0 internet +0xe0 network diff --git a/iproute2/rt_protos b/iproute2/rt_protos new file mode 100644 index 0000000..0f98609 --- /dev/null +++ b/iproute2/rt_protos @@ -0,0 +1,25 @@ +# +# Reserved protocols. +# +0 unspec +1 redirect +2 kernel +3 boot +4 static +8 gated +9 ra +10 mrt +11 zebra +12 bird +13 dnrouted +14 xorp +15 ntk +16 dhcp +18 keepalived +42 babel +99 openr +186 bgp +187 isis +188 ospf +189 rip +192 eigrp diff --git a/iproute2/rt_realms b/iproute2/rt_realms new file mode 100644 index 0000000..eedd76d --- /dev/null +++ b/iproute2/rt_realms @@ -0,0 +1,13 @@ +# +# reserved values +# +0 cosmos +# +# local +# +#1 inr.ac +#2 inr.ruhep +#3 freenet +#4 radio-msu +#5 russia +#6 internet diff --git a/iproute2/rt_scopes b/iproute2/rt_scopes new file mode 100644 index 0000000..8514bc1 --- /dev/null +++ b/iproute2/rt_scopes @@ -0,0 +1,11 @@ +# +# reserved values +# +0 global +255 nowhere +254 host +253 link +# +# pseudo-reserved +# +200 site diff --git a/iproute2/rt_tables b/iproute2/rt_tables new file mode 100644 index 0000000..541abfd --- /dev/null +++ b/iproute2/rt_tables @@ -0,0 +1,11 @@ +# +# reserved values +# +255 local +254 main +253 default +0 unspec +# +# local +# +#1 inr.ruhep diff --git a/issue b/issue new file mode 100644 index 0000000..6736cb1 --- /dev/null +++ b/issue @@ -0,0 +1,3 @@ +\S +Kernel \r on an \m + diff --git a/issue.net b/issue.net new file mode 100644 index 0000000..7a56dfc --- /dev/null +++ b/issue.net @@ -0,0 +1,2 @@ +\S +Kernel \r on an \m diff --git a/kdump.conf b/kdump.conf new file mode 100644 index 0000000..e598a49 --- /dev/null +++ b/kdump.conf @@ -0,0 +1,194 @@ +# This file contains a series of commands to perform (in order) in the kdump +# kernel after a kernel crash in the crash kernel(1st kernel) has happened. +# +# Directives in this file are only applicable to the kdump initramfs, and have +# no effect once the root filesystem is mounted and the normal init scripts are +# processed. +# +# Currently, only one dump target and path can be specified. If the dumping to +# the configured target fails, the failure action which can be configured via +# the "failure_action" directive will be performed. +# +# Supported options: +# +# auto_reset_crashkernel +# - whether to reset kernel crashkernel to new default value +# or not when kexec-tools updates the default crashkernel value and +# existing kernels using the old default kernel crashkernel value. +# The default value is yes. +# +# raw +# - Will dd /proc/vmcore into . +# Use persistent device names for partition devices, +# such as /dev/vg/. +# +# nfs +# - Will mount nfs to , and copy /proc/vmcore to +# //%HOST-%DATE/, supports DNS. +# +# ssh +# - Will save /proc/vmcore to :/%HOST-%DATE/, +# supports DNS. +# NOTE: make sure the user has write permissions on the server. +# +# sshkey +# - Will use the sshkey to do ssh dump. +# Specify the path of the ssh key to use when dumping +# via ssh. The default value is /root/.ssh/kdump_id_rsa. +# +# +# - Will mount -t , and copy +# /proc/vmcore to //%HOST_IP-%DATE/. +# NOTE: can be a device node, label or uuid. +# It's recommended to use persistent device names +# such as /dev/vg/. +# Otherwise it's suggested to use label or uuid. +# Supported fs types: ext[234], xfs, btrfs, minix, virtiofs +# +# path +# - "path" represents the file system path in which vmcore +# will be saved. If a dump target is specified in +# kdump.conf, then "path" is relative to the specified +# dump target. +# +# Interpretation of "path" changes a bit if the user didn't +# specify any dump target explicitly in kdump.conf. In this +# case, "path" represents the absolute path from root. The +# dump target and adjusted path are arrived at automatically +# depending on what's mounted in the current system. +# +# Ignored for raw device dumps. If unset, will use the default +# "/var/crash". +# +# core_collector +# - This allows you to specify the command to copy +# the vmcore. The default is makedumpfile, which on +# some architectures can drastically reduce vmcore size. +# See /sbin/makedumpfile --help for a list of options. +# Note that the -i and -g options are not needed here, +# as the initrd will automatically be populated with a +# config file appropriate for the running kernel. +# The default core_collector for raw/ssh dump is: +# "makedumpfile -F -l --message-level 7 -d 31". +# The default core_collector for other targets is: +# "makedumpfile -l --message-level 7 -d 31". +# +# "makedumpfile -F" will create a flattened vmcore. +# You need to use "makedumpfile -R" to rearrange the dump data to +# a normal dumpfile readable with analysis tools. For example: +# "makedumpfile -R vmcore < vmcore.flat". +# +# For core_collector format details, you can refer to +# kexec-kdump-howto.txt or kdump.conf manpage. +# +# kdump_post +# - This directive allows you to run a executable binary +# or script after the vmcore dump process terminates. +# The exit status of the current dump process is fed to +# the executable binary or script as its first argument. +# All files under /etc/kdump/post.d are collectively sorted +# and executed in lexical order, before binary or script +# specified kdump_post parameter is executed. +# +# kdump_pre +# - Works like the "kdump_post" directive, but instead of running +# after the dump process, runs immediately before it. +# Exit status of this binary is interpreted as follows: +# 0 - continue with dump process as usual +# non 0 - run the final action (reboot/poweroff/halt) +# All files under /etc/kdump/pre.d are collectively sorted and +# executed in lexical order, after binary or script specified +# kdump_pre parameter is executed. +# Even if the binary or script in /etc/kdump/pre.d directory +# returns non 0 exit status, the processing is continued. +# +# extra_bins +# - This directive allows you to specify additional binaries or +# shell scripts to be included in the kdump initrd. +# Generally they are useful in conjunction with a kdump_post +# or kdump_pre binary or script which depends on these extra_bins. +# +# extra_modules +# - This directive allows you to specify extra kernel modules +# that you want to be loaded in the kdump initrd. +# Multiple modules can be listed, separated by spaces, and any +# dependent modules will automatically be included. +# +# failure_action +# - Action to perform in case dumping fails. +# reboot: Reboot the system. +# halt: Halt the system. +# poweroff: Power down the system. +# shell: Drop to a bash shell. +# Exiting the shell reboots the system by default, +# or perform "final_action". +# dump_to_rootfs: Dump vmcore to rootfs from initramfs context and +# reboot by default or perform "final_action". +# Useful when non-root dump target is specified. +# The default option is "reboot". +# +# default +# - Same as the "failure_action" directive above, but this directive +# is obsolete and will be removed in the future. +# +# final_action +# - Action to perform in case dumping succeeds. Also performed +# when "shell" or "dump_to_rootfs" failure action finishes. +# Each action is same as the "failure_action" directive above. +# The default is "reboot". +# +# force_rebuild <0 | 1> +# - By default, kdump initrd will only be rebuilt when necessary. +# Specify 1 to force rebuilding kdump initrd every time when kdump +# service starts. +# +# force_no_rebuild <0 | 1> +# - By default, kdump initrd will be rebuilt when necessary. +# Specify 1 to bypass rebuilding of kdump initrd. +# +# force_no_rebuild and force_rebuild options are mutually +# exclusive and they should not be set to 1 simultaneously. +# +# override_resettable <0 | 1> +# - Usually an unresettable block device can't be a dump target. +# Specifying 1 when you want to dump even though the block +# target is unresettable +# By default, it is 0, which will not try dumping destined to fail. +# +# dracut_args +# - Pass extra dracut options when rebuilding kdump initrd. +# +# fence_kdump_args +# - Command line arguments for fence_kdump_send (it can contain +# all valid arguments except hosts to send notification to). +# +# fence_kdump_nodes +# - List of cluster node(s) except localhost, separated by spaces, +# to send fence_kdump notifications to. +# (this option is mandatory to enable fence_kdump). +# + +#raw /dev/vg/lv_kdump +#ext4 /dev/vg/lv_kdump +#ext4 LABEL=/boot +#ext4 UUID=03138356-5e61-4ab3-b58e-27507ac41937 +#virtiofs myfs +#nfs my.server.com:/export/tmp +#nfs [2001:db8::1:2:3:4]:/export/tmp +#ssh user@my.server.com +#ssh user@2001:db8::1:2:3:4 +#sshkey /root/.ssh/kdump_id_rsa +auto_reset_crashkernel yes +path /var/crash +core_collector makedumpfile -l --message-level 7 -d 31 +#core_collector scp +#kdump_post /var/crash/scripts/kdump-post.sh +#kdump_pre /var/crash/scripts/kdump-pre.sh +#extra_bins /usr/bin/lftp +#extra_modules gfs2 +#failure_action shell +#force_rebuild 1 +#force_no_rebuild 1 +#dracut_args --omit-drivers "cfg80211 snd" --add-drivers "ext2 ext3" +#fence_kdump_args -p 7410 -f auto -c 0 -i 10 +#fence_kdump_nodes node1 node2 diff --git a/keys/ima/centosimarelease-9.der b/keys/ima/centosimarelease-9.der new file mode 100644 index 0000000000000000000000000000000000000000..691678fabb58879eff6f62eb75f12d414f5237c9 GIT binary patch literal 726 zcmXqLV!C9|#JFn#GZP~d6DPy9iY1SqUp~6pfR~L^tIebBJ1-+6H!FidprMd~02^~C z3l|S(kcY0PucNNBqoKHgC`gQ%hc75KMZqJnL;)zF0F+QNP=M>_WE2xFPEAhCNi8aI zC`wJqNG#Dy&d)WF6X!KDHZV6ZG&D0bF*S@5=QXwfax9=+0~13d0|SWhn$D?tCH}!+ z(~DAbQWJ|)6|z$+6*SWFixkRIi!#$PlM_oa^Yb(f%7D&f2fF;6EfXUft9By`gA#KR z1Iv{Qh8&!{(=WuF@ccjFi$BcI`_TELb!yRJ3w15c z=~>y@j4X?dc6}-R`Q(I${#Ub17xkZ}n|Tf^siX(8T`v9@Hbr4YPm{?3f%oTrZmDuw zTmiJ12k2T^VMfOPEKCLr27DkMKZwV|%*5VcAO_;Ag7`cJTx=ZLY>cd|?99vtvLJCj z7BLo)kf)3N#k7sKm;Zn4FV~$WRO1}I)j%F3t;`}}Al4xA+psD2!h_^x2&0Vvo<_oVfT3Cllqi##af%*1E-D_E1PwwhjdT)@hbGs>m8X(yBElIf1G@` zaNf&~54wD{ZA*H&|1z9BP`qkm>c)h;C7jZB1~-$mM6U&CW&Kro-ZQzvOXKRso4cfY z-+S8YH+Kee~gve$9xpZq89W8PVRIjnPd!S=*8buV8pu-e6{vv<`>`J+4E6@5Dr bB423zut3V-3yVZR!jY(3lh1DZmVN>N4apH3 literal 0 HcmV?d00001 diff --git a/keys/ima/redhatimarelease-9.der b/keys/ima/redhatimarelease-9.der new file mode 100644 index 0000000000000000000000000000000000000000..a286bfb4dc393c84388c7e599e9c061714f6753f GIT binary patch literal 727 zcmXqLV!CY5#JGC_GZP~d6DPy9iY1SqUp~6hfR~L^tIebBJ1-+6H!FidprMd~02^~C z3l|S(kcY0PucNNBqoKHgC`gQ%hc75KMZqJnL;)zF0F+QNP=M>_WE2xFPEAhCNi8aI zC`wJqNG#Dy&d)WF6X!KDHZV6ZG&D0bF))b|=QXwfax9=+15-m|14D@MTFAy1rRJn2 z7N;s?r&cOxq~#YWl%*DBre!84mSpDVX&RIP-N_Dg`Z-%BMmARMMivGo<|GCdf4=wo zA1QZERQIbfT6p1r+N68ty&Ga*)n8MWn7t)wA6u*K&ol0I$M;SQ2~OH_pv&3gP$au{ z$8}q8gWepY-%D@Z>1utM=pymwX7|@PixaKor;0PqdE8%b%jT@_ox^jsV{rx0W*(q( zWrZ0T|FbX|Fc|QGc>Ew93o{dYgMk=`uL|Px7;v$1XtOc0va&NX8_0sh`B=nQM3jCp z-r-xIHa~Mk`qT4I=KQ{F#Nufn50X}9kuVTz5czG`6no)8aYnS7pMk|Rv*Pc;Q)i(? z6>}3KBZHLOLEY4~A5`AVTmJXTtA`Ckb4*hg z+V_3#o-MJF`R(rjy~WBGC(B-I;u6R=*>}xqZ&{BE-`eF`NBVk?Jn0R*p|;(k^P=(s z<&LsnAJr#@+il`MUmSc}!6CM3=gU2drf`P;ZsiU0z9X3`q@SB*z0XwsO3V`gC@^||A{|ADUWKo-cHVPE TT4U?`8AnA}oEq+i7%Tw*6p;x| literal 0 HcmV?d00001 diff --git a/keys/ima/rocky-imarelease.der b/keys/ima/rocky-imarelease.der new file mode 100644 index 0000000000000000000000000000000000000000..dedaecb68b41d0d1296734237fd3d0a9182d3daf GIT binary patch literal 1013 zcmXqLV*Y5*#B_53GZP~d5E<~YacZ@Bw0-AgWaMULFlan($Zf#M#vIDRCd?EXY$#~J z58`m}aJZ!AB$g)@r5f@X@PLHad01WY%TkLBbq%yZd@df9p#0?QN(I-vlGLJtqRiq{ zh2Z?O5|ADRxBSw)l*E$E{5(TN19^~gZXSuC)ST2rpsLio^vt}})S}G1bcK@C#9TvZ z14)n)W*#Aki9VTmr4Szg}D-9bL`-z4ry822it}rMAClgs=M#ldvOa=@Fd_a%N@`HFR%uMVJ z24Wz-Du~Zxz{SR)&Bn;e%FfJeAPW-bV-aH!Q9H5EMLzhS#3N3IS;ypVeQ4_MxdTo- zvdSzH24W2&vNE@P#nxPvOj5fzPyV)!dg4VLU$g|x+{DPpAl$O^$BUJ@d#~@Yh}!xq zB=vAefc_lqqOg0*WzGtVKhrCHt(7%1ZEEqWeRd4jCSTet?NZ0q?kT(PSn#LlYdZ^X zMplM)d8F3f-?XnbI)%?wr+kgH(3bgmf|>cI2iHDdvd91WB;)_it%}8snYWKfJWj9T z-rXC`_Uponds92jDqISez1sW7Z*5(4w$7ph0Mh{cHPUYI^8iZgjcs53pahwZ!0ghUM*@)1F-YVxj%|WkbpTDXvaWGv{`eNnHZ~eAZf! literal 0 HcmV?d00001 diff --git a/krb5.conf b/krb5.conf new file mode 100644 index 0000000..0a89a28 --- /dev/null +++ b/krb5.conf @@ -0,0 +1,31 @@ +# To opt out of the system crypto-policies configuration of krb5, remove the +# symlink at /etc/krb5.conf.d/crypto-policies which will not be recreated. +includedir /etc/krb5.conf.d/ + +[logging] + default = FILE:/var/log/krb5libs.log + kdc = FILE:/var/log/krb5kdc.log + admin_server = FILE:/var/log/kadmind.log + +[libdefaults] + dns_lookup_realm = false + ticket_lifetime = 24h + renew_lifetime = 7d + forwardable = true + rdns = false + pkinit_anchors = FILE:/etc/pki/tls/certs/ca-bundle.crt + spake_preauth_groups = edwards25519 + dns_canonicalize_hostname = fallback + qualify_shortname = "" +# default_realm = EXAMPLE.COM + default_ccache_name = KEYRING:persistent:%{uid} + +[realms] +# EXAMPLE.COM = { +# kdc = kerberos.example.com +# admin_server = kerberos.example.com +# } + +[domain_realm] +# .example.com = EXAMPLE.COM +# example.com = EXAMPLE.COM diff --git a/krb5.conf.d/crypto-policies b/krb5.conf.d/crypto-policies new file mode 120000 index 0000000..93e90af --- /dev/null +++ b/krb5.conf.d/crypto-policies @@ -0,0 +1 @@ +/etc/crypto-policies/back-ends/krb5.config \ No newline at end of file diff --git a/krb5.conf.d/kcm_default_ccache b/krb5.conf.d/kcm_default_ccache new file mode 100644 index 0000000..996e865 --- /dev/null +++ b/krb5.conf.d/kcm_default_ccache @@ -0,0 +1,12 @@ +# This file should normally be installed by your distribution into a +# directory that is included from the Kerberos configuration file (/etc/krb5.conf) +# On Fedora/RHEL/CentOS, this is /etc/krb5.conf.d/ +# +# To enable the KCM credential cache enable the KCM socket and the service: +# systemctl enable sssd-kcm.socket +# systemctl start sssd-kcm.socket +# +# To disable the KCM credential cache, comment out the following lines. + +[libdefaults] + default_ccache_name = KCM: diff --git a/ld.so.conf b/ld.so.conf new file mode 100644 index 0000000..44f8809 --- /dev/null +++ b/ld.so.conf @@ -0,0 +1 @@ +include ld.so.conf.d/*.conf diff --git a/ld.so.conf.d/postgresql-pgdg-libs.conf b/ld.so.conf.d/postgresql-pgdg-libs.conf new file mode 120000 index 0000000..622398f --- /dev/null +++ b/ld.so.conf.d/postgresql-pgdg-libs.conf @@ -0,0 +1 @@ +/etc/alternatives/pgsql-ld-conf \ No newline at end of file diff --git a/libaudit.conf b/libaudit.conf new file mode 100644 index 0000000..90855d7 --- /dev/null +++ b/libaudit.conf @@ -0,0 +1,7 @@ +# This is the configuration file for libaudit tunables. +# It is currently only used for the failure_action tunable. + +# failure_action can be: log, ignore, terminate +failure_action = ignore + + diff --git a/libnl/classid b/libnl/classid new file mode 100644 index 0000000..2203243 --- /dev/null +++ b/libnl/classid @@ -0,0 +1,45 @@ +############################################################################### +# +# ClassID <-> Name Translation Table +# +# This file can be used to assign names to classids for easier reference +# in all libnl tools. +# +# Format: +# # qdisc definition +# # class deifnition +# # class definition referencing an +# existing qdisc definition. +# +# Example: +# 1: top # top -> 1:0 +# top:1 interactive # interactive -> 1:1 +# top:2 www # www -> 1:2 +# top:3 bulk # bulk -> 1:3 +# 2:1 test_class # test_class -> 2:1 +# +# Illegal Example: +# 30:1 classD +# classD:2 invalidClass # classD refers to a class, not a qdisc +# +############################################################################### + +# + +# Reserved default classids +0:0 none +ffff:ffff root +ffff:fff1 ingress + +# +# List your classid definitions here: +# + + + +############################################################################### +# List of auto-generated classids +# +# DO NOT ADD CLASSID DEFINITIONS BELOW THIS LINE +# +# diff --git a/libnl/pktloc b/libnl/pktloc new file mode 100644 index 0000000..8559161 --- /dev/null +++ b/libnl/pktloc @@ -0,0 +1,76 @@ +# +# Location definitions for packet matching +# + +# name alignment offset mask shift +ip.version u8 net+0 0xF0 4 +ip.hdrlen u8 net+0 0x0F +ip.diffserv u8 net+1 +ip.length u16 net+2 +ip.id u16 net+4 +ip.flag.res u8 net+6 0xff 7 +ip.df u8 net+6 0x40 6 +ip.mf u8 net+6 0x20 5 +ip.offset u16 net+6 0x1FFF +ip.ttl u8 net+8 +ip.proto u8 net+9 +ip.chksum u16 net+10 +ip.src u32 net+12 +ip.dst u32 net+16 + +# if ip.ihl > 5 +ip.opts u32 net+20 + + +# +# IP version 6 +# +# name alignment offset mask shift +ip6.version u8 net+0 0xF0 4 +ip6.tc u16 net+0 0xFF0 4 +ip6.flowlabel u32 net+0 0xFFFFF +ip6.length u16 net+4 +ip6.nexthdr u8 net+6 +ip6.hoplimit u8 net+7 +ip6.src 16 net+8 +ip6.dst 16 net+24 + +# +# Transmission Control Protocol (TCP) +# +# name alignment offset mask shift +tcp.sport u16 tcp+0 +tcp.dport u16 tcp+2 +tcp.seq u32 tcp+4 +tcp.ack u32 tcp+8 + +# Data offset (4 bits) +tcp.off u8 tcp+12 0xF0 4 + +# Reserved [0 0 0] (3 bits) +tcp.reserved u8 tcp+12 0x04 1 + +# ECN [N C E] (3 bits) +tcp.ecn u16 tcp+12 0x01C00 6 + +# Individual TCP flags (0|1) (6 bits in total) +tcp.flag.urg u8 tcp+13 0x20 5 +tcp.flag.ack u8 tcp+13 0x10 4 +tcp.flag.psh u8 tcp+13 0x08 3 +tcp.flag.rst u8 tcp+13 0x04 2 +tcp.flag.syn u8 tcp+13 0x02 1 +tcp.flag.fin u8 tcp+13 0x01 + +tcp.win u16 tcp+14 +tcp.csum u16 tcp+16 +tcp.urg u16 tcp+18 +tcp.opts u32 tcp+20 + +# +# User Datagram Protocol (UDP) +# +# name alignment offset mask shift +udp.sport u16 tcp+0 +udp.dport u16 tcp+2 +udp.length u16 tcp+4 +udp.csum u16 tcp+6 diff --git a/libreport/events.d/collect_dnf.conf b/libreport/events.d/collect_dnf.conf new file mode 100644 index 0000000..b99721b --- /dev/null +++ b/libreport/events.d/collect_dnf.conf @@ -0,0 +1,24 @@ +EVENT=notify component=dnf + # there has to be a comment here, otherwise + # the next line is interpreted as a condition + function fetch() + { + for log in $*; do + new_name=${log//\//_} + cp $log $new_name + done + } + + logs=`find /var/cache/dnf -iname '*.log'` + fetch $logs + fetch /var/log/dnf.log + # this would fail for a non-priviledged user + journalctl _SYSTEMD_UNIT=dnf-makecache.service &>dnf-makecache.log + fetch /var/log/dnf.transaction.log + if [[ -r username ]]; then + username=`cat username` + if [[ $username != "root" ]]; then + logs=`find /var/tmp -path "/var/tmp/dnf-${username}-*" -iname '*.log'` + fetch $logs + fi + fi diff --git a/libssh/libssh_client.config b/libssh/libssh_client.config new file mode 100644 index 0000000..1d293bd --- /dev/null +++ b/libssh/libssh_client.config @@ -0,0 +1,4 @@ +# Parse system-wide crypto configuration file +Include /etc/crypto-policies/back-ends/libssh.config +# Parse OpenSSH configuration file for consistency +Include /etc/ssh/ssh_config diff --git a/libssh/libssh_server.config b/libssh/libssh_server.config new file mode 100644 index 0000000..d3ef5c2 --- /dev/null +++ b/libssh/libssh_server.config @@ -0,0 +1,2 @@ +# Parse system-wide crypto configuration file +Include /etc/crypto-policies/back-ends/libssh.config diff --git a/libuser.conf b/libuser.conf new file mode 100644 index 0000000..8ff5b2e --- /dev/null +++ b/libuser.conf @@ -0,0 +1,89 @@ +# See libuser.conf(5) for more information. + +# Do not modify the default module list if you care about unattended calls +# to programs (i.e., scripts) working! + +[import] +# Data from these files is used when libuser.conf does not define a value. +# The mapping is documented in the man page. +login_defs = /etc/login.defs +default_useradd = /etc/default/useradd + +[defaults] +# The default (/usr/lib*/libuser) is usually correct +# moduledir = /your/custom/directory + +# The following variables are usually imported: +# skeleton = /etc/skel +# mailspooldir = /var/mail + +crypt_style = sha512 +modules = files shadow +create_modules = files shadow +# modules = files shadow ldap +# create_modules = ldap + +[userdefaults] +LU_USERNAME = %n +# This is better imported from /etc/login.defs: +# LU_UIDNUMBER = 500 +LU_GIDNUMBER = %u +# LU_USERPASSWORD = !! +# LU_GECOS = %n +# LU_HOMEDIRECTORY = /home/%n +# LU_LOGINSHELL = /bin/bash + +# LU_SHADOWNAME = %n +# LU_SHADOWPASSWORD = !! +# LU_SHADOWLASTCHANGE = %d +# LU_SHADOWMIN = 0 +# LU_SHADOWMAX = 99999 +# LU_SHADOWWARNING = 7 +# LU_SHADOWINACTIVE = -1 +# LU_SHADOWEXPIRE = -1 +# LU_SHADOWFLAG = -1 + +[groupdefaults] +LU_GROUPNAME = %n +# This is better imported from /etc/login.defs: +# LU_GIDNUMBER = 500 +# +# LU_GROUPPASSWORD = !! +# LU_MEMBERUID = +# LU_ADMINISTRATORUID = + +[files] +# This is useful for the case where some master files are used to +# populate a different NSS mechanism which this workstation uses. +# directory = /etc + +[shadow] +# This is useful for the case where some master files are used to +# populate a different NSS mechanism which this workstation uses. +# directory = /etc + +[ldap] +# Setting these is always necessary. +# server = ldap +# basedn = dc=example,dc=com + +# Setting these is rarely necessary, since it's usually correct. +# userBranch = ou=People +# groupBranch = ou=Group + +# Set only if your administrative user uses simple bind operations to +# connect to the server. +# binddn = cn=Manager,dc=example,dc=com + +# Set this only if the default user (as determined by SASL) is incorrect +# for SASL bind operations. Usually, it's correct, so you'll rarely need +# to set these. +# user = Manager +# authuser = Manager + +[sasl] +# Set these only if your sasldb is only used by a particular application, and +# in a particular domain. The default (all applications, all domains) is +# probably correct for most installations. +# appname = imap +# domain = EXAMPLE.COM diff --git a/locale.conf b/locale.conf new file mode 100644 index 0000000..31062ff --- /dev/null +++ b/locale.conf @@ -0,0 +1 @@ +LANG="C.UTF-8" diff --git a/localtime b/localtime new file mode 120000 index 0000000..285b912 --- /dev/null +++ b/localtime @@ -0,0 +1 @@ +../usr/share/zoneinfo/Europe/Berlin \ No newline at end of file diff --git a/login.defs b/login.defs new file mode 100644 index 0000000..0875b63 --- /dev/null +++ b/login.defs @@ -0,0 +1,278 @@ +# +# Please note that the parameters in this configuration file control the +# behavior of the tools from the shadow-utils component. None of these +# tools uses the PAM mechanism, and the utilities that use PAM (such as the +# passwd command) should therefore be configured elsewhere. Refer to +# /etc/pam.d/system-auth for more information. +# + +# +# Delay in seconds before being allowed another attempt after a login failure +# Note: When PAM is used, some modules may enforce a minimum delay (e.g. +# pam_unix(8) enforces a 2s delay) +# +#FAIL_DELAY 3 + +# Currently FAILLOG_ENAB is not supported + +# +# Enable display of unknown usernames when login(1) failures are recorded. +# +#LOG_UNKFAIL_ENAB no + +# Currently LOG_OK_LOGINS is not supported + +# Currently LASTLOG_ENAB is not supported + +# +# Limit the highest user ID number for which the lastlog entries should +# be updated. +# +# No LASTLOG_UID_MAX means that there is no user ID limit for writing +# lastlog entries. +# +#LASTLOG_UID_MAX + +# Currently MAIL_CHECK_ENAB is not supported + +# Currently OBSCURE_CHECKS_ENAB is not supported + +# Currently PORTTIME_CHECKS_ENAB is not supported + +# Currently QUOTAS_ENAB is not supported + +# Currently SYSLOG_SU_ENAB is not supported + +# +# Enable "syslog" logging of newgrp(1) and sg(1) activity. +# +#SYSLOG_SG_ENAB yes + +# Currently CONSOLE is not supported + +# Currently SULOG_FILE is not supported + +# Currently MOTD_FILE is not supported + +# Currently ISSUE_FILE is not supported + +# Currently TTYTYPE_FILE is not supported + +# Currently FTMP_FILE is not supported + +# Currently NOLOGINS_FILE is not supported + +# Currently SU_NAME is not supported + +# *REQUIRED* +# Directory where mailboxes reside, _or_ name of file, relative to the +# home directory. If you _do_ define both, MAIL_DIR takes precedence. +# +MAIL_DIR /var/spool/mail +#MAIL_FILE .mail + +# +# If defined, file which inhibits all the usual chatter during the login +# sequence. If a full pathname, then hushed mode will be enabled if the +# user's name or shell are found in the file. If not a full pathname, then +# hushed mode will be enabled if the file exists in the user's home directory. +# +#HUSHLOGIN_FILE .hushlogin +#HUSHLOGIN_FILE /etc/hushlogins + +# Currently ENV_TZ is not supported + +# Currently ENV_HZ is not supported + +# +# The default PATH settings, for superuser and normal users. +# +# (they are minimal, add the rest in the shell startup files) +#ENV_SUPATH PATH=/sbin:/bin:/usr/sbin:/usr/bin +#ENV_PATH PATH=/bin:/usr/bin + +# +# Terminal permissions +# +# TTYGROUP Login tty will be assigned this group ownership. +# TTYPERM Login tty will be set to this permission. +# +# If you have a write(1) program which is "setgid" to a special group +# which owns the terminals, define TTYGROUP as the number of such group +# and TTYPERM as 0620. Otherwise leave TTYGROUP commented out and +# set TTYPERM to either 622 or 600. +# +#TTYGROUP tty +#TTYPERM 0600 + +# Currently ERASECHAR, KILLCHAR and ULIMIT are not supported + +# Default initial "umask" value used by login(1) on non-PAM enabled systems. +# Default "umask" value for pam_umask(8) on PAM enabled systems. +# UMASK is also used by useradd(8) and newusers(8) to set the mode for new +# home directories if HOME_MODE is not set. +# 022 is the default value, but 027, or even 077, could be considered +# for increased privacy. There is no One True Answer here: each sysadmin +# must make up their mind. +UMASK 022 + +# HOME_MODE is used by useradd(8) and newusers(8) to set the mode for new +# home directories. +# If HOME_MODE is not set, the value of UMASK is used to create the mode. +HOME_MODE 0700 + +# Password aging controls: +# +# PASS_MAX_DAYS Maximum number of days a password may be used. +# PASS_MIN_DAYS Minimum number of days allowed between password changes. +# PASS_MIN_LEN Minimum acceptable password length. +# PASS_WARN_AGE Number of days warning given before a password expires. +# +PASS_MAX_DAYS 99999 +PASS_MIN_DAYS 0 +PASS_WARN_AGE 7 + +# Currently PASS_MIN_LEN is not supported + +# Currently SU_WHEEL_ONLY is not supported + +# Currently CRACKLIB_DICTPATH is not supported + +# +# Min/max values for automatic uid selection in useradd(8) +# +UID_MIN 1000 +UID_MAX 60000 +# System accounts +SYS_UID_MIN 201 +SYS_UID_MAX 999 +# Extra per user uids +SUB_UID_MIN 100000 +SUB_UID_MAX 600100000 +SUB_UID_COUNT 65536 + +# +# Min/max values for automatic gid selection in groupadd(8) +# +GID_MIN 1000 +GID_MAX 60000 +# System accounts +SYS_GID_MIN 201 +SYS_GID_MAX 999 +# Extra per user group ids +SUB_GID_MIN 100000 +SUB_GID_MAX 600100000 +SUB_GID_COUNT 65536 + +# +# Max number of login(1) retries if password is bad +# +#LOGIN_RETRIES 3 + +# +# Max time in seconds for login(1) +# +#LOGIN_TIMEOUT 60 + +# Currently PASS_CHANGE_TRIES is not supported + +# Currently PASS_ALWAYS_WARN is not supported + +# Currently PASS_MAX_LEN is not supported + +# Currently CHFN_AUTH is not supported + +# +# Which fields may be changed by regular users using chfn(1) - use +# any combination of letters "frwh" (full name, room number, work +# phone, home phone). If not defined, no changes are allowed. +# For backward compatibility, "yes" = "rwh" and "no" = "frwh". +# +#CHFN_RESTRICT rwh + +# Currently LOGIN_STRING is not supported + +# Currently MD5_CRYPT_ENAB is not supported + +# +# If set to MD5, MD5-based algorithm will be used for encrypting password +# If set to SHA256, SHA256-based algorithm will be used for encrypting password +# If set to SHA512, SHA512-based algorithm will be used for encrypting password +# If set to BLOWFISH, BLOWFISH-based algorithm will be used for encrypting password +# If set to DES, DES-based algorithm will be used for encrypting password (default) +# +ENCRYPT_METHOD SHA512 + +# +# Only works if ENCRYPT_METHOD is set to SHA256 or SHA512. +# +# Define the number of SHA rounds. +# With a lot of rounds, it is more difficult to brute-force the password. +# However, more CPU resources will be needed to authenticate users if +# this value is increased. +# +# If not specified, the libc will choose the default number of rounds (5000). +# The values must be within the 1000-999999999 range. +# +SHA_CRYPT_MAX_ROUNDS 100000 + +# Currently SHA_CRYPT_MIN_ROUNDS is not supported + +# Currently BCRYPT_MIN_ROUNDS and BCRYPT_MAX_ROUNDS are not supported + +# Currently CONSOLE_GROUPS is not supported + +# +# Should login be allowed if we can't cd to the home directory? +# Default is yes. +# +#DEFAULT_HOME yes + +# Currently ENVIRON_FILE is not supported + +# +# If defined, this command is run when removing a user. +# It should remove any at/cron/print jobs etc. owned by +# the user to be removed (passed as the first argument). +# +#USERDEL_CMD /usr/sbin/userdel_local + +# +# Enables userdel(8) to remove user groups if no members exist. +# +USERGROUPS_ENAB yes + +# +# If set to a non-zero number, the shadow utilities will make sure that +# groups never have more than this number of users on one line. +# This permits to support split groups (groups split into multiple lines, +# with the same group ID, to avoid limitation of the line length in the +# group file). +# +# 0 is the default value and disables this feature. +# +#MAX_MEMBERS_PER_GROUP 0 + +# +# If useradd(8) should create home directories for users by default (non +# system users only). +# This option is overridden with the -M or -m flags on the useradd(8) +# command-line. +# +CREATE_HOME yes + +# +# Force use shadow, even if shadow passwd & shadow group files are +# missing. +# +#FORCE_SHADOW yes + +# +# Select the HMAC cryptography algorithm. +# Used in pam_timestamp module to calculate the keyed-hash message +# authentication code. +# +# Note: It is recommended to check hmac(3) to see the possible algorithms +# that are available in your system. +# +HMAC_CRYPTO_ALGO SHA512 diff --git a/logrotate.conf b/logrotate.conf new file mode 100644 index 0000000..0dd156f --- /dev/null +++ b/logrotate.conf @@ -0,0 +1,23 @@ +# see "man logrotate" for details + +# global options do not affect preceding include directives + +# rotate log files weekly +weekly + +# keep 4 weeks worth of backlogs +rotate 4 + +# create new (empty) log files after rotating old ones +create + +# use date as a suffix of the rotated file +dateext + +# uncomment this if you want your log files compressed +#compress + +# packages drop log rotation information into this directory +include /etc/logrotate.d + +# system-specific logs may be also be configured here. diff --git a/logrotate.d/btmp b/logrotate.d/btmp new file mode 100644 index 0000000..0aa1ae1 --- /dev/null +++ b/logrotate.d/btmp @@ -0,0 +1,7 @@ +# no packages own btmp -- we'll rotate it here +/var/log/btmp { + missingok + monthly + create 0660 root utmp + rotate 1 +} diff --git a/logrotate.d/chrony b/logrotate.d/chrony new file mode 100644 index 0000000..2823a1a --- /dev/null +++ b/logrotate.d/chrony @@ -0,0 +1,8 @@ +/var/log/chrony/*.log { + missingok + nocreate + sharedscripts + postrotate + /usr/bin/chronyc cyclelogs > /dev/null 2>&1 || true + endscript +} diff --git a/logrotate.d/dnf b/logrotate.d/dnf new file mode 100644 index 0000000..0ce2629 --- /dev/null +++ b/logrotate.d/dnf @@ -0,0 +1,7 @@ +/var/log/hawkey.log { + missingok + notifempty + rotate 4 + weekly + create +} diff --git a/logrotate.d/firewalld b/logrotate.d/firewalld new file mode 100644 index 0000000..e038fd5 --- /dev/null +++ b/logrotate.d/firewalld @@ -0,0 +1,7 @@ +/var/log/firewalld { + weekly + missingok + rotate 4 + copytruncate + minsize 1M +} diff --git a/logrotate.d/kvm_stat b/logrotate.d/kvm_stat new file mode 100644 index 0000000..105e15e --- /dev/null +++ b/logrotate.d/kvm_stat @@ -0,0 +1,11 @@ +/var/log/kvm_stat.csv { + size 10M + missingok + compress + maxage 30 + rotate 5 + nodateext + postrotate + /usr/bin/systemctl try-restart kvm_stat.service + endscript +} diff --git a/logrotate.d/redis b/logrotate.d/redis new file mode 100644 index 0000000..3a3d185 --- /dev/null +++ b/logrotate.d/redis @@ -0,0 +1,9 @@ +/var/log/redis/*.log { + weekly + rotate 10 + copytruncate + delaycompress + compress + notifempty + missingok +} diff --git a/logrotate.d/rsyslog b/logrotate.d/rsyslog new file mode 100644 index 0000000..db85401 --- /dev/null +++ b/logrotate.d/rsyslog @@ -0,0 +1,12 @@ +/var/log/cron +/var/log/maillog +/var/log/messages +/var/log/secure +/var/log/spooler +{ + missingok + sharedscripts + postrotate + /usr/bin/systemctl -s HUP kill rsyslog.service >/dev/null 2>&1 || true + endscript +} diff --git a/logrotate.d/sssd b/logrotate.d/sssd new file mode 100644 index 0000000..6e76945 --- /dev/null +++ b/logrotate.d/sssd @@ -0,0 +1,13 @@ +/var/log/sssd/*.log { + weekly + missingok + notifempty + sharedscripts + rotate 2 + compress + delaycompress + postrotate + /bin/kill -HUP `cat /var/run/sssd.pid 2>/dev/null` 2> /dev/null || true + /bin/pkill -HUP sssd_kcm 2> /dev/null || true + endscript +} diff --git a/logrotate.d/wtmp b/logrotate.d/wtmp new file mode 100644 index 0000000..cc8a151 --- /dev/null +++ b/logrotate.d/wtmp @@ -0,0 +1,8 @@ +# no packages own wtmp -- we'll rotate it here +/var/log/wtmp { + missingok + monthly + create 0664 root utmp + minsize 1M + rotate 1 +} diff --git a/lvm/backup/rl b/lvm/backup/rl new file mode 100644 index 0000000..b856df1 --- /dev/null +++ b/lvm/backup/rl @@ -0,0 +1,144 @@ +# Generated by LVM2 version 2.03.15(2)-git (2021-10-20): Thu Nov 17 08:04:47 2022 + +contents = "Text Format Volume Group" +version = 1 + +description = "Created *after* executing 'vgchange -aay --autoactivation event rl'" + +creation_host = "localhost" # Linux localhost 5.14.0-70.13.1.el9_0.x86_64 #1 SMP PREEMPT Wed May 25 21:01:57 UTC 2022 x86_64 +creation_time = 1668668687 # Thu Nov 17 08:04:47 2022 + +rl { + id = "M06jPV-RAti-hOyj-iw0O-YMVv-3Eo8-fWXsJj" + seqno = 6 + format = "lvm2" # informational + status = ["RESIZEABLE", "READ", "WRITE"] + flags = [] + extent_size = 8192 # 4 Megabytes + max_lv = 0 + max_pv = 0 + metadata_copies = 0 + + physical_volumes { + + pv0 { + id = "yDK5un-gWse-c5Fz-veXb-0DF6-aajv-UeB1Lf" + device = "/dev/vda1" # Hint only + + status = ["ALLOCATABLE"] + flags = [] + dev_size = 46153728 # 22.0078 Gigabytes + pe_start = 2048 + pe_count = 5633 # 22.0039 Gigabytes + } + } + + logical_volumes { + + root { + id = "3XBiaG-bY6J-Bv8p-b6ri-0VjV-kjiJ-Liuh3A" + status = ["READ", "WRITE", "VISIBLE"] + flags = [] + creation_time = 1668668042 # 2022-11-17 07:54:02 +0100 + creation_host = "localhost.localdomain" + segment_count = 1 + + segment1 { + start_extent = 0 + extent_count = 2560 # 10 Gigabytes + + type = "striped" + stripe_count = 1 # linear + + stripes = [ + "pv0", 0 + ] + } + } + + swap { + id = "wFcrSJ-EdK8-pKl3-XxWN-2UGW-F27g-uQRjo0" + status = ["READ", "WRITE", "VISIBLE"] + flags = [] + creation_time = 1668668042 # 2022-11-17 07:54:02 +0100 + creation_host = "localhost.localdomain" + segment_count = 1 + + segment1 { + start_extent = 0 + extent_count = 512 # 2 Gigabytes + + type = "striped" + stripe_count = 1 # linear + + stripes = [ + "pv0", 2560 + ] + } + } + + home { + id = "7ajTAb-2m4D-LyOO-2ilA-InCQ-9Caf-LgPvKt" + status = ["READ", "WRITE", "VISIBLE"] + flags = [] + creation_time = 1668668043 # 2022-11-17 07:54:03 +0100 + creation_host = "localhost.localdomain" + segment_count = 1 + + segment1 { + start_extent = 0 + extent_count = 1024 # 4 Gigabytes + + type = "striped" + stripe_count = 1 # linear + + stripes = [ + "pv0", 3072 + ] + } + } + + var { + id = "i1yrYv-KlLN-8R3r-Vkpf-x0wt-XUKO-CKmgjW" + status = ["READ", "WRITE", "VISIBLE"] + flags = [] + creation_time = 1668668043 # 2022-11-17 07:54:03 +0100 + creation_host = "localhost.localdomain" + segment_count = 1 + + segment1 { + start_extent = 0 + extent_count = 1280 # 5 Gigabytes + + type = "striped" + stripe_count = 1 # linear + + stripes = [ + "pv0", 4096 + ] + } + } + + opt { + id = "oVToFt-pmSu-j9oh-jFj9-HIVv-jrgS-FIx7ex" + status = ["READ", "WRITE", "VISIBLE"] + flags = [] + creation_time = 1668668043 # 2022-11-17 07:54:03 +0100 + creation_host = "localhost.localdomain" + segment_count = 1 + + segment1 { + start_extent = 0 + extent_count = 256 # 1024 Megabytes + + type = "striped" + stripe_count = 1 # linear + + stripes = [ + "pv0", 5376 + ] + } + } + } + +} diff --git a/lvm/devices/backup/system.devices-20241125.150254.0004 b/lvm/devices/backup/system.devices-20241125.150254.0004 new file mode 100644 index 0000000..ec3153b --- /dev/null +++ b/lvm/devices/backup/system.devices-20241125.150254.0004 @@ -0,0 +1,6 @@ +# LVM uses devices listed in this file. +# Created by LVM command vgs pid 38273 at Mon Nov 25 15:02:54 2024 +# HASH=1299171089 +PRODUCT_UUID=7676f318-2b9a-4d6f-9762-bbae648d6b8c +VERSION=1.1.4 +IDTYPE=devname IDNAME=/dev/vda1 DEVNAME=/dev/vda1 PVID=yDK5ungWsec5FzveXb0DF6aajvUeB1Lf PART=1 diff --git a/lvm/devices/system.devices b/lvm/devices/system.devices new file mode 100644 index 0000000..ec3153b --- /dev/null +++ b/lvm/devices/system.devices @@ -0,0 +1,6 @@ +# LVM uses devices listed in this file. +# Created by LVM command vgs pid 38273 at Mon Nov 25 15:02:54 2024 +# HASH=1299171089 +PRODUCT_UUID=7676f318-2b9a-4d6f-9762-bbae648d6b8c +VERSION=1.1.4 +IDTYPE=devname IDNAME=/dev/vda1 DEVNAME=/dev/vda1 PVID=yDK5ungWsec5FzveXb0DF6aajvUeB1Lf PART=1 diff --git a/lvm/lvm.conf b/lvm/lvm.conf new file mode 100644 index 0000000..170241b --- /dev/null +++ b/lvm/lvm.conf @@ -0,0 +1,2504 @@ +# This is an example configuration file for the LVM2 system. +# It contains the default settings that would be used if there was no +# /etc/lvm/lvm.conf file. +# +# Refer to 'man lvm.conf' for further information including the file layout. +# +# Refer to 'man lvm.conf' for information about how settings configured in +# this file are combined with built-in values and command line options to +# arrive at the final values used by LVM. +# +# Refer to 'man lvmconfig' for information about displaying the built-in +# and configured values used by LVM. +# +# If a default value is set in this file (not commented out), then a +# new version of LVM using this file will continue using that value, +# even if the new version of LVM changes the built-in default value. +# +# To put this file in a different directory and override /etc/lvm set +# the environment variable LVM_SYSTEM_DIR before running the tools. +# +# N.B. Take care that each setting only appears once if uncommenting +# example settings in this file. + + +# Configuration section config. +# How LVM configuration settings are handled. +config { + + # Configuration option config/checks. + # If enabled, any LVM configuration mismatch is reported. + # This implies checking that the configuration key is understood by + # LVM and that the value of the key is the proper type. If disabled, + # any configuration mismatch is ignored and the default value is used + # without any warning (a message about the configuration key not being + # found is issued in verbose mode only). + # This configuration option has an automatic default value. + # checks = 1 + + # Configuration option config/abort_on_errors. + # Abort the LVM process if a configuration mismatch is found. + # This configuration option has an automatic default value. + # abort_on_errors = 0 + + # Configuration option config/profile_dir. + # Directory where LVM looks for configuration profiles. + # This configuration option has an automatic default value. + # profile_dir = "/etc/lvm/profile" +} + +# Configuration section devices. +# How LVM uses block devices. +devices { + + # Configuration option devices/dir. + # Directory in which to create volume group device nodes. + # Commands also accept this as a prefix on volume group names. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # dir = "/dev" + + # Configuration option devices/scan. + # Directories containing device nodes to use with LVM. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # scan = [ "/dev" ] + + # Configuration option devices/obtain_device_list_from_udev. + # Obtain the list of available devices from udev. + # This avoids opening or using any inapplicable non-block devices or + # subdirectories found in the udev directory. Any device node or + # symlink not managed by udev in the udev directory is ignored. This + # setting applies only to the udev-managed device directory; other + # directories will be scanned fully. LVM needs to be compiled with + # udev support for this setting to apply. + # This configuration option has an automatic default value. + # obtain_device_list_from_udev = 0 + + # Configuration option devices/external_device_info_source. + # Enable device information from udev. + # If set to "udev", lvm will supplement its own native device information + # with information from libudev. This can potentially improve the detection + # of MD component devices and multipath component devices. + # This configuration option has an automatic default value. + # external_device_info_source = "none" + + # Configuration option devices/hints. + # Use a local file to remember which devices have PVs on them. + # Some commands will use this as an optimization to reduce device + # scanning, and will only scan the listed PVs. Removing the hint file + # will cause lvm to generate a new one. Disable hints if PVs will + # be copied onto devices using non-lvm commands, like dd. + # + # Accepted values: + # all + # Use all hints. + # none + # Use no hints. + # + # This configuration option has an automatic default value. + # hints = "all" + + # Configuration option devices/preferred_names. + # Select which path name to display for a block device. + # If multiple path names exist for a block device, and LVM needs to + # display a name for the device, the path names are matched against + # each item in this list of regular expressions. The first match is + # used. Try to avoid using undescriptive /dev/dm-N names, if present. + # If no preferred name matches, or if preferred_names are not defined, + # the following built-in preferences are applied in order until one + # produces a preferred name: + # Prefer names with path prefixes in the order of: + # /dev/mapper, /dev/disk, /dev/dm-*, /dev/block. + # Prefer the name with the least number of slashes. + # Prefer a name that is a symlink. + # Prefer the path with least value in lexicographical order. + # + # Example + # preferred_names = [ "^/dev/mpath/", "^/dev/mapper/mpath", "^/dev/[hs]d" ] + # + # This configuration option does not have a default value defined. + + # Configuration option devices/use_devicesfile. + # Enable or disable the use of a devices file. + # When enabled, lvm will only use devices that + # are lised in the devices file. A devices file will + # be used, regardless of this setting, when the --devicesfile + # option is set to a specific file name. + # This configuration option has an automatic default value. + # use_devicesfile = 1 + + # Configuration option devices/devicesfile. + # The name of the system devices file, listing devices that LVM should use. + # This should not be used to select a non-system devices file. + # The --devicesfile option is intended for alternative devices files. + # This configuration option has an automatic default value. + # devicesfile = "system.devices" + + # Configuration option devices/devicesfile_backup_limit. + # The max number of backup files to keep in /etc/lvm/devices/backup. + # LVM creates a backup of the devices file each time a new + # version is created, or each time a modification is detected. + # When the max number of backups is reached, the oldest are + # removed to remain at the limit. Set to 0 to disable backups. + # Only the system devices file is backed up. + # This configuration option has an automatic default value. + # devicesfile_backup_limit = 50 + + # Configuration option devices/search_for_devnames. + # Look outside of the devices file for missing devname entries. + # A devname entry is used for a device that does not have a stable + # device id, e.g. wwid, so the unstable device name is used as + # the device id. After reboot, or if the device is reattached, + # the device name may change, in which case lvm will not find + # the expected PV on the device listed in the devices file. + # This setting controls whether lvm will search other devices, + # outside the devices file, to look for the missing PV on a + # renamed device. If "none", lvm will not look at other devices, + # and the PV may appear to be missing. If "auto", lvm will look + # at other devices, but only those that are likely to have the PV. + # If "all", lvm will look at all devices on the system. + # This configuration option has an automatic default value. + # search_for_devnames = "all" + + # Configuration option devices/device_ids_refresh. + # Find PVs on new devices and update the device IDs in the devices file. + # If PVs are restored or moved to a new system with new devices, but + # an old system.devices remains with old device IDs, then search for + # the PVIDs on new devices and update the device IDs in system.devices. + # The original device IDs must also not be found on the new system. + # See device_ids_refresh_check for conditions that trigger the refresh. + # This configuration option has an automatic default value. + # device_ids_refresh = 1 + + # Configuration option devices/device_ids_refresh_checks. + # Conditions that trigger device_ids_refresh to locate PVIDs on new devices. + # product_uuid: refresh if /sys/devices/virtual/dmi/id/product_uuid does not + # match the value saved in system.devices. + # hostname: refresh if hostname does not match the value saved in system.devices. + # (hostname is used if product_uuid is not available.) + # Remove values from this list to prevent lvm from using them. + # This configuration option has an automatic default value. + # device_ids_refresh_checks = [ "product_uuid", "hostname" ] + + # Configuration option devices/filter. + # Limit the block devices that are used by LVM commands. + # This is a list of regular expressions used to accept or reject block + # device path names. Each regex is delimited by a vertical bar '|' + # (or any character) and is preceded by 'a' to accept the path, or + # by 'r' to reject the path. The first regex in the list to match the + # path is used, producing the 'a' or 'r' result for the device. + # When multiple path names exist for a block device, if any path name + # matches an 'a' pattern before an 'r' pattern, then the device is + # accepted. If all the path names match an 'r' pattern first, then the + # device is rejected. Unmatching path names do not affect the accept + # or reject decision. If no path names for a device match a pattern, + # then the device is accepted. Be careful mixing 'a' and 'r' patterns, + # as the combination might produce unexpected results (test changes.) + # Run vgscan after changing the filter to regenerate the cache. + # + # Example + # Accept every block device: + # filter = [ "a|.*|" ] + # Reject the cdrom drive: + # filter = [ "r|/dev/cdrom|" ] + # Work with just loopback devices, e.g. for testing: + # filter = [ "a|loop|", "r|.*|" ] + # Accept all loop devices and ide drives except hdc: + # filter = [ "a|loop|", "r|/dev/hdc|", "a|/dev/ide|", "r|.*|" ] + # Use anchors to be very specific: + # filter = [ "a|^/dev/hda8$|", "r|.*|" ] + # + # This configuration option has an automatic default value. + # filter = [ "a|.*|" ] + + # Configuration option devices/global_filter. + # Limit the block devices that are used by LVM system components. + # Because devices/filter may be overridden from the command line, it is + # not suitable for system-wide device filtering, e.g. udev. + # Use global_filter to hide devices from these LVM system components. + # The syntax is the same as devices/filter. Devices rejected by + # global_filter are not opened by LVM. + # This configuration option has an automatic default value. + # global_filter = [ "a|.*|" ] + + # Configuration option devices/types. + # List of additional acceptable block device types. + # These are of device type names from /proc/devices, followed by the + # maximum number of partitions. + # + # Example + # types = [ "fd", 16 ] + # + # This configuration option is advanced. + # This configuration option does not have a default value defined. + + # Configuration option devices/sysfs_scan. + # Restrict device scanning to block devices appearing in sysfs. + # This is a quick way of filtering out block devices that are not + # present on the system. sysfs must be part of the kernel and mounted.) + # This configuration option has an automatic default value. + # sysfs_scan = 1 + + # Configuration option devices/scan_lvs. + # Allow LVM LVs to be used as PVs. When enabled, LVM commands will + # scan active LVs to look for other PVs. Caution is required to + # avoid using PVs that belong to guest images stored on LVs. + # When enabled, the LVs scanned should be restricted using the + # devices file or the filter. This option does not enable autoactivation + # of layered VGs, which requires editing LVM udev rules (see LVM_PVSCAN_ON_LVS.) + # This configuration option has an automatic default value. + # scan_lvs = 0 + + # Configuration option devices/multipath_component_detection. + # Ignore devices that are components of DM multipath devices. + # This configuration option has an automatic default value. + # multipath_component_detection = 1 + + # Configuration option devices/multipath_wwids_file. + # The path to the multipath wwids file used for multipath component detection. + # Set this to an empty string to disable the use of the multipath wwids file. + # This configuration option has an automatic default value. + # multipath_wwids_file = "/etc/multipath/wwids" + + # Configuration option devices/md_component_detection. + # Enable detection and exclusion of MD component devices. + # An MD component device is a block device that MD uses as part + # of a software RAID virtual device. When an LVM PV is created + # on an MD device, LVM must only use the top level MD device as + # the PV, and should ignore the underlying component devices. + # In cases where the MD superblock is located at the end of the + # component devices, it is more difficult for LVM to consistently + # identify an MD component, see the md_component_checks setting. + # This configuration option has an automatic default value. + # md_component_detection = 1 + + # Configuration option devices/md_component_checks. + # The checks LVM should use to detect MD component devices. + # MD component devices are block devices used by MD software RAID. + # + # Accepted values: + # auto + # LVM will skip scanning the end of devices when it has other + # indications that the device is not an MD component. + # start + # LVM will only scan the start of devices for MD superblocks. + # This does not incur extra I/O by LVM. + # full + # LVM will scan the start and end of devices for MD superblocks. + # This requires an extra read at the end of devices. + # + # This configuration option has an automatic default value. + # md_component_checks = "auto" + + # Configuration option devices/fw_raid_component_detection. + # Ignore devices that are components of firmware RAID devices. + # LVM must use an external_device_info_source other than none for this + # detection to execute. + # This configuration option has an automatic default value. + # fw_raid_component_detection = 0 + + # Configuration option devices/md_chunk_alignment. + # Align the start of a PV data area with md device's stripe-width. + # This applies if a PV is placed directly on an md device. + # default_data_alignment will be overridden if it is not aligned + # with the value detected for this setting. + # This setting is overridden by data_alignment_detection, + # data_alignment, and the --dataalignment option. + # This configuration option has an automatic default value. + # md_chunk_alignment = 1 + + # Configuration option devices/default_data_alignment. + # Align the start of a PV data area with this number of MiB. + # Set to 1 for 1MiB, 2 for 2MiB, etc. Set to 0 to disable. + # This setting is overridden by data_alignment and the --dataalignment + # option. + # This configuration option has an automatic default value. + # default_data_alignment = 1 + + # Configuration option devices/data_alignment_detection. + # Align the start of a PV data area with sysfs io properties. + # The start of a PV data area will be a multiple of minimum_io_size or + # optimal_io_size exposed in sysfs. minimum_io_size is the smallest + # request the device can perform without incurring a read-modify-write + # penalty, e.g. MD chunk size. optimal_io_size is the device's + # preferred unit of receiving I/O, e.g. MD stripe width. + # minimum_io_size is used if optimal_io_size is undefined (0). + # If md_chunk_alignment is enabled, that detects the optimal_io_size. + # default_data_alignment and md_chunk_alignment will be overridden + # if they are not aligned with the value detected for this setting. + # This setting is overridden by data_alignment and the --dataalignment + # option. + # This configuration option has an automatic default value. + # data_alignment_detection = 1 + + # Configuration option devices/data_alignment. + # Align the start of a PV data area with this number of KiB. + # When non-zero, this setting overrides default_data_alignment. + # Set to 0 to disable, in which case default_data_alignment + # is used to align the first PE in units of MiB. + # This setting is overridden by the --dataalignment option. + # This configuration option has an automatic default value. + # data_alignment = 0 + + # Configuration option devices/data_alignment_offset_detection. + # Shift the start of an aligned PV data area based on sysfs information. + # After a PV data area is aligned, it will be shifted by the + # alignment_offset exposed in sysfs. This offset is often 0, but may + # be non-zero. Certain 4KiB sector drives that compensate for windows + # partitioning will have an alignment_offset of 3584 bytes (sector 7 + # is the lowest aligned logical block, the 4KiB sectors start at + # LBA -1, and consequently sector 63 is aligned on a 4KiB boundary). + # This setting is overridden by the --dataalignmentoffset option. + # This configuration option has an automatic default value. + # data_alignment_offset_detection = 1 + + # Configuration option devices/ignore_suspended_devices. + # Ignore DM devices that have I/O suspended while scanning devices. + # Otherwise, LVM waits for a suspended device to become accessible. + # This should only be needed in recovery situations. + # This configuration option has an automatic default value. + # ignore_suspended_devices = 0 + + # Configuration option devices/ignore_lvm_mirrors. + # Do not scan 'mirror' LVs to avoid possible deadlocks. + # This avoids possible deadlocks when using the 'mirror' segment type. + # This setting determines whether LVs using the 'mirror' segment type + # are scanned for LVM labels. This affects the ability of mirrors to + # be used as physical volumes. If this setting is enabled, it is + # impossible to create VGs on top of mirror LVs, i.e. to stack VGs on + # mirror LVs. If this setting is disabled, allowing mirror LVs to be + # scanned, it may cause LVM processes and I/O to the mirror to become + # blocked. This is due to the way that the mirror segment type handles + # failures. In order for the hang to occur, an LVM command must be run + # just after a failure and before the automatic LVM repair process + # takes place, or there must be failures in multiple mirrors in the + # same VG at the same time with write failures occurring moments before + # a scan of the mirror's labels. The 'mirror' scanning problems do not + # apply to LVM RAID types like 'raid1' which handle failures in a + # different way, making them a better choice for VG stacking. + # This configuration option has an automatic default value. + # ignore_lvm_mirrors = 1 + + # Configuration option devices/require_restorefile_with_uuid. + # Allow use of pvcreate --uuid without requiring --restorefile. + # This configuration option has an automatic default value. + # require_restorefile_with_uuid = 1 + + # Configuration option devices/pv_min_size. + # Minimum size in KiB of block devices which can be used as PVs. + # In a clustered environment all nodes must use the same value. + # Any value smaller than 512KiB is ignored. The previous built-in + # value was 512. + # This configuration option has an automatic default value. + # pv_min_size = 2048 + + # Configuration option devices/issue_discards. + # Issue discards to PVs that are no longer used by an LV. + # Discards are sent to an LV's underlying physical volumes when the LV + # is no longer using the physical volumes' space, e.g. lvremove, + # lvreduce. Discards inform the storage that a region is no longer + # used. Storage that supports discards advertise the protocol-specific + # way discards should be issued by the kernel (TRIM, UNMAP, or + # WRITE SAME with UNMAP bit set). Not all storage will support or + # benefit from discards, but SSDs and thinly provisioned LUNs + # generally do. If enabled, discards will only be issued if both the + # storage and kernel provide support. + # This configuration option has an automatic default value. + # issue_discards = 0 + + # Configuration option devices/allow_changes_with_duplicate_pvs. + # Allow VG modification while a PV appears on multiple devices. + # When a PV appears on multiple devices, LVM attempts to choose the + # best device to use for the PV. If the devices represent the same + # underlying storage, the choice has minimal consequence. If the + # devices represent different underlying storage, the wrong choice + # can result in data loss if the VG is modified. Disabling this + # setting is the safest option because it prevents modifying a VG + # or activating LVs in it while a PV appears on multiple devices. + # Enabling this setting allows the VG to be used as usual even with + # uncertain devices. + # This configuration option has an automatic default value. + # allow_changes_with_duplicate_pvs = 0 + + # Configuration option devices/allow_mixed_block_sizes. + # Allow PVs in the same VG with different logical block sizes. + # When allowed, the user is responsible to ensure that an LV is + # using PVs with matching block sizes when necessary. + # This configuration option has an automatic default value. + # allow_mixed_block_sizes = 0 +} + +# Configuration section allocation. +# How LVM selects space and applies properties to LVs. +allocation { + + # Configuration option allocation/cling_tag_list. + # Advise LVM which PVs to use when searching for new space. + # When searching for free space to extend an LV, the 'cling' allocation + # policy will choose space on the same PVs as the last segment of the + # existing LV. If there is insufficient space and a list of tags is + # defined here, it will check whether any of them are attached to the + # PVs concerned and then seek to match those PV tags between existing + # extents and new extents. + # + # Example + # Use the special tag "@*" as a wildcard to match any PV tag: + # cling_tag_list = [ "@*" ] + # LVs are mirrored between two sites within a single VG, and + # PVs are tagged with either @site1 or @site2 to indicate where + # they are situated: + # cling_tag_list = [ "@site1", "@site2" ] + # + # This configuration option does not have a default value defined. + + # Configuration option allocation/maximise_cling. + # Use a previous allocation algorithm. + # Changes made in version 2.02.85 extended the reach of the 'cling' + # policies to detect more situations where data can be grouped onto + # the same disks. This setting can be used to disable the changes + # and revert to the previous algorithm. + # This configuration option has an automatic default value. + # maximise_cling = 1 + + # Configuration option allocation/use_blkid_wiping. + # Use blkid to detect and erase existing signatures on new PVs and LVs. + # The blkid library can detect more signatures than the native LVM + # detection code, but may take longer. LVM needs to be compiled with + # blkid wiping support for this setting to apply. LVM native detection + # code is currently able to recognize: MD device signatures, + # swap signature, and LUKS signatures. To see the list of signatures + # recognized by blkid, check the output of the 'blkid -k' command. + # This configuration option has an automatic default value. + # use_blkid_wiping = 1 + + # Configuration option allocation/wipe_signatures_when_zeroing_new_lvs. + # Look for and erase any signatures while zeroing a new LV. + # The --wipesignatures option overrides this setting. + # Zeroing is controlled by the -Z/--zero option, and if not specified, + # zeroing is used by default if possible. Zeroing simply overwrites the + # first 4KiB of a new LV with zeroes and does no signature detection or + # wiping. Signature wiping goes beyond zeroing and detects exact types + # and positions of signatures within the whole LV. It provides a + # cleaner LV after creation as all known signatures are wiped. The LV + # is not claimed incorrectly by other tools because of old signatures + # from previous use. The number of signatures that LVM can detect + # depends on the detection code that is selected (see + # use_blkid_wiping.) Wiping each detected signature must be confirmed. + # When this setting is disabled, signatures on new LVs are not detected + # or erased unless the --wipesignatures option is used directly. + # This configuration option has an automatic default value. + # wipe_signatures_when_zeroing_new_lvs = 1 + + # Configuration option allocation/mirror_logs_require_separate_pvs. + # Mirror logs and images will always use different PVs. + # The default setting changed in version 2.02.85. + # This configuration option has an automatic default value. + # mirror_logs_require_separate_pvs = 0 + + # Configuration option allocation/raid_stripe_all_devices. + # Stripe across all PVs when RAID stripes are not specified. + # If enabled, all PVs in the VG or on the command line are used for + # raid0/4/5/6/10 when the command does not specify the number of + # stripes to use. + # This was the default behaviour until release 2.02.162. + # This configuration option has an automatic default value. + # raid_stripe_all_devices = 0 + + # Configuration option allocation/cache_pool_metadata_require_separate_pvs. + # Cache pool metadata and data will always use different PVs. + # This configuration option has an automatic default value. + # cache_pool_metadata_require_separate_pvs = 0 + + # Configuration option allocation/cache_metadata_format. + # Sets default metadata format for new cache. + # + # Accepted values: + # 0 Automatically detected best available format + # 1 Original format + # 2 Improved 2nd. generation format + # + # This configuration option has an automatic default value. + # cache_metadata_format = 0 + + # Configuration option allocation/cache_mode. + # The default cache mode used for new cache. + # + # Accepted values: + # writethrough + # Data blocks are immediately written from the cache to disk. + # writeback + # Data blocks are written from the cache back to disk after some + # delay to improve performance. + # + # This setting replaces allocation/cache_pool_cachemode. + # This configuration option has an automatic default value. + # cache_mode = "writethrough" + + # Configuration option allocation/cache_policy. + # The default cache policy used for new cache volume. + # Since kernel 4.2 the default policy is smq (Stochastic multiqueue), + # otherwise the older mq (Multiqueue) policy is selected. + # This configuration option does not have a default value defined. + + # Configuration section allocation/cache_settings. + # Settings for the cache policy. + # See documentation for individual cache policies for more info. + # This configuration section has an automatic default value. + # cache_settings { + # } + + # Configuration option allocation/cache_pool_chunk_size. + # The minimal chunk size in KiB for cache pool volumes. + # Using a chunk_size that is too large can result in wasteful use of + # the cache, where small reads and writes can cause large sections of + # an LV to be mapped into the cache. However, choosing a chunk_size + # that is too small can result in more overhead trying to manage the + # numerous chunks that become mapped into the cache. The former is + # more of a problem than the latter in most cases, so the default is + # on the smaller end of the spectrum. Supported values range from + # 32KiB to 1GiB in multiples of 32. + # This configuration option does not have a default value defined. + + # Configuration option allocation/cache_pool_max_chunks. + # The maximum number of chunks in a cache pool. + # For cache target v1.9 the recommended maximumm is 1000000 chunks. + # Using cache pool with more chunks may degrade cache performance. + # This configuration option does not have a default value defined. + + # Configuration option allocation/thin_pool_metadata_require_separate_pvs. + # Thin pool metadata and data will always use different PVs. + # This configuration option has an automatic default value. + # thin_pool_metadata_require_separate_pvs = 0 + + # Configuration option allocation/thin_pool_crop_metadata. + # Older version of lvm2 cropped pool's metadata size to 15.81 GiB. + # This is slightly less then the actual maximum 15.88 GiB. + # For compatibility with older version and use of cropped size set to 1. + # This configuration option has an automatic default value. + # thin_pool_crop_metadata = 0 + + # Configuration option allocation/thin_pool_zero. + # Thin pool data chunks are zeroed before they are first used. + # Zeroing with a larger thin pool chunk size reduces performance. + # This configuration option has an automatic default value. + # thin_pool_zero = 1 + + # Configuration option allocation/thin_pool_discards. + # The discards behaviour of thin pool volumes. + # + # Accepted values: + # ignore + # nopassdown + # passdown + # + # This configuration option has an automatic default value. + # thin_pool_discards = "passdown" + + # Configuration option allocation/thin_pool_chunk_size_policy. + # The chunk size calculation policy for thin pool volumes. + # + # Accepted values: + # generic + # If thin_pool_chunk_size is defined, use it. Otherwise, calculate + # the chunk size based on estimation and device hints exposed in + # sysfs - the minimum_io_size. The chunk size is always at least + # 64KiB. + # performance + # If thin_pool_chunk_size is defined, use it. Otherwise, calculate + # the chunk size for performance based on device hints exposed in + # sysfs - the optimal_io_size. The chunk size is always at least + # 512KiB. + # + # This configuration option has an automatic default value. + # thin_pool_chunk_size_policy = "generic" + + # Configuration option allocation/zero_metadata. + # Zero whole metadata area before use with thin or cache pool. + # This configuration option has an automatic default value. + # zero_metadata = 1 + + # Configuration option allocation/thin_pool_chunk_size. + # The minimal chunk size in KiB for thin pool volumes. + # Larger chunk sizes may improve performance for plain thin volumes, + # however using them for snapshot volumes is less efficient, as it + # consumes more space and takes extra time for copying. When unset, + # lvm tries to estimate chunk size starting from 64KiB. Supported + # values are in the range 64KiB to 1GiB. + # This configuration option does not have a default value defined. + + # Configuration option allocation/physical_extent_size. + # Default physical extent size in KiB to use for new VGs. + # This configuration option has an automatic default value. + # physical_extent_size = 4096 + + # Configuration option allocation/vdo_use_compression. + # Enables or disables compression when creating a VDO volume. + # Compression may be disabled if necessary to maximize performance + # or to speed processing of data that is unlikely to compress. + # This configuration option has an automatic default value. + # vdo_use_compression = 1 + + # Configuration option allocation/vdo_use_deduplication. + # Enables or disables deduplication when creating a VDO volume. + # Deduplication may be disabled in instances where data is not expected + # to have good deduplication rates but compression is still desired. + # This configuration option has an automatic default value. + # vdo_use_deduplication = 1 + + # Configuration option allocation/vdo_use_metadata_hints. + # Enables or disables whether VDO volume should tag its latency-critical + # writes with the REQ_SYNC flag. Some device mapper targets such as dm-raid5 + # process writes with this flag at a higher priority. + # This configuration option has an automatic default value. + # vdo_use_metadata_hints = 1 + + # Configuration option allocation/vdo_minimum_io_size. + # The minimum IO size for VDO volume to accept, in bytes. + # Valid values are 512 or 4096. The recommended value is 4096. + # This configuration option has an automatic default value. + # vdo_minimum_io_size = 4096 + + # Configuration option allocation/vdo_block_map_cache_size_mb. + # Specifies the amount of memory in MiB allocated for caching block map + # pages for VDO volume. The value must be a multiple of 4096 and must be + # at least 128MiB and less than 16TiB. The cache must be at least 16MiB + # per logical thread. Note that there is a memory overhead of 15%. + # This configuration option has an automatic default value. + # vdo_block_map_cache_size_mb = 128 + + # Configuration option allocation/vdo_block_map_period. + # The speed with which the block map cache writes out modified block map pages. + # A smaller era length is likely to reduce the amount time spent rebuilding, + # at the cost of increased block map writes during normal operation. + # The maximum and recommended value is 16380; the minimum value is 1. + # This configuration option has an automatic default value. + # vdo_block_map_period = 16380 + + # Configuration option allocation/vdo_use_sparse_index. + # Enables sparse indexing for VDO volume. + # This configuration option has an automatic default value. + # vdo_use_sparse_index = 0 + + # Configuration option allocation/vdo_index_memory_size_mb. + # Specifies the amount of index memory in MiB for VDO volume. + # The value must be at least 256MiB and at most 1TiB. + # This configuration option has an automatic default value. + # vdo_index_memory_size_mb = 256 + + # Configuration option allocation/vdo_slab_size_mb. + # Specifies the size in MiB of the increment by which a VDO is grown. + # Using a smaller size constrains the total maximum physical size + # that can be accommodated. Must be a power of two between 128MiB and 32GiB. + # This configuration option has an automatic default value. + # vdo_slab_size_mb = 2048 + + # Configuration option allocation/vdo_ack_threads. + # Specifies the number of threads to use for acknowledging + # completion of requested VDO I/O operations. + # The value must be at in range [0..100]. + # This configuration option has an automatic default value. + # vdo_ack_threads = 1 + + # Configuration option allocation/vdo_bio_threads. + # Specifies the number of threads to use for submitting I/O + # operations to the storage device of VDO volume. + # The value must be in range [1..100]. + # Each additional thread after the first will use an additional 18MiB of RAM, + # plus 1.12 MiB of RAM per megabyte of configured read cache size. + # This configuration option has an automatic default value. + # vdo_bio_threads = 4 + + # Configuration option allocation/vdo_bio_rotation. + # Specifies the number of I/O operations to enqueue for each bio-submission + # thread before directing work to the next. The value must be in range [1..1024]. + # This configuration option has an automatic default value. + # vdo_bio_rotation = 64 + + # Configuration option allocation/vdo_cpu_threads. + # Specifies the number of threads to use for CPU-intensive work such as + # hashing or compression for VDO volume. The value must be in range [1..100]. + # This configuration option has an automatic default value. + # vdo_cpu_threads = 2 + + # Configuration option allocation/vdo_hash_zone_threads. + # Specifies the number of threads across which to subdivide parts of the VDO + # processing based on the hash value computed from the block data. + # The value must be at in range [0..100]. + # vdo_hash_zone_threads, vdo_logical_threads and vdo_physical_threads must be + # either all zero or all non-zero. + # This configuration option has an automatic default value. + # vdo_hash_zone_threads = 1 + + # Configuration option allocation/vdo_logical_threads. + # Specifies the number of threads across which to subdivide parts of the VDO + # processing based on the hash value computed from the block data. + # A logical thread count of 9 or more will require explicitly specifying + # a sufficiently large block map cache size, as well. + # The value must be in range [0..60]. + # vdo_hash_zone_threads, vdo_logical_threads and vdo_physical_threads must be + # either all zero or all non-zero. + # This configuration option has an automatic default value. + # vdo_logical_threads = 1 + + # Configuration option allocation/vdo_physical_threads. + # Specifies the number of threads across which to subdivide parts of the VDO + # processing based on physical block addresses. + # Each additional thread after the first will use an additional 10MiB of RAM. + # The value must be in range [0..16]. + # vdo_hash_zone_threads, vdo_logical_threads and vdo_physical_threads must be + # either all zero or all non-zero. + # This configuration option has an automatic default value. + # vdo_physical_threads = 1 + + # Configuration option allocation/vdo_write_policy. + # Specifies the write policy: + # auto - VDO will check the storage device and determine whether it supports flushes. + # If it does, VDO will run in async mode, otherwise it will run in sync mode. + # sync - Writes are acknowledged only after data is stably written. + # This policy is not supported if the underlying storage is not also synchronous. + # async - Writes are acknowledged after data has been cached for writing to stable storage. + # Data which has not been flushed is not guaranteed to persist in this mode. + # async-unsafe - Writes are handled like 'async' but there is no guarantee of the atomicity async provides. + # This mode should only be used for better performance when atomicity is not required. + # This configuration option has an automatic default value. + # vdo_write_policy = "auto" + + # Configuration option allocation/vdo_max_discard. + # Specified the maximum size of discard bio accepted, in 4096 byte blocks. + # I/O requests to a VDO volume are normally split into 4096-byte blocks, + # and processed up to 2048 at a time. However, discard requests to a VDO volume + # can be automatically split to a larger size, up to 4096-byte blocks + # in a single bio, and are limited to 1500 at a time. + # Increasing this value may provide better overall performance, at the cost of + # increased latency for the individual discard requests. + # The default and minimum is 1. The maximum is UINT_MAX / 4096. + # This configuration option has an automatic default value. + # vdo_max_discard = 1 + + # Configuration option allocation/vdo_pool_header_size. + # Specified the empty header size in KiB at the front and end of vdo pool device. + # This configuration option has an automatic default value. + # vdo_pool_header_size = 512 +} + +# Configuration section log. +# How LVM log information is reported. +log { + + # Configuration option log/report_command_log. + # Enable or disable LVM log reporting. + # If enabled, LVM will collect a log of operations, messages, + # per-object return codes with object identification and associated + # error numbers (errnos) during LVM command processing. Then the + # log is either reported solely or in addition to any existing + # reports, depending on LVM command used. If it is a reporting command + # (e.g. pvs, vgs, lvs, lvm fullreport), then the log is reported in + # addition to any existing reports. Otherwise, there's only log report + # on output. For all applicable LVM commands, you can request that + # the output has only log report by using --logonly command line + # option. Use log/command_log_cols and log/command_log_sort settings + # to define fields to display and sort fields for the log report. + # You can also use log/command_log_selection to define selection + # criteria used each time the log is reported. + # This configuration option has an automatic default value. + # report_command_log = 0 + + # Configuration option log/command_log_sort. + # List of columns to sort by when reporting command log. + # See --logonly --configreport log -o help + # for the list of possible fields. + # This configuration option has an automatic default value. + # command_log_sort = "log_seq_num" + + # Configuration option log/command_log_cols. + # List of columns to report when reporting command log. + # See --logonly --configreport log -o help + # for the list of possible fields. + # This configuration option has an automatic default value. + # command_log_cols = "log_seq_num,log_type,log_context,log_object_type,log_object_name,log_object_id,log_object_group,log_object_group_id,log_message,log_errno,log_ret_code" + + # Configuration option log/command_log_selection. + # Selection criteria used when reporting command log. + # You can define selection criteria that are applied each + # time log is reported. This way, it is possible to control the + # amount of log that is displayed on output and you can select + # only parts of the log that are important for you. To define + # selection criteria, use fields from log report. See also + # --logonly --configreport log -S help for the + # list of possible fields and selection operators. You can also + # define selection criteria for log report on command line directly + # using --configreport log -S + # which has precedence over log/command_log_selection setting. + # For more information about selection criteria in general, see + # lvm(8) man page. + # This configuration option has an automatic default value. + # command_log_selection = "!(log_type=status && message=success)" + + # Configuration option log/verbose. + # Controls the messages sent to stdout or stderr. + # This configuration option has an automatic default value. + # verbose = 0 + + # Configuration option log/silent. + # Suppress all non-essential messages from stdout. + # This has the same effect as -qq. When enabled, the following commands + # still produce output: dumpconfig, lvdisplay, lvmdiskscan, lvs, pvck, + # pvdisplay, pvs, version, vgcfgrestore -l, vgdisplay, vgs. + # Non-essential messages are shifted from log level 4 to log level 5 + # for syslog and lvm2_log_fn purposes. + # Any 'yes' or 'no' questions not overridden by other arguments are + # suppressed and default to 'no'. + # This configuration option has an automatic default value. + # silent = 0 + + # Configuration option log/syslog. + # Send log messages through syslog. + # This configuration option has an automatic default value. + # syslog = 0 + + # Configuration option log/file. + # Write error and debug log messages to a file specified here. + # This configuration option does not have a default value defined. + + # Configuration option log/journal. + # Record lvm information in the systemd journal. + # command: record commands that are run. + # output: record default output from commands. + # debug: record debug messages from commands. + # This configuration option has an automatic default value. + # journal = [ ] + + # Configuration option log/overwrite. + # Overwrite the log file each time the program is run. + # This configuration option has an automatic default value. + # overwrite = 0 + + # Configuration option log/level. + # The level of log messages that are sent to the log file or syslog. + # There are 6 syslog-like log levels currently in use: 2 to 7 inclusive. + # 7 is the most verbose (LOG_DEBUG). + # This configuration option has an automatic default value. + # level = 0 + + # Configuration option log/indent. + # Indent messages according to their severity. + # This configuration option has an automatic default value. + # indent = 0 + + # Configuration option log/command_names. + # Display the command name on each line of output. + # This configuration option has an automatic default value. + # command_names = 0 + + # Configuration option log/prefix. + # A prefix to use before the log message text. + # (After the command name, if selected). + # Two spaces allows you to see/grep the severity of each message. + # To make the messages look similar to the original LVM tools use: + # indent = 0, command_names = 1, prefix = " -- " + # This configuration option has an automatic default value. + # prefix = " " + + # Configuration option log/activation. + # Log messages during activation. + # Don't use this in low memory situations (can deadlock). + # This configuration option has an automatic default value. + # activation = 0 + + # Configuration option log/debug_classes. + # Select log messages by class. + # Some debugging messages are assigned to a class and only appear in + # debug output if the class is listed here. Classes currently + # available: memory, devices, io, activation, allocation, + # metadata, cache, locking, lvmpolld. Use "all" to see everything. + # This configuration option has an automatic default value. + # debug_classes = [ "memory", "devices", "io", "activation", "allocation", "metadata", "cache", "locking", "lvmpolld", "dbus" ] + + # Configuration option log/debug_file_fields. + # The fields included in debug output written to log file. + # Use "all" to include everything (the default). + # This configuration option is advanced. + # This configuration option has an automatic default value. + # debug_file_fields = [ "time", "command", "fileline", "message" ] + + # Configuration option log/debug_output_fields. + # The fields included in debug output written to stderr. + # Use "all" to include everything (the default). + # This configuration option is advanced. + # This configuration option has an automatic default value. + # debug_output_fields = [ "time", "command", "fileline", "message" ] +} + +# Configuration section backup. +# How LVM metadata is backed up and archived. +# In LVM, a 'backup' is a copy of the metadata for the current system, +# and an 'archive' contains old metadata configurations. They are +# stored in a human readable text format. +backup { + + # Configuration option backup/backup. + # Maintain a backup of the current metadata configuration. + # Think very hard before turning this off! + # This configuration option has an automatic default value. + # backup = 1 + + # Configuration option backup/backup_dir. + # Location of the metadata backup files. + # Remember to back up this directory regularly! + # This configuration option has an automatic default value. + # backup_dir = "/etc/lvm/backup" + + # Configuration option backup/archive. + # Maintain an archive of old metadata configurations. + # Think very hard before turning this off. + # This configuration option has an automatic default value. + # archive = 1 + + # Configuration option backup/archive_dir. + # Location of the metadata archive files. + # Remember to back up this directory regularly! + # This configuration option has an automatic default value. + # archive_dir = "/etc/lvm/archive" + + # Configuration option backup/retain_min. + # Minimum number of archives to keep. + # This configuration option has an automatic default value. + # retain_min = 10 + + # Configuration option backup/retain_days. + # Minimum number of days to keep archive files. + # This configuration option has an automatic default value. + # retain_days = 30 +} + +# Configuration section shell. +# Settings for running LVM in shell (readline) mode. +shell { + + # Configuration option shell/history_size. + # Number of lines of history to store in ~/.lvm_history. + # This configuration option has an automatic default value. + # history_size = 100 +} + +# Configuration section global. +# Miscellaneous global LVM settings. +global { + + # Configuration option global/umask. + # The file creation mask for any files and directories created. + # Interpreted as octal if the first digit is zero. + # This configuration option has an automatic default value. + # umask = 077 + + # Configuration option global/test. + # No on-disk metadata changes will be made in test mode. + # Equivalent to having the -t option on every command. + # This configuration option has an automatic default value. + # test = 0 + + # Configuration option global/units. + # Default value for --units argument. + # This configuration option has an automatic default value. + # units = "r" + + # Configuration option global/si_unit_consistency. + # Distinguish between powers of 1024 and 1000 bytes. + # The LVM commands distinguish between powers of 1024 bytes, + # e.g. KiB, MiB, GiB, and powers of 1000 bytes, e.g. KB, MB, GB. + # If scripts depend on the old behaviour, disable this setting + # temporarily until they are updated. + # This configuration option has an automatic default value. + # si_unit_consistency = 1 + + # Configuration option global/suffix. + # Display unit suffix for sizes. + # This setting has no effect if the units are in human-readable form + # (global/units = "h") in which case the suffix is always displayed. + # This configuration option has an automatic default value. + # suffix = 1 + + # Configuration option global/activation. + # Enable/disable communication with the kernel device-mapper. + # Disable to use the tools to manipulate LVM metadata without + # activating any logical volumes. If the device-mapper driver + # is not present in the kernel, disabling this should suppress + # the error messages. + # This configuration option has an automatic default value. + # activation = 1 + + # Configuration option global/proc. + # Location of proc filesystem. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # proc = "" + + # Configuration option global/etc. + # Location of /etc system configuration directory. + # This configuration option has an automatic default value. + # etc = "/etc" + + # Configuration option global/wait_for_locks. + # When disabled, fail if a lock request would block. + # This configuration option has an automatic default value. + # wait_for_locks = 1 + + # Configuration option global/locking_dir. + # Directory to use for LVM command file locks. + # Local non-LV directory that holds file-based locks while commands are + # in progress. A directory like /tmp that may get wiped on reboot is OK. + # This configuration option has an automatic default value. + # locking_dir = "/run/lock/lvm" + + # Configuration option global/prioritise_write_locks. + # Allow quicker VG write access during high volume read access. + # When there are competing read-only and read-write access requests for + # a volume group's metadata, instead of always granting the read-only + # requests immediately, delay them to allow the read-write requests to + # be serviced. Without this setting, write access may be stalled by a + # high volume of read-only requests. This option only affects file locks. + # This configuration option has an automatic default value. + # prioritise_write_locks = 1 + + # Configuration option global/library_dir. + # Search this directory first for shared libraries. + # This configuration option does not have a default value defined. + + # Configuration option global/abort_on_internal_errors. + # Abort a command that encounters an internal error. + # Treat any internal errors as fatal errors, aborting the process that + # encountered the internal error. Please only enable for debugging. + # This configuration option has an automatic default value. + # abort_on_internal_errors = 0 + + # Configuration option global/metadata_read_only. + # No operations that change on-disk metadata are permitted. + # Additionally, read-only commands that encounter metadata in need of + # repair will still be allowed to proceed exactly as if the repair had + # been performed (except for the unchanged vg_seqno). Inappropriate + # use could mess up your system, so seek advice first! + # This configuration option has an automatic default value. + # metadata_read_only = 0 + + # Configuration option global/mirror_segtype_default. + # The segment type used by the short mirroring option -m. + # The --type mirror|raid1 option overrides this setting. + # + # Accepted values: + # mirror + # The original RAID1 implementation from LVM/DM. It is + # characterized by a flexible log solution (core, disk, mirrored), + # and by the necessity to block I/O while handling a failure. + # There is an inherent race in the dmeventd failure handling logic + # with snapshots of devices using this type of RAID1 that in the + # worst case could cause a deadlock. (Also see + # devices/ignore_lvm_mirrors.) + # raid1 + # This is a newer RAID1 implementation using the MD RAID1 + # personality through device-mapper. It is characterized by a + # lack of log options. (A log is always allocated for every + # device and they are placed on the same device as the image, + # so no separate devices are required.) This mirror + # implementation does not require I/O to be blocked while + # handling a failure. This mirror implementation is not + # cluster-aware and cannot be used in a shared (active/active) + # fashion in a cluster. + # + # This configuration option has an automatic default value. + # mirror_segtype_default = "raid1" + + # Configuration option global/support_mirrored_mirror_log. + # Enable mirrored 'mirror' log type for testing. + # + # This type is deprecated to create or convert to but can + # be enabled to test that activation of existing mirrored + # logs and conversion to disk/core works. + # + # Not supported for regular operation! + # This configuration option has an automatic default value. + # support_mirrored_mirror_log = 0 + + # Configuration option global/raid10_segtype_default. + # The segment type used by the -i -m combination. + # The --type raid10|mirror option overrides this setting. + # The --stripes/-i and --mirrors/-m options can both be specified + # during the creation of a logical volume to use both striping and + # mirroring for the LV. There are two different implementations. + # + # Accepted values: + # raid10 + # LVM uses MD's RAID10 personality through DM. This is the + # preferred option. + # mirror + # LVM layers the 'mirror' and 'stripe' segment types. The layering + # is done by creating a mirror LV on top of striped sub-LVs, + # effectively creating a RAID 0+1 array. The layering is suboptimal + # in terms of providing redundancy and performance. + # + # This configuration option has an automatic default value. + # raid10_segtype_default = "raid10" + + # Configuration option global/sparse_segtype_default. + # The segment type used by the -V -L combination. + # The --type snapshot|thin option overrides this setting. + # The combination of -V and -L options creates a sparse LV. There are + # two different implementations. + # + # Accepted values: + # snapshot + # The original snapshot implementation from LVM/DM. It uses an old + # snapshot that mixes data and metadata within a single COW + # storage volume and performs poorly when the size of stored data + # passes hundreds of MB. + # thin + # A newer implementation that uses thin provisioning. It has a + # bigger minimal chunk size (64KiB) and uses a separate volume for + # metadata. It has better performance, especially when more data + # is used. It also supports full snapshots. + # + # This configuration option has an automatic default value. + # sparse_segtype_default = "thin" + + # Configuration option global/lvdisplay_shows_full_device_path. + # Enable this to reinstate the previous lvdisplay name format. + # The default format for displaying LV names in lvdisplay was changed + # in version 2.02.89 to show the LV name and path separately. + # Previously this was always shown as /dev/vgname/lvname even when that + # was never a valid path in the /dev filesystem. + # This configuration option has an automatic default value. + # lvdisplay_shows_full_device_path = 0 + + # Configuration option global/event_activation. + # Disable event based autoactivation commands. + # WARNING: setting this to zero may cause machine startup to fail. + # Previously, setting this to zero would enable static autoactivation + # services (via the lvm2-activation-generator), but the autoactivation + # services and generator have been removed. + # This configuration option has an automatic default value. + # event_activation = 1 + + # Configuration option global/use_aio. + # Use async I/O when reading and writing devices. + # This configuration option has an automatic default value. + # use_aio = 1 + + # Configuration option global/use_lvmlockd. + # Use lvmlockd for locking among hosts using LVM on shared storage. + # Applicable only if LVM is compiled with lockd support in which + # case there is also lvmlockd(8) man page available for more + # information. + # This configuration option has an automatic default value. + # use_lvmlockd = 0 + + # Configuration option global/lvmlockd_lock_retries. + # Retry lvmlockd lock requests this many times. + # Applicable only if LVM is compiled with lockd support + # This configuration option has an automatic default value. + # lvmlockd_lock_retries = 3 + + # Configuration option global/sanlock_lv_extend. + # Size in MiB to extend the internal LV holding sanlock locks. + # The internal LV holds locks for each LV in the VG, and after enough + # LVs have been created, the internal LV needs to be extended. lvcreate + # will automatically extend the internal LV when needed by the amount + # specified here. Setting this to 0 disables the automatic extension + # and can cause lvcreate to fail. Applicable only if LVM is compiled + # with lockd support + # This configuration option has an automatic default value. + # sanlock_lv_extend = 256 + + # Configuration option global/lvmlockctl_kill_command. + # The command that lvmlockctl --kill should use to force LVs offline. + # The lvmlockctl --kill command is run when a shared VG has lost + # access to locks (e.g. when sanlock has lost access to storage.) + # An empty string means that there will be no automatic attempt by + # lvmlockctl --kill to forcibly shut down LVs in the VG, and the user + # can manually intervene as described in lvmlockd(8). + # The VG name will be appended to the command specified here. + # This configuration option has an automatic default value. + # lvmlockctl_kill_command = "" + + # Configuration option global/thin_check_executable. + # The full path to the thin_check command. + # LVM uses this command to check that a thin pool metadata device is in a + # usable state. When a thin pool is activated and after it is + # deactivated, this command is run. Activation will only proceed if + # the command has an exit status of 0. Set to "" to skip this check. + # (Not recommended.) Also see thin_check_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # thin_check_executable = "/usr/sbin/thin_check" + + # Configuration option global/thin_dump_executable. + # The full path to the thin_dump command. + # LVM uses this command to dump thin pool metadata. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # thin_dump_executable = "/usr/sbin/thin_dump" + + # Configuration option global/thin_repair_executable. + # The full path to the thin_repair command. + # LVM uses this command to repair a thin metadata device if it is in + # an unusable state. Also see thin_repair_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # thin_repair_executable = "/usr/sbin/thin_repair" + + # Configuration option global/thin_restore_executable. + # The full path to the thin_restore command. + # LVM uses this command to restore generated data for a thin pool metadata device. + # Also see thin_restore_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # thin_restore_executable = "/usr/sbin/thin_restore" + + # Configuration option global/thin_check_options. + # List of options passed to the thin_check command. + # With thin_check version 2.1 or newer you can add the option + # --ignore-non-fatal-errors to let it pass through ignorable errors + # and fix them later. With thin_check version 3.2 or newer you should + # include the option --clear-needs-check-flag. + # This configuration option has an automatic default value. + # thin_check_options = [ "-q", "--clear-needs-check-flag" ] + + # Configuration option global/thin_repair_options. + # List of options passed to the thin_repair command. + # This configuration option has an automatic default value. + # thin_repair_options = [ "" ] + + # Configuration option global/thin_restore_options. + # List of options passed to the thin_restore command. + # This configuration option has an automatic default value. + # thin_restore_options = [ "" ] + + # Configuration option global/thin_disabled_features. + # Features to not use in the thin driver. + # This can be helpful for testing, or to avoid using a feature that is + # causing problems. Features include: block_size, discards, + # discards_non_power_2, external_origin, metadata_resize, + # external_origin_extend, error_if_no_space. + # + # Example + # thin_disabled_features = [ "discards", "block_size" ] + # + # This configuration option does not have a default value defined. + + # Configuration option global/cache_disabled_features. + # Features to not use in the cache driver. + # This can be helpful for testing, or to avoid using a feature that is + # causing problems. Features include: policy_mq, policy_smq, metadata2. + # + # Example + # cache_disabled_features = [ "policy_smq" ] + # + # This configuration option does not have a default value defined. + + # Configuration option global/cache_check_executable. + # The full path to the cache_check command. + # LVM uses this command to check that a cache metadata device is in a + # usable state. When a cached LV is activated and after it is + # deactivated, this command is run. Activation will only proceed if the + # command has an exit status of 0. Set to "" to skip this check. + # (Not recommended.) Also see cache_check_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # cache_check_executable = "/usr/sbin/cache_check" + + # Configuration option global/cache_dump_executable. + # The full path to the cache_dump command. + # LVM uses this command to dump cache pool metadata. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # cache_dump_executable = "/usr/sbin/cache_dump" + + # Configuration option global/cache_repair_executable. + # The full path to the cache_repair command. + # LVM uses this command to repair a cache metadata device if it is in + # an unusable state. Also see cache_repair_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # cache_repair_executable = "/usr/sbin/cache_repair" + + # Configuration option global/cache_restore_executable. + # The full path to the cache_restore command. + # LVM uses this command to restore generated data for a cache metadata device. + # Also see cache_restore_options. + # (See package device-mapper-persistent-data or thin-provisioning-tools) + # This configuration option has an automatic default value. + # cache_restore_executable = "/usr/sbin/cache_restore" + + # Configuration option global/cache_check_options. + # List of options passed to the cache_check command. + # With cache_check version 5.0 or newer you should include the option + # --clear-needs-check-flag. + # This configuration option has an automatic default value. + # cache_check_options = [ "-q", "--clear-needs-check-flag" ] + + # Configuration option global/cache_repair_options. + # List of options passed to the cache_repair command. + # This configuration option has an automatic default value. + # cache_repair_options = [ "" ] + + # Configuration option global/cache_restore_options. + # List of options passed to the cache_restore command. + # This configuration option has an automatic default value. + # cache_restore_options = [ "" ] + + # Configuration option global/vdo_format_executable. + # The full path to the vdoformat command. + # LVM uses this command to initial data volume for VDO type logical volume + # This configuration option has an automatic default value. + # vdo_format_executable = "/usr/bin/vdoformat" + + # Configuration option global/vdo_format_options. + # List of options passed added to standard vdoformat command. + # This configuration option has an automatic default value. + # vdo_format_options = [ "" ] + + # Configuration option global/vdo_disabled_features. + # Features to not use in the vdo driver. + # This can be helpful for testing, or to avoid using a feature that is + # causing problems. Features include: online_rename, version4 + # + # Example + # vdo_disabled_features = [ "online_rename", "version4" ] + # + # This configuration option does not have a default value defined. + + # Configuration option global/fsadm_executable. + # The full path to the fsadm command. + # LVM uses this command to help with lvresize -r operations. + # This configuration option has an automatic default value. + # fsadm_executable = "/usr/sbin/fsadm" + + # Configuration option global/system_id_source. + # The method LVM uses to set the local system ID. + # Volume Groups can also be given a system ID (by vgcreate, vgchange, + # or vgimport.) A VG on shared storage devices is accessible only to + # the host with a matching system ID. See 'man lvmsystemid' for + # information on limitations and correct usage. + # + # Accepted values: + # none + # The host has no system ID. + # lvmlocal + # Obtain the system ID from the system_id setting in the 'local' + # section of an lvm configuration file, e.g. lvmlocal.conf. + # uname + # Set the system ID from the hostname (uname) of the system. + # System IDs beginning localhost are not permitted. + # appmachineid + # Use an LVM-specific derivation of the local machine-id as the + # system ID. See 'man machine-id'. + # machineid + # Use the contents of the machine-id file to set the system ID. + # (appmachineid is recommended to avoid exposing the confidential + # machine-id.) + # file + # Use the contents of another file (system_id_file) to set the + # system ID. + # + # This configuration option has an automatic default value. + # system_id_source = "none" + + # Configuration option global/system_id_file. + # The full path to the file containing a system ID. + # This is used when system_id_source is set to 'file'. + # Comments starting with the character # are ignored. + # This configuration option does not have a default value defined. + + # Configuration option global/use_lvmpolld. + # Use lvmpolld to supervise long running LVM commands. + # When enabled, control of long running LVM commands is transferred + # from the original LVM command to the lvmpolld daemon. This allows + # the operation to continue independent of the original LVM command. + # After lvmpolld takes over, the LVM command displays the progress + # of the ongoing operation. lvmpolld itself runs LVM commands to + # manage the progress of ongoing operations. lvmpolld can be used as + # a native systemd service, which allows it to be started on demand, + # and to use its own control group. When this option is disabled, LVM + # commands will supervise long running operations by forking themselves. + # Applicable only if LVM is compiled with lvmpolld support. + # This configuration option has an automatic default value. + # use_lvmpolld = 1 + + # Configuration option global/notify_dbus. + # Enable D-Bus notification from LVM commands. + # When enabled, an LVM command that changes PVs, changes VG metadata, + # or changes the activation state of an LV will send a notification. + # This configuration option has an automatic default value. + # notify_dbus = 1 + + # Configuration option global/io_memory_size. + # The amount of memory in KiB that LVM allocates to perform disk io. + # LVM performance may benefit from more io memory when there are many + # disks or VG metadata is large. Increasing this size may be necessary + # when a single copy of VG metadata is larger than the current setting. + # This value should usually not be decreased from the default; setting + # it too low can result in lvm failing to read VGs. + # This configuration option has an automatic default value. + # io_memory_size = 8192 +} + +# Configuration section activation. +activation { + + # Configuration option activation/checks. + # Perform internal checks of libdevmapper operations. + # Useful for debugging problems with activation. Some of the checks may + # be expensive, so it's best to use this only when there seems to be a + # problem. + # This configuration option has an automatic default value. + # checks = 0 + + # Configuration option activation/udev_sync. + # Use udev notifications to synchronize udev and LVM. + # The --noudevsync option overrides this setting. + # When disabled, LVM commands will not wait for notifications from + # udev, but continue irrespective of any possible udev processing in + # the background. Only use this if udev is not running or has rules + # that ignore the devices LVM creates. If enabled when udev is not + # running, and LVM processes are waiting for udev, run the command + # 'dmsetup udevcomplete_all' to wake them up. + # This configuration option has an automatic default value. + # udev_sync = 1 + + # Configuration option activation/udev_rules. + # Use udev rules to manage LV device nodes and symlinks. + # When disabled, LVM will manage the device nodes and symlinks for + # active LVs itself. Manual intervention may be required if this + # setting is changed while LVs are active. + # This configuration option has an automatic default value. + # udev_rules = 1 + + # Configuration option activation/verify_udev_operations. + # Use extra checks in LVM to verify udev operations. + # This enables additional checks (and if necessary, repairs) on entries + # in the device directory after udev has completed processing its + # events. Useful for diagnosing problems with LVM/udev interactions. + # This configuration option has an automatic default value. + # verify_udev_operations = 0 + + # Configuration option activation/retry_deactivation. + # Retry failed LV deactivation. + # If LV deactivation fails, LVM will retry for a few seconds before + # failing. This may happen because a process run from a quick udev rule + # temporarily opened the device. + # This configuration option has an automatic default value. + # retry_deactivation = 1 + + # Configuration option activation/missing_stripe_filler. + # Method to fill missing stripes when activating an incomplete LV. + # Using 'error' will make inaccessible parts of the device return I/O + # errors on access. Using 'zero' will return success (and zero) on I/O + # You can instead use a device path, in which case, + # that device will be used in place of missing stripes. Using anything + # other than 'error' with mirrored or snapshotted volumes is likely to + # result in data corruption. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # missing_stripe_filler = "error" + + # Configuration option activation/use_linear_target. + # Use the linear target to optimize single stripe LVs. + # When disabled, the striped target is used. The linear target is an + # optimised version of the striped target that only handles a single + # stripe. + # This configuration option has an automatic default value. + # use_linear_target = 1 + + # Configuration option activation/reserved_stack. + # Stack size in KiB to reserve for use while devices are suspended. + # Insufficient reserve risks I/O deadlock during device suspension. + # This configuration option has an automatic default value. + # reserved_stack = 64 + + # Configuration option activation/reserved_memory. + # Memory size in KiB to reserve for use while devices are suspended. + # Insufficient reserve risks I/O deadlock during device suspension. + # This configuration option has an automatic default value. + # reserved_memory = 8192 + + # Configuration option activation/process_priority. + # Nice value used while devices are suspended. + # Use a high priority so that LVs are suspended + # for the shortest possible time. + # This configuration option has an automatic default value. + # process_priority = -18 + + # Configuration option activation/volume_list. + # Only LVs selected by this list are activated. + # If this list is defined, an LV is only activated if it matches an + # entry in this list. If this list is undefined, it imposes no limits + # on LV activation (all are allowed). + # + # Accepted values: + # vgname + # The VG name is matched exactly and selects all LVs in the VG. + # vgname/lvname + # The VG name and LV name are matched exactly and selects the LV. + # @tag + # Selects an LV if the specified tag matches a tag set on the LV + # or VG. + # @* + # Selects an LV if a tag defined on the host is also set on the LV + # or VG. See tags/hosttags. If any host tags exist but volume_list + # is not defined, a default single-entry list containing '@*' + # is assumed. + # + # Example + # volume_list = [ "vg1", "vg2/lvol1", "@tag1", "@*" ] + # + # This configuration option does not have a default value defined. + + # Configuration option activation/auto_activation_volume_list. + # A list of VGs or LVs that should be autoactivated. + # Autoactivation is an activation command run with -aay, + # i.e. vgchange -aay, lvchange -aay, or pvscan --cache -aay. + # When this list is defined, an autoactivation command will only + # activate LVs included in the list. If this list is undefined, + # it has no effect. If this list is defined but empty, then no + # LVs will be autoactivated. LVs can be included in the list by + # LV name, VG name (applies to all LVs in the VG), or tag name. + # VGs and LVs can also have an autoactivation property set in + # metadata, see --setautoactivation. LVs included in this list + # will not be autoactivated if the VG or LV autoactivation + # property is disabled (see vgs or lvs "-o autoactivation"). + # The volume_list setting and the "activation skip" property + # also apply to autoactivation. + # The -aay option is meant to be used by activation commands that + # are run automatically by the system, e.g. from systemd services. + # + # Accepted values: + # vgname + # The VG name is matched exactly and selects all LVs in the VG. + # vgname/lvname + # The VG name and LV name are matched exactly and selects the LV. + # @tag + # Selects an LV if the specified tag matches a tag set on the LV + # or VG. + # @* + # Selects an LV if a tag defined on the host is also set on the LV + # or VG. See tags/hosttags. If any host tags exist but volume_list + # is not defined, a default single-entry list containing '@*' + # is assumed. + # + # Example + # auto_activation_volume_list = [ "vg1", "vg2/lvol1", "@tag1", "@*" ] + # + # This configuration option does not have a default value defined. + + # Configuration option activation/read_only_volume_list. + # LVs in this list are activated in read-only mode. + # If this list is defined, each LV that is to be activated is checked + # against this list, and if it matches, it is activated in read-only + # mode. This overrides the permission setting stored in the metadata, + # e.g. from --permission rw. + # + # Accepted values: + # vgname + # The VG name is matched exactly and selects all LVs in the VG. + # vgname/lvname + # The VG name and LV name are matched exactly and selects the LV. + # @tag + # Selects an LV if the specified tag matches a tag set on the LV + # or VG. + # @* + # Selects an LV if a tag defined on the host is also set on the LV + # or VG. See tags/hosttags. If any host tags exist but volume_list + # is not defined, a default single-entry list containing '@*' + # is assumed. + # + # Example + # read_only_volume_list = [ "vg1", "vg2/lvol1", "@tag1", "@*" ] + # + # This configuration option does not have a default value defined. + + # Configuration option activation/raid_region_size. + # Size in KiB of each raid or mirror synchronization region. + # The clean/dirty state of data is tracked for each region. + # The value is rounded down to a power of two if necessary, and + # is ignored if it is not a multiple of the machine memory page size. + # This configuration option has an automatic default value. + # raid_region_size = 2048 + + # Configuration option activation/error_when_full. + # Return errors if a thin pool runs out of space. + # The --errorwhenfull option overrides this setting. + # When enabled, writes to thin LVs immediately return an error if the + # thin pool is out of data space. When disabled, writes to thin LVs + # are queued if the thin pool is out of space, and processed when the + # thin pool data space is extended. New thin pools are assigned the + # behavior defined here. + # This configuration option has an automatic default value. + # error_when_full = 0 + + # Configuration option activation/readahead. + # Setting to use when there is no readahead setting in metadata. + # + # Accepted values: + # none + # Disable readahead. + # auto + # Use default value chosen by kernel. + # + # This configuration option has an automatic default value. + # readahead = "auto" + + # Configuration option activation/raid_fault_policy. + # Defines how a device failure in a RAID LV is handled. + # This includes LVs that have the following segment types: + # raid1, raid4, raid5*, and raid6*. + # If a device in the LV fails, the policy determines the steps + # performed by dmeventd automatically, and the steps performed by the + # manual command lvconvert --repair --use-policies. + # Automatic handling requires dmeventd to be monitoring the LV. + # + # Accepted values: + # warn + # Use the system log to warn the user that a device in the RAID LV + # has failed. It is left to the user to run lvconvert --repair + # manually to remove or replace the failed device. As long as the + # number of failed devices does not exceed the redundancy of the LV + # (1 device for raid4/5, 2 for raid6), the LV will remain usable. + # allocate + # Attempt to use any extra physical volumes in the VG as spares and + # replace faulty devices. + # + # This configuration option has an automatic default value. + # raid_fault_policy = "warn" + + # Configuration option activation/mirror_image_fault_policy. + # Defines how a device failure in a 'mirror' LV is handled. + # An LV with the 'mirror' segment type is composed of mirror images + # (copies) and a mirror log. A disk log ensures that a mirror LV does + # not need to be re-synced (all copies made the same) every time a + # machine reboots or crashes. If a device in the LV fails, this policy + # determines the steps performed by dmeventd automatically, and the steps + # performed by the manual command lvconvert --repair --use-policies. + # Automatic handling requires dmeventd to be monitoring the LV. + # + # Accepted values: + # remove + # Simply remove the faulty device and run without it. If the log + # device fails, the mirror would convert to using an in-memory log. + # This means the mirror will not remember its sync status across + # crashes/reboots and the entire mirror will be re-synced. If a + # mirror image fails, the mirror will convert to a non-mirrored + # device if there is only one remaining good copy. + # allocate + # Remove the faulty device and try to allocate space on a new + # device to be a replacement for the failed device. Using this + # policy for the log is fast and maintains the ability to remember + # sync state through crashes/reboots. Using this policy for a + # mirror device is slow, as it requires the mirror to resynchronize + # the devices, but it will preserve the mirror characteristic of + # the device. This policy acts like 'remove' if no suitable device + # and space can be allocated for the replacement. + # allocate_anywhere + # Not yet implemented. Useful to place the log device temporarily + # on the same physical volume as one of the mirror images. This + # policy is not recommended for mirror devices since it would break + # the redundant nature of the mirror. This policy acts like + # 'remove' if no suitable device and space can be allocated for the + # replacement. + # + # This configuration option has an automatic default value. + # mirror_image_fault_policy = "remove" + + # Configuration option activation/mirror_log_fault_policy. + # Defines how a device failure in a 'mirror' log LV is handled. + # The mirror_image_fault_policy description for mirrored LVs also + # applies to mirrored log LVs. + # This configuration option has an automatic default value. + # mirror_log_fault_policy = "allocate" + + # Configuration option activation/snapshot_autoextend_threshold. + # Auto-extend a snapshot when its usage exceeds this percent. + # Setting this to 100 disables automatic extension. + # The minimum value is 50 (a smaller value is treated as 50.) + # Also see snapshot_autoextend_percent. + # Automatic extension requires dmeventd to be monitoring the LV. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 1G + # snapshot exceeds 700M, it is extended to 1.2G, and when it exceeds + # 840M, it is extended to 1.44G: + # snapshot_autoextend_threshold = 70 + # + # This configuration option has an automatic default value. + # snapshot_autoextend_threshold = 100 + + # Configuration option activation/snapshot_autoextend_percent. + # Auto-extending a snapshot adds this percent extra space. + # The amount of additional space added to a snapshot is this + # percent of its current size. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 1G + # snapshot exceeds 700M, it is extended to 1.2G, and when it exceeds + # 840M, it is extended to 1.44G: + # snapshot_autoextend_percent = 20 + # + # This configuration option has an automatic default value. + # snapshot_autoextend_percent = 20 + + # Configuration option activation/thin_pool_autoextend_threshold. + # Auto-extend a thin pool when its usage exceeds this percent. + # Setting this to 100 disables automatic extension. + # The minimum value is 50 (a smaller value is treated as 50.) + # Also see thin_pool_autoextend_percent. + # Automatic extension requires dmeventd to be monitoring the LV. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 1G + # thin pool exceeds 700M, it is extended to 1.2G, and when it exceeds + # 840M, it is extended to 1.44G: + # thin_pool_autoextend_threshold = 70 + # + # This configuration option has an automatic default value. + # thin_pool_autoextend_threshold = 100 + + # Configuration option activation/thin_pool_autoextend_percent. + # Auto-extending a thin pool adds this percent extra space. + # The amount of additional space added to a thin pool is this + # percent of its current size. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 1G + # thin pool exceeds 700M, it is extended to 1.2G, and when it exceeds + # 840M, it is extended to 1.44G: + # thin_pool_autoextend_percent = 20 + # + # This configuration option has an automatic default value. + # thin_pool_autoextend_percent = 20 + + # Configuration option activation/vdo_pool_autoextend_threshold. + # Auto-extend a VDO pool when its usage exceeds this percent. + # Setting this to 100 disables automatic extension. + # The minimum value is 50 (a smaller value is treated as 50.) + # Also see vdo_pool_autoextend_percent. + # Automatic extension requires dmeventd to be monitoring the LV. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 10G + # VDO pool exceeds 7G, it is extended to 12G, and when it exceeds + # 8.4G, it is extended to 14.4G: + # vdo_pool_autoextend_threshold = 70 + # + # This configuration option has an automatic default value. + # vdo_pool_autoextend_threshold = 100 + + # Configuration option activation/vdo_pool_autoextend_percent. + # Auto-extending a VDO pool adds this percent extra space. + # The amount of additional space added to a VDO pool is this + # percent of its current size. + # + # Example + # Using 70% autoextend threshold and 20% autoextend size, when a 10G + # VDO pool exceeds 7G, it is extended to 12G, and when it exceeds + # 8.4G, it is extended to 14.4G: + # This configuration option has an automatic default value. + # vdo_pool_autoextend_percent = 20 + + # Configuration option activation/mlock_filter. + # Do not mlock these memory areas. + # While activating devices, I/O to devices being (re)configured is + # suspended. As a precaution against deadlocks, LVM pins memory it is + # using so it is not paged out, and will not require I/O to reread. + # Groups of pages that are known not to be accessed during activation + # do not need to be pinned into memory. Each string listed in this + # setting is compared against each line in /proc/self/maps, and the + # pages corresponding to lines that match are not pinned. On some + # systems, locale-archive was found to make up over 80% of the memory + # used by the process. + # + # Example + # mlock_filter = [ "locale/locale-archive", "gconv/gconv-modules.cache" ] + # + # This configuration option is advanced. + # This configuration option does not have a default value defined. + + # Configuration option activation/use_mlockall. + # Use the old behavior of mlockall to pin all memory. + # Prior to version 2.02.62, LVM used mlockall() to pin the whole + # process's memory while activating devices. + # This configuration option has an automatic default value. + # use_mlockall = 0 + + # Configuration option activation/monitoring. + # Monitor LVs that are activated. + # The --ignoremonitoring option overrides this setting. + # When enabled, LVM will ask dmeventd to monitor activated LVs. + # This configuration option has an automatic default value. + # monitoring = 1 + + # Configuration option activation/polling_interval. + # Check pvmove or lvconvert progress at this interval (seconds). + # When pvmove or lvconvert must wait for the kernel to finish + # synchronizing or merging data, they check and report progress at + # intervals of this number of seconds. If this is set to 0 and there + # is only one thing to wait for, there are no progress reports, but + # the process is awoken immediately once the operation is complete. + # This configuration option has an automatic default value. + # polling_interval = 15 + + # Configuration option activation/auto_set_activation_skip. + # Set the activation skip flag on new thin snapshot LVs. + # The --setactivationskip option overrides this setting. + # An LV can have a persistent 'activation skip' flag. The flag causes + # the LV to be skipped during normal activation. The lvchange/vgchange + # -K option is required to activate LVs that have the activation skip + # flag set. When this setting is enabled, the activation skip flag is + # set on new thin snapshot LVs. + # This configuration option has an automatic default value. + # auto_set_activation_skip = 1 + + # Configuration option activation/activation_mode. + # How LVs with missing devices are activated. + # The --activationmode option overrides this setting. + # + # Accepted values: + # complete + # Only allow activation of an LV if all of the Physical Volumes it + # uses are present. Other PVs in the Volume Group may be missing. + # degraded + # Like complete, but additionally RAID LVs of segment type raid1, + # raid4, raid5, radid6 and raid10 will be activated if there is no + # data loss, i.e. they have sufficient redundancy to present the + # entire addressable range of the Logical Volume. + # partial + # Allows the activation of any LV even if a missing or failed PV + # could cause data loss with a portion of the LV inaccessible. + # This setting should not normally be used, but may sometimes + # assist with data recovery. + # + # This configuration option has an automatic default value. + # activation_mode = "degraded" + + # Configuration option activation/lock_start_list. + # Locking is started only for VGs selected by this list. + # The rules are the same as those for volume_list. + # This configuration option does not have a default value defined. + + # Configuration option activation/auto_lock_start_list. + # Locking is auto-started only for VGs selected by this list. + # The rules are the same as those for auto_activation_volume_list. + # This configuration option does not have a default value defined. +} + +# Configuration section metadata. +# This configuration section has an automatic default value. +# metadata { + + # Configuration option metadata/check_pv_device_sizes. + # Check device sizes are not smaller than corresponding PV sizes. + # If device size is less than corresponding PV size found in metadata, + # there is always a risk of data loss. If this option is set, then LVM + # issues a warning message each time it finds that the device size is + # less than corresponding PV size. You should not disable this unless + # you are absolutely sure about what you are doing! + # This configuration option is advanced. + # This configuration option has an automatic default value. + # check_pv_device_sizes = 1 + + # Configuration option metadata/record_lvs_history. + # When enabled, LVM keeps history records about removed LVs in + # metadata. The information that is recorded in metadata for + # historical LVs is reduced when compared to original + # information kept in metadata for live LVs. Currently, this + # feature is supported for thin and thin snapshot LVs only. + # This configuration option has an automatic default value. + # record_lvs_history = 0 + + # Configuration option metadata/lvs_history_retention_time. + # Retention time in seconds after which a record about individual + # historical logical volume is automatically destroyed. + # A value of 0 disables this feature. + # This configuration option has an automatic default value. + # lvs_history_retention_time = 0 + + # Configuration option metadata/pvmetadatacopies. + # Number of copies of metadata to store on each PV. + # The --pvmetadatacopies option overrides this setting. + # + # Accepted values: + # 2 + # Two copies of the VG metadata are stored on the PV, one at the + # front of the PV, and one at the end. + # 1 + # One copy of VG metadata is stored at the front of the PV. + # 0 + # No copies of VG metadata are stored on the PV. This may be + # useful for VGs containing large numbers of PVs. + # + # This configuration option is advanced. + # This configuration option has an automatic default value. + # pvmetadatacopies = 1 + + # Configuration option metadata/vgmetadatacopies. + # Number of copies of metadata to maintain for each VG. + # The --vgmetadatacopies option overrides this setting. + # If set to a non-zero value, LVM automatically chooses which of the + # available metadata areas to use to achieve the requested number of + # copies of the VG metadata. If you set a value larger than the the + # total number of metadata areas available, then metadata is stored in + # them all. The value 0 (unmanaged) disables this automatic management + # and allows you to control which metadata areas are used at the + # individual PV level using pvchange --metadataignore y|n. + # This configuration option has an automatic default value. + # vgmetadatacopies = 0 + + # Configuration option metadata/pvmetadatasize. + # The default size of the metadata area in units of 512 byte sectors. + # The metadata area begins at an offset of the page size from the start + # of the device. The first PE is by default at 1 MiB from the start of + # the device. The space between these is the default metadata area size. + # The actual size of the metadata area may be larger than what is set + # here due to default_data_alignment making the first PE a MiB multiple. + # The metadata area begins with a 512 byte header and is followed by a + # circular buffer used for VG metadata text. The maximum size of the VG + # metadata is about half the size of the metadata buffer. VGs with large + # numbers of PVs or LVs, or VGs containing complex LV structures, may need + # additional space for VG metadata. The --metadatasize option overrides + # this setting. + # This configuration option does not have a default value defined. + + # Configuration option metadata/pvmetadataignore. + # Ignore metadata areas on a new PV. + # The --metadataignore option overrides this setting. + # If metadata areas on a PV are ignored, LVM will not store metadata + # in them. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # pvmetadataignore = 0 + + # Configuration option metadata/stripesize. + # This configuration option is advanced. + # This configuration option has an automatic default value. + # stripesize = 64 +# } + +# Configuration section report. +# LVM report command output formatting. +report { + + # Configuration option report/output_format. + # Format of LVM command's report output. + # If there is more than one report per command, then the format + # is applied for all reports. You can also change output format + # directly on command line using --reportformat option which + # has precedence over log/output_format setting. + # Accepted values: + # basic + # Original format with columns and rows. If there is more than + # one report per command, each report is prefixed with report's + # name for identification. + # json + # JSON format. + # json_std + # JSON format that is more compliant with JSON standard. + # Compared to original "json" format: + # - it does not use double quotes around numeric values, + # - it uses 'null' for undefined numeric values, + # - it prints string list as proper JSON array of strings instead of a single string. + # This configuration option has an automatic default value. + # output_format = "basic" + + # Configuration option report/compact_output. + # Do not print empty values for all report fields. + # If enabled, all fields that don't have a value set for any of the + # rows reported are skipped and not printed. Compact output is + # applicable only if report/buffered is enabled. If you need to + # compact only specified fields, use compact_output=0 and define + # report/compact_output_cols configuration setting instead. + # This configuration option has an automatic default value. + # compact_output = 0 + + # Configuration option report/compact_output_cols. + # Do not print empty values for specified report fields. + # If defined, specified fields that don't have a value set for any + # of the rows reported are skipped and not printed. Compact output + # is applicable only if report/buffered is enabled. If you need to + # compact all fields, use compact_output=1 instead in which case + # the compact_output_cols setting is then ignored. + # This configuration option has an automatic default value. + # compact_output_cols = "" + + # Configuration option report/aligned. + # Align columns in report output. + # This configuration option has an automatic default value. + # aligned = 1 + + # Configuration option report/buffered. + # Buffer report output. + # When buffered reporting is used, the report's content is appended + # incrementally to include each object being reported until the report + # is flushed to output which normally happens at the end of command + # execution. Otherwise, if buffering is not used, each object is + # reported as soon as its processing is finished. + # This configuration option has an automatic default value. + # buffered = 1 + + # Configuration option report/headings. + # Format of LVM command's report output headings. + # Accepted values: + # 0 no headings, + # 1 headings with column abbreviations, + # 2 headings with full column names. + # This configuration option has an automatic default value. + # headings = 1 + + # Configuration option report/separator. + # A separator to use on report after each field. + # This configuration option has an automatic default value. + # separator = " " + + # Configuration option report/list_item_separator. + # A separator to use for list items when reported. + # This configuration option has an automatic default value. + # list_item_separator = "," + + # Configuration option report/prefixes. + # Use a field name prefix for each field reported. + # This configuration option has an automatic default value. + # prefixes = 0 + + # Configuration option report/quoted. + # Quote field values when using field name prefixes. + # This configuration option has an automatic default value. + # quoted = 1 + + # Configuration option report/columns_as_rows. + # Output each column as a row. + # If set, this also implies report/prefixes=1. + # This configuration option has an automatic default value. + # columns_as_rows = 0 + + # Configuration option report/binary_values_as_numeric. + # Use binary values 0 or 1 instead of descriptive literal values. + # For columns that have exactly two valid values to report + # (not counting the 'unknown' value which denotes that the + # value could not be determined). + # This configuration option has an automatic default value. + # binary_values_as_numeric = 0 + + # Configuration option report/time_format. + # Set time format for fields reporting time values. + # Format specification is a string which may contain special character + # sequences and ordinary character sequences. Ordinary character + # sequences are copied verbatim. Each special character sequence is + # introduced by the '%' character and such sequence is then + # substituted with a value as described below. + # + # Accepted values: + # %a + # The abbreviated name of the day of the week according to the + # current locale. + # %A + # The full name of the day of the week according to the current + # locale. + # %b + # The abbreviated month name according to the current locale. + # %B + # The full month name according to the current locale. + # %c + # The preferred date and time representation for the current + # locale (alt E) + # %C + # The century number (year/100) as a 2-digit integer. (alt E) + # %d + # The day of the month as a decimal number (range 01 to 31). + # (alt O) + # %D + # Equivalent to %m/%d/%y. (For Americans only. Americans should + # note that in other countries%d/%m/%y is rather common. This + # means that in international context this format is ambiguous and + # should not be used. + # %e + # Like %d, the day of the month as a decimal number, but a leading + # zero is replaced by a space. (alt O) + # %E + # Modifier: use alternative local-dependent representation if + # available. + # %F + # Equivalent to %Y-%m-%d (the ISO 8601 date format). + # %G + # The ISO 8601 week-based year with century as adecimal number. + # The 4-digit year corresponding to the ISO week number (see %V). + # This has the same format and value as %Y, except that if the + # ISO week number belongs to the previous or next year, that year + # is used instead. + # %g + # Like %G, but without century, that is, with a 2-digit year + # (00-99). + # %h + # Equivalent to %b. + # %H + # The hour as a decimal number using a 24-hour clock + # (range 00 to 23). (alt O) + # %I + # The hour as a decimal number using a 12-hour clock + # (range 01 to 12). (alt O) + # %j + # The day of the year as a decimal number (range 001 to 366). + # %k + # The hour (24-hour clock) as a decimal number (range 0 to 23); + # single digits are preceded by a blank. (See also %H.) + # %l + # The hour (12-hour clock) as a decimal number (range 1 to 12); + # single digits are preceded by a blank. (See also %I.) + # %m + # The month as a decimal number (range 01 to 12). (alt O) + # %M + # The minute as a decimal number (range 00 to 59). (alt O) + # %O + # Modifier: use alternative numeric symbols. + # %p + # Either "AM" or "PM" according to the given time value, + # or the corresponding strings for the current locale. Noon is + # treated as "PM" and midnight as "AM". + # %P + # Like %p but in lowercase: "am" or "pm" or a corresponding + # string for the current locale. + # %r + # The time in a.m. or p.m. notation. In the POSIX locale this is + # equivalent to %I:%M:%S %p. + # %R + # The time in 24-hour notation (%H:%M). For a version including + # the seconds, see %T below. + # %s + # The number of seconds since the Epoch, + # 1970-01-01 00:00:00 +0000 (UTC) + # %S + # The second as a decimal number (range 00 to 60). (The range is + # up to 60 to allow for occasional leap seconds.) (alt O) + # %t + # A tab character. + # %T + # The time in 24-hour notation (%H:%M:%S). + # %u + # The day of the week as a decimal, range 1 to 7, Monday being 1. + # See also %w. (alt O) + # %U + # The week number of the current year as a decimal number, + # range 00 to 53, starting with the first Sunday as the first + # day of week 01. See also %V and %W. (alt O) + # %V + # The ISO 8601 week number of the current year as a decimal number, + # range 01 to 53, where week 1 is the first week that has at least + # 4 days in the new year. See also %U and %W. (alt O) + # %w + # The day of the week as a decimal, range 0 to 6, Sunday being 0. + # See also %u. (alt O) + # %W + # The week number of the current year as a decimal number, + # range 00 to 53, starting with the first Monday as the first day + # of week 01. (alt O) + # %x + # The preferred date representation for the current locale without + # the time. (alt E) + # %X + # The preferred time representation for the current locale without + # the date. (alt E) + # %y + # The year as a decimal number without a century (range 00 to 99). + # (alt E, alt O) + # %Y + # The year as a decimal number including the century. (alt E) + # %z + # The +hhmm or -hhmm numeric timezone (that is, the hour and minute + # offset from UTC). + # %Z + # The timezone name or abbreviation. + # %% + # A literal '%' character. + # + # This configuration option has an automatic default value. + # time_format = "%Y-%m-%d %T %z" + + # Configuration option report/devtypes_sort. + # List of columns to sort by when reporting 'lvm devtypes' command. + # See 'lvm devtypes -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # devtypes_sort = "devtype_name" + + # Configuration option report/devtypes_cols. + # List of columns to report for 'lvm devtypes' command. + # See 'lvm devtypes -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # devtypes_cols = "devtype_name,devtype_max_partitions,devtype_description" + + # Configuration option report/devtypes_cols_verbose. + # List of columns to report for 'lvm devtypes' command in verbose mode. + # See 'lvm devtypes -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # devtypes_cols_verbose = "devtype_name,devtype_max_partitions,devtype_description" + + # Configuration option report/lvs_sort. + # List of columns to sort by when reporting 'lvs' command. + # See 'lvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # lvs_sort = "vg_name,lv_name" + + # Configuration option report/lvs_cols. + # List of columns to report for 'lvs' command. + # See 'lvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # lvs_cols = "lv_name,vg_name,lv_attr,lv_size,pool_lv,origin,data_percent,metadata_percent,move_pv,mirror_log,copy_percent,convert_lv" + + # Configuration option report/lvs_cols_verbose. + # List of columns to report for 'lvs' command in verbose mode. + # See 'lvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # lvs_cols_verbose = "lv_name,vg_name,seg_count,lv_attr,lv_size,lv_major,lv_minor,lv_kernel_major,lv_kernel_minor,pool_lv,origin,data_percent,metadata_percent,move_pv,copy_percent,mirror_log,convert_lv,lv_uuid,lv_profile" + + # Configuration option report/vgs_sort. + # List of columns to sort by when reporting 'vgs' command. + # See 'vgs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # vgs_sort = "vg_name" + + # Configuration option report/vgs_cols. + # List of columns to report for 'vgs' command. + # See 'vgs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # vgs_cols = "vg_name,pv_count,lv_count,snap_count,vg_attr,vg_size,vg_free" + + # Configuration option report/vgs_cols_verbose. + # List of columns to report for 'vgs' command in verbose mode. + # See 'vgs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # vgs_cols_verbose = "vg_name,vg_attr,vg_extent_size,pv_count,lv_count,snap_count,vg_size,vg_free,vg_uuid,vg_profile" + + # Configuration option report/pvs_sort. + # List of columns to sort by when reporting 'pvs' command. + # See 'pvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvs_sort = "pv_name" + + # Configuration option report/pvs_cols. + # List of columns to report for 'pvs' command. + # See 'pvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvs_cols = "pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free" + + # Configuration option report/pvs_cols_verbose. + # List of columns to report for 'pvs' command in verbose mode. + # See 'pvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvs_cols_verbose = "pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,dev_size,pv_uuid" + + # Configuration option report/segs_sort. + # List of columns to sort by when reporting 'lvs --segments' command. + # See 'lvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # segs_sort = "vg_name,lv_name,seg_start" + + # Configuration option report/segs_cols. + # List of columns to report for 'lvs --segments' command. + # See 'lvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # segs_cols = "lv_name,vg_name,lv_attr,stripes,segtype,seg_size" + + # Configuration option report/segs_cols_verbose. + # List of columns to report for 'lvs --segments' command in verbose mode. + # See 'lvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # segs_cols_verbose = "lv_name,vg_name,lv_attr,seg_start,seg_size,stripes,segtype,stripesize,chunksize" + + # Configuration option report/pvsegs_sort. + # List of columns to sort by when reporting 'pvs --segments' command. + # See 'pvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvsegs_sort = "pv_name,pvseg_start" + + # Configuration option report/pvsegs_cols. + # List of columns to sort by when reporting 'pvs --segments' command. + # See 'pvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvsegs_cols = "pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,pvseg_start,pvseg_size" + + # Configuration option report/pvsegs_cols_verbose. + # List of columns to sort by when reporting 'pvs --segments' command in verbose mode. + # See 'pvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvsegs_cols_verbose = "pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,pvseg_start,pvseg_size,lv_name,seg_start_pe,segtype,seg_pe_ranges" + + # Configuration option report/vgs_cols_full. + # List of columns to report for lvm fullreport's 'vgs' subreport. + # See 'vgs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # vgs_cols_full = "vg_all" + + # Configuration option report/pvs_cols_full. + # List of columns to report for lvm fullreport's 'vgs' subreport. + # See 'pvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvs_cols_full = "pv_all" + + # Configuration option report/lvs_cols_full. + # List of columns to report for lvm fullreport's 'lvs' subreport. + # See 'lvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # lvs_cols_full = "lv_all" + + # Configuration option report/pvsegs_cols_full. + # List of columns to report for lvm fullreport's 'pvseg' subreport. + # See 'pvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvsegs_cols_full = "pvseg_all,pv_uuid,lv_uuid" + + # Configuration option report/segs_cols_full. + # List of columns to report for lvm fullreport's 'seg' subreport. + # See 'lvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # segs_cols_full = "seg_all,lv_uuid" + + # Configuration option report/vgs_sort_full. + # List of columns to sort by when reporting lvm fullreport's 'vgs' subreport. + # See 'vgs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # vgs_sort_full = "vg_name" + + # Configuration option report/pvs_sort_full. + # List of columns to sort by when reporting lvm fullreport's 'vgs' subreport. + # See 'pvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvs_sort_full = "pv_name" + + # Configuration option report/lvs_sort_full. + # List of columns to sort by when reporting lvm fullreport's 'lvs' subreport. + # See 'lvs -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # lvs_sort_full = "vg_name,lv_name" + + # Configuration option report/pvsegs_sort_full. + # List of columns to sort by when reporting for lvm fullreport's 'pvseg' subreport. + # See 'pvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # pvsegs_sort_full = "pv_uuid,pvseg_start" + + # Configuration option report/segs_sort_full. + # List of columns to sort by when reporting lvm fullreport's 'seg' subreport. + # See 'lvs --segments -o help' for the list of possible fields. + # This configuration option has an automatic default value. + # segs_sort_full = "lv_uuid,seg_start" + + # Configuration option report/mark_hidden_devices. + # Use brackets [] to mark hidden devices. + # This configuration option has an automatic default value. + # mark_hidden_devices = 1 + + # Configuration option report/two_word_unknown_device. + # Use the two words 'unknown device' in place of '[unknown]'. + # This is displayed when the device for a PV is not known. + # This configuration option has an automatic default value. + # two_word_unknown_device = 0 +} + +# Configuration section dmeventd. +# Settings for the LVM event daemon. +dmeventd { + + # Configuration option dmeventd/mirror_library. + # The library dmeventd uses when monitoring a mirror device. + # libdevmapper-event-lvm2mirror.so attempts to recover from + # failures. It removes failed devices from a volume group and + # reconfigures a mirror as necessary. If no mirror library is + # provided, mirrors are not monitored through dmeventd. + # This configuration option has an automatic default value. + # mirror_library = "libdevmapper-event-lvm2mirror.so" + + # Configuration option dmeventd/raid_library. + # This configuration option has an automatic default value. + # raid_library = "libdevmapper-event-lvm2raid.so" + + # Configuration option dmeventd/snapshot_library. + # The library dmeventd uses when monitoring a snapshot device. + # libdevmapper-event-lvm2snapshot.so monitors the filling of snapshots + # and emits a warning through syslog when the usage exceeds 80%. The + # warning is repeated when 85%, 90% and 95% of the snapshot is filled. + # This configuration option has an automatic default value. + # snapshot_library = "libdevmapper-event-lvm2snapshot.so" + + # Configuration option dmeventd/thin_library. + # The library dmeventd uses when monitoring a thin device. + # libdevmapper-event-lvm2thin.so monitors the filling of a pool + # and emits a warning through syslog when the usage exceeds 80%. The + # warning is repeated when 85%, 90% and 95% of the pool is filled. + # This configuration option has an automatic default value. + # thin_library = "libdevmapper-event-lvm2thin.so" + + # Configuration option dmeventd/thin_command. + # The plugin runs command with each 5% increment when thin-pool data volume + # or metadata volume gets above 50%. + # Command which starts with 'lvm ' prefix is internal lvm command. + # You can write your own handler to customise behaviour in more details. + # User handler is specified with the full path starting with '/'. + # This configuration option has an automatic default value. + # thin_command = "lvm lvextend --use-policies" + + # Configuration option dmeventd/vdo_library. + # The library dmeventd uses when monitoring a VDO pool device. + # libdevmapper-event-lvm2vdo.so monitors the filling of a pool + # and emits a warning through syslog when the usage exceeds 80%. The + # warning is repeated when 85%, 90% and 95% of the pool is filled. + # This configuration option has an automatic default value. + # vdo_library = "libdevmapper-event-lvm2vdo.so" + + # Configuration option dmeventd/vdo_command. + # The plugin runs command with each 5% increment when VDO pool volume + # gets above 50%. + # Command which starts with 'lvm ' prefix is internal lvm command. + # You can write your own handler to customise behaviour in more details. + # User handler is specified with the full path starting with '/'. + # This configuration option has an automatic default value. + # vdo_command = "lvm lvextend --use-policies" + + # Configuration option dmeventd/executable. + # The full path to the dmeventd binary. + # This configuration option has an automatic default value. + # executable = "/usr/sbin/dmeventd" +} + +# Configuration section tags. +# Host tag settings. +# This configuration section has an automatic default value. +# tags { + + # Configuration option tags/hosttags. + # Create a host tag using the machine name. + # The machine name is nodename returned by uname(2). + # This configuration option has an automatic default value. + # hosttags = 0 + + # Configuration section tags/. + # Replace this subsection name with a custom tag name. + # Multiple subsections like this can be created. The '@' prefix for + # tags is optional. This subsection can contain host_list, which is a + # list of machine names. If the name of the local machine is found in + # host_list, then the name of this subsection is used as a tag and is + # applied to the local machine as a 'host tag'. If this subsection is + # empty (has no host_list), then the subsection name is always applied + # as a 'host tag'. + # + # Example + # The host tag foo is given to all hosts, and the host tag + # bar is given to the hosts named machine1 and machine2. + # tags { foo { } bar { host_list = [ "machine1", "machine2" ] } } + # + # This configuration section has variable name. + # This configuration section has an automatic default value. + # tag { + + # Configuration option tags//host_list. + # A list of machine names. + # These machine names are compared to the nodename returned + # by uname(2). If the local machine name matches an entry in + # this list, the name of the subsection is applied to the + # machine as a 'host tag'. + # This configuration option does not have a default value defined. + # } +# } diff --git a/lvm/lvmlocal.conf b/lvm/lvmlocal.conf new file mode 100644 index 0000000..bb5d86b --- /dev/null +++ b/lvm/lvmlocal.conf @@ -0,0 +1,57 @@ +# This is a local configuration file template for the LVM2 system +# which should be installed as /etc/lvm/lvmlocal.conf . +# +# Refer to 'man lvm.conf' for information about the file layout. +# +# To put this file in a different directory and override +# /etc/lvm set the environment variable LVM_SYSTEM_DIR before +# running the tools. +# +# The lvmlocal.conf file is normally expected to contain only the +# "local" section which contains settings that should not be shared or +# repeated among different hosts. (But if other sections are present, +# they *will* get processed. Settings in this file override equivalent +# ones in lvm.conf and are in turn overridden by ones in any enabled +# lvm_.conf files.) +# +# Please take care that each setting only appears once if uncommenting +# example settings in this file and never copy this file between hosts. + + +# Configuration section local. +# LVM settings that are specific to the local host. +local { + + # Configuration option local/system_id. + # Defines the local system ID for lvmlocal mode. + # This is used when global/system_id_source is set to 'lvmlocal' in the + # main configuration file, e.g. lvm.conf. When used, it must be set to + # a unique value among all hosts sharing access to the storage, + # e.g. a host name. + # + # Example + # Set no system ID: + # system_id = "" + # Set the system_id to a specific name: + # system_id = "host1" + # + # This configuration option has an automatic default value. + # system_id = "" + + # Configuration option local/extra_system_ids. + # A list of extra VG system IDs the local host can access. + # VGs with the system IDs listed here (in addition to the host's own + # system ID) can be fully accessed by the local host. (These are + # system IDs that the host sees in VGs, not system IDs that identify + # the local host, which is determined by system_id_source.) + # Use this only after consulting 'man lvmsystemid' to be certain of + # correct usage and possible dangers. + # This configuration option does not have a default value defined. + + # Configuration option local/host_id. + # The lvmlockd sanlock host_id. + # This must be unique among all hosts, and must be between 1 and 2000. + # Applicable only if LVM is compiled with lockd support + # This configuration option has an automatic default value. + # host_id = 0 +} diff --git a/lvm/profile/cache-mq.profile b/lvm/profile/cache-mq.profile new file mode 100644 index 0000000..3c90331 --- /dev/null +++ b/lvm/profile/cache-mq.profile @@ -0,0 +1,20 @@ +# Demo configuration 'mq' cache policy +# +# Note: This policy has been deprecated in favor of the smq policy +# keyword "default" means, setting is left with kernel defaults. +# + +allocation { + cache_pool_chunk_size = 64 + cache_mode = "writethrough" + cache_policy = "mq" + cache_settings { + mq { + sequential_threshold = "default" # #nr_sequential_ios + random_threshold = "default" # #nr_random_ios + read_promote_adjustment = "default" + write_promote_adjustment = "default" + discard_promote_adjustment = "default" + } + } +} diff --git a/lvm/profile/cache-smq.profile b/lvm/profile/cache-smq.profile new file mode 100644 index 0000000..c457481 --- /dev/null +++ b/lvm/profile/cache-smq.profile @@ -0,0 +1,14 @@ +# Demo configuration 'smq' cache policy +# +# The stochastic multi-queue (smq) policy addresses some of the problems +# with the multiqueue (mq) policy and uses less memory. +# + +allocation { + cache_pool_chunk_size = 64 + cache_mode = "writethrough" + cache_policy = "smq" + cache_settings { + # currently no settings for "smq" policy + } +} diff --git a/lvm/profile/command_profile_template.profile b/lvm/profile/command_profile_template.profile new file mode 100644 index 0000000..bf56799 --- /dev/null +++ b/lvm/profile/command_profile_template.profile @@ -0,0 +1,74 @@ +# This is a command profile template for the LVM2 system. +# +# It contains all configuration settings that are customizable by command +# profiles. To create a new command profile, select the settings you want +# to customize and add them in a new file named .profile. +# Then install the new profile in a directory as defined by config/profile_dir +# setting found in /etc/lvm/lvm.conf file. +# +# Command profiles can be referenced by using the --commandprofile option then. +# +# Refer to 'man lvm.conf' for further information about profiles and +# general configuration file layout. +# +allocation { + cache_mode="writethrough" + cache_settings { + } +} +log { + report_command_log=0 + command_log_sort="log_seq_num" + command_log_cols="log_seq_num,log_type,log_context,log_object_type,log_object_name,log_object_id,log_object_group,log_object_group_id,log_message,log_errno,log_ret_code" + command_log_selection="!(log_type=status && message=success)" +} +global { + units="h" + si_unit_consistency=1 + suffix=1 + lvdisplay_shows_full_device_path=0 +} +report { + output_format="basic" + compact_output=0 + compact_output_cols="" + aligned=1 + buffered=1 + headings=1 + separator=" " + list_item_separator="," + prefixes=0 + quoted=1 + columns_as_rows=0 + binary_values_as_numeric=0 + time_format="%Y-%m-%d %T %z" + devtypes_sort="devtype_name" + devtypes_cols="devtype_name,devtype_max_partitions,devtype_description" + devtypes_cols_verbose="devtype_name,devtype_max_partitions,devtype_description" + lvs_sort="vg_name,lv_name" + lvs_cols="lv_name,vg_name,lv_attr,lv_size,pool_lv,origin,data_percent,metadata_percent,move_pv,mirror_log,copy_percent,convert_lv" + lvs_cols_verbose="lv_name,vg_name,seg_count,lv_attr,lv_size,lv_major,lv_minor,lv_kernel_major,lv_kernel_minor,pool_lv,origin,data_percent,metadata_percent,move_pv,copy_percent,mirror_log,convert_lv,lv_uuid,lv_profile" + vgs_sort="vg_name" + vgs_cols="vg_name,pv_count,lv_count,snap_count,vg_attr,vg_size,vg_free" + vgs_cols_verbose="vg_name,vg_attr,vg_extent_size,pv_count,lv_count,snap_count,vg_size,vg_free,vg_uuid,vg_profile" + pvs_sort="pv_name" + pvs_cols="pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free" + pvs_cols_verbose="pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,dev_size,pv_uuid" + segs_sort="vg_name,lv_name,seg_start" + segs_cols="lv_name,vg_name,lv_attr,stripes,segtype,seg_size" + segs_cols_verbose="lv_name,vg_name,lv_attr,seg_start,seg_size,stripes,segtype,stripesize,chunksize" + pvsegs_sort="pv_name,pvseg_start" + pvsegs_cols="pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,pvseg_start,pvseg_size" + pvsegs_cols_verbose="pv_name,vg_name,pv_fmt,pv_attr,pv_size,pv_free,pvseg_start,pvseg_size,lv_name,seg_start_pe,segtype,seg_pe_ranges" + vgs_cols_full="vg_all" + pvs_cols_full="pv_all" + lvs_cols_full="lv_all" + pvsegs_cols_full="pvseg_all,pv_uuid,lv_uuid" + segs_cols_full="seg_all,lv_uuid" + vgs_sort_full="vg_name" + pvs_sort_full="pv_name" + lvs_sort_full="vg_name,lv_name" + pvsegs_sort_full="pv_uuid,pvseg_start" + segs_sort_full="lv_uuid,seg_start" + mark_hidden_devices=1 +} diff --git a/lvm/profile/lvmdbusd.profile b/lvm/profile/lvmdbusd.profile new file mode 100644 index 0000000..2cdc6da --- /dev/null +++ b/lvm/profile/lvmdbusd.profile @@ -0,0 +1,50 @@ +# +# DO NOT EDIT THIS FILE! +# +# LVM configuration profile used by lvmdbusd daemon. +# +# This sets up LVM to produce output in the most suitable format for processing +# by lvmdbusd daemon which utilizes LVM shell to execute LVM commands. +# +# Do not edit this file in any way. This profile is distributed together with +# lvmdbusd and it contains configuration that is important for lvmdbusd to +# cooperate and interface with LVM correctly. +# + +global { + # use bytes for expected and deterministic output + units=b + # no need for suffix if we have units set + suffix=0 +} + +report { + compact_output=0 + compact_output_cols="" + binary_values_as_numeric=0 + # time in number of seconds since the Epoch + time_format="%s" + mark_hidden_devices=1 + # lvmdbusd expects JSON output + output_format=json + # *_cols_full for lvm fullreport's fields which lvmdbusd relies on to update its state + vgs_cols_full="vg_name,vg_uuid,vg_fmt,vg_size,vg_free,vg_sysid,vg_extent_size,vg_extent_count,vg_free_count,vg_profile,max_lv,max_pv,pv_count,lv_count,snap_count,vg_seqno,vg_mda_count,vg_mda_free,vg_mda_size,vg_mda_used_count,vg_attr,vg_tags" + pvs_cols_full="pv_name,pv_uuid,pv_fmt,pv_size,pv_free,pv_used,dev_size,pv_mda_size,pv_mda_free,pv_ba_start,pv_ba_size,pe_start,pv_pe_count,pv_pe_alloc_count,pv_attr,pv_tags,vg_name,vg_uuid" + lvs_cols_full="lv_uuid,lv_name,lv_path,lv_size,vg_name,pool_lv_uuid,pool_lv,origin_uuid,origin,data_percent,lv_attr,lv_tags,vg_uuid,lv_active,data_lv,metadata_lv,lv_parent,lv_role,lv_layout" + pvsegs_cols_full="pvseg_start,pvseg_size,segtype,pv_uuid,lv_uuid,pv_name" + segs_cols_full="seg_pe_ranges,segtype,lv_uuid" + vgs_sort_full="vg_name" + pvs_sort_full="pv_name" + lvs_sort_full="vg_name,lv_name" + pvsegs_sort_full="pv_uuid,pvseg_start" + segs_sort_full="lv_uuid,seg_start" +} + +log { + # lvmdbusd relies on command log report to inspect LVM command's execution status + report_command_log=1 + # display only outermost LVM shell-related log that lvmdbusd inspects first after LVM command execution (it calls 'lastlog' for more detailed log afterwards if needed) + command_log_selection="log_context=shell" + command_log_cols="log_seq_num,log_type,log_context,log_object_type,log_object_name,log_object_id,log_object_group,log_object_group_id,log_message,log_errno,log_ret_code" + command_log_sort="log_seq_num" +} diff --git a/lvm/profile/metadata_profile_template.profile b/lvm/profile/metadata_profile_template.profile new file mode 100644 index 0000000..5836a63 --- /dev/null +++ b/lvm/profile/metadata_profile_template.profile @@ -0,0 +1,24 @@ +# This is a metadata profile template for the LVM2 system. +# +# It contains all configuration settings that are customizable by metadata +# profiles. To create a new metadata profile, select the settings you want +# to customize and add them in a new file named .profile. +# Then install the new profile in a directory as defined by config/profile_dir +# setting found in /etc/lvm/lvm.conf file. +# +# Metadata profiles can be referenced by using the --metadataprofile LVM2 +# command line option. +# +# Refer to 'man lvm.conf' for further information about profiles and +# general configuration file layout. +# +allocation { + thin_pool_zero=1 + thin_pool_discards="passdown" + thin_pool_chunk_size_policy="generic" +# thin_pool_chunk_size=128 +} +activation { + thin_pool_autoextend_threshold=100 + thin_pool_autoextend_percent=20 +} diff --git a/lvm/profile/thin-generic.profile b/lvm/profile/thin-generic.profile new file mode 100644 index 0000000..229a7fc --- /dev/null +++ b/lvm/profile/thin-generic.profile @@ -0,0 +1,4 @@ +allocation { + thin_pool_chunk_size_policy = "generic" + thin_pool_zero = 1 +} diff --git a/lvm/profile/thin-performance.profile b/lvm/profile/thin-performance.profile new file mode 100644 index 0000000..2914de2 --- /dev/null +++ b/lvm/profile/thin-performance.profile @@ -0,0 +1,4 @@ +allocation { + thin_pool_chunk_size_policy = "performance" + thin_pool_zero = 0 +} diff --git a/lvm/profile/vdo-small.profile b/lvm/profile/vdo-small.profile new file mode 100644 index 0000000..97b5b37 --- /dev/null +++ b/lvm/profile/vdo-small.profile @@ -0,0 +1,23 @@ +# Demo configuration for 'VDO' using less memory. +# ~lvmconfig --type full | grep vdo + +allocation { + vdo_use_compression=1 + vdo_use_deduplication=1 + vdo_use_metadata_hints=1 + vdo_minimum_io_size=4096 + vdo_block_map_cache_size_mb=128 + vdo_block_map_period=16380 + vdo_use_sparse_index=0 + vdo_index_memory_size_mb=256 + vdo_slab_size_mb=2048 + vdo_ack_threads=1 + vdo_bio_threads=1 + vdo_bio_rotation=64 + vdo_cpu_threads=2 + vdo_hash_zone_threads=1 + vdo_logical_threads=1 + vdo_physical_threads=1 + vdo_write_policy="auto" + vdo_max_discard=1 +} diff --git a/machine-id b/machine-id new file mode 100644 index 0000000..49305e5 --- /dev/null +++ b/machine-id @@ -0,0 +1 @@ +86d2f20979fe49559824555250880422 diff --git a/magic b/magic new file mode 100644 index 0000000..283a863 --- /dev/null +++ b/magic @@ -0,0 +1,3 @@ +# Magic local data for file(1) command. +# Insert here your local magic data. Format is described in magic(5). + diff --git a/makedumpfile.conf.sample b/makedumpfile.conf.sample new file mode 100644 index 0000000..cd0e4ab --- /dev/null +++ b/makedumpfile.conf.sample @@ -0,0 +1,149 @@ +## Filter config file +## +## Description: +## Configuration file to specify filter commands to filter out desired +## kernel data from vmcore. It supports erasing of symbol data and +## it's members of any data type. In case of filtering of data pointed by +## void * pointer, user needs to provide size to filter out. +## +## Please refer to manpage makedumpfile.conf(5) for more details. +## +## +## - Module section +## ========================================================= +## Syntax: +## [ModuleName] +## +## Define the module section where the symbols specified in subsequent erase +## commands belong to. The section name is a kernel module name (including +## vmlinux). The unnamed section defaults to [vmlinux] section. +## +## NOTE: There should not be any whitespaces before or after the ModuleName. +## +## e.g. +## [vmlinux] # Symbols in erase command belongs to main kernel (vmlinux) +## erase modules +## erase cred_jar.name +## erase cred_jar.name size 10 +## erase cred_jar.array +## erase vmlist.addr nullify +## +## [z90crypt] # Symbols in erase command belongs to kernel module z90crypt +## erase ap_device_list +## +## # erase entire CPRBX structure +## erase static_cprbx +## +## +## - To erase kernel data referred through a kernel Symbol +## ========================================================= +## Syntax: +## erase [.member[...]] [size [K|M]] +## erase [.member[...]] [size ] +## erase [.member[...]] [nullify]] +## +## where +## +## A variable name from the kernel or module, which is part of +## global symbols '/proc/kallsyms'. +## +## Integer value that specifies size of data to be erased. The +## suffixes 'K' and 'M' can be used to specify kilobytes and +## megabytes respectively where, K means 1024 bytes and M means +## 1024 ^ 2 = 1048576 bytes. +## +## A simple axpression of the form [.member[...]] that +## denotes a symbol which contains a positive integer value as a +## size of the data in bytes to be erased. +## +## Filter out the specified size of the data referred by symbol/member. +## If size option is not provided then the size of will be calculated +## according to it's data type. For 'char *' data type, string length will be +## determined with an upper limit of 1024. +## +## If specified is of type 'void *', then user needs to provide +## either 'size' or 'nullify' option. Otherwise erase command will not have +## any effect. +## +## The option 'nullify' will work only if filter symbol/member is a pointer and +## is used to set NULL value to the pointer type symbol/member. +## +## NOTE: Please note that by nullifying pointer values will affect the +## debug ability of created DUMPFILE. Use 'nullify' option only when size of +## data to be filter out is not known e.g. data pointed by 'void *'. +## +## e.g. +## [vmlinux] +## erase modules +## erase cred_jar.name +## erase cred_jar.name size 10 +## erase cred_jar.array +## erase vmlist.addr nullify +## +## +## - To filter kernel data referred through Array/list_head Symbol +## ================================================================= +## Syntax: +## for in { | +## via | +## within : } +## erase [.MemberExpression] [size |nullify] +## [erase ...] +## [...] +## endfor +## +## where +## +## Arbitrary name used to temporarily point to elements of the +## list. Referred as iteration variable. +## +## A simple expression in the form of [.member[...]] that +## results into an array variable. +## +## A simple expression in the form of [.member[...]] that +## results into a variable that points to a structure. +## +## Member within that points to an object of same +## type that of . +## +## A simple expression in the form of [.member[...]] that +## results into a variable of type struct list_head. +## +## Name of the structure type that can be traversed using +## HEAD variable and contains a member named +## . +## +## Name of a member in , of type struct list_head. +## +## A simple expression in the form of [.member[...]] to specify a +## member or component of a member in , or +## . +## +## One of the following: +## - An integer value. +## - [.member[...]] +## - [.MemberExpresion] +## +## The , and is also referred as LIST +## entry +## +## Filter out the specified size of the data accessible through LIST entries. +## e.g. +## [vmlinux] +## # Traversing +## for m in modules.next within module:list +## erase m.holders_dir.name +## endfor +## # Traversing +## for lc in lowcore_ptr +## erase lc +## endfor +## # Traversing link-list +## for cj in cred_jar via slabp_cache +## erase cj.name +## endfor +## [z90crypt] +## for ap_dev in ap_device_list.next within ap_device:list +## erase ap_dev.reply.message size ap_dev.reply.length +## endfor +## diff --git a/man_db.conf b/man_db.conf new file mode 100644 index 0000000..cd48eb2 --- /dev/null +++ b/man_db.conf @@ -0,0 +1,132 @@ +# man_db.conf +# +# This file is used by the man-db package to configure the man and cat paths. +# It is also used to provide a manpath for those without one by examining +# their PATH environment variable. For details see the manpath(5) man page. +# +# Lines beginning with `#' are comments and are ignored. Any combination of +# tabs or spaces may be used as `whitespace' separators. +# +# There are three mappings allowed in this file: +# -------------------------------------------------------- +# MANDATORY_MANPATH manpath_element +# MANPATH_MAP path_element manpath_element +# MANDB_MAP global_manpath [relative_catpath] +#--------------------------------------------------------- +# every automatically generated MANPATH includes these fields +# +#MANDATORY_MANPATH /usr/src/pvm3/man +# +MANDATORY_MANPATH /usr/man +MANDATORY_MANPATH /usr/share/man +MANDATORY_MANPATH /usr/local/share/man +#--------------------------------------------------------- +# set up PATH to MANPATH mapping +# ie. what man tree holds man pages for what binary directory. +# +# *PATH* -> *MANPATH* +# +MANPATH_MAP /bin /usr/share/man +MANPATH_MAP /usr/bin /usr/share/man +MANPATH_MAP /sbin /usr/share/man +MANPATH_MAP /usr/sbin /usr/share/man +MANPATH_MAP /usr/local/bin /usr/local/man +MANPATH_MAP /usr/local/bin /usr/local/share/man +MANPATH_MAP /usr/local/sbin /usr/local/man +MANPATH_MAP /usr/local/sbin /usr/local/share/man +MANPATH_MAP /usr/X11R6/bin /usr/X11R6/man +MANPATH_MAP /usr/bin/X11 /usr/X11R6/man +MANPATH_MAP /usr/games /usr/share/man +MANPATH_MAP /opt/bin /opt/man +MANPATH_MAP /opt/sbin /opt/man +#--------------------------------------------------------- +# For a manpath element to be treated as a system manpath (as most of those +# above should normally be), it must be mentioned below. Each line may have +# an optional extra string indicating the catpath associated with the +# manpath. If no catpath string is used, the catpath will default to the +# given manpath. +# +# You *must* provide all system manpaths, including manpaths for alternate +# operating systems, locale specific manpaths, and combinations of both, if +# they exist, otherwise the permissions of the user running man/mandb will +# be used to manipulate the manual pages. Also, mandb will not initialise +# the database cache for any manpaths not mentioned below unless explicitly +# requested to do so. +# +# In a per-user configuration file, this directive only controls the +# location of catpaths and the creation of database caches; it has no effect +# on privileges. +# +# Any manpaths that are subdirectories of other manpaths must be mentioned +# *before* the containing manpath. E.g. /usr/man/preformat must be listed +# before /usr/man. +# +# *MANPATH* -> *CATPATH* +# +MANDB_MAP /usr/man /var/cache/man/fsstnd +MANDB_MAP /usr/share/man /var/cache/man +MANDB_MAP /usr/local/man /var/cache/man/oldlocal +MANDB_MAP /usr/local/share/man /var/cache/man/local +MANDB_MAP /usr/X11R6/man /var/cache/man/X11R6 +MANDB_MAP /opt/man /var/cache/man/opt +MANDB_MAP /var/lib/snapd/snap/man /var/cache/man/snap +# +#--------------------------------------------------------- +# Program definitions. These are commented out by default as the value +# of the definition is already the default. To change: uncomment a +# definition and modify it. +# +#DEFINE pager less +#DEFINE cat cat +#DEFINE tr tr '\255\267\264\327' '\055\157\047\170' +#DEFINE grep grep +#DEFINE troff groff -mandoc +#DEFINE nroff nroff -mandoc +#DEFINE eqn eqn +#DEFINE neqn neqn +#DEFINE tbl tbl +#DEFINE col col +#DEFINE vgrind +#DEFINE refer refer +#DEFINE grap +#DEFINE pic pic -S +# +#DEFINE compressor gzip -c7 +#--------------------------------------------------------- +# Misc definitions: same as program definitions above. +# +#DEFINE whatis_grep_flags -i +#DEFINE apropos_grep_flags -iEw +#DEFINE apropos_regex_grep_flags -iE +#--------------------------------------------------------- +# Section names. Manual sections will be searched in the order listed here; +# the default is 1, n, l, 8, 3, 0, 2, 5, 4, 9, 6, 7. Multiple SECTION +# directives may be given for clarity, and will be concatenated together in +# the expected way. +# If a particular extension is not in this list (say, 1mh), it will be +# displayed with the rest of the section it belongs to. The effect of this +# is that you only need to explicitly list extensions if you want to force a +# particular order. Sections with extensions should usually be adjacent to +# their main section (e.g. "1 1mh 8 ..."). +# +SECTION 1 1p 8 2 3 3p 3pm 4 5 6 7 9 0p n l p o 1x 2x 3x 4x 5x 6x 7x 8x +# +#--------------------------------------------------------- +# Range of terminal widths permitted when displaying cat pages. If the +# terminal falls outside this range, cat pages will not be created (if +# missing) or displayed. +# +#MINCATWIDTH 80 +#MAXCATWIDTH 80 +# +# If CATWIDTH is set to a non-zero number, cat pages will always be +# formatted for a terminal of the given width, regardless of the width of +# the terminal actually being used. This should generally be within the +# range set by MINCATWIDTH and MAXCATWIDTH. +# +#CATWIDTH 0 +# +#--------------------------------------------------------- +# Flags. +# NOCACHE keeps man from creating cat pages. +#NOCACHE diff --git a/mke2fs.conf b/mke2fs.conf new file mode 100644 index 0000000..b334586 --- /dev/null +++ b/mke2fs.conf @@ -0,0 +1,59 @@ +[defaults] + base_features = sparse_super,large_file,filetype,resize_inode,dir_index,ext_attr + default_mntopts = acl,user_xattr + enable_periodic_fsck = 0 + blocksize = 4096 + inode_size = 256 + inode_ratio = 16384 + +[fs_types] + ext3 = { + features = has_journal + } + ext4 = { + features = has_journal,extent,huge_file,flex_bg,metadata_csum,64bit,dir_nlink,extra_isize + } + rhel6_ext4 = { + features = has_journal,extent,huge_file,flex_bg,uninit_bg,dir_nlink,extra_isize + inode_size = 256 + enable_periodic_fsck = 1 + default_mntopts = "" + } + rhel7_ext4 = { + features = has_journal,extent,huge_file,flex_bg,uninit_bg,dir_nlink,extra_isize,64bit + inode_size = 256 + } + rhel8_ext4 = { + features = has_journal,extent,huge_file,flex_bg,metadata_csum,64bit,dir_nlink,extra_isize + inode_size = 256 + } + small = { + blocksize = 1024 + inode_ratio = 4096 + } + floppy = { + blocksize = 1024 + inode_ratio = 8192 + } + big = { + inode_ratio = 32768 + } + huge = { + inode_ratio = 65536 + } + news = { + inode_ratio = 4096 + } + largefile = { + inode_ratio = 1048576 + blocksize = -1 + } + largefile4 = { + inode_ratio = 4194304 + blocksize = -1 + } + hurd = { + blocksize = 4096 + inode_size = 128 + warn_y2038_dates = 0 + } diff --git a/mock/alma+epel-8-aarch64.cfg b/mock/alma+epel-8-aarch64.cfg new file mode 100644 index 0000000..d9bb3e8 --- /dev/null +++ b/mock/alma+epel-8-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/almalinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'alma+epel-8-aarch64' +config_opts['description'] = 'AlmaLinux 8 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/alma+epel-8-ppc64le.cfg b/mock/alma+epel-8-ppc64le.cfg new file mode 100644 index 0000000..62bf003 --- /dev/null +++ b/mock/alma+epel-8-ppc64le.cfg @@ -0,0 +1,7 @@ +include('templates/almalinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'alma+epel-8-ppc64le' +config_opts['description'] = 'AlmaLinux 8 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/alma+epel-8-x86_64.cfg b/mock/alma+epel-8-x86_64.cfg new file mode 100644 index 0000000..f365426 --- /dev/null +++ b/mock/alma+epel-8-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/almalinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'alma+epel-8-x86_64' +config_opts['description'] = 'AlmaLinux 8 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/alma+epel-9-aarch64.cfg b/mock/alma+epel-9-aarch64.cfg new file mode 100644 index 0000000..8c6f144 --- /dev/null +++ b/mock/alma+epel-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('almalinux-9-aarch64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "alma+epel-9-{{ target_arch }}" +config_opts['description'] = 'AlmaLinux 9 + EPEL' diff --git a/mock/alma+epel-9-ppc64le.cfg b/mock/alma+epel-9-ppc64le.cfg new file mode 100644 index 0000000..d850af8 --- /dev/null +++ b/mock/alma+epel-9-ppc64le.cfg @@ -0,0 +1,5 @@ +include('almalinux-9-ppc64le.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "alma+epel-9-{{ target_arch }}" +config_opts['description'] = 'AlmaLinux 9 + EPEL' diff --git a/mock/alma+epel-9-s390x.cfg b/mock/alma+epel-9-s390x.cfg new file mode 100644 index 0000000..8ef1693 --- /dev/null +++ b/mock/alma+epel-9-s390x.cfg @@ -0,0 +1,5 @@ +include('almalinux-9-s390x.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "alma+epel-9-{{ target_arch }}" +config_opts['description'] = 'AlmaLinux 9 + EPEL' diff --git a/mock/alma+epel-9-x86_64.cfg b/mock/alma+epel-9-x86_64.cfg new file mode 100644 index 0000000..b897199 --- /dev/null +++ b/mock/alma+epel-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('almalinux-9-x86_64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "alma+epel-9-{{ target_arch }}" +config_opts['description'] = 'AlmaLinux 9 + EPEL' diff --git a/mock/almalinux-8-aarch64.cfg b/mock/almalinux-8-aarch64.cfg new file mode 100644 index 0000000..b8a3780 --- /dev/null +++ b/mock/almalinux-8-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-8.tpl') + +config_opts['root'] = 'almalinux-8-aarch64' +config_opts['description'] = 'AlmaLinux 8' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/almalinux-8-ppc64le.cfg b/mock/almalinux-8-ppc64le.cfg new file mode 100644 index 0000000..2497341 --- /dev/null +++ b/mock/almalinux-8-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-8.tpl') + +config_opts['root'] = 'almalinux-8-ppc64le' +config_opts['description'] = 'AlmaLinux 8' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/almalinux-8-x86_64.cfg b/mock/almalinux-8-x86_64.cfg new file mode 100644 index 0000000..2e4b26d --- /dev/null +++ b/mock/almalinux-8-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-8.tpl') + +config_opts['root'] = 'almalinux-8-x86_64' +config_opts['description'] = 'AlmaLinux 8' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/almalinux-9-aarch64.cfg b/mock/almalinux-9-aarch64.cfg new file mode 100644 index 0000000..4781878 --- /dev/null +++ b/mock/almalinux-9-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-9.tpl') + +config_opts['root'] = 'almalinux-9-aarch64' +config_opts['description'] = 'AlmaLinux 9' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/almalinux-9-ppc64le.cfg b/mock/almalinux-9-ppc64le.cfg new file mode 100644 index 0000000..24e8afe --- /dev/null +++ b/mock/almalinux-9-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-9.tpl') + +config_opts['root'] = 'almalinux-9-ppc64le' +config_opts['description'] = 'AlmaLinux 9' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/almalinux-9-s390x.cfg b/mock/almalinux-9-s390x.cfg new file mode 100644 index 0000000..c51b914 --- /dev/null +++ b/mock/almalinux-9-s390x.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-9.tpl') + +config_opts['root'] = 'almalinux-9-s390x' +config_opts['description'] = 'AlmaLinux 9' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/almalinux-9-x86_64.cfg b/mock/almalinux-9-x86_64.cfg new file mode 100644 index 0000000..438e76a --- /dev/null +++ b/mock/almalinux-9-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/almalinux-9.tpl') + +config_opts['root'] = 'almalinux-9-x86_64' +config_opts['description'] = 'AlmaLinux 9' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/amazonlinux-2-aarch64.cfg b/mock/amazonlinux-2-aarch64.cfg new file mode 100644 index 0000000..837b332 --- /dev/null +++ b/mock/amazonlinux-2-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/amazonlinux-2.tpl') + +config_opts['root'] = 'amzn-2-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/amazonlinux-2-x86_64.cfg b/mock/amazonlinux-2-x86_64.cfg new file mode 100644 index 0000000..cc8df20 --- /dev/null +++ b/mock/amazonlinux-2-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/amazonlinux-2.tpl') + +config_opts['root'] = 'amzn-2-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/amazonlinux-2023-aarch64.cfg b/mock/amazonlinux-2023-aarch64.cfg new file mode 100644 index 0000000..94d72f8 --- /dev/null +++ b/mock/amazonlinux-2023-aarch64.cfg @@ -0,0 +1,4 @@ +include('templates/amazonlinux-2023.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/amazonlinux-2023-x86_64.cfg b/mock/amazonlinux-2023-x86_64.cfg new file mode 100644 index 0000000..e0dfd28 --- /dev/null +++ b/mock/amazonlinux-2023-x86_64.cfg @@ -0,0 +1,4 @@ +include('templates/amazonlinux-2023.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/anolis-8-aarch64.cfg b/mock/anolis-8-aarch64.cfg new file mode 100644 index 0000000..3413718 --- /dev/null +++ b/mock/anolis-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/anolis-8.tpl') + +config_opts['root'] = 'anolis-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/anolis-8-x86_64.cfg b/mock/anolis-8-x86_64.cfg new file mode 100644 index 0000000..ef96a64 --- /dev/null +++ b/mock/anolis-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/anolis-8.tpl') + +config_opts['root'] = 'anolis-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream+epel-10-aarch64.cfg b/mock/centos-stream+epel-10-aarch64.cfg new file mode 100644 index 0000000..0aa1849 --- /dev/null +++ b/mock/centos-stream+epel-10-aarch64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-10.tpl') +include('templates/epel-10.tpl') + +config_opts['root'] = 'centos-stream+epel-10-aarch64' +config_opts['description'] = 'CentOS Stream 10 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream+epel-10-ppc64le.cfg b/mock/centos-stream+epel-10-ppc64le.cfg new file mode 100644 index 0000000..1348fb8 --- /dev/null +++ b/mock/centos-stream+epel-10-ppc64le.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-10.tpl') +include('templates/epel-10.tpl') + +config_opts['root'] = 'centos-stream+epel-10-ppc64le' +config_opts['description'] = 'CentOS Stream 10 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/centos-stream+epel-10-s390x.cfg b/mock/centos-stream+epel-10-s390x.cfg new file mode 100644 index 0000000..8c1b3f0 --- /dev/null +++ b/mock/centos-stream+epel-10-s390x.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-10.tpl') +include('templates/epel-10.tpl') + +config_opts['root'] = 'centos-stream+epel-10-s390x' +config_opts['description'] = 'CentOS Stream 10 + EPEL' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/centos-stream+epel-10-x86_64.cfg b/mock/centos-stream+epel-10-x86_64.cfg new file mode 100644 index 0000000..1594779 --- /dev/null +++ b/mock/centos-stream+epel-10-x86_64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-10.tpl') +include('templates/epel-10.tpl') + +config_opts['root'] = 'centos-stream+epel-10-x86_64' +config_opts['description'] = 'CentOS Stream 10 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream+epel-8-aarch64.cfg b/mock/centos-stream+epel-8-aarch64.cfg new file mode 100644 index 0000000..60ce660 --- /dev/null +++ b/mock/centos-stream+epel-8-aarch64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos-stream+epel-8-aarch64' +config_opts['description'] = 'CentOS Stream 8 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream+epel-8-ppc64le.cfg b/mock/centos-stream+epel-8-ppc64le.cfg new file mode 100644 index 0000000..3ef833f --- /dev/null +++ b/mock/centos-stream+epel-8-ppc64le.cfg @@ -0,0 +1,10 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos-stream+epel-8-ppc64le' +config_opts['description'] = 'CentOS Stream 8 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream+epel-8-x86_64.cfg b/mock/centos-stream+epel-8-x86_64.cfg new file mode 100644 index 0000000..a95fbeb --- /dev/null +++ b/mock/centos-stream+epel-8-x86_64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos-stream+epel-8-x86_64' +config_opts['description'] = 'CentOS Stream 8 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream+epel-9-aarch64.cfg b/mock/centos-stream+epel-9-aarch64.cfg new file mode 100644 index 0000000..b94fb1c --- /dev/null +++ b/mock/centos-stream+epel-9-aarch64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'centos-stream+epel-9-aarch64' +config_opts['description'] = 'CentOS Stream 9 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream+epel-9-ppc64le.cfg b/mock/centos-stream+epel-9-ppc64le.cfg new file mode 100644 index 0000000..a5eb3cf --- /dev/null +++ b/mock/centos-stream+epel-9-ppc64le.cfg @@ -0,0 +1,10 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'centos-stream+epel-9-ppc64le' +config_opts['description'] = 'CentOS Stream 9 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream+epel-9-s390x.cfg b/mock/centos-stream+epel-9-s390x.cfg new file mode 100644 index 0000000..778ba12 --- /dev/null +++ b/mock/centos-stream+epel-9-s390x.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'centos-stream+epel-9-s390x' +config_opts['description'] = 'CentOS Stream 9 + EPEL' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/centos-stream+epel-9-x86_64.cfg b/mock/centos-stream+epel-9-x86_64.cfg new file mode 100644 index 0000000..540d8f0 --- /dev/null +++ b/mock/centos-stream+epel-9-x86_64.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "epel" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'centos-stream+epel-9-x86_64' +config_opts['description'] = 'CentOS Stream 9 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream+epel-next-8-aarch64.cfg b/mock/centos-stream+epel-next-8-aarch64.cfg new file mode 100644 index 0000000..0ae5698 --- /dev/null +++ b/mock/centos-stream+epel-next-8-aarch64.cfg @@ -0,0 +1,10 @@ +config_opts["koji_primary_repo"] = "epel-next" + +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') +include('templates/epel-next-8.tpl') + +config_opts['root'] = 'centos-stream+epel-next-8-aarch64' +config_opts['description'] = 'CentOS Stream 8 + EPEL Next' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream+epel-next-8-ppc64le.cfg b/mock/centos-stream+epel-next-8-ppc64le.cfg new file mode 100644 index 0000000..75bec6e --- /dev/null +++ b/mock/centos-stream+epel-next-8-ppc64le.cfg @@ -0,0 +1,12 @@ +config_opts["koji_primary_repo"] = "epel-next" + +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') +include('templates/epel-next-8.tpl') + +config_opts['root'] = 'centos-stream+epel-next-8-ppc64le' +config_opts['description'] = 'CentOS Stream 8 + EPEL Next' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream+epel-next-8-x86_64.cfg b/mock/centos-stream+epel-next-8-x86_64.cfg new file mode 100644 index 0000000..5a4b6de --- /dev/null +++ b/mock/centos-stream+epel-next-8-x86_64.cfg @@ -0,0 +1,10 @@ +config_opts["koji_primary_repo"] = "epel-next" + +include('templates/centos-stream-8.tpl') +include('templates/epel-8.tpl') +include('templates/epel-next-8.tpl') + +config_opts['root'] = 'centos-stream+epel-next-8-x86_64' +config_opts['description'] = 'CentOS Stream 8 + EPEL Next' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream+epel-next-9-aarch64.cfg b/mock/centos-stream+epel-next-9-aarch64.cfg new file mode 100644 index 0000000..4f3e2e4 --- /dev/null +++ b/mock/centos-stream+epel-next-9-aarch64.cfg @@ -0,0 +1,9 @@ +config_opts["koji_primary_repo"] = "epel-next" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') +include('templates/epel-next-9.tpl') + +config_opts['root'] = 'centos-stream+epel-next-9-aarch64' +config_opts['description'] = 'CentOS Stream 9 + EPEL Next' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream+epel-next-9-ppc64le.cfg b/mock/centos-stream+epel-next-9-ppc64le.cfg new file mode 100644 index 0000000..a831983 --- /dev/null +++ b/mock/centos-stream+epel-next-9-ppc64le.cfg @@ -0,0 +1,11 @@ +config_opts["koji_primary_repo"] = "epel-next" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') +include('templates/epel-next-9.tpl') + +config_opts['root'] = 'centos-stream+epel-next-9-ppc64le' +config_opts['description'] = 'CentOS Stream 9 + EPEL Next' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream+epel-next-9-s390x.cfg b/mock/centos-stream+epel-next-9-s390x.cfg new file mode 100644 index 0000000..6a3f6f0 --- /dev/null +++ b/mock/centos-stream+epel-next-9-s390x.cfg @@ -0,0 +1,9 @@ +config_opts["koji_primary_repo"] = "epel-next" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') +include('templates/epel-next-9.tpl') + +config_opts['root'] = 'centos-stream+epel-next-9-s390x' +config_opts['description'] = 'CentOS Stream 9 + EPEL Next' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/centos-stream+epel-next-9-x86_64.cfg b/mock/centos-stream+epel-next-9-x86_64.cfg new file mode 100644 index 0000000..7f9ea11 --- /dev/null +++ b/mock/centos-stream+epel-next-9-x86_64.cfg @@ -0,0 +1,9 @@ +config_opts["koji_primary_repo"] = "epel-next" +include('templates/centos-stream-9.tpl') +include('templates/epel-9.tpl') +include('templates/epel-next-9.tpl') + +config_opts['root'] = 'centos-stream+epel-next-9-x86_64' +config_opts['description'] = 'CentOS Stream 9 + EPEL Next' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream-10-aarch64.cfg b/mock/centos-stream-10-aarch64.cfg new file mode 100644 index 0000000..fb8fc76 --- /dev/null +++ b/mock/centos-stream-10-aarch64.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-10.tpl') + +config_opts['root'] = 'centos-stream-10-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream-10-ppc64le.cfg b/mock/centos-stream-10-ppc64le.cfg new file mode 100644 index 0000000..a841470 --- /dev/null +++ b/mock/centos-stream-10-ppc64le.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-10.tpl') + +config_opts['root'] = 'centos-stream-10-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/centos-stream-10-s390x.cfg b/mock/centos-stream-10-s390x.cfg new file mode 100644 index 0000000..f7301bb --- /dev/null +++ b/mock/centos-stream-10-s390x.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-10.tpl') + +config_opts['root'] = 'centos-stream-10-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/centos-stream-10-x86_64.cfg b/mock/centos-stream-10-x86_64.cfg new file mode 100644 index 0000000..a8031c3 --- /dev/null +++ b/mock/centos-stream-10-x86_64.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-10.tpl') + +config_opts['root'] = 'centos-stream-10-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream-8-aarch64.cfg b/mock/centos-stream-8-aarch64.cfg new file mode 100644 index 0000000..4107720 --- /dev/null +++ b/mock/centos-stream-8-aarch64.cfg @@ -0,0 +1,7 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-8.tpl') + +config_opts['root'] = 'centos-stream-8-aarch64' +config_opts['description'] = 'CentOS Stream 8' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream-8-ppc64le.cfg b/mock/centos-stream-8-ppc64le.cfg new file mode 100644 index 0000000..c8c0463 --- /dev/null +++ b/mock/centos-stream-8-ppc64le.cfg @@ -0,0 +1,9 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-8.tpl') + +config_opts['root'] = 'centos-stream-8-ppc64le' +config_opts['description'] = 'CentOS Stream 8' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream-8-x86_64.cfg b/mock/centos-stream-8-x86_64.cfg new file mode 100644 index 0000000..ca3b9e6 --- /dev/null +++ b/mock/centos-stream-8-x86_64.cfg @@ -0,0 +1,7 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-8.tpl') + +config_opts['root'] = 'centos-stream-8-x86_64' +config_opts['description'] = 'CentOS Stream 8' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/centos-stream-9-aarch64.cfg b/mock/centos-stream-9-aarch64.cfg new file mode 100644 index 0000000..4877cbe --- /dev/null +++ b/mock/centos-stream-9-aarch64.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-9.tpl') + +config_opts['root'] = 'centos-stream-9-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/centos-stream-9-ppc64le.cfg b/mock/centos-stream-9-ppc64le.cfg new file mode 100644 index 0000000..fa5e45b --- /dev/null +++ b/mock/centos-stream-9-ppc64le.cfg @@ -0,0 +1,8 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-9.tpl') + +config_opts['root'] = 'centos-stream-9-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/centos-stream-9-s390x.cfg b/mock/centos-stream-9-s390x.cfg new file mode 100644 index 0000000..a7b0484 --- /dev/null +++ b/mock/centos-stream-9-s390x.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-9.tpl') + +config_opts['root'] = 'centos-stream-9-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/centos-stream-9-x86_64.cfg b/mock/centos-stream-9-x86_64.cfg new file mode 100644 index 0000000..ceb80d7 --- /dev/null +++ b/mock/centos-stream-9-x86_64.cfg @@ -0,0 +1,6 @@ +config_opts["koji_primary_repo"] = "centos-stream" +include('templates/centos-stream-9.tpl') + +config_opts['root'] = 'centos-stream-9-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/chroot-aliases.cfg b/mock/chroot-aliases.cfg new file mode 100644 index 0000000..2db8256 --- /dev/null +++ b/mock/chroot-aliases.cfg @@ -0,0 +1,80 @@ +# DO NOT EDIT THIS FILE. This is automatically replaced with any +# update of the mock-core-configs.rpm package. Tak a look at the +# /etc/mock/site-defaults.cfg file. + +config_opts["no-config"]["epel-8"] = {} +config_opts["no-config"]["epel-8"]["alternatives"] = { + "alma+epel-8": { + "description": [ + "Builds against AlmaLinux 8 repositories, " + "together with the official EPEL repositories.", + "Project page: https://almalinux.org/" + ], + }, + "centos-stream+epel-8": { + "description": [ + "Builds against CentOS Stream 8 repositories (some packages " + "may be a bit ahead the Red Hat Enterprise Linux 8) together " + "with the official EPEL 8 repositories.", + "Project page: https://www.centos.org/centos-stream/" + ], + }, + "circlelinux+epel-8": { + "description": [ + "Builds against Circle Linux 8 repositories, " + "together with the official EPEL repositories.", + "Project page: https://cclinux.org/" + ], + }, + "rhel+epel-8": { + "description": [ + "Builds against Red Hat Enterprise Linux 8 repositories, " + "together with the official EPEL repositories.", + "This mimics what is done in the official EPEL build system, " + "but you need a Red Hat subscription:", + "https://rpm-software-management.github.io/mock/Feature-rhelchroots" + ], + }, + "rocky+epel-8": { + "description": [ + "Builds against Rocky Linux 8 repositories, " + "together with the official EPEL repositories.", + "Project page: https://rockylinux.org/" + ], + }, +} + +config_opts["no-config"]["epel-9"] = {} +config_opts["no-config"]["epel-9"]["alternatives"] = { + "alma+epel-9": { + "description": [ + "Builds against AlmaLinux 9 repositories, " + "together with the official EPEL repositories.", + "Project page: https://almalinux.org/" + ], + }, + "centos-stream+epel-9": { + "description": [ + "Builds against CentOS Stream 9 repositories (some packages " + "may be a bit ahead the Red Hat Enterprise Linux 9) together " + "with the official EPEL repositories.", + "Project page: https://www.centos.org/centos-stream/" + ], + }, + "rhel+epel-9": { + "description": [ + "Builds against Red Hat Enterprise Linux 9 repositories, " + "together with the official EPEL repositories.", + "This mimics what is done in the official EPEL build system, " + "but you need a Red Hat subscription:", + "https://rpm-software-management.github.io/mock/Feature-rhelchroots" + ], + }, + "rocky+epel-9": { + "description": [ + "Builds against Rocky Linux 9 repositories, " + "together with the official EPEL repositories.", + "Project page: https://rockylinux.org/" + ], + }, +} diff --git a/mock/circlelinux+epel-8-aarch64.cfg b/mock/circlelinux+epel-8-aarch64.cfg new file mode 100644 index 0000000..82bea46 --- /dev/null +++ b/mock/circlelinux+epel-8-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/circlelinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'circlelinux+epel-8-aarch64' +config_opts['description'] = 'CircleLinux 8 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/circlelinux+epel-8-ppc64le.cfg b/mock/circlelinux+epel-8-ppc64le.cfg new file mode 100644 index 0000000..f3c730f --- /dev/null +++ b/mock/circlelinux+epel-8-ppc64le.cfg @@ -0,0 +1,7 @@ +include('templates/circlelinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'circlelinux+epel-8-ppc64le' +config_opts['description'] = 'CircleLinux 8 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/circlelinux+epel-8-x86_64.cfg b/mock/circlelinux+epel-8-x86_64.cfg new file mode 100644 index 0000000..9bfe876 --- /dev/null +++ b/mock/circlelinux+epel-8-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/circlelinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'circlelinux+epel-8-x86_64' +config_opts['description'] = 'CircleLinux 8 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/circlelinux+epel-9-aarch64.cfg b/mock/circlelinux+epel-9-aarch64.cfg new file mode 100644 index 0000000..61269fc --- /dev/null +++ b/mock/circlelinux+epel-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('circlelinux-9-aarch64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "circle+epel-9-{{ target_arch }}" +config_opts['description'] = 'Circle Linux 9 + EPEL' diff --git a/mock/circlelinux+epel-9-ppc64le.cfg b/mock/circlelinux+epel-9-ppc64le.cfg new file mode 100644 index 0000000..65c29f7 --- /dev/null +++ b/mock/circlelinux+epel-9-ppc64le.cfg @@ -0,0 +1,5 @@ +include('circlelinux-9-ppc64le.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "circle+epel-9-{{ target_arch }}" +config_opts['description'] = 'Circle Linux 9 + EPEL' diff --git a/mock/circlelinux+epel-9-s390x.cfg b/mock/circlelinux+epel-9-s390x.cfg new file mode 100644 index 0000000..504181d --- /dev/null +++ b/mock/circlelinux+epel-9-s390x.cfg @@ -0,0 +1,5 @@ +include('circlelinux-9-s390x.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "circle+epel-9-{{ target_arch }}" +config_opts['description'] = 'Circle Linux 9 + EPEL' diff --git a/mock/circlelinux+epel-9-x86_64.cfg b/mock/circlelinux+epel-9-x86_64.cfg new file mode 100644 index 0000000..e598931 --- /dev/null +++ b/mock/circlelinux+epel-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('circlelinux-9-x86_64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "circle+epel-9-{{ target_arch }}" +config_opts['description'] = 'Circle Linux 9 + EPEL' diff --git a/mock/circlelinux-8-aarch64.cfg b/mock/circlelinux-8-aarch64.cfg new file mode 100644 index 0000000..62f5317 --- /dev/null +++ b/mock/circlelinux-8-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-8.tpl') + +config_opts['root'] = 'circlelinux-8-aarch64' +config_opts['description'] = 'CircleLinux 8' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/circlelinux-8-ppc64le.cfg b/mock/circlelinux-8-ppc64le.cfg new file mode 100644 index 0000000..9f07f5e --- /dev/null +++ b/mock/circlelinux-8-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-8.tpl') + +config_opts['root'] = 'circlelinux-8-ppc64le' +config_opts['description'] = 'CircleLinux 8' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/circlelinux-8-x86_64.cfg b/mock/circlelinux-8-x86_64.cfg new file mode 100644 index 0000000..e8ca17e --- /dev/null +++ b/mock/circlelinux-8-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-8.tpl') + +config_opts['root'] = 'circlelinux-8-x86_64' +config_opts['description'] = 'CircleLinux 8' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/circlelinux-9-aarch64.cfg b/mock/circlelinux-9-aarch64.cfg new file mode 100644 index 0000000..4fd7160 --- /dev/null +++ b/mock/circlelinux-9-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-9.tpl') + +config_opts['root'] = 'circleinux-9-aarch64' +config_opts['description'] = 'Circle Linux 9' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/circlelinux-9-ppc64le.cfg b/mock/circlelinux-9-ppc64le.cfg new file mode 100644 index 0000000..5dbe6ef --- /dev/null +++ b/mock/circlelinux-9-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-9.tpl') + +config_opts['root'] = 'circlelinux-9-ppc64le' +config_opts['description'] = 'Circle Linux 9' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/circlelinux-9-s390x.cfg b/mock/circlelinux-9-s390x.cfg new file mode 100644 index 0000000..6f1af98 --- /dev/null +++ b/mock/circlelinux-9-s390x.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-9.tpl') + +config_opts['root'] = 'circlelinux-9-s390x' +config_opts['description'] = 'Circle Linux 9' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/circlelinux-9-x86_64.cfg b/mock/circlelinux-9-x86_64.cfg new file mode 100644 index 0000000..23aefea --- /dev/null +++ b/mock/circlelinux-9-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/circlelinux-9.tpl') + +config_opts['root'] = 'circlelinux-9-x86_64' +config_opts['description'] = 'Circle Linux 9' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/custom-1-aarch64.cfg b/mock/custom-1-aarch64.cfg new file mode 100644 index 0000000..4b8f943 --- /dev/null +++ b/mock/custom-1-aarch64.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/custom-1-armhfp.cfg b/mock/custom-1-armhfp.cfg new file mode 100644 index 0000000..d6c7e85 --- /dev/null +++ b/mock/custom-1-armhfp.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-armhfp' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l',) diff --git a/mock/custom-1-i386.cfg b/mock/custom-1-i386.cfg new file mode 100644 index 0000000..0c43172 --- /dev/null +++ b/mock/custom-1-i386.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/custom-1-ppc64.cfg b/mock/custom-1-ppc64.cfg new file mode 100644 index 0000000..88ab49b --- /dev/null +++ b/mock/custom-1-ppc64.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) diff --git a/mock/custom-1-ppc64le.cfg b/mock/custom-1-ppc64le.cfg new file mode 100644 index 0000000..57cc609 --- /dev/null +++ b/mock/custom-1-ppc64le.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/custom-1-s390.cfg b/mock/custom-1-s390.cfg new file mode 100644 index 0000000..6886159 --- /dev/null +++ b/mock/custom-1-s390.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-s390' +config_opts['target_arch'] = 's390' +config_opts['legal_host_arches'] = ('s390x', 's390') diff --git a/mock/custom-1-s390x.cfg b/mock/custom-1-s390x.cfg new file mode 100644 index 0000000..96150bb --- /dev/null +++ b/mock/custom-1-s390x.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/custom-1-x86_64.cfg b/mock/custom-1-x86_64.cfg new file mode 100644 index 0000000..f2c5d24 --- /dev/null +++ b/mock/custom-1-x86_64.cfg @@ -0,0 +1,5 @@ +include('/etc/mock/templates/custom-1.tpl') + +config_opts['root'] = 'custom-1-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/default.cfg b/mock/default.cfg new file mode 120000 index 0000000..7086f47 --- /dev/null +++ b/mock/default.cfg @@ -0,0 +1 @@ +rocky+epel-9-x86_64.cfg \ No newline at end of file diff --git a/mock/eol/anolis-7-aarch64.cfg b/mock/eol/anolis-7-aarch64.cfg new file mode 100644 index 0000000..16f61cc --- /dev/null +++ b/mock/eol/anolis-7-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/anolis-7.tpl') + +config_opts['root'] = 'anolis-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/anolis-7-x86_64.cfg b/mock/eol/anolis-7-x86_64.cfg new file mode 100644 index 0000000..48e7fcc --- /dev/null +++ b/mock/eol/anolis-7-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/anolis-7.tpl') + +config_opts['root'] = 'anolis-7-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/centos+epel-7-aarch64.cfg b/mock/eol/centos+epel-7-aarch64.cfg new file mode 100644 index 0000000..49376cc --- /dev/null +++ b/mock/eol/centos+epel-7-aarch64.cfg @@ -0,0 +1,6 @@ +include('eol/templates/centos-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'centos+epel-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/centos+epel-7-ppc64.cfg b/mock/eol/centos+epel-7-ppc64.cfg new file mode 100644 index 0000000..42fd4fb --- /dev/null +++ b/mock/eol/centos+epel-7-ppc64.cfg @@ -0,0 +1,6 @@ +include('eol/templates/centos-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'centos+epel-7-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) diff --git a/mock/eol/centos+epel-7-ppc64le.cfg b/mock/eol/centos+epel-7-ppc64le.cfg new file mode 100644 index 0000000..ba94424 --- /dev/null +++ b/mock/eol/centos+epel-7-ppc64le.cfg @@ -0,0 +1,7 @@ +include('eol/templates/centos-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'centos+epel-7-ppc64le' +config_opts['description'] = 'CentOS 7 + EPEL' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/centos+epel-7-x86_64.cfg b/mock/eol/centos+epel-7-x86_64.cfg new file mode 100644 index 0000000..893ed57 --- /dev/null +++ b/mock/eol/centos+epel-7-x86_64.cfg @@ -0,0 +1,7 @@ +include('eol/templates/centos-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'centos+epel-7-x86_64' +config_opts['description'] = 'CentOS 7 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/centos+epel-8-aarch64.cfg b/mock/eol/centos+epel-8-aarch64.cfg new file mode 100644 index 0000000..6800e83 --- /dev/null +++ b/mock/eol/centos+epel-8-aarch64.cfg @@ -0,0 +1,6 @@ +include('eol/templates/centos-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos+epel-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/centos+epel-8-ppc64le.cfg b/mock/eol/centos+epel-8-ppc64le.cfg new file mode 100644 index 0000000..ca62a12 --- /dev/null +++ b/mock/eol/centos+epel-8-ppc64le.cfg @@ -0,0 +1,6 @@ +include('eol/templates/centos-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos+epel-8-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/centos+epel-8-x86_64.cfg b/mock/eol/centos+epel-8-x86_64.cfg new file mode 100644 index 0000000..48eb39a --- /dev/null +++ b/mock/eol/centos+epel-8-x86_64.cfg @@ -0,0 +1,6 @@ +include('eol/templates/centos-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'centos+epel-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/centos-6-i386.cfg b/mock/eol/centos-6-i386.cfg new file mode 100644 index 0000000..a2ec6f8 --- /dev/null +++ b/mock/eol/centos-6-i386.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-6.tpl') + +config_opts['root'] = 'centos-6-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/centos-6-x86_64.cfg b/mock/eol/centos-6-x86_64.cfg new file mode 100644 index 0000000..7a047dc --- /dev/null +++ b/mock/eol/centos-6-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-6.tpl') + +config_opts['root'] = 'centos-6-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/centos-7-aarch64.cfg b/mock/eol/centos-7-aarch64.cfg new file mode 100644 index 0000000..36857ca --- /dev/null +++ b/mock/eol/centos-7-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-7.tpl') + +config_opts['root'] = 'centos-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/centos-7-ppc64.cfg b/mock/eol/centos-7-ppc64.cfg new file mode 100644 index 0000000..66d4627 --- /dev/null +++ b/mock/eol/centos-7-ppc64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-7.tpl') + +config_opts['root'] = 'centos-7-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) diff --git a/mock/eol/centos-7-ppc64le.cfg b/mock/eol/centos-7-ppc64le.cfg new file mode 100644 index 0000000..00274e7 --- /dev/null +++ b/mock/eol/centos-7-ppc64le.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-7.tpl') + +config_opts['root'] = 'centos-7-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/centos-7-x86_64.cfg b/mock/eol/centos-7-x86_64.cfg new file mode 100644 index 0000000..4f17422 --- /dev/null +++ b/mock/eol/centos-7-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-7.tpl') + +config_opts['root'] = 'centos-7-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/centos-8-aarch64.cfg b/mock/eol/centos-8-aarch64.cfg new file mode 100644 index 0000000..5e4995f --- /dev/null +++ b/mock/eol/centos-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-8.tpl') + +config_opts['root'] = 'centos-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/centos-8-ppc64le.cfg b/mock/eol/centos-8-ppc64le.cfg new file mode 100644 index 0000000..ee908bd --- /dev/null +++ b/mock/eol/centos-8-ppc64le.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-8.tpl') + +config_opts['root'] = 'centos-8-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/centos-8-x86_64.cfg b/mock/eol/centos-8-x86_64.cfg new file mode 100644 index 0000000..4db51b0 --- /dev/null +++ b/mock/eol/centos-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/centos-8.tpl') + +config_opts['root'] = 'centos-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/epel-5-i386.cfg b/mock/eol/epel-5-i386.cfg new file mode 100644 index 0000000..ba55515 --- /dev/null +++ b/mock/eol/epel-5-i386.cfg @@ -0,0 +1,60 @@ +# epel5 is EOLed, neither updates nor fixes are released +config_opts['root'] = 'epel-5-i386' +config_opts['target_arch'] = 'i386' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') +config_opts['chroot_setup_cmd'] = 'install buildsys-build buildsys-macros' +config_opts['dist'] = 'el5' # only useful for --resultdir variable subst +if 'macros' not in config_opts: config_opts['macros'] = {} +config_opts['macros']['%__arch_install_post'] = '%{nil}' +# beware: RHEL uses 5Server or 5Client +config_opts['releasever'] = '5' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +logfile=/var/log/yum.log +reposdir=/dev/null +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +mdpolicy=group:primary +best=1 + +# repos + +[core] +name=base +baseurl=http://vault.centos.org/5.11/os/i386/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-5 +gpgcheck=1 +skip_if_unavailable=False + +[update] +name=updates +baseurl=http://vault.centos.org/5.11/updates/i386/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-5 +gpgcheck=1 +skip_if_unavailable=False + +[groups] +name=groups +baseurl=http://buildsys.fedoraproject.org/buildgroups/rhel5/i386/ + +[epel] +name=epel +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-5&arch=i386 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-5 +gpgcheck=1 +skip_if_unavailable=False + +[epel-debuginfo] +name=epel-debug +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-debug-5&arch=i386 +failovermethod=priority +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/epel-5-x86_64.cfg b/mock/eol/epel-5-x86_64.cfg new file mode 100644 index 0000000..7d641b0 --- /dev/null +++ b/mock/eol/epel-5-x86_64.cfg @@ -0,0 +1,60 @@ +#epel5 is EOLed, neither updates nor fixes are released +config_opts['root'] = 'epel-5-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install buildsys-build buildsys-macros' +config_opts['dist'] = 'el5' # only useful for --resultdir variable subst +if 'macros' not in config_opts: config_opts['macros'] = {} +config_opts['macros']['%__arch_install_post'] = '%{nil}' +# beware: RHEL uses 5Server or 5Client +config_opts['releasever'] = '5' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +logfile=/var/log/yum.log +reposdir=/dev/null +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +mdpolicy=group:primary +best=1 + +# repos + +[core] +name=base +baseurl=http://vault.centos.org/5.11/os/x86_64/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-5 +gpgcheck=1 +skip_if_unavailable=False + +[update] +name=updates +baseurl=http://vault.centos.org/5.11/updates/x86_64/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-5 +gpgcheck=1 +skip_if_unavailable=False + +[groups] +name=groups +baseurl=http://buildsys.fedoraproject.org/buildgroups/rhel5/x86_64/ + +[epel] +name=epel +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-5&arch=x86_64 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-5 +gpgcheck=1 +skip_if_unavailable=False + +[epel-debuginfo] +name=epel-debug +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-debug-5&arch=x86_64 +failovermethod=priority +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/epel-6-i386.cfg b/mock/eol/epel-6-i386.cfg new file mode 100644 index 0000000..d9aec58 --- /dev/null +++ b/mock/eol/epel-6-i386.cfg @@ -0,0 +1,5 @@ +include('eol/templates/epel-6.tpl') + +config_opts['root'] = 'epel-6-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/epel-6-x86_64.cfg b/mock/eol/epel-6-x86_64.cfg new file mode 100644 index 0000000..c9b6a00 --- /dev/null +++ b/mock/eol/epel-6-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/epel-6.tpl') + +config_opts['root'] = 'epel-6-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/epel-7-ppc64le.cfg b/mock/eol/epel-7-ppc64le.cfg new file mode 120000 index 0000000..4a7bc9e --- /dev/null +++ b/mock/eol/epel-7-ppc64le.cfg @@ -0,0 +1 @@ +centos+epel-7-ppc64le.cfg \ No newline at end of file diff --git a/mock/eol/epel-7-x86_64.cfg b/mock/eol/epel-7-x86_64.cfg new file mode 120000 index 0000000..dca3f79 --- /dev/null +++ b/mock/eol/epel-7-x86_64.cfg @@ -0,0 +1 @@ +centos+epel-7-x86_64.cfg \ No newline at end of file diff --git a/mock/eol/epelplayground-8-aarch64.cfg b/mock/eol/epelplayground-8-aarch64.cfg new file mode 100644 index 0000000..6f4190e --- /dev/null +++ b/mock/eol/epelplayground-8-aarch64.cfg @@ -0,0 +1,6 @@ +include('/etc/mock/templates/centos-8.tpl') +include('/etc/mock/eol/templates/epelplayground-8.tpl') + +config_opts['root'] = 'epelplayground-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/epelplayground-8-ppc64le.cfg b/mock/eol/epelplayground-8-ppc64le.cfg new file mode 100644 index 0000000..b3b6a74 --- /dev/null +++ b/mock/eol/epelplayground-8-ppc64le.cfg @@ -0,0 +1,6 @@ +include('/etc/mock/templates/centos-8.tpl') +include('/etc/mock/eol/templates/epelplayground-8.tpl') + +config_opts['root'] = 'epelplayground-8-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/epelplayground-8-x86_64.cfg b/mock/eol/epelplayground-8-x86_64.cfg new file mode 100644 index 0000000..a064f5a --- /dev/null +++ b/mock/eol/epelplayground-8-x86_64.cfg @@ -0,0 +1,6 @@ +include('/etc/mock/templates/centos-8.tpl') +include('/etc/mock/eol/templates/epelplayground-8.tpl') + +config_opts['root'] = 'epelplayground-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/fedora-25-aarch64.cfg b/mock/eol/fedora-25-aarch64.cfg new file mode 100644 index 0000000..ced8e44 --- /dev/null +++ b/mock/eol/fedora-25-aarch64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://armpkgs.fedoraproject.org/repos/f25-build/latest/aarch64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-armhfp.cfg b/mock/eol/fedora-25-armhfp.cfg new file mode 100644 index 0000000..990f160 --- /dev/null +++ b/mock/eol/fedora-25-armhfp.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-armhfp' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f25-build/latest/armhfp/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-i386.cfg b/mock/eol/fedora-25-i386.cfg new file mode 100644 index 0000000..6af775f --- /dev/null +++ b/mock/eol/fedora-25-i386.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f25-build/latest/i386/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-ppc64.cfg b/mock/eol/fedora-25-ppc64.cfg new file mode 100644 index 0000000..2612d1f --- /dev/null +++ b/mock/eol/fedora-25-ppc64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f25-build/latest/ppc64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-ppc64le.cfg b/mock/eol/fedora-25-ppc64le.cfg new file mode 100644 index 0000000..ea2d9da --- /dev/null +++ b/mock/eol/fedora-25-ppc64le.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f25-build/latest/ppc64le/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-s390x.cfg b/mock/eol/fedora-25-s390x.cfg new file mode 100644 index 0000000..f1a5e3e --- /dev/null +++ b/mock/eol/fedora-25-s390x.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://s390pkgs.fedoraproject.org/repos/f25-build/latest/s390x/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-25-x86_64.cfg b/mock/eol/fedora-25-x86_64.cfg new file mode 100644 index 0000000..748d257 --- /dev/null +++ b/mock/eol/fedora-25-x86_64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-25-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc25' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '25' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f25-build/latest/x86_64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-25-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-aarch64.cfg b/mock/eol/fedora-26-aarch64.cfg new file mode 100644 index 0000000..5cd3c40 --- /dev/null +++ b/mock/eol/fedora-26-aarch64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://armpkgs.fedoraproject.org/repos/f26-build/latest/aarch64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-armhfp.cfg b/mock/eol/fedora-26-armhfp.cfg new file mode 100644 index 0000000..26cbdfd --- /dev/null +++ b/mock/eol/fedora-26-armhfp.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-armhfp' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f26-build/latest/armhfp/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-i386.cfg b/mock/eol/fedora-26-i386.cfg new file mode 100644 index 0000000..538d239 --- /dev/null +++ b/mock/eol/fedora-26-i386.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f26-build/latest/i386/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-ppc64.cfg b/mock/eol/fedora-26-ppc64.cfg new file mode 100644 index 0000000..37d5761 --- /dev/null +++ b/mock/eol/fedora-26-ppc64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f26-build/latest/ppc64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-ppc64le.cfg b/mock/eol/fedora-26-ppc64le.cfg new file mode 100644 index 0000000..8e82c60 --- /dev/null +++ b/mock/eol/fedora-26-ppc64le.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f26-build/latest/ppc64le/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-s390x.cfg b/mock/eol/fedora-26-s390x.cfg new file mode 100644 index 0000000..c00082b --- /dev/null +++ b/mock/eol/fedora-26-s390x.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-secondary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://s390pkgs.fedoraproject.org/repos/f26-build/latest/s390x/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-secondary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-26-x86_64.cfg b/mock/eol/fedora-26-x86_64.cfg new file mode 100644 index 0000000..c2deb91 --- /dev/null +++ b/mock/eol/fedora-26-x86_64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-26-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc26' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '26' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f26-build/latest/x86_64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-26-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-aarch64.cfg b/mock/eol/fedora-27-aarch64.cfg new file mode 100644 index 0000000..ee37db1 --- /dev/null +++ b/mock/eol/fedora-27-aarch64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://armpkgs.fedoraproject.org/repos/f27-build/latest/aarch64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-armhfp.cfg b/mock/eol/fedora-27-armhfp.cfg new file mode 100644 index 0000000..f345035 --- /dev/null +++ b/mock/eol/fedora-27-armhfp.cfg @@ -0,0 +1,95 @@ +config_opts['root'] = 'fedora-27-armhfp' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f27-build/latest/armhfp/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-i386.cfg b/mock/eol/fedora-27-i386.cfg new file mode 100644 index 0000000..3c01aca --- /dev/null +++ b/mock/eol/fedora-27-i386.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f27-build/latest/i386/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-ppc64.cfg b/mock/eol/fedora-27-ppc64.cfg new file mode 100644 index 0000000..72f2eae --- /dev/null +++ b/mock/eol/fedora-27-ppc64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f27-build/latest/ppc64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-ppc64le.cfg b/mock/eol/fedora-27-ppc64le.cfg new file mode 100644 index 0000000..635b106 --- /dev/null +++ b/mock/eol/fedora-27-ppc64le.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f27-build/latest/ppc64le/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-s390x.cfg b/mock/eol/fedora-27-s390x.cfg new file mode 100644 index 0000000..997a932 --- /dev/null +++ b/mock/eol/fedora-27-s390x.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=1 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f27-build/latest/s390x/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-27-x86_64.cfg b/mock/eol/fedora-27-x86_64.cfg new file mode 100644 index 0000000..6093488 --- /dev/null +++ b/mock/eol/fedora-27-x86_64.cfg @@ -0,0 +1,89 @@ +config_opts['root'] = 'fedora-27-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc27' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '27' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f27-build/latest/x86_64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-27-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-aarch64.cfg b/mock/eol/fedora-28-aarch64.cfg new file mode 100644 index 0000000..106a7a0 --- /dev/null +++ b/mock/eol/fedora-28-aarch64.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://armpkgs.fedoraproject.org/repos/f28-build/latest/aarch64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-armhfp.cfg b/mock/eol/fedora-28-armhfp.cfg new file mode 100644 index 0000000..f647bf6 --- /dev/null +++ b/mock/eol/fedora-28-armhfp.cfg @@ -0,0 +1,96 @@ +config_opts['root'] = 'fedora-28-armhfp' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f28-build/latest/armhfp/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-i386.cfg b/mock/eol/fedora-28-i386.cfg new file mode 100644 index 0000000..f9bd35c --- /dev/null +++ b/mock/eol/fedora-28-i386.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-i386' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f28-build/latest/i386/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-ppc64.cfg b/mock/eol/fedora-28-ppc64.cfg new file mode 100644 index 0000000..4dec0c7 --- /dev/null +++ b/mock/eol/fedora-28-ppc64.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f28-build/latest/ppc64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-ppc64le.cfg b/mock/eol/fedora-28-ppc64le.cfg new file mode 100644 index 0000000..86ee695 --- /dev/null +++ b/mock/eol/fedora-28-ppc64le.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=http://ppcpkgs.fedoraproject.org/repos/f28-build/latest/ppc64le/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-s390x.cfg b/mock/eol/fedora-28-s390x.cfg new file mode 100644 index 0000000..924912d --- /dev/null +++ b/mock/eol/fedora-28-s390x.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f28-build/latest/s390x/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-28-x86_64.cfg b/mock/eol/fedora-28-x86_64.cfg new file mode 100644 index 0000000..628e330 --- /dev/null +++ b/mock/eol/fedora-28-x86_64.cfg @@ -0,0 +1,90 @@ +config_opts['root'] = 'fedora-28-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc28' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '28' +config_opts['package_manager'] = 'dnf' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f28-build/latest/x86_64/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-28-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/fedora-29-aarch64.cfg b/mock/eol/fedora-29-aarch64.cfg new file mode 100644 index 0000000..fd6faa2 --- /dev/null +++ b/mock/eol/fedora-29-aarch64.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/fedora-29-armhfp.cfg b/mock/eol/fedora-29-armhfp.cfg new file mode 100644 index 0000000..f88e496 --- /dev/null +++ b/mock/eol/fedora-29-armhfp.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') diff --git a/mock/eol/fedora-29-i386.cfg b/mock/eol/fedora-29-i386.cfg new file mode 100644 index 0000000..9ed432f --- /dev/null +++ b/mock/eol/fedora-29-i386.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/fedora-29-ppc64le.cfg b/mock/eol/fedora-29-ppc64le.cfg new file mode 100644 index 0000000..1fe397e --- /dev/null +++ b/mock/eol/fedora-29-ppc64le.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/fedora-29-s390x.cfg b/mock/eol/fedora-29-s390x.cfg new file mode 100644 index 0000000..8a33639 --- /dev/null +++ b/mock/eol/fedora-29-s390x.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/eol/fedora-29-x86_64.cfg b/mock/eol/fedora-29-x86_64.cfg new file mode 100644 index 0000000..0c12656 --- /dev/null +++ b/mock/eol/fedora-29-x86_64.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-29.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/fedora-30-aarch64.cfg b/mock/eol/fedora-30-aarch64.cfg new file mode 100644 index 0000000..aec0a77 --- /dev/null +++ b/mock/eol/fedora-30-aarch64.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/fedora-30-armhfp.cfg b/mock/eol/fedora-30-armhfp.cfg new file mode 100644 index 0000000..71fc67f --- /dev/null +++ b/mock/eol/fedora-30-armhfp.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') diff --git a/mock/eol/fedora-30-i386.cfg b/mock/eol/fedora-30-i386.cfg new file mode 100644 index 0000000..42f30bc --- /dev/null +++ b/mock/eol/fedora-30-i386.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/fedora-30-ppc64le.cfg b/mock/eol/fedora-30-ppc64le.cfg new file mode 100644 index 0000000..b066d46 --- /dev/null +++ b/mock/eol/fedora-30-ppc64le.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/fedora-30-s390x.cfg b/mock/eol/fedora-30-s390x.cfg new file mode 100644 index 0000000..cd29bd7 --- /dev/null +++ b/mock/eol/fedora-30-s390x.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/eol/fedora-30-x86_64.cfg b/mock/eol/fedora-30-x86_64.cfg new file mode 100644 index 0000000..6ee9d93 --- /dev/null +++ b/mock/eol/fedora-30-x86_64.cfg @@ -0,0 +1,4 @@ +include('eol/templates/fedora-30.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/fedora-31-aarch64.cfg b/mock/eol/fedora-31-aarch64.cfg new file mode 100644 index 0000000..c3e154a --- /dev/null +++ b/mock/eol/fedora-31-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-31-armhfp.cfg b/mock/eol/fedora-31-armhfp.cfg new file mode 100644 index 0000000..e21a0cb --- /dev/null +++ b/mock/eol/fedora-31-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-31-i386.cfg b/mock/eol/fedora-31-i386.cfg new file mode 100644 index 0000000..981235b --- /dev/null +++ b/mock/eol/fedora-31-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-31-ppc64le.cfg b/mock/eol/fedora-31-ppc64le.cfg new file mode 100644 index 0000000..c7245d3 --- /dev/null +++ b/mock/eol/fedora-31-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-31-s390x.cfg b/mock/eol/fedora-31-s390x.cfg new file mode 100644 index 0000000..5f19407 --- /dev/null +++ b/mock/eol/fedora-31-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-31-x86_64.cfg b/mock/eol/fedora-31-x86_64.cfg new file mode 100644 index 0000000..c79a984 --- /dev/null +++ b/mock/eol/fedora-31-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '31' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-aarch64.cfg b/mock/eol/fedora-32-aarch64.cfg new file mode 100644 index 0000000..904508f --- /dev/null +++ b/mock/eol/fedora-32-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-armhfp.cfg b/mock/eol/fedora-32-armhfp.cfg new file mode 100644 index 0000000..526522e --- /dev/null +++ b/mock/eol/fedora-32-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-i386.cfg b/mock/eol/fedora-32-i386.cfg new file mode 100644 index 0000000..1cf2ace --- /dev/null +++ b/mock/eol/fedora-32-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-ppc64le.cfg b/mock/eol/fedora-32-ppc64le.cfg new file mode 100644 index 0000000..688a7dd --- /dev/null +++ b/mock/eol/fedora-32-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-s390x.cfg b/mock/eol/fedora-32-s390x.cfg new file mode 100644 index 0000000..38c12fd --- /dev/null +++ b/mock/eol/fedora-32-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-32-x86_64.cfg b/mock/eol/fedora-32-x86_64.cfg new file mode 100644 index 0000000..b911b2f --- /dev/null +++ b/mock/eol/fedora-32-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '32' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-aarch64.cfg b/mock/eol/fedora-33-aarch64.cfg new file mode 100644 index 0000000..8eb787e --- /dev/null +++ b/mock/eol/fedora-33-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-armhfp.cfg b/mock/eol/fedora-33-armhfp.cfg new file mode 100644 index 0000000..be19cdb --- /dev/null +++ b/mock/eol/fedora-33-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-i386.cfg b/mock/eol/fedora-33-i386.cfg new file mode 100644 index 0000000..9d1288f --- /dev/null +++ b/mock/eol/fedora-33-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-ppc64le.cfg b/mock/eol/fedora-33-ppc64le.cfg new file mode 100644 index 0000000..867903b --- /dev/null +++ b/mock/eol/fedora-33-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-s390x.cfg b/mock/eol/fedora-33-s390x.cfg new file mode 100644 index 0000000..befd324 --- /dev/null +++ b/mock/eol/fedora-33-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-33-x86_64.cfg b/mock/eol/fedora-33-x86_64.cfg new file mode 100644 index 0000000..a83ac93 --- /dev/null +++ b/mock/eol/fedora-33-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '33' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-aarch64.cfg b/mock/eol/fedora-34-aarch64.cfg new file mode 100644 index 0000000..ffff3fe --- /dev/null +++ b/mock/eol/fedora-34-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-armhfp.cfg b/mock/eol/fedora-34-armhfp.cfg new file mode 100644 index 0000000..4bc6304 --- /dev/null +++ b/mock/eol/fedora-34-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-i386.cfg b/mock/eol/fedora-34-i386.cfg new file mode 100644 index 0000000..779e7cc --- /dev/null +++ b/mock/eol/fedora-34-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-ppc64le.cfg b/mock/eol/fedora-34-ppc64le.cfg new file mode 100644 index 0000000..83c36f6 --- /dev/null +++ b/mock/eol/fedora-34-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-s390x.cfg b/mock/eol/fedora-34-s390x.cfg new file mode 100644 index 0000000..7a45f0e --- /dev/null +++ b/mock/eol/fedora-34-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-34-x86_64.cfg b/mock/eol/fedora-34-x86_64.cfg new file mode 100644 index 0000000..8eace84 --- /dev/null +++ b/mock/eol/fedora-34-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '34' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-aarch64.cfg b/mock/eol/fedora-35-aarch64.cfg new file mode 100644 index 0000000..8fbcf54 --- /dev/null +++ b/mock/eol/fedora-35-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-armhfp.cfg b/mock/eol/fedora-35-armhfp.cfg new file mode 100644 index 0000000..ebd014e --- /dev/null +++ b/mock/eol/fedora-35-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-i386.cfg b/mock/eol/fedora-35-i386.cfg new file mode 100644 index 0000000..ac47321 --- /dev/null +++ b/mock/eol/fedora-35-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-ppc64le.cfg b/mock/eol/fedora-35-ppc64le.cfg new file mode 100644 index 0000000..dcf1278 --- /dev/null +++ b/mock/eol/fedora-35-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-s390x.cfg b/mock/eol/fedora-35-s390x.cfg new file mode 100644 index 0000000..2f8d1ae --- /dev/null +++ b/mock/eol/fedora-35-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-35-x86_64.cfg b/mock/eol/fedora-35-x86_64.cfg new file mode 100644 index 0000000..ebf37a7 --- /dev/null +++ b/mock/eol/fedora-35-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '35' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-aarch64.cfg b/mock/eol/fedora-36-aarch64.cfg new file mode 100644 index 0000000..c2ebb8e --- /dev/null +++ b/mock/eol/fedora-36-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-armhfp.cfg b/mock/eol/fedora-36-armhfp.cfg new file mode 100644 index 0000000..0257038 --- /dev/null +++ b/mock/eol/fedora-36-armhfp.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv8l', 'aarch64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-i386.cfg b/mock/eol/fedora-36-i386.cfg new file mode 100644 index 0000000..0317693 --- /dev/null +++ b/mock/eol/fedora-36-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-ppc64le.cfg b/mock/eol/fedora-36-ppc64le.cfg new file mode 100644 index 0000000..4ea5cfa --- /dev/null +++ b/mock/eol/fedora-36-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-s390x.cfg b/mock/eol/fedora-36-s390x.cfg new file mode 100644 index 0000000..3fa3256 --- /dev/null +++ b/mock/eol/fedora-36-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-36-x86_64.cfg b/mock/eol/fedora-36-x86_64.cfg new file mode 100644 index 0000000..7e37ee7 --- /dev/null +++ b/mock/eol/fedora-36-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '36' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-37-aarch64.cfg b/mock/eol/fedora-37-aarch64.cfg new file mode 100644 index 0000000..aa5dd2e --- /dev/null +++ b/mock/eol/fedora-37-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '37' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-37-i386.cfg b/mock/eol/fedora-37-i386.cfg new file mode 100644 index 0000000..cddd91a --- /dev/null +++ b/mock/eol/fedora-37-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '37' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-37-ppc64le.cfg b/mock/eol/fedora-37-ppc64le.cfg new file mode 100644 index 0000000..b1b3b65 --- /dev/null +++ b/mock/eol/fedora-37-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '37' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-37-s390x.cfg b/mock/eol/fedora-37-s390x.cfg new file mode 100644 index 0000000..1775544 --- /dev/null +++ b/mock/eol/fedora-37-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '37' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-37-x86_64.cfg b/mock/eol/fedora-37-x86_64.cfg new file mode 100644 index 0000000..d801dcb --- /dev/null +++ b/mock/eol/fedora-37-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '37' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-38-aarch64.cfg b/mock/eol/fedora-38-aarch64.cfg new file mode 100644 index 0000000..f44a01b --- /dev/null +++ b/mock/eol/fedora-38-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '38' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-38-i386.cfg b/mock/eol/fedora-38-i386.cfg new file mode 100644 index 0000000..e698328 --- /dev/null +++ b/mock/eol/fedora-38-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '38' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-38-ppc64le.cfg b/mock/eol/fedora-38-ppc64le.cfg new file mode 100644 index 0000000..1e37992 --- /dev/null +++ b/mock/eol/fedora-38-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '38' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-38-s390x.cfg b/mock/eol/fedora-38-s390x.cfg new file mode 100644 index 0000000..2ce3fb5 --- /dev/null +++ b/mock/eol/fedora-38-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '38' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-38-x86_64.cfg b/mock/eol/fedora-38-x86_64.cfg new file mode 100644 index 0000000..3056548 --- /dev/null +++ b/mock/eol/fedora-38-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '38' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-39-aarch64.cfg b/mock/eol/fedora-39-aarch64.cfg new file mode 100644 index 0000000..1140281 --- /dev/null +++ b/mock/eol/fedora-39-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '39' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-39-i386.cfg b/mock/eol/fedora-39-i386.cfg new file mode 100644 index 0000000..18cc65d --- /dev/null +++ b/mock/eol/fedora-39-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '39' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-39-ppc64le.cfg b/mock/eol/fedora-39-ppc64le.cfg new file mode 100644 index 0000000..6871d4d --- /dev/null +++ b/mock/eol/fedora-39-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '39' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-39-s390x.cfg b/mock/eol/fedora-39-s390x.cfg new file mode 100644 index 0000000..19507b2 --- /dev/null +++ b/mock/eol/fedora-39-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '39' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/fedora-39-x86_64.cfg b/mock/eol/fedora-39-x86_64.cfg new file mode 100644 index 0000000..3f53033 --- /dev/null +++ b/mock/eol/fedora-39-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '39' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/eol/mageia-6-armv5tl.cfg b/mock/eol/mageia-6-armv5tl.cfg new file mode 100644 index 0000000..c659d19 --- /dev/null +++ b/mock/eol/mageia-6-armv5tl.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-6.tpl') + +config_opts['root'] = 'mageia-6-armv5tl' +config_opts['target_arch'] = 'armv5tl' +config_opts['legal_host_arches'] = ('armv5tl', 'armv6l', 'armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') diff --git a/mock/eol/mageia-6-armv7hl.cfg b/mock/eol/mageia-6-armv7hl.cfg new file mode 100644 index 0000000..c633913 --- /dev/null +++ b/mock/eol/mageia-6-armv7hl.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-6.tpl') + +config_opts['root'] = 'mageia-6-armv7hl' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') diff --git a/mock/eol/mageia-6-i586.cfg b/mock/eol/mageia-6-i586.cfg new file mode 100644 index 0000000..9cf6061 --- /dev/null +++ b/mock/eol/mageia-6-i586.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-6.tpl') + +config_opts['root'] = 'mageia-6-i586' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/mageia-6-x86_64.cfg b/mock/eol/mageia-6-x86_64.cfg new file mode 100644 index 0000000..8216a5f --- /dev/null +++ b/mock/eol/mageia-6-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-6.tpl') + +config_opts['root'] = 'mageia-6-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/mageia-7-aarch64.cfg b/mock/eol/mageia-7-aarch64.cfg new file mode 100644 index 0000000..1f4ed76 --- /dev/null +++ b/mock/eol/mageia-7-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-7.tpl') + +config_opts['root'] = 'mageia-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/mageia-7-armv7hl.cfg b/mock/eol/mageia-7-armv7hl.cfg new file mode 100644 index 0000000..5f91f6e --- /dev/null +++ b/mock/eol/mageia-7-armv7hl.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-7.tpl') + +config_opts['root'] = 'mageia-7-armv7hl' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') diff --git a/mock/eol/mageia-7-i586.cfg b/mock/eol/mageia-7-i586.cfg new file mode 100644 index 0000000..5639d9e --- /dev/null +++ b/mock/eol/mageia-7-i586.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-7.tpl') + +config_opts['root'] = 'mageia-7-i586' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eol/mageia-7-x86_64.cfg b/mock/eol/mageia-7-x86_64.cfg new file mode 100644 index 0000000..7608cef --- /dev/null +++ b/mock/eol/mageia-7-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/mageia-7.tpl') + +config_opts['root'] = 'mageia-7-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/openmandriva-4.0-aarch64.cfg b/mock/eol/openmandriva-4.0-aarch64.cfg new file mode 100644 index 0000000..1abdb07 --- /dev/null +++ b/mock/eol/openmandriva-4.0-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/openmandriva-4.0.tpl') + +config_opts['root'] = 'openmandriva-4.0-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/openmandriva-4.0-armv7hnl.cfg b/mock/eol/openmandriva-4.0-armv7hnl.cfg new file mode 100644 index 0000000..7c0780b --- /dev/null +++ b/mock/eol/openmandriva-4.0-armv7hnl.cfg @@ -0,0 +1,5 @@ +include('eol/templates/openmandriva-4.0.tpl') + +config_opts['root'] = 'openmandriva-4.0-armv7hnl' +config_opts['target_arch'] = 'armv7hnl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv7hnl', 'armv8l', 'armv8hl', 'armv8hnl', 'armv8hcnl', 'aarch64',) diff --git a/mock/eol/openmandriva-4.0-i686.cfg b/mock/eol/openmandriva-4.0-i686.cfg new file mode 100644 index 0000000..a258fc1 --- /dev/null +++ b/mock/eol/openmandriva-4.0-i686.cfg @@ -0,0 +1,5 @@ +include('eol/templates/openmandriva-4.0.tpl') + +config_opts['root'] = 'openmandriva-4.0-i686' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i686', 'x86_64',) diff --git a/mock/eol/openmandriva-4.0-x86_64.cfg b/mock/eol/openmandriva-4.0-x86_64.cfg new file mode 100644 index 0000000..b7d22f2 --- /dev/null +++ b/mock/eol/openmandriva-4.0-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/openmandriva-4.0.tpl') + +config_opts['root'] = 'openmandriva-4.0-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/openmandriva-4.1-i686.cfg b/mock/eol/openmandriva-4.1-i686.cfg new file mode 100644 index 0000000..534349e --- /dev/null +++ b/mock/eol/openmandriva-4.1-i686.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '4.1' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i686', 'x86_64',) + +include('templates/openmandriva-branched.tpl') diff --git a/mock/eol/openmandriva-cooker-i686.cfg b/mock/eol/openmandriva-cooker-i686.cfg new file mode 100644 index 0000000..b28e770 --- /dev/null +++ b/mock/eol/openmandriva-cooker-i686.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-cooker.tpl') + +config_opts['root'] = 'openmandriva-cooker-i686' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i686', 'x86_64',) diff --git a/mock/eol/openmandriva-rolling-i686.cfg b/mock/eol/openmandriva-rolling-i686.cfg new file mode 100644 index 0000000..5ec0695 --- /dev/null +++ b/mock/eol/openmandriva-rolling-i686.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-rolling.tpl') + +config_opts['root'] = 'openmandriva-rolling-i686' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i686', 'x86_64',) diff --git a/mock/eol/opensuse-leap-15.0-aarch64.cfg b/mock/eol/opensuse-leap-15.0-aarch64.cfg new file mode 100644 index 0000000..56d4a59 --- /dev/null +++ b/mock/eol/opensuse-leap-15.0-aarch64.cfg @@ -0,0 +1,46 @@ +config_opts['root'] = 'opensuse-leap-15.0-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp150' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.0' +config_opts['macros']['%dist'] = '.suse.lp150' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - aarch64 - OSS +#baseurl=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/ +metalink=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - aarch64 - Updates - OSS +#baseurl=http://download.opensuse.org/ports/aarch64/update/leap/$releasever/oss/ +metalink=http://download.opensuse.org/ports/aarch64/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.0-x86_64.cfg b/mock/eol/opensuse-leap-15.0-x86_64.cfg new file mode 100644 index 0000000..7bb5f22 --- /dev/null +++ b/mock/eol/opensuse-leap-15.0-x86_64.cfg @@ -0,0 +1,47 @@ +config_opts['root'] = 'opensuse-leap-15.0-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp150' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.0' +config_opts['macros']['%dist'] = '.suse.lp150' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +excludepkgs=*.i586,*.i686 +protected_packages= + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - x86_64 - OSS +#baseurl=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +metalink=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - x86_64 - Updates - OSS +#baseurl=http://download.opensuse.org/update/leap/$releasever/oss/ +metalink=http://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.1-aarch64.cfg b/mock/eol/opensuse-leap-15.1-aarch64.cfg new file mode 100644 index 0000000..e162855 --- /dev/null +++ b/mock/eol/opensuse-leap-15.1-aarch64.cfg @@ -0,0 +1,55 @@ +config_opts['root'] = 'opensuse-leap-15.1-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp151' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.1' +config_opts['macros']['%dist'] = '.suse.lp151' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +includepkgs=*.aarch64,*.noarch +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - aarch64 - OSS +baseurl=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/ +#metalink=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - aarch64 - Updates - OSS +baseurl=http://download.opensuse.org/ports/update/leap/$releasever/oss/ +#metalink=http://download.opensuse.org/ports/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.1-x86_64.cfg b/mock/eol/opensuse-leap-15.1-x86_64.cfg new file mode 100644 index 0000000..f4fc878 --- /dev/null +++ b/mock/eol/opensuse-leap-15.1-x86_64.cfg @@ -0,0 +1,55 @@ +config_opts['root'] = 'opensuse-leap-15.1-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp151' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.1' +config_opts['macros']['%dist'] = '.suse.lp151' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +includepkgs=*.x86_64,*.noarch +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - x86_64 - OSS +baseurl=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - x86_64 - Updates - OSS +baseurl=http://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=http://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.2-aarch64.cfg b/mock/eol/opensuse-leap-15.2-aarch64.cfg new file mode 100644 index 0000000..846cdaa --- /dev/null +++ b/mock/eol/opensuse-leap-15.2-aarch64.cfg @@ -0,0 +1,56 @@ +config_opts['root'] = 'opensuse-leap-15.2-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp152' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.2' +config_opts['macros']['%dist'] = '.suse.lp152' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +includepkgs=*.aarch64,*.noarch +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - aarch64 - OSS +baseurl=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/ +#metalink=http://download.opensuse.org/ports/aarch64/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - aarch64 - Updates - OSS +baseurl=http://download.opensuse.org/ports/update/leap/$releasever/oss/ +#metalink=http://download.opensuse.org/ports/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.2-x86_64.cfg b/mock/eol/opensuse-leap-15.2-x86_64.cfg new file mode 100644 index 0000000..ef0e624 --- /dev/null +++ b/mock/eol/opensuse-leap-15.2-x86_64.cfg @@ -0,0 +1,56 @@ +config_opts['root'] = 'opensuse-leap-15.2-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp152' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '15.2' +config_opts['macros']['%dist'] = '.suse.lp152' +config_opts['package_manager'] = 'dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +includepkgs=*.x86_64,*.noarch +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - x86_64 - OSS +baseurl=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=http://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[updates-oss] +name=openSUSE Leap $releasever - x86_64 - Updates - OSS +baseurl=http://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=http://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +""" diff --git a/mock/eol/opensuse-leap-15.3-aarch64.cfg b/mock/eol/opensuse-leap-15.3-aarch64.cfg new file mode 100644 index 0000000..194adf7 --- /dev/null +++ b/mock/eol/opensuse-leap-15.3-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.3.tpl') + +config_opts['root'] = 'opensuse-leap-15.3-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/opensuse-leap-15.3-ppc64le.cfg b/mock/eol/opensuse-leap-15.3-ppc64le.cfg new file mode 100644 index 0000000..ffcbc7a --- /dev/null +++ b/mock/eol/opensuse-leap-15.3-ppc64le.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.3.tpl') + +config_opts['root'] = 'opensuse-leap-15.3-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/opensuse-leap-15.3-s390x.cfg b/mock/eol/opensuse-leap-15.3-s390x.cfg new file mode 100644 index 0000000..8276d60 --- /dev/null +++ b/mock/eol/opensuse-leap-15.3-s390x.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.3.tpl') + +config_opts['root'] = 'opensuse-leap-15.3-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/eol/opensuse-leap-15.3-x86_64.cfg b/mock/eol/opensuse-leap-15.3-x86_64.cfg new file mode 100644 index 0000000..482d2d2 --- /dev/null +++ b/mock/eol/opensuse-leap-15.3-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.3.tpl') + +config_opts['root'] = 'opensuse-leap-15.3-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/opensuse-leap-15.4-aarch64.cfg b/mock/eol/opensuse-leap-15.4-aarch64.cfg new file mode 100644 index 0000000..e1065f1 --- /dev/null +++ b/mock/eol/opensuse-leap-15.4-aarch64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.4.tpl') + +config_opts['root'] = 'opensuse-leap-15.4-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eol/opensuse-leap-15.4-ppc64le.cfg b/mock/eol/opensuse-leap-15.4-ppc64le.cfg new file mode 100644 index 0000000..355f00f --- /dev/null +++ b/mock/eol/opensuse-leap-15.4-ppc64le.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.4.tpl') + +config_opts['root'] = 'opensuse-leap-15.4-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/eol/opensuse-leap-15.4-s390x.cfg b/mock/eol/opensuse-leap-15.4-s390x.cfg new file mode 100644 index 0000000..cab2919 --- /dev/null +++ b/mock/eol/opensuse-leap-15.4-s390x.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.4.tpl') + +config_opts['root'] = 'opensuse-leap-15.4-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/eol/opensuse-leap-15.4-x86_64.cfg b/mock/eol/opensuse-leap-15.4-x86_64.cfg new file mode 100644 index 0000000..1a25567 --- /dev/null +++ b/mock/eol/opensuse-leap-15.4-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/opensuse-leap-15.4.tpl') + +config_opts['root'] = 'opensuse-leap-15.4-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/oraclelinux+epel-7-aarch64.cfg b/mock/eol/oraclelinux+epel-7-aarch64.cfg new file mode 100644 index 0000000..ebf593a --- /dev/null +++ b/mock/eol/oraclelinux+epel-7-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'oraclelinux+epel-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['description'] = 'Oracle Linux 7 + EPEL' diff --git a/mock/eol/oraclelinux+epel-7-x86_64.cfg b/mock/eol/oraclelinux+epel-7-x86_64.cfg new file mode 100644 index 0000000..17902c3 --- /dev/null +++ b/mock/eol/oraclelinux+epel-7-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-7.tpl') +include('eol/templates/epel-7.tpl') + +config_opts['root'] = 'oraclelinux+epel-7-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['description'] = 'Oracle Linux 7 + EPEL' diff --git a/mock/eol/rhel-6-x86_64.cfg b/mock/eol/rhel-6-x86_64.cfg new file mode 100644 index 0000000..8c31bfc --- /dev/null +++ b/mock/eol/rhel-6-x86_64.cfg @@ -0,0 +1,5 @@ +include('eol/templates/rhel-6.tpl') + +config_opts['root'] = 'rhel-6-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eol/templates/anolis-7.tpl b/mock/eol/templates/anolis-7.tpl new file mode 100644 index 0000000..9ee5e2e --- /dev/null +++ b/mock/eol/templates/anolis-7.tpl @@ -0,0 +1,51 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make patch redhat-rpm-config anolis-release rpm-build sed tar unzip util-linux which xz' + +config_opts['dist'] = 'an7' # only useful for --resultdir variable subst +config_opts['releasever'] = '7' +config_opts['package_manager'] = 'yum' +config_opts['description'] = 'Anolis 7' + +# No v7 image https://hub.docker.com/r/openanolis/anolisos ? +config_opts['use_bootstrap_image'] = False + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[os] +name=AnolisOS-7 - os +baseurl=http://mirrors.openanolis.cn/anolis/7/os/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 + +[updates] +name=AnolisOS-7 - updates +baseurl=http://mirrors.openanolis.cn/anolis/7/updates/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 + +[extras] +name=AnolisOS-7 - extras +baseurl=http://mirrors.openanolis.cn/anolis/7/extras/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 +""" diff --git a/mock/eol/templates/centos-6.tpl b/mock/eol/templates/centos-6.tpl new file mode 100644 index 0000000..28e5e4b --- /dev/null +++ b/mock/eol/templates/centos-6.tpl @@ -0,0 +1,90 @@ +# This list is taken from 'epel-6-x86_64' @buildsys-build group, minus the +# 'epel-*' specific stuff. +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make patch redhat-rpm-config rpm-build sed tar unzip util-linux-ng which xz' + +config_opts['dist'] = 'el6' # only useful for --resultdir variable subst +# beware RHEL uses 6Server or 6Client +config_opts['releasever'] = '6' +config_opts['isolation'] = 'simple' +config_opts['bootstrap_image'] = 'centos:6' +config_opts['package_manager'] = 'yum' + +config_opts['yum_install_command'] += "{% if target_arch in ['x86_64'] %} --disablerepo=centos-sclo*{% endif %}" + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos +[base] +name=CentOS-$releasever - Base +enabled=1 +baseurl=https://vault.centos.org/6.10/os/$basearch/ +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-6 +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=CentOS-$releasever - Updates +enabled=0 +baseurl=https://vault.centos.org/6.10/updates/$basearch/ +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-6 +gpgcheck=1 +skip_if_unavailable=False + +[extras] +name=CentOS-$releasever - Extras +baseurl=https://vault.centos.org/6.10/extras/$basearch/ +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-6 +gpgcheck=1 +skip_if_unavailable=False + +[fastrack] +name=CentOS-$releasever - fasttrack +baseurl=https://vault.centos.org/6.10/fasttrack/$basearch/ +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-6 +gpgcheck=1 +skip_if_unavailable=False +enabled=0 + +[centosplus] +name=CentOS-$releasever - Plus +baseurl=https://vault.centos.org/6.10/centosplus/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-6 +gpgcheck=1 +enabled=0 + +{% if target_arch == "x86_64" %} +[centos-sclo-sclo] +name=CentOS-$releasever - SCLo sclo +baseurl=https://vault.centos.org/6.10/sclo/$basearch/sclo/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-SCLo +gpgcheck=1 +skip_if_unavailable=False + +[centos-sclo-rh] +name=CentOS-$releasever - SCLo rh +baseurl=https://vault.centos.org/6.10/sclo/$basearch/rh/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-SCLo +gpgcheck=1 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/eol/templates/centos-7.tpl b/mock/eol/templates/centos-7.tpl new file mode 100644 index 0000000..21a3457 --- /dev/null +++ b/mock/eol/templates/centos-7.tpl @@ -0,0 +1,97 @@ +# This list is taken from 'epel-7-x86_64' @buildsys-build group, minus the +# 'epel-*' specific stuff. +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' + +config_opts['dist'] = 'el7' # only useful for --resultdir variable subst +config_opts['releasever'] = '7' +config_opts['bootstrap_image'] = 'quay.io/centos/centos:7' +config_opts['package_manager'] = 'yum' +config_opts['description'] = 'CentOS 7' + +config_opts['yum_install_command'] += "{% if target_arch in ['x86_64', 'ppc64le', 'aarch64'] %} --disablerepo=centos-sclo*{% endif %}" + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +{% set centos_7_gpg_keys = 'file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-7' %} +{% if target_arch in ['ppc64le', 'ppc64'] %} +{% set centos_7_gpg_keys = centos_7_gpg_keys + ',file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-AltArch-7-' + target_arch %} +{% elif target_arch in ['aarch64'] %} +{% set centos_7_gpg_keys = centos_7_gpg_keys + ',file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-7-aarch64' %} +{% endif %} + +# repos +[base] +name=CentOS-$releasever - Base +baseurl=https://vault.centos.org/7.9.2009/os/$basearch/ +failovermethod=priority +gpgkey={{ centos_7_gpg_keys }} +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=CentOS-$releasever - Updates +enabled=1 +baseurl=https://vault.centos.org/7.9.2009/updates/$basearch/ +failovermethod=priority +gpgkey={{ centos_7_gpg_keys }} +gpgcheck=1 +skip_if_unavailable=False + +[extras] +name=CentOS-$releasever - Extras +baseurl=https://vault.centos.org/7.9.2009/extras/$basearch/ +failovermethod=priority +gpgkey={{ centos_7_gpg_keys }} +gpgcheck=1 +skip_if_unavailable=False + +[fastrack] +name=CentOS-$releasever - fasttrack +baseurl=https://vault.centos.org/7.9.2009/fasttrack/$basearch/ +failovermethod=priority +gpgkey={{ centos_7_gpg_keys }} +gpgcheck=1 +skip_if_unavailable=False +enabled=0 + +[centosplus] +name=CentOS-$releasever - Plus +baseurl=https://vault.centos.org/7.9.2009/centosplus/$basearch/ +gpgkey={{ centos_7_gpg_keys }} +gpgcheck=1 +enabled=0 + +{% if target_arch == 'x86_64' %} +[centos-sclo-sclo] +name=CentOS-$releasever - SCLo sclo +baseurl=https://vault.centos.org/7.9.2009/sclo/$basearch/sclo/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-SCLo +gpgcheck=1 +skip_if_unavailable=False +{% endif %} + +{% if target_arch in ['x86_64', 'ppc64le', 'aarch64'] %} +[centos-sclo-rh] +name=CentOS-$releasever - SCLo rh +baseurl=https://vault.centos.org/7.9.2009/sclo/$basearch/rh/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-SCLo +gpgcheck=1 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/eol/templates/centos-8.tpl b/mock/eol/templates/centos-8.tpl new file mode 100644 index 0000000..5902d4d --- /dev/null +++ b/mock/eol/templates/centos-8.tpl @@ -0,0 +1,124 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/centos/centos:8' + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + +[baseos] +name=CentOS-$releasever - Base +baseurl=http://vault.centos.org/centos/$releasever/BaseOS/$basearch/os/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +skip_if_unavailable=False + +[appstream] +name=CentOS-$releasever - AppStream +baseurl=http://vault.centos.org/centos/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[powertools] +name=CentOS-$releasever - PowerTools +baseurl=http://vault.centos.org/centos/$releasever/PowerTools/$basearch/os/ +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[devel] +name=CentOS-$releasever - Devel (WARNING: UNSUPPORTED - FOR BUILDROOT USE ONLY!) +baseurl=http://vault.centos.org/centos/$releasever/Devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[plus] +name=CentOS-$releasever - Plus +baseurl=http://vault.centos.org/centos/$releasever/centosplus/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[cr] +name=CentOS-$releasever - cr +baseurl=http://vault.centos.org/centos/$releasever/cr/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[debuginfo] +name=CentOS-$releasever - Debuginfo +baseurl=http://debuginfo.centos.org/8/$basearch/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[extras] +name=CentOS-$releasever - Extras +baseurl=https://vault.centos.org/centos/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[fasttrack] +name=CentOS-$releasever - fasttrack +baseurl=https://vault.centos.org/centos/$releasever/fasttrack/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[baseos-source] +name=CentOS-$releasever - BaseOS Sources +baseurl=http://vault.centos.org/centos/$releasever/BaseOS/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[appstream-source] +name=CentOS-$releasever - AppStream Sources +baseurl=http://vault.centos.org/centos/$releasever/AppStream/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[powertools-source] +name=CentOS-$releasever - PowerTools Sources +baseurl=http://vault.centos.org/centos/$releasever/PowerTools/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[extras-source] +name=CentOS-$releasever - Extras Sources +baseurl=http://vault.centos.org/centos/$releasever/extras/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[splus-source] +name=CentOS-$releasever - Plus Sources +baseurl=http://vault.centos.org/centos/$releasever/centosplus/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +""" diff --git a/mock/eol/templates/epel-6.tpl b/mock/eol/templates/epel-6.tpl new file mode 100644 index 0000000..d0700b0 --- /dev/null +++ b/mock/eol/templates/epel-6.tpl @@ -0,0 +1,34 @@ +include('eol/templates/centos-6.tpl') + +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' + +config_opts['yum.conf'] += """ +[epel] +name=Extra Packages for Enterprise Linux $releasever - $basearch +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-6&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-6 +gpgcheck=1 +skip_if_unavailable=False + +[epel-testing] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch +enabled=0 +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=testing-epel6&arch=$basearch +failovermethod=priority +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/dist-6E-epel-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[epel-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Debug +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-debug-6&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/epel-7.tpl b/mock/eol/templates/epel-7.tpl new file mode 100644 index 0000000..8d2f9d8 --- /dev/null +++ b/mock/eol/templates/epel-7.tpl @@ -0,0 +1,32 @@ +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' + +config_opts['yum.conf'] += """ +[epel] +name=Extra Packages for Enterprise Linux $releasever - $basearch +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-7&arch=$basearch +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-7 +gpgcheck=1 +skip_if_unavailable=False + +[epel-testing] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch +enabled=0 +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=testing-epel7&arch=$basearch +failovermethod=priority +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/epel7-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[epel-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Debug +mirrorlist=http://mirrors.fedoraproject.org/mirrorlist?repo=epel-debug-7&arch=$basearch +failovermethod=priority +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/epelplayground-8.tpl b/mock/eol/templates/epelplayground-8.tpl new file mode 100644 index 0000000..f508a19 --- /dev/null +++ b/mock/eol/templates/epelplayground-8.tpl @@ -0,0 +1,29 @@ +include('templates/epel-8.tpl') + +config_opts['dnf.conf'] += """ + +[epel-playground] +name=Extra Packages for Enterprise Linux $releasever - Playground - $basearch +#baseurl=https://download.fedoraproject.org/pub/epel/playground/$releasever/Everything/$basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=playground-epel$releasever&arch=$basearch&infra=$infra&content=centos +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 + +[epel-playground-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Playground - $basearch - Debug +#baseurl=https://download.fedoraproject.org/pub/epel/playground/$releasever/Everything/$basearch/debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=playground-debug-epel$releasever&arch=$basearch&infra=$infra&content=centos +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 + +[epel-playground-source] +name=Extra Packages for Enterprise Linux $releasever - Playground - $basearch - Source +#baseurl=https://download.fedoraproject.org/pub/epel/playground/$releasever/Everything/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=playground-source-epel$releasever&arch=$basearch&infra=$infra&content=centos +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +""" + diff --git a/mock/eol/templates/fedora-29.tpl b/mock/eol/templates/fedora-29.tpl new file mode 100644 index 0000000..6fa0fce --- /dev/null +++ b/mock/eol/templates/fedora-29.tpl @@ -0,0 +1,160 @@ +config_opts['root'] = 'fedora-29-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' +config_opts['dist'] = 'fc29' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '29' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'fedora:29' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +module_platform_id=platform:f29 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-29-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-29-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f29-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-29-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-29-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +# modular + +[fedora-modular] +name=Fedora Modular $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-$releasever&arch=$basearch +# if you want to enable it, you should set best=0 +# see https://bugzilla.redhat.com/show_bug.cgi?id=1673851 +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[fedora-modular-debuginfo] +name=Fedora Modular $releasever - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-debug-$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[fedora-modular-source] +name=Fedora Modular $releasever - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-source-$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[updates-modular] +name=Fedora Modular $releasever - $basearch - Updates +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False + +[updates-modular-debuginfo] +name=Fedora Modular $releasever - $basearch - Updates - Debug +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-debug-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False + +[updates-modular-source] +name=Fedora Modular $releasever - Updates Source +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/SRPMS/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-source-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/fedora-30.tpl b/mock/eol/templates/fedora-30.tpl new file mode 100644 index 0000000..9ed4ce9 --- /dev/null +++ b/mock/eol/templates/fedora-30.tpl @@ -0,0 +1,168 @@ +config_opts['root'] = 'fedora-30-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install @buildsys-build' + +config_opts['dist'] = 'fc30' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '30' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'fedora:30' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +module_platform_id=platform:f30 +protected_packages= + +# repos + +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f30-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-30-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +# modular + +[fedora-modular] +name=Fedora Modular $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-$releasever&arch=$basearch +# if you want to enable it, you should set best=0 +# see https://bugzilla.redhat.com/show_bug.cgi?id=1673851 +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[fedora-modular-debuginfo] +name=Fedora Modular $releasever - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-debug-$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[fedora-modular-source] +name=Fedora Modular $releasever - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-modular-source-$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +skip_if_unavailable=False + +[updates-modular] +name=Fedora Modular $releasever - $basearch - Updates +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False + +[updates-modular-debuginfo] +name=Fedora Modular $releasever - $basearch - Updates - Debug +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-debug-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False + +[updates-modular-source] +name=Fedora Modular $releasever - Updates Source +failovermethod=priority +#baseurl=http://download.fedoraproject.org/pub/fedora/linux/updates/$releasever/Modular/SRPMS/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-modular-source-f$releasever&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-$releasever-$basearch +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/mageia-6.tpl b/mock/eol/templates/mageia-6.tpl new file mode 100644 index 0000000..1b1bc2c --- /dev/null +++ b/mock/eol/templates/mageia-6.tpl @@ -0,0 +1,72 @@ +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal rpm-build rpm-mageia-setup rpm-mageia-setup-build' +config_opts['dist'] = 'mga6' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '6' +config_opts['macros']['%distro_section'] = 'core' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'mageia:6' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= + +# repos + +[mageia] +name=Mageia $releasever - {{ target_arch }} +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=release +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[updates] +name=Mageia $releasever - {{ target_arch }} - Updates +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=updates +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[mageia-debuginfo] +name=Mageia $releasever - {{ target_arch }} - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/debug/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=release&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=release&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=Mageia $releasever - {{ target_arch }} - Updates - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/debug/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=updates&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=updates&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/mageia-7.tpl b/mock/eol/templates/mageia-7.tpl new file mode 100644 index 0000000..4a1fb2d --- /dev/null +++ b/mock/eol/templates/mageia-7.tpl @@ -0,0 +1,74 @@ +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal rpm-build rpm-mageia-setup rpm-mageia-setup-build' +config_opts['dist'] = 'mga7' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '7' +config_opts['macros']['%distro_section'] = 'core' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'docker.io/library/mageia:7' +config_opts['use_bootstrap_image'] = False +config_opts['description'] = 'Mageia 7' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[mageia] +name=Mageia $releasever - {{ target_arch }} +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=release +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[updates] +name=Mageia $releasever - {{ target_arch }} - Updates +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=updates +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[mageia-debuginfo] +name=Mageia $releasever - {{ target_arch }} - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/debug/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=release&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=release&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=Mageia $releasever - {{ target_arch }} - Updates - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ target_arch }}/media/debug/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ target_arch }}@§ion=core&repo=updates&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ target_arch }}§ion=core&repo=updates&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/openmandriva-4.0.tpl b/mock/eol/templates/openmandriva-4.0.tpl new file mode 100644 index 0000000..933436d --- /dev/null +++ b/mock/eol/templates/openmandriva-4.0.tpl @@ -0,0 +1,71 @@ +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal rpm-build rpm-openmandriva-setup rpm-openmandriva-setup-build' +config_opts['dist'] = 'omv4000' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['useradd'] = '/usr/sbin/useradd -o -m -u {{chrootuid}} -g {{chrootgid}} -d {{chroothome}} {{chrootuser}}' +config_opts['releasever'] = '4.0' +config_opts['macros']['%cross_compiling'] = '0' # Mock should generally be considered native builds +config_opts['package_manager'] = 'dnf' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= + +# repos + +[openmandriva] +name=OpenMandriva $releasever - {{ target_arch }} +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-updates] +name=OpenMandriva $releasever - {{ target_arch }} - Updates +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/main/updates/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=main&release=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-debuginfo] +name=OpenMandriva $releasever - {{ target_arch }} - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/debug_main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=debug_main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False + +[openmandriva-updates-debuginfo] +name=OpenMandriva $releasever - {{ target_arch }} - Updates - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/debug_main/updates/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=debug_main&release=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/eol/templates/opensuse-leap-15.3.tpl b/mock/eol/templates/opensuse-leap-15.3.tpl new file mode 100644 index 0000000..730a628 --- /dev/null +++ b/mock/eol/templates/opensuse-leap-15.3.tpl @@ -0,0 +1,84 @@ +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp153' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '15.3' +config_opts['macros']['%dist'] = '.suse.lp153' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.opensuse.org/opensuse/leap-dnf:15.3' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +{% if target_arch == 'x86_64' %} +excludepkgs=*.i586,*.i686,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif target_arch == 'i586' %} +excludepkgs=*.x86_64,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif target_arch == 'ppc64le' %} +excludepkgs=*.ppc,*.ppc64,*.x86_64,*.i586,*.i686,*.s390x +{% elif target_arch == 'ppc64' %} +excludepkgs=*.ppc,*.ppc64le,*.x86_64,*.i586,*.i686,*.s390x +{% elif target_arch == 's390x' %} +excludepkgs=*.ppc,*.ppc64,*.ppc64le,*.x86_64,*.i586,*.i686 +{% endif %} + +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - {{ target_arch }} - OSS +baseurl=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE + file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 +gpgcheck=1 + +[opensuse-leap-oss-update] +name=openSUSE Leap $releasever - {{ target_arch }} - OSS - Updates +baseurl=https://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=https://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[opensuse-leap-sle-update] +name=openSUSE Leap $releasever - {{ target_arch }} - Updates from SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/sle/ +#metalink=https://download.opensuse.org/update/leap/$releasever/sle/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 +gpgcheck=1 + +[opensuse-leap-sle-backports-update] +name=openSUSE Leap $releasever - {{ target_arch }} - Updates from Backports for SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/backports/ +#metalink=https://download.opensuse.org/update/leap/$releasever/backports/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports +gpgcheck=1 + +""" diff --git a/mock/eol/templates/opensuse-leap-15.4.tpl b/mock/eol/templates/opensuse-leap-15.4.tpl new file mode 100644 index 0000000..c8b7cfe --- /dev/null +++ b/mock/eol/templates/opensuse-leap-15.4.tpl @@ -0,0 +1,84 @@ +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp154' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '15.4' +config_opts['macros']['%dist'] = '.suse.lp154' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.opensuse.org/opensuse/leap-dnf:15.4' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +{% if repo_arch == 'x86_64' %} +excludepkgs=*.i586,*.i686,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif repo_arch == 'i586' %} +excludepkgs=*.x86_64,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif repo_arch == 'ppc64le' %} +excludepkgs=*.ppc,*.ppc64,*.x86_64,*.i586,*.i686,*.s390x +{% elif repo_arch == 'ppc64' %} +excludepkgs=*.ppc,*.ppc64le,*.x86_64,*.i586,*.i686,*.s390x +{% elif repo_arch == 's390x' %} +excludepkgs=*.ppc,*.ppc64,*.ppc64le,*.x86_64,*.i586,*.i686 +{% endif %} + +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - {{ repo_arch }} - OSS +baseurl=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE + file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 +gpgcheck=1 + +[opensuse-leap-oss-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - OSS - Updates +baseurl=https://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=https://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE +gpgcheck=1 + +[opensuse-leap-sle-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - Updates from SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/sle/ +#metalink=https://download.opensuse.org/update/leap/$releasever/sle/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 +gpgcheck=1 + +[opensuse-leap-sle-backports-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - Updates from Backports for SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/backports/ +#metalink=https://download.opensuse.org/update/leap/$releasever/backports/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports +gpgcheck=1 + +""" diff --git a/mock/eol/templates/rhel-6.tpl b/mock/eol/templates/rhel-6.tpl new file mode 100644 index 0000000..7d973e0 --- /dev/null +++ b/mock/eol/templates/rhel-6.tpl @@ -0,0 +1,70 @@ +# This list is taken from 'epel-6-x86_64' @buildsys-build group, minus the +# 'epel-*' specific stuff. +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make patch redhat-rpm-config rpm-build sed tar unzip util-linux-ng which xz' + +config_opts['dist'] = 'el6' # only useful for --resultdir variable subst +# beware RHEL uses 6Server or 6Client +config_opts['releasever'] = '6' +config_opts['isolation'] = 'simple' +config_opts['bootstrap_image'] = 'registry.access.redhat.com/rhel6' +config_opts['package_manager'] = 'yum' + +config_opts['dnf_install_command'] += ' subscription-manager' +config_opts['yum_install_command'] += ' subscription-manager' + +config_opts['redhat_subscription_required'] = True +config_opts['rhel_product'] = '6Server' + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=1 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos +[base] +name=Red Hat Enterprise Linux +enabled=1 +baseurl=https://cdn.redhat.com/content/dist/rhel/server/6/{{ rhel_product }}/$basearch/os +failovermethod=priority +ui_repoid_vars = releasever basearch +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat6-release +skip_if_unavailable=False +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem + +[rhel-optional] +name = Red Hat Enterprise Linux - Optional +baseurl = https://cdn.redhat.com/content/dist/rhel/server/6/{{ rhel_product }}/$basearch/optional/os +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat6-release +skip_if_unavailable=False +ui_repoid_vars = releasever basearch +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem + +[extras] +name = Red Hat Enterprise Linux - Extras +baseurl = https://cdn.redhat.com/content/dist/rhel/server/6/{{ rhel_product }}/$basearch/extras/os +failovermethod=priority +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat6-release +skip_if_unavailable=False +ui_repoid_vars = releasever basearch +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +""" diff --git a/mock/epel-10-aarch64.cfg b/mock/epel-10-aarch64.cfg new file mode 120000 index 0000000..1251eeb --- /dev/null +++ b/mock/epel-10-aarch64.cfg @@ -0,0 +1 @@ +centos-stream+epel-10-aarch64.cfg \ No newline at end of file diff --git a/mock/epel-10-ppc64le.cfg b/mock/epel-10-ppc64le.cfg new file mode 120000 index 0000000..0d1a219 --- /dev/null +++ b/mock/epel-10-ppc64le.cfg @@ -0,0 +1 @@ +centos-stream+epel-10-ppc64le.cfg \ No newline at end of file diff --git a/mock/epel-10-s390x.cfg b/mock/epel-10-s390x.cfg new file mode 120000 index 0000000..3e7603f --- /dev/null +++ b/mock/epel-10-s390x.cfg @@ -0,0 +1 @@ +centos-stream+epel-10-s390x.cfg \ No newline at end of file diff --git a/mock/epel-10-x86_64.cfg b/mock/epel-10-x86_64.cfg new file mode 120000 index 0000000..358db92 --- /dev/null +++ b/mock/epel-10-x86_64.cfg @@ -0,0 +1 @@ +centos-stream+epel-10-x86_64.cfg \ No newline at end of file diff --git a/mock/eurolinux-8-aarch64.cfg b/mock/eurolinux-8-aarch64.cfg new file mode 100644 index 0000000..b6aaa8f --- /dev/null +++ b/mock/eurolinux-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-8.tpl') + +config_opts['root'] = 'eurolinux-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eurolinux-8-i686.cfg b/mock/eurolinux-8-i686.cfg new file mode 100644 index 0000000..0b19278 --- /dev/null +++ b/mock/eurolinux-8-i686.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-8.tpl') + +config_opts['root'] = 'eurolinux-8-i686' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eurolinux-8-x86_64.cfg b/mock/eurolinux-8-x86_64.cfg new file mode 100644 index 0000000..eefb165 --- /dev/null +++ b/mock/eurolinux-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-8.tpl') + +config_opts['root'] = 'eurolinux-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/eurolinux-9-aarch64.cfg b/mock/eurolinux-9-aarch64.cfg new file mode 100644 index 0000000..e04e2df --- /dev/null +++ b/mock/eurolinux-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-9.tpl') + +config_opts['root'] = 'eurolinux-9-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/eurolinux-9-i686.cfg b/mock/eurolinux-9-i686.cfg new file mode 100644 index 0000000..90d2f55 --- /dev/null +++ b/mock/eurolinux-9-i686.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-9.tpl') + +config_opts['root'] = 'eurolinux-9-i686' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/eurolinux-9-x86_64.cfg b/mock/eurolinux-9-x86_64.cfg new file mode 100644 index 0000000..0831b43 --- /dev/null +++ b/mock/eurolinux-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/eurolinux-9.tpl') + +config_opts['root'] = 'eurolinux-9-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/fedora-40-aarch64.cfg b/mock/fedora-40-aarch64.cfg new file mode 100644 index 0000000..0be4e06 --- /dev/null +++ b/mock/fedora-40-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '40' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-40-i386.cfg b/mock/fedora-40-i386.cfg new file mode 100644 index 0000000..0d65d2d --- /dev/null +++ b/mock/fedora-40-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '40' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-40-ppc64le.cfg b/mock/fedora-40-ppc64le.cfg new file mode 100644 index 0000000..a4f3123 --- /dev/null +++ b/mock/fedora-40-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '40' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-40-s390x.cfg b/mock/fedora-40-s390x.cfg new file mode 100644 index 0000000..9ff7527 --- /dev/null +++ b/mock/fedora-40-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '40' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-40-x86_64.cfg b/mock/fedora-40-x86_64.cfg new file mode 100644 index 0000000..bb5f9f6 --- /dev/null +++ b/mock/fedora-40-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '40' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-41-aarch64.cfg b/mock/fedora-41-aarch64.cfg new file mode 100644 index 0000000..3091306 --- /dev/null +++ b/mock/fedora-41-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '41' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-41-i386.cfg b/mock/fedora-41-i386.cfg new file mode 100644 index 0000000..74a96d5 --- /dev/null +++ b/mock/fedora-41-i386.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '41' +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-41-ppc64le.cfg b/mock/fedora-41-ppc64le.cfg new file mode 100644 index 0000000..2126263 --- /dev/null +++ b/mock/fedora-41-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '41' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-41-s390x.cfg b/mock/fedora-41-s390x.cfg new file mode 100644 index 0000000..1d64f75 --- /dev/null +++ b/mock/fedora-41-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '41' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-41-x86_64.cfg b/mock/fedora-41-x86_64.cfg new file mode 100644 index 0000000..c3e4f08 --- /dev/null +++ b/mock/fedora-41-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '41' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-branched.tpl') diff --git a/mock/fedora-42-aarch64.cfg b/mock/fedora-42-aarch64.cfg new file mode 120000 index 0000000..e435ce1 --- /dev/null +++ b/mock/fedora-42-aarch64.cfg @@ -0,0 +1 @@ +fedora-rawhide-aarch64.cfg \ No newline at end of file diff --git a/mock/fedora-42-i386.cfg b/mock/fedora-42-i386.cfg new file mode 120000 index 0000000..1f22dd2 --- /dev/null +++ b/mock/fedora-42-i386.cfg @@ -0,0 +1 @@ +fedora-rawhide-i386.cfg \ No newline at end of file diff --git a/mock/fedora-42-ppc64le.cfg b/mock/fedora-42-ppc64le.cfg new file mode 120000 index 0000000..9767495 --- /dev/null +++ b/mock/fedora-42-ppc64le.cfg @@ -0,0 +1 @@ +fedora-rawhide-ppc64le.cfg \ No newline at end of file diff --git a/mock/fedora-42-s390x.cfg b/mock/fedora-42-s390x.cfg new file mode 120000 index 0000000..3722078 --- /dev/null +++ b/mock/fedora-42-s390x.cfg @@ -0,0 +1 @@ +fedora-rawhide-s390x.cfg \ No newline at end of file diff --git a/mock/fedora-42-x86_64.cfg b/mock/fedora-42-x86_64.cfg new file mode 120000 index 0000000..cddd6e1 --- /dev/null +++ b/mock/fedora-42-x86_64.cfg @@ -0,0 +1 @@ +fedora-rawhide-x86_64.cfg \ No newline at end of file diff --git a/mock/fedora-eln-aarch64.cfg b/mock/fedora-eln-aarch64.cfg new file mode 100644 index 0000000..e12efae --- /dev/null +++ b/mock/fedora-eln-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-eln.tpl') +config_opts['description'] = 'Fedora ELN' diff --git a/mock/fedora-eln-ppc64le.cfg b/mock/fedora-eln-ppc64le.cfg new file mode 100644 index 0000000..65d434d --- /dev/null +++ b/mock/fedora-eln-ppc64le.cfg @@ -0,0 +1,5 @@ +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-eln.tpl') +config_opts['description'] = 'Fedora ELN' diff --git a/mock/fedora-eln-s390x.cfg b/mock/fedora-eln-s390x.cfg new file mode 100644 index 0000000..20a87c3 --- /dev/null +++ b/mock/fedora-eln-s390x.cfg @@ -0,0 +1,5 @@ +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-eln.tpl') +config_opts['description'] = 'Fedora ELN' diff --git a/mock/fedora-eln-x86_64.cfg b/mock/fedora-eln-x86_64.cfg new file mode 100644 index 0000000..7036ac6 --- /dev/null +++ b/mock/fedora-eln-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-eln.tpl') +config_opts['description'] = 'Fedora ELN' diff --git a/mock/fedora-rawhide-aarch64.cfg b/mock/fedora-rawhide-aarch64.cfg new file mode 100644 index 0000000..b6a8914 --- /dev/null +++ b/mock/fedora-rawhide-aarch64.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/fedora-rawhide.tpl') diff --git a/mock/fedora-rawhide-i386.cfg b/mock/fedora-rawhide-i386.cfg new file mode 100644 index 0000000..75dc3ed --- /dev/null +++ b/mock/fedora-rawhide-i386.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/fedora-rawhide.tpl') diff --git a/mock/fedora-rawhide-ppc64le.cfg b/mock/fedora-rawhide-ppc64le.cfg new file mode 100644 index 0000000..01388d8 --- /dev/null +++ b/mock/fedora-rawhide-ppc64le.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +include('templates/fedora-rawhide.tpl') diff --git a/mock/fedora-rawhide-s390x.cfg b/mock/fedora-rawhide-s390x.cfg new file mode 100644 index 0000000..5b5bd25 --- /dev/null +++ b/mock/fedora-rawhide-s390x.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +include('templates/fedora-rawhide.tpl') diff --git a/mock/fedora-rawhide-x86_64.cfg b/mock/fedora-rawhide-x86_64.cfg new file mode 100644 index 0000000..2180477 --- /dev/null +++ b/mock/fedora-rawhide-x86_64.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/fedora-rawhide.tpl') diff --git a/mock/hermetic-build.cfg b/mock/hermetic-build.cfg new file mode 100644 index 0000000..79416de --- /dev/null +++ b/mock/hermetic-build.cfg @@ -0,0 +1,38 @@ +# used by https://rpm-software-management.github.io/mock/feature-hermetic-builds + +config_opts['root'] = 'hermetic-build' +config_opts['description'] = 'Configuration file for Hermetic Builds' + +# Hermetic build configuration file is re-used for multiple chroot +# configurations (particular chroot used depends on the previous +# --calculate-build-dependencies run). That's why Mock automatically runs +# --scrub=all with --hermetic-build. It doesn't make sense to waste the time +# with creating caches. +config_opts['plugin_conf']['root_cache_enable'] = False + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +system_cachedir=/var/cache/dnf +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= + +# repos + +[offline] +name=offline repo +baseurl=file://{{ offline_local_repository }} +enabled=True +skip_if_unavailable=False +""" diff --git a/mock/logging.ini b/mock/logging.ini new file mode 100644 index 0000000..8186ead --- /dev/null +++ b/mock/logging.ini @@ -0,0 +1,84 @@ +[formatters] +keys: detailed,simple,unadorned,state + +[handlers] +keys: simple_console,detailed_console,unadorned_console,simple_console_warnings_only + +[loggers] +keys: root,build,state,mockbuild + +[formatter_state] +format: %(asctime)s - %(message)s + +[formatter_unadorned] +format: %(message)s + +[formatter_simple] +format: %(levelname)s: %(message)s + +;useful for debugging: +[formatter_detailed] +format: %(levelname)s %(filename)s:%(lineno)d: %(message)s + +[handler_unadorned_console] +class: StreamHandler +args: [] +formatter: unadorned +level: INFO + +[handler_simple_console] +class: StreamHandler +args: [] +formatter: simple +level: INFO + +[handler_simple_console_warnings_only] +class: StreamHandler +args: [] +formatter: simple +level: WARNING + +[handler_detailed_console] +class: StreamHandler +args: [] +formatter: detailed +level: WARNING + +; usually dont want to set a level for loggers +; this way all handlers get all messages, and messages can be filtered +; at the handler level +; +; all these loggers default to a console output handler +; +[logger_root] +level: NOTSET +handlers: simple_console + +; mockbuild logger normally has no output +; catches stuff like mockbuild.trace_decorator and mockbuild.util +; dont normally want to propagate to root logger, either +[logger_mockbuild] +level: NOTSET +handlers: +qualname: mockbuild +propagate: 1 + +[logger_state] +level: NOTSET +; unadorned_console only outputs INFO or above +handlers: unadorned_console +qualname: mockbuild.Root.state +propagate: 0 + +[logger_build] +level: NOTSET +handlers: simple_console_warnings_only +qualname: mockbuild.Root.build +propagate: 0 + +; the following is a list mock logger qualnames used within the code: +; +; qualname: mockbuild.util +; qualname: mockbuild.uid +; qualname: mockbuild.trace_decorator + diff --git a/mock/mageia-10-aarch64.cfg b/mock/mageia-10-aarch64.cfg new file mode 120000 index 0000000..849dccd --- /dev/null +++ b/mock/mageia-10-aarch64.cfg @@ -0,0 +1 @@ +mageia-cauldron-aarch64.cfg \ No newline at end of file diff --git a/mock/mageia-10-armv7hl.cfg b/mock/mageia-10-armv7hl.cfg new file mode 120000 index 0000000..e93ddf2 --- /dev/null +++ b/mock/mageia-10-armv7hl.cfg @@ -0,0 +1 @@ +mageia-cauldron-armv7hl.cfg \ No newline at end of file diff --git a/mock/mageia-10-i686.cfg b/mock/mageia-10-i686.cfg new file mode 120000 index 0000000..e8e8237 --- /dev/null +++ b/mock/mageia-10-i686.cfg @@ -0,0 +1 @@ +mageia-cauldron-i686.cfg \ No newline at end of file diff --git a/mock/mageia-10-x86_64.cfg b/mock/mageia-10-x86_64.cfg new file mode 120000 index 0000000..c540a9e --- /dev/null +++ b/mock/mageia-10-x86_64.cfg @@ -0,0 +1 @@ +mageia-cauldron-x86_64.cfg \ No newline at end of file diff --git a/mock/mageia-8-aarch64.cfg b/mock/mageia-8-aarch64.cfg new file mode 100644 index 0000000..a677fde --- /dev/null +++ b/mock/mageia-8-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '8' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-8-armv7hl.cfg b/mock/mageia-8-armv7hl.cfg new file mode 100644 index 0000000..b6fe36d --- /dev/null +++ b/mock/mageia-8-armv7hl.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '8' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-8-i586.cfg b/mock/mageia-8-i586.cfg new file mode 100644 index 0000000..15eadf7 --- /dev/null +++ b/mock/mageia-8-i586.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '8' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-8-x86_64.cfg b/mock/mageia-8-x86_64.cfg new file mode 100644 index 0000000..2b43e9f --- /dev/null +++ b/mock/mageia-8-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '8' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-aarch64.cfg b/mock/mageia-9-aarch64.cfg new file mode 100644 index 0000000..5803929 --- /dev/null +++ b/mock/mageia-9-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-armv7hl.cfg b/mock/mageia-9-armv7hl.cfg new file mode 100644 index 0000000..ec3f33f --- /dev/null +++ b/mock/mageia-9-armv7hl.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-i586.cfg b/mock/mageia-9-i586.cfg new file mode 100644 index 0000000..435d5fa --- /dev/null +++ b/mock/mageia-9-i586.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-x86_64.cfg b/mock/mageia-9-x86_64.cfg new file mode 100644 index 0000000..8be7643 --- /dev/null +++ b/mock/mageia-9-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-cauldron-aarch64.cfg b/mock/mageia-cauldron-aarch64.cfg new file mode 100644 index 0000000..95a59bf --- /dev/null +++ b/mock/mageia-cauldron-aarch64.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/mageia-cauldron.tpl') diff --git a/mock/mageia-cauldron-armv7hl.cfg b/mock/mageia-cauldron-armv7hl.cfg new file mode 100644 index 0000000..77673f4 --- /dev/null +++ b/mock/mageia-cauldron-armv7hl.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') + +include('templates/mageia-cauldron.tpl') diff --git a/mock/mageia-cauldron-i686.cfg b/mock/mageia-cauldron-i686.cfg new file mode 100644 index 0000000..36387e5 --- /dev/null +++ b/mock/mageia-cauldron-i686.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'i686' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/mageia-cauldron.tpl') diff --git a/mock/mageia-cauldron-x86_64.cfg b/mock/mageia-cauldron-x86_64.cfg new file mode 100644 index 0000000..6a32266 --- /dev/null +++ b/mock/mageia-cauldron-x86_64.cfg @@ -0,0 +1,4 @@ +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/mageia-cauldron.tpl') diff --git a/mock/navy-8-x86_64.cfg b/mock/navy-8-x86_64.cfg new file mode 100644 index 0000000..0c4a0ab --- /dev/null +++ b/mock/navy-8-x86_64.cfg @@ -0,0 +1,4 @@ +config_opts['root'] = 'navy-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +include('templates/navy-8.tpl') diff --git a/mock/openeuler-20.03-aarch64.cfg b/mock/openeuler-20.03-aarch64.cfg new file mode 100644 index 0000000..74efe06 --- /dev/null +++ b/mock/openeuler-20.03-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-20.03.tpl') + +config_opts['root'] = 'openeuler-20.03-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/openeuler-20.03-x86_64.cfg b/mock/openeuler-20.03-x86_64.cfg new file mode 100644 index 0000000..0a79762 --- /dev/null +++ b/mock/openeuler-20.03-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-20.03.tpl') + +config_opts['root'] = 'openeuler-20.03-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/openeuler-22.03-aarch64.cfg b/mock/openeuler-22.03-aarch64.cfg new file mode 100644 index 0000000..e128cff --- /dev/null +++ b/mock/openeuler-22.03-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-22.03.tpl') + +config_opts['root'] = 'openeuler-22.03-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/openeuler-22.03-x86_64.cfg b/mock/openeuler-22.03-x86_64.cfg new file mode 100644 index 0000000..2859543 --- /dev/null +++ b/mock/openeuler-22.03-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-22.03.tpl') + +config_opts['root'] = 'openeuler-22.03-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/openeuler-24.03-aarch64.cfg b/mock/openeuler-24.03-aarch64.cfg new file mode 100644 index 0000000..a5f34c8 --- /dev/null +++ b/mock/openeuler-24.03-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-24.03.tpl') + +config_opts['root'] = 'openeuler-24.03-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/openeuler-24.03-x86_64.cfg b/mock/openeuler-24.03-x86_64.cfg new file mode 100644 index 0000000..2d55158 --- /dev/null +++ b/mock/openeuler-24.03-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/openeuler-24.03.tpl') + +config_opts['root'] = 'openeuler-24.03-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/openmandriva-4.1-aarch64.cfg b/mock/openmandriva-4.1-aarch64.cfg new file mode 100644 index 0000000..8638a76 --- /dev/null +++ b/mock/openmandriva-4.1-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '4.1' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/openmandriva-branched.tpl') diff --git a/mock/openmandriva-4.1-armv7hnl.cfg b/mock/openmandriva-4.1-armv7hnl.cfg new file mode 100644 index 0000000..536a6ac --- /dev/null +++ b/mock/openmandriva-4.1-armv7hnl.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '4.1' +config_opts['target_arch'] = 'armv7hnl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv7hnl', 'armv8l', 'armv8hl', 'armv8hnl', 'armv8hcnl', 'aarch64',) + +include('templates/openmandriva-branched.tpl') diff --git a/mock/openmandriva-4.1-x86_64.cfg b/mock/openmandriva-4.1-x86_64.cfg new file mode 100644 index 0000000..43be228 --- /dev/null +++ b/mock/openmandriva-4.1-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '4.1' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/openmandriva-branched.tpl') diff --git a/mock/openmandriva-cooker-aarch64.cfg b/mock/openmandriva-cooker-aarch64.cfg new file mode 100644 index 0000000..c98e2aa --- /dev/null +++ b/mock/openmandriva-cooker-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-cooker.tpl') + +config_opts['root'] = 'openmandriva-cooker-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/openmandriva-cooker-armv7hnl.cfg b/mock/openmandriva-cooker-armv7hnl.cfg new file mode 100644 index 0000000..2b84745 --- /dev/null +++ b/mock/openmandriva-cooker-armv7hnl.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-cooker.tpl') + +config_opts['root'] = 'openmandriva-cooker-armv7hnl' +config_opts['target_arch'] = 'armv7hnl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv7hnl', 'armv8l', 'armv8hl', 'armv8hnl', 'armv8hcnl', 'aarch64',) diff --git a/mock/openmandriva-cooker-x86_64.cfg b/mock/openmandriva-cooker-x86_64.cfg new file mode 100644 index 0000000..f2fb86d --- /dev/null +++ b/mock/openmandriva-cooker-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-cooker.tpl') + +config_opts['root'] = 'openmandriva-cooker-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/openmandriva-rolling-aarch64.cfg b/mock/openmandriva-rolling-aarch64.cfg new file mode 100644 index 0000000..4599804 --- /dev/null +++ b/mock/openmandriva-rolling-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-rolling.tpl') + +config_opts['root'] = 'openmandriva-rolling-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/openmandriva-rolling-armv7hnl.cfg b/mock/openmandriva-rolling-armv7hnl.cfg new file mode 100644 index 0000000..069a38e --- /dev/null +++ b/mock/openmandriva-rolling-armv7hnl.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-rolling.tpl') + +config_opts['root'] = 'openmandriva-rolling-armv7hnl' +config_opts['target_arch'] = 'armv7hnl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv7hnl', 'armv8l', 'armv8hl', 'armv8hnl', 'armv8hcnl', 'aarch64',) diff --git a/mock/openmandriva-rolling-x86_64.cfg b/mock/openmandriva-rolling-x86_64.cfg new file mode 100644 index 0000000..6595027 --- /dev/null +++ b/mock/openmandriva-rolling-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/openmandriva-rolling.tpl') + +config_opts['root'] = 'openmandriva-rolling-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/opensuse-leap-15.5-aarch64.cfg b/mock/opensuse-leap-15.5-aarch64.cfg new file mode 100644 index 0000000..e4686b1 --- /dev/null +++ b/mock/opensuse-leap-15.5-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/opensuse-leap-15.5-ppc64le.cfg b/mock/opensuse-leap-15.5-ppc64le.cfg new file mode 100644 index 0000000..07132f6 --- /dev/null +++ b/mock/opensuse-leap-15.5-ppc64le.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/opensuse-leap-15.5-s390x.cfg b/mock/opensuse-leap-15.5-s390x.cfg new file mode 100644 index 0000000..2928729 --- /dev/null +++ b/mock/opensuse-leap-15.5-s390x.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/opensuse-leap-15.5-x86_64.cfg b/mock/opensuse-leap-15.5-x86_64.cfg new file mode 100644 index 0000000..9d8b212 --- /dev/null +++ b/mock/opensuse-leap-15.5-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/opensuse-tumbleweed-aarch64.cfg b/mock/opensuse-tumbleweed-aarch64.cfg new file mode 100644 index 0000000..d340969 --- /dev/null +++ b/mock/opensuse-tumbleweed-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/opensuse-tumbleweed-i586.cfg b/mock/opensuse-tumbleweed-i586.cfg new file mode 100644 index 0000000..f290a99 --- /dev/null +++ b/mock/opensuse-tumbleweed-i586.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-i586' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') diff --git a/mock/opensuse-tumbleweed-ppc64.cfg b/mock/opensuse-tumbleweed-ppc64.cfg new file mode 100644 index 0000000..7997d9e --- /dev/null +++ b/mock/opensuse-tumbleweed-ppc64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-ppc64' +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) diff --git a/mock/opensuse-tumbleweed-ppc64le.cfg b/mock/opensuse-tumbleweed-ppc64le.cfg new file mode 100644 index 0000000..1770655 --- /dev/null +++ b/mock/opensuse-tumbleweed-ppc64le.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/opensuse-tumbleweed-s390x.cfg b/mock/opensuse-tumbleweed-s390x.cfg new file mode 100644 index 0000000..88e1cdb --- /dev/null +++ b/mock/opensuse-tumbleweed-s390x.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/opensuse-tumbleweed-x86_64.cfg b/mock/opensuse-tumbleweed-x86_64.cfg new file mode 100644 index 0000000..4392457 --- /dev/null +++ b/mock/opensuse-tumbleweed-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-tumbleweed.tpl') + +config_opts['root'] = 'opensuse-tumbleweed-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/oraclelinux+epel-8-aarch64.cfg b/mock/oraclelinux+epel-8-aarch64.cfg new file mode 100644 index 0000000..a68e9ae --- /dev/null +++ b/mock/oraclelinux+epel-8-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'oraclelinux+epel-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['description'] = 'Oracle Linux 8 + EPEL' diff --git a/mock/oraclelinux+epel-8-x86_64.cfg b/mock/oraclelinux+epel-8-x86_64.cfg new file mode 100644 index 0000000..7ec4c9f --- /dev/null +++ b/mock/oraclelinux+epel-8-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'oraclelinux+epel-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['description'] = 'Oracle Linux 8 + EPEL' diff --git a/mock/oraclelinux+epel-9-aarch64.cfg b/mock/oraclelinux+epel-9-aarch64.cfg new file mode 100644 index 0000000..55495fc --- /dev/null +++ b/mock/oraclelinux+epel-9-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'oraclelinux+epel-9-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) +config_opts['description'] = 'Oracle Linux 9 + EPEL' diff --git a/mock/oraclelinux+epel-9-x86_64.cfg b/mock/oraclelinux+epel-9-x86_64.cfg new file mode 100644 index 0000000..d423153 --- /dev/null +++ b/mock/oraclelinux+epel-9-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/oraclelinux-9.tpl') +include('templates/epel-9.tpl') + +config_opts['root'] = 'oraclelinux+epel-9-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) +config_opts['description'] = 'Oracle Linux 9 + EPEL' diff --git a/mock/oraclelinux-7-aarch64.cfg b/mock/oraclelinux-7-aarch64.cfg new file mode 100644 index 0000000..3e0277b --- /dev/null +++ b/mock/oraclelinux-7-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-7.tpl') + +config_opts['root'] = 'oraclelinux-7-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/oraclelinux-7-x86_64.cfg b/mock/oraclelinux-7-x86_64.cfg new file mode 100644 index 0000000..9587891 --- /dev/null +++ b/mock/oraclelinux-7-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-7.tpl') + +config_opts['root'] = 'oraclelinux-7-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/oraclelinux-8-aarch64.cfg b/mock/oraclelinux-8-aarch64.cfg new file mode 100644 index 0000000..6fc66c8 --- /dev/null +++ b/mock/oraclelinux-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-8.tpl') + +config_opts['root'] = 'oraclelinux-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/oraclelinux-8-x86_64.cfg b/mock/oraclelinux-8-x86_64.cfg new file mode 100644 index 0000000..8e4f5ad --- /dev/null +++ b/mock/oraclelinux-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-8.tpl') + +config_opts['root'] = 'oraclelinux-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/oraclelinux-9-aarch64.cfg b/mock/oraclelinux-9-aarch64.cfg new file mode 100644 index 0000000..ddb0f9f --- /dev/null +++ b/mock/oraclelinux-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-9.tpl') + +config_opts['root'] = 'oraclelinux-9-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/oraclelinux-9-x86_64.cfg b/mock/oraclelinux-9-x86_64.cfg new file mode 100644 index 0000000..de72646 --- /dev/null +++ b/mock/oraclelinux-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/oraclelinux-9.tpl') + +config_opts['root'] = 'oraclelinux-9-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/rhel+epel-8-aarch64.cfg b/mock/rhel+epel-8-aarch64.cfg new file mode 100644 index 0000000..5e6f898 --- /dev/null +++ b/mock/rhel+epel-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('rhel-8-aarch64.cfg') +include('templates/epel-8.tpl') + +config_opts['root'] = "rhel+epel-8-{{ target_arch }}" +config_opts['description'] = 'RHEL 8 + EPEL' diff --git a/mock/rhel+epel-8-ppc64le.cfg b/mock/rhel+epel-8-ppc64le.cfg new file mode 100644 index 0000000..029ddf6 --- /dev/null +++ b/mock/rhel+epel-8-ppc64le.cfg @@ -0,0 +1,5 @@ +include('rhel-8-ppc64le.cfg') +include('templates/epel-8.tpl') + +config_opts['root'] = "rhel+epel-8-{{ target_arch }}" +config_opts['description'] = 'RHEL 8 + EPEL' diff --git a/mock/rhel+epel-8-s390x.cfg b/mock/rhel+epel-8-s390x.cfg new file mode 100644 index 0000000..fc9d8a6 --- /dev/null +++ b/mock/rhel+epel-8-s390x.cfg @@ -0,0 +1,5 @@ +include('rhel-8-s390x.cfg') +include('templates/epel-8.tpl') + +config_opts['root'] = "rhel+epel-8-{{ target_arch }}" +config_opts['description'] = 'RHEL 8 + EPEL' diff --git a/mock/rhel+epel-8-x86_64.cfg b/mock/rhel+epel-8-x86_64.cfg new file mode 100644 index 0000000..f24ab3b --- /dev/null +++ b/mock/rhel+epel-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('rhel-8-x86_64.cfg') +include('templates/epel-8.tpl') + +config_opts['root'] = "rhel+epel-8-{{ target_arch }}" +config_opts['description'] = 'RHEL 8 + EPEL' diff --git a/mock/rhel+epel-9-aarch64.cfg b/mock/rhel+epel-9-aarch64.cfg new file mode 100644 index 0000000..b9d9007 --- /dev/null +++ b/mock/rhel+epel-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('rhel-9-aarch64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rhel+epel-9-{{ target_arch }}" +config_opts['description'] = 'RHEL 9 + EPEL' diff --git a/mock/rhel+epel-9-ppc64le.cfg b/mock/rhel+epel-9-ppc64le.cfg new file mode 100644 index 0000000..3eb7204 --- /dev/null +++ b/mock/rhel+epel-9-ppc64le.cfg @@ -0,0 +1,5 @@ +include('rhel-9-ppc64le.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rhel+epel-9-{{ target_arch }}" +config_opts['description'] = 'RHEL 9 + EPEL' diff --git a/mock/rhel+epel-9-s390x.cfg b/mock/rhel+epel-9-s390x.cfg new file mode 100644 index 0000000..fbe710e --- /dev/null +++ b/mock/rhel+epel-9-s390x.cfg @@ -0,0 +1,5 @@ +include('rhel-9-s390x.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rhel+epel-9-{{ target_arch }}" +config_opts['description'] = 'RHEL 9 + EPEL' diff --git a/mock/rhel+epel-9-x86_64.cfg b/mock/rhel+epel-9-x86_64.cfg new file mode 100644 index 0000000..4577353 --- /dev/null +++ b/mock/rhel+epel-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('rhel-9-x86_64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rhel+epel-9-{{ target_arch }}" +config_opts['description'] = 'RHEL 9 + EPEL' diff --git a/mock/rhel-7-aarch64.cfg b/mock/rhel-7-aarch64.cfg new file mode 100644 index 0000000..0661295 --- /dev/null +++ b/mock/rhel-7-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-7.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +config_opts['rhel_product'] = 'server' diff --git a/mock/rhel-7-ppc64.cfg b/mock/rhel-7-ppc64.cfg new file mode 100644 index 0000000..be07373 --- /dev/null +++ b/mock/rhel-7-ppc64.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-7.tpl') + +config_opts['target_arch'] = 'ppc64' +config_opts['legal_host_arches'] = ('ppc64',) + +config_opts['rhel_product'] = 'power' diff --git a/mock/rhel-7-ppc64le.cfg b/mock/rhel-7-ppc64le.cfg new file mode 100644 index 0000000..6c73909 --- /dev/null +++ b/mock/rhel-7-ppc64le.cfg @@ -0,0 +1,8 @@ +include('templates/rhel-7.tpl') + +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) + +config_opts['rhel_product'] = 'power-le' +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/rhel-7-s390x.cfg b/mock/rhel-7-s390x.cfg new file mode 100644 index 0000000..13a3db1 --- /dev/null +++ b/mock/rhel-7-s390x.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-7.tpl') + +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) + +config_opts['rhel_product'] = 'system-z' diff --git a/mock/rhel-7-x86_64.cfg b/mock/rhel-7-x86_64.cfg new file mode 100644 index 0000000..963d68a --- /dev/null +++ b/mock/rhel-7-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-7.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +config_opts['rhel_product'] = 'server' diff --git a/mock/rhel-8-aarch64.cfg b/mock/rhel-8-aarch64.cfg new file mode 100644 index 0000000..48f154c --- /dev/null +++ b/mock/rhel-8-aarch64.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-8.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/rhel-8-ppc64le.cfg b/mock/rhel-8-ppc64le.cfg new file mode 100644 index 0000000..3053272 --- /dev/null +++ b/mock/rhel-8-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-8.tpl') + +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/rhel-8-s390x.cfg b/mock/rhel-8-s390x.cfg new file mode 100644 index 0000000..59880f2 --- /dev/null +++ b/mock/rhel-8-s390x.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-8.tpl') + +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/rhel-8-x86_64.cfg b/mock/rhel-8-x86_64.cfg new file mode 100644 index 0000000..abf2354 --- /dev/null +++ b/mock/rhel-8-x86_64.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-8.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/rhel-9-aarch64.cfg b/mock/rhel-9-aarch64.cfg new file mode 100644 index 0000000..786f30a --- /dev/null +++ b/mock/rhel-9-aarch64.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-9.tpl') + +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/rhel-9-ppc64le.cfg b/mock/rhel-9-ppc64le.cfg new file mode 100644 index 0000000..480b347 --- /dev/null +++ b/mock/rhel-9-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/rhel-9.tpl') + +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) +# see pull-request #1195 +config_opts['macros']['%_host_cpu'] = 'ppc64le' diff --git a/mock/rhel-9-s390x.cfg b/mock/rhel-9-s390x.cfg new file mode 100644 index 0000000..c3f8362 --- /dev/null +++ b/mock/rhel-9-s390x.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-9.tpl') + +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/rhel-9-x86_64.cfg b/mock/rhel-9-x86_64.cfg new file mode 100644 index 0000000..477c1a3 --- /dev/null +++ b/mock/rhel-9-x86_64.cfg @@ -0,0 +1,4 @@ +include('templates/rhel-9.tpl') + +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/rocky+epel-8-aarch64.cfg b/mock/rocky+epel-8-aarch64.cfg new file mode 100644 index 0000000..4ed0575 --- /dev/null +++ b/mock/rocky+epel-8-aarch64.cfg @@ -0,0 +1,7 @@ +include('templates/rocky-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'rocky+epel-8-aarch64' +config_opts['description'] = 'Rocky Linux 8 + EPEL' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/rocky+epel-8-x86_64.cfg b/mock/rocky+epel-8-x86_64.cfg new file mode 100644 index 0000000..8d52a06 --- /dev/null +++ b/mock/rocky+epel-8-x86_64.cfg @@ -0,0 +1,7 @@ +include('templates/rocky-8.tpl') +include('templates/epel-8.tpl') + +config_opts['root'] = 'rocky+epel-8-x86_64' +config_opts['description'] = 'Rocky Linux 8 + EPEL' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/rocky+epel-9-aarch64.cfg b/mock/rocky+epel-9-aarch64.cfg new file mode 100644 index 0000000..c5230a2 --- /dev/null +++ b/mock/rocky+epel-9-aarch64.cfg @@ -0,0 +1,5 @@ +include('rocky-9-aarch64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rocky+epel-9-{{ target_arch }}" +config_opts['description'] = 'Rocky Linux 9 + EPEL' diff --git a/mock/rocky+epel-9-ppc64le.cfg b/mock/rocky+epel-9-ppc64le.cfg new file mode 100644 index 0000000..18311ea --- /dev/null +++ b/mock/rocky+epel-9-ppc64le.cfg @@ -0,0 +1,5 @@ +include('rocky-9-ppc64le.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rocky+epel-9-{{ target_arch }}" +config_opts['description'] = 'Rocky Linux 9 + EPEL' diff --git a/mock/rocky+epel-9-s390x.cfg b/mock/rocky+epel-9-s390x.cfg new file mode 100644 index 0000000..2735f8a --- /dev/null +++ b/mock/rocky+epel-9-s390x.cfg @@ -0,0 +1,5 @@ +include('rocky-9-s390x.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rocky+epel-9-{{ target_arch }}" +config_opts['description'] = 'Rocky Linux 9 + EPEL' diff --git a/mock/rocky+epel-9-x86_64.cfg b/mock/rocky+epel-9-x86_64.cfg new file mode 100644 index 0000000..38e4c31 --- /dev/null +++ b/mock/rocky+epel-9-x86_64.cfg @@ -0,0 +1,5 @@ +include('rocky-9-x86_64.cfg') +include('templates/epel-9.tpl') + +config_opts['root'] = "rocky+epel-9-{{ target_arch }}" +config_opts['description'] = 'Rocky Linux 9 + EPEL' diff --git a/mock/rocky-8-aarch64.cfg b/mock/rocky-8-aarch64.cfg new file mode 100644 index 0000000..ffbd9f5 --- /dev/null +++ b/mock/rocky-8-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/rocky-8.tpl') + +config_opts['root'] = 'rocky-8-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/rocky-8-x86_64.cfg b/mock/rocky-8-x86_64.cfg new file mode 100644 index 0000000..a3a59fa --- /dev/null +++ b/mock/rocky-8-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/rocky-8.tpl') + +config_opts['root'] = 'rocky-8-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/rocky-9-aarch64.cfg b/mock/rocky-9-aarch64.cfg new file mode 100644 index 0000000..6e83c8f --- /dev/null +++ b/mock/rocky-9-aarch64.cfg @@ -0,0 +1,6 @@ +include('templates/rocky-9.tpl') + +config_opts['root'] = 'rocky-9-aarch64' +config_opts['description'] = 'Rocky Linux 9' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/rocky-9-ppc64le.cfg b/mock/rocky-9-ppc64le.cfg new file mode 100644 index 0000000..85da56b --- /dev/null +++ b/mock/rocky-9-ppc64le.cfg @@ -0,0 +1,6 @@ +include('templates/rocky-9.tpl') + +config_opts['root'] = 'rocky-9-ppc64le' +config_opts['description'] = 'Rocky Linux 9' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/rocky-9-s390x.cfg b/mock/rocky-9-s390x.cfg new file mode 100644 index 0000000..1f048cf --- /dev/null +++ b/mock/rocky-9-s390x.cfg @@ -0,0 +1,6 @@ +include('templates/rocky-9.tpl') + +config_opts['root'] = 'rocky-9-s390x' +config_opts['description'] = 'Rocky Linux 9' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/rocky-9-x86_64.cfg b/mock/rocky-9-x86_64.cfg new file mode 100644 index 0000000..cd76e78 --- /dev/null +++ b/mock/rocky-9-x86_64.cfg @@ -0,0 +1,6 @@ +include('templates/rocky-9.tpl') + +config_opts['root'] = 'rocky-9-x86_64' +config_opts['description'] = 'Rocky Linux 9' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/site-defaults.cfg b/mock/site-defaults.cfg new file mode 100644 index 0000000..8c2f58b --- /dev/null +++ b/mock/site-defaults.cfg @@ -0,0 +1,11 @@ +# mock site configuration +# ----------------------- +# +# Any configuration here has global effect - affects all mock users on this host +# and all the mock chroot configurations. User specific configuration can be +# installed to "$HOME/.config/mock.cfg". +# +# Config options are documented in /usr/share/doc/mock/site-defaults.cfg file. +# +# Entries in this file follow the same format as other mock config files: +# config_opts['foo'] = 'bar' diff --git a/mock/templates/almalinux-8.tpl b/mock/templates/almalinux-8.tpl new file mode 100644 index 0000000..cdaeb38 --- /dev/null +++ b/mock/templates/almalinux-8.tpl @@ -0,0 +1,151 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8.alma' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/almalinuxorg/almalinux:8' + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + + +[baseos] +name=AlmaLinux $releasever - BaseOS +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 +skip_if_unavailable=False + +[appstream] +name=AlmaLinux $releasever - AppStream +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[powertools] +name=AlmaLinux $releasever - PowerTools +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/powertools +# baseurl=https://repo.almalinux.org/almalinux/$releasever/PowerTools/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[extras] +name=AlmaLinux $releasever - Extras +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[devel] +name=AlmaLinux $releasever - Devel (WARNING: UNSUPPORTED - FOR BUILDROOT USE ONLY!) +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/$basearch/os/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[baseos-debuginfo] +name=AlmaLinux $releasever - BaseOS debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[appstream-debuginfo] +name=AlmaLinux $releasever - AppStream debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[powertools-debuginfo] +name=AlmaLinux $releasever - PowerTools debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/powertools-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/PowerTools/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[extras-debuginfo] +name=AlmaLinux $releasever - Extras debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[devel-debuginfo] +name=AlmaLinux $releasever - Devel debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[baseos-source] +name=AlmaLinux $releasever - BaseOS Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[appstream-source] +name=AlmaLinux $releasever - AppStream Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[powertools-source] +name=AlmaLinux $releasever - PowerTools Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/powertools-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/PowerTools/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[extras-source] +name=AlmaLinux $releasever - Extras Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +[devel-source] +name=AlmaLinux $releasever - Devel Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-8 + +""" diff --git a/mock/templates/almalinux-9.tpl b/mock/templates/almalinux-9.tpl new file mode 100644 index 0000000..1786515 --- /dev/null +++ b/mock/templates/almalinux-9.tpl @@ -0,0 +1,151 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils redhat-release findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' +config_opts['dist'] = 'el9.alma' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/almalinuxorg/almalinux:9' + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el9 +user_agent={{ user_agent }} + + +[baseos] +name=AlmaLinux $releasever - BaseOS +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 +skip_if_unavailable=False + +[appstream] +name=AlmaLinux $releasever - AppStream +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[crb] +name=AlmaLinux $releasever - CRB +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/crb +# baseurl=https://repo.almalinux.org/almalinux/$releasever/CRB/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[extras] +name=AlmaLinux $releasever - Extras +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[devel] +name=AlmaLinux $releasever - Devel (WARNING: UNSUPPORTED - FOR BUILDROOT USE ONLY!) +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/$basearch/os/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[baseos-debuginfo] +name=AlmaLinux $releasever - BaseOS debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[appstream-debuginfo] +name=AlmaLinux $releasever - AppStream debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[crb-debuginfo] +name=AlmaLinux $releasever - CRB debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/crb-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/CRB/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[extras-debuginfo] +name=AlmaLinux $releasever - Extras debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[devel-debuginfo] +name=AlmaLinux $releasever - Devel debuginfo +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel-debuginfo +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/debug/$basearch/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[baseos-source] +name=AlmaLinux $releasever - BaseOS Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/baseos-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/BaseOS/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[appstream-source] +name=AlmaLinux $releasever - AppStream Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/appstream-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/AppStream/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[crb-source] +name=AlmaLinux $releasever - CRB Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/crb-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/CRB/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[extras-source] +name=AlmaLinux $releasever - Extras Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/extras-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/extras/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +[devel-source] +name=AlmaLinux $releasever - Devel Source +mirrorlist=https://mirrors.almalinux.org/mirrorlist/$releasever/devel-source +# baseurl=https://repo.almalinux.org/almalinux/$releasever/devel/Source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/alma/RPM-GPG-KEY-AlmaLinux-9 + +""" diff --git a/mock/templates/amazonlinux-2.tpl b/mock/templates/amazonlinux-2.tpl new file mode 100644 index 0000000..e85d370 --- /dev/null +++ b/mock/templates/amazonlinux-2.tpl @@ -0,0 +1,27 @@ +config_opts['chroot_setup_cmd'] = 'install @buildsys-build yum' +config_opts['dist'] = 'amzn2' # only useful for --resultdir variable subst +config_opts['plugin_conf']['ccache_enable'] = False +config_opts['package_manager'] = 'yum' +config_opts['releasever'] = '2' +config_opts['description'] = 'Amazon Linux 2' + +config_opts['bootstrap_image'] = 'docker.io/library/amazonlinux:2' + +config_opts['yum.conf'] = """ +[main] +cachedir=/var/cache/yum +debuglevel=1 +logfile=/var/log/yum.log +reposdir=/dev/null +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 + +[amzn2] +name=AMZN2 +mirrorlist=http://amazonlinux.default.amazonaws.com/$releasever/core/latest/$basearch/mirror.list +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/amazon-linux/RPM-GPG-KEY-amazon-linux-2 +enabled=1 +""" diff --git a/mock/templates/amazonlinux-2023.tpl b/mock/templates/amazonlinux-2023.tpl new file mode 100644 index 0000000..73ae2e5 --- /dev/null +++ b/mock/templates/amazonlinux-2023.tpl @@ -0,0 +1,52 @@ +config_opts['root'] = 'amazonlinux-2023-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install system-release bash bzip2 coreutils cpio diffutils findutils gawk glibc-minimal-langpack grep gzip info patch rpm-build sed system-rpm-config tar unzip util-linux which xz' +config_opts['dist'] = 'amzn2023' # only useful for --resultdir variable subst +config_opts['plugin_conf']['ccache_enable'] = False +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'Amazon Linux 2023' +config_opts['releasever'] = '2023' + +config_opts['bootstrap_image'] = 'public.ecr.aws/amazonlinux/amazonlinux:2023' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +sysleg_device= +install_weak_deps=0 +user_agent={{ user_agent }} + +[amazonlinux] +name=Amazon Linux $releasever repository - $basearch +mirrorlist=https://cdn.amazonlinux.com/al${releasever}/core/mirrors/latest/$basearch/mirror.list +enabled=1 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/amazon-linux/RPM-GPG-KEY-amazon-linux-$releasever + +[amazonlinux-source] +name=Amazon Linux $releasever repository - Source packages +mirrorlist=https://cdn.amazonlinux.com/al${releasever}/core/mirrors/latest/SRPMS/mirror.list +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/amazon-linux/RPM-GPG-KEY-amazon-linux-$releasever + +[amazonlinux-debuginfo] +name=Amazon Linux $releasever repository - $basearch - Debug +mirrorlist=https://cdn.amazonlinux.com/al${releasever}/core/mirrors/latest/debuginfo/$basearch/mirror.list +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/amazon-linux/RPM-GPG-KEY-amazon-linux-$releasever +""" diff --git a/mock/templates/anolis-8.tpl b/mock/templates/anolis-8.tpl new file mode 100644 index 0000000..c58350d --- /dev/null +++ b/mock/templates/anolis-8.tpl @@ -0,0 +1,49 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config anolis-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'an8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'Anolis 8' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] + +config_opts['bootstrap_image'] = 'docker.io/openanolis/anolisos:8' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:an8 +user_agent={{ user_agent }} + +[BaseOS] +name=AnolisOS-$releasever - BaseOS +baseurl=http://mirrors.openanolis.cn/anolis/$releasever/BaseOS/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 + +[AppStream] +name=AnolisOS-$releasever - AppStream +baseurl=http://mirrors.openanolis.cn/anolis/$releasever/AppStream/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 + +[PowerTools] +name=AnolisOS-$releasever - PowerTools +baseurl=http://mirrors.openanolis.cn/anolis/$releasever/PowerTools/$basearch/os +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/anolis/RPM-GPG-KEY-ANOLIS +gpgcheck=1 +""" diff --git a/mock/templates/centos-stream-10.tpl b/mock/templates/centos-stream-10.tpl new file mode 100644 index 0000000..8db9253 --- /dev/null +++ b/mock/templates/centos-stream-10.tpl @@ -0,0 +1,125 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 centos-stream-release coreutils cpio diffutils findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed shadow-utils tar unzip util-linux which xz' +config_opts['dist'] = 'el10' # only useful for --resultdir variable subst +config_opts['releasever'] = '10' +config_opts['releasever_major'] = '10' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['description'] = 'CentOS Stream 10' + +config_opts['bootstrap_image'] = 'quay.io/centos/centos:stream10' +config_opts['bootstrap_image_ready'] = True + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +best=1 +install_weak_deps=0 +protected_packages= +skip_if_unavailable=False +module_platform_id=platform:el10 +user_agent={{ user_agent }} + +{% if koji_primary_repo != None and koji_primary_repo != "centos-stream" %} +[local-centos-stream] +{% else %} +[local] +{% endif %} +name=CentOS Stream $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojihub.stream.centos.org/kojifiles/repos/c{{ releasever }}s-build/latest/$basearch/ +cost=2000 +enabled=0 + +[baseos] +name=CentOS Stream $releasever - BaseOS +#baseurl=http://mirror.stream.centos.org/$releasever-stream/BaseOS/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-baseos-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +countme=1 +enabled=1 + +[appstream] +name=CentOS Stream $releasever - AppStream +#baseurl=http://mirror.stream.centos.org/$releasever-stream/AppStream/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-appstream-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +countme=1 +enabled=1 + +[crb] +name=CentOS Stream $releasever - CRB +#baseurl=http://mirror.stream.centos.org/$releasever-stream/CRB/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-crb-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +countme=1 +enabled=1 + +[extras-common] +name=CentOS Stream $releasever - Extras packages +#baseurl=http://mirror.stream.centos.org/SIGs/$releasever-stream/extras/$basearch/extras-common/ +metalink=https://mirrors.centos.org/metalink?repo=centos-extras-sig-extras-common-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-Extras-SHA512 +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[baseos-debuginfo] +name=CentOS Stream $releasever - BaseOS - Debug +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/BaseOS/$basearch/debug/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-baseos-debug-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 + +[baseos-source] +name=CentOS Stream $releasever - BaseOS - Source +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/BaseOS/source/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-baseos-source-$releasever-stream&arch=source&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 + +[appstream-debuginfo] +name=CentOS Stream $releasever - AppStream - Debug +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/AppStream/$basearch/debug/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-appstream-debug-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 + +[appstream-source] +name=CentOS Stream $releasever - AppStream - Source +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/AppStream/source/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-appstream-source-$releasever-stream&arch=source&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 + +[crb-debuginfo] +name=CentOS Stream $releasever - CRB - Debug +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/CRB/$basearch/debug/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-crb-debug-$releasever-stream&arch=$basearch&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 + +[crb-source] +name=CentOS Stream $releasever - CRB - Source +#baseurl=https://composes.stream.centos.org/stream-10/production/latest-CentOS-Stream/compose/CRB/source/tree/ +metalink=https://mirrors.centos.org/metalink?repo=centos-crb-source-$releasever-stream&arch=source&protocol=https,http +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official-SHA256 +gpgcheck=1 +enabled=0 +""" diff --git a/mock/templates/centos-stream-8.tpl b/mock/templates/centos-stream-8.tpl new file mode 100644 index 0000000..3e92234 --- /dev/null +++ b/mock/templates/centos-stream-8.tpl @@ -0,0 +1,158 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/centos/centos:stream8' +config_opts['dnf_vars'] = { 'stream': '8-stream', + 'contentdir': 'centos', + } + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + +{% if koji_primary_repo != None and koji_primary_repo != "centos-stream" %} +[local-centos-stream] +{% else %} +[local] +{% endif %} +name=CentOS Stream $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojihub.stream.centos.org/kojifiles/repos/c{{ releasever }}s-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[baseos] +name=CentOS Stream $releasever - BaseOS +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=BaseOS&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/BaseOS/$basearch/os/ +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +skip_if_unavailable=False + +[appstream] +name=CentOS Stream $releasever - AppStream +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=AppStream&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[debuginfo] +name=CentOS Stream $releasever - Debuginfo +baseurl=http://debuginfo.centos.org/$releasever-stream/$basearch/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-centosplus] +name=CentOS-Stream - Plus +baseurl=https://vault.centos.org/centos/$releasever-stream/centosplus/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[cr] +name=CentOS-$releasever - cr +baseurl=https://vault.centos.org/centos/$releasever/cr/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-base-debuginfo] +name=CentOS-Stream - Debuginfo +baseurl=http://debuginfo.centos.org/$releasever-stream/$basearch/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[extras] +name=CentOS Stream $releasever - Extras +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=extras&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[powertools] +name=CentOS Stream $releasever - PowerTools +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=PowerTools&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/PowerTools/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[rt] +name=CentOS Stream $releasever - RealTime +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=RT&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/RT/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[ha] +name=CentOS Stream $releasever - HighAvailability +#mirrorlist=http://mirrorlist.centos.org/?release=$releasever-stream&arch=$basearch&repo=HighAvailability&infra=$infra +baseurl=https://vault.centos.org/centos/$releasever-stream/HighAvailability/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-Devel] +name=CentOS-Stream - Devel (WARNING: UNSUPPORTED - FOR BUILDROOT USE ONLY!) +baseurl=https://vault.centos.org/centos/$releasever-stream/Devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-BaseOS-source] +name=CentOS-Stream - BaseOS Sources +baseurl=https://vault.centos.org/centos/$releasever-stream/BaseOS/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-AppStream-source] +name=CentOS-Stream - AppStream Sources +baseurl=https://vault.centos.org/centos/$releasever-stream/AppStream/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-PowerTools-source] +name=CentOS-Stream - PowerTools Sources +baseurl=https://vault.centos.org/centos/$releasever-stream/PowerTools/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-extras-source] +name=CentOS-Stream - Extras Sources +baseurl=https://vault.centos.org/centos/$releasever-stream/extras/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official + +[Stream-centosplus-source] +name=CentOS-Stream - Plus Sources +baseurl=https://vault.centos.org/centos/$releasever-stream/centosplus/Source/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +""" diff --git a/mock/templates/centos-stream-9.tpl b/mock/templates/centos-stream-9.tpl new file mode 100644 index 0000000..75b9204 --- /dev/null +++ b/mock/templates/centos-stream-9.tpl @@ -0,0 +1,108 @@ +config_opts['chroot_setup_cmd'] = 'install tar redhat-rpm-config redhat-release which xz sed make bzip2 gzip coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep glibc-minimal-langpack' +config_opts['dist'] = 'el9' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['description'] = 'CentOS Stream 9' + +config_opts['bootstrap_image'] = 'quay.io/centos/centos:stream9' +config_opts['bootstrap_image_ready'] = True + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el9 +user_agent={{ user_agent }} + +{% if koji_primary_repo != None and koji_primary_repo != "centos-stream" %} +[local-centos-stream] +{% else %} +[local] +{% endif %} +name=CentOS Stream $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojihub.stream.centos.org/kojifiles/repos/c{{ releasever }}s-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +[baseos] +name=CentOS Stream $releasever - BaseOS +#baseurl=http://mirror.stream.centos.org/$releasever-stream/BaseOS/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-baseos-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[appstream] +name=CentOS Stream $releasever - AppStream +#baseurl=http://mirror.stream.centos.org/$releasever-stream/AppStream/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-appstream-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[crb] +name=CentOS Stream $releasever - CRB +#baseurl=http://mirror.stream.centos.org/$releasever-stream/CRB/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-crb-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[highavailability] +name=CentOS Stream $releasever - HighAvailability +#baseurl=http://mirror.stream.centos.org/$releasever-stream/HighAvailability/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-highavailability-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=0 + +[nfv] +name=CentOS Stream $releasever - NFV +#baseurl=http://mirror.stream.centos.org/$releasever-stream/NFV/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-nfv-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=0 + +[rt] +name=CentOS Stream $releasever - RT +#baseurl=http://mirror.stream.centos.org/$releasever-stream/RT/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-rt-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=0 + +[resilientstorage] +name=CentOS Stream $releasever - ResilientStorage +#baseurl=http://mirror.stream.centos.org/$releasever-stream/ResilientStorage/$basearch/os/ +metalink=https://mirrors.centos.org/metalink?repo=centos-resilientstorage-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-Official +gpgcheck=1 +enabled=0 + +[extras-common] +name=CentOS Stream $releasever - Extras packages +#baseurl=http://mirror.stream.centos.org/SIGs/$releasever-stream/extras/$basearch/extras-common/ +metalink=https://mirrors.centos.org/metalink?repo=centos-extras-sig-extras-common-$releasever-stream&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/centos/RPM-GPG-KEY-CentOS-SIG-Extras-SHA512 +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +""" diff --git a/mock/templates/circlelinux-8.tpl b/mock/templates/circlelinux-8.tpl new file mode 100644 index 0000000..bf8cf68 --- /dev/null +++ b/mock/templates/circlelinux-8.tpl @@ -0,0 +1,152 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'docker.io/circlelinuxos/circlelinux:8' +# Relates: https://github.com/rpm-software-management/mock/issues/1170 +config_opts['use_bootstrap_image'] = False + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + + +[baseos] +name=Circle Linux $releasever - BaseOS +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=BaseOS +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream] +name=Circle Linux $releasever - AppStream +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=AppStream +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[powertools] +name=Circle Linux $releasever - PowerTools +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=PowerTools +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/PowerTools/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras] +name=Circle Linux $releasever - Extras +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=extras +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[devel] +name=Circle Linux $releasever - Devel WARNING! FOR BUILDROOT USE ONLY! +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=Devel-$releasever +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/Devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[baseos-debug] +name=Circle Linux $releasever - BaseOS Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=BaseOS-debug +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/BaseOS/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream-debug] +name=Circle Linux $releasever - AppStream Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=AppStream-debug +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/AppStream/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[powertools-debug] +name=Circle Linux $releasever - PowerTools Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=PowerTools-debug +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/PowerTools/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras-debug] +name=Circle Linux $releasever - Extras Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=extras-debug +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/extras/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[devel-debug] +name=Circle Linux $releasever - Devel Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=Devel-$releasever +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/Devel/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[baseos-source] +name=Circle Linux $releasever - BaseOS Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=BaseOS +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/BaseOS/source/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream-source] +name=Circle Linux $releasever - AppStream Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=AppStream +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/AppStream/source/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras-source] +name=Circle Linux $releasever - Extras Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=extras +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/extras/source/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[powertools-source] +name=Circle Linux $releasever - PowerTools Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=PowerTools +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/PowerTools/source/tree/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[devel-source] +name=Circle Linux $releasever - Devel Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=Devel-$releasever +#baseurl=https://mirror.cclinux.org/$contentdir/$releasever/Devel/source/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +""" diff --git a/mock/templates/circlelinux-9.tpl b/mock/templates/circlelinux-9.tpl new file mode 100644 index 0000000..6143e62 --- /dev/null +++ b/mock/templates/circlelinux-9.tpl @@ -0,0 +1,251 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils redhat-release findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' +config_opts['dist'] = 'el9' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/cclinux/circlelinux:9' + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el9 +user_agent={{ user_agent }} + + +[baseos] +name=Circle Linux $releasever - BaseOS +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream] +name=Circle Linux $releasever - AppStream +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[crb] +name=Circle Linux $releasever - CRB +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/CRB/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras] +name=Circle Linux $releasever - Extras +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[devel] +name=Circle Linux $releasever - Devel WARNING! FOR BUILDROOT USE ONLY! +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=devel-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[highavailability] +name=Circle Linux $releasever - High Availability +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/HighAvailability/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[resilientstorage] +name=Circle Linux $releasever - Resilient Storage +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/ResilientStorage/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[nfv] +name=Circle Linux $releasever - NFV +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=NFV-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/NFV/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[rt] +name=Circle Linux $releasever - Realtime +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/RT/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[baseos-debug] +name=Circle Linux $releasever - BaseOS - Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/BaseOS/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[baseos-source] +name=Circle Linux $releasever - BaseOS - Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=BaseOS-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/BaseOS/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream-debug] +name=Circle Linux $releasever - AppStream - Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/AppStream/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[appstream-source] +name=Circle Linux $releasever - AppStream - Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=AppStream-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/AppStream/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[crb-debug] +name=Circle Linux $releasever - CRB - Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/CRB/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[crb-source] +name=Circle Linux $releasever - CRB - Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=CRB-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/CRB/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras-debug] +name=Circle Linux $releasever - Extras Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/extras/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[extras-source] +name=Circle Linux $releasever - Extras Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/extras/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[highavailability-debug] +name=Circle Linux $releasever - High Availability - Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/HighAvailability/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[highavailability-source] +name=Circle Linux $releasever - High Availability - Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=HighAvailability-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/HighAvailability/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[resilientstorage-debug] +name=Circle Linux $releasever - Resilient Storage - Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/ResilientStorage/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[resilientstorage-source] +name=Circle Linux $releasever - Resilient Storage - Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=source&repo=ResilientStorage-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/ResilientStorage/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[nfv-debug] +name=Circle Linux $releasever - NFV Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=NFV-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/NFV/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[nfv-source] +name=Circle Linux $releasever - NFV Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=NFV-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/NFV/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[rt-debug] +name=Circle Linux $releasever - Realtime Debug +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-debug +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/RT/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + +[rt-source] +name=Circle Linux $releasever - Realtime Source +mirrorlist=https://mirrorlist.cclinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-source +#baseurl=http://mirror.cclinux.org/$contentdir/$releasever/RT/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/circle/RPM-GPG-KEY-circleofficial + + +""" diff --git a/mock/templates/custom-1.tpl b/mock/templates/custom-1.tpl new file mode 100644 index 0000000..bf6bc04 --- /dev/null +++ b/mock/templates/custom-1.tpl @@ -0,0 +1,28 @@ +config_opts['chroot_setup_cmd'] = '' +config_opts['chroot_additional_packages'] = '' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'Custom (no repository)' +# DNF may not be available in this chroot +config_opts['use_bootstrap'] = False + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/dnf.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +""" diff --git a/mock/templates/epel-10.tpl b/mock/templates/epel-10.tpl new file mode 100644 index 0000000..698bb81 --- /dev/null +++ b/mock/templates/epel-10.tpl @@ -0,0 +1,40 @@ +config_opts['chroot_setup_cmd'] += " epel-rpm-macros" + +config_opts['dnf.conf'] += """ + +# The metalinks below differ from the ones used in epel-release. The +# epel-release metalinks rely on a dnf variable expansion feature that is only +# available since dnf 4.18.0. In some configurations mock will be using the +# host dnf to bootstrap the chroot, which could be older and lack those +# features, leading to problems. The alternative is to use this simplified +# metalink here in this template for CentOS Stream, and a different metalink in +# another template for RHEL. + +[epel] +name=Extra Packages for Enterprise Linux $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-{{ releasever_major }}&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-{{ releasever_major }} +gpgcheck=1 +countme=1 + +[epel-testing] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-epel{{ releasever_major }}&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-{{ releasever_major }} +gpgcheck=1 +countme=1 +enabled=0 + +{% if koji_primary_repo == "epel" %} + +# The baseurl below is a symlink in the koji infrastructure that moves forward +# over time to the buildroot repo of the latest minor verison tag. + +[local] +name=Extra Packages for Enterprise Linux $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojipkgs.fedoraproject.org/repos/epel{{ releasever_major }}/centos/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/templates/epel-8.tpl b/mock/templates/epel-8.tpl new file mode 100644 index 0000000..bc772da --- /dev/null +++ b/mock/templates/epel-8.tpl @@ -0,0 +1,84 @@ +config_opts['chroot_setup_cmd'] += " epel-rpm-macros" + +config_opts['dnf.conf'] += """ + +[epel] +name=Extra Packages for Enterprise Linux $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-$releasever&arch=$basearch +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-debug-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-source] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-source-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-debug-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing-source] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-source-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-modular] +name=Extra Packages for Enterprise Linux Modular $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-modular-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-modular-debuginfo] +name=Extra Packages for Enterprise Linux Modular $releasever - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-modular-debug-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-modular-source] +name=Extra Packages for Enterprise Linux Modular $releasever - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-modular-source-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +{% if koji_primary_repo == "epel" %} +[local] +name=Extra Packages for Enterprise Linux $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojipkgs.fedoraproject.org/repos/epel$releasever-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/templates/epel-9.tpl b/mock/templates/epel-9.tpl new file mode 100644 index 0000000..d4e45ee --- /dev/null +++ b/mock/templates/epel-9.tpl @@ -0,0 +1,60 @@ +config_opts['chroot_setup_cmd'] += " epel-rpm-macros" + +config_opts['dnf.conf'] += """ + +[epel] +name=Extra Packages for Enterprise Linux $releasever - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-$releasever&arch=$basearch +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-debug-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-source] +name=Extra Packages for Enterprise Linux $releasever - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-source-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-debug-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-testing-source] +name=Extra Packages for Enterprise Linux $releasever - Testing - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-source-epel$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +{% if koji_primary_repo == "epel" %} +[local] +name=Extra Packages for Enterprise Linux $releasever - Koji Local - BUILDROOT ONLY! +baseurl=https://kojipkgs.fedoraproject.org/repos/epel$releasever-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/templates/epel-next-8.tpl b/mock/templates/epel-next-8.tpl new file mode 100644 index 0000000..ec20f58 --- /dev/null +++ b/mock/templates/epel-next-8.tpl @@ -0,0 +1,57 @@ +config_opts['dnf.conf'] += """ + +[epel-next] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-$releasever&arch=$basearch +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +skip_if_unavailable=False + +[epel-next-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-debug-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +skip_if_unavailable=False + +[epel-next-source] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-source-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +skip_if_unavailable=False + +[epel-next-testing] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +skip_if_unavailable=False + +[epel-next-testing-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-debug-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +skip_if_unavailable=False + +[epel-next-testing-source] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-source-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-8 +gpgcheck=1 +skip_if_unavailable=False + +[local] +name=Extra Packages for Enterprise Linux $releasever - Next - Koji Local - BUILDROOT ONLY! +baseurl=https://kojipkgs.fedoraproject.org/repos/epel8-next-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/epel-next-9.tpl b/mock/templates/epel-next-9.tpl new file mode 100644 index 0000000..4aaee39 --- /dev/null +++ b/mock/templates/epel-next-9.tpl @@ -0,0 +1,57 @@ +config_opts['dnf.conf'] += """ + +[epel-next] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-$releasever&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-next-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-debug-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-next-source] +name=Extra Packages for Enterprise Linux $releasever - Next - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-source-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-next-testing] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-next-testing-debuginfo] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-debug-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[epel-next-testing-source] +name=Extra Packages for Enterprise Linux $releasever - Next - Testing - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-source-$releasever&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/epel/RPM-GPG-KEY-EPEL-$releasever +skip_if_unavailable=False + +[local] +name=Extra Packages for Enterprise Linux $releasever - Next - Koji Local - BUILDROOT ONLY! +baseurl=https://kojipkgs.fedoraproject.org/repos/epel$releasever-next-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/eurolinux-8.tpl b/mock/templates/eurolinux-8.tpl new file mode 100644 index 0000000..f32d77b --- /dev/null +++ b/mock/templates/eurolinux-8.tpl @@ -0,0 +1,68 @@ +# EuroLinux open buildroots +# Note: perl modules are broken by design + +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['description'] = 'EuroLinux 8' +config_opts['bootstrap_image'] = 'docker.io/eurolinux/eurolinux-8' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=0 +protected_packages= +module_platform_id=platform:el8 + + +[baseos-all] +name=EuroLinux 8 BaseOS All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/8/$basearch/certify-BaseOS/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux8 + +[appstream-all] +name=EuroLinux 8 AppStream All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/8/$basearch/certify-AppStream/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux8 + +[powertools-all] +name=EuroLinux 8 PowerTools All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/8/$basearch/certify-PowerTools/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux8 + +# There is no HA and RS for i686 or aarch64 +{% if target_arch == 'x86_64' %} +[ha-all] +name=EuroLinux 8 HighAvailability All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/8/$basearch/certify-HighAvailability/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux8 + +[rs-all] +name=EuroLinux 8 PowerTools All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/8/$basearch/certify-ResilientStorage/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux8 +{% endif %} +""" diff --git a/mock/templates/eurolinux-9.tpl b/mock/templates/eurolinux-9.tpl new file mode 100644 index 0000000..3532773 --- /dev/null +++ b/mock/templates/eurolinux-9.tpl @@ -0,0 +1,67 @@ +# EuroLinux open buildroots + +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el9' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['description'] = 'EuroLinux 9' +config_opts['bootstrap_image'] = 'docker.io/eurolinux/eurolinux-9' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=0 +protected_packages= +module_platform_id=platform:el9 + + +[baseos-all] +name=EuroLinux 9 BaseOS All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/9/$basearch/BaseOS/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux9 + +[appstream-all] +name=EuroLinux 9 AppStream All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/9/$basearch/AppStream/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux9 + +[crb-all] +name=EuroLinux 9 CodeReady Linux Builder All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/9/$basearch/CRB/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux9 + +# There is no HA and RS for i686 or aarch64 +{% if target_arch == 'x86_64' %} +[ha-all] +name=EuroLinux 9 HighAvailability All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/9/$basearch/HighAvailability/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux9 + +[rs-all] +name=EuroLinux 9 PowerTools All +baseurl=https://fbi.cdn.euro-linux.com/dist/eurolinux/server/9/$basearch/ResilientStorage/all/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/eurolinux/RPM-GPG-KEY-eurolinux9 +{% endif %} +""" diff --git a/mock/templates/fedora-branched.tpl b/mock/templates/fedora-branched.tpl new file mode 100644 index 0000000..5b22db0 --- /dev/null +++ b/mock/templates/fedora-branched.tpl @@ -0,0 +1,110 @@ +config_opts['root'] = 'fedora-{{ releasever }}-{{ target_arch }}' + +config_opts['description'] = 'Fedora {{ releasever }}' +# fedora 31+ isn't mirrored, we need to run from koji +config_opts['mirrored'] = config_opts['target_arch'] != 'i686' + +config_opts['chroot_setup_cmd'] = 'install @{% if mirrored %}buildsys-{% endif %}build' + +config_opts['dist'] = 'fc{{ releasever }}' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] + +# https://fedoraproject.org/wiki/Changes/BuildWithDNF5 for Fedora 40+ +config_opts['package_manager'] = '{% if releasever|int >= 40 %}dnf5{% else %}dnf{% endif %}' + +config_opts['bootstrap_image'] = 'registry.fedoraproject.org/fedora:{{ releasever }}' +config_opts['bootstrap_image_ready'] = int(config_opts['releasever']) >= 41 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +system_cachedir=/var/cache/dnf +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +module_platform_id=platform:f{{ releasever }} +protected_packages= +user_agent={{ user_agent }} + +# repos + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/f{{ releasever }}-build/latest/$basearch/ +cost=2000 +enabled={{ not mirrored }} +skip_if_unavailable=False + +{% if mirrored %} +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates] +name=updates +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing] +name=updates-testing +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[fedora-debuginfo] +name=fedora-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-debug-$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-debuginfo] +name=updates-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-debug-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[updates-testing-debuginfo] +name=updates-testing-debuginfo +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-testing-debug-f$releasever&arch=$basearch +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=fedora-source-$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False + +[updates-source] +name=updates-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=updates-released-source-f$releasever&arch=$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ releasever }}-primary +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/templates/fedora-eln.tpl b/mock/templates/fedora-eln.tpl new file mode 100644 index 0000000..5a16ab0 --- /dev/null +++ b/mock/templates/fedora-eln.tpl @@ -0,0 +1,392 @@ +config_opts['releasever'] = 'eln' +config_opts['eln_rawhide_releasever'] = '42' + +config_opts['root'] = 'fedora-eln-{{ target_arch }}' + +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils fedora-release-eln findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' + +config_opts['dist'] = 'eln' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] + +# https://fedoraproject.org/wiki/Changes/BuildWithDNF5 +# https://pagure.io/releng/issue/11895 +config_opts['package_manager'] = 'dnf5' + +# Per https://github.com/fedora-eln/eln/issues/164 updated up to 4 times a day. +# Docs: https://docs.fedoraproject.org/en-US/eln/deliverables/#_container_image +config_opts['bootstrap_image'] = 'quay.io/fedora/eln:latest' + +# https://fedoraproject.org/wiki/Changes/ReplaceDnfWithDnf5 applied to ELN! +config_opts['bootstrap_image_ready'] = True + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +system_cachedir=/var/cache/dnf +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +user_agent={{ user_agent }} + +# TODO +module_platform_id=platform:eln +protected_packages= + +{%- macro rawhide_gpg_keys() -%} +file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-rawhide-primary +{%- for version in [eln_rawhide_releasever|int, eln_rawhide_releasever|int - 1, eln_rawhide_releasever|int - 2] +%} file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ version }}-primary +{%- endfor %} +{%- endmacro %} + +[eln-baseos] +name=Fedora - ELN BaseOS - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/BaseOS/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-baseos-1&arch=$basearch +enabled=1 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-baseos-debuginfo] +name=Fedora - ELN BaseOS - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/BaseOS/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-baseos-debug-1&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-baseos-source] +name=Fedora - ELN BaseOS - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/BaseOS/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-baseos-source-1&arch=source +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + + +[eln-appstream] +name=Fedora - ELN AppStream - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/AppStream/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-appstream-1&arch=$basearch +enabled=1 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-appstream-debuginfo] +name=Fedora - ELN AppStream - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/AppStream/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-appstream-debug-1&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-appstream-source] +name=Fedora - ELN AppStream - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/AppStream/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-appstream-source-1&arch=source +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + + +[eln-crb] +name=Fedora - ELN CodeReady Linux Builders - Build packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/CRB/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-crb-1&arch=$basearch +enabled=1 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-crb-debuginfo] +name=Fedora - ELN CodeReady Linux Builders - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/CRB/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-crb-debug-1&arch=$basearch +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + +[eln-crb-source] +name=Fedora - ELN CodeReady Linux Builders - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/CRB/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-crb-source-1&arch=source +enabled=0 +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey={{ rawhide_gpg_keys() }} +skip_if_unavailable=False + + + +[eln-extras] +name=Fedora - ELN Extras - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/Extras/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-extras-1&arch=$basearch +enabled=1 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-extras-debuginfo] +name=Fedora - ELN Extras - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/Extras/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-extras-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-extras-source] +name=Fedora - ELN Extras - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/Extras/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-extras-source-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + + + +[eln-ha] +name=Fedora - ELN HighAvailability - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/HighAvailability/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-highavailability-1&arch=$basearch +enabled=0 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-ha-debuginfo] +name=Fedora - ELN HighAvailability - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/HighAvailability/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-highavailability-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-ha-source] +name=Fedora - ELN HighAvailability - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/HighAvailability/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-highavailability-source-1&arch=source +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + + + +[eln-rt] +name=Fedora - ELN RT - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/RT/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-rt-1&arch=$basearch +enabled=0 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-rt-debuginfo] +name=Fedora - ELN RT - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/RT/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-rt-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-rt-source] +name=Fedora - ELN RT - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/RT/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-rt-source-1&arch=source +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + + + +[eln-nfv] +name=Fedora - ELN NFV - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/NFV/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-nfv-1&arch=$basearch +enabled=0 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-nfv-debuginfo] +name=Fedora - ELN NFV - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/NFV/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-nfv-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-nfv-source] +name=Fedora - ELN NFV - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/NFV/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-nfv-source-1&arch=source +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + + + +[eln-sap] +name=Fedora - ELN SAP - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAP/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-sap-1&arch=$basearch +enabled=0 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-sap-debuginfo] +name=Fedora - ELN SAP - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAP/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-sap-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-sap-source] +name=Fedora - ELN SAP - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAP/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-sap-source-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + + + +[eln-saphana] +name=Fedora - ELN SAPHANA - Developmental packages for the next Enterprise Linux release +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAPHANA/$basearch/os/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-saphana-1&arch=$basearch +enabled=0 +countme=1 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-saphana-debuginfo] +name=Fedora - ELN SAPHANA - Debug +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAPHANA/$basearch/debug/tree +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-saphana-debug-1&arch=$basearch +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[eln-saphana-source] +name=Fedora - ELN SAPHANA - Source +#baseurl=https://dl.fedoraproject.org/pub/eln/1/SAPHANA/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=eln-saphana-source-1&arch=source +enabled=0 +metadata_expire=6h +repo_gpgcheck=0 +type=rpm +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-eln-$basearch +skip_if_unavailable=False + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/eln-build/latest/$basearch/ +cost=2000 +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/fedora-rawhide.tpl b/mock/templates/fedora-rawhide.tpl new file mode 100644 index 0000000..158997c --- /dev/null +++ b/mock/templates/fedora-rawhide.tpl @@ -0,0 +1,87 @@ +config_opts['root'] = 'fedora-rawhide-{{ target_arch }}' + +# fedora 31+ isn't mirrored, we need to run from koji +config_opts['mirrored'] = config_opts['target_arch'] != 'i686' + +config_opts['chroot_setup_cmd'] = 'install @{% if mirrored %}buildsys-{% endif %}build' + +config_opts['dist'] = 'rawhide' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '42' + +# https://fedoraproject.org/wiki/Changes/BuildWithDNF5 +config_opts['package_manager'] = 'dnf5' + +config_opts['bootstrap_image'] = 'registry.fedoraproject.org/fedora:rawhide' +config_opts['bootstrap_image_ready'] = True + +config_opts['description'] = 'Fedora Rawhide' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +system_cachedir=/var/cache/dnf +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +module_platform_id=platform:f{{ releasever }} +protected_packages= +user_agent={{ user_agent }} + +{%- macro rawhide_gpg_keys() -%} +file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-$releasever-primary +{%- for version in [releasever|int, releasever|int - 1, releasever|int + 1] +%} file:///usr/share/distribution-gpg-keys/fedora/RPM-GPG-KEY-fedora-{{ version }}-primary +{%- endfor %} +{%- endmacro %} + +# repos + +[local] +name=local +baseurl=https://kojipkgs.fedoraproject.org/repos/rawhide/latest/$basearch/ +cost=2000 +enabled={{ not mirrored }} +skip_if_unavailable=False + +[local-source] +name=local-source +baseurl=https://kojipkgs.fedoraproject.org/repos/rawhide/latest/src/ +cost=2000 +enabled=0 +skip_if_unavailable=False + +{% if mirrored %} +[fedora] +name=fedora +metalink=https://mirrors.fedoraproject.org/metalink?repo=rawhide&arch=$basearch +gpgkey={{ rawhide_gpg_keys() }} +gpgcheck=1 +skip_if_unavailable=False + +[fedora-debuginfo] +name=Fedora Rawhide - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=rawhide-debug&arch=$basearch +enabled=0 +gpgkey={{ rawhide_gpg_keys() }} +gpgcheck=1 +skip_if_unavailable=False + +[fedora-source] +name=fedora-source +metalink=https://mirrors.fedoraproject.org/metalink?repo=rawhide-source&arch=$basearch +gpgkey={{ rawhide_gpg_keys() }} +gpgcheck=1 +enabled=0 +skip_if_unavailable=False +{% endif %} +""" diff --git a/mock/templates/mageia-branched.tpl b/mock/templates/mageia-branched.tpl new file mode 100644 index 0000000..9c6e06e --- /dev/null +++ b/mock/templates/mageia-branched.tpl @@ -0,0 +1,74 @@ +config_opts['root'] = 'mageia-{{ releasever }}-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal-core rpm-build rpm-mageia-setup rpm-mageia-setup-build' +config_opts['dist'] = 'mga{{ releasever }}' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['macros']['%distro_section'] = 'core' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'docker.io/library/mageia:{{ releasever }}' +config_opts['use_bootstrap_image'] = False +config_opts['description'] = 'Mageia {{ releasever }}' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[mageia] +name=Mageia $releasever - {{ repo_arch }} +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ repo_arch }}/media/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ repo_arch }}@§ion=core&repo=release +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ repo_arch }}§ion=core&repo=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[updates] +name=Mageia $releasever - {{ repo_arch }} - Updates +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ repo_arch }}/media/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ repo_arch }}@§ion=core&repo=updates +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ repo_arch }}§ion=core&repo=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[mageia-debuginfo] +name=Mageia $releasever - {{ repo_arch }} - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ repo_arch }}/media/debug/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ repo_arch }}@§ion=core&repo=release&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ repo_arch }}§ion=core&repo=release&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False + +[updates-debuginfo] +name=Mageia $releasever - {{ repo_arch }} - Updates - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/$releasever/{{ repo_arch }}/media/debug/core/updates/ +#metalink=https://mirrors.mageia.org/metalink?distrib=mageia-$releasever&arch={{ repo_arch }}@§ion=core&repo=updates&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=$releasever&arch={{ repo_arch }}§ion=core&repo=updates&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/mageia-cauldron.tpl b/mock/templates/mageia-cauldron.tpl new file mode 100644 index 0000000..98109a1 --- /dev/null +++ b/mock/templates/mageia-cauldron.tpl @@ -0,0 +1,53 @@ +config_opts['root'] = 'mageia-cauldron-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal-core rpm-build rpm-mageia-setup rpm-mageia-setup-build' +config_opts['dist'] = 'cauldron' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '10' +config_opts['macros']['%distro_section'] = 'core' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'docker.io/library/mageia:cauldron' +config_opts['use_bootstrap_image'] = False +config_opts['description'] = 'Mageia Cauldron' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[mageia-cauldron] +name=Mageia Cauldron - {{ repo_arch }} +#baseurl=http://mirrors.kernel.org/mageia/distrib/cauldron/{{ repo_arch }}/media/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=cauldron&arch={{ repo_arch }}@§ion=core&repo=release +mirrorlist=https://www.mageia.org/mirrorlist/?release=cauldron&arch={{ repo_arch }}§ion=core&repo=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=1 +skip_if_unavailable=False + +[mageia-cauldron-debuginfo] +name=Mageia Cauldron - {{ repo_arch }} - Debug +#baseurl=http://mirrors.kernel.org/mageia/distrib/cauldron/{{ repo_arch }}/media/debug/core/release/ +#metalink=https://mirrors.mageia.org/metalink?distrib=cauldron&arch={{ repo_arch }}@§ion=core&repo=release&debug=true +mirrorlist=https://www.mageia.org/mirrorlist/?release=cauldron&arch={{ repo_arch }}§ion=core&repo=release&debug=1 +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/mageia/RPM-GPG-KEY-Mageia +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/navy-8.tpl b/mock/templates/navy-8.tpl new file mode 100644 index 0000000..02ad864 --- /dev/null +++ b/mock/templates/navy-8.tpl @@ -0,0 +1,86 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config system-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['description'] = 'Navy Linux {{ releasever }}' +# FIXME: this might soon stop working because the image is 8.4, see +# https://github.com/rpm-software-management/mock/issues/1171 +config_opts['bootstrap_image'] = 'docker.io/navylinux/navylinux:latest' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/dnf.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +mdpolicy=group:primary +best=1 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + +[nl-base] +name=Navy Linux Enterprise OS Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/os/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-every] +name=Navy Linux Enterprise Every Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/everything/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-powertools] +name=Navy Linux Enterprise Power Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/powertools/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-kernel] +name=Navy Linux Enterprise Kernel Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/kernel/ +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-extra] +name=Navy Linux Enterprise Extra Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/extra/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-devel] +name=Navy Linux Devel Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/devel/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-debug] +name=Navy Linux Debug Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/debug/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +[nl-source] +name=Navy Linux Source Repository - el$releasever +baseurl=https://cdn.navylinux.org/navylinux/releases/$releasever/$basearch/source/ +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/navy/RPM-GPG-KEY-navy-linux-official + +""" + diff --git a/mock/templates/openeuler-20.03.tpl b/mock/templates/openeuler-20.03.tpl new file mode 100644 index 0000000..df0d532 --- /dev/null +++ b/mock/templates/openeuler-20.03.tpl @@ -0,0 +1,70 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ openEuler-rpm-config openEuler-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'oe2003' # only useful for --resultdir variable subst +config_opts['releasever'] = '20.03LTS_SP3' +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'openEuler 20.03 LTS SP3' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'docker.io/openeuler/openeuler:20.03-lts' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:oe2003 +user_agent={{ user_agent }} + +[OS] +name=OS +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/OS&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler + +[everything] +name=everything +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/everything&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler + +[EPOL] +name=EPOL +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/EPOL/main&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler + +[debuginfo] +name=debuginfo +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/debuginfo&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler + +[source] +name=source +metalink=https://mirrors.openeuler.org/metalink?path=openeuler/$releasever/source/repodata/repomd.xml +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler + +[update] +name=update +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/update&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler +""" diff --git a/mock/templates/openeuler-22.03.tpl b/mock/templates/openeuler-22.03.tpl new file mode 100644 index 0000000..607834a --- /dev/null +++ b/mock/templates/openeuler-22.03.tpl @@ -0,0 +1,80 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ openEuler-rpm-config openEuler-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'oe2203' # only useful for --resultdir variable subst +config_opts['releasever'] = '22.03LTS_SP1' +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'openEuler 22.03 LTS SP1' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'docker.io/openeuler/openeuler:22.03-lts' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:oe2203 +user_agent={{ user_agent }} + +# all openEuler LTS release will continue developing and releasing SPx version +# such as 22.03-LTS -> 22.03-LTS-SP1 -> 22.03-LTS-SP2 ... +# all LTS-SPx is compatible with its LTS release +[OS] +name=OS +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/OS&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[everything] +name=everything +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/everything&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[EPOL] +name=EPOL +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/EPOL/main&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[debuginfo] +name=debuginfo +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/debuginfo&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[source] +name=source +metalink=https://mirrors.openeuler.org/metalink?path=openeuler/$releasever/source/repodata/repomd.xml +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[update] +name=update +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/update&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[update-source] +name=update-source +metalink=https://mirrors.openeuler.org/metalink?path=openeuler/$releasever/update/source/repodata/repomd.xml +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker +""" diff --git a/mock/templates/openeuler-24.03.tpl b/mock/templates/openeuler-24.03.tpl new file mode 100644 index 0000000..9aabe05 --- /dev/null +++ b/mock/templates/openeuler-24.03.tpl @@ -0,0 +1,80 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ openEuler-rpm-config openEuler-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'oe2403' # only useful for --resultdir variable subst +config_opts['releasever'] = '24.03LTS' +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'openEuler 24.03 LTS' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'docker.io/openeuler/openeuler:24.03-lts' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:oe2403 +user_agent={{ user_agent }} + +# all openEuler LTS release will continue developing and releasing SPx version +# such as 24.03-LTS -> 24.03-LTS-SP1 -> 24.03-LTS-SP2 ... +# all LTS-SPx is compatible with its LTS release +[OS] +name=OS +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/OS&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[everything] +name=everything +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/everything&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[EPOL] +name=EPOL +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/EPOL/main&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[debuginfo] +name=debuginfo +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/debuginfo&arch=$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[source] +name=source +metalink=https://mirrors.openeuler.org/metalink?path=openeuler/$releasever/source/repodata/repomd.xml +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[update] +name=update +metalink=https://mirrors.openeuler.org/metalink?repo=$releasever/update&arch=$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker + +[update-source] +name=update-source +metalink=https://mirrors.openeuler.org/metalink?path=openeuler/$releasever/update/source/repodata/repomd.xml +enabled=0 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openeuler/RPM-GPG-KEY-openEuler-EulerMaker +""" diff --git a/mock/templates/openmandriva-branched.tpl b/mock/templates/openmandriva-branched.tpl new file mode 100644 index 0000000..98e5dec --- /dev/null +++ b/mock/templates/openmandriva-branched.tpl @@ -0,0 +1,74 @@ +config_opts['root'] = 'openmandriva-{{ releasever }}-{{ target_arch }}' +config_opts['chroot_setup_cmd'] = 'install basesystem-build' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['macros']['%cross_compiling'] = '0' # Mock should generally be considered native builds +config_opts['package_manager'] = 'dnf' +config_opts['description'] = 'OpenMandriva {{ releasever }}' + +# There's v4.2, but not v4.1, so we can not use releasever here, #1171 +config_opts['use_bootstrap_image'] = False + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[openmandriva] +name=OpenMandriva $releasever - {{ target_arch }} +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-updates] +name=OpenMandriva $releasever - {{ target_arch }} - Updates +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/main/updates/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=main&release=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-debuginfo] +name=OpenMandriva $releasever - {{ target_arch }} - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/debug_main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=debug_main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False + +[openmandriva-updates-debuginfo] +name=OpenMandriva $releasever - {{ target_arch }} - Updates - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/$releasever/repository/{{ target_arch }}/debug_main/updates/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=$releasever&arch={{ target_arch }}&repo=debug_main&release=updates +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/openmandriva-cooker.tpl b/mock/templates/openmandriva-cooker.tpl new file mode 100644 index 0000000..faaee23 --- /dev/null +++ b/mock/templates/openmandriva-cooker.tpl @@ -0,0 +1,52 @@ +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal rpm-build rpm-openmandriva-setup rpm-openmandriva-setup-build' +config_opts['dist'] = 'cooker' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '5.0' +config_opts['macros']['%cross_compiling'] = '0' # Mock should generally be considered native builds +config_opts['package_manager'] = 'dnf' +config_opts['dnf_install_command'] = 'install python-dnf python-dnf-plugins-core' +config_opts['description'] = 'OpenMandriva Cooker {{ releasever }}' +config_opts['bootstrap_image'] = 'docker.io/openmandriva/cooker:latest' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[openmandriva-cooker] +name=OpenMandriva Cooker - {{ target_arch }} +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/cooker/repository/{{ target_arch }}/main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=cooker&arch={{ target_arch }}&repo=main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-cooker-debuginfo] +name=OpenMandriva Cooker - {{ target_arch }} - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/cooker/repository/{{ target_arch }}/debug_main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=cooker&arch={{ target_arch }}&repo=debug_main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/openmandriva-rolling.tpl b/mock/templates/openmandriva-rolling.tpl new file mode 100644 index 0000000..2d110e9 --- /dev/null +++ b/mock/templates/openmandriva-rolling.tpl @@ -0,0 +1,54 @@ +config_opts['chroot_setup_cmd'] = 'install basesystem-minimal rpm-build rpm-openmandriva-setup rpm-openmandriva-setup-build' +config_opts['dist'] = 'rolling' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '5.0' +config_opts['macros']['%cross_compiling'] = '0' # Mock should generally be considered native builds +config_opts['package_manager'] = 'dnf' +config_opts['dnf_install_command'] = 'install python-dnf python-dnf-plugins-core' +config_opts['description'] = 'OpenMandriva Rolling' + +# Is there a corresponding rolling image? #1171 +config_opts['use_bootstrap_image'] = False + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[openmandriva-rolling] +name=OpenMandriva Rolling - {{ target_arch }} +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/rolling/repository/{{ target_arch }}/main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=rolling&arch={{ target_arch }}&repo=main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=1 +skip_if_unavailable=False + +[openmandriva-rolling-debuginfo] +name=OpenMandriva Rolling - {{ target_arch }} - Debug +# Master repository: +# baseurl=http://abf-downloads.openmandriva.org/rolling/repository/{{ target_arch }}/debug_main/release/ +mirrorlist=http://mirrors.openmandriva.org/mirrors.php?platform=rolling&arch={{ target_arch }}&repo=debug_main&release=release +fastestmirror=1 +gpgcheck=1 +gpgkey=file:///usr/share/distribution-gpg-keys/openmandriva/RPM-GPG-KEY-OpenMandriva +enabled=0 +skip_if_unavailable=False +""" diff --git a/mock/templates/opensuse-leap-15.5.tpl b/mock/templates/opensuse-leap-15.5.tpl new file mode 100644 index 0000000..40afc1f --- /dev/null +++ b/mock/templates/opensuse-leap-15.5.tpl @@ -0,0 +1,85 @@ +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp155' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '15.5' +config_opts['macros']['%dist'] = '.suse.lp155' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.opensuse.org/opensuse/leap-dnf:15.5' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +{% if repo_arch == 'x86_64' %} +excludepkgs=*.i586,*.i686,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif repo_arch == 'i586' %} +excludepkgs=*.x86_64,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif repo_arch == 'ppc64le' %} +excludepkgs=*.ppc,*.ppc64,*.x86_64,*.i586,*.i686,*.s390x +{% elif repo_arch == 'ppc64' %} +excludepkgs=*.ppc,*.ppc64le,*.x86_64,*.i586,*.i686,*.s390x +{% elif repo_arch == 's390x' %} +excludepkgs=*.ppc,*.ppc64,*.ppc64le,*.x86_64,*.i586,*.i686 +{% endif %} + +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - {{ repo_arch }} - OSS +baseurl=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-2022 + file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports-2023 + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-Main-2023 +gpgcheck=1 + +[opensuse-leap-oss-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - OSS - Updates +baseurl=https://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=https://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-2022 +gpgcheck=1 + +[opensuse-leap-sle-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - Updates from SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/sle/ +#metalink=https://download.opensuse.org/update/leap/$releasever/sle/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-Main-2023 +gpgcheck=1 + +[opensuse-leap-sle-backports-update] +name=openSUSE Leap $releasever - {{ repo_arch }} - Updates from Backports for SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/backports/ +#metalink=https://download.opensuse.org/update/leap/$releasever/backports/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports-2023 +gpgcheck=1 + +""" diff --git a/mock/templates/opensuse-tumbleweed.tpl b/mock/templates/opensuse-tumbleweed.tpl new file mode 100644 index 0000000..a9cb798 --- /dev/null +++ b/mock/templates/opensuse-tumbleweed.tpl @@ -0,0 +1,69 @@ +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build openSUSE-release rpm-repos-openSUSE-Tumbleweed' +config_opts['dist'] = 'tumbleweed' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '0' +config_opts['macros']['%dist'] = '.suse.tw%(sh -c ". /etc/os-release; echo \$VERSION_ID")' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.opensuse.org/opensuse/tumbleweed-dnf' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Tumbleweed' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +{% if repo_arch == 'x86_64' %} +excludepkgs=*.i586,*.i686 +{% elif repo_arch == 'i586' %} +excludepkgs=*.x86_64 +{% elif repo_arch == 'ppc64le' %} +excludepkgs=*.ppc,*.ppc64 +{% elif repo_arch == 'ppc64' %} +excludepkgs=*.ppc,*.ppc64le +{% endif %} + +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-tumbleweed-oss] +name=openSUSE Tumbleweed - {{ repo_arch }} - OSS +{% if repo_arch in ['x86_64'] %} +baseurl=https://download.opensuse.org/tumbleweed/repo/oss/ +#metalink=https://download.opensuse.org/tumbleweed/repo/oss/repodata/repomd.xml.metalink +{% elif repo_arch in ['ppc64le', 'ppc64'] %} +baseurl=https://download.opensuse.org/ports/ppc/tumbleweed/repo/oss/ +#metalink=https://download.opensuse.org/ports/ppc/tumbleweed/repo/oss/repodata/repomd.xml.metalink +{% elif repo_arch in ['aarch64'] %} +baseurl=https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/ +#metalink=https://download.opensuse.org/ports/aarch64/tumbleweed/repo/oss/repodata/repomd.xml.metalink +{% elif repo_arch in ['i586'] %} +baseurl=https://download.opensuse.org/ports/i586/tumbleweed/repo/oss/ +#metalink=https://download.opensuse.org/ports/i586/tumbleweed/repo/oss/repodata/repomd.xml.metalink +{% elif repo_arch in ['s390x'] %} +baseurl=https://download.opensuse.org/ports/zsystems/tumbleweed/repo/oss/ +#metalink=https://download.opensuse.org/ports/zsystems/tumbleweed/repo/oss/repodata/repomd.xml.metalink +{% endif %} +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Tumbleweed +gpgcheck=1 + +""" diff --git a/mock/templates/oraclelinux-7.tpl b/mock/templates/oraclelinux-7.tpl new file mode 100644 index 0000000..5016937 --- /dev/null +++ b/mock/templates/oraclelinux-7.tpl @@ -0,0 +1,66 @@ +# This list is taken from 'epel-7-x86_64' @buildsys-build group, minus the +# 'epel-*' specific stuff. +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make oraclelinux-release patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' + +config_opts['dist'] = 'el7' # only useful for --resultdir variable subst +config_opts['releasever'] = '7' +config_opts['bootstrap_image'] = 'docker.io/library/oraclelinux:7' +config_opts['package_manager'] = 'yum' +config_opts['description'] = 'Oracle Linux 7' + +config_opts['yum_install_command'] += " --disablerepo=ol7_software_collections" + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +protected_packages= +user_agent={{ user_agent }} + +# repos + +[ol7_latest] +name=Oracle Linux $releasever Latest ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL7/latest/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol7 +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[ol7_optional_latest] +name=Oracle Linux $releasever Optional Latest ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL7/optional/latest/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol7 +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +[ol7_software_collections] +name=Software Collection Library packages for Oracle Linux 7 ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL7/SoftwareCollections/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol7 +gpgcheck=1 +enabled=1 +skip_if_unavailable=False + +{% for uekver in range(3,7) %} +[ol7_UEKR{{ uekver }}] +name=Latest Unbreakable Enterprise Kernel Release {{ uekver }} for Oracle Linux $releasever ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL7/UEKR{{ uekver }}/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol7 +gpgcheck=1 +enabled=0 +{% endfor %} + +""" diff --git a/mock/templates/oraclelinux-8.tpl b/mock/templates/oraclelinux-8.tpl new file mode 100644 index 0000000..d0a626d --- /dev/null +++ b/mock/templates/oraclelinux-8.tpl @@ -0,0 +1,68 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release oraclelinux-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'docker.io/library/oraclelinux:8' +config_opts['description'] = 'Oracle Linux 8' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + +# repos + +[ol8_baseos_latest] +name=Oracle Linux 8 BaseOS Latest ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/baseos/latest/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=1 + +[ol8_appstream] +name=Oracle Linux 8 Application Stream ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/appstream/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=1 + +[ol8_codeready_builder] +name=Oracle Linux 8 CodeReady Builder ($basearch) - Unsupported +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/codeready/builder/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=1 + +[ol8_distro_builder] +name=Oracle Linux 8 Distro Builder ($basearch) - Unsupported +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/distro/builder/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=0 + +{% if target_arch in ['x86_64'] %} +[ol8_UEKR6] +name=Latest Unbreakable Enterprise Kernel Release 6 for Oracle Linux $releasever ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/UEKR6/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=0 +{% endif %} + +""" diff --git a/mock/templates/oraclelinux-9.tpl b/mock/templates/oraclelinux-9.tpl new file mode 100644 index 0000000..accc234 --- /dev/null +++ b/mock/templates/oraclelinux-9.tpl @@ -0,0 +1,68 @@ +config_opts['chroot_setup_cmd'] = 'install tar redhat-rpm-config redhat-release oraclelinux-release which xz sed make bzip2 gzip coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep glibc-minimal-langpack' +config_opts['dist'] = 'el9' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'container-registry.oracle.com/os/oraclelinux:9' +config_opts['description'] = 'Oracle Linux 9' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el9 +user_agent={{ user_agent }} + +# repos + +[ol9_baseos_latest] +name=Oracle Linux 9 BaseOS Latest ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/baseos/latest/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=1 + +[ol9_appstream] +name=Oracle Linux 9 Application Stream ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/appstream/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=1 + +[ol9_codeready_builder] +name=Oracle Linux 9 CodeReady Builder ($basearch) - Unsupported +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/codeready/builder/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=1 + +[ol9_distro_builder] +name=Oracle Linux 9 Distro Builder ($basearch) - Unsupported +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/distro/builder/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=0 + +{% if target_arch in ['x86_64'] %} +[ol9_UEKR7] +name=Latest Unbreakable Enterprise Kernel Release 7 for Oracle Linux $releasever ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/UEKR7/$basearch/ +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=0 +{% endif %} + +""" diff --git a/mock/templates/oraclelinux-epel-8.tpl b/mock/templates/oraclelinux-epel-8.tpl new file mode 100644 index 0000000..dced3a9 --- /dev/null +++ b/mock/templates/oraclelinux-epel-8.tpl @@ -0,0 +1,14 @@ +config_opts['chroot_setup_cmd'] += " epel-rpm-macros" + +config_opts['dnf.conf'] += """ + +# repos + +[ol8_epel] +name=Oracle Linux 8 EPEL ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL8/developer/EPEL/$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol8 +gpgcheck=1 +enabled=1 + +""" diff --git a/mock/templates/oraclelinux-epel-9.tpl b/mock/templates/oraclelinux-epel-9.tpl new file mode 100644 index 0000000..6527b2b --- /dev/null +++ b/mock/templates/oraclelinux-epel-9.tpl @@ -0,0 +1,14 @@ +config_opts['chroot_setup_cmd'] += " epel-rpm-macros" + +config_opts['dnf.conf'] += """ + +# repos + +[ol9_epel] +name=Oracle Linux 9 EPEL ($basearch) +baseurl=https://yum.oracle.com/repo/OracleLinux/OL9/developer/EPEL/$basearch +gpgkey=file:///usr/share/distribution-gpg-keys/oraclelinux/RPM-GPG-KEY-oracle-ol9 +gpgcheck=1 +enabled=1 + +""" diff --git a/mock/templates/rhel-7.tpl b/mock/templates/rhel-7.tpl new file mode 100644 index 0000000..701de5e --- /dev/null +++ b/mock/templates/rhel-7.tpl @@ -0,0 +1,75 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils findutils gawk gcc gcc-c++ grep gzip info make patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' +config_opts['dist'] = 'el7' # only useful for --resultdir variable subst +config_opts['releasever'] = '7Server' +config_opts['package_manager'] = 'yum' +config_opts['bootstrap_image'] = 'registry.access.redhat.com/ubi7/ubi' +config_opts['description'] = 'RHEL 7' + +config_opts['dnf_install_command'] += ' subscription-manager' +config_opts['yum_install_command'] += ' subscription-manager' + +config_opts['root'] = 'rhel-7-{{ target_arch }}' + +config_opts['redhat_subscription_required'] = True + +config_opts['yum.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=1 +assumeyes=1 +syslog_ident=mock +syslog_device= +best=1 +protected_packages= + +# repos + +[rhel] +name = Red Hat Enterprise Linux +{% if target_arch == 'aarch64' %} +baseurl = https://cdn.redhat.com/content/dist/rhel-alt/{{ rhel_product }}/7/$releasever/armv8-a/$basearch/os +{% else %} +baseurl = https://cdn.redhat.com/content/dist/rhel/{{ rhel_product }}/7/$releasever/$basearch/os +{% endif %} +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat7-release +skip_if_unavailable=False + + +[rhel-optional] +name = Red Hat Enterprise Linux - Optional +{% if target_arch == 'aarch64' %} +baseurl = https://cdn.redhat.com/content/dist/rhel-alt/{{ rhel_product }}/7/$releasever/armv8-a/$basearch/optional/os +{% else %} +baseurl = https://cdn.redhat.com/content/dist/rhel/{{ rhel_product }}/7/$releasever/$basearch/optional/os +{% endif %} +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat7-release +skip_if_unavailable=False + +[rhel-extras] +name = Red Hat Enterprise Linux - Extras +{% if target_arch == 'aarch64' %} +baseurl = https://cdn.redhat.com/content/dist/rhel-alt/{{ rhel_product }}/7/$releasever/armv8-a/$basearch/extras/os +{% else %} +baseurl = https://cdn.redhat.com/content/dist/rhel/{{ rhel_product }}/7/7Server/$basearch/extras/os +{% endif %} +enabled=0 +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat7-release +skip_if_unavailable=False +""" diff --git a/mock/templates/rhel-8.tpl b/mock/templates/rhel-8.tpl new file mode 100644 index 0000000..2f894d9 --- /dev/null +++ b/mock/templates/rhel-8.tpl @@ -0,0 +1,66 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.access.redhat.com/ubi8/ubi' +config_opts['bootstrap_image_ready'] = True +config_opts['description'] = 'RHEL 8' + +config_opts['dnf_install_command'] += ' subscription-manager' +config_opts['yum_install_command'] += ' subscription-manager' + +config_opts['root'] = 'rhel-8-{{ target_arch }}' + +config_opts['redhat_subscription_required'] = True + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=1 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +module_platform_id=platform:el8 +protected_packages= +user_agent={{ user_agent }} + +# repos +[rhel-baseos] +name = Red Hat Enterprise Linux - BaseOS +baseurl = https://cdn.redhat.com/content/dist/rhel8/$releasever/$basearch/baseos/os +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat8-release +skip_if_unavailable=False + +[rhel-appstream] +name = Red Hat Enterprise Linux - AppStream +baseurl = https://cdn.redhat.com/content/dist/rhel8/$releasever/$basearch/appstream/os +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat8-release +skip_if_unavailable=False + +[codeready-builder] +name = Red Hat Enterprise Linux - CodeReady Linux Builder +baseurl = https://cdn.redhat.com/content/dist/rhel8/$releasever/$basearch/codeready-builder/os +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey=file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat8-release +skip_if_unavailable=False +""" diff --git a/mock/templates/rhel-9.tpl b/mock/templates/rhel-9.tpl new file mode 100644 index 0000000..7b833b1 --- /dev/null +++ b/mock/templates/rhel-9.tpl @@ -0,0 +1,66 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils redhat-release findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' +config_opts['releasever'] = '9' +config_opts['dist'] = 'el{{ releasever }}' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.access.redhat.com/ubi{{ releasever }}/ubi' +config_opts['bootstrap_image_ready'] = True +config_opts['description'] = 'RHEL {{ releasever }}' + +config_opts['dnf_install_command'] += ' subscription-manager' +config_opts['yum_install_command'] += ' subscription-manager' + +config_opts['root'] = 'rhel-{{ releasever }}-{{ target_arch }}' + +config_opts['redhat_subscription_required'] = True + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=1 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +module_platform_id=platform:el{{ releasever }} +protected_packages= +user_agent={{ user_agent }} + +# repos +[baseos] +name = Red Hat Enterprise Linux - BaseOS +baseurl = https://cdn.redhat.com/content/dist/rhel9/$releasever/$basearch/baseos/os/ +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey = file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat{{ releasever }}-release +skip_if_unavailable=False + +[appstream] +name = Red Hat Enterprise Linux - AppStream +baseurl = https://cdn.redhat.com/content/dist/rhel9/$releasever/$basearch/appstream/os/ +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey = file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat{{ releasever }}-release +skip_if_unavailable=False + +[codeready-builder] +name = Red Hat Enterprise Linux - CodeReady Linux Builder +baseurl = https://cdn.redhat.com/content/dist/rhel9/$releasever/$basearch/codeready-builder/os/ +sslverify = 1 +sslcacert = /etc/rhsm/ca/redhat-uep.pem +sslclientkey = /etc/pki/entitlement/{{ redhat_subscription_key_id }}-key.pem +sslclientcert = /etc/pki/entitlement/{{ redhat_subscription_key_id }}.pem +gpgkey = file:///usr/share/distribution-gpg-keys/redhat/RPM-GPG-KEY-redhat{{ releasever }}-release +skip_if_unavailable=False +""" diff --git a/mock/templates/rocky-8.tpl b/mock/templates/rocky-8.tpl new file mode 100644 index 0000000..807928a --- /dev/null +++ b/mock/templates/rocky-8.tpl @@ -0,0 +1,193 @@ +config_opts['chroot_setup_cmd'] = 'install tar gcc-c++ redhat-rpm-config redhat-release which xz sed make bzip2 gzip gcc coreutils unzip diffutils cpio bash gawk rpm-build info patch util-linux findutils grep' +config_opts['dist'] = 'el8' # only useful for --resultdir variable subst +config_opts['releasever'] = '8' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/rockylinux/rockylinux:8' +config_opts['description'] = 'Rocky Linux 8' + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el8 +user_agent={{ user_agent }} + +# Primary +[baseos] +name=Rocky Linux $releasever - BaseOS +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[appstream] +name=Rocky Linux $releasever - AppStream +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[powertools] +name=Rocky Linux $releasever - PowerTools +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=PowerTools-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/PowerTools/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[extras] +name=Rocky Linux $releasever - Extras +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[ha] +name=Rocky Linux $releasever - HighAvailability +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/HighAvailability/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[resilient-storage] +name=Rocky Linux $releasever - ResilientStorage +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/ResilientStorage/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[plus] +name=Rocky Linux $releasever - Plus +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=rockyplus-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/plus/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[devel] +name=Rocky Linux $releasever - Devel (WARNING: UNSUPPORTED - FOR BUILDROOT USE ONLY!) +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=Devel-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/Devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +# Debuginfo +[baseos-debug] +name=Rocky Linux $releasever - BaseOS - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[appstream-debug] +name=Rocky Linux $releasever - AppStream - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[ha-debug] +name=Rocky Linux $releasever - High Availability - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/HighAvailability/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[powertools-debug] +name=Rocky Linux $releasever - PowerTools - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=PowerTools-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/PowerTools/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[resilient-storage-debug] +name=Rocky Linux $releasever - Resilient Storage - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/ResilientStorage/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[devel-debug] +name=Rocky Linux $releasever - Devel - Debuginfo +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=Devel-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/Devel/$basearch/debug/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +# Source Repos +[baseos-source] +name=Rocky Linux $releasever - BaseOS - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=BaseOS-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[appstream-source] +name=Rocky Linux $releasever - AppStream - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=AppStream-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[ha-source] +name=Rocky Linux $releasever - High Availability - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=HighAvailability-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/HighAvailability/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[powertools-source] +name=Rocky Linux $releasever - PowerTools - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=PowerTools-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/PowerTools/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[resilient-storage-source] +name=Rocky Linux $releasever - Resilient Storage - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=ResilientStorage-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/ResilientStorage/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + +[devel-source] +name=Rocky Linux $releasever - Devel - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=Devel-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/Devel/source/tree +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-8 + + +""" diff --git a/mock/templates/rocky-9.tpl b/mock/templates/rocky-9.tpl new file mode 100644 index 0000000..3b07f15 --- /dev/null +++ b/mock/templates/rocky-9.tpl @@ -0,0 +1,255 @@ +config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils redhat-release findutils gawk glibc-minimal-langpack grep gzip info patch redhat-rpm-config rpm-build sed tar unzip util-linux which xz' +config_opts['dist'] = 'el9' # only useful for --resultdir variable subst +config_opts['releasever'] = '9' +config_opts['package_manager'] = 'dnf' +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['bootstrap_image'] = 'quay.io/rockylinux/rockylinux:9' + + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +metadata_expire=0 +mdpolicy=group:primary +best=1 +install_weak_deps=0 +protected_packages= +module_platform_id=platform:el9 +user_agent={{ user_agent }} + + +[baseos] +name=Rocky Linux $releasever - BaseOS +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[appstream] +name=Rocky Linux $releasever - AppStream +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[crb] +name=Rocky Linux $releasever - CRB +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/CRB/$basearch/os/ +gpgcheck=1 +enabled=1 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[extras] +name=Rocky Linux $releasever - Extras +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[devel] +name=Rocky Linux $releasever - Devel WARNING! FOR BUILDROOT ONLY DO NOT LEAVE ENABLED +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=devel-$releasever +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/devel/$basearch/os/ +gpgcheck=1 +enabled=0 +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[highavailability] +name=Rocky Linux $releasever - High Availability +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[resilientstorage] +name=Rocky Linux $releasever - Resilient Storage +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[nfv] +name=Rocky Linux $releasever - NFV +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=NFV-$releasever +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[rt] +name=Rocky Linux $releasever - Realtime +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/$basearch/os/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[baseos-debug] +name=Rocky Linux $releasever - BaseOS - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[baseos-source] +name=Rocky Linux $releasever - BaseOS - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=BaseOS-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/BaseOS/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[appstream-debug] +name=Rocky Linux $releasever - AppStream - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[appstream-source] +name=Rocky Linux $releasever - AppStream - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=AppStream-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/AppStream/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[crb-debug] +name=Rocky Linux $releasever - CRB - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/CRB/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[crb-source] +name=Rocky Linux $releasever - CRB - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=CRB-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/CRB/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[extras-debug] +name=Rocky Linux $releasever - Extras Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-debug +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/extras/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[extras-source] +name=Rocky Linux $releasever - Extras Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-source +#baseurl=http://dl.rockylinux.org/pub/rocky/$releasever/extras/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[highavailability-debug] +name=Rocky Linux $releasever - High Availability - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[highavailability-source] +name=Rocky Linux $releasever - High Availability - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=HighAvailability-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[resilientstorage-debug] +name=Rocky Linux $releasever - Resilient Storage - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[resilientstorage-source] +name=Rocky Linux $releasever - Resilient Storage - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=ResilientStorage-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[nfv-debug] +name=Rocky Linux $releasever - NFV Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[nfv-source] +name=Rocky Linux $releasever - NFV Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[rt-debug] +name=Rocky Linux $releasever - Realtime Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + +[rt-source] +name=Rocky Linux $releasever - Realtime Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///usr/share/distribution-gpg-keys/rocky/RPM-GPG-KEY-Rocky-9 + + +""" diff --git a/modprobe.d/firewalld-sysctls.conf b/modprobe.d/firewalld-sysctls.conf new file mode 100644 index 0000000..db9a743 --- /dev/null +++ b/modprobe.d/firewalld-sysctls.conf @@ -0,0 +1 @@ +install nf_conntrack /sbin/modprobe --ignore-install nf_conntrack $CMDLINE_OPTS && /sbin/sysctl --quiet --pattern 'net[.]netfilter[.]nf_conntrack.*' --system diff --git a/modprobe.d/lockd.conf b/modprobe.d/lockd.conf new file mode 100644 index 0000000..f672d12 --- /dev/null +++ b/modprobe.d/lockd.conf @@ -0,0 +1,23 @@ +# +# Set the NFS lock manager grace period. n is measured in seconds. +#options lockd nlm_grace_period=90 +# +# Set the TCP port that the NFS lock manager should use. +# port must be a valid TCP port value (1-65535). +#options lockd nlm_tcpport +# +# Set the UDP port that the NFS lock manager should use. +# port must be a valid UDP port value (1-65535). +#options lockd nlm_udpport +# +# Set the maximum number of outstanding connections +#options lockd nlm_max_connections=1024 +# +# Set the default time value for the NFS lock manager +# in seconds. Default is 10 secs (min 3 max 20) +#options lockd nlm_timeout=10 +# +# Choose whether to record the caller_name or IP address +# this peer in the local rpc.statd's database. +#options lockd nsm_use_hostnames=0 + diff --git a/motd.d/10-banner b/motd.d/10-banner new file mode 100644 index 0000000..9aab2ba --- /dev/null +++ b/motd.d/10-banner @@ -0,0 +1,6 @@ + ____ _ ___ +| _ \ ___ ___| | ___ _ / _ \ +| |_) / _ \ / __| |/ / | | | (_) | +| _ < (_) | (__| <| |_| |\__, | +|_| \_\___/ \___|_|\_\\__, | /_/ + |___/ diff --git a/netconfig b/netconfig new file mode 100644 index 0000000..effc67e --- /dev/null +++ b/netconfig @@ -0,0 +1,19 @@ +# +# The network configuration file. This file is currently only used in +# conjunction with the TI-RPC code in the libtirpc library. +# +# Entries consist of: +# +# \ +# +# +# The and fields are always empty in this +# implementation. +# +udp tpi_clts v inet udp - - +tcp tpi_cots_ord v inet tcp - - +udp6 tpi_clts v inet6 udp - - +tcp6 tpi_cots_ord v inet6 tcp - - +rawip tpi_raw - inet - - - +local tpi_cots_ord - loopback - - - +unix tpi_cots_ord - loopback - - - diff --git a/networks b/networks new file mode 100644 index 0000000..9a46fc8 --- /dev/null +++ b/networks @@ -0,0 +1,3 @@ +default 0.0.0.0 +loopback 127.0.0.0 +link-local 169.254.0.0 diff --git a/nfs.conf b/nfs.conf new file mode 100644 index 0000000..d32f067 --- /dev/null +++ b/nfs.conf @@ -0,0 +1,101 @@ +# +# This is a general configuration for the +# NFS daemons and tools +# +[general] +# pipefs-directory=/var/lib/nfs/rpc_pipefs +# +[nfsrahead] +# nfs=15000 +# nfs4=16000 +# +[exports] +# rootdir=/export +# +[exportfs] +# debug=0 +# +[gssd] +# verbosity=0 +# rpc-verbosity=0 +# use-memcache=0 +# use-machine-creds=1 +use-gss-proxy=1 +# avoid-dns=1 +# limit-to-legacy-enctypes=0 +# allowed-enctypes=aes256-cts-hmac-sha384-192,aes128-cts-hmac-sha256-128,camellia256-cts-cmac,camellia128-cts-cmac,aes256-cts-hmac-sha1-96,aes128-cts-hmac-sha1-96 +# context-timeout=0 +# rpc-timeout=5 +# keytab-file=/etc/krb5.keytab +# cred-cache-directory= +# preferred-realm= +# set-home=1 +# upcall-timeout=30 +# cancel-timed-out-upcalls=0 +# +[lockd] +# port=0 +# udp-port=0 +# +[exportd] +# debug="all|auth|call|general|parse" +# manage-gids=n +# state-directory-path=/var/lib/nfs +# threads=1 +# cache-use-ipaddr=n +# ttl=1800 +[mountd] +# debug="all|auth|call|general|parse" +# manage-gids=n +# descriptors=0 +# port=0 +# threads=1 +# reverse-lookup=n +# state-directory-path=/var/lib/nfs +# ha-callout= +# cache-use-ipaddr=n +# ttl=1800 +# +[nfsdcld] +# debug=0 +# storagedir=/var/lib/nfs/nfsdcld +# +[nfsdcltrack] +# debug=0 +# storagedir=/var/lib/nfs/nfsdcltrack +# +[nfsd] +# debug=0 +# threads=8 +# host= +# port=0 +# grace-time=90 +# lease-time=90 +# udp=n +# tcp=y +# vers3=y +# vers4=y +# vers4.0=y +# vers4.1=y +# vers4.2=y +rdma=y +rdma-port=20049 + +[statd] +# debug=0 +# port=0 +# outgoing-port=0 +# name= +# state-directory-path=/var/lib/nfs/statd +# ha-callout= +# no-notify=0 +# +[sm-notify] +# debug=0 +# force=0 +# retry-time=900 +# outgoing-port= +# outgoing-addr= +# lift-grace=y + +#tag1234 - Used for install purposes only diff --git a/nfsmount.conf b/nfsmount.conf new file mode 100644 index 0000000..c498eb8 --- /dev/null +++ b/nfsmount.conf @@ -0,0 +1,144 @@ +# +# /etc/nfsmount.conf - see nfsmount.conf(5) for details +# +# This is an NFS mount configuration file. This file can be broken +# up into three different sections: Mount, Server and Global +# +# [ MountPoint "Mount_point" ] +# This section defines all the mount options that +# should be used on a particular mount point. The '' +# string need to be an exact match of the path in the mount +# command. Example: +# [ MountPoint "/export/home" ] +# background=True +# Would cause all mount to /export/home would be done in +# the background +# +# [ Server "Server_Name" ] +# This section defines all the mount options that +# should be used on mounts to a particular NFS server. +# Example: +# [ Server "nfsserver.foo.com" ] +# rsize=32k +# wsize=32k +# All reads and writes to the 'nfsserver.foo.com' server +# will be done with 32k (32768 bytes) block sizes. +# +[ NFSMount_Global_Options ] +# This statically named section defines global mount +# options that can be applied on all NFS mount. +# +# Protocol Version [3,4] +# This defines the default protocol version which will +# be used to start the negotiation with the server. +# Defaultvers=4 +# +# Setting this option makes it mandatory the server supports the +# given version. The mount will fail if the given version is +# not support by the server. +# Nfsvers=4 +# +# Network Protocol [udp,tcp,rdma] (Note: values are case sensitive) +# This defines the default network protocol which will +# be used to start the negotiation with the server. +# Defaultproto=tcp +# +# Setting this option makes it mandatory the server supports the +# given network protocol. The mount will fail if the given network +# protocol is not supported by the server. +# Proto=tcp +# +# The number of times a request will be retired before +# generating a timeout +# Retrans=2 +# +# The number of minutes that will retry mount +# Retry=2 +# +# The minimum time (in seconds) file attributes are cached +# acregmin=30 +# +# The Maximum time (in seconds) file attributes are cached +# acregmax=60 +# +# The minimum time (in seconds) directory attributes are cached +# acdirmin=30 +# +# The Maximum time (in seconds) directory attributes are cached +# acdirmax=60 +# +# Enable Access Control Lists +# Acl=False +# +# Enable Attribute Caching +# Ac=True +# +# Do mounts in background (i.e. asynchronously) +# Background=False +# +# Close-To-Open cache coherence +# Cto=True +# +# Do mounts in foreground (i.e. synchronously) +# Foreground=True +# +# How to handle times out from servers (Hard is STRONGLY suggested) +# Hard=True +# Soft=False +# +# Enable File Locking +# Lock=True +# +# Enable READDIRPLUS on NFS version 3 mounts +# Rdirplus=True +# +# Maximum Read Size (in Bytes) +# Rsize=8k +# +# Maximum Write Size (in Bytes) +# Wsize=8k +# +# Maximum Server Block Size (in Bytes) +# Bsize=8k +# +# Ignore unknown mount options +# Sloppy=False +# +# Share Data and Attribute Caches +# Sharecache=True +# +# The amount of time, in tenths of a seconds, the client +# will wait for a response from the server before retransmitting +# the request. +# Timeo=600 +# +# Sets all attributes times to the same time (in seconds) +# actimeo=30 +# +# Server Mountd port mountport +# mountport=4001 +# +# Server Mountd Protocol +# mountproto=tcp +# +# Server Mountd Version +# mountvers=3 +# +# Server Mountd Host +# mounthost=hostname +# +# Server Port +# Port=2049 +# +# RPCGSS security flavors +# [none, sys, krb5, krb5i, krb5p ] +# Sec=sys +# +# Allow Signals to interrupt file operations +# Intr=True +# +# Specifies how the kernel manages its cache of directory +# Lookupcache=all|none|pos|positive +# +# Turn of the caching of that access time +# noatime=True diff --git a/nftables/main.nft b/nftables/main.nft new file mode 100644 index 0000000..6460d10 --- /dev/null +++ b/nftables/main.nft @@ -0,0 +1,64 @@ +# Sample configuration for nftables service. +# Load this by calling 'nft -f /etc/nftables/main.nft'. + +# Note about base chain priorities: +# The priority values used in these sample configs are +# offset by 20 in order to avoid ambiguity when firewalld +# is also running which uses an offset of 10. This means +# that packets will traverse firewalld first and if not +# dropped/rejected there will hit the chains defined here. +# Chains created by iptables, ebtables and arptables tools +# do not use an offset, so those chains are traversed first +# in any case. + +# drop any existing nftables ruleset +flush ruleset + +# a common table for both IPv4 and IPv6 +table inet nftables_svc { + + # protocols to allow + set allowed_protocols { + type inet_proto + elements = { icmp, icmpv6 } + } + + # interfaces to accept any traffic on + set allowed_interfaces { + type ifname + elements = { "lo" } + } + + # services to allow + set allowed_tcp_dports { + type inet_service + elements = { ssh, 9090 } + } + + # this chain gathers all accept conditions + chain allow { + ct state established,related accept + + meta l4proto @allowed_protocols accept + iifname @allowed_interfaces accept + tcp dport @allowed_tcp_dports accept + } + + # base-chain for traffic to this host + chain INPUT { + type filter hook input priority filter + 20 + policy accept + + jump allow + reject with icmpx type port-unreachable + } +} + +# By default, any forwarding traffic is allowed. +# Uncomment the following line to filter it based +# on the same criteria as input traffic. +#include "/etc/nftables/router.nft" + +# Uncomment the following line to enable masquerading of +# forwarded traffic. May be used with or without router.nft. +#include "/etc/nftables/nat.nft" diff --git a/nftables/nat.nft b/nftables/nat.nft new file mode 100644 index 0000000..905179c --- /dev/null +++ b/nftables/nat.nft @@ -0,0 +1,38 @@ +# Sample configuration snippet for nftables service. +# Meant to be included by main.nft, not for direct use. + +# dedicated table for IPv4 +table ip nftables_svc { + + # interfaces to masquerade traffic from + set masq_interfaces { + type ifname + elements = { "virbr0" } + } + + # networks to masquerade traffic from + # 'interval' flag is required to support subnets + set masq_ips { + type ipv4_addr + flags interval + elements = { 192.168.122.0/24 } + } + + # force port randomization for non-locally originated connections using + # suspicious port values to prevent port-shadow attacks, i.e. + # accidental matching of new inbound connections vs. existing ones + chain do_masquerade { + meta iif > 0 th sport < 16384 th dport >= 32768 masquerade random + masquerade + } + + # base-chain to manipulate conntrack in postrouting, + # will see packets for new or related traffic only + chain POSTROUTING { + type nat hook postrouting priority srcnat + 20 + policy accept + + iifname @masq_interfaces oifname != @masq_interfaces jump do_masquerade + ip saddr @masq_ips jump do_masquerade + } +} diff --git a/nftables/osf/pf.os b/nftables/osf/pf.os new file mode 100644 index 0000000..35cbb47 --- /dev/null +++ b/nftables/osf/pf.os @@ -0,0 +1,703 @@ +# $FreeBSD: head/etc/pf.os 258865 2013-12-03 04:32:02Z eadler $ +# $OpenBSD: pf.os,v 1.27 2016/09/03 17:08:57 sthen Exp $ +# passive OS fingerprinting +# ------------------------- +# +# SYN signatures. Those signatures work for SYN packets only (duh!). +# +# (C) Copyright 2000-2003 by Michal Zalewski +# (C) Copyright 2003 by Mike Frantzen +# +# Permission to use, copy, modify, and distribute this software for any +# purpose with or without fee is hereby granted, provided that the above +# copyright notice and this permission notice appear in all copies. +# +# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES +# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR +# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES +# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN +# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF +# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. +# +# +# This fingerprint database is adapted from Michal Zalewski's p0f passive +# operating system package. The last database sync was from a Nov 3 2003 +# p0f.fp. +# +# +# Each line in this file specifies a single fingerprint. Please read the +# information below carefully before attempting to append any signatures +# reported as UNKNOWN to this file to avoid mistakes. +# +# We use the following set metrics for fingerprinting: +# +# - Window size (WSS) - a highly OS dependent setting used for TCP/IP +# performance control (max. amount of data to be sent without ACK). +# Some systems use a fixed value for initial packets. On other +# systems, it is a multiple of MSS or MTU (MSS+40). In some rare +# cases, the value is just arbitrary. +# +# NEW SIGNATURE: if p0f reported a special value of 'Snn', the number +# appears to be a multiple of MSS (MSS*nn); a special value of 'Tnn' +# means it is a multiple of MTU ((MSS+40)*nn). Unless you notice the +# value of nn is not fixed (unlikely), just copy the Snn or Tnn token +# literally. If you know this device has a simple stack and a fixed +# MTU, you can however multiply S value by MSS, or T value by MSS+40, +# and put it instead of Snn or Tnn. +# +# If WSS otherwise looks like a fixed value (for example a multiple +# of two), or if you can confirm the value is fixed, please quote +# it literally. If there's no apparent pattern in WSS chosen, you +# should consider wildcarding this value. +# +# - Overall packet size - a function of all IP and TCP options and bugs. +# +# NEW SIGNATURE: Copy this value literally. +# +# - Initial TTL - We check the actual TTL of a received packet. It can't +# be higher than the initial TTL, and also shouldn't be dramatically +# lower (maximum distance is defined as 40 hops). +# +# NEW SIGNATURE: *Never* copy TTL from a p0f-reported signature literally. +# You need to determine the initial TTL. The best way to do it is to +# check the documentation for a remote system, or check its settings. +# A fairly good method is to simply round the observed TTL up to +# 32, 64, 128, or 255, but it should be noted that some obscure devices +# might not use round TTLs (in particular, some shoddy appliances use +# "original" initial TTL settings). If not sure, you can see how many +# hops you're away from the remote party with traceroute or mtr. +# +# - Don't fragment flag (DF) - some modern OSes set this to implement PMTU +# discovery. Others do not bother. +# +# NEW SIGNATURE: Copy this value literally. +# +# - Maximum segment size (MSS) - this setting is usually link-dependent. P0f +# uses it to determine link type of the remote host. +# +# NEW SIGNATURE: Always wildcard this value, except for rare cases when +# you have an appliance with a fixed value, know the system supports only +# a very limited number of network interface types, or know the system +# is using a value it pulled out of nowhere. Specific unique MSS +# can be used to tell Google crawlbots from the rest of the population. +# +# - Window scaling (WSCALE) - this feature is used to scale WSS. +# It extends the size of a TCP/IP window to 32 bits. Some modern +# systems implement this feature. +# +# NEW SIGNATURE: Observe several signatures. Initial WSCALE is often set +# to zero or other low value. There's usually no need to wildcard this +# parameter. +# +# - Timestamp - some systems that implement timestamps set them to +# zero in the initial SYN. This case is detected and handled appropriately. +# +# - Selective ACK permitted - a flag set by systems that implement +# selective ACK functionality. +# +# - The sequence of TCP all options (MSS, window scaling, selective ACK +# permitted, timestamp, NOP). Other than the options previously +# discussed, p0f also checks for timestamp option (a silly +# extension to broadcast your uptime ;-), NOP options (used for +# header padding) and sackOK option (selective ACK feature). +# +# NEW SIGNATURE: Copy the sequence literally. +# +# To wildcard any value (except for initial TTL or TCP options), replace +# it with '*'. You can also use a modulo operator to match any values +# that divide by nnn - '%nnn'. +# +# Fingerprint entry format: +# +# wwww:ttt:D:ss:OOO...:OS:Version:Subtype:Details +# +# wwww - window size (can be *, %nnn, Snn or Tnn). The special values +# "S" and "T" which are a multiple of MSS or a multiple of MTU +# respectively. +# ttt - initial TTL +# D - don't fragment bit (0 - not set, 1 - set) +# ss - overall SYN packet size +# OOO - option value and order specification (see below) +# OS - OS genre (Linux, Solaris, Windows) +# Version - OS Version (2.0.27 on x86, etc) +# Subtype - OS subtype or patchlevel (SP3, lo0) +# details - Generic OS details +# +# If OS genre starts with '*', p0f will not show distance, link type +# and timestamp data. It is useful for userland TCP/IP stacks of +# network scanners and so on, where many settings are randomized or +# bogus. +# +# If OS genre starts with @, it denotes an approximate hit for a group +# of operating systems (signature reporting still enabled in this case). +# Use this feature at the end of this file to catch cases for which +# you don't have a precise match, but can tell it's Windows or FreeBSD +# or whatnot by looking at, say, flag layout alone. +# +# Option block description is a list of comma or space separated +# options in the order they appear in the packet: +# +# N - NOP option +# Wnnn - window scaling option, value nnn (or * or %nnn) +# Mnnn - maximum segment size option, value nnn (or * or %nnn) +# S - selective ACK OK +# T - timestamp +# T0 - timestamp with a zero value +# +# To denote no TCP options, use a single '.'. +# +# Please report any additions to this file, or any inaccuracies or +# problems spotted, to the maintainers: lcamtuf@coredump.cx, +# frantzen@openbsd.org and bugs@openbsd.org with a tcpdump packet +# capture of the relevant SYN packet(s) +# +# A test and submission page is available at +# http://lcamtuf.coredump.cx/p0f-help/ +# +# +# WARNING WARNING WARNING +# ----------------------- +# +# Do not add a system X as OS Y just because NMAP says so. It is often +# the case that X is a NAT firewall. While nmap is talking to the +# device itself, p0f is fingerprinting the guy behind the firewall +# instead. +# +# When in doubt, use common sense, don't add something that looks like +# a completely different system as Linux or FreeBSD or LinkSys router. +# Check DNS name, establish a connection to the remote host and look +# at SYN+ACK - does it look similar? +# +# Some users tweak their TCP/IP settings - enable or disable RFC1323 +# functionality, enable or disable timestamps or selective ACK, +# disable PMTU discovery, change MTU and so on. Always compare a new rule +# to other fingerprints for this system, and verify the system isn't +# "customized" before adding it. It is OK to add signature variants +# caused by a commonly used software (personal firewalls, security +# packages, etc), but it makes no sense to try to add every single +# possible /proc/sys/net/ipv4 tweak on Linux or so. +# +# KEEP IN MIND: Some packet firewalls configured to normalize outgoing +# traffic (OpenBSD pf with "scrub" enabled, for example) will, well, +# normalize packets. Signatures will not correspond to the originating +# system (and probably not quite to the firewall either). +# +# NOTE: Try to keep this file in some reasonable order, from most to +# least likely systems. This will speed up operation. Also keep most +# generic and broad rules near the end. +# + +########################## +# Standard OS signatures # +########################## + +# ----------------- AIX --------------------- + +# AIX is first because its signatures are close to NetBSD, MacOS X and +# Linux 2.0, but it uses a fairly rare MSSes, at least sometimes... +# This is a shoddy hack, though. + +45046:64:0:44:M*: AIX:4.3::AIX 4.3 +16384:64:0:44:M512: AIX:4.3:2-3:AIX 4.3.2 and earlier + +16384:64:0:60:M512,N,W%2,N,N,T: AIX:4.3-5.2:3:AIX 4.3.3-5.2 +32768:64:0:60:M512,N,W%2,N,N,T: AIX:4.3-5.2:3:AIX 4.3.3-5.2 +65535:64:0:60:M512,N,W%2,N,N,T: AIX:4.3-5-2:3:AIX 4.3.3-5.2 +65535:64:0:64:M*,N,W1,N,N,T,N,N,S: AIX:5.3:ML1:AIX 5.3 ML1 + +# ----------------- Linux ------------------- + +# S1:64:0:44:M*:A: Linux:1.2::Linux 1.2.x (XXX quirks support) +512:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x +16384:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x + +# Endian snafu! Nelson says "ha-ha": +2:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x (MkLinux) on Mac +64:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x (MkLinux) on Mac + + +S4:64:1:60:M1360,S,T,N,W0: Linux:google::Linux (Google crawlbot) + +S2:64:1:60:M*,S,T,N,W0: Linux:2.4::Linux 2.4 (big boy) +S3:64:1:60:M*,S,T,N,W0: Linux:2.4:.18-21:Linux 2.4.18 and newer +S4:64:1:60:M*,S,T,N,W0: Linux:2.4/2.6::Linux 2.4/2.6 <= 2.6.7 + +S4:64:1:60:M*,S,T,N,W5: Linux:2.6::Linux 2.6 (newer, 1) +S4:64:1:60:M*,S,T,N,W6: Linux:2.6::Linux 2.6 (newer, 2) +S4:64:1:60:M*,S,T,N,W7: Linux:2.6::Linux 2.6 (newer, 3) +T4:64:1:60:M*,S,T,N,W7: Linux:2.6::Linux 2.6 (newer, 4) + +S10:64:1:60:M*,S,T,N,W4: Linux:3.0::Linux 3.0 +S10:64:1:60:M*,S,T,N,W6: Linux:3.1::Linux 3.1 +S10:64:1:60:M*,S,T,N,W7: Linux:3.4-3.10::Linux 3.4 - 3.10 +S20:64:1:60:M*,S,T,N,W7: Linux:3.11-4.19::Linux 3.11 - 4.19 +S44:64:1:60:M*,S,T,N,W7: Linux:4.20::Linux 4.20 + +S3:64:1:60:M*,S,T,N,W1: Linux:2.5::Linux 2.5 (sometimes 2.4) +S4:64:1:60:M*,S,T,N,W1: Linux:2.5-2.6::Linux 2.5/2.6 +S3:64:1:60:M*,S,T,N,W2: Linux:2.5::Linux 2.5 (sometimes 2.4) +S4:64:1:60:M*,S,T,N,W2: Linux:2.5::Linux 2.5 (sometimes 2.4) + +S20:64:1:60:M*,S,T,N,W0: Linux:2.2:20-25:Linux 2.2.20 and newer +S22:64:1:60:M*,S,T,N,W0: Linux:2.2::Linux 2.2 +S11:64:1:60:M*,S,T,N,W0: Linux:2.2::Linux 2.2 + +# Popular cluster config scripts disable timestamps and +# selective ACK: +S4:64:1:48:M1460,N,W0: Linux:2.4:cluster:Linux 2.4 in cluster + +# This needs to be investigated. On some systems, WSS +# is selected as a multiple of MTU instead of MSS. I got +# many submissions for this for many late versions of 2.4: +T4:64:1:60:M1412,S,T,N,W0: Linux:2.4::Linux 2.4 (late, uncommon) + +# This happens only over loopback, but let's make folks happy: +32767:64:1:60:M16396,S,T,N,W0: Linux:2.4:lo0:Linux 2.4 (local) +S8:64:1:60:M3884,S,T,N,W0: Linux:2.2:lo0:Linux 2.2 (local) + +# Opera visitors: +16384:64:1:60:M*,S,T,N,W0: Linux:2.2:Opera:Linux 2.2 (Opera?) +32767:64:1:60:M*,S,T,N,W0: Linux:2.4:Opera:Linux 2.4 (Opera?) + +# Some fairly common mods: +S4:64:1:52:M*,N,N,S,N,W0: Linux:2.4:ts:Linux 2.4 w/o timestamps +S22:64:1:52:M*,N,N,S,N,W0: Linux:2.2:ts:Linux 2.2 w/o timestamps + + +# ----------------- FreeBSD ----------------- + +16384:64:1:44:M*: FreeBSD:2.0-4.2::FreeBSD 2.0-4.2 +16384:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.4::FreeBSD 4.4 + +1024:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.4::FreeBSD 4.4 + +57344:64:1:44:M*: FreeBSD:4.6-4.8:noRFC1323:FreeBSD 4.6-4.8 (no RFC1323) +57344:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.6-4.9::FreeBSD 4.6-4.9 + +32768:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.8-5.1::FreeBSD 4.8-5.1 (or MacOS X) +65535:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.8-5.2::FreeBSD 4.8-5.2 (or MacOS X) +65535:64:1:60:M*,N,W1,N,N,T: FreeBSD:4.7-5.2::FreeBSD 4.7-5.2 + +65535:64:1:60:M*,N,W6,S,T: FreeBSD:9.0-12.0::FreeBSD 9.0 - 12.0 + +# XXX need quirks support +# 65535:64:1:60:M*,N,W0,N,N,T:Z:FreeBSD:5.1-5.4::5.1-current (1) +# 65535:64:1:60:M*,N,W1,N,N,T:Z:FreeBSD:5.1-5.4::5.1-current (2) +# 65535:64:1:60:M*,N,W2,N,N,T:Z:FreeBSD:5.1-5.4::5.1-current (3) +# 65535:64:1:44:M*:Z:FreeBSD:5.2::FreeBSD 5.2 (no RFC1323) + +# 16384:64:1:60:M*,N,N,N,N,N,N,T:FreeBSD:4.4:noTS:FreeBSD 4.4 (w/o timestamps) + +# ----------------- NetBSD ------------------ + +16384:64:0:60:M*,N,W0,N,N,T: NetBSD:1.3::NetBSD 1.3 +65535:64:0:60:M*,N,W0,N,N,T0: NetBSD:1.6:opera:NetBSD 1.6 (Opera) +16384:64:0:60:M*,N,W0,N,N,T0: NetBSD:1.6::NetBSD 1.6 +16384:64:1:60:M*,N,W0,N,N,T0: NetBSD:1.6:df:NetBSD 1.6 (DF) +65535:64:1:60:M*,N,W1,N,N,T0: NetBSD:1.6::NetBSD 1.6W-current (DF) +65535:64:1:60:M*,N,W0,N,N,T0: NetBSD:1.6::NetBSD 1.6X (DF) +32768:64:1:60:M*,N,W0,N,N,T0: NetBSD:1.6:randomization:NetBSD 1.6ZH-current (w/ ip_id randomization) + +# ----------------- OpenBSD ----------------- + +16384:64:0:60:M*,N,W0,N,N,T: OpenBSD:2.6::NetBSD 1.3 (or OpenBSD 2.6) +16384:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-4.8::OpenBSD 3.0-4.8 +16384:64:0:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-4.8:no-df:OpenBSD 3.0-4.8 (scrub no-df) +57344:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.3-4.0::OpenBSD 3.3-4.0 +57344:64:0:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.3-4.0:no-df:OpenBSD 3.3-4.0 (scrub no-df) + +65535:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-4.0:opera:OpenBSD 3.0-4.0 (Opera) + +16384:64:1:64:M*,N,N,S,N,W3,N,N,T: OpenBSD:4.9::OpenBSD 4.9 +16384:64:0:64:M*,N,N,S,N,W3,N,N,T: OpenBSD:4.9:no-df:OpenBSD 4.9 (scrub no-df) + +16384:64:1:64:M*,N,N,S,N,W6,N,N,T: OpenBSD:6.1::OpenBSD 6.1 +16384:64:0:64:M*,N,N,S,N,W6,N,N,T: OpenBSD:6.1:no-df:OpenBSD 6.1 (scrub no-df) + +# ----------------- DragonFly BSD ----------------- + +57344:64:1:60:M*,N,W0,N,N,T: DragonFly:1.0:A:DragonFly 1.0A +57344:64:0:64:M*,N,W0,N,N,S,N,N,T: DragonFly:1.2-1.12::DragonFly 1.2-1.12 +5840:64:1:60:M*,S,T,N,W4: DragonFly:2.0-2.1::DragonFly 2.0-2.1 +57344:64:0:64:M*,N,W0,N,N,S,N,N,T: DragonFly:2.2-2.3::DragonFly 2.2-2.3 +57344:64:0:64:M*,N,W5,N,N,S,N,N,T: DragonFly:2.4-2.7::DragonFly 2.4-2.7 + +# ----------------- Solaris ----------------- + +S17:64:1:64:N,W3,N,N,T0,N,N,S,M*: Solaris:8:RFC1323:Solaris 8 RFC1323 +S17:64:1:48:N,N,S,M*: Solaris:8::Solaris 8 +S17:255:1:44:M*: Solaris:2.5-2.7::Solaris 2.5 to 7 + +S6:255:1:44:M*: Solaris:2.6-2.7::Solaris 2.6 to 7 +S23:255:1:44:M*: Solaris:2.5:1:Solaris 2.5.1 +S34:64:1:48:M*,N,N,S: Solaris:2.9::Solaris 9 +S44:255:1:44:M*: Solaris:2.7::Solaris 7 + +4096:64:0:44:M1460: SunOS:4.1::SunOS 4.1.x + +S34:64:1:52:M*,N,W0,N,N,S: Solaris:10:beta:Solaris 10 (beta) +32850:64:1:64:M*,N,N,T,N,W1,N,N,S: Solaris:10::Solaris 10 1203 + +# ----------------- IRIX -------------------- + +49152:64:0:44:M*: IRIX:6.4::IRIX 6.4 +61440:64:0:44:M*: IRIX:6.2-6.5::IRIX 6.2-6.5 +49152:64:0:52:M*,N,W2,N,N,S: IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323) +49152:64:0:52:M*,N,W3,N,N,S: IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323) + +61440:64:0:48:M*,N,N,S: IRIX:6.5:12-21:IRIX 6.5.12 - 6.5.21 +49152:64:0:48:M*,N,N,S: IRIX:6.5:15-21:IRIX 6.5.15 - 6.5.21 + +49152:60:0:64:M*,N,W2,N,N,T,N,N,S: IRIX:6.5:IP27:IRIX 6.5 IP27 + + +# ----------------- Tru64 ------------------- + +32768:64:1:48:M*,N,W0: Tru64:4.0::Tru64 4.0 (or OS/2 Warp 4) +32768:64:0:48:M*,N,W0: Tru64:5.0::Tru64 5.0 +8192:64:0:44:M1460: Tru64:5.1:noRFC1323:Tru64 6.1 (no RFC1323) (or QNX 6) +61440:64:0:48:M*,N,W0: Tru64:5.1a:JP4:Tru64 v5.1a JP4 (or OpenVMS 7.x on Compaq 5.x stack) + +# ----------------- OpenVMS ----------------- + +6144:64:1:60:M*,N,W0,N,N,T: OpenVMS:7.2::OpenVMS 7.2 (Multinet 4.4 stack) + +# ----------------- MacOS ------------------- + +# XXX Need EOL tcp opt support +# S2:255:1:48:M*,W0,E:.:MacOS:8.6 classic + +# XXX some of these use EOL too +16616:255:1:48:M*,W0: MacOS:7.3-8.6:OTTCP:MacOS 7.3-8.6 (OTTCP) +16616:255:1:48:M*,N,N,N: MacOS:8.1-8.6:OTTCP:MacOS 8.1-8.6 (OTTCP) +32768:255:1:48:M*,W0,N: MacOS:9.0-9.2::MacOS 9.0-9.2 +65535:255:1:48:M*,N,N,N,N: MacOS:9.1::MacOS 9.1 (OT 2.7.4) + + +# ----------------- Windows ----------------- + +# Windows TCP/IP stack is a mess. For most recent XP, 2000 and +# even 98, the patchlevel, not the actual OS version, is more +# relevant to the signature. They share the same code, so it would +# seem. Luckily for us, almost all Windows 9x boxes have an +# awkward MSS of 536, which I use to tell one from another +# in most difficult cases. + +8192:32:1:44:M*: Windows:3.11::Windows 3.11 (Tucows) +S44:64:1:64:M*,N,W0,N,N,T0,N,N,S: Windows:95::Windows 95 +8192:128:1:64:M*,N,W0,N,N,T0,N,N,S: Windows:95:b:Windows 95b + +# There were so many tweaking tools and so many stack versions for +# Windows 98 it is no longer possible to tell them from each other +# without some very serious research. Until then, there's an insane +# number of signatures, for your amusement: + +S44:32:1:48:M*,N,N,S: Windows:98:lowTTL:Windows 98 (low TTL) +8192:32:1:48:M*,N,N,S: Windows:98:lowTTL:Windows 98 (low TTL) +%8192:64:1:48:M536,N,N,S: Windows:98::Windows 98 +%8192:128:1:48:M536,N,N,S: Windows:98::Windows 98 +S4:64:1:48:M*,N,N,S: Windows:98::Windows 98 +S6:64:1:48:M*,N,N,S: Windows:98::Windows 98 +S12:64:1:48:M*,N,N,S: Windows:98::Windows 98 +T30:64:1:64:M1460,N,W0,N,N,T0,N,N,S: Windows:98::Windows 98 +32767:64:1:48:M*,N,N,S: Windows:98::Windows 98 +37300:64:1:48:M*,N,N,S: Windows:98::Windows 98 +46080:64:1:52:M*,N,W3,N,N,S: Windows:98:RFC1323:Windows 98 (RFC1323) +65535:64:1:44:M*: Windows:98:noSack:Windows 98 (no sack) +S16:128:1:48:M*,N,N,S: Windows:98::Windows 98 +S16:128:1:64:M*,N,W0,N,N,T0,N,N,S: Windows:98::Windows 98 +S26:128:1:48:M*,N,N,S: Windows:98::Windows 98 +T30:128:1:48:M*,N,N,S: Windows:98::Windows 98 +32767:128:1:52:M*,N,W0,N,N,S: Windows:98::Windows 98 +60352:128:1:48:M*,N,N,S: Windows:98::Windows 98 +60352:128:1:64:M*,N,W2,N,N,T0,N,N,S: Windows:98::Windows 98 + +# What's with 1414 on NT? +T31:128:1:44:M1414: Windows:NT:4.0:Windows NT 4.0 SP6a +64512:128:1:44:M1414: Windows:NT:4.0:Windows NT 4.0 SP6a +8192:128:1:44:M*: Windows:NT:4.0:Windows NT 4.0 (older) + +# Windows XP and 2000. Most of the signatures that were +# either dubious or non-specific (no service pack data) +# were deleted and replaced with generics at the end. + +65535:128:1:48:M*,N,N,S: Windows:2000:SP4:Windows 2000 SP4, XP SP1 +65535:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows 2000 SP4, XP SP1 +%8192:128:1:48:M*,N,N,S: Windows:2000:SP2+:Windows 2000 SP2, XP SP1 (seldom 98 4.10.2222) +%8192:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows 2000 SP2, XP SP1 (seldom 98 4.10.2222) +S20:128:1:48:M*,N,N,S: Windows:2000::Windows 2000/XP SP3 +S20:128:1:48:M*,N,N,S: Windows:XP:SP3:Windows 2000/XP SP3 +S45:128:1:48:M*,N,N,S: Windows:2000:SP4:Windows 2000 SP4, XP SP 1 +S45:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows 2000 SP4, XP SP 1 +40320:128:1:48:M*,N,N,S: Windows:2000:SP4:Windows 2000 SP4 + +S6:128:1:48:M*,N,N,S: Windows:2000:SP2:Windows XP, 2000 SP2+ +S6:128:1:48:M*,N,N,S: Windows:XP::Windows XP, 2000 SP2+ +S12:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows XP SP1 +S44:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows Pro SP1, 2000 SP3 +S44:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows Pro SP1, 2000 SP3 +64512:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows SP1, 2000 SP3 +64512:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows SP1, 2000 SP3 +32767:128:1:48:M*,N,N,S: Windows:2000:SP4:Windows SP1, 2000 SP4 +32767:128:1:48:M*,N,N,S: Windows:XP:SP1:Windows SP1, 2000 SP4 + +8192:128:1:52:M*,N,W2,N,N,S: Windows:Vista::Windows Vista/7 + +# Odds, ends, mods: + +S52:128:1:48:M1260,N,N,S: Windows:2000:cisco:Windows XP/2000 via Cisco +S52:128:1:48:M1260,N,N,S: Windows:XP:cisco:Windows XP/2000 via Cisco +65520:128:1:48:M*,N,N,S: Windows:XP::Windows XP bare-bone +16384:128:1:52:M536,N,W0,N,N,S: Windows:2000:ZoneAlarm:Windows 2000 w/ZoneAlarm? +2048:255:0:40:.: Windows:.NET::Windows .NET Enterprise Server + +44620:64:0:48:M*,N,N,S: Windows:ME::Windows ME no SP (?) +S6:255:1:48:M536,N,N,S: Windows:95:winsock2:Windows 95 winsock 2 +32768:32:1:52:M1460,N,W0,N,N,S: Windows:2003:AS:Windows 2003 AS + + +# No need to be more specific, it passes: +# *:128:1:48:M*,N,N,S:U:-Windows:XP/2000 while downloading (leak!) XXX quirk +# there is an equiv similar generic sig w/o the quirk + +# ----------------- HP/UX ------------------- + +32768:64:1:44:M*: HP-UX:B.10.20::HP-UX B.10.20 +32768:64:0:48:M*,W0,N: HP-UX:11.0::HP-UX 11.0 +32768:64:1:48:M*,W0,N: HP-UX:11.10::HP-UX 11.0 or 11.11 +32768:64:1:48:M*,W0,N: HP-UX:11.11::HP-UX 11.0 or 11.11 + +# Whoa. Hardcore WSS. +0:64:0:48:M*,W0,N: HP-UX:B.11.00:A:HP-UX B.11.00 A (RFC1323) + +# ----------------- RiscOS ------------------ + +# We don't yet support the ?12 TCP option +#16384:64:1:68:M1460,N,W0,N,N,T,N,N,?12: RISCOS:3.70-4.36::RISC OS 3.70-4.36 +12288:32:0:44:M536: RISC OS:3.70:4.10:RISC OS 3.70 inet 4.10 + +# XXX quirk +# 4096:64:1:56:M1460,N,N,T:T: RISC OS:3.70:freenet:RISC OS 3.70 freenet 2.00 + + + +# ----------------- BSD/OS ------------------ + +# Once again, power of two WSS is also shared by MacOS X with DF set +8192:64:1:60:M1460,N,W0,N,N,T: BSD/OS:3.1::BSD/OS 3.1-4.3 (or MacOS X 10.2 w/DF) +8192:64:1:60:M1460,N,W0,N,N,T: BSD/OS:4.0-4.3::BSD/OS 3.1-4.3 (or MacOS X 10.2) + + +# ---------------- NewtonOS ----------------- + +4096:64:0:44:M1420: NewtonOS:2.1::NewtonOS 2.1 + +# ---------------- NeXTSTEP ----------------- + +S4:64:0:44:M1024: NeXTSTEP:3.3::NeXTSTEP 3.3 +S8:64:0:44:M512: NeXTSTEP:3.3::NeXTSTEP 3.3 + +# ------------------ BeOS ------------------- + +1024:255:0:48:M*,N,W0: BeOS:5.0-5.1::BeOS 5.0-5.1 +12288:255:0:44:M1402: BeOS:5.0::BeOS 5.0.x + +# ------------------ OS/400 ----------------- + +8192:64:1:60:M1440,N,W0,N,N,T: OS/400:VR4-VR5::OS/400 VR4/R5 +4096:64:1:60:M1440,N,W0,N,N,T: OS/400:V4R5:CF67032:OS/400 V4R5 + CF67032 + +# XXX quirk +# 28672:64:0:44:M1460:A:OS/390:? + +# ------------------ ULTRIX ----------------- + +16384:64:0:40:.: ULTRIX:4.5::ULTRIX 4.5 + +# ------------------- QNX ------------------- + +S16:64:0:44:M512: QNX:::QNX demodisk + +# ------------------ Novell ----------------- + +16384:128:1:44:M1460: Novell:NW:5.0:Novel Netware 5.0 +6144:128:1:44:M1460: Novell:IW:4.11:Novell IntranetWare 4.11 +6144:128:1:44:M1368: Novell:BM::Novell BorderManager ? + +6144:128:1:52:M*,W0,N,S,N,N: Novell:Netware:6:Novell Netware 6 SP3 + + +# ----------------- SCO ------------------ +S3:64:1:60:M1460,N,W0,N,N,T: SCO:UnixWare:7.1:SCO UnixWare 7.1 +S17:64:1:60:M1380,N,W0,N,N,T: SCO:UnixWare:7.1:SCO UnixWare 7.1.3 MP3 +S23:64:1:44:M1380: SCO:OpenServer:5.0:SCO OpenServer 5.0 + +# ------------------- DOS ------------------- + +2048:255:0:44:M536: DOS:WATTCP:1.05:DOS Arachne via WATTCP/1.05 +T2:255:0:44:M984: DOS:WATTCP:1.05Arachne:Arachne via WATTCP/1.05 (eepro) + +# ------------------ OS/2 ------------------- + +S56:64:0:44:M512: OS/2:4::OS/2 4 +28672:64:0:44:M1460: OS/2:4::OS/2 Warp 4.0 + +# ----------------- TOPS-20 ----------------- + +# Another hardcore MSS, one of the ACK leakers hunted down. +# XXX QUIRK 0:64:0:44:M1460:A:TOPS-20:version 7 +0:64:0:44:M1460: TOPS-20:7::TOPS-20 version 7 + +# ----------------- FreeMiNT ---------------- + +S44:255:0:44:M536: FreeMiNT:1:16A:FreeMiNT 1 patch 16A (Atari) + +# ------------------ AMIGA ------------------ + +# XXX TCP option 12 +# S32:64:1:56:M*,N,N,S,N,N,?12:.:AMIGA:3.9 BB2 with Miami stack + +# ------------------ Plan9 ------------------ + +65535:255:0:48:M1460,W0,N: Plan9:4::Plan9 edition 4 + +# ----------------- AMIGAOS ----------------- + +16384:64:1:48:M1560,N,N,S: AMIGAOS:3.9::AMIGAOS 3.9 BB2 MiamiDX + +########################################### +# Appliance / embedded / other signatures # +########################################### + +# ---------- Firewalls / routers ------------ + +S12:64:1:44:M1460: @Checkpoint:::Checkpoint (unknown 1) +S12:64:1:48:N,N,S,M1460: @Checkpoint:::Checkpoint (unknown 2) +4096:32:0:44:M1460: ExtremeWare:4.x::ExtremeWare 4.x + +# XXX TCP option 12 +# S32:64:0:68:M512,N,W0,N,N,T,N,N,?12:.:Nokia:IPSO w/Checkpoint NG FP3 +# S16:64:0:68:M1024,N,W0,N,N,T,N,N,?12:.:Nokia:IPSO 3.7 build 026 + +S4:64:1:60:W0,N,S,T,M1460: FortiNet:FortiGate:50:FortiNet FortiGate 50 + +8192:64:1:44:M1460: Eagle:::Eagle Secure Gateway + +S52:128:1:48:M1260,N,N,N,N: LinkSys:WRV54G::LinkSys WRV54G VPN router + + + +# ------- Switches and other stuff ---------- + +4128:255:0:44:M*: Cisco:::Cisco Catalyst 3500, 7500 etc +S8:255:0:44:M*: Cisco:12008::Cisco 12008 +60352:128:1:64:M1460,N,W2,N,N,T,N,N,S: Alteon:ACEswitch::Alteon ACEswitch +64512:128:1:44:M1370: Nortel:Contivity Client::Nortel Conectivity Client + + +# ---------- Caches and whatnots ------------ + +S4:64:1:52:M1460,N,N,S,N,W0: AOL:web cache::AOL web cache + +32850:64:1:64:N,W1,N,N,T,N,N,S,M*: NetApp:5.x::NetApp Data OnTap 5.x +16384:64:1:64:M1460,N,N,S,N,W0,N: NetApp:5.3:1:NetApp 5.3.1 +65535:64:0:64:M1460,N,N,S,N,W*,N,N,T: NetApp:5.3-5.5::NetApp 5.3-5.5 +65535:64:0:60:M1460,N,W0,N,N,T: NetApp:CacheFlow::NetApp CacheFlow +8192:64:1:64:M1460,N,N,S,N,W0,N,N,T: NetApp:5.2:1:NetApp NetCache 5.2.1 +20480:64:1:64:M1460,N,N,S,N,W0,N,N,T: NetApp:4.1::NetApp NetCache4.1 + +65535:64:0:60:M1460,N,W0,N,N,T: CacheFlow:4.1::CacheFlow CacheOS 4.1 +8192:64:0:60:M1380,N,N,N,N,N,N,T: CacheFlow:1.1::CacheFlow CacheOS 1.1 + +S4:64:0:48:M1460,N,N,S: Cisco:Content Engine::Cisco Content Engine + +27085:128:0:40:.: Dell:PowerApp cache::Dell PowerApp (Linux-based) + +65535:255:1:48:N,W1,M1460: Inktomi:crawler::Inktomi crawler +S1:255:1:60:M1460,S,T,N,W0: LookSmart:ZyBorg::LookSmart ZyBorg + +16384:255:0:40:.: Proxyblocker:::Proxyblocker (what's this?) + +65535:255:0:48:M*,N,N,S: Redline:::Redline T|X 2200 + +32696:128:0:40:M1460: Spirent:Avalanche::Spirent Web Avalanche HTTP benchmarking engine + +# ----------- Embedded systems -------------- + +S9:255:0:44:M536: PalmOS:Tungsten:C:PalmOS Tungsten C +S5:255:0:44:M536: PalmOS:3-4::PalmOS 3/4 +S4:255:0:44:M536: PalmOS:3:5:PalmOS 3.5 +2948:255:0:44:M536: PalmOS:3:5:PalmOS 3.5.3 (Handera) +S29:255:0:44:M536: PalmOS:5::PalmOS 5.0 +16384:255:0:44:M1398: PalmOS:5.2:Clie:PalmOS 5.2 (Clie) +S14:255:0:44:M1350: PalmOS:5.2:Treo:PalmOS 5.2.1 (Treo) + +S23:64:1:64:N,W1,N,N,T,N,N,S,M1460: SymbianOS:7::SymbianOS 7 + +8192:255:0:44:M1460: SymbianOS:6048::Symbian OS 6048 (Nokia 7650?) +8192:255:0:44:M536: SymbianOS:9210::Symbian OS (Nokia 9210?) +S22:64:1:56:M1460,T,S: SymbianOS:P800::Symbian OS ? (SE P800?) +S36:64:1:56:M1360,T,S: SymbianOS:6600::Symbian OS 60xx (Nokia 6600?) + + +# Perhaps S4? +5840:64:1:60:M1452,S,T,N,W1: Zaurus:3.10::Zaurus 3.10 + +32768:128:1:64:M1460,N,W0,N,N,T0,N,N,S: PocketPC:2002::PocketPC 2002 + +S1:255:0:44:M346: Contiki:1.1:rc0:Contiki 1.1-rc0 + +4096:128:0:44:M1460: Sega:Dreamcast:3.0:Sega Dreamcast Dreamkey 3.0 +T5:64:0:44:M536: Sega:Dreamcast:HKT-3020:Sega Dreamcast HKT-3020 (browser disc 51027) +S22:64:1:44:M1460: Sony:PS2::Sony Playstation 2 (SOCOM?) + +S12:64:0:44:M1452: AXIS:5600:v5.64:AXIS Printer Server 5600 v5.64 + +3100:32:1:44:M1460: Windows:CE:2.0:Windows CE 2.0 + +#################### +# Fancy signatures # +#################### + +1024:64:0:40:.: *NMAP:syn scan:1:NMAP syn scan (1) +2048:64:0:40:.: *NMAP:syn scan:2:NMAP syn scan (2) +3072:64:0:40:.: *NMAP:syn scan:3:NMAP syn scan (3) +4096:64:0:40:.: *NMAP:syn scan:4:NMAP syn scan (4) + +# Requires quirks support +# 1024:64:0:40:.:A:*NMAP:TCP sweep probe (1) +# 2048:64:0:40:.:A:*NMAP:TCP sweep probe (2) +# 3072:64:0:40:.:A:*NMAP:TCP sweep probe (3) +# 4096:64:0:40:.:A:*NMAP:TCP sweep probe (4) + +1024:64:0:60:W10,N,M265,T: *NMAP:OS:1:NMAP OS detection probe (1) +2048:64:0:60:W10,N,M265,T: *NMAP:OS:2:NMAP OS detection probe (2) +3072:64:0:60:W10,N,M265,T: *NMAP:OS:3:NMAP OS detection probe (3) +4096:64:0:60:W10,N,M265,T: *NMAP:OS:4:NMAP OS detection probe (4) + +32767:64:0:40:.: *NAST:::NASTsyn scan + +# Requires quirks support +# 12345:255:0:40:.:A:-p0f:sendsyn utility + + +##################################### +# Generic signatures - just in case # +##################################### + +#*:64:1:60:M*,N,W*,N,N,T: @FreeBSD:4.0-4.9::FreeBSD 4.x/5.x +#*:64:1:60:M*,N,W*,N,N,T: @FreeBSD:5.0-5.1::FreeBSD 4.x/5.x + +*:128:1:52:M*,N,W0,N,N,S: @Windows:XP:RFC1323:Windows XP/2000 (RFC1323 no tstamp) +*:128:1:52:M*,N,W0,N,N,S: @Windows:2000:RFC1323:Windows XP/2000 (RFC1323 no tstamp) +*:128:1:52:M*,N,W*,N,N,S: @Windows:XP:RFC1323:Windows XP/2000 (RFC1323 no tstamp) +*:128:1:52:M*,N,W*,N,N,S: @Windows:2000:RFC1323:Windows XP/2000 (RFC1323 no tstamp) +*:128:1:64:M*,N,W0,N,N,T0,N,N,S: @Windows:XP:RFC1323:Windows XP/2000 (RFC1323) +*:128:1:64:M*,N,W0,N,N,T0,N,N,S: @Windows:2000:RFC1323:Windows XP/2000 (RFC1323) +*:128:1:64:M*,N,W*,N,N,T0,N,N,S: @Windows:XP:RFC1323:Windows XP (RFC1323, w+) +*:128:1:48:M536,N,N,S: @Windows:98::Windows 98 +*:128:1:48:M*,N,N,S: @Windows:XP::Windows XP/2000 +*:128:1:48:M*,N,N,S: @Windows:2000::Windows XP/2000 + + diff --git a/nftables/router.nft b/nftables/router.nft new file mode 100644 index 0000000..6300a55 --- /dev/null +++ b/nftables/router.nft @@ -0,0 +1,16 @@ +# Sample configuration snippet for nftables service. +# Meant to be included by main.nft, not for direct use. + +# a common table for both IPv4 and IPv6 +table inet nftables_svc { + + # base-chain for traffic forwarded by this host + # re-uses 'allow' chain from main.nft + chain FORWARD { + type filter hook forward priority filter + 20 + policy accept + + jump allow + reject with icmpx type host-unreachable + } +} diff --git a/nsswitch.conf b/nsswitch.conf new file mode 100644 index 0000000..447bdae --- /dev/null +++ b/nsswitch.conf @@ -0,0 +1,70 @@ +# +# /etc/nsswitch.conf +# +# Name Service Switch config file. This file should be +# sorted with the most-used services at the beginning. +# +# Valid databases are: aliases, ethers, group, gshadow, hosts, +# initgroups, netgroup, networks, passwd, protocols, publickey, +# rpc, services, and shadow. +# +# Valid service provider entries include (in alphabetical order): +# +# compat Use /etc files plus *_compat pseudo-db +# db Use the pre-processed /var/db files +# dns Use DNS (Domain Name Service) +# files Use the local files in /etc +# hesiod Use Hesiod (DNS) for user lookups +# +# See `info libc 'NSS Basics'` for more information. +# +# Commonly used alternative service providers (may need installation): +# +# ldap Use LDAP directory server +# myhostname Use systemd host names +# mymachines Use systemd machine names +# mdns*, mdns*_minimal Use Avahi mDNS/DNS-SD +# resolve Use systemd resolved resolver +# sss Use System Security Services Daemon (sssd) +# systemd Use systemd for dynamic user option +# winbind Use Samba winbind support +# wins Use Samba wins support +# wrapper Use wrapper module for testing +# +# Notes: +# +# 'sssd' performs its own 'files'-based caching, so it should generally +# come before 'files'. +# +# WARNING: Running nscd with a secondary caching service like sssd may +# lead to unexpected behaviour, especially with how long +# entries are cached. +# +# Installation instructions: +# +# To use 'db', install the appropriate package(s) (provide 'makedb' and +# libnss_db.so.*), and place the 'db' in front of 'files' for entries +# you want to be looked up first in the databases, like this: +# +# passwd: db files +# shadow: db files +# group: db files + +# In order of likelihood of use to accelerate lookup. +passwd: sss files systemd +shadow: files +group: sss files systemd +hosts: files dns myhostname +services: files sss +netgroup: sss +automount: files sss + +aliases: files +ethers: files +gshadow: files +# Allow initgroups to default to the setting for group. +# initgroups: files +networks: files dns +protocols: files +publickey: files +rpc: files diff --git a/openldap/ldap.conf b/openldap/ldap.conf new file mode 100644 index 0000000..02c595f --- /dev/null +++ b/openldap/ldap.conf @@ -0,0 +1,28 @@ +# +# LDAP Defaults +# + +# See ldap.conf(5) for details +# This file should be world readable but not world writable. + +#BASE dc=example,dc=com +#URI ldap://ldap.example.com ldap://ldap-master.example.com:666 + +#SIZELIMIT 12 +#TIMELIMIT 15 +#DEREF never + +# When no CA certificates are specified the Shared System Certificates +# are in use. In order to have these available along with the ones specified +# by TLS_CACERTDIR one has to include them explicitly: +#TLS_CACERT /etc/pki/tls/cert.pem + +# System-wide Crypto Policies provide up to date cipher suite which should +# be used unless one needs a finer grinded selection of ciphers. Hence, the +# PROFILE=SYSTEM value represents the default behavior which is in place +# when no explicit setting is used. (see openssl-ciphers(1) for more info) +#TLS_CIPHER_SUITE PROFILE=SYSTEM + +# Turning this off breaks GSSAPI used with krb5 when rdns = false +SASL_NOCANON on + diff --git a/os-release b/os-release new file mode 120000 index 0000000..c4c75b4 --- /dev/null +++ b/os-release @@ -0,0 +1 @@ +../usr/lib/os-release \ No newline at end of file diff --git a/pam.d/config-util b/pam.d/config-util new file mode 100644 index 0000000..8e70d9a --- /dev/null +++ b/pam.d/config-util @@ -0,0 +1,8 @@ +#%PAM-1.0 +auth sufficient pam_rootok.so +auth sufficient pam_timestamp.so +auth include system-auth +account required pam_permit.so +session required pam_permit.so +session optional pam_xauth.so +session optional pam_timestamp.so diff --git a/pam.d/crond b/pam.d/crond new file mode 100644 index 0000000..560529d --- /dev/null +++ b/pam.d/crond @@ -0,0 +1,11 @@ +# +# The PAM configuration file for the cron daemon +# +# +# Although no PAM authentication is called, auth modules +# are used for credential setting +auth include system-auth +account required pam_access.so +account include system-auth +session required pam_loginuid.so +session include system-auth diff --git a/pam.d/fingerprint-auth b/pam.d/fingerprint-auth new file mode 100644 index 0000000..aae6ecc --- /dev/null +++ b/pam.d/fingerprint-auth @@ -0,0 +1,19 @@ +#%PAM-1.0 +# This file is auto-generated. +# User changes will be destroyed the next time authselect is run. +auth required pam_env.so +auth sufficient pam_fprintd.so +auth required pam_deny.so + +account required pam_unix.so +account sufficient pam_localuser.so +account sufficient pam_succeed_if.so uid < 500 quiet +account required pam_permit.so + +password required pam_deny.so + +session optional pam_keyinit.so revoke +session required pam_limits.so +-session optional pam_systemd.so +session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid +session required pam_unix.so diff --git a/pam.d/login b/pam.d/login new file mode 100644 index 0000000..517b798 --- /dev/null +++ b/pam.d/login @@ -0,0 +1,16 @@ +#%PAM-1.0 +auth substack system-auth +auth include postlogin +account required pam_nologin.so +account include system-auth +password include system-auth +# pam_selinux.so close should be the first session rule +session required pam_selinux.so close +session required pam_loginuid.so +# pam_selinux.so open should only be followed by sessions to be executed in the user context +session required pam_selinux.so open +session required pam_namespace.so +session optional pam_keyinit.so force revoke +session include system-auth +session include postlogin +-session optional pam_ck_connector.so diff --git a/pam.d/mock b/pam.d/mock new file mode 100644 index 0000000..4b566af --- /dev/null +++ b/pam.d/mock @@ -0,0 +1,13 @@ +#%PAM-1.0 +auth sufficient pam_rootok.so +auth sufficient pam_succeed_if.so user ingroup mock use_uid quiet +# Uncomment the following line to implicitly trust users in the "wheel" group. +#auth sufficient pam_wheel.so trust use_uid +# Uncomment the following line to require a user to be in the "wheel" group. +#auth required pam_wheel.so use_uid +auth include system-auth +account sufficient pam_succeed_if.so user ingroup mock use_uid quiet +account include system-auth +password include system-auth +session include system-auth +session optional pam_xauth.so diff --git a/pam.d/other b/pam.d/other new file mode 100644 index 0000000..c286c82 --- /dev/null +++ b/pam.d/other @@ -0,0 +1,5 @@ +#%PAM-1.0 +auth required pam_deny.so +account required pam_deny.so +password required pam_deny.so +session required pam_deny.so diff --git a/pam.d/passwd b/pam.d/passwd new file mode 100644 index 0000000..fd03d03 --- /dev/null +++ b/pam.d/passwd @@ -0,0 +1,5 @@ +#%PAM-1.0 +# This tool only uses the password stack. +password substack system-auth +-password optional pam_gnome_keyring.so use_authtok +password substack postlogin diff --git a/pam.d/password-auth b/pam.d/password-auth new file mode 100644 index 0000000..5de6f4d --- /dev/null +++ b/pam.d/password-auth @@ -0,0 +1,18 @@ +#%PAM-1.0 +# This file is auto-generated. +# User changes will be destroyed the next time authselect is run. +auth required pam_env.so +auth sufficient pam_unix.so try_first_pass nullok +auth required pam_deny.so + +account required pam_unix.so + +password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= +password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow +password required pam_deny.so + +session optional pam_keyinit.so revoke +session required pam_limits.so +-session optional pam_systemd.so +session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid +session required pam_unix.so diff --git a/pam.d/postgresql b/pam.d/postgresql new file mode 100644 index 0000000..1d78594 --- /dev/null +++ b/pam.d/postgresql @@ -0,0 +1,3 @@ +#%PAM-1.0 +auth include password-auth +account include password-auth diff --git a/pam.d/postlogin b/pam.d/postlogin new file mode 100644 index 0000000..2ce9af4 --- /dev/null +++ b/pam.d/postlogin @@ -0,0 +1,8 @@ +#%PAM-1.0 +# This file is auto-generated. +# User changes will be destroyed the next time authselect is run. + +session optional pam_umask.so silent +session [success=1 default=ignore] pam_succeed_if.so service !~ gdm* service !~ su* quiet +session [default=1] pam_lastlog.so nowtmp showfailed +session optional pam_lastlog.so silent noupdate showfailed diff --git a/pam.d/remote b/pam.d/remote new file mode 100644 index 0000000..100ec98 --- /dev/null +++ b/pam.d/remote @@ -0,0 +1,15 @@ +#%PAM-1.0 +auth substack password-auth +auth include postlogin +account required pam_nologin.so +account include password-auth +password include password-auth +# pam_selinux.so close should be the first session rule +session required pam_selinux.so close +session required pam_loginuid.so +# pam_selinux.so open should only be followed by sessions to be executed in the user context +session required pam_selinux.so open +session required pam_namespace.so +session optional pam_keyinit.so force revoke +session include password-auth +session include postlogin diff --git a/pam.d/runuser b/pam.d/runuser new file mode 100644 index 0000000..37f0e84 --- /dev/null +++ b/pam.d/runuser @@ -0,0 +1,5 @@ +#%PAM-1.0 +auth sufficient pam_rootok.so +session optional pam_keyinit.so revoke +session required pam_limits.so +session required pam_unix.so diff --git a/pam.d/runuser-l b/pam.d/runuser-l new file mode 100644 index 0000000..7a9a48c --- /dev/null +++ b/pam.d/runuser-l @@ -0,0 +1,5 @@ +#%PAM-1.0 +auth include runuser +session optional pam_keyinit.so force revoke +-session optional pam_systemd.so +session include runuser diff --git a/pam.d/screen b/pam.d/screen new file mode 100644 index 0000000..143c372 --- /dev/null +++ b/pam.d/screen @@ -0,0 +1,2 @@ +#%PAM-1.0 +auth include system-auth diff --git a/pam.d/smartcard-auth b/pam.d/smartcard-auth new file mode 100644 index 0000000..9572770 --- /dev/null +++ b/pam.d/smartcard-auth @@ -0,0 +1,19 @@ +#%PAM-1.0 +# This file is auto-generated. +# User changes will be destroyed the next time authselect is run. +auth required pam_env.so +auth [success=done ignore=ignore default=die] pam_pkcs11.so wait_for_card +auth required pam_deny.so + +account required pam_unix.so +account sufficient pam_localuser.so +account sufficient pam_succeed_if.so uid < 500 quiet +account required pam_permit.so + +password optional pam_pkcs11.so + +session optional pam_keyinit.so revoke +session required pam_limits.so +-session optional pam_systemd.so +session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid +session required pam_unix.so diff --git a/pam.d/sshd b/pam.d/sshd new file mode 100644 index 0000000..780f62e --- /dev/null +++ b/pam.d/sshd @@ -0,0 +1,17 @@ +#%PAM-1.0 +auth substack password-auth +auth include postlogin +account required pam_sepermit.so +account required pam_nologin.so +account include password-auth +password include password-auth +# pam_selinux.so close should be the first session rule +session required pam_selinux.so close +session required pam_loginuid.so +# pam_selinux.so open should only be followed by sessions to be executed in the user context +session required pam_selinux.so open env_params +session required pam_namespace.so +session optional pam_keyinit.so force revoke +session optional pam_motd.so +session include password-auth +session include postlogin diff --git a/pam.d/sssd-shadowutils b/pam.d/sssd-shadowutils new file mode 100644 index 0000000..626c7d0 --- /dev/null +++ b/pam.d/sssd-shadowutils @@ -0,0 +1,6 @@ +#%PAM-1.0 +auth [success=done ignore=ignore default=die] pam_unix.so nullok try_first_pass +auth required pam_deny.so + +account required pam_unix.so +account required pam_permit.so diff --git a/pam.d/su b/pam.d/su new file mode 100644 index 0000000..5733201 --- /dev/null +++ b/pam.d/su @@ -0,0 +1,15 @@ +#%PAM-1.0 +auth required pam_env.so +auth sufficient pam_rootok.so +# Uncomment the following line to implicitly trust users in the "wheel" group. +#auth sufficient pam_wheel.so trust use_uid +# Uncomment the following line to require a user to be in the "wheel" group. +#auth required pam_wheel.so use_uid +auth substack system-auth +auth include postlogin +account sufficient pam_succeed_if.so uid = 0 use_uid quiet +account include system-auth +password include system-auth +session include system-auth +session include postlogin +session optional pam_xauth.so diff --git a/pam.d/su-l b/pam.d/su-l new file mode 100644 index 0000000..656a139 --- /dev/null +++ b/pam.d/su-l @@ -0,0 +1,6 @@ +#%PAM-1.0 +auth include su +account include su +password include su +session optional pam_keyinit.so force revoke +session include su diff --git a/pam.d/sudo b/pam.d/sudo new file mode 100644 index 0000000..fcb7a46 --- /dev/null +++ b/pam.d/sudo @@ -0,0 +1,5 @@ +#%PAM-1.0 +auth include system-auth +account include system-auth +password include system-auth +session include system-auth diff --git a/pam.d/sudo-i b/pam.d/sudo-i new file mode 100644 index 0000000..3c63733 --- /dev/null +++ b/pam.d/sudo-i @@ -0,0 +1,6 @@ +#%PAM-1.0 +auth include sudo +account include sudo +password include sudo +session optional pam_keyinit.so force revoke +session include sudo diff --git a/pam.d/system-auth b/pam.d/system-auth new file mode 100644 index 0000000..5de6f4d --- /dev/null +++ b/pam.d/system-auth @@ -0,0 +1,18 @@ +#%PAM-1.0 +# This file is auto-generated. +# User changes will be destroyed the next time authselect is run. +auth required pam_env.so +auth sufficient pam_unix.so try_first_pass nullok +auth required pam_deny.so + +account required pam_unix.so + +password requisite pam_pwquality.so try_first_pass local_users_only retry=3 authtok_type= +password sufficient pam_unix.so try_first_pass use_authtok nullok sha512 shadow +password required pam_deny.so + +session optional pam_keyinit.so revoke +session required pam_limits.so +-session optional pam_systemd.so +session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid +session required pam_unix.so diff --git a/pam.d/systemd-user b/pam.d/systemd-user new file mode 100644 index 0000000..3a4cd2e --- /dev/null +++ b/pam.d/systemd-user @@ -0,0 +1,14 @@ +# This file is part of systemd. +# +# Used by systemd --user instances. + +account sufficient pam_unix.so no_pass_expiry +account include system-auth + +session required pam_selinux.so close +session required pam_selinux.so nottys open +session required pam_loginuid.so +session optional pam_keyinit.so force revoke +session optional pam_umask.so silent +session required pam_namespace.so +session include system-auth diff --git a/pam.d/vlock b/pam.d/vlock new file mode 100644 index 0000000..d2d47e5 --- /dev/null +++ b/pam.d/vlock @@ -0,0 +1,3 @@ +#%PAM-1.0 +auth include system-auth +account required pam_permit.so diff --git a/passwd b/passwd new file mode 100644 index 0000000..bbaa151 --- /dev/null +++ b/passwd @@ -0,0 +1,27 @@ +root:x:0:0:root:/root:/bin/bash +bin:x:1:1:bin:/bin:/sbin/nologin +daemon:x:2:2:daemon:/sbin:/sbin/nologin +adm:x:3:4:adm:/var/adm:/sbin/nologin +lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin +sync:x:5:0:sync:/sbin:/bin/sync +shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown +halt:x:7:0:halt:/sbin:/sbin/halt +mail:x:8:12:mail:/var/spool/mail:/sbin/nologin +operator:x:11:0:operator:/root:/sbin/nologin +games:x:12:100:games:/usr/games:/sbin/nologin +ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin +nobody:x:65534:65534:Kernel Overflow User:/:/sbin/nologin +systemd-coredump:x:999:997:systemd Core Dumper:/:/sbin/nologin +dbus:x:81:81:System message bus:/:/sbin/nologin +tss:x:59:59:Account used for TPM access:/dev/null:/sbin/nologin +sssd:x:998:995:User for sssd:/:/sbin/nologin +sshd:x:74:74:Privilege-separated SSH:/usr/share/empty.sshd:/sbin/nologin +chrony:x:997:994::/var/lib/chrony:/sbin/nologin +systemd-oom:x:992:992:systemd Userspace OOM Killer:/:/usr/sbin/nologin +frank:x:1000:1000:Frank Brehm:/home/frank:/bin/bash +postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash +redis:x:991:991:Redis Database Server:/var/lib/redis:/sbin/nologin +netbox:x:990:100:Netbox application user:/opt/netbox:/bin/bash +systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin +rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin +rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin diff --git a/passwd- b/passwd- new file mode 100644 index 0000000..106f6a8 --- /dev/null +++ b/passwd- @@ -0,0 +1,26 @@ +root:x:0:0:root:/root:/bin/bash +bin:x:1:1:bin:/bin:/sbin/nologin +daemon:x:2:2:daemon:/sbin:/sbin/nologin +adm:x:3:4:adm:/var/adm:/sbin/nologin +lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin +sync:x:5:0:sync:/sbin:/bin/sync +shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown +halt:x:7:0:halt:/sbin:/sbin/halt +mail:x:8:12:mail:/var/spool/mail:/sbin/nologin +operator:x:11:0:operator:/root:/sbin/nologin +games:x:12:100:games:/usr/games:/sbin/nologin +ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin +nobody:x:65534:65534:Kernel Overflow User:/:/sbin/nologin +systemd-coredump:x:999:997:systemd Core Dumper:/:/sbin/nologin +dbus:x:81:81:System message bus:/:/sbin/nologin +tss:x:59:59:Account used for TPM access:/dev/null:/sbin/nologin +sssd:x:998:995:User for sssd:/:/sbin/nologin +sshd:x:74:74:Privilege-separated SSH:/usr/share/empty.sshd:/sbin/nologin +chrony:x:997:994::/var/lib/chrony:/sbin/nologin +systemd-oom:x:992:992:systemd Userspace OOM Killer:/:/usr/sbin/nologin +frank:x:1000:1000:Frank Brehm:/home/frank:/bin/bash +postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash +redis:x:991:991:Redis Database Server:/var/lib/redis:/sbin/nologin +netbox:x:990:100:Netbox application user:/opt/netbox:/bin/bash +systemd-network:x:192:192:systemd Network Management:/:/sbin/nologin +rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin diff --git a/pki/ca-trust/README b/pki/ca-trust/README new file mode 100644 index 0000000..2d9971c --- /dev/null +++ b/pki/ca-trust/README @@ -0,0 +1,4 @@ +This directory /etc/pki/ca-trust is used by a system of consolidated +CA certificates. + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/ca-legacy.conf b/pki/ca-trust/ca-legacy.conf new file mode 100644 index 0000000..56f028f --- /dev/null +++ b/pki/ca-trust/ca-legacy.conf @@ -0,0 +1,24 @@ +# The upstream Mozilla.org project tests all changes to the root CA +# list with the NSS (Network Security Services) library. +# +# Occassionally, changes might cause compatibility issues with +# other cryptographic libraries, such as openssl or gnutls. +# +# The package maintainers of the CA certificates package might decide +# to temporarily keep certain (legacy) root CA certificates trusted, +# until incompatibility issues can be resolved. +# +# Using this configuration file it is possible to opt-out of the +# compatibility choices made by the package maintainer. +# +# legacy=default : +# This configuration uses the choices made by the package maintainer. +# It may keep root CA certificate as trusted, which the upstream +# Mozilla.org project has already marked as no longer trusted. +# The set of CA certificates that are being kept enabled may change +# between package versions. +# +# legacy=disable : +# Follow all removal decisions made by Mozilla.org +# +legacy=default diff --git a/pki/ca-trust/extracted/README b/pki/ca-trust/extracted/README new file mode 100644 index 0000000..06905ba --- /dev/null +++ b/pki/ca-trust/extracted/README @@ -0,0 +1,12 @@ +This directory /etc/pki/ca-trust/extracted/ contains +CA certificate bundle files which are automatically created. + +If your application isn't able to load the PKCS#11 module p11-kit-trust.so, +then you can use these files in your application to load a list of global +root CA certificates. + +Please never manually edit the files stored in this directory, +because your changes will be lost and the files automatically overwritten, +each time the update-ca-trust command gets executed. + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/extracted/edk2/README b/pki/ca-trust/extracted/edk2/README new file mode 100644 index 0000000..ac669b6 --- /dev/null +++ b/pki/ca-trust/extracted/edk2/README @@ -0,0 +1,13 @@ +This directory /etc/pki/ca-trust/extracted/edk2/ contains a +CA certificate bundle file which is automatically created +based on the information found in the +/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ +directories. + +The file is in the EDK2 (EFI Development Kit II) file format. + +Please never manually edit the files stored in this directory, +because your changes will be lost and the files automatically overwritten, +each time the update-ca-trust command gets executed. + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/extracted/edk2/cacerts.bin b/pki/ca-trust/extracted/edk2/cacerts.bin new file mode 100644 index 0000000000000000000000000000000000000000..6a9a48ad3576467e74af0948c9564df38f16fe28 GIT binary patch literal 164317 zcmd431y~%*wg!s326uNG+}#Q8?(P;WK|`t9lprPY?V8e1R}TvLppOLyoD4g>Q2Zvz?xM3HxH7V`8~ zG`^*owbDh>4G;i50tkR?$^-`k1p|Z8|6G?Z>YKX=K!k#&4U!7FKm-MagaiSIFh2pH zK!K}4fFr;Pi;Ai%3rlM=Got{I9`?Z_Kr23#e%Q^72!Mas1BU?dy$KJ1eP}|Vfr+aC z2(b{EnE~v;7dI;>E2lOVA}fHIg_Zed^WQQ?02t}xTL*;%0S^E}1_1d@4M5Mhl?I2k#G z`2j_WL-)|+eU!E?Ip;*qcrUC|!x5-+V1@ULoL~RVh(q_~bS+ZAu=uM&Jj+7<%~LVk z=B!V>;4N6yrE#|pn&oX4GIe31aJVz{?P`21qoTYx;pYOF}b_DGa8wgxG|c!FqvD~ zni-keS=loQJDXTqxjDEnnV31dTA5p!7?}ba&PG;V563bynmD@xi2iXk&>*y*S936N zas1FVA;01v@ z$RMx*n0~)MBLLLp;Sgeo08nc{0H`_eZ43ng+yPVoP)*>Q^p9Ht0|U0u2?Ib;K!ib_ zfw+P=fH;F#ftZ3A0pG;Hw;AwL6!_^3?6U$f2fj^!eI~%|35Y$gPZ`+S1M&LDv9`cA zG4NWVz?VAk8#VB|1@L_P@8>-9{kWzoaGwcquLFoJ@NEIS#zUVc@crM7CJsFM;XGI1 z{XC5S<8J7`pCt_<0o*Equz_%Z06>_5FLvNJaS$31#_#=#AS%G^!<`U=SOTx$3gQUD z1HuG+xqp8#e*eErK-_@Gn}N6h0RMPKpqS*p5dvE?3o92}BNHnJdjk_jOIJI9+QUO9 zf{+Ku0%S6!G9`kg@}`e2{^58W&WK z`5+vDw0)c~ys?VC2>w*sHpEGO^A$eC=CN4a<>dl)JP43;LGAEu(Po2Cf})QVeM!r5 zAaK*&R5}}IQM#*Vtl4UIvx~5DOqG;6RL?+Q+l}36U<}f=N@{&dGgJYj;2#N{Oz*C^ z;Nr38z|c#`dZF+MbG^e6=c$A@OQ$jFD#+&O3P+|Xg7-Gn#NJxVT+)TNQe zSt-T?6-8``pAgWFwR|{s^v`uPY=NvvNrwKCh>o!uZk{Bd@uV2>G< zJ{>22e@ShrZF>MQa22aA`$gWo8U@sTUt6%Q&~#s%pxPpPXMJExwO+s1OHk+i;B^Cn zvYJ<4C>Pd0CT|gfNoLR%+7;;x?25blCQ>D{=+UkO?sp`bGsP1V%uRl#ny9$CoAT}- z%!q_X*Hp@2di|M;VSY1mJUlq}OkET+iT*TKy_&7wh_m~XrXOBrLe`B|_!jE<5b{$s zHVN9-LA+VNP=NQ4KPW%~aQjyZ0QnLS0B-Yx0wC+fgaa%%x}XSfJ5>X%pdU*YJdg?S zGCwxz%&6aC3TW_QB;@5(8I(okm~p;KDv%YR2#XRw5C!5tx*jM1fQuQx!p+Ri&dtv8 zodN)ufv@j>+W)tU|DEk`bn^3(4YK#`LbGf8;*AfI5J`_f)`XHQRD@d>9CDeWZvAcj zdBp4Jhyn^dEz}tf#yTY|q9Pa~2rP2VcbqcV3v1k?8n+W4>ED9BT_zm`Z_~VSm)wmM za20JVVGEbza++FG}GamN>-k!X-=0I;NN)*3Dy>0#WNe+d@vPzo+ir5|QUEHwr($OqQg-uvko)y|1>pAUOW|HhL^@}#y z;ggzH`-#7#$Ut$|Sl*B}?yJ3_lixn6T)C-DN*)urc9Me`2qv_4^1d3W-pX_GfBs2c zGCuFz?NttSvtd^qf+WL;cBrZJ zUJ{o>bla*Yzm_=rVf+1G0{s2{YFi(O>|?O~(>7mtcigsbCgZuA7Mu}e_O%8ZCffl7 ze%M(~Aem+TX<_LAG>Ao++J*rBf{UVS;A=R=z`#_UUIechcUuCmWESC?-QPZ(!ouQC#2Xf7UJOZ zki1496ewRXZyf%i2!+RmNUc4`I2;NeAb!uR_~a&*^Q5En)>1jZ%4~?Y}UZphxn#H zv?j_z&e%&(zLelI_np@%HRgiwxs)H|1hSH62}<$kF1Y!+bwwj{w1|*(3(tu2k~OE= zhZ2IgIxC}N(YLPanImxI5?L_itZ5NUUuOmC4%F<+w)9xi8E=Rg+ zQ7D9--C@4#mN5)sYCHhAuc|KB2PSFyy+eDg#G@c}{<`-4uaKP%_5-p5fZM-9Hkdt- zz@7YnY!u^j7TdM<6-!+_fD4J>Uprzd}2)iny}6w3vdjxC-#Aq?)qA z4~LJ7nS}-L-NR!AqCFeyqvrpIcjg9kW}&}7At14Wr1OUWAq6)EfjDo}Q0eL^Uf_^X zCRt4werb_@Xr?r%AKWQfsdcO&nF0b9BZg%)Bhpz}#eqAb?R$!#JWp--T4T}b_0s?m%E^3!R|_Qlak<>P{Q(0eaC`b5w)bn z&kvn+xoO5*WyoHi8GxD$2fI+$JcT>EEDoUeaiL%#fH#4|@&~!Eb<^Ldt`zDaX&UoW zT9Z(Hkk zPNVkFmbYJjj?7_2{zxN>CO?g#?&RVepm?6l`Xals5SPu>O!w>1PO-`&uHWP~kMt@f zAY~0dtgr}!B`7Hx4uwqp$>RA}+2y8|neb>AP;(|@fhuPzagIGX^_7IAdmeUyJXING zt*3@F`*$9wzB04uo`$tHrrT?5i$Sekqex$j5Y>iliTJ^G}1Gg1=TWdBag#94ZjfGDRiu5bS+Fbf%e~4+W=+fho$V%^XJ9V4JyN(NF;Q?4 zF@Xi%Kt2{7ni*d5t9jV@>2D7F-rsBjnuna9=0O7vH9@3(rSDhsVDrclNUJjcBq`7c zkaAYGM)u5P0Fv*P0RdOo#MQ{w%7s{k(UDP@kqN-c%Fe~k0^sK0Wd3PBz!3=lI0$G$ zEY0j)fdM;LpxO8*BLECUv#>Bf5EPalj_IFG!2hc^^LJ2R@TEPECYSzT4ZEX4F~>oP zHv>+)`;!zG+$a1@Y~Qyv!3{!!a|D(|FfYd#2tzV2Bh@4AlE9*)FvkpFY(poON^ujX{ACczhN?gzj~lsyKS{?5GT3EItR!*M z-6+zCWy4&%S75-3imK<_OzQA4bP8kb2Z6m;b_W!w#|gM1Mi(*(o3ATTps&sRtFpNV zF8J=TzkNBk{n?v}XU=r_U> z$Id^0S%1Hx9$tsK#rx*C@}pi_F1#$=R2BAFO~%tdq5e-VRe3Umrz^w5d@uCmIhSK> zHy9Yl;9rsZaRm9dXZ$nvL;a$Y-=QAk|%YGC;>M-MJ#Ag#mGV=@)Kzv+LwQZ=RTrmA@w z?PGR7!m!jJ|G_s`m?TQrJ)fIsJAEZ%(A)uX_nn(hs|{x6PEF@cv?>!FDisB%hpduy z#Yvy09{Q2B6vq80=-SF~lq`C(Zl+-YF>P^O+(0AivJbrUx5Gc1Pp=Ozj^}TvcOCW+fS%>cZZ^)EUJ9*i&z1~ z9zngD${$=F4gp@++}z69PSyFDiz_qHcisZ@Jux5cB^GtCvomuxu`;s#PUHc=j3PHP z8-N4wBe?jGU;NqpH;n>JqCCF+?-@qWhYTYqFvAE63UZF8U;#~+g>eQ&+Dimlwc;WU zB_>VZBu#-n{`GTRF}=bUVU}2p>n8;|NXwB#gh4n3?`jwt3=qRUmA_*5WMOE+H|9L9 z)RE!u>31^N5^0Iu?3%wKl`{RZR{Vv|t`zd{dJKLbdF@a!_cgC%9+{4p*Cnf9{XtT~ z3h~Er>d=AMZw=ymD?(VPqppYW%*%9?)+w?YWhKM{jpAOAC(S8V7-in_#3t?RZamOn z-JG|blKY!SZUinE#|gPLU0$A3BJb#Yb??4XD&&~^vzLoCsuJP@Sj^Ja`C{}H<-JyT zM(z7>zg-P;mXXsIYk-qdBT7H>t)rfP)*7)gi{#1t1DqZl-9N!8E#`~LYyF;b!3;v= zwWPQY9& zh*7|$iqcylrl_`^Ho2H20ljkm%}8-5#-t7T=n-bwWUlV0uTsPwHfUvxN%MzGBfsSI z%C91h%SGN$6y8)>cMiMn3CX8do~q%3@UmC)PEF_mZvD|hk3T`t?OC)(bcc|d{H5~Dcpdn}4NROQln-5}!v)gOD z4Ch;Ac42X_cqaU+WEW|YN@+=P$?5}ZHq>spGQ0(v3e2NckaTDs zEYli@8Zwe3xH#T~7YF|b-Fu+`!Hqwf#PC>nA2R#@2i=o5b9Hxcwz0Ce_$S@tVqyEv zpML7zL-XG>%HQc;bzmPW7Nbq9t&Nd#=1$IlXRPd6tY1>EnyHvsq=o4+)QT>r^f^;X zU?3sGv0)lOzAy0AGW`Hy`W;6xt2?{cBzrtAKgXsQ(&U(AmbKOEshcLAGEeQX({ZP! zOQjY*)4c4oaTjXQh!?!aaQ%G$4ctnRc_>b=@YS3chta^YyF{1w`DwI2$L$Q; zk+aVU0%mhH#_x0wnrL_Njha z!%=3YC8ZGXw9D*BgJ4aI5l+x{a_DRgw%S$|1a1*SF8G;Uoo2lDoZT=;=4pyl%V*Bq zMvlc7!LJfO`yI6|sVpRWJ2Rnqyoc!ZY;kzZYrJpYIs{aQIBdjB zaX4CA4n!#Bywb6N$V4G`(4!9cn4mE!MT1tm)bdtt;T3`kb}}J(wnF4#_AB__QySml zT+Mw-x$bv`&y%OFx#q<*FxD>LbWKSuBVtk!5O%$MMN!xIPEEKEob)Nf+wj-xq2=bC zTlaKZd?nMv?>{eDriNa6fvC@)s>RuUYc!oRe!T$i&az|NN12?`^v?LDY&Db@po^w; z4@xef0l%G@Zp`3=$`h>ABn=vKcOw#JXhsU@H02lYlZ*-xXM5>6H zKrZ1&XmD)_hWdn)y0I!Xl7q%sS&)Qp=y6o6t(&5f62mY_n1;N`KEvyKT-&>#gnUx! z(y*PfoFM5TNNp}l4(40Vk^ljeHF)suWDyYCj#wX~_OJ!t09<&jb}bh7_a6+c)VXh~ zp`O!^n{rGwOYH>``Q(vC($h)wWz*-PEnqT7w4NPqf$+ZmzeyIEIv>@zIz+*HRMo?<#|?1 zw(IfBS;)HHOKU5ox>1LFzSEGv8aq=yuM^vZ5o^T`9ESJn?|52GH70?zcChU6sbr>(Dh+7qtsPV0IBlu$wEwG2(KrI$ZoH= zH5>%wMsz_K7q#!P&wC~8A#v$PGsQUO6{R{9c%u>ce1Vaw)VJ7Cf}z-2r?63`d7C=S z?E<4Qp9EE{lZFDd^a-S}9$y9w4t?;WaL>0l>?Ga+T*pPKZ*kaTV(qMXI;sYnLW5#9 zQ@W9P3cTvG4m~8UZ#bFO!U9hg?jWYJEHjzNmto_e#^QRG$m4fjoX0>m?YV3*3_atX z*dU*ols6EKOdmw&ZdG%XO44AiPTiMD1dj(08A9#jk=^+llHp1kzsl>wVe@l%UxK@m zarj)SbPROLqPEC6W}CshrmB9GpRejb_RaPVbZaqtvRcpw?EIQS{py#tHdaC-8M8;9 zt!x^W>|jri-YL4ld3k$bWvRuBBr(Iz8KQ-e)lh@!4phH&) zUFM_<2YrATw2AMc^<%qjJ%GxY)9iS~FA#Z`PP15B4{M2ok1hHu>N5V!iaq&lRt)qG z$irX#L|xYeim*;WFV)8x6M*=?0=dKh!XJ=}^&7|~78ezL47b27bTsNh+l-H2<3FbVkSnZ^%87R zkCH*o&&^f+^y`w#xa%hM{ESQa zHfPWbHHQH)S6U8brq`NluL)O7T5A0J9l+jr{wgg_KYdfR-}|P*K;M++hqRzU*=7tR zwZ4JlUOw~)6J3wz(CK+>t{+NYxc^ypkb(W*b5l^lc1B*n9MsRk7jQI`A3OetE)p|; zmlt5=>q8p#;qQSTa{-u{Ie#|)FPHv1Qe5TX=hWjdw&GMS>8I%GZ9h2?;&z&3d7(*S zc;y-h%2Wcz5Hyl0>Lp*5JIK)p+7dn^)dh{kA$z(XLe?p;!+BPNb17|EF+b7Z#zkP1 zo_iO-k+&wJzAC&RBe13Z+HG4m_31IMMaCKy#2qC{nZ`ZPKatX#d zW|5$-7rm|{c-K>XoI#Gn@btn-SKsP>I}WUuE38bB%VFjlgE3x5C!y++`=Uh`a%wQy zxS$ZRFR@>{pR52cIb{SynQd~{JH$WD(_acI|C#j$J@QxsvHM=J?S4Rrjb((ZW&>v1L-Z0AIWt^6;nCU0Dg|wMSl# zT`DnsFw`rF6a!?rSMwwzFJ8fx$|pbL`2=qr>ft6PiEU;ZE*!z@o7{U^Q=m8jNzb_n z{*Y>+RLfDrUli^qDOUSEDF!MW_#=fIj%N?bfJ0sj^0?HYYzpIi{DdF)@&8)kSbn2$ zY=B4l_kX$c-|^wn_zZ?r8Ce;BPo<>YuwENOCA1H6c2GAJFyV7JDAt{n2<($>4#a_5 zv6U&Wz(4EE$ZU39M!8MtD6GhCLUG9TC719cMA1c$Lg5&eaEf`p@((E0=3GSVOUsv4 zcH0(BtAiL)JXc#B8_t)0wZ*yB<5Q*^CnuFGSVpXE7ZNwcRIB|7O|$_IWsCSC*En93!>@%3lg;`1?1hb zfTawZDe;k}LxbQwK6>t;X~FqjXSE&AoYI-O7Zr{8UvK6W*xd$@FFlB?Ig})*jC8ir z2M)8`+(=uQO27H${c+UuW_1O)u6Fee1PaSbhv-| zHK<_GeyiFlYr*QA^@|l_0$O@raD@hnKWDef`zGJ>=%Lg>?9*ub>6Z%mCP}h+-}Dbi zOudK=Y)xNb^m1+)Bf!&Q&Vn+sOba|cOXoSq5{f-Ye+v_I-C|Ox&AQv`DjIiXYo*N5 zN#k&%2Chr=Eu&d-XG2;t4qiT#6jpli%!u%)l`+iO-cRdZgXiiQOOCw3?jE)Al$^_P zpFfu2UjNSQOhHeF4_NcDDvauFH3KX?ma0tRkm{0>1f7-EORDjic zQuHJy#-?DCNhP}7P_v>BObJ`(Rk*R1No{HMeDXKS3lOR{JvC0(q;5su6)i@w6?%&O zU0D|Q>I~eir+UO4)3^A+m|sLUN1G^<#U1sF;5k*6C7x5=E=nAS*7b?h_EJ;YPvv#< zbP1ywUMRl7D66u=#lY3@SdXTiGK&fjv;`|Kd%{B%&jB$(knLwulybDzSp5RMLcY6_ z$kl-BTxmPynm!wKw1|NUSG=;kO5O>vO;cjr3aVG7_x+uXaKEsRw=D7tXHPG!etj9F zl9ZxE7ta^fr+p3e&EqG3GF^mc8GFtd6Y053Ko*ZkU;HZED z@al0x&r_Qdz$0>CPY7O<991u@;tyq*fkAESj-$N~Jjl+|edA73VA*C+2q0tnW$ zrjOo!2VTX{kO2uw=haCg7#tOJ$I*D_$l^CxL)%{gcOCRc^t}hT{cH3cv=+#Rb^c^H zW3CAt=7PNN$y1x@Zs5lrg5b;t)r_+eQZi)(m`X%f8W zT(f}LF`xfes<9q(g5uhl38-|=5F;==&@m_8n2<~1 zF95v9EdNrzP5RU8f%?7Ia}4~IJ^uWaCq6cz$kK?eIX!<)--Y`T>CsJs|L=cgw*TC( z%m(-`9G&6fFiwRW6~w!bVb7lyK9_iEQek|~fHwoQ}uiO7! zjt+66xE|)r?Iw!dO6uZDvq7NoiK8iNW-mFDV`E4bZRWE}|1x8!cK;b}dzuQuYewDw zsR)ehcJi3n_bpAkC98i+JqfbYSo44Ubipk_0A^qS9w0b0`=FK%9%#lhjqjxSM1|80 zn5%uJU!g8?gp))%%P+}i)gtN)#o6ZeWY!GV^Sk#`{fgoeFk0J}us-PEOArU0&F!-wRB zu)bLd_*m1C zW(sSYqm>9v)rl8RXXNT+D|&Rn9*VM;o^3?F`9Z-S)>N z0lz&18z>UMDP_Qk9zcPC2hNv+0IgsEhX4irWr9-BFY@%=KcaMJn~9YQq7_b~7l4W~ zY=2V%uUb#k@O%WCd-Yo2c@@9>UItln!ikOU!TzmK{z6tv7FHl(mq>0VDLWwDt)hwINQVitJ>?G?ZWp%*J->y%Ojcbb|wAX#AK|iQQy+^{RIXj#A(!8TxaHvjN z#Al}Z1*5PzD82t>yrq|uf9MkY(l#odB}|`H`fj>#x)=+k*K#nN6aUVtcJA;@NB@_3 zL*IrI1+nM@+B$530-Py$?@CT#k%~q`g5x__)QZF4=LKoMs;T%-AgB2)kb_|Wfjs4h znxgP0^5&cKN10ssP-<{N9DqE=8GtM^BY^&gu2TF(SASNvJ_M?WRb^F(fg!2C)m;{5 z02{FKiJOIk<$IwvunCM#JTzIf|IMTQ7g!%3q)E*QXEB&LPmY7LvvF#;qyKHpcd4wxxaER11AboN&M1TxHKolb3yMEv{3GX}S9{^6HC;G{P~; zC}ZSYU@R6#u}>ThCOYOBZ*ly7kM(~>x!kBJ#=RHKlf7W8ta&3?CpbnFvi~CDkAqr2 zuwEyL<|LK5Hq^#;yxD!}#fFkkJx_lQhrx>rK6imt#nQr!VJ!s82mr4=4DF`^?JgkJ zC#@iC4S(xWznQIq1&r1B%lA?`L`f0JeXChB)thcdbOsUN=Xl%ib zY{nXMSZB2@3LuwT&1x|#Q1<#2S-Tw-cX1*rI*(m-Y{b5J$2TOxXqnH`fTo<%+KpiF zL|I!LRoj?Pk?izL8NZM~(Vc%LZILc=b@!|&r}W+p&O&IV<08ECRkBvPakBNEcyOXc z)tC(5L^Ur6Vp}B9l2Ch@Ey=93k55lkxLs{)3{#e_KxEIJUxen;jK;t#4z4PvT-Z0! zp)es*M?xmpRXT69S3Zwmy(`Aap~qVt`?75AH4%W5&x=XV

Zmo*w5C^GU>?1TB6d zttrM5<2o&u;LWlBq9#;xckRk~s9xw*iC9*z%{Asxry@W3^u_1Z;4$?hg($$aIIPw* z+t)=je25nyqbWhTLLa7PWi@=t>R4;_-ImN=n=gd-OeB_n)l9$p|V zRe&su^LFs86=l)szwyKW)OuIxq@nw2FH7-fpM9!l`@V9sPQ&~~>mL<7|B;s>6ICHM z*0sA8_%xsf%&e)0G$76KEK?xH$t3jnh3?b#n_bReF2Y7HVt0BZHl6H>D1R%;4VaLd z47*vCzb%ex=X%Bxm~sEUf)0$8qYWj>fgrVf$tq?yN1O>g<4l&;Ow<|S;`3$PYxI*> z#Kv=~Ds%L+*l|`0FC`s?ST)_BAY|_-GZV^o7k=$H_&ij)Xaf$yMp>;&!kz#+Yk+t3 zVngkk!P5Qth*jSRl1-zWo7ng#jAY8)ijK3UAurcYw*4J7`scFiIt>0Z@9TIH()R`= zsucMH4U?Q|SZg%I*F_|sStC`zAe1%FUo;_W@<)O*Z}JBy_Au!q=v61Q5VJv_wm(_g zpQxD9Vz9bkhB!UGD!xKvz65ng;uj&K>`QjGP$Kc_<9k)OO=8VEqs^DcmY&>3zu=cj zv$)_MJCyAwa&IlGgF1NDpWRZ{r=j=@Fq8S78R0Q2j9Q-2e5o7h(xud7P1>vxB*r z3$UEo$d*`C8aPdcgN1_?SOdrPos_cytvD+)JJ7g)Uvh)vVFiw#&Hu!Ze}~FF@ir0L zm*0-E*%y6frx!mfPk7g&bb;x=7o}}iu&(OC*P~AMK*hDv(kQPX7Fm6byuP554<5~Q zhPrAz!Q#X<1%cpH%&+8w4833isk_x0>+q2#psjjZsp2DFQz@s6ZqLzE4kYs8*3W_N zw}pzQl^b7}h8eWNz2M~It(3vuaU|~ET%*54;3Vpf=JcKLXIN`*SQKEpvp5wn9~wCo z8qhapLw1A`Aja1Idf|*mVH@L$9+TrziS#ZQg-pwU7!pTv&oUzVNsr#mI9*jVAMwDF zK{;_trkk(Z+AeO85v#z)^J>9Neq;eIvTmkGgdwmyJhgH8!EnBEh1`?7a@rBdG*6hU-iKsuS5%e7DK=&d&yD2d zkViZ-Q6n9KfnHLnNvJkCvD@UrZLxel>AN)jb*eCLOPZXGu=;7#CM<@eG&FLFi;m^V zj0oS(NLM@Us!iv!l6`WNQYQ52dxm5QC&?C(g(lFMQ{NHlNMj3+ROkC}>t@?f@1=Y-<*3l%rwChNo#%fVQ~zl;Vn{Xk{^1AzbTBVWa= zf2Ww85JbRd%(V@_+C>rx*Ock|jIJLGV88&Nfa@TD0euet{2%U!e>%WF1>m3fbMmc! zB!KDB>|3%&vu__NNFS>RqltqZlZm4XK=&UffB_T<7OijtZi#_QO>hD~MS$O(fs0a@eP7Dr;RxV58z5ZY7op(%#fJR0lG-(x z8jQ}J$UM|^FVdA!0>7#7@)DllWi3y^rg#{1-J$?-?-I-m8q6hi7JHT7dw8X`5%uJ7 zR&nWa>BB{SXfJUz?fb5T$q{UN@A%8PY%@{Em?(_KsD(|OiW&MaL*zP#SZG3m{O(uh z&1{!K9>yq+JT2Z&x&4b!M&pH>E)DSE31E&ZD?+`FFESU~BVT*e@M`9fMJTA~e12^<1}h`6+jw7ev- zsJODKw1l)MaDp$fu$rorg0i%#7Bc|=?}yDn7m*PaCYH2yFb3L`pZ?^JEH*bY3o|!> zm6?P2!JM$M0h=s8n}Gk!sDEcsj?7`2r#diz5vMBZSOPz~lE>)lb)7^yc+do^{oaN68#m5*`}nsP z6FzjoSYxl*_XFQLYs?yc{@k$9X+ch=U;<}yZtne5tw7MjRNCrE!lEqV2y7+`faf}+ z?KrjL2`wXj4Fv0SE*Glx{1@zVNgh(+VA7lRP-@l5H+cZKODxQu63$!Cg11;6TuG&x zdsXv&q2A!B??cTtR(LB(gCe2qJfLsiKJl%v!4E~es_%8xf&SEW%06Uj;0 zUdNlmC=c9D?d&;2+CJ8!368XK;cj6hcMvBj=@_-5fO=W#CG`r89ucbE)>Hi^$AZQG zOe3#HL&R!Jm)z)J8GtP>mZ;|7^(kf&r*{5@WEiTvwB!tREEs&O4E@!UL4{3bA6u{1 ze8CiMelW}&?DrNWI)d~s=`6VYbsKzQ$4uwaBkjvJU+7d%SW8Mx_`Dxwh){QvAFw*I z7qcBD-wr3w!ftKWxGPFxubDw{ujiL)9RIj+L?$q?@G6apZ&aum4x#yMBb;K~-!)ib zl;&Bsi0y?-=!SQzmkiMeX*Y)2z=FdIwZYui(5RdSFY_ri@pKqi`X<9kzDTXEOrSFsV8*N^g8nu3_0ReL-(s|K zKnV#O5!rF}7%L5bHw8+-PlDn z>J4tM<1Ebgn-lNK4qEKL8J^#2eWAq@B$J6H2T*l|e%KKsPwwS!Q5f_38iCbo{BdfY z5XtLaG>A?4gOMPgLDQ65waSNt_jh5kPZ;S=CcZ9Z-_JdF{KlIlmumuc%asr(27+QjgT+)SK3Y z7>f*~sq`ncm|8|E5I&K*7^eB0NZoVH0w42+MuE?er5`fhX!p4M?!6;DWB&247_Ig* zfXDs&03HP}fLHtzqv^3=yiIA_?p|SQK@C*P?EF&z?>_;RKdK)70B9~2=Eng2(EN`8 zG|PXLyh-czdmFA|QPZGU34XaIO(aYTTcM<^IZnqG+3`dIz2h|#ec(O4ec{*<>6spJcFI21r6Z*Nfi@KWLsjFm$HLE)&MRJz)<-v4V-HR3K-Dq?F&}v^;#fSa*1jy)G-?DP~^USb@y?_ z<1&BzX>&?&B=Xw0N_;V2m(aA)g-XuFuR`^&CvPBtV%PB4*gs6+(0*j>rN#ePQ~?eR zR>a8G)ymGn*^C(tfcjwA;nCnkJ&nzrf6S;N{m1GE|2UBN&+hML|G|R<)~K-qtvnYS zuy_q9Q7jMsBg;ct2iW|Nj{SE@pB#uL(&9vZjZI4DtL>dp@G|{C z0fT#tJ*y8_+#Jr&2Hch9PP(J$8~E3{$y5Z1$P-C)p_6EuzwqpC*az|0B)FQeHd|sd zA9{qlwceyh=+Ooh$VJUk;d1|QrNjZEj~uDBG%Y}Yq-I~qHH<1p&~u&|2)V=GI8xyM zoqzJjjE`3cdJ(G*N|qv!nR87FR1|^W%@?M(3=@ErTokOGX&RbZPeHeH95k|e6u2wR z+)*RPW(XteCt+A)aLpYb058V35GcZfgcNrBa(uYHaH1;g%~>)>$PT{;b=_}yrVlNJ z>+5)rsT2K9h@V zn{XHXs-~eo`MKTi`8n{xgA4z_eo(N-I{FaYk$R)_> z9(DgFN^*L7X0^J{0y>iuM6{}f*tqfRrSi@;z7d9069IJ3o3e`8__XcMhS5O*)Gn#& zQ1?$w4-sfNrEAs(5MJyb$uzkD%udFbUe@}oY@DSR8(xhZrA51jt>VX*==g2boH7UJ zDBX1WWI05rxQ`}$RAY@6z-D?jS{fwX8&|FhWjhIl7Or!@M2Vx-M&9V}0&5|OhtCzBd3gj=!P5UnHgT=Uf`yH@zwKJAgKc#fsV*;n5#Fip*^GNhHV zmocy{pk#c0cipQbKrI84<>6ZzI6j?4rlM>@{j@Q{PaENCl&93j{ zww=MHXF3fCj7>Uk=ictJ?w{FJ+XF1;yT&Oip6NfYh9*wTa$~8NvsL()g6-XY?u*9J z0cR4aCyf`fpXcjyO1b|#AOb4R_o6oy1Cq1G3La%{`sfN z6$ERm3gq7uzD@W>^X0iNLqo55ZC#bT}YWxuC*$#Cq|I(-{) zm)9#!Pt+cwQs#~{mF(6LK~Ip=IJV1D*7mOCV#rHwXB2u_>Vh<)A~(bOYeZF*;b{)( zAlXi=wwKi$a;uO=iH(-xR8G>8{arYyClwjSe017#SUK&Dr&0iI>~%Q1^~lBHruBsv z_9OuxExF~Y6E)3^`(&c@KVMTpRC;2#CiS(H63zd#<_H$t8_gbR%h|G! ziSCya?(fSyf#uV4`qbii{VCXz0RC3jst;-~*;_S``~;|HIr@fK|0_Ytu-lG)Q+Wy1SK5>F$(H>28qjkWfHEq#NmOLAqNy zm4BglHru`T+2`JS&VTRXA->6)Yfe~WykmSL-a(E~oP?p0^?whDng0xknK)SQ=%aw0 zAm4HM`|{re#J^qd?|}IA3~W4x+)DhBcDfTI6q8%(A+l2qNJ^Cg+W@I}StgcYL(19J zgzI#)z7#RTJO}UOV&N7Z?W_yRR-~!?W4o?n=AhLqEjZ0ZRcLC!=|Bg&Go>_E%zE>L z!q*pcwtO3%9ib~hd1Q|>XGnr3nS;8MyT5~R2Fw%2^ zP@vCqwCrLV2cmAK+hL#?Ds&aG<9+o7?D=EipOk9e+Ml*mq{2tq2dtLD#zHs#kgX_mk0#I*)F?{ zB2Jr1)cc}wB0t}nriSiBoqaw#%B_qn4*A$b|0R||z8F6Yq7svKGlISw#ew(c?5Af? z>g?)d!;es%$8BKb5_!Av+ZVz`0V+B*)~JuJewT)iqKhj^DmGP3~B z0&3G+zBGC*V&fxW#)$~g0TXhc`=+EgQJ%1CG-2nO8IA;jgslwl|T#8en z1yJ`T{25r;hw6U`h{bCLZr5z~FDiB!WDqaO$|89z+W!?G1|cL7WQB-s6VTT^SZ0-) z;xAriiLS}Eak|35$dh2F-HL8I;<|Q_YN3>Q)TFz;q=xF0?c(GsBpx8g>uSchHL}^;!iUkS_>F|L< zD=KLjd7g*bXQwEsKcNyvr)Ud6stR_;;eJ((uUk-+wn1g4s-7C>CJev@pVIFZ$bWNV zxcYP|MiI1-FxWaxN2In-*N0`-X3TR<BfFbOT)x9$YcrM2;z;H^k&kc@#taQ$~cR zfp|O1Y*gf@Gt(VMj(S5cOPvg!x(OJ?1ziw$hX<|&PDUZ#DAMX~V(8)I@CmyQaOx_V zpB{yfgPQtDI0gsD@zm?}zJrT5C>dR`{=`k3v>R-KJdt;iu z*Qk|fD}wL=k@fQuyjFdd{Hwl~7&|Boxv`?%QZGI=^du{&iZRFyHL{wW@ID@ddQFSO zcji;~s=mFx*~n!y(Dhc58^;g+%e>2O_mQ*|&b%+xMXUPE-u^m;_NM4?I-Y!?>06PN z;V|=+3-0>Q(o=><@=fb+-l}gg?n5=$H>2spW_Hyk{tCp&_a3q5pL@h+K#y4dher$p z5?d2ITNc`C@T+I6@W3-xeD-sv3XKLUWC!GE0y1qo>HRziiv}xVW^ZOfs7G&4|DfFp z7^?np{ClKY;YS<qFvDHJ;W&N$|bDo)754_CjL@*aV3qgo2!Nw+VTG2BG!|}ITx#GNrsavKg zo&C7{bxjpvEMW9W%GfvIHg9xhqz0wIiE^h$S>jX@`lR4NFnDxu2D-Z}^Gn7U3mP`p zmW(Gyufg978ucKTB0?H;dYhX8zK-rkA0SXHWX9W{ERoGvV$2J2uxy9jjBG-n>(L3m zEbela>62Hw){e!(g-|!`?CH3wM$1a7Mxm*mRPFc3z#Qo#`xYoeO0NR%BAo$>nom;z zYGm!9kMHllu-#%&^_n`~uU!!Z-X0&WLM(bjh-*;5I=4n3sJC)^=+Cy4I%>Z_OqeREDvhOwPCX(1~o(^#exKI;X=K(2~BVs4$O zePlFVTET{}Q^!#Uzm}S@6Jb1;JTw_1cm@$0N=0R5!G*Ws=n3`$@wjE9u@8GLUALmm zSocFY#D33uU~P)AK;Z_;o{uPa*qMpiW-Am*b2i>A0-ck22RANN&}LXCiw z<$3jqu1hWv<7cZ(N*=40X_bh)m^l?JsFN=%3MGM66qEu@IT%kCR@tAR*k4D(8VTnh zcw9h%Dl>bQA=I3lmcABJ^MM)&IxvC7c~llS^cbui}!WpOzvms<+-VY;YqZ%%bp4v;m& zI&g$O`)L>=_Ej}Z%C>s&SVy2)UAyl9hCfTc`#AC8wUow-o=wK4O%5oDY@Fro(RozP z=Qy|Ch`x^N)jiObhzGYEhe z;o2!XNT^RBL8&_u4sd3 z(m(Vvcmdy&DKc9~k>l88?ZY?KvV)t1WUI+i5!&ApfVE@oR(Yn$7D$W)^?xqzzNEJf6Q06_mEeMli}YG$nm ztU9sQv%ce8`i+G3JDc7exgL<9)xnkVF|ca`7;glJhZhzDqO+(9p@OWe()XwZ6MzHw z!3-=Fzl%=;*_wdWDfi3&*meI7o2Rra29WumK&nkZO0$cD7c*))AF{dv^8ylk$bP& z)zR|YK7jVRU#z&pV8_ObjfTY@^_AB`KY7NXotB)DT9jF3kT#P|J632_d{mhm`@Fg+ zcNg2zfyoHxSfYl#KDGp15FXUELlU8+{TIkl-14m4YFyi~V6$5FNsbf!&tzdP%@><5 zYczY}WpxVZY6&fdEapxTfcy|A6~^?)lxK?p$z>%{ruXcW9OJU zgYww7Fb3bynZASdG2*gqO)ZhOQtG9qdlrCO>Ah|%ieRD5`o)X8CT$hMHUyO{ZU#1) zSl8S@SH=k{Nv6@S1pj#`S-@zQ5dmFf=fa21C9hBjqQ_JYU-;6Z)8Xk4L;2L-z{3!9 zP4MLICAJf=Tyb1JLR@LlqVXG1G4J_MsH8~m!eqkh>*X+fz4QT6x7Kzx67CZ1xy=h* zWCi5fRza8pyC)`$F1HDg5kIi`SMt=AZ**TNhvBN~KIC*XL%o3vkGp30`;5YG;QgoP zKd2@A8Qvi4th3k&>YMlFOyK<@Qefe44?dqxBU?x4)!`YsN+~E86jv4eF^hu;xW@pT zl4fEp+_7ddNa>|m9Ixa|9+9}-aREt7@1Q9Nu68B`Rz#JH*K?j7VF)Ns6#ED&Fh7_& zt1piCbwih)a?wY!R}X_e6Q*(w=S+<9Rlks53(3OTF!j=crN7PkBU05ZkbLSY{vuefr=sCRx6porYCNT zs0|NVG;Xjb(IGN4@Rm5u;=$s5)h!{2FHoob?VAc`cK48W2DYIX@(gB7HKccOSaPiA zM$R-e92>=kgsX07`xKhyg`L2{)4ri(5Lgg6l=vAHQSe~cOq1aW*Yd&$0V{+yH-W2T z9YgWhKE>L4wL#gh!;cj~rx$iUtvekIlhkt;xmHeqQ4NITCLld!-H;J#aU6giTBqG{ zr~ehar6GRw^f3az|FNeJ0v`z8kUzj1S;mJh)YoVc4s4%~6-;c6_aTtqrG|Wb9w526 z5F;)C`wo{Mp`nV~8Rzl|a+ zD=jM`O9;erDKjfG2P4COaI2yb{QTWdLhj$&g6}CLHeiv+9icYx@ek1d*%|bI;U51k z)if*+7G}2+gL^LDimL>XG*;Byx*n><9dunEJczKuzz>!1C5K8bxpbC0TeZwV{>8wa zP>i(Tx1#Q8^FU{jdNt!jIqmo3w6-EcGwks~W;}q77nKTMh@`Wp>o`5|GIB}NkNhx_ z-e7nLr#{xGE@g@NHm*;OC6>a!(|UOrt-4d}h7dMu2QW9DSQN{({cQT_7D6J#dA@4v z+Qdq5tAVqT>61R#VR<31HGA4J!}3@Td01zSvT*Pc3E%5cQciR6w;&E0;;qqpRIS!QNNFj~H;#g$qB1$^PiLgf_dm;5+K--J2g<_*NLP!tFq`j6Xt|veL z0gyhC0H3f2$tE};`$nhKWA;3OB0v#QlQ^5Y%IzP*2!CK*kOYbpa9q+IMIc`mPZn1o z$9=UPaOlxpah{E#je*|xD!m_q^$()=JGuIYi}8I#(gQI4nY7|d%1AxK-J0U8b}7ZT z!;%~eS{3%);qQ5KT3B_U>_MbpbUA^rWO>3D9%mmz57r?A{lcatibL;FA%PEU3j-m8 zU|7s&3DJhb&iOhg3+8SRIz}<6y^Zvt;8(ZIEh?L&f#fyQ92^VO7IUcmUHsyhQaNo< z2{4nh-}rgN1Q(t!t03`kx8lXIe&SFl-tXR}2gtl)eNX!2nTy%X5g12*yh7X;TQapY zLX(dD%P>{FlUOHDe*XyN>dm#{iNjNDm3;N9O+e#iX(!?XO3 zCU@@RFH9;N|3H)fBlr0iT~6TQ?hKASzK;X09am#8#^35EpYkcdK@AFmcqJ~ulJek# zLhSR7M!+P(FFLMXT|0+TpMvW?V++F|!6<=waq{$pQtth?U_5JnO9loQHI3IAaLmce z?YtqE=ClVDV^CYa6h%0`D8QD$Zb(nx78GB2)gj@WJm&iM8v2K#2u6?ta1FQOY8P0$ z>fnXjDlv2z*sH8{&qtj&L5*02_KoDdy71|P$(ci%NPwj#bjEEk0QyNBk7NO}TeO&X zrGY0}s!X*F7Q46Nw>iQ^))cmpF3{Tb&vVDO__SOYs-I#xCw~>(NB0%=yMMlgnFdy$yVbAp>u?2b2pt#U+MU5Ku%nMniG1JzrTFd0r1^-A`tx-k*9YlH`x4B4@u9ovga!b5-ia&5)>X1Z`SmUKqgLcd1&>vn5{ z<%h6i#E6vDR7hffY zj{L;f{dYF|eI$fUWbCL@H5;XHDMK}h-QT}W`n10&@7E3^CS%2yd=-y5O0Zo{r_jN@oyhAo`ZY7^LeJQ*>sVUiFzpkq}f#bT| z6c!=~nfC8PJN#6?6rx)bPN`Cij-Lj*@nUBPagMhrAzPx6=loq207PH%v}!)1$*T(bJ1%O2%`8H3}U^o zpxMn2t!C8ZG8bQLcU7At#CdmQp7h49LG|hAv-Eo8n=&cEwLN@ZZOZht{^m;gnF8@O zf5qQIS-)*|>fgNtolbWfzRB+yK`Daz7c|1$pr4QI$aXgdkyL+>6m|{JtlNo&%kJDXEtJA2$4Q3WRHTiq&xXNr zgf}X5?<1+kX`>8i$Gsh<(Lcy@hlxot2}cJVFoiNVAaVrv4i2^U=?pk3%A?yjc}1Epl6wduC3)-DU}_g-C1ZIpd6S``XLFYoY+U&3;g%2hOb}cMc5i1OEj`GJZeL7+58Dht_&#)|Re6w>#j#?at3*Kk~ey z-)rCRdZZuhVu1BtWW!Yz@ARj2Rn!mr`yKX~lFY56fFR-d8cJ{9%OUMb0Qj)0wRV(5qeV)kT*!t4*WwHy_qqd=knJ>-5*X!o}%zDi#iy*5KVlji-Mz@FE2d4!!JW9a; zV)NU5S}D6sZAKVnQUFcB@r;apAk_3=2!sSX`^6lye7fyBcjakNdQV70#K4-EU&X}v zKH{nI=k9_y&|P5oAtopwkw}-%qF2 z133d`is8^yF$b|~K|RO*M3;8<^gP=mz8c;(kp7VCK;gW9EcG(132}k3I^9$=Hve?( z7?!2#);(u6D7*6=CeT5Q*(<`6dBHmxW*Ktg61Z+InKf87TJ|>e>|~sN#qN@=bLVk2 zSvc1X8A2toJ&{BA(*(WPQwBJ!*C!>*`+|+2u2%`+5tv|r_m}TnaKhiSAtOUW+76#E zMu*CO3?z50Knd3V_ytyJKr+7>ENxVzU~k3cKup`}#fYmdo|umORuB7UotI|rf(tC7 zi`@Pv*`cs(8SMS~3QHjfl$UNKC+*Rn56#hQ!S4 zg*e0(t}q2O$pqv*Q|qJo=o0xtX&8(>IeblWdr`?Q4+V+=F1%HvsVcin(K@Y0H|B|& z#UbYxDm<15g~sN;Cf5U1(6n(>K|yAGFtGu<2*7?7n z*o$xY$s#gEG+Vhg=}VoZ{P|4aPae9_KVy}(s_$x0XH@;7OyQXE!4;KH;%!%Hc*{6< zu0r&`o=;*yFc7iK9h!cbNKl_|^UiIJ=rli9b1r>sIHchU>1@0mK4yV1cc@0&%KRGO z{a6%Q6o--cLoCSKWNEG_=XXWKy$lAuk0-l2zwlb#;2|U->t&$i5KqA##kg5;A~FEl z*(5U;w~)X@)8G>G33thQMD=R zlzONjPG{_Eb#4Pu+2$oKXJQ7;X0c0k@BlO+o!)uHDgCN^R){w7+vKnQ3z~yl+TN6c zN1hu5(bKX{e7-ygH?P63+;KjM66nr!L|)#|^ti`=q`rLn(N4b)$7>T&}P9P2l9Yv*SzkFB2$e@b~ksXULS$z~?zT+n-2B??&N19mU%Vi06=V z6`O30mSZf^OtHp4WmX9*NFF`vre%(c1$4=T8!;mrVtysXOc;r1<1(k&K?@T(B07GG zQ|+uXwHKUcx5oJ-KE27L)fR=f{^UZkdWAfZD|1xG`Y>XEp8 zC|7quN|pzfSxn&{mKh#K#MI2n)dpAuz<57q7##l5_q~;gwchtY06T!~Zk8}3Gl2Cj ztoU&G-+a}-3j}tX9`;O5RDTGh=^?>1QKC{KvJ z#j-LZS)$QDpIc^Qh=Hz^7((22{Xo0H^33)TSuRfyF7}ZRG!jQN_87{y!1qTZ+5`j% z1KyT{+>CJ_jTX97i|zfR>b(ykGZR=vy}sz1T(*)lVyu5UY`ib6pGbusj35zNX}?x57(~4|pq{bWVgH5(*44+&M{F^p zNAERm$2$jDB9Icm4o8|w8}S3UC#ik*?5u^SlFDYz*)icV@*hiB-g6SQjjE!Vza*KI zwB|vt>da&%kQ;7|GPe~0)9)+AHx(>+qq?d126`0gYyuq$E(Y9@*3zy@FFpk!tQKM8 zbU|rgetmip=24=-S}T27wFr3&dCNOxKnC{&8#Ok>i6+7A5N-AC@Yf&#lnE4)dWjaI zqC85vua7UvWN1zR8bmiJF)U4j2kz;Kj<<>NEeX#Vw(G^F>Q_JgAqNq5AAPa;b3OwN zfG>pbPj{+!3peCY85|*ZUC^pyC4cFme&4xM5BpR8Lci~a9KgY&0V5+!ge)A4ENsko zqr!nBIobYE=>w1aQ~Q5cehJJU1Kn~CW+tZZ3?0@nXZQmQ)rhI-;#?sw-`>3ejakHMx;@cHm=&KY`zA3J>?mg=WimoPz+Gne zr${@^6H{r9R*pjP0XT~sa${BSvTdYb39T|o+}?N2(5~Xsey*e(Mmv&{0h7#D63AFz zgUq7y@4ij49Nr1V@qa{6ZA!9FGGRMtC2xkjpY7H*Ld@9a8!&pL>?G$w=GNn{30FKP zBtx^|n?oAX7hN&DPf}+rRj;3Ssi{!N>qXHl0L&MwY1{H%zpBn-& zKE7F;gv}RNa5+1L@GwL3Zx|UVfEoflH*G0Yt>@A!fe4RVDY^MFD`KVgSyHXEI3<}4 zAn5MIOdOQk78_`NX}ez<6cmr!;nv7_JU+UXeA^_k>v-ydfuC>N>cxYb9eX|0%`^Ei z4mRpknae4DP%SAGCf=DT#jlPQf-A9coS|vTGBu~y(~7)Dd19#DRpAj#GBhcjA(=%! zky)zwoP)GQqMKmjTg=O7Oo=GAOS*}Vv-@uXLFFUl%bcD|?EN5e?4U(!kFwS^=1z3Ihykx#~qw@nReL-=6TU3lcqUEnZ^&5I( z1*t4rJMWXS^2peyJegctc6~|nyRn{s`UH_XcqN431#km6?`aVj|Hz79&&9yt41CZV z+@?{F{ zS-?{QX&#(l_|t;_U|qOB{lO^@0zf}q%vUuTvR_u>9}#a1m_ z$P>dojp*B|*W#@MV6;Tohgpz;};3ZJ=cfd(nIv%#r==ISVCa%n<~vEbEFcIq20e zO86y;`TjfJcDb=A9cEXaz(RY`=y1XhcJ`PgP0&VbF0lx8pe;M$c*f1efzF_>5YpDS zI3u3q%ZDe!b2=}*Prbr3QMEBQk1V2*QgwAxB_0~kF%XN;RO1S~U=r8QH9^3N`Fx#k zaVnu_PofqHR?r}_eIl8DsPz0&_uULu9s{N5XSb~2K&@l$jaw>K?;AtmSL-WyHccgn z)CS2kJud^!UTi{v$A6oTlE70RkKLr%-(Z}rgD?+D+W4q*;8{R?4mvG;88VER0;!gl zk@U%irq{N~uuVDlWb0jfEY;^=4ANwt2=b&48rA)S)$Gt;$v-6pklw11fT!%Grx&hj za|})?AlQuZTa`mvNDhX^h}oZmrx1ZD)(uATb;kV_PWrVpwD;cJLt zy16?0lZT-RfWrgNLQaa2=(|P%bK6*g_Vz{wHiRO24tj)&uE12d)!i^rLHeI5Za83y z8z{MsR(}=P|A&D>`);6sPZSlVW9DE1rpv#VJOT4nz(y^0CKlH3lOmWOEdQ78>Mz1g z9h8x8u{6w^tPR->RtI+9a-H{Q*C6^zP6bkBX1_XG(RE4kaeg`}5kkV#h5|`l5R8U(EayMf$U;jIqI^3jwXu-@gtFs{QhTjOwPMLm+xKwOKM5~I zKp8ubI&mF`oHtB1ihD9NAnQE)LlF57*(m_HGF|>UR)@zykDPTY1#lF=JL?JDM_7%q zRILZEVq8YK@RURJ*KlD7>I^Loo!*ZFTXx?I`6u7L-N?9(Nu<#FT&4kdF{sUfWB!S3 zWBXh$R^?)QhOI5gD1qLNjKOQ69qkW%PdoSfo}oYA_W%dng53|e1&0u6dFT<{?RZ}P zUKH;eabeN0m95R(j2vtTm5dBbt!*rAOw5e_tFri8SMR;h-qW}e-j8d$7s@;53OMc- zSQgEE=QaJP!@FPpuixL_?ZQ^BJ#+2q+P?Il2c24g$}Cw6K-XDOXnCD$&{e8;$?Lq$ zW6IYH`e2O|I0^tuyqGdm&Bo%?GB``#t?4*Ppc=&x3`Ik+wVfXxz;0nNXKQrH!4bQWI>Y_35(Ms)FlUJ}<;P{5 z`jeK`QVvPxey4y;PSMf4j3d-=`3sL#Imi^hq9MAutOb_hu&#h2? zVF~ddC~to5t^Tk?dYHCdnTyEEXS{bXUr8jc8mT*Kl_9E-b0a9`;d~8-_vhi+T?I9W zE6P#?HS=v3$A_K!NX9@GEmatn%n%Shy=f-$k^2Poy6`rhefZ6{<;v4!I#K`7H6fTO z2QY^7km=;D28waf2XK~KW^D4;TL=!-e2JY-n-mGT#&b)h zM}iu?Nh*H!wyS|Sql|)e3{7-s>P|K?n=(F#{2JiIS*T6M&rzQCfp@&8rlw24T;x=0 zkQj5KNKc`I%J13b9DO^RnF2=v#!6K#5WjJ`nWh|!EjC%ra{6+RGvyP{^yb9QD9`b?%w_oO%6YmB}3|AV!wH#jT*7_Q120ddhg@?A5?r&0P&A93f#X` zd>|DpF&5HyE@uF+f`WsYla)>V?f?rLa1ZtK!2gBY{JXtX9{FZubc*GOTY9U@qSe42zn@-8O70qDC%#m?3u9lsv+*A541^g|)* z*88zmYn#lA?c-D>9NmNT3C54shik1q;ts7$Bq>p6V_kp&pF6AfoL_N_3&&I?!>`sa8% z%)>*0x;-=3-V7O1y8bS_M23^sf={rJHhLUiG&X9^vjp)8mLZIeR$gzZcL8nOiS*>8b(=QmUYQ}N-`IK?9dYpt`f8Hu12kR)hHCfCi+sa>4QMK8OQdX zy`r}am)tFd>`6+Bcg8bn{_EV7Z}v%V$OmaRuX`7T}avxzp*8t<=+^hcWXD z+{4~r;X@oq+Xb2~D0!{j0h(lEV-*`@Lnum#Z&_OiobV1n6f-$LqravlCabiwyNRe= z<9kGaPR$M%%+p(T(%qI_+R)lWWum-%Q=+E%tx=V>EIOiXkNty3a&XlIcna@h1YWMf zLeVerGGuD_14(A}WBp7$5eGisN<2gA>vYk2jp9wRj4It$@A()a@n<3rrn^u69|O6zZHkRcYd7U?DM5 z3=65J@=AC-`xwp_7#iBqo{0AdAa6~mD5pVBu_1u<8cyHrG&=%%N4*6XAPaLR{G(;z zju-h;u}9fM_>bHb@WRiQ&Uv5{!x3}TeBdjhdB;}N#P*Pi3g*2n)ZajV!0u~MJx(NY zgDdA#A*c#aKVW0^Aa5}z)0 zmELqz%3l2|crTGN0Rl%q%-?`FQKckFpl)%pdbB9OzSxiMUfXlUTIGltXAWr=kTxKT z?V^G0b8NuZKBy6O%AgJEgvL(`Qag~Kz$s}3A@gwyDG*`ls#3=n^^j}O7>bmIX0yL{ z!|ZcVdK=4>>&TdM%^S7n-_psiI0E_7LxT)e*D$%3FC%JKm|a?DDPS&-Pq}+NGmD7(f_vVKi1V^J7pfUrPz)VVw62g= z1)i6_WRfm(H67vHjDFtk*MLMjnYc3uzeLzIQ_a`T-^}otCGVPsXuu@u*~!ZGIRA!h zUG3{QQ9R=(L|2B|Hj7TLnED(~t=Gg}Da5oDV&7cmKX_ijZL<+0hL ziY5%sL{b}6(Ge3Zn8KdNGgqVeI%s-Nngfd8my|%hdgMpoh&lFxJ5G*7Eo+Y_Mk(D1 z!t1Z=&*K=fu|;$UQF zW@Y&f;=rWY{Sr8<;op6|zlan)W7{fK)h@K18jf<%cW&2qd$aZ-=g{RV*h|&97}qq* zT7_Vx1_p?xnt?Oq5vtv);jH#AA-34{@o^sJ`O`0-D z$SBf4^Gi3@7CUpQ{&}S6uS4dM(E2TMbDh{wAYu*>=f|a5i`0Re%9JKE4bdlRG6K z+q{x-Tz{UB$Et&Cw5^w7OHzf9n;NTNW0n;j@pO1U46#oBG6lK- zd^QaT)^=XVBb`G-_i`qC$V?#h0|0PQ#&LW@jUNLWFUzan^Sy`eK2Bgf-piA{$d!qp zdi=a*!p3XglDMkuorEZCW1-}$W`E(bS^uZtB-keAHm%kTP@L=|!NlkPRbg7ka=bmz zo%hc>73-RRs=UI)=6d?@eYl@zOKvae_TlZi~$Zf zNPSt?CL?}q)fS{SToGyht1PA6JEGoy?uc3f9Z{tpjwm`GxTKFGh69jq?d`CA%gs-WTyY3Ef8$uS!gFSi`nL`zQkB)GX_=|ju_*=t6J|+NCV24h|yIJ^@*OOD*+)ojk-ri}0dLn_L&Tc)L{{A`>EA~2k% z6q%~!F3LteX(zlh)Uu86c@TBolOq$7qA-zfOTN<*lCl*HX$#A0w=oTByg>3q3DUw6 zaJU0LvCV7l)YgYXDJkt`xOhb~WAEp48w1|>s(!U5GL6Y#AhX`or`%uT9b2>WKEBtv zWU9jMsI$6fOuBR%C*5kD?}g2g3;~kNI=|X$lFz(Bg_O@JM-Fk>W@S5Wm%=sd!n?@9 zDRMbsLEp4gFzWgdXUn3(fTFx(86TP|)gOa|e$VK*h+w5EYZi2=T2%M=tXsh{|IL4oq!rmtFaf zk=1Hezpm9-{h~PEg9PsihURY<8-*gI*N77qOt(FysXd2Fcri4EH#}PcH{Dnb4*Pw& zJK;9z6t{FFbbVic&w}SEakas@PY5z)jLa{XR%QNDRE+IeL5}}b}*$GW5PKS%mV$?^UZgcA+xqRKb7up~`{UDVzV=5s>*xoBOry zai1pqGGdSJMb8tAQ1ZDA3a=fq{Lsc4IyU5#^5@birn0(9YiD9;k-^0cL_(+~oliqN zQ(LF$wi3Wkavb0rK=7L<*~v`a+l9RgXxyd-kLthX5h3+m27L{u_JJjW2@VxuhobGP z;FJK5ofuV1_;wxAAygdwd0OF#E?@2;hjt`dYb94=5Pxj1OA+3?VPG7ApviXE?UXrb zTl1C%4njtF&fq0tfs6}yJl{ASARYyolD;_$jPF)kZ444IUPn>%z#?cuVgMsQ!Eb4y z66&}WeYRj1FH9>s8o^F}L+=v3_nlu<^Sg3bHLcH@Q>zIj8oKy1rHK`spP){iK+rBs zrHIN{J3cE{^t1}9|8+`$UU{ZVO6&B@@k*G_APc~T=&1g7_nR^5m`FBu6o zEBcmKNCB=s&!pT2OFTGJ`TICx-h$=wy>)jP`k+(?{k*VvMBO35%vfQs~0Op=BCz+@bD-%C<*+=yR>*)n3^{4@i zHR)E!=vo)C)MxuZaga9%!I7l_o=>;xnPm|bY}4acJggEl=y-Lq{lv6BtdP}s6kvPf zZ5s)Hj&Wt9b?`Vcf$9nAnQfjiZ6?|KY*9k#=gP3l@fv|0)Py2si}@3?4tw^;FK>CT zT*@|RGtc-kbr%mLwxUG|Amv?fXi;f3DT@(uNHSQWAlGx42T`2S#u4)fgq{Qr*nay& z|CkrQzUD|#b+*6LfhrBFlFgBW9!V+tBKAp0f^7Zxe)<+Sn@|-jH}$xoD;x6CWehlt zJE7750ya*!AQQ_-S@Kde0jL05RrOWTnzLgbv5!_+*eV4ol2UNzY=Fahb<0#f)z$3$ zaaaeU5Zh17=*sC ze>|#DnM2g48>CZtseDu*az?{+LQ*KcIZh4gGGyM)UYKDtO1pMd$J`1fa<)G78lk}W z5lblT@qY`O#fLY_iEqD3^n*T5LX9Q*5f;6y|3K9C8o?iA>4*Z^uWk<9XJXE@-59xh z#OZyd4OIrnWgFFLc^tNa84j&fR@ma>6h?-z;CMCbwT?=;ZuCb_Q^U~w%Jb|hxSf~< zKYxCc4{d`_ikjK&)X4BD@`QH3dXxj1lue#tMN`X%s9>gE=5`&r@LMecg=M|1y0RPE z)*-c|S(i?bs+6#+6_?Q#KvQsk$N9BAYVc;WXX#o;;S+>NJS#acS#m7l`6%UpayWKK z-5zC5RETWqp%)mLZ1R%Lw%i#eY1i(qJ)C$h#m+HGDK(C;J_?B|#(EZed>jM`ddf>N zO5uCqq)&W$kW=iFX)t8$K=_q#FCyx~Hqa+Oh|22jCX}`_fXQg3CrH|XRJ?W6L^9RD zH)_*iMj}A^!X0>8CR3kwzD)-Cxg;m`873%j;0!Afe#zU?ljhPVxMR!QH)$gfi2XUE0uZghaenyCz!5XQ zPl*EDA4F^)Fet$PGX@3tKQJi3qX75zz|QuE3<~$bUvPLVLBWSjqeg^^Ms`kS21fRG zyZ!G?Mt6mfz{g#pp5u-%=V!O`|LV>CU6#H{ApOL8Y1=6XPg+zYvPrDl4=TNt`Wx1h z$W<_4nq5mS6oU~i1#0-CE%AUPosvQS2WwL?IK}NgDbkh(JDKgn$E7DqDX6gRZWYYB z%QGR$$HdQ%=RXe}_yy*Kzmm-~JxYoe^QY)?YF_DQr47@DHZ<~Wkti#Sxzx*aB9tqP z=`ya`anT1?`4WnQw#}GJkd^$EA4N`sYT5-I?cQ4H~o_aI`-i+kjaG{g?*SV zZ1Tlh87D4W5kp9ygqD-w-!fz(g3cdgCQBaDEfhOQ<0e&!e_W#)xs1l@(obvh>mqmO z3nlAnnM+@1HAN;&kD8tzZTC+@(B5R|`2lf0EdZa!2c!vED6k}a35U?T%kQWTd|!JF z1M=SgAxQa$w7&a~vOEWX9e^W?EsG_P=|Pp4f*u=?69r5qt+qt z1D&Tu|LC#U97E@#d3!qxIB=}doO&B#0c>(BWY}AHhGR{xAxm~;n4oz@0n6tHHy_>_ zSwo!Re&$(Jf83ez=}=7qKx71Nxw}PVznco4y~tjY^%yJast#$WM&@?4~h<{i@wm7~(56&emM7@sPOfTymCA;QkSF3OQ>|I?HMA#}neVGC==k{cRu|8b`{ zvMDugK_d%-br$M+hcnc{O{K-s;6BTujvMk;{ zvHF9u`E>qJE}tfVPyL^8k{HrC*g4ueeAg0SnJdHnT1Veb=dO}f$3RbqQRnV|{$0sj zvz)UW1MMvh^=yHqwuWYQMg|TxcCPdfUqx7k_x_C|V*&^%0KeRYP=Mcr1%Y1}fuDCD zw6b^4y1O*+z}@>!E6gh*%5U(ScH0>_0l8A{cu_3P>>VBo61W)%z!;1XjG=J$}~J$)fJ`qF=U`_&m$I@A7>)uF9$1=neJ=P!(d%0df4uVl*%EhPg#jTd2SwD+Hb8k6qO> zBGI#Cghn-dj#5!ZFfnzGk6&J&#oM;FuSEt47w^9U$Isyj=VA` zAXIrbFYmHT&3h~%A;$;1Af_BfVbzW-jS!FVXfc&?xyHl1;nP_YEpAUZ{O|V(+TO#bH(@?{i`Z+m5x(0 zLm4u{#~>#~6~)Uqy)gRViZWi14~W4f|a~B{{2+H05ivcDDBL2A+U? z3s`c5#keHh(wCj2iJ^KrF_FfxFhOhsVX1U{XY%86<7$+Ren%x(4WP&j-eWm71`(kG1R2rko?s*anudgB!L6w z3|S_g*giR8<}uv{K%fL5(dS!u@XoH&jEx8Dy|M9M_Dcjy7 z_v+K;xIJS=zwpi%EI~4u+wa0+BJflMONrUF*^lr)jnE-5n8_D38Rv&`Q8#wslrN!w z`G3@XWmr{_Z?_RfzC3~KXaDH zV}qr1P^q!$1}bcV-B_oS@#YQx3^WV(Kr;#O8UuI*WP15#dU^SK{AZx%s{`;q!W)rH zp-cgPzW)*40KJ!g206_8E~?zQv4Mv;$o5e5)i>Oi1kcEK13ptNE`OZpCWYBYzgmm{ZV(}Fw&<6h%Oy)q5&yA%9JygSwe%x_+;=siUs-{fN^uYnGl zhSt?(r?4kr+Oa5H$Vig0llBVolw3$opn5^y;>F((db{JM1(`lL%`;AygWgoQLB4L; zF<%c(ypw_P@v%b9&ycfuAM5u2y7#3H80%)-$GY&F%j=jkA~zB1T3>LFfKJFCQwae5 zAMgjrj=3KjeHZQ;8yerGF^I%1bicP(!J#63wIjf{?qZ<3mO_T#N$Hg`=WrEhTXd8x7tgU+nnVY)ST9UHCSI{WX~*pdWtyF#$GV|J ztS<1G>aY-M(`JdsxKT+BaWJ3$m@WB`<`&N8eY)02cqB{rOT_@9tl@QY*dB3LhD0Va zlI?&IM%C;$sNTr?9GGcIoHkh-m$|c(m<;y7;t5GPFQ|zBXG*7@%J*x^n4Ru;2(Mm8 z=POk=S0(Hh7aY}f74pVmjNE3$??P*0Io>akx*Nm%$MUTIKSM3y-Rz3f=zebo+GimJ z1;lA5<~@jiXqNru34fHsuPLo;gr=pH{i9VITW7u4)-xM}8OAjMd!6!t-Q&sGMWyPD zfgv=?hKC7SFHoeOuZ{EghzmbYU@^ui6x~tkb}B)cG4%3X@_^xv-KZyjOw`O%O&N5i zc}udA;7hoze;Ba5)NUwVt-f0YL%mDB|FXr6m*%97oW)!-2((sQEd%sHN(m2H`#`P7 z+mDw1-IsbsyI!=hy8?BWp#%#$A6sM%>&%)@J`$S3vqE8bu(=kgnLB?(5z+FQrhsUX z97<^EFr+p@Uh>?8XEJC-eTZgp;z6j3L~t2~OJ;5skyob;S~-?Oo`qzcR<_b{(UJ75 zjs^;Ph;Bo+s^AhUQRCD)xHHVAA82gWd;oSP6Z zD0pU+De%{bF2xs4RCv-hzz*AA2j#huUapeB(=^3l!ZEdCOY=iUf;7WRBi%sNY~opv zC^G0LG>>DB5$K%E?U>1i^7_KZ57+gBFZY>ep-JHeE$oB5l5?$yGOJ`q9o=U_Ie0(?9|tL`{DtFk#Lh!8N?kx!??RE`1WD5SdS1{j=Wx9t90`NHioV z9@o!lwHCQIE7c^h7W}-n;Hwt*nS>nc;&|SmsGJscWdz>^HNZHZM-3+ZPZj@g8>Swv?TsT?OrB^CL(N^eFR~2v>UM?ocDH8b9C=h`kl()$!EwT-CcoaiWGy)05 zI&+w=sgxwBwr0cRpMt42e>T<*_w+;6UnizTfKK7ycP-9Ry~JP2tPvNg7$nU!+xtT{ z?r%|HraMawoaXcYS%sMZ{~(Wtz1dVMq`yB{&-?r;tWvp1i1q>c@gdwTl3hlPj+~}} zJK_2~uCNo_K({<>T9`W6Y>~<$nCj;^YJ@O$iD2>WrfzU{C{4xp?l2ZB9vUOUM2IR5 zNK=`lN3@Hq$7WO<{|Zsj|A$&q|44Juhr|cZvZUFveVm5E@Tu2)e|&29L`AY(FJUlK z6iItKnVv_hR>$@>i>^UO!%;Tc=^9AUDoPDL?~pdxx1W=R z&ZL#v9Ih1ROM>@E(bgJKs09nT7SRKYQ=fze2bN5_G_{#ojl?rlfMuWd&K z&~_x;OC2=VvQnggNM)A2Nv}%OJBc4{$6c?q_W#yJ{Ju;T74tV2QPj**2e`fDTcYf1 zk3Qg^xrcwlE&P?uSmFABY_nLHJD#IlESntx=NQ?Wop*pT6t4yfLo@&yQ}7f}Cx0f` zX$+#Awh~6N5CF*s;srA_gzM9~G{|KwvNC1x?m@K!1xAERIzgPRZQD{cU$ts=L~8v4`q^)`PzdQcW05`9 zR2`RTH!!nv?4jP$~Y*Fd+Bpc>KXgJ{}{WpWv zXnL6M)Tq)KTaOPe$KeDfO6vF--@{KFo_kF;hCS!4!QB$4%(i;Z0I_gZg>fte`xL5h zUxG)Y#v>=Pqk`gF5c_YshTw~`EJ~wNjRr?KE4a8F2~|9!ihpnoe|f?$T*LlUwqh|< z6xhoJp;Q^USEozm5TBf!pmRvEzDUyew$V0BzPmYXCw$&tZ=ULGx0y&)f?Ts|m6*p3|D92J>+;d{zE5T=$ZTF` zqeMp9^A#GEHoiyuw3Ob$Pn;B@$rG17#R}ODkEWcoFcwR<5C$zug)rIa#ovDrenQ>A zDnHCA3wcJj)u}9QrcI1B2~qZv`!T1dX~Av(;dZ*b0!8wJQknT?csmH051>p!aZooo2t)~$cRE&Lm9;jh%Yk!_H9-o>=H z$|$l-!v0p|4KXZq*e7g--m5_1Y=UFXpeSzVjS@&4)8SIuEe#k_p*K3o?o&C1?#l}H zL=Q@3>r!=b%mDN639&1u2^O!Xm-}OV*vj_^1)nasJRWPN%cEZ_sxRZ5NXo4x+fFeB z(Tdi(l_3_#Ix~zc(S}ToIDWJJdOMoYwB|&4OC5JG6u%@6B2N5-g*JXw+qm`J=E6sxi>l%Pudk&PLn$Pb(OkXL25qCqF(e@2LuE%J2w++;vo?tP zu6@>#ntbwLI}Is6+oGZIh&Xfvpal^#OIIKY!{>`CrB|A^ zj?|2(9A1V3zK@QD4O#XAThAk2X~Q$;mJ><&cF&!&d~ldu$`@#SCj{;9!D>gU`rhmz znhHzvvG_tQVQ=+AQEHwf`ox{KOYp>eH|<9iLC?7B9a!SJ`+jnhNX7G;qNKBvdn-#qz*{EYljn zA;bAcx8Qg=D^LDiSFn0cEcYU-Yo?r)e*jt6Scj@fvirxU^}PYAtm)W{7e!)}mZJj} zCc*YJkTo=rqH!ZIOxCYJ_adEf(I5u#<3J@$#DZDLrKv|I7=Xh-?X6x|eY)&?;iP!> z{=4~6aSu$;`X2v?r=fu~g~>(1U85k)=L##y>uRpm6qrAY+oyYDG5c#{(FHUXW%uF+ zR{Db61dcBy0?z5UT!hT=M`Lm43!43JeZlXocBmx3`GR7`hDJnRbB4f8Ncvw_)qP_R z{AJeg@4cJ9G9ldq>$V$L6OHS%w2b*n>t4LQgJj~h*3=!7vCM|quz0UDjq~{`JL{?< zMiO&@(_A^n=VPb1=j_;XB?hF)yw4=^!Dno+uxkI0Cc5kXH_Ot9{0f(vX{W>y=^s6kMnKMA|nV;$B~62LK)z1 zw19iYUN71IKk^VOpL7_5pSOyFP9&1!K!Y9X>d|!k!9)Dz3BT|V@o*p$=BHCLxC0F! zp_Pf}h(*t-4U1c`7#;YKl-q+(oM(~s!&xrVzX;c)&q^^!)<xt2w@1(f)1jEhkPMd*LeY(IEt>Bfzsm2s>|LilD>riHiUI z4I%|8`LCU`vUii%zJ_|DEO$D6H~fGB$cX!z69lenX9XTIe<#%b)DriBmYN`{?1wBEz*1Ya_S+mg{`)(#7;S(Oyz{?-!$L`-VA~y&lw0 zPrG694FFP&grczA+DHOau6fW1%Ou<5EJi~qx*5JTNz%_V!#^o(#`S)+9=|8g+Mfx_ zs+2t0e5`s&M1lh48R&{^^4B@`KMh)A00}Y)6W!eVVxb5=YiLIP)TjHp_lgF!sm?j{ zwf>l~u`a4E7r87QXqFRXRGL`p+ZHf@Xa~AWWoA^8cuXO;>y`*)$m3%mD=kf@C#V_Q z7i~N53bg*AgJ39~e81}wJZ8M?&w>y}3YV14`P_e{dY>z9R>?(a>Q*n$>a zhl78#9(QYie&o{ti%tLV*^&VseUl};KgbfWyM-CR!TK+Y(tr4Jf7R?*J#yOXgq(K$ z#lUNGU~;W#&+CZ^OE_KK=3>PKl=LtlZ3hM}so6~VJ(fiM%Ti8`!hEq(I-B+8-H$kf zo4MdcyvVO-=z}n>VnKNt>CaIgWWB@-r(70Z_BmC-jjJwq2Nzy%c`I;paLirnhnmQk zhEYiM77mYnK7+yWMJq+l7mCt4nr6EcOxk0w_v)`cJi>euD1q{5WM?>S5gfBpKq3=E zD%U(_o0s!|(>3jR+Ue7XFItHyYE}&BI92QcOvIL}`3@i}F3Z_YW zSXn)s;2dQ;GD}NoLyLKSILOa#--HSt=jyTgVtex8%(GY z=~Dj!tk+cSj}cn+TBt&2z-R|w&>wpoqMyQ}m%_gKIQ~$^MA|U{H1nfDUER>((B592 zeP8M72i>#!EQp>a7hZK*3=*Y%G4Y!MdM5x`${SN!-ZZXG%uRf{tK;GPFRN&e;}eNP zUq@|YYxx`lXdrE6Clk3Kx8DWBYlTvt%cWR+_$=KBNt!ZEL(Y3mO>g~ainPUpAsx|t zD?&y(hxe9cXGvUxKf?dwqob1~?&};4`YREz5d%~W4L_No8LL2-A<&xmgy})IYwz>7 zr0sp695P|q?Pz?2sRonqFd|dOBcoytN}PiIwXnz>Z$eScAZyZxcYhC|e%JeFOnCdO zd=;4EWP`>=#}!W>J*npZYrX%$ynSEFqm^Hwrm6fsXiieLsPhpE@$HBnIZgn5VbY@vckt2~-g zlXX*lZSfuVoGeFKBM+r?ysJaE+G+b7T3!jZ4ipxjWbsJfXAd`wZp-~ zBt@W@b@v$>AP#a;lFK(3UY_odYIBu5*Sl>DpwJ=nTAI(I|GZyt>m2cn4sf0eI_Afr z37Qmdsj6m$Epp?p^`y)b31)$VjQ+Vths2Eh$O#>nb>4*KmlMM^sE7q} z>!Su-*FFrh2O0kk+w#Qjce)>+yD}QG1K1L z0y4T@VxHsR8I`vms0w(VmpCL3mb>8kKI{Y#p5W%PW9%w*Cz#`xR5=~@A&;$TPCek3 zLzE-zPDjskZ^E%}Qs31IHe*LIY*x429?6@HBNY z1%O$lgFYAa)v{h0jdhkyhW__48uQ^1p6_d;68R#XI$pl3t?aBZ!D0tT3Y(c=%cXnZ z7Wm2g2~w0*iJ~_@R zxfD%VG8{F?&oR$PUx-BLowXYWIwU&qsHh7#1Oz1*JBuAHXQSX6B-`~ZN)l`$=$3Cx z97acTrt{2$tO=6^)g}vJ)3~?Az8=#y-({NZT9SkS8F0gk>xeibuBt+=YxFpt47Ga9 zuT@;BizO6?&7Xb{wg=DH2RT&((hN6-(5vGBzBRSHyOL1ya+a?eEV zTF6Ul`Rx~-OEtrIdz;4jkx|svkz{uny83J|NMM#+rR;fi_lPw+iJqBSR+jjO$h@5r z)=VS%l10$f7Li@)4ojZ&Y0a2E5uf(cY*7{dI_~fI{clu7_oi39$E?-$q?YImc{krA zmg6DH{G?!C8zLLEXWfd-S};4Ka67WHLBdw`j1ZNE9m}mQu9GE_8hT&8fQQ#y+d!jI zf@2j|7t&oWOO3}ez-E@dyJ$q~oMl&C1X>R4cE~qFxGiOP4RSllX zW=}eK8FDH;Mg+GAaS)m!>Sgn=4UO>-ph8!^Y<;Y>W|CkTEo&YhX5^e)#fs((c}&^> zgDg7@U0EOG?E6StfNDKwFq?>fdNfsUc85GG1Z`RhyGoYdnuk}~>XARZ#Jtzo0AsB0 zLui-;JejrwQzARS*fIw*k{>ZTDD;*h8Ww&_6dlG8e`N18m3zGvnXL3I-%qP#s-@eZov+G3~|aTyenC~{c<57elA z)9{JGpYU7to;CX9*Q`-$Abz8K!*2+7-No}CMd~gOWtgMpEe znSqT3z{2pAn|e2vn}PX`Bcl3$^<({2W~fYBvIxb$YA1&X3LQg_nnrT86;47reBaX{ z&#>+#Uz@E!k5Sv4Jk5eey+a~PObAYzD=H@fp;{fm@H#0PL8Vtwm|OjTsU-MEF!=eB zJU&to54+f`G-#^oK)6oCVC})X#R0(35>FqJUwp=;8(vi*NeA11c_r` zw-q)ASkGYwW+u!b{+ow1pVZ(h--IhALMa8XDWBx(>{K9~FpV7-c?C(>$K)!a8xe0nddY`NOwqStV|y%f z!;o~{121JH-|gv*ns`}T_FkRmeX_~zM6Z!LDuo{QVUL7uAXyMDVcs(`tlBWeQVbehX}I+xjjKko!?sFf zm#Ys8vi`H5J;U~UWXbzAvP1!q#pxbdgiU1?e)>uQUa$V>4q^b%zQN4Hdp*C;_izB% zz5)#@;1@tcWNdp6GnO{M9$3A5tkJj82WEH~?&oB}p<>)243HYe`W<2J|28c!ru({& zn)Lpf_e6o;`tJS!F5lC{jBLP82`1nu4Pb@|NG7;DWVt*1zxa{<3Q=m~Y6S%@yUnRB z#g<~FIFuh8bT}dN1Bvc?H_4z8S?rWw&X7b5=%fj7Dsi56kG91HzUsYY2w?)BtMhSr zLgcHlU!_D@aK7BYXU*2tFN%;rZPZ2*r-MExI{Rsa=GI%Xx9rKH)Lf*eEH6y3F9?u{ z#Dg_>bxp03{3s6dv2Z$}1#s>G{ENgJv4XBgqAxVAEj9^We>M^x_4iTB4i2karSiNX zvkok4X^JS7iaCT#CbG0RZZ*1`ORvKF*0i_^ z)8v`-?T>4MVJpZ&oUIkjJ_5FKA;paaRKuV2@L;7!n~F;_s7G!+Jl?zQRPF=F+I`v>f0LL!z<^Fb1~9RKp*Yu#Z`!8fTs z^ATEHC#tVsyOh6&i)6Py^ujk7J5#n|t#187Sz%4)r-ph%;Gz1O`)2^7x-VBf{AIZc z>;hP>^85y14?*%noT%;w1Ivy?UHll^Xo(CgZHR!Ie2gq@fJ-Fwi0p0kiGYp4PC!20PrlMW#WUa^ z5*GYAXA(Fjn2~{8_85iS64VaFiP>5Y_(Af5Lx|n)gNR9eHEU@3I11p{1y4 z0ER<)supA{x?2C%?c*_6S4QS%waE}jY=0SfBy%WIimc4@Nl|QVDYw2DiXA)nL(6!W z8{IuCb=ERN$MW7ZS4APtY~5#spH_7yibSEF3=n-y&Ho#YNS*E`&O+EWbiSfb?y`w2 zzdo{n_>Z!7&+*fCnpqbRUBWAuPr|IV#B=-5iX1x%9%#Q77L*(8D6(j-eF*mHs%B~6 z=IQNC(MACnKrLz7j}5ZM1^RlIB19tg;=^S@I63r|YqXKM?TjUPDKS`mQXM(J8ktu4 zh#1ZRG^6#@JfI(#$i|3pQAxctrJ zQ~fI@ANYs9(Tac#Eo=Zb1~$fT(++`(2Hd9t3@+{t|L=dmzw!d!_}1FYrNf)9By9sg z3mkSB>*M%wdf#h5eQq;+^V!>})m9r4HjiSaT60|ZDW1*LQ^sSPV8k;Y>=6@BPY_{( zSMN5HTTzrL@N$gkVFQ{?Oc6BnPw*TkC;Y;!h+kJTZiZw}0?DYA^<$z#YrW!~Tm_3) z3U10RM_U$eovJwD6jx*uF&I%_(7#k_e;ZqUthz>#oIyI>y*H9V=Dj-bwo|w(G{G6t zlo~ms2-ZT3%W`f48C&2i0;=_syk_c?Q_RO3#-&dgrF0y3>bBM!nVYaf%2S_h*16Zn zS2B^Tn-5!Y<6N$!7}olnhUHc0NJ%e0FV$m40Y9$|i`6B~wf-N)6(%<1&LaeeZkt@j z&nC>mG9pn7N`6v}uV&dP13$jI)`^!SEMPnU974;)G?`8%$QHR&aP$-EZ5Rhl+i|mu zRcI0Y4rV8uLiz-5d?FKfVVO=gh(n2ru>~Z)duM}CSYidrg!UXPwutD-?wM{o-vhq9 zvAWZmWY*TAK!-pGMF^VI01q5CZg<)|oSBIrjlSkm9I-Rd$)kAr|Ub)Jtx zLdQBi4@O_4s=mJNl-Vj?$>eexY&8{RT$r^(YB)PJnrIvem@JkIrnaPpsHw_-m+8DA zRx&oKGBD--Xd}VwNML>bnIt;@zPLp1B2vPXL;GP~4J%p#%gjp>7P&*g<~fQvZ6$B! z`TjsHcsSMd$DrK`71PD-NG@X!RO|WD{R=uG{lS#vV4PFOD7@t*^yN%Gac>qLr&feC zk0VS>XjlZKoA3zZkE-LIZo`&pC0zx*zD;~Q?25k)Rt%9$P(L4NK~`;MaK;^ZqTF6h z|H=ILsxRxDDorG$+T`}Zf)Y8*)dMX1dg z-?E-8Gw^_$Qf0gyUZGG$ySc|kYHL0tz@s@;j8!8p2cdzTRPl?w!7kV;G&7Y%_bLrN zQ|9{||2&k0YfqZ@XacLz%}^`|>X!x2eM_CuhcL_m+UlYlz)#3{XC37#UH=V9~Zhn9S}Vwx;73SwP?i&=n#(B>!eJx{iy=hzk!Mh-`W z(Q7+3(c{|Bkl@M+W;New&J*Um2+eX&sY@SMvNX_uiYMBKv%4~Q8iI_z?IrGR`D#Me zgJfD$AM9cNsUN{iIi#dS!5D+V+w-Ay==@x;cp)R@&Pk?WYE^pUR^rQ*?z#N;NDpxa2d@K&qyh!LXOA_<3yH2b*N z-_@COo@@x!BQTf-hFk5XV#*cr$I=DVZswzO*)OTJ!CJWFu4(vRu*NPqc5FXvug4#Eg@ka9nmJVv}bv<57Jg?}O@i z9%{A%S?mB1pi4g+Cz6P)W-CM@JoC z@q@!FEYEPi^B5K$Rm9lFT-(aV(m>x9m|6lhrpWU%05br09;r4wq7uJ?uskh4DI=-XcIhoRQ8Hb2^aT(Z6(%^%n4DaRB-MZVc(7ny9AxLEzLWF6xdL{RM+6o#~fN!i~W1`YnD4H z>UHvwSd5BYM0K$_cU>cYs;T{$Xo>kCsQZFDZHnSVZV$7nsN(UN!}$-1mS4X8GtB&n zECs-K&2{MrvS<3hRV3Uhvb~+P&`W|*CyER=llRN5UeWOnneN)23?2~}PW{{sH zwf?>=e>W#ymTO`D!RfVNd`mM^rLCv~!23ZUFeJ13CaKVFFbOwDqB}p2PX+u~3Kx8O z*ExG9hOqEdqKf=aMTvxDfd2>z%PEM9hzkM*lZanYK}<$YTtS6MP=@ZYl!6f5_XI0A zJcg(cP$IuhFuOaANRH*Jcz!L%105CMPE-~KCI*%}!30K5z?OWLZ}YhRj(hkk4`Vh5 z1==^+cukHMZj>%hKNQSj~kXj(1x zYI{pWoxMA|fDT#tjW>FBYJ~Z#BnjB#-5@L7r%s)9YR%c|mB;*GG-XAcIeSj9dzzf9 z*N2|mWy~o!C4uBFO4;82gu5(3J|3FoR8M(oE%wUWk0?^gS5Nm2%RSEgd2F0_^R85$ z7VO4_l5jYEpoNYYXo{-mKSOJORMb(HEG$%AHT`(7n`%WCsr*I1cQ_^%t6RcGVDc+z zW|-5*4XOszuP{^62^`WS3>f&Ac(1x34{>YVaYR_p^mMsaIj|mW8rq{x+ABx1HMf}H zlFJ^ml0!yzS%K=AI~aV3nzMjv)AppRqN5MBDj4PBu8vx>sO{vkIyQ?=fEg5Z!)iNe zOh=pwDTk_6MI3^I7cE$SQs3;u-jO<*m|!-}fymHk_+j(X6d{aB z^2&g%buPUdif5fXKtw}QAqmm2H?QZIsNH)n4SDG;*cA@f=sr>Mp}t-;(nIQ%MXQfk zhTfsti}g*T^r=^fBQ*QC4h?G@is$E9`1Qq}AX46&RUR<)O@K`Lho9uq!_T6tVL|Xg z6cQkpE1_oJA->Re<2F}OUfa(L+vbzcK$pz4{)|Js`rZnX_&HjDpQBT;x6|*z-R};> zN-tlA^w3svmg_JAuYMO*pb7S~KO@T@k-`609>%D+@^Zm|(epQ;h&0%PVXw4>OOf|= zWsT1XJz6j#uG4nmiWx;6#tcdKn_Zb06R6)k@Hcpf>4t`mJF$CBnEY8I!MF~GEEl#q zidU1hG-OY?@X4lEFqSfhpB;|CyKOa8&4>%=?P$BOPoiTbTvJys4W6>PU2I2hLo8m4 z>wYo6LbHxBq!*Q_Yq%w#wzU!gw5lG{JLP={gP*;q(q#)})AzG7d7%bl(@>_%UAb`n zg|U^*f2}b*k;45AA;t$Q@TBu1FtbXQmNGE zXkArfpCwzwCy4o$a&}lQM6E}6Lf}azld}lj87z^Ag1d#ql}GJ-*1}K?~(E9Rye9n92h4!8D&n>dp09F6-xI*Q3Hss!<2>=$7Nc zF!mO2BGm~XhS`<~3JoelH;7CQzlc4xOBAS}vZOP4cjY!}z(6wK58`g%121se%pBc; zvm?{zZX*q66`C*Bn4g9A`Rch)5?XmNT#Ruh6`4d{Kg~k00TjkdbY*MYy-%XPC+Q4q z&XXRbWou2>*8>(lTkwT-{AN%K&D{P8^kYBccGW#@-;rH^f!p3d+&1}!+iCALz9Ify@0BAeYlAmEqzYevXUC zbi}0@*NyO%7S2Y@P!lduae2mku@@5jvTMP#qPcS^Mwp;AiXE;T0b`Tj_I$2!wEo$0 zKXBy+yM<#gqKYp0U;*`z!d3lBo2%%MmMd?S?Qt7+ZE$n|%fm>@>@{=<-6wA<4qP<` z@~=Uh(;p&WOI^aQz~cg-n4~MX6CzXQVVc-d+O%t5@HXyRv8q&9XDsQTyckd zHY@B)h%!Vfr{@PJ=J_1n0`bO^NAGWQRFnD1jbMmi`i>y6Q*$0 z8m<$ho}yI7TozlU*L=G(`_|Sp$6L?wcli@Yx(FvYMkpczRWVm(Ph*bm{xiWD5=X~NH8pmz(h2AXS+`tYue+J zJd(^N4pCBx(PJhqPFs>S5*mHXFX2Q?Hm5sXn_A#5V0^`?`wftP>C62QaUp+j-R9{C zN443U)=DNPt5K|tcub5^N&e8^@yio_Ai#d@Ap`>ji8>MhGvYhwFltkvU)s~@=tvLF zWS}he3C~rEM?vyedXr!?rT}m)!=A)9vb;hQm~Y`^+eD59j5;E4Ba;XrF{Y+Fk} zbMR`6OLs&HMjC~FlXI7Vx7iD*k)rlMEurm1KMc+Dh(1uHA+nAOE!@nmgpTpYfehKr zfW48CHk6O;9INY}&Zi_6m zv3dJka5%*<(-W!|zpu=EhacIU)-LAiZBxrLp{_$CG78Vtp3Di9z1ciAd^XqDQGM?x zD&xHljb1n)iC4Jiv3XYF$u%>1Nkv>N=+B}J29rHMUFq`4gNd9lL({F{TiR{=()rx| zAsR-20)>Urnw4+886%3jH-liy^nze|c^^~wBUtIKrs&xjpxkJzTaMr>suV)K4O?1y0B>oJxL zuTaGUO|vn7^ak#F5=4K934uKcBmkmsn2jxJX=!Mtf4>0k`xI{?DJjA4%qwtII8g=p zZ>2oBZ}mD>04pO9vhRNG>UBRJ{^u_AS2$gZ3>HGLn&p_nHQyThq%N+2k2~wy`@)S8 z(%bs;=TMKUt+^%>x`c$BP{|9L&y^QLzW9|FT?vba4aYg#O(;Pc1;uhD=Z`4*b1PGI z=cbd~k6<-+jq*>sRYf04BQdQ$twhb~!7`KF`vMcWl%_{T_6REL^%xJG*7EQeOhDtH z*pc+xx6XmVjc9w14Gz3yHwgZsdjWd!^4jHv zyf>WIG>t^!9DbUef4A{nSxSFo6V8xR0(w!(tssZd=MzW{WAN7Ssz=n#4 z#9!}Zxca=}bJ-LuDKN{4a0~Lfl*+rE4DT3{T&|g^4i_GFXxrzbxt2$KRWQl*urfFs ze37ASz;VaY<;m1i6bZ^k%jFE?7bIP@XEuxKQy4MLR7OmPoCbSP!Q@M*)5`iUDHb)v z(Ll06Jdz8EYl|x5Ugb4B#6W)k&PYx($Xu^Yre#w0f$<$8XF-24h(pOW~ zm#6J-2KI43-FWfOfF$y8_LMs(vSB@l``vN=BP{>ZAzo`0H00JeG-4Ef^l}D|508RS zt)Kj)DqmA`8N~wRb8smww*>LgbWgJNB}@|Eko3E?bIy3fLUw=7TWot8VBnN>k^elk z_@ZV*Yjb(4l0bl;3670tD98#}x*#naHmw=sBTgJ9VIJn{BJo}BLI`$M4_sp*9ZGqE zqd;IWR~1n3<>b;!5lshHrHJGK!xQhRgE?j9CZ@P?Ox!Js>=2iy^QQ?182H_nQYsHlm;^es(UEW+rH4pDC;X0u-Rk6b4*67LVP6nwKIK!_ zA#qr`9nx+Nee`mS4Qx4laTJ*?=yU77IFwF#^d28h1scrk$kVFqvzCK{ncI0B+QoWS z>y?%>DY<|em)7CWq!IxM0b+ax?K6H z&f9$ce+R?mU11PpI3>tr#Xrf`e+nJHjUf9GcmGQ;{MY-Hh8C~$ulDxPn7N@KRn1h+ zuvr$)+S3$^#|OD`V{8s#FU`|FANhHzWr@jUaCFrjP?jF{I~bugER}(pB@uR#;Ah;} zI4(a{t5}0*m9fdhVNTrQFxrbFb8*PpFmCX}ZVn2)Dcfh=v2D8bSpjO`*pNhZ*n{*C z@tCD{wGj)ABRT+`_m|72*O;(k>wzgOn|W)Lb&bwG8l2#K*cTnQ0 zM~q8r$wKBTYU-arGVxNnUnYb_-lp^vzpg-j#-TBLWmq<;hMdNjjN3f7!XjOo$Mof z*iKa&L2&kZeUl|kFzr}bw-X9ke%#k+q~KKn zFpKb$s(giE!oHz}cP&{NvlLQr^O%XqCV`7Q8`erTRp~fSQzvN>N!3$KU0yMH!!$3E ziR>h%*W%vzaF6L|w?pg?EqC?yprR^n7V4ITx`5s|0zM2Gr93!CIdEdg`=Tg$a^%sV&qHA}GGKZspY|aNr&k>(-kdRDADpNM zY)G|bcIUcEx|1GvNz?h$c}VvG11H%tMZ+*XMwjjM4(~VAwA%!)m&G8nzZg~!l7QJ> z5y4iZDM)4w-fD@y;#EJyRccNkj;Dnk)ktFp6E$l%{rrfmKGP(b#u56mvyw8B{5drD zihJ=ikL4SNK-dSn6g64m2bsbOE*lj3NkqhjIZans@r`np@cTZ`q_$O7h_t%i>PLHr zo*)q-1ShmOdYkh`;Hx)@Q#23AAbuEf@P~NR)fS4Pc0K2tN%~RjR?l^$9Fvf@R!RI+;7n@#dK?xc;_Io6gOQv|{|q2=b*EGxA>g{sa8A zo+*6){-0r(Ldp)^{X_RE-RWZ6ZGonrJxq(`=A`PjK3d4s~%-Z6amme!Ttvl=1#XtN0rPhxs3k z7d)}EEiekvDi^G0>GA@&NQ$RjwQCP;EQ&OnPHJPZl=Cgvo&`k#RCl=#{9Lp79Jq?Q z>wydTHlw3VY_}_II5Ma*vJ=NOHJOU;umlcQMt&>z3~?}D?%ck8nVewtB^?_5CFP$Bc#2Oojf4-|iN)?^Ry zZN)ncC5;!8c+W{F;m!cH^p&na!8y|AE;!BfUL~IN#kciOrLE{=PWhP8@Q8J#Neev9 zvpQL+=fg@Pnp58(@kDHmxZux-1AmV=N1(sTn1ap&5y$6u#Bu+`8*`lpLtK^r!|j6s zXVKq}kA_3V{WcO%-q_IMw{`1x7VRTj1gx9^D8v2u%Nt$7P48iqpg z|6OTOc;!+iT))ESaRqB})xy-vo#Q+Ch3;>+Z8jfxkrj=|O!5;JB$+#vYB_;gslKYG|7AN}_i{~Pk~ z?_BX871@Om;;-D)TemqziO)0OYA0O?qB+G>@Q!pCXxp4AZ*U4;RM!q9Yzj|2zZ`Wm z7tC%8&}W7vbY9ryX3FYHlg_o|k7M`fCGg!HO&5<2hz)?}^ph~iNK=WCPSA$*m-vOS z{Gt`&_fi_q29;RK4pbkpkOcXn#p0OHNQTOf&*J;Is&!+OUW>VIhBq+$9}>>5u9H{X zP5My_muz* ziY}?z5&NT;eAgkV{6k((K$zja%mRyw^gDtOSvb(zYBKsvu4!4t7gO?m%NTYU!>5g?h7~ zfs_mGzV+*%Pbl2cFXN}??JQ!1v`53PQooSz)J2b*S8q*!c9 zk9yjN`Svk&yBW5i1eD+Axa((Pqr;tJxeSk($l-q!aQ#y?&~h=r5q_A^7bHvX1~JH7 zc>Cr055v=eqV$ywJY~D-D&sH`*1Gp5yM?)nlCj41i&^Spnr4`E`BqbnVq~$}b?BVx zJ|1o9aS@p6Cmorqx{A2RZw|{iJ_t6j=WNgilXD$r$|_xS!(OuwcEVXbi%m#`SnAM> zokZ_N<4^5Wx7R~|c&iB5^N+ZFc=)(MSLAc?m!&4-YdRD$z2xP%qx?gv2+&IO8hHG? z8{@~uq%R4o3-GLU4*Gf$N-@=g-=2&5TTpi@F~p4+2KmuknB}XBq`?<^uO&TOu&SF= z;?Z6+`S4=u^9|1;{{U3Eu3W3U{3*@$yX)FBZ%w~3eylmKY6!e8!dy>FbfVrx_&`|v zDFeloFJiq^`@O-Xb65O5nXjt;`nmMt46w&O!9%fu|`?n65?hM{;W9LiKbE zh5jHuW}-t+sBsx@v=l@U$DRQ>{iL^_T;-wd;;Wu*as(gr?nAYZF$k?b@qEh9#$2EK zdnlvU(}J~?*-Guu=Ixd_4{Ye^Qm;lDTR-uDe1K%y@}?=5&*#Lj4PD?zAmVI$U68e1 zB@;=Y>@Pf-y!B_R)(MjT0c6w(QkmP^ZC>L!OQt}Ng-{UkJB z)lrgfu1&W1rU(A;EM7rayfGdGhQG8L)!&~IimA_Z!>-{C2yJ;T?D(gT9}$CFZ4D)S z-U+$9T&}P%vjnFKXW|g<2w!VZHY@&u62B+kO}j>F))1?EH7{>usPx3Aewc;0qu1zW z=>1#y;(^HE?IU%O(6|NX=ae|~_=|%eZ2S@XLgv%*lnL%9h7bhk)4}nt#}}n2a;0!> zZ5>WAlim_KBdpRwm%-xwKkD8BDvmX48^zt--GaMIaCdiix1hl_5G1%e!GlA9V8J1{ zYjAg$!0pI6CzHv{`M&?oo%P==7OUUxN>$Od-)H-?X`gsYRS^(lec1Ous!O)6($jex zM0^xfL?z7_zGk+L2QEt4rez`I<{=*sc|OcT8{*z?$bi;#w4iFg5_AL(E&G9L)@gXc zNWqj~|4mXL(_Bs6fVhT${;%7y=0`Rx>G#>NKtMLk`ulc75Z!794P^NkY$~z!B&zuH zm-{sx_V+uI{eQP30R{0tS1_>ry!;Pe?e7v}36ML^17^1eXaion*YHrMwW6@J0ksl6 z``Ww}fsKN1SkUtAeRrvcdMd-LyX(Wpda9q$h859>52TiGwR)yQk7T*gAr4Ks5=13^AUt#S9^j_O7am}{MYZBg( zNRXUQX4P(nKA-m@c}r^Zug(*sP#|r;L{^87jAk3U^=Y_NPLgt8>v9j|E@VJ2>x$6D zoce!Ke{<*4q5x*hx?&xN)oRUN&9zZR#@=vpT#tvU9#_9yeX|za;GEmYRw8=#IfFgN zUgg!PlbRiUShu2(2zvZcUN>iAnw*>#toS(uyQCXqizCNo;Q=v}>%*2IhJf4DTx?Ph zjLjs7tV=uE;TNv^z%xCx9I#5*-N&QoRXf;fs2W2vXsap+Zqr1~_7k=*{qt0>agakD z{9%exUGX!yL%@MD7yPElZx_KcDK%wYaB1(|7UawZB91++Fe2XukFZEw4%nKY(Rymg zPe?;ab|;wN7$bP_UDiYnXq2Z5iF()}gktNcRGHSdMW!vH?!wzQ(l46Z^+zDr1);qH z!gdJsh)s%}#G!2CAYg`^MKk85l6m(Xk-io%{9|J5-x>%NHsE=2sB5{~YcqJ$y(hkX z=E~XsP{8op1AZ!C_=CYKko<6G>`Q{ur_6S+>{!b!ozb9Wz+86u9dQ5$Lvpcp5pSqB z$g45C1`Ovd{dSe)DVNrcPix4r<)m1AORG*IiM0uO?OstS?ij+TYU(w)H9U20i_e|P z^7hl%_^Y6ZbGEyLIXswK>$cNrWm<%vr9?4Klo5Yk$G@9}WO<hNeEowM5RNTK6S?l|945sj6)`;7g_Oi&96T_cLiA(z&mNDu3;ZQA zs$Wvki|tnn?^hfccRwBpi5+&vfrsC{H1-l0b@cZJ+DWcJaA*BUe*X?8i^zJ32Q?Zc za!n9N!qYk1&9b*%$2Xvl;86pYil)e>T+g;0eB7&HAJ8Mt@d%P;Q6{AO@#u1B@kGIO zoZT{g%L{D94#Kj283tNHGj!hz&A`*7#8UV;wpZo=YsuzVnJzMARqxD+e?+D4gZV)| zqKxR%#Ct|kNSSD)wvfcR6s_76b-etcX7q67CR%XBjjl}WDlFD1nT)2xYr=PA31IF; zpv_1AoAdhK5mGrZF63`(_@(=3)jst09doYfygBi>P7i8wp)&*~^6?ovlZVvQkDwD) z+82Y1U%fOF_i&q1(IzY>;}{gxlFJs6=$oxf=|&HNzM7VlY&UJ(!f~|AE;bL@A>MnN8LZep>UY}q2S=!Or%Pu>y!*;8W_ z`yabHKPuiqQBi-jwnPCeoL@(O01T!d1q|Qn&Deih{>QHKFFfRQgsPE-olGS+SJt}% zvA5;S*vz$%#gqf_&2Zx|NWJsnl}T_8sL;SsvwPxut<`=spB|{-7s^`lLpTl{pnzQW z;$Xe#mC{KqNFjs|-Y_T!E!>NvLGI|so9p&_`t$y-@AuzEZJA(VqU(Dy#zmz4>TaIDf8=T#SD!vl=II6YY zDt>Xp%W!6W_{=O?Ph*4UgoTy$?$IeKiBK998xSo<;2;=n?}|u4>*Eny>})y*rwW_l zcCR`>?unPpmM}|QgpN;K7|1X7tW~vR7BW`!LSdfYmt$MsUk@0BEzfsEPghL&PVxpG z&0xp`in3T!j)sil(OI9DzB~;szN8v2KRyqV#tVHw&Es~;)k3D3rgWq{^ry2m^M4as zi>u)|Bmi?KCNJx*b3-Gs4i+@1dsS;yWBMSJsYpReG{}c`>wjp90VI!Ol4J%o66v*0 z)1GmQc7}VZW`)s48yx(}oilY`$O?oND-csIUhSqnpzb_ziSNACm&lFZ3!BuMcGAgN zSpDVan;A=aOm?u__80>W(d8|;S(n!p>AAKpx-^qAr{%& z<9uo!5le!yIng{h-nX-4iq$H3adKV9UU9(&6noGTpD&wxcP+-7t(Y8#JSvcjPEx*X z61FfD4XN+H=prr@S5}p^XamnbnxQB)niuAfUhApbtPaHH?wweW&4ltiKN{gTx-Z)? z7#i!%(Fqjo5*<3nv_|U(1K}ShEA-eU7|z}9&_vI|Uz1Md&w2qxXFc1bjy4~-_ZX?V zJ1SQ^rC2m4%CtG3U z)n?#=-KbXfrVNAmu-roRF}Z1ib@`&-@FPOVm2{B75xiF&vxY~kDy_e8jSHb?33(>| zOisl6PeSxy`DTH#;cWFbMeKm`QFoG2p_Z}dOffmFU?T(OhnFXQ69)Z()Fj}ekUUCl zaG51Ex6NCG(d13RuQ3Tg9(5JK)JGoaT8?$vaZ2m6$a+?sEhJ)S(Jlm(a5lyV(LNel zj;!5cbvLnOq2+<;zIVK?i=Vw>>Coz6jqpxeisRl!&2=!$dKbMv+wFS8Vm9ew&duSL zzP*%>_(It1mGD{CJ)Dp`AQXmZ?=_jj=aLlMAi*U#P4qCzU30f%-}S1=k)t&tsmh&6 zzGk}~6m?i7qk>#>$d^qY>iW4TlRLHNuSm@JgMtC=_Y@330JPfqj>Nz~Kg-kC2&M5) zY8y~__=80g1{F)i!jwqdo=C*d#KeP0+{xb6;Ri1g6C=a-NF~*u9}9n*GR{o&FNoK^ z>h!M-Xn;ZE9Dv{7suF)*{&#L705JCUCyN;PTTBfe@Z|tQfdl|XN-t;3?5Sf(=4kKF z=u3p`wJtqv9Gl}^m|E1RJ7(*-H6Nx)?mGDKsbLvI+0UO1jSBdJsF0{2%~tzQw!894 z`}VqhJIbiY9^@cm=&e8FX7O*4yBlxrMoJ|Y#?-Emn*~+Fin25 zKy9a+`xy2acG-9HHTvrQAotW7N-iqhY}7k_6uxXIaHx8n0#i;f(G-F_0|S?C!2%~E zT%&G6dwm?CRuDzgq6$(hs|R<`Vp(6mk9Vb74>`~C2e2_7tNV`ioZ*k$KBQiGB)3#S zn&+a!FJ)`=h)mg?w2f6Ge;l2X_2F>$tXY~K@Q{nV@ zSLJx@qztlSjo~0)&f`*%)#N&(|7*bW2e1?Q2Q&Hy_@Vvom>lzb)Bnm-4FE_q+}GPd z1p{XU1qOcl`4RsSHf5GRuO8r!eL(5SfsBlD%VvQ<(}^L#x`ry`gTcNH^+UF^+(^V^ zd}56?cH%r5!UN93kEhCKy7KH&nYr3z(g4jJ8a7&p7j>>{6YVFfn*vO#AoZ|(-B>R> zJR&o|Lb`(&R+14RXot~Hv>BfHiD%y7+9!pA2u+2&)Xq70D~&h<#wGxv=%y3y4vD}f z@i-K|3(+v5{3wtn;U?-$kQ3KF(O%$T;HM-zsFr;>ih5_7jfpFnM+(O^Lu41JCv}`q zL{|y=5k*VPY!DQ~gsHLT)krc&U1dnZg$0=~Qwc_?@FQUX-OO+sG+Cls@L5#pRqv^_ z)XO;#-{Jc%e8~D0FaGDFIQ|hYzVWpL{v%-g$Xh_6LJ9)-h5&7=e*|VAQDKyg?Oj}) zO$=>JnQ$1fzJdk}Dzdo!H%R$9w)Y42L_>*bP^d}O>pGa2#>5p$Q)^C6U zpe14f{Csa6^#8x&F8?k#+vaElb$X}CdX3wUm3QqYsj*8Eh+5c9Bn-?Gbh;HRnMJvG z6@)97UAy3r+{+AH1c^$%wRy`{?;=@GiIY6}px0GVI5CY&7tJy^lp;@jPPQ%<$(xW+Z*DEp6E&k+B*ks__hJIqyIs zhbNZAAeUkI_jSGdyzeV%l=I&hSt^o)8{&xgN75DxCz7s|ar>ttJnP0Q-qj_j&&*_m z;Tk>-^ShVU9b!HRHWDUh1yQ2}j;-Z!pcb&J+DQ)sewj6SyP#}qkkLlFtx?*jFZM9p zg$v3Hy)Vh6V<}eiS^O^}>7V*?e~pd&l``Z`4TeNAr>Z}``T#CyN7NBNkGTBvrvKKe z0f6(A1znG++ayhMP{UIn9tb8^x*Vb?dDGC^>%#Pw*X0sGV|u}ypC3ArXBTH3WR_Z>q^S2qqi{p#e-QZsfzHv9w!xft$hk9X za!%`m_5iY%_2~)H0&{^RhLg_o^_a@3<+?u0fG3|9%=&<@KG)`&Yg6|NES6!~69$>` z>#FTx`J%2gDHVur-XWyfCygAyP7RHZ^oIwgAlMaCWhDadiQ-wmSn#D*mXs0ENSq z5L5y*5&t=;<41}UK*`V*@M!O~Qb^&!zQWzMFp$GvI`J ztjbOt_bhuS$vxWs`6CZi$*GgADUf(r&_gPPb%}J74H!(A9_E>9=mTRV>l&+uI!=)C zF5_JBS)$8FMM4cprlDjx1LRQG38(lN`7|VQ>LPc#))+yJ7<8w%ISt>k>i@Jw{@N1# zxXS)0k6=?6VEJTeuh7|!jP9MZWiUjDvM7@$~zUG9~(H*9Yuq5 z>4G{)=D*qNMhkN&oPe(^8K8Zhe!m-FmkPp2Bc2M`GuG+vJph}CC5W4M!3dpMM@j{s zg;vk2oGSxi`SQ*twuf3$bnBo2b(P!ZR~elA5i===pgD)PHgug5LwoD8|A58|{8S5T8xQHu4eIr}@7NpSf zqEiz*%rsc7LVED?GVe<|oW9+A!aPH%X=>DRHyIqPv{*!qSqPQxq?-}}qF05%g>F}c z4|r=wcJVCKfeJw|oAMzy3Zm{n{`=Y%>lCktymS;V&}g5x;uzq2IvL^<8q9^F3YMxGr78Vu(QdMX;h%yJ{{}Q* zBuEPl^54L)?8Rw!tM8G^en2_;C(!uGU;3t30WFaHF%l(qM(E^bUT{;95#bp#hjNg| z>7!`+dI}#b5@YhwkV`CVq1m{eL(gA8)3O$LX$DC?OLFOhBoMbf8^%+hSkL5pt}Jlv zoA?5$TdZJ|NLt~7jR)&O)k+Xo9KwRP85+uHPG421q)a)uEJ2N3t#kuCvb$)WFwgRX zGGf=$;=sDknM_!SxERhk(4}8&?xL_zd>YZo*r)1!TIEh1&P`O|D(RpjyULRj%Nj??1$sN1~^^jeB|3eO}@+0u~&f z40N$}J3waI_SxuNU-w;gf2NwmyvLWs7wD~dQEFW^tPic?7ag@l4^xa`7Ds~>{l;A{ zTFW@GR`qm7D!54$_s1e?&S_X6RYLD-t5Ln0l);REGfvy(k5;)SBZ!dhK-9O6J761P z#L}^!MK0QBOIcdRH;|cTKa~j#1K$(Vf3dhpJ1ZDr;?zMe*-8THSkWqY%T=-)4k z&X6I<08_yx?~+ihXkz`^dP~3|;RIYnywHhL;Y9+7R#XL5<}ICE$}z2ky$t!YoiRu4 z75olYj@p?!FHfO#D;PB`Z%fz`KWH)=pANC#n=${|(yt|f4M-saMo4eoK={&jpF|Xw zLj98&1M;~G5`9~oK-P{!na<49-age-ynO>EtQ>r#M7*4FNgl|bsUgiU zV~&bI48jP$>I%GUaY#)lD+3J$e;{3Mf=RXQIxK4HM2tB|B8U))n#`H1Vw*Ow=Di1^ zK@$6`$n*RlAtd}g2_Yb9273Od$p0gRGWr+(SET;O1O`x4j{nWx`D%LqM&bcQhF_;7 zeC2)kD)HZz|Nr?z{?1zJyeSsI4S(R}1=Hn=VXutk_TV+sI=1Bkmc*%T81a=QRc?p@ zT1Ta(Dr7p11zM*%s2~;`CY=BB5=9$05b=Gbe#+_@N}!)C1pi9eyX~AXYo>Q65u;cv zjSHeytQR1DWK=L9=m~l+sNqw%(X_7y2bEh;Wr4#u;>mG^T1aN2@)Gs9=a?7xcTSK@ z4_#In-g>{IWNm)-GOd0Dx^Hs=<{`|~)CFeI8Bgca^D4Z_`k+V|g%OLWBF&0UO1Xes zwk5O+!l!DtsZfRzyO(5?+dYF6TbqyOkjAs3@Jrm9rd%4HZ&IB2(u4HEh#RLaXdmVr zl;qtTKk(8-BqU$fj9H8jq4~(@=x;}CUb6XPbIc$^HJG(dNDT+7195-!zrh@Q!>&7) zH|vVK8bP_|DIxep6dR(PGDWV#L42t$%U>B~vno3msvGZvm=9fDturLYGqh-nwr7K z5Z@3tBNDhs?0y#o>{)>5X>tjV6*^ZDHgy-&!QF02MRx{op;)qB;MS8LgOI}!!9*(F z0S&cpckP}w6Yvm3lp={;k0MreFRF@BoM&2=4vDyDy+}w8;dBrZhO$AopbyTlaRNF) z!Lsew`AH}TlNI*=C<@_-Zr<0||G`z)X_OPoD&yRdOa=BA7v)>3#S7KYO7^^=52A*Kvx!shj%d_k@fn3ck4I#c zG8Bt{r5bAMmZHvV8jQSjx|%Y`uKX3e!Je#;>W()qG4TX0_mJCJW6Y^V@2%G39o?|7i1dF&CAnIe5!8sS8;bP=L@JCYUE}RCSlO zS&{Bc#;=J`8Ffjooy@L1v&M1oAv28gk_TlbhZiNINvsvKYLkM!PL1v;!|66Zw`U!{ zb2g4V#;7dH7o)z}M>%k+J-(swiBxKj2vWIa;9plQS~RPgTh*VfiPU7(%rBL2rv=@h;7b+8VP6pg+`eGe2vGk7s-Z}siD!CF4Khr>o8GUS!W=i;L9VL&}c zJQb6fDe;2pfVs4#Tn33A_*h3Xu)E(!tjt+3#53#0!I&#QXFqoKyj;)|vwK>KExbW+ z$~(kYRW?wnz?rC>`(4awDp}NAl;eO`W5|4UbP7K{Dm)7E(PZh#F8T|Qjn6A3L4lY^!7t*)DF2fpQBnVs=LZf)*uvG$+``R}NX68~6cA=561JzO zC6aM5q5rd{91caoQbAhsPbU`;RQ=8!!Ntf7;Evz|WVl%Yi2v2p`HPS3KYqc#L*@$t zUnOT|IOmNIs4jVvj76gr(zEp|uHt4F-rHPY1Xd12<67cQ=BgJ3I~h|1#5pJCO+&;M zts=^8uW#2D8C3f?1PJrn(`z=|bh5=B-R^L*Irk1zot9}n#H({R9e8Z(zZ5dz@}ywD zCOes8Xi7*%HY-nJn|1~E`~2=A$S@L~K;JtwQBUyQe(2tf?kRm3IKK=@^E@H-l9HGS z*SXN}TqayirCX9odizBlJz)Z5CFTm_0uWZBOpd?w5}2)W9^V6G*Vtnz_JxPgR0pVJ$KMbPL#fodUjtp%%H()G?NQ4w*%&#y2b6UT`W zmD>-CeJ14&(x4CC36(KUw~Zl*elEnQF6f?+caCRq1j(_=n`TLpCpIR~j-Kn#6LoY$ z^w-rVPAv}{y3?C}O{$N}C-{!Y)l5t3D(k)!>)Nrs9-rxehiHFrt?{zrP4)F^kn~yZ zSzIbf<^-BOyUGVbJx%oY&P5&G_FhK27&hWsrsoLAX<~C2e9?064yz`+`-J~qT-2nuDvQF+<0Iq zBxPO5YsV~7g{1fh@Zz%^z4q@|edYbF+2nVf3Yga1x3A^mv9zDR9I+-=3E4{Uyzd#< zOP7#Sht_2%yC|qlV$ql?^C%wDzYV@q>VAC_i?+`Vk2$K;>9yYJ93|!s!AZNLGjG;) zk$<9w&GJmk^bNSUm{e)dM*_+mLgY6ol&*1zE$lo=>d_S1aLwt6lXi@dlZ*Q77G_+5 ziIfzt`ntFtQ;F@ToI-YejW(0yM#)B>SB|k|{U<>W_QA($!Nz z+K8u>|0_D%|AfvG(o86fNMC(fC{$<(djRR0G~m}C??L|j-d}@`z8+`&^;iXaXO}-Z z6hKii|Ka^V0sMQrGa$Rp$O1rc0Dgb9*O`A>GXB?Z=b!!^b_DJ)g zQ+?%`MNS|BzeTTwMmnB>bht3w`$_cbqYgRO-MY8Oo4af&8$)>8()zDi7>QVv=L(yr z_)(*F2}32z73dTOuv&pNa#0-;o5RD@{B&+U(DJUzsE0LAyiYhD?7f<2a-k~RQVG8l zWE$9{!1)yL*UjOV)r)c7!;@*crB(EUyfg;detwz_OP(hu z@+$Ta?OtE&2vuCEZX!dzia~`{DDKwEXk$TTMkr0*WPGyW?opMTF)qi9FT}TXUMFjxL89#v$;fH5322MD!rvYrra&;%!^p@l zO_*X2FTaHPdsxAb{xcjHKZGaz?dw zq$L?fyW+tYl^MhPK~Rc&N&70bc36O%(U1Nr8}42G2A!got2-+xXG&Cl#kp`KZeDEQ=!H?d|epfhr#zc>;rA zxKHkMwu-$7Llq!tmO#N*0;&b^A;uv{C%-u7(<2ziyRD(Czvj^C86=jgyiO6v3htn3 zQmug48-=W1EFBF!u9B5=| z0vDT}m9*!A@r4i>A~o&eSNKo+0sp?ghkt7T{40Nle`KHlq>;+;=j)n)0jbT#0TKUD zQ}wk*;%7q{P*e4ck@9;S6OaQ1OmVU^bs@tkg6< zp_~$@N_V^pakP{&GqZ{I;dN*$e?|gvzR|wrSFt7?-H_rF51KV0p5&b(L8`pNSs@Q& zA4m^i&W-eQsh?*U<$Uc0>OhR^ddA3m7hSP5Z(O>MA>SE=EbTJ_yYp1%Mt@Q5CG}Yb zg&fY|HR!YKRb{dR)VU+7c z9$O3fsSFg|qe!a=%X3Ik821g=Mc2KXAdtz?>`)2YYaEI2?5>&j2u@Y_X)OSveehZT zCGcA6X~Eqx;1>xnh_fqGA5aL{7^pC9#*;gWpiSKD#5tOV%QW>YGJKt;!@D5_pYdz* zFHu~Q^&`L4%9D9cD3+5__m*4HE`%rZrPEs!aCgl^enoe5SkUO#qYU8H{9aOc($3&0 z4?TOI6;Qo}<6LS6T(+YKfuTkjC$$~fYayFD7#VdW8UlEd3tt+%%FTNgFx2!R5DYgr z5L7T{8vGQuv;L&WJA_B9NP;?S@kQ#3HbSccKJ4gy&U2IHJ{ou!s;BFPHFTj#l2Jw1`M)glU&FWmCgbE$tGVS>zqtYI><1Orhof<| zn`ZZm+4K#XRS7kUTdIo`M&YVvaV&`_pFx!wy6U{Ly9wB|WSF{AlYZamjHEe1oaD1D z<9J^^Zcxru1iObxtQLH#fS|cQ{8@9isUQ6~BqKV=?`mT=Hf9ks%?MZY#4KUl+rD#; z=a_J0aJqu>w79ab;>$~))H@Qe{iiwKy;vHODoljvvsbLz8nX|;{VMMpDTZE!v4qRe z1@Q)~93`rQH_qZ`$KJY3q_Tt_1(IxRIyF|_G40A*E>u#TQ{oqyO*t6y;c zR7M3t-#X*fyzb}~gE0ZAC#LMp0VxzY(Uq7!l~PCjIRVE{qC$oXa(GBQUnzm6sqwyi zoJINNCcdogR8Cc|kp0$kN;aK5ss_l{+pk$-wn?+@71BLy#HMP|YZC2z(%=%g8J8HpkSf?Say*x}?F)CwXfq;F0p5kHnj*$OG}zER%aMRC=$;V^@At@ZO1 z6&NZn6KLj=r%iMZBvy~_vUrpLRVEn3NP!Bg+lPbjv|UW$73~H6$0!2z+)vLle2hru zm$4{+g=Xm=8779`XP9sSl`A|-QqWF?z7RD}B z+im6KPVj(h(RIKA5{_{1f6MCNEtFWXEG@xv_vR)ua>O>G*ooseJu8e}9&%y|L7gI@ zVz{CXPZ}x97hm$nRSSveT&7uD1oIU1fhpB$TPa;3-l5RDCcl0F@Wn)2y4g(jnU;Kp zr9DE+pybHERW4B6cosNw6T_q}lm&D7SOH|Q9Vv-eZ?CP5ezyIqD8>BH@-DyE@&*7c zFY!Z^V1R}EfPjESN&7_V00X2zenBcmsh=D?fRg{=;K86mOPZM4eH(W0=ZFqefhUnOVL@-hN*GN3ZpFs{O43_Od_<-z1CJslB3M zKy|Tvw0XF0(46uT9M#;+$x}swuv5xyov!z*4xv>h1(z{@c<)bX#HGS(W#xJycIVKq z2(_3$dK%SW~Od3;9y-T_C3MA?EoDoeM8KKeZ zm5+_jq$S;X;|#(`9#ZDn`#N(cX;pyC+3cL#Kr~MBmo_VNDLe;0vln1vTz+Xdt`K;B zX{!bHWteq{EBf2L^td6l=z3*ecYU8Ny*tPZIJU<8)PvXM)L9< z?;;RfFpI{V!mK=jC5LLoJbEyz=938^HSb)BgH4xW)Q0a%3k)*4GH#VBBR+)QM$?eO zkiOu#W?AhAI=8%)&iyRc;uFUe1bHpu;PVKnwOLg*hBb7?wkatIHK5kdcaMnmGJ>ZA zwNo~_Umk&DmoNvxYQ>0tkPSl7gSL;H^WskWZMaVQ_&PjSh?I->lxAqBfE=8T(gokO zQo!k6UfCB(RvfBx!7y&rqn+ia6ny=r!5xCL_X-B>OcTzV$F13iEU+%EL_}TYHYZS^ zo~nMnVseRZF9`TouV$fFSxjh*XPEV}Zri;O-R+ZF;!k->B8K^@P}*DM1-2mpCDkWAm1FXjb*PxzXEPNRP^?q}G%e1mM!~d<^1Kf0am(?%FuP_{jh&FlHi3b)L zTP$6rgv0(N@=V*i;=?>{)=^Eb`9pOEid8 zKwb-f3w)A0egV|y5|u+O5oNl7+OMKMlF85H(FcYx*4=!vJ3qckH1bj`1;TD_jqguz+<^z@pwec8}L8=36Fmsd+;ytn3|F5yLUzW7al9P z8rc9!RRIneU>?G6A(?}Xh2?9(#}7#UzWj%=2mgV~{T(XTlf*ydOT60=w}!c=e6evR z@QTM%ik68w@^xkLM<(kcw--Sa^=1A-@KF1z8qJM1QXA_FhEvOVA)Yk-sKg zs=cj*gyDe9it^Yyr52H_QU>clr(;*Yc?cF<-M)F_9@$T2W=x;Pmia@G*jL}@dmbAo zR1Xdms(t2oSIUaYMZUvjwvp^vf|8uBX%@m?ep)%e4}s`)f-KFEEn@36SQP1aF;y4K zK6HZKL$j=iS(PNCz*m)^=?(spj(7^F4cI(a&#O@9?3&~>20m_~L`2bS=;aI0eXAmB zPVA%?@Yb&kZ(FX8UVL$&S$f8M14E!KgcqU4po)u^Ltod6v2|0z`zFe=9=M|}BqJOV zmNQ;uXKyi+kGw^h;&7^ztEBt6j7n*B?cChWjMD;Mi|q$f{o^n;YBPqTs~Xc2me=0N zf|g>4!g!W=VW5UO3^iQ#8sZr2U6+db>@~jVFE!!i5^6(vGDoMV~cDU zIelCq={ZxIT+&Z)I<(clmH^fM(oLOxRxXmB&lErNQA0HmYAf>YCVPlcWV@+RFSHXHdx^ksc!-s z31Ut_FSricsl>QG;$->5bS}+YLyu}Zp>GgCTk)}+6Q^#W`;;qA!6O~M6l#w?YEOll z5}ejSAhxvgGekgdZyf2CL{S=Q@eyJkpvy|%+C=2PVdRNEPFk?5zi65 zXPLZ-`>9WSS0+k|E?5a33ows!*d&CEkXCe@y zCdU)o8#(d&>ENSojpx|;_-}8eg*g^2wB$$jJ55}cYtiQ}R8(*n@Me-6Rbry%h%%IE zd`qL(_840fIF3)n>t1@(f*n|7)JlpVT{ubOnQT97S;s6{zO?)Tq*l;SR$tyQzz=+! z{wpdI|EO;Q|80E}_$dID=YF6vP-TM_hJ=3G>fmL>4EEN`U&M=%^Cv4AFzgPE5#?Jb z3=UROOH@ullt`Igkp7R3Ay7CNNl#Nd2h*>;LEm}?zm6Jb0k9}?GJh?({+f;cwg3!T z*7|>O=D)+*{t3?kM1r!nAv+kRR#lz2qRfs7bB{>cL+`c=JbPSvCchnU2D;rd%5m!*CA%F`}(tN zkBVwI4hs`ZmHPXmDFiF) zWbs*AyFmNMy*nHhcrKvnR466N7*@N=`1=Om$S8AhkRD6`-+qP`k(D)RUxn8SC21+g z&3mM%LqC7}5QM#ZkP}ubVi^>89zNy*Q9J}Y-MLH|tUxh<+1T$Hsz!?gOkmTBT8>m! zM|Q~>n=>svf7(30EM9lo;(w)SJ%X*g`x<>vYOvT|WD{3#WHsdNz^GMLi_B{X7OmXi z%^0?9BOMI6ll9y?P@Gy?#~KaVWiQwT9K`))VnPTv2++#@`J`Ba8q6H(9aodo1h10{6I*B-N=QQ72slmA1fN( zi2dplwsl$Q)K%=u3deJS8U**?w1j+0VsRlUZwc;8QSTbKC`I?O1k~l8FE1N$Vq{9+ zfc72=0S_b2R^8>kSv9b&@U(_5>3Mc!A!*L&N9M_d!KLkUibua>16_W`)Da-}zWKJb zjXGGM{dpd@=7Xj*FBREBExKz3d{`5`bNdI4&`qJUeZ338g`wV!xyn2V0r-NWx+i_*@gH~KusGu-CSeM2jK_USIU{@K&{ znO89(eRiBW&2lj4ttH1`rn?n*Z8wv9_<`r!;MMnDyvwZw9znxd4hWi^Z1geIOmiEe zo`U)GsA;SSW?qt|CP|}WA3ZXh6pRa#wIM!8*v@hVI_$8WfCHLx)))Ff_PoCY%y()l zu~j54Ck;g0J)T!Q; zJvqclIXnfCnJY23n>8HZz#f;%vyw=>uGs)LAIov_MN_LLrO(nvm;#v1*g!QLl-qT- zNor2z>1f$+mTru5N{_J3ONUjuXBMo>Zn$Z$ih;enxnF_6A(UsF2gZ->%bxPDVIT!3k2 z>|eQhnZ7C+K#w{z;N|z_{~b5^cWtD*H__+D0wg>?~t{$r)lD25%UdQqM{K4anPxJ-@esz&+=xjsI zCeKKUl-Ot>_RIDh6ubmmsf*d(0$CRNV6Nw`K4{*4D9H-Fg656ceugTAHgbfYGY}wm z`EZOUZsT7xY)rQBfe5(@qLO~{ z0}BCBWUwmoH-a@Cx*EtJu$MAZ%mtmxh`p=FsEV{(_WrcsQOGddJnYD@Sx`!KU<_uK za&vbUhXlUrPbIY8V{x&C8)P6A{_fBNk!SeyO5_sQy**EbQR$yb>HbZEuWvBL$w3M3 zW~;RtO#K=4h!D~t8=&q9ng#+G3^;%T9T*H0&_MR{bNtR;#i(&6y9alxuXkkdY>@kG zVVXGzTflpYp|ffzu0o+1nz^Uv(5Ih09%aKK7$O&UlmUj4* zI4=l99auMA;(35FQcGJek3~#<0Nv(=>FAIx_E5sDSD93NIl{8EFn%cH8`K!TKod4D zu!qfEo0@t;g?LU=1szPW_w~Vbcy*XN)1n!()fANjT@F$e2Kh@ha|aJRQ|eAF0)73} z%hJ|2q&A@K;2#otKRNT5`I)Tal+oXcgP%dvr#WA`vuO9`+*4BL)TYKp#!het@V|Io z`$@@A(Sb^!yIbq5KT@(8O6sDG|ByBczM&Xc#^oP zSF~uKIaN>so(1FavE*kqFO%)$%J_NNU><(eE~UV|LZ+{rY<0*rz+ zYEu~^hgJhhU5r10T7^1E$Xx&U*o@+ODNm2;7XpL{7nrg6l0D1DB&ukMF31}tVeX3o zRW{nnLaX-l+cW=F6sva8IrEy~C(_(-7?nx1_tZr*2e+l4$TgTfqGPm^xw@brI?8+z z_<#z&YvcbVazGDi`i4|HMB{wqT5q4*ZEKdTCjAX^{G?$2Ahaxd$FJLooERRJxBX^1 z3B3_Dw@`>4R$)_@?4m-x7`Jh=u8PjrX!{W+AEm=G*lxw-R5@i;%9SW1 z0dZq`5%g3OYezi1T3su?zIYas22*nL#bAe83O7g9lO=6zY~1RKOdiJz*_^B!TLS!v zyMy}+QG8U}k!#IO5=tkUkaP8B#zQjM#g}T$c{Mkz9^oCI&p-^X3m*`h@i1X41n0az zQ09H1=N^lTuX4sGi+HC^6kgt7Zsu{x-BXyz@~Hf#Ppk?#wkO3mx_{b?iAWGBln!pX z;~i`AfJxvzs`^;R39n~lLC2Q_;%vu`ICDpoz34C)OKg)AQnmXsYI=uOvo5%x%*>y;-Y z)wp+#As^LJ$;(B~_cXiDF_oN)c=XT;C6Z-x{dctTTU8j&7B5{YK@QReQH> z@0mZ!q;hOxO{~_^V~jJ^J)>CN02E}eqf@`x1Z&b&L{OBhSowjtQf zQ@1d{!8#V!UM-wLJujFM6z>farN{xRQ}^ zuJU47nH#w9jo<-TUNn5}6!gIKVCw0yux@*4f#8UavV%i^SRvh{wV|^DMTjASK5i$? zTI5u7MhB=+Q~bPsapk~}EX=XEB`5>Q{VCOOo34UsQH*VkOC?lqS<%=&fBJ(iP9Qza zVBNV$2KQS`!^B+235P^<*#;TsBW#^+ZGOSWGFJm0T;pM&rFp0rquNcnBZ;@xm?wjT7VZ!r=%PR}59psE5#QVVYgo{n&PD!&=d1qFxaTmflD zqMzd#PxEZgDZHs;+PZMhTiLrTc5EDcZ2)lG&pEEXCCD^e+}vXq3*8( zs$84(ahz@h=}sw;?(XjH?rx9<=}a#?-KRhZny8*=X}mS=lp*B zq24@et>;1Rnfsb+X0C~Md$|B77oSha8y46If2b`j!CcQlfFH`QybO!g>^?#y@Io;B zX8n1EB@Rwq%o4H};l{hR{!V_w3cMJ1D3Tt#fgmB3fbld6eIh@(cp!{;7xRR-y&k%j zik8((fs zGwnPf$J-aBVIOgYX7$J=dKDcz0@~CBk`6vkK(uOu8_cNNwE{0r8r-8s#KK(X9Fn=R~$uv~P9Md846wTdyfw`rG6|#=xk^YeTt|`}>`o zGpB`+3;SO^y3lvBiQ@NU6Dojgy8GtQA;kDztN|hZ?86@=%kqA5;=gB_zSrHtz`;oy zIZE0XSP)1UJ5v7;H-d$uR@Ad@uXAWGa&&Ibuy(aD(=%)@w;&+@v*6*6`OFjmsQ`v= z{{O{~&*K9yxUPUVJSruM*jO4;5D0fhIsWNmAL%GS1rT6z6cZrl@wMmraiRSHFE+SNqj3!Ti~@! zX0W+u$eCW#%V2Pi7Wwe8=58v#r6ooHF!D$(H&uD$8NRJ+$t;^9yphvqRK6JC67Ajd z*GCUUhW7;TrZji%bMc`Jv%;K}itsqdb*Y0$zPvBN?=lo7sJ8XyTo9d&Q>bQhS;JcC zM)P-$*PyA#L=Ct!3ph*6D>!D%E2zo^y|oGCQuJ^JOR~7))dFJdrcQK9Sq}z%FLenz z#_!yM4FU?3AC@IVEAW^Q!$k%t7lJ|2LIC~(0S5bv+x)}J4qTf=A6C_j`f*Vrp;O^|z~ zCs#*Ei4%b!=EVKU10E7;6Sd}(i&GQ@WbGt=B($tO(_^1kMr&u33a|znqkNO$WM@iE| z9R^N3Y9gh-I+6A7lVW;*KPjdX;6zfshx^W@1oDoD0YSp$m&91-Z7sk2_tIMZAnjf!XQJch$$FJ7`gtK-VTe5DI=z!C`2G^<7934$U_kbSsU8eI~W<#k<*fXBc$-Z zz2^IS34R8OBK!cIv`1J77*_$Hq?u>|I_LnOzyM&RzAgdUBXsKj+mG{ihCPj5jU)c- z`DA=)-wNK1C+k7NSs7b`G+E74E%z~!nBZ5aq~_Rk_4yivgp|_=(rM~PrRr<0lk~)t z%L)UDLYnR}MGehC;;<6&>iOrQyPodwgM<)^si=2+p`z6Urx|Y8Dxb7uAL>k|i4*aA zcvcr4Y&2X-Ev##L4KJ4a_=KNO*p1W@-}d_INMG12Hv1Pj7}i(wzcD-i?`N>AF4hxA@ndCXs=}LUU3+s4#~-{M!n#kJ}+!DrV`*uA>U=iNZ_# z$;==c5H?>5&JxrFLfU)sNTBf1<^F5!p1Vs#VUEm~{88wRN-ztuCQ`UM0+Yqw~6 zWF$4@0luhURFHF68V_cRDh!(NX{=eXB3;!}-eyLbRR7cTYzUnV&LL6TxIPZkprje9 zB35L=!VaEJpG$ZD8!iE}m8ihR4J?dpP&e>L*N@8q)Q@5yB|0J(hd z-N*@_E5jAfz!mZeHB)9%v2XuOO8zgJl)w)Q2goP_3dz|RSsA|e-2;fd$0ZXh1Ay53 z-*Y&RkMnQHX2~ttmM#Q)jE3o>y7G_}SMe;gJPXBVvvLpHr_j&ZVTscE&B_+MXJz%Rbc?vOiuFULkAz8?*UCaSHT1*-YAPrZG3MS+>~& z7ara|?;4J6FwrX?BQ5nx+ySr5$G?E2MN-{Lj6(M%@`{(}jv;_-o@FGUhkAG?22vHg zfKsAmnP~SKizjSqDU&%62l5rWv%+0l=H7w(M;{qg1PKMU#$Pw)f4=M-<)x|)b7V@mxn zbEwd3%=zg92=L6aagKZt;gW2e)k_Ce=j!t(k?@s=!voh>fFxr(Koavcx);+<=VJYn z&k1b#Mmdzd%TEFq5 zE}C`jJV_g<@%#zcDDR4NSm3G6x?eh(zcyIwS!5$ESI0rVSp#cQc6QvT{)|}*a9nYJ zhaBTJ-1`T@H);{$nrnLR^2WBFzkDsn#g4k4srIHobD{Gpl4w0x$ZkF=(b6rAiz~rH z`@9LwG+nzGmiSg3;XRQvRc{6&?%KE@ab$2>*Yl03vv=jHcr>&jP}qu@l?lYVP%b#J zT6&}XA;~(K;!*Do2;YmLLFG5A%A)Rxb?tY^d?PLO>_&SHtjQibmyAkGJ<)AS6PlpfJEm6V2p&f} zm>>IT^=8y;s^zKqVmL$sXwd-qL5|3Y!XK2vUlL5ewwV3l1G3^LPqZ@;mkWi`IMEF` z_knGb2YxY@$NCkFYYnGcZnth7m+rpBVV!oQ4qmNK^zUoTrzTKQg%gN#HX=1J5+zrQ z__JQoF$WKB-E@G(iG~4pzXl%GV1S4dHg?37*=wz;t$^1XFz}k9b_tKec}{F<5uoC1 z%Yb~pER##@f^m%%{-x2VcbMn27kzH0yP*Y)no5|)%(xvp;(nKVyf3EN8HNPDz#Rmq zV1z>lw#Ap7%W%0lk4m~xs$-g>iwI++^MgIeE1vi4ne0UIbn{RK?M^7Qy5v+Erb}oA z#;=Iw&UO^0>5|;Hs#7F(g3*Srv{*yMXe0KHb}&y}u;?(POcX6?Y>cjExpoP6wNFpO z`gDyHN9_zxuX3||8JHRD4zpkCNEi7LE-;F{{-X9F<=9!B`55`MWC^-k@44m0Qc7`s zpg6e=^?rrxU?f9(x%2hep=Ani;T^lA4+@UWUqRbfiZ|rBRD&UNb)WaspMI(Tys9LHwNTK z*u5~)48w6f@g2>yh4K;;&~p5FD=jlqvqEk5T@SN{ZjJ!yRMgrERGIczH`S?L%Pq^= z6AAt-u|mU-uzAy_y3+Gt_G0AY2SbX2srf58|v%C1fl=5_x)pn>tDR@WAhlG@Pv+@ z5s*!00d$K2a6KUIe_S$rJ@x;g+x(s1eTUH}5d#lIRRT&8dWhiLQ!I%YfD4sYNFf+- zLgQORj~6N2oE1olg?I0TgTbzutc(7f-O-PM)>BXMY5!i~(#BY(*O`S4Ml}p9)!i2N z0Zdmp;?`W7F#4s|UG~gFs+fB62E)d)xC@>-4N4q0rnX6w`$A*cFe`Fh%7ZE0_U`D0 z*UV8T-j}makvo!IoLh^lLCk&K3WWStz&C1@TVq%vMC}ZScF~O>V?!ktBf8XK)<3T5 zXj?ojgu4pZ5!|{2b2#3**GvdMb11Q>@EZK22|_8!wpU8$DJ!&E}cqDRn&T1i~&B!h;3?B3@xmg44!`s>IdsmO5ostW*{@Fni%60sk zcWEnf1MCWLq8m>ddn=qF0#Yx3f3U~fguB- z?gc99c6|9*W@XcHcpM&91g>Sa9!qVY1H)8&Tq?2Wt87W%m5k9k6P;MdEV8HjXo&6& zLgJETU}J>`6L)ZOL$c;jbXQR`a1n-@pzZ8o1U%NSO}N-6?>#kwd$n%{^yb1CT*d|I znV|K--l8E+r;>@>a1gFu?%-;C^SizuX?=_ST0Qeq2=jB1;SMpF39XS2%I{u~A(joOll(_)=ha`W^3lz6!=Oo}L1^R`+iB5&)0k`^ z3;A_0pP#gl!ogRH7;0Ts*!K$OfMSp-g}n51-i~ARK_{5o^t*h03t2OxBSmde=70BD z@YY4vcf+Hi7arDL;nEorl20TK?q=x~X|z)KJrTaHk%!JEY54_xWP8BdQkj=)E~MFFnBU5?3?md!4B~kw?>@j6clQx^e@PkNUz> z%FUq5GG35#%%)u&9p*A}OeGUjE{7_fZw6APKz1hbb&T*b_hHN(A`t5t#~0q^3TtI7 zf&m-V*L&1L5tCcdJe#F27TG6>!sqvojftb7umomm3kT*iNl z(b%~gvpI4xg=aD({!pWo0Xizhk2!bgq^6v8l`rOcS@NXzX}U+X`5xm)6{$WeRuJ6f zmpkh5NN>of=eUzzngM=^A6cPzwzRL9AlG{JtyR49WMePtdXhHYWCC|i8aKP@op9nT z*S^x!N^jqq7H!1Le2Ri;T^5LK$}P%*6Ae2-cnssDo3f>2;;$;qdkmT#ooC)Fh;}?jv4T?l9z_Mlnsi$QJ zR+qaoN2{d=i%}7Z&tXYgNijR*5y6cnULkI`(G61n>gN9ouv<`t@tKBiND|ZWPz@!A zMjq**6Zy}M|0|FDkAPwNKf`WTCbmaT2N3anh27tl|KOee&i!W;lav8t%&7$P2=82# ztn3imt-Kr6GbYq|UqU9gZjFuhiON&E0OLpBALy#noz@$m6H$@NlsNNH?cu4&l zDE?rri_GO{X`!pVvk8nt(+ue3!nb+7hhr5JQqcBdSI0rC1v8!*o)%^7Bn4LTf*&rM ztZ(LW9ik%jazRlDjyHp{f{TjM!yj^CN#sd3(SRrVYnXiDvN#Txmv7azhJ5U-F2xGD zIqGVre1LCqb~MU6wRNAMF=2)((3|!V zbL2hbRU}HEIg^dpvOzo|>*tqzpN{)bAYX?nA$6IZ)dZT-C}@8idr#P!utB?OqST#a z{Q)yyDOU($gqVGH$4Kk>)2D|VGJRI3j2(7s4?ybYn#IJr0S-rNh@~XO6L0I0Tj7@2 zW-8cJDhrw3+Y@s5F>TT)Q{nx@0s=JjHefHi25=gKghIwZ6>8 z{G3@>vO*@WObHVD0_E9NGe1Z(X-`+gk~OQR0@eCnLV2u#srMDr>0)rFF4Nl<4>KIS zShSIy1=td9Fhn6ERaw>&(POnLv|~>ANRTdDYTzPH)StRN{|m5tZ_~zEy;*lxOrtBu zrQRORE~$g-7h`$!$5D$uJOa>Oc5N3s<-rlla%Bx%PFLhwJq?LT?pp8H`<7uYzLbrp z&7079)d9cnHs|Ar`~;<0rfVK~*fRvGe-*ZOWBq&%LW+|DAp|W{RZ$cmVm0OS8-pC0(=3NZ6g7uUbZFctpNRUtH{IU?$J{s`ncq_a}BdNcLF#8zIPhu zYM8+bO2I60urD=X@Ur;tx>JG?T8>|WJX4G=2?+}B75Bm29AXX&Jy$%D_=3x@W&`)d(#)NPd0Z`FRPPAGY>o*vXJ5PhKX(A8cDFZyt z#2q#}xmy|uk-&Lwt3ky;GYkmAmppYxxe^cRxuvG?u=v`oq+VgV}F3e!6F9FM`y8%$YbCUrClPCKN3XEWC>OuFy0JRq z_Rcl}Hr=ENI8$xdZUceB`Jq(VRfrNl)lKnB76p@OHn0prHZ{uucJpckV!nN$s>-Hf zU{CLf#>|TutvA-3S==)>uh!>}HOs&mY(klbMv$c+n#JK5C3D*e8)d$( zcNnq1tlFRRDIFV6OlIG=P`4<5T|F_B+}4yML4#JBYRUm&Q|y^`xv)Dxk(ZD~B0zI+ zq(izKEOn`EJ@pyI8k4~+kHbGCxlJ?Gu~@hBfVJzmQ991dB#==$ewJ$EM9 zQw2t+jo!ivTXHb?Z2mSzOuC{-JfI_si1rqG&y>g^HyBQdP_=WJJ?;5?-*V*AXNN*d zpPDbQhSBNC;g}EQV{p4sq(PzOnaj2jFJRUOtxV;1W_ZB8!{|4VH7)LScvpyeDk=MI_j^$+jsdZnkE4A{Y>jSN$WfQ zy@s|)6$q5px0BX48UhMXR0|Fc2?Eg355)5I;{zm@og9n^Y>WvUO#uYpABkxr0t3Lr zoyXBTMh*me1_nm9fUL8@_m>(G{3SGH_|uzZZ2;}jt^_ncee-MClB~U+fukAVQxqKa z9F44utR1Ooss8m)z-WY~j*hnMG&C+QF4T5THqKvJNfS#OeLc&s&3!Zmwhlk%M}7`2 zj$4qIUI}pD?9-Ug$1!Qn*7Spn{3*Ej-3$J?;DP}VT>R>L9uG5_qVyM%*Dc337sg73 z#Eko!6f^A_RUiF6kBqDk-kj*>acJo(kYy&FLlHgSY)-ddPkv@jR~qR?HtYX1ge=!Z zopq}DL*VVcmR|!z*QkpHg4Ht`2{+3;$hf{$|FojuFx*14*BZv?pV3ake8%Q4%beS9 zS&`qvE%2LBTAy(4_>j$>5sVk|$PQc5Hb{3}{)A)35)5|g;#Z$K~KO7MU%dw^% z8!J0+BFM$($iqpA$;C2rHD^k|A>sxmO1?j_e;U2EeV#OvuazfNoeEOy0Ms)>4Ep72 z8`DuAD5jr?peZI#t@4$5Q=+R|!Lj%=`3uLpI_ZskToCJ0cpt&m;&EaYo%#R|%D2>C zymG?k6PKIGY^b!}y9eFF%uC$9IU`-Ow&k~G*riK#k8WM-HN)a+v5+RR+Ama<>Kfr| zrQDW53ew&YnzlSk02xo8Rtkkk#LP^08Kq7AFyOTBclJ@AZP-#}MRF_(_K6cY_Pgdg zEPFZ*G%Pt%mhE^p@nKiC z2zO=>_3KEtlD}QRsGE3BUjH-=o-N7L_Xa0;HK=53~P5a6x^R1VWxS>-I2_ zRj}U(nm&wVj{EcJ@Q(!-41WqP00Xp`e+n+XFaMd~;_*&@cgU6ZKS4BkvyBp;NBBBg{%!`$)jD3U&NU`Hw$m(yQKLKVV z5Wr>{RVXjr?~FEk#f?@;E}XHj9Rj^4Py;R;8hEBA(u8dTOo&)}S1?B2hsXxqhs->j zTvWvC=t>E~!}xGbVCFf#uXk2gzDYa6LL6wXCqyBtW@_V-OYPePDP>bK)FFf%g<=a4 zfuD96WLEm*pgjb0XB$WF*3B|>ZW0tWm9!3N{*xkGA!!!Fwv+D+)gXe*8tCW&YCN_@ zWG6^uv@r-_smMauJ8_>{rHIN*nwCihlNqm$yb3VE9g&+2)!GZVLwCy37F&vTUVSPK zQL{N>PSG8AXx9R(nS9!WVIO=qul z)CS^6k-`FERj>*zoL~jHo|1FA>s7Brn8>W}a!Ts@n5nSh0c*Tg`qI7FGT=hYDCXpG zp73;sYGIF$8U-B0d+DBFhiUWa2cjVru7zG&D@4$M!J~(8w93{p?qEw@??{>0i*u?X zU^YmwYbPJiW--~lgWe7goE;yp*{YFw$4&48+7#azvSG&vXpXGm0we&c!Qi}_vS}e zyV;SOMK~l`>nWebt>)2M*V}{2 ztJh~gY5QTU`VeO=km7LYz|>%*k{}dS@10j*LPc+z^UXjVE!seqUY8^Cy2U{j>Ne;- za+u-Tc5yea^7kJmA7BYVmM_o z{Tuq2Ltsv#=V=0M)a?mukgV>v+CcpHC-kJQe*Wj{hplo*EwFfC#Bho^k~CtS;-gj8 zy6_ga7GVL;468$)6q1N&a1MKkHFj^obj@6NJwb;W7mXjWdwYn$#?5Gs<2ijyR9tU% z%21Ijsx*r5g!Id96)aU=0Mp=|T2I>OAh$XNV=b5eP^r-;wWug%C&E^j)GN1T-IVbn zFpN`=9qs4{1#u#ZOHoR0slX2!-u)1XYP!>^MzOC2M=!j+$hB3;=p#eG4w2UQi@!pzVSGtVsq!>-`fo3Fs($@;Fu&3m)4yJvkh8M5Gq*k|8huCX6%=p+h0!@+iRU-J0oS#OY_WHt@@B6`gDnq%d&-O|2 z8!~?d&_62%|Mne!PAdL99ueeQod6wB=mu{H%g)vW^5?!!7SB#Tas>&iV(peL+T1AD z*;;h74tyyMmqEBVGI4(5H-aY@0Yb}lPE1ZJ*`*s4O`253gjY9t!8wXEbWOsUi{*=| zae{n&l{+s!TJAk~@`1d`mTtzX+*zofF7uWdb zj^+R6KK?%26BLg6Kf8|~8^|7WTVHEu0SPTuIz|9T@vWleYlrpY^8Ys;^6$_~1hWzE z@}yMDRK=F?jKwyC$e`qvr)N_m71!bH%jLkF&vno$rh6*f=_62lew*Zc&+u36QAdEW zZnSNQ%lgyUR);&KyWU!ncDdJ=&yc0S1aA4VfZre5+3mLDY#C&tqof>Qn~Vo2fq+bk z^$w^nmtNS=r}ci~2} zB|CV#gV?OG!%;HqGv7KE2d3fXm0iHe>YT0rCY?=t+hte_NG-zn1vg}77C7lsv-s_R zYJ@mgi5}i%**fab{tJY6M4R64Sda&grI0NMM_UGnjx&VM1Vq z0ZGV2q%;+Df8#pDAnyEL!xs&^GIV+b$X#2%0(vsg;7KlctXLg+Sa5V1BhGZTl65uC z$U>qL2k|M<(iMd<=`Mk+%d9wTMAJHmt}UPTr(#()A{5g8G7bkvB@swhU$%T&WWjZ? z(Be2`5`KhQg^r}#!8M!(&g;TS2yuLq+yq*j`4_Wu7_lnGT@RXJ%4aU$(93W2$$$1P zSGx6|Rwo$GYtA5iNb($Jh0XF)e{xs9z5J{5`Kb%yv9=FD5Gj|x>4!-Xd()iV5mj%D z4lbAAbh9q|!Y%a(<+^Y@l=~ryBEleSx}rc47``bwkmgFGUlu8L~^!WA1?BNDZZTy#;Iq3wpAHh1SFYNOch~OI;NQA=;-;%C! zQyaw1B!zQbVn9!U4tNH>TIvIXl#`u$csl`iFcX-TIJHw)XW32E9L{D^%5pWleZ)$3N5RXh z9h47U0^n^%Y~&aq?XSvGz?+Qr;&hB0Id7nusNIv1@30ZHx~+WKl@SIwmP(!MyJha0luUneO@SybZqQ&~3s17YJRdnEQM z$q-|Mjf-H?D~MS@+~j!dT||XrBP-b;SpjQXzwk56%T`H@_YYjo;x-#_!?HYXH1K`F=Dw zZ7lY;nrh_#RMQAT>+#RQ8#-E=Z}5iv$FcCOrtJ59ZGXWwjI>_`PXC2%zApcdpYGoP z8zJig*^XRd=2RW>*XaFmM20+bZf|f0pvp7tp4Gh(s|CXriBm14itX7;g<|R<+X)F* zP~FiFy+71Iu%MGS;Nu7x+}*8ujXBN;Ial8W;oT+_yW8)bPrL-Z<$HZ1GX4v&c{Li~ zK)cBVHvR_W?ag{NK+WdM;C~Eke*2DJeajyOkUs_{+HCHqJHZGMTp`S7QF``|Jip&H3CP`~#;$W& zUOg+x-n|yrit11ivA}S#a6Z0^UgJV&LraAr^Z@e+pJV)_Bn{xt!3W{-}K(dms=h^(Y=qLD7c7EBruoirFR339+*$G zO+a8%0+sac+*tSSS1^I9Z8Bu_og6vSuX{+|R#>|cbzkCTtd`A3(G^nSf<5GjgRyJ{ zWHV6StxPI0dSGUYn|7Dwk5~6)LF$Fu}X*+AO7gwNV4gznW2gs==hzxmuv0WMhdk@3?Qxc}_+qzC&uFoDA6J-VC zPA@_2iTc>v@ef|CQx{yPzNnHDzAFKp+}1VS4nSkJ2-w1FDWC6nHs|x)m(MDOyJxA_ zmk%gayV<)FDj^f&1wU{3l?^MIgtX5om#@fDu*WveP^FWm95oK5H(!sfEz4T_xfWUzp~J#kn9Fnn^M<&$=G*|GPNk%UGx!ivuv-$WToSYXHmg35 z6*Zms4?73cJq=UXYMhh<$Cy3Q7GwsP!?#5) z`DtxfPCQ2?MpQjs-W9J#)Rj_V3EtBYP24==)zTP9IC{3+ZS0S()40jDf~%qP9apjV zp{xQtzyUcTd0fI}4eLav7w*Z^FSua{d#D&bGyIR9ufq0y)XY0nWc}wr@qAk_(w*WfseFUcjR-DgB7xF+g* z{yiN-LQDJ&ui*T^D~gf|Ut!5lVqt)xhky~!fInFQ;wsDx42)m3zyMPaS?Smwmn`c4 z`2GGJ>Y!k9xNfT<9zyZVFO^EyVBUZJLZMw3nyKuWF{xQgdF-UtTVBj3T{+0Mrw2%K zqy_7?5`Bl|S?qbLg4Z~%?N~Ofs++~u^HlZ#-gD>*h-%4OA`aYtL zzZ84?9MObC&}4m~Oh-|4KT)nB)iGg(O&<9vqWSIRU;V%zsN+Z5h0-dK^48SbXR0!I zG4u#`D~7Q#G^QRp>9ox$|`;r!PU+-yA~5L$mohmRvBZJyn5e(`bEm zO6NfPsw<@qrAMFB%jS_Srq*peeON+Y8wcT!M znz4u&mz!Rqk{{NNXQK|N%hbu+W+4g9chyPXw2fTk%ad7IyHrVxbA(ZZm5BtLfLlYRK* zkRyzBAiFEl8zK2FY&2_l#xKvTSC)A~6MPJY&vDk^DNAckdYlAaI2w{maSWq7o_Cuu z(As;y?a;`gA!b3TQMs)K{1bEVyB0@$5=>q>>+M%^yo*V-P|qPiCWvv6C%0y2yFR-0 zyOSl|EKLYM+e4HvkjMd#sH?%H%)O3Uc`M(zyJHe>^^Pjdmmb`N{zepv=QBwS7zxcE z5aB;`4L8&*`>XzLWYmM0Or;DS51$12YkzVLzrFmcYxoUBcpYNpFNARyFJiGB@N181y4(WPvC{r#^eJ9OxT< zUx@zVx@UzRi~S)0s@E^=SX>lQ(S>C%vw^p14bkypO`{&r+kF+mH{HD^8_DFujZ-5P zIsWOQ{bPogf1k@+x)(K(rLWu^rIV0JD<))(6<-$X{_40hzjtc~{=Qq=9uV=Ue{0+rb8C~orVDB1enJYel0SN{Vc_s3?DfoT0E3dn-1PMTV89Jf z>H^UAHT(LlM`7ykm;w}#;!)=l7LzBCmyuBfv}}H3xB(5=bZoRNj0_Bq-5WnI|0izw zcb(VO4cxN%5`(;zLwcKWeH9rqa6})kE8U%eT*6_8J@W$xNafZDxB}oNRaZAppJSxV zj24sb?yuaDl<@Jq zww!ezoYa#iq*6d&#w3!AC4?c-jf&DNgMsFVLY9^dKbbVpx$1G&_wfyCngjK4vc6F* z`G3kbQ==7#V^sDJoY}~p5bIoOZGJfH`Q_|?)KjQ*xCEV3)4+A!%6je|NnR$^!XWeh zUFoNqHL{0-xWpmhB`XifOxA1&+rv}7r@K5NuX*f)t~lTY^{}8B&_3#D3CF zkO<95qZPPYh+y}9x)GU@HATbAkqCpuFx^`2)v{xs^sXmRXQ$GF

*uR(E;>(n$zd zZr%*RG5Rla`j)v!3*-dr1e#=UZB%ILRdLVWSCe;ULKau{^}T+MbP&JSMw{LH-0kK> ziWobQfia!>tN@nhlh*REf7%LWn@;E?0p6-Z^{*ECp8)Z#-=P)%@xTnW8H=C}>b(;= zV$JEFK)lXRrYXYzube6}f&yS5hnb1ZzdBj}Q1JY50YV7?$o2U34b?LM(y9zhY)owGwEyD|@NZzg^L1i@HNoE1l*=k4NB%6A z4(pdfrCep1Nzv_HZ>sn0Wu30OiF)3MuH7K&S70n>j7*d+L*4`t@>xJ3yAyetRvN1k zZ==(F&VXa)4oxBP2KVnt_1wW&B6Chec5L&YRZ1sG?`Yn<8n2;Pt0xMUUp2lcxRg4=dEFkmV8m^IS z89|X4VCBq91`;^_MF4k*yS+>uOuc-ShYLb4eVk^g2!iqg0fvyWk@|L@cP<}S#uR@*w zqrYqU|Le{6^#T44=0`V8Fv~kl0~4p?i13T;8&p*j-gU%Ih*FYzpeP{DxZY7#Q)Pd8 zalK7HFVa+bb>e26hDg|CJ0O#-=(3m z3UmU?!A`9bBcNz$plnJs&7bznfU=BEvSkp;(fWO~nxd7C(}+5>eOA~kJK_@5&#vXg;8f z$tyMVzW%DxSuEy=>@q6HZyloC;EB)N5|WZnE{AaiTM$*x;m9b;)*8IjlXEQ<`%VrV z5#^MXi5p+N@Bt~GNJfq7DHNxc9~#>u6UvsZ zGC$>t2zXcx|8YkC;Tn`3R1IUV-eP@3dJd-Vn!$@2OepsEuHh#X|3iwCMl+G~7D78b zhT3*}jGpdw#i86p1I&qG8l?6_tAnYbTW0N(FIQRtRQW7I@5xW&z-4s{#Jtj05}7HG z1x3tLln6Mdla4^?>t=W}9Jc*3ss(eOBmyU`HF!56$9VPS;yL>;bNNGrF_0Qr^?9Y< z1tcFu3+T_LZE0MYPDco*>T|hTuheaQDQ}W<$zWNcE!UN6aOR zD!`FO_wa8>3m^TmxFJ`|EW#66+uZ;%r-38$M6{K}FByg>wG@;A35)E*1(D^mQDDAH zRnU79QzHC#>YN^ysZOFNzDLF;){?JU_UlxhU>s1tyFi*wx7Y&D$=EWzY>?zZ!V~%; z-;&jgMCMvMK*!mB&Q62|n%)~>oUM^5HR($NvE`f%1jF4w$dt6S%-XN35J=9?ha;%+ zCBLXpXq5!9VV2v7?*=2|zY>f)t_*IxGWtdEyY&~4+fb?T+dd|`j=w#AG&KV00Wi{sOfNMu^#z8 zWMlwTaI!a201O6rr1}K-0P~XpfZ%atCo3%@6Eox2+7$Y)6Fh$`{|E2(O;AYJU0`eh~8$<5gtpL}Q&PT;GeBMLrEGarAv4efi8fyxj| zH`9WBysw`aXu#7vAN|}f-?(CFUpR1lUZE06sl~70sABPZ^&u8R8muua>Bjm2_HK zW;e^*bwQXgBgiEJ66#%9c4r9!eFCh9F-299CyBh6K%pcxrL~)F3EGoY5X&3>4U80_ zX{DYo9P^vYr_``GjGC6J;y2;JvO2Li&3lDJl}6TP*H;V%y%x{!e+wx@U?~(8G z_PzgXF@EuMk7V(3^D6t=KHgseK4*j;L(W+Z#S&p>SH~yZNx-i?AmKqWl?r~%#V=aA zG7d6~962c*^EDrt81MeV2C*R9Tn5o(9q93|#`)#DaSr_6IBNjLnf@JC!5zNQghIA;VA``PEi`?u!LfoDtCCeX~{cZ|3(n3-wR+k?6Fj-wgE0pI-5pX8qcn1yD6- z`&v8pXqy0}PDjVa2$+(i{-@IQ|K6Sc&K3)^eb-|L&(2Zaw8`{+T6r0(n#{KhpUC?R zoh^#Nc&lmIuS8!nWc2o#hFYYLxNBneD6l@g z83V-yJ+Oi|!BLrlDC+AuyMIz*Od<*v2dkA;ht>`yGb((EqIuk-4V-9o7d#M{-)ck0 zZz<1h+JAz{xL6;Aq3lE2F*4U;v$&An7KN5>_*6o$0q=bC+F-%>gLAfB)-H35shdl7 z>E;s}U$>P?`@n-ti?Bn4*>N?VI{OB}XUVG$o^ zCUE!zUGURapwclMx^5Uuslspb&z{Llnq6PT%bh31kK;rN1LI(Dh)DDkM z+tD6SW&7AGq@XCkM-8~}8*!)K*g5TW1G`4S!fVApP;Pr8CjfGOPbO@%X=WufMbP5+>^D z50*-15O(Xxrq9Y{rUwW`E{}9sLqb5e8n*#6*rDe%&(yzM2t5bcq0^h9V2~W@_JCpW zLa3upSjLSniRhl|WsN(T#k!T-Gwm9&&h~gVTFl=QCu=~xbnkSZkf$R?9lOfLVE6_v zTPJeNgtP4PJzuR-9`qY~aJ;a2!GKr%BVsMMx`(6aFJgDjb6VeKb++X}>B8%RA;!6; zqA_k1R9%w@vGw2?T}7Y0Ka!tIOyJ51#DZgDxR%HPgFwZh^Er5rVbSJ3H8XU@KrnIE zXwE?83wHBS^HXxxiYD%A0l$;B`zMzJHpRML7z}KrL@}CRi91>SQHRY4H-Uf5)=LDz z+W5Rg{br@vKz4Wi-8P1Lv;T{>F7jWobptFYUe9c81$dWfw_<#FSUEJ%0}PLz)e>{n zXcXP3GXJ??=_a;N_LGfQAzHvJ<%Q3(QJ=hJQWqE0mR7lT8p0PHGCt+xC4HMZ4p#3W^`>vO4h=M^l~n%HmwM+< zY@FVoQTO-6ISew6f{=iW6v4NXT)`DExy}mEVk$%ZLQ+wX`Uf}%MJ9SQb2CR*z-ez~ zvvo#)>8(}8(<-C-}ol4Zi!g;MI!YeFXg3N7&+owB9?tw+d8lcpidMm z)xH~WMx54Y%%y*}SL95f6j9Cx3d~ zlx2LWt48zp$o6MO&J-|u280$>i=XSZYX5?xl=(~Qd518$7{iFFz;gqN0jbgoK*$Zx znxiH9{I0*uK`Sd5sv8cFS8pk#dSbPQkvXfdMKY@dwIn;RD5!__s!;4>neVPc(8~(R zGJR~MYcwem34=yFme0TLv%K$TO4#qu6c@mmqVqkl1N!+8`P%2G_5ZZRzE6CEMaKI# zTkI>}`#moMi0+sGA>CKC+^>atU;p{9<^S~U|L&+6L1mLKl`pUBRD0E-C11=gVB{mw zeH_;?%N#$MYZ#udeYgsPbFmoDB~g5?wM$sZS2$Sf<($@Z#m&r^&e3{K_f*I+noGr} z^C~2He*p5j}@cYgt1*Nj64$s<; z0hkaksb}@Dt^>}*qcS$pCf;PSEymQ?;*;})-STQ1_;LC@$4ayqUQjdVxV1r>!oL$o z+>w5T#{Pi}PT{C%;@L+FP}x>0PPBPJMlvj?o8N_aFaZTFM&Jn^yuOzR@h@19V0Jl& z|K1ROf_{%B^MF}vlI&T6A8Lh4yQ95&U}5+d4YzUj)hwavLUhdg#A8$4A|N|wgzR70 zJz*aku*s{)Ag(`ume!AcAD%nZHa0u(`qu6il%myAi$TY*%7`Px2E+N~*<7Y5J|@qb z=$)f$^!-8URWKx_$@R7Q8*Xrq6s~m-qETi@rCwAXOZ3;F;(%Dalft-V^pW^R$e2!Bp zc-RfSN)&luQU`et)*q@7WJeLzm|fup-}vrKg%}8u5S>SyZ4_J#Hm{1sH%BY{J%hF{ zxksKS*$zW~M***|>UahFe4QRbw5+umCsW(LhC?K_ zi6r5!4pTiFHzkbjLA@1a;Ei2o&xbYTn5*8BQu|K?9~{SOP>ba50~|AI5%0l$uH>W3 z|3B{DIrMtVk8%as&QW`Yk z@I^t3%g}OQ7>R+kJ>gB#_P4l=!zU2ZSDA(v-UY_NY<4}!zR%n21l90cvK-ED`Q=uY z8OZs(HA$-7Y!|PWNAsuPgzP*nb|Y~^yZ0l`Mj4b7#XMi|sPWu1Ow(19&AQ7BiF67!BhR>0DY|5o%R(AWWjOoIRO<%-yV?wkf-f#G)TJ zF`-GAQ`4+A2RW$=(0*^xBIK5p{1|dW5t8j z1eTx%uGj6< zeVP>AjV+H|5se2q#R+!%{0&B3_HKXH`?B#@-tHsC9s8Vg$n>GD69T0uJi;Z>Al6<3 zqdIym*-hN$61(Ke#OPW&@LwrdGBH6N!!;BL#Vwvn6T3tzQyiA#NA?B~E7his$j%Ji z&d}o~QoaKj2W=)(z-2X-B`H32@lV7XRb_-i2ES7so%tc=EzBtRsK&+ciRZ1FJ$eBQ z6)Tzzb$`=s`P<_E5?uYH%jZEzpjHovxVzzN$;b5L-{h0nLlXMyE@6IBDm5dE%b0mG zoKmmgH(X{J&hvt+#}Zhio!AQGP=8RyK;*-d*;9kV-BY_SG9hbrg{Qr$8}vH3ZjB^G zA)=}~&1}*_jZ&1k$(1-Wuo#dV7rW_a&YxO4Yy8x{_Ix!o(|0SiMj-I{f@ii-Yj0O| zpAXFTN{Qx!f>pF~XYW{De;+H9d{EX|(|ZiHT^LRGW`iznhOddwumX2YrorCnodRh{ z)~4BUU4{*|5Y$w^JRW7_h);*KFws_F;-9)sJlZd zbuA*OZr#>AJCC{>MpC?OVA}}gV ze%x#Nh?cRPLbOLg0}V5Gv}uc}(g?TSan#ov zcE|KcTDnpH2n_`jC_eiNpR*I(*Qez53-V1Q-8$3LAxMHK@O+#cTcW&}9~7YtqrXn3 z7I@myJ17%vFMSQD$Kz+lpDOU8Ju=<_)GOx>X_GP2tR<9CLk_*CbPeXED@d0fb7WjF zlt-Hj2$26&e#eq7ZTu@-3;ggoA^E+}2_hh>y7*mG^+1=KK8mUU#Mq<2-BHip*v!b% zkWk6Uz|`8t(#FKh$l(W3{==mT7L^L1;_~BV-wjHbe__~#oE%MU>;aMeH~O5FksV-@ z3ut}#j@XZf|BFxJ4@~%YxB4cr1Pl+5SOSIu@dtzhwah*DJ9Y(NL8WlWhD$@z2R)#e zAp+UOH@pRzhaK6o6Vui-iZM5&dHjKg8QVJh8x*2vlm!AFi_6r9J>`lF8GYcu@%Yik zxLj|fuV2(SfRP#Rx%h0UcS)v@JyF^t?>_Otnq;(%F0T-y{#v?6_4!j~5m-p>#8p^6 ztInKAtUvpVG4H#&djGpLZhoX5o&yLYWB1osn0#OD9r2u!PJFw`!0W@D?F~Si3Qm7<Q47?;r1%e5o+EFG}10va7LlL3U5Qkcb6f!r0c)LMVB=kOkD52hK zl(iUjsY+JWd;I_ zSHHps{15mz`u(8{&|?MiqsI#H+x=_w%;*>WSN!RB577hwkUG0gnZG5FYcmyS^UyE-z!4*}qB|Fdj|h2tR;@Uv{^KkteE z>FC$|xefI8Jo*;oosCAO#7w%|YECVvo(g7%c+ICiJ~sL=k&A4z*NfrUcc_GE@1MCa zQ>on5??)~WU)#@9=p}tQe-XHEja45;J0GYq>3CzI^D!(RNg+&3`LxanchhHGsZ8op z*k`9GeGi`!((z-uM2qG7)4YlkLk_pN5Bp-;J}Xv=&-Kd(31AHxxzlfM-GGwy z9EZvM1r1Ir?ai^^Q~D+loCY{%ov4x$UUle` zH`qMS%;Xt6ysU$KX;Jh{b2R1EXwI5}2DEdvivEg}BVOVJ`2-Z0`baVY!sg;_$38*K z(Vs`Zzf~CjwLv)ldz$Ke@F)2Y}nw4CkiR{J!4gE9d6@_|yBQQY3x7{B7(1uT8c?A6~ zygZrDlKa%6yr{p#s5=;5u{&y$WuF;?)BA9t6;j{GMMMRe{Y?yo;0G9h{x+5XJph2g zr{BdA4-Ac8^1l-dco?}JfCLnk`Olc+Xa4?2Kh7V0#Q$|v_|JXxe}aceIPOmBE1A`^ z7OW(ls8Gds1OolTnS`iTRNOs?Uc46;&YT7_?7DAXYik1eRx+sjoQGVIi3D$%;V7iW ztk|th)4|KwocBDNsX4(`DWj=ze6lxuL%xRHfR{*b&ZG7!OkCwFSysHQV!&*mp{xtp37E-vAF<$Fd~8_s-%a+05%9ztN{+%!#%kiy#QkM1pE8 z9U2XH^@K`#CzO^#7`llo$pZ_{9~hM2k0CD3=dftS=b&JpvS}i zsoVS$(^J0w#XEu&0R_KFSU2AiDkTddu z0EAQ$H8Gk5b(2yJC|A52;!Pk4O=EK+jgRs`M4KuBg1!;r0-s8_!)%$iRf8X{w{RpO z+l+{G;C0}f0__O`g$t}jD>8$P zg8Sc>e-;(|*!LoGc8tdJ?U$B<4VWT?{3UROTIFtHEoSqiBm>mB-Z?jRk05Tzj|yQ| zq+97Oh5lcaar5oWXhuOukE_ThEM~!!H`-vjtr$6CsMj-|uxO)WD1X$b?q>~)J4z>y z&W4=ms&ti`gM)+hgpCyXRKK$j8G4Z`UCBH!jWIh|J7kpa{DJ{2>BbJ2(D4&l){IQu=<2ZCR}3Ig`fjqobJX4 zgaOr&k}6TLK(|qv{)?em9jm6+UM~-L7mQA|O5_hneanhel5DO@y=L_Ul3jT7V{33D z$!Cpnpsm_gmDcL}oIMxmkHkD9dG9)|lMk-O+S}Y)hhG>U_fr1$1!50p8$vJvMm|O! z2x#3PM__ee5I_waJtOTS301-$H4*kkwl)rCjyCpg^bQY8%K=c%_N_4DmlgR<6_27} z?Um*l*Xfdev`#TyieS@D?Np;g{^lCc-^NzH!nw}ELy=?RgdK)%AK z>y8)5nA0J*P?(_)KYG$7`Vy_MwzYY&0Q*ZB-Hn6`#(m>{Ip!I){2^ChQi7#5P6th= zqpllS1q{W~lJ*$a@KY~gsii7f{EuB)eahTfX=bU>vj>$GyqO`EC^Sa4XbMc&q{B8$ zByt3ive6_RjzR{w%5R@6@Gr~D4Ikk!svyKw_y+RAS(fR?`dvT?;m8SgVF? zz7O%sJ|tDjrS@bpVpn762Ni~Gz!^JzS?0+I!_&IQ4A1J;g;zM)&`*1;WiR|xwi|L= zNXpCZY(SSmco?0pajb-ff#2=a^%|efk)LqqIUYYF)#$AlQEj{CcV9{B{T1my|3LcD z-y?l90O|9;BR!NX&IE%}BZJg0(~432Q8@Uofu88wvE0EU86(fJN|n%2o>psHn@93l)D zd;~p1rbunBWmupzNY}J(0q5KGruE9lV4`ohu5Q61@Q-q&DX#Q98frIkP;2(|_(v>9 zH*c=BKjXd6$YRsTj_W^s7Iz;61J1uW1G_5QIG@0A8@t2IMm$QuEkhBMUV-+Cc~%cz zTv}JSEKYno;DwypPIyGUR`&ctiX;KMNu$JiKn=&91a~>2Ni+uJHdx<*IaA2QhnlNb zb{-~%bv3b)!X8HSjOK7>F<%lkj|cttXR;;t&nu-io(64NxyFOhr};he!KR4S7&T#6jEuE1M?jE2HbNweE|KAnFdjzZu#DxVR2(w;*i z2Rj}m%5!sft)23b`cD>1PIc%3EW>w#b_L9>L^r^%_r`9K^FCkpS!IkicY9beQ zg%b34yHf=JO|Zwv8f;q^s^Qk)>3^EujN6`k9jx{ju>b7~eh2mdPV0XH>>axNmMO;Q z5SJ4eS5t+2t;+7_&kj@oAGXRwQqw!q#lY6vehfe8icLmqEZQDmI-d;>!hCfL}35rUOt;x=$##i z0k(gIezCSH3c*tUf>YK9Ew`9RoMpMqMW*{?4_lr5nCa3>kQ$qD-337@;*Wf#-0qp! z*y6EnEDiqi%x0j8)&x?AcK2&0_F3;*H6zxqQ;53*>v3L^Bnf;bTOKxQJktX^SirA* zAw>KlJ5!5xTcg*i5Dw0@NViKR8u$gAX_Fb2TPJ~c5_s#!9a4GiiAgEN&od-1*g=hQ z+dxZ&7*E7-f?~>zswdyAqieW2;U&3SsTWd5dn|T@gdwFob8zk9YnEqoq@FzTHp8KA z(*)s5u)T}%s%jeK=VGVWT^&jHH8LwY% zq*|Z>%a|0+>Z|YvLK%;BvU|PZN4gDNp77lOYA!mFfyi|?ztXo~gO=TUjQ~t?l-cMx zKW~YgL{@qH-r&g?1hq+Iz}e6)tDhC(Y=JXL`9HTpDQ#=jJkC`gLry)(&0=s)cdw$`lAP48&^PeDUtZC57s{uIG45N zkf7v5{MfQ(YJ10(Bt6!h94lAUDOyG1#U;L@pg)BYuU*TOC=7n%{02Yw3?ORY{?W3~ zPIkB7wMnFIZ3Z<}Frj~z9m!`4-4!|K^0A-np5>(g|) zYer@;Kd3fVglNv>qonD7f#_>hCu9e5%gQ3Qh@3pu8>^%3_m_Mei2SVaU;@q2gC%g> zwrB6Mx{}VgCVso(r!qX)n7LaVi^W-9y{kUo0oAxOim z9?2%lYeshqc72ahFp@wuqt!W@@GUY$4t+(PrdeQps+Z8Ex(o{Pyq6bur$=5BM_x=f9*LM#GQJK_-t}y!3d7m4 zsTx`Z5A0>&cMa0F?$v2?HE>k>Ab|;&!nKz-fL-nO;w4(z^b`1VcSzN4;s9_u-q&R0 ze3(^*BAz`x#fH%cxvgn9>5Ox;BUtoByhk@IzRv4|rC74y6j7+z*6sh7E&1<$EI*b! zGZ)*ppzuF!$phS6fdB610{r0S0t|3-0i+t6o#GGmiET*Bmff98yqaf7C+li&2M>jp z_gq6&v|pzx;Yq`VpN|jQo+?yN$Ahhj1=|Tp(i~FLDuYf*bS!gmem>UZ6%cKT=hG{e z8H8^+B&1M75cL7W4$1$N_=G)Xc2(aRfAqQ^XU1TqZDB(?tv1$YP}!o``waP z;X8OW**xn|sn${!Q<_YXbPxQlLIJ2wdL4(z5y$((7i}|YvU1HSyxB3g-jgJ%<=~J- zFm=Qu^$Eiusg!auF#KMz!lXt2N*vqFwDWR1rUei1eA@B)KJoLuYRE^6AtH3q1!nfP;**k-deHyV=7nzg?6DlmxSWPYuxh z_<)~R2m!iXfCsa9^a&5|Q+&7|;rEhaK#$M^g~-eXXcGbmcL5;ek0GPq|Be6Ye}bfP zCq|Z{MvL(jS`?1JnU@|(zT?(gUth~5@W&*m2!F!zBoBNUcMXikjks#aSsU539eNc( zT1=mN#<4CKg-PZX;6%Xl)$;AfE|tsopTk9Si!Gnu;*HE7m^Kfu7Y!XMU*xb(1Xyr* z;Bkr z7#{>W3QotRt-Dznlr?EIVvwHYW8RWAn>L*GF6_;u)dq`^#TiWMN27Kt9Vw|<%Hb+o-c2o+;e99p~eld#&X&8H4j z9iPe3(!8M*!_{7nNKr1eRV@*oT&=BfFAb!<0`w+!SYQAInzu`hS*pnti*4)@Nbz~d=VMr<1o`+$;(Yk< zqj&^irubaZ23`xBq>cT6I;c~KZgRwTu*j4w-X5TUHe>3lFC zp(`VAM2lBoMfk zUof8Wu{w{EDiaEz&+8lTKr0D7Qx%e-19T1is7HWBh5UY85PH<(tE39xm&CtWOZ~_n zewS+nv=IS(mD!m&0cOg8bHu|Tf{BUkyXeQi;gw`ywnbieqV!QMGk$b2O9Y$5F%J)@if7Lc7TS)2Y+v{7zI`EbYZYwcu*31R@Q}TGAk+!J z(Gue8YYTpieZ3+(&n~>2i)TA%)x1;LdS}QN;5K-7$Sos`knL0z&@$xnYdLRY%?a9L zpN48~B-h#Hqha-WIw23(I?B?$#)}obQ=!bdZwxl?xz>bLo9~ix?kOgoaX`#JeE||C zAe%w#|0Ty!k(y7D!VJ$cika3Bh}=MrT_#toR=}%@uEZ)PCn0BOc-DUlk`*g)r;ezI z%DaHGC5lRt$k>gbs-qg(WN~T&QtX6!c9WPxx8JV@F$;00C&8yxITqY~m=EoP%_8(G z;DAr8I0J(Dhjp(_CX-`%-UPZPkmtRCx}L!g3a?wJzb|ID0wP1yTxypD&O5(uEa!!zD<%C>XGh0 zff&{?hY@~wp7LgV$m8b3RDKo7||L z0WkbT%4^3_7f#vnB7bfi_q>997`gg50=7M-kD|^gu+WXW3!!}Nm4H> zwo7`x7Y$6 z8TT1f+81r|x&(`}u$6R9wIUMnTjy?Ffm*)my030slcRa#ifoFeu zg&oR#MC?dhmR~T9V)k4&7vu}g{)9mstab~7vqf$Vc~dm#G|cgHL$PKq{f)#uRs&?p zfrO*dgM)crHHjUmx?Q7^om=1P>Yk@pC2g5A^}G6^QJqIp0Vt)L5rI<~?Rx>3ndXf+ zq`EA&1N#@uCz>;EUI!U@_q`+?q+ihD-tooCk_R^%JCLI8=9L+=m3jq&@*=qg9=mOldh;XbmPZ3P3j0F=+U(C3~p4J>Wzqz7ZNF$(e2T9@3{;W za94w}$U2X1X(|D0^}C+-!nF>gL}Ad8n7-O7zAvn#ffxZB{1tGEe=t4Kzh`vMh<3xINIOP z_uu{i{}dZlc-z*R+&fQz;NW+JnHyydR4$87!+QY7OL#DeJw3i3t_DByGVL^i>1m# zW3w)Pn)37>@8~iqHx!QpS2KFqnJiWAGE3>JXpA$-7;{%gF+}U_P3uXiSDZeG2GuxQ zZhWeUp{`ctHS<>SiE4XT) z4Y4?3kblNTzgAxTjj{PNcrxeIAb+_S@#0w4T`2$ya}A2EpyBaW{11hGARqLlPy0Kci%C{8#g>0wA9-;nXSQ4aFgbf#X^5&ihrl zPVQi@fmv@PXr4GWYQ@U?JsR*CORde3gK=}?3^d9h_icZm68tyNW-7wtrt+9AN~x`) zLJiMa2ph~aztp)54p|bE1|(v7Ayhx%3Ou6Rq07ziz<0NQ5m4o3bMXFl1SVfiR&43U z%1!+^kXWG%ap1<2XUn`#T(86Zay$-!o((lI-g_Xh#N2!ydlE|kS^n!%wg1tSsq*`# zOkn_t(EELGrop3=8-Snv(Gdp&hc9a69>45R^;k6G3EQkl1c+~o zjXWtHq6JM~X1k3X^9BcD4dK^NctopbjdKurAu(~UPN7GJeR_Oh+mfmp*(iG3aenE~ zT(cjrPDl}dw^^n4e6+uKtzmF6^X~%bzb>H1{h8kt)0`9{YV(j}%OsH^Dg!lyS2n5H zL1we8u>{CkXVsab)^B3w;|+&O-wTQBt`5KH#|L5L5Q;Qj60(>I01~=mcyS^3-ei>a zt=%V)zBCHb*Z>Lm;lT?fzw&*bb(6Wem@f-tzs|U|AJKUC@1yZ5Ks5gP$BZLNQ=;2G z-?wwQmf7yGRZV)lpdZ@5{!QQaAM(V2N%xHc1pLjy%n9&1V`u$#e&+-XIsVO)?ynE= zPx1R_wroG&lYU7vjrJS)fHLyC73&i}6fZl$uOUvtR79Ws6lj-F+OPt{+L}L7PEJZ$ zicUSBgG`iEcJE{N2V;Mme@k)x>}b+HBle19%GRUt>~-6I{4mz8k$0$Vmc#A&*N4hk z2XoeBe*e0X1jSR}EDA{bTp-1)^~&M^PE{7NSD7smc*!fd4H=q)V0Q9ePOil#>P4N) zx-HQG3UyA{LTsO#PPh$r3ZFdvw5c#^J+|1ib_UC{x!l<-Vu)HWbehaz8J_SqsYe{~ zP#Y;?3lI1H9ZwcGiz&E}e;X(baL-n>bn$le`Jjbp_0~ef{w~>jAYxVNig%SvZRkT^ z@16wKieFbA*)GmSShB0-c~&8hcDVTH)Q~O1e;lj2s;hIE~uC9QGdaIMeP zFK_O(k75{TESpu#{>WRPzF!Z!>#qU>Xay#n2HGH$2wO-6gD?lfm=nt?-5M zg=evs6)vg+K45#eve9y$5!^k?r5{r_X!Wg#jCbf~D@aKo)-wXtyV34nKRv-VW#$v^Zs; z$>mwxytRGm+2H-|#jOU(HH^z;vYkJi)v~r&QT!=>R>w;GoK$ILfmU(FgnqwvqwyKt zmn1=6{XOleCsUEDi4j6(@oby*DHi(gvoVZW3oHz}>Sd0JchuljghsF7BoA2zc^a*V zxXYsKt2-obcDy#;y$=4ey6pA-g87a(@F=L4!)>QppjC6-u`(K2A7}y7ID5u}MCT}K z(qvm{R)gDu-R8>g9g8@Ni{O<)(ZWQ)aFAV)eRUV|DArp;EJIj9IGSamOjy)EHVt+Pn! zCZFQWcY-{*57ID7>XV6)gK`&UyV`9xp11@q!++n>@%G@}IW?z%KW^%6^7%|fY%wtSW8{u43RDywcz_aZTl_3Rl!XkF6Os(HOeXn zs@a02MpgxCrY{kIzG$soyj1%-9Ko?;pksXjZO7h@qNRG=^M3H;3&;}kym`H9AfCE( zS;ma&R2}47L=WlOzy;CEQD0jc=l?oor$J&i$rCBjV!K8?pKI6{Q>dMe-H5h zr3X;L?+}j+l+c2nbwMw7fDpkNsNLA~blZ)r_Kzr&s3`%OH*(si zmey$tIU_Wp@p~)IA4ZbEh#up!tqLizg;m!2)Z`rp4g~f6;#G-Pz>RjpdUTRWi&WH0 zLr7IlWiwWGK2(VV+0}7l{Jdf8T5WcgiT4oAn80@~fpS1k&my(9Nt(Rx*;YQwc@#1N zjGv&ROii>}d6O^|8>#d^_G#OJ^O6Q#pU3O z-lI@KGPuk?zrZV=)yNjUnrs@;ve9b)W$ZftGs@@NWXwWx=XpvgBtqPAA9NSG&o;gn z&l(lM8?{WkCwiRF1;SoLTwsV#JUbK{rhOMa`j$c;aCsSUc^){7fC{!)58fxU`D z$H3q<%acPoatlSzut?^1>wP{VAgFT_H>aA!eu^Y-5_H5+HRJ{1vG{{*8)fnKQVT&-~~6f?gUz%id+n~4F`hvn(7C$ zyGTYJ?jt^#Rqv@ecx)qHYt+-!?pMmABq>t8m^eg1nwJG>M2Tb2pAaw;@r0kcRdWIk zO;dGel9g82zC;xU{fdx!tJVY=s zP!Qn9eI$p`>YPATXVIyNaFcu29z_`2s3^azgKy=NE$f>4GNh+)P+t$n;Y`=#pAid) zQrI+FEe045y&ZtRJxhhyaCs8DmoDUyLLIpA^_Hkj>u{YwwbrRHTL*;v>!e-PwgI}g;IQx==l2a|SpPv&d zu3^}+Vx$|G;#=%@NC(%UGBRk1!HbJb;uNVP)N8(kkSKKw(doWrQW8R4?IuFVSjLB6 z`QRZE6!S4$t;-0;RrR=w1QB?KP-+qJCN9W{TGQdBl?PdD-c-~QFjY#y(cKSVU%yEb(@7aT!A`h+kKswymtg+|h zwF4Cu%tGtt0&SKbc3Wi|6XF~_PTVLw)a(FDNKQTSn$H%W)N(Myxez0QYR(!(xKB!vnPgJH@S5Uwu0RhxUHQkiq{54BPX~B z=w}weYSNe!>+n(e=^C-~&ZKezUDP)-wQ1E;n6%oJ9mS(V>{S zcVAmCX@S-N&v-n$9_njEA06Mso-tuFVt$8QKPC%-Q>w(H7 ztCTGH{Y-V-#3ZbBUd<}Rg6X@b9-yVBx0Qaf$s>-tFE_jf4LWkq7vtL1u$B`WKXw-K z;)ZB_Pu&TY*B4^GKa9N^ZH?jd#m3@m_ld#OQsL<_I$Dl2)t28$X~9pOmL5XpB?at$|IW3jH{7#zT3E8`-U$bI?rx0*IVliPHHQ%*^B7;Y*T7=Z(sqODoP|$l!SAT{U&TMYuT}wVM)oVzjSz-#Y7yM<6LeN~l_{ z#!1(df%nh1Noq%z@L|ccf7W%PnQQA4p8PWwejLl%m#nk66+I0(zbnDZnCfN-o+jmb z)O!5e%fH6bf5Y=fvGBJNAOIJh#iRZP`V~KW;Fvc9SAJsBHFD{#$%!5Gab;MbiD-HK z!RN&NG{ZS&MjMmV5^tT#VqkV}zw7lt?XeQ}Wefd}UQ!7DR%6ckqxVUdnT(#8SML>E z{PCRU#_O4wywK5bJJ|M#oR#4=^f{sF0B>eKzmZK!`QHR$9t7L-yYI# zT0^?on6GT^#`>GV;B|Pb=VVxjp(SgKmy6-)_YC|J5h#HrE{a1sYqcTI{Qf zie-}|l{rs6MQBh;5W()M>AN&r^DfGcpqe;<=5k(a?8a|yIJPLer$13 zon1WQW1xPZJYGBkY7v>Am5VTd%EbpoN+Aa`z28YGkTMc~=f`pWeA!=_=lB^WhQ$s}RM*izBYuED?i>PEak?!Y$FE&g=lAb2M^#iF zRP;>kZL2{RXY6Lxri*Fk6*X31Bf`pAdDwnFgB+nFK8lb7KIu%~5N)p}@sM}7Pv*0npr#TBN|`lc7=lZy=M-MRZ?A;xpHO4X#rry{O%Qed4n3!D7L{8YzMrgp?3S(oov z44l{CgX~3#l?8A;cW&#@wiT|6_;ZQ4*c`(O%-gxHU59H*wzj5JzLLbz%fS{_L$aK5 z>f}8u=r^);-i8VCm15^(xkylQBAYGgbnrLYQ8?4Q<4gcCH)H&W3!@5IMw~}`^--v{ zZa-620_X}DOnIQ>ikYd?DFGtOXY?h-LRDd&eaO9fM5?C)5;w;u#S@?q@`& zck^90@uSoFZ0lO1t6s9A_0%A`XUX1FV;8Ru_{jTaE4*q=DT@<&nRik6xcxKz>k|UD z8usZm-|UFN6hp-JqT+XbXEqrkF9VfQs;obt7*E?G9YL_Mh`ddsZ+OBqgye%8ycRt+ zdFitMy7-8}U`AMH*~HH<_9%(r)|&jB<#N3GvQxj9NuCVE{c^#=XwpiWvB#*v^odak z1*~KEamcTr9`qw?V)py2i83H-GXDeAWl0R{qLK_Ux)lA|oMrl{9nq#f{Uvkq??ZIf zZwZq>5dEi*-w#9w4F8RY&dT^N@+3!9gPiMRA{&cX(2ag>IcPd)2EdE$#S2vhI3`lQ z0p%(EB^YxwiG7|5%B$Ebd@6?w=up>aO|KipHwC`DU3ngPHqL&H`WGKz#BVSEiV=TLq-Y=S zK@2=&$`k~$s`X|+ltz|4=?~+kb&ZwF)%eioM1I^FqXp|9sY{vJWt(ccegwj(sfM89 zJgnC72`RE6s%)*v&`JEGa?ILYgYq6^r(!Wj;TNJxA`RVWKIWrIl2=n|zfMA!AGXzB zeji!P0wRm{?~@P?`~o3(_SuOT8+}9NqdS+>9W^H5U z@Uy@P5)M+t6rh@FV#D;KpAH5N^IJgSq6etDlmIkNn^~LulyCaehyBl&{D?V3{?JhP zTWX$(1CZZi0SK(KGBG~{AP<(OKZlHd|2dEPPw`5+&m-qJCmzd>26PI)lsfN#@UA)jnjw#11(A4|%+AG7xpflS*$ z=0A(TR`((>Ra*c9qD?#zsq#+7a-2zXn89oj>SlGDIn{3$sjs4_Anw27Q|M+Cuj=Km zGhf}>_OsO%j*unKzvpfzv~Ijaj~aw4e2-)4jI^TWCdRKc6{>z}*s&sS+r3@=9|L~KU#)TTW)KZrTtf^V-&>k5a3a9BxsH3s~#(HFg z!H~nimuU8$*#`s1p?VFcW{q%>uuiIAbu!dX==l(F@tF(s*}oXC64!wX8Xys$u;4k` zhtr;MQDu#9;rIs9edJq{es_m$(_jS2qqZ;nl>BCTmdw8M9OxafTl1Qyy1rx@xDDUX z=9IWWN*Ae(JxWiBPt1GRSljK|O>`tXjG;vcSqUL8Hp$$u<6bEbA!I9)TBzjb8^~B? z!oKr2G2j!Ia(yl9rQPkXKB1>?Vnmm-KavvtTfFjTMkZw$%LHD3&bexquTEq8PI!z7 zA>?lfoJZlv&ogGSgY9a?_-C&D=eje6D8U%`i6h%elstxXL$vmVoJPSPo!-2dV*_t?S!|@@5Cn(pc%_ipXSi^LLo+W1g9O5KCus@~ zX&AGKe@31CwvkusDi;bC8SY4c4(XN6{VHonz|`;t4x7~&=t>3r+pHon3V-%DXf;p; z!b++&DKA!G-C{neqR6vhg$kLHO>kfYqTK-7&nGM@kP{}8uR5Pm*jxkgNb1eN_shpq z-=RY!z9C5^k+_#{uIa3Jr!=%^DO8GX;yriAIatprQ`x55pN_Glmf@~nNgnN(@OoVX zZwzrE8TYk%J;^vzR>4=!g<(S39W@nhlaA5zl$7)a_8MP?P;uGdR#9%>bq?HuhTWuO zWYjzj> zC^WC9LIGj6VK3x2UIQGK#lUUvcF)b&Dzx9N&mSw*J;UTIe09NVuumT80Oy5`xBJ#J z z);9D&xj-IGYf7=Eggtz6G+1UTz)cpR~4*>p^kN1Oz;eX^as{;%vAgO~T zhWG#+Kh(E>fC58;3Il<8-&k&vtT`}4_33UZrZqUe#H?_QQSe>h{2+-p`gR~bFA0LP z4<1dwD+-v}D7|QjHJ0A5ZJi~Ksq+q+yFj2cSA^jgEJD_c$};54kdHNA%@)a8F0*Q( zPDF>Om!OE?I6w&L$U(Efn=MAqH7|_@f~~63SS1Vsp+CNK!CoCmTXFRGbv_RMn2+y% zKOfTp^O5w&e1vKaO0rC$$n!N7=XvyOp#Q&pw=A5j|3~wYo%Nw~@Q?W9VfY{U%>N<` zx0r=@VuNB52QPb?qI`smN-ued#6*(o9Wd@g3B^s0%{`ptPvBci0UbRW#n=h+8lglD ztoVZ6>lI1fYnbqe;=MaAGUFrd`^d7FLT>5Mx|E*jQ=7e~bESxc%5c zKuHDwZ*1Q)E%ZVrM%D&Kgfib8LIL`PgoZ}HOvI;_0M}7_8*4K=C!@z{7$@s*(E2m^ z{msMxU>e2@uxw}J_|~+@%KB*d7ZZbj(W+E4+(h_Iy87+T_*7PgT ztbNuE#!fb`8**tJYeuE%GvB9aT%~EfWMI;%G5j)u*5MX|R3=>mbjyz0;HoeZa@X!6 zv)=m}sR;Vc_q*wMLH7H|jcnTl6s>L9-Hj6H3o4%mWU^N3OXem6u&{$hUnPC&%Qb>M z;k*JVTR1lv?iDx-rxnLeu>ps_8^QBux}_QbQcH?`?hAy=5|qf$FVr4^6xabx8b(l! zI5XoSjv4n#SF<|>l=uE3;f*Z`5HY&-fOg;dVJZG?A70@7Xzf9tF-l?Jgz(iQJ|rTq^K{>l9gt2rvq?D9W~^ zeEscD*hI7_WLiEn7kMUb-Dc>OijD&%{YmHj84W|Ez9vxgIy%ei84u>qc2IwRAxiZ3 z{q8Z__uF^;dQ|^S{9FWXU9*7J+gjB{cn%?65gbo8{<6LYNFeD(go}_uH zxx%0OLf7vgBvE12)$U!Q_ba2UcX>5-?q62p%J7@Ce$>ISvJ$5(0#nnQa&9H|8G$r^ zW2ktT^fKL7ps@{d&ZvCzHFIi*QhX;aREOw|hXJz4s5!QtxtmptELD^^cpHkD*;E%h z)5`6&Z-b_6=Uy#y$)%GX#wR4K`lB)E19#zcjTf*JT?sPOLti03$$Dc#gdSm4&m=dN z*>&P>IjXB2z=aJ*5IDtSgFT6pkSp9%r2;};ODh~9Jf0cX`!x*%dScKAKu^u6i5&cKwL4{!s_+iNbf0iqEZ%9I}>)W!i| zfCF@dRvJK)`YXhT|H#o;|DH*C0bo*uzsD;`vST#SXNEm28M3Tu#w517zry=pq`9?Q$6Fr_rPgVB}VF;`4f8x|DWomGJy!P2=?{g0St>;;=*2Oh* z|7Px)x#!(j#ZmN3$y2erB2)bu7jFwfUK~YtFg{4$Ao#!$LT8vW3$$hXbv92mIaOeO zx1%Cz9;?gqXlvPC_T{oq3uFgwPxFK7z(bcpb;v!Fj7_0u+ceR^gO8yJ_SIQfk&j)B zE1U^8kk~PCzamsxy`{-G-kzNRXaHTj`u-t=gB=H085lUR?}ur3qcJCI|BwTay8$4AzP2quByM#^2jbt@Ut zUg8w_z)(7)p&8R1ETWhGQZQ!9K3qzm18;#?jTJOtbNpl7b@wqo9MfzW&e6&?C8Ab16km z@V#z~$g$4kQGZ&VCU&PY1qJovUdY9b8c?5~Q2qBU1GA1#HkkO}&rlY;HNi6p*iz0` z(f$e5e@EirN3QatqlqIjX+Rj=n3^+{f^O=n4Bed05(no@ukHd;Mq}@|ueY&mpozhK z;r&Sk{d=DBOj~edi%jxoz|^+un{capnw|@i@7f7y{7x{W?PGhhnH!7duG0yRbp%0B zujTL{K31c}C}U!y;2aT7!4I_U^>3I_PUN938ARKy=t^7Ud!M^Z|7k!1yPU9JUkaBq^mbO zaVj0IJ-tKr`tXG;w{-k6i?{GnXCXK1Q1or<)XwGx>MKkS2!58&J@vxP&N(wCT(n&5 z3d9HqHVka2f~&NqaMn^nOjx9vEGo%;n1GVV>AqVjtvYsgDIEz;VpQv^7#(4?&I>e9 zc3M1o1vRMrCrbhwy)~c?AKEE=-@ytKmco})*v}2LR_6q$!~1s;iYct8VGTs4M(#^~ za+05npwjs0$Tk-NOI%E_hr8KxgUo*)^FHUkkwz*kzVm=LOG;=W6o=xwC1*WnNy$>5789bX zzIIw?Eayzs%Ew6Te2>JMzei#*01`9YBeBkM<(y{DXPs6}6CxAPn8Qcr#l-i3&j3`) z?`iFaNDSyT`B@c5`HsZ*+_X5$k2v}V{&E2D_ZQ#-a=jlzy1(%Ezxe0>gt}c@v^JiH z6yTIOeq?ht{lFK=DTOQ_NJ0#RVtM*I%y1#PWD059O)*LEX+K|3hs9^Rw!~Rx<-liq ze~hor8;xL}bh^Mi9e&!i>Avq0pA}77hJXX=(>gKonZcu2j8yB6ZcEuc;XMudm%hjf zcOJ6UX|pwEUIjxAAYh40LC zm#u1e4O7vxHzca!995}H*Q0RudRBjy_Favj`f#^#E|hD4S4 zpd5`8jmKA#)4o>d*jH-qp`j%Qwj~z})a!6~JScLaQ~7cg6url@I7zW)dxw!?5M!!O z)l+!k5Ca;($ve1*dET;x)w`iEig#@nCYfL7xtP{2dmOo&pl=wcn*4>je@D^ZtP}n# zg7)i-7&zHry32)w(u+VhC3XZ}UVh{jKTsFdgybZOwp4VZ|E|$&tHW1<56t6|l+pb& z$6VEr_32i|rk;9qKPStZUX!{qEqsDk zLEKBw`Y2y@1WEzLtAy;2x+Z;7fpd-QcE=R&pSf)LQI5Irq@dZjeLEdl9ZzT)QB!E4 z1cz_G=|y2Wu!%&bg-V~8X!CuFmJ%vD$Fx_IzkYD2C?$U zRR@9|u1uF!f$0!6!kL4{`#KQ_jv8DmLsGI*uV=k~n9?MQ9kU*wvM?*8)reNN^8qn| zIX~g`fW@cURmu~j0^pq}6vLg+fm$E2r1z;v&$)0o#Pmqa_?G*+Q7Ma+AWE`%gCR_8 zD!nVIMN@K`B+aSJqo+6ZO2LASZE&*Sx}Xe)d~-&Q_sy1CS$iH;J>qfU6?8+9?rr->2=Ci^;8^F;3 z>Lv#|0&B$8LuV7=ZYwzf-twWxp8vL4pKe=dCFFnxmowXl%{B!n;5 zx@rVG%u^(cY@C&zzzu@zrtN`$Y20{#Aza-S{sFpkf1^?su<&u0#y~tmQA%14%l33i zbn3-PK$Eq43)!ry#NJ_NwwPb2#S^j7!c^HlgSk;1H4CiA=8JG&2><%~pkWCRG<4sa zFYt{u({;{Ag#z4WV+3|k`iJQFy}j;#*et#e`Tc)l!T;`6{}jylqL^TEAau+_RgaXY z!8?B*q#Tzil@BmjD zm7ZfHT<83?kcT$*e9dNLAA=|cntyG_u@9>zcEZqj-X{m*C=|;ghJ?5I7WGRAn#bt| zVbsKiLN~Ih7?eVPFq*PJGwZFlRoWd!I#!E96nkF&^Im(?dE)1l6REDC@8zHD418H= z&XBn+2YQPgi%Uyx6;q@hmgZD2Vu zrBqh^vxHV9&KL)gW0nr3!}+3HM>+Ez%Lx7WrOqC>tM> zC<(hf;~NegZx~hke3(3RFtDLg;4L@eEJ(&D6q!WNV@vQtU5tQ%2Gg}2)bs%@|8be> z&suj&n+_$UJoG?q>?)4Xk~5O(I6iS4TMBUq#}r<8vY5?%`yv!0Z9;m2g`%S0lDE}D zGUN%>lneN89E}(&4y%`&BKqy4GKtqObO;1ri_{ zP3;;s0ooK8_O!dHpuotv8xUvzVb4m6& zvchn3**<37j$LfTlH~0oyInRqWdh!?!8*k|n;cVeVx6r;d{_oETps`O{Q%RTiPs8_ zm5s^1VRt^R*xGJV`V4V`Wip&JbbURBy$CvI99kb&$jO0g7I7fcTz~{d7AE)kCNAFz z3Q6iVFtCO&;& zETrNYsR5F>Xqf(?@j#QxF)%l^KBfl_a`_~T!;xi*s=cBDb|p=w18?ej-Mm&@%#ShK zzj)k8)V4G7j-IutG}@!qHnfZ%dsvWa=DIiLolY{ziQ<-e7hx!~$U!Lnbaxc5hy{K= z){++=#*yL0$C!ef$ESh*y#Sr)?*-_X0H*=g{b?YdV6~66H<>0onRMtBomKkqH26My z==V_270?=WAEdydqPw`bFu2+qSlc?77&(34JojDlp83Ab8U__tT@mozUs4DEp+_tE z!swUo94IQ;&%6HI6ve~_NJE(cD@Xxl96-^Ll^qb)0NVNhJEyn-MaTaaUh+?xCa=i| zTF`5nmU|*{DeJgk&5!Hk3g{S!@wG*liFLe59dC8LYozM)N(swWATZWawPsBnEp>dO zsndgTXVc(cTRS6Bsc)E6_(;8W%UtPT_V%T%jd(A}gB(24pB>Dh|8|ne-+K1N2qFp? zYm(kG1I;fR7qP|L_&m)!!{03F**w=I4Dh0k4MYcQvZM+VDrD!j3)$T5xe9~^coUGl zKK15B)Cc!}WaXLV<9vDL&L2#-?Jy0aR$`or{plMb7*u!(C?>Y?H%)SqNH)5vQ!{)N z>+x^`w7JgcyfxCGNx%kNiu{Mk0HHBHAs8bQK+-UaI*T%x{C+uuk-gPF&6H97U#+qKo9yy0#gtfdZct!c(<>>w z3mAQ^H*>N{h8JW?l+*skaxn}YlDM=f3)cm%rtC-fUyxhsCDxHn;g0qiY6Jp>fLeA5@_5Ef>fu}!;y z7fUzRIOH{C!<;<6)jCEH^935sO`Eh>c5IHAP&U~ueRY^J6Dbuh6uu(dSctg+!77IA zZK}3ibkjR;JluH;Uqs^O-TAzF!EaSB3oADc0aBKH=E(;IR5`1>)nBTR(}q0-w-&cW zys~GW)D}j5WlQdyKw5>kfeu9CIp~!6womCP{K3)FKODNR29&({F}|4HiyO)OUfc*U z+zfI*+zdek0ghn{@)%Wk9uQNC&;Em$LWME{v_&dOip%|~?ZToW{rZSV@!2zFz^a1p zv=kEu6DI%>I017SKhS{r!6nmw>5u=(i|bh%y?e=}qH5=BsBnwaVs=JJ#*LfC<98-X zf(-;M^wrFi17({nltIAnmQzz`%5)&3r8=m54zFl0-Hv)nzaS}*#k_ppR}flUu9*Y0 z+u9@s*i-C5hw1O9Ye@G7#H6~Vix$Yc^BR;@4gT}m<&e(PDXu~Gx~le(G(V}LjVfSm z{Aj)8&dSpHP~uN9Q2xHhOgSQ3G5%#LRFa>yrVEj{5N@Mov{J?Pgib1;96LrrS?fHf z9hVmZM@0~vxZjWqQti3+BhWE$r$@Yefq}k|9y6ig}_45V!24slP<}cpS1=oHM>fd8*ZivU$f~exa~S>w6?_Fk?MDRNCw)aQ$Iub1?VI9_`wD1FX1$7f7SP&1ZDN>hX_9+k=)(ci}mSd)iuKg z4dxL69)`5tfFdvnirqpcsXqZBjVfy-@FMiK+G-)6OvL#Lo>v|OVpDcL#e7HJC)L{% zUO1a6Et!g}mK-O7yi~{fc3?Wv*lS{tmx`_?<<*|-NvCKhc@dHC47JMHiqJI##a$!E zi3l3#bJtbm$~huEF(6kU;#>kCDg#%W0$||ibhebcZ(K1~4Wrfe5Pf!AeqC;#Ve{O+ zqQa(~=^%KJ#n(v82kR}#2fJ2$VK#&9|k;7dpbZ)h-aVNr(m6netZoHayG`6&p1K}+SIwr~y;da)tlD|z!LnAOj z3rBCs@qel*scJEnR%yhtX|SS1f{+g*x!3PaSg>a3dy4c_@ihe2Qtlw5Ptn9KKa~AG zDJTeUUeQdmsUsg6=9RKE=K8oBpS7iA9~A3|Pq{AY=5|{F zFq~h5B`sRrpkhuzFpT*(=VZL$*!nK?>Z+*}^7CnnBrhXPsO8ozQS%dW=oPG8;Y9nF zm!NEha*T_|69Xq26_xEhUXc$po3Bf}fFJ2er%Wk2M~zz~ST@RJFT~*3k7x+^#upYn zSc9oMU5zP(q(kYTAEYKp0{IwrZST2Y<==C`f`HMc&7ZIf2dpe{NPLr|0e=Dp^MD5i zVX}JwyAmqDA{$XY9K5W#k-ZHdiz1S7G-hDNWJ3S`xd9x4 zs*tjT3O#_Xtm@Vc89|pID2OR-QOcfM zdJ>bTuV=>4x~}`c>;TfC05#j6Hijc&=JdkU%;o!NG@ykNpg|~N!$9}b z;O><}Vd02PN{)CCIUmaEWI9+% z==DU-I(?iG?byh%ADGyJb1zUHQkp^wTEvPt!=iT*^hDo0df*Gm2I2OZ1qpLK9s1Xm zTObROyAYG^TAcQL8EX<-;&A4#NseLAC=_@ZA7@dr6M5%$P1~TdjMt}x>z^JbeLFpw zu9ZRuQTKYSF0J1@I1QhI%BnPKaN#~V?OL6}dIl6cgfE-GRbH^~s$d(gjTE3je1^=& z7OcA|F_`4%&n|<#Z*pqc1^(th9CfOim@)wgW|oYnsZ|tJj7cDgcV>Fp;(&*1opvG# zp%Hf*QqqT$=EB8wSoyP-SbB~xLaa#pl$IV^Q)XTynYf@vn>|+*hZW~t@~94i228Q} z+50N6r|!x?Wvxo5wcD%bygAHcg}20t#$9=)Uz{Kz643lqx+yn+qcPhp?510#uM*U~ zypdTeh0hGFu%?Eg&G>z+P6?t7OLL9pq4NnzgoOxflEe9@F9ZbL-70c{uMYY z^wak$+zc)P!cy6fw%2n*fSJ-j0)YVr_L%4a3KmSz5a6^3pddH^mx6=Ck2x?pHe zD?aqVsCph~xxyu0U@5id;msgDa=;()1ax(Pk_Iq;qGaQdU(NGMlay zkkV}C*StzHNKp%#?%XI>lpXO|bzD>$UANRs7#h<&asdc)Rfmr7=Mq=cerk>oAJg`z zcDPI_Xpbgq1x(`4Idq~TBL#^skr5oyAflBS@~L!1xkFUxIa`866IS7*>C!sl zg4hiD5gSsaL=$~ea7 z+eW9>G-sJG!s1&T8_!VXE{qqe?q&?ikt3P(0HL9z+wM ze;ZN;kg)faT3A#V6YC#)d;z%qtEdcv3TqjvXNVJ_ucZyZ7-w{?>iNnfE#Lh7ly}rcTDNNkk4c(7v{85pQX#c0n~-T~L#LiAaVd;A4D&_W_Dv z&s4~>^W`8ACOkCb4bN8r$Y~X$ng-H&h?3(#*Ke*ja_@XfrITPuRFaj0t zmuV@R7@2+FFJo$M;y@&0Zf)*pV*Dpt`zf#TZ*A>=^kx2q@sZ}jHPEA+P#srREv|u} z_-1hHNy=vSk+W$y?!SY;+kS6fzEj4yDx@5ORv=Zi8m> zQ2^}QG+vzdX|BDm16l}Lj}3-FknoKYAset>ga&~#20&rPd?XB)*@4G(uPmMPgBCyJDS-m> z)K0GaEDkva_?7e~mFq&OozI`QoPmWsde8M|BNbk%@LWZBd@_OVIDa)LUf}-~L&b&6 z8wDv5j4tP~_2u02z#+fqfgJ!mu+~rOg9R!Z25RaYW;qx6$Mn7G0}K4mfg2tZ&QEYd zy$81k!1icw3_dVJMJ#pfz@`wWigc3oj1Fb}5;cW#Wcb1j z$59X8jr&^b+%{?@PVsDm{6aZk7Js}~Ge|(Urw;Of|NT%(d5Nkp4L7;%R9meFM`_8a z!@}S+et1Cc6>SVUrzIYR_yP~LYP>~tyTy}qzLWMOE_Lvic*yG;H4QpJ_yM=BdazH; zuq1ND9N2hn5qq8A^9&oaVvv%^Xf`U}ib%fn45 z2g42)BWf+FZAG%oVK*9oTMEB@vtmm?1In$aDcq_Z8|02vBwPDuFL+Q2|1lR1SoHQm zO7#+**n=v2cN72WoW7I$m5>Y%C0(Z#7P@bDNx8TNBL(a_N5vt}tw@q2OEL<&)-p2n zU9r;nyLMN^k~F1qwHC7oK6BPDIa#DeJjSLZqNS5|{i-ysaXHUWm^nDsmTrMMbMz4@ zOS3A%YdPE%-?UJEBce3ikxd{&-GBkxH>^(tzU$on#tb1%k z`|O$g#BHNTas=OdhGr1j@lL^wa7bo?)FFyw)GOq@6cRXO>>gcQKY6C!S12#G`-OaB zd9uapm3?s+fCf@x_BuM`Aq?S|-lI$87if5{mXTzy!MGz{8WtLpFWjq5s7*;@`Ne_@7<&f9ys6Q~eAO0EIvlH`#Fn z@%SU@K65V%uLKA=F6Rt>2-cS{TQ`SQ270;SY)%aCCdUS)i}qolvc7cM(>A;(=&v%+ zUv=55L-^o~iuFYRx)Edg@Lzv%p~d;%@?nj;uMsC9UUqyrnYdb`bLZn}mK-gqg$AFN zFz6ilGPa!NrknDcg)z7JVn1zqE%K)w4ab#ONep}-5isZJszYbYVedAh!BZ>eK8ze; z@4$ld08+&pe2MM2)QX6*GE($L0EDg5b|@Wd3JMfj>_C6TyRK6bOu@@mzqzRD&duIE z51&tu=KSN@4R^hG<0tQBFw*kNGziGuE2DT{!P;&s7-p&=xXj^dQg&aVNUKgx4?jlV zH-f@JyR%%8J8zT*f!oY?G$Fn|g^jr^TWw4KTBgRETUMp|?WKv}?hUga-8XLNnFGuG znml~;+}CHoeltN{#|qkZp-W8zgudQVkA3)i-thg0^!Gs?A|S|1{OQAJFD#lhij-Pk zbDL(5S-$1jvc{X5`&+p8XgKTM9br&We~e}Uv~6A({Gf(@P?7fOesr7O zAF)5!M!^0Uz%&*o3kTazq0AA%a%$}bwgq3o=YDs zr0rY5oA)yvv@F}UdG&cjD)=70I?~amGDk>{!nD`igRL`F5ocA!tEFV+9-eRJ35Wk& zi}**5z@(PGsCv}1zS|%vZ<%V|VYA=iMZTeyh$@(>IL>n{h}}%lLl2PwIMXvv$R~^} zfxh>Kj(2CMrqB$$nG@)JPCKriMig{e92;(Hi_E2O3~LA-s}6J_d&Oop2VF`Gft4`y z*nEQT=|zj*(~GJAdXfL$d_>mmP-m(&&~)mDB5v4kY?{F%pFTbeL>?RlfT5CqZ$bAY zHz+FnPYe2;^{_Gh+z5GZJ>M^x{*OH5Ph??>il@PN13s7`cvhKJy={%qo;0W~l0b|m z-bM`pN<<8F&EomweT!M7L5DoE-oX#w_`?XSR_xVl1zuZDX`3_UfgLk7*G6s8n zpH}Df=e2s~d~` zNn$AZXm&hf4x69dtih1wFPV_N)!BRR%rx#Ie-00pn!o|<@DV~iZ=7f05=;zLCA?2m zyg`8*hhc|p&8=TU3dW~7?~oAG)Ix)n+%SGt3Hv!Or6F~&>|4u&y9v3b$(pq&2~8ku z=p*piq1ei^PrKaDPHn(MQdCa(!O>dUsx@k6qF4iSVib$2K@#;Z;AG4$4kj_-&+XJ| z$v3DEOmxae4|p+QHAT8|gZIcX*1#bb*o0AHr??%;w1A+zZ}_iY$ScjEF_<_%wW6S!ZAL5VyRe#|SrY$EDSC6dsfA(tv^tY3=Ip z*?u*9 zn3ak&{IY>dSGTJs4}{|lfgaxQ+N*TxqMO%cimS&$idTgU_OCK2*NYsy&T&Yed+-#S zRImU`qx17+KZB!X&+eWzMPX+ebY{S)PR@{hCP&Z1CbF7>0RQ%RQqvfolnfos%a?x7 z>~IPfwLLtbx`5z01=l@2l=T>c^qf!6@+EzQNF$+wv`BY{bhpIYpywXW@!Wgv z_kH)i_uRk5-gC{h=A5oI#((_Bm}AbHotqs1000g;V(-7>Ji%Uu8>LBr7nO9!7Jfq_9m0f3?` zkASGq5bBT+h;SleVj3zUGCC|Qs6gbqa|nnqN{?mkPO~5Z5$?{wBSPL65rA-aMQC(z z2~{8wHWCX9kOTDLVdG-s(!oYz1G2EPvHUFlNBRf^Cwn+_Fem^-AUFyD7zhpz9taKw zNGU3AHI_{%XHKw4b~F4s8Gk*nv|_PGOf1FrQ9Nfpd5*Y7Z5H#HH3ynwQx{@{4Gz&n zPcU zP?*tytUL|x0~GF%W7}cI`O|mcqTiK@2pMBg$csOJK#9KnnvHp)3g=94D}f%gMrClm z@R9)j3ahrz6}o=kGzdKNv(EN6w|S?soadCAW1R^hF$JH)!q^gwxKITX1RZEG$Ffic zUot$(aD1ElS#(PzdpS;Q80>|8L=)c;IcMh$-$E88jC65#sM{@Uq=Ji8n@LQZjiv(l)-gzGza(yxPi)d+q1U8V4G66Eap zMfEGC90ilm{Sb=F=b|4%E=L(@>2#dE&1}Z0jZBfIzsQ_~6Gw%zVxPN;)eq^!1RIYn zy2EcivG91Q=)46xe9kbf-7+V;nvbN!5PH|@8T?rqWlTnbYm_rgt8?7^Zn>jcH z7yv9M5WE*85uHFEXjpn^kbJ{{fk8S09f5Mcm4V>F!d7l>PQ1*_o}QjecM8O0?#gUo zZD($5W^e7lEaGBnW$oeU%4}-x;%04OZE9==D%>gA-L))CrY>$k;(xRT7L5M0HAhod zr{9_b5`uJt5E&8+5@RT&dU>9UI!66eV>4itv+p&LP%{wat{NQ->=qIV2m$&6H3&LE z4v7QA^8f2Q0>NDGE+K&o1hWAKf?0qL6KF`#36KJSX@L&1--ZMZ4k}>~1%jahL;&sp zH-IC+1z-&@0~mu263}4|`YQ(d>jJ8?23UX&Q&62L==%uZ0IE{~m39E$|G3r;R3-tn zB?kIvfPT?{ep`a>ceuajuI@*hYM^tbptFtuJJ4YXYU8f%3F!D&y-9$szPry2G@iTu ze~gCV{w^7SBu|gZNBS&NLHIidW-ndRSLB3`>Y5|G~`SX*nhY8jw&5%-) zEz>o$Qz?^WMM{J@x#@T|fs=y37l9;~=$Y%?aW3c1dyC*Ty9=0|ECjn!LPD&W9}1e^-#gl~#98-@}VeW>V5T9OCAPjyr4 zenXGaTRCCNR=1y7fRksgq|&8!2f($Pc+$cerfZkf`j%#>0m&df5ILLOTyVq3#MUVb)cU&(aqTPf>>KtgDO5zdYvj4NCSZIYZWvK^|kH91Bts zwIg{%NH^N@{?I8P*U6{_swO2JQoO~OyksMf;x(FotWI`zgUrx}nZbe`7Bq%*-2B}| z^~JW$0i>W6?7Hk{d2{NN(7SzYA$r17eQ`qS3ml#GK`qt#{oc>PTy{g&3<=9>UVNsS zU;B`}K?E+9L04#Bq&u)J;pvx1oy@9Fw;Z(Fk!ZmjPeM35@rio8;^Jn~r~hk4Bm#z( zat8COPuz@i>ycyOA-N|SVpvHG$GIBS?DfW6-5<65@iP;$uC&89&`t+Y9;>rU(!C1i zyEpvE#-?|OWZ_`%#^_>d|BLm93ISRE=fFS++aJ~+ML#ASXvx_HO^Da27Gw?cP_Pg{ zB!G|Qp*?3oyGJOHt%sFVkXK_=5tC=Zy%$mtAwU%oBe~-UB)?VNS$`lm3y_tEg@c2K zgY(|{16e?y`+qwBx5od@>^D05d&>no_;sP%w|({@03<{*Ad)wsCJPtg)rGt~PtmaX zzVd}4eWOHN&NpN@Hx6$I57tG!4&B8~K ze#5hj7DY`oR0O^kB#@{^9k&w3XcNBt=85gSh7f74%RiZ{GF{W0E;%5u^#%&OExyV_ zP98O$FZwdo4<%{7g`7iz2wd-`rZ6Rma?0R{>=Vz)3LVq%XX19dw;cpFU{JEmLmeLq z*{Sp`@`k`kFL3IhPZW|I3ybBH*9VkvIy}30;2310S(6Hzu(6+1=ya^*v}>D7aXdFD zTIWDWYFg1(+3!h+)(P=3m8kiNj z{9e6~dhGE|ROzcrQ%Y^dLXO#<1h)69{heup+j|DcvQf}frlk#&9E>oH9_9=snvp)o zFtOtS;PLu7FfyawUo|iAzo|;PzpZ#8+H2(uyJ6JKWBuj0{F8=oXQ@gy+=^qcR2cCV z4YmGrl5)syJB{R5k|#gRe!z2Jfd8*%^^U_n#M$4?@|jP^b^CfUzNcBi31MbmYlu;@ zJy7t6iRA+EShks^>z;vg8cl5!`$<&qkPfB%<)-X}B^GD7S9j~d<)M4(@bakKgq17?iPt6q!vc{})lJi!XtZjU zJb*9Hf}GkCE^^WHtysUgGVG4B*3BBvMXyv)F6MzpQ|@jqU%TO66@8g2$UG%S;z$Fk0-AAq+7avN~Sw2ewD?GvB&;i1vxY^ z8B#ci&{x7bM)S+omvg0OiUbajVksA6eB?MAn-PQZlHmt@D>gli-^uGzE|b7$b+mLC zmoG-_k*P{QIIzEGJx7GPG|!pl<9bfEF*f7EcCCL%((J)cK1FkOfxo3~HacVI;!ASX zA6gS-DR1H}q)+_FhGHK$oS-nWWuHLY@zI z*P>DiyWe2F?UpqPW^UXAdakG~)dwYM`M*VfrOc}+efp~Q-91_p{}HWS&0RdK%^Y3K zU0uyB-CZ1Ae}Qjs7Z8bc0P(n^AMlN8a>{DA+P-Y1hi@{Q%9IudgolO&IdNYEAR!=t zUVjVT$UsDpXoJ8TO3WP8EenWe-j$6JQ8Yx)rh=(%P3zPa*OgOE2bqWO7Qz|;v;b!Tl*umB3x9G$JB%yEBA-)0 z#9PzPqcE@)e|p8eq}ZD(fsH1IK~1I3<1P!)haQy?4Z7u0*3Rgq>(Op~qDj#g`j3-g z`A#f^m{2`?01oZXkAf#nALV?-v z)bh=+=`vQRrTQQjek-@fUPWv^(cpDbTIAfYr>I4kH|Iu@khNnaHy4fl_ydR7P>0_ZOXfxmp4u&D9@ea=MU)5}0AkRR9GJUFBBW#~AUon#3BP zcrxhiSB?ZvIn1UI39^D7Ge3U3#6Xc|A0xa~Lmt7}<0vs)82XfGfap?J>{Wk%A&N~8 zqCrEtROJ3-Ej)sjIW}7Z`HCm5Pp>Rf^ixG%RlxT4RJ%#mXSE!ch=*f9cz^(e|2IAW;zt&N>lR~{^Yzk zkiplLl9dp_6dpSOa9itP@U6O1xQDc9)L(g3TE&uK$T$=R3FV8ZXPdZds<=|-G%7q} z96><&3c)G{(E+Cj7&x13N-#h zydc%^tDR|%VN6da|A9O@<;gS za`x)@185Jw&@&uFzO{#nv2*Fv*qT=&r&*Oi6B23ocq-c0la*am|r(fijnp&pA zqg}x)m`wz$T&N{DcjPse6OwLuIRx|6WL2~u8%^)tc%k{p&R{$-s(LUh~lj0JMGY8h- zq3aDLJ&Y8EDRtNR>7?z|BNh$VHdWE`)URy5SJ3+`;t&`ITAPP9NJVH>&s#e1T46S| zXL4S0?4^3J^2tFgPA zmAQi(C_3f_g64l_CR*>}&mc3A^V3Xd!lNaKwlDYn*-Y3zun010EI;WA3?h`gwVkm8 z3ptSV-a;VaiTvoDM3u>jNrZ_R$i~LO&A|%f;pAfZX+|IriGI5XWJ(^4@ejrT6q#ma zWx1m&tUuh<-;2QiR|oTVkYDh*J&!h*VQ&?uqe3aiQJF6TUZ?w`G&lT5f=nF0H#H#* z!a}ozR>ZK+M;VD;W}ZiCMA|2TM@M0e8p7IzjxUzHC;3>p@LV~}S{@Lu}Z z2VJvGf9Scbv|M{}hQE$3Z*zA6nUFsI7dfcA5+9E-A*+|)#b8*ro771e|1=NXUj%RYX z)pJm-InWthHT^5Z(Dm%ULRI| z&`--nkfWch!a1qQc>Fu$|L(i0OuXdn%J8z-2|aqs?G)P$4$k@YR|J0;QvS<3{%8ZB z|D==mkdN@xC8W(LUq%l9sDrwBD&E&$~Rf``pfad8F{z$@upM6F6Pn-z4Xa9V8>1HN7-w-{hb_oHDp zw9)ESufIGK-P>^yQ4N7LHKcZ#{flZLu=9YC5l?)tKqgs42O;gP@)K-S0 zMCd6=z7uE#OH{1VR+AEBf9hqg5yRxVX+h)FPl(Z)8Oh94&lGWp5!Sa+^X$7_8e-mJ z{7;|2!ou3c-p$3`)y>q=-rn5B)Y{nY7oPw^2?X?VAitIUC)j&>LQ_)}RX+QZU;)J+ zfW5lvZ>%035kcg>AGN!FScvZ#49E|~dT^FR>>u6VQ+gn1l97jn9mom%5p=wpa{O8R z5A_0?S9v)6`$r{CFdL$oD! zy=(4*Oxo=8YVl`!`%3dE~m@-sfyW^?OMP%OoGhXhH{Kzc)zi zEDK|!jkxV2uq@G2*`&y6mX(kQHcEIy9W|#|W0v_SkeIe}c<{o2cXM5LO6{&6co4c` z9wy}0ba_9S6n#tYr+4#(N-@VGfTLWzQH_WI$ZDRp#vfy#q~N{GJL1rX_x)mstBiuK zSQCPb21&-*3;1%n4hHkprxr&cC>E!bk3ao=xKspRBwpk5i4LNBNd>miG zv%O!m&%xZy)6vD&+QIVgweOiCBoDzz65~Vhy_@d;KWLxAKf3>e_Hnba-*c#++ILs{ z5B2hQ+E*Ra$A-;h8*684tdhBvGw>uF#UzL^EA04uVt1G;fP?g-;yZ&On`Cn+?{X8Q``$9FVu)GUDUXM+tq_BTX zt!BlLFUXzWZYgLv7n^>=^`)AXNl6`#L%~DLnPe}2hX9$!Dbg*UxN;jg7oLT@ zNWjC)o@2_^Z7#>Th*Iiz(mtoQlR8 zkLG$uPvqY*d;~ze`*0Q_`a{E~^rP>GddC7}yR&-i z_lY(vpvV@e_@C(F?>v(BNApF7HzKpMCmCVOrzMO0Udit#_Wisw+304%Np#B?9lym) zayr>q4MZsCywJ6T%tWPd)Tasjkf1psO^aT;*z!hx{sp2cPBIZiwqoRd_6vmGV_LtV zT&-Oy`R=!cPm?Dvx#z?+F;~xDcTGw!Az@Jy5_LU)L0Q-MR$ZhIg6uKloA6g_q2(5x z8@Kcu{3TOE?>;SBrG}n+12pE2)#L2GH=50wyqZVwWZg39qe@O`dTa7rt{U1K*hSmA z11+D>K+w)YKWg}1^$~Vzk|wQ%r!grD3=^eH8qVSF5xw*4nnoTN8PBUdrsycBa7Jd& zr+Z?p98Jj+7p?^ihhH^!X%wgoBcrU~nCs7Hpf{M31(gd1$=cxyxTWphUEKN<2Wu`j zj=k{mY!us+_B)+uA-5-L9ptpr(mUAA#Z|*Qff({wTYTNj|87|N@lw~hUv!~|WU8pS zU@p-I7ziCn#`=V#y3s0i(!ItRIY7d9j5unx)^#x{$syPzEF->T-=Vb~?#*p5B7SKN z8Msb4ETjC z&3b}zR`RZQGCIns9yH-k-fBu>kDjQU)`_pfinrnf4I%jVcRacVs6!cth|JVbr1Q5= zbbWV9XZDJJPQp3&48W^p`(BclS6s}iVL?apH;|KAR+-EcOK@?}qj5cp6!BZnPGg{&c3d|Y2iV-GrhmoYX;pWUPSRwlPTiGFgopg33yvXarW%qY{SAw^k zvHw)MbQEmTvbM-2W|PsPrmB8LfWK-_?)BytOlvVmvU>1)ocx+XgX-sYw${SK88Zi; ztZf?>?ct6O-YR*(d;54}XQ{`FCb7WH8li%JUO+%}q^zp*;7A zPB$Pb{^BR@x+PGCbqaZ_J)A%RO8h&ZO9CYN0lL_K0lFj-Vqy=07ZfwPBRszW?|tz< z)y+Sdwn73L;A5sie9d~oQOC<4?cIY(&~I{-N~H%Qu&Q>MGuHQL^BBW$Jp#9wnMr!B z1V_xP%HK`@MHPd|Tq`+s7uz^O1su^huRbpRH%lqz^tAWW zR=+d&dV3DM<)R0MHB^hz)lX@={5sysJ&LRm$+h z&L()Fo!V`MTXh`D51)PcGxNJ1IDW3Q@o)8#2iI9k&fq{%?GUjM<@v^8I98o6FMTxy zQVm6IPhc2p_5))sv>nULF11!)5iOgx)CBZ9g1>%pFE2>O_Qu}71tEXUgoTg**=7-t zV@mr&PSBz4G6s@bU&He(?R$lZt;KWd_B=Gzclj_pf0P;&Q2qTB6|~5GSHES$K%k@k zIPqI>k%Z-5Qb3uock`)t|L&+UH;{#e>u2%*()8c);VLhG=N_-oW#@7!e+;mXIi927j8jd%q8HA!NZwi-U?N@UpX7WTEeHLyI`<6<&Jk>l6MMjah=rQp37KO z%#AmAa1$D*=iUTz=B>(VtVk?gTvuaVx=p2~aPTl+R*)z`+j)QWugbqD-N=F4dSmSeoTT$^r7+i#gKaXD{GN6_VX~KO)$KdU=RT;h5Wni$w7GCHEfJ z6ex{DF>tLzJTBcZ&IETjIo$84+R?3>xs28GOh?c2Qz?x*Jdfd zcrWLBhH#uci`tdwaHk|OdFdpIv{Uk=yO;Bzix|7RgQoUJa6Kv`+5vK0tcaIlc_S;m zu;0ni#MZ@VT}-ly^bKG~qRQ$gzF>U(s(u)J+8!h3X<^*fur4y5;AI5iAnQ_=H|W!d znjUP2AJ(AFcD~gf)pF4AtE#d70?AMyRf7Vl8pH!t8;a)$&VWZ*4fZZ_)mZ;R)!2a#H1Ge?^xv`I()bL-21WyUgZM&#%J;^DZo_$u)Nbu!qPLac70Oj0^ z*oISClG<2zBYj{$TixdwWtby#b;m#u6a6)kGOFEoL;Uynz8z(JiC`?zw+NcY$yE)S z8^wD_9)tV4$6taA792LJt+VE>PuV_OGbNy>=Y>>gq6TnvtG;XUJB=Pp{fcuO?J)IR zG2b*vF7La+9;ul(iJ_g@3(Q`w4HHBJI;t1F6^vTI6G+_uhb#*h`(nvOKp9Vk%~i52qlA)SvWB!I%s7Ib8+z3zSZQtaA(a? zFx=juF`1NiJ?sm>Hrnamnwc)>>F@<_K2(EMyRK%0W58CEO&nBPRJMd2+Hvr86dGa- z(5AKMjpB(zBXXm@ncXV?UqMX;;=Ua47)lFV`kHN3rTlTwvW3c@)Zv~5zb*8SME1&A z$R6omJ4y8B+XO&VBp}DU*C{+@cx^ggefRVbC9X?f$~UJPHxwNgWHhX{pz9xL~WGp4*E7s^sV= z-})bSd^0YZ#gCYbj)g{TN)Yl7=hoNCZ`t|WFds1Y2V8m8l5taEtbJDd?Hwhmh3^9NSL_6yX4 zHG-ILE$Gnwoz;xGC2(2@@gXEnuBUrI9Lhc*!r=dVFl77h;Vc_a8;JgUp4N|)HV7~n z2vGneZ9>6k5x+L1lyxwCjn9WFd5w%!kJg8n#xJ`&Cf?c;y9V&_CED^lW6SGM2#)Z_ zwla~>^byx0e8;tF3A<%6_wS@)J>&t!wbSF!>0BkiV3;>fovH1(m0oQRA0UJb04NDg z3Rrj%or7H$enAhN7gK_lXl3kjxtR6!JAs!`zF1O6eLLuqRPeon*wlCN7h9j{&TAQN zc%v||#$TIKNE6HheMYT*q;UV?{j&f1eosN~_7HS<{r-N(KQy7r(Tc4)KYhy3h4%sZ z!SEpd_wSeezxRIGf&avz87dCrQp{0By7>_H^l{-+$;YM@CZ~+})3DB@Lx6SD=49&c z`#cW%n*w>=0dI43NfIUWv8J!rQSFyg7nYk1gG`Q`%-Aw}DVUuaUuMx|x}OJ>nLxJ( zO!GL>HSY%{_u7uuen3t;*>|S#`n~tV0+EgfQL^P!U_O12M6+k0HN6zt@P`j zRy_0AR+?{AIQ@Wy`X`2Enj$B7Ddc@F?MJtaNwG8vbc!7EY&xJcyiIq20$)3C?4vi` zT9Rp`=q?2>Q^Qu|WT)dtN?zI8$~;nKD;-~Hp}4An_ZZ20k9x2B=*Di2uJ;pe=4N-f z6|5i!;ui^lcnTs~o*=)*@TdQ)$JT4YVEB&pp-H)OX82i%fCNAMTTBs9!zA}pZ02V7 z*>QJGKU~`fs(;}7h)diH2Mdr3$i>3W0ZN(sN2s5b4V3K9qw{}k{qJ0wxEFj0j&yuX zd;|GMv>Yu1I37{(rJZ}nYOp}07RW5QcI7Zqnpd-TOggQNsG)I z<1VxtWC*%58cWWW^i^n+KDjKo%r$e#%|7bVh3j&p{NV#+v-_d zWZ5B*Pz+K&)dUSDv=%fyb&D}4xv>yQ4Nfm=)}%MXm98e|`W#`9XAxY|{DD|7aY8i6 z*B$PPs$*`+)f7w-;BN*zI#P(#-BP_sEB6@>5HdcF#^Vt0tC4xXhWWuWe1K0Mcq|2Z z(3K4Na7Md>2^&sj@A+`;rb&Nw&mYeJ|K%MxAdvtqC_SYo{YW2hoPlsW6RxSmfRtYHVWRN!}9NFsa z?OqG#&u7JC!3US@k$imu*6ekLJ3+z14hfduh?)F}dS*fqr4PsSHVFm!jjcP@BI(rx zRi{*4{(zQ?vv1>~e4G?tce#C5^@r`y(`pp%nkBOt%7Ogptz^BVtPa?@>$R!TF&zoS z_PUQX7<<)dx5$_^CnwXNo40fd_BF_g_|4TmV-_|Cr}saPxAJxl2wg;2+(g5-g6*?T z-%b}v7iXpNUJ8MC7T8+R$sL;R=>I%tSBE25fIErcQ^_SFTG41kcz6Sc zR@$XO^N@cra#i4K(Q(}J6BLx=vS2m#|5b?CJ5A1eyA*}Kq6nhg+P?)nJ<+l zH{>4RA?5((SeSqeKlGOJ7rnh#UQiA!C^$u;CZ|er*WcgiF)Is@9hCCK!^+8epQ{Zj zg5nZ)MOK~vaBu$v_v3@LXt>}lzh=%+;NmW>K*10v?5vvwHk`IQD}4z=ydAIcXv(sS zv3s6v<&Zbo!tgRqq+frwvgf(!^S-tgx5YYHK&v z?78^to3d{`Z+{M_;j=S-Pr((X(!y^;+K5yUKt2apx{n1qT_D^~T1Nbq^QnAThDkDz z+(N$_fbr;>`*<)-;}9; zySKmd$!qjTsVf#!+9@p4xV#}J*SYXoHfgjk8Hs-L+=vWp& zEw!50VpX8-^eeG-J1K4BMpSejy6M`AfA)!QNQBk4n4<+tIi|B8#^jB%u{@}@wU{K` z>X|foCW)#y=PqNJE_!j}UX)XM>j7^myxegX-uWU~JKZGNW=A3<(Xwh(mVdmO4}jDb zNxUfBUS>x+BjfAaQx$Gs+Zw~1r6(BKv*RD3wK%Og@Pd=O$~hPAb#y4~OX&k)Q=BT@ z*E-9ehOyrk!4FffMV+G(@Myw#(`oK@KOR!dy4(b0y+WYGr&kn zaIWzC$r(9K-?BQkS_6+o^H&!0;XUJt_#lCEdeVxz z;QTLq^4}4_O(tpZw%XfD!u^wP^-SLv9=0jiUl8Cy_VaHuQ{-Z*6efE1*Mc7h)IoD= z8ZR4=XL*+>k>X?%di+Co>H5vjr?D2`q8D&Fy%L*_wnbIG7v%b+0Kz*#>hC4qcazCK|K3(9`_34=mm+%teWa9!wgQG zwc>LrCt)@%&qs*aTPiF>a@~brI`%#dmM+*r0NAOj)krxKz-A2b51xHfzht!Xd^&91 zH;ioCDDNRY_7O9gYP+K2q-oIG?W0|PM~%U$+?p<9!1TL1-h}j>0m&*QfgqzK=Nh&e zO^G#8DR&#>3RuLl=DD*b6fJ>B2$pq$K&2jL14RAmgccHZnB(?Gi@W0$liG~dXDpD% zhZn^c=q%@8p2z~CZ@mI+c3QZBdS{u2BpO#ztWVL zQ^~qLnKR}XOMc5&M{B+Yv$0o;yZP-SHzDiGD1LN$hrYdHPiS_}AVrszfS`*8H}*LX z#b`R!N=lw-{@Yc-eB@Qz^xNreX1C|_5!LUC<}l=MS#l&?DK6t^`yM4gW^>nuSL}0L zb&>iBy`#Vvc;(P1Ux9@bPxzczvMr@qEa_W&JkuA$?t6S@2chUEl`q#OT@;ZK`?*^l6g4(D1CaHOp&A zL|0y+tj+7@Lqs#5pskpUvpRE6LLxdB3n=@dz|5OM>20*eI)0!HY^$D9uK2*;RLUi* z*K_cg6Pcp8^;3}Nb)nL6<+snwLyX$t-tY?X)+*p{ITN?9E-{`XauIh&bNP)2Fs`;Y zEC{mSSRM;n3=SU)4;YxRqc}kelHllkIdj3Mw2N`Wh{5jJ_(GpJZUsu$-hN)5FhWbsI0(m`(88(`unil!)vG8^?waDn}8!m-$N9Hl_$C zFDcw;gV2Ja$0w{vq4LQnE{dTFQ(ub<3D6=`7VEI^P5~ee5?(6Um~j zJKPPPU#-&Pknmls1D47$?6~PVgXS&LsKgOEFX2R+SEPs~KT)h%*;9m$^+~XoJa`Gg zW+J0}A&3r_D4(09FL;{%~tlTAkuyXg$%E|=FYGpQcas}%B;|6e`5|IKx3ABHND`@8k zN6`KfKlZrzu@{CY=!^rX?ryIO570LWXom_e&|gu|Zx_&B7UuUmVBB2++MWZzeZO}F z*Po2cU*=o8h0uW0dlFlOn(aioF-a0M6`r3X5I(QvEm)TbgQ;5(BoQ!cZ=AOPbnfv$7gl`t`k!{8HtKAUYW<`ff!*%&pyj$1L!5N3o@ z=NJn^M3~?G;uN*@;7(Qaze4rW3bph2Ph9R;M=H+iq?~3Bkhn=Ec)kR>(Bdr|#n3N@r{LMLd$-1nCx z&(!aY44R3Jsj;P zQF~xX#1vSlfE0I@1Rjx4R6<5pMnQ^1OhQFXMp8x$v>cd3L|sibJS>A5+~tEUYX%KsFXmmOEp@&JHTF{wxCjJH7s$Jvp#|ZJzAFH0}+8 z6v?yZ@+ACF@$~YOr*ss$i`iiPvnY-`t(Wg%h-#RTR$Q4cDO;0U+ z9;+7!d6~&rKT24TLmGz5WCikGX0#oqc08hEBB+66o66-zvzhyhb1KD4CK5t+)gDTt zHt{+S2!D=^)l^kNcG&A+ya7d;Z12(VW&tjGbZKihioFH!=>eGfqTD$VJFi|*4kd}0e zSW`kjFZGswfzE&gU2pe9<0{9JHQ+=uuSZkVdP9%Gcy9@aqadEB?&$q7W&*c%?wM2= znu3hfG)*ixLaZ#q#iOr^>ny%@-mUpUDLew;SUEWFEK78S7@pHx@&xEL_{NT!&89~> zl&wG0tsb|Lk{6PVi45k9CnAJqEUqfbpOcMA@gjNYGA!R2fKg^!Es4wT@Bnchlf*7;Ts5eG!%w|c{ zmRcV~q9no;L0q6yAJtUpJzwdx&LNa{1~)Jyl`xXlgNu+s{Qx;rWMT`xFV>}y#x3L4 z&FZ9P|3T_1qM9>(B(-^#WK6Xir>I7w!Q)k&rNwS@;!W9Ji^F%L(`)U|bofH#vau9E z>aNiDTjCVSy#g(YquyU4uzO8DOwJJ@d*6x$v#Y!}7UDN-n)IkveV_2|CQR-T6aCTn zm&NSc*{4q5`Lg75O~J3Z6XJxRoHA|aO#;MTRcj;3zE(@^XbQ;a_sQEspd{iYnI^a* zPP7DvA8{2&pH>dSQ-{!40QkB=-*UIR5Dpg#S+VF3!*w#f)-_#NpCKCBHYPfpTirWN z@-Si~igj`Rj6lcQ8LcoXIZk*{gbUww8TZAWJn=08cWJT)l4JM*3*hAk?9_f-PL3OO z)yxHcHp6&>CDx63wkBxVqKP2aFP=l6OPm+=atINd;O7mOa-1ioxO6hT=#NKywmfzY zjh*t$lZQjuaf-jY2#!|^JkgsV&SHBy8K{I9gZ zloe|AwrkJ3gh7g#QBYdT|ct z5&WrC-8bx3>aYvDc*^)pHRtSJq_9EO z-p$$`v?++`6BE#`2X~90?yUbW&f}kFeIP-*K{h-z_jijtbRL*{8HwMvV1P%56aB3h z7IYxmooPovhZno+@P10@!CnggxRB)c>U+a~=Rtx}**HLUo|_$%;|7u{);s@^^=>{0 zRQ#{@{dcoPIgm|c#fbu%>r^huHBUxpmloIK{3|P#btC9$lg;L{^mi)YpzNnuACSgMB?F;f$-12>D7wg-V}j zHcyHvL&B2d35qQ1g%C&2E>zH&KjM!%IqgTbJ?eq(O$NK#R52uU! zfTxQ5QFjzWgTQJxxvCH`MIxylOcHJLXWs2^4#B*(32vrr%~m)p`(EK5tyk$0`gFks z@=-I?csxH`DG8w114n8#O&b^}rPWt*39H5#{FJu_Qhxt094Ux@<)8evCgcU8e#DBS zvXv-Q=4_K9HDwS)^O@N-<2Z0R7ZrPJik7zaiIB%BE;@NVD*T03?ufBdGo-Q2qcH4I z_~wrHz-MC{h?L>M!iw8{IlkPVxzH4MX02Ev@etc~K8_ z?bl+CmV?p;UVW~@#REB7#Nv(9nn`#3DCsOmB5;}C;3O@*rYrp!Q&(=f0xZU3`)enA zTRhWdvo+$nFZ+iXOilQ8he|J9qdzV!V}&QPf)_{N%x<8f?fP;QN0kc#W4*t!2^5&4 zoLohun+!;aGl1zg5!SE{Neyu`eZ2{oVYMNu+2tR-`W8Tl`-wty)0C&^URBXe+@ClZ zySkd%f&Q@mpy7X zBc9*INRN+CtXFnf!KQP9iC46d8o#+eSJ~PmFvgT_B82IAT~;v@pSJnQC^|Th#x+#~ z`u4HeJ|Z2LOwH;5;Lsc^O1C>jHtpG1i(Sy99q z*1tnLpcOIB5$Pr89Q|;>s)VZGcN`qE9W)&A{&A}wm;#Kz3`STieD0>}cLe2ibQqjV z`~rw@g3QY^c8RFXRGexZ+j`f&D+9HqsYf7 z6lV56WjfRbv#CR>hY9d~#f{Is2CtbUuuHn0bApI9`)Zp#B9)E+fQcP$^?b-F0|&Mr z&1$sUR;9mPGIFNoXhPGKXd{*fvUPZld#+k_+nONTw>@$N->LL4`{MfU@C9m4(B(+C!mE*-=eMDeBw&SP!T#_ z>N_-!8N9Z%9akx9wJH`C%hcph_1afGHx`94`#kQLBFBwnT4GYp`6}BL9_fU%+3l_T zrVE73bf+PqiD~Ec?3-=2-4pw22cXql*BDiWyTQ|H7?Q*+57v5lJH>x18sF{jxnL3< zcp{m4)OaTMX|6t}l;>Xo5lC_FGvrhaNlzLpcvW~9qATnG-Fsh1_Mi{r(>HS6{JgQQ z>P~9EW8w=H=eN1&qgFcazE@l>ErGCSa%L)TUoOpQMno&9zLl+dii%2Hpea(-R(8yw zJtl?v@`zNK7T9AHTrOEmxWlVk5j!WoECQSTVViL5TCsLa>MI69&stB-Q%_$JVuRND}>?$L>!Hxmew!6lQ~cNyc3XYtqv-WB0!0JWK+JkOXOV!E*pkT?{QP27D~aO zC{$ZjpzylzO~QBD&rkIj8+t8j>k4%rDZi+J^EL5ux+$_TswG5zf_UAtN#XDEDM9Ga zvsjD_zH_SQ`ZqU zdA$-0#O*It%RG@MlRY{j7zlG3N4Hta+TNC&4SLIOjle8PpOHmWiKwbFI?f^c zO1>4V<83{Q(kiT3Vymq*nUl2Wa1##pgqj?4E;{WgoV?Dr$I?I@oHcm+waA5`rnUKJ z4y1t}ta#+B6SXW%`edUFK3!5nRzAUWOX_PWCHa4tdkeTK*QI@!MmnWIx?|DZjdV(P zr*uk#bV+xE0+P~=v~)>#3P_jAw?I9cz1{ol^S=LczVpIwA@}2Y*7LB|%r$e*Tr;ys zu7|g$s!))-yPnHmc&k5uq#F3lM>1NcePNFJddLw>>2k+E!(GDK%oGZ#sq?y8F`<@f#;PotRIIU$hXllUOhc0#( zN*Sz}&DKf9ug~f1__n&cLf1Z1!ks!NWrqc;RC1wxspX?!k0f3zlA}J_h|= zPu512n-jiP%ih0AZ$S|!*F;Ntqm2<-&W@*+E_(YifvvT%AKJq<*l>D;$zn>|3jV0d zhI7@Dk)9KT0)3IA?Gv_15bAciJqDVQVoxzU-d8`segGE!X_?lo9U919#Tm2v(_wgx|2D=8?$Rkvj30oNXMBZNf&ZTfsfNJ-+(HoPKHl2jD&aT5wPs=baH}5LR zVcyk{%q+mu!1}aTq;64Omc^oGNHilyvv>pMb^VeC*1aQ!1`B#f&t6AmH$mo`~+5P_5k7%urwO!Ie(a|Q@@M1r2K(WskY(}SYL}^*# ziUkP^>GFX>D=BLmdtHP&WTz-=JfRXsr|1Yos(I;w!~LojU$3wxZHvlWO(QkVT^N81 zK5ft|Q1JST(Yn-hj1p)O;Y*t|U6J|$Jzthjw&Py261scU(M@#4cyJ|nlR0LDJ`hu1 zDxw$~r5F*Ug7EfM*{I0RW@oyNo%DxalsOwpxeFM_1z!^Qga>T|O+_JoQKHq`#?Z&f z;S=`wz^SKfadsR+4r=Bvk;A;*2N6?=!h*uLJ0gtz1UxPp{#Jok?NrcaWgx3%ug~y< z_2Bv?+iSD*{bub%I}wC;h^+G~@Y;=83a!H;zC2=S9~~y~i@rIE#K%m+cy}`v;p8I@_Wn z>39l7W^Y8+M#3!CF1Z`$Wu}de60EYyKT1 z=j3*Qz)S^d(^;dRcXT>ruy#CGdEtBWMofOW-BZ$a^Nrgxp4nSZyv&(IFjqcHL5Ll} z<`!^T(Q^i)i8tE0;=D$wJ7y`}gSh++EtO#`VDw2U*k8hJU+d0F56OTN<<5+;#Hl6> zNW+6*@aW=v=>`kY}(#fF_{{>0k0M`?n5p^gf#5-u`maG9Xp6VM4(v8jCVL) zA)B?rSQO-7*$w+Lx($J@Pbc`Iq{l^eKtcINCl(7ALc^@Puj{%NEi0)Og{F2&ZO}6V zb98|0TaYX%y(+w`Oa>@w0Zk#Ov5ltzen7y|ZkuIIK6Si*rxFUh13p}(SoEk6*N}is zeCciXt5Tc9fJiUfj8Gp0No$8yk641vllGH6dPv)kxWnwu5WUqJ>zIWD3(ikQu${MQ zA*-g+SY{ID^@C#|*F_#Nx6jr;GM*@_WJB0%;Anu~NX^)bFj+_*o(d5>hlmZOqO!K+ z!rOB40(*{l(zew+fW45eSJ`2r_pSospl>s%KE*_!XbWZER}?(#+*EzL9SWs+Vb}*u z&RD=zOI*G;b@Pd@$GS+7W?;(dqQ+#;6_<#~({(0g&vmP`Dnwq)oJtndsTY++l0bq5 zr9ev##*?LW_9rL~H_@=h!Z`?@mr$T8%wFXPb*E=#`9f-*Y$)L#I$hxD;cn^w1d{(4 zgZ?dsU6XtXY~OjdMmPmqIwY%_M{gsv{|5!S_l?P+bnLc_nS1?gKBi%E;kuhtf}Xo_ zo9i&_-pXE4b|z8lOIMSkhI(0}pkJib^lvt0P((^&_ZBz1w@tGlS_j(O6m{oVpI9e}w(JIMU z?r|!_WZZ-c{W|V0ns=^N)g-o`zm8YxI6X;@FDf~oU3t&waWg7bHP&QWZJ^u$b75E> zmy>d}qevg7hx+ErnV#w)vQ}6Zj?lcnrV-*mP1BTIyC;uL1e*1Y#~xs0Ugqul$#?nE zn$P>T8C$kFpd_+!R(Ho1Q8}OC-1;E;Ic?VVL0cgn-f|ozJ@2aZMtnR%X5LJkPO}er zE+$^G-}ZTed-c;nf@UrPC5VYr`13KZg{?oDU<^~4I-Ni26m3UeoK8txvFVGT_T^^KkH5c${GL<|s*BY=49^c{~O zu%rg3{vb&J)dx@v%oqXy^xrdv6vAfaHu^xCiH*L^T_335dbHj(0=#SAY6fJ;IJz-D z23B?e1B~GC@WNt1P!?4sRFsobz7JC{0XTr)%s^84T~Hd>!U;%6`LX;NcBlb8TJaqPf0Y9kMXbLo?`kDJx5lYRxq-|=uk12iF|CG*$R)_v7Bo<1z$2u zT=v#Qnfj@8sFI?4=K=j<)pN4;9c|u&Y=+zmYMwq4e2X{u*@Z_ZpRy)Jh93{xGvFI0 zZYN)TjmuN^kye~gd_ym}6#b!2w}pQ(yI+QIf^0j0N~yNu<&)d%+2~BzVmd+oiX$wl z0}ORq7D=2UsOh4YW8n7gOsl(QGB&gc#vc9Z*T<_12LRfeL9vo9!#!JXHX0TO)K}h1 zgX9@U_S*8s>QUxZ!8%N~ominY@loaO?28(r+&ye7ho+;P!4Yvhn7824&hIqv6T86F9h}F$gE91)&g?C$uQ8WhdupkSwQ@f- z-P1taDxXa|Q3OjJ*3aJDb!qDmb|I)_akH?=#CjHnda}+?NwUrUrTEW6$pXiEj0xx> zyO-W|uXu+-5Iv@H{LGgYoeocb6w0UZ8XktAXObs(Ke3a5<(lK_5#m~#HjV$Nszu+s zB4s6dS0+rD*}YRs?5}%gILl-#@`%LsPY6g_ z`2sgY*3WMCVKAk)-73~Hm48J!<)2w9`yH^jR)i**&5mYgIIV6s6fKucRc+C z#UY3Qeh~OT6o>qd;>fbTbfJF6%Wz-^e5_z%8@vw@{Vplw>-zxG#f2Dg0oZo{{RjE<5!fzU1_M~r=>Nh!{#}x3L?A58ek}&~ zLZKa386s)CxV3#VRGT~art#$v!WsiVRKn*RD*5EHIqqz=az};dANGY}WCXtz_s&=Z zxrj8Xn_i44!O#|xSB0J@%6DSjrB$)0K8^u)`^B~3r}$4GjO;VGQ@ShKc_ zCFa|N0Xddf3jbdF)lszCUWq$G*qlAU!enw;EZ1({?BgwjM2O2`&CZRfwct(@XEW1B z1F)ltB3>Kzv{i=H@f`B7?m89Wmn$TE`D3J<7UFL}CbFxF$-W`*7veXJE40Jq&6aQ+ zs>qW<8jHoT$k9cVc25vtk45%F>OY5e5Z?&JMs0?W8In!Qmndl@zxa-nzL5amum@=- zIACLrZt2JDc>=|NVxkstHVxI=Ujhifv}KS4iWG3Z(p>{VzAT^Ygw7);}7;-^tZKe2x2=N)J%=XS#|nDI@h9cW0Wj*0l`Z9!qjOcwN|UkH7Er zSy9cQiYJkx@zo^4iq$D!c$`BFJy@44^mE&`C=UHcMFhUEZ487Af?+Z95~58<-HQ#* zmdw2%bc|xs`&;S5FJIj zs*1$J-HsQ>`jJDiKxJwWyqYc=VUr>^F+$6y?T@rrSu?a0*A2u-^VuENyxPh*|E z_yZzTYPUB^CXddrRSPt3qVe9w?QP&qm?mmNAhy8y7hw9=15mTxGe3r`N4V*MbY7d0 ziul5UncGc7*#c}sL(t>e@=TwjgnJd#_#RcBe198(RZ0IMuz&$wL$DCw1L+5_JQ08U z+5p5(URfG6Bh@gO`gha?-@yMEs@%<9x$_{=h<~8UU9HpaB;Yr9^B!65e9AwxUE%l# zviu*p&%Y>)0vGpSaO(4W9C+ij9)mIQ#vu8OPZ17kND#z3aRru?2OkvTfOjkcCJ}zw zY5n@fC6xLMT<TfUcZ1}Ah7+};j^EKg^lUF-=L#`}n4=cx^ zcK$$*aC%;dErH#Xp1vz6zVxa~!X+-8jL`SVa!aG>(kGaMe!>dEY+hzaq!~>^}c)KNYjB z96JW9T2X>Py6}Ej#MCjFhCSDd#17LT7B=nr%0HEyldqU z`Ukfti9M%5e6ZJiT32zKEbbrCEw|FD0<-+wo!>r>p8oU|;X2Lgda2y+6#d0jOIHDd zoOiN!%@1)THR2r$~$cP`d0E;%jcro)4I|f_M3*fQ#h`xZDApTkePr1 zw4;xWDO-uAze26j)O4Pa4 z4~wFDvaEVQe$(<)I_NoIr(g*qXnE#VVBuy&=%sfqGZ(!Ufgp;n;SknyOPWswp|y-! zTo&TXoo?z=gg9@HEs|c_H>pXDJxy;!{!%V2xUrAVt3#QdHrQIFFk2|T5uo&2i0ilA zP~+PdV7%7_M?3+Mr3V~IpFT1%P5eFTJTUA(i?LvjCdC43%M==|DrE%GLE@y-1~%H1 zhqK5c!LGiR=OCOBCh?%rm8j;FPrX2i-Jx&Dpii-{XvP+?(r3*{sm4Gx*9c#k=F7v` zW&l4e)5k}~rOpd;fBy}#V5M!U_gh9;6iowf^5u*J%rh~Yg0$0Vit+eac7J=kafjs` z@nmog?MX>D5GuT$PpO1>(4^*Su9ci$xB{|j(mW$t>EjG2YB^^yvC5ixV9ag zg&4dz&BhkdSk5XqSm(qh>&huVRbX4Gk|JHIzRiUw;x_nru_^ozbE#GmZuHm&0EdGp z>%5QhYE4YqO&uhYyuJw%%2t@-iu@#(w3%4Pg3OCIzF$iKV* zKD>U|04Or%3UP2|3azV%l={}e%ilRNybt^sU|aGZLy>`;xjUr3zs%1q5IArP^z+#F ztgq-j7yhoi`oYcy$d3DM3HX0}`M+=*7Hu!R@s{?l#Djw>^4dZ#{Stk4qk5%usJ&jA z6@nU|$B?>fW#nRdg$5C^V9DbmFOIN3CGWx3^Vwl(*288Kn4$`X;fZlSZ$cwkP?v?! z8SVwc!%}KzoS7xu5s6rLzIPk`7?S?Qi~mi-PbjeljGPXrsQ32ENS<*7?)4HwKYW+J z_t9Vksfg4d?5xB#kXbC3Te2Cm3q8twVG+LBu;_2zZ(dalS(6Zp8Qd|pJK`}kBdFRH*8j`rsQ8~16X47L zomC!Tn|QLj@MeAV-R2E(+X5Pbg$FSjULuc~p$StOcuho}um7wo0A+Z-lBOlLHFCWR ztp(UIau&=C!?C4u0b<>fdV&3k9_`%OMYd;rExcV2{Snup;>F;2>Qz_^;u2$Rx|vpN z!P&+MEKAL;N6vb1cK2IMppzK0UyLXFoOdkDD&*8PXwyP6Yp7+|n{S{mH z-s4)baIP<82vx)mM2@{u3Hq^T3~*Tar=_b0g3X|A*9qYfm|%eFtGBK=;ni%&$k32> zBd3hfp$hMV$lWSYUh2I646FP>vY-_#ZA_$af6et!Ovn29sGA+0n6AQ3AN#!S3v&;_ zB^J?T?ts(mP*}DM_CW*1l@J8VD|eC#1YX{huj#&rw9#!IBC?H=%ZO5{u}uRt3vQSp zF^l>kj_0b@@N-;ms0R<_SWfntCQZ`W+8$u3v2NvqR~ zd7^H4MR)oNHnHZ@duMQETw}!s=~z_-)+~V;s<|>nXKp%xKx*iSkZN`9OVGSvZl#0| zxfoF=Ca*Codi0jtg(2Y&QZ@B#p|pZEDXs)iGSZmaYd2WcAiXJuFbTu)z8u}mGEzzI zpTPwb%C(=%c2K5WA1uFxzF|gjCz69BLVhQ}^@f-WA}uU6Ajm#ttT4Z;+9{@(hU7P^ z{6A3Y<=6aV5t$-d?OfaRWiHYIe5UZH58daVLCku!w{@tqYW`7XaLoANN-C%EcIz~} z<(zxhAqHPBrm!Fwh*%bm%sx*hXe@U4UEy*eX3%OCyV3v;L=)2OUsRels3~BD=n%h6{u;2PHMFDS zLn(OdwM7s;Bj?QL$Aj=CAN<+_=c6cr-fUOo)fbvRkNEf0x35E%{1}n!Z{aDXVF^@0 zp-FKY0<&=-VSF0m4g0u0k!5nnZ>IC<{e#7g6f1PU7bgS?wrGG#RIMb7TdCo<8WqHv|g@b&}a zIpp2MrrM+B8H=@2Z1B&RRl^FC$Buhxnd4#sJ+k4(%*aNVUr8|&Mk6}7ENJ%7!bFaV zPNZ;ZU391SU*_3wa6XAoZ!vARL*Z>ay_Bq7BTwYY9Mko@X-oFxq+0gCZ$&7K8lz&d zA$>fs7_HNa(`B;TvDv_>8=71!s199D`}Q7kAKh7Hb5k4rUjmlkB|w}l0zy>ucdUg0 z`8K}>iqt1@`%swfB9$x;OtF~aKTI(^jEI@JwVN%F3BdScLNPe}qdQZ4cfI=v06T!~ zZVWLaGl2Cjw)k-QzkJodiw5?Z9raC3Rk1jc`w@JqZrRmZA>T(4*I&u;#BdcLTGz|a z=rvsFsz`{v#j-XhS)nnwSXgCah=Hz`7)Jc$_KtRo<*D5xvRs~ET~WND zLDk2jIs^m>AAGEaxEbT#9cPUc$D?}Xrwm&52B?NI7jF?iR>Jr^i1|rPcP9rn31)Fk zH_dilVl5Evu|`2dW{JcaOy$KX)1nSb3!baCkme8~ag9e3~5ioF_d0t-Jsw+ zY8NxeB(6K^h%leO=6VLT^dlPB1n{l@H8Jv=V}P^&O^`FXnpC|7^jL9H^jw2;9tB`@ z7yToF&<1Gwp#RwuvN`gAKGgq482lax*B_A%1qwzlNCGtIQV10EZvHyR@1|k@j2#Ao z6U0707kayrtDmuV(uQ=LKQSA>In`pu#{0tNiFD}UC=!viPQIey5bEV2^{nk4`!_VO zo&jz?V#`^5dhZE)-UYx4fwTa2IMQ_5s6W6XNqyd{yB?lOI-5CX&y>qJU_4=U-&xcy zs)lCqieyUCh6lZ-JCl__exyCh!cGLtV4w`&OtA2^+P2bb=rO4CNpvW<7;qI99!_p#n=#if2bekC8mhg;Ww^3}masA`>j0ECO zWxn&U|6~p*lrFH7fhI5yA^g*Q>fgZ)IZ^>f$lVmQ?piBYd8pcV?$g7{l)q5z9}^JZ z;L(5)5GFzv4n`I>=DPvoz|oy-|6uySBmY$V-w`i?iDaM)&cV#Ybl=B&(6VP@I5A1hr-)2PBhrL)HrB$OqZ(9izmI9e#mh z$12Y9o@DNQ0a|b+3qrCqTYfpDAp_BsBL^f6Cen=tc~?prMjoC?*SQiINbzNbSf>`B z=)pzbes;X1{@|`X+9E>EM0Ip@W;OT%j0i5%Hjlq0U1@dLtC-gF8BXE~FFQMy3FVl; zdxg;OPP!qbm!!{(02uFIFHgZ12rRjtpFwz6b!;$E}rq z`8+3Ltv)ZQURIKl%mxtjaAqbB&h3Z|vbnN5C<_jb$L(@&W;~e~+ep4`k@)0v=8Az| zVAt-=gPR?DGu+EF^*#P&^pIethzDHJB&g(=0qffj-*v3Y`_W!fq=r{Bw(yia9v zxYJGX5lk{PDV-6SWdV_Ss>On%jAf#`VDlTyt7uG#D7GuQ$@g;yuLDH|uRm~!R+w$F zNvB4ueIlt3e$>$gbCeiFO)0bL*f!f0KDV@*jj29Fs_w`*>-`mA{c(Q9V&#kOcbN18 z#Q|yYwfYGu{!1mZmvoj_DBLG7dT^3Cc)x+$}54(GJ z&d>9|!^C|$hA|6xN)XM16O4Wu@9+H@;fgHEQuzP<~riQb8Nej>ZMU*EJD?VWwO`AWgIzM}D$v zq?XXAJ-gKvE+=gyhOZU8roJdNnp*UtAY>s5uMgn2&z<(6Z3lbVVg}5K{mlgnC1uPp z1gsqEnjSgm^$1G%6^g~dTi#Cj@hDwpH=dv(2hr$o!gux#m?SOG#v87&2o0cZd*OH{ zttCM&psx_pHg`B9o)jpAC&P2PtW>971l_DX=_~(03qFj|3}h64^bKOg~b7cBS`r7Auc|Qgq%u>t&Gk3HR156|2t| zBjHz@Yk0OTrHIsq$uxa00?(gsLxIPCTa1#x)0l|era9PRoNIuv2u|91uY2fKNPGc0 zBXbopf|vrSo|lpI(Uzv)uEnTBCHHjaZD%ai{7VedWS$7}q<5ONgG06K&|k?vCIyn- zs*`}H?5C#}t?O_MO)DbUj`3SpKw3%;g~o_EoSrj$E^=@|G%m@GFi|vr@ze~yhk%{J zKR>(&Y#sfBBxt!q)z|K5F55AyeeQ!#F)ca5+F>A4CS)RZivmcOo{ukbhIpoR(87H& zu`oxQk6e(sCX6}TDN596$&_z%X5~WlId#f-rNW!8}1Fs?BcgK374@N}R+QWw5N!#a@X7^2oV*0$8hCEfkP^`(`WS zCMJIYEaOd=WAfmC+ zkD+XTBA4L6@wecOK-tXwE|=gCB5e=-p}Vcli{DEl@%LfouxQvSHs)L z`?YrCm22P7@wpE@_{J-B; z6ip>I_WpPP`=#Zaov{^1C+ueG43Edk5V+IAoTVz1?^kgePuteZI3$?|odYvDMaS|o zj#0xEE_b@Um=tdg`V}x9!$@-#!6D>Xu-b4~4s`E|i$!EaiCdSHEj?tu!5N{NR+c?)uH4Mrr=!*uM+ zT}9UB@!rCGC6TyprtYd&fv7>wji6YB^D`VdScGSH6VxQGEKd>CDzICg7;zaO83$Rm zQe{{%M?m=ax|PUR{v%X=(QQ2Y$m?&bRcFa`q5+{BLNL>gUp?hUjDige zEp%ua&bG4Kvc8D?n&8A)s4XVXP^1RHyQ-9UwqMF}~dZXyk*zDU^&qq!A$PNbD&*NF_Tgf(1zo z)OejfPt~`|3cY71BQ@1trCOIQ$dNjF!{{Bgth-Xdj}(a^sW%N3fpzto9Qh6P_{gYf z1g=<%IAD_Ae)PTJ?3SUM$cv|jq#;4{Ec{f`iec1+ZL2YqA@yyVSNI>dC`xZrz!KZL z4HH$H(1Jzmlr%Q=AeUZU?!@z9_=U8 zC^Yq1f4M!E*Cbc_6zkw+Uj(KoRWg$k7~=sId9NkdW{rWUH~V7^60?vAzC~Gz^3MYB zO){7RGC5TQBTyO(=W)YoPRVE2K{%$aRjmo%Smv9z6je8>Hk>@B1!ExRwawS!5rpf% z_$P42dsz8s$f4PHPkT|hi!>&)Vh3~joexWp?MSt4V8F%IZKmW*DU>miSONp5R51*XH9brJO@p(YkY3;HjSoYHv|fNK zFOkvIjo=e3q^&-u=grMpi!8x>g5`+k^;7&XXbI>Hiz)aT^{PXxT;;lUGCFHiMhIokgqx7#xzLh3vxZR?nrB^cpOGvCB0Kg)gR91Dy=@SmKuts;UdxeuWwllN>S+UA z-Yj#Nbb-jN22VG>(M%2FdI67nks93GzCO;t(U60SVP3GUv;xP}x^7SAJ74PcKnb^J zI^36YV1B0UoO7LyPkGr0uBhT(nrRk^U=w{V-1bGF-Hv0cX0Plo$0c`9A$yXN;*;@| zn*Sy@<(mW3^Nx&e`;|~LilcR;>MrSg{kY3SWMC~RS#f>u^SVQ`LAn=b%P)}pifrFC zSosUPd@_X0e%cvZ zDd>-Vtg`}6$6bZkwi!amNlu&bVR}vb?@^~ihbEJ>R1?78AGkoV-VU!H@T2J;%+1mT ze*RFFUWo-G+8LW|kNHLXT^1beQP-ld*&_>G?$6GKH-k{L1>LKNHT5l|QTJ8=?RQq- zFT!DvT|f)ab{FOTVF3tQ)#dB@eAuO-F7{O9YJOL)b7ukEe{TT(oqLg=1GLdF{(%3A zcXe^U?MQ%)+kkm%#`}H|z#YjymjBgz`#ZcJrHgE=W!tr8kI9scD}-F90w){7^Skg& z&J=|Du%Fw|HU~r7?zu$u;;Au1T;T+$B{(Hk?o2vlJN1m{QOx2J_lOTz_%H|3ZlRVd zN?v&qQ>O}-caA`-h2bFHPg!CUo+6nwgph|(F64Iu3{DVUN{RL9x?&vh( zNf~S~&L$>baQJs6l<`^s%|7z2o;5=t=kWR;w@AU4*Fb#{n`Z)9UN%><6?teq+7R&x zx4mSTBJitF2^1*{&Gumbmic^edI!t2+vvDU z-D~w{-_psiIfD4oLxYXfHZZwXuOjN#m|feWXX+Me{T0@`21zENJU11_Kd>;ior^WX zm44wxhNR|}iXl4)p9l!{p>Bc+f6axayUpSz-;RuZHBLz|F{%Kdsw#^%oq7UmSnuJlR>;TCOahxet75tvYwaNFMOWK|O(C?1;w*5xY8^^!UkWGQ zGJg05w&8SLPXTjva>m{7m03(Y@Urjqs5md1OOd*fCB^U|Mf)0QP0&Tz3nrOzH?vXB z?dWHn{!K`2~9Yv z_$0*$%p=KUPD@4uX(S*%iw9j8s=t4(PLOTZLc}!q?b|g`l*i_eDqAo(6G?4RMMq7w zVT$@5&t8ue=%VRAX$>r?E-i(8^~j&V33L28cbq(lde%NqjB>g&$otMZj_-q?34p9= zYX?JHJ7YU111odG`-WUV4)q=K(*b@Zl7IoLF~ES;7@$A)`sl)TelEi@+AK%?WlRk0 z7pLA%SsA~JLp|*O^MG#z4;feooj8OjmcD|2rxgY*;hv&dMx{ELY zft-bjgOQz?mE|7KfyuKUOW=HmfA{tNB6jqYZKq64r^s%4B+AjirBlcK^~SrLBiFBB zFVq%d+|sP-6<;bhF+jA`eK962`7;8t?Q2=5&1VUDth%_yyZR}1BsB=Rsj-T-=2_tpQX>aphy&u0BM~U~e#AeQ zt6w*jV1z)q!h0ZBlwXte1jP$Lx%$yPo*Z78J@VJ~dieMJn?L9K`uU%7#quL^`9rRN zOXh#KT>WMLKv#h8wjsgB-g5<{3ux$m&SX#7Nu)sl04~ZTj&Hd6eNgjNMQt@-HFWPu z0^`Ykp4?@wYy{QgXLXad-Un91HRW$5L}8nYBww`#2$#H~c^xTkE_|l;>Xq--#t}yK5$82 zCk#hmGqyLA@1v;_-g6=^Jd9V|8V2C zLu-oVBUV1mL(KO)xSTKmuaC0`MX$5Fr1ul!AVGBOu@tNwp~_A7DSzP-XDD>T;?M1n zt3kxJCw`5E`LV&IBQ7uMi*{b=7kP{Lk|t8-(dL)lL1$-`4%AVeZyz1wB=Hyf8uPb@ zhrCY!q`(fJPV})vj^y0{bq$o<{+fnGYf~0H*L)yWz z{?wcXHBl&estjpq1vuIRpWNlOaPAnup_G*IHd?->nRW2@y^R5He$}{M7n#On_#v~= z%(o&y^DSGe%K^Ukg=DJYr!f}|ub6b14ou%NHoDjD_siL>QUVL(ydvP=w5ml=#hLRT|7EhAW~$(aXV zsTDUoKJQhu&K^j6vhl^Wh&3fs5Pc}Wdg#?7JeX3|joEjSDN?(JSW0QM^qv32tNd&G z!meGA;>gs|an)1s7+Jk;{p&`Z^&b@HK8o2T-koeXHfuOjy8UG_b}2qj3x+Qc3uRrwf?}z@w!T) zhnB&U5+5)M68u+|s-RBV(dP<3;e}~OM7_HndIOCs3jJ^iR4?>`ca)*@t zgS7pdVfuFt03+M)982Kx-{e^S2GdMHe~0+tp9FdzhC>1Y9)|_<0|NzFxkkJ(13~ST znJgjhVg==Xue_n|Y?$x8*WP83)XWrt>9eQZFlxX{MuN?XzT+KIh-<(zCBMZI56)Ck z9Y@StxLUEl=^;xWoQlBg1iSc}b?e0jTT)ILSw?&nQ$iliGlE0@Zw4$93ZvB#LZy1M zk{0oH3u7RwgKCCg9tjJQiJGyp@#9wmR8O#^E#EIc3M#zyPtd29;R7t%M^ zI&0QSvOjNGO6l*$@QEWIfgRM8B4vm9BeO1h_WRFoc&}Z{w`eoZ`7-sE4<&Y@MF}7k zTybboX|*Uz5OPQ|SfU^|bC`!vT+k*E^9Y2V1bwjk_L2TEFMea)v69-{V7DVx8depX z69+w#a`t8HlaK_t#)*UU9d0(E8dz@X2_rW)+T~&E6sSnbFT3Xg9XD&+rVFU9=N3=m5-A{57+`JL-}9oqg#{_5 z4a4)LoIVUI;vQH=}1esUJFzjT?5yzQDt`jBa4v8w^I*2HN`09UPTzk~uOG)V- zTmP=8S2&{wja;TMm>A{S|=v5}TIW3DkPT4!AS#g#&0W8P(ZC|3o*+$vhP3WR;^#~MJjdmI;?r1wl)RN{sy1{DF!fw`F#ybEl z!Gk@Qd zXPBnlc)0a(;<=W%#3-lKIl=lWCa#(2Tki955G3fUti&jX?}w8<@$ExSaY&}YkhKTl zSH``JXb9UvpL!=Mr}rtLtdjvuRy#dG(jKJpjguCVnI^t*hb}V`0n%sgptEw>#vUk8srHl?iKebuebq>ap5fzDS5$pAbN^htBhV>+J z9SoS5*Om{(V1!G78hLL={6UgV*>LckjhPsn((ZsXX!*rmHjQ!dq%8O#I^fR3a<%?o^ zOltOA4Zu}DhvJ~^GUgIwC4c2OKc`@NW($30S$Bg@^S1W&;FO`RL-;IYauG+-0H!OO zLdj0XsVi5+Fw#e%)g<^g44H_ai-(!Xl1Fq)C5|$gIhqOp1m(pvm`$UXQ% z$$Hur(l=SnkO|YHW){af1JV$5wi)`qgPd<0z_bLb^1Vj@ zdDXv!G=CuiczmbvIRfkf99e8xEI~{USb5(?{YR4ppe)^G3(QT-4S@|oeoE3kpAUFm z7E=)5mow>s{1=9Qa^CMX;(m7QBh@cppHsJQ^RA~nxW8ptZ?SS+Mo%7u32QIgQg0JxFi8T1csr^P`T|u6oCy zcXVEsgJUOR3k==M7M-0e;J^V$3mP4Wg|Nx(kYR7&8BVmghOO9DV1gHw1gxGNetGxC z*aqSpcb;ci<8gP!$0KzK0Fg1c)u$aIhfk^C*~{#uS&y-zt{cFH3Tcax(P$?&9+AHx zPSm@M)^VK3Nl|J(E;d`vvFVt$s>nskXx%g0Qavs^UZdgQg7K}f44iJE+vmrrtu$Oc zGobaGumBO1KjQSyjNf5PNV2)d7<41L`H`TkOn_e?25brF_RIkvdOtEs zo_$d?0nkFDoV

iAQG~fXf&T(YZ>fD0HmIRwD)Qyhks6*S6Y+N_`hp!?m%lqSlBVz&xDFT1o1yq3l z2nzy#FajTU-?Vaf&$=5U0X%T`xzh^siiq;xr7?e~x4p45u(`@zBNZ!i2giqk1a1xj zFafgTUPaTPU9T8k>KksC2D&Q8q}9c7@Zku~3ScM+J?dwOJmT|JZF@blkJVLPcFK26 z4m{X`q1=`V{y6}Af z`u|oJe!bFP=)w`)LXa>a_EKWtHnCLdaC%Z}H6(f8z*@mr)cXuq55|z85t-&~Y;0 zWCPLD2y2f^9{e~b$ju#`jLAJYDA!MXk>xXRRb7FrdS*ZN1$z{z3o#dfIDTX?n&){V z+#;!MRA7*mf-VXtZW^+VO~z~O$v1hb(& za8f6L^B3Cy!47mknSt&n?swY&4F&;h***~>q)grx0x3XxJchw}X9 z+SuNrojssY3VkHo_GQ&gsxaQD19%m0siI-~R0fg8t8wE$ga&((dW5Sr%$C0&!|D+Cv{-ki*RPjyxlVvf!nY_+^jrWW`+Y%|6 zugt$;FU&Z2`t~O*M($TJK^h0JY;Jy4L$1+vZe=J(MtJ|-N&L&AlHV-Z*ID$gOu!;h zGl3B2mp6talFLT{ziRLJ4@))x@a+Y%{<2!#?Z=G{pRP!XAdk9&*61pMVr zdj7{2NjOU|i$93>hs$|ar}EGYJ~XCx%A$L(ExOEi7L^HTQ30HPYzub3#|H%kc2t@J z^e*M4c@eq$*bSkhn!iMk*AoFPsoVj`rOJ1h%)E#I)YviZteW?n*v%0>4jMuD+)@JS z6fpE6Q>L|6k2~$8AAeQHY$i87aYI0FjE(5qNOc|NtYfbC#8P<@Sc$ErB`q1LeYWud zna0K@)7J6Q8_DaFXmgS|h>u%Z&%PK>B(@BGp@$tLqh^J;)QfrS#4C79@&vorYR^vz zqF`N`SSBL8VMx>AlaaE#^=O*Pjd>?qXLu7&V1XqpIl^*Wl3v-1Zqme1echNylUSHw zwhv*cbbRLu6Y>-4l+FIfgOnahLDn6YSNihqV%X=|3ko2$~r`tF{XLO zPr4(^1K8UKSTd5&%2o&_;nmUAra9_5u=EL587r#;ouuJgW@5}xD#ZxRb3`qB5a zjal}gU1~qIMDH8Y`-F7aF!@Vk?vw{dhT9Z(F7CMV@RfBbCD|7Oh^KfN(};cYKDw?4 z!3wbvg(_J)IuE8Vq&mniElc+=rsU4da=+uvV<2-T`YYx<784|?i%Nw}+h1-Q|Id^QOCQI(9>Z+64JqNi0n7~I+(63Zq36&XR!X!G zQILv_`tbCD6TB*F!*8nZB-l>m@zIiCyV#rD~ zhC$eB(KI%IhT6};by3Si1!UH8I?t9wLU!CCL3yzj>sCNOw(O;#%aOC( zlmK`BnAg}*k4*iCu6Vy;@Afr*i<{Rg`qBtwo4ib9)zE=c(0Y1o4`G- zQeJ_c67xy%l+Wp!z4+=wZg*t|*cI*QEJh{sLGPb~i~P zF~RTqf_oOkLJ#CUUw`g41i;ZR!+&ZTe}`732p0*X!t zKM}E0Jky3h_xwx`-B2J_ z<@-#wTMD-7FvnrssHOxvT13g_;M4{Iuz9qxDtuir%F zDOWXB#_t#9AJuji@Wf&a-)6?`LTh0;eQQ8YSs3Utq)Wlsy5qPF` zOR^I0OSo-t=)bhsW+Yanv0Dj4wM(}DqS=jy`lObO*+MH2v_?!l9rQtRF*j*je~rhx zk5+zNm-@!LUNkYg{I!=M1oOHdn`Mn^&6`d>5}LuYKw)^Wx)!Qiy!?nFtnD*J4$&+z z7~kA(L}iS;=(!2cXxM`K5Y6($gHR8N;4&1K)WSSGw^j$VVloL@vKUt|UhYX#4?E;=9hmF(_;Qs5p1Ls>6OOS3TZ#`d0;CCE3h4%_dK1r* zM2X%YzG)0|ltA}ncE?;cgvS>?Zm6~oe5uzW6HO8~aDE@;wY+P2qc}<i$#xe{rCqcDMFIcX8 zL0acJ9*D;08UD+-<#J&IdrvOUZ!C^DT#JI&jAH4(iMQXW2>%rP{=M)2x+xlL7q3rL zI;^F&m|H>58q`DFUu-@QjF&XoB09=o*cQ}!LdS8~x;h@|HzKCC;v}zd-iB z+O3?Lf5bs|Rh$~^y{yEN$x56#f}kOiV0h_+-E-%XJlri-rc{L&{}jrcjWe+L;fLeF~!7{3}mp{Atk!69;;+FpwY)eD~x`wM+cPjA}8#@`1-0=6k=1 z()}ZD%y_qA10{j}Kf5s_;7{Uv*qe&j~x zx)ZL?;R-p!^>-=2riN;O%@nFGfT?|sr9ud06Au#WYU~1MgVIv^;0|NC;-NV#M1-j7 zh%}k;_=skK<=C8({a;CK^!wqIsc*Qca5>?DT&5IjmXGsbC_dGi?~mWwx70?`94{d- zGZYC2dztP>tJcR3whOL-M?;aeI%%3nQL4)IKJSq>*|wjNvA9jFG5N6rGiF&7jsWYr zdK`%>HQAiWOqT>7kfLlfBT@6`b1b9!874mw8@{L8iPJMR5Q>TgeRFSlXy56gk+~JH zN%Eg@#VX(eQVuk|_-|$h&AFr;!7p5q>0sKU8u?!Q#|7lB@LK18%N4(OWJSgNg)55O z&+uR7iT}V9{%+w|;aoIaR^mj=`-oC$Q8 zfT*Odgp$nrL-K-n!3+-K`m`(#aM}p3Od7s_P~}LD5$=*k5bJhOE1C`cVY2)sJUgU; zhqwk|Bj$N=^8v*aur23{MAcWumd_tCNVG_|ZmC(UTDLeMwR{2n{A#8^5a}61p##>$ zNLI7R3c2ZN663iTw07{g)*BArmdqk?Nw=p%GFs-2ni&$Tk!f=z8y16TIANxJHv?5@ z`k3$4DbpBQjt?%!;P}UjYxx*Hz>goEdrdTiKI5sz-4dh7vi?91F@IKxaV!Zd4OOr& z&aGMPksZ-qPX2XA`)_hY@C8|B*ij4g0)5S7~PtMNJ*^jZlNKpH>($r79zd3CqeAZWIk@C`hGl8-gxq8()BXdA9 zATc^5(t4#B5wAJA@K$eP4N7|~yCqc}=Ho=zs={fQ-X%}|>>I;HUBk%{OTN%!n(7@V z@$}SZE7Yp3ypQ&2D7=N9Ix9wzB`kT07O);3O*(61ER<{^3|N*3VzSYReOMNHN>$II zFvKAXc}Ba{p(19kLyR>6QTl@G35Tay{%$!s+V*r{TRofkN~C$vt$w`|sS2PK_i^^} z-1ee~YxSGQ&<_B6G)-_VLM^iOg(tfSpeUu?0bL19TA{F9UE33}u@(z|=HGur5Tk(p z9R~Do$8Y`(&hc?0AGt82fkM9mALerXNB_Pfi2rTp`WMLIKQM*A^X~@M0j4<@vz|)h zh*EKfTj96Fu+X8OuoZi*0)R>f#~gu?TrW3@A#u!xN@%t;VIB*<)lG7r%r0GL2u~ly#HAq?r9epmWj0L>8mQ)HM7gs@Z^-dkIiyFfahlCH29SJ9ZX~xXlAnv{P zSx0L0$%XAOqWElwhQ=-I*zS)ONX#Tvjwl45CzkoPA*Hi|(TDQYSO5MuiJ>%!A`w>X z#;WB8;^k#M%047!_-{fD-{Z*IMient2%>ts^z%DLSQCM6T%Ez<9^1{c)R>E}wd|az z7*N^0jQD*Y9Sa#T?*+7+hriZ=XUZuflJxDGJ!f8aoLS7{Z+I^V?dQQ_|5)vV`9m~S z=B8t@`5MBWs)r&}+=+Az&l{@8iIx+!6ok=djgyZ~025E?S3-T$R)ao#h$O=2Zx$grd<;G*p9A@VB9K?xYA=@AM z#ed&-|DF;4*M0X-+2DNsOhZr|+!dS$@#s-=v)u`!22LZ>&O%pm<8bWfqyAyIw>s)_ z!tQA_=?7tY@R)m0)}MxaX?cB8ws`m~I7`QJ&{SDoq=E|^AfcMuE|dl2XPQ+D3>wWn zx&_C}UU~ZOvcalZ(VUCS&gn81zJ6pq6J5$iiLM{Nt?va?rH#ktJSgHLH0?^)AvF77U{iKlWF^gwLB7Uz&MjfC1PI)!*rd)}_hL6-Kp-SI#*mtT32_iBFDV9H~jB((AdPt_&$ONY+7XSJ#*lv z?Fcwf;0wGHXndvL3=gd2IhiROZ*n-C^KqFlsnd_^#vLy-|KIY$??rp4B){-NQQ%aG z?gNQ;bG>hc_cg`fZ$pXy>}>vSHRMXKw&#L5woy~bl0mX&eLko z@jaK(m1{ol+?!>KT7_JPj)d=^;8VKlQwv0Qx7lKDk+Oy1Zsq`XA zVgZ7t22uMKbyp5HfscE~;(gp*^dlj!>&vBip~?Iz&oEh3=f31m3XV2678)a}1vi+^~*AFxF{ z9LV^&sg!iC07FP<72;W9k#j1eq82O$M_weAwxE-jGsp&E%$I3jgsRhKBfT&2z+mia!NJYoKJV2GrVrMJ4y1vHd@f(xaRHk!g07X0((KBj$JQj6 zn~uG3G z)_3=}HwUV<=~)Bi)$VqLM$A8X{#`XL7&dUp`F?r;vlMMmayHXl{}c}nf{OO!M-cmc z(F7&{{qCF+78T*U6F<2-JD{Z}13bPzz(mFW{sfVtq{4k6uI!!EoBW+)i!k3g_MNN( zJurFhK2iv50?z^*GJQ|J{ar2H|N4G^5?W{z%p5|FmrYuD-6pJq4a@`V!41RJ9OkhjZ?G9|h_C?#yy#lR!=qM0EtI+4V2#*;j`;#>R zt0kEL>@0s`O%F_g1(SxrwM6=ReBt8Fi-Jq{52lQ)feWrfK|ih|cm0HZ%)9}fMg8d) zObU4P)u8ZxV^F|?n7i5h%l7mizTMx|;8YEt_BbP_UVkz4+U%cLYuxjCYRVi&Tf4bX zegP#l1W4V1flF*MSNVV?UiYGegS{Y6w1n1ny=nI&&cJ34cp(q+n`yd0jH?(>?gqMZ z)CZX_@WLpTgqD0xRdHjh%G|+))|=n)-y9rs)x1JYU`WL%pnM01$2ONv@ASNdJo^iI zNiB7geKID^vDXKU*UOJEp9YAdJR05^N?icQtl$^Vz>v(bh~DPmIN)$ieU^GE9sY&$ zQMX0i%7YL6yL;{Qr&IZqik?G)>XKG~w3GgM!We;6DGzJwhvOV0tVial$*pM7&khIp z*c=*B!DC%LR-bQAJe*i@Mba%YJK}ac;mO{5-FAIgq#{+~myh*^vh4{%i+(d@$TS$u zz;n7|k3;lRc=Qt3*B{3o%9u(y#e-&iG_0*1JRIEH%XR22SzXpUtILGwZgk<%pur$f z-WL_S$)|G$kS4!1qv1*A?7-Z_r@cBJ%KNg4_9QNWIOI*_Hnz6UF@PG#kqX4ZS>QAcGCfxa48WcIfqsOFH>X+yie?yG)vemO?GeHPww%rVjd6XWA@=|@ki`2ODc ze^}_gclXiGD_7T2`4BiOAzRq-h?)3ySO?%6S<8boL>ku9BFr??MoflhjcrSi-Q#~# zD4-w5(X9XhTf^7TAp$a!j)lcpiEzTS^Z0DOoJhMYib9KJQ)6x6J=d%(duanVg;boY zW0(4A+bmjcF}5xg7Oz%(mWF`))Hbs5tkGzRjYntn3{9Q zDnIjW!QihFB^0sB+@5`0p|qwK;jte^!?+|40-FeeiE*MmR;37bm5qWme8J}9&{3^c zfZVm-mTIUpq|i}5d4r1eD`0<};y18n`rG4%e_{@Qhu|$65q8E44Qm?WTmTY)3FF?od{WvTV(#Oh zY1Mbjl=%%3N@LA9er;PjGYCFm{!@;w|utE1i#fkw@3GCLeIgBgzwYrJ?7# zH>Ve>V5lnDmK#S~zpH%fkZ5Yh5Ho@#h(x>SeFEjXVb5t{vqA%pdq6bNLxitKNi(>o zDcv1?POOv6wELh-b59+oakpn^poEE6tKy~Mfm63=fuV{@y5h4ic<9;)RkCrys-=y+(F}o;S2}8U=ky53-pwlSkAkR!VIJN9P-9Y8TM-A zXP9S?p9_cUpS76;I3_r9t7`B&`Ul3Fyc9iJ%0j_4OtSA?kRaGZ&@0;*Ka7gvNaLOZ zSrZ}+tVt5Yrgm?Qc{8eGvCBBqxhMev((i^B+a7*KTv>@++u(6L5n}y>PrIl>4@)o> z$5Ge)v*+upE&V*kkwB>BrrHgG9IU!LC(vcY71oxQdgBruDvk`6q2d&F8DL~>?U6~%tRGVdmZv{H$_WD<0? zhG$i{!;&R_S~HZJ<#q!?B2I2?x;y!xF?YwPaHmP_%%GD;oTZS+DN&ZU&XG21wiP`(M`~u?~^10Lt@-o1y`p-sE z98bel*+~=xce^#fd-r8uy6Fvyj%{1OBO4cGS)c9pmB@5b1$m7TLFvzk~&=qxo zFMS{B@Kdg54`dPXO^u}J&+L$82BS?$Vpq!Y*>LknSwHfF7oYPQ?PrMbeFzN`k0;Z5 zU`AvQ7+qp#LV87v4hp@c#IRr^Hba3aE49%qHR4b*+U_hTYp0y25PI8( z?-W7gGJ>dj24D0~?D#`qRSlMl1(cseCDv4J=pc^10@;+sS;LJ@#m=lxsYtE>AvhdH zl;Jn;fo(hxxa6?O?Uo|TWxfv7XnduM&oG)nt+=10(l&dEG=yCnERGuvT0aMWT!1fPBlObqkT~`0Ojir4NmCS+t35s2;V&lhsJuB+x5c)=mcaHfT?**Y(yrOdRDg9v_!hj zM79Qov_urFPem;;(gG(g6}Io`m}^w~g16Od_PT5)&3HH2UN(o`qb<`^i3ecf8n6qs#9*OlIAgRNahv;Cwe!qLzrW~Kbaq=AA4 z*JMiN5GD8pU5;$!xai;m2Bo0uN_|O$wFD@KS&zkfXeI4e0Llv&(Hs-MRc0OnKaH0! z(VGrI!q7<+F+n28q8ky!j3ZmlMaEKN`P&er7OlvJ+Oddr4F#+xCt9JFe}&rLCZj<9 zoUQUJn^s!$8bS7Ko(`;s&ZfV}d<=t8Z~Z$rxX(`EOb%C025c%My1sPImx`alj*Ym2 zBi%U%2yJ2g0EOSGjc-;*zX{^xY>5ZCjSyTE!gZty4n5>#;cP)!6M#n(7U=j}DEo`%t3EpM%p_0fq@`a7q@`&PIv~$n$QT zy*iu|8CBk*ye?egH;?XBUbwOFg@X=u58atcAnrQZw8qw+M!;EYocTX0Hzj^w7a=t^Bn z6LExy1>#I35NDjf;f#=(tm5xJV1U=_-?Bvv0NPj3dHBuizeR=E0j&41g9`Wq*da2p z`vy8zw!o@d{cp%)U~2#j2Gf7j>4ZbYxWgM@S{ciCy!rOpG{8;YeHZM<-|qP>zu?EW z`76|Xk0>*+0*fvff$|){I215f^=`;~H~hc&mi`W3YGP{y_%FLGsH{X6V?N)oG!J}WZwX_)%fTcW4*>4M~Jgr_VIOpq@KFoTI3YvAgdN;T#MQO^nrtyrb>ydkv-C~a;GFOiRv zD3S|ZL#4;wl9o!JEvYh{Xk=Hk>3#XqBVyhS-*d*RL6z(s^36u{%9-by!4(rL0;Q+5 zR5_a;ZJLKlc^YQfE?yr6u~rS<^kx2G0auh#&t(%{}=00dlUWmZ~x4klUvI2c64@4W3E&Z5TwucyF?sD>}}wj$vl5EW`+ z_qy0hk5|kN$6YC^VLyR~KC5heRgmgo!6{!wHM=?P8>06av5yQiQr7%b3vDIZz7;hM zz#+T(M!OU5h(s{dMx>-0r)N7k2}B$9*4kYQSxOAI3SHi%NAW{TYHYb#(sbJP$2Eb_ z6=Xqz9MJ4G}!?zwDAKZ2-_5q}Az8{!I)nE81@1?M` zldT|sHWI^+Dh|2Yy?uG`N<3fI^CN`|ree)f)$)a++=ld(I_eF9huRyidpINgTR5XJ(E9@o%4=Z6`vUmu z`4!S0g5(7|QvzQRM0Pmx;y2-LuahRD#$mgpNGzXZadgPj2pu=dy)n3?xGF7=lP2YewRfqS`2pl~q* zJsUkU12f}Ybr2)#*C9|ljs=Kw|L5P~pM>;%QG15pTJX870NZ*gX&HjyJU&$qG!a>? zd*}A?7_2irW&QL5?gvIl@n?y5of+P*3}b?nCNroY^NTFvl_?}*)>z@WEw>=YjDQC?tc3>V1UU&WSm+#reY&b%?7xw|y(!$t2Lq@l zPQ7AMFA}b*Vt4pjU<5MTqE*lobIe@%(o$s5D zKW73oe~?`S!4D(@Pl05B>>C*nR|ui_5uWZcioBZt+dc#MWv}sd?f(m(0YdjzRzUf$ zuma!ve!L=T-4$l0AD@8Yz z=A$jkcg~d@a7rt(2^b8h&*@$$x4nz0I#ydFPfCA0)wMUAOzOSb|E@!*GbH{cq!|@* zdLgW(D5urzI5IZ>SvXY7Ck3sPr>B@tHcU#S86 z)-8stxo|F5l8tJ7PD69cbtR>io|Wh`p@5&)gvRJS&awF)ZA46M$zBc<9J+0Cn#hft zho(oM7#9D|HSSk#=XCtIt{P_^l2HFKe{cwGQ?n#m)j&Js5`mFVsJEf))UC%&GS(r5 zbUT6@PLyZR8#UZ}FP}(X`NR#vbD8)n+U3~2i@udZDnVBSo&NHmA~4g#-X}?H zYEIfENYpA==<~k}KR*YtA!UGVG=ZJSAsD~H4>HJ1wSY%?Av@yT;;m#*`s{Zf_&?yP z^vwVA`u*=?(bo_;Fb2ZFdRI9||9$zs8#3Ju|L?!Szl*^SQ!D_=0=IE(6qnR zkGJSOdswa7R@GNvj6GfMYXPv_1T?5kzH01yNm@_det0hG_BV zh-&|&`=gC`^CSNCIXMY*zI`$Ao&}`%NyoOs+-erIc;@LBB+T-M0!_2zvpUM&Omlq! z+VF5{>rX(t6w9ZI+K^mEAE?#wrupT!NBDs$%fq}(8722t5I2xF{lv9daGX*e+%$$T zKCWr$pJvJ}gg>Hzd%6u=$?1qBOs1@zlZRL1_ ziNxKghbii0@6t&CUI#yNuyrNo>i+!EejLvw`+?FygA^x2bCQ!`T8T*n2^66YM_luI zl1%>tE(+DLHh9GXRh_18Tgk1tbbpVg6j2t<*ldJ)w#Q0e91M5CR-u_F#k*Fi=@>IU zWc%f!#9w<-e?a43jcR&&tf6USPm32ILdm4H!cdSx${O-E0VF)|eOPvEn=)sG1t8*Y(`)AI$MYGqjvVK3>)(; zMai`-j*1qe-$BED{2gVTKhGr?5q?cLw?>=SKZMl1w9c4Ty^Gh83;euC_4K4zcMvJ` zjhcRlaqDYa0j5!0xX(`%MtdV9{0zSo`H-9j<5-c2mN+^=w{#{vKP3xHb7`;FX8`pW zYoC8+u~$*-t7Pxw3qdY#<|jEgUvF?b*`=ADgp?@ZV0vS^9Z$5j=J>K}_;FFh08zwS z5&bIBNs8rY_$NS85?dA;VmMWRTU zQyn#?BZmZ6nm?oUUTcmp`*}#Fdva~sn6j0jCR7~JKAioPp>!}Z`nH#tyVdJ)Sr3va zEd#KJd8e-krpq8D#Pdh#4d0y)u0!YLfW-+Kt8`2-4q?-wb;RJgU@!5|)bft@U%^(?vZY(N4o(SFgcnfc}Dwh}`sx^Xeh)AoKlkI)2 z1;@#TU>yRzSwNWeZVIM+0bdNQf6ZndN~go3dMm7@OU|06-vvv|qEq|!!&df>&JDt0 z#R972wL}e%wv~B__vpC|iUf|i7p(=C-%61oaVDgnbcf-xDHEH@MUO@H3V#T!pr7F^!Isf$mS?Ffe!EzVRjS7v$>_ zghU@tyk8#3@4?LHpJ}8lY4Iba2Uz~VgoPC7zjbVeg+~?s-7Sd}_~?PrgFC9K1COZ8 zrzoUA!^gtF!pH<*Vf)@#6C9pESWI4uPgY(=SV%!kMw(CZPIE?HMn;i_k4Qy`|2~@v z7(xg3Bx47*s<~S&m{ImhWe)y~PJmdhAKLjX-$-XO8`RTas#~@AgvVh)muGC5L6Zt*N%EIy|XO8DT z1Zn>8>EFZ6Pw7|yeAgV8_CN>5WzIsO7UAvf%=sP?j9L+7xap*~AG_hKWfj08tzW4Y z669>`JfhD40csyzubfwvW7HGab;PZ<0kEgtH`?PD@MP)&=@@rK5wXwwg*C_`a$j}U zzl?e6UvSsw6$A_f)kq&GNOpIaeitUNWxg}lpDgu32=K%|0JvAP{%WbvZZPpTM)gvA7ahDpSyq$nyQFQ%wUBp^fk zL{d?Z_Iq#^93DeN5NMJ2a%y*%5y>;(o9F#WKaj8h+qyE-Gtx8P876Q`1(X9|{;Cc3 zPt4)(n8r*t#!()y}c!@!Pb?PPm8Sb)*C%5CEVh5qB!jFZlJZEv~x$TdQ+B0#W5ckb!j0- z_MS8Bo)*XI^`R$MDN`~|aR8Z%a+bFr;VyHakB3$nr8IYqgnELna7zQ zx9!W_+$&Y-{N30P5_ach8tCx;#>hIpGqkoxh3%zDLV{J5Q%?rEC|6{W%AWUmhhbu| zxW#V-B)yhmf;oLsuVzT~8Z$YKz%fmRpgpwO$Vp-v3XQH z%z%g+R_jSa8scPd8B~oL;vgKnNdEfMx+b^x$;=r#@f>^(nEljoPE=9E1T(RYL`KF# z51SSz31Li=R{HI1a_HPpJZlvI!kQ9_iHJr$x!uP^ZQgsS$cyj5u5dU<_KA`X4fLas z9#X9=SbxMa@($5isB0XdOSwWErryVOtY2eSIzP|EuPgEdk@ViI^nj^r1Z2=X{3M?i zb{16y3xW@#7!SEr0X6d;@wtH;mxZdz+J0{6Hm^cDxcLEhJsH905rXvPS?PThqoVi0j0HF~_?tWxO=Y!1rfeav0OmW2nIZXL^=`d!{-+s?FNJB(V2Okk-A!faKYF?I+p`(i zksoxq)`d;wa!e&;ri36Vjm=8z@kSgESgMTbBDktVSL9m^r1~^aZLZgF+B_@09uaC( zi#$+3w;B_Iaj<+Fp+NvK#JWgOU|12dL1cRPMO4~8fxn#6iq`b~mD`9RJxRYGh`XT= zJpXAEQ&c<7j!dt+trVPfNS+5IC_5)(J zHxRQ;zhX9=nnaV@l}wQOrNK{ydp~Bf@+s0k0ubNBHY$z*4N#)R0+=*lKxAQMX#&*6 zG_f@LDrt%h!2B8wLlTjc;pdZ7yq7h-o60?PxKlFynumR-g3NSx>hXQ}n>^kB!0rAH zjLT@1OL6fIKgWh=IN?%{>4p1B31uOss|yvYy2vqI>;(tC=$tnzZ|Yc#79wbgWP>Y1 zz}V!oJD+VBsgqmk19k#ovvdkVRMjIJ$fp`qysBGibrl)ZcIBzGJ8s3U35xP(ei%WK zwT2F%_w;S~fvaYJUa)K>+Zmr;@8GRTxG_R3%X)u(2u!cUJbgr5cR%5^avala7~am4 z=2x_O^F@WRW7m|is7Kui(K9p{A`!?wSsWx;6e?M}H?1KQ8F_A-RQ#OYo_e`@gxLMA zm4*fH#w=K^R@@=wW`ukRQ3fB&>%W2%^_2FnARz%1?Upq!fi3ZFz2^4>mn(YXUL-gr zpmUOCh7l;1lbu5y1lIB5)HtYZ?IlZv6>c1^lUV3@52S7QkizO5<|`ucxdigDNHS^> z0u!k6g{-x;aWl9oP1o_qo+6YcoR(W9*Sx#a`!+Vz$6L?vclqK;Itjk2fj} z$3!%LZ@2$A#;n^XX*h{h45GLKquX3ejHWnqI3((rPu!W9bXISwCMDmU-{guz?<*Mp zA&>hl+Cu(7+vaEqM|4=7*NP`5s!(iiamjEY;}dkKOKs2QazHp3dXNF zwCO~yNi!=PX+`Rp|uj-SB1vss$aw-iCb4cZ+0Ope@*glP|5JU-U zfno34g8r7AnAT?hrl8emm#*++j8t-i#+RM^-saDth6~#Qv<0^lUSVjRhxdXa4U)EB zXyayd#382qv0_+VBx1xM(V_#kWbUrCQ&oppl)h4qF60E!ubw*Li?_~SP=sgcI zdSwUrgXRWg7uc2p%gx(o0z=708JAB^iD(Z!m*45JdXybfwcL7bard z98Is9cX7A%OUE^Q}eEwrDc=FL@0-_?MNYFam;gY z4w@A*6EaK)$V5;M0z%u_$RA3w6W`T1ldsetcCUP9rhI9C+3Df^KsOI|$GFm21k&+FR%H@}OS`^}l~&d6@qA+XizR@;n?`?dbzt&vE;Gg7*zeo#$U1?%1gCAniJ z0t55`V!jGdtrhIJ>^`7?j^o11VelqfR&8ZM7S|^B$WImzTU@51?$H{?$o^i>-uCAc z#0Tm?oK^wiG|yL@eh3D>9&JVc8dWU7EDQ6;_5ZHKLF9*BAh5)N4ue~qa7$CiEK7S7JxZ0X+G^LG?&km8ep#EHOG3bk5anTvSa9Dqw zz1@fssF`0RUwrooe0-fgXmw0Rch*a+3r z?qoPZ;M}jBb7Ck;5k1J(3!rb}wz!OA6b^hi0;tjBU@DhhhR`}prtIb`>xak57?*L! zzw-@mZRBl*d*1Zfzlzzs1WVS#cS&*}YK&-`u~9y;oS~Ysij?Y&=!NZaum0JFH&WbszTOE$xxFM1cC7cZ_|o;zJS`d{uXRvOxwrTtDjRxVE`7b8hfHkvP|8NMLtp~=}UXiQ>6H&Gfh z9&#A&K?RX5qE4w8ydYoD6hi~a0`W*HAg(E_h<%+~{}2QD!+Ud4F5V^ghiU`LTqE%h z>iZ=2*(Fjsct({_Eg!$0w7EQOd)vQ{`{~AuZyF?lo1?qzWdbYKgVY^W(wfr#OlPma~=q`Cm>hy_C>&VO0xB9?(Dao;;XUVQOTI9mB-k zBF_qTktV}=sit2uQo{Q2I^%?G&-Mt}A+?W5K6Jy;46|#|ub4bcjM~A_3yC;y=jmw~ z>8&gJ!e9s~Pp_^u>=_-5AyhXH-j}0UA;6+;KwC9pYJ0l)f~u-Wr#}hHhIjrxZ2byU zMySh6aW0$D74S?#2B>-5HU2?(5Fs7UYB(ZQ$`?%+N_~2rT#~0Xx3i{N^k#`^Puk36 zbEY=1(3)QH7!?brXWa7Vb9g-O(|B!-PtEjc+z|$T_l2bDgA+#nb{%viTqmhPl92IN z$3kwk3Ok3qYB8|SiL|77HFQZF7jFl3nnE7E7-a=p3R@UKW)1w@vM&auTNbs)i&KsU zGczn*nRV8Da4>y4heNYa$6~Yc#kn?ybVSrnJ(GE}D$&TH4V!~nM0$)r?3%tC!|=l> zJlAYhSWo6dPed0CC$yH^S(up0=tiPv=-ab40w)Vd?I3dnRIxShCV3*v9B0jMLK=^) znc?RWv6<(lx`p*7SZvBvu4=t4=6(ylKWm`<5%`vMhC-0y6eE)s{m!EPQ<(Tw;_OGX z{V##<-}iMIT)57=+S@~8;(~%yGgm#sW}ZK5OI0cw8{o`|wmpQsv`GDY^vY8`Q&c{k zy|ea!qU5m8(HO0Mu@uxik+6dVKmEqmY3Yf2`5HuvjBN%EQ^FRz@m?&ci(}@7N&PGA zrofP!(tVa4yT)6e6`z&_z6;R zfi_j*O*Ej$Yj7TCPR{P3jP>?<4F)l`bLB=LoP&PvL~$cb8&>A+xMJoju4}Z%;FbPk zIko>I@NKy54SSR>lh`}EVw{(YPL4@1gYY|7xd&gu-og3z&6(*lG8X+vjn~FlJ3%@z5H|@+;u?DK`N(Y6sphQ zvYpoM{g#Smo8ZloC}h?bqjEwLFuN-v*z#0GiOhjpZIRbJ8i%;bP4UEWG_WI@scc{( z=JltaACcB&m?lv>L0@)MP(+YDgXUUsFPh@EdP^Sw`(T&6I#cW*LrBqOgWMpIh`1oT z@d_)hLEZ{}-$zbzTXlsMxz*cQ@;%2@}Q$1#G}sE z5ES+6S>KGuA4PBVU5A^WV~iXombMaJ^_4ZUkwB8^fA|oOz(av9SRez^dz92aWN-TB zDc5f7UiFyTv{&M`02b?RRl~?LUA_~;(eR=dv5G|PYP9y$6C=%7CaonCIYaDk<$S>n zwsl)|Z>FV`;#P){FGZP<_tN$s;IDO0;`{ae7JUCepaj?r1PlgPEgtqO^R4sVB|0Z1 zx8OGX&Edy?i1vQfAo&N7_fM5Z2xS=k87YG@eHZ%P6F=h%+)+-YmUz{LFG=3$K_+Kw zwUR!W-P4e&@vx&mIFUWznld;j`$L9Xt*wb zf$B5=evz&jjcp%vumTe(!o1xC9!}=&yWXRn7dxe>TDyt-Byha`;H%WgFB_$wGd95f zz+7655A|?TY$Iglf1LDxYN7s`GVu?X3)7#;6rR}IVQrEHlrd_q@034l$)$?aE3@Ym;8sB!eNlF|^#Gtr|0kiP~=VSl~q`-9-9KRkGUUkpI#y^UQ$%mY@x!($Ws$_C4`BR!-534Nt*%{a^_GziTjxuU$%o>Q;C? zu3#;%ni+ezvVA9h{J6nIKmdYZL?klyw)NWOA2(7mFdoQiwQF)(>ewGPgLX7yiK^;& zGk_71r7G(2F0g9L4s}oOr+SyMCNyS;OG*|pQJWuL#U_*eg*p6zP6-Kc=dI> zUvc0z5-?Q^)s>Y;m)yqx<_=x(4XzE{?Z4uT?}!A9>(_u%F?+(3@{bk ze!2dQ7CX?C?z4X!QBQzPizxrm=7RfjTt?66VbE9wjLJPqMg_#*GMM7eqE+F508 zoi)?t=aZjrxEJ{Pq002+TND&dskh%>*PMB4y&C1in)RxJ!0RN;@w7rG>REsffW@CQ zR9g8W+CxcZvUKmEsK5768rz?D8sK_BC)ENvsmO1fl=ztfbk>hfdRKBFN&ih{7!DQl zXIHyh`x(Du`o9MBK)+-Jmdt!#`x$;5{)g}Ockb9v>KNe+`GN%FQ>#ynZ!bmK^#e!b z&e8zeFT!8~?<<2+A+#R%(Ml|9dkZhi7sGprSewu5kL-SWl8xxi4NqMbKUIU~hveMA ziR$ST0=+CYYN|^|sCgM@yckFx%a#r~^|YstO!cAN!t3sBG6Wy=u0!?UQ3&l`u{?^; zCY+!9x+x;pQ-gF=SWE2D=Ioa^4s7XYQ?7;^T0U`uEJHGGc~h4u z0mbg_df(mMYd_1MMa0!s{VsdEQa+lF>BY8se*@TCGqZJ$XD^&9GhH8I&<@LpB=1TE z&?Nw4-wd$z>Jtx3UF(ceJX-bJQ4doMZ{e+$RLn8ngU;G)2gKUDbejkHWB#v>W7Ltf zPa&NsS(&WD&C8VV#gzrz=06C{({Yp*m}^rgy6=HIyi8CLm264?f)*^PLJbb4gkS!tz@L9yuZRvxJl`ZJ=NM=saPmya4>Q+T}C<%MY-Lz|D zRt<44Z|9ZGOx5@T>W5f~KlPg356*Td7Y#(e-agV5i-=$F(4fSj$6x#c#4Z@MFJe8V zOqu9?Y6?bxKJ_}GdTddKB2Na_(b44$Gr5D%17VdGsuTu~=7FbJ6#+5En{D@#x@5~T z9j(`k@K1t@sHEwGmrRy%z=g@1G|Yrt+~lLd0)yN%!EU_<^k|I-bE>vq0}sHVWj|6* zI}DB)Di{;&zD*2ZoT;km6W8F^|GVSJ_UF=s5J1W+0B|HNzaK{g(Tyh10On6Y#u6J3 zqKZF%xQ{une?F0H|K5oN)Vu#&oWT6^@;`jHf69KvLvA_tnOyIo^?CAK!b2Tbi^9_Q zS4(v7YV(u@)C<04M$5DH*`^xkE)TWrstp_Iu6#fnR74}*lUl&l>YfZakmW*$*f%nP zee2sNvgjBmcls{ON8arvR1b=RwU7zDY=b+ctP;*^9N#)@KLqd2*Ud&U#CXDHQ@lK{ zyDCj4qEqS^A-Y;tteGGR2(BA;i*oB*Tl`-t3?E^IeO*IzKi|nAq#CuO^W1EXZL(Hg zk?@K@g5-EGsdP2)UfPM^DXPx9IE|M=fwcY>Q5iNgoMqtJqv2FOPRezu%hi`NmkzzC zD?%H6?Ds|e?TvS{0@zEIua>b`EtYJRoNFayY;{M6wRouNv9*hpS1Unvjyd(LMWQE5 z>1^4yDzA?n)NJTNyA*{)(BlqryEqb3<>a(r#ZMvFBwZPr?b+80_K2aJ?=}oD_+2Mv zViE&ktj0lPo!Zd$zj59MoamutgO$T>-ycLR+rU;rRT-E-TU0=B87FAA9kG7vouzz( zgB)V#2UD2hjGw_33=Whr=Q~M$JrABip(*3Ssl9WZpFJIbIP&n70r@&;h*{#i&)Nu$ z#zRAXOd3kEE8Ym_C4xKec~wN8MroRmsJjh92)2$&g>h|bMCv^1HoR>;-MpzyZ#Z&I zAlhpnY`XyWn8cWI9Ew(U0w&05w3j@TG9SJp(x1uD|D}OYW(A%bi@K7txiW<}`T5AF z$5c7%ceM$B`GTKn6MkX+3LxL#8u=El^d+MWEGx!*LuWW}5itH;eoGuc(vb9CyO1Zu z3*_~PO&x~ghJKq$(u7k>`mYU5p8kuI{=gE-_VtCybq!}fk&KwC*=2yQH&$ZtQuWD;2}aHB?{ zM63wnNO(AAxtf2j)$#G~A-LDTrKB#jD%G=Y10VIQ+Xb|Zv)_ZHnw1FYemXcGm_Jf* z9%VC6+wcVYY6D?jy9fg0> zR@xPVi(5W75qEc;P|+qVC1dXw)so8+k?5H&Pwqkwgua-Rlx#Du-@viA$tpbd-xB4s zngp4GF%1CM>dixXf^6j9TTsR#tw>#`bS$!6hPkjI70+rF8!!ccq$}g`)Tpj zO0Lcq)1SMruY1A-wmNUO8~?RvZm-OFzz3x7Wju=dap+|7Eb25hgmSwmW@P zMB29|XM?Z;MIJZ)=g<8Y=lH8i^nU7LcpOM9rhjrvRR+xkY)nL^6k5fFQFD`-A}So{ zC3<+^i-zzArO3^QW;_rEo@?as2)VX)gAR0=qGEhlMtyF)6`({B#*KT&1p3*8v3n@U zDweQj@XSks;Dd0xzY-jWzYrX7J%Fay0%&@n-vp;&iWDnDKp!TZcK9o~>Bt|o{eMDs zl>SSy^LU?s((olEPE1=>#_Nsy!q4yv!r(<4pNCfF;lErMYo~!$597>M-8N-$g|k^x z#aAL9MYYsh#(!V;DvU`VJ|mOHOkv0bh%#GJ3VyZA0k&i zPi#_4nsEn5Vf9x_S5xNlm~3FzZP72-MHe^Vrk&oDrR7*V=?b+#oX;59fFPBGmCJBL z$_jXsb-hmVcaO|_=TG#8^oGK|_iMMHQ$1kE->--K3ihA%&buHytn8# zDVjGP&dHEUfh4x{i<;}yyjdh^14~;i(q@a@;{E86oet|#0sA@q+fY&=M8_3XZgxOc z9l1k3$m-wu9RKp9gX$DJ`h^q@low3It*|9XK7c3F{NbQHrC7b(_AWqZnzX&&QtNWg zw@l;b2r;|Miy-i6T%X70WHX>V zP7j9o3~x)eUJQ(U&ejPK?Gzn2#k5501q0z5B`a{>CK$}wY}Z83#9xt4;mdS^qP3iE zR7aZ)*tw5T-5!>EKj6w(A%g6oQ^7ZeCW?+_NQOGvFFU9c(9U*(RD%#|UB9fB8Mc^U z!YOVU~n<7|Y^WufZpT;0x)%7YFd3HB1`rF{(6v z!c|U$9!2CC_*2>84PS)l!17E2WW!i%tqR!yRiSPq!$Qp?0*ukwEnq`^ru*kdzGE+X z1E@&AhatI@TH!K^sIQwg2&2dwgWg~gfZXdUfT<7N(>5RKwBZ!jW|DP(bu^QRra?R7 zSHf8v?MM4$U_P{Rjn&o2oQakTrrThDSra#X!Q8IZ&JymGx)95?iJD_)koh5Mce=~@ zirHk`$&`!THEnYt579-~W!w3> z(Vo2}Jh8%!QNC)k78G?*CB2MXbHImHAL>#-l+lgK;|YfmO>K<~jEvl$hA}h!6~7x8 zpwAfyfK*%GQ5YELXIXlTOuqa{VFStvfADR>pkk?*854=y5{W!spGe%n*4gd{MG_+e z{r3nZ<*!c*Kg}*@BKjLfwnuIL*iQx+U(OEr`&4rH^YXv5iN`6rKUu=SPq8$3z=s12 z1>z4FRK1u!wWE$DnXSD$r7sb@)3Wfec4&%sW^7iaZl9&++O(f4xozjmtA_Ow%69f- zV3^+rM1@2JX}Z#Hyv>K#?dO_ULCHa-osRsVkHVV;1rAlK zlW)ucCYnr;`{IRDmtekwA+BK;p{+iSPz#8nabX!Lmc^YL=zCco-%mHiT6ft3d41Rz z_mw?|dXDf1t{+n_+>@FsAWd`7;TN(rxN@AqTwF5g9--D016EJ@bg#vOSqIt`n0l-FXj%VI~y`0(lv`20!=5H z0P7N}fENb)I>Z;*#(XUSli`6S=A{G2!2lj`E`A(k9^-{ar^?jDI->??&cLAIT%4$5 zO{-`xS<4^Fw1H~gm3vm} zNWC_8A#?xCe#HRUN$NozCj`-1f^JCB95V|9#UOrSM4%E$=Ag3#Nw^?C17;%LFa>@n z)W3@fZjCxqbOSz` zJ$yXTv;_PfKYpYypim(N9n3udeXzg8XCP5wlwaC9IXM~`SQ#_oFkn4m2n;H+xa||d zJPri@J-&dV{)R8#vmL)}`Zor)pSe~5S&*kt>l3~J=!uvCKi?Yz{r<1m@ zj&C$sE^&LYaxZ-)HMU6tPz$<-&O?sIHS8=ca4quqh*WPW*oG{c-DiRPg7 zcr&7MY`&_`+~>jT3A5VgqtCg%;@sHfg2g;Yb3`vwdRehKC|}r_Dy0I^<@0I+3ULMR z-W#*NMDJo8qf!_ePWIxRWp#3(ai2%%%8Ez}VCVD>j1DbxHrg=O8fdQax z>(8ADAQ}LZK?R^0=f0Z_NTyEdZ(OIjE#^qh9yC{42Y>cGe>cQOTnV7!S)a}}9G!%* zm6frL`AZ_fmj*@vO4^r11~x`SN&q@q1BaJpfDs>#PUcR|PJniK$HzqHFZ00Ra3utl z0A0er&ieR~>;&*N0)n>yTLSQxiIEd9103-4*kZ;CSOU6$0mq+H>%Y94zlk4kK;2hl zC5(EMe30ZCZd>}qO<8p8U~LQ}9vXO;^31YGy3q;@CR7jeL^b4&p`2xfMME7YP6()Iw>w>Ep>_ph@a08)Gy-Y2+x|8wAPm&vDUjVG9e!SYunAa#xVdKx&>1zPl<=8o zwLHo>G7#pkZmeRusU$@=_UcfVxvc&mhJZ03|3VDG3jr~NJU|Q~;)fV=_Qm2I3ZHgI z#(q9C3ghtp!$JT5_qzuS3Hd>lC-_H6WB{<>ar`EUk4r#x&(Gte{^RH3PrLc2Xhe9& z<_F_caMOfdc(R6J1f#pb6*4TEKp$7delTRVdcA#f`*#^@}EAjk4w}s335jt#9wilFoQ_OS%FIBw?2e{mdO*`Nb)RPASKZAJ9v*24=kl*tslGNE~M9E7|IIAO+@U z9h%^w#zAUj()~+|Jg;bRdbV!~a}A^>sZdK@WpJ=kV-Pi_Aym2&uZsAIUKa!vxLy?8 z;jJ9l#4%F^C(L4w?YXlvB_wGx6v?xdS;AQyZi8C_}#CPu~gM4jOpHpc9HE3{uGV)7q|f< zL0a%4?=1}TPONs9`VP75N0fs<;l@u+)Gw`$e9;m`HiqcrCZ2E;5#eF!Q~Pp|hiSuT z`g#f<%@U&X(2$GFtf5&s1)yioplMk0Jv9R*pC>x?KoW>spA6zDJX_7+6;S5C^ht0* z>JrNzCX!Y-W97y=Q?(Gp6^Ah6X@Z6_oY7YmDk@P9Dv4KPQ!8ErkLW6#CCoMdsEpY8 zFyFW8eIgSYEG~v~3UuxplQSbih`+qT@t(X_@pDe z5QdYHvig-F8;$H9A#<&_tF^ZRfOlpJIcf;2Yn9^u*&%rP&=7mqu;(myIYuBHSL|d9 z<{Tm)0=66U=l38EB+{4cE{)EeL7-YMCn}u5I~qR5l}4Z^zl(i!(REtnGz1nDmjraS za@|K}+`44=p{MJnvNuCbV%Ggzf(v>}Zlqdg70X?V_*r{(;oSs7sM$e(S?|kEmzEL^ ztYtl&p)xKK#odwcs#9uaNR^PA>Pl44MrANV;Pm4*`GaMy@o*xf8xZx4!*c4drQDNaH6#=ka9^czj7K8PP1Crs9FZD+|Jb(xC`||&-H}f~9 z&f6@(EouKios}y_z^}Pu+NW2&GxTsA+kb!xs5MlUaGUi~Y5!^Y;!x zH3_VLG8r&JTGJZBx7OQ4qS$1rpG+N)AEu7!Aci4FPKlxDyZ7;AZ8#KZOx$g46OHdT zufT+rgASC47t_zl1NbsDr0J(jQ4xqi7{HgEffvp8sR(6dprPRRq)Ux3DL0)5MU5SZ zG5bjb5h75NI8s!sQ~OrDc0e>pVxGhYPS&IG{uk!~P_XzolHrja;_*B@E&tznBmZPqAXxMjsaSw+$$p%93-6m_6kKCH~_Js zTt9jF1SP;%7J~0<$%oDCP)o)SN8!U*%=L4k7A$8VzGRdzAn5UWE>!TzTxi-C{r$?# zsItJJ>~Z9{Ld_)8k+}(aTr*5_d|O9I#`{jo^zXbrP_Q&Tf0bH01l_Yf26Go`Z0rOx z?}(@KMW6z2yf!dGMq$V-vQV?EgF?st?3Co)>Ob;OhsP(KSB;nr5utg@=;&{Tub;E} zVY5#mL)DqIj7bd!r~`3*^1H(9f6Jyjk~{5;yBtoj;~^pVO%xlVlp`Q5^rfrtum$oY-nX^hhcm~Dimzy& z^_XiKER|T)Q?Vg~c_@5j3T&aDcbJ&M#}Ho=HzDFbOX&I#3G9)N=wWmYj}CtZn(x}37mbk39?nQA-VP15Yjf$AI^};CNR%vzU5g@CaVx5d@jlnM zBn=XA$8w&K4#HtCI22`#c1|Che(eZ!>>2Z>Z^sv*Y)lr||5Yf%9^JI3r}v|?uEQ_~ zmPPuhJ(&vZA3U6=)Q@wMwTg5Rl7<+|iQyCmn=X{zgjG+-$7(vU6UHmA9if_74AuE; zIFzhe18+nP4M!t~&s(CA^Y2fd@prpNR479+`<1JqwrnWsOsB%gOQ)$RgKW!Rz`xj$ z6;j>u!X+ji!{r)qJ*kgAHv4?7b$>&9*4le6iaW@GM8*EvJ-2!l+A1hG_8}~R!p$$r zbXCkrC2|Jdd`0R^)(I3KH2d+UiE9;I#jO^kTjOynB9w-m(kn;PE6*))?7YbgVm;+S znaJTq$*2>m#VlH-U@udm+DmY{OiyiDMsFNnMjT?47v_mkUG1XmIaD8BQF})ywS@<& zT+{Qdsus?hRLm^vPgg}~vS{WN%Ud-OV$C@hPxrt5631bH00}`TErxWA-ts0$hg*u; z&mFPaJX2C3QT7r+O}8!HqJ!-du37In)x3C0OXXk}`PL0+!|XMNO-$f99%awnvw4tWNaZ^cwQ+rjK29NvoQbsW^Q;e^ zt&B?M!$*ZjK|UBSKH5fi0a;u6T0}&kZ4hK6@IE>bzEpWs3qQmHDACxky2aMw-8qfW zK2vEeaYjq?lVU+IGqLT;D80*r$trnkgkDF+>f2IDs>}}=ca-j4{&Pi+vNyZqOEt|?mLOo6N z2FJp7FI!K;Z44`ME#p%JHZ7^2-#kAn0QezDS8kOgL6H@gkgXr$mMS2{M}QZf zX8&yafyGDO&yrPs+aaHE#clIaE)Gju;MI^Nu}bhpyvJ>K-%gr@oI12FeaTsVbt1FI zM2Y+R0sZTs8>Ox{S21Y2T=1B~N*$i79gdM=ZV((aTRO8Qoo9JRYS_%rwT$0_i;GDW z2Yw=;$R z^JH1~FLKT5nZk0GbktZ^7LE~(U95+k7J>vr_Jui>!I0Wqy~~IE#$dkUOd@via*U=H zPTEMK&O7Cq!yByka+%=+)Ne(#ZOC5)iG3L%Jp18We{9Ynl8#px#)4ubtgx zr1f}Od4EJ_+n>-`LYfhU0qN1ng+hgv0Njm88t~_r#~^=x?6(n0kFR^&8Ib~DYrix) zfTCjl?(ts%{Cm4JAX(4A3_x%Iem|P(Og}9d{_7k1Cv>k0o!S{hB$8{{m;|*x(7fwV z|N7i4I{<;t?6a9h8r}=(Fk!fcarDZAb~)$mns|1|^^TmJ3ZkGFb(*)>wa--_G(Z~ygsxZm=*Yx0{fufXNQDzD#Zg;RX%KaTlc!9YY zjc63kI~)f}90A1d=>9+Adi$Bf7c>0}LHHymwcVJ` zcvd}OInZ5~!A}JcfBE$9-R~!xTy4VBW`hKHR45f|0%6L8RA==*>+{>u?YL6uobEjo zFQ*BKQBAbuw%vx2-7^UW?b3JZj>+%G*6T*-G|4pP&FJV1r!Cg(U}=dIi1L`?M}U%= z#=c!Lok*5-dn}2!*bMgPI&jgN>-P6-iE@tL2(=^2xaz*WwRq4FS>N@`_>h%c+VURQ zq@M$y=c_Q`nXFB9Bc|Bht8XEG?iTROh&S|CXbrwqy0S%y%hzjIT~`wv5zlzOolveE zXi0|Be0ArI%!uasC@96XpnZ{2J;+ba;KTGP2Q+SY-XmLS(I)l{*0XP_B_E?wM~6Oa z2GjHtLfhurz7HICY?aM+!j&U^aWa5VE!p-q86UT7j5ZGd-iiFthNP}S> z3wd85y5E$eYEeF0BLzZE5j0g-7c7DiX5~xGm-s$y!dq3Qdr=e#Z)cl36IA)&zylZr z!)<)4qeaXm6qTQ(Ndg6538)&xn;3^6jr{DCSC3#6@4AY%_L5zvyPsID{4!Y_E2y2i zQMC+WXBe__zIfO_!Fh00;XZkDh(2@EWyFB$mbi&=xF}ORuacw>gG)iZQ(M@y%h(W9 z5_ng5X8J0lbg1Gbg6LV67ELN`S3z58q4*hv33<39C{yQ-Gnl z5nN1KX5x+$#y3J_h?LZ`C-{dkcXTj)gnhTau*YoysBZ~CedX_{j|}9GG*mt+u&N0d z$lCPMKm2!|%W8xI)_SeDo=29jmR#DzOcCDq)Ngz(w+BSU4R-~iqlD*?VGsnaey^z$}$fPJXsQAql_5^q~=ZsqfhYI}E zW&jI6__W^wcs13e;C2bHOFRtX^w)`xD1@x^l$chdN$rKuMy@vE?2UsZntEpGJ`R&% zT@ZrL`84?!o}H8RBEQqhl@TBm%TBI&$E9c!%$@Pd;T;ONo8~^Bq8mCaXw;iwdhkj< zPboZUM{tz8?wutCR4?IJr>Z`u%}7FEs9}b2ZF{zA$i{XC1|5kyf9|A$S1(@Y|tLWL6 zdHcOI`uVpHC6pj^EmNLNtM;DJ7-NunV#;3ZkU|k-oe60Z$u(3<@i@K`Wip(Qg9GAu zO7YZ<^|z&?%*wCU@nx+ivMW9d*=`6>uT(W;eNCZdIM;vwz-ubrESZ&jX{GM3mKa9pt zOmKki7EVB2>@WSnfd2pmvW#qxYpwq@8Z-SJ(ae|BiA>)Bm_2BzQw%9SogvqfMN@Ei ze8}2)j9aa6w7C`g7oClw@yKD3I}l$lsW9;J8oIiemOz&X{INK~r$nb=ENnJ_TyH@X zUy)41*raH?em%Mo+~b^g?lXggBi#9Sc_6%m63P~(CAe?iUS&iKS%<%OVE>C&7Y0vv zIWdL64v`QsTv59RjpW6%Z+WAt1w^z?lPt}GxeEHg6l&Ei6wVMIQ0SbK-rNCrX2Q>1 zt;TzdiNH^A*>g2TWZ>GinQE!kpii0hw(^NFvtSYHOpPY(7a4j=9l~ z`H(;Ou+0suzI%3mq2rAJI{pPf$4mT>C>UTNUqBD6C~1#K&EwVnfKv=oKY4Wk75~Gl zgF%Is1l;s#{=u(PJ5ULJeGCwQdt&AW?BrL6?Ynjdj6+~#19Y4-F)=@e+kRgDNALAd ziv67e_9A~W?>MvAv8|$kf8~4mDAO?Az!~KQILeu+qldD1VTa`F8eOl~?Ly0p3Qi+_ z@Lpe1iHn6-N=o&DZBC(I6KXMi%-M~*-qL~Ddq^7nU|&_OoGBM___q1uo;(vns5GXY zdZ%*71xVtX8AIw;GD5>QUq979mzH$niG2}Da+f^I*3*$QPNM>3%4*}-3Zik8x3FHG z^UR}fi7g)+@(YFq5Z%nB3Gt8BySUj+ zl9JPz+90Q|*T|yR4CUq9KZGMVVHS=!gj#q2OAb_vxp!k$%q9^)YTh^#2N^F!s}0^3 z=f6nrOutqt5C0f)9YswFL+ZkP$-LYPbZUMrowFp@>>bM)2ze=D=Y0>UwO&y&f;Di$ zx-KaR)u-0Wdy9zmDxA9=wL>&pSEI5>>f}vcf2V08|$@uz>{aXYl4GJ&X7{?sf z4_mVKnPHt;h=@8(t&X5TJyd;t#N-m*oe}UYUra+UGaFIAoMO_;yl(SEbhAxtj!n5v zLy30t@C`wqa&Sshb#kj{T(+?TYn0DwH2dWFzfxio)kNLSv1o{fwY&13$_6P1?3k#l|%C8RjBCe z=Tl{7P|I;Z8i#ar-pWc5wK|YHp^eGm3UO2ZzF!TXfnrPH(KZI#PXGg=%JtK#avbZU zz+*YSyx}Xazik_;IN776#U0oyN~tP(;g3tp{V9-F{dEFCnsfaa!9yxIvV1u=Zl>;0(F*o?b`vpWFVYEwPnnnj+2w zGtOa(UyuUR4PNx?UMG^sMkZ~n`dnx?m3`@x^0U-~Jyl$GqTcqVcsG+QDR-6cJ4cR) z_tNlnFSDs74^lvP>0;p*jL0`fknHxEC&hPy=k4KpKvFz_Hx)V@5c#-L%kvzx zJoCkb(Kr)QX$K>ARs#oT>Q`8efi@veu#ERBEZaF7TA9CeG=2#fQSi6G3`m54n*e}W z?vKDcB&FvvY!$=kJru_XUM$1B1m%wMWC4NHiP`j!c zO&(Xx#;;DYtiub%w+&qgkPo2HMk+-x&US`x26Xh{ds%vPiy}?Z>&VYwI zfnnw(;e<(~J5_dV5E1pyu8MfxMw-_Gx7P%xhatjp#HnoU%xCbDH!DBepD5-m>JpGqDXy%ZnYo&B zn8Rzf{%EX!7|KdzLVs{kWqic^#w$tCTnted&-^B}X4t^uOP}%gUY}WPku^hyPhUy8Pt?X2^y3}&t@SS@K()VhQDt2?k_IB- z0&o7W;Ca=4DP#Jb(9E2DjAdNx?x)-lwA{afXYrc_m~!M8j#63O%XNfA6>NWr5S54` zqvUC=`%vI6jr`;aQWerV3w$E=bznn5%rWRW=YAWNXy<#JOh1^8g{e#EVQmNWH3Dc0 zUglHclnr$6QpE{)r2SVyZBYkpDNqxFlR5~*<~F_t2?Ttz#+@?Q3XY{Ki_U|Q zf~^3SQki0F9Im9#qX9-q-ezLJ=-sg7+<;T)H|c;`)dkAPitOf=v$V|+;p6*N<10@i zMZ$_Ni}h;Km=Q&Zgg2$DPB*y$`Be~{@l7WaeSQ-7+7+xR21d7kJrnlzb%Xmn;g{VH z#Rv1&1DQD$!mgI&y|6U76aaIBI2wp;>|b@L0U&l@|@zo>_XeqzKZPgEXGe z=G}&6^n&>-^KU?E`E@0=rFDILz=vs1@C;+_VQgb({Mgm=XAYQi02m(wzw53B?IQ)p)sI51;XH9CACE56hw)X=>+M1X)^+agOU98 z)=zzhk8{eI0St^BOpg`Xk16P<1z;$%*8hhq{}aUaj(PMU5|q3P-oh}psOZ2IWwMW- zxku6-_^_Gp4jdKssqaM9{?fI@HSW|Qk49uV<83M$SN0}ZGz^SdWY_ewxaAp%Wm>*j z7>9-2Wb|3ToRBk5n`f?J8l{uFaFv1{jyBeF9&Uo$P@yQ^A#^6lFRfH=dD0!)n&}=o z>K5Q#R=K7wtIb++&R6|x+Qn>j-z>>?tEh(IFf+nbs5j)kPWrUR&C(SwXzuOY!9&z# z(5NV$MHC&I9W8w-=M^NXk}?AROt8F07N5DL6SRlitKDvn`wW^^g+ii)ez~)Ruc!a5 zj4~%X>E0Od^%As*tgKPnGQ3s@NpmS~?)|eG^wW2Df!N!7*`d`U=79mHVIxiu?+0Kf zI~FN|6rS~A*7tgZsL|j66IivNmLiqZkezeHWKT-Z9yg6Hiq{-B`(0>S4q+>Azd`Sp z>VI!5vW_b_v>g1dZ`dNUS>_D{vsO;fdNga6p$>-J(Q3{OC{8tveU%2yq9^Pe4&v@2 zF(HI21Za8hVe(yDgFI|7<^5>G&gyLbCvkI>rMaUE?C^b0yD5;#{SYil8Za^$*ENaP zINjVSv4V1PC=|I0~cFAF2vXq&-=kQ<#)m0cgo;b4v<%TWH7%%2ETkiL~|Px zTY=xsN1k5{gI^@0ID_bSspk7hssY_?!jfV{f`BoM%s3~0p- z9G#5KJ&05o0UZZKVr)!A${dWs41$jrf`;P~bTKj@GBUOzk~KCm2ZW3r3~Y>Ti9`XW z2_SxLY(T`w0=WKT?HvQrAFlXM!^wVbz{1BfMkqWX_pFW?TC1qo_^9e+1^$N<{A9Mf z6~JLgWy*wdwe=(9W4y|2kkH49f;VKl_=0U&Qao`H^Qz4Ll)nnWEhsfUkAhfSNXkos z>s-{U3NBL7tt1|GvHRPrdYovP;G!^5_ny80h9vx~b3xbKKWU*1=u-GT}bO(i(1xeZvA0@1( zIRosrSdYK~Z9J=UJs>+?-~4Agw3S%PlDJA6Sz}4x5lSquiX~MdnXTnBcED)RVf!KV zDmdTmXkiQ@PaPa8gwh&3@C!MD#|ckF^2h;mVdoQy$+-^euKSS?hup`#3Y?BDoir1c zsGQq%B-@PfQOT?I;Gh_sfXK*^nAy%8^tWS+P2v8UK)kA12R9qT ze)LUKt17w2+)DTvFzd?~s$rm9&eM%jGb#@Ui@wveBODWYw6IC9_^jsco`rsX(hE3% zCNKwEfU#~&>*xU>*R}m_u|EdF{-h_s5CFaFFn}1{$#*>g4b22CIb^ynd!2hISxRg;0Q*&2HVR(6wba@4 z=X_aax*$#gXKyqwUz8+;&w{4)S-u7;1y*u|OX&!Z+r5p`cxGSyuAS8V?xu$~HH>jAdr zrslh4?B~ni{qI0vKVtV+A>jeu{u&9=Y#fgQswNh*-?4K2ZvKxmJ_Dy!&y z-|>gnH~g@U7JNH&0^WpWDhBSmbWrS5q^A*?E%+77dCqfLD=KIejd;)Vur5#>s-EE=-TTQc%lJ@BJt+5Gf%Ev}&*EH7KH&Qc!>|xj(Yt`XgySl?LNICG4{7h zcmfd0?*L+J;`B=w$!}fZzqYaidM^MZzQAuudILj&z%}StAJGLw7XT%ifN=lUA7-b? z3GauH#qbKL9XNGH;EuhYngl=@jDJEDfJaWifcK=GQPID{1mOOFD6E5>t%Jd1`zj!2 z&+-H#sI;6URuctrR!A=S8YNMqRO#M04kPy;7E1(bxni>Ka4A`F?9T*H0Fm~_f@9{e?7K6r# z><-+uzTUx$=lxtKbCXPg*!*4-^c@ugv1JNP&`jOk``*25aVTqMK@d5(!}Ne;LGm_6 zHNuUW#CRS9MvU8>N`x`+>rDld4#qmp#(EqQNVz*p6%3*W>Y7a%IN1Vu$3IBtFO9AL zQ|SaR0XRi~c305oAJR!MmI$psU0o$^M^Mz_BU<&d&U>WB{0|7|Z!M(1?egyhl!+CP zRsd);Jv+}-9JE^i4 zc?(rDdw1Lu>JH8PJ-wBS(w0}GR-kR*ALBoNapX4fHCn|fp}Q6bKY^%Cbv$=t*8ZG* zOF@-goe~ofGsfl5=OR%3Mae+Xj*`EtOY5XJLb3@>Tej!HR8|Hhq4fOTtuQfU>YE;s z?|im2$?bSpY2%=HqPVJOlxUABWnes>8N=bB zicEqWJ&}OC{Jsg)Drx@C)sBr|gFGdM1`i^6TSN}!er7mS>Zr+-k5oOh6?m_t75l_T zBq$toLv|-bHzbVHKPW{vYUf}XtD|I^0cz+h<2ubrlFpcy_OBHq1r>T(QHK;{Rq^`)JcM8dPhg56jzJ6yH&ptAdES|jLa78 znAay#MoDx+UMUH4o%N}*(v%liw5462_${MYw297`Rt-Lo=7hnhjH5MB6;AD47k?qw zU~-R&)=uK=go0=<@j>7P%Kxsn|4lf7?$`7QuC$B7`NX-}HnZK@BwI=P7jW{ED*lB% zv*ZJxZU=HgSY+Nb;aTy*1mKC zVsKe-huDON30o#OaFgvHSd#jT0&Y>&N7|2gJRre*4gD!yl+&3E=S&3@gfXENbIyMkiDTOg*2B?ptg^3 zohgeFZ5oDUQQ@>_u8@rVXShDTfVG0dI$#Dp#a#DuJM#iT5yaqfnwW0hoifD0C$J~C zF>o<<_)eku1c%93)T%F09vGJ+~%@=CH##tGfy5P&DM z1n&9w*L`Q&{NdRAyxrem|H&j_2Smm=7&urtSe|kfPs?ApbpDH5`6tw`9Y2oMsSyZ+ zDTa^MR(M$!9p{88>M-ePto2;_om!T3J-v|g_KYW)7Nc=7Cgun;*9`K!09(k{&lcOy z^fX_)u5L-BF=E{C#Z>h5=B{K85-aC|urc&2fvnFm>3-_kxIRGs9NsHJ5EzRkRh_wx zVq`x2EXWYJwig7yB|x!BXZETT-6Hw&t;!{f_IB&eb3c@E<(P!37_Ei-Xh+Ih2CzY2IMTWJ<4n*M^O8|P-wieNKK)l3fuYhO@>!JoEqJ&>u)x&oS& zh1J@0+;TP<5dtrC3DIzDy$=>wcwajP(Jf%`H9h@Q#br>L3%KB|;2v0R6nxGEbl+ru z%JHGFZd-Bw|Do~rtg_ulXGd3bd4TZ=gtjxpvt>K%Lo>I&A@T>)9tqh>mGvSfZbkF;=_sg^>< zY7(13`Ku$Rv~oXn_e#O+iI{-W5?>uq^fze88svmol-PfQ>iC#5w8fKft%2=LL)BAu zB$&vNjiD2rW;0?PjV4tgX}61|-loRGcl*&nn-fQ`A82+8DonR@m3mh++YBR4vEE;N zIad=*atqNyaeVJ!<4_m9$J1U7q0RUNViSrIaL5yZ6~2Q34i|-Y{b``!@NDxSHHb8y zIfvt28dI~*%jnmR9lEL%;v7VXRZ-D8UgDG|Zo-}8I3D==%%x5t?`13@#<;wkgOiKN zA>s}8tApRyl$Kzr;Upvo;(xvfi{0QlNG$MFFyw0WNvSz5Zgu1WiaXKT`{tfDe*IGX zNLMJ*PMcnTA!Xl@WJ+CPZ@CyC%or!r*mqrS+UE1-uf$iZC7Y8f@y-UBIuLrVvhP6a z^R2_CU}rlmVzl0SKr`^&^riKxT1Xy#5W6)z-<)LLdPIT0D@w~T=nT!~mPPzJB5Dw{ zz8)k6e3p=S*$OX!NxOXwrV82tb{}%XB$~P7ip1+J8+)Y?mB7oip{J+-Z`Rf}Dqa(M zI#4k7L#kMfjr?K5=^c40OJQZXQ@|`ohDAJ6*bJ%$T|>nd#)^N1&0y+;6WS>M#NiQr zoJRaCy2Z0E5G3cqX~a7br?c-NU|E3k<4NC>;QKF(r#aphi z42uY_iu}_$eb?qLWA>DH34Kg{;bE8ha*4OMTbU;gbAe~J4>q0Q(sdGpo0Lx}M`T>(P;*`Po0re*(R(SIMZ z`c}mY0|zH|^Z4#R72pjI?2RJ#pNmkqEgbOCe)_QwaVA6YTM&r!VVEmJOq4L_2hzGGOe#&RQle=@3aV;`&esC9RY`t zTuamCx-XLJt?%e_rBrq?>fNG;-F>ROnaF8uj1&OOUV4$0^nCC!fwgntG`k|afx~As zzDVFg&F#}S2Y31Uw}kH})VFT42%z-SgB_Lf@i{59Y5YkyJ`@tP>kAWBSbK2IiB3l= zRIod(U@vu``#8p^(biz0`JS8jp2TJ69x`R;mS=%pTlsM-x;cWyn_ci~05NsY#5p9c z27rE$ItLx*cWlG~0R_qlP8XsRcu26}p#azv!Jz0M0Dpl1gZ;^d{xG?{mqro$<&}e( zjrd0jHz5l1-V@Qk$os>Xj69EBT=d)oE;*o-MkFZk?6@^6-~fOSA5>xHi|5~Z@sdQ+ zUOBkYQb_1N_IeF_qH}<2S*gRe<#nl>%BiY55^2!7xMuPCoR-wOn24;&R*oR#X^T%- zi)v`~z;U)g=2q;`6?n0*0~(2`m9HM1=l)m{0VQs;`6t;I8ewXjIq-A?4X-@<4-&oW zx`ZtWvo3Vxs)=Y_>od{xQb(iw50a{m0*||ZrdYvDg`1lJn`=m#8v zNr#TJ^iSTM=7Dc=uY)QXt4yBYtmOfxzaqfnHMBWYF&d5FQsva@{}``pv(HC zn;LNtKiS`^=kV->NYR5u!L~91ByF5b>Yz`U{twlVG1VH~#WlrnC6Ts0fJCe2E0Zi zGsU5=$x$OBqMAgIPF6iAQeAN#XCR?kROpQpQg@ZfuWj%bhn0v?%{dj_e&q_^M+7mS zgm%LhBw9guoa%z3JgOmkS8X&&5=YSaY`LVzIV0PN(VWUCMP575(=W$cw-o$N&k{*+ip#k@ zQ6VL1WX{H5(BbP01z6ol1e{xV{Z1q)r{2ELhtCA_55V_b-c%Ti?+gajd%3lMC2m5fiL2hv;N?h`kU=;AW>Nt&Q3Vu!`fZQ*NmJ9YHDXB~raA!SU+TKvZ*(2R0-)z6fbjI*H(e)s@*J*U3NDXVsDUbtn&ZpQVa@+V%@X*o z=m1(rK(#tM6C2}wD?cC#_^@PVV+2G2|M%?9!*TvexLR^kwy_<-7PEHppt>Y*$yq!d zJ=;w2@wD9Cmt*M1EwIGNJ*MQZz2Ju%3+Y$vUt4yQehzU+JeVGQpC&=%j-IU-Hq1U+ z&|;2kwsK zhm^`1{ziL#uv>wC3s;kMn5fN+trxF%!i9vi%sPkQ=#6#BM@mb*7PrGM_VmdmZIo2C z5Tn$7iL&G_x}^^YS5Gq$GCnBec6$A+d_PPi8M6z+Pa@5fWbgcn;*7S7fjegUt{7XqY>PrlpmFlR!^}w^r}h=P47o-> zf&foF9^uRZ5iZQYT|T!{ajZCf6b4_mKhS%50mxjo00=tYV7N1HwawQ&N@#rJzZ}5k zYjnxek+*=70FD_u5OGrUuJoE@WMHh7Tx=nUD;_F6SmO!N!ZrH`g{fEW1K7|CwHn}H z1F7Pn!H%!tQ_qJxP@UAmSRlRPc_1$3HTBxEfNnE4<#FW8-m%+)LhIIj(nhz;nk8)p zHJm*H8{%D(4)!~?TJ=sL_t6AvItiVyba26Y9`}6&{gQG6(RungRScNEPeh z(@EyXrt={Xv7q_A6nmK>M+!e;4Sz~d{o1_t!vdtoj2~&HAui?#C39iubL|3KC-nZJ zEDyCYn3rk}*E}vAT239^^8;Ef$gR8@qYNJ^O((|C(1c@2GS|Y?Fykbb^ZCD6)utE09NjD}j6*2J&{C-iokXQVr_!4ZZOKGzilH+PUz3%1dV zgIj;GA)8vdPO5d1vYi-nu z=e{t;mJ-LylYR3<;IPZ2u+s$F0g$g+s-mc^&U8kR?*KIbQ~9O}j984gS`C zZi&SUEFZkFG}&IhD?Zegy74a6bUi~5&pL1pPLYIdATr650J(-75)VwsPp~_|WU2Zi zI^tXE$#W%zMxZ4GvlbdA#wK~19NTUtwH=(k(n)AlrD!rOQ7$SIUFMtSRY#P1nx#+o zskwJl4Hk0Mc$-DzyeyIkAf9j`mj)xmr#;@!dNb~_AW^O#trz9fEZ&Dp^VpwJd$r}k z8YBGC8vnUr4ZH>rIj#V>1j%0^0th(t&%$&+%|Ynjw!A;4%KpjnKJ=ymDp}|mm;jk* zRzNcv0N4Zk|A!^x{eAy8ZSz+)_dRB}L?k>Abs;Ea&_04!XMrS^FCJ8K9;Kk~5v^A~ z1AdrrL%JUsHvX+UE+&V1f;Pqz4tsA#x>q`iNIg4w3v0t^?k8qem=!Rv)Hj5VW&@k(V0h4*ga$SAkME|x+&a7EZxx=Q_e}SZQmqnPy-!|} z>*Y{@6J2{$*H!8WA-{%%;%lo13bp{oLPdxLvSFW1P~P?2aNmJ+#;EC$j&?u^&rr^F z`V`)$AwUWCyr84S4&P)`F>$#9?mRQzOsdlp`W5Pv)z#_Fg}YVH30S?9JH}Lm>ZfRE zUt&sz)5_`(L!$AqL-EWrbXcqW>=-9vqLWBoz0Q#IT1p+NHqwfMOeaU$MMre46%v;$ z1{==X8@qv%>z6f!qQ3~Af(zAG2W{a9CVXc3#)z9^{PvYvK$qrKug**`qtl2W12eQP z*gJH@$s}@-D^8;2^DR8JuQu1~6P;K7pUZK6@?m~1N5uBgtreAIBn2DY9XthX#S$Kh zG^4Y;_jgFZjOYwJQGfS>RIv;|{pH`HJFow&l@BJK2L@d#8A2_mz(#`>oYrU!Maa9A z<@BhL3=Y0bL|@~))V51F6BLtNDe&bh$1l-Lo*0BP>)z*Yt|2R@w4`W^ihXWA3tl_P zdab#YcEQ8iDx5n)Lh^}3!(A=BCW}xCxg{phHgMBgCo4H)2#b{+WwlW{eMj{2EXw)v zoSMwv@Hw4R7VAq!c|?_hXF6{WO^fz0-Nj$%b-zh_K9)^e`4hQ$uVuc)rrkz6ln<)l$8s5C~ z&9K#hlQBHAKFP;QrBu)%DSoV(bB7nt(=T$woX-m%RUxIgRhaHD4VIJXvSItfop0RG zjD&eWhCjg@cUSlIj{C$0^=wn~f*Eq9OV?7_BU?7=thzIP?QI%x+qhwav(6D0?qbzz zb&Zsk%}LQZtTZH4EX!g)9Ah3)R_uTZjcCn;jy-Z+sHJc$_2C1e*=h{_*D*F;3iP?j zr>}GyY!}lb@Op#DRH4}h`zPQ%(Mw-ua`;QW3CbK3jyZgaSXHY?+z2ddB9L@kyk~K~ zJ$0~Lv^O6fs`vz!w22I>RUQ%CVC*&GmuC7tn%@C#hJOce3o0``R`UvsXFlw&q~cV| zCfj$Q_}T2=N0a{+7|ifTz|F?Y{t(guczXAM`|I*=-0823e`*0~F)-$ga=mlpanMJpU&($_aH@OBp}nLJ67S|0KaTx2|Be97V=M|Exn~X4 z2drtHr35`WXt`@TmZ^V|5rabbI=gFsxO7Yk+E(o1(0@61>Q(A1vtka?Tnl-@kLUH4 zS2J05;bA&ips0k0>;CBh`S~d!cUiEc@}%qNz+*j?%wBNmocoK5*Qy%*o;DWeVtG8A z)s+*Tz*m`DY9(!&+E3_H3RyP@Ig)c2p2GD)-EG4*cHLIU+C*hepYQWb zh7-NQJw9jC{+dMZOfo3 z$_~mhGL`3y(OOh-A3m|=lXJe&!){c_H$h6s?ItIce#W#4nxBS05H-cF(JdP(b;MhK z#L7|15`q{c;h5es(0GD`w9hHiZE?)hYO`_&qs597kXys0BXQmMt{P^9-!d zX?cZ91Xm{t zeQ;|IwvY!5QOH0=maS0q@I^WLAs2iYNV_!+a6T8>Pd%jn1;D+tZsn-jpuH`o)}HB9 zV~cJR-^%@qvOHMh@OjT?0?_U@&1YLB0ila>#kJfH7Ze(uwQ=#T8Xs1>7h%peibs-X zjp*I0fj@MZ@^OZZLa7&Pn}+Ro_JitP1n*o~KAC}#;-W+dL=RGt6h+wZ(fPtQM zx%E`{7>+es0;DMg&!@ggdCZ8@#9F3pnlTE83?R^S=_>p1z+<-UMQ$dpEhj8Oy*ief zl96qi1sjhvgB#BJ7Isn};V|whV%{Ru@45S!2`pR3PHQ+6!@q#^MI&J!KbX%YLl_tB zD9Iu|0SrKh5=nNg#zeEa8%Ndm78`~!BAP}3)QM9NFBe65_xWbc(ju%I$pgZazHTSt zcI$0CjdeuG;LolrK*d1RI!V`-6xmLk{X_5+ilu#BA=o;eo}YiReM7qHB!3KwE1D&% z6+lR5dH7l&k2}U^UEzwTNd|%VyvC#NFZSOL@ph3Rht+z)Y%Z-5&x*5qsR{#U>as3-@7 zJ^mhS!U%{k694=G9!8*nAl%P~g8_LBD4pz8=0{gdSc@GQk=ni8=|~n}7dI%`Ko4M= zhJO)mKk%*+j5i-df`&Lo;wRs5hS@NZlqH(8)pE^AY{<6?%^~nha%?K=BX&JEBbYI z9jQ${ozi$~$(7DCb@h66_E5bToY5+XrGF4b`mRA7j!81Bg{V#zOlhmAChq#&1$fTW2hQ{ygvrt4{b$R)KV552`^VtHe8qJ+Q&fgn(&SSFge%?kBAV z952gvXFQ9BN8%DVcFk1HO5RkA^(QpfXG+kb7bO{ULRb~NN)^uXJYv>(gV!NyWI3*&LwndKQC$rs)VGEz_^2|Le zH(>Q6QW8S2?n;K?w!_K%gG$mCtwW!}toB(L%WX|P1NR7KSVK`ayVc@dBJM0L)t4Es zekID2V*)o(<7d-lSNV)HkyK*pj(6)T;C>Ap1&Bk3{~2<7E#Bj3LNKq-bYA0hUL)Ts zZ|hZnKQR15EvS z82@8nN2sHxXJ8G;JL`RWsR7}ioKnU=yjj)?(DUs~Nc+<_0Yz7YvbH*U_9lRzqF}FM zZ(so+?x3Ng{>Pz!(TR-h?X5XzX`P&$Xuf;fUvqHxor<)2)^TSN4Dm{=u#I-3$Icw}KJiR{Uyv9xgJO{FJAXmyL&3XNF37Buu;Olv6Eg z<)6Gi4-PI7T^(s>b82WSkf+6;LJ>b%Z%DCSO?YfdUlis-KJ9}PNS@`S$~MvP(eHX! z!@CxueaOiS!QwHkgo}ALWOVnkPjY@hFkT+|8#P0W&*;a&p2M@}#f~l4Y$zY#=J-vh zERVRhJjtg|vIOCiRh3@Aj={@|wiP5F(t5UiVUT4;j-hEnjz+drMG{DX9Z=^K3FyYf7c6^SpvWF# z!urVU7iF(a>*JhVau3BH%b(fbR799CM2(-2+K$6kkB?~_lu>;vY?OOnIku#X%laNalEU<({{J6&;x z>QtIgp!0)iT0g-hnhag6BT=Ka=Y98C4-4LI)}&Tfq;|ocs(9;FJs(b4qi|a)agUaC z6UDnZ%<8cx6g5b}7!k2?+L7uc1FGaPny}yy5v=%}CM;XINji9;3{!96#_f4rp&w5H zJBhS%_A!OTopdjf>M$0+z*(}KU{x-M&qbd4om;{9@3<8-C-EQ@+0!m}W9hlOb)YE& z$fkHd-wl78Tfz7Tw*oN2i{&S`;@k4?aVs8n`l~Chq~{T$(c3SmG1&}HV4kyh7)y4P zSaFb`hTma%WOjetEpbeA*$l?XGozorgjJ9%Y|F%U<_eO$`#4WJC;j;~1FYa&_jJg| zbW3z^&MbWihQKRybT;=bfu#|9@n&5ZJD6Fq66N7fFusX4TyyC?jSNS??1Tb1%tHz# zMZ0YgCa-zW%P53X=e`6&?+8?a3kUg~yb!6!u>vMSth&h^rszgwhwesU8A!;_=e2jH z0(r)CcS&gSYGhaEq`G9CZjhD4&sIl>QuKwfl~WdtS3RVZRbhXt5K1_zHAE;u^0~iB z(WAYVK&-7VxH{J^=0P*#ps-0~)yT7>itKr0>5N|-yr!u85M)+BhxX87aLmHmK*Ayn zL5PY(=7QggdsZohmZi})jx!ofxwmGQf(dSkT&<~8ox$z9QWZ5?Q?~HxQge!$%#d)2 zZn;7`=UPnV(8UgT+JXjTsR5B z>>H(wooD6%E69yR!R4w`u@q_~v%1YCsqJZ^%!UuF_C{%=W4^K1iG)ea!R<5_X^VPp zhmQso9K>VcmT-%C9qA)+zcTk+7o7znsBhoFT?l$vQ!!6~xwc1`Ow`#abv`gVB-o{c z=c@)W*`2+vRyW)&PxtBa!C92su91X^;+Wk3Rvf<_W3V>o3y8oW4n&*=RTyE_M8e81 z%JN{1nRGrsFGKcMlA29trWdZsfV8dE($U?>ynq)hYxImzhCiKuX~p)d)x zTa*u*8ms46t#CAb?nyMSv9`&Pw90duX43Hl<`bsK459Ta`E;HaZcWu)ooKu|-L~V_ zABQXUaaa5(_xtyZ^#;obgV1!|yZgnKb~QU*^;XlN_onN#+oP{%$W5_zKp zumxuv{3u?$o)PWfE_}CPZKOf`!{OLJ-WPj8r|(UXG>q@J^f$p-NzQ%MiH_ z%tibpS)iGwC6*nM&GlLnh@aqyfy~+4=X7nLO0Tqe{tC#qHByWH9<7Jp8!>QIk{Bh0CIL;z&Li=CRwB zW<;ohI5Fk9C>4*C-$yl%9*DRX+LI~QloHUG z_UK{yEf^FWxT3*J9lP%(Kag;cqE-%e_JGzjOgeM`Y6F9TLr_qV{6o_k6CK0-6HquR zz?1tE6AC^5m$l)9fR?t0q8}E(z(qhvh@SbuRbjdx$M}8ue}BM#QXTLCStKkL=W4Ho z7t)(h8o)o11~GK_&QIs?l*qUnsI}vZ0Fa{J%niXjP$i$P`iwO?!yG}}Xm1;2ClrAW zI;0%;D|JYPWoEXJ`M%`OH1Oi(STw5Est`N%`>CJ02cap`@2Q7>r2f>pHCN|`y*~8i zQ0vQ;f3}T}S(EuQqW+nQ__y!)V{Y;1nT;S{iv{R`g4TEgS+_RFP(F8$nms=H#O*Jv zg1ucdZ*}#&+S;sxt#_j+L8P^bQ z|0O9`7Pc3f+7U8>`L01wmw(O$SM_z&-22ln7yU9nS3@fs?z?YLy*ONDG;R;QVCTSZsMFn*|z@^x4gpf0! z5sd}gx@^0ZKlBQZeDB>BVuRWiXW@Y7Y}0Twn3{`wMlKhdV}|bA6n4!oP6HZ1FG3BU z@<67ggOeed#C-9sK!}Ew=;U3Lt)>a;IYW3)yzcRy6{YV`3dM|QsIiy$Fje?e&?KQ- zhZz#cYFq~j=}UFx>1K)cs#Mi>GOA&hvdVOyzsY%!A2O&&gCUCJN2gazkA1!SCO#yD zVJ8zk^>|sKUpcvvb^NkKsmEuSq4i}!dZ^B9Ka@iLcEB~-%6s^=WNfE?$N z4u~jb!kx@evaG-zoQqT9BsnHtxS%v7+a{ECnihu*tzQMvw&v3uEs$j=MkVVh=Crd{ z5`lE~V$Y#N5nKfeDu_lQDJbxArvz04a4;<*c_4Al#sEX`E}hOdwCqrDKf=+Hb- zzUWrMMXnb?U}>8-t(bOb79sVhI?y{erd9$QI(+jfW1yBxli=lgW(uM8C$P4PGu!Mr zV)!~nQsEH&cVx>vGx-TXz(8S;$p26sI^ zaj^p4HgqYYHTUJk7V5`#0q|x6b_z_8me<9J;PnPO(OL%fTvyP{G_DCKH#i6y9Tr|3 z&k=e#7YjjXi9ZT=3v;F5N{$PbYSO5q8A30TQQo%8>r@xn-L=3ateTrfK11#1MUV11 zdXf84OHwDoVu-UhEeeh}%g9KOrt0%>5MPNQtm@S(lFUQwPj_?i-jOsz&*tA%gcpKy z8g!(X7xn2Pw}jy=llC*!S~)ouA-0@>V>gZ$+Uts9IK49o)4`pK^0ZeB#l&qn0v&9~ z5ODBQz;uD3fyQM?4!?OFL@Y7%NS1WA2NVvY%Nqzvnpr9+cxN9Z((tLEM^6-aG)6u& z-N$kp49j4QQ(Wj#YR=e9n-N8n&)P>P5{5FD2fKvGZ%RKZ7YXU5ess)jzIwPX9)G(p z{)-?e8~}jc0KQPa-4zaN^F2+*YB@iZKZ4M?{e2*ao{sh_2%`9YPkb#v`+axZpAZle z-96LlKM>IU^8fgB{{;RBS?0>NW|6QYX;Hkv=!quQe>UUt7OxkoB+ce=^;@wjFdUI+ zl|1UG&YdJE=1%ghzz_wME#08oeKiC#dU-uQ&cMFy?eaHRBTSGpHSG`{%|cPzJsvqE z3(%Whmq#Kazrdf@L%w!&>&##yZ$aK&t!4mdbvF9`HT?PQJAO4bKWZhv&vCR`-+FIlo9#+Gar}YB}9YJk1>=NDM zD>n;IC73uKPk6>v!}OB$n#{4_Q0S*w8tzN`kWj`J!)_*)TJx)>2LGls1F+AZAU*gZ z0Qt-UkWbq;X?A@YKZ5Sb5cezc`M(or0P6V((z7zMGqV2>=&#HFLxH|O-Ctpy3xwHp zs#iUOPj0u3e6!YRaH^damrn{awlBps!dsO^%rKqI91m|IR=5$G(UV{eTb@TIVR-xY zKi@keo8twE^IruOISb^R;jYO4)$Crmz|{VN-bT8JI?V_ zmy2h^>GP=Y!0s}|!B{taGZ?9Emd2Hs+^{mljXR2SMk=~fBLcRXVroM!@IDj!Jhtxu z<2KEujOg8}R9n2&BK^Rm(%D3!n1~aL)WVkF&h2NOiNNdU26C(pB16$rV3Ul%(aCs= zM9Tc-y1Gr9`?DM7SaI%%!%I+G;%<%>g1x7!G`W{aPs`I&3q|Kfis)ujc1BScec3DU$MvED;wU-&*G&$~MC0alUbc z%3Fp)oDyr$Yf>tE-!Sf%rpHymnK7JYnBg_}*%!QO;TKAAh4@H=>Ui0P%SDlpa188O zUvNG-PvRw53oZxEwq8UL1hEM`1NO}n$>tU=u3aTIK66c&e98ku)Je_wv7yZ?j^4h> z!KSUgXrDyrIMM7HOD{3K7OWi;mb6A85TV3Vc1~zl&?7JMrGD(lDaEY+q_u(l)uSqu zt!xCHT!!f0xtbk4Nz9sD-m?@%OTqvf2h1-nrA)R9B;-!&wdtUTM{urQ2u=5wlPP?u$xsutakaNibJy>0)&(bhqnH#VHOkWz=2) z7zTuAQ(-{KUGlvQ-OO$$+z69Y6DMTmT@Xys=wGZ~U^6&7!a_+>PK8|K>ldEJegm6#i+S#iVwDRBv=Qh_L3l+YC;fFvzqeb=eEr~ z1yR*4&jSh-qP|ZMN>}916vC`?!SI#Is~&C#jBi-S-W)(}1|T@Quciltw*Tx3gYW>% z83!P{*7)^8Ktu&S$-80=#^6<35-83bYW)f3fYM3-5$62!NDe6-$yX4A`yIq6N-ErA zm7h4w0CO1e0lk|HfF@36dKN}TrhAGqz+gr;diIAUtLopr-#>#Ql+1RQ&6OnmsIPL0 zq*ByacAq>|XwimdE`DrCX3|&^HLmfF7wb`bCW`g(9rT_Au?b^QerEvGVv$tQ0JflXW1?9B(M~{9-zpdibj6+djdmg(>JJ6P!(N| zo>!7-8L`184F2Tz{Pyv$w%`X8`QEmnv`qYbbK>1&6&d_U1_U?|mgbv}_6*XCSGb-5 z>AhDITU2+ful9E)k{nE#9p!}<0Bsu`Z>;zUL+i_>UhFtYQMM8i3hDcC$hNoUQ%9U& zzOvoP9ccZi%t8TWFwf;|=$`WBS84lBGxU3D0|x+U@IV0ku=yr!R`pZ)c6Cs^OTkk0 zqi1U2zrv9JP~d(r`P|Px|3%=KzOn~>7dR$BEAf9SaDUqGub{$U2DGgVZve6m4>L*9 z?y3C%t*Z)mKNmbAMHp?&S%~Ol$|Px#Ia3_ICDVsX71uMtYiu`*~LGE9$RWRHm0 zio$)ChQnRVqy$d+HW4fh`y+kBF^vx6(gqw{i1gY}UXpVBcAq-ARvh-GsA0-&i2_&Z z2KJj$-MMI2zV?Ka1qj=#eaIMSb}#$FGo}|v$}r7pO^=W1?dV>&Csu=;@wf?UdBYza z%o3WQL(49WDwQvI+B#ZFic~l#y(m?%{~X!Qm#-2;Z-{`OhC|6KO*`+phW?cLx?%gM z^s*lFG+u0U7u@nQ(^0~~HgNC|VLL)fSuKXNsH3S;)0(NE5o`uBS)+zGFR~0y1NPDjR>^1OgA=8%Icn zvAn=jX`|0Y{0=0RM}7Ro*GeY}{urE%j4B86!xx?z`y2b5!EC)5?O`4W2{*w*=>t>V z*(P1GEMw~6!!UgI(|Sm(O_?dt68ItL$W8^3Os@DI&4xfLAH2T=h2{6N2ucmfZPpST znS$Rm+7pms@yc0#c`e5~A72Ia1OjA?1Q%s|b9%b{lS_{)dHmJFnDFBrLOHLM4_I2CanY`rTqaF{-t@iqG8=#_HiMn>BC|! zVsyJ3738n_$vph_@vr9LH&EeCpoNbR=7CH}%ARpXBi={4S|h_x@B7O0h_MVuIQhyD z6A`OzEh!%p;sVF%jzljkUBU5BEULCfODXn+b_*!nJgNM0ZqNC0UVE`UxLCH`SOyuSC$SNC*nKLru zmG}!*blyibb0>jt2j(MZa%P&$C)15&Uy$vjbHl^3Fj~xM*+$cCBL$x7E=sF2aMww` z!V*bq5nGRb7W#gKa|LNK7o zWe?mox~w%c+OBouxm`l7iJV^To)NA9ww4nX0p>X_DdmM&9A)`C?lf=KBEs;Tc)Cqf z^HP!s1F$@#qeplOkHr-5QlBM?zC&7i1ut_lQJ1E|^D+^ifa;d01{G9J=Kd+G6JdCH8ol6YZ9CyA@UEaxu z;-ZL(POLj=wY>E!i1ueIYBhjv@rzKt$&MA-FlJ94+)Amik_vejz=LY9g{Uwd|9CVV7%e&TyzXgzD+9lGe7`!1ej}E07y{%YO+yzf;1qvm4+F{ zDwfN&fVZe;R>pr#J<`ejgcD>Xzc+Bhz!6B;>X=#qCO3<@=;{EVfD52#20)H&a{sLd z((G@D0u+!NQsomClP8pykx>LRe146B1G>2B+38rB7#SZrKz?5SPi*;D?b{W#JhC|w zeY|D;I_uHhrKwYJ#Gfw9TpfX&LSP48<@oiI$*mA_`@)T@EUzCw!AzVQDj?h4QkXdo z8%Gg`3*%}zo*I4&|Bhp(sOXMuuBDn<%d-lkPCO9@p|qvB$q00I1}A~L#F_Ctaxq)6vOCVGq^90Z;O&h^K`_zlC0YKf;}_sm@G-pBT-6^PR1?Oe z5=(*yU zWj(zoR#6mJs| z?6zAwG)=NHe_$~Tp|1d@L&LQ~c6e0hatv*HBH3R~aVv9qtIIcql#uo6Z9g27&mxys zv6HkwW`LHTQ7ZRZsk%-%&-85tMOzwVL0NbAn+z6IMYjv|9%X#LDA8;Cii}^i_oa9~oK{1ck5r|D!$j2d(J$ zC;yl*a(}i5)~+9i`wI4j0GR$B=mRJi00`{i&sU(&2uRX0GP5(YtJ3|CAK;%Lf5*$X zTuZ{8iwUP?NY0#TZY{QrJf*DXGUK9Owmqmnv=p~FZ^!9)AUbz|s9u1vo-i>}IrV!G zhRUY{1#XXJr&*{iOT3Fn@jL;JoY^;q#P8d^C6zBD6u`x~-NNb@NPn0$_9F@~L_8(= z;y^-+jO|0>`0f^b%T=z4VUb?`Ejx5Y=po#6$*W+7nth%XHR7 zXsTddQDXy{c2#l@X2=MNL;^ogJ7*+?FH?2`) zqEuvVs0xTv&NoyQ)ET2sFTXI%iZxf&A&7Fjs>Ui7CTY;y%RpYs63u1|7|Y-w>sgS- zNj`}?5~b6*^m4<`h7zCQp~5A=l(hN49Fl)-xxp#^c{LJbJkST_g9U(~uva#k^&R7k zR=|3);%CwQSb=fFn`8_&fi_?{*okEl1XK+*)OCsa+2hVBP}ZSw_EaJ{I`2;w6Liwi zYT^6VkMkOYyz~X&>xejLxi*vFdkD+;$$O`);&=7w!r1#F47`Zw%SdDyS&5g~cFyVP zdWCLvFNQQ2ocaCdO?#hX@k;f7sJSR}6pK6{KM&9JUWF*pd*nH@fUM-1#c5c|?oZvh zKRATCxdJcs=u|`5wv7{4cG1D} z3Rf}77psJ5IX)nimu!(H@5LZO`v{y-F_7WBUFHaiVsW~Y2)J1c{J2ej*o)_OD*90u@3221KLOKqPUS@lAQJm) zd+`&}|IQCes~*R74WStlNn`zGn1TLH>Au`pEzFUAGNk5Mlbx}?OIp>VjSCH5>Ks;~ z4;07I;Ii7eV(!UHaV(T5f+D7gN`zdK@duy`)lRoyrdPz>fBATUMj!|R|K=7j9 zxxT{GWJk_WNOEW3N6aD$&&8F-aPz564jI~*Uz4k15qTC?)lmyFqlPQ52gRk_^ElN>~kybcVFEG1tz?p7;5!rY^Ie}+7n zVzvpMnYw9wUMu+w8DD5azA?Q4ncTUmm!7NTl!F)@G^H!lFhea(YTSzyV$(4L2!^Mp zk2!u}k*!Bt!Haxn7yBwk6QjGC30Q`fXe&(@E7vOSo;_WD9;3&0)Bp+@NwF9MhO6QNuLKfg!1Y z{IE4KOJ8y;t^;Ado~<4P!XxtjVN>|pGIs3EAxD=X^_6uoF={1N<9%$7SRO?Tf5pu# za@jyvLfU6{4XMH6BC&T=u3|hbl)~DW{CSL&)s2)@D1jpZLF{~-T{l@f1jpKX^TX6i zz`+k_0vTY=9c&Hk0AmimMg-~qJTVf~24J-BnO~H?8g5|VpDp!$gNe#dSV3Hto{En0 zKGFw+LM*Ohtz-F1{rh*ax2J#^(RwuWxOCVLVL=oW0DJ%(MFDV>2aq7Z2N(ej00|G{ zN7?9@m|2+a3tbrQr;&bN{txc_S4jWH=|d)N7&vE-WISWADymS%dKmi9yz(#+Vg|;| z{Ks*E?3HP^v+emx(5Xn38x32xkY`%JM)qjY%OG6-(*-@iZ<~({+kJ(OLE1UWbc+iw z6B;tsMm_0bkKoHALUTtaSq?v42X#M9MPrPjpK8Q8+|`Zq(|gu18}Ym9Q@NP#WfyZ2k#2ypW8r%?$;Q!WGyg^@IVQIL_q&=O_C2 z%$A+O5F{M&c}e`lN2&ZT6EGyO(6h7a`Kr_@8ADp$hBZ^3H81>qpc8uAr{un zkg`1f6{)Li59{8bm6AXyH)I`~>wMOoM?{z9b`Os{-{xV`$7goak%JicN@s~OV1 zotH~*;od-t&FZGF%SwP+rhLOwaQko7q0lq)`91cx$T43G{;H)vH{b#a z*9htGziKJQSH*i6<@$%(OAI=+ud4az53hL0#ol*<0XWv#?@Q1gv=V^Z>FL>-07HIM z|4=FapY8NlT9}vNwHnoTa*F!4S*Ck*>1C8k0^cHh9PeWc_HahS&H6>}LS6O1q3g$L zIwcE8NPM_>miv`8=X2R!)mftL$#`}3Z*%#0DkFC&u}9wygW`eiS->0NDo;SKZ-J5-55jcee`j=%462WN@E1~_$~n4gg+PDrnBNB*#=E%i0PfpOl8r0T&)|C zBGrmYT8%PgK~ioy78ybu4b-Q-8nvuJ4> zeNJctw})LfA{mCd4%jRR_E@AlW_7=5XPBZ+5~QOu--VnTX1X4}<2{u)HWY?X%sOO% z(IcZXiyxW^7O7sW8q*z2OF1?Ie@Ur_Z3Q-d-Y%K`zKFH-%_@ZiUeeR%O5@rckX^tn z3j_l6=u?*JttCbiwam__{}w+(D{R<^tN8ORUzJie z^jlkS{NPzZ-`D(uVvTs(`$HH{qqa^no8G0jHD^OfMmr~=Gp*&8Uy=&3cj6md zM4Ws$ke`W*<<9iOhGS;Dl*j~wK*Oc?-1~rO*6cbl)qlZAICfHJ%1G@6cJ)bpG$DOS z9d9|8-$B!L)M<}hvAPQe69+j?j5a{xMpk#oZavgR;BQm&LP4-*K6g>?X=!$l?QI{I zwf?S*|Du|U{8!Xm4;za2RfeVlywjvh0RcR$96IP8rd#K7p{Ys)s&;s>&rE=HJ$n$x z(c0@k4Pe%iyvG@6kKQq>iVJE=D_=VF6NvU39&_=My^A%+*?lYwhfyM*Ih`3EKEOI+ zwN4JjA&o`Ak*%VRG2r|xcqMy;j3ki^LB-@+#Jza%O>jg5rHp`yy`z!D0A$D-$XVH9 zsX&kbwmWVyXWWW#yC7nh-J`iB7S~J~-E+(3rGZcy5OyIPypleXXyv=AgHl<_Lm3i+Df5p6 zf{U{xFXhxa&>z&C;6cqz?41Ga3lf8hxKButl)X{8Mc+EPb< zJc5xx<>T;i^@dy7azd|R4J`28Td#!WO%coPFyu~@h3v#L1A78<#Nv&W%{>cWhB(0@ z&6{3F#7VWfwDyZ}{uO1%nXqQ&T!{cKWDyJXJ24q-aoM6@!gPMP>$lXI;=xe26iAo# z>4xXpFKGW7+Ws7-GX~7V0ii?F;OD+B-#z0jV%bPKZ55^vV;ocwc%nzyD^*kqaJk{x zGBre>-1HRNX`}~0b-)4g?~QrXk1TdD)20N?T6dDF~1za>v0HM?R=HdbUe6!rQS!(>ZWbNDJ zI#?9^e{KxWtdi%e+e+JRm<%{G?s@q`5 zo!~qdN?|09=f8fu_ia8f+&S#GCj4_^peHnNn8I!evJ|3CPwGdxxLqI7I zel4h_@6YQ`jh$jXIInKTb8U_Oh2TaKX*!G z>hGLAn7{&OL-1q|LEm%4BwEe`m>u51e?Ae9Ou>gtd_d2*=iE7>#dS|VbjEpg!NLeH z7;NG0s#`$ShiaSkNG7DaML~X=ero4ui@-h7XZ^M^i=^R{G@}>eHX?tZZDgkJ)wS(4 zC{?S4CX2Q~wINTaHKvox$!xX+0hT~y-1fmG#%{mN3K)v=#M0v~w->bgVGx4ao$q5U{EY@qLfevQfHv?{XO{Kzn3&b%5B}5Gp~H3AU4}BWS{4)wt{N- z&6)P6*Zguziwxv^UN1?iTy5qr7l-pE;Dl`5&$c3PLppcDPlg$k6U97U@Tl=z)lbq@ zkxjeF42qT#<)#tR5-Yn#$3hgK=r`-PnS(gY#x2+)L2DOncl%ZdD zF`>Dq%6-Y5)fkqb8m`j=A4?HHqD!I?sywmbqw%9fOhdyH_YuEyNkL$GZ_OX|Eyxt# z9W&%fdE2!g3;i1@x+@zV+d>+5a*8ADw%IF;+N`bK%*xWycrUl1qV^q5I%N8gmN9`6 z6dvK?C=e^pzF}?M=B!3;Gl?y7Wny$qZTLG1mJCc#hcFEVLUHq_(!|aY$`t$W@gutZ ziIr+nhh(P)uBYg66DdD{jDj|iDd4gi$&wTuJNqT#4XZLjA%owj4p0416BlL_e3Thu z@WkU<%?>>uhKd!b1TWM8jeMqlLPlj&pq{jFo$U76q&+k)e6 z)iru;T-OGY!eCL=uT5;yLJd-sImzWXQ?MA2YiC<&Cr)2lI;wru?z-*_O!Zt#tPlvi zckxWuYV2$)Zu5ZI;+1GVDp*D-cXW@`_V%zs$p>bhG*)7$ZNa>BYtsMB&2X3a3@c#E zcoOV`?lF*tWX&5}4y-`e7T>Z?R0Jnmer_L#QV8_7ud3QQdhZ1DUcSof=Kf~q+w(G+ zcZ3zx8R}-AN?nr(s#B*W*Vesu3g538`n{nwWl@V%)h<7jI7KF+HDb6xaRTO19m1@! zvXx%C7{V}^OOIWt(^TGh`9cV^ZulOl%&@w^i!r|LI9?iq6JL1r#IxA;TPEvGYGwz7 zrVwpY&_Kh?9IV@5sx-i@HeYNa<)X&c;x5h@<0*pX62G0* zj78$zy1T|f!fu}&dXr|@J48dl1d7kT#OLG)clVUMZce_Dq*HrxG8jn^1)h(SV?&e| z^P?iPLDb!NYQBdJy}dHg=E9wS9Ueb3{zSef?Sau(K(=$vfEF1u%}PQsHRM1grArVm zU4EMMhy&xCfjrubzrXyK_cttQ(nb%sjco6rYiDF?XkqZsc!l|Iym&BFfI1T*z_>d5 zJLBq}KR0<~Tmks9M~3{*Hz!mw)HkuRwy-ufHMIZ1od0N?1&c}rP?Gt+2Ey-cQkefj zxeEdE1FY=;mi_~u&dSIR==uvNoA{2`kB9#kSKaRy2yySERZ80sHBj+B<6$q9>I3 z0`BvR)calU6&ccdz=7lNql|F5-b!D-sI~_qGun3c-cbK6nL_qNX`8(B$Qx^%(I)DB znHcq5$u`xuFByek!8v0Wp?R#@Ga@m5>{CX(A8PCTZr*V7BX#lYK^Pjjy~e`iyR((& zWu(_`=5w|$*MzWWCs9eI2_%ojeG5{tDggf;%GIxyop0;SC|gCNY0pVt+UAYHD-0hN zD=kUQly3as$~5ec<5s9_Bw7ovwfXiY&Yaq|_#0f{afOY|!6wfqrme#dMKghmK!8DW z?)8e=9zj=&cFpj>96`{rhH~-j7o;|Xf{+bH-&g=i3lI+V4P*2T_IdJm&&jgLHT%E! z)%pS2o5J0%2^9>S5fspw$X69`Eg?#5QmDmFbjQlEYe9E>fiT9D-mO+9nQ zP>$c%sbx0lADor6_l%9-8A3=+uO(8g7RFd$r(%xCh@e~P(yov1x!|Pld*^h2w}$M_ z6IP7KDP+OpYg%e)H1D^1n)GC&K(K_^cqSJZwZ~22-ze4Rq|w7M{JY8xJL%l=3L6!J zEay~nd(H`kU`_UquN<0HG~HZJF7N_Z=n|SwY@AAq#Wgc+M z1aGGpy*oTja`fJ14HQ9YQ2b@{KE(f!)i23pL9OFccv1=c0=dSVz~i-+DB~>kG@;uv z-;I?yavrdnrLAU!1(D0I(++>8vq~V8j0N7Q4KsFUS~jMSNB||L7fF+3Iz_00Yp7Y~ z@FuPY%0X~fxH50x=@@mDm+6l_HipFN;uUj)2lo7=wqdy*$cT|j+JUqPcD8uvJyr;F zCydAOEq={F9fi=DbCj8%)7LT4{?a7sL+=2=r=80;UV~mA4j}2OuUmR@TZWRrB^$Re zDM6x}lw6>RY)1k50aNH@1-g7gFhIoDo$kHR22Wvm1bxpuJ(y3Dd(K~X;A5e^KP(i&{~TQW?_K&o;l?-|cL()_%<@Sy zR+4sPh~ftVf!@IkLR3pC?k+@6-ZOJ2PW>r%op-ObUIO`)GpKu?249eg1Z|k&D5OR& z*{)2|!OK{mc0HS_KEhThrKxs!vORc3zJgtkmq>5MqZS`3u5w3~8E2#DKONxkq}@0j z%!GR(Qt$W`9REP9!4@b+?EAZyR7u}@SwFU3*y@!%wLgBy&mu#ek#VCXcIgSg78cvu-d}D z!C*^QsJMGfX(5=QlenC`FGF3)B;&f7nxR7(*HKUhBM?NHE8H9Wzl9rbw1E~1fxj@) zaE4^pT1vh-M2_+QJKT_B&kt}mo#VmEFeZVrM$qlP37FNMWcTf##1W#)(3$JRHklf> z3R(&w8AP2I8C+(q081mF8gDt*>Kbot+Kshlb~udjV`%adb}ON-A@r1PbW=uYL)&UP zGfSYiaL5?Mtvvh$oD(=?$6sP!1pC?%&hlwZWPEWVM^)xf6q-1~%BKHZ)Xkm{uyY?p zfnFfXAqUi+?VvNnd>0m8h~S{77~UOz=Mtb>^vvhWSIRO4ARFSyV*JN9P3~0W4F$S- z9F)~`)Tc;62HiGqM@nj_Y+Sc^r}fD)ZcJ(zcWka4!)h#bjLY%6>b_3Cvjzz_hLaJHfDFO;WXn+n~lqWX!WlybUK&&t-b)%uGpCG>~X}?@J z8Fh{I^Lv8aaxlEI3YJ08m-Ki~YSKEO?f*K8(( zW@mmLSinkpO)jXn^8Gha!B0IeBBn=ZJl^d#=dZyOBIGTAE7T}=5^FM>B_-*j&UDYX zvbzUzOMX%ay&&C4b1v|^Q^w7+HKiE_Aw8@hA2Xi@Q(kL@>9l0zh^Agmf5M`Lj-mWX zqpFuRH1;5kJSq!v>~pz`+zcEXtOsm_(3iTea}gnDInw3KeUli|{WSwdX=689cTGwB zRE`^7Z}rsPldEIPW6fguJyM_2LX{-zixSUi zU4dk0-n^J<+z9e%!)$2F)@7xYx}N9HeWIM*byD#cst+ab5$a`>ERz?Pvaz$BpwQi~aV3;vn&`IQ}^LFS&AYbftk%XRe8#Yk(Ddt-l>@o}-{-#$U? z-U%WE6JX?HZ|Y!e=Su&_0e(oV_{)iW z5b>j^Uy1iPDE&B(vA#Arexg+7f85Zo1@11J;b`=pcT>gd+RlX&bc#j~2dM7+t4@F4 zfP7e|9Fx_Oq!%WGsd_b^fiKO9f519%aHQwrE=Y=QE&g#WO$Z8lKpRsWXChO69gm_w zJ87JXhH321r`85epp_krg4)?m4`BZcX7PFjVpcq6H)xf&9%SqVd{WaN{j6acP`ZMp zD3CAk={n;C(r2{E%@wBT!w#N&7JY?QP}9;hpO3v;N_QpUjB(qr^B(hrT7I7^ASuDZ z3a6c>!$HTDtPF-?VL@wzYw)S3u+%~YE&iv^nmx+gnQu%}qo()D%Xl+_El_9-ZO{~$ zut^84nMmXaB4ndT+8u=Sah2aand4uSmm565VN^kgE%OVU^zS7$Xr!wp8&}G%h1e>I z%_Yrj4XTnvH4`7ChgC^X>K#a(F{{ikpAmuzqHsPl%M`YNrc^S(nplq}8|gHi*7)L-@$qxd6p@LwZ6(Zjw6AU)4x}LraiQy8 zU$d5tTD`5yKV&hyes!t!4X-jilT9Nlws-$o>}?d-c49P?DyN5%97kUEtgt*8n|xh5(h^A z#?O+ypo7VPAjlt<`j`#IrCWJWs7(ATV@67|?mLKpI!ZTf&MBM%&N6>*`_^_I32Hw? zqSv*3@7US{aQrLyn{yLPfw@D0T)?Kfk5jOURJ=68gSgOQa*=4EnSFFB;yzMWW5T9+ zy?S23FxJGV(Vz3y zor``{ZlB;vOQ*UZ|B^!J;5DY*;YomlWVdmLQmKT&Ld39D8Qv0P6cm2S8{4nXC-ct4 zQ3xD{<dP&quJn#h@Lfdu`{)&#+S6YViF`&(Cqs<}0IdY`5>;kG4T2C4lC?f>=(e~0z} z_UnHF?d?DNE>eupAuc8`E~g54%h76U>**E*nVDk3IXs)t4A>GblQNS~y1zf_LF2q{omQV9jn}L9cU^RYPwjdrLJiz`G7# zkuWK8j?kG2_|?6FGCR`}a`_I6Z(?NV%v%@AoGt|qPR-0Uw0I5; z7g}FCTK6$7jPdf-TB42fOE6ex&P=#W9~Xpr*nj8HgM=vkN`D z6=>P**9gEQ2N?|>v$Gb+No3`RmHJOcAgGNa{7(k9ASYAJ@OM^W8mOOdL+fx2^yp2} zTRosXmIIxGp@ktJuj5xo=I=3w-_tod0dU_A@coN^`2K&&*njZ-{T_k6=+mD`K`?N{ zN_0OnhMrnE7~0v`0lGjF{^7WbTk1*tH1=WP(0@JoNA@tF(9h8BCy@vWhpR-V1Xwd5 z`Qt}o;dh?!p_lu2QjinC2m&&RSs9t`8)vex+za!Aw?`nVDGl5fCD-H=tPQ*{m8zwe4TuIU+oyjqBg&m?5B%WO2 zUlsHwP~x;|m=cA-ubkfE=bQk96Wl&o6xhmc^}00byziVpp6YG(V#%|L_upr|Br4j9 zw96F8ooCe83z9ZV&=3)QhlGZ^2CVui`CuJ_GNzF5Q;j0Iyhu4La)R2@M?|NokFPv@ zkL+yHt#7d-r?lBVms_)XG)u@Xzu@{ZndXw75yTIwg%vKEJ^m=f`d{DyThs~Jfm|~) ziOnO%4|PXsX?y)7ADbgTQ$v_Qvvpw!95(IPKU-c%r(Y7kTk=&I>~F}}DvH74d|&8+ zCVf<$^D6H+@>I0o?Iuw|2|th?ddNOV{k1O1I?HQDH*REMbx4P&%sC|^cgiGPt z&h5jla((d%?aky9_)|AX)lOo6a5~=CWaNC96$K(5U0p>6Q3yFLZ*bBWXQqd+=nHud zu2_7WR{Kk^WWgySQM0Vt{^NuHdtM0W{}&Ga_f9fD4n8v%+k=7lzwO|&00NP}_n`s4 z??VF&=tBbtP&PTn?duU+la?;JITd?0O_7e*)?D}R3omZFgs5n}PF2E_h6_6#9ke-C zsG5ueTM-Mg6_TXcr>0c~osei>xyZv@woPw@9WRzImUJLJdLG8w@)*?@Qtn z_UNH!?pcmk*yi>h&IbyhX%7|0+n#-K91xUHq}9K{CCLX@xwdGZ+RbmWZ!$HrxK8xxP@*prl!PV5s+?Muj7 z4|swJfBcI77Liv4dgjEV>t}{ih^e>@N)+F6JJ9oY2VaG6FMhmf+P++^xiq>YnIh>H z_(PcjP_6VT4v_Z|Js&?zQGO!M zx6dK&v~D_|4BWx>g_j_|pAlV$)KwhZvVNWx&b+ zU4XruTlo_FhQ(5OcwK6(vxeXevR&}0Wa8R$m7Zuk9DFhdM?F&qU2}6?OGkT4fP9y^ zwK*UZ;9zQGYOZT#`&Bst-a|=Q_?eQB6ceC)KP=y2#4g-M7 zA45jp|37}{e*&rZj*KjY4d$aMv?v?_Q?J~Ud`7J{?q16!@JA=82!FxyAP;yIdkKuk zjks*USrgH?8FCR$T1207!m%nCiAm<_??}LNXYuaSXO;8HZ(*W2MHbJm@rGviOqvE) z3kUX<&$3y^{LMK$aNBOHKzCFJ8Y`r258f z0n|8@HZ4i_EmEy=v^N4B1*gNp#?7=0%8E1^F-X_q;x%GP*q3f4xjr7m9(138A$gVd zNEPo;Vitz=K$xbycR1|xqqDS@Je{ab>Lj%5Yq@8Wu-~?#1x4Q_G{lV$`LI@txgZb# z#fdHLe!bX{#rOqMzsNj8fzGg?&%ATIN-x>YxxXpEiK}+~Ga2~j5c@-vl3HNtfH|^s zDfy+8)}T4Q8T1Ho0ZONqs;9k*flq*2+$wY(Qhx?D#S)NnvqTr$JKv1eTH0=Jgt8GS z4$ZB)aab+Zrek}m_HX29Z@i!s!_;04Nl`AeRxA)6U97BdFZ8{M2NXTFn_~cEq&G{9 zSgObrix$tH7o^=B!q=D9O%;ANzldunEvil81;wrx`J7ny)Q+>_ZB`;*jJwxIBE{#y z-wt7w66E8?iSyvY4&o5_l@Q7%yJcn%nV40!3@)~+($I~B?T)-hKQM`0=SE^2SdtXQ z8=aS2AwpS^(|Kb+LYGHe$$iX7d^K2o1C;jSNoos-=t*l^2C-H)V%Ew7NFg~m>+3%9 zNd87(_9=jX0!XBSQhmoG5V+>QKtAJRaUdmCCKNyo*#qi8D+xVQ6_TL?lp_4dVSq)2 z{O&^tJ*pg5QU!z=#4W7#bS-{_7QgGo0_v0it)bbOIRX8k0nWv}XTik8_FZ1&-!SDr z(NSgKGhN#e9adpPdy&#_Y+(o#Y`$6gy-E7?<+;q$XT5^LRVb_$SZxluOxl4UNjoAe zFp48@A|h*QU1w;<%?=}tI(BJ*A!ElXhCmkNPLoCv&Y$ye8O8;|r^v{^J zdK2PgF$4QpDAFbRC!+$6+En{ljJVX9$@yqayEjl?Swu3^8UT^&>$1z_h}8&q zR?rn&MrS8v4-8KGZ9uYOC4Q|XDx~tt=WLFok|Z*6C8%hxf;OI?7=si$qMlwS=FsW& ztwzj5{Mwb^-J%==?l#DW_R)GCIv&{n3oA~aVBUW1Yvb|c7@oHQE(zqhFQCq894djp zco%A)L~bq=ys|KkWx@McGqMxg)ePN2O9gHXVxGR&*h1Z?@lh^H$i_CfT)GCVARveN zed(?_MtJ#$TZ^UWh>&+l5(8b*y+;s(+Ga4qAMo*=86q>+V-X;(!HGx6mzd-|nP(Bd zgAoZM(SIFn0D|?}tiDcriFo5{RZ}4P0qCuznKtro&z_63b-{k2A$w%H!y`%RRoP~7*KVFESPD#Reh~#dwzO|cz?cnwiTLe}WE#uj zVO_^lC?c3?Q&W38_-5AI`0$c;e6}yy{(Ebjoq2%-MT4w60+hFK2dY6b-O6XUW0QHF z5N_7v3rGvTGDLW`C%jpm`3jX) zo6ZN_DSJhG9_J)9udukJI+6z3=$w9=PNj9$Dz8H@KMh+>=U5{m5w~&b`Z++;M_niW z+9f%PH%|VWU^L`{fj()kj4gQ9mw40lLkC|cCfJ3UoV$-*C#(ea0%GGl(J@>Yoq@8pZE%pOnj4XLj zlaW0s>Q-*4ert(m04Oh#OAwChO2^S5SOQ@wiC;$rH;`V-Iy>o-YJDeuwBxw8K!Pq! zD^LGgg^BKv7J?M#lJ_}KPQU;dJ6uLF7`VUbYCO@DDDB#|2tdoKEC@{W#|JxVvPc~ASmtAcxX#D!y zd1%fUNo2v`w;t*SPu#1Jk>+k&#y>WwEC-Suv)Lh@D-H=Qi2}D(;ZEb(^~fl#8crkO(0@BCoJ|)C zh9lSNUdxZutpXO#pzyk+K;>)eT}gpjFk`jvS<=&MEL9#F>s9gNl&80N2j@vSA$T0P zFQXQn$WrCbGnMW{qn$`bm_N4{L9|?7wH%dr#_EA+P>r(X#HETD=xCN-GT-rly_Xg= zyXaimBe^l}T|*4#gx`g^zC}#VU}T!JP%yj*_iZL#!c_yUkHHCr{ADBkHF4`VM(39i zWyYyN{%St_#i6X5l0O#a3KUy@{o`BxXPzhTxHI4MLTG(39F&q7p(?&#q!&2 z8t^F#&Gn(ZQ8S}-G|E7?O+TPw{I}4iD#D{C@|ev^sV$;H_0O6K>rG$o);jkOSP+!> zCt`XcR6XGeIH3GWmy_;}?`HSHzrxjeukv~bCQnUPY~jk%RsAr4SfLcL@5+N`!>mVK zx83c0G!~4YmM~z6T?xHYaGod3esANvS;jHdMJv?H6-lR_#Sb7x2hQwb+ zc|Wg3mMiu>8)#&_bw^-{zWO%uB!&R;{llrnyC-hVtpRQmK;ZmLHv{IsSD^rtFN{YSnWfXV$)at8y4FKX!MV6Sg- z@1{M>4)B}4Pfz&3;{H%+0R>RLe|`KgoZVzB+!wu#h8aDT-491iw#_d)P&E>Tc*Hg>5)R_i zY%NcUhiFdIlhI}^$GpZtSWS2r0*`3ixU)&fio!}?Q(z=Ggr%t{5e%w$l^1aCGe7$a_ZAx_Ji5Vdpf!l z9jO;~Eb25z`76{qVhgc-YdqrC|61_m>6dkdVXKk(#+4ITp7q6!CJ_VF{DI?S4vVma zcS&91i2GVd;Tw3kw;y;i!C6eeh5TAUX@I*nqNIy9t4{mPMXNUE!gsdFDuIYqrOQ5) zGqs`*+}%70s1d&`Kd_mf3AbQZ%k`*09&UH`)~+U7g#R>BaZy|AJi}pYE54$GDN9=I z$l+3#qxZh4+b)u!uc35i6-@yPlI6;*hE6J)($D@DGo068qf zH*1M6j4wQmy{K?j<^K`e-Gz;o^Mv5$Sq}Y(x_*mKSwx(DFI#>}0MC!!*j8 zawpL~h#WWGRGQY{HfOiK@cqCd&f+Y1p-?zC=06zdl9C!%XKySlhD@||3sZoDZD?8% zRf=AHDy33Rcahh%!=sn;&3s5^To5{!Ao&Y-UaUIdYME!hhP_FXWk)tDf-zR@D`77S zxKyi5Qo8Y{II|rfPi_M>43m0fqUE66gxM~(+Kk4|flKi#o7>;*-8!Xa=M#vX27J4o z8R!5RaF(ErDBo!Z%Gse+#%%S%+FfEeEb)JxUWB#qIgBB~d94O~ho^O?IjAD2@#ER- z#+F8Dd0!Pk$g^g3 zssVWF(h&n)2qbMaVI+i9+;9@V(#AwnvO%KK$3_-gA@>0Gr~pI5 zRM+0x3ZM!5;3eof{mu`A1JotJ0qPQ$ikI_!&Z{@A7RN0EK1%ZZiTZ`|oXkfadET z!~gyp{}UFsHE&bw6XhJ4k}G?qeNsk`d3m!()S~F)MmG`@q0h9xL%QFdH)7|3WO>X{ zv$pQxx)o977hWn+T?{m9=(s~It=$@YLTE_i`%auclq7)>J=%Ly6;fgYtF+~*@dpkZ z2TI?)il@Lvsz&FkT zazIZ{A~ZKi8oh4WmcGfk7cc@kRY6CZ7;CohCSfWzQ0aZ@(XwmpOdOk`%d8|Y1>M$@=Nn2ztf%P z#veJ?0$ptF#*G+#B|VzJUcsTQum76m$vz#qxuQpC1aq6!4j&N^S9g}lvYbDC88^)l zduB1isos&9yn#daAA|JC(AhCQ+CriT|8bhv2KBT*^7&}!a_)fkPq8PPNOU%_>0hK|)$8#J#Ae#xG4= z*rdN>@qOmyZ$1nxU?bxpf`Ng806#8G*^g4^1gbcRN=<|t-@bG&#Mned`O7(Y$h>S` zeW@oydJG43w?7JJvKse{SU{A*y1{bZ-)P`nAN=)6D#V)elbG!^A@>yOfVI18qE^lQ zRRYx-$ATGVjtaP1!;-d_OU(;nH$rVy<7Y!$ia3R@bcx#dtsN` zx83k^Tkru+r}BILil5!?5LBMgN4ZVFty3tiNWGj7zPUN+8rI>%~z*;YQj?DSV znrYeUS(kv54>>3~)gt@pDWT#Dh7Bu5n!X9X`A)lZP%SDWgQgg~xX3t8p*lj{%U2K* zB@V&bo!3lCLa57~L=ZRh+#o#AWDiS7PCfLR z&jz2=qCeQF03)$x5I*)Q60;!r*>L);j;I|`9oDzD6Q%<$iI8YgMc7N4N;+C+0zF(wJkb@R50G8Zom@q;dkEsjsGL-c(Jj4^3@i zg`?R@l+sv~?J#T^%#m)X}cdg_?#m}sf;fV1!q zIQs)(f3MI3cL5-*0{~%Pen(hDU}J5HiCedo)#7Go4e<2G`|3U$NA!^kC-#g9n-TLn z*djl`DxsLEm4&XA0imp`8PiX}E;yv`kNp9*-{tT*0Rb?sdybp!KAi>-0Q)ukADZQ# zkhgqD0J3q}eaJlJeA(G_V<0UTw9(Hp>(DU=BQ?lgsGSzYuld#r$HmMK`rfnU&gO-?Fm;1^l z4>@eTTJ!AJZ_hcMk8M-KT1;&C)KS2f=a6{&{vx!nDFH)i(na(D&KWIsFMk-?)@EktVc(DL)l z&+k5@t2@DcfwRia6_{8)mQ{KSPtI0&Y|zUs;Wz6OU8tK$U%E=A2W=FnYO7kK?a zA#OHD&ALRc7;XI4J10Hya3n=Y2~~^bSn29g@ZQ;0Nv)`2J}jBGZ#s@NGp#+sc7ykvj)g@bgj>g8a2K(ZyY|%JLWyV8S5gL>dM6k1B^5%_=*=Nf3z^}{S zu;Vi4rIND)_`#il6Zx(x2@&7efw-YCjOWzLyS%5S5jB*lx`Ekj?RO20tue8v+S~6)DrB(MGiMMQDgd~mcCwNaBbf#O^QLyo=%po1DF4}LZAo@ zfd@+{EVoq^#mM&grQ(X}wq62sy3*Wm8?P#F6K6@XK}{`as-lXHX2qm1&PyqjFx>5J z&(ChAofO`==i!H|@kYT?U*jR6QC!2yw;jM{2aZM67twn@(W-snbsy9VGL!RUV>fzx z#j!!zIXP64XBr>1*}6b_jswXQ>^rG>x=A@Hso+zLx-0htKe_V(oiQFnDFGQ0e~L>Q z{|(tu0Kn-y08YR9j?+&JP7w^9bj(qL zb-Wj96#~rqcVZ2sjKtp=bDUpK`*XySQ2aa3!35B~Vgxj+2lO?$hj4a))Ed{1;lFk6 ze**T8On$nttMNE6)P_UN5Cy?J@+ez2LZ!=B4qGs<>MEYkM%ADy$SPqj(b^}(d@|xO z8!Xnh3|8DfJK(Cx6wxp10M%42*bp7)$nrNlmE-^5g{2020pd=w#jeA20&0op8ewvSzSVidYBqAsLI?OcuUGti=m=x)A+tJr`_ zKI8W`WkNCS#DCf2h8n)Pexife7e^c5eQ<4d{aQS2rX+;#$jOoAi&Sn`_{E8cnrv?u zs8Up3pbHrGk^SM9U_7CWjY*6F>^F##*R!G~N+!!fytlLgK^(mO0u0$R8)r(O+Ulcc zF)p3q&SvOq&jO>L+SxF~XrA*M3c_NgbdwXlFll9Lk$o$FFo{f~v6z}p$pga;L(uBG zM!%n5XPOrhziy7|J!~Mr_r^wSEj!R%Er4RS!-wBEHMKL934w8E9YZi->ghM&#KIQ1 zBdKBiGgP&YwMUo6bFV!uCGVJ@SCR4D;Tj_b603v9#0WY24h23BMzXz27r`k_aHRA7 z1?;~8@nfVHTwOgR+2iafD^>MABw|EoooS4Hg!F&=@L!Ss5wQQHH^_P9m!vt5m@z9W zwU!LEI^t!=-snhZ1H*9 zl7|Pgn^D(`>X(X7RbMd>i7jz(=J^K}eWw-pKs!-lWdU4|uh+F`n+lhO z{5eEiY!0FMW^G)TE`!y@8ygcUcOCUK4ok9A;!5Is<4#ea6RL~8@C*qc_cEf>yZWpe`_gHCvvH}`Q7>N7e5xPS zwP0tWv4vL)eBgDp5mvFHl*tLb$U855*!GS7^$`JEHT&d>PgZz;iUDFZnj3#Z64j|ZAMBcrjuYbZcfaHxEv=TKke(t>Uy6AvGe@a+;(b(4@<{*jT z+KT*?<$Sd2yhE>uNuCVE?R?JMaNJUwvCFXDP}Bht6lFjJ zW%dWK%aRz>MkeW}e^&Hub&~0&c0il>@~0@uzYo<}AK2?ZQ2l3z!5^p&82%ekot5!l z#7qt<`Z-t0MAqi9pc{N$v(dEC^nvHwismZvag3#W{NJba7GuoNB=&eHC@*6#@u}=H zphI1vHNI{TUl-VYxAZ*XWR(4aQ?tk>RUCfVR|sPJ*+m)E9LtVep0_JiEn)IMx3|n| zkW3n=pz+RSnosgq_s_Ss?VW#w6My^gUvc91po-SvHbmburVK$K%Nj5CeQ9Lbqux+% zT9+8P9F31Xj^u|e(VDP+5jvC^pKVf2Ru4cJU#cOfI1Q?`e?f|HzGbaiX z4pPJfpek!@&Ge%>4+akN!OXZ{A)y4I4%^hq_@`{tuV(VUp7O&I`K8G4TL_fZfS)FE-f7??iaLdq+vkqGD}w3V|_HHSZM zL#Tv?+!iyZ-MnlE@3h(t3at+TO|v5kiY|=;&6~{#q3q3xeTKL*gt%-eD(hobKDLnw zqX=9dnH1w>)p$K_&b}@fGU3jk4ZcZhiF~wC-W)6Xd?YFNcErwC1oF*SWd4(IY;{ip z6SX-oAlk$ukqWP5EQhH#_EVV6LY=IxQ^$I3B6SrMWyHM~dq;`3Ij&HOy7ZrIt94VNFb9hjhu{P&iJOLmia*Gu9y^^at+;yh5|{ z$lB{W4AHGWHf?~5fOS*_tCgXCLeGbYi_e^|$G&T{Ok4{tsEUxrIz^(ZP)+faEQ$CYg z+o5z7dq-Eo#@KAutfM2@Vhqef$Vv!#vPtHI9(GH)3n5z?*FYsdUqi+!7516EiUuD$ zm+NU>E$M8F|AL;jjuG{q{gIOCZ&u8&C{4;DmNC5Ej8nxlU#-UGjqnH)Lhx@vokvE> zPwz9?-e$RM^c&aCbDgOIlpqZJ#Gy?kN*)6`qWtqT6;v|`KG{xwsu@c)e8WtWv3Gg>q{UWN!=;UhTsWA}$-$BFgQv%7L3-zm=4XJQScOZh&97 zE7-#N;Z2mx(qXJDLF7?-()>}rt68Y6tP}-?#O=Tmpgl2VBC?HJN z?1X$rtARr^8My6SZ@C#;gmyah_+z9xr;*)T8=^WnSqLmD|+J}$P=+wDKz=Iem1?YxBmdamok z-9Y=7y8)o{ZNtpQ{-3-eKnwtuiw@ui^2ZecZ>9|;K>3niK4C%gk;MYS=o|C*_XFzh z_XFy0_XFy`z8|<5IUhV#RHonVhx=yTa)8hBNa^ceUlf2=oR2Sx`{Dn}HLC*}XFyU1 zNeu7-0s>GE{{aPt1QiAX^SZKFCt0y)hU(E-SA0|N@CvicC0fB}j`O1=-tfD=xZETN z&K`I)z0Z-r)P`w=3#>8pzOAb)u}mE|(A@a~B{?FDLchl!9&iT{Ad3eE4hjkh0rbe| z$q|AmjI?%d}D19a5ng*>iKv^&vW_dL6bnGxWfYUJZzr2f; z3j#t%TA7$2@(U=V81Dw`wfqty@S~Tpf5pj?BO&HUe|E*gK zQZptEe$*)ye!Ti#BoRlid~%+Z)Wa@EaB#GGK;-Yyn%`W-za~6AK?NCK7JMEn7KCoB zS=rD~Zq9#=`d8chaoYnW8Gvof_B~)jFJx?JrEf?m^U#PDps7e`VEC6k_|yW>Kh@6K z%GB1;@NqQ9(dq$ie@4&mokjrf$I1-oMbF0ZP$S98`e^v4&I|vhCH#{u-QGWX-2|pM z2S>;~9zqW;C3NEN=XIu@k)E!znn6_H9f79BRhRbeFLF5N_?y>>KG5%ipHx6<$e?RJnG*ft3$T3WL@8zj)@RKE1dWG>Ye z&y4$HVFwP!Cw=M3F@!zhyZ|YkJ2f8c7B~r`6~|7o28X{H!t-Ogrs@MyONx2!1BA;G zn8?s8)E15u&<;%+N>GJ3HRUXh85^(jvNHvg_x3E|t*2a;Pg{Y1iCUsE(M*u~*!$0o zbG}xPGdg;=J4ja3Ccwx3I0gLK8YEu~J}=B>drnH#`;Ew-8?``)t-4Z^v%5wS$fV$v zN5LWB-gRq!yopB2|G;t7&rNDo85rH-QwJ9@{(7S8Kt%xCC)BNA8HZV(mj7_U{Z!M9 z3M+E0tBKt654f)rP|v>o^7c_ zihlF#te|3e52baZ=SJGm%|xjnVsxwiZ9a8_Qv93VyudqATK(Q5l)}IXVarK;NJO5e zX}F(Qvvz0^U=(Oklx;})dfT3`iD**DG=FR=^hn&ePS-6F9R*7I#R&c~ogq?R6DWEf zoaAyBkDWxvAE;|GopUYs-fQoD z&hfhZ@xmwXgVz}MGwQwvNc6csmCn$jO@%&My0?ZK{HY&w(+)y1HFjge-Z{pgD$07V zcT4yFc^#e{zgb6*KCX?8I8`y2hT)7$2Z`?(q-BAL@|WbO3_pREPRI|Y6`N@+sa+}w z-FQ%4qF0{A$RgvGIEI$)HnH;5(c<8pC>9noy&TLd*Oz|HI`Z9n4J@VS&W4z?NZ3tB z6VQhq!Wr6Huv5KBax^1%khAhWSP-E{*md)-TFULa@wS{aH4fpzMk5HF6L7%L;w2P{ z_SC6?FxEKm`p-MQuucmhb`SA>++h^~jzgj)7;n-YX2Fh#i6nBJCFvGk48lkwx7n^$ zwfC*`s+qKxY#LR1117M@m)%mqnhC>X5d9%TH?gqIV9UtQ#Xk@(a)?Pxausf(uwu{9 z{&0)LsOU_`#5xNj(u{-h=?S!F$0-ubQDu~hNF-QuuE60cd*6lAvMrm?ScjvjI?+X% zna4A8GC4ofHl!2?&99~vjlJS6H?eLJLXHd-s)UO?@ea>}CdUkA;D=n)SLuUE&^h4u zfHU^y_PT>ouHM28v23roE(D53WU5lVjnJ3`fB`Ph5qeo5ZR!KMV><(Qs%}oE&rM8C zTnw!(O#ZO}`>#N+2PnR10g5le-vbsT`3c&X6O(?{OnEkqXQXxpzk>Xq^pNC!)?Z-Y zpj4k*JYeLgK; z50W<+K4^^41?J2WZOLJc%}ZTQ4Vd5ksF<3^`tm%+Mz)`QseEsd?7;nLL2x~I=%-L! za<60)GwAsaEp+gZV`zeX4Hj19V^@<(7s7QUc1+x_2vyc^XmTB|p$Q3Cu$7Uw=4An4Vzd)e(04yJ6@4>_cHY)&hr(l>y*zn z=w*NujJb+0mon(k8z5E_ zMNQb;fH)7meT;X=MBe^^aDJ4$u-Cm5SiSCr~09u}AcIPuiMUCTr$dBu_puXP$ z`_JnT=AE9bGx5Qnp)C4nfoBo0rJk*z{S~nPjK?9rxXQy|6h~C@kTALlHD?+H-ON=v zx&@sT4$hf={RO0q=I-%8e^dETGlR$C+mlNAw>%YDcHqdCS>*D-)OKqda4Wl7UW<|~ zodh)gCm7NWas4^WO~nh>8HC5Wf*`2Za(EE$YtUja!=H`lmfcott zMq-DwnWvp{@cYV^V=h^`Snjv*?{uwpRyU?Yqh{zjN^sljs9vC8Iz7MkzK$7tK~af& z)nr|=n#qUW$-`gF7R8s~p0lk&e zefKh24eXpUIue|u==PVfy29$+7iggDw0QK2>QDtwJ_)S%*Md5}>!k2&ffXh!gRh`) zSQu)r$qm$i59lEjQ(Q~O8j4Db+LzpOR+x^Y(tPj4wh#$RTtcvmyU}-p&i@v(_=@y7 zh1lTbMHPV1KS~k=YlK)jj}4TVdpZXarlODndiBkzL*a4SvW2l#TpL5?>GYuBs zWypsmH8cr|L#gGHi@uAbWSMW9DN*%6C#?&XOO{&I10Ev+@c4U4+>GTu;QlKLO94ajL1PbpF)b#(M^z3$yZuKM{4ojxhE~3})=}BS=T8XO)Eik#?7fm|g;|M5Ida-8|@VU!regxXV$R9-m5z(#QLF78pDH*8@I?kJ4n zJzGV|7T5W%W_3%RM;@l=>xOEke<1Fk5%h1?Apa3V`*%kUovbt6<-tMeN1~e%I{_~( z{o)o6h>L1UauQ8jCb~X&*JQrgv=!-^twJ|8@fue)BE?I<(r#LT(bNdgPuytMA_!- zRSk`IB`%1*+g#nn+Rh=Q1aF?*m?;|mcA+0T zLKD0FF~wVX*G+%Q30Iy}G+Xy?r(-LViOpl`ifxqO@SQjPC`<>oQOLAV8Bgruk>e+~Pmz@E*^VT{c?zc5_hGgP@12(4|*mI!2Fi=A!YwN&vA*YygNj%nNBZq1A7{Lri2YNPIP9xmUMBd4g03yd8~Vv>iHB z=PQ={HVx?+7Y>J*K8ZQs(m*dNWr;FGX%24)gsE+nPZhOjYHqWn1(ik2?1p|BScr)& zPBvT*l+lP^?%46Z`KNZ)K1^+2zit_ss{EkvE}ll{VKo0{tTh#Nj@u86UgEExu=ZbQ z@QBJ+y$1;cdr4*9Bi%?5)-uD&s4#t-8rF=(60g#$y_|8Ow*gO*cDk_IPh4$8TpS`; z&0sRA-@oRAZ1$88{B|wpu%@u)*gNJNj*x_q-mbP0n9YR=XoJ+PKy6lmF#HPQqMmVXeIVc*sFaS4)YtLcwDaeOLq_T z`|b!RR2Vr^S0X7>2S-!)p9BF&RM_udAObAjbY~`D!h0x;prWe)c!;XXPnA@ZRFzeT zAhZ5^zb830PS4ls|c3zcwQOFCO)uRO@g` zRkVsO%t^OArpauTd$s1IOM0j4$2T4A%Ri>iz!~0r$PNQ-1V;mCsT}AEtPb|0lIlE)dB_%h|z+O77zW=%itV9-&n(y#Gm@eOBNb9euRtoURFI%H}T z``t?yCrOvZW%gcU@^0|;(9WW5WZadiZSpgPq8qvNp?me zHwd!3jwk-5Nz(y_a7{<}JLvBH^(tAw+R7aoL-9x@DQP(@yVDubndc{g%{CfsWbdXQAE0W+O4Z?AJ`Yn)%9JSt z8m<--$wJecKrfDjWexEa?VpZzE*?!*&3JNBA=8R4aQC)8!LHTMZ}ZN`H5RUS`C7z7 z8+X2HJGPHO6bsG2y6rT8RU0>DWb(l`7vd-s%QBXPxAhkF%L_Em({;k=sddF(WHT`+ z#la9X6@gaPTOaH6JB$phHpOW6{DNow4rU*SpH)qzxq-e_c(Oh8WwA9==C%U-B|D+I zR>R%M1z!VQ{i({w{wR2eWWxs`?^zYK7fX<_YFIaXXMze7HfrglH)p|~?h|Wvoex5@C<{fBuuF4(;m`?2 z(RI&8$wP;O8mk1}a3juxWbUEJBzYZMffwmv1P(Qtt!|@c3~2{U%G7+;zWcP{SW3!6 z57fb~>I5x0C#iws8_%(+7>{sF;f*JY**dTFoOt=OzjtPam`CGf`lmwF)0QA>QC)%4cBJqD+B651c=5nJ4VfbnFoel zon9&^Fmmoj1lppnGRb(50`N*FpAQ)WeyE%LIk{AJ@6alyl^Rv?TbWCHoAI?8^x5F= z;pb7Y@8|fR&XgDY=ozrLP>Ly>V~6$`^@Lp9!A; zbLO~QD=WMWO6#?fYmOwA&xuwwiaWMIpKA?W>n?`9IV{|fR;7U;vQc%T#y-$z(vc=Z zR=p!jeXd7CdjKn&<$DIqm57!k0ttO(P;`J-f)bgXs#oyJQqv|v0P3oL{AmRix=Abw zq9YYU&nlVRwZ{IJZ%=PYYW5hTC+43Tf_Em{7P>gZL_~5_bijj;*hg*V+Y(ym+Z*-F zjRiWu9ho7A!KI_hIIu0XPTMaP+kaeXvX10M(KTIYQ%9*6vAWy%B>N0maWtiTAG3bj zJ}&Z;TuwBIk2lLOa&#DPqA1riuroZjb~x@-{`3ZAj`Euvp) z0y#TLPOW2K=rXH(Ayq_`Ng92pLus{ADSr%k0K_n*`C?E>C~5bb`0Rm+kg8XdCP>mp zql|Y=2U=84L3wEnv3+omODAC*PAoH2ot2fa%jq&*cr({)7Iorc{){;RC6mUYcHL2T z^sLQgF`jjHq2>J8qk>d(*Zr|Ax+x?lN}C!zgrUqL2ch`0z0tfPmiPr&pS<}nj*Kqe z#}?i^Tn@-?4u&>%KPIjW|2Dk@V*_a4F#+xZtRHuQLZbCP*6wt=>~!*>b4+&GCL< zr{o{eHfRi4BmVG6Qy~0-8L4ZX_!^AjSdA3<9=faRa)M|1TW!cQPuk$Ozid zYnzw)BJ(KgxnM1h>*WgR7>Mz8M3;zleMp^d^?Yij8uH5s%aic5?qc@wqpgd4E69T!GB%hK!eQ`cnkm3${`nXp3K(m$ zzPzEAFgYQ{+=J_}yt~~fd=(ZeZVbn`a(y;fwA%a1Lmx5wqn|#wECy8RCt3EZyN3od< zCqP^1j>%so4W0(<^0i#v+26-(5ymwuCjb02kodZDz-!uw|MF`O{p8Kmk5tb;i^)G7 zFi`+a3jquU9KeYN0tP_<1|$L`#Po=G81mN&+aKv)uY3+41fX4?K4P>ERvM*Kw^NVH z!~uwt@d?2gnE+~v+0@yTA>=>SMi@I-|J6(xHN-`P7y#b_2&w%%2|DmS}!88F``^Lo1#o$9|7tSpoFEH zfq2KTFq6zJ+I74*x{0O{?-5((l*!HZ34+)!&}i;Dq$RQw3&e!7Def67qm)@lX?UUV zmEk5r%#8@vv1D)3bnIiATYT_vKUn%961VPr$Zrt*Rvl4PwSEZD)#S5CIVhycUE!_y zQjMHG>Ls}OaZAKIXYNT|QPfwqlrv2yx*GhPa4Ib0NOMtfHn>CgEkF81Obj=2l6YR@I0zlDarq%UWE#E|KpV<#pQlB zePL0NetwBaNnTzBus-3wQ^3T*#0dZcP5=kw0SK5MJu>}UKm2zN+`!u8(@!oHUH74u z3b$B2c6*#;(xiDZVSB1H#8A-EK;2v=NVe5d1qA$VDJ_+zTo*D%s*B3^@QU`*{iv_( z3z9NfY{avH!qAcmtz4j;_GU4_j%80e%m9BqBf8fhrZsInv_L-H*PyKG@Sj&NM|7Xg za1FE9S9gx3`%4wCR|D(d$LObYSCxGTCEkmL3h+B-$`#p+4JcQolKiYaTZF`ga2q3| zohG&`bW#cB)HN2$TJJUMw6qvBE`s39{hC~mYS(QLfsTPYBQoMS1|B0t0MhE3X(9~R zTfH+~?Q^8nv1SkHt51N1+c?@(YZK{?{46hCy&h0xoc&bFS|k5Qt>!NY(VvSqy^ltA zmLtmwQdQhn)Cn>6;p)VZx;9?I3|A&kH&2CF@X+SO~4sbNa@Ao$}G7ww6 zTrUSb$K(Ih`|)U@Kl|BFfdW)m5kQgQ-p`1X{~-|xi;DWItNmC?2^ie~h(t1Rvv5A_ zqyh{9{qgwU@rvIiO>cXgvE#f&ot$3WBJjLioCC%fIxvpgg0&stfw92xdbd^)5FIkB z7o)y6NvwIp%_+>(uCQB=SQI+PKyN|3HO`48=N&hVp>L%P^p0Buo+DVPN!b(;Uw9*C z6nyev5e{d*F~W_+Y~7;LyoYz)T1#wexbO0?dtbWE@=fW@5S8L#d@XfJ345x{dN))r z#n8D$)_VFE>Pel8UJUX~(k`M-K12a7!OGhJQLbVwoNy~+4X#@B$$Df9PXd*LNF0(< zhhza#&9niMpiW5nA>UQ?_b7HP`KHGf&cxC7k<8p=b;r3+19DJ=WyN|4k z$~Q*gpHsnCBGkQC^mIe(B4YHtLQ`EqPPv(ed7TNeW~9HzE=||yu+7gWUrN`)5VD%< z60?y&Gn!Y@uM;H=afc#S>Nbc5$-Z2)6tPo*E{_qW-F6z)t63fzjL;djM`+gbH2Thl zlY`dnSzw$ZE#IA@tBcX=eKUT3|G;InA_YQ1kCYPQjv!3eBY2*rvvk86_E+Igs`q(u zI0bxS;z#FE&`cJPK+uKm0Nr`K+=0uKGqIf&tof=&7WzRnIEA@D)4+o!ozX#XEtyN~ zWUCon)X8@`Dy=Mz*={FCHUxuNdHGo+i+~j-0q!OS)TsQqH}VdaC96{#jby5HqSE1^ zqUrC0CTV_X#@r`OzrmcxQUw9T^v`-{vzO8LMr5E}yA3i`o`e449uM_lgHJe(TVD+V zra@W#2O+|bNF;Z*cjJ6}S@q1ZK|^>%fJY(i)}aVYgX1=lNg7T-NTbV}2)qe>tT)@p zr;~8Lg6CHRgV>gz&oJMS4@mX*g%{0dNlT_7tEa?^Ab+Z7eKRy0W#T5S5{uZ6PplOa@!( z-8Zh-tH$vf2Z#atP5&PE&#?LKUr}Mx&vX$y$r5TMK7{ChQV4O|65M1ijCHXytVrji zL#_*GC@v>s({_NffFIV(I<>DzhaHFEx_}@FR3?YJR_xwvU*%4MB`d2KPg;LD>tteO zF9*U~9DGcaE5hxfZLM&dnvOCy!pj*t!7SqXqZNfO8h%tbM!ck}>6HMZZw z8bIw7aQ^|vlMDof0)cBVurqN30fC4D!WuyUU25Yy>cRo5NE{O1Bx}N-fWbVf1%oiz zKSEsz)t}J~Bpj5mvx%XdsiPA!1{2yt$rlb@*237q7LYs<$vBxXFk>>I-+$c@4na*w zMM9MxP_pG>W8>!hnQ?)_p_|exKb-XE3>?w@VIQU^?#U-C01X*{nD5U~&7Y6|H;(kr zM}}W6@`cY;dfN6MjT6&>P=h<`X<+1Shys1BjACIBn1u{C+cyXs2Tvf$L??CKf2NT%aKdmbI+YkIv z-vt4c1Y!~cAqJ{b|2P}23d^w)B6>MBZywdSNE#jvKgH<1>$u+`Yh4KV$Y5SA%H>ww z_NY(7^)Y*lt(=xuZL3`MwL`JC=Ec?`KxhaE1c<=Y&dTD!)c%8%s9L~#dRtglY#WsAtqWg9s}Eb!mjto0s(rZ05#q3=7u9;?)==$-1VM)4H&VswILF* zWuW_Rdq3n#Vd02P6{ID9nAhX;{UTQi;5gk=umS6-Iq!4v$B+Nx@BdxIutJV_5cMIH z)!A&gjL`duoK40gBigaC(;zUhCFgFC0;DvBHnfN}ai(SeH0X(eMa<9_l6AtZGfNWY z20HYw%eO$5B6lxLd+TsI3uJ6a?1;meza~3{L8DOMWxk(B$w}f}*fHyX$~IY>5pH;T znEdVZWVTKU9Yn+Xm4>uI>+mdmDk`h;xZ#Dz^sHM=D(e|g$Oyh{B3DJ>zMG<5xDHaF zBJmkAA6tmthQx5Pe*n7-_P*(<198-u8e+;sB$#iS<3?+ zt~J`JWP~Q%El5dUPMQl>w^5bP+F}{Geh6_Qoip0{Xw6yqQDowRnjH>Y)g0EGcPZn# z2%0b@7H4m(!Jc}k0F}2ZpVn=yob%=~PZZq}E1C4KP*mZQRKUl+3$=*jJxL86%L(PGeVZx^otgWT-HI&r&Rz%pWBo1aN2d zW?xt0DWIReRpn-I6%dxnVS>A_7@&fIGXa*6-2s*{gPGAl0)YY8e@yfMp$sNy2yj{i zP!Jq|OF=?_o6&#*0fC`Ct$f!9qvmy>?FN^0fu-D;k2i<(ivvDH7SJ_;%9_CZNs>)R z{>>LIM5J|;22N9!DQtSyK+5x3U-PTTAVn={dh?>)P`1VAHE>aB^xV_3U}((p$ps)R z)Ev9QpGjO%`>Q)ayieby+U7E&pgo$d6EICU=g^IgiV`GxfxUZ3`IfJi86;f*zW6-f8JqsOZOxLs!g#3!Yrc7NM`~9g9MLd=V3i(wl_`-u zUKgPrvI5&LMm$zgnnCts@ahDN5)5YQHBO}h$Odq(F(IWEho41?(nfe$+(jD*L!9yT&}-x4-?h@;06T z0|w`M{`j1-exMz{*4iZ2_uG26_AF<)Fv7<-IJRD)Dm@s_S3Jxa&YyI^zu^tzaVwBB z4g@2HGK=~eAUUReQ#Fhj7&OIC6nrMdN1J{_0|PC)>wk`%{v)!mxzFVQZRhWy1-j2?YoM=A0ks=>?!P|)CF2CNJxY}bO#u5Y8iZ^Qf%C4hoHbb*3l@VNucZ3*XwzAzGbsaV|}i^?f#IeObSG3C+b`G)%<{7^`(T`@3e~pC= zLdyaZVB(FDF#e0}dFg@#p-v5jr}>Xy;xSMYq)QkJ|L1Ja0*L7uV4k4;*l-jC3Ew0M zvJvZfXfQZqAQWcod%|#;ZFpRdsO&zmWLV9$DXi4%hIQaK7Uj>JMCdglXTG9sMgz z`=5I6?`p`Sdqqu0Dd0nMRK!xpj%BBxX$CAhsb7bSWMeKKJ z>BBk(9}hVW{=C&R&r+ruI+9->S1DiWgHHPLRNxB{8^$M?-fpm`?!E;#?Gr_L73n>s zG-tfT)@>Cray?I~kJ(VJm;7)f-%J%Hon?mU<%E?c4i=iHRfL;T4u>6ljI6VwwiC&= zfL(9;+a~z!>t#Cv8c=Q}E#Y>ZxL^;gV%fUid%&Y6_yfHhuyO94l-eaau_sl|&IbO~ zIejo`1=Ubj(x zBce3gmQ5r>U55eN;Voh47lD@QH3Zv`Wb>Kq?mt0%TfEb(qIYaeD=)7wb=%~b63O?L zp%sL7vRiOH9FmzJZG<8P^$K}6l>`nMyH5|-UxBIrCCc-yK_TBbo*eN86+hfXprO>* z-L5VL2qQSAx9AcDg_>R~<)Fdm4PMkPuzD@RN3+XLZ+|HeJd{>D9D0o*eY;GSMT zE(Ye4bt5=yjn6Z4k3-q}8nW3V@BBCKhJWF%;=gy-|Fwhs&VLi6TXvp>A7p4xvn7n- z5_D~4Hkz>d8oQa-4l~$0&!!Re%2K!1n;V3m5vQuLYaP3^%?+pCC8$Z~X+peCV59zs z!R9RY)xWmyrCb>{x{}l_ubs2qa0P7%dMYb#aZN<=u*l8HuHD_|QDmOP5jhr&Nm4-? z*P04mU^?s1DRdF@au%4jy4{+VaiIaa3M9H-+sd@e`P88|*lOc>GaxpShQWmji{I zmU4&Rg&0VfuUWvV07b03SP;Xz%dtV}p}iZbYABoavJ3AE{-X!F&{|x5=kDNYf*#6{KeSarQITElIb09Zrax}hhe{)0 zOAUaS#mU0K_FX{r(c_=@*313eKlWdE(LagIOckWcBi&z06$5C4xjDnPnrcF>Hx!A& zE%?Jw9~`T-osUP;+WtZQOPo#?P>8C3lVRa1slvJ=vv*@zj@A4*JS5HC}OjDZVITpljrRbxF$OK&FStsOE##TW0v!Ro{ znQEytL$4PE`k&EGYNQhdUzWs$+u0#=8JNHtLC0wTUC3UsnJ++>5kp`ljyzZn?1SZe zkIVjIHuuava5Vt(^Zzg#ku`hNxf)G0-G-6K8}=L9R`95&zv92hBm4(&Oa8Ux{3vXL zqQZZ-oWHXgHm2`;Cx2MY{Ug(V%S(P&6>L-WGMsG02QvcCF1K#5s}T4e-vDbv}j96y6=nO1gXV9R8OfQlo0yY2LoL%ny_ed0b^iNO@I zJk5JD+m+DoOy6Z>K&Q#oC4-lqKxChBfct!lt+wi}y)fC`!GYzODI(grH`YnzZCb3G>R>&v+?~s6%AmSRLF=$u&>cu0~5}0bxTQ zfzOY`Rh{kaaLb?Cf{CQ6p74XCwRO~J*3Lz<2Ia;o71w|y8C<~0m|q-BW5S=?tJjgQ zQy-Y>R*WC;V!~>P^yG!?l4Y)fLoTujqr}Z{JC(}_1$_9LFEL(|cFbCQod32*?&MpB zi}5B%FNt(#l7NB@CZ|uVl&X>3aI$0;!WZ`OIF*)#rLU}A-jl&{ zqo8MGA=6*Gn=CFbpL|?aAIPhAu~T?++W=!Xoy~USJS!{Nj67a5w;yn~htS<&Lho(- z9Mf%I*DJJtFIwGYUK8xHRf+Iv=@$>b{e4@P^0*I3(O`@5OWCKJ<&u+~)+o3`)WsK2 zd8?dg@2eW09pVJ6e>p!Yz_4ieP-MuPb;3Nj4kY%D(W$Cx*8iZ8BB?dBLWUiZ2IRdP znvFQEpxVwLjlpX((Cm@O)=CGnZsw5>Y#ZdD2IQXhuh!q<(&{@2Pe}J@LP5T0@9Fa0 zdO5$cNR>Pj1HN{WCifm+K^$DU@;&!faCTTHI1e!Aq=4kA>mF%;=rbNZZWm&)qkVnS z#=V?p&Q6_zXLIJM39Ix)3~hM11pQ9EZ|FUUN_ZM8#cpgr>MN-_8+}R6_L}9oAzvEK zPD2`vXynq<>#5BL;do7;k2kvdGK0GK=2f}U%CV5rRS|>3%Ph*ZVn^?D9MWf=JSC=; zEWpy}{Cqj`aJ1|>z4K-$>`cQh3>Y;jnX>Y7^gL`LE2#+ZZ=NMLPvA+((9uLh_{-bl z6n)h3^n~gGg69-m^YT>DXAIVNIXx?=#8X%61ne2jsfc2gY$gm}+;s9X2(f*U?AbcU XL-f@usw{`~ax{tzlj~ho8~^_SwKqt) literal 0 HcmV?d00001 diff --git a/pki/ca-trust/extracted/openssl/README b/pki/ca-trust/extracted/openssl/README new file mode 100644 index 0000000..7c368a9 --- /dev/null +++ b/pki/ca-trust/extracted/openssl/README @@ -0,0 +1,18 @@ +This directory /etc/pki/ca-trust/extracted/openssl/ contains +CA certificate bundle files which are automatically created +based on the information found in the +/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ +directories. + +All files are in the BEGIN/END TRUSTED CERTIFICATE file format, +as described in the x509(1) manual page. + +If your application isn't able to load the PKCS#11 module p11-kit-trust.so, +then you can use these files in your application to load a list of global +root CA certificates. + +Please never manually edit the files stored in this directory, +because your changes will be lost and the files automatically overwritten, +each time the update-ca-trust command gets executed. + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt b/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt new file mode 100644 index 0000000..0e6e930 --- /dev/null +++ b/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt @@ -0,0 +1,11094 @@ +# A-Trust-Qual-02 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDyzCCArOgAwIBAgIDFE3kMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1 +YWwtMDIxGDAWBgNVBAMMD0EtVHJ1c3QtUXVhbC0wMjAeFw0xNDA3MDExMTIzMzNa +Fw0yNDA3MDEwOTIzMzNaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1YWwtMDIxGDAWBgNVBAMMD0Et +VHJ1c3QtUXVhbC0wMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJaR +q9eOsFm4Ab20Hq2Z/aH86gyWa48uSUjY6eQkguHYuszr3gdcSMYZggFHQgnhfLmf +ro/27l5rqKhWiDhWs+b+yZ1PNDhRPJy+86ycHMg9XJqErveULBSyZDdgjhSwOyrN +ibUir/fkf+4sKzP5jjytTKJXD/uCxY4fAd9TjMEVpN3umpIS0ijpYhclYDHvzzGU +833z5Dwhq5D8bc9jp8YSAHFJ1xzIoO1jmn3jjyjdYPnY5harJtHQL73nDQnfbtTs +5ThT9GQLulrMgLU4WeyAWWWEMWpfVZFMJOUkmoOEer6A8e5fIAeqdxdsC+JVqpZ4 +CAKel/Arrlj1gFA//jsCAwEAAaM2MDQwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4E +CgQIQj0rJKbBRc4wDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBh +MfOINQm4XpzF6DmkOmb/ArSXHf5LObqFmIMooNr2TkyzrUTK/NE+mdrm15Rfdts7 +kZVq/ICfQSFeaPvWaAVq4plH/26OjvMTVv7DfgfPBUxDWqlCuDnDnPAVQ+yo/o5i +BA5uUlMbp5znbDtlxwF/5gWqcn/hKxSUCP1uiOPIlKfeVvsRmBcJAdoixTM/Ic10 +pavJMGOI20onArvQZAUEbXQLA8cs8naxfF6Bo36U9nk6wn7q8VPXhViekByd17F6 +9A+ah0Iqw4SPf9BqNRIe1YxxjDhCmjWt3aoyE3ZFBuGjW+r2ipb/vGU1+2oyy2Fd +2dMmiMQ7gGhWX9X6gWLdMB0wCgYIKwYBBQUHAwMMD0EtVHJ1c3QtUXVhbC0wMg== +-----END TRUSTED CERTIFICATE----- + +# A-Trust-Qual-03 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDyzCCArOgAwIBAgIDA+aUMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1 +YWwtMDMxGDAWBgNVBAMMD0EtVHJ1c3QtUXVhbC0wMzAeFw0wODA0MjQyMjAwMDBa +Fw0xODA0MjQyMjAwMDBaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1YWwtMDMxGDAWBgNVBAMMD0Et +VHJ1c3QtUXVhbC0wMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALOe +JIgc0s9AA0hqqqWgK72W9XwKn5+rUJDbQc5WgHkqwP2TU3qcW/NZYSSIY6PVGO6b +hHSEnOyMPdrBhnpvNi4m6349yT6t565LdHcoKyQg/youwpVkEPZ+e8O32hF9nqvt +L4wZohydjMwzcHUJB/5e+0CkJYwv/bVRZzqoK0yf1midYJukxWOw7nDNKD9KdOpZ ++XXFAAZuH7BjwSqqE138y9JlGzkxIlrCeSJdGfFLwr7OHIgBdPEmQXcyOcaMUGjP +U4VDig+gj+6OC5KjAEC+wKJZXiyhRLj+HyLTDLrQ6O8p5HI3Sov4FuwiMgcqIyzz +o9fNyqmnT3K/vBGOqBsCAwEAAaM2MDQwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4E +CgQIRgbfN/LCNxAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBx +CNQmRL6A4mtCtSpQ/V3ojGDznLaSgXI4sm+pPoHywzQkU6FRUsilidO83NsSudup +sFjvwAhmMmLj4fOjWKN3bu7kobtXEWh3Mwj0zVm46l0bCcaszI0Lus3f1pq+q3YA +rX0WS2Rc35g+a21eLHw5FVlCNyA8n8Pcf/VTNrfix6QijHq+cb1Ns2jIuKmJ/3Ew +i8+RbfKFLqVKIn5y3tSuse0M7/xFfS3cJK3teQflrU+y6VJ0SbiMUvq9EuQZw/xR +jRbja2huOZrfKTmlu7GhF8EX43Vq/H2xcjzfwerloxzUnVkbGnQfaSqDVCQY0+7l +4INXvhvi0B+tbDW+jbpfMB0wCgYIKwYBBQUHAwMMD0EtVHJ1c3QtUXVhbC0wMw== +-----END TRUSTED CERTIFICATE----- + +# A-Trust-Root-05 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFyTCCA7GgAwIBAgIDD820MA0GCSqGSIb3DQEBCwUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVJv +b3QtMDUxGDAWBgNVBAMMD0EtVHJ1c3QtUm9vdC0wNTAeFw0xMzA5MjMxMzI0MTFa +Fw0yMzA5MjAxMTI0MTFaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVJvb3QtMDUxGDAWBgNVBAMMD0Et +VHJ1c3QtUm9vdC0wNTCCAiAwDQYJKoZIhvcNAQEBBQADggINADCCAggCggIBAOT7 +jFImpWeBhGjdgsnNqHIBWSI/JOkSpJKXxVDO8kU/a0QFGLp7ca/mjbtt9uTz5dy8 +5HgTI7IKRJ23vTdA1iVEUInOaNLDYqdEoSNFr18GcXZG4Wn/4iHgP88yleqIJqcg +rMJxXTDJDOxELc7FZXzXB3419g0YFk17q/OqD33e6IyULpPQt25IOMQCIhrfIKWC +Y79T1UQVBjukO3rctu6Qi0ACtJ/A9nEzWaYi07BoIz/9hMiWsPlwSy80hv0lVZnR +zXcnOMRtXBnq634ThgGgEEAmRx++FL5fpbg/YKFu4SGOEyV4Lqd6zVivflusP84P +s/JXfNV7bcnT/K2VrRu/h5hPJ+YLqWg75Cws9RRH16ldgvbim7cg4eUaayx4CI1s +dYzqN5aJnVnpdDIvGDAYOgQlSwbtxmdnJoBqX4F3MB6e0XSPX4zAVGrspBhhmXod ++Z356Pnx73K+zi8ZknzjKK/RuLhv0GC+eFikLjc6sieJEVGiXom8HcxXZUtJTBMQ +Aq5Xvkwh8SKqHqCS1FQsuJt8M2gnECodS/8GCgKTgIcZr7+ogxIQjn0QpSuQ6A7g +FIZF9tflVnOWH4+ePCqjGl4skGaFbwF2vbPwKcgniqmpI7DV8vDK1b22MnDMLxxZ +v+rDBqRg36uJbkcU74WQa2gjlk4G07EnowPDudm9AgEDozYwNDAPBgNVHRMBAf8E +BTADAQH/MBEGA1UdDgQKBAhA+blnvgPSCDAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI +hvcNAQELBQADggIBAOIqZcZrWivIqDTLlxEdJh+jss64PCshn5j0Fx8NtnuuyxBt +g/JjwYiu6cBSQq43nwuZV1LoRX6YlOkpR5/xB8FCCPNzPKprNbNsFSuRMRvkfpLn +w8WmITjfG77Rn5YNULb1e5SjLaqvt43SOy18ghDUakrJYaOmj6eyoNlUw5d/0YnM +Y/jZ3zhYlboBUMwK84tJPH8/PajzaMzHmNPZNTD3DoJe+BBhrrxO8Cs0eqKa9tuN +r+sDTCfD3q5s3VUUrz8d64+atnhJ7rz5HndgAiTc3t7ppfuRphx6skng978dB66G +y7vZANfLARjv6MOPDAcwcFjB8mPqjP22rePoBzw9WwWHdMs15e8Jt7ughGm8QXFj +2zKcQeFfftp2bZOjroX65YzJUqwny2CzNixJqQTeuCcrCTHEkpPpjNGkS/2+VlGw +2LfOnUXDG0gv0bMw935cqVsxP+UFm+F2qdf1KYZzVxy9L9vXGRb0JTTxgxa0MlgL +sVlO44vQoyuLG0DC9+NSqE5K7nXp7WOZGwb7MI38HleZ7M4UKOOgjS3r7wceDAKO +jEjMiNqmrXmUtKzpDDC2/wY7FHGVhfuwesuLSFly21AA8reNeSvNBJWSdUkCllSi +HVSFu2CvfX2qs735cDxZesGB/KxQABgS5LXcXdilWF4dXydpjszb76pXGquEMB0w +CgYIKwYBBQUHAwMMD0EtVHJ1c3QtUm9vdC0wNQ== +-----END TRUSTED CERTIFICATE----- + +# A-Trust-nQual-03 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDzzCCAregAwIBAgIDFLT5MA0GCSqGSIb3DQEBBQUAMIGNMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRkwFwYDVQQLDBBBLVRydXN0LW5R +dWFsLTAzMRkwFwYDVQQDDBBBLVRydXN0LW5RdWFsLTAzMB4XDTE0MDcyMzEwMzgy +OVoXDTI1MDcyMzA4MzgyOVowgY0xCzAJBgNVBAYTAkFUMUgwRgYDVQQKDD9BLVRy +dXN0IEdlcy4gZi4gU2ljaGVyaGVpdHNzeXN0ZW1lIGltIGVsZWt0ci4gRGF0ZW52 +ZXJrZWhyIEdtYkgxGTAXBgNVBAsMEEEtVHJ1c3QtblF1YWwtMDMxGTAXBgNVBAMM +EEEtVHJ1c3QtblF1YWwtMDMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCtPWFuA/OQO8BBC4SAzewqo51ru27CQoT3URThoKgtUaNR8t4j8DRE/5TrzAUj +lUC5B3ilJfYKvUWG6Nm9wASOhURh73+nyfrBJcyFLGM/BWBzSQXgYHiVEEvc+RFZ +znF/QJuKqiTfC0Li21a8StKlDJu3Qz7dg9MmEALP6iPESU7l0+m0iKsMrmKS1GWH +2WrX9IWf5DMiJaXlyDO6w8dB3F/GaswADm0yqLaHNgBid5seHzTLkDx4iHQF63n1 +k3Flyp3HaxgtPVxO59X4PzF9j4fsCiIvI+n+u33J4PTs63zEsMMtYrWacdaxaujs +2e3Vcuy+VwHOBVWf3tFgiBCzAgMBAAGjNjA0MA8GA1UdEwEB/wQFMAMBAf8wEQYD +VR0OBAoECERqlWdVeRFPMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOC +AQEAEoykPeAA/6iKm6YnfxsSHFe+Dtian2yAH8L2TqMdcHeSB/7L1x73uuDeYku1 +hbKQAXnfXntf8R+VgjQBTww0aDb5164netYcFbK0g8uVWVCqOl8wf3JbAUxHS9br +cFKks+CJKPr6qQ6H+sb1o9127c9IQSZYP3S/gMAaGw0cSTlsnosE0P5Ur5vHsapm +FV3V+VOjYNs2GLSu4XQCYvSIpsfDJp8VsJ/BMYS9GqGvQ/9qGa0fwEbEMadb5mcJ +tw/EKg4gJthMgxOfO5eVuCQ3PAEWOe5lrOrTdvTIlhphUuns5hoIdlyLuNqewK3s +FJ6N46sU7LjJLqSKYEB8usoIizAeMAoGCCsGAQUFBwMDDBBBLVRydXN0LW5RdWFs +LTAz +-----END TRUSTED CERTIFICATE----- + +# AC1 RAIZ MTIN +-----BEGIN TRUSTED CERTIFICATE----- +MIIJSTCCBzGgAwIBAgIGBQtBXoJ7MA0GCSqGSIb3DQEBBQUAMIHiMRYwFAYDVQQD +Ew1BQzEgUkFJWiBNVElOMRIwEAYDVQQFEwlTMjgxOTAwMUUxNTAzBgNVBAsTLFBS +RVNUQURPUiBERSBTRVJWSUNJT1MgREUgQ0VSVElGSUNBQ0lPTiBNVElOMTEwLwYD +VQQLEyhTVUJESVJFQ0NJT04gR0VORVJBTCBERSBQUk9DRVNPIERFIERBVE9TMSww +KgYDVQQKEyNNSU5JU1RFUklPIERFIFRSQUJBSk8gRSBJTk1JR1JBQ0lPTjEPMA0G +A1UEBxMGTUFEUklEMQswCQYDVQQGEwJFUzAeFw0wOTExMDUxNjE3NDVaFw0xOTEx +MDMxNjE3NDVaMIHiMRYwFAYDVQQDEw1BQzEgUkFJWiBNVElOMRIwEAYDVQQFEwlT +MjgxOTAwMUUxNTAzBgNVBAsTLFBSRVNUQURPUiBERSBTRVJWSUNJT1MgREUgQ0VS +VElGSUNBQ0lPTiBNVElOMTEwLwYDVQQLEyhTVUJESVJFQ0NJT04gR0VORVJBTCBE +RSBQUk9DRVNPIERFIERBVE9TMSwwKgYDVQQKEyNNSU5JU1RFUklPIERFIFRSQUJB +Sk8gRSBJTk1JR1JBQ0lPTjEPMA0GA1UEBxMGTUFEUklEMQswCQYDVQQGEwJFUzCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANzNzbG/3iX1/xwzc5k8G6Ft +9aDEfZs4Zo0J3wNsVzW0E0H+41/mIgRYGLlOaTMEP5XH2U7/MzSnMkAyk1f+ga8l +Q1wd/XtXC2IIZ2ditOPlWCWA5qqGYkDnTxBhKUkmq018oatbYTGBBmpklE0n+Ese +0dVD4texbfb2/7RwVfYImbd0AeDznrV85ASICFBZeB8alNvvyMmJ0ze48z2G0RnL +g1oQBwhPmXQCB/AyUcj75tA8JnZ9cn6sdjfBinUgXEDchD/QSXxNZ6457+TOgOHK +neYtqy7mEpXa+fvf4+KMPYf7RW5Eq/Z4kicUoV1rT3B7V3Pv+V2oD3Wf7xFgGYSw +ZEDu2KmG+qXXRfQRb/GGyDRbiEjOut3Nm92I4wE26Kxq6BILsOB7kB6FC0mJAfb/ +gt9YZSKDSNYH0Bxm/GYoOsTD5fiZZSdSWPNr8W8CRIR10KTjaFNhcu/2L6mzrPX0 +9tBc3GlMzHnSpBvIcwY0dLTxasopKMc0hFsj2LoAjMwJwcdvXQSrt08md6k1zyDW +s/8xadA0+yXsaJYKot2DH8o8j3Q2JVTv9Rh7wiQx0fuCBK4Egtb1Ailx4ZJxdI7b +qnEdxDvGYiZshjwjVesp0R+ryh5j57NztKe4Kjr2H/uHZYj885/+v+vVHbaoA+ll +gxmM4BjtF9gcDT2cilh/AgMBAAGjggMBMIIC/TA3BggrBgEFBQcBAQQrMCkwJwYI +KwYBBQUHMAGGG2h0dHA6Ly9jYS5tdGluLmVzL210aW4vb2NzcDAOBgNVHQ8BAf8E +BAMCAQYwGwYDVR0RBBQwEoEQYWRtaW5fY2FAbXRpbi5lczAbBgNVHRIEFDASgRBh +ZG1pbl9jYUBtdGluLmVzMA8GA1UdEwEB/wQFMAMBAf8wcgYDVR0fBGswaTAyoDCg +LoYsaHR0cDovL2NhLm10aW4uZXMvbXRpbi9jcmwvTVRJTkF1dG9yaWRhZFJhaXow +M6AxoC+GLWh0dHA6Ly9jYTIubXRpbi5lcy9tdGluL2NybC9NVElOQXV0b3JpZGFk +UmFpejCBuQYDVR0gBIGxMIGuMIGrBgsrBgEEAYHZBQIEATCBmzAwBggrBgEFBQcC +ARYkaHR0cDovL2NhLm10aW4uZXMvbXRpbi9EUEN5UG9saXRpY2FzMGcGCCsGAQUF +BwICMFsaWUNlcnRpZmljYWRvIHJh7XouIENvbnN1bHRlIGxhcyBjb25kaWNpb25l +cyBkZSB1c28gZW4gaHR0cDovL2NhLm10aW4uZXMvbXRpbi9EUEN5UG9saXRpY2Fz +MB0GA1UdDgQWBBQzQxizxEsdyx/58E7830rkFWDIgzCCARYGA1UdIwSCAQ0wggEJ +gBQzQxizxEsdyx/58E7830rkFWDIg6GB6KSB5TCB4jEWMBQGA1UEAxMNQUMxIFJB +SVogTVRJTjESMBAGA1UEBRMJUzI4MTkwMDFFMTUwMwYDVQQLEyxQUkVTVEFET1Ig +REUgU0VSVklDSU9TIERFIENFUlRJRklDQUNJT04gTVRJTjExMC8GA1UECxMoU1VC +RElSRUNDSU9OIEdFTkVSQUwgREUgUFJPQ0VTTyBERSBEQVRPUzEsMCoGA1UEChMj +TUlOSVNURVJJTyBERSBUUkFCQUpPIEUgSU5NSUdSQUNJT04xDzANBgNVBAcTBk1B +RFJJRDELMAkGA1UEBhMCRVOCBgULQV6CezANBgkqhkiG9w0BAQUFAAOCAgEAmeOq +DpHTkqnq/0Rn06AtIGfzEA8aN3ddUkbmarj3iPOCwyr0YQ0sny+GLWHpYFm9t0+v +kwkc+TN3QJyhfGXcXpCVqfS+gvT8gh0exT3gXK7eLdVjdqvx7CSnIPge6M9xggPd +jnZiKrUpiBMkrVz0oEq46hOKVo1qL2g5coZYxKSrdXxE5xqEDI0R3Bm5HDbu8/9R +m7NDyCV+5w5Io+RPBi0VHqCmR5BXO/gvLdsjuusjk7C4UhtgHNQZsG14j0udpwso +Z0rdeEi9sT6Y1LsV/rNfbR11yB7PD65KGl2HLAZ0bAqFUyReesmgfHGbkl1vSH+2 +WHGyTKYaCSM0UHEVa0fb+74abcKMlC8HZyAiZ2O3q8YZnJYNYuoIpBpw76m5707F +QLzih1fzA8oomRrAVWB1e2O+ZD+WTkuP/S2mdMDfSTrsVX5m07r975OxY/JbP+12 +odnTDP4ubwqmU0vv0fNHrbke7EwfvtCDU8ObFUX/LgfR2mqSReZsV1skLlFpyTDP +1/ukATVazafrFG+0t2AiCMVxyJPiviVf9Qz6WFE9e8gvN/mTHCoJ4Gf9lolCyus2 +sNYbplAPWp12/6RPxuwNxOHQ51g+1nnAd00M1bPkmE3dRi5SsOIPDUI2pRAkUii+ +YjVCOcl6lh/u5ktZPyRzi78iS2by2w818TedoCQwGzAKBggrBgEFBQcDAwwNQUMx +IFJBSVogTVRJTg== +-----END TRUSTED CERTIFICATE----- + +# ACA ROOT +-----BEGIN TRUSTED CERTIFICATE----- +MIIFyDCCA7CgAwIBAgIQR0ORJD/Oww1XSChr7oBdqzANBgkqhkiG9w0BAQsFADBd +MQswCQYDVQQGEwJFUzESMBAGA1UEBRMJUTI4NjMwMDZJMScwJQYDVQQKDB5DT05T +RUpPIEdFTkVSQUwgREUgTEEgQUJPR0FDSUExETAPBgNVBAMMCEFDQSBST09UMB4X +DTE2MDUyNzEwNTg1MVoXDTQxMDUyNzEwNTg1MVowXTELMAkGA1UEBhMCRVMxEjAQ +BgNVBAUTCVEyODYzMDA2STEnMCUGA1UECgweQ09OU0VKTyBHRU5FUkFMIERFIExB +IEFCT0dBQ0lBMREwDwYDVQQDDAhBQ0EgUk9PVDCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBALkrXvU+uokenfXRE8+7o1666d85cmSYUodppbbe4b+URb7F ++KRTZxVQ3FJPKnYsLo0gaozmXbnZaL6RG7ppAxitGE42oqxGqyD4A2qqrXnV3x3B +7kVvIXT5TbGxPZA7PDKA7f8Vz1HK16SHLqrlDrbRelrHufhRu9mU3T7Ghk4K/juJ +8vhuJM6RA1gFEkrdUKtBes7tqR8RUx6lE9th8PWqgN50eR2k4ynW++D8l9qiuKsi +PmWwIcTlxRBEh7Lj4CqCLn3m9LikEyXzd2BfY1OuLrGdimt2ezpxvZKBNrCcgvH3 +xYkoXf+8QgazCGpPYc2kLZDTObh3/8jHo3m7A7mRAwE0Etgwi7aMAsrkSOw4KjJM +bcp2KFqGCrrUII6voF8gLWKciPnxFW1bvbEDUMA/NteuP1HRyuNYZkTmo5t3LjH6 +2X8ixAVM63QbXGN6pgKTfkMOdhQPTW8ylYiAklKXFPU8/JQH02wpBZVGD+Rx4X/4 +bRQSgpK181M+mRGXR3ZKCXLu1MOWCaza//FLS7bXJc8eTJcmCzS7tpTxLGRxX4ny +FTs3pwLkDU9IiTOjjGh4MVFnChnbtOJ0Lz1683cAn3ESY/9zKmRpVOysOq7a8lhj +NH74PF7AQjql27Oo1FrBTli4abasgmLb0fsaQyEi/B31nE9OO+WN/3ZaI15bAgMB +AAGjgYMwgYAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O +BBYEFBpV5BUx4jGbEdSIcXoAPXAoBb/NMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkG +CCsGAQUFBwIBFh1odHRwOi8vd3d3LmFjYWJvZ2FjaWEub3JnL2RvYzANBgkqhkiG +9w0BAQsFAAOCAgEAezDKVYbTr+4a17iVmOz5O92QE6OckkWgkolpoXGRvHGFh6At +MAnkwlM99Km3aC1Nmc2kz547kJ2aCikNKkLBPVtrQILFixOxQWePvqR34MB25PO2 +KVYs73FPwmTx2rQLytA5X1OygwH7sn3Zg3R6NdDBXY+b917nUt/uqjeTq9k9fR7x +vRzb6HXduFtM4xaj9nWIDo88wwts22BZ5AWrKEb3Zmkld97KSjPYWF57j5rPUo49 +bf3Rsr0+eVeGHkQcB030whCqeMvzURcNdj2NbmhJ6e8HSdG4Fsl5ncyuCwVHev2Y +rDGhkFqHYvn4q2Ja4CF20GhC6By+coHwxmd9fnQ81VVvj6VolhHxytMwF71GtjGv +cOmkhDdXugk8LtkLE1YHPpXEtXAvk8Kur4FdRhQw+67F85r3QXqx3ksW2UV1RwJ8 +FB7VsTugLEG1m0t7o4PwuczOHpS3Xi4jBpWRHDhHHO3EeA6kD/wbfNbya9CKW+qW +8zHUXmrElLgwn5XhB4m4iNInhaRhdOWoRDF6IHXo+Njrs0+q/1M/lu3qu/xRQKYr +7CSh+/lEjSPnppcAD8ukar9QoMpxomyub9/Zg4Jm3FNdr/pU94P/qz+Jlae0bfMP +Cg1IMy+BKcdLBcTGV3SEw5g2/++FMqtinBPRIoexvpjbdJqP6sLWk3lFIMMwFjAK +BggrBgEFBQcDAwwIQUNBIFJPT1Q= +-----END TRUSTED CERTIFICATE----- + +# ACCVRAIZ1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7MCswHgYIKwYB +BQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwJQUNDVlJBSVox +-----END TRUSTED CERTIFICATE----- + +# ACEDICOM Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIFtTCCA52gAwIBAgIIYY3HhjsBggUwDQYJKoZIhvcNAQEFBQAwRDEWMBQGA1UE +AwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00x +CzAJBgNVBAYTAkVTMB4XDTA4MDQxODE2MjQyMloXDTI4MDQxMzE2MjQyMlowRDEW +MBQGA1UEAwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZF +RElDT00xCzAJBgNVBAYTAkVTMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC +AgEA/5KV4WgGdrQsyFhIyv2AVClVYyT/kGWbEHV7w2rbYgIB8hiGtXxaOLHkWLn7 +09gtn70yN78sFW2+tfQh0hOR2QetAQXW8713zl9CgQr5auODAKgrLlUTY4HKRxx7 +XBZXehuDYAQ6PmXDzQHe3qTWDLqO3tkE7hdWIpuPY/1NFgu3e3eM+SW10W2ZEi5P +Grjm6gSSrj0RuVFCPYewMYWveVqc/udOXpJPQ/yrOq2lEiZmueIM15jO1FillUAK +t0SdE3QrwqXrIhWYENiLxQSfHY9g5QYbm8+5eaA9oiM/Qj9r+hwDezCNzmzAv+Yb +X79nuIQZ1RXve8uQNjFiybwCq0Zfm/4aaJQ0PZCOrfbkHQl/Sog4P75n/TSW9R28 +MHTLOO7VbKvU/PQAtwBbhTIWdjPp2KOZnQUAqhbm84F9b32qhm2tFXTTxKJxqvQU +fecyuB+81fFOvW8XAjnXDpVCOscAPukmYxHqC9FK/xidstd7LzrZlvvoHpKuE1XI +2Sf23EgbsCTBheN3nZqk8wwRHQ3ItBTutYJXCb8gWH8vIiPYcMt5bMlL8qkqyPyH +K9caUPgn6C9D4zq92Fdx/c6mUlv53U3t5fZvie27k5x2IXXwkkwp9y+cAS7+UEae +ZAwUswdbxcJzbPEHXEUkFDWug/FqTYl6+rPYLWbwNof1K1MCAwEAAaOBqjCBpzAP +BgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKaz4SsrSbbXc6GqlPUB53NlTKxQ +MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUprPhKytJttdzoaqU9QHnc2VMrFAw +RAYDVR0gBD0wOzA5BgRVHSAAMDEwLwYIKwYBBQUHAgEWI2h0dHA6Ly9hY2VkaWNv +bS5lZGljb21ncm91cC5jb20vZG9jMA0GCSqGSIb3DQEBBQUAA4ICAQDOLAtSUWIm +fQwng4/F9tqgaHtPkl7qpHMyEVNEskTLnewPeUKzEKbHDZ3Ltvo/Onzqv4hTGzz3 +gvoFNTPhNahXwOf9jU8/kzJPeGYDdwdY6ZXIfj7QeQCM8htRM5u8lOk6e25SLTKe +I6RF+7YuE7CLGLHdztUdp0J/Vb77W7tH1PwkzQSulgUV1qzOMPPKC8W64iLgpq0i +5ALudBF/TP94HTXa5gI06xgSYXcGCRZj6hitoocf8seACQl1ThCojz2GuHURwCRi +ipZ7SkXp7FnFvmuD5uHorLUwHv4FB4D54SMNUI8FmP8sX+g7tq3PgbUhh8oIKiMn +MCArz+2UW6yyetLHKKGKC5tNSixthT8Jcjxn4tncB7rrZXtaAWPWkFtPF2Y9fwsZ +o5NjEFIqnxQWWOLcpfShFosOkYuByptZ+thrkQdlVV9SH686+5DdaaVbnG0OLLb6 +zqylfDJKZ0DcMDQj3dcEI2bw/FWAp/tmGYI1Z2JwOV5vx+qQQEQIHriy1tvuWacN +GHk0vFQYXlPKNFHtRQrmjseCNj6nOGOpMCwXEGCSn1WHElkQwg9naRHMTh5+Spqt +r0CodaxWkHS4oJyleW/c6RrIaQXpuvoDs3zk4E7Czp3otkYNbn5XOmeUwssfnHdK +Z05phkOTOPu220+DkdRgfks+KzgHVZhepDAbMAoGCCsGAQUFBwMDDA1BQ0VESUNP +TSBSb290 +-----END TRUSTED CERTIFICATE----- + +# ACNLB +-----BEGIN TRUSTED CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIEPsOGjjANBgkqhkiG9w0BAQUFADAdMQswCQYDVQQGEwJT +STEOMAwGA1UEChMFQUNOTEIwHhcNMDMwNTE1MTE1MjQ1WhcNMjMwNTE1MTIyMjQ1 +WjAdMQswCQYDVQQGEwJTSTEOMAwGA1UEChMFQUNOTEIwggEiMA0GCSqGSIb3DQEB +AQUAA4IBDwAwggEKAoIBAQC/dnU9DHxAOmZfTYz73Twu/n2UZO1K1ElIoe6RcbJ5 +yI4rH6rwMrQosqPCdU+k6aYa9qJmYSMnYSxuF5AL+t4ecVICKQSZeazAsMBmmJgR +N2QQz5y8O0IcKVxVkPZ6Ik5Wrzdov3Q6bDzGmMxgIb/iCCfk2Su844SV19QkYPx+ +LS+dIeudkca7pNHryRKto+jItX9VS+uZAlTEgRwMrjnkanoF2E5woPoDd7Ou2LgU +kvtBdxM1areiyohLrS1RvHaabLtAveckTCKm5v1OCHudCxDWEtKmxqFkMvQBc5aB +4kiwwShjPTvnZ6xuxRT1FxOinB8rV/AVJ3Vd3bE01pMRAgMBAAGjgf4wgfswEQYJ +YIZIAYb4QgEBBAQDAgAHMD8GA1UdHwQ4MDYwNKAyoDCkLjAsMQswCQYDVQQGEwJT +STEOMAwGA1UEChMFQUNOTEIxDTALBgNVBAMTBENSTDEwKwYDVR0QBCQwIoAPMjAw +MzA1MTUxMTUyNDVagQ8yMDIzMDUxNTEyMjI0NVowCwYDVR0PBAQDAgEGMB8GA1Ud +IwQYMBaAFMy7u4bWb/i+tEcid7O2rdcBWZZNMB0GA1UdDgQWBBTMu7uG1m/4vrRH +Ineztq3XAVmWTTAMBgNVHRMEBTADAQH/MB0GCSqGSIb2fQdBAAQQMA4bCFY2LjA6 +NC4wAwIEkDANBgkqhkiG9w0BAQUFAAOCAQEAEWfLy5prICHdb2mD1T8NupMVl05w +diZc6J4k5zf+PFD01PkqLwwToV0EvNCw6cIDF4UFYT3Ap6p2TMO4OoOphs8D+XcO +K7I9dhtl0WpxYHHbu7h6jvL5IYP4V0yox91lxu7vb7O2mbu0w9CrX7Kgft10ISzD +WuuNocrY8MgX7Xa6hGNuW7m1ym3X/DQ5gC+6T9+N2PwYxDyKNS93gpatIJIYsuc2 +9K4ydLhH0dgP2CzLasIAdfks+EIOy/5zk6mP4ceuITfzyrkMtOeJfnEcVjQgw/E0 +uVVL01NS8QctKz5bGUCfEO3TKTPFrw8QVofaO8ix7TjZGftL8FAtpM3UWDATMAoG +CCsGAQUFBwMDDAVBQ05MQg== +-----END TRUSTED CERTIFICATE----- + +# AC RAIZ DNIE +-----BEGIN TRUSTED CERTIFICATE----- +MIIFvzCCA6egAwIBAgIQANKFcP2up9ZfEYQVxjG1yzANBgkqhkiG9w0BAQUFADBd +MQswCQYDVQQGEwJFUzEoMCYGA1UECgwfRElSRUNDSU9OIEdFTkVSQUwgREUgTEEg +UE9MSUNJQTENMAsGA1UECwwERE5JRTEVMBMGA1UEAwwMQUMgUkFJWiBETklFMB4X +DTA2MDIxNjEwMzcyNVoXDTM2MDIwODIyNTk1OVowXTELMAkGA1UEBhMCRVMxKDAm +BgNVBAoMH0RJUkVDQ0lPTiBHRU5FUkFMIERFIExBIFBPTElDSUExDTALBgNVBAsM +BEROSUUxFTATBgNVBAMMDEFDIFJBSVogRE5JRTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAIAArQzDoyAHo2P/9zSgze5qVAgXXbEBFafmuV+Kcf8Mwh3q +N/Pek3/WBU2EstXXHAz0xJFwQA5ayJikgOgNM8AH87f1rKE4esBmVCT8UswwKvLD +xKEsdr/BwL+C8ZvwaHoTQMiXvBwlBwgKt5bvzClU4OZlLeqyLrEJaRJOMNXY+LwA +gC9Nkw/NLlcbM7ufME7Epct5p/viNBi2IJ4bn12nyTqtRWSzGM4REpxtHlVFKISc +V2dN+cvii49YCdQ5/8g20jjiDGV/FQ59wQfdqSLfkQDEbHE0dNw56upPRGl/WNtY +ClJxK+ypHVB0M/kpavr+mfTnzEVFbcpaJaIS487XOAU58BoJ9XZZzmJvejQNLNG8 +BBLsPVPI+tACy849IbXF4DkzZc85U8mbRvmdM/NZgAhBvm9LoPpKzqR2HIXir68U +nWWs93+X5DNJpq++zis38S7BcwWcnGBMnTANl1SegWK75+Av9xQHFKl3kenckZWO +04iQM0dvccMUafqmLQEeG+rTLuJ/C9zP5yLw8UGjAZLlgNO+qWKoVYgLNDTs3CEV +qu/WIl6J9VGSEypvgBbZsQ3ZLvgQuML+UkUznB04fNwVaTRzv6AsuxF7lM34Ny1v +Pe+DWsYem3RJj9nCjb4WdlDIWtElFvb2zIycWjCeZb7QmkiT1/poDXUxh/n3AgMB +AAGjezB5MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQW +BBSORfSfc8X/LxsF2wFHYBsDioG3ujA3BgNVHSAEMDAuMCwGBFUdIAAwJDAiBggr +BgEFBQcCARYWaHR0cDovL3d3dy5kbmllLmVzL2RwYzANBgkqhkiG9w0BAQUFAAOC +AgEAdeVzyVFRL4sZoIfp/642Nqb8QR/jHtdxYBnGb5oCML1ica1z/pEtTuQmQESp +rngmIzFp3Jpzlh5JUQvg78G4Q+9xnO5Bt8VQHzKEniKG8fcfj9mtK07alyiXu5aa +Gvix2XoE81SZEhmWFYBnOf8CX3r8VUJQWua5ov+4qGIeFM3ZP76jZUjFO9c3zg36 +KJDav/njUUclfUrTZ02HqmK8Xux6gER8958KvWVXlMryEWbWUn/kOnB1BM07l9Q2 +cvdRVr809dJB4bTaqEP+axJJErRdzyJClowIIyaMshBOXapT7gEvdeW5ohEzxNdq +/fgOym6C2ee7WSNOtfkRHS9rI/V7ESDqQRKQMkbbMTupwVtzaDpGG4z+l7dWuWGZ +zE7wg/o38d4cnRxxiwOTw8Rzgi6omB1kopqM91QITc/qgcv1WwmZY691jJb4eTXV +3OtBgXk4hF5v8W9idtuRzlqFYDkdW+IqL0Ml28J6JNMVsKLxjKB9a0gJE/+iTGaK +7HBSCVOMMMy41bok3DCZPqFet9+BrOw3vk6bJ1jefqGbVH8Gti/kMlD95xC7qM3a +GBvUY2Y96lFxOfScPt9a9NrHTCbti7UhujR5AnNhENqYMahgy34Hp9C3BUOJW82F +JtmwUa/3jFKqEqdY35KbZ/Kd8ub0aTH0Fufed1se3ZoFAa0wGjAKBggrBgEFBQcD +AwwMQUMgUkFJWiBETklF +-----END TRUSTED CERTIFICATE----- + +# AC RAIZ FNMT-RCM +-----BEGIN TRUSTED CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx +CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ +WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ +BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG +Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ +yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf +BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz +WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF +tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z +374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC +IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL +mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 +wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS +MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 +ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet +UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H +YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 +LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD +nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 +RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM +LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf +77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N +JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm +fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp +6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp +1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B +9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok +RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv +uu8wd+RU4riEmViAqhOLUTpPSPaLtrMwKDAUBggrBgEFBQcDAQYIKwYBBQUHAwMM +EEFDIFJBSVogRk5NVC1SQ00= +-----END TRUSTED CERTIFICATE----- + +# AC RAIZ FNMT-RCM SERVIDORES SEGUROS +-----BEGIN TRUSTED CERTIFICATE----- +MIICbjCCAfOgAwIBAgIQYvYybOXE42hcG2LdnC6dlTAKBggqhkjOPQQDAzB4MQsw +CQYDVQQGEwJFUzERMA8GA1UECgwIRk5NVC1SQ00xDjAMBgNVBAsMBUNlcmVzMRgw +FgYDVQRhDA9WQVRFUy1RMjgyNjAwNEoxLDAqBgNVBAMMI0FDIFJBSVogRk5NVC1S +Q00gU0VSVklET1JFUyBTRUdVUk9TMB4XDTE4MTIyMDA5MzczM1oXDTQzMTIyMDA5 +MzczM1oweDELMAkGA1UEBhMCRVMxETAPBgNVBAoMCEZOTVQtUkNNMQ4wDAYDVQQL +DAVDZXJlczEYMBYGA1UEYQwPVkFURVMtUTI4MjYwMDRKMSwwKgYDVQQDDCNBQyBS +QUlaIEZOTVQtUkNNIFNFUlZJRE9SRVMgU0VHVVJPUzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPa6V1PIyqvfNkpSIeSX0oNnnvBlUdBeh8dHsVnyV0ebAAKTRBdp20LH +sbI6GA60XYyzZl2hNPk2LEnb80b8s0RpRBNm/dfF/a82Tc4DTQdxz69qBdKiQ1oK +Um8BA06Oi6NCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFAG5L++/EYZg8k/QQW6rcx/n0m5JMAoGCCqGSM49BAMDA2kAMGYCMQCu +SuMrQMN0EfKVrRYj3k4MGuZdpSRea0R7/DjiT8ucRRcRTBQnJlU5dUoDzBOQn5IC +MQD6SmxgiHPz7riYYqnOK8LZiqZwMR2vsJRM60/G49HzYqc8/5MuB1xJAWdpEgJy +v+cwMTAKBggrBgEFBQcDAQwjQUMgUkFJWiBGTk1ULVJDTSBTRVJWSURPUkVTIFNF +R1VST1M= +-----END TRUSTED CERTIFICATE----- + +# AC Raíz Certicámara S.A. +-----BEGIN TRUSTED CERTIFICATE----- +MIIGZjCCBE6gAwIBAgIPB35Sk3vgFeNX8GmMy+wMMA0GCSqGSIb3DQEBBQUAMHsx +CzAJBgNVBAYTAkNPMUcwRQYDVQQKDD5Tb2NpZWRhZCBDYW1lcmFsIGRlIENlcnRp +ZmljYWNpw7NuIERpZ2l0YWwgLSBDZXJ0aWPDoW1hcmEgUy5BLjEjMCEGA1UEAwwa +QUMgUmHDrXogQ2VydGljw6FtYXJhIFMuQS4wHhcNMDYxMTI3MjA0NjI5WhcNMzAw +NDAyMjE0MjAyWjB7MQswCQYDVQQGEwJDTzFHMEUGA1UECgw+U29jaWVkYWQgQ2Ft +ZXJhbCBkZSBDZXJ0aWZpY2FjacOzbiBEaWdpdGFsIC0gQ2VydGljw6FtYXJhIFMu +QS4xIzAhBgNVBAMMGkFDIFJhw616IENlcnRpY8OhbWFyYSBTLkEuMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq2uJo1PMSCMI+8PPUZYILrgIem08kBeG +qentLhM0R7LQcNzJPNCNyu5LF6vQhbCnIwTLqKL85XXbQMpiiY9QngE9JlsYhBzL +fDe3fezTf3MZsGqy2IiKLUV0qPezuMDU2s0iiXRNWhU5cxh0T7XrmafBHoi0wpOQ +Y5fzp6cSsgkiBzPZkc0OnB8OIMfuuzONj8LSWKdf/WU34ojC2I+GdV75LaeHM/J4 +Ny+LvB2GNzmxlPLYvEqcgxhaBvzz1NS6jBUJJfD5to0EfhcSM2tXSExP2yYe68yQ +54v5aHxwD6Mq0Do43zeX4lvegGHTgNiRg0JaTASJaBE8rF9ogEHMYELODVoqDA+b +MMCm8Ibbq0nXl21Ii/kDwFJnmxL3wvIumGVC2daa49AZMQyth9VXAnow6IYm+48j +ilSH5L887uvDdUhfHjlvgWJsxS3EF1QZtzeNnDeRyPYL1epjb4OsOMLzP96a++Ej +YfDIJss2yKHzMI+ko6Kh3VOz3vCaMh+DkXkwwakfU5tTohVTP92dsxA7SH2JD/zt +A/X7JWR1DhcZDY8AFmd5ekD8LVkH2ZD6mq093ICK5lw1omdMEWux+IBkAC1vImHF +rEsm5VoQgpukg3s0956JkSCXjrdCx2bD0Omk1vUgjcTDlaxECp1bczwmPS9KvqfJ +pxAe+59QafMCAwEAAaOB5jCB4zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQU0QnQ6dfOeXRU+Tows/RtLAMDG2gwgaAGA1UdIASBmDCB +lTCBkgYEVR0gADCBiTArBggrBgEFBQcCARYfaHR0cDovL3d3dy5jZXJ0aWNhbWFy +YS5jb20vZHBjLzBaBggrBgEFBQcCAjBOGkxMaW1pdGFjaW9uZXMgZGUgZ2FyYW50 +7WFzIGRlIGVzdGUgY2VydGlmaWNhZG8gc2UgcHVlZGVuIGVuY29udHJhciBlbiBs +YSBEUEMuMA0GCSqGSIb3DQEBBQUAA4ICAQBclLW4RZFNjmEfAygPU3zmpFmps4p6 +xbD/CHwso3EcIRNnoZUSQDWDg4902zNc8El2CoFS3UnUmjIz75uny3XlesuXEpBc +unvFm9+7OSPI/5jOCk0iAUgHforA1SBClETvv3eiiWdIG0ADBaGJ7M9i4z0ldma/ +Jre7Ir5v/zlXdLp6yQGVwZVR6Kss+LGGIOk/yzVb0hfpKv6DExdA7ohiZVvVO2Dp +ezy4ydV/NgIlqmjCMRW3MGXrfx1IebHPOeJCgBbT9ZMj/EyXyVo3bHwi2ErN0o42 +gzmRkBDI8ck1fj+404HGIGQatlDCIaR43NAvO2STdPCWkPHv+wlaNECW8DYSwaN0 +jJN+Qd53i+yG2dIPPy3RzECiiWZIHiCznCNZc6lEc7wkeZBWN7PGKX6jD/EpOe9+ +XCgycDWs2rjIdWb8m0w5R44bb5tNAlQiM+9hup4phO9OSzNHdpdqy35f/RWmnkJD +W2ZaiogN9xa5P1FlK2Zqi9E4UqLWRhH6/JocdJ6PlwsCT2TG9WjTSy3/pDceiz+/ +RL5hRqGEPQgnTIEgd4kI6mdAXmwIUV80WoyWaM3X94nCHNMyAK9Sy9NgWyo6R35r +MDOhYil/SrnhLecUIw4OGEfhefwVVdCx/CVxY3UzHCMrr1zZ7Ud3YA47Dx7SwNxk +BYn8eNZcLCZDqTAoMAoGCCsGAQUFBwMDDBpBQyBSYcOteiBDZXJ0aWPDoW1hcmEg +Uy5BLg== +-----END TRUSTED CERTIFICATE----- + +# ADOCA02 +-----BEGIN TRUSTED CERTIFICATE----- +MIID2TCCAsGgAwIBAgICBxUwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQVUx +DDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9EMQwwCgYDVQQLEwNQS0kxDDAKBgNV +BAsTA0NBczEQMA4GA1UEAxMHQURPQ0EwMjAeFw0xMTA5MDEwNDI2MDdaFw0xOTAx +MjcwMjMxMjRaMFcxCzAJBgNVBAYTAkFVMQwwCgYDVQQKEwNHT1YxDDAKBgNVBAsT +A0RvRDEMMAoGA1UECxMDUEtJMQwwCgYDVQQLEwNDQXMxEDAOBgNVBAMTB0FET0NB +MDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkUIVId4++/0nRu3Wu +hyAKlkElK7xGB93LBIaVLEkuvUYMDvdYoGAWhdpdO+N1XkJ9ZGyPwV0pZEGyhbcb +Rr2F2tc6HbK08Uo9/h7ayO6GnaNqUQvkRZiv2BtIvDwUIu0rnzt/bzM81n2s4HlP +v2WTyxcqb7x6D+lbX+EMKvtAUjZKXWU4y1nBSLOkkYUWXXh9ws8tM+5ZSsjmYbOG +H4TIuBpsntFgtII1670jqC+TVFDOJF4xrtNqNCxhhzdGHkOJxoDLIgPTyYUuH5ux +rDlLTWDyimEb/4OxLHOPiELALbHKnsCVZ3R7luRqeo5BRaA088645+KP81BVZG+5 +ICuTAgMBAAGjga4wgaswDAYDVR0TBAUwAwEB/zBLBgNVHSAERDBCMDgGCSokAYJO +AQEBATArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3LmRlZmVuY2UuZ292LmF1L3Br +aTAGBgRVHSAAMA4GA1UdDwEB/wQEAwIBxjAfBgNVHSMEGDAWgBTp553rNb24sitJ +WPS8kn2LcYoRWjAdBgNVHQ4EFgQU6eed6zW9uLIrSVj0vJJ9i3GKEVowDQYJKoZI +hvcNAQEFBQADggEBAFbQqMhsybSs8TuBdSsRxPZWtFeuwpIZXJZzCu0uQ5xkKll4 +E7VQjE5qkFTzGT4WGM9DE8kyc/hV4MrQkhk+ZaPegBIcUaUYLMBp3beGMq/wrc/g +wyPE5fy2PwsF15Y6ZF53jITO8dzNBArcl/EhHMd9MCVd1yA1lcOHHbY/21PiKqT4 +GRc6DBXuswU4Me5Fcd2X+3hxhgL0nzQZc0kQK6B/8cn6oPJYIzEW+BBQgrtd0urv +ad1ndlU4x6gOA4A4TwAga98rZZPbCK9gbDQgqK1IPxB+psOUAZXhgSyg7YyuVE46 +S8PSws9+AnzvKiy77NrexQGvlEntD8K/DpBpLWswFTAKBggrBgEFBQcDAwwHQURP +Q0EwMg== +-----END TRUSTED CERTIFICATE----- + +# ANCERT Certificados CGN +-----BEGIN TRUSTED CERTIFICATE----- +MIIFKjCCBBKgAwIBAgIPRHTsyGxyHljduCx+9PyVMA0GCSqGSIb3DQEBBQUAMHwx +CzAJBgNVBAYTAkVTMUswSQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENlcnRp +ZmljYWNpb24gUy5MLiBVbmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxIDAeBgNV +BAMTF0FOQ0VSVCBDZXJ0aWZpY2Fkb3MgQ0dOMB4XDTA0MDIxMTE3MjcxMloXDTI0 +MDIxMTE3MjcxMlowfDELMAkGA1UEBhMCRVMxSzBJBgNVBAoTQkFnZW5jaWEgTm90 +YXJpYWwgZGUgQ2VydGlmaWNhY2lvbiBTLkwuIFVuaXBlcnNvbmFsIC0gQ0lGIEI4 +MzM5NTk4ODEgMB4GA1UEAxMXQU5DRVJUIENlcnRpZmljYWRvcyBDR04wggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCQdT8/DKzK1HzESKcYuzq7obvVe9+L +GeSCRPtl7LYSYT5pIhliNSS21RAGqUVqJCr1J4x4PMi58wVsxQID0k6AZOyGq3iU +IgIAtWib1OVVX+DIgDDnC79r1wSOTnmYcEwcJrmzqOrwEaK5ilMCJnUSieH7iE5Z +egDRgtgWruW2vJUlYEB3JRue743k/fBPMzElv+56ClTwkDhnEnulYNoMAYmadocu +9RtDe+XnJkr7FWKrRRt71QqlTWxNq58oSIThg3W4GHBVU9vQ3ymQrznGF5XBlMVe +2WVfXf9uFpWYIZ9eTfDNMTkhAxcNkR+hVZlB7FXJuz2ZXJvFf9EcXupTAgMBAAGj +ggGnMIIBozAPBgNVHRMBAf8EBTADAQH/MIIBIAYDVR0gBIIBFzCCARMwggEPBgkr +BgEEAYGTaAQwggEAMCUGCCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5jb20v +Y3BzMIHWBggrBgEFBQcCAjCByTANFgZBTkNFUlQwAwIBARqBt0FnZW5jaWEgTm90 +YXJpYWwgZGUgQ2VydGlmaWNhY2lvbi4gTGEgZGVjbGFyYWNpb24gZGUgcHJhY3Rp +Y2FzIGRlIGNlcnRpZmlhY2lvbiBxdWUgcmlnZSBlbCBmdW5jaW9uYW1pZW50byBk +ZSBsYSBwcmVzZW50ZSBhdXRvcmlkYWQgc2UgZW5jdWVudHJhIGRpc3BvbmlibGUg +ZW4gaHR0cDovL3d3dy5hbmNlcnQuY29tL2NwczAOBgNVHQ8BAf8EBAMCAYYwHAYD +VR0RBBUwE4ERYW5jZXJ0QGFuY2VydC5jb20wHwYDVR0jBBgwFoAU7FefyHYib8w6 +rlvwLaFiWNGNAswwHQYDVR0OBBYEFOxXn8h2Im/MOq5b8C2hYljRjQLMMA0GCSqG +SIb3DQEBBQUAA4IBAQCLPd/cNix/J5z8tVhTcQoSXRBkUXG1Slb0XkRnHu8dsvGk +UTxnbCxllnqhEqOvCwg3DpnWbiiHC2KrTnhOcoGb3xFPiWDIUaYbBglxc3w3txw4 +N5r5h+Hvoe5/18DqORT6fG8L+YbK5sV3aaCfjSmjd27FzNr23QZ602lmPmA74zLf +rvAbniqdzITfGhBH7aVWlkI3tS1yDUESk7oyiETIrgnEvYDt/WAPcrK2ZPZjIDJw +d4cuMy6fNchfqJJWt/8kOixd8iYFaBnyUWfP31IJ6YIEemuCp3/l0ql0axgmyLrU +1R6lSzsmwZ0i4fsSvdViRtXXXdLdw/xhDTAFTwWLMCUwCgYIKwYBBQUHAwMMF0FO +Q0VSVCBDZXJ0aWZpY2Fkb3MgQ0dO +-----END TRUSTED CERTIFICATE----- + +# ANCERT Certificados CGN V2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIHBDCCBOygAwIBAgIQDziMcP6mlV3pXZyHr3kEmTANBgkqhkiG9w0BAQsFADB1 +MQswCQYDVQQGEwJFUzFBMD8GA1UEChM4QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uIFMuTC5VLiAtIENJRiBCODMzOTU5ODgxIzAhBgNVBAMTGkFOQ0VS +VCBDZXJ0aWZpY2Fkb3MgQ0dOIFYyMB4XDTEwMDUyNTE2MzEyMloXDTMwMDUyNTE2 +MzEyM1owdTELMAkGA1UEBhMCRVMxQTA/BgNVBAoTOEFnZW5jaWEgTm90YXJpYWwg +ZGUgQ2VydGlmaWNhY2lvbiBTLkwuVS4gLSBDSUYgQjgzMzk1OTg4MSMwIQYDVQQD +ExpBTkNFUlQgQ2VydGlmaWNhZG9zIENHTiBWMjCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAJ1ScOknGIPK6sSZ2KbhLhSvbh4OZMqBN1UnHBd3WGcfjMn5 +wopiZSh0m+LRvlUHdnbufG1OY1seSiV14Aeh0NKCp84PM+u6FMBlskou5WW8ItKv +Gg7Ky/NkZSssmaOXi4t1MP5m+sFPSzdQjD/z3pl6ToecIEZyl/5WG2ZOoIJTo1zY +KEYMBRdvONZcnw4lIsGG41waVNuunWV9AJLfqCEhxVsQJnThsXNXZHx9FwMM6vcU +lw/5xe5ddbDFxgoLtD5J4xnGm0ST/FoVZAqyg/+AXogJ0Mogo1v7283hGncjGHAa +i+1EP9YaqDY44Z0vp3fEerPAcrJyzR4/EF4aiHSN8BLF969J3JWvK020kMr57u8M +478WNyNT4yn69HRpaD1XbRRgimRpKGRN+jZH/bgSzsOGqlzcZjkHTzvj48Vors7g +OVwggz8SCjizAMFcE5ciXjpLNZn4xB7e+YgRjoTJizLy0te/Igc/YHgudRyiuiMS +0/BPUDnsyXcnx1oqjtO5tXQEmRUvLoZfjwbByuriqB9NfTOEkaSSw9CmSF1mGneE +IFCc6gQLDCOWz7Gc/Lm6H5eo06sDZS99rlTHeeIcNt1t0gaYAf3O/D9Lw9Ku/4nY +OTED2LFkdwPG+KON/Cp55xC9uW2RHD6dy7xVfyL+YYT42NSnIXo5XnIy60x1AgMB +AAGjggGOMIIBijAPBgNVHRMBAf8EBTADAQH/MIIBJQYDVR0gBIIBHDCCARgwggEU +BgkrBgEEAYGTaAQwggEFMCUGCCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5j +b20vY3BzMIHbBggrBgEFBQcCAjCBzjANFgZBTkNFUlQwAwIBAR6BvABBAGcAZQBu +AGMAaQBhACAATgBvAHQAYQByAGkAYQBsACAAZABlACAAQwBlAHIAdABpAGYAaQBj +AGEAYwBpAG8AbgAuACAAUABhAHMAZQBvACAAZABlAGwAoABHAGUAbgBlAHIAYQBs +ACAATQBhAHIAdABpAG4AZQB6ACAAQwBhAG0AcABvAHMAIAA0ADYAIAA2AGEAIABw +AGwAYQBuAHQAYQAgADIAOAAwADEAMAAgAE0AYQBkAHIAaQBkMA4GA1UdDwEB/wQE +AwIBhjAdBgNVHQ4EFgQUBW7hoZruB6/O9bTTZT0EUOLQm0QwHwYDVR0jBBgwFoAU +BW7hoZruB6/O9bTTZT0EUOLQm0QwDQYJKoZIhvcNAQELBQADggIBAH9UQBkkykwT +9hP5XGKVMNW44JOAbNQVRtQnPpJSqtyBY4ZA29Ulr5+TbAr1TaH+VJZdh68Rkw+L +8uPwH0qf/KnRyVB3X5gICC16i4EQzDsCVFjlxqf098ro9jcGfucR12yFY/eoow7i +JWIEpPJiU5xHtKdku4Hl1l5WEb5FEWHCZun0DXSoq/lbv4KykaZQ+4d+b7vI6wWi +uRDXG0IHVc+J5r/7ufBqOVdTcIy9S6Npvx+LplxNZYq5AAnoaL8JJwdNXtpSCYzl +cZOKzIWO0jdeU9yCbQtWSoR5CvQQJUT1b10aZrXN1RBLh1pO1H/kcazuaJ+8+i5Y +wcSef6RZheBSDvLHR3UVLSx2jA9FBTVg+Hs7dzJ/KIAJ2jG8cX3hrJHNYAp5IOxu +O7eE4HLzqUrQL+Rb49Ia1Eq89Xb5fyoZSOvdDs+ZVkW4fdYJjg7Os4RoSYRUNUvk +mRuv86gU81SYCoB+T7zyZi0m/zCNp/a925qP5eHfu7cyDvmSb2nj5HbTADbxLV7H +E1/V2Wot6NEba3bLGG4OBRD1WvJJG1m0herKGXTMu1LiN4zCagIlwtJxpJLbjsnW +qW7QhShtXG0IeAKweQxXbwtaAeOEhAL2z/KrY+sCarnLShjVOSI8VkqqlYjmMAAf +jSEhyVfuubdEKYhPtiunFO6O7m++FtATMCgwCgYIKwYBBQUHAwMMGkFOQ0VSVCBD +ZXJ0aWZpY2Fkb3MgQ0dOIFYy +-----END TRUSTED CERTIFICATE----- + +# ANCERT Certificados Notariales +-----BEGIN TRUSTED CERTIFICATE----- +MIIFPDCCBCSgAwIBAgIRAPTPierdpMY+ka1IDi0iNoQwDQYJKoZIhvcNAQEFBQAw +gYMxCzAJBgNVBAYTAkVTMUswSQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENl +cnRpZmljYWNpb24gUy5MLiBVbmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxJzAl +BgNVBAMTHkFOQ0VSVCBDZXJ0aWZpY2Fkb3MgTm90YXJpYWxlczAeFw0wNDAyMTEx +NTU4MzBaFw0yNDAyMTExNTU4MjZaMIGDMQswCQYDVQQGEwJFUzFLMEkGA1UEChNC +QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0aWZpY2FjaW9uIFMuTC4gVW5pcGVyc29u +YWwgLSBDSUYgQjgzMzk1OTg4MScwJQYDVQQDEx5BTkNFUlQgQ2VydGlmaWNhZG9z +IE5vdGFyaWFsZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwkQ/Q +Zy0psmNNHzV59mVrufPztViTJ2RPp9VbggVym38drgjSjNDRyWCwmRk11hnGADlp +fSLvdCKDtH7qEIs+Mxzh3WQ2KfNSSm5Bw75RDB9juL+NqT8xMTu78TZEPCdlFHl1 +5hCkPFgby1NiEvWHWkaieaNg4xao3oSm+uXMxBAy9kLaR00YPeZ6DysOY/9nfUPV +dBaQNLQPziZzIcFK2mTkT+Mjtdn2q7dKf5bhy0f9BkPRlDRpCv496GaqJgzVYzkG +cJOtfLPkR8E7R45plwyRoEwHj8mATK5wk2iPocMiwvF1myh9kpJVOqhZGewSMRzv +nRfcuUAJW/QtEyZzAgMBAAGjggGnMIIBozAcBgNVHREEFTATgRFhbmNlcnRAYW5j +ZXJ0LmNvbTAfBgNVHSMEGDAWgBSE9/pyXohkZh0ojLB3vQxqn0xNYjAPBgNVHRMB +Af8EBTADAQH/MIIBIAYDVR0gBIIBFzCCARMwggEPBgkrBgEEAYGTaAEwggEAMCUG +CCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5jb20vY3BzMIHWBggrBgEFBQcC +AjCByTANFgZBTkNFUlQwAwIBARqBt0FnZW5jaWEgTm90YXJpYWwgZGUgQ2VydGlm +aWNhY2lvbi4gTGEgZGVjbGFyYWNpb24gZGUgcHJhY3RpY2FzIGRlIGNlcnRpZmlh +Y2lvbiBxdWUgcmlnZSBlbCBmdW5jaW9uYW1pZW50byBkZSBsYSBwcmVzZW50ZSBh +dXRvcmlkYWQgc2UgZW5jdWVudHJhIGRpc3BvbmlibGUgZW4gaHR0cDovL3d3dy5h +bmNlcnQuY29tL2NwczAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFIT3+nJeiGRm +HSiMsHe9DGqfTE1iMA0GCSqGSIb3DQEBBQUAA4IBAQAv+OXYM6XClG5ewPHuoUwK +rYYPwDPdntLZm+7FK4UpdqylElOTHaoH7Ok5ZAto8HUk6dGGjJxTausVoQm3GQe5 +nY8CshtJcMJjdN0Lqv4HxjdWxoP+wE8czDiq/e5VmIlcwlOtIIe6FmRSYezBn7vU +YtEqyF3wK/jaEs4jy7HMwdIKvfzAgE5VSfqJ2GSjSsrui9fl7ZL7YOLiKs8tKD6m +/4CcZcwSnqUcdFmQpYd/ZxWAEMCh0agw7KECkYpa0yMXk1pHIXnqM3oPfzg1mspW +uL9kuqewtVEdFp6OiX04OsuETQeY2OXhjAVqpTcM1nkpPvFCxLb36hmgYeACTr8S +MCwwCgYIKwYBBQUHAwMMHkFOQ0VSVCBDZXJ0aWZpY2Fkb3MgTm90YXJpYWxlcw== +-----END TRUSTED CERTIFICATE----- + +# ANCERT Certificados Notariales V2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIHEjCCBPqgAwIBAgIQCb1WBSoTFvRoT3QOqX0cSDANBgkqhkiG9w0BAQsFADB8 +MQswCQYDVQQGEwJFUzFBMD8GA1UEChM4QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uIFMuTC5VLiAtIENJRiBCODMzOTU5ODgxKjAoBgNVBAMTIUFOQ0VS +VCBDZXJ0aWZpY2Fkb3MgTm90YXJpYWxlcyBWMjAeFw0xMDA1MjUxNjU2MTRaFw0z +MDA1MjUxNjU2MTRaMHwxCzAJBgNVBAYTAkVTMUEwPwYDVQQKEzhBZ2VuY2lhIE5v +dGFyaWFsIGRlIENlcnRpZmljYWNpb24gUy5MLlUuIC0gQ0lGIEI4MzM5NTk4ODEq +MCgGA1UEAxMhQU5DRVJUIENlcnRpZmljYWRvcyBOb3RhcmlhbGVzIFYyMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsua5xh1qKi1Jxfz81GRA0OAULveg +wv+S80GmtD/avhkUkZR20xXMXn94UHrb2sVFqsscI3lzkKi7ZwFzjs5A+Rqpqofk +k5IPXGhcXvAGYCtY3DxtPMd6MGsFqpKGcyrS8hqIxNvlWmaOdclCP5uIKEAe9alc +HvrIQaEwqwuc7haiwS2lhfrtoAzof5ZKe72PmqIYdtKv3bc9EKtSEIiuHeu4MnSW +9LeqJ/elBw3jlFdqVCB3zR28eS3knLTeUYj+VtY9i6HP+lIejAVzd9YFz2MAUYdh +41C+mZfh/B4ReWtOas+chQoclirAIDYUxQkXYjv0rerV1/3QOSp409Ciz8hzMAlH +xU4Z/bgw1A+AmIiGwUxBeiPFQ/1eErg+D7G3gWIMfm/je5rCwkcRIR/PntEwzoPB +EE1Ad9e1wksyQEL6m7Csz+sh2BnrZMVr3VUtgIdEfEw8qw3YEr80goyxqsS4a+gO +RnfSiwYdQvusvcnnM7Mib37VLgPFXwUWhnzt457RFncaRtjJ0IzkXFwhBZHxZOSs +xTeutb1nE64p5bNCxHAJo11M6zcg4/D1czM7wvyOUYU2KsuB2w6JI9ni4Wi6LER3 +PhxAuvBnjhiH8D3X6T9HWzVCzacEzkhyKQUatNGi5w15ipZtZ1ItOyPm+YKc1rN5 +XhTeZUgz/B1C6C0CAwEAAaOCAY4wggGKMA8GA1UdEwEB/wQFMAMBAf8wggElBgNV +HSAEggEcMIIBGDCCARQGCSsGAQQBgZNoATCCAQUwJQYIKwYBBQUHAgEWGWh0dHA6 +Ly93d3cuYW5jZXJ0LmNvbS9jcHMwgdsGCCsGAQUFBwICMIHOMA0WBkFOQ0VSVDAD +AgEBHoG8AEEAZwBlAG4AYwBpAGEAIABOAG8AdABhAHIAaQBhAGwAIABkAGUAIABD +AGUAcgB0AGkAZgBpAGMAYQBjAGkAbwBuAC4AIABQAGEAcwBlAG8AIABkAGUAbACg +AEcAZQBuAGUAcgBhAGwAIABNAGEAcgB0AGkAbgBlAHoAIABDAGEAbQBwAG8AcwAg +ADQANgAgADYAYQAgAHAAbABhAG4AdABhACAAMgA4ADAAMQAwACAATQBhAGQAcgBp +AGQwDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBT2Ejqre1jBjUNvdoHS8rjT7xfq +CzAfBgNVHSMEGDAWgBT2Ejqre1jBjUNvdoHS8rjT7xfqCzANBgkqhkiG9w0BAQsF +AAOCAgEAVDXTomXJ2TbFU9G0jXI0ibqnCJ/pNRC5uAwG+WSqlZYoqMijgNxWwL9y +TVa/f10E1a0oW02988MPFbBx2laNQFVXpn1ioq0TaVGqlFC6vQAwUPXdpE4JepQx +a9tzA73z2hoPjC+yyTe8VNULIzf15Fs3ZolPtMcFpGXcWTCmEyt+Fe3sEBeJUsmd +36JM7fYPHqZJsA1RszGxUZnLtNEjeNJLqLQdFqag0D4HfmU/Jc5kThsuS02ChRpl +2+7iA/BZJAWPme95gt/uKjdow2pQAVlfn2jcLFFgK13gUjw7cLgA0zeoPlsedgha +1Lt2MK75yPKOpI8KdX0amOG/0DaULzzBUtNp6hpgN4yA201txppdjaBhUbs9DeYS +oJ9vWVZ0MmcK/DcGwTrkK46EH9ohDEmIQ9Ol9YINdobDLMyQu7O4q8bLrsAXUZ7T +gPck2hzszhKDzk42MDl1+HR2kIKePkBMDBS5Gh5IarAx6oh/gEFAU3s4S4eQYHpL +zmdGaHV3jgBdILDkkzdtA99YOeiaxaTr7GEzCIUka08G6a2QpTZibOPdfQkfM7+3 +u/fJdQX3W6v6h1mvGmcQfoTcjHDWROkQwdibLtHGQGrq5loPEH1s+1WHuk21cQOe +F4942lU9V14iCmqY8I0Izd2WQlobzbpvJ7h0J6g/5aDWc8deLyEwLzAKBggrBgEF +BQcDAwwhQU5DRVJUIENlcnRpZmljYWRvcyBOb3RhcmlhbGVzIFYy +-----END TRUSTED CERTIFICATE----- + +# ANCERT Corporaciones de Derecho Publico +-----BEGIN TRUSTED CERTIFICATE----- +MIIFTTCCBDWgAwIBAgIQP7Ll8tF8ixhkVmKpOYF/pzANBgkqhkiG9w0BAQUFADCB +jDELMAkGA1UEBhMCRVMxSzBJBgNVBAoTQkFnZW5jaWEgTm90YXJpYWwgZGUgQ2Vy +dGlmaWNhY2lvbiBTLkwuIFVuaXBlcnNvbmFsIC0gQ0lGIEI4MzM5NTk4ODEwMC4G +A1UEAxMnQU5DRVJUIENvcnBvcmFjaW9uZXMgZGUgRGVyZWNobyBQdWJsaWNvMB4X +DTA0MDIxMTE3MjI0NVoXDTI0MDIxMTE3MjI0NVowgYwxCzAJBgNVBAYTAkVTMUsw +SQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENlcnRpZmljYWNpb24gUy5MLiBV +bmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxMDAuBgNVBAMTJ0FOQ0VSVCBDb3Jw +b3JhY2lvbmVzIGRlIERlcmVjaG8gUHVibGljbzCCASIwDQYJKoZIhvcNAQEBBQAD +ggEPADCCAQoCggEBAKIhlYfciuvWepCoaDX9F/x0OlQQkjWTQnUu2D7LqZShvmo3 +P1K6pHvahJkWeU4AaNQfE+lGOzxKnYM62CHvwvJAReEPYEUE7fyKGC75PeSkETIg +jjq37pZAFRqZ6SGdcqzNH4muqtmhQLCoZ778eg5HsV68+DBqjjefBULsLMOmG4ur +xFA9+uRz9SGwuFVfh+CiRzgvQF9PbKuUJFbjTI9+kOkngiibmLqa1rWbV29rFRz5 +u3ApfTz3E6jRcfGw/ohFcamldGXLw/n1Aw8Qw4YwAG7BwCaiiP4hxzI9u8Z7G7eb +irP6sXxx2QGnQpCqL5iQhKrexq3sPFFKBR0BUZsCAwEAAaOCAacwggGjMA8GA1Ud +EwEB/wQFMAMBAf8wggEgBgNVHSAEggEXMIIBEzCCAQ8GCSsGAQQBgZNoAzCCAQAw +JQYIKwYBBQUHAgEWGWh0dHA6Ly93d3cuYW5jZXJ0LmNvbS9jcHMwgdYGCCsGAQUF +BwICMIHJMA0WBkFOQ0VSVDADAgEBGoG3QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uLiBMYSBkZWNsYXJhY2lvbiBkZSBwcmFjdGljYXMgZGUgY2VydGlm +aWFjaW9uIHF1ZSByaWdlIGVsIGZ1bmNpb25hbWllbnRvIGRlIGxhIHByZXNlbnRl +IGF1dG9yaWRhZCBzZSBlbmN1ZW50cmEgZGlzcG9uaWJsZSBlbiBodHRwOi8vd3d3 +LmFuY2VydC5jb20vY3BzMA4GA1UdDwEB/wQEAwIBhjAcBgNVHREEFTATgRFhbmNl +cnRAYW5jZXJ0LmNvbTAfBgNVHSMEGDAWgBSMTB43DLGf0qxECzq+As/0jS1mlTAd +BgNVHQ4EFgQUjEweNwyxn9KsRAs6vgLP9I0tZpUwDQYJKoZIhvcNAQEFBQADggEB +AEd0wJSR4qX7mFJEk2zEwB3gedtpZC1hrqR3kTW1t8qXqsCxhvUbaGuqWLJ8P+cD +J/hBcbym0iCpgJWiR61tRnSthJvYb6n1uS9tm8DdmYftWbJ1gaWJhSrM0IWBTfOv +d96MwSiaQqwFhww0nHGH/ewBFB++wy7w3/okpl0fPPGiC1GIAa4Sh6S1XXGy3+8N +fCDjfxMLTabAd8w/1g9xx3FMLh76GQZlya1WbHeNRj+9MIMe4C5VuHgjdDxYCmM6 +TYF7bzVwrrYl2fYk/iPG2hqIr6gUk3PgwFuwMWka9ilfVrcaCsL5C+oCwTMRYmp8 +Q+jqGquQAIXgRQ99jrpQ1cYwNTAKBggrBgEFBQcDAwwnQU5DRVJUIENvcnBvcmFj +aW9uZXMgZGUgRGVyZWNobyBQdWJsaWNv +-----END TRUSTED CERTIFICATE----- + +# ANF Secure Server Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIF7zCCA9egAwIBAgIIDdPjvGz5a7EwDQYJKoZIhvcNAQELBQAwgYQxEjAQBgNV +BAUTCUc2MzI4NzUxMDELMAkGA1UEBhMCRVMxJzAlBgNVBAoTHkFORiBBdXRvcmlk +YWQgZGUgQ2VydGlmaWNhY2lvbjEUMBIGA1UECxMLQU5GIENBIFJhaXoxIjAgBgNV +BAMTGUFORiBTZWN1cmUgU2VydmVyIFJvb3QgQ0EwHhcNMTkwOTA0MTAwMDM4WhcN +MzkwODMwMTAwMDM4WjCBhDESMBAGA1UEBRMJRzYzMjg3NTEwMQswCQYDVQQGEwJF +UzEnMCUGA1UEChMeQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uMRQwEgYD +VQQLEwtBTkYgQ0EgUmFpejEiMCAGA1UEAxMZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9v +dCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvrayvmZFSVgpCj +cqQZAZ2cC4Ffc0m6p6zzBE57lgvsEeBbphzOG9INgxwruJ4dfkUyYA8H6XdYfp9q +yGFOtibBTI3/TO80sh9l2Ll49a2pcbnvT1gdpd50IJeh7WhM3pIXS7yr/2WanvtH +2Vdy8wmhrnZEE26cLUQ5vPnHO6RYPUG9tMJJo8gN0pcvB2VSAKduyK9o7PQUlrZX +H1bDOZ8rbeTzPvY1ZNoMHKGESy9LS+IsJJ1tk0DrtSOOMspvRdOoiXsezx76W0OL +zc2oD2rKDF65nkeP8Nm2CgtYZRczuSPkdxl9y0oukntPLxB3sY0vaJxizOBQ+OyR +p1RMVwnVdmPF6GUe7m1qzwmd+nxPrWAI/VaZDxUse6mAq4xhj0oHdkLePfTdsiQz +W7i1o0TJrH93PB0j7IKppuLIBkwC/qxcmZkLLxCKpvR/1Yd0DVlJRfbwcVw5Kda/ +SiOL9V8BY9KHcyi1Swr1+KuCLH5zJTIdC2MKF4EA/7Z2Xue0sUDKIbvVgFHlSFJn +LNJhiQcND85Cd8BEc5xEUKDbEAotlRyBr+Qc5RQe8TZBAQIvfXOn3kLMTOmJDVb3 +n5HUA8ZsyY/b2BzgQJhdZpmYgG4t/wHFzstGH6wCxkPmrqKEPMVOHj1tyRRM4y5B +u8o5vzY8KhmqQYdOpc5LMnndkEl/AgMBAAGjYzBhMB8GA1UdIwQYMBaAFJxf0Gxj +o1+TypOYCK2Mh6UsXME3MB0GA1UdDgQWBBScX9BsY6Nfk8qTmAitjIelLFzBNzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AgEATh65isagmD9uw2nAalxJUqzLK114OMHVVISfk/CHGT0sZonrDUL8zPB1hT+L +9IBdeeUXZ701guLyPI59WzbLWoAAKfLOKyzxj6ptBZNscsdW699QIyjlRRA96Gej +rw5VD5AJYu9LWaL2U/HANeQvwSS9eS9OICI7/RogsKQOLHDtdD+4E5UGUcjohybK +pFtqFiGS3XNgnhAY3jyB6ugYw3yJ8otQPr0R4hUDqDZ9MwFsSBXXiJCZBMXM5gf0 +vPSQ7RPi6ovDj6MzD8EpTBNO2hVWcXNyglD2mjN8orGoGjR0ZVzO0eurU+AagNjq +OknkJjCb5RyKqKkVMoaZkgoQI1YS4PbOTOK7vtuNknMBZi9iPrJyJ0U27U1W45eZ +/zo1PqVUSlJZS2Db7v54EX9K3BR5YLZrZAPbFYPhor72I5dQ8AkzNqdxliXzuUJ9 +2zg/LFis6ELhDtjTO0wugumDLmsx2d1Hhk9tl5EuT+IocTUW0fJz/iUrB0ckYyfI ++PbZa/wSMVYIwFNCr5zQM378BvAxRAMU8Vjq8moNqRGyg77FGr8H6lnco4g175x2 +MjxNBiLOFeXdntiP2t7SxDnlF4HPOEfrf4htWRvfn0IUrn7PqLBmZdo3r5+qPeoo +tt7VMVgWglvquxl1AnMaykgaIZOQCo6ThKd9OyMYkomgjawwJzAKBggrBgEFBQcD +AQwZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# ANF Server CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGnTCCBYWgAwIBAgIDATRLMA0GCSqGSIb3DQEBBQUAMIHZMQswCQYDVQQGEwJF +UzESMBAGA1UECAwJQmFyY2Vsb25hMUcwRQYDVQQHDD5CYXJjZWxvbmEgKHNlZSBj +dXJyZW50IGFkZHJlc3MgYXQgaHR0cHM6Ly93d3cuYW5mLmVzL2FkZHJlc3MvKTEo +MCYGA1UECgwfQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjacOzbjEXMBUGA1UE +CwwOQU5GIENsYXNlIDEgQ0ExEjAQBgNVBAUTCUc2MzI4NzUxMDEWMBQGA1UEAwwN +QU5GIFNlcnZlciBDQTAeFw0wOTExMzAyMzAwMDBaFw0yMTExMzAyMzAwMDBaMIHZ +MQswCQYDVQQGEwJFUzESMBAGA1UECAwJQmFyY2Vsb25hMUcwRQYDVQQHDD5CYXJj +ZWxvbmEgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgaHR0cHM6Ly93d3cuYW5mLmVz +L2FkZHJlc3MvKTEoMCYGA1UECgwfQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2Fj +acOzbjEXMBUGA1UECwwOQU5GIENsYXNlIDEgQ0ExEjAQBgNVBAUTCUc2MzI4NzUx +MDEWMBQGA1UEAwwNQU5GIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL/qSKeaiDlrLEhABwSTfPe4LX6lN+Jh1iH8kDfLaT5eizffW287 +2LbDiECQ9J0MXBBSsbPlX5EQ5v2ogBRf04u9XL0PI5IJN+Ny0maUC1x0lC9e8k7Y +A8azzlalHNl7/U8HTNS32l8pTXXyH1XPMiMcRgknHUXs8Yw0id57FqdDXoor6ZRD +Htc+k21viT287rHIt//JfeNfDW93ePUqLo3Ei5iXMLFGWgtjcNR4x4azf/8nQqqf +im5toZTK7IcCHNZUS/28iZumYzhmjBaJiZfDUOj2QgGnd30QGZID6F1FyBXFhxsN +kfLGOZx788AKmfjug29+QncRjsMfHHIvPRsCAwEAAaOCAmowggJmMB0GA1UdDgQW +BBS+O/a0MbdzJEg5xVcTlHWqn4E/LDCCAQkGA1UdIwSCAQAwgf2AFL479rQxt3Mk +SDnFVxOUdaqfgT8soYHfpIHcMIHZMQswCQYDVQQGEwJFUzESMBAGA1UECAwJQmFy +Y2Vsb25hMUcwRQYDVQQHDD5CYXJjZWxvbmEgKHNlZSBjdXJyZW50IGFkZHJlc3Mg +YXQgaHR0cHM6Ly93d3cuYW5mLmVzL2FkZHJlc3MvKTEoMCYGA1UECgwfQU5GIEF1 +dG9yaWRhZCBkZSBDZXJ0aWZpY2FjacOzbjEXMBUGA1UECwwOQU5GIENsYXNlIDEg +Q0ExEjAQBgNVBAUTCUc2MzI4NzUxMDEWMBQGA1UEAwwNQU5GIFNlcnZlciBDQYID +ATRLMAwGA1UdEwQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMDEGCisGAQQBgY8cKgYE +IxshaHR0cHM6Ly93d3cuYW5mLmVzL0FDL0FDVEFTLzc4OTIzMBgGCisGAQQBgY8c +EwEEChsIODAxLTM0MDAwOAYIKwYBBQUHAQEELDAqMCgGCCsGAQUFBzABhhxodHRw +Oi8vd3d3LmFuZi5lcy9BQy9SQy9vY3NwMGMGA1UdHwRcMFowK6ApoCeGJWh0dHBz +Oi8vd3d3LmFuZi5lcy9BQy9BTkZTZXJ2ZXJDQS5jcmwwK6ApoCeGJWh0dHBzOi8v +Y3JsLmFuZi5lcy9BQy9BTkZTZXJ2ZXJDQS5jcmwwFgYDVR0SBA8wDYELaW5mb0Bh +bmYuZXMwFgYDVR0RBA8wDYELaW5mb0BhbmYuZXMwDQYJKoZIhvcNAQEFBQADggEB +ALXGx7xG+kJcE8GUdTNWvy+nB3PsN+NDdOr5Zk9ejX/w5nnDTfXZOKXMykP0U4CG +v7zQEV2QxMJAR+vFh5PBtnhemq6H9WIQWUxMbQa+mRMVs7P6HHJ+4CIhAVg1OGii +5Pjh8PA2UJHgtHfcY4QzkmC4yxby0mM7TFw1OuesAlPFHIEBd8ccER9UMO9UjyX6 +iSeUNKMPFE9v6XPZGGLn7gjoyYN7yDObfESafBqQtdJxid899BxPTlHgyWu2qgse +2TAP02PV7XD0wYPtBkWaqOq0iTf9WjdH75F5pzX/8Nww7Q0UZ9t8WuCPbTP+PJ4V +M8PDLQ5dqnwNjjGWTYv/BdUwGzAKBggrBgEFBQcDAwwNQU5GIFNlcnZlciBDQQ== +-----END TRUSTED CERTIFICATE----- + +# ATHEX Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDNzCCAh+gAwIBAgICJxwwDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UEBhMCR1Ix +HTAbBgNVBAoTFEF0aGVucyBFeGNoYW5nZSBTLkEuMRYwFAYDVQQDEw1BVEhFWCBS +b290IENBMB4XDTEwMTAxODE1NTYwM1oXDTMwMTAxNzIxMDAwMFowRDELMAkGA1UE +BhMCR1IxHTAbBgNVBAoTFEF0aGVucyBFeGNoYW5nZSBTLkEuMRYwFAYDVQQDEw1B +VEhFWCBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzRo9 +MLWzOLK/eruuodbXhfAiOqSJacThYgTJcNM8MxLi5jjld6QkRGQNt65MWt3hGAY+ +7ZtaBfXh3hLtNircR9mRUZntsb9qc6EKCCSoio0cC1nTv3AjVUSgjDDFzm1PsOy+ +84wx3wpa3NNXXAWgM5U7l49UC7j1a33Hxay1eY4GOPGoKVU9mjbQJ180ahJ4FyjZ +mEns2VpS2iY6+u5MpiaOqD5VH7If4bWb+To19u2RHP0LECT9H/nT4wAlsQslwLd9 +mjwHOoAL1qj+kUXowdLFIm/T5XEftiw2tFig7c1KaORqV/ShdezXAJnV9plc607J +u9cao0VZAA+MO9t0NQIDAQABozMwMTAPBgNVHRMBAf8EBTADAQH/MBEGA1UdDgQK +BAhD4oDou9K3wTALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAD8BY3UH +Mitfdf92jtOpuG/MUD2EV08og+h8o26ivPfCuq46q07QD5IouN1bLNvl1h86k+GR +DteqXwFhLD5hT96VFU3MPeoy4qP++Bap8rwp/CmefXKlXaFrAtVfSPSgO8sYRvA9 +F1WD0ClhkbuaQUnRE75BlPI+wySrn8drQpBCeX5aUfs8XgshH8vZSBMVsWp/A8TR +ulHScImqCEqHHPZ6mLHUUQVVxpAXb8PgBMB69C8YolZCcy62spvROb4JwgJKJBf5 +96y9cQe/leKX5aGECI2y4kSh3IkwO6gMBXpddgBPHm9xfys52kVCOTHSqTJA1Dhj +E5Y3mkld2cf9uEwwGzAKBggrBgEFBQcDAwwNQVRIRVggUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Actalis Authentication CA G1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDlDCCAnygAwIBAgIBATANBgkqhkiG9w0BAQUFADBqMQswCQYDVQQGEwJJVDEP +MA0GA1UEBwwGTWlsYW5vMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1ODUy +MDk2NzElMCMGA1UEAwwcQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBDQSBHMTAeFw0w +OTA2MjMxNDA2MDBaFw0yMjA2MjUxNDA2MDBaMGoxCzAJBgNVBAYTAklUMQ8wDQYD +VQQHDAZNaWxhbm8xIzAhBgNVBAoMGkFjdGFsaXMgUy5wLkEuLzAzMzU4NTIwOTY3 +MSUwIwYDVQQDDBxBY3RhbGlzIEF1dGhlbnRpY2F0aW9uIENBIEcxMIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwxyGND8nUkJguitg0CErydfpQHU6bFgP +IzvPhj7UZKtu2urIKtiVRd/JHNIlkp4QmFqLcWnAlen2a2jc97bEDf5u9XA7waSo +TyCiJwuf8RJ1fM+uf17LeAJYKNcvqtugrnQ9fqv26XKhKs/WkGDf4KA1ysDbBMQH +VvxmdYyOehOhPAZrGuZ/OZyI5IRvouJ/a5/sAarSxMuy7Jo9uBcYrB9gmTPm6wXd +zPJpZ7AOvigkQ8stuUeEGfnq5PH1aPSfx3tQUa+i/G93iDG/ktt/nMW1rKEImOdq +M/7RuwDhtwUIr/OmVog2PeOKSuINnYCGZp/UwqNQuhwS14eKMUq4FQIDAQABo0Uw +QzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU +AbvWm1a0fubFWN0smPTKcvZfM4YwDQYJKoZIhvcNAQEFBQADggEBAKEg1suiNG08 +buFV0krQ2bqyN1GIdyfuAkiTRUHidVHyGZQJoPO4fboDgCOgJe8BGbXZGnot40KK +sYYxD5bsZoTyziMSRpZrMV4Guq+jUqpCIKjRrqqb38QXnlNwAbSpGtpoyGMPtlpz +U9FpEQYTUudrqAUxt7D8h0bFdYiB8V94AuefrZy7VO1fmWo31etVsyrAQ2BR3LRx +kiajD8x6PdzAQokXKQhnVGTF+ahEvIRxWJY9Z1d/u6yQs3Eivz66rGYmRRCz8B86 +OmilUDXKtBeRBgEs9w2wcLJbVnW5d5nA2ZWFAi1zZgfJT5kR7lsrqONoIwWo8wQP +BrsfCY7GWx0wKjAKBggrBgEFBQcDAwwcQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBD +QSBHMQ== +-----END TRUSTED CERTIFICATE----- + +# Actalis Authentication Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhljBAMB4GCCsGAQUFBwMEBggr +BgEFBQcDAQYIKwYBBQUHAwMMHkFjdGFsaXMgQXV0aGVudGljYXRpb24gUm9vdCBD +QQ== +-----END TRUSTED CERTIFICATE----- + +# AddTrust External CA Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU +MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs +IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 +MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux +FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h +bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v +dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt +H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 +uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX +mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX +a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN +E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 +WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD +VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 +Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU +cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx +IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN +AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH +YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 +6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC +Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX +c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a +mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQwJzAKBggrBgEFBQcDAwwZQWRkVHJ1 +c3QgRXh0ZXJuYWwgQ0EgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Admin-Root-CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFVTCCBD2gAwIBAgIEO/OB0DANBgkqhkiG9w0BAQUFADBsMQswCQYDVQQGEwJj +aDEOMAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZpY2VzMSIwIAYDVQQLExlD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRYwFAYDVQQDEw1BZG1pbi1Sb290LUNB +MB4XDTAxMTExNTA4NTEwN1oXDTIxMTExMDA3NTEwN1owbDELMAkGA1UEBhMCY2gx +DjAMBgNVBAoTBWFkbWluMREwDwYDVQQLEwhTZXJ2aWNlczEiMCAGA1UECxMZQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdGllczEWMBQGA1UEAxMNQWRtaW4tUm9vdC1DQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvgr0QUIv5qF0nyXZ3PXAJi +C4C5Wr+oVTN7oxIkXkxvO0GJToM9n7OVJjSmzBL0zJ2HXj0MDRcvhSY+KiZZc6Go +vDvr5Ua481l7ILFeQAFtumeza+vvxeL5Nd0Maga2miiacLNAKXbAcUYRa0Ov5VZB +++YcOYNNt/aisWbJqA2y8He+NsEgJzK5zNdayvYXQTZN+7tVgWOck16Da3+4FXdy +fH1NCWtZlebtMKtERtkVAaVbiWW24CjZKAiVfggjsiLo3yVMPGj3budLx5D9hEEm +vlyDOtcjebca+AcZglppWMX/iHIrx7740y0zd6cWEqiLIcZCrnpkr/KzwO135GkC +AwEAAaOCAf0wggH5MA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIASBkTCBjjCBiwYI +YIV0AREDAQAwfzArBggrBgEFBQcCAjAfGh1UaGlzIGlzIHRoZSBBZG1pbi1Sb290 +LUNBIENQUzBQBggrBgEFBQcCARZEaHR0cDovL3d3dy5pbmZvcm1hdGlrLmFkbWlu +LmNoL1BLSS9saW5rcy9DUFNfMl8xNl83NTZfMV8xN18zXzFfMC5wZGYwfwYDVR0f +BHgwdjB0oHKgcKRuMGwxFjAUBgNVBAMTDUFkbWluLVJvb3QtQ0ExIjAgBgNVBAsT +GUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxETAPBgNVBAsTCFNlcnZpY2VzMQ4w +DAYDVQQKEwVhZG1pbjELMAkGA1UEBhMCY2gwHQYDVR0OBBYEFIKf+iNzIPGXi7JM +Tb5CxX9mzWToMIGZBgNVHSMEgZEwgY6AFIKf+iNzIPGXi7JMTb5CxX9mzWTooXCk +bjBsMQswCQYDVQQGEwJjaDEOMAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZp +Y2VzMSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRYwFAYDVQQD +Ew1BZG1pbi1Sb290LUNBggQ784HQMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0B +AQUFAAOCAQEAeE96XCYRpy6umkPKXDWCRn7INo96ZrWpMggcDORuofHIwdTkgOeM +vWOxDN/yuT7CC3FAaUajbPRbDw0hRMcqKz0aC8CgwcyIyhw/rFK29mfNTG3EviP9 +QSsEbnelFnjpm1wjz4EaBiFjatwpUbI6+Zv3XbEt9QQXBn+c6DeFLe4xvC4B+MTr +a440xTk59pSYux8OHhEvqIwHCkiijGqZhTS3KmGFeBopaR+dJVBRBMoXwzk4B3Hn +0Zib1dEYFZa84vPJZyvxCbLOnPRDJgH6V2uQqbG+6DXVaf/wORVOvF/wzzv0viM/ +RWbEtJZdvo8N3sdtCULzifnxP/V0T9+4ZTAbMAoGCCsGAQUFBwMDDA1BZG1pbi1S +b290LUNB +-----END TRUSTED CERTIFICATE----- + +# AdminCA-CD-T01 +-----BEGIN TRUSTED CERTIFICATE----- +MIIETTCCAzWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBtMQswCQYDVQQGEwJDSDEO +MAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZpY2VzMSIwIAYDVQQLExlDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0aWVzMRcwFQYDVQQDEw5BZG1pbkNBLUNELVQwMTAe +Fw0wNjAxMjUxMzM2MTlaFw0xNjAxMjUxMjM2MTlaMG0xCzAJBgNVBAYTAkNIMQ4w +DAYDVQQKEwVhZG1pbjERMA8GA1UECxMIU2VydmljZXMxIjAgBgNVBAsTGUNlcnRp +ZmljYXRpb24gQXV0aG9yaXRpZXMxFzAVBgNVBAMTDkFkbWluQ0EtQ0QtVDAxMIIB +IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0jQlMZmpLDhV+GNR9TAoSNle +JgQB4xAXJELQf5/ySMfoFA4MmjKqYXQkB6MGPuQKwR9XRRSPf61vqb8YPsdjRmgp +byHBcUd5t0N8RX6wRZUnPMW+bCCo2VqAU4XFbnlc2gHKaam0wdTtbBTXEkv0ieIH +fxCfFxXqSsSr60IkF/2/xbrAgV/QD5yHk6Ie8feAVWwi5UtaFqtu4LiFEh2QMyxs +Oyz1OcvKzkM2g873tyiE7jzMgZP+Ww3tibk2F9+e6ZeiB37TLOmVtvgpmrws4fiI +rFNXEYSWBVrUTbn81U47yWzOgf5fEHP07bRV5QOCzCm99qNimsbL6CG7nT78CQID +AQABo4H3MIH0MBIGA1UdEwEB/wQIMAYBAf8CAQAwga4GA1UdIASBpjCBozCBoAYI +YIV0AREDFQEwgZMwSAYIKwYBBQUHAgIwPBo6VGhpcyBpcyB0aGUgQWRtaW5DQS1D +RC1UMDEgQ2VydGlmaWNhdGUgUHJhY3RpY2UgU3RhdGVtZW50LjBHBggrBgEFBQcC +ARY7aHR0cDovL3d3dy5wa2kuYWRtaW4uY2gvcG9saWN5L0NQU18yXzE2Xzc1Nl8x +XzE3XzNfMjFfMS5wZGYwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQqxGkKocZV +xgNucM6GgbOkD6oZ2zANBgkqhkiG9w0BAQUFAAOCAQEAn356bbusjI5glGXRQ1DR +v21qQf0S4s3GHyZm7cqdOkFleM70ArBT+kOP5Nm7rlSAFyVgEkmBdOg7s9tlXClU +yeZFnp6UEYRUcijPN8D1VaNRK6PIUObpDBQT0C+kAfxG9z4v29T0SxT4sgAdC/xQ +Fyv58Fp9bPn7owuKwKcyCH1XSyi/Bp4XFELlLOaigBZO/w+dPBz4FcJSdZjU+BaJ +0E3nKAjHlShO5ouBSZnaJz3p+nkw2Wyo36s6GxCK0XbkSP45iniIG4FmwwZkonYF +ypQntHbx2oL7tUQQY0PDo8bGBMcPy/G2j+dciqZRlsnfgMy10SCzQ9MUx92xUG2V +ejAcMAoGCCsGAQUFBwMDDA5BZG1pbkNBLUNELVQwMQ== +-----END TRUSTED CERTIFICATE----- + +# AffirmTrust Commercial +-----BEGIN TRUSTED CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP +Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr +ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL +MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 +yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr +VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ +nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG +XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj +vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt +Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g +N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC +nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8wLjAUBggrBgEFBQcDAQYI +KwYBBQUHAwMMFkFmZmlybVRydXN0IENvbW1lcmNpYWw= +-----END TRUSTED CERTIFICATE----- + +# AffirmTrust Networking +-----BEGIN TRUSTED CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y +YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua +kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL +QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp +6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG +yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i +QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO +tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu +QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ +Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u +olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 +x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9swLjAUBggrBgEFBQcDAQYI +KwYBBQUHAwMMFkFmZmlybVRydXN0IE5ldHdvcmtpbmc= +-----END TRUSTED CERTIFICATE----- + +# AffirmTrust Premium +-----BEGIN TRUSTED CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz +dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG +A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U +cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf +qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ +JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ ++jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS +s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 +HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 +70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG +V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S +qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S +5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia +C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX +OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE +FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 +KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg +Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B +8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ +MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc +0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ +u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF +u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH +YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 +GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO +RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e +KeC2uAloGRwYQzArMBQGCCsGAQUFBwMBBggrBgEFBQcDAwwTQWZmaXJtVHJ1c3Qg +UHJlbWl1bQ== +-----END TRUSTED CERTIFICATE----- + +# AffirmTrust Premium ECC +-----BEGIN TRUSTED CERTIFICATE----- +MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC +VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ +cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ +BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt +VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D +0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 +ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G +A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs +aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I +flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeTAvMBQGCCsGAQUFBwMB +BggrBgEFBQcDAwwXQWZmaXJtVHJ1c3QgUHJlbWl1bSBFQ0M= +-----END TRUSTED CERTIFICATE----- + +# Amazon Root CA 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy +rqXRfboQnoZsG4q5WTP468SQvvG5MCgwFAYIKwYBBQUHAwQGCCsGAQUFBwMBDBBB +bWF6b24gUm9vdCBDQSAx +-----END TRUSTED CERTIFICATE----- + +# Amazon Root CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGwwMjAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBBBbWF6b24g +Um9vdCBDQSAy +-----END TRUSTED CERTIFICATE----- + +# Amazon Root CA 3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl +ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr +ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr +BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM +YyRIHN8wfdVoOzAoMBQGCCsGAQUFBwMEBggrBgEFBQcDAQwQQW1hem9uIFJvb3Qg +Q0EgMw== +-----END TRUSTED CERTIFICATE----- + +# Amazon Root CA 4 +-----BEGIN TRUSTED CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EDAyMB4GCCsGAQUFBwMEBggrBgEFBQcDAQYI +KwYBBQUHAwMMEEFtYXpvbiBSb290IENBIDQ= +-----END TRUSTED CERTIFICATE----- + +# America Online Root Certification Authority 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDpDCCAoygAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEc +MBoGA1UEChMTQW1lcmljYSBPbmxpbmUgSW5jLjE2MDQGA1UEAxMtQW1lcmljYSBP +bmxpbmUgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAxMB4XDTAyMDUyODA2 +MDAwMFoXDTM3MTExOTIwNDMwMFowYzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Ft +ZXJpY2EgT25saW5lIEluYy4xNjA0BgNVBAMTLUFtZXJpY2EgT25saW5lIFJvb3Qg +Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMTCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAKgv6KRpBgNHw+kqmP8ZonCaxlCyfqXfaE0bfA+2l2h9LaaLl+lk +hsmj76CGv2BlnEtUiMJIxUo5vxTjWVXlGbR0yLQFOVwWpeKVBeASrlmLojNoWBym +1BW32J/X3HGrfpq/m44zDyL9Hy7nBzbvYjnF3cu6JRQj3gzGPTzOggjmZj7aUTsW +OqMFf6Dch9Wc/HKpoH145LcxVR5lu9RhsCFg7RAycsWSJR74kEoYeEfffjA3PlAb +2xzTa5qGUwew76wGePiEmf4hjUyAtgyC9mZweRrTT6PP8c9GsEsPPt2IYriMqQko +O3rHl+Ee5fSfwMCuJKDIodkP1nsmgmkyPacCAwEAAaNjMGEwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUAK3Zo/Z59m50qX8zPYEX10zPM94wHwYDVR0jBBgwFoAU +AK3Zo/Z59m50qX8zPYEX10zPM94wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB +BQUAA4IBAQB8itEfGDeC4Liwo+1WlchiYZwFos3CYiZhzRAW18y0ZTTQEYqtqKkF +Zu90821fnZmv9ov761KyBZiibyrFVL0lvV+uyIbqRizBs73B6UlwGBaXCBOMIOAb +LjpHyx7kADCVW/RFo8AasAFOq73AI25jP4BKxQft3OJvx8Fi8eNy1gTIdGcL+oir +oQHIb/AUr9KZzVGTfu0uOMe9zkZQPXLjeSWdm4grECDdpbgyn43gKd8hdIaC2y+C +MMbHNYaz+ZZfRtsMRf3zUMNvxsNIrUam4SdHCh0Om7bCd39j8uB9Gr784N/Xx6ds +sPmuujz9dLQR6FgNgLzTqIA6me11zEZ7MDswCgYIKwYBBQUHAwMMLUFtZXJpY2Eg +T25saW5lIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMQ== +-----END TRUSTED CERTIFICATE----- + +# ApplicationCA2 Root +-----BEGIN TRUSTED CERTIFICATE----- +MIID9zCCAt+gAwIBAgILMTI1MzcyODI4MjgwDQYJKoZIhvcNAQELBQAwWDELMAkG +A1UEBhMCSlAxHDAaBgNVBAoTE0phcGFuZXNlIEdvdmVybm1lbnQxDTALBgNVBAsT +BEdQS0kxHDAaBgNVBAMTE0FwcGxpY2F0aW9uQ0EyIFJvb3QwHhcNMTMwMzEyMTUw +MDAwWhcNMzMwMzEyMTUwMDAwWjBYMQswCQYDVQQGEwJKUDEcMBoGA1UEChMTSmFw +YW5lc2UgR292ZXJubWVudDENMAsGA1UECxMER1BLSTEcMBoGA1UEAxMTQXBwbGlj +YXRpb25DQTIgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKaq +rSVl1gAR1uh6dqr05rRL88zDUrSNrKZPtZJxb0a11a2LEiIXJc5F6BR6hZrkIxCo ++rFnUOVtR+BqiRPjrq418fRCxQX3TZd+PCj8sCaRHoweOBqW3FhEl2LjMsjRFUFN +dZh4vqtoqV7tR76kuo6hApfek3SZbWe0BSXulMjtqqS6MmxCEeu+yxcGkOGThchk +KM4fR8fAXWDudjbcMztR63vPctgPeKgZggiQPhqYjY60zxU2pm7dt+JNQCBT2XYq +0HisifBPizJtROouurCp64ndt295D6uBbrjmiykLWa+2SQ1RLKn9nShjZrhwlXOa +2Po7M7xCQhsyrLEy+z0CAwEAAaOBwTCBvjAdBgNVHQ4EFgQUVqesqgIdsqw9kA6g +by5Bxnbne9owDgYDVR0PAQH/BAQDAgEGMHwGA1UdEQR1MHOkcTBvMQswCQYDVQQG +EwJKUDEYMBYGA1UECgwP5pel5pys5Zu95pS/5bqcMRswGQYDVQQLDBLmlL/lupzo +qo3oqLzln7rnm6QxKTAnBgNVBAMMIOOCouODl+ODquOCseODvOOCt+ODp+ODs0NB +MiBSb290MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAH+aCXWs +B9FydC53VzDCBJzUgKaD56WgG5/+q/OAvdVKo6GPtkxgEefK4WCB10jBIFmlYTKL +nZ6X02aD2mUuWD7b5S+lzYxzplG+WCigeVxpL0PfY7KJR8q73rk0EWOgDiUX5Yf0 +HbCwpc9BqHTG6FPVQvSCLVMJEWgmcZR1E02qdog8dLHW40xPYsNJTE5t8XB+w3+m +Bcx4m+mB26jIx1ye/JKSLaaX8ji1bnOVDMA/zqaUMLX6BbfeniCq/BNkyYq6ZO/i +Y+TYmK5rtT6mVbgzPixy+ywRAPtbFi+E0hOe+gXFwctyTiLdhMpLvNIthhoEdlkf +SUJiOxMfFui61/0wITAKBggrBgEFBQcDAwwTQXBwbGljYXRpb25DQTIgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Application CA G3 Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDWjCCAkKgAwIBAgIBMTANBgkqhkiG9w0BAQsFADA+MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxHzAdBgNVBAMTFkFwcGxpY2F0aW9uIENBIEczIFJvb3Qw +HhcNMTQwNjAzMTUwMDAwWhcNMzQwNjAzMTQ1OTU5WjA+MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxHzAdBgNVBAMTFkFwcGxpY2F0aW9uIENBIEczIFJvb3Qw +ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNRT730ZYiXJEvPgoAA8y2 +92xU/Cg31AQY7K2Yya/Tpbnn2b9O5qOZPJluoSAeRhvidVW80uz2iBrsNEVLg53T +subdB4nBCNn4O4uSZHJdmjvMrTeJx9xgeQjgcKz3K+2fA0kfjj6DqG7iklxU0Xnf +7Bg6fbhtj9ajJU2tH0CmX9SqTrFwGFmZ8gtUaT55KESI93GXzX8F3MrcdkqQTGtg +6PomMdi1+Of8bYskarbvQtcjVMUaY4o7x/yqbTyPy2zaILDyvGUcAUwilQ0cIx+s +1fnOdVvqML1MASQfddRhScMbmWWOCFw5OM0pwzhFzWR5t5tNR+pYMvqm9pLwwbdf +AgMBAAGjYzBhMB0GA1UdDgQWBBSpNSpIviw37YbbfFWHACa+GC1cLjAOBgNVHQ8B +Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBSpNSpIviw37Ybb +fFWHACa+GC1cLjANBgkqhkiG9w0BAQsFAAOCAQEAtoK9xUbQcYulkT1+LVr5nIR9 +ByeVHedNyHzs5pPoVhp6MEg7DPpO9Qmyr4itlOz9sq0v5gV0IRuEizgqw+3vRmi1 +3VL6cMJ1T/+jQS48F5RMCSK0jsF/xKas7YNoz2Ve7Hq9xWbu0KN/8lexCMJ5cOty +f0FZCXl18byxIf6Ds0Q9iaO+sXrYncMf5sRU4Y3l2FDc5FY3e74oAPMsd9ojf2CY +PQUW8nhprZnDOnRsPpqylO2PqvZTa+fIt+g8jPvHfE8ZXaRmFel/h6DQ1a0gpEYJ +RazlyGWHuwbf/NdoVkNzogCZMpLCDqAcDpG9lVi8k5+EwqVm52XNKeJi8gWSYDAk +MAoGCCsGAQUFBwMDDBZBcHBsaWNhdGlvbiBDQSBHMyBSb290 +-----END TRUSTED CERTIFICATE----- + +# Application CA G4 Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDZDCCAkygAwIBAgILMaXzypDqI6zSnr0wDQYJKoZIhvcNAQELBQAwPjELMAkG +A1UEBhMCSlAxDjAMBgNVBAoTBUxHUEtJMR8wHQYDVQQDExZBcHBsaWNhdGlvbiBD +QSBHNCBSb290MB4XDTE3MDIxNTE1MDAwMFoXDTM3MDIxNTE0NTk1OVowPjELMAkG +A1UEBhMCSlAxDjAMBgNVBAoTBUxHUEtJMR8wHQYDVQQDExZBcHBsaWNhdGlvbiBD +QSBHNCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr6vH5Yym +WJ4v1gXJkXcwvt4a1A5jYtHMLbHRhjiNHYVmU5+qQWXgWNLlKb6UqJWTPF9qxZuf +NOhtwcbTp+VDoBIwwDk0YAyL9Gj1SN/pjhyuSKe7qj14t+JJu8EjBFobkAHFfatK +AaHCk2rShbO253bra2846yBSMJUI9fks7sjAdbkB7cE3VjBcnX9kwspAILmVhbyl +B30Mvi6h3cYm6SopbJ8omClR6HYTG+8uCzdaM57AJWeqDy2o1JImOAGn0GIYLiI4 +OHgLulKZoXwmArHixeLezooCRISio+mLiGMxyS84AOnEAk0eIycSSNwRsfDS4g4w +Ga8DoQezNZQipQIDAQABo2MwYTAdBgNVHQ4EFgQUbtwKNR8gwuih030FTk9MYOWk +xGcwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU +btwKNR8gwuih030FTk9MYOWkxGcwDQYJKoZIhvcNAQELBQADggEBAFUz1UC3Gn5P +3HSDDkS6P71SlciTliPyAbkU68oSdM1hiDSvTV70WYqrHtjjWcEe+DC1QMa7uK/R +7T9sqnOYguSYNK6SQQ5ZNhq6UBwW9Bc6LBvil2+yr9Ha3hRS34A8x089h566lb14 +vFU8ifYuJtUV5dBAEsWzcT9sZh+j/Eu1TuJu3IAHw/koFHv3XhZqQ6eukQEfT2Wp +SLPObhoGIaTTMYiIpUkRgmvruZ1g/p/+xff4f6s37q/nWEa6CeRdOadLBNgDAslg +Kl5VaRELYHiBevRx9Y9Gro8EqJccgIkjY9v+66YXDlm2LrmG619ebN2B56swgSOQ +J7H3K5A5C7gwJDAKBggrBgEFBQcDAwwWQXBwbGljYXRpb24gQ0EgRzQgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Atos TrustedRoot 2011 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6edMDcwHgYIKwYBBQUHAwQGCCsGAQUF +BwMBBggrBgEFBQcDAwwVQXRvcyBUcnVzdGVkUm9vdCAyMDEx +-----END TRUSTED CERTIFICATE----- + +# Atos TrustedRoot Root CA ECC G2 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIICMTCCAbagAwIBAgIMC3MoERh0MBzvbwiEMAoGCCqGSM49BAMDMEsxCzAJBgNV +BAYTAkRFMQ0wCwYDVQQKDARBdG9zMS0wKwYDVQQDDCRBdG9zIFRydXN0ZWRSb290 +IFJvb3QgQ0EgRUNDIEcyIDIwMjAwHhcNMjAxMjE1MDgzOTEwWhcNNDAxMjEwMDgz +OTA5WjBLMQswCQYDVQQGEwJERTENMAsGA1UECgwEQXRvczEtMCsGA1UEAwwkQXRv +cyBUcnVzdGVkUm9vdCBSb290IENBIEVDQyBHMiAyMDIwMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEyFyAyk7CKB9XvzjmYSP80KlblhYWwwxeFaWQCf84KLR6HgrWUyrB +u5BAdDfpgeiNL2gBNXxSLtj0WLMRHFvZhxiTkS3sndpsnm2ESPzCiQXrmBMCAWxT +Hg5JY1hHsa/Co2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFFsfxHFs +shufvlwfjP2ztvuzDgmHMB0GA1UdDgQWBBRbH8RxbLIbn75cH4z9s7b7sw4JhzAO +BgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMDaQAwZgIxAOzgmf3d5FTByx/oPijX +FVlKgspTMOzrNqW5yM6TR1bIYabhbZJTlY/241VT8N165wIxALCH1RuzYPyRjYDK +ohtRSzhUy6oee9flRJUWLzxEeC4luuqQ5OxS7lfsA4TzXtsWDTAyMAoGCCsGAQUF +BwMEDCRBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgRUNDIEcyIDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# Atos TrustedRoot Root CA ECC TLS 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIICFTCCAZugAwIBAgIQPZg7pmY9kGP3fiZXOATvADAKBggqhkjOPQQDAzBMMS4w +LAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgRUNDIFRMUyAyMDIxMQ0w +CwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTI2MjNaFw00MTA0 +MTcwOTI2MjJaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBDQSBF +Q0MgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMHYwEAYHKoZI +zj0CAQYFK4EEACIDYgAEloZYKDcKZ9Cg3iQZGeHkBQcfl+3oZIK59sRxUM6KDP/X +tXa7oWyTbIOiaG6l2b4siJVBzV3dscqDY4PMwL502eCdpO5KTlbgmClBk1IQ1SQ4 +AjJn8ZQSb+/Xxd4u/RmAo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2 +KCXWfeBmmnoJsmo7jjPXNtNPojAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMD +aAAwZQIwW5kp85wxtolrbNa9d+F851F+uDrNozZffPc8dz7kUK2o59JZDCaOMDtu +CCrCp1rIAjEAmeMM56PDr9NJLkaCI2ZdyQAUEv049OGYa3cpetskz2VAv9LcjBHo +9H1/IISpQuQoMDMwCgYIKwYBBQUHAwEMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBD +QSBFQ0MgVExTIDIwMjE= +-----END TRUSTED CERTIFICATE----- + +# Atos TrustedRoot Root CA RSA G2 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFfzCCA2egAwIBAgIMR7opRlU+FpKXsKtAMA0GCSqGSIb3DQEBDAUAMEsxCzAJ +BgNVBAYTAkRFMQ0wCwYDVQQKDARBdG9zMS0wKwYDVQQDDCRBdG9zIFRydXN0ZWRS +b290IFJvb3QgQ0EgUlNBIEcyIDIwMjAwHhcNMjAxMjE1MDg0MTIzWhcNNDAxMjEw +MDg0MTIyWjBLMQswCQYDVQQGEwJERTENMAsGA1UECgwEQXRvczEtMCsGA1UEAwwk +QXRvcyBUcnVzdGVkUm9vdCBSb290IENBIFJTQSBHMiAyMDIwMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAljGFSqoPMv554UOHnPsjt45/DVS9x2KTd+Qc +NQR2owOLIu7EhN2lk25uso4JA+tRFjEXqmkVGA5ndCNe6pp9tTk+PYKpa+H+qRyw +rVpNTHiDQYvP8h1impgEnGPpq2X+SB0kZQdHPrmRLumdm38aNak0sLflcDPvSnJR +tge/YD8qn51U3/PXlElRA1pAqWjdEVlc+HamvFBSEO2s7JXg1INrSdoKT5mD3jKD +SINnlbJ+54GFPc2C98oC7W2IXQiNuDW/KmkwmbtL0UHbRaCTmVGBkDYIqoq26I+z +y+7lRg1ydfVJbOGify+87YSmN+7ewk85Tvae8MnRmzCdSW3h2v8SEIzW5Zl7BbZ9 +sAnHpPiyHDmVOTP0Nc4lYnuwXyDzy234bFIUZESP08ipdgflr3GZLS0EJUh2r8Pn +zEPyB7xKJCQ33fpulAlvTF4BtP5U7COWpV7dhv/pRirx6NzspT2vb6oOD7R1+j4I +uSZFT2aGTLwZuOHVNe6ChMjTqxLnzXMzYnf0F8u9NHYqBc6V5Xh5S56wjfk8WDiR +6l6HOMC3Qv2qTIcjrQQgsX52Qtq7tha6V8iOE/p11QhMrziRqu+P+p9JLlR8Clax +evrETi/Uo/oWitCV5Zem/8P8fA5HWPN/B3sS3Fc/LeOhTVtSTDOHmagJe2x+DvLP +VkKe6wUCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBQgJfMH +/adv8ZbukRBpzJrvfchoeDAdBgNVHQ4EFgQUICXzB/2nb/GW7pEQacya733IaHgw +DgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBDAUAA4ICAQAkK06Y8h0X7dl2JrYw +M+hpRaFRS1LYejowtuQS6r+fTOAEpPY1xv6hMPdThZKtVAVXX5LlKt42J557E0fJ +anWv/PM35wz1PQFztWlR+L1Z0boL+Lq6ZCdDs3yDlYrnnhOW129KlkFJiw4grRbG +96aHW4gSiYuJyhLSVq8iASFG6auYP6eI3uTLKpp1Gfo5XgkF1wMyGrgXUQjHAEB9 +9L74DFn0aXZu06RYW14mc+RCVQZeeEAP0zif7yZRcHSR8XdiAejZy+uh3zkyHbtr +/XH+68+l5hT9AIATxpoASLCZBemugEj7CT9RFLW552BNTcovgSHuUgxletz1iUlM +MJI0WIAyWbEN/yRhD+cKQtB7vPiOJ0c/cJ0n2bYGPaW7y16Prg5Tx5xqbztMD6NA +cKiaB87UblsHotLiVLa9bzNyY61RmOGPdvFqBzgl/vZizl/bY8Jume8G3LneGRro +VD190nZ12V4+MkinjPKecgz4uFi4FyOlFId1WHoAgQciOWpMlKC1otunLMGw8aOb +wEz3bXDqMZ/xrn0+cyjZod/6k/CbsPDizSUgde/ifTIFyZt27su9MR75lJhLJFhW +SMDeBky9pjRd7RZhY3P7GeL6W9iXddRtnmA5XpSLAizrmc5gKm4bjKdLvP025pgf +ZfJ/8eOPTIBGNli2oWXLzhxEdTAyMAoGCCsGAQUFBwMEDCRBdG9zIFRydXN0ZWRS +b290IFJvb3QgQ0EgUlNBIEcyIDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# Atos TrustedRoot Root CA RSA TLS 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFZDCCA0ygAwIBAgIQU9XP5hmTC/srBRLYwiqipDANBgkqhkiG9w0BAQwFADBM +MS4wLAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgUlNBIFRMUyAyMDIx +MQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTIxMTBaFw00 +MTA0MTcwOTIxMDlaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBD +QSBSU0EgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtoAOxHm9BYx9sKOdTSJNy/BBl01Z +4NH+VoyX8te9j2y3I49f1cTYQcvyAh5x5en2XssIKl4w8i1mx4QbZFc4nXUtVsYv +Ye+W/CBGvevUez8/fEc4BKkbqlLfEzfTFRVOvV98r61jx3ncCHvVoOX3W3WsgFWZ +kmGbzSoXfduP9LVq6hdKZChmFSlsAvFr1bqjM9xaZ6cF4r9lthawEO3NUDPJcFDs +GY6wx/J0W2tExn2WuZgIWWbeKQGb9Cpt0xU6kGpn8bRrZtkh68rZYnxGEFzedUln +nkL5/nWpo63/dgpnQOPF943HhZpZnmKaau1Fh5hnstVKPNe0OwANwI8f4UDErmwh +3El+fsqyjW22v5MvoVw+j8rtgI5Y4dtXz4U2OLJxpAmMkokIiEjxQGMYsluMWuPD +0xeqqxmjLBvk1cbiZnrXghmmOxYsL3GHX0WelXOTwkKBIROW1527k2gV+p2kHYzy +geBYBr3JtuP2iV2J+axEoctr+hbxx1A9JNr3w+SH1VbxT5Aw+kUJWdo0zuATHAR8 +ANSbhqRAvNncTFd+rrcztl524WWLZt+NyteYr842mIycg5kDcPOvdO3GDjbnvezB +c6eUWsuSZIKmAMFwoW4sKeFYV+xafJlrJaSQOoD0IJ2azsct+bJLKZWD6TWNp0lI +pw9MGZHQ9b8Q4HECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +dEmZ0f+0emhFdcN+tNzMzjkz2ggwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB +DAUAA4ICAQAjQ1MkYlxt/T7Cz1UAbMVWiLkO3TriJQ2VSpfKgInuKs1l+NsW4AmS +4BjHeJi78+xCUvuppILXTdiK/ORO/auQxDh1MoSf/7OwKwIzNsAQkG8dnK/haZPs +o0UvFJ/1TCplQ3IM98P4lYsU84UgYt1UU90s3BiVaU+DR3BAM1h3Egyi61IxHkzJ +qM7F78PRreBrAwA0JrRUITWXAdxfG/F851X6LWh3e9NpzNMOa7pNdkTWwhWaJuyw +xfW70Xp0wmzNxbVe9kzmWy2B27O3Opee7c9GslA9hGCZcbUztVdF5kJHdWoOsAgM +rr3e97sPWD2PAzHoPYJQyi9eDF20l74gNAf0xBLh7tew2VktafcxBPTy+av5EzH4 +AXcOPUIjJsyacmdRIXrMPIWo6iFqO9taPKU0nprALN+AnCng33eU0aKAQv9qTFsR +0PXNor6uzFFcw9VUewyu1rkGd4Di7wcaaMxZUa1+XGdrudviB0JbuAEFWDlN5LuY +o7Ey7Nmj1m+UI/87tyll5gfp77YZ6ufCOB0yiJA8EytuzO+rdwY0d4RPcuSBhPm5 +dDTedk+SKlOxJTnbPP/lPqYO5Wue/9vsL3SD3460s6neFE3/MaNFcyT6lSnMEpcE +oji2jbDwN/zIIX8/syQbPYtuzE2wFg2WHYMfRsCbvUOZ58SWLs5fyTAzMAoGCCsG +AQUFBwMBDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgUlNBIFRMUyAyMDIx +-----END TRUSTED CERTIFICATE----- + +# Australian Defence Public Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEIjCCAwqgAwIBAgIUKeuSM0ZPMkH/gxkAqa3E2fjj4n8wDQYJKoZIhvcNAQEL +BQAwcTELMAkGA1UEBhMCQVUxDDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9EMQww +CgYDVQQLEwNQS0kxDDAKBgNVBAsTA0NBczEqMCgGA1UEAxMhQXVzdHJhbGlhbiBE +ZWZlbmNlIFB1YmxpYyBSb290IENBMB4XDTE2MTEyODIyMjUyOFoXDTM2MTEyODIy +MTM0OFowcTELMAkGA1UEBhMCQVUxDDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9E +MQwwCgYDVQQLEwNQS0kxDDAKBgNVBAsTA0NBczEqMCgGA1UEAxMhQXVzdHJhbGlh +biBEZWZlbmNlIFB1YmxpYyBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEA005UBBvQ9JuduCOH4CDHnpixcXoGkC7irUj+kwVs7Ia/KECFs0x5 +70dTmBAeVO59eLgYEwxEUv3QgaqTCCM5vl8Pa90ll/MBQt/UgQDEUL56iS0Zr3NK +P8w6wL+iqMUV9z58QXSCay53ZuJqpZGIbgYxp68L5lrgrn1ary9H0PL7hHOcRqEe +hERRxF8u2pACX4HfEQ7S+7s6F3Oj8o1jqk//cnplYoNaKjzyzSwjjc/rIR+/1ANX +9TcWDF7lVxHCqPr/bDnyPVLmtXnAW+Ky6mMgDA6lKl4S4eavX4t8oK05NTWYX/Gv +ONAm0029Ynd1Pa9rFIZ7WvYhj9bq4qcOrQIDAQABo4GxMIGuMA8GA1UdEwEB/wQF +MAMBAf8wSwYDVR0gBEQwQjAGBgRVHSAAMDgGCSokAYJOAQEBBzArMCkGCCsGAQUF +BwIBFh1odHRwOi8vY3JsLmRlZmVuY2UuZ292LmF1L3BraTAOBgNVHQ8BAf8EBAMC +AcYwHwYDVR0jBBgwFoAUrJnhAi/oXEtBtzS4HumbgzYNlLQwHQYDVR0OBBYEFKyZ +4QIv6FxLQbc0uB7pm4M2DZS0MA0GCSqGSIb3DQEBCwUAA4IBAQB4vIFK2DpXu70m +v+oqKPCIivJQTJBn2kv1uBQIutt/cqiaWbzxHImo9DoDEFQTel3G2ro+D4jVatMb +ly1iYTpv+QCvcgZz7BDAYR7MXE8ZMkY4wd0/0jcapY6GoPAJzDXWGQJ8zTn89/kf +55R5Tj23+JdOO0RqzZSwufd+4uP5mX/F06ZQtEn7Fn5OQSzPPsd5QLqBGCYI+cWd +49jxbxxoP2pbdxdSowbeGcJLbqKV/NUIvyy1aTVR4+PfTxopbYN4PTgkygI/VBDh +s2Th1Zre8zf2MxC1drOr18kfUzqtVUEcSMk2nof/ddxp0K/ZelfGyrFD/DmB/Nx6 +o5qlmFBUMC8wCgYIKwYBBQUHAwMMIUF1c3RyYWxpYW4gRGVmZW5jZSBQdWJsaWMg +Um9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Autoridad Certificadora Raiz de la Secretaria de Economia +-----BEGIN TRUSTED CERTIFICATE----- +MIIFlDCCBHygAwIBAgIBATANBgkqhkiG9w0BAQUFADCCATExFzAVBgNVBAcTDkFs +dmFybyBPYnJlZ29uMRkwFwYDVQQIExBEaXN0cml0byBGZWRlcmFsMQswCQYDVQQG +EwJNWDEOMAwGA1UEERMFMDEwMzAxHTAbBgNVBAkTFEluc3VyZ2VudGVzIFN1ciAx +OTQwMUIwQAYDVQQDEzlBdXRvcmlkYWQgQ2VydGlmaWNhZG9yYSBSYWl6IGRlIGxh +IFNlY3JldGFyaWEgZGUgRWNvbm9taWExNDAyBgNVBAsTK0RpcmVjY2lvbiBHZW5l +cmFsIGRlIE5vcm1hdGl2aWRhZCBNZXJjYW50aWwxHzAdBgNVBAoTFlNlY3JldGFy +aWEgZGUgRWNvbm9taWExJDAiBgkqhkiG9w0BCQEWFWFjcnNlQGVjb25vbWlhLmdv +Yi5teDAeFw0wNTA1MDgwMDAwMDBaFw0yNTA1MDgwMDAwMDBaMIIBMTEXMBUGA1UE +BxMOQWx2YXJvIE9icmVnb24xGTAXBgNVBAgTEERpc3RyaXRvIEZlZGVyYWwxCzAJ +BgNVBAYTAk1YMQ4wDAYDVQQREwUwMTAzMDEdMBsGA1UECRMUSW5zdXJnZW50ZXMg +U3VyIDE5NDAxQjBABgNVBAMTOUF1dG9yaWRhZCBDZXJ0aWZpY2Fkb3JhIFJhaXog +ZGUgbGEgU2VjcmV0YXJpYSBkZSBFY29ub21pYTE0MDIGA1UECxMrRGlyZWNjaW9u +IEdlbmVyYWwgZGUgTm9ybWF0aXZpZGFkIE1lcmNhbnRpbDEfMB0GA1UEChMWU2Vj +cmV0YXJpYSBkZSBFY29ub21pYTEkMCIGCSqGSIb3DQEJARYVYWNyc2VAZWNvbm9t +aWEuZ29iLm14MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwWSg9OdS +cLLqkxP0NTof6jocxRuLWOGW1gJBXo6FQP9BZkBT/Ji10TIyl2dAgJ3uID8OVPtC +B/t3GpnYhvQcKogl8+lEo07+B76xyO88jYfgHspJEDso7yRRofyIF0rnHMhUZ2Po +ajHmQ2z2QBGGxFbuvckdpkY8HkbCgo0uqejudgpD4HJNjPTFBvosAQAzYM44cDRr +FxrremRhp5OkZWrXI8d2epRRC+yeqM87olAyHEK9Y+GHy7mFSA7A1Vi29s5L8gfP +4wTVH8LWo26ju7a3bsTxoh8WvLYtsO/0Wpspjbzh/AdbHgkzgnjMQG1xs2MTL9NM +Nqw5T8bBsLb1hQIDAQABo4GyMIGvMDMGA1UdHwQsMCowKKAmoCSGImh0dHA6Ly9h +Yy5lY29ub21pYS5nb2IubXgvbGFzdC5jcmwwRwYDVR0gBEAwPjA8Bghgg2RlCoI8 +ATAwMC4GCCsGAQUFBwIBFiJodHRwOi8vYWMuZWNvbm9taWEuZ29iLm14L2Nwcy5o +dG1sMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMBEGCWCGSAGG+EIBAQQE +AwIABzANBgkqhkiG9w0BAQUFAAOCAQEATCp4UwSWc2CrNazAxOPnyHClKS+HGOWo +gt4H1Qj0z549nvxKLBZ8n6KdZRDMwRubamfasrMd/81kejhjrUj983Lh+p+7V92/ +zMJU2JU8ZtdrBrqvqeBtCO+ktpA9DG4gF6eWp3xoSpyYxAdvwQJikTibneOKeVOd +nyR2JfatKFYGqu8HrLr2bOQlMX2IgDp4Rvh54TjgE+dhKUfzyxQA09ri3e1z30vy +Y+Qm2HXQTUMUkBaURwH/oVlL5HabWQPe1hf2e9dc+Onjb8hO4EcmseKcfEox5WQR +4LBf2pE2SB/6CYplaPUOwp/vuGrPd/4S7TbaETatGWrC1I5S12jvMTBHMAoGCCsG +AQUFBwMDDDlBdXRvcmlkYWQgQ2VydGlmaWNhZG9yYSBSYWl6IGRlIGxhIFNlY3Jl +dGFyaWEgZGUgRWNvbm9taWE= +-----END TRUSTED CERTIFICATE----- + +# Autoridad Certificadora Raíz Nacional de Uruguay +-----BEGIN TRUSTED CERTIFICATE----- +MIIGnTCCBIWgAwIBAgISAu4Am2bYah1n/tqKJW8hWnUbMA0GCSqGSIb3DQEBCwUA +MFoxOjA4BgNVBAMMMUF1dG9yaWRhZCBDZXJ0aWZpY2Fkb3JhIFJhw616IE5hY2lv +bmFsIGRlIFVydWd1YXkxDzANBgNVBAoTBkFHRVNJQzELMAkGA1UEBhMCVVkwHhcN +MTExMTAzMTUwMjQ5WhcNMzExMDI5MTUwMjQ5WjBaMTowOAYDVQQDDDFBdXRvcmlk +YWQgQ2VydGlmaWNhZG9yYSBSYcOteiBOYWNpb25hbCBkZSBVcnVndWF5MQ8wDQYD +VQQKEwZBR0VTSUMxCzAJBgNVBAYTAlVZMIICIDANBgkqhkiG9w0BAQEFAAOCAg0A +MIICCAKCAgEAl8QfKkShgUtIkXXd69qPyhuL8rQ8LMbl9MEe0bgwE29cn+VRln8a +pBb+0tQdJfbQ5jdgXwCjGansJ79QLQWgXF6T6+No/Zs9uRQ2LeclFRCQGpLJEbEp +l5NWVWKtR6x/1Qx3ltKTaGox3VTvk/IKT6BfAlrvtkQ+55myjkXeoPfA6EiwR+ze +QhTbNXugafwewAEpFtozoSGhMjIQdn2ox8Auc4Nk/Fr3mzaMae0gVSN5zfPzbGtg +XHiN/D2FLLyp93DopcpN2HyY74Z2GITVQCkQJzLn7wNEC0/JKvG2tCug1QOUhCHT +dPMpbXjwBWquAQ9hH8al8MeCFdk7+92LdGnu5MfH9BHcFFHBhBolVhNrW85fLP2L +Gy0PyMBVqhhPmJzPoncItDWV2LmLnEkOtBAL/PxHTdSaV/mfer3pV7u0D18VkNho +bNWFJYMthgxHYpezeU25ZQh3Um9K426AwKyj1bzqSeJl4kxZaoLeK/WqPv5l6FFw +TTeEBgQ/koPUVijjJdVUyoXuVsAuzvlwEBJfXZ7GvEsQHVZtynLBUwkqEz3Ytfkc +O0XGhxTQOH6eIV/8dh3/CylC26HEeTnhTdWGUOPy4LPXWZvePx4aA/PUaYZLRxwy +fzwHCRMQp5sHMHczvGkR0TQ9fBAquB6OvUfe+bJ5VWYhAgf7OSwKF6ECAQOjggFd +MIIBWTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBiBgNVHR8EWzBZ +MCygKqAohiZodHRwOi8vd3d3LmFnZXNpYy5ndWIudXkvYWNybi9hY3JuLmNybDAp +oCegJYYjaHR0cDovL3d3dy51Y2UuZ3ViLnV5L2Fjcm4vYWNybi5jcmwwgbIGA1Ud +IASBqjCBpzBcBgtghlqE4q4dhIgFADBNMEsGCCsGAQUFBwIBFj9odHRwOi8vd3d3 +LnVjZS5ndWIudXkvaW5mb3JtYWNpb24tdGVjbmljYS9wb2xpdGljYXMvY3BfYWNy +bi5wZGYwRwYLYIZahOKuHYSIBQEwODA2BggrBgEFBQcCARYqaHR0cDovL3d3dy5h +Z2VzaWMuZ3ViLnV5L2Fjcm4vY3BzX2Fjcm4ucGRmMB0GA1UdDgQWBBSSnpG4VSg9 +d0IsM6WYX9DJrI21ozANBgkqhkiG9w0BAQsFAAOCAgEAXeerWepJ3L9GQ/2Uu5hw +lBT6zgNd8X0xE5JOhSQwFGts0+fO5nnV205VThcr15NF3xMMJ2cdx0KQVDDG8ahp +KLROpm2lNaZQlmhJo+4vC6v8AwJQaPGVKT5xLNza5S3Zdi7uVjN+F6EnAuGhJygh +ir8B52LHu7IlBNobpiOMfJO6yYvrCvk3t5Q5/U2PfqLcgW8brRQPWyADeEFzZ57S +lxeQKopUS6d5fyQSkZ87LMc3pAxccmoTnjIJJ+tDMnVf10fDKkVTFVZ2T7sJ6IRg +Ee9z1edQbmko/evGy8pOE2MNDjcsMR/bp1igsv0NF4ezkq4bKIAftpJ+hhHh9kyY +f2aLHxNJA0L8+5ic7oaWqS4FfnAcwXfI6V2CuA7OW2QFY+4/Bi02DOkfclserN0m +9Rw4bv2MPU2G6yfLygONQPMq0YrYNA7CrbWI7YeaioWih+/puTjnaJajAc+CPRxL +KJ0n9fmZlntI/azQ8DL3OATdTZmuDpKCw/o8GxPHaLdd4JNGuLi4pAzEG8a6Rpbd +nlUPR532gaWsZVnY3a4GbOBDgsZn2HACNfU2BONKOal1Ah7mP0bPnCwehIgXqiap +pkOA4MBbo2SDm5rtawFltsE9GOyTGWaUqNMRUJl6iH2vPn+UkDsKw2q3jV/Sp1HR +Mh+58jJ9d5NtQ+xBaavPyWEwPzAKBggrBgEFBQcDAwwxQXV0b3JpZGFkIENlcnRp +ZmljYWRvcmEgUmHDrXogTmFjaW9uYWwgZGUgVXJ1Z3VheQ== +-----END TRUSTED CERTIFICATE----- + +# Autoridad de Certificacion Firmaprofesional CIF A62634068 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 +MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc +tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd +IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j +b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC +AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw +ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m +iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF +Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ +hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P +Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE +EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV +1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t +CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR +5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw +f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 +ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK +GbqEZycPvEJdvSRUDewdcAZfpLz6IHxVMFEwFAYIKwYBBQUHAwEGCCsGAQUFBwMD +DDlBdXRvcmlkYWQgZGUgQ2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJ +RiBBNjI2MzQwNjg= +-----END TRUSTED CERTIFICATE----- + +# Autoridad de Certificacion Raiz del Estado Venezolano +-----BEGIN TRUSTED CERTIFICATE----- +MIIJmDCCB4CgAwIBAgIBCjANBgkqhkiG9w0BAQwFADCCAR4xPjA8BgNVBAMTNUF1 +dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9s +YW5vMQswCQYDVQQGEwJWRTEQMA4GA1UEBxMHQ2FyYWNhczEZMBcGA1UECBMQRGlz +dHJpdG8gQ2FwaXRhbDE2MDQGA1UEChMtU2lzdGVtYSBOYWNpb25hbCBkZSBDZXJ0 +aWZpY2FjaW9uIEVsZWN0cm9uaWNhMUMwQQYDVQQLEzpTdXBlcmludGVuZGVuY2lh +IGRlIFNlcnZpY2lvcyBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMSUwIwYJ +KoZIhvcNAQkBFhZhY3JhaXpAc3VzY2VydGUuZ29iLnZlMB4XDTEwMTIyODE2NDEz +NloXDTMwMTIyMzIzNTk1OVowggEeMT4wPAYDVQQDEzVBdXRvcmlkYWQgZGUgQ2Vy +dGlmaWNhY2lvbiBSYWl6IGRlbCBFc3RhZG8gVmVuZXpvbGFubzELMAkGA1UEBhMC +VkUxEDAOBgNVBAcTB0NhcmFjYXMxGTAXBgNVBAgTEERpc3RyaXRvIENhcGl0YWwx +NjA0BgNVBAoTLVNpc3RlbWEgTmFjaW9uYWwgZGUgQ2VydGlmaWNhY2lvbiBFbGVj +dHJvbmljYTFDMEEGA1UECxM6U3VwZXJpbnRlbmRlbmNpYSBkZSBTZXJ2aWNpb3Mg +ZGUgQ2VydGlmaWNhY2lvbiBFbGVjdHJvbmljYTElMCMGCSqGSIb3DQEJARYWYWNy +YWl6QHN1c2NlcnRlLmdvYi52ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC +ggIBAME77xNS8ZlW47RsBeEaaRZhJoZ4rw785UAFCuPZOAVMqNS1wMYqzy95q6Gk +UO81ER/ugiQX/KMcq/4HBn83fwdYWxPZfwBfK7BP2p/JsFgzYeFP0BXOLmvoJIzl +Jb6FW+1MPwGBjuaZGFImWZsSmGUclb51mRYMZETh9/J5CLThR1exStxHQptwSzra +zNFpkQY/zmj7+YZNA9yDoroVFv6sybYOZ7OxNDo7zkSLo45I7gMwtxqWZ8VkJZkC +8+p0dX6mkhUT0QAV64Zc9HsZiH/oLhEkXjhrgZ28cF73MXIqLx1fyM4kPH1yOJi/ +R72nMwL7D+Sd6mZgI035TxuHXc2/uOwXfKrrTjaJDz8Jp6DdessOkxIgkKXRjP+F +K3ze3n4NUIRGhGRtyvEjK95/2g02t6PeYiYVGur6ruS49n0RAaSS0/LJb6XzaAAe +0mmO2evnEqxIKwy2mZRNPfAVW1l3wCnWiUwryBU6OsbFcFFrQm+00wOicXvOTHBM +aiCVAVZTb9RSLyi+LJ1llzJZO3pq3IRiiBj38Nooo+2ZNbMEciSgmig7YXaUcmud +SVQvLSL+Yw+SqawyezwZuASbp7d/0rutQ59d81zlbMt3J7yB567rT2IqIydQ8qBW +k+fmXzghX+/FidYsh/aK+zZ7Wy68kKHuzEw1Vqkat5DGs+VzAgMBAAGjggLbMIIC +1zASBgNVHRMBAf8ECDAGAQH/AgECMDcGA1UdEgQwMC6CD3N1c2NlcnRlLmdvYi52 +ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAzNi0wMB0GA1UdDgQWBBStuyIdxuDS +Aaj9dlBSk+2YwU2u0zCCAVAGA1UdIwSCAUcwggFDgBStuyIdxuDSAaj9dlBSk+2Y +wU2u06GCASakggEiMIIBHjE+MDwGA1UEAxM1QXV0b3JpZGFkIGRlIENlcnRpZmlj +YWNpb24gUmFpeiBkZWwgRXN0YWRvIFZlbmV6b2xhbm8xCzAJBgNVBAYTAlZFMRAw +DgYDVQQHEwdDYXJhY2FzMRkwFwYDVQQIExBEaXN0cml0byBDYXBpdGFsMTYwNAYD +VQQKEy1TaXN0ZW1hIE5hY2lvbmFsIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25p +Y2ExQzBBBgNVBAsTOlN1cGVyaW50ZW5kZW5jaWEgZGUgU2VydmljaW9zIGRlIENl +cnRpZmljYWNpb24gRWxlY3Ryb25pY2ExJTAjBgkqhkiG9w0BCQEWFmFjcmFpekBz +dXNjZXJ0ZS5nb2IudmWCAQowCwYDVR0PBAQDAgEGMDcGA1UdEQQwMC6CD3N1c2Nl +cnRlLmdvYi52ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAzNi0wMFQGA1UdHwRN +MEswJKAioCCGHmh0dHA6Ly93d3cuc3VzY2VydGUuZ29iLnZlL2xjcjAjoCGgH4Yd +bGRhcDovL2FjcmFpei5zdXNjZXJ0ZS5nb2IudmUwNwYIKwYBBQUHAQEEKzApMCcG +CCsGAQUFBzABhhtodHRwOi8vb2NzcC5zdXNjZXJ0ZS5nb2IudmUwQAYDVR0gBDkw +NzA1BgVghl4BAjAsMCoGCCsGAQUFBwIBFh5odHRwOi8vd3d3LnN1c2NlcnRlLmdv +Yi52ZS9kcGMwDQYJKoZIhvcNAQEMBQADggIBABxZEOVepFHBR7tlsgtV4i+poye8 +4TyKx2wDVqOpKaKbipXYH/e2EmAWvnr0/QOBT/2BgapPgXAeLu/AkhJ7uw+FiMT5 +HUG1uiQqwygmE8r5APvXw1z5aOkbwRgiyaJsZMP4OcNOId3Wwt7ltizJXDjw3l5q +5Cf0uDPEy2GSM1OozPydzVP7KAvv7X+wj3QitjVXgKiuBa4pCjuypP0949TBkPY/ +zrzkRP7RwX4oL/0AJDIgiMRvGHuRDkiQvJZiYIFtFAAaUbq1XWmNYUccLKxORSCp +SEWjh0mjeJDdNkJ/2HZv/W2DAcb5f5ggf5YuImCroifAsDUk0Mm/M5kiUw5uH2JM +JvwkM8rBA8ypF2FjMyTMaEDvr6LihcOIMNNFG+5W6lYKDwpHmzBZ2EnRMJAMJyom +CChcMh8n160LSeUXUWPP5g07YFEavUMJUOaRtWPmZJeqC5cTAQaGXKUflb5Qjguy +0mR/26tM5kPG5IWNav6N/ruUVR6RUycI07pnPTqhycHFFLr5Q1zFjiGMgqL9KjIl +1RaMFVbAmPwuso4ZpBZxw0vdcf5x7CId8MGMmIGHtL8CuMQwMUfCwLCvezNjCt2s +RZvBzICH9NmYXpyG/poE/2ZK/HthVL5XYwUHxqcBdVnkbjk7APSqnfOfiL/P0SUr +339z7RaGqZBlD3ApMEMwCgYIKwYBBQUHAwMMNUF1dG9yaWRhZCBkZSBDZXJ0aWZp +Y2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9sYW5v +-----END TRUSTED CERTIFICATE----- + +# Autoridad de Certificacion de la Abogacia +-----BEGIN TRUSTED CERTIFICATE----- +MIIEvDCCA6SgAwIBAgIQAJCLMk/BkBrOtMM4Cc3P5DANBgkqhkiG9w0BAQUFADB5 +MQswCQYDVQQGEwJFUzE2MDQGA1UEChMtQ29uc2VqbyBHZW5lcmFsIGRlIGxhIEFi +b2dhY2lhIE5JRjpRLTI4NjMwMDZJMTIwMAYDVQQDEylBdXRvcmlkYWQgZGUgQ2Vy +dGlmaWNhY2lvbiBkZSBsYSBBYm9nYWNpYTAeFw0wNTA2MTMyMjAwMDBaFw0zMDA2 +MTMyMjAwMDBaMHkxCzAJBgNVBAYTAkVTMTYwNAYDVQQKEy1Db25zZWpvIEdlbmVy +YWwgZGUgbGEgQWJvZ2FjaWEgTklGOlEtMjg2MzAwNkkxMjAwBgNVBAMTKUF1dG9y +aWRhZCBkZSBDZXJ0aWZpY2FjaW9uIGRlIGxhIEFib2dhY2lhMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtLJX7oXwI+gN+7KAhPEQZ6uy+UnfXN5b5I8p +GVPJ1egcUGthAoyH8I88wUWSC6yZocYahdY9rX4mph24PbKzPorFCjLTS5HvSXV+ +Vvf+oAhiRivO6vJRn2DeMsjtGqfPdVzrPcC9mkilhpTOWFAU6mrhmvSMZZXhYBUl +lRL2uniLssDt5myXJFod5HRDyjjENZRYjvWKsGg8KCxElgm/CVtyCudnPJC5VDh0 +VLttLWpDyLzvCawfI+hSVl41F18ru17NZVKlFHw7sqrp3Se1NyM7Bg0se4262m9m +F4anttceB10ebBmXyOUjc3jRrvkeuqGuSSLtZXEff/dadESNQwIDAQABo4IBPjCC +ATowNwYDVR0RBDAwLoERYWNAYWNhYm9nYWNpYS5vcmeGGWh0dHA6Ly93d3cuYWNh +Ym9nYWNpYS5vcmcwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwEQYJ +YIZIAYb4QgEBBAQDAgAHMB0GA1UdDgQWBBT8iEyObQShIJDT+Byas2cEX3mAxjCB +qwYDVR0gBIGjMIGgMIGdBgsrBgEEAYGBFQoBATCBjTApBggrBgEFBQcCARYdaHR0 +cDovL3d3dy5hY2Fib2dhY2lhLm9yZy9kb2MwYAYIKwYBBQUHAgIwVBpSQ29uc3Vs +dGUgbGEgZGVjbGFyYWNpb24gZGUgcHJhY3RpY2FzIGRlIGNlcnRpZmljYWNpb24g +ZW4gaHR0cDovL3d3dy5hY2Fib2dhY2lhLm9yZzANBgkqhkiG9w0BAQUFAAOCAQEA +mKf6ObVzESZ/vIk/tGslMzEKhjhryR4VlxTg0kwthfQ8dJuNKBH7zA4muYCDFtH5 +Rpi2RgeOZoVtcMC6TIDzpPDVN1Qrr2aEcnP5SC8JzuGFAcqP4IfeoJfQlLQNtU0O +ZyzIYMQylMBBgQeNur+p6AxAmkJ4BV2B62Ic5E8UCj0LPh/p9M197kW7vN5d85iX +JnvGEyn4K38a1Or6sm4gntoX6qGSvTfpDru7kdUl9mBdhSFQW/9UXfVLO7TDKRFY +AvYl5OGCgruijeeRJF5AkZ5HB4wzV9RiMVF2dYVDbwmrEaUlKbnY/1+l9z/rZTsd +74blFiLVHsoyaX1+BdcwJzA3MAoGCCsGAQUFBwMDDClBdXRvcmlkYWQgZGUgQ2Vy +dGlmaWNhY2lvbiBkZSBsYSBBYm9nYWNpYQ== +-----END TRUSTED CERTIFICATE----- + +# Autoridade Certificadora Raiz Brasileira v1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEgDCCA2igAwIBAgIBATANBgkqhkiG9w0BAQUFADCBlzELMAkGA1UEBhMCQlIx +EzARBgNVBAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25h +bCBkZSBUZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1 +dG9yaWRhZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjEwHhcNMDgw +NzI5MTkxNzEwWhcNMjEwNzI5MTkxNzEwWjCBlzELMAkGA1UEBhMCQlIxEzARBgNV +BAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25hbCBkZSBU +ZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1dG9yaWRh +ZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDOHOi+kzTOybHkVO4J9uykCIWgP8aKxnAwp4CM +7T4BVAeMGSM7n7vHtIsgseL3QRYtXodmurAH3W/RPzzayFkznRWwn5LIVlRYijon +ojQem3i1t83lm+nALhKecHgH+o7yTMD45XJ8HqmpYANXJkfbg3bDzsgSu9H/766z +Yn2aoOS8bn0BLjRg3IfgX38FcFwwFSzCdaM/UANmI2Ys53R3eNtmF9/5Hw2CaI91 +h/fpMXpTT89YYrtAojTPwHCEUJcV2iBL6ftMQq0raI6j2a0FYv4IdMTowcyFE86t +KDBQ3d7AgcFJsF4uJjjpYwQzd7WAds0qf/I8rF2TQjn0onNFAgMBAAGjgdQwgdEw +TgYDVR0gBEcwRTBDBgVgTAEBADA6MDgGCCsGAQUFBwIBFixodHRwOi8vYWNyYWl6 +LmljcGJyYXNpbC5nb3YuYnIvRFBDYWNyYWl6LnBkZjA/BgNVHR8EODA2MDSgMqAw +hi5odHRwOi8vYWNyYWl6LmljcGJyYXNpbC5nb3YuYnIvTENSYWNyYWl6djEuY3Js +MB0GA1UdDgQWBBRCsixcdAEHvpv/VTM77im7XZG/BjAPBgNVHRMBAf8EBTADAQH/ +MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAWWyKdukZcVeD/qf0 +eg+egdDPBxwMI+kkDVHLM+gqCcN6/w6jgIZgwXCX4MAKVd2kZUyPp0ewV7fzq8TD +GeOY7A2wG1GRydkJ1ulqs+cMsLKSh/uOTRXsEhQZeAxi6hQ5GArFVdtThdx7KPoV +caPKdCWCD2cnNNeuUhMC+8XvmoAlpVKeOQ7tOvR4B1/VKHoKSvXQw2f3jFgXbwoA +oyYQtGAiOkpIpdrgqYTeQ9ufQ6c/KARHki/352R1IdJPgc6qPmQO4w6tVZp+lJs0 +wdCuaU4eo9mzh1facMJafYfN+b833u1WNfe3Ig5Pkrg/CN+cnphe8m+5+pss+M1F +2HKyIDA5MAoGCCsGAQUFBwMDDCtBdXRvcmlkYWRlIENlcnRpZmljYWRvcmEgUmFp +eiBCcmFzaWxlaXJhIHYx +-----END TRUSTED CERTIFICATE----- + +# Autoridade Certificadora Raiz Brasileira v2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGoTCCBImgAwIBAgIBATANBgkqhkiG9w0BAQ0FADCBlzELMAkGA1UEBhMCQlIx +EzARBgNVBAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25h +bCBkZSBUZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1 +dG9yaWRhZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjIwHhcNMTAw +NjIxMTkwNDU3WhcNMjMwNjIxMTkwNDU3WjCBlzELMAkGA1UEBhMCQlIxEzARBgNV +BAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25hbCBkZSBU +ZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1dG9yaWRh +ZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjIwggIiMA0GCSqGSIb3 +DQEBAQUAA4ICDwAwggIKAoICAQC6RqQO3edA8rWgfFKVV0X8bYTzhgHJhQOtmKvS +8l4Fmcm7b2Jn/XdEuQMHPNIbAGLUcCxCg3lmq5lWroG8akm983QPYrfrWwdmlEIk +nUasmkIYMPAkqFFB6quV8agrAnhptSknXpwuc8b+I6Xjps79bBtrAFTrAK1POkw8 +5wqIW9pemgtW5LVUOB3yCpNkTsNBklMgKs/8dG7U2zM4YuT+jkxYHPePKk3/xZLZ +CVK9z3AAnWmaM2qIh0UhmRZRDTTfgr20aah8fNTd0/IVXEvFWBDqhRnLNiJYKnIM +mpbeys8IUWG/tAUpBiuGkP7pTcMEBUfLz3bZf3Gmh3sVQOQzgHgHHaTyjptAO8ly +UN9pvvAslh+QtdWudONltIwa6Wob+3JcxYJU6uBTB8TMEun33tcv1EgvRz8mYQSx +Epoza7WGSxMr0IadR+1p+/yEEmb4VuUOimx2xGsaesKgWhLRI4lYAXwIWNoVjhXZ +fn03tqRF9QOFzEf6i3lFuGZiM9MmSt4c6dR/5m0muTx9zQ8oCikPm91jq7mmRxqE +14WkA2UGBEtSjYM0Qn8xjhEu5rNnlUB+l3pAAPkRbIM4WK0DM1umxMHFsKwNqQbw +pmkBNLbp+JRITz6mdQnsSsU74MlesDL/n2lZzzwwbw3OJ1fsWhto/+xPb3gyPnnF +tF2VfwIDAQABo4H1MIHyME4GA1UdIARHMEUwQwYFYEwBAQAwOjA4BggrBgEFBQcC +ARYsaHR0cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJyL0RQQ2FjcmFpei5wZGYw +PwYDVR0fBDgwNjA0oDKgMIYuaHR0cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJy +L0xDUmFjcmFpenYyLmNybDAfBgNVHSMEGDAWgBQMOSA6twEfy9cofUGgx/pKrTIk +vjAdBgNVHQ4EFgQUDDkgOrcBH8vXKH1BoMf6Sq0yJL4wDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQADggIBAFmaFGkYbX0pQ3B9 +dpth33eOGnbkqdbLdqQWDEyUEsaQ0YEDxa0G2S1EvLIJdgmAOWcAGDRtBgrmtRBZ +SLp1YPw/jh0YVXArnkuVrImrCncke2HEx5EmjkYTUTe2jCcK0w3wmisig4OzvYM1 +rZs8vHiDKTVhNvgRcTMgVGNTRQHYE1qEO9dmEyS3xEbFIthzJO4cExeWyCXoGx7P +34VQbTzq91CeG5fep2vb1nPSz3xQwLCM5VMSeoY5rDVbZ8fq1PvRwl3qDpdzmK4p +v+Q68wQ2UCzt3h7bhegdhAnu86aDM1tvR3lPSLX8uCYTq6qz9GER+0Vn8x0+bv4q +SyZEGp+xouA82uDkBTp4rPuooU2/XSx3KZDNEx3vBijYtxTzW8jJnqd+MRKKeGLE +0QW8BgJjBCsNid3kXFsygETUQuwq8/JAhzHVPuIKMgwUjdVybQvm/Y3kqPMFjXUX +d5sKufqQkplliDJnQwWOLQsVuzXxYejZZ3ftFuXoAS1rND+Og7P36g9KHj41hJ2M +gDQ/qZXow63EzZ7KFBYsGZ7kNou5uaNCJQc+w+XVaE+gZhyms7ZzHJAaP0C5GlZC +cIf/by0PEf0e//eFMBUO4xcx7ieVzMnpmR6Xx21bB7UFaj3yRd+6gnkkcC6bgh9m +qaVtJ8z2KqLRX4Vv4EadqtKlTlUOMDkwCgYIKwYBBQUHAwMMK0F1dG9yaWRhZGUg +Q2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjI= +-----END TRUSTED CERTIFICATE----- + +# BJCA Global Root CA1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIQVW9l47TZkGobCdFsPsBsIDANBgkqhkiG9w0BAQsFADBU +MQswCQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRI +T1JJVFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0ExMB4XDTE5MTIxOTAz +MTYxN1oXDTQ0MTIxMjAzMTYxN1owVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJF +SUpJTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2Jh +bCBSb290IENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPFmCL3Z +xRVhy4QEQaVpN3cdwbB7+sN3SJATcmTRuHyQNZ0YeYjjlwE8R4HyDqKYDZ4/N+AZ +spDyRhySsTphzvq3Rp4Dhtczbu33RYx2N95ulpH3134rhxfVizXuhJFyV9xgw8O5 +58dnJCNPYwpj9mZ9S1WnP3hkSWkSl+BMDdMJoDIwOvqfwPKcxRIqLhy1BDPapDgR +at7GGPZHOiJBhyL8xIkoVNiMpTAK+BcWyqw3/XmnkRd4OJmtWO2y3syJfQOcs4ll +5+M7sSKGjwZteAf9kRJ/sGsciQ35uMt0WwfCyPQ10WRjeulumijWML3mG90Vr4Tq +nMfK9Q7q8l0ph49pczm+LiRvRSGsxdRpJQaDrXpIhRMsDQa4bHlW/KNnMoH1V6XK +V0Jp6VwkYe/iMBhORJhVb3rCk9gZtt58R4oRTklH2yiUAguUSiz5EtBP6DF+bHq/ +pj+bOT0CFqMYs2esWz8sgytnOYFcuX6U1WTdno9uruh8W7TXakdI136z1C2OVnZO +z2nxbkRs1CTqjSShGL+9V/6pmTW12xB3uD1IutbB5/EjPtffhZ0nPNRAvQoMvfXn +jSXWgXSHRtQpdaJCbPdzied9v3pKH9MiyRVVz99vfFXQpIsHETdfg6YmV6YBW37+ +WGgHqel62bno/1Afq8K0wM7o6v0PvY1NuLxxAgMBAAGjQjBAMB0GA1UdDgQWBBTF +7+3M2I0hxkjk49cULqcWk+WYATAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAUoKsITQfI/Ki2Pm4rzc2IInRNwPWaZ+4 +YRC6ojGYWUfo0Q0lHhVBDOAqVdVXUsv45Mdpox1NcQJeXyFFYEhcCY5JEMEE3Kli +awLwQ8hOnThJdMkycFRtwUf8jrQ2ntScvd0g1lPJGKm1Vrl2i5VnZu69mP6u775u ++2D2/VnGKhs/I0qUJDAnyIm860Qkmss9vk/Ves6OF8tiwdneHg56/0OGNFK8YT88 +X7vZdrRTvJez/opMEi4r89fO4aL/3Xtw+zuhTaRjAv04l5U/BXCga99igUOLtFkN +SoxUnMW7gZ/NfaXvCyUeOiDbHPwfmGcCCtRzRBPbUYQaVQNW4AB+dAb/OMRyHdOo +P2gxXdMJxy6MW2Pg6Nwe0uxhHvLe5e/2mXZgLR6UcnHGCyoyx5JO1UbXHfmpGQrI ++pXObSOYqgs4rZpWDW+N8TEAiMEXnM0ZNjX+VVOg4DwzX5Ze4jLp3zO7Bkqp2IRz +znfSxqxx4VyjHQy7Ct9f4qNx2No3WqB4K/TUfet27fJhcKVlmtOJNBir+3I+17Q9 +eVzYH6Eze9mCUAyTF6ps3MKCuwJXNq+YJyo5UOGwifUll35HaBC07HPKs5fRJNz2 +YqAo07WjuGS3iGJCz51TzZm+ZGiPTx4SSPfSKcOYKMryMguTjClPPGAyzQWWYezy +r/6zcCwupvIwLDAUBggrBgEFBQcDBAYIKwYBBQUHAwEMFEJKQ0EgR2xvYmFsIFJv +b3QgQ0Ex +-----END TRUSTED CERTIFICATE----- + +# BJCA Global Root CA2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICJTCCAaugAwIBAgIQLBcIfWQqwP6FGFkGz7RK6zAKBggqhkjOPQQDAzBUMQsw +CQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRIT1JJ +VFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0EyMB4XDTE5MTIxOTAzMTgy +MVoXDTQ0MTIxMjAzMTgyMVowVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJFSUpJ +TkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2JhbCBS +b290IENBMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABJ3LgJGNU2e1uVCxA/jlSR9B +IgmwUVJY1is0j8USRhTFiy8shP8sbqjV8QnjAyEUxEM9fMEsxEtqSs3ph+B99iK+ ++kpRuDCK/eHeGBIK9ke35xe/J4rUQUyWPGCWwf0VHKNCMEAwHQYDVR0OBBYEFNJK +sVF/BvDRgh9Obl+rg/xI1LCRMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMAoGCCqGSM49BAMDA2gAMGUCMBq8W9f+qdJUDkpd0m2xQNz0Q9XSSpkZElaA +94M04TVOSG0ED1cxMDAtsaqdAzjbBgIxAMvMh1PLet8gUXOQwKhbYdDFUDn9hf7B +43j4ptZLvZuHjw/l1lOWqzzIQNph91Oj9zAsMBQGCCsGAQUFBwMEBggrBgEFBQcD +AQwUQkpDQSBHbG9iYWwgUm9vdCBDQTI= +-----END TRUSTED CERTIFICATE----- + +# BYTE Root Certification Authority 001 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFmTCCA4GgAwIBAgIIcYwvOXxAdEAwDQYJKoZIhvcNAQELBQAwWjELMAkGA1UE +BhMCR1IxGzAZBgNVBAoMEkJZVEUgQ29tcHV0ZXIgUy5BLjEuMCwGA1UEAwwlQllU +RSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDAwMTAeFw0xNDA5MTAyMjAx +NTRaFw0zOTA5MTAyMjAxNTRaMFoxCzAJBgNVBAYTAkdSMRswGQYDVQQKDBJCWVRF +IENvbXB1dGVyIFMuQS4xLjAsBgNVBAMMJUJZVEUgUm9vdCBDZXJ0aWZpY2F0aW9u +IEF1dGhvcml0eSAwMDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDt +Ei4Xc55v9POZ6J4IVwk0JBFAH4whfhuvOMPRx+YU5fobul5m9SVp9+3NboJwr7pC +8LEZXCv8RYQYLHoXT2GFRhl8zsGNn1SedyVmD+D2+JLKKc4nVxUqbII4bSfmvk1z +DnOv43E9vAlCD9UNoe19a673wfBszcKXoVj9NRWWF0yfv/XxOUtwt+dKbBw/wXBb +z9aL6+9vMOhfyEZ3IWIWXsZURTn1dLpnJGilcVs+wfsJk+simfjS9XsCbI9Y4qvv +3XQh5CRplEDWwQQYDthC8P3XigXAXxuK6y7ADQcGcwGFjh/BwIqhWKZRuViRQg9u +4bwK6LsogxV15Q3+STApKULCwjb/pDx9Lvfa8qIvFrxhqJlYGKRJxmoHEusbfLTO +5/shgCtwpsjOrVUeHx2E0P1UakxWY8jdfqD5OdvvfFr3jDWlbipW+v7jX5NUcg5o +40krk001IpcUlWZPp3c6LiVM9gmLEhtxxXKnm7m86xygpclUg2HcV1WttebaeCt2 +p/742/6MM6SKo0ZcrbIKEg6K5FCe8LjLmVNMZCFrijgq4IiGANQXrGay574tOynl ++KeU24xY+NJLMJ/yxGJlUEdygM+kcEC2vUT+2b8oKy43x7NRDoIptbFvrX4sk8Cp +f5H6xx818LuXyU9hKJCEQeh9IUDFyYY87ZqthZyiUwIDAQABo2MwYTAdBgNVHQ4E +FgQUtE1mt9OzyJl8ATLQkTr31qgSMd4wDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBS0TWa307PImXwBMtCROvfWqBIx3jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI +hvcNAQELBQADggIBABwa6wauVb07PzYsYZ7qx1P8cKoyb+RCquu9hewbilrylZYp +oQQGks4kV/9AI3hOyfgwTUJVRE43on1rjmj+Dv5/37CfY1Hz4cWllJ+KIyhI80GL +0v547dnQCA9tfdWdlazV/hJmGuS+dVTz0U2cThPUnnA0bai6CjOIja0FN/5LeX99 +A0F5Ew2fPfc4nDVaRE8+PKLlgcV/X3ZPGztub5ptt+0PyzIfiLRFDJwR0vgEWhM3 +WZiBzkz05ZQoBMS1U8lUjXA/aAHbzBMK5CWjbJntELN6IKlJvAX0+Bto1rogHYJn +ZuCwn1zKNdJFrtWIGdt6BpuMoDeHUSO+Rdpcs39rz8aoHDOKex2R+p687H07RRVP +G6c7NbR581uCUOCcp+0WddtjgGKh2hgCaoDegqpETUQ4KKpu+hhjOWD3QylJWrok +wL+zCpcdZ0laIrJnBJxYqfgMNFxAlrSHtUVhGeWO7wbekRXAuIrKlMkKdX1xO1iB +M8j3B0FVmClDtcuaQ+ly+s/wizG85++5auNBnSE+DRWohb0bToeOR7IQ/jcYaoTl +iRwUY+i5g6m1u+hjmnoZjMt09/gXCPGLGdi07B5uSXM/XCDdNSqWd+lGbxY7y6nv +mwohEcjDpMkjRW0/YpWd0yjHnQ+z/jeNHUiyUOYluU4zYTbWFhzKMjcgdhwsMDMw +CgYIKwYBBQUHAwMMJUJZVEUgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAw +MDE= +-----END TRUSTED CERTIFICATE----- + +# Baltimore CyberTrust Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmpMDswHgYIKwYBBQUHAwQGCCsGAQUF +BwMBBggrBgEFBQcDAwwZQmFsdGltb3JlIEN5YmVyVHJ1c3QgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Buypass Class 2 Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr +6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV +L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91 +1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx +MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ +QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB +arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr +Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi +FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS +P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN +9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz +uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h +9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s +A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t +OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo ++fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7 +KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2 +DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us +H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ +I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7 +5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h +3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz +Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqAwJTAKBggrBgEFBQcDAQwXQnV5 +cGFzcyBDbGFzcyAyIFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# Buypass Class 3 Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y +ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E +N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9 +tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX +0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c +/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X +KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY +zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS +O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D +34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP +K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3 +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv +Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj +QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV +cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS +IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2 +HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa +O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv +033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u +dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE +kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41 +3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD +u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq +4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZcwJTAKBggrBgEFBQcDAQwXQnV5 +cGFzcyBDbGFzcyAzIFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# CAEDICOM Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIFUTCCAzmgAwIBAgIIAPtxJlitmeUwDQYJKoZIhvcNAQELBQAwNjEWMBQGA1UE +AwwNQ0FFRElDT00gUm9vdDEPMA0GA1UECgwGRURJQ09NMQswCQYDVQQGEwJFUzAe +Fw0xNDA1MjExMTA2MzVaFw0zNDA1MjExMDIwMDBaMDYxFjAUBgNVBAMMDUNBRURJ +Q09NIFJvb3QxDzANBgNVBAoMBkVESUNPTTELMAkGA1UEBhMCRVMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDbgMroSXTH0zgu8cUjYvw2jC8efjkL6Qb0 +VZulmCmU7YZHMoPzxZJ6BdcpAj4Wwyh/NWQpenm7oeIeYRSN5wDQ3KJUZYrfablx +R384OBZGp2kxETVM4Sp//21PlT3jXUhNGVMIWmsh1RIwaZeQry3B9X9BX0k2j024 +HhqVX9oPb1wVNcQRvF+Fm72tO1Veu9/Ou69cmWDdH2kaSUgh+QkKz3Kn8PLe5XgZ +vhLdzYd5Qc4vRdcLkRARBB4SnfI4A18Waa6gCtrA+eugDRgPeV6RneQfFJw0ExkC +RLpRw+55smAUo6+8SC0oOGgBQ2TKDoaDYtCKGaYn8St7SykhW5rMaEIQyEtPDyOy +iHzEXG4XcMV3r5XAJaQiCtN8+dhyyNAtvafo0i2LTKFuCvy0QDO7mmv8pOrJ/uA0 +iEPMxrw/ddKlqa/6l7k+t85UoE3AXS7BKNhjVHK4rFr1OvsgYQY69KArOKvMgwxJ +1G4+bQ8+cy825vNPs8AA0UVJW4z2o5gdhH+ZCsPqCjzD0yR4SGf1GzsOHQ5DsQR1 +waA5dov22QKlHeGeWwe7NldKIU35iWm0bA/Xr6AVJJnn+NdTlOwSv6Sl1+3ujjV3 +d9ymfyBUktZj1nKeTSq2j3PzGaHEsB/mNKMLAD6XSSdhqqoEQTM4tVBRzDYV2x// +vcpIg0inswIDAQABo2MwYTAdBgNVHQ4EFgQUFM0qWXhjq2EZ6Lg9oeBawHXn+csw +DwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBQUzSpZeGOrYRnouD2h4FrAdef5 +yzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAD0JGQC2kQJs7A73 +4eJisL8zDf1VEvQImvcrLa73nEfYHwYBE7WO57KCCz2EWUPUB9grXBB6JCzKjejV +ozmcMczr4Drh1b/Px4d7YP9HOdejRNYIJlvPWlTsiNOOD3k8yKNPpsKOJ/DeEq5e +Ga3nIlaKWDLg+QbQqSq0NZsMhiZRAJRHUPylxCVh+VjwRXAuSXZ/EdZvtfkpBeEN +w05YH68d7DfQSvkGBoHT26CWuA6RMHnmUN+IuAupXNQH9MmozH2Pk2MJZAAFKmhm +Q7uiu/6VrvnEpQqIYkh4JXwqPxFkptMiIEedMtby48ikYXTngsJEuqDRXV+88UQO +g08cUIXE6eds/Oa4VeGiGoC3kESnhCKXRyLeqzg3z7XyHD5CcLt1tmUoa8t/gjWq +9vMgeChzB5YwcKUqcVyheaQWuUY9XrQASYWJ0w7fga5YjVjW4cVEeC4cILuiR5e/ +dhQ7qSiPnwt10qE87SvHjpCheqKZMGL8hR01czvztVkiG80IsQyddWrbhTsOh58y +T5IAAQFMSWiCgEFs+f1xvYv0eApgo56xUh3AiuOexb8rGWqYp7HeFVCfqpQlj6mA +gqdyuklkCSdhK268IygzXZ5u8Lm9IDKM3aALmbu0hAQkdSmW96elF7hRBet0rVF5 +lvy7+98JLQiSRM7A0rMYxxQivyHxMBswCgYIKwYBBQUHAwMMDUNBRURJQ09NIFJv +b3Q= +-----END TRUSTED CERTIFICATE----- + +# CA Disig +-----BEGIN TRUSTED CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBATANBgkqhkiG9w0BAQUFADBKMQswCQYDVQQGEwJTSzET +MBEGA1UEBxMKQnJhdGlzbGF2YTETMBEGA1UEChMKRGlzaWcgYS5zLjERMA8GA1UE +AxMIQ0EgRGlzaWcwHhcNMDYwMzIyMDEzOTM0WhcNMTYwMzIyMDEzOTM0WjBKMQsw +CQYDVQQGEwJTSzETMBEGA1UEBxMKQnJhdGlzbGF2YTETMBEGA1UEChMKRGlzaWcg +YS5zLjERMA8GA1UEAxMIQ0EgRGlzaWcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQCS9jHBfYj9mQGp2HvycXXxMcbzdWb6UShGhJd4NLxs/LxFWYgmGErE +Nx+hSkS943EE9UQX4j/8SFhvXJ56CbpRNyIjZkMhsDxkovhqFQ4/61HhVKndBpnX +mjxUizkDPw/Fzsbrg3ICqB9x8y34dQjbYkzo+s7552oftms1grrijxaSfQUMbEYD +XcDtab86wYqg6I7ZuUUohwjstMoVvoLdtUSLLa2GDGhibYVW8qwUYzrG0ZmsNHhW +S8+2rT+MitcE5eN4TPWGqvWP+j1scaMtymfraHtuM6kMgiioTGohQBUgDCZbg8Kp +FhXAJIJdKxatymP2dACw30PEEGBWZ2NFAgMBAAGjgf8wgfwwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUjbJJaJ1yCCW5wCf1UJNWSEZx+Y8wDgYDVR0PAQH/BAQD +AgEGMDYGA1UdEQQvMC2BE2Nhb3BlcmF0b3JAZGlzaWcuc2uGFmh0dHA6Ly93d3cu +ZGlzaWcuc2svY2EwZgYDVR0fBF8wXTAtoCugKYYnaHR0cDovL3d3dy5kaXNpZy5z +ay9jYS9jcmwvY2FfZGlzaWcuY3JsMCygKqAohiZodHRwOi8vY2EuZGlzaWcuc2sv +Y2EvY3JsL2NhX2Rpc2lnLmNybDAaBgNVHSAEEzARMA8GDSuBHpGT5goAAAABAQEw +DQYJKoZIhvcNAQEFBQADggEBAF00dGFMrzvY/59tWDYcPQuBDRIrRhCA/ec8J9B6 +yKm2fnQwM6M6int0wHl5QpNt/7EpFIKrIYwvF/k/Ji/1WcbvgAa3mkkp7M5+cTxq +EEHA9tOasnxakZzArFvITV734VP/Q3f8nktnbNfzg9Gg4H8l37iYC5oyOGwwoPP/ +CBUz91BKez6jPiCp3C9WgArtQVCwyfTssuMmRAAOb54GvCKWU3BlxFAKRmukLyeB +EicTXxChds6KezfqwzlhA5WYOudsiCUI/HloDYd9Yvi0X/vF2Ey9WLw/Q1vUHgFN +PGO+I++MzVpQuGhU+QqZMxEA4Z7CRneC9VkGjCFMhwnN5agwFjAKBggrBgEFBQcD +AwwIQ0EgRGlzaWc= +-----END TRUSTED CERTIFICATE----- + +# CA Disig Root R1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAMMDmu5QkG4oMA0GCSqGSIb3DQEBBQUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIxMB4XDTEyMDcxOTA5MDY1NloXDTQy +MDcxOTA5MDY1NlowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjEw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqw3j33Jijp1pedxiy3QRk +D2P9m5YJgNXoqqXinCaUOuiZc4yd39ffg/N4T0Dhf9Kn0uXKE5Pn7cZ3Xza1lK/o +OI7bm+V8u8yN63Vz4STN5qctGS7Y1oprFOsIYgrY3LMATcMjfF9DCCMyEtztDK3A +fQ+lekLZWnDZv6fXARz2m6uOt0qGeKAeVjGu74IKgEH3G8muqzIm1Cxr7X1r5OJe +IgpFy4QxTaz+29FHuvlglzmxZcfe+5nkCiKxLU3lSCZpq+Kq8/v8kiky6bM+TR8n +oc2OuRf7JT7JbvN32g0S9l3HuzYQ1VTW8+DiR0jm3hTaYVKvJrT1cU/J19IG32PK +/yHoWQbgCNWEFVP3Q+V8xaCJmGtzxmjOZd69fwX3se72V6FglcXM6pM6vpmumwKj +rckWtc7dXpl4fho5frLABaTAgqWjR56M6ly2vGfb5ipN0gTco65F97yLnByn1tUD +3AjLLhbKXEAz6GfDLuemROoRRRw1ZS0eRWEkG4IupZ0zXWX4Qfkuy5Q/H6MMMSRE +7cderVC6xkGbrPAXZcD4XW9boAo0PO7X6oifmPmvTiT6l7Jkdtqr9O3jw2Dv1fkC +yC2fg69naQanMVXVz0tv/wQFx1isXxYb5dKj6zHbHzMVTdDypVP1y+E9Tmgt2BLd +qvLmTZtJ5cUoobqwWsagtQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUiQq0OJMa5qvum5EY+fU8PjXQ04IwDQYJKoZI +hvcNAQEFBQADggIBADKL9p1Kyb4U5YysOMo6CdQbzoaz3evUuii+Eq5FLAR0rBNR +xVgYZk2C2tXck8An4b58n1KeElb21Zyp9HWc+jcSjxyT7Ff+Bw+r1RL3D65hXlaA +SfX8MPWbTx9BLxyE04nH4toCdu0Jz2zBuByDHBb6lM19oMgY0sidbvW9adRtPTXo +HqJPYNcHKfyyo6SdbhWSVhlMCrDpfNIZTUJG7L399ldb3Zh+pE3McgODWF3vkzpB +emOqfDqo9ayk0d2iLbYq/J8BjuIQscTK5GfbVSUZP/3oNn6z4eGBrxEWi1CXYBmC +AMBrTXO40RMHPuq2MU/wQppt4hF05ZSsjYSVPCGvxdpHyN85YmLLW1AL14FABZyb +7bq2ix4Eb5YgOe2kfSnbSM6C3NQCjR0EMVrHS/BsYVLXtFHCgWzN4funodKSds+x +DzdYpPJScWc/DIh4gInByLUfkmO+p3qKViwaqKactV2zY9ATIKHrkWzQjX2v3wvk +F7mGnjixlAxYjOBVqjtjbZqJYLhkKpLGN/R+Q0O3c+gB53+XD9fyexn9GtePyfqF +a3qdnom2piiZk4hA9z7NUaPK6u95RyG1/jLix8NRb76AdPCkwzryT+lf3xkK8jsT +Q6wxpLPn6/wY1gGp8yqPNg7rtLG8t0zJa7+h89n07eLw4+1knj0vllJPgFOLMB4w +CgYIKwYBBQUHAwMMEENBIERpc2lnIFJvb3QgUjE= +-----END TRUSTED CERTIFICATE----- + +# CA Disig Root R2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcLMDIw +HgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwQQ0EgRGlzaWcgUm9vdCBS +Mg== +-----END TRUSTED CERTIFICATE----- + +# CA WoSign ECC Root +-----BEGIN TRUSTED CERTIFICATE----- +MIICCTCCAY+gAwIBAgIQaEpYcIBr8I8C+vbe6LCQkDAKBggqhkjOPQQDAzBGMQsw +CQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMT +EkNBIFdvU2lnbiBFQ0MgUm9vdDAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4 +NThaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEb +MBkGA1UEAxMSQ0EgV29TaWduIEVDQyBSb290MHYwEAYHKoZIzj0CAQYFK4EEACID +YgAE4f2OuEMkq5Z7hcK6C62N4DrjJLnSsb6IOsq/Srj57ywvr1FQPEd1bPiUt5v8 +KB7FVMxjnRZLU8HnIKvNrCXSf4/CwVqCXjCLelTOA7WRf6qU0NGKSMyCBSah1VES +1ns2o0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUqv3VWqP2h4syhf3RMluARZPzA7gwCgYIKoZIzj0EAwMDaAAwZQIxAOSkhLCB +1T2wdKyUpOgOPQB0TKGXa/kNUTyh2Tv0Daupn75OcsqF1NnstTJFGG+rrQIwfcf3 +aWMvoeGY7xMQ0Xk/0f7qO3/eVvSQsRUR2LIiFdAvwyYua/GRspBl9JrmkO5KMCAw +CgYIKwYBBQUHAwMMEkNBIFdvU2lnbiBFQ0MgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# CA 沃通根证书 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFWDCCA0CgAwIBAgIQUHBrzdgT/BtOOzNy0hFIjTANBgkqhkiG9w0BAQsFADBG +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNV +BAMMEkNBIOayg+mAmuagueivgeS5pjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgw +MTAwMDFaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRl +ZDEbMBkGA1UEAwwSQ0Eg5rKD6YCa5qC56K+B5LmmMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA0EkhHiX8h8EqwqzbdoYGTufQdDTc7WU1/FDWiD+k8H/r +D195L4mx/bxjWDeTmzj4t1up+thxx7S8gJeNbEvxUNUqKaqoGXqW5pWOdO2XCld1 +9AXbbQs5uQF/qvbW2mzmBeCkTVL829B0txGMe41P/4eDrv8FAxNXUDf+jJZSEExf +v5RxadmWPgxDT74wwJ85dE8GRV2j1lY5aAfMh09Qd5Nx2UQIsYo06Yms25tO4dnk +UkWMLhQfkWsZHWgpLFbE4h4TV2TwYeO5Ed+w4VegG63XX9Gv2ystP9Bojg/qnw+L +NVgbExz03jWhCl3W6t8Sb8D7aQdGctyB9gQjF+BNdeFyb7Ao65vh4YOhn0pdr8yb ++gIgthhid5E7o9Vlrdx8kHccREGkSovrlXLp9glk3Kgtn3R46MGiCWOc76DbT52V +qyBPt7D3h1ymoOQ3OMdc4zUPLK2jgKLsLl3Az+2LBcLmc272idX10kaO6m1jGx6K +yX2m+Jzr5dVjhU1zZmkR/sgO9MHHZklTfuQZa/HpelmjbX7FF+Ynxu8b22/8DU0G +AbQOXDBGVWCvOGU6yke6rCzMRh+yRpY/8+0mBe53oWprfi1tWFxK1I5nuPHa1UaK +J/kR8slC/k7e3x9cxKSGhxYzoacXGKUN5AXlK8IrC6KVkLn9YDxOiT7nnO4fuwEC +AwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFOBNv9ybQV0T6GTwp+kVpOGBwboxMA0GCSqGSIb3DQEBCwUAA4ICAQBqinA4 +WbbaixjIvirTthnVZil6Xc1bL3McJk6jfW+rtylNpumlEYOnOXOvEESS5iVdT2H6 +yAa+Tkvv/vMx/sZ8cApBWNromUuWyXi8mHwCKe0JgOYKOoICKuLJL8hWGSbueBwj +/feTZU7n85iYr83d2Z5AiDEoOqsuC7CsDCT6eiaY8xJhEPRdF/d+4niXVOKM6Cm6 +jBAyvd0zaziGfjk9DgNyp115j0WKWa5bIW4xRtVZjc8VX90xJc/bYNaBRHIpAlf2 +ltTW/+op2znFuCyKGo3Oy+dCMYYFaA6eFN0AkLppRQjbbpCBhqcqBT/mhDn4t/lX +X0ykeVoQDF7Va/81XwVRHmyjdanPUIPTfPRm94KNPQx96N97qA4bLJyuQHCH2u2n +FoJavjVsIE4iYdm8UXrNemHcSxH5/mc0zy4EZmFcV5cjjPOGG0jfKq+nwf/Yjj4D +u9gqsPoUJbJRa4ZDhS4HIxaAjUz7tGM7zMN07RujHv41D198HRaG9Q7DlfEvr10l +O1Hm13ZBONFLAzkopR6RctR9q5czxNM+4Gm2KHmgCY0c0f9BckgG/Jou5yD5m6Le +ie2uPAmvylezkolwQOQvT8Jwg0DXJCxr5wkf09XHwQj02w47HAcLQxGEIYbpgNR1 +2KvxAmLBsX5VYc8T1yaw15zLKYs4SgsOkI26oTAgMAoGCCsGAQUFBwMDDBJDQSDm +soPpgJrmoLnor4HkuaY= +-----END TRUSTED CERTIFICATE----- + +# CCA India 2011 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDIzCCAgugAwIBAgICJ44wDQYJKoZIhvcNAQELBQAwOjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEXMBUGA1UEAxMOQ0NBIEluZGlhIDIwMTEwHhcN +MTEwMzExMDY0ODUyWhcNMTYwMzExMDY0ODUyWjA6MQswCQYDVQQGEwJJTjESMBAG +A1UEChMJSW5kaWEgUEtJMRcwFQYDVQQDEw5DQ0EgSW5kaWEgMjAxMTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBAIcKHg65oKggmBq4ehX2R/G/0sYn5BJq +lgRndc2MxuP03crVxBw17k3p5CLUlzjXrGNpSMB8eWK/xyJJW0bB8RgUThgdLKVa +kriFFa8XVhOOnxYOIpaBhHkjQuxP3q/2v4lPAF7m1wjSlZSaEywEEYPvkY8IVax6 +VkSbxfTUF+vkd02U4UFYEemiqgmGLSYhIPXAzMMVzEwJu93c9VIDeWCPPHk6JTQj +h0h18kFwTRowCIZ1zlgZqNcVfiPy50m+//5XUnhC8yZ33Xr3YuXLXZYzlJO7xBoW +rwhX65zl9yN0jekdC7GKlHOZEZHFaKDxig2BrbRRaG5JhgAGUk4pQ+cCAwEAAaMz +MDEwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQITQeoY/LbHN8wCwYDVR0PBAQD +AgEGMA0GCSqGSIb3DQEBCwUAA4IBAQBuFNog8khrZP8qdM1WtcU5D35hHzVZGx0o +bSN0nXi/q62JALlwhfXoFD7k7J+WZFzSsSIgowic6AxLaCiOVQW/PuBO2tic0G4g +7P56O8I2R5fYKwizrsLR5gg/Sug6P1b14OU/8mm2eRLg8Dm3GOzS6YQOGDgWikk7 +b1fVOTu/E/DAp83yPR5skad3Y7yr2VY4D0q5GcArjPuXH8an7IbO043j0ft10fH3 +pmPEz+ixpJJFaPLojLGtfi0g+7ilVO3KDY8yHWimMW6wyJ7V+r8Gm28pfXoDSb8r +e1mTFMXqy/FMKYIOKe6KVHw8zVWCJXIOcU4leE3TTllAys7zmdGiMBwwCgYIKwYB +BQUHAwMMDkNDQSBJbmRpYSAyMDEx +-----END TRUSTED CERTIFICATE----- + +# CCA India 2015 SPL +-----BEGIN TRUSTED CERTIFICATE----- +MIIDKzCCAhOgAwIBAgICJ7UwDQYJKoZIhvcNAQELBQAwPjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEbMBkGA1UEAxMSQ0NBIEluZGlhIDIwMTUgU1BM +MB4XDTE1MDEyOTExMzY0M1oXDTI1MDEyOTExMzY0M1owPjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEbMBkGA1UEAxMSQ0NBIEluZGlhIDIwMTUgU1BM +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl9c2iT03QQ6RP2sgX/w6 +fjtaXS/DDIdTPBiiyGFzDQgOVh7SbmClV2Xc/s9Qhg9aTqtiiwTKVu/h0Z6udK2q ++j9BWNFVcHA+RckbgHP8CIjki3KoCrUpV7CtCpFBGpxfUH2sFxolWyHwlSvn3zes +NPMHsPEdwRPvey46xalhkLJ4X1RQPLNaVWO2yxCjb/sN9Lbv5gjeohC/dpd/6tmW +0dTDcwJxtKmwrKwfFyClR0bWRAI4mb7LFHj+5l/Ef91v6apHFJAR2B2AwBXUjKCZ +4xkOCg/MGgic1FMHAOAfSb+CgkzPm9hu09QRABJsD31gZ0qMUNvyL+C5eYeDw1zC +OQIDAQABozMwMTAPBgNVHRMBAf8EBTADAQH/MBEGA1UdDgQKBAhMEXCqj90fBzAL +BgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAC28jBXKNO1MKCK74VMlSzqX +qe0moqSrTfsKEm7nNeZnDhiBYjalzMLfGuVoAYFOs5nURxUSnXbpoaYTHbD/fbtX +4+9Zm8g7UGnGYzqsoMHlkOhkKVxIQWk3rDu73eNVxteSDZWDsChXwqOplqfK3kwe +mv8+pS4nXttmZyeF76uKXHN8iM1HZvCdg8yEj+Ip9B9Bb7f1IQ31lFZR4/z/E1i3 +nwPuKZ/SAbBinpS9GYZaQ/pqiYGw6lwYh8qAlfvtAb8RGt+VFK4u4q/NkZC6syfD +bxDY2Q60pXRsgbdfGcz+J06zRZhYGJxXxJJyEs+ngjnV4RCXCoYwRYVjqGtNmvww +IDAKBggrBgEFBQcDAwwSQ0NBIEluZGlhIDIwMTUgU1BM +-----END TRUSTED CERTIFICATE----- + +# CFCA EV ROOT +-----BEGIN TRUSTED CERTIFICATE----- +MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD +TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx +MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j +aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP +T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 +sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL +TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 +/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp +7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz +EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt +hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP +a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot +aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg +TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV +PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv +cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL +tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB +ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT +ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL +jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS +ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy +P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 +xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d +Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN +5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe +/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z +AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ +5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63suMCQwFAYIKwYBBQUHAwEG +CCsGAQUFBwMDDAxDRkNBIEVWIFJPT1Q= +-----END TRUSTED CERTIFICATE----- + +# CFCA GT CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDHzCCAgegAwIBAgIEGZk8PzANBgkqhkiG9w0BAQUFADAiMQswCQYDVQQGEwJD +TjETMBEGA1UEChMKQ0ZDQSBHVCBDQTAeFw0xMTA2MTMwODE1MDlaFw0yNjA2MDkw +ODE1MDlaMCIxCzAJBgNVBAYTAkNOMRMwEQYDVQQKEwpDRkNBIEdUIENBMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv3PGWiuMePZYt/zSF5ClK3TsgSyT +zVLMbuQqyyShMeStMG7jmCIx1yGbn9UPNy9auziit3kmZ9YNxRcqnLlUBOENdYZu +2MzFgGcbyIwtACaGPHp5Prapwk4gsDeXxoV2EoIK51S7i/49ruPsa1hD9qU361ii +vZDE5fvKa8owbLd7ifYx0oz/T8KWJUOpcTUlCxjhrMijJLZxk4zxXfycEAV7/8Bb +4LGXrR/Y/kX1wB+dW0c5HAb622aF2yQj6nvSOSD46yqyGlHzlFooAk6nXEduz/zZ +6OZhWhYnxxUNmNno0wM1kCnfsi+NEHcjyLh60xFhavP/gZKl7EJLaE6A1wIDAQAB +o10wWzAfBgNVHSMEGDAWgBSMdlDOJdN5Kzz0bZ2a4Z4FT+g9JTAMBgNVHRMEBTAD +AQH/MAsGA1UdDwQEAwIBxjAdBgNVHQ4EFgQUjHZQziXTeSs89G2dmuGeBU/oPSUw +DQYJKoZIhvcNAQEFBQADggEBAL67lljU3YmJDyzN+mNFdg05gJqN+qhFYT0hVejO +aMcZ6cKxB8KLOy/PYYWQp1IXMjqvCgUVyMbO3Y6UJgb40GDus27UDbpa3augfFBy +ptWQk1bXWTnb6H+zlXhTgVJSX/SSgQLB+yK50QNXp37L+8BGvBN0TCgrdpJpH8FQ +kRHFTN4LlIwXg4yvN4e06mtvolo1QWGFL5wXwPu5DqJhBkd2vJAJmHQN0ggvveQN +cvGmX8N8wH3qvNOrIJHLXAWMnag1+jZWuwnzhF3W8eIsntl+8YKg4bcvfu35e6AA +uLLeHXnhgfNSWZoUXefCEfOawzp4I75OZt6kOWnymDosCgAwGDAKBggrBgEFBQcD +AwwKQ0ZDQSBHVCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# CHAMBERS OF COMMERCE ROOT - 2016 +-----BEGIN TRUSTED CERTIFICATE----- +MIIG4DCCBMigAwIBAgIINJotoYIGsrMwDQYJKoZIhvcNAQELBQAwggEMMQswCQYD +VQQGEwJFUzEPMA0GA1UECAwGTUFEUklEMQ8wDQYDVQQHDAZNQURSSUQxOjA4BgNV +BAsMMXNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2Fk +ZHJlc3MxKTAnBgNVBAsMIENIQU1CRVJTIE9GIENPTU1FUkNFIFJPT1QgLSAyMDE2 +MRIwEAYDVQQFEwlBODI3NDMyODcxGDAWBgNVBGEMD1ZBVEVTLUE4Mjc0MzI4NzEb +MBkGA1UECgwSQUMgQ0FNRVJGSVJNQSBTLkEuMSkwJwYDVQQDDCBDSEFNQkVSUyBP +RiBDT01NRVJDRSBST09UIC0gMjAxNjAeFw0xNjA0MTQwNzM1NDhaFw00MDA0MDgw +NzM1NDhaMIIBDDELMAkGA1UEBhMCRVMxDzANBgNVBAgMBk1BRFJJRDEPMA0GA1UE +BwwGTUFEUklEMTowOAYDVQQLDDFzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5j +YW1lcmZpcm1hLmNvbS9hZGRyZXNzMSkwJwYDVQQLDCBDSEFNQkVSUyBPRiBDT01N +RVJDRSBST09UIC0gMjAxNjESMBAGA1UEBRMJQTgyNzQzMjg3MRgwFgYDVQRhDA9W +QVRFUy1BODI3NDMyODcxGzAZBgNVBAoMEkFDIENBTUVSRklSTUEgUy5BLjEpMCcG +A1UEAwwgQ0hBTUJFUlMgT0YgQ09NTUVSQ0UgUk9PVCAtIDIwMTYwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDqxqSh1K2Zlsmf9bxQAPQsz/J46PIsAifW +g4wEq9MOe1cgydSvZfSH3TAI185Bo3YK24pG5Kb97QjOcD/6EGB5TGuBVIBV5Od6 +IbZ1mtxe9g6Z/PjC30GOL6vHW20cUFnA7eisgkL+ua8vDEFRnL0AbmRRsjvlNquV +kRL7McdzrBzYZXY7zhtMTrAfIAb7ULT7m6F5jhaV45/rGEuEqzmTzTeD0Ol8CyeP +7UII6YZGMqyaJmlwYS0YvT9Q8J72aFBOaZVwwe2TqZdOKaK63cKfbkkIK6P6I/Ep +XrB9MVmb7YzNpm74+PfYGOjaVulI8kB0fp7NIK8UJFnudzWFv0qZSql13bMm4wbO +fW9LZKN2NBk+FG+FVDjiiy1AtWRmH1czHHDNw7QoWhQjXPy4vbP+OxJf9rmMHciU +Clbbcn7vJwcNALS/fZk/TUWzm/cdGdBPBPrHc5SIfYsUKpng6ZmSCcbWAWu38NtD +V2Ibx0RS4pdjus/qzmDmCuUYaC0zgHWgMAdo9tX3Eyw6sJ7oWFVujFZETUMXQQLM +d9xfRQVZz81g07/S9uL01dyHcTMHGvVvtH89l/tfZPRODgBECenr7D5xGQQXOUhg +uEv/XshlmSumMvJbhqid6CN0EHjvyyedMbpgi04GUOJQHQdgwkGMFbRbNxwK5QkZ +cgSKPOMB2wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSeLmVP +Plf1q32WxovfszVtSuieizAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQAD +ggIBAAVpKoWXJlC6QjkckyzST1vRXUQm2m9pK7V7ntD0Si5Ix+x/n8pZerlE9z69 +91BrUZ90/5AaQNCTeZIPiiNei6+BC9CLrWbgKtyaKb012GxAFElCPYkvupsrOLwa +owu3iNetxhQM7nxJrK7s8j0YT4xtFF0Oqrffd6s7j2JOiwxlxhmOzcAMoXeqtN16 +pxMF5jkYx5VkfgO2i5DB5V8AI5jmc9oR0hD/HlMiJ8fTAckvxTsybvDDOMoSZ7y6 +Iym7xJVJWgbd1FqQ1BNt59XCfOJYBMDsxL2iPH7GI4F1fKtwXzSElfez1UeWT3HK +eDIIILRCpEJr1SWcsifrwQ5HRAnhKw/QIzZuHLm6TqzM8AyUzkEPa90P1cjgF4ve +Ol1Svul1JR26BQfaVhk8jdHX8VE22ZLvonhRBVi9UswKXm+v2tDlDNtswSPvOTF3 +FwcAjPa6D3D5vL7h5H3hzER6pCHsRz+o1hWl7AGpyHDomGcdvVlUfqFXFTUHxXLJ +Prcpho2f2jJ5MtzbqOUJ/+9WKv6TsY4qE+2toitrLwTezS+SktY+YLV4AZUHCKls +4xza++WbI1YgW+nQXMZKJDu847YiFiqEkv+o/pe/o53bYV7uGSos1+sNdlY4dX5J +AJNXyfwjWvz08d8qnbCMafQQo1WdcDwi/wfWK7aZwJfQ9CqgMC4wCgYIKwYBBQUH +AwMMIENIQU1CRVJTIE9GIENPTU1FUkNFIFJPT1QgLSAyMDE2 +-----END TRUSTED CERTIFICATE----- + +# CISRCA1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFojCCA4qgAwIBAgIGC4LclDN2MA0GCSqGSIb3DQEBCwUAMHAxCzAJBgNVBAYT +AkNBMSswKQYDVQQKEyJDYXJpbGxvbiBJbmZvcm1hdGlvbiBTZWN1cml0eSBJbmMu +MSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRAwDgYDVQQDEwdD +SVNSQ0ExMB4XDTEyMTAxNjE4MjgzM1oXDTMyMTAxNjE4MjgzM1owcDELMAkGA1UE +BhMCQ0ExKzApBgNVBAoTIkNhcmlsbG9uIEluZm9ybWF0aW9uIFNlY3VyaXR5IElu +Yy4xIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxEDAOBgNVBAMT +B0NJU1JDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDEdvFial/N +Kc0ENn9uYX5z9J1m3yJamoNEgWb9ThGwPqzoiLJTOf/jur7U/9OF2L1br2hPM6y4 +FH0SW3qVa8c2/iuP9IhgiTqqWThMwV1VgaXf2B8xetOjTvBRy8Mxh64L3speG6F0 +OPCSd3E8yxN+oMEKmL3YuPhUNJhOZxaaV0smhl8bZnKqwfJogp1YQXxxIuLPATH+ +4uBWqWjgrTOvNTkunG4GTPMjdi9pJugFOWm39Uga99/ZOTcyVREnBIEfnTyLjINS +d8GuLM0rKkrlLfEZabqHXoud4HHIdNLN7m44N2pdGQDSdt2i6247qh31NgZPX15s +whDz3W+12nla/tVGRDRIr4YANHwkhN1FkPkWgqyokdTpRjNvfrpHH+Hvr+VQ1sb5 +p+1sl6orKU5dxfge9nTJqyT4DVPHaBW+/FyrPXIL0nAEtxbjaanxZ7rGAEx7gDQ1 +Ll7tH6Al96WCahB/v49Zb8NGpspCTkIjhQY5NYy18dfBI0JF/S8lcfjzB9MHaL7b +mGwq9qVH97BlYK2ufOYRHSdUCGWw2ILAYWvpfo8i1nEda0EgZdhXmh98DlpU4JSw +bXXvKDI1PFXDbWf4JL37QPNanTbZNUy74mvZsTYP5G8gGsVvesOROa+vzPP2vSCG +utMkITwfNynmn/wav5jfPLogIRKpwjoqkwIDAQABo0IwQDAdBgNVHQ4EFgQU6pUV +2lw5AOKa28S6LWf6ofd1NO0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AcYwDQYJKoZIhvcNAQELBQADggIBADXQ2Lie8gn48J+ybkiy1+qhmyiJOc3+Fmod +6ZyCX1FHOvWe0byuH5/iXErI7O1GQvF8QwcV326X9u2G/J/FCF6CDqMuqAouvI4b +MRIo9nkowSK20ZVpQOhZCSeikWR26tATjXD8ZcNvEZ8qSMqnYvWDFOUaFseRi7QJ +xc574+QdbZei6csmHmu03D6Ddi9eTahoiVT9TtJGqED22Mp4zzYaPVlljJv1Kx9M +gt94eE0mSkdprW8zHwMeIk7ZBlmeRvxQNV/GhRvkG/gAyeDTOqsmQ81H+lr4hQvH +Mtq1DS0wKTp5sxTppQ9wJdGNCVCU7U2SnjA3QNtaeEmPDzkvvS7XqwiUySmK992M +vYJ8MFti6DVGVjhdkfYOb4zulZ/9dJ3t7RCrzouPt61/TWlJ8McRVZuagvei+jPy +RBH6FUtGqZtrl0LWtLcJERR5U6bnfy0nOgo0JETOVYx6gHVzAkvi+kaUfTMUDUJW +uaDmL4VIkZ9EuqEoqbEfiXomClNchbl8hJiMKGCltnqNPaAAPdx/qkjpqC6sX96H +LVykaxbqveiVtc54CfhxNuWQaNIHlrq8AIsOmG1NcFPAw8wbE5xImpk9EsAnjmGS +TGhSb40DHIn104bA/3FJTyBr/dFvkST18UcjTVnf0L1JQv1AOD7i8QVcJegQ5FoC +A+O7fCUqMBUwCgYIKwYBBQUHAwMMB0NJU1JDQTE= +-----END TRUSTED CERTIFICATE----- + +# CNNIC ROOT +-----BEGIN TRUSTED CERTIFICATE----- +MIIDVTCCAj2gAwIBAgIESTMAATANBgkqhkiG9w0BAQUFADAyMQswCQYDVQQGEwJD +TjEOMAwGA1UEChMFQ05OSUMxEzARBgNVBAMTCkNOTklDIFJPT1QwHhcNMDcwNDE2 +MDcwOTE0WhcNMjcwNDE2MDcwOTE0WjAyMQswCQYDVQQGEwJDTjEOMAwGA1UEChMF +Q05OSUMxEzARBgNVBAMTCkNOTklDIFJPT1QwggEiMA0GCSqGSIb3DQEBAQUAA4IB +DwAwggEKAoIBAQDTNfc/c3et6FtzF8LRb+1VvG7q6KR5smzDo+/hn7E7SIX1mlwh +IhAsxYLO2uOabjfhhyzcuQxauohV3/2q2x8x6gHx3zkBwRP9SFIhxFXf2tizVHa6 +dLG3fdfA6PZZxU3Iva0fFNrfWEQlMhkqx35+jq44sDB7R3IJMfAw28Mbdim7aXZO +V/kbZKKTVrdvmW7bCgScEeOAH8tjlBAKqeFkgjH5jCftppkA9nCTGPihNIaj3XrC +GHn2emU1z5DrvTOTn1OrczvmmzQgLx3vqR1jGqCA2wMv+SYahtKNu6m+UjqHZ0gN +v7Sg2Ca+I19zN38m5pIEo3/PIKe38zrKy5nLAgMBAAGjczBxMBEGCWCGSAGG+EIB +AQQEAwIABzAfBgNVHSMEGDAWgBRl8jGtKvf33VKWCscCwQ7vptU7ETAPBgNVHRMB +Af8EBTADAQH/MAsGA1UdDwQEAwIB/jAdBgNVHQ4EFgQUZfIxrSr3991SlgrHAsEO +76bVOxEwDQYJKoZIhvcNAQEFBQADggEBAEs17szkrr/Dbq2flTtLP1se31cpolnK +OOK5Gv+e5m4y3R6u6jW39ZORTtpC4cMXYFDy0VwmuYK36m3knITnA3kXr5g9lNvH +ugDnuL8BV8F3RTIMO/G0HAiw/VGgod2aHRM2mm23xzy54cXZF/qD1T0VoDy7Hgvi +yJA/qIYM/PmLXoXLT1tLYhFHxUV8BS9BsZ4QaRuZluBVeftOhpm4lNqGOGqTo+fL +buXf6iFViZx9fX+Y9QCJ7uOEwFyWtcVG6kbghVW2G8kS1sHNzYDzAgE8yGnLRUhj +2JTQ7IUOO04RZfSCjKY9ri4ilAnIXOo8gV0WKgOXFlUJ24pBgp5mmxEwGDAKBggr +BgEFBQcDAwwKQ05OSUMgUk9PVA== +-----END TRUSTED CERTIFICATE----- + +# COMODO Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZTBAMB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMHkNPTU9ETyBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# COMODO ECC Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdYwRDAeBggrBgEFBQcDBAYIKwYB +BQUHAwEGCCsGAQUFBwMDDCJDT01PRE8gRUNDIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5 +-----END TRUSTED CERTIFICATE----- + +# COMODO RSA Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190MEQwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwi +Q09NT0RPIFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# Certainly Root E1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIB9zCCAX2gAwIBAgIQBiUzsUcDMydc+Y2aub/M+DAKBggqhkjOPQQDAzA9MQsw +CQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0YWlu +bHkgUm9vdCBFMTAeFw0yMTA0MDEwMDAwMDBaFw00NjA0MDEwMDAwMDBaMD0xCzAJ +BgNVBAYTAlVTMRIwEAYDVQQKEwlDZXJ0YWlubHkxGjAYBgNVBAMTEUNlcnRhaW5s +eSBSb290IEUxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE3m/4fxzf7flHh4axpMCK ++IKXgOqPyEpeKn2IaKcBYhSRJHpcnqMXfYqGITQYUBsQ3tA3SybHGWCA6TS9YBk2 +QNYphwk8kXr2vBMj3VlOBF7PyAIcGFPBMdjaIOlEjeR2o0IwQDAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU8ygYy2R17ikq6+2uI1g4 +hevIIgcwCgYIKoZIzj0EAwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozm +ut6Dacpps6kFtZaSF4fC0urQe87YQVt8rgIwRt7qy12a7DLCZRawTDBcMPPaTnOG +BtjOiQRINzf43TNRnXCve1XYAS59BWQOhriRMB8wCgYIKwYBBQUHAwEMEUNlcnRh +aW5seSBSb290IEUx +-----END TRUSTED CERTIFICATE----- + +# Certainly Root R1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIRAI4P+UuQcWhlM1T01EQ5t+AwDQYJKoZIhvcNAQELBQAw +PTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUNlcnRhaW5seTEaMBgGA1UEAxMRQ2Vy +dGFpbmx5IFJvb3QgUjEwHhcNMjEwNDAxMDAwMDAwWhcNNDYwNDAxMDAwMDAwWjA9 +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0 +YWlubHkgUm9vdCBSMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANA2 +1B/q3avk0bbm+yLA3RMNansiExyXPGhjZjKcA7WNpIGD2ngwEc/csiu+kr+O5MQT +vqRoTNoCaBZ0vrLdBORrKt03H2As2/X3oXyVtwxwhi7xOu9S98zTm/mLvg7fMbed +aFySpvXl8wo0tf97ouSHocavFwDvA5HtqRxOcT3Si2yJ9HiG5mpJoM610rCrm/b0 +1C7jcvk2xusVtyWMOvwlDbMicyF0yEqWYZL1LwsYpfSt4u5BvQF5+paMjRcCMLT5 +r3gajLQ2EBAHBXDQ9DGQilHFhiZ5shGIXsXwClTNSaa/ApzSRKft43jvRl5tcdF5 +cBxGX1HpyTfcX35pe0HfNEXgO4T0oYoKNp43zGJS4YkNKPl6I7ENPT2a/Z2B7yyQ +wHtETrtJ4A5KVpK8y7XdeReJkd5hiXSSqOMyhb5OhaRLWcsrxXiOcVTQAjeZjOVJ +6uBUcqQRBi8LjMFbvrWhsFNunLhgkR9Za/kt9JQKl7XsxXYDVBtlUrpMklZRNaBA +2CnbrlJ2Oy0wQJuK0EJWtLeIAaSHO1OWzaMWj/Nmqhexx2DgwUMFDO6bW2BvBlyH +Wyf5QBGenDPBt+U1VwV/J84XIIwc/PH72jEpSe31C4SnT8H2TsIonPru4K8H+zMR +eiFPCyEQtkA6qyI6BJyLm4SGcprSp6XEtHWRqSsjAgMBAAGjQjBAMA4GA1UdDwEB +/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTgqj8ljZ9EXME66C6u +d0yEPmcM9DANBgkqhkiG9w0BAQsFAAOCAgEAuVevuBLaV4OPaAszHQNTVfSVcOQr +PbA56/qJYv331hgELyE03fFo8NWWWt7CgKPBjcZq91l3rhVkz1t5BXdm6ozTaw3d +8VkswTOlMIAVRQdFGjEitpIAq5lNOo93r6kiyi9jyhXWx8bwPWz8HA2YEGGeEaIi +1wrykXprOQ4vMMM2SZ/g6Q8CRFA3lFV96p/2O7qUpUzpvD5RtOjKkjZUbVwlKNrd +rRT90+7iIgXr0PK3aBLXWopBGsaSpVo7Y0VPv+E6dyIvXL9G+VoDhRNCX8reU9di +taY1BMJH/5n9hN9czulegChB8n3nHpDYT3Y+gjwN/KUD+nsa2UUeYNrEjvn8K8l7 +lcUq/6qJ34IxD3L/DCfXCh5WAFAeDJDBlrXYFIW7pw0WwfgHJBu6haEaBQmAupVj +yTrsJZ9/nbqkRxWbRHDxakvWOF5D8xh+UG7pWijmZeZ3Gzr9Hb4DJqPb1OG7fpYn +Kx3upPvaJVQTA945xsMfTZDsjxtK0hzthZU4UHlG1sGQUDGpXJpuHfUzVounmdLy +yCwzk5Iwx06MZTMQZBf9JBeW0Y3COmor6xOLRPIh80oat3df1+2IpHLlOR+Vnb5n +wXARPbv0+Em34yaXOp/SX3z7wJl8OSngex2/DaeP0ik0biQVy96QXr8axGbqwua6 +OV+KmalBWQewLK8wHzAKBggrBgEFBQcDAQwRQ2VydGFpbmx5IFJvb3QgUjE= +-----END TRUSTED CERTIFICATE----- + +# Certification Authority of WoSign +-----BEGIN TRUSTED CERTIFICATE----- +MIIFdjCCA16gAwIBAgIQXmjWEXGUY1BWAGjzPsnFkTANBgkqhkiG9w0BAQUFADBV +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxKjAoBgNV +BAMTIUNlcnRpZmljYXRpb24gQXV0aG9yaXR5IG9mIFdvU2lnbjAeFw0wOTA4MDgw +MTAwMDFaFw0zOTA4MDgwMTAwMDFaMFUxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFX +b1NpZ24gQ0EgTGltaXRlZDEqMCgGA1UEAxMhQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkgb2YgV29TaWduMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvcqN +rLiRFVaXe2tcesLea9mhsMMQI/qnobLMMfo+2aYpbxY94Gv4uEBf2zmoAHqLoE1U +fcIiePyOCbiohdfMlZdLdNiefvAA5A6JrkkoRBoQmTIPJYhTpA2zDxIIFgsDcScc +f+Hb0v1naMQFXQoOXXDX2JegvFNBmpGN9J42Znp+VsGQX+axaCA2pIwkLCxHC1l2 +ZjC1vt7tj/id07sBMOby8w7gLJKA84X5KIq0VC6a7fd2/BVoFutKbOsuEo/Uz/4M +x1wdC34FMr5esAkqQtXJTpCzWQ27en7N1QhatH/YHGkR+ScPewavVIMYe+HdVHpR +aG53/Ma/UkpmRqGyZxq7o093oL5d//xWC0Nyd5DKnvnyOfUNqfTq1+ezEC8wQjch +zDBwyYaYD8xYTYO7feUapTeNtqwylwA6Y3EkHp43xP901DfA4v6IRmAR3Qg/UDar +uHqklWJqbrDKaiFaafPz+x1wOZXzp26mgYmhiMU7ccqjUu6Du/2gd/Tkb+dC221K +mYo0SLwX3OSACCK28jHAPwQ+658geda4BmRkAjHXqc1S+4RFaQkAKtxVi8QGRkvA +Sh0JWzko/amrzgD5LkhLJuYwTKVYyrREgk/nkR4zw7CT/xH8gdLKH3Ep3XZPkiWv +HYG3Dy+MwwbMLyejSuQOmbp8HkUff6oZRZb9/D0CAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOFmzw7R8bNLtwYgFP6H +EtX2/vs+MA0GCSqGSIb3DQEBBQUAA4ICAQCoy3JAsnbBfnv8rWTjMnvMPLZdRtP1 +LOJwXcgu2AZ9mNELIaCJWSQBnfmvCX0KI4I01fx8cpm5o9dU9OpScA7F9dY74ToJ +MuYhOZO9sxXqT2r09Ys/L3yNWC7F4TmgPsc9SnOeQHrAK2GpZ8nzJLmzbVUsWh2e +JXLOC62qx1ViC777Y7NhRCOjy+EaDveaBk3e1CNOIZZbOVtXHS9dCF4Jef98l7VN +g64N1uajeeAz0JmWAjCnPv/So0M/BVoG6kQC2nz4SNAzqfkHx5Xh9T71XXG68pWp +dIhhWeO/yloTunK0jF02h+mmxTwTv97QRCbut+wucPrXnbes5cVAWubXbHssw1ab +R80LzvobtCHXt2a49CUwi1wNuepnsvRtrtWhnk/Yn+knArAdBtaP4/tIEp9/EaEQ +PkxROpaw0RPxx9gmrjrKkcRpnd8BKWRRb2jaFOwIQZeQjdCygPLPwj2/kWjFgGce +xGATVdVhmVd8upUPYUk6ynW8yQqTP2cOEvIo4jEbwFcW3wh8GcF+Dx+FHgo2fFt+ +J7x6v+Db9NpSvd4MVHAxkUOVyLzwPt0JfjBkUO1/AaQzZ01oT74V77D2AhGiGxMl +OtzCWfHjXEa7ZywCRuoeSKbmW9m1vFGikpbbqsY3Iqb+zCB0oy2pLmvLwIIRIbWT +ee5Ehr7XHuQe+zAvMAoGCCsGAQUFBwMDDCFDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSBvZiBXb1NpZ24= +-----END TRUSTED CERTIFICATE----- + +# Certification Authority of WoSign G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDfDCCAmSgAwIBAgIQayXaioidfLwPBbOxemFFRDANBgkqhkiG9w0BAQsFADBY +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxLTArBgNV +BAMTJENlcnRpZmljYXRpb24gQXV0aG9yaXR5IG9mIFdvU2lnbiBHMjAeFw0xNDEx +MDgwMDU4NThaFw00NDExMDgwMDU4NThaMFgxCzAJBgNVBAYTAkNOMRowGAYDVQQK +ExFXb1NpZ24gQ0EgTGltaXRlZDEtMCsGA1UEAxMkQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgb2YgV29TaWduIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAvsXEoCKASU+/2YcRxlPhuw+9YH+v9oIOH9ywjj2X4FA8jzrvZjtFB5sg+OPX +JYY1kBaiXW8wGQiHC38Gsp1ij96vkqVg1CuAmlI/9ZqD6TRay9nVYlzmDuDfBpgO +gHzKtB0TiGsOqCR3A9DuW/PKaZE1OVbFbeP3PU9ekzgkyhjpJMuSA93MHD0JcOQg +5PGurLtzaaNjOg9FD6FKmsLRY6zLEPg95k4ot+vElbGs/V6r+kHLXZ1L3PR8du9n +fwB6jdKgGlxNIuG12t12s9R23164i5jIFFTMaxeSt+BKv0mUYQs4kI9dJGwlezt5 +2eJ+na2fmKEG/HgUYFf47oB3sQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU+mCp62XF3RYUCE4MD42b4Pdkr2cwDQYJ +KoZIhvcNAQELBQADggEBAFfDejaCnI2Y4qtAqkePx6db7XznPWZaOzG73/MWM5H8 +fHulwqZm46qwtyeYP0nXYGdnPzZPSsvxFPpahygc7Y9BMsaV+X3avXtbwrAh449G +3CE4Q3RM+zD4F3LBMvzIkRfEzFg3TgvMWvchNSiDbGAtROtSjFA9tWwS1/oJu2yy +SrHFieT801LYYRf+epSEj3m2M1m6D8QL4nCgS3gu+sif/a+RZQp4OBXllxcU3fng +LDT4ONCEIgDAFFEYKwLcMFrw6AF8NTojrwjkr6qOKEJJLvD1mTS+7Q9LGOHSJDy7 +XUe3IfKN0QqZjuNuPq1w4I+5ysxugTH2e5x6eeRncRgwMjAKBggrBgEFBQcDAwwk +Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgb2YgV29TaWduIEcy +-----END TRUSTED CERTIFICATE----- + +# Certigna +-----BEGIN TRUSTED CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLjAqMB4GCCsGAQUFBwMEBggrBgEF +BQcDAQYIKwYBBQUHAwMMCENlcnRpZ25h +-----END TRUSTED CERTIFICATE----- + +# Certigna Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0w +MjAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBBDZXJ0aWduYSBSb290 +IENB +-----END TRUSTED CERTIFICATE----- + +# Certinomis - Autorité Racine +-----BEGIN TRUSTED CERTIFICATE----- +MIIFnDCCA4SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJGUjET +MBEGA1UEChMKQ2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxJjAk +BgNVBAMMHUNlcnRpbm9taXMgLSBBdXRvcml0w6kgUmFjaW5lMB4XDTA4MDkxNzA4 +Mjg1OVoXDTI4MDkxNzA4Mjg1OVowYzELMAkGA1UEBhMCRlIxEzARBgNVBAoTCkNl +cnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMSYwJAYDVQQDDB1DZXJ0 +aW5vbWlzIC0gQXV0b3JpdMOpIFJhY2luZTCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBAJ2Fn4bT46/HsmtuM+Cet0I0VZ35gb5j2CN2DpdUzZlMGvE5x4jY +F1AMnmHawE5V3udauHpOd4cN5bjr+p5eex7Ezyh0x5P1FMYiKAT5kcOrJ3NqDi5N +8y4oH3DfVS9O7cdxbwlyLu3VMpfQ8Vh30WC8Tl7bmoT2R2FFK/ZQpn9qcSdIhDWe +rP5pqZ56XjUl+rSnSTV3lqc2W+HN3yNw2F1MpQiD8aYkOBOo7C+ooWfHpi2GR+6K +/OybDnT0K0kCe5B1jPyZOQE51kqJ5Z52qz6WKDgmi92NjMD2AR5vpTESOH2VwnHu +7XSu5DaiQ3XV8QCb4uTXzEIDS3h65X27uK4uIJPT5GHfceF2Z5c/tt9qc1pkIuVC +28+BA5PY9OMQ4HL2AHCs8MF6DwV/zzRpRbWT5BnbUhYjBYkOjUjkJW+zeL9i9Qf6 +lSTClrLooyPCXQP8w9PlfMl1I9f09bze5N/NgL+RiH2nE7Q5uiy6vdFrzPOlKO1E +nn1So2+WLhl+HPNbxxaOu2B9d2ZHVIIAEWBsMsGoOBvrbpgT1u449fCfDu/+MYHB +0iSVL1N6aaLwD4ZFjliCK0wi1F6g530mJ0jfJUaNSih8hp75mxpZuWW/Bd22Ql09 +5gBIgl4g9xGC3srYn+Y3RyYe63j3YcNBZFgCQfna4NH4+ej9Uji29YnfAgMBAAGj +WzBZMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQN +jLZh2kS40RR9w759XkjwzspqsDAXBgNVHSAEEDAOMAwGCiqBegFWAgIAAQEwDQYJ +KoZIhvcNAQEFBQADggIBACQ+YAZ+He86PtvqrxyaLAEL9MW12Ukx9F1BjYkMTv9s +ov3/4gbIOZ/xWqndIlgVqIrTseYyCYIDbNc/CMf4uboAbbnW/FIyXaR/pDGUu7ZM +OH8oMDX/nyNTt7buFHAAQCvaR6s0fl6nVjBhK4tDrP22iCj1a7Y+YEq6QpA0Z43q +619FVDsXrIvkxmUP7tCMXWY5zjKn2BCXwH40nJ+U8/aGH88bc62UeYdocMMzpXDn +2NU4lG9jeeu/Cg4I58UvD0KgKxRA/yHgBcUn4YQRE7rWhh1BCxMjidPJC+iKunqj +o3M3NYB9Ergzd0A4wPpeMNLytqOx1qKVl4GbUu1pTP+A5FPbVFsDbVRfsbjvJL1v +nxHDx2TCDyhihWZeGnuyt++uNckZM6i4J9szVb9o4XVIRFb7zdNIu0eJOqxp9YDG +5ERQL1TEqkPFMTFYvZbF6nVsmnWxTfj3l/+WFvKXTej28xH5On2KOG4Ey+HTRRWq +pdEdnV1j6CTmNhTih60bWfVEm/vXd3wfAXBioSAaosUaKPQhA+4u2cGA6rnZgtZb +dsLLO7XSAPCjDuGtbkD326C00EauFddEwk01+dIL8hf2rGbVJLJP0RyZwG71fet0 +BLj5TXcJ17TPBzAJ8bgAVtkXFhYKK4bfjwEZGuW7gmP/vgt2Fl43N+bYdJeimUV5 +MCswCgYIKwYBBQUHAwMMHUNlcnRpbm9taXMgLSBBdXRvcml0w6kgUmFjaW5l +-----END TRUSTED CERTIFICATE----- + +# Certipost E-Trust Primary Normalised CA +-----BEGIN TRUSTED CERTIFICATE----- +MIID4DCCAsigAwIBAgILBAAAAAABBVJkx2EwDQYJKoZIhvcNAQEFBQAwXTELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xMDAuBgNVBAMT +J0NlcnRpcG9zdCBFLVRydXN0IFByaW1hcnkgTm9ybWFsaXNlZCBDQTAeFw0wNTA3 +MjYxMDAwMDBaFw0yMDA3MjYxMDAwMDBaMF0xCzAJBgNVBAYTAkJFMRwwGgYDVQQK +ExNDZXJ0aXBvc3Qgcy5hLi9uLnYuMTAwLgYDVQQDEydDZXJ0aXBvc3QgRS1UcnVz +dCBQcmltYXJ5IE5vcm1hbGlzZWQgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQDVs6pShHoXkyIPuAQYysnygiqsFQunUHG2TCVr9/8Bqldad05eExQN +VfIe8YXNhdeCHAzaCSu9/bye/m2JTaICJOZR6jd/MUZae5p2sy6gXV/k+JkKB77u +kiYSyXvnXWzQg0cOwIyn0XlXwAsZnJueQ8VOkSXOiCttedl5itZmTiLDGkVO78iw +YiZOJlRQnwxvs2vMfJ9/3g8NtY/Da9Thwvu7VlCqjD2PAIs8/EgXatJa83VtZYG9 +Rl2fomJTrs7zqeSRK1omw3lm0aZTZjUcBnGx7pkOxPtYEqwiRi3iIpLb4Ty/u/6G +55M0c894adPL3vkMsmjayYoKYFTE81ZjAgMBAAGjgaAwgZ0wDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wSAYDVR0gBEEwPzA9BgkDkA4HAQABAgAwMDAu +BggrBgEFBQcCARYiaHR0cDovL3d3dy5lLXRydXN0LmJlL0NQUy9RTmNlcnRzIDAd +BgNVHQ4EFgQUEfILltIzOIFXWBP9QKQRb06Z+mcwEQYJYIZIAYb4QgEBBAQDAgAH +MA0GCSqGSIb3DQEBBQUAA4IBAQA1a0/enfMDth3IvI3nXmqeqentoiuX6q/R4UbT +Akl9xFKF67r20785Yhidk0m9eAO/014V3e8nHOG7RQEigQBNOuCFyloyA8wgj6/v +wduo+vPc17KxDwOBCSngcXyL+n/LNm4b6BTO8EsmoTIpT8y09YdIDBP8x52vq9ST +9SpNf0iCWD4X/8OAKqs/V1W4OSxmEGQmbYxr1t2ggxpaVhGWRr2ucCjWOFdbkdU/ +Temss8MkSpZlXDTQHtS/CKWXXfdG23bwzT51YwArr62uht5fpplUDYUjpfy67RtS ++kkYd4VbqnKbJwg1RTcn25fJ+os9yNCd3lrvXaMWtph5ynzLMDUwCgYIKwYBBQUH +AwMMJ0NlcnRpcG9zdCBFLVRydXN0IFByaW1hcnkgTm9ybWFsaXNlZCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Certipost E-Trust Primary Qualified CA +-----BEGIN TRUSTED CERTIFICATE----- +MIID3jCCAsagAwIBAgILBAAAAAABBVJkxCUwDQYJKoZIhvcNAQEFBQAwXDELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xLzAtBgNVBAMT +JkNlcnRpcG9zdCBFLVRydXN0IFByaW1hcnkgUXVhbGlmaWVkIENBMB4XDTA1MDcy +NjEwMDAwMFoXDTIwMDcyNjEwMDAwMFowXDELMAkGA1UEBhMCQkUxHDAaBgNVBAoT +E0NlcnRpcG9zdCBzLmEuL24udi4xLzAtBgNVBAMTJkNlcnRpcG9zdCBFLVRydXN0 +IFByaW1hcnkgUXVhbGlmaWVkIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB +CgKCAQEAriDSeNuaoHKcBFIlLG1S2NcniTOg4bLV+zB1ay1/HGeODucfEt8XeRi7 +tBtv+D11G55nN/Dx+g917YadAwShKHAtPLJroHNR4zWpdKUIPpSFJzYqqnJk/Hfu +dpQccuu/Msd3A2olggkFr19gPH+sG7yS6Dx0Wc7xfFQtOK6W8KxvoTMMIVoBuiMg +W6CGAtVT3EkfqDKzrztGO7bvnzmzOAvneor2KPmnb1ApyHlYi0nSpdiFflbxaRV4 +RBE116VUPqtmJdLb4xjxLivicSMJN2RDQnQylnfel6LploacJUQJ1AGdUX4ztwlE +5YCXDWRbdxiXpUupnhCdh/pWp88KfQIDAQABo4GgMIGdMA4GA1UdDwEB/wQEAwIB +BjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTwePkHdxC73B6hrnn7MBDbxjT4 +FzBIBgNVHSAEQTA/MD0GCQOQDgcBAAECADAwMC4GCCsGAQUFBwIBFiJodHRwOi8v +d3d3LmUtdHJ1c3QuYmUvQ1BTL1FOY2VydHMgMBEGCWCGSAGG+EIBAQQEAwIABzAN +BgkqhkiG9w0BAQUFAAOCAQEAbOHYX3RY6XBJ1soNLFjaymS2UU/DBmQB6YpzHZ7P +Rni/O4WG4j1KGJQqgXdvgvhv9O4i/J0YIXJguxiAgpX7+feVJIFmwbXDtdK2dos7 +gVy4oQ4rARSLgAlA7vhgTBnkF80nAbNjEgWkCMm0v55QTrXeD5IzZnXQPecjfOol +cXz+Pi42eaHlKVAjNQWVeLufeWTcV0gnLOJcM83Cu35od6cvo0kXcuEAhGt9eq85 +CyzV2FdkMmyECmp2OtOszZ2x5zfc7AwvxVdg34j1Q7EBZCa0J4IQsqNQ75fmf7+R +h7PbkKkq4no0bHNJ9OiNLmuK3aGKf2PQv1ger8w/klAt0TA0MAoGCCsGAQUFBwMD +DCZDZXJ0aXBvc3QgRS1UcnVzdCBQcmltYXJ5IFF1YWxpZmllZCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Certipost E-Trust TOP Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDzDCCArSgAwIBAgILBAAAAAABBVJkwZUwDQYJKoZIhvcNAQEFBQAwUzELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xJjAkBgNVBAMT +HUNlcnRpcG9zdCBFLVRydXN0IFRPUCBSb290IENBMB4XDTA1MDcyNjEwMDAwMFoX +DTI1MDcyNjEwMDAwMFowUzELMAkGA1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9z +dCBzLmEuL24udi4xJjAkBgNVBAMTHUNlcnRpcG9zdCBFLVRydXN0IFRPUCBSb290 +IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApdRLQNb78TUYO6Kw +Q+TJVaHAB7sIvjoZtSPDHp2zCEr0Q0vpwRlgkN+E11jGOt0KLJUsvZd//qJ12gbj +q5ts0bjPRIbBUmC33D47sPLpxFE8SrmDuU5hagObHFKAOlC0ILLb07LGVH/LYJvI +JJ6vCcdlDSj22poiwjNu8vMl1KT5lvVvqjxr3EEw5eZvykgfMHgdeX2n0b+uxV5D ++cYvg3abNEqkKFgrqIiFRGor8lZCdpmQM6ru+SHP8j35d4TL3SmExNSKKqQ5XD75 +HCVoTfXnm12xGjReygJz+QjEDG1e3RIq5XvFNnhSnTLBxSilIKjlmA25b8+5gJ7l +vrmb/QIDAQABo4GgMIGdMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/ +MB0GA1UdDgQWBBRL3r4FMS7zNcjYyqdWxZQNtFplxTBIBgNVHSAEQTA/MD0GCQOQ +DgcBAAECADAwMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LmUtdHJ1c3QuYmUvQ1BT +L1FOY2VydHMgMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG9w0BAQUFAAOCAQEA +iWPMos74VGp8WTR4qwG0li0qIW5ALV/QliKZgwUc5STN4vU1BL8AlgfssqQ6aisj +PskPyhMduCSWCSbYPCqBzuGByMlzPvW7DwgekOCwkrnSOpdQ4AaO5IIwPGAgt6Tu +q4kG4fwlu5HU+bdfaGOooGiGa6fskssi+lBbE1gnritDC7YXxjByBDNEJkpEBx9z +oINBKeCSBrzVAer+vK9x6yAfCl0NoClezuRBUVWWwx+0MaWj81Pq/8KchnLPNkxW +WgYyfl6rSqHOp+ufpIwquSSLuLXzBk2myn2Z+/ZV6q5Iee4mWdMfDFMV92JR+YQN +lmxesQjmWQgrJikKwYNAczArMAoGCCsGAQUFBwMDDB1DZXJ0aXBvc3QgRS1UcnVz +dCBUT1AgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Certplus Root CA G1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFazCCA1OgAwIBAgISESBVg+QtPlRWhS2DN7cs3EYRMA0GCSqGSIb3DQEBDQUA +MD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2Vy +dHBsdXMgUm9vdCBDQSBHMTAeFw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBa +MD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2Vy +dHBsdXMgUm9vdCBDQSBHMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ANpQh7bauKk+nWT6VjOaVj0W5QOVsjQcmm1iBdTYj+eJZJ+622SLZOZ5KmHNr49a +iZFluVj8tANfkT8tEBXgfs+8/H9DZ6itXjYj2JizTfNDnjl8KvzsiNWI7nC9hRYt +6kuJPKNxQv4c/dMcLRC4hlTqQ7jbxofaqK6AJc96Jh2qkbBIb6613p7Y1/oA/caP +0FG7Yn2ksYyy/yARujVjBYZHYEMzkPZHogNPlk2dT8Hq6pyi/jQu3rfKG3akt62f +6ajUeD94/vI4CTYd0hYCyOwqaK/1jpTvLRN6HkJKHRUxrgwEV/xhc/MxVoYxgKDE +EW4wduOU8F8ExKyHcomYxZ3MVwia9Az8fXoFOvpHgDm2z4QTd28n6v+WZxcIbekN +1iNQMLAVdBM+5S//Ds3EC0pd8NgAM0lm66EYfFkuPSi5YXHLtaW6uOrc4nBvCGrc +h2c0798wct3zyT8j/zXhviEpIDCB5BmlIOklynMxdCm+4kLV87ImZsdo/Rmz5yCT +mehd4F6H50boJZwKKSTUzViGUkAksnsPmBIgJPaQbEfIDbsYIC7Z/fyL8inqh3SV +4EJQeIQEQWGw9CEjjy3LKCHyamz0GqbFFLQ3ZU+V/YDI+HLlJWvEYLF7bY5KinPO +WftwenMGE9nTdDckQQoRb5fc5+R+ob0V8rqHDz1oihYHAgMBAAGjYzBhMA4GA1Ud +DwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSowcCbkahDFXxd +Bie0KlHYlwuBsTAfBgNVHSMEGDAWgBSowcCbkahDFXxdBie0KlHYlwuBsTANBgkq +hkiG9w0BAQ0FAAOCAgEAnFZvAX7RvUz1isbwJh/k4DgYzDLDKTudQSk0YcbX8ACh +66Ryj5QXvBMsdbRX7gp8CXrc1cqh0DQT+Hern+X+2B50ioUHj3/MeXrKls3N/U/7 +/SMNkPX0XtPGYX2eEeAC7gkE2Qfdpoq3DIMku4NQkv5gdRE+2J2winq14J2by5BS +S7CTKtQ+FjPlnsZlFT5kOwQ/2wyPX1wdaR+v8+khjPPvl/aatxm2hHSco1S1cE5j +2FddUyGbQJJD+tZ3VTNPZNX70Cxqjm0lpu+F6ALEUz65noe8zDUa3qHpimOHZR4R +Kttjd5cUvpoUmRGywO6wT/gUITJDT5+rosuoD6o7BlXGEilXCNQ314cnrUlZp5Gr +RHpejXDbl85IULFzk/bwg2D5zfHhMf1bfHEhYxQUqq/F3pN+aLHsIqKqkHWetUNy +6mSjhEv9DKgma3GX7lZjZuhCVPnHHd/Qj1vfyDBviP4NxDMcU6ij/UgQ8uQKTuEV +V/xuZDDCVRHc6qnNSlSsKWNEz0pAoNZoWRsz+e86i9sgktxChL8Bq4fA1SCC28a5 +g4VCXA9DO2pJNdWY9BW/+mGBDAkgGNLQFwzLSABQ6XaCjGTXOqAHVcweMcDvOrRl +++O/QmueD6i9a5jc2NvLi6Td11n0bt3+qsOR0C5CB8AMTVPNJLFMWx5R9N/pkvow +ITAKBggrBgEFBQcDAwwTQ2VydHBsdXMgUm9vdCBDQSBHMQ== +-----END TRUSTED CERTIFICATE----- + +# Certplus Root CA G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICHDCCAaKgAwIBAgISESDZkc6uo+jF5//pAq/Pc7xVMAoGCCqGSM49BAMDMD4x +CzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBs +dXMgUm9vdCBDQSBHMjAeFw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4x +CzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBs +dXMgUm9vdCBDQSBHMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABM0PW1aC3/BFGtat +93nwHcmsltaeTpwftEIRyoa/bfuFo8XlGVzX7qY/aWfYeOKmycTbLXku54uNAm8x +Ik0G42ByRZ0OQneezs/lf4WbGOT8zC5y0xaTTsqZY1yhBSpsBqNjMGEwDgYDVR0P +AQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNqDYwJ5jtpMxjwj +FNiPwyCrKGBZMB8GA1UdIwQYMBaAFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMAoGCCqG +SM49BAMDA2gAMGUCMHD+sAvZ94OX7PNVHdTcswYO/jOYnYs5kGuUIe22113WTNch +p+e/IQ8rzfcq3IUHnQIxAIYUFuXcsGXCwI4Un78kFmjlvPl5adytRSv3tjFzzAal +U5ORGpOucGpnutee5WEaXzAhMAoGCCsGAQUFBwMDDBNDZXJ0cGx1cyBSb290IENB +IEcy +-----END TRUSTED CERTIFICATE----- + +# Certum EC-384 CA +-----BEGIN TRUSTED CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8kwMjAeBggr +BgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBBDZXJ0dW0gRUMtMzg0IENB +-----END TRUSTED CERTIFICATE----- + +# Certum Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTAeFw0wMjA2MTExMDQ2MzlaFw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6xwS7TT3zNJc4YPk/E +jG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdLkKWo +ePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GI +ULdtlkIJ89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapu +Ob7kky/ZR6By6/qmW6/KUz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUg +AKpoC6EahQGcxEZjgoi2IrHu/qpGWX7PNSzVttpd90gzFFS269lvzs2I1qsb2pY7 +HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEA +uI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+GXYkHAQa +TOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTg +xSvgGrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1q +CjqTE5s7FCMTY5w/0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5x +O/fIR/RpbxXyEV6DHpx8Uq79AtoSqFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs +6GAqm4VKQPNriiTsBhYsczAmMBQGCCsGAQUFBwMEBggrBgEFBQcDAwwOQ2VydHVt +IFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# Certum Trusted Network CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyww +OzAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBlDZXJ0dW0gVHJ1c3Rl +ZCBOZXR3b3JrIENB +-----END TRUSTED CERTIFICATE----- + +# Certum Trusted Network CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSPMD0wHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwbQ2VydHVt +IFRydXN0ZWQgTmV0d29yayBDQSAy +-----END TRUSTED CERTIFICATE----- + +# Certum Trusted Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjbMDgwHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwwWQ2VydHVtIFRydXN0ZWQgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Chambers of Commerce Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIEvTCCA6WgAwIBAgIBADANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJFVTEn +MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL +ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEiMCAGA1UEAxMZQ2hhbWJlcnMg +b2YgQ29tbWVyY2UgUm9vdDAeFw0wMzA5MzAxNjEzNDNaFw0zNzA5MzAxNjEzNDRa +MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBB +ODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIw +IAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290MIIBIDANBgkqhkiG9w0B +AQEFAAOCAQ0AMIIBCAKCAQEAtzZV5aVdGDDg2olUkfzIx1L4L1DZ77F1c2VHfRtb +unXF/KGIJPov7coISjlUxFF6tdpg6jg8gbLL8bvZkSM/SAFwdakFKq0fcfPJVD0d +BmpAPrMMhe5cG3nCYsS4No41XQEMIwRHNaqbYE6gZj3LJgqcQKH0XZi/caulAGgq +7YN6D6IUtdQis4CwPAxaUWktWBiP7Zme8a7ileb2R6jWDA+wWFjbw2Y3npuRVDM3 +0pQcakjJyfKl2qUMI/cjDpwyVV5xnIQFUZot/eZOKjRa3spAN2cMVCFVd9oKDMyX +roDclDZK9D7ONhMeU+SsTjoF7Nuucpw4i9A5O4kKPnf+dQIBA6OCAUQwggFAMBIG +A1UdEwEB/wQIMAYBAf8CAQwwPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NybC5j +aGFtYmVyc2lnbi5vcmcvY2hhbWJlcnNyb290LmNybDAdBgNVHQ4EFgQU45T1sU3p +26EpW1eLTXYGduHRooowDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIA +BzAnBgNVHREEIDAegRxjaGFtYmVyc3Jvb3RAY2hhbWJlcnNpZ24ub3JnMCcGA1Ud +EgQgMB6BHGNoYW1iZXJzcm9vdEBjaGFtYmVyc2lnbi5vcmcwWAYDVR0gBFEwTzBN +BgsrBgEEAYGHLgoDATA+MDwGCCsGAQUFBwIBFjBodHRwOi8vY3BzLmNoYW1iZXJz +aWduLm9yZy9jcHMvY2hhbWJlcnNyb290Lmh0bWwwDQYJKoZIhvcNAQEFBQADggEB +AAxBl8IahsAifJ/7kPMa0QOx7xP5IV8EnNrJpY0nbJaHkb5BkAFyk+cefV/2icZd +p0AJPaxJRUXcLo0waLIJuvvDL8y6C98/d3tGfToSJI6WjzwFCm/SlCgdbQzALogi +1djPHRPH8EjX1wWnz8dHnjs8NMiAT9QUu/wNUPf6s+xCX6ndbcj0dc97wXImsQEc +XCz9ek60AcUFV7nnPKoF2YjpB0ZBzu9Bga5Y34OirsrXdx/nADydb47kMgkdTXg0 +eDQ8lJsm7U9xxhl6vSAiSFr+S30Dt+dYvsYyTnQeaN2oaFuzPu5ifdmA6Ap1erfu +tGWaIZDgqtCYvDi1czyL+NwwJzAKBggrBgEFBQcDAwwZQ2hhbWJlcnMgb2YgQ29t +bWVyY2UgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Chambers of Commerce Root - 2008 +-----BEGIN TRUSTED CERTIFICATE----- +MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD +VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 +IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 +MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJz +IG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEyMjk1MFoXDTM4MDcz +MTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBj +dXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIw +EAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEp +MCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW9 +28sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKAXuFixrYp4YFs8r/lfTJq +VKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorjh40G072Q +DuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR +5gN/ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfL +ZEFHcpOrUMPrCXZkNNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05a +Sd+pZgvMPMZ4fKecHePOjlO+Bd5gD2vlGts/4+EhySnB8esHnFIbAURRPHsl18Tl +UlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331lubKgdaX8ZSD6e2wsWsSaR6s ++12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ0wlf2eOKNcx5 +Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj +ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAx +hduub+84Mxh2EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNV +HQ4EFgQU+SSsD7K1+HnA+mCIG8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1 ++HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpN +YWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29t +L2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVy +ZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAt +IDIwMDiCCQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRV +HSAAMCowKAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20w +DQYJKoZIhvcNAQEFBQADggIBAJASryI1wqM58C7e6bXpeHxIvj99RZJe6dqxGfwW +PJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH3qLPaYRgM+gQDROpI9CF +5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbURWpGqOt1 +glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaH +FoI6M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2 +pSB7+R5KBWIBpih1YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MD +xvbxrN8y8NmBGuScvfaAFPDRLLmF9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QG +tjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcKzBIKinmwPQN/aUv0NCB9szTq +jktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvGnrDQWzilm1De +fhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg +OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZ +d0jQMC4wCgYIKwYBBQUHAwMMIENoYW1iZXJzIG9mIENvbW1lcmNlIFJvb3QgLSAy +MDA4 +-----END TRUSTED CERTIFICATE----- + +# China Internet Network Information Center EV Certificates Root +-----BEGIN TRUSTED CERTIFICATE----- +MIID9zCCAt+gAwIBAgIESJ8AATANBgkqhkiG9w0BAQUFADCBijELMAkGA1UEBhMC +Q04xMjAwBgNVBAoMKUNoaW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24g +Q2VudGVyMUcwRQYDVQQDDD5DaGluYSBJbnRlcm5ldCBOZXR3b3JrIEluZm9ybWF0 +aW9uIENlbnRlciBFViBDZXJ0aWZpY2F0ZXMgUm9vdDAeFw0xMDA4MzEwNzExMjVa +Fw0zMDA4MzEwNzExMjVaMIGKMQswCQYDVQQGEwJDTjEyMDAGA1UECgwpQ2hpbmEg +SW50ZXJuZXQgTmV0d29yayBJbmZvcm1hdGlvbiBDZW50ZXIxRzBFBgNVBAMMPkNo +aW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24gQ2VudGVyIEVWIENlcnRp +ZmljYXRlcyBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm35z +7r07eKpkQ0H1UN+U8i6yjUqORlTSIRLIOTJCBumD1Z9S7eVnAztUwYyZmczpwA// +DdmEEbK40ctb3B75aDFk4Zv6dOtouSCV98YPjUesWgbdYavi7NifFy2cyjw1l1Vx +zUOFsUcW9SxTgHbP0wBkvUCZ3czY28Sf1hNfQYOL+Q2HklY0bBoQCxfVWhyXWIQ8 +hBouXJE0bhlffxdpxWXvayHG1VA6v2G5BY3vbzQ6sm8UY78WO5upKv23KzhmBsUs +4qpnHkWnjQRmQvaPK++IIGmPMowUc9orhpFjIpryp9vOiYurXccUwVswah+xt54u +gQEC7c+WXmPbqOY4twIDAQABo2MwYTAfBgNVHSMEGDAWgBR8cks5x8DbYqVPm6oY +NJKiyoOCWTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E +FgQUfHJLOcfA22KlT5uqGDSSosqDglkwDQYJKoZIhvcNAQEFBQADggEBACrDx0M3 +j92tpLIM7twUbY8opJhJywyA6vPtI2Z1fcXTIWd50XPFtQO3WKwMVC/GVhMPMdoG +52U7HW8228gd+f2ABsqjPWYWqJ1MFn3AlUa1UeTiH9fqBk1jjZaM7+czV0I664zB +echNdn3e9rG3geCg+aF4RhcaVpjwTj2rHO3sOdwHSPdj/gauwqRcalsyiMXHM4Ws +ZkJHwlgkmeHlPuV1LI5D1l08eB6olYIpUNHRFrrvwb562bTYzB5MRuF3sTGrvSrI +zo9uoV1/A3U05K2JRVRevq4opbs/eHnrc7MKDf2+yfdWrPa37S+bISnHOLaVxATy +wy39FCqQmbkHzJ8wTDAKBggrBgEFBQcDAww+Q2hpbmEgSW50ZXJuZXQgTmV0d29y +ayBJbmZvcm1hdGlvbiBDZW50ZXIgRVYgQ2VydGlmaWNhdGVzIFJvb3Q= +-----END TRUSTED CERTIFICATE----- + +# Cisco Root CA 2048 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDQzCCAiugAwIBAgIQX/h7KCtU3I1CoxW1aMmt/zANBgkqhkiG9w0BAQUFADA1 +MRYwFAYDVQQKEw1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENB +IDIwNDgwHhcNMDQwNTE0MjAxNzEyWhcNMjkwNTE0MjAyNTQyWjA1MRYwFAYDVQQK +Ew1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENBIDIwNDgwggEg +MA0GCSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQCwmrmrp68Kd6ficba0ZmKUeIhH +xmJVhEAyv8CrLqUccda8bnuoqrpu0hWISEWdovyD0My5jOAmaHBKeN8hF570YQXJ +FcjPFto1YYmUQ6iEqDGYeJu5Tm8sUxJszR2tKyS7McQr/4NEb7Y9JHcJ6r8qqB9q +VvYgDxFUl4F1pyXOWWqCZe+36ufijXWLbvLdT6ZeYpzPEApk0E5tzivMW/VgpSdH +jWn0f84bcN5wGyDWbs2mAag8EtKpP6BrXruOIIt6keO1aO6g58QBdKhTCytKmg9l +Eg6CTY5j/e/rmxrbU6YTYK/CfdfHbBcl1HP7R2RQgYCUTOG/rksc35LtLgXfAgED +o1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUJ/PI +FR5umgIJFq0roIlgX9p7L6owEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEF +BQADggEBAJ2dhISjQal8dwy3U8pORFBi71R803UXHOjgxkhLtv5MOhmBVrBW7hmW +Yqpao2TB9k5UM8Z3/sUcuuVdJcr18JOagxEu5sv4dEX+5wW4q+ffy0vhN4TauYuX +cB7w4ovXsNgOnbFp1iqRe6lJT37mjpXYgyc81WhJDtSd9i7rp77rMKSsH0T8lasz +Bvt9YAretIpjsJyp8qS5UwGH0GikJ3+r/+n6yUA4iGe0OcaEb1fJU9u6ju7AQ7L4 +CYNu/2bPPu8Xs1gYJQk0XuPL1hS27PKSb3TkL4Eq1ZKR4OCXPDJoBYVL0fdX4lId +kxpUnwVwwEpxYB5DC2Ae/qPOgRnhCzUwIDAKBggrBgEFBQcDAwwSQ2lzY28gUm9v +dCBDQSAyMDQ4 +-----END TRUSTED CERTIFICATE----- + +# Class 1 Primary CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDkjCCAnqgAwIBAgIRAIb+HV/DgfhH1zMsc5R1ezcwDQYJKoZIhvcNAQEFBQAw +PTELMAkGA1UEBhMCRlIxETAPBgNVBAoTCENlcnRwbHVzMRswGQYDVQQDExJDbGFz +cyAxIFByaW1hcnkgQ0EwHhcNOTkwNzA3MTcwMTAwWhcNMjAwNzA2MjM1OTU5WjA9 +MQswCQYDVQQGEwJGUjERMA8GA1UEChMIQ2VydHBsdXMxGzAZBgNVBAMTEkNsYXNz +IDEgUHJpbWFyeSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMNr +Kcgux658UgXpk4lWClp5yczcJe+Hii0F2IEXBBs6Rfh5Dg1J1IFByKtF+3XIFfLi +0LzZYWyEpBMZp9n58kncTA/GfVe0E9weCXEpNp2AWPQb2IkU69PSk0sq8XfnamW9 +GeWq/QxKY+HCmbQPBLZaGzY8Nzy/xeVe8V9XDh/H/Szn5G9qm2KWORGbZvAstlLc +4Sf/223+66tjFB1jiGPiFgz5IFQPm90VanaDT70ni1OmN9KH8kdQUjtm6dF4Ghuy +O2nwWTw4W9EqTDNeDspWpe0tW4KDTdY4TopWtmovJGsSMKYq3q8Mu6pEEhwTxWUP +4/3YGjFL5D8MfEXoFjMCAwEAAaOBjDCBiTAPBgNVHRMECDAGAQH/AgEKMAsGA1Ud +DwQEAwIBBjAdBgNVHQ4EFgQUIy7f6YG00IT9jrup3fkMo+PzSVMwEQYJYIZIAYb4 +QgEBBAQDAgEGMDcGA1UdHwQwMC4wLKAqoCiGJmh0dHA6Ly93d3cuY2VydHBsdXMu +Y29tL0NSTC9jbGFzczEuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQC+JlPWXp+QPwGU +AuwIwYia0Kf6UA3a/JQdqNRQI9CfHIthsbKqRA+s2BMN1dah6DF40O8eg0Ca5f1B +6ZL97qOVkPPAuG9+9zSlod88895WssffhyZEx+KDuRNvMEVxKSIVq8TbP0/zd/mZ +GDT1c5J9N2ZnSW4zmk0plIu9UDljZQ8Q53sQatFH+Z4lDCcpwtsIiOeqiTpFqp9J +sn3qaIpA/pHBwkn/IdFnDhoSHUouHPuU+W07eTL5HimRCkKWRfHvylgPcp0MqYO8 +Mt2YBNFZ4WQXvcyBowNelmDlfxY4CmvR+rOEnSrKPvtC+E/op1soGRit4KZmHrAp +IfK4mY//MCAwCgYIKwYBBQUHAwMMEkNsYXNzIDEgUHJpbWFyeSBDQQ== +-----END TRUSTED CERTIFICATE----- + +# ComSign Advanced Security CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGGzCCBAOgAwIBAgIQel3pM9AEnrNKGhd0yxabbTANBgkqhkiG9w0BAQUFADAn +MSUwIwYDVQQDExxDb21TaWduIEFkdmFuY2VkIFNlY3VyaXR5IENBMB4XDTA0MDMy +NDIxNTIwNFoXDTI5MDMyNDIxNTU1NVowJzElMCMGA1UEAxMcQ29tU2lnbiBBZHZh +bmNlZCBTZWN1cml0eSBDQTCCAiAwDQYJKoZIhvcNAQEBBQADggINADCCAggCggIB +AJ2cXDsBhFda9Cv+bRSybLftkNf7V0Ogz2AbWS9NUWA9HEmiakFjq7jtZr5ARo2q +kls9LivBYZhUbLxMq2n6jUVFgSoabfiz+A9jy4587VQpoxQY/OHJsdhUupzKKhvQ +rMKJGBZK/koE0tKbtYeGwcl7HzYWRbnwuobCd4ozMUKizgxyPRLlkTj0J2dhTMzi +9U0sEvDNs4TBCXWfAE/4d9PzMm+Bjxd+O5tr8x7n+pNPDC6X3XBYE33zkYONoj0x +2mPjOXZ2M+bUZg2UjhWUnDh73HEf2rXg15dagnTeOwba78Ur8WjdJ1P4ueyMD1Mi +5DmC5PmuYfwYKH7Haelo9H7g0bzgbcjW0atEMWG07Hg1LEbe6PO2PJizqRwHSpjN +RyaC8NSR7xCT52jmUmqXfrkglxf6GTKUI57Hc7JI6Ji193VWoEudd6gaKXQ4WODI +zbEzGy/+mJN4BQF0q65CxRsdL3xBfKXTYKpQwfPIiEFY9rWSGP2uZo6c5zua0bfb +2sdMyyIbSj9g3zn22uquzIeVuFKbWp1RRQx27ylBpQq5+F7EvSxMNEhH1YvIzM/R +O1jlesb9Iex3Ka/zWlQOqaRkfPdc0aET5TvUW0sAlMnLDd0ET9tosrdnI/ZhpawP +OT6awy+pZMMShZqkolLUefy6I6sJGu09mZ3Z5yj4D1BPAgEDo4IBQzCCAT8wCwYD +VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOn6J+XtSyFwZNZx +qnzlghww0g16ME0GA1UdHwRGMEQwQqBAoD6GPGh0dHA6Ly9mZWRpci5jb21zaWdu +LmNvLmlsL2NybC9Db21TaWduQWR2YW5jZWRTZWN1cml0eUNBLmNybDAQBgkrBgEE +AYI3FQEEAwIBADBCBgNVHSAEOzA5MDcGCSoDBAUGBwgJCjAqMCgGCCsGAQUFBwIB +FhxodHRwOi8vd3d3LmNvbXNpZ24uY28uaWwvY3BzMFsGCCsGAQUFBwEBBE8wTTBL +BggrBgEFBQcwAoY/aHR0cDovL2ZlZGlyLmNvbXNpZ24uY28uaWwvY2FjZXJ0L0Nv +bVNpZ25BZHZhbmNlZFNlY3VyaXR5Q0EuY3J0MA0GCSqGSIb3DQEBBQUAA4ICAQCc +jV2aBhGhbhYYT8uyAjuSjx0mpcvrSO5VHaoQ4GlOwf4yAN4Pzg20Y7zgYhrg9/Wp +5clUFItA+K3zbQLsjnvcpXmSAbX/oVljORG1vlKudNrZIaMS2MeV+NtvVlW/lRK9 +MiPHyWxlAe/7dI67JIZPfd3wWo87hIx5dSn0hrbTwQxZFcIDV6s9SNcsRZRA3OCp +S1/MENeWv6mcAypk8rx++KWnmZEnBf5Jp9itCoY2PA49puF8aoERe0W7aI01Mf0m +U0E+PG5rHtirLYmBmcYfl/Na9R9hvf4VWZMK3vpR+kbfRvT8YmxYowzeyRkewBxb +ODtBjwUxDq7tLF23D9w5xF8is6WyWDAkv/kJrfCWGzdvQGb+tyqJ1cbjfgNYsH04 +5oqrP/WB8wpBdwJz7adU3QcxXLa1dpJ0d7lvpgm6Dt0M53bES77LO9VFwInjK3d6 +YpjDW/x9V16O7t0bUCFtkb8ZXI+XeSrBi2Fvql5S9elPNJgwvRwHw7fEfIHZo0My +ZsYtvDlbqV2J6wQrRJVH+VL0TwXuoypjEQ0eusT4SltQQFF3LvTk3/EDFOZ5adpY +RIJYFIORNAPXem1q0TIiKZEbGuQLvTIVJyC/Gm9SgtP5L0kPkGwBgEmuGO4yLM4R +x/6gBJholPD8i8Usb4f92cLEHOktzA6sn/Xx/JI4jTAqMAoGCCsGAQUFBwMDDBxD +b21TaWduIEFkdmFuY2VkIFNlY3VyaXR5IENB +-----END TRUSTED CERTIFICATE----- + +# ComSign CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDkzCCAnugAwIBAgIQFBOWgxRVjOp7Y+X8NId3RDANBgkqhkiG9w0BAQUFADA0 +MRMwEQYDVQQDEwpDb21TaWduIENBMRAwDgYDVQQKEwdDb21TaWduMQswCQYDVQQG +EwJJTDAeFw0wNDAzMjQxMTMyMThaFw0yOTAzMTkxNTAyMThaMDQxEzARBgNVBAMT +CkNvbVNpZ24gQ0ExEDAOBgNVBAoTB0NvbVNpZ24xCzAJBgNVBAYTAklMMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8ORUaSvTx49qROR+WCf4C9DklBKK +8Rs4OC8fMZwG1Cyn3gsqrhqg455qv588x26i+YtkbDqthVVRVKU4VbirgwTyP2Q2 +98CNQ0NqZtH3FyrV7zb6MBBC11PN+fozc0yz6YQgitZBJzXkOPqUm7h65HkfM/sb +2CEJKHxNGGleZIp6GZPKfuzzcuc3B1hZKKxC+cX/zT/npfo4sdAMx9lSGlPWgcxC +ejVb7Us6eva1jsz/D3zkYDaHL63woSV9/9JLEYhwVKZBqGdTUkJe5DSe5L6j7Kpi +Xd3DTKaCQeQzC6zJMw9kglcq/QytNuEMrkvF7zuZ2SOzW120V+x0cAwqTwIDAQAB +o4GgMIGdMAwGA1UdEwQFMAMBAf8wPQYDVR0fBDYwNDAyoDCgLoYsaHR0cDovL2Zl +ZGlyLmNvbXNpZ24uY28uaWwvY3JsL0NvbVNpZ25DQS5jcmwwDgYDVR0PAQH/BAQD +AgGGMB8GA1UdIwQYMBaAFEsBmz5WGmU2dst7l6qSBe4y5ygxMB0GA1UdDgQWBBRL +AZs+VhplNnbLe5eqkgXuMucoMTANBgkqhkiG9w0BAQUFAAOCAQEA0Nmlfv4pYEWd +foPPbrxHbvUanlR2QnG0PFg/LUAlQvaBnPGJEMgOqnhPOAlXsDzACPw1jvFIUY0M +cXS6hMTXcpuEfDhOZAYnKuGntewImbQKDdSFc8gS4TXt8QUxHXOZDOuWyt3T5oWq +8Ir7dcHyCTxlZWTzTNity4hp8+SDtwy9F1qWF8pb/627HOkthIDYIb6FUtnUdLlp +hbpN7Sgy6/lhSuTENh4Z3G+EER+V9YMoGKgzkkMn3V0TBEVPh9VGzT2ouvDzuFYk +Res3x+F2T3I5GN9+dHLHcy056mDmrRGiVod7w2ia/viMcKjfZTL0pECMocJEAw6U +AGegcQCCSDAYMAoGCCsGAQUFBwMDDApDb21TaWduIENB +-----END TRUSTED CERTIFICATE----- + +# ComSign Secured CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDqzCCApOgAwIBAgIRAMcoRwmzuGxFjB36JPU2TukwDQYJKoZIhvcNAQEFBQAw +PDEbMBkGA1UEAxMSQ29tU2lnbiBTZWN1cmVkIENBMRAwDgYDVQQKEwdDb21TaWdu +MQswCQYDVQQGEwJJTDAeFw0wNDAzMjQxMTM3MjBaFw0yOTAzMTYxNTA0NTZaMDwx +GzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjEL +MAkGA1UEBhMCSUwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGtWhf +HZQVw6QIVS3joFd67+l0Kru5fFdJGhFeTymHDEjWaueP1H5XJLkGieQcPOqs49oh +gHMhCu95mGwfCP+hUH3ymBvJVG8+pSjsIQQPRbsHPaHA+iqYHU4Gk/v1iDurX8sW +v+bznkqH7Rnqwp9D5PGBpX8QTz7RSmKtUxvLg/8HZaWSLWapW7ha9B20IZFKF3ue +Mv5WJDmyVIRD9YTC2LxBkMyd1mja6YJQqTtoz7VdApRgFrFD2UNd3V2Hbuq7s8lr +9gOUCXDeFhF6K+h2j0kQmHe5Y1yLM5d19guMsqtb3nQgJT/j8xH5h2iGNXHDHYwt +6+UarA9z1YJZQIDTAgMBAAGjgacwgaQwDAYDVR0TBAUwAwEB/zBEBgNVHR8EPTA7 +MDmgN6A1hjNodHRwOi8vZmVkaXIuY29tc2lnbi5jby5pbC9jcmwvQ29tU2lnblNl +Y3VyZWRDQS5jcmwwDgYDVR0PAQH/BAQDAgGGMB8GA1UdIwQYMBaAFMFL7XC29z58 +ADsAj8c+DkWfHl3sMB0GA1UdDgQWBBTBS+1wtvc+fAA7AI/HPg5Fnx5d7DANBgkq +hkiG9w0BAQUFAAOCAQEAFs/ukhNQq3sUnjO2QiBq1BW9Cav8cujvR3qQrFHBZE7p +iL1DRYHjZiM/EoZNGeQFsOY3wo3aBijJD4mkU6l1P7CW+6tMM1X5eCZGbxs2mPtC +dsGCuY7e+0X5YxtiOzkGynd6qDwJz2w2PQ8KRUtpFhpFfTMDZflScZAmlaxMDPWL +kz/MdXSFmLr/YnpNH4n+rr2UAJm/EaXc4HnFFgt9AmEd6oX5AhVP51qJThRv4zdL +hfXBPGHg/QVBspJ/wx2g0K5SZGBrGMYmnNj1ZOQ2GmKfig8+/21OGVZOIJFsnzQz +OjRXUDpvgV4GxvU+fE6OK85lBi5d0ipTdF7TbieejzAgMAoGCCsGAQUFBwMDDBJD +b21TaWduIFNlY3VyZWQgQ0E= +-----END TRUSTED CERTIFICATE----- + +# CommScope Public Trust ECC Root-01 +-----BEGIN TRUSTED CERTIFICATE----- +MIICHTCCAaOgAwIBAgIUQ3CCd89NXTTxyq4yLzf39H91oJ4wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMTAeFw0yMTA0MjgxNzM1NDNa +Fw00NjA0MjgxNzM1NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDEw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAARLNumuV16ocNfQj3Rid8NeeqrltqLxeP0C +flfdkXmcbLlSiFS8LwS+uM32ENEp7LXQoMPwiXAZu1FlxUOcw5tjnSCDPgYLpkJE +hRGnSjot6dZoL0hOUysHP029uax3OVejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSOB2LAUN3GGQYARnQE9/OufXVNMDAKBggq +hkjOPQQDAwNoADBlAjEAnDPfQeMjqEI2Jpc1XHvr20v4qotzVRVcrHgpD7oh2MSg +2NED3W3ROT3Ek2DS43KyAjB8xX6I01D1HiXo+k515liWpDVfG2XqYZpwI7UNo5uS +Um9poIyNStDuiw7LR47QjREwMDAKBggrBgEFBQcDAQwiQ29tbVNjb3BlIFB1Ymxp +YyBUcnVzdCBFQ0MgUm9vdC0wMQ== +-----END TRUSTED CERTIFICATE----- + +# CommScope Public Trust ECC Root-02 +-----BEGIN TRUSTED CERTIFICATE----- +MIICHDCCAaOgAwIBAgIUKP2ZYEFHpgE6yhR7H+/5aAiDXX0wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMjAeFw0yMTA0MjgxNzQ0NTRa +Fw00NjA0MjgxNzQ0NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDIw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAR4MIHoYx7l63FRD/cHB8o5mXxO1Q/MMDAL +j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU +v4RDsNuESgMjGWdqb8FuvAY5N9GIIvejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTmGHX/72DehKT1RsfeSlXjMjZ59TAKBggq +hkjOPQQDAwNnADBkAjAmc0l6tqvmSfR9Uj/UQQSugEODZXW5hYA4O9Zv5JOGq4/n +ich/m35rChJVYaoR4HkCMHfoMXGsPHED1oQmHhS48zs73u1Z/GtMMH9ZzkXpc2AV +mkzw5l4lIhVtwodZ0LKOajAwMAoGCCsGAQUFBwMBDCJDb21tU2NvcGUgUHVibGlj +IFRydXN0IEVDQyBSb290LTAy +-----END TRUSTED CERTIFICATE----- + +# CommScope Public Trust RSA Root-01 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUPgNJgXUWdDGOTKvVxZAplsU5EN0wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMTAeFw0yMTA0MjgxNjQ1 +NTRaFw00NjA0MjgxNjQ1NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwSGWjDR1C45FtnYSk +YZYSwu3D2iM0GXb26v1VWvZVAVMP8syMl0+5UMuzAURWlv2bKOx7dAvnQmtVzslh +suitQDy6uUEKBU8bJoWPQ7VAtYXR1HHcg0Hz9kXHgKKEUJdGzqAMxGBWBB0HW0al +DrJLpA6lfO741GIDuZNqihS4cPgugkY4Iw50x2tBt9Apo52AsH53k2NC+zSDO3Oj +WiE260f6GBfZumbCk6SP/F2krfxQapWsvCQz0b2If4b19bJzKo98rwjyGpg/qYFl +P8GMicWWMJoKz/TUyDTtnS+8jTiGU+6Xn6myY5QXjQ/cZip8UlF1y5mO6D1cv547 +KI2DAg+pn3LiLCuz3GaXAEDQpFSOm117RTYm1nJD68/A6g3czhLmfTifBSeolz7p +UcZsBSjBAg/pGG3svZwG1KdJ9FQFa2ww8esD1eo9anbCyxooSU1/ZOD6K9pzg4H/ +kQO9lLvkuI6cMmPNn7togbGEW682v3fuHX/3SZtS7NJ3Wn2RnU3COS3kuoL4b/JO +Hg9O5j9ZpSPcPYeoKFgo0fEbNttPxP/hjFtyjMcmAyejOQoBqsCyMWCDIqFPEgkB +Ea801M/XrmLTBQe0MXXgDW1XT2mH+VepuhX2yFJtocucH+X8eKg1mp9BFM6ltM6U +CBwJrVbl2rZJmkrqYxhTnCwuwwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUN12mmnQywsL5x6YVEFm45P3luG0wDQYJ +KoZIhvcNAQELBQADggIBAK+nz97/4L1CjU3lIpbfaOp9TSp90K09FlxD533Ahuh6 +NWPxzIHIxgvoLlI1pKZJkGNRrDSsBTtXAOnTYtPZKdVUvhwQkZyybf5Z/Xn36lbQ +nmhUQo8mUuJM3y+Xpi/SB5io82BdS5pYV4jvguX6r2yBS5KPQJqTRlnLX3gWsWc+ +QgvfKNmwrZggvkN80V4aCRckjXtdlemrwWCrWxhkgPut4AZ9HcpZuPN4KWfGVh2v +trV0KnahP/t1MJ+UXjulYPPLXAziDslg+MkfFoom3ecnf+slpoq9uC02EJqxWE2a +aE9gVOX2RhOOiKy8IUISrcZKiX2bwdgt6ZYD9KJ0DLwAHb/WNyVntHKLr4W96ioD +j8z7PEQkguIBpQtZtjSNMgsSDesnwv1B10A8ckYpwIzqug/xBpMu95yo9GA+o/E4 +Xo4TwbM6l4c/ksp4qRyv0LAbJh6+cOx69TOY6lz/KwsETkPdY34Op054A5U+1C0w +lREQKC6/oAI+/15Z0wUOlV9TRe9rh9VIzRamloPh37MG88EU26fsHItdkJANclHn +YfkUyq+Dj7+vsQpZXdxc1+SWrVtgHdqul7I52Qb1dgAT+GhMIbA1xNxVssnBQVoc +icCMb3SgazNNtQEo/a2tiRc7ppqEvOuM6sRxJKi6KfkIsidWNTJf6jn7MZrVGczw +MDAwCgYIKwYBBQUHAwEMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDE= +-----END TRUSTED CERTIFICATE----- + +# CommScope Public Trust RSA Root-02 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUVBa/O345lXGN0aoApYYNK496BU4wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMjAeFw0yMTA0MjgxNzE2 +NDNaFw00NjA0MjgxNzE2NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDh+g77aAASyE3VrCLE +NQE7xVTlWXZjpX/rwcRqmL0yjReA61260WI9JSMZNRTpf4mnG2I81lDnNJUDMrG0 +kyI9p+Kx7eZ7Ti6Hmw0zdQreqjXnfuU2mKKuJZ6VszKWpCtYHu8//mI0SFHRtI1C +rWDaSWqVcN3SAOLMV2MCe5bdSZdbkk6V0/nLKR8YSvgBKtJjCW4k6YnS5cciTNxz +hkcAqg2Ijq6FfUrpuzNPDlJwnZXjfG2WWy09X6GDRl224yW4fKcZgBzqZUPckXk2 +LHR88mcGyYnJ27/aaL8j7dxrrSiDeS/sOKUNNwFnJ5rpM9kzXzehxfCrPfp4sOcs +n/Y+n2Dg70jpkEUeBVF4GiwSLFworA2iI540jwXmojPOEXcT1A6kHkIfhs1w/tku +FT0du7jyU1fbzMZ0KZwYszZ1OC4PVKH4kh+Jlk+71O6d6Ts2QrUKOyrUZHk2EOH5 +kQMreyBUzQ0ZGshBMjTRsJnhkB4BQDa1t/qp5Xd1pCKBXbCL5CcSD1SIxtuFdOa3 +wNemKfrb3vOTlycEVS8KbzfFPROvCgCpLIscgSjX74Yxqa7ybrjKaixUR9gqiC6v +wQcQeKwRoi9C8DfF8rhW3Q5iLc4tVn5V8qdE9isy9COoR+jUKgF4z2rDN6ieZdIs +5fq6M8EGRPbmz6UNp2YINIos8wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUR9DnsSL/nSz12Vdgs7GxcJXvYXowDQYJ +KoZIhvcNAQELBQADggIBAIZpsU0v6Z9PIpNojuQhmaPORVMbc0RTAIFhzTHjCLqB +KCh6krm2qMhDnscTJk3C2OVVnJJdUNjCK9v+5qiXz1I6JMNlZFxHMaNlNRPDk7n3 ++VGXu6TwYofF1gbTl4MgqX67tiHCpQ2EAOHyJxCDut0DgdXdaMNmEMjRdrSzbyme +APnCKfWxkxlSaRosTKCL4BWaMS/TiJVZbuXEs1DIFAhKm4sTg7GkcrI7djNB3Nyq +pgdvHSQSn8h2vS/ZjvQs7rfSOBAkNlEv41xdgSGn2rtO/+YHqP65DSdsu3BaVXoT +6fEqSWnHX4dXTEN5bTpl6TBcQe7rd6VzEojov32u5cSoHw2OHG1QAk8mGEPej1WF +sQs3BWDJVTkSBKEqz3EWnzZRSb9wO55nnPt7eck5HHisd5FUmrh1CoFSl+NmYWvt +PjgelmFV4ZFUjO2MJB+ByRCac5krFk5yAD9UG/iNuovnFNa2RU9g7Jauwy8CTl2d +lklyALKrdVwPaFsdZcJfMw8eD/A7hvWwTruc9+olBdytoptLFwG+Qt81IR2tq670 +v64fG9PiO/yzcnMcmyiQiRM9HcEARwmWmjgb3bHPDcK0RPOWlc4yOo80nOAXx17O +rg3bhzjlP1v9mxnhMUF6cKojawHhRUzNlM47ni3niAIi9G7oyOzWPPO5std3eqx7 +MDAwCgYIKwYBBQUHAwEMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDI= +-----END TRUSTED CERTIFICATE----- + +# Common Policy +-----BEGIN TRUSTED CERTIFICATE----- +MIIDoTCCAomgAwIBAgIQKTZHquOKrIZKI1byyrdhrzANBgkqhkiG9w0BAQUFADBO +MQswCQYDVQQGEwJ1czEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQ0wCwYDVQQL +EwRGQkNBMRYwFAYDVQQDEw1Db21tb24gUG9saWN5MB4XDTA3MTAxNTE1NTgwMFoX +DTI3MTAxNTE2MDgwMFowTjELMAkGA1UEBhMCdXMxGDAWBgNVBAoTD1UuUy4gR292 +ZXJubWVudDENMAsGA1UECxMERkJDQTEWMBQGA1UEAxMNQ29tbW9uIFBvbGljeTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJeNvTMn5K1b+3i9L0dHbsd4 +6ZOcpN7JHP0vGzk4rEcXwH53KQA7Ax9oD81Npe53uCxiazH2+nIJfTApBnznfKM9 +hBiKHa4skqgf6F5PjY7rPxr4nApnnbBnTfAu0DDew5SwoM8uCjR/VAnTNr2kSVdS +c+md/uRIeUYbW40y5KVIZPMiDZKdCBW/YDyD90ciJSKtKXG3d+8XyaK2lF7IMJCk +FEhcVlcLQUwF1CpMP64Sm1kRdXAHImktLNMxzJJ+zM2kfpRHqpwJCPZLr1LoakCR +xVW9QLHIbVeGlRfmH3O+Ry4+i0wXubklHKVSFzYIWcBCvgortFZRPBtVyYyQd+sC +AwEAAaN7MHkwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFC9Yl9ipBZilVh/72at17wI8NjTHMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJ +KwYBBAGCNxUCBBYEFHa3YJbdFFYprHWF03BjwbxHhhyLMA0GCSqGSIb3DQEBBQUA +A4IBAQBgrvNIFkBypgiIybxHLCRLXaCRc+1leJDwZ5B6pb8KrbYq+Zln34PFdx80 +CTj5fp5B4Ehg/uKqXYeI6oj9XEWyyWrafaStsU+/HA2fHprA1RRzOCuKeEBuMPdi +4c2Z/FFpZ2wR3bgQo2jeJqVW/TZsN5hs++58PGxrcD/3SDcJjwtCga1GRrgLgwb0 +Gzigf0/NC++DiYeXHIowZ9z9VKEDfgHLhUyxCynDvux84T8PCVI8L6eaSP436REG +WOE2QYrEtr+O3c5Ks7wawM36GpnScZv6z7zyxFSjiDV2zBssRm8MtNHDYXaSdBHq +S4CNHIkRi+xb/xfJSPzn4AYR4oReMBswCgYIKwYBBQUHAwMMDUNvbW1vbiBQb2xp +Y3k= +-----END TRUSTED CERTIFICATE----- + +# Comodo AAA Services root +-----BEGIN TRUSTED CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbjA6MB4GCCsGAQUFBwMEBggrBgEFBQcDAQYI +KwYBBQUHAwMMGENvbW9kbyBBQUEgU2VydmljZXMgcm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Configuration +-----BEGIN TRUSTED CERTIFICATE----- +MIIHHzCCBgegAwIBAgIESPx+9TANBgkqhkiG9w0BAQUFADCBrjESMBAGCgmSJomT +8ixkARkWAnJzMRUwEwYKCZImiZPyLGQBGRYFcG9zdGExEjAQBgoJkiaJk/IsZAEZ +FgJjYTEWMBQGA1UEAxMNQ29uZmlndXJhdGlvbjERMA8GA1UEAxMIU2VydmljZXMx +HDAaBgNVBAMTE1B1YmxpYyBLZXkgU2VydmljZXMxDDAKBgNVBAMTA0FJQTEWMBQG +A1UEAxMNUG9zdGEgQ0EgUm9vdDAeFw0wODEwMjAxMjIyMDhaFw0yODEwMjAxMjUy +MDhaMIGuMRIwEAYKCZImiZPyLGQBGRYCcnMxFTATBgoJkiaJk/IsZAEZFgVwb3N0 +YTESMBAGCgmSJomT8ixkARkWAmNhMRYwFAYDVQQDEw1Db25maWd1cmF0aW9uMREw +DwYDVQQDEwhTZXJ2aWNlczEcMBoGA1UEAxMTUHVibGljIEtleSBTZXJ2aWNlczEM +MAoGA1UEAxMDQUlBMRYwFAYDVQQDEw1Qb3N0YSBDQSBSb290MIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqPK9iL7Ar0S+m0qiYxzWVqsdKbIcqhUeRdGs +naBh1TX55FqDNmND3jhXFfzwlGL0B4BXg1eosxW8+00jeF/a9seBFr6r3+fcg1Nz +K7bdY4iNRfMN3X2/6IiwZsFDXTfSbaGcmkbDsz/QwqCKlC6DpjzDYL0szB6LY4J2 +QSjkFWtcDGE5VThByshm6Me4l1IQJnC3B7cJHqYTXq6ZWiZvZD3sxNOluVx2ZK1j +fYiD4kvMDd7UxtMIQvVbF/Vx4ZEtA5+eHNyLcqToR2QQh2Qwc9jytPFXJpNXy7bH +DYiLHc8FMF0E1nY36CAyV78PnDPGCIz2tMKpBrBbMKEeLRK6PwIDAQABo4IDQTCC +Az0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwgboGA1UdIASBsjCB +rzCBrAYLKwYBBAH6OAoKAQEwgZwwMAYIKwYBBQUHAgEWJGh0dHA6Ly93d3cuY2Eu +cG9zdGEucnMvZG9rdW1lbnRhY2lqYTBoBggrBgEFBQcCAjBcGlpPdm8gamUgZWxl +a3Ryb25za2kgc2VydGlmaWthdCBST09UIENBIHNlcnZlcmEgU2VydGlmaWthY2lv +bm9nIHRlbGEgUG9zdGU6ICJQb3N0YSBDQSBSb290Ii4wEQYJYIZIAYb4QgEBBAQD +AgAHMIIBvAYDVR0fBIIBszCCAa8wgcmggcaggcOkgcAwgb0xEjAQBgoJkiaJk/Is +ZAEZFgJyczEVMBMGCgmSJomT8ixkARkWBXBvc3RhMRIwEAYKCZImiZPyLGQBGRYC +Y2ExFjAUBgNVBAMTDUNvbmZpZ3VyYXRpb24xETAPBgNVBAMTCFNlcnZpY2VzMRww +GgYDVQQDExNQdWJsaWMgS2V5IFNlcnZpY2VzMQwwCgYDVQQDEwNBSUExFjAUBgNV +BAMTDVBvc3RhIENBIFJvb3QxDTALBgNVBAMTBENSTDEwgeCggd2ggdqGgaNsZGFw +Oi8vbGRhcC5jYS5wb3N0YS5ycy9jbj1Qb3N0YSUyMENBJTIwUm9vdCxjbj1BSUEs +Y249UHVibGljJTIwS2V5JTIwU2VydmljZXMsY249U2VydmljZXMsY249Q29uZmln +dXJhdGlvbixkYz1jYSxkYz1wb3N0YSxkYz1ycz9jZXJ0aWZpY2F0ZVJldm9jYXRp +b25MaXN0JTNCYmluYXJ5hjJodHRwOi8vc2VydGlmaWthdGkuY2EucG9zdGEucnMv +Y3JsL1Bvc3RhQ0FSb290LmNybDArBgNVHRAEJDAigA8yMDA4MTAyMDEyMjIwOFqB +DzIwMjgxMDIwMTI1MjA4WjAfBgNVHSMEGDAWgBTyy43iNe8QQ8Tae8r664kDoSKv +uDAdBgNVHQ4EFgQU8suN4jXvEEPE2nvK+uuJA6Eir7gwHQYJKoZIhvZ9B0EABBAw +DhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4IBAQBwRqHI5BcFZg+d4kMx +SB2SkBnEhQGFFm74ks57rlIWxJeNCih91cts49XlDjJPyGgtNAg9c6iTQikzRgxE +Z/HQmpxpAeWR8Q3JaTwzS04Zk2MzBSkhodj/PlSrnvahegLX3P+lPlR4+dPByhKV ++YmeFOLyoUSyy+ktdTXMllW7OAuIJtrWrO/TUqILSzpT2ksiU8zKKiSaYqrEMpp+ +3MzBsmzNj9m0wM/1AsCMK4RbG0C8ENBQ4WHWZlaaBJGl49W9oC4igbHZONrkqIdf +PEYElt7Jmju/rXhsHUlJtGm5cA8Fkla2/a+u+CAtRyPPthzNxJuATvm/McBUvrsx +f/M+MBswCgYIKwYBBQUHAwMMDUNvbmZpZ3VyYXRpb24= +-----END TRUSTED CERTIFICATE----- + +# Correo Uruguayo - Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGGjCCBAKgAwIBAgIQAMoieQgjKvD1griF02Pd8TANBgkqhkiG9w0BAQUFADB/ +MQswCQYDVQQGEwJVWTErMCkGA1UECgwiQURNSU5JU1RSQUNJT04gTkFDSU9OQUwg +REUgQ09SUkVPUzEfMB0GA1UECwwWU0VSVklDSU9TIEVMRUNUUk9OSUNPUzEiMCAG +A1UEAwwZQ29ycmVvIFVydWd1YXlvIC0gUm9vdCBDQTAeFw0wODA3MTQxNjUyMTVa +Fw0zMDEyMzEwMjU5NTlaMH8xCzAJBgNVBAYTAlVZMSswKQYDVQQKDCJBRE1JTklT +VFJBQ0lPTiBOQUNJT05BTCBERSBDT1JSRU9TMR8wHQYDVQQLDBZTRVJWSUNJT1Mg +RUxFQ1RST05JQ09TMSIwIAYDVQQDDBlDb3JyZW8gVXJ1Z3VheW8gLSBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsT3SpyVwl4N4DtcyyWYO +eCPkKhvsw+9ThYO7ys9+6lOZbSdVyNE4IUBuSU3DPfYJKwYZQ6mYyQFO9KqAMAdV +8/W3fZm3c4XVHGVWbA0ymwgONGEqQAmEN8Nm7Q1MnAx4QDrs7avMpITydTGVQKiq +u5O1d5hs8sjgIVoj5EKnk8ioHTjOpBpAQL88k5CbX9aUwSJbRtfFABXVj8b33guv +bosFj1uAlQ6jvZPMkPJ940h+ss0HPRvtFJB08900H3zkA1nxLc3go6A7IS5crqwI +BlAVMTXuX/kfDTSlgG5ick/jIbo4QF1f22gqXDTGCDv2fC6ojcS3pq3Zm78ZQQ5I +OQlmbg00AcW7BxEjpNr+YJYoR9yPZ5sTr315DnjNwIwvuyEs/HQWHt7AMp36eDqG +uj7JeAoA0eTgyRLiW9zru4CaMjWr8DDDDkiEL40ICvYsjE0ygEVVCNvNDai/CHq4 +52hdmpSJlbz8mo64fzrYbNX0GKxp4qTBC7Mfo4Kf84o8hUA4CfrCBT7hnIn6wwVs +CI9dUfR/u8TzbAG9PU/EGYs52crM6XmIBFWrbbjaFkVlORUFGPsLLHMB7ZRS5X0M +ATsJoE3xPQiBZjQ2F0TwZ/Nb8gW2IZhY2fShN9lv5u9WxPu/VmICrDAwtgLW0hb8 +TuqHQ5poXYijkUYoK785FRUCAwEAAaOBkTCBjjAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUfbtp64hh4UDPRyNkAIaiZmvchJUwTAYD +VR0gBEUwQzBBBgRVHSAAMDkwNwYIKwYBBQUHAgEWK2h0dHA6Ly93d3cuY29ycmVv +LmNvbS51eS9jb3JyZW9jZXJ0L2Nwcy5wZGYwDQYJKoZIhvcNAQEFBQADggIBAFbf +E4m+YrcOgSFzpNQ3yu23L5V014n4S0eB7mftuCnfIaD8VGdnyFcsW6EKdXghIcqg +qN9rnNk2Ao24AcFvjntsyaSyxUapykwCgfqje509SObKQGbSRJ124FW5ppyn0UPY +9aC0nfj35aamQvMCMllGcisU7F5l1VGBeM6qL42WiXlq+w/IW8+0rpC2X+N8Ymy3 +pv+QgbWYkXMSMK/H6IECaHMpu1h1PbfWQ9WuTfJCufDf2jEAE9rhs7YGi1v9yZi4 +ohPRuo/BihqeD/+CvgSC5SuTPh61ogwbxhqwc4l2g7yOO7sXbRTDi759FSa1qZwX +elB6LevpmZSumBC97ipdXdaONFusHodga5jHh4/TnLJoBUkH+akxZpz+v6dZ6Czw +NtTyqBmCwJ6nOfmxmDSjH/rNyRkteN63/WLwk6P+AFvWCuTzfnyXKOEF7AU0RRP/ +KRNhiidP27jSkiEntYh3Z6h+zyQ8hwgEM3OPC7aG+M/vsqYkHguRkQBQFjIS2Akl +2mNO3dst1+cEa+NjH6n+qQFjxMpMFGiDvAWsWRb7bqEHb7tLvm2YSHYle0oRllQI +rKnzN6uDw9HNgZjA5UA1uJ+R52/mSyAWilN7rDrRmDVU0NS/rn6aSx7pdaMlsDvn +Zb9PlfQdvcS6yU2BUcI/WtkS9CEb1pXqPZD+qZPiMCcwCgYIKwYBBQUHAwMMGUNv +cnJlbyBVcnVndWF5byAtIFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# Cybertrust Global Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDoTCCAomgAwIBAgILBAAAAAABD4WqLUgwDQYJKoZIhvcNAQEFBQAwOzEYMBYG +A1UEChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2Jh +bCBSb290MB4XDTA2MTIxNTA4MDAwMFoXDTIxMTIxNTA4MDAwMFowOzEYMBYGA1UE +ChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2JhbCBS +b290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+Mi8vRRQZhP/8NN5 +7CPytxrHjoXxEnOmGaoQ25yiZXRadz5RfVb23CO21O1fWLE3TdVJDm71aofW0ozS +J8bi/zafmGWgE07GKmSb1ZASzxQG9Dvj1Ci+6A74q05IlG2OlTEQXO2iLb3VOm2y +HLtgwEZLAfVJrn5GitB0jaEMAs7u/OePuGtm839EAL9mJRQr3RAwHQeWP032a7iP +t3sMpTjr3kfb1V05/Iin89cqdPHoWqI7n1C6poxFNcJQZZXcY4Lv3b93TZxiyWNz +FtApD0mpSPCzqrdsxacwOUBdrsTiXSZT8M4cIwhhqJQZugRiQOwfOHB3EgZxpzAY +XSUnpQIDAQABo4GlMIGiMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/ +MB0GA1UdDgQWBBS2CHsNesysIEyGVjJez6tuhS1wVzA/BgNVHR8EODA2MDSgMqAw +hi5odHRwOi8vd3d3Mi5wdWJsaWMtdHJ1c3QuY29tL2NybC9jdC9jdHJvb3QuY3Js +MB8GA1UdIwQYMBaAFLYIew16zKwgTIZWMl7Pq26FLXBXMA0GCSqGSIb3DQEBBQUA +A4IBAQBW7wojoFROlZfJ+InaRcHUowAl9B8Tq7ejhVhpwjCt2BWKLePJzYFa+HMj +Wqd8BfP9IjsO0QbE2zZMcwSO5bAi5MXzLqXZI+O4Tkogp24CJJ8iYGd7ix1yCcUx +XOl5n4BHPa2hCwcUPUf/A2kaDAtE52Mlp3+yybh2hO0j9n0Hq0V+09+zv+mKts2o +omcrUtW3ZfA5TGOgkXmTUg9U3YO7n9GPp1Nzw8v/MOx8BLjYRB+TX3EJIrduPuoc +A06dGiBh+4E37F78CkWr1+cXVdCg6mCbpvbjjFspwgZgFJ0tl0ypkxWdYcQBX0jW +WL1WMRJOEcgh4LMRkWXbtKaIOM5VMCQwCgYIKwYBBQUHAwMMFkN5YmVydHJ1c3Qg +R2xvYmFsIFJvb3Q= +-----END TRUSTED CERTIFICATE----- + +# D-TRUST BR Root CA 1 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQfMmPK4TX3+oPyWWa00tNljAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEJSIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTA5NDUwMFoXDTM1MDIxMTA5 +NDQ1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABMbLxyjR+4T1mu9CFCDhQ2tuda38KwOE1HaTJddZO0Flax7mNCq7dPYS +zuht56vkPE4/RAiLzRZxy7+SmfSk1zxQVFKQhYN4lGdnoxwJGT11NIXe7WB9xwy0 +QVK5buXuQqOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFHOREKv/ +VbNafAkl1bK6CKBrqx9tMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2JyX3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwQlIlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAlJAtE/rhY/hhY+ithXhUkZy4kzg+GkHaQBZTQgjKL47xPoFW +wKrY7RjEsK70PvomAjEA8yjixtsrmfu3Ubgko6SUeho/5jbiA1czijDLgsfWFBHV +dWNbFJWcHwHP2NVypw87MCcwCgYIKwYBBQUHAwEMGUQtVFJVU1QgQlIgUm9vdCBD +QSAxIDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# D-TRUST EV Root CA 1 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQXwJB13qHfEwDo6yWjfv/0DAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEVWIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTEwMDAwMFoXDTM1MDIxMTA5 +NTk1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBFViBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPEL3YZDIBnfl4XoIkqbz52Yv7QFJsnL46bSj8WeeHsxiamJrSc8ZRCC +/N/DnU7wMyPE0jL1HLDfMxddxfCxivnvubcUyilKwg+pf3VlSSowZ/Rk99Yad9rD +wpdhQntJraOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFH8QARY3 +OqQo5FD4pPfsazK2/umLMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2V2X3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwRVYlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAyjzGKnXCXnViOTYAYFqLwZOZzNnbQTs7h5kXO9XMT8oi96CA +y/m0sRtW9XLS/BnRAjEAkfcwkz8QRitxpNA7RJvAKQIFskF3UfN5Wp6OFKBOQtJb +gfM0agPnIjhQW+0ZT0MWMCcwCgYIKwYBBQUHAwEMGUQtVFJVU1QgRVYgUm9vdCBD +QSAxIDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# D-TRUST Root CA 3 2013 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEDjCCAvagAwIBAgIDD92sMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxHzAdBgNVBAMMFkQtVFJVU1QgUm9vdCBD +QSAzIDIwMTMwHhcNMTMwOTIwMDgyNTUxWhcNMjgwOTIwMDgyNTUxWjBFMQswCQYD +VQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMR8wHQYDVQQDDBZELVRSVVNU +IFJvb3QgQ0EgMyAyMDEzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA +xHtCkoIf7O1UmI4SwMoJ35NuOpNcG+QQd55OaYhs9uFp8vabomGxvQcgdJhl8Ywm +CM2oNcqANtFjbehEeoLDbF7eu+g20sRoNoyfMr2EIuDcwu4QRjltr5M5rofmw7wJ +ySxrZ1vZm3Z1TAvgu8XXvD558l++0ZBX+a72Zl8xv9Ntj6e6SvMjZbu376Ml1wrq +WLbviPr6ebJSWNXwrIyhUXQplapRO5AyA58ccnSQ3j3tYdLl4/1kR+W5t0qp9x+u +loYErC/jpIF3t1oW/9gPP/a3eMykr/pbPBJbqFKJcu+I89VEgYaVI5973bzZNO98 +lDyqwEHC451QGsDkGSL8swIDAQABo4IBBTCCAQEwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQUP5DIfccVb/Mkj6nDL0uiDyGyL+cwDgYDVR0PAQH/BAQDAgEGMIG+ +BgNVHR8EgbYwgbMwdKByoHCGbmxkYXA6Ly9kaXJlY3RvcnkuZC10cnVzdC5uZXQv +Q049RC1UUlVTVCUyMFJvb3QlMjBDQSUyMDMlMjAyMDEzLE89RC1UcnVzdCUyMEdt +YkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MDugOaA3hjVodHRwOi8v +Y3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2FfM18yMDEzLmNybDAN +BgkqhkiG9w0BAQsFAAOCAQEADlkOWOR0SCNEzzQhtZwUGq2aS7eziG1cqRdw8Cqf +jXv5e4X6xznoEAiwNStfzwLS05zICx7uBVSuN5MECX1sj8J0vPgclL4xAUAt8yQg +t4RVLFzI9XRKEBmLo8ftNdYJSNMOwLo5qLBGArDbxohZwr78e7Erz35ih1WWzAFv +m2chlTWL+BD8cRu3SzdppjvW7IvuwbDzJcmPkn2h6sPKRL8mpXSSnON065102ctN +h9j8tGlsi6BDB2B4l+nZk3zCRrybN1Kj7Yo8E6l7U0tJmhEFLAtuVqwfLoJs4Gln +tQ5tLdnkwBXxP/oYcuEVbSdbLTAoK59ImmQrme/ydUlfXDAkMAoGCCsGAQUFBwME +DBZELVRSVVNUIFJvb3QgQ0EgMyAyMDEz +-----END TRUSTED CERTIFICATE----- + +# D-TRUST Root Class 2 CA 2007 +-----BEGIN TRUSTED CERTIFICATE----- +MIIElTCCA32gAwIBAgIDAw6VMA0GCSqGSIb3DQEBBQUAMEsxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJTAjBgNVBAMMHEQtVFJVU1QgUm9vdCBD +bGFzcyAyIENBIDIwMDcwHhcNMDcwNTE2MDUyMDQ3WhcNMjIwNTE2MDUyMDQ3WjBL +MQswCQYDVQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMSUwIwYDVQQDDBxE +LVRSVVNUIFJvb3QgQ2xhc3MgMiBDQSAyMDA3MIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEAs83khBVJ+OTWzoSzmq32MHWQDYTr7tqzenUq4juk6jAs6z13 +jYGEaEqmpGjckHNhNGUHHSOlDOa/090zXdoy7aYNU6Z0alwZWaZMtS95AV6ef0r6 +usknftT/zQBZIOsGzLNEz9aF6e07DGzB6oxc4LmpAvATACeTnFD+zRNPbRtqqt0P +/0YlGdzhXlCsGn8Oy9ruIPzD9JxKeDVu7jHHRRZyhdKCINtSRXw8v1lX+Yd0Vphb +HVCOzC+zsz+L7uw3SQGI79ghDJPT9m6JT7oXy0SBt3unI7t0CtPY6jdFJ//c8J5D +47p7ihuafemGoP4v0db2h1eq8imUh3MV+mpOrQIDAQABo4IBgDCCAXwwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUkTCr9vPGRLfr3Si8DxSfUl1ifwIwOQYIKwYB +BQUHAQEELTArMCkGCCsGAQUFBzABhh1odHRwOi8vdXNlcnMub2NzcC5kLXRydXN0 +Lm5ldDAzBgNVHREELDAqgRBpbmZvQGQtdHJ1c3QubmV0hhZodHRwOi8vd3d3LmQt +dHJ1c3QubmV0MA4GA1UdDwEB/wQEAwIBBjCByQYDVR0fBIHBMIG+MIG7oIG4oIG1 +hnZsZGFwOi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290 +JTIwQ2xhc3MlMjAyJTIwQ0ElMjAyMDA3LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9j +ZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0hjtodHRwOi8vd3d3LmQtdHJ1c3QubmV0 +L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfMl9jYV8yMDA3LmNybDANBgkqhkiG9w0B +AQUFAAOCAQEAW4vyQ+MFLmQf1ZKpUWtk/A5GzAeZ4rf8kykg3PwvYOSsfSUy7RDh +D2/b8rxO7kHJs9QHSHoKr6S2/1Ew7cvSnOt/UO5L4mKnNMIg9vP29TbAy5EQ6+0u +jfQHGiEMNXf0fC2NSaXXC0Ro1dLi5Qx4OBPKsUxSqirl1a9cBTmdLa2+I1bVL1Xz +3p2rgjagTbdZkUfu3oOl6jteJwWAC20sUPQBN9Wjdxfs/t2E9MX4UJLQS8Yuo4tA +5MM3o3e9zixV4qzfXWQAur6najEG/JlrUBUlnal2mqdNKpoCY+tw5/4RJtAYxaYf +CkOT8hjZ9Tl5uAddjB/mP/PFyyFmMXt7zzAqMAoGCCsGAQUFBwMDDBxELVRSVVNU +IFJvb3QgQ2xhc3MgMiBDQSAyMDA3 +-----END TRUSTED CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2007 +-----BEGIN TRUSTED CERTIFICATE----- +MIIElTCCA32gAwIBAgIDAw6WMA0GCSqGSIb3DQEBBQUAMEsxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJTAjBgNVBAMMHEQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIwMDcwHhcNMDcwNTE2MDUyMDQ3WhcNMjIwNTE2MDUyMDQ3WjBL +MQswCQYDVQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMSUwIwYDVQQDDBxE +LVRSVVNUIFJvb3QgQ2xhc3MgMyBDQSAyMDA3MIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEAuo3NNVMy7qa9SJCa8uroWA9HZqjMbgkS5KHLW9+TuPbpOTn4 +xtjpzxqGvKauD4yvCEXj8o4rwlxZK/qMNrNwHchQPKVWvuqu6Uf250kPr3+UJtQC +Gge4ujlVzp+7Ijkp2DXFmQMh2Kc4Y/HkNN9Hrp838WygmcIisG1y3CLJMTnoVteg +jzohW4aaTyj5HHb3zE8/+U53iyqciqp5QYrVHNk5b5jJXkWXHQmUGdlQUYVyc7+s +S510NHGHIRYPfu7SSX7KSdP5kipHSE8PXVqhy9Uo7PCSxXJDRuuzA6bzVyVKCmGE +CibW76a42BSNeLnTtyXRTuNaFqrsnwfuIxB9tQIDAQABo4IBgDCCAXwwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUgi82I0l4IELXsFJYoNZ0VBV4v6owOQYIKwYB +BQUHAQEELTArMCkGCCsGAQUFBzABhh1odHRwOi8vdXNlcnMub2NzcC5kLXRydXN0 +Lm5ldDAzBgNVHREELDAqgRBpbmZvQGQtdHJ1c3QubmV0hhZodHRwOi8vd3d3LmQt +dHJ1c3QubmV0MA4GA1UdDwEB/wQEAwIBBjCByQYDVR0fBIHBMIG+MIG7oIG4oIG1 +hnZsZGFwOi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290 +JTIwQ2xhc3MlMjAzJTIwQ0ElMjAyMDA3LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9j +ZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0hjtodHRwOi8vd3d3LmQtdHJ1c3QubmV0 +L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yMDA3LmNybDANBgkqhkiG9w0B +AQUFAAOCAQEAVQ5oCo3c2aiGYAJpeY196ZDC2R0dtQ67c5JkYxRGTNBqu6N1XYYZ +OGGGHbiKIjSjtDUVs6lgTFQXn7HeWzLifmveTyLwLR0iBJ62Sk+rLFad493ssSZO +KtdVwj69gte+VbtFyClbhjydP2hEREQ2DWi/rgGiGbVMl//yljxnskLeD+Ggl07K +5zRlrpWCYWcmcy3de+eVSw4hqpKuTPzGs6nlmYMyOfBgwkxRqMFHFDWJpU02D58b +AnFBjUJKJPivbp0NcIaNqmITHgOLJPnDVJNJhRt1dmJ/Iv9JvXZzDD+YrSqy+ufF +33T1/2kxVQo6wBliNcRJuSsZHfRwme7Y3DAqMAoGCCsGAQUFBwMDDBxELVRSVVNU +IFJvb3QgQ2xhc3MgMyBDQSAyMDA3 +-----END TRUSTED CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 2009 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha +ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 +UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 +tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R +ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM +lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp +/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G +A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G +A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj +dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy +MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl +cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js +L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL +BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni +acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K +zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 +PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y +Johw1+qRzT65ysCQblrGXnRl11z+o+IwNjAUBggrBgEFBQcDAQYIKwYBBQUHAwMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOQ== +-----END TRUSTED CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 EV 2009 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw +NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV +BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn +ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 +3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z +qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR +p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 +HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw +ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea +HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw +Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh +c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E +RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt +dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku +Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp +3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF +CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na +xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX +KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1MDkwFAYIKwYB +BQUHAwEGCCsGAQUFBwMDDCFELVRSVVNUIFJvb3QgQ2xhc3MgMyBDQSAyIEVWIDIw +MDk= +-----END TRUSTED CERTIFICATE----- + +# D-Trust SBR Root CA 1 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIICXjCCAeOgAwIBAgIQUs/kjG2gSvc/gpcMgAmMlTAKBggqhkjOPQQDAzBJMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSMwIQYDVQQDExpELVRy +dXN0IFNCUiBSb290IENBIDEgMjAyMjAeFw0yMjA3MDYxMTMwMDBaFw0zNzA3MDYx +MTI5NTlaMEkxCzAJBgNVBAYTAkRFMRUwEwYDVQQKEwxELVRydXN0IEdtYkgxIzAh +BgNVBAMTGkQtVHJ1c3QgU0JSIFJvb3QgQ0EgMSAyMDIyMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEWZM59oxJZijXYQzIq38Moy3foqR8kito1S5+HkDLtGhJfxKhq39X +nxkuYy5b/mZxDDMPud5rxIjDse/sOUDjlqvb5XuuH9z5r0aaakYGL8c3ZIsXYv6W +w6LuhOCwlzm8o4GPMIGMMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFPEpox4B +Eh09dVZNx1B8xRmqDxi3MA4GA1UdDwEB/wQEAwIBBjBKBgNVHR8EQzBBMD+gPaA7 +hjlodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Nicl9yb290X2Nh +XzFfMjAyMi5jcmwwCgYIKoZIzj0EAwMDaQAwZgIxAJf53q5Lj5i1HkB/Mn1NVEPa +ic3CqpI80YIec8/6TJIg+2MnxfVzPQk996dhhozzagIxAOcvfLj1JYw7OR82q431 +hqIu4Xpk2mc5Av7+Mz/Zc7ZYWzr8sqTZYHh3zHmnpq5VvTAoMAoGCCsGAQUFBwME +DBpELVRydXN0IFNCUiBSb290IENBIDEgMjAyMg== +-----END TRUSTED CERTIFICATE----- + +# D-Trust SBR Root CA 2 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFrDCCA5SgAwIBAgIQVNWjlR49lbpyG5rQMSFKujANBgkqhkiG9w0BAQ0FADBJ +MQswCQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSMwIQYDVQQDExpE +LVRydXN0IFNCUiBSb290IENBIDIgMjAyMjAeFw0yMjA3MDcwNzMwMDBaFw0zNzA3 +MDcwNzI5NTlaMEkxCzAJBgNVBAYTAkRFMRUwEwYDVQQKEwxELVRydXN0IEdtYkgx +IzAhBgNVBAMTGkQtVHJ1c3QgU0JSIFJvb3QgQ0EgMiAyMDIyMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAryy8jjaM62SvUWrWbjxekTrqmsPKbPuqJ55k +IqlA37koRVrsU2EWKJjCiqR1eFCE3fogSJIHZUE1ZlESdGGdBwaFOTFXeyg/1Zyl +7FrpHEsnn84nBvM39VLYETMWQTof9WN4ZWOGyb/IAQQfbu7i7KwM7oKS4vYaDT85 ++Z1lk634uQXBPfg3gVbDoP4F7OCUFjojFgTapgqThXJtYTuhjUXW43++Fb02hAj2 +C4NrJqqiveCw56rgrmfE04KlDKmk8DN5DVA/8O+QPSS5f9IgbOqX87+c3EfeCWG9 +lHmVWgJ2NWDERyIN93ZjA9PG+4PGXaut7WklKwNbTSUAQeOMhxdSqOAFK0NNFBPK +5z9DIrw3pHXx9r867zIeru5YhpByugSsQEjvXMR4p6mPJ1rLeuxY8sIIWJBtTQOF +eXEVBQ5OPvnfDwX3XxRIViENM5KxrIzlGP6/D+7gBKq9IfJYtlyJCosYCSIaszXG +ZsL1MxWZgOAI+ZYvE4zu2reIxOk3tddq1zqETatwjNNOFFWgohD8ZNpn6PHLM93J +moqPli9Ygdn4mgBDzJD7VXb7huM3ASgMb/TpWU0Vd1FCSsw0uIBDUIHvV6UT26eU +eQ9Lyn4Xfa+jIWTocVVWjwawR+xZD11wWywWQvCGnnXea01ImITiVxi2nIKZZTqL +gHhXDEkCAwEAAaOBjzCBjDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRds4CU +G+WGv2i6FDSk9u5t8t3f5zAOBgNVHQ8BAf8EBAMCAQYwSgYDVR0fBEMwQTA/oD2g +O4Y5aHR0cDovL2NybC5kLXRydXN0Lm5ldC9jcmwvZC10cnVzdF9zYnJfcm9vdF9j +YV8yXzIwMjIuY3JsMA0GCSqGSIb3DQEBDQUAA4ICAQA0VC5YGFbNSr2X0/V9K9yv +D1HhTbwhS5P0AEQTBxALJRg+SFmW96Hhk5B4Zho9I+siqwGmjgxRM+ZtjDHurKQB +cDlI3sdmLGsNy3Ofh5LpPkcfuO8v7rdWjEiJ8DinFTmy7sA/F6RzAgicvAaKpMK3 +YWH5w9vE0Hp8Yd6xWJH13WVMLwv46z217Yq+dxy6WQISZnHlmCfODj2vUaJF+YL7 +WqWUcPeLhMNMZSWbe+IfMHCzQI467r3052jFnckpR3EOk8i1SE71ZrsHiHFpa3tI +jm/wEcS0yXAUmCC97afqAdpupZsS/j5EMLPw63VSwPTD+ncmpHeCLW/zKB5OlfAw +94n4LKJQW/K+Mn5sVNtyySpa4By2C9hSmlmh47ABJ8WgFlBm3OuubfSbWz2EbVuH +56mJu2644JtTicD/LkAaiUQuGENnOOR8cl/ZoyklQUE9HHcbZKjDVe5jcWZig/R/ +JpmgVDuhEm1wYs7T+bi9IvzUmtS74jgWL7d9OcKwqQPpnM9+GI123F8Ru+tC7FAJ +PlzskDHYGnK6P2kH7pg0wjSk1toT1qmE8gCGwFS6HhGw4rnEB7SR56rmMVZvsUTE +KmK8ybBlnDT8DBpT3yEXu8JtoQrm8bCqRAlQSTh6XXHiMS4ZsN+VQgR9hIjOCiNn +azidFt4G/ihwOKVarvyD7TAoMAoGCCsGAQUFBwMEDBpELVRydXN0IFNCUiBSb290 +IENBIDIgMjAyMg== +-----END TRUSTED CERTIFICATE----- + +# DIGITALSIGN GLOBAL ROOT ECDSA CA +-----BEGIN TRUSTED CERTIFICATE----- +MIICajCCAfCgAwIBAgIUNi2PcoiiKCfkAP8kxi3k6/qdtuEwCgYIKoZIzj0EAwMw +ZDELMAkGA1UEBhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmljYWRv +cmEgRGlnaXRhbDEpMCcGA1UEAwwgRElHSVRBTFNJR04gR0xPQkFMIFJPT1QgRUNE +U0EgQ0EwHhcNMjEwMTIxMTEwNzUwWhcNNDYwMTE1MTEwNzUwWjBkMQswCQYDVQQG +EwJQVDEqMCgGA1UECgwhRGlnaXRhbFNpZ24gQ2VydGlmaWNhZG9yYSBEaWdpdGFs +MSkwJwYDVQQDDCBESUdJVEFMU0lHTiBHTE9CQUwgUk9PVCBFQ0RTQSBDQTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABG4Lo6szTRzqSuj8BI0UoH3wCCxfg6uT0dJ7utdJ +fY/sElBf1LnL5fD5M2MfyVfsQNgRC5foUhbMKY70BoYeONw9V8Tuqr3IVAQmWicT +UUc9Hx8ajqiVpDPQzEfMbbj8SKNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBTOr0qLGnXi8TjnAvAWrV7qZNV7tDAdBgNVHQ4EFgQUzq9Kixp14vE45wLw +Fq1e6mTVe7QwDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2gAMGUCMAqIxHGc +RANNjbTHvKiu2TAnNWprFmPX/OdZ4aeJG0wxmiNVRObzQyHVRydvbVcBqgIxAPuy +6uKXf1G1n0jrvG81iahkcKtXds3AxhRgyn/iggBz98w16o4km+UIWccEjHN4/jAu +MAoGCCsGAQUFBwMEDCBESUdJVEFMU0lHTiBHTE9CQUwgUk9PVCBFQ0RTQSBDQQ== +-----END TRUSTED CERTIFICATE----- + +# DIGITALSIGN GLOBAL ROOT RSA CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFtTCCA52gAwIBAgIUXVnIyqsJV/XmtdoplARq/8XUlYcwDQYJKoZIhvcNAQEN +BQAwYjELMAkGA1UEBhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmlj +YWRvcmEgRGlnaXRhbDEnMCUGA1UEAwweRElHSVRBTFNJR04gR0xPQkFMIFJPT1Qg +UlNBIENBMB4XDTIxMDEyMTEwNTAzNFoXDTQ2MDExNTEwNTAzNFowYjELMAkGA1UE +BhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmljYWRvcmEgRGlnaXRh +bDEnMCUGA1UEAwweRElHSVRBTFNJR04gR0xPQkFMIFJPT1QgUlNBIENBMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyIe2ONMc8N4S+IPHxIriibi0Inp4 ++AxmUWh2NwrVT8JaCLgWXPdyAQk3hIEqVGvXktBs+qinQxI06w7bNw8p/ooxUULo +S5yQqMgsEdP9oCl+zt6U9oLgWLRORSXxIvI90w97VBrcMrbWUU5+QbRXuCzGuQ4u +ylfx1cjTWOel6UIRrtMgJZRp14/Kog3D058HaD8V0mcuU/12gpsLc6kpDZ4RkxQI +mOyeVBJKVqIGFexrbC6SYC6GDa6CH1FN47IH1xAZVyL2qWlEhPPZPaAGv8yIfn/1 +zlulwipqdELqb6b/+Wix0F+9kdJVbzNXTB6d5OKLwYVloOBqnAAAiJLdWAgW8nAx +qBzh3r1OcenWvn61oVrDTfe/m72UpP31qlOTRskmAQRwxKBxus4lZvuRflVw7kkK +TWJ/wlCacvIYZ53pRag0hOj4gfbRWiIeB087s3/dEaVz3L6pGTppqW0bMuKJqqUn +C1p+dOIPZDldfly5wRf8x41eyewk7dLyP3qERTcCvj5rWcTmWxZtwKqeqrVZLixw +VZzMmZaYJFTRjtrKtBG0t3BDH2+QCyCgqHYTZdvbI1p1S6ELMXcK7n1oYRoTjOpR +flxWo1dMXaHrE2W/VBTM8+7c1+w8l/J4Vrjfclxw/M4G3Z/SBzHv51KRns2618AY +RAcxZUkyaRNK648CAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW +gBS1Nrw8jBqrLPZZGS2DFNqTJRXWhjAdBgNVHQ4EFgQUtTa8PIwaqyz2WRktgxTa +kyUV1oYwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBDQUAA4ICAQAU+zElODH4 +ygiyI3Y4rfjTWfXMtFcl4US+fvwW7K76Jp9PZxZKVvD97ccZATSOkFot1oBc7HHS +gSWCHgBx35rR1R0iu9Gl82IPtOvcJHP+plbNmhTFBDUWMaIH66UA4rb4X3L9P2FJ +jt5+TTjXeh50N2xR3L4ABLg4FPMgwe2bpyP9DUKEHX/yc8PQeGPxn+zXW+nxvmyg +SwOejWnhFNqIEIEjU//aVCsLxrmWlQQYRvN7qJfYW2ik5DgcDkXlmNMJrppe7LN5 +DTly8vSUnQ6eYCLmqPZMhc0HgjpoOc09X+M49LavO2tKn2BRRaJAAuWqDOM+0XjU +onScJroFmihwSj6mC9AdSfC6+K5BEH6kBxK9qM8pPVe7x/FDRwA+rnAYWiB7Ccs6 +OnCA5UxgmMEVwR1K98jwm+FyreddaFgLBLGMvJ+3+26LWwRV++sjVdd4UNoly74n +NrskGnkcUdH+E7v/eCzcpL4v9sVLU8+nTJlecKxZiASuZAS/e6Z6TdPod72hflAV +8+9JMIVNIVeq2yx1l62BAYeisXCdHgZaA2CxP6ZtgizUFLGBpeg9iB20cixYN4qO +OJS4c92p4Lj2d6KzfFjermk6tYulGrvy2HQGnP1icyAhdrF+cJ4Z1OsXYhk4mc02 +K0f+McvfueSsCNPYpuvUnn5LZKRVXSsXyTAsMAoGCCsGAQUFBwMEDB5ESUdJVEFM +U0lHTiBHTE9CQUwgUk9PVCBSU0EgQ0E= +-----END TRUSTED CERTIFICATE----- + +# DigiCert Assured ID Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8jA9MB4G +CCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMG0RpZ2lDZXJ0IEFzc3VyZWQg +SUQgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# DigiCert Assured ID Root G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5zA9MB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMG0Rp +Z2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBHMg== +-----END TRUSTED CERTIFICATE----- + +# DigiCert Assured ID Root G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtDA9MB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMG0Rp +Z2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBHMw== +-----END TRUSTED CERTIFICATE----- + +# DigiCert CS ECC P384 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIICFjCCAZ2gAwIBAgIQA2mP5xLVGfPO0P23sWQwETAKBggqhkjOPQQDAzBNMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMTHERp +Z2lDZXJ0IENTIEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcNNDYw +MTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu +Yy4xJTAjBgNVBAMTHERpZ2lDZXJ0IENTIEVDQyBQMzg0IFJvb3QgRzUwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAR/FK2Ftpf9AiE1TWDoOJOTmz0FEG2v0/7v+rv7c5nz +7DISjcdouIveiaKIVHeNuyF+M5VWlgno1YyhBLibbhkAYuhCKKZYN4QZVSZ7Mzdn +8ppyraGurgBCPBx+uHqeIZyjQjBAMB0GA1UdDgQWBBTwjJhxOThlwjobphdmHcjt +Zd6SNjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQD +AwNnADBkAjAjb+EAGSZQ5EYgZYs3p8/rBuHMMskqoewyDXOiHgIcNWEqTmmrOXft +l4jAfWvqid0CMEPx0VijdT6Gm7ZVEYsX9z3+CmnFf07GdRtalMvqERHGCCKI3tB6 +oqV56OMhp80TszAqMAoGCCsGAQUFBwMDDBxEaWdpQ2VydCBDUyBFQ0MgUDM4NCBS +b290IEc1 +-----END TRUSTED CERTIFICATE----- + +# DigiCert CS RSA4096 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFZDCCA0ygAwIBAgIQBs7hMb5tVcgH98DH+0TmIDANBgkqhkiG9w0BAQwFADBM +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJDAiBgNVBAMT +G0RpZ2lDZXJ0IENTIFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBaFw00 +NjAxMTQyMzU5NTlaMEwxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg +SW5jLjEkMCIGA1UEAxMbRGlnaUNlcnQgQ1MgUlNBNDA5NiBSb290IEc1MIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtjNzgNhiA3AULBEcOV58rnyDhh3+ +Ji9MJK2L6oNfqbw9W/wLmEwCRzDs4v7s6DRbZl6/O9cspiX/jFmz3+rafCnZRlBy +CB1u0RsK3R/NmYn6Dw9zxOGcHXUyzW+X2ipqlbJsyQnQ6gt7fRcGSZnv1t7gyFPU +rsZ38Ya7Ixy4wN9Z94590e+C5iaLWji1/3XVstlPCfM3iFDaEaSKFBTRUwQAffNq +RBj+UHAyBxyomg46HcUKH24LJmm3PKJXcCyG+kxulalYQ7msEtb/P+3XQxdrTM6e +xJCr//oQUJqjkFfW54wQrp8WGs81HX/Xdu2KnDWnKLinXSH8MDfd3ggZTxXG56ba +kEeO95RTTI5TAr79meXqhtCvAwLTm6qT8asojiAB/0z7zLcpQPWHpBITBR9DbtdR +UJ84tCDtFwkSj8y5Ga+fzb5pEdOvVRBtF4Z5llLGsgCd5a84sDX0iGuPDgQ9fO6v +zdNqEErGzYbKIj2hSlz7Dv+I31xip8C5HtmsbH44N/53kyXChYpPtTcGWgaBFPHO +lJ2ZkeoyWs5nPW4EZq0MTy2jLvee9Xid9wr9fo/jQopVlrzxnzct/J5flf6MGBv8 +jv1LkK/XA2gSY6zik6eiywTlT2TOA/rGFJ/Zi+jM1GKMa+QALBmfGgbGMYFU+1Mk +mq9Vmbqdda64wt0CAwEAAaNCMEAwHQYDVR0OBBYEFGgBk7HSSkBCaZRGLBxaiKkl +tEdPMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEB +DAUAA4ICAQCS/O64AnkXAlF9IcVJZ6ek8agkOOsMaOpaQmuc9HPBaUotszcFUEKY +kp4GeSwuBpn2798roM2zkgGDtaDLJ7U8IxqYSaLsLZmlWUOs0rGT1lfXHLyT1sZA +4bNvGVW3E9flQzOktavL2sExZA101iztw41u67uvGUdhYS3A9AW5b3jcOvdCQGVT +kb2ZDZOSVKapN1krm8uZxrw99wSE8JQzHQ+CWjnLLkXDKBmjspuYyPwxa2CP9umG +KLzgPH10XRaJW2kkxxCLxEu7Nk/UWT/DsKSRmfgu0UoBnfWIEu+/WhFqWU9Za1pn +84+0Ew/A2C89KHKqGX8RfWpbn5XnX7eUT/E+oVr/Lcyd3yd3jzJzHGcKdvP6XLG/ +vB29DCibsscXZwszD8O9Ntz7ukILq+2Ew2LWhBapsQdrqW7uxs/msEQpwvCzYYAq +i2/SFFwlh1Rk86RMwaH4p2vq/uo6/HnbDo/cxvPJ1Gze6YOhjh0i7Mk6sgB73Dun +Qhp/3IupET2Op8Agb10JXUNE5o9mzKlbB/Hvm3oOs1ThlP0OLMaT11X9cZg1uAlK +/8YpKCz2Ui3bFBiSJ+IWfozK1GG+goeR65g3P79fXXc/NKwbOEOraHKZMh46Ghml +ozhMI9ej58zVKpIXkAtaS70WvfuGauKJmezkoFUYyaMIHxPgMghy0DApMAoGCCsG +AQUFBwMDDBtEaWdpQ2VydCBDUyBSU0E0MDk2IFJvb3QgRzU= +-----END TRUSTED CERTIFICATE----- + +# DigiCert ECC P384 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIICETCCAZegAwIBAgIQDfPZN2WjecWVZuqS4iRPNDAKBggqhkjOPQQDAzBKMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIjAgBgNVBAMTGURp +Z2lDZXJ0IEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcNNDYwMTE0 +MjM1OTU5WjBKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x +IjAgBgNVBAMTGURpZ2lDZXJ0IEVDQyBQMzg0IFJvb3QgRzUwdjAQBgcqhkjOPQIB +BgUrgQQAIgNiAAT8WR/OmWx/mw62KWNvxoXzCtPWm65XFUwO7V3jCX5tKqOGqrp4 +oKdxvUT6CMBKBtZv3SxKOHTl0L3/ev/lOU69vRceH0Ot1bwn2Eu/dowwMqT7+VPl +2Ko4U12ooDegZwqjQjBAMB0GA1UdDgQWBBSSlvfmutURuvkiLnt+WtnwJeUFGzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBl +AjEA/cBN8aSn26cMJhH0Sb0HOGMrRGIGeQjHw9TPmz6rOieqkMf9WaK4MlLbyo4X +CwqQAjBdGuxRidRk3PnlHji9Wy7j5UTkOxh61/CVQI/y68/0+dBlokHysOZ8wTYs +j1453TcwJzAKBggrBgEFBQcDAwwZRGlnaUNlcnQgRUNDIFAzODQgUm9vdCBHNQ== +-----END TRUSTED CERTIFICATE----- + +# DigiCert Global Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4wOTAeBggrBgEFBQcD +BAYIKwYBBQUHAwEGCCsGAQUFBwMDDBdEaWdpQ2VydCBHbG9iYWwgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# DigiCert Global Root G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrYwOTAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBdEaWdpQ2VydCBH +bG9iYWwgUm9vdCBHMg== +-----END TRUSTED CERTIFICATE----- + +# DigiCert Global Root G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycXMDkwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwXRGlnaUNlcnQg +R2xvYmFsIFJvb3QgRzM= +-----END TRUSTED CERTIFICATE----- + +# DigiCert High Assurance EV Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9KMEQwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwiRGln +aUNlcnQgSGlnaCBBc3N1cmFuY2UgRVYgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# DigiCert RSA4096 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFXjCCA0agAwIBAgIQCL+ib5o/M2WirPCmOMQBcDANBgkqhkiG9w0BAQwFADBJ +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xITAfBgNVBAMT +GERpZ2lDZXJ0IFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBaFw00NjAx +MTQyMzU5NTlaMEkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5j +LjEhMB8GA1UEAxMYRGlnaUNlcnQgUlNBNDA5NiBSb290IEc1MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAqr4NsgZ9JvlH6uQb50JpuJnCue4ksUaQy1kk +UlQ1piTCX5EZyLZC1vNHZZVk54VlZ6mufABP4HgDUK3zf464EeeBYrGL3/JJJgne +Dxa82iibociXL5OQ2iAq44TU/6mesC2/tADemx/IoGNTaIVvTYXGqmP5jbI1dmJ0 +A9yTmGgFns2QZd3SejGrJC1tQC6QP2NsLOv6HoBUjXkCkBSztU9O9YgEQ4DDSLMm +L6xRlTJVJS9BlrBWoQg73JgfcoUsd8qYzDj7jnLJbewF7O1NtzxbFFCF3Zf7WfeQ +EvQTv4NNgLIVZRGXYOXWXOYEtVDmcTO2IJOpaAA4zknbtFw7ctdFXFS/zTwBIx58 +1vhpLKUACmwySLTecC06ExfBf2TL8zDtoT2WZ/GUtWBsW2lo9YIzCaK22fOFsm6g +lPDCxH2hLMpz9a7gUpyiZuYDzurf7RjUuWOL9+j/+7Nbj0PFr7d0lFA1Za7WL/GF +j1OhcPSNMl28lsMewgQEnAQPs11+iSDKXicNiUoSI7T2xN3YH/hoszb4HrzG94S2 +6IpOiDA4wCbYcAoJOjQOa4ISlhwv5p6t2HE1gbGMBm70bmb/S0quvfD+11xfU7sy +PM1i0RSgKR8Q3qlyT7GtZOWDKo+L6oSV7pglmJqzcTzBp1DyrEJiMcKhkMbu4reK +qLW2GzsCAwEAAaNCMEAwHQYDVR0OBBYEFGJtt5FPxOqjYmCPoNC+tY8GfGgAMA4G +A1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4IC +AQBh6PsnbdbiuLMJr6rwsYJM/j0XiU0tFZ377tC7hOyEddtDE96Mn8cp74d0yxNw +gVYAdPyu9Nk63iIIUaWgXIJmtntMqdqPq6wcQZZm1p3eVua/TrGyXl/Aw27UwoSQ +9X2xuhbRKYrInenP0McZOz/P7vfhM65CyJjACJ7zWvPf1Cs7jqgoVhnHTnc8JVTc +uEhI0fknaj7sE6+yBYn9VV/zfY4NnAldLIp+hc744b8RPTKMWtd+PfQzWM+iBZij +s/vOib/9whbdbtyISQ0LoAP/50XpBMHp/aqddfi4H4eD2es501qny5isE4kA/G+V +TuF9EUZt9jhGoxOgLAH1Ys+/HFCRJ3Rdt+xHfNDRdct77tFNIwrDYKV3LYDaZw+O +a3YH8KYP6oSuHnm/CIraCfP07rU289R6Q7qUNeH6wTsblpmkV2PrtaiC9634d9d2 +hvN2U1Zb/CZChM6fg5GRr/S+cBWApdjoabHYkVS4GbJi+aL6Ve0Ev7lEhuTP8ZsA +vxEPvrV0JFH/dzRj7EgjDugR63dt2sqCkb6khJNM2qH+zAaE6CHoVLrm0x1jPcJa +/ObJg55yZKmGWQCMwvcTg7bQpDHGrJGOe6QiVhPGdccjvItb/EY9/l1SKa+v6MnD +dkvoq0cC8poN0yyIgAeGwGMPAkyOBFN2uVhCb3wpcF2/JzAmMAoGCCsGAQUFBwMD +DBhEaWdpQ2VydCBSU0E0MDk2IFJvb3QgRzU= +-----END TRUSTED CERTIFICATE----- + +# DigiCert SMIME ECC P384 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIICHDCCAaOgAwIBAgIQBT9uoAYBcn3tP8OjtqPW7zAKBggqhkjOPQQDAzBQMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xKDAmBgNVBAMTH0Rp +Z2lDZXJ0IFNNSU1FIEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBQMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xKDAmBgNVBAMTH0RpZ2lDZXJ0IFNNSU1FIEVDQyBQMzg0IFJvb3QgRzUw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQWnVXlttT7+2drGtShqtJ3lT6I5QeftnBm +ICikiOxwNa+zMv83E0qevAED3oTBuMbmZUeJ8hNVv82lHghgf61/6GGSKc8JR14L +HMAfpL/yW7yY75lMzHBrtrrQKB2/vgSjQjBAMB0GA1UdDgQWBBRzemuW20IHi1Jm +wmQyF/7gZ5AurTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNnADBkAjA3RPUygONx6/Rtz3zMkZrDbnHY0iNdkk2CQm1cYZX2kfWn +CPZql+mclC2YcP0ztgkCMAc8L7lYgl4Po2Kok2fwIMNpvwMsO1CnO69BOMlSSJHW +Dvu8YDB8ZD8SHkV/UT70pjAtMAoGCCsGAQUFBwMEDB9EaWdpQ2VydCBTTUlNRSBF +Q0MgUDM4NCBSb290IEc1 +-----END TRUSTED CERTIFICATE----- + +# DigiCert SMIME RSA4096 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQBfa6BCODRst9XOa5W7ocVTANBgkqhkiG9w0BAQwFADBP +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJzAlBgNVBAMT +HkRpZ2lDZXJ0IFNNSU1FIFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBa +Fw00NjAxMTQyMzU5NTlaME8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy +dCwgSW5jLjEnMCUGA1UEAxMeRGlnaUNlcnQgU01JTUUgUlNBNDA5NiBSb290IEc1 +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4Gpb2fj5fey1e+9f3Vw0 +2Npd0ctldashfFsA1IJvRYVBiqkSAnIy8BT1A3W7Y5dJD0CZCxoeVqfS0OGr3eUE +G+MfFBICiPWggAn2J5pQ8LrjouCsahSRtWs4EHqiMeGRG7e58CtbyHcJdrdRxDYK +mVNURCW3CTWGFwVWkz1BtwLXYh+KkhGH6hFt6ggR3LF4SEmS9rRRgHgj2P7hVho6 +kBNWNInV4pWLX96yzPs/OLeF9+qevy6hLi9NfWoRLjag/xEIBJVV4Bs7Z5OplFXq +Mu0GOn/Cf+OtEyfRNEGzMMO/tIj4A4Kk3z6reHegWZNx593rAAR7zEg5KOAeoxVp +yDayoQuX31XW75GcpPYW91EK7gMjkdwE/+DdOPYiAwDCB3EaEsnXRiqUG83Wuxvu +v75NUFiwC80wdin1z+W2ai92sLBpatBtZRg1fpO8chfBVULNL8Ilu/T9HaFkIlRd +4p5yQYRucZbqRQe2XnpKhp1zZHc4A9IPU6VVIMRN/2hvVanq3XHkT9mFo3xOKQKe +CwnyGlPMAKbd0TT2DcEwsZwCZKw17aWwKbHSlTMP0iAzvewjS/IZ+dqYZOQsMR8u +4Y0cBJUoTYxYzUvlc4KGjOyo1nlc+2S73AxMKPYXr+Jo1haGmNv8AdwxuvicDvko +Rkrh/ZYGRXkRaBdlXIsmh1sCAwEAAaNCMEAwHQYDVR0OBBYEFNGj1FcdT1XbdUxc +Qp5jFs60xjsfMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqG +SIb3DQEBDAUAA4ICAQAHpwreU7ua63C/sjaQzeSnuPEM5F1aHXhl/Mm4HiMRV3xp +NW0B/1NQvwcOuscBP1gqlHUDqxwLI9wbih43PR1Yj3PZsypv3xCgWwynyrB/uSSi +ATUy5V5GQevYf3PnQumkUSZ3gQqo6w8KUJ1+iiBn/AuOOhHTxYxgGNlLsfzU8bRJ +Tq6H4dH7dqFf8wbPl5YM6Z51gVxTDSL8NuZJbnTbAIWNfCKgjvsQTNRiE1vvS3Im +i/xOio/+lxBTxXiLQmQbX+CJ/bsJf1DgVIUmEWodZflJKdx8Nt/7PffSrO4yjW6m +fTmcRcTKDfU7tHlTpS9Wx1HFikxkXZBDI45rTBd4zOi/9TvkqEjPrZsM3zJK09kS +jiN4DS2vn6+ePAnClwDtOmkccT8539OPxGb17zaUD/PdkraWX5Cm3XOqpiCUlCVq +CQxy5BMjYEyjyhcue2cA29DN6nofOSZXiTB3y07llUVPX/s2XD35ILU6ECVPkzJa +7sGW6OlWBLBJYU3seKidGMH/2OovVu+VK3sEXmfjVUDtOQT5C3n1aoxcD4makMfN +i97bJjWhbs2zQvKiDzsMjpP/FM/895P35EEIbhlSEQ9TGXN4DM/YhYH4rVXIsJ5G +Y6+cUu5cv/DAWzceCSDSPiPGoRVKDjZ+MMV5arwiiNkMUkAf3U4PZyYW0q0XHDAs +MAoGCCsGAQUFBwMEDB5EaWdpQ2VydCBTTUlNRSBSU0E0MDk2IFJvb3QgRzU= +-----END TRUSTED CERTIFICATE----- + +# DigiCert TLS ECC P384 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIICGTCCAZ+gAwIBAgIQCeCTZaz32ci5PhwLBCou8zAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJjAkBgNVBAMTHURp +Z2lDZXJ0IFRMUyBFQ0MgUDM4NCBSb290IEc1MB4XDTIxMDExNTAwMDAwMFoXDTQ2 +MDExNDIzNTk1OVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ +bmMuMSYwJAYDVQQDEx1EaWdpQ2VydCBUTFMgRUNDIFAzODQgUm9vdCBHNTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABMFEoc8Rl1Ca3iOCNQfN0MsYndLxf3c1TzvdlHJS +7cI7+Oz6e2tYIOyZrsn8aLN1udsJ7MgT9U7GCh1mMEy7H0cKPGEQQil8pQgO4CLp +0zVozptjn4S1mU1YoI71VOeVyaNCMEAwHQYDVR0OBBYEFMFRRVBZqz7nLFr6ICIS +B4CIfBFqMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MAoGCCqGSM49 +BAMDA2gAMGUCMQCJao1H5+z8blUD2WdsJk6Dxv3J+ysTvLd6jLRl0mlpYxNjOyZQ +LgGheQaRnUi/wr4CMEfDFXuxoJGZSZOoPHzoRgaLLPIxAJSdYsiJvRmEFOml+wG4 +DXZDjC5Ty3zfDBeWUDArMAoGCCsGAQUFBwMBDB1EaWdpQ2VydCBUTFMgRUNDIFAz +ODQgUm9vdCBHNQ== +-----END TRUSTED CERTIFICATE----- + +# DigiCert TLS RSA4096 Root G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCPm0eKj6ftpqMzeJ3nzPijANBgkqhkiG9w0BAQwFADBN +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMT +HERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xJTAjBgNVBAMTHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCz0PTJeRGd/fxmgefM1eS87IE+ +ajWOLrfn3q/5B03PMJ3qCQuZvWxX2hhKuHisOjmopkisLnLlvevxGs3npAOpPxG0 +2C+JFvuUAT27L/gTBaF4HI4o4EXgg/RZG5Wzrn4DReW+wkL+7vI8toUTmDKdFqgp +wgscONyfMXdcvyej/Cestyu9dJsXLfKB2l2w4SMXPohKEiPQ6s+d3gMXsUJKoBZM +pG2T6T867jp8nVid9E6P/DsjyG244gXazOvswzH016cpVIDPRFtMbzCe88zdH5RD +nU1/cHAN1DrRN/BsnZvAFJNY781BOHW8EwOVfH/jXOnVDdXifBBiqmvwPXbzP6Po +sMH976pXTayGpxi0KcEsDr9kvimM2AItzVwv8n/vFfQMFawKsPHTDU9qTXeXAaDx +Zre3zu/O7Oyldcqs4+Fj97ihBMi8ez9dLRYiVu1ISf6nL3kwJZu6ay0/nTvEF+cd +Lvvyz6b84xQslpghjLSR6Rlgg/IwKwZzUNWYOwbpx4oMYIwo+FKbbuH2TbsGJJvX +KyY//SovcfXWJL5/MZ4PbeiPT02jP/816t9JXkGPhvnxd3lLG7SjXi/7RgLQZhNe +XoVPzthwiHvOAbWWl9fNff2C+MIkwcoBOU+NosEUQB+cZtUMCUbW8tDRSHZWOkPL +tgoRObqME2wGtZ7P6wIDAQABo0IwQDAdBgNVHQ4EFgQUUTMc7TZArxfTJc1paPKv +TiM+s0EwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcN +AQEMBQADggIBAGCmr1tfV9qJ20tQqcQjNSH/0GEwhJG3PxDPJY7Jv0Y02cEhJhxw +GXIeo8mH/qlDZJY6yFMECrZBu8RHANmfGBg7sg7zNOok992vIGCukihfNudd5N7H +PNtQOa27PShNlnx2xlv0wdsUpasZYgcYQF+Xkdycx6u1UQ3maVNVzDl92sURVXLF +O4uJ+DQtpBflF+aZfTCIITfNMBc9uPK8qHWgQ9w+iUuQrm0D4ByjoJYJu32jtyoQ +REtGBzRj7TG5BO6jm5qu5jF49OokYTurWGT/u4cnYiWB39yhL/btp/96j1EuMPik +AdKFOV8BmZZvWltwGUb+hmA+rYAQCd05JS9Yf7vSdPD3Rh9GOUrYU9DzLjtxpdRv +/PNn5AeP3SYZ4Y1b+qOTEZvpyDrDVWiakuFSdjjo4bq9+0/V77PnSIMx8IIh47a+ +p6tv75/fTM8BuGJqIz3nCU2AG3swpMPdB380vqQmsvZB6Akd4yCYqjdP//fx4ilw +MUc/dNAUFvohigLVigmUdy7yWSiLfFCSCmZ4OIN1xLVaqBHG5cGdZlXPU8Sv13WF +qUITVuwhd4GTWgzqltlJyqEI8pc7bZsEGCREjnwB8twl2F6GmrE52/WRMmrRpnCK +ovfepEWFJqgejF0pW8hL2JpqA15w8oVPbEtoL8pU9ozaMv7Da4M/OMZ+MCowCgYI +KwYBBQUHAwEMHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzU= +-----END TRUSTED CERTIFICATE----- + +# DigiCert Trusted Root G4 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+MDowHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwwYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 +-----END TRUSTED CERTIFICATE----- + +# Digidentity L3 Root CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFoTCCA4mgAwIBAgIBATANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTDEZ +MBcGA1UEChMQRGlnaWRlbnRpdHkgQi5WLjEkMCIGA1UEAxMbRGlnaWRlbnRpdHkg +TDMgUm9vdCBDQSAtIEcyMB4XDTExMDQyOTEwNDQxOVoXDTMxMTExMDEwNDQxOVow +TjELMAkGA1UEBhMCTkwxGTAXBgNVBAoTEERpZ2lkZW50aXR5IEIuVi4xJDAiBgNV +BAMTG0RpZ2lkZW50aXR5IEwzIFJvb3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBALgRo0XeAUdWDWK4jrpYZlz6MsZrgG64f/hT337fYqjB +V0+aRSXISkUtUzgksyCsT+qt/5oQr3/iDsq0DiQlkc52jhCpL5lTp5BLBItterlB +G9MBeYyfQWu5kNeBEhoHltAJr+nkaiFTgLiGnmJoQ62zahX69m0DMmo1sVATSMd6 +tSETnASc2pP5aivBpxj99sB+Wfb75w4Rtdwj6hzvZwVXzhfp8Xux0TIkjM9l59S8 +NhlwfKInIdaA0i0VT0q14FWQlVGTIYDznEQf/x1VVeTiEBGUFlPQ/q/z75e6RuJ3 +W8vWolkRiKbnVUHDkmUdIxRiFH8lciD2pIcpbwf8/uDQGNKX+RSONsboDBiX8XYc +9CTa40r5t0wSGWfz8OFT+13kwHRjXyWRCtk+9DOs5At1X87mmLxUDZ2iMcUVVF0i +HIs6VKYN0dcjOqw+qkoXZHYtDftU5euCPDlBQ53hrnlgz2bux3GDewxrCdueok1O +RpNot/pn4dq/35GA2qOiia1ebMxLd3Vkb40k44iIC+M/6b+n5VZiDYN/vWphyJCJ +eFsMrxIq4pOtZOfZRS72sMirRe5wOG+7NT4W/quew2Yv874JYNVvgL1N26+N/gxg +M2sP6J1rxDB3nyxQONCYaew36J4P5GLq+v8RRFTZ782TdZFM4YllppS5U/n5SWPF +AgMBAAGjgYkwgYYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFCsjIGC9LYqIR6ytK74CObqY1OyYMEQGA1UdIAQ9MDswOQYEVR0gADAx +MC8GCCsGAQUFBwIBFiNodHRwOi8vcGtpLmRpZ2lkZW50aXR5LmV1L3ZhbGlkYXRp +ZTANBgkqhkiG9w0BAQsFAAOCAgEAqf3vuo8bfjISZx1BDS2mi8/y9K1WeH4KmNib +qNG0SywmrOTSf2c3vQmN5blzETpuCcdXZAchNPgOXSrYkXzxVFG8nPAMakL0PAFO +k0VBPazzmEsecR4zWTL/fDDwXOThvi0uterdYiEOPbQNlfzJuNm6oPdip+3DA64I +LEHV70NxOLcUcq4/9BR0R9jejFF5zu+xVKxwR5Z+LS7dm+6hAS4Z775YYHEtrZdb +WmAwyzKCYk5W5WdqtNIxVHI/AtC8MDmPt0MJKh8mOwzHfB2bgGCEDuku0vkVu1vg +iqQA6eMp+yhbvTZFYCFDMf9woV9cg1uXfA23U1nsmLVO4imx1HxG4+jjQ+o6ljUf +U/EEFiXjLPNooaaR3xX7vZ/mTp7CVGt+IlfjpJxcIiUfga+ZyN8RFUhD+LMzqSN/ +DjOPvEYdQ7Q7YPWXhRmiFrBV3BpwKWXa2X4JFzTribrpYZLY3jRjPEpVar/ahu3O +M967U2/PHNqUT3ZUrGVVEFOayLhr3AbmuuVR1UF/H8TAQaFgkTTzE4LRoXfT90zk +Gf/XRJqwtbzcyl6P3M7xoGk24ESSLpn6vK+zx3g6VWbHa6XkaSbpNB0fKpcK6Xep +d1tzSDKBv//R7IPFcINpnpgbw1ffkZUcgPyN6JaDBdOfeoh7+uhX8cGEKL3N1hzM +peJJCnMwKTAKBggrBgEFBQcDAwwbRGlnaWRlbnRpdHkgTDMgUm9vdCBDQSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# E-ME SSI (RCA) +-----BEGIN TRUSTED CERTIFICATE----- +MIIF4DCCA8igAwIBAgIQLu/b+9iJPY9JHJNy/kXf7TANBgkqhkiG9w0BAQUFADBQ +MQswCQYDVQQGEwJMVjEoMCYGA1UECxMfU2VydGlmaWthY2lqYXMgcGFrYWxwb2p1 +bXUgZGFsYTEXMBUGA1UEAxMORS1NRSBTU0kgKFJDQSkwHhcNMDkwNTE5MDg0NTU2 +WhcNMjcwNTE5MDg0ODE1WjBQMQswCQYDVQQGEwJMVjEoMCYGA1UECxMfU2VydGlm +aWthY2lqYXMgcGFrYWxwb2p1bXUgZGFsYTEXMBUGA1UEAxMORS1NRSBTU0kgKFJD +QSkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDEBGsAw7DgLjvoUwUF +CL7IhCdV1h2KEuIXIlps/7PdtpnDysHq+dgltd86nZ0/UsXp8qy/iXSKVK5Oz27y +Xq7avRIHmZXPZKv+mZFkWYzJvkRqMZuY6rrq0SEOKAs5m+PWiqb3Aro/PdlZ9HmZ +3tMkm4twGyqE1uUJDyYmJFiPJV7zxZ10iaU2xeVSsuvohpNHbqcph6R+3LSjyzJW +90WA2lzHL6Cn1+/1/LWozYSVYvipKyM7bdO3ksjqwbwUTehrnBZ60+wH+wclEE8U +h3uSNs5WgmVLEyYG2KOjpt/Cevt7NQWiEz0+drwcV4MDUcc03lr1PL02JZwWD03O +6A0ay11DohRvunxg1AKFdsVrKrhFsVx3RxGtoCWpZpGMURdtYVUKGT+bAv/E9dbS +s+klU+EEPY8i0KJl5a6ntOAdkWrChpL3Ol0Tp3pMQt9as0qIRCzvR7qpr9bPYnOK +BiIWLMLsHwao00dQWTIS5bmdYjWeyl4KtJ0jiMLTTywsyZPofrgJ7KbZ3WPhyahq +aNyEUaxaEuc7prUHCrGqTrO0olffN2wWTquZMnrwnCMli8qaqIzgOCG0zvdsYcji +DBJZBoEmNloPNXPUFkX93pXe1ktcn3PZvhm957/kVWrIa0T3x7gziHkZDQZk6K8L +oXUMUmW6CiOVcfdj/H7ljI/M0QIDAQABo4G1MIGyMA4GA1UdDwEB/wQEAwIBBjAY +BggrBgEFBQcBAwQMMAowCAYGBACORgEBMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFDsmA7rP41lGQlCtFJy/Azvv1j4xMBAGCSsGAQQBgjcVAQQDAgEAMEQGA1Ud +IAQ9MDswOQYLKwYBBAGB+j0BAQEwKjAoBggrBgEFBQcCARYcaHR0cDovL3d3dy5l +bWUubHYvcmVwb3NpdG9yeTANBgkqhkiG9w0BAQUFAAOCAgEAheamlOTZRl+dv5O7 ++Wt2ZCiuvzxFKoqTeWzTS4iGIGsiJjg9HBOq62GXbC4+V5xsQ6LebUDEMfJtukYW +sy3Gu6bc5S+x2MHVkR4Rf/tfodwdYfhtm2Hw4j8rcdUNy97fZT+gb5WbesvbNTcp +XV6duVSxrGAS5WPZza9SGwWWE3zaJHUBrdSepcvBEkVPV68jvym86o6tePiHI+hI +y0Covl0z1uzGBkPCZyro44UuYJ5ELytPMbEHnZUh1SqSr4CR08cpvc3xFQyfAe74 +LTukB3BJeSTtvKHTllGCn8LIvN4jmsdQK5q2eFKqzpX2YDuimfkmZvRHLEElvEH6 +1ot/vV+CfNNFhbRM2OyzF+9EOvUoZe/1nnHMId7o1lEcEPtA/EnlXIQXr6oZXqLt +Th6i+8pHHBxkPhSRojkZNIh/kcs7nRlw6ij7/FAPzL09XgIDa3k1REF27rYtdITh +gnHTJbDTw5lEqz/iDKXuvab8pBEA7py9N9HWYsQwFC0QCpeKiPUlPJa+RkAaisCF +dsSgSeBJpecZtQnzzE3tFl6a1NPIadDYijeFa07kqgeSXNRxcYFI03j1VmD+zALU +AJMfTJJAl75yU3kuJlK+pqN0sZTZFGM6blvRPJInUpAyWpLSD05bCwY6YuXWJwwB +9iUCuIsQKUKp92nK3OsKkksoMYYwHDAKBggrBgEFBQcDAwwORS1NRSBTU0kgKFJD +QSk= +-----END TRUSTED CERTIFICATE----- + +# E-Tugra Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNV +BAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBC +aWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNV +BAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQDDB9FLVR1 +Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMwNTEyMDk0OFoXDTIz +MDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+ +BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhp +em1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN +ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4vU/kwVRHoViVF56C/UY +B4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vdhQd2h8y/L5VMzH2nPbxH +D5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5KCKpbknSF +Q9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEo +q1+gElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3D +k14opz8n8Y4e0ypQBaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcH +fC425lAcP9tDJMW/hkd5s3kc91r0E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsut +dEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gzrt48Ue7LE3wBf4QOXVGUnhMM +ti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAqjqFGOjGY5RH8 +zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn +rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUX +U8u3Zg5mTPj5dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6 +Jyr+zE7S6E5UMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5 +XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAF +Nzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAKkEh47U6YA5n+KGCR +HTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jOXKqY +GwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c +77NCR807VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3 ++GbHeJAAFS6LrVE1Uweoa2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WK +vJUawSg5TB9D0pH0clmKuVb8P7Sd2nCcdlqMQ1DujjByTd//SffGqWfZbawCEeI6 +FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEVKV0jq9BgoRJP3vQXzTLl +yb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gTDx4JnW2P +AJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpD +y4Q08ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8d +NL/+I5c30jn6PQ0GC7TbO6Orb1wdtn7os4I07QZcJDAtMAoGCCsGAQUFBwMDDB9F +LVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# E-Tugra Global Root CA ECC v3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICpTCCAiqgAwIBAgIUJkYZdzHhT28oNt45UYbm1JeIIsEwCgYIKoZIzj0EAwMw +gYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUtVHVn +cmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYwJAYD +VQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIEVDQyB2MzAeFw0yMDAzMTgwOTQ2 +NThaFw00NTAzMTIwOTQ2NThaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMGQW5r +YXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1Z3Jh +IFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBDQSBF +Q0MgdjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASOmCm/xxAeJ9urA8woLNheSBkQ +KczLWYHMjLiSF4mDKpL2w6QdTGLVn9agRtwcvHbB40fQWxPa56WzZkjnIZpKT4YK +fWzqTTKACrJ6CZtpS5iB4i7sAnCWH/31Rs7K3IKjYzBhMA8GA1UdEwEB/wQFMAMB +Af8wHwYDVR0jBBgwFoAU/4Ixcj75xGZsrTie0bBRiKWQzPUwHQYDVR0OBBYEFP+C +MXI++cRmbK04ntGwUYilkMz1MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNp +ADBmAjEA5gVYaWHlLcoNy/EZCL3W/VGSGn5jVASQkZo1kTmZ+gepZpO6yGjUij/6 +7W4WAie3AjEA3VoXK3YdZUKWpqxdinlW2Iob35reX8dQj7FbcQwm32pAAOwzkSFx +vmjkI6TZraE3MCswCgYIKwYBBQUHAwMMHUUtVHVncmEgR2xvYmFsIFJvb3QgQ0Eg +RUNDIHYz +-----END TRUSTED CERTIFICATE----- + +# E-Tugra Global Root CA RSA v3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF8zCCA9ugAwIBAgIUDU3FzRYilZYIfrgLfxUGNPt5EDQwDQYJKoZIhvcNAQEL +BQAwgYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUt +VHVncmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYw +JAYDVQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIFJTQSB2MzAeFw0yMDAzMTgw +OTA3MTdaFw00NTAzMTIwOTA3MTdaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMG +QW5rYXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1 +Z3JhIFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBD +QSBSU0EgdjMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCiZvCJt3J7 +7gnJY9LTQ91ew6aEOErxjYG7FL1H6EAX8z3DeEVypi6Q3po61CBxyryfHUuXCscx +uj7X/iWpKo429NEvx7epXTPcMHD4QGxLsqYxYdE0PD0xesevxKenhOGXpOhL9hd8 +7jwH7eKKV9y2+/hDJVDqJ4GohryPUkqWOmAalrv9c/SF/YP9f4RtNGx/ardLAQO/ +rWm31zLZ9Vdq6YaCPqVmMbMWPcLzJmAy01IesGykNz709a/r4d+ABs8qQedmCeFL +l+d3vSFtKbZnwy1+7dZ5ZdHPOrbRsV5WYVB6Ws5OUDGAA5hH5+QYfERaxqSzO8bG +wzrwbMOLyKSRBfP12baqBqG3q+Sx6iEUXIOk/P+2UNOMEiaZdnDpwA+mdPy70Bt4 +znKS4iicvObpCdg604nmvi533wEKb5b25Y08TVJ2Glbhc34XrD2tbKNSEhhw5oBO +M/J+JjKsBY04pOZ2PJ8QaQ5tndLBeSBrW88zjdGUdjXnXVXHt6woq0bM5zshtQoK +5EpZ3IE1S0SVEgpnpaH/WwAH0sDM+T/8nzPyAPiMbIedBi3x7+PmBvrFZhNb/FAH +nnGGstpvdDDPk1Po3CLW3iAfYY2jLqN4MpBs3KwytQXk9TwzDdbgh3cXTJ2w2Amo +DVf3RIXwyAS+XF1a4xeOVGNpf0l0ZAWMowIDAQABo2MwYTAPBgNVHRMBAf8EBTAD +AQH/MB8GA1UdIwQYMBaAFLK0ruYt9ybVqnUtdkvAG1Mh0EjvMB0GA1UdDgQWBBSy +tK7mLfcm1ap1LXZLwBtTIdBI7zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL +BQADggIBAImocn+M684uGMQQgC0QDP/7FM0E4BQ8Tpr7nym/Ip5XuYJzEmMmtcyQ +6dIqKe6cLcwsmb5FJ+Sxce3kOJUxQfJ9emN438o2Fi+CiJ+8EUdPdk3ILY7r3y18 +Tjvarvbj2l0Upq7ohUSdBm6O++96SmotKygY/r+QLHUWnw/qln0F7psTpURs+APQ +3SPh/QMSEgj0GDSz4DcLdxEBSL9htLX4GdnLTeqjjO/98Aa1bZL0SmFQhO3sSdPk +vmjmLuMxC1QLGpLWgti2omU8ZgT5Vdps+9u1FGZNlIM7zR6mK7L+d0CGq+ffCsn9 +9t2HVhjYsCxVYJb6CH5SkPVLpi6HfMsg2wY+oF0Dd32iPBMbKaITVaA9FCKvb7jQ +mhty3QUBjYZgv6Rn7rWlDdF/5horYmbDB7rnoEgcOMPpRfunf/ztAmgayncSd6YA +VSgU7NbHEqIbZULpkejLPoeJVF3Zr52XnGnnCv8PWniLYypMfUeUP95L6VPQMPHF +9p5J3zugkaOj/s1YzOrfr28oO6Bpm4/srK4rVJ2bBLFHIK+WEj5jlB0E5y67hscM +moi/dkfv97ALl2bSRM9gUgfh1SxKOidhd8rXj+eHDjD/DLsE4mHDosiXYY60MGo8 +bcIHX0pzLz/5FooBZu+6kcpSV3uu1OYP3Qt6f4ueJiDPO++BcYNZMCswCgYIKwYB +BQUHAwMMHUUtVHVncmEgR2xvYmFsIFJvb3QgQ0EgUlNBIHYz +-----END TRUSTED CERTIFICATE----- + +# EBG Elektronik Sertifika Hizmet Sağlayıcısı +-----BEGIN TRUSTED CERTIFICATE----- +MIIF5zCCA8+gAwIBAgIITK9zQhyOdAIwDQYJKoZIhvcNAQEFBQAwgYAxODA2BgNV +BAMML0VCRyBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sx +c8SxMTcwNQYDVQQKDC5FQkcgQmlsacWfaW0gVGVrbm9sb2ppbGVyaSB2ZSBIaXpt +ZXRsZXJpIEEuxZ4uMQswCQYDVQQGEwJUUjAeFw0wNjA4MTcwMDIxMDlaFw0xNjA4 +MTQwMDMxMDlaMIGAMTgwNgYDVQQDDC9FQkcgRWxla3Ryb25payBTZXJ0aWZpa2Eg +SGl6bWV0IFNhxJ9sYXnEsWPEsXPEsTE3MDUGA1UECgwuRUJHIEJpbGnFn2ltIFRl +a25vbG9qaWxlcmkgdmUgSGl6bWV0bGVyaSBBLsWeLjELMAkGA1UEBhMCVFIwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDuoIRh0DpqZhAy2DE4f6en5f2h +4fuXd7hxlugTlkaDT7byX3JWbhNgpQGR4lvFzVcfd2NR/y8927k/qqk153nQ9dAk +tiHq6yOU/im/+4mRDGSaBUorzAzu8T2bgmmkTPiab+ci2hC6X5L8GCcKqKpE+i4s +tPtGmggDg3KriORqcsnlZR9uKg+ds+g75AxuetpX/dfreYteIAbTdgtsApWjluTL +dlHRKJ2hGvxEok3MenaoDT2/F08iiFD9rrbskFBKW5+VQarKD7JK/oCZTqNGFav4 +c0JqwmZ2sQomFd2TkuzbqV9UIlKRcF0T6kjsbgNs2d1s/OsNA/+mgxKb8amTD8Um +TDGyY5lhcucqZJnSuOl14nypqZoaqsNW2xCaPINStnuWt6yHd6i58mcLlEOzrz5z ++kI2sSXFCjEmN1ZnuqMLfdb3ic1nobc6HmZP9qBVFCVMLDMNpkGMvQQxahByCp0O +Lna9XvNRiYuoP1Vzv9s6xiQFlpJIqkuNKgPlV5EQ9GooFW5Hd4RcUXSfGenmHmMW +OeMRFeNYGkS9y8RsZteEBt8w9DeiQyJ50hBs37vmExH8nYQKE3vwO9D8owrXieqW +fo1IhR5kX9tUoqzVegJ5a9KK8GfaZXINFHDk6Y54jzJ0fFfy1tb0Nokb+Clsi7n2 +l9GkLqq+CxnCRelwXQIDAJ3Zo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB +/wQEAwIBBjAdBgNVHQ4EFgQU587GT/wWZ5b6SqMHwQSny2re2kcwHwYDVR0jBBgw +FoAU587GT/wWZ5b6SqMHwQSny2re2kcwDQYJKoZIhvcNAQEFBQADggIBAJuYml2+ +8ygjdsZs93/mQJ7ANtyVDR2tFcU22NU57/IeIl6zgrRdu0waypIN30ckHrMk2pGI +6YNw3ZPX6bqz3xZaPt7gyPvT/Wwp+BVGoGgmzJNSroIBk5DKd8pNSe/iWtkqvTDO +TLKBtjDOWU/aWR1qeqRFsIImgYZ29fUQALjuswnoT4cCB64kXPBfrAowzIpAoHME +wfuJJPaaHFy3PApnNgUIMbOv2AFoKuB4j3TeuFGkjGwgPaL7s9QJ/XvCgKqTbCmY +Iai7FvOpEl90tYeY8pUm3zTvilORiF0alKM/fCL414i6poyWqD1SNGKfAB5UVUJn +xk1Gj7sURT0KlhaOEKGXmdXTMIXM3rRyt7yKPBgpaP3ccQfuJDlq+u2lrDgv+R4Q +DgZxGhBM/nV+/x5XOULK1+EVoVZVWRvRo68R2E7DpSvvkL/A7IITW43WciyTTo9q +Kd+FPNMN4KIYEsxVL0e3p5sC/kH2iExt2qkBR4NkJ2IQgtYSe14DHzSpyZH+r11t +hie3I6p1GMog57AP14kOpmciY/SDQSsGS7tY1dHXt7kQY9iJSrSq3RZj9W6+YKH4 +7ejWkE8axsWgKdOnIaj1Wjz3x0miIZpKlVIglnKaZsv30oZDfCK+lvm9AahH3eU7 +QPl1K5srRmSGjR70j/sHd9DqSaIcjVIUpgqTMD0wCgYIKwYBBQUHAwMML0VCRyBF +bGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8Sx +-----END TRUSTED CERTIFICATE----- + +# EC-ACC +-----BEGIN TRUSTED CERTIFICATE----- +MIIFVjCCBD6gAwIBAgIQ7is969Qh3hSoYqwE893EATANBgkqhkiG9w0BAQUFADCB +8zELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2Vy +dGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMSgwJgYDVQQLEx9TZXJ2ZWlzIFB1 +YmxpY3MgZGUgQ2VydGlmaWNhY2lvMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3 +dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAoYykwMzE1MDMGA1UECxMsSmVyYXJxdWlh +IEVudGl0YXRzIGRlIENlcnRpZmljYWNpbyBDYXRhbGFuZXMxDzANBgNVBAMTBkVD +LUFDQzAeFw0wMzAxMDcyMzAwMDBaFw0zMTAxMDcyMjU5NTlaMIHzMQswCQYDVQQG +EwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8g +KE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBD +ZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQu +bmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMg +ZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUNDMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyLHT+KXQpWIR4NA9h0X84NzJB5R +85iKw5K4/0CQBXCHYMkAqbWUZRkiFRfCQ2xmRJoNBD45b6VLeqpjt4pEndljkYRm +4CgPukLjbo73FCeTae6RDqNfDrHrZqJyTxIThmV6PttPB/SnCWDaOkKZx7J/sxaV +HMf5NLWUhdWZXqBIoH7nF2W4onW4HvPlQn2v7fOKSGRdghST2MDk/7NQcvJ29rNd +QlB50JQ+awwAvthrDk4q7D7SzIKiGGUzE3eeml0aE9jD2z3Il3rucO2n5nzbcc8t +lGLfbdb1OL4/pYUKGbio2Al1QnDE6u/LDsg0qBIimAy4E5S2S+zw0JDnJwIDAQAB +o4HjMIHgMB0GA1UdEQQWMBSBEmVjX2FjY0BjYXRjZXJ0Lm5ldDAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUoMOLRKo3pUW/l4Ba0fF4 +opvpXY0wfwYDVR0gBHgwdjB0BgsrBgEEAfV4AQMBCjBlMCwGCCsGAQUFBwIBFiBo +dHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbDA1BggrBgEFBQcCAjApGidW +ZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAwDQYJKoZIhvcN +AQEFBQADggEBAKBIW4IB9k1IuDlVNZyAelOZ1Vr/sXE7zDkJlF7W2u++AVtd0x7Y +/X1PzaBB4DSTv8vihpw3kpBWHNzrKQXlxJ7HNd+KDM3FIUPpqojlNcAZQmNaAl6k +SBg6hW/cnbw/nZzBh7h6YQjpdwt/cKt63dmXLGQehb+8dJahw3oS7AwaboMMPOhy +Rp/7SNVel+axofjk70YllJyJ22k4vuxcDlbHZVHlUIiIv0LVKz3l+bqeLrPK9HOS +Agu+TGbrIP65y7WZf+a2E/rKS03Z7lNGBjvGTq2TWoF+bCpLagVFjPIhpDGQh2xl +nJ2lYJU6Un/10asIbvPuW/mIPX64b24D5EIwFDAKBggrBgEFBQcDAwwGRUMtQUND +-----END TRUSTED CERTIFICATE----- + +# ECRaizEstado +-----BEGIN TRUSTED CERTIFICATE----- +MIIFbjCCA1agAwIBAgIPQupbClERJnzYJ3S3339xMA0GCSqGSIb3DQEBBQUAMDMx +CzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3Rh +ZG8wHhcNMDYwNjIzMTM0MTI3WhcNMzAwNjIzMTM0MTI3WjAzMQswCQYDVQQGEwJQ +VDENMAsGA1UECgwEU0NFRTEVMBMGA1UEAwwMRUNSYWl6RXN0YWRvMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA2++iQ27Iqf1u19+sopKEochZoAyaU/7v +rswZDXKKpMIzI+/nBnLqbUs6QVIPyUgOLee6ZO6iOkxjXGYpi9+piMW96PH3jkv8 +ATxEEjkqcKLA28Wi31/HS8ao3D1hfEpYwUQyk95wmaEjJlY/o+HqXzBG2Hj1MKOW +CYmwPfGGkwW2EmoYjfClZDsrh2RePReOC27mmMyXODggjHBaaSu9ZY3NN1lcbNFy +dFkGTsi3Add3v/BIhqizGl1B1DcXERBfSm6NdcUDQH0hrgDw2/yfbDpmpN/3yt+A +ZlrZ2H8UoiYZ9K4LIeDKPgXdFth+WdqhsGnDnTQT+mVJOYfudi+NvTwnGQNOrQ4L +KyzGLnETNSlX6XDcG1HqzZfxlY2yhvomBi+AGpXxmDvu9uWGpc4bAeX06TPKD1VE +X2iKLMdbZijdlkuDnV4dfhjV/rJg+5pRaMOWjB9oS1BSCzbmMSfk1ykMG9obL+EE +U7jUeUmwO4FeCIgid+IpwK5yqqu0clK9bLv1unjZnLggbzCNSp0y+fQB5mJ5mEJA +BXpvHCo/tfvfzRhAjuUQxDlbVvE8VwWr0jlNP/iLI8druUCx4v7/sxwKaR+bjA+0 +H+AK3kj9jV+PmfUBdgU2XY7cM45RbhHiQf3Mt40qXz6S5fKx4KQj4qK3xo0YmylK +0UZ/9GQgGN0CAwEAAaN/MH0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFHF/Nd71d3FtHRKc4ZCkuvCpg4+AMDsGA1UdIAQ0MDIwMAYE +VR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVjZWUuZ292LnB0L2RwYzAN +BgkqhkiG9w0BAQUFAAOCAgEAjK2ccqW1Z3ZnOIfpOoz+nVk1vpDxAwCgWNiY0b/8 +/PNQ3LRl1dq68IwufA3mCZFfTaP2XXicWF1qcJSjr9svAMkDQGvfUQMWGYwrvJk2 +9sCtkhgTjKftHdLfA5AF7LCTmJv3TVoT+Oeb9zZ23nwm+BE4T0lOs3MfXydb4Z4y +HvbAmBvZICxclo2GyQtF15Ktir3qV6KjVrYgPOyyxzl+sID+vVErKrTDcmnD+Ucu +bv+ch+3cdcsQiOC0zi4OUx0L6G4eQkzQvjl4dckU3ieRc6rsaoDw8BeWYk++BMvi +p+VdD5NFy1lIJhPe3bH1CtoWsagdj35YG7fVCd6Ia86EPqi+UmLK0qGhx8s8FuB2 +VjA/5g9rBnf+ZJ1aanN87t4h6ZpJlze2hH+ikT5F+9daBsWHNdy6SEyGAQhHNrY4 +UJURmXPRN0kK+kJPLxBU00GQ+sjcuxHcDcx9fJvcDpFxhk248hWaKzgXEaHynqhs +nOPOruLmS4vyigY7B3cCEe6D6p1mhsrwYqnVV4OkFfFFFP4adX+lD9xSdFl1Cvj7 +VUGpXI0xRN3NlE4z0RtBqtvXoTzwxUhtRUE1tXmD5vlN8VY4179AIvsggOMcwllG +B2MCYQA7m1C7Q8Ow6QqauHb0R2FVZHBPN9mcEaMTsuHdQEK7mNegBovmaFdLDjho +f7owGjAKBggrBgEFBQcDAwwMRUNSYWl6RXN0YWRv +-----END TRUSTED CERTIFICATE----- + +# EE Certification Centre Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEAzCCAuugAwIBAgIQVID5oHPtPwBMyonY43HmSjANBgkqhkiG9w0BAQUFADB1 +MQswCQYDVQQGEwJFRTEiMCAGA1UECgwZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1 +czEoMCYGA1UEAwwfRUUgQ2VydGlmaWNhdGlvbiBDZW50cmUgUm9vdCBDQTEYMBYG +CSqGSIb3DQEJARYJcGtpQHNrLmVlMCIYDzIwMTAxMDMwMTAxMDMwWhgPMjAzMDEy +MTcyMzU5NTlaMHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNl +ZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBS +b290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWUwggEiMA0GCSqGSIb3DQEB +AQUAA4IBDwAwggEKAoIBAQDIIMDs4MVLqwd4lfNE7vsLDP90jmG7sWLqI9iroWUy +euuOF0+W2Ap7kaJjbMeMTC55v6kF/GlclY1i+blw7cNRfdCT5mzrMEvhvH2/UpvO +bntl8jixwKIy72KyaOBhU8E2lf/slLo2rpwcpzIP5Xy0xm90/XsY6KxX7QYgSzIw +WFv9zajmofxwvI6Sc9uXp3whrj3B9UiHbCe9nyV0gVWw93X2PaRka9ZP585ArQ/d +MtO8ihJTmMmJ+xAdTX7Nfh9WDSFwhfYggx/2uh8Ej+p3iDXE/+pOoYtNP2MbRMNE +1CV2yreN1x5KZmTNXMWcg+HCCIia7E6j8T4cLNlsHaFLAgMBAAGjgYowgYcwDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBLyWj7qVhy/ +zQas8fElyalL1BSZMEUGA1UdJQQ+MDwGCCsGAQUFBwMCBggrBgEFBQcDAQYIKwYB +BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCAYIKwYBBQUHAwkwDQYJKoZIhvcNAQEF +BQADggEBAHv25MANqhlHt01Xo/6tu7Fq1Q+e2+RjxY6hUFaTlrg4wCQiZrxTFGGV +v9DHKpY5P30osxBAIWrEr7BSdxjhlthWXePdNl4dp1BUoMUq5KqMlIpPnTX/dqQG +E5Gion0ARD9V04I8GtVbvFZMIi5GQ4okQC3zErg7cBqklrkar4dBGmoYDQZPxz5u +uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIW +iAYLtqZLICjU3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/v +GVCJYMzpJJUPwssd8m92kMfMdcGWxZ0wLTAKBggrBgEFBQcDAwwfRUUgQ2VydGlm +aWNhdGlvbiBDZW50cmUgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Entrust.net Premium 2048 Secure Server CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVEwSzAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMD +DClFbnRydXN0Lm5ldCBQcmVtaXVtIDIwNDggU2VjdXJlIFNlcnZlciBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Entrust Code Signing Root Certification Authority - CSBR1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUf/Go+fQ66IduLcb/XkM9su4wpkMwDQYJKoZIhvcNAQEN +BQAwaTELMAkGA1UEBhMCVVMxFjAUBgNVBAoMDUVudHJ1c3QsIEluYy4xQjBABgNV +BAMMOUVudHJ1c3QgQ29kZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgLSBDU0JSMTAeFw0yMTA1MDcxMzI2MzZaFw00MDEyMzAxMzI2MzZaMGkx +CzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlF +bnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2 +YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5o +G6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9 +Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/ +tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc +51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJeth +l3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH +2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb +9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbN +e0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1n +AZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9 +zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo0IwQDAdBgNVHQ4EFgQUgrrW +PZfOn89x6JI3r/2ztWk1V88wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwDQYJKoZIhvcNAQENBQADggIBABLvOKGI4aGj1mXcR5zzvNzPrEuMPBq+K/T3 +0GcXaIZNcKjyzdAxAld9qQyKO1c5nvBu9yQiBWfRwZbBvtHw+FZnC96614ibjddr +CHb1WJHZtcNAUxqk8YXNPwBOP06TO3i50gdSZAyGaW3oVGVWF+gAU4SK89v7s84L +VWKPzUxJBjh/UsPzHNc99zPKMq3Bqa9v6xHL7qxRv7AmmnpOI7RK9mm0QmnWoI22 +jEdKOyA3t0EH7y8g2GYcaZeobDB8d0Nea74mmIMPOtbHcCoWRi0lVIZjZVdC9yNB +6VBqB0POTrXpH2jY2NYJSqjosvyQZ5LkkCbzR/rWIPuJgOJEczn3ioYzC/iqqedN +7Nxv1c8xTauOH5BA1nxcgg+uF1Jx6aznTTjtKth2eYetF6NMq7dCV78GrOXQTTDp +VU/jRcrz4GohNI3HnxyjY0iS0pYHvqVHPsIqmTinjtohfFFt3Ms9B+mpvUnUXTVf +W4wEUeqaWJC6G69oeLEWD5QpO4+bKo/JIPBxQkxcTasxjKvpfyZoaaClFg2BxNEF +DMOHZuUHY6obTv+yB0FPpSJGUKxmAIdSbDyyO5yXoUa0W97PwmpZVQeMo6TRdzVn +RgQv2Ti5Rq+6jhtyJgIvdlTvg8IvLHdwzHcQkqoDrcrM4E/pg0blszwZb3p5h7Y4 +mr1CzqRiMEcwCgYIKwYBBQUHAwMMOUVudHJ1c3QgQ29kZSBTaWduaW5nIFJvb3Qg +Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBDU0JSMQ== +-----END TRUSTED CERTIFICATE----- + +# Entrust Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 +Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW +KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw +NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw +NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy +ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV +BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo +Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 +4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 +KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI +rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi +94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB +sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi +gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo +kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE +vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA +A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t +O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua +AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP +9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ +eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m +0vdXcDazv/wor3ElhVsT/h5/WrQ8MDwwFAYIKwYBBQUHAwEGCCsGAQUFBwMDDCRF +bnRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk= +-----END TRUSTED CERTIFICATE----- + +# Entrust Root Certification Authority - EC1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4GMEww +HgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwqRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMx +-----END TRUSTED CERTIFICATE----- + +# Entrust Root Certification Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9jBLMB4GCCsGAQUFBwME +BggrBgEFBQcDAQYIKwYBBQUHAwMMKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9u +IEF1dGhvcml0eSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# Entrust Root Certification Authority - G4 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHzBLMB4GCCsGAQUFBwMEBggr +BgEFBQcDAQYIKwYBBQUHAwMMKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1 +dGhvcml0eSAtIEc0 +-----END TRUSTED CERTIFICATE----- + +# Equifax +-----BEGIN TRUSTED CERTIFICATE----- +MIIDIDCCAomgAwIBAgIENd70zzANBgkqhkiG9w0BAQUFADBOMQswCQYDVQQGEwJV +UzEQMA4GA1UEChMHRXF1aWZheDEtMCsGA1UECxMkRXF1aWZheCBTZWN1cmUgQ2Vy +dGlmaWNhdGUgQXV0aG9yaXR5MB4XDTk4MDgyMjE2NDE1MVoXDTE4MDgyMjE2NDE1 +MVowTjELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0VxdWlmYXgxLTArBgNVBAsTJEVx +dWlmYXggU2VjdXJlIENlcnRpZmljYXRlIEF1dGhvcml0eTCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAwV2xWGcIYu6gmi0fCG2RFGiYCh7+2gRvE4RiIcPRfM6f +BeC4AfBONOziipUEZKzxa1NfBbPLZ4C/QgKO/t0BCezhABRP/PvwDN1Dulsr4R+A +cJkVV5MW8Q+XarfCaCMczE1ZMKxRHjuvK9buY0V7xdlfUNLjUA86iOe/FP3gx7kC +AwEAAaOCAQkwggEFMHAGA1UdHwRpMGcwZaBjoGGkXzBdMQswCQYDVQQGEwJVUzEQ +MA4GA1UEChMHRXF1aWZheDEtMCsGA1UECxMkRXF1aWZheCBTZWN1cmUgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5MQ0wCwYDVQQDEwRDUkwxMBoGA1UdEAQTMBGBDzIwMTgw +ODIyMTY0MTUxWjALBgNVHQ8EBAMCAQYwHwYDVR0jBBgwFoAUSOZo+SvSspXXR9gj +IBBPM5iQn9QwHQYDVR0OBBYEFEjmaPkr0rKV10fYIyAQTzOYkJ/UMAwGA1UdEwQF +MAMBAf8wGgYJKoZIhvZ9B0EABA0wCxsFVjMuMGMDAgbAMA0GCSqGSIb3DQEBBQUA +A4GBAFjOKer89961zgK5F7WF0bnj4JXMJTENAKaSbn+2kmOeUJXRmm/kEd5jhW6Y +7qj/WsjTVbJmcVfewCHrPSqnI0kBBIZCe/zuf6IWUrVnZ9NA2zsmWLIodz2uFHdh +1voqZiegDfqnc1zqcPGUIWVEX/r87yloqaKHee9570+sB3c4MBUwCgYIKwYBBQUH +AwMMB0VxdWlmYXg= +-----END TRUSTED CERTIFICATE----- + +# Equifax Secure Global eBusiness CA-1 +-----BEGIN TRUSTED CERTIFICATE----- +MIICkDCCAfmgAwIBAgIBATANBgkqhkiG9w0BAQQFADBaMQswCQYDVQQGEwJVUzEc +MBoGA1UEChMTRXF1aWZheCBTZWN1cmUgSW5jLjEtMCsGA1UEAxMkRXF1aWZheCBT +ZWN1cmUgR2xvYmFsIGVCdXNpbmVzcyBDQS0xMB4XDTk5MDYyMTA0MDAwMFoXDTIw +MDYyMTA0MDAwMFowWjELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0VxdWlmYXggU2Vj +dXJlIEluYy4xLTArBgNVBAMTJEVxdWlmYXggU2VjdXJlIEdsb2JhbCBlQnVzaW5l +c3MgQ0EtMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuucXkAJlsTRVPEnC +UdXfp9E3j9HngXNBUmCbnaEXJnitx7HoJpQytd4zjTov2/KaelpzmKNc6fuKcxtc +58O/gGzNqfTWK8D3+ZmqY6KxRwIP1ORROhI8bIpaVIRw28HFkM9yRcuoWcDNM50/ +o5brhTMhHD4ePmBudpxnhcXIw2ECAwEAAaNmMGQwEQYJYIZIAYb4QgEBBAQDAgAH +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUvqigdHJQa0S3ySPY+6j/s1dr +aGwwHQYDVR0OBBYEFL6ooHRyUGtEt8kj2Puo/7NXa2hsMA0GCSqGSIb3DQEBBAUA +A4GBADDiAVGqx+pf2rnQZQ8w1j7aDRRJbpGTJxQx78T3LUX47Me/okENI7SS+RkA +Z70Br83gcfxaz2TE4JaY0KNA4gGK7ycH8WUBikQtBmV1UsCGECAhX2xrD2yuCRyv +8qIYNMR1pHMc8Y3c7635s3a0kr/clRAevsvIO1qEYBlWlKlVMDIwCgYIKwYBBQUH +AwMMJEVxdWlmYXggU2VjdXJlIEdsb2JhbCBlQnVzaW5lc3MgQ0EtMQ== +-----END TRUSTED CERTIFICATE----- + +# Explicitly Distrust DigiNotar Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFijCCA3KgAwIBAgIQD////////////////////zANBgkqhkiG9w0BAQUFADBf +MQswCQYDVQQGEwJOTDESMBAGA1UEChMJRGlnaU5vdGFyMRowGAYDVQQDExFEaWdp +Tm90YXIgUm9vdCBDQTEgMB4GCSqGSIb3DQEJARYRaW5mb0BkaWdpbm90YXIubmww +HhcNMDcwNzI3MTcxOTM3WhcNMjUwMzMxMTgxOTIyWjBfMQswCQYDVQQGEwJOTDES +MBAGA1UEChMJRGlnaU5vdGFyMRowGAYDVQQDExFEaWdpTm90YXIgUm9vdCBDQTEg +MB4GCSqGSIb3DQEJARYRaW5mb0BkaWdpbm90YXIubmwwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCssFjBAL3YIQgLK5r+blYwBZ8bd5AQQVzDDYcRd46B +8cp86Yxq7Th0Nbva3/m7wAk3tJZzgX0zGpg595NvlX89ubF1h7pRSOiLcD6VBMXY +tsMW2YiwsYcdcNqGtA8Ui3rPENF0NqISe3eGSnnme98CEWilToauNFibJBN4ViIl +HgGLS1Fx+4LMWZZpiFpoU8W5DQI3y0u8ZkqQfioLBQftFl9VkHXYRskbg+IIvvEj +zJkd1ioPgyAVWCeCLvriIsJJsbkBgWqdbZ1Ad2h2TiEqbYRAhU52mXyC8/O3AlnU +JgEbjt+tUwbRrhjd4rI6y9eIOI6sWym5GdOY+RgDz0iChmYLG2kPyes4iHomGgVM +ktck1JbyrFIto0fVUvY//s6EBnCmqj6i8rZWNBhXouSBbefK8GrTx5FrAoNBfBXv +a5pkXuPQPOWx63tdhvvL5ndJzaNl3Pe5nLjkC1+Tz8wwGjIczhxjlaX56uF0i57p +K6kwe6AYHw4YC+VbqdPRbB4HZ4+RS6mKvNJmqpMBiLKR+jFc1abBUggJzQpjotMi +puih2TkGl/VujQKQjBR7P4DNG5y6xFhyI6+2Vp/GekIzKQc/gsnmHwUNzUwoNovT +yD4cxojvXu6JZOkd69qJfjKmadHdzIif0dDJZiHcBmfFlHqabWJMfczgZICynkeO +owIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNV +HQ4EFgQUiGi/4I41xDs4a2L3KDuEgcgM100wDQYJKoZIhvcNAQEFBQADggIBADsC +jcs8MOhuoK3yc7NfniUTBAXT9uOLuwt5zlPe5JbF0a9zvNXD0EBVfEB/zRtfCdXy +fJ9oHbtdzno5wozWmHvFg1Wo1X1AyuAe94leY12hE8JdiraKfADzI8PthV9xdvBo +Y6pFITlIYXg23PFDk9Qlx/KAZeFTAnVR/Ho67zerhChXDNjU1JlWbOOi/lmEtDHo +M/hklJRRl6s5xUvt2t2AC298KQ3EjopyDedTFLJgQT2EkTFoPSdE2+Xe9PpjRchM +Ppj1P0G6Tss3DbpmmPHdy59c91Q2gmssvBNhl0L4eLvMyKKfyvBovWsdst+Nbwed +2o5nx0ceyrm/KkKRt2NTZvFCo+H0Wk1Ya7XkpDOtXHAd3ODy63MUkZoDweoAZbwH +/M8SESIsrqC9OuCiKthZ6SnTGDWkrBFfGbW1G/8iSlzGeuQX7yCpp/Q/rYqnmgQl +nQ7KN+ZQ/YxCKQSa7LnPS3K94gg2ryMvYuXKAdNw23yCIywWMQzGNgeQerEfZ1jE +O1hZibCMjFCz2IbLaKPECudpSyDOwR5WS5WpI2jYMNjD67BVUc3l/Su49bsRn1NU +9jQZjHkJNsphFyUXC4KYcwx3dMPVDceoEkzHp1RxRy4sGn3J4ys7SN4nhKdjNrN9 +j6BkOSQNPXuHr2ZcdBtLc7LljPCGmbjlxd+EwbfrMIGXoG4GCCsGAQUFBwMEBggr +BgEFBQcDAQYIKwYBBQUHAwMGCCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMG +CCsGAQUFBwMEBggrBgEFBQcDBQYIKwYBBQUHAwYGCCsGAQUFBwMHBggrBgEFBQcD +CAwlRXhwbGljaXRseSBEaXN0cnVzdCBEaWdpTm90YXIgUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# FIRMAPROFESIONAL CA ROOT-A WEB +-----BEGIN TRUSTED CERTIFICATE----- +MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2WhcNNDcwMzMxMDkwMTM2WjBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zf +e9MEkVz6iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6C +cyvHZpsKjECcfIr28jlgst7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB +/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FDY1w8ndYn81LsF7Kpryz3dvgwHQYDVR0O +BBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjO +PQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgLcFBTApFw +hVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dG +XSaQpYXFuXqUPoeovQAwLDAKBggrBgEFBQcDAQweRklSTUFQUk9GRVNJT05BTCBD +QSBST09ULUEgV0VC +-----END TRUSTED CERTIFICATE----- + +# GDCA TrustAUTH R5 ROOT +-----BEGIN TRUSTED CERTIFICATE----- +MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE +BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ +IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 +MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV +BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w +HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj +Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj +TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u +KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj +qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm +MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 +ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP +zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk +L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC +jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA +HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC +AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg +p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm +DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 +COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry +L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf +JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg +IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io +2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV +09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ +XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq +T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe +MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0jAuMBQGCCsGAQUFBwMBBggrBgEF +BQcDAwwWR0RDQSBUcnVzdEFVVEggUjUgUk9PVA== +-----END TRUSTED CERTIFICATE----- + +# GLOBALTRUST +-----BEGIN TRUSTED CERTIFICATE----- +MIIH/jCCBeagAwIBAgIBADANBgkqhkiG9w0BAQUFADCB1DELMAkGA1UEBhMCQVQx +DzANBgNVBAcTBlZpZW5uYTEQMA4GA1UECBMHQXVzdHJpYTE6MDgGA1UEChMxQVJH +RSBEQVRFTiAtIEF1c3RyaWFuIFNvY2lldHkgZm9yIERhdGEgUHJvdGVjdGlvbjEq +MCgGA1UECxMhR0xPQkFMVFJVU1QgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRQwEgYD +VQQDEwtHTE9CQUxUUlVTVDEkMCIGCSqGSIb3DQEJARYVaW5mb0BnbG9iYWx0cnVz +dC5pbmZvMB4XDTA2MDgwNzE0MTIzNVoXDTM2MDkxODE0MTIzNVowgdQxCzAJBgNV +BAYTAkFUMQ8wDQYDVQQHEwZWaWVubmExEDAOBgNVBAgTB0F1c3RyaWExOjA4BgNV +BAoTMUFSR0UgREFURU4gLSBBdXN0cmlhbiBTb2NpZXR5IGZvciBEYXRhIFByb3Rl +Y3Rpb24xKjAoBgNVBAsTIUdMT0JBTFRSVVNUIENlcnRpZmljYXRpb24gU2Vydmlj +ZTEUMBIGA1UEAxMLR0xPQkFMVFJVU1QxJDAiBgkqhkiG9w0BCQEWFWluZm9AZ2xv +YmFsdHJ1c3QuaW5mbzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANIS +R+xfmOgNhhVJxN3snvFszVG2+5VPi8SQPVMzsdMTxUjipb/19AOED5x4cfaSl/Fb +WXUYPycLUS9caMeh6wDz9pU9acN+wqzECjZyelum0PcBeyjHKscyYO5ZuNcLJ92z +RQUre2Snc1zokwKXaOz8hNue1NWBR8acwKyXyxnqh6UKo7h1JOdQJw2rFvlWXbGB +ARZ98+nhJPMIIbm6rF2ex0h5f2rK3zl3BG0bbjrNf85cSKwSPFnyas+ASOH2AGd4 +IOD9tWR7F5ez5SfdRWubYZkGvvLnnqRtiztrDIHutG+hvhoSQUuerQ75RrRa0QMA +lBbAwPOs+3y8lsAp2PkzFomjDh2V2QPUIQzdVghJZciNqyEfVLuZvPFEW3sAGP0q +GVjSBcnZKTYl/nfua1lUTwgUopkJRVetB94i/IccoO+ged0KfcB/NegMZk3jtWoW +WXFb85CwUl6RAseoucIEb55PtAAt7AjsrkBu8CknIjm2zaCGELoLNex7Wg22ecP6 +x63B++vtK4QN6t7565pZM2zBKxKMuD7FNiM4GtZ3k5DWd3VqWBkXoRWObnYOo3Ph +XJVJ28EPlBTF1WIbmas41Wdu0qkZ4Vo6h2pIP5GW48bFJ2tXdDGY9j5xce1+3rBN +LPPuj9t7aNcQRCmt7KtQWVKabGpyFE0WFFH3134fAgMBAAGjggHXMIIB0zAdBgNV +HQ4EFgQUwAHV4HgfL3Q64+vAIVKmBO4my6QwggEBBgNVHSMEgfkwgfaAFMAB1eB4 +Hy90OuPrwCFSpgTuJsukoYHapIHXMIHUMQswCQYDVQQGEwJBVDEPMA0GA1UEBxMG +Vmllbm5hMRAwDgYDVQQIEwdBdXN0cmlhMTowOAYDVQQKEzFBUkdFIERBVEVOIC0g +QXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0aW9uMSowKAYDVQQLEyFH +TE9CQUxUUlVTVCBDZXJ0aWZpY2F0aW9uIFNlcnZpY2UxFDASBgNVBAMTC0dMT0JB +TFRSVVNUMSQwIgYJKoZIhvcNAQkBFhVpbmZvQGdsb2JhbHRydXN0LmluZm+CAQAw +DwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAcYwEQYDVR0gBAowCDAGBgRVHSAA +MD0GA1UdEQQ2MDSBFWluZm9AZ2xvYmFsdHJ1c3QuaW5mb4YbaHR0cDovL3d3dy5n +bG9iYWx0cnVzdC5pbmZvMD0GA1UdEgQ2MDSBFWluZm9AZ2xvYmFsdHJ1c3QuaW5m +b4YbaHR0cDovL3d3dy5nbG9iYWx0cnVzdC5pbmZvMA0GCSqGSIb3DQEBBQUAA4IC +AQAVO4iDXg7ePvA+XdwtoUr6KKXWB6UkSM6eeeh5mlwkjlhyFEGFx0XuPChpOEmu +Io27jAVtrmW7h7l+djsoY2rWbzMwiH5VBbq5FQOYHWLSzsAPbhyaNO7krx9i0ey0 +ec/PaZKKWP3Bx3YLXM1SNEhr5Qt/yTIS35gKFtkzVhaP30M/170/xR7FrSGshyya +5BwfhQOsi8e3M2JJwfiqK05dhz52Uq5ZfjHhfLpSi1iQ14BGCzQ23u8RyVwiRsI8 +p39iBG/fPkiO6gs+CKwYGlLW8fbUYi8DuZrWPFN/VSbGNSshdLCJkFTkAYhcnIUq +mmVeS1fygBzsZzSaRtwCdv5yN3IJsfAjj1izAn3ueA65PXMSLVWfF2Ovrtiuc7bH +UGqFwdt9+5RZcMbDB2xWxbAH/E59kx25J8CwldXnfAW89w8Ks/RuFVdJG7UUAKQw +K1r0Vli/djSiPf4BJvDduG3wpOe8IPZRCPbjN4lXNvb3L/7NuGS96tem0P94737h +HB5Ufg80GYEQc9LjeAYXttJR+zV4dtp3gzdBPi1GqH6G3lb0ypCetK2wHkUYPDSI +Aofo8DaR6/LntdIEuS64XY0dmi4LFhnNdqSr+9Hio6LchH176lDq9bIEO4lSOrLD +GU+5JrG8vCyy4YGms2G19EVgLyx1xcgtiEsmu3DuO38BLTAZMAoGCCsGAQUFBwMD +DAtHTE9CQUxUUlVTVA== +-----END TRUSTED CERTIFICATE----- + +# GLOBALTRUST 2015 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGDDCCA/SgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCQVQx +DTALBgNVBAgTBFdpZW4xDTALBgNVBAcTBFdpZW4xIzAhBgNVBAoTGmUtY29tbWVy +Y2UgbW9uaXRvcmluZyBHbWJIMSowKAYDVQQLEyFHTE9CQUxUUlVTVCBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2UxGTAXBgNVBAMTEEdMT0JBTFRSVVNUIDIwMTUwHhcNMTUw +NjExMDAwMDAwWhcNNDAwNjEwMDAwMDAwWjCBlzELMAkGA1UEBhMCQVQxDTALBgNV +BAgTBFdpZW4xDTALBgNVBAcTBFdpZW4xIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMSowKAYDVQQLEyFHTE9CQUxUUlVTVCBDZXJ0aWZpY2F0aW9u +IFNlcnZpY2UxGTAXBgNVBAMTEEdMT0JBTFRSVVNUIDIwMTUwggIgMA0GCSqGSIb3 +DQEBAQUAA4ICDQAwggIIAoICAQDUppeo8vSQEUOttIJGQfEvkW9jos0NINy9DDiK +ZUoKKzqodKl3oYuO8i+B94QYza3rYraSfeBB5U5UODeC78vg7c+7ysyjS/db/rh8 +pwhty0PETCIUZuOdA7l3IatEayFHI8gg+irLkXYddWz4m+kPJulDL5ogBWgYx46Z +hS1BB6ZkjljhjZWApE1f9QLYgXnb1effoiL9FKdnFuzZWEzKqd3qGo6pCGRPUSG2 +cqJO/1BxvTtl5L1/UxGu3xA5e132R3AX90ORA3phJV8s/PiJETzsOVQWScQhmnHg +eYt2HXY9B1m4B7GM3MfNTuH7rUNNP0DvIWIvMUROacdvIsurVEvowvoRaKzIbg7e +bMUnlglRAk0Btle/MijVCUOW98SItflU/ho6arcstSRk+0p4csP82U/ITiO5KdgN +oUhBkwJtvxKFm8bFYC3wkfyZ/SCUnnFjq9VJq5DshzmFf42FzAvo20s7DvzCdn1G +5zkmnt9V3x6E+UE2JmwCWSuO+7zpHyckYgRnhOE/2J0YTpagJe7KKANPAlHP9zU3 +aaS01tbVHhlDJxYfR1HuSglMEVq2Wz1h6DsQvtZG5vQc/bhFvXz6dVrs4VIjDY4f +hpdTkVybmyjWjuVuJ60gjKfBQamXN4ss6m4YBZf2zgNS8b15NJtAxyOSdPNv7aPp +WfBVSwIBA6NjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFMuw3T2MPN9iLCtmPJ486RVtcbTXMB8GA1UdIwQYMBaAFMuw3T2MPN9i +LCtmPJ486RVtcbTXMA0GCSqGSIb3DQEBCwUAA4ICAQCifVUEZu4WFLyCgYclGTli +9P47H+HAcwBxynWp4nPxxQ1Bo12OwS3ZZVvZieLwjsWgfb3LzEZTH1/tILYCKtYT +8p19UUpAVXGtnux26kUgjqr6ekOacGd+E96Y6MuN3R+sNNKhte3+uOcWz/jRODCN +NInSzn2B0h7/URhTNpPcCcsIFrgI11owkIoK+S+1z8TNVHIqxr0B51gLbgZAtAnO +tI6zmumJkZSselTh++OELIOgT/7r6MH067Ym0zjELa2sRYA0bSE9XYU64nv+VLfd +6IVUy6TxqylQeNcktaMvnq8RZq4YuP1dKM9A11XgLOtSMWhDZgWXkrvF8SEs/RJk +MZlDb4udS2D+FF5SsyOo4Zh67hTJoeLMP3YhYv1rDdm0SpXmblt6JMPTxtYfous3 +a06j32Lr6w5KCL/rGIj7RxqtwlHD1Xz3HyuzyEpQDmlYIGIBSlvKY5YmIq726ZxA +rGcDnZ1pFcLA+F2nJLEnPL8F4quiysmwLX6jwTEgRiFlkt3K3t+TG7xtL1+pFqRX +hyxymlqCZ9FE4j0JCoGMHhD9xjRo7P93YXZ/Jvfb/BJGEqrA0fh5haICzIuqpK1s +FMC9/GiuRH0i+QpFXewE5vrjpMXm+bIZw9mMqJN7OoppO1ITPB0zAk6WQJ+5lf2T +FzPByQv2/b1pEPWtKfvj2jAeMAoGCCsGAQUFBwMDDBBHTE9CQUxUUlVTVCAyMDE1 +-----END TRUSTED CERTIFICATE----- + +# GLOBALTRUST 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkjAyMB4GCCsGAQUFBwMEBggrBgEFBQcDAQYI +KwYBBQUHAwMMEEdMT0JBTFRSVVNUIDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# GTE CyberTrust Global Root +-----BEGIN TRUSTED CERTIFICATE----- +MIICWjCCAcMCAgGlMA0GCSqGSIb3DQEBBAUAMHUxCzAJBgNVBAYTAlVTMRgwFgYD +VQQKEw9HVEUgQ29ycG9yYXRpb24xJzAlBgNVBAsTHkdURSBDeWJlclRydXN0IFNv +bHV0aW9ucywgSW5jLjEjMCEGA1UEAxMaR1RFIEN5YmVyVHJ1c3QgR2xvYmFsIFJv +b3QwHhcNOTgwODEzMDAyOTAwWhcNMTgwODEzMjM1OTAwWjB1MQswCQYDVQQGEwJV +UzEYMBYGA1UEChMPR1RFIENvcnBvcmF0aW9uMScwJQYDVQQLEx5HVEUgQ3liZXJU +cnVzdCBTb2x1dGlvbnMsIEluYy4xIzAhBgNVBAMTGkdURSBDeWJlclRydXN0IEds +b2JhbCBSb290MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVD6C28FCc6HrH +iM3dFw4usJTQGz0O9pTAipTHBsiQl8i4ZBp6fmw8U+E3KHNgf7KXUwefU/ltWJTS +r41tiGeA5u2ylc9yMcqlHHK6XALnZELn+aks1joNrI1CqiQBOeacPwGFVw1Yh0X4 +04Wqk2kmhXBIgD8SFcd5tB8FLztimQIDAQABMA0GCSqGSIb3DQEBBAUAA4GBAG3r +GwnpXtlR22ciYaQqPEh346B8pt5zohQDhT37qw4wxYMWM4ETCJ57NE7fQMh017l9 +3PR2VX2bY1QY6fDq81yx2YtCHrnAlU66+tXifPVoYb+O7AWXX1uw16OFNMQkpw0P +lZPvy5TYnh+dXIVtx6quTx8itc2VrbqnzPmrC3p/MCgwCgYIKwYBBQUHAwMMGkdU +RSBDeWJlclRydXN0IEdsb2JhbCBSb290 +-----END TRUSTED CERTIFICATE----- + +# GTS Root R1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo +27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w +Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw +TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl +qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH +szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 +Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk +MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 +wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p +aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN +VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb +C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe +QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy +h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 +7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J +ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef +MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ +Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT +6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ +0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm +2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb +bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3cMCMwFAYIKwYBBQUHAwQGCCsGAQUF +BwMBDAtHVFMgUm9vdCBSMQ== +-----END TRUSTED CERTIFICATE----- + +# GTS Root R2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt +nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY +6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu +MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k +RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg +f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV ++3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo +dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW +Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa +G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq +gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H +vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 +0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC +B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u +NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg +yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev +HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 +xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR +TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg +JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV +7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl +6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbLMCMwFAYIKwYBBQUHAwQGCCsGAQUF +BwMBDAtHVFMgUm9vdCBSMg== +-----END TRUSTED CERTIFICATE----- + +# GTS Root R3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G +jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 +4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 +VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm +ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4XMCMw +FAYIKwYBBQUHAwQGCCsGAQUFBwMBDAtHVFMgUm9vdCBSMw== +-----END TRUSTED CERTIFICATE----- + +# GTS Root R4 +-----BEGIN TRUSTED CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi +QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR +HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D +9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 +p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlDMCMw +FAYIKwYBBQUHAwQGCCsGAQUFBwMBDAtHVFMgUm9vdCBSNA== +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Global CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i +YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG +EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg +R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9 +9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq +fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv +iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU +1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+ +bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW +MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA +ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l +uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn +Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS +tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF +PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un +hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV +5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMzAgMAoGCCsG +AQUFBwMDDBJHZW9UcnVzdCBHbG9iYWwgQ0E= +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Global CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDZjCCAk6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBEMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UEAxMUR2VvVHJ1c3QgR2xvYmFs +IENBIDIwHhcNMDQwMzA0MDUwMDAwWhcNMTkwMzA0MDUwMDAwWjBEMQswCQYDVQQG +EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UEAxMUR2VvVHJ1c3Qg +R2xvYmFsIENBIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDvPE1A +PRDfO1MA4Wf+lGAVPoWI8YkNkMgoI5kF6CsgncbzYEbYwbLVjDHZ3CB5JIG/NTL8 +Y2nbsSpr7iFY8gjpeMtvy/wWUsiRxP89c96xPqfCfWbB9X5SJBri1WeR0IIQ13hL +TytCOb1kLUCgsBDTOEhGiKEMuzozKmKY+wCdE1l/bztyqu6mD4b5BWHqZ38MN5aL +5mkWRxHCJ1kDs6ZgwiFAVvqgx306E+PsV8ez1q6diYD3Aecs9pYrEw15LNnA5IZ7 +S4wMcoKK+xfNAGw6EzywhIdLFnopsk/bHdQL82Y3vdj2V7teJHq4PIu5+pIaGoSe +2HSPqht/XvT+RSIhAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE +FHE4NvICMVNHK266ZUapEBVYIAUJMB8GA1UdIwQYMBaAFHE4NvICMVNHK266ZUap +EBVYIAUJMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQUFAAOCAQEAA/e1K6td +EPx7srJerJsOflN4WT5CBP51o62sgU7XAotexC3IUnbHLB/8gTKY0UvGkpMzNTEv +/NgdRN3ggX+d6YvhZJFiCzkIjKx0nVnZellSlxG5FntvRdOW2TF9AjYPnDtuzywN +A0ZF66D0f0hExghAzN4bcLUprbqLOzRldRtxIR0sFAqwlpW41uryZfspuk/qkZN0 +abby/+Ea0AzRdoXLiiW9l14sbxWZJue2Kf8i7MkCx1YAzUm5s2x7UwQa4qjJqhIF +I8LO57sEAszAR6LkxCkvW0VXiVHuPOtSCP8HNR6fNWpHSlaY0VqFH4z1Ir+rzoPz +4iIprn2DQKi6bDAiMAoGCCsGAQUFBwMDDBRHZW9UcnVzdCBHbG9iYWwgQ0EgMg== +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Primary Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIDfDCCAmSgAwIBAgIQGKy1av1pthU6Y2yv2vrEoTANBgkqhkiG9w0BAQUFADBY +MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMo +R2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEx +MjcwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQK +Ew1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAvrgVe//UfH1nrYNke8hCUy3f9oQIIGHWAVlqnEQRr+92/ZV+zmEwu3qDXwK9 +AWbK7hWNb6EwnL2hhZ6UOvNWiAAxz9juapYC2e0DjPt1befquFUWBRaa9OBesYjA +ZIVcFU2Ix7e64HXprQU9nceJSOC7KMgD4TCTZF5SwFlwIjVXiIrxlQqD17wxcwE0 +7e9GceBrAqg1cmuXm2bgyxx5X9gaBGgeRwLmnWDiNpcB3841kt++Z8dtd1k7j53W +kBWUvEI0EME5+bEnPn7WinXFsq+W06Lem+SYvn3h6YGttm/81w7a4DSwDRp35+MI +mO9Y+pyEtzavwt+s0vQQBnBxNQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQULNVQQZcVi/CPNmFbSvtr2ZnJM5IwDQYJ +KoZIhvcNAQEFBQADggEBAFpwfyzdtzRP9YZRqSa+S7iq8XEN3GHHoOo0Hnp3DwQ1 +6CePbJC/kRYkRj5KTs4rFtULUh38H2eiAkUxT87z+gOneZ1TatnaYzr4gNfTmeGl +4b7UVXGYNTq+k+qurUKykG/g/CFNNWMziUnWm07Kx+dOCQD32sfvmWKZd7aVIl6K +oKv0uHiYyjgZmclynnjNS6yvGaBzEi38wkG6gZHaFloxt/m0cYASSJlyc1pZU8Fj +UjPtp8nSOQJw+uCxQmYpqptR7TBUIhRf2asdweSU8Pj1K/fqynhG1riR/aYNKxoU +AT6A8EKglQdebc3MS6RFjasS6LPeWuWgfOgPIh1a6VkwNjAKBggrBgEFBQcDAwwo +R2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Primary Certification Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICrjCCAjWgAwIBAgIQPLL0SAoA4v7rJDteYD7DazAKBggqhkjOPQQDAzCBmDEL +MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChj +KSAyMDA3IEdlb1RydXN0IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2 +MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEcyMB4XDTA3MTEwNTAwMDAwMFoXDTM4MDExODIzNTk1OVowgZgxCzAJBgNV +BAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykgMjAw +NyBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNV +BAMTLUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBH +MjB2MBAGByqGSM49AgEGBSuBBAAiA2IABBWx6P0DFUPlrOuHNxFi79KDNlJ9RVcL +So17VDs6bl8VAsBQps8lL33KSLjHUGMcKiEIfJo22Av+0SbFWDEwKCXzXV2juLal +tJLtbCyf691DiaI8S0iRHVDsJt/WYC69IaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+EVXVMAoG +CCqGSM49BAMDA2cAMGQCMGSWWaboCd6LuvpaiIjwH5HTRqjySkwCY/tsXzjbLkGT +qQ7mndwxHLKgpxgceeHHNgIwOlavmnRs9vuD4DPTCF+hnMJbn0bWtsuRBmOiBucz +rD6ogRLQy7rQkgu2npaqBA+KMDswCgYIKwYBBQUHAwMMLUdlb1RydXN0IFByaW1h +cnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMg== +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Primary Certification Authority - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIID/jCCAuagAwIBAgIQFaxulBmyeUtB9iepwxgPHzANBgkqhkiG9w0BAQsFADCB +mDELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsT +MChjKSAyMDA4IEdlb1RydXN0IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25s +eTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhv +cml0eSAtIEczMB4XDTA4MDQwMjAwMDAwMFoXDTM3MTIwMTIzNTk1OVowgZgxCzAJ +BgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykg +MjAwOCBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0 +BgNVBAMTLUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANziXmJYHTNXOTIz ++uvLh4yn1ErdBojqZI4xmKU4kB6Yzy5jK/BGvESyiaHAKAxJcCGVn2TAppMSAmUm +hsalifD614SgcK9PGpc/BkTVyetyEH3kMSj7HGHmKAdEc5IiaacDiGydY8hS2pgn +5whMcD60yRLBxWeDXTPzAxHsatBT4tG6NmCUgLthY2xbF37fQJQeqw3CIShwiP/W +JmxsYAQlTlV+fe+/lEjetx3dcI0FX4ilm/LC7urRQEFtYjgdVgbFA0dRIBn8exAL +DmKudlW/X3e+PkkBUz2YJQN2JFodtNuJ6nnltrM7P7pMKEF/BqxqjsHQ9gUdfeZC +huOl1UcCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYw +HQYDVR0OBBYEFMR5yo6hTgMdHNxr2zFblD4/MH8tMA0GCSqGSIb3DQEBCwUAA4IB +AQAtxRPPVoB7eni9n64smefv2t+UXglpp+duaIy9cr5HqQ6XErhK8WTTOd8lNNTB +zU6B8A8ExCSzNJbGpqow32hhc9f5joWJ7w5elShKKiePEI4ufIbEAp7aDHdlDkQN +kv39sxY2+hENHYwOB4lqKVb3cvTdFZx3NWZXqxNT2I7BQMXXExZacse3aQHEerGD +AWh9jUGhlBjBJVz88P6DAod8DQ3PLghcSkANPuyBYeYk28rgDi0Hsj5W3I31QYUH +SJsMC8tJP33st/3LjWeJGqvtux6jAAgIFyqCXDFdRootD4abdNlF+9RAsXqqaC2G +spki4cErx5z481+oghLrGREtMDswCgYIKwYBBQUHAwMMLUdlb1RydXN0IFByaW1h +cnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw== +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Universal CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFaDCCA1CgAwIBAgIBATANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEeMBwGA1UEAxMVR2VvVHJ1c3QgVW5pdmVy +c2FsIENBMB4XDTA0MDMwNDA1MDAwMFoXDTI5MDMwNDA1MDAwMFowRTELMAkGA1UE +BhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xHjAcBgNVBAMTFUdlb1RydXN0 +IFVuaXZlcnNhbCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKYV +VaCjxuAfjJ0hUNfBvitbtaSeodlyWL0AG0y/YckUHUWCq8YdgNY96xCcOq9tJPi8 +cQGeBvV8Xx7BDlXKg5pZMK4ZyzBIle0iN430SppyZj6tlcDgFgDgEB8rMQ7XlFTT +QjOgNB0eRXbdT8oYN+yFFXoZCPzVx5zw8qkuEKmS5j1YPakWaDwvdSEYfyh3peFh +F7em6fgemdtzbvQKoiFs7tqqhZJmr/Z6a4LauiIINQ/PQvE1+mrufislzDoR5G2v +c7J2Ha3QsnhnGqQ5HFELZ1aD/ThdDc7d8Lsrlh/eezJS/R27tQahsiFepdaVaH/w +mZ7cRQg+59IJDTWU3YBOU5fXtQlEIGQWFwMCTFMNaN7VqnJNk22CDtucvc+081xd +VHppCZbW2xHBjXWotM85yM48vCR85mLK4b19p71XZQvk/iXttmkQ3CgaRr0BHdCX +teGYO8A3ZNY9lO4L4fUorgtWv3GLIylBjobFS1J72HGrH4oVpjuDWtdYAVHGTEHZ +f9hBZ3KiKN9gg6meyHv8U3NyWfWTehd2Ds735VzZC1U0oqpbtWpU5xPKV+yXbfRe +Bi9Fi1jUIxaS5BZuKGNZMN9QAZxjiRqf2xeUgnA3wySemkfWWspOqGmJch+RbNt+ +nhutxx9z3SxPGWX9f5NAEC7S8O08ni4oPmkmM8V7AgMBAAGjYzBhMA8GA1UdEwEB +/wQFMAMBAf8wHQYDVR0OBBYEFNq7LqqwDLiIJlF0XG0D08DYj3rWMB8GA1UdIwQY +MBaAFNq7LqqwDLiIJlF0XG0D08DYj3rWMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG +9w0BAQUFAAOCAgEAMXjmx7XfuJRAyXHEqDXsRh3ChfMoWIawC/yOsjmPRFWrZIRc +aanQmjg8+uUfNeVE44B5lGiku8SfPeE0zTBGi1QrlaXv9z+ZhP015s8xxtxqv6fX +IwjhmF7DWgh2qaavdy+3YL1ERmrvl/9zlcGO6JP7/TG37FcREUWbMPEaiDnBTzyn +ANXH/KttgCJwpQzgXQQpAvvLoJHRfNbDflDVnVi+QTjruXU8FdmbyUqDWcDaU/0z +uzYYm4UPFd3uLax2k7nZAY1IEKj79TiG8dsKxr2EoyNB3tZ3b4XUhRxQ4K5RirqN +Pnbiucon8l+f725ZDQbYKxek0nxru18UGkiPGkzns0ccjkxFKyDuSN/n3QmOGKja +QI2SJhFTYXNd673nxE0pN2HrrDktZy4W1vUAg4WhzH92xH3kt0tm7wNFYGm2DFKW +koRepqO1pD4r2czYG0eq8kTaT/kD6PAUyz/zg97QwVTjt+gKN02LIFkDMBmhLMi9 +ER/frslKxfMnZmaGrGiR/9nmUxwPi1xpZQomyB40w11Re9epnAahNt3ViZS82eQt +DF4JbAiXfKM9fJP/P6EUp8+1Xevb2xzEdt+Iub1FBZUbrvxGakyvSOPOrg/Sfuvm +bJxPgWp6ZKy7PtXny3YuxadIwVyQD8vIP/rmMuGNG2+k5o7Y+SlIis5z/iwwIzAK +BggrBgEFBQcDAwwVR2VvVHJ1c3QgVW5pdmVyc2FsIENB +-----END TRUSTED CERTIFICATE----- + +# GeoTrust Universal CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBHMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVy +c2FsIENBIDIwHhcNMDQwMzA0MDUwMDAwWhcNMjkwMzA0MDUwMDAwWjBHMQswCQYD +VQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1 +c3QgVW5pdmVyc2FsIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQCzVFLByT7y2dyxUxpZKeexw0Uo5dfR7cXFS6GqdHtXr0om/Nj1XqduGdt0DE81 +WzILAePb63p3NeqqWuDW6KFXlPCQo3RWlEQwAx5cTiuFJnSCegx2oG9NzkEtoBUG +FF+3Qs17j1hhNNwqCPkuwwGmIkQcTAeC5lvO0Ep8BNMZcyfwqph/Lq9O64ceJHdq +XbboW0W63MOhBW9Wjo8QJqVJwy7XQYci4E+GymC16qFjwAGXEHm9ADwSbSsVsaxL +se4YuU6W3Nx2/zu+z18DwPw76L5GG//aQMJS9/7jOvdqdzXQ2o3rXhhqMcceujwb +KNZrVMaqW9eiLBsZzKIC9ptZvTdrhrVtgrrY6slWvKk2WP0+GfPtDCapkzj4T8Fd +IgbQl+rhrcZV4IErKIM6+vR7IVEAvlI4zs1meaj0gVbi0IMJR1FbUGrP20gaXT73 +y/Zl92zxlfgCOzJWgjl6W70viRu/obTo/3+NjN8D8WBOWBFM66M/ECuDmgFz2ZRt +hAAnZqzwcEAJQpKtT5MNYQlRJNiS1QuUYbKHsu3/mjX/hVTK7URDrBs8FmtISgoc +QIgfksILAAX/8sgCSqSqqcyZlpwvWOB94b67B9xfBHJcMTTD7F8t4D1kkCLm0ey4 +Lt1ZrtmhN79UNdxzMk+MBB4zsslG8dhcyFVQyWi9qLo2CQIDAQABo2MwYTAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAfBgNV +HSMEGDAWgBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAOBgNVHQ8BAf8EBAMCAYYwDQYJ +KoZIhvcNAQEFBQADggIBAGbBxiPz2eAubl/oz66wsCVNK/g7WJtAJDday6sWSf+z +dXkzoS9tcBc0kf5nfo/sm+VegqlVHy/c1FEHEv6sFj4sNcZj/NwQ6w2jqtB8zNHQ +L1EuxBRa3ugZ4T7GzKQp5y6EqgYweHZUcyiYWTjgAA1i00J9IZ+uPTqM1fp3DRgr +Fg5fNuH8KrUwJM/gYwx7WBr+mbpCErGR9Hxo4sjoryzqyX6uuyo9DRXcNJW2GHSo +ag/HtPQTxORb7QrSpJdMKu0vbBKJPfEncKpqA1Ihn0CoZ1Dy81of398j9tx4TuaY +T1U6U+Pv8vSfx3zYWK8pIpe44L2RLrB27FcRz+8pRPPphXpgY+RdM4kX2TGq2tbz +GDVyz4crL2MjhF2EjD9XoIj8mZEoJmmZ1I+XRL6O1UixpCgp8RW04eWe3fiPpm8m +1wk8OhwRDqZsN/etRIcsKMfYdIKz0G9KV7s1KSegi+ghp4dkNl3M2Basx7InQJJV +OCiNUW7dFGdTbHFcJoRNdVq2fmBWqU2t+5sel/MN2dKXVHfaPRK34B7vCAas+YWH +6aLcr34YEoP9VhdBLtUpgn2Z9DH2canPLAEnpQW5qrJITirvn5NSUZU8UnOOVkwX +QMAJKOSLakhT2+zNVVXxxvjpoixMptEmX36vWkzaH6byHCx+rgIW0lbQL1dTR+iS +MCUwCgYIKwYBBQUHAwMMF0dlb1RydXN0IFVuaXZlcnNhbCBDQSAy +-----END TRUSTED CERTIFICATE----- + +# GlobalSign +-----BEGIN TRUSTED CERTIFICATE----- +MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1 +MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMjETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6ErPL +v4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8 +eoLrvozps6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklq +tTleiDTsvHgMCJiEbKjNS7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzd +C9XZzPnqJworc5HGnRusyMvo4KD0L5CLTfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pa +zq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6CygPCm48CAwEAAaOBnDCB +mTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUm+IH +V2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5n +bG9iYWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG +3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4Gs +J0/WwbgcQ3izDJr86iw8bmEbTUsp9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO +291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu01yiPqFbQfXf5WRDLenVOavS +ot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG79G+dwfCMNYxd +AfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7 +TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLjAY +MAoGCCsGAQUFBwMDDApHbG9iYWxTaWdu +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Code Signing Root E45 +-----BEGIN TRUSTED CERTIFICATE----- +MIICIjCCAamgAwIBAgIQdlP+rhgmQ29p9RzCdxbyXjAKBggqhkjOPQQDAzBTMQsw +CQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEpMCcGA1UEAxMg +R2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9vdCBFNDUwHhcNMjAwMzE4MDAwMDAw +WhcNNDUwMzE4MDAwMDAwWjBTMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFs +U2lnbiBudi1zYTEpMCcGA1UEAxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9v +dCBFNDUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAR2GW0DtfWEI6syai5h3YQlL+/o +eSeJg8ODdfO2eGoIbaKtISoCkAbsmkCceoaRuViFyCiaLgv34nap37K9qcPpKRl5 +CLJQ0MLFnQphDONdNwZKXP6EvcCAhPpLVSPg4j6jQjBAMA4GA1UdDwEB/wQEAwIB +hjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSnn93TVM3b+Gy/JmwO5Ndbb4DM +QjAKBggqhkjOPQQDAwNnADBkAjBsjFa2xTeuLZAreO2xHkYI0sNKKO94GQiOJDRG +T4dxYV+pEUpvMqsc0VJ7qjrq5ZoCMFUrdy/O+D+baEra16hLRQ1+smv2bNqxFeK8 +SBl3i1fBXRTXQQDMJlLQILgZT5bnmjAuMAoGCCsGAQUFBwMDDCBHbG9iYWxTaWdu +IENvZGUgU2lnbmluZyBSb290IEU0NQ== +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Code Signing Root R45 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFcjCCA1qgAwIBAgIQdlP+rHVGSJP15ddKSDpO+DANBgkqhkiG9w0BAQwFADBT +MQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEpMCcGA1UE +AxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9vdCBSNDUwHhcNMjAwMzE4MDAw +MDAwWhcNNDUwMzE4MDAwMDAwWjBTMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xv +YmFsU2lnbiBudi1zYTEpMCcGA1UEAxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcg +Um9vdCBSNDUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2LcUw3Xro +q5A9A3KwOkuZFmGy5f+lZx03HOV+7JODqoT1o0ObmEWKuGNXXZsAiAQl6fhokkuC +2EvJSgPzqH9qj4phJ72hRND99T8iwqNPkY2zBbIogpFd+1mIBQuXBsKY+CynMyTu +UDpBzPCgsHsdTdKoWDiW6d/5G5G7ixAs0sdDHaIJdKGAr3vmMwoMWWuOvPSrWpd7 +f65V+4TwgP6ETNfiur3EdaFvvWEQdESymAfidKv/aNxsJj7pH+XgBIetMNMMjQN8 +VbgWcFwkeCAl62dniKu6TjSYa3AR3jjK1L6hwJzh3x4CAdg74WdDhLbP/HS3L4Sj +v7oJNz1nbLFFXBlhq0GD9awd63cNRkdzzr+9lZXtnSuIEP76WOinV+Gzz6ha6Qcl +mxLEnoByPZPcjJTfO0TmJoD80sMD8IwM0kXWLuePmJ7mBO5Cbmd+QhZxYucE+WDG +ZKG2nIEhTivGbWiUhsaZdHNnMXqR8tSMeW58prt+Rm9NxYUSK8+aIkQIqIU3zgdh +VwYXEiTAxDFzoZg1V0d+EDpF2S2kUZCYqaAHN8RlGqocaxZ396eX7D8ZMJlvMfvq +QLLn0sT6ydDwUHZ0WfqNbRcyvvjpfgP054d1mtRKkSyFAxMCK0KA8olqNs/ITKDO +nvjLja0Wp9Pe1ZsYp8aSOvGCY/EuDiRk3wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC +AYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUHwC/RoAK/Hg5t6W0Q9lWULvO +ljswDQYJKoZIhvcNAQEMBQADggIBAF4runSXNERfdkgoQIST7gFu6aGz1oAl5nvk +vAmRPQ/8dq3X1DAgu49g0JHWHPKc73gaK5QyAsEkllJSAtDz0fzymzlumeEfjkNB +fZoeW8ldmoT8JuaH83RyJq2kG9k9O2pSoDwJHi8ee7MztEXH96yxr5NgrXauuLIV +eOuDauv/20arJOXuAvqQH1nAL13Wt12kXBC3clP4QU7M+ngaJUrK/oViQ2HDtDeq +gdL01joPvY1ZfjBH3itr5yFQM1/UZ5vUuGefPCeZA/+FQ45zEsogzehh1bFm3BfW +OW0P288jN6GCiU4caz/WoM2qB50+Qiaq1wzu+ke/GlJ+0XWB08mKYhdtT4igIaAm +Pq9t2WIwH+mYKK5ujdWOTHJmk4CNKuNVx2BnkEJWXCJRD7PcTjnuTd3ZHXgQVDtu +0JdvA7UesiNzxhKymmTQ/JWFJKj/36Gw3JFArt8JM6u53ZK38cyRdDtp62eXG5C/ +58egb3G7V7+3j1rtekBqFs2AhC0v4QLUJJRDsxX8DCsb/XFv/Mu8dRc6XoPSybMv +G9WcjX9U/n5+5Fajh6ed4VlSlEGPbVu+hpWa/xp23UDSUUpwtB8zYyN3P+wnHlnk +CIftNIJKDz/+oB3B9WdzRYZ49Kop6SeHxhnbxhMUwzlJh02gl+BlE/Wdd1bp2rNY +xzrywM2CMC4wCgYIKwYBBQUHAwMMIEdsb2JhbFNpZ24gQ29kZSBTaWduaW5nIFJv +b3QgUjQ1 +-----END TRUSTED CERTIFICATE----- + +# GlobalSign ECC Root CA - R4 +-----BEGIN TRUSTED CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +MD0wHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwbR2xvYmFsU2lnbiBF +Q0MgUm9vdCBDQSAtIFI0 +-----END TRUSTED CERTIFICATE----- + +# GlobalSign ECC Root CA - R5 +-----BEGIN TRUSTED CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3MD0wHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEF +BQcDAwwbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1 +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4DA0MB4GCCsGAQUFBwMEBggrBgEFBQcD +AQYIKwYBBQUHAwMMEkdsb2JhbFNpZ24gUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Root CA - R3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9fMDkwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwXR2xvYmFsU2ln +biBSb290IENBIC0gUjM= +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Root CA - R6 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBAwOTAeBggrBgEFBQcDBAYIKwYBBQUHAwEG +CCsGAQUFBwMDDBdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNg== +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Root E46 +-----BEGIN TRUSTED CERTIFICATE----- +MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx +CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD +ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw +MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex +HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq +R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd +yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ +7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8 ++RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3Aw +ITAKBggrBgEFBQcDAQwTR2xvYmFsU2lnbiBSb290IEU0Ng== +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Root R46 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA +MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD +VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy +MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt +c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ +OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG +vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud +316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo +0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE +y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF +zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE ++cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN +I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs +x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa +ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC +4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4 +7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg +JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti +2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk +pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF +FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt +rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk +ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5 +u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP +4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6 +N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3 +vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6MCEwCgYIKwYBBQUHAwEME0ds +b2JhbFNpZ24gUm9vdCBSNDY= +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Secure Mail Root E45 +-----BEGIN TRUSTED CERTIFICATE----- +MIICITCCAaegAwIBAgIQdlP+qicdlUZd1vGe5biQCjAKBggqhkjOPQQDAzBSMQsw +CQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEoMCYGA1UEAxMf +R2xvYmFsU2lnbiBTZWN1cmUgTWFpbCBSb290IEU0NTAeFw0yMDAzMTgwMDAwMDBa +Fw00NTAzMTgwMDAwMDBaMFIxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxT +aWduIG52LXNhMSgwJgYDVQQDEx9HbG9iYWxTaWduIFNlY3VyZSBNYWlsIFJvb3Qg +RTQ1MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE+XmLgUc3iZY/RUlQfxomC5Myfi7A +wKcImsNuj5s+CyLsN1O3b4qwvCc3S22pRjvZH/+loUS7LXO/nkEHXFObUQg6Wrtv +OMcWkXjCShNpHYLfWi8AiJaiLhx0+Z1+ZjeKo0IwQDAOBgNVHQ8BAf8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU3xNei1/CQAL9VreUTLYe1aaxFJYw +CgYIKoZIzj0EAwMDaAAwZQIwE7C+13EgPuSrnM42En1fTB8qtWlFM1/TLVqy5IjH +3go2QjJ5naZruuH5RCp7isMSAjEAoGYcToedh8ntmUwbCu4tYMM3xx3NtXKw2cbv +vPL/P/BS3QjnqmR5w+RpV5EvpMt8MC0wCgYIKwYBBQUHAwQMH0dsb2JhbFNpZ24g +U2VjdXJlIE1haWwgUm9vdCBFNDU= +-----END TRUSTED CERTIFICATE----- + +# GlobalSign Secure Mail Root R45 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFcDCCA1igAwIBAgIQdlP+qExQq5+NMrUdA49X3DANBgkqhkiG9w0BAQwFADBS +MQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEoMCYGA1UE +AxMfR2xvYmFsU2lnbiBTZWN1cmUgTWFpbCBSb290IFI0NTAeFw0yMDAzMTgwMDAw +MDBaFw00NTAzMTgwMDAwMDBaMFIxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMSgwJgYDVQQDEx9HbG9iYWxTaWduIFNlY3VyZSBNYWlsIFJv +b3QgUjQ1MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA3HnMbQb5bbvg +VgRsf+B1zC0FSehL3FTsW3eVcr9/Yp2FqYokUF9T5dt0b6QpWxMqCa2axS/C93Y7 +oUVGqkPmJP4rsG8ycBlGWnkmL/w9fV9ky1fMYWGo2ZVu45Wgbn9HEhjW7wPJ+4r6 +mr2CFalVd0sRT1nga8Nx8wzYVNWBaD4TuRUuh4o8RCc2YiRu+CwFcjBhvUKRI8Sd +JafZVJoUozGtgHkMp2NsmKOsV0czH2WW4dDSNdr5cfehpiW1QV3fPmDY0fafpfK4 +zBOqj/mybuGDLZPdPoUa3eixXCYBy0mF/PzS1H+FYoZ0+cvsNSKiDDCPO6t561by ++kLz7fkfRYlAKa3qknTqUv1WtCvaou11wm6rzlKQS/be8EmPmkjUiBltRebMjLnd +ZGBgAkD4uc+8WOs9hbnGCtOcB2aPxxg5I0bhPB6jL1Bhkgs9K2zxo0c4V5GrDY/G +nU0E0iZSXOWl/SotFioBaeepfeE2t7Eqxdmxjb25i87Mi6E+C0jNUJU0xNgIWdhr +JvS+9dQiFwBXya6bBDAznwv731aiyW5Udtqxl2InWQ8RiiIbZJY/qPG3JEqNPFN8 +bYN2PbImSHP1RBYBLQkqjhaWUNBzBl27IkiCTApGWj+A/1zy8pqsLAjg1urwEjiB +T6YQ7UarzBacC89kppkChURnRq39TecCAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgGG +MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFKCTFShu7o8IsjXGnmJ5dKexDit7 +MA0GCSqGSIb3DQEBDAUAA4ICAQBFCvjRXKxigdAE17b/V1GJCwzL3iRlN/urnu1m +9OoMGWmJuBmxMFa02fb3vsaul8tF9hGMOjBkTMGfWcBGQggGR2QXeOCVBwbWjKKs +qdk/03tWT/zEhyjftisWI8CfH1vj1kReIk8jBIw1FrV5B4ZcL5fi9ghkptzbqIrj +pHt3DdEpkyggtFOjS05f3sH2dSP8Hzx4T3AxeC+iNVRxBKzIxG3D9pGx/s3uRG6B +9kDFPioBv6tMsQM/DRHkD9Ik4yKIm59fRz1RSeAJN34XITF2t2dxSChLJdcQ6J9h +WRbFPjJOHwzOo8wP5McRByIvOAjdW5frQmxZmpruetCd38XbCUMuCqoZPWvoajB6 +V+a/s2o5qY/j8U9laLa9nyiPoRZaCVA6Mi4dL0QRQqYA5jGY/y2hD+akYFbPedey +Ttew+m4MVyPHzh+lsUxtGUmeDn9wj3E/WCifdd1h4Dq3Obbul9Q1UfuLSWDIPGau +l+6NJllXu3jwelAwCbBgqp9O3Mk+HjrcYpMzsDpUdG8sMUXRaxEyamh29j32ahNe +JJjn6h2az3iCB2D3TRDTgZpFjZ6vm9yAx0OylWikww7oCkcVv1Qz3AHn1aYec9h6 +sr8vreNVMJ7fDkG84BH1oQyoIuHjAKNOcHyS4wTRekKKdZBZ45vRTKJkvXN5m2/y +s8H2PDAtMAoGCCsGAQUFBwMEDB9HbG9iYWxTaWduIFNlY3VyZSBNYWlsIFJvb3Qg +UjQ1 +-----END TRUSTED CERTIFICATE----- + +# Global Chambersign Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIExTCCA62gAwIBAgIBADANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJFVTEn +MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL +ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4GA1UEAxMXR2xvYmFsIENo +YW1iZXJzaWduIFJvb3QwHhcNMDMwOTMwMTYxNDE4WhcNMzcwOTMwMTYxNDE4WjB9 +MQswCQYDVQQGEwJFVTEnMCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgy +NzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4G +A1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwggEgMA0GCSqGSIb3DQEBAQUA +A4IBDQAwggEIAoIBAQCicKLQn0KuWxfH2H3PFIP8T8mhtxOviteePgQKkotgVvq0 +Mi+ITaFgCPS3CU6gSS9J1tPfnZdan5QEcOw/Wdm3zGaLmFIoCQLfxS+EjXqXd7/s +QJ0lcqu1PzKY+7e3/HKE5TWH+VX6ox8Oby4o3Wmg2UIQxvi1RMLQQ3/bvOSiPGpV +eAp3qdjqGTK3L/5cPxvusZjsyq16aUXjlg9V9ubtdepl6DJWk0aJqCWKZQbua795 +B9Dxt6/tLE2Su8CoX6dnfQTyFQhwrJLWfQTSM/tMtgsL+xrJxI0DqX5c8lCrEqWh +z0hQpe/SyBoT+rB/sYIcd2oPX9wLlY/vQ37mRQklAgEDo4IBUDCCAUwwEgYDVR0T +AQH/BAgwBgEB/wIBDDA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY3JsLmNoYW1i +ZXJzaWduLm9yZy9jaGFtYmVyc2lnbnJvb3QuY3JsMB0GA1UdDgQWBBRDnDafsJ4w +TcbOX60Qq+UDpfqpFDAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAH +MCoGA1UdEQQjMCGBH2NoYW1iZXJzaWducm9vdEBjaGFtYmVyc2lnbi5vcmcwKgYD +VR0SBCMwIYEfY2hhbWJlcnNpZ25yb290QGNoYW1iZXJzaWduLm9yZzBbBgNVHSAE +VDBSMFAGCysGAQQBgYcuCgEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly9jcHMuY2hh +bWJlcnNpZ24ub3JnL2Nwcy9jaGFtYmVyc2lnbnJvb3QuaHRtbDANBgkqhkiG9w0B +AQUFAAOCAQEAPDtwkfkEVCeR4e3t/mh/YV3lQWVPMvEYBZRqHN4fcNs+ezICNLUM +bKGKfKX0j//U2K0X1S0E0T9YgOKBWYi+wONGkyT+kL0mojAt6JcmVzWJdJYY9hXi +ryQZVgICsroPFOrGimbBhkVVi76SvpykBMdJPJ7oKXqJ1/6v/2j1pReQvayZzKWG +VwlnRtvWFsJG8eSpUPWP0ZIV018+xgBJOm5YstHRJw0lyDL4IBHNfTIzSJRUTN3c +ecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREest2d/ +AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8DAlMAoGCCsGAQUFBwMDDBdHbG9iYWwg +Q2hhbWJlcnNpZ24gUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# Global Chambersign Root - 2008 +-----BEGIN TRUSTED CERTIFICATE----- +MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYD +VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 +IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 +MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD +aGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMxNDBaFw0zODA3MzEx +MjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3Vy +cmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAG +A1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAl +BgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZI +hvcNAQEBBQADggIPADCCAgoCggIBAMDfVtPkOpt2RbQT2//BthmLN0EYlVJH6xed +KYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXfXjaOcNFccUMd2drvXNL7 +G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0ZJJ0YPP2 +zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4 +ddPB/gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyG +HoiMvvKRhI9lNNgATH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2 +Id3UwD2ln58fQ1DJu7xsepeY7s2MH/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3V +yJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfeOx2YItaswTXbo6Al/3K1dh3e +beksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSFHTynyQbehP9r +6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh +wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsog +zCtLkykPAgMBAAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQW +BBS5CcqcHtvTbDprru1U8VuTBjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDpr +ru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UEBhMCRVUxQzBBBgNVBAcTOk1hZHJp +ZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJmaXJtYS5jb20vYWRk +cmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJmaXJt +YSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiC +CQDJzdPp1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCow +KAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZI +hvcNAQEFBQADggIBAICIf3DekijZBZRG/5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZ +UohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6ReAJ3spED8IXDneRRXoz +X1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/sdZ7LoR/x +fxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVz +a2Mg9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yyd +Yhz2rXzdpjEetrHHfoUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMd +SqlapskD7+3056huirRXhOukP9DuqqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9O +AP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETrP3iZ8ntxPjzxmKfFGBI/5rso +M0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVqc5iJWzouE4ge +v8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z +09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/BMCww +CgYIKwYBBQUHAwMMHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwOA== +-----END TRUSTED CERTIFICATE----- + +# Go Daddy Class 2 CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8wNTAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsG +AQUFBwMDDBNHbyBEYWRkeSBDbGFzcyAyIENB +-----END TRUSTED CERTIFICATE----- + +# Go Daddy Root Certificate Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT +EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp +ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz +NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH +EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE +AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD +E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH +/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy +DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh +GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR +tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA +AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX +WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu +9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr +gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo +2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO +LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI +4uJEvlz36hz1MEAwFAYIKwYBBQUHAwEGCCsGAQUFBwMDDChHbyBEYWRkeSBSb290 +IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# Government Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIFSzCCAzOgAwIBAgIRALZLiAfiI+7IXBKtpg4GofIwDQYJKoZIhvcNAQELBQAw +PzELMAkGA1UEBhMCVFcxMDAuBgNVBAoMJ0dvdmVybm1lbnQgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTAeFw0xMjA5MjgwODU4NTFaFw0zNzEyMzExNTU5NTla +MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQC2/5c8gb4BWCQnr44BK9ZykjAyG1+bfNTUf+ihYHMwVxAA+lCWJP5Q5ow6ldFX +eYTVZ1MMKoI+GFy4MCYa1l7GLbIEUQ7v3wxjR+vEEghRK5lxXtVpe+FdyXcdIOxW +juVhYC386RyA3/pqg7sFtR4jEpyCygrzFB0g5AaPQySZn7YKk1pzGxY5vgW28Yyl +ZJKPBeRcdvc5w88tvQ7Yy6gOMZvJRg9nU0MEj8iyyIOAX7ryD6uBNaIgIZfOD4k0 +eA/PH07p+4woPN405+2f0mb1xcoxeNLOUNFggmOd4Ez3B66DNJ1JSUPUfr0t4urH +cWWACOQ2nnlwCjyHKenkkpTqBpIpJ3jmrdc96QoLXvTg1oadLXLLi2RW5vSueKWg +OTNYPNyoj420ai39iHPplVBzBN8RiD5C1gJ0+yzEb7xs1uCAb9GGpTJXA9ZN9E4K +mSJ2fkpAgvjJ5E7LUy3Hsbbi08J1J265DnGyNPy/HE7CPfg26QrMWJqhGIZO4uGq +s3NZbl6dtMIIr69c/aQCb/+4DbvVq9dunxpPkUDwH0ZVbaCSw4nNt7H/HLPLo5wK +4/7NqrwB7N1UypHdTxOHpPaY7/1J1lcqPKZc9mA3v9g+fk5oKiMyOr5u5CI9ByTP +isubXVGzMNJxbc5Gim18SjNE2hIvNkvy6fFRCW3bapcOFwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBTVZx3gnHosnMvFmOcdByYqhux0zTAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAJA75cJTQijq9TFOjj2Rnk0J +89ixUuZPrAwxIbvx6pnMg/y2KOTshAcOD06Xu29oRo8OURWV+Do7H1+CDgxxDryR +T64zLiNB9CZrTxOH+nj2LsIPkQWXqmrBap+8hJ4IKifd2ocXhuGzyl3tOKkpboTe +Rmv8JxlQpRJ6jH1i/NrnzLyfSa8GuCcn8on3Fj0Y5r3e9YwSkZ/jBI3+BxQaWqw5 +ghvxOBnhY+OvbLamURfr+kvriyL2l/4QOl+UoEtTcT9a4RD4co+WgN2NApgAYT2N +vC2xR8zaXeEgp4wxXPHj2rkKhkfIoT0Hozymc26Uke1uJDr5yTDRB6iBfSZ9fYTf +hsmL5a4NHr6JSFEVg5iWL0rrczTXdM3Jb9DCuiv2mv6Z3WAUjhv5nDk8f0OJU+jl +wqu+Iq0nOJt3KLejY2OngeepaUXrjnhWzAWEx/uttjB8YwWfLYwkf0uLkvw4Hp+g +pVezbp3YZLhwmmBScMip0P/GnO0QYV7Ngw5u6E0CQUridgR51lQ/ipgyFKDdLZzn +uoJxo4ZVKZnSKdt1OvfbQ/+2W/u3fjWAjg1srnm3Ni2XUqGwB5wH5Ss2zQOXlL0t +DjQG/MAWifw3VOTWzz0TBPKR2ck2Lj7FWtClTILD/y58Jnb38/1FoqVuVa4uzM8s +iTTa9g3nkagQ6hed8vbsMDUwCgYIKwYBBQUHAwMMJ0dvdmVybm1lbnQgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# HARICA Client ECC Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIICWjCCAeGgAwIBAgIQMWjZ2OFiVx7SGUSI5hB98DAKBggqhkjOPQQDAzBvMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEnMCUGA1UEAwweSEFSSUNBIENsaWVudCBFQ0Mg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTExMDMzNFoXDTQ1MDIxMzExMDMzM1owbzEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJzAlBgNVBAMMHkhBUklDQSBDbGllbnQgRUND +IFJvb3QgQ0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABAcYrZWWlNBcD4L3 +KkD6AsnJPTamowRqwW2VAYhgElRsXKIrbhM6iJUMHCaGNkqJGbcY3jvoqFAfyt9b +v0mAFdvjMOEdWscqigEH/m0sNO8oKJe8wflXhpWLNc+eWtFolaNCMEAwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUUgjSvjKBJf31GpfsTl8au1PNkK0wDgYDVR0P +AQH/BAQDAgGGMAoGCCqGSM49BAMDA2cAMGQCMEwxRUZPqOa+w3eyGhhLLYh7WOar +lGtEA7AX/9+Cc0RRLP2THQZ7FNKJ7EAM7yEBLgIwL8kuWmwsHdmV4J6wuVxSfPb4 +OMou8dQd8qJJopX4wVheT/5zCu8xsKsjWBOMi947MCwwCgYIKwYBBQUHAwQMHkhB +UklDQSBDbGllbnQgRUNDIFJvb3QgQ0EgMjAyMQ== +-----END TRUSTED CERTIFICATE----- + +# HARICA Client RSA Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFqjCCA5KgAwIBAgIQVVL4HtsbJCyeu5YYzQIoPjANBgkqhkiG9w0BAQsFADBv +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEnMCUGA1UEAwweSEFSSUNBIENsaWVudCBS +U0EgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTg0NloXDTQ1MDIxMzEwNTg0NVow +bzELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBS +ZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExJzAlBgNVBAMMHkhBUklDQSBDbGllbnQg +UlNBIFJvb3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +AIHbV0KQLHQ19Pi4dBlNqwlad0WBc2KwNZ/40LczAIcTtparDlQSMAe8m7dI19EZ +g66O2KnxqQCEsIxenugMj1Rpv/bUCE8mcP4YQWMaszKLQPgHq1cx8MYWdmeatN0v +8tFrxdCShJFxbg8uY+kfU6TdUhPMCYMpgQzFU3VEsQ5nUxjQwx+IS5+UJLQpvLvo +Tv1v0hUdSdyNcPIRGiBRVRG6iG/E91B51qox4oQ9XjLIdypQceULL+m26u+rCjM5 +Dv2PpWdDgo6YaQkJG0DNOGdH6snsl3ES3iT1cjzR90NMJveQsonpRUtVPTEFekHi +lbpDwBfFtoU9GY1kcPNbrM2f0yl1h0uVZ2qm+NHdvJCGiUMpqTdb9V2wJlpTQnaQ +K8+eVmwrVM9cmmXfW4tIYDh8+8ULz3YEYwIzKn31g2fn+sZD/SsP1CYvd6QywSTq +ZJ2/szhxMUTyR7iiZkGh+5t7vMdGanW/WqKM6GpEwbiWtcAyCC17dDVzssrG/q8R +chj258jCz6Uq6nvWWeh8oLJqQAlpDqWW29EAufGIbjbwiLKd8VLyw3y/MIk8Cmn5 +IqRl4ZvgdMaxhZeWLK6Uj1CmORIfvkfygXjTdTaefVogl+JSrpmfxnybZvP+2M/u +vZcGHS2F3D42U5Z7ILroyOGtlmI+EXyzAISep0xxq0o3AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFKDWBz1eJPd7oEQuJFINGaorBJGnMA4GA1Ud +DwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEADUf5CWYxUux57sKo8mg+7ZZF +yzqmmGM/6itNTgPQHILhy9Pl1qtbZyi8nf4MmQqAVafOGyNhDbBX8P7gyr7mkNuD +LL6DjvR5tv7QDUKnWB9p6oH1BaX+RmjrbHjJ4Orn5t4xxdLVLIJjKJ1dqBp+iObn +K/Es1dAFntwtvTdm1ASip62/OsKoO63/jZ0z4LmahKGHH3b0gnTXDvkwSD5biD6q +XGvWLwzojnPCGJGDObZmWtAfYCddTeP2Og1mUJx4e6vzExCuDy+r6GSzGCCdRjVk +JXPqmxBcWDWJsUZIp/Ss1B2eW8yppRoTTyRQqtkbbbFA+53dWHTEwm8UcuzbNZ+4 +VHVFw6bIGig1Oq5l8qmYzq9byTiMMTt/zNyW/eJb1tBZ9Ha6C8tPgxDHQNAdYOkq +5UhYdwxFab4ZcQQk4uMkH0rIwT6Z9ZaYOEgloRWwG9fihBhb9nE1mmh7QMwYXAwk +ndSV9ZmqRuqurL/0FBkk6Izs4/W8BmiKKgwFXwqXdafcfsD913oY3zDROEsfsJhw +v8x8c/BuxDGlpJcdrL/ObCFKvicjZ/MGVoEKkY624QMFMyzaNAhNTlAjrR+lxdR6 +/uoJ7KcoYItGfLXqm91P+edrFcaIz0Pb5SfcBFZub0YV8VYt6FwMc8MjgTggy8kM +ac8sqzuEYDMZUv1pFDMwLDAKBggrBgEFBQcDBAweSEFSSUNBIENsaWVudCBSU0Eg +Um9vdCBDQSAyMDIx +-----END TRUSTED CERTIFICATE----- + +# HARICA Code Signing ECC Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIICZjCCAe2gAwIBAgIQTIpjHaljjwWi+3YU/1uizTAKBggqhkjOPQQDAzB1MQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEtMCsGA1UEAwwkSEFSSUNBIENvZGUgU2lnbmlu +ZyBFQ0MgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTExMDQzNloXDTQ1MDIxMzExMDQz +NVowdTELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFu +ZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExLTArBgNVBAMMJEhBUklDQSBDb2Rl +IFNpZ25pbmcgRUNDIFJvb3QgQ0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IA +BEOfvFxCakPhrEu4Dl+ABuMFd4t/C3nXYaCQv/JTKKNYupTAZmocWdqAWIEATLzJ +eZgQDMcdC+OT3IU5aNm/p0PSMcyCgie6iNHSLVY39zrabjnccRBl7jgLh3oDujBf +ZKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUanHBc2qTQqaXcl67kF+C +kg8r1uswDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2cAMGQCMB6l1QtElRDk +Z3xOhV65RUkCc7CyHLOnItEAYUAPs4c3Fo0A7baLVSUGlJDc1+d1nwIwf3Rr8Urf +8PeEe/LFeTADSPIeICJXZFRXNIB3tz8jT7T1gJjCwVZboOfWoY/1DG8dMDIwCgYI +KwYBBQUHAwMMJEhBUklDQSBDb2RlIFNpZ25pbmcgRUNDIFJvb3QgQ0EgMjAyMQ== +-----END TRUSTED CERTIFICATE----- + +# HARICA Code Signing RSA Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFtjCCA56gAwIBAgIQFcKuKk2ZmmOM07oTGXYI9TANBgkqhkiG9w0BAQsFADB1 +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEtMCsGA1UEAwwkSEFSSUNBIENvZGUgU2ln +bmluZyBSU0EgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTk1NFoXDTQ1MDIxMzEw +NTk1M1owdTELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWlj +IGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExLTArBgNVBAMMJEhBUklDQSBD +b2RlIFNpZ25pbmcgUlNBIFJvb3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAIpq7qoKI1UMiwZC45VbVHhfxY4GLHw8Mb6vDamh7EogWAWd +4miyu+tffyozufJVnG+qpB7tEL6DKRE25p4/+m17UeHVd6W9y2kOOyIglAwxZUAN +Ca8QNXqb6nkIRKSLZ6krTcHn0Nen9rU6jdmjqXm4pGVcvPM+95+Z9rjDZWgtq4Mu +3YWZBKn10VzVUUIBuZ9BtUsisgD0y2cQ72nEEK36lAZ2UBJXgq7FFK08fbud8XPh +fPCucd5b9xLd94Dx3D7xYLrJGZdvdXSFTP05Q8NkbjSsE8EcZbZSQvFG6y/6XabP +Dkmd93R8eA0GOiwS++JLJuRviyGBM0I5E+hCq1tV1Bu7N7YSkffzfbzS/+yxw9Wg +zLIrx49dfkxSQkj7j/1akHMQ1alyVI1J2zhSqkZIDi/6ACzMcww2SyTOE2ympKSj +1nyb6TgLxiTbTaxnIUlbQTdk5mBrH+0qL2AZMB7YPJwZQ4ffwAr05MpgiHrWo7nk +JS554v7Byzy3989OWEz7w62rfarKiPsOOA0fnlw567gHxFAiTfiFf27sjPq2cU3e +fZZpxN0+Ht4mkAosTRWVqaI+3D0Od3yNQShPuINRvj63j5A6cDGJWvqTU/xgyY11 +kO5aLx2EnwCp5sOGI6Ie3RLjoUZgG2e/UBUiknxKtIyPbpyVwizcOzogtryLAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFLRkFkjo/FpLMymJ65lA +uSC09mEaMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAK6xZi+Y5 +RNz7rUqI4GT/q8Py0s5wLwPlb7LE9TbWU2uHqx2LmQfIMI5Hcv2huHXWF6EWvWRz +kTBXrX39BUCGk9FJlrIL1HxkE4vTIUk4u/vozD4x8a57TCrfggajjgWEnH9wzsC7 +RRffXWUM5FBIB0SLpC9W2sZ69mCNpDjxnYcWMLLwX3pCVSBxz8zuALESR79CueSz +tR0ZhLmYbeBptBVBteJQSMcf6pq3eZHd1dVTGfyuGGxp261ZKJtkmKc8x1WO0TAA +z9QynmKxwyruNSLGu/B8u4O4AIn13BqX2TiaKVNhGaan9DtH/d1nlQ+OpGYsgpq3 +LXHm3674+GjBuw/qUKBFl7calRJvyLO2BWjaah4ONYWErHQMirT0dZ8ir7BUu7ae +IvnZ69WKDcfc+JgxX576xpf0QRB104G2MV963YiFCK9wRwI3e+JK7F3y3SkSRMiK +qt3SVXgXda9xaQ13cEqwH39C28dx3FjWGL1QxblyBMdne3xTYMpJGBW8QHOuK6gr +rG8RRDnsgkh+Ecr71j+2wLm4BpN1vZMndxcNXKWe6sFbAC0MqDVgx+JvNRs9drXn +rd10I0+GskfvyC/QhXw5ljehKykCvT6Hz6j2HXUyzzjjc7HuEIG1KrGIBlEeWjpI +UfM2WWLfQmZZULdYvvV2QJoSFuYOqtdsoNUwMjAKBggrBgEFBQcDAwwkSEFSSUNB +IENvZGUgU2lnbmluZyBSU0EgUm9vdCBDQSAyMDIx +-----END TRUSTED CERTIFICATE----- + +# HARICA TLS ECC Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v +dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG +A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj +aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg +Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 +KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y +STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD +AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw +SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN +nxS2PFOiTAZpffpskcYqSUXm7LcT4TpsMCkwCgYIKwYBBQUHAwEMG0hBUklDQSBU +TFMgRUNDIFJvb3QgQ0EgMjAyMQ== +-----END TRUSTED CERTIFICATE----- + +# HARICA TLS RSA Root CA 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv +b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l +mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE +4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv +a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M +pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw +Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b +LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY +AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB +AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq +E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr +W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ +CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE +AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU +X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 +f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja +H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP +JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P +zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt +jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 +/L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT +BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 +aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW +xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU +63ZTGI0RmLowKTAKBggrBgEFBQcDAQwbSEFSSUNBIFRMUyBSU0EgUm9vdCBDQSAy +MDIx +-----END TRUSTED CERTIFICATE----- + +# Halcom CA FO +-----BEGIN TRUSTED CERTIFICATE----- +MIIDGjCCAgKgAwIBAgIDAbplMA0GCSqGSIb3DQEBBQUAMDUxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFTATBgNVBAMTDEhhbGNvbSBDQSBGTzAeFw0wNTA2 +MDUxMDMzMzFaFw0yMDA2MDUxMDMzMzFaMDUxCzAJBgNVBAYTAlNJMQ8wDQYDVQQK +EwZIYWxjb20xFTATBgNVBAMTDEhhbGNvbSBDQSBGTzCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBALyjJgGW5Z2sGgICOXys3AZMN0quB0h16CccpDH9Cqcj +XXw/DvrwjJFvVTSEA3TMAzV4zXHBRxu76iFuuAfeIZKqrLneN6If9JocG8juEIPW +U0PI3enzkEY5cgpO/BIpSYFYJjpxEwx7U4/fZnI8F9ze4XlKn+lgPm015E1R0RzA +GjBcBj9zQ8jNNvQewoeMT0if2nVXKkyvjVQ8RF+YPFDa0BgGfGBu0oT/Z4WQPV7G +69h6o7VtDL51uKnaVnE2Wu7rSVM+4hl2fEKroZDx9y+4ukpBtCukLmE259baf/Wf +jbhLW4Q1UMW9Baqqwgx0QWNXGY7/4UbmewUk/pndMb0CAwEAAaMzMDEwDwYDVR0T +AQH/BAUwAwEB/zARBgNVHQ4ECgQISCAcYg1YUiUwCwYDVR0PBAQDAgEGMA0GCSqG +SIb3DQEBBQUAA4IBAQBbdfXmMEZYivcP0U8LAVgEuWTkMA0+dtlrE60cbslM8Gzm +QhH964PvUNi7VJ20kYpatYQPjEbNPIKopR4gnND1QQbKASuYsOopUB/idHtZgsoK +5W5OrrA37T7MujLZPwtoLLLTPNw4xRHWGzPuuaJqRJMbUOphG3lXUVaeMtAzeLTP +Ryr7983x523gumT7FZu+yrHyRwF/4Ey3pUGsHtkabJHh0KhKw154K3qAwE/NJV9Q +J8a8WHWcHbWaXZVz84Rm081tHc3gWs4gOO+Sc3heAtaN+XTUt4nYjPt71Ytx1RkX +JtgkSTxVvIKH2mO7OdeOkc80cFxzT9BQR1r75VpRMBowCgYIKwYBBQUHAwMMDEhh +bGNvbSBDQSBGTw== +-----END TRUSTED CERTIFICATE----- + +# Halcom CA PO 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICGTCCAYKgAwIBAgIDATTiMA0GCSqGSIb3DQEBBQUAMDcxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFzAVBgNVBAMTDkhhbGNvbSBDQSBQTyAyMB4XDTA0 +MDIwNzE4MzMzMVoXDTE5MDIwNzE4MzMzMVowNzELMAkGA1UEBhMCU0kxDzANBgNV +BAoTBkhhbGNvbTEXMBUGA1UEAxMOSGFsY29tIENBIFBPIDIwgZ8wDQYJKoZIhvcN +AQEBBQADgY0AMIGJAoGBAJQX8kk3MDIJCDy+9Te3dGwQO8sicQcGucbs2kjznydt +ZI1V3nlHUPtoznkBvqcb9mGtfTELUyCtMfFbziP6/8wSAloAnPzNaxJS6KzUMztz +JhBxkEC/A4jfvF8hDYzWipMf564VVMZM5JlhkuD3jXLH3GITM6M+SSn7hL9wOpEh +AgMBAAGjMzAxMA8GA1UdEwEB/wQFMAMBAf8wEQYDVR0OBAoECEivV2a/0sACMAsG +A1UdDwQEAwIBBjANBgkqhkiG9w0BAQUFAAOBgQCQFld2uHnO/MTRNwCizf84BxFz +EwVJ7d/Bxc7GQNj3ApYNt28RhDhm+3H3EAFnfF19JNr2ZDsIgEimTr1E4rAHMo98 +hjdGb8CDA5O19PMSfKPoy+I6I3j6aG/+WMoMp1dRLWKQ+eSo3PXK3w6HUW43dSYO +1354igOilRm2XpEBVjAcMAoGCCsGAQUFBwMDDA5IYWxjb20gQ0EgUE8gMg== +-----END TRUSTED CERTIFICATE----- + +# Halcom Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDHjCCAgagAwIBAgIDB7HTMA0GCSqGSIb3DQEBDQUAMDcxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFzAVBgNVBAMTDkhhbGNvbSBSb290IENBMB4XDTEy +MDIwODA5NTU0MVoXDTMyMDIwODA5NTU0MVowNzELMAkGA1UEBhMCU0kxDzANBgNV +BAoTBkhhbGNvbTEXMBUGA1UEAxMOSGFsY29tIFJvb3QgQ0EwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQCJuYXK/vR1fX/snUI3urqNvOw9FwP92UVl1s3J +Tl+MSFyXCFcUiy2cPJBJmc9pr0mN2xwBsG7p9OqRZ13Ks2lP2MzBDT3uqgN24Mlw +op/+65vQtsmW0/D7W9DwB6tMXk2k4kdeBWh0po4iR+5+02eEVDeSRw7zo+wVGvNt +e78ZNSGPgkusVJwJzW62wVe90Ek9b59zjrFsfr3+1rs9A+jmTBq07q+0g04ykFT2 +ThvhL86lNBqOoyD52T4ia29u4/rZM1wIoPcVAD2cEJJKVc2Asgaq/dePt1qSJyQP +MzwouvEfaLV3KV6uwtqNNnDiejIbI6bexWENmqUSILXzllm1AgMBAAGjMzAxMA8G +A1UdEwEB/wQFMAMBAf8wEQYDVR0OBAoECE6U2Ipjws95MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQ0FAAOCAQEAKb7nseT6A6IPr3ZZnfhOU008BIOfoeKM9pTZtK5o +KlZrMlMogwdyTLBOqB2BgyFnAzfRjMbBToTpNDvT9fUnto0jBVK4TDLyLtrRKn0+ +gwMq0rHjmumKg0LwLAqhUw/AK+KPGk6VuUW8S2c6vTLzraWPj8Mu6vb0e2LQbm7F +YTETZuZnSZk7L4BPenxzigMNX/WzMigKisDh+bijJu7cG1fPdhpPU772SotXFysv +mYaq3ozatqhs32g21mGLbsBzTrc5RfR9zknE8x35qXds7++SFRMnmUbon6mKG58p +L6IdPtYrx+RVEDoY97N7Ty7HACLt5DHQ57jkVE/BgEUlbjAcMAoGCCsGAQUFBwMD +DA5IYWxjb20gUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Halcom Root Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIDgDCCAmigAwIBAgIDDN+bMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNVBAYTAlNJ +MRQwEgYDVQQKEwtIYWxjb20gZC5kLjEXMBUGA1UEYRMOVkFUU0ktNDMzNTMxMjYx +KjAoBgNVBAMTIUhhbGNvbSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0x +NjA2MTAwNzA3NTBaFw0zNjA2MTAwNzA3NTBaMGgxCzAJBgNVBAYTAlNJMRQwEgYD +VQQKEwtIYWxjb20gZC5kLjEXMBUGA1UEYRMOVkFUU0ktNDMzNTMxMjYxKjAoBgNV +BAMTIUhhbGNvbSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAOlSpsYa72O7rYH0kLJajw3VFjO0HBj7y4kq +MLtlgcTh+wKplAd25dcV5HpkEIDqPNCzoq2uHB/qu4FhmNT5jWmVxEUuAwnKhvpc +WhEXQDA+8MZjCcnxjUGlVg0FZGlLWKwqKZa7QDMWNEtnbNfxtEal6lmoQ2gPjDgq +qjz2RAOG+IrbRSErKR4St/qlZUHeBghYcJU+9EzZ6w8pqZGKnq3KEvXlleY42Rqm +i5xPpkgTEKV5RL1qOyn1FndAy36bXN++i+vnoBlvnxU/J54psfUN/F9HojzdLgsC ++/SN6uwMsfm0Baz5j6k9biwdOZ/QTp9OyGqegANh3M/4bZTLD88CAwEAAaMzMDEw +DwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQIQq6mQ8eYKLAwCwYDVR0PBAQDAgEG +MA0GCSqGSIb3DQEBCwUAA4IBAQBSuXnQ22P+GYH7DPnB5VBZyp2y+1wz0Dioq7Ua +TlMldSLTSb/Kgc/T4XujkUZ1yhrr2fVdvHuGNf2Bl5yE1yaYIvyxNdCplbZ8/+SX +tEB+SV1oyOLUOXUnTwORsjFXv4bXbcpxACI30DtYJFCgnIyaiY71KEZs5xbtsIGr +9EYmr6boGkV3cBaSsntxcdz330lnwDMIDi5TwXerx0qRTBLv5w4J5XUxIK5u/FqK +gJwQsNuoSszzK9w2NKb3qQtnnZDLPSafdc1MyR0GCnWLUsCB8NEmrMySphScXDwW +QvuTzAKoE/PargrDuBX0sNDU4BYgT6xQmHgmlB5o65Ry/veLMC8wCgYIKwYBBQUH +AwMMIUhhbGNvbSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# Hellenic Academic and Research Institutions ECC RootCA 2015 +-----BEGIN TRUSTED CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKRMF0wHgYIKwYB +BQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAww7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBFQ0MgUm9vdENBIDIwMTU= +-----END TRUSTED CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2011 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1Ix +RDBCBgNVBAoTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1p +YyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIFJvb3RDQSAyMDExMB4XDTExMTIw +NjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYTAkdSMUQwQgYDVQQK +EztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIENl +cnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBAKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPz +dYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJ +fel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa71HFK9+WXesyHgLacEns +bgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u8yBRQlqD +75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSP +FEDH3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNV +HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp +5dgTBCPuQSUwRwYDVR0eBEAwPqA8MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQu +b3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQub3JnMA0GCSqGSIb3DQEBBQUA +A4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVtXdMiKahsog2p +6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8 +TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7 +dIsXRSZMFpGD/md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8Acys +Nnq/onN694/BtZqhFLKPM58N7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXI +l7WdmplNsDz4SgCbZN2fOUvRJ9e4MEUwCgYIKwYBBQUHAwMMN0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9vdENBIDIwMTE= +-----END TRUSTED CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2015 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68MFkwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcD +Aww3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBS +b290Q0EgMjAxNQ== +-----END TRUSTED CERTIFICATE----- + +# HiPKI Root CA - G1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQLd2szmKXlKFD6LDNdmpeYDANBgkqhkiG9w0BAQsFADBP +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xGzAZBgNVBAMMEkhpUEtJIFJvb3QgQ0EgLSBHMTAeFw0xOTAyMjIwOTQ2MDRa +Fw0zNzEyMzExNTU5NTlaME8xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3 +YSBUZWxlY29tIENvLiwgTHRkLjEbMBkGA1UEAwwSSGlQS0kgUm9vdCBDQSAtIEcx +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9B5/UnMyDHPkvRN0o9Qw +qNCuS9i233VHZvR85zkEHmpwINJaR3JnVfSl6J3VHiGh8Ge6zCFovkRTv4354twv +Vcg3Px+kwJyz5HdcoEb+d/oaoDjq7Zpy3iu9lFc6uux55199QmQ5eiY29yTw1S+6 +lZgRZq2XNdZ1AYDgr/SEYYwNHl98h5ZeQa/rh+r4XfEuiAU+TCK72h8q3VJGZDnz +Qs7ZngyzsHeXZJzA9KMuH5UHsBffMNsAGJZMoYFL3QRtU6M9/Aes1MU3guvklQgZ +KILSQjqj2FPseYlgSGDIcpJQ3AOPgz+yQlda22rpEZfdhSi8MEyr48KxRURHH+CK +FgeW0iEPU8DtqX7UTuybCeyvQqww1r/REEXgphaypcXTT3OUM3ECoWqj1jOXTyFj +HluP2cFeRXF3D4FdXyGarYPM+l7WjSNfGz1BryB1ZlpK9p/7qxj3ccC2HTHsOyDr +y+K49a6SsvfhhEvyovKTmiKe0xRvNlS9H15ZFblzqMF8b3ti6RZsR1pl8w4Rm0bZ +/W3c1pzAtH2lsN0/Vm+h+fbkEkj9Bn8SV7apI09bA8PgcSojt/ewsTu8mL3WmKgM +a/aOEmem8rJY5AIJEzypuxC00jBF8ez3ABHfZfjcK0NVvxaXxA/VLGGEqnKG/uY6 +fsI/fe78LxQ+5oXdUG+3Se0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQU8ncX+l6o/vY9cdVouslGDDjYr7AwDgYDVR0PAQH/BAQDAgGGMA0GCSqG +SIb3DQEBCwUAA4ICAQBQUfB13HAE4/+qddRxosuej6ip0691x1TPOhwEmSKsxBHi +7zNKpiMdDg1H2DfHb680f0+BazVP6XKlMeJ45/dOlBhbQH3PayFUhuaVevvGyuqc +SE5XCV0vrPSltJczWNWseanMX/mF+lLFjfiRFOs6DRfQUsJ748JzjkZ4Bjgs6Fza +ZsT0pPBWGTMpWmWSBUdGSquEwx4noR8RkpkndZMPvDY7l1ePJlsMu5wP1G4wB9Tc +XzZoZjmDlicmisjEOf6aIW/Vcobpf2Lll07QJNBAsNB1CI69aO4I1258EHBGG3zg +iLKecoaZAeO/n0kZtCW+VmWuF2PlHt/o/0elv+EmBYTksMCv5wiZqAxeJoBF1Pho +L5aPruJKHJwWDBNvOIf2u8g0X5IDUXlwpt/L9ZlNec1OvFefQ05rLisY+GpzjLrF +Ne85akEez3GoorKGB1s6yeHvP2UEgEcyRHCVTjFnanRbEEV16rCf0OY1/k6fi8wr +kkVbbiVghUbN0aqwdmaTd5a+g744tiROJgvM7XpWGuDpWsZkrUx6AEhEL7lAuxM+ +vhV4nYWBSipX3tUZQ9rbyltHhoMLP7YNdnhzeSJesYAfz77RP1YQmCuVh6EfnWQU +YDksswBVLuT1sw5XxJFBAJw/6KXf6vb/yPCtbVKoF6ubYfwSUTXkJf2vqmqGOTAg +MAoGCCsGAQUFBwMBDBJIaVBLSSBSb290IENBIC0gRzE= +-----END TRUSTED CERTIFICATE----- + +# Hongkong Post Root CA 3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUCBZfikyl7ADJk0DfxMauI7gcWqQwDQYJKoZIhvcNAQEL +BQAwbzELMAkGA1UEBhMCSEsxEjAQBgNVBAgTCUhvbmcgS29uZzESMBAGA1UEBxMJ +SG9uZyBLb25nMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25n +a29uZyBQb3N0IFJvb3QgQ0EgMzAeFw0xNzA2MDMwMjI5NDZaFw00MjA2MDMwMjI5 +NDZaMG8xCzAJBgNVBAYTAkhLMRIwEAYDVQQIEwlIb25nIEtvbmcxEjAQBgNVBAcT +CUhvbmcgS29uZzEWMBQGA1UEChMNSG9uZ2tvbmcgUG9zdDEgMB4GA1UEAxMXSG9u +Z2tvbmcgUG9zdCBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCziNfqzg8gTr7m1gNt7ln8wlffKWihgw4+aMdoWJwcYEuJQwy51BWy7sFO +dem1p+/l6TWZ5Mwc50tfjTMwIDNT2aa71T4Tjukfh0mtUC1Qyhi+AViiE3CWu4mI +VoBc+L0sPOFMV4i707mV78vH9toxdCim5lSJ9UExyuUmGs2C4HDaOym71QP1mbpV +9WTRYA6ziUm4ii8F0oRFKHyPaFASePwLtVPLwpgchKOesL4jpNrcyCse2m5FHomY +2vkALgbpDDtw1VAliJnLzXNg99X/NWfFobxeq81KuEXryGgeDQ0URhLj0mRiikKY +vLTGCAj4/ahMZJx2Ab0vqWwzD9g/KLg8aQFChn5pwckGyuV6RmXpwtZQQS4/t+Tt +bNe/JgERohYpSms0BpDsE9K2+2p20jzt8NYt3eEV7KObLyzJPivkaTv/ciWxNoZb +x39ri1UbSsUgYT2uy1DhCDq+sI9jQVMwCFk8mB13umOResoQUGC/8Ne8lYePl8X+ +l2oBlKN8W4UdKjk60FSh0Tlxnf0h+bV78OLgAo9uliQlLKAeLKjEiafv7ZkGL7YK +TE/bosw3Gq9HhS2KX8Q0NEwA/RiTZxPRN+ZItIsGxVd7GYYKecsAyVKvQv83j+Gj +Hno9UKtjBucVtT+2RTeUN7F+8kjDf8V1/peNRY8apxpyKBpADwIDAQABo2MwYTAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBQXnc0e +i9Y5K3DTXNSguB+wAPzFYTAdBgNVHQ4EFgQUF53NHovWOStw01zUoLgfsAD8xWEw +DQYJKoZIhvcNAQELBQADggIBAFbVe27mIgHSQpsY1Q7XZiNc4/6gx5LS6ZStS6LG +7BJ8dNVI0lkUmcDrudHr9EgwW62nV3OZqdPlt9EuWSRY3GguLmLYauRwCy0gUCCk +MpXRAJi70/33MvJJrsZ64Ee+bs7Lo3I6LWldy8joRTnU+kLBEUx3XZL7av9YROXr +gZ6voJmtvqkBZss4HTzfQx/0TW60uhdG/H39h4F5ag0zD/ov+BS5gLNdTaqX4fnk +GMX41TiMJjz98iji7lpJiCzfeT2OnpA8vUFKOt1b9pq0zj8lMH8yfaIDlNDceqFS +3m6TjRgm/VWsvY+b0s+v54Ysyx8Jb6NvqYTUc79NoXQbTiNg8swOqn+knEwlqLJm +Ozj/2ZQw9nKEvmhVEA/GcywWaZMH/rFF7buiVWqw2rVKAiUnhde3t4ZEFolsgCs+ +l6mc1X5VTMbeRRAc6uk7nwNT7u56AQIWeNTowr5GdogTPyK7SBIdUgC0An4hGh6c +JfTzPV4e0hz5sy229zdcxsshTrD3mUcYhcErulWuBurQB7Lcq9CClnXO0lD+mefP +L5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB60PZ2Pierc+xYw5F9KBa +LJstxabArahH9CdMOA0uG0k7UvToiIMrVCjU8jVStDKDYmlkDJGcn5fqdBb9HxEG +mpv0MCUwCgYIKwYBBQUHAwEMF0hvbmdrb25nIFBvc3QgUm9vdCBDQSAz +-----END TRUSTED CERTIFICATE----- + +# I.CA - Qualified Certification Authority, 09/2009 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFHjCCBAagAwIBAgIEAKA3oDANBgkqhkiG9w0BAQsFADCBtzELMAkGA1UEBhMC +Q1oxOjA4BgNVBAMMMUkuQ0EgLSBRdWFsaWZpZWQgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHksIDA5LzIwMDkxLTArBgNVBAoMJFBydm7DrSBjZXJ0aWZpa2HEjW7DrSBh +dXRvcml0YSwgYS5zLjE9MDsGA1UECww0SS5DQSAtIEFjY3JlZGl0ZWQgUHJvdmlk +ZXIgb2YgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlczAeFw0wOTA5MDEwMDAwMDBaFw0x +OTA5MDEwMDAwMDBaMIG3MQswCQYDVQQGEwJDWjE6MDgGA1UEAwwxSS5DQSAtIFF1 +YWxpZmllZCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSwgMDkvMjAwOTEtMCsGA1UE +CgwkUHJ2bsOtIGNlcnRpZmlrYcSNbsOtIGF1dG9yaXRhLCBhLnMuMT0wOwYDVQQL +DDRJLkNBIC0gQWNjcmVkaXRlZCBQcm92aWRlciBvZiBDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtTaEy0KC8M9l +4lSaWHMs4+sVV1LwzyJYiIQNeCrv1HHm/YpGIdY/Z640ceankjQvIX7m23BK4OSC +6KO8kZYA3zopOz6GFCOKV2PvLukbc+c2imF6kLHEv6qNA8WxhPbR3xKwlHDwB2yh +Wzo7V3QVgDRG83sugqQntKYC3LnlTGbJpNP+Az72gpO9AHUn/IBhFk4ksc8lYS2L +9GCy9CsmdKSBP78p9w8Lx7vDLqkDgt1/zBrcUWmSSb7AE/BPEeMryQV1IdI6nlGn +BhWkXOYf6GSdayJw86btuxC7viDKNrbp44HjQRaSxnp6O3eto1x4DfiYdw/YbJFe +7EjkxSQBywIDAQABo4IBLjCCASowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E +BAMCAQYwgecGA1UdIASB3zCB3DCB2QYEVR0gADCB0DCBzQYIKwYBBQUHAgIwgcAa +gb1UZW50byBjZXJ0aWZpa2F0IGplIHZ5ZGFuIGpha28ga3ZhbGlmaWtvdmFueSBz +eXN0ZW1vdnkgY2VydGlmaWthdCBwb2RsZSB6YWtvbmEgYy4gMjI3LzIwMDAgU2Iu +IHYgcGxhdG5lbSB6bmVuaS9UaGlzIGlzIHF1YWxpZmllZCBzeXN0ZW0gY2VydGlm +aWNhdGUgYWNjb3JkaW5nIHRvIEN6ZWNoIEFjdCBOby4gMjI3LzIwMDAgQ29sbC4w +HQYDVR0OBBYEFHnL0CPpOmdwkXRP01Hi4CD94Sj7MA0GCSqGSIb3DQEBCwUAA4IB +AQB9laU214hYaBHPZftbDS/2dIGLWdmdSbj1OZbJ8LIPBMxYjPoEMqzAR74tw96T +i6aWRa5WdOWaS6I/qibEKFZhJAVXX5mkx2ewGFLJ+0Go+eTxnjLOnhVF2V2s+57b +m8c8j6/bS6Ij6DspcHEYpfjjh64hE2r0aSpZDjGzKFM6YpqsCJN8qYe2X1qmGMLQ +wvNdjG+nPzCJOOuUEypIWt555ZDLXqS5F7ZjBjlfyDZjEfS2Es9Idok8alf563Mi +9/o+Ba46wMYOkk3P1IlU0RqCajdbliioACKDztAqubONU1guZVzV8tuMASVzbJeL +/GAB7ECTwe1RuKrLYtglMKI9MD8wCgYIKwYBBQUHAwMMMUkuQ0EgLSBRdWFsaWZp +ZWQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHksIDA5LzIwMDk= +-----END TRUSTED CERTIFICATE----- + +# I.CA - Qualified root certificate +-----BEGIN TRUSTED CERTIFICATE----- +MIIEOTCCAyGgAwIBAgIEAJ0qYDANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJD +WjEqMCgGA1UEAwwhSS5DQSAtIFF1YWxpZmllZCByb290IGNlcnRpZmljYXRlMS0w +KwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEucy4wHhcN +MDgwNDAxMDAwMDAwWhcNMTgwNDAxMDAwMDAwWjBoMQswCQYDVQQGEwJDWjEqMCgG +A1UEAwwhSS5DQSAtIFF1YWxpZmllZCByb290IGNlcnRpZmljYXRlMS0wKwYDVQQK +DCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEucy4wggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrCIik8HTyn/jb1neNMBk+psXHisW93eYC +ro49UHW4r302q/717QhntACKmMEDY4hR8hs2iXRaLcjEgsQ/uYj9bP06HRUFRJWA +GqaGyyF1kIVcsHAAhzSo0R9J/Ww4bWqsuEWfvBTXZtQh4ycKjXXgWi8KS7TnfnOj +Kr1w8ZGGCI+/kIQch6n1mSUllMHjbgfBSwdbVPw0y0Y3nMWhIM6mrIepgzw4T8BA +8+n/m9c5duQTI3W1/6FCrlyGT8VOQ7aZC1JTIKizwkzTACwV0llsCp8htXMWeR6G +Je4a+5OerWPxTOJ2MV437/zQqTbk+RHpevxQ50EjAzS4fboOz91TAgMBAAGjgeow +gecwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwgaQGA1UdIASBnDCB +mTCBlgYMKwYBBAGBuEgBBAABMIGFMIGCBggrBgEFBQcCAjB2GnRUZW50byBjZXJ0 +aWZpa2F0IGplIHZ5ZGFuIGpha28ga3ZhbGlmaWtvdmFueSBzeXN0ZW1vdnkgY2Vy +dGlmaWthdCB2IHNvdWxhZHUgc2UgemFrb25lbSAyMjcvMjAwMCBTYi4gdiBwbGF0 +bmVtIHpuZW5pLjAdBgNVHQ4EFgQUaJ1+1sQlOfs7oDfWT9yM0XrwVlkwDQYJKoZI +hvcNAQEFBQADggEBAHL1vAaN0iyW8oLbWHtH8EBk5S4b7/rg+tPxckgBRPKI9N6Y +gVOE531OR+cxN1aus8Ewb8arSIP1mFNSaSoowUBl62XntDAL8KsOpRIlv/RQXb+j +fuXRdPgKKK5CnLAUUsSgYF33RRdCukItm5L7bpSzcEcgCJ1T8LCtvamEWt0HKgzN +K21hKN87kijsUYF/UXyOLn+d6bzBND2LrYGt8R50ZkM8QU24LjNPsToe2xLfNo5x +/1djsdaPtD2GEmrPQjC0kxbqmeoCW/4I7rJPcL8zAOd6Sjih8kiRph7LI7I4nfAu +SaLJiFZlZY46Z0WMjAviqrFLB/+xH7oUz3L6p3gwLzAKBggrBgEFBQcDAwwhSS5D +QSAtIFF1YWxpZmllZCByb290IGNlcnRpZmljYXRl +-----END TRUSTED CERTIFICATE----- + +# I.CA - Standard Certification Authority, 09/2009 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIDFuNgMA0GCSqGSIb3DQEBCwUAMIGrMQswCQYDVQQGEwJD +WjE5MDcGA1UEAwwwSS5DQSAtIFN0YW5kYXJkIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5LCAwOS8yMDA5MS0wKwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0 +b3JpdGEsIGEucy4xMjAwBgNVBAsMKUkuQ0EgLSBQcm92aWRlciBvZiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzMB4XDTA5MDkwMTAwMDAwMFoXDTE5MDkwMTAwMDAwMFow +gasxCzAJBgNVBAYTAkNaMTkwNwYDVQQDDDBJLkNBIC0gU3RhbmRhcmQgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHksIDA5LzIwMDkxLTArBgNVBAoMJFBydm7DrSBjZXJ0 +aWZpa2HEjW7DrSBhdXRvcml0YSwgYS5zLjEyMDAGA1UECwwpSS5DQSAtIFByb3Zp +ZGVyIG9mIENlcnRpZmljYXRpb24gU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUA +A4IBDwAwggEKAoIBAQCoCFYSP/uUg6lgdr1Fg36WNDzPSU7Wz/wg4eGxAhRtrcp+ +UHIpqf2cdyY4ZPdDQT8UggSiQZAC55n3g2J4RIXonQVw1P54oXQ0x6w7hQLd7lFb +RjtTM9Zn7OwULuPE5bN0gwDMxpbmHIPa3BhQafrdQ9GOQP0WpLeMZYfgvqyXH7Bx +6wBlVxbObIevl4jwXfeHTToRCqLCRBTAFvJP9duVQq8psymgg1Fu/jxRV5MwJSa6 +O2qGyPYL0XE/nLc6yM5nCYz6QBt6bN7IHKDGXLthGIg/LlkdVvx6RZym2TjZxWDM +uUFVt8q8Te60p8T2oA68icUBlbFc30/wzMLNQrtfAgMBAAGjVTBTMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMBEGA1UdIAQKMAgwBgYEVR0gADAdBgNV +HQ4EFgQUwUw4lNWAhkjZIpAs0+4ZENtnR4cwDQYJKoZIhvcNAQELBQADggEBAKPL +0X10+zV4B5Lo7mjp5FJe8NhjkZSfaPu+W7qp4WN3q1B2xulWR1RQmbQli+jBGXI2 +Wgm+59b6wrYyPUfDUE6ZbpM2xYpRd2PgSTOrPB+K6TvZhrUox8J1cVtmao1YDvN1 +kLWtLIEYzZzYw81P8ftpIJfASM8TRRK1HPY+g+JOXt1ZxmtK4EjO2SqdZTq9L/Dw +TLwJess3AKQ/Owwj3eP7xkKitLbm0nKFTN+z3hanfh3n1M+tq7NQ5HCM37BwkMmG +nu58hItkHGvhaBV+yaV04E73WurdEjGrkUCFcQvOKSj5bjgUXB3+7BG/TUN+nl84 +v9fqnpMv0B10tQUJ0yIwPjAKBggrBgEFBQcDAwwwSS5DQSAtIFN0YW5kYXJkIENl +cnRpZmljYXRpb24gQXV0aG9yaXR5LCAwOS8yMDA5 +-----END TRUSTED CERTIFICATE----- + +# I.CA - Standard root certificate +-----BEGIN TRUSTED CERTIFICATE----- +MIIELjCCAxagAwIBAgIDE9YgMA0GCSqGSIb3DQEBBQUAMGMxCzAJBgNVBAYTAkNa +MSkwJwYDVQQDEyBJLkNBIC0gU3RhbmRhcmQgcm9vdCBjZXJ0aWZpY2F0ZTEpMCcG +A1UEChMgUHJ2bmkgY2VydGlmaWthY25pIGF1dG9yaXRhIGEucy4wHhcNMDgwNDAx +MDAwMDAwWhcNMTgwNDAxMDAwMDAwWjBjMQswCQYDVQQGEwJDWjEpMCcGA1UEAxMg +SS5DQSAtIFN0YW5kYXJkIHJvb3QgY2VydGlmaWNhdGUxKTAnBgNVBAoTIFBydm5p +IGNlcnRpZmlrYWNuaSBhdXRvcml0YSBhLnMuMIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEA0S0VxDlMaqHE5fMrtP2pFum4UY83kdmn05eQtnBph/WvWdJi +QVjV85WNAhX6ZpzBIRTYH636Kmx0VqFi4fGwrbj+0qPgkaG1rlOtjaQND1lglyr8 +oy5zNSNzzKimoRRtv4nDhDjzZFnMMfPg+SdgCjxBBW9aUvCPblJu7F6Ib+BAjCFH +VyLpOG7m+vMktK6vL3M/gNUyj4zZhBnYYM7baY0+rwKvrt6vUPXP5rNhGMTg3fBO +SmYNenMgt+TUk4ZHYdhPyjqOq8I/xiIXo12dIMbFDiRpyKZ9ZgbNRuYz4UN0k/WD +YtKwRSIBpHa961GTWGz6GqGfdYDa2ADi8YhNPwIDAQABo4HqMIHnMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTrN6S+uW9gF/vT/y1g +4QQer8/G0zCBpAYDVR0gBIGcMIGZMIGWBgwrBgEEAYG4SAEBAAEwgYUwgYIGCCsG +AQUFBwICMHYadFRlbnRvIGNlcnRpZmlrYXQgamUgdnlkYW4gamFrbyBrdmFsaWZp +a292YW55IHN5c3RlbW92eSBjZXJ0aWZpa2F0IHYgc291bGFkdSBzZSB6YWtvbmVt +IDIyNy8yMDAwIFNiLiB2IHBsYXRuZW0gem5lbmkuMA0GCSqGSIb3DQEBBQUAA4IB +AQAXIliqLxhVAqFMNkk3S5tzuq5jNg6LK4RFN8z64Gf3oHNqZ2hWvGGoNJooumYs +YZuLHPgEcIyG40HvlHkN3TSHBO61njFrOfR+WOXysARNqVclSeAL1eTsfQ4+OwHg +jPxSkJPm8rCr9TF3zNHJQ4KrDy60+ZiuPuNE9KQDaVXaXI7bwbms5JjVdhVGoS5a +DCJgoMLrcH9xA7Bo0zFkzerLS1WJgj5cZssaCJhHwt7ZLjhMBf0tjPrjIiW5kv3W +si3KojSc30nv1YQBLJL/BUEKZ8ZCa57L2J+QvA0PEH3HZr3qcwfgGOpRgbRFQDwP +oSI3FQGFqS58Dl9dzmqTvtm+MC4wCgYIKwYBBQUHAwMMIEkuQ0EgLSBTdGFuZGFy +ZCByb290IGNlcnRpZmljYXRl +-----END TRUSTED CERTIFICATE----- + +# I.CA Root CA/RSA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGfjCCBGagAwIBAgIEBfXhADANBgkqhkiG9w0BAQ0FADBwMQswCQYDVQQGEwJD +WjEtMCsGA1UECgwkUHJ2bsOtIGNlcnRpZmlrYcSNbsOtIGF1dG9yaXRhLCBhLnMu +MRkwFwYDVQQDDBBJLkNBIFJvb3QgQ0EvUlNBMRcwFQYDVQQFEw5OVFJDWi0yNjQz +OTM5NTAeFw0xNTA1MjcxMjIwMDBaFw00MDA1MjcxMjIwMDBaMHAxCzAJBgNVBAYT +AkNaMS0wKwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEu +cy4xGTAXBgNVBAMMEEkuQ0EgUm9vdCBDQS9SU0ExFzAVBgNVBAUTDk5UUkNaLTI2 +NDM5Mzk1MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqj9VtYmvdhQG +KmQmlDgPX/bcBG8xRfUK/Tt/m3Jv+EB8/l39NJkFOJRJurHwvfiZXMBR+qoN++Zx +FYVjESp3BpGSBoiz/BThmUa0KYKuhIPutSaHbviLVUSdQNj/Klqq6H/SZeEUR8J8 +Mf11YQobjIBKnrTiLhRHMe68BVGupn7PEbjFSL0FVMKE5Kdoa/i4+n4oybnP5CFP +ZcmIaKA42XWlETtMHG5LHtSGbMGtBUfTLJQNzIctGi3D1szehP7sa8DhIxOh05wY +fuBy11xVvEyzQDEbnEDNmuuADnGu12JuWhZPH/ZlRdGfeoVBGcJ6Os4hkuSUcEy7 +qEHGxLs1zfU6nmOpjaBq0SBEqiq2SKVyw86e5FhIRwl/AkHzDRxtCXjw1xTRoFX8 +EdZaGgB55TvmCMtSnqQJq2vnbJwqLyJ9+7lQst5Q0y8McrnWs7ezCObre6z0tMX2 +wTIfpxkh9dxeN6rHH1ObQz7mnp/aDddWog9TaS1Vv+uGeBG/ptdaTfMOk3Pq/w7Q +54/xyLPw2BhzbKVyiPFwTEdUtpta0bwmN40Y35trLtsLJbOKsuOtBlxtu30XAwcB +ijCXiXRtSpR3Luvuz7Aetep29LUUOJXX1dkvP7KkJsxNo1yNCfNeDIUyzlZsAgjx +S6Orv8hUoAWFdOR1HXq8nDtgPWr9GZECAwEAAaOCAR4wggEaMA4GA1UdDwEB/wQE +AwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2uQNI+9UYoaE3oO3MaIJM +UjQ2DTCB1wYDVR0gBIHPMIHMMIHJBgRVHSAAMIHAMIG9BggrBgEFBQcCAjCBsBqB +rVRlbnRvIGt2YWxpZmlrb3Zhbnkgc3lzdGVtb3Z5IGNlcnRpZmlrYXQgYnlsIHZ5 +ZGFuIHBvZGxlIHpha29uYSAyMjcvMjAwMCBTYi4gdiBwbGF0bmVtIHpuZW5pL1Ro +aXMgcXVhbGlmaWVkIHN5c3RlbSBjZXJ0aWZpY2F0ZSB3YXMgaXNzdWVkIGFjY29y +ZGluZyB0byBBY3QgTm8uIDIyNy8yMDAwIENvbGwuMA0GCSqGSIb3DQEBDQUAA4IC +AQAZVAIlg9silosdlZ6Z2zTOk9AfLntcYCRqDNeFRHgfHEnyFPiDVBmmnTJmuCOm +O4Yqnzb8F/xQD2DGN/0kqPd5p46/2AcVVF5SDL74ptjIQUTx9hPcgxlbr91k9zMW +hw8VWvFkvNTnVT8yOIma88xIxWwxcZKaJhfCfEcCbTUnn/Ma4aodDXQRqZN8Qahv +u46cxQHkc/a6UC7mENS8bxOaOLlpRqUG1vJMbDerPPjbGsZV8Mj4HSFuLwBqseJt +WgQtfd0JT/bvFC/AEuoJGSsayqBxm7E6Mrz/QxjzfS/1LojpUbbxSZBM/ybHw1nd +dF/BUF04XJ1oVWlqtEB3yV8yKUhUk8GzISN2oVUwaSM/MUnEoc07dlmVWoK0rXG1 +vqaRzIAVSi/OlK4YVUl1IES48wGbwXgsjhBMp2StrTrrTB1WLn+U1B7QCtXJVIEO +Hv73lPlhOj817tNgyftIsm7C2b56bpgFcACj0RfHxjSvbPVNj11SDN2Am3pt55jj +OYVcP4vMRKJANjKTElaQAp4+WWgCH1aIHq/B/g97VY2X2bumk0e6fPhHtjnXjPJA +bIecDP4t3dxx/A6RCKRDPYpX3d0H66eXUdC6hJmti3n+yQSQgxMr6ZcNZYnyES03 +jku4u9J6OSrF3NBdDd0EJ5ifWP2OhrsFf/DtN5KQ3Zy9/DAeMAoGCCsGAQUFBwMD +DBBJLkNBIFJvb3QgQ0EvUlNB +-----END TRUSTED CERTIFICATE----- + +# IGC/A +-----BEGIN TRUSTED CERTIFICATE----- +MIIEAjCCAuqgAwIBAgIFORFFEJQwDQYJKoZIhvcNAQEFBQAwgYUxCzAJBgNVBAYT +AkZSMQ8wDQYDVQQIEwZGcmFuY2UxDjAMBgNVBAcTBVBhcmlzMRAwDgYDVQQKEwdQ +TS9TR0ROMQ4wDAYDVQQLEwVEQ1NTSTEOMAwGA1UEAxMFSUdDL0ExIzAhBgkqhkiG +9w0BCQEWFGlnY2FAc2dkbi5wbS5nb3V2LmZyMB4XDTAyMTIxMzE0MjkyM1oXDTIw +MTAxNzE0MjkyMlowgYUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQIEwZGcmFuY2UxDjAM +BgNVBAcTBVBhcmlzMRAwDgYDVQQKEwdQTS9TR0ROMQ4wDAYDVQQLEwVEQ1NTSTEO +MAwGA1UEAxMFSUdDL0ExIzAhBgkqhkiG9w0BCQEWFGlnY2FAc2dkbi5wbS5nb3V2 +LmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsh/R0GLFMzvABIaI +s9z4iPf930Pfeo2aSVz2TqrMHLmh6yeJ8kbpO0px1R2OLc/mratjUMdUC24SyZA2 +xtgv2pGqaMVy/hcKshd+ebUyiHDKcMCWSo7kVc0dJ5S/znIq7Fz5cyD+vfcuiWe4 +u0dzEvfRNWk68gq5rv9GQkaiv6GFGvm/5P9JhfejcIYyHF2fYPepraX/z9E0+X1b +F8bc1g4oa8Ld8fUzaJ1O/Id8NhLWo4DoQw1VYZTqZDdH6nfK0LJYBcNdfrGoRpAx +Vs5wKpayMLh35nnAvSk7/ZR3TL0gzUEl4C7HG7vupARB0l2tEmqKm0f7yd1GQOGd +PDPQtQIDAQABo3cwdTAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBRjAVBgNV +HSAEDjAMMAoGCCqBegF5AQEBMB0GA1UdDgQWBBSjBS8YYFDCiQrdKyFP/45OqDAx +NjAfBgNVHSMEGDAWgBSjBS8YYFDCiQrdKyFP/45OqDAxNjANBgkqhkiG9w0BAQUF +AAOCAQEABdwm2Pp3FURo/C9mOnTgXeQp/wYHE4RKq89toB9RlPhJy3Q2FLwV3duJ +L92PoF189RLrn544pEfMs5bZvpwlqwN+Mw+VgQ39FuCIvjfwbF3QMZsyK10XZZOY +YLxuj7GoPB7ZHPOpJkL5ZB3C55L29B5aqhlSXa/oovdgoPaN8In1buAKBQGVyYsg +Crpa/JosPL3Dt8ldeCUFP1YUmwza+zpI/pdpXsoQhvdOlgQITeywvl3cO45Pwf2a +NjSaTFR+FwNIlQgRHAdvhQh+XU3Endv7rs6y0bO4g2wdsrN58dhwmX7wEwLOXt1R +0982gaEbeC9xs/FZTEYYKKuF0mBWWjATMAoGCCsGAQUFBwMDDAVJR0MvQQ== +-----END TRUSTED CERTIFICATE----- + +# IGC/A AC racine Etat francais +-----BEGIN TRUSTED CERTIFICATE----- +MIIFwzCCA6ugAwIBAgISESGFDLOcajL6vmcbgT+khhWPMA0GCSqGSIb3DQEBCwUA +MF4xCzAJBgNVBAYTAkZSMQ4wDAYDVQQKEwVBTlNTSTEXMBUGA1UECxMOMDAwMiAx +MzAwMDc2NjkxJjAkBgNVBAMTHUlHQy9BIEFDIHJhY2luZSBFdGF0IGZyYW5jYWlz +MB4XDTExMDcwODA5MDAwMFoXDTI4MDQxNTA5MDAwMFowXjELMAkGA1UEBhMCRlIx +DjAMBgNVBAoTBUFOU1NJMRcwFQYDVQQLEw4wMDAyIDEzMDAwNzY2OTEmMCQGA1UE +AxMdSUdDL0EgQUMgcmFjaW5lIEV0YXQgZnJhbmNhaXMwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCqfCifETCYzW9uLIUSJjsIBspB/VJPQ73AJidxdhpZ +ltgJ6weqJk5PPkuh45eHhWaBccm5FXZvd1AYkxAtN4hNF7fzRb0iLrcnmFvHBf29 +M+2i9VMdKCNlv0A1bs5qC8Op9SUMqyLwuMDEfTcMo2J87rTbPSE5p5yJ45uiEPiK +tkovLphpK2qghtrxCOW+TGcWLSVh89UNCxdERwnURgWdD8CITWHkJMTHaAmvrNKv +uZUmb4AE/HasqscjtuQGkVVE7GTbmYEc0lZ0/dYyKLvLyTcN+2lsb7qjawaMakAu +Fzo56tAM31ocum+kMrC4zD53G9OLH4b6/z4+b1yIRufjD/qrHfN9S/hUbk7M3DJa +Y3iiMq8zeOpD4Ux6TdeUBi3mT6VCkq8oik/DFeypa6nf4N0TArzMff8t5gepvnWW +6kJeWxreojOzY72rBfmL5r1N0W1WmuuJPJ/AeOS+JXAGxRFzoMjKFMs61PKcKjza +Xxcz2XYUN6pJh2XZ9NkuGV/5oM2ouUEybXGmpMv3YyLQKeS6gRpqKR2apaRcRlQk +RdTI7Xp5heyEd25nTWQPQ956g6Sn2Nu1U0z+YsgTw2I2pSgxMpu0lofimcYfVr9G +o6lkMeXVsUuoZsxbof8W/Ao4KmiPdyUmrZF0hWjIfxrlWhS4fQ63IzHAZLcFL0FY +VQIDAQABo3sweTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNV +HSAEDzANMAsGCSqBegGBXwEBAjAdBgNVHQ4EFgQUn6rTKZbfAOVD4PFjrN4SjsIn +ePowHwYDVR0jBBgwFoAUn6rTKZbfAOVD4PFjrN4SjsInePowDQYJKoZIhvcNAQEL +BQADggIBAHW1ddGONmacSPeFDU4Fu02anLQOKKIEvFAwu/SUTJiQhavgUmRP0tIu +YpOQsIUNiFT7xlRsnuuVeYBeopcWH/JndEGcVfS3aptKFoa9BR9mgHB+ydH1LSFx +UDmlrYimJhyL1yUcOtbj9MIMn1fBZMhXUSMWI40PI2pWS//6xp81k8YiwGXxr96p +bBi+V2VZzfQjVWQh2O2VYWkzcmpR9p/llW2O3mtzJxOUXn6XSMAyFr49N+3W3I68 +XC38YqjP9pD3sYsJ6zokYw3IlkXUL3dIQvUtYucnC+ARhhndpxD3YwaRMGladfSs ++aGNl8ag7zofkyVIVjoaiCEZk8OVIEkIVUlNolOcmZxzaS6n9cq3DiXvNyNfkNhD +fu6EF2onXn/SLT+sPq8wp42RxPSPCR3z95EO4xi63ETJfQVTA7duoPN519EaT9C4 +bIh2wYCYVYVTYc9EV0zeTg0WUfE9iYGufQutirXuVsTGzBELGNT8/Xn7/gQRnCPv +dnLHjb65Hnh28pocrWNCx9jtbWGQwiEqDwgULSBDJXwYtbegpH25pQwZ/smrPedb +3q/6VxknhecjDvTNDRkwPorkxhEe8LR9aWObDpaGkOD7A29bWT4dIfVXZ1Ym8ocZ +B4S6LJA6wyikBVogzalblXU5fyJQCk5/F/ezrNMHpr4tUgowTHgQMCswCgYIKwYB +BQUHAwMMHUlHQy9BIEFDIHJhY2luZSBFdGF0IGZyYW5jYWlz +-----END TRUSTED CERTIFICATE----- + +# ISRG Root X1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 +WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu +ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc +h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ +0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U +A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW +T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH +B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC +B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv +KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn +OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn +jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw +qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI +rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq +hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL +ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ +3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK +NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 +ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur +TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC +jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc +oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq +4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA +mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d +emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCcw +GjAKBggrBgEFBQcDAQwMSVNSRyBSb290IFgx +-----END TRUSTED CERTIFICATE----- + +# ISRG Root X2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw +CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg +R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 +MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT +ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw +EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW ++1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 +ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI +zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW +tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 +/q4AaOeMSQ+2b1tbFfLnMBowCgYIKwYBBQUHAwEMDElTUkcgUm9vdCBYMg== +-----END TRUSTED CERTIFICATE----- + +# IdenTrust Commercial Root CA 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6HMEAwHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwweSWRlblRydXN0IENvbW1lcmNpYWwgUm9v +dCBDQSAx +-----END TRUSTED CERTIFICATE----- + +# IdenTrust Public Sector Root CA 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu +VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN +MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 +MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 +ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy +RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS +bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF +/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R +3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw +EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy +9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V +GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ +2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV +WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD +W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN +AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj +t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV +DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 +TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G +lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW +mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df +WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 ++bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ +tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA +GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv +8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+cMDkwFAYI +KwYBBQUHAwQGCCsGAQUFBwMBDCFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290 +IENBIDE= +-----END TRUSTED CERTIFICATE----- + +# Izenpe.com +-----BEGIN TRUSTED CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 +MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 +ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD +VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j +b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq +scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO +xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H +LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX +uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD +yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ +JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q +rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN +BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L +hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB +QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ +HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu +Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg +QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB +BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx +MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA +A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb +laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 +awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo +JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw +LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT +VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk +LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb +UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ +QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ +naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls +QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxzAiMBQGCCsGAQUF +BwMBBggrBgEFBQcDAwwKSXplbnBlLmNvbQ== +-----END TRUSTED CERTIFICATE----- + +# Japanese Government +-----BEGIN TRUSTED CERTIFICATE----- +MIIDoDCCAoigAwIBAgIBMTANBgkqhkiG9w0BAQUFADBDMQswCQYDVQQGEwJKUDEc +MBoGA1UEChMTSmFwYW5lc2UgR292ZXJubWVudDEWMBQGA1UECxMNQXBwbGljYXRp +b25DQTAeFw0wNzEyMTIxNTAwMDBaFw0xNzEyMTIxNTAwMDBaMEMxCzAJBgNVBAYT +AkpQMRwwGgYDVQQKExNKYXBhbmVzZSBHb3Zlcm5tZW50MRYwFAYDVQQLEw1BcHBs +aWNhdGlvbkNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp23gdE6H +j6UG3mii24aZS2QNcfAKBZuOquHMLtJqO8F6tJdhjYq+xpqcBrSGUeQ3DnR4fl+K +f5Sk10cI/VBaVuRorChzoHvpfxiSQE8tnfWuREhzNgaeZCw7NCPbXCbkcXmP1G55 +IrmTwcrNwVbtiGrXoDkhBFcsovW8R0FPXjQilbUfKW1eSvNNcr5BViCH/OlQR9cw +FO5cjFW6WY2H/CPek9AEjP3vbb3QesmlOmpyM8ZKDQUXKi17safY1vC+9D/qDiht +QWEjdnjDuGWk81quzMKq2edY3rZ+nYVunyoKb58DKTCXKB28t89UKU5RMfkntigm +/qJj5kEW8DOYRwIDAQABo4GeMIGbMB0GA1UdDgQWBBRUWssmP3HMlEYNllPqa0jQ +k/5CdTAOBgNVHQ8BAf8EBAMCAQYwWQYDVR0RBFIwUKROMEwxCzAJBgNVBAYTAkpQ +MRgwFgYDVQQKDA/ml6XmnKzlm73mlL/lupwxIzAhBgNVBAsMGuOCouODl+ODquOC +seODvOOCt+ODp+ODs0NBMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADlqRHZ3ODrso2dGD/mLBqj7apAxzn7s2tGJfHrrLgy9mTLnsCTWw//1sogJ +hyzjVOGjprIIC8CFqMjSnHH2HZ9g/DgzE+Ge3Atf2hZQKXsvcJEPmbo0NI2VdMV+ +eKlmXb3KIXdCEKxmJj3ekav9FfBv7WxfEPjzFvYDio+nEhEMy/0/ecGc/WLuo89U +DNErXxc+4z6/wCs+CZv+iKZ+tJIX/COUgb1up8WMwusRRdv4QcmWdupwX3kSa+Sj +B1oF7ydJzyGfikwJcGapJsErEU4z0g781mzSDjJkaP+tBXhfAx2o45CsJOAPQKdL +rosot4LKGAfmt1t06SAZf7IbiVQwITAKBggrBgEFBQcDAwwTSmFwYW5lc2UgR292 +ZXJubWVudA== +-----END TRUSTED CERTIFICATE----- + +# Juur-SK +-----BEGIN TRUSTED CERTIFICATE----- +MIIE5jCCA86gAwIBAgIEO45L/DANBgkqhkiG9w0BAQUFADBdMRgwFgYJKoZIhvcN +AQkBFglwa2lAc2suZWUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKExlBUyBTZXJ0aWZp +dHNlZXJpbWlza2Vza3VzMRAwDgYDVQQDEwdKdXVyLVNLMB4XDTAxMDgzMDE0MjMw +MVoXDTE2MDgyNjE0MjMwMVowXTEYMBYGCSqGSIb3DQEJARYJcGtpQHNrLmVlMQsw +CQYDVQQGEwJFRTEiMCAGA1UEChMZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1czEQ +MA4GA1UEAxMHSnV1ci1TSzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB +AIFxNj4zB9bjMI0TfncyRsvPGbJgMUaXhvSYRqTCZUXP00B841oiqBB4M8yIsdOB +SvZiF3tfTQou0M+LI+5PAk676w7KvRhj6IAcjeEcjT3g/1tf6mTll+g/mX8MCgkz +ABpTpyHhOEvWgxutr2TC+Rx6jGZITWYfGAriPrsfB2WThbkasLnE+w0R9vXW+RvH +LCu3GFH+4Hv2qEivbDtPL+/40UceJlfwUR0zlv/vWT3aTdEVNMfqPxZIe5EcgEMP +PbgFPtGzlc3Yyg/CQ2fbt5PgIoIuvvVoKIO5wTtpeyDaTpxt4brNj3pssAki14sL +2xzVWiZbDcDq5WDQn/413z8CAwEAAaOCAawwggGoMA8GA1UdEwEB/wQFMAMBAf8w +ggEWBgNVHSAEggENMIIBCTCCAQUGCisGAQQBzh8BAQEwgfYwgdAGCCsGAQUFBwIC +MIHDHoHAAFMAZQBlACAAcwBlAHIAdABpAGYAaQBrAGEAYQB0ACAAbwBuACAAdgDk +AGwAagBhAHMAdABhAHQAdQBkACAAQQBTAC0AaQBzACAAUwBlAHIAdABpAGYAaQB0 +AHMAZQBlAHIAaQBtAGkAcwBrAGUAcwBrAHUAcwAgAGEAbABhAG0ALQBTAEsAIABz +AGUAcgB0AGkAZgBpAGsAYQBhAHQAaQBkAGUAIABrAGkAbgBuAGkAdABhAG0AaQBz +AGUAawBzMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNrLmVlL2Nwcy8wKwYDVR0f +BCQwIjAgoB6gHIYaaHR0cDovL3d3dy5zay5lZS9qdXVyL2NybC8wHQYDVR0OBBYE +FASqekej5ImvGs8KQKcYP2/v6X2+MB8GA1UdIwQYMBaAFASqekej5ImvGs8KQKcY +P2/v6X2+MA4GA1UdDwEB/wQEAwIB5jANBgkqhkiG9w0BAQUFAAOCAQEAe8EYlFOi +CfP+JmeaUOTDBS8rNXiRTHyoERF5TElZrMj3hWVcRrs7EKACr81Ptcw2Kuxd/u+g +kcm2k298gFTsxwhwDY77guwqYHhpNjbRxZyLabVAyJRld/JXIWY7zoVAtjNjGr95 +HvxcHdMdkxuLDF2FvZkwMhgJkVLpfKG6/2SSmuz+Ne6ML678IIbsSt4beDI3poHS +na9aEhbKmVv8b20OxaAehsmR0FyYgl9jDIpaq9iVpszLita/ZEuOyoqysOkhMp6q +qIWYNIE5ITuoOlIyPfZrN4YGWhWY3PARZv40ILcD9EEQfTmEeZZyY7aWAuVrua0Z +TbvGRNs2yyqcjjAVMAoGCCsGAQUFBwMDDAdKdXVyLVNL +-----END TRUSTED CERTIFICATE----- + +# KEYNECTIS ROOT CA +-----BEGIN TRUSTED CERTIFICATE----- +MIID5TCCAs2gAwIBAgISESG8J2xVR69YTu/UztYpsqKFMA0GCSqGSIb3DQEBCwUA +MEwxCzAJBgNVBAYTAkZSMRIwEAYDVQQKEwlLRVlORUNUSVMxDTALBgNVBAsTBFJP +T1QxGjAYBgNVBAMTEUtFWU5FQ1RJUyBST09UIENBMB4XDTA5MDUyNjAwMDAwMFoX +DTIwMDUyNjAwMDAwMFowTDELMAkGA1UEBhMCRlIxEjAQBgNVBAoTCUtFWU5FQ1RJ +UzENMAsGA1UECxMEUk9PVDEaMBgGA1UEAxMRS0VZTkVDVElTIFJPT1QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDG/bMXhaGtJhuVaTUhPaSI+t7b +YDZAF2nCFGP7uNnCdBU3LpzQIM1pjYQyooVMFLSb8iWzVCqDPy2+D/M7ZNH/oFDv +d087TuE/C2SFmrpYftLDYtNkJaLUspc8d11jKjOS/M2CDZtUlYf1teuMzVvRyjAv +yYhGtc0NEbQYj+7RoT5dFegoz9/DkJtszNEMRXezOuuKkB3pr2RqiXupPUN0+uRn +IqH73E3E9WLJyiW0yYBgM6nde6ACv5YlCl7JXyl7tBeBi22BGdDZg1wFj0FpGmlD +gJ+or+DpjJGLJyuiJmDND/KkowKDjhiBwheKQxX5bfMdEKRanERhIyF62PvRAgMB +AAGjgcAwgb0wEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMCAQYwVwYD +VR0fBFAwTjBMoEqgSIZGaHR0cDovL3RydXN0Y2VudGVyLWNybC5jZXJ0aWZpY2F0 +Mi5jb20vS2V5bmVjdGlzL0tFWU5FQ1RJU19ST09UX0NBLmNybDAdBgNVHQ4EFgQU +77cjl9CokX+mz6YhwDSfzHdB4dAwHwYDVR0jBBgwFoAU77cjl9CokX+mz6YhwDSf +zHdB4dAwDQYJKoZIhvcNAQELBQADggEBABoxaZlCwuVAhaKfksNj1I8hOagZIf56 +/MNNQPMr6EusW0xZk8bcfguvfF+VhWu9x2+6wb74xjpnS5PGBWk+JC3wG5HGPj/s +QhiTbAMkim75IGcrfG2rNMkqIjMN132P7tI2ZELINZpuGWHLjWfwaKfQJAXmwxe6 +Ra58Q7WAeANNIHMF/EMQnTVpQnWUJYIrpjuQGN7Bqa/zLZW/lafPGJfhWeKirxoW +YQ33E3FTkzf9PK8AHWyLFK9Gloy2UnzMLU7N4elLCu6a/nqY5ym6G9ocutxrzQQO +JkCp63M8/lCoESdVvduOS+9PGO0V/72GmGbumiVxNGxQ8bJRy2adTSkwHzAKBggr +BgEFBQcDAwwRS0VZTkVDVElTIFJPT1QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# KISA RootCA 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDczCCAlugAwIBAgIBBDANBgkqhkiG9w0BAQUFADBkMQswCQYDVQQGEwJLUjEN +MAsGA1UECgwES0lTQTEuMCwGA1UECwwlS29yZWEgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgQ2VudHJhbDEWMBQGA1UEAwwNS0lTQSBSb290Q0EgMTAeFw0wNTA4MjQw +ODA1NDZaFw0yNTA4MjQwODA1NDZaMGQxCzAJBgNVBAYTAktSMQ0wCwYDVQQKDARL +SVNBMS4wLAYDVQQLDCVLb3JlYSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBDZW50 +cmFsMRYwFAYDVQQDDA1LSVNBIFJvb3RDQSAxMIIBIDANBgkqhkiG9w0BAQEFAAOC +AQ0AMIIBCAKCAQEAvATk+hM58DSWIGtsaLv623f/J/es7C/n/fB/bW+MKs0lCVsk +9KFo/CjsySXirO3eyDOE9bClCTqnsUdIxcxPjHmc+QZXfd3uOPbPFLKc6tPAXXdi +8EcNuRpAU1xkcK8IWsD3z3X5bI1kKB4g/rcbGdNaZoNy4rCbvdMlFQ0yb2Q3lIVG +yHK+d9VuHygvx2nt54OJM1jT3qC/QOhDUO7cTWu8peqmyGGO9cNkrwYV3CmLP3WM +vHFE2/yttRcdbYmDz8Yzvb9Fov4Kn6MRXw+5H5wawkbMnChmn3AmPC7fqoD+jMUE +CSVPzZNHPDfqAmeS/vwiJFys0izgXAEzisEZ2wIBA6MyMDAwHQYDVR0OBBYEFL+2 +J9gDWnZlTGEBQVYx5Yt7OtnMMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEF +BQADggEBABOvUQveimpb5poKyLGQSk6hAp3MiNKrZr097LuxQpVqslxa/6FjZJap +aBV/JV6K+KRzwYCKhQoOUugy50X4TmWAkZl0Q+VFnUkq8JSV3enhMNITbslOsXfl +BM+tWh6UCVrXPAgcrnrpFDLBRa3SJkhyrKhB2vAhhzle3/xk/2F0KpzZm4tfwjeT +2KM3LzuTa7IbB6d/CVDv0zq+IWuKkDsnSlFOa56ch534eJAx7REnxqhZvvwYC/uO +fi5C4e3nCSG9uRPFVmf0JqZCQ5BEVLRxm3bkGhKsGigA35vB1fjbXKP4krG9tNT5 +UNkAAk/bg9ART6RCVmE6fhMy04QfybowGzAKBggrBgEFBQcDAwwNS0lTQSBSb290 +Q0EgMQ== +-----END TRUSTED CERTIFICATE----- + +# LAWtrust Root CA2 (4096) +-----BEGIN TRUSTED CERTIFICATE----- +MIIFmDCCA4CgAwIBAgIEVRpusTANBgkqhkiG9w0BAQsFADBDMQswCQYDVQQGEwJa +QTERMA8GA1UEChMITEFXdHJ1c3QxITAfBgNVBAMTGExBV3RydXN0IFJvb3QgQ0Ey +ICg0MDk2KTAgFw0yMzAyMTQwOTE5MzhaGA8yMDUzMDIxNDA5NDkzOFowQzELMAkG +A1UEBhMCWkExETAPBgNVBAoTCExBV3RydXN0MSEwHwYDVQQDExhMQVd0cnVzdCBS +b290IENBMiAoNDA5NikwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +F8srQ7ps+cmTimUNEkzsJxS3E3ng1NUtGFbx+eoqEBZObETHamVG85qJNdGH+DOJ +L4gJGpIQkZDBa58Obn8mihNdGKxoAQ0QeGVw2I6PhFqXMBjQEQ5KjVIQpYErUSj1 +Y8S27ECzAeWtd73lOO+8jbPdGaB7DY2022r7JTNa+pGvxHFFMPiIKXvLv9W6JwSO +3bIA98pcmTUU6v11BhUIu8pXaPs/+7Q0c2PR1ePIOFppfWp6RAwNik7tkh0Qjzsi +LLbf7cXG8Il5VGVeXxu9j33fubft6+TFB9FnPJU7kf5CelJAgATSOVdL9JJ9/5vv +5Z3JCbKREjimKQg7ruvKzO1N504hAQf8bzLOaYyEUsZ36icwCt6lrzAraB+s1Owh +rSJJds4PwvIHKvlqEoOaOwSuGXr+oYYk+kFeJXxArCe24yk2bzXiV9AZWN//ZPbD +AUl22yu+vLlPFArVG1gh9hwuAHz4lLXLNxoU5DK5FtRg7AWqXzL6aiMSrNQQu9Ki +grRLDotwJ6rWB8FniPqEwwjJioTI0jdygQ+NFkrk1zVRpTgPjIRLlTbA9ded4F2P +q5HuAAi5nVIf7PiZu3lWsUna0uXYYYtbr/CrN8V7Go6Gvn7FexUeYWjoC4eLc0mh +F3N+KXiOyuBBL3VzdKKXOn/3LnQJuExgi0Y2GRAtnQIDAQABo4GRMIGOMA8GA1Ud +EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMCsGA1UdEAQkMCKADzIwMjMwMjE0 +MDkxOTM4WoEPMjA1MzAyMTQwOTQ5MzhaMB8GA1UdIwQYMBaAFNfWVmJcPxeB5nNE +KfVRBe8LYDesMB0GA1UdDgQWBBTX1lZiXD8XgeZzRCn1UQXvC2A3rDANBgkqhkiG +9w0BAQsFAAOCAgEASZwp/j3snkV/qz48/iNvNz53p1P/eJ/8SUSAV2acbtp5/81F +rUyTv7VZxukQt+X4jPuHxR6L2LM/ApYKu4qO79e0wIMgOJdZRWT89ncT8gnXocg4 +dAjq+UhM+h8EnLT/7G5WNnKTbJU+LF/eDwurycwVPhaPZvyyELih0bTewGMZzO9T +qnU2IoslH7+byNfBX+ymNwmqe2K89iIt8dZY3Yy7UvQLp3apensajdytmoFiLoYF +kHJHL6HJZ4SwDWywuJsWt9CZFC+cEpsjqI2mQx7p5S3leKcfZJRktneyqFz7Casp +6x5tddH20MWlwx2fHvMaLbLIH+UoCm7zX/3a5iOhdpBcS5gBgizuRy0CGl9/NMVp +tXKtPvPPnm34KegRJyvgWQsbYetKymmlpNXNURuUjnnN3/audF2xLBuGU/7RMAZB +NAdigkz0fseHdA6wIR4JIIDBsxU9Rm3T8QaSP++glYocbncxtut4KQx77oKlT36k +KV6eqi34jsDz/A0GhZtO3PfiCXzQFFEeerMjr/rRYSpltQHZuOMHyiR20vBKvu+G +BIBCFXARaH7Xx7v+506bnJWlHEqkydAJjKrOSNIekpfXEentZsw33PXXG3SbpupC +rF0y4Fj0gUf/0hLifhzcSXaWwx2fS8pcKjdbPYrROJsh2uO/RUPT4Fh3HygwJjAK +BggrBgEFBQcDBAwYTEFXdHJ1c3QgUm9vdCBDQTIgKDQwOTYp +-----END TRUSTED CERTIFICATE----- + +# LGPKI +-----BEGIN TRUSTED CERTIFICATE----- +MIIDoDCCAoigAwIBAgIBMTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxGjAYBgNVBAsTEUFwcGxpY2F0aW9uIENBIEcyMB4XDTA2 +MDMzMTE1MDAwMFoXDTE2MDMzMTE0NTk1OVowOTELMAkGA1UEBhMCSlAxDjAMBgNV +BAoTBUxHUEtJMRowGAYDVQQLExFBcHBsaWNhdGlvbiBDQSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBALk1xhD422jbB8RATLAdHjbcw0H2z1UVbQh/ +XMZoVeXnV/GWUebhTXgPbkAVcDtl/hHf59PWWDU74Z8C/JRSRi6znmCbAp7JgtL2 +464JT4REtmKbAFFouDqt7GTRMkvplESDtA7OIYlrsDbAmMZLnMI+W2AqCTErLatM +3rGg/VhWwoMdILzEhAmHe6iVl8YljoPgPpMN0cd9c6mo/BkAQC4iuHozQfV4/Vpx +54LZSIhc7KiFhy1tgIlnGmm+EMBaju2IfT5vLDhrN85H2KIxMN5+U2Vsi4ZTQSBs +vUilfq8AWlYSWIHR3IlZ+bXu+E2a2EQpi3mn9yKq6nxctBaIIA0CAwEAAaOBsjCB +rzAdBgNVHQ4EFgQUf7hdjsQYa8Z9zC7prs405xdd4KEwDgYDVR0PAQH/BAQDAgEG +MEwGA1UdHwRFMEMwQaA/oD2kOzA5MQswCQYDVQQGEwJKUDEOMAwGA1UEChMFTEdQ +S0kxGjAYBgNVBAsTEUFwcGxpY2F0aW9uIENBIEcyMA8GA1UdEwEB/wQFMAMBAf8w +HwYDVR0jBBgwFoAUf7hdjsQYa8Z9zC7prs405xdd4KEwDQYJKoZIhvcNAQEFBQAD +ggEBADzYczZABkhKVBn1J0g5JaVuQue2zRvLOTS3m+xPKr535MqE/B3rmyJA1fT7 +aIdy/Eddag5SSuO1XUjGIpbmM21tq/bN18skWoyoRZ4+YYJ9lNUF8Bo1X3EvLlS1 +QQXvhg1S75yYG/EsTDrR84bTjD56L4ZFjoMyJlu/U8oOUVbcmsJaMBkNp57Vqpsg +OWl4IfSXbdEOEUwu0xtasPmXeFwqj1Jl7kxCJcI3MA5tKzWUgwbor0U7BGanMLv5 +4CE7Y259RF06alPvERck/VSyWmxzViHJbC2XpEKzJ2EFIWNt6ii8TxpvQtyYq1XT +HhvAkj+bweY7F1bixJhDJe62ywAwEzAKBggrBgEFBQcDAwwFTEdQS0k= +-----END TRUSTED CERTIFICATE----- + +# LuxTrust Global Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDZDCCAkygAwIBAgICC7gwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UEBhMCTFUx +FjAUBgNVBAoTDUx1eFRydXN0IHMuYS4xHTAbBgNVBAMTFEx1eFRydXN0IEdsb2Jh +bCBSb290MB4XDTExMDMxNzA5NTEzN1oXDTIxMDMxNzA5NTEzN1owRDELMAkGA1UE +BhMCTFUxFjAUBgNVBAoTDUx1eFRydXN0IHMuYS4xHTAbBgNVBAMTFEx1eFRydXN0 +IEdsb2JhbCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsn+n +QPAiygz267Hxyw6VV0B1r6A/Ps7sqjJX5hmxZ0OYWmt8s7j6eJyqpoSyYBuAQc5j +zR8XCJmk9e8+EsdMsFeaXHhAePxFjdqRZ9w6Ubltc+a3OY52OrQfBfVpVfmTz3iI +Sr6qm9d7R1tGBEyCFqY19vx039a0r9jitScRdFmiwmYsaArhmIiIPIoFdRTjuK7z +CISbasE/MRivJ6VLm6T9eTHemD0OYcqHmMH4ijCc+j4z1aXEAwfh95Z0GAAnOCfR +K6qq4UFFi2/xJcLcopeVx0IUM115hCNq52XAV6DYXaljAeew5Ivo+MVjuOVsdJA9 +x3f8K7p56aTGEnin/wIDAQABo2AwXjAMBgNVHRMEBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAfBgNVHSMEGDAWgBQXFYWJCS8kh28/HRvk8pZ5g0gTzjAdBgNVHQ4EFgQU +FxWFiQkvJIdvPx0b5PKWeYNIE84wDQYJKoZIhvcNAQELBQADggEBAFrwHNDUUM9B +fua4nX3DcNBeNv9ujnov3kgR1TQuPLdFwlQlp+HBHjeDtpSutkVIA+qVvuucarQ3 +XB8u02uCgUNbCj8RVWOs+nwIAjegPDkEM/6XMshS5dklTbDG7mgfcKpzzlcD3H0K +DTPy0lrfCmw7zBFRlxqkIaKFNQLXgCLShLL4wKpov9XrqsMLq6F8K/f1O4fhVFfs +BSTveUJO84ton+Ruy4KZycwq3FPCH3CDqyEPVrRI/98HIrOM+R2mBN8tAza53W/+ +MYhm/2xtRDSvCHc+JtJy9LtHVpM8mGPhM7uZI5K1g3noHZ9nrWLWidb2/CfeMifL +hNp3hSGhEiEwIjAKBggrBgEFBQcDAwwUTHV4VHJ1c3QgR2xvYmFsIFJvb3Q= +-----END TRUSTED CERTIFICATE----- + +# LuxTrust Global Root 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFwzCCA6ugAwIBAgIUCn6m30tEntpqJIWe5rgV0xZ/u7EwDQYJKoZIhvcNAQEL +BQAwRjELMAkGA1UEBhMCTFUxFjAUBgNVBAoMDUx1eFRydXN0IFMuQS4xHzAdBgNV +BAMMFkx1eFRydXN0IEdsb2JhbCBSb290IDIwHhcNMTUwMzA1MTMyMTU3WhcNMzUw +MzA1MTMyMTU3WjBGMQswCQYDVQQGEwJMVTEWMBQGA1UECgwNTHV4VHJ1c3QgUy5B +LjEfMB0GA1UEAwwWTHV4VHJ1c3QgR2xvYmFsIFJvb3QgMjCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBANeFl78RmOnwYoNMPIf5U2o3C/IPPIfOb9wmKb3F +ibrJgz337spbxm1Jc7TJRqMbNBM/wYlFV/TZsfs2ZUv7COJIcRHIbjuend+JZTem +hfY7RBi2xjcwYkSSl2l9QjAk5A0MiWtj3sXh306pFGxT4GHO9hcvHTy95iJMHZP1 +EMShduxq3sVs35a0VkBCwGKSMKEtFZSg0iAGCW5qbeXrt77U8PEVfIvmTroTzEsn +Xpk8F12PgX8zPU/TPxvsXD/wPEx1bvKm1Z3aLQdjAsZy6ZS8TEmVT4hSyNvoaYL4 +zDRbIvCGp4m9SAptZoFtyMhk+wHh9OHe2Z7d21vUKpkmFRseTJIpgp7VkoGSQXAZ +96Tlk0u8d2cx3Rz9MXANF5kM+Qw5GSoXtTBxVdUPrljhPS80m8+f9niFwpN6cj5m +j5wWEWCPnolvZ77gR1o7DJpni89Gxq44o/KnvObWhWszJHAiS8sIm7vI+AIpHb4g +DEa/a4ebsypmQjVGbKq6rfmYe+lQVRQxv7HaLe2ArWgk+2mr2HETMOZns4dA/Yl+ +8kPREd8vZS9kzl8UubG/Mb2HeFpZZYiq/FkySIbWTLkpS5XTdvN3JW1CHDiDTf2j +X5t/Lax5Gw5CMZdjpPuKadUiDTSQMC6otOBttpSsvItO13D8xTiOZCXhTTmQzsmH +hFhxAgMBAAGjgagwgaUwDwYDVR0TAQH/BAUwAwEB/zBCBgNVHSAEOzA5MDcGByuB +KwEBAQowLDAqBggrBgEFBQcCARYeaHR0cHM6Ly9yZXBvc2l0b3J5Lmx1eHRydXN0 +Lmx1MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBT/GCh2+UgFLKGu8SsbK7JT ++Et8szAdBgNVHQ4EFgQU/xgodvlIBSyhrvErGyuyU/hLfLMwDQYJKoZIhvcNAQEL +BQADggIBAGoZFO1uecEsh9QNcH7X9njJCwROxLHOk3D+sFTAMs2ZMGQXvw/l4jP9 +BzZAcg4atmpZ1gDlaCDdLnINH2pkMSCEfUmmWjfrRcmF9dTHF5kH5ptV5AzoqbTO +jFu1EVzPig4N1qx3gf4ynCSecs5U89BvolbW7MM3LGVYvlcAGvI1+ut7MV3CwRI9 +loGIlonBWVx65n9wNOeD4rHh4bhY79SV5GCc8JaXcozrhAIuZY+kt9J/Z93I055c +qqmkoCUUBpvsT34tC38ddfEz2O3OuHVtPlu5mB0xDVbYQw8wkbIEa91WvpWAVWe+ +2M2D2RjuLg+GLZKecBPs3lHJQ3gCpU3I+V/EkVhGFndadKpAvAefMLmx9xIX3eP/ +JEAdemrRTxgKqpAd60Ae36EeRJIQmvKN4dFLRp7oRUKX6kWZ8+xm1QL68qZKJKre +zrnK+T+Tb/mjuuqlPpmt/f97mfVl7vBZKGfXkJWkE4SphMHozs51k2MavDzq1WQf +LSoSOcbDWjLtR5EWDrw4wVDej8oqkDQc7kGUnF4ZLvhFSZl0kbAEb+MEWrGrKqv+ +x9CWttrhSmQGbmBNvUJO/3jaJMobtNeWOWyu8Q6qp31IiyBMz2TWuJdGsE7RKlY6 +oJO9r4Ak4Ap+58rVyuiFVdw2KuGUaJPHZnJED4AhMmwlxyOAgwrrMCQwCgYIKwYB +BQUHAwMMFkx1eFRydXN0IEdsb2JhbCBSb290IDI= +-----END TRUSTED CERTIFICATE----- + +# MULTICERT Root Certification Authority 01 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIIVE2lvEA1VlowDQYJKoZIhvcNAQELBQAwgYUxCzAJBgNV +BAYTAlBUMUIwQAYDVQQKDDlNVUxUSUNFUlQgLSBTZXJ2acOnb3MgZGUgQ2VydGlm +aWNhw6fDo28gRWxlY3Ryw7NuaWNhIFMuQS4xMjAwBgNVBAMMKU1VTFRJQ0VSVCBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDAxMB4XDTE0MDQwNDA4NTk0N1oX +DTM5MDQwNDA4NTk0N1owgYUxCzAJBgNVBAYTAlBUMUIwQAYDVQQKDDlNVUxUSUNF +UlQgLSBTZXJ2acOnb3MgZGUgQ2VydGlmaWNhw6fDo28gRWxlY3Ryw7NuaWNhIFMu +QS4xMjAwBgNVBAMMKU1VTFRJQ0VSVCBSb290IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IDAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAztw/9BluuxVp +hvTkzec6cDvHmos7gwCBW/sgFlq+v1gAXynmV29+iiwVB1waY4xCXxbd2omERVcX +lqCcoXUiQRo6/cUXkRP2vmIKvG4lLVvAjBBm9+LW+9xIMaMaqOVNSMmiHHP+j2ZA +Y3dZBzw9FJ/U94WR0MNC9Rths3eAgCptEgKWi1HZwW8nCxoHNAD/0llMKejXGWPY +kbQ//I4OJfKhEgdlyjXeq/4WowiMr39+EvRZFgUf6K10eTL3eAK2tMyr2x44YQQZ +ekFA2loRZHUC/WTR1pRCDyLnZc2vkA4MWzEBmVHvRYx9pTjannxL5Kbos6SC1gM0 +Lk+3Uat3OAn1Bv7cZhsPP/p974xVvuANhpWh3L3EwwjRRR7yvb5w8eYmxrsIsSil +wqXtiNahwPsj8Sc5zOGEBxm8fvbMOP9uELtG6SOJJIH/AOJRANxSUH0TUH0WPUCN +07/5imXYYhIpd8K6wkk0T4p5aclLFfM03s+vhuLlyKlWYUwGVFrFbBnq88hEzSQa +dtFxAFlr2XWbzv0Q/rGDoqW3koZ2m0r3HdyMhaZYrYqmaGkXyW0bps8nSyks3XFC +GokQ5dWbEl9Ji4S82Ahc+884Qq++0W57kapmQMUFfivQZrbH31L+9EVtI5IhnhIB +kHOD4qUJDdfA+IWVHmPRPzXalNE32fUCAwEAAaNjMGEwHQYDVR0OBBYEFNU5HJxb +bwSqopVM7yDdKXSkxUVxMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1Tkc +nFtvBKqilUzvIN0pdKTFRXEwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUA +A4ICAQA/51/zIhbeg54g5ILn5Z53yfsrsHQN3xt0Ig9zEKGwF+xMDNQocGpmckRp +EJN2Nc8v+I88qxl8cZKVcRs3FcIbKHrvbng43/uPmwEg3K/21o0JZtrERqn8lapE +IxLfR8CwFey1sZ5sD5GqpjrlwQ1gbFBAcFxcyM6zzOvtqogZVqWkyAx65XZAZzO0 +PZbcd8sjePlTW8+N3rGnjlp6ojJjo4jXJWFaXUk6cubPqpSGbG73guCOZ5MoxagN +Te84rXlKZo2EAQgEefNSxkHnmmIGs/USHuzZAEPT65Z3dOF5+RSUhG26VIIFjN8B +8jCIgax6L4tDLHY0zjXnh45OCwqlGlexU1q/a9i+AH7G+e5mMQix35QzhJx3T3tk +L++OD1koIsvwXD4r/TXWlf8D7GVSfr7yGfh71VIsUneakWZBcI3VSecLSH+Krt5F +Pd3+5tLkksN7zjCgSW43rajTLLY9niHbBlfi8K4G+9nFETehe9sdEXxodiA+9byl +2Wa1Ia1FJsZdHgKjQcTUfYEZyxeXBg/m7HQARsR13T3wQzSvprz89oL7z8X6sw8l +pT9mENaegqXbOhN53o2p16aNhtIv2WkN4nV4fklfIquGcChRs3q2oHn61OWDp7B3 +ytsBgu/ivk0v08BN0ONpbnwmm+um+0XvsQSKL6ohBvbm1LxBIzA3MAoGCCsGAQUF +BwMDDClNVUxUSUNFUlQgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAwMQ== +-----END TRUSTED CERTIFICATE----- + +# Macao Post eSignTrust Root Certification Authority (G02) +-----BEGIN TRUSTED CERTIFICATE----- +MIIFljCCA36gAwIBAgIQUqy+BxFJl7sfv4cbJRe/pDANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJNTzETMBEGA1UEChMKTWFjYW8gUG9zdDFBMD8GA1UEAxM4TWFj +YW8gUG9zdCBlU2lnblRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +KEcwMikwHhcNMTAwMTA2MDAwMDAwWhcNMjAwMTA1MjM1OTU5WjBlMQswCQYDVQQG +EwJNTzETMBEGA1UEChMKTWFjYW8gUG9zdDFBMD8GA1UEAxM4TWFjYW8gUG9zdCBl +U2lnblRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKEcwMikwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2+IendMxdI16uq5bc1yQoHaQU +ZtegaIxenUXU1CnTswvrrRbqnVIRyaThcOXdvg4cEXfrn6NweBePuT4XU2mp6/VV ++ZWX6d85dp4fUhe0GwAS0M0846pJ0Z5BNzb1Yc0jD1ex9k3T2w1CUwKI9PCphotX +z3IK1ZRLWto35T1HWWe+045W1Vc50Cfbn0lPqBZUv3hfzxydXqELjIMDswwUyVqp +u//GrlnP9WUfI4kBU4rVWxedm/+YUQ9DSfeqLO3l6YY6M1Bz3FKla2OE6ROifMd3 +GvOqqQ0LTk4dRMNyO5lZ50EiOyxUXhIxlmhBGdXtdae5V1sR9pqkSS9i8wuYURuz +M0LSzNRhGcPT3Jv7k7JizTb7jOkabhqxOSSOXdk+O4Z8iOa3JwP4lVGwv1A3/vhO +EwEbJy2bktByV9ejmlboa6P3Vd5AXeIIH1y7UaaetN0OphpZYmeGcxCVnZXNur/Y +nCoOi3aZk9RLsOhUPw3YivmAz0H9AXpFfH3WPU75Yk9BJXyqbVhWGwe0c6ofER88 +ulMj4O1KzZaJ3EjQTWLLkwf2oK5TF3xfXAccBUyrTGqqwg+gGWt5ecJ8s6n9PfvM +fHHFu74lbSGn+9a+YPO1qalsdBg/qJ5CYEHyOS0dwg1z8uCxtkoaGL13aRnX0nqx +3JY1mtgmhYO2EynC4wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB +/wQEAwIBBjAdBgNVHQ4EFgQUAoG3tmb4kkVtwnHSn+wv07ofuf8wDQYJKoZIhvcN +AQEFBQADggIBAFhTi77PQbJPttXeSmjNZc/GQIqsS5pbY2298T9ZUELQ35rjX1aR +s1ub2UUGQ++TG/0zdx0GVDhI8VSMOlNrO3E1CXZl6VcPQ/aRmt4Qu7pokioly2dE +CWu/nZdmy6lFtr43mR11Jb49PGNsv6kTR8dyjMvDz/T2hwWZiReoNCDx36EnZ9On +I++rWYM9GtgqzcKtSjAMBjogi6T42kY3Qy60iR2Ec4pgvmQxJ0LA63JhbczefHMr +6L85Ql55keyAG6o2dk4h6IYElwkoy0fnQNQsXhpeSPqux+kE6kckm77xR57V1XrR +XtSF8gsjBJjUK5pWckZMQZoz8JK0v0HUvZuws/H1E9avW9Ty0UHwR116vHpZ8X1g +aJQOSk+BkiKqH8Q8vhw6OkzwcKF/u5/c0sWk8SZu4fMmqXD78YmWYhVcWaC1I/qW +arIakj0NJEoruAj+b9/cwu6W/86/e7j5hO9BO+RNuYeRusZfyO3wy4vTD5H2IN6R +mMbnSGTRzlMS7sQVbdyAUBsTYE95W/wanP6in6ARM5HJS206ZpYt0zj42ZmBtEQm +f7HnnnBtHW31IgnkrBk2+ycF2Hqb2byeG9oZN9jx3RWYZBuPU/AonawUul9pz5Yj +7lasmc06j9VeGeZiEzpf64tfFsA74dGTj1ZhNwXQeRv9qLwPedKz5tNmMEYwCgYI +KwYBBQUHAwMMOE1hY2FvIFBvc3QgZVNpZ25UcnVzdCBSb290IENlcnRpZmljYXRp +b24gQXV0aG9yaXR5IChHMDIp +-----END TRUSTED CERTIFICATE----- + +# Microsec e-Szigno Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIHqDCCBpCgAwIBAgIRAMy4579OKRr9otxmpRwsDxEwDQYJKoZIhvcNAQEFBQAw +cjELMAkGA1UEBhMCSFUxETAPBgNVBAcTCEJ1ZGFwZXN0MRYwFAYDVQQKEw1NaWNy +b3NlYyBMdGQuMRQwEgYDVQQLEwtlLVN6aWdubyBDQTEiMCAGA1UEAxMZTWljcm9z +ZWMgZS1Temlnbm8gUm9vdCBDQTAeFw0wNTA0MDYxMjI4NDRaFw0xNzA0MDYxMjI4 +NDRaMHIxCzAJBgNVBAYTAkhVMREwDwYDVQQHEwhCdWRhcGVzdDEWMBQGA1UEChMN +TWljcm9zZWMgTHRkLjEUMBIGA1UECxMLZS1Temlnbm8gQ0ExIjAgBgNVBAMTGU1p +Y3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQDtyADVgXvNOABHzNuEwSFpLHSQDCHZU4ftPkNEU6+r+ICbPHiN1I2u +uO/TEdyB5s87lozWbxXGd36hL+BfkrYn13aaHUM86tnsL+4582pnS4uCzyL4ZVX+ +LMsvfUh6PXX5qqAnu3jCBspRwn5mS6/NoqdNAoI/gqyFxuEPkEeZlApxcpMqyabA +vjxWTHOSJ/FrtfX9/DAFYJLG65Z+AZHCabEeHXtTRbjcQR/Ji3HWVBTji1R4P770 +Yjtb9aPs1ZJ04nQw7wHb4dSrmZsqa/i9phyGI0Jf7Enemotb9HI6QMVJPqW+jqpx +62z69Rrkav17fVVA71hu5tnVvCSrwe+3AgMBAAGjggQ3MIIEMzBnBggrBgEFBQcB +AQRbMFkwKAYIKwYBBQUHMAGGHGh0dHBzOi8vcmNhLmUtc3ppZ25vLmh1L29jc3Aw +LQYIKwYBBQUHMAKGIWh0dHA6Ly93d3cuZS1zemlnbm8uaHUvUm9vdENBLmNydDAP +BgNVHRMBAf8EBTADAQH/MIIBcwYDVR0gBIIBajCCAWYwggFiBgwrBgEEAYGoGAIB +AQEwggFQMCgGCCsGAQUFBwIBFhxodHRwOi8vd3d3LmUtc3ppZ25vLmh1L1NaU1ov +MIIBIgYIKwYBBQUHAgIwggEUHoIBEABBACAAdABhAG4A+gBzAO0AdAB2AOEAbgB5 +ACAA6QByAHQAZQBsAG0AZQB6AOkAcwDpAGgAZQB6ACAA6QBzACAAZQBsAGYAbwBn +AGEAZADhAHMA4QBoAG8AegAgAGEAIABTAHoAbwBsAGcA4QBsAHQAYQB0APMAIABT +AHoAbwBsAGcA4QBsAHQAYQB0AOEAcwBpACAAUwB6AGEAYgDhAGwAeQB6AGEAdABh +ACAAcwB6AGUAcgBpAG4AdAAgAGsAZQBsAGwAIABlAGwAagDhAHIAbgBpADoAIABo +AHQAdABwADoALwAvAHcAdwB3AC4AZQAtAHMAegBpAGcAbgBvAC4AaAB1AC8AUwBa +AFMAWgAvMIHIBgNVHR8EgcAwgb0wgbqggbeggbSGIWh0dHA6Ly93d3cuZS1zemln +bm8uaHUvUm9vdENBLmNybIaBjmxkYXA6Ly9sZGFwLmUtc3ppZ25vLmh1L0NOPU1p +Y3Jvc2VjJTIwZS1Temlnbm8lMjBSb290JTIwQ0EsT1U9ZS1Temlnbm8lMjBDQSxP +PU1pY3Jvc2VjJTIwTHRkLixMPUJ1ZGFwZXN0LEM9SFU/Y2VydGlmaWNhdGVSZXZv +Y2F0aW9uTGlzdDtiaW5hcnkwDgYDVR0PAQH/BAQDAgEGMIGWBgNVHREEgY4wgYuB +EGluZm9AZS1zemlnbm8uaHWkdzB1MSMwIQYDVQQDDBpNaWNyb3NlYyBlLVN6aWdu +w7MgUm9vdCBDQTEWMBQGA1UECwwNZS1TemlnbsOzIEhTWjEWMBQGA1UEChMNTWlj +cm9zZWMgS2Z0LjERMA8GA1UEBxMIQnVkYXBlc3QxCzAJBgNVBAYTAkhVMIGsBgNV +HSMEgaQwgaGAFMegSXUWYYTbMUuE0vE3QJDvTtz3oXakdDByMQswCQYDVQQGEwJI +VTERMA8GA1UEBxMIQnVkYXBlc3QxFjAUBgNVBAoTDU1pY3Jvc2VjIEx0ZC4xFDAS +BgNVBAsTC2UtU3ppZ25vIENBMSIwIAYDVQQDExlNaWNyb3NlYyBlLVN6aWdubyBS +b290IENBghEAzLjnv04pGv2i3GalHCwPETAdBgNVHQ4EFgQUx6BJdRZhhNsxS4TS +8TdAkO9O3PcwDQYJKoZIhvcNAQEFBQADggEBANMTnGZjWS7KXHAM/IO8VbH0jgds +ZifOwTsgqRy7RlRw7lrMoHfqaEQn6/Ip3Xep1fvj1KcExJW4C+FEaGAHQzAxQmHl +7tnlJNUb3+FKG6qfx1/4ehHqE5MAyopYse7tDk2016g2JnzgOsHVV4Lxdbb9iV/a +86g4nzUGCM4ilb7N1fy+W955a9x6qWVmvrElWl/tftOsRm1M9DKHtCAE4Gx4sHfR +hUZLphK3dehKyVZs15KrnfVJONJPU+NVkBHbmJbGSfI+9J8b4PeI3CVimUTYc78/ +MPMMNz7UwiiAc7EBt51alhQBS6kRnSlqLtBdgcDPsiBDxwPgN05dCtxZICUwJzAK +BggrBgEFBQcDAwwZTWljcm9zZWMgZS1Temlnbm8gUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Microsec e-Szigno Root CA 2009 +-----BEGIN TRUSTED CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCWMEAwHgYIKwYBBQUHAwQGCCsG +AQUFBwMBBggrBgEFBQcDAwweTWljcm9zZWMgZS1Temlnbm8gUm9vdCBDQSAyMDA5 +-----END TRUSTED CERTIFICATE----- + +# Microsoft ECC Product Root Certificate Authority 2018 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDIzCCAqigAwIBAgIQFJgmZtx8zY9AU2d7uZnshTAKBggqhkjOPQQDAzCBlDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v +bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj +cm9zb2Z0IEVDQyBQcm9kdWN0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTgwHhcNMTgwMjI3MjA0MjA4WhcNNDMwMjI3MjA1MDQ2WjCBlDELMAkGA1UEBhMC +VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV +BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWljcm9zb2Z0IEVD +QyBQcm9kdWN0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTgwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATHERYqdh1Wjr65YmXUw8608MMw7I9t1245vMhJq6u4 +40N41YEGXe/HfZ/O1rOQdd4MsJDeI7rI0T5n4BmpG4YxHl80Le4X/RX7fieKMqHq +yY/JfhjLLzssSHp9pvQBB6yjgbwwgbkwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB +/wQFMAMBAf8wHQYDVR0OBBYEFEPvcIe4nb/siBncxsRrdQ11NDMIMBAGCSsGAQQB +gjcVAQQDAgEAMGUGA1UdIAReMFwwBgYEVR0gADBSBgwrBgEEAYI3TIN9AQEwQjBA +BggrBgEFBQcCARY0aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2Nz +L1JlcG9zaXRvcnkuaHRtADAKBggqhkjOPQQDAwNpADBmAjEAocBJRF0yVSfMPpBu +JSKdJFubUTXHkUlJKqP5b08czd2c4bVXyZ7CIkWbBhVwHEW/AjEAxdMo63LHPrCs +Jwl/Yj1geeWS8UUquaUC5GC7/nornGCntZkU8rC+8LsFllZWj8FoMEMwCgYIKwYB +BQUHAwMMNU1pY3Jvc29mdCBFQ0MgUHJvZHVjdCBSb290IENlcnRpZmljYXRlIEF1 +dGhvcml0eSAyMDE4 +-----END TRUSTED CERTIFICATE----- + +# Microsoft ECC Root Certificate Authority 2017 +-----BEGIN TRUSTED CERTIFICATE----- +MIICWTCCAd+gAwIBAgIQZvI9r4fei7FK6gxXMQHC7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYD +VQQDEy1NaWNyb3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTcwHhcNMTkxMjE4MjMwNjQ1WhcNNDIwNzE4MjMxNjA0WjBlMQswCQYDVQQGEwJV +UzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1NaWNy +b3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATUvD0CQnVBEyPNgASGAlEvaqiBYgtlzPbKnR5vSmZR +ogPZnZH6thaxjG7efM3beaYvzrvOcS/lpaso7GMEZpn4+vKTEAXhgShC48Zo9OYb +hGBKia/teQ87zvH2RPUBeMCjVDBSMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBTIy5lycFIM+Oa+sgRXKSrPQhDtNTAQBgkrBgEEAYI3 +FQEEAwIBADAKBggqhkjOPQQDAwNoADBlAjBY8k3qDPlfXu5gKcs68tvWMoQZP3zV +L8KxzJOuULsJMsbG7X7JNpQS5GiFBqIb0C8CMQCZ6Ra0DvpWSNSkMBaReNtUjGUB +iudQZsIxtzm6uBoiB078a1QWIP8rtedMDE2mT3MwOzAKBggrBgEFBQcDAQwtTWlj +cm9zb2Z0IEVDQyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDE3 +-----END TRUSTED CERTIFICATE----- + +# Microsoft ECC TS Root Certificate Authority 2018 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDFzCCAp6gAwIBAgIQFTh14WR+0bBHtO+vQRKCRTAKBggqhkjOPQQDAzCBjzEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v +bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE5MDcGA1UEAxMwTWlj +cm9zb2Z0IEVDQyBUUyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDE4MB4X +DTE4MDIyNzIwNTEzNFoXDTQzMDIyNzIxMDAxMlowgY8xCzAJBgNVBAYTAlVTMRMw +EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +aWNyb3NvZnQgQ29ycG9yYXRpb24xOTA3BgNVBAMTME1pY3Jvc29mdCBFQ0MgVFMg +Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxODB2MBAGByqGSM49AgEGBSuB +BAAiA2IABN7Nu3Ag8SUgtJTo17Q7D26H3ausz01AL4Eza1kJGNaHDSYjnLSNlZ12 +n6W5BkLmrTayxLOuejwI1cudOl5FIWwL4yD1m8LdRDPjQrnq8ihCkqr+DAfKihOZ +O2IA7drzNaOBvDCBuTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQU6EfIQpqwna5vCyg7mBWP47HogLIwEAYJKwYBBAGCNxUBBAMCAQAw +ZQYDVR0gBF4wXDAGBgRVHSAAMFIGDCsGAQQBgjdMg30BATBCMEAGCCsGAQUFBwIB +FjRodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y +eS5odG0AMAoGCCqGSM49BAMDA2cAMGQCMBSGUMAmGuvqoRR3OlvfYzmlM8dQQNVr +NWsPtN99VrnhpZ14GYKhQ24a11ijVQNC2wIwGJS0HjqNZPoMJxuHE0rStzoAlMby +5WO/r+P63JPV50aaa4FpPgLfUQ2PKHFBiZEvMD4wCgYIKwYBBQUHAwMMME1pY3Jv +c29mdCBFQ0MgVFMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxOA== +-----END TRUSTED CERTIFICATE----- + +# Microsoft Identity Verification Root Certificate Authority 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFzDCCA7SgAwIBAgIQVJjS0dRbGZVIE3nIEcCHmTANBgkqhkiG9w0BAQwFADB3 +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMUgw +RgYDVQQDEz9NaWNyb3NvZnQgSWRlbnRpdHkgVmVyaWZpY2F0aW9uIFJvb3QgQ2Vy +dGlmaWNhdGUgQXV0aG9yaXR5IDIwMjAwHhcNMjAwNDE2MTgzNjE2WhcNNDUwNDE2 +MTg0NDQwWjB3MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +cmF0aW9uMUgwRgYDVQQDEz9NaWNyb3NvZnQgSWRlbnRpdHkgVmVyaWZpY2F0aW9u +IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMjAwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCzkSoHgwZn/Z6d4MfAt6TmQgR/D6bbX/vVWtdFoPt3 +C/CA86ZtWk15U9ighoRXRSDHolT7x6K/isduNfOiFcQvTuNKhZZJDf++mdgU9rwn +B+5Cmyv1C5IG5P1pE2WokXLymITrgz0O5NdxEkghyw3t9kdJt5v5yccXtoRP/7is +mtdzZ0mF44a9N0DQJYbU3rXCbWJq1al4vC1vSfnlbBQU/RTH02UWN97LbrxeKY39 +YpsVLNYF5rmJMjOjYsfX1lJnCMQu9FYrnguHzOyntKaq6wXNGVelOgsEJxyRZ54t +Yi0vHr7awCDLBBnKM/uJvpjicqByNb554ZyDb+RtF2+Q8z0AhnU4jtDgSZq729P4 +MMrVV4hoTXLTv21/cdj9vQ2ukmRIt1tveSa1zZuVIYTR7w8yPXtXjPNFB0x84F4Y +DjV2i22eyzZ0qwX44HNdMlaUZ5clCsY1PZSX58FEi4D9wfj0dBnlMPYG+yFXPgYc +i2sVhidJe4KTylnodUfoPzj0x1N5oLa04lxR771fOMET5ngMlVouxUBZKMwPJMDs +ugl3I5k4prYc2se6ILbXN9h/N68I4ztx225zG32ZcrDkhjNZdLUWAHtQbcaGE9r9 +xDmCPSQAmmDaupTABVEsNKxQmROHu7MFgLJNMAJcuCaDXbRjc++uI5VPYCi+N9Vb +pQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUyH7SaoUqG8oZmAQHJ89QEE9oqKIwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ +KoZIhvcNAQEMBQADggIBAK9q3eYZ5y2UQxlOy+lQlWSlA5ECi+I2gDsVolLCFhm2 +alpddEMw9Jv/YHQJsSEekBZtxSSPXGaIY/RPzH3yEkxAEIsBn9qpyK7ylRvPnQXr +ST50oGhb5VYsZRyCflPaVtlGF3mSRcQQNghSKRfLL6byftRpJIoej7BzDcwcSquy +qu2nkWMBZCKoMrh+MiizZ3MtkbTcMQEL90cKpvHXSu1WYMQsCKN7QLC8dCdSh9a+ +iN03ioluZ4gd9cldoP62qzqA1xqXPBc2IkEerE3Vg+Y8OL1PMOlUqdO2BMMydmG7 +sBjFKxizwIDVt5WwXlFNIvzsWKro2JS0pS7tkt7nGHwhV91VY/e/bc0f0qZ3KHDH +4ls6WwjSW07IAJaz4YM2r4YKZVx09ursemp0oPBL7u+Uo6xQ8oft1zowg8n7fVe+ +5eP4QcrlZK6zo+xY7IWazO+56vNWGLlcc5qvxXcXg1nbNxoYclSlQdK2I3WjQ5rl +d3yWebdBjb/s3ICgn9F3dVhfNRPgJRpnC33OJfoHCuRhIdjUHOUHxjaZ9JbQxhX+ +Ts3Xroud2xb9BMaSvdSI5qmjqrv3ZDg7X8wM0DW+dBkDpsWqTKJhNoI+HfMrvJdd +20t4Oy31O+9gI+j17AsjNpWvmGa/U9N7uGlKKpZmacSUxvRfbqyYeIiABlyisu2i +ME0wCgYIKwYBBQUHAwMMP01pY3Jvc29mdCBJZGVudGl0eSBWZXJpZmljYXRpb24g +Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAyMA== +-----END TRUSTED CERTIFICATE----- + +# Microsoft RSA Root Certificate Authority 2017 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFqDCCA5CgAwIBAgIQHtOXCV/YtLNHcB6qvn9FszANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYw +NAYDVQQDEy1NaWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +IDIwMTcwHhcNMTkxMjE4MjI1MTIyWhcNNDIwNzE4MjMwMDIzWjBlMQswCQYDVQQG +EwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1N +aWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKW76UM4wplZEWCpW9R2LBifOZ +Nt9GkMml7Xhqb0eRaPgnZ1AzHaGm++DlQ6OEAlcBXZxIQIJTELy/xztokLaCLeX0 +ZdDMbRnMlfl7rEqUrQ7eS0MdhweSE5CAg2Q1OQT85elss7YfUJQ4ZVBcF0a5toW1 +HLUX6NZFndiyJrDKxHBKrmCk3bPZ7Pw71VdyvD/IybLeS2v4I2wDwAW9lcfNcztm +gGTjGqwu+UcF8ga2m3P1eDNbx6H7JyqhtJqRjJHTOoI+dkC0zVJhUXAoP8XFWvLJ +jEm7FFtNyP9nTUwSlq31/niol4fX/V4ggNyhSyL71Imtus5Hl0dVe49FyGcohJUc +aDDv70ngNXtk55iwlNpNhTs+VcQor1fznhPbRiefHqJeRIOkpcrVE7NLP8TjwuaG +YaRSMLl6IE9vDzhTyzMMEyuP1pq9KsgtsRx9S1HKR9FIJ3Jdh+vVReZIZZ2vUpC6 +W6IYZVcSn2i51BVrlMRpIpj0M+Dt+VGOQVDJNE92kKz8OMHY4Xu54+OU4UZpyw4K +UGsTuqwPN1q3ErWQgR5WrlcihtnJ0tHXUeOrO8ZV/R4O03QK0dqq6mm4lyiPSMQH ++FJDOvTKVTUssKZqwJz58oHhEmrARdlns87/I6KJClTUFLkqqNfs+avNJVgyeY+Q +W5g5xAgGwax/Dj0ApQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUCctZf4aycI8awznjwNnpv7tNsiMwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEMBQADggIBAKyvPl3CEZaJjqPnktaXFbgToqZC +LgLNFgVZJ8og6Lq46BrsTaiXVq5lQ7GPAJtSzVXNUzltYkyLDVt8LkS/gxCP81OC +gMNPOsduET/m4xaRhPtthH80dK2Jp86519efhGSSvpWhrQlTM93uCupKUY5vVau6 +tZRGrox/2KJQJWVggEbbMwSubLWYdFQl3JPk+ONVFT24bcMKpBLBaYVu32TxU5nh +SnUgnZUP5NbcA/FZGOhHibJXWpS2qdgXKxdJ5XbLwVaZOjex/2kskZGT4d9Mozd2 +TaGf+G0eHdP67Pv0RR0Tbc/3WeUiJ3IrhvNXuzDtJE3cfVa7o7P4NHmJweDyAmH3 +pvwPuxwXC65B2Xy9J6P9LjrRk5Sxcx0ki69bIImtt2dmefU6xqaWM/5TkshGsRGR +xpl/j8nWZjEgQRCHLQzWwa80mMpkg/sTV9HB8Dx6jKXB/ZUhoHHBk2dxEuqPiApp +GWSZI1b7rCoucL5mxAyE7+WL85MB+GqQk2dLsmijtWKP6T+MejteD+eMuMZ87zf9 +dOLITzNy4ZQ5bb0Sr74MTnB8G2+NszKTc0QWbej09+CVgI+WXTik9KveCjCHk9hN +AHFiRSdLOkKEW39lt2c0Ui2cFmuqqNh7o0JMcccMyj6D5KbvtwEwXlGjefVwaaZB +RA+GsCyRxj3qrg+EMDswCgYIKwYBBQUHAwEMLU1pY3Jvc29mdCBSU0EgUm9vdCBD +ZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxNw== +-----END TRUSTED CERTIFICATE----- + +# Microsoft Root Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIEEjCCAvqgAwIBAgIPAMEAizw8iBHRPvZj7N9AMA0GCSqGSIb3DQEBBAUAMHAx +KzApBgNVBAsTIkNvcHlyaWdodCAoYykgMTk5NyBNaWNyb3NvZnQgQ29ycC4xHjAc +BgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEhMB8GA1UEAxMYTWljcm9zb2Z0 +IFJvb3QgQXV0aG9yaXR5MB4XDTk3MDExMDA3MDAwMFoXDTIwMTIzMTA3MDAwMFow +cDErMCkGA1UECxMiQ29weXJpZ2h0IChjKSAxOTk3IE1pY3Jvc29mdCBDb3JwLjEe +MBwGA1UECxMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSEwHwYDVQQDExhNaWNyb3Nv +ZnQgUm9vdCBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCpAr3BcOY78k4bKJ+XeF4w6qKpjSVf+P6VTKO3/p2iID58UaKboo9gMmvRQmR5 +7qx2yVTa8uuchhyPn4Rms8VremIj1h083g8BkuiWxL8tZpqaaCaZ0Dosvwy1WCbB +RucKPjiWLKkoOajsSYNC44QPu5psVWGsgnyhYC13TOmZtGQ7mlAcMQgkFJ+p55Er +GOY9mGMUYFgFZZ8dN1KH96fvlALGG9O/VUWziYC/OuxUlE6u/ad6bXROrxjMlgko +IQBXkGBpN7tLEgc8Vv9b+6RmCgim0oFWV++2O14WgXcE2va+roCV/rDNf9anGnJc +PMq88AijIjCzBoXJsyB3E4XfAgMBAAGjgagwgaUwgaIGA1UdAQSBmjCBl4AQW9Bw +72lyniNRfhSyTY7/y6FyMHAxKzApBgNVBAsTIkNvcHlyaWdodCAoYykgMTk5NyBN +aWNyb3NvZnQgQ29ycC4xHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEh +MB8GA1UEAxMYTWljcm9zb2Z0IFJvb3QgQXV0aG9yaXR5gg8AwQCLPDyIEdE+9mPs +30AwDQYJKoZIhvcNAQEEBQADggEBAJXoC8CN85cYNe24ASTYdxHzXGAyn54Lyz4F +kYiPyTrmIfLwV5MstaBHyGLv/NfMOztaqTZUaf4kbT/JzKreBXzdMY09nxBwarv+ +Ek8YacD80EPjEVogT+pie6+qGcgrNyUtvmWhEoolD2Oj91Qc+SHJ1hXzUqxuQzIH +/YIX+OVnbA1R9r3xUse958Qw/CAxCYgdlSkaTdUdAqXxgOADtFv0sd3IV+5lScdS +VLa0AygS/5DW8AiPfriXxas3LOR65Kh343agANBqP8HSNorgQRKoNWobats14dQc +BOSoRQTIWjM4bk0cDWK3CqKM09VUP0bNHFWmcNsSOoeTdZ+n0qAwJjAKBggrBgEF +BQcDAwwYTWljcm9zb2Z0IFJvb3QgQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# Microsoft Root Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIFmTCCA4GgAwIBAgIQea0WoUqgpa1Mc1j0BxMuZTANBgkqhkiG9w0BAQUFADBf +MRMwEQYKCZImiZPyLGQBGRYDY29tMRkwFwYKCZImiZPyLGQBGRYJbWljcm9zb2Z0 +MS0wKwYDVQQDEyRNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkw +HhcNMDEwNTA5MjMxOTIyWhcNMjEwNTA5MjMyODEzWjBfMRMwEQYKCZImiZPyLGQB +GRYDY29tMRkwFwYKCZImiZPyLGQBGRYJbWljcm9zb2Z0MS0wKwYDVQQDEyRNaWNy +b3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQDzXfqAZ9Rap6kMLJAg0DUIPHWEzbcHiZyJ2t7Ow2D6 +kWhanpRxKRh2fMLgyCV2lA5Y+gQ0Nubfr/eAuulYCyuT5Z0F43cikfc0ZDwikR1e +4QmQvBT+/HVYGeF5tweSo66IWQjYnwfKA1j8aCltMtfSqMtL/OELSDJP5uu4rU/k +XG8TlJnbldV126gat5SRtHdb9UgMj2p5fRRwBH1tr5D12nDYR7e/my9s5wW34RFg +rHmRFHzF1qbk4X7Vw37lktI8ALU2gt554W3ztW74nzPJy1J9c5g224uha6KVl5uj +3sJNJv8GlmclBsjnrOTuEjOVMZnINQhONMp5U9W1vmMyWUA2wKVOBE0921sHM+RY +v+8/U2TYQlk1V/0PRXwkBE2e1jh0EZcikM5oRHSSb9VLb7CG48c2QqDQ/MHAWvmj +YbkwR3GWChawkcBCle8Qfyhq4yofseTNAz93cQTHIPxJDx1FiKTXy36IrY4t7EXb +xFEEySr87IaemhGXW97OU4jm4rf9rJXCKEDb7wSQ34EzOdmyRaUjhwalVYkxuwYt +YA5BGH0fLrWXyxHrFdUkpZTvFRSJ/Utz+jJb/NEzAPlZYnAHMuouq0Ate8rdIWcb +MJmPFqojqEHRsG4RmzbE3kB0nOFYZcFgHnpbOMiPuwQmfNQWQOW2a2yqhv0Av87B +NQIDAQABo1EwTzALBgNVHQ8EBAMCAcYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUDqyCYEBWJ5flJRP8KuEKU5VZ5KQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZI +hvcNAQEFBQADggIBAMURTQM6YN1dUhF3j7K7NsiyBb+0t6jYIJ1cEwO2HCL6BhM1 +tshj1JpHbyZX0lXxBLEmX9apUGigvNK4bszD6azfGc14rFl0rGY0NsQbPmw4TDMO +MBINoyb+UVMA/69aToQNDx/kbQUuToVLjWwzb1TSZKu/UK99ejmgN+1jAw/8EwbO +FjbUVDuVG1FiOuVNF9QFOZKaJ6hbqr3su77jIIlgcWxWs6UT0G0OI36VA+1oPfLY +Y7hrTbboMLXhypRL96KqXZkwsj2nwlFsKCABJCcrSwC3nRFrcL6yEIK8DJto0I07 +JIeqmShynTNfWZC99d6TnjpiWjQ54ohVHbkGsMGJay3XacMZEjaE0Mmg2v8vaXiy +5Xra69cMwPe9Yxe4ORM4ojZbe/KFVmodZGLBOOKqv1FmopT1EpxmIhBr8rcwki3y +KfA9OxRDaKLxnCk3y844ICVtfGfzfiQSJAMIgUfspZ6X9RjXz7vV73aW7/3O21ad +laBC+ZdY4dcxItNfWeY+biIA6kOEtiXb2fMIVmjAZGsdfOy2k6JiV24u2OdYj8Qx +SSbd3ik1h/UwcXBbFDxpvYkSfesuo/7Yf56CWlIKK8FDK9kwiJ/IEPuJjeahhXUz +fmye23MTZGJppS99ypZtn/gETTCSPW4hFCHJPeDD/YprnUr90aGdmUN3P7DaMDIw +CgYIKwYBBQUHAwMMJE1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 +eQ== +-----END TRUSTED CERTIFICATE----- + +# Microsoft Root Certificate Authority 2010 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF7TCCA9WgAwIBAgIQKMw6Jb+6RKxEmptYa0M5qjANBgkqhkiG9w0BAQsFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp +TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAw +NjIzMjE1NzI0WhcNMzUwNjIzMjIwNDAxWjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5IDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQC5CJ4o5OTsBk5QaLNBxXvrrraOr4G6IkQfZTRpTL5wQBfyFnvief2G7Q05 +9BuorZKQHss9do9a2bWREC48BY2KbSRU5x/tVq2DtFCcFaUXdIhZIPwIxYR202jU +byh4zly481CQRP/jY1++oZoslhUE1gf+HoQh4EIxEcQoNpTPUKRinsnWq3EAslsM +5pbUCiSW9f/G1bcb18u3IWKvEtyhXTfjGvsaRpjAm8DnYx8qCJMCfh5qjvKfGInk +IoWisYRXQP/1DthvnO3iRTEBzRfpf7CBReOqIUAmoXKqp088AQV+7oNYsV4GY5li +kXiCtw2TDCRqtBvbJ+xflQQ/k0ow9ZcYs6f5GaeTMx0ByNsiUlzXJclG+aL7h1lD +vptisY0thkQaRqx4YX4wCfquicRBKiJmA5E5RZzHiwyoyg0v+1LqDPdjMyOd/rAf +rWfWp1ADxgRwY7UssYZaQ7f7rvluKW4hIUEmBozJw+6wwoWTobmF2eYybEtMP9Zd +o+W1nXfDnMBVt3QA47g4q4OXUOGaQiQdxsCjMNEaWshSNPdz8ccYHzOteuzLQWDz +I5QgwkhFrFxRxi6AwuJ3Fb2Fh+02nZaR7gC1o3Dsn+ONgGiDdrqvXXBSIhbiZvu6 +s8XC9z4vd6bK3sGmxkhMwzdRI9Mn17hOcJbwoUR2r3jPmuFmEwIDAQABo1EwTzAL +BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU1fZWy4/oolxi +aNE9lJBb186aGMQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQELBQADggIB +AKylloy/u66m9tdxh0MxVoj9HDJxWzW31PCR8q834hTx8wImBT4WFH8UurhP+4my +sufUCcxtuVs7ZGVwZrfysVrfGgLz9VG4Z215879We+SEuSsem0CcJjT5RxiYadgc +17bRv49hwmfEte9gQ44QGzZJ5CDKrafBsSdlCfjN9Vsq0IQz8+8f8vWcC1iTN6B1 +oN5y3mx1KmYi9YwGMFafQLkwqkB3FYLXi+zA07K9g8V3DB6urxlToE15cZ8PrzDO +Z/nWLMwiQXoH8pdCGM5ZeRBV3m8Q5Ljag2ZAFgloI1uXLiaaArtXjMW4umliMoCJ +nqH9wJJ8eyszGYQqY8UAaGL6n0eNmXpFOqfp7e5pQrXzgZtHVhB7/HA2hBhz6u/5 +l02eMyPdJgu6Krc/RNyDJ/+9YVkrEbfKT9vFiwwcMa4y+Pi5Qvd/3GGadrFaBOER +PWZFtxhxvskkhdbz1LpBNF0SLSW5jaYTSG1LsAd9mZMJYYF0VyaKq2nj5NnHiMwk +2OxSJFwevJEU4pbe6wrant1fs1vb1ILsxiBQhyVAOvvH7s3+M+Vuw4QJVQMlOcDp +NV1lMaj2v6AJzSnHszYyLtyV84PBWs+LjfbqsyH4pO0eMQ62TBGrYAukEiMiF6M2 +ZIKRBBLgq28ey1AFYbRA/1mGcdHVM2l8qXOKONdkDPFpMDcwCgYIKwYBBQUHAwMM +KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEw +-----END TRUSTED CERTIFICATE----- + +# Microsoft Root Certificate Authority 2011 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF7TCCA9WgAwIBAgIQP4vItfyfspZDtWnWbELhRDANBgkqhkiG9w0BAQsFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp +TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEw +MzIyMjIwNTI4WhcNMzYwMzIyMjIxMzA0WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5IDIwMTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCygEGqNThNE3IyaCJNuLLx/9VSvGzH9dJKjDbu0cJcfoyKrq8TKG/Ac+M6 +ztAlqFo6be+ouFmrEyNozQwph9FvgFyPRH9dkAFSWKxRxV8qh9zc2AodwQO5e7BW +6KPeZGHCnvjzfLnsDbVU/ky2ZU+I8JxImQxCCwl8MVkXeQZ4KI2JOkwDJb5xalwL +54RgpJki49KvhKSn+9GY7Qyp3pSJ4Q6g3MDOmT3qCFK7VnnkH4S6Hri0xElcTzFL +h93dBWcmmYDgcRGjuKVB4qRTufcyKYMME782XgSzS0NHL2vikR7TmE/dQgfI6B0S +/Jmpaz6SfsjWaTr8ZL22CZ3K/QwLopt3YEsDlKQwaRLWQi3BQUzK3Kr9j1uDRprZ +/LHR47PJf0h6zSTwQY9cdNCssBAgBkm3xy0hyFfj0IbzA2j70M5xwYmZSmQBbP3s +MJHPQTySx+W6hh1hhMdfgzlirrSSL0fzC/hV66AfWdC7dJse0Hbm8ukG1xDo+mTe +acY1logC8Ea4PyeZb8txiSk190gWAjWP1Xl8TQLPX+uKg09FcYj5qQ1OcunCnAfP +SRtOBA5jUYxe2ADBVSy2xuDCZU7JNDn1nLPEfuhhbhNfFcRf2X7tHc7uROzLLoax +7Dj2cO2rXBPB2Q8Nx4CyVe0096yb5MPa50c8prWPMd/FS6/r8QIDAQABo1EwTzAL +BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUci06AjGQQ7kU +BU7h6qfHMdEjiTQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQELBQADggIB +AH9yzw+3xRXbm8BJyiZb/p4T5tPw0tuXX/JLP02zrhmu7deXoKzvqTqjwkGw5biR +nhOBJAPmCf0/V0A5ISRW0RAvS0CpNoZLtFNXmvvxfomPEf4YbFGq6O0JlbXlccmh +6Yd1phV/yX43VF50k8XDZ8wNT2uoFwxtCJJ+i92Bqi1wIcM9BhS7vyRep4TXPw8h +Ir1LAAbblxzYXtTFC1yHblCk6MM4pPvLLMWSZpuFXst6bJN8gClYW1e1QGm6CHmm +ZGIVnYeWRbVmIyADixxzoNOieTPgUFmG2y/lAiXqcyqfABTINseSO+lOAOzYVgm5 +M0kS0lQLAausR7aRKX1MtHWAUgHoyoL2n8ysnI8X6i8msKtyrAv+nlEex0NVZ09R +s1fWtuzuUrc66U7h14GIvE+OdbtLqPA1qibUZ2dJsnBMO5PcHd94kIZysjik0dyS +TclY6ysSXNQ7roxrsIPlAT/4CTL2kzU0Iq/dNw13CYArzUgA8YyZGUcFAenRv9FO +0OYoQzeZpApKCNmacXPSqs0xE2N2oTdvkjgefRI8ZjLny23h/FKJ3crWZgWalmG+ +oijHHKOnNlA8OqTfSm7mhzvO6/DggTedEzxSjr25HTTGHdUKaj2YKXCMiSrRq4IQ +SB/c9O+lxbtVGjhjhE63bK2VVOxlIhBJF7jAHscPrFRHMDcwCgYIKwYBBQUHAwMM +KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEx +-----END TRUSTED CERTIFICATE----- + +# NAVER Global Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUAZQwHqIL3fXFMyqxQ0Rx+NZQTQ0wDQYJKoZIhvcNAQEM +BQAwaTELMAkGA1UEBhMCS1IxJjAkBgNVBAoMHU5BVkVSIEJVU0lORVNTIFBMQVRG +T1JNIENvcnAuMTIwMAYDVQQDDClOQVZFUiBHbG9iYWwgUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eTAeFw0xNzA4MTgwODU4NDJaFw0zNzA4MTgyMzU5NTlaMGkx +CzAJBgNVBAYTAktSMSYwJAYDVQQKDB1OQVZFUiBCVVNJTkVTUyBQTEFURk9STSBD +b3JwLjEyMDAGA1UEAwwpTkFWRVIgR2xvYmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC21PGTXLVA +iQqrDZBbUGOukJR0F0Vy1ntlWilLp1agS7gvQnXp2XskWjFlqxcX0TM62RHcQDaH +38dq6SZeWYp34+hInDEW+j6RscrJo+KfziFTowI2MMtSAuXaMl3Dxeb57hHHi8lE +HoSTGEq0n+USZGnQJoViAbbJAh2+g1G7XNr4rRVqmfeSVPc0W+m/6imBEtRTkZaz +kVrd/pBzKPswRrXKCAfHcXLJZtM0l/aM9BhK4dA9WkW2aacp+yPOiNgSnABIqKYP +szuSjXEOdMWLyEz59JuOuDxp7W87UC9Y7cSw0BwbagzivESq2M0UXZR4Yb8Obtoq +vC8MC3GmsxY/nOb5zJ9TNeIDoKAYv7vxvvTWjIcNQvcGufFt7QSUqP620wbGQGHf +nZ3zVHbOUzoBppJB7ASjjw2i1QnK1sua8e9DXcCrpUHPXFNwcMmIpi3Ua2FzUCaG +YQ5fG8Ir4ozVu53BA0K6lNpfqbDKzE0K70dpAy8i+/Eozr9dUGWokG2zdLAIx6yo +0es+nPxdGoMuK8u180SdOqcXYZaicdNwlhVNt0xz7hlcxVs+Qf6sdWA7G2POAN3a +CJBitOUt7kinaxeZVL6HSuOpXgRM6xBtVNbv8ejyYhbLgGvtPe31HzClrkvJE+2K +AQHJuFFYwGY6sWZLxNUxAmLpdIQM201GLQIDAQABo0IwQDAdBgNVHQ4EFgQU0p+I +36HNLL3s9TsBAZMzJ7LrYEswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADLKgLOdPVQG3dLSLvCkASELZ0jKbY7gyKoN +qo0hV4/GPnrK21HUUrPUloSlWGB/5QuOH/XcChWB5Tu2tyIvCZwTFrFsDDUIbatj +cu3cvuzHV+YwIHHW1xDBE1UBjCpD5EHxzzp6U5LOogMFDTjfArsQLtk70pt6wKGm ++LUx5vR1yblTmXVHIloUFcd4G7ad6Qz4G3bxhYTeodoS76TiEJd6eN4MUZeoIUCL +hr0N8F5OSza7OyAfikJW4Qsav3vQIkMsRIz75Sq0bBwcupTgE34h5prCy8VCZLQe +lHsIJchxzIdFV4XTnyliIoNRlwAYl3dqmJLJfGBs32x9SuRwTMKeuB330DTHD8z7 +p/8Dvq1wkNoL3chtl1+afwkyQf3NosxabUzyqkn+Zvjp2DXrDige7kgvOtB5CTh8 +piKCk5XQA76+AqAF3SAi428diDRgxuYKuQl1C/AH6GmWNcf7I4GOODm4RStDeKLR +LBT/DShycpWbXgnbiUSYqqFJu3FS8r/2/yehNq+4tneI3TqkbZs0kNwUXTC/t+sX +5Ie3cdCh13cV1ELX8vMxmV2b3RZtP+oGI/hGoiLtk/bdmuYqh7GYVPEi92tF4+KO +dh2ajcQGjTa3FPOdVGm3jjzVpG2Tgbet9r1ke8LJaDmgkpzNNIaRkPpkUZ3+/uul +9XXeifdyMDcwCgYIKwYBBQUHAwEMKU5BVkVSIEdsb2JhbCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# NetLock Arany (Class Gold) Főtanúsítvány +-----BEGIN TRUSTED CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7EwTjAeBggr +BgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDCxOZXRMb2NrIEFyYW55IChDbGFz +cyBHb2xkKSBGxZF0YW7DunPDrXR2w6FueQ== +-----END TRUSTED CERTIFICATE----- + +# NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado +-----BEGIN TRUSTED CERTIFICATE----- +MIIG0TCCBbmgAwIBAgIBezANBgkqhkiG9w0BAQUFADCByTELMAkGA1UEBhMCSFUx +ETAPBgNVBAcTCEJ1ZGFwZXN0MScwJQYDVQQKEx5OZXRMb2NrIEhhbG96YXRiaXp0 +b25zYWdpIEtmdC4xGjAYBgNVBAsTEVRhbnVzaXR2YW55a2lhZG9rMUIwQAYDVQQD +EzlOZXRMb2NrIE1pbm9zaXRldHQgS296amVneXpvaSAoQ2xhc3MgUUEpIFRhbnVz +aXR2YW55a2lhZG8xHjAcBgkqhkiG9w0BCQEWD2luZm9AbmV0bG9jay5odTAeFw0w +MzAzMzAwMTQ3MTFaFw0yMjEyMTUwMTQ3MTFaMIHJMQswCQYDVQQGEwJIVTERMA8G +A1UEBxMIQnVkYXBlc3QxJzAlBgNVBAoTHk5ldExvY2sgSGFsb3phdGJpenRvbnNh +Z2kgS2Z0LjEaMBgGA1UECxMRVGFudXNpdHZhbnlraWFkb2sxQjBABgNVBAMTOU5l +dExvY2sgTWlub3NpdGV0dCBLb3pqZWd5em9pIChDbGFzcyBRQSkgVGFudXNpdHZh +bnlraWFkbzEeMBwGCSqGSIb3DQEJARYPaW5mb0BuZXRsb2NrLmh1MIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx1Ilstg91IRVCacbvWy5FPSKAtt2/Goq +eKvld/Bu4IwjZ9ulZJm53QE+b+8tmjwi8F3JV6BVQX/yQ15YglMxZc4e8ia6AFQe +r7C8HORSjKAyr7c3sVNnaHRnUPYtLmTeriZ539+Zhqurf4XsoPuAzPS4DB6TRWO5 +3Lhbm+1bOdRfYrCnjnxmOCyqsQhjF2d9zL2z8cM/z1A57dEZgxXbhxInlrfa6uWd +vLrqOU+L73Sa58XQ0uqGURzk/mQIKAR5BevKxXEOC++r6uwSEaEYBTJp0QwsGj0l +mT+1fMptsK6ZmfoIYOcZwvK9UdPM0wKswREMgM6r3JSda6M5UzrWhQIDAMV9o4IC +wDCCArwwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMCAQYwggJ1Bglg +hkgBhvhCAQ0EggJmFoICYkZJR1lFTEVNISBFemVuIHRhbnVzaXR2YW55IGEgTmV0 +TG9jayBLZnQuIE1pbm9zaXRldHQgU3pvbGdhbHRhdGFzaSBTemFiYWx5emF0YWJh +biBsZWlydCBlbGphcmFzb2sgYWxhcGphbiBrZXN6dWx0LiBBIG1pbm9zaXRldHQg +ZWxla3Ryb25pa3VzIGFsYWlyYXMgam9naGF0YXMgZXJ2ZW55ZXN1bGVzZW5laywg +dmFsYW1pbnQgZWxmb2dhZGFzYW5hayBmZWx0ZXRlbGUgYSBNaW5vc2l0ZXR0IFN6 +b2xnYWx0YXRhc2kgU3phYmFseXphdGJhbiwgYXogQWx0YWxhbm9zIFN6ZXJ6b2Rl +c2kgRmVsdGV0ZWxla2JlbiBlbG9pcnQgZWxsZW5vcnplc2kgZWxqYXJhcyBtZWd0 +ZXRlbGUuIEEgZG9rdW1lbnR1bW9rIG1lZ3RhbGFsaGF0b2sgYSBodHRwczovL3d3 +dy5uZXRsb2NrLmh1L2RvY3MvIGNpbWVuIHZhZ3kga2VyaGV0b2sgYXogaW5mb0Bu +ZXRsb2NrLm5ldCBlLW1haWwgY2ltZW4uIFdBUk5JTkchIFRoZSBpc3N1YW5jZSBh +bmQgdGhlIHVzZSBvZiB0aGlzIGNlcnRpZmljYXRlIGFyZSBzdWJqZWN0IHRvIHRo +ZSBOZXRMb2NrIFF1YWxpZmllZCBDUFMgYXZhaWxhYmxlIGF0IGh0dHBzOi8vd3d3 +Lm5ldGxvY2suaHUvZG9jcy8gb3IgYnkgZS1tYWlsIGF0IGluZm9AbmV0bG9jay5u +ZXQwHQYDVR0OBBYEFAlqYhaSsFq7VQ7LdTI6MuWyIckoMA0GCSqGSIb3DQEBBQUA +A4IBAQCRalCc23iBmz+LQuM7/KbD7kPgz/PigDVJRXYC4uMvBcXxKufAQTPGtpvQ +MznNwNuhrWw3AkxYQTvyl5LGSKjN5Yo5iWH5Upfpvfb5lHTocQ68d4bDBsxafEp+ +NFAwLvt/MpqNPfMgW/hqyobzMUwsWYACff44yTB1HLdV47yfuqhthCgFdbOLDcCR +VCHnpgu0mfVRQdzNo0ci2ccBgcTcR08m6h/t280NmPSjnLRzMkqWmf68f8glWPhY +83ZmiVSkpj7EUFy6iRiCdUgh0k8T6GB+B3bbELVR5qq5aKrN9p2QdRLqOBrKROi3 +macqaJVmlaut74nLYKkGEsaUR+koMEcwCgYIKwYBBQUHAwMMOU5ldExvY2sgTWlu +b3NpdGV0dCBLb3pqZWd5em9pIChDbGFzcyBRQSkgVGFudXNpdHZhbnlraWFkbw== +-----END TRUSTED CERTIFICATE----- + +# NetLock Platina (Class Platinum) Főtanúsítvány +-----BEGIN TRUSTED CERTIFICATE----- +MIIGITCCBAmgAwIBAgIGSUEt7AAQMA0GCSqGSIb3DQEBCwUAMIGtMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE7MDkGA1UEAwwyTmV0TG9jayBQbGF0aW5hIChDbGFzcyBQbGF0aW51 +bSkgRsWRdGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUxMjQ0WhcNMjgxMjA2MTUx +MjQ0WjCBrTELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQK +DAxOZXRMb2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAo +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcykxOzA5BgNVBAMMMk5ldExvY2sgUGxhdGlu +YSAoQ2xhc3MgUGxhdGludW0pIEbFkXRhbsO6c8OtdHbDoW55MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAzfLuxBp663QpTLa95NYKF2xl4mY9xNG8DLZa +1itwXy3MIdFZEOSxE732zCKV1mxGTpEys+v1rMsEAU923VM+eJ/5Xry1ghNGyhDj +HS1pK5QyEHMhq6k4xeNuE2TVY6ntCWbsim+JjRGG0PW/MpYLdXD1KFhCXqxptPX8 +kTkuopFA0TxUQYcjZFBIeWhLaJNLcuuAabNKHJC+skGjpc0XwNEaaX8CGEq1Yocm +Vy1sqCwhOfWXXpuapvjnTHnEeztW3Hr4tFjOdgquIlXrj8eEZHu9a8qVT9i+MRO/ +jaEKK9V5t/V2rdpRXIFHYqiq/89T4DRxzw0lU6meY0evhZH4zxkR5U75z+3jNQUB +IgPPmnzqHVFay/1zPTkLMevEO8qFKhEUAKAbgaIJiEjzfKJkoexntFiH8BTqqb6l +IkFN7L2kDug9h/cvqs41hk8wV5KNNq541v0Y/NclHs96/Bn9oD9yFzYIQT+XNpUM +iZVxRfqE1tQgYLNFCvK3lT0L5aTDuBLykWzpbWCD9kURBbrmR4PZkeJu4btGa0gb +vMb7z37eLLuQhO62JznnjaIxD9+BtyxsAOKx2CoXXBseR4lLF1EUQEBPxDkYMsKA +YDblekdn9qgFVMFdlqAftohSDAK+jVV+FEvDogHunIpBXflflpEJjrTktcUE39Y2 +rVm0stcCAwDzkaNFMEMwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFOahE4P+l0vy2P8xoad0M4nOXn+kMA0GCSqGSIb3DQEBCwUA +A4ICAQBphELA414TYZcgSfH0FoWln6QRCCXEY4aP8Euvsyn1B1caYscbRW6vXRa3 +wdBkgzuX9UO2RZDxZiqDJCr/iOl6C/nCW3qvY/cJeIZIWTRem2oQTvFulYk2SmjQ +b5vgfk+3NQ/jebEFryd8qokKQ976DO/ZVy8occ1pa1JCyYowRVmhzPpZSo/31t1E +pbMuWxEY4rK15xFTOP6CTNNzvmWSGjqo0tKqvNS+bTZS/2vU0rUbN/MXQvEup9WQ +bHSddPX6XyIb09x1qLX/8hrRvCsAXDzFuIYIVEminCP776aNcPRCUk0bIACB+KC4 +9HQjnL70uQ7sHmrYZUoVdfF3W27YseYPtJa4HfqGyJJui+l936IO1fHxfK5K42a/ +Xfxb70iynmnHfZCgVbaUcIG5Cr2JdVPshKkDpd9RmQjQdAwC1nNyBnuLu12qTvxn +Z9iOEAMZLTc61HepOhydwHl7bCl3Mk1KizCIwuc2zmijmpiG+YkVnr+qUX3xUEZU +DwIuXJ/j3lczFf4YkmGo0ikFXWVEHpvj7/vcBd8Vq6bYC6Rzskw64J7Us2rlOg4K +8E7PeIEfvqmYb7FHUX1CMzazpqkCUgV0fips1KqSVrA+OyNYsY01pxOPZx5xFaaz +tQOGuCBmwEhvuazUSgNVsjffBN0iDFOGKkoqocE4PjzlPN91lzBAMAoGCCsGAQUF +BwMDDDJOZXRMb2NrIFBsYXRpbmEgKENsYXNzIFBsYXRpbnVtKSBGxZF0YW7DunPD +rXR2w6FueQ== +-----END TRUSTED CERTIFICATE----- + +# Network Solutions Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIDkDCCAnigAwIBAgIQHKAtwVI7am2LXB+VSu2sMDANBgkqhkiG9w0BAQUFADBi +MQswCQYDVQQGEwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMu +MTAwLgYDVQQDEydOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3Jp +dHkwHhcNMTEwMTAxMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjBiMQswCQYDVQQGEwJV +UzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMuMTAwLgYDVQQDEydO +ZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkvH6SMG3G2I4rC7xGzuAnlt7e+foS0zwz +c7MEL7xxjOWftiJgPl9dzgn/ggwbmlFQGiaJ3dVhXRncEg8tCqJDXRfQNJIg6nPP +OCwGJgl6cvf6UDL4wpPTaaIjzkGxzOTVHzbRijr4jGPiFFlp7Q3Tf2vouAPlT2rl +mGNpSAW+Lv8ztumXWWn4Zxmuk2GWRBXTcrA/vGp97Eh/jcOrqnErU2lBUzS1sLnF +BgrEsEX1QV1uiUV7PTsmjHTC5dLRfbIR1PtYMiKagMnc/Qzpf14Dl847ABSHJ3A4 +qY5usyd2mFHgBeMhqxrVhSI8KbWaFsWAqPS7azCPL0YCorEMIuDTAgMBAAGjQjBA +MB0GA1UdDgQWBBQhMMn7ANdOmNqHqirQpy6xQDGnTDAOBgNVHQ8BAf8EBAMCAQYw +DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwomEoOiMZv3/EwUb +wzqOmEmK+KoAXCb9cmqjfhIblK5U+CGPp5NP9xbvubmzMsAlITFmNywJsP4ysDfs +PLjOjwiqCJAHXHXV4U4sywIk6aJe6fV4NSIGHPIfiLHhXMyWVPpvScyN8VYD7c8s +nyfe5cqDRL5GQPlXLtJ/MS3Og9z+cGuE0KOf/5fQqNcC7LEs8O9zOD2ZrMRPAb/V +aurGLjIpFwrL5mme0Uq19t+OGfiV6UWpDs1tQVkgnnPGbHEcnNRNMKhzCaAV86BF +JsNb/bu52C3XH/UFMBn2rg+OYo/fyE+G2R1hFrPJ8Lv7x/WvASJH7NjazxzzU2a6 +UwkB+TA1MAoGCCsGAQUFBwMDDCdOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0 +ZSBBdXRob3JpdHk= +-----END TRUSTED CERTIFICATE----- + +# Network Solutions ECC Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIClDCCAhmgAwIBAgIQeThLtBkajXQizP+FMvLkujAKBggqhkjOPQQDAzCBijEL +MAkGA1UEBhMCVVMxCzAJBgNVBAgTAkZMMRUwEwYDVQQHEwxKYWNrc29udmlsbGUx +ITAfBgNVBAoTGE5ldHdvcmsgU29sdXRpb25zIEwuTC5DLjE0MDIGA1UEAxMrTmV0 +d29yayBTb2x1dGlvbnMgRUNDIENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xNTEx +MTgwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGKMQswCQYDVQQGEwJVUzELMAkGA1UE +CBMCRkwxFTATBgNVBAcTDEphY2tzb252aWxsZTEhMB8GA1UEChMYTmV0d29yayBT +b2x1dGlvbnMgTC5MLkMuMTQwMgYDVQQDEytOZXR3b3JrIFNvbHV0aW9ucyBFQ0Mg +Q2VydGlmaWNhdGUgQXV0aG9yaXR5MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEFOED +C2VvrVnWHu7Jv7RMxcZcLzDHn1LbaGHAaRDiknoaw7+SqIk5ivvnoLtxpKDD33fW +lDcTX35TXVC640wIx2XiQbDmWfKc+MCyd8EKkSZ38mm2u9BBPCqIGpSRFsY+o0Iw +QDAdBgNVHQ4EFgQUm3vryP+D8lKYRzAKVvg4vuPrAM4wDgYDVR0PAQH/BAQDAgGG +MA8GA1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0EAwMDaQAwZgIxAKlkWPecuRNmIkl/ +stEC6RP8HPukNJLkygcNt7FSeCg0y/IhVpGGhsiKC68yhFRliQIxAOx5DZ2J8AwY +6ntXUq0L5tR5W8ub4gZFdRi90Pyn3cfhxyK240EkXSPmqJ8AalAyJTA5MAoGCCsG +AQUFBwMDDCtOZXR3b3JrIFNvbHV0aW9ucyBFQ0MgQ2VydGlmaWNhdGUgQXV0aG9y +aXR5 +-----END TRUSTED CERTIFICATE----- + +# Network Solutions RSA Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIF4jCCA8qgAwIBAgIQTANLrGcYTH+vRAhNgpbHsjANBgkqhkiG9w0BAQwFADCB +ijELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkZMMRUwEwYDVQQHEwxKYWNrc29udmls +bGUxITAfBgNVBAoTGE5ldHdvcmsgU29sdXRpb25zIEwuTC5DLjE0MDIGA1UEAxMr +TmV0d29yayBTb2x1dGlvbnMgUlNBIENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0x +NTExMTgwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGKMQswCQYDVQQGEwJVUzELMAkG +A1UECBMCRkwxFTATBgNVBAcTDEphY2tzb252aWxsZTEhMB8GA1UEChMYTmV0d29y +ayBTb2x1dGlvbnMgTC5MLkMuMTQwMgYDVQQDEytOZXR3b3JrIFNvbHV0aW9ucyBS +U0EgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAhN+opqOMC3geyE0Zld0pkJIgNZAqlI2CMy1wElilCIqewQjzk9Zo +wC8Uvnmk/H3M1bw+j+2cSgJhWT2qw290ANL4GjTUVJ5qdEeaL+DS9w/3w90/pb/B ++n1CaWAAgOw85ruBN6QeBhQ9V4+QpDVKNHOHthrDXZDvBk1wdjY8gontz2QZgyVD +Thzi8WpShv5R5H443xWNTGxgQUpPsEBVRjl1yYE5AHOKYuoPZbePT5dAzs/uwWoo +oHGpmSfRPck1c3qAmfh9hrmdeTrt0yr6fqa4/1cqc7Kmv9qJugYb2mWg5r5glIj2 +32bhJ2ob/tBeqY0giwrEH36IQS+ywdDztmjtyDvx76oH3n7XIuCB9qXqexb0QlSd +ln72YhZTzf0Kq7JCoU4qiEJ1g72M5U165x3jTLje46tgOC1nKf7kX67CqOi/rmz5 +67NS8X/p7MIv2Z3KF55C+jtYwT6IYk9fk8GXbWaPHCLzmsH07blrGn42hMgxuPBe +K36V5HnPdUzC2AS/OI4os91btthPI26S6DeVroOu1vw5KkYGH/GEdSHWuE6mKpdY +ZfWaGAHX9cN/KckQ7nNKQ3Z70aYwUf/WKx0eYoS++b5pl5nHDed8JFB1F/2kIOc1 +aANglKfZDcYaLOXiTtXMDsB6MFbvYJK+2S71x/DoRc/ahq7v2HepEicCAwEAAaNC +MEAwHQYDVR0OBBYEFA/xSkp1dAURDB3YW5nrv/6qfV7XMA4GA1UdDwEB/wQEAwIB +hjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQA9y9JGePX2Ohfo +w3tk0cW7kHiN9U+5xC2X+wvmxbjxturoWEs0rXd5LDUfcn0CPu610BaKBjeWte9D +0AkQLJdmx4EfHuYnxYKRWF7zyFtBaICDkbmcgfgn+kXf7nnyXG1wAlTuwFPYQ+sF +esz0Ud2p1CJ9ajvy/ojUUkk6hZJkU/hqU2CIj/Jb1K4rUuDq/1R+oeTvhhungwsG +Zl4wgIxVoEcz/2seREhLYaoePuhMZMfYbX0Orjw8Qj3KJBpw8WEUnDoY1fAGKZEi +sjo6oRZUYxr5M5VEnySjIWQECOKb1d4IUhxiHFMWRzVCJsenDP3zWxN3Aoxc4hbw +GB/ZffXfAiSIevNe/xcOs2JnoauxF449Okaw9UaMq4TY9Q6hIOvC8Jl0PY6zA9gk +xWzrawxTv2Bp3YwoxW/Pu9KBdyvGfLHESmwVEDcpXa74sREFxBSN7BOjRP1Ni2i4 +wf+d1TcuSPgofNz5c1PZtgF1Qnq/C99RULhTsuHudJDLvKrQcYOiq07JELY9HO9A +109DkDO5AZZUXSrVBluShrgGEIEGyJHbKSCyU73zS1tM22kfiW5UP9eJXee1zQy+ +P314OAHStmemz1hIlBpF/ZBzScq1Q6AhYo1JBCaq+B8uP/IuofKr9AYesC3EwXBC +Pf3DUUmIAA7Kgg2beQLiwC6T3+Ty8TA5MAoGCCsGAQUFBwMDDCtOZXR3b3JrIFNv +bHV0aW9ucyBSU0EgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# OISTE WISeKey Global Root GA CA +-----BEGIN TRUSTED CERTIFICATE----- +MIID8TCCAtmgAwIBAgIQQT1yx/RrH4FDffHSKFTfmjANBgkqhkiG9w0BAQUFADCB +ijELMAkGA1UEBhMCQ0gxEDAOBgNVBAoTB1dJU2VLZXkxGzAZBgNVBAsTEkNvcHly +aWdodCAoYykgMjAwNTEiMCAGA1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNl +ZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwgUm9vdCBHQSBDQTAeFw0w +NTEyMTExNjAzNDRaFw0zNzEyMTExNjA5NTFaMIGKMQswCQYDVQQGEwJDSDEQMA4G +A1UEChMHV0lTZUtleTEbMBkGA1UECxMSQ29weXJpZ2h0IChjKSAyMDA1MSIwIAYD +VQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBX +SVNlS2V5IEdsb2JhbCBSb290IEdBIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAy0+zAJs9Nt350UlqaxBJH+zYK7LG+DKBKUOVTJoZIyEVRd7jyBxR +VVuuk+g3/ytr6dTqvirdqFEr12bDYVxgAsj1znJ7O7jyTmUIms2kahnBAbtzptf2 +w93NvKSLtZlhuAGio9RN1AU9ka34tAhxZK9w8RxrfvbDd50kc3vkDIzh2TbhmYsF +mQvtRTEJysIA2/dyoJaqlYfQjse2YXMNdmaM3Bu0Y6Kff5MTMPGhJ9vZ/yxViJGg +4E8HsChWjBgbl0SOid3gF27nKu+POQoxhILYQBRJLnpB5Kf+42TMwVlxSywhp1t9 +4B3RLoGbw9ho972WG6xwsRYUC9tguSYBBQIDAQABo1EwTzALBgNVHQ8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUswN+rja8sHnR3JQmthG+IbJphpQw +EAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBAEuh/wuHbrP5wUOx +SPMowB0uyQlB+pQAHKSkq0lPjz0e701vvbyk9vImMMkQyh2I+3QZH4VFvbBsUfk2 +ftv1TDI6QU9bR8/oCy22xBmddMVHxjtqD6wU2zz0c5ypBd8A3HR4+vg1YFkCExh8 +vPtNsCBtQ7tgMHpnM1zFmdH4LTlSc/uMqpclXHLZCB6rTjzjgTGfA6b7wP4piFXa +hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZi +Fj4A4xylNoEYokxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ +/L7fCg0wNzAUBggrBgEFBQcDBAYIKwYBBQUHAwMMH09JU1RFIFdJU2VLZXkgR2xv +YmFsIFJvb3QgR0EgQ0E= +-----END TRUSTED CERTIFICATE----- + +# OISTE WISeKey Global Root GB CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBMwQTAeBggr +BgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDB9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENB +-----END TRUSTED CERTIFICATE----- + +# OISTE WISeKey Global Root GC CA +-----BEGIN TRUSTED CERTIFICATE----- +MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw +CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 +bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg +Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ +BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu +ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS +b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni +eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W +p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T +rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV +57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg +Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9MDcw +FAYIKwYBBQUHAwEGCCsGAQUFBwMDDB9PSVNURSBXSVNlS2V5IEdsb2JhbCBSb290 +IEdDIENB +-----END TRUSTED CERTIFICATE----- + +# OpenTrust Root CA G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFbzCCA1egAwIBAgISESChaRu/vbm9UpaPI+hIvyYRMA0GCSqGSIb3DQEBDQUA +MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9w +ZW5UcnVzdCBSb290IENBIEcyMB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAw +MFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9wZW5UcnVzdDEdMBsGA1UEAwwU +T3BlblRydXN0IFJvb3QgQ0EgRzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQDMtlelM5QQgTJT32F+D3Y5z1zCU3UdSXqWON2ic2rxb95eolq5cSG+Ntmh +/LzubKh8NBpxGuga2F8ORAbtp+Dz0mEL4DKiltE48MLaARf85KxP6O6JHnSrT78e +CbY2albz4e6WiWYkBuTNQjpK3eCasMSCRbP+yatcfD7J6xcvDH1urqWPyKwlCm/6 +1UWY0jUJ9gNDlP7ZvyCVeYCYitmJNbtRG6Q3ffyZO6v/v6wNj0OxmXsWEH4db0fE +FY8ElggGQgT4hNYdvJGmQr5J1WqIP7wtUdGejeBSzFfdNTVY27SPJIjki9/ca1TS +gSuyzpJLHB9G+h3Ykst2Z7UJmQnlrBcUVXDGPKBWCgOz3GIZ38i1MH/1PCZ1Eb3X +G7OHngevZXHloM8apwkQHZOJZlvoPGIytbU6bumFAYueQ4xncyhZW+vj3CzMpSZy +YhK05pyDRPZRpOLAeiRXyg6lPzq1O4vldu5w5pLeFlwoW5cZJ5L+epJUzpM5ChaH +vGOz9bGTXOBut9Dq+WIyiET7vycotjCVXRIouZW+j1MY5aIYFuJWpLIsEPUdN6b4 +t/bQWVyJ98LVtZR00dX+G7bw5tYee9I8y6jj9RjzIR9u701oBnstXW5DiabA+aC/ +gh7PU3+06yzbXfZqfUAkBXKJOAGTy3HCOV0GEfZvePg3DTmEJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUajn6QiL3 +5okATV59M4PLuG53hq8wHwYDVR0jBBgwFoAUajn6QiL35okATV59M4PLuG53hq8w +DQYJKoZIhvcNAQENBQADggIBAJjLq0A85TMCl38th6aP1F5Kr7ge57tx+4BkJamz +Gj5oXScmp7oq4fBXgwpkTx4idBvpkF/wrM//T2h6OKQQbA2xx6R3gBi2oihEdqc0 +nXGEL8pZ0keImUEiyTCYYW49qKgFbdEfwFFEVn8nNQLdXpgKQuswv42hm1GqO+qT +RmTFAHneIWv2V6CG1wZy7HBGS4tz3aAhdT7cHcCP009zHIXZ/n9iyJVvttN7jLpT +wm+bREx50B1ws9efAvSyB7DH5fitIw6mVskpEndI2S9G/Tvw/HRwkqWOOAgfZDC2 +t0v7NqwQjqBSM2OdAzVWxWm9xiNaJ5T2pBL4LTM8oValX9YZ6e18CL13zSdkzJTa +TkZQh+D5wVOAHrut+0dSixv9ovneDiK3PTNZbNTe9ZUGMg1RGUFcPk8G97krgCf2 +o6p6fAbhQ8MTOWIaNr3gKC6UAuQpLmBVrkA9sHSSXvAgZJY/X0VdiLWK2gKgW0VU +3jg9CcCoSmVGFvyqv1ROTVu+OEO3KMqLM6oaJbolXCkvW0pujOotnCr2BXbgd5eA +iN1nE28daCSLT7d0geX0YJ96Vdc+N9oWaz53rK4YcJUIeSkDiv7BO7M/Gg+kO14f +WKGVyasvc0rQLW6aWQ9VGHgtPFGml4vmu7JwqkwR3v98KzfUetF3NI/n+UL3PIEM +S1IKMCIwCgYIKwYBBQUHAwMMFE9wZW5UcnVzdCBSb290IENBIEcy +-----END TRUSTED CERTIFICATE----- + +# OpenTrust Root CA G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICITCCAaagAwIBAgISESDm+Ez8JLC+BUCs2oMbNGA/MAoGCCqGSM49BAMDMEAx +CzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5U +cnVzdCBSb290IENBIEczMB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFow +QDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9wZW5UcnVzdDEdMBsGA1UEAwwUT3Bl +blRydXN0IFJvb3QgQ0EgRzMwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARK7liuTcpm +3gY6oxH84Bjwbhy6LTAMidnW7ptzg6kjFYwvWYpa3RTqnVkrQ7cG7DK2uu5Bta1d +oYXM6h0UZqNnfkbilPPntlahFVmhTzeXuSIevRHr9LIfXsMUmuXZl5mjYzBhMA4G +A1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRHd8MUi2I5 +DMlv4VBN0BBY3JWIbTAfBgNVHSMEGDAWgBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAK +BggqhkjOPQQDAwNpADBmAjEAj6jcnboMBBf6Fek9LykBl7+BFjNAk2z8+e2AcG+q +j9uEwov1NcoG3GRvaBbhj5G5AjEA2Euly8LQCGzpGPta3U1fJAuwACEl74+nBCZx +4nxp5V2a+EEfOzmTk51V6s2N8fvBMCIwCgYIKwYBBQUHAwMMFE9wZW5UcnVzdCBS +b290IENBIEcz +-----END TRUSTED CERTIFICATE----- + +# PersonalID Trustworthy RootCA 2011 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGMjCCBBqgAwIBAgIQWMv5ZJZxdJVA9K0IrGTk4zANBgkqhkiG9w0BAQsFADBz +MQswCQYDVQQGEwJJTDEYMBYGA1UECgwPUGVyc29uYWxJRCBMdGQuMR0wGwYDVQQL +DBRDZXJ0aWZpY2F0ZSBTZXJ2aWNlczErMCkGA1UEAwwiUGVyc29uYWxJRCBUcnVz +dHdvcnRoeSBSb290Q0EgMjAxMTAeFw0xMTA5MDEwODM1MjFaFw00MTA5MDEwODQ1 +MTZaMHMxCzAJBgNVBAYTAklMMRgwFgYDVQQKDA9QZXJzb25hbElEIEx0ZC4xHTAb +BgNVBAsMFENlcnRpZmljYXRlIFNlcnZpY2VzMSswKQYDVQQDDCJQZXJzb25hbElE +IFRydXN0d29ydGh5IFJvb3RDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAsJWMYP4FDmoz7feL4/LV8nzTVkJU9yvyiKX157dshwErab4FSUTY +2yF6KteKMaEhEJ7T4m5jgoVUhE0oJhviE/dR+y/rEtU9OYxkn6QTh8PYyfopI44J +j0lGxNTJV1hpnxfPc3Sl7soYucfBMM1POjUIU/jsGvtvMO32nwnw8NDEjjt5Ti6F +IlzUfXDR/5K6H9RVU2e6KFgt9xOM/KULnDimRhwO6Kp4K/UKMNM7YIbIf6WbomMB +L9DTEiWFfpbNMbHkm47qLJOkYqg31faP3yGa0z4d4VARcFSbBBedTathzo8qLO95 +5ndFWdZo1bZLmquRSw5hF7lYwp5moY+JwUMgQrB/gJxKKrd6IEHGTcSSb3p+XVu5 +o8lOyuVQZbwAAHlH8EUEsCL7DpiqYR1PYGNyj7WwBJR/EKwZPydiadYcV905Tzjq +AJr9KJ1AJsBAncSgSchBtWc9oEuUKRKpWCdZBH+P0Yx+DLMIFzSsj7lcvelwoX7C +pWVh6bYQUI/c5HRh8V9ye39cLy18q9ZDMRAcWXfKSEoYomQLAFlnx9TKw5saCFIV +vtfFxrcv5mKcpsfY3vAV+645VS1vUHUu/aAHtF96fgSL9pmide3JO9U9z2dSPT7v +H3CaGDynIAZJDLFlrDO71H9HaYj2ioHundS0xy8D6K4ayVYFZ2moyIECAwEAAaOB +wTCBvjALBgNVHQ8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBAjAdBgNVHQ4EFgQU +x38LyC9Xjiny9gGL6yelVo79pB4wEAYJKwYBBAGCNxUBBAMCAQAwagYDVR0gBGMw +YTBfBggrBgEEAeEYATBTMFEGCCsGAQUFBwIBFkVodHRwOi8vd3d3LmljYS5jby5p +bC9yZXBvc2l0b3J5L2Nwcy9QZXJzb25hbElEX1ByYWN0aWNlX1N0YXRlbWVudC5w +ZGYwDQYJKoZIhvcNAQELBQADggIBAEJliyT6khU0Ghz6yM5Nei9739ADQRzUpOH7 +6MytCd0dpAjZqCB9l58MSfGlwubVd0aXfqSQonnpvRpeNIJmCVL8UNGP0Kscov// +Pe7+I/i/I7PNvuH3z+TYEuOUyE7M13uwN5t36u1cgcjMj8454+RlXd6C2I8jaeFR +r1+3T5BppJllU7rm/a94Z5RKyMN/jAJPSuaHmPY4t0j4bSh/98ZsJVT9Ltbq2gbi +sf0HaPCvgIy0wul0FaQav7nKQ1sS54VHXlID8JHg6VBx1CECLHuGkXA2xpy2dPkq +Vfch+2+gBl3XMBLyUfHJODaPyGZhQdnHS4JoUqP1iQwVvE4qlawxaacb4tTXSPSR +9QN8eRY+LA1p4Yo3Hp98GFVBL1/npHKbVfPjAbACpYQSakCmq+ShrOsD2bxfJFYn +rSDgZjVFPUcJ8AWxb3F+QLDQFV4rrFKBqPuD9SxXRIY05BRq4899mnfYbEhcy5rh +pvu/EaIG5R9xvTS1z73EQhbFKfjUwEyKst7FlIKGm8zgqQZEMSQkTfrt4UIlZqLB +14AX73qVZUM+ZtMF8QHkQlZEAHhrnTYg+2X/QFzoaDUf4SagggN2A8twRhEkrt8v +YP3xJwADvUsn27yclzdRK+V4tME2kBCM/z0A1LpIn0jKhzGa7cSaU9LdcxQ/CYKh +XWVOTSbiMDAwCgYIKwYBBQUHAwMMIlBlcnNvbmFsSUQgVHJ1c3R3b3J0aHkgUm9v +dENBIDIwMTE= +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root CA 1 G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXDMDcwHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwwVUXVvVmFkaXMgUm9vdCBDQSAxIEcz +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0uMDQwHgYIKwYBBQUHAwQGCCsGAQUF +BwMBBggrBgEFBQcDAwwSUXVvVmFkaXMgUm9vdCBDQSAy +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root CA 2 G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 +MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf +qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW +n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym +c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ +O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 +o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j +IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq +IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz +8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh +vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l +7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG +cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD +ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 +AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC +roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga +W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n +lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE ++V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV +csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd +dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg +KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM +HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 +WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+MMC0wFAYIKwYBBQUH +AwEGCCsGAQUFBwMDDBVRdW9WYWRpcyBSb290IENBIDIgRzM= +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root CA 3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEtowNDAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUF +BwMDDBJRdW9WYWRpcyBSb290IENBIDM= +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root CA 3 G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0MDcwHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwwVUXVvVmFkaXMgUm9vdCBDQSAzIEcz +-----END TRUSTED CERTIFICATE----- + +# QuoVadis Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAzMTkxODMzMzNaFw0yMTAzMTcxODMz +MzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUw +IwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVR +dW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Yp +li4kVEAkOPcahdxYTMukJ0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2D +rOpm2RgbaIr1VxqYuvXtdj182d6UajtLF8HVj71lODqV0D1VNk7feVcxKh7YWWVJ +WCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeLYzcS19Dsw3sgQUSj7cug +F+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWenAScOospU +xbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCC +Ak4wPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVv +dmFkaXNvZmZzaG9yZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREw +ggENMIIBCQYJKwYBBAG+WAABMIH7MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNl +IG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmljYXRlIGJ5IGFueSBwYXJ0eSBh +c3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJsZSBzdGFuZGFy +ZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh +Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYI +KwYBBQUHAgEWFmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3T +KbkGGew5Oanwl4Rqy+/fMIGuBgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rq +y+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p +dGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYD +VQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6tlCL +MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSk +fnIYj9lofFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf8 +7C9TqnN7Az10buYWnuulLsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1R +cHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2xgI4JVrmcGmD+XcHXetwReNDWXcG31a0y +mQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi5upZIof4l/UO/erMkqQW +xFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi5nrQNiOK +SnQ2+TAzMAoGCCsGAQUFBwMDDCVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24g +QXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# Root CA Generalitat Valenciana +-----BEGIN TRUSTED CERTIFICATE----- +MIIGizCCBXOgAwIBAgIEO0XlaDANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJF +UzEfMB0GA1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0GA1UECxMGUEtJ +R1ZBMScwJQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVuY2lhbmEwHhcN +MDEwNzA2MTYyMjQ3WhcNMjEwNzAxMTUyMjQ3WjBoMQswCQYDVQQGEwJFUzEfMB0G +A1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0GA1UECxMGUEtJR1ZBMScw +JQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVuY2lhbmEwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGKqtXETcvIorKA3Qdyu0togu8M1JAJke+ +WmmmO3I2F0zo37i7L3bhQEZ0ZQKQUgi0/6iMweDHiVYQOTPvaLRfX9ptI6GJXiKj +SgbwJ/BXufjpTjJ3Cj9BZPPrZe52/lSqfR0grvPXdMIKX/UIKFIIzFVd0g/bmoGl +u6GzwZTNVOAydTGRGmKy3nXiz0+J2ZGQD0EbtFpKd71ng+CT516nDOeB0/RSrFOy +A8dEJvt55cs0YFAQexvba9dHq198aMpunUEDEO5rmXteJajCq+TA81yc477OMUxk +Hl6AovWDfgzWyoxVjr7gvkkHD6MkQXpYHYTqWBLI4bft75PelAgxAgMBAAGjggM7 +MIIDNzAyBggrBgEFBQcBAQQmMCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLnBr +aS5ndmEuZXMwEgYDVR0TAQH/BAgwBgEB/wIBAjCCAjQGA1UdIASCAiswggInMIIC +IwYKKwYBBAG/VQIBADCCAhMwggHoBggrBgEFBQcCAjCCAdoeggHWAEEAdQB0AG8A +cgBpAGQAYQBkACAAZABlACAAQwBlAHIAdABpAGYAaQBjAGEAYwBpAPMAbgAgAFIA +YQDtAHoAIABkAGUAIABsAGEAIABHAGUAbgBlAHIAYQBsAGkAdABhAHQAIABWAGEA +bABlAG4AYwBpAGEAbgBhAC4ADQAKAEwAYQAgAEQAZQBjAGwAYQByAGEAYwBpAPMA +bgAgAGQAZQAgAFAAcgDhAGMAdABpAGMAYQBzACAAZABlACAAQwBlAHIAdABpAGYA +aQBjAGEAYwBpAPMAbgAgAHEAdQBlACAAcgBpAGcAZQAgAGUAbAAgAGYAdQBuAGMA +aQBvAG4AYQBtAGkAZQBuAHQAbwAgAGQAZQAgAGwAYQAgAHAAcgBlAHMAZQBuAHQA +ZQAgAEEAdQB0AG8AcgBpAGQAYQBkACAAZABlACAAQwBlAHIAdABpAGYAaQBjAGEA +YwBpAPMAbgAgAHMAZQAgAGUAbgBjAHUAZQBuAHQAcgBhACAAZQBuACAAbABhACAA +ZABpAHIAZQBjAGMAaQDzAG4AIAB3AGUAYgAgAGgAdAB0AHAAOgAvAC8AdwB3AHcA +LgBwAGsAaQAuAGcAdgBhAC4AZQBzAC8AYwBwAHMwJQYIKwYBBQUHAgEWGWh0dHA6 +Ly93d3cucGtpLmd2YS5lcy9jcHMwHQYDVR0OBBYEFHs100DSHHgZZu90ECjcPk+y +eAT8MIGVBgNVHSMEgY0wgYqAFHs100DSHHgZZu90ECjcPk+yeAT8oWykajBoMQsw +CQYDVQQGEwJFUzEfMB0GA1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0G +A1UECxMGUEtJR1ZBMScwJQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVu +Y2lhbmGCBDtF5WgwDQYJKoZIhvcNAQEFBQADggEBACRhTvW1yEICKrNcda3Fbcrn +lD+laJWIwVTAEGmiEi8YPyVQqHxK6sYJ2fR1xkDar1CdPaUWu20xxsdzCkj+IHLt +b8zog2EWRpABlUt9jppSCS/2bxzkoXHPjCpaF3ODR00PNvsETUlR4hTJZGH71BTg +9J63NI8KJr2XXPR5OkowGcytT6CYirQxlyric21+eLj4iIlPsSKRZEv1UN4D2+XF +ducTZnV+ZfsBn5OHiJ35Rld8TWCvmHMTI6QgkYH60GFmuH3Rr9ZvHmw96RH9qfmC +IoaZM3Fa6hlXPZHNqcCjbgcTpsnt+GijnsNacgmHKNHEc8RzGF9QdRYxn7fofMMw +LDAKBggrBgEFBQcDAwweUm9vdCBDQSBHZW5lcmFsaXRhdCBWYWxlbmNpYW5h +-----END TRUSTED CERTIFICATE----- + +# S-TRUST Authentication and Encryption Root CA 2005:PN +-----BEGIN TRUSTED CERTIFICATE----- +MIIEezCCA2OgAwIBAgIQNxkY5lNUfBq1uMtZWts1tzANBgkqhkiG9w0BAQUFADCB +rjELMAkGA1UEBhMCREUxIDAeBgNVBAgTF0JhZGVuLVd1ZXJ0dGVtYmVyZyAoQlcp +MRIwEAYDVQQHEwlTdHV0dGdhcnQxKTAnBgNVBAoTIERldXRzY2hlciBTcGFya2Fz +c2VuIFZlcmxhZyBHbWJIMT4wPAYDVQQDEzVTLVRSVVNUIEF1dGhlbnRpY2F0aW9u +IGFuZCBFbmNyeXB0aW9uIFJvb3QgQ0EgMjAwNTpQTjAeFw0wNTA2MjIwMDAwMDBa +Fw0zMDA2MjEyMzU5NTlaMIGuMQswCQYDVQQGEwJERTEgMB4GA1UECBMXQmFkZW4t +V3VlcnR0ZW1iZXJnIChCVykxEjAQBgNVBAcTCVN0dXR0Z2FydDEpMCcGA1UEChMg +RGV1dHNjaGVyIFNwYXJrYXNzZW4gVmVybGFnIEdtYkgxPjA8BgNVBAMTNVMtVFJV +U1QgQXV0aGVudGljYXRpb24gYW5kIEVuY3J5cHRpb24gUm9vdCBDQSAyMDA1OlBO +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2bVKwdMz6tNGs9HiTNL1 +toPQb9UY6ZOvJ44TzbUlNlA0EmQpoVXhOmCTnijJ4/Ob4QSwI7+Vio5bG0F/WsPo +TUzVJBY+h0jUJ67m91MduwwA7z5hca2/OnpYH5Q9XIHV1W/fuJvS9eXLg3KSwlOy +ggLrra1fFi2SU3bxibYs9cEv4KdKb6AwajLrmnQDaHgTncovmwsdvs91DSaXm8f1 +XgqfeN+zvOyauu9VjxuapgdjKRdZYgkqeQd3peDRF2npW932kKvimAoA0SVtnteF +hy+S8dF2g08LOlk3KC8zpxdQ1iALCvQm+Z845y2kuJuJja2tyWp9iRe79n+Ag3rm +7QIDAQABo4GSMIGPMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgEG +MCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFTVFJvbmxpbmUxLTIwNDgtNTAdBgNV +HQ4EFgQUD8oeXHngovMpttKFswtKtWXsa1IwHwYDVR0jBBgwFoAUD8oeXHngovMp +ttKFswtKtWXsa1IwDQYJKoZIhvcNAQEFBQADggEBAK8B8O0ZPCjoTVy7pWMciDMD +pwCHpB8gq9Yc4wYfl35UvbfRssnV2oDsF9eK9XvCAPbpEW+EoFolMeKJ+aQAPzFo +LtU96G7m1R08P7K9n3frndOMusDXtk3sU5wPBG7qNWdX4wple5A64U8+wwCSersF +iXOMy6ZNwPv2AtawB6MDwidAnwzkhYItr5pCHdDHjfhA7p0GVxzZotiAFP7hYy0y +h9WUUpY6RsZxlj33mA6ykaqP2vROJAA5VeitF7nTNCtKqUDMFypVZUF0Qn71wK/I +k63yGFs9iQzbRzkk+OBM8h+wPQrKBU6JIRrjKpms/H+h8Q8bHz2eBIPdltkdOpQw +QzAKBggrBgEFBQcDAww1Uy1UUlVTVCBBdXRoZW50aWNhdGlvbiBhbmQgRW5jcnlw +dGlvbiBSb290IENBIDIwMDU6UE4= +-----END TRUSTED CERTIFICATE----- + +# SAPO Class 2 Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEWDCCA0CgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyAyIFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgMiBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALd8aXxg9Wwm9KocF39d +1BFL5/Pa53On+qRCSWg/2qVAXAZoX07Mvb6BOCQtzCagRG0DyyPgu96FU0uUX197 +qsgal/7XI5PtsGq92PwAPrOSBOBLvk87mKed7c1j8IHnbJjUbGBVAOW5POY0lV3g +/XGH6f+B7uV3bxj/88l8pZXdgtwU2aLhvs0nc7tFWz90sWJ4ZhAiLPVo8xeIFjua +Gx37FK4NuvKQVaLVMNYrlTLHOW57ZdJ3OM5uVqXZI6s4sjtRhcAdG7cRLwVpR9gC +ypKo4TPehQib7ZDV2CGZcb+29XPvZwiYZNLyKnpLIRbhH1hh3pFHHyGfH/6MI4aD +GCcCAwEAAaM/MD0wDgYDVR0PAQH/BAQDAgEGMAwGA1UdEwQFMAMBAf8wHQYDVR0O +BBYEFKudI5P9HzNKMi2qJFryLWSpAZpBMA0GCSqGSIb3DQEBBQUAA4IBAQBWUlG5 +DwLh9i6csTFapvjOvO4ChBUJ8ShSX+fhLL3beQp6v+tintWGRynudDDsTHW1HuOq +M++t4WpMvzcBvlWDTKlS2DeYUG9o3UdBtywwyG5MByzG00m5tVzSy8zUNsYHDRhP +P2MAxOy2iPsBZGOt0fd3fGRUKxI9NBWF8KC6eSlfmJtC6q7BqJ8TiYpt6bg4yWHt +YOz3KlgFm6FgeIMX4X5f6P144GtWKoZ2rlvCXutF5DC4Me1ksV0uwD2ADccnE9N2 +4ob73NuACoHh/Qj5C8QxtGNb54wz5Qa2Umqz1+lr4zJ4MmaUTt2Nd23TJChbVGF3 +Amd1lEtXS+ZsxTlvMCIwCgYIKwYBBQUHAwMMFFNBUE8gQ2xhc3MgMiBSb290IENB +-----END TRUSTED CERTIFICATE----- + +# SAPO Class 3 Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGWDCCBECgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyAzIFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgMyBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMp4Gge89vu0t4m80BlW +OCpZnQfqGvn4+GhnXo/vyvf1aonmo5V/qdspJBw10DiWbD5WJP9eYlGQLofonMfa +vDPxnqFvC44KJPT4TZCmss1eEdPCl0z1X0AdJiRNjQkQC/+7IBuTJhkMQz/pjrwx +NxBukcpIglZGx7y5Op5GgWbP2ehcEM85nmXDnsVa9EvMRJlmhvRyG6NTSequR80y +DXDmoKB2B53/WO/kPJHAteTcuAEM0/6zQqA7YQLUN1vXTEWV0nVd9W4wX1dRi7L/ +fsiLnKqjQTcMEJGopoVcucePBVGy0HjS4ktJ6dQapzusqjPmmioDQJhvdFITMZTR +EsG0yzD5/0S4kltS1jDZM9F14xmlFhW3VFfxVlDOTr4DOy/stjDuFGBeX3o19E5k +BxHqpQdmG26T4rBPXtbgROCz3K7vuP2os+zs5TmIRLShuxRgZI/WkpPL88xQ3ekH +yGdn+fCHhJGyAGLpv0oVdMW/BEwFRl0Ky+XqYQDhb0GxNI6mAKJ8pqWm+mxMQ+Wo +Jpo0mB6HmOdMeNGPnwVVXYpLyc+gC30GkJwYkrLEstfjRdlrc8OXOb8pHgYJVUC6 +vNpIdUPt/kR+PSzmYpED/T2J7370XSSPpQsrsz56KSi8uz+/63eFBCaLlLKQ9euN +T6JEIlConCpESAB4GaudCJYVAgMBAAGjPzA9MA4GA1UdDwEB/wQEAwIBBjAMBgNV +HRMEBTADAQH/MB0GA1UdDgQWBBRhs3lSnUqVklGOgiRw045AyMVm0DANBgkqhkiG +9w0BAQUFAAOCAgEAf8azJIRQN/nEsMUwPBbpUA16urQ70iPl6Yl4auXjGwUekRzO +BpeNZhYHRO+BuQh+o8c5NLi/mm2NsMEgQi4N9wsGA09uy7y3sC8ZcY2OrwpNWDGL +RJkqKGaFx4AmZrBHwjmy+k8+Vb3ciSdLczME/ntHkMkFwC0z+LcIgilBQ/0mU+b6 +HzdWjU8Xutj9OoRw2D7wM67EBUhUobnVIT/qPsepMUf3m65KYpjRZyBl3nnhsTIe +a9/7gGtHXDnHDgiqx6PuKek04pv5dbgm64idtDkRLnD9UQQyuw95hFAhRXwv5Nn/ +JTgGI6tOsQ7cOzEKrdpLAGlrLuLDDMkFAUVm4aWJYRxkmY0LmJCzfmY7C9ir6HUO +2X+abn3JgyfJvOg0OMJahzJyBwz+1ZTR8MB48oCoRvVrmuzi2RaOivqE9tFSyZyy +IVZgQ6YQ939Jv74H01BkbQK6KlUsz9nCbq98C0jQ8eGnwq10j4bk7ar6XIN9Quh9 +Bx0HVcwraTK5d4JoxnfyImmmyQpdh5nlcZ59LxMe0vT9CXknWCsKh4Eq+2ojLUsk +hXQWRxgPCcX+qUgk46zQaT1fU5gyvezgUcFTSrH2O/A0SPWa3tzR4OO9JbNE6Dpz +yXnQrNHt4gAKX6EdZllKc2jUBXIzOKdrr5HbDceMQOiekIjJ+/4k14Gs894wIjAK +BggrBgEFBQcDAwwUU0FQTyBDbGFzcyAzIFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# SAPO Class 4 Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIGWDCCBECgAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyA0IFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgNCBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvc7UiaoKOf4BGO2ciS +dTpVwVEiygt6pDUNxeZXLYPwKm8iODcxbXyFJKIGL0OCPUUwQCUc7lhHQebwngAe ++PQvEbuSsphFLdMfgMl2FBPDzEDmres5YPzPyN8q/YwSUe/PDGTGV+gjUV3nZlLq +Zr2Tf516KPEZcG6EnzBHt7A5axMs60tNLq8/v/0CE0o55z4zxRCRUb4PR51NUvws +8+MTogCC4RQMzdKes/Lggdq+mZJT432Zd0Ph4UgpgZ7WBVc6cdw+mK1YcG9Gu34y +A+KDm1lX9/izzVQW7LatoRwaktHUKZ6PzbPofVDxwoKsur20dVag9UVdGH0sjPF7 +QcyGsZqESwoqXZuW4c36qxYnQeeVNabLiqeW86XMUfktfR5D+9xttbk4vQX7WPou +0+xeZC2vWAFKfCJG00HLPeSWXklDOLuJ6/ScaTkSA1yEu+WMHurgZrvAv4z+ngpN +PWg/QHbWMqnqRbhqB1KOzVHxXShjDNNZOPzJ/YLJRSC85ujMogzLe2Q5SUZF9XMc +apcg6yFC97QgUrdK/XW8yw8MZxFXH/cw8auQzF08lgVi08pVAUtGxYCHHHLQc1Qh +6tejnNOuf9RT2Sj8V97lP1JKu8gmJEdTHHO6z8a0MM1eccdWvEk4JebFEAl42dQd +XM1u7duRXKFTFFaqjSeppo4bAgMBAAGjPzA9MA4GA1UdDwEB/wQEAwIBBjAMBgNV +HRMEBTADAQH/MB0GA1UdDgQWBBQWhC37G+e0HmiY00IgGm5+T5FXAjANBgkqhkiG +9w0BAQUFAAOCAgEAe+MNYzpkIG3M/Cy46dar29erJilHogxW7XXMlZlSNssg+xE0 +F0JOdQWw2OS4sIQvmBm5+9A5bHIGGMlcinp0CDdIaf0ioV3F13gT8ChCQcPJwzkJ +B9Sh+DciaeTfMlVvwny5k/GyN3XMrtIzlow29wHt42TpC2hbEKoBNpl8z5qUXf0a +WWGiZRV9nhdk1J9TmAH9cVfQXUARFj8/RNKvyfwIMn12+NVD6Nw2aAfDTsOWl1fG +fTZe23Ct/q7UiJ21pGDWo2K+fPk0Hvy79EpyxYMeRmjDDpeDGD3TDgoRNXxplcWr +KvXIORBNDIkwKYlJG0SXkfTqZSEbPwpDcoIcbRFd4CJFX2FMoqb636NGuuGBYGwy +tPzk3DYF5DP36493SaqNCu9IiuZBl347q0OH8ghgC2/XWWb9K7svzjNPcuC217NT +V4nwO7xu4hC/cz5ij6UI6VNnwU7BLkJDp7Kk+RaLQu7cNH9Is5DbJOLI5FM1U5zq +N4XPv5gGNUcm165t3YSpY1gmQfV1Mi5hnk+TUlL2WiPrwaBzJiUiQpGRkYBP/4jO +XnPnlsLtCRL3dpapeWKQSYGDnwwyMuJbyt1INKyHjnGVrkzkfHgdp1HDvRH6AtGV +iXMIRiKJaQDPT4DBTVuUxMqZUZgvDb19VGTUCtonWac3u1YM0AaicrkSuVswIjAK +BggrBgEFBQcDAwwUU0FQTyBDbGFzcyA0IFJvb3QgQ0E= +-----END TRUSTED CERTIFICATE----- + +# SECOM Trust.net +-----BEGIN TRUSTED CERTIFICATE----- +MIIDWjCCAkKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBQMQswCQYDVQQGEwJKUDEY +MBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21t +dW5pY2F0aW9uIFJvb3RDQTEwHhcNMDMwOTMwMDQyMDQ5WhcNMjMwOTMwMDQyMDQ5 +WjBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYD +VQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQCzs/5/022x7xZ8V6UMbXaKL0u/ZPtM7orw8yl8 +9f/uKuDp6bpbZCKamm8sOiZpUQWZJtzVHGpxxpp9Hp3dfGzGjGdnSj74cbAZJ6kJ +DKaVv0uMDPpVmDvY6CKhS3E4eayXkmmziX7qIWgGmBSWh9JhNrxtJ1aeV+7AwFb9 +Ms+k2Y7CI9eNqPPYJayX5HA49LY6tJ07lyZDo6G8SVlyTCMwhwFY9k6+HGhWZq/N +QV3Is00qVUarH9oe4kA92819uZKAnDfdDJZkndwi92SL32HeFZRSFaB9UslLqCHJ +xrHty8OVYNEP8Ktw+N/LTX7s1vqr2b1/VPKl6Xn62dZ2JChzAgMBAAGjPzA9MB0G +A1UdDgQWBBSgc0mZaNyFW2XjmygvV5+9M7wHSDALBgNVHQ8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAaECpqLvkT115swW1F7NgE+vG +kl3g0dNq/vu+m22/xwVtWSDEHPC32oRYAmP6SBbvT6UL90qY8j+eG61Ha2POCEfr +Uj94nK9NrvjVT8+amCoQQTlSxN3Zmw7vkwGusi7KaEIkQmywszo+zenaSMQVy+n5 +Bw+SUEmK3TGXX8npN6o7WWWXlDLJs58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJU +JRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ6rBK+1YWc26sTfcioU+tHXot +RSflMMFe8toTyyVCUZVHA4xsIcx0Qu1T/zOLjw9XARYvz6buyXAiFL39vmwLAzAd +MAoGCCsGAQUFBwMDDA9TRUNPTSBUcnVzdC5uZXQ= +-----END TRUSTED CERTIFICATE----- + +# SECOM Trust Systems CO.,LTD. +-----BEGIN TRUSTED CERTIFICATE----- +MIIDfTCCAmWgAwIBAgIBADANBgkqhkiG9w0BAQUFADBgMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEqMCgGA1UECxMh +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBFViBSb290Q0ExMB4XDTA3MDYwNjAyMTIz +MloXDTM3MDYwNjAyMTIzMlowYDELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09N +IFRydXN0IFN5c3RlbXMgQ08uLExURC4xKjAoBgNVBAsTIVNlY3VyaXR5IENvbW11 +bmljYXRpb24gRVYgUm9vdENBMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBALx/7FebJOD+nLpCeamIivqA4PUHKUPqjgo0No0c+qe1OXj/l3X3L+SqawSE +RMqm4miO/VVQYg+kcQ7OBzgtQoVQrTyWb4vVog7P3kmJPdZkLjjlHmy1V4qe70gO +zXppFodEtZDkBp2uoQSXWHnvIEqCa4wiv+wfD+mEce3xDuS4GBPMVjZd0ZoeUWs5 +bmB2iDQL87PRsJ3KYeJkHcFGB7hj3R4zZbOOCVVSPbW9/wfrrWFVGCypaZhKqkDF +MxRldAD5kd6vA0jFQFTcD4SQaCDFkpbcLuUCRarAX1T4bepJz11sS6/vmsJWXMY1 +VkJqMF/Cq/biPT+zyRGPMUzXn0kCAwEAAaNCMEAwHQYDVR0OBBYEFDVK9U2vP9eC +OKyrcWUXdYydVZPmMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0G +CSqGSIb3DQEBBQUAA4IBAQCoh+ns+EBnXcPBZsdAS5f8hxOQWsTvoMpfi7ent/HW +tWS3irO4G8za+6xmiEHO6Pzk2x6Ipu0nUBsCMCRGef4Eh3CXQHPRwMFXGZpppSeZ +q51ihPZRwSzJIxXYKLerJRO1RuGGAv8mjMSIkh1W/hln8lXkgKNrnKt34VFxDSDb +EJrbvXZ5B3eZKK2aXtqxT0QsNY6llsf9g/BYxnnWmHyojf6GPgcWkuF75x3sM3Z+ +Qi5KhfmRiWiEA4Glm5q+4zfFVKtWOxgtQaQM+ELbmaDgcm+7XeEWT1MKZPlO9L9O +VL14bIjqv5wTJMJwaaJ/D8g8rQjJsJhAoyrniIPtd490MCowCgYIKwYBBQUHAwMM +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4= +-----END TRUSTED CERTIFICATE----- + +# SI-TRUST Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIEijCCAvKgAwIBAgINAJCud3YAAAAAVx3QbzANBgkqhkiG9w0BAQsFADBcMQsw +CQYDVQQGEwJTSTEcMBoGA1UEChMTUmVwdWJsaWthIFNsb3ZlbmlqYTEXMBUGA1UE +YRMOVkFUU0ktMTc2NTk5NTcxFjAUBgNVBAMTDVNJLVRSVVNUIFJvb3QwHhcNMTYw +NDI1MDczODE3WhcNMzcxMjI1MDgwODE3WjBcMQswCQYDVQQGEwJTSTEcMBoGA1UE +ChMTUmVwdWJsaWthIFNsb3ZlbmlqYTEXMBUGA1UEYRMOVkFUU0ktMTc2NTk5NTcx +FjAUBgNVBAMTDVNJLVRSVVNUIFJvb3QwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAw +ggGKAoIBgQDTy5wtwuAwQ2UxJP9LsDjZqVPXNdHbt0uTtHKN8cuV0lMrdJsymqQv +PgIG3a9wFaGqzxGHimZ7y8wdcERcj6zK5sNbJ7SNo44Qv25UdAhwiiPoysd0xGaR +IN1L6KWEdaWYlYKLG+EgJAdGqwxlNkBni3XuqdmRKRvtby1FwtbiYAGx8045Kztv +P4W+CPZTK3uiyUWhRIGAZppgOhvEvgzMMBB/ETY4SuaboZZTnJTMEcYETKJVS/+A +4a+MHDX8uZM33/ldPdzrDSdsRMlZZitWb/8EG/f1acNdwxj+vafZZC+in2DZcmw9 +PHXyJSeYLjq4yd1Ndb2rsCJhWAE3KKYgnS5gXPuQvEZDuP5t2MBmIiRrNHgi5bni +WOlIOO5MvQF7bj5A6tHCCkKTZ8MmLz8HW8+v4x3oOuJl4YSRP/VmAP2qM0ZC7BY+ +0hNlLw4JU/bkKnUUnBkzFppF4dtXz8841Kf37VhD5A6YXMTgMT+UpG9LSqLVSo0m +qR1kJQg1DecCAwEAAaNLMEkwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwEwYDVR0jBAwwCoAITKPDaF4IAmMwEQYDVR0OBAoECEyjw2heCAJjMA0GCSqG +SIb3DQEBCwUAA4IBgQAmI4W7XUEZbpKDiu4BiwQ1GX+rj9zWM8H5eZZeI/Xwzt3q +22E7Wq/dWOlCiUDv+dlnEX9N8e3pEXuxQQ/tpNIWtu/B/Yv2ESss7/wHBkYMzwIL +7Tvejwm5M6smgFREQmXX56/NUA7KyIihEpwqlTs+VDxIc/Z8eNSb/5P3ReQphGP8 ++n4a51zgclewL3gdMMYT/YhfsWWI2l6XE4F7/h7Pe79XMMFwkkOmmfBVn5jFI0K9 +dBwxjhKl2UVqKlrIWM291t0+NQsZfwMczgcPh0WTFaFrvTQc4N711LjlkRxLBbUn +JrzP0QmYFsbh8VVLOntt3sZntsE3LZ+ojlnHt6bF798W4u3esrfzojakKDI6CpTL +P17+blntujayk9bGwxn+9Zl460dH5a1Ceuy8e8kuQU5NDwQOikszh9zxdnxaGIyc +ChLXorPChYeubTFQYjIhoGgWX5Q1dFUp0nGBCErh112qVAGzG3xZrr6sDMq4QGRn +W53qBgYR1tAwcx7jvCswGzAKBggrBgEFBQcDAwwNU0ktVFJVU1QgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# SITHS CA v3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDYTCCAkmgAwIBAgIQG9QO1DTR2hWmADAVAk2kbDANBgkqhkiG9w0BAQUFADA2 +MQswCQYDVQQGEwJTRTERMA8GA1UECgwIQ2FyZWxpbmsxFDASBgNVBAMMC1NJVEhT +IENBIHYzMB4XDTA1MTEyODEwMjc1MFoXDTE1MTEyODA2MDIzOFowNjELMAkGA1UE +BhMCU0UxETAPBgNVBAoMCENhcmVsaW5rMRQwEgYDVQQDDAtTSVRIUyBDQSB2MzCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMXZW9HUK39AZ+6hW13R2mq5 +GTHy8CZJAWX8QVTxlpHsKu4ERCQeQJznF1A/6hx87rg3OfzH06+bbl3fPr4F/OrK +2flFVuGVnLHQWo/+yCqm12ps4G1d7Fx2/uGZR5qpe6fq5m9UAidNUU4oPawGOoGC +phy9S6TtUhLciirrJ/TBIkoQhFp1tYAiVmXrzIDypeFkvnzeD70nB0wpW6qx77R7 +/4c06KOTQss9YLt308IvXhT4c2+kf6CcAdXVqbsMV4/MwDuReJ6SOXkyTER/xwt9 +3vrMftrM3g3UZrZipjO/bPnV3UdScJTLZeBFtw3Xr5VI10GjOyBQDTwUVZPM6g0C +AwEAAaNrMGkwEgYDVR0TAQH/BAgwBgEB/wIBADARBglghkgBhvhCAQEEBAMCAgQw +FAYDVR0gBA0wCzAJBgcqhXBKAQEDMAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUfC45 +IzJE6A9OZvINKP5AvsK24qAwDQYJKoZIhvcNAQEFBQADggEBAAhTWogpDfVU2Kux +g7knaVqqXytYSdS532/rxwbr/Yeav8oS33qeASIlY1KFb6cvDpd0YIzgSIBz3UKN +Ie0Pcn90Bm5QVjsth+yBWIs2x8oA+6QEti84WI538QbELSwnLRiCC4pfIpQUFWM4 +xqWxuuCsvj4mP5G7HIP8DsrJN7431/B784zYvJAL9AC/VLxqSljnylsMGVNCB5VX +NbhPllOaqJjdTn1VtJzjusA2ubfcApj49uUwvix3svPJ4gKj5vdEfNZqf9B4vjlz ++AvCH1IADk17xgruYssJ1Q8KMIeCk7zKEaQfCfr6N1DsO+I8JKCAKMz7pt3vN5qp +Md3f6lEwGTAKBggrBgEFBQcDAwwLU0lUSFMgQ0EgdjM= +-----END TRUSTED CERTIFICATE----- + +# SITHS Root CA v1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFkzCCA3ugAwIBAgIRAJBmYahiPWVEdwQ/cZrDlwwwDQYJKoZIhvcNAQEFBQAw +OzELMAkGA1UEBhMCU0UxETAPBgNVBAoMCEluZXJhIEFCMRkwFwYDVQQDDBBTSVRI +UyBSb290IENBIHYxMB4XDTEyMDMyOTA3NTQ0OVoXDTMyMDMyOTA3NTQ0OVowOzEL +MAkGA1UEBhMCU0UxETAPBgNVBAoMCEluZXJhIEFCMRkwFwYDVQQDDBBTSVRIUyBS +b290IENBIHYxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwO3mnqis +qP/YNbn8+/CVTz89RyPRksnJ+PDiH4atiD/gAM9PEZVhPaXWIBnRiNLCVglFIKEq +6iLD6rrMQmmeuIWfcMBsp75vo1zdQ4gHzcop32l6Hy2fVmobYiAhYcZQS2V1SUa/ +XNcpHsIehULhDjhNwzZxQkRROtFYzMm0qmxAx4PxxwmfSvNr8wcWNfSCjl6LhNxx +ebn7bldFt8VwOv9CAtE0v4VwbU+P5x8ZIffVNLzuWeYuIvNxgmIZnwVkfDsicRil +LcF4WJnRr96UQAYZdhNQhyPLR1eubMUT6pqFUsPKVyYf3hZtrXF+8thh/eY2TnEa +ndMgNa0SIVh1NouJFqQ3KM+ggzpAo8oR77TlkBvjZZJnmG8OKeVnGNeI+o22x3ql +oH+RHqu2+XSYdlJgL1o3majb0T7WhGpvUtO02hrHuLLRlBEfxYiJ6Vupo5Tmon1N +pzKJod4ma83Vo/IyG9o1E4kRSU2/RjG76S0T+A4Apf4D9VZGPI8TK+Dlxx4D34rq +RoVFhtntXgu4ZJP00FguKY1FV02JdZBlzGo7wZyAubSANQOO324qk76mvgoBRG9A +c6oqghyEdn9p3bG7kljoQFFyXPc+OUT6pZmgf42LsEFYd60ixaDAuv0xmTVq2ckg +Gl7zvbwIf91JLS+dkRANW6g/z7RXcztb4GcCAwEAAaOBkTCBjjAPBgNVHRMBAf8E +BTADAQH/MEwGA1UdIARFMEMwQQYJKoVwSggBAgEBMDQwMgYIKwYBBQUHAgEWJmh0 +dHA6Ly9jcHMuc2l0aHMuc2Uvc2l0aHNyb290Y2F2MS5odG1sMA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQUMvmdT2npmI2g1ox9+R3Oozy6dhUwDQYJKoZIhvcNAQEF +BQADggIBAB8/43hYyArKNCIJ2LIFi9FlnOHX130KwByYpSRSODPaZCIjgK7+PYC+ +T4/dg/YNTDNa1aM7UIpSWiYUc1GU5FKXY9u3Bqjvj63i7d6jvyDRRtsteOgsJ0Sc +POy3F/yJl/Ojol7CWVPgz+S1ATtjUyjTr2ZLNDmvYQ4+m+6zidaToDsBxLMjVBA8 +TdeqsNrZbMowRC3dsihiikFg8kATbLB8PkHgi6Y08eeuUYcDjpl/2Wii9pwNeYKy +n98kyGZg6LZIRCfIa1a3RIXOArfTinFcV1FXIYzqwlEPUD+AqwRNyVLd5KXyLh9t +dbqHHZAL7hiEgHO7i5WEimENTl1in+NmDPs2DifTSPgGiAalX+5+XN2tCh09HKpA +eZh5uFCMNo0LCjYL1T7nXYHdbNxtsW8NdJ4sL8IF8kQRsjP6gcVKbT5F1izia18u +5EOVURuZMQXfJRtz0XucxHNJ+2Jg2Wlj3dE+ZW1H+mRMA1hQ2aa+5Spo6z+LEPHm +uyIGKJqgpJhpbza01A0ODH3AKTG7LAMn4WenvdGLLraHxArgCQuCoeZPWJ372Phh +4cqXxLi3UDnMMU79LRwa9kfjbOwbBeh/FzUQhNoz5zTmtaTrxCIHSvabWNgPnED7 +sYtfov2Z6qJ7WWLRXq7RSnIYK0s2OXIHmlrwYzrPG/nP3UhzWXDkMB4wCgYIKwYB +BQUHAwMMEFNJVEhTIFJvb3QgQ0EgdjE= +-----END TRUSTED CERTIFICATE----- + +# SSC GDL CA Root A +-----BEGIN TRUSTED CERTIFICATE----- +MIIFrjCCA5agAwIBAgIQUJZucr0Q1oxPa8diP5xwODANBgkqhkiG9w0BAQsFADBx +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UEAxMR +U1NDIEdETCBDQSBSb290IEEwHhcNMTMwNjA0MTMwMDQ3WhcNMzMwNjA0MTMwMDQ3 +WjBxMQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlr +YXZpbW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UE +AxMRU1NDIEdETCBDQSBSb290IEEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCfXEr8HGu3GZfZATc+CukYhtMF6qLa3wmCV+5tK42aFj1VPonXyb7hAaOA +NaNG7OER7ag8leU6UoHKTpgIKg+E3LvppPl5tknCFZ6glegPSPdQ1/mmQ9QHCzBB +yTYSYrdseAsGPy6znuow/UFjT4QsN84Hpjlke3EVWysB8td9mA0YPtuFmuABUCEk +uBujY0PTgVtNDIFOOGvOYMXqB+In4uv2w1SayMmz0SsyNwK8bXuekHcjjZMTJjuH +V6NlTyZYFGpjJZrlYfocV/0NLGkPxgrwJjkXAqPWc4FCw0Ixg4vg+ktOWGExKJI8 +xskQCMkMW0SsY8LXYhnyce4gt0mDGZ5H2lbFHKykOWgXXxEabKqlko+9G8vF4AKA +VdNwU+WLKv5C6r07XONSAH14PybMEa400TIM+Hug0X0944q8vh4ekj84sl8yXjXE +fsKSDZ22y1nV6xJq3XIhURGwc+Uy6dbMDt2zOVoi7+T16QZphip8c68YInMsNiXc +ValSMbOKjhV9sk4Qe1CKAEy6h+JFU3d+TWUCa4yTtmt17e+Wt0iOqOC6uYKyUm0h +/5K60T6wXLGrGQ4Zc0Yr01JIZTTaBDXSeD7PYzWkU+ZL41CDvfObh7Ih2kihekvs +suLx1CUFlFMWTCtmJBDI4NecEqSUwgEjk6EApuBuuzni9XpoqQIDAQABo0IwQDAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUoBF+H+SU +ZFE7Ejl6bN1Jk/n9wFwwDQYJKoZIhvcNAQELBQADggIBAAzxS4zhTxYW0upikrat +1FKOCxlkSznwmDlzSlLqTs2OZEewMI88Dy3aImXzGVgyPH+DjwoM5VTmqb64rpdW +5rcNGXy9lyxqKqVWc4LeTpiLPRzE0Csru8UM+E7+La6/qWd/V7Nv7f+L01YM7zCM +wV6m6VmKPC7cR8/MlF6DrBR2+n68DKMOXBuI7CsbNWiIsfV7xfOzxRq8+++1Xt/w +OR51aO1EwksicD5ca5TJEKzw/cgvfiPigacbzgy6RTInUEU5rOD+ALQqdQcMZxu7 +ccCC45dWl9Dkd1m5/3xnXIRluwg2qEtOkcJp/h3smhMfdTMsKcbpsGiQI/8jX3/G +O6coELgfoojNZBYlT+OAt8BKgFfwkNs6sgIyINVryNgUQMnZOBlUOOvoZTtvXNVF +eq/b2diVnranlc0cCR0CHgHpBJVdhZc4Fb2ox5ne00RCXYaDQSR8UYmqQwknNOjx +CrWWS7TzoP7yAI1qO3S5Q7lmuc/q6zfO/5vpI/hs0yP96Ongbvj7DVJAiqyAayAQ +XdCo/ao9ORErL/9SkTqg3IrHdjYRWYW7MIqkSDCcYUOr1K927cC/F5R4NdtINwjU +jmoA6SLdyvDTEjg8mJ9gTG0/Qv3vjJq3HnF6GknUYMnrj/Tpxr9wVIjSx1c7Vs3X +btztDXR+5XVBkVeTNH2p9b2HMB8wCgYIKwYBBQUHAwMMEVNTQyBHREwgQ0EgUm9v +dCBB +-----END TRUSTED CERTIFICATE----- + +# SSC GDL CA Root B +-----BEGIN TRUSTED CERTIFICATE----- +MIIFrjCCA5agAwIBAgIQPoxPvOQpg4JNhFWO1TWAzzANBgkqhkiG9w0BAQsFADBx +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UEAxMR +U1NDIEdETCBDQSBSb290IEIwHhcNMTMwNjA0MTQyMDE1WhcNMzMwNjA0MTQyMTU1 +WjBxMQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlr +YXZpbW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UE +AxMRU1NDIEdETCBDQSBSb290IEIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCPlenS68FzJcc4Z/CDjlO8tsvOunPbTyf2IpA/Qr8h1t5igrRvBAVJCTt3 +AddLX1LS2RnHbXwMqToJYuQqGGmMoN3rrBO2DjkRgGlOY1/cPA362YxivmSFMjJZ +l1CTid/7/9TYZXHHRlWiG5lhH9xQAMgXeehQsAxe5v52pgFOCchwbPqQs17cPQfN +SaNOVl4ST2RBf34MFcOg3rOjKQZJRKFfbz+BoERN8HsKOCjtEu5jl8N7XYxPcd2V +OtouqAFGCvNs6LXxHwgA8UCSGyYAMXU5RkkmuaTUcXcRpE8zzAnb2dEhS5JErM54 +YoIX+/oStH3V8obt9H6WFOaNA1KvzRei1Ryl/oGmmu195NkOMmYQj9vZMzGBfilX +78yyoWDuilu5Zdt/G5osjycxiYoota+xVtQDIu4lT9iavdJsV7yDpkgfLFUHCTQr +uXksAqWgX3x2nyQyPC2S3+tIV4eh9v4j+jSrifVoG44fqm4OpdIh0u+50bFJVzVa +hNMe4gJtUhB/4oxNIdsyMhx9zJYiAy1qpwZCbW6Qh/ocXLBP0ANBE/oLU+bBEAJI +C3dj9KWcUXuYZtfFdjLlb10UYX0Mu22VQNqpJsf3qcvS/ifBK/axaIb+42JSmVCO +K95BIQcbh/VAHXCtz/3CQ6g1VhFCxcteZqHIqGj3/kxXYTZSgQIDAQABo0IwQDAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUcgNGh2H2 +HbPUlWO5UHduDauY/i8wDQYJKoZIhvcNAQELBQADggIBAAjbijKBdDNxFuwhhVNI +Cm8fcuPjBPgutz/zJJVPnO0T4YiCAvZm97exLYAnra64bf4jBxEIq3RhjCgS+fYQ +NPDPtnyjdS0S1JTfdO6xmKux7iJiS1kff/4aZa1N4qQRPxMhtNg1i3ZApl+9MxHf +mOMhXh2ju3g2AjvY/WSE2jfNWe38DNB0pGtxPDYSRJ5+bk8KIRxlH0sSbL+Octbd +PgBwmAFFK+yVkOPTaTjnK51+ZVlb4duFymP+q7/k0P3kUroa5v7GkLp7zvGkYsVH +viTHoHrlIeHGCOAMiYOPgGn97qDfekw600gqFr+uppW13Wgf+w61BYzRskR8YDBW +dhe1NU+o1QrrwrVuAu6cXw6jsQGo5VNvfoNBHxXY/+HCthrxRpxkoBrgSsq4prSJ +JO57lZli1OJAu86jmn0dcvMbgUF3AF7sPKIwBTzNfEg2E8gysGtvnzgoOGlce+bi +rYO7bRPRLrfRdm9dMF65UEVI1kiAk1HJFqkQXWfGy35nfQVP9CDvJCVe7WdDxvtu +efuy8sjJzkF8BeCti80KRS7iYp+XkfT5Y+zywmCK3Bv/Iaj/I4eMc42wOswfjzFy +Cv2Wod8aU9M2trB3Rt4D9sKALm+XI+ERzFGYP+5A//Q9m4h/jLvhWYa9CTQnXJ4K +kzI7VSqpXgsND6mmUQTimyoRMB8wCgYIKwYBBQUHAwMMEVNTQyBHREwgQ0EgUm9v +dCBC +-----END TRUSTED CERTIFICATE----- + +# SSC Root CA A +-----BEGIN TRUSTED CERTIFICATE----- +MIIGKjCCBBKgAwIBAgIQZgej0p0pVhgO4V5ZmLGEVTANBgkqhkiG9w0BAQUFADB0 +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFjAU +BgNVBAMTDVNTQyBSb290IENBIEEwHhcNMDYxMjI3MTIxODUyWhcNMjYxMjI4MTIw +NTA0WjB0MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRp +ZmlrYXZpbW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkxFjAUBgNVBAMTDVNTQyBSb290IENBIEEwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQC66k++hMAZJIohqUyZffcM1aVRkqhl44mjC2bnQvh50g+DI3u3 +psEk1jXW2OUBynCxFtZHbr4QbH7pUG529+Xkgw941aBz9Y3RmR+URCOWxu5yWvna +XTyRr2zol+iGXfeei/rErGZP5HI/O92eTjXSEx99u0RL9FOs1hTXQDm6wD/8hSDT +xADQ59hHmQR5h4ZAsqxeyXUgwwkUrwSOpqKtKleIZaHMKL42yR8lD8NrIoQ5d046 +A8Bq2z66tome5NcumrdDAT/52qyprOR3M4ftCzndx8GtDVmDMNE2BFi0ZE7m/wjo +QrGAq/iY//MphhYRJE4Joc8wf7xesApqoXFr9ZoSayVtdwKiRl75aS/7OxiVX45c +l5RgXh1xqEG0Xc9aemfj1Eo1HzfgdhYDO/RRnJgUKUmIDELQLW2pp0AmOnkAMDvA +u0SYrSTO0ZbciXiB9lpbQrx04YfTZchH5jayzMFvwMfcgCVSPDGQ3cnIUKh6u3bg +7xOUzgR+arZOd/mD0G/4OtAKQ8q6ELb/PB2UYJSEbfWlyX1MCn4vj2/93S17Sunv +NNu7fv8Mbzf6+cPMyS/R6Sw9KqxsJjvQCV7EgCeL3WHw55VRQ8QN5jHQeNbBxsJm +AdHjzMfTHhUFNtuUmuxSw5HHL7H0A/cHrNNLkatWPNCu/V9tLdMAEc+TvQIDAQAB +o4G3MIG0MA8GA1UdEwEB/wQFMAMBAf8wPQYDVR0gBDYwNDAyBgsrBgEEAYGvZQEC +ADAjMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNzYy5sdC9jcHMwMwYDVR0fBCww +KjAooCagJIYiaHR0cDovL2NybC5zc2MubHQvcm9vdC1hL2NhY3JsLmNybDAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMy/3qeQd2JqHXhpLgo4m3dRUwPwMA0GCSqG +SIb3DQEBBQUAA4ICAQA+r8ioxzNP8G6aQ+HysFdS4ZyeBl9C1vH9yotRP+HHZWlP +dBlQis8Yk0mNoBywOz2OSJPZ6AV+xAmxD1KKa5dv1448gADQQXOtPcNEB3Fqj2J+ +BdhTYHKxAekAYqoN2NhJwrR9DVuzlyk2mbmn0UuYa0S8shKOdmR1TA3Nwi6zWPx6 +T1WzWX9d4C8wM8+IG2npTYqQnpC5MTrzogW8/vndUI0OlBmdfo2qFX4PUpMl5IEO +li0cAxwwgxGWQqmYpJ1fyalcO0lowoRtmdr2/qLy3DdejXrlpVfKI0uTXZIqVYSz +lrMemJRJfGw83J4dtqvDrAnFnd4311TEnK0/sNZpAeUQhn25gYNunGZOlQWSkDGH +JrLakXS9hORxaOR2AOB2czRHhpVluluQom0FKXhg64b5Ek3oCFakzIyiVkrOgPQU +YSLlqx06QTuE14J4BS+sHSNoq3J5hc1G5nqngloo0BU9HduMmFDO+69YO9OproA7 +FgB2J9Vw6QmNNpQJf+PvYBBRysZVcGarUW/zUU8SVq7719kN4PqrEN5qgayFdy2s +emN7RuE32ldurWX8IQSZhQHPIzoyxe1am9WhggR3EUWOpER9wsvLpw/oErrybrqP +MzAb3Sn48EKjbkKlbvpWpalQg9EFZhaLLfvmktHmbAvVWiltK89519naT/BotjAb +MAoGCCsGAQUFBwMDDA1TU0MgUm9vdCBDQSBB +-----END TRUSTED CERTIFICATE----- + +# SSC Root CA B +-----BEGIN TRUSTED CERTIFICATE----- +MIIGKzCCBBOgAwIBAgIRAL6SgxjzVYp4o2dZHGkkCT8wDQYJKoZIhvcNAQEFBQAw +dDELMAkGA1UEBhMCTFQxKzApBgNVBAoTIlNrYWl0bWVuaW5pbyBzZXJ0aWZpa2F2 +aW1vIGNlbnRyYXMxIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9yaXR5MRYw +FAYDVQQDEw1TU0MgUm9vdCBDQSBCMB4XDTA2MTIyNzEyMjI1MFoXDTI2MTIyNTEy +MDgyNlowdDELMAkGA1UEBhMCTFQxKzApBgNVBAoTIlNrYWl0bWVuaW5pbyBzZXJ0 +aWZpa2F2aW1vIGNlbnRyYXMxIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRYwFAYDVQQDEw1TU0MgUm9vdCBDQSBCMIICIjANBgkqhkiG9w0BAQEFAAOC +Ag8AMIICCgKCAgEAwfNV9UdRTlUXZY2wskEooUrRn0v2c/8+0slNWT/kt8efBl3Y +PKOIhOBzXf0F6seO16QEauufvUP9FJJGuMW6qu1g7OzKkI0KcqlBm9SdvLBsohEf +ZMvnHdRFZw4Ja+V47PE/BFTzmpnHWdHSeaekGrB8Sfwch1ReeAbV3R3MhaBCeNXQ +sIrq6PGhnlbv08F9h6zn2mhPGdZv4JOtSVxzFMFGap33WEDZV1hObDf0ciME+NtK +sN7xQZYSQKEVi2e4XnhWy3/kvsBJaJG4RwiTgcG1GzEG04B70UWhzww9YfOS+PGw +FQ74LjBbAKNJ923+7ty/iM/wfVc+r8DRiut80m0xVfqEjXNq2nCAxPTCz5COMJrh +xjVyAQjmP+ZmAKPy+JIdvFLsj/bc9wrvvBCH+YQYjF4fA7j/NS8BauXwW2J847N/ +M6qU105RgbXoV3iPIpapDIlUPrbu2XNfZPRE4fFqGP9SlsQcv4mXpMOnyn4Ybhbc +E4y71bUlCYav9i9FlCowwRSUNfZdyiWVnLFYibi1YIXJxr4UGaM++VaFq8ps1pl5 +okoUb8M62OdmUQrpHP7MaeY0bPSB232iEfhMxIcFFj3rl3Q/buycubYnjCTfLbOv +3RNhdo//8kzgCBkwMiQyXDaAF+6Gyd8vUeJWroOS8LO92Ic6LJ7E3GmZ+csCAwEA +AaOBtzCBtDAPBgNVHRMBAf8EBTADAQH/MD0GA1UdIAQ2MDQwMgYLKwYBBAGBr2UB +AgAwIzAhBggrBgEFBQcCARYVaHR0cDovL3d3dy5zc2MubHQvY3BzMDMGA1UdHwQs +MCowKKAmoCSGImh0dHA6Ly9jcmwuc3NjLmx0L3Jvb3QtYi9jYWNybC5jcmwwDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBScA/Co0phyaK7y7eBP4oUOsiVOzzANBgkq +hkiG9w0BAQUFAAOCAgEArFy8L/yuASSmED6sqOGnJ5mNyojBHT2R9qJ+pfGYQf+q +YfgJvs0aJWF0tMOvQloJD5EBvkiV9Mp3XguDzoSdz0D9gCy942Y1Crix+mDa5dhU +tUuXuqIawyBpjbRGc1yqv717/xowNFhA+StgC3lE+feilgtrUnvwK0s70ouga5M9 +yVdjimvMUBOPd6hRvhpMLUxdDJBbjvPvUCBtgeZRSavE59ddCCtR/D1GEufRpXbF +UyQFyarTjljF84p0kjLt8C/dq63p0jWPdCPjmQDiizDkw0Ku8Lvp4ggbSnAtffjS +mieRQnB1egh+vi8cfzc9qIvcRnL16G82aPpujSCd1PUHcb+9J0K5cyjW7Em0BYVP +aEj2q5TfDqNGFGDCMSA76y5b3tWhLG3lUvqBX5eIyWO9AezjzWsKNcLJOOMO81gb +fdqQbbf1yFhWna4B35GdrVWCAwwRdASRhsd8k4zzJ/vFJFdui9kbmJ2IMfCvd7gN +tMzP9gpvEpvsCStTiexE4KFpi6h0hnQYUuDSv6ChZSG5CIN686T1+F43JUeZpl3X +Ilrbk2cX2xDjjNESkUeKlaVHoQP4Sy4hxZBisH8no9sVfzh/bH9OBcUDtC3fRV91 +LB3xX6a19hc5Qen4ZcIeWBHKfI7itbqSD2e3j+uZ1DH7cntamF+SlMcE6jD2uxow +GzAKBggrBgEFBQcDAwwNU1NDIFJvb3QgQ0EgQg== +-----END TRUSTED CERTIFICATE----- + +# SSC Root CA C +-----BEGIN TRUSTED CERTIFICATE----- +MIIGKjCCBBKgAwIBAgIQNLkSn6zHklVCXN5X/+PABTANBgkqhkiG9w0BAQUFADB0 +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFjAU +BgNVBAMTDVNTQyBSb290IENBIEMwHhcNMDYxMjI3MTIyNjMwWhcNMjYxMjIyMTIx +MTMwWjB0MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRp +ZmlrYXZpbW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkxFjAUBgNVBAMTDVNTQyBSb290IENBIEMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQChRSL6jMypbwSz9GgyFmkRT3nfQ71RYHAamN14eJaYYvdwS4Go +4B0EifSP627p8P+B2C59rxcg8SLv8D9FR0C0y7K4ID8+SmhQ/5oG15fFt4oWLnHS +R3NdGGUv7zkz6LZVryatAoDpY9chcAc+zL5ficD4zh0lbsP8f1Y5YdGOwiZ653gC +ClndVSOw+DWn4qvzqy/XtYsKKnJUK215vPLZ6UP5z/GOZhL3l1kq2deU3PiUs0Wj +rxYts4DKPc7opscKlHT8N5rpPww3FiBDyUdwu4yF/JiJKcuHGX4ZUxCJgHWuE/G/ +pF0wBSl8qPe2XgcwFYiuTRWgys3X/6ujBlcPp+OJaRzWGtHUJ9+Wxjhcr3f+FatE +QX3TmLuoIBivi23UWsLYlo1I9QcxfmH0YZtSgUCOSicEsgfTAhCU8/vdsXtwuLTI +gfUAB6aNiAVNxI+WztS2wMFmjCqsaErJRtwN5i6oeSh9d0NwFn4cGjqmeU8TQImx +MrsJRhENdLwn5djtLfpQKdwlypcQ56miYS46iaZEYb5PXpIJ7dwupu9Tu2El2Cel +FEYphSYA2Pn5BdV7FjFCQwUXkZxKYEAkbbVtenn7nJpjw5hp5XdiIypRiQ9ssv3D +ytj0GkOU0H0L4Vg+Gsh0hJv3rIKuUUWS0gZZ4bPB3qUfkyJ52M3EeWAjlQIDAQAB +o4G3MIG0MA8GA1UdEwEB/wQFMAMBAf8wPQYDVR0gBDYwNDAyBgsrBgEEAYGvZQEC +ADAjMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNzYy5sdC9jcHMwMwYDVR0fBCww +KjAooCagJIYiaHR0cDovL2NybC5zc2MubHQvcm9vdC1jL2NhY3JsLmNybDAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIgHc/bxvFIaWh09kWLtXaydC+W3MA0GCSqG +SIb3DQEBBQUAA4ICAQAfkHFQmNXZNNKWhBjCrEYCIBzLObG3rwWk11jzkVF9joEn +nOiSseccnzqLEFJzTMLHQh3Q694qyiJRfYx0ehr8vKTzc8hmI8QuQxBH4IppV+4v +8gBSsDCSqtbUFcVXy2B69A6N/h4JY3SP4P6+UNkBOVa6UEz240Wau1J23n6d+43C +VDE+x7E8Pt/jT/3dmyRpfO3ocbZCBscfxV/7IHXbwf3pbKIqkNSG/c0N/+AFilhh +PZ/EmS/t23zEDZiYVZx0ohde26oR5DcMJP8gZ9El25qJoGWIMZEEcV8glFgzNh0y +3m/XZwipoDv926RQJZYeqV+JF6WXmVGVadvE8Y/0bzArWfOsdYczfQbd4cFr1sTJ +XnBEemrHnHc7Fv7+db6fLNHAA+4ReXXsqVsceoW1KFAgqRod5nuMMxj/we3IdmUf +HfBMO6fb6s1W2JRXP+BIqX+MM0u99AxlFICC9DV32AQQcM4PbMFZy5mtge7ePUjQ +eogvQJPXnLp5hBiAdd/QWt9Rdz5YiWl1RzHkahZwVATsvVx5U2PS4l69TSXaEbYP +quksrvXRqY0CVsv8sCTqjLpw/zLQt8YEKmPVykaR1ZlyCQdeKAOrEhwls2w6WWW0 +dG0tLRlyb/3nmBGHHnMjvzXxm7bD2cw7UHxy6M9ewJjMLgP9Hy/KdFyxHNHsaTAb +MAoGCCsGAQUFBwMDDA1TU0MgUm9vdCBDQSBD +-----END TRUSTED CERTIFICATE----- + +# SSL.com Client ECC Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIICQDCCAcagAwIBAgIQdvhIHq7wPHAf4D8lVAGD1TAKBggqhkjOPQQDAzBRMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSgwJgYDVQQDDB9T +U0wuY29tIENsaWVudCBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzAzMloX +DTQ2MDgxOTE2MzAzMVowUTELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw +b3JhdGlvbjEoMCYGA1UEAwwfU1NMLmNvbSBDbGllbnQgRUNDIFJvb3QgQ0EgMjAy +MjB2MBAGByqGSM49AgEGBSuBBAAiA2IABC1Tfp+LPrM2ulDizOvcuiaK04wGP2cP +7/UX5dSumkYqQQEHaedncfHCAzbG8CtSjs8UkmikPnBREmmNeKKCyikUwOSUIrJE +kmBvyASkZ9Wi0PPQ1+qOPA+60kBHkDTufaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAf +BgNVHSMEGDAWgBS3/i1ixYFTzVIaL11goMNd+7IcHDAdBgNVHQ4EFgQUt/4tYsWB +U81SGi9dYKDDXfuyHBwwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUC +ME0HES0R+7kmwyHdcuEX/MHPFOpJznGHjtZT3BHNXVSKr9kt9IxR6rxmR+J/lYNg +ZQIxAIwhTE+75bBQ35BiSebMkdv4P11xkQiOT5LJf6Zc6hN+7W3E6MMqb1wR4aXz +alqaTTAtMAoGCCsGAQUFBwMEDB9TU0wuY29tIENsaWVudCBFQ0MgUm9vdCBDQSAy +MDIy +-----END TRUSTED CERTIFICATE----- + +# SSL.com Client RSA Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFjzCCA3egAwIBAgIQdq/uiJMVRbZQU5uAnKTfmjANBgkqhkiG9w0BAQsFADBR +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSgwJgYDVQQD +DB9TU0wuY29tIENsaWVudCBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzEw +N1oXDTQ2MDgxOTE2MzEwNlowUTELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBD +b3Jwb3JhdGlvbjEoMCYGA1UEAwwfU1NMLmNvbSBDbGllbnQgUlNBIFJvb3QgQ0Eg +MjAyMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALhY20Yw+8k/48jw +ATM04tpIqBjpIG6a1wHh1SmPMLQjauTLYrC+4p8gvT5UoDlox4Y3ZnQGBu90K9rc +n4SpUi+Q0u5+fPulIq1vcEZnlj0p1KO7VnsUBFnBIWNEHrIfElyQh2UNiPYeiCLi +Y1S78zb41n/c2v8pNanGbg5pWz/YvoKHFXBdsMdcEg9jpjjNz3O5ww6JJjcbP2Ic +MmnRm9n/VZAx3rFj3c/FdHf874ghU78AMRomLAAwpV9s4+T2AIrKmIecdAN6i2bs +fv2jjzUlXHils6T7PW2pivBsiIKL/UrQb+TXo7SONEk4vs5F5dIcyl7CNxSLzWZW +Mzed5WvsQ5JkoELadW/AFez5ab00uYp7+hb7Vf5SIOgEBFZWZfU3RJjIikbpt6y4 +6L5ijlQ2W/c7cL9d7i26X95CGYbwf4vrCMvYvuoOQkKgNnNXF+0y6tCN6Acbm5no +xJpiBA5I9zwSuvdYwZqM6cewIzZWNB3LbNq6B4Qd/dGsn+bCie/DuWwYs2mHV1+1 +DDhbpyEkKjunNJGetFTqKE/TwaOL5OYr1fKdv5thACLd1ktEHz9dVv7enHjMmVuq +5L2620NLrUwmTKNNNIpsdDYT22L8m7IFgf+uPwzN9hui9DnnyvVMXPtUdzWAWsAS +oRMBM2c9nYGhqfWFJFiIeOf042hVAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8w +HwYDVR0jBBgwFoAU8DhClDSpPAB/Uu45pfdLDbxqfSMwHQYDVR0OBBYEFPA4QpQ0 +qTwAf1LuOaX3Sw28an0jMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOC +AgEAmU/b8OrWEfoq/cirbeQOc2LSQp8V/nxwUj9kh4IxP0VALuEinwZmKfyW0y2N +tjjH2fMnwVkpoIz2cyQPKCLXTmHdE93bnzJSk/tPzOo4PJhqA6sWryHRQq59RSvq +xM+KWZ+CcHY6+GImyRCXWEAkpC25LymAJ+GJa3LKSQhxN1MF8YDO00IC0vzC0ZQG +7gfi9oPif5/nu1bDW7/dlZMJHiTBzybNraSuwrRp56q17TeU6d3RY4VrmnpKVnbc +GYUo1OTGpNi4lkF30LRZ8UYFh4cCH2m5ghjQQ9km2hpnqNZ1durybQ5C/4gmom6E +/n5iG/DGPe3AHGrHkda4ADdJm7mEBaHNbjHWROpTi7pTmB2hkIrphfgb8pNYw8jc +miZPPiDPT0PzEIx/EGF6NsqqC33Mn0dEWa6llcaZU+MHaz1JELAY/10OhUMUS+dr +00q1smBh3GlJAiNd6JJxw5yfRWd5HtwyhrqqVTxkbzK1EEAV3nJAeOBucLtu6wno +OdmsupJ13UPKugGVrRqBKzrw48UvDBhNEMauwO3+BVJ/GQXLqa81CAw4IuT+VuVT +Pr/k1rPZCMM91TMygSTFqeFlEbgyMzBxGEkdGkXGmhSKWDkobvPLUblJJmR4A8eR +EYOpuZA0tm+qBZ6FKFeZvn8nBkliTaH8CeErRglMFJtWj0UwLTAKBggrBgEFBQcD +BAwfU1NMLmNvbSBDbGllbnQgUlNBIFJvb3QgQ0EgMjAyMg== +-----END TRUSTED CERTIFICATE----- + +# SSL.com Code Signing ECC Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIICSzCCAdKgAwIBAgIQbo7kWxBMyQx+tNiIj+XsZDAKBggqhkjOPQQDAzBXMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMS4wLAYDVQQDDCVT +U0wuY29tIENvZGUgU2lnbmluZyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2 +MzEzNVoXDTQ2MDgxOTE2MzEzNFowVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NT +TCBDb3Jwb3JhdGlvbjEuMCwGA1UEAwwlU1NMLmNvbSBDb2RlIFNpZ25pbmcgRUND +IFJvb3QgQ0EgMjAyMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABHbIrNTWlZJ8FzLl +y2tB+Sm7seuidrU22GxLjeU+SlcmJsefO19GZidRwCxjHHTdrDnTbz0OlL6+KzCS +zqJCVg1Q1KQscfQnYduggT/VTVYWtcwcN8szNBFoxzx7DemUzaNjMGEwDwYDVR0T +AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRYXhbDLbPm6qNJs6W+1t6ueZVrjTAdBgNV +HQ4EFgQUWF4Wwy2z5uqjSbOlvtbernmVa40wDgYDVR0PAQH/BAQDAgGGMAoGCCqG +SM49BAMDA2cAMGQCMFOMczFOgFy3njsPCFgTvtlA9vG/ffeZoOvMgAANqnA27TYj +e0G4FBVWdtOW4xWFZAIwJOT2+L0Tbjq3P9y/zXjfJoBXEq9oZ0//8iuxoqGZtMOT +G456y3y/FI7r6rj+4QNfMDMwCgYIKwYBBQUHAwMMJVNTTC5jb20gQ29kZSBTaWdu +aW5nIEVDQyBSb290IENBIDIwMjI= +-----END TRUSTED CERTIFICATE----- + +# SSL.com Code Signing RSA Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFmzCCA4OgAwIBAgIQEJfEnIwlQyi7pui5m6tPoTANBgkqhkiG9w0BAQsFADBX +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMS4wLAYDVQQD +DCVTU0wuY29tIENvZGUgU2lnbmluZyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgy +NTE2MzIwOFoXDTQ2MDgxOTE2MzIwN1owVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoM +D1NTTCBDb3Jwb3JhdGlvbjEuMCwGA1UEAwwlU1NMLmNvbSBDb2RlIFNpZ25pbmcg +UlNBIFJvb3QgQ0EgMjAyMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +AIx1IMiM3E6RUQa1W+9Fu9n+YOtKk4fs/5ePYJOecWFA6u9Ly5JY2GsW3N4tiPLz +0wSWwCVnIeUd259SgfYAK2aQ8aweqE9hJN12LwPHNcg2rIFTYCLAUZKZ7+gmLplU +zQmPX1w88KvnO7OnqwbGMZe+TO30BoExgktQELWgEXncWMvA5R6zwW9IXK2XCrMe +rC5X2L2+OFBE4zP918G1v6JO+3i0OziYKOlWLVSAi2t+HeOVhqeeF1RGW17/n+Zr +NYpRpaZ7XAoiDcLXgy/aPD3yih79Hj6h2BxPbghSbk+sH8n+n5lNu1JUsZKDW0AT +7xS1M5E8gqSr9apIaum4+4BABvzlHn4/vAqrJuLFqwcE1014tevaa1NbU4qm8tde +USJNH8yqi7rADoLZFLrZ8i33JbjLqUPSTEQeFnXMteRwHymBVTSyPv7/0XgaQJIn +KmgltdKe77z4FEtvUiMWaxCJ1N+63MwYWXGp5svYkHG9IPSkaiZJlZ1GGEUWiR8V +XahDsGCXntc22jqyb0tyTpl21zA396adu9tdpu58GOxC+RXoDrjbbEJrEF1EDNbU +zoKM7yswi3HhCPJBkWPj/uDAqKWNmQBBYs5CRqGdyuWanFHbYHpEVQ4qKnCkmf8q +fmC0HZZXujv827/GMYCqOgAZL4gfSaTrd0D3TIPugpEvAgMBAAGjYzBhMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUx/bIC2LtFAyjF7aquR7R4INWoV0wHQYD +VR0OBBYEFMf2yAti7RQMoxe2qrke0eCDVqFdMA4GA1UdDwEB/wQEAwIBhjANBgkq +hkiG9w0BAQsFAAOCAgEAYlDeMj/rNjV4jYl3SA8Po10HqLr2Uj82Us61wHlM610r ++BKsQ9vne4wpKp9rOtN89RV3lzv9If3zyFzJPgWUr3ur6I3irw3AoBvfrwu6qrRF +VYHIYZlhuLCa6FnMCRPZp1YHhu7toOyNAWWamcwjosCRHV0G3Q2n+jzExFkixps6 +wB1pPSy2sR6Kvj2CD2sxcmBXkAtUit5VCh51SQBstkoz70bY1svE8XxsCZbpqeEY +/a//tM9nb38HpUiNBRCWOZB5Wpa34+Y3ODKxxjEBJHQCxMsLz7p2vlyKIMPpdGfr +bRKcOT3gitUrSyTjeYxInJGr14IhOL/Es8EH7pA9rfqivilbUjGqbLMcdfPmoNiM +A5aIuvjKUTNhCx3Va5wTGS4Wz88Nh0uXxAfZC6uYkeq6B4OYkkAKIM24a5r3gP47 +yeL5Q8go502XF8B38zDqJoQb1VO8MIVfae48tAnosZukOIK668BqjG0rKDB45DKr +txvhUiQAkedLGtuhiAxu6l0cR5mNcU293t5AmQSzQOHDi6rEkhiXe/zMg4A82iny +f87EaQCbYX1tltYVgoz1gyoc91N2ciXwKYDEMmRTD09U9FcN1gvc/nKItF9L2R4/ +A4YvORA2pzHFJgeVi0hx8assBurSHE6VjecX6q2xRkXTNv3LxGFvCSJEMiena2gw +MzAKBggrBgEFBQcDAwwlU1NMLmNvbSBDb2RlIFNpZ25pbmcgUlNBIFJvb3QgQ0Eg +MjAyMg== +-----END TRUSTED CERTIFICATE----- + +# SSL.com EV Root Certification Authority ECC +-----BEGIN TRUSTED CERTIFICATE----- +MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx +NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv +bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA +VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku +WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX +5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ +ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg +h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSjBDMBQGCCsG +AQUFBwMBBggrBgEFBQcDAwwrU1NMLmNvbSBFViBSb290IENlcnRpZmljYXRpb24g +QXV0aG9yaXR5IEVDQw== +-----END TRUSTED CERTIFICATE----- + +# SSL.com EV Root Certification Authority RSA +-----BEGIN TRUSTED CERTIFICATE----- +MIIF4zCCA8ugAwIBAgIIHWwR62/aOZ0wDQYJKoZIhvcNAQELBQAwfzELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTc1MDQ4WhcNNDEwMjEy +MTc1MDQ4WjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcM +B0hvdXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NM +LmNvbSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMY3fBNvzw/ZUM/m16poL1xR1L/NTKbV +NzFAEDRBev3LlI1if7iQzc5pljrE/9nXY+bQhCWAEb/R7TDohAbhoJe4VZAdrfOk +mhtOnBH39dnWj2AqPjf4deyAo1Wg9CdBwqo55FLfEPn1ZTk/jJ3MeyfPBhR3Tj1S +54SBMWwSMqyEWhdqxMFcgDHC2kd7dg9C6OciFNONxFuPi2VYKSyPDo5J1NTYClrT +JtMJjthDspRP0sAc3XRiEWm8VCLoOh7QVVZFj3BwjS/vwl29XlTdLnvpGIuKSdlP +jRDzpVfha6sYS46uLvHyuvVdQfc52KPCXd6fWrEvRJM+P/EiOZRAbSfGzA14DAu9 +KlYmrSlXuHHkf+sTssh99Wtd8/IAMDP6W8sSanpBb28JTLdpDQ95IyMaZo1ZNmOW +gHsYImseIhgt5KV1ChBZ+6N+JhBTxsgZLh4nGPswBT2RBHqucMbMD6A00yQWGAEF +Z2nlRdFWqJu/r/qsVQgMAn5Ld6w3wdjtmTSgQbM1OusxNMk738Q9KUU1VLh/ls8I +D+mxnlXKZ4SgJ2Cr+lAxOdV7yraa7ZGMeB757uDiWUHUH0KAefX0g1AIrfNHQV9Q +o5+J87QnKlS5GllrCZxRwChrW7go0m81ftWTA250JWXqFgWRAfEHY0+rhMVy2c1o +m00sfgQ48OpHAgMBAAGjYzBhMB0GA1UdDgQWBBTZWir/pc6doZF9/4ddq2o1EtnJ +TDAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNlaKv+lzp2hkX3/h12rajUS +2clMMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAvIzPI/q9M1eW +H9CC8BKuNETq8bwh1/WJxjQeeKbiUd/deIDV6m3Gqm8JAoyn5svIiVqUekqzVu/d +3VMyY/Bp791AuZCiLgN3lrUpAFLu+w6nlGjFPAMt6Wuqne6n2GeS4hFaON+YZqOg +jssMQjZMxVZbn3XwQNHoOyoIm1LDHF+QNFf7xvkdcfwlfM96fR5pxrv0FP4dHeeX +ooab8t9XkgZSZJMpWQovoRfcu+6tO7MAZTjZqJyBrc01nIvp4vSEjw7PjXFtAIA5 +b7MENaA4YanyL/Q1jdjf3qRpMPqgJnxaInnwaP7LzbzvlYwn5YT5/YRCxrr9ucnG +WnEwdjYCH9B8qRMO4SDZUgysHoh3oCmGOohmU6/DpcnbVLGk6O5Mbj+5ezCjQugC +pr2EbSp8/fTtRbcw+mxcI1ZaPGEqx5vmxfJEtwe/dp1C5Fzw7rk+EPPPUtLNzlIY +f2D2LpVMNQBMRtYQ7DTLWHtqDeRjVcxY2U9jZzHCUqF5DyrPyU7MEsuNGlqqRjET +Ow3pV2haC4QENi+fEbw8eq1av0bjtyCJHdwHfNx66+l2yQANcLeflxpi7xjmZL4I +p6SZu3+MaJqYyYZi9qGYNjmj85ZXpAJj+VU+sIyfv6l6SzzZua4PivS6HCWrVVmh +VsIzuTrEQM+LGvcDDr0bYGN9JdSpvuUwOTAKBggrBgEFBQcDAwwrU1NMLmNvbSBF +ViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQQ== +-----END TRUSTED CERTIFICATE----- + +# SSL.com EV Root Certification Authority RSA R2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV +BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE +CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy +MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G +A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD +DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq +M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf +OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa +4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 +HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR +aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA +b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ +Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV +PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO +pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu +UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY +MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV +HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 +9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW +s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 +Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg +cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM +79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz +/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt +ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm +Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK +QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ +w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi +S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 +mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+zBGMBQGCCsGAQUFBwMBBggr +BgEFBQcDAwwuU1NMLmNvbSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IFJTQSBSMg== +-----END TRUSTED CERTIFICATE----- + +# SSL.com Root Certification Authority ECC +-----BEGIN TRUSTED CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5WplMEowHgYIKwYBBQUHAwQG +CCsGAQUFBwMBBggrBgEFBQcDAwwoU1NMLmNvbSBSb290IENlcnRpZmljYXRpb24g +QXV0aG9yaXR5IEVDQw== +-----END TRUSTED CERTIFICATE----- + +# SSL.com Root Certification Authority RSA +-----BEGIN TRUSTED CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7kwSjAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUF +BwMDDChTU0wuY29tIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNB +-----END TRUSTED CERTIFICATE----- + +# SSL.com TLS ECC Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIICOjCCAcCgAwIBAgIQFAP1q/s3ixdAW+JDsqXRxDAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQDDBxT +U0wuY29tIFRMUyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzM0OFoXDTQ2 +MDgxOTE2MzM0N1owTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jwb3Jh +dGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgRUNDIFJvb3QgQ0EgMjAyMjB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABEUpNXP6wrgjzhR9qLFNoFs27iosU8NgCTWyJGYm +acCzldZdkkAZDsalE3D07xJRKF3nzL35PIXBz5SQySvOkkJYWWf9lCcQZIxPBLFN +SeR7T5v15wj4A4j3p8OSSxlUgaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBSJjy+j6CugFFR781a4Jl9nOAuc0DAdBgNVHQ4EFgQUiY8vo+groBRUe/NW +uCZfZzgLnNAwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUCMFXjIlbp +15IkWE8elDIPDAI2wv2sdDJO4fscgIijzPvX6yv/N33w7deedWo1dlJF4AIxAMeN +b0Igj762TVntd00pxCAgRWSGOlDGxK0tk/UYfXLtqc/ErFc2KAhl3zx5Zn6g6jAq +MAoGCCsGAQUFBwMBDBxTU0wuY29tIFRMUyBFQ0MgUm9vdCBDQSAyMDIy +-----END TRUSTED CERTIFICATE----- + +# SSL.com TLS RSA Root CA 2022 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFiTCCA3GgAwIBAgIQb77arXO9CEDii02+1PdbkTANBgkqhkiG9w0BAQsFADBO +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQD +DBxTU0wuY29tIFRMUyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzQyMloX +DTQ2MDgxOTE2MzQyMVowTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw +b3JhdGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgUlNBIFJvb3QgQ0EgMjAyMjCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANCkCXJPQIgSYT41I57u9nTP +L3tYPc48DRAokC+X94xI2KDYJbFMsBFMF3NQ0CJKY7uB0ylu1bUJPiYYf7ISf5OY +t6/wNr/y7hienDtSxUcZXXTzZGbVXcdotL8bHAajvI9AI7YexoS9UcQbOcGV0ins +S657Lb85/bRi3pZ7QcacoOAGcvvwB5cJOYF0r/c0WRFXCsJbwST0MXMwgsadugL3 +PnxEX4MN8/HdIGkWCVDi1FW24IBydm5MR7d1VVm0U3TZlMZBrViKMWYPHqIbKUBO +L9975hYsLfy/7PO0+r4Y9ptJ1O4Fbtk085zx7AGL0SDGD6C1vBdOSHtRwvzpXGk3 +R2azaPgVKPC506QVzFpPulJwoxJF3ca6TvvC0PeoUidtbnm1jPx7jMEWTO6Af77w +dr5BUxIzrlo4QqvXDz5BjXYHMtWrifZOZ9mxQnUjbvPNQrL8VfVThxc7wDNY8VLS ++YCk8OjwO4s4zKTGkH8PnP2L0aPP2oOnaclQNtVcBdIKQXTbYxE3waWglksejBYS +d66UNHsef8JmAOSqg+qKkK3ONkRN0VHpvB/zagX9wHQfJRlAUW7qglFA35u5CCoG +AtUjHBPW6dvbxrB6y3snm/vg1UYk7RBLY0ulBY+6uB0rpvqR4pJSvezrZ5dtmi2f +gTIFZzL7SAg/2SW4BCUvAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j +BBgwFoAU+y437uOEeicuzRk1sTN8/9REQrkwHQYDVR0OBBYEFPsuN+7jhHonLs0Z +NbEzfP/UREK5MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAjYlt +hEUY8U+zoO9opMAdrDC8Z2awms22qyIZZtM7QbUQnRC6cm4pJCAcAZli05bg4vsM +QtfhWsSWTVTNj8pDU/0quOr4ZcoBwq1gaAafORpR2eCNJvkLTqVTJXojpBzOCBvf +R4iyrT7gJ4eLSYwfqUdYe5byiB0YrrPRpgqU+tvT5TgKa3kSM/tKWTcWQA673vWJ +DPFs0/dRa1419dvAJuoSc06pkZCmF8NsLzjUo3KUQyxi4U5cMj29TH0ZR6LDSeeW +P4+a0zvkEdiLA9z2tmBVGKaBUfPhqBVq6+AL8BQx1rmMRTqoENjwuSfr98t67wVy +lrXEj5ZzxOhWc5y8aVFjvO9nHEMaX3cZHxj4HCUp+UmZKbaSPaKDN7EgkaibMOlq +bLQjk2UEqxHzDh1TJElTHaE/nUiSEeJ9DU/1172iWD54nR4fK/4huxoTtrEoZP2w +AgDHbICivRZQIA9ygV/MlP+7mea6kMvq+cYMwq7FGc4zoWtcu358NFcXrfA/rs3q +r5nsLFR+jM4uElZI7xc7P0peYNLcdDa8pUNjyw9bowJWCZ4kLOGGgYz+qxcs+sji +Mho6/4UIyYOf8kpIEFR3N+2ivEC+5BB09+Rbu7nzifmPQdjH5FCQNYA+HLhNkNPU +98OwoX6EyneSMSy4kLGCenROmxMmtNVQZlR4rmAwKjAKBggrBgEFBQcDAQwcU1NM +LmNvbSBUTFMgUlNBIFJvb3QgQ0EgMjAyMg== +-----END TRUSTED CERTIFICATE----- + +# SZAFIR ROOT CA2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL +BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 +ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw +NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L +cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg +Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN +QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT +3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw +3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 +3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 +BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN +XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF +AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw +8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG +nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP +oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy +d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg +LvWpCz/UXeHPhJ/iGcJfitYgHuNztzAnMBQGCCsGAQUFBwMEBggrBgEFBQcDAQwP +U1pBRklSIFJPT1QgQ0Ey +-----END TRUSTED CERTIFICATE----- + +# Sectigo Public Email Protection Root E46 +-----BEGIN TRUSTED CERTIFICATE----- +MIICMTCCAbegAwIBAgIQbvXTp0GOoFlApzBr0kBlVjAKBggqhkjOPQQDAzBaMQsw +CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTEwLwYDVQQDEyhT +ZWN0aWdvIFB1YmxpYyBFbWFpbCBQcm90ZWN0aW9uIFJvb3QgRTQ2MB4XDTIxMDMy +MjAwMDAwMFoXDTQ2MDMyMTIzNTk1OVowWjELMAkGA1UEBhMCR0IxGDAWBgNVBAoT +D1NlY3RpZ28gTGltaXRlZDExMC8GA1UEAxMoU2VjdGlnbyBQdWJsaWMgRW1haWwg +UHJvdGVjdGlvbiBSb290IEU0NjB2MBAGByqGSM49AgEGBSuBBAAiA2IABLinUpT1 +PgWwG/YfsdN+ueQFZlSAzmylaH3kU1LbgvrEht9DePfIrRa8P3gyy2vTSdZE5bN+ +n3umxizy4rbTibCaPEvOiUvGxss6SWAPRrxtTnqcyZuFewq2sEfCiOPU0aNCMEAw +HQYDVR0OBBYEFC1OjKfCI7JXqQZrPmsrifPDXkfOMA4GA1UdDwEB/wQEAwIBhjAP +BgNVHRMBAf8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQCSnRpZY0VYjhsW5H16 +bDZIMB8rcueQMzT9JKLGBoxvOzJXWvj+xkkSU5rZELKZUXICMAUlKjMh/JPmIqLM +cFUoNVaiB8QhhCMaTEyZUJmSFMtK3Fb79dOPaiz1cTr4izsDnjA2MAoGCCsGAQUF +BwMEDChTZWN0aWdvIFB1YmxpYyBFbWFpbCBQcm90ZWN0aW9uIFJvb3QgRTQ2 +-----END TRUSTED CERTIFICATE----- + +# Sectigo Public Email Protection Root R46 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFgDCCA2igAwIBAgIQHUSeuQ2DkXSu3fLriLemozANBgkqhkiG9w0BAQwFADBa +MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTEwLwYDVQQD +EyhTZWN0aWdvIFB1YmxpYyBFbWFpbCBQcm90ZWN0aW9uIFJvb3QgUjQ2MB4XDTIx +MDMyMjAwMDAwMFoXDTQ2MDMyMTIzNTk1OVowWjELMAkGA1UEBhMCR0IxGDAWBgNV +BAoTD1NlY3RpZ28gTGltaXRlZDExMC8GA1UEAxMoU2VjdGlnbyBQdWJsaWMgRW1h +aWwgUHJvdGVjdGlvbiBSb290IFI0NjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC +AgoCggIBAJHlG/qqbTcrdccuXxSl2yyXtixGj2nZ7JYt8x1avtMdI+ZoCf9KEXMa +rmefdprS5+y42V8r+SZWUa92nan8F+8yCtAjPLosT0eD7J0FaEJeBuDV6CtoSJey ++vOkcTV9NJsXi39NDdvcTwVMlGK/NfovyKccZtlxX+XmWlXKq/S4dxlFUEVOSqvb +nmbBGbc3QshWpUAS+TPoOEU6xoSjAo4vJLDDQYUHSZzP3NHyJm/tMxwzZypFN9mF +ZSIasbUQUglrA8YfcD2RxH2QPe1m+JD/JeDtkqKLMSmtnBJmeGOdV+z7C96O3IvL +Oql39Lrl7DiMi+YTZqdpWMOCGhrN8Z/YU5JOSX2pRefxQyFatz5AzWOJz9m/x1AL +4bzniJatntQX2l3P4JH9phDUuQOBm2ms+4SogTXrG+tobHxgPsPfybSudB1Ird1u +EYbhKmo2Fq7IzrzbWPxAk0DYjlOXwqwiOOWIMbMuoe/s4EIN6v+TVkoGpJtMAmhk +j1ZQwYEF/cvbxdcV8mu1dsOj+TLOyrVKqRt9Gdx/x2p+ley2uI39lUqcoytti/Fw +5UcrAFzkuZ7U+NlYKdDL4ChibK6cYuLMvDaTQfXv/kZilbBXSnQsR1Ipnd2ioU9C +wpLOLVBSXowKoffYncX4/TaHTlf9aKFfmYMc8LXd6JLTZUBVypaFAgMBAAGjQjBA +MB0GA1UdDgQWBBSn15V360rDJ82TvjdMJoQhFH1dmDAOBgNVHQ8BAf8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQwFAAOCAgEANNLxFfOTAdRyi/Cr +CB8TPHO0sKvoeNlsupqvJuwQgOUNUzHd4/qMUSIkMze4GH46+ljoNOWM4KEfCUHS +Nz/Mywk1Qojp/BHXz0KqpHC2ccFTvcV0r8QiJGPPYoJ9yctRwYiQbVtcvvuZqLq2 +hrDpZgvlG2uv6iuGp9+oI0yWP09XQhgVg0Pxhia3KgPOC53opWgejG+9heMbUY/n +Fy8r0NZ4wi3dcojUZZ76mdR+55cKkgGapamEOgwqdD0zGMiH9+ik9YZCOf1rdSn8 +AAasoqUaVI7pUEkXZq9LBC2blIClVKuMVxdEnw/WaGRytEseAcfZm5TZg5mvEgUR +o5gi0vJXyiT5ujgVEki6Yzv8i5V41nIHVszN/J0c0MVkO2M0zwSZircweXq28sbV +2VR6hwt+TveE7BTziBYS8dWuChoJ7oat5av9rsMpeXTDAV8Rm991mcZK95uPbEns +IS+0AlmzLdBykLoLFHR4S8/BX1VyjlQrE876WAzTuyzZqZFh+PjxtnvevKnMkgTM +S2tfc4C2Ie1QT9d2h27O39K3vWKhfVhiaEVStj/eEtvtBGmedoiqAW3ahsdgG8NS +rDfsUHGAciohRQpTRzwZ643SWQTeJbDrHzVvYH3Xtca7CyeN4E1U5c8dJgFuOzXI +IBKJg/DS7Vg7NJ27MfUy/THzVhowNjAKBggrBgEFBQcDBAwoU2VjdGlnbyBQdWJs +aWMgRW1haWwgUHJvdGVjdGlvbiBSb290IFI0Ng== +-----END TRUSTED CERTIFICATE----- + +# Sectigo Public Server Authentication Root E46 +-----BEGIN TRUSTED CERTIFICATE----- +MIICOjCCAcGgAwIBAgIQQvLM2htpN0RfFf51KBC49DAKBggqhkjOPQQDAzBfMQsw +CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1T +ZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwHhcN +MjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEYMBYG +A1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1YmxpYyBT +ZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAR2+pmpbiDt+dd34wc7qNs9Xzjoq1WmVk/WSOrsfy2qw7LFeeyZYX8QeccC +WvkEN/U0NSt3zn8gj1KjAIns1aeibVvjS5KToID1AZTc8GgHHs3u/iVStSBDHBv+ +6xnOQ6OjQjBAMB0GA1UdDgQWBBTRItpMWfFLXyY4qp3W7usNw/upYTAOBgNVHQ8B +Af8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNnADBkAjAn7qRa +qCG76UeXlImldCBteU/IvZNeWBj7LRoAasm4PdCkT0RHlAFWovgzJQxC36oCMB3q +4S6ILuH5px0CMk7yn2xVdOOurvulGu7t0vzCAxHrRVxgED1cf5kDW21USAGKczA7 +MAoGCCsGAQUFBwMBDC1TZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRp +b24gUm9vdCBFNDY= +-----END TRUSTED CERTIFICATE----- + +# Sectigo Public Server Authentication Root R46 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFijCCA3KgAwIBAgIQdY39i658BwD6qSWn4cetFDANBgkqhkiG9w0BAQwFADBf +MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQD +Ey1TZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYw +HhcNMjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEY +MBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1Ymxp +YyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCTvtU2UnXYASOgHEdCSe5jtrch/cSV1UgrJnwUUxDa +ef0rty2k1Cz66jLdScK5vQ9IPXtamFSvnl0xdE8H/FAh3aTPaE8bEmNtJZlMKpnz +SDBh+oF8HqcIStw+KxwfGExxqjWMrfhu6DtK2eWUAtaJhBOqbchPM8xQljeSM9xf +iOefVNlI8JhD1mb9nxc4Q8UBUQvX4yMPFF1bFOdLvt30yNoDN9HWOaEhUTCDsG3X +ME6WW5HwcCSrv0WBZEMNvSE6Lzzpng3LILVCJ8zab5vuZDCQOc2TZYEhMbUjUDM3 +IuM47fgxMMxF/mL50V0yeUKH32rMVhlATc6qu/m1dkmU8Sf4kaWD5QazYw6A3OAS +VYCmO2a0OYctyPDQ0RTp5A1NDvZdV3LFOxxHVp3i1fuBYYzMTYCQNFu31xR13NgE +SJ/AwSiItOkcyqex8Va3e0lMWeUgFaiEAin6OJRpmkkGj80feRQXEgyDet4fsZfu ++Zd4KKTIRJLpfSYFplhym3kT2BFfrsU4YjRosoYwjviQYZ4ybPUHNs2iTG7sijbt +8uaZFURww3y8nDnAtOFr94MlI1fZEoDlSfB1D++N6xybVCi0ITz8fAr/73trdf+L +HaAZBav6+CuBQug4urv7qv094PPK306Xlynt8xhW6aWWrL3DkJiy4Pmi1KZHQ3xt +zwIDAQABo0IwQDAdBgNVHQ4EFgQUVnNYZJX5khqwEioEYnmhQBWIIUkwDgYDVR0P +AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAC9c +mTz8Bl6MlC5w6tIyMY208FHVvArzZJ8HXtXBc2hkeqK5Duj5XYUtqDdFqij0lgVQ +YKlJfp/imTYpE0RHap1VIDzYm/EDMrraQKFz6oOht0SmDpkBm+S8f74TlH7Kph52 +gDY9hAaLMyZlbcp+nv4fjFg4exqDsQ+8FxG75gbMY/qB8oFM2gsQa6H61SilzwZA +Fv97fRheORKkU55+MkIQpiGRqRxOF3yEvJ+M0ejf5lG5Nkc/kLnHvALcWxxPDkjB +JYOcCj+esQMzEhonrPcibCTRAUH4WAP+JWgiH5paPHxsnnVI84HxZmduTILA7rpX +DhjvLpr3Etiga+kFpaHpaPi8TD8SHkXoUsCjvxInebnMMTzD9joiFgOgyY9mpFui +TdaBJQbpdqQACj7LzTWb4OE4y2BThihCQRxEV+ioratF4yUQvNs+ZUH7G6aXD+u5 +dHn5HrwdVw1Hr8Mvn4dGp+smWg9WY7ViYG4A++MnESLn/pmPNPW56MORcr3Ywx65 +LvKRRFHQV80MNNVIIb/bE/FmJUNS0nAiNs2fxBx1IK1jcmMGDw4nztJqDby1ORrp +0XZ60Vzk50lJLVU3aPAaOpg+VBeHVOmmJ1CJeyAvP/+/oYtKR5j/K3tJPsMpRmAY +QqszKbrAKbkTidOIijlBO8n9pu0f9GBj39ItVQGLMDswCgYIKwYBBQUHAwEMLVNl +Y3RpZ28gUHVibGljIFNlcnZlciBBdXRoZW50aWNhdGlvbiBSb290IFI0Ng== +-----END TRUSTED CERTIFICATE----- + +# SecureSign RootCA11 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDEr +MCkGA1UEChMiSmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoG +A1UEAxMTU2VjdXJlU2lnbiBSb290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0 +MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RD +QTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvLTJsz +i1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8 +h9uuywGOwvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOV +MdrAG/LuYpmGYz+/3ZMqg6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9 +UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rPO7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni +8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitAbpSACW22s293bzUIUPsC +h8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZXt94wDgYD +VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AKChOBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xm +KbabfSVSSUOrTC4rbnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQ +X5Ucv+2rIrVls4W6ng+4reV6G4pQOh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWr +QbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01y8hSyn+B/tlr0/cR7SXf+Of5 +pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061lgeLKBObjBmN +QSdJQO7e5iNEOdyhIta6A/IwKzAUBggrBgEFBQcDAQYIKwYBBQUHAwMME1NlY3Vy +ZVNpZ24gUm9vdENBMTE= +-----END TRUSTED CERTIFICATE----- + +# SecureTrust CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz +MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv +cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz +Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO +0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao +wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj +7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS +8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT +BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg +JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 +6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ +3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm +D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS +CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR +3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jEwJjAU +BggrBgEFBQcDAQYIKwYBBQUHAwMMDlNlY3VyZVRydXN0IENB +-----END TRUSTED CERTIFICATE----- + +# Secure Global CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +MDIwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwQU2VjdXJlIEdsb2Jh +bCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Security Communication ECC RootCA1 +-----BEGIN TRUSTED CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9kwRDAe +BggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDCJTZWN1cml0eSBDb21tdW5p +Y2F0aW9uIEVDQyBSb290Q0Ex +-----END TRUSTED CERTIFICATE----- + +# Security Communication RootCA2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03MEAwHgYIKwYBBQUHAwQGCCsGAQUF +BwMBBggrBgEFBQcDAwweU2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0Ey +-----END TRUSTED CERTIFICATE----- + +# Security Communication RootCA3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZjBAMB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYB +BQUHAwMMHlNlY3VyaXR5IENvbW11bmljYXRpb24gUm9vdENBMw== +-----END TRUSTED CERTIFICATE----- + +# Sonera Class2 CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDIDCCAgigAwIBAgIBHTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJGSTEP +MA0GA1UEChMGU29uZXJhMRkwFwYDVQQDExBTb25lcmEgQ2xhc3MyIENBMB4XDTAx +MDQwNjA3Mjk0MFoXDTIxMDQwNjA3Mjk0MFowOTELMAkGA1UEBhMCRkkxDzANBgNV +BAoTBlNvbmVyYTEZMBcGA1UEAxMQU29uZXJhIENsYXNzMiBDQTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJAXSjWdyvANlsdE+hY3/Ei9vX+ALTU74W+o +Z6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybTdXnt +5oTjV+WtKcT0OijnpXuENmmz/V52vaMtmdOQTiMofRhj8VQ7Jp12W5dCsv+u8E7s +3TmVToMGf+dJQMjFAbJUWmYdPfz56TwKnoG4cPABi+QjVHzIrviQHgCWctRUz2Ej +vOr7nQKV0ba5cTppCD8PtOFCx4j1P5iop7oc4HFx71hXgVB6XGt0Rg6DA5jDjqhu +8nYybieDwnPz3BjotJPqdURrBGAgcVeHnfO+oJAjPYok4doh28MCAwEAAaMzMDEw +DwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQISqCqWITTXjwwCwYDVR0PBAQDAgEG +MA0GCSqGSIb3DQEBBQUAA4IBAQBazof5FnIVV0sd2ZvnoiYw7JNn39Yt0jSv9zil +zqsWuasvfDXLrNAPtEwr/IDva4yRXzZ299uzGxnq9LIR/WFxRL8oszodv7ND6J+/ +3DEIcbCdjdY0RzKQxmUk96BKfARzjzlvF4xytb1LyHr4e4PDKE6cCepnP7JnBBvD +FNr450kkkdAdavphOe9r5yF1BgfYErQhIHBCcYHaPJo2vqZbDWpsmh+Re/n570K6 +Tk6ezAyNlNzZRZxe7EJQY670XcSxEtzKO6gunRRaBXW37Ndj4ro1tgQIkejanZz2 +ZrUYrAqmVCY0M9IbwdR/GjqOC6oybtv8TyWf2TLHllpwrN9MMB4wCgYIKwYBBQUH +AwMMEFNvbmVyYSBDbGFzczIgQ0E= +-----END TRUSTED CERTIFICATE----- + +# Staat der Nederlanden Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDujCCAqKgAwIBAgIEAJiWijANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQGEwJO +TDEeMBwGA1UEChMVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSYwJAYDVQQDEx1TdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQTAeFw0wMjEyMTcwOTIzNDlaFw0xNTEy +MTYwOTE1MzhaMFUxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVk +ZXJsYW5kZW4xJjAkBgNVBAMTHVN0YWF0IGRlciBOZWRlcmxhbmRlbiBSb290IENB +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmNK1URF6gaYUmHFtvszn +ExvWJw56s2oYHLZhWtVhCb/ekBPHZ+7d89rFDBKeNVU+LCeIQGv33N0iYfXCxw71 +9tV2U02PjLwYdjeFnejKScfST5gTCaI+Ioicf9byEGW07l8Y1Rfj+MX94p2i71MO +hXeiD+EwR+4A5zN9RGcaC1Hoi6CeUJhoNFIfLm0B8mBF8jHrqTFoKbt6QZ7GGX+U +tFE5A3+y3qcym7RHjm+0Sq7lr7HcsBthvJly3uSJt3omXdozSVtSnA71iq3DuD3o +BmrC1SoLbHuEvVYFy4ZlkuxEK7COudxwC0barbxjiDn622r+I/q85Ej0ZytqERAh +SQIDAQABo4GRMIGOMAwGA1UdEwQFMAMBAf8wTwYDVR0gBEgwRjBEBgRVHSAAMDww +OgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cucGtpb3ZlcmhlaWQubmwvcG9saWNpZXMv +cm9vdC1wb2xpY3kwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSofeu8Y6R0E3QA +7Jbg0zTBLL9s+DANBgkqhkiG9w0BAQUFAAOCAQEABYSHVXQ2YcG70dTGFagTtJ+k +/rvuFbQvBgwp8qiSpGEN/KtcCFtREytNwiphyPgJWPwtArI5fZlmgb9uXJVFIGzm +eafR2Bwp/MIgJ1HI8XxdNGdphREwxgDS1/PTfLbwMVcoEoJz6TMvplW0C5GUR5z6 +u3pCMuiufi3IvKwUv9kP2Vv8wfl6leF9fpb8cbDCTMjfRTTJzg3ynGQI0DvDKcWy +7ZAEwbEpkcUwb8GpcjPM/l0WFywRaed+/sWDCN+83CI6LiBpIzlWYGeQiy52OfsR +iJf2fL1LuCAWZwWN4jvBcj+UlTfHXbme2JOhF4//DGYVwSR8MnwDHTuhWEUykzAr +MAoGCCsGAQUFBwMDDB1TdGFhdCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Staat der Nederlanden Root CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFyjCCA7KgAwIBAgIEAJiWjDANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJO +TDEeMBwGA1UECgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQSAtIEcyMB4XDTA4MDMyNjExMTgxN1oX +DTIwMDMyNTExMDMxMFowWjELMAkGA1UEBhMCTkwxHjAcBgNVBAoMFVN0YWF0IGRl +ciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5lZGVybGFuZGVuIFJv +b3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMVZ5291 +qj5LnLW4rJ4L5PnZyqtdj7U5EILXr1HgO+EASGrP2uEGQxGZqhQlEq0i6ABtQ8Sp +uOUfiUtnvWFI7/3S4GCI5bkYYCjDdyutsDeqN95kWSpGV+RLufg3fNU254DBtvPU +Z5uW6M7XxgpT0GtJlvOjCwV3SPcl5XCsMBQgJeN/dVrlSPhOewMHBPqCYYdu8DvE +pMfQ9XQ+pV0aCPKbJdL2rAQmPlU6Yiile7Iwr/g3wtG61jj99O9JMDeZJiFIhQGp +5Rbn3JBV3w/oOM2ZNyFPXfUib2rFEhZgF1XyZWampzCROME4HYYEhLoaJXhena/M +UGDWE4dS7WMfbWV9whUYdMrhfmQpjHLYFhN9C0lK8SgbIHRrxT3dsKpICT0ugpTN +GmXZK4iambwYfp/ufWZ8Pr2UuIHOzZgweMFvZ9C+X+Bo7d7iscksWXiSqt8rYGPy +5V6548r6f1CGPqI0GAwJaCgRHOThuVw+R7oyPxjMW4T182t0xHJ04eOLoEq9jWYv +6q012iDTiIJh8BIitrzQ1aTsr1SIJSQ8p22xcik/Plemf1WvbibG/ufMQFxRRIEK +eN5KzlW/HdXZt1bv8Hb/C3m1r737qWmRRpdogBQ2HbN/uymYNqUg+oJgYjOk7Na6 +B6duxc8UpufWkjTYgfX8HV2qXB72o007uPc5AgMBAAGjgZcwgZQwDwYDVR0TAQH/ +BAUwAwEB/zBSBgNVHSAESzBJMEcGBFUdIAAwPzA9BggrBgEFBQcCARYxaHR0cDov +L3d3dy5wa2lvdmVyaGVpZC5ubC9wb2xpY2llcy9yb290LXBvbGljeS1HMjAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJFoMocVHYnitfGsNig0jQt8YojrMA0GCSqG +SIb3DQEBCwUAA4ICAQCoQUpnKpKBglBu4dfYszk78wIVCVBR7y29JHuIhjv5tLyS +CZa59sCrI2AGeYwRTlHSeYAz+51IvuxBQ4EffkdAHOV6CMqqi3WtFMTC6GY8ggen +5ieCWxjmD27ZUD6KQhgpxrRW/FYQoAUXvQwjf/ST7ZwaUb7dRUG/kSS0H4zpX897 +IZmflZ85OkYcbPnNe5yQzSipx6lVu6xiNGI1E0sUOlWDuYaNkqbG9AclVMwWVxJK +gnjIFNkXgiYtXSAfea7+1HAWFpWD2DU5/1JddRwWxRNVz0fMdWVSSt7wsKfkCpYL ++63C4iWEst3kvX5ZbJvw8NjnyvLplzh+ib7M+zkXYT9y2zqR2GUBGR2tUKRXCnxL +vJxxcypFURmFzI79R6d0lR2o0a9OF7FpJsKqeFdbxU2n5Z4FF5TKsl+gSRiNNOkm +bEgeqmiSBeGCc1qb3AdbCG19ndeNIdn8FCCqwkXfP+cAslHkwvgFuXkajDTznlvk +N1trSt8sV4pAWja63XVECDdCcAz+3F4hoKOKwJCcaNpQ5kUQR3i2TtJlycM33+FC +Y7BXN0Ute4qcvwXqZVUz9zkQxSgqIXobisQk+T8VyJoVIPVVYpbtbZNQvOSqeK3Z +ywplh6ZmwcSBo3c6WB4L7oOLnR7SUqTMHW+wmG2UMbX4cQrcufx9MmDm66+KATAw +MAoGCCsGAQUFBwMDDCJTdGFhdCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# Staat der Nederlanden Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIEAJiiOTANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJO +TDEeMBwGA1UECgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQSAtIEczMB4XDTEzMTExNDExMjg0MloX +DTI4MTExMzIzMDAwMFowWjELMAkGA1UEBhMCTkwxHjAcBgNVBAoMFVN0YWF0IGRl +ciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5lZGVybGFuZGVuIFJv +b3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL4yolQP +cPssXFnrbMSkUeiFKrPMSjTysF/zDsccPVMeiAho2G89rcKezIJnByeHaHE6n3WW +IkYFsO2tx1ueKt6c/DrGlaf1F2cY5y9JCAxcz+bMNO14+1Cx3Gsy8KL+tjzk7FqX +xz8ecAgwoNzFs21v0IJyEavSgWhZghe3eJJg+szeP4TrjTgzkApyI/o1zCZxMdFy +KJLZWyNtZrVtB0LrpjPOktvA9mxjeM3KTj215VKb8b475lRgsGYeCasH/lSJEULR +9yS6YHgamPfJEf0WwTUaVHXvQ9Plrk7O53vDxk5hUUurmkVLoR9BvUhTFXFkC4az +5S6+zqQbwSmEorXLCCN2QyIkHxcE1G6cxvx/K2Ya7Irl1s9N9WMJtxU51nus6+N8 +6U78dULI7ViVDAZCopz35HCz33JvWjdAidiFpNfxC95DGdRKWCyMijmev4SH8RY7 +Ngzp07TKbBlBUgmhHbBqv4LvcFEhMtwFdozL92TkA1CvjJFnq8Xy7ljY3r735zHP +bMk7ccHViLVlvMDoFxcHErVc0qsgk7TmgoNwNsXNo42ti+yjwUOH5kPiNL6VizXt +BznaqB16nzaeErAMZRKQFWDZJkBE41ZgpRDUajz9QdwOWke275dhdU/Z/seyHdTt +XUmzqWrLZoQT1Vyg3N9udwbRcXXIV2+vD3dbAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRUrfrHkleuyjWcLhL75Lpd +INyUVzANBgkqhkiG9w0BAQsFAAOCAgEAMJmdBTLIXg47mAE6iqTnB/d6+Oea31BD +U5cqPco8R5gu4RV78ZLzYdqQJRZlwJ9UXQ4DO1t3ApyEtg2YXzTdO2PCwyiBwpwp +LiniyMMB8jPqKqrMCQj3ZWfGzd/TtiunvczRDnBfuCPRy5FOCvTIeuXZYzbB1N/8 +Ipf3YF3qKS9Ysr1YvY2WTxB1v0h7PVGHoTx0IsL8B3+A3MSs/mrBcDCw6Y5p4ixp +gZQJut3+TcCDjJRYwEYgr5wfAvg1VUkvRtTA8KCWAg8zxXHzniN9lLf9OtMJgwYh +/WA9rjLA0u6NpvDntIJ8CsxwyXmA+P5M9zWEGYox+wrZ13+b8KKaa8MFSu1BYBQw +0aoRQm7TIwIEC8Zl3d1Sd9qBa7Ko+gE4uZbqKmxnl4mUnrzhVNXkanjvSr0rmj1A +fsbAddJu+2gw7OyLnflJNZoaLNmzlTnVHpL3prllL+U9bTpITAjc5CgSKL59NVzq +4BZ+Extq1z7XnvwtdbLBFNUjA9tbbws+eC8N3jONFrdI54OagQ97wUNNVQQXOEpR +1VmiiXTTn74eS9fGbbeIJG9gkaSChVtWQbzQRKtqE77RLFi3EjNYsjdj3BP1lB0/ +QFH1T/U67cjF68IeHRaVesd+QnGTbksVtzDfqu1XhUisHWrdOWnk4Xl4vs4Fv6EM +94B7IWcnMFkwMDAKBggrBgEFBQcDBAwiU3RhYXQgZGVyIE5lZGVybGFuZGVuIFJv +b3QgQ0EgLSBHMw== +-----END TRUSTED CERTIFICATE----- + +# Starfield Class 2 CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5QwNjAeBggrBgEFBQcD +BAYIKwYBBQUHAwEGCCsGAQUFBwMDDBRTdGFyZmllbGQgQ2xhc3MgMiBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Starfield Root Certificate Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs +ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw +MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 +b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj +aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp +Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg +nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 +HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N +Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN +dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 +HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G +CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU +sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 +4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg +8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K +pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 +mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0MEEwFAYIKwYBBQUHAwEG +CCsGAQUFBwMDDClTdGFyZmllbGQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkg +LSBHMg== +-----END TRUSTED CERTIFICATE----- + +# Starfield Services Root Certificate Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIEfjCCA2agAwIBAgIBADANBgkqhkiG9w0BAQUFADCBzzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOjA4BgNVBAsTMWh0dHA6Ly9j +ZXJ0aWZpY2F0ZXMuc3RhcmZpZWxkdGVjaC5jb20vcmVwb3NpdG9yeS8xNjA0BgNV +BAMTLVN0YXJmaWVsZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 +eTAeFw0wODA2MDIwMDAwMDBaFw0yOTEyMzEyMzU5NTlaMIHPMQswCQYDVQQGEwJV +UzEQMA4GA1UECBMHQXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjE6MDgGA1UECxMxaHR0cDov +L2NlcnRpZmljYXRlcy5zdGFyZmllbGR0ZWNoLmNvbS9yZXBvc2l0b3J5LzE2MDQG +A1UEAxMtU3RhcmZpZWxkIFNlcnZpY2VzIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y +aXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8sxWKk3mFjdal+pt +NTjREJvbuNypBAmVMy4JxQB7GnhCj8j0BY7+0miDHk6ZzRfbRz5Q84nS59yY+wX4 +qtZj9FRNwXEDsB8bdrMaNDBz8SgyYIP9tJzXttIiN3wZqjveExBpblwG02+j8mZa +dkJIr4DRVFk91LnU2+25qzmZ9O5iq+F4cnvYOI1AtszcEgBwQ4Vp2Bjjyldyn7Tf +P/wiqEJS9XdbmfBWLSZwFjYSwieeV6Z80CPxedyjk1goOD2frTZD7jf7+PlDrchW +8pQSXkLrc7gTDcum1Ya5qihqVAOhPw8p6wkA6D9eon8XPaEr+L7QdR2khOOrF2UG +UgCvsQIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQUtMZ/GkPMm3VdL8RL8ouYEOnxURAwHwYDVR0jBBgwFoAUtMZ/GkPM +m3VdL8RL8ouYEOnxURAwDQYJKoZIhvcNAQEFBQADggEBAKyAu8QlBQtYpOR+KX6v +vDvsLcBELvmR4NI7MieQLfaACVzCq2Uk2jgQRsRJ0v2aqyhId4jG6W/RR5HVNU8U +CahbQAcdfHFWy4lC1L9hwCL3Lt+r83JDi0DolOuwJtrRE9Or0DYtLjqVs3cuFTkY +DGm6qoDt8VNOM5toBOKgMC7X0V3UpmadhObnuzyJuzad/BepPVUrivubxEyE/9/S +vmkbdLCo9uqwnLIpdIFMaDqaf3MlOfUT4GaRadRXS7furUXgLMOI076USYkf/3DV +W205E7Ady5jmZ2MNY/b7w9dhcoOIP3B+U8meiVTWT399cbmu8WCLd2Ds+L/6aqOc +ASIwOzAKBggrBgEFBQcDAwwtU3RhcmZpZWxkIFNlcnZpY2VzIFJvb3QgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# Starfield Services Root Certificate Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs +ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 +MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy +ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy +dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p +OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 +8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K +Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe +hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk +6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q +AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI +bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB +ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z +qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd +iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn +0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN +sSi6MEowFAYIKwYBBQUHAwEGCCsGAQUFBwMDDDJTdGFyZmllbGQgU2VydmljZXMg +Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMg== +-----END TRUSTED CERTIFICATE----- + +# StartCom Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIHyTCCBbGgAwIBAgIBATANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJJTDEW +MBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwg +Q2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0NjM2WhcNMzYwOTE3MTk0NjM2WjB9 +MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMi +U2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3Rh +cnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZk +pMyONvg45iPwbm2xPN1yo4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rf +OQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/C +Ji/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/deMotHweXMAEtcnn6RtYT +Kqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt2PZE4XNi +HzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMM +Av+Z6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w ++2OqqGwaVLRcJXrJosmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+ +Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3 +Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVcUjyJthkqcwEKDwOzEmDyei+B +26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT37uMdBNSSwID +AQABo4ICUjCCAk4wDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAa4wHQYDVR0OBBYE +FE4L7xqkQFulF2mHMMo0aEPQQa7yMGQGA1UdHwRdMFswLKAqoCiGJmh0dHA6Ly9j +ZXJ0LnN0YXJ0Y29tLm9yZy9zZnNjYS1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3Js +LnN0YXJ0Y29tLm9yZy9zZnNjYS1jcmwuY3JsMIIBXQYDVR0gBIIBVDCCAVAwggFM +BgsrBgEEAYG1NwEBATCCATswLwYIKwYBBQUHAgEWI2h0dHA6Ly9jZXJ0LnN0YXJ0 +Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRwOi8vY2VydC5zdGFy +dGNvbS5vcmcvaW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYgU3Rh +cnQgQ29tbWVyY2lhbCAoU3RhcnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlh +YmlsaXR5LCByZWFkIHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2Yg +dGhlIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFp +bGFibGUgYXQgaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3BvbGljeS5wZGYwEQYJ +YIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilTdGFydENvbSBGcmVlIFNT +TCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQUFAAOCAgEAFmyZ +9GYMNPXQhV59CuzaEE44HF7fpiUFS5Eyweg78T3dRAlbB0mKKctmArexmvclmAk8 +jhvh3TaHK0u7aNM5Zj2gJsfyOZEdUauCe37Vzlrk4gNXcGmXCPleWKYK34wGmkUW +FjgKXlf2Ysd6AgXmvB618p70qSmD+LIU424oh0TDkBreOKk8rENNZEXO3SipXPJz +ewT4F+irsfMuXGRuczE6Eri8sxHkfY+BUZo7jYn0TZNmezwD7dOaHZrzZVD1oNB1 +ny+v8OqCQ5j4aZyJecRDjkZy42Q2Eq/3JR44iZB3fsNrarnDy0RLrHiQi+fHLB5L +EUTINFInzQpdn4XBidUaePKVEFMy3YCEZnXZtWgo+2EuvoSoOMCZEoalHmdkrQYu +L6lwhceWD3yJZfWOQ1QOq92lgDmUYMA0yZZwLKMS9R9Ie70cfmu3nZD0Ijuu+Pwq +yvqCUqDvr0tVk+vBtfAii6w0TiYiBKGHLHVKt+V9E9e4DGTANtLJL4YSjCMJwRuC +O3NJo2pXh5Tl1njFmUNj403gdy3hZZlyaQQaRwnmDwFWJPsfvw55qVguucQJAX6V +um0ABj6y6koQOdjQK/W/7HW/lwLFCRsI3FU34oH7N4RDYiDK51ZLZer+bMEkkySh +NOsF/5oirpt9P/FlUQqmMGqz9IgcgA38corog14wLjAKBggrBgEFBQcDAwwgU3Rh +cnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk= +-----END TRUSTED CERTIFICATE----- + +# StartCom Certification Authority G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFYzCCA0ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADBTMQswCQYDVQQGEwJJTDEW +MBQGA1UEChMNU3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkgRzIwHhcNMTAwMTAxMDEwMDAxWhcNMzkxMjMxMjM1 +OTAxWjBTMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjEsMCoG +A1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgRzIwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2iTZbB7cgNr2Cu+EWIAOVeq8Oo1XJ +JZlKxdBWQYeQTSFgpBSHO839sj60ZwNq7eEPS8CRhXBF4EKe3ikj1AENoBB5uNsD +vfOpL9HG4A/LnooUCri99lZi8cVytjIl2bLzvWXFDSxu1ZJvGIsAQRSCb0AgJnoo +D/Uefyf3lLE3PbfHkffiAez9lInhzG7TNtYKGXmu1zSCZf98Qru23QumNK9LYP5/ +Q0kGi4xDuFby2X8hQxfqp0iVAXV16iulQ5XqFYSdCI0mblWbq9zSOdIxHWDirMxW +RST1HFSr7obdljKF+ExP6JV2tgXdNiNnvP8V4so75qbsO+wmETRIjfaAKxojAuuK +HDp2KntWFhxyKrOq42ClAJ8Em+JvHhRYW6Vsi1g8w7pOOlz34ZYrPu8HvKTlXcxN +nw3h3Kq74W4a7I/htkxNeXJdFzULHdfBR9qWJODQcqhaX2YtENwvKhOuJv4KHBnM +0D4LnMgJLvlblnpHnOl68wVQdJVznjAJ85eCXuaPOQgeWeU1FEIT/wCc976qUM/i +UUjXuG+v+E5+M5iSFGI6dWPPe/regjupuznixL0sAA7IF6wT700ljtizkC+p2il9 +Ha90OrInwMEePnWjFqmveiJdnxMaz6eg6+OGCtP95paV1yPIN93EfKo2rJgaErHg +TuixO/XWb/Ew1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQUS8W0QGutHLOlHGVuRjaJhwUMDrYwDQYJKoZIhvcNAQEL +BQADggIBAHNXPyzVlTJ+N9uWkusZXn5T50HsEbZH77Xe7XRcxfGOSeD8bpkTzZ+K +2s06Ctg6Wgk/XzTQLwPSZh0avZyQN8gMjgdalEVGKua+etqhqaRpEpKwfTbURIfX +UfEpY9Z1zRbkJ4kd+MIySP3bmdCPX1R0zKxnNBFi2QwKN4fRoxdIjtIXHfbX/dtl +6/2o1PXWT6RbdejF0mCy2wl+JYt7ulKSnj7oxXehPOBKc2thz4bcQ///If4jXSRK +9dNtD2IEBVeC2m6kMyV5Sy5UGYvMLD0w6dEG/+gyRr61M3Z3qAFdlsHB1b6uJcDJ +HgoJIIihDsnzb02CVAAgp9KP5DlUFy6NHrgbuxu9mk47EDTcnIhT76IxW1hPkWLI +wpqazRVdOKnWvvgTtZ8SafJQYqz7Fzf07rh1Z2AQ+4NQ+US1dZxAF7L+/XldblhY +XzD8AK6vM8EOTmy6p6ahfzLbOOCxchcKK5HsamMm7YnUeMx0HgX4a/6ManY5Ka5l +IxKVCCIcl85bBu4M4ru8H0ST9tg4RQUh7eStqxK2A6RCLi3ECToDZ2mEmuFZkIoo +hdVddLHRDiBYmxOlsGOm7XtH/UVVMKTumtTm4ofvmMkyghEpIrwACjFeLQ/Ajulr +so8uBtjRkcfGEvRM/TAXw8HaOFvjqermobp573PYtlNXLfbQ4ddIMDEwCgYIKwYB +BQUHAwMMI1N0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEcy +-----END TRUSTED CERTIFICATE----- + +# Swedish Government Root Authority v2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIQVBIVn6uKdZNElMp3QFYu7zANBgkqhkiG9w0BAQsFADBm +MQswCQYDVQQGEwJTRTEoMCYGA1UEChMfU3dlZGlzaCBTb2NpYWwgSW5zdXJhbmNl +IEFnZW5jeTEtMCsGA1UEAxMkU3dlZGlzaCBHb3Zlcm5tZW50IFJvb3QgQXV0aG9y +aXR5IHYyMB4XDTE1MDUwNTExMTUyM1oXDTQwMDUwNTExMjQxOVowZjELMAkGA1UE +BhMCU0UxKDAmBgNVBAoTH1N3ZWRpc2ggU29jaWFsIEluc3VyYW5jZSBBZ2VuY3kx +LTArBgNVBAMTJFN3ZWRpc2ggR292ZXJubWVudCBSb290IEF1dGhvcml0eSB2MjCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMiutUO8QkVLNWM/AkvF/9s2 +1yfFwq5FZqNxhxZNiU9hlOBWRrjQRBPmc5DwYXhBiuAafjesAim+6P8CJsYafAqx +j2QpotoHitUkhWgZkjLfnylgWG0qhYARNsm2wtOehAy6URHMVOmrBjASjyB3BcDG +jZqbWci2hehwBwKxHv/Xac8WRothL0LNUqbYDnovhy3GLzwiQ7GTfsMWdtnM14vs +ERvQyXEUwolJfvGkEKo1PKgbu//sMkDlvSrzpgETyIyXGZDOY/mwa333+YrObuCF +59uU1XogJaA18Kn3r1ooWgzI83Q5izE7IsxJJclvuFx6LiyW4y+jPsp5d2mRWvjw +xVM3TlNtSSdWYsrl+XNgqRc7W6Ilry17ybfbzxkROjNxOVlaA+nnLAz/bZxyY2OA +BVhThtwodRbC5fATWaGB/wUMmai2PGwuxQ4AmIHpg3dmQztajoVFTLLPuT3knDaT +QHpTFSnUEZC6oWCKnav0Skpq3Yeqwe0F2p5bVuGITyprlSiGZlCh79pKspAKNjdJ +hZdCeAdn5psgoQxsyc/P/neVhFp6Oxew70z3LZGqzxlvxvkSKOceCqaWzSGwA2JQ +gwYg5uje30MWFrmBoPCBNFvLwYn28+giuM64Uj5RHrEFuLcDKwusdHVTJOF2uE8l +dl3v0Zrzbkq4fEv4isAZAgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgEGMBIGA1Ud +EwEB/wQIMAYBAf8CAQEwHQYDVR0OBBYEFGNrQmBTVxG7yCSJJQJmRHShDSVuMBAG +CSsGAQQBgjcVAQQDAgEAMBEGA1UdIAQKMAgwBgYEVR0gADBHBgNVHSUEQDA+Bggr +BgEFBQcDAQYIKwYBBQUHAwIGCCsGAQUFBwMEBgorBgEEAYI3CgMMBggrBgEFBQcD +AwYIKwYBBQUHAwgwDQYJKoZIhvcNAQELBQADggIBACMuqoWXS6RcEK/a+D29k1gv +ePsZdwM5FkdJclXMh+i9pH/SqySs59RQ7p3Yg8aZIPsWL4jGFzfKix6r0OJsB1i4 +ZJGhEKFpN3Ve/tpzFOaKa77CYCEvwPmjBEg2Wze+2mz96ZaOnvFTfI9lRKdVfQuU +TlT2/zK9L32cpV5CxEwp4xBkL+bPWjs0VShh0ScSu25Um4FYrNVenVcDoE3R/zd0 +po3z+ZX9Kol1enk3/SZ5Lydzf6kZIOXQX5jolgWPmHnpeRBBKQFD9Wk3zFAQaLXY +RE4O8pnjJyxqjl+7fbtrcUsGit0q2Ao/W8hyLlhhCg+BaB5Hx+ktuu+N3A6jI8Oy +LbVHsYu0PidI59wIYgxU/kPXlUq/By9KQH4GpVGHJokF3TzKT/4cJ+nbiB7Asv7j +7x9+sehZlaBPqwqJAOBzsuccwRdQgIdM0kMZWZXSWxRbClvAfIlxerUKwIpFL+7E +wP5ULeeVJHcFLu50xqCQsXPcQtagdclYWQWi3hG/WekNpybCbsBGisYe0/XqD309 +cs0ZlUy64GiXjVjAau9597JoarhyNsMkDOgy7b3xn8jv3nXS23aplCc49AFhv2Y4 +j2o93ABbs/xE3wNL+fF2JTX/Uh8IHdClFOmLBit4gyxxXE+Rh2PWDA4FiDyUoLFa +VBbf3VHDqDYuLIJ8uZqwMDIwCgYIKwYBBQUHAwMMJFN3ZWRpc2ggR292ZXJubWVu +dCBSb290IEF1dGhvcml0eSB2Mg== +-----END TRUSTED CERTIFICATE----- + +# Swedish Government Root Authority v3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFqjCCA5KgAwIBAgIQMmmiv0BrjbRHg2Q8iw3JQzANBgkqhkiG9w0BAQsFADBm +MQswCQYDVQQGEwJTRTEoMCYGA1UEChMfU3dlZGlzaCBTb2NpYWwgSW5zdXJhbmNl +IEFnZW5jeTEtMCsGA1UEAxMkU3dlZGlzaCBHb3Zlcm5tZW50IFJvb3QgQXV0aG9y +aXR5IHYzMB4XDTE1MDkyOTExMzIzMloXDTQwMDkyOTExNDIwOVowZjELMAkGA1UE +BhMCU0UxKDAmBgNVBAoTH1N3ZWRpc2ggU29jaWFsIEluc3VyYW5jZSBBZ2VuY3kx +LTArBgNVBAMTJFN3ZWRpc2ggR292ZXJubWVudCBSb290IEF1dGhvcml0eSB2MzCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALoeomkbaE9cj7r0I8deZgV4 +hTZYo6J/Z++iDBaSpEqL4KCSh1U3C8TRxNBAQ5cyUE/slUe3P69DBeWElwnvVlTn +QzNH/a3xOpuYpOHkUaO5rIwL7iUGCfLTujVnYYzCvSbL12PM14Mz2Uzi7/kbn6jL +DXYBLXLJIrtokd6QDzs9tEK9GX2fhFw8fkI3hrFgwkiHUk5cV/7Okq7KPla3s56V +mpT4L6HQoi7CVFpszMzWrUtH0C6HgjOoe1A5pyossVsnCp+t9RTr/I1TsnMrVCP0 +jJeZl/s13My1+jMUJo11pySm6BQuLaaAKIOaP7jKO8f1GOD97I55+6pCbEpLFn7z +ggNuuucRBqWfhCvSYG3pRu5BWpa5FP0cP4YS8VQmJv1ngC/lqC0oLkO3ZMLv5Ld+ +ltyEiyfZdj2YgVMU3EJFoVRn+doYZpAKtEeQPAHlK6Nm72/7MoPxM30yIWylRRU/ +L/NVkUiTnyXPLTw5O1INGq/H36tvgNiQy55xcmpCaZPqkgA9SQTZo1y6RfsCEP+t +aXRSpThjmmaIBLIRuhOqOdWDX+1lW1PInVyyhaB4cDVNXCQQpPYxKpJVQdnzF2yZ +E1j63SjQbBO9W4eNk4OtWClWFbRYJ0qbEWygpmdFOs7Q2M7/kDPsWjFND1IS+632 +YV/kL28NZjDloE/Pz/1fAgMBAAGjVDBSMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MB0GA1UdDgQWBBScvAHnq2Q19TGbjbX7F5mIAsub8jAQBgkrBgEE +AYI3FQEEAwIBADANBgkqhkiG9w0BAQsFAAOCAgEAh6tq5OdrJFI99iKDT1MERTKc +YVoWXJxEtaPRltBA/s9mFV5+QAAgFf2nqmTap2FmaMLdUnEloGq53cDNzoYI1Dw1 +ES999G/S2gyXA2WXg7Q+OssJdI3rBcp66YCwt1EtIpPjmhnu7ZcIIYOtxwqRX8TK +216vuOeMujpJ0lUDNRkZUErihqe7eD2V/bEfRvJPZvL7v4VktgojGJIJnklFMbbW +FFee/IlFdH85zMBqaMjPR9DhHsfTLy35LCQ7/Gq6lBPezHLyoh3LH5/Vg3cmXn6b +oK9pn3jbpcFucVxIQk4r2Hi41Q+lP2zLj5DNR9iQGUmF1mz84quqQr/LE5e/aUR1 +YzUt2qDH/WH3ykE9VJz0NsDkbiFIn11xYoHT8iXmWYxZQSZIp+PrZ2rT7DS3mPfM +yqM2BpXnyDBZ9//JodHkebzfEx8u2bN10QS3IwkhzB0hHCecDiv6wYcYyfr5SYOM +Ehb7xRLOOw9C+vAFZX6ox+tSSvmYXnGjrBLHKHEaWnXPh8ofNygcFJ2QUG/Gv0rM +xyXPMd1bkU52qBHVdmbZv4BzYrDsw/5EvM1ZEwsMLdihzKpiTVRFXqRSo4xXPBQx +k1TOpRZUXi1Cs+5lqbadP2zOYdlWy97qoFbebYYD+reBaozS2PPXtsCsKYRZIw6b +l2rmoM7VKlQY71CYeSAwMjAKBggrBgEFBQcDAwwkU3dlZGlzaCBHb3Zlcm5tZW50 +IFJvb3QgQXV0aG9yaXR5IHYz +-----END TRUSTED CERTIFICATE----- + +# SwissSign Gold CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJMDgwHgYIKwYBBQUHAwQGCCsG +AQUFBwMBBggrBgEFBQcDAwwWU3dpc3NTaWduIEdvbGQgQ0EgLSBHMg== +-----END TRUSTED CERTIFICATE----- + +# SwissSign Gold Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFejCCA2KgAwIBAgIJAN7E8kTzHab8MA0GCSqGSIb3DQEBCwUAMEoxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJDAiBgNVBAMTG1N3aXNzU2ln +biBHb2xkIFJvb3QgQ0EgLSBHMzAeFw0wOTA4MDQxMzMxNDdaFw0zNzA4MDQxMzMx +NDdaMEoxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJDAiBgNV +BAMTG1N3aXNzU2lnbiBHb2xkIFJvb3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAMPon8hlWp1nG8FFl7S0h0NbYWCAnvJ/XvlnRN1E+qu1 +q3f/KhlMzm/Ej0Gf4OLNcuDR1FJhQQkKvwpw++CDaWEpytsimlul5t0XlbBvhI46 +PmRaQfsbWPz9Kz6ypOasyYK8zvaV+Jd37Sb2WK6eJ+IPg+zFNljIe8/Vh6GphxoT +Z2EBbaZpnOKQ8StoZfPosHz8gj3erdgKAAlEeROc8P5udXvCvLNZAQt8xdUt8L// +bVfSSYHrtLNQrFv5CxUVjGn/ozkB7fzc3CeXjnuL1Wqm1uAdX80Bkeb1Ipi6LgkY +OG8TqIHS+yE35y20YueBkLDGeVm3Z3X+vo87+jbsr63ST3Q2AeVXqyMEzEpel89+ +xu+MzJUjaY3LOMcZ9taKABQeND1v2gwLw7qX/BFLUmE+vzNnUxC/eBsJwke6Hq9Y +9XWBf71W8etW19lpDAfpNzGwEhwy71bZvnorfL3TPbxqM006PFAQhyfHegpnU9t/ +gJvoniP6+Qg6i6GONFpIM19k05eGBxl9iJTOKnzFat+vvKmfzTqmurtU+X+P388O +WsStmryzOndzg0yTPJBotXxQlRHIgl6UcdBBGPvJxmXszom2ziKzEVs/4J0+Gxho +DaoDoWdZv2udvPjyZS+aQTpF2F7QNmxvOx5jtI6YTBPbIQ6fe+3qoKpxw+ujoNIl +AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBRclwZGNKvfMMV8xQ1VcWYwtWCPnjAfBgNVHSMEGDAWgBRclwZGNKvfMMV8 +xQ1VcWYwtWCPnjANBgkqhkiG9w0BAQsFAAOCAgEAd0tN3uqFSqssJ9ZFx/FfIMFb +YO0Hy6Iz3DbPx5TxBsfV2s/NrYQ+/xJIf0HopWZXMMQd5KcaLy1Cwe9Gc7LV9Vr9 +Dnpr0sgxow1IlldlY1UYwPzkisyYhlurDIonN/ojaFlcJtehwcK5Tiz/KV7mlAu+ +zXJPleiP9ve4Pl7Oz54RyawDKUiKqbamNLmsQP/EtnM3scd/qVHbSypHX0AkB4gG +tySz+3/3sIsz+r8jdaNc/qplGsK+8X2BdwOBsY3XlQ16PEKYt4+pfVDh31IGmqBS +VHiDB2FSCTdeipynxlHRXGPRhNzC29L6Wxg2fWa81CiXL3WWHIQHrIuOUxG+JCGq +Z/LBrYic07B4Z3j101gDIApdIPG152XMDiDj1d/mLxkrhWjBBCbPj+0FU6HdBw7r +QSbHtKksW+NpPWbAYhvAqobAN8MxBIZwOb5rXyFAQaB/5dkPOEtwX0n4hbgrLqof +k0FD+PuydDwfS1dbt9RRoZJKzr4Qou7YFCJ7uUG9jemIqdGPAxpg/z+HiaCZJyJm +sD5onnKIUTidEz5FbQXlRrVz7UOGsRQKHrzaDb8eJFxmjw6+of3G62m8Q3nXA3b5 +3IeZuJjEzX9tEPkQvixC/pwpTYNrCr21jsRIiv0hB6aAfR+b6au9gmFECnEnX22b +kJ6u/zYks2gD1pWMa3MwKTAKBggrBgEFBQcDAwwbU3dpc3NTaWduIEdvbGQgUm9v +dCBDQSAtIEcz +-----END TRUSTED CERTIFICATE----- + +# SwissSign Platinum CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFwTCCA6mgAwIBAgIITrIAZwwDXU8wDQYJKoZIhvcNAQEFBQAwSTELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEjMCEGA1UEAxMaU3dpc3NTaWdu +IFBsYXRpbnVtIENBIC0gRzIwHhcNMDYxMDI1MDgzNjAwWhcNMzYxMDI1MDgzNjAw +WjBJMQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMSMwIQYDVQQD +ExpTd2lzc1NpZ24gUGxhdGludW0gQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAMrfogLi2vj8Bxax3mCq3pZcZB/HL37PZ/pEQtZ2Y5Wu669y +IIpFR4ZieIbWIDkm9K6j/SPnpZy1IiEZtzeTIsBQnIJ71NUERFzLtMKfkr4k2Htn +IuJpX+UFeNSH2XFwMyVTtIc7KZAoNppVRDBopIOXfw0enHb/FZ1glwCNioUD7IC+ +6ixuEFGSzH7VozPY1kneWCqv9hbrS3uQMpe5up1Y8fhXSQQeol0GcN1x2/ndi5ob +jM89o03Oy3z2u5yg+gnOI2Ky6Q0f4nIoj5+saCB9bzuohTEJfwvH6GXp43gOCWcw +izSC+13gzJ2BbWLuCB4ELE6b7P6pT1/9aXjvCR+htL/68++QHkwFix7qepF6w9fl ++zC8bBsQWJj3Gl/QKTIDE0ZNYWqFTFJ0LwYfexHihJfGmfNtf9dng34TaNhxKFrY +zt3oEBSa/m0jh26OWnA81Y0JAKeqvLAxN23IhBQeW71FYyBrS3SMvds6DsHPWhaP +pZjydomyExI7C3d3rLvlPClKknLKYRorXkzig3R3+jVIeoVNjZpTxN94ypeRSCtF +KwH3HBqi7Ri6Cr2D+m+8jVeTO9TUps4e8aCxzqv9KyiaTxvXw3LbpMS/XUz13XuW +ae5ogObnmLo2t/5u7Su9IPhlGdpVCX4l3P5hYnL5fhgC72O00Puv5TtjjGePAgMB +AAGjgawwgakwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFFCvzAeHFUdvOMW0ZdHelarp35zMMB8GA1UdIwQYMBaAFFCvzAeHFUdvOMW0 +ZdHelarp35zMMEYGA1UdIAQ/MD0wOwYJYIV0AVkBAQEBMC4wLAYIKwYBBQUHAgEW +IGh0dHA6Ly9yZXBvc2l0b3J5LnN3aXNzc2lnbi5jb20vMA0GCSqGSIb3DQEBBQUA +A4ICAQAIhab1Fgz8RBrBY+D5VUYI/HAcQiiWjrfFwUF1TglxeeVtlspLpYhg0DB0 +uMoI3LQwnkAHFmtllXcBrqS3NQuB2nEVqXQXOHtYyvkv+8Bldo1bAbl93oI9ZLi+ +FHSjClTTLJUYFzX1UWs/j6KWYTl4a0vlpqD4U99REJNi54Av4tHgvI42Rncz7Lj7 +jposiU0xEQ8mngS7twSNC/K5/FqdOxa3L8iYq/6KUFkuozv8KV2LwUvJ4ooTHbG/ +u0IdUt1O2BReEMYxB+9xJ/cbOQncguqLs5WGXv312l0xpuAxtpTmREl0xRbl9x8D +YSjFyMsSoEJL+WuICI20MhjzdZ/EfwBPBZWcoxcCw7NTm6ogOSkrZvqdr16zktK1 +puEa+S1BaYEUtLS17Yk9zvupnTVCRLEcFHOBzyoBNZox1S2PbYTfgE1X4z/FhHXa +icYwu+uPyyIIoK6q8QNsOktNCaUOcsZWayFCTiMlFGiudgp8DAdwZPmaL/YFOSbG +DI8Zf0NebvRbFS/bYV3mZy8/CJT5YLSYMdp08YSTcU1f+2BY0fvEwW2JorsgH51x +kcsymxM9Pn2SUjWskpSi0xjCfMfqr3YFFt1nJ8J+HAciIfNAChs0B0QTwoRqjt8Z +Wr9/6x3iGjjRXK9HkmuAtTClyY3YqzGBH9/CZjfTk6mFhnll0jAoMAoGCCsGAQUF +BwMDDBpTd2lzc1NpZ24gUGxhdGludW0gQ0EgLSBHMg== +-----END TRUSTED CERTIFICATE----- + +# SwissSign Platinum Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFgTCCA2mgAwIBAgIIIj+pFyDegZQwDQYJKoZIhvcNAQELBQAwTjELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEoMCYGA1UEAxMfU3dpc3NTaWdu +IFBsYXRpbnVtIFJvb3QgQ0EgLSBHMzAeFw0wOTA4MDQxMzM0MDRaFw0zNzA4MDQx +MzM0MDRaME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAm +BgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCUoO8TG59EIBvNxaoiu9nyUj56Wlh35o2h +K8ncpPPksxOUAGKbHPJDUEOBfq8wNkmsGIkMGEW4PsdUbePYmllriholqba1Dbd9 +I/BffagHqfc+hi7IAU3c5jbtHeU3B2kSS+OD0QQcJPAfcHHnGe1zSG6VKxW2VuYC +31bpm/rqpu7gwsO64MzGyHvXbzqVmzqPvlss0qmgOD7WiOGxYhOO3KswZ82oaqZj +K4Kwy8c9Tu1y9n2rMk5lAusPmXT4HBoojA5FAJMsFJ9txxue9orce3jjtJRHHU0F +bYR6kFSynot1woDfhzk/n/tIVAeNoCn1+WBfWnLou5ugQuAIADSjFTwT49YaawKy +lCGjnUG8KmtOMzumlDj8PccrM7MuKwZ0rJsQb8VORfddoVYDLA1fer0e3h13kGva +pS2KTOnfQfTnS+x9lUKfTKkJD0OIPz2T5yv0ekjaaMTdEoAxGl0kVCamJCGzTK3a +Fwg2AlfGnIZwyXXJnnxh2HjmuegUafkcECgSXUt1ULo80GdwVVVWS/s9HNjbeU2X +37ie2xcs1TUHuFCp9473Vv96Z0NPINnKZtY4YEvulDHWDaJIm/80aZTGNfWWiO+q +ZsyBputMU/8ydKe2nZhXtLomqfEzM2J+OrADEVf/3G8RI60+xgrQzFS3LcKTHeXC +pozH2O9T9wIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUVio/kFj0F1oUstcIG4VbVGpUGigwHwYDVR0jBBgwFoAUVio/ +kFj0F1oUstcIG4VbVGpUGigwDQYJKoZIhvcNAQELBQADggIBAGztiudDqHknm7jP +hz5kOBiMEUKShjfgWMMb7gQu94TsgxBoDH94LZzCl442ThbYDuprSK1Pnl0NzA2p +PhiFfsxomTk11tifhsEy+01lsyIUS8iFZtoX/3GRrJxWV95xLFZCv/jNDvCi0//S +IhX70HgKfuGwWs6ON9upnueVz2PyLA3S+m/zyNX7ALf3NWcQ03tS7BAy+L/dXsmm +gqTxsL8dLt0l5L1N8DWpkQFH+BAClFvrPusNutUdYyylLqvn4x6j7kuqX7FmAbSC +WvlGS8fx+N8svv113ZY4mjc6bqXmMhVus5DAOYp0pZWgvg0uiXnNKVaOw15XUcQF +bwRVj4HpTL1ZRssqvE3JHfLGTwXkyAQN925P2sM6nNLC9enGJHoUPhxCMKgCRTGp +/FCp3NyGOA9bkz9/CE5qDSc6EHlWwxW4PgaG9tlwZ691eoviWMzGdU8yVcVsFAko +O/KV5GreLCgHraB9Byjd1Fqj6aZ8E4yZC1J429nR3z5aQ3Z/RmBTws3ndkd8Vc20 +OWQQW5VLNV1EgyTV4C4kDMGAbmkAgAZ3CmaCEAxRbzeJV9vzTOW4ue4jZpdgt1Ld +2Zb7uoo7oE3OXvBETJDMIU8bOphrjjGD+YMIUssZwTVr7qEVW4g/bazyNJJTpjAq +E9fmhqhd2ULSx52peovL3+6iMcLlMC0wCgYIKwYBBQUHAwMMH1N3aXNzU2lnbiBQ +bGF0aW51bSBSb290IENBIC0gRzM= +-----END TRUSTED CERTIFICATE----- + +# SwissSign Silver CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5uMDowHgYIKwYBBQUHAwQG +CCsGAQUFBwMBBggrBgEFBQcDAwwYU3dpc3NTaWduIFNpbHZlciBDQSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# SwissSign Silver Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFfjCCA2agAwIBAgIJAKqIsFoLsXabMA0GCSqGSIb3DQEBCwUAMEwxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJjAkBgNVBAMTHVN3aXNzU2ln +biBTaWx2ZXIgUm9vdCBDQSAtIEczMB4XDTA5MDgwNDEzMTkxNFoXDTM3MDgwNDEz +MTkxNFowTDELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEmMCQG +A1UEAxMdU3dpc3NTaWduIFNpbHZlciBSb290IENBIC0gRzMwggIiMA0GCSqGSIb3 +DQEBAQUAA4ICDwAwggIKAoICAQC+h5sF5nF8Um9t7Dep6bPczF9/01DqIZsE8D2/ +vo7JpRQWMhDPmfzscK1INmckDBcy1inlSjmxN+umeAxsbxnKTvdR2hro+iE4bJWc +L9aLzDsCm78mmxFFtrg0Wh2mVEhSyJ14cc5ISsyneIPcaKtmHncH0zYYCNfUbWD4 +8HnTMzYJkmO3BJr1p5baRa90GvyC46hbDjo/UleYfrycjMHAslrfxH7+DKZUdoN+ +ut3nKvRKNk+HZS6lujmNWWEp89OOJHCMU5sRpUcHsnUFXA2E2UTZzckmRFduAn2V +AdSrJIbuPXD7V/qwKRTQnfLFl8sJyvHyPefYS5bpiC+eR1GKVGWYSNIS5FR3DAfm +vluc8d0Dfo2E/L7JYtX8yTroibVfwgVSYfCcPuwuTYxykY7IQ8GiKF71gCTc4i+H +O1MA5cvwsnyNeRmgiM14+MWKWnflBqzdSt7mcG6+r771sasOCLDboD+Uxb4Subx7 +J3m1MildrsUgI5IDe1Q5sIkiVG0S48N46jpA/aSTrOktiDzbpkdmTN/YF+0W3hrW +10Fmvx2A8aTgZBEpXgwnBWLr5cQEYtHEnwxqVdZYOJxmD537q1SAmZzsSdaCn9pF +1j9TBgO3/R/shn104KS06DK2qgcj+O8kQZ5jMHj0VN2O8Fo4jhJ/eMdvAlYhM864 +uK1pVQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQUoYxFkwoSYwunV18ySn3hIee3PmYwHwYDVR0jBBgwFoAUoYxFkwoS +YwunV18ySn3hIee3PmYwDQYJKoZIhvcNAQELBQADggIBAIeuYW1IOCrGHNxKLoR4 +ScAjKkW4NU3RBfq5BTPEZL3brVQWKrA+DVoo2qYagHMMxEFvr7g0tnfUW44dC4tG +kES1s+5JGInBSzSzhzV0op5FZ+1FcWa2uaElc9fCrIj70h2na9rAWubYWWQ0l2Ug +MTMDT86tCZ6u6cI+GHW0MyUSuwXsULpxQOK93ohGBSGEi6MrHuswMIm/EfVcRPiR +i0tZRQswDcoMT29jvgT+we3gh/7IzVa/5dyOetTWKU6A26ubP45lByL3RM2WHy3H +9Qm2mHD/ONxQFRGEO3+p8NgkVMgXjCsTSdaZf0XRD46/aXI3Uwf05q79Wz55uQbN +uIF4tE2g0DW65K7/00m8Ne1jxrP846thWgW2C+T/qSq+31ROwktcaNqjMqLJTVcY +UzRZPGaZ1zwCeKdMcdC/2/HEPOcB5gTyRPZIJjAzybEBGesC8cwh+joCMBedyF+A +P90lrAKb4xfevcqSFNJSgVPm6vwwZzKpYvaTFxUHMV4PG2n19Km3fC2z7YREMkco +BzuGaUWpxzaWkHJ02BKmcyPRTrm2ejrEKaFQBhG52fQmbmIIEiAW8AFXF9QFNmeX +61H5/zMkDAUPVr/vPRxSjoreaQ9aH/DVAzFEs5LG6nWorrvHYAOImP/HBIRSkIbh +tJOpUC/o69I2rDBgp9ADE7UKMCswCgYIKwYBBQUHAwMMHVN3aXNzU2lnbiBTaWx2 +ZXIgUm9vdCBDQSAtIEcz +-----END TRUSTED CERTIFICATE----- + +# Swiss Government Root CA I +-----BEGIN TRUSTED CERTIFICATE----- +MIIINDCCBhygAwIBAgIRAP11BI16YIaTaUyqADxl0z0wDQYJKoZIhvcNAQELBQAw +gaYxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBBdXRob3JpdGll +cyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMIU2VydmljZXMx +IjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxIzAhBgNVBAMTGlN3 +aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJMB4XDTExMDIxNTA5MDAwMFoXDTM1MDIx +NTA4NTk1OVowgaYxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBB +dXRob3JpdGllcyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMI +U2VydmljZXMxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxIzAh +BgNVBAMTGlN3aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJMIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAyA5y9AEvhnsLwmOwjWjtHz3euYObXKFdug82JxEE +rQZUILceoObOvvCZaXIZNWRmMY0svY5CCp/GyqmQLNq8hTAD2TKWlvC+oCINJGzU +xn9aTFEkLVRyCHwz6cwox2ZlI2lrlbTrvuOH52PX5PsHrRKS6+fkCkOyqd/HkLwm +W5H5o7eHnJS5EI2IxVhcMrwW7A5XT/6nk3iP4MU5uweIYMFUZeuHvp8xl3E8+ovI +g2xSluCswO/LaQiVW+Dgu68npMIX8VGfhHZh2CTi/mFtZDVJ6jnEIWK9zOIC/0hr +OK9px7mSLYIRjb0LiYUq6re0ss1L69H6qvDgTAk8Td/2MR2GMKhBiFdwLCdR3s+L +Tj8C8lClF+BnG3IMQTEfAaKWPjzbAradlOYCTvPwGYKyCCMT65HNUdOqRsJzmJg/ +usPumvz6za9yCjcTj/mgULPq+z8svPpjVTX00ry4cdKR6+nKylzsUWaonlkFIi+j +GttP4EViIzxdVfswlSs0os+ntEvAM8k0UZ3TsyvfxeosLMffRB+2jbn+81zNNy+w +bJxKCL3o9db6cOVpMjdcXwvLP+SIAszKs3gvfb9IsyGwH4h5m1qKcdghhCkPSgQx +Kr0NIUTOdJ0m00kd+Iao5RJ3xcBzDFCDapBrocr40JXZNYbHEaM7FMfLhlhWDfuD +9wECAwEAAaOCAlkwggJVMA8GA1UdEwEB/wQFMAMBAf8wgZsGA1UdIASBkzCBkDCB +jQYIYIV0AREDAQAwgYAwQwYIKwYBBQUHAgEWN2h0dHA6Ly93d3cucGtpLmFkbWlu +LmNoL2Nwcy9DUFNfMl8xNl83NTZfMV8xN18zXzFfMC5wZGYwOQYIKwYBBQUHAgIw +LRorVGhpcyBpcyB0aGUgU3dpc3MgR292ZXJubWVudCBSb290IENBIEkgQ1BTLjCB +jgYDVR0fBIGGMIGDMIGAoH6gfIZ6bGRhcDovL2FkbWluZGlyLmFkbWluLmNoOjM4 +OS9jbj1Td2lzcyUyMEdvdmVybm1lbnQlMjBSb290JTIwQ0ElMjBJLG91PUNlcnRp +ZmljYXRpb24lMjBBdXRob3JpdGllcyxvdT1TZXJ2aWNlcyxvPUFkbWluLGM9Q0gw +HQYDVR0OBBYEFLUbg7s7T7LS++UDjtRhXdEajrCiMA4GA1UdDwEB/wQEAwIBBjCB +4wYDVR0jBIHbMIHYgBS1G4O7O0+y0vvlA47UYV3RGo6woqGBrKSBqTCBpjELMAkG +A1UEBhMCQ0gxOzA5BgNVBAoTMlRoZSBGZWRlcmFsIEF1dGhvcml0aWVzIG9mIHRo +ZSBTd2lzcyBDb25mZWRlcmF0aW9uMREwDwYDVQQLEwhTZXJ2aWNlczEiMCAGA1UE +CxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEjMCEGA1UEAxMaU3dpc3MgR292 +ZXJubWVudCBSb290IENBIEmCEQD9dQSNemCGk2lMqgA8ZdM9MA0GCSqGSIb3DQEB +CwUAA4ICAQAl2t94sCbcn5nrM5zJRbpcY1KNbgNzqnRIxQ0L0hcMLAvSxiWD1FTN +B4FUL2d2Jafp13+WR3ekHZtF//HY9p5HDnSME8TyvtYHKBg8mHXB2+uSiCbmBmSO ++dL94pk1gdHYdRe1c+rd6BgilRYZClkqItyGWkNPJWg2qdiTAI9excNhhvDSFAmV +UcR+2FLusI2KiHGl1yin9NwGWCVexFUYCJV0fLgB507Y1vZ8IENIDaPg3lTEqF8A +SUPTRTuCZW7ui6MBIlaa8c4p5QzEa+3nTvixVYGtcf+E+whX5kfKrYf4Rvj68DWE +7bTYiJcid6SPFsg8Z9HhbgSse482zd6lCKwqjfWnHZ/Hw5EhQqOGgbkq2LHpOB1U +CJg5ChHKMg4zzfRM6qhKBukYPkHGz6D24CtrII6nIALrMEGBsOjkrqQYiSvfFPAS +KW14+k1E+7I05a/zjjX3w84sCxi00HmPE78Di2a4tWHUrA79eD0JrbXSLE9WQZmI +RAx+Z+Nkn/paKlh3UWmxzSyapzQQBXT6bkVjy4tSrUeRohLIoiYExdAiHgOzspI3 +VFf9iYN1A20tO7PxpKIQfJyTjaNQhDmLlVlB9gJ2Boq8DpDn2TrrrSZeV1PRb8h1 +4KuRe2uhf/kbUKjc/k0G4RWKpBDrHgbPVEgVlii2Ix8a43ylj/o3VzAoMAoGCCsG +AQUFBwMDDBpTd2lzcyBHb3Zlcm5tZW50IFJvb3QgQ0EgSQ== +-----END TRUSTED CERTIFICATE----- + +# Swiss Government Root CA II +-----BEGIN TRUSTED CERTIFICATE----- +MIIIODCCBiCgAwIBAgIQDp8XmaWxPZzL7Abro/AOaTANBgkqhkiG9w0BAQsFADCB +pzELMAkGA1UEBhMCQ0gxOzA5BgNVBAoTMlRoZSBGZWRlcmFsIEF1dGhvcml0aWVz +IG9mIHRoZSBTd2lzcyBDb25mZWRlcmF0aW9uMREwDwYDVQQLEwhTZXJ2aWNlczEi +MCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEkMCIGA1UEAxMbU3dp +c3MgR292ZXJubWVudCBSb290IENBIElJMB4XDTExMDIxNjA5MDAwMFoXDTM1MDIx +NjA4NTk1OVowgacxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBB +dXRob3JpdGllcyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMI +U2VydmljZXMxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxJDAi +BgNVBAMTG1N3aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJSTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAKksEu2/wCLphugcN4KDm2gFbxbjiKgBD8txnn9H +kEvMJXfI8NdpLpFoVyGysgchM+5MpDclmEy0RjJO1vlri1GK7yw38pjV9dS0t+cA +yu/BE16Uq267nL36a4+r+B42Vmk4ZjrQ9DMNADkCqMUcCyG3XCAMYdCtrs6OXtk6 +6d7/R3x4Vw4ccfRgHN3bmhgpr9mAo5+FhGMzke+9dO7dA3rI+uCE5tm9Tn76bk92 +0V0+qOiHRZB5862u9cJdEU0p94gTydWTcwGr3e39r3f7aU7vj1Icz/UsWmzs/oKb +23w5q3UjfjiQT5SOLWJYnvfncvyUW3JWxZ2jrqu1tsDXdlAAPD9HiJJaYNS/Mhum +lEANdnnpPM7ksx3HjPXohjG52CtQSoASidcsUIDmZy+2k5ytrAVSIlMgmQ69l8bh +2nOpHYnyxFnmh+ZWKw6VAhqHxnn+mWrpdOzwEvkUKCCVljovXVe1b/+TvLYoaiyk +KHhGYa9BJKTz+gSO8YoZopFz4nePtKf5nP9uUey9H5YT6GORXodob+vYfC4QT1AY +kMe3dO8zwIHfM+MakytVBCx80iu3Ywz+rXu9tjqXuT0DI3RzA6YsWQBs1dXo7K9C +zNN/cItgYOeyoLaKUkz+CpbLzzqwWAjuHELJhndCbj+0rJAAWEIcQMRuuEXIvDM2 +370nAgMBAAGjggJcMIICWDAPBgNVHRMBAf8EBTADAQH/MIGdBgNVHSAEgZUwgZIw +gY8GCGCFdAERAxUBMIGCMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LnBraS5hZG1p +bi5jaC9jcHMvQ1BTXzJfMTZfNzU2XzFfMTdfM18yMV8xLnBkZjA6BggrBgEFBQcC +AjAuGixUaGlzIGlzIHRoZSBTd2lzcyBHb3Zlcm5tZW50IFJvb3QgQ0EgSUkgQ1BT +LjCBjwYDVR0fBIGHMIGEMIGBoH+gfYZ7bGRhcDovL2FkbWluZGlyLmFkbWluLmNo +OjM4OS9jbj1Td2lzcyUyMEdvdmVybm1lbnQlMjBSb290JTIwQ0ElMjBJSSxvdT1D +ZXJ0aWZpY2F0aW9uJTIwQXV0aG9yaXRpZXMsb3U9U2VydmljZXMsbz1BZG1pbixj +PUNIMB0GA1UdDgQWBBTlhG+JaT12ABd/wau9rl/BfbrhYjAOBgNVHQ8BAf8EBAMC +AQYwgeMGA1UdIwSB2zCB2IAU5YRviWk9dgAXf8Grva5fwX264WKhga2kgaowgacx +CzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBBdXRob3JpdGllcyBv +ZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMIU2VydmljZXMxIjAg +BgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxJDAiBgNVBAMTG1N3aXNz +IEdvdmVybm1lbnQgUm9vdCBDQSBJSYIQDp8XmaWxPZzL7Abro/AOaTANBgkqhkiG +9w0BAQsFAAOCAgEAgzdXdck4UL9BBpZwwtnH17BaAM2jQE/T0vmKh5GyictdpLxv +Tz5U9so8s8RMi8c+9NnEYt3HVZ7R+dJE5x5Pz+juKxyoAfAzB/vhOxTTz1CRXtjq +QsZ5WIWq+9zbcMqV+fQOYgJwaUQtaE/RcOooUma3cd4l6KGnb7ChJsfXyiBk3MBz +PBCiFB70rcE+FJA5NmOIbyjgYKWR92Lkms/StXGeXTv2mSztkToInLSEhUnj4bqm +tmiztrZPS1xTCldsoQeS9mKeqPqK1vNrpw+yK2a9r0JHCE/o13yfhg/6WoO+LW8A +BLV2hxav3U86lrQ0V7fi/0H/3kIcZsWF68JyH7gcTu4X8mLvCgSsm6uh8u7uokAk +HEfeQosYtKlXs088YjIcrWxErbzVHGM4Pckzpvu8KDdERuN6YvqASDXinhuIGUyz +Qf3ud+BZgBphHjWkQXqzwY1E6cUhWems00TKdoU2FEYKHhY0psQ0d8OCOEghAv4S +bNrX6rDs9s0szPObCmOA0/ULfQQthA3C2Uwrl/HVVPePswrivVg8mfKvORuQ+Tvn +t0XnWmp9wZ8UbzBXmBmgB0Pr7tEIhtdJnBIKADsPp0GxSquQs9S9CeeID54kDiv7 +YT1VmdNY5LjHffQVTWUOGHlBybvpmsFZGEQ0YtXoOHvKhRiYhnnNfbpH25UwKTAK +BggrBgEFBQcDAwwbU3dpc3MgR292ZXJubWVudCBSb290IENBIElJ +-----END TRUSTED CERTIFICATE----- + +# Swiss Government Root CA III +-----BEGIN TRUSTED CERTIFICATE----- +MIIGVjCCBD6gAwIBAgIRAPsfC0IrqEE+V9HuKm5aT7swDQYJKoZIhvcNAQELBQAw +bjELMAkGA1UEBhMCQ0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkw +FwYDVQQLExB3d3cucGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5t +ZW50IFJvb3QgQ0EgSUlJMB4XDTE2MDQxNTA3MDAwMFoXDTQxMDQxNTA2NTk1OVow +bjELMAkGA1UEBhMCQ0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkw +FwYDVQQLExB3d3cucGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5t +ZW50IFJvb3QgQ0EgSUlJMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA +4UOGjk8YlLrTwjlwbV1pUYRZvLvIfy/9F6N4nL3YkuPYeCE+u5pf+7JlUHK2p+yl +58HFAATjzLMCSvkA229tu5MXRPkjwlY6MB+Beftkv/VUhb87K2+VBAZdaArDj7gr +ZhK+othalAV9r8ETBqaROj8ZC4WDwJZd84HIE4r1EEugdTpbo0AHvaFmGGWEVHmR +mtNyhGbVDeY7Wur626FU/QAjWehX6py39I9BC2mxR7CaL2LamhmtoJUwzS6tZ7tt ++TZDt5R5yZAJAGlfl6bTbyXo72KHd9em2U4cX2Fm0LFw1eBiIDbYlkD4XjHeQZlp +ENag7j2tEy7SlEqNgB3cjEYhVotJW96h2APKzthltLAFPSZpSm2ljHkvpI8SeBDp +sgkIQ8PGBLszPkc1pVwgIAriNvhjhuQN9D4Ueb5FB7SLCZP19iomob1Ex/NQDQ1h +mzsR36iD6iIslUQNOUFjTagrbWilS59Ah2o8RQq+cqeIvvA5KlvvWaQg77Tcw9pB +20GluiJfl6PIY6EkLU4loMMXKMWIQZOWZGY3QwWbFXy2vp77G8hmGLoU77kYz4Rp +m5+9ggcSbRsZvzB+8ZIOwEwW/9E+b/irsmGaaEPiClTHAaNXjvNEBiLDcKa7pbPM +ghjYQI696nBBb5RXDL4HdG6Ok3oZj8Zo/BulRbO5hakCAwEAAaOB7jCB6zAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQH646qccsnpbvHMWC+7R/PoDPE5jCBqAYD +VR0jBIGgMIGdgBQH646qccsnpbvHMWC+7R/PoDPE5qFypHAwbjELMAkGA1UEBhMC +Q0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkwFwYDVQQLExB3d3cu +cGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5tZW50IFJvb3QgQ0Eg +SUlJghEA+x8LQiuoQT5X0e4qblpPuzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcN +AQELBQADggIBALNPZrze6Yxl/LdTEC78/N2JGhFAcJQxiZV2xtYqzD2no8G4zhJr +NFDBdSov52Em70s/3o0jnw2YPh871mrOPPHf0Ut3jKhP8lDlKKnBaupWb0e0gium +J7Il8N0jCj/pPYwl7MO1Tzf6UwrpOJhrKexTNdeGkJr6Y7p2VONQT8rW58Bx0NLn +6mhUrZPkMvx6cUCHBSi46rjCPI0AXsFOKFblw2y19aqN72cWB9COxfJaGTu7wYuz +RJ8MpcfL3tNEYKe9G2naDpr/l0WGbfqxZIof7N9RWFJN1uq6BvZTcVve6VX1LBNy +BkxTlvrKW/Q/HKffUv3LTn2fEECUp6FVunM+dHQw+KPgn6pfH13A30HPAYEh26iu +szOtRhN3mzswtKTgF4LAirU0FBwFi67gPdrFfKsmCEy9SmDpcOyoWIh1Z/EYl3YN +bAt9GS0CtYKZd89i+p0SASvZ9bRXsTrr1SnwjNNCpzVIjGKDPgo+Yd2x8wehx3Ow +ifC2WXujI9g3AzWIq0V3Y0z/cOuOagfRIuAykcsVcVorxYQ+kc3dtJlnjbSqjGUX +pqycXlaYp/TiQBLVQZe1M/HtF6GlAhDhZLVA2h6t0aburB7HEdsXcXrZmh7GTpv0 +qLOUnwmKf0yb/ggLLKtQ0DeySTUatx4pIXbhm/ChqlhnJAPhGaTRE2rxMCowCgYI +KwYBBQUHAwMMHFN3aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJSUk= +-----END TRUSTED CERTIFICATE----- + +# Swisscom Root CA 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF2TCCA8GgAwIBAgIQXAuFXAvnWUHfV8w/f52oNjANBgkqhkiG9w0BAQUFADBk +MQswCQYDVQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0 +YWwgQ2VydGlmaWNhdGUgU2VydmljZXMxGzAZBgNVBAMTElN3aXNzY29tIFJvb3Qg +Q0EgMTAeFw0wNTA4MTgxMjA2MjBaFw0yNTA4MTgyMjA2MjBaMGQxCzAJBgNVBAYT +AmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZp +Y2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAxMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0LmwqAzZuz8h+BvVM5OAFmUgdbI9 +m2BtRsiMMW8Xw/qabFbtPMWRV8PNq5ZJkCoZSx6jbVfd8StiKHVFXqrWW/oLJdih +FvkcxC7mlSpnzNApbjyFNDhhSbEAn9Y6cV9Nbc5fuankiX9qUvrKm/LcqfmdmUc/ +TilftKaNXXsLmREDA/7n29uj/x2lzZAeAR81sH8A25Bvxn570e56eqeqDFdvpG3F +EzuwpdntMhy0XmeLVNxzh+XTF3xmUHJd1BpYwdnP2IkCb6dJtDZd0KTeByy2dbco +kdaXvij1mB7qWybJvbCXc9qukSbraMH5ORXWZ0sKbU/Lz7DkQnGMU3nn7uHbHaBu +HYwadzVcFh4rUx80i9Fs/PJnB3r1re3WmquhsUvhzDdf/X/NTa64H5xD+SpYVUNF +vJbNcA78yeNmuk6NO4HLFWR7uZToXTNShXEuT46iBhFRyePLoW4xCGQMwtI89Tbo +19AOeCMgkckkKmUpWyL3Ic6DXqTz3kvTaI9GdVyDCW4pa8RwjPWd1yAv/0bSKzjC +L3UcPX7ape8eYIVpQtPM+GP+HkM5haa2Y0EQs3MevNP6yn0WR+Kn1dCjigoIlmJW +bjTb2QK5MHXjBNLnj8KwEUAKrNVxAmKLMb7dxiNYMUJDLXT5xp6mig/p/r+D5kNX +JLrvRjSq1xIBOO0CAwEAAaOBhjCBgzAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0hBBYw +FDASBgdghXQBUwABBgdghXQBUwABMBIGA1UdEwEB/wQIMAYBAf8CAQcwHwYDVR0j +BBgwFoAUAyUv3m+CATpcLNwroWm1Z9SM0/0wHQYDVR0OBBYEFAMlL95vggE6XCzc +K6FptWfUjNP9MA0GCSqGSIb3DQEBBQUAA4ICAQA1EMvspgQNDQ/NwNurqPKIlwzf +ky9NfEBWMXrrpA9gzXrzvsMnjgM+pN0S734edAY8PzHyHHuRMSG08NBsl9Tpl7Ik +Vh5WwzW9iAUPWxAaZOHHgjD5Mq2eUCzneAXQMbFamIp1TpBcahQq4FJHgmDmHtqB +sfsUC1rxn9KVuj7QG9YVHaO+htXbD8BJZLsuUBlL0iT43R4HVtA4oJVwIHaM190e +3p9xxCPvgxNcoyQVTSlAPGrEqdi3pkSlDfTgnXceQHAm/NrZNuR55LU/vJtlvrsR +ls/bxig5OgjOR1tTWsWZ/l2p3e9M1MalrQLmjAcSHm8D0W+go/MpvRLHUKKwf4ip +mXeascClOS5cfGniLLDqN2qk4Vrh9VDlg++luyqI54zb/W1elxmofmZ1a3Hqv7HH +b6D0jqTsNFFbjCYDcKF31QESVwA12yPeDooomf2xEG9L/zgtYE4snOtnta1J7ksf +rK/7DZBaZmBwXarNeNQk7shBoJMBkpxqnvy5JMWzFYJ+vq6VK+uxwNrjAWALXmms +hFZhvnEX/h0TD/7Gh0Xp/jKgGg0TpJRVcaUWi7rKibCyx/yP2FS1k2Kdzs9Z+z0Y +zirLNRWCXf9UIltxUvu3yf5gmwBBZPCqKuy2QkPOiWaByIufOVQDJdMWNY6E0F/6 +MBr1mmz0DlP5OlvRHDAgMAoGCCsGAQUFBwMDDBJTd2lzc2NvbSBSb290IENBIDE= +-----END TRUSTED CERTIFICATE----- + +# Swisscom Root CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF2TCCA8GgAwIBAgIQHp4o6Ejy5e/DfEoeWhhntjANBgkqhkiG9w0BAQsFADBk +MQswCQYDVQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0 +YWwgQ2VydGlmaWNhdGUgU2VydmljZXMxGzAZBgNVBAMTElN3aXNzY29tIFJvb3Qg +Q0EgMjAeFw0xMTA2MjQwODM4MTRaFw0zMTA2MjUwNzM4MTRaMGQxCzAJBgNVBAYT +AmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZp +Y2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAyMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlUJOhJ1R5tMJ6HJaI2nbeHCOFvEr +jw0DzpPMLgAIe6szjPTpQOYXTKueuEcUMncy3SgM3hhLX3af+Dk7/E6J2HzFZ++r +0rk0X2s682Q2zsKwzxNoysjL67XiPS4h3+os1OD5cJZM/2pYmLcX5BtS5X4HAB1f +2uY+lQS3aYg5oUFgJWFLlTloYhyxCwWJwDaCFCE/rtuh/bxvHGCGtlOUSbkrRsVP +ACu/obvLP+DHVxxX6NZp+MEkUp2IVd3Chy50I9AU/SpHWrumnf2U5NGKpV+GY3aF +y6//SSj8gO1MedK75MDvAe5QQQg1I3ArqRa0jG6F6bYRzzHdUyYb3y1aSgJA/MTA +tukxGggo5WDDH8SQjhBiYEQN7Aq+VRhxLKX0srwVYv8c474d2h5Xszx+zYIdkeNL +6yxSNLCK/RJOlrDrcH+eOfdmQrGrrFLadkBXeyq96G4DsguAhYidDMfCd7Camlf0 +uPoTXGiTOmekl9AbmbeGMktg2M7v0Ax/lZ9vh0+Hio5fCHyqW/xavqGRn1V9TrAL +acywlKinh/LTSlDcX3KwFnUey7QYYpqwpzmqm59m2I2mbJYV4+by+PGDYmy7Velh +k6M99bFXi08jsJvllGov34zflVEpYKELKeRcVVi3qPyZ7iVNTA6z00yPhOgpD/0Q +VAKFyPnlw4vP5w8CAwEAAaOBhjCBgzAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0hBBYw +FDASBgdghXQBUwIBBgdghXQBUwIBMBIGA1UdEwEB/wQIMAYBAf8CAQcwHQYDVR0O +BBYEFE0mICKJS9PVpAqhb97iEoHF8TwuMB8GA1UdIwQYMBaAFE0mICKJS9PVpAqh +b97iEoHF8TwuMA0GCSqGSIb3DQEBCwUAA4ICAQAyCrKkG8t9voJXiblqf/P0wS4R +fbgZPnm3qKhyN2abGu2sEzsOv2LwnN+ee6FTSA5BesogpxcbtnjsQJHzQq0Qw1zv +/2BZf82Fo4s9SBwlAjxnffUy6S8w5X2lejjQ82YqZh6NM4OKb3xuqFp1mrjX2lhI +REeoTPpMSQpKwhI3qEAMw8jh0FcNlzKVxzqfl9NX+Ave5XLzo9v/tdhZsnPdTSpx +srpJ9csc1fV5yJmz/MFMdOO0vSk3FQQoHt5FRnDsr7p4DooqzgB53MBfGWcsa0vv +aGgLQ+OswWIJ76bdZWGgr4RVSJFSHMYlkSrQwSIjYVmvRRGFHQEkNI/Ps/8XciAT +woCqISxxOQ7Qj1zB09GOInJGTB2Wrk9xseEFKZZZ9LuedT3PDTcNYtsmjGOpI99n +Bjx8Oto0QuFmtEYE3saWmA9LSHokMnWRn6z3aOkquVVlzl1h0ydw2Df+n7mvoC5W +t6NlUe07qxS/TFED6F+KBZvuim6c779o+sjaC+NCydAXFJy3SuCvkychVSa1ZC+N +8f+mQAWFBVzKBxlcCxMoTFh/wqXvRdpg065lYZ1Tg3TCrvJcwhbtkj6EPnNgiLx2 +9CzP0H1907he0ZESEOnN3col49XtmS++dYFLJPlFRpTJKSFTnCZFqhMX5OfNeOI5 +wSsSnqaeG8XmDtkx2TAgMAoGCCsGAQUFBwMDDBJTd2lzc2NvbSBSb290IENBIDI= +-----END TRUSTED CERTIFICATE----- + +# Swisscom Root EV CA 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF4DCCA8igAwIBAgIRAPL6ZOJ0Y9ON/RAdBB92ylgwDQYJKoZIhvcNAQELBQAw +ZzELMAkGA1UEBhMCY2gxETAPBgNVBAoTCFN3aXNzY29tMSUwIwYDVQQLExxEaWdp +dGFsIENlcnRpZmljYXRlIFNlcnZpY2VzMR4wHAYDVQQDExVTd2lzc2NvbSBSb290 +IEVWIENBIDIwHhcNMTEwNjI0MDk0NTA4WhcNMzEwNjI1MDg0NTA4WjBnMQswCQYD +VQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0YWwgQ2Vy +dGlmaWNhdGUgU2VydmljZXMxHjAcBgNVBAMTFVN3aXNzY29tIFJvb3QgRVYgQ0Eg +MjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMT3HS9X6lds93BdY7Bx +UglgRCgzo3pOCvrY6myLURYaVa5UJsTMRQdBTxB5f3HSek4/OE6zAMaVylvNwSqD +1ycfMQ4jFrclyxy0uYAyXhqdk/HoPGAsp15XGVhRXrwsVgu42O+LgrQ8uMIkqBPH +oCE2G3pXKSinLr9xJZDzRINpUKTk4RtiGZQJo/PDvO/0vezbE53PnUgJUmfANykR +HvvSEaeFGHR55E+FFOtSN+KxRdjMDUN/rhPSays/p8LiqG12W0OfvrSdsyaGOx9/ +5fLoZigWJdBLlzin5M8J0TbDC77aO0RYjb7xnglrPvMyxyuHxuxenPaHZa0zKcQv +idm5y8kDnftslFGXEBuGCxobP/YCfnvUxVFkKJ3106yDgYjTdLRZncHrYTNaRdHL +OdAGalNgHa/2+2m8atwBz735j9m9W8E6X47aD0upm50qKGsaCnw8qyIL5XctcfaC +NYGu+HuB5ur+rPQam3Rc6I8k9l2dRsQs0h4rIWqDJ2dVSqTjyDKXZpBy2uPUZC5f +46Fq9mDU5zXNysRojddxyNMkM3OxbPlq4SjbX8Y96L5V5jcb7STZDxmPX2MYWFCB +UWVv8p9+agTnNCRxunZLWB4ZvRVgRaoMEkABnRDixzgHcgplwLa7JSnaFp6LNYth +7eVxV4O1PHGf40+/fh6Bn0GXAgMBAAGjgYYwgYMwDgYDVR0PAQH/BAQDAgGGMB0G +A1UdIQQWMBQwEgYHYIV0AVMCAgYHYIV0AVMCAjASBgNVHRMBAf8ECDAGAQH/AgED +MB0GA1UdDgQWBBRF2aWBbj2ITY1x0kbBbkUe88SAnTAfBgNVHSMEGDAWgBRF2aWB +bj2ITY1x0kbBbkUe88SAnTANBgkqhkiG9w0BAQsFAAOCAgEAlDpzBp9SSzBc1P6x +XCX5145v9Ydkn+0UjrgEjihLj6p7jjm02Vj2e6E1CqGdivdj5eu9OYLU43otb98T +PLr+flaYC/NUn81ETm484T4VvwYmneTwkLbUwp4wLh/vx3rEUMfqe9pQy3omywC0 +Wqu1kx+AiYQElY2NfwmTv9SoqORjbdlk5LgpWgi/UOGED1V7XwgiG/W9mR4U9s70 +WBCCswo9GcG/W6uqmdjyMb3lOGbcWAXH7WMaLgqXfIeTK7KK4/HsGOV1timH59yL +Gn602MnTihdsfSlEvoqq9X46Lmgxk7lq2prg2+kupYTNHAq4Sgj5nPFhJpiTt3tm +7JFe3VE/23MPrQRYCd0EApUKPtN236YQHoA96M2kZNEzx5LH4k5E4wnJTsJdhw4S +nr8PyQUQ3nqjsTzyP6WqJ3mtMX0f/fwZacXduT98zca0wjAefm6S139hdlqP65VN +vBFuIXxZN5nQBrz5Bm0yFqXZaajh3DyAHmBR3NdUIR7KYndP+tiPsys6DXhyyWhB +WkdKwqPrGtcKqzwyVcgKEZzfdNbwQBUdyLmPtTbFr/giuMod89a2GQ+fYWVq6nTI +fI/DT11lgh/ZDYnadXL77/FHZxOzyNEZiCcmmpl5fx7kLD977vHeTYuWl8PVP3wb +I+2ksx0WckNLIOFZfsLorSa/ovcwIzAKBggrBgEFBQcDAwwVU3dpc3Njb20gUm9v +dCBFViBDQSAy +-----END TRUSTED CERTIFICATE----- + +# Symantec Class 3 Public Primary Certification Authority - G4 +-----BEGIN TRUSTED CERTIFICATE----- +MIICpzCCAi2gAwIBAgIQTHm1miicdjFk9YlE0JEC3jAKBggqhkjOPQQDAzCBlDEL +MAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYD +VQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBD +bGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g +RzQwHhcNMTIxMDE4MDAwMDAwWhcNMzcxMjAxMjM1OTU5WjCBlDELMAkGA1UEBhMC +VVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1h +bnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBDbGFzcyAzIFB1 +YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzQwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAARXz+qzOU0/oSHgbi84csaHl/OFC0fnD1HI0fSZm8pZ +Zf9M+eoLtyXV0vbsMS0yYhLXdoan+jjJZdT+c+KEOfhMSWIT3brViKBfPchPsD+P +oVAR5JNGrcNfy/GkapVW6MCjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBQknbzScfcdwiW+IvGJpSwVOzQeXjAKBggqhkjOPQQD +AwNoADBlAjEAuWZoZdsF0Dh9DvPIdWG40CjEsUozUVj78jwQyK5HeHbKZiQXhj5Q +Vm6lLZmIuL0kAjAD6qfnqDzqnWLGX1TamPR3vU+PGJyRXEdrQE0QHbPhicoLIsga +xcX+i93B3294n5EwSjAKBggrBgEFBQcDAww8U3ltYW50ZWMgQ2xhc3MgMyBQdWJs +aWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +-----END TRUSTED CERTIFICATE----- + +# Symantec Class 3 Public Primary Certification Authority - G6 +-----BEGIN TRUSTED CERTIFICATE----- +MIIF9jCCA96gAwIBAgIQZWNxhdNvRcaPfzH5CYeSgjANBgkqhkiG9w0BAQwFADCB +lDELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8w +HQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRl +YyBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gRzYwHhcNMTIxMDE4MDAwMDAwWhcNMzcxMjAxMjM1OTU5WjCBlDELMAkGA1UE +BhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZT +eW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBDbGFzcyAz +IFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzYwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC3DrL6TbyachX7d1vb/UMPywv3 +YC6zK34Mu1PyzE5l8xm7/zUd99Opu0Attd141Kb5N+qFBXttt+YTSwZ8+3ZjjyAd +LTgrBIXy6LDRX01KIclq2JTqHgJQpqqQB6BHIepm+QSg5oPwxPVeluInTWHDs8GM +IrZmoQDRVin77cF/JMo9+lqUsITDx7pDHP1kDvEo+0dZ8ibhMblE+avd+76+LDfj +rAsY0/wBovGkCjWCR0yrvYpe3xOF/CDMSFmvr0FvyyPNypOn3dVfyGQ7/wEDoApP +LW49hL6vyDKyUymQFfewBZoKPPa5BpDJpeFdoDuw/qi2v/WJKFckOiGGceTciotB +VeweMCRZ0cBZuHivqlp03iWAMJjtMERvIXAc2xJTDtamKGaTLB/MTzwbgcW59nhv +0DI6CHLbaw5GF4WU87zvvPekXo7p6bVk5bdLRRIsTDe3YEMKTXEGAJQmNXQfu3o5 +XE475rgD4seTi4QsJUlF3X8jlGAfy+nN9quX92Hn+39igcjcCjBcGHzmzu/Hbh6H +fLPpysh7avRo/IOlDFa0urKNSgrHl5fFiDAVPRAIVBVycmczM/R8t84AJ1NlziTx +WmTnNi/yLgLCl99y6AIeoPc9tftoYAP6M6nmEm0G4amoXU48/tnnAGWsthlNe4N/ +NEfq4RhtsYsceavnnQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUOXEIAD7eyIbnkP/k/SEPziQZFvYwDQYJKoZIhvcN +AQEMBQADggIBAFBriE1gSM5a4yLOZ3yEp80c/ekMA4w2rwqHDmquV64B0Da78v25 +c8FftaiuTKL6ScsHRhY2vePIVzh+OOS/JTNgxtw3nGO7XpgeGrKC8K6mdxGAREeh +KcXwszrOmPC47NMOgAZ3IzBM/3lkYyJbd5NDS3Wz2ztuO0rd8ciutTeKlYg6EGhw +OLlbcH7VQ8n8X0/l5ns27vAg7UdXEyYQXhQGDXt2B8LGLRb0rqdsD7yID08sAraj +1yLmmUc12I2lT4ESOhF9s8wLdfMecKMbA+r6mujmLjY5zJnOOj8Mt674Q5mwk25v +qtkPajGRu5zTtCj7g0x6c4JQZ9IOrO1gxbJdNZjPh34eWR0kvFa62qRa2MzmvB4Q +jxuMjvPB27e+1LBbZY8WaPNWxSoZFk0PuGWHbSSDuGLc4EdhGoh7zk5//dzGDVqa +pPO1TPbdMaboHREhMzAEYX0c4D5PjT+1ixIAWn2poQDUg+twuxj4pNIcgS23CBHI +Jnu21OUPA0Zy1CVAHr5JXW2T8VyyO3VUaTqg7kwiuqya4gitRWMFSlI1dsQ09V4H +Mq3cfCbRW4+t5OaqG3Wf61206MCpFXxOSgdy30bJ1JGSdVaw4e43NmUoxRXIK3bM +bW8Zg/T92hXiQeczeUaDV/nxpbZt07zXU+fucW14qZen7iCcGRVyFT0EMEowCgYI +KwYBBQUHAwMMPFN5bWFudGVjIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkgLSBHNg== +-----END TRUSTED CERTIFICATE----- + +# Symantec Enterprise Mobile Root for Microsoft +-----BEGIN TRUSTED CERTIFICATE----- +MIIDvTCCAqWgAwIBAgIQD2tVL56/kHsPZimpvfTYzjANBgkqhkiG9w0BAQsFADBk +MQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xNjA0 +BgNVBAMTLVN5bWFudGVjIEVudGVycHJpc2UgTW9iaWxlIFJvb3QgZm9yIE1pY3Jv +c29mdDAeFw0xMjAzMTUwMDAwMDBaFw0zMjAzMTQyMzU5NTlaMGQxCzAJBgNVBAYT +AlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjE2MDQGA1UEAxMtU3lt +YW50ZWMgRW50ZXJwcmlzZSBNb2JpbGUgUm9vdCBmb3IgTWljcm9zb2Z0MIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtT2wcu6R6aVpnBFNevmz+j3ylJsj +t6YD7GIY/IUSIv7BcX1Uk7mRfWL2yqg4FWX4dz3lgiA61LXRbo0GSb3fgg4khefv +eC0Y8uALaEY+JBDIV+4ObXGm07FWHNcp1bLqVAUKqDyhuCVSBwWg3+fc7lw7QbWr +XDMy0s7r6Zb4QPQKujMd+FYDCYL1ZwfEwDTBXfxFu+o8mtV0cW3VhtPC/IW8VOuj +1fJP1UWvV7zwIsCPokXIdTR33qFtN3Kzc40Ma1O6WeGoPoBX0l9Z7mh1z4Gco8pF +jDfbBXI0HDIC+NX5LA3aWJ7EF7SbyZDEiFk/cZGQRBi+Iot5ki5CsIuXWwIDAQAB +o2swaTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAnBgNVHREEIDAe +pBwwGjEYMBYGA1UEAxMPTVBLSS0yMDQ4LTEtMTExMB0GA1UdDgQWBBRN7N8mBtwk +EMC2mfTXOcdvGfgmKDANBgkqhkiG9w0BAQsFAAOCAQEAqVdZ0AFUFEavx3lUDGoq +W9g6HYHkiKMxtPHzNfFGc1xDyf68omoZwL0vX8s4o21u6BRe8nh+RXrhu/Qum0Xr +4B1QHDRbf5iKhg+H2uRkJnf8Cd8jQU8On/oO+kSF8CmXpJTi9EAtkRx29Khg3nGm +sAXiT2nZGQuJOuD6qyv68bMy7fx8cGVe0HsRe53oWxpKdqR7UTmsfakMdDjou1Xf +xM7ApyFauBufAcWnEP59+WoImQHR9jVQOOT2Q+QY2IBM7McE4mGMfUntz7Sl8fKQ +kgkINXOgIzLK6ZyeHL4LByx3XhdM2pyC4YAbpfPa94i/vzkn+CT+sUvIl+3kEhQl +iDA7MAoGCCsGAQUFBwMDDC1TeW1hbnRlYyBFbnRlcnByaXNlIE1vYmlsZSBSb290 +IGZvciBNaWNyb3NvZnQ= +-----END TRUSTED CERTIFICATE----- + +# T-TeleSec GlobalRoot Class 2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6FuwjA0MBQGCCsGAQUFBwMEBggrBgEFBQcDAQwcVC1UZWxlU2VjIEdsb2Jh +bFJvb3QgQ2xhc3MgMg== +-----END TRUSTED CERTIFICATE----- + +# T-TeleSec GlobalRoot Class 3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgxMDAxMTAyOTU2WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN +8ELg63iIVl6bmlQdTQyK9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/ +RLyTPWGrTs0NvvAgJ1gORH8EGoel15YUNpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4 +hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZFiP0Zf3WHHx+xGwpzJFu5 +ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W0eDrXltM +EnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1 +A/d2O2GCahKqGFPrAyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOy +WL6ukK2YJ5f+AbGwUgC4TeQbIXQbfsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ +1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzTucpH9sry9uetuUg/vBa3wW30 +6gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7hP0HHRwA11fXT +91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml +e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4p +TpPDpFQUWzAqMAoGCCsGAQUFBwMBDBxULVRlbGVTZWMgR2xvYmFsUm9vdCBDbGFz +cyAz +-----END TRUSTED CERTIFICATE----- + +# TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIx +GDAWBgNVBAcTD0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxp +bXNlbCB2ZSBUZWtub2xvamlrIEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0w +KwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24gTWVya2V6aSAtIEthbXUgU00xNjA0 +BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRpZmlrYXNpIC0gU3Vy +dW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYDVQQG +EwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXll +IEJpbGltc2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklU +QUsxLTArBgNVBAsTJEthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBT +TTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kg +LSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr3UwM6q7 +a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y86Ij5iySr +LqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INr +N3wcwv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2X +YacQuFWQfw4tJzh03+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/ +iSIzL+aFCr2lqBs23tPcLG07xxO9WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4f +AJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQUZT/HiobGPN08VFw1+DrtUgxH +V8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh +AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPf +IPP54+M638yclNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4 +lzwDGrpDxpa5RXI4s6ehlj2Re37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c +8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0jq5Rm+K37DwhuJi1/FwcJsoz7UMCf +lo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeMwOzAKBggrBgEFBQcDAQwtVFVCSVRBSyBL +YW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kgLSBTdXJ1bSAx +-----END TRUSTED CERTIFICATE----- + +# TWCA Global Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0wNTAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBNUV0NBIEds +b2JhbCBSb290IENB +-----END TRUSTED CERTIFICATE----- + +# TWCA Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8HrzBDMB4GCCsGAQUFBwMEBggr +BgEFBQcDAQYIKwYBBQUHAwMMIVRXQ0EgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv +cml0eQ== +-----END TRUSTED CERTIFICATE----- + +# Telekom Security SMIME ECC Root 2021 +-----BEGIN TRUSTED CERTIFICATE----- +MIICRzCCAc2gAwIBAgIQFSrdFMkY0aRWQIamJa8HXzAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH +bWJIMS0wKwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIEVDQyBSb290IDIw +MjEwHhcNMjEwMzE4MTEwODMwWhcNNDYwMzE3MjM1OTU5WjBlMQswCQYDVQQGEwJE +RTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMS0wKwYD +VQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIEVDQyBSb290IDIwMjEwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAASwGY+ia7XHzQ8wmTcMw2Bb8fEnIFU9wJKLq1ehb3OD +IcJDEwxeiarHBTV5k2KQ1l0TH9F6oLyeEKdmfEYKsFdsv+ZUOTghbBJccczTWl9t +t6eG37Pf7sLniUGWNfYvSrWjQjBAMB0GA1UdDgQWBBQrywEMY8NTEqWoV6/QnIP7 +vZA6SzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQD +AwNoADBlAjEA1rxIkodHA8dwOyW2H65GZ3N0ACdL5KUEogPfXiitbl4DyN1onLa/ +lBBIlS8P/xiLAjABQDOel5dNBfJ0VAzNOf1qawnBJD9hjjiht+jXRBURYv8OYTdH +S0B/Sl+yZ1pzdcIwMjAKBggrBgEFBQcDBAwkVGVsZWtvbSBTZWN1cml0eSBTTUlN +RSBFQ0MgUm9vdCAyMDIx +-----END TRUSTED CERTIFICATE----- + +# Telekom Security SMIME RSA Root 2023 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFtzCCA5+gAwIBAgIQDH5i9XlzO51Djotj7ZGVuDANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 +eSBHbWJIMS0wKwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIFJTQSBSb290 +IDIwMjMwHhcNMjMwMzI4MTIwOTIyWhcNNDgwMzI3MjM1OTU5WjBlMQswCQYDVQQG +EwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMS0w +KwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIFJTQSBSb290IDIwMjMwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDvxQ6LvjLSZ0f/Ckxnsyq/yMPF +keu1xx6R4WaoiItVIIAfUV53l54ZClzHazchfAM2AfSIJdmoLkGq/Ngm4JZAYnmu +V54DOBocsncUPumhctDk4DfRF0btUFx6WMX4K/d1L8+BnlostzqsoFmYBFEM/0nF +UP0e00eFSzNPoje1rwSaJzKdVtU/VWHji2+uUf6X/mkH+mJbJuYUeRWlEziuXze+ +lErWDYAWaaSRsjpJmHWdRhCKXHp/hKXorx7Hq7NaRrWjS/WmIzYARrHbBbYbzp56 +Mlya1XLDnYZNK4TTHrWI2hB4nCLDOyO16xMHvW9T7Jvsm9Nl9QcJ412nmbV+ho7V +Av+3hQnjRxTdlmYYNN4I1d/LGJliCyvsAF1SRNPGlvwyViWRz80ZO5U5PgKHmWO2 +1T40eg8RdYG8fQTKYLQoddcCUd1SAC7H/YnxXPPLpCcSOI+7+4nw5MQ4LL6CoHFh +YpGPSAwvK6mw8csQBOd0vzeQ708qQzWXEsYqcA3eLFVHeWMp9cofagZSHK4tJCKD +Iq/QqjC3Kh//ZSNYZZPIjn1AEDGGeNlVyzww8N5RKgA20idFX9jooSE9fkZWOylF +8R0FCc62QzDcRZAQMEyka4aLPz0vMZFx7ya59r6dsGzfEe5YP0N5hjmA8SYXB5jw +maowLENZFM7t4kAThQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FJrOrCrsAfplcN6XnfHSAIylo2S7MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw +FoAUms6sKuwB+mVw3ped8dIAjKWjZLswDQYJKoZIhvcNAQEMBQADggIBAONQ/fVA +FiIJljoNqe+B5y4y8KHxSV57iA0Ecte+Z6i6He5Qu3JuetG7DHIwRsjV1wISFplO +Ht9alu6Pkb6uhvgQd6XEbkdhwPIm2U9haAVIdQgVpaF71biziXnm7fHzYQCGey4x +/qNc+Hk9tFuIe+Ajuw2hF/rLaA2Yd3EI4m1DdGvENsWUQaQA1lctmYqLIBIVAjIO +0knsgUjFaidS17JzVVOWPJ5PTLWg0E9X0GcoSGS+xri67GTPyHvFaucq5llXttbU +1sBnXNmeKAlAv/OpNTFlYAPLGWyClQMeXz/hvepJceVbtwtHFhsgiW2UmQx+iGwd +DfS3IRpZl6zL6L4XH5V8U5uvUFKqjQsur1rXYPIqaSq57lRwGKq99aE/0t2hYxkA ++KcM66N58nBZo/iiEgPsE//kAoY218HDpLXUpMI3RbaUcD3FveujFR3jNnoVaSpW +NDnPpZo2qsjtebzP9s4EUwvaslAjfLw+Jq3wDkO7JsuuwkDeNx8KoFHNY522T9jG +R3y82LTtnovzEeKotT7srnA+fiK7NUgXYGIUkTCjdj2mUTaLHw3dajEcpe3dlqNu +cg8TTaqnqVx4+QMSGJM3RRKJPfi+yr3ZvgzZGGSnyEE+dYIhOH1l9KDUE0sHeCn5 +nX7Mhz/E2i6I3eML3FpRWunZEk+eAtv3BSVRMDIwCgYIKwYBBQUHAwQMJFRlbGVr +b20gU2VjdXJpdHkgU01JTUUgUlNBIFJvb3QgMjAyMw== +-----END TRUSTED CERTIFICATE----- + +# Telekom Security TLS ECC Root 2020 +-----BEGIN TRUSTED CERTIFICATE----- +MIICQjCCAcmgAwIBAgIQNjqWjMlcsljN0AFdxeVXADAKBggqhkjOPQQDAzBjMQsw +CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH +bWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBFQ0MgUm9vdCAyMDIw +MB4XDTIwMDgyNTA3NDgyMFoXDTQ1MDgyNTIzNTk1OVowYzELMAkGA1UEBhMCREUx +JzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkGA1UE +AwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgRUNDIFJvb3QgMjAyMDB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABM6//leov9Wq9xCazbzREaK9Z0LMkOsVGJDZos0MKiXrPk/O +tdKPD/M12kOLAoC+b1EkHQ9rK8qfwm9QMuU3ILYg/4gND21Ju9sGpIeQkpT0CdDP +f8iAC8GXs7s1J8nCG6NCMEAwHQYDVR0OBBYEFONyzG6VmUex5rNhTNHLq+O6zd6f +MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2cA +MGQCMHVSi7ekEE+uShCLsoRbQuHmKjYC2qBuGT8lv9pZMo7k+5Dck2TOrbRBR2Di +z6fLHgIwN0GMZt9Ba9aDAEH9L1r3ULRn0SyocddDypwnJJGDSA3PzfdUga/sf+Rn +27iQ7t0lMDAwCgYIKwYBBQUHAwEMIlRlbGVrb20gU2VjdXJpdHkgVExTIEVDQyBS +b290IDIwMjA= +-----END TRUSTED CERTIFICATE----- + +# Telekom Security TLS RSA Root 2023 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFszCCA5ugAwIBAgIQIZxULej27HF3+k7ow3BXlzANBgkqhkiG9w0BAQwFADBj +MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 +eSBHbWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBSU0EgUm9vdCAy +MDIzMB4XDTIzMDMyODEyMTY0NVoXDTQ4MDMyNzIzNTk1OVowYzELMAkGA1UEBhMC +REUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkG +A1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMzCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAO01oYGA88tKaVvC+1GDrib94W7zgRJ9 +cUD/h3VCKSHtgVIs3xLBGYSJwb3FKNXVS2xE1kzbB5ZKVXrKNoIENqil/Cf2SfHV +cp6R+SPWcHu79ZvB7JPPGeplfohwoHP89v+1VmLhc2o0mD6CuKyVU/QBoCcHcqMA +U6DksquDOFczJZSfvkgdmOGjup5czQRxUX11eKvzWarE4GC+j4NSuHUaQTXtvPM6 +Y+mpFEXX5lLRbtLevOP1Czvm4MS9Q2QTps70mDdsipWol8hHD/BeEIvnHRz+sTug +BTNoBUGCwQMrAcjnj02r6LX2zWtEtefdi+zqJbQAIldNsLGyMcEWzv/9FIS3R/qy +8XDe24tsNlikfLMR0cN3f1+2JeANxdKz+bi4d9s3cXFH42AYTyS2dTd4uaNir73J +co4vzLuu2+QVUhkHM/tqty1LkCiCc/4YizWN26cEar7qwU02OxY2kTLvtkCJkUPg +8qKrBC7m8kwOFjQgrIfBLX7JZkcXFBGk8/ehJImr2BrIoVyxo/eMbcgByU/J7MT8 +rFEz0ciD0cmfHdRHNCk+y7AO+oMLKFjlKdw/fKifybYKu6boRhYPluV75Gp6SG12 +mAWl3G0eQh5C2hrgUve1g8Aae3g1LDj1H/1Joy7SWWO/gLCMk3PLNaaZlSJhZQNg ++y+TS/qanIA7AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtqeX +gj10hZv3PJ+TmpV5dVKMbUcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS2 +p5eCPXSFm/c8n5OalXl1UoxtRzANBgkqhkiG9w0BAQwFAAOCAgEAqMxhpr51nhVQ +pGv7qHBFfLp+sVr8WyP6Cnf4mHGCDG3gXkaqk/QeoMPhk9tLrbKmXauw1GLLXrtm +9S3ul0A8Yute1hTWjOKWi0FpkzXmuZlrYrShF2Y0pmtjxrlO8iLpWA1WQdH6DErw +M807u20hOq6OcrXDSvvpfeWxm4bu4uB9tPcy/SKE8YXJN3nptT+/XOR0so8RYgDd +GGah2XsjX/GO1WfoVNpbOms2b/mBsTNHM3dA+VKq3dSDz4V4mZqTuXNnQkYRIer+ +CqkbGmVps4+uFrb2S1ayLfmlyOw7YqPta9BO1UAJpB+Y1zqlklkg5LB9zVtzaL1t +xKITDmcZuI1CfmwMmm6gJC3VRRvcxAIU/oVbZZfKTpBQCHpCNfnqwmbU+AGuHrS+ +w6jv/naaoqYfRvaE7fzbzsQCzndILIyy7MMAo+wsVRjBfhnu4S/yrYObnqsZ38aK +L4x35bcF7DvB7L6Gs4a8wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+lj +X273CXE2whJdV/LItM3z7gLfEdxquVeEHVlNjM7IDiPCtyaaEBRx/pOyiriA8A4Q +ntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0o82bNSQ3+pCTE4FCxpgm +dTdmQRCsu/WU48IxK63nI1bMNSWSs1AwMDAKBggrBgEFBQcDAQwiVGVsZWtvbSBT +ZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMw== +-----END TRUSTED CERTIFICATE----- + +# TeliaSonera Root CA v1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVYwODAe +BggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMDDBZUZWxpYVNvbmVyYSBSb290 +IENBIHYx +-----END TRUSTED CERTIFICATE----- + +# Telia Root CA v2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx +CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE +AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 +NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ +MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq +AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 +vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 +lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD +n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT +7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o +6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC +TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 +WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R +DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI +pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj +YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy +rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw +AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ +8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi +0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM +A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS +SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K +TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF +6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er +3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt +Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT +VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW +ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA +rBPuUBQemMcwKDAUBggrBgEFBQcDBAYIKwYBBQUHAwEMEFRlbGlhIFJvb3QgQ0Eg +djI= +-----END TRUSTED CERTIFICATE----- + +# Thailand National Root Certification Authority - G1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIGgTCCBGmgAwIBAgIEUVLFjDANBgkqhkiG9w0BAQ0FADCBzzELMAkGA1UEBhMC +VEgxSTBHBgNVBAoMQEVsZWN0cm9uaWMgVHJhbnNhY3Rpb25zIERldmVsb3BtZW50 +IEFnZW5jeSAoUHVibGljIE9yZ2FuaXphdGlvbikxNzA1BgNVBAsMLlRoYWlsYW5k +IE5hdGlvbmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxPDA6BgNVBAMM +M1RoYWlsYW5kIE5hdGlvbmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMTAeFw0xMzAzMjcwOTQwMjJaFw0zNjAzMjcxMDEwMjJaMIHPMQswCQYDVQQG +EwJUSDFJMEcGA1UECgxARWxlY3Ryb25pYyBUcmFuc2FjdGlvbnMgRGV2ZWxvcG1l +bnQgQWdlbmN5IChQdWJsaWMgT3JnYW5pemF0aW9uKTE3MDUGA1UECwwuVGhhaWxh +bmQgTmF0aW9uYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTE8MDoGA1UE +AwwzVGhhaWxhbmQgTmF0aW9uYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEcxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA1rpK5Izxmi6J +F8JA84IAMf4TAnplygjYqyKxAppxNEpkWYLlQkbrI/aLWiKxzzbnc20UbfdJlF7v +5zRZZ/aoz1ZZI4RV4vsaEcqj+YqrZx6CE9CLOZq/D8IPPNZh2OqbzxUOvtTwzD9z +nAT0onFzfYCwnTHxBvmwE+WISTD2Fn2IVyk6LKKMkJjOERbOTVEP/MeyzPJmGCGA +BYitudDFC3gB/k7SCIs28VbPbrpzJgvW96VGamlOlranBlbM5i4xn26L7ZwAVUf0 +e6Z6tt8BHUgEC6tCwnBKlL38rFHyqz/W62DfCP/1ErKJKnq5RZklfXzvzxXQSCwQ +1tS8CCe1hinU49PEKpAS9qIq+YuvFv8C83puz6LLarTgcgv7PoV/4ofgL0Mj+IXJ +merWQN6g++fedv+PgDnrZxITpvvlo/wmgFlj8tIj6x/GSHNRnbezoFuraoj5v/tx +UdxutnbvsFvyy4gwugbbG0HTVbSttOogIfzUd7Y9W6EMLSUhUiNS1zRTbRYEUmb4 +1erxLFjyO7HxfkO13IK4XuOH4aOkX+eJDryc6Sk6JafYT2qH1JZElxgWh8JxUoXO +eoytHme+ui2/oyEnxecw6QaZG7AM475SZZNNYUvyOOaPGPECUpgupg4dBc8m7AEj +Bzb24BM3qUeIA4dHy92yAR9fZBsEm8UCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAQYwHwYDVR0jBBgwFoAUfyN2t4Mqcfcs0YgP3UxfMgpo +u38wHQYDVR0OBBYEFH8jdreDKnH3LNGID91MXzIKaLt/MA0GCSqGSIb3DQEBDQUA +A4ICAQANZRxaB6merEzJX0/dMWzZ4lMdP5GNWrOMvTSeLk3KWNOvWWJJNnOwYXYR +vos2x5Sq+DZpByDfXC8L9o4CFu9SBjjd7TRgqodeF844bVBN5d/lUb4dBJb03Orl +2eqO3p90y4KUU4Fs+14s1aF1lk37MFzNYaCeocyCuVJyC4djYXthNHS2Lt3i4Ye1 +SRRhFUdKSz53uQjSNk9YZ0KJgHhaEiPtRTvdvyAmVPxbP2ABGEHjZ3UTtyoVcMzL +edIU+PPC4CoQ9/lC2NzaCtMBBdtXmMm26wyZCsqMfe87FijA91/hR1HT+AZFB/AL +usKcmOzSf01+/Qb8c8LCVRJi0CNE3yLk+HnnpRBOPsmOqoPpNuqrecYFhM2WaHx0 +rD8y/67JQOyPUL9QqLdO1a02atcnM/rn2C3ZN5iFG6YM6nsQE3AenojF3D6OuQ1V +3wHO0El2UdsQYnhBrWljpZUJtxgGb/0EZ9QQD07bO18MY3zrZL1uSwCogfqSMoYw +jAm/fVg/ZQ2pN9FF42ZpxGj0YqmoHjfZLplJoLAGjEB/hbH18UxLOKAIzCrZlsDs +wA08LkVXw++V2rbL7ltlqCsyr8kn+RVTN3VYH0vql6IiXGdW4qDMNcSswzFAuZwD +er3JSA7qahXanLx4b8kV52QD2UkTZkVLLfSEmbPqpxKV5ZMu/DBBMAoGCCsGAQUF +BwMDDDNUaGFpbGFuZCBOYXRpb25hbCBSb290IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IC0gRzE= +-----END TRUSTED CERTIFICATE----- + +# Thawte Premium Server CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDJzCCApCgAwIBAgIBATANBgkqhkiG9w0BAQQFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYD +VQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlv +biBTZXJ2aWNlcyBEaXZpc2lvbjEhMB8GA1UEAxMYVGhhd3RlIFByZW1pdW0gU2Vy +dmVyIENBMSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNlcnZlckB0aGF3dGUuY29t +MB4XDTk2MDgwMTAwMDAwMFoXDTIwMTIzMTIzNTk1OVowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsG +A1UEChMUVGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRp +b24gU2VydmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNl +cnZlciBDQTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNv +bTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0jY2aovXwlue2oFBYo847kkE +VdbQ7xwblRZH7xhINTpS9CtqBo87L+pW46+GjZ4X9560ZXUCTe/LCaIhUdib0GfQ +ug2SBhRz1JPLlyoAnFxODLz6FVL88kRu2hFKbgifLy3j+ao6hnO2RlNYyIkFvYMR +uHM/qgeN9EJN50CdHDcCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG +9w0BAQQFAAOBgQAmSCwWwlj66BZ0DKqqX1Q/8tfJeGBeXm43YyJ3Nn6yF8Q0ufUI +hfzJATj/Tb7yFkJD57taRvvBxhEf8UqwKEbJw8RCfbz6q1lu1bdRiBHjpIUZa4JM +pAwSremkrj/xw0llmozFyD4lt5SZu5IycQfwhl7tUCemDaYj+bvLpgcUQjAmMAoG +CCsGAQUFBwMDDBhUaGF3dGUgUHJlbWl1bSBTZXJ2ZXIgQ0E= +-----END TRUSTED CERTIFICATE----- + +# Thawte Server CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDEzCCAnygAwIBAgIBATANBgkqhkiG9w0BAQQFADCBxDELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYD +VQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlv +biBTZXJ2aWNlcyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEm +MCQGCSqGSIb3DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wHhcNOTYwODAx +MDAwMDAwWhcNMjAxMjMxMjM1OTU5WjCBxDELMAkGA1UEBhMCWkExFTATBgNVBAgT +DFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYDVQQKExRUaGF3 +dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNl +cyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEmMCQGCSqGSIb3 +DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBANOkUG7I/1Zr5s9dtuoMaHVHoqrC2oQl/Kj0R1HahbUgdJSGHg91 +yekIYfUGbTBuFRkC6VLAYttNmZ7iagxEOM3+vuNkCXDF/rFrKbYvScg71CcEJRCX +L+eQbcAoQpnXTEPew/UhbVSfXcNY4cDk2VuwuNy0e982OsK1ZiIS1ocNAgMBAAGj +EzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAB/pMaVz7lcxG +7oWDTSEwjsrZqG9JGubaUeNgcGyEYRGhGshIPllDfU+VPaGLtwtimHp1it2ITk6e +QNuozDJ0uW8NxuOzRAvZim+aKZuZGCg70eNAKJpaPNW15yAbi8qkq43pUdniTCxZ +qdq5snUb9kLy78fyGPmJvKP/iiMucEcwHjAKBggrBgEFBQcDAwwQVGhhd3RlIFNl +cnZlciBDQQ== +-----END TRUSTED CERTIFICATE----- + +# TrustAsia Global Root CA G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFpTCCA42gAwIBAgIUZPYOZXdhaqs7tOqFhLuxibhxkw8wDQYJKoZIhvcNAQEM +BQAwWjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dp +ZXMsIEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHMzAe +Fw0yMTA1MjAwMjEwMTlaFw00NjA1MTkwMjEwMTlaMFoxCzAJBgNVBAYTAkNOMSUw +IwYDVQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtU +cnVzdEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQDAMYJhkuSUGwoqZdC+BqmHO1ES6nBBruL7dOoKjbmzTNyPtxNS +T1QY4SxzlZHFZjtqz6xjbYdT8PfxObegQ2OwxANdV6nnRM7EoYNl9lA+sX4WuDqK +AtCWHwDNBSHvBm3dIZwZQ0WhxeiAysKtQGIXBsaqvPPW5vxQfmZCHzyLpnl5hkA1 +nyDvP+uLRx+PjsXUjrYsyUQE49RDdT/VP68czH5GX6zfZBCK70bwkPAPLfSIC7Ep +qq+FqklYqL9joDiR5rPmd2jE+SoZhLsO4fWvieylL1AgdB4SQXMeJNnKziyhWTXA +yB1GJ2Faj/lN03J5Zh6fFZAhLf3ti1ZwA0pJPn9pMRJpxx5cynoTi+jm9WAPzJMs +hH/x/Gr8m0ed262IPfN2dTPXS6TIi/n1Q1hPy8gDVI+lhXgEGvNz8teHHUGf59gX +zhqcD0r83ERoVGjiQTz+LISGNzzNPy+i2+f3VANfWdP3kXjHi3dqFuVJhZBFcnAv +kV34PmVACxmZySYgWmjBNb9Pp1Hx2BErW+Canig7CjoKH8GB5S7wprlppYiU5msT +f9FkPz2ccEblooV7WIQn3MSAPmeamseaMQ4w7OYXQJXZRe0Blqq/DPNL0WP3E1jA +uPP6Z92bfW1K/zJMtSU7/xxnD4UiWQWRkUF3gdCFTIcQcf+eQxuulXUtgQIDAQAB +o2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFEDk5PIj7zjKsK5Xf/Ih +MBY027ySMB0GA1UdDgQWBBRA5OTyI+84yrCuV3/yITAWNNu8kjAOBgNVHQ8BAf8E +BAMCAQYwDQYJKoZIhvcNAQEMBQADggIBACY7UeFNOPMyGLS0XuFlXsSUT9SnYaP4 +wM8zAQLpw6o1D/GUE3d3NZ4tVlFEbuHGLige/9rsR82XRBf34EzC4Xx8MnpmyFq2 +XFNFV1pF1AWZLy4jVe5jaN/TG3inEpQGAHUNcoTpLrxaatXeL1nHo+zSh2bbt1S1 +JKv0Q3jbSwTEb93mPmY+KfJLaHEih6D4sTNjduMNhXJEIlU/HHzp/LgV6FL6qj6j +ITk1dImmasI5+njPtqzn59ZW/yOSLlALqbUHM/Q4X6RJpstlcHboCoWASzY9M/eV +VHUl2qzEc4Jl6VL1XP04lQJqaTDFHApXB64ipCz5xUG3uOyfT0gA+QEEVcys+TIx +xHWVBqB/0Y0n3bOppHKH/lmLmnp0Ft0WpWIp6zqW3IunaFnT63eROfjXy9mPX1on +AX1daBli2MjN9LdyR75bl87yraKZk62Uy5P2EgmVtqvXO9A/EcswFi55gORngS1d +7XB4tmBZrOFdRWOPyN9yaFvqHbgB8X7754qz41SgOAngPN5C8sLtLpvzHzW2Ntjj +gKGLzZlkD8Kqq7HK9W+eQ42EVJmzbsASZthwEPEGNTNDqJwuuhQxzhB/HIbjj9LV ++Hfsm6vxL2PZQl/gZ4FkkfGXL/xuJvYz+NO1+MRiqzFRJQJ6+N1rZdVtTTDIZbpo +FGWsJwt0ivKHMDMwFAYIKwYBBQUHAwQGCCsGAQUFBwMBDBtUcnVzdEFzaWEgR2xv +YmFsIFJvb3QgQ0EgRzM= +-----END TRUSTED CERTIFICATE----- + +# TrustAsia Global Root CA G4 +-----BEGIN TRUSTED CERTIFICATE----- +MIICVTCCAdygAwIBAgIUTyNkuI6XY57GU4HBdk7LKnQV1tcwCgYIKoZIzj0EAwMw +WjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs +IEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHNDAeFw0y +MTA1MjAwMjEwMjJaFw00NjA1MTkwMjEwMjJaMFoxCzAJBgNVBAYTAkNOMSUwIwYD +VQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtUcnVz +dEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATx +s8045CVD5d4ZCbuBeaIVXxVjAd7Cq92zphtnS4CDr5nLrBfbK5bKfFJV4hrhPVbw +LxYI+hW8m7tH5j/uqOFMjPXTNvk4XatwmkcN4oFBButJ+bAp3TPsUKV/eSm4IJij +YzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUpbtKl86zK3+kMd6Xg1mD +pm9xy94wHQYDVR0OBBYEFKW7SpfOsyt/pDHel4NZg6ZvccveMA4GA1UdDwEB/wQE +AwIBBjAKBggqhkjOPQQDAwNnADBkAjBe8usGzEkxn0AAbbd+NvBNEU/zy4k6LHiR +UKNbwMp1JvK/kF0LgoxgKJ/GcJpo5PECMFxYDlZ2z1jD1xCMuo6u47xkdUfFVZDj +/bpV6wfEU6s3qe4hsiFbYI89MvHVI5TWWDAzMBQGCCsGAQUFBwMEBggrBgEFBQcD +AQwbVHJ1c3RBc2lhIEdsb2JhbCBSb290IENBIEc0 +-----END TRUSTED CERTIFICATE----- + +# Trustwave Global Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHkwSjAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsGAQUFBwMD +DChUcnVzdHdhdmUgR2xvYmFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# Trustwave Global ECC P256 Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7MFMwHgYIKwYBBQUH +AwQGCCsGAQUFBwMBBggrBgEFBQcDAwwxVHJ1c3R3YXZlIEdsb2JhbCBFQ0MgUDI1 +NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# Trustwave Global ECC P384 Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +SzBTMB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMMVRydXN0d2F2ZSBH +bG9iYWwgRUNDIFAzODQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk= +-----END TRUSTED CERTIFICATE----- + +# TunTrust Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFszCCA5ugAwIBAgIUEwLV4kBMkkaGFmddtLu7sms+/BMwDQYJKoZIhvcNAQEL +BQAwYTELMAkGA1UEBhMCVE4xNzA1BgNVBAoMLkFnZW5jZSBOYXRpb25hbGUgZGUg +Q2VydGlmaWNhdGlvbiBFbGVjdHJvbmlxdWUxGTAXBgNVBAMMEFR1blRydXN0IFJv +b3QgQ0EwHhcNMTkwNDI2MDg1NzU2WhcNNDQwNDI2MDg1NzU2WjBhMQswCQYDVQQG +EwJUTjE3MDUGA1UECgwuQWdlbmNlIE5hdGlvbmFsZSBkZSBDZXJ0aWZpY2F0aW9u +IEVsZWN0cm9uaXF1ZTEZMBcGA1UEAwwQVHVuVHJ1c3QgUm9vdCBDQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMPN0/y9BFPdDCA61YguBUtB9YOCfvdZ +n56eY+hz2vYGqU8ftPkLHzmMmiDQfgbU7DTZhrx1W4eI8NLZ1KMKsmwb60ksPqxd +2JQDoOw05TDENX37Jk0bbjBU2PWARZw5rZzJJQRNmpA+TkBuimvNKWfGzC3gdOgF +VwpIUPp6Q9p+7FuaDmJ2/uqdHYVy7BG7NegfJ7/Boce7SBbdVtfMTqDhuazb1YMZ +GoXRlJfXyqNlC/M4+QKu3fZnz8k/9YosRxqZbwUN/dAdgjH8KcwAWJeRTIAAHDOF +li/LQcKLEITDCSSJH7UP2dl3RxiSlGBcx5kDPP73lad9UKGAwqmDrViWVSHbhlnU +r8a83YFuB9tgYv7sEG7aaAH0gxupPqJbI9dkxt/con3YS7qC0lH4Zr8GRuR5KiY2 +eY8fTpkdso8MDhz/yV3A/ZAQprE38806JG60hZC/gLkMjNWb1sjxVj8agIl6qeIb +MlEsPvLfe/ZdeikZjuXIvTZxi11Mwh0/rViizz1wTaZQmCXcI/m4WEEIcb9PuISg +jwBUFfyRbVinljvrS5YnzWuioYasDXxU5mZMZl+QviGaAkYt5IPCgLnPSz7ofzwB +7I9ezX/SKEIBlYrilz0QIX32nRzFNKHsLA4KUiwSVXAkPcvCFDVDXSdOvsC9qnyW +5/yeYa1E0wCXAgMBAAGjYzBhMB0GA1UdDgQWBBQGmpsfU33x9aTI04Y+oXNZtPdE +ITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFAaamx9TffH1pMjThj6hc1m0 +90QhMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAqgVutt0Vyb+z +xiD2BkewhpMl0425yAA/l/VSJ4hxyXT968pk21vvHl26v9Hr7lxpuhbI87mP0zYu +QEkHDVneixCwSQXi/5E/S7fdAo74gShczNxtr18UnH1YeA32gAm56Q6XKRm4t+v4 +FstVEuTGfbvE7Pi1HE4+Z7/FXxttbUcoqgRYYdZ2vyJ/0Adqp2RT8JeNnYA/u8EH +22Wv5psymsNUk8QcCMNE+3tjEUPRahphanltkE8pjkcFwRJpadbGNjHh/PqAulxP +xOu3Mqz4dWEX1xAZufHSCe96Qp1bWgvUxpVOKs7/B9dPfhgGiPEZtdmYu65xxBzn +dFlY7wyJz4sfdZMaBBSSSFCp61cpABbjNhzI+L/wM9VBD8TMPN3pM0MBkRArHtG5 +Xc0yGYuPjCB31yLEQtyEFpslbei0VXF/sHyz03FJuc9SpAQ/3D2gu68zngowYI7b +nV2UqL1g52KAdoGDDIzMMEZJ4gzSqK/rYXHv5yJiqfdcZGyfFoxnNidF9Ql7v/YQ +CvGwjVRDjAS6oz/v4jXH+XTgbzRB0L9zZVcg+ZtnemZoJE6AZb0QmQZZ8mWvuMZH +u/2QeItBcy6vVR/cO5JyboTT0GFMDcx2V+IthSIVNg3rAZ3r2OvEhJn7wAzMMujj +d9qDRIueVSjAi1jTkD5OGwDxFa2DK5owHjAKBggrBgEFBQcDAQwQVHVuVHJ1c3Qg +Um9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# Tunisian Root Certificate Authority - TunRootCA2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFvDCCA6SgAwIBAgIQIWYVBQUnBQW8irAdrwq+xDANBgkqhkiG9w0BAQsFADB4 +MQswCQYDVQQGEwJUTjE5MDcGA1UEAxMwVHVuaXNpYW4gUm9vdCBDZXJ0aWZpY2F0 +ZSBBdXRob3JpdHkgLSBUdW5Sb290Q0EyMS4wLAYDVQQKEyVOYXRpb25hbCBEaWdp +dGFsIENlcnRpZmljYXRpb24gQWdlbmN5MB4XDTE1MDUwNTA4NTcwMVoXDTI3MDUw +NTA4NTcwMVoweDELMAkGA1UEBhMCVE4xOTA3BgNVBAMTMFR1bmlzaWFuIFJvb3Qg +Q2VydGlmaWNhdGUgQXV0aG9yaXR5IC0gVHVuUm9vdENBMjEuMCwGA1UEChMlTmF0 +aW9uYWwgRGlnaXRhbCBDZXJ0aWZpY2F0aW9uIEFnZW5jeTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBALAH52L70A1Vzme3V41uDKknVB7rqSSrZ4+PnGEP +2ygyLzv4LGWSLa66M5LAK57yH15tI12zWB+NocBtdYUKsBNOW1ZGizm9C4K7OkOb +CLpG7vkX683I1+N1E96uUUgKziCVRp8C7FWMdKpa/PzqCTM1bqNHBsfdfoRoDscS +ypTD7eZsAm3eAok1swTLRfh8R6TTH9/lXCPi8yJ7uUui/Rc1XUjpv/WzJWOL53jr +/HUnvYhcpoU/Qd+VfN16Ro/+Htqxq9jTjs0GjMnYUkIRUqKDj1yDe+Qnto8foF49 +0nV9eVOTBpfjA8eWLNoBPHnFO1DosNOhpOLTg31E+BDPoBoq8mWAvXfBmGV2rhIh +Yso6vr61mcNbxNG/m8AKylgeFabXIV6xTQrlcHiaaOZ0ZjIUKh4Rvoj3BvZVo8Mf +bheQVdGKQIlWQ9VP5qLJiGQABVE/V7Q8tr5qkXFA8aJc8dftnLZX9lnUKhHl1OW/ +ux7RyNdfRAWbu4k6radDd34VYHyIXZvspVzSRq0Mi1RF1JRRVUVSqlzYEaz4ViJs +2dIU6bdOQoVURvgBxj0mBnfosjUb8J1CyX/+gCcBUMt/xaxU+mttloxBpKHS57WR +SG93HIvCK3T+PFzEXZTOq/EglmvBDFpf+eU1uWyjEGfvkapIDu9It3ZYYtm+nkKz +pL01AgMBAAGjQjBAMB0GA1UdDgQWBBTMc8Wjaikxl6eNoNhUwQp1tiM/pjAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEA +LvKHSO2Znp8BDDzJCnhTfBg13rblbPQAgOGbi9n6+6r7ZbfSyfXXp8t+ybGicVht +WTfW4DMQyrXZcttOJTeqpt0dGL31yYqceojuHwLELZJUfVfiXBkYIwJ6XEmVtpjn +wmBBZUC77Fq3cZxQ8nN2+18N7zXPtGmNhehMkBcDC8mzLiA3YxFipk/jNOD7eVXn +xsKuQv6wNGxJIw5yB3tmBVVI+xIPoMD6TtH7Pcz+/RZLVlDNESynm/exCs+m6+/d +jriuQgh8pIyU6obHQ+P3PIrfR9IwQMgtU/VvEUnMIYyWQ08QoEehVo0fHFvYVlvr +NHbhNTpx1MwhL541KPJa3p7k7kdqEOg4vUq0fQR/Ba5ICrQDvy6zChufy63dTdCH +IbdHdoKDLcdXvpoVoxswGGyjOnFvZEcoktsRYSCad2Ut+axWE2xLo1//m6To7+dY +6HueO39qp745ChOUyUhOZmTYU0zsQWv9/DYu1w7fYQt7tUCs3UJJbZ6Av2CV8OnA +P3u7GOk4tVZOp36KYu+YHvh4QKm72OnltLT542ec7FPPuEK0L5OBNaBs9rogimg9 +923/f9NM93qUaAN3Qzs1UapTEj5HExQ5rNZlj6hG/zwh9NK/0EikfqdRm5cS9Zk0 +FyNWhBNjyzTKH8q6qAcp80MkCkl//Q7UkPCrQyFinI8wPjAKBggrBgEFBQcDAwww +VHVuaXNpYW4gUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBUdW5Sb290Q0Ey +-----END TRUSTED CERTIFICATE----- + +# TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFFzCCA/+gAwIBAgIBETANBgkqhkiG9w0BAQUFADCCASsxCzAJBgNVBAYTAlRS +MRgwFgYDVQQHDA9HZWJ6ZSAtIEtvY2FlbGkxRzBFBgNVBAoMPlTDvHJraXllIEJp +bGltc2VsIHZlIFRla25vbG9qaWsgQXJhxZ90xLFybWEgS3VydW11IC0gVMOcQsSw +VEFLMUgwRgYDVQQLDD9VbHVzYWwgRWxla3Ryb25payB2ZSBLcmlwdG9sb2ppIEFy +YcWfdMSxcm1hIEVuc3RpdMO8c8O8IC0gVUVLQUUxIzAhBgNVBAsMGkthbXUgU2Vy +dGlmaWthc3lvbiBNZXJrZXppMUowSAYDVQQDDEFUw5xCxLBUQUsgVUVLQUUgS8O2 +ayBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSAtIFPDvHLDvG0gMzAe +Fw0wNzA4MjQxMTM3MDdaFw0xNzA4MjExMTM3MDdaMIIBKzELMAkGA1UEBhMCVFIx +GDAWBgNVBAcMD0dlYnplIC0gS29jYWVsaTFHMEUGA1UECgw+VMO8cmtpeWUgQmls +aW1zZWwgdmUgVGVrbm9sb2ppayBBcmHFn3TEsXJtYSBLdXJ1bXUgLSBUw5xCxLBU +QUsxSDBGBgNVBAsMP1VsdXNhbCBFbGVrdHJvbmlrIHZlIEtyaXB0b2xvamkgQXJh +xZ90xLFybWEgRW5zdGl0w7xzw7wgLSBVRUtBRTEjMCEGA1UECwwaS2FtdSBTZXJ0 +aWZpa2FzeW9uIE1lcmtlemkxSjBIBgNVBAMMQVTDnELEsFRBSyBVRUtBRSBLw7Zr +IFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIC0gU8O8csO8bSAzMIIB +IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAim1L/xCIOsP2fpTo6iBkcK4h +gb46ezzb8R1Sf1n68yJMlaCQvEhOEav7t7WNeoMojCZG2E6VQIdhn8WebYGHV2yK +O7Rm6sxA/OOqbLLLAdsyv9Lrhc+hDVXDWzhXcLh1xnnRFDDtG1hba+818qEhTsXO +fJlfbLm4IpNQp81McGq+agV/E5wrHur+R84EpW+sky58K5+eeROR6Oqeyjh1jmKw +lZMq5d/pXpduIF9fhHpEORlAHLpVK/swsoHvhOPc7Jg4OQOFCKlUAwUp8MmPi+oL +hmUZEdPpCSPeaJMDyTYcIW7OjGbxmTDY17PDHfiBLqi9ggtm/oLL4eAagsNAgQID +AQABo0IwQDAdBgNVHQ4EFgQUvYiHyY/2pAoLquvF/pEjnatKijIwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAB18+kmP +NOm3JpIWmgV050vQbTlswyb2zrgxvMTfvCr4N5EY3ATIZJkrGG2AA1nJrvhY0D7t +wyOfaTyGOBye79oneNGEN3GKPEs5z35FBtYt2IpNeBLWrcLTy9LQQfMmNkqblWwM +7uXRQydmwYj3erMgbOqwaSvHIOgMA8RBBZniP+Rr+KCGgceExh/VS4ESshYhLBOh +gLJeDEoTniDYYkCrkOpkSi+sDQESeUWoL4cZaMjihccwsnX5OD+ywJO0a+IDRM5n +oN+J1q2MdqMTw5RhK2vZbMEHCiIHhWyFJEapvj+LeISCfiQMnf2BN+MlqO02TpUs +yZyQ2uypQjyttgIwTzAKBggrBgEFBQcDAwxBVMOcQsSwVEFLIFVFS0FFIEvDtmsg +U2VydGlmaWthIEhpem1ldCBTYcSfbGF5xLFjxLFzxLEgLSBTw7xyw7xtIDM= +-----END TRUSTED CERTIFICATE----- + +# UCA Extended Validation Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF +eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx +MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV +BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog +D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS +sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop +O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk +sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi +c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj +VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz +KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ +TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G +sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs +1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD +fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T +AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN +l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR +ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ +VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 +c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp +4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s +t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj +2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO +vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C +xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx +cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM +fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1axMDQwFAYIKwYBBQUHAwEGCCsG +AQUFBwMDDBxVQ0EgRXh0ZW5kZWQgVmFsaWRhdGlvbiBSb290 +-----END TRUSTED CERTIFICATE----- + +# UCA Global G2 Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0DA0MB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMElVD +QSBHbG9iYWwgRzIgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# UCA Global Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIFkjCCA3qgAwIBAgIBCDANBgkqhkiG9w0BAQUFADA6MQswCQYDVQQGEwJDTjER +MA8GA1UEChMIVW5pVHJ1c3QxGDAWBgNVBAMTD1VDQSBHbG9iYWwgUm9vdDAeFw0w +ODAxMDEwMDAwMDBaFw0zNzEyMzEwMDAwMDBaMDoxCzAJBgNVBAYTAkNOMREwDwYD +VQQKEwhVbmlUcnVzdDEYMBYGA1UEAxMPVUNBIEdsb2JhbCBSb290MIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA2rPlBlA/9nP3xDK/RqUlYjOHsGj+p9+I +A2N9Apb964fJ7uIIu527u+RBj8cwiQ9tJMAEbBSUgU2gDXRm8/CFr/hkGd656YGT +0CiFmUdCSiw8OCdKzP/5bBnXtfPvm65bNAbXj6ITBpyKhELVs6OQaG2BkO5NhOxM +cE4t3iQ5zhkAQ5N4+QiGHUPR9HK8BcBn+sBR0smFBySuOR56zUHSNqth6iur8CBV +mTxtLRwuLnWW2HKX4AzKaXPudSsVCeCObbvaE/9GqOgADKwHLx25urnRoPeZnnRc +GQVmMc8+KlL+b5/zub35wYH1N9ouTIElXfbZlJrTNYsgKDdfUet9Ysepk9H50DTL +qScmLCiQkjtVY7cXDlRzq6987DqrcDOsIfsiJrOGrCOp139tywgg8q9A9f9ER3Hd +J90TKKHqdjn5EKCgTUCkJ7JZFStsLSS3JGN490MYeg9NEePorIdCjedYcaSrbqLA +l3y74xNLytu7awj5abQEctXDRrl36v+6++nwOgw19o8PrgaEFt2UVdTvyie3AzzF +HCYq9TyopZWbhvGKiWf4xwxmse1Bv4KmAGg6IjTuHuvlb4l0T2qqaqhXZ1LUIGHB +zlPL/SR/XybfoQhplqCe/klD4tPq2sTxiDEhbhzhzfN1DiBEFsx9c3Q1RSw7gdQg +7LYJjD5IskkCAwEAAaOBojCBnzALBgNVHQ8EBAMCAQYwDAYDVR0TBAUwAwEB/zBj +BgNVHSUEXDBaBggrBgEFBQcDAQYIKwYBBQUHAwIGCCsGAQUFBwMDBggrBgEFBQcD +BAYIKwYBBQUHAwUGCCsGAQUFBwMGBggrBgEFBQcDBwYIKwYBBQUHAwgGCCsGAQUF +BwMJMB0GA1UdDgQWBBTZw9P4gJJnzF3SOqLXcaK0xDiALTANBgkqhkiG9w0BAQUF +AAOCAgEA0Ih5ygiq9ws0oE4Jwul+NUiJcIQjL1HDKy9e21NrW3UIKlS6Mg7VxnGF +sZdJgPaE0PC6t3GUyHlrpsVE6EKirSUtVy/m1jEp+hmJVCl+t35HNmktbjK81HXa +QnO4TuWDQHOyXd/URHOmYgvbqm4FjMh/Rk85hZCdvBtUKayl1/7lWFZXbSyZoUkh +1WHGjGHhdSTBAd0tGzbDLxLMC9Z4i3WA6UG5iLHKPKkWxk4V43I29tSgQYWvimVw +TbVEEFDs7d9t5tnGwBLxSzovc+k8qe4bqi81pZufTcU0hF8mFGmzI7GJchT46U1R +IgP/SobEHOh7eQrbRyWBfvw0hKxZuFhD5D1DCVR0wtD92e9uWfdyYJl2b/Unp7uD +pEqB7CmB9HdL4UISVdSGKhK28FWbAS7d9qjjGcPORy/AeGEYWsdl/J1GW1fcfA67 +loMQfFUYCQSu0feLKj6g5lDWMDbX54s4U+xJRODPpN/xU3uLWrb2EZBL1nXz/gLz +Ka/wI3J9FO2pXd96gZ6bkiL8HvgBRUGXx2sBYb4zaPKgZYRmvOAqpGjTcezHCN6j +w8k2SjTxF+KAryAhk5Qe5hXTVGLxtTgv48y5ZwSpuuXu+RBuyy5+E6+SFP7zJ3N7 +OPxzbbm5iPZujAv1/P8JDrMtXnt145Ik4ubhWD5LKAN1axibRwwwHTAKBggrBgEF +BQcDAwwPVUNBIEdsb2JhbCBSb290 +-----END TRUSTED CERTIFICATE----- + +# UCA Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIDhDCCAmygAwIBAgIBCTANBgkqhkiG9w0BAQUFADAzMQswCQYDVQQGEwJDTjER +MA8GA1UEChMIVW5pVHJ1c3QxETAPBgNVBAMTCFVDQSBSb290MB4XDTA0MDEwMTAw +MDAwMFoXDTI5MTIzMTAwMDAwMFowMzELMAkGA1UEBhMCQ04xETAPBgNVBAoTCFVu +aVRydXN0MREwDwYDVQQDEwhVQ0EgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBALNdB8qGJn1r4vs4CQ7MgsJqGgCiFV/W6dQBt1YDAVmP9ThpJHbC +XivF9iu/r/tB/Q9a/KvXg3BNMJjRnrJ2u5LWu+kQKGkoNkTo8SzXWHwk1n8COvCB +a2FgP/Qz3m3l6ihST/ypHWN8C7rqrsRoRuTej8GnsrZYWm0dLNmMOreIy4XU9+gD +Xv2yTVDo1h//rgI/i0+WITyb1yXJHT/7mLFZ5PCpO6+zzYUs4mBGzG+OoOvwNMXx +QhhgrhLtRnUc5dipllq+3lrWeGeWW5N3UPJuG96WUUqm1ktDdSFmjXfsAoR2XEQQ +th1hbOSjIH23jboPkXXHjd+8AmCoKai9PUMCAwEAAaOBojCBnzALBgNVHQ8EBAMC +AQYwDAYDVR0TBAUwAwEB/zBjBgNVHSUEXDBaBggrBgEFBQcDAQYIKwYBBQUHAwIG +CCsGAQUFBwMDBggrBgEFBQcDBAYIKwYBBQUHAwUGCCsGAQUFBwMGBggrBgEFBQcD +BwYIKwYBBQUHAwgGCCsGAQUFBwMJMB0GA1UdDgQWBBTbHzXza0z/QjFkm827Wh4d +SBC37jANBgkqhkiG9w0BAQUFAAOCAQEAOGy3iPGt+lg3dNHocN6cJ1nL5BXXoMNg +14iABMUwTD3UGusGXllH5rxmy+AI/Og17GJ9ysDawXiv5UZv+4mCI4/211NmVaDe +JRI7cTYWVRJ2+z34VFsxugAG+H1V5ad2g6pcSpemKijfvcZsCyOVjjN/Hl5AHxNU +LJzltQ7dFyiuawHTUin1Ih+QOfTcYmjwPIZH7LgFRbu3DJaUxmfLI3HQjnQi1kHr +A6i26r7EARK1s11AdgYg1GS4KUYGis4fk5oQ7vuqWrTcL9Ury/bXBYSYBZELhPc9 ++tb5evosFeo2gkO3t7jj83EB7UNDogVFwygFBzXjAaU4HoDU18PZ3jAWMAoGCCsG +AQUFBwMDDAhVQ0EgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# USERTrust ECC Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1XahgwRzAeBggrBgEFBQcD +BAYIKwYBBQUHAwEGCCsGAQUFBwMDDCVVU0VSVHJ1c3QgRUNDIENlcnRpZmljYXRp +b24gQXV0aG9yaXR5 +-----END TRUSTED CERTIFICATE----- + +# USERTrust RSA Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9MEcwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEF +BQcDAwwlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# UTN-USERFirst-Object +-----BEGIN TRUSTED CERTIFICATE----- +MIIEZjCCA06gAwIBAgIQRL4Mi1AAJLQR0zYt4LNfGzANBgkqhkiG9w0BAQUFADCB +lTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2Ug +Q2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExho +dHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VSRmlyc3Qt +T2JqZWN0MB4XDTk5MDcwOTE4MzEyMFoXDTE5MDcwOTE4NDAzNlowgZUxCzAJBgNV +BAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAc +BgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3 +dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0LU9iamVjdDCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6qgT+jo2F4qjEAVZURnicP +HxzfOpuCaDDASmEd8S8O+r5596Uj71VRloTN2+O5bj4x2AogZ8f02b+U60cEPgLO +KqJdhwQJ9jCdGIqXsqoc/EHSoTbL+z2RuufZcDX65OeQw5ujm9M89RKZd7G3CeBo +5hy485RjiGpq/gt2yb70IuRnuasaXnfBhQfdDWy/7gbHd2pBnqcP1/vulBe3/IW+ +pKvEHDHd17bR5PDv3xaPslKT16HUiaEHLr/hARJCHhrh2JU022R5KP+6LhHC5ehb +kkj7RwvCbNqtMoNB86XlQXD9ZZBt+vpRxPm9lisZBCzTbafc8H9vg2XiaquHhnUC +AwEAAaOBrzCBrDALBgNVHQ8EBAMCAcYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU2u1kdBScFDyr3ZmpvVsoTYs8ydgwQgYDVR0fBDswOTA3oDWgM4YxaHR0cDov +L2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0LmNybDApBgNV +HSUEIjAgBggrBgEFBQcDAwYIKwYBBQUHAwgGCisGAQQBgjcKAwQwDQYJKoZIhvcN +AQEFBQADggEBAAgfUrE3RHjb/c652pWWmKpVZIC1WkDdIaXFwfNfLEzIR1pp6ujw +NTX00CXzyKakh0q9G7FzCL3Uw8q2NbtZhncxzaeAFK4T7/yxSPlrJSUtUbYsbUXB +mMiKVl0+7kNOPmsnjtA6S4ULX9Ptaqd1y9Fahy85dRNacrACgZ++8A+EVCBibGnU +4U3GDZlDAQ0Slox4nb9QorFEqmrPF3rPbw/U+CRVX/A0FklmPlBGyWNxODFiuGK5 +81OtbLUrohKqGU8J2l7nk8aOFAj+8DCAGKCGhU3IfdeLA/5u1fedFqySLKAj5ZyR +Uh+U3xeUc8OzwcFxBSAAeL0TUh2oPs0AH8gwIjAKBggrBgEFBQcDAwwUVVROLVVT +RVJGaXJzdC1PYmplY3Q= +-----END TRUSTED CERTIFICATE----- + +# VAS Latvijas Pasts SSI(RCA) +-----BEGIN TRUSTED CERTIFICATE----- +MIIHqTCCBZGgAwIBAgIQYwaGp8U3ZaVDkKhqWMzUMjANBgkqhkiG9w0BAQUFADCB +jzELMAkGA1UEBhMCTFYxNTAzBgNVBAoTLFZBUyBMYXR2aWphcyBQYXN0cyAtIFZp +ZW4ucmVnLk5yLjQwMDAzMDUyNzkwMSMwIQYDVQQLExpTZXJ0aWZpa2FjaWphcyBw +YWthbHBvanVtaTEkMCIGA1UEAxMbVkFTIExhdHZpamFzIFBhc3RzIFNTSShSQ0Ep +MB4XDTA2MDkxMzA5MjIxMFoXDTI0MDkxMzA5Mjc1N1owgY8xCzAJBgNVBAYTAkxW +MTUwMwYDVQQKEyxWQVMgTGF0dmlqYXMgUGFzdHMgLSBWaWVuLnJlZy5Oci40MDAw +MzA1Mjc5MDEjMCEGA1UECxMaU2VydGlmaWthY2lqYXMgcGFrYWxwb2p1bWkxJDAi +BgNVBAMTG1ZBUyBMYXR2aWphcyBQYXN0cyBTU0koUkNBKTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAJu4+f1hVS9PpKUUtS6OuSSPrPuxVD9A/0/F5YZo +e1OT+zWCNahQLpRSoNuDPnXaFXCsCc/ugkmtNkm5tHGLtAChQgbKCApjl7YI/O60 +3Jh4GYLJ+H9kPqrJ/rGN67Bk9bzzxD46kOpOjj8bGbxqg8ORPGxV+wpSwOjhXXeF +M8VJ3+xqv79sN/6OSaIVGM6LjmseOKMwb4iBfnJWRBrEejkP9sSPltSy6wBOXN67 +5zu35iQFk2tN5pFEv+6YG8eFGxFBeyI2p74+6Ho33BjekJ2PzbLXmj/iF39bDOHv +P2Y9biTksM7DDIhslNo4JXxSOeNzFLMARWOaDEJAXgTG93JkzsluM7Pk020klTeT +fvIAXRmLH/NDc6ifRdIGqey0Qrv67gzHTz9RH9Gv0KwYf4eBIv6p3QeWbXz4TtlN +OlBp1UF+xdp02I5z5X6D4cMZgbe9v0COvi6aogyqTgIuuyrhCF0xA8msJ7Cv3NXI +FH1AnVWJIfmQzNTJYEFzq+jN2DpVOQqCmf6b9fU8HJHLwPpGVK4h/CqsXHveepdx +/WxrzUiapNuBfBg3L5B9YZS9F8lctlQWd8oJSqrpvE+UdQFaVryS0o+515feVnQB +9xZxSbH1GEaZQe5i4bMsZXVpKXJDA/ibH/o49J7sQBCOrJfVsDO+nxjcLfdBeFRK +YkTnAgMBAAGjggH9MIIB+TAOBgNVHQ8BAf8EBAMCAQYwGAYIKwYBBQUHAQMEDDAK +MAgGBgQAjkYBATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTMw/Vm/3OsOFqW +GyGJuIFMH8teJTAQBgkrBgEEAYI3FQEEAwIBADCCAYkGA1UdIASCAYAwggF8MIIB +eAYLKwYBBAGBxFkBAQIwggFnMIIBOAYIKwYBBQUHAgIwggEqHoIBJgBTAGkAcwAg +AGkAcgAgAHMAZQByAHQAaQBmAGkAawBhAHQAcwAsACAAawBvACAAaQB6AGQAZQB2 +AGkAcwAgAFYAQQBTACAATABhAHQAdgBpAGoAYQBzACAAUABhAHMAdABzACwAIABu +AG8AZAByAG8AcwBpAG4AbwB0ACAAYQB0AGIAaQBsAHMAdABpAGIAdQAgAEUAbABl +AGsAdAByAG8AbgBpAHMAawBvACAAZABvAGsAdQBtAGUAbgB0AHUAIABsAGkAawB1 +AG0AYQBtACAAdQBuACAARQBpAHIAbwBwAGEAcwAgAFAAYQByAGwAYQBtAGUAbgB0 +AGEAIABkAGkAcgBlAGsAdABpAHYAYQBpACAAMQA5ADkAOQAvADkAMwAvAEUASzAp +BggrBgEFBQcCARYdaHR0cDovL3d3dy5lLW1lLmx2L3JlcG9zaXRvcnkwDQYJKoZI +hvcNAQEFBQADggIBAB8oSjWQIWNoCi94r6MegiaXoz8nGdJLo0J6BhNlW8EEy+t9 +fO+U8vGJ9bffUgIhadLqljTloM+XuJxVDhCFoxReLAX4tTp28/l6uN62DCdp8suU +kQsdudWOb5kvzfIZVjk6SFbwAf+Cdbay/dHU9fJjV0xNoX7MELoEae/0FPyzlx9F +7m9KKH/Rxie8x6Opa3vtghNvq94P+3HrXBEaqSzQMJ/8NjdW75XpurcTtq6fAmGt +nuxrBG82nw+Z98LJyEwouSjUIdeeVNXAzvSO5FWUe48kxjj8q3qkVnc9qEXvZJKk +0Ep+u3OL9A1Sc7g6SF5DgNOpcHdi/8coHHMeQ+YnJFtJueY2pI79xS0veqV5EnrX +IbIlbcgPosNhS+VI4le6n/KKId3bZPDaGd/OwJuAOcJ3d2MVU3KE+qSPBzeGIX1Q ++j1qN9uRDjez/c4Lynth0Jx0nH04aG3pex3W8Sq07ztgUncF5gLCX4xbvPB9t3PH +kWuyKrNjozTVq60lcUf/Gj56to2VdsPups0DCWzuRWeYz5lIdsHOinSaaFIBNCLI +7eIUC4S9bhCMsXKbvugI11fVf+q0AT1O5OLoZ+eMfunnQhHvlUbIkda+JxeAGTSY +58bfHvwhX56GPbx+8Jy9cp70R4JbcWfz+txUTKhc2FnH0AcOEzMnvPRp8GshMCkw +CgYIKwYBBQUHAwMMG1ZBUyBMYXR2aWphcyBQYXN0cyBTU0koUkNBKQ== +-----END TRUSTED CERTIFICATE----- + +# VI Registru Centras RCSC (RootCA) +-----BEGIN TRUSTED CERTIFICATE----- +MIIGijCCBHKgAwIBAgIQA6OkV7Xw84ZKEWPomP8WnDANBgkqhkiG9w0BAQUFADCB +mDELMAkGA1UEBhMCTFQxLTArBgNVBAoTJFZJIFJlZ2lzdHJ1IENlbnRyYXMgLSBJ +LmsuIDEyNDExMDI0NjEuMCwGA1UECxMlUmVnaXN0cnUgQ2VudHJvIFNlcnRpZmlr +YXZpbW8gQ2VudHJhczEqMCgGA1UEAxMhVkkgUmVnaXN0cnUgQ2VudHJhcyBSQ1ND +IChSb290Q0EpMB4XDTA4MDcyMTExNDc0NloXDTI0MDcyMTExNDc0NlowgZgxCzAJ +BgNVBAYTAkxUMS0wKwYDVQQKEyRWSSBSZWdpc3RydSBDZW50cmFzIC0gSS5rLiAx +MjQxMTAyNDYxLjAsBgNVBAsTJVJlZ2lzdHJ1IENlbnRybyBTZXJ0aWZpa2F2aW1v +IENlbnRyYXMxKjAoBgNVBAMTIVZJIFJlZ2lzdHJ1IENlbnRyYXMgUkNTQyAoUm9v +dENBKTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMiZ8iLHs4cVLqfL +TUarZ5fPD3N3A/dkfHZIMiD0o9hZnRSpH6AekQ4NrfX+Z5KREyAhTQpVbnH6rBfL +AP0OUAIz26nYvWEa/eAQV7FVeWAZtFR5nvuAMOLIQslSAgjYrC/DcUFUAvWBihLj +aQKlh6FwfQW+pWK/BbAIlkdvf5OKreCs00LeveaPFOVzKKADm0H65T73OXQuZPSf +S8D1eJlUa+UVIPzpMnJAq2V1vDxGNNL4EGHHDHjHfMARUdEFNvv4nP8tuOVxLUnw +V0izk46c+zrJS20x11LVVumELpHUAh2ygAWBxYDKKcE0Z7mvBDBD9q9CR978AS7o +Qpy+sgsU5DTc3a1ThHrYA1bRwgzUlyn4TPK1HN+dg65fWiVLorAo5b9aC9CcqJxw +Km0OLuEnv60LbxHT+EYt9JdES8qwyOY2byK6juRSlRbsRGrUUB6YKPlopLrenjDt +oslSock1ikDhjZub/fFGi6THT3BgUY3ykqnOuowvSVISZ9D1qwQlQHQD4titoXRY +Ybe1DvN/JSwRY6/xEsP0pHOaZKzupgaP8rycrCipXBXTM63QNsghcGu8Kh/Vq7gB +WHb8OxFN+/IcSCQR/U2PGSmua+htXrKhDXjO0mODdLTNKUy/m3CITxINRee+D2XE +1jgk5EoVi9Fq6rs2oaGQpVPIpdZlAgMBAAGjgc0wgcowDgYDVR0PAQH/BAQDAgEG +MC8GCCsGAQUFBwEDBCMwITAIBgYEAI5GAQEwCwYGBACORgEDAgEKMAgGBgQAjkYB +BDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBS8cz4vnJEMu4/Nd5k+zIXkzFho +ETAQBgkrBgEEAYI3FQEEAwIBADBFBgNVHSAEPjA8MDoGCysGAQQBgfE3AQEBMCsw +KQYIKwYBBQUHAgEWHWh0dHA6Ly93d3cucmNzYy5sdC9yZXBvc2l0b3J5MA0GCSqG +SIb3DQEBBQUAA4ICAQAZeCxRE1+8mU5cpwH83rb+qR2GMRF7epmKs4iSpWDSBGM5 +vK+O2PErRXIyKTwt4tnYPXT6RzWH3BAANkE97ap+sszEGukxtPWR0YRK5/Xcz0Zn +ApmvuHf6fu0hb5YjFHE/0Fi+qttDLDegHQZpNPBPj3Xus9IBu+wc6Y+pie/41BtB +Apm+8F+6jizCIXDeUYHY97y4wzODw5fKCXPE6XfIcvRcrQ8Niurt0goBzutXnRXw +KRXvWZyvrJKCcAyY2CKdL5g1qdGKibzVnVXCLp4HJUb2kk1Q+j2J8t+Tv5OU0Nmv +V6PzZuaO8eigGxgGk1osiQ02xPogs9wo9WrujzGbWTjYTmqgIyHkhqvl+2Cj0c1a +LEJJpg5VJCU1/dI6r2tYppFGX2nLvX4mm94IvR7snqb4nHWkQDaVSyJPxrZ9clG8 +48Jozc3li77Awk+bbmXOFrcIiMeH3v8yjMvrQkGs+9fPAUP4b8DWC/D3kunLRV1k +sffKPLuJCJbJ2g7hcSoP7KRCLeNqD0dHsFOm1oVQlzDXjC5fRiLQrM48XpwecoP9 +DKf4FzK7Yd7jTy8YjoK1hxt0BTBKv2oeSDxUKLFdnZJfmxDjLiKKr902ZH8TdkeD +NZUalI/1xFNtOb3Vi/XKzxhDBQGTpDbeMNIU87BktcrOlfe6dOyKcz5S015TADAv +MAoGCCsGAQUFBwMDDCFWSSBSZWdpc3RydSBDZW50cmFzIFJDU0MgKFJvb3RDQSk= +-----END TRUSTED CERTIFICATE----- + +# VeriSign Class 2 Public Primary Certification Authority - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEGTCCAwECEGFwy0mMX5hFKeewptlQW3owDQYJKoZIhvcNAQEFBQAwgcoxCzAJ +BgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVy +aVNpZ24gVHJ1c3QgTmV0d29yazE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24s +IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTFFMEMGA1UEAxM8VmVyaVNp +Z24gQ2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEczMB4XDTk5MTAwMTAwMDAwMFoXDTM2MDcxNjIzNTk1OVowgcoxCzAJBgNV +BAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNp +Z24gVHJ1c3QgTmV0d29yazE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24sIElu +Yy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTFFMEMGA1UEAxM8VmVyaVNpZ24g +Q2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAt +IEczMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArwoNwtUs22e5LeWU +J92lvuCwTY+zYVY81nzD9M0+hsuiiOLh2KRpxbXiv8GmR1BeRjmL1Za6tW8UvxDO +JxOeBUebMXoT2B/Z0wI3i60sR/COgQanDTAM6/c8DyAd3HJG7qUCyFvDyVZpTMUY +wZF7C9UTAJu878NIPkZgIIUq1ZC2zYugzDLdt/1AVbJQHFauzI13TccgTacxdu9o +koqQHgiBVrKtaaNS0MscxCM9H5n+TOgWY47GCI72MfbS+uV23bUckqNJzc0BzWjN +qWm6o+sdDZykIKbBoMXRRkwXbdKsZj+WjOCE1Db/IlnF+RFgqF8EffIa9iVCYQ/E +Srg+iQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA0JhU8wI1NQ0kdvekhktdmnLfe +xbjQ5F1fdiLAJvmEOjr5jLX77GDx6M4EsMjdpwOPMPOY36TmpDHf0xwLRtxyID+u +7gU8pDM/CzmscHhzS5kr3zDCVLCoO1Wh/hYozUK9dG6A2ydEp85EXdQbkJgNHkKU +sQAsBNB0owIFImNjzYO1+8FtYmtpdf1dcEG59b98377BMnMiIYtYgXsVkXq642RI +sH/7NiXaldDxJBQX3RiAa0YjOVT1jmIJBB2UkKab5iXiQkWquJCtvgiPqQtCGJTP +cjnhsUPgKM+351psE2tJs//jGHyJizNdrDPXp/naOlXJWBD5qu9ats9LS98qMEow +CgYIKwYBBQUHAwMMPFZlcmlTaWduIENsYXNzIDIgUHVibGljIFByaW1hcnkgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMw== +-----END TRUSTED CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEGjCCAwICEQCbfgZJoz5iudXukEhxKe9XMA0GCSqGSIb3DQEBBQUAMIHKMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZl +cmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu +LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlT +aWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkgLSBHMzAeFw05OTEwMDEwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMIHKMQswCQYD +VQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlT +aWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJ +bmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWdu +IENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMu6nFL8eB8aHm8b +N3O9+MlrlBIwT/A2R/XQkQr1F8ilYcEWQE37imGQ5XYgwREGfassbqb1EUGO+i2t +KmFZpGcmTNDovFJbcCAEWNF6yaRpvIMXZK0Fi7zQWM6NjPXr8EJJC52XJ2cybuGu +kxUccLwgTS8Y3pKI6GyFVxEa6X7jJhFUokWWVYPKMIno3Nij7SqAP395ZVc+FSBm +CC+Vk7+qRy+oRpfwEuL+wgorUeZ25rdGt+INpsyow0xZVYnm6FNcHOqd8GIWC6fJ +Xwzw3sJ2zq/3avL6QaaiMxTJ5Xpj055iN9WFZZ4O5lMkdBteHRJTW8cs54NJOxWu +imi5V5cCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEAERSWwauSCPc/L8my/uRan2Te +2yFPhpk0djZX3dAVL8WtfxUfN2JzPtTnX84XA9s1+ivbrmAJXx5fj267Cz3qWhMe +DGBvtcC1IyIuBwvLqXTLR7sdwdela8wv0kL9Sd2nic9TutoAWii/gt/4uhMdUIaC +/Y4wjylGsB49Ndo4YhYYSq3mtlFs3q9i6wHQHiT+eo8SGhJouPtmmRQURVyu565p +F4ErWjfJXir0xuKhXFSbplQAz/DxwceYMBo7Nhbbo27q/a2ywtrvAkcTisDxszGt +TxzhT5yvDwyd93gN2PQ1VoDat20Xj50egWTh/sVFuq1ruQp6Tk9LhO5L8X3dETBK +MAoGCCsGAQUFBwMDDDxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzM= +-----END TRUSTED CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G4 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDhDCCAwqgAwIBAgIQL4D+I4wOIg9IZxIokYesszAKBggqhkjOPQQDAzCByjEL +MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZW +ZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2ln +biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJp +U2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IC0gRzQwHhcNMDcxMTA1MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCByjELMAkG +A1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJp +U2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwg +SW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2ln +biBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASnVnp8Utpkmw4tXNherJI9/gHm +GUo9FANL+mAnINmDiWn6VMaaGF5VKmTeBvaNSjutEDxlPZCIBIngMGGzrl0Bp3ve +fLK+ymVhAIau2o970ImtTR1ZmkGxvEeA3J5iw/mjgbIwga8wDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJ +aW1hZ2UvZ2lmMCEwHzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYj +aHR0cDovL2xvZ28udmVyaXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFLMW +kf3upm7ktS5Jj4d4gYDs5bG1MAoGCCqGSM49BAMDA2gAMGUCMGYhDBgmYFo4e1ZC +4Kf8NoRRkSAsdk1DPcQdhCPQrNZ8NQbOzWm9kA3bbEhCHQ6qQgIxAJw9SDkjOVga +FRJZap7v1VmyHVIsmXHNxynfGyphe3HR3vPA5Q06Sqotp9iGKt0uEDBKMAoGCCsG +AQUFBwMDDDxWZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzQ= +-----END TRUSTED CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G5 +-----BEGIN TRUSTED CERTIFICATE----- +MIIE0zCCA7ugAwIBAgIQGNrRniZ96LtKIVjNzGs7SjANBgkqhkiG9w0BAQUFADCB +yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL +ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJp +U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxW +ZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5IC0gRzUwHhcNMDYxMTA4MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjEL +MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZW +ZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2ln +biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJp +U2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IC0gRzUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvJAgIKXo1 +nmAMqudLO07cfLw8RRy7K+D+KQL5VwijZIUVJ/XxrcgxiV0i6CqqpkKzj/i5Vbex +t0uz/o9+B1fs70PbZmIVYc9gDaTY3vjgw2IIPVQT60nKWVSFJuUrjxuf6/WhkcIz +SdhDY2pSS9KP6HBRTdGJaXvHcPaz3BJ023tdS1bTlr8Vd6Gw9KIl8q8ckmcY5fQG +BO+QueQA5N06tRn/Arr0PO7gi+s3i+z016zy9vA9r911kTMZHRxAy3QkGSGT2RT+ +rCpSx4/VBEnkjWNHiDxpg8v+R70rfk/Fla4OndTRQ8Bnc+MUCH7lP59zuDMKz10/ +NIeWiu5T6CUVAgMBAAGjgbIwga8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E +BAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2UvZ2lmMCEwHzAH +BgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVy +aXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFH/TZafC3ey78DAJ80M5+gKv +MzEzMA0GCSqGSIb3DQEBBQUAA4IBAQCTJEowX2LP2BqYLz3q3JktvXf2pXkiOOzE +p6B4Eq1iDkVwZMXnl2YtmAl+X6/WzChl8gGqCBpH3vn5fJJaCGkgDdk+bW48DW7Y +5gaRQBi5+MHt39tBquCWIMnNZBU4gcmU7qKEKQsTb47bDN0lAtukixlE0kF6BWlK +WE9gyn6CagsCqiUXObXbf+eEZSqVir2G3l6BFoMtEMze/aiCKm0oHw0LxOXnGiYZ +4fQRbxC1lfznQgUy286dUV4otp6F01vvpX1FQHKOtw5rDgb7MzVIcbidJ4vEZV8N +hnacRHr2lVz2XTIIM6RUthg/aFzyQkqFOFSDX9HoLPKsEdao7WNqMEowCgYIKwYB +BQUHAwMMPFZlcmlTaWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkgLSBHNQ== +-----END TRUSTED CERTIFICATE----- + +# VeriSign Universal Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIEuTCCA6GgAwIBAgIQQBrEZCGzEyEDDrvkEhrFHTANBgkqhkiG9w0BAQsFADCB +vTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL +ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwOCBWZXJp +U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MTgwNgYDVQQDEy9W +ZXJpU2lnbiBVbml2ZXJzYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIG9MQswCQYDVQQGEwJVUzEX +MBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0 +IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9y +IGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNh +bCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEF +AAOCAQ8AMIIBCgKCAQEAx2E3XrEBNNti1xWb/1hajCMj1mCOkdeQmIN65lgZOIzF +9uVkhbSicfvtvbnazU0AtMgtc6XHaXGVHzk8skQHnOgO+k1KxCHfKWGPMiJhgsWH +H26MfF8WIFFE0XBPV+rjHOPMee5Y2A7Cs0WTwCznmhcrewA3ekEzeOEz4vMQGn+H +LL729fdC4uW/h2KJXwBL38Xd5HVEMkE6HnFuacsLdUYI0crSK5XQz/u5QGtkjFdN +/BMReYTtXlT2NJ8IAfMQJQYXStrxHXpma5hgZqTZ79IugvHw7wnqRMkVauIDbjPT +rJ9VAMf2CGqUuV/c4DPxhGD5WycRtPwW8rtWaoAljQIDAQABo4GyMIGvMA8GA1Ud +EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMG0GCCsGAQUFBwEMBGEwX6FdoFsw +WTBXMFUWCWltYWdlL2dpZjAhMB8wBwYFKw4DAhoEFI/l0xqGrI2Oa8PPgGrUSBgs +exkuMCUWI2h0dHA6Ly9sb2dvLnZlcmlzaWduLmNvbS92c2xvZ28uZ2lmMB0GA1Ud +DgQWBBS2d/ppSEefUxLVwuoHMnYH0ZcHGTANBgkqhkiG9w0BAQsFAAOCAQEASvj4 +sAPmLGd75JR3Y8xuTPl9Dg3cyLk1uXBPY/ok+myDjEedO2Pzmvl2MpWRsXe8rJq+ +seQxIcaBlVZaDrHC1LGmWazxY8u4TB1ZkErvkBYoH1quEPuBUDgMbMzxPcP1Y+Oz +4yHJJDnp/RVmRvQbEdBNc6N9Rvk97ahfYtTxP/jgdFcrGJ2BtMQo2pSXpXDrrB2+ +BxHw1dvd5Yzw1TKwg+ZX4o+/vqGqvz0dtdQ46tewXDpPaj+PwGZsY6rp2aQW9IHR +lRQOfc2VNNnSj3BzgXucfr2YYdhFh5iQxeuGMMY1v/D/w1WIg0vvBZIGcfK4mJO3 +7M2CYfE45k+XmCpajTA9MAoGCCsGAQUFBwMDDC9WZXJpU2lnbiBVbml2ZXJzYWwg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQ== +-----END TRUSTED CERTIFICATE----- + +# VeriSign, Inc. +-----BEGIN TRUSTED CERTIFICATE----- +MIICQDCCAakCEAPHjzfbkijfPLsarYL6ZxAwDQYJKoZIhvcNAQECBQAwYTERMA8G +A1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTMwMQYDVQQL +EypWZXJpU2lnbiBDb21tZXJjaWFsIFNvZnR3YXJlIFB1Ymxpc2hlcnMgQ0EwHhcN +OTYwNDA5MDAwMDAwWhcNMDQwMTA3MjM1OTU5WjBhMREwDwYDVQQHEwhJbnRlcm5l +dDEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xMzAxBgNVBAsTKlZlcmlTaWduIENv +bW1lcmNpYWwgU29mdHdhcmUgUHVibGlzaGVycyBDQTCBnzANBgkqhkiG9w0BAQEF +AAOBjQAwgYkCgYEAw9NpZVIBlFSrKMZiGLNUVcVEh0VKO8J+2NPXyICGjdgM8Rac +zGupKbKPdnOSyMVipjztHgV18BMAbBRN1JiQB75pc4G4Yk4xHtH8yQzrfZC/rrRH +UexvzmQ1AtZ9ZwV34o/ZUdf7lxm8Ptd3gcZD3fLd38qjg4vLQcE9IkhIphkCAwEA +ATANBgkqhkiG9w0BAQIFAAOBgQC1vLB1aomihr1keMOnMnVyEaomAhdgMEzjSDQZ +uVJKURiA/lMte9UxjMVlmUFBL/KuY3roc5kVkBofeotB0I460M04NETQdfjqccSB +GTgXNUquxT4y5iG4BcCT4cc4XNj3kzhkkO1UzsrT09Bf7wSb3gKC3YgpscNPpc1x +ZDE8PDAcMAoGCCsGAQUFBwMDDA5WZXJpU2lnbiwgSW5jLg== +-----END TRUSTED CERTIFICATE----- + +# Verizon Global Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDdTCCAl2gAwIBAgIBATANBgkqhkiG9w0BAQsFADBcMQswCQYDVQQGEwJVUzEZ +MBcGA1UECgwQVmVyaXpvbiBCdXNpbmVzczERMA8GA1UECwwIT21uaVJvb3QxHzAd +BgNVBAMMFlZlcml6b24gR2xvYmFsIFJvb3QgQ0EwHhcNMDkwNzMwMTQyNzA0WhcN +MzQwNzMwMTQyNzA0WjBcMQswCQYDVQQGEwJVUzEZMBcGA1UECgwQVmVyaXpvbiBC +dXNpbmVzczERMA8GA1UECwwIT21uaVJvb3QxHzAdBgNVBAMMFlZlcml6b24gR2xv +YmFsIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCKAAxw +Hb/rNIbDmUU1Hn9D96tvJC3NGcIQu7DKKVupIKurcizE4gI5bYK4xRHq+PuznmL4 +Mx6wH8nj9jfbBMg7Y0824oWkJR3HaR8EvWhFE5YHH5RQ9T7FJ1SewElXRI4HY9Sm +ru0imcxNlmkEE252iZ90FpT5HVS9ornSgwEiDE1EgKr+NYknJaeGicbVGpLjj8WV +oBRymuhWxQJVHJf5IC7Q9TwTGVr24fkLA4Jpp4y31m+cVj6d6CoJYG1L5vuLmRT3 +NE9lWYCNuVfIojUh2IhxVl3uglctJpAYn5qcnI/v1MVjp1R9R5GHfRoSqBsYb6lv +sSe65AR0zjcef2bFAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMB0GA1UdDgQWBBRMOBG4mABbWitwPqp45NVnZ2enfjANBgkqhkiG9w0B +AQsFAAOCAQEAAV+gsQYB9HnXZRhgPs95oLrCI08j34eWX4EOOBUuXMgCaCkg/Ivu +pYoYgWRcmDV+OTCCpIKKULW6w+ha1qie4sMX29vE67AKIA3pnuP/YFRH8Tud1Cg8 +oq6j+6qLgiIqNYeQuBxZR5DVnS76SeNlqDbrx+QcaNyzMWyrTs4kgBXIEFkQEXJN +epyYnMT8YeCzsp1OoMbCWasY1qJVRewpqiU31k5KPQtAweST5PzNkQv45qvMs3bE +Yr8Z7Ya2ecMpVFS8mX1GV8+mz/RUKpoDZUcBoUIqyyVHbnxeAEuR2fkbEAZw+UIV +pl+q10Ae/clInZeB6lxowqDniaFTTb/H4zAkMAoGCCsGAQUFBwMDDBZWZXJpem9u +IEdsb2JhbCBSb290IENB +-----END TRUSTED CERTIFICATE----- + +# XRamp Global CA Root +-----BEGIN TRUSTED CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbwwNjAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsG +AQUFBwMDDBRYUmFtcCBHbG9iYWwgQ0EgUm9vdA== +-----END TRUSTED CERTIFICATE----- + +# certSIGN ROOT CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KDMDIwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEFBQcDAwwQ +Y2VydFNJR04gUk9PVCBDQQ== +-----END TRUSTED CERTIFICATE----- + +# certSIGN Root CA G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIJEQA0tk7GNi02MA0GCSqGSIb3DQEBCwUAMEExCzAJBgNV +BAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJR04g +Uk9PVCBDQSBHMjAeFw0xNzAyMDYwOTI3MzVaFw00MjAyMDYwOTI3MzVaMEExCzAJ +BgNVBAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJ +R04gUk9PVCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDF +dRmRfUR0dIf+DjuW3NgBFszuY5HnC2/OOwppGnzC46+CjobXXo9X69MhWf05N0Iw +vlDqtg+piNguLWkh59E3GE59kdUWX2tbAMI5Qw02hVK5U2UPHULlj88F0+7cDBrZ +uIt4ImfkabBoxTzkbFpG583H+u/E7Eu9aqSs/cwoUe+StCmrqzWaTOTECMYmzPhp +n+Sc8CnTXPnGFiWeI8MgwT0PPzhAsP6CRDiqWhqKa2NYOLQV07YRaXseVO6MGiKs +cpc/I1mbySKEwQdPzH/iV8oScLumZfNpdWO9lfsbl83kqK/20U6o2YpxJM02PbyW +xPFsqa7lzw1uKA2wDrXKUXt4FMMgL3/7FFXhEZn91QqhngLjYl/rNUssuHLoPj1P +rCy7Lobio3aP5ZMqz6WryFyNSwb/EkaseMsUBzXgqd+L6a8VTxaJW732jcZZroiF +DsGJ6x9nxUWO/203Nit4ZoORUSs9/1F3dmKh7Gc+PoGD4FapUB8fepmrY7+EF3fx +DTvf95xhszWYijqy7DwaNz9+j5LP2RIUZNoQAhVB/0/E6xyjyfqZ90bp4RjZsbgy +LcsUDFDYg2WD7rlcz8sFWkz6GZdr1l0T08JcVLwyc6B49fFtHsufpaafItzRUZ6C +eWRgKRM+o/1Pcmqr4tTluCRVLERLiohEnMqE0yo7AgMBAAGjQjBAMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSCIS1mxteg4BXrzkwJ +d8RgnlRuAzANBgkqhkiG9w0BAQsFAAOCAgEAYN4auOfyYILVAzOBywaK8SJJ6ejq +kX/GM15oGQOGO0MBzwdw5AgeZYWR5hEit/UCI46uuR59H35s5r0l1ZUa8gWmr4UC +b6741jH/JclKyMeKqdmfS0mbEVeZkkMR3rYzpMzXjWR91M08KCy0mpbqTfXERMQl +qiCA2ClV9+BB/AYm/7k29UMUA2Z44RGx2iBfRgB4ACGlHgAoYXhvqAEBj500mv/0 +OJD7uNGzcgbJceaBxXntC6Z58hMLnPddDnskk7RI24Zf3lCGeOdA5jGokHZwYa+c +NywRtYK3qq4kNFtyDGkNzVmf9nGvnAvRCjj5BiKDUyUM/FHE5r7iOZULJK2v0ZXk +ltd0ZGtxTgI8qoXzIKNDOXZbbFD+mpwUHmUUihW9o4JFWklWatKcsWMy5WHgUyIO +pwpJ6st+H6jiYoD2EEVSmAYY3qXNL3+q1Ok+CHLsIwMCPKaq2LxndD0UF/tUSxfj +03k9bWtJySgOLnRQvwzZRjoQhsmnP+mg7H/rpXdYaXHmgwo38oZJar55CJD2AhZk +PuXaTH4MNMn5X7azKFGnpyuqSfqNZSlO42sTp5SjLVFteAxEy9/eCG/Oo2Sr05WE +1LlSVHJ7liXMvGnjSG4N0MedJ5qq+BOS3R7fY581qRY27Iy4g/Q9iY/NtBde17MX +QRBdJ3NghVdJIgcwITAKBggrBgEFBQcDAQwTY2VydFNJR04gUm9vdCBDQSBHMg== +-----END TRUSTED CERTIFICATE----- + +# e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi +-----BEGIN TRUSTED CERTIFICATE----- +MIIDtjCCAp6gAwIBAgIQRJmNPMADJ72cdpW56tustTANBgkqhkiG9w0BAQUFADB1 +MQswCQYDVQQGEwJUUjEoMCYGA1UEChMfRWxla3Ryb25payBCaWxnaSBHdXZlbmxp +Z2kgQS5TLjE8MDoGA1UEAxMzZS1HdXZlbiBLb2sgRWxla3Ryb25payBTZXJ0aWZp +a2EgSGl6bWV0IFNhZ2xheWljaXNpMB4XDTA3MDEwNDExMzI0OFoXDTE3MDEwNDEx +MzI0OFowdTELMAkGA1UEBhMCVFIxKDAmBgNVBAoTH0VsZWt0cm9uaWsgQmlsZ2kg +R3V2ZW5saWdpIEEuUy4xPDA6BgNVBAMTM2UtR3V2ZW4gS29rIEVsZWt0cm9uaWsg +U2VydGlmaWthIEhpem1ldCBTYWdsYXlpY2lzaTCCASIwDQYJKoZIhvcNAQEBBQAD +ggEPADCCAQoCggEBAMMSIJ6wXgBljU5Gu4Bc6SwGl9XzcslwuedLZYDBS75+PNdU +MZTe1RK6UxYC6lhj71vY8+0qGqpxSKPcEC1fX+tcS5yWCEIlKBHMilpiAVDV6wlT +L/jDj/6z/P2douNffb7tC+Bg62nsM+3YjfsSSYMAyYuXjDtzKjKzEve5TfL0TW3H +5tYmNwjy2f1rXKPlSFxYvEK+A1qBuhw1DADT9SN+cTAIJjjcJRFHLfO6IxClv7wC +90Nex/6wN1CZew+TzuZDLMN+DfIcQ2Zgy2ExR4ejT669VmxMvLz4Bcpk9Ok0oSy1 +c+HCPujIyTQlCFzz7abHlJ+tiEMl1+E5YP6sOVkCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFJ/uRLOU1fqRTy7ZVZoE +VtstxNulMA0GCSqGSIb3DQEBBQUAA4IBAQB/X7lTW2M9dTLn+sR0GstG30ZpHFLP +qk/CaOv/gKlR6D1id4k9CnU58W5dF4dvaAXBlGzZXd/aslnLpRCKysw5zZ/rTt5S +/wzw9JKp8mxTq5vSR6AfdPebmvEvFZ96ZDAYBzwqD2fK/A+JYZ1lpTzlvBNbCNvj +/+27BrtqBrF6T2XGgv0enIu1De5Iu7i9qgi0+6N8y5/NkHZchpZ4Vwpm+Vganf2X +KWDeEaaQHBkc7gGWIjQ0LpH5t8Qn0Xvmv/uARFoW5evg1Ao4vOSR49XrXMGs3xtq +fJ7lddK2l4fbzIcrQzqECK+rPNv3PGYxhrCdU3nt+CPeQuMtgvEP5fqXMEEwCgYI +KwYBBQUHAwMMM2UtR3V2ZW4gS29rIEVsZWt0cm9uaWsgU2VydGlmaWthIEhpem1l +dCBTYWdsYXlpY2lzaQ== +-----END TRUSTED CERTIFICATE----- + +# e-Szigno Root CA 2017 +-----BEGIN TRUSTED CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMTA3MB4GCCsGAQUFBwMEBggrBgEFBQcDAQYIKwYBBQUHAwMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNw== +-----END TRUSTED CERTIFICATE----- + +# ePKI Root Certification Authority +-----BEGIN TRUSTED CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZwwQzAeBggrBgEFBQcDBAYIKwYBBQUHAwEGCCsG +AQUFBwMDDCFlUEtJIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHk= +-----END TRUSTED CERTIFICATE----- + +# ePKI Root Certification Authority - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFkzCCA3ugAwIBAgIRANaWLsEKFZMSr49jvNREyVswDQYJKoZIhvcNAQELBQAw +YzELMAkGA1UEBhMCVFcxIzAhBgNVBAoMGkNodW5naHdhIFRlbGVjb20gQ28uLCBM +dGQuMS8wLQYDVQQDDCZlUEtJIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMjAeFw0xNTExMTcwODIzNDJaFw0zNzEyMzExNTU5NTlaMGMxCzAJBgNVBAYT +AlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEvMC0GA1UE +AwwmZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCkWR+gL9++4Pvp3LWJ/lqXA8k6d6eO +XK/y4xg59ardD0bSaA9XnKdjYNNYzjXCp/aIwk9/Gyjp0KcAxBdNbeIPxQ4mIyCr +9zoookwKC8yOzuYAmlpADdRQGpvRDZyU+dvuXNDxigfNmitALEmkXWJfp2vf7lYI +UPNCGGwxsF7lnHOSvA7SDH3FOFe8u1jbJhkC7eNDhIpOVmvbraEx2cwiZ5Z4/3ed +zGTFMiBq704w1SQl/Yh5r3Ea/tVLGxWIvBhwqr2tOApmMEbliYXVdiSpqbPmWWAP +tKlTwjqdRRrWruN3XsRiNjMvMMS/lfEtOKV16NFqky5Fh0tKot+/WCeaymIZql7U +sYBJlt0r7F+Pm+Cdl4j1hAOjr7Olcy1BuuUHt29rcff3yVqvaZmzL8hPQutsa3Fn +eN8KrE/XSoUARhrVzbif6pWdD3zRxgWF5gjeiBeB9tW1buqhHNdhquNZQomcWX6x +fGQ03WEjKjm1EKv8hqlTGsXrauKATlmRwDiJ/rNd1vuR6dewfdl4CMz1K8wr4aHW +lHPB/lH0jH0KtZqKufXa4Mmz2I+qgoONaVMt/QAEGEqg2lTheYyJ63/1gueguXdN +rvm6AjuIdut8XbNaE9t8KRZrmdEd5Eghog1eAYjovvGYTT7HFlccX+EIbxxMWENW +94BljHEOogRnTwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRy +W7qqcjjuJZAktZQi+gmIyosK+zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL +BQADggIBAAaj8bZzVcZnZiHlnVvWlC5KImDyVAGQof21v8CVvxhfLPZrNQ78Mcjt +RA6Sl9yv3VbPtR+6cpwwyJuxkcB2d9QPGpUa6U0UiKHPawKmautkRU1kjd7862zy +UwmhhVEV0E+eYvoRuc7IJA5yZIh1NCMwKj+8PDnMzN0LNru9BoKPEgHFcQXRJKGZ +bMrk96rtitenCq2v8OCAu6GyP1qHZHCGM3sNHtcAhoNDl3X1O8FI/bYOQ6gCbrg+ +f49O4l20fZ4wNC+o8esnh2gNWgpNAdvJFFiV8ppNFqpz2/QliBc4t69ZCQm0Hy0P +q/W4J1XuRTAzuO0bjryIbK/4Wipr4KyxBSShCfyjD/OwLXuWuraUBxVFjincWA6p +Bdg7OqB7zYrHZoKXz9Yz4Gf8pttALwXlxYt6KnrwsDabDBj2N+lBof2xKPlva73r +H0xjcXtQ3Sny/+73x0Vf6DYK6GxbIsPowOcm3OOolYDluToT2wBLGv2uM0d+eJTj +sV0rtVa1QoufgcX8k0wQtboKvH434/pUbfUExXCzqQTSUdeFzX1vQ49ZaOUxVhFx ++WQpCRP+0B+8iwA4stDKNFZ2EDlWc2bD0UnZvldPPxZ9ani3qIK4W86uhYoKQgwD +0RfEGPfYV4jGgrgHuT79pOku3G+6kJLuZbBQNNMH2gGXD7znc4J7MDQwCgYIKwYB +BQUHAwMMJmVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEcy +-----END TRUSTED CERTIFICATE----- + +# emSign ECC Root CA - C3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUTA5MB4GCCsGAQUFBwMEBggr +BgEFBQcDAQYIKwYBBQUHAwMMF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMz +-----END TRUSTED CERTIFICATE----- + +# emSign ECC Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyjMDkwHgYIKwYBBQUHAwQGCCsGAQUFBwMBBggrBgEF +BQcDAwwXZW1TaWduIEVDQyBSb290IENBIC0gRzM= +-----END TRUSTED CERTIFICATE----- + +# emSign Root CA - C1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG +A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg +SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v +dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ +BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ +HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH +3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH +GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c +xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 +aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq +TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 +/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 +kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG +YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT ++xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo +WXzhriKi4gp6D/piq1JM4fHfyr6DDUIwKzAUBggrBgEFBQcDBAYIKwYBBQUHAwEM +E2VtU2lnbiBSb290IENBIC0gQzE= +-----END TRUSTED CERTIFICATE----- + +# emSign Root CA - C2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFcjCCA1qgAwIBAgIKLwq3aw3LSq8nWDANBgkqhkiG9w0BAQwFADBWMQswCQYD +VQQGEwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJ +bmMxHDAaBgNVBAMTE2VtU2lnbiBSb290IENBIC0gQzIwHhcNMTgwMjE4MTgzMDAw +WhcNNDMwMjE4MTgzMDAwWjBWMQswCQYDVQQGEwJVUzETMBEGA1UECxMKZW1TaWdu +IFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMxHDAaBgNVBAMTE2VtU2lnbiBSb290 +IENBIC0gQzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCMfX1lA+Tb +mh9YInmRgOW97IVx4LUJf2DRZfs837Jrml+py64aVnYgWO4t6C78fgjfS7jX+c4T +inIzEquWcI+zi0fd4Sc8NDf7JONp27VWX0qwUYqzLDRCt+s7zpLcfx1ky0zVIJj6 +L06uPyK3kIr9+YAsrVj+39utm6e2MBQsRNstSI3fCQYAGvoQTQ8fULauTqNWaYAk +NYFe6HUHHQPp2u1Ua00odMXiD5oRFxLcDnGAcE1I/9E9mLCdkggXijYUmico7+Xw +ZeFoPhva6eIJ5p03Lt3Du5W3EcHR0cJmmY1pyeA36JaXKWRNM9IRjYMVNCcp4jhB +2tIYiZ+LVk8bwQ9/1c23txmv3u97taZlV22NF4ttS1qq3J+MOp0oGULBzpKfRx0q +GVqbPukQNGAjOLIN8KDNQNzbR1iAl2d8H+MSoicBo4Aid8TjLWcNv48oCWL53ZrF +BMTDjaIA6frG1t4IpbnHadA7qCJJe2qpJN6n2eQKAUn6UiQDHPsSqNBlcUhQ4Y/0 +Y0mU5rghm2OB9rXQS1Fb1JRCfJMNnJIm5AUB2+2RWzq5Tgz7SbSho8NsZk0UbQnF +xciqQ9uoVTAsK14Sk9oG8Q3zfsM08cdPoRb0WlIZklR6mKD7L8nH/zfGu8PIJv94 +GGB9RZ9U4A69r3ePmy8MvrzfNxHKtH6svwIDAQABo0IwQDAdBgNVHQ4EFgQUs/eK +pNYPiABZ6FEXT9V+7IYigZ0wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADQlpiWM0cv2nZ0H5jVsBq0x2q62Q0LwqATs +CFvyub7gxNCytRuoA8stmPOEu/lg8Igxj4FIjoyhIrWUVxyiLU7No4P+WjEUOwUT +xIpkEOtvGUQ9fiOlcGHtIZDNBlZq7WpktXAxeV55RPPsor26p2FNAMRFfZQh0sLX +hKgk8iulSSggqx8ezgPye63FaiYEi4c/dzRj3HOCnsZiwZZU02df5YpNFjxSwZvE +41cjGpsrpWMfQFI2s53RbeXp47lSAxYE4NzjBFMe+EwFuEveBCJBEAH5rvYu3pi2 +orsJ424TqWEQV1tCsCkQz+Yq/Okal7yHAkKDeOXcP7oN4A+TdXc2pdqxuVCnBO0R +mWz2JpGSSeJjiTk/OPwRsPNWtwG/KXL04o2ta3jiPpJuICVtWDAc9R3auBEgJl5r +ShRmBdszG0LmzsHuZPCFSYC15RBDCOBsa8bDRJ8pBFU2Wi/CVXCACEuavgoveA4F +a5bt38o0PWxsBP+MpocCdVtDMqzQhxy9IohKuXWAGresoIvKDg3xFk6rBOrjfVwJ +elwi/xAisojHPJVQv9W1zVIoHp+EQg/4MQC21NbIX2RoioB+V3hK439b/w7deU8x +2M8cl1OG0nPfbnARl5GPM7vJgi470jto4SeMg6HMAW3Egb56tQcNLwI9U8mZnNvR +gUMrkAgLMCEwCgYIKwYBBQUHAwMME2VtU2lnbiBSb290IENBIC0gQzI= +-----END TRUSTED CERTIFICATE----- + +# emSign Root CA - G1 +-----BEGIN TRUSTED CERTIFICATE----- +MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD +VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU +ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH +MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO +MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv +Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz +f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO +8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq +d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM +tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt +Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB +o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x +PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM +wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d +GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH +6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby +RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx +iN66zB+AfkowKzAUBggrBgEFBQcDBAYIKwYBBQUHAwEME2VtU2lnbiBSb290IENB +IC0gRzE= +-----END TRUSTED CERTIFICATE----- + +# emSign Root CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIIFlTCCA32gAwIBAgILAIZNvw/jXtd9jtgwDQYJKoZIhvcNAQEMBQAwZzELMAkG +A1UEBhMCSU4xEzARBgNVBAsTCmVtU2lnbiBQS0kxJTAjBgNVBAoTHGVNdWRocmEg +VGVjaG5vbG9naWVzIExpbWl0ZWQxHDAaBgNVBAMTE2VtU2lnbiBSb290IENBIC0g +RzIwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBnMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBHMjCCAiIw +DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMNwGIWW2kHfHK+sXTNwxF07K+IV +ySTuyFM2r1v002wUfcdT+zs5OM5QbMYFFnedXQI6gCFLsjKrcaej48Zt37OyEb3i +aPs7CsP4kAyTwzKH9aZe6gXYHrJq40/ZVMNcQVI2PcIp40B/SAN2gUZ+ZaUtIOvV +jEx26/ebNaXRIsthlkOG/caB+QRwDw1tl7338Zlv0M2oTBUy4B3e7dGP5pgXH71M +jqHPCoNo+xv9f0NTBT+hUDa8h8wUtcGQq9CDeJTpjWcD2bP2AMdVG6oVpMAUeUzo +cCyglvtFdUMjggxBbw4qhau1HXPG8Ot9hwL7ZMi8tkTzrvUIxxb8G9LF/7kKeCE7 +tGZaVzDTnXuifl3msR4ErHsQ4P7lVu2AIjIAhrAXoedDidb7pMcf7TABdrYUT1Jo +G/AiK+J9jO6GTjeADD4LMDSBZhHMuBK/PJ/g0kGBt+/C1L+/HURzQhJkMlRnM6Rv +XoCtfKopSlns5trZmTi971Wjbn88QXP61lGpBCUPwCjs7rpOYvSUJtI+lcbF+37q +kIqOXYkVT3cupDSpw+H89kFtj5GKY+Xny4LxY+3IvDIRiyd6ky1DPj713DI0yqve +EpsIr3A0PdwuyUI7CS1jg0NnGFT6Xxyr0xB+VDt83FJYW8v16k2pbaQ4kVxA3aXd +X9dZYyVR1S59KM75AgMBAAGjQjBAMB0GA1UdDgQWBBTt7E1FYRgo57MjKBEcTaUn +DV7s9DAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0B +AQwFAAOCAgEACFC/ilQg8KTCVBxFJW/sazomkS0kNYbEIZg4B3obqwsJ7SX98z8Z +gfzBpz0nYClwwJjWbFN1R2zY8pCEot6/dgmA8Vbq0GxhwPM5YN/SZquNyRIxO3cU +dlAcwf+vSezdVCf9wOzvSAF3q0a5ljvbdbNJNpfScQVp7UUd5sBsZk8jXO1KQ/go +/Vf/GDPnrIFmxpAIGE3sgnO8lAv9FzUaAeuv7HWe47xN9J7+bQzF93yHuIXACPTL +pQHhg2zMv5C7BAbuDHfbj1Cu294Z832yhSfBcziWGskOvl3es2EcHytbS9c9P+0z +Mpka7zGC1FHrvLb/FoduH86TeZt0QjZ6pcplNzoaxDnDvzTJ6CC2Eny+qH/APFCu +VUv5/wjwF+HPm8Pup2ARj9cEp92+0qcerfHacNq5hMeGZdbA/dzdUR/5z5zXdxAk +nl8mcfGb0eMNSTXQmmB/i4AecNnr72uYjzlaXUGYN7Nrb6XouG0pnh0/BBtWWp0U +ShIPpWEAqs7RJBj6+1ZUYXZ4ObrCw962DxhN2p19Hxw9LtuUUcLqqTPrFXYvwO4t +ouj7KJnAkaTUfXGdEaFVtFig1EA30WzJY2X1vAQ7hVnniCjgaXAGqjsU6sklNM9n +xDx5rFCCCEtj9Kh8UHjGK2QqgP5kwgttjOApQMaCoezMfK4KD7WpOXUwITAKBggr +BgEFBQcDAwwTZW1TaWduIFJvb3QgQ0EgLSBHMg== +-----END TRUSTED CERTIFICATE----- + +# state-institutions +-----BEGIN TRUSTED CERTIFICATE----- +MIIEGTCCAwGgAwIBAgIEOzz5yTANBgkqhkiG9w0BAQUFADA9MQswCQYDVQQGEwJz +aTEbMBkGA1UEChMSc3RhdGUtaW5zdGl0dXRpb25zMREwDwYDVQQLEwhzaWdlbi1j +YTAeFw0wMTA2MjkyMTI3NDZaFw0yMTA2MjkyMTU3NDZaMD0xCzAJBgNVBAYTAnNp +MRswGQYDVQQKExJzdGF0ZS1pbnN0aXR1dGlvbnMxETAPBgNVBAsTCHNpZ2VuLWNh +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsOVlssCsZJbyiBuz7Z7k +AsZPK4jOLopRgHWvEFvyyzhmm6IObTRHlqWSEa/2NUeidyIMzhaIYqrTSW4YvC5E +2L7GnsIaGaxBjvwwBwLyxmrUWyMA70E02KRzY98ikjOEAaWN84Nc+rjUejXf7Pht +D+BM7a2cOn2G1qUIlL59ehEf/oU/VFqIY4ecpbGnTs23RHOvz4pJax/jzddJTVor +F+ZcdrO7crlvJ9KbiRWI3xBfdiEBascVMQrRnFj4KBYFbdlO2aHXByDLSyaJTZKy +p7qW6ONYjyKcAZZaxPcxTQtJteF4YeJUGAa7nlQ0fgw+6+61gB/dFoQdaDhmZ3P4 +kQIDAQABo4IBHzCCARswEQYJYIZIAYb4QgEBBAQDAgAHMF8GA1UdHwRYMFYwVKBS +oFCkTjBMMQswCQYDVQQGEwJzaTEbMBkGA1UEChMSc3RhdGUtaW5zdGl0dXRpb25z +MREwDwYDVQQLEwhzaWdlbi1jYTENMAsGA1UEAxMEQ1JMMTArBgNVHRAEJDAigA8y +MDAxMDYyOTIxMjc0NlqBDzIwMjEwNjI5MjE1NzQ2WjALBgNVHQ8EBAMCAQYwHwYD +VR0jBBgwFoAUcXuKBh8xBVWrYBJ3RyAeA4gY7IkwHQYDVR0OBBYEFHF7igYfMQVV +q2ASd0cgHgOIGOyJMAwGA1UdEwQFMAMBAf8wHQYJKoZIhvZ9B0EABBAwDhsIVjUu +MDo0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4IBAQAAumM08xgY7q5+jZLHNfXCE9TW +AKohMhbW0Fv6KbCN+hd3kvmltvb5hz8GDyDuYj0096kvx6k70CeITKzdyanlWliF +1xI1Pdywglty9Ltzt/v+OCGYBICyiGIPHqw6Fqnmswr2FRBFA6OX4s2sENz5AB6/ +c2xD7HciFgYvloOJe7C4U0RBCNyAHwXbGQl2h741nU4hS7STwWg6nV82/qGuMCxL +3ngkOljWFkPvnZk4iyqY/jDRwurWryXVpXYLue9AOS72698yXh19h7VEzAI50iaV +cthvhUOojw6jRs7Xzui5Vqn4iRcSH0NJBnoy5z++b3m+1jPXTDwo/BLxdnYYMCAw +CgYIKwYBBQUHAwMMEnN0YXRlLWluc3RpdHV0aW9ucw== +-----END TRUSTED CERTIFICATE----- + +# thawte Primary Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIEIDCCAwigAwIBAgIQNE7VVyDV7exJ9C/ON9srbTANBgkqhkiG9w0BAQUFADCB +qTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMf +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIw +MDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxHzAdBgNV +BAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwHhcNMDYxMTE3MDAwMDAwWhcNMzYw +NzE2MjM1OTU5WjCBqTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5j +LjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYG +A1UECxMvKGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl +IG9ubHkxHzAdBgNVBAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsoPD7gFnUnMekz52hWXMJEEUMDSxuaPFs +W0hoSVk3/AszGcJ3f8wQLZU0HObrTQmnHNK4yZc2AreJ1CRfBsDMRJSUjQJib+ta +3RGNKJpchJAQeg29dGYvajig4tVUROsdB58Hum/u6f1OCyn1PoSgAfGcq/gcfomk +6KHYcWUNo1F77rzSImANuVud37r8UVsLr5iy6S7pBOhih94ryNdOwUxkHt3Ph1i6 +Sk/KaAcdHJ1KxtUvkcx8cXIcxcBn6zL9yZJclNqFwJu/U30rCfSMnZEfl2pSy94J +NqR32HuHUETVPm4pafs5SSYeCaWAe0At6+gnhcn+Yf1+5nyXHdWdAgMBAAGjQjBA +MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7W0XP +r87Lev0xkhpqtvNG61dIUDANBgkqhkiG9w0BAQUFAAOCAQEAeRHAS7ORtvzw6WfU +DW5FvlXok9LOAz/t2iWwHVfLHjp2oEzsUHboZHIMpKnxuIvW1oeEuzLlQRHAd9mz +YJ3rG9XRbkREqaYB7FViHXe4XI5ISXycO1cRrK1zN44veFyQaEfZYGDm/Ac9IiAX +xPcW6cTYcvnIc3zfFi8VqT79aie2oetaupgf1eNNZAqdE8hhuvU5HIe6uL17In/2 +/qxAeeWsEG89jxt5dovEN7MhGITlNgDrYyCZuen+MwS7QcjBAvlEYyCegc5C09Y/ +LHbTY5xZ3Y+m4Q6gLkH3LpVHz7z9M/P2C2F+fpErgUfCJzDupxBdN49cOSvkBPB7 +jVaMaDAkMAoGCCsGAQUFBwMDDBZ0aGF3dGUgUHJpbWFyeSBSb290IENB +-----END TRUSTED CERTIFICATE----- + +# thawte Primary Root CA - G2 +-----BEGIN TRUSTED CERTIFICATE----- +MIICiDCCAg2gAwIBAgIQNfwmXNmET8k9Jj1Xm67XVjAKBggqhkjOPQQDAzCBhDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjE4MDYGA1UECxMvKGMp +IDIwMDcgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAi +BgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMjAeFw0wNzExMDUwMDAw +MDBaFw0zODAxMTgyMzU5NTlaMIGEMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhh +d3RlLCBJbmMuMTgwNgYDVQQLEy8oYykgMjAwNyB0aGF3dGUsIEluYy4gLSBGb3Ig +YXV0aG9yaXplZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9v +dCBDQSAtIEcyMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEotWcgnuVnfFSeIf+iha/ +BebfowJPDQfGAFG6DAJSLSKkQjnE/o/qycG+1E3/n3qe4rF8mq2nhglzh9HnmuN6 +papu+7qzcMBniKI11KOasf2twu8x+qi58/sIxpHR+ymVo0IwQDAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUmtgAMADna3+FGO6Lts6K +DPgR4bswCgYIKoZIzj0EAwMDaQAwZgIxAN344FdHW6fmCsO99YCKlzUNG4k8VIZ3 +KMqh9HneteY4sPBlcIx/AlTCv//YoT7ZzwIxAMSNlPzcU9LcnXgWHxUzI1NS41ox +XZ3Krr0TKUQNJ1uo52icEvdYPy5yAlejj6EULjApMAoGCCsGAQUFBwMDDBt0aGF3 +dGUgUHJpbWFyeSBSb290IENBIC0gRzI= +-----END TRUSTED CERTIFICATE----- + +# thawte Primary Root CA - G3 +-----BEGIN TRUSTED CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIQYAGXt0an6rS0mtZLL/eQ+zANBgkqhkiG9w0BAQsFADCB +rjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMf +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIw +MDggdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAiBgNV +BAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMzAeFw0wODA0MDIwMDAwMDBa +Fw0zNzEyMDEyMzU5NTlaMIGuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3Rl +LCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9u +MTgwNgYDVQQLEy8oYykgMjAwOCB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXpl +ZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAtIEcz +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsr8nLPvb2FvdeHsbnndm +gcs+vHyu86YnmjSjaDFxODNi5PNxZnmxqWWjpYvVj2AtP0LMqmsywCPLLEHd5N/8 +YZzic7IilRFDGF/Eth9XbAoFWCLINkw6fKXRz4aviKdEAhN0cXMKQlkC+BsUa0Lf +b1+6a4KinVvnSr0eAXLbS3ToO39/fR8EtCab4LRarEc9VbjXsCZSKAExQGbY2SS9 +9irY7CFJXJv2eul/VTV+lmuNk5Mny5K76qxAwJ/C+IDPXfRa3M50hqY+bAtTyr2S +zhkGcuYMXDhpxwTWvGzOW/b3aJzcJRVIiKHpqfiYnODz1TEoYRFsZ5aNOZnLwkUk +OQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNV +HQ4EFgQUrWyqlGCc7eT/+j4KdCtjA/e2Wb8wDQYJKoZIhvcNAQELBQADggEBABpA +2JVlrAmSicY59BDlqQ5mU1143vokkbvnRFHfxhY0Cu9qRFHqKweKA3rD6z8KLFIW +oCtDuSWQP3CpMyVtRRooOyfPqsMpQhvfO0zAMzRbQYi/aytlryjvsvXDqmbOe1bu +t8jLZ8HJnBoYuMTDSQPxYA5QzUbF83d597YV4Djbxy8ooAw/dyZ02SUS2jHaGh7c +KUGRIjxpp7sC8rZcJwOJ9Abqm+RyguOhCcHpABnTPtRwa7pxpqpYrvS76Wy274fM +m7v/OeZWYdMKp8RcTGB7BXcmer/YB1IsYvdwY9k5vG8cwnncdimvzsUsZAReiDZu +MdRAGmI0Nj81Aa6sY6AwKTAKBggrBgEFBQcDAwwbdGhhd3RlIFByaW1hcnkgUm9v +dCBDQSAtIEcz +-----END TRUSTED CERTIFICATE----- + +# vTrus ECC Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIICDzCCAZWgAwIBAgIUbmq8WapTvpg5Z6LSa6Q75m0c1towCgYIKoZIzj0EAwMw +RzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4xGjAY +BgNVBAMTEXZUcnVzIEVDQyBSb290IENBMB4XDTE4MDczMTA3MjY0NFoXDTQzMDcz +MTA3MjY0NFowRzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28u +LEx0ZC4xGjAYBgNVBAMTEXZUcnVzIEVDQyBSb290IENBMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEZVBKrox5lkqqHAjDo6LN/llWQXf9JpRCux3NCNtzslt188+cToL0 +v/hhJoVs1oVbcnDS/dtitN9Ti72xRFhiQgnH+n9bEOf+QP3A2MMrMudwpremIFUd +e4BdS49nTPEQo0IwQDAdBgNVHQ4EFgQUmDnNvtiyjPeyq+GtJK97fKHbH88wDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwCgYIKoZIzj0EAwMDaAAwZQIw +V53dVvHH4+m4SVBrm2nDb+zDfSXkV5UTQJtS0zvzQBm8JsctBp61ezaf9SXUY2sA +AjEA6dPGnlaaKsyh2j/IZivTWJwghfqrkYpwcBE4YGQLYgmRWAD5Tfs0aNoJrSEG +GJTOMB8wCgYIKwYBBQUHAwEMEXZUcnVzIEVDQyBSb290IENB +-----END TRUSTED CERTIFICATE----- + +# vTrus Root CA +-----BEGIN TRUSTED CERTIFICATE----- +MIIFVjCCAz6gAwIBAgIUQ+NxE9izWRRdt86M/TX9b7wFjUUwDQYJKoZIhvcNAQEL +BQAwQzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4x +FjAUBgNVBAMTDXZUcnVzIFJvb3QgQ0EwHhcNMTgwNzMxMDcyNDA1WhcNNDMwNzMx +MDcyNDA1WjBDMQswCQYDVQQGEwJDTjEcMBoGA1UEChMTaVRydXNDaGluYSBDby4s +THRkLjEWMBQGA1UEAxMNdlRydXMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAL1VfGHTuB0EYgWgrmy3cLRB6ksDXhA/kFocizuwZotsSKYc +IrrVQJLuM7IjWcmOvFjai57QGfIvWcaMY1q6n6MLsLOaXLoRuBLpDLvPbmyAhykU +AyyNJJrIZIO1aqwTLDPxn9wsYTwaP3BVm60AUn/PBLn+NvqcwBauYv6WTEN+VRS+ +GrPSbcKvdmaVayqwlHeFXgQPYh1jdfdr58tbmnDsPmcF8P4HCIDPKNsFxhQnL4Z9 +8Cfe/+Z+M0jnCx5Y0ScrUw5XSmXX+6KAYPxMvDVTAWqXcoKv8R1w6Jz1717CbMdH +flqUhSZNO7rrTOiwCcJlwp2dCZtOtZcFrPUGoPc2BX70kLJrxLT5ZOrpGgrIDajt +J8nU57O5q4IikCc9Kuh8kO+8T/3iCiSn3mUkpF3qwHYw03dQ+A0Em5Q2AXPKBlim +0zvc+gRGE1WKyURHuFE5Gi7oNOJ5y1lKCn+8pu8fA2dqWSslYpPZUxlmPCdiKYZN +pGvu/9ROutW04o5IWgAZCfEF2c6Rsffr6TlP9m8EQ5pV9T4FFL2/s1m02I4zhKOQ +UqqzApVg+QxMaPnu1RcN+HFXtSXkKe5lXa/R7jwXC1pDxaWG6iSe4gUH3DRCEpHW +OXSuTEGC2/KmSNGzm/MzqvOmwMVO9fSddmPmAsYiS8GVP1BkLFTltvA8Kc9XAgMB +AAGjQjBAMB0GA1UdDgQWBBRUYnBj8XWEQ1iO0RYgscasGrz2iTAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAKbqSSaet +8PFww+SX8J+pJdVrnjT+5hpk9jprUrIQeBqfTNqK2uwcN1LgQkv7bHbKJAs5EhWd +nxEt/Hlk3ODg9d3gV8mlsnZwUKT+twpw1aA08XXXTUm6EdGz2OyC/+sOxL9kLX1j +bhd47F18iMjrjld22VkE+rxSH0Ws8HqA7Oxvdq6R2xCOBNyS36D25q5J08FsEhvM +Kar5CKXiNxTKsbhm7xqC5PD48acWabfbqWE8n/Uxy+QARsIvdLGx14HuqCaVvIiv +TDUHKgLKeBRtRytAVunLKmChZwOgzoy8sHJnxDHO2zTlJQNgJXtxmOTAGytfdELS +S8VZCAeHvsXDf+eW2eHcKJfWjwXj9ZtOyh1QRwVTsMo554WgicEFOwE30z9J4nfr +I8iIZjs9OXYhRvHsXyO466JmdXTBQPfYaJqT4i2pLr0cox7IdMakLXogqzu4sEb9 +b91fUlV1YvCXoHzXOP0l382gmxDPi7g4Xl7FtKYCNqEeXxzP4padKar9mK5S4fNB +UvupLnKWnyfjqnN9+BojZns7q2WwMgFLFT49ok8MKzWixtlnEjUwzXYuFrOZnk1P +Ti07NEPhmg4NpGaXutIcSkwsKouLgU9xGqndXHt7CMUADTdA43x7VF8vhV929ven +sBxXVsFy6K2ir40zSbofitzmdHxghm+Hl3swGzAKBggrBgEFBQcDAQwNdlRydXMg +Um9vdCBDQQ== +-----END TRUSTED CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/README b/pki/ca-trust/extracted/pem/README new file mode 100644 index 0000000..bf22a63 --- /dev/null +++ b/pki/ca-trust/extracted/pem/README @@ -0,0 +1,21 @@ +This directory /etc/pki/ca-trust/extracted/pem/ contains +CA certificate bundle files which are automatically created +based on the information found in the +/usr/share/pki/ca-trust-source/ and /etc/pki/ca-trust/source/ +directories. + +All files are in the BEGIN/END CERTIFICATE file format, +as described in the x509(1) manual page. + +Distrust information cannot be represented in this file format, +and distrusted certificates are missing from these files. + +If your application isn't able to load the PKCS#11 module p11-kit-trust.so, +then you can use these files in your application to load a list of global +root CA certificates. + +Please never manually edit the files stored in this directory, +because your changes will be lost and the files automatically overwritten, +each time the update-ca-trust command gets executed. + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/extracted/pem/directory-hash/002c0b4f.0 b/pki/ca-trust/extracted/pem/directory-hash/002c0b4f.0 new file mode 120000 index 0000000..82ecbd2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/002c0b4f.0 @@ -0,0 +1 @@ +GlobalSign_Root_R46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/01419da9.0 b/pki/ca-trust/extracted/pem/directory-hash/01419da9.0 new file mode 120000 index 0000000..7e0403c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/01419da9.0 @@ -0,0 +1 @@ +Microsoft_ECC_Root_Certificate_Authority_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0179095f.0 b/pki/ca-trust/extracted/pem/directory-hash/0179095f.0 new file mode 120000 index 0000000..e225d28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0179095f.0 @@ -0,0 +1 @@ +BJCA_Global_Root_CA1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/02265526.0 b/pki/ca-trust/extracted/pem/directory-hash/02265526.0 new file mode 120000 index 0000000..8f7ad29 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/02265526.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/04f60c28.0 b/pki/ca-trust/extracted/pem/directory-hash/04f60c28.0 new file mode 120000 index 0000000..e08a770 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/04f60c28.0 @@ -0,0 +1 @@ +USERTrust_ECC_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/062cdee6.0 b/pki/ca-trust/extracted/pem/directory-hash/062cdee6.0 new file mode 120000 index 0000000..2612328 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/062cdee6.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA_-_R3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/064e0aa9.0 b/pki/ca-trust/extracted/pem/directory-hash/064e0aa9.0 new file mode 120000 index 0000000..de6f546 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/064e0aa9.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_2_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/068570d1.0 b/pki/ca-trust/extracted/pem/directory-hash/068570d1.0 new file mode 120000 index 0000000..955158d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/068570d1.0 @@ -0,0 +1 @@ +FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/06dc52d5.0 b/pki/ca-trust/extracted/pem/directory-hash/06dc52d5.0 new file mode 120000 index 0000000..68ea29d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/06dc52d5.0 @@ -0,0 +1 @@ +SSL.com_EV_Root_Certification_Authority_RSA_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/073bfcc5.0 b/pki/ca-trust/extracted/pem/directory-hash/073bfcc5.0 new file mode 120000 index 0000000..b8618ac --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/073bfcc5.0 @@ -0,0 +1 @@ +TrustAsia_Global_Root_CA_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/08063a00.0 b/pki/ca-trust/extracted/pem/directory-hash/08063a00.0 new file mode 120000 index 0000000..267a5cc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/08063a00.0 @@ -0,0 +1 @@ +Security_Communication_RootCA3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/09789157.0 b/pki/ca-trust/extracted/pem/directory-hash/09789157.0 new file mode 120000 index 0000000..1ac9c0e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/09789157.0 @@ -0,0 +1 @@ +Starfield_Services_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0a775a30.0 b/pki/ca-trust/extracted/pem/directory-hash/0a775a30.0 new file mode 120000 index 0000000..1f13783 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0a775a30.0 @@ -0,0 +1 @@ +GTS_Root_R3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0b1b94ef.0 b/pki/ca-trust/extracted/pem/directory-hash/0b1b94ef.0 new file mode 120000 index 0000000..69ff81e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0b1b94ef.0 @@ -0,0 +1 @@ +CFCA_EV_ROOT.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0b9bc432.0 b/pki/ca-trust/extracted/pem/directory-hash/0b9bc432.0 new file mode 120000 index 0000000..31d60a0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0b9bc432.0 @@ -0,0 +1 @@ +ISRG_Root_X2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0bf05006.0 b/pki/ca-trust/extracted/pem/directory-hash/0bf05006.0 new file mode 120000 index 0000000..781007b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0bf05006.0 @@ -0,0 +1 @@ +SSL.com_Root_Certification_Authority_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0d69c7e1.0 b/pki/ca-trust/extracted/pem/directory-hash/0d69c7e1.0 new file mode 120000 index 0000000..6ab0a22 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0d69c7e1.0 @@ -0,0 +1 @@ +GlobalSign_ECC_Root_CA_-_R4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0f5dc4f3.0 b/pki/ca-trust/extracted/pem/directory-hash/0f5dc4f3.0 new file mode 120000 index 0000000..6184212 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0f5dc4f3.0 @@ -0,0 +1 @@ +UCA_Extended_Validation_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/0f6fa695.0 b/pki/ca-trust/extracted/pem/directory-hash/0f6fa695.0 new file mode 120000 index 0000000..48a515c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/0f6fa695.0 @@ -0,0 +1 @@ +GDCA_TrustAUTH_R5_ROOT.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1001acf7.0 b/pki/ca-trust/extracted/pem/directory-hash/1001acf7.0 new file mode 120000 index 0000000..2478d44 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1001acf7.0 @@ -0,0 +1 @@ +GTS_Root_R1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/10531352.0 b/pki/ca-trust/extracted/pem/directory-hash/10531352.0 new file mode 120000 index 0000000..1ac9c0e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/10531352.0 @@ -0,0 +1 @@ +Starfield_Services_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/106f3e4d.0 b/pki/ca-trust/extracted/pem/directory-hash/106f3e4d.0 new file mode 120000 index 0000000..433d7b1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/106f3e4d.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_EC1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/128f4b91.0 b/pki/ca-trust/extracted/pem/directory-hash/128f4b91.0 new file mode 120000 index 0000000..869aa2b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/128f4b91.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/14bc7599.0 b/pki/ca-trust/extracted/pem/directory-hash/14bc7599.0 new file mode 120000 index 0000000..82d621f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/14bc7599.0 @@ -0,0 +1 @@ +emSign_ECC_Root_CA_-_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/18856ac4.0 b/pki/ca-trust/extracted/pem/directory-hash/18856ac4.0 new file mode 120000 index 0000000..04dacae --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/18856ac4.0 @@ -0,0 +1 @@ +SecureSign_RootCA11.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1ae85e5e.0 b/pki/ca-trust/extracted/pem/directory-hash/1ae85e5e.0 new file mode 120000 index 0000000..293dad9 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1ae85e5e.0 @@ -0,0 +1 @@ +Trustwave_Global_ECC_P256_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1b0f7e5c.0 b/pki/ca-trust/extracted/pem/directory-hash/1b0f7e5c.0 new file mode 120000 index 0000000..82ecbd2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1b0f7e5c.0 @@ -0,0 +1 @@ +GlobalSign_Root_R46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1cef98f5.0 b/pki/ca-trust/extracted/pem/directory-hash/1cef98f5.0 new file mode 120000 index 0000000..b8618ac --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1cef98f5.0 @@ -0,0 +1 @@ +TrustAsia_Global_Root_CA_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1d3472b9.0 b/pki/ca-trust/extracted/pem/directory-hash/1d3472b9.0 new file mode 120000 index 0000000..b76c9bc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1d3472b9.0 @@ -0,0 +1 @@ +GlobalSign_ECC_Root_CA_-_R5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1df5a75f.0 b/pki/ca-trust/extracted/pem/directory-hash/1df5a75f.0 new file mode 120000 index 0000000..908d179 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1df5a75f.0 @@ -0,0 +1 @@ +D-TRUST_Root_Class_3_CA_2_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1e08bfd1.0 b/pki/ca-trust/extracted/pem/directory-hash/1e08bfd1.0 new file mode 120000 index 0000000..8445bf8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1e08bfd1.0 @@ -0,0 +1 @@ +IdenTrust_Public_Sector_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1e09d511.0 b/pki/ca-trust/extracted/pem/directory-hash/1e09d511.0 new file mode 120000 index 0000000..a35af48 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1e09d511.0 @@ -0,0 +1 @@ +T-TeleSec_GlobalRoot_Class_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1e1eab7c.0 b/pki/ca-trust/extracted/pem/directory-hash/1e1eab7c.0 new file mode 120000 index 0000000..391dfda --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1e1eab7c.0 @@ -0,0 +1 @@ +T-TeleSec_GlobalRoot_Class_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1e8e7201.0 b/pki/ca-trust/extracted/pem/directory-hash/1e8e7201.0 new file mode 120000 index 0000000..2612328 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1e8e7201.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA_-_R3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1ec40989.0 b/pki/ca-trust/extracted/pem/directory-hash/1ec40989.0 new file mode 120000 index 0000000..03f6e58 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1ec40989.0 @@ -0,0 +1 @@ +GLOBALTRUST_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/1f58a078.0 b/pki/ca-trust/extracted/pem/directory-hash/1f58a078.0 new file mode 120000 index 0000000..de6f546 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/1f58a078.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_2_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/219d9499.0 b/pki/ca-trust/extracted/pem/directory-hash/219d9499.0 new file mode 120000 index 0000000..12859a1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/219d9499.0 @@ -0,0 +1 @@ +Go_Daddy_Class_2_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/228f89db.0 b/pki/ca-trust/extracted/pem/directory-hash/228f89db.0 new file mode 120000 index 0000000..4aa9a71 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/228f89db.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_ECC_Root-01.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/23f4c490.0 b/pki/ca-trust/extracted/pem/directory-hash/23f4c490.0 new file mode 120000 index 0000000..8a8a6c1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/23f4c490.0 @@ -0,0 +1 @@ +Starfield_Class_2_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/244b5494.0 b/pki/ca-trust/extracted/pem/directory-hash/244b5494.0 new file mode 120000 index 0000000..0a20d14 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/244b5494.0 @@ -0,0 +1 @@ +DigiCert_High_Assurance_EV_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/252252d2.0 b/pki/ca-trust/extracted/pem/directory-hash/252252d2.0 new file mode 120000 index 0000000..ba587ba --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/252252d2.0 @@ -0,0 +1 @@ +DigiCert_TLS_ECC_P384_Root_G5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2923b3f9.0 b/pki/ca-trust/extracted/pem/directory-hash/2923b3f9.0 new file mode 120000 index 0000000..9186210 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2923b3f9.0 @@ -0,0 +1 @@ +emSign_Root_CA_-_G1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2add47b6.0 b/pki/ca-trust/extracted/pem/directory-hash/2add47b6.0 new file mode 120000 index 0000000..b76c9bc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2add47b6.0 @@ -0,0 +1 @@ +GlobalSign_ECC_Root_CA_-_R5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2ae6433e.0 b/pki/ca-trust/extracted/pem/directory-hash/2ae6433e.0 new file mode 120000 index 0000000..b70b358 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2ae6433e.0 @@ -0,0 +1 @@ +CA_Disig_Root_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2b349938.0 b/pki/ca-trust/extracted/pem/directory-hash/2b349938.0 new file mode 120000 index 0000000..8bd8025 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2b349938.0 @@ -0,0 +1 @@ +AffirmTrust_Commercial.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2c63f966.0 b/pki/ca-trust/extracted/pem/directory-hash/2c63f966.0 new file mode 120000 index 0000000..0e5e1da --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2c63f966.0 @@ -0,0 +1 @@ +SSL.com_TLS_RSA_Root_CA_2022.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2d21b73c.0 b/pki/ca-trust/extracted/pem/directory-hash/2d21b73c.0 new file mode 120000 index 0000000..343b96f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2d21b73c.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/2d9dafe4.0 b/pki/ca-trust/extracted/pem/directory-hash/2d9dafe4.0 new file mode 120000 index 0000000..d3c6de0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/2d9dafe4.0 @@ -0,0 +1 @@ +Buypass_Class_3_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/302904dd.0 b/pki/ca-trust/extracted/pem/directory-hash/302904dd.0 new file mode 120000 index 0000000..7b1be65 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/302904dd.0 @@ -0,0 +1 @@ +Certigna_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/304d27c3.0 b/pki/ca-trust/extracted/pem/directory-hash/304d27c3.0 new file mode 120000 index 0000000..c40d67a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/304d27c3.0 @@ -0,0 +1 @@ +UCA_Global_G2_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/31188b5e.0 b/pki/ca-trust/extracted/pem/directory-hash/31188b5e.0 new file mode 120000 index 0000000..6cdb0a2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/31188b5e.0 @@ -0,0 +1 @@ +TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/32888f65.0 b/pki/ca-trust/extracted/pem/directory-hash/32888f65.0 new file mode 120000 index 0000000..39dde35 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/32888f65.0 @@ -0,0 +1 @@ +Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/33ee480d.0 b/pki/ca-trust/extracted/pem/directory-hash/33ee480d.0 new file mode 120000 index 0000000..0dde01c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/33ee480d.0 @@ -0,0 +1 @@ +SSL.com_Root_Certification_Authority_RSA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/34d996fb.0 b/pki/ca-trust/extracted/pem/directory-hash/34d996fb.0 new file mode 120000 index 0000000..22354c6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/34d996fb.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_ECC_Root-02.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/35105088.0 b/pki/ca-trust/extracted/pem/directory-hash/35105088.0 new file mode 120000 index 0000000..e29daca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/35105088.0 @@ -0,0 +1 @@ +USERTrust_RSA_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3513523f.0 b/pki/ca-trust/extracted/pem/directory-hash/3513523f.0 new file mode 120000 index 0000000..41d74a4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3513523f.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/399e7759.0 b/pki/ca-trust/extracted/pem/directory-hash/399e7759.0 new file mode 120000 index 0000000..41d74a4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/399e7759.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3ad48a91.0 b/pki/ca-trust/extracted/pem/directory-hash/3ad48a91.0 new file mode 120000 index 0000000..6481493 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3ad48a91.0 @@ -0,0 +1 @@ +Baltimore_CyberTrust_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3afde786.0 b/pki/ca-trust/extracted/pem/directory-hash/3afde786.0 new file mode 120000 index 0000000..1776eb4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3afde786.0 @@ -0,0 +1 @@ +Sectigo_Public_Server_Authentication_Root_E46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3bde41ac.0 b/pki/ca-trust/extracted/pem/directory-hash/3bde41ac.0 new file mode 120000 index 0000000..634e72b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3bde41ac.0 @@ -0,0 +1 @@ +Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3c860d51.0 b/pki/ca-trust/extracted/pem/directory-hash/3c860d51.0 new file mode 120000 index 0000000..855a9c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3c860d51.0 @@ -0,0 +1 @@ +SwissSign_Gold_CA_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3c899c73.0 b/pki/ca-trust/extracted/pem/directory-hash/3c899c73.0 new file mode 120000 index 0000000..44b38dd --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3c899c73.0 @@ -0,0 +1 @@ +OISTE_WISeKey_Global_Root_GC_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3c9a4d3b.0 b/pki/ca-trust/extracted/pem/directory-hash/3c9a4d3b.0 new file mode 120000 index 0000000..ed152b5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3c9a4d3b.0 @@ -0,0 +1 @@ +ACCVRAIZ1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3e359ba6.0 b/pki/ca-trust/extracted/pem/directory-hash/3e359ba6.0 new file mode 120000 index 0000000..487fda7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3e359ba6.0 @@ -0,0 +1 @@ +BJCA_Global_Root_CA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3e7271e8.0 b/pki/ca-trust/extracted/pem/directory-hash/3e7271e8.0 new file mode 120000 index 0000000..f2fddd3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3e7271e8.0 @@ -0,0 +1 @@ +Entrust.net_Premium_2048_Secure_Server_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/3fb36b73.0 b/pki/ca-trust/extracted/pem/directory-hash/3fb36b73.0 new file mode 120000 index 0000000..0ec2e82 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/3fb36b73.0 @@ -0,0 +1 @@ +NAVER_Global_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/40193066.0 b/pki/ca-trust/extracted/pem/directory-hash/40193066.0 new file mode 120000 index 0000000..f41c198 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/40193066.0 @@ -0,0 +1 @@ +Certum_Trusted_Network_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4042bcee.0 b/pki/ca-trust/extracted/pem/directory-hash/4042bcee.0 new file mode 120000 index 0000000..6dafe28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4042bcee.0 @@ -0,0 +1 @@ +ISRG_Root_X1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/40547a79.0 b/pki/ca-trust/extracted/pem/directory-hash/40547a79.0 new file mode 120000 index 0000000..8c89a29 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/40547a79.0 @@ -0,0 +1 @@ +COMODO_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/406c9bb1.0 b/pki/ca-trust/extracted/pem/directory-hash/406c9bb1.0 new file mode 120000 index 0000000..8f34a5a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/406c9bb1.0 @@ -0,0 +1 @@ +emSign_Root_CA_-_C1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/41a3f684.0 b/pki/ca-trust/extracted/pem/directory-hash/41a3f684.0 new file mode 120000 index 0000000..74f3226 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/41a3f684.0 @@ -0,0 +1 @@ +Certum_EC-384_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/455f1b52.0 b/pki/ca-trust/extracted/pem/directory-hash/455f1b52.0 new file mode 120000 index 0000000..8f7ad29 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/455f1b52.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/48a195d8.0 b/pki/ca-trust/extracted/pem/directory-hash/48a195d8.0 new file mode 120000 index 0000000..0762452 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/48a195d8.0 @@ -0,0 +1 @@ +Izenpe.com.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/48bec511.0 b/pki/ca-trust/extracted/pem/directory-hash/48bec511.0 new file mode 120000 index 0000000..a1b189b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/48bec511.0 @@ -0,0 +1 @@ +Certum_Trusted_Network_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4b718d9b.0 b/pki/ca-trust/extracted/pem/directory-hash/4b718d9b.0 new file mode 120000 index 0000000..64c0c33 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4b718d9b.0 @@ -0,0 +1 @@ +emSign_ECC_Root_CA_-_C3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4be590e0.0 b/pki/ca-trust/extracted/pem/directory-hash/4be590e0.0 new file mode 120000 index 0000000..8445bf8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4be590e0.0 @@ -0,0 +1 @@ +IdenTrust_Public_Sector_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4bfab552.0 b/pki/ca-trust/extracted/pem/directory-hash/4bfab552.0 new file mode 120000 index 0000000..c5b483e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4bfab552.0 @@ -0,0 +1 @@ +Starfield_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4c3982f2.0 b/pki/ca-trust/extracted/pem/directory-hash/4c3982f2.0 new file mode 120000 index 0000000..7786be6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4c3982f2.0 @@ -0,0 +1 @@ +HARICA_TLS_ECC_Root_CA_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4f316efb.0 b/pki/ca-trust/extracted/pem/directory-hash/4f316efb.0 new file mode 120000 index 0000000..855a9c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4f316efb.0 @@ -0,0 +1 @@ +SwissSign_Gold_CA_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/4fd49c6c.0 b/pki/ca-trust/extracted/pem/directory-hash/4fd49c6c.0 new file mode 120000 index 0000000..c12aa7b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/4fd49c6c.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_RSA_Root-02.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5046c355.0 b/pki/ca-trust/extracted/pem/directory-hash/5046c355.0 new file mode 120000 index 0000000..676f46e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5046c355.0 @@ -0,0 +1 @@ +SwissSign_Silver_CA_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/52b525c7.0 b/pki/ca-trust/extracted/pem/directory-hash/52b525c7.0 new file mode 120000 index 0000000..d675744 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/52b525c7.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_1_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/53a1b57a.0 b/pki/ca-trust/extracted/pem/directory-hash/53a1b57a.0 new file mode 120000 index 0000000..832faa4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/53a1b57a.0 @@ -0,0 +1 @@ +HiPKI_Root_CA_-_G1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5443e9e3.0 b/pki/ca-trust/extracted/pem/directory-hash/5443e9e3.0 new file mode 120000 index 0000000..391dfda --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5443e9e3.0 @@ -0,0 +1 @@ +T-TeleSec_GlobalRoot_Class_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/54657681.0 b/pki/ca-trust/extracted/pem/directory-hash/54657681.0 new file mode 120000 index 0000000..05e0f1d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/54657681.0 @@ -0,0 +1 @@ +Buypass_Class_2_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/57bcb2da.0 b/pki/ca-trust/extracted/pem/directory-hash/57bcb2da.0 new file mode 120000 index 0000000..676f46e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/57bcb2da.0 @@ -0,0 +1 @@ +SwissSign_Silver_CA_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/583d0756.0 b/pki/ca-trust/extracted/pem/directory-hash/583d0756.0 new file mode 120000 index 0000000..68ea29d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/583d0756.0 @@ -0,0 +1 @@ +SSL.com_EV_Root_Certification_Authority_RSA_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5860aaa6.0 b/pki/ca-trust/extracted/pem/directory-hash/5860aaa6.0 new file mode 120000 index 0000000..6334e28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5860aaa6.0 @@ -0,0 +1 @@ +Security_Communication_ECC_RootCA1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5931b5bc.0 b/pki/ca-trust/extracted/pem/directory-hash/5931b5bc.0 new file mode 120000 index 0000000..45a0367 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5931b5bc.0 @@ -0,0 +1 @@ +D-TRUST_EV_Root_CA_1_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/595e996b.0 b/pki/ca-trust/extracted/pem/directory-hash/595e996b.0 new file mode 120000 index 0000000..4aa9a71 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/595e996b.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_ECC_Root-01.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5a3f0ff8.0 b/pki/ca-trust/extracted/pem/directory-hash/5a3f0ff8.0 new file mode 120000 index 0000000..8c89a29 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5a3f0ff8.0 @@ -0,0 +1 @@ +COMODO_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5acf816d.0 b/pki/ca-trust/extracted/pem/directory-hash/5acf816d.0 new file mode 120000 index 0000000..12f3c9b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5acf816d.0 @@ -0,0 +1 @@ +GTS_Root_R4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5ad8a5d6.0 b/pki/ca-trust/extracted/pem/directory-hash/5ad8a5d6.0 new file mode 120000 index 0000000..72b60a6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5ad8a5d6.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5cd81ad7.0 b/pki/ca-trust/extracted/pem/directory-hash/5cd81ad7.0 new file mode 120000 index 0000000..aabfe30 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5cd81ad7.0 @@ -0,0 +1 @@ +TeliaSonera_Root_CA_v1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5e98733a.0 b/pki/ca-trust/extracted/pem/directory-hash/5e98733a.0 new file mode 120000 index 0000000..b15c128 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5e98733a.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5f15c80c.0 b/pki/ca-trust/extracted/pem/directory-hash/5f15c80c.0 new file mode 120000 index 0000000..1372ca3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5f15c80c.0 @@ -0,0 +1 @@ +TWCA_Global_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5f47b495.0 b/pki/ca-trust/extracted/pem/directory-hash/5f47b495.0 new file mode 120000 index 0000000..08b492b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5f47b495.0 @@ -0,0 +1 @@ +Actalis_Authentication_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5f618aec.0 b/pki/ca-trust/extracted/pem/directory-hash/5f618aec.0 new file mode 120000 index 0000000..65e8e80 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5f618aec.0 @@ -0,0 +1 @@ +certSIGN_Root_CA_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5f9a69fa.0 b/pki/ca-trust/extracted/pem/directory-hash/5f9a69fa.0 new file mode 120000 index 0000000..20bb85b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5f9a69fa.0 @@ -0,0 +1 @@ +AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/5fdd185d.0 b/pki/ca-trust/extracted/pem/directory-hash/5fdd185d.0 new file mode 120000 index 0000000..869dd56 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/5fdd185d.0 @@ -0,0 +1 @@ +Certainly_Root_E1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/607986c7.0 b/pki/ca-trust/extracted/pem/directory-hash/607986c7.0 new file mode 120000 index 0000000..fc7786a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/607986c7.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/60afe812.0 b/pki/ca-trust/extracted/pem/directory-hash/60afe812.0 new file mode 120000 index 0000000..464655d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/60afe812.0 @@ -0,0 +1 @@ +NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6187b673.0 b/pki/ca-trust/extracted/pem/directory-hash/6187b673.0 new file mode 120000 index 0000000..6dafe28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6187b673.0 @@ -0,0 +1 @@ +ISRG_Root_X1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/626dceaf.0 b/pki/ca-trust/extracted/pem/directory-hash/626dceaf.0 new file mode 120000 index 0000000..c0c65bb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/626dceaf.0 @@ -0,0 +1 @@ +GTS_Root_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/63a2c897.0 b/pki/ca-trust/extracted/pem/directory-hash/63a2c897.0 new file mode 120000 index 0000000..aabfe30 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/63a2c897.0 @@ -0,0 +1 @@ +TeliaSonera_Root_CA_v1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/653b494a.0 b/pki/ca-trust/extracted/pem/directory-hash/653b494a.0 new file mode 120000 index 0000000..6481493 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/653b494a.0 @@ -0,0 +1 @@ +Baltimore_CyberTrust_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/68dd7389.0 b/pki/ca-trust/extracted/pem/directory-hash/68dd7389.0 new file mode 120000 index 0000000..f75a6f3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/68dd7389.0 @@ -0,0 +1 @@ +Hongkong_Post_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/69105f4f.0 b/pki/ca-trust/extracted/pem/directory-hash/69105f4f.0 new file mode 120000 index 0000000..8130eaf --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/69105f4f.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6b03dec0.0 b/pki/ca-trust/extracted/pem/directory-hash/6b03dec0.0 new file mode 120000 index 0000000..1f13783 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6b03dec0.0 @@ -0,0 +1 @@ +GTS_Root_R3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6b483515.0 b/pki/ca-trust/extracted/pem/directory-hash/6b483515.0 new file mode 120000 index 0000000..5488762 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6b483515.0 @@ -0,0 +1 @@ +Telekom_Security_TLS_ECC_Root_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6b99d060.0 b/pki/ca-trust/extracted/pem/directory-hash/6b99d060.0 new file mode 120000 index 0000000..032a296 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6b99d060.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6d41d539.0 b/pki/ca-trust/extracted/pem/directory-hash/6d41d539.0 new file mode 120000 index 0000000..07ac44f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6d41d539.0 @@ -0,0 +1 @@ +Amazon_Root_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6f7454b3.0 b/pki/ca-trust/extracted/pem/directory-hash/6f7454b3.0 new file mode 120000 index 0000000..267a5cc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6f7454b3.0 @@ -0,0 +1 @@ +Security_Communication_RootCA3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/6fa5da56.0 b/pki/ca-trust/extracted/pem/directory-hash/6fa5da56.0 new file mode 120000 index 0000000..0dde01c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/6fa5da56.0 @@ -0,0 +1 @@ +SSL.com_Root_Certification_Authority_RSA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/706f604c.0 b/pki/ca-trust/extracted/pem/directory-hash/706f604c.0 new file mode 120000 index 0000000..04ca90b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/706f604c.0 @@ -0,0 +1 @@ +XRamp_Global_CA_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/749e9e03.0 b/pki/ca-trust/extracted/pem/directory-hash/749e9e03.0 new file mode 120000 index 0000000..d675744 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/749e9e03.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_1_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/75680d2e.0 b/pki/ca-trust/extracted/pem/directory-hash/75680d2e.0 new file mode 120000 index 0000000..d1385e4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/75680d2e.0 @@ -0,0 +1 @@ +Comodo_AAA_Services_root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/75d1b2ed.0 b/pki/ca-trust/extracted/pem/directory-hash/75d1b2ed.0 new file mode 120000 index 0000000..275c6c1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/75d1b2ed.0 @@ -0,0 +1 @@ +DigiCert_Trusted_Root_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/76579174.0 b/pki/ca-trust/extracted/pem/directory-hash/76579174.0 new file mode 120000 index 0000000..04ca90b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/76579174.0 @@ -0,0 +1 @@ +XRamp_Global_CA_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/76faf6c0.0 b/pki/ca-trust/extracted/pem/directory-hash/76faf6c0.0 new file mode 120000 index 0000000..6b6df23 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/76faf6c0.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7719f463.0 b/pki/ca-trust/extracted/pem/directory-hash/7719f463.0 new file mode 120000 index 0000000..5130bf1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7719f463.0 @@ -0,0 +1 @@ +Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/773e07ad.0 b/pki/ca-trust/extracted/pem/directory-hash/773e07ad.0 new file mode 120000 index 0000000..44b38dd --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/773e07ad.0 @@ -0,0 +1 @@ +OISTE_WISeKey_Global_Root_GC_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7892ad52.0 b/pki/ca-trust/extracted/pem/directory-hash/7892ad52.0 new file mode 120000 index 0000000..43798c3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7892ad52.0 @@ -0,0 +1 @@ +SSL.com_EV_Root_Certification_Authority_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7a3adc42.0 b/pki/ca-trust/extracted/pem/directory-hash/7a3adc42.0 new file mode 120000 index 0000000..e1a26ca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7a3adc42.0 @@ -0,0 +1 @@ +vTrus_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7a780d93.0 b/pki/ca-trust/extracted/pem/directory-hash/7a780d93.0 new file mode 120000 index 0000000..f3c82d6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7a780d93.0 @@ -0,0 +1 @@ +Certainly_Root_R1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7a7c655d.0 b/pki/ca-trust/extracted/pem/directory-hash/7a7c655d.0 new file mode 120000 index 0000000..20b36be --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7a7c655d.0 @@ -0,0 +1 @@ +Amazon_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7a819ef2.0 b/pki/ca-trust/extracted/pem/directory-hash/7a819ef2.0 new file mode 120000 index 0000000..ded02df --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7a819ef2.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7e067d03.0 b/pki/ca-trust/extracted/pem/directory-hash/7e067d03.0 new file mode 120000 index 0000000..487fda7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7e067d03.0 @@ -0,0 +1 @@ +BJCA_Global_Root_CA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7f3d5d1d.0 b/pki/ca-trust/extracted/pem/directory-hash/7f3d5d1d.0 new file mode 120000 index 0000000..db79c20 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7f3d5d1d.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/7fa05551.0 b/pki/ca-trust/extracted/pem/directory-hash/7fa05551.0 new file mode 120000 index 0000000..ec430eb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/7fa05551.0 @@ -0,0 +1 @@ +Telekom_Security_TLS_RSA_Root_2023.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8160b96c.0 b/pki/ca-trust/extracted/pem/directory-hash/8160b96c.0 new file mode 120000 index 0000000..d45e12b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8160b96c.0 @@ -0,0 +1 @@ +Microsec_e-Szigno_Root_CA_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/81b9768f.0 b/pki/ca-trust/extracted/pem/directory-hash/81b9768f.0 new file mode 120000 index 0000000..0a20d14 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/81b9768f.0 @@ -0,0 +1 @@ +DigiCert_High_Assurance_EV_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/81f2d2b1.0 b/pki/ca-trust/extracted/pem/directory-hash/81f2d2b1.0 new file mode 120000 index 0000000..22354c6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/81f2d2b1.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_ECC_Root-02.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/82223c44.0 b/pki/ca-trust/extracted/pem/directory-hash/82223c44.0 new file mode 120000 index 0000000..05e0f1d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/82223c44.0 @@ -0,0 +1 @@ +Buypass_Class_2_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8312c4c1.0 b/pki/ca-trust/extracted/pem/directory-hash/8312c4c1.0 new file mode 120000 index 0000000..ef2010c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8312c4c1.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_RSA_Root-01.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/83e9984f.0 b/pki/ca-trust/extracted/pem/directory-hash/83e9984f.0 new file mode 120000 index 0000000..ca6feba --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/83e9984f.0 @@ -0,0 +1 @@ +e-Szigno_Root_CA_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8508e720.0 b/pki/ca-trust/extracted/pem/directory-hash/8508e720.0 new file mode 120000 index 0000000..869dd56 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8508e720.0 @@ -0,0 +1 @@ +Certainly_Root_E1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/85cde254.0 b/pki/ca-trust/extracted/pem/directory-hash/85cde254.0 new file mode 120000 index 0000000..c5b483e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/85cde254.0 @@ -0,0 +1 @@ +Starfield_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/86212b19.0 b/pki/ca-trust/extracted/pem/directory-hash/86212b19.0 new file mode 120000 index 0000000..a7ae5c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/86212b19.0 @@ -0,0 +1 @@ +AffirmTrust_Networking.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/865fbdf9.0 b/pki/ca-trust/extracted/pem/directory-hash/865fbdf9.0 new file mode 120000 index 0000000..df9fd6a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/865fbdf9.0 @@ -0,0 +1 @@ +SSL.com_TLS_ECC_Root_CA_2022.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/869fbf79.0 b/pki/ca-trust/extracted/pem/directory-hash/869fbf79.0 new file mode 120000 index 0000000..64c0c33 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/869fbf79.0 @@ -0,0 +1 @@ +emSign_ECC_Root_CA_-_C3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8794b4e3.0 b/pki/ca-trust/extracted/pem/directory-hash/8794b4e3.0 new file mode 120000 index 0000000..31d60a0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8794b4e3.0 @@ -0,0 +1 @@ +ISRG_Root_X2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/882de061.0 b/pki/ca-trust/extracted/pem/directory-hash/882de061.0 new file mode 120000 index 0000000..934c8ea --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/882de061.0 @@ -0,0 +1 @@ +certSIGN_ROOT_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/88950faa.0 b/pki/ca-trust/extracted/pem/directory-hash/88950faa.0 new file mode 120000 index 0000000..781007b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/88950faa.0 @@ -0,0 +1 @@ +SSL.com_Root_Certification_Authority_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/89c02a45.0 b/pki/ca-trust/extracted/pem/directory-hash/89c02a45.0 new file mode 120000 index 0000000..2c7c8c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/89c02a45.0 @@ -0,0 +1 @@ +COMODO_ECC_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8cb5ee0f.0 b/pki/ca-trust/extracted/pem/directory-hash/8cb5ee0f.0 new file mode 120000 index 0000000..20b36be --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8cb5ee0f.0 @@ -0,0 +1 @@ +Amazon_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8d10a21f.0 b/pki/ca-trust/extracted/pem/directory-hash/8d10a21f.0 new file mode 120000 index 0000000..ef2010c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8d10a21f.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_RSA_Root-01.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8d6437c3.0 b/pki/ca-trust/extracted/pem/directory-hash/8d6437c3.0 new file mode 120000 index 0000000..a9af253 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8d6437c3.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8d86cdd1.0 b/pki/ca-trust/extracted/pem/directory-hash/8d86cdd1.0 new file mode 120000 index 0000000..934c8ea --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8d86cdd1.0 @@ -0,0 +1 @@ +certSIGN_ROOT_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8d89cda1.0 b/pki/ca-trust/extracted/pem/directory-hash/8d89cda1.0 new file mode 120000 index 0000000..7e0403c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8d89cda1.0 @@ -0,0 +1 @@ +Microsoft_ECC_Root_Certificate_Authority_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/8f103249.0 b/pki/ca-trust/extracted/pem/directory-hash/8f103249.0 new file mode 120000 index 0000000..f460aa5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/8f103249.0 @@ -0,0 +1 @@ +Telia_Root_CA_v2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9046744a.0 b/pki/ca-trust/extracted/pem/directory-hash/9046744a.0 new file mode 120000 index 0000000..92223bf --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9046744a.0 @@ -0,0 +1 @@ +Sectigo_Public_Server_Authentication_Root_R46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/90c5a3c8.0 b/pki/ca-trust/extracted/pem/directory-hash/90c5a3c8.0 new file mode 120000 index 0000000..832faa4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/90c5a3c8.0 @@ -0,0 +1 @@ +HiPKI_Root_CA_-_G1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9282e51c.0 b/pki/ca-trust/extracted/pem/directory-hash/9282e51c.0 new file mode 120000 index 0000000..69ff81e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9282e51c.0 @@ -0,0 +1 @@ +CFCA_EV_ROOT.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/930ac5d2.0 b/pki/ca-trust/extracted/pem/directory-hash/930ac5d2.0 new file mode 120000 index 0000000..08b492b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/930ac5d2.0 @@ -0,0 +1 @@ +Actalis_Authentication_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9339512a.0 b/pki/ca-trust/extracted/pem/directory-hash/9339512a.0 new file mode 120000 index 0000000..6b6df23 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9339512a.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/93851c9e.0 b/pki/ca-trust/extracted/pem/directory-hash/93851c9e.0 new file mode 120000 index 0000000..0c8056e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/93851c9e.0 @@ -0,0 +1 @@ +ANF_Secure_Server_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/93bc0acc.0 b/pki/ca-trust/extracted/pem/directory-hash/93bc0acc.0 new file mode 120000 index 0000000..a7ae5c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/93bc0acc.0 @@ -0,0 +1 @@ +AffirmTrust_Networking.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9479c8c3.0 b/pki/ca-trust/extracted/pem/directory-hash/9479c8c3.0 new file mode 120000 index 0000000..5130bf1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9479c8c3.0 @@ -0,0 +1 @@ +Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9482e63a.0 b/pki/ca-trust/extracted/pem/directory-hash/9482e63a.0 new file mode 120000 index 0000000..74f3226 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9482e63a.0 @@ -0,0 +1 @@ +Certum_EC-384_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9576d26b.0 b/pki/ca-trust/extracted/pem/directory-hash/9576d26b.0 new file mode 120000 index 0000000..b70b358 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9576d26b.0 @@ -0,0 +1 @@ +CA_Disig_Root_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9591a472.0 b/pki/ca-trust/extracted/pem/directory-hash/9591a472.0 new file mode 120000 index 0000000..35301bc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9591a472.0 @@ -0,0 +1 @@ +Microsoft_RSA_Root_Certificate_Authority_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/95aff9e3.0 b/pki/ca-trust/extracted/pem/directory-hash/95aff9e3.0 new file mode 120000 index 0000000..a1b189b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/95aff9e3.0 @@ -0,0 +1 @@ +Certum_Trusted_Network_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9846683b.0 b/pki/ca-trust/extracted/pem/directory-hash/9846683b.0 new file mode 120000 index 0000000..ba587ba --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9846683b.0 @@ -0,0 +1 @@ +DigiCert_TLS_ECC_P384_Root_G5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/985c1f52.0 b/pki/ca-trust/extracted/pem/directory-hash/985c1f52.0 new file mode 120000 index 0000000..747ad9f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/985c1f52.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA_-_R6.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/988a38cb.0 b/pki/ca-trust/extracted/pem/directory-hash/988a38cb.0 new file mode 120000 index 0000000..464655d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/988a38cb.0 @@ -0,0 +1 @@ +NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/98aaf404.0 b/pki/ca-trust/extracted/pem/directory-hash/98aaf404.0 new file mode 120000 index 0000000..b7dcbb9 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/98aaf404.0 @@ -0,0 +1 @@ +TrustAsia_Global_Root_CA_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/99e1b953.0 b/pki/ca-trust/extracted/pem/directory-hash/99e1b953.0 new file mode 120000 index 0000000..e1a26ca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/99e1b953.0 @@ -0,0 +1 @@ +vTrus_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9aef356c.0 b/pki/ca-trust/extracted/pem/directory-hash/9aef356c.0 new file mode 120000 index 0000000..99d24aa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9aef356c.0 @@ -0,0 +1 @@ +Trustwave_Global_ECC_P384_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9b46e03d.0 b/pki/ca-trust/extracted/pem/directory-hash/9b46e03d.0 new file mode 120000 index 0000000..869aa2b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9b46e03d.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9b5697b0.0 b/pki/ca-trust/extracted/pem/directory-hash/9b5697b0.0 new file mode 120000 index 0000000..293dad9 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9b5697b0.0 @@ -0,0 +1 @@ +Trustwave_Global_ECC_P256_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9bf03295.0 b/pki/ca-trust/extracted/pem/directory-hash/9bf03295.0 new file mode 120000 index 0000000..b7dcbb9 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9bf03295.0 @@ -0,0 +1 @@ +TrustAsia_Global_Root_CA_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9c8dfbd4.0 b/pki/ca-trust/extracted/pem/directory-hash/9c8dfbd4.0 new file mode 120000 index 0000000..55228f5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9c8dfbd4.0 @@ -0,0 +1 @@ +AffirmTrust_Premium_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9d04f354.0 b/pki/ca-trust/extracted/pem/directory-hash/9d04f354.0 new file mode 120000 index 0000000..a9af253 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9d04f354.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9d6523ce.0 b/pki/ca-trust/extracted/pem/directory-hash/9d6523ce.0 new file mode 120000 index 0000000..592abb2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9d6523ce.0 @@ -0,0 +1 @@ +ePKI_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9ef4a08a.0 b/pki/ca-trust/extracted/pem/directory-hash/9ef4a08a.0 new file mode 120000 index 0000000..8ca30e4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9ef4a08a.0 @@ -0,0 +1 @@ +D-TRUST_BR_Root_CA_1_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/9f727ac7.0 b/pki/ca-trust/extracted/pem/directory-hash/9f727ac7.0 new file mode 120000 index 0000000..24d323a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/9f727ac7.0 @@ -0,0 +1 @@ +HARICA_TLS_RSA_Root_CA_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ACCVRAIZ1.pem b/pki/ca-trust/extracted/pem/directory-hash/ACCVRAIZ1.pem new file mode 100644 index 0000000..baf74db --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ACCVRAIZ1.pem @@ -0,0 +1,44 @@ +-----BEGIN CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM.pem b/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM.pem new file mode 100644 index 0000000..666cf67 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx +CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ +WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ +BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG +Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ +yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf +BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz +WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF +tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z +374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC +IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL +mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 +wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS +MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 +ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet +UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H +YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 +LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD +nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 +RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM +LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf +77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N +JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm +fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp +6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp +1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B +9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok +RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv +uu8wd+RU4riEmViAqhOLUTpPSPaLtrM= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem b/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem new file mode 100644 index 0000000..8dde431 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICbjCCAfOgAwIBAgIQYvYybOXE42hcG2LdnC6dlTAKBggqhkjOPQQDAzB4MQsw +CQYDVQQGEwJFUzERMA8GA1UECgwIRk5NVC1SQ00xDjAMBgNVBAsMBUNlcmVzMRgw +FgYDVQRhDA9WQVRFUy1RMjgyNjAwNEoxLDAqBgNVBAMMI0FDIFJBSVogRk5NVC1S +Q00gU0VSVklET1JFUyBTRUdVUk9TMB4XDTE4MTIyMDA5MzczM1oXDTQzMTIyMDA5 +MzczM1oweDELMAkGA1UEBhMCRVMxETAPBgNVBAoMCEZOTVQtUkNNMQ4wDAYDVQQL +DAVDZXJlczEYMBYGA1UEYQwPVkFURVMtUTI4MjYwMDRKMSwwKgYDVQQDDCNBQyBS +QUlaIEZOTVQtUkNNIFNFUlZJRE9SRVMgU0VHVVJPUzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPa6V1PIyqvfNkpSIeSX0oNnnvBlUdBeh8dHsVnyV0ebAAKTRBdp20LH +sbI6GA60XYyzZl2hNPk2LEnb80b8s0RpRBNm/dfF/a82Tc4DTQdxz69qBdKiQ1oK +Um8BA06Oi6NCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFAG5L++/EYZg8k/QQW6rcx/n0m5JMAoGCCqGSM49BAMDA2kAMGYCMQCu +SuMrQMN0EfKVrRYj3k4MGuZdpSRea0R7/DjiT8ucRRcRTBQnJlU5dUoDzBOQn5IC +MQD6SmxgiHPz7riYYqnOK8LZiqZwMR2vsJRM60/G49HzYqc8/5MuB1xJAWdpEgJy +v+c= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/ANF_Secure_Server_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/ANF_Secure_Server_Root_CA.pem new file mode 100644 index 0000000..c371237 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ANF_Secure_Server_Root_CA.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF7zCCA9egAwIBAgIIDdPjvGz5a7EwDQYJKoZIhvcNAQELBQAwgYQxEjAQBgNV +BAUTCUc2MzI4NzUxMDELMAkGA1UEBhMCRVMxJzAlBgNVBAoTHkFORiBBdXRvcmlk +YWQgZGUgQ2VydGlmaWNhY2lvbjEUMBIGA1UECxMLQU5GIENBIFJhaXoxIjAgBgNV +BAMTGUFORiBTZWN1cmUgU2VydmVyIFJvb3QgQ0EwHhcNMTkwOTA0MTAwMDM4WhcN +MzkwODMwMTAwMDM4WjCBhDESMBAGA1UEBRMJRzYzMjg3NTEwMQswCQYDVQQGEwJF +UzEnMCUGA1UEChMeQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uMRQwEgYD +VQQLEwtBTkYgQ0EgUmFpejEiMCAGA1UEAxMZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9v +dCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvrayvmZFSVgpCj +cqQZAZ2cC4Ffc0m6p6zzBE57lgvsEeBbphzOG9INgxwruJ4dfkUyYA8H6XdYfp9q +yGFOtibBTI3/TO80sh9l2Ll49a2pcbnvT1gdpd50IJeh7WhM3pIXS7yr/2WanvtH +2Vdy8wmhrnZEE26cLUQ5vPnHO6RYPUG9tMJJo8gN0pcvB2VSAKduyK9o7PQUlrZX +H1bDOZ8rbeTzPvY1ZNoMHKGESy9LS+IsJJ1tk0DrtSOOMspvRdOoiXsezx76W0OL +zc2oD2rKDF65nkeP8Nm2CgtYZRczuSPkdxl9y0oukntPLxB3sY0vaJxizOBQ+OyR +p1RMVwnVdmPF6GUe7m1qzwmd+nxPrWAI/VaZDxUse6mAq4xhj0oHdkLePfTdsiQz +W7i1o0TJrH93PB0j7IKppuLIBkwC/qxcmZkLLxCKpvR/1Yd0DVlJRfbwcVw5Kda/ +SiOL9V8BY9KHcyi1Swr1+KuCLH5zJTIdC2MKF4EA/7Z2Xue0sUDKIbvVgFHlSFJn +LNJhiQcND85Cd8BEc5xEUKDbEAotlRyBr+Qc5RQe8TZBAQIvfXOn3kLMTOmJDVb3 +n5HUA8ZsyY/b2BzgQJhdZpmYgG4t/wHFzstGH6wCxkPmrqKEPMVOHj1tyRRM4y5B +u8o5vzY8KhmqQYdOpc5LMnndkEl/AgMBAAGjYzBhMB8GA1UdIwQYMBaAFJxf0Gxj +o1+TypOYCK2Mh6UsXME3MB0GA1UdDgQWBBScX9BsY6Nfk8qTmAitjIelLFzBNzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AgEATh65isagmD9uw2nAalxJUqzLK114OMHVVISfk/CHGT0sZonrDUL8zPB1hT+L +9IBdeeUXZ701guLyPI59WzbLWoAAKfLOKyzxj6ptBZNscsdW699QIyjlRRA96Gej +rw5VD5AJYu9LWaL2U/HANeQvwSS9eS9OICI7/RogsKQOLHDtdD+4E5UGUcjohybK +pFtqFiGS3XNgnhAY3jyB6ugYw3yJ8otQPr0R4hUDqDZ9MwFsSBXXiJCZBMXM5gf0 +vPSQ7RPi6ovDj6MzD8EpTBNO2hVWcXNyglD2mjN8orGoGjR0ZVzO0eurU+AagNjq +OknkJjCb5RyKqKkVMoaZkgoQI1YS4PbOTOK7vtuNknMBZi9iPrJyJ0U27U1W45eZ +/zo1PqVUSlJZS2Db7v54EX9K3BR5YLZrZAPbFYPhor72I5dQ8AkzNqdxliXzuUJ9 +2zg/LFis6ELhDtjTO0wugumDLmsx2d1Hhk9tl5EuT+IocTUW0fJz/iUrB0ckYyfI ++PbZa/wSMVYIwFNCr5zQM378BvAxRAMU8Vjq8moNqRGyg77FGr8H6lnco4g175x2 +MjxNBiLOFeXdntiP2t7SxDnlF4HPOEfrf4htWRvfn0IUrn7PqLBmZdo3r5+qPeoo +tt7VMVgWglvquxl1AnMaykgaIZOQCo6ThKd9OyMYkomgjaw= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Actalis_Authentication_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Actalis_Authentication_Root_CA.pem new file mode 100644 index 0000000..5762f37 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Actalis_Authentication_Root_CA.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Commercial.pem b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Commercial.pem new file mode 100644 index 0000000..73a3367 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Commercial.pem @@ -0,0 +1,20 @@ +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP +Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr +ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL +MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 +yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr +VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ +nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG +XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj +vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt +Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g +N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC +nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Networking.pem b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Networking.pem new file mode 100644 index 0000000..04f4a81 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Networking.pem @@ -0,0 +1,20 @@ +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y +YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua +kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL +QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp +6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG +yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i +QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO +tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu +QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ +Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u +olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 +x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium.pem b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium.pem new file mode 100644 index 0000000..516ecf5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz +dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG +A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U +cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf +qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ +JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ ++jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS +s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 +HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 +70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG +V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S +qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S +5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia +C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX +OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE +FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 +KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg +Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B +8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ +MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc +0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ +u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF +u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH +YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 +GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO +RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e +KeC2uAloGRwYQw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium_ECC.pem b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium_ECC.pem new file mode 100644 index 0000000..4bcc6a4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/AffirmTrust_Premium_ECC.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC +VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ +cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ +BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt +VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D +0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 +ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G +A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs +aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I +flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_1.pem b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_1.pem new file mode 100644 index 0000000..a6f3e92 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_1.pem @@ -0,0 +1,20 @@ +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy +rqXRfboQnoZsG4q5WTP468SQvvG5 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_2.pem b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_2.pem new file mode 100644 index 0000000..efe3c9f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_2.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGw= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_3.pem b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_3.pem new file mode 100644 index 0000000..a45da70 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_3.pem @@ -0,0 +1,12 @@ +-----BEGIN CERTIFICATE----- +MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl +ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr +ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr +BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM +YyRIHN8wfdVoOw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_4.pem b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_4.pem new file mode 100644 index 0000000..fcbdecc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Amazon_Root_CA_4.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EA== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_2011.pem b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_2011.pem new file mode 100644 index 0000000..988cc68 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_2011.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem new file mode 100644 index 0000000..aa1615f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICFTCCAZugAwIBAgIQPZg7pmY9kGP3fiZXOATvADAKBggqhkjOPQQDAzBMMS4w +LAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgRUNDIFRMUyAyMDIxMQ0w +CwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTI2MjNaFw00MTA0 +MTcwOTI2MjJaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBDQSBF +Q0MgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMHYwEAYHKoZI +zj0CAQYFK4EEACIDYgAEloZYKDcKZ9Cg3iQZGeHkBQcfl+3oZIK59sRxUM6KDP/X +tXa7oWyTbIOiaG6l2b4siJVBzV3dscqDY4PMwL502eCdpO5KTlbgmClBk1IQ1SQ4 +AjJn8ZQSb+/Xxd4u/RmAo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2 +KCXWfeBmmnoJsmo7jjPXNtNPojAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMD +aAAwZQIwW5kp85wxtolrbNa9d+F851F+uDrNozZffPc8dz7kUK2o59JZDCaOMDtu +CCrCp1rIAjEAmeMM56PDr9NJLkaCI2ZdyQAUEv049OGYa3cpetskz2VAv9LcjBHo +9H1/IISpQuQo +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem new file mode 100644 index 0000000..b3d6014 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Atos_TrustedRoot_Root_CA_RSA_TLS_2021.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFZDCCA0ygAwIBAgIQU9XP5hmTC/srBRLYwiqipDANBgkqhkiG9w0BAQwFADBM +MS4wLAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgUlNBIFRMUyAyMDIx +MQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTIxMTBaFw00 +MTA0MTcwOTIxMDlaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBD +QSBSU0EgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtoAOxHm9BYx9sKOdTSJNy/BBl01Z +4NH+VoyX8te9j2y3I49f1cTYQcvyAh5x5en2XssIKl4w8i1mx4QbZFc4nXUtVsYv +Ye+W/CBGvevUez8/fEc4BKkbqlLfEzfTFRVOvV98r61jx3ncCHvVoOX3W3WsgFWZ +kmGbzSoXfduP9LVq6hdKZChmFSlsAvFr1bqjM9xaZ6cF4r9lthawEO3NUDPJcFDs +GY6wx/J0W2tExn2WuZgIWWbeKQGb9Cpt0xU6kGpn8bRrZtkh68rZYnxGEFzedUln +nkL5/nWpo63/dgpnQOPF943HhZpZnmKaau1Fh5hnstVKPNe0OwANwI8f4UDErmwh +3El+fsqyjW22v5MvoVw+j8rtgI5Y4dtXz4U2OLJxpAmMkokIiEjxQGMYsluMWuPD +0xeqqxmjLBvk1cbiZnrXghmmOxYsL3GHX0WelXOTwkKBIROW1527k2gV+p2kHYzy +geBYBr3JtuP2iV2J+axEoctr+hbxx1A9JNr3w+SH1VbxT5Aw+kUJWdo0zuATHAR8 +ANSbhqRAvNncTFd+rrcztl524WWLZt+NyteYr842mIycg5kDcPOvdO3GDjbnvezB +c6eUWsuSZIKmAMFwoW4sKeFYV+xafJlrJaSQOoD0IJ2azsct+bJLKZWD6TWNp0lI +pw9MGZHQ9b8Q4HECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +dEmZ0f+0emhFdcN+tNzMzjkz2ggwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB +DAUAA4ICAQAjQ1MkYlxt/T7Cz1UAbMVWiLkO3TriJQ2VSpfKgInuKs1l+NsW4AmS +4BjHeJi78+xCUvuppILXTdiK/ORO/auQxDh1MoSf/7OwKwIzNsAQkG8dnK/haZPs +o0UvFJ/1TCplQ3IM98P4lYsU84UgYt1UU90s3BiVaU+DR3BAM1h3Egyi61IxHkzJ +qM7F78PRreBrAwA0JrRUITWXAdxfG/F851X6LWh3e9NpzNMOa7pNdkTWwhWaJuyw +xfW70Xp0wmzNxbVe9kzmWy2B27O3Opee7c9GslA9hGCZcbUztVdF5kJHdWoOsAgM +rr3e97sPWD2PAzHoPYJQyi9eDF20l74gNAf0xBLh7tew2VktafcxBPTy+av5EzH4 +AXcOPUIjJsyacmdRIXrMPIWo6iFqO9taPKU0nprALN+AnCng33eU0aKAQv9qTFsR +0PXNor6uzFFcw9VUewyu1rkGd4Di7wcaaMxZUa1+XGdrudviB0JbuAEFWDlN5LuY +o7Ey7Nmj1m+UI/87tyll5gfp77YZ6ufCOB0yiJA8EytuzO+rdwY0d4RPcuSBhPm5 +dDTedk+SKlOxJTnbPP/lPqYO5Wue/9vsL3SD3460s6neFE3/MaNFcyT6lSnMEpcE +oji2jbDwN/zIIX8/syQbPYtuzE2wFg2WHYMfRsCbvUOZ58SWLs5fyQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem b/pki/ca-trust/extracted/pem/directory-hash/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem new file mode 100644 index 0000000..8426523 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem @@ -0,0 +1,35 @@ +-----BEGIN CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 +MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc +tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd +IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j +b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC +AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw +ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m +iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF +Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ +hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P +Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE +EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV +1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t +CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR +5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw +f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 +ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK +GbqEZycPvEJdvSRUDewdcAZfpLz6IHxV +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA1.pem b/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA1.pem new file mode 100644 index 0000000..30675c6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA1.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIQVW9l47TZkGobCdFsPsBsIDANBgkqhkiG9w0BAQsFADBU +MQswCQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRI +T1JJVFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0ExMB4XDTE5MTIxOTAz +MTYxN1oXDTQ0MTIxMjAzMTYxN1owVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJF +SUpJTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2Jh +bCBSb290IENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPFmCL3Z +xRVhy4QEQaVpN3cdwbB7+sN3SJATcmTRuHyQNZ0YeYjjlwE8R4HyDqKYDZ4/N+AZ +spDyRhySsTphzvq3Rp4Dhtczbu33RYx2N95ulpH3134rhxfVizXuhJFyV9xgw8O5 +58dnJCNPYwpj9mZ9S1WnP3hkSWkSl+BMDdMJoDIwOvqfwPKcxRIqLhy1BDPapDgR +at7GGPZHOiJBhyL8xIkoVNiMpTAK+BcWyqw3/XmnkRd4OJmtWO2y3syJfQOcs4ll +5+M7sSKGjwZteAf9kRJ/sGsciQ35uMt0WwfCyPQ10WRjeulumijWML3mG90Vr4Tq +nMfK9Q7q8l0ph49pczm+LiRvRSGsxdRpJQaDrXpIhRMsDQa4bHlW/KNnMoH1V6XK +V0Jp6VwkYe/iMBhORJhVb3rCk9gZtt58R4oRTklH2yiUAguUSiz5EtBP6DF+bHq/ +pj+bOT0CFqMYs2esWz8sgytnOYFcuX6U1WTdno9uruh8W7TXakdI136z1C2OVnZO +z2nxbkRs1CTqjSShGL+9V/6pmTW12xB3uD1IutbB5/EjPtffhZ0nPNRAvQoMvfXn +jSXWgXSHRtQpdaJCbPdzied9v3pKH9MiyRVVz99vfFXQpIsHETdfg6YmV6YBW37+ +WGgHqel62bno/1Afq8K0wM7o6v0PvY1NuLxxAgMBAAGjQjBAMB0GA1UdDgQWBBTF +7+3M2I0hxkjk49cULqcWk+WYATAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAUoKsITQfI/Ki2Pm4rzc2IInRNwPWaZ+4 +YRC6ojGYWUfo0Q0lHhVBDOAqVdVXUsv45Mdpox1NcQJeXyFFYEhcCY5JEMEE3Kli +awLwQ8hOnThJdMkycFRtwUf8jrQ2ntScvd0g1lPJGKm1Vrl2i5VnZu69mP6u775u ++2D2/VnGKhs/I0qUJDAnyIm860Qkmss9vk/Ves6OF8tiwdneHg56/0OGNFK8YT88 +X7vZdrRTvJez/opMEi4r89fO4aL/3Xtw+zuhTaRjAv04l5U/BXCga99igUOLtFkN +SoxUnMW7gZ/NfaXvCyUeOiDbHPwfmGcCCtRzRBPbUYQaVQNW4AB+dAb/OMRyHdOo +P2gxXdMJxy6MW2Pg6Nwe0uxhHvLe5e/2mXZgLR6UcnHGCyoyx5JO1UbXHfmpGQrI ++pXObSOYqgs4rZpWDW+N8TEAiMEXnM0ZNjX+VVOg4DwzX5Ze4jLp3zO7Bkqp2IRz +znfSxqxx4VyjHQy7Ct9f4qNx2No3WqB4K/TUfet27fJhcKVlmtOJNBir+3I+17Q9 +eVzYH6Eze9mCUAyTF6ps3MKCuwJXNq+YJyo5UOGwifUll35HaBC07HPKs5fRJNz2 +YqAo07WjuGS3iGJCz51TzZm+ZGiPTx4SSPfSKcOYKMryMguTjClPPGAyzQWWYezy +r/6zcCwupvI= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA2.pem b/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA2.pem new file mode 100644 index 0000000..34031fa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/BJCA_Global_Root_CA2.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJTCCAaugAwIBAgIQLBcIfWQqwP6FGFkGz7RK6zAKBggqhkjOPQQDAzBUMQsw +CQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRIT1JJ +VFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0EyMB4XDTE5MTIxOTAzMTgy +MVoXDTQ0MTIxMjAzMTgyMVowVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJFSUpJ +TkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2JhbCBS +b290IENBMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABJ3LgJGNU2e1uVCxA/jlSR9B +IgmwUVJY1is0j8USRhTFiy8shP8sbqjV8QnjAyEUxEM9fMEsxEtqSs3ph+B99iK+ ++kpRuDCK/eHeGBIK9ke35xe/J4rUQUyWPGCWwf0VHKNCMEAwHQYDVR0OBBYEFNJK +sVF/BvDRgh9Obl+rg/xI1LCRMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMAoGCCqGSM49BAMDA2gAMGUCMBq8W9f+qdJUDkpd0m2xQNz0Q9XSSpkZElaA +94M04TVOSG0ED1cxMDAtsaqdAzjbBgIxAMvMh1PLet8gUXOQwKhbYdDFUDn9hf7B +43j4ptZLvZuHjw/l1lOWqzzIQNph91Oj9w== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Baltimore_CyberTrust_Root.pem b/pki/ca-trust/extracted/pem/directory-hash/Baltimore_CyberTrust_Root.pem new file mode 100644 index 0000000..519028c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Baltimore_CyberTrust_Root.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_2_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_2_Root_CA.pem new file mode 100644 index 0000000..9daec24 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_2_Root_CA.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr +6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV +L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91 +1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx +MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ +QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB +arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr +Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi +FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS +P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN +9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz +uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h +9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s +A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t +OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo ++fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7 +KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2 +DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us +H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ +I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7 +5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h +3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz +Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqA= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_3_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_3_Root_CA.pem new file mode 100644 index 0000000..23b5306 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Buypass_Class_3_Root_CA.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y +ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E +N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9 +tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX +0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c +/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X +KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY +zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS +O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D +34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP +K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3 +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv +Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj +QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV +cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS +IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2 +HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa +O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv +033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u +dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE +kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41 +3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD +u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq +4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZc= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CA_Disig_Root_R2.pem b/pki/ca-trust/extracted/pem/directory-hash/CA_Disig_Root_R2.pem new file mode 100644 index 0000000..0d94600 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CA_Disig_Root_R2.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CFCA_EV_ROOT.pem b/pki/ca-trust/extracted/pem/directory-hash/CFCA_EV_ROOT.pem new file mode 100644 index 0000000..198d1bf --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CFCA_EV_ROOT.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD +TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx +MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j +aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP +T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 +sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL +TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 +/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp +7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz +EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt +hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP +a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot +aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg +TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV +PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv +cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL +tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB +ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT +ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL +jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS +ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy +P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 +xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d +Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN +5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe +/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z +AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ +5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/COMODO_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/COMODO_Certification_Authority.pem new file mode 100644 index 0000000..6146dcb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/COMODO_Certification_Authority.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/COMODO_ECC_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/COMODO_ECC_Certification_Authority.pem new file mode 100644 index 0000000..546c95e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/COMODO_ECC_Certification_Authority.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/COMODO_RSA_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/COMODO_RSA_Certification_Authority.pem new file mode 100644 index 0000000..6508d1e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/COMODO_RSA_Certification_Authority.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_E1.pem b/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_E1.pem new file mode 100644 index 0000000..e0e6251 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_E1.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIIB9zCCAX2gAwIBAgIQBiUzsUcDMydc+Y2aub/M+DAKBggqhkjOPQQDAzA9MQsw +CQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0YWlu +bHkgUm9vdCBFMTAeFw0yMTA0MDEwMDAwMDBaFw00NjA0MDEwMDAwMDBaMD0xCzAJ +BgNVBAYTAlVTMRIwEAYDVQQKEwlDZXJ0YWlubHkxGjAYBgNVBAMTEUNlcnRhaW5s +eSBSb290IEUxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE3m/4fxzf7flHh4axpMCK ++IKXgOqPyEpeKn2IaKcBYhSRJHpcnqMXfYqGITQYUBsQ3tA3SybHGWCA6TS9YBk2 +QNYphwk8kXr2vBMj3VlOBF7PyAIcGFPBMdjaIOlEjeR2o0IwQDAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU8ygYy2R17ikq6+2uI1g4 +hevIIgcwCgYIKoZIzj0EAwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozm +ut6Dacpps6kFtZaSF4fC0urQe87YQVt8rgIwRt7qy12a7DLCZRawTDBcMPPaTnOG +BtjOiQRINzf43TNRnXCve1XYAS59BWQOhriR +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_R1.pem b/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_R1.pem new file mode 100644 index 0000000..d62495e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certainly_Root_R1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIRAI4P+UuQcWhlM1T01EQ5t+AwDQYJKoZIhvcNAQELBQAw +PTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUNlcnRhaW5seTEaMBgGA1UEAxMRQ2Vy +dGFpbmx5IFJvb3QgUjEwHhcNMjEwNDAxMDAwMDAwWhcNNDYwNDAxMDAwMDAwWjA9 +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0 +YWlubHkgUm9vdCBSMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANA2 +1B/q3avk0bbm+yLA3RMNansiExyXPGhjZjKcA7WNpIGD2ngwEc/csiu+kr+O5MQT +vqRoTNoCaBZ0vrLdBORrKt03H2As2/X3oXyVtwxwhi7xOu9S98zTm/mLvg7fMbed +aFySpvXl8wo0tf97ouSHocavFwDvA5HtqRxOcT3Si2yJ9HiG5mpJoM610rCrm/b0 +1C7jcvk2xusVtyWMOvwlDbMicyF0yEqWYZL1LwsYpfSt4u5BvQF5+paMjRcCMLT5 +r3gajLQ2EBAHBXDQ9DGQilHFhiZ5shGIXsXwClTNSaa/ApzSRKft43jvRl5tcdF5 +cBxGX1HpyTfcX35pe0HfNEXgO4T0oYoKNp43zGJS4YkNKPl6I7ENPT2a/Z2B7yyQ +wHtETrtJ4A5KVpK8y7XdeReJkd5hiXSSqOMyhb5OhaRLWcsrxXiOcVTQAjeZjOVJ +6uBUcqQRBi8LjMFbvrWhsFNunLhgkR9Za/kt9JQKl7XsxXYDVBtlUrpMklZRNaBA +2CnbrlJ2Oy0wQJuK0EJWtLeIAaSHO1OWzaMWj/Nmqhexx2DgwUMFDO6bW2BvBlyH +Wyf5QBGenDPBt+U1VwV/J84XIIwc/PH72jEpSe31C4SnT8H2TsIonPru4K8H+zMR +eiFPCyEQtkA6qyI6BJyLm4SGcprSp6XEtHWRqSsjAgMBAAGjQjBAMA4GA1UdDwEB +/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTgqj8ljZ9EXME66C6u +d0yEPmcM9DANBgkqhkiG9w0BAQsFAAOCAgEAuVevuBLaV4OPaAszHQNTVfSVcOQr +PbA56/qJYv331hgELyE03fFo8NWWWt7CgKPBjcZq91l3rhVkz1t5BXdm6ozTaw3d +8VkswTOlMIAVRQdFGjEitpIAq5lNOo93r6kiyi9jyhXWx8bwPWz8HA2YEGGeEaIi +1wrykXprOQ4vMMM2SZ/g6Q8CRFA3lFV96p/2O7qUpUzpvD5RtOjKkjZUbVwlKNrd +rRT90+7iIgXr0PK3aBLXWopBGsaSpVo7Y0VPv+E6dyIvXL9G+VoDhRNCX8reU9di +taY1BMJH/5n9hN9czulegChB8n3nHpDYT3Y+gjwN/KUD+nsa2UUeYNrEjvn8K8l7 +lcUq/6qJ34IxD3L/DCfXCh5WAFAeDJDBlrXYFIW7pw0WwfgHJBu6haEaBQmAupVj +yTrsJZ9/nbqkRxWbRHDxakvWOF5D8xh+UG7pWijmZeZ3Gzr9Hb4DJqPb1OG7fpYn +Kx3upPvaJVQTA945xsMfTZDsjxtK0hzthZU4UHlG1sGQUDGpXJpuHfUzVounmdLy +yCwzk5Iwx06MZTMQZBf9JBeW0Y3COmor6xOLRPIh80oat3df1+2IpHLlOR+Vnb5n +wXARPbv0+Em34yaXOp/SX3z7wJl8OSngex2/DaeP0ik0biQVy96QXr8axGbqwua6 +OV+KmalBWQewLK8= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certigna.pem b/pki/ca-trust/extracted/pem/directory-hash/Certigna.pem new file mode 100644 index 0000000..220d95f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certigna.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certigna_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Certigna_Root_CA.pem new file mode 100644 index 0000000..4b40f56 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certigna_Root_CA.pem @@ -0,0 +1,36 @@ +-----BEGIN CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certum_EC-384_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Certum_EC-384_CA.pem new file mode 100644 index 0000000..81f8a2e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certum_EC-384_CA.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA.pem new file mode 100644 index 0000000..a04e656 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA_2.pem b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA_2.pem new file mode 100644 index 0000000..126e948 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Network_CA_2.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSP +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Root_CA.pem new file mode 100644 index 0000000..fa7fa74 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Certum_Trusted_Root_CA.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-01.pem b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-01.pem new file mode 100644 index 0000000..484e24a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-01.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHTCCAaOgAwIBAgIUQ3CCd89NXTTxyq4yLzf39H91oJ4wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMTAeFw0yMTA0MjgxNzM1NDNa +Fw00NjA0MjgxNzM1NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDEw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAARLNumuV16ocNfQj3Rid8NeeqrltqLxeP0C +flfdkXmcbLlSiFS8LwS+uM32ENEp7LXQoMPwiXAZu1FlxUOcw5tjnSCDPgYLpkJE +hRGnSjot6dZoL0hOUysHP029uax3OVejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSOB2LAUN3GGQYARnQE9/OufXVNMDAKBggq +hkjOPQQDAwNoADBlAjEAnDPfQeMjqEI2Jpc1XHvr20v4qotzVRVcrHgpD7oh2MSg +2NED3W3ROT3Ek2DS43KyAjB8xX6I01D1HiXo+k515liWpDVfG2XqYZpwI7UNo5uS +Um9poIyNStDuiw7LR47QjRE= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-02.pem b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-02.pem new file mode 100644 index 0000000..e8a48af --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_ECC_Root-02.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHDCCAaOgAwIBAgIUKP2ZYEFHpgE6yhR7H+/5aAiDXX0wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMjAeFw0yMTA0MjgxNzQ0NTRa +Fw00NjA0MjgxNzQ0NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDIw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAR4MIHoYx7l63FRD/cHB8o5mXxO1Q/MMDAL +j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU +v4RDsNuESgMjGWdqb8FuvAY5N9GIIvejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTmGHX/72DehKT1RsfeSlXjMjZ59TAKBggq +hkjOPQQDAwNnADBkAjAmc0l6tqvmSfR9Uj/UQQSugEODZXW5hYA4O9Zv5JOGq4/n +ich/m35rChJVYaoR4HkCMHfoMXGsPHED1oQmHhS48zs73u1Z/GtMMH9ZzkXpc2AV +mkzw5l4lIhVtwodZ0LKOag== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-01.pem b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-01.pem new file mode 100644 index 0000000..ad3a12e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-01.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUPgNJgXUWdDGOTKvVxZAplsU5EN0wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMTAeFw0yMTA0MjgxNjQ1 +NTRaFw00NjA0MjgxNjQ1NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwSGWjDR1C45FtnYSk +YZYSwu3D2iM0GXb26v1VWvZVAVMP8syMl0+5UMuzAURWlv2bKOx7dAvnQmtVzslh +suitQDy6uUEKBU8bJoWPQ7VAtYXR1HHcg0Hz9kXHgKKEUJdGzqAMxGBWBB0HW0al +DrJLpA6lfO741GIDuZNqihS4cPgugkY4Iw50x2tBt9Apo52AsH53k2NC+zSDO3Oj +WiE260f6GBfZumbCk6SP/F2krfxQapWsvCQz0b2If4b19bJzKo98rwjyGpg/qYFl +P8GMicWWMJoKz/TUyDTtnS+8jTiGU+6Xn6myY5QXjQ/cZip8UlF1y5mO6D1cv547 +KI2DAg+pn3LiLCuz3GaXAEDQpFSOm117RTYm1nJD68/A6g3czhLmfTifBSeolz7p +UcZsBSjBAg/pGG3svZwG1KdJ9FQFa2ww8esD1eo9anbCyxooSU1/ZOD6K9pzg4H/ +kQO9lLvkuI6cMmPNn7togbGEW682v3fuHX/3SZtS7NJ3Wn2RnU3COS3kuoL4b/JO +Hg9O5j9ZpSPcPYeoKFgo0fEbNttPxP/hjFtyjMcmAyejOQoBqsCyMWCDIqFPEgkB +Ea801M/XrmLTBQe0MXXgDW1XT2mH+VepuhX2yFJtocucH+X8eKg1mp9BFM6ltM6U +CBwJrVbl2rZJmkrqYxhTnCwuwwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUN12mmnQywsL5x6YVEFm45P3luG0wDQYJ +KoZIhvcNAQELBQADggIBAK+nz97/4L1CjU3lIpbfaOp9TSp90K09FlxD533Ahuh6 +NWPxzIHIxgvoLlI1pKZJkGNRrDSsBTtXAOnTYtPZKdVUvhwQkZyybf5Z/Xn36lbQ +nmhUQo8mUuJM3y+Xpi/SB5io82BdS5pYV4jvguX6r2yBS5KPQJqTRlnLX3gWsWc+ +QgvfKNmwrZggvkN80V4aCRckjXtdlemrwWCrWxhkgPut4AZ9HcpZuPN4KWfGVh2v +trV0KnahP/t1MJ+UXjulYPPLXAziDslg+MkfFoom3ecnf+slpoq9uC02EJqxWE2a +aE9gVOX2RhOOiKy8IUISrcZKiX2bwdgt6ZYD9KJ0DLwAHb/WNyVntHKLr4W96ioD +j8z7PEQkguIBpQtZtjSNMgsSDesnwv1B10A8ckYpwIzqug/xBpMu95yo9GA+o/E4 +Xo4TwbM6l4c/ksp4qRyv0LAbJh6+cOx69TOY6lz/KwsETkPdY34Op054A5U+1C0w +lREQKC6/oAI+/15Z0wUOlV9TRe9rh9VIzRamloPh37MG88EU26fsHItdkJANclHn +YfkUyq+Dj7+vsQpZXdxc1+SWrVtgHdqul7I52Qb1dgAT+GhMIbA1xNxVssnBQVoc +icCMb3SgazNNtQEo/a2tiRc7ppqEvOuM6sRxJKi6KfkIsidWNTJf6jn7MZrVGczw +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-02.pem b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-02.pem new file mode 100644 index 0000000..7420d0a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/CommScope_Public_Trust_RSA_Root-02.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUVBa/O345lXGN0aoApYYNK496BU4wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMjAeFw0yMTA0MjgxNzE2 +NDNaFw00NjA0MjgxNzE2NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDh+g77aAASyE3VrCLE +NQE7xVTlWXZjpX/rwcRqmL0yjReA61260WI9JSMZNRTpf4mnG2I81lDnNJUDMrG0 +kyI9p+Kx7eZ7Ti6Hmw0zdQreqjXnfuU2mKKuJZ6VszKWpCtYHu8//mI0SFHRtI1C +rWDaSWqVcN3SAOLMV2MCe5bdSZdbkk6V0/nLKR8YSvgBKtJjCW4k6YnS5cciTNxz +hkcAqg2Ijq6FfUrpuzNPDlJwnZXjfG2WWy09X6GDRl224yW4fKcZgBzqZUPckXk2 +LHR88mcGyYnJ27/aaL8j7dxrrSiDeS/sOKUNNwFnJ5rpM9kzXzehxfCrPfp4sOcs +n/Y+n2Dg70jpkEUeBVF4GiwSLFworA2iI540jwXmojPOEXcT1A6kHkIfhs1w/tku +FT0du7jyU1fbzMZ0KZwYszZ1OC4PVKH4kh+Jlk+71O6d6Ts2QrUKOyrUZHk2EOH5 +kQMreyBUzQ0ZGshBMjTRsJnhkB4BQDa1t/qp5Xd1pCKBXbCL5CcSD1SIxtuFdOa3 +wNemKfrb3vOTlycEVS8KbzfFPROvCgCpLIscgSjX74Yxqa7ybrjKaixUR9gqiC6v +wQcQeKwRoi9C8DfF8rhW3Q5iLc4tVn5V8qdE9isy9COoR+jUKgF4z2rDN6ieZdIs +5fq6M8EGRPbmz6UNp2YINIos8wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUR9DnsSL/nSz12Vdgs7GxcJXvYXowDQYJ +KoZIhvcNAQELBQADggIBAIZpsU0v6Z9PIpNojuQhmaPORVMbc0RTAIFhzTHjCLqB +KCh6krm2qMhDnscTJk3C2OVVnJJdUNjCK9v+5qiXz1I6JMNlZFxHMaNlNRPDk7n3 ++VGXu6TwYofF1gbTl4MgqX67tiHCpQ2EAOHyJxCDut0DgdXdaMNmEMjRdrSzbyme +APnCKfWxkxlSaRosTKCL4BWaMS/TiJVZbuXEs1DIFAhKm4sTg7GkcrI7djNB3Nyq +pgdvHSQSn8h2vS/ZjvQs7rfSOBAkNlEv41xdgSGn2rtO/+YHqP65DSdsu3BaVXoT +6fEqSWnHX4dXTEN5bTpl6TBcQe7rd6VzEojov32u5cSoHw2OHG1QAk8mGEPej1WF +sQs3BWDJVTkSBKEqz3EWnzZRSb9wO55nnPt7eck5HHisd5FUmrh1CoFSl+NmYWvt +PjgelmFV4ZFUjO2MJB+ByRCac5krFk5yAD9UG/iNuovnFNa2RU9g7Jauwy8CTl2d +lklyALKrdVwPaFsdZcJfMw8eD/A7hvWwTruc9+olBdytoptLFwG+Qt81IR2tq670 +v64fG9PiO/yzcnMcmyiQiRM9HcEARwmWmjgb3bHPDcK0RPOWlc4yOo80nOAXx17O +rg3bhzjlP1v9mxnhMUF6cKojawHhRUzNlM47ni3niAIi9G7oyOzWPPO5std3eqx7 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Comodo_AAA_Services_root.pem b/pki/ca-trust/extracted/pem/directory-hash/Comodo_AAA_Services_root.pem new file mode 100644 index 0000000..33c71ba --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Comodo_AAA_Services_root.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_BR_Root_CA_1_2020.pem b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_BR_Root_CA_1_2020.pem new file mode 100644 index 0000000..82db921 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_BR_Root_CA_1_2020.pem @@ -0,0 +1,18 @@ +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQfMmPK4TX3+oPyWWa00tNljAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEJSIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTA5NDUwMFoXDTM1MDIxMTA5 +NDQ1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABMbLxyjR+4T1mu9CFCDhQ2tuda38KwOE1HaTJddZO0Flax7mNCq7dPYS +zuht56vkPE4/RAiLzRZxy7+SmfSk1zxQVFKQhYN4lGdnoxwJGT11NIXe7WB9xwy0 +QVK5buXuQqOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFHOREKv/ +VbNafAkl1bK6CKBrqx9tMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2JyX3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwQlIlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAlJAtE/rhY/hhY+ithXhUkZy4kzg+GkHaQBZTQgjKL47xPoFW +wKrY7RjEsK70PvomAjEA8yjixtsrmfu3Ubgko6SUeho/5jbiA1czijDLgsfWFBHV +dWNbFJWcHwHP2NVypw87 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_EV_Root_CA_1_2020.pem b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_EV_Root_CA_1_2020.pem new file mode 100644 index 0000000..25da5fa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_EV_Root_CA_1_2020.pem @@ -0,0 +1,18 @@ +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQXwJB13qHfEwDo6yWjfv/0DAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEVWIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTEwMDAwMFoXDTM1MDIxMTA5 +NTk1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBFViBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPEL3YZDIBnfl4XoIkqbz52Yv7QFJsnL46bSj8WeeHsxiamJrSc8ZRCC +/N/DnU7wMyPE0jL1HLDfMxddxfCxivnvubcUyilKwg+pf3VlSSowZ/Rk99Yad9rD +wpdhQntJraOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFH8QARY3 +OqQo5FD4pPfsazK2/umLMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2V2X3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwRVYlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAyjzGKnXCXnViOTYAYFqLwZOZzNnbQTs7h5kXO9XMT8oi96CA +y/m0sRtW9XLS/BnRAjEAkfcwkz8QRitxpNA7RJvAKQIFskF3UfN5Wp6OFKBOQtJb +gfM0agPnIjhQW+0ZT0MW +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_2009.pem b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_2009.pem new file mode 100644 index 0000000..e084d98 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_2009.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha +ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 +UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 +tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R +ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM +lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp +/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G +A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G +A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj +dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy +MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl +cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js +L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL +BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni +acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K +zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 +PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y +Johw1+qRzT65ysCQblrGXnRl11z+o+I= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_EV_2009.pem b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_EV_2009.pem new file mode 100644 index 0000000..0a1a2b2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/D-TRUST_Root_Class_3_CA_2_EV_2009.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw +NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV +BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn +ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 +3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z +qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR +p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 +HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw +ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea +HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw +Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh +c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E +RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt +dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku +Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp +3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF +CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na +xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX +KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_CA.pem new file mode 100644 index 0000000..2731638 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G2.pem new file mode 100644 index 0000000..fc60fb5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G2.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5w== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G3.pem new file mode 100644 index 0000000..244c99b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Assured_ID_Root_G3.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtA== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_CA.pem new file mode 100644 index 0000000..fd4341d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G2.pem new file mode 100644 index 0000000..798e002 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G2.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrY= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G3.pem new file mode 100644 index 0000000..bc20c1e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Global_Root_G3.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycX +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_High_Assurance_EV_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_High_Assurance_EV_Root_CA.pem new file mode 100644 index 0000000..9e6810a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_High_Assurance_EV_Root_CA.pem @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9K +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_ECC_P384_Root_G5.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_ECC_P384_Root_G5.pem new file mode 100644 index 0000000..802c4c8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_ECC_P384_Root_G5.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGTCCAZ+gAwIBAgIQCeCTZaz32ci5PhwLBCou8zAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJjAkBgNVBAMTHURp +Z2lDZXJ0IFRMUyBFQ0MgUDM4NCBSb290IEc1MB4XDTIxMDExNTAwMDAwMFoXDTQ2 +MDExNDIzNTk1OVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ +bmMuMSYwJAYDVQQDEx1EaWdpQ2VydCBUTFMgRUNDIFAzODQgUm9vdCBHNTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABMFEoc8Rl1Ca3iOCNQfN0MsYndLxf3c1TzvdlHJS +7cI7+Oz6e2tYIOyZrsn8aLN1udsJ7MgT9U7GCh1mMEy7H0cKPGEQQil8pQgO4CLp +0zVozptjn4S1mU1YoI71VOeVyaNCMEAwHQYDVR0OBBYEFMFRRVBZqz7nLFr6ICIS +B4CIfBFqMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MAoGCCqGSM49 +BAMDA2gAMGUCMQCJao1H5+z8blUD2WdsJk6Dxv3J+ysTvLd6jLRl0mlpYxNjOyZQ +LgGheQaRnUi/wr4CMEfDFXuxoJGZSZOoPHzoRgaLLPIxAJSdYsiJvRmEFOml+wG4 +DXZDjC5Ty3zfDBeWUA== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_RSA4096_Root_G5.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_RSA4096_Root_G5.pem new file mode 100644 index 0000000..b007dff --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_TLS_RSA4096_Root_G5.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCPm0eKj6ftpqMzeJ3nzPijANBgkqhkiG9w0BAQwFADBN +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMT +HERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xJTAjBgNVBAMTHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCz0PTJeRGd/fxmgefM1eS87IE+ +ajWOLrfn3q/5B03PMJ3qCQuZvWxX2hhKuHisOjmopkisLnLlvevxGs3npAOpPxG0 +2C+JFvuUAT27L/gTBaF4HI4o4EXgg/RZG5Wzrn4DReW+wkL+7vI8toUTmDKdFqgp +wgscONyfMXdcvyej/Cestyu9dJsXLfKB2l2w4SMXPohKEiPQ6s+d3gMXsUJKoBZM +pG2T6T867jp8nVid9E6P/DsjyG244gXazOvswzH016cpVIDPRFtMbzCe88zdH5RD +nU1/cHAN1DrRN/BsnZvAFJNY781BOHW8EwOVfH/jXOnVDdXifBBiqmvwPXbzP6Po +sMH976pXTayGpxi0KcEsDr9kvimM2AItzVwv8n/vFfQMFawKsPHTDU9qTXeXAaDx +Zre3zu/O7Oyldcqs4+Fj97ihBMi8ez9dLRYiVu1ISf6nL3kwJZu6ay0/nTvEF+cd +Lvvyz6b84xQslpghjLSR6Rlgg/IwKwZzUNWYOwbpx4oMYIwo+FKbbuH2TbsGJJvX +KyY//SovcfXWJL5/MZ4PbeiPT02jP/816t9JXkGPhvnxd3lLG7SjXi/7RgLQZhNe +XoVPzthwiHvOAbWWl9fNff2C+MIkwcoBOU+NosEUQB+cZtUMCUbW8tDRSHZWOkPL +tgoRObqME2wGtZ7P6wIDAQABo0IwQDAdBgNVHQ4EFgQUUTMc7TZArxfTJc1paPKv +TiM+s0EwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcN +AQEMBQADggIBAGCmr1tfV9qJ20tQqcQjNSH/0GEwhJG3PxDPJY7Jv0Y02cEhJhxw +GXIeo8mH/qlDZJY6yFMECrZBu8RHANmfGBg7sg7zNOok992vIGCukihfNudd5N7H +PNtQOa27PShNlnx2xlv0wdsUpasZYgcYQF+Xkdycx6u1UQ3maVNVzDl92sURVXLF +O4uJ+DQtpBflF+aZfTCIITfNMBc9uPK8qHWgQ9w+iUuQrm0D4ByjoJYJu32jtyoQ +REtGBzRj7TG5BO6jm5qu5jF49OokYTurWGT/u4cnYiWB39yhL/btp/96j1EuMPik +AdKFOV8BmZZvWltwGUb+hmA+rYAQCd05JS9Yf7vSdPD3Rh9GOUrYU9DzLjtxpdRv +/PNn5AeP3SYZ4Y1b+qOTEZvpyDrDVWiakuFSdjjo4bq9+0/V77PnSIMx8IIh47a+ +p6tv75/fTM8BuGJqIz3nCU2AG3swpMPdB380vqQmsvZB6Akd4yCYqjdP//fx4ilw +MUc/dNAUFvohigLVigmUdy7yWSiLfFCSCmZ4OIN1xLVaqBHG5cGdZlXPU8Sv13WF +qUITVuwhd4GTWgzqltlJyqEI8pc7bZsEGCREjnwB8twl2F6GmrE52/WRMmrRpnCK +ovfepEWFJqgejF0pW8hL2JpqA15w8oVPbEtoL8pU9ozaMv7Da4M/OMZ+ +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Trusted_Root_G4.pem b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Trusted_Root_G4.pem new file mode 100644 index 0000000..4214227 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/DigiCert_Trusted_Root_G4.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Entrust.net_Premium_2048_Secure_Server_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Entrust.net_Premium_2048_Secure_Server_CA.pem new file mode 100644 index 0000000..2ed99ca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Entrust.net_Premium_2048_Secure_Server_CA.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVE= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority.pem new file mode 100644 index 0000000..855485c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority.pem @@ -0,0 +1,27 @@ +-----BEGIN CERTIFICATE----- +MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 +Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW +KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw +NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw +NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy +ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV +BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo +Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 +4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 +KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI +rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi +94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB +sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi +gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo +kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE +vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA +A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t +O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua +AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP +9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ +eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m +0vdXcDazv/wor3ElhVsT/h5/WrQ8 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_EC1.pem b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_EC1.pem new file mode 100644 index 0000000..b2043ac --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_EC1.pem @@ -0,0 +1,18 @@ +-----BEGIN CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G2.pem new file mode 100644 index 0000000..2e23a60 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G2.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G4.pem b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G4.pem new file mode 100644 index 0000000..7ac10cc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Entrust_Root_Certification_Authority_-_G4.pem @@ -0,0 +1,36 @@ +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem b/pki/ca-trust/extracted/pem/directory-hash/FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem new file mode 100644 index 0000000..0501acd --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2WhcNNDcwMzMxMDkwMTM2WjBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zf +e9MEkVz6iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6C +cyvHZpsKjECcfIr28jlgst7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB +/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FDY1w8ndYn81LsF7Kpryz3dvgwHQYDVR0O +BBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjO +PQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgLcFBTApFw +hVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dG +XSaQpYXFuXqUPoeovQA= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GDCA_TrustAUTH_R5_ROOT.pem b/pki/ca-trust/extracted/pem/directory-hash/GDCA_TrustAUTH_R5_ROOT.pem new file mode 100644 index 0000000..4dd1c71 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GDCA_TrustAUTH_R5_ROOT.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE +BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ +IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 +MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV +BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w +HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj +Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj +TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u +KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj +qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm +MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 +ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP +zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk +L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC +jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA +HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC +AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg +p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm +DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 +COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry +L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf +JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg +IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io +2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV +09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ +XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq +T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe +MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0g== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GLOBALTRUST_2020.pem b/pki/ca-trust/extracted/pem/directory-hash/GLOBALTRUST_2020.pem new file mode 100644 index 0000000..c80b4e8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GLOBALTRUST_2020.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R1.pem b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R1.pem new file mode 100644 index 0000000..a13aa05 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo +27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w +Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw +TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl +qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH +szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 +Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk +MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 +wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p +aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN +VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb +C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe +QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy +h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 +7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J +ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef +MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ +Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT +6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ +0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm +2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb +bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R2.pem b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R2.pem new file mode 100644 index 0000000..bd3f3a7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R2.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt +nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY +6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu +MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k +RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg +f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV ++3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo +dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW +Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa +G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq +gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H +vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 +0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC +B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u +NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg +yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev +HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 +xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR +TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg +JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV +7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl +6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbL +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R3.pem b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R3.pem new file mode 100644 index 0000000..b2b5a77 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R3.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G +jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 +4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 +VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm +ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4X +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R4.pem b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R4.pem new file mode 100644 index 0000000..fdb2d1b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GTS_Root_R4.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi +QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR +HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D +9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 +p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R4.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R4.pem new file mode 100644 index 0000000..7670528 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R4.pem @@ -0,0 +1,12 @@ +-----BEGIN CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R5.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R5.pem new file mode 100644 index 0000000..111991b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_ECC_Root_CA_-_R5.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA.pem new file mode 100644 index 0000000..f4ce4ca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R3.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R3.pem new file mode 100644 index 0000000..8afb219 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R3.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9f +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R6.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R6.pem new file mode 100644 index 0000000..f3d2024 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_CA_-_R6.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_E46.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_E46.pem new file mode 100644 index 0000000..d9e601c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_E46.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx +CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD +ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw +MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex +HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq +R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd +yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ +7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8 ++RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_R46.pem b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_R46.pem new file mode 100644 index 0000000..559a390 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/GlobalSign_Root_R46.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA +MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD +VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy +MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt +c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ +OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG +vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud +316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo +0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE +y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF +zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE ++cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN +I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs +x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa +ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC +4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4 +7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg +JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti +2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk +pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF +FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt +rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk +ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5 +u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP +4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6 +N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3 +vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Class_2_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Class_2_CA.pem new file mode 100644 index 0000000..42e8d1e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Class_2_CA.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Root_Certificate_Authority_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Root_Certificate_Authority_-_G2.pem new file mode 100644 index 0000000..c2b2907 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Go_Daddy_Root_Certificate_Authority_-_G2.pem @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT +EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp +ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz +NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH +EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE +AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD +E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH +/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy +DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh +GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR +tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA +AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX +WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu +9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr +gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo +2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO +LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI +4uJEvlz36hz1 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_ECC_Root_CA_2021.pem b/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_ECC_Root_CA_2021.pem new file mode 100644 index 0000000..42924b0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_ECC_Root_CA_2021.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v +dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG +A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj +aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg +Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 +KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y +STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD +AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw +SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN +nxS2PFOiTAZpffpskcYqSUXm7LcT4Tps +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_RSA_Root_CA_2021.pem b/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_RSA_Root_CA_2021.pem new file mode 100644 index 0000000..f440412 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/HARICA_TLS_RSA_Root_CA_2021.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv +b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l +mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE +4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv +a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M +pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw +Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b +LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY +AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB +AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq +E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr +W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ +CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE +AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU +X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 +f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja +H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP +JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P +zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt +jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 +/L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT +BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 +aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW +xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU +63ZTGI0RmLo= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem b/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem new file mode 100644 index 0000000..5e5bc74 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_ECC_RootCA_2015.pem @@ -0,0 +1,17 @@ +-----BEGIN CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem b/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem new file mode 100644 index 0000000..2cc7e06 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem @@ -0,0 +1,35 @@ +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/HiPKI_Root_CA_-_G1.pem b/pki/ca-trust/extracted/pem/directory-hash/HiPKI_Root_CA_-_G1.pem new file mode 100644 index 0000000..efc55dc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/HiPKI_Root_CA_-_G1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQLd2szmKXlKFD6LDNdmpeYDANBgkqhkiG9w0BAQsFADBP +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xGzAZBgNVBAMMEkhpUEtJIFJvb3QgQ0EgLSBHMTAeFw0xOTAyMjIwOTQ2MDRa +Fw0zNzEyMzExNTU5NTlaME8xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3 +YSBUZWxlY29tIENvLiwgTHRkLjEbMBkGA1UEAwwSSGlQS0kgUm9vdCBDQSAtIEcx +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9B5/UnMyDHPkvRN0o9Qw +qNCuS9i233VHZvR85zkEHmpwINJaR3JnVfSl6J3VHiGh8Ge6zCFovkRTv4354twv +Vcg3Px+kwJyz5HdcoEb+d/oaoDjq7Zpy3iu9lFc6uux55199QmQ5eiY29yTw1S+6 +lZgRZq2XNdZ1AYDgr/SEYYwNHl98h5ZeQa/rh+r4XfEuiAU+TCK72h8q3VJGZDnz +Qs7ZngyzsHeXZJzA9KMuH5UHsBffMNsAGJZMoYFL3QRtU6M9/Aes1MU3guvklQgZ +KILSQjqj2FPseYlgSGDIcpJQ3AOPgz+yQlda22rpEZfdhSi8MEyr48KxRURHH+CK +FgeW0iEPU8DtqX7UTuybCeyvQqww1r/REEXgphaypcXTT3OUM3ECoWqj1jOXTyFj +HluP2cFeRXF3D4FdXyGarYPM+l7WjSNfGz1BryB1ZlpK9p/7qxj3ccC2HTHsOyDr +y+K49a6SsvfhhEvyovKTmiKe0xRvNlS9H15ZFblzqMF8b3ti6RZsR1pl8w4Rm0bZ +/W3c1pzAtH2lsN0/Vm+h+fbkEkj9Bn8SV7apI09bA8PgcSojt/ewsTu8mL3WmKgM +a/aOEmem8rJY5AIJEzypuxC00jBF8ez3ABHfZfjcK0NVvxaXxA/VLGGEqnKG/uY6 +fsI/fe78LxQ+5oXdUG+3Se0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQU8ncX+l6o/vY9cdVouslGDDjYr7AwDgYDVR0PAQH/BAQDAgGGMA0GCSqG +SIb3DQEBCwUAA4ICAQBQUfB13HAE4/+qddRxosuej6ip0691x1TPOhwEmSKsxBHi +7zNKpiMdDg1H2DfHb680f0+BazVP6XKlMeJ45/dOlBhbQH3PayFUhuaVevvGyuqc +SE5XCV0vrPSltJczWNWseanMX/mF+lLFjfiRFOs6DRfQUsJ748JzjkZ4Bjgs6Fza +ZsT0pPBWGTMpWmWSBUdGSquEwx4noR8RkpkndZMPvDY7l1ePJlsMu5wP1G4wB9Tc +XzZoZjmDlicmisjEOf6aIW/Vcobpf2Lll07QJNBAsNB1CI69aO4I1258EHBGG3zg +iLKecoaZAeO/n0kZtCW+VmWuF2PlHt/o/0elv+EmBYTksMCv5wiZqAxeJoBF1Pho +L5aPruJKHJwWDBNvOIf2u8g0X5IDUXlwpt/L9ZlNec1OvFefQ05rLisY+GpzjLrF +Ne85akEez3GoorKGB1s6yeHvP2UEgEcyRHCVTjFnanRbEEV16rCf0OY1/k6fi8wr +kkVbbiVghUbN0aqwdmaTd5a+g744tiROJgvM7XpWGuDpWsZkrUx6AEhEL7lAuxM+ +vhV4nYWBSipX3tUZQ9rbyltHhoMLP7YNdnhzeSJesYAfz77RP1YQmCuVh6EfnWQU +YDksswBVLuT1sw5XxJFBAJw/6KXf6vb/yPCtbVKoF6ubYfwSUTXkJf2vqmqGOQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Hongkong_Post_Root_CA_3.pem b/pki/ca-trust/extracted/pem/directory-hash/Hongkong_Post_Root_CA_3.pem new file mode 100644 index 0000000..22c7c73 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Hongkong_Post_Root_CA_3.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUCBZfikyl7ADJk0DfxMauI7gcWqQwDQYJKoZIhvcNAQEL +BQAwbzELMAkGA1UEBhMCSEsxEjAQBgNVBAgTCUhvbmcgS29uZzESMBAGA1UEBxMJ +SG9uZyBLb25nMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25n +a29uZyBQb3N0IFJvb3QgQ0EgMzAeFw0xNzA2MDMwMjI5NDZaFw00MjA2MDMwMjI5 +NDZaMG8xCzAJBgNVBAYTAkhLMRIwEAYDVQQIEwlIb25nIEtvbmcxEjAQBgNVBAcT +CUhvbmcgS29uZzEWMBQGA1UEChMNSG9uZ2tvbmcgUG9zdDEgMB4GA1UEAxMXSG9u +Z2tvbmcgUG9zdCBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCziNfqzg8gTr7m1gNt7ln8wlffKWihgw4+aMdoWJwcYEuJQwy51BWy7sFO +dem1p+/l6TWZ5Mwc50tfjTMwIDNT2aa71T4Tjukfh0mtUC1Qyhi+AViiE3CWu4mI +VoBc+L0sPOFMV4i707mV78vH9toxdCim5lSJ9UExyuUmGs2C4HDaOym71QP1mbpV +9WTRYA6ziUm4ii8F0oRFKHyPaFASePwLtVPLwpgchKOesL4jpNrcyCse2m5FHomY +2vkALgbpDDtw1VAliJnLzXNg99X/NWfFobxeq81KuEXryGgeDQ0URhLj0mRiikKY +vLTGCAj4/ahMZJx2Ab0vqWwzD9g/KLg8aQFChn5pwckGyuV6RmXpwtZQQS4/t+Tt +bNe/JgERohYpSms0BpDsE9K2+2p20jzt8NYt3eEV7KObLyzJPivkaTv/ciWxNoZb +x39ri1UbSsUgYT2uy1DhCDq+sI9jQVMwCFk8mB13umOResoQUGC/8Ne8lYePl8X+ +l2oBlKN8W4UdKjk60FSh0Tlxnf0h+bV78OLgAo9uliQlLKAeLKjEiafv7ZkGL7YK +TE/bosw3Gq9HhS2KX8Q0NEwA/RiTZxPRN+ZItIsGxVd7GYYKecsAyVKvQv83j+Gj +Hno9UKtjBucVtT+2RTeUN7F+8kjDf8V1/peNRY8apxpyKBpADwIDAQABo2MwYTAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBQXnc0e +i9Y5K3DTXNSguB+wAPzFYTAdBgNVHQ4EFgQUF53NHovWOStw01zUoLgfsAD8xWEw +DQYJKoZIhvcNAQELBQADggIBAFbVe27mIgHSQpsY1Q7XZiNc4/6gx5LS6ZStS6LG +7BJ8dNVI0lkUmcDrudHr9EgwW62nV3OZqdPlt9EuWSRY3GguLmLYauRwCy0gUCCk +MpXRAJi70/33MvJJrsZ64Ee+bs7Lo3I6LWldy8joRTnU+kLBEUx3XZL7av9YROXr +gZ6voJmtvqkBZss4HTzfQx/0TW60uhdG/H39h4F5ag0zD/ov+BS5gLNdTaqX4fnk +GMX41TiMJjz98iji7lpJiCzfeT2OnpA8vUFKOt1b9pq0zj8lMH8yfaIDlNDceqFS +3m6TjRgm/VWsvY+b0s+v54Ysyx8Jb6NvqYTUc79NoXQbTiNg8swOqn+knEwlqLJm +Ozj/2ZQw9nKEvmhVEA/GcywWaZMH/rFF7buiVWqw2rVKAiUnhde3t4ZEFolsgCs+ +l6mc1X5VTMbeRRAc6uk7nwNT7u56AQIWeNTowr5GdogTPyK7SBIdUgC0An4hGh6c +JfTzPV4e0hz5sy229zdcxsshTrD3mUcYhcErulWuBurQB7Lcq9CClnXO0lD+mefP +L5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB60PZ2Pierc+xYw5F9KBa +LJstxabArahH9CdMOA0uG0k7UvToiIMrVCjU8jVStDKDYmlkDJGcn5fqdBb9HxEG +mpv0 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X1.pem b/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X1.pem new file mode 100644 index 0000000..b85c803 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 +WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu +ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc +h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ +0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U +A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW +T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH +B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC +B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv +KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn +OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn +jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw +qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI +rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq +hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL +ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ +3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK +NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 +ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur +TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC +jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc +oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq +4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA +mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d +emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X2.pem b/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X2.pem new file mode 100644 index 0000000..7d903ed --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ISRG_Root_X2.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw +CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg +R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 +MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT +ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw +EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW ++1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 +ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI +zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW +tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 +/q4AaOeMSQ+2b1tbFfLn +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Commercial_Root_CA_1.pem b/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Commercial_Root_CA_1.pem new file mode 100644 index 0000000..de6f07d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Commercial_Root_CA_1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Public_Sector_Root_CA_1.pem b/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Public_Sector_Root_CA_1.pem new file mode 100644 index 0000000..3809339 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/IdenTrust_Public_Sector_Root_CA_1.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu +VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN +MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 +MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 +ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy +RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS +bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF +/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R +3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw +EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy +9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V +GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ +2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV +WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD +W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN +AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj +t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV +DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 +TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G +lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW +mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df +WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 ++bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ +tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA +GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv +8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+c +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Izenpe.com.pem b/pki/ca-trust/extracted/pem/directory-hash/Izenpe.com.pem new file mode 100644 index 0000000..7638321 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Izenpe.com.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 +MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 +ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD +VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j +b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq +scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO +xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H +LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX +uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD +yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ +JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q +rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN +BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L +hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB +QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ +HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu +Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg +QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB +BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx +MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA +A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb +laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 +awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo +JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw +LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT +VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk +LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb +UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ +QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ +naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls +QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Microsec_e-Szigno_Root_CA_2009.pem b/pki/ca-trust/extracted/pem/directory-hash/Microsec_e-Szigno_Root_CA_2009.pem new file mode 100644 index 0000000..aa844e7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Microsec_e-Szigno_Root_CA_2009.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Microsoft_ECC_Root_Certificate_Authority_2017.pem b/pki/ca-trust/extracted/pem/directory-hash/Microsoft_ECC_Root_Certificate_Authority_2017.pem new file mode 100644 index 0000000..e3be2a5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Microsoft_ECC_Root_Certificate_Authority_2017.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWTCCAd+gAwIBAgIQZvI9r4fei7FK6gxXMQHC7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYD +VQQDEy1NaWNyb3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTcwHhcNMTkxMjE4MjMwNjQ1WhcNNDIwNzE4MjMxNjA0WjBlMQswCQYDVQQGEwJV +UzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1NaWNy +b3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATUvD0CQnVBEyPNgASGAlEvaqiBYgtlzPbKnR5vSmZR +ogPZnZH6thaxjG7efM3beaYvzrvOcS/lpaso7GMEZpn4+vKTEAXhgShC48Zo9OYb +hGBKia/teQ87zvH2RPUBeMCjVDBSMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBTIy5lycFIM+Oa+sgRXKSrPQhDtNTAQBgkrBgEEAYI3 +FQEEAwIBADAKBggqhkjOPQQDAwNoADBlAjBY8k3qDPlfXu5gKcs68tvWMoQZP3zV +L8KxzJOuULsJMsbG7X7JNpQS5GiFBqIb0C8CMQCZ6Ra0DvpWSNSkMBaReNtUjGUB +iudQZsIxtzm6uBoiB078a1QWIP8rtedMDE2mT3M= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Microsoft_RSA_Root_Certificate_Authority_2017.pem b/pki/ca-trust/extracted/pem/directory-hash/Microsoft_RSA_Root_Certificate_Authority_2017.pem new file mode 100644 index 0000000..3bdfb23 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Microsoft_RSA_Root_Certificate_Authority_2017.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFqDCCA5CgAwIBAgIQHtOXCV/YtLNHcB6qvn9FszANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYw +NAYDVQQDEy1NaWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +IDIwMTcwHhcNMTkxMjE4MjI1MTIyWhcNNDIwNzE4MjMwMDIzWjBlMQswCQYDVQQG +EwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1N +aWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKW76UM4wplZEWCpW9R2LBifOZ +Nt9GkMml7Xhqb0eRaPgnZ1AzHaGm++DlQ6OEAlcBXZxIQIJTELy/xztokLaCLeX0 +ZdDMbRnMlfl7rEqUrQ7eS0MdhweSE5CAg2Q1OQT85elss7YfUJQ4ZVBcF0a5toW1 +HLUX6NZFndiyJrDKxHBKrmCk3bPZ7Pw71VdyvD/IybLeS2v4I2wDwAW9lcfNcztm +gGTjGqwu+UcF8ga2m3P1eDNbx6H7JyqhtJqRjJHTOoI+dkC0zVJhUXAoP8XFWvLJ +jEm7FFtNyP9nTUwSlq31/niol4fX/V4ggNyhSyL71Imtus5Hl0dVe49FyGcohJUc +aDDv70ngNXtk55iwlNpNhTs+VcQor1fznhPbRiefHqJeRIOkpcrVE7NLP8TjwuaG +YaRSMLl6IE9vDzhTyzMMEyuP1pq9KsgtsRx9S1HKR9FIJ3Jdh+vVReZIZZ2vUpC6 +W6IYZVcSn2i51BVrlMRpIpj0M+Dt+VGOQVDJNE92kKz8OMHY4Xu54+OU4UZpyw4K +UGsTuqwPN1q3ErWQgR5WrlcihtnJ0tHXUeOrO8ZV/R4O03QK0dqq6mm4lyiPSMQH ++FJDOvTKVTUssKZqwJz58oHhEmrARdlns87/I6KJClTUFLkqqNfs+avNJVgyeY+Q +W5g5xAgGwax/Dj0ApQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUCctZf4aycI8awznjwNnpv7tNsiMwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEMBQADggIBAKyvPl3CEZaJjqPnktaXFbgToqZC +LgLNFgVZJ8og6Lq46BrsTaiXVq5lQ7GPAJtSzVXNUzltYkyLDVt8LkS/gxCP81OC +gMNPOsduET/m4xaRhPtthH80dK2Jp86519efhGSSvpWhrQlTM93uCupKUY5vVau6 +tZRGrox/2KJQJWVggEbbMwSubLWYdFQl3JPk+ONVFT24bcMKpBLBaYVu32TxU5nh +SnUgnZUP5NbcA/FZGOhHibJXWpS2qdgXKxdJ5XbLwVaZOjex/2kskZGT4d9Mozd2 +TaGf+G0eHdP67Pv0RR0Tbc/3WeUiJ3IrhvNXuzDtJE3cfVa7o7P4NHmJweDyAmH3 +pvwPuxwXC65B2Xy9J6P9LjrRk5Sxcx0ki69bIImtt2dmefU6xqaWM/5TkshGsRGR +xpl/j8nWZjEgQRCHLQzWwa80mMpkg/sTV9HB8Dx6jKXB/ZUhoHHBk2dxEuqPiApp +GWSZI1b7rCoucL5mxAyE7+WL85MB+GqQk2dLsmijtWKP6T+MejteD+eMuMZ87zf9 +dOLITzNy4ZQ5bb0Sr74MTnB8G2+NszKTc0QWbej09+CVgI+WXTik9KveCjCHk9hN +AHFiRSdLOkKEW39lt2c0Ui2cFmuqqNh7o0JMcccMyj6D5KbvtwEwXlGjefVwaaZB +RA+GsCyRxj3qrg+E +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/NAVER_Global_Root_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/NAVER_Global_Root_Certification_Authority.pem new file mode 100644 index 0000000..59f8ce3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/NAVER_Global_Root_Certification_Authority.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUAZQwHqIL3fXFMyqxQ0Rx+NZQTQ0wDQYJKoZIhvcNAQEM +BQAwaTELMAkGA1UEBhMCS1IxJjAkBgNVBAoMHU5BVkVSIEJVU0lORVNTIFBMQVRG +T1JNIENvcnAuMTIwMAYDVQQDDClOQVZFUiBHbG9iYWwgUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eTAeFw0xNzA4MTgwODU4NDJaFw0zNzA4MTgyMzU5NTlaMGkx +CzAJBgNVBAYTAktSMSYwJAYDVQQKDB1OQVZFUiBCVVNJTkVTUyBQTEFURk9STSBD +b3JwLjEyMDAGA1UEAwwpTkFWRVIgR2xvYmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC21PGTXLVA +iQqrDZBbUGOukJR0F0Vy1ntlWilLp1agS7gvQnXp2XskWjFlqxcX0TM62RHcQDaH +38dq6SZeWYp34+hInDEW+j6RscrJo+KfziFTowI2MMtSAuXaMl3Dxeb57hHHi8lE +HoSTGEq0n+USZGnQJoViAbbJAh2+g1G7XNr4rRVqmfeSVPc0W+m/6imBEtRTkZaz +kVrd/pBzKPswRrXKCAfHcXLJZtM0l/aM9BhK4dA9WkW2aacp+yPOiNgSnABIqKYP +szuSjXEOdMWLyEz59JuOuDxp7W87UC9Y7cSw0BwbagzivESq2M0UXZR4Yb8Obtoq +vC8MC3GmsxY/nOb5zJ9TNeIDoKAYv7vxvvTWjIcNQvcGufFt7QSUqP620wbGQGHf +nZ3zVHbOUzoBppJB7ASjjw2i1QnK1sua8e9DXcCrpUHPXFNwcMmIpi3Ua2FzUCaG +YQ5fG8Ir4ozVu53BA0K6lNpfqbDKzE0K70dpAy8i+/Eozr9dUGWokG2zdLAIx6yo +0es+nPxdGoMuK8u180SdOqcXYZaicdNwlhVNt0xz7hlcxVs+Qf6sdWA7G2POAN3a +CJBitOUt7kinaxeZVL6HSuOpXgRM6xBtVNbv8ejyYhbLgGvtPe31HzClrkvJE+2K +AQHJuFFYwGY6sWZLxNUxAmLpdIQM201GLQIDAQABo0IwQDAdBgNVHQ4EFgQU0p+I +36HNLL3s9TsBAZMzJ7LrYEswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADLKgLOdPVQG3dLSLvCkASELZ0jKbY7gyKoN +qo0hV4/GPnrK21HUUrPUloSlWGB/5QuOH/XcChWB5Tu2tyIvCZwTFrFsDDUIbatj +cu3cvuzHV+YwIHHW1xDBE1UBjCpD5EHxzzp6U5LOogMFDTjfArsQLtk70pt6wKGm ++LUx5vR1yblTmXVHIloUFcd4G7ad6Qz4G3bxhYTeodoS76TiEJd6eN4MUZeoIUCL +hr0N8F5OSza7OyAfikJW4Qsav3vQIkMsRIz75Sq0bBwcupTgE34h5prCy8VCZLQe +lHsIJchxzIdFV4XTnyliIoNRlwAYl3dqmJLJfGBs32x9SuRwTMKeuB330DTHD8z7 +p/8Dvq1wkNoL3chtl1+afwkyQf3NosxabUzyqkn+Zvjp2DXrDige7kgvOtB5CTh8 +piKCk5XQA76+AqAF3SAi428diDRgxuYKuQl1C/AH6GmWNcf7I4GOODm4RStDeKLR +LBT/DShycpWbXgnbiUSYqqFJu3FS8r/2/yehNq+4tneI3TqkbZs0kNwUXTC/t+sX +5Ie3cdCh13cV1ELX8vMxmV2b3RZtP+oGI/hGoiLtk/bdmuYqh7GYVPEi92tF4+KO +dh2ajcQGjTa3FPOdVGm3jjzVpG2Tgbet9r1ke8LJaDmgkpzNNIaRkPpkUZ3+/uul +9XXeifdy +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem b/pki/ca-trust/extracted/pem/directory-hash/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem new file mode 100644 index 0000000..56b9ee4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GB_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GB_CA.pem new file mode 100644 index 0000000..7c1082b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GB_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GC_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GC_CA.pem new file mode 100644 index 0000000..a9dcb26 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/OISTE_WISeKey_Global_Root_GC_CA.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw +CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 +bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg +Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ +BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu +ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS +b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni +eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W +p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T +rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV +57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg +Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_1_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_1_G3.pem new file mode 100644 index 0000000..2f89a04 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_1_G3.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2.pem b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2.pem new file mode 100644 index 0000000..35cc4eb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2_G3.pem new file mode 100644 index 0000000..df5a27f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_2_G3.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 +MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf +qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW +n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym +c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ +O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 +o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j +IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq +IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz +8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh +vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l +7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG +cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD +ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 +AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC +roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga +W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n +lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE ++V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV +csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd +dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg +KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM +HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 +WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3.pem b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3.pem new file mode 100644 index 0000000..bda7b1a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3.pem @@ -0,0 +1,38 @@ +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEto= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3_G3.pem new file mode 100644 index 0000000..7d6c5b4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/QuoVadis_Root_CA_3_G3.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_ECC.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_ECC.pem new file mode 100644 index 0000000..0bfa898 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_ECC.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx +NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv +bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA +VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku +WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX +5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ +ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg +h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem new file mode 100644 index 0000000..14c92c4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_EV_Root_Certification_Authority_RSA_R2.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV +BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE +CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy +MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G +A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD +DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq +M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf +OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa +4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 +HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR +aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA +b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ +Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV +PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO +pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu +UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY +MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV +HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 +9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW +s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 +Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg +cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM +79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz +/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt +ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm +Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK +QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ +w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi +S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 +mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+w== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_ECC.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_ECC.pem new file mode 100644 index 0000000..e20d85c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_ECC.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_RSA.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_RSA.pem new file mode 100644 index 0000000..77ec988 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_Root_Certification_Authority_RSA.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7k= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_ECC_Root_CA_2022.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_ECC_Root_CA_2022.pem new file mode 100644 index 0000000..8d24245 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_ECC_Root_CA_2022.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOjCCAcCgAwIBAgIQFAP1q/s3ixdAW+JDsqXRxDAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQDDBxT +U0wuY29tIFRMUyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzM0OFoXDTQ2 +MDgxOTE2MzM0N1owTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jwb3Jh +dGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgRUNDIFJvb3QgQ0EgMjAyMjB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABEUpNXP6wrgjzhR9qLFNoFs27iosU8NgCTWyJGYm +acCzldZdkkAZDsalE3D07xJRKF3nzL35PIXBz5SQySvOkkJYWWf9lCcQZIxPBLFN +SeR7T5v15wj4A4j3p8OSSxlUgaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBSJjy+j6CugFFR781a4Jl9nOAuc0DAdBgNVHQ4EFgQUiY8vo+groBRUe/NW +uCZfZzgLnNAwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUCMFXjIlbp +15IkWE8elDIPDAI2wv2sdDJO4fscgIijzPvX6yv/N33w7deedWo1dlJF4AIxAMeN +b0Igj762TVntd00pxCAgRWSGOlDGxK0tk/UYfXLtqc/ErFc2KAhl3zx5Zn6g6g== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_RSA_Root_CA_2022.pem b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_RSA_Root_CA_2022.pem new file mode 100644 index 0000000..79d9701 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SSL.com_TLS_RSA_Root_CA_2022.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFiTCCA3GgAwIBAgIQb77arXO9CEDii02+1PdbkTANBgkqhkiG9w0BAQsFADBO +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQD +DBxTU0wuY29tIFRMUyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzQyMloX +DTQ2MDgxOTE2MzQyMVowTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw +b3JhdGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgUlNBIFJvb3QgQ0EgMjAyMjCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANCkCXJPQIgSYT41I57u9nTP +L3tYPc48DRAokC+X94xI2KDYJbFMsBFMF3NQ0CJKY7uB0ylu1bUJPiYYf7ISf5OY +t6/wNr/y7hienDtSxUcZXXTzZGbVXcdotL8bHAajvI9AI7YexoS9UcQbOcGV0ins +S657Lb85/bRi3pZ7QcacoOAGcvvwB5cJOYF0r/c0WRFXCsJbwST0MXMwgsadugL3 +PnxEX4MN8/HdIGkWCVDi1FW24IBydm5MR7d1VVm0U3TZlMZBrViKMWYPHqIbKUBO +L9975hYsLfy/7PO0+r4Y9ptJ1O4Fbtk085zx7AGL0SDGD6C1vBdOSHtRwvzpXGk3 +R2azaPgVKPC506QVzFpPulJwoxJF3ca6TvvC0PeoUidtbnm1jPx7jMEWTO6Af77w +dr5BUxIzrlo4QqvXDz5BjXYHMtWrifZOZ9mxQnUjbvPNQrL8VfVThxc7wDNY8VLS ++YCk8OjwO4s4zKTGkH8PnP2L0aPP2oOnaclQNtVcBdIKQXTbYxE3waWglksejBYS +d66UNHsef8JmAOSqg+qKkK3ONkRN0VHpvB/zagX9wHQfJRlAUW7qglFA35u5CCoG +AtUjHBPW6dvbxrB6y3snm/vg1UYk7RBLY0ulBY+6uB0rpvqR4pJSvezrZ5dtmi2f +gTIFZzL7SAg/2SW4BCUvAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j +BBgwFoAU+y437uOEeicuzRk1sTN8/9REQrkwHQYDVR0OBBYEFPsuN+7jhHonLs0Z +NbEzfP/UREK5MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAjYlt +hEUY8U+zoO9opMAdrDC8Z2awms22qyIZZtM7QbUQnRC6cm4pJCAcAZli05bg4vsM +QtfhWsSWTVTNj8pDU/0quOr4ZcoBwq1gaAafORpR2eCNJvkLTqVTJXojpBzOCBvf +R4iyrT7gJ4eLSYwfqUdYe5byiB0YrrPRpgqU+tvT5TgKa3kSM/tKWTcWQA673vWJ +DPFs0/dRa1419dvAJuoSc06pkZCmF8NsLzjUo3KUQyxi4U5cMj29TH0ZR6LDSeeW +P4+a0zvkEdiLA9z2tmBVGKaBUfPhqBVq6+AL8BQx1rmMRTqoENjwuSfr98t67wVy +lrXEj5ZzxOhWc5y8aVFjvO9nHEMaX3cZHxj4HCUp+UmZKbaSPaKDN7EgkaibMOlq +bLQjk2UEqxHzDh1TJElTHaE/nUiSEeJ9DU/1172iWD54nR4fK/4huxoTtrEoZP2w +AgDHbICivRZQIA9ygV/MlP+7mea6kMvq+cYMwq7FGc4zoWtcu358NFcXrfA/rs3q +r5nsLFR+jM4uElZI7xc7P0peYNLcdDa8pUNjyw9bowJWCZ4kLOGGgYz+qxcs+sji +Mho6/4UIyYOf8kpIEFR3N+2ivEC+5BB09+Rbu7nzifmPQdjH5FCQNYA+HLhNkNPU +98OwoX6EyneSMSy4kLGCenROmxMmtNVQZlR4rmA= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SZAFIR_ROOT_CA2.pem b/pki/ca-trust/extracted/pem/directory-hash/SZAFIR_ROOT_CA2.pem new file mode 100644 index 0000000..b2e3f20 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SZAFIR_ROOT_CA2.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL +BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 +ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw +NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L +cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg +Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN +QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT +3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw +3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 +3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 +BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN +XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF +AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw +8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG +nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP +oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy +d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg +LvWpCz/UXeHPhJ/iGcJfitYgHuNztw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_E46.pem b/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_E46.pem new file mode 100644 index 0000000..61e0d2f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_E46.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOjCCAcGgAwIBAgIQQvLM2htpN0RfFf51KBC49DAKBggqhkjOPQQDAzBfMQsw +CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1T +ZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwHhcN +MjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEYMBYG +A1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1YmxpYyBT +ZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAR2+pmpbiDt+dd34wc7qNs9Xzjoq1WmVk/WSOrsfy2qw7LFeeyZYX8QeccC +WvkEN/U0NSt3zn8gj1KjAIns1aeibVvjS5KToID1AZTc8GgHHs3u/iVStSBDHBv+ +6xnOQ6OjQjBAMB0GA1UdDgQWBBTRItpMWfFLXyY4qp3W7usNw/upYTAOBgNVHQ8B +Af8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNnADBkAjAn7qRa +qCG76UeXlImldCBteU/IvZNeWBj7LRoAasm4PdCkT0RHlAFWovgzJQxC36oCMB3q +4S6ILuH5px0CMk7yn2xVdOOurvulGu7t0vzCAxHrRVxgED1cf5kDW21USAGKcw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_R46.pem b/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_R46.pem new file mode 100644 index 0000000..71afc16 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Sectigo_Public_Server_Authentication_Root_R46.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFijCCA3KgAwIBAgIQdY39i658BwD6qSWn4cetFDANBgkqhkiG9w0BAQwFADBf +MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQD +Ey1TZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYw +HhcNMjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEY +MBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1Ymxp +YyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCTvtU2UnXYASOgHEdCSe5jtrch/cSV1UgrJnwUUxDa +ef0rty2k1Cz66jLdScK5vQ9IPXtamFSvnl0xdE8H/FAh3aTPaE8bEmNtJZlMKpnz +SDBh+oF8HqcIStw+KxwfGExxqjWMrfhu6DtK2eWUAtaJhBOqbchPM8xQljeSM9xf +iOefVNlI8JhD1mb9nxc4Q8UBUQvX4yMPFF1bFOdLvt30yNoDN9HWOaEhUTCDsG3X +ME6WW5HwcCSrv0WBZEMNvSE6Lzzpng3LILVCJ8zab5vuZDCQOc2TZYEhMbUjUDM3 +IuM47fgxMMxF/mL50V0yeUKH32rMVhlATc6qu/m1dkmU8Sf4kaWD5QazYw6A3OAS +VYCmO2a0OYctyPDQ0RTp5A1NDvZdV3LFOxxHVp3i1fuBYYzMTYCQNFu31xR13NgE +SJ/AwSiItOkcyqex8Va3e0lMWeUgFaiEAin6OJRpmkkGj80feRQXEgyDet4fsZfu ++Zd4KKTIRJLpfSYFplhym3kT2BFfrsU4YjRosoYwjviQYZ4ybPUHNs2iTG7sijbt +8uaZFURww3y8nDnAtOFr94MlI1fZEoDlSfB1D++N6xybVCi0ITz8fAr/73trdf+L +HaAZBav6+CuBQug4urv7qv094PPK306Xlynt8xhW6aWWrL3DkJiy4Pmi1KZHQ3xt +zwIDAQABo0IwQDAdBgNVHQ4EFgQUVnNYZJX5khqwEioEYnmhQBWIIUkwDgYDVR0P +AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAC9c +mTz8Bl6MlC5w6tIyMY208FHVvArzZJ8HXtXBc2hkeqK5Duj5XYUtqDdFqij0lgVQ +YKlJfp/imTYpE0RHap1VIDzYm/EDMrraQKFz6oOht0SmDpkBm+S8f74TlH7Kph52 +gDY9hAaLMyZlbcp+nv4fjFg4exqDsQ+8FxG75gbMY/qB8oFM2gsQa6H61SilzwZA +Fv97fRheORKkU55+MkIQpiGRqRxOF3yEvJ+M0ejf5lG5Nkc/kLnHvALcWxxPDkjB +JYOcCj+esQMzEhonrPcibCTRAUH4WAP+JWgiH5paPHxsnnVI84HxZmduTILA7rpX +DhjvLpr3Etiga+kFpaHpaPi8TD8SHkXoUsCjvxInebnMMTzD9joiFgOgyY9mpFui +TdaBJQbpdqQACj7LzTWb4OE4y2BThihCQRxEV+ioratF4yUQvNs+ZUH7G6aXD+u5 +dHn5HrwdVw1Hr8Mvn4dGp+smWg9WY7ViYG4A++MnESLn/pmPNPW56MORcr3Ywx65 +LvKRRFHQV80MNNVIIb/bE/FmJUNS0nAiNs2fxBx1IK1jcmMGDw4nztJqDby1ORrp +0XZ60Vzk50lJLVU3aPAaOpg+VBeHVOmmJ1CJeyAvP/+/oYtKR5j/K3tJPsMpRmAY +QqszKbrAKbkTidOIijlBO8n9pu0f9GBj39ItVQGL +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SecureSign_RootCA11.pem b/pki/ca-trust/extracted/pem/directory-hash/SecureSign_RootCA11.pem new file mode 100644 index 0000000..aff52a8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SecureSign_RootCA11.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDEr +MCkGA1UEChMiSmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoG +A1UEAxMTU2VjdXJlU2lnbiBSb290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0 +MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RD +QTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvLTJsz +i1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8 +h9uuywGOwvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOV +MdrAG/LuYpmGYz+/3ZMqg6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9 +UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rPO7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni +8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitAbpSACW22s293bzUIUPsC +h8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZXt94wDgYD +VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AKChOBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xm +KbabfSVSSUOrTC4rbnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQ +X5Ucv+2rIrVls4W6ng+4reV6G4pQOh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWr +QbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01y8hSyn+B/tlr0/cR7SXf+Of5 +pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061lgeLKBObjBmN +QSdJQO7e5iNEOdyhIta6A/I= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SecureTrust_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/SecureTrust_CA.pem new file mode 100644 index 0000000..3740092 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SecureTrust_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz +MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv +cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz +Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO +0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao +wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj +7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS +8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT +BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg +JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 +6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ +3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm +D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS +CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR +3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Secure_Global_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Secure_Global_CA.pem new file mode 100644 index 0000000..1f4574e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Secure_Global_CA.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_ECC_RootCA1.pem b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_ECC_RootCA1.pem new file mode 100644 index 0000000..e52c5ee --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_ECC_RootCA1.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA2.pem b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA2.pem new file mode 100644 index 0000000..078bd0e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA2.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA3.pem b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA3.pem new file mode 100644 index 0000000..8346908 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Security_Communication_RootCA3.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Starfield_Class_2_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Class_2_CA.pem new file mode 100644 index 0000000..d552e65 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Class_2_CA.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Starfield_Root_Certificate_Authority_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Root_Certificate_Authority_-_G2.pem new file mode 100644 index 0000000..c1a0a48 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Root_Certificate_Authority_-_G2.pem @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs +ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw +MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 +b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj +aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp +Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg +nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 +HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N +Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN +dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 +HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G +CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU +sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 +4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg +8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K +pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 +mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Starfield_Services_Root_Certificate_Authority_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Services_Root_Certificate_Authority_-_G2.pem new file mode 100644 index 0000000..f751915 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Starfield_Services_Root_Certificate_Authority_-_G2.pem @@ -0,0 +1,24 @@ +-----BEGIN CERTIFICATE----- +MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs +ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 +MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy +ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy +dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p +OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 +8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K +Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe +hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk +6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q +AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI +bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB +ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z +qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd +iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn +0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN +sSi6 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Gold_CA_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Gold_CA_-_G2.pem new file mode 100644 index 0000000..d721187 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Gold_CA_-_G2.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Silver_CA_-_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Silver_CA_-_G2.pem new file mode 100644 index 0000000..67a172c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/SwissSign_Silver_CA_-_G2.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_2.pem b/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_2.pem new file mode 100644 index 0000000..98fceb2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_2.pem @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6Fuwg== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_3.pem b/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_3.pem new file mode 100644 index 0000000..e068f84 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/T-TeleSec_GlobalRoot_Class_3.pem @@ -0,0 +1,23 @@ +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgxMDAxMTAyOTU2WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN +8ELg63iIVl6bmlQdTQyK9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/ +RLyTPWGrTs0NvvAgJ1gORH8EGoel15YUNpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4 +hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZFiP0Zf3WHHx+xGwpzJFu5 +ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W0eDrXltM +EnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1 +A/d2O2GCahKqGFPrAyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOy +WL6ukK2YJ5f+AbGwUgC4TeQbIXQbfsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ +1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzTucpH9sry9uetuUg/vBa3wW30 +6gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7hP0HHRwA11fXT +91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml +e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4p +TpPDpFQUWw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem b/pki/ca-trust/extracted/pem/directory-hash/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem new file mode 100644 index 0000000..63b136f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem @@ -0,0 +1,26 @@ +-----BEGIN CERTIFICATE----- +MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIx +GDAWBgNVBAcTD0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxp +bXNlbCB2ZSBUZWtub2xvamlrIEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0w +KwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24gTWVya2V6aSAtIEthbXUgU00xNjA0 +BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRpZmlrYXNpIC0gU3Vy +dW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYDVQQG +EwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXll +IEJpbGltc2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklU +QUsxLTArBgNVBAsTJEthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBT +TTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kg +LSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr3UwM6q7 +a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y86Ij5iySr +LqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INr +N3wcwv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2X +YacQuFWQfw4tJzh03+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/ +iSIzL+aFCr2lqBs23tPcLG07xxO9WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4f +AJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQUZT/HiobGPN08VFw1+DrtUgxH +V8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh +AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPf +IPP54+M638yclNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4 +lzwDGrpDxpa5RXI4s6ehlj2Re37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c +8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0jq5Rm+K37DwhuJi1/FwcJsoz7UMCf +lo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TWCA_Global_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/TWCA_Global_Root_CA.pem new file mode 100644 index 0000000..fd06b8c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TWCA_Global_Root_CA.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TWCA_Root_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/TWCA_Root_Certification_Authority.pem new file mode 100644 index 0000000..8d39bc6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TWCA_Root_Certification_Authority.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_ECC_Root_2020.pem b/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_ECC_Root_2020.pem new file mode 100644 index 0000000..b38292c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_ECC_Root_2020.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAcmgAwIBAgIQNjqWjMlcsljN0AFdxeVXADAKBggqhkjOPQQDAzBjMQsw +CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH +bWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBFQ0MgUm9vdCAyMDIw +MB4XDTIwMDgyNTA3NDgyMFoXDTQ1MDgyNTIzNTk1OVowYzELMAkGA1UEBhMCREUx +JzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkGA1UE +AwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgRUNDIFJvb3QgMjAyMDB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABM6//leov9Wq9xCazbzREaK9Z0LMkOsVGJDZos0MKiXrPk/O +tdKPD/M12kOLAoC+b1EkHQ9rK8qfwm9QMuU3ILYg/4gND21Ju9sGpIeQkpT0CdDP +f8iAC8GXs7s1J8nCG6NCMEAwHQYDVR0OBBYEFONyzG6VmUex5rNhTNHLq+O6zd6f +MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2cA +MGQCMHVSi7ekEE+uShCLsoRbQuHmKjYC2qBuGT8lv9pZMo7k+5Dck2TOrbRBR2Di +z6fLHgIwN0GMZt9Ba9aDAEH9L1r3ULRn0SyocddDypwnJJGDSA3PzfdUga/sf+Rn +27iQ7t0l +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_RSA_Root_2023.pem b/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_RSA_Root_2023.pem new file mode 100644 index 0000000..eaaf855 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Telekom_Security_TLS_RSA_Root_2023.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFszCCA5ugAwIBAgIQIZxULej27HF3+k7ow3BXlzANBgkqhkiG9w0BAQwFADBj +MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 +eSBHbWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBSU0EgUm9vdCAy +MDIzMB4XDTIzMDMyODEyMTY0NVoXDTQ4MDMyNzIzNTk1OVowYzELMAkGA1UEBhMC +REUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkG +A1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMzCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAO01oYGA88tKaVvC+1GDrib94W7zgRJ9 +cUD/h3VCKSHtgVIs3xLBGYSJwb3FKNXVS2xE1kzbB5ZKVXrKNoIENqil/Cf2SfHV +cp6R+SPWcHu79ZvB7JPPGeplfohwoHP89v+1VmLhc2o0mD6CuKyVU/QBoCcHcqMA +U6DksquDOFczJZSfvkgdmOGjup5czQRxUX11eKvzWarE4GC+j4NSuHUaQTXtvPM6 +Y+mpFEXX5lLRbtLevOP1Czvm4MS9Q2QTps70mDdsipWol8hHD/BeEIvnHRz+sTug +BTNoBUGCwQMrAcjnj02r6LX2zWtEtefdi+zqJbQAIldNsLGyMcEWzv/9FIS3R/qy +8XDe24tsNlikfLMR0cN3f1+2JeANxdKz+bi4d9s3cXFH42AYTyS2dTd4uaNir73J +co4vzLuu2+QVUhkHM/tqty1LkCiCc/4YizWN26cEar7qwU02OxY2kTLvtkCJkUPg +8qKrBC7m8kwOFjQgrIfBLX7JZkcXFBGk8/ehJImr2BrIoVyxo/eMbcgByU/J7MT8 +rFEz0ciD0cmfHdRHNCk+y7AO+oMLKFjlKdw/fKifybYKu6boRhYPluV75Gp6SG12 +mAWl3G0eQh5C2hrgUve1g8Aae3g1LDj1H/1Joy7SWWO/gLCMk3PLNaaZlSJhZQNg ++y+TS/qanIA7AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtqeX +gj10hZv3PJ+TmpV5dVKMbUcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS2 +p5eCPXSFm/c8n5OalXl1UoxtRzANBgkqhkiG9w0BAQwFAAOCAgEAqMxhpr51nhVQ +pGv7qHBFfLp+sVr8WyP6Cnf4mHGCDG3gXkaqk/QeoMPhk9tLrbKmXauw1GLLXrtm +9S3ul0A8Yute1hTWjOKWi0FpkzXmuZlrYrShF2Y0pmtjxrlO8iLpWA1WQdH6DErw +M807u20hOq6OcrXDSvvpfeWxm4bu4uB9tPcy/SKE8YXJN3nptT+/XOR0so8RYgDd +GGah2XsjX/GO1WfoVNpbOms2b/mBsTNHM3dA+VKq3dSDz4V4mZqTuXNnQkYRIer+ +CqkbGmVps4+uFrb2S1ayLfmlyOw7YqPta9BO1UAJpB+Y1zqlklkg5LB9zVtzaL1t +xKITDmcZuI1CfmwMmm6gJC3VRRvcxAIU/oVbZZfKTpBQCHpCNfnqwmbU+AGuHrS+ +w6jv/naaoqYfRvaE7fzbzsQCzndILIyy7MMAo+wsVRjBfhnu4S/yrYObnqsZ38aK +L4x35bcF7DvB7L6Gs4a8wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+lj +X273CXE2whJdV/LItM3z7gLfEdxquVeEHVlNjM7IDiPCtyaaEBRx/pOyiriA8A4Q +ntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0o82bNSQ3+pCTE4FCxpgm +dTdmQRCsu/WU48IxK63nI1bMNSWSs1A= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TeliaSonera_Root_CA_v1.pem b/pki/ca-trust/extracted/pem/directory-hash/TeliaSonera_Root_CA_v1.pem new file mode 100644 index 0000000..8bc52c3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TeliaSonera_Root_CA_v1.pem @@ -0,0 +1,30 @@ +-----BEGIN CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Telia_Root_CA_v2.pem b/pki/ca-trust/extracted/pem/directory-hash/Telia_Root_CA_v2.pem new file mode 100644 index 0000000..567fe25 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Telia_Root_CA_v2.pem @@ -0,0 +1,32 @@ +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx +CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE +AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 +NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ +MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq +AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 +vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 +lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD +n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT +7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o +6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC +TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 +WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R +DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI +pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj +YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy +rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw +AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ +8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi +0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM +A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS +SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K +TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF +6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er +3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt +Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT +VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW +ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA +rBPuUBQemMc= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G3.pem new file mode 100644 index 0000000..8b4f261 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G3.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFpTCCA42gAwIBAgIUZPYOZXdhaqs7tOqFhLuxibhxkw8wDQYJKoZIhvcNAQEM +BQAwWjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dp +ZXMsIEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHMzAe +Fw0yMTA1MjAwMjEwMTlaFw00NjA1MTkwMjEwMTlaMFoxCzAJBgNVBAYTAkNOMSUw +IwYDVQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtU +cnVzdEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQDAMYJhkuSUGwoqZdC+BqmHO1ES6nBBruL7dOoKjbmzTNyPtxNS +T1QY4SxzlZHFZjtqz6xjbYdT8PfxObegQ2OwxANdV6nnRM7EoYNl9lA+sX4WuDqK +AtCWHwDNBSHvBm3dIZwZQ0WhxeiAysKtQGIXBsaqvPPW5vxQfmZCHzyLpnl5hkA1 +nyDvP+uLRx+PjsXUjrYsyUQE49RDdT/VP68czH5GX6zfZBCK70bwkPAPLfSIC7Ep +qq+FqklYqL9joDiR5rPmd2jE+SoZhLsO4fWvieylL1AgdB4SQXMeJNnKziyhWTXA +yB1GJ2Faj/lN03J5Zh6fFZAhLf3ti1ZwA0pJPn9pMRJpxx5cynoTi+jm9WAPzJMs +hH/x/Gr8m0ed262IPfN2dTPXS6TIi/n1Q1hPy8gDVI+lhXgEGvNz8teHHUGf59gX +zhqcD0r83ERoVGjiQTz+LISGNzzNPy+i2+f3VANfWdP3kXjHi3dqFuVJhZBFcnAv +kV34PmVACxmZySYgWmjBNb9Pp1Hx2BErW+Canig7CjoKH8GB5S7wprlppYiU5msT +f9FkPz2ccEblooV7WIQn3MSAPmeamseaMQ4w7OYXQJXZRe0Blqq/DPNL0WP3E1jA +uPP6Z92bfW1K/zJMtSU7/xxnD4UiWQWRkUF3gdCFTIcQcf+eQxuulXUtgQIDAQAB +o2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFEDk5PIj7zjKsK5Xf/Ih +MBY027ySMB0GA1UdDgQWBBRA5OTyI+84yrCuV3/yITAWNNu8kjAOBgNVHQ8BAf8E +BAMCAQYwDQYJKoZIhvcNAQEMBQADggIBACY7UeFNOPMyGLS0XuFlXsSUT9SnYaP4 +wM8zAQLpw6o1D/GUE3d3NZ4tVlFEbuHGLige/9rsR82XRBf34EzC4Xx8MnpmyFq2 +XFNFV1pF1AWZLy4jVe5jaN/TG3inEpQGAHUNcoTpLrxaatXeL1nHo+zSh2bbt1S1 +JKv0Q3jbSwTEb93mPmY+KfJLaHEih6D4sTNjduMNhXJEIlU/HHzp/LgV6FL6qj6j +ITk1dImmasI5+njPtqzn59ZW/yOSLlALqbUHM/Q4X6RJpstlcHboCoWASzY9M/eV +VHUl2qzEc4Jl6VL1XP04lQJqaTDFHApXB64ipCz5xUG3uOyfT0gA+QEEVcys+TIx +xHWVBqB/0Y0n3bOppHKH/lmLmnp0Ft0WpWIp6zqW3IunaFnT63eROfjXy9mPX1on +AX1daBli2MjN9LdyR75bl87yraKZk62Uy5P2EgmVtqvXO9A/EcswFi55gORngS1d +7XB4tmBZrOFdRWOPyN9yaFvqHbgB8X7754qz41SgOAngPN5C8sLtLpvzHzW2Ntjj +gKGLzZlkD8Kqq7HK9W+eQ42EVJmzbsASZthwEPEGNTNDqJwuuhQxzhB/HIbjj9LV ++Hfsm6vxL2PZQl/gZ4FkkfGXL/xuJvYz+NO1+MRiqzFRJQJ6+N1rZdVtTTDIZbpo +FGWsJwt0ivKH +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G4.pem b/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G4.pem new file mode 100644 index 0000000..47b9804 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TrustAsia_Global_Root_CA_G4.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVTCCAdygAwIBAgIUTyNkuI6XY57GU4HBdk7LKnQV1tcwCgYIKoZIzj0EAwMw +WjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs +IEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHNDAeFw0y +MTA1MjAwMjEwMjJaFw00NjA1MTkwMjEwMjJaMFoxCzAJBgNVBAYTAkNOMSUwIwYD +VQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtUcnVz +dEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATx +s8045CVD5d4ZCbuBeaIVXxVjAd7Cq92zphtnS4CDr5nLrBfbK5bKfFJV4hrhPVbw +LxYI+hW8m7tH5j/uqOFMjPXTNvk4XatwmkcN4oFBButJ+bAp3TPsUKV/eSm4IJij +YzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUpbtKl86zK3+kMd6Xg1mD +pm9xy94wHQYDVR0OBBYEFKW7SpfOsyt/pDHel4NZg6ZvccveMA4GA1UdDwEB/wQE +AwIBBjAKBggqhkjOPQQDAwNnADBkAjBe8usGzEkxn0AAbbd+NvBNEU/zy4k6LHiR +UKNbwMp1JvK/kF0LgoxgKJ/GcJpo5PECMFxYDlZ2z1jD1xCMuo6u47xkdUfFVZDj +/bpV6wfEU6s3qe4hsiFbYI89MvHVI5TWWA== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_Certification_Authority.pem new file mode 100644 index 0000000..85da765 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_Certification_Authority.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHk= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P256_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P256_Certification_Authority.pem new file mode 100644 index 0000000..8f308f5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P256_Certification_Authority.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P384_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P384_Certification_Authority.pem new file mode 100644 index 0000000..e1ddb42 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/Trustwave_Global_ECC_P384_Certification_Authority.pem @@ -0,0 +1,17 @@ +-----BEGIN CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +Sw== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/TunTrust_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/TunTrust_Root_CA.pem new file mode 100644 index 0000000..58c5b54 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/TunTrust_Root_CA.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFszCCA5ugAwIBAgIUEwLV4kBMkkaGFmddtLu7sms+/BMwDQYJKoZIhvcNAQEL +BQAwYTELMAkGA1UEBhMCVE4xNzA1BgNVBAoMLkFnZW5jZSBOYXRpb25hbGUgZGUg +Q2VydGlmaWNhdGlvbiBFbGVjdHJvbmlxdWUxGTAXBgNVBAMMEFR1blRydXN0IFJv +b3QgQ0EwHhcNMTkwNDI2MDg1NzU2WhcNNDQwNDI2MDg1NzU2WjBhMQswCQYDVQQG +EwJUTjE3MDUGA1UECgwuQWdlbmNlIE5hdGlvbmFsZSBkZSBDZXJ0aWZpY2F0aW9u +IEVsZWN0cm9uaXF1ZTEZMBcGA1UEAwwQVHVuVHJ1c3QgUm9vdCBDQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMPN0/y9BFPdDCA61YguBUtB9YOCfvdZ +n56eY+hz2vYGqU8ftPkLHzmMmiDQfgbU7DTZhrx1W4eI8NLZ1KMKsmwb60ksPqxd +2JQDoOw05TDENX37Jk0bbjBU2PWARZw5rZzJJQRNmpA+TkBuimvNKWfGzC3gdOgF +VwpIUPp6Q9p+7FuaDmJ2/uqdHYVy7BG7NegfJ7/Boce7SBbdVtfMTqDhuazb1YMZ +GoXRlJfXyqNlC/M4+QKu3fZnz8k/9YosRxqZbwUN/dAdgjH8KcwAWJeRTIAAHDOF +li/LQcKLEITDCSSJH7UP2dl3RxiSlGBcx5kDPP73lad9UKGAwqmDrViWVSHbhlnU +r8a83YFuB9tgYv7sEG7aaAH0gxupPqJbI9dkxt/con3YS7qC0lH4Zr8GRuR5KiY2 +eY8fTpkdso8MDhz/yV3A/ZAQprE38806JG60hZC/gLkMjNWb1sjxVj8agIl6qeIb +MlEsPvLfe/ZdeikZjuXIvTZxi11Mwh0/rViizz1wTaZQmCXcI/m4WEEIcb9PuISg +jwBUFfyRbVinljvrS5YnzWuioYasDXxU5mZMZl+QviGaAkYt5IPCgLnPSz7ofzwB +7I9ezX/SKEIBlYrilz0QIX32nRzFNKHsLA4KUiwSVXAkPcvCFDVDXSdOvsC9qnyW +5/yeYa1E0wCXAgMBAAGjYzBhMB0GA1UdDgQWBBQGmpsfU33x9aTI04Y+oXNZtPdE +ITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFAaamx9TffH1pMjThj6hc1m0 +90QhMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAqgVutt0Vyb+z +xiD2BkewhpMl0425yAA/l/VSJ4hxyXT968pk21vvHl26v9Hr7lxpuhbI87mP0zYu +QEkHDVneixCwSQXi/5E/S7fdAo74gShczNxtr18UnH1YeA32gAm56Q6XKRm4t+v4 +FstVEuTGfbvE7Pi1HE4+Z7/FXxttbUcoqgRYYdZ2vyJ/0Adqp2RT8JeNnYA/u8EH +22Wv5psymsNUk8QcCMNE+3tjEUPRahphanltkE8pjkcFwRJpadbGNjHh/PqAulxP +xOu3Mqz4dWEX1xAZufHSCe96Qp1bWgvUxpVOKs7/B9dPfhgGiPEZtdmYu65xxBzn +dFlY7wyJz4sfdZMaBBSSSFCp61cpABbjNhzI+L/wM9VBD8TMPN3pM0MBkRArHtG5 +Xc0yGYuPjCB31yLEQtyEFpslbei0VXF/sHyz03FJuc9SpAQ/3D2gu68zngowYI7b +nV2UqL1g52KAdoGDDIzMMEZJ4gzSqK/rYXHv5yJiqfdcZGyfFoxnNidF9Ql7v/YQ +CvGwjVRDjAS6oz/v4jXH+XTgbzRB0L9zZVcg+ZtnemZoJE6AZb0QmQZZ8mWvuMZH +u/2QeItBcy6vVR/cO5JyboTT0GFMDcx2V+IthSIVNg3rAZ3r2OvEhJn7wAzMMujj +d9qDRIueVSjAi1jTkD5OGwDxFa2DK5o= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/UCA_Extended_Validation_Root.pem b/pki/ca-trust/extracted/pem/directory-hash/UCA_Extended_Validation_Root.pem new file mode 100644 index 0000000..04c38ff --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/UCA_Extended_Validation_Root.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF +eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx +MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV +BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog +D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS +sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop +O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk +sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi +c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj +VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz +KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ +TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G +sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs +1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD +fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T +AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN +l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR +ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ +VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 +c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp +4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s +t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj +2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO +vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C +xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx +cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM +fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1ax +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/UCA_Global_G2_Root.pem b/pki/ca-trust/extracted/pem/directory-hash/UCA_Global_G2_Root.pem new file mode 100644 index 0000000..2aeab49 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/UCA_Global_G2_Root.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0A== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/USERTrust_ECC_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/USERTrust_ECC_Certification_Authority.pem new file mode 100644 index 0000000..b1cf1fd --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/USERTrust_ECC_Certification_Authority.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/USERTrust_RSA_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/USERTrust_RSA_Certification_Authority.pem new file mode 100644 index 0000000..2795cf3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/USERTrust_RSA_Certification_Authority.pem @@ -0,0 +1,34 @@ +-----BEGIN CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9 +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/XRamp_Global_CA_Root.pem b/pki/ca-trust/extracted/pem/directory-hash/XRamp_Global_CA_Root.pem new file mode 100644 index 0000000..f21e6d8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/XRamp_Global_CA_Root.pem @@ -0,0 +1,25 @@ +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbw= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/a2c66da8.0 b/pki/ca-trust/extracted/pem/directory-hash/a2c66da8.0 new file mode 120000 index 0000000..275c6c1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a2c66da8.0 @@ -0,0 +1 @@ +DigiCert_Trusted_Root_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a3418fda.0 b/pki/ca-trust/extracted/pem/directory-hash/a3418fda.0 new file mode 120000 index 0000000..12f3c9b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a3418fda.0 @@ -0,0 +1 @@ +GTS_Root_R4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a716d4ed.0 b/pki/ca-trust/extracted/pem/directory-hash/a716d4ed.0 new file mode 120000 index 0000000..45a0367 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a716d4ed.0 @@ -0,0 +1 @@ +D-TRUST_EV_Root_CA_1_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a81e292b.0 b/pki/ca-trust/extracted/pem/directory-hash/a81e292b.0 new file mode 120000 index 0000000..4c87925 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a81e292b.0 @@ -0,0 +1 @@ +SZAFIR_ROOT_CA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a89d74c2.0 b/pki/ca-trust/extracted/pem/directory-hash/a89d74c2.0 new file mode 120000 index 0000000..0e5e1da --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a89d74c2.0 @@ -0,0 +1 @@ +SSL.com_TLS_RSA_Root_CA_2022.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a94d09e5.0 b/pki/ca-trust/extracted/pem/directory-hash/a94d09e5.0 new file mode 120000 index 0000000..ed152b5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a94d09e5.0 @@ -0,0 +1 @@ +ACCVRAIZ1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/a9d40e02.0 b/pki/ca-trust/extracted/pem/directory-hash/a9d40e02.0 new file mode 120000 index 0000000..65e8e80 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/a9d40e02.0 @@ -0,0 +1 @@ +certSIGN_Root_CA_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ab5346f4.0 b/pki/ca-trust/extracted/pem/directory-hash/ab5346f4.0 new file mode 120000 index 0000000..04dacae --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ab5346f4.0 @@ -0,0 +1 @@ +SecureSign_RootCA11.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ab59055e.0 b/pki/ca-trust/extracted/pem/directory-hash/ab59055e.0 new file mode 120000 index 0000000..48a515c --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ab59055e.0 @@ -0,0 +1 @@ +GDCA_TrustAUTH_R5_ROOT.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/aee5f10d.0 b/pki/ca-trust/extracted/pem/directory-hash/aee5f10d.0 new file mode 120000 index 0000000..f2fddd3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/aee5f10d.0 @@ -0,0 +1 @@ +Entrust.net_Premium_2048_Secure_Server_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b0e59380.0 b/pki/ca-trust/extracted/pem/directory-hash/b0e59380.0 new file mode 120000 index 0000000..6ab0a22 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b0e59380.0 @@ -0,0 +1 @@ +GlobalSign_ECC_Root_CA_-_R4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b0ed035a.0 b/pki/ca-trust/extracted/pem/directory-hash/b0ed035a.0 new file mode 120000 index 0000000..1372ca3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b0ed035a.0 @@ -0,0 +1 @@ +TWCA_Global_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b0f3e76e.0 b/pki/ca-trust/extracted/pem/directory-hash/b0f3e76e.0 new file mode 120000 index 0000000..72b60a6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b0f3e76e.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b1159c4c.0 b/pki/ca-trust/extracted/pem/directory-hash/b1159c4c.0 new file mode 120000 index 0000000..8130eaf --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b1159c4c.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b30d5fda.0 b/pki/ca-trust/extracted/pem/directory-hash/b30d5fda.0 new file mode 120000 index 0000000..8ca30e4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b30d5fda.0 @@ -0,0 +1 @@ +D-TRUST_BR_Root_CA_1_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b3fb433b.0 b/pki/ca-trust/extracted/pem/directory-hash/b3fb433b.0 new file mode 120000 index 0000000..433d7b1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b3fb433b.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_EC1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b433981b.0 b/pki/ca-trust/extracted/pem/directory-hash/b433981b.0 new file mode 120000 index 0000000..0c8056e --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b433981b.0 @@ -0,0 +1 @@ +ANF_Secure_Server_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b66938e9.0 b/pki/ca-trust/extracted/pem/directory-hash/b66938e9.0 new file mode 120000 index 0000000..e937c2a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b66938e9.0 @@ -0,0 +1 @@ +Secure_Global_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b727005e.0 b/pki/ca-trust/extracted/pem/directory-hash/b727005e.0 new file mode 120000 index 0000000..8c96498 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b727005e.0 @@ -0,0 +1 @@ +AffirmTrust_Premium.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b74d2bd5.0 b/pki/ca-trust/extracted/pem/directory-hash/b74d2bd5.0 new file mode 120000 index 0000000..82d621f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b74d2bd5.0 @@ -0,0 +1 @@ +emSign_ECC_Root_CA_-_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b7a5b843.0 b/pki/ca-trust/extracted/pem/directory-hash/b7a5b843.0 new file mode 120000 index 0000000..b5d335a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b7a5b843.0 @@ -0,0 +1 @@ +TWCA_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b7db1890.0 b/pki/ca-trust/extracted/pem/directory-hash/b7db1890.0 new file mode 120000 index 0000000..b5d335a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b7db1890.0 @@ -0,0 +1 @@ +TWCA_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b81b93f0.0 b/pki/ca-trust/extracted/pem/directory-hash/b81b93f0.0 new file mode 120000 index 0000000..20bb85b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b81b93f0.0 @@ -0,0 +1 @@ +AC_RAIZ_FNMT-RCM_SERVIDORES_SEGUROS.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b872f2b4.0 b/pki/ca-trust/extracted/pem/directory-hash/b872f2b4.0 new file mode 120000 index 0000000..8be8ce7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b872f2b4.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_2011.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b92fd57f.0 b/pki/ca-trust/extracted/pem/directory-hash/b92fd57f.0 new file mode 120000 index 0000000..24d323a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b92fd57f.0 @@ -0,0 +1 @@ +HARICA_TLS_RSA_Root_CA_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/b936d1c6.0 b/pki/ca-trust/extracted/pem/directory-hash/b936d1c6.0 new file mode 120000 index 0000000..c556690 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/b936d1c6.0 @@ -0,0 +1 @@ +AC_RAIZ_FNMT-RCM.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ba8887ce.0 b/pki/ca-trust/extracted/pem/directory-hash/ba8887ce.0 new file mode 120000 index 0000000..955158d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ba8887ce.0 @@ -0,0 +1 @@ +FIRMAPROFESIONAL_CA_ROOT-A_WEB.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/bc3f2570.0 b/pki/ca-trust/extracted/pem/directory-hash/bc3f2570.0 new file mode 120000 index 0000000..4ddf0c0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/bc3f2570.0 @@ -0,0 +1 @@ +Go_Daddy_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/bd43e1dd.0 b/pki/ca-trust/extracted/pem/directory-hash/bd43e1dd.0 new file mode 120000 index 0000000..f75a6f3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/bd43e1dd.0 @@ -0,0 +1 @@ +Hongkong_Post_Root_CA_3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/bdacca6f.0 b/pki/ca-trust/extracted/pem/directory-hash/bdacca6f.0 new file mode 120000 index 0000000..e937c2a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/bdacca6f.0 @@ -0,0 +1 @@ +Secure_Global_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/bf53fb88.0 b/pki/ca-trust/extracted/pem/directory-hash/bf53fb88.0 new file mode 120000 index 0000000..35301bc --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/bf53fb88.0 @@ -0,0 +1 @@ +Microsoft_RSA_Root_Certificate_Authority_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/bf64f35b.0 b/pki/ca-trust/extracted/pem/directory-hash/bf64f35b.0 new file mode 120000 index 0000000..032a296 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/bf64f35b.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c01eb047.0 b/pki/ca-trust/extracted/pem/directory-hash/c01eb047.0 new file mode 120000 index 0000000..c40d67a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c01eb047.0 @@ -0,0 +1 @@ +UCA_Global_G2_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c28a8a30.0 b/pki/ca-trust/extracted/pem/directory-hash/c28a8a30.0 new file mode 120000 index 0000000..908d179 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c28a8a30.0 @@ -0,0 +1 @@ +D-TRUST_Root_Class_3_CA_2_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c44cc0c0.0 b/pki/ca-trust/extracted/pem/directory-hash/c44cc0c0.0 new file mode 120000 index 0000000..cfce712 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c44cc0c0.0 @@ -0,0 +1 @@ +DigiCert_TLS_RSA4096_Root_G5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c491639e.0 b/pki/ca-trust/extracted/pem/directory-hash/c491639e.0 new file mode 120000 index 0000000..db79c20 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c491639e.0 @@ -0,0 +1 @@ +DigiCert_Assured_ID_Root_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c559d742.0 b/pki/ca-trust/extracted/pem/directory-hash/c559d742.0 new file mode 120000 index 0000000..c0c65bb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c559d742.0 @@ -0,0 +1 @@ +GTS_Root_R2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c7f1359b.0 b/pki/ca-trust/extracted/pem/directory-hash/c7f1359b.0 new file mode 120000 index 0000000..6334e28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c7f1359b.0 @@ -0,0 +1 @@ +Security_Communication_ECC_RootCA1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/c90bc37d.0 b/pki/ca-trust/extracted/pem/directory-hash/c90bc37d.0 new file mode 120000 index 0000000..fc7786a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/c90bc37d.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ca-bundle.crt b/pki/ca-trust/extracted/pem/directory-hash/ca-bundle.crt new file mode 120000 index 0000000..448f165 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ca-bundle.crt @@ -0,0 +1 @@ +../tls-ca-bundle.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ca-certificates.crt b/pki/ca-trust/extracted/pem/directory-hash/ca-certificates.crt new file mode 120000 index 0000000..448f165 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ca-certificates.crt @@ -0,0 +1 @@ +../tls-ca-bundle.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ca6e4ad9.0 b/pki/ca-trust/extracted/pem/directory-hash/ca6e4ad9.0 new file mode 120000 index 0000000..592abb2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ca6e4ad9.0 @@ -0,0 +1 @@ +ePKI_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cb1c3204.0 b/pki/ca-trust/extracted/pem/directory-hash/cb1c3204.0 new file mode 120000 index 0000000..f41c198 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cb1c3204.0 @@ -0,0 +1 @@ +Certum_Trusted_Network_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cbb3f32b.0 b/pki/ca-trust/extracted/pem/directory-hash/cbb3f32b.0 new file mode 120000 index 0000000..df9fd6a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cbb3f32b.0 @@ -0,0 +1 @@ +SSL.com_TLS_ECC_Root_CA_2022.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cbf06781.0 b/pki/ca-trust/extracted/pem/directory-hash/cbf06781.0 new file mode 120000 index 0000000..4ddf0c0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cbf06781.0 @@ -0,0 +1 @@ +Go_Daddy_Root_Certificate_Authority_-_G2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cc450945.0 b/pki/ca-trust/extracted/pem/directory-hash/cc450945.0 new file mode 120000 index 0000000..0762452 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cc450945.0 @@ -0,0 +1 @@ +Izenpe.com.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ccc52f49.0 b/pki/ca-trust/extracted/pem/directory-hash/ccc52f49.0 new file mode 120000 index 0000000..55228f5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ccc52f49.0 @@ -0,0 +1 @@ +AffirmTrust_Premium_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cd58d51e.0 b/pki/ca-trust/extracted/pem/directory-hash/cd58d51e.0 new file mode 120000 index 0000000..4e8c627 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cd58d51e.0 @@ -0,0 +1 @@ +Security_Communication_RootCA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/cd8c0d63.0 b/pki/ca-trust/extracted/pem/directory-hash/cd8c0d63.0 new file mode 120000 index 0000000..c556690 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cd8c0d63.0 @@ -0,0 +1 @@ +AC_RAIZ_FNMT-RCM.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ce5e74ef.0 b/pki/ca-trust/extracted/pem/directory-hash/ce5e74ef.0 new file mode 120000 index 0000000..cb66f0b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ce5e74ef.0 @@ -0,0 +1 @@ +Amazon_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/certSIGN_ROOT_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/certSIGN_ROOT_CA.pem new file mode 100644 index 0000000..0a38740 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/certSIGN_ROOT_CA.pem @@ -0,0 +1,20 @@ +-----BEGIN CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KD +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/certSIGN_Root_CA_G2.pem b/pki/ca-trust/extracted/pem/directory-hash/certSIGN_Root_CA_G2.pem new file mode 100644 index 0000000..573ec33 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/certSIGN_Root_CA_G2.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIJEQA0tk7GNi02MA0GCSqGSIb3DQEBCwUAMEExCzAJBgNV +BAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJR04g +Uk9PVCBDQSBHMjAeFw0xNzAyMDYwOTI3MzVaFw00MjAyMDYwOTI3MzVaMEExCzAJ +BgNVBAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJ +R04gUk9PVCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDF +dRmRfUR0dIf+DjuW3NgBFszuY5HnC2/OOwppGnzC46+CjobXXo9X69MhWf05N0Iw +vlDqtg+piNguLWkh59E3GE59kdUWX2tbAMI5Qw02hVK5U2UPHULlj88F0+7cDBrZ +uIt4ImfkabBoxTzkbFpG583H+u/E7Eu9aqSs/cwoUe+StCmrqzWaTOTECMYmzPhp +n+Sc8CnTXPnGFiWeI8MgwT0PPzhAsP6CRDiqWhqKa2NYOLQV07YRaXseVO6MGiKs +cpc/I1mbySKEwQdPzH/iV8oScLumZfNpdWO9lfsbl83kqK/20U6o2YpxJM02PbyW +xPFsqa7lzw1uKA2wDrXKUXt4FMMgL3/7FFXhEZn91QqhngLjYl/rNUssuHLoPj1P +rCy7Lobio3aP5ZMqz6WryFyNSwb/EkaseMsUBzXgqd+L6a8VTxaJW732jcZZroiF +DsGJ6x9nxUWO/203Nit4ZoORUSs9/1F3dmKh7Gc+PoGD4FapUB8fepmrY7+EF3fx +DTvf95xhszWYijqy7DwaNz9+j5LP2RIUZNoQAhVB/0/E6xyjyfqZ90bp4RjZsbgy +LcsUDFDYg2WD7rlcz8sFWkz6GZdr1l0T08JcVLwyc6B49fFtHsufpaafItzRUZ6C +eWRgKRM+o/1Pcmqr4tTluCRVLERLiohEnMqE0yo7AgMBAAGjQjBAMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSCIS1mxteg4BXrzkwJ +d8RgnlRuAzANBgkqhkiG9w0BAQsFAAOCAgEAYN4auOfyYILVAzOBywaK8SJJ6ejq +kX/GM15oGQOGO0MBzwdw5AgeZYWR5hEit/UCI46uuR59H35s5r0l1ZUa8gWmr4UC +b6741jH/JclKyMeKqdmfS0mbEVeZkkMR3rYzpMzXjWR91M08KCy0mpbqTfXERMQl +qiCA2ClV9+BB/AYm/7k29UMUA2Z44RGx2iBfRgB4ACGlHgAoYXhvqAEBj500mv/0 +OJD7uNGzcgbJceaBxXntC6Z58hMLnPddDnskk7RI24Zf3lCGeOdA5jGokHZwYa+c +NywRtYK3qq4kNFtyDGkNzVmf9nGvnAvRCjj5BiKDUyUM/FHE5r7iOZULJK2v0ZXk +ltd0ZGtxTgI8qoXzIKNDOXZbbFD+mpwUHmUUihW9o4JFWklWatKcsWMy5WHgUyIO +pwpJ6st+H6jiYoD2EEVSmAYY3qXNL3+q1Ok+CHLsIwMCPKaq2LxndD0UF/tUSxfj +03k9bWtJySgOLnRQvwzZRjoQhsmnP+mg7H/rpXdYaXHmgwo38oZJar55CJD2AhZk +PuXaTH4MNMn5X7azKFGnpyuqSfqNZSlO42sTp5SjLVFteAxEy9/eCG/Oo2Sr05WE +1LlSVHJ7liXMvGnjSG4N0MedJ5qq+BOS3R7fY581qRY27Iy4g/Q9iY/NtBde17MX +QRBdJ3NghVdJIgc= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/cf701eeb.0 b/pki/ca-trust/extracted/pem/directory-hash/cf701eeb.0 new file mode 120000 index 0000000..8949834 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/cf701eeb.0 @@ -0,0 +1 @@ +SecureTrust_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d06393bb.0 b/pki/ca-trust/extracted/pem/directory-hash/d06393bb.0 new file mode 120000 index 0000000..a35af48 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d06393bb.0 @@ -0,0 +1 @@ +T-TeleSec_GlobalRoot_Class_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d16a5865.0 b/pki/ca-trust/extracted/pem/directory-hash/d16a5865.0 new file mode 120000 index 0000000..634e72b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d16a5865.0 @@ -0,0 +1 @@ +Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d18e9066.0 b/pki/ca-trust/extracted/pem/directory-hash/d18e9066.0 new file mode 120000 index 0000000..6d43d0a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d18e9066.0 @@ -0,0 +1 @@ +IdenTrust_Commercial_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d39b0a2c.0 b/pki/ca-trust/extracted/pem/directory-hash/d39b0a2c.0 new file mode 120000 index 0000000..0ec2e82 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d39b0a2c.0 @@ -0,0 +1 @@ +NAVER_Global_Root_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d41b5e2a.0 b/pki/ca-trust/extracted/pem/directory-hash/d41b5e2a.0 new file mode 120000 index 0000000..f96d5e0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d41b5e2a.0 @@ -0,0 +1 @@ +Amazon_Root_CA_4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d4c339cb.0 b/pki/ca-trust/extracted/pem/directory-hash/d4c339cb.0 new file mode 120000 index 0000000..e5b24aa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d4c339cb.0 @@ -0,0 +1 @@ +COMODO_RSA_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d4dae3dd.0 b/pki/ca-trust/extracted/pem/directory-hash/d4dae3dd.0 new file mode 120000 index 0000000..029eda8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d4dae3dd.0 @@ -0,0 +1 @@ +D-TRUST_Root_Class_3_CA_2_EV_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d52c538d.0 b/pki/ca-trust/extracted/pem/directory-hash/d52c538d.0 new file mode 120000 index 0000000..cfce712 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d52c538d.0 @@ -0,0 +1 @@ +DigiCert_TLS_RSA4096_Root_G5.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d59297b8.0 b/pki/ca-trust/extracted/pem/directory-hash/d59297b8.0 new file mode 120000 index 0000000..4e8c627 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d59297b8.0 @@ -0,0 +1 @@ +Security_Communication_RootCA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d6325660.0 b/pki/ca-trust/extracted/pem/directory-hash/d6325660.0 new file mode 120000 index 0000000..e5b24aa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d6325660.0 @@ -0,0 +1 @@ +COMODO_RSA_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d7746a63.0 b/pki/ca-trust/extracted/pem/directory-hash/d7746a63.0 new file mode 120000 index 0000000..029eda8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d7746a63.0 @@ -0,0 +1 @@ +D-TRUST_Root_Class_3_CA_2_EV_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d7e8dc79.0 b/pki/ca-trust/extracted/pem/directory-hash/d7e8dc79.0 new file mode 120000 index 0000000..ded02df --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d7e8dc79.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d887a5bb.0 b/pki/ca-trust/extracted/pem/directory-hash/d887a5bb.0 new file mode 120000 index 0000000..99d24aa --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d887a5bb.0 @@ -0,0 +1 @@ +Trustwave_Global_ECC_P384_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/d96b65e2.0 b/pki/ca-trust/extracted/pem/directory-hash/d96b65e2.0 new file mode 120000 index 0000000..f3c82d6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/d96b65e2.0 @@ -0,0 +1 @@ +Certainly_Root_R1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/da0cfd1d.0 b/pki/ca-trust/extracted/pem/directory-hash/da0cfd1d.0 new file mode 120000 index 0000000..1776eb4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/da0cfd1d.0 @@ -0,0 +1 @@ +Sectigo_Public_Server_Authentication_Root_E46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/da7377f6.0 b/pki/ca-trust/extracted/pem/directory-hash/da7377f6.0 new file mode 120000 index 0000000..6184212 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/da7377f6.0 @@ -0,0 +1 @@ +UCA_Extended_Validation_Root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dbc54cab.0 b/pki/ca-trust/extracted/pem/directory-hash/dbc54cab.0 new file mode 120000 index 0000000..8c96498 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dbc54cab.0 @@ -0,0 +1 @@ +AffirmTrust_Premium.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dbff3a01.0 b/pki/ca-trust/extracted/pem/directory-hash/dbff3a01.0 new file mode 120000 index 0000000..8f34a5a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dbff3a01.0 @@ -0,0 +1 @@ +emSign_Root_CA_-_C1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dc4d6a89.0 b/pki/ca-trust/extracted/pem/directory-hash/dc4d6a89.0 new file mode 120000 index 0000000..747ad9f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dc4d6a89.0 @@ -0,0 +1 @@ +GlobalSign_Root_CA_-_R6.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dc99f41e.0 b/pki/ca-trust/extracted/pem/directory-hash/dc99f41e.0 new file mode 120000 index 0000000..39dde35 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dc99f41e.0 @@ -0,0 +1 @@ +Hellenic_Academic_and_Research_Institutions_RootCA_2015.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dd8e9d41.0 b/pki/ca-trust/extracted/pem/directory-hash/dd8e9d41.0 new file mode 120000 index 0000000..2b90a45 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dd8e9d41.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ddcda989.0 b/pki/ca-trust/extracted/pem/directory-hash/ddcda989.0 new file mode 120000 index 0000000..5488762 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ddcda989.0 @@ -0,0 +1 @@ +Telekom_Security_TLS_ECC_Root_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/de6d66f3.0 b/pki/ca-trust/extracted/pem/directory-hash/de6d66f3.0 new file mode 120000 index 0000000..f96d5e0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/de6d66f3.0 @@ -0,0 +1 @@ +Amazon_Root_CA_4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/dfc0fe80.0 b/pki/ca-trust/extracted/pem/directory-hash/dfc0fe80.0 new file mode 120000 index 0000000..99ec072 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/dfc0fe80.0 @@ -0,0 +1 @@ +OISTE_WISeKey_Global_Root_GB_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e-Szigno_Root_CA_2017.pem b/pki/ca-trust/extracted/pem/directory-hash/e-Szigno_Root_CA_2017.pem new file mode 100644 index 0000000..b6f59c2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e-Szigno_Root_CA_2017.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/e071171e.0 b/pki/ca-trust/extracted/pem/directory-hash/e071171e.0 new file mode 120000 index 0000000..92223bf --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e071171e.0 @@ -0,0 +1 @@ +Sectigo_Public_Server_Authentication_Root_R46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e113c810.0 b/pki/ca-trust/extracted/pem/directory-hash/e113c810.0 new file mode 120000 index 0000000..b274bd8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e113c810.0 @@ -0,0 +1 @@ +Certigna.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e13665f9.0 b/pki/ca-trust/extracted/pem/directory-hash/e13665f9.0 new file mode 120000 index 0000000..7a20ad6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e13665f9.0 @@ -0,0 +1 @@ +TunTrust_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e18bfb83.0 b/pki/ca-trust/extracted/pem/directory-hash/e18bfb83.0 new file mode 120000 index 0000000..492c36d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e18bfb83.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_3_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e35234b1.0 b/pki/ca-trust/extracted/pem/directory-hash/e35234b1.0 new file mode 120000 index 0000000..ff2aade --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e35234b1.0 @@ -0,0 +1 @@ +Certum_Trusted_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e36a6752.0 b/pki/ca-trust/extracted/pem/directory-hash/e36a6752.0 new file mode 120000 index 0000000..8be8ce7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e36a6752.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_2011.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e442e424.0 b/pki/ca-trust/extracted/pem/directory-hash/e442e424.0 new file mode 120000 index 0000000..492c36d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e442e424.0 @@ -0,0 +1 @@ +QuoVadis_Root_CA_3_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e48193cf.0 b/pki/ca-trust/extracted/pem/directory-hash/e48193cf.0 new file mode 120000 index 0000000..8bd8025 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e48193cf.0 @@ -0,0 +1 @@ +AffirmTrust_Commercial.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e73d606e.0 b/pki/ca-trust/extracted/pem/directory-hash/e73d606e.0 new file mode 120000 index 0000000..99ec072 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e73d606e.0 @@ -0,0 +1 @@ +OISTE_WISeKey_Global_Root_GB_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e7c037b4.0 b/pki/ca-trust/extracted/pem/directory-hash/e7c037b4.0 new file mode 120000 index 0000000..bb3ce89 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e7c037b4.0 @@ -0,0 +1 @@ +GlobalSign_Root_E46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e7dd1bc4.0 b/pki/ca-trust/extracted/pem/directory-hash/e7dd1bc4.0 new file mode 120000 index 0000000..c12aa7b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e7dd1bc4.0 @@ -0,0 +1 @@ +CommScope_Public_Trust_RSA_Root-02.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e8651083.0 b/pki/ca-trust/extracted/pem/directory-hash/e8651083.0 new file mode 120000 index 0000000..d45e12b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e8651083.0 @@ -0,0 +1 @@ +Microsec_e-Szigno_Root_CA_2009.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e868b802.0 b/pki/ca-trust/extracted/pem/directory-hash/e868b802.0 new file mode 120000 index 0000000..ca6feba --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e868b802.0 @@ -0,0 +1 @@ +e-Szigno_Root_CA_2017.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/e8de2f56.0 b/pki/ca-trust/extracted/pem/directory-hash/e8de2f56.0 new file mode 120000 index 0000000..d3c6de0 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/e8de2f56.0 @@ -0,0 +1 @@ +Buypass_Class_3_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ePKI_Root_Certification_Authority.pem b/pki/ca-trust/extracted/pem/directory-hash/ePKI_Root_Certification_Authority.pem new file mode 100644 index 0000000..4b54256 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ePKI_Root_Certification_Authority.pem @@ -0,0 +1,33 @@ +-----BEGIN CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZw= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/ecccd8db.0 b/pki/ca-trust/extracted/pem/directory-hash/ecccd8db.0 new file mode 120000 index 0000000..7786be6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ecccd8db.0 @@ -0,0 +1 @@ +HARICA_TLS_ECC_Root_CA_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ed39abd0.0 b/pki/ca-trust/extracted/pem/directory-hash/ed39abd0.0 new file mode 120000 index 0000000..2b90a45 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ed39abd0.0 @@ -0,0 +1 @@ +DigiCert_Global_Root_G3.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ed858448.0 b/pki/ca-trust/extracted/pem/directory-hash/ed858448.0 new file mode 120000 index 0000000..3dc627d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ed858448.0 @@ -0,0 +1 @@ +vTrus_ECC_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/edcbddb5.0 b/pki/ca-trust/extracted/pem/directory-hash/edcbddb5.0 new file mode 120000 index 0000000..fc79f36 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/edcbddb5.0 @@ -0,0 +1 @@ +Trustwave_Global_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ee37c333.0 b/pki/ca-trust/extracted/pem/directory-hash/ee37c333.0 new file mode 120000 index 0000000..ec430eb --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ee37c333.0 @@ -0,0 +1 @@ +Telekom_Security_TLS_RSA_Root_2023.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ee532fd5.0 b/pki/ca-trust/extracted/pem/directory-hash/ee532fd5.0 new file mode 120000 index 0000000..3dc627d --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ee532fd5.0 @@ -0,0 +1 @@ +vTrus_ECC_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ee64a828.0 b/pki/ca-trust/extracted/pem/directory-hash/ee64a828.0 new file mode 120000 index 0000000..d1385e4 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ee64a828.0 @@ -0,0 +1 @@ +Comodo_AAA_Services_root.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/eed8c118.0 b/pki/ca-trust/extracted/pem/directory-hash/eed8c118.0 new file mode 120000 index 0000000..2c7c8c7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/eed8c118.0 @@ -0,0 +1 @@ +COMODO_ECC_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ef954a4e.0 b/pki/ca-trust/extracted/pem/directory-hash/ef954a4e.0 new file mode 120000 index 0000000..6d43d0a --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ef954a4e.0 @@ -0,0 +1 @@ +IdenTrust_Commercial_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_C3.pem b/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_C3.pem new file mode 100644 index 0000000..517c0e1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_C3.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_G3.pem b/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_G3.pem new file mode 100644 index 0000000..060e943 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/emSign_ECC_Root_CA_-_G3.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyj +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_C1.pem b/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_C1.pem new file mode 100644 index 0000000..02bd4a7 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_C1.pem @@ -0,0 +1,21 @@ +-----BEGIN CERTIFICATE----- +MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG +A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg +SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v +dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ +BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ +HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH +3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH +GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c +xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 +aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq +TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 +/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 +kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG +YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT ++xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo +WXzhriKi4gp6D/piq1JM4fHfyr6DDUI= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_G1.pem b/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_G1.pem new file mode 100644 index 0000000..c50d2e6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/emSign_Root_CA_-_G1.pem @@ -0,0 +1,22 @@ +-----BEGIN CERTIFICATE----- +MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD +VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU +ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH +MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO +MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv +Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz +f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO +8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq +d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM +tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt +Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB +o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x +PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM +wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d +GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH +6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby +RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx +iN66zB+Afko= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/f013ecaf.0 b/pki/ca-trust/extracted/pem/directory-hash/f013ecaf.0 new file mode 120000 index 0000000..2478d44 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f013ecaf.0 @@ -0,0 +1 @@ +GTS_Root_R1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f058632f.0 b/pki/ca-trust/extracted/pem/directory-hash/f058632f.0 new file mode 120000 index 0000000..f460aa5 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f058632f.0 @@ -0,0 +1 @@ +Telia_Root_CA_v2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f081611a.0 b/pki/ca-trust/extracted/pem/directory-hash/f081611a.0 new file mode 120000 index 0000000..12859a1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f081611a.0 @@ -0,0 +1 @@ +Go_Daddy_Class_2_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f0c70a8d.0 b/pki/ca-trust/extracted/pem/directory-hash/f0c70a8d.0 new file mode 120000 index 0000000..43798c3 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f0c70a8d.0 @@ -0,0 +1 @@ +SSL.com_EV_Root_Certification_Authority_ECC.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f0cd152c.0 b/pki/ca-trust/extracted/pem/directory-hash/f0cd152c.0 new file mode 120000 index 0000000..b15c128 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f0cd152c.0 @@ -0,0 +1 @@ +Entrust_Root_Certification_Authority_-_G4.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f249de83.0 b/pki/ca-trust/extracted/pem/directory-hash/f249de83.0 new file mode 120000 index 0000000..fc79f36 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f249de83.0 @@ -0,0 +1 @@ +Trustwave_Global_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f30dd6ad.0 b/pki/ca-trust/extracted/pem/directory-hash/f30dd6ad.0 new file mode 120000 index 0000000..e08a770 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f30dd6ad.0 @@ -0,0 +1 @@ +USERTrust_ECC_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f387163d.0 b/pki/ca-trust/extracted/pem/directory-hash/f387163d.0 new file mode 120000 index 0000000..8a8a6c1 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f387163d.0 @@ -0,0 +1 @@ +Starfield_Class_2_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f39fc864.0 b/pki/ca-trust/extracted/pem/directory-hash/f39fc864.0 new file mode 120000 index 0000000..8949834 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f39fc864.0 @@ -0,0 +1 @@ +SecureTrust_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f459871d.0 b/pki/ca-trust/extracted/pem/directory-hash/f459871d.0 new file mode 120000 index 0000000..9186210 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f459871d.0 @@ -0,0 +1 @@ +emSign_Root_CA_-_G1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f51bb24c.0 b/pki/ca-trust/extracted/pem/directory-hash/f51bb24c.0 new file mode 120000 index 0000000..7b1be65 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f51bb24c.0 @@ -0,0 +1 @@ +Certigna_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/f8fc53da.0 b/pki/ca-trust/extracted/pem/directory-hash/f8fc53da.0 new file mode 120000 index 0000000..ff2aade --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/f8fc53da.0 @@ -0,0 +1 @@ +Certum_Trusted_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fa5da96b.0 b/pki/ca-trust/extracted/pem/directory-hash/fa5da96b.0 new file mode 120000 index 0000000..03f6e58 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fa5da96b.0 @@ -0,0 +1 @@ +GLOBALTRUST_2020.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fb5fa911.0 b/pki/ca-trust/extracted/pem/directory-hash/fb5fa911.0 new file mode 120000 index 0000000..07ac44f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fb5fa911.0 @@ -0,0 +1 @@ +Amazon_Root_CA_2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fb717492.0 b/pki/ca-trust/extracted/pem/directory-hash/fb717492.0 new file mode 120000 index 0000000..343b96f --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fb717492.0 @@ -0,0 +1 @@ +Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fc5a8f99.0 b/pki/ca-trust/extracted/pem/directory-hash/fc5a8f99.0 new file mode 120000 index 0000000..e29daca --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fc5a8f99.0 @@ -0,0 +1 @@ +USERTrust_RSA_Certification_Authority.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fd08c599.0 b/pki/ca-trust/extracted/pem/directory-hash/fd08c599.0 new file mode 120000 index 0000000..cb66f0b --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fd08c599.0 @@ -0,0 +1 @@ +Amazon_Root_CA_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fd64f3fc.0 b/pki/ca-trust/extracted/pem/directory-hash/fd64f3fc.0 new file mode 120000 index 0000000..7a20ad6 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fd64f3fc.0 @@ -0,0 +1 @@ +TunTrust_Root_CA.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fde84897.0 b/pki/ca-trust/extracted/pem/directory-hash/fde84897.0 new file mode 120000 index 0000000..b274bd8 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fde84897.0 @@ -0,0 +1 @@ +Certigna.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/fe8a2cd8.0 b/pki/ca-trust/extracted/pem/directory-hash/fe8a2cd8.0 new file mode 120000 index 0000000..4c87925 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/fe8a2cd8.0 @@ -0,0 +1 @@ +SZAFIR_ROOT_CA2.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/feffd413.0 b/pki/ca-trust/extracted/pem/directory-hash/feffd413.0 new file mode 120000 index 0000000..bb3ce89 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/feffd413.0 @@ -0,0 +1 @@ +GlobalSign_Root_E46.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ff34af3f.0 b/pki/ca-trust/extracted/pem/directory-hash/ff34af3f.0 new file mode 120000 index 0000000..6cdb0a2 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ff34af3f.0 @@ -0,0 +1 @@ +TUBITAK_Kamu_SM_SSL_Kok_Sertifikasi_-_Surum_1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/ffa7f1eb.0 b/pki/ca-trust/extracted/pem/directory-hash/ffa7f1eb.0 new file mode 120000 index 0000000..e225d28 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/ffa7f1eb.0 @@ -0,0 +1 @@ +BJCA_Global_Root_CA1.pem \ No newline at end of file diff --git a/pki/ca-trust/extracted/pem/directory-hash/vTrus_ECC_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/vTrus_ECC_Root_CA.pem new file mode 100644 index 0000000..adb1219 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/vTrus_ECC_Root_CA.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDzCCAZWgAwIBAgIUbmq8WapTvpg5Z6LSa6Q75m0c1towCgYIKoZIzj0EAwMw +RzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4xGjAY +BgNVBAMTEXZUcnVzIEVDQyBSb290IENBMB4XDTE4MDczMTA3MjY0NFoXDTQzMDcz +MTA3MjY0NFowRzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28u +LEx0ZC4xGjAYBgNVBAMTEXZUcnVzIEVDQyBSb290IENBMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEZVBKrox5lkqqHAjDo6LN/llWQXf9JpRCux3NCNtzslt188+cToL0 +v/hhJoVs1oVbcnDS/dtitN9Ti72xRFhiQgnH+n9bEOf+QP3A2MMrMudwpremIFUd +e4BdS49nTPEQo0IwQDAdBgNVHQ4EFgQUmDnNvtiyjPeyq+GtJK97fKHbH88wDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwCgYIKoZIzj0EAwMDaAAwZQIw +V53dVvHH4+m4SVBrm2nDb+zDfSXkV5UTQJtS0zvzQBm8JsctBp61ezaf9SXUY2sA +AjEA6dPGnlaaKsyh2j/IZivTWJwghfqrkYpwcBE4YGQLYgmRWAD5Tfs0aNoJrSEG +GJTO +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/directory-hash/vTrus_Root_CA.pem b/pki/ca-trust/extracted/pem/directory-hash/vTrus_Root_CA.pem new file mode 100644 index 0000000..240fb75 --- /dev/null +++ b/pki/ca-trust/extracted/pem/directory-hash/vTrus_Root_CA.pem @@ -0,0 +1,31 @@ +-----BEGIN CERTIFICATE----- +MIIFVjCCAz6gAwIBAgIUQ+NxE9izWRRdt86M/TX9b7wFjUUwDQYJKoZIhvcNAQEL +BQAwQzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4x +FjAUBgNVBAMTDXZUcnVzIFJvb3QgQ0EwHhcNMTgwNzMxMDcyNDA1WhcNNDMwNzMx +MDcyNDA1WjBDMQswCQYDVQQGEwJDTjEcMBoGA1UEChMTaVRydXNDaGluYSBDby4s +THRkLjEWMBQGA1UEAxMNdlRydXMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAL1VfGHTuB0EYgWgrmy3cLRB6ksDXhA/kFocizuwZotsSKYc +IrrVQJLuM7IjWcmOvFjai57QGfIvWcaMY1q6n6MLsLOaXLoRuBLpDLvPbmyAhykU +AyyNJJrIZIO1aqwTLDPxn9wsYTwaP3BVm60AUn/PBLn+NvqcwBauYv6WTEN+VRS+ +GrPSbcKvdmaVayqwlHeFXgQPYh1jdfdr58tbmnDsPmcF8P4HCIDPKNsFxhQnL4Z9 +8Cfe/+Z+M0jnCx5Y0ScrUw5XSmXX+6KAYPxMvDVTAWqXcoKv8R1w6Jz1717CbMdH +flqUhSZNO7rrTOiwCcJlwp2dCZtOtZcFrPUGoPc2BX70kLJrxLT5ZOrpGgrIDajt +J8nU57O5q4IikCc9Kuh8kO+8T/3iCiSn3mUkpF3qwHYw03dQ+A0Em5Q2AXPKBlim +0zvc+gRGE1WKyURHuFE5Gi7oNOJ5y1lKCn+8pu8fA2dqWSslYpPZUxlmPCdiKYZN +pGvu/9ROutW04o5IWgAZCfEF2c6Rsffr6TlP9m8EQ5pV9T4FFL2/s1m02I4zhKOQ +UqqzApVg+QxMaPnu1RcN+HFXtSXkKe5lXa/R7jwXC1pDxaWG6iSe4gUH3DRCEpHW +OXSuTEGC2/KmSNGzm/MzqvOmwMVO9fSddmPmAsYiS8GVP1BkLFTltvA8Kc9XAgMB +AAGjQjBAMB0GA1UdDgQWBBRUYnBj8XWEQ1iO0RYgscasGrz2iTAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAKbqSSaet +8PFww+SX8J+pJdVrnjT+5hpk9jprUrIQeBqfTNqK2uwcN1LgQkv7bHbKJAs5EhWd +nxEt/Hlk3ODg9d3gV8mlsnZwUKT+twpw1aA08XXXTUm6EdGz2OyC/+sOxL9kLX1j +bhd47F18iMjrjld22VkE+rxSH0Ws8HqA7Oxvdq6R2xCOBNyS36D25q5J08FsEhvM +Kar5CKXiNxTKsbhm7xqC5PD48acWabfbqWE8n/Uxy+QARsIvdLGx14HuqCaVvIiv +TDUHKgLKeBRtRytAVunLKmChZwOgzoy8sHJnxDHO2zTlJQNgJXtxmOTAGytfdELS +S8VZCAeHvsXDf+eW2eHcKJfWjwXj9ZtOyh1QRwVTsMo554WgicEFOwE30z9J4nfr +I8iIZjs9OXYhRvHsXyO466JmdXTBQPfYaJqT4i2pLr0cox7IdMakLXogqzu4sEb9 +b91fUlV1YvCXoHzXOP0l382gmxDPi7g4Xl7FtKYCNqEeXxzP4padKar9mK5S4fNB +UvupLnKWnyfjqnN9+BojZns7q2WwMgFLFT49ok8MKzWixtlnEjUwzXYuFrOZnk1P +Ti07NEPhmg4NpGaXutIcSkwsKouLgU9xGqndXHt7CMUADTdA43x7VF8vhV929ven +sBxXVsFy6K2ir40zSbofitzmdHxghm+Hl3s= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/email-ca-bundle.pem b/pki/ca-trust/extracted/pem/email-ca-bundle.pem new file mode 100644 index 0000000..caa1297 --- /dev/null +++ b/pki/ca-trust/extracted/pem/email-ca-bundle.pem @@ -0,0 +1,2889 @@ +# ACCVRAIZ1 +-----BEGIN CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 +-----END CERTIFICATE----- + +# Actalis Authentication Root CA +-----BEGIN CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== +-----END CERTIFICATE----- + +# Amazon Root CA 1 +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy +rqXRfboQnoZsG4q5WTP468SQvvG5 +-----END CERTIFICATE----- + +# Amazon Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGw= +-----END CERTIFICATE----- + +# Amazon Root CA 3 +-----BEGIN CERTIFICATE----- +MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl +ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr +ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr +BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM +YyRIHN8wfdVoOw== +-----END CERTIFICATE----- + +# Amazon Root CA 4 +-----BEGIN CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EA== +-----END CERTIFICATE----- + +# Atos TrustedRoot 2011 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed +-----END CERTIFICATE----- + +# Atos TrustedRoot Root CA ECC G2 2020 +-----BEGIN CERTIFICATE----- +MIICMTCCAbagAwIBAgIMC3MoERh0MBzvbwiEMAoGCCqGSM49BAMDMEsxCzAJBgNV +BAYTAkRFMQ0wCwYDVQQKDARBdG9zMS0wKwYDVQQDDCRBdG9zIFRydXN0ZWRSb290 +IFJvb3QgQ0EgRUNDIEcyIDIwMjAwHhcNMjAxMjE1MDgzOTEwWhcNNDAxMjEwMDgz +OTA5WjBLMQswCQYDVQQGEwJERTENMAsGA1UECgwEQXRvczEtMCsGA1UEAwwkQXRv +cyBUcnVzdGVkUm9vdCBSb290IENBIEVDQyBHMiAyMDIwMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEyFyAyk7CKB9XvzjmYSP80KlblhYWwwxeFaWQCf84KLR6HgrWUyrB +u5BAdDfpgeiNL2gBNXxSLtj0WLMRHFvZhxiTkS3sndpsnm2ESPzCiQXrmBMCAWxT +Hg5JY1hHsa/Co2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFFsfxHFs +shufvlwfjP2ztvuzDgmHMB0GA1UdDgQWBBRbH8RxbLIbn75cH4z9s7b7sw4JhzAO +BgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMDaQAwZgIxAOzgmf3d5FTByx/oPijX +FVlKgspTMOzrNqW5yM6TR1bIYabhbZJTlY/241VT8N165wIxALCH1RuzYPyRjYDK +ohtRSzhUy6oee9flRJUWLzxEeC4luuqQ5OxS7lfsA4TzXtsWDQ== +-----END CERTIFICATE----- + +# Atos TrustedRoot Root CA RSA G2 2020 +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIMR7opRlU+FpKXsKtAMA0GCSqGSIb3DQEBDAUAMEsxCzAJ +BgNVBAYTAkRFMQ0wCwYDVQQKDARBdG9zMS0wKwYDVQQDDCRBdG9zIFRydXN0ZWRS +b290IFJvb3QgQ0EgUlNBIEcyIDIwMjAwHhcNMjAxMjE1MDg0MTIzWhcNNDAxMjEw +MDg0MTIyWjBLMQswCQYDVQQGEwJERTENMAsGA1UECgwEQXRvczEtMCsGA1UEAwwk +QXRvcyBUcnVzdGVkUm9vdCBSb290IENBIFJTQSBHMiAyMDIwMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAljGFSqoPMv554UOHnPsjt45/DVS9x2KTd+Qc +NQR2owOLIu7EhN2lk25uso4JA+tRFjEXqmkVGA5ndCNe6pp9tTk+PYKpa+H+qRyw +rVpNTHiDQYvP8h1impgEnGPpq2X+SB0kZQdHPrmRLumdm38aNak0sLflcDPvSnJR +tge/YD8qn51U3/PXlElRA1pAqWjdEVlc+HamvFBSEO2s7JXg1INrSdoKT5mD3jKD +SINnlbJ+54GFPc2C98oC7W2IXQiNuDW/KmkwmbtL0UHbRaCTmVGBkDYIqoq26I+z +y+7lRg1ydfVJbOGify+87YSmN+7ewk85Tvae8MnRmzCdSW3h2v8SEIzW5Zl7BbZ9 +sAnHpPiyHDmVOTP0Nc4lYnuwXyDzy234bFIUZESP08ipdgflr3GZLS0EJUh2r8Pn +zEPyB7xKJCQ33fpulAlvTF4BtP5U7COWpV7dhv/pRirx6NzspT2vb6oOD7R1+j4I +uSZFT2aGTLwZuOHVNe6ChMjTqxLnzXMzYnf0F8u9NHYqBc6V5Xh5S56wjfk8WDiR +6l6HOMC3Qv2qTIcjrQQgsX52Qtq7tha6V8iOE/p11QhMrziRqu+P+p9JLlR8Clax +evrETi/Uo/oWitCV5Zem/8P8fA5HWPN/B3sS3Fc/LeOhTVtSTDOHmagJe2x+DvLP +VkKe6wUCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBQgJfMH +/adv8ZbukRBpzJrvfchoeDAdBgNVHQ4EFgQUICXzB/2nb/GW7pEQacya733IaHgw +DgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBDAUAA4ICAQAkK06Y8h0X7dl2JrYw +M+hpRaFRS1LYejowtuQS6r+fTOAEpPY1xv6hMPdThZKtVAVXX5LlKt42J557E0fJ +anWv/PM35wz1PQFztWlR+L1Z0boL+Lq6ZCdDs3yDlYrnnhOW129KlkFJiw4grRbG +96aHW4gSiYuJyhLSVq8iASFG6auYP6eI3uTLKpp1Gfo5XgkF1wMyGrgXUQjHAEB9 +9L74DFn0aXZu06RYW14mc+RCVQZeeEAP0zif7yZRcHSR8XdiAejZy+uh3zkyHbtr +/XH+68+l5hT9AIATxpoASLCZBemugEj7CT9RFLW552BNTcovgSHuUgxletz1iUlM +MJI0WIAyWbEN/yRhD+cKQtB7vPiOJ0c/cJ0n2bYGPaW7y16Prg5Tx5xqbztMD6NA +cKiaB87UblsHotLiVLa9bzNyY61RmOGPdvFqBzgl/vZizl/bY8Jume8G3LneGRro +VD190nZ12V4+MkinjPKecgz4uFi4FyOlFId1WHoAgQciOWpMlKC1otunLMGw8aOb +wEz3bXDqMZ/xrn0+cyjZod/6k/CbsPDizSUgde/ifTIFyZt27su9MR75lJhLJFhW +SMDeBky9pjRd7RZhY3P7GeL6W9iXddRtnmA5XpSLAizrmc5gKm4bjKdLvP025pgf +ZfJ/8eOPTIBGNli2oWXLzhxEdQ== +-----END CERTIFICATE----- + +# BJCA Global Root CA1 +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIQVW9l47TZkGobCdFsPsBsIDANBgkqhkiG9w0BAQsFADBU +MQswCQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRI +T1JJVFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0ExMB4XDTE5MTIxOTAz +MTYxN1oXDTQ0MTIxMjAzMTYxN1owVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJF +SUpJTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2Jh +bCBSb290IENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPFmCL3Z +xRVhy4QEQaVpN3cdwbB7+sN3SJATcmTRuHyQNZ0YeYjjlwE8R4HyDqKYDZ4/N+AZ +spDyRhySsTphzvq3Rp4Dhtczbu33RYx2N95ulpH3134rhxfVizXuhJFyV9xgw8O5 +58dnJCNPYwpj9mZ9S1WnP3hkSWkSl+BMDdMJoDIwOvqfwPKcxRIqLhy1BDPapDgR +at7GGPZHOiJBhyL8xIkoVNiMpTAK+BcWyqw3/XmnkRd4OJmtWO2y3syJfQOcs4ll +5+M7sSKGjwZteAf9kRJ/sGsciQ35uMt0WwfCyPQ10WRjeulumijWML3mG90Vr4Tq +nMfK9Q7q8l0ph49pczm+LiRvRSGsxdRpJQaDrXpIhRMsDQa4bHlW/KNnMoH1V6XK +V0Jp6VwkYe/iMBhORJhVb3rCk9gZtt58R4oRTklH2yiUAguUSiz5EtBP6DF+bHq/ +pj+bOT0CFqMYs2esWz8sgytnOYFcuX6U1WTdno9uruh8W7TXakdI136z1C2OVnZO +z2nxbkRs1CTqjSShGL+9V/6pmTW12xB3uD1IutbB5/EjPtffhZ0nPNRAvQoMvfXn +jSXWgXSHRtQpdaJCbPdzied9v3pKH9MiyRVVz99vfFXQpIsHETdfg6YmV6YBW37+ +WGgHqel62bno/1Afq8K0wM7o6v0PvY1NuLxxAgMBAAGjQjBAMB0GA1UdDgQWBBTF +7+3M2I0hxkjk49cULqcWk+WYATAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAUoKsITQfI/Ki2Pm4rzc2IInRNwPWaZ+4 +YRC6ojGYWUfo0Q0lHhVBDOAqVdVXUsv45Mdpox1NcQJeXyFFYEhcCY5JEMEE3Kli +awLwQ8hOnThJdMkycFRtwUf8jrQ2ntScvd0g1lPJGKm1Vrl2i5VnZu69mP6u775u ++2D2/VnGKhs/I0qUJDAnyIm860Qkmss9vk/Ves6OF8tiwdneHg56/0OGNFK8YT88 +X7vZdrRTvJez/opMEi4r89fO4aL/3Xtw+zuhTaRjAv04l5U/BXCga99igUOLtFkN +SoxUnMW7gZ/NfaXvCyUeOiDbHPwfmGcCCtRzRBPbUYQaVQNW4AB+dAb/OMRyHdOo +P2gxXdMJxy6MW2Pg6Nwe0uxhHvLe5e/2mXZgLR6UcnHGCyoyx5JO1UbXHfmpGQrI ++pXObSOYqgs4rZpWDW+N8TEAiMEXnM0ZNjX+VVOg4DwzX5Ze4jLp3zO7Bkqp2IRz +znfSxqxx4VyjHQy7Ct9f4qNx2No3WqB4K/TUfet27fJhcKVlmtOJNBir+3I+17Q9 +eVzYH6Eze9mCUAyTF6ps3MKCuwJXNq+YJyo5UOGwifUll35HaBC07HPKs5fRJNz2 +YqAo07WjuGS3iGJCz51TzZm+ZGiPTx4SSPfSKcOYKMryMguTjClPPGAyzQWWYezy +r/6zcCwupvI= +-----END CERTIFICATE----- + +# BJCA Global Root CA2 +-----BEGIN CERTIFICATE----- +MIICJTCCAaugAwIBAgIQLBcIfWQqwP6FGFkGz7RK6zAKBggqhkjOPQQDAzBUMQsw +CQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRIT1JJ +VFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0EyMB4XDTE5MTIxOTAzMTgy +MVoXDTQ0MTIxMjAzMTgyMVowVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJFSUpJ +TkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2JhbCBS +b290IENBMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABJ3LgJGNU2e1uVCxA/jlSR9B +IgmwUVJY1is0j8USRhTFiy8shP8sbqjV8QnjAyEUxEM9fMEsxEtqSs3ph+B99iK+ ++kpRuDCK/eHeGBIK9ke35xe/J4rUQUyWPGCWwf0VHKNCMEAwHQYDVR0OBBYEFNJK +sVF/BvDRgh9Obl+rg/xI1LCRMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMAoGCCqGSM49BAMDA2gAMGUCMBq8W9f+qdJUDkpd0m2xQNz0Q9XSSpkZElaA +94M04TVOSG0ED1cxMDAtsaqdAzjbBgIxAMvMh1PLet8gUXOQwKhbYdDFUDn9hf7B +43j4ptZLvZuHjw/l1lOWqzzIQNph91Oj9w== +-----END CERTIFICATE----- + +# Baltimore CyberTrust Root +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp +-----END CERTIFICATE----- + +# CA Disig Root R2 +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL +-----END CERTIFICATE----- + +# COMODO Certification Authority +-----BEGIN CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZQ== +-----END CERTIFICATE----- + +# COMODO ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= +-----END CERTIFICATE----- + +# COMODO RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190 +-----END CERTIFICATE----- + +# Certigna +-----BEGIN CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== +-----END CERTIFICATE----- + +# Certigna Root CA +-----BEGIN CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= +-----END CERTIFICATE----- + +# Certum EC-384 CA +-----BEGIN CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= +-----END CERTIFICATE----- + +# Certum Root CA +-----BEGIN CERTIFICATE----- +MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTAeFw0wMjA2MTExMDQ2MzlaFw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6xwS7TT3zNJc4YPk/E +jG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdLkKWo +ePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GI +ULdtlkIJ89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapu +Ob7kky/ZR6By6/qmW6/KUz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUg +AKpoC6EahQGcxEZjgoi2IrHu/qpGWX7PNSzVttpd90gzFFS269lvzs2I1qsb2pY7 +HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEA +uI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+GXYkHAQa +TOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTg +xSvgGrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1q +CjqTE5s7FCMTY5w/0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5x +O/fIR/RpbxXyEV6DHpx8Uq79AtoSqFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs +6GAqm4VKQPNriiTsBhYscw== +-----END CERTIFICATE----- + +# Certum Trusted Network CA +-----BEGIN CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= +-----END CERTIFICATE----- + +# Certum Trusted Network CA 2 +-----BEGIN CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSP +-----END CERTIFICATE----- + +# Certum Trusted Root CA +-----BEGIN CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb +-----END CERTIFICATE----- + +# Comodo AAA Services root +-----BEGIN CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== +-----END CERTIFICATE----- + +# D-TRUST Root CA 3 2013 +-----BEGIN CERTIFICATE----- +MIIEDjCCAvagAwIBAgIDD92sMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxHzAdBgNVBAMMFkQtVFJVU1QgUm9vdCBD +QSAzIDIwMTMwHhcNMTMwOTIwMDgyNTUxWhcNMjgwOTIwMDgyNTUxWjBFMQswCQYD +VQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMR8wHQYDVQQDDBZELVRSVVNU +IFJvb3QgQ0EgMyAyMDEzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA +xHtCkoIf7O1UmI4SwMoJ35NuOpNcG+QQd55OaYhs9uFp8vabomGxvQcgdJhl8Ywm +CM2oNcqANtFjbehEeoLDbF7eu+g20sRoNoyfMr2EIuDcwu4QRjltr5M5rofmw7wJ +ySxrZ1vZm3Z1TAvgu8XXvD558l++0ZBX+a72Zl8xv9Ntj6e6SvMjZbu376Ml1wrq +WLbviPr6ebJSWNXwrIyhUXQplapRO5AyA58ccnSQ3j3tYdLl4/1kR+W5t0qp9x+u +loYErC/jpIF3t1oW/9gPP/a3eMykr/pbPBJbqFKJcu+I89VEgYaVI5973bzZNO98 +lDyqwEHC451QGsDkGSL8swIDAQABo4IBBTCCAQEwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQUP5DIfccVb/Mkj6nDL0uiDyGyL+cwDgYDVR0PAQH/BAQDAgEGMIG+ +BgNVHR8EgbYwgbMwdKByoHCGbmxkYXA6Ly9kaXJlY3RvcnkuZC10cnVzdC5uZXQv +Q049RC1UUlVTVCUyMFJvb3QlMjBDQSUyMDMlMjAyMDEzLE89RC1UcnVzdCUyMEdt +YkgsQz1ERT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MDugOaA3hjVodHRwOi8v +Y3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2FfM18yMDEzLmNybDAN +BgkqhkiG9w0BAQsFAAOCAQEADlkOWOR0SCNEzzQhtZwUGq2aS7eziG1cqRdw8Cqf +jXv5e4X6xznoEAiwNStfzwLS05zICx7uBVSuN5MECX1sj8J0vPgclL4xAUAt8yQg +t4RVLFzI9XRKEBmLo8ftNdYJSNMOwLo5qLBGArDbxohZwr78e7Erz35ih1WWzAFv +m2chlTWL+BD8cRu3SzdppjvW7IvuwbDzJcmPkn2h6sPKRL8mpXSSnON065102ctN +h9j8tGlsi6BDB2B4l+nZk3zCRrybN1Kj7Yo8E6l7U0tJmhEFLAtuVqwfLoJs4Gln +tQ5tLdnkwBXxP/oYcuEVbSdbLTAoK59ImmQrme/ydUlfXA== +-----END CERTIFICATE----- + +# D-Trust SBR Root CA 1 2022 +-----BEGIN CERTIFICATE----- +MIICXjCCAeOgAwIBAgIQUs/kjG2gSvc/gpcMgAmMlTAKBggqhkjOPQQDAzBJMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSMwIQYDVQQDExpELVRy +dXN0IFNCUiBSb290IENBIDEgMjAyMjAeFw0yMjA3MDYxMTMwMDBaFw0zNzA3MDYx +MTI5NTlaMEkxCzAJBgNVBAYTAkRFMRUwEwYDVQQKEwxELVRydXN0IEdtYkgxIzAh +BgNVBAMTGkQtVHJ1c3QgU0JSIFJvb3QgQ0EgMSAyMDIyMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEWZM59oxJZijXYQzIq38Moy3foqR8kito1S5+HkDLtGhJfxKhq39X +nxkuYy5b/mZxDDMPud5rxIjDse/sOUDjlqvb5XuuH9z5r0aaakYGL8c3ZIsXYv6W +w6LuhOCwlzm8o4GPMIGMMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFPEpox4B +Eh09dVZNx1B8xRmqDxi3MA4GA1UdDwEB/wQEAwIBBjBKBgNVHR8EQzBBMD+gPaA7 +hjlodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X3Nicl9yb290X2Nh +XzFfMjAyMi5jcmwwCgYIKoZIzj0EAwMDaQAwZgIxAJf53q5Lj5i1HkB/Mn1NVEPa +ic3CqpI80YIec8/6TJIg+2MnxfVzPQk996dhhozzagIxAOcvfLj1JYw7OR82q431 +hqIu4Xpk2mc5Av7+Mz/Zc7ZYWzr8sqTZYHh3zHmnpq5VvQ== +-----END CERTIFICATE----- + +# D-Trust SBR Root CA 2 2022 +-----BEGIN CERTIFICATE----- +MIIFrDCCA5SgAwIBAgIQVNWjlR49lbpyG5rQMSFKujANBgkqhkiG9w0BAQ0FADBJ +MQswCQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSMwIQYDVQQDExpE +LVRydXN0IFNCUiBSb290IENBIDIgMjAyMjAeFw0yMjA3MDcwNzMwMDBaFw0zNzA3 +MDcwNzI5NTlaMEkxCzAJBgNVBAYTAkRFMRUwEwYDVQQKEwxELVRydXN0IEdtYkgx +IzAhBgNVBAMTGkQtVHJ1c3QgU0JSIFJvb3QgQ0EgMiAyMDIyMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAryy8jjaM62SvUWrWbjxekTrqmsPKbPuqJ55k +IqlA37koRVrsU2EWKJjCiqR1eFCE3fogSJIHZUE1ZlESdGGdBwaFOTFXeyg/1Zyl +7FrpHEsnn84nBvM39VLYETMWQTof9WN4ZWOGyb/IAQQfbu7i7KwM7oKS4vYaDT85 ++Z1lk634uQXBPfg3gVbDoP4F7OCUFjojFgTapgqThXJtYTuhjUXW43++Fb02hAj2 +C4NrJqqiveCw56rgrmfE04KlDKmk8DN5DVA/8O+QPSS5f9IgbOqX87+c3EfeCWG9 +lHmVWgJ2NWDERyIN93ZjA9PG+4PGXaut7WklKwNbTSUAQeOMhxdSqOAFK0NNFBPK +5z9DIrw3pHXx9r867zIeru5YhpByugSsQEjvXMR4p6mPJ1rLeuxY8sIIWJBtTQOF +eXEVBQ5OPvnfDwX3XxRIViENM5KxrIzlGP6/D+7gBKq9IfJYtlyJCosYCSIaszXG +ZsL1MxWZgOAI+ZYvE4zu2reIxOk3tddq1zqETatwjNNOFFWgohD8ZNpn6PHLM93J +moqPli9Ygdn4mgBDzJD7VXb7huM3ASgMb/TpWU0Vd1FCSsw0uIBDUIHvV6UT26eU +eQ9Lyn4Xfa+jIWTocVVWjwawR+xZD11wWywWQvCGnnXea01ImITiVxi2nIKZZTqL +gHhXDEkCAwEAAaOBjzCBjDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRds4CU +G+WGv2i6FDSk9u5t8t3f5zAOBgNVHQ8BAf8EBAMCAQYwSgYDVR0fBEMwQTA/oD2g +O4Y5aHR0cDovL2NybC5kLXRydXN0Lm5ldC9jcmwvZC10cnVzdF9zYnJfcm9vdF9j +YV8yXzIwMjIuY3JsMA0GCSqGSIb3DQEBDQUAA4ICAQA0VC5YGFbNSr2X0/V9K9yv +D1HhTbwhS5P0AEQTBxALJRg+SFmW96Hhk5B4Zho9I+siqwGmjgxRM+ZtjDHurKQB +cDlI3sdmLGsNy3Ofh5LpPkcfuO8v7rdWjEiJ8DinFTmy7sA/F6RzAgicvAaKpMK3 +YWH5w9vE0Hp8Yd6xWJH13WVMLwv46z217Yq+dxy6WQISZnHlmCfODj2vUaJF+YL7 +WqWUcPeLhMNMZSWbe+IfMHCzQI467r3052jFnckpR3EOk8i1SE71ZrsHiHFpa3tI +jm/wEcS0yXAUmCC97afqAdpupZsS/j5EMLPw63VSwPTD+ncmpHeCLW/zKB5OlfAw +94n4LKJQW/K+Mn5sVNtyySpa4By2C9hSmlmh47ABJ8WgFlBm3OuubfSbWz2EbVuH +56mJu2644JtTicD/LkAaiUQuGENnOOR8cl/ZoyklQUE9HHcbZKjDVe5jcWZig/R/ +JpmgVDuhEm1wYs7T+bi9IvzUmtS74jgWL7d9OcKwqQPpnM9+GI123F8Ru+tC7FAJ +PlzskDHYGnK6P2kH7pg0wjSk1toT1qmE8gCGwFS6HhGw4rnEB7SR56rmMVZvsUTE +KmK8ybBlnDT8DBpT3yEXu8JtoQrm8bCqRAlQSTh6XXHiMS4ZsN+VQgR9hIjOCiNn +azidFt4G/ihwOKVarvyD7Q== +-----END CERTIFICATE----- + +# DIGITALSIGN GLOBAL ROOT ECDSA CA +-----BEGIN CERTIFICATE----- +MIICajCCAfCgAwIBAgIUNi2PcoiiKCfkAP8kxi3k6/qdtuEwCgYIKoZIzj0EAwMw +ZDELMAkGA1UEBhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmljYWRv +cmEgRGlnaXRhbDEpMCcGA1UEAwwgRElHSVRBTFNJR04gR0xPQkFMIFJPT1QgRUNE +U0EgQ0EwHhcNMjEwMTIxMTEwNzUwWhcNNDYwMTE1MTEwNzUwWjBkMQswCQYDVQQG +EwJQVDEqMCgGA1UECgwhRGlnaXRhbFNpZ24gQ2VydGlmaWNhZG9yYSBEaWdpdGFs +MSkwJwYDVQQDDCBESUdJVEFMU0lHTiBHTE9CQUwgUk9PVCBFQ0RTQSBDQTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABG4Lo6szTRzqSuj8BI0UoH3wCCxfg6uT0dJ7utdJ +fY/sElBf1LnL5fD5M2MfyVfsQNgRC5foUhbMKY70BoYeONw9V8Tuqr3IVAQmWicT +UUc9Hx8ajqiVpDPQzEfMbbj8SKNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBTOr0qLGnXi8TjnAvAWrV7qZNV7tDAdBgNVHQ4EFgQUzq9Kixp14vE45wLw +Fq1e6mTVe7QwDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2gAMGUCMAqIxHGc +RANNjbTHvKiu2TAnNWprFmPX/OdZ4aeJG0wxmiNVRObzQyHVRydvbVcBqgIxAPuy +6uKXf1G1n0jrvG81iahkcKtXds3AxhRgyn/iggBz98w16o4km+UIWccEjHN4/g== +-----END CERTIFICATE----- + +# DIGITALSIGN GLOBAL ROOT RSA CA +-----BEGIN CERTIFICATE----- +MIIFtTCCA52gAwIBAgIUXVnIyqsJV/XmtdoplARq/8XUlYcwDQYJKoZIhvcNAQEN +BQAwYjELMAkGA1UEBhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmlj +YWRvcmEgRGlnaXRhbDEnMCUGA1UEAwweRElHSVRBTFNJR04gR0xPQkFMIFJPT1Qg +UlNBIENBMB4XDTIxMDEyMTEwNTAzNFoXDTQ2MDExNTEwNTAzNFowYjELMAkGA1UE +BhMCUFQxKjAoBgNVBAoMIURpZ2l0YWxTaWduIENlcnRpZmljYWRvcmEgRGlnaXRh +bDEnMCUGA1UEAwweRElHSVRBTFNJR04gR0xPQkFMIFJPT1QgUlNBIENBMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAyIe2ONMc8N4S+IPHxIriibi0Inp4 ++AxmUWh2NwrVT8JaCLgWXPdyAQk3hIEqVGvXktBs+qinQxI06w7bNw8p/ooxUULo +S5yQqMgsEdP9oCl+zt6U9oLgWLRORSXxIvI90w97VBrcMrbWUU5+QbRXuCzGuQ4u +ylfx1cjTWOel6UIRrtMgJZRp14/Kog3D058HaD8V0mcuU/12gpsLc6kpDZ4RkxQI +mOyeVBJKVqIGFexrbC6SYC6GDa6CH1FN47IH1xAZVyL2qWlEhPPZPaAGv8yIfn/1 +zlulwipqdELqb6b/+Wix0F+9kdJVbzNXTB6d5OKLwYVloOBqnAAAiJLdWAgW8nAx +qBzh3r1OcenWvn61oVrDTfe/m72UpP31qlOTRskmAQRwxKBxus4lZvuRflVw7kkK +TWJ/wlCacvIYZ53pRag0hOj4gfbRWiIeB087s3/dEaVz3L6pGTppqW0bMuKJqqUn +C1p+dOIPZDldfly5wRf8x41eyewk7dLyP3qERTcCvj5rWcTmWxZtwKqeqrVZLixw +VZzMmZaYJFTRjtrKtBG0t3BDH2+QCyCgqHYTZdvbI1p1S6ELMXcK7n1oYRoTjOpR +flxWo1dMXaHrE2W/VBTM8+7c1+w8l/J4Vrjfclxw/M4G3Z/SBzHv51KRns2618AY +RAcxZUkyaRNK648CAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW +gBS1Nrw8jBqrLPZZGS2DFNqTJRXWhjAdBgNVHQ4EFgQUtTa8PIwaqyz2WRktgxTa +kyUV1oYwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBDQUAA4ICAQAU+zElODH4 +ygiyI3Y4rfjTWfXMtFcl4US+fvwW7K76Jp9PZxZKVvD97ccZATSOkFot1oBc7HHS +gSWCHgBx35rR1R0iu9Gl82IPtOvcJHP+plbNmhTFBDUWMaIH66UA4rb4X3L9P2FJ +jt5+TTjXeh50N2xR3L4ABLg4FPMgwe2bpyP9DUKEHX/yc8PQeGPxn+zXW+nxvmyg +SwOejWnhFNqIEIEjU//aVCsLxrmWlQQYRvN7qJfYW2ik5DgcDkXlmNMJrppe7LN5 +DTly8vSUnQ6eYCLmqPZMhc0HgjpoOc09X+M49LavO2tKn2BRRaJAAuWqDOM+0XjU +onScJroFmihwSj6mC9AdSfC6+K5BEH6kBxK9qM8pPVe7x/FDRwA+rnAYWiB7Ccs6 +OnCA5UxgmMEVwR1K98jwm+FyreddaFgLBLGMvJ+3+26LWwRV++sjVdd4UNoly74n +NrskGnkcUdH+E7v/eCzcpL4v9sVLU8+nTJlecKxZiASuZAS/e6Z6TdPod72hflAV +8+9JMIVNIVeq2yx1l62BAYeisXCdHgZaA2CxP6ZtgizUFLGBpeg9iB20cixYN4qO +OJS4c92p4Lj2d6KzfFjermk6tYulGrvy2HQGnP1icyAhdrF+cJ4Z1OsXYhk4mc02 +K0f+McvfueSsCNPYpuvUnn5LZKRVXSsXyQ== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root CA +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G2 +-----BEGIN CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5w== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G3 +-----BEGIN CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtA== +-----END CERTIFICATE----- + +# DigiCert Global Root CA +-----BEGIN CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= +-----END CERTIFICATE----- + +# DigiCert Global Root G2 +-----BEGIN CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrY= +-----END CERTIFICATE----- + +# DigiCert Global Root G3 +-----BEGIN CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycX +-----END CERTIFICATE----- + +# DigiCert High Assurance EV Root CA +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9K +-----END CERTIFICATE----- + +# DigiCert SMIME ECC P384 Root G5 +-----BEGIN CERTIFICATE----- +MIICHDCCAaOgAwIBAgIQBT9uoAYBcn3tP8OjtqPW7zAKBggqhkjOPQQDAzBQMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xKDAmBgNVBAMTH0Rp +Z2lDZXJ0IFNNSU1FIEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBQMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xKDAmBgNVBAMTH0RpZ2lDZXJ0IFNNSU1FIEVDQyBQMzg0IFJvb3QgRzUw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQWnVXlttT7+2drGtShqtJ3lT6I5QeftnBm +ICikiOxwNa+zMv83E0qevAED3oTBuMbmZUeJ8hNVv82lHghgf61/6GGSKc8JR14L +HMAfpL/yW7yY75lMzHBrtrrQKB2/vgSjQjBAMB0GA1UdDgQWBBRzemuW20IHi1Jm +wmQyF/7gZ5AurTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNnADBkAjA3RPUygONx6/Rtz3zMkZrDbnHY0iNdkk2CQm1cYZX2kfWn +CPZql+mclC2YcP0ztgkCMAc8L7lYgl4Po2Kok2fwIMNpvwMsO1CnO69BOMlSSJHW +Dvu8YDB8ZD8SHkV/UT70pg== +-----END CERTIFICATE----- + +# DigiCert SMIME RSA4096 Root G5 +-----BEGIN CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQBfa6BCODRst9XOa5W7ocVTANBgkqhkiG9w0BAQwFADBP +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJzAlBgNVBAMT +HkRpZ2lDZXJ0IFNNSU1FIFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBa +Fw00NjAxMTQyMzU5NTlaME8xCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy +dCwgSW5jLjEnMCUGA1UEAxMeRGlnaUNlcnQgU01JTUUgUlNBNDA5NiBSb290IEc1 +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4Gpb2fj5fey1e+9f3Vw0 +2Npd0ctldashfFsA1IJvRYVBiqkSAnIy8BT1A3W7Y5dJD0CZCxoeVqfS0OGr3eUE +G+MfFBICiPWggAn2J5pQ8LrjouCsahSRtWs4EHqiMeGRG7e58CtbyHcJdrdRxDYK +mVNURCW3CTWGFwVWkz1BtwLXYh+KkhGH6hFt6ggR3LF4SEmS9rRRgHgj2P7hVho6 +kBNWNInV4pWLX96yzPs/OLeF9+qevy6hLi9NfWoRLjag/xEIBJVV4Bs7Z5OplFXq +Mu0GOn/Cf+OtEyfRNEGzMMO/tIj4A4Kk3z6reHegWZNx593rAAR7zEg5KOAeoxVp +yDayoQuX31XW75GcpPYW91EK7gMjkdwE/+DdOPYiAwDCB3EaEsnXRiqUG83Wuxvu +v75NUFiwC80wdin1z+W2ai92sLBpatBtZRg1fpO8chfBVULNL8Ilu/T9HaFkIlRd +4p5yQYRucZbqRQe2XnpKhp1zZHc4A9IPU6VVIMRN/2hvVanq3XHkT9mFo3xOKQKe +CwnyGlPMAKbd0TT2DcEwsZwCZKw17aWwKbHSlTMP0iAzvewjS/IZ+dqYZOQsMR8u +4Y0cBJUoTYxYzUvlc4KGjOyo1nlc+2S73AxMKPYXr+Jo1haGmNv8AdwxuvicDvko +Rkrh/ZYGRXkRaBdlXIsmh1sCAwEAAaNCMEAwHQYDVR0OBBYEFNGj1FcdT1XbdUxc +Qp5jFs60xjsfMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqG +SIb3DQEBDAUAA4ICAQAHpwreU7ua63C/sjaQzeSnuPEM5F1aHXhl/Mm4HiMRV3xp +NW0B/1NQvwcOuscBP1gqlHUDqxwLI9wbih43PR1Yj3PZsypv3xCgWwynyrB/uSSi +ATUy5V5GQevYf3PnQumkUSZ3gQqo6w8KUJ1+iiBn/AuOOhHTxYxgGNlLsfzU8bRJ +Tq6H4dH7dqFf8wbPl5YM6Z51gVxTDSL8NuZJbnTbAIWNfCKgjvsQTNRiE1vvS3Im +i/xOio/+lxBTxXiLQmQbX+CJ/bsJf1DgVIUmEWodZflJKdx8Nt/7PffSrO4yjW6m +fTmcRcTKDfU7tHlTpS9Wx1HFikxkXZBDI45rTBd4zOi/9TvkqEjPrZsM3zJK09kS +jiN4DS2vn6+ePAnClwDtOmkccT8539OPxGb17zaUD/PdkraWX5Cm3XOqpiCUlCVq +CQxy5BMjYEyjyhcue2cA29DN6nofOSZXiTB3y07llUVPX/s2XD35ILU6ECVPkzJa +7sGW6OlWBLBJYU3seKidGMH/2OovVu+VK3sEXmfjVUDtOQT5C3n1aoxcD4makMfN +i97bJjWhbs2zQvKiDzsMjpP/FM/895P35EEIbhlSEQ9TGXN4DM/YhYH4rVXIsJ5G +Y6+cUu5cv/DAWzceCSDSPiPGoRVKDjZ+MMV5arwiiNkMUkAf3U4PZyYW0q0XHA== +-----END CERTIFICATE----- + +# DigiCert Trusted Root G4 +-----BEGIN CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ +-----END CERTIFICATE----- + +# Entrust.net Premium 2048 Secure Server CA +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVE= +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - EC1 +-----BEGIN CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G2 +-----BEGIN CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G4 +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHw== +-----END CERTIFICATE----- + +# GLOBALTRUST 2020 +-----BEGIN CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg== +-----END CERTIFICATE----- + +# GTS Root R1 +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo +27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w +Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw +TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl +qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH +szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 +Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk +MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 +wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p +aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN +VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb +C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe +QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy +h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 +7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J +ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef +MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ +Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT +6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ +0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm +2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb +bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c +-----END CERTIFICATE----- + +# GTS Root R2 +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt +nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY +6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu +MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k +RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg +f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV ++3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo +dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW +Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa +G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq +gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H +vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 +0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC +B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u +NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg +yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev +HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 +xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR +TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg +JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV +7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl +6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbL +-----END CERTIFICATE----- + +# GTS Root R3 +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G +jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 +4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 +VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm +ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4X +-----END CERTIFICATE----- + +# GTS Root R4 +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi +QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR +HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D +9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 +p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R4 +-----BEGIN CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R5 +-----BEGIN CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3 +-----END CERTIFICATE----- + +# GlobalSign Root CA +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== +-----END CERTIFICATE----- + +# GlobalSign Root CA - R3 +-----BEGIN CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9f +-----END CERTIFICATE----- + +# GlobalSign Root CA - R6 +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= +-----END CERTIFICATE----- + +# GlobalSign Secure Mail Root E45 +-----BEGIN CERTIFICATE----- +MIICITCCAaegAwIBAgIQdlP+qicdlUZd1vGe5biQCjAKBggqhkjOPQQDAzBSMQsw +CQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEoMCYGA1UEAxMf +R2xvYmFsU2lnbiBTZWN1cmUgTWFpbCBSb290IEU0NTAeFw0yMDAzMTgwMDAwMDBa +Fw00NTAzMTgwMDAwMDBaMFIxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxT +aWduIG52LXNhMSgwJgYDVQQDEx9HbG9iYWxTaWduIFNlY3VyZSBNYWlsIFJvb3Qg +RTQ1MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE+XmLgUc3iZY/RUlQfxomC5Myfi7A +wKcImsNuj5s+CyLsN1O3b4qwvCc3S22pRjvZH/+loUS7LXO/nkEHXFObUQg6Wrtv +OMcWkXjCShNpHYLfWi8AiJaiLhx0+Z1+ZjeKo0IwQDAOBgNVHQ8BAf8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU3xNei1/CQAL9VreUTLYe1aaxFJYw +CgYIKoZIzj0EAwMDaAAwZQIwE7C+13EgPuSrnM42En1fTB8qtWlFM1/TLVqy5IjH +3go2QjJ5naZruuH5RCp7isMSAjEAoGYcToedh8ntmUwbCu4tYMM3xx3NtXKw2cbv +vPL/P/BS3QjnqmR5w+RpV5EvpMt8 +-----END CERTIFICATE----- + +# GlobalSign Secure Mail Root R45 +-----BEGIN CERTIFICATE----- +MIIFcDCCA1igAwIBAgIQdlP+qExQq5+NMrUdA49X3DANBgkqhkiG9w0BAQwFADBS +MQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEoMCYGA1UE +AxMfR2xvYmFsU2lnbiBTZWN1cmUgTWFpbCBSb290IFI0NTAeFw0yMDAzMTgwMDAw +MDBaFw00NTAzMTgwMDAwMDBaMFIxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMSgwJgYDVQQDEx9HbG9iYWxTaWduIFNlY3VyZSBNYWlsIFJv +b3QgUjQ1MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA3HnMbQb5bbvg +VgRsf+B1zC0FSehL3FTsW3eVcr9/Yp2FqYokUF9T5dt0b6QpWxMqCa2axS/C93Y7 +oUVGqkPmJP4rsG8ycBlGWnkmL/w9fV9ky1fMYWGo2ZVu45Wgbn9HEhjW7wPJ+4r6 +mr2CFalVd0sRT1nga8Nx8wzYVNWBaD4TuRUuh4o8RCc2YiRu+CwFcjBhvUKRI8Sd +JafZVJoUozGtgHkMp2NsmKOsV0czH2WW4dDSNdr5cfehpiW1QV3fPmDY0fafpfK4 +zBOqj/mybuGDLZPdPoUa3eixXCYBy0mF/PzS1H+FYoZ0+cvsNSKiDDCPO6t561by ++kLz7fkfRYlAKa3qknTqUv1WtCvaou11wm6rzlKQS/be8EmPmkjUiBltRebMjLnd +ZGBgAkD4uc+8WOs9hbnGCtOcB2aPxxg5I0bhPB6jL1Bhkgs9K2zxo0c4V5GrDY/G +nU0E0iZSXOWl/SotFioBaeepfeE2t7Eqxdmxjb25i87Mi6E+C0jNUJU0xNgIWdhr +JvS+9dQiFwBXya6bBDAznwv731aiyW5Udtqxl2InWQ8RiiIbZJY/qPG3JEqNPFN8 +bYN2PbImSHP1RBYBLQkqjhaWUNBzBl27IkiCTApGWj+A/1zy8pqsLAjg1urwEjiB +T6YQ7UarzBacC89kppkChURnRq39TecCAwEAAaNCMEAwDgYDVR0PAQH/BAQDAgGG +MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFKCTFShu7o8IsjXGnmJ5dKexDit7 +MA0GCSqGSIb3DQEBDAUAA4ICAQBFCvjRXKxigdAE17b/V1GJCwzL3iRlN/urnu1m +9OoMGWmJuBmxMFa02fb3vsaul8tF9hGMOjBkTMGfWcBGQggGR2QXeOCVBwbWjKKs +qdk/03tWT/zEhyjftisWI8CfH1vj1kReIk8jBIw1FrV5B4ZcL5fi9ghkptzbqIrj +pHt3DdEpkyggtFOjS05f3sH2dSP8Hzx4T3AxeC+iNVRxBKzIxG3D9pGx/s3uRG6B +9kDFPioBv6tMsQM/DRHkD9Ik4yKIm59fRz1RSeAJN34XITF2t2dxSChLJdcQ6J9h +WRbFPjJOHwzOo8wP5McRByIvOAjdW5frQmxZmpruetCd38XbCUMuCqoZPWvoajB6 +V+a/s2o5qY/j8U9laLa9nyiPoRZaCVA6Mi4dL0QRQqYA5jGY/y2hD+akYFbPedey +Ttew+m4MVyPHzh+lsUxtGUmeDn9wj3E/WCifdd1h4Dq3Obbul9Q1UfuLSWDIPGau +l+6NJllXu3jwelAwCbBgqp9O3Mk+HjrcYpMzsDpUdG8sMUXRaxEyamh29j32ahNe +JJjn6h2az3iCB2D3TRDTgZpFjZ6vm9yAx0OylWikww7oCkcVv1Qz3AHn1aYec9h6 +sr8vreNVMJ7fDkG84BH1oQyoIuHjAKNOcHyS4wTRekKKdZBZ45vRTKJkvXN5m2/y +s8H2PA== +-----END CERTIFICATE----- + +# Go Daddy Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8= +-----END CERTIFICATE----- + +# HARICA Client ECC Root CA 2021 +-----BEGIN CERTIFICATE----- +MIICWjCCAeGgAwIBAgIQMWjZ2OFiVx7SGUSI5hB98DAKBggqhkjOPQQDAzBvMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEnMCUGA1UEAwweSEFSSUNBIENsaWVudCBFQ0Mg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTExMDMzNFoXDTQ1MDIxMzExMDMzM1owbzEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJzAlBgNVBAMMHkhBUklDQSBDbGllbnQgRUND +IFJvb3QgQ0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABAcYrZWWlNBcD4L3 +KkD6AsnJPTamowRqwW2VAYhgElRsXKIrbhM6iJUMHCaGNkqJGbcY3jvoqFAfyt9b +v0mAFdvjMOEdWscqigEH/m0sNO8oKJe8wflXhpWLNc+eWtFolaNCMEAwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUUgjSvjKBJf31GpfsTl8au1PNkK0wDgYDVR0P +AQH/BAQDAgGGMAoGCCqGSM49BAMDA2cAMGQCMEwxRUZPqOa+w3eyGhhLLYh7WOar +lGtEA7AX/9+Cc0RRLP2THQZ7FNKJ7EAM7yEBLgIwL8kuWmwsHdmV4J6wuVxSfPb4 +OMou8dQd8qJJopX4wVheT/5zCu8xsKsjWBOMi947 +-----END CERTIFICATE----- + +# HARICA Client RSA Root CA 2021 +-----BEGIN CERTIFICATE----- +MIIFqjCCA5KgAwIBAgIQVVL4HtsbJCyeu5YYzQIoPjANBgkqhkiG9w0BAQsFADBv +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEnMCUGA1UEAwweSEFSSUNBIENsaWVudCBS +U0EgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTg0NloXDTQ1MDIxMzEwNTg0NVow +bzELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBS +ZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExJzAlBgNVBAMMHkhBUklDQSBDbGllbnQg +UlNBIFJvb3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +AIHbV0KQLHQ19Pi4dBlNqwlad0WBc2KwNZ/40LczAIcTtparDlQSMAe8m7dI19EZ +g66O2KnxqQCEsIxenugMj1Rpv/bUCE8mcP4YQWMaszKLQPgHq1cx8MYWdmeatN0v +8tFrxdCShJFxbg8uY+kfU6TdUhPMCYMpgQzFU3VEsQ5nUxjQwx+IS5+UJLQpvLvo +Tv1v0hUdSdyNcPIRGiBRVRG6iG/E91B51qox4oQ9XjLIdypQceULL+m26u+rCjM5 +Dv2PpWdDgo6YaQkJG0DNOGdH6snsl3ES3iT1cjzR90NMJveQsonpRUtVPTEFekHi +lbpDwBfFtoU9GY1kcPNbrM2f0yl1h0uVZ2qm+NHdvJCGiUMpqTdb9V2wJlpTQnaQ +K8+eVmwrVM9cmmXfW4tIYDh8+8ULz3YEYwIzKn31g2fn+sZD/SsP1CYvd6QywSTq +ZJ2/szhxMUTyR7iiZkGh+5t7vMdGanW/WqKM6GpEwbiWtcAyCC17dDVzssrG/q8R +chj258jCz6Uq6nvWWeh8oLJqQAlpDqWW29EAufGIbjbwiLKd8VLyw3y/MIk8Cmn5 +IqRl4ZvgdMaxhZeWLK6Uj1CmORIfvkfygXjTdTaefVogl+JSrpmfxnybZvP+2M/u +vZcGHS2F3D42U5Z7ILroyOGtlmI+EXyzAISep0xxq0o3AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFKDWBz1eJPd7oEQuJFINGaorBJGnMA4GA1Ud +DwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEADUf5CWYxUux57sKo8mg+7ZZF +yzqmmGM/6itNTgPQHILhy9Pl1qtbZyi8nf4MmQqAVafOGyNhDbBX8P7gyr7mkNuD +LL6DjvR5tv7QDUKnWB9p6oH1BaX+RmjrbHjJ4Orn5t4xxdLVLIJjKJ1dqBp+iObn +K/Es1dAFntwtvTdm1ASip62/OsKoO63/jZ0z4LmahKGHH3b0gnTXDvkwSD5biD6q +XGvWLwzojnPCGJGDObZmWtAfYCddTeP2Og1mUJx4e6vzExCuDy+r6GSzGCCdRjVk +JXPqmxBcWDWJsUZIp/Ss1B2eW8yppRoTTyRQqtkbbbFA+53dWHTEwm8UcuzbNZ+4 +VHVFw6bIGig1Oq5l8qmYzq9byTiMMTt/zNyW/eJb1tBZ9Ha6C8tPgxDHQNAdYOkq +5UhYdwxFab4ZcQQk4uMkH0rIwT6Z9ZaYOEgloRWwG9fihBhb9nE1mmh7QMwYXAwk +ndSV9ZmqRuqurL/0FBkk6Izs4/W8BmiKKgwFXwqXdafcfsD913oY3zDROEsfsJhw +v8x8c/BuxDGlpJcdrL/ObCFKvicjZ/MGVoEKkY624QMFMyzaNAhNTlAjrR+lxdR6 +/uoJ7KcoYItGfLXqm91P+edrFcaIz0Pb5SfcBFZub0YV8VYt6FwMc8MjgTggy8kM +ac8sqzuEYDMZUv1pFDM= +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions ECC RootCA 2015 +-----BEGIN CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2015 +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68 +-----END CERTIFICATE----- + +# IdenTrust Commercial Root CA 1 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H +-----END CERTIFICATE----- + +# IdenTrust Public Sector Root CA 1 +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu +VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN +MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 +MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 +ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy +RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS +bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF +/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R +3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw +EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy +9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V +GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ +2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV +WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD +W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN +AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj +t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV +DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 +TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G +lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW +mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df +WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 ++bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ +tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA +GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv +8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+c +-----END CERTIFICATE----- + +# LAWtrust Root CA2 (4096) +-----BEGIN CERTIFICATE----- +MIIFmDCCA4CgAwIBAgIEVRpusTANBgkqhkiG9w0BAQsFADBDMQswCQYDVQQGEwJa +QTERMA8GA1UEChMITEFXdHJ1c3QxITAfBgNVBAMTGExBV3RydXN0IFJvb3QgQ0Ey +ICg0MDk2KTAgFw0yMzAyMTQwOTE5MzhaGA8yMDUzMDIxNDA5NDkzOFowQzELMAkG +A1UEBhMCWkExETAPBgNVBAoTCExBV3RydXN0MSEwHwYDVQQDExhMQVd0cnVzdCBS +b290IENBMiAoNDA5NikwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +F8srQ7ps+cmTimUNEkzsJxS3E3ng1NUtGFbx+eoqEBZObETHamVG85qJNdGH+DOJ +L4gJGpIQkZDBa58Obn8mihNdGKxoAQ0QeGVw2I6PhFqXMBjQEQ5KjVIQpYErUSj1 +Y8S27ECzAeWtd73lOO+8jbPdGaB7DY2022r7JTNa+pGvxHFFMPiIKXvLv9W6JwSO +3bIA98pcmTUU6v11BhUIu8pXaPs/+7Q0c2PR1ePIOFppfWp6RAwNik7tkh0Qjzsi +LLbf7cXG8Il5VGVeXxu9j33fubft6+TFB9FnPJU7kf5CelJAgATSOVdL9JJ9/5vv +5Z3JCbKREjimKQg7ruvKzO1N504hAQf8bzLOaYyEUsZ36icwCt6lrzAraB+s1Owh +rSJJds4PwvIHKvlqEoOaOwSuGXr+oYYk+kFeJXxArCe24yk2bzXiV9AZWN//ZPbD +AUl22yu+vLlPFArVG1gh9hwuAHz4lLXLNxoU5DK5FtRg7AWqXzL6aiMSrNQQu9Ki +grRLDotwJ6rWB8FniPqEwwjJioTI0jdygQ+NFkrk1zVRpTgPjIRLlTbA9ded4F2P +q5HuAAi5nVIf7PiZu3lWsUna0uXYYYtbr/CrN8V7Go6Gvn7FexUeYWjoC4eLc0mh +F3N+KXiOyuBBL3VzdKKXOn/3LnQJuExgi0Y2GRAtnQIDAQABo4GRMIGOMA8GA1Ud +EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMCsGA1UdEAQkMCKADzIwMjMwMjE0 +MDkxOTM4WoEPMjA1MzAyMTQwOTQ5MzhaMB8GA1UdIwQYMBaAFNfWVmJcPxeB5nNE +KfVRBe8LYDesMB0GA1UdDgQWBBTX1lZiXD8XgeZzRCn1UQXvC2A3rDANBgkqhkiG +9w0BAQsFAAOCAgEASZwp/j3snkV/qz48/iNvNz53p1P/eJ/8SUSAV2acbtp5/81F +rUyTv7VZxukQt+X4jPuHxR6L2LM/ApYKu4qO79e0wIMgOJdZRWT89ncT8gnXocg4 +dAjq+UhM+h8EnLT/7G5WNnKTbJU+LF/eDwurycwVPhaPZvyyELih0bTewGMZzO9T +qnU2IoslH7+byNfBX+ymNwmqe2K89iIt8dZY3Yy7UvQLp3apensajdytmoFiLoYF +kHJHL6HJZ4SwDWywuJsWt9CZFC+cEpsjqI2mQx7p5S3leKcfZJRktneyqFz7Casp +6x5tddH20MWlwx2fHvMaLbLIH+UoCm7zX/3a5iOhdpBcS5gBgizuRy0CGl9/NMVp +tXKtPvPPnm34KegRJyvgWQsbYetKymmlpNXNURuUjnnN3/audF2xLBuGU/7RMAZB +NAdigkz0fseHdA6wIR4JIIDBsxU9Rm3T8QaSP++glYocbncxtut4KQx77oKlT36k +KV6eqi34jsDz/A0GhZtO3PfiCXzQFFEeerMjr/rRYSpltQHZuOMHyiR20vBKvu+G +BIBCFXARaH7Xx7v+506bnJWlHEqkydAJjKrOSNIekpfXEentZsw33PXXG3SbpupC +rF0y4Fj0gUf/0hLifhzcSXaWwx2fS8pcKjdbPYrROJsh2uO/RUPT4Fh3Hyg= +-----END CERTIFICATE----- + +# Microsec e-Szigno Root CA 2009 +-----BEGIN CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW +-----END CERTIFICATE----- + +# NetLock Arany (Class Gold) Főtanúsítvány +-----BEGIN CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GA CA +-----BEGIN CERTIFICATE----- +MIID8TCCAtmgAwIBAgIQQT1yx/RrH4FDffHSKFTfmjANBgkqhkiG9w0BAQUFADCB +ijELMAkGA1UEBhMCQ0gxEDAOBgNVBAoTB1dJU2VLZXkxGzAZBgNVBAsTEkNvcHly +aWdodCAoYykgMjAwNTEiMCAGA1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNl +ZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwgUm9vdCBHQSBDQTAeFw0w +NTEyMTExNjAzNDRaFw0zNzEyMTExNjA5NTFaMIGKMQswCQYDVQQGEwJDSDEQMA4G +A1UEChMHV0lTZUtleTEbMBkGA1UECxMSQ29weXJpZ2h0IChjKSAyMDA1MSIwIAYD +VQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBX +SVNlS2V5IEdsb2JhbCBSb290IEdBIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAy0+zAJs9Nt350UlqaxBJH+zYK7LG+DKBKUOVTJoZIyEVRd7jyBxR +VVuuk+g3/ytr6dTqvirdqFEr12bDYVxgAsj1znJ7O7jyTmUIms2kahnBAbtzptf2 +w93NvKSLtZlhuAGio9RN1AU9ka34tAhxZK9w8RxrfvbDd50kc3vkDIzh2TbhmYsF +mQvtRTEJysIA2/dyoJaqlYfQjse2YXMNdmaM3Bu0Y6Kff5MTMPGhJ9vZ/yxViJGg +4E8HsChWjBgbl0SOid3gF27nKu+POQoxhILYQBRJLnpB5Kf+42TMwVlxSywhp1t9 +4B3RLoGbw9ho972WG6xwsRYUC9tguSYBBQIDAQABo1EwTzALBgNVHQ8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUswN+rja8sHnR3JQmthG+IbJphpQw +EAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBAEuh/wuHbrP5wUOx +SPMowB0uyQlB+pQAHKSkq0lPjz0e701vvbyk9vImMMkQyh2I+3QZH4VFvbBsUfk2 +ftv1TDI6QU9bR8/oCy22xBmddMVHxjtqD6wU2zz0c5ypBd8A3HR4+vg1YFkCExh8 +vPtNsCBtQ7tgMHpnM1zFmdH4LTlSc/uMqpclXHLZCB6rTjzjgTGfA6b7wP4piFXa +hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZi +Fj4A4xylNoEYokxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ +/L7fCg0= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GB CA +-----BEGIN CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= +-----END CERTIFICATE----- + +# QuoVadis Root CA 1 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD +-----END CERTIFICATE----- + +# QuoVadis Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEto= +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 +-----END CERTIFICATE----- + +# SSL.com Client ECC Root CA 2022 +-----BEGIN CERTIFICATE----- +MIICQDCCAcagAwIBAgIQdvhIHq7wPHAf4D8lVAGD1TAKBggqhkjOPQQDAzBRMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSgwJgYDVQQDDB9T +U0wuY29tIENsaWVudCBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzAzMloX +DTQ2MDgxOTE2MzAzMVowUTELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw +b3JhdGlvbjEoMCYGA1UEAwwfU1NMLmNvbSBDbGllbnQgRUNDIFJvb3QgQ0EgMjAy +MjB2MBAGByqGSM49AgEGBSuBBAAiA2IABC1Tfp+LPrM2ulDizOvcuiaK04wGP2cP +7/UX5dSumkYqQQEHaedncfHCAzbG8CtSjs8UkmikPnBREmmNeKKCyikUwOSUIrJE +kmBvyASkZ9Wi0PPQ1+qOPA+60kBHkDTufaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAf +BgNVHSMEGDAWgBS3/i1ixYFTzVIaL11goMNd+7IcHDAdBgNVHQ4EFgQUt/4tYsWB +U81SGi9dYKDDXfuyHBwwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUC +ME0HES0R+7kmwyHdcuEX/MHPFOpJznGHjtZT3BHNXVSKr9kt9IxR6rxmR+J/lYNg +ZQIxAIwhTE+75bBQ35BiSebMkdv4P11xkQiOT5LJf6Zc6hN+7W3E6MMqb1wR4aXz +alqaTQ== +-----END CERTIFICATE----- + +# SSL.com Client RSA Root CA 2022 +-----BEGIN CERTIFICATE----- +MIIFjzCCA3egAwIBAgIQdq/uiJMVRbZQU5uAnKTfmjANBgkqhkiG9w0BAQsFADBR +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSgwJgYDVQQD +DB9TU0wuY29tIENsaWVudCBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzEw +N1oXDTQ2MDgxOTE2MzEwNlowUTELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBD +b3Jwb3JhdGlvbjEoMCYGA1UEAwwfU1NMLmNvbSBDbGllbnQgUlNBIFJvb3QgQ0Eg +MjAyMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALhY20Yw+8k/48jw +ATM04tpIqBjpIG6a1wHh1SmPMLQjauTLYrC+4p8gvT5UoDlox4Y3ZnQGBu90K9rc +n4SpUi+Q0u5+fPulIq1vcEZnlj0p1KO7VnsUBFnBIWNEHrIfElyQh2UNiPYeiCLi +Y1S78zb41n/c2v8pNanGbg5pWz/YvoKHFXBdsMdcEg9jpjjNz3O5ww6JJjcbP2Ic +MmnRm9n/VZAx3rFj3c/FdHf874ghU78AMRomLAAwpV9s4+T2AIrKmIecdAN6i2bs +fv2jjzUlXHils6T7PW2pivBsiIKL/UrQb+TXo7SONEk4vs5F5dIcyl7CNxSLzWZW +Mzed5WvsQ5JkoELadW/AFez5ab00uYp7+hb7Vf5SIOgEBFZWZfU3RJjIikbpt6y4 +6L5ijlQ2W/c7cL9d7i26X95CGYbwf4vrCMvYvuoOQkKgNnNXF+0y6tCN6Acbm5no +xJpiBA5I9zwSuvdYwZqM6cewIzZWNB3LbNq6B4Qd/dGsn+bCie/DuWwYs2mHV1+1 +DDhbpyEkKjunNJGetFTqKE/TwaOL5OYr1fKdv5thACLd1ktEHz9dVv7enHjMmVuq +5L2620NLrUwmTKNNNIpsdDYT22L8m7IFgf+uPwzN9hui9DnnyvVMXPtUdzWAWsAS +oRMBM2c9nYGhqfWFJFiIeOf042hVAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8w +HwYDVR0jBBgwFoAU8DhClDSpPAB/Uu45pfdLDbxqfSMwHQYDVR0OBBYEFPA4QpQ0 +qTwAf1LuOaX3Sw28an0jMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOC +AgEAmU/b8OrWEfoq/cirbeQOc2LSQp8V/nxwUj9kh4IxP0VALuEinwZmKfyW0y2N +tjjH2fMnwVkpoIz2cyQPKCLXTmHdE93bnzJSk/tPzOo4PJhqA6sWryHRQq59RSvq +xM+KWZ+CcHY6+GImyRCXWEAkpC25LymAJ+GJa3LKSQhxN1MF8YDO00IC0vzC0ZQG +7gfi9oPif5/nu1bDW7/dlZMJHiTBzybNraSuwrRp56q17TeU6d3RY4VrmnpKVnbc +GYUo1OTGpNi4lkF30LRZ8UYFh4cCH2m5ghjQQ9km2hpnqNZ1durybQ5C/4gmom6E +/n5iG/DGPe3AHGrHkda4ADdJm7mEBaHNbjHWROpTi7pTmB2hkIrphfgb8pNYw8jc +miZPPiDPT0PzEIx/EGF6NsqqC33Mn0dEWa6llcaZU+MHaz1JELAY/10OhUMUS+dr +00q1smBh3GlJAiNd6JJxw5yfRWd5HtwyhrqqVTxkbzK1EEAV3nJAeOBucLtu6wno +OdmsupJ13UPKugGVrRqBKzrw48UvDBhNEMauwO3+BVJ/GQXLqa81CAw4IuT+VuVT +Pr/k1rPZCMM91TMygSTFqeFlEbgyMzBxGEkdGkXGmhSKWDkobvPLUblJJmR4A8eR +EYOpuZA0tm+qBZ6FKFeZvn8nBkliTaH8CeErRglMFJtWj0U= +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority ECC +-----BEGIN CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority RSA +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7k= +-----END CERTIFICATE----- + +# SZAFIR ROOT CA2 +-----BEGIN CERTIFICATE----- +MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL +BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 +ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw +NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L +cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg +Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN +QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT +3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw +3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 +3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 +BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN +XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF +AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw +8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG +nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP +oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy +d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg +LvWpCz/UXeHPhJ/iGcJfitYgHuNztw== +-----END CERTIFICATE----- + +# Sectigo Public Email Protection Root E46 +-----BEGIN CERTIFICATE----- +MIICMTCCAbegAwIBAgIQbvXTp0GOoFlApzBr0kBlVjAKBggqhkjOPQQDAzBaMQsw +CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTEwLwYDVQQDEyhT +ZWN0aWdvIFB1YmxpYyBFbWFpbCBQcm90ZWN0aW9uIFJvb3QgRTQ2MB4XDTIxMDMy +MjAwMDAwMFoXDTQ2MDMyMTIzNTk1OVowWjELMAkGA1UEBhMCR0IxGDAWBgNVBAoT +D1NlY3RpZ28gTGltaXRlZDExMC8GA1UEAxMoU2VjdGlnbyBQdWJsaWMgRW1haWwg +UHJvdGVjdGlvbiBSb290IEU0NjB2MBAGByqGSM49AgEGBSuBBAAiA2IABLinUpT1 +PgWwG/YfsdN+ueQFZlSAzmylaH3kU1LbgvrEht9DePfIrRa8P3gyy2vTSdZE5bN+ +n3umxizy4rbTibCaPEvOiUvGxss6SWAPRrxtTnqcyZuFewq2sEfCiOPU0aNCMEAw +HQYDVR0OBBYEFC1OjKfCI7JXqQZrPmsrifPDXkfOMA4GA1UdDwEB/wQEAwIBhjAP +BgNVHRMBAf8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQCSnRpZY0VYjhsW5H16 +bDZIMB8rcueQMzT9JKLGBoxvOzJXWvj+xkkSU5rZELKZUXICMAUlKjMh/JPmIqLM +cFUoNVaiB8QhhCMaTEyZUJmSFMtK3Fb79dOPaiz1cTr4izsDng== +-----END CERTIFICATE----- + +# Sectigo Public Email Protection Root R46 +-----BEGIN CERTIFICATE----- +MIIFgDCCA2igAwIBAgIQHUSeuQ2DkXSu3fLriLemozANBgkqhkiG9w0BAQwFADBa +MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTEwLwYDVQQD +EyhTZWN0aWdvIFB1YmxpYyBFbWFpbCBQcm90ZWN0aW9uIFJvb3QgUjQ2MB4XDTIx +MDMyMjAwMDAwMFoXDTQ2MDMyMTIzNTk1OVowWjELMAkGA1UEBhMCR0IxGDAWBgNV +BAoTD1NlY3RpZ28gTGltaXRlZDExMC8GA1UEAxMoU2VjdGlnbyBQdWJsaWMgRW1h +aWwgUHJvdGVjdGlvbiBSb290IFI0NjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC +AgoCggIBAJHlG/qqbTcrdccuXxSl2yyXtixGj2nZ7JYt8x1avtMdI+ZoCf9KEXMa +rmefdprS5+y42V8r+SZWUa92nan8F+8yCtAjPLosT0eD7J0FaEJeBuDV6CtoSJey ++vOkcTV9NJsXi39NDdvcTwVMlGK/NfovyKccZtlxX+XmWlXKq/S4dxlFUEVOSqvb +nmbBGbc3QshWpUAS+TPoOEU6xoSjAo4vJLDDQYUHSZzP3NHyJm/tMxwzZypFN9mF +ZSIasbUQUglrA8YfcD2RxH2QPe1m+JD/JeDtkqKLMSmtnBJmeGOdV+z7C96O3IvL +Oql39Lrl7DiMi+YTZqdpWMOCGhrN8Z/YU5JOSX2pRefxQyFatz5AzWOJz9m/x1AL +4bzniJatntQX2l3P4JH9phDUuQOBm2ms+4SogTXrG+tobHxgPsPfybSudB1Ird1u +EYbhKmo2Fq7IzrzbWPxAk0DYjlOXwqwiOOWIMbMuoe/s4EIN6v+TVkoGpJtMAmhk +j1ZQwYEF/cvbxdcV8mu1dsOj+TLOyrVKqRt9Gdx/x2p+ley2uI39lUqcoytti/Fw +5UcrAFzkuZ7U+NlYKdDL4ChibK6cYuLMvDaTQfXv/kZilbBXSnQsR1Ipnd2ioU9C +wpLOLVBSXowKoffYncX4/TaHTlf9aKFfmYMc8LXd6JLTZUBVypaFAgMBAAGjQjBA +MB0GA1UdDgQWBBSn15V360rDJ82TvjdMJoQhFH1dmDAOBgNVHQ8BAf8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQwFAAOCAgEANNLxFfOTAdRyi/Cr +CB8TPHO0sKvoeNlsupqvJuwQgOUNUzHd4/qMUSIkMze4GH46+ljoNOWM4KEfCUHS +Nz/Mywk1Qojp/BHXz0KqpHC2ccFTvcV0r8QiJGPPYoJ9yctRwYiQbVtcvvuZqLq2 +hrDpZgvlG2uv6iuGp9+oI0yWP09XQhgVg0Pxhia3KgPOC53opWgejG+9heMbUY/n +Fy8r0NZ4wi3dcojUZZ76mdR+55cKkgGapamEOgwqdD0zGMiH9+ik9YZCOf1rdSn8 +AAasoqUaVI7pUEkXZq9LBC2blIClVKuMVxdEnw/WaGRytEseAcfZm5TZg5mvEgUR +o5gi0vJXyiT5ujgVEki6Yzv8i5V41nIHVszN/J0c0MVkO2M0zwSZircweXq28sbV +2VR6hwt+TveE7BTziBYS8dWuChoJ7oat5av9rsMpeXTDAV8Rm991mcZK95uPbEns +IS+0AlmzLdBykLoLFHR4S8/BX1VyjlQrE876WAzTuyzZqZFh+PjxtnvevKnMkgTM +S2tfc4C2Ie1QT9d2h27O39K3vWKhfVhiaEVStj/eEtvtBGmedoiqAW3ahsdgG8NS +rDfsUHGAciohRQpTRzwZ643SWQTeJbDrHzVvYH3Xtca7CyeN4E1U5c8dJgFuOzXI +IBKJg/DS7Vg7NJ27MfUy/THzVho= +-----END CERTIFICATE----- + +# Secure Global CA +-----BEGIN CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +-----END CERTIFICATE----- + +# Security Communication ECC RootCA1 +-----BEGIN CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= +-----END CERTIFICATE----- + +# Security Communication RootCA2 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 +-----END CERTIFICATE----- + +# Security Communication RootCA3 +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZg== +-----END CERTIFICATE----- + +# Staat der Nederlanden Root CA - G3 +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIEAJiiOTANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJO +TDEeMBwGA1UECgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQSAtIEczMB4XDTEzMTExNDExMjg0MloX +DTI4MTExMzIzMDAwMFowWjELMAkGA1UEBhMCTkwxHjAcBgNVBAoMFVN0YWF0IGRl +ciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5lZGVybGFuZGVuIFJv +b3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL4yolQP +cPssXFnrbMSkUeiFKrPMSjTysF/zDsccPVMeiAho2G89rcKezIJnByeHaHE6n3WW +IkYFsO2tx1ueKt6c/DrGlaf1F2cY5y9JCAxcz+bMNO14+1Cx3Gsy8KL+tjzk7FqX +xz8ecAgwoNzFs21v0IJyEavSgWhZghe3eJJg+szeP4TrjTgzkApyI/o1zCZxMdFy +KJLZWyNtZrVtB0LrpjPOktvA9mxjeM3KTj215VKb8b475lRgsGYeCasH/lSJEULR +9yS6YHgamPfJEf0WwTUaVHXvQ9Plrk7O53vDxk5hUUurmkVLoR9BvUhTFXFkC4az +5S6+zqQbwSmEorXLCCN2QyIkHxcE1G6cxvx/K2Ya7Irl1s9N9WMJtxU51nus6+N8 +6U78dULI7ViVDAZCopz35HCz33JvWjdAidiFpNfxC95DGdRKWCyMijmev4SH8RY7 +Ngzp07TKbBlBUgmhHbBqv4LvcFEhMtwFdozL92TkA1CvjJFnq8Xy7ljY3r735zHP +bMk7ccHViLVlvMDoFxcHErVc0qsgk7TmgoNwNsXNo42ti+yjwUOH5kPiNL6VizXt +BznaqB16nzaeErAMZRKQFWDZJkBE41ZgpRDUajz9QdwOWke275dhdU/Z/seyHdTt +XUmzqWrLZoQT1Vyg3N9udwbRcXXIV2+vD3dbAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRUrfrHkleuyjWcLhL75Lpd +INyUVzANBgkqhkiG9w0BAQsFAAOCAgEAMJmdBTLIXg47mAE6iqTnB/d6+Oea31BD +U5cqPco8R5gu4RV78ZLzYdqQJRZlwJ9UXQ4DO1t3ApyEtg2YXzTdO2PCwyiBwpwp +LiniyMMB8jPqKqrMCQj3ZWfGzd/TtiunvczRDnBfuCPRy5FOCvTIeuXZYzbB1N/8 +Ipf3YF3qKS9Ysr1YvY2WTxB1v0h7PVGHoTx0IsL8B3+A3MSs/mrBcDCw6Y5p4ixp +gZQJut3+TcCDjJRYwEYgr5wfAvg1VUkvRtTA8KCWAg8zxXHzniN9lLf9OtMJgwYh +/WA9rjLA0u6NpvDntIJ8CsxwyXmA+P5M9zWEGYox+wrZ13+b8KKaa8MFSu1BYBQw +0aoRQm7TIwIEC8Zl3d1Sd9qBa7Ko+gE4uZbqKmxnl4mUnrzhVNXkanjvSr0rmj1A +fsbAddJu+2gw7OyLnflJNZoaLNmzlTnVHpL3prllL+U9bTpITAjc5CgSKL59NVzq +4BZ+Extq1z7XnvwtdbLBFNUjA9tbbws+eC8N3jONFrdI54OagQ97wUNNVQQXOEpR +1VmiiXTTn74eS9fGbbeIJG9gkaSChVtWQbzQRKtqE77RLFi3EjNYsjdj3BP1lB0/ +QFH1T/U67cjF68IeHRaVesd+QnGTbksVtzDfqu1XhUisHWrdOWnk4Xl4vs4Fv6EM +94B7IWcnMFk= +-----END CERTIFICATE----- + +# Starfield Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q= +-----END CERTIFICATE----- + +# SwissSign Gold CA - G2 +-----BEGIN CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ +-----END CERTIFICATE----- + +# SwissSign Silver CA - G2 +-----BEGIN CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u +-----END CERTIFICATE----- + +# T-TeleSec GlobalRoot Class 2 +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6Fuwg== +-----END CERTIFICATE----- + +# TWCA Global Root CA +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0= +-----END CERTIFICATE----- + +# TWCA Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== +-----END CERTIFICATE----- + +# Telekom Security SMIME ECC Root 2021 +-----BEGIN CERTIFICATE----- +MIICRzCCAc2gAwIBAgIQFSrdFMkY0aRWQIamJa8HXzAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH +bWJIMS0wKwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIEVDQyBSb290IDIw +MjEwHhcNMjEwMzE4MTEwODMwWhcNNDYwMzE3MjM1OTU5WjBlMQswCQYDVQQGEwJE +RTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMS0wKwYD +VQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIEVDQyBSb290IDIwMjEwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAASwGY+ia7XHzQ8wmTcMw2Bb8fEnIFU9wJKLq1ehb3OD +IcJDEwxeiarHBTV5k2KQ1l0TH9F6oLyeEKdmfEYKsFdsv+ZUOTghbBJccczTWl9t +t6eG37Pf7sLniUGWNfYvSrWjQjBAMB0GA1UdDgQWBBQrywEMY8NTEqWoV6/QnIP7 +vZA6SzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQD +AwNoADBlAjEA1rxIkodHA8dwOyW2H65GZ3N0ACdL5KUEogPfXiitbl4DyN1onLa/ +lBBIlS8P/xiLAjABQDOel5dNBfJ0VAzNOf1qawnBJD9hjjiht+jXRBURYv8OYTdH +S0B/Sl+yZ1pzdcI= +-----END CERTIFICATE----- + +# Telekom Security SMIME RSA Root 2023 +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgIQDH5i9XlzO51Djotj7ZGVuDANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 +eSBHbWJIMS0wKwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIFJTQSBSb290 +IDIwMjMwHhcNMjMwMzI4MTIwOTIyWhcNNDgwMzI3MjM1OTU5WjBlMQswCQYDVQQG +EwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBHbWJIMS0w +KwYDVQQDDCRUZWxla29tIFNlY3VyaXR5IFNNSU1FIFJTQSBSb290IDIwMjMwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDvxQ6LvjLSZ0f/Ckxnsyq/yMPF +keu1xx6R4WaoiItVIIAfUV53l54ZClzHazchfAM2AfSIJdmoLkGq/Ngm4JZAYnmu +V54DOBocsncUPumhctDk4DfRF0btUFx6WMX4K/d1L8+BnlostzqsoFmYBFEM/0nF +UP0e00eFSzNPoje1rwSaJzKdVtU/VWHji2+uUf6X/mkH+mJbJuYUeRWlEziuXze+ +lErWDYAWaaSRsjpJmHWdRhCKXHp/hKXorx7Hq7NaRrWjS/WmIzYARrHbBbYbzp56 +Mlya1XLDnYZNK4TTHrWI2hB4nCLDOyO16xMHvW9T7Jvsm9Nl9QcJ412nmbV+ho7V +Av+3hQnjRxTdlmYYNN4I1d/LGJliCyvsAF1SRNPGlvwyViWRz80ZO5U5PgKHmWO2 +1T40eg8RdYG8fQTKYLQoddcCUd1SAC7H/YnxXPPLpCcSOI+7+4nw5MQ4LL6CoHFh +YpGPSAwvK6mw8csQBOd0vzeQ708qQzWXEsYqcA3eLFVHeWMp9cofagZSHK4tJCKD +Iq/QqjC3Kh//ZSNYZZPIjn1AEDGGeNlVyzww8N5RKgA20idFX9jooSE9fkZWOylF +8R0FCc62QzDcRZAQMEyka4aLPz0vMZFx7ya59r6dsGzfEe5YP0N5hjmA8SYXB5jw +maowLENZFM7t4kAThQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FJrOrCrsAfplcN6XnfHSAIylo2S7MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgw +FoAUms6sKuwB+mVw3ped8dIAjKWjZLswDQYJKoZIhvcNAQEMBQADggIBAONQ/fVA +FiIJljoNqe+B5y4y8KHxSV57iA0Ecte+Z6i6He5Qu3JuetG7DHIwRsjV1wISFplO +Ht9alu6Pkb6uhvgQd6XEbkdhwPIm2U9haAVIdQgVpaF71biziXnm7fHzYQCGey4x +/qNc+Hk9tFuIe+Ajuw2hF/rLaA2Yd3EI4m1DdGvENsWUQaQA1lctmYqLIBIVAjIO +0knsgUjFaidS17JzVVOWPJ5PTLWg0E9X0GcoSGS+xri67GTPyHvFaucq5llXttbU +1sBnXNmeKAlAv/OpNTFlYAPLGWyClQMeXz/hvepJceVbtwtHFhsgiW2UmQx+iGwd +DfS3IRpZl6zL6L4XH5V8U5uvUFKqjQsur1rXYPIqaSq57lRwGKq99aE/0t2hYxkA ++KcM66N58nBZo/iiEgPsE//kAoY218HDpLXUpMI3RbaUcD3FveujFR3jNnoVaSpW +NDnPpZo2qsjtebzP9s4EUwvaslAjfLw+Jq3wDkO7JsuuwkDeNx8KoFHNY522T9jG +R3y82LTtnovzEeKotT7srnA+fiK7NUgXYGIUkTCjdj2mUTaLHw3dajEcpe3dlqNu +cg8TTaqnqVx4+QMSGJM3RRKJPfi+yr3ZvgzZGGSnyEE+dYIhOH1l9KDUE0sHeCn5 +nX7Mhz/E2i6I3eML3FpRWunZEk+eAtv3BSVR +-----END CERTIFICATE----- + +# TeliaSonera Root CA v1 +-----BEGIN CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= +-----END CERTIFICATE----- + +# Telia Root CA v2 +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx +CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE +AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 +NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ +MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq +AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 +vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 +lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD +n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT +7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o +6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC +TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 +WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R +DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI +pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj +YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy +rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw +AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ +8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi +0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM +A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS +SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K +TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF +6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er +3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt +Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT +VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW +ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA +rBPuUBQemMc= +-----END CERTIFICATE----- + +# TrustAsia Global Root CA G3 +-----BEGIN CERTIFICATE----- +MIIFpTCCA42gAwIBAgIUZPYOZXdhaqs7tOqFhLuxibhxkw8wDQYJKoZIhvcNAQEM +BQAwWjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dp +ZXMsIEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHMzAe +Fw0yMTA1MjAwMjEwMTlaFw00NjA1MTkwMjEwMTlaMFoxCzAJBgNVBAYTAkNOMSUw +IwYDVQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtU +cnVzdEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQDAMYJhkuSUGwoqZdC+BqmHO1ES6nBBruL7dOoKjbmzTNyPtxNS +T1QY4SxzlZHFZjtqz6xjbYdT8PfxObegQ2OwxANdV6nnRM7EoYNl9lA+sX4WuDqK +AtCWHwDNBSHvBm3dIZwZQ0WhxeiAysKtQGIXBsaqvPPW5vxQfmZCHzyLpnl5hkA1 +nyDvP+uLRx+PjsXUjrYsyUQE49RDdT/VP68czH5GX6zfZBCK70bwkPAPLfSIC7Ep +qq+FqklYqL9joDiR5rPmd2jE+SoZhLsO4fWvieylL1AgdB4SQXMeJNnKziyhWTXA +yB1GJ2Faj/lN03J5Zh6fFZAhLf3ti1ZwA0pJPn9pMRJpxx5cynoTi+jm9WAPzJMs +hH/x/Gr8m0ed262IPfN2dTPXS6TIi/n1Q1hPy8gDVI+lhXgEGvNz8teHHUGf59gX +zhqcD0r83ERoVGjiQTz+LISGNzzNPy+i2+f3VANfWdP3kXjHi3dqFuVJhZBFcnAv +kV34PmVACxmZySYgWmjBNb9Pp1Hx2BErW+Canig7CjoKH8GB5S7wprlppYiU5msT +f9FkPz2ccEblooV7WIQn3MSAPmeamseaMQ4w7OYXQJXZRe0Blqq/DPNL0WP3E1jA +uPP6Z92bfW1K/zJMtSU7/xxnD4UiWQWRkUF3gdCFTIcQcf+eQxuulXUtgQIDAQAB +o2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFEDk5PIj7zjKsK5Xf/Ih +MBY027ySMB0GA1UdDgQWBBRA5OTyI+84yrCuV3/yITAWNNu8kjAOBgNVHQ8BAf8E +BAMCAQYwDQYJKoZIhvcNAQEMBQADggIBACY7UeFNOPMyGLS0XuFlXsSUT9SnYaP4 +wM8zAQLpw6o1D/GUE3d3NZ4tVlFEbuHGLige/9rsR82XRBf34EzC4Xx8MnpmyFq2 +XFNFV1pF1AWZLy4jVe5jaN/TG3inEpQGAHUNcoTpLrxaatXeL1nHo+zSh2bbt1S1 +JKv0Q3jbSwTEb93mPmY+KfJLaHEih6D4sTNjduMNhXJEIlU/HHzp/LgV6FL6qj6j +ITk1dImmasI5+njPtqzn59ZW/yOSLlALqbUHM/Q4X6RJpstlcHboCoWASzY9M/eV +VHUl2qzEc4Jl6VL1XP04lQJqaTDFHApXB64ipCz5xUG3uOyfT0gA+QEEVcys+TIx +xHWVBqB/0Y0n3bOppHKH/lmLmnp0Ft0WpWIp6zqW3IunaFnT63eROfjXy9mPX1on +AX1daBli2MjN9LdyR75bl87yraKZk62Uy5P2EgmVtqvXO9A/EcswFi55gORngS1d +7XB4tmBZrOFdRWOPyN9yaFvqHbgB8X7754qz41SgOAngPN5C8sLtLpvzHzW2Ntjj +gKGLzZlkD8Kqq7HK9W+eQ42EVJmzbsASZthwEPEGNTNDqJwuuhQxzhB/HIbjj9LV ++Hfsm6vxL2PZQl/gZ4FkkfGXL/xuJvYz+NO1+MRiqzFRJQJ6+N1rZdVtTTDIZbpo +FGWsJwt0ivKH +-----END CERTIFICATE----- + +# TrustAsia Global Root CA G4 +-----BEGIN CERTIFICATE----- +MIICVTCCAdygAwIBAgIUTyNkuI6XY57GU4HBdk7LKnQV1tcwCgYIKoZIzj0EAwMw +WjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs +IEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHNDAeFw0y +MTA1MjAwMjEwMjJaFw00NjA1MTkwMjEwMjJaMFoxCzAJBgNVBAYTAkNOMSUwIwYD +VQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtUcnVz +dEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATx +s8045CVD5d4ZCbuBeaIVXxVjAd7Cq92zphtnS4CDr5nLrBfbK5bKfFJV4hrhPVbw +LxYI+hW8m7tH5j/uqOFMjPXTNvk4XatwmkcN4oFBButJ+bAp3TPsUKV/eSm4IJij +YzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUpbtKl86zK3+kMd6Xg1mD +pm9xy94wHQYDVR0OBBYEFKW7SpfOsyt/pDHel4NZg6ZvccveMA4GA1UdDwEB/wQE +AwIBBjAKBggqhkjOPQQDAwNnADBkAjBe8usGzEkxn0AAbbd+NvBNEU/zy4k6LHiR +UKNbwMp1JvK/kF0LgoxgKJ/GcJpo5PECMFxYDlZ2z1jD1xCMuo6u47xkdUfFVZDj +/bpV6wfEU6s3qe4hsiFbYI89MvHVI5TWWA== +-----END CERTIFICATE----- + +# Trustwave Global Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHk= +-----END CERTIFICATE----- + +# Trustwave Global ECC P256 Certification Authority +-----BEGIN CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 +-----END CERTIFICATE----- + +# Trustwave Global ECC P384 Certification Authority +-----BEGIN CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +Sw== +-----END CERTIFICATE----- + +# UCA Global G2 Root +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0A== +-----END CERTIFICATE----- + +# USERTrust ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= +-----END CERTIFICATE----- + +# USERTrust RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9 +-----END CERTIFICATE----- + +# XRamp Global CA Root +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbw= +-----END CERTIFICATE----- + +# certSIGN ROOT CA +-----BEGIN CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KD +-----END CERTIFICATE----- + +# e-Szigno Root CA 2017 +-----BEGIN CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMQ== +-----END CERTIFICATE----- + +# ePKI Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZw= +-----END CERTIFICATE----- + +# emSign ECC Root CA - C3 +-----BEGIN CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== +-----END CERTIFICATE----- + +# emSign ECC Root CA - G3 +-----BEGIN CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyj +-----END CERTIFICATE----- + +# emSign Root CA - C1 +-----BEGIN CERTIFICATE----- +MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG +A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg +SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v +dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ +BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ +HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH +3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH +GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c +xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 +aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq +TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 +/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 +kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG +YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT ++xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo +WXzhriKi4gp6D/piq1JM4fHfyr6DDUI= +-----END CERTIFICATE----- + +# emSign Root CA - G1 +-----BEGIN CERTIFICATE----- +MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD +VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU +ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH +MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO +MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv +Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz +f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO +8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq +d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM +tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt +Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB +o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x +PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM +wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d +GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH +6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby +RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx +iN66zB+Afko= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem b/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem new file mode 100644 index 0000000..01f32de --- /dev/null +++ b/pki/ca-trust/extracted/pem/objsign-ca-bundle.pem @@ -0,0 +1,8647 @@ +# A-Trust-Qual-02 +-----BEGIN CERTIFICATE----- +MIIDyzCCArOgAwIBAgIDFE3kMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1 +YWwtMDIxGDAWBgNVBAMMD0EtVHJ1c3QtUXVhbC0wMjAeFw0xNDA3MDExMTIzMzNa +Fw0yNDA3MDEwOTIzMzNaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1YWwtMDIxGDAWBgNVBAMMD0Et +VHJ1c3QtUXVhbC0wMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJaR +q9eOsFm4Ab20Hq2Z/aH86gyWa48uSUjY6eQkguHYuszr3gdcSMYZggFHQgnhfLmf +ro/27l5rqKhWiDhWs+b+yZ1PNDhRPJy+86ycHMg9XJqErveULBSyZDdgjhSwOyrN +ibUir/fkf+4sKzP5jjytTKJXD/uCxY4fAd9TjMEVpN3umpIS0ijpYhclYDHvzzGU +833z5Dwhq5D8bc9jp8YSAHFJ1xzIoO1jmn3jjyjdYPnY5harJtHQL73nDQnfbtTs +5ThT9GQLulrMgLU4WeyAWWWEMWpfVZFMJOUkmoOEer6A8e5fIAeqdxdsC+JVqpZ4 +CAKel/Arrlj1gFA//jsCAwEAAaM2MDQwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4E +CgQIQj0rJKbBRc4wDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBh +MfOINQm4XpzF6DmkOmb/ArSXHf5LObqFmIMooNr2TkyzrUTK/NE+mdrm15Rfdts7 +kZVq/ICfQSFeaPvWaAVq4plH/26OjvMTVv7DfgfPBUxDWqlCuDnDnPAVQ+yo/o5i +BA5uUlMbp5znbDtlxwF/5gWqcn/hKxSUCP1uiOPIlKfeVvsRmBcJAdoixTM/Ic10 +pavJMGOI20onArvQZAUEbXQLA8cs8naxfF6Bo36U9nk6wn7q8VPXhViekByd17F6 +9A+ah0Iqw4SPf9BqNRIe1YxxjDhCmjWt3aoyE3ZFBuGjW+r2ipb/vGU1+2oyy2Fd +2dMmiMQ7gGhWX9X6gWLd +-----END CERTIFICATE----- + +# A-Trust-Qual-03 +-----BEGIN CERTIFICATE----- +MIIDyzCCArOgAwIBAgIDA+aUMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1 +YWwtMDMxGDAWBgNVBAMMD0EtVHJ1c3QtUXVhbC0wMzAeFw0wODA0MjQyMjAwMDBa +Fw0xODA0MjQyMjAwMDBaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVF1YWwtMDMxGDAWBgNVBAMMD0Et +VHJ1c3QtUXVhbC0wMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALOe +JIgc0s9AA0hqqqWgK72W9XwKn5+rUJDbQc5WgHkqwP2TU3qcW/NZYSSIY6PVGO6b +hHSEnOyMPdrBhnpvNi4m6349yT6t565LdHcoKyQg/youwpVkEPZ+e8O32hF9nqvt +L4wZohydjMwzcHUJB/5e+0CkJYwv/bVRZzqoK0yf1midYJukxWOw7nDNKD9KdOpZ ++XXFAAZuH7BjwSqqE138y9JlGzkxIlrCeSJdGfFLwr7OHIgBdPEmQXcyOcaMUGjP +U4VDig+gj+6OC5KjAEC+wKJZXiyhRLj+HyLTDLrQ6O8p5HI3Sov4FuwiMgcqIyzz +o9fNyqmnT3K/vBGOqBsCAwEAAaM2MDQwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4E +CgQIRgbfN/LCNxAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBBQUAA4IBAQBx +CNQmRL6A4mtCtSpQ/V3ojGDznLaSgXI4sm+pPoHywzQkU6FRUsilidO83NsSudup +sFjvwAhmMmLj4fOjWKN3bu7kobtXEWh3Mwj0zVm46l0bCcaszI0Lus3f1pq+q3YA +rX0WS2Rc35g+a21eLHw5FVlCNyA8n8Pcf/VTNrfix6QijHq+cb1Ns2jIuKmJ/3Ew +i8+RbfKFLqVKIn5y3tSuse0M7/xFfS3cJK3teQflrU+y6VJ0SbiMUvq9EuQZw/xR +jRbja2huOZrfKTmlu7GhF8EX43Vq/H2xcjzfwerloxzUnVkbGnQfaSqDVCQY0+7l +4INXvhvi0B+tbDW+jbpf +-----END CERTIFICATE----- + +# A-Trust-Root-05 +-----BEGIN CERTIFICATE----- +MIIFyTCCA7GgAwIBAgIDD820MA0GCSqGSIb3DQEBCwUAMIGLMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVJv +b3QtMDUxGDAWBgNVBAMMD0EtVHJ1c3QtUm9vdC0wNTAeFw0xMzA5MjMxMzI0MTFa +Fw0yMzA5MjAxMTI0MTFaMIGLMQswCQYDVQQGEwJBVDFIMEYGA1UECgw/QS1UcnVz +dCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBpbSBlbGVrdHIuIERhdGVudmVy +a2VociBHbWJIMRgwFgYDVQQLDA9BLVRydXN0LVJvb3QtMDUxGDAWBgNVBAMMD0Et +VHJ1c3QtUm9vdC0wNTCCAiAwDQYJKoZIhvcNAQEBBQADggINADCCAggCggIBAOT7 +jFImpWeBhGjdgsnNqHIBWSI/JOkSpJKXxVDO8kU/a0QFGLp7ca/mjbtt9uTz5dy8 +5HgTI7IKRJ23vTdA1iVEUInOaNLDYqdEoSNFr18GcXZG4Wn/4iHgP88yleqIJqcg +rMJxXTDJDOxELc7FZXzXB3419g0YFk17q/OqD33e6IyULpPQt25IOMQCIhrfIKWC +Y79T1UQVBjukO3rctu6Qi0ACtJ/A9nEzWaYi07BoIz/9hMiWsPlwSy80hv0lVZnR +zXcnOMRtXBnq634ThgGgEEAmRx++FL5fpbg/YKFu4SGOEyV4Lqd6zVivflusP84P +s/JXfNV7bcnT/K2VrRu/h5hPJ+YLqWg75Cws9RRH16ldgvbim7cg4eUaayx4CI1s +dYzqN5aJnVnpdDIvGDAYOgQlSwbtxmdnJoBqX4F3MB6e0XSPX4zAVGrspBhhmXod ++Z356Pnx73K+zi8ZknzjKK/RuLhv0GC+eFikLjc6sieJEVGiXom8HcxXZUtJTBMQ +Aq5Xvkwh8SKqHqCS1FQsuJt8M2gnECodS/8GCgKTgIcZr7+ogxIQjn0QpSuQ6A7g +FIZF9tflVnOWH4+ePCqjGl4skGaFbwF2vbPwKcgniqmpI7DV8vDK1b22MnDMLxxZ +v+rDBqRg36uJbkcU74WQa2gjlk4G07EnowPDudm9AgEDozYwNDAPBgNVHRMBAf8E +BTADAQH/MBEGA1UdDgQKBAhA+blnvgPSCDAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI +hvcNAQELBQADggIBAOIqZcZrWivIqDTLlxEdJh+jss64PCshn5j0Fx8NtnuuyxBt +g/JjwYiu6cBSQq43nwuZV1LoRX6YlOkpR5/xB8FCCPNzPKprNbNsFSuRMRvkfpLn +w8WmITjfG77Rn5YNULb1e5SjLaqvt43SOy18ghDUakrJYaOmj6eyoNlUw5d/0YnM +Y/jZ3zhYlboBUMwK84tJPH8/PajzaMzHmNPZNTD3DoJe+BBhrrxO8Cs0eqKa9tuN +r+sDTCfD3q5s3VUUrz8d64+atnhJ7rz5HndgAiTc3t7ppfuRphx6skng978dB66G +y7vZANfLARjv6MOPDAcwcFjB8mPqjP22rePoBzw9WwWHdMs15e8Jt7ughGm8QXFj +2zKcQeFfftp2bZOjroX65YzJUqwny2CzNixJqQTeuCcrCTHEkpPpjNGkS/2+VlGw +2LfOnUXDG0gv0bMw935cqVsxP+UFm+F2qdf1KYZzVxy9L9vXGRb0JTTxgxa0MlgL +sVlO44vQoyuLG0DC9+NSqE5K7nXp7WOZGwb7MI38HleZ7M4UKOOgjS3r7wceDAKO +jEjMiNqmrXmUtKzpDDC2/wY7FHGVhfuwesuLSFly21AA8reNeSvNBJWSdUkCllSi +HVSFu2CvfX2qs735cDxZesGB/KxQABgS5LXcXdilWF4dXydpjszb76pXGquE +-----END CERTIFICATE----- + +# A-Trust-nQual-03 +-----BEGIN CERTIFICATE----- +MIIDzzCCAregAwIBAgIDFLT5MA0GCSqGSIb3DQEBBQUAMIGNMQswCQYDVQQGEwJB +VDFIMEYGA1UECgw/QS1UcnVzdCBHZXMuIGYuIFNpY2hlcmhlaXRzc3lzdGVtZSBp +bSBlbGVrdHIuIERhdGVudmVya2VociBHbWJIMRkwFwYDVQQLDBBBLVRydXN0LW5R +dWFsLTAzMRkwFwYDVQQDDBBBLVRydXN0LW5RdWFsLTAzMB4XDTE0MDcyMzEwMzgy +OVoXDTI1MDcyMzA4MzgyOVowgY0xCzAJBgNVBAYTAkFUMUgwRgYDVQQKDD9BLVRy +dXN0IEdlcy4gZi4gU2ljaGVyaGVpdHNzeXN0ZW1lIGltIGVsZWt0ci4gRGF0ZW52 +ZXJrZWhyIEdtYkgxGTAXBgNVBAsMEEEtVHJ1c3QtblF1YWwtMDMxGTAXBgNVBAMM +EEEtVHJ1c3QtblF1YWwtMDMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCtPWFuA/OQO8BBC4SAzewqo51ru27CQoT3URThoKgtUaNR8t4j8DRE/5TrzAUj +lUC5B3ilJfYKvUWG6Nm9wASOhURh73+nyfrBJcyFLGM/BWBzSQXgYHiVEEvc+RFZ +znF/QJuKqiTfC0Li21a8StKlDJu3Qz7dg9MmEALP6iPESU7l0+m0iKsMrmKS1GWH +2WrX9IWf5DMiJaXlyDO6w8dB3F/GaswADm0yqLaHNgBid5seHzTLkDx4iHQF63n1 +k3Flyp3HaxgtPVxO59X4PzF9j4fsCiIvI+n+u33J4PTs63zEsMMtYrWacdaxaujs +2e3Vcuy+VwHOBVWf3tFgiBCzAgMBAAGjNjA0MA8GA1UdEwEB/wQFMAMBAf8wEQYD +VR0OBAoECERqlWdVeRFPMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOC +AQEAEoykPeAA/6iKm6YnfxsSHFe+Dtian2yAH8L2TqMdcHeSB/7L1x73uuDeYku1 +hbKQAXnfXntf8R+VgjQBTww0aDb5164netYcFbK0g8uVWVCqOl8wf3JbAUxHS9br +cFKks+CJKPr6qQ6H+sb1o9127c9IQSZYP3S/gMAaGw0cSTlsnosE0P5Ur5vHsapm +FV3V+VOjYNs2GLSu4XQCYvSIpsfDJp8VsJ/BMYS9GqGvQ/9qGa0fwEbEMadb5mcJ +tw/EKg4gJthMgxOfO5eVuCQ3PAEWOe5lrOrTdvTIlhphUuns5hoIdlyLuNqewK3s +FJ6N46sU7LjJLqSKYEB8usoIiw== +-----END CERTIFICATE----- + +# AC1 RAIZ MTIN +-----BEGIN CERTIFICATE----- +MIIJSTCCBzGgAwIBAgIGBQtBXoJ7MA0GCSqGSIb3DQEBBQUAMIHiMRYwFAYDVQQD +Ew1BQzEgUkFJWiBNVElOMRIwEAYDVQQFEwlTMjgxOTAwMUUxNTAzBgNVBAsTLFBS +RVNUQURPUiBERSBTRVJWSUNJT1MgREUgQ0VSVElGSUNBQ0lPTiBNVElOMTEwLwYD +VQQLEyhTVUJESVJFQ0NJT04gR0VORVJBTCBERSBQUk9DRVNPIERFIERBVE9TMSww +KgYDVQQKEyNNSU5JU1RFUklPIERFIFRSQUJBSk8gRSBJTk1JR1JBQ0lPTjEPMA0G +A1UEBxMGTUFEUklEMQswCQYDVQQGEwJFUzAeFw0wOTExMDUxNjE3NDVaFw0xOTEx +MDMxNjE3NDVaMIHiMRYwFAYDVQQDEw1BQzEgUkFJWiBNVElOMRIwEAYDVQQFEwlT +MjgxOTAwMUUxNTAzBgNVBAsTLFBSRVNUQURPUiBERSBTRVJWSUNJT1MgREUgQ0VS +VElGSUNBQ0lPTiBNVElOMTEwLwYDVQQLEyhTVUJESVJFQ0NJT04gR0VORVJBTCBE +RSBQUk9DRVNPIERFIERBVE9TMSwwKgYDVQQKEyNNSU5JU1RFUklPIERFIFRSQUJB +Sk8gRSBJTk1JR1JBQ0lPTjEPMA0GA1UEBxMGTUFEUklEMQswCQYDVQQGEwJFUzCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANzNzbG/3iX1/xwzc5k8G6Ft +9aDEfZs4Zo0J3wNsVzW0E0H+41/mIgRYGLlOaTMEP5XH2U7/MzSnMkAyk1f+ga8l +Q1wd/XtXC2IIZ2ditOPlWCWA5qqGYkDnTxBhKUkmq018oatbYTGBBmpklE0n+Ese +0dVD4texbfb2/7RwVfYImbd0AeDznrV85ASICFBZeB8alNvvyMmJ0ze48z2G0RnL +g1oQBwhPmXQCB/AyUcj75tA8JnZ9cn6sdjfBinUgXEDchD/QSXxNZ6457+TOgOHK +neYtqy7mEpXa+fvf4+KMPYf7RW5Eq/Z4kicUoV1rT3B7V3Pv+V2oD3Wf7xFgGYSw +ZEDu2KmG+qXXRfQRb/GGyDRbiEjOut3Nm92I4wE26Kxq6BILsOB7kB6FC0mJAfb/ +gt9YZSKDSNYH0Bxm/GYoOsTD5fiZZSdSWPNr8W8CRIR10KTjaFNhcu/2L6mzrPX0 +9tBc3GlMzHnSpBvIcwY0dLTxasopKMc0hFsj2LoAjMwJwcdvXQSrt08md6k1zyDW +s/8xadA0+yXsaJYKot2DH8o8j3Q2JVTv9Rh7wiQx0fuCBK4Egtb1Ailx4ZJxdI7b +qnEdxDvGYiZshjwjVesp0R+ryh5j57NztKe4Kjr2H/uHZYj885/+v+vVHbaoA+ll +gxmM4BjtF9gcDT2cilh/AgMBAAGjggMBMIIC/TA3BggrBgEFBQcBAQQrMCkwJwYI +KwYBBQUHMAGGG2h0dHA6Ly9jYS5tdGluLmVzL210aW4vb2NzcDAOBgNVHQ8BAf8E +BAMCAQYwGwYDVR0RBBQwEoEQYWRtaW5fY2FAbXRpbi5lczAbBgNVHRIEFDASgRBh +ZG1pbl9jYUBtdGluLmVzMA8GA1UdEwEB/wQFMAMBAf8wcgYDVR0fBGswaTAyoDCg +LoYsaHR0cDovL2NhLm10aW4uZXMvbXRpbi9jcmwvTVRJTkF1dG9yaWRhZFJhaXow +M6AxoC+GLWh0dHA6Ly9jYTIubXRpbi5lcy9tdGluL2NybC9NVElOQXV0b3JpZGFk +UmFpejCBuQYDVR0gBIGxMIGuMIGrBgsrBgEEAYHZBQIEATCBmzAwBggrBgEFBQcC +ARYkaHR0cDovL2NhLm10aW4uZXMvbXRpbi9EUEN5UG9saXRpY2FzMGcGCCsGAQUF +BwICMFsaWUNlcnRpZmljYWRvIHJh7XouIENvbnN1bHRlIGxhcyBjb25kaWNpb25l +cyBkZSB1c28gZW4gaHR0cDovL2NhLm10aW4uZXMvbXRpbi9EUEN5UG9saXRpY2Fz +MB0GA1UdDgQWBBQzQxizxEsdyx/58E7830rkFWDIgzCCARYGA1UdIwSCAQ0wggEJ +gBQzQxizxEsdyx/58E7830rkFWDIg6GB6KSB5TCB4jEWMBQGA1UEAxMNQUMxIFJB +SVogTVRJTjESMBAGA1UEBRMJUzI4MTkwMDFFMTUwMwYDVQQLEyxQUkVTVEFET1Ig +REUgU0VSVklDSU9TIERFIENFUlRJRklDQUNJT04gTVRJTjExMC8GA1UECxMoU1VC +RElSRUNDSU9OIEdFTkVSQUwgREUgUFJPQ0VTTyBERSBEQVRPUzEsMCoGA1UEChMj +TUlOSVNURVJJTyBERSBUUkFCQUpPIEUgSU5NSUdSQUNJT04xDzANBgNVBAcTBk1B +RFJJRDELMAkGA1UEBhMCRVOCBgULQV6CezANBgkqhkiG9w0BAQUFAAOCAgEAmeOq +DpHTkqnq/0Rn06AtIGfzEA8aN3ddUkbmarj3iPOCwyr0YQ0sny+GLWHpYFm9t0+v +kwkc+TN3QJyhfGXcXpCVqfS+gvT8gh0exT3gXK7eLdVjdqvx7CSnIPge6M9xggPd +jnZiKrUpiBMkrVz0oEq46hOKVo1qL2g5coZYxKSrdXxE5xqEDI0R3Bm5HDbu8/9R +m7NDyCV+5w5Io+RPBi0VHqCmR5BXO/gvLdsjuusjk7C4UhtgHNQZsG14j0udpwso +Z0rdeEi9sT6Y1LsV/rNfbR11yB7PD65KGl2HLAZ0bAqFUyReesmgfHGbkl1vSH+2 +WHGyTKYaCSM0UHEVa0fb+74abcKMlC8HZyAiZ2O3q8YZnJYNYuoIpBpw76m5707F +QLzih1fzA8oomRrAVWB1e2O+ZD+WTkuP/S2mdMDfSTrsVX5m07r975OxY/JbP+12 +odnTDP4ubwqmU0vv0fNHrbke7EwfvtCDU8ObFUX/LgfR2mqSReZsV1skLlFpyTDP +1/ukATVazafrFG+0t2AiCMVxyJPiviVf9Qz6WFE9e8gvN/mTHCoJ4Gf9lolCyus2 +sNYbplAPWp12/6RPxuwNxOHQ51g+1nnAd00M1bPkmE3dRi5SsOIPDUI2pRAkUii+ +YjVCOcl6lh/u5ktZPyRzi78iS2by2w818TedoCQ= +-----END CERTIFICATE----- + +# ACA ROOT +-----BEGIN CERTIFICATE----- +MIIFyDCCA7CgAwIBAgIQR0ORJD/Oww1XSChr7oBdqzANBgkqhkiG9w0BAQsFADBd +MQswCQYDVQQGEwJFUzESMBAGA1UEBRMJUTI4NjMwMDZJMScwJQYDVQQKDB5DT05T +RUpPIEdFTkVSQUwgREUgTEEgQUJPR0FDSUExETAPBgNVBAMMCEFDQSBST09UMB4X +DTE2MDUyNzEwNTg1MVoXDTQxMDUyNzEwNTg1MVowXTELMAkGA1UEBhMCRVMxEjAQ +BgNVBAUTCVEyODYzMDA2STEnMCUGA1UECgweQ09OU0VKTyBHRU5FUkFMIERFIExB +IEFCT0dBQ0lBMREwDwYDVQQDDAhBQ0EgUk9PVDCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBALkrXvU+uokenfXRE8+7o1666d85cmSYUodppbbe4b+URb7F ++KRTZxVQ3FJPKnYsLo0gaozmXbnZaL6RG7ppAxitGE42oqxGqyD4A2qqrXnV3x3B +7kVvIXT5TbGxPZA7PDKA7f8Vz1HK16SHLqrlDrbRelrHufhRu9mU3T7Ghk4K/juJ +8vhuJM6RA1gFEkrdUKtBes7tqR8RUx6lE9th8PWqgN50eR2k4ynW++D8l9qiuKsi +PmWwIcTlxRBEh7Lj4CqCLn3m9LikEyXzd2BfY1OuLrGdimt2ezpxvZKBNrCcgvH3 +xYkoXf+8QgazCGpPYc2kLZDTObh3/8jHo3m7A7mRAwE0Etgwi7aMAsrkSOw4KjJM +bcp2KFqGCrrUII6voF8gLWKciPnxFW1bvbEDUMA/NteuP1HRyuNYZkTmo5t3LjH6 +2X8ixAVM63QbXGN6pgKTfkMOdhQPTW8ylYiAklKXFPU8/JQH02wpBZVGD+Rx4X/4 +bRQSgpK181M+mRGXR3ZKCXLu1MOWCaza//FLS7bXJc8eTJcmCzS7tpTxLGRxX4ny +FTs3pwLkDU9IiTOjjGh4MVFnChnbtOJ0Lz1683cAn3ESY/9zKmRpVOysOq7a8lhj +NH74PF7AQjql27Oo1FrBTli4abasgmLb0fsaQyEi/B31nE9OO+WN/3ZaI15bAgMB +AAGjgYMwgYAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0O +BBYEFBpV5BUx4jGbEdSIcXoAPXAoBb/NMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkG +CCsGAQUFBwIBFh1odHRwOi8vd3d3LmFjYWJvZ2FjaWEub3JnL2RvYzANBgkqhkiG +9w0BAQsFAAOCAgEAezDKVYbTr+4a17iVmOz5O92QE6OckkWgkolpoXGRvHGFh6At +MAnkwlM99Km3aC1Nmc2kz547kJ2aCikNKkLBPVtrQILFixOxQWePvqR34MB25PO2 +KVYs73FPwmTx2rQLytA5X1OygwH7sn3Zg3R6NdDBXY+b917nUt/uqjeTq9k9fR7x +vRzb6HXduFtM4xaj9nWIDo88wwts22BZ5AWrKEb3Zmkld97KSjPYWF57j5rPUo49 +bf3Rsr0+eVeGHkQcB030whCqeMvzURcNdj2NbmhJ6e8HSdG4Fsl5ncyuCwVHev2Y +rDGhkFqHYvn4q2Ja4CF20GhC6By+coHwxmd9fnQ81VVvj6VolhHxytMwF71GtjGv +cOmkhDdXugk8LtkLE1YHPpXEtXAvk8Kur4FdRhQw+67F85r3QXqx3ksW2UV1RwJ8 +FB7VsTugLEG1m0t7o4PwuczOHpS3Xi4jBpWRHDhHHO3EeA6kD/wbfNbya9CKW+qW +8zHUXmrElLgwn5XhB4m4iNInhaRhdOWoRDF6IHXo+Njrs0+q/1M/lu3qu/xRQKYr +7CSh+/lEjSPnppcAD8ukar9QoMpxomyub9/Zg4Jm3FNdr/pU94P/qz+Jlae0bfMP +Cg1IMy+BKcdLBcTGV3SEw5g2/++FMqtinBPRIoexvpjbdJqP6sLWk3lFIMM= +-----END CERTIFICATE----- + +# ACCVRAIZ1 +-----BEGIN CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 +-----END CERTIFICATE----- + +# ACEDICOM Root +-----BEGIN CERTIFICATE----- +MIIFtTCCA52gAwIBAgIIYY3HhjsBggUwDQYJKoZIhvcNAQEFBQAwRDEWMBQGA1UE +AwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00x +CzAJBgNVBAYTAkVTMB4XDTA4MDQxODE2MjQyMloXDTI4MDQxMzE2MjQyMlowRDEW +MBQGA1UEAwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZF +RElDT00xCzAJBgNVBAYTAkVTMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC +AgEA/5KV4WgGdrQsyFhIyv2AVClVYyT/kGWbEHV7w2rbYgIB8hiGtXxaOLHkWLn7 +09gtn70yN78sFW2+tfQh0hOR2QetAQXW8713zl9CgQr5auODAKgrLlUTY4HKRxx7 +XBZXehuDYAQ6PmXDzQHe3qTWDLqO3tkE7hdWIpuPY/1NFgu3e3eM+SW10W2ZEi5P +Grjm6gSSrj0RuVFCPYewMYWveVqc/udOXpJPQ/yrOq2lEiZmueIM15jO1FillUAK +t0SdE3QrwqXrIhWYENiLxQSfHY9g5QYbm8+5eaA9oiM/Qj9r+hwDezCNzmzAv+Yb +X79nuIQZ1RXve8uQNjFiybwCq0Zfm/4aaJQ0PZCOrfbkHQl/Sog4P75n/TSW9R28 +MHTLOO7VbKvU/PQAtwBbhTIWdjPp2KOZnQUAqhbm84F9b32qhm2tFXTTxKJxqvQU +fecyuB+81fFOvW8XAjnXDpVCOscAPukmYxHqC9FK/xidstd7LzrZlvvoHpKuE1XI +2Sf23EgbsCTBheN3nZqk8wwRHQ3ItBTutYJXCb8gWH8vIiPYcMt5bMlL8qkqyPyH +K9caUPgn6C9D4zq92Fdx/c6mUlv53U3t5fZvie27k5x2IXXwkkwp9y+cAS7+UEae +ZAwUswdbxcJzbPEHXEUkFDWug/FqTYl6+rPYLWbwNof1K1MCAwEAAaOBqjCBpzAP +BgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKaz4SsrSbbXc6GqlPUB53NlTKxQ +MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUprPhKytJttdzoaqU9QHnc2VMrFAw +RAYDVR0gBD0wOzA5BgRVHSAAMDEwLwYIKwYBBQUHAgEWI2h0dHA6Ly9hY2VkaWNv +bS5lZGljb21ncm91cC5jb20vZG9jMA0GCSqGSIb3DQEBBQUAA4ICAQDOLAtSUWIm +fQwng4/F9tqgaHtPkl7qpHMyEVNEskTLnewPeUKzEKbHDZ3Ltvo/Onzqv4hTGzz3 +gvoFNTPhNahXwOf9jU8/kzJPeGYDdwdY6ZXIfj7QeQCM8htRM5u8lOk6e25SLTKe +I6RF+7YuE7CLGLHdztUdp0J/Vb77W7tH1PwkzQSulgUV1qzOMPPKC8W64iLgpq0i +5ALudBF/TP94HTXa5gI06xgSYXcGCRZj6hitoocf8seACQl1ThCojz2GuHURwCRi +ipZ7SkXp7FnFvmuD5uHorLUwHv4FB4D54SMNUI8FmP8sX+g7tq3PgbUhh8oIKiMn +MCArz+2UW6yyetLHKKGKC5tNSixthT8Jcjxn4tncB7rrZXtaAWPWkFtPF2Y9fwsZ +o5NjEFIqnxQWWOLcpfShFosOkYuByptZ+thrkQdlVV9SH686+5DdaaVbnG0OLLb6 +zqylfDJKZ0DcMDQj3dcEI2bw/FWAp/tmGYI1Z2JwOV5vx+qQQEQIHriy1tvuWacN +GHk0vFQYXlPKNFHtRQrmjseCNj6nOGOpMCwXEGCSn1WHElkQwg9naRHMTh5+Spqt +r0CodaxWkHS4oJyleW/c6RrIaQXpuvoDs3zk4E7Czp3otkYNbn5XOmeUwssfnHdK +Z05phkOTOPu220+DkdRgfks+KzgHVZhepA== +-----END CERTIFICATE----- + +# ACNLB +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIEPsOGjjANBgkqhkiG9w0BAQUFADAdMQswCQYDVQQGEwJT +STEOMAwGA1UEChMFQUNOTEIwHhcNMDMwNTE1MTE1MjQ1WhcNMjMwNTE1MTIyMjQ1 +WjAdMQswCQYDVQQGEwJTSTEOMAwGA1UEChMFQUNOTEIwggEiMA0GCSqGSIb3DQEB +AQUAA4IBDwAwggEKAoIBAQC/dnU9DHxAOmZfTYz73Twu/n2UZO1K1ElIoe6RcbJ5 +yI4rH6rwMrQosqPCdU+k6aYa9qJmYSMnYSxuF5AL+t4ecVICKQSZeazAsMBmmJgR +N2QQz5y8O0IcKVxVkPZ6Ik5Wrzdov3Q6bDzGmMxgIb/iCCfk2Su844SV19QkYPx+ +LS+dIeudkca7pNHryRKto+jItX9VS+uZAlTEgRwMrjnkanoF2E5woPoDd7Ou2LgU +kvtBdxM1areiyohLrS1RvHaabLtAveckTCKm5v1OCHudCxDWEtKmxqFkMvQBc5aB +4kiwwShjPTvnZ6xuxRT1FxOinB8rV/AVJ3Vd3bE01pMRAgMBAAGjgf4wgfswEQYJ +YIZIAYb4QgEBBAQDAgAHMD8GA1UdHwQ4MDYwNKAyoDCkLjAsMQswCQYDVQQGEwJT +STEOMAwGA1UEChMFQUNOTEIxDTALBgNVBAMTBENSTDEwKwYDVR0QBCQwIoAPMjAw +MzA1MTUxMTUyNDVagQ8yMDIzMDUxNTEyMjI0NVowCwYDVR0PBAQDAgEGMB8GA1Ud +IwQYMBaAFMy7u4bWb/i+tEcid7O2rdcBWZZNMB0GA1UdDgQWBBTMu7uG1m/4vrRH +Ineztq3XAVmWTTAMBgNVHRMEBTADAQH/MB0GCSqGSIb2fQdBAAQQMA4bCFY2LjA6 +NC4wAwIEkDANBgkqhkiG9w0BAQUFAAOCAQEAEWfLy5prICHdb2mD1T8NupMVl05w +diZc6J4k5zf+PFD01PkqLwwToV0EvNCw6cIDF4UFYT3Ap6p2TMO4OoOphs8D+XcO +K7I9dhtl0WpxYHHbu7h6jvL5IYP4V0yox91lxu7vb7O2mbu0w9CrX7Kgft10ISzD +WuuNocrY8MgX7Xa6hGNuW7m1ym3X/DQ5gC+6T9+N2PwYxDyKNS93gpatIJIYsuc2 +9K4ydLhH0dgP2CzLasIAdfks+EIOy/5zk6mP4ceuITfzyrkMtOeJfnEcVjQgw/E0 +uVVL01NS8QctKz5bGUCfEO3TKTPFrw8QVofaO8ix7TjZGftL8FAtpM3UWA== +-----END CERTIFICATE----- + +# AC RAIZ DNIE +-----BEGIN CERTIFICATE----- +MIIFvzCCA6egAwIBAgIQANKFcP2up9ZfEYQVxjG1yzANBgkqhkiG9w0BAQUFADBd +MQswCQYDVQQGEwJFUzEoMCYGA1UECgwfRElSRUNDSU9OIEdFTkVSQUwgREUgTEEg +UE9MSUNJQTENMAsGA1UECwwERE5JRTEVMBMGA1UEAwwMQUMgUkFJWiBETklFMB4X +DTA2MDIxNjEwMzcyNVoXDTM2MDIwODIyNTk1OVowXTELMAkGA1UEBhMCRVMxKDAm +BgNVBAoMH0RJUkVDQ0lPTiBHRU5FUkFMIERFIExBIFBPTElDSUExDTALBgNVBAsM +BEROSUUxFTATBgNVBAMMDEFDIFJBSVogRE5JRTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAIAArQzDoyAHo2P/9zSgze5qVAgXXbEBFafmuV+Kcf8Mwh3q +N/Pek3/WBU2EstXXHAz0xJFwQA5ayJikgOgNM8AH87f1rKE4esBmVCT8UswwKvLD +xKEsdr/BwL+C8ZvwaHoTQMiXvBwlBwgKt5bvzClU4OZlLeqyLrEJaRJOMNXY+LwA +gC9Nkw/NLlcbM7ufME7Epct5p/viNBi2IJ4bn12nyTqtRWSzGM4REpxtHlVFKISc +V2dN+cvii49YCdQ5/8g20jjiDGV/FQ59wQfdqSLfkQDEbHE0dNw56upPRGl/WNtY +ClJxK+ypHVB0M/kpavr+mfTnzEVFbcpaJaIS487XOAU58BoJ9XZZzmJvejQNLNG8 +BBLsPVPI+tACy849IbXF4DkzZc85U8mbRvmdM/NZgAhBvm9LoPpKzqR2HIXir68U +nWWs93+X5DNJpq++zis38S7BcwWcnGBMnTANl1SegWK75+Av9xQHFKl3kenckZWO +04iQM0dvccMUafqmLQEeG+rTLuJ/C9zP5yLw8UGjAZLlgNO+qWKoVYgLNDTs3CEV +qu/WIl6J9VGSEypvgBbZsQ3ZLvgQuML+UkUznB04fNwVaTRzv6AsuxF7lM34Ny1v +Pe+DWsYem3RJj9nCjb4WdlDIWtElFvb2zIycWjCeZb7QmkiT1/poDXUxh/n3AgMB +AAGjezB5MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQW +BBSORfSfc8X/LxsF2wFHYBsDioG3ujA3BgNVHSAEMDAuMCwGBFUdIAAwJDAiBggr +BgEFBQcCARYWaHR0cDovL3d3dy5kbmllLmVzL2RwYzANBgkqhkiG9w0BAQUFAAOC +AgEAdeVzyVFRL4sZoIfp/642Nqb8QR/jHtdxYBnGb5oCML1ica1z/pEtTuQmQESp +rngmIzFp3Jpzlh5JUQvg78G4Q+9xnO5Bt8VQHzKEniKG8fcfj9mtK07alyiXu5aa +Gvix2XoE81SZEhmWFYBnOf8CX3r8VUJQWua5ov+4qGIeFM3ZP76jZUjFO9c3zg36 +KJDav/njUUclfUrTZ02HqmK8Xux6gER8958KvWVXlMryEWbWUn/kOnB1BM07l9Q2 +cvdRVr809dJB4bTaqEP+axJJErRdzyJClowIIyaMshBOXapT7gEvdeW5ohEzxNdq +/fgOym6C2ee7WSNOtfkRHS9rI/V7ESDqQRKQMkbbMTupwVtzaDpGG4z+l7dWuWGZ +zE7wg/o38d4cnRxxiwOTw8Rzgi6omB1kopqM91QITc/qgcv1WwmZY691jJb4eTXV +3OtBgXk4hF5v8W9idtuRzlqFYDkdW+IqL0Ml28J6JNMVsKLxjKB9a0gJE/+iTGaK +7HBSCVOMMMy41bok3DCZPqFet9+BrOw3vk6bJ1jefqGbVH8Gti/kMlD95xC7qM3a +GBvUY2Y96lFxOfScPt9a9NrHTCbti7UhujR5AnNhENqYMahgy34Hp9C3BUOJW82F +JtmwUa/3jFKqEqdY35KbZ/Kd8ub0aTH0Fufed1se3ZoFAa0= +-----END CERTIFICATE----- + +# AC RAIZ FNMT-RCM +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx +CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ +WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ +BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG +Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ +yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf +BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz +WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF +tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z +374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC +IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL +mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 +wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS +MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 +ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet +UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H +YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 +LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD +nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 +RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM +LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf +77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N +JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm +fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp +6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp +1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B +9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok +RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv +uu8wd+RU4riEmViAqhOLUTpPSPaLtrM= +-----END CERTIFICATE----- + +# AC Raíz Certicámara S.A. +-----BEGIN CERTIFICATE----- +MIIGZjCCBE6gAwIBAgIPB35Sk3vgFeNX8GmMy+wMMA0GCSqGSIb3DQEBBQUAMHsx +CzAJBgNVBAYTAkNPMUcwRQYDVQQKDD5Tb2NpZWRhZCBDYW1lcmFsIGRlIENlcnRp +ZmljYWNpw7NuIERpZ2l0YWwgLSBDZXJ0aWPDoW1hcmEgUy5BLjEjMCEGA1UEAwwa +QUMgUmHDrXogQ2VydGljw6FtYXJhIFMuQS4wHhcNMDYxMTI3MjA0NjI5WhcNMzAw +NDAyMjE0MjAyWjB7MQswCQYDVQQGEwJDTzFHMEUGA1UECgw+U29jaWVkYWQgQ2Ft +ZXJhbCBkZSBDZXJ0aWZpY2FjacOzbiBEaWdpdGFsIC0gQ2VydGljw6FtYXJhIFMu +QS4xIzAhBgNVBAMMGkFDIFJhw616IENlcnRpY8OhbWFyYSBTLkEuMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq2uJo1PMSCMI+8PPUZYILrgIem08kBeG +qentLhM0R7LQcNzJPNCNyu5LF6vQhbCnIwTLqKL85XXbQMpiiY9QngE9JlsYhBzL +fDe3fezTf3MZsGqy2IiKLUV0qPezuMDU2s0iiXRNWhU5cxh0T7XrmafBHoi0wpOQ +Y5fzp6cSsgkiBzPZkc0OnB8OIMfuuzONj8LSWKdf/WU34ojC2I+GdV75LaeHM/J4 +Ny+LvB2GNzmxlPLYvEqcgxhaBvzz1NS6jBUJJfD5to0EfhcSM2tXSExP2yYe68yQ +54v5aHxwD6Mq0Do43zeX4lvegGHTgNiRg0JaTASJaBE8rF9ogEHMYELODVoqDA+b +MMCm8Ibbq0nXl21Ii/kDwFJnmxL3wvIumGVC2daa49AZMQyth9VXAnow6IYm+48j +ilSH5L887uvDdUhfHjlvgWJsxS3EF1QZtzeNnDeRyPYL1epjb4OsOMLzP96a++Ej +YfDIJss2yKHzMI+ko6Kh3VOz3vCaMh+DkXkwwakfU5tTohVTP92dsxA7SH2JD/zt +A/X7JWR1DhcZDY8AFmd5ekD8LVkH2ZD6mq093ICK5lw1omdMEWux+IBkAC1vImHF +rEsm5VoQgpukg3s0956JkSCXjrdCx2bD0Omk1vUgjcTDlaxECp1bczwmPS9KvqfJ +pxAe+59QafMCAwEAAaOB5jCB4zAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQU0QnQ6dfOeXRU+Tows/RtLAMDG2gwgaAGA1UdIASBmDCB +lTCBkgYEVR0gADCBiTArBggrBgEFBQcCARYfaHR0cDovL3d3dy5jZXJ0aWNhbWFy +YS5jb20vZHBjLzBaBggrBgEFBQcCAjBOGkxMaW1pdGFjaW9uZXMgZGUgZ2FyYW50 +7WFzIGRlIGVzdGUgY2VydGlmaWNhZG8gc2UgcHVlZGVuIGVuY29udHJhciBlbiBs +YSBEUEMuMA0GCSqGSIb3DQEBBQUAA4ICAQBclLW4RZFNjmEfAygPU3zmpFmps4p6 +xbD/CHwso3EcIRNnoZUSQDWDg4902zNc8El2CoFS3UnUmjIz75uny3XlesuXEpBc +unvFm9+7OSPI/5jOCk0iAUgHforA1SBClETvv3eiiWdIG0ADBaGJ7M9i4z0ldma/ +Jre7Ir5v/zlXdLp6yQGVwZVR6Kss+LGGIOk/yzVb0hfpKv6DExdA7ohiZVvVO2Dp +ezy4ydV/NgIlqmjCMRW3MGXrfx1IebHPOeJCgBbT9ZMj/EyXyVo3bHwi2ErN0o42 +gzmRkBDI8ck1fj+404HGIGQatlDCIaR43NAvO2STdPCWkPHv+wlaNECW8DYSwaN0 +jJN+Qd53i+yG2dIPPy3RzECiiWZIHiCznCNZc6lEc7wkeZBWN7PGKX6jD/EpOe9+ +XCgycDWs2rjIdWb8m0w5R44bb5tNAlQiM+9hup4phO9OSzNHdpdqy35f/RWmnkJD +W2ZaiogN9xa5P1FlK2Zqi9E4UqLWRhH6/JocdJ6PlwsCT2TG9WjTSy3/pDceiz+/ +RL5hRqGEPQgnTIEgd4kI6mdAXmwIUV80WoyWaM3X94nCHNMyAK9Sy9NgWyo6R35r +MDOhYil/SrnhLecUIw4OGEfhefwVVdCx/CVxY3UzHCMrr1zZ7Ud3YA47Dx7SwNxk +BYn8eNZcLCZDqQ== +-----END CERTIFICATE----- + +# ADOCA02 +-----BEGIN CERTIFICATE----- +MIID2TCCAsGgAwIBAgICBxUwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQVUx +DDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9EMQwwCgYDVQQLEwNQS0kxDDAKBgNV +BAsTA0NBczEQMA4GA1UEAxMHQURPQ0EwMjAeFw0xMTA5MDEwNDI2MDdaFw0xOTAx +MjcwMjMxMjRaMFcxCzAJBgNVBAYTAkFVMQwwCgYDVQQKEwNHT1YxDDAKBgNVBAsT +A0RvRDEMMAoGA1UECxMDUEtJMQwwCgYDVQQLEwNDQXMxEDAOBgNVBAMTB0FET0NB +MDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkUIVId4++/0nRu3Wu +hyAKlkElK7xGB93LBIaVLEkuvUYMDvdYoGAWhdpdO+N1XkJ9ZGyPwV0pZEGyhbcb +Rr2F2tc6HbK08Uo9/h7ayO6GnaNqUQvkRZiv2BtIvDwUIu0rnzt/bzM81n2s4HlP +v2WTyxcqb7x6D+lbX+EMKvtAUjZKXWU4y1nBSLOkkYUWXXh9ws8tM+5ZSsjmYbOG +H4TIuBpsntFgtII1670jqC+TVFDOJF4xrtNqNCxhhzdGHkOJxoDLIgPTyYUuH5ux +rDlLTWDyimEb/4OxLHOPiELALbHKnsCVZ3R7luRqeo5BRaA088645+KP81BVZG+5 +ICuTAgMBAAGjga4wgaswDAYDVR0TBAUwAwEB/zBLBgNVHSAERDBCMDgGCSokAYJO +AQEBATArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3LmRlZmVuY2UuZ292LmF1L3Br +aTAGBgRVHSAAMA4GA1UdDwEB/wQEAwIBxjAfBgNVHSMEGDAWgBTp553rNb24sitJ +WPS8kn2LcYoRWjAdBgNVHQ4EFgQU6eed6zW9uLIrSVj0vJJ9i3GKEVowDQYJKoZI +hvcNAQEFBQADggEBAFbQqMhsybSs8TuBdSsRxPZWtFeuwpIZXJZzCu0uQ5xkKll4 +E7VQjE5qkFTzGT4WGM9DE8kyc/hV4MrQkhk+ZaPegBIcUaUYLMBp3beGMq/wrc/g +wyPE5fy2PwsF15Y6ZF53jITO8dzNBArcl/EhHMd9MCVd1yA1lcOHHbY/21PiKqT4 +GRc6DBXuswU4Me5Fcd2X+3hxhgL0nzQZc0kQK6B/8cn6oPJYIzEW+BBQgrtd0urv +ad1ndlU4x6gOA4A4TwAga98rZZPbCK9gbDQgqK1IPxB+psOUAZXhgSyg7YyuVE46 +S8PSws9+AnzvKiy77NrexQGvlEntD8K/DpBpLWs= +-----END CERTIFICATE----- + +# ANCERT Certificados CGN +-----BEGIN CERTIFICATE----- +MIIFKjCCBBKgAwIBAgIPRHTsyGxyHljduCx+9PyVMA0GCSqGSIb3DQEBBQUAMHwx +CzAJBgNVBAYTAkVTMUswSQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENlcnRp +ZmljYWNpb24gUy5MLiBVbmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxIDAeBgNV +BAMTF0FOQ0VSVCBDZXJ0aWZpY2Fkb3MgQ0dOMB4XDTA0MDIxMTE3MjcxMloXDTI0 +MDIxMTE3MjcxMlowfDELMAkGA1UEBhMCRVMxSzBJBgNVBAoTQkFnZW5jaWEgTm90 +YXJpYWwgZGUgQ2VydGlmaWNhY2lvbiBTLkwuIFVuaXBlcnNvbmFsIC0gQ0lGIEI4 +MzM5NTk4ODEgMB4GA1UEAxMXQU5DRVJUIENlcnRpZmljYWRvcyBDR04wggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCQdT8/DKzK1HzESKcYuzq7obvVe9+L +GeSCRPtl7LYSYT5pIhliNSS21RAGqUVqJCr1J4x4PMi58wVsxQID0k6AZOyGq3iU +IgIAtWib1OVVX+DIgDDnC79r1wSOTnmYcEwcJrmzqOrwEaK5ilMCJnUSieH7iE5Z +egDRgtgWruW2vJUlYEB3JRue743k/fBPMzElv+56ClTwkDhnEnulYNoMAYmadocu +9RtDe+XnJkr7FWKrRRt71QqlTWxNq58oSIThg3W4GHBVU9vQ3ymQrznGF5XBlMVe +2WVfXf9uFpWYIZ9eTfDNMTkhAxcNkR+hVZlB7FXJuz2ZXJvFf9EcXupTAgMBAAGj +ggGnMIIBozAPBgNVHRMBAf8EBTADAQH/MIIBIAYDVR0gBIIBFzCCARMwggEPBgkr +BgEEAYGTaAQwggEAMCUGCCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5jb20v +Y3BzMIHWBggrBgEFBQcCAjCByTANFgZBTkNFUlQwAwIBARqBt0FnZW5jaWEgTm90 +YXJpYWwgZGUgQ2VydGlmaWNhY2lvbi4gTGEgZGVjbGFyYWNpb24gZGUgcHJhY3Rp +Y2FzIGRlIGNlcnRpZmlhY2lvbiBxdWUgcmlnZSBlbCBmdW5jaW9uYW1pZW50byBk +ZSBsYSBwcmVzZW50ZSBhdXRvcmlkYWQgc2UgZW5jdWVudHJhIGRpc3BvbmlibGUg +ZW4gaHR0cDovL3d3dy5hbmNlcnQuY29tL2NwczAOBgNVHQ8BAf8EBAMCAYYwHAYD +VR0RBBUwE4ERYW5jZXJ0QGFuY2VydC5jb20wHwYDVR0jBBgwFoAU7FefyHYib8w6 +rlvwLaFiWNGNAswwHQYDVR0OBBYEFOxXn8h2Im/MOq5b8C2hYljRjQLMMA0GCSqG +SIb3DQEBBQUAA4IBAQCLPd/cNix/J5z8tVhTcQoSXRBkUXG1Slb0XkRnHu8dsvGk +UTxnbCxllnqhEqOvCwg3DpnWbiiHC2KrTnhOcoGb3xFPiWDIUaYbBglxc3w3txw4 +N5r5h+Hvoe5/18DqORT6fG8L+YbK5sV3aaCfjSmjd27FzNr23QZ602lmPmA74zLf +rvAbniqdzITfGhBH7aVWlkI3tS1yDUESk7oyiETIrgnEvYDt/WAPcrK2ZPZjIDJw +d4cuMy6fNchfqJJWt/8kOixd8iYFaBnyUWfP31IJ6YIEemuCp3/l0ql0axgmyLrU +1R6lSzsmwZ0i4fsSvdViRtXXXdLdw/xhDTAFTwWL +-----END CERTIFICATE----- + +# ANCERT Certificados CGN V2 +-----BEGIN CERTIFICATE----- +MIIHBDCCBOygAwIBAgIQDziMcP6mlV3pXZyHr3kEmTANBgkqhkiG9w0BAQsFADB1 +MQswCQYDVQQGEwJFUzFBMD8GA1UEChM4QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uIFMuTC5VLiAtIENJRiBCODMzOTU5ODgxIzAhBgNVBAMTGkFOQ0VS +VCBDZXJ0aWZpY2Fkb3MgQ0dOIFYyMB4XDTEwMDUyNTE2MzEyMloXDTMwMDUyNTE2 +MzEyM1owdTELMAkGA1UEBhMCRVMxQTA/BgNVBAoTOEFnZW5jaWEgTm90YXJpYWwg +ZGUgQ2VydGlmaWNhY2lvbiBTLkwuVS4gLSBDSUYgQjgzMzk1OTg4MSMwIQYDVQQD +ExpBTkNFUlQgQ2VydGlmaWNhZG9zIENHTiBWMjCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAJ1ScOknGIPK6sSZ2KbhLhSvbh4OZMqBN1UnHBd3WGcfjMn5 +wopiZSh0m+LRvlUHdnbufG1OY1seSiV14Aeh0NKCp84PM+u6FMBlskou5WW8ItKv +Gg7Ky/NkZSssmaOXi4t1MP5m+sFPSzdQjD/z3pl6ToecIEZyl/5WG2ZOoIJTo1zY +KEYMBRdvONZcnw4lIsGG41waVNuunWV9AJLfqCEhxVsQJnThsXNXZHx9FwMM6vcU +lw/5xe5ddbDFxgoLtD5J4xnGm0ST/FoVZAqyg/+AXogJ0Mogo1v7283hGncjGHAa +i+1EP9YaqDY44Z0vp3fEerPAcrJyzR4/EF4aiHSN8BLF969J3JWvK020kMr57u8M +478WNyNT4yn69HRpaD1XbRRgimRpKGRN+jZH/bgSzsOGqlzcZjkHTzvj48Vors7g +OVwggz8SCjizAMFcE5ciXjpLNZn4xB7e+YgRjoTJizLy0te/Igc/YHgudRyiuiMS +0/BPUDnsyXcnx1oqjtO5tXQEmRUvLoZfjwbByuriqB9NfTOEkaSSw9CmSF1mGneE +IFCc6gQLDCOWz7Gc/Lm6H5eo06sDZS99rlTHeeIcNt1t0gaYAf3O/D9Lw9Ku/4nY +OTED2LFkdwPG+KON/Cp55xC9uW2RHD6dy7xVfyL+YYT42NSnIXo5XnIy60x1AgMB +AAGjggGOMIIBijAPBgNVHRMBAf8EBTADAQH/MIIBJQYDVR0gBIIBHDCCARgwggEU +BgkrBgEEAYGTaAQwggEFMCUGCCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5j +b20vY3BzMIHbBggrBgEFBQcCAjCBzjANFgZBTkNFUlQwAwIBAR6BvABBAGcAZQBu +AGMAaQBhACAATgBvAHQAYQByAGkAYQBsACAAZABlACAAQwBlAHIAdABpAGYAaQBj +AGEAYwBpAG8AbgAuACAAUABhAHMAZQBvACAAZABlAGwAoABHAGUAbgBlAHIAYQBs +ACAATQBhAHIAdABpAG4AZQB6ACAAQwBhAG0AcABvAHMAIAA0ADYAIAA2AGEAIABw +AGwAYQBuAHQAYQAgADIAOAAwADEAMAAgAE0AYQBkAHIAaQBkMA4GA1UdDwEB/wQE +AwIBhjAdBgNVHQ4EFgQUBW7hoZruB6/O9bTTZT0EUOLQm0QwHwYDVR0jBBgwFoAU +BW7hoZruB6/O9bTTZT0EUOLQm0QwDQYJKoZIhvcNAQELBQADggIBAH9UQBkkykwT +9hP5XGKVMNW44JOAbNQVRtQnPpJSqtyBY4ZA29Ulr5+TbAr1TaH+VJZdh68Rkw+L +8uPwH0qf/KnRyVB3X5gICC16i4EQzDsCVFjlxqf098ro9jcGfucR12yFY/eoow7i +JWIEpPJiU5xHtKdku4Hl1l5WEb5FEWHCZun0DXSoq/lbv4KykaZQ+4d+b7vI6wWi +uRDXG0IHVc+J5r/7ufBqOVdTcIy9S6Npvx+LplxNZYq5AAnoaL8JJwdNXtpSCYzl +cZOKzIWO0jdeU9yCbQtWSoR5CvQQJUT1b10aZrXN1RBLh1pO1H/kcazuaJ+8+i5Y +wcSef6RZheBSDvLHR3UVLSx2jA9FBTVg+Hs7dzJ/KIAJ2jG8cX3hrJHNYAp5IOxu +O7eE4HLzqUrQL+Rb49Ia1Eq89Xb5fyoZSOvdDs+ZVkW4fdYJjg7Os4RoSYRUNUvk +mRuv86gU81SYCoB+T7zyZi0m/zCNp/a925qP5eHfu7cyDvmSb2nj5HbTADbxLV7H +E1/V2Wot6NEba3bLGG4OBRD1WvJJG1m0herKGXTMu1LiN4zCagIlwtJxpJLbjsnW +qW7QhShtXG0IeAKweQxXbwtaAeOEhAL2z/KrY+sCarnLShjVOSI8VkqqlYjmMAAf +jSEhyVfuubdEKYhPtiunFO6O7m++FtAT +-----END CERTIFICATE----- + +# ANCERT Certificados Notariales +-----BEGIN CERTIFICATE----- +MIIFPDCCBCSgAwIBAgIRAPTPierdpMY+ka1IDi0iNoQwDQYJKoZIhvcNAQEFBQAw +gYMxCzAJBgNVBAYTAkVTMUswSQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENl +cnRpZmljYWNpb24gUy5MLiBVbmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxJzAl +BgNVBAMTHkFOQ0VSVCBDZXJ0aWZpY2Fkb3MgTm90YXJpYWxlczAeFw0wNDAyMTEx +NTU4MzBaFw0yNDAyMTExNTU4MjZaMIGDMQswCQYDVQQGEwJFUzFLMEkGA1UEChNC +QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0aWZpY2FjaW9uIFMuTC4gVW5pcGVyc29u +YWwgLSBDSUYgQjgzMzk1OTg4MScwJQYDVQQDEx5BTkNFUlQgQ2VydGlmaWNhZG9z +IE5vdGFyaWFsZXMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwkQ/Q +Zy0psmNNHzV59mVrufPztViTJ2RPp9VbggVym38drgjSjNDRyWCwmRk11hnGADlp +fSLvdCKDtH7qEIs+Mxzh3WQ2KfNSSm5Bw75RDB9juL+NqT8xMTu78TZEPCdlFHl1 +5hCkPFgby1NiEvWHWkaieaNg4xao3oSm+uXMxBAy9kLaR00YPeZ6DysOY/9nfUPV +dBaQNLQPziZzIcFK2mTkT+Mjtdn2q7dKf5bhy0f9BkPRlDRpCv496GaqJgzVYzkG +cJOtfLPkR8E7R45plwyRoEwHj8mATK5wk2iPocMiwvF1myh9kpJVOqhZGewSMRzv +nRfcuUAJW/QtEyZzAgMBAAGjggGnMIIBozAcBgNVHREEFTATgRFhbmNlcnRAYW5j +ZXJ0LmNvbTAfBgNVHSMEGDAWgBSE9/pyXohkZh0ojLB3vQxqn0xNYjAPBgNVHRMB +Af8EBTADAQH/MIIBIAYDVR0gBIIBFzCCARMwggEPBgkrBgEEAYGTaAEwggEAMCUG +CCsGAQUFBwIBFhlodHRwOi8vd3d3LmFuY2VydC5jb20vY3BzMIHWBggrBgEFBQcC +AjCByTANFgZBTkNFUlQwAwIBARqBt0FnZW5jaWEgTm90YXJpYWwgZGUgQ2VydGlm +aWNhY2lvbi4gTGEgZGVjbGFyYWNpb24gZGUgcHJhY3RpY2FzIGRlIGNlcnRpZmlh +Y2lvbiBxdWUgcmlnZSBlbCBmdW5jaW9uYW1pZW50byBkZSBsYSBwcmVzZW50ZSBh +dXRvcmlkYWQgc2UgZW5jdWVudHJhIGRpc3BvbmlibGUgZW4gaHR0cDovL3d3dy5h +bmNlcnQuY29tL2NwczAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFIT3+nJeiGRm +HSiMsHe9DGqfTE1iMA0GCSqGSIb3DQEBBQUAA4IBAQAv+OXYM6XClG5ewPHuoUwK +rYYPwDPdntLZm+7FK4UpdqylElOTHaoH7Ok5ZAto8HUk6dGGjJxTausVoQm3GQe5 +nY8CshtJcMJjdN0Lqv4HxjdWxoP+wE8czDiq/e5VmIlcwlOtIIe6FmRSYezBn7vU +YtEqyF3wK/jaEs4jy7HMwdIKvfzAgE5VSfqJ2GSjSsrui9fl7ZL7YOLiKs8tKD6m +/4CcZcwSnqUcdFmQpYd/ZxWAEMCh0agw7KECkYpa0yMXk1pHIXnqM3oPfzg1mspW +uL9kuqewtVEdFp6OiX04OsuETQeY2OXhjAVqpTcM1nkpPvFCxLb36hmgYeACTr8S +-----END CERTIFICATE----- + +# ANCERT Certificados Notariales V2 +-----BEGIN CERTIFICATE----- +MIIHEjCCBPqgAwIBAgIQCb1WBSoTFvRoT3QOqX0cSDANBgkqhkiG9w0BAQsFADB8 +MQswCQYDVQQGEwJFUzFBMD8GA1UEChM4QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uIFMuTC5VLiAtIENJRiBCODMzOTU5ODgxKjAoBgNVBAMTIUFOQ0VS +VCBDZXJ0aWZpY2Fkb3MgTm90YXJpYWxlcyBWMjAeFw0xMDA1MjUxNjU2MTRaFw0z +MDA1MjUxNjU2MTRaMHwxCzAJBgNVBAYTAkVTMUEwPwYDVQQKEzhBZ2VuY2lhIE5v +dGFyaWFsIGRlIENlcnRpZmljYWNpb24gUy5MLlUuIC0gQ0lGIEI4MzM5NTk4ODEq +MCgGA1UEAxMhQU5DRVJUIENlcnRpZmljYWRvcyBOb3RhcmlhbGVzIFYyMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsua5xh1qKi1Jxfz81GRA0OAULveg +wv+S80GmtD/avhkUkZR20xXMXn94UHrb2sVFqsscI3lzkKi7ZwFzjs5A+Rqpqofk +k5IPXGhcXvAGYCtY3DxtPMd6MGsFqpKGcyrS8hqIxNvlWmaOdclCP5uIKEAe9alc +HvrIQaEwqwuc7haiwS2lhfrtoAzof5ZKe72PmqIYdtKv3bc9EKtSEIiuHeu4MnSW +9LeqJ/elBw3jlFdqVCB3zR28eS3knLTeUYj+VtY9i6HP+lIejAVzd9YFz2MAUYdh +41C+mZfh/B4ReWtOas+chQoclirAIDYUxQkXYjv0rerV1/3QOSp409Ciz8hzMAlH +xU4Z/bgw1A+AmIiGwUxBeiPFQ/1eErg+D7G3gWIMfm/je5rCwkcRIR/PntEwzoPB +EE1Ad9e1wksyQEL6m7Csz+sh2BnrZMVr3VUtgIdEfEw8qw3YEr80goyxqsS4a+gO +RnfSiwYdQvusvcnnM7Mib37VLgPFXwUWhnzt457RFncaRtjJ0IzkXFwhBZHxZOSs +xTeutb1nE64p5bNCxHAJo11M6zcg4/D1czM7wvyOUYU2KsuB2w6JI9ni4Wi6LER3 +PhxAuvBnjhiH8D3X6T9HWzVCzacEzkhyKQUatNGi5w15ipZtZ1ItOyPm+YKc1rN5 +XhTeZUgz/B1C6C0CAwEAAaOCAY4wggGKMA8GA1UdEwEB/wQFMAMBAf8wggElBgNV +HSAEggEcMIIBGDCCARQGCSsGAQQBgZNoATCCAQUwJQYIKwYBBQUHAgEWGWh0dHA6 +Ly93d3cuYW5jZXJ0LmNvbS9jcHMwgdsGCCsGAQUFBwICMIHOMA0WBkFOQ0VSVDAD +AgEBHoG8AEEAZwBlAG4AYwBpAGEAIABOAG8AdABhAHIAaQBhAGwAIABkAGUAIABD +AGUAcgB0AGkAZgBpAGMAYQBjAGkAbwBuAC4AIABQAGEAcwBlAG8AIABkAGUAbACg +AEcAZQBuAGUAcgBhAGwAIABNAGEAcgB0AGkAbgBlAHoAIABDAGEAbQBwAG8AcwAg +ADQANgAgADYAYQAgAHAAbABhAG4AdABhACAAMgA4ADAAMQAwACAATQBhAGQAcgBp +AGQwDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBT2Ejqre1jBjUNvdoHS8rjT7xfq +CzAfBgNVHSMEGDAWgBT2Ejqre1jBjUNvdoHS8rjT7xfqCzANBgkqhkiG9w0BAQsF +AAOCAgEAVDXTomXJ2TbFU9G0jXI0ibqnCJ/pNRC5uAwG+WSqlZYoqMijgNxWwL9y +TVa/f10E1a0oW02988MPFbBx2laNQFVXpn1ioq0TaVGqlFC6vQAwUPXdpE4JepQx +a9tzA73z2hoPjC+yyTe8VNULIzf15Fs3ZolPtMcFpGXcWTCmEyt+Fe3sEBeJUsmd +36JM7fYPHqZJsA1RszGxUZnLtNEjeNJLqLQdFqag0D4HfmU/Jc5kThsuS02ChRpl +2+7iA/BZJAWPme95gt/uKjdow2pQAVlfn2jcLFFgK13gUjw7cLgA0zeoPlsedgha +1Lt2MK75yPKOpI8KdX0amOG/0DaULzzBUtNp6hpgN4yA201txppdjaBhUbs9DeYS +oJ9vWVZ0MmcK/DcGwTrkK46EH9ohDEmIQ9Ol9YINdobDLMyQu7O4q8bLrsAXUZ7T +gPck2hzszhKDzk42MDl1+HR2kIKePkBMDBS5Gh5IarAx6oh/gEFAU3s4S4eQYHpL +zmdGaHV3jgBdILDkkzdtA99YOeiaxaTr7GEzCIUka08G6a2QpTZibOPdfQkfM7+3 +u/fJdQX3W6v6h1mvGmcQfoTcjHDWROkQwdibLtHGQGrq5loPEH1s+1WHuk21cQOe +F4942lU9V14iCmqY8I0Izd2WQlobzbpvJ7h0J6g/5aDWc8deLyE= +-----END CERTIFICATE----- + +# ANCERT Corporaciones de Derecho Publico +-----BEGIN CERTIFICATE----- +MIIFTTCCBDWgAwIBAgIQP7Ll8tF8ixhkVmKpOYF/pzANBgkqhkiG9w0BAQUFADCB +jDELMAkGA1UEBhMCRVMxSzBJBgNVBAoTQkFnZW5jaWEgTm90YXJpYWwgZGUgQ2Vy +dGlmaWNhY2lvbiBTLkwuIFVuaXBlcnNvbmFsIC0gQ0lGIEI4MzM5NTk4ODEwMC4G +A1UEAxMnQU5DRVJUIENvcnBvcmFjaW9uZXMgZGUgRGVyZWNobyBQdWJsaWNvMB4X +DTA0MDIxMTE3MjI0NVoXDTI0MDIxMTE3MjI0NVowgYwxCzAJBgNVBAYTAkVTMUsw +SQYDVQQKE0JBZ2VuY2lhIE5vdGFyaWFsIGRlIENlcnRpZmljYWNpb24gUy5MLiBV +bmlwZXJzb25hbCAtIENJRiBCODMzOTU5ODgxMDAuBgNVBAMTJ0FOQ0VSVCBDb3Jw +b3JhY2lvbmVzIGRlIERlcmVjaG8gUHVibGljbzCCASIwDQYJKoZIhvcNAQEBBQAD +ggEPADCCAQoCggEBAKIhlYfciuvWepCoaDX9F/x0OlQQkjWTQnUu2D7LqZShvmo3 +P1K6pHvahJkWeU4AaNQfE+lGOzxKnYM62CHvwvJAReEPYEUE7fyKGC75PeSkETIg +jjq37pZAFRqZ6SGdcqzNH4muqtmhQLCoZ778eg5HsV68+DBqjjefBULsLMOmG4ur +xFA9+uRz9SGwuFVfh+CiRzgvQF9PbKuUJFbjTI9+kOkngiibmLqa1rWbV29rFRz5 +u3ApfTz3E6jRcfGw/ohFcamldGXLw/n1Aw8Qw4YwAG7BwCaiiP4hxzI9u8Z7G7eb +irP6sXxx2QGnQpCqL5iQhKrexq3sPFFKBR0BUZsCAwEAAaOCAacwggGjMA8GA1Ud +EwEB/wQFMAMBAf8wggEgBgNVHSAEggEXMIIBEzCCAQ8GCSsGAQQBgZNoAzCCAQAw +JQYIKwYBBQUHAgEWGWh0dHA6Ly93d3cuYW5jZXJ0LmNvbS9jcHMwgdYGCCsGAQUF +BwICMIHJMA0WBkFOQ0VSVDADAgEBGoG3QWdlbmNpYSBOb3RhcmlhbCBkZSBDZXJ0 +aWZpY2FjaW9uLiBMYSBkZWNsYXJhY2lvbiBkZSBwcmFjdGljYXMgZGUgY2VydGlm +aWFjaW9uIHF1ZSByaWdlIGVsIGZ1bmNpb25hbWllbnRvIGRlIGxhIHByZXNlbnRl +IGF1dG9yaWRhZCBzZSBlbmN1ZW50cmEgZGlzcG9uaWJsZSBlbiBodHRwOi8vd3d3 +LmFuY2VydC5jb20vY3BzMA4GA1UdDwEB/wQEAwIBhjAcBgNVHREEFTATgRFhbmNl +cnRAYW5jZXJ0LmNvbTAfBgNVHSMEGDAWgBSMTB43DLGf0qxECzq+As/0jS1mlTAd +BgNVHQ4EFgQUjEweNwyxn9KsRAs6vgLP9I0tZpUwDQYJKoZIhvcNAQEFBQADggEB +AEd0wJSR4qX7mFJEk2zEwB3gedtpZC1hrqR3kTW1t8qXqsCxhvUbaGuqWLJ8P+cD +J/hBcbym0iCpgJWiR61tRnSthJvYb6n1uS9tm8DdmYftWbJ1gaWJhSrM0IWBTfOv +d96MwSiaQqwFhww0nHGH/ewBFB++wy7w3/okpl0fPPGiC1GIAa4Sh6S1XXGy3+8N +fCDjfxMLTabAd8w/1g9xx3FMLh76GQZlya1WbHeNRj+9MIMe4C5VuHgjdDxYCmM6 +TYF7bzVwrrYl2fYk/iPG2hqIr6gUk3PgwFuwMWka9ilfVrcaCsL5C+oCwTMRYmp8 +Q+jqGquQAIXgRQ99jrpQ1cY= +-----END CERTIFICATE----- + +# ANF Server CA +-----BEGIN CERTIFICATE----- +MIIGnTCCBYWgAwIBAgIDATRLMA0GCSqGSIb3DQEBBQUAMIHZMQswCQYDVQQGEwJF +UzESMBAGA1UECAwJQmFyY2Vsb25hMUcwRQYDVQQHDD5CYXJjZWxvbmEgKHNlZSBj +dXJyZW50IGFkZHJlc3MgYXQgaHR0cHM6Ly93d3cuYW5mLmVzL2FkZHJlc3MvKTEo +MCYGA1UECgwfQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjacOzbjEXMBUGA1UE +CwwOQU5GIENsYXNlIDEgQ0ExEjAQBgNVBAUTCUc2MzI4NzUxMDEWMBQGA1UEAwwN +QU5GIFNlcnZlciBDQTAeFw0wOTExMzAyMzAwMDBaFw0yMTExMzAyMzAwMDBaMIHZ +MQswCQYDVQQGEwJFUzESMBAGA1UECAwJQmFyY2Vsb25hMUcwRQYDVQQHDD5CYXJj +ZWxvbmEgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgaHR0cHM6Ly93d3cuYW5mLmVz +L2FkZHJlc3MvKTEoMCYGA1UECgwfQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2Fj +acOzbjEXMBUGA1UECwwOQU5GIENsYXNlIDEgQ0ExEjAQBgNVBAUTCUc2MzI4NzUx +MDEWMBQGA1UEAwwNQU5GIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL/qSKeaiDlrLEhABwSTfPe4LX6lN+Jh1iH8kDfLaT5eizffW287 +2LbDiECQ9J0MXBBSsbPlX5EQ5v2ogBRf04u9XL0PI5IJN+Ny0maUC1x0lC9e8k7Y +A8azzlalHNl7/U8HTNS32l8pTXXyH1XPMiMcRgknHUXs8Yw0id57FqdDXoor6ZRD +Htc+k21viT287rHIt//JfeNfDW93ePUqLo3Ei5iXMLFGWgtjcNR4x4azf/8nQqqf +im5toZTK7IcCHNZUS/28iZumYzhmjBaJiZfDUOj2QgGnd30QGZID6F1FyBXFhxsN +kfLGOZx788AKmfjug29+QncRjsMfHHIvPRsCAwEAAaOCAmowggJmMB0GA1UdDgQW +BBS+O/a0MbdzJEg5xVcTlHWqn4E/LDCCAQkGA1UdIwSCAQAwgf2AFL479rQxt3Mk +SDnFVxOUdaqfgT8soYHfpIHcMIHZMQswCQYDVQQGEwJFUzESMBAGA1UECAwJQmFy +Y2Vsb25hMUcwRQYDVQQHDD5CYXJjZWxvbmEgKHNlZSBjdXJyZW50IGFkZHJlc3Mg +YXQgaHR0cHM6Ly93d3cuYW5mLmVzL2FkZHJlc3MvKTEoMCYGA1UECgwfQU5GIEF1 +dG9yaWRhZCBkZSBDZXJ0aWZpY2FjacOzbjEXMBUGA1UECwwOQU5GIENsYXNlIDEg +Q0ExEjAQBgNVBAUTCUc2MzI4NzUxMDEWMBQGA1UEAwwNQU5GIFNlcnZlciBDQYID +ATRLMAwGA1UdEwQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMDEGCisGAQQBgY8cKgYE +IxshaHR0cHM6Ly93d3cuYW5mLmVzL0FDL0FDVEFTLzc4OTIzMBgGCisGAQQBgY8c +EwEEChsIODAxLTM0MDAwOAYIKwYBBQUHAQEELDAqMCgGCCsGAQUFBzABhhxodHRw +Oi8vd3d3LmFuZi5lcy9BQy9SQy9vY3NwMGMGA1UdHwRcMFowK6ApoCeGJWh0dHBz +Oi8vd3d3LmFuZi5lcy9BQy9BTkZTZXJ2ZXJDQS5jcmwwK6ApoCeGJWh0dHBzOi8v +Y3JsLmFuZi5lcy9BQy9BTkZTZXJ2ZXJDQS5jcmwwFgYDVR0SBA8wDYELaW5mb0Bh +bmYuZXMwFgYDVR0RBA8wDYELaW5mb0BhbmYuZXMwDQYJKoZIhvcNAQEFBQADggEB +ALXGx7xG+kJcE8GUdTNWvy+nB3PsN+NDdOr5Zk9ejX/w5nnDTfXZOKXMykP0U4CG +v7zQEV2QxMJAR+vFh5PBtnhemq6H9WIQWUxMbQa+mRMVs7P6HHJ+4CIhAVg1OGii +5Pjh8PA2UJHgtHfcY4QzkmC4yxby0mM7TFw1OuesAlPFHIEBd8ccER9UMO9UjyX6 +iSeUNKMPFE9v6XPZGGLn7gjoyYN7yDObfESafBqQtdJxid899BxPTlHgyWu2qgse +2TAP02PV7XD0wYPtBkWaqOq0iTf9WjdH75F5pzX/8Nww7Q0UZ9t8WuCPbTP+PJ4V +M8PDLQ5dqnwNjjGWTYv/BdU= +-----END CERTIFICATE----- + +# ATHEX Root CA +-----BEGIN CERTIFICATE----- +MIIDNzCCAh+gAwIBAgICJxwwDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UEBhMCR1Ix +HTAbBgNVBAoTFEF0aGVucyBFeGNoYW5nZSBTLkEuMRYwFAYDVQQDEw1BVEhFWCBS +b290IENBMB4XDTEwMTAxODE1NTYwM1oXDTMwMTAxNzIxMDAwMFowRDELMAkGA1UE +BhMCR1IxHTAbBgNVBAoTFEF0aGVucyBFeGNoYW5nZSBTLkEuMRYwFAYDVQQDEw1B +VEhFWCBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzRo9 +MLWzOLK/eruuodbXhfAiOqSJacThYgTJcNM8MxLi5jjld6QkRGQNt65MWt3hGAY+ +7ZtaBfXh3hLtNircR9mRUZntsb9qc6EKCCSoio0cC1nTv3AjVUSgjDDFzm1PsOy+ +84wx3wpa3NNXXAWgM5U7l49UC7j1a33Hxay1eY4GOPGoKVU9mjbQJ180ahJ4FyjZ +mEns2VpS2iY6+u5MpiaOqD5VH7If4bWb+To19u2RHP0LECT9H/nT4wAlsQslwLd9 +mjwHOoAL1qj+kUXowdLFIm/T5XEftiw2tFig7c1KaORqV/ShdezXAJnV9plc607J +u9cao0VZAA+MO9t0NQIDAQABozMwMTAPBgNVHRMBAf8EBTADAQH/MBEGA1UdDgQK +BAhD4oDou9K3wTALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAD8BY3UH +Mitfdf92jtOpuG/MUD2EV08og+h8o26ivPfCuq46q07QD5IouN1bLNvl1h86k+GR +DteqXwFhLD5hT96VFU3MPeoy4qP++Bap8rwp/CmefXKlXaFrAtVfSPSgO8sYRvA9 +F1WD0ClhkbuaQUnRE75BlPI+wySrn8drQpBCeX5aUfs8XgshH8vZSBMVsWp/A8TR +ulHScImqCEqHHPZ6mLHUUQVVxpAXb8PgBMB69C8YolZCcy62spvROb4JwgJKJBf5 +96y9cQe/leKX5aGECI2y4kSh3IkwO6gMBXpddgBPHm9xfys52kVCOTHSqTJA1Dhj +E5Y3mkld2cf9uEw= +-----END CERTIFICATE----- + +# Actalis Authentication CA G1 +-----BEGIN CERTIFICATE----- +MIIDlDCCAnygAwIBAgIBATANBgkqhkiG9w0BAQUFADBqMQswCQYDVQQGEwJJVDEP +MA0GA1UEBwwGTWlsYW5vMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1ODUy +MDk2NzElMCMGA1UEAwwcQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBDQSBHMTAeFw0w +OTA2MjMxNDA2MDBaFw0yMjA2MjUxNDA2MDBaMGoxCzAJBgNVBAYTAklUMQ8wDQYD +VQQHDAZNaWxhbm8xIzAhBgNVBAoMGkFjdGFsaXMgUy5wLkEuLzAzMzU4NTIwOTY3 +MSUwIwYDVQQDDBxBY3RhbGlzIEF1dGhlbnRpY2F0aW9uIENBIEcxMIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwxyGND8nUkJguitg0CErydfpQHU6bFgP +IzvPhj7UZKtu2urIKtiVRd/JHNIlkp4QmFqLcWnAlen2a2jc97bEDf5u9XA7waSo +TyCiJwuf8RJ1fM+uf17LeAJYKNcvqtugrnQ9fqv26XKhKs/WkGDf4KA1ysDbBMQH +VvxmdYyOehOhPAZrGuZ/OZyI5IRvouJ/a5/sAarSxMuy7Jo9uBcYrB9gmTPm6wXd +zPJpZ7AOvigkQ8stuUeEGfnq5PH1aPSfx3tQUa+i/G93iDG/ktt/nMW1rKEImOdq +M/7RuwDhtwUIr/OmVog2PeOKSuINnYCGZp/UwqNQuhwS14eKMUq4FQIDAQABo0Uw +QzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU +AbvWm1a0fubFWN0smPTKcvZfM4YwDQYJKoZIhvcNAQEFBQADggEBAKEg1suiNG08 +buFV0krQ2bqyN1GIdyfuAkiTRUHidVHyGZQJoPO4fboDgCOgJe8BGbXZGnot40KK +sYYxD5bsZoTyziMSRpZrMV4Guq+jUqpCIKjRrqqb38QXnlNwAbSpGtpoyGMPtlpz +U9FpEQYTUudrqAUxt7D8h0bFdYiB8V94AuefrZy7VO1fmWo31etVsyrAQ2BR3LRx +kiajD8x6PdzAQokXKQhnVGTF+ahEvIRxWJY9Z1d/u6yQs3Eivz66rGYmRRCz8B86 +OmilUDXKtBeRBgEs9w2wcLJbVnW5d5nA2ZWFAi1zZgfJT5kR7lsrqONoIwWo8wQP +BrsfCY7GWx0= +-----END CERTIFICATE----- + +# Actalis Authentication Root CA +-----BEGIN CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== +-----END CERTIFICATE----- + +# AddTrust External CA Root +-----BEGIN CERTIFICATE----- +MIIENjCCAx6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBvMQswCQYDVQQGEwJTRTEU +MBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFkZFRydXN0IEV4dGVybmFs +IFRUUCBOZXR3b3JrMSIwIAYDVQQDExlBZGRUcnVzdCBFeHRlcm5hbCBDQSBSb290 +MB4XDTAwMDUzMDEwNDgzOFoXDTIwMDUzMDEwNDgzOFowbzELMAkGA1UEBhMCU0Ux +FDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5h +bCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9v +dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALf3GjPm8gAELTngTlvt +H7xsD821+iO2zt6bETOXpClMfZOfvUq8k+0DGuOPz+VtUFrWlymUWoCwSXrbLpX9 +uMq/NzgtHj6RQa1wVsfwTz/oMp50ysiQVOnGXw94nZpAPA6sYapeFI+eh6FqUNzX +mk6vBbOmcZSccbNQYArHE504B4YCqOmoaSYYkKtMsE8jqzpPhNjfzp/haW+710LX +a0Tkx63ubUFfclpxCDezeWWkWaCUN/cALw3CknLa0Dhy2xSoRcRdKn23tNbE7qzN +E0S3ySvdQwAl+mG5aWpYIxG3pzOPVnVZ9c0p10a3CitlttNCbxWyuHv77+ldU9U0 +WicCAwEAAaOB3DCB2TAdBgNVHQ4EFgQUrb2YejS0Jvf6xCZU7wO94CTLVBowCwYD +VR0PBAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIwSBkTCBjoAUrb2YejS0 +Jvf6xCZU7wO94CTLVBqhc6RxMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRU +cnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsx +IjAgBgNVBAMTGUFkZFRydXN0IEV4dGVybmFsIENBIFJvb3SCAQEwDQYJKoZIhvcN +AQEFBQADggEBALCb4IUlwtYj4g+WBpKdQZic2YR5gdkeWxQHIzZlj7DYd7usQWxH +YINRsPkyPef89iYTx4AWpb9a/IfPeHmJIZriTAcKhjW88t5RxNKWt9x+Tu5w/Rw5 +6wwCURQtjr0W4MHfRnXnJK3s9EK0hZNwEGe6nQY1ShjTK3rMUUKhemPR5ruhxSvC +Nr4TDea9Y355e6cJDUCrat2PisP29owaQgVR1EX1n6diIWgVIEM8med8vSTYqZEX +c4g/VhsxOBi0cQ+azcgOno4uG+GMmIPLHzHxREzGBHNJdmAPx/i9F4BrLunMTA5a +mnkPIAou1Z5jJh5VkpTYghdae9C8x49OhgQ= +-----END CERTIFICATE----- + +# Admin-Root-CA +-----BEGIN CERTIFICATE----- +MIIFVTCCBD2gAwIBAgIEO/OB0DANBgkqhkiG9w0BAQUFADBsMQswCQYDVQQGEwJj +aDEOMAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZpY2VzMSIwIAYDVQQLExlD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRYwFAYDVQQDEw1BZG1pbi1Sb290LUNB +MB4XDTAxMTExNTA4NTEwN1oXDTIxMTExMDA3NTEwN1owbDELMAkGA1UEBhMCY2gx +DjAMBgNVBAoTBWFkbWluMREwDwYDVQQLEwhTZXJ2aWNlczEiMCAGA1UECxMZQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdGllczEWMBQGA1UEAxMNQWRtaW4tUm9vdC1DQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvgr0QUIv5qF0nyXZ3PXAJi +C4C5Wr+oVTN7oxIkXkxvO0GJToM9n7OVJjSmzBL0zJ2HXj0MDRcvhSY+KiZZc6Go +vDvr5Ua481l7ILFeQAFtumeza+vvxeL5Nd0Maga2miiacLNAKXbAcUYRa0Ov5VZB +++YcOYNNt/aisWbJqA2y8He+NsEgJzK5zNdayvYXQTZN+7tVgWOck16Da3+4FXdy +fH1NCWtZlebtMKtERtkVAaVbiWW24CjZKAiVfggjsiLo3yVMPGj3budLx5D9hEEm +vlyDOtcjebca+AcZglppWMX/iHIrx7740y0zd6cWEqiLIcZCrnpkr/KzwO135GkC +AwEAAaOCAf0wggH5MA8GA1UdEwEB/wQFMAMBAf8wgZkGA1UdIASBkTCBjjCBiwYI +YIV0AREDAQAwfzArBggrBgEFBQcCAjAfGh1UaGlzIGlzIHRoZSBBZG1pbi1Sb290 +LUNBIENQUzBQBggrBgEFBQcCARZEaHR0cDovL3d3dy5pbmZvcm1hdGlrLmFkbWlu +LmNoL1BLSS9saW5rcy9DUFNfMl8xNl83NTZfMV8xN18zXzFfMC5wZGYwfwYDVR0f +BHgwdjB0oHKgcKRuMGwxFjAUBgNVBAMTDUFkbWluLVJvb3QtQ0ExIjAgBgNVBAsT +GUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxETAPBgNVBAsTCFNlcnZpY2VzMQ4w +DAYDVQQKEwVhZG1pbjELMAkGA1UEBhMCY2gwHQYDVR0OBBYEFIKf+iNzIPGXi7JM +Tb5CxX9mzWToMIGZBgNVHSMEgZEwgY6AFIKf+iNzIPGXi7JMTb5CxX9mzWTooXCk +bjBsMQswCQYDVQQGEwJjaDEOMAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZp +Y2VzMSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRYwFAYDVQQD +Ew1BZG1pbi1Sb290LUNBggQ784HQMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0B +AQUFAAOCAQEAeE96XCYRpy6umkPKXDWCRn7INo96ZrWpMggcDORuofHIwdTkgOeM +vWOxDN/yuT7CC3FAaUajbPRbDw0hRMcqKz0aC8CgwcyIyhw/rFK29mfNTG3EviP9 +QSsEbnelFnjpm1wjz4EaBiFjatwpUbI6+Zv3XbEt9QQXBn+c6DeFLe4xvC4B+MTr +a440xTk59pSYux8OHhEvqIwHCkiijGqZhTS3KmGFeBopaR+dJVBRBMoXwzk4B3Hn +0Zib1dEYFZa84vPJZyvxCbLOnPRDJgH6V2uQqbG+6DXVaf/wORVOvF/wzzv0viM/ +RWbEtJZdvo8N3sdtCULzifnxP/V0T9+4ZQ== +-----END CERTIFICATE----- + +# AdminCA-CD-T01 +-----BEGIN CERTIFICATE----- +MIIETTCCAzWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBtMQswCQYDVQQGEwJDSDEO +MAwGA1UEChMFYWRtaW4xETAPBgNVBAsTCFNlcnZpY2VzMSIwIAYDVQQLExlDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0aWVzMRcwFQYDVQQDEw5BZG1pbkNBLUNELVQwMTAe +Fw0wNjAxMjUxMzM2MTlaFw0xNjAxMjUxMjM2MTlaMG0xCzAJBgNVBAYTAkNIMQ4w +DAYDVQQKEwVhZG1pbjERMA8GA1UECxMIU2VydmljZXMxIjAgBgNVBAsTGUNlcnRp +ZmljYXRpb24gQXV0aG9yaXRpZXMxFzAVBgNVBAMTDkFkbWluQ0EtQ0QtVDAxMIIB +IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0jQlMZmpLDhV+GNR9TAoSNle +JgQB4xAXJELQf5/ySMfoFA4MmjKqYXQkB6MGPuQKwR9XRRSPf61vqb8YPsdjRmgp +byHBcUd5t0N8RX6wRZUnPMW+bCCo2VqAU4XFbnlc2gHKaam0wdTtbBTXEkv0ieIH +fxCfFxXqSsSr60IkF/2/xbrAgV/QD5yHk6Ie8feAVWwi5UtaFqtu4LiFEh2QMyxs +Oyz1OcvKzkM2g873tyiE7jzMgZP+Ww3tibk2F9+e6ZeiB37TLOmVtvgpmrws4fiI +rFNXEYSWBVrUTbn81U47yWzOgf5fEHP07bRV5QOCzCm99qNimsbL6CG7nT78CQID +AQABo4H3MIH0MBIGA1UdEwEB/wQIMAYBAf8CAQAwga4GA1UdIASBpjCBozCBoAYI +YIV0AREDFQEwgZMwSAYIKwYBBQUHAgIwPBo6VGhpcyBpcyB0aGUgQWRtaW5DQS1D +RC1UMDEgQ2VydGlmaWNhdGUgUHJhY3RpY2UgU3RhdGVtZW50LjBHBggrBgEFBQcC +ARY7aHR0cDovL3d3dy5wa2kuYWRtaW4uY2gvcG9saWN5L0NQU18yXzE2Xzc1Nl8x +XzE3XzNfMjFfMS5wZGYwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQqxGkKocZV +xgNucM6GgbOkD6oZ2zANBgkqhkiG9w0BAQUFAAOCAQEAn356bbusjI5glGXRQ1DR +v21qQf0S4s3GHyZm7cqdOkFleM70ArBT+kOP5Nm7rlSAFyVgEkmBdOg7s9tlXClU +yeZFnp6UEYRUcijPN8D1VaNRK6PIUObpDBQT0C+kAfxG9z4v29T0SxT4sgAdC/xQ +Fyv58Fp9bPn7owuKwKcyCH1XSyi/Bp4XFELlLOaigBZO/w+dPBz4FcJSdZjU+BaJ +0E3nKAjHlShO5ouBSZnaJz3p+nkw2Wyo36s6GxCK0XbkSP45iniIG4FmwwZkonYF +ypQntHbx2oL7tUQQY0PDo8bGBMcPy/G2j+dciqZRlsnfgMy10SCzQ9MUx92xUG2V +eg== +-----END CERTIFICATE----- + +# AffirmTrust Commercial +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP +Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr +ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL +MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 +yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr +VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ +nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG +XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj +vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt +Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g +N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC +nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= +-----END CERTIFICATE----- + +# AffirmTrust Networking +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y +YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua +kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL +QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp +6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG +yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i +QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO +tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu +QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ +Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u +olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 +x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= +-----END CERTIFICATE----- + +# AffirmTrust Premium +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz +dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG +A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U +cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf +qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ +JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ ++jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS +s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 +HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 +70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG +V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S +qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S +5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia +C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX +OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE +FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 +KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg +Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B +8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ +MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc +0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ +u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF +u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH +YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 +GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO +RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e +KeC2uAloGRwYQw== +-----END CERTIFICATE----- + +# AffirmTrust Premium ECC +-----BEGIN CERTIFICATE----- +MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC +VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ +cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ +BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt +VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D +0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 +ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G +A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs +aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I +flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ== +-----END CERTIFICATE----- + +# Amazon Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGw= +-----END CERTIFICATE----- + +# Amazon Root CA 4 +-----BEGIN CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EA== +-----END CERTIFICATE----- + +# America Online Root Certification Authority 1 +-----BEGIN CERTIFICATE----- +MIIDpDCCAoygAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEc +MBoGA1UEChMTQW1lcmljYSBPbmxpbmUgSW5jLjE2MDQGA1UEAxMtQW1lcmljYSBP +bmxpbmUgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAxMB4XDTAyMDUyODA2 +MDAwMFoXDTM3MTExOTIwNDMwMFowYzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Ft +ZXJpY2EgT25saW5lIEluYy4xNjA0BgNVBAMTLUFtZXJpY2EgT25saW5lIFJvb3Qg +Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMTCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAKgv6KRpBgNHw+kqmP8ZonCaxlCyfqXfaE0bfA+2l2h9LaaLl+lk +hsmj76CGv2BlnEtUiMJIxUo5vxTjWVXlGbR0yLQFOVwWpeKVBeASrlmLojNoWBym +1BW32J/X3HGrfpq/m44zDyL9Hy7nBzbvYjnF3cu6JRQj3gzGPTzOggjmZj7aUTsW +OqMFf6Dch9Wc/HKpoH145LcxVR5lu9RhsCFg7RAycsWSJR74kEoYeEfffjA3PlAb +2xzTa5qGUwew76wGePiEmf4hjUyAtgyC9mZweRrTT6PP8c9GsEsPPt2IYriMqQko +O3rHl+Ee5fSfwMCuJKDIodkP1nsmgmkyPacCAwEAAaNjMGEwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUAK3Zo/Z59m50qX8zPYEX10zPM94wHwYDVR0jBBgwFoAU +AK3Zo/Z59m50qX8zPYEX10zPM94wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB +BQUAA4IBAQB8itEfGDeC4Liwo+1WlchiYZwFos3CYiZhzRAW18y0ZTTQEYqtqKkF +Zu90821fnZmv9ov761KyBZiibyrFVL0lvV+uyIbqRizBs73B6UlwGBaXCBOMIOAb +LjpHyx7kADCVW/RFo8AasAFOq73AI25jP4BKxQft3OJvx8Fi8eNy1gTIdGcL+oir +oQHIb/AUr9KZzVGTfu0uOMe9zkZQPXLjeSWdm4grECDdpbgyn43gKd8hdIaC2y+C +MMbHNYaz+ZZfRtsMRf3zUMNvxsNIrUam4SdHCh0Om7bCd39j8uB9Gr784N/Xx6ds +sPmuujz9dLQR6FgNgLzTqIA6me11zEZ7 +-----END CERTIFICATE----- + +# ApplicationCA2 Root +-----BEGIN CERTIFICATE----- +MIID9zCCAt+gAwIBAgILMTI1MzcyODI4MjgwDQYJKoZIhvcNAQELBQAwWDELMAkG +A1UEBhMCSlAxHDAaBgNVBAoTE0phcGFuZXNlIEdvdmVybm1lbnQxDTALBgNVBAsT +BEdQS0kxHDAaBgNVBAMTE0FwcGxpY2F0aW9uQ0EyIFJvb3QwHhcNMTMwMzEyMTUw +MDAwWhcNMzMwMzEyMTUwMDAwWjBYMQswCQYDVQQGEwJKUDEcMBoGA1UEChMTSmFw +YW5lc2UgR292ZXJubWVudDENMAsGA1UECxMER1BLSTEcMBoGA1UEAxMTQXBwbGlj +YXRpb25DQTIgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKaq +rSVl1gAR1uh6dqr05rRL88zDUrSNrKZPtZJxb0a11a2LEiIXJc5F6BR6hZrkIxCo ++rFnUOVtR+BqiRPjrq418fRCxQX3TZd+PCj8sCaRHoweOBqW3FhEl2LjMsjRFUFN +dZh4vqtoqV7tR76kuo6hApfek3SZbWe0BSXulMjtqqS6MmxCEeu+yxcGkOGThchk +KM4fR8fAXWDudjbcMztR63vPctgPeKgZggiQPhqYjY60zxU2pm7dt+JNQCBT2XYq +0HisifBPizJtROouurCp64ndt295D6uBbrjmiykLWa+2SQ1RLKn9nShjZrhwlXOa +2Po7M7xCQhsyrLEy+z0CAwEAAaOBwTCBvjAdBgNVHQ4EFgQUVqesqgIdsqw9kA6g +by5Bxnbne9owDgYDVR0PAQH/BAQDAgEGMHwGA1UdEQR1MHOkcTBvMQswCQYDVQQG +EwJKUDEYMBYGA1UECgwP5pel5pys5Zu95pS/5bqcMRswGQYDVQQLDBLmlL/lupzo +qo3oqLzln7rnm6QxKTAnBgNVBAMMIOOCouODl+ODquOCseODvOOCt+ODp+ODs0NB +MiBSb290MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAH+aCXWs +B9FydC53VzDCBJzUgKaD56WgG5/+q/OAvdVKo6GPtkxgEefK4WCB10jBIFmlYTKL +nZ6X02aD2mUuWD7b5S+lzYxzplG+WCigeVxpL0PfY7KJR8q73rk0EWOgDiUX5Yf0 +HbCwpc9BqHTG6FPVQvSCLVMJEWgmcZR1E02qdog8dLHW40xPYsNJTE5t8XB+w3+m +Bcx4m+mB26jIx1ye/JKSLaaX8ji1bnOVDMA/zqaUMLX6BbfeniCq/BNkyYq6ZO/i +Y+TYmK5rtT6mVbgzPixy+ywRAPtbFi+E0hOe+gXFwctyTiLdhMpLvNIthhoEdlkf +SUJiOxMfFui61/0= +-----END CERTIFICATE----- + +# Application CA G3 Root +-----BEGIN CERTIFICATE----- +MIIDWjCCAkKgAwIBAgIBMTANBgkqhkiG9w0BAQsFADA+MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxHzAdBgNVBAMTFkFwcGxpY2F0aW9uIENBIEczIFJvb3Qw +HhcNMTQwNjAzMTUwMDAwWhcNMzQwNjAzMTQ1OTU5WjA+MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxHzAdBgNVBAMTFkFwcGxpY2F0aW9uIENBIEczIFJvb3Qw +ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDNRT730ZYiXJEvPgoAA8y2 +92xU/Cg31AQY7K2Yya/Tpbnn2b9O5qOZPJluoSAeRhvidVW80uz2iBrsNEVLg53T +subdB4nBCNn4O4uSZHJdmjvMrTeJx9xgeQjgcKz3K+2fA0kfjj6DqG7iklxU0Xnf +7Bg6fbhtj9ajJU2tH0CmX9SqTrFwGFmZ8gtUaT55KESI93GXzX8F3MrcdkqQTGtg +6PomMdi1+Of8bYskarbvQtcjVMUaY4o7x/yqbTyPy2zaILDyvGUcAUwilQ0cIx+s +1fnOdVvqML1MASQfddRhScMbmWWOCFw5OM0pwzhFzWR5t5tNR+pYMvqm9pLwwbdf +AgMBAAGjYzBhMB0GA1UdDgQWBBSpNSpIviw37YbbfFWHACa+GC1cLjAOBgNVHQ8B +Af8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBSpNSpIviw37Ybb +fFWHACa+GC1cLjANBgkqhkiG9w0BAQsFAAOCAQEAtoK9xUbQcYulkT1+LVr5nIR9 +ByeVHedNyHzs5pPoVhp6MEg7DPpO9Qmyr4itlOz9sq0v5gV0IRuEizgqw+3vRmi1 +3VL6cMJ1T/+jQS48F5RMCSK0jsF/xKas7YNoz2Ve7Hq9xWbu0KN/8lexCMJ5cOty +f0FZCXl18byxIf6Ds0Q9iaO+sXrYncMf5sRU4Y3l2FDc5FY3e74oAPMsd9ojf2CY +PQUW8nhprZnDOnRsPpqylO2PqvZTa+fIt+g8jPvHfE8ZXaRmFel/h6DQ1a0gpEYJ +RazlyGWHuwbf/NdoVkNzogCZMpLCDqAcDpG9lVi8k5+EwqVm52XNKeJi8gWSYA== +-----END CERTIFICATE----- + +# Application CA G4 Root +-----BEGIN CERTIFICATE----- +MIIDZDCCAkygAwIBAgILMaXzypDqI6zSnr0wDQYJKoZIhvcNAQELBQAwPjELMAkG +A1UEBhMCSlAxDjAMBgNVBAoTBUxHUEtJMR8wHQYDVQQDExZBcHBsaWNhdGlvbiBD +QSBHNCBSb290MB4XDTE3MDIxNTE1MDAwMFoXDTM3MDIxNTE0NTk1OVowPjELMAkG +A1UEBhMCSlAxDjAMBgNVBAoTBUxHUEtJMR8wHQYDVQQDExZBcHBsaWNhdGlvbiBD +QSBHNCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr6vH5Yym +WJ4v1gXJkXcwvt4a1A5jYtHMLbHRhjiNHYVmU5+qQWXgWNLlKb6UqJWTPF9qxZuf +NOhtwcbTp+VDoBIwwDk0YAyL9Gj1SN/pjhyuSKe7qj14t+JJu8EjBFobkAHFfatK +AaHCk2rShbO253bra2846yBSMJUI9fks7sjAdbkB7cE3VjBcnX9kwspAILmVhbyl +B30Mvi6h3cYm6SopbJ8omClR6HYTG+8uCzdaM57AJWeqDy2o1JImOAGn0GIYLiI4 +OHgLulKZoXwmArHixeLezooCRISio+mLiGMxyS84AOnEAk0eIycSSNwRsfDS4g4w +Ga8DoQezNZQipQIDAQABo2MwYTAdBgNVHQ4EFgQUbtwKNR8gwuih030FTk9MYOWk +xGcwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU +btwKNR8gwuih030FTk9MYOWkxGcwDQYJKoZIhvcNAQELBQADggEBAFUz1UC3Gn5P +3HSDDkS6P71SlciTliPyAbkU68oSdM1hiDSvTV70WYqrHtjjWcEe+DC1QMa7uK/R +7T9sqnOYguSYNK6SQQ5ZNhq6UBwW9Bc6LBvil2+yr9Ha3hRS34A8x089h566lb14 +vFU8ifYuJtUV5dBAEsWzcT9sZh+j/Eu1TuJu3IAHw/koFHv3XhZqQ6eukQEfT2Wp +SLPObhoGIaTTMYiIpUkRgmvruZ1g/p/+xff4f6s37q/nWEa6CeRdOadLBNgDAslg +Kl5VaRELYHiBevRx9Y9Gro8EqJccgIkjY9v+66YXDlm2LrmG619ebN2B56swgSOQ +J7H3K5A5C7g= +-----END CERTIFICATE----- + +# Atos TrustedRoot 2011 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed +-----END CERTIFICATE----- + +# Australian Defence Public Root CA +-----BEGIN CERTIFICATE----- +MIIEIjCCAwqgAwIBAgIUKeuSM0ZPMkH/gxkAqa3E2fjj4n8wDQYJKoZIhvcNAQEL +BQAwcTELMAkGA1UEBhMCQVUxDDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9EMQww +CgYDVQQLEwNQS0kxDDAKBgNVBAsTA0NBczEqMCgGA1UEAxMhQXVzdHJhbGlhbiBE +ZWZlbmNlIFB1YmxpYyBSb290IENBMB4XDTE2MTEyODIyMjUyOFoXDTM2MTEyODIy +MTM0OFowcTELMAkGA1UEBhMCQVUxDDAKBgNVBAoTA0dPVjEMMAoGA1UECxMDRG9E +MQwwCgYDVQQLEwNQS0kxDDAKBgNVBAsTA0NBczEqMCgGA1UEAxMhQXVzdHJhbGlh +biBEZWZlbmNlIFB1YmxpYyBSb290IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEA005UBBvQ9JuduCOH4CDHnpixcXoGkC7irUj+kwVs7Ia/KECFs0x5 +70dTmBAeVO59eLgYEwxEUv3QgaqTCCM5vl8Pa90ll/MBQt/UgQDEUL56iS0Zr3NK +P8w6wL+iqMUV9z58QXSCay53ZuJqpZGIbgYxp68L5lrgrn1ary9H0PL7hHOcRqEe +hERRxF8u2pACX4HfEQ7S+7s6F3Oj8o1jqk//cnplYoNaKjzyzSwjjc/rIR+/1ANX +9TcWDF7lVxHCqPr/bDnyPVLmtXnAW+Ky6mMgDA6lKl4S4eavX4t8oK05NTWYX/Gv +ONAm0029Ynd1Pa9rFIZ7WvYhj9bq4qcOrQIDAQABo4GxMIGuMA8GA1UdEwEB/wQF +MAMBAf8wSwYDVR0gBEQwQjAGBgRVHSAAMDgGCSokAYJOAQEBBzArMCkGCCsGAQUF +BwIBFh1odHRwOi8vY3JsLmRlZmVuY2UuZ292LmF1L3BraTAOBgNVHQ8BAf8EBAMC +AcYwHwYDVR0jBBgwFoAUrJnhAi/oXEtBtzS4HumbgzYNlLQwHQYDVR0OBBYEFKyZ +4QIv6FxLQbc0uB7pm4M2DZS0MA0GCSqGSIb3DQEBCwUAA4IBAQB4vIFK2DpXu70m +v+oqKPCIivJQTJBn2kv1uBQIutt/cqiaWbzxHImo9DoDEFQTel3G2ro+D4jVatMb +ly1iYTpv+QCvcgZz7BDAYR7MXE8ZMkY4wd0/0jcapY6GoPAJzDXWGQJ8zTn89/kf +55R5Tj23+JdOO0RqzZSwufd+4uP5mX/F06ZQtEn7Fn5OQSzPPsd5QLqBGCYI+cWd +49jxbxxoP2pbdxdSowbeGcJLbqKV/NUIvyy1aTVR4+PfTxopbYN4PTgkygI/VBDh +s2Th1Zre8zf2MxC1drOr18kfUzqtVUEcSMk2nof/ddxp0K/ZelfGyrFD/DmB/Nx6 +o5qlmFBU +-----END CERTIFICATE----- + +# Autoridad Certificadora Raiz de la Secretaria de Economia +-----BEGIN CERTIFICATE----- +MIIFlDCCBHygAwIBAgIBATANBgkqhkiG9w0BAQUFADCCATExFzAVBgNVBAcTDkFs +dmFybyBPYnJlZ29uMRkwFwYDVQQIExBEaXN0cml0byBGZWRlcmFsMQswCQYDVQQG +EwJNWDEOMAwGA1UEERMFMDEwMzAxHTAbBgNVBAkTFEluc3VyZ2VudGVzIFN1ciAx +OTQwMUIwQAYDVQQDEzlBdXRvcmlkYWQgQ2VydGlmaWNhZG9yYSBSYWl6IGRlIGxh +IFNlY3JldGFyaWEgZGUgRWNvbm9taWExNDAyBgNVBAsTK0RpcmVjY2lvbiBHZW5l +cmFsIGRlIE5vcm1hdGl2aWRhZCBNZXJjYW50aWwxHzAdBgNVBAoTFlNlY3JldGFy +aWEgZGUgRWNvbm9taWExJDAiBgkqhkiG9w0BCQEWFWFjcnNlQGVjb25vbWlhLmdv +Yi5teDAeFw0wNTA1MDgwMDAwMDBaFw0yNTA1MDgwMDAwMDBaMIIBMTEXMBUGA1UE +BxMOQWx2YXJvIE9icmVnb24xGTAXBgNVBAgTEERpc3RyaXRvIEZlZGVyYWwxCzAJ +BgNVBAYTAk1YMQ4wDAYDVQQREwUwMTAzMDEdMBsGA1UECRMUSW5zdXJnZW50ZXMg +U3VyIDE5NDAxQjBABgNVBAMTOUF1dG9yaWRhZCBDZXJ0aWZpY2Fkb3JhIFJhaXog +ZGUgbGEgU2VjcmV0YXJpYSBkZSBFY29ub21pYTE0MDIGA1UECxMrRGlyZWNjaW9u +IEdlbmVyYWwgZGUgTm9ybWF0aXZpZGFkIE1lcmNhbnRpbDEfMB0GA1UEChMWU2Vj +cmV0YXJpYSBkZSBFY29ub21pYTEkMCIGCSqGSIb3DQEJARYVYWNyc2VAZWNvbm9t +aWEuZ29iLm14MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwWSg9OdS +cLLqkxP0NTof6jocxRuLWOGW1gJBXo6FQP9BZkBT/Ji10TIyl2dAgJ3uID8OVPtC +B/t3GpnYhvQcKogl8+lEo07+B76xyO88jYfgHspJEDso7yRRofyIF0rnHMhUZ2Po +ajHmQ2z2QBGGxFbuvckdpkY8HkbCgo0uqejudgpD4HJNjPTFBvosAQAzYM44cDRr +FxrremRhp5OkZWrXI8d2epRRC+yeqM87olAyHEK9Y+GHy7mFSA7A1Vi29s5L8gfP +4wTVH8LWo26ju7a3bsTxoh8WvLYtsO/0Wpspjbzh/AdbHgkzgnjMQG1xs2MTL9NM +Nqw5T8bBsLb1hQIDAQABo4GyMIGvMDMGA1UdHwQsMCowKKAmoCSGImh0dHA6Ly9h +Yy5lY29ub21pYS5nb2IubXgvbGFzdC5jcmwwRwYDVR0gBEAwPjA8Bghgg2RlCoI8 +ATAwMC4GCCsGAQUFBwIBFiJodHRwOi8vYWMuZWNvbm9taWEuZ29iLm14L2Nwcy5o +dG1sMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMBEGCWCGSAGG+EIBAQQE +AwIABzANBgkqhkiG9w0BAQUFAAOCAQEATCp4UwSWc2CrNazAxOPnyHClKS+HGOWo +gt4H1Qj0z549nvxKLBZ8n6KdZRDMwRubamfasrMd/81kejhjrUj983Lh+p+7V92/ +zMJU2JU8ZtdrBrqvqeBtCO+ktpA9DG4gF6eWp3xoSpyYxAdvwQJikTibneOKeVOd +nyR2JfatKFYGqu8HrLr2bOQlMX2IgDp4Rvh54TjgE+dhKUfzyxQA09ri3e1z30vy +Y+Qm2HXQTUMUkBaURwH/oVlL5HabWQPe1hf2e9dc+Onjb8hO4EcmseKcfEox5WQR +4LBf2pE2SB/6CYplaPUOwp/vuGrPd/4S7TbaETatGWrC1I5S12jvMQ== +-----END CERTIFICATE----- + +# Autoridad Certificadora Raíz Nacional de Uruguay +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgISAu4Am2bYah1n/tqKJW8hWnUbMA0GCSqGSIb3DQEBCwUA +MFoxOjA4BgNVBAMMMUF1dG9yaWRhZCBDZXJ0aWZpY2Fkb3JhIFJhw616IE5hY2lv +bmFsIGRlIFVydWd1YXkxDzANBgNVBAoTBkFHRVNJQzELMAkGA1UEBhMCVVkwHhcN +MTExMTAzMTUwMjQ5WhcNMzExMDI5MTUwMjQ5WjBaMTowOAYDVQQDDDFBdXRvcmlk +YWQgQ2VydGlmaWNhZG9yYSBSYcOteiBOYWNpb25hbCBkZSBVcnVndWF5MQ8wDQYD +VQQKEwZBR0VTSUMxCzAJBgNVBAYTAlVZMIICIDANBgkqhkiG9w0BAQEFAAOCAg0A +MIICCAKCAgEAl8QfKkShgUtIkXXd69qPyhuL8rQ8LMbl9MEe0bgwE29cn+VRln8a +pBb+0tQdJfbQ5jdgXwCjGansJ79QLQWgXF6T6+No/Zs9uRQ2LeclFRCQGpLJEbEp +l5NWVWKtR6x/1Qx3ltKTaGox3VTvk/IKT6BfAlrvtkQ+55myjkXeoPfA6EiwR+ze +QhTbNXugafwewAEpFtozoSGhMjIQdn2ox8Auc4Nk/Fr3mzaMae0gVSN5zfPzbGtg +XHiN/D2FLLyp93DopcpN2HyY74Z2GITVQCkQJzLn7wNEC0/JKvG2tCug1QOUhCHT +dPMpbXjwBWquAQ9hH8al8MeCFdk7+92LdGnu5MfH9BHcFFHBhBolVhNrW85fLP2L +Gy0PyMBVqhhPmJzPoncItDWV2LmLnEkOtBAL/PxHTdSaV/mfer3pV7u0D18VkNho +bNWFJYMthgxHYpezeU25ZQh3Um9K426AwKyj1bzqSeJl4kxZaoLeK/WqPv5l6FFw +TTeEBgQ/koPUVijjJdVUyoXuVsAuzvlwEBJfXZ7GvEsQHVZtynLBUwkqEz3Ytfkc +O0XGhxTQOH6eIV/8dh3/CylC26HEeTnhTdWGUOPy4LPXWZvePx4aA/PUaYZLRxwy +fzwHCRMQp5sHMHczvGkR0TQ9fBAquB6OvUfe+bJ5VWYhAgf7OSwKF6ECAQOjggFd +MIIBWTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBiBgNVHR8EWzBZ +MCygKqAohiZodHRwOi8vd3d3LmFnZXNpYy5ndWIudXkvYWNybi9hY3JuLmNybDAp +oCegJYYjaHR0cDovL3d3dy51Y2UuZ3ViLnV5L2Fjcm4vYWNybi5jcmwwgbIGA1Ud +IASBqjCBpzBcBgtghlqE4q4dhIgFADBNMEsGCCsGAQUFBwIBFj9odHRwOi8vd3d3 +LnVjZS5ndWIudXkvaW5mb3JtYWNpb24tdGVjbmljYS9wb2xpdGljYXMvY3BfYWNy +bi5wZGYwRwYLYIZahOKuHYSIBQEwODA2BggrBgEFBQcCARYqaHR0cDovL3d3dy5h +Z2VzaWMuZ3ViLnV5L2Fjcm4vY3BzX2Fjcm4ucGRmMB0GA1UdDgQWBBSSnpG4VSg9 +d0IsM6WYX9DJrI21ozANBgkqhkiG9w0BAQsFAAOCAgEAXeerWepJ3L9GQ/2Uu5hw +lBT6zgNd8X0xE5JOhSQwFGts0+fO5nnV205VThcr15NF3xMMJ2cdx0KQVDDG8ahp +KLROpm2lNaZQlmhJo+4vC6v8AwJQaPGVKT5xLNza5S3Zdi7uVjN+F6EnAuGhJygh +ir8B52LHu7IlBNobpiOMfJO6yYvrCvk3t5Q5/U2PfqLcgW8brRQPWyADeEFzZ57S +lxeQKopUS6d5fyQSkZ87LMc3pAxccmoTnjIJJ+tDMnVf10fDKkVTFVZ2T7sJ6IRg +Ee9z1edQbmko/evGy8pOE2MNDjcsMR/bp1igsv0NF4ezkq4bKIAftpJ+hhHh9kyY +f2aLHxNJA0L8+5ic7oaWqS4FfnAcwXfI6V2CuA7OW2QFY+4/Bi02DOkfclserN0m +9Rw4bv2MPU2G6yfLygONQPMq0YrYNA7CrbWI7YeaioWih+/puTjnaJajAc+CPRxL +KJ0n9fmZlntI/azQ8DL3OATdTZmuDpKCw/o8GxPHaLdd4JNGuLi4pAzEG8a6Rpbd +nlUPR532gaWsZVnY3a4GbOBDgsZn2HACNfU2BONKOal1Ah7mP0bPnCwehIgXqiap +pkOA4MBbo2SDm5rtawFltsE9GOyTGWaUqNMRUJl6iH2vPn+UkDsKw2q3jV/Sp1HR +Mh+58jJ9d5NtQ+xBaavPyWE= +-----END CERTIFICATE----- + +# Autoridad de Certificacion Firmaprofesional CIF A62634068 +-----BEGIN CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 +MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc +tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd +IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j +b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC +AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw +ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m +iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF +Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ +hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P +Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE +EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV +1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t +CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR +5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw +f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 +ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK +GbqEZycPvEJdvSRUDewdcAZfpLz6IHxV +-----END CERTIFICATE----- + +# Autoridad de Certificacion Raiz del Estado Venezolano +-----BEGIN CERTIFICATE----- +MIIJmDCCB4CgAwIBAgIBCjANBgkqhkiG9w0BAQwFADCCAR4xPjA8BgNVBAMTNUF1 +dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIFJhaXogZGVsIEVzdGFkbyBWZW5lem9s +YW5vMQswCQYDVQQGEwJWRTEQMA4GA1UEBxMHQ2FyYWNhczEZMBcGA1UECBMQRGlz +dHJpdG8gQ2FwaXRhbDE2MDQGA1UEChMtU2lzdGVtYSBOYWNpb25hbCBkZSBDZXJ0 +aWZpY2FjaW9uIEVsZWN0cm9uaWNhMUMwQQYDVQQLEzpTdXBlcmludGVuZGVuY2lh +IGRlIFNlcnZpY2lvcyBkZSBDZXJ0aWZpY2FjaW9uIEVsZWN0cm9uaWNhMSUwIwYJ +KoZIhvcNAQkBFhZhY3JhaXpAc3VzY2VydGUuZ29iLnZlMB4XDTEwMTIyODE2NDEz +NloXDTMwMTIyMzIzNTk1OVowggEeMT4wPAYDVQQDEzVBdXRvcmlkYWQgZGUgQ2Vy +dGlmaWNhY2lvbiBSYWl6IGRlbCBFc3RhZG8gVmVuZXpvbGFubzELMAkGA1UEBhMC +VkUxEDAOBgNVBAcTB0NhcmFjYXMxGTAXBgNVBAgTEERpc3RyaXRvIENhcGl0YWwx +NjA0BgNVBAoTLVNpc3RlbWEgTmFjaW9uYWwgZGUgQ2VydGlmaWNhY2lvbiBFbGVj +dHJvbmljYTFDMEEGA1UECxM6U3VwZXJpbnRlbmRlbmNpYSBkZSBTZXJ2aWNpb3Mg +ZGUgQ2VydGlmaWNhY2lvbiBFbGVjdHJvbmljYTElMCMGCSqGSIb3DQEJARYWYWNy +YWl6QHN1c2NlcnRlLmdvYi52ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC +ggIBAME77xNS8ZlW47RsBeEaaRZhJoZ4rw785UAFCuPZOAVMqNS1wMYqzy95q6Gk +UO81ER/ugiQX/KMcq/4HBn83fwdYWxPZfwBfK7BP2p/JsFgzYeFP0BXOLmvoJIzl +Jb6FW+1MPwGBjuaZGFImWZsSmGUclb51mRYMZETh9/J5CLThR1exStxHQptwSzra +zNFpkQY/zmj7+YZNA9yDoroVFv6sybYOZ7OxNDo7zkSLo45I7gMwtxqWZ8VkJZkC +8+p0dX6mkhUT0QAV64Zc9HsZiH/oLhEkXjhrgZ28cF73MXIqLx1fyM4kPH1yOJi/ +R72nMwL7D+Sd6mZgI035TxuHXc2/uOwXfKrrTjaJDz8Jp6DdessOkxIgkKXRjP+F +K3ze3n4NUIRGhGRtyvEjK95/2g02t6PeYiYVGur6ruS49n0RAaSS0/LJb6XzaAAe +0mmO2evnEqxIKwy2mZRNPfAVW1l3wCnWiUwryBU6OsbFcFFrQm+00wOicXvOTHBM +aiCVAVZTb9RSLyi+LJ1llzJZO3pq3IRiiBj38Nooo+2ZNbMEciSgmig7YXaUcmud +SVQvLSL+Yw+SqawyezwZuASbp7d/0rutQ59d81zlbMt3J7yB567rT2IqIydQ8qBW +k+fmXzghX+/FidYsh/aK+zZ7Wy68kKHuzEw1Vqkat5DGs+VzAgMBAAGjggLbMIIC +1zASBgNVHRMBAf8ECDAGAQH/AgECMDcGA1UdEgQwMC6CD3N1c2NlcnRlLmdvYi52 +ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAzNi0wMB0GA1UdDgQWBBStuyIdxuDS +Aaj9dlBSk+2YwU2u0zCCAVAGA1UdIwSCAUcwggFDgBStuyIdxuDSAaj9dlBSk+2Y +wU2u06GCASakggEiMIIBHjE+MDwGA1UEAxM1QXV0b3JpZGFkIGRlIENlcnRpZmlj +YWNpb24gUmFpeiBkZWwgRXN0YWRvIFZlbmV6b2xhbm8xCzAJBgNVBAYTAlZFMRAw +DgYDVQQHEwdDYXJhY2FzMRkwFwYDVQQIExBEaXN0cml0byBDYXBpdGFsMTYwNAYD +VQQKEy1TaXN0ZW1hIE5hY2lvbmFsIGRlIENlcnRpZmljYWNpb24gRWxlY3Ryb25p +Y2ExQzBBBgNVBAsTOlN1cGVyaW50ZW5kZW5jaWEgZGUgU2VydmljaW9zIGRlIENl +cnRpZmljYWNpb24gRWxlY3Ryb25pY2ExJTAjBgkqhkiG9w0BCQEWFmFjcmFpekBz +dXNjZXJ0ZS5nb2IudmWCAQowCwYDVR0PBAQDAgEGMDcGA1UdEQQwMC6CD3N1c2Nl +cnRlLmdvYi52ZaAbBgVghl4CAqASDBBSSUYtRy0yMDAwNDAzNi0wMFQGA1UdHwRN +MEswJKAioCCGHmh0dHA6Ly93d3cuc3VzY2VydGUuZ29iLnZlL2xjcjAjoCGgH4Yd +bGRhcDovL2FjcmFpei5zdXNjZXJ0ZS5nb2IudmUwNwYIKwYBBQUHAQEEKzApMCcG +CCsGAQUFBzABhhtodHRwOi8vb2NzcC5zdXNjZXJ0ZS5nb2IudmUwQAYDVR0gBDkw +NzA1BgVghl4BAjAsMCoGCCsGAQUFBwIBFh5odHRwOi8vd3d3LnN1c2NlcnRlLmdv +Yi52ZS9kcGMwDQYJKoZIhvcNAQEMBQADggIBABxZEOVepFHBR7tlsgtV4i+poye8 +4TyKx2wDVqOpKaKbipXYH/e2EmAWvnr0/QOBT/2BgapPgXAeLu/AkhJ7uw+FiMT5 +HUG1uiQqwygmE8r5APvXw1z5aOkbwRgiyaJsZMP4OcNOId3Wwt7ltizJXDjw3l5q +5Cf0uDPEy2GSM1OozPydzVP7KAvv7X+wj3QitjVXgKiuBa4pCjuypP0949TBkPY/ +zrzkRP7RwX4oL/0AJDIgiMRvGHuRDkiQvJZiYIFtFAAaUbq1XWmNYUccLKxORSCp +SEWjh0mjeJDdNkJ/2HZv/W2DAcb5f5ggf5YuImCroifAsDUk0Mm/M5kiUw5uH2JM +JvwkM8rBA8ypF2FjMyTMaEDvr6LihcOIMNNFG+5W6lYKDwpHmzBZ2EnRMJAMJyom +CChcMh8n160LSeUXUWPP5g07YFEavUMJUOaRtWPmZJeqC5cTAQaGXKUflb5Qjguy +0mR/26tM5kPG5IWNav6N/ruUVR6RUycI07pnPTqhycHFFLr5Q1zFjiGMgqL9KjIl +1RaMFVbAmPwuso4ZpBZxw0vdcf5x7CId8MGMmIGHtL8CuMQwMUfCwLCvezNjCt2s +RZvBzICH9NmYXpyG/poE/2ZK/HthVL5XYwUHxqcBdVnkbjk7APSqnfOfiL/P0SUr +339z7RaGqZBlD3Ap +-----END CERTIFICATE----- + +# Autoridad de Certificacion de la Abogacia +-----BEGIN CERTIFICATE----- +MIIEvDCCA6SgAwIBAgIQAJCLMk/BkBrOtMM4Cc3P5DANBgkqhkiG9w0BAQUFADB5 +MQswCQYDVQQGEwJFUzE2MDQGA1UEChMtQ29uc2VqbyBHZW5lcmFsIGRlIGxhIEFi +b2dhY2lhIE5JRjpRLTI4NjMwMDZJMTIwMAYDVQQDEylBdXRvcmlkYWQgZGUgQ2Vy +dGlmaWNhY2lvbiBkZSBsYSBBYm9nYWNpYTAeFw0wNTA2MTMyMjAwMDBaFw0zMDA2 +MTMyMjAwMDBaMHkxCzAJBgNVBAYTAkVTMTYwNAYDVQQKEy1Db25zZWpvIEdlbmVy +YWwgZGUgbGEgQWJvZ2FjaWEgTklGOlEtMjg2MzAwNkkxMjAwBgNVBAMTKUF1dG9y +aWRhZCBkZSBDZXJ0aWZpY2FjaW9uIGRlIGxhIEFib2dhY2lhMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtLJX7oXwI+gN+7KAhPEQZ6uy+UnfXN5b5I8p +GVPJ1egcUGthAoyH8I88wUWSC6yZocYahdY9rX4mph24PbKzPorFCjLTS5HvSXV+ +Vvf+oAhiRivO6vJRn2DeMsjtGqfPdVzrPcC9mkilhpTOWFAU6mrhmvSMZZXhYBUl +lRL2uniLssDt5myXJFod5HRDyjjENZRYjvWKsGg8KCxElgm/CVtyCudnPJC5VDh0 +VLttLWpDyLzvCawfI+hSVl41F18ru17NZVKlFHw7sqrp3Se1NyM7Bg0se4262m9m +F4anttceB10ebBmXyOUjc3jRrvkeuqGuSSLtZXEff/dadESNQwIDAQABo4IBPjCC +ATowNwYDVR0RBDAwLoERYWNAYWNhYm9nYWNpYS5vcmeGGWh0dHA6Ly93d3cuYWNh +Ym9nYWNpYS5vcmcwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwEQYJ +YIZIAYb4QgEBBAQDAgAHMB0GA1UdDgQWBBT8iEyObQShIJDT+Byas2cEX3mAxjCB +qwYDVR0gBIGjMIGgMIGdBgsrBgEEAYGBFQoBATCBjTApBggrBgEFBQcCARYdaHR0 +cDovL3d3dy5hY2Fib2dhY2lhLm9yZy9kb2MwYAYIKwYBBQUHAgIwVBpSQ29uc3Vs +dGUgbGEgZGVjbGFyYWNpb24gZGUgcHJhY3RpY2FzIGRlIGNlcnRpZmljYWNpb24g +ZW4gaHR0cDovL3d3dy5hY2Fib2dhY2lhLm9yZzANBgkqhkiG9w0BAQUFAAOCAQEA +mKf6ObVzESZ/vIk/tGslMzEKhjhryR4VlxTg0kwthfQ8dJuNKBH7zA4muYCDFtH5 +Rpi2RgeOZoVtcMC6TIDzpPDVN1Qrr2aEcnP5SC8JzuGFAcqP4IfeoJfQlLQNtU0O +ZyzIYMQylMBBgQeNur+p6AxAmkJ4BV2B62Ic5E8UCj0LPh/p9M197kW7vN5d85iX +JnvGEyn4K38a1Or6sm4gntoX6qGSvTfpDru7kdUl9mBdhSFQW/9UXfVLO7TDKRFY +AvYl5OGCgruijeeRJF5AkZ5HB4wzV9RiMVF2dYVDbwmrEaUlKbnY/1+l9z/rZTsd +74blFiLVHsoyaX1+BdcwJw== +-----END CERTIFICATE----- + +# Autoridade Certificadora Raiz Brasileira v1 +-----BEGIN CERTIFICATE----- +MIIEgDCCA2igAwIBAgIBATANBgkqhkiG9w0BAQUFADCBlzELMAkGA1UEBhMCQlIx +EzARBgNVBAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25h +bCBkZSBUZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1 +dG9yaWRhZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjEwHhcNMDgw +NzI5MTkxNzEwWhcNMjEwNzI5MTkxNzEwWjCBlzELMAkGA1UEBhMCQlIxEzARBgNV +BAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25hbCBkZSBU +ZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1dG9yaWRh +ZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDOHOi+kzTOybHkVO4J9uykCIWgP8aKxnAwp4CM +7T4BVAeMGSM7n7vHtIsgseL3QRYtXodmurAH3W/RPzzayFkznRWwn5LIVlRYijon +ojQem3i1t83lm+nALhKecHgH+o7yTMD45XJ8HqmpYANXJkfbg3bDzsgSu9H/766z +Yn2aoOS8bn0BLjRg3IfgX38FcFwwFSzCdaM/UANmI2Ys53R3eNtmF9/5Hw2CaI91 +h/fpMXpTT89YYrtAojTPwHCEUJcV2iBL6ftMQq0raI6j2a0FYv4IdMTowcyFE86t +KDBQ3d7AgcFJsF4uJjjpYwQzd7WAds0qf/I8rF2TQjn0onNFAgMBAAGjgdQwgdEw +TgYDVR0gBEcwRTBDBgVgTAEBADA6MDgGCCsGAQUFBwIBFixodHRwOi8vYWNyYWl6 +LmljcGJyYXNpbC5nb3YuYnIvRFBDYWNyYWl6LnBkZjA/BgNVHR8EODA2MDSgMqAw +hi5odHRwOi8vYWNyYWl6LmljcGJyYXNpbC5nb3YuYnIvTENSYWNyYWl6djEuY3Js +MB0GA1UdDgQWBBRCsixcdAEHvpv/VTM77im7XZG/BjAPBgNVHRMBAf8EBTADAQH/ +MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAWWyKdukZcVeD/qf0 +eg+egdDPBxwMI+kkDVHLM+gqCcN6/w6jgIZgwXCX4MAKVd2kZUyPp0ewV7fzq8TD +GeOY7A2wG1GRydkJ1ulqs+cMsLKSh/uOTRXsEhQZeAxi6hQ5GArFVdtThdx7KPoV +caPKdCWCD2cnNNeuUhMC+8XvmoAlpVKeOQ7tOvR4B1/VKHoKSvXQw2f3jFgXbwoA +oyYQtGAiOkpIpdrgqYTeQ9ufQ6c/KARHki/352R1IdJPgc6qPmQO4w6tVZp+lJs0 +wdCuaU4eo9mzh1facMJafYfN+b833u1WNfe3Ig5Pkrg/CN+cnphe8m+5+pss+M1F +2HKyIA== +-----END CERTIFICATE----- + +# Autoridade Certificadora Raiz Brasileira v2 +-----BEGIN CERTIFICATE----- +MIIGoTCCBImgAwIBAgIBATANBgkqhkiG9w0BAQ0FADCBlzELMAkGA1UEBhMCQlIx +EzARBgNVBAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25h +bCBkZSBUZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1 +dG9yaWRhZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjIwHhcNMTAw +NjIxMTkwNDU3WhcNMjMwNjIxMTkwNDU3WjCBlzELMAkGA1UEBhMCQlIxEzARBgNV +BAoTCklDUC1CcmFzaWwxPTA7BgNVBAsTNEluc3RpdHV0byBOYWNpb25hbCBkZSBU +ZWNub2xvZ2lhIGRhIEluZm9ybWFjYW8gLSBJVEkxNDAyBgNVBAMTK0F1dG9yaWRh +ZGUgQ2VydGlmaWNhZG9yYSBSYWl6IEJyYXNpbGVpcmEgdjIwggIiMA0GCSqGSIb3 +DQEBAQUAA4ICDwAwggIKAoICAQC6RqQO3edA8rWgfFKVV0X8bYTzhgHJhQOtmKvS +8l4Fmcm7b2Jn/XdEuQMHPNIbAGLUcCxCg3lmq5lWroG8akm983QPYrfrWwdmlEIk +nUasmkIYMPAkqFFB6quV8agrAnhptSknXpwuc8b+I6Xjps79bBtrAFTrAK1POkw8 +5wqIW9pemgtW5LVUOB3yCpNkTsNBklMgKs/8dG7U2zM4YuT+jkxYHPePKk3/xZLZ +CVK9z3AAnWmaM2qIh0UhmRZRDTTfgr20aah8fNTd0/IVXEvFWBDqhRnLNiJYKnIM +mpbeys8IUWG/tAUpBiuGkP7pTcMEBUfLz3bZf3Gmh3sVQOQzgHgHHaTyjptAO8ly +UN9pvvAslh+QtdWudONltIwa6Wob+3JcxYJU6uBTB8TMEun33tcv1EgvRz8mYQSx +Epoza7WGSxMr0IadR+1p+/yEEmb4VuUOimx2xGsaesKgWhLRI4lYAXwIWNoVjhXZ +fn03tqRF9QOFzEf6i3lFuGZiM9MmSt4c6dR/5m0muTx9zQ8oCikPm91jq7mmRxqE +14WkA2UGBEtSjYM0Qn8xjhEu5rNnlUB+l3pAAPkRbIM4WK0DM1umxMHFsKwNqQbw +pmkBNLbp+JRITz6mdQnsSsU74MlesDL/n2lZzzwwbw3OJ1fsWhto/+xPb3gyPnnF +tF2VfwIDAQABo4H1MIHyME4GA1UdIARHMEUwQwYFYEwBAQAwOjA4BggrBgEFBQcC +ARYsaHR0cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJyL0RQQ2FjcmFpei5wZGYw +PwYDVR0fBDgwNjA0oDKgMIYuaHR0cDovL2FjcmFpei5pY3BicmFzaWwuZ292LmJy +L0xDUmFjcmFpenYyLmNybDAfBgNVHSMEGDAWgBQMOSA6twEfy9cofUGgx/pKrTIk +vjAdBgNVHQ4EFgQUDDkgOrcBH8vXKH1BoMf6Sq0yJL4wDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQADggIBAFmaFGkYbX0pQ3B9 +dpth33eOGnbkqdbLdqQWDEyUEsaQ0YEDxa0G2S1EvLIJdgmAOWcAGDRtBgrmtRBZ +SLp1YPw/jh0YVXArnkuVrImrCncke2HEx5EmjkYTUTe2jCcK0w3wmisig4OzvYM1 +rZs8vHiDKTVhNvgRcTMgVGNTRQHYE1qEO9dmEyS3xEbFIthzJO4cExeWyCXoGx7P +34VQbTzq91CeG5fep2vb1nPSz3xQwLCM5VMSeoY5rDVbZ8fq1PvRwl3qDpdzmK4p +v+Q68wQ2UCzt3h7bhegdhAnu86aDM1tvR3lPSLX8uCYTq6qz9GER+0Vn8x0+bv4q +SyZEGp+xouA82uDkBTp4rPuooU2/XSx3KZDNEx3vBijYtxTzW8jJnqd+MRKKeGLE +0QW8BgJjBCsNid3kXFsygETUQuwq8/JAhzHVPuIKMgwUjdVybQvm/Y3kqPMFjXUX +d5sKufqQkplliDJnQwWOLQsVuzXxYejZZ3ftFuXoAS1rND+Og7P36g9KHj41hJ2M +gDQ/qZXow63EzZ7KFBYsGZ7kNou5uaNCJQc+w+XVaE+gZhyms7ZzHJAaP0C5GlZC +cIf/by0PEf0e//eFMBUO4xcx7ieVzMnpmR6Xx21bB7UFaj3yRd+6gnkkcC6bgh9m +qaVtJ8z2KqLRX4Vv4EadqtKlTlUO +-----END CERTIFICATE----- + +# BYTE Root Certification Authority 001 +-----BEGIN CERTIFICATE----- +MIIFmTCCA4GgAwIBAgIIcYwvOXxAdEAwDQYJKoZIhvcNAQELBQAwWjELMAkGA1UE +BhMCR1IxGzAZBgNVBAoMEkJZVEUgQ29tcHV0ZXIgUy5BLjEuMCwGA1UEAwwlQllU +RSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDAwMTAeFw0xNDA5MTAyMjAx +NTRaFw0zOTA5MTAyMjAxNTRaMFoxCzAJBgNVBAYTAkdSMRswGQYDVQQKDBJCWVRF +IENvbXB1dGVyIFMuQS4xLjAsBgNVBAMMJUJZVEUgUm9vdCBDZXJ0aWZpY2F0aW9u +IEF1dGhvcml0eSAwMDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDt +Ei4Xc55v9POZ6J4IVwk0JBFAH4whfhuvOMPRx+YU5fobul5m9SVp9+3NboJwr7pC +8LEZXCv8RYQYLHoXT2GFRhl8zsGNn1SedyVmD+D2+JLKKc4nVxUqbII4bSfmvk1z +DnOv43E9vAlCD9UNoe19a673wfBszcKXoVj9NRWWF0yfv/XxOUtwt+dKbBw/wXBb +z9aL6+9vMOhfyEZ3IWIWXsZURTn1dLpnJGilcVs+wfsJk+simfjS9XsCbI9Y4qvv +3XQh5CRplEDWwQQYDthC8P3XigXAXxuK6y7ADQcGcwGFjh/BwIqhWKZRuViRQg9u +4bwK6LsogxV15Q3+STApKULCwjb/pDx9Lvfa8qIvFrxhqJlYGKRJxmoHEusbfLTO +5/shgCtwpsjOrVUeHx2E0P1UakxWY8jdfqD5OdvvfFr3jDWlbipW+v7jX5NUcg5o +40krk001IpcUlWZPp3c6LiVM9gmLEhtxxXKnm7m86xygpclUg2HcV1WttebaeCt2 +p/742/6MM6SKo0ZcrbIKEg6K5FCe8LjLmVNMZCFrijgq4IiGANQXrGay574tOynl ++KeU24xY+NJLMJ/yxGJlUEdygM+kcEC2vUT+2b8oKy43x7NRDoIptbFvrX4sk8Cp +f5H6xx818LuXyU9hKJCEQeh9IUDFyYY87ZqthZyiUwIDAQABo2MwYTAdBgNVHQ4E +FgQUtE1mt9OzyJl8ATLQkTr31qgSMd4wDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBS0TWa307PImXwBMtCROvfWqBIx3jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZI +hvcNAQELBQADggIBABwa6wauVb07PzYsYZ7qx1P8cKoyb+RCquu9hewbilrylZYp +oQQGks4kV/9AI3hOyfgwTUJVRE43on1rjmj+Dv5/37CfY1Hz4cWllJ+KIyhI80GL +0v547dnQCA9tfdWdlazV/hJmGuS+dVTz0U2cThPUnnA0bai6CjOIja0FN/5LeX99 +A0F5Ew2fPfc4nDVaRE8+PKLlgcV/X3ZPGztub5ptt+0PyzIfiLRFDJwR0vgEWhM3 +WZiBzkz05ZQoBMS1U8lUjXA/aAHbzBMK5CWjbJntELN6IKlJvAX0+Bto1rogHYJn +ZuCwn1zKNdJFrtWIGdt6BpuMoDeHUSO+Rdpcs39rz8aoHDOKex2R+p687H07RRVP +G6c7NbR581uCUOCcp+0WddtjgGKh2hgCaoDegqpETUQ4KKpu+hhjOWD3QylJWrok +wL+zCpcdZ0laIrJnBJxYqfgMNFxAlrSHtUVhGeWO7wbekRXAuIrKlMkKdX1xO1iB +M8j3B0FVmClDtcuaQ+ly+s/wizG85++5auNBnSE+DRWohb0bToeOR7IQ/jcYaoTl +iRwUY+i5g6m1u+hjmnoZjMt09/gXCPGLGdi07B5uSXM/XCDdNSqWd+lGbxY7y6nv +mwohEcjDpMkjRW0/YpWd0yjHnQ+z/jeNHUiyUOYluU4zYTbWFhzKMjcgdhws +-----END CERTIFICATE----- + +# Baltimore CyberTrust Root +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp +-----END CERTIFICATE----- + +# CAEDICOM Root +-----BEGIN CERTIFICATE----- +MIIFUTCCAzmgAwIBAgIIAPtxJlitmeUwDQYJKoZIhvcNAQELBQAwNjEWMBQGA1UE +AwwNQ0FFRElDT00gUm9vdDEPMA0GA1UECgwGRURJQ09NMQswCQYDVQQGEwJFUzAe +Fw0xNDA1MjExMTA2MzVaFw0zNDA1MjExMDIwMDBaMDYxFjAUBgNVBAMMDUNBRURJ +Q09NIFJvb3QxDzANBgNVBAoMBkVESUNPTTELMAkGA1UEBhMCRVMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDbgMroSXTH0zgu8cUjYvw2jC8efjkL6Qb0 +VZulmCmU7YZHMoPzxZJ6BdcpAj4Wwyh/NWQpenm7oeIeYRSN5wDQ3KJUZYrfablx +R384OBZGp2kxETVM4Sp//21PlT3jXUhNGVMIWmsh1RIwaZeQry3B9X9BX0k2j024 +HhqVX9oPb1wVNcQRvF+Fm72tO1Veu9/Ou69cmWDdH2kaSUgh+QkKz3Kn8PLe5XgZ +vhLdzYd5Qc4vRdcLkRARBB4SnfI4A18Waa6gCtrA+eugDRgPeV6RneQfFJw0ExkC +RLpRw+55smAUo6+8SC0oOGgBQ2TKDoaDYtCKGaYn8St7SykhW5rMaEIQyEtPDyOy +iHzEXG4XcMV3r5XAJaQiCtN8+dhyyNAtvafo0i2LTKFuCvy0QDO7mmv8pOrJ/uA0 +iEPMxrw/ddKlqa/6l7k+t85UoE3AXS7BKNhjVHK4rFr1OvsgYQY69KArOKvMgwxJ +1G4+bQ8+cy825vNPs8AA0UVJW4z2o5gdhH+ZCsPqCjzD0yR4SGf1GzsOHQ5DsQR1 +waA5dov22QKlHeGeWwe7NldKIU35iWm0bA/Xr6AVJJnn+NdTlOwSv6Sl1+3ujjV3 +d9ymfyBUktZj1nKeTSq2j3PzGaHEsB/mNKMLAD6XSSdhqqoEQTM4tVBRzDYV2x// +vcpIg0inswIDAQABo2MwYTAdBgNVHQ4EFgQUFM0qWXhjq2EZ6Lg9oeBawHXn+csw +DwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBQUzSpZeGOrYRnouD2h4FrAdef5 +yzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAD0JGQC2kQJs7A73 +4eJisL8zDf1VEvQImvcrLa73nEfYHwYBE7WO57KCCz2EWUPUB9grXBB6JCzKjejV +ozmcMczr4Drh1b/Px4d7YP9HOdejRNYIJlvPWlTsiNOOD3k8yKNPpsKOJ/DeEq5e +Ga3nIlaKWDLg+QbQqSq0NZsMhiZRAJRHUPylxCVh+VjwRXAuSXZ/EdZvtfkpBeEN +w05YH68d7DfQSvkGBoHT26CWuA6RMHnmUN+IuAupXNQH9MmozH2Pk2MJZAAFKmhm +Q7uiu/6VrvnEpQqIYkh4JXwqPxFkptMiIEedMtby48ikYXTngsJEuqDRXV+88UQO +g08cUIXE6eds/Oa4VeGiGoC3kESnhCKXRyLeqzg3z7XyHD5CcLt1tmUoa8t/gjWq +9vMgeChzB5YwcKUqcVyheaQWuUY9XrQASYWJ0w7fga5YjVjW4cVEeC4cILuiR5e/ +dhQ7qSiPnwt10qE87SvHjpCheqKZMGL8hR01czvztVkiG80IsQyddWrbhTsOh58y +T5IAAQFMSWiCgEFs+f1xvYv0eApgo56xUh3AiuOexb8rGWqYp7HeFVCfqpQlj6mA +gqdyuklkCSdhK268IygzXZ5u8Lm9IDKM3aALmbu0hAQkdSmW96elF7hRBet0rVF5 +lvy7+98JLQiSRM7A0rMYxxQivyHx +-----END CERTIFICATE----- + +# CA Disig +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBATANBgkqhkiG9w0BAQUFADBKMQswCQYDVQQGEwJTSzET +MBEGA1UEBxMKQnJhdGlzbGF2YTETMBEGA1UEChMKRGlzaWcgYS5zLjERMA8GA1UE +AxMIQ0EgRGlzaWcwHhcNMDYwMzIyMDEzOTM0WhcNMTYwMzIyMDEzOTM0WjBKMQsw +CQYDVQQGEwJTSzETMBEGA1UEBxMKQnJhdGlzbGF2YTETMBEGA1UEChMKRGlzaWcg +YS5zLjERMA8GA1UEAxMIQ0EgRGlzaWcwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQCS9jHBfYj9mQGp2HvycXXxMcbzdWb6UShGhJd4NLxs/LxFWYgmGErE +Nx+hSkS943EE9UQX4j/8SFhvXJ56CbpRNyIjZkMhsDxkovhqFQ4/61HhVKndBpnX +mjxUizkDPw/Fzsbrg3ICqB9x8y34dQjbYkzo+s7552oftms1grrijxaSfQUMbEYD +XcDtab86wYqg6I7ZuUUohwjstMoVvoLdtUSLLa2GDGhibYVW8qwUYzrG0ZmsNHhW +S8+2rT+MitcE5eN4TPWGqvWP+j1scaMtymfraHtuM6kMgiioTGohQBUgDCZbg8Kp +FhXAJIJdKxatymP2dACw30PEEGBWZ2NFAgMBAAGjgf8wgfwwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUjbJJaJ1yCCW5wCf1UJNWSEZx+Y8wDgYDVR0PAQH/BAQD +AgEGMDYGA1UdEQQvMC2BE2Nhb3BlcmF0b3JAZGlzaWcuc2uGFmh0dHA6Ly93d3cu +ZGlzaWcuc2svY2EwZgYDVR0fBF8wXTAtoCugKYYnaHR0cDovL3d3dy5kaXNpZy5z +ay9jYS9jcmwvY2FfZGlzaWcuY3JsMCygKqAohiZodHRwOi8vY2EuZGlzaWcuc2sv +Y2EvY3JsL2NhX2Rpc2lnLmNybDAaBgNVHSAEEzARMA8GDSuBHpGT5goAAAABAQEw +DQYJKoZIhvcNAQEFBQADggEBAF00dGFMrzvY/59tWDYcPQuBDRIrRhCA/ec8J9B6 +yKm2fnQwM6M6int0wHl5QpNt/7EpFIKrIYwvF/k/Ji/1WcbvgAa3mkkp7M5+cTxq +EEHA9tOasnxakZzArFvITV734VP/Q3f8nktnbNfzg9Gg4H8l37iYC5oyOGwwoPP/ +CBUz91BKez6jPiCp3C9WgArtQVCwyfTssuMmRAAOb54GvCKWU3BlxFAKRmukLyeB +EicTXxChds6KezfqwzlhA5WYOudsiCUI/HloDYd9Yvi0X/vF2Ey9WLw/Q1vUHgFN +PGO+I++MzVpQuGhU+QqZMxEA4Z7CRneC9VkGjCFMhwnN5ag= +-----END CERTIFICATE----- + +# CA Disig Root R1 +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAMMDmu5QkG4oMA0GCSqGSIb3DQEBBQUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIxMB4XDTEyMDcxOTA5MDY1NloXDTQy +MDcxOTA5MDY1NlowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjEw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqw3j33Jijp1pedxiy3QRk +D2P9m5YJgNXoqqXinCaUOuiZc4yd39ffg/N4T0Dhf9Kn0uXKE5Pn7cZ3Xza1lK/o +OI7bm+V8u8yN63Vz4STN5qctGS7Y1oprFOsIYgrY3LMATcMjfF9DCCMyEtztDK3A +fQ+lekLZWnDZv6fXARz2m6uOt0qGeKAeVjGu74IKgEH3G8muqzIm1Cxr7X1r5OJe +IgpFy4QxTaz+29FHuvlglzmxZcfe+5nkCiKxLU3lSCZpq+Kq8/v8kiky6bM+TR8n +oc2OuRf7JT7JbvN32g0S9l3HuzYQ1VTW8+DiR0jm3hTaYVKvJrT1cU/J19IG32PK +/yHoWQbgCNWEFVP3Q+V8xaCJmGtzxmjOZd69fwX3se72V6FglcXM6pM6vpmumwKj +rckWtc7dXpl4fho5frLABaTAgqWjR56M6ly2vGfb5ipN0gTco65F97yLnByn1tUD +3AjLLhbKXEAz6GfDLuemROoRRRw1ZS0eRWEkG4IupZ0zXWX4Qfkuy5Q/H6MMMSRE +7cderVC6xkGbrPAXZcD4XW9boAo0PO7X6oifmPmvTiT6l7Jkdtqr9O3jw2Dv1fkC +yC2fg69naQanMVXVz0tv/wQFx1isXxYb5dKj6zHbHzMVTdDypVP1y+E9Tmgt2BLd +qvLmTZtJ5cUoobqwWsagtQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUiQq0OJMa5qvum5EY+fU8PjXQ04IwDQYJKoZI +hvcNAQEFBQADggIBADKL9p1Kyb4U5YysOMo6CdQbzoaz3evUuii+Eq5FLAR0rBNR +xVgYZk2C2tXck8An4b58n1KeElb21Zyp9HWc+jcSjxyT7Ff+Bw+r1RL3D65hXlaA +SfX8MPWbTx9BLxyE04nH4toCdu0Jz2zBuByDHBb6lM19oMgY0sidbvW9adRtPTXo +HqJPYNcHKfyyo6SdbhWSVhlMCrDpfNIZTUJG7L399ldb3Zh+pE3McgODWF3vkzpB +emOqfDqo9ayk0d2iLbYq/J8BjuIQscTK5GfbVSUZP/3oNn6z4eGBrxEWi1CXYBmC +AMBrTXO40RMHPuq2MU/wQppt4hF05ZSsjYSVPCGvxdpHyN85YmLLW1AL14FABZyb +7bq2ix4Eb5YgOe2kfSnbSM6C3NQCjR0EMVrHS/BsYVLXtFHCgWzN4funodKSds+x +DzdYpPJScWc/DIh4gInByLUfkmO+p3qKViwaqKactV2zY9ATIKHrkWzQjX2v3wvk +F7mGnjixlAxYjOBVqjtjbZqJYLhkKpLGN/R+Q0O3c+gB53+XD9fyexn9GtePyfqF +a3qdnom2piiZk4hA9z7NUaPK6u95RyG1/jLix8NRb76AdPCkwzryT+lf3xkK8jsT +Q6wxpLPn6/wY1gGp8yqPNg7rtLG8t0zJa7+h89n07eLw4+1knj0vllJPgFOL +-----END CERTIFICATE----- + +# CA Disig Root R2 +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL +-----END CERTIFICATE----- + +# CA WoSign ECC Root +-----BEGIN CERTIFICATE----- +MIICCTCCAY+gAwIBAgIQaEpYcIBr8I8C+vbe6LCQkDAKBggqhkjOPQQDAzBGMQsw +CQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNVBAMT +EkNBIFdvU2lnbiBFQ0MgUm9vdDAeFw0xNDExMDgwMDU4NThaFw00NDExMDgwMDU4 +NThaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRlZDEb +MBkGA1UEAxMSQ0EgV29TaWduIEVDQyBSb290MHYwEAYHKoZIzj0CAQYFK4EEACID +YgAE4f2OuEMkq5Z7hcK6C62N4DrjJLnSsb6IOsq/Srj57ywvr1FQPEd1bPiUt5v8 +KB7FVMxjnRZLU8HnIKvNrCXSf4/CwVqCXjCLelTOA7WRf6qU0NGKSMyCBSah1VES +1ns2o0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUqv3VWqP2h4syhf3RMluARZPzA7gwCgYIKoZIzj0EAwMDaAAwZQIxAOSkhLCB +1T2wdKyUpOgOPQB0TKGXa/kNUTyh2Tv0Daupn75OcsqF1NnstTJFGG+rrQIwfcf3 +aWMvoeGY7xMQ0Xk/0f7qO3/eVvSQsRUR2LIiFdAvwyYua/GRspBl9JrmkO5K +-----END CERTIFICATE----- + +# CA 沃通根证书 +-----BEGIN CERTIFICATE----- +MIIFWDCCA0CgAwIBAgIQUHBrzdgT/BtOOzNy0hFIjTANBgkqhkiG9w0BAQsFADBG +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxGzAZBgNV +BAMMEkNBIOayg+mAmuagueivgeS5pjAeFw0wOTA4MDgwMTAwMDFaFw0zOTA4MDgw +MTAwMDFaMEYxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFXb1NpZ24gQ0EgTGltaXRl +ZDEbMBkGA1UEAwwSQ0Eg5rKD6YCa5qC56K+B5LmmMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA0EkhHiX8h8EqwqzbdoYGTufQdDTc7WU1/FDWiD+k8H/r +D195L4mx/bxjWDeTmzj4t1up+thxx7S8gJeNbEvxUNUqKaqoGXqW5pWOdO2XCld1 +9AXbbQs5uQF/qvbW2mzmBeCkTVL829B0txGMe41P/4eDrv8FAxNXUDf+jJZSEExf +v5RxadmWPgxDT74wwJ85dE8GRV2j1lY5aAfMh09Qd5Nx2UQIsYo06Yms25tO4dnk +UkWMLhQfkWsZHWgpLFbE4h4TV2TwYeO5Ed+w4VegG63XX9Gv2ystP9Bojg/qnw+L +NVgbExz03jWhCl3W6t8Sb8D7aQdGctyB9gQjF+BNdeFyb7Ao65vh4YOhn0pdr8yb ++gIgthhid5E7o9Vlrdx8kHccREGkSovrlXLp9glk3Kgtn3R46MGiCWOc76DbT52V +qyBPt7D3h1ymoOQ3OMdc4zUPLK2jgKLsLl3Az+2LBcLmc272idX10kaO6m1jGx6K +yX2m+Jzr5dVjhU1zZmkR/sgO9MHHZklTfuQZa/HpelmjbX7FF+Ynxu8b22/8DU0G +AbQOXDBGVWCvOGU6yke6rCzMRh+yRpY/8+0mBe53oWprfi1tWFxK1I5nuPHa1UaK +J/kR8slC/k7e3x9cxKSGhxYzoacXGKUN5AXlK8IrC6KVkLn9YDxOiT7nnO4fuwEC +AwEAAaNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFOBNv9ybQV0T6GTwp+kVpOGBwboxMA0GCSqGSIb3DQEBCwUAA4ICAQBqinA4 +WbbaixjIvirTthnVZil6Xc1bL3McJk6jfW+rtylNpumlEYOnOXOvEESS5iVdT2H6 +yAa+Tkvv/vMx/sZ8cApBWNromUuWyXi8mHwCKe0JgOYKOoICKuLJL8hWGSbueBwj +/feTZU7n85iYr83d2Z5AiDEoOqsuC7CsDCT6eiaY8xJhEPRdF/d+4niXVOKM6Cm6 +jBAyvd0zaziGfjk9DgNyp115j0WKWa5bIW4xRtVZjc8VX90xJc/bYNaBRHIpAlf2 +ltTW/+op2znFuCyKGo3Oy+dCMYYFaA6eFN0AkLppRQjbbpCBhqcqBT/mhDn4t/lX +X0ykeVoQDF7Va/81XwVRHmyjdanPUIPTfPRm94KNPQx96N97qA4bLJyuQHCH2u2n +FoJavjVsIE4iYdm8UXrNemHcSxH5/mc0zy4EZmFcV5cjjPOGG0jfKq+nwf/Yjj4D +u9gqsPoUJbJRa4ZDhS4HIxaAjUz7tGM7zMN07RujHv41D198HRaG9Q7DlfEvr10l +O1Hm13ZBONFLAzkopR6RctR9q5czxNM+4Gm2KHmgCY0c0f9BckgG/Jou5yD5m6Le +ie2uPAmvylezkolwQOQvT8Jwg0DXJCxr5wkf09XHwQj02w47HAcLQxGEIYbpgNR1 +2KvxAmLBsX5VYc8T1yaw15zLKYs4SgsOkI26oQ== +-----END CERTIFICATE----- + +# CCA India 2011 +-----BEGIN CERTIFICATE----- +MIIDIzCCAgugAwIBAgICJ44wDQYJKoZIhvcNAQELBQAwOjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEXMBUGA1UEAxMOQ0NBIEluZGlhIDIwMTEwHhcN +MTEwMzExMDY0ODUyWhcNMTYwMzExMDY0ODUyWjA6MQswCQYDVQQGEwJJTjESMBAG +A1UEChMJSW5kaWEgUEtJMRcwFQYDVQQDEw5DQ0EgSW5kaWEgMjAxMTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBAIcKHg65oKggmBq4ehX2R/G/0sYn5BJq +lgRndc2MxuP03crVxBw17k3p5CLUlzjXrGNpSMB8eWK/xyJJW0bB8RgUThgdLKVa +kriFFa8XVhOOnxYOIpaBhHkjQuxP3q/2v4lPAF7m1wjSlZSaEywEEYPvkY8IVax6 +VkSbxfTUF+vkd02U4UFYEemiqgmGLSYhIPXAzMMVzEwJu93c9VIDeWCPPHk6JTQj +h0h18kFwTRowCIZ1zlgZqNcVfiPy50m+//5XUnhC8yZ33Xr3YuXLXZYzlJO7xBoW +rwhX65zl9yN0jekdC7GKlHOZEZHFaKDxig2BrbRRaG5JhgAGUk4pQ+cCAwEAAaMz +MDEwDwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQITQeoY/LbHN8wCwYDVR0PBAQD +AgEGMA0GCSqGSIb3DQEBCwUAA4IBAQBuFNog8khrZP8qdM1WtcU5D35hHzVZGx0o +bSN0nXi/q62JALlwhfXoFD7k7J+WZFzSsSIgowic6AxLaCiOVQW/PuBO2tic0G4g +7P56O8I2R5fYKwizrsLR5gg/Sug6P1b14OU/8mm2eRLg8Dm3GOzS6YQOGDgWikk7 +b1fVOTu/E/DAp83yPR5skad3Y7yr2VY4D0q5GcArjPuXH8an7IbO043j0ft10fH3 +pmPEz+ixpJJFaPLojLGtfi0g+7ilVO3KDY8yHWimMW6wyJ7V+r8Gm28pfXoDSb8r +e1mTFMXqy/FMKYIOKe6KVHw8zVWCJXIOcU4leE3TTllAys7zmdGi +-----END CERTIFICATE----- + +# CCA India 2015 SPL +-----BEGIN CERTIFICATE----- +MIIDKzCCAhOgAwIBAgICJ7UwDQYJKoZIhvcNAQELBQAwPjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEbMBkGA1UEAxMSQ0NBIEluZGlhIDIwMTUgU1BM +MB4XDTE1MDEyOTExMzY0M1oXDTI1MDEyOTExMzY0M1owPjELMAkGA1UEBhMCSU4x +EjAQBgNVBAoTCUluZGlhIFBLSTEbMBkGA1UEAxMSQ0NBIEluZGlhIDIwMTUgU1BM +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAl9c2iT03QQ6RP2sgX/w6 +fjtaXS/DDIdTPBiiyGFzDQgOVh7SbmClV2Xc/s9Qhg9aTqtiiwTKVu/h0Z6udK2q ++j9BWNFVcHA+RckbgHP8CIjki3KoCrUpV7CtCpFBGpxfUH2sFxolWyHwlSvn3zes +NPMHsPEdwRPvey46xalhkLJ4X1RQPLNaVWO2yxCjb/sN9Lbv5gjeohC/dpd/6tmW +0dTDcwJxtKmwrKwfFyClR0bWRAI4mb7LFHj+5l/Ef91v6apHFJAR2B2AwBXUjKCZ +4xkOCg/MGgic1FMHAOAfSb+CgkzPm9hu09QRABJsD31gZ0qMUNvyL+C5eYeDw1zC +OQIDAQABozMwMTAPBgNVHRMBAf8EBTADAQH/MBEGA1UdDgQKBAhMEXCqj90fBzAL +BgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAC28jBXKNO1MKCK74VMlSzqX +qe0moqSrTfsKEm7nNeZnDhiBYjalzMLfGuVoAYFOs5nURxUSnXbpoaYTHbD/fbtX +4+9Zm8g7UGnGYzqsoMHlkOhkKVxIQWk3rDu73eNVxteSDZWDsChXwqOplqfK3kwe +mv8+pS4nXttmZyeF76uKXHN8iM1HZvCdg8yEj+Ip9B9Bb7f1IQ31lFZR4/z/E1i3 +nwPuKZ/SAbBinpS9GYZaQ/pqiYGw6lwYh8qAlfvtAb8RGt+VFK4u4q/NkZC6syfD +bxDY2Q60pXRsgbdfGcz+J06zRZhYGJxXxJJyEs+ngjnV4RCXCoYwRYVjqGtNmvw= +-----END CERTIFICATE----- + +# CFCA EV ROOT +-----BEGIN CERTIFICATE----- +MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD +TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx +MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j +aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP +T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 +sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL +TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 +/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp +7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz +EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt +hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP +a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot +aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg +TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV +PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv +cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL +tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB +ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT +ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL +jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS +ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy +P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 +xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d +Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN +5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe +/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z +AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ +5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su +-----END CERTIFICATE----- + +# CFCA GT CA +-----BEGIN CERTIFICATE----- +MIIDHzCCAgegAwIBAgIEGZk8PzANBgkqhkiG9w0BAQUFADAiMQswCQYDVQQGEwJD +TjETMBEGA1UEChMKQ0ZDQSBHVCBDQTAeFw0xMTA2MTMwODE1MDlaFw0yNjA2MDkw +ODE1MDlaMCIxCzAJBgNVBAYTAkNOMRMwEQYDVQQKEwpDRkNBIEdUIENBMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv3PGWiuMePZYt/zSF5ClK3TsgSyT +zVLMbuQqyyShMeStMG7jmCIx1yGbn9UPNy9auziit3kmZ9YNxRcqnLlUBOENdYZu +2MzFgGcbyIwtACaGPHp5Prapwk4gsDeXxoV2EoIK51S7i/49ruPsa1hD9qU361ii +vZDE5fvKa8owbLd7ifYx0oz/T8KWJUOpcTUlCxjhrMijJLZxk4zxXfycEAV7/8Bb +4LGXrR/Y/kX1wB+dW0c5HAb622aF2yQj6nvSOSD46yqyGlHzlFooAk6nXEduz/zZ +6OZhWhYnxxUNmNno0wM1kCnfsi+NEHcjyLh60xFhavP/gZKl7EJLaE6A1wIDAQAB +o10wWzAfBgNVHSMEGDAWgBSMdlDOJdN5Kzz0bZ2a4Z4FT+g9JTAMBgNVHRMEBTAD +AQH/MAsGA1UdDwQEAwIBxjAdBgNVHQ4EFgQUjHZQziXTeSs89G2dmuGeBU/oPSUw +DQYJKoZIhvcNAQEFBQADggEBAL67lljU3YmJDyzN+mNFdg05gJqN+qhFYT0hVejO +aMcZ6cKxB8KLOy/PYYWQp1IXMjqvCgUVyMbO3Y6UJgb40GDus27UDbpa3augfFBy +ptWQk1bXWTnb6H+zlXhTgVJSX/SSgQLB+yK50QNXp37L+8BGvBN0TCgrdpJpH8FQ +kRHFTN4LlIwXg4yvN4e06mtvolo1QWGFL5wXwPu5DqJhBkd2vJAJmHQN0ggvveQN +cvGmX8N8wH3qvNOrIJHLXAWMnag1+jZWuwnzhF3W8eIsntl+8YKg4bcvfu35e6AA +uLLeHXnhgfNSWZoUXefCEfOawzp4I75OZt6kOWnymDosCgA= +-----END CERTIFICATE----- + +# CHAMBERS OF COMMERCE ROOT - 2016 +-----BEGIN CERTIFICATE----- +MIIG4DCCBMigAwIBAgIINJotoYIGsrMwDQYJKoZIhvcNAQELBQAwggEMMQswCQYD +VQQGEwJFUzEPMA0GA1UECAwGTUFEUklEMQ8wDQYDVQQHDAZNQURSSUQxOjA4BgNV +BAsMMXNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2Fk +ZHJlc3MxKTAnBgNVBAsMIENIQU1CRVJTIE9GIENPTU1FUkNFIFJPT1QgLSAyMDE2 +MRIwEAYDVQQFEwlBODI3NDMyODcxGDAWBgNVBGEMD1ZBVEVTLUE4Mjc0MzI4NzEb +MBkGA1UECgwSQUMgQ0FNRVJGSVJNQSBTLkEuMSkwJwYDVQQDDCBDSEFNQkVSUyBP +RiBDT01NRVJDRSBST09UIC0gMjAxNjAeFw0xNjA0MTQwNzM1NDhaFw00MDA0MDgw +NzM1NDhaMIIBDDELMAkGA1UEBhMCRVMxDzANBgNVBAgMBk1BRFJJRDEPMA0GA1UE +BwwGTUFEUklEMTowOAYDVQQLDDFzZWUgY3VycmVudCBhZGRyZXNzIGF0IHd3dy5j +YW1lcmZpcm1hLmNvbS9hZGRyZXNzMSkwJwYDVQQLDCBDSEFNQkVSUyBPRiBDT01N +RVJDRSBST09UIC0gMjAxNjESMBAGA1UEBRMJQTgyNzQzMjg3MRgwFgYDVQRhDA9W +QVRFUy1BODI3NDMyODcxGzAZBgNVBAoMEkFDIENBTUVSRklSTUEgUy5BLjEpMCcG +A1UEAwwgQ0hBTUJFUlMgT0YgQ09NTUVSQ0UgUk9PVCAtIDIwMTYwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDqxqSh1K2Zlsmf9bxQAPQsz/J46PIsAifW +g4wEq9MOe1cgydSvZfSH3TAI185Bo3YK24pG5Kb97QjOcD/6EGB5TGuBVIBV5Od6 +IbZ1mtxe9g6Z/PjC30GOL6vHW20cUFnA7eisgkL+ua8vDEFRnL0AbmRRsjvlNquV +kRL7McdzrBzYZXY7zhtMTrAfIAb7ULT7m6F5jhaV45/rGEuEqzmTzTeD0Ol8CyeP +7UII6YZGMqyaJmlwYS0YvT9Q8J72aFBOaZVwwe2TqZdOKaK63cKfbkkIK6P6I/Ep +XrB9MVmb7YzNpm74+PfYGOjaVulI8kB0fp7NIK8UJFnudzWFv0qZSql13bMm4wbO +fW9LZKN2NBk+FG+FVDjiiy1AtWRmH1czHHDNw7QoWhQjXPy4vbP+OxJf9rmMHciU +Clbbcn7vJwcNALS/fZk/TUWzm/cdGdBPBPrHc5SIfYsUKpng6ZmSCcbWAWu38NtD +V2Ibx0RS4pdjus/qzmDmCuUYaC0zgHWgMAdo9tX3Eyw6sJ7oWFVujFZETUMXQQLM +d9xfRQVZz81g07/S9uL01dyHcTMHGvVvtH89l/tfZPRODgBECenr7D5xGQQXOUhg +uEv/XshlmSumMvJbhqid6CN0EHjvyyedMbpgi04GUOJQHQdgwkGMFbRbNxwK5QkZ +cgSKPOMB2wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSeLmVP +Plf1q32WxovfszVtSuieizAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQAD +ggIBAAVpKoWXJlC6QjkckyzST1vRXUQm2m9pK7V7ntD0Si5Ix+x/n8pZerlE9z69 +91BrUZ90/5AaQNCTeZIPiiNei6+BC9CLrWbgKtyaKb012GxAFElCPYkvupsrOLwa +owu3iNetxhQM7nxJrK7s8j0YT4xtFF0Oqrffd6s7j2JOiwxlxhmOzcAMoXeqtN16 +pxMF5jkYx5VkfgO2i5DB5V8AI5jmc9oR0hD/HlMiJ8fTAckvxTsybvDDOMoSZ7y6 +Iym7xJVJWgbd1FqQ1BNt59XCfOJYBMDsxL2iPH7GI4F1fKtwXzSElfez1UeWT3HK +eDIIILRCpEJr1SWcsifrwQ5HRAnhKw/QIzZuHLm6TqzM8AyUzkEPa90P1cjgF4ve +Ol1Svul1JR26BQfaVhk8jdHX8VE22ZLvonhRBVi9UswKXm+v2tDlDNtswSPvOTF3 +FwcAjPa6D3D5vL7h5H3hzER6pCHsRz+o1hWl7AGpyHDomGcdvVlUfqFXFTUHxXLJ +Prcpho2f2jJ5MtzbqOUJ/+9WKv6TsY4qE+2toitrLwTezS+SktY+YLV4AZUHCKls +4xza++WbI1YgW+nQXMZKJDu847YiFiqEkv+o/pe/o53bYV7uGSos1+sNdlY4dX5J +AJNXyfwjWvz08d8qnbCMafQQo1WdcDwi/wfWK7aZwJfQ9Cqg +-----END CERTIFICATE----- + +# CISRCA1 +-----BEGIN CERTIFICATE----- +MIIFojCCA4qgAwIBAgIGC4LclDN2MA0GCSqGSIb3DQEBCwUAMHAxCzAJBgNVBAYT +AkNBMSswKQYDVQQKEyJDYXJpbGxvbiBJbmZvcm1hdGlvbiBTZWN1cml0eSBJbmMu +MSIwIAYDVQQLExlDZXJ0aWZpY2F0aW9uIEF1dGhvcml0aWVzMRAwDgYDVQQDEwdD +SVNSQ0ExMB4XDTEyMTAxNjE4MjgzM1oXDTMyMTAxNjE4MjgzM1owcDELMAkGA1UE +BhMCQ0ExKzApBgNVBAoTIkNhcmlsbG9uIEluZm9ybWF0aW9uIFNlY3VyaXR5IElu +Yy4xIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxEDAOBgNVBAMT +B0NJU1JDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDEdvFial/N +Kc0ENn9uYX5z9J1m3yJamoNEgWb9ThGwPqzoiLJTOf/jur7U/9OF2L1br2hPM6y4 +FH0SW3qVa8c2/iuP9IhgiTqqWThMwV1VgaXf2B8xetOjTvBRy8Mxh64L3speG6F0 +OPCSd3E8yxN+oMEKmL3YuPhUNJhOZxaaV0smhl8bZnKqwfJogp1YQXxxIuLPATH+ +4uBWqWjgrTOvNTkunG4GTPMjdi9pJugFOWm39Uga99/ZOTcyVREnBIEfnTyLjINS +d8GuLM0rKkrlLfEZabqHXoud4HHIdNLN7m44N2pdGQDSdt2i6247qh31NgZPX15s +whDz3W+12nla/tVGRDRIr4YANHwkhN1FkPkWgqyokdTpRjNvfrpHH+Hvr+VQ1sb5 +p+1sl6orKU5dxfge9nTJqyT4DVPHaBW+/FyrPXIL0nAEtxbjaanxZ7rGAEx7gDQ1 +Ll7tH6Al96WCahB/v49Zb8NGpspCTkIjhQY5NYy18dfBI0JF/S8lcfjzB9MHaL7b +mGwq9qVH97BlYK2ufOYRHSdUCGWw2ILAYWvpfo8i1nEda0EgZdhXmh98DlpU4JSw +bXXvKDI1PFXDbWf4JL37QPNanTbZNUy74mvZsTYP5G8gGsVvesOROa+vzPP2vSCG +utMkITwfNynmn/wav5jfPLogIRKpwjoqkwIDAQABo0IwQDAdBgNVHQ4EFgQU6pUV +2lw5AOKa28S6LWf6ofd1NO0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AcYwDQYJKoZIhvcNAQELBQADggIBADXQ2Lie8gn48J+ybkiy1+qhmyiJOc3+Fmod +6ZyCX1FHOvWe0byuH5/iXErI7O1GQvF8QwcV326X9u2G/J/FCF6CDqMuqAouvI4b +MRIo9nkowSK20ZVpQOhZCSeikWR26tATjXD8ZcNvEZ8qSMqnYvWDFOUaFseRi7QJ +xc574+QdbZei6csmHmu03D6Ddi9eTahoiVT9TtJGqED22Mp4zzYaPVlljJv1Kx9M +gt94eE0mSkdprW8zHwMeIk7ZBlmeRvxQNV/GhRvkG/gAyeDTOqsmQ81H+lr4hQvH +Mtq1DS0wKTp5sxTppQ9wJdGNCVCU7U2SnjA3QNtaeEmPDzkvvS7XqwiUySmK992M +vYJ8MFti6DVGVjhdkfYOb4zulZ/9dJ3t7RCrzouPt61/TWlJ8McRVZuagvei+jPy +RBH6FUtGqZtrl0LWtLcJERR5U6bnfy0nOgo0JETOVYx6gHVzAkvi+kaUfTMUDUJW +uaDmL4VIkZ9EuqEoqbEfiXomClNchbl8hJiMKGCltnqNPaAAPdx/qkjpqC6sX96H +LVykaxbqveiVtc54CfhxNuWQaNIHlrq8AIsOmG1NcFPAw8wbE5xImpk9EsAnjmGS +TGhSb40DHIn104bA/3FJTyBr/dFvkST18UcjTVnf0L1JQv1AOD7i8QVcJegQ5FoC +A+O7fCUq +-----END CERTIFICATE----- + +# CNNIC ROOT +-----BEGIN CERTIFICATE----- +MIIDVTCCAj2gAwIBAgIESTMAATANBgkqhkiG9w0BAQUFADAyMQswCQYDVQQGEwJD +TjEOMAwGA1UEChMFQ05OSUMxEzARBgNVBAMTCkNOTklDIFJPT1QwHhcNMDcwNDE2 +MDcwOTE0WhcNMjcwNDE2MDcwOTE0WjAyMQswCQYDVQQGEwJDTjEOMAwGA1UEChMF +Q05OSUMxEzARBgNVBAMTCkNOTklDIFJPT1QwggEiMA0GCSqGSIb3DQEBAQUAA4IB +DwAwggEKAoIBAQDTNfc/c3et6FtzF8LRb+1VvG7q6KR5smzDo+/hn7E7SIX1mlwh +IhAsxYLO2uOabjfhhyzcuQxauohV3/2q2x8x6gHx3zkBwRP9SFIhxFXf2tizVHa6 +dLG3fdfA6PZZxU3Iva0fFNrfWEQlMhkqx35+jq44sDB7R3IJMfAw28Mbdim7aXZO +V/kbZKKTVrdvmW7bCgScEeOAH8tjlBAKqeFkgjH5jCftppkA9nCTGPihNIaj3XrC +GHn2emU1z5DrvTOTn1OrczvmmzQgLx3vqR1jGqCA2wMv+SYahtKNu6m+UjqHZ0gN +v7Sg2Ca+I19zN38m5pIEo3/PIKe38zrKy5nLAgMBAAGjczBxMBEGCWCGSAGG+EIB +AQQEAwIABzAfBgNVHSMEGDAWgBRl8jGtKvf33VKWCscCwQ7vptU7ETAPBgNVHRMB +Af8EBTADAQH/MAsGA1UdDwQEAwIB/jAdBgNVHQ4EFgQUZfIxrSr3991SlgrHAsEO +76bVOxEwDQYJKoZIhvcNAQEFBQADggEBAEs17szkrr/Dbq2flTtLP1se31cpolnK +OOK5Gv+e5m4y3R6u6jW39ZORTtpC4cMXYFDy0VwmuYK36m3knITnA3kXr5g9lNvH +ugDnuL8BV8F3RTIMO/G0HAiw/VGgod2aHRM2mm23xzy54cXZF/qD1T0VoDy7Hgvi +yJA/qIYM/PmLXoXLT1tLYhFHxUV8BS9BsZ4QaRuZluBVeftOhpm4lNqGOGqTo+fL +buXf6iFViZx9fX+Y9QCJ7uOEwFyWtcVG6kbghVW2G8kS1sHNzYDzAgE8yGnLRUhj +2JTQ7IUOO04RZfSCjKY9ri4ilAnIXOo8gV0WKgOXFlUJ24pBgp5mmxE= +-----END CERTIFICATE----- + +# COMODO Certification Authority +-----BEGIN CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZQ== +-----END CERTIFICATE----- + +# COMODO ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= +-----END CERTIFICATE----- + +# COMODO RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190 +-----END CERTIFICATE----- + +# Certification Authority of WoSign +-----BEGIN CERTIFICATE----- +MIIFdjCCA16gAwIBAgIQXmjWEXGUY1BWAGjzPsnFkTANBgkqhkiG9w0BAQUFADBV +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxKjAoBgNV +BAMTIUNlcnRpZmljYXRpb24gQXV0aG9yaXR5IG9mIFdvU2lnbjAeFw0wOTA4MDgw +MTAwMDFaFw0zOTA4MDgwMTAwMDFaMFUxCzAJBgNVBAYTAkNOMRowGAYDVQQKExFX +b1NpZ24gQ0EgTGltaXRlZDEqMCgGA1UEAxMhQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkgb2YgV29TaWduMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAvcqN +rLiRFVaXe2tcesLea9mhsMMQI/qnobLMMfo+2aYpbxY94Gv4uEBf2zmoAHqLoE1U +fcIiePyOCbiohdfMlZdLdNiefvAA5A6JrkkoRBoQmTIPJYhTpA2zDxIIFgsDcScc +f+Hb0v1naMQFXQoOXXDX2JegvFNBmpGN9J42Znp+VsGQX+axaCA2pIwkLCxHC1l2 +ZjC1vt7tj/id07sBMOby8w7gLJKA84X5KIq0VC6a7fd2/BVoFutKbOsuEo/Uz/4M +x1wdC34FMr5esAkqQtXJTpCzWQ27en7N1QhatH/YHGkR+ScPewavVIMYe+HdVHpR +aG53/Ma/UkpmRqGyZxq7o093oL5d//xWC0Nyd5DKnvnyOfUNqfTq1+ezEC8wQjch +zDBwyYaYD8xYTYO7feUapTeNtqwylwA6Y3EkHp43xP901DfA4v6IRmAR3Qg/UDar +uHqklWJqbrDKaiFaafPz+x1wOZXzp26mgYmhiMU7ccqjUu6Du/2gd/Tkb+dC221K +mYo0SLwX3OSACCK28jHAPwQ+658geda4BmRkAjHXqc1S+4RFaQkAKtxVi8QGRkvA +Sh0JWzko/amrzgD5LkhLJuYwTKVYyrREgk/nkR4zw7CT/xH8gdLKH3Ep3XZPkiWv +HYG3Dy+MwwbMLyejSuQOmbp8HkUff6oZRZb9/D0CAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOFmzw7R8bNLtwYgFP6H +EtX2/vs+MA0GCSqGSIb3DQEBBQUAA4ICAQCoy3JAsnbBfnv8rWTjMnvMPLZdRtP1 +LOJwXcgu2AZ9mNELIaCJWSQBnfmvCX0KI4I01fx8cpm5o9dU9OpScA7F9dY74ToJ +MuYhOZO9sxXqT2r09Ys/L3yNWC7F4TmgPsc9SnOeQHrAK2GpZ8nzJLmzbVUsWh2e +JXLOC62qx1ViC777Y7NhRCOjy+EaDveaBk3e1CNOIZZbOVtXHS9dCF4Jef98l7VN +g64N1uajeeAz0JmWAjCnPv/So0M/BVoG6kQC2nz4SNAzqfkHx5Xh9T71XXG68pWp +dIhhWeO/yloTunK0jF02h+mmxTwTv97QRCbut+wucPrXnbes5cVAWubXbHssw1ab +R80LzvobtCHXt2a49CUwi1wNuepnsvRtrtWhnk/Yn+knArAdBtaP4/tIEp9/EaEQ +PkxROpaw0RPxx9gmrjrKkcRpnd8BKWRRb2jaFOwIQZeQjdCygPLPwj2/kWjFgGce +xGATVdVhmVd8upUPYUk6ynW8yQqTP2cOEvIo4jEbwFcW3wh8GcF+Dx+FHgo2fFt+ +J7x6v+Db9NpSvd4MVHAxkUOVyLzwPt0JfjBkUO1/AaQzZ01oT74V77D2AhGiGxMl +OtzCWfHjXEa7ZywCRuoeSKbmW9m1vFGikpbbqsY3Iqb+zCB0oy2pLmvLwIIRIbWT +ee5Ehr7XHuQe+w== +-----END CERTIFICATE----- + +# Certification Authority of WoSign G2 +-----BEGIN CERTIFICATE----- +MIIDfDCCAmSgAwIBAgIQayXaioidfLwPBbOxemFFRDANBgkqhkiG9w0BAQsFADBY +MQswCQYDVQQGEwJDTjEaMBgGA1UEChMRV29TaWduIENBIExpbWl0ZWQxLTArBgNV +BAMTJENlcnRpZmljYXRpb24gQXV0aG9yaXR5IG9mIFdvU2lnbiBHMjAeFw0xNDEx +MDgwMDU4NThaFw00NDExMDgwMDU4NThaMFgxCzAJBgNVBAYTAkNOMRowGAYDVQQK +ExFXb1NpZ24gQ0EgTGltaXRlZDEtMCsGA1UEAxMkQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgb2YgV29TaWduIEcyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAvsXEoCKASU+/2YcRxlPhuw+9YH+v9oIOH9ywjj2X4FA8jzrvZjtFB5sg+OPX +JYY1kBaiXW8wGQiHC38Gsp1ij96vkqVg1CuAmlI/9ZqD6TRay9nVYlzmDuDfBpgO +gHzKtB0TiGsOqCR3A9DuW/PKaZE1OVbFbeP3PU9ekzgkyhjpJMuSA93MHD0JcOQg +5PGurLtzaaNjOg9FD6FKmsLRY6zLEPg95k4ot+vElbGs/V6r+kHLXZ1L3PR8du9n +fwB6jdKgGlxNIuG12t12s9R23164i5jIFFTMaxeSt+BKv0mUYQs4kI9dJGwlezt5 +2eJ+na2fmKEG/HgUYFf47oB3sQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU+mCp62XF3RYUCE4MD42b4Pdkr2cwDQYJ +KoZIhvcNAQELBQADggEBAFfDejaCnI2Y4qtAqkePx6db7XznPWZaOzG73/MWM5H8 +fHulwqZm46qwtyeYP0nXYGdnPzZPSsvxFPpahygc7Y9BMsaV+X3avXtbwrAh449G +3CE4Q3RM+zD4F3LBMvzIkRfEzFg3TgvMWvchNSiDbGAtROtSjFA9tWwS1/oJu2yy +SrHFieT801LYYRf+epSEj3m2M1m6D8QL4nCgS3gu+sif/a+RZQp4OBXllxcU3fng +LDT4ONCEIgDAFFEYKwLcMFrw6AF8NTojrwjkr6qOKEJJLvD1mTS+7Q9LGOHSJDy7 +XUe3IfKN0QqZjuNuPq1w4I+5ysxugTH2e5x6eeRncRg= +-----END CERTIFICATE----- + +# Certigna +-----BEGIN CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== +-----END CERTIFICATE----- + +# Certigna Root CA +-----BEGIN CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= +-----END CERTIFICATE----- + +# Certinomis - Autorité Racine +-----BEGIN CERTIFICATE----- +MIIFnDCCA4SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJGUjET +MBEGA1UEChMKQ2VydGlub21pczEXMBUGA1UECxMOMDAwMiA0MzM5OTg5MDMxJjAk +BgNVBAMMHUNlcnRpbm9taXMgLSBBdXRvcml0w6kgUmFjaW5lMB4XDTA4MDkxNzA4 +Mjg1OVoXDTI4MDkxNzA4Mjg1OVowYzELMAkGA1UEBhMCRlIxEzARBgNVBAoTCkNl +cnRpbm9taXMxFzAVBgNVBAsTDjAwMDIgNDMzOTk4OTAzMSYwJAYDVQQDDB1DZXJ0 +aW5vbWlzIC0gQXV0b3JpdMOpIFJhY2luZTCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBAJ2Fn4bT46/HsmtuM+Cet0I0VZ35gb5j2CN2DpdUzZlMGvE5x4jY +F1AMnmHawE5V3udauHpOd4cN5bjr+p5eex7Ezyh0x5P1FMYiKAT5kcOrJ3NqDi5N +8y4oH3DfVS9O7cdxbwlyLu3VMpfQ8Vh30WC8Tl7bmoT2R2FFK/ZQpn9qcSdIhDWe +rP5pqZ56XjUl+rSnSTV3lqc2W+HN3yNw2F1MpQiD8aYkOBOo7C+ooWfHpi2GR+6K +/OybDnT0K0kCe5B1jPyZOQE51kqJ5Z52qz6WKDgmi92NjMD2AR5vpTESOH2VwnHu +7XSu5DaiQ3XV8QCb4uTXzEIDS3h65X27uK4uIJPT5GHfceF2Z5c/tt9qc1pkIuVC +28+BA5PY9OMQ4HL2AHCs8MF6DwV/zzRpRbWT5BnbUhYjBYkOjUjkJW+zeL9i9Qf6 +lSTClrLooyPCXQP8w9PlfMl1I9f09bze5N/NgL+RiH2nE7Q5uiy6vdFrzPOlKO1E +nn1So2+WLhl+HPNbxxaOu2B9d2ZHVIIAEWBsMsGoOBvrbpgT1u449fCfDu/+MYHB +0iSVL1N6aaLwD4ZFjliCK0wi1F6g530mJ0jfJUaNSih8hp75mxpZuWW/Bd22Ql09 +5gBIgl4g9xGC3srYn+Y3RyYe63j3YcNBZFgCQfna4NH4+ej9Uji29YnfAgMBAAGj +WzBZMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBQN +jLZh2kS40RR9w759XkjwzspqsDAXBgNVHSAEEDAOMAwGCiqBegFWAgIAAQEwDQYJ +KoZIhvcNAQEFBQADggIBACQ+YAZ+He86PtvqrxyaLAEL9MW12Ukx9F1BjYkMTv9s +ov3/4gbIOZ/xWqndIlgVqIrTseYyCYIDbNc/CMf4uboAbbnW/FIyXaR/pDGUu7ZM +OH8oMDX/nyNTt7buFHAAQCvaR6s0fl6nVjBhK4tDrP22iCj1a7Y+YEq6QpA0Z43q +619FVDsXrIvkxmUP7tCMXWY5zjKn2BCXwH40nJ+U8/aGH88bc62UeYdocMMzpXDn +2NU4lG9jeeu/Cg4I58UvD0KgKxRA/yHgBcUn4YQRE7rWhh1BCxMjidPJC+iKunqj +o3M3NYB9Ergzd0A4wPpeMNLytqOx1qKVl4GbUu1pTP+A5FPbVFsDbVRfsbjvJL1v +nxHDx2TCDyhihWZeGnuyt++uNckZM6i4J9szVb9o4XVIRFb7zdNIu0eJOqxp9YDG +5ERQL1TEqkPFMTFYvZbF6nVsmnWxTfj3l/+WFvKXTej28xH5On2KOG4Ey+HTRRWq +pdEdnV1j6CTmNhTih60bWfVEm/vXd3wfAXBioSAaosUaKPQhA+4u2cGA6rnZgtZb +dsLLO7XSAPCjDuGtbkD326C00EauFddEwk01+dIL8hf2rGbVJLJP0RyZwG71fet0 +BLj5TXcJ17TPBzAJ8bgAVtkXFhYKK4bfjwEZGuW7gmP/vgt2Fl43N+bYdJeimUV5 +-----END CERTIFICATE----- + +# Certipost E-Trust Primary Normalised CA +-----BEGIN CERTIFICATE----- +MIID4DCCAsigAwIBAgILBAAAAAABBVJkx2EwDQYJKoZIhvcNAQEFBQAwXTELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xMDAuBgNVBAMT +J0NlcnRpcG9zdCBFLVRydXN0IFByaW1hcnkgTm9ybWFsaXNlZCBDQTAeFw0wNTA3 +MjYxMDAwMDBaFw0yMDA3MjYxMDAwMDBaMF0xCzAJBgNVBAYTAkJFMRwwGgYDVQQK +ExNDZXJ0aXBvc3Qgcy5hLi9uLnYuMTAwLgYDVQQDEydDZXJ0aXBvc3QgRS1UcnVz +dCBQcmltYXJ5IE5vcm1hbGlzZWQgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQDVs6pShHoXkyIPuAQYysnygiqsFQunUHG2TCVr9/8Bqldad05eExQN +VfIe8YXNhdeCHAzaCSu9/bye/m2JTaICJOZR6jd/MUZae5p2sy6gXV/k+JkKB77u +kiYSyXvnXWzQg0cOwIyn0XlXwAsZnJueQ8VOkSXOiCttedl5itZmTiLDGkVO78iw +YiZOJlRQnwxvs2vMfJ9/3g8NtY/Da9Thwvu7VlCqjD2PAIs8/EgXatJa83VtZYG9 +Rl2fomJTrs7zqeSRK1omw3lm0aZTZjUcBnGx7pkOxPtYEqwiRi3iIpLb4Ty/u/6G +55M0c894adPL3vkMsmjayYoKYFTE81ZjAgMBAAGjgaAwgZ0wDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wSAYDVR0gBEEwPzA9BgkDkA4HAQABAgAwMDAu +BggrBgEFBQcCARYiaHR0cDovL3d3dy5lLXRydXN0LmJlL0NQUy9RTmNlcnRzIDAd +BgNVHQ4EFgQUEfILltIzOIFXWBP9QKQRb06Z+mcwEQYJYIZIAYb4QgEBBAQDAgAH +MA0GCSqGSIb3DQEBBQUAA4IBAQA1a0/enfMDth3IvI3nXmqeqentoiuX6q/R4UbT +Akl9xFKF67r20785Yhidk0m9eAO/014V3e8nHOG7RQEigQBNOuCFyloyA8wgj6/v +wduo+vPc17KxDwOBCSngcXyL+n/LNm4b6BTO8EsmoTIpT8y09YdIDBP8x52vq9ST +9SpNf0iCWD4X/8OAKqs/V1W4OSxmEGQmbYxr1t2ggxpaVhGWRr2ucCjWOFdbkdU/ +Temss8MkSpZlXDTQHtS/CKWXXfdG23bwzT51YwArr62uht5fpplUDYUjpfy67RtS ++kkYd4VbqnKbJwg1RTcn25fJ+os9yNCd3lrvXaMWtph5ynzL +-----END CERTIFICATE----- + +# Certipost E-Trust Primary Qualified CA +-----BEGIN CERTIFICATE----- +MIID3jCCAsagAwIBAgILBAAAAAABBVJkxCUwDQYJKoZIhvcNAQEFBQAwXDELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xLzAtBgNVBAMT +JkNlcnRpcG9zdCBFLVRydXN0IFByaW1hcnkgUXVhbGlmaWVkIENBMB4XDTA1MDcy +NjEwMDAwMFoXDTIwMDcyNjEwMDAwMFowXDELMAkGA1UEBhMCQkUxHDAaBgNVBAoT +E0NlcnRpcG9zdCBzLmEuL24udi4xLzAtBgNVBAMTJkNlcnRpcG9zdCBFLVRydXN0 +IFByaW1hcnkgUXVhbGlmaWVkIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB +CgKCAQEAriDSeNuaoHKcBFIlLG1S2NcniTOg4bLV+zB1ay1/HGeODucfEt8XeRi7 +tBtv+D11G55nN/Dx+g917YadAwShKHAtPLJroHNR4zWpdKUIPpSFJzYqqnJk/Hfu +dpQccuu/Msd3A2olggkFr19gPH+sG7yS6Dx0Wc7xfFQtOK6W8KxvoTMMIVoBuiMg +W6CGAtVT3EkfqDKzrztGO7bvnzmzOAvneor2KPmnb1ApyHlYi0nSpdiFflbxaRV4 +RBE116VUPqtmJdLb4xjxLivicSMJN2RDQnQylnfel6LploacJUQJ1AGdUX4ztwlE +5YCXDWRbdxiXpUupnhCdh/pWp88KfQIDAQABo4GgMIGdMA4GA1UdDwEB/wQEAwIB +BjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTwePkHdxC73B6hrnn7MBDbxjT4 +FzBIBgNVHSAEQTA/MD0GCQOQDgcBAAECADAwMC4GCCsGAQUFBwIBFiJodHRwOi8v +d3d3LmUtdHJ1c3QuYmUvQ1BTL1FOY2VydHMgMBEGCWCGSAGG+EIBAQQEAwIABzAN +BgkqhkiG9w0BAQUFAAOCAQEAbOHYX3RY6XBJ1soNLFjaymS2UU/DBmQB6YpzHZ7P +Rni/O4WG4j1KGJQqgXdvgvhv9O4i/J0YIXJguxiAgpX7+feVJIFmwbXDtdK2dos7 +gVy4oQ4rARSLgAlA7vhgTBnkF80nAbNjEgWkCMm0v55QTrXeD5IzZnXQPecjfOol +cXz+Pi42eaHlKVAjNQWVeLufeWTcV0gnLOJcM83Cu35od6cvo0kXcuEAhGt9eq85 +CyzV2FdkMmyECmp2OtOszZ2x5zfc7AwvxVdg34j1Q7EBZCa0J4IQsqNQ75fmf7+R +h7PbkKkq4no0bHNJ9OiNLmuK3aGKf2PQv1ger8w/klAt0Q== +-----END CERTIFICATE----- + +# Certipost E-Trust TOP Root CA +-----BEGIN CERTIFICATE----- +MIIDzDCCArSgAwIBAgILBAAAAAABBVJkwZUwDQYJKoZIhvcNAQEFBQAwUzELMAkG +A1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9zdCBzLmEuL24udi4xJjAkBgNVBAMT +HUNlcnRpcG9zdCBFLVRydXN0IFRPUCBSb290IENBMB4XDTA1MDcyNjEwMDAwMFoX +DTI1MDcyNjEwMDAwMFowUzELMAkGA1UEBhMCQkUxHDAaBgNVBAoTE0NlcnRpcG9z +dCBzLmEuL24udi4xJjAkBgNVBAMTHUNlcnRpcG9zdCBFLVRydXN0IFRPUCBSb290 +IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApdRLQNb78TUYO6Kw +Q+TJVaHAB7sIvjoZtSPDHp2zCEr0Q0vpwRlgkN+E11jGOt0KLJUsvZd//qJ12gbj +q5ts0bjPRIbBUmC33D47sPLpxFE8SrmDuU5hagObHFKAOlC0ILLb07LGVH/LYJvI +JJ6vCcdlDSj22poiwjNu8vMl1KT5lvVvqjxr3EEw5eZvykgfMHgdeX2n0b+uxV5D ++cYvg3abNEqkKFgrqIiFRGor8lZCdpmQM6ru+SHP8j35d4TL3SmExNSKKqQ5XD75 +HCVoTfXnm12xGjReygJz+QjEDG1e3RIq5XvFNnhSnTLBxSilIKjlmA25b8+5gJ7l +vrmb/QIDAQABo4GgMIGdMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/ +MB0GA1UdDgQWBBRL3r4FMS7zNcjYyqdWxZQNtFplxTBIBgNVHSAEQTA/MD0GCQOQ +DgcBAAECADAwMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LmUtdHJ1c3QuYmUvQ1BT +L1FOY2VydHMgMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG9w0BAQUFAAOCAQEA +iWPMos74VGp8WTR4qwG0li0qIW5ALV/QliKZgwUc5STN4vU1BL8AlgfssqQ6aisj +PskPyhMduCSWCSbYPCqBzuGByMlzPvW7DwgekOCwkrnSOpdQ4AaO5IIwPGAgt6Tu +q4kG4fwlu5HU+bdfaGOooGiGa6fskssi+lBbE1gnritDC7YXxjByBDNEJkpEBx9z +oINBKeCSBrzVAer+vK9x6yAfCl0NoClezuRBUVWWwx+0MaWj81Pq/8KchnLPNkxW +WgYyfl6rSqHOp+ufpIwquSSLuLXzBk2myn2Z+/ZV6q5Iee4mWdMfDFMV92JR+YQN +lmxesQjmWQgrJikKwYNAcw== +-----END CERTIFICATE----- + +# Certplus Root CA G1 +-----BEGIN CERTIFICATE----- +MIIFazCCA1OgAwIBAgISESBVg+QtPlRWhS2DN7cs3EYRMA0GCSqGSIb3DQEBDQUA +MD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2Vy +dHBsdXMgUm9vdCBDQSBHMTAeFw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBa +MD4xCzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2Vy +dHBsdXMgUm9vdCBDQSBHMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ANpQh7bauKk+nWT6VjOaVj0W5QOVsjQcmm1iBdTYj+eJZJ+622SLZOZ5KmHNr49a +iZFluVj8tANfkT8tEBXgfs+8/H9DZ6itXjYj2JizTfNDnjl8KvzsiNWI7nC9hRYt +6kuJPKNxQv4c/dMcLRC4hlTqQ7jbxofaqK6AJc96Jh2qkbBIb6613p7Y1/oA/caP +0FG7Yn2ksYyy/yARujVjBYZHYEMzkPZHogNPlk2dT8Hq6pyi/jQu3rfKG3akt62f +6ajUeD94/vI4CTYd0hYCyOwqaK/1jpTvLRN6HkJKHRUxrgwEV/xhc/MxVoYxgKDE +EW4wduOU8F8ExKyHcomYxZ3MVwia9Az8fXoFOvpHgDm2z4QTd28n6v+WZxcIbekN +1iNQMLAVdBM+5S//Ds3EC0pd8NgAM0lm66EYfFkuPSi5YXHLtaW6uOrc4nBvCGrc +h2c0798wct3zyT8j/zXhviEpIDCB5BmlIOklynMxdCm+4kLV87ImZsdo/Rmz5yCT +mehd4F6H50boJZwKKSTUzViGUkAksnsPmBIgJPaQbEfIDbsYIC7Z/fyL8inqh3SV +4EJQeIQEQWGw9CEjjy3LKCHyamz0GqbFFLQ3ZU+V/YDI+HLlJWvEYLF7bY5KinPO +WftwenMGE9nTdDckQQoRb5fc5+R+ob0V8rqHDz1oihYHAgMBAAGjYzBhMA4GA1Ud +DwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSowcCbkahDFXxd +Bie0KlHYlwuBsTAfBgNVHSMEGDAWgBSowcCbkahDFXxdBie0KlHYlwuBsTANBgkq +hkiG9w0BAQ0FAAOCAgEAnFZvAX7RvUz1isbwJh/k4DgYzDLDKTudQSk0YcbX8ACh +66Ryj5QXvBMsdbRX7gp8CXrc1cqh0DQT+Hern+X+2B50ioUHj3/MeXrKls3N/U/7 +/SMNkPX0XtPGYX2eEeAC7gkE2Qfdpoq3DIMku4NQkv5gdRE+2J2winq14J2by5BS +S7CTKtQ+FjPlnsZlFT5kOwQ/2wyPX1wdaR+v8+khjPPvl/aatxm2hHSco1S1cE5j +2FddUyGbQJJD+tZ3VTNPZNX70Cxqjm0lpu+F6ALEUz65noe8zDUa3qHpimOHZR4R +Kttjd5cUvpoUmRGywO6wT/gUITJDT5+rosuoD6o7BlXGEilXCNQ314cnrUlZp5Gr +RHpejXDbl85IULFzk/bwg2D5zfHhMf1bfHEhYxQUqq/F3pN+aLHsIqKqkHWetUNy +6mSjhEv9DKgma3GX7lZjZuhCVPnHHd/Qj1vfyDBviP4NxDMcU6ij/UgQ8uQKTuEV +V/xuZDDCVRHc6qnNSlSsKWNEz0pAoNZoWRsz+e86i9sgktxChL8Bq4fA1SCC28a5 +g4VCXA9DO2pJNdWY9BW/+mGBDAkgGNLQFwzLSABQ6XaCjGTXOqAHVcweMcDvOrRl +++O/QmueD6i9a5jc2NvLi6Td11n0bt3+qsOR0C5CB8AMTVPNJLFMWx5R9N/pkvo= +-----END CERTIFICATE----- + +# Certplus Root CA G2 +-----BEGIN CERTIFICATE----- +MIICHDCCAaKgAwIBAgISESDZkc6uo+jF5//pAq/Pc7xVMAoGCCqGSM49BAMDMD4x +CzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBs +dXMgUm9vdCBDQSBHMjAeFw0xNDA1MjYwMDAwMDBaFw0zODAxMTUwMDAwMDBaMD4x +CzAJBgNVBAYTAkZSMREwDwYDVQQKDAhDZXJ0cGx1czEcMBoGA1UEAwwTQ2VydHBs +dXMgUm9vdCBDQSBHMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABM0PW1aC3/BFGtat +93nwHcmsltaeTpwftEIRyoa/bfuFo8XlGVzX7qY/aWfYeOKmycTbLXku54uNAm8x +Ik0G42ByRZ0OQneezs/lf4WbGOT8zC5y0xaTTsqZY1yhBSpsBqNjMGEwDgYDVR0P +AQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNqDYwJ5jtpMxjwj +FNiPwyCrKGBZMB8GA1UdIwQYMBaAFNqDYwJ5jtpMxjwjFNiPwyCrKGBZMAoGCCqG +SM49BAMDA2gAMGUCMHD+sAvZ94OX7PNVHdTcswYO/jOYnYs5kGuUIe22113WTNch +p+e/IQ8rzfcq3IUHnQIxAIYUFuXcsGXCwI4Un78kFmjlvPl5adytRSv3tjFzzAal +U5ORGpOucGpnutee5WEaXw== +-----END CERTIFICATE----- + +# Certum EC-384 CA +-----BEGIN CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= +-----END CERTIFICATE----- + +# Certum Root CA +-----BEGIN CERTIFICATE----- +MIIDDDCCAfSgAwIBAgIDAQAgMA0GCSqGSIb3DQEBBQUAMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTAeFw0wMjA2MTExMDQ2MzlaFw0yNzA2MTExMDQ2MzlaMD4xCzAJBgNVBAYTAlBM +MRswGQYDVQQKExJVbml6ZXRvIFNwLiB6IG8uby4xEjAQBgNVBAMTCUNlcnR1bSBD +QTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6xwS7TT3zNJc4YPk/E +jG+AanPIW1H4m9LcuwBcsaD8dQPugfCI7iNS6eYVM42sLQnFdvkrOYCJ5JdLkKWo +ePhzQ3ukYbDYWMzhbGZ+nPMJXlVjhNWo7/OxLjBos8Q82KxujZlakE403Daaj4GI +ULdtlkIJ89eVgw1BS7Bqa/j8D35in2fE7SZfECYPCE/wpFcozo+47UX2bu4lXapu +Ob7kky/ZR6By6/qmW6/KUz/iDsaWVhFu9+lmqSbYf5VT7QqFiLpPKaVCjF62/IUg +AKpoC6EahQGcxEZjgoi2IrHu/qpGWX7PNSzVttpd90gzFFS269lvzs2I1qsb2pY7 +HVkCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEA +uI3O7+cUus/usESSbLQ5PqKEbq24IXfS1HeCh+YgQYHu4vgRt2PRFze+GXYkHAQa +TOs9qmdvLdTN/mUxcMUbpgIKumB7bVjCmkn+YzILa+M6wKyrO7Do0wlRjBCDxjTg +xSvgGrZgFCdsMneMvLJymM/NzD+5yCRCFNZX/OYmQ6kd5YCQzgNUKD73P9P4Te1q +CjqTE5s7FCMTY5w/0YcneeVMUeMBrYVdGjux1XMQpNPyvG5k9VpWkKjHDkx0Dy5x +O/fIR/RpbxXyEV6DHpx8Uq79AtoSqFlnGNu8cN2bsWntgM6JQEhqDjXKKWYVIZQs +6GAqm4VKQPNriiTsBhYscw== +-----END CERTIFICATE----- + +# Certum Trusted Network CA +-----BEGIN CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= +-----END CERTIFICATE----- + +# Certum Trusted Network CA 2 +-----BEGIN CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSP +-----END CERTIFICATE----- + +# Certum Trusted Root CA +-----BEGIN CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb +-----END CERTIFICATE----- + +# Chambers of Commerce Root +-----BEGIN CERTIFICATE----- +MIIEvTCCA6WgAwIBAgIBADANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJFVTEn +MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL +ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEiMCAGA1UEAxMZQ2hhbWJlcnMg +b2YgQ29tbWVyY2UgUm9vdDAeFw0wMzA5MzAxNjEzNDNaFw0zNzA5MzAxNjEzNDRa +MH8xCzAJBgNVBAYTAkVVMScwJQYDVQQKEx5BQyBDYW1lcmZpcm1hIFNBIENJRiBB +ODI3NDMyODcxIzAhBgNVBAsTGmh0dHA6Ly93d3cuY2hhbWJlcnNpZ24ub3JnMSIw +IAYDVQQDExlDaGFtYmVycyBvZiBDb21tZXJjZSBSb290MIIBIDANBgkqhkiG9w0B +AQEFAAOCAQ0AMIIBCAKCAQEAtzZV5aVdGDDg2olUkfzIx1L4L1DZ77F1c2VHfRtb +unXF/KGIJPov7coISjlUxFF6tdpg6jg8gbLL8bvZkSM/SAFwdakFKq0fcfPJVD0d +BmpAPrMMhe5cG3nCYsS4No41XQEMIwRHNaqbYE6gZj3LJgqcQKH0XZi/caulAGgq +7YN6D6IUtdQis4CwPAxaUWktWBiP7Zme8a7ileb2R6jWDA+wWFjbw2Y3npuRVDM3 +0pQcakjJyfKl2qUMI/cjDpwyVV5xnIQFUZot/eZOKjRa3spAN2cMVCFVd9oKDMyX +roDclDZK9D7ONhMeU+SsTjoF7Nuucpw4i9A5O4kKPnf+dQIBA6OCAUQwggFAMBIG +A1UdEwEB/wQIMAYBAf8CAQwwPAYDVR0fBDUwMzAxoC+gLYYraHR0cDovL2NybC5j +aGFtYmVyc2lnbi5vcmcvY2hhbWJlcnNyb290LmNybDAdBgNVHQ4EFgQU45T1sU3p +26EpW1eLTXYGduHRooowDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIA +BzAnBgNVHREEIDAegRxjaGFtYmVyc3Jvb3RAY2hhbWJlcnNpZ24ub3JnMCcGA1Ud +EgQgMB6BHGNoYW1iZXJzcm9vdEBjaGFtYmVyc2lnbi5vcmcwWAYDVR0gBFEwTzBN +BgsrBgEEAYGHLgoDATA+MDwGCCsGAQUFBwIBFjBodHRwOi8vY3BzLmNoYW1iZXJz +aWduLm9yZy9jcHMvY2hhbWJlcnNyb290Lmh0bWwwDQYJKoZIhvcNAQEFBQADggEB +AAxBl8IahsAifJ/7kPMa0QOx7xP5IV8EnNrJpY0nbJaHkb5BkAFyk+cefV/2icZd +p0AJPaxJRUXcLo0waLIJuvvDL8y6C98/d3tGfToSJI6WjzwFCm/SlCgdbQzALogi +1djPHRPH8EjX1wWnz8dHnjs8NMiAT9QUu/wNUPf6s+xCX6ndbcj0dc97wXImsQEc +XCz9ek60AcUFV7nnPKoF2YjpB0ZBzu9Bga5Y34OirsrXdx/nADydb47kMgkdTXg0 +eDQ8lJsm7U9xxhl6vSAiSFr+S30Dt+dYvsYyTnQeaN2oaFuzPu5ifdmA6Ap1erfu +tGWaIZDgqtCYvDi1czyL+Nw= +-----END CERTIFICATE----- + +# Chambers of Commerce Root - 2008 +-----BEGIN CERTIFICATE----- +MIIHTzCCBTegAwIBAgIJAKPaQn6ksa7aMA0GCSqGSIb3DQEBBQUAMIGuMQswCQYD +VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 +IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 +MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xKTAnBgNVBAMTIENoYW1iZXJz +IG9mIENvbW1lcmNlIFJvb3QgLSAyMDA4MB4XDTA4MDgwMTEyMjk1MFoXDTM4MDcz +MTEyMjk1MFowga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpNYWRyaWQgKHNlZSBj +dXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29tL2FkZHJlc3MpMRIw +EAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVyZmlybWEgUy5BLjEp +MCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAtIDIwMDgwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCvAMtwNyuAWko6bHiUfaN/Gh/2NdW9 +28sNRHI+JrKQUrpjOyhYb6WzbZSm891kDFX29ufyIiKAXuFixrYp4YFs8r/lfTJq +VKAyGVn+H4vXPWCGhSRv4xGzdz4gljUha7MI2XAuZPeEklPWDrCQiorjh40G072Q +DuKZoRuGDtqaCrsLYVAGUvGef3bsyw/QHg3PmTA9HMRFEFis1tPo1+XqxQEHd9ZR +5gN/ikilTWh1uem8nk4ZcfUyS5xtYBkL+8ydddy/Js2Pk3g5eXNeJQ7KXOt3EgfL +ZEFHcpOrUMPrCXZkNNI5t3YRCQ12RcSprj1qr7V9ZS+UWBDsXHyvfuK2GNnQm05a +Sd+pZgvMPMZ4fKecHePOjlO+Bd5gD2vlGts/4+EhySnB8esHnFIbAURRPHsl18Tl +UlRdJQfKFiC4reRB7noI/plvg6aRArBsNlVq5331lubKgdaX8ZSD6e2wsWsSaR6s ++12pxZjptFtYer49okQ6Y1nUCyXeG0+95QGezdIp1Z8XGQpvvwyQ0wlf2eOKNcx5 +Wk0ZN5K3xMGtr/R5JJqyAQuxr1yW84Ay+1w9mPGgP0revq+ULtlVmhduYJ1jbLhj +ya6BXBg14JC7vjxPNyK5fuvPnnchpj04gftI2jE9K+OJ9dC1vX7gUMQSibMjmhAx +hduub+84Mxh2EQIDAQABo4IBbDCCAWgwEgYDVR0TAQH/BAgwBgEB/wIBDDAdBgNV +HQ4EFgQU+SSsD7K1+HnA+mCIG8TZTQKeFxkwgeMGA1UdIwSB2zCB2IAU+SSsD7K1 ++HnA+mCIG8TZTQKeFxmhgbSkgbEwga4xCzAJBgNVBAYTAkVVMUMwQQYDVQQHEzpN +YWRyaWQgKHNlZSBjdXJyZW50IGFkZHJlc3MgYXQgd3d3LmNhbWVyZmlybWEuY29t +L2FkZHJlc3MpMRIwEAYDVQQFEwlBODI3NDMyODcxGzAZBgNVBAoTEkFDIENhbWVy +ZmlybWEgUy5BLjEpMCcGA1UEAxMgQ2hhbWJlcnMgb2YgQ29tbWVyY2UgUm9vdCAt +IDIwMDiCCQCj2kJ+pLGu2jAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRV +HSAAMCowKAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20w +DQYJKoZIhvcNAQEFBQADggIBAJASryI1wqM58C7e6bXpeHxIvj99RZJe6dqxGfwW +PJ+0W2aeaufDuV2I6A+tzyMP3iU6XsxPpcG1Lawk0lgH3qLPaYRgM+gQDROpI9CF +5Y57pp49chNyM/WqfcZjHwj0/gF/JM8rLFQJ3uIrbZLGOU8W6jx+ekbURWpGqOt1 +glanq6B8aBMz9p0w8G8nOSQjKpD9kCk18pPfNKXG9/jvjA9iSnyu0/VU+I22mlaH +FoI6M6taIgj3grrqLuBHmrS1RaMFO9ncLkVAO+rcf+g769HsJtg1pDDFOqxXnrN2 +pSB7+R5KBWIBpih1YJeSDW4+TTdDDZIVnBgizVGZoCkaPF+KMjNbMMeJL0eYD6MD +xvbxrN8y8NmBGuScvfaAFPDRLLmF9dijscilIeUcE5fuDr3fKanvNFNb0+RqE4QG +tjICxFKuItLcsiFCGtpA8CnJ7AoMXOLQusxI0zcKzBIKinmwPQN/aUv0NCB9szTq +jktk9T79syNnFQ0EuPAtwQlRPLJsFfClI9eDdOTlLsn+mCdCxqvGnrDQWzilm1De +fhiYtUU79nm06PcaewaD+9CL2rvHvRirCG88gGtAPxkZumWK5r7VXNM21+9AUiRg +OGcEMeyP84LG3rlV8zsxkVrctQgVrXYlCg17LofiDKYGvCYQbTed7N14jHyAxfDZ +d0jQ +-----END CERTIFICATE----- + +# China Internet Network Information Center EV Certificates Root +-----BEGIN CERTIFICATE----- +MIID9zCCAt+gAwIBAgIESJ8AATANBgkqhkiG9w0BAQUFADCBijELMAkGA1UEBhMC +Q04xMjAwBgNVBAoMKUNoaW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24g +Q2VudGVyMUcwRQYDVQQDDD5DaGluYSBJbnRlcm5ldCBOZXR3b3JrIEluZm9ybWF0 +aW9uIENlbnRlciBFViBDZXJ0aWZpY2F0ZXMgUm9vdDAeFw0xMDA4MzEwNzExMjVa +Fw0zMDA4MzEwNzExMjVaMIGKMQswCQYDVQQGEwJDTjEyMDAGA1UECgwpQ2hpbmEg +SW50ZXJuZXQgTmV0d29yayBJbmZvcm1hdGlvbiBDZW50ZXIxRzBFBgNVBAMMPkNo +aW5hIEludGVybmV0IE5ldHdvcmsgSW5mb3JtYXRpb24gQ2VudGVyIEVWIENlcnRp +ZmljYXRlcyBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm35z +7r07eKpkQ0H1UN+U8i6yjUqORlTSIRLIOTJCBumD1Z9S7eVnAztUwYyZmczpwA// +DdmEEbK40ctb3B75aDFk4Zv6dOtouSCV98YPjUesWgbdYavi7NifFy2cyjw1l1Vx +zUOFsUcW9SxTgHbP0wBkvUCZ3czY28Sf1hNfQYOL+Q2HklY0bBoQCxfVWhyXWIQ8 +hBouXJE0bhlffxdpxWXvayHG1VA6v2G5BY3vbzQ6sm8UY78WO5upKv23KzhmBsUs +4qpnHkWnjQRmQvaPK++IIGmPMowUc9orhpFjIpryp9vOiYurXccUwVswah+xt54u +gQEC7c+WXmPbqOY4twIDAQABo2MwYTAfBgNVHSMEGDAWgBR8cks5x8DbYqVPm6oY +NJKiyoOCWTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E +FgQUfHJLOcfA22KlT5uqGDSSosqDglkwDQYJKoZIhvcNAQEFBQADggEBACrDx0M3 +j92tpLIM7twUbY8opJhJywyA6vPtI2Z1fcXTIWd50XPFtQO3WKwMVC/GVhMPMdoG +52U7HW8228gd+f2ABsqjPWYWqJ1MFn3AlUa1UeTiH9fqBk1jjZaM7+czV0I664zB +echNdn3e9rG3geCg+aF4RhcaVpjwTj2rHO3sOdwHSPdj/gauwqRcalsyiMXHM4Ws +ZkJHwlgkmeHlPuV1LI5D1l08eB6olYIpUNHRFrrvwb562bTYzB5MRuF3sTGrvSrI +zo9uoV1/A3U05K2JRVRevq4opbs/eHnrc7MKDf2+yfdWrPa37S+bISnHOLaVxATy +wy39FCqQmbkHzJ8= +-----END CERTIFICATE----- + +# Cisco Root CA 2048 +-----BEGIN CERTIFICATE----- +MIIDQzCCAiugAwIBAgIQX/h7KCtU3I1CoxW1aMmt/zANBgkqhkiG9w0BAQUFADA1 +MRYwFAYDVQQKEw1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENB +IDIwNDgwHhcNMDQwNTE0MjAxNzEyWhcNMjkwNTE0MjAyNTQyWjA1MRYwFAYDVQQK +Ew1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENBIDIwNDgwggEg +MA0GCSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQCwmrmrp68Kd6ficba0ZmKUeIhH +xmJVhEAyv8CrLqUccda8bnuoqrpu0hWISEWdovyD0My5jOAmaHBKeN8hF570YQXJ +FcjPFto1YYmUQ6iEqDGYeJu5Tm8sUxJszR2tKyS7McQr/4NEb7Y9JHcJ6r8qqB9q +VvYgDxFUl4F1pyXOWWqCZe+36ufijXWLbvLdT6ZeYpzPEApk0E5tzivMW/VgpSdH +jWn0f84bcN5wGyDWbs2mAag8EtKpP6BrXruOIIt6keO1aO6g58QBdKhTCytKmg9l +Eg6CTY5j/e/rmxrbU6YTYK/CfdfHbBcl1HP7R2RQgYCUTOG/rksc35LtLgXfAgED +o1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUJ/PI +FR5umgIJFq0roIlgX9p7L6owEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEF +BQADggEBAJ2dhISjQal8dwy3U8pORFBi71R803UXHOjgxkhLtv5MOhmBVrBW7hmW +Yqpao2TB9k5UM8Z3/sUcuuVdJcr18JOagxEu5sv4dEX+5wW4q+ffy0vhN4TauYuX +cB7w4ovXsNgOnbFp1iqRe6lJT37mjpXYgyc81WhJDtSd9i7rp77rMKSsH0T8lasz +Bvt9YAretIpjsJyp8qS5UwGH0GikJ3+r/+n6yUA4iGe0OcaEb1fJU9u6ju7AQ7L4 +CYNu/2bPPu8Xs1gYJQk0XuPL1hS27PKSb3TkL4Eq1ZKR4OCXPDJoBYVL0fdX4lId +kxpUnwVwwEpxYB5DC2Ae/qPOgRnhCzU= +-----END CERTIFICATE----- + +# Class 1 Primary CA +-----BEGIN CERTIFICATE----- +MIIDkjCCAnqgAwIBAgIRAIb+HV/DgfhH1zMsc5R1ezcwDQYJKoZIhvcNAQEFBQAw +PTELMAkGA1UEBhMCRlIxETAPBgNVBAoTCENlcnRwbHVzMRswGQYDVQQDExJDbGFz +cyAxIFByaW1hcnkgQ0EwHhcNOTkwNzA3MTcwMTAwWhcNMjAwNzA2MjM1OTU5WjA9 +MQswCQYDVQQGEwJGUjERMA8GA1UEChMIQ2VydHBsdXMxGzAZBgNVBAMTEkNsYXNz +IDEgUHJpbWFyeSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMNr +Kcgux658UgXpk4lWClp5yczcJe+Hii0F2IEXBBs6Rfh5Dg1J1IFByKtF+3XIFfLi +0LzZYWyEpBMZp9n58kncTA/GfVe0E9weCXEpNp2AWPQb2IkU69PSk0sq8XfnamW9 +GeWq/QxKY+HCmbQPBLZaGzY8Nzy/xeVe8V9XDh/H/Szn5G9qm2KWORGbZvAstlLc +4Sf/223+66tjFB1jiGPiFgz5IFQPm90VanaDT70ni1OmN9KH8kdQUjtm6dF4Ghuy +O2nwWTw4W9EqTDNeDspWpe0tW4KDTdY4TopWtmovJGsSMKYq3q8Mu6pEEhwTxWUP +4/3YGjFL5D8MfEXoFjMCAwEAAaOBjDCBiTAPBgNVHRMECDAGAQH/AgEKMAsGA1Ud +DwQEAwIBBjAdBgNVHQ4EFgQUIy7f6YG00IT9jrup3fkMo+PzSVMwEQYJYIZIAYb4 +QgEBBAQDAgEGMDcGA1UdHwQwMC4wLKAqoCiGJmh0dHA6Ly93d3cuY2VydHBsdXMu +Y29tL0NSTC9jbGFzczEuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQC+JlPWXp+QPwGU +AuwIwYia0Kf6UA3a/JQdqNRQI9CfHIthsbKqRA+s2BMN1dah6DF40O8eg0Ca5f1B +6ZL97qOVkPPAuG9+9zSlod88895WssffhyZEx+KDuRNvMEVxKSIVq8TbP0/zd/mZ +GDT1c5J9N2ZnSW4zmk0plIu9UDljZQ8Q53sQatFH+Z4lDCcpwtsIiOeqiTpFqp9J +sn3qaIpA/pHBwkn/IdFnDhoSHUouHPuU+W07eTL5HimRCkKWRfHvylgPcp0MqYO8 +Mt2YBNFZ4WQXvcyBowNelmDlfxY4CmvR+rOEnSrKPvtC+E/op1soGRit4KZmHrAp +IfK4mY// +-----END CERTIFICATE----- + +# ComSign Advanced Security CA +-----BEGIN CERTIFICATE----- +MIIGGzCCBAOgAwIBAgIQel3pM9AEnrNKGhd0yxabbTANBgkqhkiG9w0BAQUFADAn +MSUwIwYDVQQDExxDb21TaWduIEFkdmFuY2VkIFNlY3VyaXR5IENBMB4XDTA0MDMy +NDIxNTIwNFoXDTI5MDMyNDIxNTU1NVowJzElMCMGA1UEAxMcQ29tU2lnbiBBZHZh +bmNlZCBTZWN1cml0eSBDQTCCAiAwDQYJKoZIhvcNAQEBBQADggINADCCAggCggIB +AJ2cXDsBhFda9Cv+bRSybLftkNf7V0Ogz2AbWS9NUWA9HEmiakFjq7jtZr5ARo2q +kls9LivBYZhUbLxMq2n6jUVFgSoabfiz+A9jy4587VQpoxQY/OHJsdhUupzKKhvQ +rMKJGBZK/koE0tKbtYeGwcl7HzYWRbnwuobCd4ozMUKizgxyPRLlkTj0J2dhTMzi +9U0sEvDNs4TBCXWfAE/4d9PzMm+Bjxd+O5tr8x7n+pNPDC6X3XBYE33zkYONoj0x +2mPjOXZ2M+bUZg2UjhWUnDh73HEf2rXg15dagnTeOwba78Ur8WjdJ1P4ueyMD1Mi +5DmC5PmuYfwYKH7Haelo9H7g0bzgbcjW0atEMWG07Hg1LEbe6PO2PJizqRwHSpjN +RyaC8NSR7xCT52jmUmqXfrkglxf6GTKUI57Hc7JI6Ji193VWoEudd6gaKXQ4WODI +zbEzGy/+mJN4BQF0q65CxRsdL3xBfKXTYKpQwfPIiEFY9rWSGP2uZo6c5zua0bfb +2sdMyyIbSj9g3zn22uquzIeVuFKbWp1RRQx27ylBpQq5+F7EvSxMNEhH1YvIzM/R +O1jlesb9Iex3Ka/zWlQOqaRkfPdc0aET5TvUW0sAlMnLDd0ET9tosrdnI/ZhpawP +OT6awy+pZMMShZqkolLUefy6I6sJGu09mZ3Z5yj4D1BPAgEDo4IBQzCCAT8wCwYD +VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOn6J+XtSyFwZNZx +qnzlghww0g16ME0GA1UdHwRGMEQwQqBAoD6GPGh0dHA6Ly9mZWRpci5jb21zaWdu +LmNvLmlsL2NybC9Db21TaWduQWR2YW5jZWRTZWN1cml0eUNBLmNybDAQBgkrBgEE +AYI3FQEEAwIBADBCBgNVHSAEOzA5MDcGCSoDBAUGBwgJCjAqMCgGCCsGAQUFBwIB +FhxodHRwOi8vd3d3LmNvbXNpZ24uY28uaWwvY3BzMFsGCCsGAQUFBwEBBE8wTTBL +BggrBgEFBQcwAoY/aHR0cDovL2ZlZGlyLmNvbXNpZ24uY28uaWwvY2FjZXJ0L0Nv +bVNpZ25BZHZhbmNlZFNlY3VyaXR5Q0EuY3J0MA0GCSqGSIb3DQEBBQUAA4ICAQCc +jV2aBhGhbhYYT8uyAjuSjx0mpcvrSO5VHaoQ4GlOwf4yAN4Pzg20Y7zgYhrg9/Wp +5clUFItA+K3zbQLsjnvcpXmSAbX/oVljORG1vlKudNrZIaMS2MeV+NtvVlW/lRK9 +MiPHyWxlAe/7dI67JIZPfd3wWo87hIx5dSn0hrbTwQxZFcIDV6s9SNcsRZRA3OCp +S1/MENeWv6mcAypk8rx++KWnmZEnBf5Jp9itCoY2PA49puF8aoERe0W7aI01Mf0m +U0E+PG5rHtirLYmBmcYfl/Na9R9hvf4VWZMK3vpR+kbfRvT8YmxYowzeyRkewBxb +ODtBjwUxDq7tLF23D9w5xF8is6WyWDAkv/kJrfCWGzdvQGb+tyqJ1cbjfgNYsH04 +5oqrP/WB8wpBdwJz7adU3QcxXLa1dpJ0d7lvpgm6Dt0M53bES77LO9VFwInjK3d6 +YpjDW/x9V16O7t0bUCFtkb8ZXI+XeSrBi2Fvql5S9elPNJgwvRwHw7fEfIHZo0My +ZsYtvDlbqV2J6wQrRJVH+VL0TwXuoypjEQ0eusT4SltQQFF3LvTk3/EDFOZ5adpY +RIJYFIORNAPXem1q0TIiKZEbGuQLvTIVJyC/Gm9SgtP5L0kPkGwBgEmuGO4yLM4R +x/6gBJholPD8i8Usb4f92cLEHOktzA6sn/Xx/JI4jQ== +-----END CERTIFICATE----- + +# ComSign CA +-----BEGIN CERTIFICATE----- +MIIDkzCCAnugAwIBAgIQFBOWgxRVjOp7Y+X8NId3RDANBgkqhkiG9w0BAQUFADA0 +MRMwEQYDVQQDEwpDb21TaWduIENBMRAwDgYDVQQKEwdDb21TaWduMQswCQYDVQQG +EwJJTDAeFw0wNDAzMjQxMTMyMThaFw0yOTAzMTkxNTAyMThaMDQxEzARBgNVBAMT +CkNvbVNpZ24gQ0ExEDAOBgNVBAoTB0NvbVNpZ24xCzAJBgNVBAYTAklMMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8ORUaSvTx49qROR+WCf4C9DklBKK +8Rs4OC8fMZwG1Cyn3gsqrhqg455qv588x26i+YtkbDqthVVRVKU4VbirgwTyP2Q2 +98CNQ0NqZtH3FyrV7zb6MBBC11PN+fozc0yz6YQgitZBJzXkOPqUm7h65HkfM/sb +2CEJKHxNGGleZIp6GZPKfuzzcuc3B1hZKKxC+cX/zT/npfo4sdAMx9lSGlPWgcxC +ejVb7Us6eva1jsz/D3zkYDaHL63woSV9/9JLEYhwVKZBqGdTUkJe5DSe5L6j7Kpi +Xd3DTKaCQeQzC6zJMw9kglcq/QytNuEMrkvF7zuZ2SOzW120V+x0cAwqTwIDAQAB +o4GgMIGdMAwGA1UdEwQFMAMBAf8wPQYDVR0fBDYwNDAyoDCgLoYsaHR0cDovL2Zl +ZGlyLmNvbXNpZ24uY28uaWwvY3JsL0NvbVNpZ25DQS5jcmwwDgYDVR0PAQH/BAQD +AgGGMB8GA1UdIwQYMBaAFEsBmz5WGmU2dst7l6qSBe4y5ygxMB0GA1UdDgQWBBRL +AZs+VhplNnbLe5eqkgXuMucoMTANBgkqhkiG9w0BAQUFAAOCAQEA0Nmlfv4pYEWd +foPPbrxHbvUanlR2QnG0PFg/LUAlQvaBnPGJEMgOqnhPOAlXsDzACPw1jvFIUY0M +cXS6hMTXcpuEfDhOZAYnKuGntewImbQKDdSFc8gS4TXt8QUxHXOZDOuWyt3T5oWq +8Ir7dcHyCTxlZWTzTNity4hp8+SDtwy9F1qWF8pb/627HOkthIDYIb6FUtnUdLlp +hbpN7Sgy6/lhSuTENh4Z3G+EER+V9YMoGKgzkkMn3V0TBEVPh9VGzT2ouvDzuFYk +Res3x+F2T3I5GN9+dHLHcy056mDmrRGiVod7w2ia/viMcKjfZTL0pECMocJEAw6U +AGegcQCCSA== +-----END CERTIFICATE----- + +# ComSign Secured CA +-----BEGIN CERTIFICATE----- +MIIDqzCCApOgAwIBAgIRAMcoRwmzuGxFjB36JPU2TukwDQYJKoZIhvcNAQEFBQAw +PDEbMBkGA1UEAxMSQ29tU2lnbiBTZWN1cmVkIENBMRAwDgYDVQQKEwdDb21TaWdu +MQswCQYDVQQGEwJJTDAeFw0wNDAzMjQxMTM3MjBaFw0yOTAzMTYxNTA0NTZaMDwx +GzAZBgNVBAMTEkNvbVNpZ24gU2VjdXJlZCBDQTEQMA4GA1UEChMHQ29tU2lnbjEL +MAkGA1UEBhMCSUwwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGtWhf +HZQVw6QIVS3joFd67+l0Kru5fFdJGhFeTymHDEjWaueP1H5XJLkGieQcPOqs49oh +gHMhCu95mGwfCP+hUH3ymBvJVG8+pSjsIQQPRbsHPaHA+iqYHU4Gk/v1iDurX8sW +v+bznkqH7Rnqwp9D5PGBpX8QTz7RSmKtUxvLg/8HZaWSLWapW7ha9B20IZFKF3ue +Mv5WJDmyVIRD9YTC2LxBkMyd1mja6YJQqTtoz7VdApRgFrFD2UNd3V2Hbuq7s8lr +9gOUCXDeFhF6K+h2j0kQmHe5Y1yLM5d19guMsqtb3nQgJT/j8xH5h2iGNXHDHYwt +6+UarA9z1YJZQIDTAgMBAAGjgacwgaQwDAYDVR0TBAUwAwEB/zBEBgNVHR8EPTA7 +MDmgN6A1hjNodHRwOi8vZmVkaXIuY29tc2lnbi5jby5pbC9jcmwvQ29tU2lnblNl +Y3VyZWRDQS5jcmwwDgYDVR0PAQH/BAQDAgGGMB8GA1UdIwQYMBaAFMFL7XC29z58 +ADsAj8c+DkWfHl3sMB0GA1UdDgQWBBTBS+1wtvc+fAA7AI/HPg5Fnx5d7DANBgkq +hkiG9w0BAQUFAAOCAQEAFs/ukhNQq3sUnjO2QiBq1BW9Cav8cujvR3qQrFHBZE7p +iL1DRYHjZiM/EoZNGeQFsOY3wo3aBijJD4mkU6l1P7CW+6tMM1X5eCZGbxs2mPtC +dsGCuY7e+0X5YxtiOzkGynd6qDwJz2w2PQ8KRUtpFhpFfTMDZflScZAmlaxMDPWL +kz/MdXSFmLr/YnpNH4n+rr2UAJm/EaXc4HnFFgt9AmEd6oX5AhVP51qJThRv4zdL +hfXBPGHg/QVBspJ/wx2g0K5SZGBrGMYmnNj1ZOQ2GmKfig8+/21OGVZOIJFsnzQz +OjRXUDpvgV4GxvU+fE6OK85lBi5d0ipTdF7Tbieejw== +-----END CERTIFICATE----- + +# Common Policy +-----BEGIN CERTIFICATE----- +MIIDoTCCAomgAwIBAgIQKTZHquOKrIZKI1byyrdhrzANBgkqhkiG9w0BAQUFADBO +MQswCQYDVQQGEwJ1czEYMBYGA1UEChMPVS5TLiBHb3Zlcm5tZW50MQ0wCwYDVQQL +EwRGQkNBMRYwFAYDVQQDEw1Db21tb24gUG9saWN5MB4XDTA3MTAxNTE1NTgwMFoX +DTI3MTAxNTE2MDgwMFowTjELMAkGA1UEBhMCdXMxGDAWBgNVBAoTD1UuUy4gR292 +ZXJubWVudDENMAsGA1UECxMERkJDQTEWMBQGA1UEAxMNQ29tbW9uIFBvbGljeTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJeNvTMn5K1b+3i9L0dHbsd4 +6ZOcpN7JHP0vGzk4rEcXwH53KQA7Ax9oD81Npe53uCxiazH2+nIJfTApBnznfKM9 +hBiKHa4skqgf6F5PjY7rPxr4nApnnbBnTfAu0DDew5SwoM8uCjR/VAnTNr2kSVdS +c+md/uRIeUYbW40y5KVIZPMiDZKdCBW/YDyD90ciJSKtKXG3d+8XyaK2lF7IMJCk +FEhcVlcLQUwF1CpMP64Sm1kRdXAHImktLNMxzJJ+zM2kfpRHqpwJCPZLr1LoakCR +xVW9QLHIbVeGlRfmH3O+Ry4+i0wXubklHKVSFzYIWcBCvgortFZRPBtVyYyQd+sC +AwEAAaN7MHkwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFC9Yl9ipBZilVh/72at17wI8NjTHMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJ +KwYBBAGCNxUCBBYEFHa3YJbdFFYprHWF03BjwbxHhhyLMA0GCSqGSIb3DQEBBQUA +A4IBAQBgrvNIFkBypgiIybxHLCRLXaCRc+1leJDwZ5B6pb8KrbYq+Zln34PFdx80 +CTj5fp5B4Ehg/uKqXYeI6oj9XEWyyWrafaStsU+/HA2fHprA1RRzOCuKeEBuMPdi +4c2Z/FFpZ2wR3bgQo2jeJqVW/TZsN5hs++58PGxrcD/3SDcJjwtCga1GRrgLgwb0 +Gzigf0/NC++DiYeXHIowZ9z9VKEDfgHLhUyxCynDvux84T8PCVI8L6eaSP436REG +WOE2QYrEtr+O3c5Ks7wawM36GpnScZv6z7zyxFSjiDV2zBssRm8MtNHDYXaSdBHq +S4CNHIkRi+xb/xfJSPzn4AYR4oRe +-----END CERTIFICATE----- + +# Comodo AAA Services root +-----BEGIN CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== +-----END CERTIFICATE----- + +# Configuration +-----BEGIN CERTIFICATE----- +MIIHHzCCBgegAwIBAgIESPx+9TANBgkqhkiG9w0BAQUFADCBrjESMBAGCgmSJomT +8ixkARkWAnJzMRUwEwYKCZImiZPyLGQBGRYFcG9zdGExEjAQBgoJkiaJk/IsZAEZ +FgJjYTEWMBQGA1UEAxMNQ29uZmlndXJhdGlvbjERMA8GA1UEAxMIU2VydmljZXMx +HDAaBgNVBAMTE1B1YmxpYyBLZXkgU2VydmljZXMxDDAKBgNVBAMTA0FJQTEWMBQG +A1UEAxMNUG9zdGEgQ0EgUm9vdDAeFw0wODEwMjAxMjIyMDhaFw0yODEwMjAxMjUy +MDhaMIGuMRIwEAYKCZImiZPyLGQBGRYCcnMxFTATBgoJkiaJk/IsZAEZFgVwb3N0 +YTESMBAGCgmSJomT8ixkARkWAmNhMRYwFAYDVQQDEw1Db25maWd1cmF0aW9uMREw +DwYDVQQDEwhTZXJ2aWNlczEcMBoGA1UEAxMTUHVibGljIEtleSBTZXJ2aWNlczEM +MAoGA1UEAxMDQUlBMRYwFAYDVQQDEw1Qb3N0YSBDQSBSb290MIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqPK9iL7Ar0S+m0qiYxzWVqsdKbIcqhUeRdGs +naBh1TX55FqDNmND3jhXFfzwlGL0B4BXg1eosxW8+00jeF/a9seBFr6r3+fcg1Nz +K7bdY4iNRfMN3X2/6IiwZsFDXTfSbaGcmkbDsz/QwqCKlC6DpjzDYL0szB6LY4J2 +QSjkFWtcDGE5VThByshm6Me4l1IQJnC3B7cJHqYTXq6ZWiZvZD3sxNOluVx2ZK1j +fYiD4kvMDd7UxtMIQvVbF/Vx4ZEtA5+eHNyLcqToR2QQh2Qwc9jytPFXJpNXy7bH +DYiLHc8FMF0E1nY36CAyV78PnDPGCIz2tMKpBrBbMKEeLRK6PwIDAQABo4IDQTCC +Az0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwgboGA1UdIASBsjCB +rzCBrAYLKwYBBAH6OAoKAQEwgZwwMAYIKwYBBQUHAgEWJGh0dHA6Ly93d3cuY2Eu +cG9zdGEucnMvZG9rdW1lbnRhY2lqYTBoBggrBgEFBQcCAjBcGlpPdm8gamUgZWxl +a3Ryb25za2kgc2VydGlmaWthdCBST09UIENBIHNlcnZlcmEgU2VydGlmaWthY2lv +bm9nIHRlbGEgUG9zdGU6ICJQb3N0YSBDQSBSb290Ii4wEQYJYIZIAYb4QgEBBAQD +AgAHMIIBvAYDVR0fBIIBszCCAa8wgcmggcaggcOkgcAwgb0xEjAQBgoJkiaJk/Is +ZAEZFgJyczEVMBMGCgmSJomT8ixkARkWBXBvc3RhMRIwEAYKCZImiZPyLGQBGRYC +Y2ExFjAUBgNVBAMTDUNvbmZpZ3VyYXRpb24xETAPBgNVBAMTCFNlcnZpY2VzMRww +GgYDVQQDExNQdWJsaWMgS2V5IFNlcnZpY2VzMQwwCgYDVQQDEwNBSUExFjAUBgNV +BAMTDVBvc3RhIENBIFJvb3QxDTALBgNVBAMTBENSTDEwgeCggd2ggdqGgaNsZGFw +Oi8vbGRhcC5jYS5wb3N0YS5ycy9jbj1Qb3N0YSUyMENBJTIwUm9vdCxjbj1BSUEs +Y249UHVibGljJTIwS2V5JTIwU2VydmljZXMsY249U2VydmljZXMsY249Q29uZmln +dXJhdGlvbixkYz1jYSxkYz1wb3N0YSxkYz1ycz9jZXJ0aWZpY2F0ZVJldm9jYXRp +b25MaXN0JTNCYmluYXJ5hjJodHRwOi8vc2VydGlmaWthdGkuY2EucG9zdGEucnMv +Y3JsL1Bvc3RhQ0FSb290LmNybDArBgNVHRAEJDAigA8yMDA4MTAyMDEyMjIwOFqB +DzIwMjgxMDIwMTI1MjA4WjAfBgNVHSMEGDAWgBTyy43iNe8QQ8Tae8r664kDoSKv +uDAdBgNVHQ4EFgQU8suN4jXvEEPE2nvK+uuJA6Eir7gwHQYJKoZIhvZ9B0EABBAw +DhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4IBAQBwRqHI5BcFZg+d4kMx +SB2SkBnEhQGFFm74ks57rlIWxJeNCih91cts49XlDjJPyGgtNAg9c6iTQikzRgxE +Z/HQmpxpAeWR8Q3JaTwzS04Zk2MzBSkhodj/PlSrnvahegLX3P+lPlR4+dPByhKV ++YmeFOLyoUSyy+ktdTXMllW7OAuIJtrWrO/TUqILSzpT2ksiU8zKKiSaYqrEMpp+ +3MzBsmzNj9m0wM/1AsCMK4RbG0C8ENBQ4WHWZlaaBJGl49W9oC4igbHZONrkqIdf +PEYElt7Jmju/rXhsHUlJtGm5cA8Fkla2/a+u+CAtRyPPthzNxJuATvm/McBUvrsx +f/M+ +-----END CERTIFICATE----- + +# Correo Uruguayo - Root CA +-----BEGIN CERTIFICATE----- +MIIGGjCCBAKgAwIBAgIQAMoieQgjKvD1griF02Pd8TANBgkqhkiG9w0BAQUFADB/ +MQswCQYDVQQGEwJVWTErMCkGA1UECgwiQURNSU5JU1RSQUNJT04gTkFDSU9OQUwg +REUgQ09SUkVPUzEfMB0GA1UECwwWU0VSVklDSU9TIEVMRUNUUk9OSUNPUzEiMCAG +A1UEAwwZQ29ycmVvIFVydWd1YXlvIC0gUm9vdCBDQTAeFw0wODA3MTQxNjUyMTVa +Fw0zMDEyMzEwMjU5NTlaMH8xCzAJBgNVBAYTAlVZMSswKQYDVQQKDCJBRE1JTklT +VFJBQ0lPTiBOQUNJT05BTCBERSBDT1JSRU9TMR8wHQYDVQQLDBZTRVJWSUNJT1Mg +RUxFQ1RST05JQ09TMSIwIAYDVQQDDBlDb3JyZW8gVXJ1Z3VheW8gLSBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAsT3SpyVwl4N4DtcyyWYO +eCPkKhvsw+9ThYO7ys9+6lOZbSdVyNE4IUBuSU3DPfYJKwYZQ6mYyQFO9KqAMAdV +8/W3fZm3c4XVHGVWbA0ymwgONGEqQAmEN8Nm7Q1MnAx4QDrs7avMpITydTGVQKiq +u5O1d5hs8sjgIVoj5EKnk8ioHTjOpBpAQL88k5CbX9aUwSJbRtfFABXVj8b33guv +bosFj1uAlQ6jvZPMkPJ940h+ss0HPRvtFJB08900H3zkA1nxLc3go6A7IS5crqwI +BlAVMTXuX/kfDTSlgG5ick/jIbo4QF1f22gqXDTGCDv2fC6ojcS3pq3Zm78ZQQ5I +OQlmbg00AcW7BxEjpNr+YJYoR9yPZ5sTr315DnjNwIwvuyEs/HQWHt7AMp36eDqG +uj7JeAoA0eTgyRLiW9zru4CaMjWr8DDDDkiEL40ICvYsjE0ygEVVCNvNDai/CHq4 +52hdmpSJlbz8mo64fzrYbNX0GKxp4qTBC7Mfo4Kf84o8hUA4CfrCBT7hnIn6wwVs +CI9dUfR/u8TzbAG9PU/EGYs52crM6XmIBFWrbbjaFkVlORUFGPsLLHMB7ZRS5X0M +ATsJoE3xPQiBZjQ2F0TwZ/Nb8gW2IZhY2fShN9lv5u9WxPu/VmICrDAwtgLW0hb8 +TuqHQ5poXYijkUYoK785FRUCAwEAAaOBkTCBjjAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUfbtp64hh4UDPRyNkAIaiZmvchJUwTAYD +VR0gBEUwQzBBBgRVHSAAMDkwNwYIKwYBBQUHAgEWK2h0dHA6Ly93d3cuY29ycmVv +LmNvbS51eS9jb3JyZW9jZXJ0L2Nwcy5wZGYwDQYJKoZIhvcNAQEFBQADggIBAFbf +E4m+YrcOgSFzpNQ3yu23L5V014n4S0eB7mftuCnfIaD8VGdnyFcsW6EKdXghIcqg +qN9rnNk2Ao24AcFvjntsyaSyxUapykwCgfqje509SObKQGbSRJ124FW5ppyn0UPY +9aC0nfj35aamQvMCMllGcisU7F5l1VGBeM6qL42WiXlq+w/IW8+0rpC2X+N8Ymy3 +pv+QgbWYkXMSMK/H6IECaHMpu1h1PbfWQ9WuTfJCufDf2jEAE9rhs7YGi1v9yZi4 +ohPRuo/BihqeD/+CvgSC5SuTPh61ogwbxhqwc4l2g7yOO7sXbRTDi759FSa1qZwX +elB6LevpmZSumBC97ipdXdaONFusHodga5jHh4/TnLJoBUkH+akxZpz+v6dZ6Czw +NtTyqBmCwJ6nOfmxmDSjH/rNyRkteN63/WLwk6P+AFvWCuTzfnyXKOEF7AU0RRP/ +KRNhiidP27jSkiEntYh3Z6h+zyQ8hwgEM3OPC7aG+M/vsqYkHguRkQBQFjIS2Akl +2mNO3dst1+cEa+NjH6n+qQFjxMpMFGiDvAWsWRb7bqEHb7tLvm2YSHYle0oRllQI +rKnzN6uDw9HNgZjA5UA1uJ+R52/mSyAWilN7rDrRmDVU0NS/rn6aSx7pdaMlsDvn +Zb9PlfQdvcS6yU2BUcI/WtkS9CEb1pXqPZD+qZPi +-----END CERTIFICATE----- + +# Cybertrust Global Root +-----BEGIN CERTIFICATE----- +MIIDoTCCAomgAwIBAgILBAAAAAABD4WqLUgwDQYJKoZIhvcNAQEFBQAwOzEYMBYG +A1UEChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2Jh +bCBSb290MB4XDTA2MTIxNTA4MDAwMFoXDTIxMTIxNTA4MDAwMFowOzEYMBYGA1UE +ChMPQ3liZXJ0cnVzdCwgSW5jMR8wHQYDVQQDExZDeWJlcnRydXN0IEdsb2JhbCBS +b290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+Mi8vRRQZhP/8NN5 +7CPytxrHjoXxEnOmGaoQ25yiZXRadz5RfVb23CO21O1fWLE3TdVJDm71aofW0ozS +J8bi/zafmGWgE07GKmSb1ZASzxQG9Dvj1Ci+6A74q05IlG2OlTEQXO2iLb3VOm2y +HLtgwEZLAfVJrn5GitB0jaEMAs7u/OePuGtm839EAL9mJRQr3RAwHQeWP032a7iP +t3sMpTjr3kfb1V05/Iin89cqdPHoWqI7n1C6poxFNcJQZZXcY4Lv3b93TZxiyWNz +FtApD0mpSPCzqrdsxacwOUBdrsTiXSZT8M4cIwhhqJQZugRiQOwfOHB3EgZxpzAY +XSUnpQIDAQABo4GlMIGiMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/ +MB0GA1UdDgQWBBS2CHsNesysIEyGVjJez6tuhS1wVzA/BgNVHR8EODA2MDSgMqAw +hi5odHRwOi8vd3d3Mi5wdWJsaWMtdHJ1c3QuY29tL2NybC9jdC9jdHJvb3QuY3Js +MB8GA1UdIwQYMBaAFLYIew16zKwgTIZWMl7Pq26FLXBXMA0GCSqGSIb3DQEBBQUA +A4IBAQBW7wojoFROlZfJ+InaRcHUowAl9B8Tq7ejhVhpwjCt2BWKLePJzYFa+HMj +Wqd8BfP9IjsO0QbE2zZMcwSO5bAi5MXzLqXZI+O4Tkogp24CJJ8iYGd7ix1yCcUx +XOl5n4BHPa2hCwcUPUf/A2kaDAtE52Mlp3+yybh2hO0j9n0Hq0V+09+zv+mKts2o +omcrUtW3ZfA5TGOgkXmTUg9U3YO7n9GPp1Nzw8v/MOx8BLjYRB+TX3EJIrduPuoc +A06dGiBh+4E37F78CkWr1+cXVdCg6mCbpvbjjFspwgZgFJ0tl0ypkxWdYcQBX0jW +WL1WMRJOEcgh4LMRkWXbtKaIOM5V +-----END CERTIFICATE----- + +# D-TRUST Root Class 2 CA 2007 +-----BEGIN CERTIFICATE----- +MIIElTCCA32gAwIBAgIDAw6VMA0GCSqGSIb3DQEBBQUAMEsxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJTAjBgNVBAMMHEQtVFJVU1QgUm9vdCBD +bGFzcyAyIENBIDIwMDcwHhcNMDcwNTE2MDUyMDQ3WhcNMjIwNTE2MDUyMDQ3WjBL +MQswCQYDVQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMSUwIwYDVQQDDBxE +LVRSVVNUIFJvb3QgQ2xhc3MgMiBDQSAyMDA3MIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEAs83khBVJ+OTWzoSzmq32MHWQDYTr7tqzenUq4juk6jAs6z13 +jYGEaEqmpGjckHNhNGUHHSOlDOa/090zXdoy7aYNU6Z0alwZWaZMtS95AV6ef0r6 +usknftT/zQBZIOsGzLNEz9aF6e07DGzB6oxc4LmpAvATACeTnFD+zRNPbRtqqt0P +/0YlGdzhXlCsGn8Oy9ruIPzD9JxKeDVu7jHHRRZyhdKCINtSRXw8v1lX+Yd0Vphb +HVCOzC+zsz+L7uw3SQGI79ghDJPT9m6JT7oXy0SBt3unI7t0CtPY6jdFJ//c8J5D +47p7ihuafemGoP4v0db2h1eq8imUh3MV+mpOrQIDAQABo4IBgDCCAXwwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUkTCr9vPGRLfr3Si8DxSfUl1ifwIwOQYIKwYB +BQUHAQEELTArMCkGCCsGAQUFBzABhh1odHRwOi8vdXNlcnMub2NzcC5kLXRydXN0 +Lm5ldDAzBgNVHREELDAqgRBpbmZvQGQtdHJ1c3QubmV0hhZodHRwOi8vd3d3LmQt +dHJ1c3QubmV0MA4GA1UdDwEB/wQEAwIBBjCByQYDVR0fBIHBMIG+MIG7oIG4oIG1 +hnZsZGFwOi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290 +JTIwQ2xhc3MlMjAyJTIwQ0ElMjAyMDA3LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9j +ZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0hjtodHRwOi8vd3d3LmQtdHJ1c3QubmV0 +L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfMl9jYV8yMDA3LmNybDANBgkqhkiG9w0B +AQUFAAOCAQEAW4vyQ+MFLmQf1ZKpUWtk/A5GzAeZ4rf8kykg3PwvYOSsfSUy7RDh +D2/b8rxO7kHJs9QHSHoKr6S2/1Ew7cvSnOt/UO5L4mKnNMIg9vP29TbAy5EQ6+0u +jfQHGiEMNXf0fC2NSaXXC0Ro1dLi5Qx4OBPKsUxSqirl1a9cBTmdLa2+I1bVL1Xz +3p2rgjagTbdZkUfu3oOl6jteJwWAC20sUPQBN9Wjdxfs/t2E9MX4UJLQS8Yuo4tA +5MM3o3e9zixV4qzfXWQAur6najEG/JlrUBUlnal2mqdNKpoCY+tw5/4RJtAYxaYf +CkOT8hjZ9Tl5uAddjB/mP/PFyyFmMXt7zw== +-----END CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2007 +-----BEGIN CERTIFICATE----- +MIIElTCCA32gAwIBAgIDAw6WMA0GCSqGSIb3DQEBBQUAMEsxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJTAjBgNVBAMMHEQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIwMDcwHhcNMDcwNTE2MDUyMDQ3WhcNMjIwNTE2MDUyMDQ3WjBL +MQswCQYDVQQGEwJERTEVMBMGA1UECgwMRC1UcnVzdCBHbWJIMSUwIwYDVQQDDBxE +LVRSVVNUIFJvb3QgQ2xhc3MgMyBDQSAyMDA3MIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEAuo3NNVMy7qa9SJCa8uroWA9HZqjMbgkS5KHLW9+TuPbpOTn4 +xtjpzxqGvKauD4yvCEXj8o4rwlxZK/qMNrNwHchQPKVWvuqu6Uf250kPr3+UJtQC +Gge4ujlVzp+7Ijkp2DXFmQMh2Kc4Y/HkNN9Hrp838WygmcIisG1y3CLJMTnoVteg +jzohW4aaTyj5HHb3zE8/+U53iyqciqp5QYrVHNk5b5jJXkWXHQmUGdlQUYVyc7+s +S510NHGHIRYPfu7SSX7KSdP5kipHSE8PXVqhy9Uo7PCSxXJDRuuzA6bzVyVKCmGE +CibW76a42BSNeLnTtyXRTuNaFqrsnwfuIxB9tQIDAQABo4IBgDCCAXwwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUgi82I0l4IELXsFJYoNZ0VBV4v6owOQYIKwYB +BQUHAQEELTArMCkGCCsGAQUFBzABhh1odHRwOi8vdXNlcnMub2NzcC5kLXRydXN0 +Lm5ldDAzBgNVHREELDAqgRBpbmZvQGQtdHJ1c3QubmV0hhZodHRwOi8vd3d3LmQt +dHJ1c3QubmV0MA4GA1UdDwEB/wQEAwIBBjCByQYDVR0fBIHBMIG+MIG7oIG4oIG1 +hnZsZGFwOi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290 +JTIwQ2xhc3MlMjAzJTIwQ0ElMjAyMDA3LE89RC1UcnVzdCUyMEdtYkgsQz1ERT9j +ZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0hjtodHRwOi8vd3d3LmQtdHJ1c3QubmV0 +L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yMDA3LmNybDANBgkqhkiG9w0B +AQUFAAOCAQEAVQ5oCo3c2aiGYAJpeY196ZDC2R0dtQ67c5JkYxRGTNBqu6N1XYYZ +OGGGHbiKIjSjtDUVs6lgTFQXn7HeWzLifmveTyLwLR0iBJ62Sk+rLFad493ssSZO +KtdVwj69gte+VbtFyClbhjydP2hEREQ2DWi/rgGiGbVMl//yljxnskLeD+Ggl07K +5zRlrpWCYWcmcy3de+eVSw4hqpKuTPzGs6nlmYMyOfBgwkxRqMFHFDWJpU02D58b +AnFBjUJKJPivbp0NcIaNqmITHgOLJPnDVJNJhRt1dmJ/Iv9JvXZzDD+YrSqy+ufF +33T1/2kxVQo6wBliNcRJuSsZHfRwme7Y3A== +-----END CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 2009 +-----BEGIN CERTIFICATE----- +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha +ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 +UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 +tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R +ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM +lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp +/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G +A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G +A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj +dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy +MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl +cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js +L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL +BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni +acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K +zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 +PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y +Johw1+qRzT65ysCQblrGXnRl11z+o+I= +-----END CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 EV 2009 +-----BEGIN CERTIFICATE----- +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw +NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV +BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn +ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 +3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z +qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR +p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 +HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw +ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea +HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw +Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh +c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E +RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt +dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku +Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp +3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF +CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na +xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX +KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1 +-----END CERTIFICATE----- + +# DigiCert Assured ID Root CA +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G2 +-----BEGIN CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5w== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G3 +-----BEGIN CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtA== +-----END CERTIFICATE----- + +# DigiCert CS ECC P384 Root G5 +-----BEGIN CERTIFICATE----- +MIICFjCCAZ2gAwIBAgIQA2mP5xLVGfPO0P23sWQwETAKBggqhkjOPQQDAzBNMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMTHERp +Z2lDZXJ0IENTIEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcNNDYw +MTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu +Yy4xJTAjBgNVBAMTHERpZ2lDZXJ0IENTIEVDQyBQMzg0IFJvb3QgRzUwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAR/FK2Ftpf9AiE1TWDoOJOTmz0FEG2v0/7v+rv7c5nz +7DISjcdouIveiaKIVHeNuyF+M5VWlgno1YyhBLibbhkAYuhCKKZYN4QZVSZ7Mzdn +8ppyraGurgBCPBx+uHqeIZyjQjBAMB0GA1UdDgQWBBTwjJhxOThlwjobphdmHcjt +Zd6SNjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQD +AwNnADBkAjAjb+EAGSZQ5EYgZYs3p8/rBuHMMskqoewyDXOiHgIcNWEqTmmrOXft +l4jAfWvqid0CMEPx0VijdT6Gm7ZVEYsX9z3+CmnFf07GdRtalMvqERHGCCKI3tB6 +oqV56OMhp80Tsw== +-----END CERTIFICATE----- + +# DigiCert CS RSA4096 Root G5 +-----BEGIN CERTIFICATE----- +MIIFZDCCA0ygAwIBAgIQBs7hMb5tVcgH98DH+0TmIDANBgkqhkiG9w0BAQwFADBM +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJDAiBgNVBAMT +G0RpZ2lDZXJ0IENTIFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBaFw00 +NjAxMTQyMzU5NTlaMEwxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg +SW5jLjEkMCIGA1UEAxMbRGlnaUNlcnQgQ1MgUlNBNDA5NiBSb290IEc1MIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtjNzgNhiA3AULBEcOV58rnyDhh3+ +Ji9MJK2L6oNfqbw9W/wLmEwCRzDs4v7s6DRbZl6/O9cspiX/jFmz3+rafCnZRlBy +CB1u0RsK3R/NmYn6Dw9zxOGcHXUyzW+X2ipqlbJsyQnQ6gt7fRcGSZnv1t7gyFPU +rsZ38Ya7Ixy4wN9Z94590e+C5iaLWji1/3XVstlPCfM3iFDaEaSKFBTRUwQAffNq +RBj+UHAyBxyomg46HcUKH24LJmm3PKJXcCyG+kxulalYQ7msEtb/P+3XQxdrTM6e +xJCr//oQUJqjkFfW54wQrp8WGs81HX/Xdu2KnDWnKLinXSH8MDfd3ggZTxXG56ba +kEeO95RTTI5TAr79meXqhtCvAwLTm6qT8asojiAB/0z7zLcpQPWHpBITBR9DbtdR +UJ84tCDtFwkSj8y5Ga+fzb5pEdOvVRBtF4Z5llLGsgCd5a84sDX0iGuPDgQ9fO6v +zdNqEErGzYbKIj2hSlz7Dv+I31xip8C5HtmsbH44N/53kyXChYpPtTcGWgaBFPHO +lJ2ZkeoyWs5nPW4EZq0MTy2jLvee9Xid9wr9fo/jQopVlrzxnzct/J5flf6MGBv8 +jv1LkK/XA2gSY6zik6eiywTlT2TOA/rGFJ/Zi+jM1GKMa+QALBmfGgbGMYFU+1Mk +mq9Vmbqdda64wt0CAwEAAaNCMEAwHQYDVR0OBBYEFGgBk7HSSkBCaZRGLBxaiKkl +tEdPMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEB +DAUAA4ICAQCS/O64AnkXAlF9IcVJZ6ek8agkOOsMaOpaQmuc9HPBaUotszcFUEKY +kp4GeSwuBpn2798roM2zkgGDtaDLJ7U8IxqYSaLsLZmlWUOs0rGT1lfXHLyT1sZA +4bNvGVW3E9flQzOktavL2sExZA101iztw41u67uvGUdhYS3A9AW5b3jcOvdCQGVT +kb2ZDZOSVKapN1krm8uZxrw99wSE8JQzHQ+CWjnLLkXDKBmjspuYyPwxa2CP9umG +KLzgPH10XRaJW2kkxxCLxEu7Nk/UWT/DsKSRmfgu0UoBnfWIEu+/WhFqWU9Za1pn +84+0Ew/A2C89KHKqGX8RfWpbn5XnX7eUT/E+oVr/Lcyd3yd3jzJzHGcKdvP6XLG/ +vB29DCibsscXZwszD8O9Ntz7ukILq+2Ew2LWhBapsQdrqW7uxs/msEQpwvCzYYAq +i2/SFFwlh1Rk86RMwaH4p2vq/uo6/HnbDo/cxvPJ1Gze6YOhjh0i7Mk6sgB73Dun +Qhp/3IupET2Op8Agb10JXUNE5o9mzKlbB/Hvm3oOs1ThlP0OLMaT11X9cZg1uAlK +/8YpKCz2Ui3bFBiSJ+IWfozK1GG+goeR65g3P79fXXc/NKwbOEOraHKZMh46Ghml +ozhMI9ej58zVKpIXkAtaS70WvfuGauKJmezkoFUYyaMIHxPgMghy0A== +-----END CERTIFICATE----- + +# DigiCert ECC P384 Root G5 +-----BEGIN CERTIFICATE----- +MIICETCCAZegAwIBAgIQDfPZN2WjecWVZuqS4iRPNDAKBggqhkjOPQQDAzBKMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIjAgBgNVBAMTGURp +Z2lDZXJ0IEVDQyBQMzg0IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcNNDYwMTE0 +MjM1OTU5WjBKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x +IjAgBgNVBAMTGURpZ2lDZXJ0IEVDQyBQMzg0IFJvb3QgRzUwdjAQBgcqhkjOPQIB +BgUrgQQAIgNiAAT8WR/OmWx/mw62KWNvxoXzCtPWm65XFUwO7V3jCX5tKqOGqrp4 +oKdxvUT6CMBKBtZv3SxKOHTl0L3/ev/lOU69vRceH0Ot1bwn2Eu/dowwMqT7+VPl +2Ko4U12ooDegZwqjQjBAMB0GA1UdDgQWBBSSlvfmutURuvkiLnt+WtnwJeUFGzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBl +AjEA/cBN8aSn26cMJhH0Sb0HOGMrRGIGeQjHw9TPmz6rOieqkMf9WaK4MlLbyo4X +CwqQAjBdGuxRidRk3PnlHji9Wy7j5UTkOxh61/CVQI/y68/0+dBlokHysOZ8wTYs +j1453Tc= +-----END CERTIFICATE----- + +# DigiCert Global Root CA +-----BEGIN CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= +-----END CERTIFICATE----- + +# DigiCert Global Root G2 +-----BEGIN CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrY= +-----END CERTIFICATE----- + +# DigiCert Global Root G3 +-----BEGIN CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycX +-----END CERTIFICATE----- + +# DigiCert High Assurance EV Root CA +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9K +-----END CERTIFICATE----- + +# DigiCert RSA4096 Root G5 +-----BEGIN CERTIFICATE----- +MIIFXjCCA0agAwIBAgIQCL+ib5o/M2WirPCmOMQBcDANBgkqhkiG9w0BAQwFADBJ +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xITAfBgNVBAMT +GERpZ2lDZXJ0IFJTQTQwOTYgUm9vdCBHNTAeFw0yMTAxMTUwMDAwMDBaFw00NjAx +MTQyMzU5NTlaMEkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5j +LjEhMB8GA1UEAxMYRGlnaUNlcnQgUlNBNDA5NiBSb290IEc1MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAqr4NsgZ9JvlH6uQb50JpuJnCue4ksUaQy1kk +UlQ1piTCX5EZyLZC1vNHZZVk54VlZ6mufABP4HgDUK3zf464EeeBYrGL3/JJJgne +Dxa82iibociXL5OQ2iAq44TU/6mesC2/tADemx/IoGNTaIVvTYXGqmP5jbI1dmJ0 +A9yTmGgFns2QZd3SejGrJC1tQC6QP2NsLOv6HoBUjXkCkBSztU9O9YgEQ4DDSLMm +L6xRlTJVJS9BlrBWoQg73JgfcoUsd8qYzDj7jnLJbewF7O1NtzxbFFCF3Zf7WfeQ +EvQTv4NNgLIVZRGXYOXWXOYEtVDmcTO2IJOpaAA4zknbtFw7ctdFXFS/zTwBIx58 +1vhpLKUACmwySLTecC06ExfBf2TL8zDtoT2WZ/GUtWBsW2lo9YIzCaK22fOFsm6g +lPDCxH2hLMpz9a7gUpyiZuYDzurf7RjUuWOL9+j/+7Nbj0PFr7d0lFA1Za7WL/GF +j1OhcPSNMl28lsMewgQEnAQPs11+iSDKXicNiUoSI7T2xN3YH/hoszb4HrzG94S2 +6IpOiDA4wCbYcAoJOjQOa4ISlhwv5p6t2HE1gbGMBm70bmb/S0quvfD+11xfU7sy +PM1i0RSgKR8Q3qlyT7GtZOWDKo+L6oSV7pglmJqzcTzBp1DyrEJiMcKhkMbu4reK +qLW2GzsCAwEAAaNCMEAwHQYDVR0OBBYEFGJtt5FPxOqjYmCPoNC+tY8GfGgAMA4G +A1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4IC +AQBh6PsnbdbiuLMJr6rwsYJM/j0XiU0tFZ377tC7hOyEddtDE96Mn8cp74d0yxNw +gVYAdPyu9Nk63iIIUaWgXIJmtntMqdqPq6wcQZZm1p3eVua/TrGyXl/Aw27UwoSQ +9X2xuhbRKYrInenP0McZOz/P7vfhM65CyJjACJ7zWvPf1Cs7jqgoVhnHTnc8JVTc +uEhI0fknaj7sE6+yBYn9VV/zfY4NnAldLIp+hc744b8RPTKMWtd+PfQzWM+iBZij +s/vOib/9whbdbtyISQ0LoAP/50XpBMHp/aqddfi4H4eD2es501qny5isE4kA/G+V +TuF9EUZt9jhGoxOgLAH1Ys+/HFCRJ3Rdt+xHfNDRdct77tFNIwrDYKV3LYDaZw+O +a3YH8KYP6oSuHnm/CIraCfP07rU289R6Q7qUNeH6wTsblpmkV2PrtaiC9634d9d2 +hvN2U1Zb/CZChM6fg5GRr/S+cBWApdjoabHYkVS4GbJi+aL6Ve0Ev7lEhuTP8ZsA +vxEPvrV0JFH/dzRj7EgjDugR63dt2sqCkb6khJNM2qH+zAaE6CHoVLrm0x1jPcJa +/ObJg55yZKmGWQCMwvcTg7bQpDHGrJGOe6QiVhPGdccjvItb/EY9/l1SKa+v6MnD +dkvoq0cC8poN0yyIgAeGwGMPAkyOBFN2uVhCb3wpcF2/Jw== +-----END CERTIFICATE----- + +# DigiCert Trusted Root G4 +-----BEGIN CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ +-----END CERTIFICATE----- + +# Digidentity L3 Root CA - G2 +-----BEGIN CERTIFICATE----- +MIIFoTCCA4mgAwIBAgIBATANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTDEZ +MBcGA1UEChMQRGlnaWRlbnRpdHkgQi5WLjEkMCIGA1UEAxMbRGlnaWRlbnRpdHkg +TDMgUm9vdCBDQSAtIEcyMB4XDTExMDQyOTEwNDQxOVoXDTMxMTExMDEwNDQxOVow +TjELMAkGA1UEBhMCTkwxGTAXBgNVBAoTEERpZ2lkZW50aXR5IEIuVi4xJDAiBgNV +BAMTG0RpZ2lkZW50aXR5IEwzIFJvb3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBALgRo0XeAUdWDWK4jrpYZlz6MsZrgG64f/hT337fYqjB +V0+aRSXISkUtUzgksyCsT+qt/5oQr3/iDsq0DiQlkc52jhCpL5lTp5BLBItterlB +G9MBeYyfQWu5kNeBEhoHltAJr+nkaiFTgLiGnmJoQ62zahX69m0DMmo1sVATSMd6 +tSETnASc2pP5aivBpxj99sB+Wfb75w4Rtdwj6hzvZwVXzhfp8Xux0TIkjM9l59S8 +NhlwfKInIdaA0i0VT0q14FWQlVGTIYDznEQf/x1VVeTiEBGUFlPQ/q/z75e6RuJ3 +W8vWolkRiKbnVUHDkmUdIxRiFH8lciD2pIcpbwf8/uDQGNKX+RSONsboDBiX8XYc +9CTa40r5t0wSGWfz8OFT+13kwHRjXyWRCtk+9DOs5At1X87mmLxUDZ2iMcUVVF0i +HIs6VKYN0dcjOqw+qkoXZHYtDftU5euCPDlBQ53hrnlgz2bux3GDewxrCdueok1O +RpNot/pn4dq/35GA2qOiia1ebMxLd3Vkb40k44iIC+M/6b+n5VZiDYN/vWphyJCJ +eFsMrxIq4pOtZOfZRS72sMirRe5wOG+7NT4W/quew2Yv874JYNVvgL1N26+N/gxg +M2sP6J1rxDB3nyxQONCYaew36J4P5GLq+v8RRFTZ782TdZFM4YllppS5U/n5SWPF +AgMBAAGjgYkwgYYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFCsjIGC9LYqIR6ytK74CObqY1OyYMEQGA1UdIAQ9MDswOQYEVR0gADAx +MC8GCCsGAQUFBwIBFiNodHRwOi8vcGtpLmRpZ2lkZW50aXR5LmV1L3ZhbGlkYXRp +ZTANBgkqhkiG9w0BAQsFAAOCAgEAqf3vuo8bfjISZx1BDS2mi8/y9K1WeH4KmNib +qNG0SywmrOTSf2c3vQmN5blzETpuCcdXZAchNPgOXSrYkXzxVFG8nPAMakL0PAFO +k0VBPazzmEsecR4zWTL/fDDwXOThvi0uterdYiEOPbQNlfzJuNm6oPdip+3DA64I +LEHV70NxOLcUcq4/9BR0R9jejFF5zu+xVKxwR5Z+LS7dm+6hAS4Z775YYHEtrZdb +WmAwyzKCYk5W5WdqtNIxVHI/AtC8MDmPt0MJKh8mOwzHfB2bgGCEDuku0vkVu1vg +iqQA6eMp+yhbvTZFYCFDMf9woV9cg1uXfA23U1nsmLVO4imx1HxG4+jjQ+o6ljUf +U/EEFiXjLPNooaaR3xX7vZ/mTp7CVGt+IlfjpJxcIiUfga+ZyN8RFUhD+LMzqSN/ +DjOPvEYdQ7Q7YPWXhRmiFrBV3BpwKWXa2X4JFzTribrpYZLY3jRjPEpVar/ahu3O +M967U2/PHNqUT3ZUrGVVEFOayLhr3AbmuuVR1UF/H8TAQaFgkTTzE4LRoXfT90zk +Gf/XRJqwtbzcyl6P3M7xoGk24ESSLpn6vK+zx3g6VWbHa6XkaSbpNB0fKpcK6Xep +d1tzSDKBv//R7IPFcINpnpgbw1ffkZUcgPyN6JaDBdOfeoh7+uhX8cGEKL3N1hzM +peJJCnM= +-----END CERTIFICATE----- + +# E-ME SSI (RCA) +-----BEGIN CERTIFICATE----- +MIIF4DCCA8igAwIBAgIQLu/b+9iJPY9JHJNy/kXf7TANBgkqhkiG9w0BAQUFADBQ +MQswCQYDVQQGEwJMVjEoMCYGA1UECxMfU2VydGlmaWthY2lqYXMgcGFrYWxwb2p1 +bXUgZGFsYTEXMBUGA1UEAxMORS1NRSBTU0kgKFJDQSkwHhcNMDkwNTE5MDg0NTU2 +WhcNMjcwNTE5MDg0ODE1WjBQMQswCQYDVQQGEwJMVjEoMCYGA1UECxMfU2VydGlm +aWthY2lqYXMgcGFrYWxwb2p1bXUgZGFsYTEXMBUGA1UEAxMORS1NRSBTU0kgKFJD +QSkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDEBGsAw7DgLjvoUwUF +CL7IhCdV1h2KEuIXIlps/7PdtpnDysHq+dgltd86nZ0/UsXp8qy/iXSKVK5Oz27y +Xq7avRIHmZXPZKv+mZFkWYzJvkRqMZuY6rrq0SEOKAs5m+PWiqb3Aro/PdlZ9HmZ +3tMkm4twGyqE1uUJDyYmJFiPJV7zxZ10iaU2xeVSsuvohpNHbqcph6R+3LSjyzJW +90WA2lzHL6Cn1+/1/LWozYSVYvipKyM7bdO3ksjqwbwUTehrnBZ60+wH+wclEE8U +h3uSNs5WgmVLEyYG2KOjpt/Cevt7NQWiEz0+drwcV4MDUcc03lr1PL02JZwWD03O +6A0ay11DohRvunxg1AKFdsVrKrhFsVx3RxGtoCWpZpGMURdtYVUKGT+bAv/E9dbS +s+klU+EEPY8i0KJl5a6ntOAdkWrChpL3Ol0Tp3pMQt9as0qIRCzvR7qpr9bPYnOK +BiIWLMLsHwao00dQWTIS5bmdYjWeyl4KtJ0jiMLTTywsyZPofrgJ7KbZ3WPhyahq +aNyEUaxaEuc7prUHCrGqTrO0olffN2wWTquZMnrwnCMli8qaqIzgOCG0zvdsYcji +DBJZBoEmNloPNXPUFkX93pXe1ktcn3PZvhm957/kVWrIa0T3x7gziHkZDQZk6K8L +oXUMUmW6CiOVcfdj/H7ljI/M0QIDAQABo4G1MIGyMA4GA1UdDwEB/wQEAwIBBjAY +BggrBgEFBQcBAwQMMAowCAYGBACORgEBMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFDsmA7rP41lGQlCtFJy/Azvv1j4xMBAGCSsGAQQBgjcVAQQDAgEAMEQGA1Ud +IAQ9MDswOQYLKwYBBAGB+j0BAQEwKjAoBggrBgEFBQcCARYcaHR0cDovL3d3dy5l +bWUubHYvcmVwb3NpdG9yeTANBgkqhkiG9w0BAQUFAAOCAgEAheamlOTZRl+dv5O7 ++Wt2ZCiuvzxFKoqTeWzTS4iGIGsiJjg9HBOq62GXbC4+V5xsQ6LebUDEMfJtukYW +sy3Gu6bc5S+x2MHVkR4Rf/tfodwdYfhtm2Hw4j8rcdUNy97fZT+gb5WbesvbNTcp +XV6duVSxrGAS5WPZza9SGwWWE3zaJHUBrdSepcvBEkVPV68jvym86o6tePiHI+hI +y0Covl0z1uzGBkPCZyro44UuYJ5ELytPMbEHnZUh1SqSr4CR08cpvc3xFQyfAe74 +LTukB3BJeSTtvKHTllGCn8LIvN4jmsdQK5q2eFKqzpX2YDuimfkmZvRHLEElvEH6 +1ot/vV+CfNNFhbRM2OyzF+9EOvUoZe/1nnHMId7o1lEcEPtA/EnlXIQXr6oZXqLt +Th6i+8pHHBxkPhSRojkZNIh/kcs7nRlw6ij7/FAPzL09XgIDa3k1REF27rYtdITh +gnHTJbDTw5lEqz/iDKXuvab8pBEA7py9N9HWYsQwFC0QCpeKiPUlPJa+RkAaisCF +dsSgSeBJpecZtQnzzE3tFl6a1NPIadDYijeFa07kqgeSXNRxcYFI03j1VmD+zALU +AJMfTJJAl75yU3kuJlK+pqN0sZTZFGM6blvRPJInUpAyWpLSD05bCwY6YuXWJwwB +9iUCuIsQKUKp92nK3OsKkksoMYY= +-----END CERTIFICATE----- + +# E-Tugra Certification Authority +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNV +BAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBC +aWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNV +BAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQDDB9FLVR1 +Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMwNTEyMDk0OFoXDTIz +MDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+ +BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhp +em1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN +ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4vU/kwVRHoViVF56C/UY +B4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vdhQd2h8y/L5VMzH2nPbxH +D5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5KCKpbknSF +Q9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEo +q1+gElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3D +k14opz8n8Y4e0ypQBaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcH +fC425lAcP9tDJMW/hkd5s3kc91r0E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsut +dEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gzrt48Ue7LE3wBf4QOXVGUnhMM +ti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAqjqFGOjGY5RH8 +zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn +rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUX +U8u3Zg5mTPj5dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6 +Jyr+zE7S6E5UMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5 +XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAF +Nzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAKkEh47U6YA5n+KGCR +HTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jOXKqY +GwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c +77NCR807VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3 ++GbHeJAAFS6LrVE1Uweoa2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WK +vJUawSg5TB9D0pH0clmKuVb8P7Sd2nCcdlqMQ1DujjByTd//SffGqWfZbawCEeI6 +FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEVKV0jq9BgoRJP3vQXzTLl +yb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gTDx4JnW2P +AJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpD +y4Q08ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8d +NL/+I5c30jn6PQ0GC7TbO6Orb1wdtn7os4I07QZcJA== +-----END CERTIFICATE----- + +# E-Tugra Global Root CA ECC v3 +-----BEGIN CERTIFICATE----- +MIICpTCCAiqgAwIBAgIUJkYZdzHhT28oNt45UYbm1JeIIsEwCgYIKoZIzj0EAwMw +gYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUtVHVn +cmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYwJAYD +VQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIEVDQyB2MzAeFw0yMDAzMTgwOTQ2 +NThaFw00NTAzMTIwOTQ2NThaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMGQW5r +YXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1Z3Jh +IFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBDQSBF +Q0MgdjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASOmCm/xxAeJ9urA8woLNheSBkQ +KczLWYHMjLiSF4mDKpL2w6QdTGLVn9agRtwcvHbB40fQWxPa56WzZkjnIZpKT4YK +fWzqTTKACrJ6CZtpS5iB4i7sAnCWH/31Rs7K3IKjYzBhMA8GA1UdEwEB/wQFMAMB +Af8wHwYDVR0jBBgwFoAU/4Ixcj75xGZsrTie0bBRiKWQzPUwHQYDVR0OBBYEFP+C +MXI++cRmbK04ntGwUYilkMz1MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNp +ADBmAjEA5gVYaWHlLcoNy/EZCL3W/VGSGn5jVASQkZo1kTmZ+gepZpO6yGjUij/6 +7W4WAie3AjEA3VoXK3YdZUKWpqxdinlW2Iob35reX8dQj7FbcQwm32pAAOwzkSFx +vmjkI6TZraE3 +-----END CERTIFICATE----- + +# E-Tugra Global Root CA RSA v3 +-----BEGIN CERTIFICATE----- +MIIF8zCCA9ugAwIBAgIUDU3FzRYilZYIfrgLfxUGNPt5EDQwDQYJKoZIhvcNAQEL +BQAwgYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUt +VHVncmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYw +JAYDVQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIFJTQSB2MzAeFw0yMDAzMTgw +OTA3MTdaFw00NTAzMTIwOTA3MTdaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMG +QW5rYXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1 +Z3JhIFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBD +QSBSU0EgdjMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCiZvCJt3J7 +7gnJY9LTQ91ew6aEOErxjYG7FL1H6EAX8z3DeEVypi6Q3po61CBxyryfHUuXCscx +uj7X/iWpKo429NEvx7epXTPcMHD4QGxLsqYxYdE0PD0xesevxKenhOGXpOhL9hd8 +7jwH7eKKV9y2+/hDJVDqJ4GohryPUkqWOmAalrv9c/SF/YP9f4RtNGx/ardLAQO/ +rWm31zLZ9Vdq6YaCPqVmMbMWPcLzJmAy01IesGykNz709a/r4d+ABs8qQedmCeFL +l+d3vSFtKbZnwy1+7dZ5ZdHPOrbRsV5WYVB6Ws5OUDGAA5hH5+QYfERaxqSzO8bG +wzrwbMOLyKSRBfP12baqBqG3q+Sx6iEUXIOk/P+2UNOMEiaZdnDpwA+mdPy70Bt4 +znKS4iicvObpCdg604nmvi533wEKb5b25Y08TVJ2Glbhc34XrD2tbKNSEhhw5oBO +M/J+JjKsBY04pOZ2PJ8QaQ5tndLBeSBrW88zjdGUdjXnXVXHt6woq0bM5zshtQoK +5EpZ3IE1S0SVEgpnpaH/WwAH0sDM+T/8nzPyAPiMbIedBi3x7+PmBvrFZhNb/FAH +nnGGstpvdDDPk1Po3CLW3iAfYY2jLqN4MpBs3KwytQXk9TwzDdbgh3cXTJ2w2Amo +DVf3RIXwyAS+XF1a4xeOVGNpf0l0ZAWMowIDAQABo2MwYTAPBgNVHRMBAf8EBTAD +AQH/MB8GA1UdIwQYMBaAFLK0ruYt9ybVqnUtdkvAG1Mh0EjvMB0GA1UdDgQWBBSy +tK7mLfcm1ap1LXZLwBtTIdBI7zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL +BQADggIBAImocn+M684uGMQQgC0QDP/7FM0E4BQ8Tpr7nym/Ip5XuYJzEmMmtcyQ +6dIqKe6cLcwsmb5FJ+Sxce3kOJUxQfJ9emN438o2Fi+CiJ+8EUdPdk3ILY7r3y18 +Tjvarvbj2l0Upq7ohUSdBm6O++96SmotKygY/r+QLHUWnw/qln0F7psTpURs+APQ +3SPh/QMSEgj0GDSz4DcLdxEBSL9htLX4GdnLTeqjjO/98Aa1bZL0SmFQhO3sSdPk +vmjmLuMxC1QLGpLWgti2omU8ZgT5Vdps+9u1FGZNlIM7zR6mK7L+d0CGq+ffCsn9 +9t2HVhjYsCxVYJb6CH5SkPVLpi6HfMsg2wY+oF0Dd32iPBMbKaITVaA9FCKvb7jQ +mhty3QUBjYZgv6Rn7rWlDdF/5horYmbDB7rnoEgcOMPpRfunf/ztAmgayncSd6YA +VSgU7NbHEqIbZULpkejLPoeJVF3Zr52XnGnnCv8PWniLYypMfUeUP95L6VPQMPHF +9p5J3zugkaOj/s1YzOrfr28oO6Bpm4/srK4rVJ2bBLFHIK+WEj5jlB0E5y67hscM +moi/dkfv97ALl2bSRM9gUgfh1SxKOidhd8rXj+eHDjD/DLsE4mHDosiXYY60MGo8 +bcIHX0pzLz/5FooBZu+6kcpSV3uu1OYP3Qt6f4ueJiDPO++BcYNZ +-----END CERTIFICATE----- + +# EBG Elektronik Sertifika Hizmet Sağlayıcısı +-----BEGIN CERTIFICATE----- +MIIF5zCCA8+gAwIBAgIITK9zQhyOdAIwDQYJKoZIhvcNAQEFBQAwgYAxODA2BgNV +BAMML0VCRyBFbGVrdHJvbmlrIFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sx +c8SxMTcwNQYDVQQKDC5FQkcgQmlsacWfaW0gVGVrbm9sb2ppbGVyaSB2ZSBIaXpt +ZXRsZXJpIEEuxZ4uMQswCQYDVQQGEwJUUjAeFw0wNjA4MTcwMDIxMDlaFw0xNjA4 +MTQwMDMxMDlaMIGAMTgwNgYDVQQDDC9FQkcgRWxla3Ryb25payBTZXJ0aWZpa2Eg +SGl6bWV0IFNhxJ9sYXnEsWPEsXPEsTE3MDUGA1UECgwuRUJHIEJpbGnFn2ltIFRl +a25vbG9qaWxlcmkgdmUgSGl6bWV0bGVyaSBBLsWeLjELMAkGA1UEBhMCVFIwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDuoIRh0DpqZhAy2DE4f6en5f2h +4fuXd7hxlugTlkaDT7byX3JWbhNgpQGR4lvFzVcfd2NR/y8927k/qqk153nQ9dAk +tiHq6yOU/im/+4mRDGSaBUorzAzu8T2bgmmkTPiab+ci2hC6X5L8GCcKqKpE+i4s +tPtGmggDg3KriORqcsnlZR9uKg+ds+g75AxuetpX/dfreYteIAbTdgtsApWjluTL +dlHRKJ2hGvxEok3MenaoDT2/F08iiFD9rrbskFBKW5+VQarKD7JK/oCZTqNGFav4 +c0JqwmZ2sQomFd2TkuzbqV9UIlKRcF0T6kjsbgNs2d1s/OsNA/+mgxKb8amTD8Um +TDGyY5lhcucqZJnSuOl14nypqZoaqsNW2xCaPINStnuWt6yHd6i58mcLlEOzrz5z ++kI2sSXFCjEmN1ZnuqMLfdb3ic1nobc6HmZP9qBVFCVMLDMNpkGMvQQxahByCp0O +Lna9XvNRiYuoP1Vzv9s6xiQFlpJIqkuNKgPlV5EQ9GooFW5Hd4RcUXSfGenmHmMW +OeMRFeNYGkS9y8RsZteEBt8w9DeiQyJ50hBs37vmExH8nYQKE3vwO9D8owrXieqW +fo1IhR5kX9tUoqzVegJ5a9KK8GfaZXINFHDk6Y54jzJ0fFfy1tb0Nokb+Clsi7n2 +l9GkLqq+CxnCRelwXQIDAJ3Zo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB +/wQEAwIBBjAdBgNVHQ4EFgQU587GT/wWZ5b6SqMHwQSny2re2kcwHwYDVR0jBBgw +FoAU587GT/wWZ5b6SqMHwQSny2re2kcwDQYJKoZIhvcNAQEFBQADggIBAJuYml2+ +8ygjdsZs93/mQJ7ANtyVDR2tFcU22NU57/IeIl6zgrRdu0waypIN30ckHrMk2pGI +6YNw3ZPX6bqz3xZaPt7gyPvT/Wwp+BVGoGgmzJNSroIBk5DKd8pNSe/iWtkqvTDO +TLKBtjDOWU/aWR1qeqRFsIImgYZ29fUQALjuswnoT4cCB64kXPBfrAowzIpAoHME +wfuJJPaaHFy3PApnNgUIMbOv2AFoKuB4j3TeuFGkjGwgPaL7s9QJ/XvCgKqTbCmY +Iai7FvOpEl90tYeY8pUm3zTvilORiF0alKM/fCL414i6poyWqD1SNGKfAB5UVUJn +xk1Gj7sURT0KlhaOEKGXmdXTMIXM3rRyt7yKPBgpaP3ccQfuJDlq+u2lrDgv+R4Q +DgZxGhBM/nV+/x5XOULK1+EVoVZVWRvRo68R2E7DpSvvkL/A7IITW43WciyTTo9q +Kd+FPNMN4KIYEsxVL0e3p5sC/kH2iExt2qkBR4NkJ2IQgtYSe14DHzSpyZH+r11t +hie3I6p1GMog57AP14kOpmciY/SDQSsGS7tY1dHXt7kQY9iJSrSq3RZj9W6+YKH4 +7ejWkE8axsWgKdOnIaj1Wjz3x0miIZpKlVIglnKaZsv30oZDfCK+lvm9AahH3eU7 +QPl1K5srRmSGjR70j/sHd9DqSaIcjVIUpgqT +-----END CERTIFICATE----- + +# EC-ACC +-----BEGIN CERTIFICATE----- +MIIFVjCCBD6gAwIBAgIQ7is969Qh3hSoYqwE893EATANBgkqhkiG9w0BAQUFADCB +8zELMAkGA1UEBhMCRVMxOzA5BgNVBAoTMkFnZW5jaWEgQ2F0YWxhbmEgZGUgQ2Vy +dGlmaWNhY2lvIChOSUYgUS0wODAxMTc2LUkpMSgwJgYDVQQLEx9TZXJ2ZWlzIFB1 +YmxpY3MgZGUgQ2VydGlmaWNhY2lvMTUwMwYDVQQLEyxWZWdldSBodHRwczovL3d3 +dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAoYykwMzE1MDMGA1UECxMsSmVyYXJxdWlh +IEVudGl0YXRzIGRlIENlcnRpZmljYWNpbyBDYXRhbGFuZXMxDzANBgNVBAMTBkVD +LUFDQzAeFw0wMzAxMDcyMzAwMDBaFw0zMTAxMDcyMjU5NTlaMIHzMQswCQYDVQQG +EwJFUzE7MDkGA1UEChMyQWdlbmNpYSBDYXRhbGFuYSBkZSBDZXJ0aWZpY2FjaW8g +KE5JRiBRLTA4MDExNzYtSSkxKDAmBgNVBAsTH1NlcnZlaXMgUHVibGljcyBkZSBD +ZXJ0aWZpY2FjaW8xNTAzBgNVBAsTLFZlZ2V1IGh0dHBzOi8vd3d3LmNhdGNlcnQu +bmV0L3ZlcmFycmVsIChjKTAzMTUwMwYDVQQLEyxKZXJhcnF1aWEgRW50aXRhdHMg +ZGUgQ2VydGlmaWNhY2lvIENhdGFsYW5lczEPMA0GA1UEAxMGRUMtQUNDMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsyLHT+KXQpWIR4NA9h0X84NzJB5R +85iKw5K4/0CQBXCHYMkAqbWUZRkiFRfCQ2xmRJoNBD45b6VLeqpjt4pEndljkYRm +4CgPukLjbo73FCeTae6RDqNfDrHrZqJyTxIThmV6PttPB/SnCWDaOkKZx7J/sxaV +HMf5NLWUhdWZXqBIoH7nF2W4onW4HvPlQn2v7fOKSGRdghST2MDk/7NQcvJ29rNd +QlB50JQ+awwAvthrDk4q7D7SzIKiGGUzE3eeml0aE9jD2z3Il3rucO2n5nzbcc8t +lGLfbdb1OL4/pYUKGbio2Al1QnDE6u/LDsg0qBIimAy4E5S2S+zw0JDnJwIDAQAB +o4HjMIHgMB0GA1UdEQQWMBSBEmVjX2FjY0BjYXRjZXJ0Lm5ldDAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUoMOLRKo3pUW/l4Ba0fF4 +opvpXY0wfwYDVR0gBHgwdjB0BgsrBgEEAfV4AQMBCjBlMCwGCCsGAQUFBwIBFiBo +dHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbDA1BggrBgEFBQcCAjApGidW +ZWdldSBodHRwczovL3d3dy5jYXRjZXJ0Lm5ldC92ZXJhcnJlbCAwDQYJKoZIhvcN +AQEFBQADggEBAKBIW4IB9k1IuDlVNZyAelOZ1Vr/sXE7zDkJlF7W2u++AVtd0x7Y +/X1PzaBB4DSTv8vihpw3kpBWHNzrKQXlxJ7HNd+KDM3FIUPpqojlNcAZQmNaAl6k +SBg6hW/cnbw/nZzBh7h6YQjpdwt/cKt63dmXLGQehb+8dJahw3oS7AwaboMMPOhy +Rp/7SNVel+axofjk70YllJyJ22k4vuxcDlbHZVHlUIiIv0LVKz3l+bqeLrPK9HOS +Agu+TGbrIP65y7WZf+a2E/rKS03Z7lNGBjvGTq2TWoF+bCpLagVFjPIhpDGQh2xl +nJ2lYJU6Un/10asIbvPuW/mIPX64b24D5EI= +-----END CERTIFICATE----- + +# ECRaizEstado +-----BEGIN CERTIFICATE----- +MIIFbjCCA1agAwIBAgIPQupbClERJnzYJ3S3339xMA0GCSqGSIb3DQEBBQUAMDMx +CzAJBgNVBAYTAlBUMQ0wCwYDVQQKDARTQ0VFMRUwEwYDVQQDDAxFQ1JhaXpFc3Rh +ZG8wHhcNMDYwNjIzMTM0MTI3WhcNMzAwNjIzMTM0MTI3WjAzMQswCQYDVQQGEwJQ +VDENMAsGA1UECgwEU0NFRTEVMBMGA1UEAwwMRUNSYWl6RXN0YWRvMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA2++iQ27Iqf1u19+sopKEochZoAyaU/7v +rswZDXKKpMIzI+/nBnLqbUs6QVIPyUgOLee6ZO6iOkxjXGYpi9+piMW96PH3jkv8 +ATxEEjkqcKLA28Wi31/HS8ao3D1hfEpYwUQyk95wmaEjJlY/o+HqXzBG2Hj1MKOW +CYmwPfGGkwW2EmoYjfClZDsrh2RePReOC27mmMyXODggjHBaaSu9ZY3NN1lcbNFy +dFkGTsi3Add3v/BIhqizGl1B1DcXERBfSm6NdcUDQH0hrgDw2/yfbDpmpN/3yt+A +ZlrZ2H8UoiYZ9K4LIeDKPgXdFth+WdqhsGnDnTQT+mVJOYfudi+NvTwnGQNOrQ4L +KyzGLnETNSlX6XDcG1HqzZfxlY2yhvomBi+AGpXxmDvu9uWGpc4bAeX06TPKD1VE +X2iKLMdbZijdlkuDnV4dfhjV/rJg+5pRaMOWjB9oS1BSCzbmMSfk1ykMG9obL+EE +U7jUeUmwO4FeCIgid+IpwK5yqqu0clK9bLv1unjZnLggbzCNSp0y+fQB5mJ5mEJA +BXpvHCo/tfvfzRhAjuUQxDlbVvE8VwWr0jlNP/iLI8druUCx4v7/sxwKaR+bjA+0 +H+AK3kj9jV+PmfUBdgU2XY7cM45RbhHiQf3Mt40qXz6S5fKx4KQj4qK3xo0YmylK +0UZ/9GQgGN0CAwEAAaN/MH0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFHF/Nd71d3FtHRKc4ZCkuvCpg4+AMDsGA1UdIAQ0MDIwMAYE +VR0gADAoMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVjZWUuZ292LnB0L2RwYzAN +BgkqhkiG9w0BAQUFAAOCAgEAjK2ccqW1Z3ZnOIfpOoz+nVk1vpDxAwCgWNiY0b/8 +/PNQ3LRl1dq68IwufA3mCZFfTaP2XXicWF1qcJSjr9svAMkDQGvfUQMWGYwrvJk2 +9sCtkhgTjKftHdLfA5AF7LCTmJv3TVoT+Oeb9zZ23nwm+BE4T0lOs3MfXydb4Z4y +HvbAmBvZICxclo2GyQtF15Ktir3qV6KjVrYgPOyyxzl+sID+vVErKrTDcmnD+Ucu +bv+ch+3cdcsQiOC0zi4OUx0L6G4eQkzQvjl4dckU3ieRc6rsaoDw8BeWYk++BMvi +p+VdD5NFy1lIJhPe3bH1CtoWsagdj35YG7fVCd6Ia86EPqi+UmLK0qGhx8s8FuB2 +VjA/5g9rBnf+ZJ1aanN87t4h6ZpJlze2hH+ikT5F+9daBsWHNdy6SEyGAQhHNrY4 +UJURmXPRN0kK+kJPLxBU00GQ+sjcuxHcDcx9fJvcDpFxhk248hWaKzgXEaHynqhs +nOPOruLmS4vyigY7B3cCEe6D6p1mhsrwYqnVV4OkFfFFFP4adX+lD9xSdFl1Cvj7 +VUGpXI0xRN3NlE4z0RtBqtvXoTzwxUhtRUE1tXmD5vlN8VY4179AIvsggOMcwllG +B2MCYQA7m1C7Q8Ow6QqauHb0R2FVZHBPN9mcEaMTsuHdQEK7mNegBovmaFdLDjho +f7o= +-----END CERTIFICATE----- + +# EE Certification Centre Root CA +-----BEGIN CERTIFICATE----- +MIIEAzCCAuugAwIBAgIQVID5oHPtPwBMyonY43HmSjANBgkqhkiG9w0BAQUFADB1 +MQswCQYDVQQGEwJFRTEiMCAGA1UECgwZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1 +czEoMCYGA1UEAwwfRUUgQ2VydGlmaWNhdGlvbiBDZW50cmUgUm9vdCBDQTEYMBYG +CSqGSIb3DQEJARYJcGtpQHNrLmVlMCIYDzIwMTAxMDMwMTAxMDMwWhgPMjAzMDEy +MTcyMzU5NTlaMHUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKDBlBUyBTZXJ0aWZpdHNl +ZXJpbWlza2Vza3VzMSgwJgYDVQQDDB9FRSBDZXJ0aWZpY2F0aW9uIENlbnRyZSBS +b290IENBMRgwFgYJKoZIhvcNAQkBFglwa2lAc2suZWUwggEiMA0GCSqGSIb3DQEB +AQUAA4IBDwAwggEKAoIBAQDIIMDs4MVLqwd4lfNE7vsLDP90jmG7sWLqI9iroWUy +euuOF0+W2Ap7kaJjbMeMTC55v6kF/GlclY1i+blw7cNRfdCT5mzrMEvhvH2/UpvO +bntl8jixwKIy72KyaOBhU8E2lf/slLo2rpwcpzIP5Xy0xm90/XsY6KxX7QYgSzIw +WFv9zajmofxwvI6Sc9uXp3whrj3B9UiHbCe9nyV0gVWw93X2PaRka9ZP585ArQ/d +MtO8ihJTmMmJ+xAdTX7Nfh9WDSFwhfYggx/2uh8Ej+p3iDXE/+pOoYtNP2MbRMNE +1CV2yreN1x5KZmTNXMWcg+HCCIia7E6j8T4cLNlsHaFLAgMBAAGjgYowgYcwDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBLyWj7qVhy/ +zQas8fElyalL1BSZMEUGA1UdJQQ+MDwGCCsGAQUFBwMCBggrBgEFBQcDAQYIKwYB +BQUHAwMGCCsGAQUFBwMEBggrBgEFBQcDCAYIKwYBBQUHAwkwDQYJKoZIhvcNAQEF +BQADggEBAHv25MANqhlHt01Xo/6tu7Fq1Q+e2+RjxY6hUFaTlrg4wCQiZrxTFGGV +v9DHKpY5P30osxBAIWrEr7BSdxjhlthWXePdNl4dp1BUoMUq5KqMlIpPnTX/dqQG +E5Gion0ARD9V04I8GtVbvFZMIi5GQ4okQC3zErg7cBqklrkar4dBGmoYDQZPxz5u +uSlNDUmJEYcyW+ZLBMjkXOZ0c5RdFpgTlf7727FE5TpwrDdr5rMzcijJs1eg9gIW +iAYLtqZLICjU3j2LrTcFU3T+bsy8QxdxXvnFzBqpYe73dgzzcvRyrc9yAjYHR8/v +GVCJYMzpJJUPwssd8m92kMfMdcGWxZ0= +-----END CERTIFICATE----- + +# Entrust.net Premium 2048 Secure Server CA +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVE= +-----END CERTIFICATE----- + +# Entrust Code Signing Root Certification Authority - CSBR1 +-----BEGIN CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUf/Go+fQ66IduLcb/XkM9su4wpkMwDQYJKoZIhvcNAQEN +BQAwaTELMAkGA1UEBhMCVVMxFjAUBgNVBAoMDUVudHJ1c3QsIEluYy4xQjBABgNV +BAMMOUVudHJ1c3QgQ29kZSBTaWduaW5nIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgLSBDU0JSMTAeFw0yMTA1MDcxMzI2MzZaFw00MDEyMzAxMzI2MzZaMGkx +CzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMuMUIwQAYDVQQDDDlF +bnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCngY/3FEW2 +YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFqgCLGqGZ1TVSDyV5o +G6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+lOhjJUCyXJy2/2gB9 +Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr+0i6udfBgniFZS5/ +tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/dvfqsv2RR0VybtPVc +51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1HfYq8E+lID1oJeth +l3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dnDH5erXhnW1XjXuvH +2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjignPqEPkHcblauxhpb +9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5ZHFc7CXKd18q3kMbN +e0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuKQ6NzbOOzazf/5p1n +AZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0uDodEYOOp9MIYo+P9 +zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo0IwQDAdBgNVHQ4EFgQUgrrW +PZfOn89x6JI3r/2ztWk1V88wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwDQYJKoZIhvcNAQENBQADggIBABLvOKGI4aGj1mXcR5zzvNzPrEuMPBq+K/T3 +0GcXaIZNcKjyzdAxAld9qQyKO1c5nvBu9yQiBWfRwZbBvtHw+FZnC96614ibjddr +CHb1WJHZtcNAUxqk8YXNPwBOP06TO3i50gdSZAyGaW3oVGVWF+gAU4SK89v7s84L +VWKPzUxJBjh/UsPzHNc99zPKMq3Bqa9v6xHL7qxRv7AmmnpOI7RK9mm0QmnWoI22 +jEdKOyA3t0EH7y8g2GYcaZeobDB8d0Nea74mmIMPOtbHcCoWRi0lVIZjZVdC9yNB +6VBqB0POTrXpH2jY2NYJSqjosvyQZ5LkkCbzR/rWIPuJgOJEczn3ioYzC/iqqedN +7Nxv1c8xTauOH5BA1nxcgg+uF1Jx6aznTTjtKth2eYetF6NMq7dCV78GrOXQTTDp +VU/jRcrz4GohNI3HnxyjY0iS0pYHvqVHPsIqmTinjtohfFFt3Ms9B+mpvUnUXTVf +W4wEUeqaWJC6G69oeLEWD5QpO4+bKo/JIPBxQkxcTasxjKvpfyZoaaClFg2BxNEF +DMOHZuUHY6obTv+yB0FPpSJGUKxmAIdSbDyyO5yXoUa0W97PwmpZVQeMo6TRdzVn +RgQv2Ti5Rq+6jhtyJgIvdlTvg8IvLHdwzHcQkqoDrcrM4E/pg0blszwZb3p5h7Y4 +mr1CzqRi +-----END CERTIFICATE----- + +# Entrust Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 +Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW +KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw +NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw +NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy +ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV +BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo +Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 +4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 +KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI +rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi +94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB +sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi +gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo +kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE +vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA +A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t +O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua +AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP +9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ +eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m +0vdXcDazv/wor3ElhVsT/h5/WrQ8 +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - EC1 +-----BEGIN CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G2 +-----BEGIN CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G4 +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHw== +-----END CERTIFICATE----- + +# Equifax +-----BEGIN CERTIFICATE----- +MIIDIDCCAomgAwIBAgIENd70zzANBgkqhkiG9w0BAQUFADBOMQswCQYDVQQGEwJV +UzEQMA4GA1UEChMHRXF1aWZheDEtMCsGA1UECxMkRXF1aWZheCBTZWN1cmUgQ2Vy +dGlmaWNhdGUgQXV0aG9yaXR5MB4XDTk4MDgyMjE2NDE1MVoXDTE4MDgyMjE2NDE1 +MVowTjELMAkGA1UEBhMCVVMxEDAOBgNVBAoTB0VxdWlmYXgxLTArBgNVBAsTJEVx +dWlmYXggU2VjdXJlIENlcnRpZmljYXRlIEF1dGhvcml0eTCBnzANBgkqhkiG9w0B +AQEFAAOBjQAwgYkCgYEAwV2xWGcIYu6gmi0fCG2RFGiYCh7+2gRvE4RiIcPRfM6f +BeC4AfBONOziipUEZKzxa1NfBbPLZ4C/QgKO/t0BCezhABRP/PvwDN1Dulsr4R+A +cJkVV5MW8Q+XarfCaCMczE1ZMKxRHjuvK9buY0V7xdlfUNLjUA86iOe/FP3gx7kC +AwEAAaOCAQkwggEFMHAGA1UdHwRpMGcwZaBjoGGkXzBdMQswCQYDVQQGEwJVUzEQ +MA4GA1UEChMHRXF1aWZheDEtMCsGA1UECxMkRXF1aWZheCBTZWN1cmUgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5MQ0wCwYDVQQDEwRDUkwxMBoGA1UdEAQTMBGBDzIwMTgw +ODIyMTY0MTUxWjALBgNVHQ8EBAMCAQYwHwYDVR0jBBgwFoAUSOZo+SvSspXXR9gj +IBBPM5iQn9QwHQYDVR0OBBYEFEjmaPkr0rKV10fYIyAQTzOYkJ/UMAwGA1UdEwQF +MAMBAf8wGgYJKoZIhvZ9B0EABA0wCxsFVjMuMGMDAgbAMA0GCSqGSIb3DQEBBQUA +A4GBAFjOKer89961zgK5F7WF0bnj4JXMJTENAKaSbn+2kmOeUJXRmm/kEd5jhW6Y +7qj/WsjTVbJmcVfewCHrPSqnI0kBBIZCe/zuf6IWUrVnZ9NA2zsmWLIodz2uFHdh +1voqZiegDfqnc1zqcPGUIWVEX/r87yloqaKHee9570+sB3c4 +-----END CERTIFICATE----- + +# Equifax Secure Global eBusiness CA-1 +-----BEGIN CERTIFICATE----- +MIICkDCCAfmgAwIBAgIBATANBgkqhkiG9w0BAQQFADBaMQswCQYDVQQGEwJVUzEc +MBoGA1UEChMTRXF1aWZheCBTZWN1cmUgSW5jLjEtMCsGA1UEAxMkRXF1aWZheCBT +ZWN1cmUgR2xvYmFsIGVCdXNpbmVzcyBDQS0xMB4XDTk5MDYyMTA0MDAwMFoXDTIw +MDYyMTA0MDAwMFowWjELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0VxdWlmYXggU2Vj +dXJlIEluYy4xLTArBgNVBAMTJEVxdWlmYXggU2VjdXJlIEdsb2JhbCBlQnVzaW5l +c3MgQ0EtMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAuucXkAJlsTRVPEnC +UdXfp9E3j9HngXNBUmCbnaEXJnitx7HoJpQytd4zjTov2/KaelpzmKNc6fuKcxtc +58O/gGzNqfTWK8D3+ZmqY6KxRwIP1ORROhI8bIpaVIRw28HFkM9yRcuoWcDNM50/ +o5brhTMhHD4ePmBudpxnhcXIw2ECAwEAAaNmMGQwEQYJYIZIAYb4QgEBBAQDAgAH +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUvqigdHJQa0S3ySPY+6j/s1dr +aGwwHQYDVR0OBBYEFL6ooHRyUGtEt8kj2Puo/7NXa2hsMA0GCSqGSIb3DQEBBAUA +A4GBADDiAVGqx+pf2rnQZQ8w1j7aDRRJbpGTJxQx78T3LUX47Me/okENI7SS+RkA +Z70Br83gcfxaz2TE4JaY0KNA4gGK7ycH8WUBikQtBmV1UsCGECAhX2xrD2yuCRyv +8qIYNMR1pHMc8Y3c7635s3a0kr/clRAevsvIO1qEYBlWlKlV +-----END CERTIFICATE----- + +# GDCA TrustAUTH R5 ROOT +-----BEGIN CERTIFICATE----- +MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE +BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ +IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 +MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV +BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w +HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj +Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj +TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u +KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj +qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm +MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 +ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP +zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk +L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC +jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA +HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC +AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg +p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm +DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 +COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry +L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf +JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg +IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io +2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV +09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ +XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq +T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe +MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0g== +-----END CERTIFICATE----- + +# GLOBALTRUST +-----BEGIN CERTIFICATE----- +MIIH/jCCBeagAwIBAgIBADANBgkqhkiG9w0BAQUFADCB1DELMAkGA1UEBhMCQVQx +DzANBgNVBAcTBlZpZW5uYTEQMA4GA1UECBMHQXVzdHJpYTE6MDgGA1UEChMxQVJH +RSBEQVRFTiAtIEF1c3RyaWFuIFNvY2lldHkgZm9yIERhdGEgUHJvdGVjdGlvbjEq +MCgGA1UECxMhR0xPQkFMVFJVU1QgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRQwEgYD +VQQDEwtHTE9CQUxUUlVTVDEkMCIGCSqGSIb3DQEJARYVaW5mb0BnbG9iYWx0cnVz +dC5pbmZvMB4XDTA2MDgwNzE0MTIzNVoXDTM2MDkxODE0MTIzNVowgdQxCzAJBgNV +BAYTAkFUMQ8wDQYDVQQHEwZWaWVubmExEDAOBgNVBAgTB0F1c3RyaWExOjA4BgNV +BAoTMUFSR0UgREFURU4gLSBBdXN0cmlhbiBTb2NpZXR5IGZvciBEYXRhIFByb3Rl +Y3Rpb24xKjAoBgNVBAsTIUdMT0JBTFRSVVNUIENlcnRpZmljYXRpb24gU2Vydmlj +ZTEUMBIGA1UEAxMLR0xPQkFMVFJVU1QxJDAiBgkqhkiG9w0BCQEWFWluZm9AZ2xv +YmFsdHJ1c3QuaW5mbzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANIS +R+xfmOgNhhVJxN3snvFszVG2+5VPi8SQPVMzsdMTxUjipb/19AOED5x4cfaSl/Fb +WXUYPycLUS9caMeh6wDz9pU9acN+wqzECjZyelum0PcBeyjHKscyYO5ZuNcLJ92z +RQUre2Snc1zokwKXaOz8hNue1NWBR8acwKyXyxnqh6UKo7h1JOdQJw2rFvlWXbGB +ARZ98+nhJPMIIbm6rF2ex0h5f2rK3zl3BG0bbjrNf85cSKwSPFnyas+ASOH2AGd4 +IOD9tWR7F5ez5SfdRWubYZkGvvLnnqRtiztrDIHutG+hvhoSQUuerQ75RrRa0QMA +lBbAwPOs+3y8lsAp2PkzFomjDh2V2QPUIQzdVghJZciNqyEfVLuZvPFEW3sAGP0q +GVjSBcnZKTYl/nfua1lUTwgUopkJRVetB94i/IccoO+ged0KfcB/NegMZk3jtWoW +WXFb85CwUl6RAseoucIEb55PtAAt7AjsrkBu8CknIjm2zaCGELoLNex7Wg22ecP6 +x63B++vtK4QN6t7565pZM2zBKxKMuD7FNiM4GtZ3k5DWd3VqWBkXoRWObnYOo3Ph +XJVJ28EPlBTF1WIbmas41Wdu0qkZ4Vo6h2pIP5GW48bFJ2tXdDGY9j5xce1+3rBN +LPPuj9t7aNcQRCmt7KtQWVKabGpyFE0WFFH3134fAgMBAAGjggHXMIIB0zAdBgNV +HQ4EFgQUwAHV4HgfL3Q64+vAIVKmBO4my6QwggEBBgNVHSMEgfkwgfaAFMAB1eB4 +Hy90OuPrwCFSpgTuJsukoYHapIHXMIHUMQswCQYDVQQGEwJBVDEPMA0GA1UEBxMG +Vmllbm5hMRAwDgYDVQQIEwdBdXN0cmlhMTowOAYDVQQKEzFBUkdFIERBVEVOIC0g +QXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0aW9uMSowKAYDVQQLEyFH +TE9CQUxUUlVTVCBDZXJ0aWZpY2F0aW9uIFNlcnZpY2UxFDASBgNVBAMTC0dMT0JB +TFRSVVNUMSQwIgYJKoZIhvcNAQkBFhVpbmZvQGdsb2JhbHRydXN0LmluZm+CAQAw +DwYDVR0TAQH/BAUwAwEB/zALBgNVHQ8EBAMCAcYwEQYDVR0gBAowCDAGBgRVHSAA +MD0GA1UdEQQ2MDSBFWluZm9AZ2xvYmFsdHJ1c3QuaW5mb4YbaHR0cDovL3d3dy5n +bG9iYWx0cnVzdC5pbmZvMD0GA1UdEgQ2MDSBFWluZm9AZ2xvYmFsdHJ1c3QuaW5m +b4YbaHR0cDovL3d3dy5nbG9iYWx0cnVzdC5pbmZvMA0GCSqGSIb3DQEBBQUAA4IC +AQAVO4iDXg7ePvA+XdwtoUr6KKXWB6UkSM6eeeh5mlwkjlhyFEGFx0XuPChpOEmu +Io27jAVtrmW7h7l+djsoY2rWbzMwiH5VBbq5FQOYHWLSzsAPbhyaNO7krx9i0ey0 +ec/PaZKKWP3Bx3YLXM1SNEhr5Qt/yTIS35gKFtkzVhaP30M/170/xR7FrSGshyya +5BwfhQOsi8e3M2JJwfiqK05dhz52Uq5ZfjHhfLpSi1iQ14BGCzQ23u8RyVwiRsI8 +p39iBG/fPkiO6gs+CKwYGlLW8fbUYi8DuZrWPFN/VSbGNSshdLCJkFTkAYhcnIUq +mmVeS1fygBzsZzSaRtwCdv5yN3IJsfAjj1izAn3ueA65PXMSLVWfF2Ovrtiuc7bH +UGqFwdt9+5RZcMbDB2xWxbAH/E59kx25J8CwldXnfAW89w8Ks/RuFVdJG7UUAKQw +K1r0Vli/djSiPf4BJvDduG3wpOe8IPZRCPbjN4lXNvb3L/7NuGS96tem0P94737h +HB5Ufg80GYEQc9LjeAYXttJR+zV4dtp3gzdBPi1GqH6G3lb0ypCetK2wHkUYPDSI +Aofo8DaR6/LntdIEuS64XY0dmi4LFhnNdqSr+9Hio6LchH176lDq9bIEO4lSOrLD +GU+5JrG8vCyy4YGms2G19EVgLyx1xcgtiEsmu3DuO38BLQ== +-----END CERTIFICATE----- + +# GLOBALTRUST 2015 +-----BEGIN CERTIFICATE----- +MIIGDDCCA/SgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMCQVQx +DTALBgNVBAgTBFdpZW4xDTALBgNVBAcTBFdpZW4xIzAhBgNVBAoTGmUtY29tbWVy +Y2UgbW9uaXRvcmluZyBHbWJIMSowKAYDVQQLEyFHTE9CQUxUUlVTVCBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2UxGTAXBgNVBAMTEEdMT0JBTFRSVVNUIDIwMTUwHhcNMTUw +NjExMDAwMDAwWhcNNDAwNjEwMDAwMDAwWjCBlzELMAkGA1UEBhMCQVQxDTALBgNV +BAgTBFdpZW4xDTALBgNVBAcTBFdpZW4xIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMSowKAYDVQQLEyFHTE9CQUxUUlVTVCBDZXJ0aWZpY2F0aW9u +IFNlcnZpY2UxGTAXBgNVBAMTEEdMT0JBTFRSVVNUIDIwMTUwggIgMA0GCSqGSIb3 +DQEBAQUAA4ICDQAwggIIAoICAQDUppeo8vSQEUOttIJGQfEvkW9jos0NINy9DDiK +ZUoKKzqodKl3oYuO8i+B94QYza3rYraSfeBB5U5UODeC78vg7c+7ysyjS/db/rh8 +pwhty0PETCIUZuOdA7l3IatEayFHI8gg+irLkXYddWz4m+kPJulDL5ogBWgYx46Z +hS1BB6ZkjljhjZWApE1f9QLYgXnb1effoiL9FKdnFuzZWEzKqd3qGo6pCGRPUSG2 +cqJO/1BxvTtl5L1/UxGu3xA5e132R3AX90ORA3phJV8s/PiJETzsOVQWScQhmnHg +eYt2HXY9B1m4B7GM3MfNTuH7rUNNP0DvIWIvMUROacdvIsurVEvowvoRaKzIbg7e +bMUnlglRAk0Btle/MijVCUOW98SItflU/ho6arcstSRk+0p4csP82U/ITiO5KdgN +oUhBkwJtvxKFm8bFYC3wkfyZ/SCUnnFjq9VJq5DshzmFf42FzAvo20s7DvzCdn1G +5zkmnt9V3x6E+UE2JmwCWSuO+7zpHyckYgRnhOE/2J0YTpagJe7KKANPAlHP9zU3 +aaS01tbVHhlDJxYfR1HuSglMEVq2Wz1h6DsQvtZG5vQc/bhFvXz6dVrs4VIjDY4f +hpdTkVybmyjWjuVuJ60gjKfBQamXN4ss6m4YBZf2zgNS8b15NJtAxyOSdPNv7aPp +WfBVSwIBA6NjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFMuw3T2MPN9iLCtmPJ486RVtcbTXMB8GA1UdIwQYMBaAFMuw3T2MPN9i +LCtmPJ486RVtcbTXMA0GCSqGSIb3DQEBCwUAA4ICAQCifVUEZu4WFLyCgYclGTli +9P47H+HAcwBxynWp4nPxxQ1Bo12OwS3ZZVvZieLwjsWgfb3LzEZTH1/tILYCKtYT +8p19UUpAVXGtnux26kUgjqr6ekOacGd+E96Y6MuN3R+sNNKhte3+uOcWz/jRODCN +NInSzn2B0h7/URhTNpPcCcsIFrgI11owkIoK+S+1z8TNVHIqxr0B51gLbgZAtAnO +tI6zmumJkZSselTh++OELIOgT/7r6MH067Ym0zjELa2sRYA0bSE9XYU64nv+VLfd +6IVUy6TxqylQeNcktaMvnq8RZq4YuP1dKM9A11XgLOtSMWhDZgWXkrvF8SEs/RJk +MZlDb4udS2D+FF5SsyOo4Zh67hTJoeLMP3YhYv1rDdm0SpXmblt6JMPTxtYfous3 +a06j32Lr6w5KCL/rGIj7RxqtwlHD1Xz3HyuzyEpQDmlYIGIBSlvKY5YmIq726ZxA +rGcDnZ1pFcLA+F2nJLEnPL8F4quiysmwLX6jwTEgRiFlkt3K3t+TG7xtL1+pFqRX +hyxymlqCZ9FE4j0JCoGMHhD9xjRo7P93YXZ/Jvfb/BJGEqrA0fh5haICzIuqpK1s +FMC9/GiuRH0i+QpFXewE5vrjpMXm+bIZw9mMqJN7OoppO1ITPB0zAk6WQJ+5lf2T +FzPByQv2/b1pEPWtKfvj2g== +-----END CERTIFICATE----- + +# GLOBALTRUST 2020 +-----BEGIN CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg== +-----END CERTIFICATE----- + +# GTE CyberTrust Global Root +-----BEGIN CERTIFICATE----- +MIICWjCCAcMCAgGlMA0GCSqGSIb3DQEBBAUAMHUxCzAJBgNVBAYTAlVTMRgwFgYD +VQQKEw9HVEUgQ29ycG9yYXRpb24xJzAlBgNVBAsTHkdURSBDeWJlclRydXN0IFNv +bHV0aW9ucywgSW5jLjEjMCEGA1UEAxMaR1RFIEN5YmVyVHJ1c3QgR2xvYmFsIFJv +b3QwHhcNOTgwODEzMDAyOTAwWhcNMTgwODEzMjM1OTAwWjB1MQswCQYDVQQGEwJV +UzEYMBYGA1UEChMPR1RFIENvcnBvcmF0aW9uMScwJQYDVQQLEx5HVEUgQ3liZXJU +cnVzdCBTb2x1dGlvbnMsIEluYy4xIzAhBgNVBAMTGkdURSBDeWJlclRydXN0IEds +b2JhbCBSb290MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCVD6C28FCc6HrH +iM3dFw4usJTQGz0O9pTAipTHBsiQl8i4ZBp6fmw8U+E3KHNgf7KXUwefU/ltWJTS +r41tiGeA5u2ylc9yMcqlHHK6XALnZELn+aks1joNrI1CqiQBOeacPwGFVw1Yh0X4 +04Wqk2kmhXBIgD8SFcd5tB8FLztimQIDAQABMA0GCSqGSIb3DQEBBAUAA4GBAG3r +GwnpXtlR22ciYaQqPEh346B8pt5zohQDhT37qw4wxYMWM4ETCJ57NE7fQMh017l9 +3PR2VX2bY1QY6fDq81yx2YtCHrnAlU66+tXifPVoYb+O7AWXX1uw16OFNMQkpw0P +lZPvy5TYnh+dXIVtx6quTx8itc2VrbqnzPmrC3p/ +-----END CERTIFICATE----- + +# GeoTrust Global CA +-----BEGIN CERTIFICATE----- +MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i +YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG +EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg +R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9 +9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq +fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv +iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU +1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+ +bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW +MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA +ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l +uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn +Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS +tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF +PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un +hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV +5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMw== +-----END CERTIFICATE----- + +# GeoTrust Global CA 2 +-----BEGIN CERTIFICATE----- +MIIDZjCCAk6gAwIBAgIBATANBgkqhkiG9w0BAQUFADBEMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UEAxMUR2VvVHJ1c3QgR2xvYmFs +IENBIDIwHhcNMDQwMzA0MDUwMDAwWhcNMTkwMzA0MDUwMDAwWjBEMQswCQYDVQQG +EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UEAxMUR2VvVHJ1c3Qg +R2xvYmFsIENBIDIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDvPE1A +PRDfO1MA4Wf+lGAVPoWI8YkNkMgoI5kF6CsgncbzYEbYwbLVjDHZ3CB5JIG/NTL8 +Y2nbsSpr7iFY8gjpeMtvy/wWUsiRxP89c96xPqfCfWbB9X5SJBri1WeR0IIQ13hL +TytCOb1kLUCgsBDTOEhGiKEMuzozKmKY+wCdE1l/bztyqu6mD4b5BWHqZ38MN5aL +5mkWRxHCJ1kDs6ZgwiFAVvqgx306E+PsV8ez1q6diYD3Aecs9pYrEw15LNnA5IZ7 +S4wMcoKK+xfNAGw6EzywhIdLFnopsk/bHdQL82Y3vdj2V7teJHq4PIu5+pIaGoSe +2HSPqht/XvT+RSIhAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE +FHE4NvICMVNHK266ZUapEBVYIAUJMB8GA1UdIwQYMBaAFHE4NvICMVNHK266ZUap +EBVYIAUJMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQUFAAOCAQEAA/e1K6td +EPx7srJerJsOflN4WT5CBP51o62sgU7XAotexC3IUnbHLB/8gTKY0UvGkpMzNTEv +/NgdRN3ggX+d6YvhZJFiCzkIjKx0nVnZellSlxG5FntvRdOW2TF9AjYPnDtuzywN +A0ZF66D0f0hExghAzN4bcLUprbqLOzRldRtxIR0sFAqwlpW41uryZfspuk/qkZN0 +abby/+Ea0AzRdoXLiiW9l14sbxWZJue2Kf8i7MkCx1YAzUm5s2x7UwQa4qjJqhIF +I8LO57sEAszAR6LkxCkvW0VXiVHuPOtSCP8HNR6fNWpHSlaY0VqFH4z1Ir+rzoPz +4iIprn2DQKi6bA== +-----END CERTIFICATE----- + +# GeoTrust Primary Certification Authority +-----BEGIN CERTIFICATE----- +MIIDfDCCAmSgAwIBAgIQGKy1av1pthU6Y2yv2vrEoTANBgkqhkiG9w0BAQUFADBY +MQswCQYDVQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjExMC8GA1UEAxMo +R2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEx +MjcwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMFgxCzAJBgNVBAYTAlVTMRYwFAYDVQQK +Ew1HZW9UcnVzdCBJbmMuMTEwLwYDVQQDEyhHZW9UcnVzdCBQcmltYXJ5IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAvrgVe//UfH1nrYNke8hCUy3f9oQIIGHWAVlqnEQRr+92/ZV+zmEwu3qDXwK9 +AWbK7hWNb6EwnL2hhZ6UOvNWiAAxz9juapYC2e0DjPt1befquFUWBRaa9OBesYjA +ZIVcFU2Ix7e64HXprQU9nceJSOC7KMgD4TCTZF5SwFlwIjVXiIrxlQqD17wxcwE0 +7e9GceBrAqg1cmuXm2bgyxx5X9gaBGgeRwLmnWDiNpcB3841kt++Z8dtd1k7j53W +kBWUvEI0EME5+bEnPn7WinXFsq+W06Lem+SYvn3h6YGttm/81w7a4DSwDRp35+MI +mO9Y+pyEtzavwt+s0vQQBnBxNQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQULNVQQZcVi/CPNmFbSvtr2ZnJM5IwDQYJ +KoZIhvcNAQEFBQADggEBAFpwfyzdtzRP9YZRqSa+S7iq8XEN3GHHoOo0Hnp3DwQ1 +6CePbJC/kRYkRj5KTs4rFtULUh38H2eiAkUxT87z+gOneZ1TatnaYzr4gNfTmeGl +4b7UVXGYNTq+k+qurUKykG/g/CFNNWMziUnWm07Kx+dOCQD32sfvmWKZd7aVIl6K +oKv0uHiYyjgZmclynnjNS6yvGaBzEi38wkG6gZHaFloxt/m0cYASSJlyc1pZU8Fj +UjPtp8nSOQJw+uCxQmYpqptR7TBUIhRf2asdweSU8Pj1K/fqynhG1riR/aYNKxoU +AT6A8EKglQdebc3MS6RFjasS6LPeWuWgfOgPIh1a6Vk= +-----END CERTIFICATE----- + +# GeoTrust Primary Certification Authority - G2 +-----BEGIN CERTIFICATE----- +MIICrjCCAjWgAwIBAgIQPLL0SAoA4v7rJDteYD7DazAKBggqhkjOPQQDAzCBmDEL +MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsTMChj +KSAyMDA3IEdlb1RydXN0IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTE2 +MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEcyMB4XDTA3MTEwNTAwMDAwMFoXDTM4MDExODIzNTk1OVowgZgxCzAJBgNV +BAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykgMjAw +NyBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0BgNV +BAMTLUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBH +MjB2MBAGByqGSM49AgEGBSuBBAAiA2IABBWx6P0DFUPlrOuHNxFi79KDNlJ9RVcL +So17VDs6bl8VAsBQps8lL33KSLjHUGMcKiEIfJo22Av+0SbFWDEwKCXzXV2juLal +tJLtbCyf691DiaI8S0iRHVDsJt/WYC69IaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFBVfNVdRVfslsq0DafwBo/q+EVXVMAoG +CCqGSM49BAMDA2cAMGQCMGSWWaboCd6LuvpaiIjwH5HTRqjySkwCY/tsXzjbLkGT +qQ7mndwxHLKgpxgceeHHNgIwOlavmnRs9vuD4DPTCF+hnMJbn0bWtsuRBmOiBucz +rD6ogRLQy7rQkgu2npaqBA+K +-----END CERTIFICATE----- + +# GeoTrust Primary Certification Authority - G3 +-----BEGIN CERTIFICATE----- +MIID/jCCAuagAwIBAgIQFaxulBmyeUtB9iepwxgPHzANBgkqhkiG9w0BAQsFADCB +mDELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xOTA3BgNVBAsT +MChjKSAyMDA4IEdlb1RydXN0IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25s +eTE2MDQGA1UEAxMtR2VvVHJ1c3QgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhv +cml0eSAtIEczMB4XDTA4MDQwMjAwMDAwMFoXDTM3MTIwMTIzNTk1OVowgZgxCzAJ +BgNVBAYTAlVTMRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMTkwNwYDVQQLEzAoYykg +MjAwOCBHZW9UcnVzdCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxNjA0 +BgNVBAMTLUdlb1RydXN0IFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANziXmJYHTNXOTIz ++uvLh4yn1ErdBojqZI4xmKU4kB6Yzy5jK/BGvESyiaHAKAxJcCGVn2TAppMSAmUm +hsalifD614SgcK9PGpc/BkTVyetyEH3kMSj7HGHmKAdEc5IiaacDiGydY8hS2pgn +5whMcD60yRLBxWeDXTPzAxHsatBT4tG6NmCUgLthY2xbF37fQJQeqw3CIShwiP/W +JmxsYAQlTlV+fe+/lEjetx3dcI0FX4ilm/LC7urRQEFtYjgdVgbFA0dRIBn8exAL +DmKudlW/X3e+PkkBUz2YJQN2JFodtNuJ6nnltrM7P7pMKEF/BqxqjsHQ9gUdfeZC +huOl1UcCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYw +HQYDVR0OBBYEFMR5yo6hTgMdHNxr2zFblD4/MH8tMA0GCSqGSIb3DQEBCwUAA4IB +AQAtxRPPVoB7eni9n64smefv2t+UXglpp+duaIy9cr5HqQ6XErhK8WTTOd8lNNTB +zU6B8A8ExCSzNJbGpqow32hhc9f5joWJ7w5elShKKiePEI4ufIbEAp7aDHdlDkQN +kv39sxY2+hENHYwOB4lqKVb3cvTdFZx3NWZXqxNT2I7BQMXXExZacse3aQHEerGD +AWh9jUGhlBjBJVz88P6DAod8DQ3PLghcSkANPuyBYeYk28rgDi0Hsj5W3I31QYUH +SJsMC8tJP33st/3LjWeJGqvtux6jAAgIFyqCXDFdRootD4abdNlF+9RAsXqqaC2G +spki4cErx5z481+oghLrGREt +-----END CERTIFICATE----- + +# GeoTrust Universal CA +-----BEGIN CERTIFICATE----- +MIIFaDCCA1CgAwIBAgIBATANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEeMBwGA1UEAxMVR2VvVHJ1c3QgVW5pdmVy +c2FsIENBMB4XDTA0MDMwNDA1MDAwMFoXDTI5MDMwNDA1MDAwMFowRTELMAkGA1UE +BhMCVVMxFjAUBgNVBAoTDUdlb1RydXN0IEluYy4xHjAcBgNVBAMTFUdlb1RydXN0 +IFVuaXZlcnNhbCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKYV +VaCjxuAfjJ0hUNfBvitbtaSeodlyWL0AG0y/YckUHUWCq8YdgNY96xCcOq9tJPi8 +cQGeBvV8Xx7BDlXKg5pZMK4ZyzBIle0iN430SppyZj6tlcDgFgDgEB8rMQ7XlFTT +QjOgNB0eRXbdT8oYN+yFFXoZCPzVx5zw8qkuEKmS5j1YPakWaDwvdSEYfyh3peFh +F7em6fgemdtzbvQKoiFs7tqqhZJmr/Z6a4LauiIINQ/PQvE1+mrufislzDoR5G2v +c7J2Ha3QsnhnGqQ5HFELZ1aD/ThdDc7d8Lsrlh/eezJS/R27tQahsiFepdaVaH/w +mZ7cRQg+59IJDTWU3YBOU5fXtQlEIGQWFwMCTFMNaN7VqnJNk22CDtucvc+081xd +VHppCZbW2xHBjXWotM85yM48vCR85mLK4b19p71XZQvk/iXttmkQ3CgaRr0BHdCX +teGYO8A3ZNY9lO4L4fUorgtWv3GLIylBjobFS1J72HGrH4oVpjuDWtdYAVHGTEHZ +f9hBZ3KiKN9gg6meyHv8U3NyWfWTehd2Ds735VzZC1U0oqpbtWpU5xPKV+yXbfRe +Bi9Fi1jUIxaS5BZuKGNZMN9QAZxjiRqf2xeUgnA3wySemkfWWspOqGmJch+RbNt+ +nhutxx9z3SxPGWX9f5NAEC7S8O08ni4oPmkmM8V7AgMBAAGjYzBhMA8GA1UdEwEB +/wQFMAMBAf8wHQYDVR0OBBYEFNq7LqqwDLiIJlF0XG0D08DYj3rWMB8GA1UdIwQY +MBaAFNq7LqqwDLiIJlF0XG0D08DYj3rWMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG +9w0BAQUFAAOCAgEAMXjmx7XfuJRAyXHEqDXsRh3ChfMoWIawC/yOsjmPRFWrZIRc +aanQmjg8+uUfNeVE44B5lGiku8SfPeE0zTBGi1QrlaXv9z+ZhP015s8xxtxqv6fX +IwjhmF7DWgh2qaavdy+3YL1ERmrvl/9zlcGO6JP7/TG37FcREUWbMPEaiDnBTzyn +ANXH/KttgCJwpQzgXQQpAvvLoJHRfNbDflDVnVi+QTjruXU8FdmbyUqDWcDaU/0z +uzYYm4UPFd3uLax2k7nZAY1IEKj79TiG8dsKxr2EoyNB3tZ3b4XUhRxQ4K5RirqN +Pnbiucon8l+f725ZDQbYKxek0nxru18UGkiPGkzns0ccjkxFKyDuSN/n3QmOGKja +QI2SJhFTYXNd673nxE0pN2HrrDktZy4W1vUAg4WhzH92xH3kt0tm7wNFYGm2DFKW +koRepqO1pD4r2czYG0eq8kTaT/kD6PAUyz/zg97QwVTjt+gKN02LIFkDMBmhLMi9 +ER/frslKxfMnZmaGrGiR/9nmUxwPi1xpZQomyB40w11Re9epnAahNt3ViZS82eQt +DF4JbAiXfKM9fJP/P6EUp8+1Xevb2xzEdt+Iub1FBZUbrvxGakyvSOPOrg/Sfuvm +bJxPgWp6ZKy7PtXny3YuxadIwVyQD8vIP/rmMuGNG2+k5o7Y+SlIis5z/iw= +-----END CERTIFICATE----- + +# GeoTrust Universal CA 2 +-----BEGIN CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIBATANBgkqhkiG9w0BAQUFADBHMQswCQYDVQQGEwJVUzEW +MBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1c3QgVW5pdmVy +c2FsIENBIDIwHhcNMDQwMzA0MDUwMDAwWhcNMjkwMzA0MDUwMDAwWjBHMQswCQYD +VQQGEwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEgMB4GA1UEAxMXR2VvVHJ1 +c3QgVW5pdmVyc2FsIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQCzVFLByT7y2dyxUxpZKeexw0Uo5dfR7cXFS6GqdHtXr0om/Nj1XqduGdt0DE81 +WzILAePb63p3NeqqWuDW6KFXlPCQo3RWlEQwAx5cTiuFJnSCegx2oG9NzkEtoBUG +FF+3Qs17j1hhNNwqCPkuwwGmIkQcTAeC5lvO0Ep8BNMZcyfwqph/Lq9O64ceJHdq +XbboW0W63MOhBW9Wjo8QJqVJwy7XQYci4E+GymC16qFjwAGXEHm9ADwSbSsVsaxL +se4YuU6W3Nx2/zu+z18DwPw76L5GG//aQMJS9/7jOvdqdzXQ2o3rXhhqMcceujwb +KNZrVMaqW9eiLBsZzKIC9ptZvTdrhrVtgrrY6slWvKk2WP0+GfPtDCapkzj4T8Fd +IgbQl+rhrcZV4IErKIM6+vR7IVEAvlI4zs1meaj0gVbi0IMJR1FbUGrP20gaXT73 +y/Zl92zxlfgCOzJWgjl6W70viRu/obTo/3+NjN8D8WBOWBFM66M/ECuDmgFz2ZRt +hAAnZqzwcEAJQpKtT5MNYQlRJNiS1QuUYbKHsu3/mjX/hVTK7URDrBs8FmtISgoc +QIgfksILAAX/8sgCSqSqqcyZlpwvWOB94b67B9xfBHJcMTTD7F8t4D1kkCLm0ey4 +Lt1ZrtmhN79UNdxzMk+MBB4zsslG8dhcyFVQyWi9qLo2CQIDAQABo2MwYTAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAfBgNV +HSMEGDAWgBR281Xh+qQ2+/CfXGJx7Tz0RzgQKzAOBgNVHQ8BAf8EBAMCAYYwDQYJ +KoZIhvcNAQEFBQADggIBAGbBxiPz2eAubl/oz66wsCVNK/g7WJtAJDday6sWSf+z +dXkzoS9tcBc0kf5nfo/sm+VegqlVHy/c1FEHEv6sFj4sNcZj/NwQ6w2jqtB8zNHQ +L1EuxBRa3ugZ4T7GzKQp5y6EqgYweHZUcyiYWTjgAA1i00J9IZ+uPTqM1fp3DRgr +Fg5fNuH8KrUwJM/gYwx7WBr+mbpCErGR9Hxo4sjoryzqyX6uuyo9DRXcNJW2GHSo +ag/HtPQTxORb7QrSpJdMKu0vbBKJPfEncKpqA1Ihn0CoZ1Dy81of398j9tx4TuaY +T1U6U+Pv8vSfx3zYWK8pIpe44L2RLrB27FcRz+8pRPPphXpgY+RdM4kX2TGq2tbz +GDVyz4crL2MjhF2EjD9XoIj8mZEoJmmZ1I+XRL6O1UixpCgp8RW04eWe3fiPpm8m +1wk8OhwRDqZsN/etRIcsKMfYdIKz0G9KV7s1KSegi+ghp4dkNl3M2Basx7InQJJV +OCiNUW7dFGdTbHFcJoRNdVq2fmBWqU2t+5sel/MN2dKXVHfaPRK34B7vCAas+YWH +6aLcr34YEoP9VhdBLtUpgn2Z9DH2canPLAEnpQW5qrJITirvn5NSUZU8UnOOVkwX +QMAJKOSLakhT2+zNVVXxxvjpoixMptEmX36vWkzaH6byHCx+rgIW0lbQL1dTR+iS +-----END CERTIFICATE----- + +# GlobalSign +-----BEGIN CERTIFICATE----- +MIIDujCCAqKgAwIBAgILBAAAAAABD4Ym5g0wDQYJKoZIhvcNAQEFBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjIxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDYxMjE1MDgwMDAwWhcNMjExMjE1 +MDgwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMjETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAKbPJA6+Lm8omUVCxKs+IVSbC9N/hHD6ErPL +v4dfxn+G07IwXNb9rfF73OX4YJYJkhD10FPe+3t+c4isUoh7SqbKSaZeqKeMWhG8 +eoLrvozps6yWJQeXSpkqBy+0Hne/ig+1AnwblrjFuTosvNYSuetZfeLQBoZfXklq +tTleiDTsvHgMCJiEbKjNS7SgfQx5TfC4LcshytVsW33hoCmEofnTlEnLJGKRILzd +C9XZzPnqJworc5HGnRusyMvo4KD0L5CLTfuwNhv2GXqF4G3yYROIXJ/gkwpRl4pa +zq+r1feqCapgvdzZX99yqWATXgAByUr6P6TqBwMhAo6CygPCm48CAwEAAaOBnDCB +mTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUm+IH +V2ccHsBqBt5ZtJot39wZhi4wNgYDVR0fBC8wLTAroCmgJ4YlaHR0cDovL2NybC5n +bG9iYWxzaWduLm5ldC9yb290LXIyLmNybDAfBgNVHSMEGDAWgBSb4gdXZxwewGoG +3lm0mi3f3BmGLjANBgkqhkiG9w0BAQUFAAOCAQEAmYFThxxol4aR7OBKuEQLq4Gs +J0/WwbgcQ3izDJr86iw8bmEbTUsp9Z8FHSbBuOmDAGJFtqkIk7mpM0sYmsL4h4hO +291xNBrBVNpGP+DTKqttVCL1OmLNIG+6KYnX3ZHu01yiPqFbQfXf5WRDLenVOavS +ot+3i9DAgBkcRcAtjOj4LaR0VknFBbVPFd5uRHg5h6h+u/N5GJG79G+dwfCMNYxd +AfvDbbnvRG15RjF+Cv6pgsH/76tuIMRQyV+dTZsXjAzlAcmgQWpzU/qlULRuJQ/7 +TBj0/VLZjmmx6BEP3ojY+x1J96relc8geMJgEtslQIxq/H5COEBkEveegeGTLg== +-----END CERTIFICATE----- + +# GlobalSign Code Signing Root E45 +-----BEGIN CERTIFICATE----- +MIICIjCCAamgAwIBAgIQdlP+rhgmQ29p9RzCdxbyXjAKBggqhkjOPQQDAzBTMQsw +CQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEpMCcGA1UEAxMg +R2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9vdCBFNDUwHhcNMjAwMzE4MDAwMDAw +WhcNNDUwMzE4MDAwMDAwWjBTMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFs +U2lnbiBudi1zYTEpMCcGA1UEAxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9v +dCBFNDUwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAR2GW0DtfWEI6syai5h3YQlL+/o +eSeJg8ODdfO2eGoIbaKtISoCkAbsmkCceoaRuViFyCiaLgv34nap37K9qcPpKRl5 +CLJQ0MLFnQphDONdNwZKXP6EvcCAhPpLVSPg4j6jQjBAMA4GA1UdDwEB/wQEAwIB +hjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSnn93TVM3b+Gy/JmwO5Ndbb4DM +QjAKBggqhkjOPQQDAwNnADBkAjBsjFa2xTeuLZAreO2xHkYI0sNKKO94GQiOJDRG +T4dxYV+pEUpvMqsc0VJ7qjrq5ZoCMFUrdy/O+D+baEra16hLRQ1+smv2bNqxFeK8 +SBl3i1fBXRTXQQDMJlLQILgZT5bnmg== +-----END CERTIFICATE----- + +# GlobalSign Code Signing Root R45 +-----BEGIN CERTIFICATE----- +MIIFcjCCA1qgAwIBAgIQdlP+rHVGSJP15ddKSDpO+DANBgkqhkiG9w0BAQwFADBT +MQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTEpMCcGA1UE +AxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcgUm9vdCBSNDUwHhcNMjAwMzE4MDAw +MDAwWhcNNDUwMzE4MDAwMDAwWjBTMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xv +YmFsU2lnbiBudi1zYTEpMCcGA1UEAxMgR2xvYmFsU2lnbiBDb2RlIFNpZ25pbmcg +Um9vdCBSNDUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2LcUw3Xro +q5A9A3KwOkuZFmGy5f+lZx03HOV+7JODqoT1o0ObmEWKuGNXXZsAiAQl6fhokkuC +2EvJSgPzqH9qj4phJ72hRND99T8iwqNPkY2zBbIogpFd+1mIBQuXBsKY+CynMyTu +UDpBzPCgsHsdTdKoWDiW6d/5G5G7ixAs0sdDHaIJdKGAr3vmMwoMWWuOvPSrWpd7 +f65V+4TwgP6ETNfiur3EdaFvvWEQdESymAfidKv/aNxsJj7pH+XgBIetMNMMjQN8 +VbgWcFwkeCAl62dniKu6TjSYa3AR3jjK1L6hwJzh3x4CAdg74WdDhLbP/HS3L4Sj +v7oJNz1nbLFFXBlhq0GD9awd63cNRkdzzr+9lZXtnSuIEP76WOinV+Gzz6ha6Qcl +mxLEnoByPZPcjJTfO0TmJoD80sMD8IwM0kXWLuePmJ7mBO5Cbmd+QhZxYucE+WDG +ZKG2nIEhTivGbWiUhsaZdHNnMXqR8tSMeW58prt+Rm9NxYUSK8+aIkQIqIU3zgdh +VwYXEiTAxDFzoZg1V0d+EDpF2S2kUZCYqaAHN8RlGqocaxZ396eX7D8ZMJlvMfvq +QLLn0sT6ydDwUHZ0WfqNbRcyvvjpfgP054d1mtRKkSyFAxMCK0KA8olqNs/ITKDO +nvjLja0Wp9Pe1ZsYp8aSOvGCY/EuDiRk3wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMC +AYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUHwC/RoAK/Hg5t6W0Q9lWULvO +ljswDQYJKoZIhvcNAQEMBQADggIBAF4runSXNERfdkgoQIST7gFu6aGz1oAl5nvk +vAmRPQ/8dq3X1DAgu49g0JHWHPKc73gaK5QyAsEkllJSAtDz0fzymzlumeEfjkNB +fZoeW8ldmoT8JuaH83RyJq2kG9k9O2pSoDwJHi8ee7MztEXH96yxr5NgrXauuLIV +eOuDauv/20arJOXuAvqQH1nAL13Wt12kXBC3clP4QU7M+ngaJUrK/oViQ2HDtDeq +gdL01joPvY1ZfjBH3itr5yFQM1/UZ5vUuGefPCeZA/+FQ45zEsogzehh1bFm3BfW +OW0P288jN6GCiU4caz/WoM2qB50+Qiaq1wzu+ke/GlJ+0XWB08mKYhdtT4igIaAm +Pq9t2WIwH+mYKK5ujdWOTHJmk4CNKuNVx2BnkEJWXCJRD7PcTjnuTd3ZHXgQVDtu +0JdvA7UesiNzxhKymmTQ/JWFJKj/36Gw3JFArt8JM6u53ZK38cyRdDtp62eXG5C/ +58egb3G7V7+3j1rtekBqFs2AhC0v4QLUJJRDsxX8DCsb/XFv/Mu8dRc6XoPSybMv +G9WcjX9U/n5+5Fajh6ed4VlSlEGPbVu+hpWa/xp23UDSUUpwtB8zYyN3P+wnHlnk +CIftNIJKDz/+oB3B9WdzRYZ49Kop6SeHxhnbxhMUwzlJh02gl+BlE/Wdd1bp2rNY +xzrywM2C +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R4 +-----BEGIN CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R5 +-----BEGIN CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3 +-----END CERTIFICATE----- + +# GlobalSign Root CA +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== +-----END CERTIFICATE----- + +# GlobalSign Root CA - R3 +-----BEGIN CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9f +-----END CERTIFICATE----- + +# GlobalSign Root CA - R6 +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= +-----END CERTIFICATE----- + +# Global Chambersign Root +-----BEGIN CERTIFICATE----- +MIIExTCCA62gAwIBAgIBADANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJFVTEn +MCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgyNzQzMjg3MSMwIQYDVQQL +ExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4GA1UEAxMXR2xvYmFsIENo +YW1iZXJzaWduIFJvb3QwHhcNMDMwOTMwMTYxNDE4WhcNMzcwOTMwMTYxNDE4WjB9 +MQswCQYDVQQGEwJFVTEnMCUGA1UEChMeQUMgQ2FtZXJmaXJtYSBTQSBDSUYgQTgy +NzQzMjg3MSMwIQYDVQQLExpodHRwOi8vd3d3LmNoYW1iZXJzaWduLm9yZzEgMB4G +A1UEAxMXR2xvYmFsIENoYW1iZXJzaWduIFJvb3QwggEgMA0GCSqGSIb3DQEBAQUA +A4IBDQAwggEIAoIBAQCicKLQn0KuWxfH2H3PFIP8T8mhtxOviteePgQKkotgVvq0 +Mi+ITaFgCPS3CU6gSS9J1tPfnZdan5QEcOw/Wdm3zGaLmFIoCQLfxS+EjXqXd7/s +QJ0lcqu1PzKY+7e3/HKE5TWH+VX6ox8Oby4o3Wmg2UIQxvi1RMLQQ3/bvOSiPGpV +eAp3qdjqGTK3L/5cPxvusZjsyq16aUXjlg9V9ubtdepl6DJWk0aJqCWKZQbua795 +B9Dxt6/tLE2Su8CoX6dnfQTyFQhwrJLWfQTSM/tMtgsL+xrJxI0DqX5c8lCrEqWh +z0hQpe/SyBoT+rB/sYIcd2oPX9wLlY/vQ37mRQklAgEDo4IBUDCCAUwwEgYDVR0T +AQH/BAgwBgEB/wIBDDA/BgNVHR8EODA2MDSgMqAwhi5odHRwOi8vY3JsLmNoYW1i +ZXJzaWduLm9yZy9jaGFtYmVyc2lnbnJvb3QuY3JsMB0GA1UdDgQWBBRDnDafsJ4w +TcbOX60Qq+UDpfqpFDAOBgNVHQ8BAf8EBAMCAQYwEQYJYIZIAYb4QgEBBAQDAgAH +MCoGA1UdEQQjMCGBH2NoYW1iZXJzaWducm9vdEBjaGFtYmVyc2lnbi5vcmcwKgYD +VR0SBCMwIYEfY2hhbWJlcnNpZ25yb290QGNoYW1iZXJzaWduLm9yZzBbBgNVHSAE +VDBSMFAGCysGAQQBgYcuCgEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly9jcHMuY2hh +bWJlcnNpZ24ub3JnL2Nwcy9jaGFtYmVyc2lnbnJvb3QuaHRtbDANBgkqhkiG9w0B +AQUFAAOCAQEAPDtwkfkEVCeR4e3t/mh/YV3lQWVPMvEYBZRqHN4fcNs+ezICNLUM +bKGKfKX0j//U2K0X1S0E0T9YgOKBWYi+wONGkyT+kL0mojAt6JcmVzWJdJYY9hXi +ryQZVgICsroPFOrGimbBhkVVi76SvpykBMdJPJ7oKXqJ1/6v/2j1pReQvayZzKWG +VwlnRtvWFsJG8eSpUPWP0ZIV018+xgBJOm5YstHRJw0lyDL4IBHNfTIzSJRUTN3c +ecQwn+uOuFW114hcxWokPbLTBQNRxgfvzBRydD1ucs4YKIxKoHflCStFREest2d/ +AYoFWpO+ocH/+OcOZ6RHSXZddZAa9SaP8A== +-----END CERTIFICATE----- + +# Global Chambersign Root - 2008 +-----BEGIN CERTIFICATE----- +MIIHSTCCBTGgAwIBAgIJAMnN0+nVfSPOMA0GCSqGSIb3DQEBBQUAMIGsMQswCQYD +VQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3VycmVudCBhZGRyZXNzIGF0 +IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAGA1UEBRMJQTgyNzQzMjg3 +MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAlBgNVBAMTHkdsb2JhbCBD +aGFtYmVyc2lnbiBSb290IC0gMjAwODAeFw0wODA4MDExMjMxNDBaFw0zODA3MzEx +MjMxNDBaMIGsMQswCQYDVQQGEwJFVTFDMEEGA1UEBxM6TWFkcmlkIChzZWUgY3Vy +cmVudCBhZGRyZXNzIGF0IHd3dy5jYW1lcmZpcm1hLmNvbS9hZGRyZXNzKTESMBAG +A1UEBRMJQTgyNzQzMjg3MRswGQYDVQQKExJBQyBDYW1lcmZpcm1hIFMuQS4xJzAl +BgNVBAMTHkdsb2JhbCBDaGFtYmVyc2lnbiBSb290IC0gMjAwODCCAiIwDQYJKoZI +hvcNAQEBBQADggIPADCCAgoCggIBAMDfVtPkOpt2RbQT2//BthmLN0EYlVJH6xed +KYiONWwGMi5HYvNJBL99RDaxccy9Wglz1dmFRP+RVyXfXjaOcNFccUMd2drvXNL7 +G706tcuto8xEpw2uIRU/uXpbknXYpBI4iRmKt4DS4jJvVpyR1ogQC7N0ZJJ0YPP2 +zxhPYLIj0Mc7zmFLmY/CDNBAspjcDahOo7kKrmCgrUVSY7pmvWjg+b4aqIG7HkF4 +ddPB/gBVsIdU6CeQNR1MM62X/JcumIS/LMmjv9GYERTtY/jKmIhYF5ntRQOXfjyG +HoiMvvKRhI9lNNgATH23MRdaKXoKGCQwoze1eqkBfSbW+Q6OWfH9GzO1KTsXO0G2 +Id3UwD2ln58fQ1DJu7xsepeY7s2MH/ucUa6LcL0nn3HAa6x9kGbo1106DbDVwo3V +yJ2dwW3Q0L9R5OP4wzg2rtandeavhENdk5IMagfeOx2YItaswTXbo6Al/3K1dh3e +beksZixShNBFks4c5eUzHdwHU1SjqoI7mjcv3N2gZOnm3b2u/GSFHTynyQbehP9r +6GsaPMWis0L7iwk+XwhSx2LE1AVxv8Rk5Pihg+g+EpuoHtQ2TS9x9o0o9oOpE9Jh +wZG7SMA0j0GMS0zbaRL/UJScIINZc+18ofLx/d33SdNDWKBWY8o9PeU1VlnpDsog +zCtLkykPAgMBAAGjggFqMIIBZjASBgNVHRMBAf8ECDAGAQH/AgEMMB0GA1UdDgQW +BBS5CcqcHtvTbDprru1U8VuTBjUuXjCB4QYDVR0jBIHZMIHWgBS5CcqcHtvTbDpr +ru1U8VuTBjUuXqGBsqSBrzCBrDELMAkGA1UEBhMCRVUxQzBBBgNVBAcTOk1hZHJp +ZCAoc2VlIGN1cnJlbnQgYWRkcmVzcyBhdCB3d3cuY2FtZXJmaXJtYS5jb20vYWRk +cmVzcykxEjAQBgNVBAUTCUE4Mjc0MzI4NzEbMBkGA1UEChMSQUMgQ2FtZXJmaXJt +YSBTLkEuMScwJQYDVQQDEx5HbG9iYWwgQ2hhbWJlcnNpZ24gUm9vdCAtIDIwMDiC +CQDJzdPp1X0jzjAOBgNVHQ8BAf8EBAMCAQYwPQYDVR0gBDYwNDAyBgRVHSAAMCow +KAYIKwYBBQUHAgEWHGh0dHA6Ly9wb2xpY3kuY2FtZXJmaXJtYS5jb20wDQYJKoZI +hvcNAQEFBQADggIBAICIf3DekijZBZRG/5BXqfEv3xoNa/p8DhxJJHkn2EaqbylZ +UohwEurdPfWbU1Rv4WCiqAm57OtZfMY18dwY6fFn5a+6ReAJ3spED8IXDneRRXoz +X1+WLGiLwUePmJs9wOzL9dWCkoQ10b42OFZyMVtHLaoXpGNR6woBrX/sdZ7LoR/x +fxKxueRkf2fWIyr0uDldmOghp+G9PUIadJpwr2hsUF1Jz//7Dl3mLEfXgTpZALVz +a2Mg9jFFCDkO9HB+QHBaP9BrQql0PSgvAm11cpUJjUhjxsYjV5KTXjXBjfkK9yyd +Yhz2rXzdpjEetrHHfoUm+qRqtdpjMNHvkzeyZi99Bffnt0uYlDXA2TopwZ2yUDMd +SqlapskD7+3056huirRXhOukP9DuqqqHW2Pok+JrqNS4cnhrG+055F3Lm6qH1U9O +AP7Zap88MQ8oAgF9mOinsKJknnn4SPIVqczmyETrP3iZ8ntxPjzxmKfFGBI/5rso +M0LpRQp8bfKGeS/Fghl9CYl8slR2iK7ewfPM4W7bMdaTrpmg7yVqc5iJWzouE4ge +v8CSlDQb4ye3ix5vQv/n6TebUB0tovkC7stYWDpxvGjjqsGvHCgfotwjZT+B6q6Z +09gwzxMNTxXJhLynSC34MCN32EZLeW32jO06f2ARePTpm67VVMB0gNELQp/B +-----END CERTIFICATE----- + +# Go Daddy Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8= +-----END CERTIFICATE----- + +# Go Daddy Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT +EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp +ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz +NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH +EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE +AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD +E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH +/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy +DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh +GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR +tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA +AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX +WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu +9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr +gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo +2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO +LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI +4uJEvlz36hz1 +-----END CERTIFICATE----- + +# Government Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIFSzCCAzOgAwIBAgIRALZLiAfiI+7IXBKtpg4GofIwDQYJKoZIhvcNAQELBQAw +PzELMAkGA1UEBhMCVFcxMDAuBgNVBAoMJ0dvdmVybm1lbnQgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTAeFw0xMjA5MjgwODU4NTFaFw0zNzEyMzExNTU5NTla +MD8xCzAJBgNVBAYTAlRXMTAwLgYDVQQKDCdHb3Zlcm5tZW50IFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQC2/5c8gb4BWCQnr44BK9ZykjAyG1+bfNTUf+ihYHMwVxAA+lCWJP5Q5ow6ldFX +eYTVZ1MMKoI+GFy4MCYa1l7GLbIEUQ7v3wxjR+vEEghRK5lxXtVpe+FdyXcdIOxW +juVhYC386RyA3/pqg7sFtR4jEpyCygrzFB0g5AaPQySZn7YKk1pzGxY5vgW28Yyl +ZJKPBeRcdvc5w88tvQ7Yy6gOMZvJRg9nU0MEj8iyyIOAX7ryD6uBNaIgIZfOD4k0 +eA/PH07p+4woPN405+2f0mb1xcoxeNLOUNFggmOd4Ez3B66DNJ1JSUPUfr0t4urH +cWWACOQ2nnlwCjyHKenkkpTqBpIpJ3jmrdc96QoLXvTg1oadLXLLi2RW5vSueKWg +OTNYPNyoj420ai39iHPplVBzBN8RiD5C1gJ0+yzEb7xs1uCAb9GGpTJXA9ZN9E4K +mSJ2fkpAgvjJ5E7LUy3Hsbbi08J1J265DnGyNPy/HE7CPfg26QrMWJqhGIZO4uGq +s3NZbl6dtMIIr69c/aQCb/+4DbvVq9dunxpPkUDwH0ZVbaCSw4nNt7H/HLPLo5wK +4/7NqrwB7N1UypHdTxOHpPaY7/1J1lcqPKZc9mA3v9g+fk5oKiMyOr5u5CI9ByTP +isubXVGzMNJxbc5Gim18SjNE2hIvNkvy6fFRCW3bapcOFwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBTVZx3gnHosnMvFmOcdByYqhux0zTAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAJA75cJTQijq9TFOjj2Rnk0J +89ixUuZPrAwxIbvx6pnMg/y2KOTshAcOD06Xu29oRo8OURWV+Do7H1+CDgxxDryR +T64zLiNB9CZrTxOH+nj2LsIPkQWXqmrBap+8hJ4IKifd2ocXhuGzyl3tOKkpboTe +Rmv8JxlQpRJ6jH1i/NrnzLyfSa8GuCcn8on3Fj0Y5r3e9YwSkZ/jBI3+BxQaWqw5 +ghvxOBnhY+OvbLamURfr+kvriyL2l/4QOl+UoEtTcT9a4RD4co+WgN2NApgAYT2N +vC2xR8zaXeEgp4wxXPHj2rkKhkfIoT0Hozymc26Uke1uJDr5yTDRB6iBfSZ9fYTf +hsmL5a4NHr6JSFEVg5iWL0rrczTXdM3Jb9DCuiv2mv6Z3WAUjhv5nDk8f0OJU+jl +wqu+Iq0nOJt3KLejY2OngeepaUXrjnhWzAWEx/uttjB8YwWfLYwkf0uLkvw4Hp+g +pVezbp3YZLhwmmBScMip0P/GnO0QYV7Ngw5u6E0CQUridgR51lQ/ipgyFKDdLZzn +uoJxo4ZVKZnSKdt1OvfbQ/+2W/u3fjWAjg1srnm3Ni2XUqGwB5wH5Ss2zQOXlL0t +DjQG/MAWifw3VOTWzz0TBPKR2ck2Lj7FWtClTILD/y58Jnb38/1FoqVuVa4uzM8s +iTTa9g3nkagQ6hed8vbs +-----END CERTIFICATE----- + +# HARICA Code Signing ECC Root CA 2021 +-----BEGIN CERTIFICATE----- +MIICZjCCAe2gAwIBAgIQTIpjHaljjwWi+3YU/1uizTAKBggqhkjOPQQDAzB1MQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEtMCsGA1UEAwwkSEFSSUNBIENvZGUgU2lnbmlu +ZyBFQ0MgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTExMDQzNloXDTQ1MDIxMzExMDQz +NVowdTELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFu +ZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExLTArBgNVBAMMJEhBUklDQSBDb2Rl +IFNpZ25pbmcgRUNDIFJvb3QgQ0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IA +BEOfvFxCakPhrEu4Dl+ABuMFd4t/C3nXYaCQv/JTKKNYupTAZmocWdqAWIEATLzJ +eZgQDMcdC+OT3IU5aNm/p0PSMcyCgie6iNHSLVY39zrabjnccRBl7jgLh3oDujBf +ZKNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUanHBc2qTQqaXcl67kF+C +kg8r1uswDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2cAMGQCMB6l1QtElRDk +Z3xOhV65RUkCc7CyHLOnItEAYUAPs4c3Fo0A7baLVSUGlJDc1+d1nwIwf3Rr8Urf +8PeEe/LFeTADSPIeICJXZFRXNIB3tz8jT7T1gJjCwVZboOfWoY/1DG8d +-----END CERTIFICATE----- + +# HARICA Code Signing RSA Root CA 2021 +-----BEGIN CERTIFICATE----- +MIIFtjCCA56gAwIBAgIQFcKuKk2ZmmOM07oTGXYI9TANBgkqhkiG9w0BAQsFADB1 +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEtMCsGA1UEAwwkSEFSSUNBIENvZGUgU2ln +bmluZyBSU0EgUm9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTk1NFoXDTQ1MDIxMzEw +NTk1M1owdTELMAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWlj +IGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ0ExLTArBgNVBAMMJEhBUklDQSBD +b2RlIFNpZ25pbmcgUlNBIFJvb3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAIpq7qoKI1UMiwZC45VbVHhfxY4GLHw8Mb6vDamh7EogWAWd +4miyu+tffyozufJVnG+qpB7tEL6DKRE25p4/+m17UeHVd6W9y2kOOyIglAwxZUAN +Ca8QNXqb6nkIRKSLZ6krTcHn0Nen9rU6jdmjqXm4pGVcvPM+95+Z9rjDZWgtq4Mu +3YWZBKn10VzVUUIBuZ9BtUsisgD0y2cQ72nEEK36lAZ2UBJXgq7FFK08fbud8XPh +fPCucd5b9xLd94Dx3D7xYLrJGZdvdXSFTP05Q8NkbjSsE8EcZbZSQvFG6y/6XabP +Dkmd93R8eA0GOiwS++JLJuRviyGBM0I5E+hCq1tV1Bu7N7YSkffzfbzS/+yxw9Wg +zLIrx49dfkxSQkj7j/1akHMQ1alyVI1J2zhSqkZIDi/6ACzMcww2SyTOE2ympKSj +1nyb6TgLxiTbTaxnIUlbQTdk5mBrH+0qL2AZMB7YPJwZQ4ffwAr05MpgiHrWo7nk +JS554v7Byzy3989OWEz7w62rfarKiPsOOA0fnlw567gHxFAiTfiFf27sjPq2cU3e +fZZpxN0+Ht4mkAosTRWVqaI+3D0Od3yNQShPuINRvj63j5A6cDGJWvqTU/xgyY11 +kO5aLx2EnwCp5sOGI6Ie3RLjoUZgG2e/UBUiknxKtIyPbpyVwizcOzogtryLAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFLRkFkjo/FpLMymJ65lA +uSC09mEaMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAK6xZi+Y5 +RNz7rUqI4GT/q8Py0s5wLwPlb7LE9TbWU2uHqx2LmQfIMI5Hcv2huHXWF6EWvWRz +kTBXrX39BUCGk9FJlrIL1HxkE4vTIUk4u/vozD4x8a57TCrfggajjgWEnH9wzsC7 +RRffXWUM5FBIB0SLpC9W2sZ69mCNpDjxnYcWMLLwX3pCVSBxz8zuALESR79CueSz +tR0ZhLmYbeBptBVBteJQSMcf6pq3eZHd1dVTGfyuGGxp261ZKJtkmKc8x1WO0TAA +z9QynmKxwyruNSLGu/B8u4O4AIn13BqX2TiaKVNhGaan9DtH/d1nlQ+OpGYsgpq3 +LXHm3674+GjBuw/qUKBFl7calRJvyLO2BWjaah4ONYWErHQMirT0dZ8ir7BUu7ae +IvnZ69WKDcfc+JgxX576xpf0QRB104G2MV963YiFCK9wRwI3e+JK7F3y3SkSRMiK +qt3SVXgXda9xaQ13cEqwH39C28dx3FjWGL1QxblyBMdne3xTYMpJGBW8QHOuK6gr +rG8RRDnsgkh+Ecr71j+2wLm4BpN1vZMndxcNXKWe6sFbAC0MqDVgx+JvNRs9drXn +rd10I0+GskfvyC/QhXw5ljehKykCvT6Hz6j2HXUyzzjjc7HuEIG1KrGIBlEeWjpI +UfM2WWLfQmZZULdYvvV2QJoSFuYOqtdsoNU= +-----END CERTIFICATE----- + +# Halcom CA FO +-----BEGIN CERTIFICATE----- +MIIDGjCCAgKgAwIBAgIDAbplMA0GCSqGSIb3DQEBBQUAMDUxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFTATBgNVBAMTDEhhbGNvbSBDQSBGTzAeFw0wNTA2 +MDUxMDMzMzFaFw0yMDA2MDUxMDMzMzFaMDUxCzAJBgNVBAYTAlNJMQ8wDQYDVQQK +EwZIYWxjb20xFTATBgNVBAMTDEhhbGNvbSBDQSBGTzCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBALyjJgGW5Z2sGgICOXys3AZMN0quB0h16CccpDH9Cqcj +XXw/DvrwjJFvVTSEA3TMAzV4zXHBRxu76iFuuAfeIZKqrLneN6If9JocG8juEIPW +U0PI3enzkEY5cgpO/BIpSYFYJjpxEwx7U4/fZnI8F9ze4XlKn+lgPm015E1R0RzA +GjBcBj9zQ8jNNvQewoeMT0if2nVXKkyvjVQ8RF+YPFDa0BgGfGBu0oT/Z4WQPV7G +69h6o7VtDL51uKnaVnE2Wu7rSVM+4hl2fEKroZDx9y+4ukpBtCukLmE259baf/Wf +jbhLW4Q1UMW9Baqqwgx0QWNXGY7/4UbmewUk/pndMb0CAwEAAaMzMDEwDwYDVR0T +AQH/BAUwAwEB/zARBgNVHQ4ECgQISCAcYg1YUiUwCwYDVR0PBAQDAgEGMA0GCSqG +SIb3DQEBBQUAA4IBAQBbdfXmMEZYivcP0U8LAVgEuWTkMA0+dtlrE60cbslM8Gzm +QhH964PvUNi7VJ20kYpatYQPjEbNPIKopR4gnND1QQbKASuYsOopUB/idHtZgsoK +5W5OrrA37T7MujLZPwtoLLLTPNw4xRHWGzPuuaJqRJMbUOphG3lXUVaeMtAzeLTP +Ryr7983x523gumT7FZu+yrHyRwF/4Ey3pUGsHtkabJHh0KhKw154K3qAwE/NJV9Q +J8a8WHWcHbWaXZVz84Rm081tHc3gWs4gOO+Sc3heAtaN+XTUt4nYjPt71Ytx1RkX +JtgkSTxVvIKH2mO7OdeOkc80cFxzT9BQR1r75VpR +-----END CERTIFICATE----- + +# Halcom CA PO 2 +-----BEGIN CERTIFICATE----- +MIICGTCCAYKgAwIBAgIDATTiMA0GCSqGSIb3DQEBBQUAMDcxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFzAVBgNVBAMTDkhhbGNvbSBDQSBQTyAyMB4XDTA0 +MDIwNzE4MzMzMVoXDTE5MDIwNzE4MzMzMVowNzELMAkGA1UEBhMCU0kxDzANBgNV +BAoTBkhhbGNvbTEXMBUGA1UEAxMOSGFsY29tIENBIFBPIDIwgZ8wDQYJKoZIhvcN +AQEBBQADgY0AMIGJAoGBAJQX8kk3MDIJCDy+9Te3dGwQO8sicQcGucbs2kjznydt +ZI1V3nlHUPtoznkBvqcb9mGtfTELUyCtMfFbziP6/8wSAloAnPzNaxJS6KzUMztz +JhBxkEC/A4jfvF8hDYzWipMf564VVMZM5JlhkuD3jXLH3GITM6M+SSn7hL9wOpEh +AgMBAAGjMzAxMA8GA1UdEwEB/wQFMAMBAf8wEQYDVR0OBAoECEivV2a/0sACMAsG +A1UdDwQEAwIBBjANBgkqhkiG9w0BAQUFAAOBgQCQFld2uHnO/MTRNwCizf84BxFz +EwVJ7d/Bxc7GQNj3ApYNt28RhDhm+3H3EAFnfF19JNr2ZDsIgEimTr1E4rAHMo98 +hjdGb8CDA5O19PMSfKPoy+I6I3j6aG/+WMoMp1dRLWKQ+eSo3PXK3w6HUW43dSYO +1354igOilRm2XpEBVg== +-----END CERTIFICATE----- + +# Halcom Root CA +-----BEGIN CERTIFICATE----- +MIIDHjCCAgagAwIBAgIDB7HTMA0GCSqGSIb3DQEBDQUAMDcxCzAJBgNVBAYTAlNJ +MQ8wDQYDVQQKEwZIYWxjb20xFzAVBgNVBAMTDkhhbGNvbSBSb290IENBMB4XDTEy +MDIwODA5NTU0MVoXDTMyMDIwODA5NTU0MVowNzELMAkGA1UEBhMCU0kxDzANBgNV +BAoTBkhhbGNvbTEXMBUGA1UEAxMOSGFsY29tIFJvb3QgQ0EwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQCJuYXK/vR1fX/snUI3urqNvOw9FwP92UVl1s3J +Tl+MSFyXCFcUiy2cPJBJmc9pr0mN2xwBsG7p9OqRZ13Ks2lP2MzBDT3uqgN24Mlw +op/+65vQtsmW0/D7W9DwB6tMXk2k4kdeBWh0po4iR+5+02eEVDeSRw7zo+wVGvNt +e78ZNSGPgkusVJwJzW62wVe90Ek9b59zjrFsfr3+1rs9A+jmTBq07q+0g04ykFT2 +ThvhL86lNBqOoyD52T4ia29u4/rZM1wIoPcVAD2cEJJKVc2Asgaq/dePt1qSJyQP +MzwouvEfaLV3KV6uwtqNNnDiejIbI6bexWENmqUSILXzllm1AgMBAAGjMzAxMA8G +A1UdEwEB/wQFMAMBAf8wEQYDVR0OBAoECE6U2Ipjws95MAsGA1UdDwQEAwIBBjAN +BgkqhkiG9w0BAQ0FAAOCAQEAKb7nseT6A6IPr3ZZnfhOU008BIOfoeKM9pTZtK5o +KlZrMlMogwdyTLBOqB2BgyFnAzfRjMbBToTpNDvT9fUnto0jBVK4TDLyLtrRKn0+ +gwMq0rHjmumKg0LwLAqhUw/AK+KPGk6VuUW8S2c6vTLzraWPj8Mu6vb0e2LQbm7F +YTETZuZnSZk7L4BPenxzigMNX/WzMigKisDh+bijJu7cG1fPdhpPU772SotXFysv +mYaq3ozatqhs32g21mGLbsBzTrc5RfR9zknE8x35qXds7++SFRMnmUbon6mKG58p +L6IdPtYrx+RVEDoY97N7Ty7HACLt5DHQ57jkVE/BgEUlbg== +-----END CERTIFICATE----- + +# Halcom Root Certificate Authority +-----BEGIN CERTIFICATE----- +MIIDgDCCAmigAwIBAgIDDN+bMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNVBAYTAlNJ +MRQwEgYDVQQKEwtIYWxjb20gZC5kLjEXMBUGA1UEYRMOVkFUU0ktNDMzNTMxMjYx +KjAoBgNVBAMTIUhhbGNvbSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0x +NjA2MTAwNzA3NTBaFw0zNjA2MTAwNzA3NTBaMGgxCzAJBgNVBAYTAlNJMRQwEgYD +VQQKEwtIYWxjb20gZC5kLjEXMBUGA1UEYRMOVkFUU0ktNDMzNTMxMjYxKjAoBgNV +BAMTIUhhbGNvbSBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAOlSpsYa72O7rYH0kLJajw3VFjO0HBj7y4kq +MLtlgcTh+wKplAd25dcV5HpkEIDqPNCzoq2uHB/qu4FhmNT5jWmVxEUuAwnKhvpc +WhEXQDA+8MZjCcnxjUGlVg0FZGlLWKwqKZa7QDMWNEtnbNfxtEal6lmoQ2gPjDgq +qjz2RAOG+IrbRSErKR4St/qlZUHeBghYcJU+9EzZ6w8pqZGKnq3KEvXlleY42Rqm +i5xPpkgTEKV5RL1qOyn1FndAy36bXN++i+vnoBlvnxU/J54psfUN/F9HojzdLgsC ++/SN6uwMsfm0Baz5j6k9biwdOZ/QTp9OyGqegANh3M/4bZTLD88CAwEAAaMzMDEw +DwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQIQq6mQ8eYKLAwCwYDVR0PBAQDAgEG +MA0GCSqGSIb3DQEBCwUAA4IBAQBSuXnQ22P+GYH7DPnB5VBZyp2y+1wz0Dioq7Ua +TlMldSLTSb/Kgc/T4XujkUZ1yhrr2fVdvHuGNf2Bl5yE1yaYIvyxNdCplbZ8/+SX +tEB+SV1oyOLUOXUnTwORsjFXv4bXbcpxACI30DtYJFCgnIyaiY71KEZs5xbtsIGr +9EYmr6boGkV3cBaSsntxcdz330lnwDMIDi5TwXerx0qRTBLv5w4J5XUxIK5u/FqK +gJwQsNuoSszzK9w2NKb3qQtnnZDLPSafdc1MyR0GCnWLUsCB8NEmrMySphScXDwW +QvuTzAKoE/PargrDuBX0sNDU4BYgT6xQmHgmlB5o65Ry/veL +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions ECC RootCA 2015 +-----BEGIN CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2011 +-----BEGIN CERTIFICATE----- +MIIEMTCCAxmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBlTELMAkGA1UEBhMCR1Ix +RDBCBgNVBAoTO0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgQ2VydC4gQXV0aG9yaXR5MUAwPgYDVQQDEzdIZWxsZW5pYyBBY2FkZW1p +YyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIFJvb3RDQSAyMDExMB4XDTExMTIw +NjEzNDk1MloXDTMxMTIwMTEzNDk1MlowgZUxCzAJBgNVBAYTAkdSMUQwQgYDVQQK +EztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0dXRpb25zIENl +cnQuIEF1dGhvcml0eTFAMD4GA1UEAxM3SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBSb290Q0EgMjAxMTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBAKlTAOMupvaO+mDYLZU++CwqVE7NuYRhlFhPjz2L5EPz +dYmNUeTDN9KKiE15HrcS3UN4SoqS5tdI1Q+kOilENbgH9mgdVc04UfCMJDGFr4PJ +fel3r+0ae50X+bOdOFAPplp5kYCvN66m0zH7tSYJnTxa71HFK9+WXesyHgLacEns +bgzImjeN9/E2YEsmLIKe0HjzDQ9jpFEw4fkrJxIH2Oq9GGKYsFk3fb7u8yBRQlqD +75O6aRXxYp2fmTmCobd0LovUxQt7L/DICto9eQqakxylKHJzkUOap9FNhYS5qXSP +FEDH3N6sQWRstBmbAmNtJGSPRLIl6s5ddAxjMlyNh+UCAwEAAaOBiTCBhjAPBgNV +HRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUppFC/RNhSiOeCKQp +5dgTBCPuQSUwRwYDVR0eBEAwPqA8MAWCAy5ncjAFggMuZXUwBoIELmVkdTAGggQu +b3JnMAWBAy5ncjAFgQMuZXUwBoEELmVkdTAGgQQub3JnMA0GCSqGSIb3DQEBBQUA +A4IBAQAf73lB4XtuP7KMhjdCSk4cNx6NZrokgclPEg8hwAOXhiVtXdMiKahsog2p +6z0GW5k6x8zDmjR/qw7IThzh+uTczQ2+vyT+bOdrwg3IBp5OjWEopmr95fZi6hg8 +TqBTnbI6nOulnJEWtk2C4AwFSKls9cz4y51JtPACpf1wA+2KIaWuE4ZJwzNzvoc7 +dIsXRSZMFpGD/md9zU1jZ/rzAxKWeAaNsWftjj++n08C9bMJL/NMh98qy5V8Acys +Nnq/onN694/BtZqhFLKPM58N7yLcZnuEvUUXBj08yrl3NI/K6s8/MT7jiOOASSXI +l7WdmplNsDz4SgCbZN2fOUvRJ9e4 +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2015 +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68 +-----END CERTIFICATE----- + +# I.CA - Qualified Certification Authority, 09/2009 +-----BEGIN CERTIFICATE----- +MIIFHjCCBAagAwIBAgIEAKA3oDANBgkqhkiG9w0BAQsFADCBtzELMAkGA1UEBhMC +Q1oxOjA4BgNVBAMMMUkuQ0EgLSBRdWFsaWZpZWQgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHksIDA5LzIwMDkxLTArBgNVBAoMJFBydm7DrSBjZXJ0aWZpa2HEjW7DrSBh +dXRvcml0YSwgYS5zLjE9MDsGA1UECww0SS5DQSAtIEFjY3JlZGl0ZWQgUHJvdmlk +ZXIgb2YgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlczAeFw0wOTA5MDEwMDAwMDBaFw0x +OTA5MDEwMDAwMDBaMIG3MQswCQYDVQQGEwJDWjE6MDgGA1UEAwwxSS5DQSAtIFF1 +YWxpZmllZCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSwgMDkvMjAwOTEtMCsGA1UE +CgwkUHJ2bsOtIGNlcnRpZmlrYcSNbsOtIGF1dG9yaXRhLCBhLnMuMT0wOwYDVQQL +DDRJLkNBIC0gQWNjcmVkaXRlZCBQcm92aWRlciBvZiBDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtTaEy0KC8M9l +4lSaWHMs4+sVV1LwzyJYiIQNeCrv1HHm/YpGIdY/Z640ceankjQvIX7m23BK4OSC +6KO8kZYA3zopOz6GFCOKV2PvLukbc+c2imF6kLHEv6qNA8WxhPbR3xKwlHDwB2yh +Wzo7V3QVgDRG83sugqQntKYC3LnlTGbJpNP+Az72gpO9AHUn/IBhFk4ksc8lYS2L +9GCy9CsmdKSBP78p9w8Lx7vDLqkDgt1/zBrcUWmSSb7AE/BPEeMryQV1IdI6nlGn +BhWkXOYf6GSdayJw86btuxC7viDKNrbp44HjQRaSxnp6O3eto1x4DfiYdw/YbJFe +7EjkxSQBywIDAQABo4IBLjCCASowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E +BAMCAQYwgecGA1UdIASB3zCB3DCB2QYEVR0gADCB0DCBzQYIKwYBBQUHAgIwgcAa +gb1UZW50byBjZXJ0aWZpa2F0IGplIHZ5ZGFuIGpha28ga3ZhbGlmaWtvdmFueSBz +eXN0ZW1vdnkgY2VydGlmaWthdCBwb2RsZSB6YWtvbmEgYy4gMjI3LzIwMDAgU2Iu +IHYgcGxhdG5lbSB6bmVuaS9UaGlzIGlzIHF1YWxpZmllZCBzeXN0ZW0gY2VydGlm +aWNhdGUgYWNjb3JkaW5nIHRvIEN6ZWNoIEFjdCBOby4gMjI3LzIwMDAgQ29sbC4w +HQYDVR0OBBYEFHnL0CPpOmdwkXRP01Hi4CD94Sj7MA0GCSqGSIb3DQEBCwUAA4IB +AQB9laU214hYaBHPZftbDS/2dIGLWdmdSbj1OZbJ8LIPBMxYjPoEMqzAR74tw96T +i6aWRa5WdOWaS6I/qibEKFZhJAVXX5mkx2ewGFLJ+0Go+eTxnjLOnhVF2V2s+57b +m8c8j6/bS6Ij6DspcHEYpfjjh64hE2r0aSpZDjGzKFM6YpqsCJN8qYe2X1qmGMLQ +wvNdjG+nPzCJOOuUEypIWt555ZDLXqS5F7ZjBjlfyDZjEfS2Es9Idok8alf563Mi +9/o+Ba46wMYOkk3P1IlU0RqCajdbliioACKDztAqubONU1guZVzV8tuMASVzbJeL +/GAB7ECTwe1RuKrLYtglMKI9 +-----END CERTIFICATE----- + +# I.CA - Qualified root certificate +-----BEGIN CERTIFICATE----- +MIIEOTCCAyGgAwIBAgIEAJ0qYDANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJD +WjEqMCgGA1UEAwwhSS5DQSAtIFF1YWxpZmllZCByb290IGNlcnRpZmljYXRlMS0w +KwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEucy4wHhcN +MDgwNDAxMDAwMDAwWhcNMTgwNDAxMDAwMDAwWjBoMQswCQYDVQQGEwJDWjEqMCgG +A1UEAwwhSS5DQSAtIFF1YWxpZmllZCByb290IGNlcnRpZmljYXRlMS0wKwYDVQQK +DCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEucy4wggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCrCIik8HTyn/jb1neNMBk+psXHisW93eYC +ro49UHW4r302q/717QhntACKmMEDY4hR8hs2iXRaLcjEgsQ/uYj9bP06HRUFRJWA +GqaGyyF1kIVcsHAAhzSo0R9J/Ww4bWqsuEWfvBTXZtQh4ycKjXXgWi8KS7TnfnOj +Kr1w8ZGGCI+/kIQch6n1mSUllMHjbgfBSwdbVPw0y0Y3nMWhIM6mrIepgzw4T8BA +8+n/m9c5duQTI3W1/6FCrlyGT8VOQ7aZC1JTIKizwkzTACwV0llsCp8htXMWeR6G +Je4a+5OerWPxTOJ2MV437/zQqTbk+RHpevxQ50EjAzS4fboOz91TAgMBAAGjgeow +gecwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwgaQGA1UdIASBnDCB +mTCBlgYMKwYBBAGBuEgBBAABMIGFMIGCBggrBgEFBQcCAjB2GnRUZW50byBjZXJ0 +aWZpa2F0IGplIHZ5ZGFuIGpha28ga3ZhbGlmaWtvdmFueSBzeXN0ZW1vdnkgY2Vy +dGlmaWthdCB2IHNvdWxhZHUgc2UgemFrb25lbSAyMjcvMjAwMCBTYi4gdiBwbGF0 +bmVtIHpuZW5pLjAdBgNVHQ4EFgQUaJ1+1sQlOfs7oDfWT9yM0XrwVlkwDQYJKoZI +hvcNAQEFBQADggEBAHL1vAaN0iyW8oLbWHtH8EBk5S4b7/rg+tPxckgBRPKI9N6Y +gVOE531OR+cxN1aus8Ewb8arSIP1mFNSaSoowUBl62XntDAL8KsOpRIlv/RQXb+j +fuXRdPgKKK5CnLAUUsSgYF33RRdCukItm5L7bpSzcEcgCJ1T8LCtvamEWt0HKgzN +K21hKN87kijsUYF/UXyOLn+d6bzBND2LrYGt8R50ZkM8QU24LjNPsToe2xLfNo5x +/1djsdaPtD2GEmrPQjC0kxbqmeoCW/4I7rJPcL8zAOd6Sjih8kiRph7LI7I4nfAu +SaLJiFZlZY46Z0WMjAviqrFLB/+xH7oUz3L6p3g= +-----END CERTIFICATE----- + +# I.CA - Standard Certification Authority, 09/2009 +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIDFuNgMA0GCSqGSIb3DQEBCwUAMIGrMQswCQYDVQQGEwJD +WjE5MDcGA1UEAwwwSS5DQSAtIFN0YW5kYXJkIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5LCAwOS8yMDA5MS0wKwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0 +b3JpdGEsIGEucy4xMjAwBgNVBAsMKUkuQ0EgLSBQcm92aWRlciBvZiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzMB4XDTA5MDkwMTAwMDAwMFoXDTE5MDkwMTAwMDAwMFow +gasxCzAJBgNVBAYTAkNaMTkwNwYDVQQDDDBJLkNBIC0gU3RhbmRhcmQgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHksIDA5LzIwMDkxLTArBgNVBAoMJFBydm7DrSBjZXJ0 +aWZpa2HEjW7DrSBhdXRvcml0YSwgYS5zLjEyMDAGA1UECwwpSS5DQSAtIFByb3Zp +ZGVyIG9mIENlcnRpZmljYXRpb24gU2VydmljZXMwggEiMA0GCSqGSIb3DQEBAQUA +A4IBDwAwggEKAoIBAQCoCFYSP/uUg6lgdr1Fg36WNDzPSU7Wz/wg4eGxAhRtrcp+ +UHIpqf2cdyY4ZPdDQT8UggSiQZAC55n3g2J4RIXonQVw1P54oXQ0x6w7hQLd7lFb +RjtTM9Zn7OwULuPE5bN0gwDMxpbmHIPa3BhQafrdQ9GOQP0WpLeMZYfgvqyXH7Bx +6wBlVxbObIevl4jwXfeHTToRCqLCRBTAFvJP9duVQq8psymgg1Fu/jxRV5MwJSa6 +O2qGyPYL0XE/nLc6yM5nCYz6QBt6bN7IHKDGXLthGIg/LlkdVvx6RZym2TjZxWDM +uUFVt8q8Te60p8T2oA68icUBlbFc30/wzMLNQrtfAgMBAAGjVTBTMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMBEGA1UdIAQKMAgwBgYEVR0gADAdBgNV +HQ4EFgQUwUw4lNWAhkjZIpAs0+4ZENtnR4cwDQYJKoZIhvcNAQELBQADggEBAKPL +0X10+zV4B5Lo7mjp5FJe8NhjkZSfaPu+W7qp4WN3q1B2xulWR1RQmbQli+jBGXI2 +Wgm+59b6wrYyPUfDUE6ZbpM2xYpRd2PgSTOrPB+K6TvZhrUox8J1cVtmao1YDvN1 +kLWtLIEYzZzYw81P8ftpIJfASM8TRRK1HPY+g+JOXt1ZxmtK4EjO2SqdZTq9L/Dw +TLwJess3AKQ/Owwj3eP7xkKitLbm0nKFTN+z3hanfh3n1M+tq7NQ5HCM37BwkMmG +nu58hItkHGvhaBV+yaV04E73WurdEjGrkUCFcQvOKSj5bjgUXB3+7BG/TUN+nl84 +v9fqnpMv0B10tQUJ0yI= +-----END CERTIFICATE----- + +# I.CA - Standard root certificate +-----BEGIN CERTIFICATE----- +MIIELjCCAxagAwIBAgIDE9YgMA0GCSqGSIb3DQEBBQUAMGMxCzAJBgNVBAYTAkNa +MSkwJwYDVQQDEyBJLkNBIC0gU3RhbmRhcmQgcm9vdCBjZXJ0aWZpY2F0ZTEpMCcG +A1UEChMgUHJ2bmkgY2VydGlmaWthY25pIGF1dG9yaXRhIGEucy4wHhcNMDgwNDAx +MDAwMDAwWhcNMTgwNDAxMDAwMDAwWjBjMQswCQYDVQQGEwJDWjEpMCcGA1UEAxMg +SS5DQSAtIFN0YW5kYXJkIHJvb3QgY2VydGlmaWNhdGUxKTAnBgNVBAoTIFBydm5p +IGNlcnRpZmlrYWNuaSBhdXRvcml0YSBhLnMuMIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEA0S0VxDlMaqHE5fMrtP2pFum4UY83kdmn05eQtnBph/WvWdJi +QVjV85WNAhX6ZpzBIRTYH636Kmx0VqFi4fGwrbj+0qPgkaG1rlOtjaQND1lglyr8 +oy5zNSNzzKimoRRtv4nDhDjzZFnMMfPg+SdgCjxBBW9aUvCPblJu7F6Ib+BAjCFH +VyLpOG7m+vMktK6vL3M/gNUyj4zZhBnYYM7baY0+rwKvrt6vUPXP5rNhGMTg3fBO +SmYNenMgt+TUk4ZHYdhPyjqOq8I/xiIXo12dIMbFDiRpyKZ9ZgbNRuYz4UN0k/WD +YtKwRSIBpHa961GTWGz6GqGfdYDa2ADi8YhNPwIDAQABo4HqMIHnMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTrN6S+uW9gF/vT/y1g +4QQer8/G0zCBpAYDVR0gBIGcMIGZMIGWBgwrBgEEAYG4SAEBAAEwgYUwgYIGCCsG +AQUFBwICMHYadFRlbnRvIGNlcnRpZmlrYXQgamUgdnlkYW4gamFrbyBrdmFsaWZp +a292YW55IHN5c3RlbW92eSBjZXJ0aWZpa2F0IHYgc291bGFkdSBzZSB6YWtvbmVt +IDIyNy8yMDAwIFNiLiB2IHBsYXRuZW0gem5lbmkuMA0GCSqGSIb3DQEBBQUAA4IB +AQAXIliqLxhVAqFMNkk3S5tzuq5jNg6LK4RFN8z64Gf3oHNqZ2hWvGGoNJooumYs +YZuLHPgEcIyG40HvlHkN3TSHBO61njFrOfR+WOXysARNqVclSeAL1eTsfQ4+OwHg +jPxSkJPm8rCr9TF3zNHJQ4KrDy60+ZiuPuNE9KQDaVXaXI7bwbms5JjVdhVGoS5a +DCJgoMLrcH9xA7Bo0zFkzerLS1WJgj5cZssaCJhHwt7ZLjhMBf0tjPrjIiW5kv3W +si3KojSc30nv1YQBLJL/BUEKZ8ZCa57L2J+QvA0PEH3HZr3qcwfgGOpRgbRFQDwP +oSI3FQGFqS58Dl9dzmqTvtm+ +-----END CERTIFICATE----- + +# I.CA Root CA/RSA +-----BEGIN CERTIFICATE----- +MIIGfjCCBGagAwIBAgIEBfXhADANBgkqhkiG9w0BAQ0FADBwMQswCQYDVQQGEwJD +WjEtMCsGA1UECgwkUHJ2bsOtIGNlcnRpZmlrYcSNbsOtIGF1dG9yaXRhLCBhLnMu +MRkwFwYDVQQDDBBJLkNBIFJvb3QgQ0EvUlNBMRcwFQYDVQQFEw5OVFJDWi0yNjQz +OTM5NTAeFw0xNTA1MjcxMjIwMDBaFw00MDA1MjcxMjIwMDBaMHAxCzAJBgNVBAYT +AkNaMS0wKwYDVQQKDCRQcnZuw60gY2VydGlmaWthxI1uw60gYXV0b3JpdGEsIGEu +cy4xGTAXBgNVBAMMEEkuQ0EgUm9vdCBDQS9SU0ExFzAVBgNVBAUTDk5UUkNaLTI2 +NDM5Mzk1MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqj9VtYmvdhQG +KmQmlDgPX/bcBG8xRfUK/Tt/m3Jv+EB8/l39NJkFOJRJurHwvfiZXMBR+qoN++Zx +FYVjESp3BpGSBoiz/BThmUa0KYKuhIPutSaHbviLVUSdQNj/Klqq6H/SZeEUR8J8 +Mf11YQobjIBKnrTiLhRHMe68BVGupn7PEbjFSL0FVMKE5Kdoa/i4+n4oybnP5CFP +ZcmIaKA42XWlETtMHG5LHtSGbMGtBUfTLJQNzIctGi3D1szehP7sa8DhIxOh05wY +fuBy11xVvEyzQDEbnEDNmuuADnGu12JuWhZPH/ZlRdGfeoVBGcJ6Os4hkuSUcEy7 +qEHGxLs1zfU6nmOpjaBq0SBEqiq2SKVyw86e5FhIRwl/AkHzDRxtCXjw1xTRoFX8 +EdZaGgB55TvmCMtSnqQJq2vnbJwqLyJ9+7lQst5Q0y8McrnWs7ezCObre6z0tMX2 +wTIfpxkh9dxeN6rHH1ObQz7mnp/aDddWog9TaS1Vv+uGeBG/ptdaTfMOk3Pq/w7Q +54/xyLPw2BhzbKVyiPFwTEdUtpta0bwmN40Y35trLtsLJbOKsuOtBlxtu30XAwcB +ijCXiXRtSpR3Luvuz7Aetep29LUUOJXX1dkvP7KkJsxNo1yNCfNeDIUyzlZsAgjx +S6Orv8hUoAWFdOR1HXq8nDtgPWr9GZECAwEAAaOCAR4wggEaMA4GA1UdDwEB/wQE +AwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2uQNI+9UYoaE3oO3MaIJM +UjQ2DTCB1wYDVR0gBIHPMIHMMIHJBgRVHSAAMIHAMIG9BggrBgEFBQcCAjCBsBqB +rVRlbnRvIGt2YWxpZmlrb3Zhbnkgc3lzdGVtb3Z5IGNlcnRpZmlrYXQgYnlsIHZ5 +ZGFuIHBvZGxlIHpha29uYSAyMjcvMjAwMCBTYi4gdiBwbGF0bmVtIHpuZW5pL1Ro +aXMgcXVhbGlmaWVkIHN5c3RlbSBjZXJ0aWZpY2F0ZSB3YXMgaXNzdWVkIGFjY29y +ZGluZyB0byBBY3QgTm8uIDIyNy8yMDAwIENvbGwuMA0GCSqGSIb3DQEBDQUAA4IC +AQAZVAIlg9silosdlZ6Z2zTOk9AfLntcYCRqDNeFRHgfHEnyFPiDVBmmnTJmuCOm +O4Yqnzb8F/xQD2DGN/0kqPd5p46/2AcVVF5SDL74ptjIQUTx9hPcgxlbr91k9zMW +hw8VWvFkvNTnVT8yOIma88xIxWwxcZKaJhfCfEcCbTUnn/Ma4aodDXQRqZN8Qahv +u46cxQHkc/a6UC7mENS8bxOaOLlpRqUG1vJMbDerPPjbGsZV8Mj4HSFuLwBqseJt +WgQtfd0JT/bvFC/AEuoJGSsayqBxm7E6Mrz/QxjzfS/1LojpUbbxSZBM/ybHw1nd +dF/BUF04XJ1oVWlqtEB3yV8yKUhUk8GzISN2oVUwaSM/MUnEoc07dlmVWoK0rXG1 +vqaRzIAVSi/OlK4YVUl1IES48wGbwXgsjhBMp2StrTrrTB1WLn+U1B7QCtXJVIEO +Hv73lPlhOj817tNgyftIsm7C2b56bpgFcACj0RfHxjSvbPVNj11SDN2Am3pt55jj +OYVcP4vMRKJANjKTElaQAp4+WWgCH1aIHq/B/g97VY2X2bumk0e6fPhHtjnXjPJA +bIecDP4t3dxx/A6RCKRDPYpX3d0H66eXUdC6hJmti3n+yQSQgxMr6ZcNZYnyES03 +jku4u9J6OSrF3NBdDd0EJ5ifWP2OhrsFf/DtN5KQ3Zy9/A== +-----END CERTIFICATE----- + +# IGC/A +-----BEGIN CERTIFICATE----- +MIIEAjCCAuqgAwIBAgIFORFFEJQwDQYJKoZIhvcNAQEFBQAwgYUxCzAJBgNVBAYT +AkZSMQ8wDQYDVQQIEwZGcmFuY2UxDjAMBgNVBAcTBVBhcmlzMRAwDgYDVQQKEwdQ +TS9TR0ROMQ4wDAYDVQQLEwVEQ1NTSTEOMAwGA1UEAxMFSUdDL0ExIzAhBgkqhkiG +9w0BCQEWFGlnY2FAc2dkbi5wbS5nb3V2LmZyMB4XDTAyMTIxMzE0MjkyM1oXDTIw +MTAxNzE0MjkyMlowgYUxCzAJBgNVBAYTAkZSMQ8wDQYDVQQIEwZGcmFuY2UxDjAM +BgNVBAcTBVBhcmlzMRAwDgYDVQQKEwdQTS9TR0ROMQ4wDAYDVQQLEwVEQ1NTSTEO +MAwGA1UEAxMFSUdDL0ExIzAhBgkqhkiG9w0BCQEWFGlnY2FAc2dkbi5wbS5nb3V2 +LmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsh/R0GLFMzvABIaI +s9z4iPf930Pfeo2aSVz2TqrMHLmh6yeJ8kbpO0px1R2OLc/mratjUMdUC24SyZA2 +xtgv2pGqaMVy/hcKshd+ebUyiHDKcMCWSo7kVc0dJ5S/znIq7Fz5cyD+vfcuiWe4 +u0dzEvfRNWk68gq5rv9GQkaiv6GFGvm/5P9JhfejcIYyHF2fYPepraX/z9E0+X1b +F8bc1g4oa8Ld8fUzaJ1O/Id8NhLWo4DoQw1VYZTqZDdH6nfK0LJYBcNdfrGoRpAx +Vs5wKpayMLh35nnAvSk7/ZR3TL0gzUEl4C7HG7vupARB0l2tEmqKm0f7yd1GQOGd +PDPQtQIDAQABo3cwdTAPBgNVHRMBAf8EBTADAQH/MAsGA1UdDwQEAwIBRjAVBgNV +HSAEDjAMMAoGCCqBegF5AQEBMB0GA1UdDgQWBBSjBS8YYFDCiQrdKyFP/45OqDAx +NjAfBgNVHSMEGDAWgBSjBS8YYFDCiQrdKyFP/45OqDAxNjANBgkqhkiG9w0BAQUF +AAOCAQEABdwm2Pp3FURo/C9mOnTgXeQp/wYHE4RKq89toB9RlPhJy3Q2FLwV3duJ +L92PoF189RLrn544pEfMs5bZvpwlqwN+Mw+VgQ39FuCIvjfwbF3QMZsyK10XZZOY +YLxuj7GoPB7ZHPOpJkL5ZB3C55L29B5aqhlSXa/oovdgoPaN8In1buAKBQGVyYsg +Crpa/JosPL3Dt8ldeCUFP1YUmwza+zpI/pdpXsoQhvdOlgQITeywvl3cO45Pwf2a +NjSaTFR+FwNIlQgRHAdvhQh+XU3Endv7rs6y0bO4g2wdsrN58dhwmX7wEwLOXt1R +0982gaEbeC9xs/FZTEYYKKuF0mBWWg== +-----END CERTIFICATE----- + +# IGC/A AC racine Etat francais +-----BEGIN CERTIFICATE----- +MIIFwzCCA6ugAwIBAgISESGFDLOcajL6vmcbgT+khhWPMA0GCSqGSIb3DQEBCwUA +MF4xCzAJBgNVBAYTAkZSMQ4wDAYDVQQKEwVBTlNTSTEXMBUGA1UECxMOMDAwMiAx +MzAwMDc2NjkxJjAkBgNVBAMTHUlHQy9BIEFDIHJhY2luZSBFdGF0IGZyYW5jYWlz +MB4XDTExMDcwODA5MDAwMFoXDTI4MDQxNTA5MDAwMFowXjELMAkGA1UEBhMCRlIx +DjAMBgNVBAoTBUFOU1NJMRcwFQYDVQQLEw4wMDAyIDEzMDAwNzY2OTEmMCQGA1UE +AxMdSUdDL0EgQUMgcmFjaW5lIEV0YXQgZnJhbmNhaXMwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCqfCifETCYzW9uLIUSJjsIBspB/VJPQ73AJidxdhpZ +ltgJ6weqJk5PPkuh45eHhWaBccm5FXZvd1AYkxAtN4hNF7fzRb0iLrcnmFvHBf29 +M+2i9VMdKCNlv0A1bs5qC8Op9SUMqyLwuMDEfTcMo2J87rTbPSE5p5yJ45uiEPiK +tkovLphpK2qghtrxCOW+TGcWLSVh89UNCxdERwnURgWdD8CITWHkJMTHaAmvrNKv +uZUmb4AE/HasqscjtuQGkVVE7GTbmYEc0lZ0/dYyKLvLyTcN+2lsb7qjawaMakAu +Fzo56tAM31ocum+kMrC4zD53G9OLH4b6/z4+b1yIRufjD/qrHfN9S/hUbk7M3DJa +Y3iiMq8zeOpD4Ux6TdeUBi3mT6VCkq8oik/DFeypa6nf4N0TArzMff8t5gepvnWW +6kJeWxreojOzY72rBfmL5r1N0W1WmuuJPJ/AeOS+JXAGxRFzoMjKFMs61PKcKjza +Xxcz2XYUN6pJh2XZ9NkuGV/5oM2ouUEybXGmpMv3YyLQKeS6gRpqKR2apaRcRlQk +RdTI7Xp5heyEd25nTWQPQ956g6Sn2Nu1U0z+YsgTw2I2pSgxMpu0lofimcYfVr9G +o6lkMeXVsUuoZsxbof8W/Ao4KmiPdyUmrZF0hWjIfxrlWhS4fQ63IzHAZLcFL0FY +VQIDAQABo3sweTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAWBgNV +HSAEDzANMAsGCSqBegGBXwEBAjAdBgNVHQ4EFgQUn6rTKZbfAOVD4PFjrN4SjsIn +ePowHwYDVR0jBBgwFoAUn6rTKZbfAOVD4PFjrN4SjsInePowDQYJKoZIhvcNAQEL +BQADggIBAHW1ddGONmacSPeFDU4Fu02anLQOKKIEvFAwu/SUTJiQhavgUmRP0tIu +YpOQsIUNiFT7xlRsnuuVeYBeopcWH/JndEGcVfS3aptKFoa9BR9mgHB+ydH1LSFx +UDmlrYimJhyL1yUcOtbj9MIMn1fBZMhXUSMWI40PI2pWS//6xp81k8YiwGXxr96p +bBi+V2VZzfQjVWQh2O2VYWkzcmpR9p/llW2O3mtzJxOUXn6XSMAyFr49N+3W3I68 +XC38YqjP9pD3sYsJ6zokYw3IlkXUL3dIQvUtYucnC+ARhhndpxD3YwaRMGladfSs ++aGNl8ag7zofkyVIVjoaiCEZk8OVIEkIVUlNolOcmZxzaS6n9cq3DiXvNyNfkNhD +fu6EF2onXn/SLT+sPq8wp42RxPSPCR3z95EO4xi63ETJfQVTA7duoPN519EaT9C4 +bIh2wYCYVYVTYc9EV0zeTg0WUfE9iYGufQutirXuVsTGzBELGNT8/Xn7/gQRnCPv +dnLHjb65Hnh28pocrWNCx9jtbWGQwiEqDwgULSBDJXwYtbegpH25pQwZ/smrPedb +3q/6VxknhecjDvTNDRkwPorkxhEe8LR9aWObDpaGkOD7A29bWT4dIfVXZ1Ym8ocZ +B4S6LJA6wyikBVogzalblXU5fyJQCk5/F/ezrNMHpr4tUgowTHgQ +-----END CERTIFICATE----- + +# IdenTrust Commercial Root CA 1 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H +-----END CERTIFICATE----- + +# Izenpe.com +-----BEGIN CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 +MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 +ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD +VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j +b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq +scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO +xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H +LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX +uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD +yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ +JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q +rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN +BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L +hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB +QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ +HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu +Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg +QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB +BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx +MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA +A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb +laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 +awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo +JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw +LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT +VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk +LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb +UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ +QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ +naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls +QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== +-----END CERTIFICATE----- + +# Japanese Government +-----BEGIN CERTIFICATE----- +MIIDoDCCAoigAwIBAgIBMTANBgkqhkiG9w0BAQUFADBDMQswCQYDVQQGEwJKUDEc +MBoGA1UEChMTSmFwYW5lc2UgR292ZXJubWVudDEWMBQGA1UECxMNQXBwbGljYXRp +b25DQTAeFw0wNzEyMTIxNTAwMDBaFw0xNzEyMTIxNTAwMDBaMEMxCzAJBgNVBAYT +AkpQMRwwGgYDVQQKExNKYXBhbmVzZSBHb3Zlcm5tZW50MRYwFAYDVQQLEw1BcHBs +aWNhdGlvbkNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp23gdE6H +j6UG3mii24aZS2QNcfAKBZuOquHMLtJqO8F6tJdhjYq+xpqcBrSGUeQ3DnR4fl+K +f5Sk10cI/VBaVuRorChzoHvpfxiSQE8tnfWuREhzNgaeZCw7NCPbXCbkcXmP1G55 +IrmTwcrNwVbtiGrXoDkhBFcsovW8R0FPXjQilbUfKW1eSvNNcr5BViCH/OlQR9cw +FO5cjFW6WY2H/CPek9AEjP3vbb3QesmlOmpyM8ZKDQUXKi17safY1vC+9D/qDiht +QWEjdnjDuGWk81quzMKq2edY3rZ+nYVunyoKb58DKTCXKB28t89UKU5RMfkntigm +/qJj5kEW8DOYRwIDAQABo4GeMIGbMB0GA1UdDgQWBBRUWssmP3HMlEYNllPqa0jQ +k/5CdTAOBgNVHQ8BAf8EBAMCAQYwWQYDVR0RBFIwUKROMEwxCzAJBgNVBAYTAkpQ +MRgwFgYDVQQKDA/ml6XmnKzlm73mlL/lupwxIzAhBgNVBAsMGuOCouODl+ODquOC +seODvOOCt+ODp+ODs0NBMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADlqRHZ3ODrso2dGD/mLBqj7apAxzn7s2tGJfHrrLgy9mTLnsCTWw//1sogJ +hyzjVOGjprIIC8CFqMjSnHH2HZ9g/DgzE+Ge3Atf2hZQKXsvcJEPmbo0NI2VdMV+ +eKlmXb3KIXdCEKxmJj3ekav9FfBv7WxfEPjzFvYDio+nEhEMy/0/ecGc/WLuo89U +DNErXxc+4z6/wCs+CZv+iKZ+tJIX/COUgb1up8WMwusRRdv4QcmWdupwX3kSa+Sj +B1oF7ydJzyGfikwJcGapJsErEU4z0g781mzSDjJkaP+tBXhfAx2o45CsJOAPQKdL +rosot4LKGAfmt1t06SAZf7IbiVQ= +-----END CERTIFICATE----- + +# Juur-SK +-----BEGIN CERTIFICATE----- +MIIE5jCCA86gAwIBAgIEO45L/DANBgkqhkiG9w0BAQUFADBdMRgwFgYJKoZIhvcN +AQkBFglwa2lAc2suZWUxCzAJBgNVBAYTAkVFMSIwIAYDVQQKExlBUyBTZXJ0aWZp +dHNlZXJpbWlza2Vza3VzMRAwDgYDVQQDEwdKdXVyLVNLMB4XDTAxMDgzMDE0MjMw +MVoXDTE2MDgyNjE0MjMwMVowXTEYMBYGCSqGSIb3DQEJARYJcGtpQHNrLmVlMQsw +CQYDVQQGEwJFRTEiMCAGA1UEChMZQVMgU2VydGlmaXRzZWVyaW1pc2tlc2t1czEQ +MA4GA1UEAxMHSnV1ci1TSzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB +AIFxNj4zB9bjMI0TfncyRsvPGbJgMUaXhvSYRqTCZUXP00B841oiqBB4M8yIsdOB +SvZiF3tfTQou0M+LI+5PAk676w7KvRhj6IAcjeEcjT3g/1tf6mTll+g/mX8MCgkz +ABpTpyHhOEvWgxutr2TC+Rx6jGZITWYfGAriPrsfB2WThbkasLnE+w0R9vXW+RvH +LCu3GFH+4Hv2qEivbDtPL+/40UceJlfwUR0zlv/vWT3aTdEVNMfqPxZIe5EcgEMP +PbgFPtGzlc3Yyg/CQ2fbt5PgIoIuvvVoKIO5wTtpeyDaTpxt4brNj3pssAki14sL +2xzVWiZbDcDq5WDQn/413z8CAwEAAaOCAawwggGoMA8GA1UdEwEB/wQFMAMBAf8w +ggEWBgNVHSAEggENMIIBCTCCAQUGCisGAQQBzh8BAQEwgfYwgdAGCCsGAQUFBwIC +MIHDHoHAAFMAZQBlACAAcwBlAHIAdABpAGYAaQBrAGEAYQB0ACAAbwBuACAAdgDk +AGwAagBhAHMAdABhAHQAdQBkACAAQQBTAC0AaQBzACAAUwBlAHIAdABpAGYAaQB0 +AHMAZQBlAHIAaQBtAGkAcwBrAGUAcwBrAHUAcwAgAGEAbABhAG0ALQBTAEsAIABz +AGUAcgB0AGkAZgBpAGsAYQBhAHQAaQBkAGUAIABrAGkAbgBuAGkAdABhAG0AaQBz +AGUAawBzMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNrLmVlL2Nwcy8wKwYDVR0f +BCQwIjAgoB6gHIYaaHR0cDovL3d3dy5zay5lZS9qdXVyL2NybC8wHQYDVR0OBBYE +FASqekej5ImvGs8KQKcYP2/v6X2+MB8GA1UdIwQYMBaAFASqekej5ImvGs8KQKcY +P2/v6X2+MA4GA1UdDwEB/wQEAwIB5jANBgkqhkiG9w0BAQUFAAOCAQEAe8EYlFOi +CfP+JmeaUOTDBS8rNXiRTHyoERF5TElZrMj3hWVcRrs7EKACr81Ptcw2Kuxd/u+g +kcm2k298gFTsxwhwDY77guwqYHhpNjbRxZyLabVAyJRld/JXIWY7zoVAtjNjGr95 +HvxcHdMdkxuLDF2FvZkwMhgJkVLpfKG6/2SSmuz+Ne6ML678IIbsSt4beDI3poHS +na9aEhbKmVv8b20OxaAehsmR0FyYgl9jDIpaq9iVpszLita/ZEuOyoqysOkhMp6q +qIWYNIE5ITuoOlIyPfZrN4YGWhWY3PARZv40ILcD9EEQfTmEeZZyY7aWAuVrua0Z +TbvGRNs2yyqcjg== +-----END CERTIFICATE----- + +# KEYNECTIS ROOT CA +-----BEGIN CERTIFICATE----- +MIID5TCCAs2gAwIBAgISESG8J2xVR69YTu/UztYpsqKFMA0GCSqGSIb3DQEBCwUA +MEwxCzAJBgNVBAYTAkZSMRIwEAYDVQQKEwlLRVlORUNUSVMxDTALBgNVBAsTBFJP +T1QxGjAYBgNVBAMTEUtFWU5FQ1RJUyBST09UIENBMB4XDTA5MDUyNjAwMDAwMFoX +DTIwMDUyNjAwMDAwMFowTDELMAkGA1UEBhMCRlIxEjAQBgNVBAoTCUtFWU5FQ1RJ +UzENMAsGA1UECxMEUk9PVDEaMBgGA1UEAxMRS0VZTkVDVElTIFJPT1QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDG/bMXhaGtJhuVaTUhPaSI+t7b +YDZAF2nCFGP7uNnCdBU3LpzQIM1pjYQyooVMFLSb8iWzVCqDPy2+D/M7ZNH/oFDv +d087TuE/C2SFmrpYftLDYtNkJaLUspc8d11jKjOS/M2CDZtUlYf1teuMzVvRyjAv +yYhGtc0NEbQYj+7RoT5dFegoz9/DkJtszNEMRXezOuuKkB3pr2RqiXupPUN0+uRn +IqH73E3E9WLJyiW0yYBgM6nde6ACv5YlCl7JXyl7tBeBi22BGdDZg1wFj0FpGmlD +gJ+or+DpjJGLJyuiJmDND/KkowKDjhiBwheKQxX5bfMdEKRanERhIyF62PvRAgMB +AAGjgcAwgb0wEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMCAQYwVwYD +VR0fBFAwTjBMoEqgSIZGaHR0cDovL3RydXN0Y2VudGVyLWNybC5jZXJ0aWZpY2F0 +Mi5jb20vS2V5bmVjdGlzL0tFWU5FQ1RJU19ST09UX0NBLmNybDAdBgNVHQ4EFgQU +77cjl9CokX+mz6YhwDSfzHdB4dAwHwYDVR0jBBgwFoAU77cjl9CokX+mz6YhwDSf +zHdB4dAwDQYJKoZIhvcNAQELBQADggEBABoxaZlCwuVAhaKfksNj1I8hOagZIf56 +/MNNQPMr6EusW0xZk8bcfguvfF+VhWu9x2+6wb74xjpnS5PGBWk+JC3wG5HGPj/s +QhiTbAMkim75IGcrfG2rNMkqIjMN132P7tI2ZELINZpuGWHLjWfwaKfQJAXmwxe6 +Ra58Q7WAeANNIHMF/EMQnTVpQnWUJYIrpjuQGN7Bqa/zLZW/lafPGJfhWeKirxoW +YQ33E3FTkzf9PK8AHWyLFK9Gloy2UnzMLU7N4elLCu6a/nqY5ym6G9ocutxrzQQO +JkCp63M8/lCoESdVvduOS+9PGO0V/72GmGbumiVxNGxQ8bJRy2adTSk= +-----END CERTIFICATE----- + +# KISA RootCA 1 +-----BEGIN CERTIFICATE----- +MIIDczCCAlugAwIBAgIBBDANBgkqhkiG9w0BAQUFADBkMQswCQYDVQQGEwJLUjEN +MAsGA1UECgwES0lTQTEuMCwGA1UECwwlS29yZWEgQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkgQ2VudHJhbDEWMBQGA1UEAwwNS0lTQSBSb290Q0EgMTAeFw0wNTA4MjQw +ODA1NDZaFw0yNTA4MjQwODA1NDZaMGQxCzAJBgNVBAYTAktSMQ0wCwYDVQQKDARL +SVNBMS4wLAYDVQQLDCVLb3JlYSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBDZW50 +cmFsMRYwFAYDVQQDDA1LSVNBIFJvb3RDQSAxMIIBIDANBgkqhkiG9w0BAQEFAAOC +AQ0AMIIBCAKCAQEAvATk+hM58DSWIGtsaLv623f/J/es7C/n/fB/bW+MKs0lCVsk +9KFo/CjsySXirO3eyDOE9bClCTqnsUdIxcxPjHmc+QZXfd3uOPbPFLKc6tPAXXdi +8EcNuRpAU1xkcK8IWsD3z3X5bI1kKB4g/rcbGdNaZoNy4rCbvdMlFQ0yb2Q3lIVG +yHK+d9VuHygvx2nt54OJM1jT3qC/QOhDUO7cTWu8peqmyGGO9cNkrwYV3CmLP3WM +vHFE2/yttRcdbYmDz8Yzvb9Fov4Kn6MRXw+5H5wawkbMnChmn3AmPC7fqoD+jMUE +CSVPzZNHPDfqAmeS/vwiJFys0izgXAEzisEZ2wIBA6MyMDAwHQYDVR0OBBYEFL+2 +J9gDWnZlTGEBQVYx5Yt7OtnMMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEF +BQADggEBABOvUQveimpb5poKyLGQSk6hAp3MiNKrZr097LuxQpVqslxa/6FjZJap +aBV/JV6K+KRzwYCKhQoOUugy50X4TmWAkZl0Q+VFnUkq8JSV3enhMNITbslOsXfl +BM+tWh6UCVrXPAgcrnrpFDLBRa3SJkhyrKhB2vAhhzle3/xk/2F0KpzZm4tfwjeT +2KM3LzuTa7IbB6d/CVDv0zq+IWuKkDsnSlFOa56ch534eJAx7REnxqhZvvwYC/uO +fi5C4e3nCSG9uRPFVmf0JqZCQ5BEVLRxm3bkGhKsGigA35vB1fjbXKP4krG9tNT5 +UNkAAk/bg9ART6RCVmE6fhMy04Qfybo= +-----END CERTIFICATE----- + +# LGPKI +-----BEGIN CERTIFICATE----- +MIIDoDCCAoigAwIBAgIBMTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJKUDEO +MAwGA1UEChMFTEdQS0kxGjAYBgNVBAsTEUFwcGxpY2F0aW9uIENBIEcyMB4XDTA2 +MDMzMTE1MDAwMFoXDTE2MDMzMTE0NTk1OVowOTELMAkGA1UEBhMCSlAxDjAMBgNV +BAoTBUxHUEtJMRowGAYDVQQLExFBcHBsaWNhdGlvbiBDQSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBALk1xhD422jbB8RATLAdHjbcw0H2z1UVbQh/ +XMZoVeXnV/GWUebhTXgPbkAVcDtl/hHf59PWWDU74Z8C/JRSRi6znmCbAp7JgtL2 +464JT4REtmKbAFFouDqt7GTRMkvplESDtA7OIYlrsDbAmMZLnMI+W2AqCTErLatM +3rGg/VhWwoMdILzEhAmHe6iVl8YljoPgPpMN0cd9c6mo/BkAQC4iuHozQfV4/Vpx +54LZSIhc7KiFhy1tgIlnGmm+EMBaju2IfT5vLDhrN85H2KIxMN5+U2Vsi4ZTQSBs +vUilfq8AWlYSWIHR3IlZ+bXu+E2a2EQpi3mn9yKq6nxctBaIIA0CAwEAAaOBsjCB +rzAdBgNVHQ4EFgQUf7hdjsQYa8Z9zC7prs405xdd4KEwDgYDVR0PAQH/BAQDAgEG +MEwGA1UdHwRFMEMwQaA/oD2kOzA5MQswCQYDVQQGEwJKUDEOMAwGA1UEChMFTEdQ +S0kxGjAYBgNVBAsTEUFwcGxpY2F0aW9uIENBIEcyMA8GA1UdEwEB/wQFMAMBAf8w +HwYDVR0jBBgwFoAUf7hdjsQYa8Z9zC7prs405xdd4KEwDQYJKoZIhvcNAQEFBQAD +ggEBADzYczZABkhKVBn1J0g5JaVuQue2zRvLOTS3m+xPKr535MqE/B3rmyJA1fT7 +aIdy/Eddag5SSuO1XUjGIpbmM21tq/bN18skWoyoRZ4+YYJ9lNUF8Bo1X3EvLlS1 +QQXvhg1S75yYG/EsTDrR84bTjD56L4ZFjoMyJlu/U8oOUVbcmsJaMBkNp57Vqpsg +OWl4IfSXbdEOEUwu0xtasPmXeFwqj1Jl7kxCJcI3MA5tKzWUgwbor0U7BGanMLv5 +4CE7Y259RF06alPvERck/VSyWmxzViHJbC2XpEKzJ2EFIWNt6ii8TxpvQtyYq1XT +HhvAkj+bweY7F1bixJhDJe62ywA= +-----END CERTIFICATE----- + +# LuxTrust Global Root +-----BEGIN CERTIFICATE----- +MIIDZDCCAkygAwIBAgICC7gwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UEBhMCTFUx +FjAUBgNVBAoTDUx1eFRydXN0IHMuYS4xHTAbBgNVBAMTFEx1eFRydXN0IEdsb2Jh +bCBSb290MB4XDTExMDMxNzA5NTEzN1oXDTIxMDMxNzA5NTEzN1owRDELMAkGA1UE +BhMCTFUxFjAUBgNVBAoTDUx1eFRydXN0IHMuYS4xHTAbBgNVBAMTFEx1eFRydXN0 +IEdsb2JhbCBSb290MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsn+n +QPAiygz267Hxyw6VV0B1r6A/Ps7sqjJX5hmxZ0OYWmt8s7j6eJyqpoSyYBuAQc5j +zR8XCJmk9e8+EsdMsFeaXHhAePxFjdqRZ9w6Ubltc+a3OY52OrQfBfVpVfmTz3iI +Sr6qm9d7R1tGBEyCFqY19vx039a0r9jitScRdFmiwmYsaArhmIiIPIoFdRTjuK7z +CISbasE/MRivJ6VLm6T9eTHemD0OYcqHmMH4ijCc+j4z1aXEAwfh95Z0GAAnOCfR +K6qq4UFFi2/xJcLcopeVx0IUM115hCNq52XAV6DYXaljAeew5Ivo+MVjuOVsdJA9 +x3f8K7p56aTGEnin/wIDAQABo2AwXjAMBgNVHRMEBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAfBgNVHSMEGDAWgBQXFYWJCS8kh28/HRvk8pZ5g0gTzjAdBgNVHQ4EFgQU +FxWFiQkvJIdvPx0b5PKWeYNIE84wDQYJKoZIhvcNAQELBQADggEBAFrwHNDUUM9B +fua4nX3DcNBeNv9ujnov3kgR1TQuPLdFwlQlp+HBHjeDtpSutkVIA+qVvuucarQ3 +XB8u02uCgUNbCj8RVWOs+nwIAjegPDkEM/6XMshS5dklTbDG7mgfcKpzzlcD3H0K +DTPy0lrfCmw7zBFRlxqkIaKFNQLXgCLShLL4wKpov9XrqsMLq6F8K/f1O4fhVFfs +BSTveUJO84ton+Ruy4KZycwq3FPCH3CDqyEPVrRI/98HIrOM+R2mBN8tAza53W/+ +MYhm/2xtRDSvCHc+JtJy9LtHVpM8mGPhM7uZI5K1g3noHZ9nrWLWidb2/CfeMifL +hNp3hSGhEiE= +-----END CERTIFICATE----- + +# LuxTrust Global Root 2 +-----BEGIN CERTIFICATE----- +MIIFwzCCA6ugAwIBAgIUCn6m30tEntpqJIWe5rgV0xZ/u7EwDQYJKoZIhvcNAQEL +BQAwRjELMAkGA1UEBhMCTFUxFjAUBgNVBAoMDUx1eFRydXN0IFMuQS4xHzAdBgNV +BAMMFkx1eFRydXN0IEdsb2JhbCBSb290IDIwHhcNMTUwMzA1MTMyMTU3WhcNMzUw +MzA1MTMyMTU3WjBGMQswCQYDVQQGEwJMVTEWMBQGA1UECgwNTHV4VHJ1c3QgUy5B +LjEfMB0GA1UEAwwWTHV4VHJ1c3QgR2xvYmFsIFJvb3QgMjCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBANeFl78RmOnwYoNMPIf5U2o3C/IPPIfOb9wmKb3F +ibrJgz337spbxm1Jc7TJRqMbNBM/wYlFV/TZsfs2ZUv7COJIcRHIbjuend+JZTem +hfY7RBi2xjcwYkSSl2l9QjAk5A0MiWtj3sXh306pFGxT4GHO9hcvHTy95iJMHZP1 +EMShduxq3sVs35a0VkBCwGKSMKEtFZSg0iAGCW5qbeXrt77U8PEVfIvmTroTzEsn +Xpk8F12PgX8zPU/TPxvsXD/wPEx1bvKm1Z3aLQdjAsZy6ZS8TEmVT4hSyNvoaYL4 +zDRbIvCGp4m9SAptZoFtyMhk+wHh9OHe2Z7d21vUKpkmFRseTJIpgp7VkoGSQXAZ +96Tlk0u8d2cx3Rz9MXANF5kM+Qw5GSoXtTBxVdUPrljhPS80m8+f9niFwpN6cj5m +j5wWEWCPnolvZ77gR1o7DJpni89Gxq44o/KnvObWhWszJHAiS8sIm7vI+AIpHb4g +DEa/a4ebsypmQjVGbKq6rfmYe+lQVRQxv7HaLe2ArWgk+2mr2HETMOZns4dA/Yl+ +8kPREd8vZS9kzl8UubG/Mb2HeFpZZYiq/FkySIbWTLkpS5XTdvN3JW1CHDiDTf2j +X5t/Lax5Gw5CMZdjpPuKadUiDTSQMC6otOBttpSsvItO13D8xTiOZCXhTTmQzsmH +hFhxAgMBAAGjgagwgaUwDwYDVR0TAQH/BAUwAwEB/zBCBgNVHSAEOzA5MDcGByuB +KwEBAQowLDAqBggrBgEFBQcCARYeaHR0cHM6Ly9yZXBvc2l0b3J5Lmx1eHRydXN0 +Lmx1MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBT/GCh2+UgFLKGu8SsbK7JT ++Et8szAdBgNVHQ4EFgQU/xgodvlIBSyhrvErGyuyU/hLfLMwDQYJKoZIhvcNAQEL +BQADggIBAGoZFO1uecEsh9QNcH7X9njJCwROxLHOk3D+sFTAMs2ZMGQXvw/l4jP9 +BzZAcg4atmpZ1gDlaCDdLnINH2pkMSCEfUmmWjfrRcmF9dTHF5kH5ptV5AzoqbTO +jFu1EVzPig4N1qx3gf4ynCSecs5U89BvolbW7MM3LGVYvlcAGvI1+ut7MV3CwRI9 +loGIlonBWVx65n9wNOeD4rHh4bhY79SV5GCc8JaXcozrhAIuZY+kt9J/Z93I055c +qqmkoCUUBpvsT34tC38ddfEz2O3OuHVtPlu5mB0xDVbYQw8wkbIEa91WvpWAVWe+ +2M2D2RjuLg+GLZKecBPs3lHJQ3gCpU3I+V/EkVhGFndadKpAvAefMLmx9xIX3eP/ +JEAdemrRTxgKqpAd60Ae36EeRJIQmvKN4dFLRp7oRUKX6kWZ8+xm1QL68qZKJKre +zrnK+T+Tb/mjuuqlPpmt/f97mfVl7vBZKGfXkJWkE4SphMHozs51k2MavDzq1WQf +LSoSOcbDWjLtR5EWDrw4wVDej8oqkDQc7kGUnF4ZLvhFSZl0kbAEb+MEWrGrKqv+ +x9CWttrhSmQGbmBNvUJO/3jaJMobtNeWOWyu8Q6qp31IiyBMz2TWuJdGsE7RKlY6 +oJO9r4Ak4Ap+58rVyuiFVdw2KuGUaJPHZnJED4AhMmwlxyOAgwrr +-----END CERTIFICATE----- + +# MULTICERT Root Certification Authority 01 +-----BEGIN CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIIVE2lvEA1VlowDQYJKoZIhvcNAQELBQAwgYUxCzAJBgNV +BAYTAlBUMUIwQAYDVQQKDDlNVUxUSUNFUlQgLSBTZXJ2acOnb3MgZGUgQ2VydGlm +aWNhw6fDo28gRWxlY3Ryw7NuaWNhIFMuQS4xMjAwBgNVBAMMKU1VTFRJQ0VSVCBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IDAxMB4XDTE0MDQwNDA4NTk0N1oX +DTM5MDQwNDA4NTk0N1owgYUxCzAJBgNVBAYTAlBUMUIwQAYDVQQKDDlNVUxUSUNF +UlQgLSBTZXJ2acOnb3MgZGUgQ2VydGlmaWNhw6fDo28gRWxlY3Ryw7NuaWNhIFMu +QS4xMjAwBgNVBAMMKU1VTFRJQ0VSVCBSb290IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IDAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAztw/9BluuxVp +hvTkzec6cDvHmos7gwCBW/sgFlq+v1gAXynmV29+iiwVB1waY4xCXxbd2omERVcX +lqCcoXUiQRo6/cUXkRP2vmIKvG4lLVvAjBBm9+LW+9xIMaMaqOVNSMmiHHP+j2ZA +Y3dZBzw9FJ/U94WR0MNC9Rths3eAgCptEgKWi1HZwW8nCxoHNAD/0llMKejXGWPY +kbQ//I4OJfKhEgdlyjXeq/4WowiMr39+EvRZFgUf6K10eTL3eAK2tMyr2x44YQQZ +ekFA2loRZHUC/WTR1pRCDyLnZc2vkA4MWzEBmVHvRYx9pTjannxL5Kbos6SC1gM0 +Lk+3Uat3OAn1Bv7cZhsPP/p974xVvuANhpWh3L3EwwjRRR7yvb5w8eYmxrsIsSil +wqXtiNahwPsj8Sc5zOGEBxm8fvbMOP9uELtG6SOJJIH/AOJRANxSUH0TUH0WPUCN +07/5imXYYhIpd8K6wkk0T4p5aclLFfM03s+vhuLlyKlWYUwGVFrFbBnq88hEzSQa +dtFxAFlr2XWbzv0Q/rGDoqW3koZ2m0r3HdyMhaZYrYqmaGkXyW0bps8nSyks3XFC +GokQ5dWbEl9Ji4S82Ahc+884Qq++0W57kapmQMUFfivQZrbH31L+9EVtI5IhnhIB +kHOD4qUJDdfA+IWVHmPRPzXalNE32fUCAwEAAaNjMGEwHQYDVR0OBBYEFNU5HJxb +bwSqopVM7yDdKXSkxUVxMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1Tkc +nFtvBKqilUzvIN0pdKTFRXEwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUA +A4ICAQA/51/zIhbeg54g5ILn5Z53yfsrsHQN3xt0Ig9zEKGwF+xMDNQocGpmckRp +EJN2Nc8v+I88qxl8cZKVcRs3FcIbKHrvbng43/uPmwEg3K/21o0JZtrERqn8lapE +IxLfR8CwFey1sZ5sD5GqpjrlwQ1gbFBAcFxcyM6zzOvtqogZVqWkyAx65XZAZzO0 +PZbcd8sjePlTW8+N3rGnjlp6ojJjo4jXJWFaXUk6cubPqpSGbG73guCOZ5MoxagN +Te84rXlKZo2EAQgEefNSxkHnmmIGs/USHuzZAEPT65Z3dOF5+RSUhG26VIIFjN8B +8jCIgax6L4tDLHY0zjXnh45OCwqlGlexU1q/a9i+AH7G+e5mMQix35QzhJx3T3tk +L++OD1koIsvwXD4r/TXWlf8D7GVSfr7yGfh71VIsUneakWZBcI3VSecLSH+Krt5F +Pd3+5tLkksN7zjCgSW43rajTLLY9niHbBlfi8K4G+9nFETehe9sdEXxodiA+9byl +2Wa1Ia1FJsZdHgKjQcTUfYEZyxeXBg/m7HQARsR13T3wQzSvprz89oL7z8X6sw8l +pT9mENaegqXbOhN53o2p16aNhtIv2WkN4nV4fklfIquGcChRs3q2oHn61OWDp7B3 +ytsBgu/ivk0v08BN0ONpbnwmm+um+0XvsQSKL6ohBvbm1LxBIw== +-----END CERTIFICATE----- + +# Macao Post eSignTrust Root Certification Authority (G02) +-----BEGIN CERTIFICATE----- +MIIFljCCA36gAwIBAgIQUqy+BxFJl7sfv4cbJRe/pDANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJNTzETMBEGA1UEChMKTWFjYW8gUG9zdDFBMD8GA1UEAxM4TWFj +YW8gUG9zdCBlU2lnblRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +KEcwMikwHhcNMTAwMTA2MDAwMDAwWhcNMjAwMTA1MjM1OTU5WjBlMQswCQYDVQQG +EwJNTzETMBEGA1UEChMKTWFjYW8gUG9zdDFBMD8GA1UEAxM4TWFjYW8gUG9zdCBl +U2lnblRydXN0IFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKEcwMikwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2+IendMxdI16uq5bc1yQoHaQU +ZtegaIxenUXU1CnTswvrrRbqnVIRyaThcOXdvg4cEXfrn6NweBePuT4XU2mp6/VV ++ZWX6d85dp4fUhe0GwAS0M0846pJ0Z5BNzb1Yc0jD1ex9k3T2w1CUwKI9PCphotX +z3IK1ZRLWto35T1HWWe+045W1Vc50Cfbn0lPqBZUv3hfzxydXqELjIMDswwUyVqp +u//GrlnP9WUfI4kBU4rVWxedm/+YUQ9DSfeqLO3l6YY6M1Bz3FKla2OE6ROifMd3 +GvOqqQ0LTk4dRMNyO5lZ50EiOyxUXhIxlmhBGdXtdae5V1sR9pqkSS9i8wuYURuz +M0LSzNRhGcPT3Jv7k7JizTb7jOkabhqxOSSOXdk+O4Z8iOa3JwP4lVGwv1A3/vhO +EwEbJy2bktByV9ejmlboa6P3Vd5AXeIIH1y7UaaetN0OphpZYmeGcxCVnZXNur/Y +nCoOi3aZk9RLsOhUPw3YivmAz0H9AXpFfH3WPU75Yk9BJXyqbVhWGwe0c6ofER88 +ulMj4O1KzZaJ3EjQTWLLkwf2oK5TF3xfXAccBUyrTGqqwg+gGWt5ecJ8s6n9PfvM +fHHFu74lbSGn+9a+YPO1qalsdBg/qJ5CYEHyOS0dwg1z8uCxtkoaGL13aRnX0nqx +3JY1mtgmhYO2EynC4wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB +/wQEAwIBBjAdBgNVHQ4EFgQUAoG3tmb4kkVtwnHSn+wv07ofuf8wDQYJKoZIhvcN +AQEFBQADggIBAFhTi77PQbJPttXeSmjNZc/GQIqsS5pbY2298T9ZUELQ35rjX1aR +s1ub2UUGQ++TG/0zdx0GVDhI8VSMOlNrO3E1CXZl6VcPQ/aRmt4Qu7pokioly2dE +CWu/nZdmy6lFtr43mR11Jb49PGNsv6kTR8dyjMvDz/T2hwWZiReoNCDx36EnZ9On +I++rWYM9GtgqzcKtSjAMBjogi6T42kY3Qy60iR2Ec4pgvmQxJ0LA63JhbczefHMr +6L85Ql55keyAG6o2dk4h6IYElwkoy0fnQNQsXhpeSPqux+kE6kckm77xR57V1XrR +XtSF8gsjBJjUK5pWckZMQZoz8JK0v0HUvZuws/H1E9avW9Ty0UHwR116vHpZ8X1g +aJQOSk+BkiKqH8Q8vhw6OkzwcKF/u5/c0sWk8SZu4fMmqXD78YmWYhVcWaC1I/qW +arIakj0NJEoruAj+b9/cwu6W/86/e7j5hO9BO+RNuYeRusZfyO3wy4vTD5H2IN6R +mMbnSGTRzlMS7sQVbdyAUBsTYE95W/wanP6in6ARM5HJS206ZpYt0zj42ZmBtEQm +f7HnnnBtHW31IgnkrBk2+ycF2Hqb2byeG9oZN9jx3RWYZBuPU/AonawUul9pz5Yj +7lasmc06j9VeGeZiEzpf64tfFsA74dGTj1ZhNwXQeRv9qLwPedKz5tNm +-----END CERTIFICATE----- + +# Microsec e-Szigno Root CA +-----BEGIN CERTIFICATE----- +MIIHqDCCBpCgAwIBAgIRAMy4579OKRr9otxmpRwsDxEwDQYJKoZIhvcNAQEFBQAw +cjELMAkGA1UEBhMCSFUxETAPBgNVBAcTCEJ1ZGFwZXN0MRYwFAYDVQQKEw1NaWNy +b3NlYyBMdGQuMRQwEgYDVQQLEwtlLVN6aWdubyBDQTEiMCAGA1UEAxMZTWljcm9z +ZWMgZS1Temlnbm8gUm9vdCBDQTAeFw0wNTA0MDYxMjI4NDRaFw0xNzA0MDYxMjI4 +NDRaMHIxCzAJBgNVBAYTAkhVMREwDwYDVQQHEwhCdWRhcGVzdDEWMBQGA1UEChMN +TWljcm9zZWMgTHRkLjEUMBIGA1UECxMLZS1Temlnbm8gQ0ExIjAgBgNVBAMTGU1p +Y3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw +ggEKAoIBAQDtyADVgXvNOABHzNuEwSFpLHSQDCHZU4ftPkNEU6+r+ICbPHiN1I2u +uO/TEdyB5s87lozWbxXGd36hL+BfkrYn13aaHUM86tnsL+4582pnS4uCzyL4ZVX+ +LMsvfUh6PXX5qqAnu3jCBspRwn5mS6/NoqdNAoI/gqyFxuEPkEeZlApxcpMqyabA +vjxWTHOSJ/FrtfX9/DAFYJLG65Z+AZHCabEeHXtTRbjcQR/Ji3HWVBTji1R4P770 +Yjtb9aPs1ZJ04nQw7wHb4dSrmZsqa/i9phyGI0Jf7Enemotb9HI6QMVJPqW+jqpx +62z69Rrkav17fVVA71hu5tnVvCSrwe+3AgMBAAGjggQ3MIIEMzBnBggrBgEFBQcB +AQRbMFkwKAYIKwYBBQUHMAGGHGh0dHBzOi8vcmNhLmUtc3ppZ25vLmh1L29jc3Aw +LQYIKwYBBQUHMAKGIWh0dHA6Ly93d3cuZS1zemlnbm8uaHUvUm9vdENBLmNydDAP +BgNVHRMBAf8EBTADAQH/MIIBcwYDVR0gBIIBajCCAWYwggFiBgwrBgEEAYGoGAIB +AQEwggFQMCgGCCsGAQUFBwIBFhxodHRwOi8vd3d3LmUtc3ppZ25vLmh1L1NaU1ov +MIIBIgYIKwYBBQUHAgIwggEUHoIBEABBACAAdABhAG4A+gBzAO0AdAB2AOEAbgB5 +ACAA6QByAHQAZQBsAG0AZQB6AOkAcwDpAGgAZQB6ACAA6QBzACAAZQBsAGYAbwBn +AGEAZADhAHMA4QBoAG8AegAgAGEAIABTAHoAbwBsAGcA4QBsAHQAYQB0APMAIABT +AHoAbwBsAGcA4QBsAHQAYQB0AOEAcwBpACAAUwB6AGEAYgDhAGwAeQB6AGEAdABh +ACAAcwB6AGUAcgBpAG4AdAAgAGsAZQBsAGwAIABlAGwAagDhAHIAbgBpADoAIABo +AHQAdABwADoALwAvAHcAdwB3AC4AZQAtAHMAegBpAGcAbgBvAC4AaAB1AC8AUwBa +AFMAWgAvMIHIBgNVHR8EgcAwgb0wgbqggbeggbSGIWh0dHA6Ly93d3cuZS1zemln +bm8uaHUvUm9vdENBLmNybIaBjmxkYXA6Ly9sZGFwLmUtc3ppZ25vLmh1L0NOPU1p +Y3Jvc2VjJTIwZS1Temlnbm8lMjBSb290JTIwQ0EsT1U9ZS1Temlnbm8lMjBDQSxP +PU1pY3Jvc2VjJTIwTHRkLixMPUJ1ZGFwZXN0LEM9SFU/Y2VydGlmaWNhdGVSZXZv +Y2F0aW9uTGlzdDtiaW5hcnkwDgYDVR0PAQH/BAQDAgEGMIGWBgNVHREEgY4wgYuB +EGluZm9AZS1zemlnbm8uaHWkdzB1MSMwIQYDVQQDDBpNaWNyb3NlYyBlLVN6aWdu +w7MgUm9vdCBDQTEWMBQGA1UECwwNZS1TemlnbsOzIEhTWjEWMBQGA1UEChMNTWlj +cm9zZWMgS2Z0LjERMA8GA1UEBxMIQnVkYXBlc3QxCzAJBgNVBAYTAkhVMIGsBgNV +HSMEgaQwgaGAFMegSXUWYYTbMUuE0vE3QJDvTtz3oXakdDByMQswCQYDVQQGEwJI +VTERMA8GA1UEBxMIQnVkYXBlc3QxFjAUBgNVBAoTDU1pY3Jvc2VjIEx0ZC4xFDAS +BgNVBAsTC2UtU3ppZ25vIENBMSIwIAYDVQQDExlNaWNyb3NlYyBlLVN6aWdubyBS +b290IENBghEAzLjnv04pGv2i3GalHCwPETAdBgNVHQ4EFgQUx6BJdRZhhNsxS4TS +8TdAkO9O3PcwDQYJKoZIhvcNAQEFBQADggEBANMTnGZjWS7KXHAM/IO8VbH0jgds +ZifOwTsgqRy7RlRw7lrMoHfqaEQn6/Ip3Xep1fvj1KcExJW4C+FEaGAHQzAxQmHl +7tnlJNUb3+FKG6qfx1/4ehHqE5MAyopYse7tDk2016g2JnzgOsHVV4Lxdbb9iV/a +86g4nzUGCM4ilb7N1fy+W955a9x6qWVmvrElWl/tftOsRm1M9DKHtCAE4Gx4sHfR +hUZLphK3dehKyVZs15KrnfVJONJPU+NVkBHbmJbGSfI+9J8b4PeI3CVimUTYc78/ +MPMMNz7UwiiAc7EBt51alhQBS6kRnSlqLtBdgcDPsiBDxwPgN05dCtxZICU= +-----END CERTIFICATE----- + +# Microsec e-Szigno Root CA 2009 +-----BEGIN CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW +-----END CERTIFICATE----- + +# Microsoft ECC Product Root Certificate Authority 2018 +-----BEGIN CERTIFICATE----- +MIIDIzCCAqigAwIBAgIQFJgmZtx8zY9AU2d7uZnshTAKBggqhkjOPQQDAzCBlDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v +bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWlj +cm9zb2Z0IEVDQyBQcm9kdWN0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTgwHhcNMTgwMjI3MjA0MjA4WhcNNDMwMjI3MjA1MDQ2WjCBlDELMAkGA1UEBhMC +VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV +BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE+MDwGA1UEAxM1TWljcm9zb2Z0IEVD +QyBQcm9kdWN0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTgwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATHERYqdh1Wjr65YmXUw8608MMw7I9t1245vMhJq6u4 +40N41YEGXe/HfZ/O1rOQdd4MsJDeI7rI0T5n4BmpG4YxHl80Le4X/RX7fieKMqHq +yY/JfhjLLzssSHp9pvQBB6yjgbwwgbkwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB +/wQFMAMBAf8wHQYDVR0OBBYEFEPvcIe4nb/siBncxsRrdQ11NDMIMBAGCSsGAQQB +gjcVAQQDAgEAMGUGA1UdIAReMFwwBgYEVR0gADBSBgwrBgEEAYI3TIN9AQEwQjBA +BggrBgEFBQcCARY0aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2Nz +L1JlcG9zaXRvcnkuaHRtADAKBggqhkjOPQQDAwNpADBmAjEAocBJRF0yVSfMPpBu +JSKdJFubUTXHkUlJKqP5b08czd2c4bVXyZ7CIkWbBhVwHEW/AjEAxdMo63LHPrCs +Jwl/Yj1geeWS8UUquaUC5GC7/nornGCntZkU8rC+8LsFllZWj8Fo +-----END CERTIFICATE----- + +# Microsoft ECC TS Root Certificate Authority 2018 +-----BEGIN CERTIFICATE----- +MIIDFzCCAp6gAwIBAgIQFTh14WR+0bBHtO+vQRKCRTAKBggqhkjOPQQDAzCBjzEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v +bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjE5MDcGA1UEAxMwTWlj +cm9zb2Z0IEVDQyBUUyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDE4MB4X +DTE4MDIyNzIwNTEzNFoXDTQzMDIyNzIxMDAxMlowgY8xCzAJBgNVBAYTAlVTMRMw +EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN +aWNyb3NvZnQgQ29ycG9yYXRpb24xOTA3BgNVBAMTME1pY3Jvc29mdCBFQ0MgVFMg +Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxODB2MBAGByqGSM49AgEGBSuB +BAAiA2IABN7Nu3Ag8SUgtJTo17Q7D26H3ausz01AL4Eza1kJGNaHDSYjnLSNlZ12 +n6W5BkLmrTayxLOuejwI1cudOl5FIWwL4yD1m8LdRDPjQrnq8ihCkqr+DAfKihOZ +O2IA7drzNaOBvDCBuTAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQU6EfIQpqwna5vCyg7mBWP47HogLIwEAYJKwYBBAGCNxUBBAMCAQAw +ZQYDVR0gBF4wXDAGBgRVHSAAMFIGDCsGAQQBgjdMg30BATBCMEAGCCsGAQUFBwIB +FjRodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y +eS5odG0AMAoGCCqGSM49BAMDA2cAMGQCMBSGUMAmGuvqoRR3OlvfYzmlM8dQQNVr +NWsPtN99VrnhpZ14GYKhQ24a11ijVQNC2wIwGJS0HjqNZPoMJxuHE0rStzoAlMby +5WO/r+P63JPV50aaa4FpPgLfUQ2PKHFBiZEv +-----END CERTIFICATE----- + +# Microsoft Identity Verification Root Certificate Authority 2020 +-----BEGIN CERTIFICATE----- +MIIFzDCCA7SgAwIBAgIQVJjS0dRbGZVIE3nIEcCHmTANBgkqhkiG9w0BAQwFADB3 +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMUgw +RgYDVQQDEz9NaWNyb3NvZnQgSWRlbnRpdHkgVmVyaWZpY2F0aW9uIFJvb3QgQ2Vy +dGlmaWNhdGUgQXV0aG9yaXR5IDIwMjAwHhcNMjAwNDE2MTgzNjE2WhcNNDUwNDE2 +MTg0NDQwWjB3MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv +cmF0aW9uMUgwRgYDVQQDEz9NaWNyb3NvZnQgSWRlbnRpdHkgVmVyaWZpY2F0aW9u +IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMjAwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCzkSoHgwZn/Z6d4MfAt6TmQgR/D6bbX/vVWtdFoPt3 +C/CA86ZtWk15U9ighoRXRSDHolT7x6K/isduNfOiFcQvTuNKhZZJDf++mdgU9rwn +B+5Cmyv1C5IG5P1pE2WokXLymITrgz0O5NdxEkghyw3t9kdJt5v5yccXtoRP/7is +mtdzZ0mF44a9N0DQJYbU3rXCbWJq1al4vC1vSfnlbBQU/RTH02UWN97LbrxeKY39 +YpsVLNYF5rmJMjOjYsfX1lJnCMQu9FYrnguHzOyntKaq6wXNGVelOgsEJxyRZ54t +Yi0vHr7awCDLBBnKM/uJvpjicqByNb554ZyDb+RtF2+Q8z0AhnU4jtDgSZq729P4 +MMrVV4hoTXLTv21/cdj9vQ2ukmRIt1tveSa1zZuVIYTR7w8yPXtXjPNFB0x84F4Y +DjV2i22eyzZ0qwX44HNdMlaUZ5clCsY1PZSX58FEi4D9wfj0dBnlMPYG+yFXPgYc +i2sVhidJe4KTylnodUfoPzj0x1N5oLa04lxR771fOMET5ngMlVouxUBZKMwPJMDs +ugl3I5k4prYc2se6ILbXN9h/N68I4ztx225zG32ZcrDkhjNZdLUWAHtQbcaGE9r9 +xDmCPSQAmmDaupTABVEsNKxQmROHu7MFgLJNMAJcuCaDXbRjc++uI5VPYCi+N9Vb +pQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUyH7SaoUqG8oZmAQHJ89QEE9oqKIwEAYJKwYBBAGCNxUBBAMCAQAwDQYJ +KoZIhvcNAQEMBQADggIBAK9q3eYZ5y2UQxlOy+lQlWSlA5ECi+I2gDsVolLCFhm2 +alpddEMw9Jv/YHQJsSEekBZtxSSPXGaIY/RPzH3yEkxAEIsBn9qpyK7ylRvPnQXr +ST50oGhb5VYsZRyCflPaVtlGF3mSRcQQNghSKRfLL6byftRpJIoej7BzDcwcSquy +qu2nkWMBZCKoMrh+MiizZ3MtkbTcMQEL90cKpvHXSu1WYMQsCKN7QLC8dCdSh9a+ +iN03ioluZ4gd9cldoP62qzqA1xqXPBc2IkEerE3Vg+Y8OL1PMOlUqdO2BMMydmG7 +sBjFKxizwIDVt5WwXlFNIvzsWKro2JS0pS7tkt7nGHwhV91VY/e/bc0f0qZ3KHDH +4ls6WwjSW07IAJaz4YM2r4YKZVx09ursemp0oPBL7u+Uo6xQ8oft1zowg8n7fVe+ +5eP4QcrlZK6zo+xY7IWazO+56vNWGLlcc5qvxXcXg1nbNxoYclSlQdK2I3WjQ5rl +d3yWebdBjb/s3ICgn9F3dVhfNRPgJRpnC33OJfoHCuRhIdjUHOUHxjaZ9JbQxhX+ +Ts3Xroud2xb9BMaSvdSI5qmjqrv3ZDg7X8wM0DW+dBkDpsWqTKJhNoI+HfMrvJdd +20t4Oy31O+9gI+j17AsjNpWvmGa/U9N7uGlKKpZmacSUxvRfbqyYeIiABlyisu2i +-----END CERTIFICATE----- + +# Microsoft Root Certificate Authority +-----BEGIN CERTIFICATE----- +MIIFmTCCA4GgAwIBAgIQea0WoUqgpa1Mc1j0BxMuZTANBgkqhkiG9w0BAQUFADBf +MRMwEQYKCZImiZPyLGQBGRYDY29tMRkwFwYKCZImiZPyLGQBGRYJbWljcm9zb2Z0 +MS0wKwYDVQQDEyRNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkw +HhcNMDEwNTA5MjMxOTIyWhcNMjEwNTA5MjMyODEzWjBfMRMwEQYKCZImiZPyLGQB +GRYDY29tMRkwFwYKCZImiZPyLGQBGRYJbWljcm9zb2Z0MS0wKwYDVQQDEyRNaWNy +b3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQDzXfqAZ9Rap6kMLJAg0DUIPHWEzbcHiZyJ2t7Ow2D6 +kWhanpRxKRh2fMLgyCV2lA5Y+gQ0Nubfr/eAuulYCyuT5Z0F43cikfc0ZDwikR1e +4QmQvBT+/HVYGeF5tweSo66IWQjYnwfKA1j8aCltMtfSqMtL/OELSDJP5uu4rU/k +XG8TlJnbldV126gat5SRtHdb9UgMj2p5fRRwBH1tr5D12nDYR7e/my9s5wW34RFg +rHmRFHzF1qbk4X7Vw37lktI8ALU2gt554W3ztW74nzPJy1J9c5g224uha6KVl5uj +3sJNJv8GlmclBsjnrOTuEjOVMZnINQhONMp5U9W1vmMyWUA2wKVOBE0921sHM+RY +v+8/U2TYQlk1V/0PRXwkBE2e1jh0EZcikM5oRHSSb9VLb7CG48c2QqDQ/MHAWvmj +YbkwR3GWChawkcBCle8Qfyhq4yofseTNAz93cQTHIPxJDx1FiKTXy36IrY4t7EXb +xFEEySr87IaemhGXW97OU4jm4rf9rJXCKEDb7wSQ34EzOdmyRaUjhwalVYkxuwYt +YA5BGH0fLrWXyxHrFdUkpZTvFRSJ/Utz+jJb/NEzAPlZYnAHMuouq0Ate8rdIWcb +MJmPFqojqEHRsG4RmzbE3kB0nOFYZcFgHnpbOMiPuwQmfNQWQOW2a2yqhv0Av87B +NQIDAQABo1EwTzALBgNVHQ8EBAMCAcYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUDqyCYEBWJ5flJRP8KuEKU5VZ5KQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZI +hvcNAQEFBQADggIBAMURTQM6YN1dUhF3j7K7NsiyBb+0t6jYIJ1cEwO2HCL6BhM1 +tshj1JpHbyZX0lXxBLEmX9apUGigvNK4bszD6azfGc14rFl0rGY0NsQbPmw4TDMO +MBINoyb+UVMA/69aToQNDx/kbQUuToVLjWwzb1TSZKu/UK99ejmgN+1jAw/8EwbO +FjbUVDuVG1FiOuVNF9QFOZKaJ6hbqr3su77jIIlgcWxWs6UT0G0OI36VA+1oPfLY +Y7hrTbboMLXhypRL96KqXZkwsj2nwlFsKCABJCcrSwC3nRFrcL6yEIK8DJto0I07 +JIeqmShynTNfWZC99d6TnjpiWjQ54ohVHbkGsMGJay3XacMZEjaE0Mmg2v8vaXiy +5Xra69cMwPe9Yxe4ORM4ojZbe/KFVmodZGLBOOKqv1FmopT1EpxmIhBr8rcwki3y +KfA9OxRDaKLxnCk3y844ICVtfGfzfiQSJAMIgUfspZ6X9RjXz7vV73aW7/3O21ad +laBC+ZdY4dcxItNfWeY+biIA6kOEtiXb2fMIVmjAZGsdfOy2k6JiV24u2OdYj8Qx +SSbd3ik1h/UwcXBbFDxpvYkSfesuo/7Yf56CWlIKK8FDK9kwiJ/IEPuJjeahhXUz +fmye23MTZGJppS99ypZtn/gETTCSPW4hFCHJPeDD/YprnUr90aGdmUN3P7Da +-----END CERTIFICATE----- + +# Microsoft Root Certificate Authority 2010 +-----BEGIN CERTIFICATE----- +MIIF7TCCA9WgAwIBAgIQKMw6Jb+6RKxEmptYa0M5qjANBgkqhkiG9w0BAQsFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp +TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAw +NjIzMjE1NzI0WhcNMzUwNjIzMjIwNDAxWjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5IDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQC5CJ4o5OTsBk5QaLNBxXvrrraOr4G6IkQfZTRpTL5wQBfyFnvief2G7Q05 +9BuorZKQHss9do9a2bWREC48BY2KbSRU5x/tVq2DtFCcFaUXdIhZIPwIxYR202jU +byh4zly481CQRP/jY1++oZoslhUE1gf+HoQh4EIxEcQoNpTPUKRinsnWq3EAslsM +5pbUCiSW9f/G1bcb18u3IWKvEtyhXTfjGvsaRpjAm8DnYx8qCJMCfh5qjvKfGInk +IoWisYRXQP/1DthvnO3iRTEBzRfpf7CBReOqIUAmoXKqp088AQV+7oNYsV4GY5li +kXiCtw2TDCRqtBvbJ+xflQQ/k0ow9ZcYs6f5GaeTMx0ByNsiUlzXJclG+aL7h1lD +vptisY0thkQaRqx4YX4wCfquicRBKiJmA5E5RZzHiwyoyg0v+1LqDPdjMyOd/rAf +rWfWp1ADxgRwY7UssYZaQ7f7rvluKW4hIUEmBozJw+6wwoWTobmF2eYybEtMP9Zd +o+W1nXfDnMBVt3QA47g4q4OXUOGaQiQdxsCjMNEaWshSNPdz8ccYHzOteuzLQWDz +I5QgwkhFrFxRxi6AwuJ3Fb2Fh+02nZaR7gC1o3Dsn+ONgGiDdrqvXXBSIhbiZvu6 +s8XC9z4vd6bK3sGmxkhMwzdRI9Mn17hOcJbwoUR2r3jPmuFmEwIDAQABo1EwTzAL +BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU1fZWy4/oolxi +aNE9lJBb186aGMQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQELBQADggIB +AKylloy/u66m9tdxh0MxVoj9HDJxWzW31PCR8q834hTx8wImBT4WFH8UurhP+4my +sufUCcxtuVs7ZGVwZrfysVrfGgLz9VG4Z215879We+SEuSsem0CcJjT5RxiYadgc +17bRv49hwmfEte9gQ44QGzZJ5CDKrafBsSdlCfjN9Vsq0IQz8+8f8vWcC1iTN6B1 +oN5y3mx1KmYi9YwGMFafQLkwqkB3FYLXi+zA07K9g8V3DB6urxlToE15cZ8PrzDO +Z/nWLMwiQXoH8pdCGM5ZeRBV3m8Q5Ljag2ZAFgloI1uXLiaaArtXjMW4umliMoCJ +nqH9wJJ8eyszGYQqY8UAaGL6n0eNmXpFOqfp7e5pQrXzgZtHVhB7/HA2hBhz6u/5 +l02eMyPdJgu6Krc/RNyDJ/+9YVkrEbfKT9vFiwwcMa4y+Pi5Qvd/3GGadrFaBOER +PWZFtxhxvskkhdbz1LpBNF0SLSW5jaYTSG1LsAd9mZMJYYF0VyaKq2nj5NnHiMwk +2OxSJFwevJEU4pbe6wrant1fs1vb1ILsxiBQhyVAOvvH7s3+M+Vuw4QJVQMlOcDp +NV1lMaj2v6AJzSnHszYyLtyV84PBWs+LjfbqsyH4pO0eMQ62TBGrYAukEiMiF6M2 +ZIKRBBLgq28ey1AFYbRA/1mGcdHVM2l8qXOKONdkDPFp +-----END CERTIFICATE----- + +# Microsoft Root Certificate Authority 2011 +-----BEGIN CERTIFICATE----- +MIIF7TCCA9WgAwIBAgIQP4vItfyfspZDtWnWbELhRDANBgkqhkiG9w0BAQsFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl +ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp +TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEw +MzIyMjIwNTI4WhcNMzYwMzIyMjIxMzA0WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv +c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm +aWNhdGUgQXV0aG9yaXR5IDIwMTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCygEGqNThNE3IyaCJNuLLx/9VSvGzH9dJKjDbu0cJcfoyKrq8TKG/Ac+M6 +ztAlqFo6be+ouFmrEyNozQwph9FvgFyPRH9dkAFSWKxRxV8qh9zc2AodwQO5e7BW +6KPeZGHCnvjzfLnsDbVU/ky2ZU+I8JxImQxCCwl8MVkXeQZ4KI2JOkwDJb5xalwL +54RgpJki49KvhKSn+9GY7Qyp3pSJ4Q6g3MDOmT3qCFK7VnnkH4S6Hri0xElcTzFL +h93dBWcmmYDgcRGjuKVB4qRTufcyKYMME782XgSzS0NHL2vikR7TmE/dQgfI6B0S +/Jmpaz6SfsjWaTr8ZL22CZ3K/QwLopt3YEsDlKQwaRLWQi3BQUzK3Kr9j1uDRprZ +/LHR47PJf0h6zSTwQY9cdNCssBAgBkm3xy0hyFfj0IbzA2j70M5xwYmZSmQBbP3s +MJHPQTySx+W6hh1hhMdfgzlirrSSL0fzC/hV66AfWdC7dJse0Hbm8ukG1xDo+mTe +acY1logC8Ea4PyeZb8txiSk190gWAjWP1Xl8TQLPX+uKg09FcYj5qQ1OcunCnAfP +SRtOBA5jUYxe2ADBVSy2xuDCZU7JNDn1nLPEfuhhbhNfFcRf2X7tHc7uROzLLoax +7Dj2cO2rXBPB2Q8Nx4CyVe0096yb5MPa50c8prWPMd/FS6/r8QIDAQABo1EwTzAL +BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUci06AjGQQ7kU +BU7h6qfHMdEjiTQwEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQELBQADggIB +AH9yzw+3xRXbm8BJyiZb/p4T5tPw0tuXX/JLP02zrhmu7deXoKzvqTqjwkGw5biR +nhOBJAPmCf0/V0A5ISRW0RAvS0CpNoZLtFNXmvvxfomPEf4YbFGq6O0JlbXlccmh +6Yd1phV/yX43VF50k8XDZ8wNT2uoFwxtCJJ+i92Bqi1wIcM9BhS7vyRep4TXPw8h +Ir1LAAbblxzYXtTFC1yHblCk6MM4pPvLLMWSZpuFXst6bJN8gClYW1e1QGm6CHmm +ZGIVnYeWRbVmIyADixxzoNOieTPgUFmG2y/lAiXqcyqfABTINseSO+lOAOzYVgm5 +M0kS0lQLAausR7aRKX1MtHWAUgHoyoL2n8ysnI8X6i8msKtyrAv+nlEex0NVZ09R +s1fWtuzuUrc66U7h14GIvE+OdbtLqPA1qibUZ2dJsnBMO5PcHd94kIZysjik0dyS +TclY6ysSXNQ7roxrsIPlAT/4CTL2kzU0Iq/dNw13CYArzUgA8YyZGUcFAenRv9FO +0OYoQzeZpApKCNmacXPSqs0xE2N2oTdvkjgefRI8ZjLny23h/FKJ3crWZgWalmG+ +oijHHKOnNlA8OqTfSm7mhzvO6/DggTedEzxSjr25HTTGHdUKaj2YKXCMiSrRq4IQ +SB/c9O+lxbtVGjhjhE63bK2VVOxlIhBJF7jAHscPrFRH +-----END CERTIFICATE----- + +# NetLock Arany (Class Gold) Főtanúsítvány +-----BEGIN CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= +-----END CERTIFICATE----- + +# NetLock Minositett Kozjegyzoi (Class QA) Tanusitvanykiado +-----BEGIN CERTIFICATE----- +MIIG0TCCBbmgAwIBAgIBezANBgkqhkiG9w0BAQUFADCByTELMAkGA1UEBhMCSFUx +ETAPBgNVBAcTCEJ1ZGFwZXN0MScwJQYDVQQKEx5OZXRMb2NrIEhhbG96YXRiaXp0 +b25zYWdpIEtmdC4xGjAYBgNVBAsTEVRhbnVzaXR2YW55a2lhZG9rMUIwQAYDVQQD +EzlOZXRMb2NrIE1pbm9zaXRldHQgS296amVneXpvaSAoQ2xhc3MgUUEpIFRhbnVz +aXR2YW55a2lhZG8xHjAcBgkqhkiG9w0BCQEWD2luZm9AbmV0bG9jay5odTAeFw0w +MzAzMzAwMTQ3MTFaFw0yMjEyMTUwMTQ3MTFaMIHJMQswCQYDVQQGEwJIVTERMA8G +A1UEBxMIQnVkYXBlc3QxJzAlBgNVBAoTHk5ldExvY2sgSGFsb3phdGJpenRvbnNh +Z2kgS2Z0LjEaMBgGA1UECxMRVGFudXNpdHZhbnlraWFkb2sxQjBABgNVBAMTOU5l +dExvY2sgTWlub3NpdGV0dCBLb3pqZWd5em9pIChDbGFzcyBRQSkgVGFudXNpdHZh +bnlraWFkbzEeMBwGCSqGSIb3DQEJARYPaW5mb0BuZXRsb2NrLmh1MIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAx1Ilstg91IRVCacbvWy5FPSKAtt2/Goq +eKvld/Bu4IwjZ9ulZJm53QE+b+8tmjwi8F3JV6BVQX/yQ15YglMxZc4e8ia6AFQe +r7C8HORSjKAyr7c3sVNnaHRnUPYtLmTeriZ539+Zhqurf4XsoPuAzPS4DB6TRWO5 +3Lhbm+1bOdRfYrCnjnxmOCyqsQhjF2d9zL2z8cM/z1A57dEZgxXbhxInlrfa6uWd +vLrqOU+L73Sa58XQ0uqGURzk/mQIKAR5BevKxXEOC++r6uwSEaEYBTJp0QwsGj0l +mT+1fMptsK6ZmfoIYOcZwvK9UdPM0wKswREMgM6r3JSda6M5UzrWhQIDAMV9o4IC +wDCCArwwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMCAQYwggJ1Bglg +hkgBhvhCAQ0EggJmFoICYkZJR1lFTEVNISBFemVuIHRhbnVzaXR2YW55IGEgTmV0 +TG9jayBLZnQuIE1pbm9zaXRldHQgU3pvbGdhbHRhdGFzaSBTemFiYWx5emF0YWJh +biBsZWlydCBlbGphcmFzb2sgYWxhcGphbiBrZXN6dWx0LiBBIG1pbm9zaXRldHQg +ZWxla3Ryb25pa3VzIGFsYWlyYXMgam9naGF0YXMgZXJ2ZW55ZXN1bGVzZW5laywg +dmFsYW1pbnQgZWxmb2dhZGFzYW5hayBmZWx0ZXRlbGUgYSBNaW5vc2l0ZXR0IFN6 +b2xnYWx0YXRhc2kgU3phYmFseXphdGJhbiwgYXogQWx0YWxhbm9zIFN6ZXJ6b2Rl +c2kgRmVsdGV0ZWxla2JlbiBlbG9pcnQgZWxsZW5vcnplc2kgZWxqYXJhcyBtZWd0 +ZXRlbGUuIEEgZG9rdW1lbnR1bW9rIG1lZ3RhbGFsaGF0b2sgYSBodHRwczovL3d3 +dy5uZXRsb2NrLmh1L2RvY3MvIGNpbWVuIHZhZ3kga2VyaGV0b2sgYXogaW5mb0Bu +ZXRsb2NrLm5ldCBlLW1haWwgY2ltZW4uIFdBUk5JTkchIFRoZSBpc3N1YW5jZSBh +bmQgdGhlIHVzZSBvZiB0aGlzIGNlcnRpZmljYXRlIGFyZSBzdWJqZWN0IHRvIHRo +ZSBOZXRMb2NrIFF1YWxpZmllZCBDUFMgYXZhaWxhYmxlIGF0IGh0dHBzOi8vd3d3 +Lm5ldGxvY2suaHUvZG9jcy8gb3IgYnkgZS1tYWlsIGF0IGluZm9AbmV0bG9jay5u +ZXQwHQYDVR0OBBYEFAlqYhaSsFq7VQ7LdTI6MuWyIckoMA0GCSqGSIb3DQEBBQUA +A4IBAQCRalCc23iBmz+LQuM7/KbD7kPgz/PigDVJRXYC4uMvBcXxKufAQTPGtpvQ +MznNwNuhrWw3AkxYQTvyl5LGSKjN5Yo5iWH5Upfpvfb5lHTocQ68d4bDBsxafEp+ +NFAwLvt/MpqNPfMgW/hqyobzMUwsWYACff44yTB1HLdV47yfuqhthCgFdbOLDcCR +VCHnpgu0mfVRQdzNo0ci2ccBgcTcR08m6h/t280NmPSjnLRzMkqWmf68f8glWPhY +83ZmiVSkpj7EUFy6iRiCdUgh0k8T6GB+B3bbELVR5qq5aKrN9p2QdRLqOBrKROi3 +macqaJVmlaut74nLYKkGEsaUR+ko +-----END CERTIFICATE----- + +# NetLock Platina (Class Platinum) Főtanúsítvány +-----BEGIN CERTIFICATE----- +MIIGITCCBAmgAwIBAgIGSUEt7AAQMA0GCSqGSIb3DQEBCwUAMIGtMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE7MDkGA1UEAwwyTmV0TG9jayBQbGF0aW5hIChDbGFzcyBQbGF0aW51 +bSkgRsWRdGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUxMjQ0WhcNMjgxMjA2MTUx +MjQ0WjCBrTELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQK +DAxOZXRMb2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAo +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcykxOzA5BgNVBAMMMk5ldExvY2sgUGxhdGlu +YSAoQ2xhc3MgUGxhdGludW0pIEbFkXRhbsO6c8OtdHbDoW55MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAzfLuxBp663QpTLa95NYKF2xl4mY9xNG8DLZa +1itwXy3MIdFZEOSxE732zCKV1mxGTpEys+v1rMsEAU923VM+eJ/5Xry1ghNGyhDj +HS1pK5QyEHMhq6k4xeNuE2TVY6ntCWbsim+JjRGG0PW/MpYLdXD1KFhCXqxptPX8 +kTkuopFA0TxUQYcjZFBIeWhLaJNLcuuAabNKHJC+skGjpc0XwNEaaX8CGEq1Yocm +Vy1sqCwhOfWXXpuapvjnTHnEeztW3Hr4tFjOdgquIlXrj8eEZHu9a8qVT9i+MRO/ +jaEKK9V5t/V2rdpRXIFHYqiq/89T4DRxzw0lU6meY0evhZH4zxkR5U75z+3jNQUB +IgPPmnzqHVFay/1zPTkLMevEO8qFKhEUAKAbgaIJiEjzfKJkoexntFiH8BTqqb6l +IkFN7L2kDug9h/cvqs41hk8wV5KNNq541v0Y/NclHs96/Bn9oD9yFzYIQT+XNpUM +iZVxRfqE1tQgYLNFCvK3lT0L5aTDuBLykWzpbWCD9kURBbrmR4PZkeJu4btGa0gb +vMb7z37eLLuQhO62JznnjaIxD9+BtyxsAOKx2CoXXBseR4lLF1EUQEBPxDkYMsKA +YDblekdn9qgFVMFdlqAftohSDAK+jVV+FEvDogHunIpBXflflpEJjrTktcUE39Y2 +rVm0stcCAwDzkaNFMEMwEgYDVR0TAQH/BAgwBgEB/wIBBDAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFOahE4P+l0vy2P8xoad0M4nOXn+kMA0GCSqGSIb3DQEBCwUA +A4ICAQBphELA414TYZcgSfH0FoWln6QRCCXEY4aP8Euvsyn1B1caYscbRW6vXRa3 +wdBkgzuX9UO2RZDxZiqDJCr/iOl6C/nCW3qvY/cJeIZIWTRem2oQTvFulYk2SmjQ +b5vgfk+3NQ/jebEFryd8qokKQ976DO/ZVy8occ1pa1JCyYowRVmhzPpZSo/31t1E +pbMuWxEY4rK15xFTOP6CTNNzvmWSGjqo0tKqvNS+bTZS/2vU0rUbN/MXQvEup9WQ +bHSddPX6XyIb09x1qLX/8hrRvCsAXDzFuIYIVEminCP776aNcPRCUk0bIACB+KC4 +9HQjnL70uQ7sHmrYZUoVdfF3W27YseYPtJa4HfqGyJJui+l936IO1fHxfK5K42a/ +Xfxb70iynmnHfZCgVbaUcIG5Cr2JdVPshKkDpd9RmQjQdAwC1nNyBnuLu12qTvxn +Z9iOEAMZLTc61HepOhydwHl7bCl3Mk1KizCIwuc2zmijmpiG+YkVnr+qUX3xUEZU +DwIuXJ/j3lczFf4YkmGo0ikFXWVEHpvj7/vcBd8Vq6bYC6Rzskw64J7Us2rlOg4K +8E7PeIEfvqmYb7FHUX1CMzazpqkCUgV0fips1KqSVrA+OyNYsY01pxOPZx5xFaaz +tQOGuCBmwEhvuazUSgNVsjffBN0iDFOGKkoqocE4PjzlPN91lw== +-----END CERTIFICATE----- + +# Network Solutions Certificate Authority +-----BEGIN CERTIFICATE----- +MIIDkDCCAnigAwIBAgIQHKAtwVI7am2LXB+VSu2sMDANBgkqhkiG9w0BAQUFADBi +MQswCQYDVQQGEwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMu +MTAwLgYDVQQDEydOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3Jp +dHkwHhcNMTEwMTAxMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjBiMQswCQYDVQQGEwJV +UzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMuMTAwLgYDVQQDEydO +ZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkvH6SMG3G2I4rC7xGzuAnlt7e+foS0zwz +c7MEL7xxjOWftiJgPl9dzgn/ggwbmlFQGiaJ3dVhXRncEg8tCqJDXRfQNJIg6nPP +OCwGJgl6cvf6UDL4wpPTaaIjzkGxzOTVHzbRijr4jGPiFFlp7Q3Tf2vouAPlT2rl +mGNpSAW+Lv8ztumXWWn4Zxmuk2GWRBXTcrA/vGp97Eh/jcOrqnErU2lBUzS1sLnF +BgrEsEX1QV1uiUV7PTsmjHTC5dLRfbIR1PtYMiKagMnc/Qzpf14Dl847ABSHJ3A4 +qY5usyd2mFHgBeMhqxrVhSI8KbWaFsWAqPS7azCPL0YCorEMIuDTAgMBAAGjQjBA +MB0GA1UdDgQWBBQhMMn7ANdOmNqHqirQpy6xQDGnTDAOBgNVHQ8BAf8EBAMCAQYw +DwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwomEoOiMZv3/EwUb +wzqOmEmK+KoAXCb9cmqjfhIblK5U+CGPp5NP9xbvubmzMsAlITFmNywJsP4ysDfs +PLjOjwiqCJAHXHXV4U4sywIk6aJe6fV4NSIGHPIfiLHhXMyWVPpvScyN8VYD7c8s +nyfe5cqDRL5GQPlXLtJ/MS3Og9z+cGuE0KOf/5fQqNcC7LEs8O9zOD2ZrMRPAb/V +aurGLjIpFwrL5mme0Uq19t+OGfiV6UWpDs1tQVkgnnPGbHEcnNRNMKhzCaAV86BF +JsNb/bu52C3XH/UFMBn2rg+OYo/fyE+G2R1hFrPJ8Lv7x/WvASJH7NjazxzzU2a6 +UwkB+Q== +-----END CERTIFICATE----- + +# Network Solutions ECC Certificate Authority +-----BEGIN CERTIFICATE----- +MIIClDCCAhmgAwIBAgIQeThLtBkajXQizP+FMvLkujAKBggqhkjOPQQDAzCBijEL +MAkGA1UEBhMCVVMxCzAJBgNVBAgTAkZMMRUwEwYDVQQHEwxKYWNrc29udmlsbGUx +ITAfBgNVBAoTGE5ldHdvcmsgU29sdXRpb25zIEwuTC5DLjE0MDIGA1UEAxMrTmV0 +d29yayBTb2x1dGlvbnMgRUNDIENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0xNTEx +MTgwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGKMQswCQYDVQQGEwJVUzELMAkGA1UE +CBMCRkwxFTATBgNVBAcTDEphY2tzb252aWxsZTEhMB8GA1UEChMYTmV0d29yayBT +b2x1dGlvbnMgTC5MLkMuMTQwMgYDVQQDEytOZXR3b3JrIFNvbHV0aW9ucyBFQ0Mg +Q2VydGlmaWNhdGUgQXV0aG9yaXR5MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEFOED +C2VvrVnWHu7Jv7RMxcZcLzDHn1LbaGHAaRDiknoaw7+SqIk5ivvnoLtxpKDD33fW +lDcTX35TXVC640wIx2XiQbDmWfKc+MCyd8EKkSZ38mm2u9BBPCqIGpSRFsY+o0Iw +QDAdBgNVHQ4EFgQUm3vryP+D8lKYRzAKVvg4vuPrAM4wDgYDVR0PAQH/BAQDAgGG +MA8GA1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0EAwMDaQAwZgIxAKlkWPecuRNmIkl/ +stEC6RP8HPukNJLkygcNt7FSeCg0y/IhVpGGhsiKC68yhFRliQIxAOx5DZ2J8AwY +6ntXUq0L5tR5W8ub4gZFdRi90Pyn3cfhxyK240EkXSPmqJ8AalAyJQ== +-----END CERTIFICATE----- + +# Network Solutions RSA Certificate Authority +-----BEGIN CERTIFICATE----- +MIIF4jCCA8qgAwIBAgIQTANLrGcYTH+vRAhNgpbHsjANBgkqhkiG9w0BAQwFADCB +ijELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkZMMRUwEwYDVQQHEwxKYWNrc29udmls +bGUxITAfBgNVBAoTGE5ldHdvcmsgU29sdXRpb25zIEwuTC5DLjE0MDIGA1UEAxMr +TmV0d29yayBTb2x1dGlvbnMgUlNBIENlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0x +NTExMTgwMDAwMDBaFw0zODAxMTgyMzU5NTlaMIGKMQswCQYDVQQGEwJVUzELMAkG +A1UECBMCRkwxFTATBgNVBAcTDEphY2tzb252aWxsZTEhMB8GA1UEChMYTmV0d29y +ayBTb2x1dGlvbnMgTC5MLkMuMTQwMgYDVQQDEytOZXR3b3JrIFNvbHV0aW9ucyBS +U0EgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAhN+opqOMC3geyE0Zld0pkJIgNZAqlI2CMy1wElilCIqewQjzk9Zo +wC8Uvnmk/H3M1bw+j+2cSgJhWT2qw290ANL4GjTUVJ5qdEeaL+DS9w/3w90/pb/B ++n1CaWAAgOw85ruBN6QeBhQ9V4+QpDVKNHOHthrDXZDvBk1wdjY8gontz2QZgyVD +Thzi8WpShv5R5H443xWNTGxgQUpPsEBVRjl1yYE5AHOKYuoPZbePT5dAzs/uwWoo +oHGpmSfRPck1c3qAmfh9hrmdeTrt0yr6fqa4/1cqc7Kmv9qJugYb2mWg5r5glIj2 +32bhJ2ob/tBeqY0giwrEH36IQS+ywdDztmjtyDvx76oH3n7XIuCB9qXqexb0QlSd +ln72YhZTzf0Kq7JCoU4qiEJ1g72M5U165x3jTLje46tgOC1nKf7kX67CqOi/rmz5 +67NS8X/p7MIv2Z3KF55C+jtYwT6IYk9fk8GXbWaPHCLzmsH07blrGn42hMgxuPBe +K36V5HnPdUzC2AS/OI4os91btthPI26S6DeVroOu1vw5KkYGH/GEdSHWuE6mKpdY +ZfWaGAHX9cN/KckQ7nNKQ3Z70aYwUf/WKx0eYoS++b5pl5nHDed8JFB1F/2kIOc1 +aANglKfZDcYaLOXiTtXMDsB6MFbvYJK+2S71x/DoRc/ahq7v2HepEicCAwEAAaNC +MEAwHQYDVR0OBBYEFA/xSkp1dAURDB3YW5nrv/6qfV7XMA4GA1UdDwEB/wQEAwIB +hjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQA9y9JGePX2Ohfo +w3tk0cW7kHiN9U+5xC2X+wvmxbjxturoWEs0rXd5LDUfcn0CPu610BaKBjeWte9D +0AkQLJdmx4EfHuYnxYKRWF7zyFtBaICDkbmcgfgn+kXf7nnyXG1wAlTuwFPYQ+sF +esz0Ud2p1CJ9ajvy/ojUUkk6hZJkU/hqU2CIj/Jb1K4rUuDq/1R+oeTvhhungwsG +Zl4wgIxVoEcz/2seREhLYaoePuhMZMfYbX0Orjw8Qj3KJBpw8WEUnDoY1fAGKZEi +sjo6oRZUYxr5M5VEnySjIWQECOKb1d4IUhxiHFMWRzVCJsenDP3zWxN3Aoxc4hbw +GB/ZffXfAiSIevNe/xcOs2JnoauxF449Okaw9UaMq4TY9Q6hIOvC8Jl0PY6zA9gk +xWzrawxTv2Bp3YwoxW/Pu9KBdyvGfLHESmwVEDcpXa74sREFxBSN7BOjRP1Ni2i4 +wf+d1TcuSPgofNz5c1PZtgF1Qnq/C99RULhTsuHudJDLvKrQcYOiq07JELY9HO9A +109DkDO5AZZUXSrVBluShrgGEIEGyJHbKSCyU73zS1tM22kfiW5UP9eJXee1zQy+ +P314OAHStmemz1hIlBpF/ZBzScq1Q6AhYo1JBCaq+B8uP/IuofKr9AYesC3EwXBC +Pf3DUUmIAA7Kgg2beQLiwC6T3+Ty8Q== +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GA CA +-----BEGIN CERTIFICATE----- +MIID8TCCAtmgAwIBAgIQQT1yx/RrH4FDffHSKFTfmjANBgkqhkiG9w0BAQUFADCB +ijELMAkGA1UEBhMCQ0gxEDAOBgNVBAoTB1dJU2VLZXkxGzAZBgNVBAsTEkNvcHly +aWdodCAoYykgMjAwNTEiMCAGA1UECxMZT0lTVEUgRm91bmRhdGlvbiBFbmRvcnNl +ZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwgUm9vdCBHQSBDQTAeFw0w +NTEyMTExNjAzNDRaFw0zNzEyMTExNjA5NTFaMIGKMQswCQYDVQQGEwJDSDEQMA4G +A1UEChMHV0lTZUtleTEbMBkGA1UECxMSQ29weXJpZ2h0IChjKSAyMDA1MSIwIAYD +VQQLExlPSVNURSBGb3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBX +SVNlS2V5IEdsb2JhbCBSb290IEdBIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAy0+zAJs9Nt350UlqaxBJH+zYK7LG+DKBKUOVTJoZIyEVRd7jyBxR +VVuuk+g3/ytr6dTqvirdqFEr12bDYVxgAsj1znJ7O7jyTmUIms2kahnBAbtzptf2 +w93NvKSLtZlhuAGio9RN1AU9ka34tAhxZK9w8RxrfvbDd50kc3vkDIzh2TbhmYsF +mQvtRTEJysIA2/dyoJaqlYfQjse2YXMNdmaM3Bu0Y6Kff5MTMPGhJ9vZ/yxViJGg +4E8HsChWjBgbl0SOid3gF27nKu+POQoxhILYQBRJLnpB5Kf+42TMwVlxSywhp1t9 +4B3RLoGbw9ho972WG6xwsRYUC9tguSYBBQIDAQABo1EwTzALBgNVHQ8EBAMCAYYw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUswN+rja8sHnR3JQmthG+IbJphpQw +EAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBAEuh/wuHbrP5wUOx +SPMowB0uyQlB+pQAHKSkq0lPjz0e701vvbyk9vImMMkQyh2I+3QZH4VFvbBsUfk2 +ftv1TDI6QU9bR8/oCy22xBmddMVHxjtqD6wU2zz0c5ypBd8A3HR4+vg1YFkCExh8 +vPtNsCBtQ7tgMHpnM1zFmdH4LTlSc/uMqpclXHLZCB6rTjzjgTGfA6b7wP4piFXa +hNVQA7bihKOmNqoROgHhGEvWRGizPflTdISzRpFGlgC3gCy24eMQ4tui5yiPAZZi +Fj4A4xylNoEYokxSdsARo27mHbrjWr42U8U+dY+GaSlYU7Wcu2+fXMUY7N0v4ZjJ +/L7fCg0= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GB CA +-----BEGIN CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GC CA +-----BEGIN CERTIFICATE----- +MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw +CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 +bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg +Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ +BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu +ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS +b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni +eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W +p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T +rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV +57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg +Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9 +-----END CERTIFICATE----- + +# OpenTrust Root CA G2 +-----BEGIN CERTIFICATE----- +MIIFbzCCA1egAwIBAgISESChaRu/vbm9UpaPI+hIvyYRMA0GCSqGSIb3DQEBDQUA +MEAxCzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9w +ZW5UcnVzdCBSb290IENBIEcyMB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAw +MFowQDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9wZW5UcnVzdDEdMBsGA1UEAwwU +T3BlblRydXN0IFJvb3QgQ0EgRzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQDMtlelM5QQgTJT32F+D3Y5z1zCU3UdSXqWON2ic2rxb95eolq5cSG+Ntmh +/LzubKh8NBpxGuga2F8ORAbtp+Dz0mEL4DKiltE48MLaARf85KxP6O6JHnSrT78e +CbY2albz4e6WiWYkBuTNQjpK3eCasMSCRbP+yatcfD7J6xcvDH1urqWPyKwlCm/6 +1UWY0jUJ9gNDlP7ZvyCVeYCYitmJNbtRG6Q3ffyZO6v/v6wNj0OxmXsWEH4db0fE +FY8ElggGQgT4hNYdvJGmQr5J1WqIP7wtUdGejeBSzFfdNTVY27SPJIjki9/ca1TS +gSuyzpJLHB9G+h3Ykst2Z7UJmQnlrBcUVXDGPKBWCgOz3GIZ38i1MH/1PCZ1Eb3X +G7OHngevZXHloM8apwkQHZOJZlvoPGIytbU6bumFAYueQ4xncyhZW+vj3CzMpSZy +YhK05pyDRPZRpOLAeiRXyg6lPzq1O4vldu5w5pLeFlwoW5cZJ5L+epJUzpM5ChaH +vGOz9bGTXOBut9Dq+WIyiET7vycotjCVXRIouZW+j1MY5aIYFuJWpLIsEPUdN6b4 +t/bQWVyJ98LVtZR00dX+G7bw5tYee9I8y6jj9RjzIR9u701oBnstXW5DiabA+aC/ +gh7PU3+06yzbXfZqfUAkBXKJOAGTy3HCOV0GEfZvePg3DTmEJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUajn6QiL3 +5okATV59M4PLuG53hq8wHwYDVR0jBBgwFoAUajn6QiL35okATV59M4PLuG53hq8w +DQYJKoZIhvcNAQENBQADggIBAJjLq0A85TMCl38th6aP1F5Kr7ge57tx+4BkJamz +Gj5oXScmp7oq4fBXgwpkTx4idBvpkF/wrM//T2h6OKQQbA2xx6R3gBi2oihEdqc0 +nXGEL8pZ0keImUEiyTCYYW49qKgFbdEfwFFEVn8nNQLdXpgKQuswv42hm1GqO+qT +RmTFAHneIWv2V6CG1wZy7HBGS4tz3aAhdT7cHcCP009zHIXZ/n9iyJVvttN7jLpT +wm+bREx50B1ws9efAvSyB7DH5fitIw6mVskpEndI2S9G/Tvw/HRwkqWOOAgfZDC2 +t0v7NqwQjqBSM2OdAzVWxWm9xiNaJ5T2pBL4LTM8oValX9YZ6e18CL13zSdkzJTa +TkZQh+D5wVOAHrut+0dSixv9ovneDiK3PTNZbNTe9ZUGMg1RGUFcPk8G97krgCf2 +o6p6fAbhQ8MTOWIaNr3gKC6UAuQpLmBVrkA9sHSSXvAgZJY/X0VdiLWK2gKgW0VU +3jg9CcCoSmVGFvyqv1ROTVu+OEO3KMqLM6oaJbolXCkvW0pujOotnCr2BXbgd5eA +iN1nE28daCSLT7d0geX0YJ96Vdc+N9oWaz53rK4YcJUIeSkDiv7BO7M/Gg+kO14f +WKGVyasvc0rQLW6aWQ9VGHgtPFGml4vmu7JwqkwR3v98KzfUetF3NI/n+UL3PIEM +S1IK +-----END CERTIFICATE----- + +# OpenTrust Root CA G3 +-----BEGIN CERTIFICATE----- +MIICITCCAaagAwIBAgISESDm+Ez8JLC+BUCs2oMbNGA/MAoGCCqGSM49BAMDMEAx +CzAJBgNVBAYTAkZSMRIwEAYDVQQKDAlPcGVuVHJ1c3QxHTAbBgNVBAMMFE9wZW5U +cnVzdCBSb290IENBIEczMB4XDTE0MDUyNjAwMDAwMFoXDTM4MDExNTAwMDAwMFow +QDELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCU9wZW5UcnVzdDEdMBsGA1UEAwwUT3Bl +blRydXN0IFJvb3QgQ0EgRzMwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARK7liuTcpm +3gY6oxH84Bjwbhy6LTAMidnW7ptzg6kjFYwvWYpa3RTqnVkrQ7cG7DK2uu5Bta1d +oYXM6h0UZqNnfkbilPPntlahFVmhTzeXuSIevRHr9LIfXsMUmuXZl5mjYzBhMA4G +A1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRHd8MUi2I5 +DMlv4VBN0BBY3JWIbTAfBgNVHSMEGDAWgBRHd8MUi2I5DMlv4VBN0BBY3JWIbTAK +BggqhkjOPQQDAwNpADBmAjEAj6jcnboMBBf6Fek9LykBl7+BFjNAk2z8+e2AcG+q +j9uEwov1NcoG3GRvaBbhj5G5AjEA2Euly8LQCGzpGPta3U1fJAuwACEl74+nBCZx +4nxp5V2a+EEfOzmTk51V6s2N8fvB +-----END CERTIFICATE----- + +# PersonalID Trustworthy RootCA 2011 +-----BEGIN CERTIFICATE----- +MIIGMjCCBBqgAwIBAgIQWMv5ZJZxdJVA9K0IrGTk4zANBgkqhkiG9w0BAQsFADBz +MQswCQYDVQQGEwJJTDEYMBYGA1UECgwPUGVyc29uYWxJRCBMdGQuMR0wGwYDVQQL +DBRDZXJ0aWZpY2F0ZSBTZXJ2aWNlczErMCkGA1UEAwwiUGVyc29uYWxJRCBUcnVz +dHdvcnRoeSBSb290Q0EgMjAxMTAeFw0xMTA5MDEwODM1MjFaFw00MTA5MDEwODQ1 +MTZaMHMxCzAJBgNVBAYTAklMMRgwFgYDVQQKDA9QZXJzb25hbElEIEx0ZC4xHTAb +BgNVBAsMFENlcnRpZmljYXRlIFNlcnZpY2VzMSswKQYDVQQDDCJQZXJzb25hbElE +IFRydXN0d29ydGh5IFJvb3RDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAsJWMYP4FDmoz7feL4/LV8nzTVkJU9yvyiKX157dshwErab4FSUTY +2yF6KteKMaEhEJ7T4m5jgoVUhE0oJhviE/dR+y/rEtU9OYxkn6QTh8PYyfopI44J +j0lGxNTJV1hpnxfPc3Sl7soYucfBMM1POjUIU/jsGvtvMO32nwnw8NDEjjt5Ti6F +IlzUfXDR/5K6H9RVU2e6KFgt9xOM/KULnDimRhwO6Kp4K/UKMNM7YIbIf6WbomMB +L9DTEiWFfpbNMbHkm47qLJOkYqg31faP3yGa0z4d4VARcFSbBBedTathzo8qLO95 +5ndFWdZo1bZLmquRSw5hF7lYwp5moY+JwUMgQrB/gJxKKrd6IEHGTcSSb3p+XVu5 +o8lOyuVQZbwAAHlH8EUEsCL7DpiqYR1PYGNyj7WwBJR/EKwZPydiadYcV905Tzjq +AJr9KJ1AJsBAncSgSchBtWc9oEuUKRKpWCdZBH+P0Yx+DLMIFzSsj7lcvelwoX7C +pWVh6bYQUI/c5HRh8V9ye39cLy18q9ZDMRAcWXfKSEoYomQLAFlnx9TKw5saCFIV +vtfFxrcv5mKcpsfY3vAV+645VS1vUHUu/aAHtF96fgSL9pmide3JO9U9z2dSPT7v +H3CaGDynIAZJDLFlrDO71H9HaYj2ioHundS0xy8D6K4ayVYFZ2moyIECAwEAAaOB +wTCBvjALBgNVHQ8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBAjAdBgNVHQ4EFgQU +x38LyC9Xjiny9gGL6yelVo79pB4wEAYJKwYBBAGCNxUBBAMCAQAwagYDVR0gBGMw +YTBfBggrBgEEAeEYATBTMFEGCCsGAQUFBwIBFkVodHRwOi8vd3d3LmljYS5jby5p +bC9yZXBvc2l0b3J5L2Nwcy9QZXJzb25hbElEX1ByYWN0aWNlX1N0YXRlbWVudC5w +ZGYwDQYJKoZIhvcNAQELBQADggIBAEJliyT6khU0Ghz6yM5Nei9739ADQRzUpOH7 +6MytCd0dpAjZqCB9l58MSfGlwubVd0aXfqSQonnpvRpeNIJmCVL8UNGP0Kscov// +Pe7+I/i/I7PNvuH3z+TYEuOUyE7M13uwN5t36u1cgcjMj8454+RlXd6C2I8jaeFR +r1+3T5BppJllU7rm/a94Z5RKyMN/jAJPSuaHmPY4t0j4bSh/98ZsJVT9Ltbq2gbi +sf0HaPCvgIy0wul0FaQav7nKQ1sS54VHXlID8JHg6VBx1CECLHuGkXA2xpy2dPkq +Vfch+2+gBl3XMBLyUfHJODaPyGZhQdnHS4JoUqP1iQwVvE4qlawxaacb4tTXSPSR +9QN8eRY+LA1p4Yo3Hp98GFVBL1/npHKbVfPjAbACpYQSakCmq+ShrOsD2bxfJFYn +rSDgZjVFPUcJ8AWxb3F+QLDQFV4rrFKBqPuD9SxXRIY05BRq4899mnfYbEhcy5rh +pvu/EaIG5R9xvTS1z73EQhbFKfjUwEyKst7FlIKGm8zgqQZEMSQkTfrt4UIlZqLB +14AX73qVZUM+ZtMF8QHkQlZEAHhrnTYg+2X/QFzoaDUf4SagggN2A8twRhEkrt8v +YP3xJwADvUsn27yclzdRK+V4tME2kBCM/z0A1LpIn0jKhzGa7cSaU9LdcxQ/CYKh +XWVOTSbi +-----END CERTIFICATE----- + +# QuoVadis Root CA 1 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD +-----END CERTIFICATE----- + +# QuoVadis Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u +-----END CERTIFICATE----- + +# QuoVadis Root CA 2 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 +MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf +qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW +n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym +c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ +O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 +o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j +IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq +IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz +8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh +vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l +7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG +cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD +ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 +AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC +roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga +W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n +lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE ++V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV +csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd +dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg +KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM +HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 +WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEto= +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 +-----END CERTIFICATE----- + +# QuoVadis Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIF0DCCBLigAwIBAgIEOrZQizANBgkqhkiG9w0BAQUFADB/MQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDElMCMGA1UECxMcUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eTEuMCwGA1UEAxMlUXVvVmFkaXMgUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wMTAzMTkxODMzMzNaFw0yMTAzMTcxODMz +MzNaMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMSUw +IwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYDVQQDEyVR +dW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2G1lVO6V/z68mcLOhrfEYBklbTRvM16z/Yp +li4kVEAkOPcahdxYTMukJ0KX0J+DisPkBgNbAKVRHnAEdOLB1Dqr1607BxgFjv2D +rOpm2RgbaIr1VxqYuvXtdj182d6UajtLF8HVj71lODqV0D1VNk7feVcxKh7YWWVJ +WCCYfqtffp/p1k3sg3Spx2zY7ilKhSoGFPlU5tPaZQeLYzcS19Dsw3sgQUSj7cug +F+FxZc4dZjH3dgEZyH0DWLaVSR2mEiboxgx24ONmy+pdpibu5cxfvWenAScOospU +xbF6lR1xHkopigPcakXBpBlebzbNw6Kwt/5cOOJSvPhEQ+aQuwIDAQABo4ICUjCC +Ak4wPQYIKwYBBQUHAQEEMTAvMC0GCCsGAQUFBzABhiFodHRwczovL29jc3AucXVv +dmFkaXNvZmZzaG9yZS5jb20wDwYDVR0TAQH/BAUwAwEB/zCCARoGA1UdIASCAREw +ggENMIIBCQYJKwYBBAG+WAABMIH7MIHUBggrBgEFBQcCAjCBxxqBxFJlbGlhbmNl +IG9uIHRoZSBRdW9WYWRpcyBSb290IENlcnRpZmljYXRlIGJ5IGFueSBwYXJ0eSBh +c3N1bWVzIGFjY2VwdGFuY2Ugb2YgdGhlIHRoZW4gYXBwbGljYWJsZSBzdGFuZGFy +ZCB0ZXJtcyBhbmQgY29uZGl0aW9ucyBvZiB1c2UsIGNlcnRpZmljYXRpb24gcHJh +Y3RpY2VzLCBhbmQgdGhlIFF1b1ZhZGlzIENlcnRpZmljYXRlIFBvbGljeS4wIgYI +KwYBBQUHAgEWFmh0dHA6Ly93d3cucXVvdmFkaXMuYm0wHQYDVR0OBBYEFItLbe3T +KbkGGew5Oanwl4Rqy+/fMIGuBgNVHSMEgaYwgaOAFItLbe3TKbkGGew5Oanwl4Rq +y+/foYGEpIGBMH8xCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1p +dGVkMSUwIwYDVQQLExxSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MS4wLAYD +VQQDEyVRdW9WYWRpcyBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggQ6tlCL +MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQUFAAOCAQEAitQUtf70mpKnGdSk +fnIYj9lofFIk3WdvOXrEql494liwTXCYhGHoG+NpGA7O+0dQoE7/8CQfvbLO9Sf8 +7C9TqnN7Az10buYWnuulLsS/VidQK2K6vkscPFVcQR0kvoIgR13VRH56FmjffU1R +cHhXHTMe/QKZnAzNCgVPx7uOpHX6Sm2xgI4JVrmcGmD+XcHXetwReNDWXcG31a0y +mQM6isxUJTkxgXsTIlG6Rmyhu576BGxJJnSP0nPrzDCi5upZIof4l/UO/erMkqQW +xFIY6iHOsfHmhIHluqmGKPJDWl0Snawe2ajlCmqnf6CHKc/yiU3U7MXi5nrQNiOK +SnQ2+Q== +-----END CERTIFICATE----- + +# Root CA Generalitat Valenciana +-----BEGIN CERTIFICATE----- +MIIGizCCBXOgAwIBAgIEO0XlaDANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJF +UzEfMB0GA1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0GA1UECxMGUEtJ +R1ZBMScwJQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVuY2lhbmEwHhcN +MDEwNzA2MTYyMjQ3WhcNMjEwNzAxMTUyMjQ3WjBoMQswCQYDVQQGEwJFUzEfMB0G +A1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0GA1UECxMGUEtJR1ZBMScw +JQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVuY2lhbmEwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGKqtXETcvIorKA3Qdyu0togu8M1JAJke+ +WmmmO3I2F0zo37i7L3bhQEZ0ZQKQUgi0/6iMweDHiVYQOTPvaLRfX9ptI6GJXiKj +SgbwJ/BXufjpTjJ3Cj9BZPPrZe52/lSqfR0grvPXdMIKX/UIKFIIzFVd0g/bmoGl +u6GzwZTNVOAydTGRGmKy3nXiz0+J2ZGQD0EbtFpKd71ng+CT516nDOeB0/RSrFOy +A8dEJvt55cs0YFAQexvba9dHq198aMpunUEDEO5rmXteJajCq+TA81yc477OMUxk +Hl6AovWDfgzWyoxVjr7gvkkHD6MkQXpYHYTqWBLI4bft75PelAgxAgMBAAGjggM7 +MIIDNzAyBggrBgEFBQcBAQQmMCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLnBr +aS5ndmEuZXMwEgYDVR0TAQH/BAgwBgEB/wIBAjCCAjQGA1UdIASCAiswggInMIIC +IwYKKwYBBAG/VQIBADCCAhMwggHoBggrBgEFBQcCAjCCAdoeggHWAEEAdQB0AG8A +cgBpAGQAYQBkACAAZABlACAAQwBlAHIAdABpAGYAaQBjAGEAYwBpAPMAbgAgAFIA +YQDtAHoAIABkAGUAIABsAGEAIABHAGUAbgBlAHIAYQBsAGkAdABhAHQAIABWAGEA +bABlAG4AYwBpAGEAbgBhAC4ADQAKAEwAYQAgAEQAZQBjAGwAYQByAGEAYwBpAPMA +bgAgAGQAZQAgAFAAcgDhAGMAdABpAGMAYQBzACAAZABlACAAQwBlAHIAdABpAGYA +aQBjAGEAYwBpAPMAbgAgAHEAdQBlACAAcgBpAGcAZQAgAGUAbAAgAGYAdQBuAGMA +aQBvAG4AYQBtAGkAZQBuAHQAbwAgAGQAZQAgAGwAYQAgAHAAcgBlAHMAZQBuAHQA +ZQAgAEEAdQB0AG8AcgBpAGQAYQBkACAAZABlACAAQwBlAHIAdABpAGYAaQBjAGEA +YwBpAPMAbgAgAHMAZQAgAGUAbgBjAHUAZQBuAHQAcgBhACAAZQBuACAAbABhACAA +ZABpAHIAZQBjAGMAaQDzAG4AIAB3AGUAYgAgAGgAdAB0AHAAOgAvAC8AdwB3AHcA +LgBwAGsAaQAuAGcAdgBhAC4AZQBzAC8AYwBwAHMwJQYIKwYBBQUHAgEWGWh0dHA6 +Ly93d3cucGtpLmd2YS5lcy9jcHMwHQYDVR0OBBYEFHs100DSHHgZZu90ECjcPk+y +eAT8MIGVBgNVHSMEgY0wgYqAFHs100DSHHgZZu90ECjcPk+yeAT8oWykajBoMQsw +CQYDVQQGEwJFUzEfMB0GA1UEChMWR2VuZXJhbGl0YXQgVmFsZW5jaWFuYTEPMA0G +A1UECxMGUEtJR1ZBMScwJQYDVQQDEx5Sb290IENBIEdlbmVyYWxpdGF0IFZhbGVu +Y2lhbmGCBDtF5WgwDQYJKoZIhvcNAQEFBQADggEBACRhTvW1yEICKrNcda3Fbcrn +lD+laJWIwVTAEGmiEi8YPyVQqHxK6sYJ2fR1xkDar1CdPaUWu20xxsdzCkj+IHLt +b8zog2EWRpABlUt9jppSCS/2bxzkoXHPjCpaF3ODR00PNvsETUlR4hTJZGH71BTg +9J63NI8KJr2XXPR5OkowGcytT6CYirQxlyric21+eLj4iIlPsSKRZEv1UN4D2+XF +ducTZnV+ZfsBn5OHiJ35Rld8TWCvmHMTI6QgkYH60GFmuH3Rr9ZvHmw96RH9qfmC +IoaZM3Fa6hlXPZHNqcCjbgcTpsnt+GijnsNacgmHKNHEc8RzGF9QdRYxn7fofMM= +-----END CERTIFICATE----- + +# S-TRUST Authentication and Encryption Root CA 2005:PN +-----BEGIN CERTIFICATE----- +MIIEezCCA2OgAwIBAgIQNxkY5lNUfBq1uMtZWts1tzANBgkqhkiG9w0BAQUFADCB +rjELMAkGA1UEBhMCREUxIDAeBgNVBAgTF0JhZGVuLVd1ZXJ0dGVtYmVyZyAoQlcp +MRIwEAYDVQQHEwlTdHV0dGdhcnQxKTAnBgNVBAoTIERldXRzY2hlciBTcGFya2Fz +c2VuIFZlcmxhZyBHbWJIMT4wPAYDVQQDEzVTLVRSVVNUIEF1dGhlbnRpY2F0aW9u +IGFuZCBFbmNyeXB0aW9uIFJvb3QgQ0EgMjAwNTpQTjAeFw0wNTA2MjIwMDAwMDBa +Fw0zMDA2MjEyMzU5NTlaMIGuMQswCQYDVQQGEwJERTEgMB4GA1UECBMXQmFkZW4t +V3VlcnR0ZW1iZXJnIChCVykxEjAQBgNVBAcTCVN0dXR0Z2FydDEpMCcGA1UEChMg +RGV1dHNjaGVyIFNwYXJrYXNzZW4gVmVybGFnIEdtYkgxPjA8BgNVBAMTNVMtVFJV +U1QgQXV0aGVudGljYXRpb24gYW5kIEVuY3J5cHRpb24gUm9vdCBDQSAyMDA1OlBO +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2bVKwdMz6tNGs9HiTNL1 +toPQb9UY6ZOvJ44TzbUlNlA0EmQpoVXhOmCTnijJ4/Ob4QSwI7+Vio5bG0F/WsPo +TUzVJBY+h0jUJ67m91MduwwA7z5hca2/OnpYH5Q9XIHV1W/fuJvS9eXLg3KSwlOy +ggLrra1fFi2SU3bxibYs9cEv4KdKb6AwajLrmnQDaHgTncovmwsdvs91DSaXm8f1 +XgqfeN+zvOyauu9VjxuapgdjKRdZYgkqeQd3peDRF2npW932kKvimAoA0SVtnteF +hy+S8dF2g08LOlk3KC8zpxdQ1iALCvQm+Z845y2kuJuJja2tyWp9iRe79n+Ag3rm +7QIDAQABo4GSMIGPMBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgEG +MCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFTVFJvbmxpbmUxLTIwNDgtNTAdBgNV +HQ4EFgQUD8oeXHngovMpttKFswtKtWXsa1IwHwYDVR0jBBgwFoAUD8oeXHngovMp +ttKFswtKtWXsa1IwDQYJKoZIhvcNAQEFBQADggEBAK8B8O0ZPCjoTVy7pWMciDMD +pwCHpB8gq9Yc4wYfl35UvbfRssnV2oDsF9eK9XvCAPbpEW+EoFolMeKJ+aQAPzFo +LtU96G7m1R08P7K9n3frndOMusDXtk3sU5wPBG7qNWdX4wple5A64U8+wwCSersF +iXOMy6ZNwPv2AtawB6MDwidAnwzkhYItr5pCHdDHjfhA7p0GVxzZotiAFP7hYy0y +h9WUUpY6RsZxlj33mA6ykaqP2vROJAA5VeitF7nTNCtKqUDMFypVZUF0Qn71wK/I +k63yGFs9iQzbRzkk+OBM8h+wPQrKBU6JIRrjKpms/H+h8Q8bHz2eBIPdltkdOpQ= +-----END CERTIFICATE----- + +# SAPO Class 2 Root CA +-----BEGIN CERTIFICATE----- +MIIEWDCCA0CgAwIBAgIBATANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyAyIFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgMiBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALd8aXxg9Wwm9KocF39d +1BFL5/Pa53On+qRCSWg/2qVAXAZoX07Mvb6BOCQtzCagRG0DyyPgu96FU0uUX197 +qsgal/7XI5PtsGq92PwAPrOSBOBLvk87mKed7c1j8IHnbJjUbGBVAOW5POY0lV3g +/XGH6f+B7uV3bxj/88l8pZXdgtwU2aLhvs0nc7tFWz90sWJ4ZhAiLPVo8xeIFjua +Gx37FK4NuvKQVaLVMNYrlTLHOW57ZdJ3OM5uVqXZI6s4sjtRhcAdG7cRLwVpR9gC +ypKo4TPehQib7ZDV2CGZcb+29XPvZwiYZNLyKnpLIRbhH1hh3pFHHyGfH/6MI4aD +GCcCAwEAAaM/MD0wDgYDVR0PAQH/BAQDAgEGMAwGA1UdEwQFMAMBAf8wHQYDVR0O +BBYEFKudI5P9HzNKMi2qJFryLWSpAZpBMA0GCSqGSIb3DQEBBQUAA4IBAQBWUlG5 +DwLh9i6csTFapvjOvO4ChBUJ8ShSX+fhLL3beQp6v+tintWGRynudDDsTHW1HuOq +M++t4WpMvzcBvlWDTKlS2DeYUG9o3UdBtywwyG5MByzG00m5tVzSy8zUNsYHDRhP +P2MAxOy2iPsBZGOt0fd3fGRUKxI9NBWF8KC6eSlfmJtC6q7BqJ8TiYpt6bg4yWHt +YOz3KlgFm6FgeIMX4X5f6P144GtWKoZ2rlvCXutF5DC4Me1ksV0uwD2ADccnE9N2 +4ob73NuACoHh/Qj5C8QxtGNb54wz5Qa2Umqz1+lr4zJ4MmaUTt2Nd23TJChbVGF3 +Amd1lEtXS+ZsxTlv +-----END CERTIFICATE----- + +# SAPO Class 3 Root CA +-----BEGIN CERTIFICATE----- +MIIGWDCCBECgAwIBAgIBAjANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyAzIFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgMyBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMp4Gge89vu0t4m80BlW +OCpZnQfqGvn4+GhnXo/vyvf1aonmo5V/qdspJBw10DiWbD5WJP9eYlGQLofonMfa +vDPxnqFvC44KJPT4TZCmss1eEdPCl0z1X0AdJiRNjQkQC/+7IBuTJhkMQz/pjrwx +NxBukcpIglZGx7y5Op5GgWbP2ehcEM85nmXDnsVa9EvMRJlmhvRyG6NTSequR80y +DXDmoKB2B53/WO/kPJHAteTcuAEM0/6zQqA7YQLUN1vXTEWV0nVd9W4wX1dRi7L/ +fsiLnKqjQTcMEJGopoVcucePBVGy0HjS4ktJ6dQapzusqjPmmioDQJhvdFITMZTR +EsG0yzD5/0S4kltS1jDZM9F14xmlFhW3VFfxVlDOTr4DOy/stjDuFGBeX3o19E5k +BxHqpQdmG26T4rBPXtbgROCz3K7vuP2os+zs5TmIRLShuxRgZI/WkpPL88xQ3ekH +yGdn+fCHhJGyAGLpv0oVdMW/BEwFRl0Ky+XqYQDhb0GxNI6mAKJ8pqWm+mxMQ+Wo +Jpo0mB6HmOdMeNGPnwVVXYpLyc+gC30GkJwYkrLEstfjRdlrc8OXOb8pHgYJVUC6 +vNpIdUPt/kR+PSzmYpED/T2J7370XSSPpQsrsz56KSi8uz+/63eFBCaLlLKQ9euN +T6JEIlConCpESAB4GaudCJYVAgMBAAGjPzA9MA4GA1UdDwEB/wQEAwIBBjAMBgNV +HRMEBTADAQH/MB0GA1UdDgQWBBRhs3lSnUqVklGOgiRw045AyMVm0DANBgkqhkiG +9w0BAQUFAAOCAgEAf8azJIRQN/nEsMUwPBbpUA16urQ70iPl6Yl4auXjGwUekRzO +BpeNZhYHRO+BuQh+o8c5NLi/mm2NsMEgQi4N9wsGA09uy7y3sC8ZcY2OrwpNWDGL +RJkqKGaFx4AmZrBHwjmy+k8+Vb3ciSdLczME/ntHkMkFwC0z+LcIgilBQ/0mU+b6 +HzdWjU8Xutj9OoRw2D7wM67EBUhUobnVIT/qPsepMUf3m65KYpjRZyBl3nnhsTIe +a9/7gGtHXDnHDgiqx6PuKek04pv5dbgm64idtDkRLnD9UQQyuw95hFAhRXwv5Nn/ +JTgGI6tOsQ7cOzEKrdpLAGlrLuLDDMkFAUVm4aWJYRxkmY0LmJCzfmY7C9ir6HUO +2X+abn3JgyfJvOg0OMJahzJyBwz+1ZTR8MB48oCoRvVrmuzi2RaOivqE9tFSyZyy +IVZgQ6YQ939Jv74H01BkbQK6KlUsz9nCbq98C0jQ8eGnwq10j4bk7ar6XIN9Quh9 +Bx0HVcwraTK5d4JoxnfyImmmyQpdh5nlcZ59LxMe0vT9CXknWCsKh4Eq+2ojLUsk +hXQWRxgPCcX+qUgk46zQaT1fU5gyvezgUcFTSrH2O/A0SPWa3tzR4OO9JbNE6Dpz +yXnQrNHt4gAKX6EdZllKc2jUBXIzOKdrr5HbDceMQOiekIjJ+/4k14Gs894= +-----END CERTIFICATE----- + +# SAPO Class 4 Root CA +-----BEGIN CERTIFICATE----- +MIIGWDCCBECgAwIBAgIBAzANBgkqhkiG9w0BAQUFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEWMBQGA1UEBxMNU29tZXJzZXQgV2VzdDEq +MCgGA1UEChMhU291dGggQWZyaWNhbiBQb3N0IE9mZmljZSBMaW1pdGVkMRowGAYD +VQQLExFTQVBPIFRydXN0IENlbnRyZTEdMBsGA1UEAxMUU0FQTyBDbGFzcyA0IFJv +b3QgQ0ExKTAnBgkqhkiG9w0BCQEWGnBraWFkbWluQHRydXN0Y2VudHJlLmNvLnph +MB4XDTEwMDkxNTAwMDAwMFoXDTMwMDkxNDAwMDAwMFowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxFjAUBgNVBAcTDVNvbWVyc2V0IFdlc3Qx +KjAoBgNVBAoTIVNvdXRoIEFmcmljYW4gUG9zdCBPZmZpY2UgTGltaXRlZDEaMBgG +A1UECxMRU0FQTyBUcnVzdCBDZW50cmUxHTAbBgNVBAMTFFNBUE8gQ2xhc3MgNCBS +b290IENBMSkwJwYJKoZIhvcNAQkBFhpwa2lhZG1pbkB0cnVzdGNlbnRyZS5jby56 +YTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvc7UiaoKOf4BGO2ciS +dTpVwVEiygt6pDUNxeZXLYPwKm8iODcxbXyFJKIGL0OCPUUwQCUc7lhHQebwngAe ++PQvEbuSsphFLdMfgMl2FBPDzEDmres5YPzPyN8q/YwSUe/PDGTGV+gjUV3nZlLq +Zr2Tf516KPEZcG6EnzBHt7A5axMs60tNLq8/v/0CE0o55z4zxRCRUb4PR51NUvws +8+MTogCC4RQMzdKes/Lggdq+mZJT432Zd0Ph4UgpgZ7WBVc6cdw+mK1YcG9Gu34y +A+KDm1lX9/izzVQW7LatoRwaktHUKZ6PzbPofVDxwoKsur20dVag9UVdGH0sjPF7 +QcyGsZqESwoqXZuW4c36qxYnQeeVNabLiqeW86XMUfktfR5D+9xttbk4vQX7WPou +0+xeZC2vWAFKfCJG00HLPeSWXklDOLuJ6/ScaTkSA1yEu+WMHurgZrvAv4z+ngpN +PWg/QHbWMqnqRbhqB1KOzVHxXShjDNNZOPzJ/YLJRSC85ujMogzLe2Q5SUZF9XMc +apcg6yFC97QgUrdK/XW8yw8MZxFXH/cw8auQzF08lgVi08pVAUtGxYCHHHLQc1Qh +6tejnNOuf9RT2Sj8V97lP1JKu8gmJEdTHHO6z8a0MM1eccdWvEk4JebFEAl42dQd +XM1u7duRXKFTFFaqjSeppo4bAgMBAAGjPzA9MA4GA1UdDwEB/wQEAwIBBjAMBgNV +HRMEBTADAQH/MB0GA1UdDgQWBBQWhC37G+e0HmiY00IgGm5+T5FXAjANBgkqhkiG +9w0BAQUFAAOCAgEAe+MNYzpkIG3M/Cy46dar29erJilHogxW7XXMlZlSNssg+xE0 +F0JOdQWw2OS4sIQvmBm5+9A5bHIGGMlcinp0CDdIaf0ioV3F13gT8ChCQcPJwzkJ +B9Sh+DciaeTfMlVvwny5k/GyN3XMrtIzlow29wHt42TpC2hbEKoBNpl8z5qUXf0a +WWGiZRV9nhdk1J9TmAH9cVfQXUARFj8/RNKvyfwIMn12+NVD6Nw2aAfDTsOWl1fG +fTZe23Ct/q7UiJ21pGDWo2K+fPk0Hvy79EpyxYMeRmjDDpeDGD3TDgoRNXxplcWr +KvXIORBNDIkwKYlJG0SXkfTqZSEbPwpDcoIcbRFd4CJFX2FMoqb636NGuuGBYGwy +tPzk3DYF5DP36493SaqNCu9IiuZBl347q0OH8ghgC2/XWWb9K7svzjNPcuC217NT +V4nwO7xu4hC/cz5ij6UI6VNnwU7BLkJDp7Kk+RaLQu7cNH9Is5DbJOLI5FM1U5zq +N4XPv5gGNUcm165t3YSpY1gmQfV1Mi5hnk+TUlL2WiPrwaBzJiUiQpGRkYBP/4jO +XnPnlsLtCRL3dpapeWKQSYGDnwwyMuJbyt1INKyHjnGVrkzkfHgdp1HDvRH6AtGV +iXMIRiKJaQDPT4DBTVuUxMqZUZgvDb19VGTUCtonWac3u1YM0AaicrkSuVs= +-----END CERTIFICATE----- + +# SECOM Trust.net +-----BEGIN CERTIFICATE----- +MIIDWjCCAkKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBQMQswCQYDVQQGEwJKUDEY +MBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21t +dW5pY2F0aW9uIFJvb3RDQTEwHhcNMDMwOTMwMDQyMDQ5WhcNMjMwOTMwMDQyMDQ5 +WjBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYD +VQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQCzs/5/022x7xZ8V6UMbXaKL0u/ZPtM7orw8yl8 +9f/uKuDp6bpbZCKamm8sOiZpUQWZJtzVHGpxxpp9Hp3dfGzGjGdnSj74cbAZJ6kJ +DKaVv0uMDPpVmDvY6CKhS3E4eayXkmmziX7qIWgGmBSWh9JhNrxtJ1aeV+7AwFb9 +Ms+k2Y7CI9eNqPPYJayX5HA49LY6tJ07lyZDo6G8SVlyTCMwhwFY9k6+HGhWZq/N +QV3Is00qVUarH9oe4kA92819uZKAnDfdDJZkndwi92SL32HeFZRSFaB9UslLqCHJ +xrHty8OVYNEP8Ktw+N/LTX7s1vqr2b1/VPKl6Xn62dZ2JChzAgMBAAGjPzA9MB0G +A1UdDgQWBBSgc0mZaNyFW2XjmygvV5+9M7wHSDALBgNVHQ8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAaECpqLvkT115swW1F7NgE+vG +kl3g0dNq/vu+m22/xwVtWSDEHPC32oRYAmP6SBbvT6UL90qY8j+eG61Ha2POCEfr +Uj94nK9NrvjVT8+amCoQQTlSxN3Zmw7vkwGusi7KaEIkQmywszo+zenaSMQVy+n5 +Bw+SUEmK3TGXX8npN6o7WWWXlDLJs58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJU +JRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ6rBK+1YWc26sTfcioU+tHXot +RSflMMFe8toTyyVCUZVHA4xsIcx0Qu1T/zOLjw9XARYvz6buyXAiFL39vmwLAw== +-----END CERTIFICATE----- + +# SECOM Trust Systems CO.,LTD. +-----BEGIN CERTIFICATE----- +MIIDfTCCAmWgAwIBAgIBADANBgkqhkiG9w0BAQUFADBgMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEqMCgGA1UECxMh +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBFViBSb290Q0ExMB4XDTA3MDYwNjAyMTIz +MloXDTM3MDYwNjAyMTIzMlowYDELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09N +IFRydXN0IFN5c3RlbXMgQ08uLExURC4xKjAoBgNVBAsTIVNlY3VyaXR5IENvbW11 +bmljYXRpb24gRVYgUm9vdENBMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBALx/7FebJOD+nLpCeamIivqA4PUHKUPqjgo0No0c+qe1OXj/l3X3L+SqawSE +RMqm4miO/VVQYg+kcQ7OBzgtQoVQrTyWb4vVog7P3kmJPdZkLjjlHmy1V4qe70gO +zXppFodEtZDkBp2uoQSXWHnvIEqCa4wiv+wfD+mEce3xDuS4GBPMVjZd0ZoeUWs5 +bmB2iDQL87PRsJ3KYeJkHcFGB7hj3R4zZbOOCVVSPbW9/wfrrWFVGCypaZhKqkDF +MxRldAD5kd6vA0jFQFTcD4SQaCDFkpbcLuUCRarAX1T4bepJz11sS6/vmsJWXMY1 +VkJqMF/Cq/biPT+zyRGPMUzXn0kCAwEAAaNCMEAwHQYDVR0OBBYEFDVK9U2vP9eC +OKyrcWUXdYydVZPmMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0G +CSqGSIb3DQEBBQUAA4IBAQCoh+ns+EBnXcPBZsdAS5f8hxOQWsTvoMpfi7ent/HW +tWS3irO4G8za+6xmiEHO6Pzk2x6Ipu0nUBsCMCRGef4Eh3CXQHPRwMFXGZpppSeZ +q51ihPZRwSzJIxXYKLerJRO1RuGGAv8mjMSIkh1W/hln8lXkgKNrnKt34VFxDSDb +EJrbvXZ5B3eZKK2aXtqxT0QsNY6llsf9g/BYxnnWmHyojf6GPgcWkuF75x3sM3Z+ +Qi5KhfmRiWiEA4Glm5q+4zfFVKtWOxgtQaQM+ELbmaDgcm+7XeEWT1MKZPlO9L9O +VL14bIjqv5wTJMJwaaJ/D8g8rQjJsJhAoyrniIPtd490 +-----END CERTIFICATE----- + +# SI-TRUST Root +-----BEGIN CERTIFICATE----- +MIIEijCCAvKgAwIBAgINAJCud3YAAAAAVx3QbzANBgkqhkiG9w0BAQsFADBcMQsw +CQYDVQQGEwJTSTEcMBoGA1UEChMTUmVwdWJsaWthIFNsb3ZlbmlqYTEXMBUGA1UE +YRMOVkFUU0ktMTc2NTk5NTcxFjAUBgNVBAMTDVNJLVRSVVNUIFJvb3QwHhcNMTYw +NDI1MDczODE3WhcNMzcxMjI1MDgwODE3WjBcMQswCQYDVQQGEwJTSTEcMBoGA1UE +ChMTUmVwdWJsaWthIFNsb3ZlbmlqYTEXMBUGA1UEYRMOVkFUU0ktMTc2NTk5NTcx +FjAUBgNVBAMTDVNJLVRSVVNUIFJvb3QwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAw +ggGKAoIBgQDTy5wtwuAwQ2UxJP9LsDjZqVPXNdHbt0uTtHKN8cuV0lMrdJsymqQv +PgIG3a9wFaGqzxGHimZ7y8wdcERcj6zK5sNbJ7SNo44Qv25UdAhwiiPoysd0xGaR +IN1L6KWEdaWYlYKLG+EgJAdGqwxlNkBni3XuqdmRKRvtby1FwtbiYAGx8045Kztv +P4W+CPZTK3uiyUWhRIGAZppgOhvEvgzMMBB/ETY4SuaboZZTnJTMEcYETKJVS/+A +4a+MHDX8uZM33/ldPdzrDSdsRMlZZitWb/8EG/f1acNdwxj+vafZZC+in2DZcmw9 +PHXyJSeYLjq4yd1Ndb2rsCJhWAE3KKYgnS5gXPuQvEZDuP5t2MBmIiRrNHgi5bni +WOlIOO5MvQF7bj5A6tHCCkKTZ8MmLz8HW8+v4x3oOuJl4YSRP/VmAP2qM0ZC7BY+ +0hNlLw4JU/bkKnUUnBkzFppF4dtXz8841Kf37VhD5A6YXMTgMT+UpG9LSqLVSo0m +qR1kJQg1DecCAwEAAaNLMEkwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwEwYDVR0jBAwwCoAITKPDaF4IAmMwEQYDVR0OBAoECEyjw2heCAJjMA0GCSqG +SIb3DQEBCwUAA4IBgQAmI4W7XUEZbpKDiu4BiwQ1GX+rj9zWM8H5eZZeI/Xwzt3q +22E7Wq/dWOlCiUDv+dlnEX9N8e3pEXuxQQ/tpNIWtu/B/Yv2ESss7/wHBkYMzwIL +7Tvejwm5M6smgFREQmXX56/NUA7KyIihEpwqlTs+VDxIc/Z8eNSb/5P3ReQphGP8 ++n4a51zgclewL3gdMMYT/YhfsWWI2l6XE4F7/h7Pe79XMMFwkkOmmfBVn5jFI0K9 +dBwxjhKl2UVqKlrIWM291t0+NQsZfwMczgcPh0WTFaFrvTQc4N711LjlkRxLBbUn +JrzP0QmYFsbh8VVLOntt3sZntsE3LZ+ojlnHt6bF798W4u3esrfzojakKDI6CpTL +P17+blntujayk9bGwxn+9Zl460dH5a1Ceuy8e8kuQU5NDwQOikszh9zxdnxaGIyc +ChLXorPChYeubTFQYjIhoGgWX5Q1dFUp0nGBCErh112qVAGzG3xZrr6sDMq4QGRn +W53qBgYR1tAwcx7jvCs= +-----END CERTIFICATE----- + +# SITHS CA v3 +-----BEGIN CERTIFICATE----- +MIIDYTCCAkmgAwIBAgIQG9QO1DTR2hWmADAVAk2kbDANBgkqhkiG9w0BAQUFADA2 +MQswCQYDVQQGEwJTRTERMA8GA1UECgwIQ2FyZWxpbmsxFDASBgNVBAMMC1NJVEhT +IENBIHYzMB4XDTA1MTEyODEwMjc1MFoXDTE1MTEyODA2MDIzOFowNjELMAkGA1UE +BhMCU0UxETAPBgNVBAoMCENhcmVsaW5rMRQwEgYDVQQDDAtTSVRIUyBDQSB2MzCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMXZW9HUK39AZ+6hW13R2mq5 +GTHy8CZJAWX8QVTxlpHsKu4ERCQeQJznF1A/6hx87rg3OfzH06+bbl3fPr4F/OrK +2flFVuGVnLHQWo/+yCqm12ps4G1d7Fx2/uGZR5qpe6fq5m9UAidNUU4oPawGOoGC +phy9S6TtUhLciirrJ/TBIkoQhFp1tYAiVmXrzIDypeFkvnzeD70nB0wpW6qx77R7 +/4c06KOTQss9YLt308IvXhT4c2+kf6CcAdXVqbsMV4/MwDuReJ6SOXkyTER/xwt9 +3vrMftrM3g3UZrZipjO/bPnV3UdScJTLZeBFtw3Xr5VI10GjOyBQDTwUVZPM6g0C +AwEAAaNrMGkwEgYDVR0TAQH/BAgwBgEB/wIBADARBglghkgBhvhCAQEEBAMCAgQw +FAYDVR0gBA0wCzAJBgcqhXBKAQEDMAsGA1UdDwQEAwIBBjAdBgNVHQ4EFgQUfC45 +IzJE6A9OZvINKP5AvsK24qAwDQYJKoZIhvcNAQEFBQADggEBAAhTWogpDfVU2Kux +g7knaVqqXytYSdS532/rxwbr/Yeav8oS33qeASIlY1KFb6cvDpd0YIzgSIBz3UKN +Ie0Pcn90Bm5QVjsth+yBWIs2x8oA+6QEti84WI538QbELSwnLRiCC4pfIpQUFWM4 +xqWxuuCsvj4mP5G7HIP8DsrJN7431/B784zYvJAL9AC/VLxqSljnylsMGVNCB5VX +NbhPllOaqJjdTn1VtJzjusA2ubfcApj49uUwvix3svPJ4gKj5vdEfNZqf9B4vjlz ++AvCH1IADk17xgruYssJ1Q8KMIeCk7zKEaQfCfr6N1DsO+I8JKCAKMz7pt3vN5qp +Md3f6lE= +-----END CERTIFICATE----- + +# SITHS Root CA v1 +-----BEGIN CERTIFICATE----- +MIIFkzCCA3ugAwIBAgIRAJBmYahiPWVEdwQ/cZrDlwwwDQYJKoZIhvcNAQEFBQAw +OzELMAkGA1UEBhMCU0UxETAPBgNVBAoMCEluZXJhIEFCMRkwFwYDVQQDDBBTSVRI +UyBSb290IENBIHYxMB4XDTEyMDMyOTA3NTQ0OVoXDTMyMDMyOTA3NTQ0OVowOzEL +MAkGA1UEBhMCU0UxETAPBgNVBAoMCEluZXJhIEFCMRkwFwYDVQQDDBBTSVRIUyBS +b290IENBIHYxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAwO3mnqis +qP/YNbn8+/CVTz89RyPRksnJ+PDiH4atiD/gAM9PEZVhPaXWIBnRiNLCVglFIKEq +6iLD6rrMQmmeuIWfcMBsp75vo1zdQ4gHzcop32l6Hy2fVmobYiAhYcZQS2V1SUa/ +XNcpHsIehULhDjhNwzZxQkRROtFYzMm0qmxAx4PxxwmfSvNr8wcWNfSCjl6LhNxx +ebn7bldFt8VwOv9CAtE0v4VwbU+P5x8ZIffVNLzuWeYuIvNxgmIZnwVkfDsicRil +LcF4WJnRr96UQAYZdhNQhyPLR1eubMUT6pqFUsPKVyYf3hZtrXF+8thh/eY2TnEa +ndMgNa0SIVh1NouJFqQ3KM+ggzpAo8oR77TlkBvjZZJnmG8OKeVnGNeI+o22x3ql +oH+RHqu2+XSYdlJgL1o3majb0T7WhGpvUtO02hrHuLLRlBEfxYiJ6Vupo5Tmon1N +pzKJod4ma83Vo/IyG9o1E4kRSU2/RjG76S0T+A4Apf4D9VZGPI8TK+Dlxx4D34rq +RoVFhtntXgu4ZJP00FguKY1FV02JdZBlzGo7wZyAubSANQOO324qk76mvgoBRG9A +c6oqghyEdn9p3bG7kljoQFFyXPc+OUT6pZmgf42LsEFYd60ixaDAuv0xmTVq2ckg +Gl7zvbwIf91JLS+dkRANW6g/z7RXcztb4GcCAwEAAaOBkTCBjjAPBgNVHRMBAf8E +BTADAQH/MEwGA1UdIARFMEMwQQYJKoVwSggBAgEBMDQwMgYIKwYBBQUHAgEWJmh0 +dHA6Ly9jcHMuc2l0aHMuc2Uvc2l0aHNyb290Y2F2MS5odG1sMA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQUMvmdT2npmI2g1ox9+R3Oozy6dhUwDQYJKoZIhvcNAQEF +BQADggIBAB8/43hYyArKNCIJ2LIFi9FlnOHX130KwByYpSRSODPaZCIjgK7+PYC+ +T4/dg/YNTDNa1aM7UIpSWiYUc1GU5FKXY9u3Bqjvj63i7d6jvyDRRtsteOgsJ0Sc +POy3F/yJl/Ojol7CWVPgz+S1ATtjUyjTr2ZLNDmvYQ4+m+6zidaToDsBxLMjVBA8 +TdeqsNrZbMowRC3dsihiikFg8kATbLB8PkHgi6Y08eeuUYcDjpl/2Wii9pwNeYKy +n98kyGZg6LZIRCfIa1a3RIXOArfTinFcV1FXIYzqwlEPUD+AqwRNyVLd5KXyLh9t +dbqHHZAL7hiEgHO7i5WEimENTl1in+NmDPs2DifTSPgGiAalX+5+XN2tCh09HKpA +eZh5uFCMNo0LCjYL1T7nXYHdbNxtsW8NdJ4sL8IF8kQRsjP6gcVKbT5F1izia18u +5EOVURuZMQXfJRtz0XucxHNJ+2Jg2Wlj3dE+ZW1H+mRMA1hQ2aa+5Spo6z+LEPHm +uyIGKJqgpJhpbza01A0ODH3AKTG7LAMn4WenvdGLLraHxArgCQuCoeZPWJ372Phh +4cqXxLi3UDnMMU79LRwa9kfjbOwbBeh/FzUQhNoz5zTmtaTrxCIHSvabWNgPnED7 +sYtfov2Z6qJ7WWLRXq7RSnIYK0s2OXIHmlrwYzrPG/nP3UhzWXDk +-----END CERTIFICATE----- + +# SSC GDL CA Root A +-----BEGIN CERTIFICATE----- +MIIFrjCCA5agAwIBAgIQUJZucr0Q1oxPa8diP5xwODANBgkqhkiG9w0BAQsFADBx +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UEAxMR +U1NDIEdETCBDQSBSb290IEEwHhcNMTMwNjA0MTMwMDQ3WhcNMzMwNjA0MTMwMDQ3 +WjBxMQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlr +YXZpbW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UE +AxMRU1NDIEdETCBDQSBSb290IEEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCfXEr8HGu3GZfZATc+CukYhtMF6qLa3wmCV+5tK42aFj1VPonXyb7hAaOA +NaNG7OER7ag8leU6UoHKTpgIKg+E3LvppPl5tknCFZ6glegPSPdQ1/mmQ9QHCzBB +yTYSYrdseAsGPy6znuow/UFjT4QsN84Hpjlke3EVWysB8td9mA0YPtuFmuABUCEk +uBujY0PTgVtNDIFOOGvOYMXqB+In4uv2w1SayMmz0SsyNwK8bXuekHcjjZMTJjuH +V6NlTyZYFGpjJZrlYfocV/0NLGkPxgrwJjkXAqPWc4FCw0Ixg4vg+ktOWGExKJI8 +xskQCMkMW0SsY8LXYhnyce4gt0mDGZ5H2lbFHKykOWgXXxEabKqlko+9G8vF4AKA +VdNwU+WLKv5C6r07XONSAH14PybMEa400TIM+Hug0X0944q8vh4ekj84sl8yXjXE +fsKSDZ22y1nV6xJq3XIhURGwc+Uy6dbMDt2zOVoi7+T16QZphip8c68YInMsNiXc +ValSMbOKjhV9sk4Qe1CKAEy6h+JFU3d+TWUCa4yTtmt17e+Wt0iOqOC6uYKyUm0h +/5K60T6wXLGrGQ4Zc0Yr01JIZTTaBDXSeD7PYzWkU+ZL41CDvfObh7Ih2kihekvs +suLx1CUFlFMWTCtmJBDI4NecEqSUwgEjk6EApuBuuzni9XpoqQIDAQABo0IwQDAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUoBF+H+SU +ZFE7Ejl6bN1Jk/n9wFwwDQYJKoZIhvcNAQELBQADggIBAAzxS4zhTxYW0upikrat +1FKOCxlkSznwmDlzSlLqTs2OZEewMI88Dy3aImXzGVgyPH+DjwoM5VTmqb64rpdW +5rcNGXy9lyxqKqVWc4LeTpiLPRzE0Csru8UM+E7+La6/qWd/V7Nv7f+L01YM7zCM +wV6m6VmKPC7cR8/MlF6DrBR2+n68DKMOXBuI7CsbNWiIsfV7xfOzxRq8+++1Xt/w +OR51aO1EwksicD5ca5TJEKzw/cgvfiPigacbzgy6RTInUEU5rOD+ALQqdQcMZxu7 +ccCC45dWl9Dkd1m5/3xnXIRluwg2qEtOkcJp/h3smhMfdTMsKcbpsGiQI/8jX3/G +O6coELgfoojNZBYlT+OAt8BKgFfwkNs6sgIyINVryNgUQMnZOBlUOOvoZTtvXNVF +eq/b2diVnranlc0cCR0CHgHpBJVdhZc4Fb2ox5ne00RCXYaDQSR8UYmqQwknNOjx +CrWWS7TzoP7yAI1qO3S5Q7lmuc/q6zfO/5vpI/hs0yP96Ongbvj7DVJAiqyAayAQ +XdCo/ao9ORErL/9SkTqg3IrHdjYRWYW7MIqkSDCcYUOr1K927cC/F5R4NdtINwjU +jmoA6SLdyvDTEjg8mJ9gTG0/Qv3vjJq3HnF6GknUYMnrj/Tpxr9wVIjSx1c7Vs3X +btztDXR+5XVBkVeTNH2p9b2H +-----END CERTIFICATE----- + +# SSC GDL CA Root B +-----BEGIN CERTIFICATE----- +MIIFrjCCA5agAwIBAgIQPoxPvOQpg4JNhFWO1TWAzzANBgkqhkiG9w0BAQsFADBx +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UEAxMR +U1NDIEdETCBDQSBSb290IEIwHhcNMTMwNjA0MTQyMDE1WhcNMzMwNjA0MTQyMTU1 +WjBxMQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlr +YXZpbW8gY2VudHJhczEZMBcGA1UECxMQQ0EgUk9PVCBTZXJ2aWNlczEaMBgGA1UE +AxMRU1NDIEdETCBDQSBSb290IEIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCPlenS68FzJcc4Z/CDjlO8tsvOunPbTyf2IpA/Qr8h1t5igrRvBAVJCTt3 +AddLX1LS2RnHbXwMqToJYuQqGGmMoN3rrBO2DjkRgGlOY1/cPA362YxivmSFMjJZ +l1CTid/7/9TYZXHHRlWiG5lhH9xQAMgXeehQsAxe5v52pgFOCchwbPqQs17cPQfN +SaNOVl4ST2RBf34MFcOg3rOjKQZJRKFfbz+BoERN8HsKOCjtEu5jl8N7XYxPcd2V +OtouqAFGCvNs6LXxHwgA8UCSGyYAMXU5RkkmuaTUcXcRpE8zzAnb2dEhS5JErM54 +YoIX+/oStH3V8obt9H6WFOaNA1KvzRei1Ryl/oGmmu195NkOMmYQj9vZMzGBfilX +78yyoWDuilu5Zdt/G5osjycxiYoota+xVtQDIu4lT9iavdJsV7yDpkgfLFUHCTQr +uXksAqWgX3x2nyQyPC2S3+tIV4eh9v4j+jSrifVoG44fqm4OpdIh0u+50bFJVzVa +hNMe4gJtUhB/4oxNIdsyMhx9zJYiAy1qpwZCbW6Qh/ocXLBP0ANBE/oLU+bBEAJI +C3dj9KWcUXuYZtfFdjLlb10UYX0Mu22VQNqpJsf3qcvS/ifBK/axaIb+42JSmVCO +K95BIQcbh/VAHXCtz/3CQ6g1VhFCxcteZqHIqGj3/kxXYTZSgQIDAQABo0IwQDAO +BgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUcgNGh2H2 +HbPUlWO5UHduDauY/i8wDQYJKoZIhvcNAQELBQADggIBAAjbijKBdDNxFuwhhVNI +Cm8fcuPjBPgutz/zJJVPnO0T4YiCAvZm97exLYAnra64bf4jBxEIq3RhjCgS+fYQ +NPDPtnyjdS0S1JTfdO6xmKux7iJiS1kff/4aZa1N4qQRPxMhtNg1i3ZApl+9MxHf +mOMhXh2ju3g2AjvY/WSE2jfNWe38DNB0pGtxPDYSRJ5+bk8KIRxlH0sSbL+Octbd +PgBwmAFFK+yVkOPTaTjnK51+ZVlb4duFymP+q7/k0P3kUroa5v7GkLp7zvGkYsVH +viTHoHrlIeHGCOAMiYOPgGn97qDfekw600gqFr+uppW13Wgf+w61BYzRskR8YDBW +dhe1NU+o1QrrwrVuAu6cXw6jsQGo5VNvfoNBHxXY/+HCthrxRpxkoBrgSsq4prSJ +JO57lZli1OJAu86jmn0dcvMbgUF3AF7sPKIwBTzNfEg2E8gysGtvnzgoOGlce+bi +rYO7bRPRLrfRdm9dMF65UEVI1kiAk1HJFqkQXWfGy35nfQVP9CDvJCVe7WdDxvtu +efuy8sjJzkF8BeCti80KRS7iYp+XkfT5Y+zywmCK3Bv/Iaj/I4eMc42wOswfjzFy +Cv2Wod8aU9M2trB3Rt4D9sKALm+XI+ERzFGYP+5A//Q9m4h/jLvhWYa9CTQnXJ4K +kzI7VSqpXgsND6mmUQTimyoR +-----END CERTIFICATE----- + +# SSC Root CA A +-----BEGIN CERTIFICATE----- +MIIGKjCCBBKgAwIBAgIQZgej0p0pVhgO4V5ZmLGEVTANBgkqhkiG9w0BAQUFADB0 +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFjAU +BgNVBAMTDVNTQyBSb290IENBIEEwHhcNMDYxMjI3MTIxODUyWhcNMjYxMjI4MTIw +NTA0WjB0MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRp +ZmlrYXZpbW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkxFjAUBgNVBAMTDVNTQyBSb290IENBIEEwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQC66k++hMAZJIohqUyZffcM1aVRkqhl44mjC2bnQvh50g+DI3u3 +psEk1jXW2OUBynCxFtZHbr4QbH7pUG529+Xkgw941aBz9Y3RmR+URCOWxu5yWvna +XTyRr2zol+iGXfeei/rErGZP5HI/O92eTjXSEx99u0RL9FOs1hTXQDm6wD/8hSDT +xADQ59hHmQR5h4ZAsqxeyXUgwwkUrwSOpqKtKleIZaHMKL42yR8lD8NrIoQ5d046 +A8Bq2z66tome5NcumrdDAT/52qyprOR3M4ftCzndx8GtDVmDMNE2BFi0ZE7m/wjo +QrGAq/iY//MphhYRJE4Joc8wf7xesApqoXFr9ZoSayVtdwKiRl75aS/7OxiVX45c +l5RgXh1xqEG0Xc9aemfj1Eo1HzfgdhYDO/RRnJgUKUmIDELQLW2pp0AmOnkAMDvA +u0SYrSTO0ZbciXiB9lpbQrx04YfTZchH5jayzMFvwMfcgCVSPDGQ3cnIUKh6u3bg +7xOUzgR+arZOd/mD0G/4OtAKQ8q6ELb/PB2UYJSEbfWlyX1MCn4vj2/93S17Sunv +NNu7fv8Mbzf6+cPMyS/R6Sw9KqxsJjvQCV7EgCeL3WHw55VRQ8QN5jHQeNbBxsJm +AdHjzMfTHhUFNtuUmuxSw5HHL7H0A/cHrNNLkatWPNCu/V9tLdMAEc+TvQIDAQAB +o4G3MIG0MA8GA1UdEwEB/wQFMAMBAf8wPQYDVR0gBDYwNDAyBgsrBgEEAYGvZQEC +ADAjMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNzYy5sdC9jcHMwMwYDVR0fBCww +KjAooCagJIYiaHR0cDovL2NybC5zc2MubHQvcm9vdC1hL2NhY3JsLmNybDAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFMy/3qeQd2JqHXhpLgo4m3dRUwPwMA0GCSqG +SIb3DQEBBQUAA4ICAQA+r8ioxzNP8G6aQ+HysFdS4ZyeBl9C1vH9yotRP+HHZWlP +dBlQis8Yk0mNoBywOz2OSJPZ6AV+xAmxD1KKa5dv1448gADQQXOtPcNEB3Fqj2J+ +BdhTYHKxAekAYqoN2NhJwrR9DVuzlyk2mbmn0UuYa0S8shKOdmR1TA3Nwi6zWPx6 +T1WzWX9d4C8wM8+IG2npTYqQnpC5MTrzogW8/vndUI0OlBmdfo2qFX4PUpMl5IEO +li0cAxwwgxGWQqmYpJ1fyalcO0lowoRtmdr2/qLy3DdejXrlpVfKI0uTXZIqVYSz +lrMemJRJfGw83J4dtqvDrAnFnd4311TEnK0/sNZpAeUQhn25gYNunGZOlQWSkDGH +JrLakXS9hORxaOR2AOB2czRHhpVluluQom0FKXhg64b5Ek3oCFakzIyiVkrOgPQU +YSLlqx06QTuE14J4BS+sHSNoq3J5hc1G5nqngloo0BU9HduMmFDO+69YO9OproA7 +FgB2J9Vw6QmNNpQJf+PvYBBRysZVcGarUW/zUU8SVq7719kN4PqrEN5qgayFdy2s +emN7RuE32ldurWX8IQSZhQHPIzoyxe1am9WhggR3EUWOpER9wsvLpw/oErrybrqP +MzAb3Sn48EKjbkKlbvpWpalQg9EFZhaLLfvmktHmbAvVWiltK89519naT/Botg== +-----END CERTIFICATE----- + +# SSC Root CA B +-----BEGIN CERTIFICATE----- +MIIGKzCCBBOgAwIBAgIRAL6SgxjzVYp4o2dZHGkkCT8wDQYJKoZIhvcNAQEFBQAw +dDELMAkGA1UEBhMCTFQxKzApBgNVBAoTIlNrYWl0bWVuaW5pbyBzZXJ0aWZpa2F2 +aW1vIGNlbnRyYXMxIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9yaXR5MRYw +FAYDVQQDEw1TU0MgUm9vdCBDQSBCMB4XDTA2MTIyNzEyMjI1MFoXDTI2MTIyNTEy +MDgyNlowdDELMAkGA1UEBhMCTFQxKzApBgNVBAoTIlNrYWl0bWVuaW5pbyBzZXJ0 +aWZpa2F2aW1vIGNlbnRyYXMxIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRYwFAYDVQQDEw1TU0MgUm9vdCBDQSBCMIICIjANBgkqhkiG9w0BAQEFAAOC +Ag8AMIICCgKCAgEAwfNV9UdRTlUXZY2wskEooUrRn0v2c/8+0slNWT/kt8efBl3Y +PKOIhOBzXf0F6seO16QEauufvUP9FJJGuMW6qu1g7OzKkI0KcqlBm9SdvLBsohEf +ZMvnHdRFZw4Ja+V47PE/BFTzmpnHWdHSeaekGrB8Sfwch1ReeAbV3R3MhaBCeNXQ +sIrq6PGhnlbv08F9h6zn2mhPGdZv4JOtSVxzFMFGap33WEDZV1hObDf0ciME+NtK +sN7xQZYSQKEVi2e4XnhWy3/kvsBJaJG4RwiTgcG1GzEG04B70UWhzww9YfOS+PGw +FQ74LjBbAKNJ923+7ty/iM/wfVc+r8DRiut80m0xVfqEjXNq2nCAxPTCz5COMJrh +xjVyAQjmP+ZmAKPy+JIdvFLsj/bc9wrvvBCH+YQYjF4fA7j/NS8BauXwW2J847N/ +M6qU105RgbXoV3iPIpapDIlUPrbu2XNfZPRE4fFqGP9SlsQcv4mXpMOnyn4Ybhbc +E4y71bUlCYav9i9FlCowwRSUNfZdyiWVnLFYibi1YIXJxr4UGaM++VaFq8ps1pl5 +okoUb8M62OdmUQrpHP7MaeY0bPSB232iEfhMxIcFFj3rl3Q/buycubYnjCTfLbOv +3RNhdo//8kzgCBkwMiQyXDaAF+6Gyd8vUeJWroOS8LO92Ic6LJ7E3GmZ+csCAwEA +AaOBtzCBtDAPBgNVHRMBAf8EBTADAQH/MD0GA1UdIAQ2MDQwMgYLKwYBBAGBr2UB +AgAwIzAhBggrBgEFBQcCARYVaHR0cDovL3d3dy5zc2MubHQvY3BzMDMGA1UdHwQs +MCowKKAmoCSGImh0dHA6Ly9jcmwuc3NjLmx0L3Jvb3QtYi9jYWNybC5jcmwwDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBScA/Co0phyaK7y7eBP4oUOsiVOzzANBgkq +hkiG9w0BAQUFAAOCAgEArFy8L/yuASSmED6sqOGnJ5mNyojBHT2R9qJ+pfGYQf+q +YfgJvs0aJWF0tMOvQloJD5EBvkiV9Mp3XguDzoSdz0D9gCy942Y1Crix+mDa5dhU +tUuXuqIawyBpjbRGc1yqv717/xowNFhA+StgC3lE+feilgtrUnvwK0s70ouga5M9 +yVdjimvMUBOPd6hRvhpMLUxdDJBbjvPvUCBtgeZRSavE59ddCCtR/D1GEufRpXbF +UyQFyarTjljF84p0kjLt8C/dq63p0jWPdCPjmQDiizDkw0Ku8Lvp4ggbSnAtffjS +mieRQnB1egh+vi8cfzc9qIvcRnL16G82aPpujSCd1PUHcb+9J0K5cyjW7Em0BYVP +aEj2q5TfDqNGFGDCMSA76y5b3tWhLG3lUvqBX5eIyWO9AezjzWsKNcLJOOMO81gb +fdqQbbf1yFhWna4B35GdrVWCAwwRdASRhsd8k4zzJ/vFJFdui9kbmJ2IMfCvd7gN +tMzP9gpvEpvsCStTiexE4KFpi6h0hnQYUuDSv6ChZSG5CIN686T1+F43JUeZpl3X +Ilrbk2cX2xDjjNESkUeKlaVHoQP4Sy4hxZBisH8no9sVfzh/bH9OBcUDtC3fRV91 +LB3xX6a19hc5Qen4ZcIeWBHKfI7itbqSD2e3j+uZ1DH7cntamF+SlMcE6jD2uxo= +-----END CERTIFICATE----- + +# SSC Root CA C +-----BEGIN CERTIFICATE----- +MIIGKjCCBBKgAwIBAgIQNLkSn6zHklVCXN5X/+PABTANBgkqhkiG9w0BAQUFADB0 +MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRpZmlrYXZp +bW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxFjAU +BgNVBAMTDVNTQyBSb290IENBIEMwHhcNMDYxMjI3MTIyNjMwWhcNMjYxMjIyMTIx +MTMwWjB0MQswCQYDVQQGEwJMVDErMCkGA1UEChMiU2thaXRtZW5pbmlvIHNlcnRp +ZmlrYXZpbW8gY2VudHJhczEgMB4GA1UECxMXQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkxFjAUBgNVBAMTDVNTQyBSb290IENBIEMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQChRSL6jMypbwSz9GgyFmkRT3nfQ71RYHAamN14eJaYYvdwS4Go +4B0EifSP627p8P+B2C59rxcg8SLv8D9FR0C0y7K4ID8+SmhQ/5oG15fFt4oWLnHS +R3NdGGUv7zkz6LZVryatAoDpY9chcAc+zL5ficD4zh0lbsP8f1Y5YdGOwiZ653gC +ClndVSOw+DWn4qvzqy/XtYsKKnJUK215vPLZ6UP5z/GOZhL3l1kq2deU3PiUs0Wj +rxYts4DKPc7opscKlHT8N5rpPww3FiBDyUdwu4yF/JiJKcuHGX4ZUxCJgHWuE/G/ +pF0wBSl8qPe2XgcwFYiuTRWgys3X/6ujBlcPp+OJaRzWGtHUJ9+Wxjhcr3f+FatE +QX3TmLuoIBivi23UWsLYlo1I9QcxfmH0YZtSgUCOSicEsgfTAhCU8/vdsXtwuLTI +gfUAB6aNiAVNxI+WztS2wMFmjCqsaErJRtwN5i6oeSh9d0NwFn4cGjqmeU8TQImx +MrsJRhENdLwn5djtLfpQKdwlypcQ56miYS46iaZEYb5PXpIJ7dwupu9Tu2El2Cel +FEYphSYA2Pn5BdV7FjFCQwUXkZxKYEAkbbVtenn7nJpjw5hp5XdiIypRiQ9ssv3D +ytj0GkOU0H0L4Vg+Gsh0hJv3rIKuUUWS0gZZ4bPB3qUfkyJ52M3EeWAjlQIDAQAB +o4G3MIG0MA8GA1UdEwEB/wQFMAMBAf8wPQYDVR0gBDYwNDAyBgsrBgEEAYGvZQEC +ADAjMCEGCCsGAQUFBwIBFhVodHRwOi8vd3d3LnNzYy5sdC9jcHMwMwYDVR0fBCww +KjAooCagJIYiaHR0cDovL2NybC5zc2MubHQvcm9vdC1jL2NhY3JsLmNybDAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIgHc/bxvFIaWh09kWLtXaydC+W3MA0GCSqG +SIb3DQEBBQUAA4ICAQAfkHFQmNXZNNKWhBjCrEYCIBzLObG3rwWk11jzkVF9joEn +nOiSseccnzqLEFJzTMLHQh3Q694qyiJRfYx0ehr8vKTzc8hmI8QuQxBH4IppV+4v +8gBSsDCSqtbUFcVXy2B69A6N/h4JY3SP4P6+UNkBOVa6UEz240Wau1J23n6d+43C +VDE+x7E8Pt/jT/3dmyRpfO3ocbZCBscfxV/7IHXbwf3pbKIqkNSG/c0N/+AFilhh +PZ/EmS/t23zEDZiYVZx0ohde26oR5DcMJP8gZ9El25qJoGWIMZEEcV8glFgzNh0y +3m/XZwipoDv926RQJZYeqV+JF6WXmVGVadvE8Y/0bzArWfOsdYczfQbd4cFr1sTJ +XnBEemrHnHc7Fv7+db6fLNHAA+4ReXXsqVsceoW1KFAgqRod5nuMMxj/we3IdmUf +HfBMO6fb6s1W2JRXP+BIqX+MM0u99AxlFICC9DV32AQQcM4PbMFZy5mtge7ePUjQ +eogvQJPXnLp5hBiAdd/QWt9Rdz5YiWl1RzHkahZwVATsvVx5U2PS4l69TSXaEbYP +quksrvXRqY0CVsv8sCTqjLpw/zLQt8YEKmPVykaR1ZlyCQdeKAOrEhwls2w6WWW0 +dG0tLRlyb/3nmBGHHnMjvzXxm7bD2cw7UHxy6M9ewJjMLgP9Hy/KdFyxHNHsaQ== +-----END CERTIFICATE----- + +# SSL.com Code Signing ECC Root CA 2022 +-----BEGIN CERTIFICATE----- +MIICSzCCAdKgAwIBAgIQbo7kWxBMyQx+tNiIj+XsZDAKBggqhkjOPQQDAzBXMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMS4wLAYDVQQDDCVT +U0wuY29tIENvZGUgU2lnbmluZyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2 +MzEzNVoXDTQ2MDgxOTE2MzEzNFowVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NT +TCBDb3Jwb3JhdGlvbjEuMCwGA1UEAwwlU1NMLmNvbSBDb2RlIFNpZ25pbmcgRUND +IFJvb3QgQ0EgMjAyMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABHbIrNTWlZJ8FzLl +y2tB+Sm7seuidrU22GxLjeU+SlcmJsefO19GZidRwCxjHHTdrDnTbz0OlL6+KzCS +zqJCVg1Q1KQscfQnYduggT/VTVYWtcwcN8szNBFoxzx7DemUzaNjMGEwDwYDVR0T +AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRYXhbDLbPm6qNJs6W+1t6ueZVrjTAdBgNV +HQ4EFgQUWF4Wwy2z5uqjSbOlvtbernmVa40wDgYDVR0PAQH/BAQDAgGGMAoGCCqG +SM49BAMDA2cAMGQCMFOMczFOgFy3njsPCFgTvtlA9vG/ffeZoOvMgAANqnA27TYj +e0G4FBVWdtOW4xWFZAIwJOT2+L0Tbjq3P9y/zXjfJoBXEq9oZ0//8iuxoqGZtMOT +G456y3y/FI7r6rj+4QNf +-----END CERTIFICATE----- + +# SSL.com Code Signing RSA Root CA 2022 +-----BEGIN CERTIFICATE----- +MIIFmzCCA4OgAwIBAgIQEJfEnIwlQyi7pui5m6tPoTANBgkqhkiG9w0BAQsFADBX +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMS4wLAYDVQQD +DCVTU0wuY29tIENvZGUgU2lnbmluZyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgy +NTE2MzIwOFoXDTQ2MDgxOTE2MzIwN1owVzELMAkGA1UEBhMCVVMxGDAWBgNVBAoM +D1NTTCBDb3Jwb3JhdGlvbjEuMCwGA1UEAwwlU1NMLmNvbSBDb2RlIFNpZ25pbmcg +UlNBIFJvb3QgQ0EgMjAyMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +AIx1IMiM3E6RUQa1W+9Fu9n+YOtKk4fs/5ePYJOecWFA6u9Ly5JY2GsW3N4tiPLz +0wSWwCVnIeUd259SgfYAK2aQ8aweqE9hJN12LwPHNcg2rIFTYCLAUZKZ7+gmLplU +zQmPX1w88KvnO7OnqwbGMZe+TO30BoExgktQELWgEXncWMvA5R6zwW9IXK2XCrMe +rC5X2L2+OFBE4zP918G1v6JO+3i0OziYKOlWLVSAi2t+HeOVhqeeF1RGW17/n+Zr +NYpRpaZ7XAoiDcLXgy/aPD3yih79Hj6h2BxPbghSbk+sH8n+n5lNu1JUsZKDW0AT +7xS1M5E8gqSr9apIaum4+4BABvzlHn4/vAqrJuLFqwcE1014tevaa1NbU4qm8tde +USJNH8yqi7rADoLZFLrZ8i33JbjLqUPSTEQeFnXMteRwHymBVTSyPv7/0XgaQJIn +KmgltdKe77z4FEtvUiMWaxCJ1N+63MwYWXGp5svYkHG9IPSkaiZJlZ1GGEUWiR8V +XahDsGCXntc22jqyb0tyTpl21zA396adu9tdpu58GOxC+RXoDrjbbEJrEF1EDNbU +zoKM7yswi3HhCPJBkWPj/uDAqKWNmQBBYs5CRqGdyuWanFHbYHpEVQ4qKnCkmf8q +fmC0HZZXujv827/GMYCqOgAZL4gfSaTrd0D3TIPugpEvAgMBAAGjYzBhMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUx/bIC2LtFAyjF7aquR7R4INWoV0wHQYD +VR0OBBYEFMf2yAti7RQMoxe2qrke0eCDVqFdMA4GA1UdDwEB/wQEAwIBhjANBgkq +hkiG9w0BAQsFAAOCAgEAYlDeMj/rNjV4jYl3SA8Po10HqLr2Uj82Us61wHlM610r ++BKsQ9vne4wpKp9rOtN89RV3lzv9If3zyFzJPgWUr3ur6I3irw3AoBvfrwu6qrRF +VYHIYZlhuLCa6FnMCRPZp1YHhu7toOyNAWWamcwjosCRHV0G3Q2n+jzExFkixps6 +wB1pPSy2sR6Kvj2CD2sxcmBXkAtUit5VCh51SQBstkoz70bY1svE8XxsCZbpqeEY +/a//tM9nb38HpUiNBRCWOZB5Wpa34+Y3ODKxxjEBJHQCxMsLz7p2vlyKIMPpdGfr +bRKcOT3gitUrSyTjeYxInJGr14IhOL/Es8EH7pA9rfqivilbUjGqbLMcdfPmoNiM +A5aIuvjKUTNhCx3Va5wTGS4Wz88Nh0uXxAfZC6uYkeq6B4OYkkAKIM24a5r3gP47 +yeL5Q8go502XF8B38zDqJoQb1VO8MIVfae48tAnosZukOIK668BqjG0rKDB45DKr +txvhUiQAkedLGtuhiAxu6l0cR5mNcU293t5AmQSzQOHDi6rEkhiXe/zMg4A82iny +f87EaQCbYX1tltYVgoz1gyoc91N2ciXwKYDEMmRTD09U9FcN1gvc/nKItF9L2R4/ +A4YvORA2pzHFJgeVi0hx8assBurSHE6VjecX6q2xRkXTNv3LxGFvCSJEMiena2g= +-----END CERTIFICATE----- + +# SSL.com EV Root Certification Authority ECC +-----BEGIN CERTIFICATE----- +MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx +NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv +bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA +VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku +WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX +5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ +ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg +h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSg== +-----END CERTIFICATE----- + +# SSL.com EV Root Certification Authority RSA +-----BEGIN CERTIFICATE----- +MIIF4zCCA8ugAwIBAgIIHWwR62/aOZ0wDQYJKoZIhvcNAQELBQAwfzELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0 +aWZpY2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTc1MDQ4WhcNNDEwMjEy +MTc1MDQ4WjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcM +B0hvdXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NM +LmNvbSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMY3fBNvzw/ZUM/m16poL1xR1L/NTKbV +NzFAEDRBev3LlI1if7iQzc5pljrE/9nXY+bQhCWAEb/R7TDohAbhoJe4VZAdrfOk +mhtOnBH39dnWj2AqPjf4deyAo1Wg9CdBwqo55FLfEPn1ZTk/jJ3MeyfPBhR3Tj1S +54SBMWwSMqyEWhdqxMFcgDHC2kd7dg9C6OciFNONxFuPi2VYKSyPDo5J1NTYClrT +JtMJjthDspRP0sAc3XRiEWm8VCLoOh7QVVZFj3BwjS/vwl29XlTdLnvpGIuKSdlP +jRDzpVfha6sYS46uLvHyuvVdQfc52KPCXd6fWrEvRJM+P/EiOZRAbSfGzA14DAu9 +KlYmrSlXuHHkf+sTssh99Wtd8/IAMDP6W8sSanpBb28JTLdpDQ95IyMaZo1ZNmOW +gHsYImseIhgt5KV1ChBZ+6N+JhBTxsgZLh4nGPswBT2RBHqucMbMD6A00yQWGAEF +Z2nlRdFWqJu/r/qsVQgMAn5Ld6w3wdjtmTSgQbM1OusxNMk738Q9KUU1VLh/ls8I +D+mxnlXKZ4SgJ2Cr+lAxOdV7yraa7ZGMeB757uDiWUHUH0KAefX0g1AIrfNHQV9Q +o5+J87QnKlS5GllrCZxRwChrW7go0m81ftWTA250JWXqFgWRAfEHY0+rhMVy2c1o +m00sfgQ48OpHAgMBAAGjYzBhMB0GA1UdDgQWBBTZWir/pc6doZF9/4ddq2o1EtnJ +TDAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNlaKv+lzp2hkX3/h12rajUS +2clMMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAvIzPI/q9M1eW +H9CC8BKuNETq8bwh1/WJxjQeeKbiUd/deIDV6m3Gqm8JAoyn5svIiVqUekqzVu/d +3VMyY/Bp791AuZCiLgN3lrUpAFLu+w6nlGjFPAMt6Wuqne6n2GeS4hFaON+YZqOg +jssMQjZMxVZbn3XwQNHoOyoIm1LDHF+QNFf7xvkdcfwlfM96fR5pxrv0FP4dHeeX +ooab8t9XkgZSZJMpWQovoRfcu+6tO7MAZTjZqJyBrc01nIvp4vSEjw7PjXFtAIA5 +b7MENaA4YanyL/Q1jdjf3qRpMPqgJnxaInnwaP7LzbzvlYwn5YT5/YRCxrr9ucnG +WnEwdjYCH9B8qRMO4SDZUgysHoh3oCmGOohmU6/DpcnbVLGk6O5Mbj+5ezCjQugC +pr2EbSp8/fTtRbcw+mxcI1ZaPGEqx5vmxfJEtwe/dp1C5Fzw7rk+EPPPUtLNzlIY +f2D2LpVMNQBMRtYQ7DTLWHtqDeRjVcxY2U9jZzHCUqF5DyrPyU7MEsuNGlqqRjET +Ow3pV2haC4QENi+fEbw8eq1av0bjtyCJHdwHfNx66+l2yQANcLeflxpi7xjmZL4I +p6SZu3+MaJqYyYZi9qGYNjmj85ZXpAJj+VU+sIyfv6l6SzzZua4PivS6HCWrVVmh +VsIzuTrEQM+LGvcDDr0bYGN9JdSpvuU= +-----END CERTIFICATE----- + +# SSL.com EV Root Certification Authority RSA R2 +-----BEGIN CERTIFICATE----- +MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV +BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE +CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy +MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G +A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD +DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq +M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf +OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa +4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 +HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR +aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA +b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ +Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV +PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO +pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu +UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY +MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV +HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 +9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW +s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 +Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg +cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM +79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz +/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt +ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm +Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK +QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ +w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi +S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 +mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+w== +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority ECC +-----BEGIN CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority RSA +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7k= +-----END CERTIFICATE----- + +# SecureSign RootCA11 +-----BEGIN CERTIFICATE----- +MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDEr +MCkGA1UEChMiSmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoG +A1UEAxMTU2VjdXJlU2lnbiBSb290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0 +MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RD +QTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvLTJsz +i1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8 +h9uuywGOwvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOV +MdrAG/LuYpmGYz+/3ZMqg6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9 +UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rPO7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni +8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitAbpSACW22s293bzUIUPsC +h8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZXt94wDgYD +VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AKChOBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xm +KbabfSVSSUOrTC4rbnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQ +X5Ucv+2rIrVls4W6ng+4reV6G4pQOh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWr +QbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01y8hSyn+B/tlr0/cR7SXf+Of5 +pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061lgeLKBObjBmN +QSdJQO7e5iNEOdyhIta6A/I= +-----END CERTIFICATE----- + +# SecureTrust CA +-----BEGIN CERTIFICATE----- +MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz +MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv +cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz +Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO +0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao +wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj +7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS +8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT +BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg +JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 +6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ +3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm +D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS +CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR +3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= +-----END CERTIFICATE----- + +# Secure Global CA +-----BEGIN CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +-----END CERTIFICATE----- + +# Security Communication ECC RootCA1 +-----BEGIN CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= +-----END CERTIFICATE----- + +# Security Communication RootCA2 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 +-----END CERTIFICATE----- + +# Security Communication RootCA3 +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZg== +-----END CERTIFICATE----- + +# Sonera Class2 CA +-----BEGIN CERTIFICATE----- +MIIDIDCCAgigAwIBAgIBHTANBgkqhkiG9w0BAQUFADA5MQswCQYDVQQGEwJGSTEP +MA0GA1UEChMGU29uZXJhMRkwFwYDVQQDExBTb25lcmEgQ2xhc3MyIENBMB4XDTAx +MDQwNjA3Mjk0MFoXDTIxMDQwNjA3Mjk0MFowOTELMAkGA1UEBhMCRkkxDzANBgNV +BAoTBlNvbmVyYTEZMBcGA1UEAxMQU29uZXJhIENsYXNzMiBDQTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJAXSjWdyvANlsdE+hY3/Ei9vX+ALTU74W+o +Z6m/AxxNjG8yR9VBaKQTBME1DJqEQ/xcHf+Js+gXGM2RX/uJ4+q/Tl18GybTdXnt +5oTjV+WtKcT0OijnpXuENmmz/V52vaMtmdOQTiMofRhj8VQ7Jp12W5dCsv+u8E7s +3TmVToMGf+dJQMjFAbJUWmYdPfz56TwKnoG4cPABi+QjVHzIrviQHgCWctRUz2Ej +vOr7nQKV0ba5cTppCD8PtOFCx4j1P5iop7oc4HFx71hXgVB6XGt0Rg6DA5jDjqhu +8nYybieDwnPz3BjotJPqdURrBGAgcVeHnfO+oJAjPYok4doh28MCAwEAAaMzMDEw +DwYDVR0TAQH/BAUwAwEB/zARBgNVHQ4ECgQISqCqWITTXjwwCwYDVR0PBAQDAgEG +MA0GCSqGSIb3DQEBBQUAA4IBAQBazof5FnIVV0sd2ZvnoiYw7JNn39Yt0jSv9zil +zqsWuasvfDXLrNAPtEwr/IDva4yRXzZ299uzGxnq9LIR/WFxRL8oszodv7ND6J+/ +3DEIcbCdjdY0RzKQxmUk96BKfARzjzlvF4xytb1LyHr4e4PDKE6cCepnP7JnBBvD +FNr450kkkdAdavphOe9r5yF1BgfYErQhIHBCcYHaPJo2vqZbDWpsmh+Re/n570K6 +Tk6ezAyNlNzZRZxe7EJQY670XcSxEtzKO6gunRRaBXW37Ndj4ro1tgQIkejanZz2 +ZrUYrAqmVCY0M9IbwdR/GjqOC6oybtv8TyWf2TLHllpwrN9M +-----END CERTIFICATE----- + +# Staat der Nederlanden Root CA +-----BEGIN CERTIFICATE----- +MIIDujCCAqKgAwIBAgIEAJiWijANBgkqhkiG9w0BAQUFADBVMQswCQYDVQQGEwJO +TDEeMBwGA1UEChMVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSYwJAYDVQQDEx1TdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQTAeFw0wMjEyMTcwOTIzNDlaFw0xNTEy +MTYwOTE1MzhaMFUxCzAJBgNVBAYTAk5MMR4wHAYDVQQKExVTdGFhdCBkZXIgTmVk +ZXJsYW5kZW4xJjAkBgNVBAMTHVN0YWF0IGRlciBOZWRlcmxhbmRlbiBSb290IENB +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmNK1URF6gaYUmHFtvszn +ExvWJw56s2oYHLZhWtVhCb/ekBPHZ+7d89rFDBKeNVU+LCeIQGv33N0iYfXCxw71 +9tV2U02PjLwYdjeFnejKScfST5gTCaI+Ioicf9byEGW07l8Y1Rfj+MX94p2i71MO +hXeiD+EwR+4A5zN9RGcaC1Hoi6CeUJhoNFIfLm0B8mBF8jHrqTFoKbt6QZ7GGX+U +tFE5A3+y3qcym7RHjm+0Sq7lr7HcsBthvJly3uSJt3omXdozSVtSnA71iq3DuD3o +BmrC1SoLbHuEvVYFy4ZlkuxEK7COudxwC0barbxjiDn622r+I/q85Ej0ZytqERAh +SQIDAQABo4GRMIGOMAwGA1UdEwQFMAMBAf8wTwYDVR0gBEgwRjBEBgRVHSAAMDww +OgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cucGtpb3ZlcmhlaWQubmwvcG9saWNpZXMv +cm9vdC1wb2xpY3kwDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSofeu8Y6R0E3QA +7Jbg0zTBLL9s+DANBgkqhkiG9w0BAQUFAAOCAQEABYSHVXQ2YcG70dTGFagTtJ+k +/rvuFbQvBgwp8qiSpGEN/KtcCFtREytNwiphyPgJWPwtArI5fZlmgb9uXJVFIGzm +eafR2Bwp/MIgJ1HI8XxdNGdphREwxgDS1/PTfLbwMVcoEoJz6TMvplW0C5GUR5z6 +u3pCMuiufi3IvKwUv9kP2Vv8wfl6leF9fpb8cbDCTMjfRTTJzg3ynGQI0DvDKcWy +7ZAEwbEpkcUwb8GpcjPM/l0WFywRaed+/sWDCN+83CI6LiBpIzlWYGeQiy52OfsR +iJf2fL1LuCAWZwWN4jvBcj+UlTfHXbme2JOhF4//DGYVwSR8MnwDHTuhWEUykw== +-----END CERTIFICATE----- + +# Staat der Nederlanden Root CA - G2 +-----BEGIN CERTIFICATE----- +MIIFyjCCA7KgAwIBAgIEAJiWjDANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJO +TDEeMBwGA1UECgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSswKQYDVQQDDCJTdGFh +dCBkZXIgTmVkZXJsYW5kZW4gUm9vdCBDQSAtIEcyMB4XDTA4MDMyNjExMTgxN1oX +DTIwMDMyNTExMDMxMFowWjELMAkGA1UEBhMCTkwxHjAcBgNVBAoMFVN0YWF0IGRl +ciBOZWRlcmxhbmRlbjErMCkGA1UEAwwiU3RhYXQgZGVyIE5lZGVybGFuZGVuIFJv +b3QgQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMVZ5291 +qj5LnLW4rJ4L5PnZyqtdj7U5EILXr1HgO+EASGrP2uEGQxGZqhQlEq0i6ABtQ8Sp +uOUfiUtnvWFI7/3S4GCI5bkYYCjDdyutsDeqN95kWSpGV+RLufg3fNU254DBtvPU +Z5uW6M7XxgpT0GtJlvOjCwV3SPcl5XCsMBQgJeN/dVrlSPhOewMHBPqCYYdu8DvE +pMfQ9XQ+pV0aCPKbJdL2rAQmPlU6Yiile7Iwr/g3wtG61jj99O9JMDeZJiFIhQGp +5Rbn3JBV3w/oOM2ZNyFPXfUib2rFEhZgF1XyZWampzCROME4HYYEhLoaJXhena/M +UGDWE4dS7WMfbWV9whUYdMrhfmQpjHLYFhN9C0lK8SgbIHRrxT3dsKpICT0ugpTN +GmXZK4iambwYfp/ufWZ8Pr2UuIHOzZgweMFvZ9C+X+Bo7d7iscksWXiSqt8rYGPy +5V6548r6f1CGPqI0GAwJaCgRHOThuVw+R7oyPxjMW4T182t0xHJ04eOLoEq9jWYv +6q012iDTiIJh8BIitrzQ1aTsr1SIJSQ8p22xcik/Plemf1WvbibG/ufMQFxRRIEK +eN5KzlW/HdXZt1bv8Hb/C3m1r737qWmRRpdogBQ2HbN/uymYNqUg+oJgYjOk7Na6 +B6duxc8UpufWkjTYgfX8HV2qXB72o007uPc5AgMBAAGjgZcwgZQwDwYDVR0TAQH/ +BAUwAwEB/zBSBgNVHSAESzBJMEcGBFUdIAAwPzA9BggrBgEFBQcCARYxaHR0cDov +L3d3dy5wa2lvdmVyaGVpZC5ubC9wb2xpY2llcy9yb290LXBvbGljeS1HMjAOBgNV +HQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJFoMocVHYnitfGsNig0jQt8YojrMA0GCSqG +SIb3DQEBCwUAA4ICAQCoQUpnKpKBglBu4dfYszk78wIVCVBR7y29JHuIhjv5tLyS +CZa59sCrI2AGeYwRTlHSeYAz+51IvuxBQ4EffkdAHOV6CMqqi3WtFMTC6GY8ggen +5ieCWxjmD27ZUD6KQhgpxrRW/FYQoAUXvQwjf/ST7ZwaUb7dRUG/kSS0H4zpX897 +IZmflZ85OkYcbPnNe5yQzSipx6lVu6xiNGI1E0sUOlWDuYaNkqbG9AclVMwWVxJK +gnjIFNkXgiYtXSAfea7+1HAWFpWD2DU5/1JddRwWxRNVz0fMdWVSSt7wsKfkCpYL ++63C4iWEst3kvX5ZbJvw8NjnyvLplzh+ib7M+zkXYT9y2zqR2GUBGR2tUKRXCnxL +vJxxcypFURmFzI79R6d0lR2o0a9OF7FpJsKqeFdbxU2n5Z4FF5TKsl+gSRiNNOkm +bEgeqmiSBeGCc1qb3AdbCG19ndeNIdn8FCCqwkXfP+cAslHkwvgFuXkajDTznlvk +N1trSt8sV4pAWja63XVECDdCcAz+3F4hoKOKwJCcaNpQ5kUQR3i2TtJlycM33+FC +Y7BXN0Ute4qcvwXqZVUz9zkQxSgqIXobisQk+T8VyJoVIPVVYpbtbZNQvOSqeK3Z +ywplh6ZmwcSBo3c6WB4L7oOLnR7SUqTMHW+wmG2UMbX4cQrcufx9MmDm66+KAQ== +-----END CERTIFICATE----- + +# Starfield Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q= +-----END CERTIFICATE----- + +# Starfield Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs +ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw +MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 +b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj +aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp +Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg +nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 +HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N +Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN +dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 +HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G +CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU +sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 +4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg +8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K +pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 +mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 +-----END CERTIFICATE----- + +# Starfield Services Root Certificate Authority +-----BEGIN CERTIFICATE----- +MIIEfjCCA2agAwIBAgIBADANBgkqhkiG9w0BAQUFADCBzzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOjA4BgNVBAsTMWh0dHA6Ly9j +ZXJ0aWZpY2F0ZXMuc3RhcmZpZWxkdGVjaC5jb20vcmVwb3NpdG9yeS8xNjA0BgNV +BAMTLVN0YXJmaWVsZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0 +eTAeFw0wODA2MDIwMDAwMDBaFw0yOTEyMzEyMzU5NTlaMIHPMQswCQYDVQQGEwJV +UzEQMA4GA1UECBMHQXJpem9uYTETMBEGA1UEBxMKU2NvdHRzZGFsZTElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjE6MDgGA1UECxMxaHR0cDov +L2NlcnRpZmljYXRlcy5zdGFyZmllbGR0ZWNoLmNvbS9yZXBvc2l0b3J5LzE2MDQG +A1UEAxMtU3RhcmZpZWxkIFNlcnZpY2VzIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y +aXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA8sxWKk3mFjdal+pt +NTjREJvbuNypBAmVMy4JxQB7GnhCj8j0BY7+0miDHk6ZzRfbRz5Q84nS59yY+wX4 +qtZj9FRNwXEDsB8bdrMaNDBz8SgyYIP9tJzXttIiN3wZqjveExBpblwG02+j8mZa +dkJIr4DRVFk91LnU2+25qzmZ9O5iq+F4cnvYOI1AtszcEgBwQ4Vp2Bjjyldyn7Tf +P/wiqEJS9XdbmfBWLSZwFjYSwieeV6Z80CPxedyjk1goOD2frTZD7jf7+PlDrchW +8pQSXkLrc7gTDcum1Ya5qihqVAOhPw8p6wkA6D9eon8XPaEr+L7QdR2khOOrF2UG +UgCvsQIDAQABo2MwYTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQUtMZ/GkPMm3VdL8RL8ouYEOnxURAwHwYDVR0jBBgwFoAUtMZ/GkPM +m3VdL8RL8ouYEOnxURAwDQYJKoZIhvcNAQEFBQADggEBAKyAu8QlBQtYpOR+KX6v +vDvsLcBELvmR4NI7MieQLfaACVzCq2Uk2jgQRsRJ0v2aqyhId4jG6W/RR5HVNU8U +CahbQAcdfHFWy4lC1L9hwCL3Lt+r83JDi0DolOuwJtrRE9Or0DYtLjqVs3cuFTkY +DGm6qoDt8VNOM5toBOKgMC7X0V3UpmadhObnuzyJuzad/BepPVUrivubxEyE/9/S +vmkbdLCo9uqwnLIpdIFMaDqaf3MlOfUT4GaRadRXS7furUXgLMOI076USYkf/3DV +W205E7Ady5jmZ2MNY/b7w9dhcoOIP3B+U8meiVTWT399cbmu8WCLd2Ds+L/6aqOc +ASI= +-----END CERTIFICATE----- + +# Starfield Services Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs +ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 +MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy +ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy +dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p +OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 +8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K +Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe +hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk +6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q +AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI +bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB +ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z +qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd +iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn +0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN +sSi6 +-----END CERTIFICATE----- + +# StartCom Certification Authority +-----BEGIN CERTIFICATE----- +MIIHyTCCBbGgAwIBAgIBATANBgkqhkiG9w0BAQUFADB9MQswCQYDVQQGEwJJTDEW +MBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwg +Q2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3RhcnRDb20gQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwHhcNMDYwOTE3MTk0NjM2WhcNMzYwOTE3MTk0NjM2WjB9 +MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMi +U2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UEAxMgU3Rh +cnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDBiNsJvGxGfHiflXu1M5DycmLWwTYgIiRezul38kMKogZk +pMyONvg45iPwbm2xPN1yo4UcodM9tDMr0y+v/uqwQVlntsQGfQqedIXWeUyAN3rf +OQVSWff0G0ZDpNKFhdLDcfN1YjS6LIp/Ho/u7TTQEceWzVI9ujPW3U3eCztKS5/C +Ji/6tRYccjV3yjxd5srhJosaNnZcAdt0FCX+7bWgiA/deMotHweXMAEtcnn6RtYT +Kqi5pquDSR3l8u/d5AGOGAqPY1MWhWKpDhk6zLVmpsJrdAfkK+F2PrRt2PZE4XNi +HzvEvqBTViVsUQn3qqvKv3b9bZvzndu/PWa8DFaqr5hIlTpL36dYUNk4dalb6kMM +Av+Z6+hsTXBbKWWc3apdzK8BMewM69KN6Oqce+Zu9ydmDBpI125C4z/eIT574Q1w ++2OqqGwaVLRcJXrJosmLFqa7LH4XXgVNWG4SHQHuEhANxjJ/GP/89PrNbpHoNkm+ +Gkhpi8KWTRoSsmkXwQqQ1vp5Iki/untp+HDH+no32NgN0nZPV/+Qt+OR0t3vwmC3 +Zzrd/qqc8NSLf3Iizsafl7b4r4qgEKjZ+xjGtrVcUjyJthkqcwEKDwOzEmDyei+B +26Nu/yYwl/WL3YlXtq09s68rxbd2AvCl1iuahhQqcvbjM4xdCUsT37uMdBNSSwID +AQABo4ICUjCCAk4wDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAa4wHQYDVR0OBBYE +FE4L7xqkQFulF2mHMMo0aEPQQa7yMGQGA1UdHwRdMFswLKAqoCiGJmh0dHA6Ly9j +ZXJ0LnN0YXJ0Y29tLm9yZy9zZnNjYS1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3Js +LnN0YXJ0Y29tLm9yZy9zZnNjYS1jcmwuY3JsMIIBXQYDVR0gBIIBVDCCAVAwggFM +BgsrBgEEAYG1NwEBATCCATswLwYIKwYBBQUHAgEWI2h0dHA6Ly9jZXJ0LnN0YXJ0 +Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRwOi8vY2VydC5zdGFy +dGNvbS5vcmcvaW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYgU3Rh +cnQgQ29tbWVyY2lhbCAoU3RhcnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlh +YmlsaXR5LCByZWFkIHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2Yg +dGhlIFN0YXJ0Q29tIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFp +bGFibGUgYXQgaHR0cDovL2NlcnQuc3RhcnRjb20ub3JnL3BvbGljeS5wZGYwEQYJ +YIZIAYb4QgEBBAQDAgAHMDgGCWCGSAGG+EIBDQQrFilTdGFydENvbSBGcmVlIFNT +TCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTANBgkqhkiG9w0BAQUFAAOCAgEAFmyZ +9GYMNPXQhV59CuzaEE44HF7fpiUFS5Eyweg78T3dRAlbB0mKKctmArexmvclmAk8 +jhvh3TaHK0u7aNM5Zj2gJsfyOZEdUauCe37Vzlrk4gNXcGmXCPleWKYK34wGmkUW +FjgKXlf2Ysd6AgXmvB618p70qSmD+LIU424oh0TDkBreOKk8rENNZEXO3SipXPJz +ewT4F+irsfMuXGRuczE6Eri8sxHkfY+BUZo7jYn0TZNmezwD7dOaHZrzZVD1oNB1 +ny+v8OqCQ5j4aZyJecRDjkZy42Q2Eq/3JR44iZB3fsNrarnDy0RLrHiQi+fHLB5L +EUTINFInzQpdn4XBidUaePKVEFMy3YCEZnXZtWgo+2EuvoSoOMCZEoalHmdkrQYu +L6lwhceWD3yJZfWOQ1QOq92lgDmUYMA0yZZwLKMS9R9Ie70cfmu3nZD0Ijuu+Pwq +yvqCUqDvr0tVk+vBtfAii6w0TiYiBKGHLHVKt+V9E9e4DGTANtLJL4YSjCMJwRuC +O3NJo2pXh5Tl1njFmUNj403gdy3hZZlyaQQaRwnmDwFWJPsfvw55qVguucQJAX6V +um0ABj6y6koQOdjQK/W/7HW/lwLFCRsI3FU34oH7N4RDYiDK51ZLZer+bMEkkySh +NOsF/5oirpt9P/FlUQqmMGqz9IgcgA38corog14= +-----END CERTIFICATE----- + +# StartCom Certification Authority G2 +-----BEGIN CERTIFICATE----- +MIIFYzCCA0ugAwIBAgIBOzANBgkqhkiG9w0BAQsFADBTMQswCQYDVQQGEwJJTDEW +MBQGA1UEChMNU3RhcnRDb20gTHRkLjEsMCoGA1UEAxMjU3RhcnRDb20gQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkgRzIwHhcNMTAwMTAxMDEwMDAxWhcNMzkxMjMxMjM1 +OTAxWjBTMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjEsMCoG +A1UEAxMjU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgRzIwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2iTZbB7cgNr2Cu+EWIAOVeq8Oo1XJ +JZlKxdBWQYeQTSFgpBSHO839sj60ZwNq7eEPS8CRhXBF4EKe3ikj1AENoBB5uNsD +vfOpL9HG4A/LnooUCri99lZi8cVytjIl2bLzvWXFDSxu1ZJvGIsAQRSCb0AgJnoo +D/Uefyf3lLE3PbfHkffiAez9lInhzG7TNtYKGXmu1zSCZf98Qru23QumNK9LYP5/ +Q0kGi4xDuFby2X8hQxfqp0iVAXV16iulQ5XqFYSdCI0mblWbq9zSOdIxHWDirMxW +RST1HFSr7obdljKF+ExP6JV2tgXdNiNnvP8V4so75qbsO+wmETRIjfaAKxojAuuK +HDp2KntWFhxyKrOq42ClAJ8Em+JvHhRYW6Vsi1g8w7pOOlz34ZYrPu8HvKTlXcxN +nw3h3Kq74W4a7I/htkxNeXJdFzULHdfBR9qWJODQcqhaX2YtENwvKhOuJv4KHBnM +0D4LnMgJLvlblnpHnOl68wVQdJVznjAJ85eCXuaPOQgeWeU1FEIT/wCc976qUM/i +UUjXuG+v+E5+M5iSFGI6dWPPe/regjupuznixL0sAA7IF6wT700ljtizkC+p2il9 +Ha90OrInwMEePnWjFqmveiJdnxMaz6eg6+OGCtP95paV1yPIN93EfKo2rJgaErHg +TuixO/XWb/Ew1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjAdBgNVHQ4EFgQUS8W0QGutHLOlHGVuRjaJhwUMDrYwDQYJKoZIhvcNAQEL +BQADggIBAHNXPyzVlTJ+N9uWkusZXn5T50HsEbZH77Xe7XRcxfGOSeD8bpkTzZ+K +2s06Ctg6Wgk/XzTQLwPSZh0avZyQN8gMjgdalEVGKua+etqhqaRpEpKwfTbURIfX +UfEpY9Z1zRbkJ4kd+MIySP3bmdCPX1R0zKxnNBFi2QwKN4fRoxdIjtIXHfbX/dtl +6/2o1PXWT6RbdejF0mCy2wl+JYt7ulKSnj7oxXehPOBKc2thz4bcQ///If4jXSRK +9dNtD2IEBVeC2m6kMyV5Sy5UGYvMLD0w6dEG/+gyRr61M3Z3qAFdlsHB1b6uJcDJ +HgoJIIihDsnzb02CVAAgp9KP5DlUFy6NHrgbuxu9mk47EDTcnIhT76IxW1hPkWLI +wpqazRVdOKnWvvgTtZ8SafJQYqz7Fzf07rh1Z2AQ+4NQ+US1dZxAF7L+/XldblhY +XzD8AK6vM8EOTmy6p6ahfzLbOOCxchcKK5HsamMm7YnUeMx0HgX4a/6ManY5Ka5l +IxKVCCIcl85bBu4M4ru8H0ST9tg4RQUh7eStqxK2A6RCLi3ECToDZ2mEmuFZkIoo +hdVddLHRDiBYmxOlsGOm7XtH/UVVMKTumtTm4ofvmMkyghEpIrwACjFeLQ/Ajulr +so8uBtjRkcfGEvRM/TAXw8HaOFvjqermobp573PYtlNXLfbQ4ddI +-----END CERTIFICATE----- + +# Swedish Government Root Authority v2 +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIQVBIVn6uKdZNElMp3QFYu7zANBgkqhkiG9w0BAQsFADBm +MQswCQYDVQQGEwJTRTEoMCYGA1UEChMfU3dlZGlzaCBTb2NpYWwgSW5zdXJhbmNl +IEFnZW5jeTEtMCsGA1UEAxMkU3dlZGlzaCBHb3Zlcm5tZW50IFJvb3QgQXV0aG9y +aXR5IHYyMB4XDTE1MDUwNTExMTUyM1oXDTQwMDUwNTExMjQxOVowZjELMAkGA1UE +BhMCU0UxKDAmBgNVBAoTH1N3ZWRpc2ggU29jaWFsIEluc3VyYW5jZSBBZ2VuY3kx +LTArBgNVBAMTJFN3ZWRpc2ggR292ZXJubWVudCBSb290IEF1dGhvcml0eSB2MjCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMiutUO8QkVLNWM/AkvF/9s2 +1yfFwq5FZqNxhxZNiU9hlOBWRrjQRBPmc5DwYXhBiuAafjesAim+6P8CJsYafAqx +j2QpotoHitUkhWgZkjLfnylgWG0qhYARNsm2wtOehAy6URHMVOmrBjASjyB3BcDG +jZqbWci2hehwBwKxHv/Xac8WRothL0LNUqbYDnovhy3GLzwiQ7GTfsMWdtnM14vs +ERvQyXEUwolJfvGkEKo1PKgbu//sMkDlvSrzpgETyIyXGZDOY/mwa333+YrObuCF +59uU1XogJaA18Kn3r1ooWgzI83Q5izE7IsxJJclvuFx6LiyW4y+jPsp5d2mRWvjw +xVM3TlNtSSdWYsrl+XNgqRc7W6Ilry17ybfbzxkROjNxOVlaA+nnLAz/bZxyY2OA +BVhThtwodRbC5fATWaGB/wUMmai2PGwuxQ4AmIHpg3dmQztajoVFTLLPuT3knDaT +QHpTFSnUEZC6oWCKnav0Skpq3Yeqwe0F2p5bVuGITyprlSiGZlCh79pKspAKNjdJ +hZdCeAdn5psgoQxsyc/P/neVhFp6Oxew70z3LZGqzxlvxvkSKOceCqaWzSGwA2JQ +gwYg5uje30MWFrmBoPCBNFvLwYn28+giuM64Uj5RHrEFuLcDKwusdHVTJOF2uE8l +dl3v0Zrzbkq4fEv4isAZAgMBAAGjgbQwgbEwDgYDVR0PAQH/BAQDAgEGMBIGA1Ud +EwEB/wQIMAYBAf8CAQEwHQYDVR0OBBYEFGNrQmBTVxG7yCSJJQJmRHShDSVuMBAG +CSsGAQQBgjcVAQQDAgEAMBEGA1UdIAQKMAgwBgYEVR0gADBHBgNVHSUEQDA+Bggr +BgEFBQcDAQYIKwYBBQUHAwIGCCsGAQUFBwMEBgorBgEEAYI3CgMMBggrBgEFBQcD +AwYIKwYBBQUHAwgwDQYJKoZIhvcNAQELBQADggIBACMuqoWXS6RcEK/a+D29k1gv +ePsZdwM5FkdJclXMh+i9pH/SqySs59RQ7p3Yg8aZIPsWL4jGFzfKix6r0OJsB1i4 +ZJGhEKFpN3Ve/tpzFOaKa77CYCEvwPmjBEg2Wze+2mz96ZaOnvFTfI9lRKdVfQuU +TlT2/zK9L32cpV5CxEwp4xBkL+bPWjs0VShh0ScSu25Um4FYrNVenVcDoE3R/zd0 +po3z+ZX9Kol1enk3/SZ5Lydzf6kZIOXQX5jolgWPmHnpeRBBKQFD9Wk3zFAQaLXY +RE4O8pnjJyxqjl+7fbtrcUsGit0q2Ao/W8hyLlhhCg+BaB5Hx+ktuu+N3A6jI8Oy +LbVHsYu0PidI59wIYgxU/kPXlUq/By9KQH4GpVGHJokF3TzKT/4cJ+nbiB7Asv7j +7x9+sehZlaBPqwqJAOBzsuccwRdQgIdM0kMZWZXSWxRbClvAfIlxerUKwIpFL+7E +wP5ULeeVJHcFLu50xqCQsXPcQtagdclYWQWi3hG/WekNpybCbsBGisYe0/XqD309 +cs0ZlUy64GiXjVjAau9597JoarhyNsMkDOgy7b3xn8jv3nXS23aplCc49AFhv2Y4 +j2o93ABbs/xE3wNL+fF2JTX/Uh8IHdClFOmLBit4gyxxXE+Rh2PWDA4FiDyUoLFa +VBbf3VHDqDYuLIJ8uZqw +-----END CERTIFICATE----- + +# Swedish Government Root Authority v3 +-----BEGIN CERTIFICATE----- +MIIFqjCCA5KgAwIBAgIQMmmiv0BrjbRHg2Q8iw3JQzANBgkqhkiG9w0BAQsFADBm +MQswCQYDVQQGEwJTRTEoMCYGA1UEChMfU3dlZGlzaCBTb2NpYWwgSW5zdXJhbmNl +IEFnZW5jeTEtMCsGA1UEAxMkU3dlZGlzaCBHb3Zlcm5tZW50IFJvb3QgQXV0aG9y +aXR5IHYzMB4XDTE1MDkyOTExMzIzMloXDTQwMDkyOTExNDIwOVowZjELMAkGA1UE +BhMCU0UxKDAmBgNVBAoTH1N3ZWRpc2ggU29jaWFsIEluc3VyYW5jZSBBZ2VuY3kx +LTArBgNVBAMTJFN3ZWRpc2ggR292ZXJubWVudCBSb290IEF1dGhvcml0eSB2MzCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALoeomkbaE9cj7r0I8deZgV4 +hTZYo6J/Z++iDBaSpEqL4KCSh1U3C8TRxNBAQ5cyUE/slUe3P69DBeWElwnvVlTn +QzNH/a3xOpuYpOHkUaO5rIwL7iUGCfLTujVnYYzCvSbL12PM14Mz2Uzi7/kbn6jL +DXYBLXLJIrtokd6QDzs9tEK9GX2fhFw8fkI3hrFgwkiHUk5cV/7Okq7KPla3s56V +mpT4L6HQoi7CVFpszMzWrUtH0C6HgjOoe1A5pyossVsnCp+t9RTr/I1TsnMrVCP0 +jJeZl/s13My1+jMUJo11pySm6BQuLaaAKIOaP7jKO8f1GOD97I55+6pCbEpLFn7z +ggNuuucRBqWfhCvSYG3pRu5BWpa5FP0cP4YS8VQmJv1ngC/lqC0oLkO3ZMLv5Ld+ +ltyEiyfZdj2YgVMU3EJFoVRn+doYZpAKtEeQPAHlK6Nm72/7MoPxM30yIWylRRU/ +L/NVkUiTnyXPLTw5O1INGq/H36tvgNiQy55xcmpCaZPqkgA9SQTZo1y6RfsCEP+t +aXRSpThjmmaIBLIRuhOqOdWDX+1lW1PInVyyhaB4cDVNXCQQpPYxKpJVQdnzF2yZ +E1j63SjQbBO9W4eNk4OtWClWFbRYJ0qbEWygpmdFOs7Q2M7/kDPsWjFND1IS+632 +YV/kL28NZjDloE/Pz/1fAgMBAAGjVDBSMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MB0GA1UdDgQWBBScvAHnq2Q19TGbjbX7F5mIAsub8jAQBgkrBgEE +AYI3FQEEAwIBADANBgkqhkiG9w0BAQsFAAOCAgEAh6tq5OdrJFI99iKDT1MERTKc +YVoWXJxEtaPRltBA/s9mFV5+QAAgFf2nqmTap2FmaMLdUnEloGq53cDNzoYI1Dw1 +ES999G/S2gyXA2WXg7Q+OssJdI3rBcp66YCwt1EtIpPjmhnu7ZcIIYOtxwqRX8TK +216vuOeMujpJ0lUDNRkZUErihqe7eD2V/bEfRvJPZvL7v4VktgojGJIJnklFMbbW +FFee/IlFdH85zMBqaMjPR9DhHsfTLy35LCQ7/Gq6lBPezHLyoh3LH5/Vg3cmXn6b +oK9pn3jbpcFucVxIQk4r2Hi41Q+lP2zLj5DNR9iQGUmF1mz84quqQr/LE5e/aUR1 +YzUt2qDH/WH3ykE9VJz0NsDkbiFIn11xYoHT8iXmWYxZQSZIp+PrZ2rT7DS3mPfM +yqM2BpXnyDBZ9//JodHkebzfEx8u2bN10QS3IwkhzB0hHCecDiv6wYcYyfr5SYOM +Ehb7xRLOOw9C+vAFZX6ox+tSSvmYXnGjrBLHKHEaWnXPh8ofNygcFJ2QUG/Gv0rM +xyXPMd1bkU52qBHVdmbZv4BzYrDsw/5EvM1ZEwsMLdihzKpiTVRFXqRSo4xXPBQx +k1TOpRZUXi1Cs+5lqbadP2zOYdlWy97qoFbebYYD+reBaozS2PPXtsCsKYRZIw6b +l2rmoM7VKlQY71CYeSA= +-----END CERTIFICATE----- + +# SwissSign Gold CA - G2 +-----BEGIN CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ +-----END CERTIFICATE----- + +# SwissSign Gold Root CA - G3 +-----BEGIN CERTIFICATE----- +MIIFejCCA2KgAwIBAgIJAN7E8kTzHab8MA0GCSqGSIb3DQEBCwUAMEoxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJDAiBgNVBAMTG1N3aXNzU2ln +biBHb2xkIFJvb3QgQ0EgLSBHMzAeFw0wOTA4MDQxMzMxNDdaFw0zNzA4MDQxMzMx +NDdaMEoxCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJDAiBgNV +BAMTG1N3aXNzU2lnbiBHb2xkIFJvb3QgQ0EgLSBHMzCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAMPon8hlWp1nG8FFl7S0h0NbYWCAnvJ/XvlnRN1E+qu1 +q3f/KhlMzm/Ej0Gf4OLNcuDR1FJhQQkKvwpw++CDaWEpytsimlul5t0XlbBvhI46 +PmRaQfsbWPz9Kz6ypOasyYK8zvaV+Jd37Sb2WK6eJ+IPg+zFNljIe8/Vh6GphxoT +Z2EBbaZpnOKQ8StoZfPosHz8gj3erdgKAAlEeROc8P5udXvCvLNZAQt8xdUt8L// +bVfSSYHrtLNQrFv5CxUVjGn/ozkB7fzc3CeXjnuL1Wqm1uAdX80Bkeb1Ipi6LgkY +OG8TqIHS+yE35y20YueBkLDGeVm3Z3X+vo87+jbsr63ST3Q2AeVXqyMEzEpel89+ +xu+MzJUjaY3LOMcZ9taKABQeND1v2gwLw7qX/BFLUmE+vzNnUxC/eBsJwke6Hq9Y +9XWBf71W8etW19lpDAfpNzGwEhwy71bZvnorfL3TPbxqM006PFAQhyfHegpnU9t/ +gJvoniP6+Qg6i6GONFpIM19k05eGBxl9iJTOKnzFat+vvKmfzTqmurtU+X+P388O +WsStmryzOndzg0yTPJBotXxQlRHIgl6UcdBBGPvJxmXszom2ziKzEVs/4J0+Gxho +DaoDoWdZv2udvPjyZS+aQTpF2F7QNmxvOx5jtI6YTBPbIQ6fe+3qoKpxw+ujoNIl +AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBRclwZGNKvfMMV8xQ1VcWYwtWCPnjAfBgNVHSMEGDAWgBRclwZGNKvfMMV8 +xQ1VcWYwtWCPnjANBgkqhkiG9w0BAQsFAAOCAgEAd0tN3uqFSqssJ9ZFx/FfIMFb +YO0Hy6Iz3DbPx5TxBsfV2s/NrYQ+/xJIf0HopWZXMMQd5KcaLy1Cwe9Gc7LV9Vr9 +Dnpr0sgxow1IlldlY1UYwPzkisyYhlurDIonN/ojaFlcJtehwcK5Tiz/KV7mlAu+ +zXJPleiP9ve4Pl7Oz54RyawDKUiKqbamNLmsQP/EtnM3scd/qVHbSypHX0AkB4gG +tySz+3/3sIsz+r8jdaNc/qplGsK+8X2BdwOBsY3XlQ16PEKYt4+pfVDh31IGmqBS +VHiDB2FSCTdeipynxlHRXGPRhNzC29L6Wxg2fWa81CiXL3WWHIQHrIuOUxG+JCGq +Z/LBrYic07B4Z3j101gDIApdIPG152XMDiDj1d/mLxkrhWjBBCbPj+0FU6HdBw7r +QSbHtKksW+NpPWbAYhvAqobAN8MxBIZwOb5rXyFAQaB/5dkPOEtwX0n4hbgrLqof +k0FD+PuydDwfS1dbt9RRoZJKzr4Qou7YFCJ7uUG9jemIqdGPAxpg/z+HiaCZJyJm +sD5onnKIUTidEz5FbQXlRrVz7UOGsRQKHrzaDb8eJFxmjw6+of3G62m8Q3nXA3b5 +3IeZuJjEzX9tEPkQvixC/pwpTYNrCr21jsRIiv0hB6aAfR+b6au9gmFECnEnX22b +kJ6u/zYks2gD1pWMa3M= +-----END CERTIFICATE----- + +# SwissSign Platinum CA - G2 +-----BEGIN CERTIFICATE----- +MIIFwTCCA6mgAwIBAgIITrIAZwwDXU8wDQYJKoZIhvcNAQEFBQAwSTELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEjMCEGA1UEAxMaU3dpc3NTaWdu +IFBsYXRpbnVtIENBIC0gRzIwHhcNMDYxMDI1MDgzNjAwWhcNMzYxMDI1MDgzNjAw +WjBJMQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMSMwIQYDVQQD +ExpTd2lzc1NpZ24gUGxhdGludW0gQ0EgLSBHMjCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAMrfogLi2vj8Bxax3mCq3pZcZB/HL37PZ/pEQtZ2Y5Wu669y +IIpFR4ZieIbWIDkm9K6j/SPnpZy1IiEZtzeTIsBQnIJ71NUERFzLtMKfkr4k2Htn +IuJpX+UFeNSH2XFwMyVTtIc7KZAoNppVRDBopIOXfw0enHb/FZ1glwCNioUD7IC+ +6ixuEFGSzH7VozPY1kneWCqv9hbrS3uQMpe5up1Y8fhXSQQeol0GcN1x2/ndi5ob +jM89o03Oy3z2u5yg+gnOI2Ky6Q0f4nIoj5+saCB9bzuohTEJfwvH6GXp43gOCWcw +izSC+13gzJ2BbWLuCB4ELE6b7P6pT1/9aXjvCR+htL/68++QHkwFix7qepF6w9fl ++zC8bBsQWJj3Gl/QKTIDE0ZNYWqFTFJ0LwYfexHihJfGmfNtf9dng34TaNhxKFrY +zt3oEBSa/m0jh26OWnA81Y0JAKeqvLAxN23IhBQeW71FYyBrS3SMvds6DsHPWhaP +pZjydomyExI7C3d3rLvlPClKknLKYRorXkzig3R3+jVIeoVNjZpTxN94ypeRSCtF +KwH3HBqi7Ri6Cr2D+m+8jVeTO9TUps4e8aCxzqv9KyiaTxvXw3LbpMS/XUz13XuW +ae5ogObnmLo2t/5u7Su9IPhlGdpVCX4l3P5hYnL5fhgC72O00Puv5TtjjGePAgMB +AAGjgawwgakwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFFCvzAeHFUdvOMW0ZdHelarp35zMMB8GA1UdIwQYMBaAFFCvzAeHFUdvOMW0 +ZdHelarp35zMMEYGA1UdIAQ/MD0wOwYJYIV0AVkBAQEBMC4wLAYIKwYBBQUHAgEW +IGh0dHA6Ly9yZXBvc2l0b3J5LnN3aXNzc2lnbi5jb20vMA0GCSqGSIb3DQEBBQUA +A4ICAQAIhab1Fgz8RBrBY+D5VUYI/HAcQiiWjrfFwUF1TglxeeVtlspLpYhg0DB0 +uMoI3LQwnkAHFmtllXcBrqS3NQuB2nEVqXQXOHtYyvkv+8Bldo1bAbl93oI9ZLi+ +FHSjClTTLJUYFzX1UWs/j6KWYTl4a0vlpqD4U99REJNi54Av4tHgvI42Rncz7Lj7 +jposiU0xEQ8mngS7twSNC/K5/FqdOxa3L8iYq/6KUFkuozv8KV2LwUvJ4ooTHbG/ +u0IdUt1O2BReEMYxB+9xJ/cbOQncguqLs5WGXv312l0xpuAxtpTmREl0xRbl9x8D +YSjFyMsSoEJL+WuICI20MhjzdZ/EfwBPBZWcoxcCw7NTm6ogOSkrZvqdr16zktK1 +puEa+S1BaYEUtLS17Yk9zvupnTVCRLEcFHOBzyoBNZox1S2PbYTfgE1X4z/FhHXa +icYwu+uPyyIIoK6q8QNsOktNCaUOcsZWayFCTiMlFGiudgp8DAdwZPmaL/YFOSbG +DI8Zf0NebvRbFS/bYV3mZy8/CJT5YLSYMdp08YSTcU1f+2BY0fvEwW2JorsgH51x +kcsymxM9Pn2SUjWskpSi0xjCfMfqr3YFFt1nJ8J+HAciIfNAChs0B0QTwoRqjt8Z +Wr9/6x3iGjjRXK9HkmuAtTClyY3YqzGBH9/CZjfTk6mFhnll0g== +-----END CERTIFICATE----- + +# SwissSign Platinum Root CA - G3 +-----BEGIN CERTIFICATE----- +MIIFgTCCA2mgAwIBAgIIIj+pFyDegZQwDQYJKoZIhvcNAQELBQAwTjELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEoMCYGA1UEAxMfU3dpc3NTaWdu +IFBsYXRpbnVtIFJvb3QgQ0EgLSBHMzAeFw0wOTA4MDQxMzM0MDRaFw0zNzA4MDQx +MzM0MDRaME4xCzAJBgNVBAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxKDAm +BgNVBAMTH1N3aXNzU2lnbiBQbGF0aW51bSBSb290IENBIC0gRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCUoO8TG59EIBvNxaoiu9nyUj56Wlh35o2h +K8ncpPPksxOUAGKbHPJDUEOBfq8wNkmsGIkMGEW4PsdUbePYmllriholqba1Dbd9 +I/BffagHqfc+hi7IAU3c5jbtHeU3B2kSS+OD0QQcJPAfcHHnGe1zSG6VKxW2VuYC +31bpm/rqpu7gwsO64MzGyHvXbzqVmzqPvlss0qmgOD7WiOGxYhOO3KswZ82oaqZj +K4Kwy8c9Tu1y9n2rMk5lAusPmXT4HBoojA5FAJMsFJ9txxue9orce3jjtJRHHU0F +bYR6kFSynot1woDfhzk/n/tIVAeNoCn1+WBfWnLou5ugQuAIADSjFTwT49YaawKy +lCGjnUG8KmtOMzumlDj8PccrM7MuKwZ0rJsQb8VORfddoVYDLA1fer0e3h13kGva +pS2KTOnfQfTnS+x9lUKfTKkJD0OIPz2T5yv0ekjaaMTdEoAxGl0kVCamJCGzTK3a +Fwg2AlfGnIZwyXXJnnxh2HjmuegUafkcECgSXUt1ULo80GdwVVVWS/s9HNjbeU2X +37ie2xcs1TUHuFCp9473Vv96Z0NPINnKZtY4YEvulDHWDaJIm/80aZTGNfWWiO+q +ZsyBputMU/8ydKe2nZhXtLomqfEzM2J+OrADEVf/3G8RI60+xgrQzFS3LcKTHeXC +pozH2O9T9wIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUVio/kFj0F1oUstcIG4VbVGpUGigwHwYDVR0jBBgwFoAUVio/ +kFj0F1oUstcIG4VbVGpUGigwDQYJKoZIhvcNAQELBQADggIBAGztiudDqHknm7jP +hz5kOBiMEUKShjfgWMMb7gQu94TsgxBoDH94LZzCl442ThbYDuprSK1Pnl0NzA2p +PhiFfsxomTk11tifhsEy+01lsyIUS8iFZtoX/3GRrJxWV95xLFZCv/jNDvCi0//S +IhX70HgKfuGwWs6ON9upnueVz2PyLA3S+m/zyNX7ALf3NWcQ03tS7BAy+L/dXsmm +gqTxsL8dLt0l5L1N8DWpkQFH+BAClFvrPusNutUdYyylLqvn4x6j7kuqX7FmAbSC +WvlGS8fx+N8svv113ZY4mjc6bqXmMhVus5DAOYp0pZWgvg0uiXnNKVaOw15XUcQF +bwRVj4HpTL1ZRssqvE3JHfLGTwXkyAQN925P2sM6nNLC9enGJHoUPhxCMKgCRTGp +/FCp3NyGOA9bkz9/CE5qDSc6EHlWwxW4PgaG9tlwZ691eoviWMzGdU8yVcVsFAko +O/KV5GreLCgHraB9Byjd1Fqj6aZ8E4yZC1J429nR3z5aQ3Z/RmBTws3ndkd8Vc20 +OWQQW5VLNV1EgyTV4C4kDMGAbmkAgAZ3CmaCEAxRbzeJV9vzTOW4ue4jZpdgt1Ld +2Zb7uoo7oE3OXvBETJDMIU8bOphrjjGD+YMIUssZwTVr7qEVW4g/bazyNJJTpjAq +E9fmhqhd2ULSx52peovL3+6iMcLl +-----END CERTIFICATE----- + +# SwissSign Silver CA - G2 +-----BEGIN CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u +-----END CERTIFICATE----- + +# SwissSign Silver Root CA - G3 +-----BEGIN CERTIFICATE----- +MIIFfjCCA2agAwIBAgIJAKqIsFoLsXabMA0GCSqGSIb3DQEBCwUAMEwxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxJjAkBgNVBAMTHVN3aXNzU2ln +biBTaWx2ZXIgUm9vdCBDQSAtIEczMB4XDTA5MDgwNDEzMTkxNFoXDTM3MDgwNDEz +MTkxNFowTDELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEmMCQG +A1UEAxMdU3dpc3NTaWduIFNpbHZlciBSb290IENBIC0gRzMwggIiMA0GCSqGSIb3 +DQEBAQUAA4ICDwAwggIKAoICAQC+h5sF5nF8Um9t7Dep6bPczF9/01DqIZsE8D2/ +vo7JpRQWMhDPmfzscK1INmckDBcy1inlSjmxN+umeAxsbxnKTvdR2hro+iE4bJWc +L9aLzDsCm78mmxFFtrg0Wh2mVEhSyJ14cc5ISsyneIPcaKtmHncH0zYYCNfUbWD4 +8HnTMzYJkmO3BJr1p5baRa90GvyC46hbDjo/UleYfrycjMHAslrfxH7+DKZUdoN+ +ut3nKvRKNk+HZS6lujmNWWEp89OOJHCMU5sRpUcHsnUFXA2E2UTZzckmRFduAn2V +AdSrJIbuPXD7V/qwKRTQnfLFl8sJyvHyPefYS5bpiC+eR1GKVGWYSNIS5FR3DAfm +vluc8d0Dfo2E/L7JYtX8yTroibVfwgVSYfCcPuwuTYxykY7IQ8GiKF71gCTc4i+H +O1MA5cvwsnyNeRmgiM14+MWKWnflBqzdSt7mcG6+r771sasOCLDboD+Uxb4Subx7 +J3m1MildrsUgI5IDe1Q5sIkiVG0S48N46jpA/aSTrOktiDzbpkdmTN/YF+0W3hrW +10Fmvx2A8aTgZBEpXgwnBWLr5cQEYtHEnwxqVdZYOJxmD537q1SAmZzsSdaCn9pF +1j9TBgO3/R/shn104KS06DK2qgcj+O8kQZ5jMHj0VN2O8Fo4jhJ/eMdvAlYhM864 +uK1pVQIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAd +BgNVHQ4EFgQUoYxFkwoSYwunV18ySn3hIee3PmYwHwYDVR0jBBgwFoAUoYxFkwoS +YwunV18ySn3hIee3PmYwDQYJKoZIhvcNAQELBQADggIBAIeuYW1IOCrGHNxKLoR4 +ScAjKkW4NU3RBfq5BTPEZL3brVQWKrA+DVoo2qYagHMMxEFvr7g0tnfUW44dC4tG +kES1s+5JGInBSzSzhzV0op5FZ+1FcWa2uaElc9fCrIj70h2na9rAWubYWWQ0l2Ug +MTMDT86tCZ6u6cI+GHW0MyUSuwXsULpxQOK93ohGBSGEi6MrHuswMIm/EfVcRPiR +i0tZRQswDcoMT29jvgT+we3gh/7IzVa/5dyOetTWKU6A26ubP45lByL3RM2WHy3H +9Qm2mHD/ONxQFRGEO3+p8NgkVMgXjCsTSdaZf0XRD46/aXI3Uwf05q79Wz55uQbN +uIF4tE2g0DW65K7/00m8Ne1jxrP846thWgW2C+T/qSq+31ROwktcaNqjMqLJTVcY +UzRZPGaZ1zwCeKdMcdC/2/HEPOcB5gTyRPZIJjAzybEBGesC8cwh+joCMBedyF+A +P90lrAKb4xfevcqSFNJSgVPm6vwwZzKpYvaTFxUHMV4PG2n19Km3fC2z7YREMkco +BzuGaUWpxzaWkHJ02BKmcyPRTrm2ejrEKaFQBhG52fQmbmIIEiAW8AFXF9QFNmeX +61H5/zMkDAUPVr/vPRxSjoreaQ9aH/DVAzFEs5LG6nWorrvHYAOImP/HBIRSkIbh +tJOpUC/o69I2rDBgp9ADE7UK +-----END CERTIFICATE----- + +# Swiss Government Root CA I +-----BEGIN CERTIFICATE----- +MIIINDCCBhygAwIBAgIRAP11BI16YIaTaUyqADxl0z0wDQYJKoZIhvcNAQELBQAw +gaYxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBBdXRob3JpdGll +cyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMIU2VydmljZXMx +IjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxIzAhBgNVBAMTGlN3 +aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJMB4XDTExMDIxNTA5MDAwMFoXDTM1MDIx +NTA4NTk1OVowgaYxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBB +dXRob3JpdGllcyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMI +U2VydmljZXMxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxIzAh +BgNVBAMTGlN3aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJMIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAyA5y9AEvhnsLwmOwjWjtHz3euYObXKFdug82JxEE +rQZUILceoObOvvCZaXIZNWRmMY0svY5CCp/GyqmQLNq8hTAD2TKWlvC+oCINJGzU +xn9aTFEkLVRyCHwz6cwox2ZlI2lrlbTrvuOH52PX5PsHrRKS6+fkCkOyqd/HkLwm +W5H5o7eHnJS5EI2IxVhcMrwW7A5XT/6nk3iP4MU5uweIYMFUZeuHvp8xl3E8+ovI +g2xSluCswO/LaQiVW+Dgu68npMIX8VGfhHZh2CTi/mFtZDVJ6jnEIWK9zOIC/0hr +OK9px7mSLYIRjb0LiYUq6re0ss1L69H6qvDgTAk8Td/2MR2GMKhBiFdwLCdR3s+L +Tj8C8lClF+BnG3IMQTEfAaKWPjzbAradlOYCTvPwGYKyCCMT65HNUdOqRsJzmJg/ +usPumvz6za9yCjcTj/mgULPq+z8svPpjVTX00ry4cdKR6+nKylzsUWaonlkFIi+j +GttP4EViIzxdVfswlSs0os+ntEvAM8k0UZ3TsyvfxeosLMffRB+2jbn+81zNNy+w +bJxKCL3o9db6cOVpMjdcXwvLP+SIAszKs3gvfb9IsyGwH4h5m1qKcdghhCkPSgQx +Kr0NIUTOdJ0m00kd+Iao5RJ3xcBzDFCDapBrocr40JXZNYbHEaM7FMfLhlhWDfuD +9wECAwEAAaOCAlkwggJVMA8GA1UdEwEB/wQFMAMBAf8wgZsGA1UdIASBkzCBkDCB +jQYIYIV0AREDAQAwgYAwQwYIKwYBBQUHAgEWN2h0dHA6Ly93d3cucGtpLmFkbWlu +LmNoL2Nwcy9DUFNfMl8xNl83NTZfMV8xN18zXzFfMC5wZGYwOQYIKwYBBQUHAgIw +LRorVGhpcyBpcyB0aGUgU3dpc3MgR292ZXJubWVudCBSb290IENBIEkgQ1BTLjCB +jgYDVR0fBIGGMIGDMIGAoH6gfIZ6bGRhcDovL2FkbWluZGlyLmFkbWluLmNoOjM4 +OS9jbj1Td2lzcyUyMEdvdmVybm1lbnQlMjBSb290JTIwQ0ElMjBJLG91PUNlcnRp +ZmljYXRpb24lMjBBdXRob3JpdGllcyxvdT1TZXJ2aWNlcyxvPUFkbWluLGM9Q0gw +HQYDVR0OBBYEFLUbg7s7T7LS++UDjtRhXdEajrCiMA4GA1UdDwEB/wQEAwIBBjCB +4wYDVR0jBIHbMIHYgBS1G4O7O0+y0vvlA47UYV3RGo6woqGBrKSBqTCBpjELMAkG +A1UEBhMCQ0gxOzA5BgNVBAoTMlRoZSBGZWRlcmFsIEF1dGhvcml0aWVzIG9mIHRo +ZSBTd2lzcyBDb25mZWRlcmF0aW9uMREwDwYDVQQLEwhTZXJ2aWNlczEiMCAGA1UE +CxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEjMCEGA1UEAxMaU3dpc3MgR292 +ZXJubWVudCBSb290IENBIEmCEQD9dQSNemCGk2lMqgA8ZdM9MA0GCSqGSIb3DQEB +CwUAA4ICAQAl2t94sCbcn5nrM5zJRbpcY1KNbgNzqnRIxQ0L0hcMLAvSxiWD1FTN +B4FUL2d2Jafp13+WR3ekHZtF//HY9p5HDnSME8TyvtYHKBg8mHXB2+uSiCbmBmSO ++dL94pk1gdHYdRe1c+rd6BgilRYZClkqItyGWkNPJWg2qdiTAI9excNhhvDSFAmV +UcR+2FLusI2KiHGl1yin9NwGWCVexFUYCJV0fLgB507Y1vZ8IENIDaPg3lTEqF8A +SUPTRTuCZW7ui6MBIlaa8c4p5QzEa+3nTvixVYGtcf+E+whX5kfKrYf4Rvj68DWE +7bTYiJcid6SPFsg8Z9HhbgSse482zd6lCKwqjfWnHZ/Hw5EhQqOGgbkq2LHpOB1U +CJg5ChHKMg4zzfRM6qhKBukYPkHGz6D24CtrII6nIALrMEGBsOjkrqQYiSvfFPAS +KW14+k1E+7I05a/zjjX3w84sCxi00HmPE78Di2a4tWHUrA79eD0JrbXSLE9WQZmI +RAx+Z+Nkn/paKlh3UWmxzSyapzQQBXT6bkVjy4tSrUeRohLIoiYExdAiHgOzspI3 +VFf9iYN1A20tO7PxpKIQfJyTjaNQhDmLlVlB9gJ2Boq8DpDn2TrrrSZeV1PRb8h1 +4KuRe2uhf/kbUKjc/k0G4RWKpBDrHgbPVEgVlii2Ix8a43ylj/o3Vw== +-----END CERTIFICATE----- + +# Swiss Government Root CA II +-----BEGIN CERTIFICATE----- +MIIIODCCBiCgAwIBAgIQDp8XmaWxPZzL7Abro/AOaTANBgkqhkiG9w0BAQsFADCB +pzELMAkGA1UEBhMCQ0gxOzA5BgNVBAoTMlRoZSBGZWRlcmFsIEF1dGhvcml0aWVz +IG9mIHRoZSBTd2lzcyBDb25mZWRlcmF0aW9uMREwDwYDVQQLEwhTZXJ2aWNlczEi +MCAGA1UECxMZQ2VydGlmaWNhdGlvbiBBdXRob3JpdGllczEkMCIGA1UEAxMbU3dp +c3MgR292ZXJubWVudCBSb290IENBIElJMB4XDTExMDIxNjA5MDAwMFoXDTM1MDIx +NjA4NTk1OVowgacxCzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBB +dXRob3JpdGllcyBvZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMI +U2VydmljZXMxIjAgBgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxJDAi +BgNVBAMTG1N3aXNzIEdvdmVybm1lbnQgUm9vdCBDQSBJSTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAKksEu2/wCLphugcN4KDm2gFbxbjiKgBD8txnn9H +kEvMJXfI8NdpLpFoVyGysgchM+5MpDclmEy0RjJO1vlri1GK7yw38pjV9dS0t+cA +yu/BE16Uq267nL36a4+r+B42Vmk4ZjrQ9DMNADkCqMUcCyG3XCAMYdCtrs6OXtk6 +6d7/R3x4Vw4ccfRgHN3bmhgpr9mAo5+FhGMzke+9dO7dA3rI+uCE5tm9Tn76bk92 +0V0+qOiHRZB5862u9cJdEU0p94gTydWTcwGr3e39r3f7aU7vj1Icz/UsWmzs/oKb +23w5q3UjfjiQT5SOLWJYnvfncvyUW3JWxZ2jrqu1tsDXdlAAPD9HiJJaYNS/Mhum +lEANdnnpPM7ksx3HjPXohjG52CtQSoASidcsUIDmZy+2k5ytrAVSIlMgmQ69l8bh +2nOpHYnyxFnmh+ZWKw6VAhqHxnn+mWrpdOzwEvkUKCCVljovXVe1b/+TvLYoaiyk +KHhGYa9BJKTz+gSO8YoZopFz4nePtKf5nP9uUey9H5YT6GORXodob+vYfC4QT1AY +kMe3dO8zwIHfM+MakytVBCx80iu3Ywz+rXu9tjqXuT0DI3RzA6YsWQBs1dXo7K9C +zNN/cItgYOeyoLaKUkz+CpbLzzqwWAjuHELJhndCbj+0rJAAWEIcQMRuuEXIvDM2 +370nAgMBAAGjggJcMIICWDAPBgNVHRMBAf8EBTADAQH/MIGdBgNVHSAEgZUwgZIw +gY8GCGCFdAERAxUBMIGCMEQGCCsGAQUFBwIBFjhodHRwOi8vd3d3LnBraS5hZG1p +bi5jaC9jcHMvQ1BTXzJfMTZfNzU2XzFfMTdfM18yMV8xLnBkZjA6BggrBgEFBQcC +AjAuGixUaGlzIGlzIHRoZSBTd2lzcyBHb3Zlcm5tZW50IFJvb3QgQ0EgSUkgQ1BT +LjCBjwYDVR0fBIGHMIGEMIGBoH+gfYZ7bGRhcDovL2FkbWluZGlyLmFkbWluLmNo +OjM4OS9jbj1Td2lzcyUyMEdvdmVybm1lbnQlMjBSb290JTIwQ0ElMjBJSSxvdT1D +ZXJ0aWZpY2F0aW9uJTIwQXV0aG9yaXRpZXMsb3U9U2VydmljZXMsbz1BZG1pbixj +PUNIMB0GA1UdDgQWBBTlhG+JaT12ABd/wau9rl/BfbrhYjAOBgNVHQ8BAf8EBAMC +AQYwgeMGA1UdIwSB2zCB2IAU5YRviWk9dgAXf8Grva5fwX264WKhga2kgaowgacx +CzAJBgNVBAYTAkNIMTswOQYDVQQKEzJUaGUgRmVkZXJhbCBBdXRob3JpdGllcyBv +ZiB0aGUgU3dpc3MgQ29uZmVkZXJhdGlvbjERMA8GA1UECxMIU2VydmljZXMxIjAg +BgNVBAsTGUNlcnRpZmljYXRpb24gQXV0aG9yaXRpZXMxJDAiBgNVBAMTG1N3aXNz +IEdvdmVybm1lbnQgUm9vdCBDQSBJSYIQDp8XmaWxPZzL7Abro/AOaTANBgkqhkiG +9w0BAQsFAAOCAgEAgzdXdck4UL9BBpZwwtnH17BaAM2jQE/T0vmKh5GyictdpLxv +Tz5U9so8s8RMi8c+9NnEYt3HVZ7R+dJE5x5Pz+juKxyoAfAzB/vhOxTTz1CRXtjq +QsZ5WIWq+9zbcMqV+fQOYgJwaUQtaE/RcOooUma3cd4l6KGnb7ChJsfXyiBk3MBz +PBCiFB70rcE+FJA5NmOIbyjgYKWR92Lkms/StXGeXTv2mSztkToInLSEhUnj4bqm +tmiztrZPS1xTCldsoQeS9mKeqPqK1vNrpw+yK2a9r0JHCE/o13yfhg/6WoO+LW8A +BLV2hxav3U86lrQ0V7fi/0H/3kIcZsWF68JyH7gcTu4X8mLvCgSsm6uh8u7uokAk +HEfeQosYtKlXs088YjIcrWxErbzVHGM4Pckzpvu8KDdERuN6YvqASDXinhuIGUyz +Qf3ud+BZgBphHjWkQXqzwY1E6cUhWems00TKdoU2FEYKHhY0psQ0d8OCOEghAv4S +bNrX6rDs9s0szPObCmOA0/ULfQQthA3C2Uwrl/HVVPePswrivVg8mfKvORuQ+Tvn +t0XnWmp9wZ8UbzBXmBmgB0Pr7tEIhtdJnBIKADsPp0GxSquQs9S9CeeID54kDiv7 +YT1VmdNY5LjHffQVTWUOGHlBybvpmsFZGEQ0YtXoOHvKhRiYhnnNfbpH25U= +-----END CERTIFICATE----- + +# Swiss Government Root CA III +-----BEGIN CERTIFICATE----- +MIIGVjCCBD6gAwIBAgIRAPsfC0IrqEE+V9HuKm5aT7swDQYJKoZIhvcNAQELBQAw +bjELMAkGA1UEBhMCQ0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkw +FwYDVQQLExB3d3cucGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5t +ZW50IFJvb3QgQ0EgSUlJMB4XDTE2MDQxNTA3MDAwMFoXDTQxMDQxNTA2NTk1OVow +bjELMAkGA1UEBhMCQ0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkw +FwYDVQQLExB3d3cucGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5t +ZW50IFJvb3QgQ0EgSUlJMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA +4UOGjk8YlLrTwjlwbV1pUYRZvLvIfy/9F6N4nL3YkuPYeCE+u5pf+7JlUHK2p+yl +58HFAATjzLMCSvkA229tu5MXRPkjwlY6MB+Beftkv/VUhb87K2+VBAZdaArDj7gr +ZhK+othalAV9r8ETBqaROj8ZC4WDwJZd84HIE4r1EEugdTpbo0AHvaFmGGWEVHmR +mtNyhGbVDeY7Wur626FU/QAjWehX6py39I9BC2mxR7CaL2LamhmtoJUwzS6tZ7tt ++TZDt5R5yZAJAGlfl6bTbyXo72KHd9em2U4cX2Fm0LFw1eBiIDbYlkD4XjHeQZlp +ENag7j2tEy7SlEqNgB3cjEYhVotJW96h2APKzthltLAFPSZpSm2ljHkvpI8SeBDp +sgkIQ8PGBLszPkc1pVwgIAriNvhjhuQN9D4Ueb5FB7SLCZP19iomob1Ex/NQDQ1h +mzsR36iD6iIslUQNOUFjTagrbWilS59Ah2o8RQq+cqeIvvA5KlvvWaQg77Tcw9pB +20GluiJfl6PIY6EkLU4loMMXKMWIQZOWZGY3QwWbFXy2vp77G8hmGLoU77kYz4Rp +m5+9ggcSbRsZvzB+8ZIOwEwW/9E+b/irsmGaaEPiClTHAaNXjvNEBiLDcKa7pbPM +ghjYQI696nBBb5RXDL4HdG6Ok3oZj8Zo/BulRbO5hakCAwEAAaOB7jCB6zAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQH646qccsnpbvHMWC+7R/PoDPE5jCBqAYD +VR0jBIGgMIGdgBQH646qccsnpbvHMWC+7R/PoDPE5qFypHAwbjELMAkGA1UEBhMC +Q0gxHTAbBgNVBAoTFFN3aXNzIEdvdmVybm1lbnQgUEtJMRkwFwYDVQQLExB3d3cu +cGtpLmFkbWluLmNoMSUwIwYDVQQDExxTd2lzcyBHb3Zlcm5tZW50IFJvb3QgQ0Eg +SUlJghEA+x8LQiuoQT5X0e4qblpPuzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcN +AQELBQADggIBALNPZrze6Yxl/LdTEC78/N2JGhFAcJQxiZV2xtYqzD2no8G4zhJr +NFDBdSov52Em70s/3o0jnw2YPh871mrOPPHf0Ut3jKhP8lDlKKnBaupWb0e0gium +J7Il8N0jCj/pPYwl7MO1Tzf6UwrpOJhrKexTNdeGkJr6Y7p2VONQT8rW58Bx0NLn +6mhUrZPkMvx6cUCHBSi46rjCPI0AXsFOKFblw2y19aqN72cWB9COxfJaGTu7wYuz +RJ8MpcfL3tNEYKe9G2naDpr/l0WGbfqxZIof7N9RWFJN1uq6BvZTcVve6VX1LBNy +BkxTlvrKW/Q/HKffUv3LTn2fEECUp6FVunM+dHQw+KPgn6pfH13A30HPAYEh26iu +szOtRhN3mzswtKTgF4LAirU0FBwFi67gPdrFfKsmCEy9SmDpcOyoWIh1Z/EYl3YN +bAt9GS0CtYKZd89i+p0SASvZ9bRXsTrr1SnwjNNCpzVIjGKDPgo+Yd2x8wehx3Ow +ifC2WXujI9g3AzWIq0V3Y0z/cOuOagfRIuAykcsVcVorxYQ+kc3dtJlnjbSqjGUX +pqycXlaYp/TiQBLVQZe1M/HtF6GlAhDhZLVA2h6t0aburB7HEdsXcXrZmh7GTpv0 +qLOUnwmKf0yb/ggLLKtQ0DeySTUatx4pIXbhm/ChqlhnJAPhGaTRE2rx +-----END CERTIFICATE----- + +# Swisscom Root CA 1 +-----BEGIN CERTIFICATE----- +MIIF2TCCA8GgAwIBAgIQXAuFXAvnWUHfV8w/f52oNjANBgkqhkiG9w0BAQUFADBk +MQswCQYDVQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0 +YWwgQ2VydGlmaWNhdGUgU2VydmljZXMxGzAZBgNVBAMTElN3aXNzY29tIFJvb3Qg +Q0EgMTAeFw0wNTA4MTgxMjA2MjBaFw0yNTA4MTgyMjA2MjBaMGQxCzAJBgNVBAYT +AmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZp +Y2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAxMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0LmwqAzZuz8h+BvVM5OAFmUgdbI9 +m2BtRsiMMW8Xw/qabFbtPMWRV8PNq5ZJkCoZSx6jbVfd8StiKHVFXqrWW/oLJdih +FvkcxC7mlSpnzNApbjyFNDhhSbEAn9Y6cV9Nbc5fuankiX9qUvrKm/LcqfmdmUc/ +TilftKaNXXsLmREDA/7n29uj/x2lzZAeAR81sH8A25Bvxn570e56eqeqDFdvpG3F +EzuwpdntMhy0XmeLVNxzh+XTF3xmUHJd1BpYwdnP2IkCb6dJtDZd0KTeByy2dbco +kdaXvij1mB7qWybJvbCXc9qukSbraMH5ORXWZ0sKbU/Lz7DkQnGMU3nn7uHbHaBu +HYwadzVcFh4rUx80i9Fs/PJnB3r1re3WmquhsUvhzDdf/X/NTa64H5xD+SpYVUNF +vJbNcA78yeNmuk6NO4HLFWR7uZToXTNShXEuT46iBhFRyePLoW4xCGQMwtI89Tbo +19AOeCMgkckkKmUpWyL3Ic6DXqTz3kvTaI9GdVyDCW4pa8RwjPWd1yAv/0bSKzjC +L3UcPX7ape8eYIVpQtPM+GP+HkM5haa2Y0EQs3MevNP6yn0WR+Kn1dCjigoIlmJW +bjTb2QK5MHXjBNLnj8KwEUAKrNVxAmKLMb7dxiNYMUJDLXT5xp6mig/p/r+D5kNX +JLrvRjSq1xIBOO0CAwEAAaOBhjCBgzAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0hBBYw +FDASBgdghXQBUwABBgdghXQBUwABMBIGA1UdEwEB/wQIMAYBAf8CAQcwHwYDVR0j +BBgwFoAUAyUv3m+CATpcLNwroWm1Z9SM0/0wHQYDVR0OBBYEFAMlL95vggE6XCzc +K6FptWfUjNP9MA0GCSqGSIb3DQEBBQUAA4ICAQA1EMvspgQNDQ/NwNurqPKIlwzf +ky9NfEBWMXrrpA9gzXrzvsMnjgM+pN0S734edAY8PzHyHHuRMSG08NBsl9Tpl7Ik +Vh5WwzW9iAUPWxAaZOHHgjD5Mq2eUCzneAXQMbFamIp1TpBcahQq4FJHgmDmHtqB +sfsUC1rxn9KVuj7QG9YVHaO+htXbD8BJZLsuUBlL0iT43R4HVtA4oJVwIHaM190e +3p9xxCPvgxNcoyQVTSlAPGrEqdi3pkSlDfTgnXceQHAm/NrZNuR55LU/vJtlvrsR +ls/bxig5OgjOR1tTWsWZ/l2p3e9M1MalrQLmjAcSHm8D0W+go/MpvRLHUKKwf4ip +mXeascClOS5cfGniLLDqN2qk4Vrh9VDlg++luyqI54zb/W1elxmofmZ1a3Hqv7HH +b6D0jqTsNFFbjCYDcKF31QESVwA12yPeDooomf2xEG9L/zgtYE4snOtnta1J7ksf +rK/7DZBaZmBwXarNeNQk7shBoJMBkpxqnvy5JMWzFYJ+vq6VK+uxwNrjAWALXmms +hFZhvnEX/h0TD/7Gh0Xp/jKgGg0TpJRVcaUWi7rKibCyx/yP2FS1k2Kdzs9Z+z0Y +zirLNRWCXf9UIltxUvu3yf5gmwBBZPCqKuy2QkPOiWaByIufOVQDJdMWNY6E0F/6 +MBr1mmz0DlP5OlvRHA== +-----END CERTIFICATE----- + +# Swisscom Root CA 2 +-----BEGIN CERTIFICATE----- +MIIF2TCCA8GgAwIBAgIQHp4o6Ejy5e/DfEoeWhhntjANBgkqhkiG9w0BAQsFADBk +MQswCQYDVQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0 +YWwgQ2VydGlmaWNhdGUgU2VydmljZXMxGzAZBgNVBAMTElN3aXNzY29tIFJvb3Qg +Q0EgMjAeFw0xMTA2MjQwODM4MTRaFw0zMTA2MjUwNzM4MTRaMGQxCzAJBgNVBAYT +AmNoMREwDwYDVQQKEwhTd2lzc2NvbTElMCMGA1UECxMcRGlnaXRhbCBDZXJ0aWZp +Y2F0ZSBTZXJ2aWNlczEbMBkGA1UEAxMSU3dpc3Njb20gUm9vdCBDQSAyMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAlUJOhJ1R5tMJ6HJaI2nbeHCOFvEr +jw0DzpPMLgAIe6szjPTpQOYXTKueuEcUMncy3SgM3hhLX3af+Dk7/E6J2HzFZ++r +0rk0X2s682Q2zsKwzxNoysjL67XiPS4h3+os1OD5cJZM/2pYmLcX5BtS5X4HAB1f +2uY+lQS3aYg5oUFgJWFLlTloYhyxCwWJwDaCFCE/rtuh/bxvHGCGtlOUSbkrRsVP +ACu/obvLP+DHVxxX6NZp+MEkUp2IVd3Chy50I9AU/SpHWrumnf2U5NGKpV+GY3aF +y6//SSj8gO1MedK75MDvAe5QQQg1I3ArqRa0jG6F6bYRzzHdUyYb3y1aSgJA/MTA +tukxGggo5WDDH8SQjhBiYEQN7Aq+VRhxLKX0srwVYv8c474d2h5Xszx+zYIdkeNL +6yxSNLCK/RJOlrDrcH+eOfdmQrGrrFLadkBXeyq96G4DsguAhYidDMfCd7Camlf0 +uPoTXGiTOmekl9AbmbeGMktg2M7v0Ax/lZ9vh0+Hio5fCHyqW/xavqGRn1V9TrAL +acywlKinh/LTSlDcX3KwFnUey7QYYpqwpzmqm59m2I2mbJYV4+by+PGDYmy7Velh +k6M99bFXi08jsJvllGov34zflVEpYKELKeRcVVi3qPyZ7iVNTA6z00yPhOgpD/0Q +VAKFyPnlw4vP5w8CAwEAAaOBhjCBgzAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0hBBYw +FDASBgdghXQBUwIBBgdghXQBUwIBMBIGA1UdEwEB/wQIMAYBAf8CAQcwHQYDVR0O +BBYEFE0mICKJS9PVpAqhb97iEoHF8TwuMB8GA1UdIwQYMBaAFE0mICKJS9PVpAqh +b97iEoHF8TwuMA0GCSqGSIb3DQEBCwUAA4ICAQAyCrKkG8t9voJXiblqf/P0wS4R +fbgZPnm3qKhyN2abGu2sEzsOv2LwnN+ee6FTSA5BesogpxcbtnjsQJHzQq0Qw1zv +/2BZf82Fo4s9SBwlAjxnffUy6S8w5X2lejjQ82YqZh6NM4OKb3xuqFp1mrjX2lhI +REeoTPpMSQpKwhI3qEAMw8jh0FcNlzKVxzqfl9NX+Ave5XLzo9v/tdhZsnPdTSpx +srpJ9csc1fV5yJmz/MFMdOO0vSk3FQQoHt5FRnDsr7p4DooqzgB53MBfGWcsa0vv +aGgLQ+OswWIJ76bdZWGgr4RVSJFSHMYlkSrQwSIjYVmvRRGFHQEkNI/Ps/8XciAT +woCqISxxOQ7Qj1zB09GOInJGTB2Wrk9xseEFKZZZ9LuedT3PDTcNYtsmjGOpI99n +Bjx8Oto0QuFmtEYE3saWmA9LSHokMnWRn6z3aOkquVVlzl1h0ydw2Df+n7mvoC5W +t6NlUe07qxS/TFED6F+KBZvuim6c779o+sjaC+NCydAXFJy3SuCvkychVSa1ZC+N +8f+mQAWFBVzKBxlcCxMoTFh/wqXvRdpg065lYZ1Tg3TCrvJcwhbtkj6EPnNgiLx2 +9CzP0H1907he0ZESEOnN3col49XtmS++dYFLJPlFRpTJKSFTnCZFqhMX5OfNeOI5 +wSsSnqaeG8XmDtkx2Q== +-----END CERTIFICATE----- + +# Swisscom Root EV CA 2 +-----BEGIN CERTIFICATE----- +MIIF4DCCA8igAwIBAgIRAPL6ZOJ0Y9ON/RAdBB92ylgwDQYJKoZIhvcNAQELBQAw +ZzELMAkGA1UEBhMCY2gxETAPBgNVBAoTCFN3aXNzY29tMSUwIwYDVQQLExxEaWdp +dGFsIENlcnRpZmljYXRlIFNlcnZpY2VzMR4wHAYDVQQDExVTd2lzc2NvbSBSb290 +IEVWIENBIDIwHhcNMTEwNjI0MDk0NTA4WhcNMzEwNjI1MDg0NTA4WjBnMQswCQYD +VQQGEwJjaDERMA8GA1UEChMIU3dpc3Njb20xJTAjBgNVBAsTHERpZ2l0YWwgQ2Vy +dGlmaWNhdGUgU2VydmljZXMxHjAcBgNVBAMTFVN3aXNzY29tIFJvb3QgRVYgQ0Eg +MjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMT3HS9X6lds93BdY7Bx +UglgRCgzo3pOCvrY6myLURYaVa5UJsTMRQdBTxB5f3HSek4/OE6zAMaVylvNwSqD +1ycfMQ4jFrclyxy0uYAyXhqdk/HoPGAsp15XGVhRXrwsVgu42O+LgrQ8uMIkqBPH +oCE2G3pXKSinLr9xJZDzRINpUKTk4RtiGZQJo/PDvO/0vezbE53PnUgJUmfANykR +HvvSEaeFGHR55E+FFOtSN+KxRdjMDUN/rhPSays/p8LiqG12W0OfvrSdsyaGOx9/ +5fLoZigWJdBLlzin5M8J0TbDC77aO0RYjb7xnglrPvMyxyuHxuxenPaHZa0zKcQv +idm5y8kDnftslFGXEBuGCxobP/YCfnvUxVFkKJ3106yDgYjTdLRZncHrYTNaRdHL +OdAGalNgHa/2+2m8atwBz735j9m9W8E6X47aD0upm50qKGsaCnw8qyIL5XctcfaC +NYGu+HuB5ur+rPQam3Rc6I8k9l2dRsQs0h4rIWqDJ2dVSqTjyDKXZpBy2uPUZC5f +46Fq9mDU5zXNysRojddxyNMkM3OxbPlq4SjbX8Y96L5V5jcb7STZDxmPX2MYWFCB +UWVv8p9+agTnNCRxunZLWB4ZvRVgRaoMEkABnRDixzgHcgplwLa7JSnaFp6LNYth +7eVxV4O1PHGf40+/fh6Bn0GXAgMBAAGjgYYwgYMwDgYDVR0PAQH/BAQDAgGGMB0G +A1UdIQQWMBQwEgYHYIV0AVMCAgYHYIV0AVMCAjASBgNVHRMBAf8ECDAGAQH/AgED +MB0GA1UdDgQWBBRF2aWBbj2ITY1x0kbBbkUe88SAnTAfBgNVHSMEGDAWgBRF2aWB +bj2ITY1x0kbBbkUe88SAnTANBgkqhkiG9w0BAQsFAAOCAgEAlDpzBp9SSzBc1P6x +XCX5145v9Ydkn+0UjrgEjihLj6p7jjm02Vj2e6E1CqGdivdj5eu9OYLU43otb98T +PLr+flaYC/NUn81ETm484T4VvwYmneTwkLbUwp4wLh/vx3rEUMfqe9pQy3omywC0 +Wqu1kx+AiYQElY2NfwmTv9SoqORjbdlk5LgpWgi/UOGED1V7XwgiG/W9mR4U9s70 +WBCCswo9GcG/W6uqmdjyMb3lOGbcWAXH7WMaLgqXfIeTK7KK4/HsGOV1timH59yL +Gn602MnTihdsfSlEvoqq9X46Lmgxk7lq2prg2+kupYTNHAq4Sgj5nPFhJpiTt3tm +7JFe3VE/23MPrQRYCd0EApUKPtN236YQHoA96M2kZNEzx5LH4k5E4wnJTsJdhw4S +nr8PyQUQ3nqjsTzyP6WqJ3mtMX0f/fwZacXduT98zca0wjAefm6S139hdlqP65VN +vBFuIXxZN5nQBrz5Bm0yFqXZaajh3DyAHmBR3NdUIR7KYndP+tiPsys6DXhyyWhB +WkdKwqPrGtcKqzwyVcgKEZzfdNbwQBUdyLmPtTbFr/giuMod89a2GQ+fYWVq6nTI +fI/DT11lgh/ZDYnadXL77/FHZxOzyNEZiCcmmpl5fx7kLD977vHeTYuWl8PVP3wb +I+2ksx0WckNLIOFZfsLorSa/ovc= +-----END CERTIFICATE----- + +# Symantec Class 3 Public Primary Certification Authority - G4 +-----BEGIN CERTIFICATE----- +MIICpzCCAi2gAwIBAgIQTHm1miicdjFk9YlE0JEC3jAKBggqhkjOPQQDAzCBlDEL +MAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYD +VQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBD +bGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0g +RzQwHhcNMTIxMDE4MDAwMDAwWhcNMzcxMjAxMjM1OTU5WjCBlDELMAkGA1UEBhMC +VVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1h +bnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBDbGFzcyAzIFB1 +YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzQwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAARXz+qzOU0/oSHgbi84csaHl/OFC0fnD1HI0fSZm8pZ +Zf9M+eoLtyXV0vbsMS0yYhLXdoan+jjJZdT+c+KEOfhMSWIT3brViKBfPchPsD+P +oVAR5JNGrcNfy/GkapVW6MCjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBQknbzScfcdwiW+IvGJpSwVOzQeXjAKBggqhkjOPQQD +AwNoADBlAjEAuWZoZdsF0Dh9DvPIdWG40CjEsUozUVj78jwQyK5HeHbKZiQXhj5Q +Vm6lLZmIuL0kAjAD6qfnqDzqnWLGX1TamPR3vU+PGJyRXEdrQE0QHbPhicoLIsga +xcX+i93B3294n5E= +-----END CERTIFICATE----- + +# Symantec Class 3 Public Primary Certification Authority - G6 +-----BEGIN CERTIFICATE----- +MIIF9jCCA96gAwIBAgIQZWNxhdNvRcaPfzH5CYeSgjANBgkqhkiG9w0BAQwFADCB +lDELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8w +HQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRl +YyBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gRzYwHhcNMTIxMDE4MDAwMDAwWhcNMzcxMjAxMjM1OTU5WjCBlDELMAkGA1UE +BhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZT +eW1hbnRlYyBUcnVzdCBOZXR3b3JrMUUwQwYDVQQDEzxTeW1hbnRlYyBDbGFzcyAz +IFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzYwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC3DrL6TbyachX7d1vb/UMPywv3 +YC6zK34Mu1PyzE5l8xm7/zUd99Opu0Attd141Kb5N+qFBXttt+YTSwZ8+3ZjjyAd +LTgrBIXy6LDRX01KIclq2JTqHgJQpqqQB6BHIepm+QSg5oPwxPVeluInTWHDs8GM +IrZmoQDRVin77cF/JMo9+lqUsITDx7pDHP1kDvEo+0dZ8ibhMblE+avd+76+LDfj +rAsY0/wBovGkCjWCR0yrvYpe3xOF/CDMSFmvr0FvyyPNypOn3dVfyGQ7/wEDoApP +LW49hL6vyDKyUymQFfewBZoKPPa5BpDJpeFdoDuw/qi2v/WJKFckOiGGceTciotB +VeweMCRZ0cBZuHivqlp03iWAMJjtMERvIXAc2xJTDtamKGaTLB/MTzwbgcW59nhv +0DI6CHLbaw5GF4WU87zvvPekXo7p6bVk5bdLRRIsTDe3YEMKTXEGAJQmNXQfu3o5 +XE475rgD4seTi4QsJUlF3X8jlGAfy+nN9quX92Hn+39igcjcCjBcGHzmzu/Hbh6H +fLPpysh7avRo/IOlDFa0urKNSgrHl5fFiDAVPRAIVBVycmczM/R8t84AJ1NlziTx +WmTnNi/yLgLCl99y6AIeoPc9tftoYAP6M6nmEm0G4amoXU48/tnnAGWsthlNe4N/ +NEfq4RhtsYsceavnnQIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUOXEIAD7eyIbnkP/k/SEPziQZFvYwDQYJKoZIhvcN +AQEMBQADggIBAFBriE1gSM5a4yLOZ3yEp80c/ekMA4w2rwqHDmquV64B0Da78v25 +c8FftaiuTKL6ScsHRhY2vePIVzh+OOS/JTNgxtw3nGO7XpgeGrKC8K6mdxGAREeh +KcXwszrOmPC47NMOgAZ3IzBM/3lkYyJbd5NDS3Wz2ztuO0rd8ciutTeKlYg6EGhw +OLlbcH7VQ8n8X0/l5ns27vAg7UdXEyYQXhQGDXt2B8LGLRb0rqdsD7yID08sAraj +1yLmmUc12I2lT4ESOhF9s8wLdfMecKMbA+r6mujmLjY5zJnOOj8Mt674Q5mwk25v +qtkPajGRu5zTtCj7g0x6c4JQZ9IOrO1gxbJdNZjPh34eWR0kvFa62qRa2MzmvB4Q +jxuMjvPB27e+1LBbZY8WaPNWxSoZFk0PuGWHbSSDuGLc4EdhGoh7zk5//dzGDVqa +pPO1TPbdMaboHREhMzAEYX0c4D5PjT+1ixIAWn2poQDUg+twuxj4pNIcgS23CBHI +Jnu21OUPA0Zy1CVAHr5JXW2T8VyyO3VUaTqg7kwiuqya4gitRWMFSlI1dsQ09V4H +Mq3cfCbRW4+t5OaqG3Wf61206MCpFXxOSgdy30bJ1JGSdVaw4e43NmUoxRXIK3bM +bW8Zg/T92hXiQeczeUaDV/nxpbZt07zXU+fucW14qZen7iCcGRVyFT0E +-----END CERTIFICATE----- + +# Symantec Enterprise Mobile Root for Microsoft +-----BEGIN CERTIFICATE----- +MIIDvTCCAqWgAwIBAgIQD2tVL56/kHsPZimpvfTYzjANBgkqhkiG9w0BAQsFADBk +MQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xNjA0 +BgNVBAMTLVN5bWFudGVjIEVudGVycHJpc2UgTW9iaWxlIFJvb3QgZm9yIE1pY3Jv +c29mdDAeFw0xMjAzMTUwMDAwMDBaFw0zMjAzMTQyMzU5NTlaMGQxCzAJBgNVBAYT +AlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjE2MDQGA1UEAxMtU3lt +YW50ZWMgRW50ZXJwcmlzZSBNb2JpbGUgUm9vdCBmb3IgTWljcm9zb2Z0MIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtT2wcu6R6aVpnBFNevmz+j3ylJsj +t6YD7GIY/IUSIv7BcX1Uk7mRfWL2yqg4FWX4dz3lgiA61LXRbo0GSb3fgg4khefv +eC0Y8uALaEY+JBDIV+4ObXGm07FWHNcp1bLqVAUKqDyhuCVSBwWg3+fc7lw7QbWr +XDMy0s7r6Zb4QPQKujMd+FYDCYL1ZwfEwDTBXfxFu+o8mtV0cW3VhtPC/IW8VOuj +1fJP1UWvV7zwIsCPokXIdTR33qFtN3Kzc40Ma1O6WeGoPoBX0l9Z7mh1z4Gco8pF +jDfbBXI0HDIC+NX5LA3aWJ7EF7SbyZDEiFk/cZGQRBi+Iot5ki5CsIuXWwIDAQAB +o2swaTAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAnBgNVHREEIDAe +pBwwGjEYMBYGA1UEAxMPTVBLSS0yMDQ4LTEtMTExMB0GA1UdDgQWBBRN7N8mBtwk +EMC2mfTXOcdvGfgmKDANBgkqhkiG9w0BAQsFAAOCAQEAqVdZ0AFUFEavx3lUDGoq +W9g6HYHkiKMxtPHzNfFGc1xDyf68omoZwL0vX8s4o21u6BRe8nh+RXrhu/Qum0Xr +4B1QHDRbf5iKhg+H2uRkJnf8Cd8jQU8On/oO+kSF8CmXpJTi9EAtkRx29Khg3nGm +sAXiT2nZGQuJOuD6qyv68bMy7fx8cGVe0HsRe53oWxpKdqR7UTmsfakMdDjou1Xf +xM7ApyFauBufAcWnEP59+WoImQHR9jVQOOT2Q+QY2IBM7McE4mGMfUntz7Sl8fKQ +kgkINXOgIzLK6ZyeHL4LByx3XhdM2pyC4YAbpfPa94i/vzkn+CT+sUvIl+3kEhQl +iA== +-----END CERTIFICATE----- + +# TWCA Global Root CA +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0= +-----END CERTIFICATE----- + +# TWCA Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== +-----END CERTIFICATE----- + +# TeliaSonera Root CA v1 +-----BEGIN CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= +-----END CERTIFICATE----- + +# Thailand National Root Certification Authority - G1 +-----BEGIN CERTIFICATE----- +MIIGgTCCBGmgAwIBAgIEUVLFjDANBgkqhkiG9w0BAQ0FADCBzzELMAkGA1UEBhMC +VEgxSTBHBgNVBAoMQEVsZWN0cm9uaWMgVHJhbnNhY3Rpb25zIERldmVsb3BtZW50 +IEFnZW5jeSAoUHVibGljIE9yZ2FuaXphdGlvbikxNzA1BgNVBAsMLlRoYWlsYW5k +IE5hdGlvbmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxPDA6BgNVBAMM +M1RoYWlsYW5kIE5hdGlvbmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMTAeFw0xMzAzMjcwOTQwMjJaFw0zNjAzMjcxMDEwMjJaMIHPMQswCQYDVQQG +EwJUSDFJMEcGA1UECgxARWxlY3Ryb25pYyBUcmFuc2FjdGlvbnMgRGV2ZWxvcG1l +bnQgQWdlbmN5IChQdWJsaWMgT3JnYW5pemF0aW9uKTE3MDUGA1UECwwuVGhhaWxh +bmQgTmF0aW9uYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTE8MDoGA1UE +AwwzVGhhaWxhbmQgTmF0aW9uYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEcxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA1rpK5Izxmi6J +F8JA84IAMf4TAnplygjYqyKxAppxNEpkWYLlQkbrI/aLWiKxzzbnc20UbfdJlF7v +5zRZZ/aoz1ZZI4RV4vsaEcqj+YqrZx6CE9CLOZq/D8IPPNZh2OqbzxUOvtTwzD9z +nAT0onFzfYCwnTHxBvmwE+WISTD2Fn2IVyk6LKKMkJjOERbOTVEP/MeyzPJmGCGA +BYitudDFC3gB/k7SCIs28VbPbrpzJgvW96VGamlOlranBlbM5i4xn26L7ZwAVUf0 +e6Z6tt8BHUgEC6tCwnBKlL38rFHyqz/W62DfCP/1ErKJKnq5RZklfXzvzxXQSCwQ +1tS8CCe1hinU49PEKpAS9qIq+YuvFv8C83puz6LLarTgcgv7PoV/4ofgL0Mj+IXJ +merWQN6g++fedv+PgDnrZxITpvvlo/wmgFlj8tIj6x/GSHNRnbezoFuraoj5v/tx +UdxutnbvsFvyy4gwugbbG0HTVbSttOogIfzUd7Y9W6EMLSUhUiNS1zRTbRYEUmb4 +1erxLFjyO7HxfkO13IK4XuOH4aOkX+eJDryc6Sk6JafYT2qH1JZElxgWh8JxUoXO +eoytHme+ui2/oyEnxecw6QaZG7AM475SZZNNYUvyOOaPGPECUpgupg4dBc8m7AEj +Bzb24BM3qUeIA4dHy92yAR9fZBsEm8UCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAQYwHwYDVR0jBBgwFoAUfyN2t4Mqcfcs0YgP3UxfMgpo +u38wHQYDVR0OBBYEFH8jdreDKnH3LNGID91MXzIKaLt/MA0GCSqGSIb3DQEBDQUA +A4ICAQANZRxaB6merEzJX0/dMWzZ4lMdP5GNWrOMvTSeLk3KWNOvWWJJNnOwYXYR +vos2x5Sq+DZpByDfXC8L9o4CFu9SBjjd7TRgqodeF844bVBN5d/lUb4dBJb03Orl +2eqO3p90y4KUU4Fs+14s1aF1lk37MFzNYaCeocyCuVJyC4djYXthNHS2Lt3i4Ye1 +SRRhFUdKSz53uQjSNk9YZ0KJgHhaEiPtRTvdvyAmVPxbP2ABGEHjZ3UTtyoVcMzL +edIU+PPC4CoQ9/lC2NzaCtMBBdtXmMm26wyZCsqMfe87FijA91/hR1HT+AZFB/AL +usKcmOzSf01+/Qb8c8LCVRJi0CNE3yLk+HnnpRBOPsmOqoPpNuqrecYFhM2WaHx0 +rD8y/67JQOyPUL9QqLdO1a02atcnM/rn2C3ZN5iFG6YM6nsQE3AenojF3D6OuQ1V +3wHO0El2UdsQYnhBrWljpZUJtxgGb/0EZ9QQD07bO18MY3zrZL1uSwCogfqSMoYw +jAm/fVg/ZQ2pN9FF42ZpxGj0YqmoHjfZLplJoLAGjEB/hbH18UxLOKAIzCrZlsDs +wA08LkVXw++V2rbL7ltlqCsyr8kn+RVTN3VYH0vql6IiXGdW4qDMNcSswzFAuZwD +er3JSA7qahXanLx4b8kV52QD2UkTZkVLLfSEmbPqpxKV5ZMu/A== +-----END CERTIFICATE----- + +# Thawte Premium Server CA +-----BEGIN CERTIFICATE----- +MIIDJzCCApCgAwIBAgIBATANBgkqhkiG9w0BAQQFADCBzjELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYD +VQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlv +biBTZXJ2aWNlcyBEaXZpc2lvbjEhMB8GA1UEAxMYVGhhd3RlIFByZW1pdW0gU2Vy +dmVyIENBMSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNlcnZlckB0aGF3dGUuY29t +MB4XDTk2MDgwMTAwMDAwMFoXDTIwMTIzMTIzNTk1OVowgc4xCzAJBgNVBAYTAlpB +MRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEdMBsG +A1UEChMUVGhhd3RlIENvbnN1bHRpbmcgY2MxKDAmBgNVBAsTH0NlcnRpZmljYXRp +b24gU2VydmljZXMgRGl2aXNpb24xITAfBgNVBAMTGFRoYXd0ZSBQcmVtaXVtIFNl +cnZlciBDQTEoMCYGCSqGSIb3DQEJARYZcHJlbWl1bS1zZXJ2ZXJAdGhhd3RlLmNv +bTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0jY2aovXwlue2oFBYo847kkE +VdbQ7xwblRZH7xhINTpS9CtqBo87L+pW46+GjZ4X9560ZXUCTe/LCaIhUdib0GfQ +ug2SBhRz1JPLlyoAnFxODLz6FVL88kRu2hFKbgifLy3j+ao6hnO2RlNYyIkFvYMR +uHM/qgeN9EJN50CdHDcCAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG +9w0BAQQFAAOBgQAmSCwWwlj66BZ0DKqqX1Q/8tfJeGBeXm43YyJ3Nn6yF8Q0ufUI +hfzJATj/Tb7yFkJD57taRvvBxhEf8UqwKEbJw8RCfbz6q1lu1bdRiBHjpIUZa4JM +pAwSremkrj/xw0llmozFyD4lt5SZu5IycQfwhl7tUCemDaYj+bvLpgcUQg== +-----END CERTIFICATE----- + +# Thawte Server CA +-----BEGIN CERTIFICATE----- +MIIDEzCCAnygAwIBAgIBATANBgkqhkiG9w0BAQQFADCBxDELMAkGA1UEBhMCWkEx +FTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYD +VQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlv +biBTZXJ2aWNlcyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEm +MCQGCSqGSIb3DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wHhcNOTYwODAx +MDAwMDAwWhcNMjAxMjMxMjM1OTU5WjCBxDELMAkGA1UEBhMCWkExFTATBgNVBAgT +DFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR0wGwYDVQQKExRUaGF3 +dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNl +cyBEaXZpc2lvbjEZMBcGA1UEAxMQVGhhd3RlIFNlcnZlciBDQTEmMCQGCSqGSIb3 +DQEJARYXc2VydmVyLWNlcnRzQHRoYXd0ZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQAD +gY0AMIGJAoGBANOkUG7I/1Zr5s9dtuoMaHVHoqrC2oQl/Kj0R1HahbUgdJSGHg91 +yekIYfUGbTBuFRkC6VLAYttNmZ7iagxEOM3+vuNkCXDF/rFrKbYvScg71CcEJRCX +L+eQbcAoQpnXTEPew/UhbVSfXcNY4cDk2VuwuNy0e982OsK1ZiIS1ocNAgMBAAGj +EzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEEBQADgYEAB/pMaVz7lcxG +7oWDTSEwjsrZqG9JGubaUeNgcGyEYRGhGshIPllDfU+VPaGLtwtimHp1it2ITk6e +QNuozDJ0uW8NxuOzRAvZim+aKZuZGCg70eNAKJpaPNW15yAbi8qkq43pUdniTCxZ +qdq5snUb9kLy78fyGPmJvKP/iiMucEc= +-----END CERTIFICATE----- + +# Trustwave Global Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHk= +-----END CERTIFICATE----- + +# Trustwave Global ECC P256 Certification Authority +-----BEGIN CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 +-----END CERTIFICATE----- + +# Trustwave Global ECC P384 Certification Authority +-----BEGIN CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +Sw== +-----END CERTIFICATE----- + +# Tunisian Root Certificate Authority - TunRootCA2 +-----BEGIN CERTIFICATE----- +MIIFvDCCA6SgAwIBAgIQIWYVBQUnBQW8irAdrwq+xDANBgkqhkiG9w0BAQsFADB4 +MQswCQYDVQQGEwJUTjE5MDcGA1UEAxMwVHVuaXNpYW4gUm9vdCBDZXJ0aWZpY2F0 +ZSBBdXRob3JpdHkgLSBUdW5Sb290Q0EyMS4wLAYDVQQKEyVOYXRpb25hbCBEaWdp +dGFsIENlcnRpZmljYXRpb24gQWdlbmN5MB4XDTE1MDUwNTA4NTcwMVoXDTI3MDUw +NTA4NTcwMVoweDELMAkGA1UEBhMCVE4xOTA3BgNVBAMTMFR1bmlzaWFuIFJvb3Qg +Q2VydGlmaWNhdGUgQXV0aG9yaXR5IC0gVHVuUm9vdENBMjEuMCwGA1UEChMlTmF0 +aW9uYWwgRGlnaXRhbCBDZXJ0aWZpY2F0aW9uIEFnZW5jeTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBALAH52L70A1Vzme3V41uDKknVB7rqSSrZ4+PnGEP +2ygyLzv4LGWSLa66M5LAK57yH15tI12zWB+NocBtdYUKsBNOW1ZGizm9C4K7OkOb +CLpG7vkX683I1+N1E96uUUgKziCVRp8C7FWMdKpa/PzqCTM1bqNHBsfdfoRoDscS +ypTD7eZsAm3eAok1swTLRfh8R6TTH9/lXCPi8yJ7uUui/Rc1XUjpv/WzJWOL53jr +/HUnvYhcpoU/Qd+VfN16Ro/+Htqxq9jTjs0GjMnYUkIRUqKDj1yDe+Qnto8foF49 +0nV9eVOTBpfjA8eWLNoBPHnFO1DosNOhpOLTg31E+BDPoBoq8mWAvXfBmGV2rhIh +Yso6vr61mcNbxNG/m8AKylgeFabXIV6xTQrlcHiaaOZ0ZjIUKh4Rvoj3BvZVo8Mf +bheQVdGKQIlWQ9VP5qLJiGQABVE/V7Q8tr5qkXFA8aJc8dftnLZX9lnUKhHl1OW/ +ux7RyNdfRAWbu4k6radDd34VYHyIXZvspVzSRq0Mi1RF1JRRVUVSqlzYEaz4ViJs +2dIU6bdOQoVURvgBxj0mBnfosjUb8J1CyX/+gCcBUMt/xaxU+mttloxBpKHS57WR +SG93HIvCK3T+PFzEXZTOq/EglmvBDFpf+eU1uWyjEGfvkapIDu9It3ZYYtm+nkKz +pL01AgMBAAGjQjBAMB0GA1UdDgQWBBTMc8Wjaikxl6eNoNhUwQp1tiM/pjAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEA +LvKHSO2Znp8BDDzJCnhTfBg13rblbPQAgOGbi9n6+6r7ZbfSyfXXp8t+ybGicVht +WTfW4DMQyrXZcttOJTeqpt0dGL31yYqceojuHwLELZJUfVfiXBkYIwJ6XEmVtpjn +wmBBZUC77Fq3cZxQ8nN2+18N7zXPtGmNhehMkBcDC8mzLiA3YxFipk/jNOD7eVXn +xsKuQv6wNGxJIw5yB3tmBVVI+xIPoMD6TtH7Pcz+/RZLVlDNESynm/exCs+m6+/d +jriuQgh8pIyU6obHQ+P3PIrfR9IwQMgtU/VvEUnMIYyWQ08QoEehVo0fHFvYVlvr +NHbhNTpx1MwhL541KPJa3p7k7kdqEOg4vUq0fQR/Ba5ICrQDvy6zChufy63dTdCH +IbdHdoKDLcdXvpoVoxswGGyjOnFvZEcoktsRYSCad2Ut+axWE2xLo1//m6To7+dY +6HueO39qp745ChOUyUhOZmTYU0zsQWv9/DYu1w7fYQt7tUCs3UJJbZ6Av2CV8OnA +P3u7GOk4tVZOp36KYu+YHvh4QKm72OnltLT542ec7FPPuEK0L5OBNaBs9rogimg9 +923/f9NM93qUaAN3Qzs1UapTEj5HExQ5rNZlj6hG/zwh9NK/0EikfqdRm5cS9Zk0 +FyNWhBNjyzTKH8q6qAcp80MkCkl//Q7UkPCrQyFinI8= +-----END CERTIFICATE----- + +# TÜBİTAK UEKAE Kök Sertifika Hizmet Sağlayıcısı - Sürüm 3 +-----BEGIN CERTIFICATE----- +MIIFFzCCA/+gAwIBAgIBETANBgkqhkiG9w0BAQUFADCCASsxCzAJBgNVBAYTAlRS +MRgwFgYDVQQHDA9HZWJ6ZSAtIEtvY2FlbGkxRzBFBgNVBAoMPlTDvHJraXllIEJp +bGltc2VsIHZlIFRla25vbG9qaWsgQXJhxZ90xLFybWEgS3VydW11IC0gVMOcQsSw +VEFLMUgwRgYDVQQLDD9VbHVzYWwgRWxla3Ryb25payB2ZSBLcmlwdG9sb2ppIEFy +YcWfdMSxcm1hIEVuc3RpdMO8c8O8IC0gVUVLQUUxIzAhBgNVBAsMGkthbXUgU2Vy +dGlmaWthc3lvbiBNZXJrZXppMUowSAYDVQQDDEFUw5xCxLBUQUsgVUVLQUUgS8O2 +ayBTZXJ0aWZpa2EgSGl6bWV0IFNhxJ9sYXnEsWPEsXPEsSAtIFPDvHLDvG0gMzAe +Fw0wNzA4MjQxMTM3MDdaFw0xNzA4MjExMTM3MDdaMIIBKzELMAkGA1UEBhMCVFIx +GDAWBgNVBAcMD0dlYnplIC0gS29jYWVsaTFHMEUGA1UECgw+VMO8cmtpeWUgQmls +aW1zZWwgdmUgVGVrbm9sb2ppayBBcmHFn3TEsXJtYSBLdXJ1bXUgLSBUw5xCxLBU +QUsxSDBGBgNVBAsMP1VsdXNhbCBFbGVrdHJvbmlrIHZlIEtyaXB0b2xvamkgQXJh +xZ90xLFybWEgRW5zdGl0w7xzw7wgLSBVRUtBRTEjMCEGA1UECwwaS2FtdSBTZXJ0 +aWZpa2FzeW9uIE1lcmtlemkxSjBIBgNVBAMMQVTDnELEsFRBSyBVRUtBRSBLw7Zr +IFNlcnRpZmlrYSBIaXptZXQgU2HEn2xhecSxY8Sxc8SxIC0gU8O8csO8bSAzMIIB +IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAim1L/xCIOsP2fpTo6iBkcK4h +gb46ezzb8R1Sf1n68yJMlaCQvEhOEav7t7WNeoMojCZG2E6VQIdhn8WebYGHV2yK +O7Rm6sxA/OOqbLLLAdsyv9Lrhc+hDVXDWzhXcLh1xnnRFDDtG1hba+818qEhTsXO +fJlfbLm4IpNQp81McGq+agV/E5wrHur+R84EpW+sky58K5+eeROR6Oqeyjh1jmKw +lZMq5d/pXpduIF9fhHpEORlAHLpVK/swsoHvhOPc7Jg4OQOFCKlUAwUp8MmPi+oL +hmUZEdPpCSPeaJMDyTYcIW7OjGbxmTDY17PDHfiBLqi9ggtm/oLL4eAagsNAgQID +AQABo0IwQDAdBgNVHQ4EFgQUvYiHyY/2pAoLquvF/pEjnatKijIwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEBAB18+kmP +NOm3JpIWmgV050vQbTlswyb2zrgxvMTfvCr4N5EY3ATIZJkrGG2AA1nJrvhY0D7t +wyOfaTyGOBye79oneNGEN3GKPEs5z35FBtYt2IpNeBLWrcLTy9LQQfMmNkqblWwM +7uXRQydmwYj3erMgbOqwaSvHIOgMA8RBBZniP+Rr+KCGgceExh/VS4ESshYhLBOh +gLJeDEoTniDYYkCrkOpkSi+sDQESeUWoL4cZaMjihccwsnX5OD+ywJO0a+IDRM5n +oN+J1q2MdqMTw5RhK2vZbMEHCiIHhWyFJEapvj+LeISCfiQMnf2BN+MlqO02TpUs +yZyQ2uypQjyttgI= +-----END CERTIFICATE----- + +# UCA Extended Validation Root +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF +eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx +MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV +BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog +D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS +sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop +O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk +sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi +c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj +VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz +KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ +TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G +sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs +1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD +fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T +AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN +l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR +ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ +VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 +c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp +4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s +t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj +2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO +vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C +xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx +cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM +fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1ax +-----END CERTIFICATE----- + +# UCA Global G2 Root +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0A== +-----END CERTIFICATE----- + +# UCA Global Root +-----BEGIN CERTIFICATE----- +MIIFkjCCA3qgAwIBAgIBCDANBgkqhkiG9w0BAQUFADA6MQswCQYDVQQGEwJDTjER +MA8GA1UEChMIVW5pVHJ1c3QxGDAWBgNVBAMTD1VDQSBHbG9iYWwgUm9vdDAeFw0w +ODAxMDEwMDAwMDBaFw0zNzEyMzEwMDAwMDBaMDoxCzAJBgNVBAYTAkNOMREwDwYD +VQQKEwhVbmlUcnVzdDEYMBYGA1UEAxMPVUNBIEdsb2JhbCBSb290MIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA2rPlBlA/9nP3xDK/RqUlYjOHsGj+p9+I +A2N9Apb964fJ7uIIu527u+RBj8cwiQ9tJMAEbBSUgU2gDXRm8/CFr/hkGd656YGT +0CiFmUdCSiw8OCdKzP/5bBnXtfPvm65bNAbXj6ITBpyKhELVs6OQaG2BkO5NhOxM +cE4t3iQ5zhkAQ5N4+QiGHUPR9HK8BcBn+sBR0smFBySuOR56zUHSNqth6iur8CBV +mTxtLRwuLnWW2HKX4AzKaXPudSsVCeCObbvaE/9GqOgADKwHLx25urnRoPeZnnRc +GQVmMc8+KlL+b5/zub35wYH1N9ouTIElXfbZlJrTNYsgKDdfUet9Ysepk9H50DTL +qScmLCiQkjtVY7cXDlRzq6987DqrcDOsIfsiJrOGrCOp139tywgg8q9A9f9ER3Hd +J90TKKHqdjn5EKCgTUCkJ7JZFStsLSS3JGN490MYeg9NEePorIdCjedYcaSrbqLA +l3y74xNLytu7awj5abQEctXDRrl36v+6++nwOgw19o8PrgaEFt2UVdTvyie3AzzF +HCYq9TyopZWbhvGKiWf4xwxmse1Bv4KmAGg6IjTuHuvlb4l0T2qqaqhXZ1LUIGHB +zlPL/SR/XybfoQhplqCe/klD4tPq2sTxiDEhbhzhzfN1DiBEFsx9c3Q1RSw7gdQg +7LYJjD5IskkCAwEAAaOBojCBnzALBgNVHQ8EBAMCAQYwDAYDVR0TBAUwAwEB/zBj +BgNVHSUEXDBaBggrBgEFBQcDAQYIKwYBBQUHAwIGCCsGAQUFBwMDBggrBgEFBQcD +BAYIKwYBBQUHAwUGCCsGAQUFBwMGBggrBgEFBQcDBwYIKwYBBQUHAwgGCCsGAQUF +BwMJMB0GA1UdDgQWBBTZw9P4gJJnzF3SOqLXcaK0xDiALTANBgkqhkiG9w0BAQUF +AAOCAgEA0Ih5ygiq9ws0oE4Jwul+NUiJcIQjL1HDKy9e21NrW3UIKlS6Mg7VxnGF +sZdJgPaE0PC6t3GUyHlrpsVE6EKirSUtVy/m1jEp+hmJVCl+t35HNmktbjK81HXa +QnO4TuWDQHOyXd/URHOmYgvbqm4FjMh/Rk85hZCdvBtUKayl1/7lWFZXbSyZoUkh +1WHGjGHhdSTBAd0tGzbDLxLMC9Z4i3WA6UG5iLHKPKkWxk4V43I29tSgQYWvimVw +TbVEEFDs7d9t5tnGwBLxSzovc+k8qe4bqi81pZufTcU0hF8mFGmzI7GJchT46U1R +IgP/SobEHOh7eQrbRyWBfvw0hKxZuFhD5D1DCVR0wtD92e9uWfdyYJl2b/Unp7uD +pEqB7CmB9HdL4UISVdSGKhK28FWbAS7d9qjjGcPORy/AeGEYWsdl/J1GW1fcfA67 +loMQfFUYCQSu0feLKj6g5lDWMDbX54s4U+xJRODPpN/xU3uLWrb2EZBL1nXz/gLz +Ka/wI3J9FO2pXd96gZ6bkiL8HvgBRUGXx2sBYb4zaPKgZYRmvOAqpGjTcezHCN6j +w8k2SjTxF+KAryAhk5Qe5hXTVGLxtTgv48y5ZwSpuuXu+RBuyy5+E6+SFP7zJ3N7 +OPxzbbm5iPZujAv1/P8JDrMtXnt145Ik4ubhWD5LKAN1axibRww= +-----END CERTIFICATE----- + +# UCA Root +-----BEGIN CERTIFICATE----- +MIIDhDCCAmygAwIBAgIBCTANBgkqhkiG9w0BAQUFADAzMQswCQYDVQQGEwJDTjER +MA8GA1UEChMIVW5pVHJ1c3QxETAPBgNVBAMTCFVDQSBSb290MB4XDTA0MDEwMTAw +MDAwMFoXDTI5MTIzMTAwMDAwMFowMzELMAkGA1UEBhMCQ04xETAPBgNVBAoTCFVu +aVRydXN0MREwDwYDVQQDEwhVQ0EgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBALNdB8qGJn1r4vs4CQ7MgsJqGgCiFV/W6dQBt1YDAVmP9ThpJHbC +XivF9iu/r/tB/Q9a/KvXg3BNMJjRnrJ2u5LWu+kQKGkoNkTo8SzXWHwk1n8COvCB +a2FgP/Qz3m3l6ihST/ypHWN8C7rqrsRoRuTej8GnsrZYWm0dLNmMOreIy4XU9+gD +Xv2yTVDo1h//rgI/i0+WITyb1yXJHT/7mLFZ5PCpO6+zzYUs4mBGzG+OoOvwNMXx +QhhgrhLtRnUc5dipllq+3lrWeGeWW5N3UPJuG96WUUqm1ktDdSFmjXfsAoR2XEQQ +th1hbOSjIH23jboPkXXHjd+8AmCoKai9PUMCAwEAAaOBojCBnzALBgNVHQ8EBAMC +AQYwDAYDVR0TBAUwAwEB/zBjBgNVHSUEXDBaBggrBgEFBQcDAQYIKwYBBQUHAwIG +CCsGAQUFBwMDBggrBgEFBQcDBAYIKwYBBQUHAwUGCCsGAQUFBwMGBggrBgEFBQcD +BwYIKwYBBQUHAwgGCCsGAQUFBwMJMB0GA1UdDgQWBBTbHzXza0z/QjFkm827Wh4d +SBC37jANBgkqhkiG9w0BAQUFAAOCAQEAOGy3iPGt+lg3dNHocN6cJ1nL5BXXoMNg +14iABMUwTD3UGusGXllH5rxmy+AI/Og17GJ9ysDawXiv5UZv+4mCI4/211NmVaDe +JRI7cTYWVRJ2+z34VFsxugAG+H1V5ad2g6pcSpemKijfvcZsCyOVjjN/Hl5AHxNU +LJzltQ7dFyiuawHTUin1Ih+QOfTcYmjwPIZH7LgFRbu3DJaUxmfLI3HQjnQi1kHr +A6i26r7EARK1s11AdgYg1GS4KUYGis4fk5oQ7vuqWrTcL9Ury/bXBYSYBZELhPc9 ++tb5evosFeo2gkO3t7jj83EB7UNDogVFwygFBzXjAaU4HoDU18PZ3g== +-----END CERTIFICATE----- + +# USERTrust ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= +-----END CERTIFICATE----- + +# USERTrust RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9 +-----END CERTIFICATE----- + +# UTN-USERFirst-Object +-----BEGIN CERTIFICATE----- +MIIEZjCCA06gAwIBAgIQRL4Mi1AAJLQR0zYt4LNfGzANBgkqhkiG9w0BAQUFADCB +lTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2Ug +Q2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYDVQQLExho +dHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VSRmlyc3Qt +T2JqZWN0MB4XDTk5MDcwOTE4MzEyMFoXDTE5MDcwOTE4NDAzNlowgZUxCzAJBgNV +BAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAc +BgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3 +dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0LU9iamVjdDCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM6qgT+jo2F4qjEAVZURnicP +HxzfOpuCaDDASmEd8S8O+r5596Uj71VRloTN2+O5bj4x2AogZ8f02b+U60cEPgLO +KqJdhwQJ9jCdGIqXsqoc/EHSoTbL+z2RuufZcDX65OeQw5ujm9M89RKZd7G3CeBo +5hy485RjiGpq/gt2yb70IuRnuasaXnfBhQfdDWy/7gbHd2pBnqcP1/vulBe3/IW+ +pKvEHDHd17bR5PDv3xaPslKT16HUiaEHLr/hARJCHhrh2JU022R5KP+6LhHC5ehb +kkj7RwvCbNqtMoNB86XlQXD9ZZBt+vpRxPm9lisZBCzTbafc8H9vg2XiaquHhnUC +AwEAAaOBrzCBrDALBgNVHQ8EBAMCAcYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU2u1kdBScFDyr3ZmpvVsoTYs8ydgwQgYDVR0fBDswOTA3oDWgM4YxaHR0cDov +L2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0LmNybDApBgNV +HSUEIjAgBggrBgEFBQcDAwYIKwYBBQUHAwgGCisGAQQBgjcKAwQwDQYJKoZIhvcN +AQEFBQADggEBAAgfUrE3RHjb/c652pWWmKpVZIC1WkDdIaXFwfNfLEzIR1pp6ujw +NTX00CXzyKakh0q9G7FzCL3Uw8q2NbtZhncxzaeAFK4T7/yxSPlrJSUtUbYsbUXB +mMiKVl0+7kNOPmsnjtA6S4ULX9Ptaqd1y9Fahy85dRNacrACgZ++8A+EVCBibGnU +4U3GDZlDAQ0Slox4nb9QorFEqmrPF3rPbw/U+CRVX/A0FklmPlBGyWNxODFiuGK5 +81OtbLUrohKqGU8J2l7nk8aOFAj+8DCAGKCGhU3IfdeLA/5u1fedFqySLKAj5ZyR +Uh+U3xeUc8OzwcFxBSAAeL0TUh2oPs0AH8g= +-----END CERTIFICATE----- + +# VAS Latvijas Pasts SSI(RCA) +-----BEGIN CERTIFICATE----- +MIIHqTCCBZGgAwIBAgIQYwaGp8U3ZaVDkKhqWMzUMjANBgkqhkiG9w0BAQUFADCB +jzELMAkGA1UEBhMCTFYxNTAzBgNVBAoTLFZBUyBMYXR2aWphcyBQYXN0cyAtIFZp +ZW4ucmVnLk5yLjQwMDAzMDUyNzkwMSMwIQYDVQQLExpTZXJ0aWZpa2FjaWphcyBw +YWthbHBvanVtaTEkMCIGA1UEAxMbVkFTIExhdHZpamFzIFBhc3RzIFNTSShSQ0Ep +MB4XDTA2MDkxMzA5MjIxMFoXDTI0MDkxMzA5Mjc1N1owgY8xCzAJBgNVBAYTAkxW +MTUwMwYDVQQKEyxWQVMgTGF0dmlqYXMgUGFzdHMgLSBWaWVuLnJlZy5Oci40MDAw +MzA1Mjc5MDEjMCEGA1UECxMaU2VydGlmaWthY2lqYXMgcGFrYWxwb2p1bWkxJDAi +BgNVBAMTG1ZBUyBMYXR2aWphcyBQYXN0cyBTU0koUkNBKTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAJu4+f1hVS9PpKUUtS6OuSSPrPuxVD9A/0/F5YZo +e1OT+zWCNahQLpRSoNuDPnXaFXCsCc/ugkmtNkm5tHGLtAChQgbKCApjl7YI/O60 +3Jh4GYLJ+H9kPqrJ/rGN67Bk9bzzxD46kOpOjj8bGbxqg8ORPGxV+wpSwOjhXXeF +M8VJ3+xqv79sN/6OSaIVGM6LjmseOKMwb4iBfnJWRBrEejkP9sSPltSy6wBOXN67 +5zu35iQFk2tN5pFEv+6YG8eFGxFBeyI2p74+6Ho33BjekJ2PzbLXmj/iF39bDOHv +P2Y9biTksM7DDIhslNo4JXxSOeNzFLMARWOaDEJAXgTG93JkzsluM7Pk020klTeT +fvIAXRmLH/NDc6ifRdIGqey0Qrv67gzHTz9RH9Gv0KwYf4eBIv6p3QeWbXz4TtlN +OlBp1UF+xdp02I5z5X6D4cMZgbe9v0COvi6aogyqTgIuuyrhCF0xA8msJ7Cv3NXI +FH1AnVWJIfmQzNTJYEFzq+jN2DpVOQqCmf6b9fU8HJHLwPpGVK4h/CqsXHveepdx +/WxrzUiapNuBfBg3L5B9YZS9F8lctlQWd8oJSqrpvE+UdQFaVryS0o+515feVnQB +9xZxSbH1GEaZQe5i4bMsZXVpKXJDA/ibH/o49J7sQBCOrJfVsDO+nxjcLfdBeFRK +YkTnAgMBAAGjggH9MIIB+TAOBgNVHQ8BAf8EBAMCAQYwGAYIKwYBBQUHAQMEDDAK +MAgGBgQAjkYBATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTMw/Vm/3OsOFqW +GyGJuIFMH8teJTAQBgkrBgEEAYI3FQEEAwIBADCCAYkGA1UdIASCAYAwggF8MIIB +eAYLKwYBBAGBxFkBAQIwggFnMIIBOAYIKwYBBQUHAgIwggEqHoIBJgBTAGkAcwAg +AGkAcgAgAHMAZQByAHQAaQBmAGkAawBhAHQAcwAsACAAawBvACAAaQB6AGQAZQB2 +AGkAcwAgAFYAQQBTACAATABhAHQAdgBpAGoAYQBzACAAUABhAHMAdABzACwAIABu +AG8AZAByAG8AcwBpAG4AbwB0ACAAYQB0AGIAaQBsAHMAdABpAGIAdQAgAEUAbABl +AGsAdAByAG8AbgBpAHMAawBvACAAZABvAGsAdQBtAGUAbgB0AHUAIABsAGkAawB1 +AG0AYQBtACAAdQBuACAARQBpAHIAbwBwAGEAcwAgAFAAYQByAGwAYQBtAGUAbgB0 +AGEAIABkAGkAcgBlAGsAdABpAHYAYQBpACAAMQA5ADkAOQAvADkAMwAvAEUASzAp +BggrBgEFBQcCARYdaHR0cDovL3d3dy5lLW1lLmx2L3JlcG9zaXRvcnkwDQYJKoZI +hvcNAQEFBQADggIBAB8oSjWQIWNoCi94r6MegiaXoz8nGdJLo0J6BhNlW8EEy+t9 +fO+U8vGJ9bffUgIhadLqljTloM+XuJxVDhCFoxReLAX4tTp28/l6uN62DCdp8suU +kQsdudWOb5kvzfIZVjk6SFbwAf+Cdbay/dHU9fJjV0xNoX7MELoEae/0FPyzlx9F +7m9KKH/Rxie8x6Opa3vtghNvq94P+3HrXBEaqSzQMJ/8NjdW75XpurcTtq6fAmGt +nuxrBG82nw+Z98LJyEwouSjUIdeeVNXAzvSO5FWUe48kxjj8q3qkVnc9qEXvZJKk +0Ep+u3OL9A1Sc7g6SF5DgNOpcHdi/8coHHMeQ+YnJFtJueY2pI79xS0veqV5EnrX +IbIlbcgPosNhS+VI4le6n/KKId3bZPDaGd/OwJuAOcJ3d2MVU3KE+qSPBzeGIX1Q ++j1qN9uRDjez/c4Lynth0Jx0nH04aG3pex3W8Sq07ztgUncF5gLCX4xbvPB9t3PH +kWuyKrNjozTVq60lcUf/Gj56to2VdsPups0DCWzuRWeYz5lIdsHOinSaaFIBNCLI +7eIUC4S9bhCMsXKbvugI11fVf+q0AT1O5OLoZ+eMfunnQhHvlUbIkda+JxeAGTSY +58bfHvwhX56GPbx+8Jy9cp70R4JbcWfz+txUTKhc2FnH0AcOEzMnvPRp8Gsh +-----END CERTIFICATE----- + +# VI Registru Centras RCSC (RootCA) +-----BEGIN CERTIFICATE----- +MIIGijCCBHKgAwIBAgIQA6OkV7Xw84ZKEWPomP8WnDANBgkqhkiG9w0BAQUFADCB +mDELMAkGA1UEBhMCTFQxLTArBgNVBAoTJFZJIFJlZ2lzdHJ1IENlbnRyYXMgLSBJ +LmsuIDEyNDExMDI0NjEuMCwGA1UECxMlUmVnaXN0cnUgQ2VudHJvIFNlcnRpZmlr +YXZpbW8gQ2VudHJhczEqMCgGA1UEAxMhVkkgUmVnaXN0cnUgQ2VudHJhcyBSQ1ND +IChSb290Q0EpMB4XDTA4MDcyMTExNDc0NloXDTI0MDcyMTExNDc0NlowgZgxCzAJ +BgNVBAYTAkxUMS0wKwYDVQQKEyRWSSBSZWdpc3RydSBDZW50cmFzIC0gSS5rLiAx +MjQxMTAyNDYxLjAsBgNVBAsTJVJlZ2lzdHJ1IENlbnRybyBTZXJ0aWZpa2F2aW1v +IENlbnRyYXMxKjAoBgNVBAMTIVZJIFJlZ2lzdHJ1IENlbnRyYXMgUkNTQyAoUm9v +dENBKTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMiZ8iLHs4cVLqfL +TUarZ5fPD3N3A/dkfHZIMiD0o9hZnRSpH6AekQ4NrfX+Z5KREyAhTQpVbnH6rBfL +AP0OUAIz26nYvWEa/eAQV7FVeWAZtFR5nvuAMOLIQslSAgjYrC/DcUFUAvWBihLj +aQKlh6FwfQW+pWK/BbAIlkdvf5OKreCs00LeveaPFOVzKKADm0H65T73OXQuZPSf +S8D1eJlUa+UVIPzpMnJAq2V1vDxGNNL4EGHHDHjHfMARUdEFNvv4nP8tuOVxLUnw +V0izk46c+zrJS20x11LVVumELpHUAh2ygAWBxYDKKcE0Z7mvBDBD9q9CR978AS7o +Qpy+sgsU5DTc3a1ThHrYA1bRwgzUlyn4TPK1HN+dg65fWiVLorAo5b9aC9CcqJxw +Km0OLuEnv60LbxHT+EYt9JdES8qwyOY2byK6juRSlRbsRGrUUB6YKPlopLrenjDt +oslSock1ikDhjZub/fFGi6THT3BgUY3ykqnOuowvSVISZ9D1qwQlQHQD4titoXRY +Ybe1DvN/JSwRY6/xEsP0pHOaZKzupgaP8rycrCipXBXTM63QNsghcGu8Kh/Vq7gB +WHb8OxFN+/IcSCQR/U2PGSmua+htXrKhDXjO0mODdLTNKUy/m3CITxINRee+D2XE +1jgk5EoVi9Fq6rs2oaGQpVPIpdZlAgMBAAGjgc0wgcowDgYDVR0PAQH/BAQDAgEG +MC8GCCsGAQUFBwEDBCMwITAIBgYEAI5GAQEwCwYGBACORgEDAgEKMAgGBgQAjkYB +BDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBS8cz4vnJEMu4/Nd5k+zIXkzFho +ETAQBgkrBgEEAYI3FQEEAwIBADBFBgNVHSAEPjA8MDoGCysGAQQBgfE3AQEBMCsw +KQYIKwYBBQUHAgEWHWh0dHA6Ly93d3cucmNzYy5sdC9yZXBvc2l0b3J5MA0GCSqG +SIb3DQEBBQUAA4ICAQAZeCxRE1+8mU5cpwH83rb+qR2GMRF7epmKs4iSpWDSBGM5 +vK+O2PErRXIyKTwt4tnYPXT6RzWH3BAANkE97ap+sszEGukxtPWR0YRK5/Xcz0Zn +ApmvuHf6fu0hb5YjFHE/0Fi+qttDLDegHQZpNPBPj3Xus9IBu+wc6Y+pie/41BtB +Apm+8F+6jizCIXDeUYHY97y4wzODw5fKCXPE6XfIcvRcrQ8Niurt0goBzutXnRXw +KRXvWZyvrJKCcAyY2CKdL5g1qdGKibzVnVXCLp4HJUb2kk1Q+j2J8t+Tv5OU0Nmv +V6PzZuaO8eigGxgGk1osiQ02xPogs9wo9WrujzGbWTjYTmqgIyHkhqvl+2Cj0c1a +LEJJpg5VJCU1/dI6r2tYppFGX2nLvX4mm94IvR7snqb4nHWkQDaVSyJPxrZ9clG8 +48Jozc3li77Awk+bbmXOFrcIiMeH3v8yjMvrQkGs+9fPAUP4b8DWC/D3kunLRV1k +sffKPLuJCJbJ2g7hcSoP7KRCLeNqD0dHsFOm1oVQlzDXjC5fRiLQrM48XpwecoP9 +DKf4FzK7Yd7jTy8YjoK1hxt0BTBKv2oeSDxUKLFdnZJfmxDjLiKKr902ZH8TdkeD +NZUalI/1xFNtOb3Vi/XKzxhDBQGTpDbeMNIU87BktcrOlfe6dOyKcz5S015TAA== +-----END CERTIFICATE----- + +# VeriSign Class 2 Public Primary Certification Authority - G3 +-----BEGIN CERTIFICATE----- +MIIEGTCCAwECEGFwy0mMX5hFKeewptlQW3owDQYJKoZIhvcNAQEFBQAwgcoxCzAJ +BgNVBAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVy +aVNpZ24gVHJ1c3QgTmV0d29yazE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24s +IEluYy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTFFMEMGA1UEAxM8VmVyaVNp +Z24gQ2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0 +eSAtIEczMB4XDTk5MTAwMTAwMDAwMFoXDTM2MDcxNjIzNTk1OVowgcoxCzAJBgNV +BAYTAlVTMRcwFQYDVQQKEw5WZXJpU2lnbiwgSW5jLjEfMB0GA1UECxMWVmVyaVNp +Z24gVHJ1c3QgTmV0d29yazE6MDgGA1UECxMxKGMpIDE5OTkgVmVyaVNpZ24sIElu +Yy4gLSBGb3IgYXV0aG9yaXplZCB1c2Ugb25seTFFMEMGA1UEAxM8VmVyaVNpZ24g +Q2xhc3MgMiBQdWJsaWMgUHJpbWFyeSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAt +IEczMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArwoNwtUs22e5LeWU +J92lvuCwTY+zYVY81nzD9M0+hsuiiOLh2KRpxbXiv8GmR1BeRjmL1Za6tW8UvxDO +JxOeBUebMXoT2B/Z0wI3i60sR/COgQanDTAM6/c8DyAd3HJG7qUCyFvDyVZpTMUY +wZF7C9UTAJu878NIPkZgIIUq1ZC2zYugzDLdt/1AVbJQHFauzI13TccgTacxdu9o +koqQHgiBVrKtaaNS0MscxCM9H5n+TOgWY47GCI72MfbS+uV23bUckqNJzc0BzWjN +qWm6o+sdDZykIKbBoMXRRkwXbdKsZj+WjOCE1Db/IlnF+RFgqF8EffIa9iVCYQ/E +Srg+iQIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQA0JhU8wI1NQ0kdvekhktdmnLfe +xbjQ5F1fdiLAJvmEOjr5jLX77GDx6M4EsMjdpwOPMPOY36TmpDHf0xwLRtxyID+u +7gU8pDM/CzmscHhzS5kr3zDCVLCoO1Wh/hYozUK9dG6A2ydEp85EXdQbkJgNHkKU +sQAsBNB0owIFImNjzYO1+8FtYmtpdf1dcEG59b98377BMnMiIYtYgXsVkXq642RI +sH/7NiXaldDxJBQX3RiAa0YjOVT1jmIJBB2UkKab5iXiQkWquJCtvgiPqQtCGJTP +cjnhsUPgKM+351psE2tJs//jGHyJizNdrDPXp/naOlXJWBD5qu9ats9LS98q +-----END CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G3 +-----BEGIN CERTIFICATE----- +MIIEGjCCAwICEQCbfgZJoz5iudXukEhxKe9XMA0GCSqGSIb3DQEBBQUAMIHKMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZl +cmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu +LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlT +aWduIENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3Jp +dHkgLSBHMzAeFw05OTEwMDEwMDAwMDBaFw0zNjA3MTYyMzU5NTlaMIHKMQswCQYD +VQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlT +aWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWduLCBJ +bmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWdu +IENsYXNzIDMgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMu6nFL8eB8aHm8b +N3O9+MlrlBIwT/A2R/XQkQr1F8ilYcEWQE37imGQ5XYgwREGfassbqb1EUGO+i2t +KmFZpGcmTNDovFJbcCAEWNF6yaRpvIMXZK0Fi7zQWM6NjPXr8EJJC52XJ2cybuGu +kxUccLwgTS8Y3pKI6GyFVxEa6X7jJhFUokWWVYPKMIno3Nij7SqAP395ZVc+FSBm +CC+Vk7+qRy+oRpfwEuL+wgorUeZ25rdGt+INpsyow0xZVYnm6FNcHOqd8GIWC6fJ +Xwzw3sJ2zq/3avL6QaaiMxTJ5Xpj055iN9WFZZ4O5lMkdBteHRJTW8cs54NJOxWu +imi5V5cCAwEAATANBgkqhkiG9w0BAQUFAAOCAQEAERSWwauSCPc/L8my/uRan2Te +2yFPhpk0djZX3dAVL8WtfxUfN2JzPtTnX84XA9s1+ivbrmAJXx5fj267Cz3qWhMe +DGBvtcC1IyIuBwvLqXTLR7sdwdela8wv0kL9Sd2nic9TutoAWii/gt/4uhMdUIaC +/Y4wjylGsB49Ndo4YhYYSq3mtlFs3q9i6wHQHiT+eo8SGhJouPtmmRQURVyu565p +F4ErWjfJXir0xuKhXFSbplQAz/DxwceYMBo7Nhbbo27q/a2ywtrvAkcTisDxszGt +TxzhT5yvDwyd93gN2PQ1VoDat20Xj50egWTh/sVFuq1ruQp6Tk9LhO5L8X3dEQ== +-----END CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G4 +-----BEGIN CERTIFICATE----- +MIIDhDCCAwqgAwIBAgIQL4D+I4wOIg9IZxIokYesszAKBggqhkjOPQQDAzCByjEL +MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZW +ZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2ln +biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJp +U2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IC0gRzQwHhcNMDcxMTA1MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCByjELMAkG +A1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJp +U2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNyBWZXJpU2lnbiwg +SW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2ln +biBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +IC0gRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASnVnp8Utpkmw4tXNherJI9/gHm +GUo9FANL+mAnINmDiWn6VMaaGF5VKmTeBvaNSjutEDxlPZCIBIngMGGzrl0Bp3ve +fLK+ymVhAIau2o970ImtTR1ZmkGxvEeA3J5iw/mjgbIwga8wDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJ +aW1hZ2UvZ2lmMCEwHzAHBgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYj +aHR0cDovL2xvZ28udmVyaXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFLMW +kf3upm7ktS5Jj4d4gYDs5bG1MAoGCCqGSM49BAMDA2gAMGUCMGYhDBgmYFo4e1ZC +4Kf8NoRRkSAsdk1DPcQdhCPQrNZ8NQbOzWm9kA3bbEhCHQ6qQgIxAJw9SDkjOVga +FRJZap7v1VmyHVIsmXHNxynfGyphe3HR3vPA5Q06Sqotp9iGKt0uEA== +-----END CERTIFICATE----- + +# VeriSign Class 3 Public Primary Certification Authority - G5 +-----BEGIN CERTIFICATE----- +MIIE0zCCA7ugAwIBAgIQGNrRniZ96LtKIVjNzGs7SjANBgkqhkiG9w0BAQUFADCB +yjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL +ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJp +U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxW +ZXJpU2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5IC0gRzUwHhcNMDYxMTA4MDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjEL +MAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZW +ZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwNiBWZXJpU2ln +biwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJp +U2lnbiBDbGFzcyAzIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24gQXV0aG9y +aXR5IC0gRzUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvJAgIKXo1 +nmAMqudLO07cfLw8RRy7K+D+KQL5VwijZIUVJ/XxrcgxiV0i6CqqpkKzj/i5Vbex +t0uz/o9+B1fs70PbZmIVYc9gDaTY3vjgw2IIPVQT60nKWVSFJuUrjxuf6/WhkcIz +SdhDY2pSS9KP6HBRTdGJaXvHcPaz3BJ023tdS1bTlr8Vd6Gw9KIl8q8ckmcY5fQG +BO+QueQA5N06tRn/Arr0PO7gi+s3i+z016zy9vA9r911kTMZHRxAy3QkGSGT2RT+ +rCpSx4/VBEnkjWNHiDxpg8v+R70rfk/Fla4OndTRQ8Bnc+MUCH7lP59zuDMKz10/ +NIeWiu5T6CUVAgMBAAGjgbIwga8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E +BAMCAQYwbQYIKwYBBQUHAQwEYTBfoV2gWzBZMFcwVRYJaW1hZ2UvZ2lmMCEwHzAH +BgUrDgMCGgQUj+XTGoasjY5rw8+AatRIGCx7GS4wJRYjaHR0cDovL2xvZ28udmVy +aXNpZ24uY29tL3ZzbG9nby5naWYwHQYDVR0OBBYEFH/TZafC3ey78DAJ80M5+gKv +MzEzMA0GCSqGSIb3DQEBBQUAA4IBAQCTJEowX2LP2BqYLz3q3JktvXf2pXkiOOzE +p6B4Eq1iDkVwZMXnl2YtmAl+X6/WzChl8gGqCBpH3vn5fJJaCGkgDdk+bW48DW7Y +5gaRQBi5+MHt39tBquCWIMnNZBU4gcmU7qKEKQsTb47bDN0lAtukixlE0kF6BWlK +WE9gyn6CagsCqiUXObXbf+eEZSqVir2G3l6BFoMtEMze/aiCKm0oHw0LxOXnGiYZ +4fQRbxC1lfznQgUy286dUV4otp6F01vvpX1FQHKOtw5rDgb7MzVIcbidJ4vEZV8N +hnacRHr2lVz2XTIIM6RUthg/aFzyQkqFOFSDX9HoLPKsEdao7WNq +-----END CERTIFICATE----- + +# VeriSign Universal Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIEuTCCA6GgAwIBAgIQQBrEZCGzEyEDDrvkEhrFHTANBgkqhkiG9w0BAQsFADCB +vTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQL +ExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTowOAYDVQQLEzEoYykgMjAwOCBWZXJp +U2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5MTgwNgYDVQQDEy9W +ZXJpU2lnbiBVbml2ZXJzYWwgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wODA0MDIwMDAwMDBaFw0zNzEyMDEyMzU5NTlaMIG9MQswCQYDVQQGEwJVUzEX +MBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAdBgNVBAsTFlZlcmlTaWduIFRydXN0 +IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAyMDA4IFZlcmlTaWduLCBJbmMuIC0gRm9y +IGF1dGhvcml6ZWQgdXNlIG9ubHkxODA2BgNVBAMTL1ZlcmlTaWduIFVuaXZlcnNh +bCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEF +AAOCAQ8AMIIBCgKCAQEAx2E3XrEBNNti1xWb/1hajCMj1mCOkdeQmIN65lgZOIzF +9uVkhbSicfvtvbnazU0AtMgtc6XHaXGVHzk8skQHnOgO+k1KxCHfKWGPMiJhgsWH +H26MfF8WIFFE0XBPV+rjHOPMee5Y2A7Cs0WTwCznmhcrewA3ekEzeOEz4vMQGn+H +LL729fdC4uW/h2KJXwBL38Xd5HVEMkE6HnFuacsLdUYI0crSK5XQz/u5QGtkjFdN +/BMReYTtXlT2NJ8IAfMQJQYXStrxHXpma5hgZqTZ79IugvHw7wnqRMkVauIDbjPT +rJ9VAMf2CGqUuV/c4DPxhGD5WycRtPwW8rtWaoAljQIDAQABo4GyMIGvMA8GA1Ud +EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMG0GCCsGAQUFBwEMBGEwX6FdoFsw +WTBXMFUWCWltYWdlL2dpZjAhMB8wBwYFKw4DAhoEFI/l0xqGrI2Oa8PPgGrUSBgs +exkuMCUWI2h0dHA6Ly9sb2dvLnZlcmlzaWduLmNvbS92c2xvZ28uZ2lmMB0GA1Ud +DgQWBBS2d/ppSEefUxLVwuoHMnYH0ZcHGTANBgkqhkiG9w0BAQsFAAOCAQEASvj4 +sAPmLGd75JR3Y8xuTPl9Dg3cyLk1uXBPY/ok+myDjEedO2Pzmvl2MpWRsXe8rJq+ +seQxIcaBlVZaDrHC1LGmWazxY8u4TB1ZkErvkBYoH1quEPuBUDgMbMzxPcP1Y+Oz +4yHJJDnp/RVmRvQbEdBNc6N9Rvk97ahfYtTxP/jgdFcrGJ2BtMQo2pSXpXDrrB2+ +BxHw1dvd5Yzw1TKwg+ZX4o+/vqGqvz0dtdQ46tewXDpPaj+PwGZsY6rp2aQW9IHR +lRQOfc2VNNnSj3BzgXucfr2YYdhFh5iQxeuGMMY1v/D/w1WIg0vvBZIGcfK4mJO3 +7M2CYfE45k+XmCpajQ== +-----END CERTIFICATE----- + +# VeriSign, Inc. +-----BEGIN CERTIFICATE----- +MIICQDCCAakCEAPHjzfbkijfPLsarYL6ZxAwDQYJKoZIhvcNAQECBQAwYTERMA8G +A1UEBxMISW50ZXJuZXQxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMTMwMQYDVQQL +EypWZXJpU2lnbiBDb21tZXJjaWFsIFNvZnR3YXJlIFB1Ymxpc2hlcnMgQ0EwHhcN +OTYwNDA5MDAwMDAwWhcNMDQwMTA3MjM1OTU5WjBhMREwDwYDVQQHEwhJbnRlcm5l +dDEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xMzAxBgNVBAsTKlZlcmlTaWduIENv +bW1lcmNpYWwgU29mdHdhcmUgUHVibGlzaGVycyBDQTCBnzANBgkqhkiG9w0BAQEF +AAOBjQAwgYkCgYEAw9NpZVIBlFSrKMZiGLNUVcVEh0VKO8J+2NPXyICGjdgM8Rac +zGupKbKPdnOSyMVipjztHgV18BMAbBRN1JiQB75pc4G4Yk4xHtH8yQzrfZC/rrRH +UexvzmQ1AtZ9ZwV34o/ZUdf7lxm8Ptd3gcZD3fLd38qjg4vLQcE9IkhIphkCAwEA +ATANBgkqhkiG9w0BAQIFAAOBgQC1vLB1aomihr1keMOnMnVyEaomAhdgMEzjSDQZ +uVJKURiA/lMte9UxjMVlmUFBL/KuY3roc5kVkBofeotB0I460M04NETQdfjqccSB +GTgXNUquxT4y5iG4BcCT4cc4XNj3kzhkkO1UzsrT09Bf7wSb3gKC3YgpscNPpc1x +ZDE8PA== +-----END CERTIFICATE----- + +# Verizon Global Root CA +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgIBATANBgkqhkiG9w0BAQsFADBcMQswCQYDVQQGEwJVUzEZ +MBcGA1UECgwQVmVyaXpvbiBCdXNpbmVzczERMA8GA1UECwwIT21uaVJvb3QxHzAd +BgNVBAMMFlZlcml6b24gR2xvYmFsIFJvb3QgQ0EwHhcNMDkwNzMwMTQyNzA0WhcN +MzQwNzMwMTQyNzA0WjBcMQswCQYDVQQGEwJVUzEZMBcGA1UECgwQVmVyaXpvbiBC +dXNpbmVzczERMA8GA1UECwwIT21uaVJvb3QxHzAdBgNVBAMMFlZlcml6b24gR2xv +YmFsIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCKAAxw +Hb/rNIbDmUU1Hn9D96tvJC3NGcIQu7DKKVupIKurcizE4gI5bYK4xRHq+PuznmL4 +Mx6wH8nj9jfbBMg7Y0824oWkJR3HaR8EvWhFE5YHH5RQ9T7FJ1SewElXRI4HY9Sm +ru0imcxNlmkEE252iZ90FpT5HVS9ornSgwEiDE1EgKr+NYknJaeGicbVGpLjj8WV +oBRymuhWxQJVHJf5IC7Q9TwTGVr24fkLA4Jpp4y31m+cVj6d6CoJYG1L5vuLmRT3 +NE9lWYCNuVfIojUh2IhxVl3uglctJpAYn5qcnI/v1MVjp1R9R5GHfRoSqBsYb6lv +sSe65AR0zjcef2bFAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMB0GA1UdDgQWBBRMOBG4mABbWitwPqp45NVnZ2enfjANBgkqhkiG9w0B +AQsFAAOCAQEAAV+gsQYB9HnXZRhgPs95oLrCI08j34eWX4EOOBUuXMgCaCkg/Ivu +pYoYgWRcmDV+OTCCpIKKULW6w+ha1qie4sMX29vE67AKIA3pnuP/YFRH8Tud1Cg8 +oq6j+6qLgiIqNYeQuBxZR5DVnS76SeNlqDbrx+QcaNyzMWyrTs4kgBXIEFkQEXJN +epyYnMT8YeCzsp1OoMbCWasY1qJVRewpqiU31k5KPQtAweST5PzNkQv45qvMs3bE +Yr8Z7Ya2ecMpVFS8mX1GV8+mz/RUKpoDZUcBoUIqyyVHbnxeAEuR2fkbEAZw+UIV +pl+q10Ae/clInZeB6lxowqDniaFTTb/H4w== +-----END CERTIFICATE----- + +# XRamp Global CA Root +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbw= +-----END CERTIFICATE----- + +# certSIGN ROOT CA +-----BEGIN CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KD +-----END CERTIFICATE----- + +# e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi +-----BEGIN CERTIFICATE----- +MIIDtjCCAp6gAwIBAgIQRJmNPMADJ72cdpW56tustTANBgkqhkiG9w0BAQUFADB1 +MQswCQYDVQQGEwJUUjEoMCYGA1UEChMfRWxla3Ryb25payBCaWxnaSBHdXZlbmxp +Z2kgQS5TLjE8MDoGA1UEAxMzZS1HdXZlbiBLb2sgRWxla3Ryb25payBTZXJ0aWZp +a2EgSGl6bWV0IFNhZ2xheWljaXNpMB4XDTA3MDEwNDExMzI0OFoXDTE3MDEwNDEx +MzI0OFowdTELMAkGA1UEBhMCVFIxKDAmBgNVBAoTH0VsZWt0cm9uaWsgQmlsZ2kg +R3V2ZW5saWdpIEEuUy4xPDA6BgNVBAMTM2UtR3V2ZW4gS29rIEVsZWt0cm9uaWsg +U2VydGlmaWthIEhpem1ldCBTYWdsYXlpY2lzaTCCASIwDQYJKoZIhvcNAQEBBQAD +ggEPADCCAQoCggEBAMMSIJ6wXgBljU5Gu4Bc6SwGl9XzcslwuedLZYDBS75+PNdU +MZTe1RK6UxYC6lhj71vY8+0qGqpxSKPcEC1fX+tcS5yWCEIlKBHMilpiAVDV6wlT +L/jDj/6z/P2douNffb7tC+Bg62nsM+3YjfsSSYMAyYuXjDtzKjKzEve5TfL0TW3H +5tYmNwjy2f1rXKPlSFxYvEK+A1qBuhw1DADT9SN+cTAIJjjcJRFHLfO6IxClv7wC +90Nex/6wN1CZew+TzuZDLMN+DfIcQ2Zgy2ExR4ejT669VmxMvLz4Bcpk9Ok0oSy1 +c+HCPujIyTQlCFzz7abHlJ+tiEMl1+E5YP6sOVkCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFJ/uRLOU1fqRTy7ZVZoE +VtstxNulMA0GCSqGSIb3DQEBBQUAA4IBAQB/X7lTW2M9dTLn+sR0GstG30ZpHFLP +qk/CaOv/gKlR6D1id4k9CnU58W5dF4dvaAXBlGzZXd/aslnLpRCKysw5zZ/rTt5S +/wzw9JKp8mxTq5vSR6AfdPebmvEvFZ96ZDAYBzwqD2fK/A+JYZ1lpTzlvBNbCNvj +/+27BrtqBrF6T2XGgv0enIu1De5Iu7i9qgi0+6N8y5/NkHZchpZ4Vwpm+Vganf2X +KWDeEaaQHBkc7gGWIjQ0LpH5t8Qn0Xvmv/uARFoW5evg1Ao4vOSR49XrXMGs3xtq +fJ7lddK2l4fbzIcrQzqECK+rPNv3PGYxhrCdU3nt+CPeQuMtgvEP5fqX +-----END CERTIFICATE----- + +# e-Szigno Root CA 2017 +-----BEGIN CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMQ== +-----END CERTIFICATE----- + +# ePKI Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZw= +-----END CERTIFICATE----- + +# ePKI Root Certification Authority - G2 +-----BEGIN CERTIFICATE----- +MIIFkzCCA3ugAwIBAgIRANaWLsEKFZMSr49jvNREyVswDQYJKoZIhvcNAQELBQAw +YzELMAkGA1UEBhMCVFcxIzAhBgNVBAoMGkNodW5naHdhIFRlbGVjb20gQ28uLCBM +dGQuMS8wLQYDVQQDDCZlUEtJIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkg +LSBHMjAeFw0xNTExMTcwODIzNDJaFw0zNzEyMzExNTU5NTlaMGMxCzAJBgNVBAYT +AlRXMSMwIQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEvMC0GA1UE +AwwmZVBLSSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwggIiMA0G +CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCkWR+gL9++4Pvp3LWJ/lqXA8k6d6eO +XK/y4xg59ardD0bSaA9XnKdjYNNYzjXCp/aIwk9/Gyjp0KcAxBdNbeIPxQ4mIyCr +9zoookwKC8yOzuYAmlpADdRQGpvRDZyU+dvuXNDxigfNmitALEmkXWJfp2vf7lYI +UPNCGGwxsF7lnHOSvA7SDH3FOFe8u1jbJhkC7eNDhIpOVmvbraEx2cwiZ5Z4/3ed +zGTFMiBq704w1SQl/Yh5r3Ea/tVLGxWIvBhwqr2tOApmMEbliYXVdiSpqbPmWWAP +tKlTwjqdRRrWruN3XsRiNjMvMMS/lfEtOKV16NFqky5Fh0tKot+/WCeaymIZql7U +sYBJlt0r7F+Pm+Cdl4j1hAOjr7Olcy1BuuUHt29rcff3yVqvaZmzL8hPQutsa3Fn +eN8KrE/XSoUARhrVzbif6pWdD3zRxgWF5gjeiBeB9tW1buqhHNdhquNZQomcWX6x +fGQ03WEjKjm1EKv8hqlTGsXrauKATlmRwDiJ/rNd1vuR6dewfdl4CMz1K8wr4aHW +lHPB/lH0jH0KtZqKufXa4Mmz2I+qgoONaVMt/QAEGEqg2lTheYyJ63/1gueguXdN +rvm6AjuIdut8XbNaE9t8KRZrmdEd5Eghog1eAYjovvGYTT7HFlccX+EIbxxMWENW +94BljHEOogRnTwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRy +W7qqcjjuJZAktZQi+gmIyosK+zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL +BQADggIBAAaj8bZzVcZnZiHlnVvWlC5KImDyVAGQof21v8CVvxhfLPZrNQ78Mcjt +RA6Sl9yv3VbPtR+6cpwwyJuxkcB2d9QPGpUa6U0UiKHPawKmautkRU1kjd7862zy +UwmhhVEV0E+eYvoRuc7IJA5yZIh1NCMwKj+8PDnMzN0LNru9BoKPEgHFcQXRJKGZ +bMrk96rtitenCq2v8OCAu6GyP1qHZHCGM3sNHtcAhoNDl3X1O8FI/bYOQ6gCbrg+ +f49O4l20fZ4wNC+o8esnh2gNWgpNAdvJFFiV8ppNFqpz2/QliBc4t69ZCQm0Hy0P +q/W4J1XuRTAzuO0bjryIbK/4Wipr4KyxBSShCfyjD/OwLXuWuraUBxVFjincWA6p +Bdg7OqB7zYrHZoKXz9Yz4Gf8pttALwXlxYt6KnrwsDabDBj2N+lBof2xKPlva73r +H0xjcXtQ3Sny/+73x0Vf6DYK6GxbIsPowOcm3OOolYDluToT2wBLGv2uM0d+eJTj +sV0rtVa1QoufgcX8k0wQtboKvH434/pUbfUExXCzqQTSUdeFzX1vQ49ZaOUxVhFx ++WQpCRP+0B+8iwA4stDKNFZ2EDlWc2bD0UnZvldPPxZ9ani3qIK4W86uhYoKQgwD +0RfEGPfYV4jGgrgHuT79pOku3G+6kJLuZbBQNNMH2gGXD7znc4J7 +-----END CERTIFICATE----- + +# emSign ECC Root CA - C3 +-----BEGIN CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== +-----END CERTIFICATE----- + +# emSign ECC Root CA - G3 +-----BEGIN CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyj +-----END CERTIFICATE----- + +# emSign Root CA - C2 +-----BEGIN CERTIFICATE----- +MIIFcjCCA1qgAwIBAgIKLwq3aw3LSq8nWDANBgkqhkiG9w0BAQwFADBWMQswCQYD +VQQGEwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJ +bmMxHDAaBgNVBAMTE2VtU2lnbiBSb290IENBIC0gQzIwHhcNMTgwMjE4MTgzMDAw +WhcNNDMwMjE4MTgzMDAwWjBWMQswCQYDVQQGEwJVUzETMBEGA1UECxMKZW1TaWdu +IFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMxHDAaBgNVBAMTE2VtU2lnbiBSb290 +IENBIC0gQzIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCMfX1lA+Tb +mh9YInmRgOW97IVx4LUJf2DRZfs837Jrml+py64aVnYgWO4t6C78fgjfS7jX+c4T +inIzEquWcI+zi0fd4Sc8NDf7JONp27VWX0qwUYqzLDRCt+s7zpLcfx1ky0zVIJj6 +L06uPyK3kIr9+YAsrVj+39utm6e2MBQsRNstSI3fCQYAGvoQTQ8fULauTqNWaYAk +NYFe6HUHHQPp2u1Ua00odMXiD5oRFxLcDnGAcE1I/9E9mLCdkggXijYUmico7+Xw +ZeFoPhva6eIJ5p03Lt3Du5W3EcHR0cJmmY1pyeA36JaXKWRNM9IRjYMVNCcp4jhB +2tIYiZ+LVk8bwQ9/1c23txmv3u97taZlV22NF4ttS1qq3J+MOp0oGULBzpKfRx0q +GVqbPukQNGAjOLIN8KDNQNzbR1iAl2d8H+MSoicBo4Aid8TjLWcNv48oCWL53ZrF +BMTDjaIA6frG1t4IpbnHadA7qCJJe2qpJN6n2eQKAUn6UiQDHPsSqNBlcUhQ4Y/0 +Y0mU5rghm2OB9rXQS1Fb1JRCfJMNnJIm5AUB2+2RWzq5Tgz7SbSho8NsZk0UbQnF +xciqQ9uoVTAsK14Sk9oG8Q3zfsM08cdPoRb0WlIZklR6mKD7L8nH/zfGu8PIJv94 +GGB9RZ9U4A69r3ePmy8MvrzfNxHKtH6svwIDAQABo0IwQDAdBgNVHQ4EFgQUs/eK +pNYPiABZ6FEXT9V+7IYigZ0wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADQlpiWM0cv2nZ0H5jVsBq0x2q62Q0LwqATs +CFvyub7gxNCytRuoA8stmPOEu/lg8Igxj4FIjoyhIrWUVxyiLU7No4P+WjEUOwUT +xIpkEOtvGUQ9fiOlcGHtIZDNBlZq7WpktXAxeV55RPPsor26p2FNAMRFfZQh0sLX +hKgk8iulSSggqx8ezgPye63FaiYEi4c/dzRj3HOCnsZiwZZU02df5YpNFjxSwZvE +41cjGpsrpWMfQFI2s53RbeXp47lSAxYE4NzjBFMe+EwFuEveBCJBEAH5rvYu3pi2 +orsJ424TqWEQV1tCsCkQz+Yq/Okal7yHAkKDeOXcP7oN4A+TdXc2pdqxuVCnBO0R +mWz2JpGSSeJjiTk/OPwRsPNWtwG/KXL04o2ta3jiPpJuICVtWDAc9R3auBEgJl5r +ShRmBdszG0LmzsHuZPCFSYC15RBDCOBsa8bDRJ8pBFU2Wi/CVXCACEuavgoveA4F +a5bt38o0PWxsBP+MpocCdVtDMqzQhxy9IohKuXWAGresoIvKDg3xFk6rBOrjfVwJ +elwi/xAisojHPJVQv9W1zVIoHp+EQg/4MQC21NbIX2RoioB+V3hK439b/w7deU8x +2M8cl1OG0nPfbnARl5GPM7vJgi470jto4SeMg6HMAW3Egb56tQcNLwI9U8mZnNvR +gUMrkAgL +-----END CERTIFICATE----- + +# emSign Root CA - G2 +-----BEGIN CERTIFICATE----- +MIIFlTCCA32gAwIBAgILAIZNvw/jXtd9jtgwDQYJKoZIhvcNAQEMBQAwZzELMAkG +A1UEBhMCSU4xEzARBgNVBAsTCmVtU2lnbiBQS0kxJTAjBgNVBAoTHGVNdWRocmEg +VGVjaG5vbG9naWVzIExpbWl0ZWQxHDAaBgNVBAMTE2VtU2lnbiBSb290IENBIC0g +RzIwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBnMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBHMjCCAiIw +DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMNwGIWW2kHfHK+sXTNwxF07K+IV +ySTuyFM2r1v002wUfcdT+zs5OM5QbMYFFnedXQI6gCFLsjKrcaej48Zt37OyEb3i +aPs7CsP4kAyTwzKH9aZe6gXYHrJq40/ZVMNcQVI2PcIp40B/SAN2gUZ+ZaUtIOvV +jEx26/ebNaXRIsthlkOG/caB+QRwDw1tl7338Zlv0M2oTBUy4B3e7dGP5pgXH71M +jqHPCoNo+xv9f0NTBT+hUDa8h8wUtcGQq9CDeJTpjWcD2bP2AMdVG6oVpMAUeUzo +cCyglvtFdUMjggxBbw4qhau1HXPG8Ot9hwL7ZMi8tkTzrvUIxxb8G9LF/7kKeCE7 +tGZaVzDTnXuifl3msR4ErHsQ4P7lVu2AIjIAhrAXoedDidb7pMcf7TABdrYUT1Jo +G/AiK+J9jO6GTjeADD4LMDSBZhHMuBK/PJ/g0kGBt+/C1L+/HURzQhJkMlRnM6Rv +XoCtfKopSlns5trZmTi971Wjbn88QXP61lGpBCUPwCjs7rpOYvSUJtI+lcbF+37q +kIqOXYkVT3cupDSpw+H89kFtj5GKY+Xny4LxY+3IvDIRiyd6ky1DPj713DI0yqve +EpsIr3A0PdwuyUI7CS1jg0NnGFT6Xxyr0xB+VDt83FJYW8v16k2pbaQ4kVxA3aXd +X9dZYyVR1S59KM75AgMBAAGjQjBAMB0GA1UdDgQWBBTt7E1FYRgo57MjKBEcTaUn +DV7s9DAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0B +AQwFAAOCAgEACFC/ilQg8KTCVBxFJW/sazomkS0kNYbEIZg4B3obqwsJ7SX98z8Z +gfzBpz0nYClwwJjWbFN1R2zY8pCEot6/dgmA8Vbq0GxhwPM5YN/SZquNyRIxO3cU +dlAcwf+vSezdVCf9wOzvSAF3q0a5ljvbdbNJNpfScQVp7UUd5sBsZk8jXO1KQ/go +/Vf/GDPnrIFmxpAIGE3sgnO8lAv9FzUaAeuv7HWe47xN9J7+bQzF93yHuIXACPTL +pQHhg2zMv5C7BAbuDHfbj1Cu294Z832yhSfBcziWGskOvl3es2EcHytbS9c9P+0z +Mpka7zGC1FHrvLb/FoduH86TeZt0QjZ6pcplNzoaxDnDvzTJ6CC2Eny+qH/APFCu +VUv5/wjwF+HPm8Pup2ARj9cEp92+0qcerfHacNq5hMeGZdbA/dzdUR/5z5zXdxAk +nl8mcfGb0eMNSTXQmmB/i4AecNnr72uYjzlaXUGYN7Nrb6XouG0pnh0/BBtWWp0U +ShIPpWEAqs7RJBj6+1ZUYXZ4ObrCw962DxhN2p19Hxw9LtuUUcLqqTPrFXYvwO4t +ouj7KJnAkaTUfXGdEaFVtFig1EA30WzJY2X1vAQ7hVnniCjgaXAGqjsU6sklNM9n +xDx5rFCCCEtj9Kh8UHjGK2QqgP5kwgttjOApQMaCoezMfK4KD7WpOXU= +-----END CERTIFICATE----- + +# state-institutions +-----BEGIN CERTIFICATE----- +MIIEGTCCAwGgAwIBAgIEOzz5yTANBgkqhkiG9w0BAQUFADA9MQswCQYDVQQGEwJz +aTEbMBkGA1UEChMSc3RhdGUtaW5zdGl0dXRpb25zMREwDwYDVQQLEwhzaWdlbi1j +YTAeFw0wMTA2MjkyMTI3NDZaFw0yMTA2MjkyMTU3NDZaMD0xCzAJBgNVBAYTAnNp +MRswGQYDVQQKExJzdGF0ZS1pbnN0aXR1dGlvbnMxETAPBgNVBAsTCHNpZ2VuLWNh +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsOVlssCsZJbyiBuz7Z7k +AsZPK4jOLopRgHWvEFvyyzhmm6IObTRHlqWSEa/2NUeidyIMzhaIYqrTSW4YvC5E +2L7GnsIaGaxBjvwwBwLyxmrUWyMA70E02KRzY98ikjOEAaWN84Nc+rjUejXf7Pht +D+BM7a2cOn2G1qUIlL59ehEf/oU/VFqIY4ecpbGnTs23RHOvz4pJax/jzddJTVor +F+ZcdrO7crlvJ9KbiRWI3xBfdiEBascVMQrRnFj4KBYFbdlO2aHXByDLSyaJTZKy +p7qW6ONYjyKcAZZaxPcxTQtJteF4YeJUGAa7nlQ0fgw+6+61gB/dFoQdaDhmZ3P4 +kQIDAQABo4IBHzCCARswEQYJYIZIAYb4QgEBBAQDAgAHMF8GA1UdHwRYMFYwVKBS +oFCkTjBMMQswCQYDVQQGEwJzaTEbMBkGA1UEChMSc3RhdGUtaW5zdGl0dXRpb25z +MREwDwYDVQQLEwhzaWdlbi1jYTENMAsGA1UEAxMEQ1JMMTArBgNVHRAEJDAigA8y +MDAxMDYyOTIxMjc0NlqBDzIwMjEwNjI5MjE1NzQ2WjALBgNVHQ8EBAMCAQYwHwYD +VR0jBBgwFoAUcXuKBh8xBVWrYBJ3RyAeA4gY7IkwHQYDVR0OBBYEFHF7igYfMQVV +q2ASd0cgHgOIGOyJMAwGA1UdEwQFMAMBAf8wHQYJKoZIhvZ9B0EABBAwDhsIVjUu +MDo0LjADAgSQMA0GCSqGSIb3DQEBBQUAA4IBAQAAumM08xgY7q5+jZLHNfXCE9TW +AKohMhbW0Fv6KbCN+hd3kvmltvb5hz8GDyDuYj0096kvx6k70CeITKzdyanlWliF +1xI1Pdywglty9Ltzt/v+OCGYBICyiGIPHqw6Fqnmswr2FRBFA6OX4s2sENz5AB6/ +c2xD7HciFgYvloOJe7C4U0RBCNyAHwXbGQl2h741nU4hS7STwWg6nV82/qGuMCxL +3ngkOljWFkPvnZk4iyqY/jDRwurWryXVpXYLue9AOS72698yXh19h7VEzAI50iaV +cthvhUOojw6jRs7Xzui5Vqn4iRcSH0NJBnoy5z++b3m+1jPXTDwo/BLxdnYY +-----END CERTIFICATE----- + +# thawte Primary Root CA +-----BEGIN CERTIFICATE----- +MIIEIDCCAwigAwIBAgIQNE7VVyDV7exJ9C/ON9srbTANBgkqhkiG9w0BAQUFADCB +qTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMf +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIw +MDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxHzAdBgNV +BAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwHhcNMDYxMTE3MDAwMDAwWhcNMzYw +NzE2MjM1OTU5WjCBqTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5j +LjEoMCYGA1UECxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYG +A1UECxMvKGMpIDIwMDYgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNl +IG9ubHkxHzAdBgNVBAMTFnRoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCsoPD7gFnUnMekz52hWXMJEEUMDSxuaPFs +W0hoSVk3/AszGcJ3f8wQLZU0HObrTQmnHNK4yZc2AreJ1CRfBsDMRJSUjQJib+ta +3RGNKJpchJAQeg29dGYvajig4tVUROsdB58Hum/u6f1OCyn1PoSgAfGcq/gcfomk +6KHYcWUNo1F77rzSImANuVud37r8UVsLr5iy6S7pBOhih94ryNdOwUxkHt3Ph1i6 +Sk/KaAcdHJ1KxtUvkcx8cXIcxcBn6zL9yZJclNqFwJu/U30rCfSMnZEfl2pSy94J +NqR32HuHUETVPm4pafs5SSYeCaWAe0At6+gnhcn+Yf1+5nyXHdWdAgMBAAGjQjBA +MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBR7W0XP +r87Lev0xkhpqtvNG61dIUDANBgkqhkiG9w0BAQUFAAOCAQEAeRHAS7ORtvzw6WfU +DW5FvlXok9LOAz/t2iWwHVfLHjp2oEzsUHboZHIMpKnxuIvW1oeEuzLlQRHAd9mz +YJ3rG9XRbkREqaYB7FViHXe4XI5ISXycO1cRrK1zN44veFyQaEfZYGDm/Ac9IiAX +xPcW6cTYcvnIc3zfFi8VqT79aie2oetaupgf1eNNZAqdE8hhuvU5HIe6uL17In/2 +/qxAeeWsEG89jxt5dovEN7MhGITlNgDrYyCZuen+MwS7QcjBAvlEYyCegc5C09Y/ +LHbTY5xZ3Y+m4Q6gLkH3LpVHz7z9M/P2C2F+fpErgUfCJzDupxBdN49cOSvkBPB7 +jVaMaA== +-----END CERTIFICATE----- + +# thawte Primary Root CA - G2 +-----BEGIN CERTIFICATE----- +MIICiDCCAg2gAwIBAgIQNfwmXNmET8k9Jj1Xm67XVjAKBggqhkjOPQQDAzCBhDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjE4MDYGA1UECxMvKGMp +IDIwMDcgdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAi +BgNVBAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMjAeFw0wNzExMDUwMDAw +MDBaFw0zODAxMTgyMzU5NTlaMIGEMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhh +d3RlLCBJbmMuMTgwNgYDVQQLEy8oYykgMjAwNyB0aGF3dGUsIEluYy4gLSBGb3Ig +YXV0aG9yaXplZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9v +dCBDQSAtIEcyMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEotWcgnuVnfFSeIf+iha/ +BebfowJPDQfGAFG6DAJSLSKkQjnE/o/qycG+1E3/n3qe4rF8mq2nhglzh9HnmuN6 +papu+7qzcMBniKI11KOasf2twu8x+qi58/sIxpHR+ymVo0IwQDAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUmtgAMADna3+FGO6Lts6K +DPgR4bswCgYIKoZIzj0EAwMDaQAwZgIxAN344FdHW6fmCsO99YCKlzUNG4k8VIZ3 +KMqh9HneteY4sPBlcIx/AlTCv//YoT7ZzwIxAMSNlPzcU9LcnXgWHxUzI1NS41ox +XZ3Krr0TKUQNJ1uo52icEvdYPy5yAlejj6EULg== +-----END CERTIFICATE----- + +# thawte Primary Root CA - G3 +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIQYAGXt0an6rS0mtZLL/eQ+zANBgkqhkiG9w0BAQsFADCB +rjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDHRoYXd0ZSwgSW5jLjEoMCYGA1UECxMf +Q2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjE4MDYGA1UECxMvKGMpIDIw +MDggdGhhd3RlLCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxJDAiBgNV +BAMTG3RoYXd0ZSBQcmltYXJ5IFJvb3QgQ0EgLSBHMzAeFw0wODA0MDIwMDAwMDBa +Fw0zNzEyMDEyMzU5NTlaMIGuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMdGhhd3Rl +LCBJbmMuMSgwJgYDVQQLEx9DZXJ0aWZpY2F0aW9uIFNlcnZpY2VzIERpdmlzaW9u +MTgwNgYDVQQLEy8oYykgMjAwOCB0aGF3dGUsIEluYy4gLSBGb3IgYXV0aG9yaXpl +ZCB1c2Ugb25seTEkMCIGA1UEAxMbdGhhd3RlIFByaW1hcnkgUm9vdCBDQSAtIEcz +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsr8nLPvb2FvdeHsbnndm +gcs+vHyu86YnmjSjaDFxODNi5PNxZnmxqWWjpYvVj2AtP0LMqmsywCPLLEHd5N/8 +YZzic7IilRFDGF/Eth9XbAoFWCLINkw6fKXRz4aviKdEAhN0cXMKQlkC+BsUa0Lf +b1+6a4KinVvnSr0eAXLbS3ToO39/fR8EtCab4LRarEc9VbjXsCZSKAExQGbY2SS9 +9irY7CFJXJv2eul/VTV+lmuNk5Mny5K76qxAwJ/C+IDPXfRa3M50hqY+bAtTyr2S +zhkGcuYMXDhpxwTWvGzOW/b3aJzcJRVIiKHpqfiYnODz1TEoYRFsZ5aNOZnLwkUk +OQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNV +HQ4EFgQUrWyqlGCc7eT/+j4KdCtjA/e2Wb8wDQYJKoZIhvcNAQELBQADggEBABpA +2JVlrAmSicY59BDlqQ5mU1143vokkbvnRFHfxhY0Cu9qRFHqKweKA3rD6z8KLFIW +oCtDuSWQP3CpMyVtRRooOyfPqsMpQhvfO0zAMzRbQYi/aytlryjvsvXDqmbOe1bu +t8jLZ8HJnBoYuMTDSQPxYA5QzUbF83d597YV4Djbxy8ooAw/dyZ02SUS2jHaGh7c +KUGRIjxpp7sC8rZcJwOJ9Abqm+RyguOhCcHpABnTPtRwa7pxpqpYrvS76Wy274fM +m7v/OeZWYdMKp8RcTGB7BXcmer/YB1IsYvdwY9k5vG8cwnncdimvzsUsZAReiDZu +MdRAGmI0Nj81Aa6sY6A= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/extracted/pem/tls-ca-bundle.pem b/pki/ca-trust/extracted/pem/tls-ca-bundle.pem new file mode 100644 index 0000000..87ded3b --- /dev/null +++ b/pki/ca-trust/extracted/pem/tls-ca-bundle.pem @@ -0,0 +1,3949 @@ +# ACCVRAIZ1 +-----BEGIN CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 +-----END CERTIFICATE----- + +# AC RAIZ FNMT-RCM +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx +CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ +WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ +BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG +Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ +yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf +BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz +WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF +tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z +374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC +IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL +mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 +wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS +MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 +ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet +UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H +YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 +LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD +nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 +RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM +LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf +77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N +JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm +fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp +6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp +1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B +9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok +RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv +uu8wd+RU4riEmViAqhOLUTpPSPaLtrM= +-----END CERTIFICATE----- + +# AC RAIZ FNMT-RCM SERVIDORES SEGUROS +-----BEGIN CERTIFICATE----- +MIICbjCCAfOgAwIBAgIQYvYybOXE42hcG2LdnC6dlTAKBggqhkjOPQQDAzB4MQsw +CQYDVQQGEwJFUzERMA8GA1UECgwIRk5NVC1SQ00xDjAMBgNVBAsMBUNlcmVzMRgw +FgYDVQRhDA9WQVRFUy1RMjgyNjAwNEoxLDAqBgNVBAMMI0FDIFJBSVogRk5NVC1S +Q00gU0VSVklET1JFUyBTRUdVUk9TMB4XDTE4MTIyMDA5MzczM1oXDTQzMTIyMDA5 +MzczM1oweDELMAkGA1UEBhMCRVMxETAPBgNVBAoMCEZOTVQtUkNNMQ4wDAYDVQQL +DAVDZXJlczEYMBYGA1UEYQwPVkFURVMtUTI4MjYwMDRKMSwwKgYDVQQDDCNBQyBS +QUlaIEZOTVQtUkNNIFNFUlZJRE9SRVMgU0VHVVJPUzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPa6V1PIyqvfNkpSIeSX0oNnnvBlUdBeh8dHsVnyV0ebAAKTRBdp20LH +sbI6GA60XYyzZl2hNPk2LEnb80b8s0RpRBNm/dfF/a82Tc4DTQdxz69qBdKiQ1oK +Um8BA06Oi6NCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFAG5L++/EYZg8k/QQW6rcx/n0m5JMAoGCCqGSM49BAMDA2kAMGYCMQCu +SuMrQMN0EfKVrRYj3k4MGuZdpSRea0R7/DjiT8ucRRcRTBQnJlU5dUoDzBOQn5IC +MQD6SmxgiHPz7riYYqnOK8LZiqZwMR2vsJRM60/G49HzYqc8/5MuB1xJAWdpEgJy +v+c= +-----END CERTIFICATE----- + +# ANF Secure Server Root CA +-----BEGIN CERTIFICATE----- +MIIF7zCCA9egAwIBAgIIDdPjvGz5a7EwDQYJKoZIhvcNAQELBQAwgYQxEjAQBgNV +BAUTCUc2MzI4NzUxMDELMAkGA1UEBhMCRVMxJzAlBgNVBAoTHkFORiBBdXRvcmlk +YWQgZGUgQ2VydGlmaWNhY2lvbjEUMBIGA1UECxMLQU5GIENBIFJhaXoxIjAgBgNV +BAMTGUFORiBTZWN1cmUgU2VydmVyIFJvb3QgQ0EwHhcNMTkwOTA0MTAwMDM4WhcN +MzkwODMwMTAwMDM4WjCBhDESMBAGA1UEBRMJRzYzMjg3NTEwMQswCQYDVQQGEwJF +UzEnMCUGA1UEChMeQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uMRQwEgYD +VQQLEwtBTkYgQ0EgUmFpejEiMCAGA1UEAxMZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9v +dCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvrayvmZFSVgpCj +cqQZAZ2cC4Ffc0m6p6zzBE57lgvsEeBbphzOG9INgxwruJ4dfkUyYA8H6XdYfp9q +yGFOtibBTI3/TO80sh9l2Ll49a2pcbnvT1gdpd50IJeh7WhM3pIXS7yr/2WanvtH +2Vdy8wmhrnZEE26cLUQ5vPnHO6RYPUG9tMJJo8gN0pcvB2VSAKduyK9o7PQUlrZX +H1bDOZ8rbeTzPvY1ZNoMHKGESy9LS+IsJJ1tk0DrtSOOMspvRdOoiXsezx76W0OL +zc2oD2rKDF65nkeP8Nm2CgtYZRczuSPkdxl9y0oukntPLxB3sY0vaJxizOBQ+OyR +p1RMVwnVdmPF6GUe7m1qzwmd+nxPrWAI/VaZDxUse6mAq4xhj0oHdkLePfTdsiQz +W7i1o0TJrH93PB0j7IKppuLIBkwC/qxcmZkLLxCKpvR/1Yd0DVlJRfbwcVw5Kda/ +SiOL9V8BY9KHcyi1Swr1+KuCLH5zJTIdC2MKF4EA/7Z2Xue0sUDKIbvVgFHlSFJn +LNJhiQcND85Cd8BEc5xEUKDbEAotlRyBr+Qc5RQe8TZBAQIvfXOn3kLMTOmJDVb3 +n5HUA8ZsyY/b2BzgQJhdZpmYgG4t/wHFzstGH6wCxkPmrqKEPMVOHj1tyRRM4y5B +u8o5vzY8KhmqQYdOpc5LMnndkEl/AgMBAAGjYzBhMB8GA1UdIwQYMBaAFJxf0Gxj +o1+TypOYCK2Mh6UsXME3MB0GA1UdDgQWBBScX9BsY6Nfk8qTmAitjIelLFzBNzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AgEATh65isagmD9uw2nAalxJUqzLK114OMHVVISfk/CHGT0sZonrDUL8zPB1hT+L +9IBdeeUXZ701guLyPI59WzbLWoAAKfLOKyzxj6ptBZNscsdW699QIyjlRRA96Gej +rw5VD5AJYu9LWaL2U/HANeQvwSS9eS9OICI7/RogsKQOLHDtdD+4E5UGUcjohybK +pFtqFiGS3XNgnhAY3jyB6ugYw3yJ8otQPr0R4hUDqDZ9MwFsSBXXiJCZBMXM5gf0 +vPSQ7RPi6ovDj6MzD8EpTBNO2hVWcXNyglD2mjN8orGoGjR0ZVzO0eurU+AagNjq +OknkJjCb5RyKqKkVMoaZkgoQI1YS4PbOTOK7vtuNknMBZi9iPrJyJ0U27U1W45eZ +/zo1PqVUSlJZS2Db7v54EX9K3BR5YLZrZAPbFYPhor72I5dQ8AkzNqdxliXzuUJ9 +2zg/LFis6ELhDtjTO0wugumDLmsx2d1Hhk9tl5EuT+IocTUW0fJz/iUrB0ckYyfI ++PbZa/wSMVYIwFNCr5zQM378BvAxRAMU8Vjq8moNqRGyg77FGr8H6lnco4g175x2 +MjxNBiLOFeXdntiP2t7SxDnlF4HPOEfrf4htWRvfn0IUrn7PqLBmZdo3r5+qPeoo +tt7VMVgWglvquxl1AnMaykgaIZOQCo6ThKd9OyMYkomgjaw= +-----END CERTIFICATE----- + +# Actalis Authentication Root CA +-----BEGIN CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== +-----END CERTIFICATE----- + +# AffirmTrust Commercial +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP +Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr +ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL +MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 +yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr +VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ +nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG +XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj +vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt +Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g +N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC +nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= +-----END CERTIFICATE----- + +# AffirmTrust Networking +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y +YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua +kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL +QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp +6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG +yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i +QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO +tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu +QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ +Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u +olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 +x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= +-----END CERTIFICATE----- + +# AffirmTrust Premium +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz +dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG +A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U +cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf +qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ +JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ ++jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS +s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 +HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 +70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG +V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S +qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S +5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia +C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX +OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE +FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 +KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg +Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B +8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ +MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc +0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ +u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF +u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH +YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 +GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO +RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e +KeC2uAloGRwYQw== +-----END CERTIFICATE----- + +# AffirmTrust Premium ECC +-----BEGIN CERTIFICATE----- +MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC +VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ +cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ +BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt +VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D +0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 +ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G +A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs +aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I +flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ== +-----END CERTIFICATE----- + +# Amazon Root CA 1 +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy +rqXRfboQnoZsG4q5WTP468SQvvG5 +-----END CERTIFICATE----- + +# Amazon Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGw= +-----END CERTIFICATE----- + +# Amazon Root CA 3 +-----BEGIN CERTIFICATE----- +MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl +ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr +ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr +BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM +YyRIHN8wfdVoOw== +-----END CERTIFICATE----- + +# Amazon Root CA 4 +-----BEGIN CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EA== +-----END CERTIFICATE----- + +# Atos TrustedRoot 2011 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed +-----END CERTIFICATE----- + +# Atos TrustedRoot Root CA ECC TLS 2021 +-----BEGIN CERTIFICATE----- +MIICFTCCAZugAwIBAgIQPZg7pmY9kGP3fiZXOATvADAKBggqhkjOPQQDAzBMMS4w +LAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgRUNDIFRMUyAyMDIxMQ0w +CwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTI2MjNaFw00MTA0 +MTcwOTI2MjJaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBDQSBF +Q0MgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMHYwEAYHKoZI +zj0CAQYFK4EEACIDYgAEloZYKDcKZ9Cg3iQZGeHkBQcfl+3oZIK59sRxUM6KDP/X +tXa7oWyTbIOiaG6l2b4siJVBzV3dscqDY4PMwL502eCdpO5KTlbgmClBk1IQ1SQ4 +AjJn8ZQSb+/Xxd4u/RmAo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBR2 +KCXWfeBmmnoJsmo7jjPXNtNPojAOBgNVHQ8BAf8EBAMCAYYwCgYIKoZIzj0EAwMD +aAAwZQIwW5kp85wxtolrbNa9d+F851F+uDrNozZffPc8dz7kUK2o59JZDCaOMDtu +CCrCp1rIAjEAmeMM56PDr9NJLkaCI2ZdyQAUEv049OGYa3cpetskz2VAv9LcjBHo +9H1/IISpQuQo +-----END CERTIFICATE----- + +# Atos TrustedRoot Root CA RSA TLS 2021 +-----BEGIN CERTIFICATE----- +MIIFZDCCA0ygAwIBAgIQU9XP5hmTC/srBRLYwiqipDANBgkqhkiG9w0BAQwFADBM +MS4wLAYDVQQDDCVBdG9zIFRydXN0ZWRSb290IFJvb3QgQ0EgUlNBIFRMUyAyMDIx +MQ0wCwYDVQQKDARBdG9zMQswCQYDVQQGEwJERTAeFw0yMTA0MjIwOTIxMTBaFw00 +MTA0MTcwOTIxMDlaMEwxLjAsBgNVBAMMJUF0b3MgVHJ1c3RlZFJvb3QgUm9vdCBD +QSBSU0EgVExTIDIwMjExDTALBgNVBAoMBEF0b3MxCzAJBgNVBAYTAkRFMIICIjAN +BgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtoAOxHm9BYx9sKOdTSJNy/BBl01Z +4NH+VoyX8te9j2y3I49f1cTYQcvyAh5x5en2XssIKl4w8i1mx4QbZFc4nXUtVsYv +Ye+W/CBGvevUez8/fEc4BKkbqlLfEzfTFRVOvV98r61jx3ncCHvVoOX3W3WsgFWZ +kmGbzSoXfduP9LVq6hdKZChmFSlsAvFr1bqjM9xaZ6cF4r9lthawEO3NUDPJcFDs +GY6wx/J0W2tExn2WuZgIWWbeKQGb9Cpt0xU6kGpn8bRrZtkh68rZYnxGEFzedUln +nkL5/nWpo63/dgpnQOPF943HhZpZnmKaau1Fh5hnstVKPNe0OwANwI8f4UDErmwh +3El+fsqyjW22v5MvoVw+j8rtgI5Y4dtXz4U2OLJxpAmMkokIiEjxQGMYsluMWuPD +0xeqqxmjLBvk1cbiZnrXghmmOxYsL3GHX0WelXOTwkKBIROW1527k2gV+p2kHYzy +geBYBr3JtuP2iV2J+axEoctr+hbxx1A9JNr3w+SH1VbxT5Aw+kUJWdo0zuATHAR8 +ANSbhqRAvNncTFd+rrcztl524WWLZt+NyteYr842mIycg5kDcPOvdO3GDjbnvezB +c6eUWsuSZIKmAMFwoW4sKeFYV+xafJlrJaSQOoD0IJ2azsct+bJLKZWD6TWNp0lI +pw9MGZHQ9b8Q4HECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +dEmZ0f+0emhFdcN+tNzMzjkz2ggwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB +DAUAA4ICAQAjQ1MkYlxt/T7Cz1UAbMVWiLkO3TriJQ2VSpfKgInuKs1l+NsW4AmS +4BjHeJi78+xCUvuppILXTdiK/ORO/auQxDh1MoSf/7OwKwIzNsAQkG8dnK/haZPs +o0UvFJ/1TCplQ3IM98P4lYsU84UgYt1UU90s3BiVaU+DR3BAM1h3Egyi61IxHkzJ +qM7F78PRreBrAwA0JrRUITWXAdxfG/F851X6LWh3e9NpzNMOa7pNdkTWwhWaJuyw +xfW70Xp0wmzNxbVe9kzmWy2B27O3Opee7c9GslA9hGCZcbUztVdF5kJHdWoOsAgM +rr3e97sPWD2PAzHoPYJQyi9eDF20l74gNAf0xBLh7tew2VktafcxBPTy+av5EzH4 +AXcOPUIjJsyacmdRIXrMPIWo6iFqO9taPKU0nprALN+AnCng33eU0aKAQv9qTFsR +0PXNor6uzFFcw9VUewyu1rkGd4Di7wcaaMxZUa1+XGdrudviB0JbuAEFWDlN5LuY +o7Ey7Nmj1m+UI/87tyll5gfp77YZ6ufCOB0yiJA8EytuzO+rdwY0d4RPcuSBhPm5 +dDTedk+SKlOxJTnbPP/lPqYO5Wue/9vsL3SD3460s6neFE3/MaNFcyT6lSnMEpcE +oji2jbDwN/zIIX8/syQbPYtuzE2wFg2WHYMfRsCbvUOZ58SWLs5fyQ== +-----END CERTIFICATE----- + +# Autoridad de Certificacion Firmaprofesional CIF A62634068 +-----BEGIN CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 +MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc +tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd +IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j +b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC +AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw +ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m +iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF +Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ +hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P +Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE +EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV +1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t +CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR +5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw +f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 +ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK +GbqEZycPvEJdvSRUDewdcAZfpLz6IHxV +-----END CERTIFICATE----- + +# BJCA Global Root CA1 +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIQVW9l47TZkGobCdFsPsBsIDANBgkqhkiG9w0BAQsFADBU +MQswCQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRI +T1JJVFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0ExMB4XDTE5MTIxOTAz +MTYxN1oXDTQ0MTIxMjAzMTYxN1owVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJF +SUpJTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2Jh +bCBSb290IENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPFmCL3Z +xRVhy4QEQaVpN3cdwbB7+sN3SJATcmTRuHyQNZ0YeYjjlwE8R4HyDqKYDZ4/N+AZ +spDyRhySsTphzvq3Rp4Dhtczbu33RYx2N95ulpH3134rhxfVizXuhJFyV9xgw8O5 +58dnJCNPYwpj9mZ9S1WnP3hkSWkSl+BMDdMJoDIwOvqfwPKcxRIqLhy1BDPapDgR +at7GGPZHOiJBhyL8xIkoVNiMpTAK+BcWyqw3/XmnkRd4OJmtWO2y3syJfQOcs4ll +5+M7sSKGjwZteAf9kRJ/sGsciQ35uMt0WwfCyPQ10WRjeulumijWML3mG90Vr4Tq +nMfK9Q7q8l0ph49pczm+LiRvRSGsxdRpJQaDrXpIhRMsDQa4bHlW/KNnMoH1V6XK +V0Jp6VwkYe/iMBhORJhVb3rCk9gZtt58R4oRTklH2yiUAguUSiz5EtBP6DF+bHq/ +pj+bOT0CFqMYs2esWz8sgytnOYFcuX6U1WTdno9uruh8W7TXakdI136z1C2OVnZO +z2nxbkRs1CTqjSShGL+9V/6pmTW12xB3uD1IutbB5/EjPtffhZ0nPNRAvQoMvfXn +jSXWgXSHRtQpdaJCbPdzied9v3pKH9MiyRVVz99vfFXQpIsHETdfg6YmV6YBW37+ +WGgHqel62bno/1Afq8K0wM7o6v0PvY1NuLxxAgMBAAGjQjBAMB0GA1UdDgQWBBTF +7+3M2I0hxkjk49cULqcWk+WYATAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE +AwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAUoKsITQfI/Ki2Pm4rzc2IInRNwPWaZ+4 +YRC6ojGYWUfo0Q0lHhVBDOAqVdVXUsv45Mdpox1NcQJeXyFFYEhcCY5JEMEE3Kli +awLwQ8hOnThJdMkycFRtwUf8jrQ2ntScvd0g1lPJGKm1Vrl2i5VnZu69mP6u775u ++2D2/VnGKhs/I0qUJDAnyIm860Qkmss9vk/Ves6OF8tiwdneHg56/0OGNFK8YT88 +X7vZdrRTvJez/opMEi4r89fO4aL/3Xtw+zuhTaRjAv04l5U/BXCga99igUOLtFkN +SoxUnMW7gZ/NfaXvCyUeOiDbHPwfmGcCCtRzRBPbUYQaVQNW4AB+dAb/OMRyHdOo +P2gxXdMJxy6MW2Pg6Nwe0uxhHvLe5e/2mXZgLR6UcnHGCyoyx5JO1UbXHfmpGQrI ++pXObSOYqgs4rZpWDW+N8TEAiMEXnM0ZNjX+VVOg4DwzX5Ze4jLp3zO7Bkqp2IRz +znfSxqxx4VyjHQy7Ct9f4qNx2No3WqB4K/TUfet27fJhcKVlmtOJNBir+3I+17Q9 +eVzYH6Eze9mCUAyTF6ps3MKCuwJXNq+YJyo5UOGwifUll35HaBC07HPKs5fRJNz2 +YqAo07WjuGS3iGJCz51TzZm+ZGiPTx4SSPfSKcOYKMryMguTjClPPGAyzQWWYezy +r/6zcCwupvI= +-----END CERTIFICATE----- + +# BJCA Global Root CA2 +-----BEGIN CERTIFICATE----- +MIICJTCCAaugAwIBAgIQLBcIfWQqwP6FGFkGz7RK6zAKBggqhkjOPQQDAzBUMQsw +CQYDVQQGEwJDTjEmMCQGA1UECgwdQkVJSklORyBDRVJUSUZJQ0FURSBBVVRIT1JJ +VFkxHTAbBgNVBAMMFEJKQ0EgR2xvYmFsIFJvb3QgQ0EyMB4XDTE5MTIxOTAzMTgy +MVoXDTQ0MTIxMjAzMTgyMVowVDELMAkGA1UEBhMCQ04xJjAkBgNVBAoMHUJFSUpJ +TkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZMR0wGwYDVQQDDBRCSkNBIEdsb2JhbCBS +b290IENBMjB2MBAGByqGSM49AgEGBSuBBAAiA2IABJ3LgJGNU2e1uVCxA/jlSR9B +IgmwUVJY1is0j8USRhTFiy8shP8sbqjV8QnjAyEUxEM9fMEsxEtqSs3ph+B99iK+ ++kpRuDCK/eHeGBIK9ke35xe/J4rUQUyWPGCWwf0VHKNCMEAwHQYDVR0OBBYEFNJK +sVF/BvDRgh9Obl+rg/xI1LCRMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMAoGCCqGSM49BAMDA2gAMGUCMBq8W9f+qdJUDkpd0m2xQNz0Q9XSSpkZElaA +94M04TVOSG0ED1cxMDAtsaqdAzjbBgIxAMvMh1PLet8gUXOQwKhbYdDFUDn9hf7B +43j4ptZLvZuHjw/l1lOWqzzIQNph91Oj9w== +-----END CERTIFICATE----- + +# Baltimore CyberTrust Root +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp +-----END CERTIFICATE----- + +# Buypass Class 2 Root CA +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr +6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV +L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91 +1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx +MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ +QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB +arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr +Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi +FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS +P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN +9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz +uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h +9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s +A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t +OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo ++fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7 +KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2 +DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us +H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ +I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7 +5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h +3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz +Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqA= +-----END CERTIFICATE----- + +# Buypass Class 3 Root CA +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y +ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E +N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9 +tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX +0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c +/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X +KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY +zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS +O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D +34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP +K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3 +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv +Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj +QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV +cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS +IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2 +HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa +O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv +033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u +dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE +kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41 +3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD +u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq +4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZc= +-----END CERTIFICATE----- + +# CA Disig Root R2 +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL +-----END CERTIFICATE----- + +# CFCA EV ROOT +-----BEGIN CERTIFICATE----- +MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD +TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx +MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j +aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP +T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 +sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL +TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 +/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp +7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz +EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt +hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP +a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot +aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg +TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV +PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv +cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL +tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB +ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT +ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL +jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS +ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy +P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 +xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d +Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN +5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe +/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z +AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ +5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su +-----END CERTIFICATE----- + +# COMODO Certification Authority +-----BEGIN CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZQ== +-----END CERTIFICATE----- + +# COMODO ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= +-----END CERTIFICATE----- + +# COMODO RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190 +-----END CERTIFICATE----- + +# Certainly Root E1 +-----BEGIN CERTIFICATE----- +MIIB9zCCAX2gAwIBAgIQBiUzsUcDMydc+Y2aub/M+DAKBggqhkjOPQQDAzA9MQsw +CQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0YWlu +bHkgUm9vdCBFMTAeFw0yMTA0MDEwMDAwMDBaFw00NjA0MDEwMDAwMDBaMD0xCzAJ +BgNVBAYTAlVTMRIwEAYDVQQKEwlDZXJ0YWlubHkxGjAYBgNVBAMTEUNlcnRhaW5s +eSBSb290IEUxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE3m/4fxzf7flHh4axpMCK ++IKXgOqPyEpeKn2IaKcBYhSRJHpcnqMXfYqGITQYUBsQ3tA3SybHGWCA6TS9YBk2 +QNYphwk8kXr2vBMj3VlOBF7PyAIcGFPBMdjaIOlEjeR2o0IwQDAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU8ygYy2R17ikq6+2uI1g4 +hevIIgcwCgYIKoZIzj0EAwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozm +ut6Dacpps6kFtZaSF4fC0urQe87YQVt8rgIwRt7qy12a7DLCZRawTDBcMPPaTnOG +BtjOiQRINzf43TNRnXCve1XYAS59BWQOhriR +-----END CERTIFICATE----- + +# Certainly Root R1 +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIRAI4P+UuQcWhlM1T01EQ5t+AwDQYJKoZIhvcNAQELBQAw +PTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUNlcnRhaW5seTEaMBgGA1UEAxMRQ2Vy +dGFpbmx5IFJvb3QgUjEwHhcNMjEwNDAxMDAwMDAwWhcNNDYwNDAxMDAwMDAwWjA9 +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0 +YWlubHkgUm9vdCBSMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANA2 +1B/q3avk0bbm+yLA3RMNansiExyXPGhjZjKcA7WNpIGD2ngwEc/csiu+kr+O5MQT +vqRoTNoCaBZ0vrLdBORrKt03H2As2/X3oXyVtwxwhi7xOu9S98zTm/mLvg7fMbed +aFySpvXl8wo0tf97ouSHocavFwDvA5HtqRxOcT3Si2yJ9HiG5mpJoM610rCrm/b0 +1C7jcvk2xusVtyWMOvwlDbMicyF0yEqWYZL1LwsYpfSt4u5BvQF5+paMjRcCMLT5 +r3gajLQ2EBAHBXDQ9DGQilHFhiZ5shGIXsXwClTNSaa/ApzSRKft43jvRl5tcdF5 +cBxGX1HpyTfcX35pe0HfNEXgO4T0oYoKNp43zGJS4YkNKPl6I7ENPT2a/Z2B7yyQ +wHtETrtJ4A5KVpK8y7XdeReJkd5hiXSSqOMyhb5OhaRLWcsrxXiOcVTQAjeZjOVJ +6uBUcqQRBi8LjMFbvrWhsFNunLhgkR9Za/kt9JQKl7XsxXYDVBtlUrpMklZRNaBA +2CnbrlJ2Oy0wQJuK0EJWtLeIAaSHO1OWzaMWj/Nmqhexx2DgwUMFDO6bW2BvBlyH +Wyf5QBGenDPBt+U1VwV/J84XIIwc/PH72jEpSe31C4SnT8H2TsIonPru4K8H+zMR +eiFPCyEQtkA6qyI6BJyLm4SGcprSp6XEtHWRqSsjAgMBAAGjQjBAMA4GA1UdDwEB +/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTgqj8ljZ9EXME66C6u +d0yEPmcM9DANBgkqhkiG9w0BAQsFAAOCAgEAuVevuBLaV4OPaAszHQNTVfSVcOQr +PbA56/qJYv331hgELyE03fFo8NWWWt7CgKPBjcZq91l3rhVkz1t5BXdm6ozTaw3d +8VkswTOlMIAVRQdFGjEitpIAq5lNOo93r6kiyi9jyhXWx8bwPWz8HA2YEGGeEaIi +1wrykXprOQ4vMMM2SZ/g6Q8CRFA3lFV96p/2O7qUpUzpvD5RtOjKkjZUbVwlKNrd +rRT90+7iIgXr0PK3aBLXWopBGsaSpVo7Y0VPv+E6dyIvXL9G+VoDhRNCX8reU9di +taY1BMJH/5n9hN9czulegChB8n3nHpDYT3Y+gjwN/KUD+nsa2UUeYNrEjvn8K8l7 +lcUq/6qJ34IxD3L/DCfXCh5WAFAeDJDBlrXYFIW7pw0WwfgHJBu6haEaBQmAupVj +yTrsJZ9/nbqkRxWbRHDxakvWOF5D8xh+UG7pWijmZeZ3Gzr9Hb4DJqPb1OG7fpYn +Kx3upPvaJVQTA945xsMfTZDsjxtK0hzthZU4UHlG1sGQUDGpXJpuHfUzVounmdLy +yCwzk5Iwx06MZTMQZBf9JBeW0Y3COmor6xOLRPIh80oat3df1+2IpHLlOR+Vnb5n +wXARPbv0+Em34yaXOp/SX3z7wJl8OSngex2/DaeP0ik0biQVy96QXr8axGbqwua6 +OV+KmalBWQewLK8= +-----END CERTIFICATE----- + +# Certigna +-----BEGIN CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== +-----END CERTIFICATE----- + +# Certigna Root CA +-----BEGIN CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= +-----END CERTIFICATE----- + +# Certum EC-384 CA +-----BEGIN CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= +-----END CERTIFICATE----- + +# Certum Trusted Network CA +-----BEGIN CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= +-----END CERTIFICATE----- + +# Certum Trusted Network CA 2 +-----BEGIN CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSP +-----END CERTIFICATE----- + +# Certum Trusted Root CA +-----BEGIN CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb +-----END CERTIFICATE----- + +# CommScope Public Trust ECC Root-01 +-----BEGIN CERTIFICATE----- +MIICHTCCAaOgAwIBAgIUQ3CCd89NXTTxyq4yLzf39H91oJ4wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMTAeFw0yMTA0MjgxNzM1NDNa +Fw00NjA0MjgxNzM1NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDEw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAARLNumuV16ocNfQj3Rid8NeeqrltqLxeP0C +flfdkXmcbLlSiFS8LwS+uM32ENEp7LXQoMPwiXAZu1FlxUOcw5tjnSCDPgYLpkJE +hRGnSjot6dZoL0hOUysHP029uax3OVejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSOB2LAUN3GGQYARnQE9/OufXVNMDAKBggq +hkjOPQQDAwNoADBlAjEAnDPfQeMjqEI2Jpc1XHvr20v4qotzVRVcrHgpD7oh2MSg +2NED3W3ROT3Ek2DS43KyAjB8xX6I01D1HiXo+k515liWpDVfG2XqYZpwI7UNo5uS +Um9poIyNStDuiw7LR47QjRE= +-----END CERTIFICATE----- + +# CommScope Public Trust ECC Root-02 +-----BEGIN CERTIFICATE----- +MIICHDCCAaOgAwIBAgIUKP2ZYEFHpgE6yhR7H+/5aAiDXX0wCgYIKoZIzj0EAwMw +TjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwiQ29t +bVNjb3BlIFB1YmxpYyBUcnVzdCBFQ0MgUm9vdC0wMjAeFw0yMTA0MjgxNzQ0NTRa +Fw00NjA0MjgxNzQ0NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21tU2Nv +cGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgRUNDIFJvb3QtMDIw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAR4MIHoYx7l63FRD/cHB8o5mXxO1Q/MMDAL +j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU +v4RDsNuESgMjGWdqb8FuvAY5N9GIIvejQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBTmGHX/72DehKT1RsfeSlXjMjZ59TAKBggq +hkjOPQQDAwNnADBkAjAmc0l6tqvmSfR9Uj/UQQSugEODZXW5hYA4O9Zv5JOGq4/n +ich/m35rChJVYaoR4HkCMHfoMXGsPHED1oQmHhS48zs73u1Z/GtMMH9ZzkXpc2AV +mkzw5l4lIhVtwodZ0LKOag== +-----END CERTIFICATE----- + +# CommScope Public Trust RSA Root-01 +-----BEGIN CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUPgNJgXUWdDGOTKvVxZAplsU5EN0wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMTAeFw0yMTA0MjgxNjQ1 +NTRaFw00NjA0MjgxNjQ1NTNaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwSGWjDR1C45FtnYSk +YZYSwu3D2iM0GXb26v1VWvZVAVMP8syMl0+5UMuzAURWlv2bKOx7dAvnQmtVzslh +suitQDy6uUEKBU8bJoWPQ7VAtYXR1HHcg0Hz9kXHgKKEUJdGzqAMxGBWBB0HW0al +DrJLpA6lfO741GIDuZNqihS4cPgugkY4Iw50x2tBt9Apo52AsH53k2NC+zSDO3Oj +WiE260f6GBfZumbCk6SP/F2krfxQapWsvCQz0b2If4b19bJzKo98rwjyGpg/qYFl +P8GMicWWMJoKz/TUyDTtnS+8jTiGU+6Xn6myY5QXjQ/cZip8UlF1y5mO6D1cv547 +KI2DAg+pn3LiLCuz3GaXAEDQpFSOm117RTYm1nJD68/A6g3czhLmfTifBSeolz7p +UcZsBSjBAg/pGG3svZwG1KdJ9FQFa2ww8esD1eo9anbCyxooSU1/ZOD6K9pzg4H/ +kQO9lLvkuI6cMmPNn7togbGEW682v3fuHX/3SZtS7NJ3Wn2RnU3COS3kuoL4b/JO +Hg9O5j9ZpSPcPYeoKFgo0fEbNttPxP/hjFtyjMcmAyejOQoBqsCyMWCDIqFPEgkB +Ea801M/XrmLTBQe0MXXgDW1XT2mH+VepuhX2yFJtocucH+X8eKg1mp9BFM6ltM6U +CBwJrVbl2rZJmkrqYxhTnCwuwwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUN12mmnQywsL5x6YVEFm45P3luG0wDQYJ +KoZIhvcNAQELBQADggIBAK+nz97/4L1CjU3lIpbfaOp9TSp90K09FlxD533Ahuh6 +NWPxzIHIxgvoLlI1pKZJkGNRrDSsBTtXAOnTYtPZKdVUvhwQkZyybf5Z/Xn36lbQ +nmhUQo8mUuJM3y+Xpi/SB5io82BdS5pYV4jvguX6r2yBS5KPQJqTRlnLX3gWsWc+ +QgvfKNmwrZggvkN80V4aCRckjXtdlemrwWCrWxhkgPut4AZ9HcpZuPN4KWfGVh2v +trV0KnahP/t1MJ+UXjulYPPLXAziDslg+MkfFoom3ecnf+slpoq9uC02EJqxWE2a +aE9gVOX2RhOOiKy8IUISrcZKiX2bwdgt6ZYD9KJ0DLwAHb/WNyVntHKLr4W96ioD +j8z7PEQkguIBpQtZtjSNMgsSDesnwv1B10A8ckYpwIzqug/xBpMu95yo9GA+o/E4 +Xo4TwbM6l4c/ksp4qRyv0LAbJh6+cOx69TOY6lz/KwsETkPdY34Op054A5U+1C0w +lREQKC6/oAI+/15Z0wUOlV9TRe9rh9VIzRamloPh37MG88EU26fsHItdkJANclHn +YfkUyq+Dj7+vsQpZXdxc1+SWrVtgHdqul7I52Qb1dgAT+GhMIbA1xNxVssnBQVoc +icCMb3SgazNNtQEo/a2tiRc7ppqEvOuM6sRxJKi6KfkIsidWNTJf6jn7MZrVGczw +-----END CERTIFICATE----- + +# CommScope Public Trust RSA Root-02 +-----BEGIN CERTIFICATE----- +MIIFbDCCA1SgAwIBAgIUVBa/O345lXGN0aoApYYNK496BU4wDQYJKoZIhvcNAQEL +BQAwTjELMAkGA1UEBhMCVVMxEjAQBgNVBAoMCUNvbW1TY29wZTErMCkGA1UEAwwi +Q29tbVNjb3BlIFB1YmxpYyBUcnVzdCBSU0EgUm9vdC0wMjAeFw0yMTA0MjgxNzE2 +NDNaFw00NjA0MjgxNzE2NDJaME4xCzAJBgNVBAYTAlVTMRIwEAYDVQQKDAlDb21t +U2NvcGUxKzApBgNVBAMMIkNvbW1TY29wZSBQdWJsaWMgVHJ1c3QgUlNBIFJvb3Qt +MDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDh+g77aAASyE3VrCLE +NQE7xVTlWXZjpX/rwcRqmL0yjReA61260WI9JSMZNRTpf4mnG2I81lDnNJUDMrG0 +kyI9p+Kx7eZ7Ti6Hmw0zdQreqjXnfuU2mKKuJZ6VszKWpCtYHu8//mI0SFHRtI1C +rWDaSWqVcN3SAOLMV2MCe5bdSZdbkk6V0/nLKR8YSvgBKtJjCW4k6YnS5cciTNxz +hkcAqg2Ijq6FfUrpuzNPDlJwnZXjfG2WWy09X6GDRl224yW4fKcZgBzqZUPckXk2 +LHR88mcGyYnJ27/aaL8j7dxrrSiDeS/sOKUNNwFnJ5rpM9kzXzehxfCrPfp4sOcs +n/Y+n2Dg70jpkEUeBVF4GiwSLFworA2iI540jwXmojPOEXcT1A6kHkIfhs1w/tku +FT0du7jyU1fbzMZ0KZwYszZ1OC4PVKH4kh+Jlk+71O6d6Ts2QrUKOyrUZHk2EOH5 +kQMreyBUzQ0ZGshBMjTRsJnhkB4BQDa1t/qp5Xd1pCKBXbCL5CcSD1SIxtuFdOa3 +wNemKfrb3vOTlycEVS8KbzfFPROvCgCpLIscgSjX74Yxqa7ybrjKaixUR9gqiC6v +wQcQeKwRoi9C8DfF8rhW3Q5iLc4tVn5V8qdE9isy9COoR+jUKgF4z2rDN6ieZdIs +5fq6M8EGRPbmz6UNp2YINIos8wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUR9DnsSL/nSz12Vdgs7GxcJXvYXowDQYJ +KoZIhvcNAQELBQADggIBAIZpsU0v6Z9PIpNojuQhmaPORVMbc0RTAIFhzTHjCLqB +KCh6krm2qMhDnscTJk3C2OVVnJJdUNjCK9v+5qiXz1I6JMNlZFxHMaNlNRPDk7n3 ++VGXu6TwYofF1gbTl4MgqX67tiHCpQ2EAOHyJxCDut0DgdXdaMNmEMjRdrSzbyme +APnCKfWxkxlSaRosTKCL4BWaMS/TiJVZbuXEs1DIFAhKm4sTg7GkcrI7djNB3Nyq +pgdvHSQSn8h2vS/ZjvQs7rfSOBAkNlEv41xdgSGn2rtO/+YHqP65DSdsu3BaVXoT +6fEqSWnHX4dXTEN5bTpl6TBcQe7rd6VzEojov32u5cSoHw2OHG1QAk8mGEPej1WF +sQs3BWDJVTkSBKEqz3EWnzZRSb9wO55nnPt7eck5HHisd5FUmrh1CoFSl+NmYWvt +PjgelmFV4ZFUjO2MJB+ByRCac5krFk5yAD9UG/iNuovnFNa2RU9g7Jauwy8CTl2d +lklyALKrdVwPaFsdZcJfMw8eD/A7hvWwTruc9+olBdytoptLFwG+Qt81IR2tq670 +v64fG9PiO/yzcnMcmyiQiRM9HcEARwmWmjgb3bHPDcK0RPOWlc4yOo80nOAXx17O +rg3bhzjlP1v9mxnhMUF6cKojawHhRUzNlM47ni3niAIi9G7oyOzWPPO5std3eqx7 +-----END CERTIFICATE----- + +# Comodo AAA Services root +-----BEGIN CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== +-----END CERTIFICATE----- + +# D-TRUST BR Root CA 1 2020 +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQfMmPK4TX3+oPyWWa00tNljAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEJSIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTA5NDUwMFoXDTM1MDIxMTA5 +NDQ1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABMbLxyjR+4T1mu9CFCDhQ2tuda38KwOE1HaTJddZO0Flax7mNCq7dPYS +zuht56vkPE4/RAiLzRZxy7+SmfSk1zxQVFKQhYN4lGdnoxwJGT11NIXe7WB9xwy0 +QVK5buXuQqOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFHOREKv/ +VbNafAkl1bK6CKBrqx9tMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2JyX3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwQlIlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAlJAtE/rhY/hhY+ithXhUkZy4kzg+GkHaQBZTQgjKL47xPoFW +wKrY7RjEsK70PvomAjEA8yjixtsrmfu3Ubgko6SUeho/5jbiA1czijDLgsfWFBHV +dWNbFJWcHwHP2NVypw87 +-----END CERTIFICATE----- + +# D-TRUST EV Root CA 1 2020 +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQXwJB13qHfEwDo6yWjfv/0DAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEVWIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTEwMDAwMFoXDTM1MDIxMTA5 +NTk1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBFViBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPEL3YZDIBnfl4XoIkqbz52Yv7QFJsnL46bSj8WeeHsxiamJrSc8ZRCC +/N/DnU7wMyPE0jL1HLDfMxddxfCxivnvubcUyilKwg+pf3VlSSowZ/Rk99Yad9rD +wpdhQntJraOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFH8QARY3 +OqQo5FD4pPfsazK2/umLMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2V2X3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwRVYlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAyjzGKnXCXnViOTYAYFqLwZOZzNnbQTs7h5kXO9XMT8oi96CA +y/m0sRtW9XLS/BnRAjEAkfcwkz8QRitxpNA7RJvAKQIFskF3UfN5Wp6OFKBOQtJb +gfM0agPnIjhQW+0ZT0MW +-----END CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 2009 +-----BEGIN CERTIFICATE----- +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha +ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 +UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 +tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R +ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM +lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp +/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G +A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G +A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj +dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy +MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl +cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js +L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL +BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni +acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K +zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 +PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y +Johw1+qRzT65ysCQblrGXnRl11z+o+I= +-----END CERTIFICATE----- + +# D-TRUST Root Class 3 CA 2 EV 2009 +-----BEGIN CERTIFICATE----- +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw +NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV +BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn +ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 +3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z +qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR +p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 +HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw +ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea +HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw +Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh +c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E +RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt +dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku +Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp +3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF +CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na +xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX +KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1 +-----END CERTIFICATE----- + +# DigiCert Assured ID Root CA +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G2 +-----BEGIN CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5w== +-----END CERTIFICATE----- + +# DigiCert Assured ID Root G3 +-----BEGIN CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtA== +-----END CERTIFICATE----- + +# DigiCert Global Root CA +-----BEGIN CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= +-----END CERTIFICATE----- + +# DigiCert Global Root G2 +-----BEGIN CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrY= +-----END CERTIFICATE----- + +# DigiCert Global Root G3 +-----BEGIN CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycX +-----END CERTIFICATE----- + +# DigiCert High Assurance EV Root CA +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9K +-----END CERTIFICATE----- + +# DigiCert TLS ECC P384 Root G5 +-----BEGIN CERTIFICATE----- +MIICGTCCAZ+gAwIBAgIQCeCTZaz32ci5PhwLBCou8zAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJjAkBgNVBAMTHURp +Z2lDZXJ0IFRMUyBFQ0MgUDM4NCBSb290IEc1MB4XDTIxMDExNTAwMDAwMFoXDTQ2 +MDExNDIzNTk1OVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ +bmMuMSYwJAYDVQQDEx1EaWdpQ2VydCBUTFMgRUNDIFAzODQgUm9vdCBHNTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABMFEoc8Rl1Ca3iOCNQfN0MsYndLxf3c1TzvdlHJS +7cI7+Oz6e2tYIOyZrsn8aLN1udsJ7MgT9U7GCh1mMEy7H0cKPGEQQil8pQgO4CLp +0zVozptjn4S1mU1YoI71VOeVyaNCMEAwHQYDVR0OBBYEFMFRRVBZqz7nLFr6ICIS +B4CIfBFqMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MAoGCCqGSM49 +BAMDA2gAMGUCMQCJao1H5+z8blUD2WdsJk6Dxv3J+ysTvLd6jLRl0mlpYxNjOyZQ +LgGheQaRnUi/wr4CMEfDFXuxoJGZSZOoPHzoRgaLLPIxAJSdYsiJvRmEFOml+wG4 +DXZDjC5Ty3zfDBeWUA== +-----END CERTIFICATE----- + +# DigiCert TLS RSA4096 Root G5 +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCPm0eKj6ftpqMzeJ3nzPijANBgkqhkiG9w0BAQwFADBN +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMT +HERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xJTAjBgNVBAMTHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCz0PTJeRGd/fxmgefM1eS87IE+ +ajWOLrfn3q/5B03PMJ3qCQuZvWxX2hhKuHisOjmopkisLnLlvevxGs3npAOpPxG0 +2C+JFvuUAT27L/gTBaF4HI4o4EXgg/RZG5Wzrn4DReW+wkL+7vI8toUTmDKdFqgp +wgscONyfMXdcvyej/Cestyu9dJsXLfKB2l2w4SMXPohKEiPQ6s+d3gMXsUJKoBZM +pG2T6T867jp8nVid9E6P/DsjyG244gXazOvswzH016cpVIDPRFtMbzCe88zdH5RD +nU1/cHAN1DrRN/BsnZvAFJNY781BOHW8EwOVfH/jXOnVDdXifBBiqmvwPXbzP6Po +sMH976pXTayGpxi0KcEsDr9kvimM2AItzVwv8n/vFfQMFawKsPHTDU9qTXeXAaDx +Zre3zu/O7Oyldcqs4+Fj97ihBMi8ez9dLRYiVu1ISf6nL3kwJZu6ay0/nTvEF+cd +Lvvyz6b84xQslpghjLSR6Rlgg/IwKwZzUNWYOwbpx4oMYIwo+FKbbuH2TbsGJJvX +KyY//SovcfXWJL5/MZ4PbeiPT02jP/816t9JXkGPhvnxd3lLG7SjXi/7RgLQZhNe +XoVPzthwiHvOAbWWl9fNff2C+MIkwcoBOU+NosEUQB+cZtUMCUbW8tDRSHZWOkPL +tgoRObqME2wGtZ7P6wIDAQABo0IwQDAdBgNVHQ4EFgQUUTMc7TZArxfTJc1paPKv +TiM+s0EwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcN +AQEMBQADggIBAGCmr1tfV9qJ20tQqcQjNSH/0GEwhJG3PxDPJY7Jv0Y02cEhJhxw +GXIeo8mH/qlDZJY6yFMECrZBu8RHANmfGBg7sg7zNOok992vIGCukihfNudd5N7H +PNtQOa27PShNlnx2xlv0wdsUpasZYgcYQF+Xkdycx6u1UQ3maVNVzDl92sURVXLF +O4uJ+DQtpBflF+aZfTCIITfNMBc9uPK8qHWgQ9w+iUuQrm0D4ByjoJYJu32jtyoQ +REtGBzRj7TG5BO6jm5qu5jF49OokYTurWGT/u4cnYiWB39yhL/btp/96j1EuMPik +AdKFOV8BmZZvWltwGUb+hmA+rYAQCd05JS9Yf7vSdPD3Rh9GOUrYU9DzLjtxpdRv +/PNn5AeP3SYZ4Y1b+qOTEZvpyDrDVWiakuFSdjjo4bq9+0/V77PnSIMx8IIh47a+ +p6tv75/fTM8BuGJqIz3nCU2AG3swpMPdB380vqQmsvZB6Akd4yCYqjdP//fx4ilw +MUc/dNAUFvohigLVigmUdy7yWSiLfFCSCmZ4OIN1xLVaqBHG5cGdZlXPU8Sv13WF +qUITVuwhd4GTWgzqltlJyqEI8pc7bZsEGCREjnwB8twl2F6GmrE52/WRMmrRpnCK +ovfepEWFJqgejF0pW8hL2JpqA15w8oVPbEtoL8pU9ozaMv7Da4M/OMZ+ +-----END CERTIFICATE----- + +# DigiCert Trusted Root G4 +-----BEGIN CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ +-----END CERTIFICATE----- + +# Entrust.net Premium 2048 Secure Server CA +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVE= +-----END CERTIFICATE----- + +# Entrust Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 +Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW +KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw +NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw +NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy +ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV +BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo +Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 +4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 +KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI +rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi +94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB +sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi +gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo +kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE +vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA +A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t +O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua +AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP +9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ +eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m +0vdXcDazv/wor3ElhVsT/h5/WrQ8 +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - EC1 +-----BEGIN CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G2 +-----BEGIN CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== +-----END CERTIFICATE----- + +# Entrust Root Certification Authority - G4 +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHw== +-----END CERTIFICATE----- + +# FIRMAPROFESIONAL CA ROOT-A WEB +-----BEGIN CERTIFICATE----- +MIICejCCAgCgAwIBAgIQMZch7a+JQn81QYehZ1ZMbTAKBggqhkjOPQQDAzBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwHhcNMjIwNDA2MDkwMTM2WhcNNDcwMzMxMDkwMTM2WjBuMQsw +CQYDVQQGEwJFUzEcMBoGA1UECgwTRmlybWFwcm9mZXNpb25hbCBTQTEYMBYGA1UE +YQwPVkFURVMtQTYyNjM0MDY4MScwJQYDVQQDDB5GSVJNQVBST0ZFU0lPTkFMIENB +IFJPT1QtQSBXRUIwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAARHU+osEaR3xyrq89Zf +e9MEkVz6iMYiuYMQYneEMy3pA4jU4DP37XcsSmDq5G+tbbT4TIqk5B/K6k84Si6C +cyvHZpsKjECcfIr28jlgst7L7Ljkb+qbXbdTkBgyVcUgt5SjYzBhMA8GA1UdEwEB +/wQFMAMBAf8wHwYDVR0jBBgwFoAUk+FDY1w8ndYn81LsF7Kpryz3dvgwHQYDVR0O +BBYEFJPhQ2NcPJ3WJ/NS7Beyqa8s93b4MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjO +PQQDAwNoADBlAjAdfKR7w4l1M+E7qUW/Runpod3JIha3RxEL2Jq68cgLcFBTApFw +hVmpHqTm6iMxoAACMQD94vizrxa5HnPEluPBMBnYfubDl94cT7iJLzPrSA8Z94dG +XSaQpYXFuXqUPoeovQA= +-----END CERTIFICATE----- + +# GDCA TrustAUTH R5 ROOT +-----BEGIN CERTIFICATE----- +MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE +BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ +IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 +MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV +BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w +HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj +Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj +TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u +KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj +qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm +MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 +ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP +zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk +L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC +jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA +HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC +AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg +p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm +DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 +COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry +L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf +JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg +IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io +2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV +09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ +XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq +T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe +MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0g== +-----END CERTIFICATE----- + +# GLOBALTRUST 2020 +-----BEGIN CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg== +-----END CERTIFICATE----- + +# GTS Root R1 +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo +27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w +Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw +TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl +qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH +szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 +Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk +MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 +wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p +aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN +VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb +C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe +QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy +h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 +7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J +ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef +MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ +Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT +6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ +0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm +2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb +bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c +-----END CERTIFICATE----- + +# GTS Root R2 +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt +nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY +6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu +MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k +RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg +f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV ++3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo +dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW +Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa +G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq +gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H +vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 +0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC +B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u +NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg +yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev +HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 +xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR +TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg +JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV +7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl +6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbL +-----END CERTIFICATE----- + +# GTS Root R3 +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G +jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 +4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 +VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm +ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4X +-----END CERTIFICATE----- + +# GTS Root R4 +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi +QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR +HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D +9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 +p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R4 +-----BEGIN CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +-----END CERTIFICATE----- + +# GlobalSign ECC Root CA - R5 +-----BEGIN CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3 +-----END CERTIFICATE----- + +# GlobalSign Root CA +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== +-----END CERTIFICATE----- + +# GlobalSign Root CA - R3 +-----BEGIN CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9f +-----END CERTIFICATE----- + +# GlobalSign Root CA - R6 +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= +-----END CERTIFICATE----- + +# GlobalSign Root E46 +-----BEGIN CERTIFICATE----- +MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx +CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD +ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw +MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex +HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq +R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd +yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ +7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8 ++RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A= +-----END CERTIFICATE----- + +# GlobalSign Root R46 +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA +MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD +VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy +MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt +c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ +OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG +vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud +316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo +0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE +y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF +zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE ++cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN +I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs +x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa +ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC +4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4 +7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg +JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti +2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk +pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF +FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt +rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk +ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5 +u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP +4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6 +N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3 +vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6 +-----END CERTIFICATE----- + +# Go Daddy Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8= +-----END CERTIFICATE----- + +# Go Daddy Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT +EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp +ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz +NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH +EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE +AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD +E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH +/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy +DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh +GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR +tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA +AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX +WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu +9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr +gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo +2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO +LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI +4uJEvlz36hz1 +-----END CERTIFICATE----- + +# HARICA TLS ECC Root CA 2021 +-----BEGIN CERTIFICATE----- +MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v +dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG +A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj +aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg +Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 +KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y +STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD +AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw +SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN +nxS2PFOiTAZpffpskcYqSUXm7LcT4Tps +-----END CERTIFICATE----- + +# HARICA TLS RSA Root CA 2021 +-----BEGIN CERTIFICATE----- +MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv +b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l +mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE +4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv +a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M +pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw +Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b +LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY +AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB +AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq +E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr +W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ +CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE +AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU +X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 +f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja +H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP +JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P +zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt +jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 +/L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT +BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 +aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW +xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU +63ZTGI0RmLo= +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions ECC RootCA 2015 +-----BEGIN CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR +-----END CERTIFICATE----- + +# Hellenic Academic and Research Institutions RootCA 2015 +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68 +-----END CERTIFICATE----- + +# HiPKI Root CA - G1 +-----BEGIN CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQLd2szmKXlKFD6LDNdmpeYDANBgkqhkiG9w0BAQsFADBP +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xGzAZBgNVBAMMEkhpUEtJIFJvb3QgQ0EgLSBHMTAeFw0xOTAyMjIwOTQ2MDRa +Fw0zNzEyMzExNTU5NTlaME8xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3 +YSBUZWxlY29tIENvLiwgTHRkLjEbMBkGA1UEAwwSSGlQS0kgUm9vdCBDQSAtIEcx +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9B5/UnMyDHPkvRN0o9Qw +qNCuS9i233VHZvR85zkEHmpwINJaR3JnVfSl6J3VHiGh8Ge6zCFovkRTv4354twv +Vcg3Px+kwJyz5HdcoEb+d/oaoDjq7Zpy3iu9lFc6uux55199QmQ5eiY29yTw1S+6 +lZgRZq2XNdZ1AYDgr/SEYYwNHl98h5ZeQa/rh+r4XfEuiAU+TCK72h8q3VJGZDnz +Qs7ZngyzsHeXZJzA9KMuH5UHsBffMNsAGJZMoYFL3QRtU6M9/Aes1MU3guvklQgZ +KILSQjqj2FPseYlgSGDIcpJQ3AOPgz+yQlda22rpEZfdhSi8MEyr48KxRURHH+CK +FgeW0iEPU8DtqX7UTuybCeyvQqww1r/REEXgphaypcXTT3OUM3ECoWqj1jOXTyFj +HluP2cFeRXF3D4FdXyGarYPM+l7WjSNfGz1BryB1ZlpK9p/7qxj3ccC2HTHsOyDr +y+K49a6SsvfhhEvyovKTmiKe0xRvNlS9H15ZFblzqMF8b3ti6RZsR1pl8w4Rm0bZ +/W3c1pzAtH2lsN0/Vm+h+fbkEkj9Bn8SV7apI09bA8PgcSojt/ewsTu8mL3WmKgM +a/aOEmem8rJY5AIJEzypuxC00jBF8ez3ABHfZfjcK0NVvxaXxA/VLGGEqnKG/uY6 +fsI/fe78LxQ+5oXdUG+3Se0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQU8ncX+l6o/vY9cdVouslGDDjYr7AwDgYDVR0PAQH/BAQDAgGGMA0GCSqG +SIb3DQEBCwUAA4ICAQBQUfB13HAE4/+qddRxosuej6ip0691x1TPOhwEmSKsxBHi +7zNKpiMdDg1H2DfHb680f0+BazVP6XKlMeJ45/dOlBhbQH3PayFUhuaVevvGyuqc +SE5XCV0vrPSltJczWNWseanMX/mF+lLFjfiRFOs6DRfQUsJ748JzjkZ4Bjgs6Fza +ZsT0pPBWGTMpWmWSBUdGSquEwx4noR8RkpkndZMPvDY7l1ePJlsMu5wP1G4wB9Tc +XzZoZjmDlicmisjEOf6aIW/Vcobpf2Lll07QJNBAsNB1CI69aO4I1258EHBGG3zg +iLKecoaZAeO/n0kZtCW+VmWuF2PlHt/o/0elv+EmBYTksMCv5wiZqAxeJoBF1Pho +L5aPruJKHJwWDBNvOIf2u8g0X5IDUXlwpt/L9ZlNec1OvFefQ05rLisY+GpzjLrF +Ne85akEez3GoorKGB1s6yeHvP2UEgEcyRHCVTjFnanRbEEV16rCf0OY1/k6fi8wr +kkVbbiVghUbN0aqwdmaTd5a+g744tiROJgvM7XpWGuDpWsZkrUx6AEhEL7lAuxM+ +vhV4nYWBSipX3tUZQ9rbyltHhoMLP7YNdnhzeSJesYAfz77RP1YQmCuVh6EfnWQU +YDksswBVLuT1sw5XxJFBAJw/6KXf6vb/yPCtbVKoF6ubYfwSUTXkJf2vqmqGOQ== +-----END CERTIFICATE----- + +# Hongkong Post Root CA 3 +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUCBZfikyl7ADJk0DfxMauI7gcWqQwDQYJKoZIhvcNAQEL +BQAwbzELMAkGA1UEBhMCSEsxEjAQBgNVBAgTCUhvbmcgS29uZzESMBAGA1UEBxMJ +SG9uZyBLb25nMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25n +a29uZyBQb3N0IFJvb3QgQ0EgMzAeFw0xNzA2MDMwMjI5NDZaFw00MjA2MDMwMjI5 +NDZaMG8xCzAJBgNVBAYTAkhLMRIwEAYDVQQIEwlIb25nIEtvbmcxEjAQBgNVBAcT +CUhvbmcgS29uZzEWMBQGA1UEChMNSG9uZ2tvbmcgUG9zdDEgMB4GA1UEAxMXSG9u +Z2tvbmcgUG9zdCBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCziNfqzg8gTr7m1gNt7ln8wlffKWihgw4+aMdoWJwcYEuJQwy51BWy7sFO +dem1p+/l6TWZ5Mwc50tfjTMwIDNT2aa71T4Tjukfh0mtUC1Qyhi+AViiE3CWu4mI +VoBc+L0sPOFMV4i707mV78vH9toxdCim5lSJ9UExyuUmGs2C4HDaOym71QP1mbpV +9WTRYA6ziUm4ii8F0oRFKHyPaFASePwLtVPLwpgchKOesL4jpNrcyCse2m5FHomY +2vkALgbpDDtw1VAliJnLzXNg99X/NWfFobxeq81KuEXryGgeDQ0URhLj0mRiikKY +vLTGCAj4/ahMZJx2Ab0vqWwzD9g/KLg8aQFChn5pwckGyuV6RmXpwtZQQS4/t+Tt +bNe/JgERohYpSms0BpDsE9K2+2p20jzt8NYt3eEV7KObLyzJPivkaTv/ciWxNoZb +x39ri1UbSsUgYT2uy1DhCDq+sI9jQVMwCFk8mB13umOResoQUGC/8Ne8lYePl8X+ +l2oBlKN8W4UdKjk60FSh0Tlxnf0h+bV78OLgAo9uliQlLKAeLKjEiafv7ZkGL7YK +TE/bosw3Gq9HhS2KX8Q0NEwA/RiTZxPRN+ZItIsGxVd7GYYKecsAyVKvQv83j+Gj +Hno9UKtjBucVtT+2RTeUN7F+8kjDf8V1/peNRY8apxpyKBpADwIDAQABo2MwYTAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBQXnc0e +i9Y5K3DTXNSguB+wAPzFYTAdBgNVHQ4EFgQUF53NHovWOStw01zUoLgfsAD8xWEw +DQYJKoZIhvcNAQELBQADggIBAFbVe27mIgHSQpsY1Q7XZiNc4/6gx5LS6ZStS6LG +7BJ8dNVI0lkUmcDrudHr9EgwW62nV3OZqdPlt9EuWSRY3GguLmLYauRwCy0gUCCk +MpXRAJi70/33MvJJrsZ64Ee+bs7Lo3I6LWldy8joRTnU+kLBEUx3XZL7av9YROXr +gZ6voJmtvqkBZss4HTzfQx/0TW60uhdG/H39h4F5ag0zD/ov+BS5gLNdTaqX4fnk +GMX41TiMJjz98iji7lpJiCzfeT2OnpA8vUFKOt1b9pq0zj8lMH8yfaIDlNDceqFS +3m6TjRgm/VWsvY+b0s+v54Ysyx8Jb6NvqYTUc79NoXQbTiNg8swOqn+knEwlqLJm +Ozj/2ZQw9nKEvmhVEA/GcywWaZMH/rFF7buiVWqw2rVKAiUnhde3t4ZEFolsgCs+ +l6mc1X5VTMbeRRAc6uk7nwNT7u56AQIWeNTowr5GdogTPyK7SBIdUgC0An4hGh6c +JfTzPV4e0hz5sy229zdcxsshTrD3mUcYhcErulWuBurQB7Lcq9CClnXO0lD+mefP +L5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB60PZ2Pierc+xYw5F9KBa +LJstxabArahH9CdMOA0uG0k7UvToiIMrVCjU8jVStDKDYmlkDJGcn5fqdBb9HxEG +mpv0 +-----END CERTIFICATE----- + +# ISRG Root X1 +-----BEGIN CERTIFICATE----- +MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 +WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu +ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc +h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ +0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U +A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW +T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH +B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC +B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv +KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn +OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn +jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw +qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI +rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq +hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL +ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ +3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK +NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 +ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur +TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC +jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc +oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq +4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA +mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d +emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc= +-----END CERTIFICATE----- + +# ISRG Root X2 +-----BEGIN CERTIFICATE----- +MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw +CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg +R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 +MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT +ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw +EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW ++1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 +ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI +zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW +tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 +/q4AaOeMSQ+2b1tbFfLn +-----END CERTIFICATE----- + +# IdenTrust Commercial Root CA 1 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H +-----END CERTIFICATE----- + +# IdenTrust Public Sector Root CA 1 +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu +VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN +MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 +MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 +ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy +RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS +bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF +/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R +3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw +EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy +9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V +GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ +2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV +WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD +W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN +AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj +t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV +DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 +TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G +lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW +mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df +WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 ++bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ +tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA +GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv +8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+c +-----END CERTIFICATE----- + +# Izenpe.com +-----BEGIN CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 +MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 +ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD +VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j +b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq +scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO +xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H +LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX +uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD +yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ +JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q +rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN +BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L +hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB +QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ +HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu +Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg +QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB +BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx +MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA +A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb +laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 +awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo +JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw +LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT +VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk +LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb +UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ +QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ +naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls +QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== +-----END CERTIFICATE----- + +# Microsec e-Szigno Root CA 2009 +-----BEGIN CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW +-----END CERTIFICATE----- + +# Microsoft ECC Root Certificate Authority 2017 +-----BEGIN CERTIFICATE----- +MIICWTCCAd+gAwIBAgIQZvI9r4fei7FK6gxXMQHC7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYD +VQQDEy1NaWNyb3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTcwHhcNMTkxMjE4MjMwNjQ1WhcNNDIwNzE4MjMxNjA0WjBlMQswCQYDVQQGEwJV +UzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1NaWNy +b3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATUvD0CQnVBEyPNgASGAlEvaqiBYgtlzPbKnR5vSmZR +ogPZnZH6thaxjG7efM3beaYvzrvOcS/lpaso7GMEZpn4+vKTEAXhgShC48Zo9OYb +hGBKia/teQ87zvH2RPUBeMCjVDBSMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBTIy5lycFIM+Oa+sgRXKSrPQhDtNTAQBgkrBgEEAYI3 +FQEEAwIBADAKBggqhkjOPQQDAwNoADBlAjBY8k3qDPlfXu5gKcs68tvWMoQZP3zV +L8KxzJOuULsJMsbG7X7JNpQS5GiFBqIb0C8CMQCZ6Ra0DvpWSNSkMBaReNtUjGUB +iudQZsIxtzm6uBoiB078a1QWIP8rtedMDE2mT3M= +-----END CERTIFICATE----- + +# Microsoft RSA Root Certificate Authority 2017 +-----BEGIN CERTIFICATE----- +MIIFqDCCA5CgAwIBAgIQHtOXCV/YtLNHcB6qvn9FszANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYw +NAYDVQQDEy1NaWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +IDIwMTcwHhcNMTkxMjE4MjI1MTIyWhcNNDIwNzE4MjMwMDIzWjBlMQswCQYDVQQG +EwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1N +aWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKW76UM4wplZEWCpW9R2LBifOZ +Nt9GkMml7Xhqb0eRaPgnZ1AzHaGm++DlQ6OEAlcBXZxIQIJTELy/xztokLaCLeX0 +ZdDMbRnMlfl7rEqUrQ7eS0MdhweSE5CAg2Q1OQT85elss7YfUJQ4ZVBcF0a5toW1 +HLUX6NZFndiyJrDKxHBKrmCk3bPZ7Pw71VdyvD/IybLeS2v4I2wDwAW9lcfNcztm +gGTjGqwu+UcF8ga2m3P1eDNbx6H7JyqhtJqRjJHTOoI+dkC0zVJhUXAoP8XFWvLJ +jEm7FFtNyP9nTUwSlq31/niol4fX/V4ggNyhSyL71Imtus5Hl0dVe49FyGcohJUc +aDDv70ngNXtk55iwlNpNhTs+VcQor1fznhPbRiefHqJeRIOkpcrVE7NLP8TjwuaG +YaRSMLl6IE9vDzhTyzMMEyuP1pq9KsgtsRx9S1HKR9FIJ3Jdh+vVReZIZZ2vUpC6 +W6IYZVcSn2i51BVrlMRpIpj0M+Dt+VGOQVDJNE92kKz8OMHY4Xu54+OU4UZpyw4K +UGsTuqwPN1q3ErWQgR5WrlcihtnJ0tHXUeOrO8ZV/R4O03QK0dqq6mm4lyiPSMQH ++FJDOvTKVTUssKZqwJz58oHhEmrARdlns87/I6KJClTUFLkqqNfs+avNJVgyeY+Q +W5g5xAgGwax/Dj0ApQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUCctZf4aycI8awznjwNnpv7tNsiMwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEMBQADggIBAKyvPl3CEZaJjqPnktaXFbgToqZC +LgLNFgVZJ8og6Lq46BrsTaiXVq5lQ7GPAJtSzVXNUzltYkyLDVt8LkS/gxCP81OC +gMNPOsduET/m4xaRhPtthH80dK2Jp86519efhGSSvpWhrQlTM93uCupKUY5vVau6 +tZRGrox/2KJQJWVggEbbMwSubLWYdFQl3JPk+ONVFT24bcMKpBLBaYVu32TxU5nh +SnUgnZUP5NbcA/FZGOhHibJXWpS2qdgXKxdJ5XbLwVaZOjex/2kskZGT4d9Mozd2 +TaGf+G0eHdP67Pv0RR0Tbc/3WeUiJ3IrhvNXuzDtJE3cfVa7o7P4NHmJweDyAmH3 +pvwPuxwXC65B2Xy9J6P9LjrRk5Sxcx0ki69bIImtt2dmefU6xqaWM/5TkshGsRGR +xpl/j8nWZjEgQRCHLQzWwa80mMpkg/sTV9HB8Dx6jKXB/ZUhoHHBk2dxEuqPiApp +GWSZI1b7rCoucL5mxAyE7+WL85MB+GqQk2dLsmijtWKP6T+MejteD+eMuMZ87zf9 +dOLITzNy4ZQ5bb0Sr74MTnB8G2+NszKTc0QWbej09+CVgI+WXTik9KveCjCHk9hN +AHFiRSdLOkKEW39lt2c0Ui2cFmuqqNh7o0JMcccMyj6D5KbvtwEwXlGjefVwaaZB +RA+GsCyRxj3qrg+E +-----END CERTIFICATE----- + +# NAVER Global Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUAZQwHqIL3fXFMyqxQ0Rx+NZQTQ0wDQYJKoZIhvcNAQEM +BQAwaTELMAkGA1UEBhMCS1IxJjAkBgNVBAoMHU5BVkVSIEJVU0lORVNTIFBMQVRG +T1JNIENvcnAuMTIwMAYDVQQDDClOQVZFUiBHbG9iYWwgUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eTAeFw0xNzA4MTgwODU4NDJaFw0zNzA4MTgyMzU5NTlaMGkx +CzAJBgNVBAYTAktSMSYwJAYDVQQKDB1OQVZFUiBCVVNJTkVTUyBQTEFURk9STSBD +b3JwLjEyMDAGA1UEAwwpTkFWRVIgR2xvYmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC21PGTXLVA +iQqrDZBbUGOukJR0F0Vy1ntlWilLp1agS7gvQnXp2XskWjFlqxcX0TM62RHcQDaH +38dq6SZeWYp34+hInDEW+j6RscrJo+KfziFTowI2MMtSAuXaMl3Dxeb57hHHi8lE +HoSTGEq0n+USZGnQJoViAbbJAh2+g1G7XNr4rRVqmfeSVPc0W+m/6imBEtRTkZaz +kVrd/pBzKPswRrXKCAfHcXLJZtM0l/aM9BhK4dA9WkW2aacp+yPOiNgSnABIqKYP +szuSjXEOdMWLyEz59JuOuDxp7W87UC9Y7cSw0BwbagzivESq2M0UXZR4Yb8Obtoq +vC8MC3GmsxY/nOb5zJ9TNeIDoKAYv7vxvvTWjIcNQvcGufFt7QSUqP620wbGQGHf +nZ3zVHbOUzoBppJB7ASjjw2i1QnK1sua8e9DXcCrpUHPXFNwcMmIpi3Ua2FzUCaG +YQ5fG8Ir4ozVu53BA0K6lNpfqbDKzE0K70dpAy8i+/Eozr9dUGWokG2zdLAIx6yo +0es+nPxdGoMuK8u180SdOqcXYZaicdNwlhVNt0xz7hlcxVs+Qf6sdWA7G2POAN3a +CJBitOUt7kinaxeZVL6HSuOpXgRM6xBtVNbv8ejyYhbLgGvtPe31HzClrkvJE+2K +AQHJuFFYwGY6sWZLxNUxAmLpdIQM201GLQIDAQABo0IwQDAdBgNVHQ4EFgQU0p+I +36HNLL3s9TsBAZMzJ7LrYEswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADLKgLOdPVQG3dLSLvCkASELZ0jKbY7gyKoN +qo0hV4/GPnrK21HUUrPUloSlWGB/5QuOH/XcChWB5Tu2tyIvCZwTFrFsDDUIbatj +cu3cvuzHV+YwIHHW1xDBE1UBjCpD5EHxzzp6U5LOogMFDTjfArsQLtk70pt6wKGm ++LUx5vR1yblTmXVHIloUFcd4G7ad6Qz4G3bxhYTeodoS76TiEJd6eN4MUZeoIUCL +hr0N8F5OSza7OyAfikJW4Qsav3vQIkMsRIz75Sq0bBwcupTgE34h5prCy8VCZLQe +lHsIJchxzIdFV4XTnyliIoNRlwAYl3dqmJLJfGBs32x9SuRwTMKeuB330DTHD8z7 +p/8Dvq1wkNoL3chtl1+afwkyQf3NosxabUzyqkn+Zvjp2DXrDige7kgvOtB5CTh8 +piKCk5XQA76+AqAF3SAi428diDRgxuYKuQl1C/AH6GmWNcf7I4GOODm4RStDeKLR +LBT/DShycpWbXgnbiUSYqqFJu3FS8r/2/yehNq+4tneI3TqkbZs0kNwUXTC/t+sX +5Ie3cdCh13cV1ELX8vMxmV2b3RZtP+oGI/hGoiLtk/bdmuYqh7GYVPEi92tF4+KO +dh2ajcQGjTa3FPOdVGm3jjzVpG2Tgbet9r1ke8LJaDmgkpzNNIaRkPpkUZ3+/uul +9XXeifdy +-----END CERTIFICATE----- + +# NetLock Arany (Class Gold) Főtanúsítvány +-----BEGIN CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GB CA +-----BEGIN CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= +-----END CERTIFICATE----- + +# OISTE WISeKey Global Root GC CA +-----BEGIN CERTIFICATE----- +MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw +CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 +bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg +Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ +BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu +ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS +b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni +eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W +p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T +rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV +57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg +Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9 +-----END CERTIFICATE----- + +# QuoVadis Root CA 1 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD +-----END CERTIFICATE----- + +# QuoVadis Root CA 2 +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u +-----END CERTIFICATE----- + +# QuoVadis Root CA 2 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 +MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf +qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW +n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym +c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ +O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 +o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j +IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq +IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz +8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh +vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l +7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG +cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD +ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 +AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC +roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga +W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n +lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE ++V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV +csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd +dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg +KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM +HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 +WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEto= +-----END CERTIFICATE----- + +# QuoVadis Root CA 3 G3 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 +-----END CERTIFICATE----- + +# SSL.com EV Root Certification Authority ECC +-----BEGIN CERTIFICATE----- +MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx +NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv +bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA +VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku +WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX +5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ +ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg +h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSg== +-----END CERTIFICATE----- + +# SSL.com EV Root Certification Authority RSA R2 +-----BEGIN CERTIFICATE----- +MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV +BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE +CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy +MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G +A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD +DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq +M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf +OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa +4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 +HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR +aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA +b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ +Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV +PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO +pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu +UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY +MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV +HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 +9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW +s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 +Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg +cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM +79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz +/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt +ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm +Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK +QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ +w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi +S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 +mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+w== +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority ECC +-----BEGIN CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl +-----END CERTIFICATE----- + +# SSL.com Root Certification Authority RSA +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7k= +-----END CERTIFICATE----- + +# SSL.com TLS ECC Root CA 2022 +-----BEGIN CERTIFICATE----- +MIICOjCCAcCgAwIBAgIQFAP1q/s3ixdAW+JDsqXRxDAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQDDBxT +U0wuY29tIFRMUyBFQ0MgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzM0OFoXDTQ2 +MDgxOTE2MzM0N1owTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jwb3Jh +dGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgRUNDIFJvb3QgQ0EgMjAyMjB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABEUpNXP6wrgjzhR9qLFNoFs27iosU8NgCTWyJGYm +acCzldZdkkAZDsalE3D07xJRKF3nzL35PIXBz5SQySvOkkJYWWf9lCcQZIxPBLFN +SeR7T5v15wj4A4j3p8OSSxlUgaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSME +GDAWgBSJjy+j6CugFFR781a4Jl9nOAuc0DAdBgNVHQ4EFgQUiY8vo+groBRUe/NW +uCZfZzgLnNAwDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMDA2gAMGUCMFXjIlbp +15IkWE8elDIPDAI2wv2sdDJO4fscgIijzPvX6yv/N33w7deedWo1dlJF4AIxAMeN +b0Igj762TVntd00pxCAgRWSGOlDGxK0tk/UYfXLtqc/ErFc2KAhl3zx5Zn6g6g== +-----END CERTIFICATE----- + +# SSL.com TLS RSA Root CA 2022 +-----BEGIN CERTIFICATE----- +MIIFiTCCA3GgAwIBAgIQb77arXO9CEDii02+1PdbkTANBgkqhkiG9w0BAQsFADBO +MQswCQYDVQQGEwJVUzEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMSUwIwYDVQQD +DBxTU0wuY29tIFRMUyBSU0EgUm9vdCBDQSAyMDIyMB4XDTIyMDgyNTE2MzQyMloX +DTQ2MDgxOTE2MzQyMVowTjELMAkGA1UEBhMCVVMxGDAWBgNVBAoMD1NTTCBDb3Jw +b3JhdGlvbjElMCMGA1UEAwwcU1NMLmNvbSBUTFMgUlNBIFJvb3QgQ0EgMjAyMjCC +AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANCkCXJPQIgSYT41I57u9nTP +L3tYPc48DRAokC+X94xI2KDYJbFMsBFMF3NQ0CJKY7uB0ylu1bUJPiYYf7ISf5OY +t6/wNr/y7hienDtSxUcZXXTzZGbVXcdotL8bHAajvI9AI7YexoS9UcQbOcGV0ins +S657Lb85/bRi3pZ7QcacoOAGcvvwB5cJOYF0r/c0WRFXCsJbwST0MXMwgsadugL3 +PnxEX4MN8/HdIGkWCVDi1FW24IBydm5MR7d1VVm0U3TZlMZBrViKMWYPHqIbKUBO +L9975hYsLfy/7PO0+r4Y9ptJ1O4Fbtk085zx7AGL0SDGD6C1vBdOSHtRwvzpXGk3 +R2azaPgVKPC506QVzFpPulJwoxJF3ca6TvvC0PeoUidtbnm1jPx7jMEWTO6Af77w +dr5BUxIzrlo4QqvXDz5BjXYHMtWrifZOZ9mxQnUjbvPNQrL8VfVThxc7wDNY8VLS ++YCk8OjwO4s4zKTGkH8PnP2L0aPP2oOnaclQNtVcBdIKQXTbYxE3waWglksejBYS +d66UNHsef8JmAOSqg+qKkK3ONkRN0VHpvB/zagX9wHQfJRlAUW7qglFA35u5CCoG +AtUjHBPW6dvbxrB6y3snm/vg1UYk7RBLY0ulBY+6uB0rpvqR4pJSvezrZ5dtmi2f +gTIFZzL7SAg/2SW4BCUvAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j +BBgwFoAU+y437uOEeicuzRk1sTN8/9REQrkwHQYDVR0OBBYEFPsuN+7jhHonLs0Z +NbEzfP/UREK5MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAjYlt +hEUY8U+zoO9opMAdrDC8Z2awms22qyIZZtM7QbUQnRC6cm4pJCAcAZli05bg4vsM +QtfhWsSWTVTNj8pDU/0quOr4ZcoBwq1gaAafORpR2eCNJvkLTqVTJXojpBzOCBvf +R4iyrT7gJ4eLSYwfqUdYe5byiB0YrrPRpgqU+tvT5TgKa3kSM/tKWTcWQA673vWJ +DPFs0/dRa1419dvAJuoSc06pkZCmF8NsLzjUo3KUQyxi4U5cMj29TH0ZR6LDSeeW +P4+a0zvkEdiLA9z2tmBVGKaBUfPhqBVq6+AL8BQx1rmMRTqoENjwuSfr98t67wVy +lrXEj5ZzxOhWc5y8aVFjvO9nHEMaX3cZHxj4HCUp+UmZKbaSPaKDN7EgkaibMOlq +bLQjk2UEqxHzDh1TJElTHaE/nUiSEeJ9DU/1172iWD54nR4fK/4huxoTtrEoZP2w +AgDHbICivRZQIA9ygV/MlP+7mea6kMvq+cYMwq7FGc4zoWtcu358NFcXrfA/rs3q +r5nsLFR+jM4uElZI7xc7P0peYNLcdDa8pUNjyw9bowJWCZ4kLOGGgYz+qxcs+sji +Mho6/4UIyYOf8kpIEFR3N+2ivEC+5BB09+Rbu7nzifmPQdjH5FCQNYA+HLhNkNPU +98OwoX6EyneSMSy4kLGCenROmxMmtNVQZlR4rmA= +-----END CERTIFICATE----- + +# SZAFIR ROOT CA2 +-----BEGIN CERTIFICATE----- +MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL +BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 +ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw +NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L +cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg +Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN +QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT +3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw +3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 +3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 +BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN +XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF +AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw +8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG +nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP +oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy +d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg +LvWpCz/UXeHPhJ/iGcJfitYgHuNztw== +-----END CERTIFICATE----- + +# Sectigo Public Server Authentication Root E46 +-----BEGIN CERTIFICATE----- +MIICOjCCAcGgAwIBAgIQQvLM2htpN0RfFf51KBC49DAKBggqhkjOPQQDAzBfMQsw +CQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1T +ZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwHhcN +MjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEYMBYG +A1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1YmxpYyBT +ZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAR2+pmpbiDt+dd34wc7qNs9Xzjoq1WmVk/WSOrsfy2qw7LFeeyZYX8QeccC +WvkEN/U0NSt3zn8gj1KjAIns1aeibVvjS5KToID1AZTc8GgHHs3u/iVStSBDHBv+ +6xnOQ6OjQjBAMB0GA1UdDgQWBBTRItpMWfFLXyY4qp3W7usNw/upYTAOBgNVHQ8B +Af8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNnADBkAjAn7qRa +qCG76UeXlImldCBteU/IvZNeWBj7LRoAasm4PdCkT0RHlAFWovgzJQxC36oCMB3q +4S6ILuH5px0CMk7yn2xVdOOurvulGu7t0vzCAxHrRVxgED1cf5kDW21USAGKcw== +-----END CERTIFICATE----- + +# Sectigo Public Server Authentication Root R46 +-----BEGIN CERTIFICATE----- +MIIFijCCA3KgAwIBAgIQdY39i658BwD6qSWn4cetFDANBgkqhkiG9w0BAQwFADBf +MQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQD +Ey1TZWN0aWdvIFB1YmxpYyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYw +HhcNMjEwMzIyMDAwMDAwWhcNNDYwMzIxMjM1OTU5WjBfMQswCQYDVQQGEwJHQjEY +MBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMTYwNAYDVQQDEy1TZWN0aWdvIFB1Ymxp +YyBTZXJ2ZXIgQXV0aGVudGljYXRpb24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCTvtU2UnXYASOgHEdCSe5jtrch/cSV1UgrJnwUUxDa +ef0rty2k1Cz66jLdScK5vQ9IPXtamFSvnl0xdE8H/FAh3aTPaE8bEmNtJZlMKpnz +SDBh+oF8HqcIStw+KxwfGExxqjWMrfhu6DtK2eWUAtaJhBOqbchPM8xQljeSM9xf +iOefVNlI8JhD1mb9nxc4Q8UBUQvX4yMPFF1bFOdLvt30yNoDN9HWOaEhUTCDsG3X +ME6WW5HwcCSrv0WBZEMNvSE6Lzzpng3LILVCJ8zab5vuZDCQOc2TZYEhMbUjUDM3 +IuM47fgxMMxF/mL50V0yeUKH32rMVhlATc6qu/m1dkmU8Sf4kaWD5QazYw6A3OAS +VYCmO2a0OYctyPDQ0RTp5A1NDvZdV3LFOxxHVp3i1fuBYYzMTYCQNFu31xR13NgE +SJ/AwSiItOkcyqex8Va3e0lMWeUgFaiEAin6OJRpmkkGj80feRQXEgyDet4fsZfu ++Zd4KKTIRJLpfSYFplhym3kT2BFfrsU4YjRosoYwjviQYZ4ybPUHNs2iTG7sijbt +8uaZFURww3y8nDnAtOFr94MlI1fZEoDlSfB1D++N6xybVCi0ITz8fAr/73trdf+L +HaAZBav6+CuBQug4urv7qv094PPK306Xlynt8xhW6aWWrL3DkJiy4Pmi1KZHQ3xt +zwIDAQABo0IwQDAdBgNVHQ4EFgQUVnNYZJX5khqwEioEYnmhQBWIIUkwDgYDVR0P +AQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAC9c +mTz8Bl6MlC5w6tIyMY208FHVvArzZJ8HXtXBc2hkeqK5Duj5XYUtqDdFqij0lgVQ +YKlJfp/imTYpE0RHap1VIDzYm/EDMrraQKFz6oOht0SmDpkBm+S8f74TlH7Kph52 +gDY9hAaLMyZlbcp+nv4fjFg4exqDsQ+8FxG75gbMY/qB8oFM2gsQa6H61SilzwZA +Fv97fRheORKkU55+MkIQpiGRqRxOF3yEvJ+M0ejf5lG5Nkc/kLnHvALcWxxPDkjB +JYOcCj+esQMzEhonrPcibCTRAUH4WAP+JWgiH5paPHxsnnVI84HxZmduTILA7rpX +DhjvLpr3Etiga+kFpaHpaPi8TD8SHkXoUsCjvxInebnMMTzD9joiFgOgyY9mpFui +TdaBJQbpdqQACj7LzTWb4OE4y2BThihCQRxEV+ioratF4yUQvNs+ZUH7G6aXD+u5 +dHn5HrwdVw1Hr8Mvn4dGp+smWg9WY7ViYG4A++MnESLn/pmPNPW56MORcr3Ywx65 +LvKRRFHQV80MNNVIIb/bE/FmJUNS0nAiNs2fxBx1IK1jcmMGDw4nztJqDby1ORrp +0XZ60Vzk50lJLVU3aPAaOpg+VBeHVOmmJ1CJeyAvP/+/oYtKR5j/K3tJPsMpRmAY +QqszKbrAKbkTidOIijlBO8n9pu0f9GBj39ItVQGL +-----END CERTIFICATE----- + +# SecureSign RootCA11 +-----BEGIN CERTIFICATE----- +MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDEr +MCkGA1UEChMiSmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoG +A1UEAxMTU2VjdXJlU2lnbiBSb290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0 +MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RD +QTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvLTJsz +i1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8 +h9uuywGOwvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOV +MdrAG/LuYpmGYz+/3ZMqg6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9 +UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rPO7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni +8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitAbpSACW22s293bzUIUPsC +h8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZXt94wDgYD +VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AKChOBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xm +KbabfSVSSUOrTC4rbnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQ +X5Ucv+2rIrVls4W6ng+4reV6G4pQOh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWr +QbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01y8hSyn+B/tlr0/cR7SXf+Of5 +pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061lgeLKBObjBmN +QSdJQO7e5iNEOdyhIta6A/I= +-----END CERTIFICATE----- + +# SecureTrust CA +-----BEGIN CERTIFICATE----- +MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz +MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv +cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz +Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO +0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao +wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj +7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS +8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT +BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg +JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 +6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ +3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm +D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS +CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR +3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= +-----END CERTIFICATE----- + +# Secure Global CA +-----BEGIN CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +-----END CERTIFICATE----- + +# Security Communication ECC RootCA1 +-----BEGIN CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= +-----END CERTIFICATE----- + +# Security Communication RootCA2 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 +-----END CERTIFICATE----- + +# Security Communication RootCA3 +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZg== +-----END CERTIFICATE----- + +# Starfield Class 2 CA +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q= +-----END CERTIFICATE----- + +# Starfield Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs +ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw +MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 +b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj +aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp +Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg +nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 +HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N +Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN +dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 +HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G +CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU +sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 +4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg +8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K +pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 +mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 +-----END CERTIFICATE----- + +# Starfield Services Root Certificate Authority - G2 +-----BEGIN CERTIFICATE----- +MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs +ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 +MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy +ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy +dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p +OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 +8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K +Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe +hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk +6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q +AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI +bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB +ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z +qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd +iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn +0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN +sSi6 +-----END CERTIFICATE----- + +# SwissSign Gold CA - G2 +-----BEGIN CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ +-----END CERTIFICATE----- + +# SwissSign Silver CA - G2 +-----BEGIN CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u +-----END CERTIFICATE----- + +# T-TeleSec GlobalRoot Class 2 +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6Fuwg== +-----END CERTIFICATE----- + +# T-TeleSec GlobalRoot Class 3 +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgxMDAxMTAyOTU2WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN +8ELg63iIVl6bmlQdTQyK9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/ +RLyTPWGrTs0NvvAgJ1gORH8EGoel15YUNpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4 +hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZFiP0Zf3WHHx+xGwpzJFu5 +ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W0eDrXltM +EnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1 +A/d2O2GCahKqGFPrAyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOy +WL6ukK2YJ5f+AbGwUgC4TeQbIXQbfsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ +1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzTucpH9sry9uetuUg/vBa3wW30 +6gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7hP0HHRwA11fXT +91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml +e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4p +TpPDpFQUWw== +-----END CERTIFICATE----- + +# TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 +-----BEGIN CERTIFICATE----- +MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIx +GDAWBgNVBAcTD0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxp +bXNlbCB2ZSBUZWtub2xvamlrIEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0w +KwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24gTWVya2V6aSAtIEthbXUgU00xNjA0 +BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRpZmlrYXNpIC0gU3Vy +dW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYDVQQG +EwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXll +IEJpbGltc2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklU +QUsxLTArBgNVBAsTJEthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBT +TTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kg +LSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr3UwM6q7 +a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y86Ij5iySr +LqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INr +N3wcwv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2X +YacQuFWQfw4tJzh03+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/ +iSIzL+aFCr2lqBs23tPcLG07xxO9WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4f +AJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQUZT/HiobGPN08VFw1+DrtUgxH +V8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh +AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPf +IPP54+M638yclNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4 +lzwDGrpDxpa5RXI4s6ehlj2Re37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c +8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0jq5Rm+K37DwhuJi1/FwcJsoz7UMCf +lo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= +-----END CERTIFICATE----- + +# TWCA Global Root CA +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0= +-----END CERTIFICATE----- + +# TWCA Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== +-----END CERTIFICATE----- + +# Telekom Security TLS ECC Root 2020 +-----BEGIN CERTIFICATE----- +MIICQjCCAcmgAwIBAgIQNjqWjMlcsljN0AFdxeVXADAKBggqhkjOPQQDAzBjMQsw +CQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0eSBH +bWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBFQ0MgUm9vdCAyMDIw +MB4XDTIwMDgyNTA3NDgyMFoXDTQ1MDgyNTIzNTk1OVowYzELMAkGA1UEBhMCREUx +JzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkGA1UE +AwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgRUNDIFJvb3QgMjAyMDB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABM6//leov9Wq9xCazbzREaK9Z0LMkOsVGJDZos0MKiXrPk/O +tdKPD/M12kOLAoC+b1EkHQ9rK8qfwm9QMuU3ILYg/4gND21Ju9sGpIeQkpT0CdDP +f8iAC8GXs7s1J8nCG6NCMEAwHQYDVR0OBBYEFONyzG6VmUex5rNhTNHLq+O6zd6f +MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMAoGCCqGSM49BAMDA2cA +MGQCMHVSi7ekEE+uShCLsoRbQuHmKjYC2qBuGT8lv9pZMo7k+5Dck2TOrbRBR2Di +z6fLHgIwN0GMZt9Ba9aDAEH9L1r3ULRn0SyocddDypwnJJGDSA3PzfdUga/sf+Rn +27iQ7t0l +-----END CERTIFICATE----- + +# Telekom Security TLS RSA Root 2023 +-----BEGIN CERTIFICATE----- +MIIFszCCA5ugAwIBAgIQIZxULej27HF3+k7ow3BXlzANBgkqhkiG9w0BAQwFADBj +MQswCQYDVQQGEwJERTEnMCUGA1UECgweRGV1dHNjaGUgVGVsZWtvbSBTZWN1cml0 +eSBHbWJIMSswKQYDVQQDDCJUZWxla29tIFNlY3VyaXR5IFRMUyBSU0EgUm9vdCAy +MDIzMB4XDTIzMDMyODEyMTY0NVoXDTQ4MDMyNzIzNTk1OVowYzELMAkGA1UEBhMC +REUxJzAlBgNVBAoMHkRldXRzY2hlIFRlbGVrb20gU2VjdXJpdHkgR21iSDErMCkG +A1UEAwwiVGVsZWtvbSBTZWN1cml0eSBUTFMgUlNBIFJvb3QgMjAyMzCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAO01oYGA88tKaVvC+1GDrib94W7zgRJ9 +cUD/h3VCKSHtgVIs3xLBGYSJwb3FKNXVS2xE1kzbB5ZKVXrKNoIENqil/Cf2SfHV +cp6R+SPWcHu79ZvB7JPPGeplfohwoHP89v+1VmLhc2o0mD6CuKyVU/QBoCcHcqMA +U6DksquDOFczJZSfvkgdmOGjup5czQRxUX11eKvzWarE4GC+j4NSuHUaQTXtvPM6 +Y+mpFEXX5lLRbtLevOP1Czvm4MS9Q2QTps70mDdsipWol8hHD/BeEIvnHRz+sTug +BTNoBUGCwQMrAcjnj02r6LX2zWtEtefdi+zqJbQAIldNsLGyMcEWzv/9FIS3R/qy +8XDe24tsNlikfLMR0cN3f1+2JeANxdKz+bi4d9s3cXFH42AYTyS2dTd4uaNir73J +co4vzLuu2+QVUhkHM/tqty1LkCiCc/4YizWN26cEar7qwU02OxY2kTLvtkCJkUPg +8qKrBC7m8kwOFjQgrIfBLX7JZkcXFBGk8/ehJImr2BrIoVyxo/eMbcgByU/J7MT8 +rFEz0ciD0cmfHdRHNCk+y7AO+oMLKFjlKdw/fKifybYKu6boRhYPluV75Gp6SG12 +mAWl3G0eQh5C2hrgUve1g8Aae3g1LDj1H/1Joy7SWWO/gLCMk3PLNaaZlSJhZQNg ++y+TS/qanIA7AgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUtqeX +gj10hZv3PJ+TmpV5dVKMbUcwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBS2 +p5eCPXSFm/c8n5OalXl1UoxtRzANBgkqhkiG9w0BAQwFAAOCAgEAqMxhpr51nhVQ +pGv7qHBFfLp+sVr8WyP6Cnf4mHGCDG3gXkaqk/QeoMPhk9tLrbKmXauw1GLLXrtm +9S3ul0A8Yute1hTWjOKWi0FpkzXmuZlrYrShF2Y0pmtjxrlO8iLpWA1WQdH6DErw +M807u20hOq6OcrXDSvvpfeWxm4bu4uB9tPcy/SKE8YXJN3nptT+/XOR0so8RYgDd +GGah2XsjX/GO1WfoVNpbOms2b/mBsTNHM3dA+VKq3dSDz4V4mZqTuXNnQkYRIer+ +CqkbGmVps4+uFrb2S1ayLfmlyOw7YqPta9BO1UAJpB+Y1zqlklkg5LB9zVtzaL1t +xKITDmcZuI1CfmwMmm6gJC3VRRvcxAIU/oVbZZfKTpBQCHpCNfnqwmbU+AGuHrS+ +w6jv/naaoqYfRvaE7fzbzsQCzndILIyy7MMAo+wsVRjBfhnu4S/yrYObnqsZ38aK +L4x35bcF7DvB7L6Gs4a8wPfc5+pbrrLMtTWGS9DiP7bY+A4A7l3j941Y/8+LN+lj +X273CXE2whJdV/LItM3z7gLfEdxquVeEHVlNjM7IDiPCtyaaEBRx/pOyiriA8A4Q +ntOoUAw3gi/q4Iqd4Sw5/7W0cwDk90imc6y/st53BIe0o82bNSQ3+pCTE4FCxpgm +dTdmQRCsu/WU48IxK63nI1bMNSWSs1A= +-----END CERTIFICATE----- + +# TeliaSonera Root CA v1 +-----BEGIN CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= +-----END CERTIFICATE----- + +# Telia Root CA v2 +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx +CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE +AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 +NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ +MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq +AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 +vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 +lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD +n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT +7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o +6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC +TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 +WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R +DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI +pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj +YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy +rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw +AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ +8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi +0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM +A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS +SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K +TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF +6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er +3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt +Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT +VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW +ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA +rBPuUBQemMc= +-----END CERTIFICATE----- + +# TrustAsia Global Root CA G3 +-----BEGIN CERTIFICATE----- +MIIFpTCCA42gAwIBAgIUZPYOZXdhaqs7tOqFhLuxibhxkw8wDQYJKoZIhvcNAQEM +BQAwWjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dp +ZXMsIEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHMzAe +Fw0yMTA1MjAwMjEwMTlaFw00NjA1MTkwMjEwMTlaMFoxCzAJBgNVBAYTAkNOMSUw +IwYDVQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtU +cnVzdEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzMwggIiMA0GCSqGSIb3DQEBAQUAA4IC +DwAwggIKAoICAQDAMYJhkuSUGwoqZdC+BqmHO1ES6nBBruL7dOoKjbmzTNyPtxNS +T1QY4SxzlZHFZjtqz6xjbYdT8PfxObegQ2OwxANdV6nnRM7EoYNl9lA+sX4WuDqK +AtCWHwDNBSHvBm3dIZwZQ0WhxeiAysKtQGIXBsaqvPPW5vxQfmZCHzyLpnl5hkA1 +nyDvP+uLRx+PjsXUjrYsyUQE49RDdT/VP68czH5GX6zfZBCK70bwkPAPLfSIC7Ep +qq+FqklYqL9joDiR5rPmd2jE+SoZhLsO4fWvieylL1AgdB4SQXMeJNnKziyhWTXA +yB1GJ2Faj/lN03J5Zh6fFZAhLf3ti1ZwA0pJPn9pMRJpxx5cynoTi+jm9WAPzJMs +hH/x/Gr8m0ed262IPfN2dTPXS6TIi/n1Q1hPy8gDVI+lhXgEGvNz8teHHUGf59gX +zhqcD0r83ERoVGjiQTz+LISGNzzNPy+i2+f3VANfWdP3kXjHi3dqFuVJhZBFcnAv +kV34PmVACxmZySYgWmjBNb9Pp1Hx2BErW+Canig7CjoKH8GB5S7wprlppYiU5msT +f9FkPz2ccEblooV7WIQn3MSAPmeamseaMQ4w7OYXQJXZRe0Blqq/DPNL0WP3E1jA +uPP6Z92bfW1K/zJMtSU7/xxnD4UiWQWRkUF3gdCFTIcQcf+eQxuulXUtgQIDAQAB +o2MwYTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFEDk5PIj7zjKsK5Xf/Ih +MBY027ySMB0GA1UdDgQWBBRA5OTyI+84yrCuV3/yITAWNNu8kjAOBgNVHQ8BAf8E +BAMCAQYwDQYJKoZIhvcNAQEMBQADggIBACY7UeFNOPMyGLS0XuFlXsSUT9SnYaP4 +wM8zAQLpw6o1D/GUE3d3NZ4tVlFEbuHGLige/9rsR82XRBf34EzC4Xx8MnpmyFq2 +XFNFV1pF1AWZLy4jVe5jaN/TG3inEpQGAHUNcoTpLrxaatXeL1nHo+zSh2bbt1S1 +JKv0Q3jbSwTEb93mPmY+KfJLaHEih6D4sTNjduMNhXJEIlU/HHzp/LgV6FL6qj6j +ITk1dImmasI5+njPtqzn59ZW/yOSLlALqbUHM/Q4X6RJpstlcHboCoWASzY9M/eV +VHUl2qzEc4Jl6VL1XP04lQJqaTDFHApXB64ipCz5xUG3uOyfT0gA+QEEVcys+TIx +xHWVBqB/0Y0n3bOppHKH/lmLmnp0Ft0WpWIp6zqW3IunaFnT63eROfjXy9mPX1on +AX1daBli2MjN9LdyR75bl87yraKZk62Uy5P2EgmVtqvXO9A/EcswFi55gORngS1d +7XB4tmBZrOFdRWOPyN9yaFvqHbgB8X7754qz41SgOAngPN5C8sLtLpvzHzW2Ntjj +gKGLzZlkD8Kqq7HK9W+eQ42EVJmzbsASZthwEPEGNTNDqJwuuhQxzhB/HIbjj9LV ++Hfsm6vxL2PZQl/gZ4FkkfGXL/xuJvYz+NO1+MRiqzFRJQJ6+N1rZdVtTTDIZbpo +FGWsJwt0ivKH +-----END CERTIFICATE----- + +# TrustAsia Global Root CA G4 +-----BEGIN CERTIFICATE----- +MIICVTCCAdygAwIBAgIUTyNkuI6XY57GU4HBdk7LKnQV1tcwCgYIKoZIzj0EAwMw +WjELMAkGA1UEBhMCQ04xJTAjBgNVBAoMHFRydXN0QXNpYSBUZWNobm9sb2dpZXMs +IEluYy4xJDAiBgNVBAMMG1RydXN0QXNpYSBHbG9iYWwgUm9vdCBDQSBHNDAeFw0y +MTA1MjAwMjEwMjJaFw00NjA1MTkwMjEwMjJaMFoxCzAJBgNVBAYTAkNOMSUwIwYD +VQQKDBxUcnVzdEFzaWEgVGVjaG5vbG9naWVzLCBJbmMuMSQwIgYDVQQDDBtUcnVz +dEFzaWEgR2xvYmFsIFJvb3QgQ0EgRzQwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATx +s8045CVD5d4ZCbuBeaIVXxVjAd7Cq92zphtnS4CDr5nLrBfbK5bKfFJV4hrhPVbw +LxYI+hW8m7tH5j/uqOFMjPXTNvk4XatwmkcN4oFBButJ+bAp3TPsUKV/eSm4IJij +YzBhMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUpbtKl86zK3+kMd6Xg1mD +pm9xy94wHQYDVR0OBBYEFKW7SpfOsyt/pDHel4NZg6ZvccveMA4GA1UdDwEB/wQE +AwIBBjAKBggqhkjOPQQDAwNnADBkAjBe8usGzEkxn0AAbbd+NvBNEU/zy4k6LHiR +UKNbwMp1JvK/kF0LgoxgKJ/GcJpo5PECMFxYDlZ2z1jD1xCMuo6u47xkdUfFVZDj +/bpV6wfEU6s3qe4hsiFbYI89MvHVI5TWWA== +-----END CERTIFICATE----- + +# Trustwave Global Certification Authority +-----BEGIN CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHk= +-----END CERTIFICATE----- + +# Trustwave Global ECC P256 Certification Authority +-----BEGIN CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 +-----END CERTIFICATE----- + +# Trustwave Global ECC P384 Certification Authority +-----BEGIN CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +Sw== +-----END CERTIFICATE----- + +# TunTrust Root CA +-----BEGIN CERTIFICATE----- +MIIFszCCA5ugAwIBAgIUEwLV4kBMkkaGFmddtLu7sms+/BMwDQYJKoZIhvcNAQEL +BQAwYTELMAkGA1UEBhMCVE4xNzA1BgNVBAoMLkFnZW5jZSBOYXRpb25hbGUgZGUg +Q2VydGlmaWNhdGlvbiBFbGVjdHJvbmlxdWUxGTAXBgNVBAMMEFR1blRydXN0IFJv +b3QgQ0EwHhcNMTkwNDI2MDg1NzU2WhcNNDQwNDI2MDg1NzU2WjBhMQswCQYDVQQG +EwJUTjE3MDUGA1UECgwuQWdlbmNlIE5hdGlvbmFsZSBkZSBDZXJ0aWZpY2F0aW9u +IEVsZWN0cm9uaXF1ZTEZMBcGA1UEAwwQVHVuVHJ1c3QgUm9vdCBDQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMPN0/y9BFPdDCA61YguBUtB9YOCfvdZ +n56eY+hz2vYGqU8ftPkLHzmMmiDQfgbU7DTZhrx1W4eI8NLZ1KMKsmwb60ksPqxd +2JQDoOw05TDENX37Jk0bbjBU2PWARZw5rZzJJQRNmpA+TkBuimvNKWfGzC3gdOgF +VwpIUPp6Q9p+7FuaDmJ2/uqdHYVy7BG7NegfJ7/Boce7SBbdVtfMTqDhuazb1YMZ +GoXRlJfXyqNlC/M4+QKu3fZnz8k/9YosRxqZbwUN/dAdgjH8KcwAWJeRTIAAHDOF +li/LQcKLEITDCSSJH7UP2dl3RxiSlGBcx5kDPP73lad9UKGAwqmDrViWVSHbhlnU +r8a83YFuB9tgYv7sEG7aaAH0gxupPqJbI9dkxt/con3YS7qC0lH4Zr8GRuR5KiY2 +eY8fTpkdso8MDhz/yV3A/ZAQprE38806JG60hZC/gLkMjNWb1sjxVj8agIl6qeIb +MlEsPvLfe/ZdeikZjuXIvTZxi11Mwh0/rViizz1wTaZQmCXcI/m4WEEIcb9PuISg +jwBUFfyRbVinljvrS5YnzWuioYasDXxU5mZMZl+QviGaAkYt5IPCgLnPSz7ofzwB +7I9ezX/SKEIBlYrilz0QIX32nRzFNKHsLA4KUiwSVXAkPcvCFDVDXSdOvsC9qnyW +5/yeYa1E0wCXAgMBAAGjYzBhMB0GA1UdDgQWBBQGmpsfU33x9aTI04Y+oXNZtPdE +ITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFAaamx9TffH1pMjThj6hc1m0 +90QhMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAqgVutt0Vyb+z +xiD2BkewhpMl0425yAA/l/VSJ4hxyXT968pk21vvHl26v9Hr7lxpuhbI87mP0zYu +QEkHDVneixCwSQXi/5E/S7fdAo74gShczNxtr18UnH1YeA32gAm56Q6XKRm4t+v4 +FstVEuTGfbvE7Pi1HE4+Z7/FXxttbUcoqgRYYdZ2vyJ/0Adqp2RT8JeNnYA/u8EH +22Wv5psymsNUk8QcCMNE+3tjEUPRahphanltkE8pjkcFwRJpadbGNjHh/PqAulxP +xOu3Mqz4dWEX1xAZufHSCe96Qp1bWgvUxpVOKs7/B9dPfhgGiPEZtdmYu65xxBzn +dFlY7wyJz4sfdZMaBBSSSFCp61cpABbjNhzI+L/wM9VBD8TMPN3pM0MBkRArHtG5 +Xc0yGYuPjCB31yLEQtyEFpslbei0VXF/sHyz03FJuc9SpAQ/3D2gu68zngowYI7b +nV2UqL1g52KAdoGDDIzMMEZJ4gzSqK/rYXHv5yJiqfdcZGyfFoxnNidF9Ql7v/YQ +CvGwjVRDjAS6oz/v4jXH+XTgbzRB0L9zZVcg+ZtnemZoJE6AZb0QmQZZ8mWvuMZH +u/2QeItBcy6vVR/cO5JyboTT0GFMDcx2V+IthSIVNg3rAZ3r2OvEhJn7wAzMMujj +d9qDRIueVSjAi1jTkD5OGwDxFa2DK5o= +-----END CERTIFICATE----- + +# UCA Extended Validation Root +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF +eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx +MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV +BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog +D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS +sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop +O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk +sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi +c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj +VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz +KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ +TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G +sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs +1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD +fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T +AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN +l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR +ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ +VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 +c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp +4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s +t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj +2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO +vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C +xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx +cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM +fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1ax +-----END CERTIFICATE----- + +# UCA Global G2 Root +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0A== +-----END CERTIFICATE----- + +# USERTrust ECC Certification Authority +-----BEGIN CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= +-----END CERTIFICATE----- + +# USERTrust RSA Certification Authority +-----BEGIN CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9 +-----END CERTIFICATE----- + +# XRamp Global CA Root +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbw= +-----END CERTIFICATE----- + +# certSIGN ROOT CA +-----BEGIN CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KD +-----END CERTIFICATE----- + +# certSIGN Root CA G2 +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIJEQA0tk7GNi02MA0GCSqGSIb3DQEBCwUAMEExCzAJBgNV +BAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJR04g +Uk9PVCBDQSBHMjAeFw0xNzAyMDYwOTI3MzVaFw00MjAyMDYwOTI3MzVaMEExCzAJ +BgNVBAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJ +R04gUk9PVCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDF +dRmRfUR0dIf+DjuW3NgBFszuY5HnC2/OOwppGnzC46+CjobXXo9X69MhWf05N0Iw +vlDqtg+piNguLWkh59E3GE59kdUWX2tbAMI5Qw02hVK5U2UPHULlj88F0+7cDBrZ +uIt4ImfkabBoxTzkbFpG583H+u/E7Eu9aqSs/cwoUe+StCmrqzWaTOTECMYmzPhp +n+Sc8CnTXPnGFiWeI8MgwT0PPzhAsP6CRDiqWhqKa2NYOLQV07YRaXseVO6MGiKs +cpc/I1mbySKEwQdPzH/iV8oScLumZfNpdWO9lfsbl83kqK/20U6o2YpxJM02PbyW +xPFsqa7lzw1uKA2wDrXKUXt4FMMgL3/7FFXhEZn91QqhngLjYl/rNUssuHLoPj1P +rCy7Lobio3aP5ZMqz6WryFyNSwb/EkaseMsUBzXgqd+L6a8VTxaJW732jcZZroiF +DsGJ6x9nxUWO/203Nit4ZoORUSs9/1F3dmKh7Gc+PoGD4FapUB8fepmrY7+EF3fx +DTvf95xhszWYijqy7DwaNz9+j5LP2RIUZNoQAhVB/0/E6xyjyfqZ90bp4RjZsbgy +LcsUDFDYg2WD7rlcz8sFWkz6GZdr1l0T08JcVLwyc6B49fFtHsufpaafItzRUZ6C +eWRgKRM+o/1Pcmqr4tTluCRVLERLiohEnMqE0yo7AgMBAAGjQjBAMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSCIS1mxteg4BXrzkwJ +d8RgnlRuAzANBgkqhkiG9w0BAQsFAAOCAgEAYN4auOfyYILVAzOBywaK8SJJ6ejq +kX/GM15oGQOGO0MBzwdw5AgeZYWR5hEit/UCI46uuR59H35s5r0l1ZUa8gWmr4UC +b6741jH/JclKyMeKqdmfS0mbEVeZkkMR3rYzpMzXjWR91M08KCy0mpbqTfXERMQl +qiCA2ClV9+BB/AYm/7k29UMUA2Z44RGx2iBfRgB4ACGlHgAoYXhvqAEBj500mv/0 +OJD7uNGzcgbJceaBxXntC6Z58hMLnPddDnskk7RI24Zf3lCGeOdA5jGokHZwYa+c +NywRtYK3qq4kNFtyDGkNzVmf9nGvnAvRCjj5BiKDUyUM/FHE5r7iOZULJK2v0ZXk +ltd0ZGtxTgI8qoXzIKNDOXZbbFD+mpwUHmUUihW9o4JFWklWatKcsWMy5WHgUyIO +pwpJ6st+H6jiYoD2EEVSmAYY3qXNL3+q1Ok+CHLsIwMCPKaq2LxndD0UF/tUSxfj +03k9bWtJySgOLnRQvwzZRjoQhsmnP+mg7H/rpXdYaXHmgwo38oZJar55CJD2AhZk +PuXaTH4MNMn5X7azKFGnpyuqSfqNZSlO42sTp5SjLVFteAxEy9/eCG/Oo2Sr05WE +1LlSVHJ7liXMvGnjSG4N0MedJ5qq+BOS3R7fY581qRY27Iy4g/Q9iY/NtBde17MX +QRBdJ3NghVdJIgc= +-----END CERTIFICATE----- + +# e-Szigno Root CA 2017 +-----BEGIN CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMQ== +-----END CERTIFICATE----- + +# ePKI Root Certification Authority +-----BEGIN CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZw= +-----END CERTIFICATE----- + +# emSign ECC Root CA - C3 +-----BEGIN CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== +-----END CERTIFICATE----- + +# emSign ECC Root CA - G3 +-----BEGIN CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyj +-----END CERTIFICATE----- + +# emSign Root CA - C1 +-----BEGIN CERTIFICATE----- +MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG +A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg +SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v +dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ +BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ +HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH +3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH +GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c +xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 +aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq +TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 +/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 +kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG +YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT ++xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo +WXzhriKi4gp6D/piq1JM4fHfyr6DDUI= +-----END CERTIFICATE----- + +# emSign Root CA - G1 +-----BEGIN CERTIFICATE----- +MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD +VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU +ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH +MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO +MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv +Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz +f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO +8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq +d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM +tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt +Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB +o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x +PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM +wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d +GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH +6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby +RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx +iN66zB+Afko= +-----END CERTIFICATE----- + +# vTrus ECC Root CA +-----BEGIN CERTIFICATE----- +MIICDzCCAZWgAwIBAgIUbmq8WapTvpg5Z6LSa6Q75m0c1towCgYIKoZIzj0EAwMw +RzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4xGjAY +BgNVBAMTEXZUcnVzIEVDQyBSb290IENBMB4XDTE4MDczMTA3MjY0NFoXDTQzMDcz +MTA3MjY0NFowRzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28u +LEx0ZC4xGjAYBgNVBAMTEXZUcnVzIEVDQyBSb290IENBMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEZVBKrox5lkqqHAjDo6LN/llWQXf9JpRCux3NCNtzslt188+cToL0 +v/hhJoVs1oVbcnDS/dtitN9Ti72xRFhiQgnH+n9bEOf+QP3A2MMrMudwpremIFUd +e4BdS49nTPEQo0IwQDAdBgNVHQ4EFgQUmDnNvtiyjPeyq+GtJK97fKHbH88wDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwCgYIKoZIzj0EAwMDaAAwZQIw +V53dVvHH4+m4SVBrm2nDb+zDfSXkV5UTQJtS0zvzQBm8JsctBp61ezaf9SXUY2sA +AjEA6dPGnlaaKsyh2j/IZivTWJwghfqrkYpwcBE4YGQLYgmRWAD5Tfs0aNoJrSEG +GJTO +-----END CERTIFICATE----- + +# vTrus Root CA +-----BEGIN CERTIFICATE----- +MIIFVjCCAz6gAwIBAgIUQ+NxE9izWRRdt86M/TX9b7wFjUUwDQYJKoZIhvcNAQEL +BQAwQzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4x +FjAUBgNVBAMTDXZUcnVzIFJvb3QgQ0EwHhcNMTgwNzMxMDcyNDA1WhcNNDMwNzMx +MDcyNDA1WjBDMQswCQYDVQQGEwJDTjEcMBoGA1UEChMTaVRydXNDaGluYSBDby4s +THRkLjEWMBQGA1UEAxMNdlRydXMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAL1VfGHTuB0EYgWgrmy3cLRB6ksDXhA/kFocizuwZotsSKYc +IrrVQJLuM7IjWcmOvFjai57QGfIvWcaMY1q6n6MLsLOaXLoRuBLpDLvPbmyAhykU +AyyNJJrIZIO1aqwTLDPxn9wsYTwaP3BVm60AUn/PBLn+NvqcwBauYv6WTEN+VRS+ +GrPSbcKvdmaVayqwlHeFXgQPYh1jdfdr58tbmnDsPmcF8P4HCIDPKNsFxhQnL4Z9 +8Cfe/+Z+M0jnCx5Y0ScrUw5XSmXX+6KAYPxMvDVTAWqXcoKv8R1w6Jz1717CbMdH +flqUhSZNO7rrTOiwCcJlwp2dCZtOtZcFrPUGoPc2BX70kLJrxLT5ZOrpGgrIDajt +J8nU57O5q4IikCc9Kuh8kO+8T/3iCiSn3mUkpF3qwHYw03dQ+A0Em5Q2AXPKBlim +0zvc+gRGE1WKyURHuFE5Gi7oNOJ5y1lKCn+8pu8fA2dqWSslYpPZUxlmPCdiKYZN +pGvu/9ROutW04o5IWgAZCfEF2c6Rsffr6TlP9m8EQ5pV9T4FFL2/s1m02I4zhKOQ +UqqzApVg+QxMaPnu1RcN+HFXtSXkKe5lXa/R7jwXC1pDxaWG6iSe4gUH3DRCEpHW +OXSuTEGC2/KmSNGzm/MzqvOmwMVO9fSddmPmAsYiS8GVP1BkLFTltvA8Kc9XAgMB +AAGjQjBAMB0GA1UdDgQWBBRUYnBj8XWEQ1iO0RYgscasGrz2iTAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAKbqSSaet +8PFww+SX8J+pJdVrnjT+5hpk9jprUrIQeBqfTNqK2uwcN1LgQkv7bHbKJAs5EhWd +nxEt/Hlk3ODg9d3gV8mlsnZwUKT+twpw1aA08XXXTUm6EdGz2OyC/+sOxL9kLX1j +bhd47F18iMjrjld22VkE+rxSH0Ws8HqA7Oxvdq6R2xCOBNyS36D25q5J08FsEhvM +Kar5CKXiNxTKsbhm7xqC5PD48acWabfbqWE8n/Uxy+QARsIvdLGx14HuqCaVvIiv +TDUHKgLKeBRtRytAVunLKmChZwOgzoy8sHJnxDHO2zTlJQNgJXtxmOTAGytfdELS +S8VZCAeHvsXDf+eW2eHcKJfWjwXj9ZtOyh1QRwVTsMo554WgicEFOwE30z9J4nfr +I8iIZjs9OXYhRvHsXyO466JmdXTBQPfYaJqT4i2pLr0cox7IdMakLXogqzu4sEb9 +b91fUlV1YvCXoHzXOP0l382gmxDPi7g4Xl7FtKYCNqEeXxzP4padKar9mK5S4fNB +UvupLnKWnyfjqnN9+BojZns7q2WwMgFLFT49ok8MKzWixtlnEjUwzXYuFrOZnk1P +Ti07NEPhmg4NpGaXutIcSkwsKouLgU9xGqndXHt7CMUADTdA43x7VF8vhV929ven +sBxXVsFy6K2ir40zSbofitzmdHxghm+Hl3s= +-----END CERTIFICATE----- diff --git a/pki/ca-trust/source/README b/pki/ca-trust/source/README new file mode 100644 index 0000000..fe42b44 --- /dev/null +++ b/pki/ca-trust/source/README @@ -0,0 +1,20 @@ +This directory /etc/pki/ca-trust/source/ contains CA certificates and +trust settings in the PEM file format. The trust settings found here will be +interpreted with a high priority - higher than the ones found in +/usr/share/pki/ca-trust-source/. + +============================================================================= +QUICK HELP: To add a certificate in the simple PEM or DER file formats to the + list of CAs trusted on the system: + + Copy it to the + /etc/pki/ca-trust/source/anchors/ + subdirectory, and run the + update-ca-trust + command. + + If your certificate is in the extended BEGIN TRUSTED file format, + then place it into the main source/ directory instead. +============================================================================= + +Please refer to the update-ca-trust(8) manual page for additional information. diff --git a/pki/ca-trust/source/ca-bundle.legacy.crt b/pki/ca-trust/source/ca-bundle.legacy.crt new file mode 120000 index 0000000..672bd72 --- /dev/null +++ b/pki/ca-trust/source/ca-bundle.legacy.crt @@ -0,0 +1 @@ +/usr/share/pki/ca-trust-legacy/ca-bundle.legacy.default.crt \ No newline at end of file diff --git a/pki/java/cacerts b/pki/java/cacerts new file mode 120000 index 0000000..717be00 --- /dev/null +++ b/pki/java/cacerts @@ -0,0 +1 @@ +/etc/pki/ca-trust/extracted/java/cacerts \ No newline at end of file diff --git a/pki/mock/README.txt b/pki/mock/README.txt new file mode 100644 index 0000000..2914220 --- /dev/null +++ b/pki/mock/README.txt @@ -0,0 +1,7 @@ +Any file named + RPM-GPG-KEY-* +is copied into chroot to directory /etc/pki/mock/. + +You can use it for your personal GPG keys. + +All distribution GPG keys are in package distribution-gpg-keys. diff --git a/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL b/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL new file mode 100644 index 0000000..0f3d620 --- /dev/null +++ b/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL @@ -0,0 +1,41 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- + +mQGNBGWBr8EBDAC+atC3Hl2yKkFg0F4tDg4ABCTvvhgMn7g7oZ0vJqpaUAwUgijU ++jLXH8qVSkyhk2eruSXlbj4dIMHhsbRQ1wUnd+tb8pZPdRaBFR9MzFMjvDzobAlZ +RH6cUbgm2EdAHrrZFVQJuIb6SRzQzkk4QEWTkWP6CHzvxnlVpkI7T1yjsJnmLefN +TT/J+r0gxC1DRXOKwSMmWUCzYcRXiv/RZcp+IwM04e5BXOj6xoLIpAwhSGZ0LR6b +dwliBpMSFuVyXFIu+7AS2M8tEO1cGK+ywDhg7TriMc/rgjZjeu11WusXFwbvEUeM +FIYM9oXQlAlWDIob85YcGtNXV4EVGovQ2nFd4Ivl9OYq+HixAhWBLulkEAUREKq8 +uXV8HDjxOfYa8VhczphvkCLr5UEMzXmC2eDc6nCH2hveAqSVLnFNkhtExvVOPRBB +gRsviaGWvdOA3eNeEofHX9YWtSzM43tWABKUzI/oTMcdFJlkJ465bvh4p7KyHDth +5I46iBUZmfP4RckAEQEAAbQ+UG9zdGdyZVNRTCBSUE0gUmVwb3NpdG9yeSA8cGdz +cWwtcGtnLXl1bUBsaXN0cy5wb3N0Z3Jlc3FsLm9yZz6JAdIEEwEIADwWIQTUvwiu +Z6C0x6HbzNJAvKK0CLQNIAUCZYGvwQIbAwULCQgHAgMiAgEGFQoJCAsCBBYCAwEC +HgcCF4AACgkQQLyitAi0DSBwkwwAvE1vGNMiP8Qvqvpk5otuJOvz5meELUwmhT60 +IOWNr9RMroKfb27mnc5RHlOmMk/0SPyboFX9qtOdwFUq3cYbjsP+bqI9vuQuQ4Gz +siLIvSZPtQrdtUP8wdndndeKNpDIvRdYwvaPfIrBxxCSslB8iuCtjbyCl2rzlika +sCOWi7oTwuNB4eKHCRt9oh7NHFas92bF2JiaR7hvmXlCU058/lnR+jXCp/NWiGfE +QV37xAu/ssRH5MykGweEzQ3mX2EKppdKmmoOaJsTfS7UNujeZQqo1uqZg9yRHgwf +PaquIwgdXBY6JkMUM4Zhn7QkP5ssD6g+GzWe2UAMN+K8Xe3QwEMfp9AF7sEEM/Zp ++p5m7D1GlOho/m9juxcRa5r7VfvCFL05uyXdDoefOCFal/pDmwvZofK+pqtDZfKt ++AnF/Y6Z3ewvJ0ZRNBX/0Iw30uJusDIgkXaHwxEeDOnlKi8jVyBCMr1In2QKrb1+ +N9PR5P5ZKKq40WNvbiPfoUeKwKKSuQGNBGWBr8EBDAD1nXgbf+Qki5Z0H2k0xLbI +GYhxnousjVlrWcxOTYqVilSvBig7RKuVFGt0D3yuBWrAS7+MCUvpuCshHcc+w97G +iWmRskIHqZoD26kkU8PhgYayyArqepZp50ALIdOhedOp9b/NUkSPEL4BJow9H8Lp +a28WEXpHZcam43RDMzLMUvJBWem474APx5674EZYX+994lT2cNSAFrnJK956lKmc +ZdzzKuMTcIVGyRF6+KXCmScLAyQks8lHuTJb+AA4eseZnbOsnwnA1xuVfYIfMF/F +bLlR7vl5Autmgnz1SdCaUqIp4MO54GZOgh4MjVadsxIWj8H0cN3uTfukuW4A0+dP +d0YrOKb52Mnejh7x39qWIsMtT8DgcufGcVsuVhC/5LCiHB3pB73J9SMxBafcyGyK +XfLFL5FoDkKTU5KkBfqMQ4k//27mLbJ4kWxHHtNsvnn/6a5m7rRYxFD4dxBWn1CU +BpMjf3m9B3xLc7lKlQZiLLNC7p15gHS51yMvCGxCaHcAEQEAAYkBtgQYAQgAIBYh +BNS/CK5noLTHodvM0kC8orQItA0gBQJlga/BAhsMAAoJEEC8orQItA0guy0L/1ze +AHxV8pxPawOIlgDWoALLb/tqvmG+yz8SN5IWDfvMkMW5kbVoY8zi9SnJtOHVULBC +sdiYN4Dn/Ox1eLlW50F4Z76RI2r/O9rBlHzUk/jAQOcDDCRWjj4a+pYX9I4atU6e ++qOOzxMBsFD0vK84NYJ6caC0LHR64xWnyvXStkDEPSzgHhAlhdn9oTqbIoXuDhSx +zBVSXyowi+cBL8tNsAH4Zlj0li1Gii6bM4DFseQGhKIiTFbx1HD47DT6Pu0X2PSA +pIuZ47n8rP2uTLCYjtnfpXbMwmVOXWxIojhUqIceF+KRr4vRsspSbMxMKg0yeGka +RfQX29x8baM4mdKVBmU9KQxRgno6lcks14STnawqf6o9nHxKp80VQrcNTsYHlq2B +PGAanK8G4WeYojQWCQHBi73qCoTERMpBG73gpTIr836TBinGZaSZ8I1deUS89Hnw +A62QO1TS57zxMTrstzaawLoCIHTqyJ2VeZrVC1INV4ENnyVsud3NaZtfWuIk7Q== +=Elfg +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 b/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 new file mode 100644 index 0000000..234c12f --- /dev/null +++ b/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 @@ -0,0 +1,29 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- + +mQINBGE3mOsBEACsU+XwJWDJVkItBaugXhXIIkb9oe+7aadELuVo0kBmc3HXt/Yp +CJW9hHEiGZ6z2jwgPqyJjZhCvcAWvgzKcvqE+9i0NItV1rzfxrBe2BtUtZmVcuE6 +2b+SPfxQ2Hr8llaawRjt8BCFX/ZzM4/1Qk+EzlfTcEcpkMf6wdO7kD6ulBk/tbsW +DHX2lNcxszTf+XP9HXHWJlA2xBfP+Dk4gl4DnO2Y1xR0OSywE/QtvEbN5cY94ieu +n7CBy29AleMhmbnx9pw3NyxcFIAsEZHJoU4ZW9ulAJ/ogttSyAWeacW7eJGW31/Z +39cS+I4KXJgeGRI20RmpqfH0tuT+X5Da59YpjYxkbhSK3HYBVnNPhoJFUc2j5iKy +XLgkapu1xRnEJhw05kr4LCbud0NTvfecqSqa+59kuVc+zWmfTnGTYc0PXZ6Oa3rK +44UOmE6eAT5zd/ToleDO0VesN+EO7CXfRsm7HWGpABF5wNK3vIEF2uRr2VJMvgqS +9eNwhJyOzoca4xFSwCkc6dACGGkV+CqhufdFBhmcAsUotSxe3zmrBjqA0B/nxIvH +DVgOAMnVCe+Lmv8T0mFgqZSJdIUdKjnOLu/GRFhjDKIak4jeMBMTYpVnU+HhMHLq +uDiZkNEvEEGhBQmZuI8J55F/a6UURnxUwT3piyi3Pmr2IFD7ahBxPzOBCQARAQAB +tCdGZWRvcmEgKGVwZWw5KSA8ZXBlbEBmZWRvcmFwcm9qZWN0Lm9yZz6JAk4EEwEI +ADgWIQT/itE0RZcQbs6BO5GKOHK/MihGfAUCYTeY6wIbDwULCQgHAgYVCgkICwIE +FgIDAQIeAQIXgAAKCRCKOHK/MihGfFX/EACBPWv20+ttYu1A5WvtHJPzwbj0U4yF +3zTQpBglQ2UfkRpYdipTlT3Ih6j5h2VmgRPtINCc/ZE28adrWpBoeFIS2YAKOCLC +nZYtHl2nCoLq1U7FSttUGsZ/t8uGCBgnugTfnIYcmlP1jKKA6RJAclK89evDQX5n +R9ZD+Cq3CBMlttvSTCht0qQVlwycedH8iWyYgP/mF0W35BIn7NuuZwWhgR00n/VG +4nbKPOzTWbsP45awcmivdrS74P6mL84WfkghipdmcoyVb1B8ZP4Y/Ke0RXOnLhNe +CfrXXvuW+Pvg2RTfwRDtehGQPAgXbmLmz2ZkV69RGIr54HJv84NDbqZovRTMr7gL +9k3ciCzXCiYQgM8yAyGHV0KEhFSQ1HV7gMnt9UmxbxBE2pGU7vu3CwjYga5DpwU7 +w5wu1TmM5KgZtZvuWOTDnqDLf0cKoIbW8FeeCOn24elcj32bnQDuF9DPey1mqcvT +/yEo/Ushyz6CVYxN8DGgcy2M9JOsnmjDx02h6qgWGWDuKgb9jZrvRedpAQCeemEd +fhEs6ihqVxRFl16HxC4EVijybhAL76SsM2nbtIqW1apBQJQpXWtQwwdvgTVpdEtE +r4ArVJYX5LrswnWEQMOelugUG6S3ZjMfcyOa/O0364iY73vyVgaYK+2XtT2usMux +VL469Kj5m13T6w== +=Mjs/ +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 b/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 new file mode 100644 index 0000000..6fb617c --- /dev/null +++ b/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 @@ -0,0 +1,31 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: resf.keykeeper.v1 +Comment: Keykeeper + +xsFNBGJ5RksBEADF/Lzssm7uryV6+VHAgL36klyCVcHwvx9Bk853LBOuHVEZWsme +kbJF3fQG7i7gfCKGuV5XW15xINToe4fBThZteGJziboSZRpkEQ2z3lYcbg34X7+d +co833lkBNgz1v6QO7PmAdY/x76Q6Hx0J9yiJWd+4j+vRi4hbWuh64vUtTd7rPwk8 +0y3g4oK1YT0NR0Xm/QUO9vWmkSTVflQ6y82HhHIUrG+1vQnSOrWaC0O1lqUI3Nuo +b6jTARCmbaPsi+XVQnBbsnPPq6Tblwc+NYJSqj5d9nT0uEXT7Zovj4Je5oWVFXp9 +P1OWkbo2z5XkKjoeobM/zKDESJR78h+YQAN9IOKFjL/u/Gzrk1oEgByCABXOX+H5 +hfucrq5U3bbcKy4e5tYgnnZxqpELv3fN/2l8iZknHEh5aYNT5WXVHpD/8u2rMmwm +I9YTEMueEtmVy0ZV3opUzOlC+3ZUwjmvAJtdfJyeVW/VMy3Hw3Ih0Fij91rO613V +7n72ggVlJiX25jYyT4AXlaGfAOMndJNVgBps0RArOBYsJRPnvfHlLi5cfjVd7vYx +QhGX9ODYuvyJ/rW70dMVikeSjlBDKS08tvdqOgtiYy4yhtY4ijQC9BmCE9H9gOxU +FN297iLimAxr0EVsED96fP96TbDGILWsfJuxAvoqmpkElv8J+P1/F7to2QARAQAB +zU9Sb2NreSBFbnRlcnByaXNlIFNvZnR3YXJlIEZvdW5kYXRpb24gLSBSZWxlYXNl +IGtleSAyMDIyIDxyZWxlbmdAcm9ja3lsaW51eC5vcmc+wsGKBBMBCAA0BQJieUZL +FiEEIcslauFvxUxuZSlJcC1CbTUNJ10CGwMCHgECGQEDCwkHAhUIAxYAAgIiAQAK +CRBwLUJtNQ0nXWQ5D/9472seOyRO6//bQ2ns3w9lE+aTLlJ5CY0GSTb4xNuyv+AD +IXpgvLSMtTR0fp9GV3vMw6QIWsehDqt7O5xKWi+3tYdaXRpb1cvnh8r/oCcvI4uL +k8kImNgsx+Cj+drKeQo03vFxBTDi1BTQFkfEt32fA2Aw5gYcGElM717sNMAMQFEH +P+OW5hYDH4kcLbtUypPXFbcXUbaf6jUjfiEp5lLjqquzAyDPLlkzMr5RVa9n3/rI +R6OQp5loPVzCRZMgDLALBU2TcFXLVP+6hAW8qM77c+q/rOysP+Yd+N7GAd0fvEvA +mfeA4Y6dP0mMRu96EEAJ1qSKFWUul6K6nuqy+JTxktpw8F/IBAz44na17Tf02MJH +GCUWyM0n5vuO5kK+Ykkkwd+v43ZlqDnwG7akDkLwgj6O0QNx2TGkdgt3+C6aHN5S +MiF0pi0qYbiN9LO0e05Ai2r3zTFC/pCaBWlG1ph2jx1pDy4yUVPfswWFNfe5I+4i +CMHPRFsZNYxQnIA2Prtgt2YMwz3VIGI6DT/Z56Joqw4eOfaJTTQSXCANts/gD7qW +D3SZXPc7wQD63TpDEjJdqhmepaTECbxN7x/p+GwIZYWJN+AYhvrfGXfjud3eDu8/ +i+YIbPKH1TAOMwiyxC106mIL705p+ORf5zATZMyB8Y0OvRIz5aKkBDFZM2QN6A== +=PzIf +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9-Testing b/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9-Testing new file mode 100644 index 0000000..d8475de --- /dev/null +++ b/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9-Testing @@ -0,0 +1,52 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- + +xsFNBGJnjEMBEADX1mxmmZXhjeayhSmCYFJ17WbuuJd79Jqxk5EXzW3toS3fK9p/ +ta3SH/2Tt6Upb/OUCCsA5RDUXjYfcfSX17Bed6swxLR4BZNTwGVc6uWOQxCPjq6/ +Rv552BxJsBc4D0DpbDtrGmKKIJqfie7f8V8WM9h+smnl1ntzTy98vefjnfnURnjZ +f20pti8HBm20uk4lg0m55xVp5iIWRF89KhdhbhWl76M2gQYBg/Vp1pNXC61GnhWI +NDu6qK145ViVxZMmU7M4Y4oA0yvmIoW+4mwHqsdN9tAPJ5YI/pzaUhAfkCP1CNjg +D6oF7Qc1O8Lls3ZasK0nJQJrzfHzFMxCRWsP8/l7slAztXc37qiW4Jmz8v83b3S9 +9+ot6goW3EADTWcCkUyHK4L9Ect3cExM5jMYroMI9X91ehPCqoYUDX+25DY/PozZ +V+dmssEjoAjMjaHPYI0sBUxVd+gmzJWdbdAeYuCMZjQj5x3jP2oNqgBg0VT6NXq4 +Mv9vOLNR58KYPJwO/38tLYBvDls7oe4Ym41hOp1gOfiMoP/ARLZ8Bpv5eYyeBHtj +eBrklUKAa75a6elNUtwOIEEo94oeBeSWYIAIivC71nVmzLN1VqAZt1zgq/oj9N8k +Pkt4ThuOpkgWqczMCXgxdVrOmViKSvVPZ8mSE2dVccan7M1xyB/+K9zU6QARAQAB +zThSb2NreSBMaW51eCA5IC0gQmV0YSBLZXkgVjEvMjAyMiA8cmVsZW5nQHJvY2t5 +bGludXgub3JnPsLBigQTAQgAPgUCYmeMQwmQraKGCJWuPZEWoQQGdb0Z9P/jrQst +b+utooYIla49kQIbAwIeAQIZAQMLCQcCFQgDFgACAiIBAABM8g/8C1V/4Q3xgAAr +W1bMDO9+agIpmmUHYCG8WB5t4sQWP4K2T1dP8+8MyEV+YpMa3l/E6voV3bVva4tV +bw7cWT8kIJQJwxqfHhGrZdaG01BubGQeo0XQGafmgLZAjJitvMrRBP/FyHFR97Um +YkiWT1Zup74HKIP43Uu7d2GsjGjZkSZSoKZjS8+95VWgW8ppNH3SF5dPA+RxmRsn +x8+4gMWQ+SAfKyS5zcXOcLo+fyS1vbGjTfb7dhRyKGw3il+0nnD0ZrtFpGT/oeeA +WAYNl7NNkdaTfIhEeQjxAOeUtgnKiTt4MNBoeo6vZ53ouQfc3ciqFsh5zVZaqKKi +usVnKkvcjRbHctU1yG1IbynA8XiYQVXHz3wTakkd+DXagA924Zoyp5G8eP2Nag8R +XjX2gpuG4qDazr2IoHeHO4QyJy20rOeVdRKeLjzd4a8iCA4FdaaaAokFoSpugLSL +a8V7GyLBGcGCiLc8Rz7DsYVvNXeW/AXPjJWgHU6fvdoo/KLF1A8fS/NZZtJqpuKE +RF32WDykHMbpAKJyKZXRxIcLHfOqRYmqWB2KguCJ50PsG7UmQutGklE7eiqscHA1 +emqv/UHNyo1v/Tzu5WrLUnx4949tbcjaR/+Ip71MbGC/ESOaebL8SHPjMe4t5HI7 +3MPjevME0+T05RixaTgKdVhBIgmUZ/POwU0EYmeMQwEQAM27Lxq9mxiliGFzh19a +AWO1AFBjtVGGSUy4s0djcLBZd1m8zO+QVUFx74PigLkk4GwpBqZEMWAcsKCDtagT +TbnjYqWUDX5birWKaqfj7qP9sjvCgieEwHpXEkKHaM+G7mT7vpCXV+AKkjsWJdQ1 +SwzuJ47tJ0vpirlchL9o7YuHMqmddyT6KIPmaxj/RArbGX/rzNqGvMZxHaPOsCCW +12RU8E3sHVdzRdNpU1/i3mDVLd/eZBuqeTAT0c+MzyfJxdZS9JmUNk48ASMUcETG +kVBxc+XVpSVAmUFXvEisUi79+wS+GDwinSoeOF4OX/9YwwX2VDo7A8MVIcGyxmMJ +M8+KaOclBMBTUt6hu2tjzfYKDcaZX82n1t+2Xy+AMrtDOnm90mv4whS3IgFqy2HY +jjPp4qpSAdV7KT98arSgtzskLfC3wS40mZ3bsy1NNWNNEljpq4h8DKQdEfh1LsxV +m7rR+dWbdNEKUxk60yQZ3qCImo3a1S+N51kywFAcM8pNq/bIZrM5BR9bWkoVmQCg +Dexvj0xToaA+vJa4tylm+wCIALebWp1FQLZWTuwXbYbS1wlBZi7hg7ZeK7ZCzBEm +1tk3MKnE6t+EUW9a1NIy4/OTN9VQsd00a38NuTJjedvsOjzqBk/JD98gs4pmuU7S +HiV7kWgeWtG75Lycl/CWArcTABEBAAHCwXYEGAEIACoFAmJnjEMJkK2ihgiVrj2R +FqEEBnW9GfT/460LLW/rraKGCJWuPZECGwwAAA49D/4nQaaaKub/gp/Iu620Aubq +GcTB6yPkvR0Hz2pRVRC9Zv/yCefbHCHsTO+E6sI9DfmlQp3x+zohBBqZIJLmhr1o +zzBwwSOTPdFqFHpOnQyHPWkuwG16IpCmCaaANupSSdcB3tPBSaD9PHo1cDWG4pEG +EZYYdlMUnIHHe3Nu9DwDmV+LC5UICi/5NTCfn1UwC8Y1YTZX9f9un23Q2rVwwyjX +bLziokg8zv3nnydcNS+rYwPWkCDbw7muGXDHsK2YNNu/lqeAHfGmHvIIV6g2aq1A +x6JzvzWuEVHVLD9u1Q5sO2gTifz/Y6mLd8PuwdS8JOROeF9vq6BnEa2QSuedsz63 +JAl0o20GAIjONl4O+0Un3cw1cJSbN/+iZCgcezMLE7g7q2ZSnMddP+FxA+qy6b63 +BOOTbuY4EwdPk1eKfmZevoPpw6765zEYzrA1I090Mc+JnBALGgKj9gJujqEtSiqb +riItjjBJcLPthUeh80BZyDBms72+DtjIDpHrTvIhFhEDdzspdxF5nAtc8b8aIqaq +0VGuQGuEVkOjWQTwVen9djuNEZS5NbgUWFhuXpkQSMPUDzhQ/XCSSDPwvFGniW4C +5T1HrCc+eQ4ig+VzXWYJDlTHBmmfzIp+AAjugP9kZ4QXAEa66lF6uwccayQFtBO3 +5fv/TZLO1kBYmYnl2rwA3A== +=/Z/i +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta b/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta new file mode 100644 index 0000000..1efd150 --- /dev/null +++ b/pki/rpm-gpg/RPM-GPG-KEY-redhat-beta @@ -0,0 +1,29 @@ +-----BEGIN PGP PUBLIC KEY BLOCK----- +Version: GnuPG v1.2.6 (GNU/Linux) + +mQINBEmkAzABEAC2/c7bP1lHQ3XScxbIk0LQWe1YOiibQBRLwf8Si5PktgtuPibT +kKpZjw8p4D+fM7jD1WUzUE0X7tXg2l/eUlMM4dw6XJAQ1AmEOtlwSg7rrMtTvM0A +BEtI7Km6fC6sU6RtBMdcqD1cH/6dbsfh8muznVA7UlX+PRBHVzdWzj6y8h84dBjo +gzcbYu9Hezqgj/lLzicqsSZPz9UdXiRTRAIhp8V30BD8uRaaa0KDDnD6IzJv3D9P +xQWbFM4Z12GN9LyeZqmD7bpKzZmXG/3drvfXVisXaXp3M07t3NlBa3Dt8NFIKZ0D +FRXBz5bvzxRVmdH6DtkDWXDPOt+Wdm1rZrCOrySFpBZQRpHw12eo1M1lirANIov7 +Z+V1Qh/aBxj5EUu32u9ZpjAPPNtQF6F/KjaoHHHmEQAuj4DLex4LY646Hv1rcv2i +QFuCdvLKQGSiFBrfZH0j/IX3/0JXQlZzb3MuMFPxLXGAoAV9UP/Sw/WTmAuTzFVm +G13UYFeMwrToOiqcX2VcK0aC1FCcTP2z4JW3PsWvU8rUDRUYfoXovc7eg4Vn5wHt +0NBYsNhYiAAf320AUIHzQZYi38JgVwuJfFu43tJZE4Vig++RQq6tsEx9Ftz3EwRR +fJ9z9mEvEiieZm+vbOvMvIuimFVPSCmLH+bI649K8eZlVRWsx3EXCVb0nQARAQAB +tDBSZWQgSGF0LCBJbmMuIChiZXRhIGtleSAyKSA8c2VjdXJpdHlAcmVkaGF0LmNv +bT6JAjYEEwECACAFAkpSM+cCGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAKCRCT +ioDK8hVB6/9tEAC0+KmzeKceXQ/GTUoU6jy9vtkFCFrmv+c7ol4XpdTt0QhqBOwy +6m2mKWwmm8KfYfy0cADQ4y/EcoXl7FtFBwYmkCuEQGXhTDn9DvVjhooIq59LEMBQ +OW879RwwzRIZ8ebbjMUjDPF5MfPQqP2LBu9N4KvXlZp4voykwuuaJ+cbsKZR6pZ6 +0RQKPHKP+NgUFC0fff7XY9cuOZZWFAeKRhLN2K7bnRHKxp+kELWb6R9ZfrYwZjWc +MIPbTd1khE53L4NTfpWfAnJRtkPSDOKEGVlVLtLq4HEAxQt07kbslqISRWyXER3u +QOJj64D1ZiIMz6t6uZ424VE4ry9rBR0Jz55cMMx5O/ni9x3xzFUgH8Su2yM0r3jE +Rf24+tbOaPf7tebyx4OKe+JW95hNVstWUDyGbs6K9qGfI/pICuO1nMMFTo6GqzQ6 +DwLZvJ9QdXo7ujEtySZnfu42aycaQ9ZLC2DOCQCUBY350Hx6FLW3O546TAvpTfk0 +B6x+DV7mJQH7MGmRXQsE7TLBJKjq28Cn4tVp04PmybQyTxZdGA/8zY6pPl6xyVMH +V68hSBKEVT/rlouOHuxfdmZva1DhVvUC6Xj7+iTMTVJUAq/4Uyn31P1OJmA2a0PT +CAqWkbJSgKFccsjPoTbLyxhuMSNkEZFHvlZrSK9vnPzmfiRH0Orx3wYpMQ== +=21pb +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/rpm-gpg/RPM-GPG-KEY-redhat-release b/pki/rpm-gpg/RPM-GPG-KEY-redhat-release new file mode 100644 index 0000000..afd9e05 --- /dev/null +++ b/pki/rpm-gpg/RPM-GPG-KEY-redhat-release @@ -0,0 +1,66 @@ +The following public key can be used to verify RPM packages built and +signed by Red Hat, Inc. This key is used for packages in Red Hat +products shipped after November 2009, and for all updates to those +products. + +Questions about this key should be sent to security@redhat.com. + +pub 4096R/FD431D51 2009-10-22 Red Hat, Inc. (release key 2) + +-----BEGIN PGP PUBLIC KEY BLOCK----- + +mQINBErgSTsBEACh2A4b0O9t+vzC9VrVtL1AKvUWi9OPCjkvR7Xd8DtJxeeMZ5eF +0HtzIG58qDRybwUe89FZprB1ffuUKzdE+HcL3FbNWSSOXVjZIersdXyH3NvnLLLF +0DNRB2ix3bXG9Rh/RXpFsNxDp2CEMdUvbYCzE79K1EnUTVh1L0Of023FtPSZXX0c +u7Pb5DI5lX5YeoXO6RoodrIGYJsVBQWnrWw4xNTconUfNPk0EGZtEnzvH2zyPoJh +XGF+Ncu9XwbalnYde10OCvSWAZ5zTCpoLMTvQjWpbCdWXJzCm6G+/hx9upke546H +5IjtYm4dTIVTnc3wvDiODgBKRzOl9rEOCIgOuGtDxRxcQkjrC+xvg5Vkqn7vBUyW +9pHedOU+PoF3DGOM+dqv+eNKBvh9YF9ugFAQBkcG7viZgvGEMGGUpzNgN7XnS1gj +/DPo9mZESOYnKceve2tIC87p2hqjrxOHuI7fkZYeNIcAoa83rBltFXaBDYhWAKS1 +PcXS1/7JzP0ky7d0L6Xbu/If5kqWQpKwUInXtySRkuraVfuK3Bpa+X1XecWi24JY +HVtlNX025xx1ewVzGNCTlWn1skQN2OOoQTV4C8/qFpTW6DTWYurd4+fE0OJFJZQF +buhfXYwmRlVOgN5i77NTIJZJQfYFj38c/Iv5vZBPokO6mffrOTv3MHWVgQARAQAB +tDNSZWQgSGF0LCBJbmMuIChyZWxlYXNlIGtleSAyKSA8c2VjdXJpdHlAcmVkaGF0 +LmNvbT6JAjYEEwECACAFAkrgSTsCGwMGCwkIBwMCBBUCCAMEFgIDAQIeAQIXgAAK +CRAZni+R/UMdUWzpD/9s5SFR/ZF3yjY5VLUFLMXIKUztNN3oc45fyLdTI3+UClKC +2tEruzYjqNHhqAEXa2sN1fMrsuKec61Ll2NfvJjkLKDvgVIh7kM7aslNYVOP6BTf +C/JJ7/ufz3UZmyViH/WDl+AYdgk3JqCIO5w5ryrC9IyBzYv2m0HqYbWfphY3uHw5 +un3ndLJcu8+BGP5F+ONQEGl+DRH58Il9Jp3HwbRa7dvkPgEhfFR+1hI+Btta2C7E +0/2NKzCxZw7Lx3PBRcU92YKyaEihfy/aQKZCAuyfKiMvsmzs+4poIX7I9NQCJpyE +IGfINoZ7VxqHwRn/d5mw2MZTJjbzSf+Um9YJyA0iEEyD6qjriWQRbuxpQXmlAJbh +8okZ4gbVFv1F8MzK+4R8VvWJ0XxgtikSo72fHjwha7MAjqFnOq6eo6fEC/75g3NL +Ght5VdpGuHk0vbdENHMC8wS99e5qXGNDued3hlTavDMlEAHl34q2H9nakTGRF5Ki +JUfNh3DVRGhg8cMIti21njiRh7gyFI2OccATY7bBSr79JhuNwelHuxLrCFpY7V25 +OFktl15jZJaMxuQBqYdBgSay2G0U6D1+7VsWufpzd/Abx1/c3oi9ZaJvW22kAggq +dzdA27UUYjWvx42w9menJwh/0jeQcTecIUd0d0rFcw/c1pvgMMl/Q73yzKgKYw== +=zbHE +-----END PGP PUBLIC KEY BLOCK----- +-----BEGIN PGP PUBLIC KEY BLOCK----- + +mQINBGIpIp4BEAC/o5e1WzLIsS6/JOQCs4XYATYTcf6B6ALzcP05G0W3uRpUQSrL +FRKNrU8ZCelm/B+XSh2ljJNeklp2WLxYENDOsftDXGoyLr2hEkI5OyK267IHhFNJ +g+BN+T5Cjh4ZiiWij6o9F7x2ZpxISE9M4iI80rwSv1KOnGSw5j2zD2EwoMjTVyVE +/t3s5XJxnDclB7ZqL+cgjv0mWUY/4+b/OoRTkhq7b8QILuZp75Y64pkrndgakm1T +8mAGXV02mEzpNj9DyAJdUqa11PIhMJMxxHOGHJ8CcHZ2NJL2e7yJf4orTj+cMhP5 +LzJcVlaXnQYu8Zkqa0V6J1Qdj8ZXL72QsmyicRYXAtK9Jm5pvBHuYU2m6Ja7dBEB +Vkhe7lTKhAjkZC5ErPmANNS9kPdtXCOpwN1lOnmD2m04hks3kpH9OTX7RkTFUSws +eARAfRID6RLfi59B9lmAbekecnsMIFMx7qR7ZKyQb3GOuZwNYOaYFevuxusSwCHv +4FtLDIhk+Fge+EbPdEva+VLJeMOb02gC4V/cX/oFoPkxM1A5LHjkuAM+aFLAiIRd +Np/tAPWk1k6yc+FqkcDqOttbP4ciiXb9JPtmzTCbJD8lgH0rGp8ufyMXC9x7/dqX +TjsiGzyvlMnrkKB4GL4DqRFl8LAR02A3846DD8CAcaxoXggL2bJCU2rgUQARAQAB +tDVSZWQgSGF0LCBJbmMuIChhdXhpbGlhcnkga2V5IDMpIDxzZWN1cml0eUByZWRo +YXQuY29tPokCUgQTAQgAPBYhBH5GJCWMQGU11W1vE1BU5KRaY0CzBQJiKSKeAhsD +BQsJCAcCAyICAQYVCgkICwIEFgIDAQIeBwIXgAAKCRBQVOSkWmNAsyBfEACuTN/X +YR+QyzeRw0pXcTvMqzNE4DKKr97hSQEwZH1/v1PEPs5O3psuVUm2iam7bqYwG+ry +EskAgMHi8AJmY0lioQD5/LTSLTrM8UyQnU3g17DHau1NHIFTGyaW4a7xviU4C2+k +c6X0u1CPHI1U4Q8prpNcfLsldaNYlsVZtUtYSHKPAUcswXWliW7QYjZ5tMSbu8jR +OMOc3mZuf0fcVFNu8+XSpN7qLhRNcPv+FCNmk/wkaQfH4Pv+jVsOgHqkV3aLqJeN +kNUnpyEKYkNqo7mNfNVWOcl+Z1KKKwSkIi3vg8maC7rODsy6IX+Y96M93sqYDQom +aaWue2gvw6thEoH4SaCrCL78mj2YFpeg1Oew4QwVcBnt68KOPfL9YyoOicNs4Vuu +fb/vjU2ONPZAeepIKA8QxCETiryCcP43daqThvIgdbUIiWne3gae6eSj0EuUPoYe +H5g2Lw0qdwbHIOxqp2kvN96Ii7s1DK3VyhMt/GSPCxRnDRJ8oQKJ2W/I1IT5VtiU +zMjjq5JcYzRPzHDxfVzT9CLeU/0XQ+2OOUAiZKZ0dzSyyVn8xbpviT7iadvjlQX3 +CINaPB+d2Kxa6uFWh+ZYOLLAgZ9B8NKutUHpXN66YSfe79xFBSFWKkJ8cSIMk13/ +Ifs7ApKlKCCRDpwoDqx/sjIaj1cpOfLHYjnefg== +=UZd/ +-----END PGP PUBLIC KEY BLOCK----- diff --git a/pki/tls/cert.pem b/pki/tls/cert.pem new file mode 120000 index 0000000..6f3a038 --- /dev/null +++ b/pki/tls/cert.pem @@ -0,0 +1 @@ +/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem \ No newline at end of file diff --git a/pki/tls/certs/ca-bundle.crt b/pki/tls/certs/ca-bundle.crt new file mode 120000 index 0000000..6f3a038 --- /dev/null +++ b/pki/tls/certs/ca-bundle.crt @@ -0,0 +1 @@ +/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem \ No newline at end of file diff --git a/pki/tls/certs/ca-bundle.trust.crt b/pki/tls/certs/ca-bundle.trust.crt new file mode 120000 index 0000000..1aa9c8d --- /dev/null +++ b/pki/tls/certs/ca-bundle.trust.crt @@ -0,0 +1 @@ +/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt \ No newline at end of file diff --git a/pki/tls/ct_log_list.cnf b/pki/tls/ct_log_list.cnf new file mode 100644 index 0000000..e643cfd --- /dev/null +++ b/pki/tls/ct_log_list.cnf @@ -0,0 +1,9 @@ +# This file specifies the Certificate Transparency logs +# that are to be trusted. + +# Google's list of logs can be found here: +# www.certificate-transparency.org/known-logs +# A Python program to convert the log list to OpenSSL's format can be +# found here: +# https://github.com/google/certificate-transparency/blob/master/python/utilities/log_list/print_log_list.py +# Use the "--openssl_output" flag. diff --git a/pki/tls/fips_local.cnf b/pki/tls/fips_local.cnf new file mode 120000 index 0000000..835d02d --- /dev/null +++ b/pki/tls/fips_local.cnf @@ -0,0 +1 @@ +/etc/crypto-policies/back-ends/openssl_fips.config \ No newline at end of file diff --git a/pki/tls/openssl.cnf b/pki/tls/openssl.cnf new file mode 100644 index 0000000..84a9898 --- /dev/null +++ b/pki/tls/openssl.cnf @@ -0,0 +1,402 @@ +# +# OpenSSL example configuration file. +# See doc/man5/config.pod for more info. +# +# This is mostly being used for generation of certificate requests, +# but may be used for auto loading of providers + +# Note that you can include other files from the main configuration +# file using the .include directive. +#.include filename + +# This definition stops the following lines choking if HOME isn't +# defined. +HOME = . + +# Use this in order to automatically load providers. +openssl_conf = openssl_init + +# Comment out the next line to ignore configuration errors +config_diagnostics = 1 + +# Extra OBJECT IDENTIFIER info: +# oid_file = $ENV::HOME/.oid +oid_section = new_oids + +# To use this configuration file with the "-extfile" option of the +# "openssl x509" utility, name here the section containing the +# X.509v3 extensions to use: +# extensions = +# (Alternatively, use a configuration file that has only +# X.509v3 extensions in its main [= default] section.) + +[ new_oids ] +# We can add new OIDs in here for use by 'ca', 'req' and 'ts'. +# Add a simple OID like this: +# testoid1=1.2.3.4 +# Or use config file substitution like this: +# testoid2=${testoid1}.5.6 + +# Policies used by the TSA examples. +tsa_policy1 = 1.2.3.4.1 +tsa_policy2 = 1.2.3.4.5.6 +tsa_policy3 = 1.2.3.4.5.7 + +[openssl_init] +providers = provider_sect +# Load default TLS policy configuration +ssl_conf = ssl_module +alg_section = evp_properties + +[ evp_properties ] +#This section is intentionally added empty here +#to be tuned on particular systems + +# Uncomment the sections that start with ## below to enable the legacy provider. +# Loading the legacy provider enables support for the following algorithms: +# Hashing Algorithms / Message Digests: MD2, MD4, MDC2, WHIRLPOOL, RIPEMD160 +# Symmetric Ciphers: Blowfish, CAST, DES, IDEA, RC2, RC4,RC5, SEED +# Key Derivation Function (KDF): PBKDF1 +# In general it is not recommended to use the above mentioned algorithms for +# security critical operations, as they are cryptographically weak or vulnerable +# to side-channel attacks and as such have been deprecated. + +[provider_sect] +default = default_sect +##legacy = legacy_sect +## +[default_sect] +activate = 1 + +##[legacy_sect] +##activate = 1 + +#Place the third party provider configuration files into this folder +.include /etc/pki/tls/openssl.d + +[ ssl_module ] + +system_default = crypto_policy + +[ crypto_policy ] + +.include = /etc/crypto-policies/back-ends/opensslcnf.config + +#################################################################### +[ ca ] +default_ca = CA_default # The default ca section + +#################################################################### +[ CA_default ] + +dir = /etc/pki/CA # Where everything is kept +certs = $dir/certs # Where the issued certs are kept +crl_dir = $dir/crl # Where the issued crl are kept +database = $dir/index.txt # database index file. +#unique_subject = no # Set to 'no' to allow creation of + # several certs with same subject. +new_certs_dir = $dir/newcerts # default place for new certs. + +certificate = $dir/cacert.pem # The CA certificate +serial = $dir/serial # The current serial number +crlnumber = $dir/crlnumber # the current crl number + # must be commented out to leave a V1 CRL +crl = $dir/crl.pem # The current CRL +private_key = $dir/private/cakey.pem # The private key + +x509_extensions = usr_cert # The extensions to add to the cert + +# Comment out the following two lines for the "traditional" +# (and highly broken) format. +name_opt = ca_default # Subject Name options +cert_opt = ca_default # Certificate field options + +# Extension copying option: use with caution. +# copy_extensions = copy + +# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs +# so this is commented out by default to leave a V1 CRL. +# crlnumber must also be commented out to leave a V1 CRL. +# crl_extensions = crl_ext + +default_days = 365 # how long to certify for +default_crl_days= 30 # how long before next CRL +default_md = sha256 # use SHA-256 by default +preserve = no # keep passed DN ordering + +# A few difference way of specifying how similar the request should look +# For type CA, the listed attributes must be the same, and the optional +# and supplied fields are just that :-) +policy = policy_match + +# For the CA policy +[ policy_match ] +countryName = match +stateOrProvinceName = match +organizationName = match +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +# For the 'anything' policy +# At this point in time, you must list all acceptable 'object' +# types. +[ policy_anything ] +countryName = optional +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +#################################################################### +[ req ] +default_bits = 2048 +default_md = sha256 +default_keyfile = privkey.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +x509_extensions = v3_ca # The extensions to add to the self signed cert + +# Passwords for private keys if not present they will be prompted for +# input_password = secret +# output_password = secret + +# This sets a mask for permitted string types. There are several options. +# default: PrintableString, T61String, BMPString. +# pkix : PrintableString, BMPString (PKIX recommendation before 2004) +# utf8only: only UTF8Strings (PKIX recommendation after 2004). +# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings). +# MASK:XXXX a literal mask value. +# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings. +string_mask = utf8only + +# req_extensions = v3_req # The extensions to add to a certificate request + +[ req_distinguished_name ] +countryName = Country Name (2 letter code) +countryName_default = XX +countryName_min = 2 +countryName_max = 2 + +stateOrProvinceName = State or Province Name (full name) +#stateOrProvinceName_default = Default Province + +localityName = Locality Name (eg, city) +localityName_default = Default City + +0.organizationName = Organization Name (eg, company) +0.organizationName_default = Default Company Ltd + +# we can do this but it is not needed normally :-) +#1.organizationName = Second Organization Name (eg, company) +#1.organizationName_default = World Wide Web Pty Ltd + +organizationalUnitName = Organizational Unit Name (eg, section) +#organizationalUnitName_default = + +commonName = Common Name (eg, your name or your server\'s hostname) +commonName_max = 64 + +emailAddress = Email Address +emailAddress_max = 64 + +# SET-ex3 = SET extension number 3 + +[ req_attributes ] +challengePassword = A challenge password +challengePassword_min = 4 +challengePassword_max = 20 + +unstructuredName = An optional company name + +[ usr_cert ] + +# These extensions are added when 'ca' signs a request. + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy +# An alternative to produce certificates that aren't +# deprecated according to PKIX. +# subjectAltName=email:move + +# Copy subject details +# issuerAltName=issuer:copy + +# This is required for TSA certificates. +# extendedKeyUsage = critical,timeStamping + +[ v3_req ] + +# Extensions to add to a certificate request + +basicConstraints = CA:FALSE +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +[ v3_ca ] + + +# Extensions for a typical CA + + +# PKIX recommendation. + +subjectKeyIdentifier=hash + +authorityKeyIdentifier=keyid:always,issuer + +basicConstraints = critical,CA:true + +# Key usage: this is typical for a CA certificate. However since it will +# prevent it being used as an test self-signed certificate it is best +# left out by default. +# keyUsage = cRLSign, keyCertSign + +# Include email address in subject alt name: another PKIX recommendation +# subjectAltName=email:copy +# Copy issuer details +# issuerAltName=issuer:copy + +# DER hex encoding of an extension: beware experts only! +# obj=DER:02:03 +# Where 'obj' is a standard or added object +# You can even override a supported extension: +# basicConstraints= critical, DER:30:03:01:01:FF + +[ crl_ext ] + +# CRL extensions. +# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL. + +# issuerAltName=issuer:copy +authorityKeyIdentifier=keyid:always + +[ proxy_cert_ext ] +# These extensions should be added when creating a proxy certificate + +# This goes against PKIX guidelines but some CAs do it and some software +# requires this to avoid interpreting an end user certificate as a CA. + +basicConstraints=CA:FALSE + +# This is typical in keyUsage for a client certificate. +# keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# PKIX recommendations harmless if included in all certificates. +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid,issuer + +# This stuff is for subjectAltName and issuerAltname. +# Import the email address. +# subjectAltName=email:copy +# An alternative to produce certificates that aren't +# deprecated according to PKIX. +# subjectAltName=email:move + +# Copy subject details +# issuerAltName=issuer:copy + +# This really needs to be in place for it to be a proxy certificate. +proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo + +#################################################################### +[ tsa ] + +default_tsa = tsa_config1 # the default TSA section + +[ tsa_config1 ] + +# These are used by the TSA reply generation only. +dir = /etc/pki/CA # TSA root directory +serial = $dir/tsaserial # The current serial number (mandatory) +crypto_device = builtin # OpenSSL engine to use for signing +signer_cert = $dir/tsacert.pem # The TSA signing certificate + # (optional) +certs = $dir/cacert.pem # Certificate chain to include in reply + # (optional) +signer_key = $dir/private/tsakey.pem # The TSA private key (optional) +signer_digest = sha256 # Signing digest to use. (Optional) +default_policy = tsa_policy1 # Policy if request did not specify it + # (optional) +other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional) +digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory) +accuracy = secs:1, millisecs:500, microsecs:100 # (optional) +clock_precision_digits = 0 # number of digits after dot. (optional) +ordering = yes # Is ordering defined for timestamps? + # (optional, default: no) +tsa_name = yes # Must the TSA name be included in the reply? + # (optional, default: no) +ess_cert_id_chain = no # Must the ESS cert id chain be included? + # (optional, default: no) +ess_cert_id_alg = sha256 # algorithm to compute certificate + # identifier (optional, default: sha256) + +[insta] # CMP using Insta Demo CA +# Message transfer +server = pki.certificate.fi:8700 +# proxy = # set this as far as needed, e.g., http://192.168.1.1:8080 +# tls_use = 0 +path = pkix/ + +# Server authentication +recipient = "/C=FI/O=Insta Demo/CN=Insta Demo CA" # or set srvcert or issuer +ignore_keyusage = 1 # potentially needed quirk +unprotected_errors = 1 # potentially needed quirk +extracertsout = insta.extracerts.pem + +# Client authentication +ref = 3078 # user identification +secret = pass:insta # can be used for both client and server side + +# Generic message options +cmd = ir # default operation, can be overridden on cmd line with, e.g., kur + +# Certificate enrollment +subject = "/CN=openssl-cmp-test" +newkey = insta.priv.pem +out_trusted = apps/insta.ca.crt # does not include keyUsage digitalSignature +certout = insta.cert.pem + +[pbm] # Password-based protection for Insta CA +# Server and client authentication +ref = $insta::ref # 3078 +secret = $insta::secret # pass:insta + +[signature] # Signature-based protection for Insta CA +# Server authentication +trusted = $insta::out_trusted # apps/insta.ca.crt + +# Client authentication +secret = # disable PBM +key = $insta::newkey # insta.priv.pem +cert = $insta::certout # insta.cert.pem + +[ir] +cmd = ir + +[cr] +cmd = cr + +[kur] +# Certificate update +cmd = kur +oldcert = $insta::certout # insta.cert.pem + +[rr] +# Certificate revocation +cmd = rr +oldcert = $insta::certout # insta.cert.pem diff --git a/printcap b/printcap new file mode 100644 index 0000000..9f88f82 --- /dev/null +++ b/printcap @@ -0,0 +1,7 @@ +# /etc/printcap +# +# Please don't edit this file directly unless you know what you are doing! +# This file will be automatically generated by cupsd(8) from the +# /etc/cups/printers.conf file. All changes to this file +# will be lost. + diff --git a/profile b/profile new file mode 100644 index 0000000..a292328 --- /dev/null +++ b/profile @@ -0,0 +1,78 @@ +# /etc/profile + +# System wide environment and startup programs, for login setup +# Functions and aliases go in /etc/bashrc + +# It's NOT a good idea to change this file unless you know what you +# are doing. It's much better to create a custom.sh shell script in +# /etc/profile.d/ to make custom changes to your environment, as this +# will prevent the need for merging in future updates. + +pathmunge () { + case ":${PATH}:" in + *:"$1":*) + ;; + *) + if [ "$2" = "after" ] ; then + PATH=$PATH:$1 + else + PATH=$1:$PATH + fi + esac +} + + +if [ -x /usr/bin/id ]; then + if [ -z "$EUID" ]; then + # ksh workaround + EUID=`/usr/bin/id -u` + UID=`/usr/bin/id -ru` + fi + USER="`/usr/bin/id -un`" + LOGNAME=$USER + MAIL="/var/spool/mail/$USER" +fi + +# Path manipulation +if [ "$EUID" = "0" ]; then + pathmunge /usr/sbin + pathmunge /usr/local/sbin +else + pathmunge /usr/local/sbin after + pathmunge /usr/sbin after +fi + +HOSTNAME=$(/usr/bin/hostnamectl --transient 2>/dev/null) || \ +HOSTNAME=$(/usr/bin/hostname 2>/dev/null) || \ +HOSTNAME=$(/usr/bin/uname -n) + +HISTSIZE=1000 +if [ "$HISTCONTROL" = "ignorespace" ] ; then + export HISTCONTROL=ignoreboth +else + export HISTCONTROL=ignoredups +fi + +export PATH USER LOGNAME MAIL HOSTNAME HISTSIZE HISTCONTROL + +for i in /etc/profile.d/*.sh /etc/profile.d/sh.local ; do + if [ -r "$i" ]; then + if [ "${-#*i}" != "$-" ]; then + . "$i" + else + . "$i" >/dev/null + fi + fi +done + +unset i +unset -f pathmunge + +if [ -n "${BASH_VERSION-}" ] ; then + if [ -f /etc/bashrc ] ; then + # Bash login shells run only /etc/profile + # Bash non-login shells run only /etc/bashrc + # Check for double sourcing is done in /etc/bashrc. + . /etc/bashrc + fi +fi diff --git a/profile.d/bash_completion.sh b/profile.d/bash_completion.sh new file mode 100644 index 0000000..e1a51b0 --- /dev/null +++ b/profile.d/bash_completion.sh @@ -0,0 +1,16 @@ +# shellcheck shell=sh disable=SC1091,SC2039,SC2166 +# Check for interactive bash and that we haven't already been sourced. +if [ "x${BASH_VERSION-}" != x -a "x${PS1-}" != x -a "x${BASH_COMPLETION_VERSINFO-}" = x ]; then + + # Check for recent enough version of bash. + if [ "${BASH_VERSINFO[0]}" -gt 4 ] || + [ "${BASH_VERSINFO[0]}" -eq 4 -a "${BASH_VERSINFO[1]}" -ge 2 ]; then + [ -r "${XDG_CONFIG_HOME:-$HOME/.config}/bash_completion" ] && + . "${XDG_CONFIG_HOME:-$HOME/.config}/bash_completion" + if shopt -q progcomp && [ -r /usr/share/bash-completion/bash_completion ]; then + # Source completion code. + . /usr/share/bash-completion/bash_completion + fi + fi + +fi diff --git a/profile.d/colorgrep.csh b/profile.d/colorgrep.csh new file mode 100644 index 0000000..b3152a6 --- /dev/null +++ b/profile.d/colorgrep.csh @@ -0,0 +1,11 @@ + +# color-grep initialization + +/usr/libexec/grepconf.sh -c +if ( $status == 1 ) then + exit +endif + +alias grep 'grep --color=auto' +alias egrep 'egrep --color=auto' +alias fgrep 'fgrep --color=auto' diff --git a/profile.d/colorgrep.sh b/profile.d/colorgrep.sh new file mode 100644 index 0000000..cd0539c --- /dev/null +++ b/profile.d/colorgrep.sh @@ -0,0 +1,7 @@ +# color-grep initialization + +/usr/libexec/grepconf.sh -c || return + +alias grep='grep --color=auto' 2>/dev/null +alias egrep='egrep --color=auto' 2>/dev/null +alias fgrep='fgrep --color=auto' 2>/dev/null diff --git a/profile.d/colorls.csh b/profile.d/colorls.csh new file mode 100644 index 0000000..66ec2fa --- /dev/null +++ b/profile.d/colorls.csh @@ -0,0 +1,63 @@ +# skip everything for non-interactive shells +if (! $?prompt) exit + +# color-ls initialization +if ( $?USER_LS_COLORS ) then + if ( "$USER_LS_COLORS" != "" ) then + #when USER_LS_COLORS defined do not override user + #specified LS_COLORS and use them + goto finish + endif +endif + +alias ll 'ls -l' +alias l. 'ls -d .*' +set COLORS=/etc/DIR_COLORS + +if ($?TERM) then + if ( -e "/etc/DIR_COLORS.$TERM" ) then + set COLORS="/etc/DIR_COLORS.$TERM" + endif +endif +if ( -f ~/.dircolors ) set COLORS=~/.dircolors +if ( -f ~/.dir_colors ) set COLORS=~/.dir_colors +if ($?TERM) then + if ( -f ~/.dircolors."$TERM" ) set COLORS=~/.dircolors."$TERM" + if ( -f ~/.dir_colors."$TERM" ) set COLORS=~/.dir_colors."$TERM" +endif +set INCLUDE="`/usr/bin/cat "$COLORS" | /usr/bin/grep '^INCLUDE' | /usr/bin/cut -d ' ' -f2-`" + +if ( ! -e "$COLORS" ) exit + +set _tmp="`/usr/bin/mktemp .colorlsXXX -q --tmpdir=/tmp`" +#if mktemp fails, exit when include was active, otherwise use $COLORS file +if ( "$_tmp" == '' ) then + if ( "$INCLUDE" == '' ) then + eval "`/usr/bin/dircolors -c $COLORS`" + endif + goto cleanup +endif + +if ( "$INCLUDE" != '' ) /usr/bin/cat "$INCLUDE" >> $_tmp +/usr/bin/grep -v '^INCLUDE' "$COLORS" >> $_tmp + +eval "`/usr/bin/dircolors -c $_tmp`" + +/usr/bin/rm -f $_tmp + +if ( "$LS_COLORS" == '' ) exit +cleanup: +set color_none=`/usr/bin/sed -n '/^COLOR.*none/Ip' < $COLORS` +if ( "$color_none" != '' ) then + unset color_none + exit +endif +unset color_none +unset _tmp +unset INCLUDE +unset COLORS + +finish: +alias ll 'ls -l --color=auto' +alias l. 'ls -d .* --color=auto' +alias ls 'ls --color=auto' diff --git a/profile.d/colorls.sh b/profile.d/colorls.sh new file mode 100644 index 0000000..5162f1e --- /dev/null +++ b/profile.d/colorls.sh @@ -0,0 +1,53 @@ +# color-ls initialization + +# Skip all for noninteractive shells. +[ ! -t 0 ] && return + +#when USER_LS_COLORS defined do not override user LS_COLORS, but use them. +if [ -z "$USER_LS_COLORS" ]; then + + alias ll='ls -l' 2>/dev/null + alias l.='ls -d .*' 2>/dev/null + + INCLUDE= + COLORS= + + for colors in "$HOME/.dir_colors.$TERM" "$HOME/.dircolors.$TERM" \ + "$HOME/.dir_colors" "$HOME/.dircolors"; do + [ -e "$colors" ] && COLORS="$colors" && \ + INCLUDE="`/usr/bin/cat "$COLORS" | /usr/bin/grep '^INCLUDE' | /usr/bin/cut -d ' ' -f2-`" && \ + break + done + + [ -z "$COLORS" ] && [ -e "/etc/DIR_COLORS.$TERM" ] && \ + COLORS="/etc/DIR_COLORS.$TERM" + + [ -z "$COLORS" ] && [ -e "/etc/DIR_COLORS" ] && \ + COLORS="/etc/DIR_COLORS" + + # Existence of $COLORS already checked above. + [ -n "$COLORS" ] || return + + if [ -e "$INCLUDE" ]; + then + TMP="`/usr/bin/mktemp .colorlsXXX -q --tmpdir=/tmp`" + [ -z "$TMP" ] && return + + /usr/bin/cat "$INCLUDE" >> $TMP + /usr/bin/grep -v '^INCLUDE' "$COLORS" >> $TMP + + eval "`/usr/bin/dircolors --sh $TMP 2>/dev/null`" + /usr/bin/rm -f $TMP + else + eval "`/usr/bin/dircolors --sh $COLORS 2>/dev/null`" + fi + + [ -z "$LS_COLORS" ] && return + /usr/bin/grep -qi "^COLOR.*none" $COLORS >/dev/null 2>/dev/null && return +fi + +unset TMP COLORS INCLUDE + +alias ll='ls -l --color=auto' 2>/dev/null +alias l.='ls -d .* --color=auto' 2>/dev/null +alias ls='ls --color=auto' 2>/dev/null diff --git a/profile.d/colorxzgrep.csh b/profile.d/colorxzgrep.csh new file mode 100644 index 0000000..a3964dc --- /dev/null +++ b/profile.d/colorxzgrep.csh @@ -0,0 +1,5 @@ +/usr/libexec/grepconf.sh -c +if ( $status == 1 ) exit +alias xzgrep 'xzgrep --color=auto' +alias xzfgrep 'xzfgrep --color=auto' +alias xzegrep 'xzegrep --color=auto' diff --git a/profile.d/colorxzgrep.sh b/profile.d/colorxzgrep.sh new file mode 100644 index 0000000..4a91d70 --- /dev/null +++ b/profile.d/colorxzgrep.sh @@ -0,0 +1,4 @@ +/usr/libexec/grepconf.sh -c || return +alias xzgrep='xzgrep --color=auto' 2>/dev/null +alias xzegrep='xzegrep --color=auto' 2>/dev/null +alias xzfgrep='xzfgrep --color=auto' 2>/dev/null diff --git a/profile.d/colorzgrep.csh b/profile.d/colorzgrep.csh new file mode 100644 index 0000000..5547b7a --- /dev/null +++ b/profile.d/colorzgrep.csh @@ -0,0 +1,9 @@ +test -f /usr/libexec/grepconf.sh +if ( $status == 1 ) exit + +/usr/libexec/grepconf.sh -c +if ( $status == 1 ) exit + +alias zgrep 'zgrep --color=auto' +alias zfgrep 'zfgrep --color=auto' +alias zegrep 'zegrep --color=auto' diff --git a/profile.d/colorzgrep.sh b/profile.d/colorzgrep.sh new file mode 100644 index 0000000..7764a07 --- /dev/null +++ b/profile.d/colorzgrep.sh @@ -0,0 +1,6 @@ +[ -f /usr/libexec/grepconf.sh ] || return + +/usr/libexec/grepconf.sh -c || return +alias zgrep='zgrep --color=auto' 2>/dev/null +alias zfgrep='zfgrep --color=auto' 2>/dev/null +alias zegrep='zegrep --color=auto' 2>/dev/null diff --git a/profile.d/console-login-helper-messages-profile.sh b/profile.d/console-login-helper-messages-profile.sh new file mode 120000 index 0000000..747d109 --- /dev/null +++ b/profile.d/console-login-helper-messages-profile.sh @@ -0,0 +1 @@ +../../usr/share/console-login-helper-messages/profile.sh \ No newline at end of file diff --git a/profile.d/csh.local b/profile.d/csh.local new file mode 100644 index 0000000..7485549 --- /dev/null +++ b/profile.d/csh.local @@ -0,0 +1 @@ +#Add any required envvar overrides to this file, is sourced from /etc/csh.login diff --git a/profile.d/debuginfod.csh b/profile.d/debuginfod.csh new file mode 100644 index 0000000..c676597 --- /dev/null +++ b/profile.d/debuginfod.csh @@ -0,0 +1,16 @@ +# $HOME/.login* or similar files may first set $DEBUGINFOD_URLS. +# If $DEBUGINFOD_URLS is not set there, we set it from system *.url files. +# $HOME/.*rc or similar files may then amend $DEBUGINFOD_URLS. +# See also [man debuginfod-client-config] for other environment variables +# such as $DEBUGINFOD_MAXSIZE, $DEBUGINFOD_MAXTIME, $DEBUGINFOD_PROGRESS. + +if (! $?DEBUGINFOD_URLS) then + set prefix="/usr" + set DEBUGINFOD_URLS=`sh -c 'cat /dev/null "$0"/*.urls 2>/dev/null; :' "/etc/debuginfod" | tr '\n' ' '` + if ( "$DEBUGINFOD_URLS" != "" ) then + setenv DEBUGINFOD_URLS "$DEBUGINFOD_URLS" + else + unset DEBUGINFOD_URLS + endif + unset prefix +endif diff --git a/profile.d/debuginfod.sh b/profile.d/debuginfod.sh new file mode 100644 index 0000000..7c93b50 --- /dev/null +++ b/profile.d/debuginfod.sh @@ -0,0 +1,12 @@ +# $HOME/.profile* or similar files may first set $DEBUGINFOD_URLS. +# If $DEBUGINFOD_URLS is not set there, we set it from system *.url files. +# $HOME/.*rc or similar files may then amend $DEBUGINFOD_URLS. +# See also [man debuginfod-client-config] for other environment variables +# such as $DEBUGINFOD_MAXSIZE, $DEBUGINFOD_MAXTIME, $DEBUGINFOD_PROGRESS. + +if [ -z "$DEBUGINFOD_URLS" ]; then + prefix="/usr" + DEBUGINFOD_URLS=$(cat /dev/null "/etc/debuginfod"/*.urls 2>/dev/null | tr '\n' ' ') + [ -n "$DEBUGINFOD_URLS" ] && export DEBUGINFOD_URLS || unset DEBUGINFOD_URLS + unset prefix +fi diff --git a/profile.d/fbrehm.sh b/profile.d/fbrehm.sh new file mode 100644 index 0000000..2137503 --- /dev/null +++ b/profile.d/fbrehm.sh @@ -0,0 +1,148 @@ +# If not running interactively, don't do anything +[ -z "$PS1" ] && return + +# Check for bash +[ -z "$BASH_VERSION" ] && return + +# for setting history length see HISTSIZE and HISTFILESIZE in bash(1) +HISTSIZE=50000 +HISTFILESIZE=50000 +HISTTIMEFORMAT='%Y-%m-%d %H:%M:%S ' +HISTCONTROL=ignoredups:ignorespace +# append to the history file, don't overwrite it +shopt -s histappend + +# coloring grep: +#alias grep='grep --color=auto' +export GREP_COLOR='1;32' + +# hold these special chars when piping to less +export LESS="--RAW-CONTROL-CHARS" + +# check the window size after each command and, if necessary, +# update the values of LINES and COLUMNS. +shopt -s checkwinsize + +# make less more friendly for non-text input files, see lesspipe(1) +[[ -x /bin/lesspipe ]] && eval "$(SHELL=/bin/sh lesspipe)" + +PS1='\u@\h:\w\$ ' + +# uncomment for a colored prompt, if the terminal has the capability; turned +# off by default to not distract the user: the focus in a terminal window +# should be on the output of commands, not on the prompt +force_color_prompt=yes + +if [[ -n "$force_color_prompt" ]]; then + if [[ -x /usr/bin/tput ]] && tput setaf 1 >&/dev/null; then + # We have color support; assume it's compliant with Ecma-48 + # (ISO/IEC-6429). (Lack of such support is extremely rare, and such + # a case would tend to support setf rather than setaf.) + color_prompt=yes + else + color_prompt= + fi +fi + +prompt_status() { + local e=$?; + [[ $e != 0 ]] && echo -e "$e "; +} + +if [[ "$color_prompt" = yes ]]; then + if type -t __git_ps1 >/dev/null ; then + if [[ "$UID" = 0 ]]; then + PS1='${debian_chroot:+($debian_chroot)}\[\e[31m\]$(prompt_status)\[\033[01;31m\]\u\[\033[01;33m\]@\[\033[01;36m\]\h \[\033[01;33m\]\w\[\033[01;31m\]$(__git_ps1)\[\033[01;35m\] \$ \[\033[00m\]' + else + PS1='${debian_chroot:+($debian_chroot)}\[\e[31m\]$(prompt_status)\[\033[01;32m\]\u\[\033[01;33m\]@\[\033[01;36m\]\h \[\033[01;33m\]\w\[\033[01;31m\]$(__git_ps1)\[\033[01;35m\] > \[\033[00m\]' + fi + else + if [[ "$UID" = 0 ]]; then + PS1='${debian_chroot:+($debian_chroot)}\[\e[31m\]$(prompt_status)\[\033[01;31m\]\u\[\033[01;33m\]@\[\033[01;36m\]\h \[\033[01;33m\]\w \[\033[01;35m\]\$ \[\033[00m\]' + else + PS1='${debian_chroot:+($debian_chroot)}\[\e[31m\]$(prompt_status)\[\033[01;32m\]\u\[\033[01;33m\]@\[\033[01;36m\]\h \[\033[01;33m\]\w \[\033[01;35m\]> \[\033[00m\]' + fi + fi +else + PS1='${debian_chroot:+($debian_chroot)}$(prompt_status)\u@\h:\w\$ ' +fi + +# enable color support of ls and also add handy aliases +if [[ -x /usr/bin/dircolors ]]; then + test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)" + alias ls='ls --color=auto' + #alias dir='dir --color=auto' + #alias vdir='vdir --color=auto' + +# alias grep='grep --color=auto' +# alias fgrep='fgrep --color=auto' +# alias egrep='egrep --color=auto' +fi + +# Save each command to the history file as it's executed. #517342 +# This does mean sessions get interleaved when reading later on, but this +# way the history is always up to date. History is not synced across live +# sessions though; that is what `history -n` does. +# Disabled by default due to concerns related to system recovery when $HOME +# is under duress, or lives somewhere flaky (like NFS). Constantly syncing +# the history will halt the shell prompt until it's finished. +PROMPT_COMMAND='history -a' + +# Commented out, don't overwrite xterm -T "title" -n "icontitle" by default. +# If this is an xterm set the title to user@host:dir +case "$TERM" in + xterm*|rxvt*) + PROMPT_COMMAND='history -a; echo -ne "\033]0;${USER}@${HOSTNAME}: ${PWD}\007"' + ;; + *) + ;; +esac + +alias ..='cd ..' +alias ...='cd ../..' +alias cd..='cd ..' +alias cd...='cd ../..' +alias l='ls -l' +alias la='ls -la' +alias ll='ls -lA' +alias md='mkdir -p' +if type -t whoami >/dev/null; then + alias pl="ps -fu $(whoami)" +fi +alias rd='rmdir' + +if [[ "$(type -t colordiff)" = "file" ]] ; then + alias diff="$(type -p colordiff)" +fi + +if [[ -f ~/.bash_aliases ]]; then + . ~/.bash_aliases +fi + +if [ -d /usr/scripts ] ; then + PATH=/usr/scripts:$PATH + export PATH +fi + +if [ -d $HOME/bin ] ; then + PATH=$PATH:$HOME/bin + export PATH +fi + +if [[ -d "$HOME/lib" ]] ; then + if [[ -d "$HOME/lib/perl" ]] ; then + if [[ -z "${PERL5LIB}" ]] ; then + export PERL5LIB="$HOME/lib/perl" + else + export PERL5LIB="$HOME/lib/perl:${PERL5LIB}" + fi + fi + if [[ -d "$HOME/lib/python" ]] ; then + if [[ -z "${PYTHONPATH}" ]] ; then + export PYTHONPATH="$HOME/lib/python" + else + export PYTHONPATH="$HOME/lib/python:${PYTHONPATH}" + fi + fi +fi + diff --git a/profile.d/gawk.csh b/profile.d/gawk.csh new file mode 100644 index 0000000..583d5bc --- /dev/null +++ b/profile.d/gawk.csh @@ -0,0 +1,11 @@ +alias gawkpath_default 'unsetenv AWKPATH; setenv AWKPATH `gawk -v x=AWKPATH "BEGIN {print ENVIRON[x]}"`' + +alias gawkpath_prepend 'if (! $?AWKPATH) setenv AWKPATH ""; if ($AWKPATH == "") then; unsetenv AWKPATH; setenv AWKPATH `gawk -v x=AWKPATH "BEGIN {print ENVIRON[x]}"`; endif; setenv AWKPATH "\!*"":$AWKPATH"' + +alias gawkpath_append 'if (! $?AWKPATH) setenv AWKPATH ""; if ($AWKPATH == "") then; unsetenv AWKPATH; setenv AWKPATH `gawk -v x=AWKPATH "BEGIN {print ENVIRON[x]}"`; endif; setenv AWKPATH "$AWKPATH"":\!*"' + +alias gawklibpath_default 'unsetenv AWKLIBPATH; setenv AWKLIBPATH `gawk -v x=AWKLIBPATH "BEGIN {print ENVIRON[x]}"`' + +alias gawklibpath_prepend 'if (! $?AWKLIBPATH) setenv AWKLIBPATH ""; if ($AWKLIBPATH == "") then; unsetenv AWKLIBPATH; setenv AWKLIBPATH `gawk -v x=AWKLIBPATH "BEGIN {print ENVIRON[x]}"`; endif; setenv AWKLIBPATH "\!*"":$AWKLIBPATH"' + +alias gawklibpath_append 'if (! $?AWKLIBPATH) setenv AWKLIBPATH ""; if ($AWKLIBPATH == "") then; unsetenv AWKLIBPATH; setenv AWKLIBPATH `gawk -v x=AWKLIBPATH "BEGIN {print ENVIRON[x]}"`; endif; setenv AWKLIBPATH "$AWKLIBPATH"":\!*"' diff --git a/profile.d/gawk.sh b/profile.d/gawk.sh new file mode 100644 index 0000000..c35471f --- /dev/null +++ b/profile.d/gawk.sh @@ -0,0 +1,31 @@ +gawkpath_default () { + unset AWKPATH + export AWKPATH=`gawk 'BEGIN {print ENVIRON["AWKPATH"]}'` +} + +gawkpath_prepend () { + [ -z "$AWKPATH" ] && AWKPATH=`gawk 'BEGIN {print ENVIRON["AWKPATH"]}'` + export AWKPATH="$*:$AWKPATH" +} + +gawkpath_append () { + [ -z "$AWKPATH" ] && AWKPATH=`gawk 'BEGIN {print ENVIRON["AWKPATH"]}'` + export AWKPATH="$AWKPATH:$*" +} + +gawklibpath_default () { + unset AWKLIBPATH + export AWKLIBPATH=`gawk 'BEGIN {print ENVIRON["AWKLIBPATH"]}'` +} + +gawklibpath_prepend () { + [ -z "$AWKLIBPATH" ] && \ + AWKLIBPATH=`gawk 'BEGIN {print ENVIRON["AWKLIBPATH"]}'` + export AWKLIBPATH="$*:$AWKLIBPATH" +} + +gawklibpath_append () { + [ -z "$AWKLIBPATH" ] && \ + AWKLIBPATH=`gawk 'BEGIN {print ENVIRON["AWKLIBPATH"]}'` + export AWKLIBPATH="$AWKLIBPATH:$*" +} diff --git a/profile.d/lang.csh b/profile.d/lang.csh new file mode 100644 index 0000000..564ae24 --- /dev/null +++ b/profile.d/lang.csh @@ -0,0 +1,109 @@ +# /etc/profile.d/lang.csh - exports environment variables, and provides fallback +# for CJK languages that can't be displayed in console. +# Resets the locale if unavailable. + +unset LANG_backup + +# If unavailable, reset to the default. Do this before reading in any +# explicit user configuration. We simply check if locale emits any +# warnings, and assume that the settings are invalid if it does. +set locale_error=`(/usr/bin/locale >/dev/null) |& cat` +if ("${locale_error}" != "") then + if (${?LANG}) then + setenv LANG C.UTF-8 + endif + unsetenv LC_ALL + setenv LC_CTYPE C.UTF-8 + setenv LC_NUMERIC C.UTF-8 + setenv LC_TIME C.UTF-8 + setenv LC_COLLATE C.UTF-8 + setenv LC_MONETARY C.UTF-8 + setenv LC_MESSAGES C.UTF-8 + setenv LC_PAPER C.UTF-8 + setenv LC_NAME C.UTF-8 + setenv LC_ADDRESS C.UTF-8 + setenv LC_TELEPHONE C.UTF-8 + setenv LC_MEASUREMENT C.UTF-8 + setenv LC_IDENTIFICATION C.UTF-8 +else + if (${?LANG}) then + set LANG_backup=${LANG} + endif +endif + +foreach config (/etc/locale.conf "${HOME}/.i18n") + if (-f "${config}") then + # NOTE: We are using eval & sed here to avoid invoking of any commands & functions from those files. + eval `/usr/bin/sed -r -e 's/^[[:blank:]]*([[:upper:]_]+)=([[:print:][:digit:]\._-]+|"[[:print:][:digit:]\._-]+")/setenv \1 \2;/;t;d' ${config}` + endif +end + +if (${?LANG_backup}) then + setenv LANG "${LANG_backup}" +endif + +unset LANG_backup config locale_error + +# ---------------------------------------------- + +# The LC_ALL is not supposed to be set in /etc/locale.conf according to 'man 5 locale.conf'. +# If it is set, then we expect it is user's explicit override (most likely from ~/.i18n file). +# See 'man 7 locale' for more info about LC_ALL. +if (${?LC_ALL}) then + if (${?LANG}) then + if (${LC_ALL} != ${LANG}) then + setenv LC_ALL + else + unsetenv LC_ALL + endif + else + unsetenv LC_ALL + endif +endif + +# The ${LANG} manipulation is necessary only in virtual terminal (a.k.a. console - /dev/tty*): +set in_console=`/usr/bin/tty | /usr/bin/grep -vc -e '/dev/tty'` + +if (${?LANG} && ${?TERM}) then + if (${TERM} == 'linux' && $in_console == 0) then + set utf8_used=`echo ${LANG} | /usr/bin/grep -vc -E -i -e '^.+\.utf-?8$'` + + if (${utf8_used} == 0) then + switch (${LANG}) + case en_IN*: + breaksw + case ja*: + case ko*: + case si*: + case zh*: + case ar*: + case fa*: + case he*: + case *_IN*: + setenv LANG en_US.UTF-8 + breaksw + endsw + else + switch (${LANG}) + case en_IN*: + breaksw + case ja*: + case ko*: + case si*: + case zh*: + case ar*: + case fa*: + case he*: + case *_IN*: + setenv LANG en_US + breaksw + endsw + endif + + # NOTE: We are not exporting the ${LANG} here again on purpose. + # If user starts GUI session from console manually, then + # the previously set LANG should be okay to use. + endif +endif + +unset in_console utf8_used diff --git a/profile.d/lang.sh b/profile.d/lang.sh new file mode 100644 index 0000000..f42efa6 --- /dev/null +++ b/profile.d/lang.sh @@ -0,0 +1,91 @@ +# /etc/profile.d/lang.sh - exports environment variables, and provides fallback +# for CJK languages that can't be displayed in console. +# Resets the locale if unavailable. + +unset LANG_backup + +# If unavailable, reset to the default. Do this before reading in any +# explicit user configuration. We simply check if locale emits any +# warnings, and assume that the settings are invalid if it does. +if [ -n "$(/usr/bin/locale 2>&1 1>/dev/null)" ]; then + [ -z "$LANG" ] || LANG=C.UTF-8 + unset LC_ALL + LC_CTYPE="C.UTF-8" + LC_NUMERIC="C.UTF-8" + LC_TIME="C.UTF-8" + LC_COLLATE="C.UTF-8" + LC_MONETARY="C.UTF-8" + LC_MESSAGES="C.UTF-8" + LC_PAPER="C.UTF-8" + LC_NAME="C.UTF-8" + LC_ADDRESS="C.UTF-8" + LC_TELEPHONE="C.UTF-8" + LC_MEASUREMENT="C.UTF-8" + LC_IDENTIFICATION="C.UTF-8" +else + LANG_backup="${LANG}" +fi + +for config in /etc/locale.conf "${HOME}/.i18n"; do + if [ -f "${config}" ]; then + # NOTE: We are using eval & sed here to avoid invoking of any commands & functions from those files. + if [ -x /usr/bin/sed ]; then + eval $(/usr/bin/sed -r -e 's/^[[:blank:]]*([[:upper:]_]+)=([[:print:][:digit:]\._-]+|"[[:print:][:digit:]\._-]+")/export \1=\2/;t;d' ${config}) + else + #but if we don't have sed, let's go old way and source it + [ -f "${config}" ] && . "${config}" + fi + fi +done + +if [ -n "${LANG_backup}" ]; then + LANG="${LANG_backup}" +fi + +unset LANG_backup config + +# ---------------------------------------------- + +# The LC_ALL is not supposed to be set in /etc/locale.conf according to 'man 5 locale.conf'. +# If it is set, then we we expect it is user's explicit override (most likely from ~/.i18n file). +# See 'man 7 locale' for more info about LC_ALL. +if [ -n "${LC_ALL}" ]; then + if [ "${LC_ALL}" != "${LANG}" -a -n "${LANG}" ]; then + export LC_ALL + else + unset LC_ALL + fi +fi + +# The ${LANG} manipulation is necessary only in virtual terminal (a.k.a. console - /dev/tty*): +if [ -n "${LANG}" ] && [ "${TERM}" = 'linux' ] && /usr/bin/tty | /usr/bin/grep --quiet -e '/dev/tty'; then + if /usr/bin/grep --quiet -E -i -e '^.+\.utf-?8$' <<< "${LANG}"; then + case ${LANG} in + ja*) LANG=en_US.UTF-8 ;; + ko*) LANG=en_US.UTF-8 ;; + si*) LANG=en_US.UTF-8 ;; + zh*) LANG=en_US.UTF-8 ;; + ar*) LANG=en_US.UTF-8 ;; + fa*) LANG=en_US.UTF-8 ;; + he*) LANG=en_US.UTF-8 ;; + en_IN*) true ;; + *_IN*) LANG=en_US.UTF-8 ;; + esac + else + case ${LANG} in + ja*) LANG=en_US ;; + ko*) LANG=en_US ;; + si*) LANG=en_US ;; + zh*) LANG=en_US ;; + ar*) LANG=en_US ;; + fa*) LANG=en_US ;; + he*) LANG=en_US ;; + en_IN*) true ;; + *_IN*) LANG=en_US ;; + esac + fi + + # NOTE: We are not exporting the ${LANG} here again on purpose. + # If user starts GUI session from console manually, then + # the previously set LANG should be okay to use. +fi diff --git a/profile.d/less.csh b/profile.d/less.csh new file mode 100644 index 0000000..d3c1f8e --- /dev/null +++ b/profile.d/less.csh @@ -0,0 +1,15 @@ +# less initialization script (csh) + +# All less.*sh files should have the same semantics! + +# In case you are curious, the test for non-emptiness is not as easy as in +# Bourne shell. This "eval" construct is probably inspired by Stack +# Overflow question 13343392. +if ( $?LESSOPEN && { eval 'test ! -z "$LESSOPEN"' } ) then + : +else + if ( -x /usr/bin/lesspipe.sh ) then + # The '||' here is intentional, see rhbz#1254837. + setenv LESSOPEN "||/usr/bin/lesspipe.sh %s" + endif +endif diff --git a/profile.d/less.sh b/profile.d/less.sh new file mode 100644 index 0000000..189bbd2 --- /dev/null +++ b/profile.d/less.sh @@ -0,0 +1,8 @@ +# less initialization script (sh) + +# All less.*sh files should have the same semantics! + +if [ -z "$LESSOPEN" ] && [ -x /usr/bin/lesspipe.sh ]; then + # The '||' here is intentional, see rhbz#1254837. + export LESSOPEN="||/usr/bin/lesspipe.sh %s" +fi diff --git a/profile.d/sh.local b/profile.d/sh.local new file mode 100644 index 0000000..2f12e54 --- /dev/null +++ b/profile.d/sh.local @@ -0,0 +1 @@ +#Add any required envvar overrides to this file, it is sourced from /etc/profile diff --git a/profile.d/which2.csh b/profile.d/which2.csh new file mode 100644 index 0000000..da9655e --- /dev/null +++ b/profile.d/which2.csh @@ -0,0 +1,3 @@ +# Initialization script for csh + +# alias which 'alias | /usr/bin/which --tty-only --read-alias --show-dot --show-tilde' diff --git a/profile.d/which2.sh b/profile.d/which2.sh new file mode 100644 index 0000000..bca5347 --- /dev/null +++ b/profile.d/which2.sh @@ -0,0 +1,28 @@ +# shellcheck shell=sh +# Initialization script for bash, sh, mksh and ksh + +case "$(basename $(readlink /proc/$$/exe))" in +*ksh*) + which_declare="" + which_opt="" + ;; +zsh) + which_declare="typeset -f" + which_opt="" + ;; +bash|sh) + which_declare="declare -f" + which_opt="-f" + ;; +*) + which_declare="" + which_opt="" + ;; +esac + +function which { + (alias; eval ${which_declare}) | /usr/bin/which --tty-only --read-alias --read-functions --show-tilde --show-dot $@ +} + +export which_declare +export ${which_opt} which diff --git a/protocols b/protocols new file mode 100644 index 0000000..973b098 --- /dev/null +++ b/protocols @@ -0,0 +1,162 @@ +# /etc/protocols: +# $Id: protocols,v 1.12 2016/07/08 12:27 ovasik Exp $ +# +# Internet (IP) protocols +# +# from: @(#)protocols 5.1 (Berkeley) 4/17/89 +# +# Updated for NetBSD based on RFC 1340, Assigned Numbers (July 1992). +# Last IANA update included dated 2011-05-03 +# +# See also http://www.iana.org/assignments/protocol-numbers + +ip 0 IP # internet protocol, pseudo protocol number +hopopt 0 HOPOPT # hop-by-hop options for ipv6 +icmp 1 ICMP # internet control message protocol +igmp 2 IGMP # internet group management protocol +ggp 3 GGP # gateway-gateway protocol +ipv4 4 IPv4 # IPv4 encapsulation +st 5 ST # ST datagram mode +tcp 6 TCP # transmission control protocol +cbt 7 CBT # CBT, Tony Ballardie +egp 8 EGP # exterior gateway protocol +igp 9 IGP # any private interior gateway (Cisco: for IGRP) +bbn-rcc 10 BBN-RCC-MON # BBN RCC Monitoring +nvp 11 NVP-II # Network Voice Protocol +pup 12 PUP # PARC universal packet protocol +argus 13 ARGUS # ARGUS (deprecated) +emcon 14 EMCON # EMCON +xnet 15 XNET # Cross Net Debugger +chaos 16 CHAOS # Chaos +udp 17 UDP # user datagram protocol +mux 18 MUX # Multiplexing protocol +dcn 19 DCN-MEAS # DCN Measurement Subsystems +hmp 20 HMP # host monitoring protocol +prm 21 PRM # packet radio measurement protocol +xns-idp 22 XNS-IDP # Xerox NS IDP +trunk-1 23 TRUNK-1 # Trunk-1 +trunk-2 24 TRUNK-2 # Trunk-2 +leaf-1 25 LEAF-1 # Leaf-1 +leaf-2 26 LEAF-2 # Leaf-2 +rdp 27 RDP # "reliable datagram" protocol +irtp 28 IRTP # Internet Reliable Transaction Protocol +iso-tp4 29 ISO-TP4 # ISO Transport Protocol Class 4 +netblt 30 NETBLT # Bulk Data Transfer Protocol +mfe-nsp 31 MFE-NSP # MFE Network Services Protocol +merit-inp 32 MERIT-INP # MERIT Internodal Protocol +dccp 33 DCCP # Datagram Congestion Control Protocol +3pc 34 3PC # Third Party Connect Protocol +idpr 35 IDPR # Inter-Domain Policy Routing Protocol +xtp 36 XTP # Xpress Tranfer Protocol +ddp 37 DDP # Datagram Delivery Protocol +idpr-cmtp 38 IDPR-CMTP # IDPR Control Message Transport Proto +tp++ 39 TP++ # TP++ Transport Protocol +il 40 IL # IL Transport Protocol +ipv6 41 IPv6 # IPv6 encapsulation +sdrp 42 SDRP # Source Demand Routing Protocol +ipv6-route 43 IPv6-Route # Routing Header for IPv6 +ipv6-frag 44 IPv6-Frag # Fragment Header for IPv6 +idrp 45 IDRP # Inter-Domain Routing Protocol +rsvp 46 RSVP # Resource ReSerVation Protocol +gre 47 GRE # Generic Routing Encapsulation +dsr 48 DSR # Dynamic Source Routing Protocol +bna 49 BNA # BNA +esp 50 ESP # Encap Security Payload +ipv6-crypt 50 IPv6-Crypt # Encryption Header for IPv6 (not in official list) +ah 51 AH # Authentication Header +ipv6-auth 51 IPv6-Auth # Authentication Header for IPv6 (not in official list) +i-nlsp 52 I-NLSP # Integrated Net Layer Security TUBA +swipe 53 SWIPE # IP with Encryption +narp 54 NARP # NBMA Address Resolution Protocol +mobile 55 MOBILE # IP Mobility +tlsp 56 TLSP # Transport Layer Security Protocol +skip 57 SKIP # SKIP +ipv6-icmp 58 IPv6-ICMP # ICMP for IPv6 +ipv6-nonxt 59 IPv6-NoNxt # No Next Header for IPv6 +ipv6-opts 60 IPv6-Opts # Destination Options for IPv6 +# 61 # any host internal protocol +cftp 62 CFTP # CFTP +# 63 # any local network +sat-expak 64 SAT-EXPAK # SATNET and Backroom EXPAK +kryptolan 65 KRYPTOLAN # Kryptolan +rvd 66 RVD # MIT Remote Virtual Disk Protocol +ippc 67 IPPC # Internet Pluribus Packet Core +# 68 # any distributed file system +sat-mon 69 SAT-MON # SATNET Monitoring +visa 70 VISA # VISA Protocol +ipcv 71 IPCV # Internet Packet Core Utility +cpnx 72 CPNX # Computer Protocol Network Executive +cphb 73 CPHB # Computer Protocol Heart Beat +wsn 74 WSN # Wang Span Network +pvp 75 PVP # Packet Video Protocol +br-sat-mon 76 BR-SAT-MON # Backroom SATNET Monitoring +sun-nd 77 SUN-ND # SUN ND PROTOCOL-Temporary +wb-mon 78 WB-MON # WIDEBAND Monitoring +wb-expak 79 WB-EXPAK # WIDEBAND EXPAK +iso-ip 80 ISO-IP # ISO Internet Protocol +vmtp 81 VMTP # Versatile Message Transport +secure-vmtp 82 SECURE-VMTP # SECURE-VMTP +vines 83 VINES # VINES +ttp 84 TTP # TTP +nsfnet-igp 85 NSFNET-IGP # NSFNET-IGP +dgp 86 DGP # Dissimilar Gateway Protocol +tcf 87 TCF # TCF +eigrp 88 EIGRP # Enhanced Interior Routing Protocol (Cisco) +ospf 89 OSPFIGP # Open Shortest Path First IGP +sprite-rpc 90 Sprite-RPC # Sprite RPC Protocol +larp 91 LARP # Locus Address Resolution Protocol +mtp 92 MTP # Multicast Transport Protocol +ax.25 93 AX.25 # AX.25 Frames +ipip 94 IPIP # Yet Another IP encapsulation +micp 95 MICP # Mobile Internetworking Control Pro. +scc-sp 96 SCC-SP # Semaphore Communications Sec. Pro. +etherip 97 ETHERIP # Ethernet-within-IP Encapsulation +encap 98 ENCAP # Yet Another IP encapsulation +# 99 # any private encryption scheme +gmtp 100 GMTP # GMTP +ifmp 101 IFMP # Ipsilon Flow Management Protocol +pnni 102 PNNI # PNNI over IP +pim 103 PIM # Protocol Independent Multicast +aris 104 ARIS # ARIS +scps 105 SCPS # SCPS +qnx 106 QNX # QNX +a/n 107 A/N # Active Networks +ipcomp 108 IPComp # IP Payload Compression Protocol +snp 109 SNP # Sitara Networks Protocol +compaq-peer 110 Compaq-Peer # Compaq Peer Protocol +ipx-in-ip 111 IPX-in-IP # IPX in IP +vrrp 112 VRRP # Virtual Router Redundancy Protocol +pgm 113 PGM # PGM Reliable Transport Protocol +# 114 # any 0-hop protocol +l2tp 115 L2TP # Layer Two Tunneling Protocol +ddx 116 DDX # D-II Data Exchange +iatp 117 IATP # Interactive Agent Transfer Protocol +stp 118 STP # Schedule Transfer +srp 119 SRP # SpectraLink Radio Protocol +uti 120 UTI # UTI +smp 121 SMP # Simple Message Protocol +sm 122 SM # SM (deprecated) +ptp 123 PTP # Performance Transparency Protocol +isis 124 ISIS # ISIS over IPv4 +fire 125 FIRE +crtp 126 CRTP # Combat Radio Transport Protocol +crudp 127 CRUDP # Combat Radio User Datagram +sscopmce 128 SSCOPMCE +iplt 129 IPLT +sps 130 SPS # Secure Packet Shield +pipe 131 PIPE # Private IP Encapsulation within IP +sctp 132 SCTP # Stream Control Transmission Protocol +fc 133 FC # Fibre Channel +rsvp-e2e-ignore 134 RSVP-E2E-IGNORE +mobility-header 135 Mobility-Header # Mobility Header +udplite 136 UDPLite +mpls-in-ip 137 MPLS-in-IP +manet 138 manet # MANET Protocols +hip 139 HIP # Host Identity Protocol +shim6 140 Shim6 # Shim6 Protocol +wesp 141 WESP # Wrapped Encapsulating Security Payload +rohc 142 ROHC # Robust Header Compression +# 143-252 Unassigned [IANA] +# 253 Use for experimentation and testing [RFC3692] +# 254 Use for experimentation and testing [RFC3692] +# 255 Reserved [IANA] diff --git a/rc.d/init.d/README b/rc.d/init.d/README new file mode 100644 index 0000000..4c4b905 --- /dev/null +++ b/rc.d/init.d/README @@ -0,0 +1,27 @@ +You are looking for the traditional init scripts in /etc/rc.d/init.d, +and they are gone? + +Here's an explanation on what's going on: + +You are running a systemd-based OS where traditional init scripts have +been replaced by native systemd services files. Service files provide +very similar functionality to init scripts. To make use of service +files simply invoke "systemctl", which will output a list of all +currently running services (and other units). Use "systemctl +list-unit-files" to get a listing of all known unit files, including +stopped, disabled and masked ones. Use "systemctl start +foobar.service" and "systemctl stop foobar.service" to start or stop a +service, respectively. For further details, please refer to +systemctl(1). + +Note that traditional init scripts continue to function on a systemd +system. An init script /etc/rc.d/init.d/foobar is implicitly mapped +into a service unit foobar.service during system initialization. + +Thank you! + +Further reading: + man:systemctl(1) + man:systemd(1) + http://0pointer.de/blog/projects/systemd-for-admins-3.html + https://www.freedesktop.org/wiki/Software/systemd/Incompatibilities diff --git a/rc.d/rc.local b/rc.d/rc.local new file mode 100644 index 0000000..4666070 --- /dev/null +++ b/rc.d/rc.local @@ -0,0 +1,14 @@ +#!/bin/bash +# THIS FILE IS ADDED FOR COMPATIBILITY PURPOSES +# +# It is highly advisable to create own systemd services or udev rules +# to run scripts during boot instead of using this file. +# +# In contrast to previous versions due to parallel execution during boot +# this script will NOT be run after all other services. +# +# Please note that you must run 'chmod +x /etc/rc.d/rc.local' to ensure +# that this script will be executed during boot. + +touch /var/lock/subsys/local + diff --git a/rc.local b/rc.local new file mode 120000 index 0000000..852b21b --- /dev/null +++ b/rc.local @@ -0,0 +1 @@ +rc.d/rc.local \ No newline at end of file diff --git a/redhat-release b/redhat-release new file mode 120000 index 0000000..780b78a --- /dev/null +++ b/redhat-release @@ -0,0 +1 @@ +rocky-release \ No newline at end of file diff --git a/redis/redis.conf b/redis/redis.conf new file mode 100644 index 0000000..a2f7087 --- /dev/null +++ b/redis/redis.conf @@ -0,0 +1,2053 @@ +# Redis configuration file example. +# +# Note that in order to read the configuration file, Redis must be +# started with the file path as first argument: +# +# ./redis-server /path/to/redis.conf + +# Note on units: when memory size is needed, it is possible to specify +# it in the usual form of 1k 5GB 4M and so forth: +# +# 1k => 1000 bytes +# 1kb => 1024 bytes +# 1m => 1000000 bytes +# 1mb => 1024*1024 bytes +# 1g => 1000000000 bytes +# 1gb => 1024*1024*1024 bytes +# +# units are case insensitive so 1GB 1Gb 1gB are all the same. + +################################## INCLUDES ################################### + +# Include one or more other config files here. This is useful if you +# have a standard template that goes to all Redis servers but also need +# to customize a few per-server settings. Include files can include +# other files, so use this wisely. +# +# Note that option "include" won't be rewritten by command "CONFIG REWRITE" +# from admin or Redis Sentinel. Since Redis always uses the last processed +# line as value of a configuration directive, you'd better put includes +# at the beginning of this file to avoid overwriting config change at runtime. +# +# If instead you are interested in using includes to override configuration +# options, it is better to use include as the last line. +# +# include /path/to/local.conf +# include /path/to/other.conf + +################################## MODULES ##################################### + +# Load modules at startup. If the server is not able to load modules +# it will abort. It is possible to use multiple loadmodule directives. +# +# loadmodule /path/to/my_module.so +# loadmodule /path/to/other_module.so + +################################## NETWORK ##################################### + +# By default, if no "bind" configuration directive is specified, Redis listens +# for connections from all available network interfaces on the host machine. +# It is possible to listen to just one or multiple selected interfaces using +# the "bind" configuration directive, followed by one or more IP addresses. +# Each address can be prefixed by "-", which means that redis will not fail to +# start if the address is not available. Being not available only refers to +# addresses that does not correspond to any network interfece. Addresses that +# are already in use will always fail, and unsupported protocols will always BE +# silently skipped. +# +# Examples: +# +# bind 192.168.1.100 10.0.0.1 # listens on two specific IPv4 addresses +# bind 127.0.0.1 ::1 # listens on loopback IPv4 and IPv6 +# bind * -::* # like the default, all available interfaces +# +# ~~~ WARNING ~~~ If the computer running Redis is directly exposed to the +# internet, binding to all the interfaces is dangerous and will expose the +# instance to everybody on the internet. So by default we uncomment the +# following bind directive, that will force Redis to listen only on the +# IPv4 and IPv6 (if available) loopback interface addresses (this means Redis +# will only be able to accept client connections from the same host that it is +# running on). +# +# IF YOU ARE SURE YOU WANT YOUR INSTANCE TO LISTEN TO ALL THE INTERFACES +# JUST COMMENT OUT THE FOLLOWING LINE. +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +bind 127.0.0.1 -::1 + +# Protected mode is a layer of security protection, in order to avoid that +# Redis instances left open on the internet are accessed and exploited. +# +# When protected mode is on and if: +# +# 1) The server is not binding explicitly to a set of addresses using the +# "bind" directive. +# 2) No password is configured. +# +# The server only accepts connections from clients connecting from the +# IPv4 and IPv6 loopback addresses 127.0.0.1 and ::1, and from Unix domain +# sockets. +# +# By default protected mode is enabled. You should disable it only if +# you are sure you want clients from other hosts to connect to Redis +# even if no authentication is configured, nor a specific set of interfaces +# are explicitly listed using the "bind" directive. +protected-mode yes + +# Accept connections on the specified port, default is 6379 (IANA #815344). +# If port 0 is specified Redis will not listen on a TCP socket. +port 6379 + +# TCP listen() backlog. +# +# In high requests-per-second environments you need a high backlog in order +# to avoid slow clients connection issues. Note that the Linux kernel +# will silently truncate it to the value of /proc/sys/net/core/somaxconn so +# make sure to raise both the value of somaxconn and tcp_max_syn_backlog +# in order to get the desired effect. +tcp-backlog 511 + +# Unix socket. +# +# Specify the path for the Unix socket that will be used to listen for +# incoming connections. There is no default, so Redis will not listen +# on a unix socket when not specified. +# +# unixsocket /run/redis.sock +# unixsocketperm 700 + +# Close the connection after a client is idle for N seconds (0 to disable) +timeout 0 + +# TCP keepalive. +# +# If non-zero, use SO_KEEPALIVE to send TCP ACKs to clients in absence +# of communication. This is useful for two reasons: +# +# 1) Detect dead peers. +# 2) Force network equipment in the middle to consider the connection to be +# alive. +# +# On Linux, the specified value (in seconds) is the period used to send ACKs. +# Note that to close the connection the double of the time is needed. +# On other kernels the period depends on the kernel configuration. +# +# A reasonable value for this option is 300 seconds, which is the new +# Redis default starting with Redis 3.2.1. +tcp-keepalive 300 + +################################# TLS/SSL ##################################### + +# By default, TLS/SSL is disabled. To enable it, the "tls-port" configuration +# directive can be used to define TLS-listening ports. To enable TLS on the +# default port, use: +# +# port 0 +# tls-port 6379 + +# Configure a X.509 certificate and private key to use for authenticating the +# server to connected clients, masters or cluster peers. These files should be +# PEM formatted. +# +# tls-cert-file redis.crt +# tls-key-file redis.key +# +# If the key file is encrypted using a passphrase, it can be included here +# as well. +# +# tls-key-file-pass secret + +# Normally Redis uses the same certificate for both server functions (accepting +# connections) and client functions (replicating from a master, establishing +# cluster bus connections, etc.). +# +# Sometimes certificates are issued with attributes that designate them as +# client-only or server-only certificates. In that case it may be desired to use +# different certificates for incoming (server) and outgoing (client) +# connections. To do that, use the following directives: +# +# tls-client-cert-file client.crt +# tls-client-key-file client.key +# +# If the key file is encrypted using a passphrase, it can be included here +# as well. +# +# tls-client-key-file-pass secret + +# Configure a DH parameters file to enable Diffie-Hellman (DH) key exchange, +# required by older versions of OpenSSL (<3.0). Newer versions do not require +# this configuration and recommend against it. +# +# tls-dh-params-file redis.dh + +# Configure a CA certificate(s) bundle or directory to authenticate TLS/SSL +# clients and peers. Redis requires an explicit configuration of at least one +# of these, and will not implicitly use the system wide configuration. +# +# tls-ca-cert-file ca.crt +# tls-ca-cert-dir /etc/ssl/certs + +# By default, clients (including replica servers) on a TLS port are required +# to authenticate using valid client side certificates. +# +# If "no" is specified, client certificates are not required and not accepted. +# If "optional" is specified, client certificates are accepted and must be +# valid if provided, but are not required. +# +# tls-auth-clients no +# tls-auth-clients optional + +# By default, a Redis replica does not attempt to establish a TLS connection +# with its master. +# +# Use the following directive to enable TLS on replication links. +# +# tls-replication yes + +# By default, the Redis Cluster bus uses a plain TCP connection. To enable +# TLS for the bus protocol, use the following directive: +# +# tls-cluster yes + +# By default, only TLSv1.2 and TLSv1.3 are enabled and it is highly recommended +# that older formally deprecated versions are kept disabled to reduce the attack surface. +# You can explicitly specify TLS versions to support. +# Allowed values are case insensitive and include "TLSv1", "TLSv1.1", "TLSv1.2", +# "TLSv1.3" (OpenSSL >= 1.1.1) or any combination. +# To enable only TLSv1.2 and TLSv1.3, use: +# +# tls-protocols "TLSv1.2 TLSv1.3" + +# Configure allowed ciphers. See the ciphers(1ssl) manpage for more information +# about the syntax of this string. +# +# Note: this configuration applies only to <= TLSv1.2. +# +# tls-ciphers DEFAULT:!MEDIUM + +# Configure allowed TLSv1.3 ciphersuites. See the ciphers(1ssl) manpage for more +# information about the syntax of this string, and specifically for TLSv1.3 +# ciphersuites. +# +# tls-ciphersuites TLS_CHACHA20_POLY1305_SHA256 + +# When choosing a cipher, use the server's preference instead of the client +# preference. By default, the server follows the client's preference. +# +# tls-prefer-server-ciphers yes + +# By default, TLS session caching is enabled to allow faster and less expensive +# reconnections by clients that support it. Use the following directive to disable +# caching. +# +# tls-session-caching no + +# Change the default number of TLS sessions cached. A zero value sets the cache +# to unlimited size. The default size is 20480. +# +# tls-session-cache-size 5000 + +# Change the default timeout of cached TLS sessions. The default timeout is 300 +# seconds. +# +# tls-session-cache-timeout 60 + +################################# GENERAL ##################################### + +# By default Redis does not run as a daemon. Use 'yes' if you need it. +# Note that Redis will write a pid file in /var/run/redis.pid when daemonized. +# When Redis is supervised by upstart or systemd, this parameter has no impact. +daemonize no + +# If you run Redis from upstart or systemd, Redis can interact with your +# supervision tree. Options: +# supervised no - no supervision interaction +# supervised upstart - signal upstart by putting Redis into SIGSTOP mode +# requires "expect stop" in your upstart job config +# supervised systemd - signal systemd by writing READY=1 to $NOTIFY_SOCKET +# on startup, and updating Redis status on a regular +# basis. +# supervised auto - detect upstart or systemd method based on +# UPSTART_JOB or NOTIFY_SOCKET environment variables +# Note: these supervision methods only signal "process is ready." +# They do not enable continuous pings back to your supervisor. +# +# The default is "no". To run under upstart/systemd, you can simply uncomment +# the line below: +# +# supervised auto + +# If a pid file is specified, Redis writes it where specified at startup +# and removes it at exit. +# +# When the server runs non daemonized, no pid file is created if none is +# specified in the configuration. When the server is daemonized, the pid file +# is used even if not specified, defaulting to "/var/run/redis.pid". +# +# Creating a pid file is best effort: if Redis is not able to create it +# nothing bad happens, the server will start and run normally. +# +# Note that on modern Linux systems "/run/redis.pid" is more conforming +# and should be used instead. +pidfile /var/run/redis_6379.pid + +# Specify the server verbosity level. +# This can be one of: +# debug (a lot of information, useful for development/testing) +# verbose (many rarely useful info, but not a mess like the debug level) +# notice (moderately verbose, what you want in production probably) +# warning (only very important / critical messages are logged) +loglevel notice + +# Specify the log file name. Also the empty string can be used to force +# Redis to log on the standard output. Note that if you use standard +# output for logging but daemonize, logs will be sent to /dev/null +logfile /var/log/redis/redis.log + +# To enable logging to the system logger, just set 'syslog-enabled' to yes, +# and optionally update the other syslog parameters to suit your needs. +# syslog-enabled no + +# Specify the syslog identity. +# syslog-ident redis + +# Specify the syslog facility. Must be USER or between LOCAL0-LOCAL7. +# syslog-facility local0 + +# To disable the built in crash log, which will possibly produce cleaner core +# dumps when they are needed, uncomment the following: +# +# crash-log-enabled no + +# To disable the fast memory check that's run as part of the crash log, which +# will possibly let redis terminate sooner, uncomment the following: +# +# crash-memcheck-enabled no + +# Set the number of databases. The default database is DB 0, you can select +# a different one on a per-connection basis using SELECT where +# dbid is a number between 0 and 'databases'-1 +databases 16 + +# By default Redis shows an ASCII art logo only when started to log to the +# standard output and if the standard output is a TTY and syslog logging is +# disabled. Basically this means that normally a logo is displayed only in +# interactive sessions. +# +# However it is possible to force the pre-4.0 behavior and always show a +# ASCII art logo in startup logs by setting the following option to yes. +always-show-logo no + +# By default, Redis modifies the process title (as seen in 'top' and 'ps') to +# provide some runtime information. It is possible to disable this and leave +# the process name as executed by setting the following to no. +set-proc-title yes + +# When changing the process title, Redis uses the following template to construct +# the modified title. +# +# Template variables are specified in curly brackets. The following variables are +# supported: +# +# {title} Name of process as executed if parent, or type of child process. +# {listen-addr} Bind address or '*' followed by TCP or TLS port listening on, or +# Unix socket if only that's available. +# {server-mode} Special mode, i.e. "[sentinel]" or "[cluster]". +# {port} TCP port listening on, or 0. +# {tls-port} TLS port listening on, or 0. +# {unixsocket} Unix domain socket listening on, or "". +# {config-file} Name of configuration file used. +# +proc-title-template "{title} {listen-addr} {server-mode}" + +################################ SNAPSHOTTING ################################ + +# Save the DB to disk. +# +# save +# +# Redis will save the DB if both the given number of seconds and the given +# number of write operations against the DB occurred. +# +# Snapshotting can be completely disabled with a single empty string argument +# as in following example: +# +# save "" +# +# Unless specified otherwise, by default Redis will save the DB: +# * After 3600 seconds (an hour) if at least 1 key changed +# * After 300 seconds (5 minutes) if at least 100 keys changed +# * After 60 seconds if at least 10000 keys changed +# +# You can set these explicitly by uncommenting the three following lines. +# +# save 3600 1 +# save 300 100 +# save 60 10000 + +# By default Redis will stop accepting writes if RDB snapshots are enabled +# (at least one save point) and the latest background save failed. +# This will make the user aware (in a hard way) that data is not persisting +# on disk properly, otherwise chances are that no one will notice and some +# disaster will happen. +# +# If the background saving process will start working again Redis will +# automatically allow writes again. +# +# However if you have setup your proper monitoring of the Redis server +# and persistence, you may want to disable this feature so that Redis will +# continue to work as usual even if there are problems with disk, +# permissions, and so forth. +stop-writes-on-bgsave-error yes + +# Compress string objects using LZF when dump .rdb databases? +# By default compression is enabled as it's almost always a win. +# If you want to save some CPU in the saving child set it to 'no' but +# the dataset will likely be bigger if you have compressible values or keys. +rdbcompression yes + +# Since version 5 of RDB a CRC64 checksum is placed at the end of the file. +# This makes the format more resistant to corruption but there is a performance +# hit to pay (around 10%) when saving and loading RDB files, so you can disable it +# for maximum performances. +# +# RDB files created with checksum disabled have a checksum of zero that will +# tell the loading code to skip the check. +rdbchecksum yes + +# Enables or disables full sanitation checks for ziplist and listpack etc when +# loading an RDB or RESTORE payload. This reduces the chances of a assertion or +# crash later on while processing commands. +# Options: +# no - Never perform full sanitation +# yes - Always perform full sanitation +# clients - Perform full sanitation only for user connections. +# Excludes: RDB files, RESTORE commands received from the master +# connection, and client connections which have the +# skip-sanitize-payload ACL flag. +# The default should be 'clients' but since it currently affects cluster +# resharding via MIGRATE, it is temporarily set to 'no' by default. +# +# sanitize-dump-payload no + +# The filename where to dump the DB +dbfilename dump.rdb + +# Remove RDB files used by replication in instances without persistence +# enabled. By default this option is disabled, however there are environments +# where for regulations or other security concerns, RDB files persisted on +# disk by masters in order to feed replicas, or stored on disk by replicas +# in order to load them for the initial synchronization, should be deleted +# ASAP. Note that this option ONLY WORKS in instances that have both AOF +# and RDB persistence disabled, otherwise is completely ignored. +# +# An alternative (and sometimes better) way to obtain the same effect is +# to use diskless replication on both master and replicas instances. However +# in the case of replicas, diskless is not always an option. +rdb-del-sync-files no + +# The working directory. +# +# The DB will be written inside this directory, with the filename specified +# above using the 'dbfilename' configuration directive. +# +# The Append Only File will also be created inside this directory. +# +# Note that you must specify a directory here, not a file name. +dir /var/lib/redis + +################################# REPLICATION ################################# + +# Master-Replica replication. Use replicaof to make a Redis instance a copy of +# another Redis server. A few things to understand ASAP about Redis replication. +# +# +------------------+ +---------------+ +# | Master | ---> | Replica | +# | (receive writes) | | (exact copy) | +# +------------------+ +---------------+ +# +# 1) Redis replication is asynchronous, but you can configure a master to +# stop accepting writes if it appears to be not connected with at least +# a given number of replicas. +# 2) Redis replicas are able to perform a partial resynchronization with the +# master if the replication link is lost for a relatively small amount of +# time. You may want to configure the replication backlog size (see the next +# sections of this file) with a sensible value depending on your needs. +# 3) Replication is automatic and does not need user intervention. After a +# network partition replicas automatically try to reconnect to masters +# and resynchronize with them. +# +# replicaof + +# If the master is password protected (using the "requirepass" configuration +# directive below) it is possible to tell the replica to authenticate before +# starting the replication synchronization process, otherwise the master will +# refuse the replica request. +# +# masterauth +# +# However this is not enough if you are using Redis ACLs (for Redis version +# 6 or greater), and the default user is not capable of running the PSYNC +# command and/or other commands needed for replication. In this case it's +# better to configure a special user to use with replication, and specify the +# masteruser configuration as such: +# +# masteruser +# +# When masteruser is specified, the replica will authenticate against its +# master using the new AUTH form: AUTH . + +# When a replica loses its connection with the master, or when the replication +# is still in progress, the replica can act in two different ways: +# +# 1) if replica-serve-stale-data is set to 'yes' (the default) the replica will +# still reply to client requests, possibly with out of date data, or the +# data set may just be empty if this is the first synchronization. +# +# 2) If replica-serve-stale-data is set to 'no' the replica will reply with +# an error "SYNC with master in progress" to all commands except: +# INFO, REPLICAOF, AUTH, PING, SHUTDOWN, REPLCONF, ROLE, CONFIG, SUBSCRIBE, +# UNSUBSCRIBE, PSUBSCRIBE, PUNSUBSCRIBE, PUBLISH, PUBSUB, COMMAND, POST, +# HOST and LATENCY. +# +replica-serve-stale-data yes + +# You can configure a replica instance to accept writes or not. Writing against +# a replica instance may be useful to store some ephemeral data (because data +# written on a replica will be easily deleted after resync with the master) but +# may also cause problems if clients are writing to it because of a +# misconfiguration. +# +# Since Redis 2.6 by default replicas are read-only. +# +# Note: read only replicas are not designed to be exposed to untrusted clients +# on the internet. It's just a protection layer against misuse of the instance. +# Still a read only replica exports by default all the administrative commands +# such as CONFIG, DEBUG, and so forth. To a limited extent you can improve +# security of read only replicas using 'rename-command' to shadow all the +# administrative / dangerous commands. +replica-read-only yes + +# Replication SYNC strategy: disk or socket. +# +# New replicas and reconnecting replicas that are not able to continue the +# replication process just receiving differences, need to do what is called a +# "full synchronization". An RDB file is transmitted from the master to the +# replicas. +# +# The transmission can happen in two different ways: +# +# 1) Disk-backed: The Redis master creates a new process that writes the RDB +# file on disk. Later the file is transferred by the parent +# process to the replicas incrementally. +# 2) Diskless: The Redis master creates a new process that directly writes the +# RDB file to replica sockets, without touching the disk at all. +# +# With disk-backed replication, while the RDB file is generated, more replicas +# can be queued and served with the RDB file as soon as the current child +# producing the RDB file finishes its work. With diskless replication instead +# once the transfer starts, new replicas arriving will be queued and a new +# transfer will start when the current one terminates. +# +# When diskless replication is used, the master waits a configurable amount of +# time (in seconds) before starting the transfer in the hope that multiple +# replicas will arrive and the transfer can be parallelized. +# +# With slow disks and fast (large bandwidth) networks, diskless replication +# works better. +repl-diskless-sync no + +# When diskless replication is enabled, it is possible to configure the delay +# the server waits in order to spawn the child that transfers the RDB via socket +# to the replicas. +# +# This is important since once the transfer starts, it is not possible to serve +# new replicas arriving, that will be queued for the next RDB transfer, so the +# server waits a delay in order to let more replicas arrive. +# +# The delay is specified in seconds, and by default is 5 seconds. To disable +# it entirely just set it to 0 seconds and the transfer will start ASAP. +repl-diskless-sync-delay 5 + +# ----------------------------------------------------------------------------- +# WARNING: RDB diskless load is experimental. Since in this setup the replica +# does not immediately store an RDB on disk, it may cause data loss during +# failovers. RDB diskless load + Redis modules not handling I/O reads may also +# cause Redis to abort in case of I/O errors during the initial synchronization +# stage with the master. Use only if you know what you are doing. +# ----------------------------------------------------------------------------- +# +# Replica can load the RDB it reads from the replication link directly from the +# socket, or store the RDB to a file and read that file after it was completely +# received from the master. +# +# In many cases the disk is slower than the network, and storing and loading +# the RDB file may increase replication time (and even increase the master's +# Copy on Write memory and salve buffers). +# However, parsing the RDB file directly from the socket may mean that we have +# to flush the contents of the current database before the full rdb was +# received. For this reason we have the following options: +# +# "disabled" - Don't use diskless load (store the rdb file to the disk first) +# "on-empty-db" - Use diskless load only when it is completely safe. +# "swapdb" - Keep a copy of the current db contents in RAM while parsing +# the data directly from the socket. note that this requires +# sufficient memory, if you don't have it, you risk an OOM kill. +repl-diskless-load disabled + +# Replicas send PINGs to server in a predefined interval. It's possible to +# change this interval with the repl_ping_replica_period option. The default +# value is 10 seconds. +# +# repl-ping-replica-period 10 + +# The following option sets the replication timeout for: +# +# 1) Bulk transfer I/O during SYNC, from the point of view of replica. +# 2) Master timeout from the point of view of replicas (data, pings). +# 3) Replica timeout from the point of view of masters (REPLCONF ACK pings). +# +# It is important to make sure that this value is greater than the value +# specified for repl-ping-replica-period otherwise a timeout will be detected +# every time there is low traffic between the master and the replica. The default +# value is 60 seconds. +# +# repl-timeout 60 + +# Disable TCP_NODELAY on the replica socket after SYNC? +# +# If you select "yes" Redis will use a smaller number of TCP packets and +# less bandwidth to send data to replicas. But this can add a delay for +# the data to appear on the replica side, up to 40 milliseconds with +# Linux kernels using a default configuration. +# +# If you select "no" the delay for data to appear on the replica side will +# be reduced but more bandwidth will be used for replication. +# +# By default we optimize for low latency, but in very high traffic conditions +# or when the master and replicas are many hops away, turning this to "yes" may +# be a good idea. +repl-disable-tcp-nodelay no + +# Set the replication backlog size. The backlog is a buffer that accumulates +# replica data when replicas are disconnected for some time, so that when a +# replica wants to reconnect again, often a full resync is not needed, but a +# partial resync is enough, just passing the portion of data the replica +# missed while disconnected. +# +# The bigger the replication backlog, the longer the replica can endure the +# disconnect and later be able to perform a partial resynchronization. +# +# The backlog is only allocated if there is at least one replica connected. +# +# repl-backlog-size 1mb + +# After a master has no connected replicas for some time, the backlog will be +# freed. The following option configures the amount of seconds that need to +# elapse, starting from the time the last replica disconnected, for the backlog +# buffer to be freed. +# +# Note that replicas never free the backlog for timeout, since they may be +# promoted to masters later, and should be able to correctly "partially +# resynchronize" with other replicas: hence they should always accumulate backlog. +# +# A value of 0 means to never release the backlog. +# +# repl-backlog-ttl 3600 + +# The replica priority is an integer number published by Redis in the INFO +# output. It is used by Redis Sentinel in order to select a replica to promote +# into a master if the master is no longer working correctly. +# +# A replica with a low priority number is considered better for promotion, so +# for instance if there are three replicas with priority 10, 100, 25 Sentinel +# will pick the one with priority 10, that is the lowest. +# +# However a special priority of 0 marks the replica as not able to perform the +# role of master, so a replica with priority of 0 will never be selected by +# Redis Sentinel for promotion. +# +# By default the priority is 100. +replica-priority 100 + +# ----------------------------------------------------------------------------- +# By default, Redis Sentinel includes all replicas in its reports. A replica +# can be excluded from Redis Sentinel's announcements. An unannounced replica +# will be ignored by the 'sentinel replicas ' command and won't be +# exposed to Redis Sentinel's clients. +# +# This option does not change the behavior of replica-priority. Even with +# replica-announced set to 'no', the replica can be promoted to master. To +# prevent this behavior, set replica-priority to 0. +# +# replica-announced yes + +# It is possible for a master to stop accepting writes if there are less than +# N replicas connected, having a lag less or equal than M seconds. +# +# The N replicas need to be in "online" state. +# +# The lag in seconds, that must be <= the specified value, is calculated from +# the last ping received from the replica, that is usually sent every second. +# +# This option does not GUARANTEE that N replicas will accept the write, but +# will limit the window of exposure for lost writes in case not enough replicas +# are available, to the specified number of seconds. +# +# For example to require at least 3 replicas with a lag <= 10 seconds use: +# +# min-replicas-to-write 3 +# min-replicas-max-lag 10 +# +# Setting one or the other to 0 disables the feature. +# +# By default min-replicas-to-write is set to 0 (feature disabled) and +# min-replicas-max-lag is set to 10. + +# A Redis master is able to list the address and port of the attached +# replicas in different ways. For example the "INFO replication" section +# offers this information, which is used, among other tools, by +# Redis Sentinel in order to discover replica instances. +# Another place where this info is available is in the output of the +# "ROLE" command of a master. +# +# The listed IP address and port normally reported by a replica is +# obtained in the following way: +# +# IP: The address is auto detected by checking the peer address +# of the socket used by the replica to connect with the master. +# +# Port: The port is communicated by the replica during the replication +# handshake, and is normally the port that the replica is using to +# listen for connections. +# +# However when port forwarding or Network Address Translation (NAT) is +# used, the replica may actually be reachable via different IP and port +# pairs. The following two options can be used by a replica in order to +# report to its master a specific set of IP and port, so that both INFO +# and ROLE will report those values. +# +# There is no need to use both the options if you need to override just +# the port or the IP address. +# +# replica-announce-ip 5.5.5.5 +# replica-announce-port 1234 + +############################### KEYS TRACKING ################################# + +# Redis implements server assisted support for client side caching of values. +# This is implemented using an invalidation table that remembers, using +# a radix key indexed by key name, what clients have which keys. In turn +# this is used in order to send invalidation messages to clients. Please +# check this page to understand more about the feature: +# +# https://redis.io/topics/client-side-caching +# +# When tracking is enabled for a client, all the read only queries are assumed +# to be cached: this will force Redis to store information in the invalidation +# table. When keys are modified, such information is flushed away, and +# invalidation messages are sent to the clients. However if the workload is +# heavily dominated by reads, Redis could use more and more memory in order +# to track the keys fetched by many clients. +# +# For this reason it is possible to configure a maximum fill value for the +# invalidation table. By default it is set to 1M of keys, and once this limit +# is reached, Redis will start to evict keys in the invalidation table +# even if they were not modified, just to reclaim memory: this will in turn +# force the clients to invalidate the cached values. Basically the table +# maximum size is a trade off between the memory you want to spend server +# side to track information about who cached what, and the ability of clients +# to retain cached objects in memory. +# +# If you set the value to 0, it means there are no limits, and Redis will +# retain as many keys as needed in the invalidation table. +# In the "stats" INFO section, you can find information about the number of +# keys in the invalidation table at every given moment. +# +# Note: when key tracking is used in broadcasting mode, no memory is used +# in the server side so this setting is useless. +# +# tracking-table-max-keys 1000000 + +################################## SECURITY ################################### + +# Warning: since Redis is pretty fast, an outside user can try up to +# 1 million passwords per second against a modern box. This means that you +# should use very strong passwords, otherwise they will be very easy to break. +# Note that because the password is really a shared secret between the client +# and the server, and should not be memorized by any human, the password +# can be easily a long string from /dev/urandom or whatever, so by using a +# long and unguessable password no brute force attack will be possible. + +# Redis ACL users are defined in the following format: +# +# user ... acl rules ... +# +# For example: +# +# user worker +@list +@connection ~jobs:* on >ffa9203c493aa99 +# +# The special username "default" is used for new connections. If this user +# has the "nopass" rule, then new connections will be immediately authenticated +# as the "default" user without the need of any password provided via the +# AUTH command. Otherwise if the "default" user is not flagged with "nopass" +# the connections will start in not authenticated state, and will require +# AUTH (or the HELLO command AUTH option) in order to be authenticated and +# start to work. +# +# The ACL rules that describe what a user can do are the following: +# +# on Enable the user: it is possible to authenticate as this user. +# off Disable the user: it's no longer possible to authenticate +# with this user, however the already authenticated connections +# will still work. +# skip-sanitize-payload RESTORE dump-payload sanitation is skipped. +# sanitize-payload RESTORE dump-payload is sanitized (default). +# + Allow the execution of that command +# - Disallow the execution of that command +# +@ Allow the execution of all the commands in such category +# with valid categories are like @admin, @set, @sortedset, ... +# and so forth, see the full list in the server.c file where +# the Redis command table is described and defined. +# The special category @all means all the commands, but currently +# present in the server, and that will be loaded in the future +# via modules. +# +|subcommand Allow a specific subcommand of an otherwise +# disabled command. Note that this form is not +# allowed as negative like -DEBUG|SEGFAULT, but +# only additive starting with "+". +# allcommands Alias for +@all. Note that it implies the ability to execute +# all the future commands loaded via the modules system. +# nocommands Alias for -@all. +# ~ Add a pattern of keys that can be mentioned as part of +# commands. For instance ~* allows all the keys. The pattern +# is a glob-style pattern like the one of KEYS. +# It is possible to specify multiple patterns. +# allkeys Alias for ~* +# resetkeys Flush the list of allowed keys patterns. +# & Add a glob-style pattern of Pub/Sub channels that can be +# accessed by the user. It is possible to specify multiple channel +# patterns. +# allchannels Alias for &* +# resetchannels Flush the list of allowed channel patterns. +# > Add this password to the list of valid password for the user. +# For example >mypass will add "mypass" to the list. +# This directive clears the "nopass" flag (see later). +# < Remove this password from the list of valid passwords. +# nopass All the set passwords of the user are removed, and the user +# is flagged as requiring no password: it means that every +# password will work against this user. If this directive is +# used for the default user, every new connection will be +# immediately authenticated with the default user without +# any explicit AUTH command required. Note that the "resetpass" +# directive will clear this condition. +# resetpass Flush the list of allowed passwords. Moreover removes the +# "nopass" status. After "resetpass" the user has no associated +# passwords and there is no way to authenticate without adding +# some password (or setting it as "nopass" later). +# reset Performs the following actions: resetpass, resetkeys, off, +# -@all. The user returns to the same state it has immediately +# after its creation. +# +# ACL rules can be specified in any order: for instance you can start with +# passwords, then flags, or key patterns. However note that the additive +# and subtractive rules will CHANGE MEANING depending on the ordering. +# For instance see the following example: +# +# user alice on +@all -DEBUG ~* >somepassword +# +# This will allow "alice" to use all the commands with the exception of the +# DEBUG command, since +@all added all the commands to the set of the commands +# alice can use, and later DEBUG was removed. However if we invert the order +# of two ACL rules the result will be different: +# +# user alice on -DEBUG +@all ~* >somepassword +# +# Now DEBUG was removed when alice had yet no commands in the set of allowed +# commands, later all the commands are added, so the user will be able to +# execute everything. +# +# Basically ACL rules are processed left-to-right. +# +# For more information about ACL configuration please refer to +# the Redis web site at https://redis.io/topics/acl + +# ACL LOG +# +# The ACL Log tracks failed commands and authentication events associated +# with ACLs. The ACL Log is useful to troubleshoot failed commands blocked +# by ACLs. The ACL Log is stored in memory. You can reclaim memory with +# ACL LOG RESET. Define the maximum entry length of the ACL Log below. +acllog-max-len 128 + +# Using an external ACL file +# +# Instead of configuring users here in this file, it is possible to use +# a stand-alone file just listing users. The two methods cannot be mixed: +# if you configure users here and at the same time you activate the external +# ACL file, the server will refuse to start. +# +# The format of the external ACL user file is exactly the same as the +# format that is used inside redis.conf to describe users. +# +# aclfile /etc/redis/users.acl + +# IMPORTANT NOTE: starting with Redis 6 "requirepass" is just a compatibility +# layer on top of the new ACL system. The option effect will be just setting +# the password for the default user. Clients will still authenticate using +# AUTH as usually, or more explicitly with AUTH default +# if they follow the new protocol: both will work. +# +# The requirepass is not compatable with aclfile option and the ACL LOAD +# command, these will cause requirepass to be ignored. +# +# requirepass foobared + +# New users are initialized with restrictive permissions by default, via the +# equivalent of this ACL rule 'off resetkeys -@all'. Starting with Redis 6.2, it +# is possible to manage access to Pub/Sub channels with ACL rules as well. The +# default Pub/Sub channels permission if new users is controlled by the +# acl-pubsub-default configuration directive, which accepts one of these values: +# +# allchannels: grants access to all Pub/Sub channels +# resetchannels: revokes access to all Pub/Sub channels +# +# To ensure backward compatibility while upgrading Redis 6.0, acl-pubsub-default +# defaults to the 'allchannels' permission. +# +# Future compatibility note: it is very likely that in a future version of Redis +# the directive's default of 'allchannels' will be changed to 'resetchannels' in +# order to provide better out-of-the-box Pub/Sub security. Therefore, it is +# recommended that you explicitly define Pub/Sub permissions for all users +# rather then rely on implicit default values. Once you've set explicit +# Pub/Sub for all existing users, you should uncomment the following line. +# +# acl-pubsub-default resetchannels + +# Command renaming (DEPRECATED). +# +# ------------------------------------------------------------------------ +# WARNING: avoid using this option if possible. Instead use ACLs to remove +# commands from the default user, and put them only in some admin user you +# create for administrative purposes. +# ------------------------------------------------------------------------ +# +# It is possible to change the name of dangerous commands in a shared +# environment. For instance the CONFIG command may be renamed into something +# hard to guess so that it will still be available for internal-use tools +# but not available for general clients. +# +# Example: +# +# rename-command CONFIG b840fc02d524045429941cc15f59e41cb7be6c52 +# +# It is also possible to completely kill a command by renaming it into +# an empty string: +# +# rename-command CONFIG "" +# +# Please note that changing the name of commands that are logged into the +# AOF file or transmitted to replicas may cause problems. + +################################### CLIENTS #################################### + +# Set the max number of connected clients at the same time. By default +# this limit is set to 10000 clients, however if the Redis server is not +# able to configure the process file limit to allow for the specified limit +# the max number of allowed clients is set to the current file limit +# minus 32 (as Redis reserves a few file descriptors for internal uses). +# +# Once the limit is reached Redis will close all the new connections sending +# an error 'max number of clients reached'. +# +# IMPORTANT: When Redis Cluster is used, the max number of connections is also +# shared with the cluster bus: every node in the cluster will use two +# connections, one incoming and another outgoing. It is important to size the +# limit accordingly in case of very large clusters. +# +# maxclients 10000 + +############################## MEMORY MANAGEMENT ################################ + +# Set a memory usage limit to the specified amount of bytes. +# When the memory limit is reached Redis will try to remove keys +# according to the eviction policy selected (see maxmemory-policy). +# +# If Redis can't remove keys according to the policy, or if the policy is +# set to 'noeviction', Redis will start to reply with errors to commands +# that would use more memory, like SET, LPUSH, and so on, and will continue +# to reply to read-only commands like GET. +# +# This option is usually useful when using Redis as an LRU or LFU cache, or to +# set a hard memory limit for an instance (using the 'noeviction' policy). +# +# WARNING: If you have replicas attached to an instance with maxmemory on, +# the size of the output buffers needed to feed the replicas are subtracted +# from the used memory count, so that network problems / resyncs will +# not trigger a loop where keys are evicted, and in turn the output +# buffer of replicas is full with DELs of keys evicted triggering the deletion +# of more keys, and so forth until the database is completely emptied. +# +# In short... if you have replicas attached it is suggested that you set a lower +# limit for maxmemory so that there is some free RAM on the system for replica +# output buffers (but this is not needed if the policy is 'noeviction'). +# +# maxmemory + +# MAXMEMORY POLICY: how Redis will select what to remove when maxmemory +# is reached. You can select one from the following behaviors: +# +# volatile-lru -> Evict using approximated LRU, only keys with an expire set. +# allkeys-lru -> Evict any key using approximated LRU. +# volatile-lfu -> Evict using approximated LFU, only keys with an expire set. +# allkeys-lfu -> Evict any key using approximated LFU. +# volatile-random -> Remove a random key having an expire set. +# allkeys-random -> Remove a random key, any key. +# volatile-ttl -> Remove the key with the nearest expire time (minor TTL) +# noeviction -> Don't evict anything, just return an error on write operations. +# +# LRU means Least Recently Used +# LFU means Least Frequently Used +# +# Both LRU, LFU and volatile-ttl are implemented using approximated +# randomized algorithms. +# +# Note: with any of the above policies, when there are no suitable keys for +# eviction, Redis will return an error on write operations that require +# more memory. These are usually commands that create new keys, add data or +# modify existing keys. A few examples are: SET, INCR, HSET, LPUSH, SUNIONSTORE, +# SORT (due to the STORE argument), and EXEC (if the transaction includes any +# command that requires memory). +# +# The default is: +# +# maxmemory-policy noeviction + +# LRU, LFU and minimal TTL algorithms are not precise algorithms but approximated +# algorithms (in order to save memory), so you can tune it for speed or +# accuracy. By default Redis will check five keys and pick the one that was +# used least recently, you can change the sample size using the following +# configuration directive. +# +# The default of 5 produces good enough results. 10 Approximates very closely +# true LRU but costs more CPU. 3 is faster but not very accurate. +# +# maxmemory-samples 5 + +# Eviction processing is designed to function well with the default setting. +# If there is an unusually large amount of write traffic, this value may need to +# be increased. Decreasing this value may reduce latency at the risk of +# eviction processing effectiveness +# 0 = minimum latency, 10 = default, 100 = process without regard to latency +# +# maxmemory-eviction-tenacity 10 + +# Starting from Redis 5, by default a replica will ignore its maxmemory setting +# (unless it is promoted to master after a failover or manually). It means +# that the eviction of keys will be just handled by the master, sending the +# DEL commands to the replica as keys evict in the master side. +# +# This behavior ensures that masters and replicas stay consistent, and is usually +# what you want, however if your replica is writable, or you want the replica +# to have a different memory setting, and you are sure all the writes performed +# to the replica are idempotent, then you may change this default (but be sure +# to understand what you are doing). +# +# Note that since the replica by default does not evict, it may end using more +# memory than the one set via maxmemory (there are certain buffers that may +# be larger on the replica, or data structures may sometimes take more memory +# and so forth). So make sure you monitor your replicas and make sure they +# have enough memory to never hit a real out-of-memory condition before the +# master hits the configured maxmemory setting. +# +# replica-ignore-maxmemory yes + +# Redis reclaims expired keys in two ways: upon access when those keys are +# found to be expired, and also in background, in what is called the +# "active expire key". The key space is slowly and interactively scanned +# looking for expired keys to reclaim, so that it is possible to free memory +# of keys that are expired and will never be accessed again in a short time. +# +# The default effort of the expire cycle will try to avoid having more than +# ten percent of expired keys still in memory, and will try to avoid consuming +# more than 25% of total memory and to add latency to the system. However +# it is possible to increase the expire "effort" that is normally set to +# "1", to a greater value, up to the value "10". At its maximum value the +# system will use more CPU, longer cycles (and technically may introduce +# more latency), and will tolerate less already expired keys still present +# in the system. It's a tradeoff between memory, CPU and latency. +# +# active-expire-effort 1 + +############################# LAZY FREEING #################################### + +# Redis has two primitives to delete keys. One is called DEL and is a blocking +# deletion of the object. It means that the server stops processing new commands +# in order to reclaim all the memory associated with an object in a synchronous +# way. If the key deleted is associated with a small object, the time needed +# in order to execute the DEL command is very small and comparable to most other +# O(1) or O(log_N) commands in Redis. However if the key is associated with an +# aggregated value containing millions of elements, the server can block for +# a long time (even seconds) in order to complete the operation. +# +# For the above reasons Redis also offers non blocking deletion primitives +# such as UNLINK (non blocking DEL) and the ASYNC option of FLUSHALL and +# FLUSHDB commands, in order to reclaim memory in background. Those commands +# are executed in constant time. Another thread will incrementally free the +# object in the background as fast as possible. +# +# DEL, UNLINK and ASYNC option of FLUSHALL and FLUSHDB are user-controlled. +# It's up to the design of the application to understand when it is a good +# idea to use one or the other. However the Redis server sometimes has to +# delete keys or flush the whole database as a side effect of other operations. +# Specifically Redis deletes objects independently of a user call in the +# following scenarios: +# +# 1) On eviction, because of the maxmemory and maxmemory policy configurations, +# in order to make room for new data, without going over the specified +# memory limit. +# 2) Because of expire: when a key with an associated time to live (see the +# EXPIRE command) must be deleted from memory. +# 3) Because of a side effect of a command that stores data on a key that may +# already exist. For example the RENAME command may delete the old key +# content when it is replaced with another one. Similarly SUNIONSTORE +# or SORT with STORE option may delete existing keys. The SET command +# itself removes any old content of the specified key in order to replace +# it with the specified string. +# 4) During replication, when a replica performs a full resynchronization with +# its master, the content of the whole database is removed in order to +# load the RDB file just transferred. +# +# In all the above cases the default is to delete objects in a blocking way, +# like if DEL was called. However you can configure each case specifically +# in order to instead release memory in a non-blocking way like if UNLINK +# was called, using the following configuration directives. + +lazyfree-lazy-eviction no +lazyfree-lazy-expire no +lazyfree-lazy-server-del no +replica-lazy-flush no + +# It is also possible, for the case when to replace the user code DEL calls +# with UNLINK calls is not easy, to modify the default behavior of the DEL +# command to act exactly like UNLINK, using the following configuration +# directive: + +lazyfree-lazy-user-del no + +# FLUSHDB, FLUSHALL, and SCRIPT FLUSH support both asynchronous and synchronous +# deletion, which can be controlled by passing the [SYNC|ASYNC] flags into the +# commands. When neither flag is passed, this directive will be used to determine +# if the data should be deleted asynchronously. + +lazyfree-lazy-user-flush no + +################################ THREADED I/O ################################# + +# Redis is mostly single threaded, however there are certain threaded +# operations such as UNLINK, slow I/O accesses and other things that are +# performed on side threads. +# +# Now it is also possible to handle Redis clients socket reads and writes +# in different I/O threads. Since especially writing is so slow, normally +# Redis users use pipelining in order to speed up the Redis performances per +# core, and spawn multiple instances in order to scale more. Using I/O +# threads it is possible to easily speedup two times Redis without resorting +# to pipelining nor sharding of the instance. +# +# By default threading is disabled, we suggest enabling it only in machines +# that have at least 4 or more cores, leaving at least one spare core. +# Using more than 8 threads is unlikely to help much. We also recommend using +# threaded I/O only if you actually have performance problems, with Redis +# instances being able to use a quite big percentage of CPU time, otherwise +# there is no point in using this feature. +# +# So for instance if you have a four cores boxes, try to use 2 or 3 I/O +# threads, if you have a 8 cores, try to use 6 threads. In order to +# enable I/O threads use the following configuration directive: +# +# io-threads 4 +# +# Setting io-threads to 1 will just use the main thread as usual. +# When I/O threads are enabled, we only use threads for writes, that is +# to thread the write(2) syscall and transfer the client buffers to the +# socket. However it is also possible to enable threading of reads and +# protocol parsing using the following configuration directive, by setting +# it to yes: +# +# io-threads-do-reads no +# +# Usually threading reads doesn't help much. +# +# NOTE 1: This configuration directive cannot be changed at runtime via +# CONFIG SET. Aso this feature currently does not work when SSL is +# enabled. +# +# NOTE 2: If you want to test the Redis speedup using redis-benchmark, make +# sure you also run the benchmark itself in threaded mode, using the +# --threads option to match the number of Redis threads, otherwise you'll not +# be able to notice the improvements. + +############################ KERNEL OOM CONTROL ############################## + +# On Linux, it is possible to hint the kernel OOM killer on what processes +# should be killed first when out of memory. +# +# Enabling this feature makes Redis actively control the oom_score_adj value +# for all its processes, depending on their role. The default scores will +# attempt to have background child processes killed before all others, and +# replicas killed before masters. +# +# Redis supports three options: +# +# no: Don't make changes to oom-score-adj (default). +# yes: Alias to "relative" see below. +# absolute: Values in oom-score-adj-values are written as is to the kernel. +# relative: Values are used relative to the initial value of oom_score_adj when +# the server starts and are then clamped to a range of -1000 to 1000. +# Because typically the initial value is 0, they will often match the +# absolute values. +oom-score-adj no + +# When oom-score-adj is used, this directive controls the specific values used +# for master, replica and background child processes. Values range -2000 to +# 2000 (higher means more likely to be killed). +# +# Unprivileged processes (not root, and without CAP_SYS_RESOURCE capabilities) +# can freely increase their value, but not decrease it below its initial +# settings. This means that setting oom-score-adj to "relative" and setting the +# oom-score-adj-values to positive values will always succeed. +oom-score-adj-values 0 200 800 + + +#################### KERNEL transparent hugepage CONTROL ###################### + +# Usually the kernel Transparent Huge Pages control is set to "madvise" or +# or "never" by default (/sys/kernel/mm/transparent_hugepage/enabled), in which +# case this config has no effect. On systems in which it is set to "always", +# redis will attempt to disable it specifically for the redis process in order +# to avoid latency problems specifically with fork(2) and CoW. +# If for some reason you prefer to keep it enabled, you can set this config to +# "no" and the kernel global to "always". + +disable-thp yes + +############################## APPEND ONLY MODE ############################### + +# By default Redis asynchronously dumps the dataset on disk. This mode is +# good enough in many applications, but an issue with the Redis process or +# a power outage may result into a few minutes of writes lost (depending on +# the configured save points). +# +# The Append Only File is an alternative persistence mode that provides +# much better durability. For instance using the default data fsync policy +# (see later in the config file) Redis can lose just one second of writes in a +# dramatic event like a server power outage, or a single write if something +# wrong with the Redis process itself happens, but the operating system is +# still running correctly. +# +# AOF and RDB persistence can be enabled at the same time without problems. +# If the AOF is enabled on startup Redis will load the AOF, that is the file +# with the better durability guarantees. +# +# Please check https://redis.io/topics/persistence for more information. + +appendonly no + +# The name of the append only file (default: "appendonly.aof") + +appendfilename "appendonly.aof" + +# The fsync() call tells the Operating System to actually write data on disk +# instead of waiting for more data in the output buffer. Some OS will really flush +# data on disk, some other OS will just try to do it ASAP. +# +# Redis supports three different modes: +# +# no: don't fsync, just let the OS flush the data when it wants. Faster. +# always: fsync after every write to the append only log. Slow, Safest. +# everysec: fsync only one time every second. Compromise. +# +# The default is "everysec", as that's usually the right compromise between +# speed and data safety. It's up to you to understand if you can relax this to +# "no" that will let the operating system flush the output buffer when +# it wants, for better performances (but if you can live with the idea of +# some data loss consider the default persistence mode that's snapshotting), +# or on the contrary, use "always" that's very slow but a bit safer than +# everysec. +# +# More details please check the following article: +# http://antirez.com/post/redis-persistence-demystified.html +# +# If unsure, use "everysec". + +# appendfsync always +appendfsync everysec +# appendfsync no + +# When the AOF fsync policy is set to always or everysec, and a background +# saving process (a background save or AOF log background rewriting) is +# performing a lot of I/O against the disk, in some Linux configurations +# Redis may block too long on the fsync() call. Note that there is no fix for +# this currently, as even performing fsync in a different thread will block +# our synchronous write(2) call. +# +# In order to mitigate this problem it's possible to use the following option +# that will prevent fsync() from being called in the main process while a +# BGSAVE or BGREWRITEAOF is in progress. +# +# This means that while another child is saving, the durability of Redis is +# the same as "appendfsync none". In practical terms, this means that it is +# possible to lose up to 30 seconds of log in the worst scenario (with the +# default Linux settings). +# +# If you have latency problems turn this to "yes". Otherwise leave it as +# "no" that is the safest pick from the point of view of durability. + +no-appendfsync-on-rewrite no + +# Automatic rewrite of the append only file. +# Redis is able to automatically rewrite the log file implicitly calling +# BGREWRITEAOF when the AOF log size grows by the specified percentage. +# +# This is how it works: Redis remembers the size of the AOF file after the +# latest rewrite (if no rewrite has happened since the restart, the size of +# the AOF at startup is used). +# +# This base size is compared to the current size. If the current size is +# bigger than the specified percentage, the rewrite is triggered. Also +# you need to specify a minimal size for the AOF file to be rewritten, this +# is useful to avoid rewriting the AOF file even if the percentage increase +# is reached but it is still pretty small. +# +# Specify a percentage of zero in order to disable the automatic AOF +# rewrite feature. + +auto-aof-rewrite-percentage 100 +auto-aof-rewrite-min-size 64mb + +# An AOF file may be found to be truncated at the end during the Redis +# startup process, when the AOF data gets loaded back into memory. +# This may happen when the system where Redis is running +# crashes, especially when an ext4 filesystem is mounted without the +# data=ordered option (however this can't happen when Redis itself +# crashes or aborts but the operating system still works correctly). +# +# Redis can either exit with an error when this happens, or load as much +# data as possible (the default now) and start if the AOF file is found +# to be truncated at the end. The following option controls this behavior. +# +# If aof-load-truncated is set to yes, a truncated AOF file is loaded and +# the Redis server starts emitting a log to inform the user of the event. +# Otherwise if the option is set to no, the server aborts with an error +# and refuses to start. When the option is set to no, the user requires +# to fix the AOF file using the "redis-check-aof" utility before to restart +# the server. +# +# Note that if the AOF file will be found to be corrupted in the middle +# the server will still exit with an error. This option only applies when +# Redis will try to read more data from the AOF file but not enough bytes +# will be found. +aof-load-truncated yes + +# When rewriting the AOF file, Redis is able to use an RDB preamble in the +# AOF file for faster rewrites and recoveries. When this option is turned +# on the rewritten AOF file is composed of two different stanzas: +# +# [RDB file][AOF tail] +# +# When loading, Redis recognizes that the AOF file starts with the "REDIS" +# string and loads the prefixed RDB file, then continues loading the AOF +# tail. +aof-use-rdb-preamble yes + +################################ LUA SCRIPTING ############################### + +# Max execution time of a Lua script in milliseconds. +# +# If the maximum execution time is reached Redis will log that a script is +# still in execution after the maximum allowed time and will start to +# reply to queries with an error. +# +# When a long running script exceeds the maximum execution time only the +# SCRIPT KILL and SHUTDOWN NOSAVE commands are available. The first can be +# used to stop a script that did not yet call any write commands. The second +# is the only way to shut down the server in the case a write command was +# already issued by the script but the user doesn't want to wait for the natural +# termination of the script. +# +# Set it to 0 or a negative value for unlimited execution without warnings. +lua-time-limit 5000 + +################################ REDIS CLUSTER ############################### + +# Normal Redis instances can't be part of a Redis Cluster; only nodes that are +# started as cluster nodes can. In order to start a Redis instance as a +# cluster node enable the cluster support uncommenting the following: +# +# cluster-enabled yes + +# Every cluster node has a cluster configuration file. This file is not +# intended to be edited by hand. It is created and updated by Redis nodes. +# Every Redis Cluster node requires a different cluster configuration file. +# Make sure that instances running in the same system do not have +# overlapping cluster configuration file names. +# +# cluster-config-file nodes-6379.conf + +# Cluster node timeout is the amount of milliseconds a node must be unreachable +# for it to be considered in failure state. +# Most other internal time limits are a multiple of the node timeout. +# +# cluster-node-timeout 15000 + +# A replica of a failing master will avoid to start a failover if its data +# looks too old. +# +# There is no simple way for a replica to actually have an exact measure of +# its "data age", so the following two checks are performed: +# +# 1) If there are multiple replicas able to failover, they exchange messages +# in order to try to give an advantage to the replica with the best +# replication offset (more data from the master processed). +# Replicas will try to get their rank by offset, and apply to the start +# of the failover a delay proportional to their rank. +# +# 2) Every single replica computes the time of the last interaction with +# its master. This can be the last ping or command received (if the master +# is still in the "connected" state), or the time that elapsed since the +# disconnection with the master (if the replication link is currently down). +# If the last interaction is too old, the replica will not try to failover +# at all. +# +# The point "2" can be tuned by user. Specifically a replica will not perform +# the failover if, since the last interaction with the master, the time +# elapsed is greater than: +# +# (node-timeout * cluster-replica-validity-factor) + repl-ping-replica-period +# +# So for example if node-timeout is 30 seconds, and the cluster-replica-validity-factor +# is 10, and assuming a default repl-ping-replica-period of 10 seconds, the +# replica will not try to failover if it was not able to talk with the master +# for longer than 310 seconds. +# +# A large cluster-replica-validity-factor may allow replicas with too old data to failover +# a master, while a too small value may prevent the cluster from being able to +# elect a replica at all. +# +# For maximum availability, it is possible to set the cluster-replica-validity-factor +# to a value of 0, which means, that replicas will always try to failover the +# master regardless of the last time they interacted with the master. +# (However they'll always try to apply a delay proportional to their +# offset rank). +# +# Zero is the only value able to guarantee that when all the partitions heal +# the cluster will always be able to continue. +# +# cluster-replica-validity-factor 10 + +# Cluster replicas are able to migrate to orphaned masters, that are masters +# that are left without working replicas. This improves the cluster ability +# to resist to failures as otherwise an orphaned master can't be failed over +# in case of failure if it has no working replicas. +# +# Replicas migrate to orphaned masters only if there are still at least a +# given number of other working replicas for their old master. This number +# is the "migration barrier". A migration barrier of 1 means that a replica +# will migrate only if there is at least 1 other working replica for its master +# and so forth. It usually reflects the number of replicas you want for every +# master in your cluster. +# +# Default is 1 (replicas migrate only if their masters remain with at least +# one replica). To disable migration just set it to a very large value or +# set cluster-allow-replica-migration to 'no'. +# A value of 0 can be set but is useful only for debugging and dangerous +# in production. +# +# cluster-migration-barrier 1 + +# Turning off this option allows to use less automatic cluster configuration. +# It both disables migration to orphaned masters and migration from masters +# that became empty. +# +# Default is 'yes' (allow automatic migrations). +# +# cluster-allow-replica-migration yes + +# By default Redis Cluster nodes stop accepting queries if they detect there +# is at least a hash slot uncovered (no available node is serving it). +# This way if the cluster is partially down (for example a range of hash slots +# are no longer covered) all the cluster becomes, eventually, unavailable. +# It automatically returns available as soon as all the slots are covered again. +# +# However sometimes you want the subset of the cluster which is working, +# to continue to accept queries for the part of the key space that is still +# covered. In order to do so, just set the cluster-require-full-coverage +# option to no. +# +# cluster-require-full-coverage yes + +# This option, when set to yes, prevents replicas from trying to failover its +# master during master failures. However the replica can still perform a +# manual failover, if forced to do so. +# +# This is useful in different scenarios, especially in the case of multiple +# data center operations, where we want one side to never be promoted if not +# in the case of a total DC failure. +# +# cluster-replica-no-failover no + +# This option, when set to yes, allows nodes to serve read traffic while the +# the cluster is in a down state, as long as it believes it owns the slots. +# +# This is useful for two cases. The first case is for when an application +# doesn't require consistency of data during node failures or network partitions. +# One example of this is a cache, where as long as the node has the data it +# should be able to serve it. +# +# The second use case is for configurations that don't meet the recommended +# three shards but want to enable cluster mode and scale later. A +# master outage in a 1 or 2 shard configuration causes a read/write outage to the +# entire cluster without this option set, with it set there is only a write outage. +# Without a quorum of masters, slot ownership will not change automatically. +# +# cluster-allow-reads-when-down no + +# In order to setup your cluster make sure to read the documentation +# available at https://redis.io web site. + +########################## CLUSTER DOCKER/NAT support ######################## + +# In certain deployments, Redis Cluster nodes address discovery fails, because +# addresses are NAT-ted or because ports are forwarded (the typical case is +# Docker and other containers). +# +# In order to make Redis Cluster working in such environments, a static +# configuration where each node knows its public address is needed. The +# following four options are used for this scope, and are: +# +# * cluster-announce-ip +# * cluster-announce-port +# * cluster-announce-tls-port +# * cluster-announce-bus-port +# +# Each instructs the node about its address, client ports (for connections +# without and with TLS) and cluster message bus port. The information is then +# published in the header of the bus packets so that other nodes will be able to +# correctly map the address of the node publishing the information. +# +# If cluster-tls is set to yes and cluster-announce-tls-port is omitted or set +# to zero, then cluster-announce-port refers to the TLS port. Note also that +# cluster-announce-tls-port has no effect if cluster-tls is set to no. +# +# If the above options are not used, the normal Redis Cluster auto-detection +# will be used instead. +# +# Note that when remapped, the bus port may not be at the fixed offset of +# clients port + 10000, so you can specify any port and bus-port depending +# on how they get remapped. If the bus-port is not set, a fixed offset of +# 10000 will be used as usual. +# +# Example: +# +# cluster-announce-ip 10.1.1.5 +# cluster-announce-tls-port 6379 +# cluster-announce-port 0 +# cluster-announce-bus-port 6380 + +################################## SLOW LOG ################################### + +# The Redis Slow Log is a system to log queries that exceeded a specified +# execution time. The execution time does not include the I/O operations +# like talking with the client, sending the reply and so forth, +# but just the time needed to actually execute the command (this is the only +# stage of command execution where the thread is blocked and can not serve +# other requests in the meantime). +# +# You can configure the slow log with two parameters: one tells Redis +# what is the execution time, in microseconds, to exceed in order for the +# command to get logged, and the other parameter is the length of the +# slow log. When a new command is logged the oldest one is removed from the +# queue of logged commands. + +# The following time is expressed in microseconds, so 1000000 is equivalent +# to one second. Note that a negative number disables the slow log, while +# a value of zero forces the logging of every command. +slowlog-log-slower-than 10000 + +# There is no limit to this length. Just be aware that it will consume memory. +# You can reclaim memory used by the slow log with SLOWLOG RESET. +slowlog-max-len 128 + +################################ LATENCY MONITOR ############################## + +# The Redis latency monitoring subsystem samples different operations +# at runtime in order to collect data related to possible sources of +# latency of a Redis instance. +# +# Via the LATENCY command this information is available to the user that can +# print graphs and obtain reports. +# +# The system only logs operations that were performed in a time equal or +# greater than the amount of milliseconds specified via the +# latency-monitor-threshold configuration directive. When its value is set +# to zero, the latency monitor is turned off. +# +# By default latency monitoring is disabled since it is mostly not needed +# if you don't have latency issues, and collecting data has a performance +# impact, that while very small, can be measured under big load. Latency +# monitoring can easily be enabled at runtime using the command +# "CONFIG SET latency-monitor-threshold " if needed. +latency-monitor-threshold 0 + +############################# EVENT NOTIFICATION ############################## + +# Redis can notify Pub/Sub clients about events happening in the key space. +# This feature is documented at https://redis.io/topics/notifications +# +# For instance if keyspace events notification is enabled, and a client +# performs a DEL operation on key "foo" stored in the Database 0, two +# messages will be published via Pub/Sub: +# +# PUBLISH __keyspace@0__:foo del +# PUBLISH __keyevent@0__:del foo +# +# It is possible to select the events that Redis will notify among a set +# of classes. Every class is identified by a single character: +# +# K Keyspace events, published with __keyspace@__ prefix. +# E Keyevent events, published with __keyevent@__ prefix. +# g Generic commands (non-type specific) like DEL, EXPIRE, RENAME, ... +# $ String commands +# l List commands +# s Set commands +# h Hash commands +# z Sorted set commands +# x Expired events (events generated every time a key expires) +# e Evicted events (events generated when a key is evicted for maxmemory) +# t Stream commands +# d Module key type events +# m Key-miss events (Note: It is not included in the 'A' class) +# A Alias for g$lshzxetd, so that the "AKE" string means all the events +# (Except key-miss events which are excluded from 'A' due to their +# unique nature). +# +# The "notify-keyspace-events" takes as argument a string that is composed +# of zero or multiple characters. The empty string means that notifications +# are disabled. +# +# Example: to enable list and generic events, from the point of view of the +# event name, use: +# +# notify-keyspace-events Elg +# +# Example 2: to get the stream of the expired keys subscribing to channel +# name __keyevent@0__:expired use: +# +# notify-keyspace-events Ex +# +# By default all notifications are disabled because most users don't need +# this feature and the feature has some overhead. Note that if you don't +# specify at least one of K or E, no events will be delivered. +notify-keyspace-events "" + +############################### GOPHER SERVER ################################# + +# Redis contains an implementation of the Gopher protocol, as specified in +# the RFC 1436 (https://www.ietf.org/rfc/rfc1436.txt). +# +# The Gopher protocol was very popular in the late '90s. It is an alternative +# to the web, and the implementation both server and client side is so simple +# that the Redis server has just 100 lines of code in order to implement this +# support. +# +# What do you do with Gopher nowadays? Well Gopher never *really* died, and +# lately there is a movement in order for the Gopher more hierarchical content +# composed of just plain text documents to be resurrected. Some want a simpler +# internet, others believe that the mainstream internet became too much +# controlled, and it's cool to create an alternative space for people that +# want a bit of fresh air. +# +# Anyway for the 10nth birthday of the Redis, we gave it the Gopher protocol +# as a gift. +# +# --- HOW IT WORKS? --- +# +# The Redis Gopher support uses the inline protocol of Redis, and specifically +# two kind of inline requests that were anyway illegal: an empty request +# or any request that starts with "/" (there are no Redis commands starting +# with such a slash). Normal RESP2/RESP3 requests are completely out of the +# path of the Gopher protocol implementation and are served as usual as well. +# +# If you open a connection to Redis when Gopher is enabled and send it +# a string like "/foo", if there is a key named "/foo" it is served via the +# Gopher protocol. +# +# In order to create a real Gopher "hole" (the name of a Gopher site in Gopher +# talking), you likely need a script like the following: +# +# https://github.com/antirez/gopher2redis +# +# --- SECURITY WARNING --- +# +# If you plan to put Redis on the internet in a publicly accessible address +# to server Gopher pages MAKE SURE TO SET A PASSWORD to the instance. +# Once a password is set: +# +# 1. The Gopher server (when enabled, not by default) will still serve +# content via Gopher. +# 2. However other commands cannot be called before the client will +# authenticate. +# +# So use the 'requirepass' option to protect your instance. +# +# Note that Gopher is not currently supported when 'io-threads-do-reads' +# is enabled. +# +# To enable Gopher support, uncomment the following line and set the option +# from no (the default) to yes. +# +# gopher-enabled no + +############################### ADVANCED CONFIG ############################### + +# Hashes are encoded using a memory efficient data structure when they have a +# small number of entries, and the biggest entry does not exceed a given +# threshold. These thresholds can be configured using the following directives. +hash-max-ziplist-entries 512 +hash-max-ziplist-value 64 + +# Lists are also encoded in a special way to save a lot of space. +# The number of entries allowed per internal list node can be specified +# as a fixed maximum size or a maximum number of elements. +# For a fixed maximum size, use -5 through -1, meaning: +# -5: max size: 64 Kb <-- not recommended for normal workloads +# -4: max size: 32 Kb <-- not recommended +# -3: max size: 16 Kb <-- probably not recommended +# -2: max size: 8 Kb <-- good +# -1: max size: 4 Kb <-- good +# Positive numbers mean store up to _exactly_ that number of elements +# per list node. +# The highest performing option is usually -2 (8 Kb size) or -1 (4 Kb size), +# but if your use case is unique, adjust the settings as necessary. +list-max-ziplist-size -2 + +# Lists may also be compressed. +# Compress depth is the number of quicklist ziplist nodes from *each* side of +# the list to *exclude* from compression. The head and tail of the list +# are always uncompressed for fast push/pop operations. Settings are: +# 0: disable all list compression +# 1: depth 1 means "don't start compressing until after 1 node into the list, +# going from either the head or tail" +# So: [head]->node->node->...->node->[tail] +# [head], [tail] will always be uncompressed; inner nodes will compress. +# 2: [head]->[next]->node->node->...->node->[prev]->[tail] +# 2 here means: don't compress head or head->next or tail->prev or tail, +# but compress all nodes between them. +# 3: [head]->[next]->[next]->node->node->...->node->[prev]->[prev]->[tail] +# etc. +list-compress-depth 0 + +# Sets have a special encoding in just one case: when a set is composed +# of just strings that happen to be integers in radix 10 in the range +# of 64 bit signed integers. +# The following configuration setting sets the limit in the size of the +# set in order to use this special memory saving encoding. +set-max-intset-entries 512 + +# Similarly to hashes and lists, sorted sets are also specially encoded in +# order to save a lot of space. This encoding is only used when the length and +# elements of a sorted set are below the following limits: +zset-max-ziplist-entries 128 +zset-max-ziplist-value 64 + +# HyperLogLog sparse representation bytes limit. The limit includes the +# 16 bytes header. When an HyperLogLog using the sparse representation crosses +# this limit, it is converted into the dense representation. +# +# A value greater than 16000 is totally useless, since at that point the +# dense representation is more memory efficient. +# +# The suggested value is ~ 3000 in order to have the benefits of +# the space efficient encoding without slowing down too much PFADD, +# which is O(N) with the sparse encoding. The value can be raised to +# ~ 10000 when CPU is not a concern, but space is, and the data set is +# composed of many HyperLogLogs with cardinality in the 0 - 15000 range. +hll-sparse-max-bytes 3000 + +# Streams macro node max size / items. The stream data structure is a radix +# tree of big nodes that encode multiple items inside. Using this configuration +# it is possible to configure how big a single node can be in bytes, and the +# maximum number of items it may contain before switching to a new node when +# appending new stream entries. If any of the following settings are set to +# zero, the limit is ignored, so for instance it is possible to set just a +# max entries limit by setting max-bytes to 0 and max-entries to the desired +# value. +stream-node-max-bytes 4096 +stream-node-max-entries 100 + +# Active rehashing uses 1 millisecond every 100 milliseconds of CPU time in +# order to help rehashing the main Redis hash table (the one mapping top-level +# keys to values). The hash table implementation Redis uses (see dict.c) +# performs a lazy rehashing: the more operation you run into a hash table +# that is rehashing, the more rehashing "steps" are performed, so if the +# server is idle the rehashing is never complete and some more memory is used +# by the hash table. +# +# The default is to use this millisecond 10 times every second in order to +# actively rehash the main dictionaries, freeing memory when possible. +# +# If unsure: +# use "activerehashing no" if you have hard latency requirements and it is +# not a good thing in your environment that Redis can reply from time to time +# to queries with 2 milliseconds delay. +# +# use "activerehashing yes" if you don't have such hard requirements but +# want to free memory asap when possible. +activerehashing yes + +# The client output buffer limits can be used to force disconnection of clients +# that are not reading data from the server fast enough for some reason (a +# common reason is that a Pub/Sub client can't consume messages as fast as the +# publisher can produce them). +# +# The limit can be set differently for the three different classes of clients: +# +# normal -> normal clients including MONITOR clients +# replica -> replica clients +# pubsub -> clients subscribed to at least one pubsub channel or pattern +# +# The syntax of every client-output-buffer-limit directive is the following: +# +# client-output-buffer-limit +# +# A client is immediately disconnected once the hard limit is reached, or if +# the soft limit is reached and remains reached for the specified number of +# seconds (continuously). +# So for instance if the hard limit is 32 megabytes and the soft limit is +# 16 megabytes / 10 seconds, the client will get disconnected immediately +# if the size of the output buffers reach 32 megabytes, but will also get +# disconnected if the client reaches 16 megabytes and continuously overcomes +# the limit for 10 seconds. +# +# By default normal clients are not limited because they don't receive data +# without asking (in a push way), but just after a request, so only +# asynchronous clients may create a scenario where data is requested faster +# than it can read. +# +# Instead there is a default limit for pubsub and replica clients, since +# subscribers and replicas receive data in a push fashion. +# +# Both the hard or the soft limit can be disabled by setting them to zero. +client-output-buffer-limit normal 0 0 0 +client-output-buffer-limit replica 256mb 64mb 60 +client-output-buffer-limit pubsub 32mb 8mb 60 + +# Client query buffers accumulate new commands. They are limited to a fixed +# amount by default in order to avoid that a protocol desynchronization (for +# instance due to a bug in the client) will lead to unbound memory usage in +# the query buffer. However you can configure it here if you have very special +# needs, such us huge multi/exec requests or alike. +# +# client-query-buffer-limit 1gb + +# In the Redis protocol, bulk requests, that are, elements representing single +# strings, are normally limited to 512 mb. However you can change this limit +# here, but must be 1mb or greater +# +# proto-max-bulk-len 512mb + +# Redis calls an internal function to perform many background tasks, like +# closing connections of clients in timeout, purging expired keys that are +# never requested, and so forth. +# +# Not all tasks are performed with the same frequency, but Redis checks for +# tasks to perform according to the specified "hz" value. +# +# By default "hz" is set to 10. Raising the value will use more CPU when +# Redis is idle, but at the same time will make Redis more responsive when +# there are many keys expiring at the same time, and timeouts may be +# handled with more precision. +# +# The range is between 1 and 500, however a value over 100 is usually not +# a good idea. Most users should use the default of 10 and raise this up to +# 100 only in environments where very low latency is required. +hz 10 + +# Normally it is useful to have an HZ value which is proportional to the +# number of clients connected. This is useful in order, for instance, to +# avoid too many clients are processed for each background task invocation +# in order to avoid latency spikes. +# +# Since the default HZ value by default is conservatively set to 10, Redis +# offers, and enables by default, the ability to use an adaptive HZ value +# which will temporarily raise when there are many connected clients. +# +# When dynamic HZ is enabled, the actual configured HZ will be used +# as a baseline, but multiples of the configured HZ value will be actually +# used as needed once more clients are connected. In this way an idle +# instance will use very little CPU time while a busy instance will be +# more responsive. +dynamic-hz yes + +# When a child rewrites the AOF file, if the following option is enabled +# the file will be fsync-ed every 32 MB of data generated. This is useful +# in order to commit the file to the disk more incrementally and avoid +# big latency spikes. +aof-rewrite-incremental-fsync yes + +# When redis saves RDB file, if the following option is enabled +# the file will be fsync-ed every 32 MB of data generated. This is useful +# in order to commit the file to the disk more incrementally and avoid +# big latency spikes. +rdb-save-incremental-fsync yes + +# Redis LFU eviction (see maxmemory setting) can be tuned. However it is a good +# idea to start with the default settings and only change them after investigating +# how to improve the performances and how the keys LFU change over time, which +# is possible to inspect via the OBJECT FREQ command. +# +# There are two tunable parameters in the Redis LFU implementation: the +# counter logarithm factor and the counter decay time. It is important to +# understand what the two parameters mean before changing them. +# +# The LFU counter is just 8 bits per key, it's maximum value is 255, so Redis +# uses a probabilistic increment with logarithmic behavior. Given the value +# of the old counter, when a key is accessed, the counter is incremented in +# this way: +# +# 1. A random number R between 0 and 1 is extracted. +# 2. A probability P is calculated as 1/(old_value*lfu_log_factor+1). +# 3. The counter is incremented only if R < P. +# +# The default lfu-log-factor is 10. This is a table of how the frequency +# counter changes with a different number of accesses with different +# logarithmic factors: +# +# +--------+------------+------------+------------+------------+------------+ +# | factor | 100 hits | 1000 hits | 100K hits | 1M hits | 10M hits | +# +--------+------------+------------+------------+------------+------------+ +# | 0 | 104 | 255 | 255 | 255 | 255 | +# +--------+------------+------------+------------+------------+------------+ +# | 1 | 18 | 49 | 255 | 255 | 255 | +# +--------+------------+------------+------------+------------+------------+ +# | 10 | 10 | 18 | 142 | 255 | 255 | +# +--------+------------+------------+------------+------------+------------+ +# | 100 | 8 | 11 | 49 | 143 | 255 | +# +--------+------------+------------+------------+------------+------------+ +# +# NOTE: The above table was obtained by running the following commands: +# +# redis-benchmark -n 1000000 incr foo +# redis-cli object freq foo +# +# NOTE 2: The counter initial value is 5 in order to give new objects a chance +# to accumulate hits. +# +# The counter decay time is the time, in minutes, that must elapse in order +# for the key counter to be divided by two (or decremented if it has a value +# less <= 10). +# +# The default value for the lfu-decay-time is 1. A special value of 0 means to +# decay the counter every time it happens to be scanned. +# +# lfu-log-factor 10 +# lfu-decay-time 1 + +########################### ACTIVE DEFRAGMENTATION ####################### +# +# What is active defragmentation? +# ------------------------------- +# +# Active (online) defragmentation allows a Redis server to compact the +# spaces left between small allocations and deallocations of data in memory, +# thus allowing to reclaim back memory. +# +# Fragmentation is a natural process that happens with every allocator (but +# less so with Jemalloc, fortunately) and certain workloads. Normally a server +# restart is needed in order to lower the fragmentation, or at least to flush +# away all the data and create it again. However thanks to this feature +# implemented by Oran Agra for Redis 4.0 this process can happen at runtime +# in a "hot" way, while the server is running. +# +# Basically when the fragmentation is over a certain level (see the +# configuration options below) Redis will start to create new copies of the +# values in contiguous memory regions by exploiting certain specific Jemalloc +# features (in order to understand if an allocation is causing fragmentation +# and to allocate it in a better place), and at the same time, will release the +# old copies of the data. This process, repeated incrementally for all the keys +# will cause the fragmentation to drop back to normal values. +# +# Important things to understand: +# +# 1. This feature is disabled by default, and only works if you compiled Redis +# to use the copy of Jemalloc we ship with the source code of Redis. +# This is the default with Linux builds. +# +# 2. You never need to enable this feature if you don't have fragmentation +# issues. +# +# 3. Once you experience fragmentation, you can enable this feature when +# needed with the command "CONFIG SET activedefrag yes". +# +# The configuration parameters are able to fine tune the behavior of the +# defragmentation process. If you are not sure about what they mean it is +# a good idea to leave the defaults untouched. + +# Enabled active defragmentation +# activedefrag no + +# Minimum amount of fragmentation waste to start active defrag +# active-defrag-ignore-bytes 100mb + +# Minimum percentage of fragmentation to start active defrag +# active-defrag-threshold-lower 10 + +# Maximum percentage of fragmentation at which we use maximum effort +# active-defrag-threshold-upper 100 + +# Minimal effort for defrag in CPU percentage, to be used when the lower +# threshold is reached +# active-defrag-cycle-min 1 + +# Maximal effort for defrag in CPU percentage, to be used when the upper +# threshold is reached +# active-defrag-cycle-max 25 + +# Maximum number of set/hash/zset/list fields that will be processed from +# the main dictionary scan +# active-defrag-max-scan-fields 1000 + +# Jemalloc background thread for purging will be enabled by default +jemalloc-bg-thread yes + +# It is possible to pin different threads and processes of Redis to specific +# CPUs in your system, in order to maximize the performances of the server. +# This is useful both in order to pin different Redis threads in different +# CPUs, but also in order to make sure that multiple Redis instances running +# in the same host will be pinned to different CPUs. +# +# Normally you can do this using the "taskset" command, however it is also +# possible to this via Redis configuration directly, both in Linux and FreeBSD. +# +# You can pin the server/IO threads, bio threads, aof rewrite child process, and +# the bgsave child process. The syntax to specify the cpu list is the same as +# the taskset command: +# +# Set redis server/io threads to cpu affinity 0,2,4,6: +# server_cpulist 0-7:2 +# +# Set bio threads to cpu affinity 1,3: +# bio_cpulist 1,3 +# +# Set aof rewrite child process to cpu affinity 8,9,10,11: +# aof_rewrite_cpulist 8-11 +# +# Set bgsave child process to cpu affinity 1,10,11 +# bgsave_cpulist 1,10-11 + +# In some cases redis will emit warnings and even refuse to start if it detects +# that the system is in bad state, it is possible to suppress these warnings +# by setting the following config which takes a space delimited list of warnings +# to suppress +# +# ignore-warnings ARM64-COW-BUG diff --git a/redis/sentinel.conf b/redis/sentinel.conf new file mode 100644 index 0000000..edf0867 --- /dev/null +++ b/redis/sentinel.conf @@ -0,0 +1,341 @@ +# Example sentinel.conf + +# *** IMPORTANT *** +# +# By default Sentinel will not be reachable from interfaces different than +# localhost, either use the 'bind' directive to bind to a list of network +# interfaces, or disable protected mode with "protected-mode no" by +# adding it to this configuration file. +# +# Before doing that MAKE SURE the instance is protected from the outside +# world via firewalling or other means. +# +# For example you may use one of the following: +# +# bind 127.0.0.1 192.168.1.1 +# +# protected-mode no + +# port +# The port that this sentinel instance will run on +port 26379 + +# By default Redis Sentinel does not run as a daemon. Use 'yes' if you need it. +# Note that Redis will write a pid file in /var/run/redis-sentinel.pid when +# daemonized. +daemonize no + +# When running daemonized, Redis Sentinel writes a pid file in +# /var/run/redis-sentinel.pid by default. You can specify a custom pid file +# location here. +pidfile /var/run/redis-sentinel.pid + +# Specify the log file name. Also the empty string can be used to force +# Sentinel to log on the standard output. Note that if you use standard +# output for logging but daemonize, logs will be sent to /dev/null +logfile /var/log/redis/sentinel.log + +# sentinel announce-ip +# sentinel announce-port +# +# The above two configuration directives are useful in environments where, +# because of NAT, Sentinel is reachable from outside via a non-local address. +# +# When announce-ip is provided, the Sentinel will claim the specified IP address +# in HELLO messages used to gossip its presence, instead of auto-detecting the +# local address as it usually does. +# +# Similarly when announce-port is provided and is valid and non-zero, Sentinel +# will announce the specified TCP port. +# +# The two options don't need to be used together, if only announce-ip is +# provided, the Sentinel will announce the specified IP and the server port +# as specified by the "port" option. If only announce-port is provided, the +# Sentinel will announce the auto-detected local IP and the specified port. +# +# Example: +# +# sentinel announce-ip 1.2.3.4 + +# dir +# Every long running process should have a well-defined working directory. +# For Redis Sentinel to chdir to /tmp at startup is the simplest thing +# for the process to don't interfere with administrative tasks such as +# unmounting filesystems. +dir /tmp + +# sentinel monitor +# +# Tells Sentinel to monitor this master, and to consider it in O_DOWN +# (Objectively Down) state only if at least sentinels agree. +# +# Note that whatever is the ODOWN quorum, a Sentinel will require to +# be elected by the majority of the known Sentinels in order to +# start a failover, so no failover can be performed in minority. +# +# Replicas are auto-discovered, so you don't need to specify replicas in +# any way. Sentinel itself will rewrite this configuration file adding +# the replicas using additional configuration options. +# Also note that the configuration file is rewritten when a +# replica is promoted to master. +# +# Note: master name should not include special characters or spaces. +# The valid charset is A-z 0-9 and the three characters ".-_". +sentinel monitor mymaster 127.0.0.1 6379 2 + +# sentinel auth-pass +# +# Set the password to use to authenticate with the master and replicas. +# Useful if there is a password set in the Redis instances to monitor. +# +# Note that the master password is also used for replicas, so it is not +# possible to set a different password in masters and replicas instances +# if you want to be able to monitor these instances with Sentinel. +# +# However you can have Redis instances without the authentication enabled +# mixed with Redis instances requiring the authentication (as long as the +# password set is the same for all the instances requiring the password) as +# the AUTH command will have no effect in Redis instances with authentication +# switched off. +# +# Example: +# +# sentinel auth-pass mymaster MySUPER--secret-0123passw0rd + +# sentinel auth-user +# +# This is useful in order to authenticate to instances having ACL capabilities, +# that is, running Redis 6.0 or greater. When just auth-pass is provided the +# Sentinel instance will authenticate to Redis using the old "AUTH " +# method. When also an username is provided, it will use "AUTH ". +# In the Redis servers side, the ACL to provide just minimal access to +# Sentinel instances, should be configured along the following lines: +# +# user sentinel-user >somepassword +client +subscribe +publish \ +# +ping +info +multi +slaveof +config +client +exec on + +# sentinel down-after-milliseconds +# +# Number of milliseconds the master (or any attached replica or sentinel) should +# be unreachable (as in, not acceptable reply to PING, continuously, for the +# specified period) in order to consider it in S_DOWN state (Subjectively +# Down). +# +# Default is 30 seconds. +sentinel down-after-milliseconds mymaster 30000 + +# IMPORTANT NOTE: starting with Redis 6.2 ACL capability is supported for +# Sentinel mode, please refer to the Redis website https://redis.io/topics/acl +# for more details. + +# Sentinel's ACL users are defined in the following format: +# +# user ... acl rules ... +# +# For example: +# +# user worker +@admin +@connection ~* on >ffa9203c493aa99 +# +# For more information about ACL configuration please refer to the Redis +# website at https://redis.io/topics/acl and redis server configuration +# template redis.conf. + +# ACL LOG +# +# The ACL Log tracks failed commands and authentication events associated +# with ACLs. The ACL Log is useful to troubleshoot failed commands blocked +# by ACLs. The ACL Log is stored in memory. You can reclaim memory with +# ACL LOG RESET. Define the maximum entry length of the ACL Log below. +acllog-max-len 128 + +# Using an external ACL file +# +# Instead of configuring users here in this file, it is possible to use +# a stand-alone file just listing users. The two methods cannot be mixed: +# if you configure users here and at the same time you activate the external +# ACL file, the server will refuse to start. +# +# The format of the external ACL user file is exactly the same as the +# format that is used inside redis.conf to describe users. +# +# aclfile /etc/redis/sentinel-users.acl + +# requirepass +# +# You can configure Sentinel itself to require a password, however when doing +# so Sentinel will try to authenticate with the same password to all the +# other Sentinels. So you need to configure all your Sentinels in a given +# group with the same "requirepass" password. Check the following documentation +# for more info: https://redis.io/topics/sentinel +# +# IMPORTANT NOTE: starting with Redis 6.2 "requirepass" is a compatibility +# layer on top of the ACL system. The option effect will be just setting +# the password for the default user. Clients will still authenticate using +# AUTH as usually, or more explicitly with AUTH default +# if they follow the new protocol: both will work. +# +# New config files are advised to use separate authentication control for +# incoming connections (via ACL), and for outgoing connections (via +# sentinel-user and sentinel-pass) +# +# The requirepass is not compatable with aclfile option and the ACL LOAD +# command, these will cause requirepass to be ignored. + +# sentinel sentinel-user +# +# You can configure Sentinel to authenticate with other Sentinels with specific +# user name. + +# sentinel sentinel-pass +# +# The password for Sentinel to authenticate with other Sentinels. If sentinel-user +# is not configured, Sentinel will use 'default' user with sentinel-pass to authenticate. + +# sentinel parallel-syncs +# +# How many replicas we can reconfigure to point to the new replica simultaneously +# during the failover. Use a low number if you use the replicas to serve query +# to avoid that all the replicas will be unreachable at about the same +# time while performing the synchronization with the master. +sentinel parallel-syncs mymaster 1 + +# sentinel failover-timeout +# +# Specifies the failover timeout in milliseconds. It is used in many ways: +# +# - The time needed to re-start a failover after a previous failover was +# already tried against the same master by a given Sentinel, is two +# times the failover timeout. +# +# - The time needed for a replica replicating to a wrong master according +# to a Sentinel current configuration, to be forced to replicate +# with the right master, is exactly the failover timeout (counting since +# the moment a Sentinel detected the misconfiguration). +# +# - The time needed to cancel a failover that is already in progress but +# did not produced any configuration change (SLAVEOF NO ONE yet not +# acknowledged by the promoted replica). +# +# - The maximum time a failover in progress waits for all the replicas to be +# reconfigured as replicas of the new master. However even after this time +# the replicas will be reconfigured by the Sentinels anyway, but not with +# the exact parallel-syncs progression as specified. +# +# Default is 3 minutes. +sentinel failover-timeout mymaster 180000 + +# SCRIPTS EXECUTION +# +# sentinel notification-script and sentinel reconfig-script are used in order +# to configure scripts that are called to notify the system administrator +# or to reconfigure clients after a failover. The scripts are executed +# with the following rules for error handling: +# +# If script exits with "1" the execution is retried later (up to a maximum +# number of times currently set to 10). +# +# If script exits with "2" (or an higher value) the script execution is +# not retried. +# +# If script terminates because it receives a signal the behavior is the same +# as exit code 1. +# +# A script has a maximum running time of 60 seconds. After this limit is +# reached the script is terminated with a SIGKILL and the execution retried. + +# NOTIFICATION SCRIPT +# +# sentinel notification-script +# +# Call the specified notification script for any sentinel event that is +# generated in the WARNING level (for instance -sdown, -odown, and so forth). +# This script should notify the system administrator via email, SMS, or any +# other messaging system, that there is something wrong with the monitored +# Redis systems. +# +# The script is called with just two arguments: the first is the event type +# and the second the event description. +# +# The script must exist and be executable in order for sentinel to start if +# this option is provided. +# +# Example: +# +# sentinel notification-script mymaster /var/redis/notify.sh + +# CLIENTS RECONFIGURATION SCRIPT +# +# sentinel client-reconfig-script +# +# When the master changed because of a failover a script can be called in +# order to perform application-specific tasks to notify the clients that the +# configuration has changed and the master is at a different address. +# +# The following arguments are passed to the script: +# +# +# +# is currently always "failover" +# is either "leader" or "observer" +# +# The arguments from-ip, from-port, to-ip, to-port are used to communicate +# the old address of the master and the new address of the elected replica +# (now a master). +# +# This script should be resistant to multiple invocations. +# +# Example: +# +# sentinel client-reconfig-script mymaster /var/redis/reconfig.sh + +# SECURITY +# +# By default SENTINEL SET will not be able to change the notification-script +# and client-reconfig-script at runtime. This avoids a trivial security issue +# where clients can set the script to anything and trigger a failover in order +# to get the program executed. + +sentinel deny-scripts-reconfig yes + +# REDIS COMMANDS RENAMING +# +# Sometimes the Redis server has certain commands, that are needed for Sentinel +# to work correctly, renamed to unguessable strings. This is often the case +# of CONFIG and SLAVEOF in the context of providers that provide Redis as +# a service, and don't want the customers to reconfigure the instances outside +# of the administration console. +# +# In such case it is possible to tell Sentinel to use different command names +# instead of the normal ones. For example if the master "mymaster", and the +# associated replicas, have "CONFIG" all renamed to "GUESSME", I could use: +# +# SENTINEL rename-command mymaster CONFIG GUESSME +# +# After such configuration is set, every time Sentinel would use CONFIG it will +# use GUESSME instead. Note that there is no actual need to respect the command +# case, so writing "config guessme" is the same in the example above. +# +# SENTINEL SET can also be used in order to perform this configuration at runtime. +# +# In order to set a command back to its original name (undo the renaming), it +# is possible to just rename a command to itself: +# +# SENTINEL rename-command mymaster CONFIG CONFIG + +# HOSTNAMES SUPPORT +# +# Normally Sentinel uses only IP addresses and requires SENTINEL MONITOR +# to specify an IP address. Also, it requires the Redis replica-announce-ip +# keyword to specify only IP addresses. +# +# You may enable hostnames support by enabling resolve-hostnames. Note +# that you must make sure your DNS is configured properly and that DNS +# resolution does not introduce very long delays. +# +SENTINEL resolve-hostnames no + +# When resolve-hostnames is enabled, Sentinel still uses IP addresses +# when exposing instances to users, configuration files, etc. If you want +# to retain the hostnames when announced, enable announce-hostnames below. +# +SENTINEL announce-hostnames no diff --git a/request-key.conf b/request-key.conf new file mode 100644 index 0000000..ff16a95 --- /dev/null +++ b/request-key.conf @@ -0,0 +1,41 @@ +############################################################################### +# +# Copyright (C) 2005 Red Hat, Inc. All Rights Reserved. +# Written by David Howells (dhowells@redhat.com) +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version +# 2 of the License, or (at your option) any later version. +# +############################################################################### + + +############################################################################### +# +# We can run programs or scripts +# - Macro substitutions in arguments: +# %%... %... +# %o operation name +# %k ID of key being operated upon +# %t type of key being operated upon +# %d description of key being operated upon +# %c callout info +# %u UID of requestor +# %g GID of requestor +# %T thread keyring of requestor (may be 0) +# %P process keyring of requestor (may be 0) +# %S session keyring of requestor (may be the user's default session) +# +################################################################################ + +#OP TYPE DESCRIPTION CALLOUT INFO PROGRAM ARG1 ARG2 ARG3 ... +#====== ======= =============== =============== =============================== +create dns_resolver * * /sbin/key.dns_resolver %k +create user debug:* negate /bin/keyctl negate %k 30 %S +create user debug:* rejected /bin/keyctl reject %k 30 %c %S +create user debug:* expired /bin/keyctl reject %k 30 %c %S +create user debug:* revoked /bin/keyctl reject %k 30 %c %S +create user debug:loop:* * |/bin/cat +create user debug:* * /usr/share/keyutils/request-key-debug.sh %k %d %c %S +negate * * * /bin/keyctl negate %k 30 %S diff --git a/request-key.d/id_resolver.conf b/request-key.d/id_resolver.conf new file mode 100644 index 0000000..67ccb18 --- /dev/null +++ b/request-key.d/id_resolver.conf @@ -0,0 +1,9 @@ +# +# nfsidmap(5) - The NFS idmapper upcall program +# Summary: Used by NFSv4 to map user/group ids into +# user/group names and names into in ids +# Options: +# -v Increases the verbosity of the output to syslog +# -t timeout Set the expiration timer, in seconds, on the key +# +create id_resolver * * /usr/sbin/nfsidmap %k %d diff --git a/resolv.conf b/resolv.conf new file mode 100644 index 0000000..50fc637 --- /dev/null +++ b/resolv.conf @@ -0,0 +1,5 @@ +# Generated by NetworkManager +search fritz.box +nameserver 10.12.11.254 +nameserver fd00::de39:6fff:fe2c:afb6 +nameserver 2a02:8109:b204:200:de39:6fff:fe2c:afb6 diff --git a/rocky-release b/rocky-release new file mode 100644 index 0000000..4850e40 --- /dev/null +++ b/rocky-release @@ -0,0 +1 @@ +Rocky Linux release 9.5 (Blue Onyx) diff --git a/rocky-release-upstream b/rocky-release-upstream new file mode 100644 index 0000000..d4a62df --- /dev/null +++ b/rocky-release-upstream @@ -0,0 +1 @@ +Derived from Red Hat Enterprise Linux 9.5 diff --git a/rpc b/rpc new file mode 100644 index 0000000..e099ebb --- /dev/null +++ b/rpc @@ -0,0 +1,70 @@ +#ident "@(#)rpc 1.11 95/07/14 SMI" /* SVr4.0 1.2 */ +# +# rpc +# +portmapper 100000 portmap sunrpc rpcbind +rstatd 100001 rstat rup perfmeter rstat_svc +rusersd 100002 rusers +nfs 100003 nfsprog +ypserv 100004 ypprog +mountd 100005 mount showmount +ypbind 100007 +walld 100008 rwall shutdown +yppasswdd 100009 yppasswd +etherstatd 100010 etherstat +rquotad 100011 rquotaprog quota rquota +sprayd 100012 spray +3270_mapper 100013 +rje_mapper 100014 +selection_svc 100015 selnsvc +database_svc 100016 +rexd 100017 rex +alis 100018 +sched 100019 +llockmgr 100020 +nlockmgr 100021 +x25.inr 100022 +statmon 100023 +status 100024 +bootparam 100026 +ypupdated 100028 ypupdate +keyserv 100029 keyserver +sunlink_mapper 100033 +tfsd 100037 +nsed 100038 +nsemntd 100039 +showfhd 100043 showfh +ioadmd 100055 rpc.ioadmd +NETlicense 100062 +sunisamd 100065 +debug_svc 100066 dbsrv +ypxfrd 100069 rpc.ypxfrd +bugtraqd 100071 +kerbd 100078 +event 100101 na.event # SunNet Manager +logger 100102 na.logger # SunNet Manager +sync 100104 na.sync +hostperf 100107 na.hostperf +activity 100109 na.activity # SunNet Manager +hostmem 100112 na.hostmem +sample 100113 na.sample +x25 100114 na.x25 +ping 100115 na.ping +rpcnfs 100116 na.rpcnfs +hostif 100117 na.hostif +etherif 100118 na.etherif +iproutes 100120 na.iproutes +layers 100121 na.layers +snmp 100122 na.snmp snmp-cmc snmp-synoptics snmp-unisys snmp-utk +traffic 100123 na.traffic +nfs_acl 100227 +sadmind 100232 +nisd 100300 rpc.nisd +nispasswd 100303 rpc.nispasswdd +ufsd 100233 ufsd +fedfs_admin 100418 +pcnfsd 150001 pcnfs +amd 300019 amq +sgi_fam 391002 fam +bwnfsd 545580417 +fypxfrd 600100069 freebsd-ypxfrd diff --git a/rsyslog.conf b/rsyslog.conf new file mode 100644 index 0000000..93ef732 --- /dev/null +++ b/rsyslog.conf @@ -0,0 +1,81 @@ +# rsyslog configuration file + +# For more information see /usr/share/doc/rsyslog-*/rsyslog_conf.html +# or latest version online at http://www.rsyslog.com/doc/rsyslog_conf.html +# If you experience problems, see http://www.rsyslog.com/doc/troubleshoot.html + +#### GLOBAL DIRECTIVES #### + +# Where to place auxiliary files +global(workDirectory="/var/lib/rsyslog") + +# Use default timestamp format +module(load="builtin:omfile" Template="RSYSLOG_TraditionalFileFormat") + +#### MODULES #### + +module(load="imuxsock" # provides support for local system logging (e.g. via logger command) + SysSock.Use="off") # Turn off message reception via local log socket; + # local messages are retrieved through imjournal now. +module(load="imjournal" # provides access to the systemd journal + UsePid="system" # PID nummber is retrieved as the ID of the process the journal entry originates from + FileCreateMode="0644" # Set the access permissions for the state file + StateFile="imjournal.state") # File to store the position in the journal +#module(load="imklog") # reads kernel messages (the same are read from journald) +#module(load="immark") # provides --MARK-- message capability + +# Include all config files in /etc/rsyslog.d/ +include(file="/etc/rsyslog.d/*.conf" mode="optional") + +# Provides UDP syslog reception +# for parameters see http://www.rsyslog.com/doc/imudp.html +#module(load="imudp") # needs to be done just once +#input(type="imudp" port="514") + +# Provides TCP syslog reception +# for parameters see http://www.rsyslog.com/doc/imtcp.html +#module(load="imtcp") # needs to be done just once +#input(type="imtcp" port="514") + +#### RULES #### + +# Log all kernel messages to the console. +# Logging much else clutters up the screen. +#kern.* /dev/console + +# Log anything (except mail) of level info or higher. +# Don't log private authentication messages! +*.info;mail.none;authpriv.none;cron.none /var/log/messages + +# The authpriv file has restricted access. +authpriv.* /var/log/secure + +# Log all the mail messages in one place. +mail.* -/var/log/maillog + + +# Log cron stuff +cron.* /var/log/cron + +# Everybody gets emergency messages +*.emerg :omusrmsg:* + +# Save news errors of level crit and higher in a special file. +uucp,news.crit /var/log/spooler + +# Save boot messages also to boot.log +local7.* /var/log/boot.log + + +# ### sample forwarding rule ### +#action(type="omfwd" +# # An on-disk queue is created for this action. If the remote host is +# # down, messages are spooled to disk and sent when it is up again. +#queue.filename="fwdRule1" # unique name prefix for spool files +#queue.maxdiskspace="1g" # 1gb space limit (use as much as possible) +#queue.saveonshutdown="on" # save messages to disk on shutdown +#queue.type="LinkedList" # run asynchronously +#action.resumeRetryCount="-1" # infinite retries if host is down +# # Remote Logging (we use TCP for reliable delivery) +# # remote_host is: name/ip, e.g. 192.168.0.1, port optional e.g. 10514 +#Target="remote_host" Port="XXX" Protocol="tcp") diff --git a/rwtab.d/gssproxy b/rwtab.d/gssproxy new file mode 100644 index 0000000..f4cdfb5 --- /dev/null +++ b/rwtab.d/gssproxy @@ -0,0 +1 @@ +dirs /var/lib/gssproxy diff --git a/rwtab.d/logrotate b/rwtab.d/logrotate new file mode 100644 index 0000000..3210e47 --- /dev/null +++ b/rwtab.d/logrotate @@ -0,0 +1 @@ +dirs /var/lib/logrotate diff --git a/rwtab.d/sssd b/rwtab.d/sssd new file mode 100644 index 0000000..6b988d3 --- /dev/null +++ b/rwtab.d/sssd @@ -0,0 +1 @@ +dirs /var/lib/sss diff --git a/screenrc b/screenrc new file mode 100644 index 0000000..95e8761 --- /dev/null +++ b/screenrc @@ -0,0 +1,216 @@ +# +# This is an example for the global screenrc file. +# You may want to install this file as /usr/local/etc/screenrc. +# Check config.h for the exact location. +# +# Flaws of termcap and standard settings are done here. +# + +#startup_message off + +#defflow on # will force screen to process ^S/^Q + +deflogin on +#autodetach off + +vbell on +vbell_msg " Wuff ---- Wuff!! " + +# all termcap entries are now duplicated as terminfo entries. +# only difference should be the slightly modified syntax, and check for +# terminfo entries, that are already corected in the database. +# +# G0 we have a SEMI-GRAPHICS-CHARACTER-MODE +# WS this sequence resizes our window. +# cs this sequence changes the scrollregion +# hs@ we have no hardware statusline. screen will only believe that +# there is a hardware status line if hs,ts,fs,ds are all set. +# ts to statusline +# fs from statusline +# ds delete statusline +# al add one line +# AL add multiple lines +# dl delete one line +# DL delete multiple lines +# ic insert one char (space) +# IC insert multiple chars +# nx terminal uses xon/xoff + +termcap facit|vt100|xterm|xterm-* LP:G0 +terminfo facit|vt100|xterm|xterm-* LP:G0 + +#the vt100 description does not mention "dl". *sigh* +termcap vt100 dl=5\E[M +terminfo vt100 dl=5\E[M + +#facit's "al" / "dl" are buggy if the current / last line +#contain attributes... +termcap facit al=\E[L\E[K:AL@:dl@:DL@:cs=\E[%i%d;%dr:ic@ +terminfo facit al=\E[L\E[K:AL@:dl@:DL@:cs=\E[%i%p1%d;%p2%dr:ic@ + +#make sun termcap/info better +termcap sun 'up=^K:AL=\E[%dL:DL=\E[%dM:UP=\E[%dA:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:IC=\E[%d@:WS=1000\E[8;%d;%dt' +terminfo sun 'up=^K:AL=\E[%p1%dL:DL=\E[%p1%dM:UP=\E[%p1%dA:DO=\E[%p1%dB:LE=\E[%p1%dD:RI=\E[%p1%dC:IC=\E[%p1%d@:WS=\E[8;%p1%d;%p2%dt$<1000>' + +#xterm understands both im/ic and doesn't have a status line. +#Note: Do not specify im and ic in the real termcap/info file as +#some programs (e.g. vi) will (no,no, may (jw)) not work anymore. +#termcap xterm|fptwist hs@:cs=\E[%i%d;%dr:im=\E[4h:ei=\E[4l +#terminfo xterm|fptwist hs@:cs=\E[%i%p1%d;%p2%dr:im=\E[4h:ei=\E[4l + +# Long time I had this in my private screenrc file. But many people +# seem to want it (jw): +# we do not want the width to change to 80 characters on startup: +# on suns, /etc/termcap has :is=\E[r\E[m\E[2J\E[H\E[?7h\E[?1;3;4;6l: +#termcap xterm 'is=\E[r\E[m\E[2J\E[H\E[?7h\E[?1;4;6l' +#terminfo xterm 'is=\E[r\E[m\E[2J\E[H\E[?7h\E[?1;4;6l' + +# +# Do not use xterms alternate window buffer. +# This one would not add lines to the scrollback buffer. +termcap xterm|xterms|xs ti=\E7\E[?47l +terminfo xterm|xterms|xs ti=\E7\E[?47l + +#make hp700 termcap/info better +termcap hp700 'Z0=\E[?3h:Z1=\E[?3l:hs:ts=\E[62"p\E[0$~\E[2$~\E[1$}:fs=\E[0}\E[61"p:ds=\E[62"p\E[1$~\E[61"p:ic@' +terminfo hp700 'Z0=\E[?3h:Z1=\E[?3l:hs:ts=\E[62"p\E[0$~\E[2$~\E[1$}:fs=\E[0}\E[61"p:ds=\E[62"p\E[1$~\E[61"p:ic@' + +#wyse-75-42 must have defflow control (xo = "terminal uses xon/xoff") +#(nowadays: nx = padding doesn't work, have to use xon/off) +#essential to have it here, as this is a slow terminal. +termcap wy75-42 nx:xo:Z0=\E[?3h\E[31h:Z1=\E[?3l\E[31h +terminfo wy75-42 nx:xo:Z0=\E[?3h\E[31h:Z1=\E[?3l\E[31h + +#remove some stupid / dangerous key bindings +bind ^k +#bind L +bind ^\ +#make them better +bind \\ quit +bind K kill +bind I login on +bind O login off +bind } history + +# This is how one can set a reattach password: +# password ODSJQf.4IJN7E # "1234" + +# don't display the copyright page +startup_message off + +# emulate .logout message +pow_detach_msg "Screen session of $LOGNAME $:cr:$:nl:ended." + +# advertise hardstatus support to $TERMCAP +# termcapinfo * '' 'hs:ts=\E_:fs=\E\\:ds=\E_\E\\' + +# make the shell in every window a login shell +#shell -$SHELL + +# autoaka testing +# shellaka '> |tcsh' +# shellaka '$ |sh' + +# set every new windows hardstatus line to somenthing descriptive +# defhstatus "screen: ^En (^Et)" + +defscrollback 1000 + +# don't kill window after the process died +# zombie "^[" + +# enable support for the "alternate screen" capability in all windows +# altscreen on + +################ +# +# more xterm tweaks +# + +#80/132 column switching must be enabled for ^AW to work +#change init sequence to not switch width +#termcapinfo xterm Z0=\E[?3h:Z1=\E[?3l:is=\E[r\E[m\E[2J\E[H\E[?7h\E[?1;4;6l + +# Make the output buffer large for (fast) xterms. +#termcapinfo xterm* OL=10000 +termcapinfo xterm* OL=100 + +# tell screen that xterm can switch to dark background and has function +# keys. +termcapinfo xterm|xterm-* 'VR=\E[?5h:VN=\E[?5l' +#termcapinfo xterm 'k1=\E[11~:k2=\E[12~:k3=\E[13~:k4=\E[14~' +#termcapinfo xterm 'kh=\EOH:kI=\E[2~:kD=\E[3~:kH=\EOF:kP=\E[5~:kN=\E[6~' + +# special xterm hardstatus: use the window title. +termcapinfo xterm|xterm-* 'hs:ts=\E]2;:fs=\007:ds=\E]2;screen\007' + +#terminfo xterm 'vb=\E[?5h$<200/>\E[?5l' +#termcapinfo xterm 'vi=\E[?25l:ve=\E[34h\E[?25h:vs=\E[34l' + +# emulate part of the 'K' charset +termcapinfo xterm|xterm-* 'XC=K%,%\E(B,[\304,\\\\\326,]\334,{\344,|\366,}\374,~\337' + +# xterm-52 tweaks: +# - uses background color for delete operations +termcapinfo xterm* be + +################ +# +# wyse terminals +# + +#wyse-75-42 must have flow control (xo = "terminal uses xon/xoff") +#essential to have it here, as this is a slow terminal. +termcapinfo wy75-42 xo:hs@ + +# New termcap sequences for cursor application mode. +termcapinfo wy* CS=\E[?1h:CE=\E[?1l:vi=\E[?25l:ve=\E[?25h:VR=\E[?5h:VN=\E[?5l:cb=\E[1K:CD=\E[1J + +################ +# +# other terminals +# + +# make hp700 termcap/info better +termcapinfo hp700 'Z0=\E[?3h:Z1=\E[?3l:hs:ts=\E[62"p\E[0$~\E[2$~\E[1$}:fs=\E[0}\E[61"p:ds=\E[62"p\E[1$~\E[61"p:ic@' + +# Extend the vt100 desciption by some sequences. +termcap vt100* ms:AL=\E[%dL:DL=\E[%dM:UP=\E[%dA:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC +terminfo vt100* ms:AL=\E[%p1%dL:DL=\E[%p1%dM:UP=\E[%p1%dA:DO=\E[%p1%dB:LE=\E[%p1%dD:RI=\E[%p1%dC +termcapinfo linux C8 +# old rxvt versions also need this +# termcapinfo rxvt C8 + +# Yet another hack: +# Prepend/append register [/] to the paste if ^a^] is pressed. +# This lets me have autoindent mode in vi. +#register [ "\033:se noai\015a" +#register ] "\033:se ai\015a" +#bind ^] paste [.] + +################ +# +# default windows +# + +# screen -t local 0 +# screen -t mail 1 mutt +# screen -t 40 2 rlogin server + +# caption always "%3n %t%? @%u%?%? [%h]%?%=%c" +## alternative caption, gives window list, LOGNAME and current date: +# caption always "%{wk}%?%-Lw%?%{bw}%n*%f %t%?(%u)%?%{wk}%?%+Lw %=%{mk}@%H %{yk}%D %{ck}%M%{wk} %{ck}%d %{gk}%c" +# hardstatus alwaysignore +# hardstatus alwayslastline "%Lw" + +# Red Hat's normal status line +hardstatus string "[screen %n%?: %t%?] %h" + +# bind = resize = +# bind + resize +1 +# bind - resize -1 +# bind _ resize max +# +# defnonblock 1 +# blankerprg rain -d 100 +# idle 30 blanker diff --git a/security/access.conf b/security/access.conf new file mode 100644 index 0000000..47b6b84 --- /dev/null +++ b/security/access.conf @@ -0,0 +1,122 @@ +# Login access control table. +# +# Comment line must start with "#", no space at front. +# Order of lines is important. +# +# When someone logs in, the table is scanned for the first entry that +# matches the (user, host) combination, or, in case of non-networked +# logins, the first entry that matches the (user, tty) combination. The +# permissions field of that table entry determines whether the login will +# be accepted or refused. +# +# Format of the login access control table is three fields separated by a +# ":" character: +# +# [Note, if you supply a 'fieldsep=|' argument to the pam_access.so +# module, you can change the field separation character to be +# '|'. This is useful for configurations where you are trying to use +# pam_access with X applications that provide PAM_TTY values that are +# the display variable like "host:0".] +# +# permission:users:origins +# +# The first field should be a "+" (access granted) or "-" (access denied) +# character. +# +# The second field should be a list of one or more login names, group +# names, or ALL (always matches). A pattern of the form user@host is +# matched when the login name matches the "user" part, and when the +# "host" part matches the local machine name. +# +# The third field should be a list of one or more tty names (for +# non-networked logins), host names, domain names (begin with "."), host +# addresses, internet network numbers (end with "."), ALL (always +# matches), NONE (matches no tty on non-networked logins) or +# LOCAL (matches any string that does not contain a "." character). +# +# You can use @netgroupname in host or user patterns; this even works +# for @usergroup@@hostgroup patterns. +# +# The EXCEPT operator makes it possible to write very compact rules. +# +# The group file is searched only when a name does not match that of the +# logged-in user. Both the user's primary group is matched, as well as +# groups in which users are explicitly listed. +# To avoid problems with accounts, which have the same name as a group, +# you can use brackets around group names '(group)' to differentiate. +# In this case, you should also set the "nodefgroup" option. +# +# TTY NAMES: Must be in the form returned by ttyname(3) less the initial +# "/dev" (e.g. tty1 or vc/1) +# +############################################################################## +# +# Disallow non-root logins on tty1 +# +#-:ALL EXCEPT root:tty1 +# +# Disallow console logins to all but a few accounts. +# +#-:ALL EXCEPT wheel shutdown sync:LOCAL +# +# Same, but make sure that really the group wheel and not the user +# wheel is used (use nodefgroup argument, too): +# +#-:ALL EXCEPT (wheel) shutdown sync:LOCAL +# +# Disallow non-local logins to privileged accounts (group wheel). +# +#-:wheel:ALL EXCEPT LOCAL .win.tue.nl +# +# Some accounts are not allowed to login from anywhere: +# +#-:wsbscaro wsbsecr wsbspac wsbsym wscosor wstaiwde:ALL +# +# All other accounts are allowed to login from anywhere. +# +############################################################################## +# All lines from here up to the end are building a more complex example. +############################################################################## +# +# User "root" should be allowed to get access via cron .. tty5 tty6. +#+:root:cron crond :0 tty1 tty2 tty3 tty4 tty5 tty6 +# +# User "root" should be allowed to get access from hosts with ip addresses. +#+:root:192.168.200.1 192.168.200.4 192.168.200.9 +#+:root:127.0.0.1 +# +# User "root" should get access from network 192.168.201. +# This term will be evaluated by string matching. +# comment: It might be better to use network/netmask instead. +# The same is 192.168.201.0/24 or 192.168.201.0/255.255.255.0 +#+:root:192.168.201. +# +# User "root" should be able to have access from domain. +# Uses string matching also. +#+:root:.foo.bar.org +# +# User "root" should be denied to get access from all other sources. +#-:root:ALL +# +# User "foo" and members of netgroup "nis_group" should be +# allowed to get access from all sources. +# This will only work if netgroup service is available. +#+:@nis_group foo:ALL +# +# User "john" should get access from ipv4 net/mask +#+:john:127.0.0.0/24 +# +# User "john" should get access from ipv4 as ipv6 net/mask +#+:john:::ffff:127.0.0.0/127 +# +# User "john" should get access from ipv6 host address +#+:john:2001:4ca0:0:101::1 +# +# User "john" should get access from ipv6 host address (same as above) +#+:john:2001:4ca0:0:101:0:0:0:1 +# +# User "john" should get access from ipv6 net/mask +#+:john:2001:4ca0:0:101::/64 +# +# All other users should be denied to get access from all sources. +#-:ALL:ALL diff --git a/security/chroot.conf b/security/chroot.conf new file mode 100644 index 0000000..90bb737 --- /dev/null +++ b/security/chroot.conf @@ -0,0 +1,4 @@ +# /etc/security/chroot.conf +# format: +# username_regex chroot_dir +#matthew /home diff --git a/security/console.apps/config-util b/security/console.apps/config-util new file mode 100644 index 0000000..a6b9096 --- /dev/null +++ b/security/console.apps/config-util @@ -0,0 +1,2 @@ +USER=root +UGROUPS=wheel diff --git a/security/console.apps/mock b/security/console.apps/mock new file mode 100644 index 0000000..b24d0a0 --- /dev/null +++ b/security/console.apps/mock @@ -0,0 +1,6 @@ +USER=root +PROGRAM=/usr/libexec/mock/mock +SESSION=false +FALLBACK=false +KEEP_ENV_VARS=COLUMNS,SSH_AUTH_SOCK,http_proxy,ftp_proxy,https_proxy,no_proxy,MOCK_TRACE_LOG +BANNER=You are not in the `mock` group. See https://rpm-software-management.github.io/mock/#setup diff --git a/security/console.handlers b/security/console.handlers new file mode 100644 index 0000000..453cfca --- /dev/null +++ b/security/console.handlers @@ -0,0 +1,17 @@ +# /etc/security/console.handlers +# +# This file is provided for configuration of handlers which will be +# executed when user obtains console lock and when he loses it. +# Additionally it is used for a configuration of console device names. +# +# Format: +# name consoledevs regex regex ... +# binary lock|unlock flag flag ... +# See man console.handlers +# +# Example: +# console consoledevs tty[0-9][0-9]* vc/[0-9][0-9]* :[0-9]\.[0-9] :[0-9] +# echo lock wait Locking console for user on tty +# touch unlock wait /var/run/console-unlocked + +console consoledevs /dev/tty[0-9][0-9]* tty[0-9][0-9]* vc/[0-9][0-9]* :[0-9]+\.[0-9]+ :[0-9]+ diff --git a/security/console.perms b/security/console.perms new file mode 100644 index 0000000..75dc90a --- /dev/null +++ b/security/console.perms @@ -0,0 +1,25 @@ +# /etc/security/console.perms +# +# This file determines the permissions that will be given to priviledged +# users of the console at login time, and the permissions to which to +# revert when the users log out. + +# format is: +# =list of regexps specifying consoles or globs specifying files +# file-glob| perm dev-regex| \ +# revert-mode revert-owner[.revert-group] +# the revert-mode, revert-owner, and revert-group are optional, and default +# to 0600, root, and root, respectively. +# +# For more information: +# man 5 console.perms +# +# This file should not be modified. +# Rather a new file in the console.perms.d directory should be created. + +# file classes -- these are regular expressions +=tty[0-9][0-9]* vc/[0-9][0-9]* :[0-9]+\.[0-9]+ :[0-9]+ +=:[0-9]+\.[0-9]+ :[0-9]+ + +# device classes -- see console.perms.d/50-default.perms +# permission definitions -- see console.perms.d/50-default.perms diff --git a/security/faillock.conf b/security/faillock.conf new file mode 100644 index 0000000..16d93df --- /dev/null +++ b/security/faillock.conf @@ -0,0 +1,62 @@ +# Configuration for locking the user after multiple failed +# authentication attempts. +# +# The directory where the user files with the failure records are kept. +# The default is /var/run/faillock. +# dir = /var/run/faillock +# +# Will log the user name into the system log if the user is not found. +# Enabled if option is present. +# audit +# +# Don't print informative messages. +# Enabled if option is present. +# silent +# +# Don't log informative messages via syslog. +# Enabled if option is present. +# no_log_info +# +# Only track failed user authentications attempts for local users +# in /etc/passwd and ignore centralized (AD, IdM, LDAP, etc.) users. +# The `faillock` command will also no longer track user failed +# authentication attempts. Enabling this option will prevent a +# double-lockout scenario where a user is locked out locally and +# in the centralized mechanism. +# Enabled if option is present. +# local_users_only +# +# Deny access if the number of consecutive authentication failures +# for this user during the recent interval exceeds n tries. +# The default is 3. +# deny = 3 +# +# The length of the interval during which the consecutive +# authentication failures must happen for the user account +# lock out is n seconds. +# The default is 900 (15 minutes). +# fail_interval = 900 +# +# The access will be re-enabled after n seconds after the lock out. +# The value 0 has the same meaning as value `never` - the access +# will not be re-enabled without resetting the faillock +# entries by the `faillock` command. +# The default is 600 (10 minutes). +# unlock_time = 600 +# +# Root account can become locked as well as regular accounts. +# Enabled if option is present. +# even_deny_root +# +# This option implies the `even_deny_root` option. +# Allow access after n seconds to root account after the +# account is locked. In case the option is not specified +# the value is the same as of the `unlock_time` option. +# root_unlock_time = 900 +# +# If a group name is specified with this option, members +# of the group will be handled by this module the same as +# the root account (the options `even_deny_root>` and +# `root_unlock_time` will apply to them. +# By default, the option is not set. +# admin_group = diff --git a/security/group.conf b/security/group.conf new file mode 100644 index 0000000..7c07a26 --- /dev/null +++ b/security/group.conf @@ -0,0 +1,106 @@ +# +# This is the configuration file for the pam_group module. +# + +# +# *** Please note that giving group membership on a session basis is +# *** NOT inherently secure. If a user can create an executable that +# *** is setgid a group that they are infrequently given membership +# *** of, they can basically obtain group membership any time they +# *** like. Example: games are allowed between the hours of 6pm and 6am +# *** user joe logs in at 7pm writes a small C-program toplay.c that +# *** invokes their favorite shell, compiles it and does +# *** "chgrp play toplay; chmod g+s toplay". They are basically able +# *** to play games any time... You have been warned. AGM +# + +# +# The syntax of the lines is as follows: +# +# services;ttys;users;times;groups +# +# white space is ignored and lines maybe extended with '\\n' (escaped +# newlines). From reading these comments, it is clear that +# text following a '#' is ignored to the end of the line. +# +# the combination of individual users/terminals etc is a logic list +# namely individual tokens that are optionally prefixed with '!' (logical +# not) and separated with '&' (logical and) and '|' (logical or). +# +# services +# is a logic list of PAM service names that the rule applies to. +# +# ttys +# is a logic list of terminal names that this rule applies to. +# +# users +# is a logic list of users or a netgroup of users to whom this +# rule applies. +# +# NB. For these items the simple wildcard '*' may be used only once. +# With netgroups no wildcards or logic operators are allowed. +# +# times +# It is used to indicate "when" these groups are to be given to the +# user. The format here is a logic list of day/time-range +# entries the days are specified by a sequence of two character +# entries, MoTuSa for example is Monday Tuesday and Saturday. Note +# that repeated days are unset MoMo = no day, and MoWk = all weekdays +# bar Monday. The two character combinations accepted are +# +# Mo Tu We Th Fr Sa Su Wk Wd Al +# +# the last two being week-end days and all 7 days of the week +# respectively. As a final example, AlFr means all days except Friday. +# +# Each day/time-range can be prefixed with a '!' to indicate "anything +# but" +# +# The time-range part is two 24-hour times HHMM separated by a hyphen +# indicating the start and finish time (if the finish time is smaller +# than the start time it is deemed to apply on the following day). +# +# groups +# The (comma or space separated) list of groups that the user +# inherits membership of. These groups are added if the previous +# fields are satisfied by the user's request +# +# For a rule to be active, ALL of service+ttys+users must be satisfied +# by the applying process. +# + +# +# Note, to get this to work as it is currently typed you need +# +# 1. to run an application as root +# 2. add the following groups to the /etc/group file: +# floppy, play, sound +# + +# +# Here is a simple example: running 'xsh' on tty* (any ttyXXX device), +# the user 'us' is given access to the floppy (through membership of +# the floppy group) +# + +#xsh;tty*&!ttyp*;us;Al0000-2400;floppy + +# +# another example: running 'xsh' on tty* (any ttyXXX device), +# the user 'sword' is given access to games (through membership of +# the sound and play group) after work hours. +# + +#xsh; tty* ;sword;!Wk0900-1800;sound, play +#xsh; tty* ;*;Al0900-1800;floppy + +# +# yet another example: any member of the group 'admin' running +# 'xsh' on tty*, is granted access (at any time) to the group 'plugdev' +# + +#xsh; tty* ;%admin;Al0000-2400;plugdev + +# +# End of group.conf file +# diff --git a/security/limits.conf b/security/limits.conf new file mode 100644 index 0000000..e8a746c --- /dev/null +++ b/security/limits.conf @@ -0,0 +1,61 @@ +# /etc/security/limits.conf +# +#This file sets the resource limits for the users logged in via PAM. +#It does not affect resource limits of the system services. +# +#Also note that configuration files in /etc/security/limits.d directory, +#which are read in alphabetical order, override the settings in this +#file in case the domain is the same or more specific. +#That means, for example, that setting a limit for wildcard domain here +#can be overridden with a wildcard setting in a config file in the +#subdirectory, but a user specific setting here can be overridden only +#with a user specific setting in the subdirectory. +# +#Each line describes a limit for a user in the form: +# +# +# +#Where: +# can be: +# - a user name +# - a group name, with @group syntax +# - the wildcard *, for default entry +# - the wildcard %, can be also used with %group syntax, +# for maxlogin limit +# +# can have the two values: +# - "soft" for enforcing the soft limits +# - "hard" for enforcing hard limits +# +# can be one of the following: +# - core - limits the core file size (KB) +# - data - max data size (KB) +# - fsize - maximum filesize (KB) +# - memlock - max locked-in-memory address space (KB) +# - nofile - max number of open file descriptors +# - rss - max resident set size (KB) +# - stack - max stack size (KB) +# - cpu - max CPU time (MIN) +# - nproc - max number of processes +# - as - address space limit (KB) +# - maxlogins - max number of logins for this user +# - maxsyslogins - max number of logins on the system +# - priority - the priority to run user process with +# - locks - max number of file locks the user can hold +# - sigpending - max number of pending signals +# - msgqueue - max memory used by POSIX message queues (bytes) +# - nice - max nice priority allowed to raise to values: [-20, 19] +# - rtprio - max realtime priority +# +# +# + +#* soft core 0 +#* hard rss 10000 +#@student hard nproc 20 +#@faculty soft nproc 20 +#@faculty hard nproc 50 +#ftp hard nproc 0 +#@student - maxlogins 4 + +# End of file diff --git a/security/namespace.conf b/security/namespace.conf new file mode 100644 index 0000000..75ec619 --- /dev/null +++ b/security/namespace.conf @@ -0,0 +1,31 @@ +# /etc/security/namespace.conf +# +# See /usr/share/doc/pam-*/txts/README.pam_namespace for more information. +# +# Uncommenting the following three lines will polyinstantiate +# /tmp, /var/tmp and user's home directories. /tmp and /var/tmp will +# be polyinstantiated based on the MLS level part of the security context as well as user +# name, Polyinstantion will not be performed for user root and adm for directories +# /tmp and /var/tmp, whereas home directories will be polyinstantiated for all users. +# The user name and context is appended to the instance prefix. +# +# Note that instance directories do not have to reside inside the +# polyinstantiated directory. In the examples below, instances of /tmp +# will be created in /tmp-inst directory, where as instances of /var/tmp +# and users home directories will reside within the directories that +# are being polyinstantiated. +# +# Instance parent directories must exist for the polyinstantiation +# mechanism to work. By default, they should be created with the mode +# of 000. pam_namespace module will enforce this mode unless it +# is explicitly called with an argument to ignore the mode of the +# instance parent. System administrators should use this argument with +# caution, as it will reduce security and isolation achieved by +# polyinstantiation. The parent directories (except $HOME) are created +# at boot by pam_namespace_helper, but in a live system, system +# administrators should create the parent directories before enabling +# them here. +# +#/tmp /tmp-inst/ level root,adm +#/var/tmp /var/tmp/tmp-inst/ level root,adm +#$HOME $HOME/$USER.inst/ level diff --git a/security/namespace.init b/security/namespace.init new file mode 100755 index 0000000..099c440 --- /dev/null +++ b/security/namespace.init @@ -0,0 +1,25 @@ +#!/usr/bin/sh +# It receives polydir path as $1, the instance path as $2, +# a flag whether the instance dir was newly created (0 - no, 1 - yes) in $3, +# and user name in $4. +# +# The following section will copy the contents of /etc/skel if this is a +# newly created home directory. +if [ "$3" = 1 ]; then + # This line will fix the labeling on all newly created directories + [ -x /sbin/restorecon ] && /sbin/restorecon "$1" + user="$4" + passwd=$(getent passwd "$user") + homedir=$(echo "$passwd" | cut -f6 -d":") + if [ "$1" = "$homedir" ]; then + gid=$(echo "$passwd" | cut -f4 -d":") + cp -rT /etc/skel "$homedir" + chown -R "$user":"$gid" "$homedir" + mask=$(awk '/^UMASK/{gsub("#.*$", "", $2); print $2; exit}' /etc/login.defs) + mode=$(printf "%o" $((0777 & ~$mask))) + chmod ${mode:-700} "$homedir" + [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" + fi +fi + +exit 0 diff --git a/security/opasswd b/security/opasswd new file mode 100644 index 0000000..e69de29 diff --git a/security/pam_env.conf b/security/pam_env.conf new file mode 100644 index 0000000..2549e43 --- /dev/null +++ b/security/pam_env.conf @@ -0,0 +1,73 @@ +# +# This is the configuration file for pam_env, a PAM module to load in +# a configurable list of environment variables for a +# +# The original idea for this came from Andrew G. Morgan ... +# +# Mmm. Perhaps you might like to write a pam_env module that reads a +# default environment from a file? I can see that as REALLY +# useful... Note it would be an "auth" module that returns PAM_IGNORE +# for the auth part and sets the environment returning PAM_SUCCESS in +# the setcred function... +# +# +# What I wanted was the REMOTEHOST variable set, purely for selfish +# reasons, and AGM didn't want it added to the SimpleApps login +# program (which is where I added the patch). So, my first concern is +# that variable, from there there are numerous others that might/would +# be useful to be set: NNTPSERVER, LESS, PATH, PAGER, MANPAGER ..... +# +# Of course, these are a different kind of variable than REMOTEHOST in +# that they are things that are likely to be configured by +# administrators rather than set by logging in, how to treat them both +# in the same config file? +# +# Here is my idea: +# +# Each line starts with the variable name, there are then two possible +# options for each variable DEFAULT and OVERRIDE. +# DEFAULT allows an administrator to set the value of the +# variable to some default value, if none is supplied then the empty +# string is assumed. The OVERRIDE option tells pam_env that it should +# enter in its value (overriding the default value) if there is one +# to use. OVERRIDE is not used, "" is assumed and no override will be +# done. +# +# VARIABLE [DEFAULT=[value]] [OVERRIDE=[value]] +# +# (Possibly non-existent) environment variables may be used in values +# using the ${string} syntax and (possibly non-existent) PAM_ITEMs may +# be used in values using the @{string} syntax. Both the $ and @ +# characters can be backslash escaped to be used as literal values +# values can be delimited with "", escaped " not supported. +# Note that many environment variables that you would like to use +# may not be set by the time the module is called. +# For example, HOME is used below several times, but +# many PAM applications don't make it available by the time you need it. +# +# +# First, some special variables +# +# Set the REMOTEHOST variable for any hosts that are remote, default +# to "localhost" rather than not being set at all +#REMOTEHOST DEFAULT=localhost OVERRIDE=@{PAM_RHOST} +# +# Set the DISPLAY variable if it seems reasonable +#DISPLAY DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY} +# +# +# Now some simple variables +# +#PAGER DEFAULT=less +#MANPAGER DEFAULT=less +#LESS DEFAULT="M q e h15 z23 b80" +#NNTPSERVER DEFAULT=localhost +#PATH DEFAULT=${HOME}/bin:/usr/local/bin:/bin\ +#:/usr/bin:/usr/local/bin/X11:/usr/bin/X11 +# +# silly examples of escaped variables, just to show how they work. +# +#DOLLAR DEFAULT=\$ +#DOLLARDOLLAR DEFAULT= OVERRIDE=\$${DOLLAR} +#DOLLARPLUS DEFAULT=\${REMOTEHOST}${REMOTEHOST} +#ATSIGN DEFAULT="" OVERRIDE=\@ diff --git a/security/pwhistory.conf b/security/pwhistory.conf new file mode 100644 index 0000000..070b719 --- /dev/null +++ b/security/pwhistory.conf @@ -0,0 +1,21 @@ +# Configuration for remembering the last passwords used by a user. +# +# Enable the debugging logs. +# Enabled if option is present. +# debug +# +# root account's passwords are also remembered. +# Enabled if option is present. +# enforce_for_root +# +# Number of passwords to remember. +# The default is 10. +# remember = 10 +# +# Number of times to prompt for the password. +# The default is 1. +# retry = 1 +# +# The directory where the last passwords are kept. +# The default is /etc/security/opasswd. +# file = /etc/security/opasswd diff --git a/security/pwquality.conf b/security/pwquality.conf new file mode 100644 index 0000000..63eb315 --- /dev/null +++ b/security/pwquality.conf @@ -0,0 +1,79 @@ +# Configuration for systemwide password quality limits +# Defaults: +# +# Number of characters in the new password that must not be present in the +# old password. +# difok = 1 +# +# Minimum acceptable size for the new password (plus one if +# credits are not disabled which is the default). (See pam_cracklib manual.) +# Cannot be set to lower value than 6. +# minlen = 8 +# +# The maximum credit for having digits in the new password. If less than 0 +# it is the minimum number of digits in the new password. +# dcredit = 0 +# +# The maximum credit for having uppercase characters in the new password. +# If less than 0 it is the minimum number of uppercase characters in the new +# password. +# ucredit = 0 +# +# The maximum credit for having lowercase characters in the new password. +# If less than 0 it is the minimum number of lowercase characters in the new +# password. +# lcredit = 0 +# +# The maximum credit for having other characters in the new password. +# If less than 0 it is the minimum number of other characters in the new +# password. +# ocredit = 0 +# +# The minimum number of required classes of characters for the new +# password (digits, uppercase, lowercase, others). +# minclass = 0 +# +# The maximum number of allowed consecutive same characters in the new password. +# The check is disabled if the value is 0. +# maxrepeat = 0 +# +# The maximum number of allowed consecutive characters of the same class in the +# new password. +# The check is disabled if the value is 0. +# maxclassrepeat = 0 +# +# Whether to check for the words from the passwd entry GECOS string of the user. +# The check is enabled if the value is not 0. +# gecoscheck = 0 +# +# Whether to check for the words from the cracklib dictionary. +# The check is enabled if the value is not 0. +# dictcheck = 1 +# +# Whether to check if it contains the user name in some form. +# The check is enabled if the value is not 0. +# usercheck = 1 +# +# Length of substrings from the username to check for in the password +# The check is enabled if the value is greater than 0 and usercheck is enabled. +# usersubstr = 0 +# +# Whether the check is enforced by the PAM module and possibly other +# applications. +# The new password is rejected if it fails the check and the value is not 0. +# enforcing = 1 +# +# Path to the cracklib dictionaries. Default is to use the cracklib default. +# dictpath = +# +# Prompt user at most N times before returning with error. The default is 1. +# retry = 3 +# +# Enforces pwquality checks on the root user password. +# Enabled if the option is present. +# enforce_for_root +# +# Skip testing the password quality for users that are not present in the +# /etc/passwd file. +# Enabled if the option is present. +# local_users_only diff --git a/security/sepermit.conf b/security/sepermit.conf new file mode 100644 index 0000000..0a12cd8 --- /dev/null +++ b/security/sepermit.conf @@ -0,0 +1,11 @@ +# /etc/security/sepermit.conf +# +# Each line contains either: +# - a user name +# - a group name, with @group syntax +# - a SELinux user name, with %seuser syntax +# Each line can contain optional arguments separated by : +# The possible arguments are: +# - exclusive - only single login session will +# be allowed for the user and the user's processes +# will be killed on logout diff --git a/security/time.conf b/security/time.conf new file mode 100644 index 0000000..68d2dad --- /dev/null +++ b/security/time.conf @@ -0,0 +1,65 @@ +# this is an example configuration file for the pam_time module. Its syntax +# was initially based heavily on that of the shadow package (shadow-960129). +# +# the syntax of the lines is as follows: +# +# services;ttys;users;times +# +# white space is ignored and lines maybe extended with '\\n' (escaped +# newlines). As should be clear from reading these comments, +# text following a '#' is ignored to the end of the line. +# +# the combination of individual users/terminals etc is a logic list +# namely individual tokens that are optionally prefixed with '!' (logical +# not) and separated with '&' (logical and) and '|' (logical or). +# +# services +# is a logic list of PAM service names that the rule applies to. +# +# ttys +# is a logic list of terminal names that this rule applies to. +# +# users +# is a logic list of users or a netgroup of users to whom this +# rule applies. +# +# NB. For these items the simple wildcard '*' may be used only once. +# +# times +# the format here is a logic list of day/time-range +# entries the days are specified by a sequence of two character +# entries, MoTuSa for example is Monday Tuesday and Saturday. Note +# that repeated days are unset MoMo = no day, and MoWk = all weekdays +# bar Monday. The two character combinations accepted are +# +# Mo Tu We Th Fr Sa Su Wk Wd Al +# +# the last two being week-end days and all 7 days of the week +# respectively. As a final example, AlFr means all days except Friday. +# +# each day/time-range can be prefixed with a '!' to indicate "anything +# but" +# +# The time-range part is two 24-hour times HHMM separated by a hyphen +# indicating the start and finish time (if the finish time is smaller +# than the start time it is deemed to apply on the following day). +# +# for a rule to be active, ALL of service+ttys+users must be satisfied +# by the applying process. +# + +# +# Here is a simple example: running blank on tty* (any ttyXXX device), +# the users 'you' and 'me' are denied service all of the time +# + +#blank;tty* & !ttyp*;you|me;!Al0000-2400 + +# Another silly example, user 'root' is denied xsh access +# from pseudo terminals at the weekend and on mondays. + +#xsh;ttyp*;root;!WdMo0000-2400 + +# +# End of example file. +# diff --git a/selinux/.config_backup b/selinux/.config_backup new file mode 100644 index 0000000..6a8e7d2 --- /dev/null +++ b/selinux/.config_backup @@ -0,0 +1,29 @@ + +# This file controls the state of SELinux on the system. +# BACKUP_SELINUX= can take one of these three values: +# enforcing - SELinux security policy is enforced. +# permissive - SELinux prints warnings instead of enforcing. +# disabled - No SELinux policy is loaded. +# See also: +# https://docs.fedoraproject.org/en-US/quick-docs/getting-started-with-selinux/#getting-started-with-selinux-selinux-states-and-modes +# +# NOTE: In earlier Fedora kernel builds, BACKUP_SELINUX=disabled would also +# fully disable SELinux during boot. If you need a system with SELinux +# fully disabled instead of SELinux running with no policy loaded, you +# need to pass selinux=0 to the kernel command line. You can use grubby +# to persistently set the bootloader to boot with selinux=0: +# +# grubby --update-kernel ALL --args selinux=0 +# +# To revert back to SELinux enabled: +# +# grubby --update-kernel ALL --remove-args selinux +# +BACKUP_SELINUX=enforcing +# BACKUP_SELINUXTYPE= can take one of these three values: +# targeted - Targeted processes are protected, +# minimum - Modification of targeted policy. Only selected processes are protected. +# mls - Multi Level Security protection. +BACKUP_SELINUXTYPE=targeted + + diff --git a/selinux/config b/selinux/config new file mode 100644 index 0000000..23fc517 --- /dev/null +++ b/selinux/config @@ -0,0 +1,29 @@ + +# This file controls the state of SELinux on the system. +# SELINUX= can take one of these three values: +# enforcing - SELinux security policy is enforced. +# permissive - SELinux prints warnings instead of enforcing. +# disabled - No SELinux policy is loaded. +# See also: +# https://docs.fedoraproject.org/en-US/quick-docs/getting-started-with-selinux/#getting-started-with-selinux-selinux-states-and-modes +# +# NOTE: In earlier Fedora kernel builds, SELINUX=disabled would also +# fully disable SELinux during boot. If you need a system with SELinux +# fully disabled instead of SELinux running with no policy loaded, you +# need to pass selinux=0 to the kernel command line. You can use grubby +# to persistently set the bootloader to boot with selinux=0: +# +# grubby --update-kernel ALL --args selinux=0 +# +# To revert back to SELinux enabled: +# +# grubby --update-kernel ALL --remove-args selinux +# +SELINUX=enforcing +# SELINUXTYPE= can take one of these three values: +# targeted - Targeted processes are protected, +# minimum - Modification of targeted policy. Only selected processes are protected. +# mls - Multi Level Security protection. +SELINUXTYPE=targeted + + diff --git a/selinux/semanage.conf b/selinux/semanage.conf new file mode 100644 index 0000000..406f16f --- /dev/null +++ b/selinux/semanage.conf @@ -0,0 +1,60 @@ +# Authors: Jason Tang +# +# Copyright (C) 2004-2005 Tresys Technology, LLC +# +# This library is free software; you can redistribute it and/or +# modify it under the terms of the GNU Lesser General Public +# License as published by the Free Software Foundation; either +# version 2.1 of the License, or (at your option) any later version. +# +# This library is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU +# Lesser General Public License for more details. +# +# You should have received a copy of the GNU Lesser General Public +# License along with this library; if not, write to the Free Software +# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA +# +# Specify how libsemanage will interact with a SELinux policy manager. +# The four options are: +# +# "source" - libsemanage manipulates a source SELinux policy +# "direct" - libsemanage will write directly to a module store. +# /foo/bar - Write by way of a policy management server, whose +# named socket is at /foo/bar. The path must begin +# with a '/'. +# foo.com:4242 - Establish a TCP connection to a remote policy +# management server at foo.com. If there is a colon +# then the remainder is interpreted as a port number; +# otherwise default to port 4242. +module-store = direct + +# When generating the final linked and expanded policy, by default +# semanage will set the policy version to POLICYDB_VERSION_MAX, as +# given in . Change this setting if a different +# version is necessary. +#policy-version = 19 + +# expand-check check neverallow rules when executing all semanage +# commands. There might be a penalty in execution time if this +# option is enabled. +expand-check=0 + +# usepasswd check tells semanage to scan all pass word records for home directories +# and setup the labeling correctly. If this is turned off, SELinux will label only /home +# and home directories of users with SELinux login mappings defined, see +# semanage login -l for the list of such users. +# If you want to use a different home directory, you will need to use semanage fcontext command. +# For example, if you had home dirs in /althome directory you would have to execute +# semanage fcontext -a -e /home /althome +usepasswd=False +bzip-small=true +bzip-blocksize=5 +ignoredirs=/root;/bin;/boot;/dev;/etc;/lib;/lib64;/proc;/run;/sbin;/sys;/tmp;/usr;/var +optimize-policy=true + +[sefcontext_compile] +path = /usr/sbin/sefcontext_compile +args = -r $@ +[end] diff --git a/selinux/targeted/.policy.sha512 b/selinux/targeted/.policy.sha512 new file mode 100644 index 0000000..79b3d29 --- /dev/null +++ b/selinux/targeted/.policy.sha512 @@ -0,0 +1 @@ +73756c58ceb957a18e84881b0b12e6477d7971868699e2e3db3084123361ca3b9ba5b10cd84f3e8ef975d84a39e9e6fce70df5d1b67b988d3ab00d2ccde2d61f diff --git a/selinux/targeted/booleans.subs_dist b/selinux/targeted/booleans.subs_dist new file mode 100644 index 0000000..fed7d8c --- /dev/null +++ b/selinux/targeted/booleans.subs_dist @@ -0,0 +1,54 @@ +allow_auditadm_exec_content auditadm_exec_content +allow_console_login login_console_enabled +allow_cvs_read_shadow cvs_read_shadow +allow_daemons_dump_core daemons_dump_core +allow_daemons_use_tcp_wrapper daemons_use_tcp_wrapper +allow_daemons_use_tty daemons_use_tty +allow_domain_fd_use domain_fd_use +allow_execheap selinuxuser_execheap +allow_execmod selinuxuser_execmod +allow_execstack selinuxuser_execstack +allow_ftpd_anon_write ftpd_anon_write +allow_ftpd_full_access ftpd_full_access +allow_ftpd_use_cifs ftpd_use_cifs +allow_ftpd_use_nfs ftpd_use_nfs +allow_gssd_read_tmp gssd_read_tmp +allow_guest_exec_content guest_exec_content +allow_httpd_anon_write httpd_anon_write +allow_httpd_mod_auth_ntlm_winbind httpd_mod_auth_ntlm_winbind +allow_httpd_mod_auth_pam httpd_mod_auth_pam +allow_httpd_sys_script_anon_write httpd_sys_script_anon_write +allow_kerberos kerberos_enabled +allow_mplayer_execstack mplayer_execstack +allow_mount_anyfile mount_anyfile +allow_nfsd_anon_write nfsd_anon_write +allow_polyinstantiation polyinstantiation_enabled +allow_postfix_local_write_mail_spool postfix_local_write_mail_spool +allow_rsync_anon_write rsync_anon_write +allow_saslauthd_read_shadow saslauthd_read_shadow +allow_secadm_exec_content secadm_exec_content +allow_smbd_anon_write smbd_anon_write +allow_ssh_keysign ssh_keysign +allow_staff_exec_content staff_exec_content +allow_sysadm_exec_content sysadm_exec_content +allow_user_exec_content user_exec_content +allow_user_mysql_connect selinuxuser_mysql_connect_enabled +allow_user_postgresql_connect selinuxuser_postgresql_connect_enabled +allow_write_xshm xserver_clients_write_xshm +allow_xguest_exec_content xguest_exec_content +allow_xserver_execmem xserver_execmem +allow_ypbind nis_enabled +allow_zebra_write_config zebra_write_config +user_direct_dri selinuxuser_direct_dri_enabled +user_ping selinuxuser_ping +user_share_music selinuxuser_share_music +user_tcp_server selinuxuser_tcp_server +sepgsql_enable_pitr_implementation postgresql_can_rsync +sepgsql_enable_users_ddl postgresql_selinux_users_ddl +sepgsql_transmit_client_label postgresql_selinux_transmit_client_label +sepgsql_unconfined_dbadm postgresql_selinux_unconfined_dbadm +clamd_use_jit antivirus_use_jit +amavis_use_jit antivirus_use_jit +logwatch_can_sendmail logwatch_can_network_connect_mail +puppet_manage_all_files puppetagent_manage_all_files +virt_sandbox_use_nfs virt_use_nfs diff --git a/selinux/targeted/contexts/customizable_types b/selinux/targeted/contexts/customizable_types new file mode 100644 index 0000000..b3f6cb0 --- /dev/null +++ b/selinux/targeted/contexts/customizable_types @@ -0,0 +1,14 @@ +container_file_t +sandbox_file_t +svirt_image_t +svirt_home_t +svirt_sandbox_file_t +virt_content_t +httpd_user_htaccess_t +httpd_user_script_exec_t +httpd_user_rw_content_t +httpd_user_ra_content_t +httpd_user_content_t +git_session_content_t +home_bin_t +user_tty_device_t diff --git a/selinux/targeted/contexts/dbus_contexts b/selinux/targeted/contexts/dbus_contexts new file mode 100644 index 0000000..116e684 --- /dev/null +++ b/selinux/targeted/contexts/dbus_contexts @@ -0,0 +1,6 @@ + + + + + diff --git a/selinux/targeted/contexts/default_contexts b/selinux/targeted/contexts/default_contexts new file mode 100644 index 0000000..698d54c --- /dev/null +++ b/selinux/targeted/contexts/default_contexts @@ -0,0 +1,15 @@ +system_r:crond_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 user_r:cronjob_t:s0 staff_r:cronjob_t:s0 sysadm_r:cronjob_t:s0 system_r:system_cronjob_t:s0 unconfined_r:unconfined_cronjob_t:s0 +system_r:local_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 +system_r:remote_login_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 unconfined_r:unconfined_t:s0 +system_r:sshd_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 +system_r:sulogin_t:s0 sysadm_r:sysadm_t:s0 +system_r:xdm_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 unconfined_r:unconfined_t:s0 + +staff_r:staff_su_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +staff_r:staff_sudo_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 + +sysadm_r:sysadm_su_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_sudo_t:s0 sysadm_r:sysadm_t:s0 + +user_r:user_su_t:s0 user_r:user_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +user_r:user_sudo_t:s0 sysadm_r:sysadm_t:s0 user_r:user_t:s0 diff --git a/selinux/targeted/contexts/default_type b/selinux/targeted/contexts/default_type new file mode 100644 index 0000000..33528d6 --- /dev/null +++ b/selinux/targeted/contexts/default_type @@ -0,0 +1,6 @@ +auditadm_r:auditadm_t +secadm_r:secadm_t +sysadm_r:sysadm_t +staff_r:staff_t +unconfined_r:unconfined_t +user_r:user_t diff --git a/selinux/targeted/contexts/failsafe_context b/selinux/targeted/contexts/failsafe_context new file mode 100644 index 0000000..a50bde7 --- /dev/null +++ b/selinux/targeted/contexts/failsafe_context @@ -0,0 +1 @@ +unconfined_r:unconfined_t:s0 diff --git a/selinux/targeted/contexts/files/file_contexts b/selinux/targeted/contexts/files/file_contexts new file mode 100644 index 0000000..9a14500 --- /dev/null +++ b/selinux/targeted/contexts/files/file_contexts @@ -0,0 +1,6672 @@ +/.* system_u:object_r:default_t:s0 +/[^/]+ -- system_u:object_r:etc_runtime_t:s0 +/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/efi(/.*)? system_u:object_r:boot_t:s0 +/nsr(/.*)? system_u:object_r:var_t:s0 +/sys(/.*)? system_u:object_r:sysfs_t:s0 +/xen(/.*)? system_u:object_r:xen_image_t:s0 +/mnt(/[^/]*)? -d system_u:object_r:mnt_t:s0 +/mnt(/[^/]*)? -l system_u:object_r:mnt_t:s0 +/bin/.* system_u:object_r:bin_t:s0 +/dev/.* system_u:object_r:device_t:s0 +/etc/.* system_u:object_r:etc_t:s0 +/lib/.* system_u:object_r:lib_t:s0 +/opt/.* system_u:object_r:usr_t:s0 +/run/.* system_u:object_r:var_run_t:s0 +/srv/.* system_u:object_r:var_t:s0 +/tmp/.* <> +/usr/.* system_u:object_r:usr_t:s0 +/var/.* system_u:object_r:var_t:s0 +/root(/.*)? system_u:object_r:admin_home_t:s0 +/opt/.*\.cgi -- system_u:object_r:httpd_sys_script_exec_t:s0 +/usr/.*\.cgi -- system_u:object_r:httpd_sys_script_exec_t:s0 +/run/.*\.*pid <> +/dev/[0-9].* -c system_u:object_r:usb_device_t:s0 +/mnt/[^/]*/.* <> +/opt/(.*/)?etc -d system_u:object_r:etc_t:s0 +/opt/(.*/)?var -d system_u:object_r:var_t:s0 +/rhev(/[^/]*)? -d system_u:object_r:mnt_t:s0 +/dev/.*mouse.* -c system_u:object_r:mouse_device_t:s0 +/dev/.*tty[^/]* -c system_u:object_r:tty_device_t:s0 +/etc/.*l2tp(/.*)? system_u:object_r:l2tp_conf_t:s0 +/etc/[mg]dm(/.*)? system_u:object_r:xdm_etc_t:s0 +/opt/(.*/)?etc/.* system_u:object_r:etc_t:s0 +/opt/(.*/)?var/.* system_u:object_r:var_t:s0 +/etc/.*hostname.* -- system_u:object_r:hostname_etc_t:s0 +/dev/(misc/)?psaux -c system_u:object_r:mouse_device_t:s0 +/dev/(raw/)?rawctl -c system_u:object_r:fixed_disk_device_t:s0 +/dev/[shmxv]d[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/opt/.*\.so(\.[^/]*)* system_u:object_r:lib_t:s0 +/var/[xgkw]dm(/.*)? system_u:object_r:xserver_log_t:s0 +/usr/.*\.so(\.[^/]*)* -- system_u:object_r:lib_t:s0 +/opt/(.*/)?bin(/.*)? system_u:object_r:bin_t:s0 +/opt/(.*/)?lib(/.*)? system_u:object_r:lib_t:s0 +/opt/(.*/)?man(/.*)? system_u:object_r:man_t:s0 +/usr/(.*/)?Bin(/.*)? system_u:object_r:bin_t:s0 +/usr/(.*/)?bin(/.*)? system_u:object_r:bin_t:s0 +/usr/(.*/)?lib(/.*)? system_u:object_r:lib_t:s0 +/dev/(misc/)?agpgart -c system_u:object_r:agp_device_t:s0 +/etc/(open)?afs(/.*)? system_u:object_r:afs_config_t:s0 +/opt/(.*/)?sbin(/.*)? system_u:object_r:bin_t:s0 +/usr/(.*/)?sbin(/.*)? system_u:object_r:bin_t:s0 +/etc/(x)?inetd\.d/tftp -- system_u:object_r:tftpd_etc_t:s0 +/opt/(.*/)?jre/.+\.jar -- system_u:object_r:lib_t:s0 +/usr/(local/)?bin/ksu -- system_u:object_r:su_exec_t:s0 +/etc/[mg]dm/Init(/.*)? system_u:object_r:xdm_unconfined_exec_t:s0 +/opt/(.*/)?java/.+\.jar -- system_u:object_r:lib_t:s0 +/usr/(.*/)?java/.+\.jar -- system_u:object_r:lib_t:s0 +/usr/(.*/)?java/.+\.jsa -- system_u:object_r:lib_t:s0 +/dev/(misc/)?rtc[0-9]* -c system_u:object_r:clock_device_t:s0 +/srv/([^/]*/)?ftp(/.*)? system_u:object_r:public_content_t:s0 +/srv/([^/]*/)?www(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/opt/(.*/)?libexec(/.*)? system_u:object_r:bin_t:s0 +/opt/(.*/)?var/lib(/.*)? system_u:object_r:var_lib_t:s0 +/var/(db|adm)/sudo(/.*)? system_u:object_r:pam_var_run_t:s0 +/srv/([^/]*/)?rsync(/.*)? system_u:object_r:public_content_t:s0 +/etc/[mg]dm/PostLogin(/.*)? system_u:object_r:xdm_unconfined_exec_t:s0 +/mnt/(.*/)?\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/dev/[pt]ty[a-ep-z][0-9a-f] -c system_u:object_r:bsdpty_device_t:s0 +/etc/[mg]dm/PreSession(/.*)? system_u:object_r:xdm_unconfined_exec_t:s0 +/srv/([^/]*/)?www/logs(/.*)? system_u:object_r:httpd_log_t:s0 +/usr/(.*/)?nprhapengine\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/etc/[mg]dm/PostSession(/.*)? system_u:object_r:xdm_unconfined_exec_t:s0 +/usr/(.*/)?nvidia/.+\.so(\..*)? -- system_u:object_r:textrel_shlib_t:s0 +/usr/(kerberos/)?sbin/kadmind -- system_u:object_r:kadmind_exec_t:s0 +/usr/(kerberos/)?sbin/krb5kdc -- system_u:object_r:krb5kdc_exec_t:s0 +/usr/(.*/)?java/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/(kerberos/)?sbin/\_kadmind -- system_u:object_r:kadmind_exec_t:s0 +/opt/(.*/)?jre.*/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/(.*/)?jre.*/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/opt/(.*/)?oracle/(.*/)?libnnz.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/opt/(.*/)?/RealPlayer/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/(.*/)?/RealPlayer/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/(.*/)?/HelixPlayer/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/(.*/)?lib(/.*)?/ld-[^/]*\.so(\.[^/]*)* system_u:object_r:ld_so_t:s0 +/usr/(.*/)?lib(64)?(/.*)?/nvidia/.+\.so(\..*)? -- system_u:object_r:textrel_shlib_t:s0 +/usr/(.*/)?intellinux/SPPlugins/ADMPlugin\.apl -- system_u:object_r:textrel_shlib_t:s0 +/etc/(letsencrypt|certbot)/(live|archive)(/.*)? system_u:object_r:cert_t:s0 +/usr/(.*/)?pcsc/drivers(/.*)?/lib(cm2020|cm4000|SCR24x)\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/boot/.* system_u:object_r:boot_t:s0 +/emul/.* system_u:object_r:usr_t:s0 +/proc/.* <> +/sbin/.* system_u:object_r:bin_t:s0 +/bin/d?ash -- system_u:object_r:shell_exec_t:s0 +/root/.ppprc -- system_u:object_r:pppd_etc_t:s0 +/sbin/.*getty -- system_u:object_r:getty_exec_t:s0 +/rhev/[^/]*/.* system_u:object_r:mnt_t:s0 +/root/.manpath -- system_u:object_r:mandb_home_t:s0 +/usr/s?bin/lxc -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/lxd -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/crun -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/nodm -- system_u:object_r:xdm_exec_t:s0 +/usr/s?bin/runc -- system_u:object_r:container_runtime_exec_t:s0 +/media(/[^/]*)? -d system_u:object_r:mnt_t:s0 +/dev/n?pt[0-9]+ -c system_u:object_r:tape_device_t:s0 +/dev/p[fg][0-3] -b system_u:object_r:removable_device_t:s0 +/media(/[^/]*)? -l system_u:object_r:mnt_t:s0 +/dev/s(ou)?nd/.* -c system_u:object_r:sound_device_t:s0 +/usr/s?bin/crio.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/lxc-.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/lxd-.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/ocid.* -- system_u:object_r:container_runtime_exec_t:s0 +/dev/n?z?qft[0-3] -c system_u:object_r:tape_device_t:s0 +/dev/s(cd|r)[^/]* -b system_u:object_r:removable_device_t:s0 +/usr/s?bin/buildah -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/gdm(3)? -- system_u:object_r:xdm_exec_t:s0 +/dev/n?osst[0-3].* -c system_u:object_r:tape_device_t:s0 +/dev/n?tpqic[12].* -c system_u:object_r:tape_device_t:s0 +/usr/s?bin/docker.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/lightdm* -- system_u:object_r:xdm_exec_t:s0 +/dev/n?[hs]t[0-9].* -c system_u:object_r:tape_device_t:s0 +/usr/s?bin/[mxgkw]dm -- system_u:object_r:xdm_exec_t:s0 +/usr/s?bin/fuidshift -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/kubelet.* -- system_u:object_r:kubelet_exec_t:s0 +/usr/s?bin/gdm-binary -- system_u:object_r:xdm_exec_t:s0 +/usr/s?bin/kata-agent -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/buildkitd.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/hyperkube.* -- system_u:object_r:kubelet_exec_t:s0 +/usr/s?bin/containerd.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/mcollectived -- system_u:object_r:openshift_initrc_exec_t:s0 +/usr/s?bin/buildkit-runc -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/docker-latest -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/kubensenter.* -- system_u:object_r:kubelet_exec_t:s0 +/dev/n?(raw)?[qr]ft[0-3] -c system_u:object_r:tape_device_t:s0 +/etc/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/usr/s?bin/docker-current -- system_u:object_r:container_runtime_exec_t:s0 +/usr/s?bin/lxdm(-binary)? -- system_u:object_r:xdm_exec_t:s0 +/usr/s?bin/oo-lists-ports -- system_u:object_r:openshift_net_read_exec_t:s0 +/var/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/usr/s?bin/kubenswrapper.* -- system_u:object_r:kubelet_exec_t:s0 +/usr/s?bin/(oo|rhc)-restorer -- system_u:object_r:openshift_initrc_exec_t:s0 +/usr/s?bin/oo-admin-ctl-gears -- system_u:object_r:openshift_initrc_exec_t:s0 +/usr/s?bin/(oo|rhc)-cgroup-read -- system_u:object_r:openshift_cgroup_read_exec_t:s0 +/usr/s?bin/docker-novolume-plugin -- system_u:object_r:container_auth_exec_t:s0 +/usr/s?bin/(oo|rhc)-restorer-wrapper.sh -- system_u:object_r:openshift_initrc_exec_t:s0 +/dev/cu.* -c system_u:object_r:tty_device_t:s0 +/dev/fw.* -c system_u:object_r:usb_device_t:s0 +/dev/js.* -c system_u:object_r:mouse_device_t:s0 +/dev/lp.* -c system_u:object_r:printer_device_t:s0 +/dev/rb.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/rd.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/pg[0-3] -c system_u:object_r:removable_device_t:s0 +/dev/ub[a-c] -c system_u:object_r:usb_device_t:s0 +/dev/fd[^/]+ -b system_u:object_r:removable_device_t:s0 +/dev/ht[0-1] -b system_u:object_r:tape_device_t:s0 +/dev/nb[^/]+ -b system_u:object_r:fixed_disk_device_t:s0 +/dev/vd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/bacula(/.*)? system_u:object_r:bacula_store_t:s0 +/etc/hp(/.*)? system_u:object_r:cupsd_etc_t:s0 +/etc/rt(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/export(/.*)? system_u:object_r:usr_t:s0 +/ostree(/.*)? system_u:object_r:usr_t:s0 +/var/db(/.*)? system_u:object_r:system_db_t:s0 +/var/yp(/.*)? system_u:object_r:var_yp_t:s0 +/dev/fb[0-9]* -c system_u:object_r:framebuf_device_t:s0 +/dev/sg[0-9]+ -c system_u:object_r:scsi_generic_device_t:s0 +/dev/ss[0-9]+ -c system_u:object_r:gpfs_device_t:s0 +/media/[^/]*/.* <> +/dev/tw[a-z][^/]* -c system_u:object_r:fixed_disk_device_t:s0 +/dev/pd[a-d][^/]* -b system_u:object_r:removable_device_t:s0 +/dev/ub[a-z][^/]+ -b system_u:object_r:removable_device_t:s0 +/dev/ng[0-9]+n[0-9]+ -c system_u:object_r:fixed_disk_device_t:s0 +/opt/cx.*/lib/wine/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/rc.d/init.d/cpuplugd -- system_u:object_r:cpuplug_initrc_exec_t:s0 +/etc/rc.d/init.d/svnserve -- system_u:object_r:svnserve_initrc_exec_t:s0 +/boot/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/bin/ksh.* -- system_u:object_r:shell_exec_t:s0 +/bin/zsh.* -- system_u:object_r:shell_exec_t:s0 +/dev/md/.* -- system_u:object_r:mdadm_var_run_t:s0 +/dev/adb.* -c system_u:object_r:tty_device_t:s0 +/dev/bsr.* -c system_u:object_r:cpu_device_t:s0 +/dev/cmx.* -c system_u:object_r:smartcard_device_t:s0 +/dev/cpu.* -c system_u:object_r:cpu_device_t:s0 +/dev/dlm.* -c system_u:object_r:dlm_control_device_t:s0 +/dev/dsp.* -c system_u:object_r:sound_device_t:s0 +/dev/hvc.* -c system_u:object_r:tty_device_t:s0 +/dev/lik.* -c system_u:object_r:event_device_t:s0 +/dev/msr.* -c system_u:object_r:cpu_device_t:s0 +/dev/mtd.* -c system_u:object_r:fixed_disk_device_t:s0 +/dev/noz.* -c system_u:object_r:modem_device_t:s0 +/dev/par.* -c system_u:object_r:printer_device_t:s0 +/dev/pps.* -c system_u:object_r:clock_device_t:s0 +/dev/ptp.* -c system_u:object_r:clock_device_t:s0 +/dev/tap.* -c system_u:object_r:tun_tap_device_t:s0 +/dev/usb.+ -c system_u:object_r:usb_device_t:s0 +/dev/vbi.* -c system_u:object_r:v4l_device_t:s0 +/dev/vtx.* -c system_u:object_r:v4l_device_t:s0 +/dev/cdu.* -b system_u:object_r:removable_device_t:s0 +/dev/md/.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/mtd.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/ram.* -b system_u:object_r:fixed_disk_device_t:s0 +/vmlinuz.* -l system_u:object_r:boot_t:s0 +/dev/vcc?/.* -c system_u:object_r:tty_device_t:s0 +/dev/i2c[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/ip2[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/tlk[0-3] -c system_u:object_r:v4l_device_t:s0 +/dev/vcs[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/xvc[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/pcd[0-3] -b system_u:object_r:removable_device_t:s0 +/dev/ubd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/xvd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/pts(/.*)? <> +/etc/dcc(/.*)? system_u:object_r:dcc_var_t:s0 +/etc/fdo(/.*)? system_u:object_r:fdo_conf_t:s0 +/etc/gpm(/.*)? system_u:object_r:gpm_conf_t:s0 +/etc/lvm(/.*)? system_u:object_r:lvm_etc_t:s0 +/etc/nas(/.*)? system_u:object_r:soundd_etc_t:s0 +/etc/nsd(/.*)? system_u:object_r:nsd_conf_t:s0 +/etc/pki(/.*)? system_u:object_r:cert_t:s0 +/etc/ssl(/.*)? system_u:object_r:cert_t:s0 +/etc/tor(/.*)? system_u:object_r:tor_etc_t:s0 +/etc/ups(/.*)? system_u:object_r:nut_conf_t:s0 +/exports(/.*)? system_u:object_r:container_var_lib_t:s0 +/opt/cvs(/.*)? system_u:object_r:cvs_data_t:s0 +/sandbox(/.*)? system_u:object_r:tmp_t:s0 +/stratis(/.*)? system_u:object_r:stratisd_data_t:s0 +/usr/afs(/.*)? system_u:object_r:afs_files_t:s0 +/usr/etc(/.*)? system_u:object_r:etc_t:s0 +/usr/man(/.*)? system_u:object_r:man_t:s0 +/var/ace(/.*)? system_u:object_r:var_auth_t:s0 +/var/cvs(/.*)? system_u:object_r:cvs_data_t:s0 +/var/dcc(/.*)? system_u:object_r:dcc_var_t:s0 +/var/fdo(/.*)? system_u:object_r:fdo_var_t:s0 +/var/ftp(/.*)? system_u:object_r:public_content_t:s0 +/var/lib(/.*)? system_u:object_r:var_lib_t:s0 +/var/rsa(/.*)? system_u:object_r:var_auth_t:s0 +/var/svn(/.*)? system_u:object_r:svnserve_content_t:s0 +/var/www(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/etc/ppp(/.*)? -- system_u:object_r:pppd_etc_rw_t:s0 +/dev/clp[0-9]* -c system_u:object_r:vfio_device_t:s0 +/dev/mei[0-9]* -c system_u:object_r:mei_device_t:s0 +/dev/tpm[0-9]* -c system_u:object_r:tpm_device_t:s0 +/dev/uio[0-9]+ -c system_u:object_r:userio_device_t:s0 +/dev/xvc[0-9]* -c system_u:object_r:tty_device_t:s0 +/dev/dm-[0-9]+ -b system_u:object_r:fixed_disk_device_t:s0 +/dev/mpt[0-9]*ctl -c system_u:object_r:mptctl_device_t:s0 +/etc/gdm(3)?/Xsession -- system_u:object_r:xsession_exec_t:s0 +/usr/lib(.*/)?bin(/.*)? system_u:object_r:bin_t:s0 +/usr/doc(/.*)?/lib(/.*)? system_u:object_r:usr_t:s0 +/usr/lib(.*/)?sbin(/.*)? system_u:object_r:bin_t:s0 +/etc/kde[34]?/kdm/Xreset -- system_u:object_r:xsession_exec_t:s0 +/var/www(/.*)?/logs(/.*)? system_u:object_r:httpd_log_t:s0 +/lib/ld-[^/]*\.so(\.[^/]*)* -- system_u:object_r:ld_so_t:s0 +/etc/gdm(3)?/PreSession/.* -- system_u:object_r:xsession_exec_t:s0 +/etc/kde[34]?/kdm/Xsession -- system_u:object_r:xsession_exec_t:s0 +/etc/kde[34]?/kdm/Xstartup -- system_u:object_r:xsession_exec_t:s0 +/etc/gdm(3)?/PostSession/.* -- system_u:object_r:xsession_exec_t:s0 +/etc/kde[34]?/kdm/backgroundrc system_u:object_r:xdm_var_run_t:s0 +/usr/lib.*/libmpg123\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib.*/libnvidia\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib(/.*)?/nvidia/.+\.so(\..*)? -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib(64)?/nagios/plugins/check_nt -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_dig -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_dns -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_log -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_rpc -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_sip -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ssh -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_tcp -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ups -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(/.*)?/nvidia_drv.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib(64)?/nagios/plugins/check_dhcp -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_game -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_hpjd -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_http -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_icmp -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ircd -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ldap -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_load -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_mrtg -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_nrpe -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ping -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_real -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_smtp -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_swap -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_time -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_wave -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_dummy -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_fping -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_mysql -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ntp.* -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_pgsql -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_procs -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_users -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_breeze -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_flexlm -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_nagios -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_nwstat -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_oracle -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_overcr -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_radius -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_snmp.* -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_cluster -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_sensors -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ifstatus -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_mrtgtraf -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_mysql_query -- system_u:object_r:nagios_services_plugin_exec_t:s0 +/usr/lib(64)?/nagios/plugins/check_ifoperstatus -- system_u:object_r:nagios_system_plugin_exec_t:s0 +/dev/mcdx? -b system_u:object_r:removable_device_t:s0 +/dev/shm/.* <> +/etc/mrtg.* system_u:object_r:mrtg_etc_t:s0 +/etc/ntop.* system_u:object_r:ntop_etc_t:s0 +/selinux/.* <> +/service/.* system_u:object_r:svc_svc_t:s0 +/usr/lib/.* system_u:object_r:lib_t:s0 +/usr/tmp/.* <> +/var/log/.* system_u:object_r:var_log_t:s0 +/var/run/.* system_u:object_r:var_run_t:s0 +/var/tmp/.* <> +/bin/ping.* -- system_u:object_r:ping_exec_t:s0 +/etc/mtab.* -- system_u:object_r:etc_runtime_t:s0 +/etc/rndc.* -- system_u:object_r:named_conf_t:s0 +/lib/nut/.* -- system_u:object_r:bin_t:s0 +/dev/adsp.* -c system_u:object_r:sound_device_t:s0 +/dev/bsg/.+ -c system_u:object_r:scsi_generic_device_t:s0 +/dev/capi.* -c system_u:object_r:tty_device_t:s0 +/dev/card.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/dmfm.* -c system_u:object_r:sound_device_t:s0 +/dev/dri/.+ -c system_u:object_r:dri_device_t:s0 +/dev/dvb/.* -c system_u:object_r:v4l_device_t:s0 +/dev/hvsi.* -c system_u:object_r:tty_device_t:s0 +/dev/ippp.* -c system_u:object_r:ppp_device_t:s0 +/dev/isdn.* -c system_u:object_r:tty_device_t:s0 +/dev/midi.* -c system_u:object_r:sound_device_t:s0 +/dev/net/.* -c system_u:object_r:tun_tap_device_t:s0 +/dev/pty/.* -c system_u:object_r:bsdpty_device_t:s0 +/dev/tape.* -c system_u:object_r:tape_device_t:s0 +/dev/vbox.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/wwan.+ -c system_u:object_r:modem_device_t:s0 +/dev/cm20.* -b system_u:object_r:removable_device_t:s0 +/dev/loop.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/ps3d.* -b system_u:object_r:fixed_disk_device_t:s0 +/etc/xen/.*/.* system_u:object_r:virt_etc_rw_t:s0 +/etc/xen/[^/]* -- system_u:object_r:virt_etc_t:s0 +/etc/gdm/[^/]+ -d system_u:object_r:bin_t:s0 +/etc/xen/[^/]* -d system_u:object_r:virt_etc_rw_t:s0 +/dev/dasd[^/]* -c system_u:object_r:fixed_disk_device_t:s0 +/dev/srnd[0-7] -c system_u:object_r:sound_device_t:s0 +/dev/tts/[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/dasd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/drbd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/ida/[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/etc/abrt(/.*)? system_u:object_r:abrt_etc_t:s0 +/etc/crio(/.*)? system_u:object_r:container_config_t:s0 +/etc/cups(/.*)? system_u:object_r:cupsd_etc_t:s0 +/etc/glpi(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/lirc(/.*)? system_u:object_r:lircd_etc_t:s0 +/etc/mail(/.*)? system_u:object_r:etc_mail_t:s0 +/etc/news(/.*)? system_u:object_r:innd_etc_t:s0 +/etc/pdns(/.*)? system_u:object_r:pdns_conf_t:s0 +/etc/psad(/.*)? system_u:object_r:psad_etc_t:s0 +/etc/rhsm(/.*)? system_u:object_r:rhsmcertd_config_t:s0 +/etc/sslh(/.*)? system_u:object_r:sslh_config_t:s0 +/etc/sssd(/.*)? system_u:object_r:sssd_conf_t:s0 +/etc/yiff(/.*)? system_u:object_r:soundd_etc_t:s0 +/nsr/logs(/.*)? system_u:object_r:var_log_t:s0 +/root/bin(/.*)? system_u:object_r:bin_t:s0 +/run/crio(/.*)? system_u:object_r:container_var_run_t:s0 +/run/lock(/.*)? system_u:object_r:var_lock_t:s0 +/srv/node(/.*)? system_u:object_r:swift_data_t:s0 +/var/ccpd(/.*)? system_u:object_r:cupsd_var_run_t:s0 +/var/ctdb(/.*)? system_u:object_r:ctdbd_var_t:s0 +/var/ekpd(/.*)? system_u:object_r:cupsd_var_run_t:s0 +/var/imap(/.*)? system_u:object_r:cyrus_var_lib_t:s0 +/var/mail(/.*)? system_u:object_r:mail_spool_t:s0 +/var/nmbd(/.*)? system_u:object_r:samba_var_t:s0 +/var/vdsm(/.*)? system_u:object_r:virt_var_run_t:s0 +/dev/gnss[0-9]+ -c system_u:object_r:gnss_device_t:s0 +/dev/ipmi[0-9]+ -c system_u:object_r:ipmi_device_t:s0 +/dev/lirc[0-9]+ -c system_u:object_r:lirc_device_t:s0 +/dev/nvme[0-9]+ -c system_u:object_r:fixed_disk_device_t:s0 +/dev/sclp[0-9]* -c system_u:object_r:vfio_device_t:s0 +/dev/vmcp[0-9]* -c system_u:object_r:vfio_device_t:s0 +/dev/zram[0-9]+ -b system_u:object_r:fixed_disk_device_t:s0 +/var/run/.*\.*pid <> +/etc/gpm-.*\.conf -- system_u:object_r:gpm_conf_t:s0 +/usr/bin/[st]irc -- system_u:object_r:irc_exec_t:s0 +/etc/gdm/[^/]+/.* system_u:object_r:bin_t:s0 +/var/run/.*cron.* -- system_u:object_r:crond_var_run_t:s0 +/etc/ntpd.*\.conf.* -- system_u:object_r:ntp_conf_t:s0 +/etc/ppp/.*secrets -- system_u:object_r:pppd_secret_t:s0 +/var/run/*.xl2tpd.* -- system_u:object_r:l2tpd_var_run_t:s0 +/var/run/.*nologin.* system_u:object_r:systemd_logind_var_run_t:s0 +/etc/tcb/.+/shadow.* -- system_u:object_r:shadow_t:s0 +/usr/bin/(f)?crontab -- system_u:object_r:crontab_exec_t:s0 +/var/run/.*l2tpd\.pid -- system_u:object_r:l2tpd_var_run_t:s0 +/dev/nvme[0-9]n[^/]+ -b system_u:object_r:fixed_disk_device_t:s0 +/etc/cron.daily(/.*)? system_u:object_r:bin_t:s0 +/usr/bin/.*_lsmplugin -- system_u:object_r:lsmd_plugin_exec_t:s0 +/etc/cron.hourly(/.*)? system_u:object_r:bin_t:s0 +/etc/cron.weekly(/.*)? system_u:object_r:bin_t:s0 +/var/run/.*l2tpd(/.*)? system_u:object_r:l2tpd_var_run_t:s0 +/var/run/[kgm]dm(/.*)? system_u:object_r:xdm_var_run_t:s0 +/usr/bin/(se)?postgres -- system_u:object_r:postgresql_exec_t:s0 +/var/run/(x)?inetd\.pid -- system_u:object_r:inetd_var_run_t:s0 +/var/run/*.fingerd\.pid -- system_u:object_r:fingerd_var_run_t:s0 +/etc/cron.monthly(/.*)? system_u:object_r:bin_t:s0 +/usr/var/[xgkw]dm(/.*)? system_u:object_r:xserver_log_t:s0 +/var/log/[mkwx]dm\.log.* -- system_u:object_r:xdm_log_t:s0 +/var/lib/[mxkwg]dm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/etc/X11/[wx]dm/Xreset.* -- system_u:object_r:xsession_exec_t:s0 +/var/log/(x)?inetd\.log.* -- system_u:object_r:inetd_log_t:s0 +/usr/lib/.*/program(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/.*/scripts(/.*)? system_u:object_r:bin_t:s0 +/var/lib/[^/]+/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/[sm]locate(/.*)? system_u:object_r:locate_var_lib_t:s0 +/etc/X11/[wxg]dm/Xsession -- system_u:object_r:xsession_exec_t:s0 +/usr/bin/[^/]*thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/var/run/(i)?ppp.*pid[^/]* -- system_u:object_r:pppd_var_run_t:s0 +/usr/lib/.*/program(/.*)?\.so system_u:object_r:lib_t:s0 +/var/www/[^/]*/cgi-bin(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/usr/lib/[^/]*/colord/colord -- system_u:object_r:colord_exec_t:s0 +/usr/lib/.*/nprhapengine\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/[^/]*/run-mozilla\.sh -- system_u:object_r:bin_t:s0 +/usr/lib/.*/libflashplayer\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/boot/efi(/.*)?/System\.map(-.*)? -- system_u:object_r:system_map_t:s0 +/usr/lib/(sse2/)?libfame-.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libsoffice\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/[^/]*/colord/colord-sane -- system_u:object_r:colord_exec_t:s0 +/etc/cron.minutely/openshift-facts -- system_u:object_r:openshift_cron_exec_t:s0 +/usr/lib/.*/program/libsts645li\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libsvx680li\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libswd680li\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libwrp645li\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/[^/]*firefox[^/]*/firefox -- system_u:object_r:mozilla_exec_t:s0 +/etc/ppp/(auth|ip(v6|x)?)-(up|down) -- system_u:object_r:pppd_initrc_exec_t:s0 +/usr/lib/(.*/)?jre.*/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libicudata\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/librecentfile\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/pki/(fwupd|fwupd-metadata)(/.*)? system_u:object_r:fwupd_cert_t:s0 +/usr/lib/[^/]*/mozilla-xremote-client -- system_u:object_r:bin_t:s0 +/usr/lib/[^/]*firefox[^/]*/firefox-bin -- system_u:object_r:mozilla_exec_t:s0 +/usr/lib/.*/program/libcomphelp4gcc3\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/.*/program/libvclplug_gen645li\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/[^/]*thunderbird[^/]*/thunderbird -- system_u:object_r:bin_t:s0 +/usr/lib/[^/]*thunderbird[^/]*/open-browser\.sh -- system_u:object_r:bin_t:s0 +/usr/lib/[^/]*thunderbird[^/]*/thunderbird-bin -- system_u:object_r:bin_t:s0 +/usr/lib/(virtualbox(-ose)?/)?(components/)?VBox.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/dhcpc.* system_u:object_r:dhcp_etc_t:s0 +/tftpboot/.* system_u:object_r:tftpdir_t:s0 +/tmp-inst/.* <> +/var/lock/.* <> +/bin/mount.* -- system_u:object_r:mount_exec_t:s0 +/sbin/fsck.* -- system_u:object_r:fsadm_exec_t:s0 +/sbin/grub.* -- system_u:object_r:bootloader_exec_t:s0 +/sbin/jfs_.* -- system_u:object_r:fsadm_exec_t:s0 +/sbin/lilo.* -- system_u:object_r:bootloader_exec_t:s0 +/sbin/mkfs.* -- system_u:object_r:fsadm_exec_t:s0 +/sbin/rpc\..* -- system_u:object_r:rpcd_exec_t:s0 +/sbin/ybin.* -- system_u:object_r:bootloader_exec_t:s0 +/dev/aload.* -c system_u:object_r:sound_device_t:s0 +/dev/amidi.* -c system_u:object_r:sound_device_t:s0 +/dev/audio.* -c system_u:object_r:sound_device_t:s0 +/dev/event.* -c system_u:object_r:event_device_t:s0 +/dev/gtrsc.* -c system_u:object_r:clock_device_t:s0 +/dev/media.* -c system_u:object_r:v4l_device_t:s0 +/dev/mixer.* -c system_u:object_r:sound_device_t:s0 +/dev/pppox.* -c system_u:object_r:ppp_device_t:s0 +/dev/radio.* -c system_u:object_r:v4l_device_t:s0 +/dev/rmidi.* -c system_u:object_r:sound_device_t:s0 +/dev/smpte.* -c system_u:object_r:sound_device_t:s0 +/dev/ttySG.* -c system_u:object_r:tty_device_t:s0 +/dev/usblp.* -c system_u:object_r:printer_device_t:s0 +/dev/video.* -c system_u:object_r:v4l_device_t:s0 +/dev/vmnet.* -c system_u:object_r:vmware_device_t:s0 +/dev/vport.* -c system_u:object_r:virtio_device_t:s0 +/dev/sbpcd.* -b system_u:object_r:removable_device_t:s0 +/usr/bin/d?ash -- system_u:object_r:shell_exec_t:s0 +/etc/auto\.[^/]* -- system_u:object_r:bin_t:s0 +/etc/group[-\+]? -- system_u:object_r:passwd_file_t:s0 +/etc/hosts[^/]* -- system_u:object_r:net_conf_t:s0 +/etc/mail/.*\.db -- system_u:object_r:etc_aliases_t:s0 +/lib/udev/[^/]* -- system_u:object_r:bin_t:s0 +/sbin/init(ng)? -- system_u:object_r:init_exec_t:s0 +/dev/ndctl[0-9] -c system_u:object_r:nvram_device_t:s0 +/dev/flash[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/nfast(/.*)? system_u:object_r:pki_common_dev_t:s0 +/etc/audit(/.*)? system_u:object_r:auditd_etc_t:s0 +/etc/avahi(/.*)? system_u:object_r:avahi_conf_t:s0 +/etc/blkid(/.*)? system_u:object_r:etc_runtime_t:s0 +/etc/booth(/.*)? system_u:object_r:boothd_etc_t:s0 +/etc/gconf(/.*)? system_u:object_r:gconf_etc_t:s0 +/etc/horde(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/htdig(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/etc/httpd(/.*)? system_u:object_r:httpd_config_t:s0 +/etc/munin(/.*)? system_u:object_r:munin_etc_t:s0 +/etc/mysql(/.*)? system_u:object_r:mysqld_etc_t:s0 +/etc/named(/.*)? system_u:object_r:named_conf_t:s0 +/etc/nginx(/.*)? system_u:object_r:httpd_config_t:s0 +/etc/pyzor(/.*)? system_u:object_r:spamd_etc_t:s0 +/etc/raddb(/.*)? system_u:object_r:radiusd_etc_t:s0 +/etc/razor(/.*)? system_u:object_r:spamd_etc_t:s0 +/etc/redis(/.*)? system_u:object_r:redis_conf_t:s0 +/etc/samba(/.*)? system_u:object_r:samba_etc_t:s0 +/etc/snort(/.*)? system_u:object_r:snort_etc_t:s0 +/etc/squid(/.*)? system_u:object_r:squid_conf_t:s0 +/etc/tuned(/.*)? system_u:object_r:tuned_etc_t:s0 +/etc/zebra(/.*)? system_u:object_r:zebra_conf_t:s0 +/opt/nfast(/.*)? system_u:object_r:pki_common_t:s0 +/root/\.kde(/.*)? system_u:object_r:config_home_t:s0 +/root/\.pki(/.*)? system_u:object_r:home_cert_t:s0 +/root/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/run/mount(/.*)? system_u:object_r:mount_var_run_t:s0 +/var/crash(/.*)? system_u:object_r:kdump_crash_t:s0 +/var/games(/.*)? system_u:object_r:games_data_t:s0 +/var/named(/.*)? system_u:object_r:named_zone_t:s0 +/var/spool(/.*)? system_u:object_r:var_spool_t:s0 +/dev/\.udev(/.*)? -- system_u:object_r:udev_var_run_t:s0 +/sbin/dump.exfat -- system_u:object_r:fsadm_exec_t:s0 +/sbin/tune.exfat -- system_u:object_r:fsadm_exec_t:s0 +/dev/dcbri[0-9]+ -c system_u:object_r:tty_device_t:s0 +/dev/ipmi/[0-9]+ -c system_u:object_r:ipmi_device_t:s0 +/dev/irlpt[0-9]+ -c system_u:object_r:printer_device_t:s0 +/dev/slamr[0-9]+ -c system_u:object_r:tty_device_t:s0 +/dev/tpmrm[0-9]* -c system_u:object_r:tpm_device_t:s0 +/etc/dhcp3?(/.*)? system_u:object_r:dhcp_etc_t:s0 +/usr/sbin/.*getty -- system_u:object_r:getty_exec_t:s0 +/usr/sbin/.*l2tpd -- system_u:object_r:l2tpd_exec_t:s0 +/usr/inclu.e(/.*)? system_u:object_r:usr_t:s0 +/etc/udev/.*hwdb.* -- system_u:object_r:systemd_hwdb_etc_t:s0 +/etc/dhcpd(6)?\.conf -- system_u:object_r:dhcp_etc_t:s0 +/usr/sbin/(x)?inetd -- system_u:object_r:inetd_exec_t:s0 +/var/lock/.*librtas -- system_u:object_r:rtas_errd_var_lock_t:s0 +/etc/dhcp3?/dhclient.* system_u:object_r:dhcp_etc_t:s0 +/usr/sbin/[cef]fingerd -- system_u:object_r:fingerd_exec_t:s0 +/var/lib/r?syslog(/.*)? system_u:object_r:syslogd_var_lib_t:s0 +/opt/Adobe.*/libcurl\.so -- system_u:object_r:textrel_shlib_t:s0 +/dev/vfio/(vfio)?[0-9]* -c system_u:object_r:vfio_device_t:s0 +/var/run/\.?acpid\.socket -s system_u:object_r:apmd_var_run_t:s0 +/opt/Adobe(/.*?)/nppdf\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/cron\.(daily|monthly)/acct -- system_u:object_r:acct_exec_t:s0 +/etc/cron\.(daily|monthly)/mailman -- system_u:object_r:mailman_queue_exec_t:s0 +/etc/cron\.(daily|monthly)/radiusd -- system_u:object_r:radiusd_exec_t:s0 +/etc/cron\.(daily|weekly)/man-db.* -- system_u:object_r:mandb_exec_t:s0 +/etc/cron\.(daily|weekly)/sysklogd -- system_u:object_r:logrotate_exec_t:s0 +/etc/cron\.(daily|weekly)/ntp-server -- system_u:object_r:ntpd_exec_t:s0 +/etc/cron\.(daily|weekly)/ntp-simple -- system_u:object_r:ntpd_exec_t:s0 +/etc/cron\.((daily)|(weekly)|(monthly))/freeradius -- system_u:object_r:radiusd_exec_t:s0 +/etc/bacula.* system_u:object_r:bacula_etc_t:s0 +/etc/drupal.* system_u:object_r:httpd_sys_rw_content_t:s0 +/bin/umount.* -- system_u:object_r:mount_exec_t:s0 +/etc/dev\.d/.+ -- system_u:object_r:udev_helper_exec_t:s0 +/etc/shadow.* -- system_u:object_r:shadow_t:s0 +/root/\.DCOP.* -- system_u:object_r:iceauth_home_t:s0 +/root/\.dmrc.* -- system_u:object_r:xdm_home_t:s0 +/sbin/mount.* -- system_u:object_r:mount_exec_t:s0 +/sbin/rmmod.* -- system_u:object_r:kmod_exec_t:s0 +/usr/games/.* -- system_u:object_r:games_exec_t:s0 +/dev/amixer.* -c system_u:object_r:sound_device_t:s0 +/dev/autofs.* -c system_u:object_r:autofs_device_t:s0 +/dev/dahdi/.* -c system_u:object_r:sound_device_t:s0 +/dev/dmmidi.* -c system_u:object_r:sound_device_t:s0 +/dev/em8300.* -c system_u:object_r:v4l_device_t:s0 +/dev/hiddev.* -c system_u:object_r:usb_device_t:s0 +/dev/hidraw.* -c system_u:object_r:usb_device_t:s0 +/dev/input/.* -c system_u:object_r:event_device_t:s0 +/dev/mpu401.* -c system_u:object_r:sound_device_t:s0 +/dev/nvidia.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/spidev.* -c system_u:object_r:usb_device_t:s0 +/dev/usb/lp.* -c system_u:object_r:printer_device_t:s0 +/dev/usbmon.+ -c system_u:object_r:usbmon_device_t:s0 +/dev/mmcblk.* -b system_u:object_r:removable_device_t:s0 +/dev/mspblk.* -b system_u:object_r:removable_device_t:s0 +/etc/httpd/.* -l system_u:object_r:etc_t:s0 +/initrd\.img.* -l system_u:object_r:boot_t:s0 +/usr/sbin/r?ndc -- system_u:object_r:ndc_exec_t:s0 +/dev/patmgr[01] -c system_u:object_r:sound_device_t:s0 +/etc/syslog.conf system_u:object_r:syslog_conf_t:s0 +/etc/locale.conf -- system_u:object_r:locale_t:s0 +/etc/passwd[-\+]? -- system_u:object_r:passwd_file_t:s0 +/dev/hpilo/[^/]* -c system_u:object_r:tty_device_t:s0 +/dev/cciss/[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/i2o/hd[^/]* -b system_u:object_r:fixed_disk_device_t:s0 +/\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/dev/\.mount(/.*)? system_u:object_r:mount_var_run_t:s0 +/dev/mqueue(/.*)? <> +/etc/amanda(/.*)? system_u:object_r:amanda_config_t:s0 +/etc/asound(/.*)? system_u:object_r:alsa_etc_rw_t:s0 +/etc/condor(/.*)? system_u:object_r:condor_conf_t:s0 +/etc/cron\.d(/.*)? system_u:object_r:system_cron_spool_t:s0 +/etc/dbus-1(/.*)? system_u:object_r:dbusd_etc_t:s0 +/etc/dirsrv(/.*)? system_u:object_r:dirsrv_config_t:s0 +/etc/docker(/.*)? system_u:object_r:container_config_t:s0 +/etc/icinga(/.*)? system_u:object_r:nagios_etc_t:s0 +/etc/kmscon(/.*)? system_u:object_r:kmscon_conf_t:s0 +/etc/lvmtab(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/mcelog(/.*)? system_u:object_r:mcelog_etc_t:s0 +/etc/mgetty(/.*)? system_u:object_r:getty_etc_t:s0 +/etc/mptcpd(/.*)? system_u:object_r:mptcpd_etc_t:s0 +/etc/nagios(/.*)? system_u:object_r:nagios_etc_t:s0 +/etc/pki-ca(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/etc/pki-ra(/.*)? system_u:object_r:pki_ra_etc_rw_t:s0 +/etc/polipo(/.*)? system_u:object_r:polipo_etc_t:s0 +/etc/puppet(/.*)? system_u:object_r:puppet_etc_t:s0 +/etc/quagga(/.*)? system_u:object_r:zebra_conf_t:s0 +/etc/racoon(/.*)? system_u:object_r:ipsec_conf_file_t:s0 +/etc/target(/.*)? system_u:object_r:targetd_etc_rw_t:s0 +/etc/z-push(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/zarafa(/.*)? system_u:object_r:zarafa_etc_t:s0 +/opt/NX/var(/.*)? system_u:object_r:nx_server_var_run_t:s0 +/root/\.cert(/.*)? system_u:object_r:home_cert_t:s0 +/root/\.dbus(/.*)? system_u:object_r:dbus_home_t:s0 +/root/\.xine(/.*)? system_u:object_r:config_home_t:s0 +/run/docker(/.*)? system_u:object_r:container_var_run_t:s0 +/var/agentx(/.*)? system_u:object_r:snmpd_var_lib_t:s0 +/var/amavis(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/bacula(/.*)? system_u:object_r:bacula_store_t:s0 +/var/clamav(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/lib/hp(/.*)? system_u:object_r:cupsd_var_lib_t:s0 +/var/lib/oz(/.*)? system_u:object_r:virt_var_lib_t:s0 +/var/log/hp(/.*)? system_u:object_r:cupsd_log_t:s0 +/var/log/sa(/.*)? system_u:object_r:sysstat_log_t:s0 +/var/motion(/.*)? system_u:object_r:motion_data_t:s0 +/var/racoon(/.*)? system_u:object_r:ipsec_var_run_t:s0 +/var/target(/.*)? system_u:object_r:targetd_var_t:s0 +/var/webmin(/.*)? system_u:object_r:var_log_t:s0 +/usr/Adobe/.*\.api -- system_u:object_r:textrel_shlib_t:s0 +/var/run/hp.*\.pid -- system_u:object_r:cupsd_var_run_t:s0 +/dev/ircomm[0-9]+ -c system_u:object_r:tty_device_t:s0 +/dev/rfcomm[0-9]+ -c system_u:object_r:tty_device_t:s0 +/dev/ttyUSB[0-9]+ -c system_u:object_r:usbtty_device_t:s0 +/dev/bcache[0-9]+ -b system_u:object_r:fixed_disk_device_t:s0 +/var/run/hp.*\.port -- system_u:object_r:cupsd_var_run_t:s0 +/etc/vmware.*(/.*)? system_u:object_r:vmware_sys_conf_t:s0 +/usr/bin/lp(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/etc/amavis(d)?\.conf -- system_u:object_r:antivirus_conf_t:s0 +/etc/avahi/.*\.action -- system_u:object_r:bin_t:s0 +/dev/input/.*mouse.* -c system_u:object_r:mouse_device_t:s0 +/etc/apache(2)?(/.*)? system_u:object_r:httpd_config_t:s0 +/sbin/quota(check|on) -- system_u:object_r:quota_exec_t:s0 +/dev/mmcblk[0-9]+rpmb -c system_u:object_r:removable_device_t:s0 +/usr/lib/qt.*/bin(/.*)? system_u:object_r:bin_t:s0 +/var/cache/[mg]dm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/spool/[mg]dm(/.*)? system_u:object_r:xdm_spool_t:s0 +/opt/matlab.*\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/usr/matlab.*\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/var/cache/(open)?afs(/.*)? system_u:object_r:afs_cache_t:s0 +/var/spool/(client)?mqueue(/.*)? system_u:object_r:mqueue_spool_t:s0 +/usr/Adobe/(.*/)?intellinux/nppdf\.so -- system_u:object_r:textrel_shlib_t:s0 +/var/spool/(.*/)?a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/usr/Adobe/(.*/)?intellinux/sidecars/* -- system_u:object_r:textrel_shlib_t:s0 +/usr/Adobe/(.*/)?lib/[^/]*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/rt(3|4)/data/RT-Shredder(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/usr/matlab.*/bin/glnx86/libmwlapack\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/matlab.*/sys/os/glnx86/libtermcap\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/.*/gems/.*/helper-scripts/prespawn -- system_u:object_r:passenger_exec_t:s0 +/usr/matlab.*/bin/glnx86/(libmw(lapack|mathutil|services)|lapack|libmkl)\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/mailman.* system_u:object_r:mailman_data_t:s0 +/etc/postfix.* system_u:object_r:postfix_etc_t:s0 +/lost\+found/.* <> +/sys/fs/bpf/.* <> +/var/log/bip.* system_u:object_r:bitlbee_log_t:s0 +/etc/gshadow.* -- system_u:object_r:shadow_t:s0 +/etc/init\.d/.* -- system_u:object_r:initrc_exec_t:s0 +/etc/nologin.* -- system_u:object_r:etc_runtime_t:s0 +/etc/nshadow.* -- system_u:object_r:shadow_t:s0 +/etc/yp\.conf.* -- system_u:object_r:net_conf_t:s0 +/lib/lvm-10/.* -- system_u:object_r:lvm_exec_t:s0 +/media/\.hal-.* -- system_u:object_r:mnt_t:s0 +/root/\.Xauth.* -- system_u:object_r:xauth_home_t:s0 +/root/\.xauth.* -- system_u:object_r:xauth_home_t:s0 +/sbin/depmod.* -- system_u:object_r:kmod_exec_t:s0 +/sbin/insmod.* -- system_u:object_r:kmod_exec_t:s0 +/sbin/swapon.* -- system_u:object_r:fsadm_exec_t:s0 +/sbin/umount.* -- system_u:object_r:mount_exec_t:s0 +/tmp/libdnf\..+ -- system_u:object_r:user_tmp_t:s0 +/usr/bin/ksh.* -- system_u:object_r:shell_exec_t:s0 +/usr/bin/zsh.* -- system_u:object_r:shell_exec_t:s0 +/usr/lib/yp/.+ -- system_u:object_r:bin_t:s0 +/var/log/ntp.* -- system_u:object_r:ntpd_log_t:s0 +/var/run/sbd.* -- system_u:object_r:sbd_var_run_t:s0 +/var/run/yum.* -- system_u:object_r:rpm_var_run_t:s0 +/dev/admmidi.* -c system_u:object_r:sound_device_t:s0 +/dev/etherd/.+ -c system_u:object_r:lvm_control_t:s0 +/dev/input/m.* -c system_u:object_r:mouse_device_t:s0 +/dev/megadev.* -c system_u:object_r:fixed_disk_device_t:s0 +/dev/mga_vid.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/mvideo/.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/raw1394.* -c system_u:object_r:v4l_device_t:s0 +/dev/usb/tty.* -c system_u:object_r:usbtty_device_t:s0 +/dev/etherd/.+ -b system_u:object_r:fixed_disk_device_t:s0 +/dev/mapper/.* -b system_u:object_r:fixed_disk_device_t:s0 +/sbin/resize.*fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/gpg(2)? -- system_u:object_r:gpg_exec_t:s0 +/etc/rsyslog.conf system_u:object_r:syslog_conf_t:s0 +/dev/cdc-wdm[0-9] -c system_u:object_r:modem_device_t:s0 +/dev/floppy/[^/]* -b system_u:object_r:removable_device_t:s0 +/dev/pktcdvd[0-7] -b system_u:object_r:removable_device_t:s0 +/dev/stratis(/.*)? system_u:object_r:stratisd_data_t:s0 +/etc/Pegasus(/.*)? system_u:object_r:pegasus_conf_t:s0 +/etc/X11/wdm(/.*)? system_u:object_r:xdm_rw_etc_t:s0 +/etc/amavisd(/.*)? system_u:object_r:antivirus_conf_t:s0 +/etc/bitlbee(/.*)? system_u:object_r:bitlbee_conf_t:s0 +/etc/cluster(/.*)? system_u:object_r:cluster_conf_t:s0 +/etc/cobbler(/.*)? system_u:object_r:cobbler_etc_t:s0 +/etc/couchdb(/.*)? system_u:object_r:couchdb_conf_t:s0 +/etc/courier(/.*)? system_u:object_r:courier_etc_t:s0 +/etc/dovecot(/.*)? system_u:object_r:dovecot_etc_t:s0 +/etc/ipsec\.d(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/etc/kde/env(/.*)? system_u:object_r:bin_t:s0 +/etc/kde/kdm(/.*)? system_u:object_r:bin_t:s0 +/etc/krb5kdc(/.*)? system_u:object_r:krb5kdc_conf_t:s0 +/etc/mplayer(/.*)? system_u:object_r:mplayer_etc_t:s0 +/etc/openvpn(/.*)? system_u:object_r:openvpn_etc_t:s0 +/etc/pki-kra(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/etc/pki-tks(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/etc/pki-tps(/.*)? system_u:object_r:pki_tps_etc_rw_t:s0 +/etc/sanlock(/.*)? system_u:object_r:sanlock_conf_t:s0 +/etc/selinux(/.*)? system_u:object_r:selinux_config_t:s0 +/etc/snapper(/.*)? system_u:object_r:snapperd_conf_t:s0 +/etc/stunnel(/.*)? system_u:object_r:stunnel_etc_t:s0 +/etc/unbound(/.*)? system_u:object_r:named_conf_t:s0 +/etc/varnish(/.*)? system_u:object_r:varnishd_etc_t:s0 +/lib/modules(/.*)? system_u:object_r:modules_object_t:s0 +/lib/upstart(/.*)? system_u:object_r:bin_t:s0 +/opt/NX/home(/.*)? system_u:object_r:nx_server_var_lib_t:s0 +/opt/sartest(/.*)? system_u:object_r:sysstat_log_t:s0 +/ostree/repo(/.*)? system_u:object_r:system_conf_t:s0 +/root/\.cache(/.*)? system_u:object_r:cache_home_t:s0 +/root/\.debug(/.*)? <> +/root/\.fonts(/.*)? system_u:object_r:user_fonts_t:s0 +/root/\.gnupg(/.+)? system_u:object_r:gpg_secret_t:s0 +/root/\.local(/.*)? system_u:object_r:gconf_home_t:s0 +/root/\.pulse(/.*)? system_u:object_r:pulseaudio_home_t:s0 +/root/\.pyzor(/.*)? system_u:object_r:spamc_home_t:s0 +/root/\.razor(/.*)? system_u:object_r:spamc_home_t:s0 +/root/\.spamd(/.*)? system_u:object_r:spamc_home_t:s0 +/run/flannel(/.*)? system_u:object_r:container_var_run_t:s0 +/usr/Brother(/.*)? system_u:object_r:bin_t:s0 +/usr/NX/home(/.*)? system_u:object_r:nx_server_var_lib_t:s0 +/usr/Printer(/.*)? system_u:object_r:bin_t:s0 +/usr/afs/etc(/.*)? system_u:object_r:afs_config_t:s0 +/usr/lib/ocf(/.*)? system_u:object_r:bin_t:s0 +/usr/libexec(/.*)? system_u:object_r:bin_t:s0 +/var/account(/.*)? system_u:object_r:acct_data_t:s0 +/var/axfrdns(/.*)? system_u:object_r:svc_svc_t:s0 +/var/db/nscd(/.*)? system_u:object_r:nscd_var_run_t:s0 +/var/db/sudo(/.*)? system_u:object_r:sudo_db_t:s0 +/var/db/tang(/.*)? system_u:object_r:tangd_db_t:s0 +/var/fscache(/.*)? system_u:object_r:cachefiles_var_t:s0 +/var/ftp/bin(/.*)? system_u:object_r:bin_t:s0 +/var/ftp/etc(/.*)? system_u:object_r:etc_t:s0 +/var/ftp/lib(/.*)? system_u:object_r:lib_t:s0 +/var/lib/abl(/.*)? system_u:object_r:var_auth_t:s0 +/var/lib/cni(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/dav(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/dcc(/.*)? system_u:object_r:dcc_var_t:s0 +/var/lib/dnf(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/var/lib/fdo(/.*)? system_u:object_r:fdo_var_lib_t:s0 +/var/lib/git(/.*)? system_u:object_r:git_sys_content_t:s0 +/var/lib/lxc(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/lxd(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/mpd(/.*)? system_u:object_r:mpd_var_lib_t:s0 +/var/lib/nfs(/.*)? system_u:object_r:var_lib_nfs_t:s0 +/var/lib/nsd(/.*)? system_u:object_r:nsd_zone_t:s0 +/var/lib/ntp(/.*)? system_u:object_r:ntp_drift_t:s0 +/var/lib/pcp(/.*)? system_u:object_r:pcp_var_lib_t:s0 +/var/lib/php(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/rkt(/.*)? system_u:object_r:rkt_var_lib_t:s0 +/var/lib/rpm(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/var/lib/rsa(/.*)? system_u:object_r:var_auth_t:s0 +/var/lib/sss(/.*)? system_u:object_r:sssd_var_lib_t:s0 +/var/lib/svn(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/tlp(/.*)? system_u:object_r:tlp_var_lib_t:s0 +/var/lib/tor(/.*)? system_u:object_r:tor_var_lib_t:s0 +/var/lib/tpm(/.*)? system_u:object_r:tcsd_var_lib_t:s0 +/var/lib/xen(/.*)? system_u:object_r:xend_var_lib_t:s0 +/var/lib/xkb(/.*)? system_u:object_r:xkb_var_lib_t:s0 +/var/lib/yum(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/var/log/log(/.*)? system_u:object_r:virt_log_t:s0 +/var/log/lxc(/.*)? system_u:object_r:container_log_t:s0 +/var/log/lxd(/.*)? system_u:object_r:container_log_t:s0 +/var/log/mdm(/.*)? system_u:object_r:xdm_log_t:s0 +/var/log/mpd(/.*)? system_u:object_r:mpd_log_t:s0 +/var/log/pcp(/.*)? system_u:object_r:pcp_log_t:s0 +/var/log/pki(/.*)? system_u:object_r:pki_log_t:s0 +/var/log/ppp(/.*)? system_u:object_r:pppd_log_t:s0 +/var/log/tor(/.*)? system_u:object_r:tor_var_log_t:s0 +/var/log/wnn(/.*)? system_u:object_r:canna_log_t:s0 +/var/log/xen(/.*)? system_u:object_r:xend_var_log_t:s0 +/var/run/bip(/.*)? system_u:object_r:bitlbee_var_run_t:s0 +/var/run/crm(/.*)? system_u:object_r:cluster_var_run_t:s0 +/var/run/dcc(/.*)? system_u:object_r:dcc_var_run_t:s0 +/var/run/fcm(/.*)? system_u:object_r:fcoemon_var_run_t:s0 +/var/run/log(/.*)? system_u:object_r:syslogd_var_run_t:s0 +/var/run/lsm(/.*)? system_u:object_r:lsmd_var_run_t:s0 +/var/run/lvm(/.*)? system_u:object_r:lvm_var_run_t:s0 +/var/run/mpd(/.*)? system_u:object_r:mpd_var_run_t:s0 +/var/run/nut(/.*)? system_u:object_r:nut_var_run_t:s0 +/var/run/pcp(/.*)? system_u:object_r:pcp_var_run_t:s0 +/var/run/ppp(/.*)? system_u:object_r:pppd_var_run_t:s0 +/var/run/rhc(/.*)? system_u:object_r:rhcd_var_run_t:s0 +/var/run/tlp(/.*)? system_u:object_r:tlp_var_run_t:s0 +/var/run/tor(/.*)? system_u:object_r:tor_var_run_t:s0 +/var/tinydns(/.*)? system_u:object_r:svc_svc_t:s0 +/var/www/git(/.*)? system_u:object_r:git_content_t:s0 +/var/www/svn(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/log/dnf.log.* -- system_u:object_r:rpm_log_t:s0 +/dev/raw/raw[0-9]+ -c system_u:object_r:fixed_disk_device_t:s0 +/dev/tmc_etb[0-9]+ -c system_u:object_r:hwtracing_device_t:s0 +/dev/tmc_etf[0-9]+ -c system_u:object_r:hwtracing_device_t:s0 +/dev/tmc_etr[0-9]+ -c system_u:object_r:hwtracing_device_t:s0 +/etc/profile.d(/.*)? system_u:object_r:bin_t:s0 +/etc/rsyslog.d(/.*)? system_u:object_r:syslog_conf_t:s0 +/etc/mcelog/.*\.local -- system_u:object_r:bin_t:s0 +/etc/mcelog/.*\.setup -- system_u:object_r:bin_t:s0 +/usr/bin/lpq(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/usr/bin/lpr(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/var/run/gdm(3)?\.pid -- system_u:object_r:xdm_var_run_t:s0 +/usr/local/s?bin/crun -- system_u:object_r:container_runtime_exec_t:s0 +/usr/local/s?bin/runc -- system_u:object_r:container_runtime_exec_t:s0 +/root/\.gconf(d)?(/.*)? system_u:object_r:gconf_home_t:s0 +/var/lib/gdm(3)?(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/log/gdm(3)?(/.*)? system_u:object_r:xserver_log_t:s0 +/var/run/gdm(3)?(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/log/dnf.rpm.log.* -- system_u:object_r:rpm_log_t:s0 +/var/run/rpc.statd\.pid -- system_u:object_r:rpcbind_var_run_t:s0 +/opt/google/[^/]*/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/local/s?bin/crio.* -- system_u:object_r:container_runtime_exec_t:s0 +/var/mailman.*/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/local/s?bin/docker.* -- system_u:object_r:container_runtime_exec_t:s0 +/etc/amanda/.*/index(/.*)? system_u:object_r:amanda_data_t:s0 +/usr/local/s?bin/kubelet.* -- system_u:object_r:kubelet_exec_t:s0 +/var/log/dnf.librepo.log.* -- system_u:object_r:rpm_log_t:s0 +/usr/local/s?bin/kata-agent -- system_u:object_r:container_runtime_exec_t:s0 +/usr/mailman.*/mail/wrapper -- system_u:object_r:mailman_mail_exec_t:s0 +/etc/mcelog/.*-error-trigger -- system_u:object_r:bin_t:s0 +/usr/local/s?bin/buildkitd.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/local/s?bin/hyperkube.* -- system_u:object_r:kubelet_exec_t:s0 +/etc/amanda/.*/tapelist(/.*)? system_u:object_r:amanda_data_t:s0 +/usr/lib/ld-[^/]*\.so(\.[^/]*)* -- system_u:object_r:ld_so_t:s0 +/usr/local/s?bin/containerd.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/local/s?bin/buildkit-runc -- system_u:object_r:container_runtime_exec_t:s0 +/usr/local/s?bin/kubensenter.* -- system_u:object_r:kubelet_exec_t:s0 +/usr/local/s?bin/kubenswrapper.* -- system_u:object_r:kubelet_exec_t:s0 +/usr/lib/qt-.*/etc/settings(/.*)? system_u:object_r:xdm_var_run_t:s0 +/opt/altera9.1/quartus/linux/libccl_err\.so -- system_u:object_r:textrel_shlib_t:s0 +/opt/vmware/(workstation|player)/bin/vmware -- system_u:object_r:vmware_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmnet-natd -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmnet-dhcpd -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-nmbd -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-ping -- system_u:object_r:vmware_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-smbd -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmnet-bridge -- system_u:object_r:vmware_host_exec_t:s0 +/opt/Acrobat[5-9]/Reader/intellinux/plugins/.*\.api -- system_u:object_r:lib_t:s0 +/opt/vmware/(workstation|player)/bin/vmnet-netifup -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmnet-sniffer -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-wizard -- system_u:object_r:vmware_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-smbpasswd -- system_u:object_r:vmware_host_exec_t:s0 +/opt/vmware/(workstation|player)/bin/vmware-smbpasswd\.bin -- system_u:object_r:vmware_host_exec_t:s0 +/dev/shm/mono.* system_u:object_r:user_tmp_t:s0 +/var/log/cron.* system_u:object_r:cron_log_t:s0 +/var/log/ldap.* system_u:object_r:slapd_log_t:s0 +/var/log/mrtg.* system_u:object_r:mrtg_log_t:s0 +/var/run/mod_.* system_u:object_r:httpd_var_run_t:s0 +/var/run/shm/.* <> +/var/run/slim.* system_u:object_r:xdm_var_run_t:s0 +/var/run/sslh.* system_u:object_r:sslh_var_run_t:s0 +/var/run/tgtd.* system_u:object_r:tgtd_var_run_t:s0 +/var/service/.* system_u:object_r:svc_svc_t:s0 +/etc/lxdm/Pre.* -- system_u:object_r:bin_t:s0 +/etc/printcap.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/lib/lvm-200/.* -- system_u:object_r:lvm_exec_t:s0 +/sbin/losetup.* -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/ping.* -- system_u:object_r:ping_exec_t:s0 +/usr/bin/wine.* -- system_u:object_r:wine_exec_t:s0 +/var/lock/LCK.. -- system_u:object_r:apcupsd_lock_t:s0 +/var/log/Xorg.* -- system_u:object_r:xserver_log_t:s0 +/var/log/btmp.* -- system_u:object_r:faillog_t:s0 +/var/log/osad.* -- system_u:object_r:osad_log_t:s0 +/var/log/wicd.* -- system_u:object_r:NetworkManager_log_t:s0 +/var/log/wtmp.* -- system_u:object_r:wtmp_t:s0 +/var/run/osad.* -- system_u:object_r:osad_var_run_t:s0 +/dev/ati/card.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/input/js.* -c system_u:object_r:mouse_device_t:s0 +/dev/misc/dlm.* -c system_u:object_r:dlm_control_device_t:s0 +/dev/pcfclock.* -c system_u:object_r:clock_device_t:s0 +/dev/watchdog.* -c system_u:object_r:watchdog_device_t:s0 +/dev/winradio.* -c system_u:object_r:v4l_device_t:s0 +/dev/ataraid/.* -b system_u:object_r:fixed_disk_device_t:s0 +/dev/pktcdvd/.+ -b system_u:object_r:removable_device_t:s0 +/var/run/wsgi.* -s system_u:object_r:httpd_var_run_t:s0 +/usr/sbin/in\..*d -- system_u:object_r:inetd_child_exec_t:s0 +/etc/hotplug/.*rc -- system_u:object_r:bin_t:s0 +/var/run/sssd.pid -- system_u:object_r:sssd_var_run_t:s0 +/etc/libvirt/.*/.* system_u:object_r:virt_etc_rw_t:s0 +/var/net-snmp(/.*) system_u:object_r:snmpd_var_lib_t:s0 +/etc/libvirt/[^/]* -- system_u:object_r:virt_etc_t:s0 +/etc/rc\.d/rc\.[^/]+ -- system_u:object_r:initrc_exec_t:s0 +/etc/vconsole.conf -- system_u:object_r:locale_t:s0 +/usr/bin/blue.*pin -- system_u:object_r:bluetooth_helper_exec_t:s0 +/usr/lib/dri/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/sbin/hp-[^/]+ -- system_u:object_r:cupsd_exec_t:s0 +/etc/libvirt/[^/]* -d system_u:object_r:virt_etc_rw_t:s0 +/etc/alsa/pcm(/.*)? system_u:object_r:alsa_etc_rw_t:s0 +/etc/asterisk(/.*)? system_u:object_r:asterisk_etc_t:s0 +/etc/buildkit(/.*)? system_u:object_r:container_config_t:s0 +/etc/cfingerd(/.*)? system_u:object_r:fingerd_etc_t:s0 +/etc/cherokee(/.*)? system_u:object_r:httpd_config_t:s0 +/etc/cups/ppd(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/etc/lighttpd(/.*)? system_u:object_r:httpd_config_t:s0 +/etc/lvm/lock(/.*)? system_u:object_r:lvm_lock_t:s0 +/etc/lvmtab\.d(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/my\.cnf\.d(/.*)? system_u:object_r:mysqld_etc_t:s0 +/etc/ntp/data(/.*)? system_u:object_r:ntp_drift_t:s0 +/etc/owncloud(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/pki-ocsp(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/etc/postgrey(/.*)? system_u:object_r:postgrey_etc_t:s0 +/etc/rabbitmq(/.*)? system_u:object_r:rabbitmq_conf_t:s0 +/root/Maildir(/.*)? system_u:object_r:mail_home_rw_t:s0 +/root/\.config(/.*)? system_u:object_r:config_home_t:s0 +/root/\.gnome2(/.*)? system_u:object_r:gnome_home_t:s0 +/root/\.screen(/.*)? system_u:object_r:screen_home_t:s0 +/root/\.yubico(/.*)? system_u:object_r:auth_home_t:s0 +/run/buildkit(/.*)? system_u:object_r:container_var_run_t:s0 +/run/lock/lxc(/.*)? system_u:object_r:container_lock_t:s0 +/srv/gallery2(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/afs/logs(/.*)? system_u:object_r:afs_logfile_t:s0 +/usr/lib/cups(/.*)? system_u:object_r:bin_t:s0 +/var/arpwatch(/.*)? system_u:object_r:arpwatch_data_t:s0 +/var/cache/oz(/.*)? system_u:object_r:virt_cache_t:s0 +/var/cfengine(/.*)? system_u:object_r:cfengine_var_lib_t:s0 +/var/dnscache(/.*)? system_u:object_r:svc_svc_t:s0 +/var/lib/abrt(/.*)? system_u:object_r:abrt_var_lib_t:s0 +/var/lib/acpi(/.*)? system_u:object_r:apmd_var_lib_t:s0 +/var/lib/aide(/.*)? system_u:object_r:aide_db_t:s0 +/var/lib/alsa(/.*)? system_u:object_r:alsa_var_lib_t:s0 +/var/lib/ctdb(/.*)? system_u:object_r:ctdbd_var_lib_t:s0 +/var/lib/dbus(/.*)? system_u:object_r:system_dbusd_var_lib_t:s0 +/var/lib/drbd(/.*)? system_u:object_r:drbd_var_lib_t:s0 +/var/lib/glpi(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/imap(/.*)? system_u:object_r:cyrus_var_lib_t:s0 +/var/lib/isns(/.*)? system_u:object_r:isnsd_var_lib_t:s0 +/var/lib/iwhd(/.*)? system_u:object_r:iwhd_var_lib_t:s0 +/var/lib/ldap(/.*)? system_u:object_r:slapd_db_t:s0 +/var/lib/luci(/.*)? system_u:object_r:piranha_web_data_t:s0 +/var/lib/lxdm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/lib/mock(/.*)? system_u:object_r:mock_var_lib_t:s0 +/var/lib/mrtg(/.*)? system_u:object_r:mrtg_var_lib_t:s0 +/var/lib/news(/.*)? system_u:object_r:innd_var_lib_t:s0 +/var/lib/nova(/.*)? system_u:object_r:nova_var_lib_t:s0 +/var/lib/ntop(/.*)? system_u:object_r:ntop_var_lib_t:s0 +/var/lib/ocid(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/pcsd(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/pdns(/.*)? system_u:object_r:pdns_var_lib_t:s0 +/var/lib/psad(/.*)? system_u:object_r:psad_var_lib_t:s0 +/var/lib/rhsm(/.*)? system_u:object_r:rhsmcertd_var_lib_t:s0 +/var/lib/sddm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/lib/sfcb(/.*)? system_u:object_r:sblim_var_lib_t:s0 +/var/lib/snmp(/.*)? system_u:object_r:snmpd_var_lib_t:s0 +/var/lib/sntp(/.*)? system_u:object_r:ntp_drift_t:s0 +/var/lib/sudo(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/lib/tgtd(/.*)? system_u:object_r:tgtd_var_lib_t:s0 +/var/lib/trac(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/lib/vdsm(/.*)? system_u:object_r:virt_content_t:s0 +/var/lib/wicd(/.*)? system_u:object_r:NetworkManager_var_lib_t:s0 +/var/lib/xend(/.*)? system_u:object_r:xend_var_lib_t:s0 +/var/lib/xorg(/.*)? system_u:object_r:xserver_var_lib_t:s0 +/var/lock/lvm(/.*)? system_u:object_r:lvm_lock_t:s0 +/var/lock/ppp(/.*)? system_u:object_r:pppd_lock_t:s0 +/var/log/aide(/.*)? system_u:object_r:aide_log_t:s0 +/var/log/ctdb(/.*)? system_u:object_r:cluster_var_log_t:s0 +/var/log/cups(/.*)? system_u:object_r:cupsd_log_t:s0 +/var/log/fsck(/.*)? system_u:object_r:fsadm_log_t:s0 +/var/log/glpi(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/mail(/.*)? system_u:object_r:sendmail_log_t:s0 +/var/log/news(/.*)? system_u:object_r:innd_log_t:s0 +/var/log/nova(/.*)? system_u:object_r:nova_log_t:s0 +/var/log/pcsd(/.*)? system_u:object_r:cluster_var_log_t:s0 +/var/log/pods(/.*)? system_u:object_r:container_log_t:s0 +/var/log/psad(/.*)? system_u:object_r:psad_var_log_t:s0 +/var/log/rhsm(/.*)? system_u:object_r:rhsmcertd_log_t:s0 +/var/log/smsd(/.*)? system_u:object_r:smsd_log_t:s0 +/var/log/sssd(/.*)? system_u:object_r:sssd_var_log_t:s0 +/var/log/uucp(/.*)? system_u:object_r:uucpd_log_t:s0 +/var/log/vdsm(/.*)? system_u:object_r:virt_log_t:s0 +/var/net-snmp(/.*)? system_u:object_r:snmpd_var_lib_t:s0 +/var/run/abrt(/.*)? system_u:object_r:abrt_var_run_t:s0 +/var/run/bind(/.*)? system_u:object_r:named_var_run_t:s0 +/var/run/ctdb(/.*)? system_u:object_r:ctdbd_var_run_t:s0 +/var/run/cups(/.*)? system_u:object_r:cupsd_var_run_t:s0 +/var/run/dbus(/.*)? system_u:object_r:system_dbusd_var_run_t:s0 +/var/run/drbd(/.*)? system_u:object_r:drbd_var_run_t:s0 +/var/run/fsck(/.*)? system_u:object_r:fsadm_var_run_t:s0 +/var/run/innd(/.*)? system_u:object_r:innd_var_run_t:s0 +/var/run/lirc(/.*)? system_u:object_r:lircd_var_run_t:s0 +/var/run/lxdm(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/run/nasd(/.*)? system_u:object_r:soundd_var_run_t:s0 +/var/run/news(/.*)? system_u:object_r:innd_var_run_t:s0 +/var/run/nmbd(/.*)? system_u:object_r:nmbd_var_run_t:s0 +/var/run/nova(/.*)? system_u:object_r:nova_var_run_t:s0 +/var/run/nscd(/.*)? system_u:object_r:nscd_var_run_t:s0 +/var/run/pptp(/.*)? system_u:object_r:pptp_var_run_t:s0 +/var/run/psad(/.*)? system_u:object_r:psad_var_run_t:s0 +/var/run/rhsm(/.*)? system_u:object_r:rhsmcertd_var_run_t:s0 +/var/run/sddm(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/run/smsd(/.*)? system_u:object_r:smsd_var_run_t:s0 +/var/run/sudo(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/run/thin(/.*)? system_u:object_r:thin_var_run_t:s0 +/var/run/tmux(/.*)? system_u:object_r:screen_var_run_t:s0 +/var/run/udev(/.*)? system_u:object_r:udev_var_run_t:s0 +/var/run/vdsm(/.*)? system_u:object_r:virt_var_run_t:s0 +/var/run/vpnc(/.*)? system_u:object_r:vpnc_var_run_t:s0 +/var/run/wdmd(/.*)? system_u:object_r:wdmd_var_run_t:s0 +/var/run/xend(/.*)? system_u:object_r:xend_var_run_t:s0 +/var/run/xorg(/.*)? system_u:object_r:xserver_var_run_t:s0 +/var/spool/at(/.*)? system_u:object_r:user_cron_spool_t:s0 +/var/tmp/abrt(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/www/perl(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/etc/dhclient.*conf -- system_u:object_r:dhcp_etc_t:s0 +/etc/unbound/.*\.key -- system_u:object_r:dnssec_t:s0 +/usr/bin/dnf-[0-9]+ -- system_u:object_r:rpm_exec_t:s0 +/dev/gpiochip[0-9]+ -c system_u:object_r:gpio_device_t:s0 +/etc/hotplug/.*agent -- system_u:object_r:bin_t:s0 +/usr/bin/sudo(edit)? -- system_u:object_r:sudo_exec_t:s0 +/var/service/.*/run.* system_u:object_r:svc_run_exec_t:s0 +/usr/bin/lprm(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/lpc(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/ip6?tables.* -- system_u:object_r:iptables_exec_t:s0 +/dev/bus/usb/.*/[0-9]+ -c system_u:object_r:usb_device_t:s0 +/var/service/.*/log/run system_u:object_r:svc_run_exec_t:s0 +/var/run/exim[0-9]?\.pid -- system_u:object_r:exim_var_run_t:s0 +/var/run/pppd[0-9]*\.tdb -- system_u:object_r:pppd_var_run_t:s0 +/var/www/wiki[0-9]?\.php -- system_u:object_r:mediawiki_content_t:s0 +/var/cache/rt(3|4)(/.*)? system_u:object_r:httpd_cache_t:s0 +/usr/lib/nsr/(.*/)?.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/sbin/in\.(x)?fingerd -- system_u:object_r:fingerd_exec_t:s0 +/var/lib/exim[0-9]?(/.*)? system_u:object_r:exim_var_lib_t:s0 +/var/log/exim[0-9]?(/.*)? system_u:object_r:exim_log_t:s0 +/var/run/exim[0-9]?(/.*)? system_u:object_r:exim_var_run_t:s0 +/var/service/.*/env(/.*)? system_u:object_r:svc_conf_t:s0 +/var/www/wiki[0-9]?(/.*)? system_u:object_r:mediawiki_rw_content_t:s0 +/etc/privoxy/[^/]*\.action -- system_u:object_r:privoxy_etc_rw_t:s0 +/opt/ibm/java.*/jre/.+\.jar -- system_u:object_r:lib_t:s0 +/usr/Brother/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/usr/Printer/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/etc/selinux/([^/]*/)?seusers -- system_u:object_r:selinux_config_t:s0 +/usr/Brother/(.*/)?inf/setup.* system_u:object_r:bin_t:s0 +/var/service/.*/log/main(/.*)? system_u:object_r:svc_log_t:s0 +/var/lib/dhcp(3)?/dhcpd\.leases.* -- system_u:object_r:dhcpd_state_t:s0 +/var/www/html(/.*)?/uploads(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/selinux/([^/]*/)?users(/.*)? -- system_u:object_r:selinux_config_t:s0 +/etc/selinux/([^/]*/)?logins(/.*)? system_u:object_r:selinux_login_config_t:s0 +/etc/selinux/([^/]*/)?policy(/.*)? system_u:object_r:semanage_store_t:s0 +/etc/selinux/([^/]*/)?setrans\.conf -- system_u:object_r:selinux_config_t:s0 +/opt/ibm/java.*/jre/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/etc/selinux/([^/]*/)?contexts(/.*)? system_u:object_r:default_context_t:s0 +/usr/Brother/(.*/)?inf/brprintconf.* system_u:object_r:bin_t:s0 +/var/www/html(/.*)?/wp-content(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/www/html(/.*)?/wp_backups(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/ibm/java.*/jre/bin/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/etc/selinux/([^/]*/)?contexts/files(/.*)? system_u:object_r:file_context_t:s0 +/var/www/html(/.*)?/sites/default/files(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/netbeans(.*/)?jdk.*/linux/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/www/html(/.*)?/sites/default/settings\.php -- system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/selinux/(minimum|mls|targeted)/active(/.*)? system_u:object_r:semanage_store_t:s0 +/etc/selinux/([^/]*/)?modules/semanage\.read\.LOCK -- system_u:object_r:semanage_read_lock_t:s0 +/etc/selinux/([^/]*/)?modules/semanage\.trans\.LOCK -- system_u:object_r:semanage_trans_lock_t:s0 +/etc/selinux/([^/]*/)?modules/(active|tmp|previous)(/.*)? system_u:object_r:semanage_store_t:s0 +/var/lib/dhcp3? -d system_u:object_r:dhcp_state_t:s0 +/etc/lilo\.conf.* system_u:object_r:bootloader_etc_t:s0 +/etc/zipl\.conf.* system_u:object_r:bootloader_etc_t:s0 +/var/lib/clamd.* system_u:object_r:antivirus_db_t:s0 +/var/lib/mongo.* system_u:object_r:mongod_var_lib_t:s0 +/var/log/clamd.* system_u:object_r:antivirus_log_t:s0 +/var/log/mongo.* system_u:object_r:mongod_log_t:s0 +/var/log/munin.* system_u:object_r:munin_log_t:s0 +/var/log/rsync.* system_u:object_r:rsync_log_t:s0 +/var/log/slapd.* system_u:object_r:slapd_log_t:s0 +/var/run/cgred.* system_u:object_r:cgred_var_run_t:s0 +/var/run/clamd.* system_u:object_r:antivirus_var_run_t:s0 +/var/run/cyrus.* system_u:object_r:cyrus_var_run_t:s0 +/var/run/fence.* system_u:object_r:fenced_var_run_t:s0 +/var/run/httpd.* system_u:object_r:httpd_var_run_t:s0 +/var/run/lock/.* <> +/var/run/mongo.* system_u:object_r:mongod_var_run_t:s0 +/var/run/nginx.* system_u:object_r:httpd_var_run_t:s0 +/var/run/squid.* system_u:object_r:squid_var_run_t:s0 +/var/run/vmnet.* system_u:object_r:vmware_host_pid_t:s0 +/bin/tracepath.* -- system_u:object_r:traceroute_exec_t:s0 +/etc/denyhosts.* -- system_u:object_r:net_conf_t:s0 +/etc/firmware/.* -- system_u:object_r:cpucontrol_conf_t:s0 +/etc/lxdm/Post.* -- system_u:object_r:bin_t:s0 +/sbin/dhclient.* -- system_u:object_r:dhcpc_exec_t:s0 +/sbin/modprobe.* -- system_u:object_r:kmod_exec_t:s0 +/sbin/setfiles.* -- system_u:object_r:setfiles_exec_t:s0 +/usr/afs/db/ka.* -- system_u:object_r:afs_ka_db_t:s0 +/usr/afs/db/pr.* -- system_u:object_r:afs_pt_db_t:s0 +/usr/afs/db/vl.* -- system_u:object_r:afs_vl_db_t:s0 +/usr/bin/mount.* -- system_u:object_r:mount_exec_t:s0 +/usr/bin/razor.* -- system_u:object_r:spamc_exec_t:s0 +/usr/lib/dpkg/.+ -- system_u:object_r:bin_t:s0 +/usr/lib/gvfs/.* -- system_u:object_r:bin_t:s0 +/usr/lib/sa/sa.* -- system_u:object_r:sysstat_exec_t:s0 +/usr/sbin/fsck.* -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/grub.* -- system_u:object_r:bootloader_exec_t:s0 +/usr/sbin/innd.* -- system_u:object_r:innd_exec_t:s0 +/usr/sbin/jfs_.* -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/lilo.* -- system_u:object_r:bootloader_exec_t:s0 +/usr/sbin/mkfs.* -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ospf.* -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/rpc\..* -- system_u:object_r:rpcd_exec_t:s0 +/usr/sbin/ybin.* -- system_u:object_r:bootloader_exec_t:s0 +/var/db/shadow.* -- system_u:object_r:shadow_t:s0 +/var/log/acpid.* -- system_u:object_r:apmd_log_t:s0 +/var/log/ibacm.* -- system_u:object_r:ibacm_log_t:s0 +/var/log/mysql.* -- system_u:object_r:mysqld_log_t:s0 +/var/log/named.* -- system_u:object_r:named_log_t:s0 +/var/log/talkd.* -- system_u:object_r:ktalkd_log_t:s0 +/var/log/xntpd.* -- system_u:object_r:ntpd_log_t:s0 +/var/run/ibacm.* -- system_u:object_r:ibacm_var_run_t:s0 +/var/run/lldpd.* -- system_u:object_r:lldpad_var_run_t:s0 +/var/run/procd.* -- system_u:object_r:mon_statd_var_run_t:s0 +/var/run/snort.* -- system_u:object_r:snort_var_run_t:s0 +/dev/dma_heap/.+ -c system_u:object_r:dma_device_t:s0 +/dev/mfpports/.* -c system_u:object_r:printer_device_t:s0 +/dev/usb/dc2xx.* -c system_u:object_r:scanner_device_t:s0 +/var/run/cman_.* -s system_u:object_r:cluster_var_run_t:s0 +/var/run/slapd.* -s system_u:object_r:dirsrv_var_run_t:s0 +/var/run/vmnat.* -s system_u:object_r:vmware_host_pid_t:s0 +/var/run/ibacm.* -l system_u:object_r:ibacm_var_run_t:s0 +/usr/bin/zmpkg.pl -- system_u:object_r:zoneminder_exec_t:s0 +/usr/sbin/cron(d)? -- system_u:object_r:crond_exec_t:s0 +/var/run/video.rom -- system_u:object_r:xserver_var_run_t:s0 +/usr/bin/passt.avx2 system_u:object_r:passt_exec_t:s0 +/usr/bin/pasta.avx2 system_u:object_r:pasta_exec_t:s0 +/var/run/hplip(/.*) system_u:object_r:cupsd_var_run_t:s0 +/etc/nss-ldapd.conf -- system_u:object_r:nslcd_conf_t:s0 +/usr/lib/udev/[^/]* -- system_u:object_r:bin_t:s0 +/usr/lib/wine/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/sbin/init(ng)? -- system_u:object_r:init_exec_t:s0 +/var/run/crond?\.pid -- system_u:object_r:crond_var_run_t:s0 +/var/run/user/[^/]+ -d system_u:object_r:user_tmp_t:s0 +/dev/hugepages(/.*)? <> +/dev/oracleasm(/.*)? system_u:object_r:oracleasmfs_t:s0 +/etc/X11/xinit(/.*)? system_u:object_r:bin_t:s0 +/etc/bluetooth(/.*)? system_u:object_r:bluetooth_conf_t:s0 +/etc/dnsmasq\.d(/.*)? system_u:object_r:dnsmasq_etc_t:s0 +/etc/exports\.d(/.*)? system_u:object_r:exports_t:s0 +/etc/firewalld(/.*)? system_u:object_r:firewalld_etc_rw_t:s0 +/etc/ipa/nssdb(/.*)? system_u:object_r:cert_t:s0 +/etc/lvm/cache(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/mock/koji(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/multipath(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/netplug\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/nextcloud(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/ppp/peers(/.*)? system_u:object_r:pppd_etc_rw_t:s0 +/etc/shorewall(/.*)? system_u:object_r:shorewall_etc_t:s0 +/lib/readahead(/.*)? system_u:object_r:bin_t:s0 +/root/\.fonts\.d(/.*)? system_u:object_r:user_fonts_config_t:s0 +/tmp/\.ICE-unix(/.*)? system_u:object_r:user_tmp_t:s0 +/tmp/\.X11-unix(/.*)? system_u:object_r:user_tmp_t:s0 +/usr/X11R6/man(/.*)? system_u:object_r:man_t:s0 +/usr/afs/local(/.*)? system_u:object_r:afs_config_t:s0 +/usr/lib/bjlib(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/usr/lib/fence(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/games(/.*)? system_u:object_r:games_exec_t:s0 +/usr/lib/httpd(/.*)? system_u:object_r:httpd_modules_t:s0 +/usr/lib/pingd(/.*)? system_u:object_r:pingd_modules_t:s0 +/usr/lib/ulogd(/.*)? system_u:object_r:ulogd_modules_t:s0 +/usr/lib/xfce4(/.*)? system_u:object_r:bin_t:s0 +/usr/share/man(/.*)? system_u:object_r:man_t:s0 +/usr/share/rpm(/.*)? system_u:object_r:usr_t:s0 +/var/cache/dnf(/.*)? system_u:object_r:rpm_var_cache_t:s0 +/var/cache/man(/.*)? system_u:object_r:mandb_cache_t:s0 +/var/cache/yum(/.*)? system_u:object_r:rpm_var_cache_t:s0 +/var/lib/bcfg2(/.*)? system_u:object_r:bcfg2_var_lib_t:s0 +/var/lib/boinc(/.*)? system_u:object_r:boinc_var_lib_t:s0 +/var/lib/boltd(/.*)? system_u:object_r:boltd_var_lib_t:s0 +/var/lib/booth(/.*)? system_u:object_r:boothd_var_lib_t:s0 +/var/lib/cloud(/.*)? system_u:object_r:cloud_var_lib_t:s0 +/var/lib/color(/.*)? system_u:object_r:colord_var_lib_t:s0 +/var/lib/ctdbd(/.*)? system_u:object_r:ctdbd_var_lib_t:s0 +/var/lib/dhcpd(/.*)? system_u:object_r:dhcpd_state_t:s0 +/var/lib/dictd(/.*)? system_u:object_r:dictd_var_lib_t:s0 +/var/lib/dspam(/.*)? system_u:object_r:dspam_var_lib_t:s0 +/var/lib/fwupd(/.*)? system_u:object_r:fwupd_var_lib_t:s0 +/var/lib/games(/.*)? system_u:object_r:games_data_t:s0 +/var/lib/htdig(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/lib/httpd(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/iscan(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/var/lib/iscsi(/.*)? system_u:object_r:iscsi_var_lib_t:s0 +/var/lib/jetty(/.*)? system_u:object_r:jetty_var_lib_t:s0 +/var/lib/kdump(/.*)? system_u:object_r:kdump_var_lib_t:s0 +/var/lib/lldpd(/.*)? system_u:object_r:lldpad_var_lib_t:s0 +/var/lib/munin(/.*)? system_u:object_r:munin_var_lib_t:s0 +/var/lib/nginx(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/pgsql(/.*)? system_u:object_r:postgresql_db_t:s0 +/var/lib/pulse(/.*)? system_u:object_r:pulseaudio_var_lib_t:s0 +/var/lib/qpidd(/.*)? system_u:object_r:qpidd_var_lib_t:s0 +/var/lib/quota(/.*)? system_u:object_r:quota_flag_t:s0 +/var/lib/razor(/.*)? system_u:object_r:spamd_var_lib_t:s0 +/var/lib/redis(/.*)? system_u:object_r:redis_var_lib_t:s0 +/var/lib/ricci(/.*)? system_u:object_r:ricci_var_lib_t:s0 +/var/lib/samba(/.*)? system_u:object_r:samba_var_t:s0 +/var/lib/sasl2(/.*)? system_u:object_r:saslauthd_var_run_t:s0 +/var/lib/swift(/.*)? system_u:object_r:swift_data_t:s0 +/var/lib/texmf(/.*)? system_u:object_r:tetex_data_t:s0 +/var/lock/mrtg(/.*)? system_u:object_r:mrtg_lock_t:s0 +/var/lock/uucp(/.*)? system_u:object_r:uucpd_lock_t:s0 +/var/log/atsar(/.*)? system_u:object_r:sysstat_log_t:s0 +/var/log/audit(/.*)? system_u:object_r:auditd_log_t:s0 +/var/log/cacti(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/canna(/.*)? system_u:object_r:canna_log_t:s0 +/var/log/dspam(/.*)? system_u:object_r:dspam_log_t:s0 +/var/log/httpd(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/jetty(/.*)? system_u:object_r:jetty_log_t:s0 +/var/log/mysql(/.*)? system_u:object_r:mysqld_log_t:s0 +/var/log/nginx(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/redis(/.*)? system_u:object_r:redis_log_t:s0 +/var/log/rwhod(/.*)? system_u:object_r:rwho_log_t:s0 +/var/log/samba(/.*)? system_u:object_r:samba_log_t:s0 +/var/log/snort(/.*)? system_u:object_r:snort_log_t:s0 +/var/log/squid(/.*)? system_u:object_r:squid_log_t:s0 +/var/log/tuned(/.*)? system_u:object_r:tuned_log_t:s0 +/var/log/ulogd(/.*)? system_u:object_r:ulogd_var_log_t:s0 +/var/log/zebra(/.*)? system_u:object_r:zebra_log_t:s0 +/var/qmail/bin(/.*)? system_u:object_r:bin_t:s0 +/var/run/blkid(/.*)? system_u:object_r:fsadm_var_run_t:s0 +/var/run/boltd(/.*)? system_u:object_r:boltd_var_run_t:s0 +/var/run/booth(/.*)? system_u:object_r:boothd_var_run_t:s0 +/var/run/ctdbd(/.*)? system_u:object_r:ctdbd_var_run_t:s0 +/var/run/dspam(/.*)? system_u:object_r:dspam_var_run_t:s0 +/var/run/hwloc(/.*)? system_u:object_r:hwloc_var_run_t:s0 +/var/run/jetty(/.*)? system_u:object_r:jetty_var_run_t:s0 +/var/run/lircd(/.*)? system_u:object_r:lircd_var_run_t:s0 +/var/run/lldpd(/.*)? system_u:object_r:lldpad_var_run_t:s0 +/var/run/lprng(/.*)? system_u:object_r:lpd_var_run_t:s0 +/var/run/lttng(/.*)? system_u:object_r:lttng_sessiond_var_run_t:s0 +/var/run/mdadm(/.*)? system_u:object_r:mdadm_var_run_t:s0 +/var/run/mount(/.*)? system_u:object_r:mount_var_run_t:s0 +/var/run/munin(/.*)? system_u:object_r:munin_var_run_t:s0 +/var/run/mysql(/.*)? system_u:object_r:mysqld_var_run_t:s0 +/var/run/named(/.*)? system_u:object_r:named_var_run_t:s0 +/var/run/nslcd(/.*)? system_u:object_r:nslcd_var_run_t:s0 +/var/run/pcscd(/.*)? system_u:object_r:pcscd_var_run_t:s0 +/var/run/pluto(/.*)? system_u:object_r:ipsec_var_run_t:s0 +/var/run/pulse(/.*)? system_u:object_r:pulseaudio_var_run_t:s0 +/var/run/qpidd(/.*)? system_u:object_r:qpidd_var_run_t:s0 +/var/run/radvd(/.*)? system_u:object_r:radvd_var_run_t:s0 +/var/run/redis(/.*)? system_u:object_r:redis_var_run_t:s0 +/var/run/samba(/.*)? system_u:object_r:smbd_var_run_t:s0 +/var/run/snmpd(/.*)? system_u:object_r:snmpd_var_run_t:s0 +/var/run/stacd(/.*)? system_u:object_r:nvme_stas_var_run_t:s0 +/var/run/stafd(/.*)? system_u:object_r:nvme_stas_var_run_t:s0 +/var/run/teamd(/.*)? system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/tuned(/.*)? system_u:object_r:tuned_var_run_t:s0 +/var/run/uuidd(/.*)? system_u:object_r:uuidd_var_run_t:s0 +/var/run/xauth(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/spool/faf(/.*)? system_u:object_r:abrt_retrace_spool_t:s0 +/var/spool/fax(/.*)? system_u:object_r:getty_var_run_t:s0 +/var/spool/lpd(/.*)? system_u:object_r:print_spool_t:s0 +/var/spool/sms(/.*)? system_u:object_r:smsd_spool_t:s0 +/var/www/dspam(/.*?) system_u:object_r:dspam_content_t:s0 +/var/www/icons(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/www/usage(/.*)? system_u:object_r:webalizer_rw_content_t:s0 +/usr/sbin/dump.exfat -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/exim[0-9]? -- system_u:object_r:exim_exec_t:s0 +/usr/sbin/tune.exfat -- system_u:object_r:fsadm_exec_t:s0 +/var/cache/ssl.*\.sem -- system_u:object_r:httpd_cache_t:s0 +/var/run/abrtd?\.lock -- system_u:object_r:abrt_var_run_t:s0 +/var/run/swift(/.*)? -- system_u:object_r:swift_var_run_t:s0 +/dev/sclp_line[0-9]+ -c system_u:object_r:tty_device_t:s0 +/usr/lib/i686/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/sse2/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/var/run/user/[^/]+/.+ <> +/var/run/abrtd?\.socket -- system_u:object_r:abrt_var_run_t:s0 +/var/run/crond?\.reboot -- system_u:object_r:crond_var_run_t:s0 +/var/run/dhcpd(6)?\.pid -- system_u:object_r:dhcpd_var_run_t:s0 +/sbin/reiserfs(ck|tune) -- system_u:object_r:fsadm_exec_t:s0 +/var/run/media(/[^/]*)? -d system_u:object_r:mnt_t:s0 +/var/run/yiff-[0-9]+\.pid -- system_u:object_r:soundd_var_run_t:s0 +/var/lib/dhcp3?/dhclient.* system_u:object_r:dhcpc_state_t:s0 +/usr/lib/gems/.*/Passenger.* -- system_u:object_r:passenger_exec_t:s0 +/usr/lib/gvfs/.*\.so(\.[^/]*)* -- system_u:object_r:lib_t:s0 +/usr/lib/libav.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/doc(/.*)?/README.* system_u:object_r:usr_t:s0 +/var/usrlocal/(.*/)?bin(/.*)? system_u:object_r:bin_t:s0 +/var/usrlocal/(.*/)?sbin(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/gimp/.*/plug-ins(/.*)? system_u:object_r:bin_t:s0 +/var/www/html/[^/]*/cgi-bin(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/var/lib/mysql(-files|-keyring)?(/.*)? system_u:object_r:mysqld_db_t:s0 +/usr/acroread/(.*/)?intellinux/nppdf\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/acroread/(.*/)?lib/[^/]*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/gems/.*/ApplicationPoolServerExecutable -- system_u:object_r:passenger_exec_t:s0 +/dev/shm/squid-* -- system_u:object_r:squid_tmpfs_t:s0 +/dev/shm/slapd-.* system_u:object_r:dirsrv_tmpfs_t:s0 +/sys/fs/cgroup/.* <> +/sys/fs/pstore/.* <> +/var/cache/mod_.* system_u:object_r:httpd_cache_t:s0 +/var/cache/php-.* system_u:object_r:httpd_cache_t:s0 +/var/lib/bacula.* system_u:object_r:bacula_var_lib_t:s0 +/var/lib/drupal.* system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/udisks.* system_u:object_r:devicekit_var_lib_t:s0 +/var/lock/swift.* system_u:object_r:swift_lock_t:s0 +/var/log/bacula.* system_u:object_r:bacula_log_t:s0 +/var/log/clamav.* system_u:object_r:antivirus_log_t:s0 +/var/log/sensor.* system_u:object_r:sensord_log_t:s0 +/var/log/zabbix.* system_u:object_r:zabbix_log_t:s0 +/var/run/apache.* system_u:object_r:httpd_var_run_t:s0 +/var/run/autofs.* system_u:object_r:automount_var_run_t:s0 +/var/run/clamav.* system_u:object_r:antivirus_var_run_t:s0 +/var/run/dnssec.* system_u:object_r:dnssec_trigger_var_run_t:s0 +/var/run/mcelog.* system_u:object_r:mcelog_var_run_t:s0 +/var/run/media/.* <> +/var/run/nagios.* system_u:object_r:nagios_var_run_t:s0 +/var/run/udisks.* system_u:object_r:devicekit_var_run_t:s0 +/var/run/vmware.* system_u:object_r:vmware_host_pid_t:s0 +/var/run/vnstat.* system_u:object_r:vnstatd_var_run_t:s0 +/bin/traceroute.* -- system_u:object_r:traceroute_exec_t:s0 +/dev/shm/lldpad.* -- system_u:object_r:lldpad_tmpfs_t:s0 +/etc/cipe/ip-up.* -- system_u:object_r:bin_t:s0 +/etc/hosts\.deny.* -- system_u:object_r:net_conf_t:s0 +/etc/ppp/ip-up\..* -- system_u:object_r:bin_t:s0 +/sbin/readahead.* -- system_u:object_r:readahead_exec_t:s0 +/tmp/brltty\.log.* -- system_u:object_r:brltty_log_t:s0 +/usr/bin/munin-.* -- system_u:object_r:munin_exec_t:s0 +/usr/bin/nvidia.* -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/pingus.* -- system_u:object_r:bin_t:s0 +/usr/bin/preupg.* -- system_u:object_r:preupgrade_exec_t:s0 +/usr/bin/umount.* -- system_u:object_r:mount_exec_t:s0 +/usr/lib/gnupg/.* -- system_u:object_r:gpg_exec_t:s0 +/usr/lib/ipsec/.* -- system_u:object_r:bin_t:s0 +/usr/sbin/ciped.* -- system_u:object_r:ciped_exec_t:s0 +/usr/sbin/fping.* -- system_u:object_r:ping_exec_t:s0 +/usr/sbin/mount.* -- system_u:object_r:mount_exec_t:s0 +/usr/sbin/rmmod.* -- system_u:object_r:kmod_exec_t:s0 +/var/log/hawkey.* -- system_u:object_r:rpm_log_t:s0 +/var/log/mcelog.* -- system_u:object_r:mcelog_log_t:s0 +/var/log/opensm.* -- system_u:object_r:opensm_log_t:s0 +/var/log/polipo.* -- system_u:object_r:polipo_log_t:s0 +/var/log/vmware.* -- system_u:object_r:vmware_log_t:s0 +/var/log/vsftpd.* -- system_u:object_r:xferlog_t:s0 +/var/log/wsmand.* -- system_u:object_r:openwsman_log_t:s0 +/var/run/bacula.* -- system_u:object_r:bacula_var_run_t:s0 +/var/run/charon.* -- system_u:object_r:ipsec_var_run_t:s0 +/var/run/fstatd.* -- system_u:object_r:mon_statd_var_run_t:s0 +/var/run/lldpad.* -- system_u:object_r:lldpad_var_run_t:s0 +/var/run/ninfod.* -- system_u:object_r:ninfod_run_t:s0 +/var/run/wsmand.* -- system_u:object_r:openwsman_run_t:s0 +/var/run/ypbind.* -- system_u:object_r:ypbind_var_run_t:s0 +/var/run/yppass.* -- system_u:object_r:yppasswdd_var_run_t:s0 +/var/run/ypserv.* -- system_u:object_r:ypserv_var_run_t:s0 +/var/run/ypxfrd.* -- system_u:object_r:ypxfr_var_run_t:s0 +/dev/drm_dp_aux.* -c system_u:object_r:xserver_misc_device_t:s0 +/dev/usb/mdc800.* -c system_u:object_r:scanner_device_t:s0 +/dev/xen/blktap.* -c system_u:object_r:xen_device_t:s0 +/dev/scramdisk/.* -b system_u:object_r:fixed_disk_device_t:s0 +/var/run/pki-ca.pid system_u:object_r:pki_tomcat_var_run_t:s0 +/usr/sbin/dhcpd(6)? -- system_u:object_r:dhcpd_exec_t:s0 +/var/run/stalld.pid -- system_u:object_r:stalld_var_run_t:s0 +/var/log/secure[^/]* system_u:object_r:var_log_t:s0 +/var/run/netns/[^/]+ <> +/var/run/pwauth.lock -- system_u:object_r:pwauth_var_run_t:s0 +/etc/\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/etc/certmaster(/.*)? system_u:object_r:certmaster_etc_rw_t:s0 +/etc/conntrackd(/.*)? system_u:object_r:conntrackd_conf_t:s0 +/etc/containerd(/.*)? system_u:object_r:container_config_t:s0 +/etc/kubernetes(/.*)? system_u:object_r:kubernetes_file_t:s0 +/etc/lightsquid(/.*)? system_u:object_r:squid_conf_t:s0 +/etc/lvm/backup(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/modprobe\.d(/.*)? system_u:object_r:modules_conf_t:s0 +/etc/ntp/crypto(/.*)? system_u:object_r:ntpd_key_t:s0 +/etc/opendnssec(/.*)? system_u:object_r:opendnssec_conf_t:s0 +/etc/pm/power\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/pm/sleep\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/pnp4nagios(/.*)? system_u:object_r:nagios_etc_t:s0 +/etc/postgresql(/.*)? system_u:object_r:postgresql_etc_t:s0 +/etc/puppetlabs(/.*)? system_u:object_r:puppet_etc_t:s0 +/etc/redhat-lsb(/.*)? system_u:object_r:bin_t:s0 +/etc/shorewall6(/.*)? system_u:object_r:shorewall_etc_t:s0 +/etc/strongimcv(/.*)? system_u:object_r:ipsec_conf_file_t:s0 +/etc/strongswan(/.*)? system_u:object_r:ipsec_conf_file_t:s0 +/etc/watchdog\.d(/.*)? system_u:object_r:watchdog_unconfined_exec_t:s0 +/etc/zabbix/web(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/zimbra/log(/.*)? system_u:object_r:var_log_t:s0 +/run/containerd(/.*)? system_u:object_r:container_var_run_t:s0 +/run/containers(/.*)? system_u:object_r:container_var_run_t:s0 +/srv/containers(/.*)? system_u:object_r:container_file_t:s0 +/tmp/\.font-unix(/.*)? system_u:object_r:user_fonts_t:s0 +/usr/\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/usr/lib/apache(/.*)? system_u:object_r:httpd_modules_t:s0 +/usr/lib/dracut(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/locale(/.*)? system_u:object_r:locale_t:s0 +/usr/share/cups(/.*)? system_u:object_r:cupsd_etc_t:s0 +/usr/share/glpi(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/vice/cache(/.*)? system_u:object_r:afs_cache_t:s0 +/var/\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/var/cache/abrt(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/cache/cgit(/.*)? system_u:object_r:git_rw_content_t:s0 +/var/cache/cups(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/var/cache/ibus(/.*)? system_u:object_r:system_dbusd_var_lib_t:s0 +/var/cache/mock(/.*)? system_u:object_r:mock_cache_t:s0 +/var/cache/nscd(/.*)? system_u:object_r:nscd_var_run_t:s0 +/var/cache/tang(/.*)? system_u:object_r:tangd_cache_t:s0 +/var/lib/BrlAPI(/.*)? system_u:object_r:brltty_var_lib_t:s0 +/var/lib/amanda(/.*)? system_u:object_r:amanda_var_lib_t:s0 +/var/lib/amavis(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/lib/brltty(/.*)? system_u:object_r:brltty_var_lib_t:s0 +/var/lib/chrony(/.*)? system_u:object_r:chronyd_var_lib_t:s0 +/var/lib/cinder(/.*)? system_u:object_r:cinder_var_lib_t:s0 +/var/lib/clamav(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/lib/colord(/.*)? system_u:object_r:colord_var_lib_t:s0 +/var/lib/condor(/.*)? system_u:object_r:condor_var_lib_t:s0 +/var/lib/dhcpcd(/.*)? system_u:object_r:dhcpc_state_t:s0 +/var/lib/dirsrv(/.*)? system_u:object_r:dirsrv_var_lib_t:s0 +/var/lib/docker(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/epylog(/.*)? system_u:object_r:logwatch_cache_t:s0 +/var/lib/fprint(/.*)? system_u:object_r:fprintd_var_lib_t:s0 +/var/lib/glance(/.*)? system_u:object_r:glance_var_lib_t:s0 +/var/lib/hsqldb(/.*)? system_u:object_r:hsqldb_var_lib_t:s0 +/var/lib/hyperv(/.*)? system_u:object_r:hypervkvp_var_lib_t:s0 +/var/lib/kismet(/.*)? system_u:object_r:kismet_var_lib_t:s0 +/var/lib/kpatch(/.*)? system_u:object_r:kpatch_var_lib_t:s0 +/var/lib/lldpad(/.*)? system_u:object_r:lldpad_var_lib_t:s0 +/var/lib/moodle(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/mythtv(/.*)? system_u:object_r:mythtv_var_lib_t:s0 +/var/lib/naemon(/.*)? system_u:object_r:naemon_var_lib_t:s0 +/var/lib/opa-fm(/.*)? system_u:object_r:opafm_var_lib_t:s0 +/var/lib/origin(/.*)? system_u:object_r:container_file_t:s0 +/var/lib/pcmcia(/.*)? system_u:object_r:cardmgr_var_run_t:s0 +/var/lib/pgsql/.*\.log system_u:object_r:postgresql_log_t:s0 +/var/lib/pki-ca(/.*)? system_u:object_r:pki_tomcat_var_lib_t:s0 +/var/lib/pki-ra(/.*)? system_u:object_r:pki_ra_var_lib_t:s0 +/var/lib/puppet(/.*)? system_u:object_r:puppet_var_lib_t:s0 +/var/lib/pyzord(/.*)? system_u:object_r:spamd_var_lib_t:s0 +/var/lib/qdiskd(/.*)? system_u:object_r:qdiskd_var_lib_t:s0 +/var/lib/shared(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/ssl_db(/.*)? system_u:object_r:squid_cache_t:s0 +/var/lib/sss/mc(/.*)? system_u:object_r:sssd_public_t:s0 +/var/lib/upower(/.*)? system_u:object_r:devicekit_var_lib_t:s0 +/var/lib/vnstat(/.*)? system_u:object_r:vnstatd_var_lib_t:s0 +/var/lib/z-push(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/zabbix(/.*)? system_u:object_r:zabbix_var_lib_t:s0 +/var/lib/zarafa(/.*)? system_u:object_r:zarafa_var_lib_t:s0 +/var/lightsquid(/.*)? system_u:object_r:squid_cache_t:s0 +/var/lock/iscsi(/.*)? system_u:object_r:iscsi_lock_t:s0 +/var/lock/kdump(/.*)? system_u:object_r:kdump_lock_t:s0 +/var/log/amanda(/.*)? system_u:object_r:amanda_log_t:s0 +/var/log/chrony(/.*)? system_u:object_r:chronyd_var_log_t:s0 +/var/log/cinder(/.*)? system_u:object_r:cinder_log_t:s0 +/var/log/condor(/.*)? system_u:object_r:condor_log_t:s0 +/var/log/conman(/.*)? system_u:object_r:conman_log_t:s0 +/var/log/dirsrv(/.*)? system_u:object_r:dirsrv_var_log_t:s0 +/var/log/glance(/.*)? system_u:object_r:glance_log_t:s0 +/var/log/icinga(/.*)? system_u:object_r:nagios_log_t:s0 +/var/log/jockey(/.*)? system_u:object_r:jockey_var_log_t:s0 +/var/log/kismet(/.*)? system_u:object_r:kismet_log_t:s0 +/var/log/mythtv(/.*)? system_u:object_r:mythtv_var_log_t:s0 +/var/log/naemon(/.*)? system_u:object_r:naemon_log_t:s0 +/var/log/nagios(/.*)? system_u:object_r:nagios_log_t:s0 +/var/log/pki-ca(/.*)? system_u:object_r:pki_tomcat_log_t:s0 +/var/log/pki-ra(/.*)? system_u:object_r:pki_ra_log_t:s0 +/var/log/puppet(/.*)? system_u:object_r:puppet_log_t:s0 +/var/log/quagga(/.*)? system_u:object_r:zebra_log_t:s0 +/var/log/radius(/.*)? system_u:object_r:radiusd_log_t:s0 +/var/log/z-push(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/named/data(/.*)? system_u:object_r:named_cache_t:s0 +/var/opendnssec(/.*)? system_u:object_r:opendnssec_var_t:s0 +/var/run/brltty(/.*)? system_u:object_r:brltty_var_run_t:s0 +/var/run/chrony(/.*)? system_u:object_r:chronyd_var_run_t:s0 +/var/run/cinder(/.*)? system_u:object_r:cinder_var_run_t:s0 +/var/run/condor(/.*)? system_u:object_r:condor_var_run_t:s0 +/var/run/davfs2(/.*)? system_u:object_r:mount_var_run_t:s0 +/var/run/devkit(/.*)? system_u:object_r:devicekit_var_run_t:s0 +/var/run/dhcpcd(/.*)? system_u:object_r:dhcpc_var_run_t:s0 +/var/run/dirsrv(/.*)? system_u:object_r:dirsrv_var_run_t:s0 +/var/run/gather(/.*)? system_u:object_r:sblim_var_run_t:s0 +/var/run/glance(/.*)? system_u:object_r:glance_var_run_t:s0 +/var/run/motd\.d(/.*)? system_u:object_r:motd_var_run_t:s0 +/var/run/mysqld(/.*)? system_u:object_r:mysqld_var_run_t:s0 +/var/run/naemon(/.*)? system_u:object_r:naemon_var_run_t:s0 +/var/run/opafmd(/.*)? system_u:object_r:opafm_var_run_t:s0 +/var/run/openct(/.*)? system_u:object_r:openct_var_run_t:s0 +/var/run/pesign(/.*)? system_u:object_r:pesign_var_run_t:s0 +/var/run/pki/ra(/.*)? system_u:object_r:pki_ra_var_run_t:s0 +/var/run/polipo(/.*)? system_u:object_r:polipo_pid_t:s0 +/var/run/puppet(/.*)? system_u:object_r:puppet_var_run_t:s0 +/var/run/quagga(/.*)? system_u:object_r:zebra_var_run_t:s0 +/var/run/rsctmp(/.*)? system_u:object_r:cluster_var_run_t:s0 +/var/run/screen(/.*)? system_u:object_r:screen_var_run_t:s0 +/var/run/upower(/.*)? system_u:object_r:devicekit_var_run_t:s0 +/var/run/xdmctl(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/run/xenner(/.*)? system_u:object_r:xend_var_run_t:s0 +/var/run/zabbix(/.*)? system_u:object_r:zabbix_var_run_t:s0 +/var/spool/abrt(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/spool/ctdb(/.*)? system_u:object_r:ctdbd_spool_t:s0 +/var/spool/cups(/.*)? system_u:object_r:print_spool_t:s0 +/var/spool/gosa(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/spool/imap(/.*)? system_u:object_r:mail_spool_t:s0 +/var/spool/mail(/.*)? system_u:object_r:mail_spool_t:s0 +/var/spool/news(/.*)? system_u:object_r:news_spool_t:s0 +/var/spool/rwho(/.*)? system_u:object_r:rwho_spool_t:s0 +/var/spool/uucp(/.*)? system_u:object_r:uucpd_spool_t:s0 +/var/squidGuard(/.*)? system_u:object_r:squid_cache_t:s0 +/var/state/yiff(/.*)? system_u:object_r:soundd_state_t:s0 +/var/turboprint(/.*)? system_u:object_r:cupsd_var_run_t:s0 +/var/virusmails(/.*)? system_u:object_r:antivirus_db_t:s0 +/bin/fusermount[0-9]? -- system_u:object_r:fusermount_exec_t:s0 +/var/www/dspam/.*\.cgi -- system_u:object_r:dspam_script_exec_t:s0 +/etc/sysconfig/.*l2tpd -- system_u:object_r:l2tp_conf_t:s0 +/opt/lampp/lib/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libADM.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libGTL.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/pgsql/.*\.so.* -- system_u:object_r:lib_t:s0 +/usr/lib/xfce4/.*\.so.* -- system_u:object_r:lib_t:s0 +/etc/udev/rules.d(/.*)? system_u:object_r:udev_rules_t:s0 +/usr/X11R6/bin/[xgkw]dm -- system_u:object_r:xdm_exec_t:s0 +/usr/bin/cancel(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/usr/bin/lpstat(\.cups)? -- system_u:object_r:lpr_exec_t:s0 +/usr/lib/tuned/.*/.*\.sh -- system_u:object_r:bin_t:s0 +/var/log/mgetty.*\.log.* -- system_u:object_r:getty_log_t:s0 +/var/log/vgetty.*\.log.* -- system_u:object_r:getty_log_t:s0 +/var/tmp/krb5_0.rcache2 -- system_u:object_r:krb5_host_rcache_t:s0 +/etc/dhcp/dhcpd(6)?\.conf -- system_u:object_r:dhcp_etc_t:s0 +/etc/apache-ssl(2)?(/.*)? system_u:object_r:httpd_config_t:s0 +/var/log/apache(2)?(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/kadmin(d)?\.log.* system_u:object_r:kadmind_log_t:s0 +/var/run/amavis(d)?(/.*)? system_u:object_r:antivirus_var_run_t:s0 +/usr/sbin/httpd(\.worker)? -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/quota(check|on) -- system_u:object_r:quota_exec_t:s0 +/var/log/dynsim[0-9]*\.log -- system_u:object_r:openhpid_log_t:s0 +/usr/bin/initdb(\.sepgsql)? -- system_u:object_r:postgresql_exec_t:s0 +/var/spool/exim[0-9]?(/.*)? system_u:object_r:exim_spool_t:s0 +/usr/lib/fglrx/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nvidia.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/win32/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/run/amavis(d)?/clamd\.pid -- system_u:object_r:antivirus_var_run_t:s0 +/usr/lib/apache(2)?/suexec(2)? -- system_u:object_r:httpd_suexec_exec_t:s0 +/opt/VirtualBox(/.*)?/VBox.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/opt/teamviewer(/.*)?/bin/wine.* -- system_u:object_r:wine_exec_t:s0 +/var/ftp/lib/ld[^/]*\.so(\.[^/]*)* -- system_u:object_r:ld_so_t:s0 +/usr/bin/gnome-[^/]*-thumbnailer(.sh)? -- system_u:object_r:thumb_exec_t:s0 +/usr/share/gems(/.*)?/helper-scripts(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/python.*/site-packages/pymedia/muxer\.so -- system_u:object_r:textrel_shlib_t:s0 +/sbin/shorewall6? -- system_u:object_r:shorewall_exec_t:s0 +/etc/resolv\.conf.* system_u:object_r:net_conf_t:s0 +/etc/yaboot\.conf.* system_u:object_r:bootloader_etc_t:s0 +/tmp/lost\+found/.* <> +/usr/lost\+found/.* <> +/var/lib/postfix.* system_u:object_r:postfix_data_t:s0 +/var/log/dnsmasq.* system_u:object_r:dnsmasq_var_log_t:s0 +/var/log/mailman.* system_u:object_r:mailman_log_t:s0 +/var/log/openvpn.* system_u:object_r:openvpn_var_log_t:s0 +/var/log/prelude.* system_u:object_r:prelude_log_t:s0 +/var/lost\+found/.* <> +/var/run/aisexec.* system_u:object_r:cluster_var_run_t:s0 +/var/run/dmevent.* system_u:object_r:lvm_var_run_t:s0 +/var/run/dnsmasq.* system_u:object_r:dnsmasq_var_run_t:s0 +/var/run/mailman.* system_u:object_r:mailman_var_run_t:s0 +/var/run/proftpd.* system_u:object_r:ftpd_var_run_t:s0 +/var/run/rpcbind.* system_u:object_r:rpcbind_var_run_t:s0 +/var/run/usbmuxd.* system_u:object_r:usbmuxd_var_run_t:s0 +/var/run/vhostmd.* system_u:object_r:vhostmd_var_run_t:s0 +/etc/\.fstab\.hal\..+ -- system_u:object_r:etc_runtime_t:s0 +/etc/chrony\.keys.* -- system_u:object_r:chronyd_keys_t:s0 +/etc/cups/certs/.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/usr/lib/amanda/.+ -- system_u:object_r:amanda_exec_t:s0 +/usr/lib/lvm-10/.* -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/bacula.* -- system_u:object_r:bacula_exec_t:s0 +/usr/sbin/depmod.* -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/insmod.* -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/munin-.* -- system_u:object_r:munin_exec_t:s0 +/usr/sbin/swapon.* -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/umount.* -- system_u:object_r:mount_exec_t:s0 +/var/log/XFree86.* -- system_u:object_r:xserver_log_t:s0 +/var/log/faillog.* -- system_u:object_r:faillog_t:s0 +/var/log/iprdump.* -- system_u:object_r:mdadm_log_t:s0 +/var/log/lastlog.* -- system_u:object_r:lastlog_t:s0 +/var/log/nsd\.log.* -- system_u:object_r:nsd_log_t:s0 +/var/log/radutmp.* -- system_u:object_r:radiusd_log_t:s0 +/var/log/radwtmp.* -- system_u:object_r:radiusd_log_t:s0 +/var/log/rpmpkgs.* -- system_u:object_r:cron_log_t:s0 +/var/log/stunnel.* -- system_u:object_r:stunnel_log_t:s0 +/var/log/up2date.* -- system_u:object_r:rpm_log_t:s0 +/var/log/vnetlib.* -- system_u:object_r:vmware_log_t:s0 +/var/log/xferlog.* -- system_u:object_r:xferlog_t:s0 +/var/log/yum\.log.* -- system_u:object_r:rpm_log_t:s0 +/var/run/conmand.* -- system_u:object_r:conman_var_run_t:s0 +/var/run/xtables.* -- system_u:object_r:iptables_var_run_t:s0 +/dev/\.tmp-block-.* -c system_u:object_r:fixed_disk_device_t:s0 +/dev/infiniband/.* -c system_u:object_r:infiniband_device_t:s0 +/dev/input/event.* -c system_u:object_r:event_device_t:s0 +/dev/usb/scanner.* -c system_u:object_r:scanner_device_t:s0 +/dev/infiniband/.* -b system_u:object_r:infiniband_device_t:s0 +/dev/xen/tapctrl.* -p system_u:object_r:xenctl_t:s0 +/var/run/pki-kra.pid system_u:object_r:pki_tomcat_var_run_t:s0 +/var/run/pki-tks.pid system_u:object_r:pki_tomcat_var_run_t:s0 +/usr/sbin/apache(2)? -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/resize.*fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/tomcat(6)? -- system_u:object_r:tomcat_exec_t:s0 +/var/log/maillog[^/]* system_u:object_r:var_log_t:s0 +/var/log/spooler[^/]* system_u:object_r:var_log_t:s0 +/var/run/tomcat6?\.pid -- system_u:object_r:tomcat_var_run_t:s0 +/etc/MailScanner(/.*)? system_u:object_r:mscan_etc_t:s0 +/etc/WebCalendar(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/dirsrv/dsgw(/.*)? system_u:object_r:dirsrvadmin_config_t:s0 +/etc/httpd/alias(/.*)? system_u:object_r:cert_t:s0 +/etc/lvm/archive(/.*)? system_u:object_r:lvm_metadata_t:s0 +/etc/nsd/primary(/.*)? system_u:object_r:nsd_zone_t:s0 +/etc/openvswitch(/.*)? system_u:object_r:openvswitch_rw_t:s0 +/etc/pki/dovecot(/.*)? system_u:object_r:dovecot_cert_t:s0 +/etc/portreserve(/.*)? system_u:object_r:portreserve_etc_t:s0 +/etc/xen/scripts(/.*)? system_u:object_r:bin_t:s0 +/etc/yum\.repos\.d(/.*)? system_u:object_r:system_conf_t:s0 +/root/\.color/icc(/.*)? system_u:object_r:icc_data_home_t:s0 +/root/\.targetcli(/.*)? system_u:object_r:targetclid_home_t:s0 +/srv/lib/gitosis(/.*)? system_u:object_r:gitosis_var_lib_t:s0 +/usr/lib/cgi-bin(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/usr/lib/courier(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/modules(/.*)? system_u:object_r:modules_object_t:s0 +/usr/lib/selinux(/.*)? system_u:object_r:policy_src_t:s0 +/usr/lib/upstart(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/xen/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/libexec/fdo(/.*)? system_u:object_r:fdo_exec_t:s0 +/usr/share/fonts(/.*)? system_u:object_r:fonts_t:s0 +/usr/share/htdig(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/share/squid(/.*)? system_u:object_r:squid_conf_t:s0 +/usr/var/krb5kdc(/.*)? system_u:object_r:krb5kdc_conf_t:s0 +/var/axfrdns/env(/.*)? system_u:object_r:svc_conf_t:s0 +/var/cache/fonts(/.*)? system_u:object_r:tetex_data_t:s0 +/var/cache/fwupd(/.*)? system_u:object_r:fwupd_cache_t:s0 +/var/cache/httpd(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/jetty(/.*)? system_u:object_r:jetty_cache_t:s0 +/var/cache/mason(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/nginx(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/samba(/.*)? system_u:object_r:samba_var_t:s0 +/var/cache/squid(/.*)? system_u:object_r:squid_cache_t:s0 +/var/cache/stacd(/.*)? system_u:object_r:nvme_stas_cache_t:s0 +/var/cache/stafd(/.*)? system_u:object_r:nvme_stas_cache_t:s0 +/var/lib/Pegasus(/.*)? system_u:object_r:pegasus_data_t:s0 +/var/lib/awstats(/.*)? system_u:object_r:awstats_var_lib_t:s0 +/var/lib/bitlbee(/.*)? system_u:object_r:bitlbee_var_t:s0 +/var/lib/blueman(/.*)? system_u:object_r:blueman_var_lib_t:s0 +/var/lib/cluster(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/cobbler(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/couchdb(/.*)? system_u:object_r:couchdb_var_lib_t:s0 +/var/lib/courier(/.*)? system_u:object_r:courier_var_lib_t:s0 +/var/lib/dnsmasq(/.*)? system_u:object_r:dnsmasq_lease_t:s0 +/var/lib/dovecot(/.*)? system_u:object_r:dovecot_var_lib_t:s0 +/var/lib/ganglia(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/geoclue(/.*)? system_u:object_r:geoclue_var_lib_t:s0 +/var/lib/gitosis(/.*)? system_u:object_r:gitosis_var_lib_t:s0 +/var/lib/haproxy(/.*)? system_u:object_r:haproxy_var_lib_t:s0 +/var/lib/ipsilon(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/jabberd(/.*)? system_u:object_r:jabberd_var_lib_t:s0 +/var/lib/kubelet(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/libuuid(/.*)? system_u:object_r:uuidd_var_lib_t:s0 +/var/lib/libvirt(/.*)? system_u:object_r:virt_var_lib_t:s0 +/var/lib/lightdm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/lib/mailman(/.*)? system_u:object_r:mailman_data_t:s0 +/var/lib/nerdctl(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/neutron(/.*)? system_u:object_r:neutron_var_lib_t:s0 +/var/lib/openais(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/openhpi(/.*)? system_u:object_r:openhpid_var_lib_t:s0 +/var/lib/openvpn(/.*)? system_u:object_r:openvpn_var_lib_t:s0 +/var/lib/oz/isos(/.*)? system_u:object_r:virt_content_t:s0 +/var/lib/pam_ssh(/.*)? system_u:object_r:var_auth_t:s0 +/var/lib/pengine(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/pki-kra(/.*)? system_u:object_r:pki_tomcat_var_lib_t:s0 +/var/lib/pki-tks(/.*)? system_u:object_r:pki_tomcat_var_lib_t:s0 +/var/lib/pki-tps(/.*)? system_u:object_r:pki_tps_var_lib_t:s0 +/var/lib/plocate(/.*)? system_u:object_r:locate_var_lib_t:s0 +/var/lib/prelink(/.*)? system_u:object_r:prelink_var_lib_t:s0 +/var/lib/prosody(/.*)? system_u:object_r:prosody_var_lib_t:s0 +/var/lib/quantum(/.*)? system_u:object_r:neutron_var_lib_t:s0 +/var/lib/radiusd(/.*)? system_u:object_r:radiusd_var_lib_t:s0 +/var/lib/rkt/cas(/.*)? system_u:object_r:container_file_t:s0 +/var/lib/roundup(/.*)? system_u:object_r:roundup_var_lib_t:s0 +/var/lib/rpcbind(/.*)? system_u:object_r:rpcbind_var_lib_t:s0 +/var/lib/sectool(/.*)? system_u:object_r:sectool_var_lib_t:s0 +/var/lib/selinux(/.*)? system_u:object_r:semanage_store_t:s0 +/var/lib/sepgsql(/.*)? system_u:object_r:postgresql_db_t:s0 +/var/lib/softhsm(/.*)? system_u:object_r:named_cache_t:s0 +/var/lib/sqlgrey(/.*)? system_u:object_r:greylist_milter_data_t:s0 +/var/lib/systemd(/.*)? system_u:object_r:init_var_lib_t:s0 +/var/lib/unbound(/.*)? system_u:object_r:named_cache_t:s0 +/var/lib/varnish(/.*)? system_u:object_r:varnishd_var_lib_t:s0 +/var/lib/wnn/dic(/.*)? system_u:object_r:canna_var_lib_t:s0 +/var/lock/condor(/.*)? system_u:object_r:condor_var_lock_t:s0 +/var/lock/dirsrv(/.*)? system_u:object_r:dirsrv_var_lock_t:s0 +/var/lock/dmraid(/.*)? system_u:object_r:lvm_lock_t:s0 +/var/log/account(/.*)? system_u:object_r:acct_data_t:s0 +/var/log/cobbler(/.*)? system_u:object_r:cobbler_var_log_t:s0 +/var/log/couchdb(/.*)? system_u:object_r:couchdb_log_t:s0 +/var/log/dovecot(/.*)? system_u:object_r:dovecot_var_log_t:s0 +/var/log/horizon(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/icecast(/.*)? system_u:object_r:icecast_log_t:s0 +/var/log/libvirt(/.*)? system_u:object_r:virt_log_t:s0 +/var/log/lightdm(/.*)? system_u:object_r:xserver_log_t:s0 +/var/log/mariadb(/.*)? system_u:object_r:mysqld_log_t:s0 +/var/log/neutron(/.*)? system_u:object_r:neutron_log_t:s0 +/var/log/php-fpm(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/piranha(/.*)? system_u:object_r:piranha_log_t:s0 +/var/log/pki-kra(/.*)? system_u:object_r:pki_tomcat_log_t:s0 +/var/log/pki-tks(/.*)? system_u:object_r:pki_tomcat_log_t:s0 +/var/log/pki-tps(/.*)? system_u:object_r:pki_tps_log_t:s0 +/var/log/prelink(/.*)? system_u:object_r:prelink_log_t:s0 +/var/log/privoxy(/.*)? system_u:object_r:privoxy_log_t:s0 +/var/log/proftpd(/.*)? system_u:object_r:xferlog_t:s0 +/var/log/prosody(/.*)? system_u:object_r:prosody_log_t:s0 +/var/log/qemu-ga(/.*)? system_u:object_r:virt_qemu_ga_log_t:s0 +/var/log/quantum(/.*)? system_u:object_r:neutron_log_t:s0 +/var/log/radacct(/.*)? system_u:object_r:radiusd_log_t:s0 +/var/log/sudo-io(/.*)? system_u:object_r:sudo_log_t:s0 +/var/log/sysstat(/.*)? system_u:object_r:sysstat_log_t:s0 +/var/log/varnish(/.*)? system_u:object_r:varnishlog_log_t:s0 +/var/qmail/alias(/.*)? system_u:object_r:qmail_alias_home_t:s0 +/var/qmail/queue(/.*)? system_u:object_r:qmail_spool_t:s0 +/var/run/chronyd(/.*)? system_u:object_r:chronyd_var_run_t:s0 +/var/run/console(/.*)? system_u:object_r:pam_var_console_t:s0 +/var/run/couchdb(/.*)? system_u:object_r:couchdb_var_run_t:s0 +/var/run/courier(/.*)? system_u:object_r:courier_var_run_t:s0 +/var/run/hostapd(/.*)? system_u:object_r:hostapd_var_run_t:s0 +/var/run/icecast(/.*)? system_u:object_r:icecast_var_run_t:s0 +/var/run/krb5kdc(/.*)? system_u:object_r:krb5kdc_var_run_t:s0 +/var/run/libgpod(/.*)? system_u:object_r:udev_var_run_t:s0 +/var/run/libvirt(/.*)? system_u:object_r:virt_var_run_t:s0 +/var/run/lightdm(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/run/mariadb(/.*)? system_u:object_r:mysqld_var_run_t:s0 +/var/run/neutron(/.*)? system_u:object_r:neutron_var_run_t:s0 +/var/run/openvpn(/.*)? system_u:object_r:openvpn_var_run_t:s0 +/var/run/pam_ssh(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/run/php-fpm(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/run/pki/tps(/.*)? system_u:object_r:pki_tps_var_run_t:s0 +/var/run/prosody(/.*)? system_u:object_r:prosody_var_run_t:s0 +/var/run/pyicq-t(/.*)? system_u:object_r:pyicqt_var_run_t:s0 +/var/run/quantum(/.*)? system_u:object_r:neutron_var_run_t:s0 +/var/run/radiusd(/.*)? system_u:object_r:radiusd_var_run_t:s0 +/var/run/sanlock(/.*)? system_u:object_r:sanlock_var_run_t:s0 +/var/run/setrans(/.*)? system_u:object_r:setrans_var_run_t:s0 +/var/run/spamass(/.*)? system_u:object_r:spamass_milter_data_t:s0 +/var/run/stunnel(/.*)? system_u:object_r:stunnel_var_run_t:s0 +/var/run/systemd(/.*)? system_u:object_r:init_var_run_t:s0 +/var/run/unbound(/.*)? system_u:object_r:named_var_run_t:s0 +/var/spool/audit(/.*)? system_u:object_r:audit_spool_t:s0 +/var/spool/debug(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/spool/samba(/.*)? system_u:object_r:samba_spool_t:s0 +/var/spool/smtpd(/.*)? system_u:object_r:mail_spool_t:s0 +/var/spool/spamd(/.*)? system_u:object_r:spamd_spool_t:s0 +/var/spool/squid(/.*)? system_u:object_r:squid_cache_t:s0 +/var/spool/texmf(/.*)? system_u:object_r:tetex_data_t:s0 +/var/spool/voice(/.*)? system_u:object_r:getty_var_run_t:s0 +/var/tinydns/env(/.*)? system_u:object_r:svc_conf_t:s0 +/var/www/cgi-bin(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/var/www/cobbler(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/boot/System\.map(-.*)? -- system_u:object_r:system_map_t:s0 +/usr/sbin/crack_[a-z]* -- system_u:object_r:crack_exec_t:s0 +/var/cache/swift(/.*)? -- system_u:object_r:swift_var_cache_t:s0 +/dev/nvme-subsys[0-9]+ -c system_u:object_r:fixed_disk_device_t:s0 +/dev/vhost-vdpa-[0-9]+ -c system_u:object_r:vhost_device_t:s0 +/var/lib/tomcat6?(/.*)? system_u:object_r:tomcat_var_lib_t:s0 +/var/lib/tomcats?(/.*)? system_u:object_r:tomcat_var_lib_t:s0 +/var/log/tomcat6?(/.*)? system_u:object_r:tomcat_log_t:s0 +/etc/sysctl\.conf(\.old)? -- system_u:object_r:system_conf_t:s0 +/etc/cron\.daily/[sm]locate -- system_u:object_r:locate_exec_t:s0 +/usr/lib/libmyth[^/]+\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/mailman.*/cron/.* -- system_u:object_r:mailman_queue_exec_t:s0 +/var/lib/amanda/[^/]+(/.*)? system_u:object_r:amanda_data_t:s0 +/usr/lib/docker/[^/]*plugin -- system_u:object_r:container_runtime_exec_t:s0 +/usr/lib/mozilla[^/]*/reg.+ -- system_u:object_r:mozilla_exec_t:s0 +/usr/share/tucan.*/tucan.py -- system_u:object_r:bin_t:s0 +/var/lib/docker/.*/config\.env system_u:object_r:container_ro_file_t:s0 +/usr/lib/mailman.*/cgi-bin/.* -- system_u:object_r:mailman_cgi_exec_t:s0 +/usr/lib/modules(/.*)/vmlinuz -- system_u:object_r:usr_t:s0 +/usr/lib/midori/.*\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/usr/lib/cedega/.+\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libADM5.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/mailman.*/bin/qrunner -- system_u:object_r:mailman_queue_exec_t:s0 +/usr/sbin/mysqld(-max|-debug)? -- system_u:object_r:mysqld_exec_t:s0 +/usr/share/gems/.*/Passenger.* -- system_u:object_r:passenger_exec_t:s0 +/var/lib/amanda/[^/]*/log(/.*)? system_u:object_r:amanda_log_t:s0 +/var/run/dovecot(-login)?(/.*)? system_u:object_r:dovecot_var_run_t:s0 +/usr/lib/mailman.*/mail/mailman -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/mailman.*/mail/wrapper -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/vmware/(.*/)?VmPerl\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/firefox[^/]*/mozilla-.* -- system_u:object_r:mozilla_exec_t:s0 +/usr/lib/mozilla[^/]*/mozilla-.* -- system_u:object_r:mozilla_exec_t:s0 +/var/lib/amanda/[^/]+/index(/.*)? system_u:object_r:amanda_var_lib_t:s0 +/var/lib/mailman.*/archives(/.*)? system_u:object_r:mailman_archive_t:s0 +/usr/lib/mailman.*/bin/mailmanctl -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/mailman.*/scripts/mailman -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/oracle/.*/lib/libnnz.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/oracle/.*/lib/libnnz10\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/mailman.*/bin/mm-handler.* -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/modules(/.*)/initramfs.img -- system_u:object_r:usr_t:s0 +/usr/lib/oracle/.*/lib/libclntsh\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/run/containerd/[^/]*/sandboxes/[^/]*/shm(/.*)? system_u:object_r:container_runtime_tmpfs_t:s0 +/usr/libexec/kde(3|4)/ksysguardprocesslist_helper -- system_u:object_r:gnomesystemmm_exec_t:s0 +/usr/share/gems/.*/ApplicationPoolServerExecutable -- system_u:object_r:passenger_exec_t:s0 +/usr/lib/python2.4/site-packages/M2Crypto/__m2crypto\.so -- system_u:object_r:textrel_shlib_t:s0 +/boot/lost\+found/.* <> +/etc/dovecot\.conf.* system_u:object_r:dovecot_etc_t:s0 +/root/\.gstreamer-.* system_u:object_r:gstreamer_home_t:s0 +/usr/share/drupal.* system_u:object_r:httpd_sys_content_t:s0 +/var/lock/mailman.* system_u:object_r:mailman_lock_t:s0 +/var/log/boot\.log.* system_u:object_r:plymouthd_var_log_t:s0 +/var/log/ksmtuned.* system_u:object_r:ksmtuned_log_t:s0 +/var/log/watchdog.* system_u:object_r:watchdog_log_t:s0 +/var/run/asterisk.* system_u:object_r:asterisk_var_run_t:s0 +/var/run/fail2ban.* system_u:object_r:fail2ban_var_run_t:s0 +/var/spool/bacula.* system_u:object_r:bacula_spool_t:s0 +/var/spool/fcron/.* <> +/etc/\.resolv\.conf.* -- system_u:object_r:net_conf_t:s0 +/etc/cipe/ip-down.* -- system_u:object_r:bin_t:s0 +/etc/mail/aliases.* -- system_u:object_r:etc_aliases_t:s0 +/etc/modules\.conf.* -- system_u:object_r:modules_conf_t:s0 +/etc/ppp/ip-down\..* -- system_u:object_r:bin_t:s0 +/etc/ppp/ipv6-up\..* -- system_u:object_r:bin_t:s0 +/etc/rc\.d/init\.d/.* -- system_u:object_r:initrc_exec_t:s0 +/root/\.Xauthority.* -- system_u:object_r:xauth_home_t:s0 +/root/\.serverauth.* -- system_u:object_r:xauth_home_t:s0 +/sys/class/net/ib.* -- system_u:object_r:sysctl_net_t:s0 +/usr/bin/pinentry.* -- system_u:object_r:pinentry_exec_t:s0 +/usr/bin/updatedb.* -- system_u:object_r:locate_exec_t:s0 +/usr/lib/libjs\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/lvm-200/.* -- system_u:object_r:lvm_exec_t:s0 +/usr/libexec/lxc/.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/libexec/lxd/.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/libexec/qemu.* -- system_u:object_r:qemu_exec_t:s0 +/usr/sbin/amavisd.* -- system_u:object_r:antivirus_exec_t:s0 +/usr/sbin/losetup.* -- system_u:object_r:fsadm_exec_t:s0 +/var/log/aide\.log.* -- system_u:object_r:aide_log_t:s0 +/var/log/ctdb\.log.* -- system_u:object_r:ctdbd_log_t:s0 +/var/log/iwhd\.log.* -- system_u:object_r:iwhd_log_t:s0 +/var/log/log\.ctdb.* -- system_u:object_r:ctdbd_log_t:s0 +/var/log/lxdm\.log.* -- system_u:object_r:xdm_log_t:s0 +/var/log/nscd\.log.* -- system_u:object_r:nscd_log_t:s0 +/var/log/platform.* -- system_u:object_r:rtas_errd_log_t:s0 +/var/log/slim\.log.* -- system_u:object_r:xdm_log_t:s0 +/var/log/slpd\.log.* -- system_u:object_r:slpd_log_t:s0 +/var/log/tallylog.* -- system_u:object_r:faillog_t:s0 +/var/log/thin\.log.* -- system_u:object_r:thin_log_t:s0 +/var/log/xend\.log.* -- system_u:object_r:xend_var_log_t:s0 +/var/run/dhclient.* -- system_u:object_r:dhcpc_var_run_t:s0 +/var/run/ebtables.* -- system_u:object_r:iptables_var_run_t:s0 +/var/run/stratisd.* -- system_u:object_r:stratisd_var_run_t:s0 +/var/run/pki-ocsp.pid system_u:object_r:pki_tomcat_var_run_t:s0 +/var/log/collectd.log -- system_u:object_r:collectd_log_t:s0 +/var/run/svnserve.pid -- system_u:object_r:svnserve_var_run_t:s0 +/var/log/messages[^/]* system_u:object_r:var_log_t:s0 +/var/run/wnn-unix(/.*) system_u:object_r:canna_var_run_t:s0 +/etc/X11/Xsession[^/]* -- system_u:object_r:xsession_exec_t:s0 +/usr/lib/systemd/[^/]* -- system_u:object_r:init_exec_t:s0 +/usr/share/hplip/.*\.py -- system_u:object_r:cupsd_exec_t:s0 +/usr/share/hplip/[^/]* -- system_u:object_r:bin_t:s0 +/etc/acpi/actions(/.*)? system_u:object_r:bin_t:s0 +/etc/courier-imap(/.*)? system_u:object_r:courier_etc_t:s0 +/etc/dhcp/scripts(/.*)? system_u:object_r:bin_t:s0 +/etc/fdo/aio/keys(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/fdo/aio/logs(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/kde/shutdown(/.*)? system_u:object_r:bin_t:s0 +/etc/racoon/certs(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/etc/squid/ssl_db(/.*)? system_u:object_r:squid_cache_t:s0 +/etc/vmware-tools(/.*)? system_u:object_r:vmtools_unconfined_exec_t:s0 +/lib/udev/devices(/.*)? system_u:object_r:device_t:s0 +/root/\.fontconfig(/.*)? system_u:object_r:user_fonts_cache_t:s0 +/root/\.fonts/auto(/.*)? system_u:object_r:user_fonts_cache_t:s0 +/usr/centreon/log(/.*)? system_u:object_r:var_log_t:s0 +/usr/lib/cherokee(/.*)? system_u:object_r:httpd_modules_t:s0 +/usr/lib/lighttpd(/.*)? system_u:object_r:httpd_modules_t:s0 +/usr/lib/news/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/pm-utils(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/sysimage(/.*)? system_u:object_r:usr_t:s0 +/usr/share/config(/.*)? system_u:object_r:config_usr_t:s0 +/usr/share/dirsrv(/.*)? system_u:object_r:dirsrv_share_t:s0 +/usr/share/hwdata(/.*)? system_u:object_r:hwdata_t:s0 +/usr/share/joomla(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/usr/share/locale(/.*)? system_u:object_r:locale_t:s0 +/usr/share/mythtv(/.*)? system_u:object_r:mythtv_content_t:s0 +/usr/share/z-push(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/cache/davfs2(/.*)? system_u:object_r:mount_var_run_t:s0 +/var/cache/jockey(/.*)? system_u:object_r:jockey_cache_t:s0 +/var/cache/naemon(/.*)? system_u:object_r:naemon_cache_t:s0 +/var/cache/opensm(/.*)? system_u:object_r:opensm_cache_t:s0 +/var/cache/polipo(/.*)? system_u:object_r:polipo_cache_t:s0 +/var/cache/realmd(/.*)? system_u:object_r:realmd_var_cache_t:s0 +/var/dnscache/env(/.*)? system_u:object_r:svc_conf_t:s0 +/var/home/fdouser(/.*)? system_u:object_r:fdo_home_t:s0 +/var/lib/arpwatch(/.*)? system_u:object_r:arpwatch_data_t:s0 +/var/lib/asterisk(/.*)? system_u:object_r:asterisk_var_lib_t:s0 +/var/lib/bugzilla(/.*)? system_u:object_r:bugzilla_rw_content_t:s0 +/var/lib/buildkit(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/cherokee(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/collectd(/.*)? system_u:object_r:collectd_var_lib_t:s0 +/var/lib/corosync(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/dhclient(/.*)? system_u:object_r:dhcpc_state_t:s0 +/var/lib/dokuwiki(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/ebtables(/.*)? system_u:object_r:iptables_var_lib_t:s0 +/var/lib/fail2ban(/.*)? system_u:object_r:fail2ban_var_lib_t:s0 +/var/lib/freeipmi(/.*)? system_u:object_r:freeipmi_var_lib_t:s0 +/var/lib/gssproxy(/.*)? system_u:object_r:gssproxy_var_lib_t:s0 +/var/lib/insights(/.*)? system_u:object_r:insights_client_var_lib_t:s0 +/var/lib/kdcproxy(/.*)? system_u:object_r:krb5kdc_var_lib_t:s0 +/var/lib/keystone(/.*)? system_u:object_r:keystone_var_lib_t:s0 +/var/lib/lighttpd(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/likewise(/.*)? system_u:object_r:likewise_var_lib_t:s0 +/var/lib/lockdown(/.*)? system_u:object_r:usbmuxd_var_lib_t:s0 +/var/lib/logcheck(/.*)? system_u:object_r:logwatch_cache_t:s0 +/var/lib/luci/etc(/.*)? system_u:object_r:piranha_web_conf_t:s0 +/var/lib/machines(/.*)? system_u:object_r:systemd_machined_var_lib_t:s0 +/var/lib/minidlna(/.*)? system_u:object_r:minidlna_db_t:s0 +/var/lib/mojomojo(/.*)? system_u:object_r:mojomojo_rw_content_t:s0 +/var/lib/net-snmp(/.*)? system_u:object_r:snmpd_var_lib_t:s0 +/var/lib/nxserver(/.*)? system_u:object_r:nx_server_var_lib_t:s0 +/var/lib/one/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/owncloud(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/pki-ocsp(/.*)? system_u:object_r:pki_tomcat_var_lib_t:s0 +/var/lib/plymouth(/.*)? system_u:object_r:plymouthd_var_lib_t:s0 +/var/lib/polkit-1(/.*)? system_u:object_r:policykit_var_lib_t:s0 +/var/lib/postgrey(/.*)? system_u:object_r:postgrey_var_lib_t:s0 +/var/lib/rabbitmq(/.*)? system_u:object_r:rabbitmq_var_lib_t:s0 +/var/lib/registry(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/rkhunter(/.*)? system_u:object_r:rkhunter_var_lib_t:s0 +/var/lib/sepolgen(/.*)? system_u:object_r:selinux_config_t:s0 +/var/lib/smstools(/.*)? system_u:object_r:smsd_var_lib_t:s0 +/var/lib/sntp-kod(/.*)? system_u:object_r:ntp_drift_t:s0 +/var/lib/tftpboot(/.*)? system_u:object_r:tftpdir_rw_t:s0 +/var/lib/tor-data(/.*)? system_u:object_r:tor_var_lib_t:s0 +/var/lock/lockdev(/.*)? system_u:object_r:lockdev_lock_t:s0 +/var/log/asterisk(/.*)? system_u:object_r:asterisk_log_t:s0 +/var/log/cherokee(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/collectd(/.*)? system_u:object_r:collectd_log_t:s0 +/var/log/conman\.d(/.*)? system_u:object_r:conman_log_t:s0 +/var/log/cyphesis(/.*)? system_u:object_r:cyphesis_log_t:s0 +/var/log/keystone(/.*)? system_u:object_r:keystone_log_t:s0 +/var/log/lighttpd(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/minidlna(/.*)? system_u:object_r:minidlna_log_t:s0 +/var/log/netsaint(/.*)? system_u:object_r:nagios_log_t:s0 +/var/log/ntpstats(/.*)? system_u:object_r:ntpd_log_t:s0 +/var/log/pki-ocsp(/.*)? system_u:object_r:pki_tomcat_log_t:s0 +/var/log/procmail(/.*)? system_u:object_r:procmail_log_t:s0 +/var/log/rabbitmq(/.*)? system_u:object_r:rabbitmq_var_log_t:s0 +/var/log/svnserve(/.*)? system_u:object_r:svnserve_log_t:s0 +/var/named/chroot(/.*)? system_u:object_r:named_conf_t:s0 +/var/named/slaves(/.*)? system_u:object_r:named_cache_t:s0 +/var/opt/f-secure(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/qmail/owners(/.*)? system_u:object_r:qmail_etc_t:s0 +/var/run/collectd(/.*)? system_u:object_r:collectd_var_run_t:s0 +/var/run/cyphesis(/.*)? system_u:object_r:cyphesis_var_run_t:s0 +/var/run/faillock(/.*)? system_u:object_r:faillog_t:s0 +/var/run/fcgiwrap(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/run/keystone(/.*)? system_u:object_r:keystone_var_run_t:s0 +/var/run/lighttpd(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/run/metadata(/.*)? system_u:object_r:afterburn_runtime_t:s0 +/var/run/minidlna(/.*)? system_u:object_r:minidlna_var_run_t:s0 +/var/run/net-snmp(/.*)? system_u:object_r:snmpd_var_run_t:s0 +/var/run/opendkim(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/run/openldap(/.*)? system_u:object_r:slapd_var_run_t:s0 +/var/run/plymouth(/.*)? system_u:object_r:plymouthd_var_run_t:s0 +/var/run/pm-utils(/.*)? system_u:object_r:devicekit_var_run_t:s0 +/var/run/postgrey(/.*)? system_u:object_r:postgrey_var_run_t:s0 +/var/run/rabbitmq(/.*)? system_u:object_r:rabbitmq_var_run_t:s0 +/var/run/sepermit(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/run/storaged(/.*)? system_u:object_r:lvm_var_run_t:s0 +/var/run/stratisd(/.*)? system_u:object_r:stratisd_var_run_t:s0 +/var/run/svnserve(/.*)? system_u:object_r:svnserve_var_run_t:s0 +/var/run/winbindd(/.*)? system_u:object_r:winbind_var_run_t:s0 +/var/spool/icinga(/.*)? system_u:object_r:nagios_spool_t:s0 +/var/spool/nagios(/.*)? system_u:object_r:nagios_spool_t:s0 +/var/spool/snmptt(/.*)? system_u:object_r:snmpd_var_lib_t:s0 +/var/spool/spampd(/.*)? system_u:object_r:spamd_spool_t:s0 +/var/spool/viewvc(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/www/svn/conf(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/etc/mdadm\.conf\.d(/.*)? -- system_u:object_r:mdadm_conf_t:s0 +/etc/pki/tls/misc(/.*)? -- system_u:object_r:bin_t:s0 +/etc/ssh/ssh_host.*_key -- system_u:object_r:sshd_key_t:s0 +/var/lock/subsys/*.ftpd -- system_u:object_r:ftpd_lock_t:s0 +/var/run/arpwatch.*\.pid -- system_u:object_r:arpwatch_var_run_t:s0 +/var/log/cluster/.*\.*log <> +/etc/rc\.d/init\.d/.*l2tpd -- system_u:object_r:l2tpd_initrc_exec_t:s0 +/usr/bin/mozilla-[0-9].* -- system_u:object_r:mozilla_exec_t:s0 +/usr/sbin/prelink(\.bin)? -- system_u:object_r:prelink_exec_t:s0 +/usr/Brother/fax/.*\.log.* system_u:object_r:cupsd_log_t:s0 +/usr/lib/libGL\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/libmpg123\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/log/collectd.json.log -- system_u:object_r:collectd_log_t:s0 +/var/lib/gitolite(3)?(/.*)? system_u:object_r:gitosis_var_lib_t:s0 +/etc/rc\.d/init\.d/(open)?afs -- system_u:object_r:afs_initrc_exec_t:s0 +/etc/ssh/ssh_host.*_key\.pub -- system_u:object_r:sshd_key_t:s0 +/var/lib/postgres(ql)?(/.*)? system_u:object_r:postgresql_db_t:s0 +/etc/cron\.weekly/(c)?fingerd -- system_u:object_r:fingerd_exec_t:s0 +/usr/lib/libnnz11.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/var/run/tmpfiles.d/kmod.conf -- system_u:object_r:kmod_var_run_t:s0 +/usr/lib/jvm/java(.*/)bin(/.*) system_u:object_r:bin_t:s0 +/opt/local/matlab.*\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/etc/rc\.d/init\.d/((ccs)|(ccsd)) -- system_u:object_r:ccs_initrc_exec_t:s0 +/opt/lgtonmc/bin/.*\.so(\.[0-9])? -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/tumbler-[^/]*/tumblerd -- system_u:object_r:bin_t:s0 +/etc/opt/Brother/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/etc/rc\.d/init\.d/(se)?postgresql -- system_u:object_r:postgresql_initrc_exec_t:s0 +/etc/rc\.d/init\.d/(tcsd|trousers) -- system_u:object_r:tcsd_initrc_exec_t:s0 +/usr/lib/tumbler-?[^/]*/tumblerd -- system_u:object_r:thumb_exec_t:s0 +/var/lib/cluster/((ccs)|(ccsd)).* system_u:object_r:ccs_var_lib_t:s0 +/var/log/cluster/((ccs)|(ccsd)).* system_u:object_r:ccs_var_log_t:s0 +/usr/lib/dovecot/(.*/)?lib.*\.so.* -- system_u:object_r:lib_t:s0 +/usr/lib/modules/[^/]+/modules\..+ -- system_u:object_r:modules_dep_t:s0 +/etc/rc\.d/init\.d/(snmpd|snmptrapd) -- system_u:object_r:snmpd_initrc_exec_t:s0 +/usr/lib/allegro/(.*/)?alleg-vga\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/cgi-bin/(nph-)?cgiwrap(d)? -- system_u:object_r:httpd_suexec_exec_t:s0 +/var/run/cluster/((ccs)|(ccsd))\.pid -- system_u:object_r:ccs_var_run_t:s0 +/var/lib/nerdctl/[^/]*/volumes(/.*)? system_u:object_r:container_file_t:s0 +/var/spool/cron/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/var/run/cluster/((ccs)|(ccsd))\.sock -s system_u:object_r:ccs_var_run_t:s0 +/usr/lib/jvm/java(.*/)bin(/.*)?/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/var/run/tmpfiles.d/static-nodes.conf -- system_u:object_r:kmod_var_run_t:s0 +/etc/rc\.d/init\.d/(smartd|smartmontools) -- system_u:object_r:fsdaemon_initrc_exec_t:s0 +/etc/rc\.d/init\.d/(zabbix|zabbix-server) -- system_u:object_r:zabbix_initrc_exec_t:s0 +/usr/lib/firefox-[^/]*/plugins/nppdf.so -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/selinux/[^/]+/semanage\.read\.LOCK -- system_u:object_r:semanage_read_lock_t:s0 +/var/lib/selinux/[^/]+/semanage\.trans\.LOCK -- system_u:object_r:semanage_trans_lock_t:s0 +/etc/rc\.d/init\.d/((iodined)|(iodine-server)) -- system_u:object_r:iodined_initrc_exec_t:s0 +/etc/rc\.d/init\.d/((audio-entropyd)|(haveged)) -- system_u:object_r:entropyd_initrc_exec_t:s0 +/opt/Adobe/Reader.?/Reader/intellinux/plug_ins/.*\.api -- system_u:object_r:textrel_shlib_t:s0 +/etc/rc\.d/init\.d/((cf-serverd)|(cf-monitord)|(cf-execd)) -- system_u:object_r:cfengine_initrc_exec_t:s0 +/opt/Adobe/Reader.?/Reader/intellinux/SPPlugins/.*\.ap[il] -- system_u:object_r:lib_t:s0 +/usr/lib/firefox-[^/]*/extensions(/.*)?/libqfaservices.so -- system_u:object_r:textrel_shlib_t:s0 +/dev/shm/pulse-shm.* system_u:object_r:user_tmp_t:s0 +/sys/kernel/debug/.* <> +/var/lock/logcheck.* system_u:object_r:logwatch_lock_t:s0 +/var/log/fetchmail.* system_u:object_r:fetchmail_log_t:s0 +/var/log/passenger.* system_u:object_r:passenger_log_t:s0 +/var/log/shorewall.* system_u:object_r:shorewall_log_t:s0 +/var/log/xenstored.* system_u:object_r:xenstored_var_log_t:s0 +/var/run/bumblebee.* system_u:object_r:bumblebee_var_run_t:s0 +/var/run/fetchmail.* system_u:object_r:fetchmail_var_run_t:s0 +/var/run/pkcsslotd.* system_u:object_r:pkcs_slotd_var_run_t:s0 +/var/run/readahead.* system_u:object_r:readahead_var_run_t:s0 +/var/run/sm-notify.* system_u:object_r:rpcd_var_run_t:s0 +/var/spool/mailman.* system_u:object_r:mailman_data_t:s0 +/var/spool/postfix.* system_u:object_r:postfix_spool_t:s0 +/var/tmp/tmp-inst/.* <> +/etc/ipsec\.secrets.* -- system_u:object_r:ipsec_key_file_t:s0 +/etc/modprobe\.conf.* -- system_u:object_r:modules_conf_t:s0 +/etc/udev/scripts/.+ -- system_u:object_r:udev_helper_exec_t:s0 +/usr/bin/civclient.* -- system_u:object_r:games_exec_t:s0 +/usr/bin/civserver.* -- system_u:object_r:games_exec_t:s0 +/usr/bin/tracepath.* -- system_u:object_r:traceroute_exec_t:s0 +/usr/sbin/dhclient.* -- system_u:object_r:dhcpc_exec_t:s0 +/usr/sbin/ipchains.* -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/modprobe.* -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/setfiles.* -- system_u:object_r:setfiles_exec_t:s0 +/var/log/audit\.log.* -- system_u:object_r:auditd_log_t:s0 +/var/log/boinc\.log.* -- system_u:object_r:boinc_log_t:s0 +/var/log/ddtcd\.log.* -- system_u:object_r:ddclient_log_t:s0 +/var/log/firewalld.* -- system_u:object_r:firewalld_var_log_t:s0 +/var/log/freshclam.* -- system_u:object_r:antivirus_log_t:s0 +/var/log/numad\.log.* -- system_u:object_r:numad_var_log_t:s0 +/var/log/pluto\.log.* -- system_u:object_r:ipsec_log_t:s0 +/var/log/rtas_errd.* -- system_u:object_r:rtas_errd_log_t:s0 +/var/log/snmpd\.log.* -- system_u:object_r:snmpd_log_t:s0 +/var/log/spamd\.log.* -- system_u:object_r:spamd_log_t:s0 +/var/log/suphp\.log.* -- system_u:object_r:httpd_log_t:s0 +/var/log/tuned\.log.* -- system_u:object_r:tuned_log_t:s0 +/var/run/rrdcached.* -- system_u:object_r:rrdcached_var_run_t:s0 +/var/run/rtas_errd.* -- system_u:object_r:rtas_errd_var_run_t:s0 +/usr/sbin/dhcrelay(6)? -- system_u:object_r:dhcpd_exec_t:s0 +/var/run/syslog-ng.ctl -- system_u:object_r:syslogd_var_run_t:s0 +/etc/docker-latest(/.*)? system_u:object_r:container_config_t:s0 +/etc/likewise-open(/.*)? system_u:object_r:likewise_etc_t:s0 +/etc/munin/plugins(/.*)? system_u:object_r:bin_t:s0 +/etc/nsd/secondary(/.*)? system_u:object_r:nsd_zone_t:s0 +/etc/opt/VirtualGL(/.*)? system_u:object_r:xdm_rw_etc_t:s0 +/etc/sysconfig/rhn(/.*)? system_u:object_r:rhnsd_conf_t:s0 +/opt/google/chrome(/.*)? system_u:object_r:bin_t:s0 +/root/\.esmtp_queue(/.*)? system_u:object_r:mail_home_rw_t:s0 +/root/\.local/share(/.*)? system_u:object_r:data_home_t:s0 +/run/docker-client(/.*)? system_u:object_r:container_var_run_t:s0 +/usr/lib/heartbeat(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/usr/lib/perl5/man(/.*)? system_u:object_r:man_t:s0 +/usr/lib/readahead(/.*)? system_u:object_r:bin_t:s0 +/usr/share/icecast(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/share/mythweb(/.*)? system_u:object_r:mythtv_content_t:s0 +/var/cache/abrt-di(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/cache/cobbler(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/cache/coolkey(/.*)? system_u:object_r:auth_cache_t:s0 +/var/cache/fscache(/.*)? system_u:object_r:cachefiles_var_t:s0 +/var/cache/libvirt(/.*)? system_u:object_r:virt_cache_t:s0 +/var/cache/lightdm(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/cache/mod_ssl(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/rpcbind(/.*)? system_u:object_r:rpcbind_var_lib_t:s0 +/var/kerberos/krb5(/.*)? system_u:object_r:krb5_keytab_t:s0 +/var/lib/PolicyKit(/.*)? system_u:object_r:policykit_var_lib_t:s0 +/var/lib/bluetooth(/.*)? system_u:object_r:bluetooth_var_lib_t:s0 +/var/lib/cacti/rra(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/lib/canna/dic(/.*)? system_u:object_r:canna_var_lib_t:s0 +/var/lib/denyhosts(/.*)? system_u:object_r:denyhosts_var_lib_t:s0 +/var/lib/fetchmail(/.*)? system_u:object_r:fetchmail_uidl_cache_t:s0 +/var/lib/heartbeat(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/ipsec/nss(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/var/lib/logrotate(/.*)? system_u:object_r:logrotate_var_lib_t:s0 +/var/lib/luci/cert(/.*)? system_u:object_r:piranha_web_conf_t:s0 +/var/lib/mpd/music(/.*)? system_u:object_r:mpd_data_t:s0 +/var/lib/multipath(/.*)? system_u:object_r:lvm_var_lib_t:s0 +/var/lib/nextcloud(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/openshift(/.*)? system_u:object_r:openshift_var_lib_t:s0 +/var/lib/os-prober(/.*)? system_u:object_r:bootloader_var_lib_t:s0 +/var/lib/pacemaker(/.*)? system_u:object_r:cluster_var_lib_t:s0 +/var/lib/passenger(/.*)? system_u:object_r:passenger_var_lib_t:s0 +/var/lib/pootle/po(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/rasdaemon(/.*)? system_u:object_r:rasdaemon_var_lib_t:s0 +/var/lib/readahead(/.*)? system_u:object_r:readahead_var_lib_t:s0 +/var/lib/shorewall(/.*)? system_u:object_r:shorewall_var_lib_t:s0 +/var/lib/smokeping(/.*)? system_u:object_r:smokeping_var_lib_t:s0 +/var/lib/syslog-ng(/.*)? system_u:object_r:syslogd_var_lib_t:s0 +/var/lib/webalizer(/.*)? system_u:object_r:webalizer_var_lib_t:s0 +/var/lib/wifiroamd(/.*)? system_u:object_r:dhcpc_state_t:s0 +/var/lib/xenstored(/.*)? system_u:object_r:xenstored_var_lib_t:s0 +/var/lib/zabbixsrv(/.*)? system_u:object_r:zabbix_var_lib_t:s0 +/var/lock/mrtg-rrd(/.*)? system_u:object_r:mrtg_lock_t:s0 +/var/log/calamaris(/.*)? system_u:object_r:calamaris_log_t:s0 +/var/log/denyhosts(/.*)? system_u:object_r:denyhosts_var_log_t:s0 +/var/log/openshift(/.*)? system_u:object_r:openshift_log_t:s0 +/var/log/pacemaker(/.*)? system_u:object_r:cluster_var_log_t:s0 +/var/log/rhdb/rhdb(/.*)? system_u:object_r:postgresql_log_t:s0 +/var/named/dynamic(/.*)? system_u:object_r:named_cache_t:s0 +/var/qmail/control(/.*)? system_u:object_r:qmail_etc_t:s0 +/var/run/PolicyKit(/.*)? system_u:object_r:policykit_var_run_t:s0 +/var/run/firewalld(/.*)? system_u:object_r:firewalld_var_run_t:s0 +/var/run/heartbeat(/.*)? system_u:object_r:cluster_var_run_t:s0 +/var/run/initramfs(/.*)? <> +/var/run/memcached(/.*)? system_u:object_r:memcached_var_run_t:s0 +/var/run/opendmarc(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/run/openshift(/.*)? system_u:object_r:openshift_var_run_t:s0 +/var/run/pam_mount(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/run/passenger(/.*)? system_u:object_r:passenger_var_run_t:s0 +/var/run/ptal-mlcd(/.*)? system_u:object_r:ptal_var_run_t:s0 +/var/run/rpc\.statd(/.*)? system_u:object_r:rpcd_var_run_t:s0 +/var/run/saslauthd(/.*)? system_u:object_r:saslauthd_var_run_t:s0 +/var/run/smokeping(/.*)? system_u:object_r:smokeping_var_run_t:s0 +/var/run/syslog-ng(/.*)? system_u:object_r:syslogd_var_run_t:s0 +/var/run/xenstored(/.*)? system_u:object_r:xenstored_var_run_t:s0 +/var/spool/amavisd(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/spool/anacron(/.*)? system_u:object_r:system_cron_spool_t:s0 +/var/spool/courier(/.*)? system_u:object_r:courier_spool_t:s0 +/var/spool/dovecot(/.*)? system_u:object_r:dovecot_spool_t:s0 +/var/spool/prelude(/.*)? system_u:object_r:prelude_spool_t:s0 +/var/spool/pyicq-t(/.*)? system_u:object_r:pyicqt_var_spool_t:s0 +/var/spool/rsyslog(/.*)? system_u:object_r:var_log_t:s0 +/var/spool/up2date(/.*)? system_u:object_r:rpm_var_cache_t:s0 +/var/www/calamaris(/.*)? system_u:object_r:calamaris_www_t:s0 +/var/www/svn/hooks(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/etc/named\.rfc1912.zones -- system_u:object_r:named_conf_t:s0 +/usr/lib/acroread/.+\.api -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/bluetooth(/.*)? -- system_u:object_r:bin_t:s0 +/usr/lib/debug/bin(/.*)? -- system_u:object_r:bin_t:s0 +/var/cache/tomcat6?(/.*)? system_u:object_r:tomcat_cache_t:s0 +/etc/resolv-secure.conf.* -- system_u:object_r:net_conf_t:s0 +/opt/google-earth/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/google-earth/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/var/run/nm-xl2tpd.conf.* -- system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/pcsd-ruby.socket -s system_u:object_r:cluster_var_run_t:s0 +/var/lib/syslog-ng.persist -- system_u:object_r:syslogd_var_lib_t:s0 +/etc/sysconfig/ip6?tables.* -- system_u:object_r:system_conf_t:s0 +/usr/sbin/reiserfs(ck|tune) -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/container[^/]*plugin -- system_u:object_r:container_runtime_exec_t:s0 +/etc/sysconfig/ip6?tables\.save -- system_u:object_r:system_conf_t:s0 +/usr/sbin/sendmail(\.sendmail)? -- system_u:object_r:sendmail_exec_t:s0 +/usr/lib/xulrunner[^/]*/updater -- system_u:object_r:bin_t:s0 +/opt/google/picasa(/.*)?/bin/wdi -- system_u:object_r:wine_exec_t:s0 +/usr/lib/acroread/(.*/)?nppdf\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/catalyst/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/acroread/(.*/)?sidecars/* -- system_u:object_r:textrel_shlib_t:s0 +/opt/google/picasa(/.*)?/bin/wine.* -- system_u:object_r:wine_exec_t:s0 +/opt/google/picasa(/.*)?/bin/msiexec -- system_u:object_r:wine_exec_t:s0 +/opt/google/picasa(/.*)?/bin/notepad -- system_u:object_r:wine_exec_t:s0 +/opt/google/picasa(/.*)?/bin/progman -- system_u:object_r:wine_exec_t:s0 +/opt/google/picasa(/.*)?/bin/regedit -- system_u:object_r:wine_exec_t:s0 +/opt/google/picasa(/.*)?/bin/regsvr32 -- system_u:object_r:wine_exec_t:s0 +/usr/lib/acroread/(.*/)?ADMPlugin\.apl -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xulrunner[^/]*/crashreporter -- system_u:object_r:bin_t:s0 +/opt/google/chrome[^/]*/chrome-sandbox -- system_u:object_r:chrome_sandbox_exec_t:s0 +/opt/google/picasa(/.*)?/Picasa3/.*exe -- system_u:object_r:wine_exec_t:s0 +/usr/lib/xulrunner[^/]*/xulrunner[^/]* -- system_u:object_r:bin_t:s0 +/var/lib/buildkit/[^/]*/snapshots(/.*)? system_u:object_r:container_file_t:s0 +/opt/google/picasa(/.*)?/bin/uninstaller -- system_u:object_r:wine_exec_t:s0 +/usr/lib/xulrunner[^/]*/plugin-container -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/lib/ruby/gems(/.*)?/helper-scripts(/.*)? system_u:object_r:bin_t:s0 +/opt/google/chrome[^/]*/nacl_helper_bootstrap -- system_u:object_r:chrome_sandbox_nacl_exec_t:s0 +/usr/lib/acroread/(.*/)?lib/[^/]*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/netscape/.+/communicator/communicator-smotif\.real -- system_u:object_r:mozilla_exec_t:s0 +/etc/dovecot\.passwd.* system_u:object_r:dovecot_passwd_t:s0 +/etc/init\.d/vboxdrv.* system_u:object_r:bin_t:s0 +/var/lib/DeviceKit-.* system_u:object_r:devicekit_var_lib_t:s0 +/var/log/turboprint.* system_u:object_r:cupsd_log_t:s0 +/var/run/certmaster.* system_u:object_r:certmaster_var_run_t:s0 +/var/run/certmonger.* system_u:object_r:certmonger_var_run_t:s0 +/var/run/irqbalance.* system_u:object_r:irqbalance_var_run_t:s0 +/var/run/keepalived.* system_u:object_r:keepalived_var_run_t:s0 +/etc/X11/wdm/Xsetup.* -- system_u:object_r:xsession_exec_t:s0 +/etc/ctdb/events\.d/.* -- system_u:object_r:ctdbd_exec_t:s0 +/etc/cups/lpoptions.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/etc/passwd\.adjunct.* -- system_u:object_r:passwd_file_t:s0 +/etc/ppp/ipv6-down\..* -- system_u:object_r:bin_t:s0 +/etc/redis-sentinel.* -- system_u:object_r:redis_conf_t:s0 +/root/\.ICEauthority.* -- system_u:object_r:iceauth_home_t:s0 +/root/\.fonts\.cache-.* -- system_u:object_r:user_fonts_cache_t:s0 +/usr/bin/abrt-dump-.* -- system_u:object_r:abrt_dump_oops_exec_t:s0 +/usr/bin/traceroute.* -- system_u:object_r:traceroute_exec_t:s0 +/usr/lib/atsar/atsa.* -- system_u:object_r:sysstat_exec_t:s0 +/usr/lib/libFLAC\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libgpac\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/sysstat/sa.* -- system_u:object_r:sysstat_exec_t:s0 +/usr/sbin/readahead.* -- system_u:object_r:readahead_exec_t:s0 +/usr/share/debconf/.+ -- system_u:object_r:bin_t:s0 +/var/log/jockey\.log.* -- system_u:object_r:jockey_var_log_t:s0 +/var/log/mimedefang.* -- system_u:object_r:spamd_log_t:s0 +/var/log/motion\.log.* -- system_u:object_r:motion_log_t:s0 +/var/log/pyzord\.log.* -- system_u:object_r:spamd_log_t:s0 +/var/log/radius\.log.* -- system_u:object_r:radiusd_log_t:s0 +/var/log/thttpd\.log.* -- system_u:object_r:httpd_log_t:s0 +/var/log/xferreport.* -- system_u:object_r:xferlog_t:s0 +/var/run/mgetty\.pid.* -- system_u:object_r:getty_var_run_t:s0 +/dev/input/keyboard.* -c system_u:object_r:event_device_t:s0 +/var/run/ibacm-unix.* -s system_u:object_r:ibacm_var_run_t:s0 +/usr/share/cluster/.*\.sh system_u:object_r:bin_t:s0 +/opt/google/chrome/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/sectool/.*\.py -- system_u:object_r:bin_t:s0 +/etc/NetworkManager(/.*)? system_u:object_r:NetworkManager_etc_t:s0 +/etc/docker/certs\.d(/.*)? system_u:object_r:cert_t:s0 +/etc/fdo/aio/stores(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/openldap/certs(/.*)? system_u:object_r:slapd_cert_t:s0 +/etc/pkcs11/modules(/.*)? system_u:object_r:pkcs11_modules_conf_t:s0 +/etc/pki/pki-tomcat(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/etc/racoon/scripts(/.*)? system_u:object_r:bin_t:s0 +/etc/shorewall-lite(/.*)? system_u:object_r:shorewall_etc_t:s0 +/opt/gutenprint/bin(/.*)? system_u:object_r:lpr_exec_t:s0 +/root/\.config/pulse(/.*)? system_u:object_r:pulseaudio_home_t:s0 +/root/\.spamassassin(/.*)? system_u:object_r:spamc_home_t:s0 +/run/docker/plugins(/.*)? system_u:object_r:container_plugin_var_run_t:s0 +/usr/lib/ccache/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/icinga/cgi(/.*)? system_u:object_r:nagios_script_exec_t:s0 +/usr/lib/nagios/cgi(/.*)? system_u:object_r:nagios_script_exec_t:s0 +/usr/lib/pnp4nagios(/.*)? system_u:object_r:nagios_var_lib_t:s0 +/usr/share/alsa/pcm(/.*)? system_u:object_r:alsa_etc_rw_t:s0 +/usr/share/bugzilla(/.*)? system_u:object_r:bugzilla_content_t:s0 +/usr/share/cracklib(/.*)? system_u:object_r:crack_db_t:s0 +/usr/share/e16/misc(/.*)? system_u:object_r:bin_t:s0 +/usr/share/ssl/misc(/.*)? system_u:object_r:bin_t:s0 +/usr/share/zoneinfo(/.*)? system_u:object_r:locale_t:s0 +/var/cache/app-info(/.*)? system_u:object_r:fwupd_cache_t:s0 +/var/cache/cracklib(/.*)? system_u:object_r:crack_db_t:s0 +/var/cache/ddclient(/.*)? system_u:object_r:ddclient_var_t:s0 +/var/cache/foomatic(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/var/cache/insights(/.*)? system_u:object_r:insights_client_cache_t:s0 +/var/cache/ipmiseld(/.*)? system_u:object_r:freeipmi_var_cache_t:s0 +/var/cache/ldconfig(/.*)? system_u:object_r:ldconfig_cache_t:s0 +/var/cache/lighttpd(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/logwatch(/.*)? system_u:object_r:logwatch_cache_t:s0 +/var/cache/man2html(/.*)? system_u:object_r:man2html_rw_content_t:s0 +/var/cache/minidlna(/.*)? system_u:object_r:minidlna_db_t:s0 +/var/cache/watchdog(/.*)? system_u:object_r:watchdog_cache_t:s0 +/var/lib/PackageKit(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/var/lib/authconfig(/.*)? system_u:object_r:authconfig_var_lib_t:s0 +/var/lib/callweaver(/.*)? system_u:object_r:callweaver_var_lib_t:s0 +/var/lib/certmaster(/.*)? system_u:object_r:certmaster_var_lib_t:s0 +/var/lib/certmonger(/.*)? system_u:object_r:certmonger_var_lib_t:s0 +/var/lib/containerd(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/containers(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/ddt-client(/.*)? system_u:object_r:ddclient_var_lib_t:s0 +/var/lib/dspam/data(/.*)? system_u:object_r:dspam_rw_content_t:s0 +/var/lib/ipa-client(/.*)? system_u:object_r:realmd_var_lib_t:s0 +/var/lib/pam_shield(/.*)? system_u:object_r:var_auth_t:s0 +/var/lib/pgsql/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/phpMyAdmin(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/pnp4nagios(/.*)? system_u:object_r:nagios_var_lib_t:s0 +/var/lib/preupgrade(/.*)? system_u:object_r:preupgrade_data_t:s0 +/var/lib/shorewall6(/.*)? system_u:object_r:shorewall_var_lib_t:s0 +/var/lib/stickshift(/.*)? system_u:object_r:openshift_var_lib_t:s0 +/var/lib/xen/images(/.*)? system_u:object_r:xen_image_t:s0 +/var/lib/zoneminder(/.*)? system_u:object_r:zoneminder_var_lib_t:s0 +/var/log/ConsoleKit(/.*)? system_u:object_r:consolekit_log_t:s0 +/var/log/callweaver(/.*)? system_u:object_r:callweaver_log_t:s0 +/var/log/certmaster(/.*)? system_u:object_r:certmaster_var_log_t:s0 +/var/log/conman\.old(/.*)? system_u:object_r:conman_log_t:s0 +/var/log/containers(/.*)? system_u:object_r:container_log_t:s0 +/var/log/freeradius(/.*)? system_u:object_r:radiusd_log_t:s0 +/var/log/pnp4nagios(/.*)? system_u:object_r:nagios_log_t:s0 +/var/log/postgresql(/.*)? system_u:object_r:postgresql_log_t:s0 +/var/log/preupgrade(/.*)? system_u:object_r:preupgrade_data_t:s0 +/var/log/rhev-agent(/.*)? system_u:object_r:rhev_agentd_log_t:s0 +/var/log/squidGuard(/.*)? system_u:object_r:squid_log_t:s0 +/var/log/zoneminder(/.*)? system_u:object_r:zoneminder_log_t:s0 +/var/run/ConsoleKit(/.*)? system_u:object_r:consolekit_var_run_t:s0 +/var/run/PackageKit(/.*)? system_u:object_r:rpm_var_run_t:s0 +/var/run/callweaver(/.*)? system_u:object_r:callweaver_var_run_t:s0 +/var/run/cloud-init(/.*)? system_u:object_r:net_conf_t:s0 +/var/run/cryptsetup(/.*)? system_u:object_r:lvm_var_run_t:s0 +/var/run/multipathd(/.*)? system_u:object_r:lvm_var_run_t:s0 +/var/run/opendnssec(/.*)? system_u:object_r:opendnssec_var_run_t:s0 +/var/run/pki/tomcat(/.*)? system_u:object_r:pki_tomcat_var_run_t:s0 +/var/run/postgresql(/.*)? system_u:object_r:postgresql_var_run_t:s0 +/var/run/samba/nmbd(/.*)? system_u:object_r:nmbd_var_run_t:s0 +/var/run/stickshift(/.*)? system_u:object_r:openshift_var_run_t:s0 +/var/run/strongswan(/.*)? system_u:object_r:ipsec_var_run_t:s0 +/var/run/timemaster(/.*)? system_u:object_r:timemaster_var_run_t:s0 +/var/spool/asterisk(/.*)? system_u:object_r:asterisk_spool_t:s0 +/var/spool/cups-pdf(/.*)? system_u:object_r:print_spool_t:s0 +/var/spool/opendkim(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/spool/plymouth(/.*)? system_u:object_r:plymouthd_spool_t:s0 +/var/srv/containers(/.*)? system_u:object_r:container_file_t:s0 +/var/www/html/munin(/.*)? system_u:object_r:munin_content_t:s0 +/var/www/moodledata(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/google/picasa/.*\.dll -- system_u:object_r:textrel_shlib_t:s0 +/opt/google/picasa/.*\.yti -- system_u:object_r:textrel_shlib_t:s0 +/usr/bin/fusermount[0-9]? -- system_u:object_r:fusermount_exec_t:s0 +/usr/lib/debug/sbin(/.*)? -- system_u:object_r:bin_t:s0 +/usr/sbin/cracklib-[a-z]* -- system_u:object_r:crack_exec_t:s0 +/etc/ostree/remotes.d(/.*)? system_u:object_r:system_conf_t:s0 +/var/log/cloud-init.*\.log.* -- system_u:object_r:cloud_log_t:s0 +/usr/lib/libcuda\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libx264\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libzvbi\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/pcp/pmdas/.*/Remove -- system_u:object_r:pcp_plugin_exec_t:s0 +/var/log/apache-ssl(2)?(/.*)? system_u:object_r:httpd_log_t:s0 +/var/lib/pcp/pmdas/.*/Install -- system_u:object_r:pcp_plugin_exec_t:s0 +/var/lib/pcp/pmdas/.*/Upgrade -- system_u:object_r:pcp_plugin_exec_t:s0 +/usr/lib/ati-fglrx/.+\.so(\..*)? -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/openshift/.*/\.tmp(/.*)? system_u:object_r:openshift_tmp_t:s0 +/var/lib/openshift/.*/data(/.*)? system_u:object_r:openshift_rw_file_t:s0 +/usr/lib/gstreamer-.*/[^/]*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ICAClient/.*\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ruby/gems/.*/agents(/.*)? system_u:object_r:bin_t:s0 +/usr/local/Brother/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/usr/local/Printer/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/var/lib/openshift/.limits.d(/.*)? system_u:object_r:etc_t:s0 +/var/lib/openshift/[^/]+/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/openshift/.*/\.sandbox(/.*)? system_u:object_r:openshift_tmp_t:s0 +/usr/lib/vmware/lib(/.*)?/HConfig\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/codecs/drv[1-9c]\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/openshift/.openshift-proxy.d(/.*)? system_u:object_r:etc_t:s0 +/var/lib/openshift/.stickshift-proxy.d(/.*)? system_u:object_r:etc_t:s0 +/usr/lib/vmware/lib(/.*)?/libgdk-x11-.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/vmware/lib(/.*)?/libvmware-gksu.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/sbin/shorewall6? -- system_u:object_r:shorewall_exec_t:s0 +/etc/postfix/aliases.* system_u:object_r:etc_aliases_t:s0 +/sys/kernel/tracing/.* <> +/var/log/dovecot\.log.* system_u:object_r:dovecot_var_log_t:s0 +/var/log/krb5kdc\.log.* system_u:object_r:krb5kdc_log_t:s0 +/var/log/lost\+found/.* <> +/var/log/pyicq-t\.log.* system_u:object_r:pyicqt_log_t:s0 +/var/log/sanlock\.log.* system_u:object_r:sanlock_log_t:s0 +/var/run/nm-dhclient.* system_u:object_r:NetworkManager_var_run_t:s0 +/var/tmp/lost\+found/.* <> +/etc/cups/cupsd\.conf.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/usr/lib/apache-ssl/.+ -- system_u:object_r:httpd_exec_t:s0 +/usr/lib/apt/methods.+ -- system_u:object_r:bin_t:s0 +/usr/lib/libmpeg2\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/docker/.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/libexec/polkitd.* -- system_u:object_r:policykit_exec_t:s0 +/usr/sbin/traceroute.* -- system_u:object_r:traceroute_exec_t:s0 +/usr/share/mc/extfs/.* -- system_u:object_r:bin_t:s0 +/var/lib/cups/certs/.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/var/log/abrt-logger.* -- system_u:object_r:abrt_var_log_t:s0 +/var/log/amavisd\.log.* -- system_u:object_r:antivirus_log_t:s0 +/var/log/cgiwrap\.log.* -- system_u:object_r:httpd_log_t:s0 +/var/log/clumond\.log.* -- system_u:object_r:ricci_modcluster_var_log_t:s0 +/var/log/epow_status.* -- system_u:object_r:rtas_errd_log_t:s0 +/var/log/evtchnd\.log.* -- system_u:object_r:evtchnd_var_log_t:s0 +/var/log/prelink\.log.* -- system_u:object_r:prelink_log_t:s0 +/var/log/qemu-ga\.log.* -- system_u:object_r:virt_qemu_ga_log_t:s0 +/var/log/sectool\.log.* -- system_u:object_r:sectool_var_log_t:s0 +/var/log/sendmail\.st.* -- system_u:object_r:sendmail_log_t:s0 +/var/log/snapper\.log.* -- system_u:object_r:snapperd_log_t:s0 +/lib/udev/devices/lp.* -c system_u:object_r:printer_device_t:s0 +/etc/rdma/ibacm_addr.cfg -- system_u:object_r:ibacm_conf_t:s0 +/usr/sbin/apache-ssl(2)? -- system_u:object_r:httpd_exec_t:s0 +/usr/bin/dbus-daemon(-1)? -- system_u:object_r:dbusd_exec_t:s0 +/usr/lib/valgrind/vg.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/virtualbox/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/news/rc.news -- system_u:object_r:innd_exec_t:s0 +/emul/ia32-linux/bin(/.*)? system_u:object_r:bin_t:s0 +/emul/ia32-linux/lib(/.*)? system_u:object_r:lib_t:s0 +/etc/X11/xorg\.conf\.d(/.*)? system_u:object_r:xserver_etc_t:s0 +/etc/cups/interfaces(/.*)? system_u:object_r:cupsd_interface_t:s0 +/etc/dhcp/dhclient\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/fdo/aio/configs(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/mcelog/triggers(/.*)? system_u:object_r:bin_t:s0 +/etc/openvpn/scripts(/.*)? system_u:object_r:openvpn_unconfined_script_exec_t:s0 +/etc/sysconfig/pgsql(/.*)? system_u:object_r:postgresql_etc_t:s0 +/opt/NX/home/nx/\.ssh(/.*)? system_u:object_r:nx_server_home_ssh_t:s0 +/opt/gutenprint/ppds(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/opt/gutenprint/sbin(/.*)? system_u:object_r:lpr_exec_t:s0 +/opt/local/share/man(/.*)? system_u:object_r:mandb_cache_t:s0 +/root/\.config/Yubico(/.*)? system_u:object_r:auth_home_t:s0 +/run/kata-containers(/.*)? system_u:object_r:container_kvm_var_run_t:s0 +/srv/gallery2/smarty(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/srv/loopback-device(/.*)? system_u:object_r:swift_data_t:s0 +/usr/NX/home/nx/\.ssh(/.*)? system_u:object_r:nx_server_home_ssh_t:s0 +/usr/lib/mailman/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/ostree-boot(/.*)? system_u:object_r:usr_t:s0 +/usr/lib/portage/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/libexec/qemu-ga(/.*)? system_u:object_r:virt_qemu_ga_exec_t:s0 +/usr/libexec/rsyslog(/.*)? system_u:object_r:syslogd_unconfined_script_exec_t:s0 +/usr/share/X11/fonts(/.*)? system_u:object_r:fonts_t:s0 +/usr/share/ntop/html(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/share/ssl/certs(/.*)? system_u:object_r:cert_t:s0 +/var/cache/mediawiki(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/mod_proxy(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/podsleuth(/.*)? system_u:object_r:podsleuth_cache_t:s0 +/var/lib/amanda/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/boinc/slots(/.*)? system_u:object_r:boinc_project_var_lib_t:s0 +/var/lib/dkim-milter(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/lib/docker/init(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/ldap/replog(/.*)? system_u:object_r:slapd_replog_t:s0 +/var/lib/letsencrypt(/.*)? system_u:object_r:cert_t:s0 +/var/lib/openvswitch(/.*)? system_u:object_r:openvswitch_var_lib_t:s0 +/var/lib/php/session(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/lib/prelude-lml(/.*)? system_u:object_r:prelude_var_lib_t:s0 +/var/lib/samba/certs(/.*)? system_u:object_r:samba_cert_t:s0 +/var/lib/sss/pubconf(/.*)? system_u:object_r:sssd_public_t:s0 +/var/lib/stap-server(/.*)? system_u:object_r:stapserver_var_lib_t:s0 +/var/log/openvswitch(/.*)? system_u:object_r:openvswitch_log_t:s0 +/var/log/stap-server(/.*)? system_u:object_r:stapserver_log_t:s0 +/var/qmail/supervise(/.*)? system_u:object_r:svc_svc_t:s0 +/var/run/chrony-dhcp(/.*)? system_u:object_r:chronyd_var_run_t:s0 +/var/run/dkim-milter(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/run/libvirt/lxc(/.*)? system_u:object_r:virt_lxc_var_run_t:s0 +/var/run/openvswitch(/.*)? system_u:object_r:openvswitch_var_run_t:s0 +/var/run/portreserve(/.*)? system_u:object_r:portreserve_var_run_t:s0 +/var/run/ptal-printd(/.*)? system_u:object_r:ptal_var_run_t:s0 +/var/run/stap-server(/.*)? system_u:object_r:stapserver_var_run_t:s0 +/var/run/tog-pegasus(/.*)? system_u:object_r:pegasus_var_run_t:s0 +/var/run/user/apache(/.*)? system_u:object_r:httpd_tmp_t:s0 +/var/spool/mqueue\.in(/.*)? system_u:object_r:mqueue_spool_t:s0 +/var/spool/opendmarc(/.*)? system_u:object_r:dkim_milter_data_t:s0 +/var/subversion/repo(/.*)? system_u:object_r:svnserve_content_t:s0 +/var/www/moodle/data(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/usr/share/bugzilla/.*\.cgi -- system_u:object_r:bugzilla_script_exec_t:s0 +/dev/infiniband/issm[0-9]+ -c system_u:object_r:infiniband_mgmt_device_t:s0 +/dev/infiniband/umad[0-9]+ -c system_u:object_r:infiniband_mgmt_device_t:s0 +/dev/infiniband/issm[0-9]+ -b system_u:object_r:infiniband_mgmt_device_t:s0 +/dev/infiniband/umad[0-9]+ -b system_u:object_r:infiniband_mgmt_device_t:s0 +/etc/rc\.d/init\.d/ip6?tables -- system_u:object_r:iptables_initrc_exec_t:s0 +/opt/nfast/sbin/init.d-ncipher system_u:object_r:initrc_exec_t:s0 +/usr/lib/libglide3-v[0-9]*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/erlang/erts.*/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/share/mediawiki[0-9]?(/.*)? system_u:object_r:mediawiki_content_t:s0 +/var/lib/stickshift/.*/\.tmp(/.*)? system_u:object_r:openshift_tmp_t:s0 +/var/lib/stickshift/.*/data(/.*)? system_u:object_r:openshift_rw_file_t:s0 +/usr/sbin/rhn_check-[0-9]+\.[0-9]+ -- system_u:object_r:rpm_exec_t:s0 +/var/lib/stickshift/.limits.d(/.*)? system_u:object_r:etc_t:s0 +/var/www/stickshift/[^/]*/log(/.*)? system_u:object_r:httpd_log_t:s0 +/emul/ia32-linux/usr(/.*)?/Bin(/.*)? system_u:object_r:bin_t:s0 +/emul/ia32-linux/usr(/.*)?/bin(/.*)? system_u:object_r:bin_t:s0 +/emul/ia32-linux/usr(/.*)?/lib(/.*)? system_u:object_r:lib_t:s0 +/usr/lib/libreoffice(/.*)?/bin(/.*)? system_u:object_r:bin_t:s0 +/var/lib/stickshift/[^/]+/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/emul/ia32-linux/usr(/.*)?/sbin(/.*)? system_u:object_r:bin_t:s0 +/var/lib/stickshift/.*/\.sandbox(/.*)? system_u:object_r:openshift_tmp_t:s0 +/emul/ia32-linux/usr(/.*)?/java/.*\.jar -- system_u:object_r:lib_t:s0 +/emul/ia32-linux/usr(/.*)?/java/.*\.jsa -- system_u:object_r:lib_t:s0 +/var/lib/openshift/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/var/lib/containerd/[^/]*/sandboxes(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containerd/[^/]*/snapshots(/.*)? system_u:object_r:container_file_t:s0 +/var/lib/stickshift/.stickshift-proxy.d(/.*)? system_u:object_r:etc_t:s0 +/usr/lib/thunderbird.*/mozilla-xremote-client -- system_u:object_r:bin_t:s0 +/emul/ia32-linux/usr(/.*)?/java/.+\.so(\.[^/]*)* -- system_u:object_r:lib_t:s0 +/emul/ia32-linux/lib(/.*)?/ld-[^/]*\.so(\.[^/]*)* -- system_u:object_r:ld_so_t:s0 +/emul/ia32-linux/usr(/.*)?/lib(/.*)?/ld-[^/]*\.so(\.[^/]*)* system_u:object_r:ld_so_t:s0 +/etc/X11/wdm/Xstartup.* -- system_u:object_r:xsession_exec_t:s0 +/etc/ntp/step-tickers.* -- system_u:object_r:ntp_conf_t:s0 +/root/\.wayland-errors.* -- system_u:object_r:xdm_home_t:s0 +/usr/bin/nova-console.* -- system_u:object_r:nova_exec_t:s0 +/usr/bin/qemu-system-.* -- system_u:object_r:qemu_exec_t:s0 +/usr/lib/cyrus-imapd/.* -- system_u:object_r:bin_t:s0 +/usr/lib/libGLcore\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libHermes\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libdvdcss\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libglide3\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/postfix/.* -- system_u:object_r:postfix_exec_t:s0 +/usr/share/printconf/.* -- system_u:object_r:printconf_t:s0 +/var/lib/misc/prelink.* -- system_u:object_r:prelink_var_lib_t:s0 +/var/lib/pqsql/\.xauth.* -- system_u:object_r:xauth_home_t:s0 +/var/log/boincerr\.log.* -- system_u:object_r:boinc_log_t:s0 +/var/log/cfingerd\.log.* -- system_u:object_r:fingerd_log_t:s0 +/var/log/fail2ban\.log.* -- system_u:object_r:fail2ban_log_t:s0 +/var/log/iscsiuio\.log.* -- system_u:object_r:iscsi_log_t:s0 +/var/log/minidlna\.log.* -- system_u:object_r:minidlna_log_t:s0 +/var/log/postgres\.log.* -- system_u:object_r:postgresql_log_t:s0 +/var/log/procmail\.log.* -- system_u:object_r:procmail_log_t:s0 +/var/run/haproxy\.stat.* -- system_u:object_r:haproxy_var_run_t:s0 +/dev/biometric/sensor.* -c system_u:object_r:event_device_t:s0 +/var/run/\.iroha_unix/.* -s system_u:object_r:canna_var_run_t:s0 +/var/run/haproxy\.sock.* -s system_u:object_r:haproxy_var_run_t:s0 +/usr/sbin/lightparser.pl -- system_u:object_r:squid_cron_exec_t:s0 +/etc/insights-client/[^/]+ -- system_u:object_r:insights_client_etc_t:s0 +/etc/libvirt/virtlogd.conf -- system_u:object_r:virtlogd_etc_t:s0 +/emul/ia32-linux/sbin(/.*)? system_u:object_r:bin_t:s0 +/etc/amanda/DailySet1(/.*)? system_u:object_r:amanda_data_t:s0 +/etc/ipsec\.d/examples(/.*)? system_u:object_r:etc_t:s0 +/etc/openldap/slapd\.d(/.*)? system_u:object_r:slapd_db_t:s0 +/etc/sysconfig/pki/ra(/.*)? system_u:object_r:pki_ra_etc_rw_t:s0 +/usr/lib/mailman/mail(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/sysimage/rpm(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/usr/lib/systemd/user(/.*)? system_u:object_r:systemd_unit_file_t:s0 +/usr/lib/udev/devices(/.*)? system_u:object_r:device_t:s0 +/usr/share/X11/locale(/.*)? system_u:object_r:locale_t:s0 +/usr/share/createrepo(/.*)? system_u:object_r:bin_t:s0 +/usr/share/nginx/html(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/var/axfrdns/log/main(/.*)? system_u:object_r:var_log_t:s0 +/var/cache/PackageKit(/.*)? system_u:object_r:rpm_var_cache_t:s0 +/var/cache/cloud-what(/.*)? system_u:object_r:cloud_what_var_cache_t:s0 +/var/cache/containers(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/cache/fontconfig(/.*)? system_u:object_r:fonts_cache_t:s0 +/var/cache/krb5rcache(/.*)? system_u:object_r:krb5_host_rcache_t:s0 +/var/cache/mod_gnutls(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/cache/multipathd(/.*)? system_u:object_r:lvm_metadata_t:s0 +/var/cfengine/outputs(/.*)? system_u:object_r:cfengine_log_t:s0 +/var/kerberos/krb5kdc(/.*)? system_u:object_r:krb5kdc_conf_t:s0 +/var/lib/alternatives(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/var/lib/boinc-client(/.*)? system_u:object_r:boinc_var_lib_t:s0 +/var/lib/condor/spool(/.*)? system_u:object_r:condor_var_lib_t:s0 +/var/lib/courier-imap(/.*)? system_u:object_r:courier_var_lib_t:s0 +/var/lib/graphite-web(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/libvirt/boot(/.*)? system_u:object_r:virt_content_t:s0 +/var/lib/libvirt/isos(/.*)? system_u:object_r:virt_content_t:s0 +/var/lib/libvirt/qemu(/.*)? system_u:object_r:qemu_var_run_t:s0 +/var/lib/lightdm-data(/.*)? system_u:object_r:xdm_var_lib_t:s0 +/var/lib/mod_security(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/opencryptoki(/.*)? system_u:object_r:pkcs_slotd_var_lib_t:s0 +/var/lib/pkcs11proxyd(/.*)? system_u:object_r:pkcs11proxyd_var_lib_t:s0 +/var/lib/pki-ca/alias(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/var/lib/spamassassin(/.*)? system_u:object_r:spamd_var_lib_t:s0 +/var/lib/tftpboot/etc(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/tftpboot/ppc(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/log/dlm_controld(/.*)? system_u:object_r:dlm_controld_var_log_t:s0 +/var/log/graphite-web(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/opencryptoki(/.*)? system_u:object_r:pkcs_slotd_log_t:s0 +/var/named/chroot/etc(/.*)? system_u:object_r:etc_t:s0 +/var/named/chroot/lib(/.*)? system_u:object_r:lib_t:s0 +/var/run/avahi-daemon(/.*)? system_u:object_r:avahi_var_run_t:s0 +/var/run/dlm_controld(/.*)? system_u:object_r:dlm_controld_var_run_t:s0 +/var/run/libvirt/qemu(/.*)? system_u:object_r:qemu_var_run_t:s0 +/var/run/opencryptoki(/.*)? system_u:object_r:pkcs_slotd_var_run_t:s0 +/var/run/pcscd\.events(/.*)? system_u:object_r:pcscd_var_run_t:s0 +/var/run/sanlk-resetd(/.*)? system_u:object_r:sanlock_var_run_t:s0 +/var/run/spamassassin(/.*)? system_u:object_r:spamd_var_run_t:s0 +/var/spool/MIMEDefang(/.*)? system_u:object_r:spamd_var_run_t:s0 +/var/spool/authdaemon(/.*)? system_u:object_r:courier_spool_t:s0 +/var/spool/bacula/log(/.*)? system_u:object_r:var_log_t:s0 +/var/spool/callweaver(/.*)? system_u:object_r:callweaver_spool_t:s0 +/var/spool/gridengine(/.*)? system_u:object_r:sge_spool_t:s0 +/var/spool/rhsm/debug(/.*)? system_u:object_r:abrt_var_cache_t:s0 +/var/spool/turboprint(/.*)? system_u:object_r:lpd_var_run_t:s0 +/var/spool/uucppublic(/.*)? system_u:object_r:uucpd_spool_t:s0 +/var/tinydns/log/main(/.*)? system_u:object_r:var_log_t:s0 +/var/www/miq/vmdb/log(/.*)? system_u:object_r:httpd_log_t:s0 +/usr/share/wordpress/.*\.php -- system_u:object_r:httpd_sys_script_exec_t:s0 +/var/qmail/supervise/.*/run -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/emc/scaleio/(.*)\.ko -- system_u:object_r:modules_object_t:s0 +/usr/bin/mozilla-bin-[0-9].* -- system_u:object_r:mozilla_exec_t:s0 +/usr/lib/googleearth/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/rpmrebuilddb.*(/.*)? system_u:object_r:rpm_var_lib_t:s0 +/usr/libexec/postfix/(n)?qmgr -- system_u:object_r:postfix_qmgr_exec_t:s0 +/usr/lib/libmpg123\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libnvidia\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/qmail/supervise/.*/log/run -- system_u:object_r:svc_run_exec_t:s0 +/usr/share/shorewall6?/wait4ifup -- system_u:object_r:bin_t:s0 +/usr/share/shorewall6?/configpath -- system_u:object_r:bin_t:s0 +/usr/lib/erlang/erts-[^/]*/bin/epmd -- system_u:object_r:lib_t:s0 +/opt/brother/Printers(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/var/lib/stickshift/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/etc/krb5kdc/principal.* system_u:object_r:krb5kdc_principal_t:s0 +/var/www/cgi-bin/munin.* system_u:object_r:munin_script_exec_t:s0 +/etc/cups/classes\.conf.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/etc/rc\.d/init\.d/avahi.* -- system_u:object_r:avahi_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ciped.* -- system_u:object_r:ciped_initrc_exec_t:s0 +/etc/rc\.d/init\.d/clamd.* -- system_u:object_r:antivirus_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cyrus.* -- system_u:object_r:cyrus_initrc_exec_t:s0 +/etc/sysconfig/ipvsadm.* -- system_u:object_r:system_conf_t:s0 +/opt/cxoffice/bin/wine.* -- system_u:object_r:wine_exec_t:s0 +/root/\.xsession-errors.* -- system_u:object_r:xdm_home_t:s0 +/usr/NX/lib/libjpeg\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/cracklib_dict.* -- system_u:object_r:crack_db_t:s0 +/usr/lib/gnupg/gpgkeys.* -- system_u:object_r:gpg_helper_exec_t:s0 +/usr/lib/kde4/libexec/.* -- system_u:object_r:bin_t:s0 +/usr/lib/libGLdispatch.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libmp3lame\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libswscale\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nmm/liba52\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nx/libjpeg\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/dcc/stop-.* -- system_u:object_r:initrc_exec_t:s0 +/usr/sap/hostctrl/exe/.+ -- system_u:object_r:sap_exec_t:s0 +/usr/sbin/abrt-harvest.* -- system_u:object_r:abrt_exec_t:s0 +/usr/sbin/vmware-guest.* -- system_u:object_r:vmware_host_exec_t:s0 +/var/log/pacemaker\.log.* -- system_u:object_r:cluster_var_log_t:s0 +/var/log/sa-update\.log.* -- system_u:object_r:spamd_log_t:s0 +/var/run/agetty\.reload.* -- system_u:object_r:getty_var_run_t:s0 +/var/run/log/bootchart.* -- system_u:object_r:systemd_bootchart_var_run_t:s0 +/lib/udev/devices/net/.* -c system_u:object_r:tun_tap_device_t:s0 +/lib/udev/devices/loop.* -b system_u:object_r:fixed_disk_device_t:s0 +/etc/rc\.d/init\.d/dhcpd(6)? -- system_u:object_r:dhcpd_initrc_exec_t:s0 +/usr/share/virtualbox/.*\.sh system_u:object_r:bin_t:s0 +/usr/lib/dri/fglrx_dri.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xine/plugins/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/PackageKit/events(/.*)? system_u:object_r:bin_t:s0 +/etc/dirsrv/admin-serv(/.*)? system_u:object_r:dirsrvadmin_config_t:s0 +/etc/pki/pki-tomcat/ca(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/etc/share/selinux/mls(/.*)? system_u:object_r:semanage_store_t:s0 +/etc/sysconfig/pki/tps(/.*)? system_u:object_r:pki_tps_etc_rw_t:s0 +/lib/security/pam_krb5(/.*)? system_u:object_r:bin_t:s0 +/opt/google/talkplugin(/.*)? system_u:object_r:bin_t:s0 +/root/\.gnome2/keyrings(/.*)? system_u:object_r:gkeyringd_gnome_home_t:s0 +/root/\.local/share/icc(/.*)? system_u:object_r:icc_data_home_t:s0 +/usr/local/nagios/sbin(/.*)? system_u:object_r:httpd_sys_script_exec_t:s0 +/usr/share/conman/exec(/.*)? system_u:object_r:conman_unconfined_script_exec_t:s0 +/usr/share/hal/scripts(/.*)? system_u:object_r:bin_t:s0 +/usr/share/jonas/pgsql(/.*)? system_u:object_r:postgresql_db_t:s0 +/usr/share/ssl/private(/.*)? system_u:object_r:cert_t:s0 +/usr/share/wicd/daemon(/.*)? system_u:object_r:bin_t:s0 +/var/cache/php-mmcache(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/dnscache/log/main(/.*)? system_u:object_r:var_log_t:s0 +/var/lib/avahi-autoipd(/.*)? system_u:object_r:avahi_var_lib_t:s0 +/var/lib/docker-latest(/.*)? system_u:object_r:container_var_lib_t:s0 +/var/lib/gitolite/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/libvirt/lockd(/.*)? system_u:object_r:virt_var_lockd_t:s0 +/var/lib/likewise-open(/.*)? system_u:object_r:likewise_var_lib_t:s0 +/var/lib/mirrormanager(/.*)? system_u:object_r:mirrormanager_var_lib_t:s0 +/var/lib/mpd/playlists(/.*)? system_u:object_r:mpd_data_t:s0 +/var/lib/nocpulse/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/openldap-data(/.*)? system_u:object_r:slapd_db_t:s0 +/var/lib/openldap-ldbm(/.*)? system_u:object_r:slapd_db_t:s0 +/var/lib/pgsql/logfile(/.*)? system_u:object_r:postgresql_log_t:s0 +/var/lib/php/wsdlcache(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/lib/pki-kra/alias(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/var/lib/pki-tks/alias(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/var/lib/roundcubemail(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/lib/samba/scripts(/.*)? system_u:object_r:samba_unconfined_script_exec_t:s0 +/var/lib/smartmontools(/.*)? system_u:object_r:fsdaemon_var_lib_t:s0 +/var/lib/tftpboot/boot(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/tftpboot/grub(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/zarafa-webapp(/.*)? system_u:object_r:zarafa_var_lib_t:s0 +/var/lock/opencryptoki(/.*)? system_u:object_r:pkcs_slotd_lock_t:s0 +/var/log/mirrormanager(/.*)? system_u:object_r:mirrormanager_log_t:s0 +/var/log/roundcubemail(/.*)? system_u:object_r:httpd_log_t:s0 +/var/named/chroot/proc(/.*)? <> +/var/run/chrony-helper(/.*)? system_u:object_r:chronyd_var_run_t:s0 +/var/run/ipa_memcached(/.*)? system_u:object_r:memcached_var_run_t:s0 +/var/run/mirrormanager(/.*)? system_u:object_r:mirrormanager_var_run_t:s0 +/var/run/pam_timestamp(/.*)? system_u:object_r:pam_var_run_t:s0 +/var/run/systemd/netif(/.*)? system_u:object_r:systemd_networkd_var_run_t:s0 +/var/run/systemd/seats(/.*)? system_u:object_r:systemd_logind_var_run_t:s0 +/var/run/systemd/units(/.*)? system_u:object_r:systemd_unit_file_t:s0 +/var/run/systemd/users(/.*)? system_u:object_r:systemd_logind_var_run_t:s0 +/var/run/uml-utilities(/.*)? system_u:object_r:uml_switch_var_run_t:s0 +/var/spool/MailScanner(/.*)? system_u:object_r:mscan_spool_t:s0 +/var/spool/abrt-upload(/.*)? system_u:object_r:public_content_rw_t:s0 +/var/spool/postfix/etc(/.*)? system_u:object_r:etc_t:s0 +/var/spool/postfix/lib(/.*)? system_u:object_r:lib_t:s0 +/var/spool/postfix/usr(/.*)? system_u:object_r:lib_t:s0 +/usr/lib/debug/usr/bin(/.*)? -- system_u:object_r:bin_t:s0 +/usr/lib/google-earth/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/helix/codecs/[^/]*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xorg/libGL\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/local/lib/docker/[^/]*plugin -- system_u:object_r:container_runtime_exec_t:s0 +/usr/share/Pegasus/mof(/.*)?/.*\.mof system_u:object_r:pegasus_mof_t:s0 +/usr/lib/vmware-tools/(s)?bin32(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/vmware-tools/(s)?bin64(/.*)? system_u:object_r:bin_t:s0 +/usr/share/doc/mailman.*/mm-handler.* -- system_u:object_r:mailman_mail_exec_t:s0 +/var/mailman/pythonlib(/.*)?/.+\.so(\..*)? -- system_u:object_r:lib_t:s0 +/usr/lib/systemd/user/.*gnome.*\.(service|target) -- system_u:object_r:xdm_unit_file_t:s0 +/root/\.cache/gstreamer-.* system_u:object_r:gstreamer_home_t:s0 +/var/spool/postfix/pid/.* system_u:object_r:postfix_var_run_t:s0 +/var/www/html/cgi/munin.* system_u:object_r:munin_script_exec_t:s0 +/etc/cups/printers\.conf.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/etc/cups/subscriptions.* -- system_u:object_r:cupsd_rw_etc_t:s0 +/etc/rc\.d/init\.d/bacula.* -- system_u:object_r:bacula_initrc_exec_t:s0 +/etc/rc\.d/init\.d/kismet.* -- system_u:object_r:kismet_initrc_exec_t:s0 +/etc/sysconfig/ebtables.* -- system_u:object_r:system_conf_t:s0 +/opt/lampp/lib/libct\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/NX/lib/libXcomp\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/X11R6/lib/X11/xkb/.* -- system_u:object_r:xkb_var_lib_t:s0 +/usr/X11R6/lib/libGL\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/bin/razor-lightdm-.* -- system_u:object_r:xdm_exec_t:s0 +/usr/lib/libpostproc\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libxvidcore\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nx/libXcomp\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/resolv.* -- system_u:object_r:lib_t:s0 +/usr/libexec/dcc/start-.* -- system_u:object_r:initrc_exec_t:s0 +/usr/sap/H4C/HDB96/exe/.+ -- system_u:object_r:sap_exec_t:s0 +/usr/share/munin/munin-.* -- system_u:object_r:munin_exec_t:s0 +/var/log/apcupsd\.events.* -- system_u:object_r:apcupsd_log_t:s0 +/var/log/apcupsd\.status.* -- system_u:object_r:apcupsd_log_t:s0 +/var/log/muddleftpd\.log.* -- system_u:object_r:xferlog_t:s0 +/var/log/php_errors\.log.* -- system_u:object_r:httpd_log_t:s0 +/var/log/pm-suspend\.log.* -- system_u:object_r:devicekit_var_log_t:s0 +/var/log/wpa_supplicant.* -- system_u:object_r:NetworkManager_log_t:s0 +/var/log/xend-debug\.log.* -- system_u:object_r:xend_var_log_t:s0 +/var/run/openvpn\.client.* -- system_u:object_r:openvpn_var_run_t:s0 +/usr/linuxprinter/bin/l?lpr -- system_u:object_r:lpr_exec_t:s0 +/etc/gdm/XKeepsCrashing[^/]* -- system_u:object_r:bin_t:s0 +/etc/security/namespace.init -- system_u:object_r:namespace_init_exec_t:s0 +/opt/google/talkplugin/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/fedora[^/]* -- system_u:object_r:initrc_exec_t:s0 +/dev/\.systemd/readahead(/.*)? system_u:object_r:readahead_var_run_t:s0 +/etc/prelude-correlator(/.*)? system_u:object_r:prelude_correlator_config_t:s0 +/etc/strongswan/ipsec\.d(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/root/\.cache/fontconfig(/.*)? system_u:object_r:user_fonts_cache_t:s0 +/usr/lib/cgi-bin/nagios(/.+)? system_u:object_r:nagios_script_exec_t:s0 +/usr/lib/dirsrv/cgi-bin(/.*)? system_u:object_r:dirsrvadmin_script_exec_t:s0 +/usr/lib/ipa/certmonger(/.*)? system_u:object_r:certmonger_unconfined_exec_t:s0 +/usr/lib/nagios/cgi-bin(/.*)? system_u:object_r:nagios_script_exec_t:s0 +/usr/lib/oracle/xe/apps(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/systemd/system(/.*)? system_u:object_r:systemd_unit_file_t:s0 +/usr/libexec/keepalived(/.*)? system_u:object_r:keepalived_unconfined_script_exec_t:s0 +/usr/share/Modules/init(/.*)? system_u:object_r:bin_t:s0 +/usr/share/doc/ghc/html(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/share/smolt/client(/.*)? system_u:object_r:bin_t:s0 +/var/cache/abrt-retrace(/.*)? system_u:object_r:abrt_retrace_cache_t:s0 +/var/lib/NetworkManager(/.*)? system_u:object_r:NetworkManager_var_lib_t:s0 +/var/lib/boinc/projects(/.*)? system_u:object_r:boinc_project_var_lib_t:s0 +/var/lib/condor/execute(/.*)? system_u:object_r:condor_var_lib_t:s0 +/var/lib/docker/overlay(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/gitolite3/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/var/lib/libvirt/images(/.*)? system_u:object_r:virt_image_t:s0 +/var/lib/nfs/rpc_pipefs(/.*)? <> +/var/lib/ocid/sandboxes(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/pgsql/data/log(/.*)? system_u:object_r:postgresql_log_t:s0 +/var/lib/pki-ocsp/alias(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/var/lib/pki/pki-tomcat(/.*)? system_u:object_r:pki_tomcat_var_lib_t:s0 +/var/lib/setroubleshoot(/.*)? system_u:object_r:setroubleshoot_var_lib_t:s0 +/var/lib/shorewall-lite(/.*)? system_u:object_r:shorewall_var_lib_t:s0 +/var/lib/spamass-milter(/.*)? system_u:object_r:spamass_milter_state_t:s0 +/var/lib/systemd/linger(/.*)? system_u:object_r:systemd_logind_var_lib_t:s0 +/var/lib/systemd/pstore(/.*)? system_u:object_r:systemd_pstore_var_lib_t:s0 +/var/lib/systemd/rfkill(/.*)? system_u:object_r:systemd_rfkill_var_lib_t:s0 +/var/lib/tftpboot/s390x(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/log/pki/pki-tomcat(/.*)? system_u:object_r:pki_tomcat_log_t:s0 +/var/log/setroubleshoot(/.*)? system_u:object_r:setroubleshoot_var_log_t:s0 +/var/log/shibboleth-www(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/log/spice-vdagentd(/.*)? system_u:object_r:vdagent_log_t:s0 +/var/opt/quest/vas/vasd(/.*)? system_u:object_r:var_auth_t:s0 +/var/run/NetworkManager(/.*)? system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/corosync-qnetd(/.*)? system_u:object_r:cluster_var_run_t:s0 +/var/run/libvirt/common(/.*)? system_u:object_r:virt_common_var_run_t:s0 +/var/run/openvpn-server(/.*)? system_u:object_r:openvpn_var_run_t:s0 +/var/run/samba/winbindd(/.*)? system_u:object_r:winbind_var_run_t:s0 +/var/run/setroubleshoot(/.*)? system_u:object_r:setroubleshoot_var_run_t:s0 +/var/run/spamass-milter(/.*)? system_u:object_r:spamass_milter_data_t:s0 +/var/run/spice-vdagentd(/.*)? system_u:object_r:vdagent_var_run_t:s0 +/var/run/systemd/import(/.*)? system_u:object_r:systemd_importd_var_run_t:s0 +/var/run/systemd/userdb(/.*)? system_u:object_r:systemd_userdbd_runtime_t:s0 +/var/run/wpa_supplicant(/.*)? system_u:object_r:NetworkManager_var_run_t:s0 +/var/spool/abrt-retrace(/.*)? system_u:object_r:abrt_retrace_spool_t:s0 +/var/spool/milter-regex(/.*)? system_u:object_r:regex_milter_data_t:s0 +/var/spool/spamassassin(/.*)? system_u:object_r:spamd_spool_t:s0 +/var/spool/squirrelmail(/.*)? system_u:object_r:squirrelmail_spool_t:s0 +/var/www/cgi-bin/apcgui(/.*)? system_u:object_r:apcupsd_cgi_script_exec_t:s0 +/var/www/gallery/albums(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/www/html/munin/cgi(/.*)? system_u:object_r:munin_script_exec_t:s0 +/usr/lib/debug/usr/sbin(/.*)? -- system_u:object_r:bin_t:s0 +/opt/nfast/scripts/init.d/(.*) system_u:object_r:initrc_exec_t:s0 +/var/lib/misc/PolicyKit.reload system_u:object_r:policykit_reload_t:s0 +/usr/local/Brother/fax/.*\.log.* system_u:object_r:cupsd_log_t:s0 +/usr/lib/helix/plugins/[^/]*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/apr-0/build/[^/]+\.sh -- system_u:object_r:bin_t:s0 +/usr/lib/libatiadlxx\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/nxserver/home/.ssh(/.*)? system_u:object_r:nx_server_home_ssh_t:s0 +/var/lib/misc/syslog-ng.persist-? -- system_u:object_r:syslogd_var_lib_t:s0 +/usr/lib/dracut/modules.d/.*\.service system_u:object_r:systemd_unit_file_t:s0 +/var/lib/docker-latest/.*/config\.env system_u:object_r:container_ro_file_t:s0 +/opt/VBoxGuestAdditions.*/lib/VBox.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/buildkit/runc-.*/executor(/.*?) system_u:object_r:container_ro_file_t:s0 +/sysroot/ostree/deploy/.*-atomic/deploy(/.*)? system_u:object_r:root_t:s0 +/usr/lib/emacsen-common/.* system_u:object_r:bin_t:s0 +/etc/rc\.d/init\.d/neutron.* -- system_u:object_r:neutron_initrc_exec_t:s0 +/etc/rc\.d/init\.d/quantum.* -- system_u:object_r:neutron_initrc_exec_t:s0 +/usr/lib/cups/backend/hp.* -- system_u:object_r:cupsd_exec_t:s0 +/usr/lib/nagios/plugins/.* -- system_u:object_r:nagios_unconfined_plugin_exec_t:s0 +/usr/lib/postgresql/bin/.* -- system_u:object_r:postgresql_exec_t:s0 +/usr/libexec/strongimcv/.* -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/strongswan/.* -- system_u:object_r:ipsec_exec_t:s0 +/var/lib/likewise/krb5cc.* -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lock/subsys/mailman.* -- system_u:object_r:mailman_lock_t:s0 +/var/log/cgrulesengd\.log.* -- system_u:object_r:cgred_log_t:s0 +/var/log/mcollective\.log.* -- system_u:object_r:openshift_log_t:s0 +/var/log/razor-agent\.log.* -- system_u:object_r:spamd_log_t:s0 +/var/log/xen-hotplug\.log.* -- system_u:object_r:xend_var_log_t:s0 +/var/log/zarafa/ical\.log.* -- system_u:object_r:zarafa_ical_log_t:s0 +/usr/lib/udev/devices/lp.* -c system_u:object_r:printer_device_t:s0 +/etc/dhcp/wired-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/etc/wicd/wired-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/usr/lib/cgi-bin/mailman.*/.* -- system_u:object_r:mailman_cgi_exec_t:s0 +/usr/share/ajaxterm/qweb.py.* -- system_u:object_r:bin_t:s0 +/etc/sysconfig/oracleasm(/.*)? system_u:object_r:oracleasm_conf_t:s0 +/root/\.config/fontconfig(/.*)? system_u:object_r:user_fonts_config_t:s0 +/usr/X11R6/lib/X11/fonts(/.*)? system_u:object_r:fonts_t:s0 +/usr/lib/apache2/modules(/.*)? system_u:object_r:httpd_modules_t:s0 +/usr/share/mojomojo/root(/.*)? system_u:object_r:mojomojo_content_t:s0 +/usr/share/openca/htdocs(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/usr/share/smokeping/cgi(/.*)? system_u:object_r:smokeping_cgi_script_exec_t:s0 +/var/lib/AccountsService(/.*)? system_u:object_r:accountsd_var_lib_t:s0 +/var/lib/containers/home(/.*)? system_u:object_r:openshift_var_lib_t:s0 +/var/lib/docker/overlay2(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/kata-containers(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/kubernetes/pods(/.*)? system_u:object_r:container_file_t:s0 +/var/lib/milter-greylist(/.*)? system_u:object_r:greylist_milter_data_t:s0 +/var/lib/min-cloud-agent(/.*)? system_u:object_r:cloud_var_lib_t:s0 +/var/lib/openldap-slurpd(/.*)? system_u:object_r:slapd_db_t:s0 +/var/lib/openlmi-storage(/.*)? system_u:object_r:pegasus_openlmi_storage_lib_t:s0 +/var/lib/private/systemd(/.*)? system_u:object_r:init_var_lib_t:s0 +/var/lib/shorewall6-lite(/.*)? system_u:object_r:shorewall_var_lib_t:s0 +/var/lib/subversion/repo(/.*)? system_u:object_r:svnserve_content_t:s0 +/var/lib/tftpboot/images(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/log/deltacloud-core(/.*)? system_u:object_r:deltacloudd_log_t:s0 +/var/log/insights-client(/.*)? system_u:object_r:insights_client_var_log_t:s0 +/var/run/DeviceKit-disks(/.*)? system_u:object_r:devicekit_var_run_t:s0 +/var/run/PackageKit/udev(/.*)? system_u:object_r:udev_var_run_t:s0 +/var/run/libvirt-sandbox(/.*)? system_u:object_r:virt_lxc_var_run_t:s0 +/var/run/libvirt/network(/.*)? system_u:object_r:dnsmasq_var_run_t:s0 +/var/run/milter-greylist(/.*)? system_u:object_r:greylist_milter_data_t:s0 +/var/run/openlmi-storage(/.*)? system_u:object_r:pegasus_openlmi_storage_var_run_t:s0 +/var/run/prelude-manager(/.*)? system_u:object_r:prelude_var_run_t:s0 +/var/run/systemd/inhibit(/.*)? system_u:object_r:systemd_logind_inhibit_var_run_t:s0 +/var/run/systemd/journal(/.*)? system_u:object_r:syslogd_var_run_t:s0 +/var/run/systemd/network(/.*)? system_u:object_r:net_conf_t:s0 +/var/run/systemd/resolve(/.*)? system_u:object_r:systemd_resolved_var_run_t:s0 +/var/spool/MD-Quarantine(/.*)? system_u:object_r:spamd_var_run_t:s0 +/var/spool/postfix/defer(/.*)? system_u:object_r:postfix_spool_t:s0 +/var/spool/postfix/flush(/.*)? system_u:object_r:postfix_spool_t:s0 +/var/spool/postfix/lib64(/.*)? system_u:object_r:lib_t:s0 +/var/tmp/insights-client(/.*)? system_u:object_r:insights_client_tmp_t:s0 +/usr/lib/mythtv/filters/.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/glusterd/hooks/.*/.*\.py -- system_u:object_r:bin_t:s0 +/var/lib/glusterd/hooks/.*/.*\.sh -- system_u:object_r:bin_t:s0 +/usr/lib/libtfmessbsp\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/sse2/libx264\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/*virtlogd.* system_u:object_r:virtlogd_unit_file_t:s0 +/usr/lib/systemd/system/[^/]*getty.* -- system_u:object_r:getty_unit_file_t:s0 +/usr/lib/systemd/system/.*xen.*\.service -- system_u:object_r:virtd_unit_file_t:s0 +/var/lib/openshift/gear/[^/]+/\.ssh(/.*)? system_u:object_r:ssh_home_t:s0 +/usr/lib/systemd/system/((tlp-sleep.*)|(tlp.*)) -- system_u:object_r:tlp_unit_file_t:s0 +/usr/lib/systemd/system/.*halt.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/systemd/system/.*power.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/systemd/system/.*sleep.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/systemd/system/.*reboot.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/nvidia-graphics(-[^/]*/)?libXvMCNVIDIA\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/((iscsid)|(iscsiuio))\.socket -- system_u:object_r:iscsi_unit_file_t:s0 +/usr/lib/systemd/system/.*suspend.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/systemd/system/.*shutdown.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/systemd/system/.*hibernate.*\.(service|target) -- system_u:object_r:power_unit_file_t:s0 +/usr/lib/nvidia-graphics(-[^/]*/)?libnvidia.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nvidia-graphics(-[^/]*/)?libGL(core)?\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/((iscsi)|(iscsid)|(iscsiuio))\.service -- system_u:object_r:iscsi_unit_file_t:s0 +/opt/picasa/wine/bin/wine.* -- system_u:object_r:wine_exec_t:s0 +/usr/lib/courier/authlib/.* -- system_u:object_r:courier_authdaemon_exec_t:s0 +/usr/lib/courier/courier/.* -- system_u:object_r:courier_exec_t:s0 +/usr/share/munin/plugins/.* -- system_u:object_r:unconfined_munin_plugin_exec_t:s0 +/var/lib/logrotate\.status.* -- system_u:object_r:logrotate_var_lib_t:s0 +/var/log/clamav/freshclam.* -- system_u:object_r:antivirus_log_t:s0 +/var/log/pm-powersave\.log.* -- system_u:object_r:devicekit_var_log_t:s0 +/var/log/sepostgresql\.log.* -- system_u:object_r:postgresql_log_t:s0 +/var/spool/cron/crontabs/.* -- <> +/etc/rc\.d/init\.d/dhcrelay(6)? -- system_u:object_r:dhcpd_initrc_exec_t:s0 +/usr/share/awstats/tools/.+\.pl -- system_u:object_r:awstats_exec_t:s0 +/var/run/systemd/machines.lock -- system_u:object_r:systemd_machined_var_run_t:s0 +/etc/pki/pki-tomcat/alias(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/etc/sysconfig/networking(/.*)? system_u:object_r:net_conf_t:s0 +/etc/sysconfig/pki/tomcat(/.*)? system_u:object_r:pki_tomcat_etc_rw_t:s0 +/usr/lib/cgi-bin/netsaint(/.*)? system_u:object_r:nagios_script_exec_t:s0 +/usr/lib/chromium-browser(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/fontconfig/cache(/.*)? system_u:object_r:fonts_cache_t:s0 +/usr/lib/netsaint/plugins(/.*)? system_u:object_r:bin_t:s0 +/usr/linuxprinter/filters(/.*)? system_u:object_r:bin_t:s0 +/usr/share/lightsquid/cgi(/.*)? system_u:object_r:squid_script_exec_t:s0 +/usr/share/shorewall-lite(/.*)? system_u:object_r:bin_t:s0 +/usr/share/shorewall-perl(/.*)? system_u:object_r:bin_t:s0 +/var/cache/gitweb-caching(/.*)? system_u:object_r:git_rw_content_t:s0 +/var/cache/retrace-server(/.*)? system_u:object_r:abrt_retrace_cache_t:s0 +/var/lib/PolicyKit-public(/.*)? system_u:object_r:policykit_var_lib_t:s0 +/var/lib/asterisk/agi-bin(/.*)? system_u:object_r:bin_t:s0 +/var/lib/systemd/coredump(/.*)? system_u:object_r:systemd_coredump_var_lib_t:s0 +/var/lib/systemd/timesync(/.*)? system_u:object_r:systemd_timedated_var_lib_t:s0 +/var/lib/tftpboot/aarch64(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/tftpboot/images2(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/lib/zarafa-webaccess(/.*)? system_u:object_r:zarafa_var_lib_t:s0 +/var/named/chroot/etc/pki(/.*)? system_u:object_r:cert_t:s0 +/var/named/chroot/usr/lib(/.*)? system_u:object_r:lib_t:s0 +/var/named/chroot/var/tmp(/.*)? system_u:object_r:named_cache_t:s0 +/var/run/corosync-qdevice(/.*)? system_u:object_r:cluster_var_run_t:s0 +/var/run/systemd/machines(/.*)? system_u:object_r:systemd_machined_var_run_t:s0 +/var/run/systemd/sessions(/.*)? system_u:object_r:systemd_logind_sessions_t:s0 +/var/run/systemd/shutdown(/.*)? system_u:object_r:systemd_logind_var_run_t:s0 +/var/run/systemd/timesync(/.*)? system_u:object_r:systemd_timedated_var_run_t:s0 +/var/spool/postfix/bounce(/.*)? system_u:object_r:postfix_spool_bounce_t:s0 +/var/spool/postfix/public(/.*)? system_u:object_r:postfix_public_t:s0 +/var/spool/retrace-server(/.*)? system_u:object_r:abrt_retrace_spool_t:s0 +/var/www/cgi-bin/keystone(/.*)? system_u:object_r:keystone_cgi_script_exec_t:s0 +/etc/security/namespace\.d(/.*)? -- system_u:object_r:namespace_init_exec_t:s0 +/usr/share/turboprint/lib(/.*)? -- system_u:object_r:bin_t:s0 +/var/spool/postfix/lib/ld.*\.so.* -- system_u:object_r:ld_so_t:s0 +/var/run/systemd/journal\.[^/]+(/.*)? system_u:object_r:syslogd_var_run_t:s0 +/var/run/systemd/journal\.[^/]+/syslog -s system_u:object_r:devlog_t:s0 +/var/run/systemd/journal\.[^/]+/dev-log -s system_u:object_r:devlog_t:s0 +/usr/share/selinux-policy[^/]*/html(/.*)? system_u:object_r:httpd_sys_content_t:s0 +/sys/firmware/efi/efivars/.* <> +/usr/lib/udev/devices/shm/.* <> +/usr/var/krb5kdc/principal.* system_u:object_r:krb5kdc_principal_t:s0 +/var/log/audit/lost\+found/.* <> +/var/run/dirsrv/admin-serv.* system_u:object_r:httpd_var_run_t:s0 +/etc/rc\.d/init\.d/shorewall.* -- system_u:object_r:shorewall_initrc_exec_t:s0 +/usr/lib/libfglrx_gamma\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libsipphoneapi\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/docker/docker.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/local/libexec/docker/.* -- system_u:object_r:container_runtime_exec_t:s0 +/var/lib/pqsql/\.Xauthority.* -- system_u:object_r:xauth_home_t:s0 +/var/log/zarafa/dagent\.log.* -- system_u:object_r:zarafa_deliver_log_t:s0 +/var/log/zarafa/search\.log.* -- system_u:object_r:zarafa_indexer_log_t:s0 +/var/log/zarafa/server\.log.* -- system_u:object_r:zarafa_server_log_t:s0 +/usr/lib/udev/devices/net/.* -c system_u:object_r:tun_tap_device_t:s0 +/usr/lib/udev/devices/loop.* -b system_u:object_r:fixed_disk_device_t:s0 +/etc/dhcp/manager-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/etc/wicd/manager-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/usr/lib/chromium-browser/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/pysieved/pysieved.*\.py -- system_u:object_r:inetd_child_exec_t:s0 +/usr/lib/xorg/modules/dri/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/ConsoleKit/run-seat\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/mail/dkim-milter/keys(/.*)? system_u:object_r:dkim_milter_private_key_t:s0 +/etc/security/console\.apps(/.*)? system_u:object_r:userhelper_conf_t:s0 +/root/\.local/share/systemd(/.*)? system_u:object_r:systemd_home_t:s0 +/usr/lib/courier/rootcerts(/.*)? system_u:object_r:courier_etc_t:s0 +/usr/lib/debug/usr/libexec(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/nfs-utils/scripts(/.*)? system_u:object_r:bin_t:s0 +/usr/share/awstats/wwwroot(/.*)? system_u:object_r:awstats_content_t:s0 +/usr/share/ca-certificates(/.*)? system_u:object_r:cert_t:s0 +/usr/share/shorewall-shell(/.*)? system_u:object_r:bin_t:s0 +/usr/share/shorewall6-lite(/.*)? system_u:object_r:bin_t:s0 +/usr/share/vhostmd/scripts(/.*)? system_u:object_r:bin_t:s0 +/var/cache/insights-client(/.*)? system_u:object_r:insights_client_cache_t:s0 +/var/cache/kata-containers(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/atomic(/.*)? <> +/var/lib/pgsql/data/pg_log(/.*)? system_u:object_r:postgresql_log_t:s0 +/var/lib/xfsdump/inventory(/.*)? system_u:object_r:amanda_var_lib_t:s0 +/var/log/dirsrv/admin-serv(/.*)? system_u:object_r:httpd_log_t:s0 +/var/log/dirsrv/ldap-agent.log.* system_u:object_r:dirsrv_snmp_var_log_t:s0 +/var/log/ovirt-guest-agent(/.*)? system_u:object_r:rhev_agentd_log_t:s0 +/var/log/speech-dispatcher(/.*)? system_u:object_r:speech_dispatcher_log_t:s0 +/var/opt/rh/rh-nginx18/log(/.*)? system_u:object_r:httpd_log_t:s0 +/var/run/systemd/readahead(/.*)? system_u:object_r:readahead_var_run_t:s0 +/var/run/systemd/transient(/.*)? system_u:object_r:systemd_unit_file_t:s0 +/var/spool/postfix/private(/.*)? system_u:object_r:postfix_private_t:s0 +/var/spool/postfix/spamass(/.*)? system_u:object_r:spamass_milter_data_t:s0 +/var/spool/prelude-manager(/.*)? system_u:object_r:prelude_spool_t:s0 +/usr/lib/security/pam_krb5(/.*)? -- system_u:object_r:bin_t:s0 +/etc/qemu-ga/fsfreeze-hook.d(/.*)? system_u:object_r:virt_qemu_ga_unconfined_exec_t:s0 +/usr/lib/catalyst/libGL\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/etc/opt/brother/Printers/(.*/)?inf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/etc/systemd/system/dirsrv.target.wants(/.*)? system_u:object_r:certmonger_unit_file_t:s0 +/usr/lib/nspluginwrapper/np.* system_u:object_r:bin_t:s0 +/var/named/chroot/run/named.* system_u:object_r:named_var_run_t:s0 +/etc/hotplug\.d/default/udev.* -- system_u:object_r:udev_helper_exec_t:s0 +/etc/postfix/postfix-script.* -- system_u:object_r:postfix_exec_t:s0 +/etc/rc\.d/init\.d/mimedefang.* -- system_u:object_r:spamd_initrc_exec_t:s0 +/usr/lib/NetworkManager/nm\-.* -- system_u:object_r:bin_t:s0 +/usr/lib/systemd/system/atd.* -- system_u:object_r:crond_unit_file_t:s0 +/usr/lib/systemd/system/lxd.* -- system_u:object_r:container_unit_file_t:s0 +/usr/lib/systemd/system/nfs.* -- system_u:object_r:nfsd_unit_file_t:s0 +/usr/lib/systemd/system/nmb.* -- system_u:object_r:samba_unit_file_t:s0 +/usr/lib/systemd/system/nut.* -- system_u:object_r:nut_unit_file_t:s0 +/usr/lib/systemd/system/ppp.* -- system_u:object_r:iptables_unit_file_t:s0 +/usr/lib/systemd/system/rpc.* -- system_u:object_r:rpcd_unit_file_t:s0 +/usr/lib/systemd/system/smb.* -- system_u:object_r:samba_unit_file_t:s0 +/usr/lib/systemd/system/tor.* -- system_u:object_r:tor_unit_file_t:s0 +/usr/share/munin/plugins/df.* -- system_u:object_r:disk_munin_plugin_exec_t:s0 +/var/log/cluster/fenced\.log.* -- system_u:object_r:fenced_var_log_t:s0 +/var/log/cluster/qdiskd\.log.* -- system_u:object_r:qdiskd_var_log_t:s0 +/var/log/openvpn-status\.log.* -- system_u:object_r:openvpn_status_t:s0 +/var/log/ppp-connect-errors.* -- system_u:object_r:pppd_log_t:s0 +/var/log/spice-vdagentd\.log.* -- system_u:object_r:vdagent_log_t:s0 +/var/log/zarafa/gateway\.log.* -- system_u:object_r:zarafa_gateway_log_t:s0 +/var/log/zarafa/indexer\.log.* -- system_u:object_r:zarafa_indexer_log_t:s0 +/var/log/zarafa/monitor\.log.* -- system_u:object_r:zarafa_monitor_log_t:s0 +/var/log/zarafa/spooler\.log.* -- system_u:object_r:zarafa_spooler_log_t:s0 +/var/run/cluster/fence_scsi.* -- system_u:object_r:fenced_var_run_t:s0 +/usr/lib/yafaray/libDarkSky.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/yumDBUSBackend.py -- system_u:object_r:rpm_exec_t:s0 +/usr/share/sandbox/sandboxX.sh -- system_u:object_r:bin_t:s0 +/etc/dhcp/wireless-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/etc/wicd/wireless-settings.conf -- system_u:object_r:NetworkManager_var_lib_t:s0 +/usr/X11R6/lib/modules/dri/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nspluginwrapper/np.*\.so -- system_u:object_r:lib_t:s0 +/etc/share/selinux/targeted(/.*)? system_u:object_r:semanage_store_t:s0 +/etc/strongswan/swanctl/rsa(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/etc/systemd/system\.control(/.*)? system_u:object_r:systemd_unit_file_t:s0 +/opt/local-path-provisioner(/.*)? system_u:object_r:container_file_t:s0 +/usr/lib/ConsoleKit/scripts(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/pgsql/test/regress(/.*)? system_u:object_r:postgresql_db_t:s0 +/usr/local/linuxprinter/ppd(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/usr/share/prewikka/cgi-bin(/.*)? system_u:object_r:prewikka_script_exec_t:s0 +/var/cache/php-eaccelerator(/.*)? system_u:object_r:httpd_cache_t:s0 +/var/lib/authselect/backups(/.*)? <> +/var/lib/containers/overlay(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/docker-latest/init(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/ipa/pki-ca/publish(/.*)? system_u:object_r:pki_tomcat_cert_t:s0 +/var/lib/munin/plugin-state(/.*)? system_u:object_r:munin_plugin_state_t:s0 +/var/lib/openshift/\.httpd\.d(/.*)? system_u:object_r:httpd_config_t:s0 +/var/lib/squirrelmail/prefs(/.*)? system_u:object_r:httpd_squirrelmail_t:s0 +/var/local-path-provisioner(/.*)? system_u:object_r:container_file_t:s0 +/var/log/radiusd-freeradius(/.*)? system_u:object_r:radiusd_log_t:s0 +/var/named/chroot/var/named(/.*)? system_u:object_r:named_zone_t:s0 +/var/spool/postfix/deferred(/.*)? system_u:object_r:postfix_spool_t:s0 +/var/spool/postfix/maildrop(/.*)? system_u:object_r:postfix_spool_t:s0 +/var/spool/postfix/postgrey(/.*)? system_u:object_r:postgrey_spool_t:s0 +/var/www/html/owncloud/data(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/real/RealPlayer/codecs(/.*)? -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/docker/containers/.*/hosts system_u:object_r:container_ro_file_t:s0 +/lib/systemd/system/sensord.service -- system_u:object_r:sensord_unit_file_t:s0 +/usr/lib/systemd/system/sbd.service -- system_u:object_r:sbd_unit_file_t:s0 +/usr/lib/libcncpmslld328\.so(\.[^/]*)* system_u:object_r:textrel_shlib_t:s0 +/var/lib/docker/containers/.*/.*\.log system_u:object_r:container_log_t:s0 +/usr/lib/sasl2/libsasldb\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/fdo.*.service -- system_u:object_r:fdo_unit_file_t:s0 +/var/lib/docker/containers/.*/hostname system_u:object_r:container_ro_file_t:s0 +/var/lib/VBoxGuestAdditions.*/lib/.*\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/strongswan/swanctl/pkcs.* system_u:object_r:ipsec_key_file_t:s0 +/etc/strongswan/swanctl/x509.* system_u:object_r:ipsec_key_file_t:s0 +/var/spool/plymouth/boot\.log.* system_u:object_r:plymouthd_var_log_t:s0 +/usr/lib/systemd/system/abrt.* -- system_u:object_r:abrt_unit_file_t:s0 +/usr/lib/systemd/system/alsa.* -- system_u:object_r:alsa_unit_file_t:s0 +/usr/lib/systemd/system/apmd.* -- system_u:object_r:apmd_unit_file_t:s0 +/usr/lib/systemd/system/bgpd.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/cups.* -- system_u:object_r:cupsd_unit_file_t:s0 +/usr/lib/systemd/system/innd.* -- system_u:object_r:innd_unit_file_t:s0 +/usr/lib/systemd/system/ntpd.* -- system_u:object_r:ntpd_unit_file_t:s0 +/usr/lib/systemd/system/pcsd.* -- system_u:object_r:cluster_unit_file_t:s0 +/usr/lib/systemd/system/pdns.* -- system_u:object_r:pdns_unit_file_t:s0 +/usr/lib/systemd/system/rhcd.* -- system_u:object_r:rhcd_unit_file_t:s0 +/usr/lib/systemd/system/ripd.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/rngd.* -- system_u:object_r:rngd_unit_file_t:s0 +/usr/lib/systemd/system/sshd.* -- system_u:object_r:sshd_unit_file_t:s0 +/usr/lib/systemd/system/sslh.* -- system_u:object_r:sslh_unit_file_t:s0 +/usr/lib/systemd/system/sssd.* -- system_u:object_r:sssd_unit_file_t:s0 +/usr/lib/systemd/system/tang.* -- system_u:object_r:tangd_unit_file_t:s0 +/usr/libexec/nm-fortisslvpn-.* -- system_u:object_r:openfortivpn_exec_t:s0 +/usr/share/munin/plugins/cpu.* -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/if_.* -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/nfs.* -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/nut.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/log/cluster/aisexec\.log.* -- system_u:object_r:cluster_var_log_t:s0 +/var/run/mysqld/mysqlmanager.* -- system_u:object_r:mysqlmanagerd_var_run_t:s0 +/usr/lib/pgsql/test/regress/.*\.sh -- system_u:object_r:bin_t:s0 +/usr/share/ajaxterm/ajaxterm.py.* -- system_u:object_r:bin_t:s0 +/emul/ia32-linux/usr/libexec(/.*)? system_u:object_r:bin_t:s0 +/etc/opt/rh/rh-nginx18/nginx(/.*)? system_u:object_r:httpd_config_t:s0 +/usr/lib/dirsrv/dsgw-cgi-bin(/.*)? system_u:object_r:dirsrvadmin_script_exec_t:s0 +/usr/share/denyhosts/plugins(/.*)? system_u:object_r:bin_t:s0 +/usr/share/denyhosts/scripts(/.*)? system_u:object_r:bin_t:s0 +/usr/share/ghostscript/fonts(/.*)? system_u:object_r:fonts_t:s0 +/var/lib/aeolus-configserver(/.*)? system_u:object_r:thin_aeolus_configserver_lib_t:s0 +/var/lib/amanda/gnutar-lists(/.*)? system_u:object_r:amanda_gnutarlists_t:s0 +/var/lib/containers/overlay2(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/imagefactory/images(/.*)? system_u:object_r:virt_image_t:s0 +/var/lib/samba/private/certs(/.*)? system_u:object_r:samba_cert_t:s0 +/var/lib/stickshift/\.httpd\.d(/.*)? system_u:object_r:httpd_config_t:s0 +/var/log/aeolus-configserver(/.*)? system_u:object_r:thin_aeolus_configserver_log_t:s0 +/var/log/rhc-worker-playbook(/.*)? system_u:object_r:rhcd_var_log_t:s0 +/var/run/aeolus-configserver(/.*)? system_u:object_r:thin_aeolus_configserver_var_run_t:s0 +/var/spool/zoneminder-upload(/.*)? system_u:object_r:zoneminder_spool_t:s0 +/var/www/html/nextcloud/data(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/opt/real/RealPlayer/plugins(/.*)? -- system_u:object_r:textrel_shlib_t:s0 +/var/opt/rh/rh-redis32/redis(/.*)? -- system_u:object_r:redis_exec_t:s0 +/usr/lib/pgsql/test/regress/.*\.so.* -- system_u:object_r:lib_t:s0 +/usr/lib/systemd/libsystemd-.+\.so.* -- system_u:object_r:lib_t:s0 +/usr/lib/systemd/system/lvm2.*\.service system_u:object_r:lvm_unit_file_t:s0 +/usr/lib/systemd/system/virt.*\.service -- system_u:object_r:virtd_unit_file_t:s0 +/usr/lib/mediawiki/math/texvc.* system_u:object_r:bin_t:s0 +/dev/shm/var\.lib\.opencryptoki.* -- system_u:object_r:pkcs_slotd_tmpfs_t:s0 +/etc/strongswan/ipsec\.secrets.* -- system_u:object_r:ipsec_key_file_t:s0 +/usr/lib/libkmplayercommon\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/avahi.* -- system_u:object_r:avahi_unit_file_t:s0 +/usr/lib/systemd/system/clamd.* -- system_u:object_r:antivirus_unit_file_t:s0 +/usr/lib/systemd/system/crond.* -- system_u:object_r:crond_unit_file_t:s0 +/usr/lib/systemd/system/dhcpd.* -- system_u:object_r:dhcpd_unit_file_t:s0 +/usr/lib/systemd/system/fwupd.* -- system_u:object_r:fwupd_unit_file_t:s0 +/usr/lib/systemd/system/httpd.* -- system_u:object_r:httpd_unit_file_t:s0 +/usr/lib/systemd/system/ipsec.* -- system_u:object_r:ipsec_mgmt_unit_file_t:s0 +/usr/lib/systemd/system/ipset.* -- system_u:object_r:iptables_unit_file_t:s0 +/usr/lib/systemd/system/isisd.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/mip6d.* -- system_u:object_r:mip6d_unit_file_t:s0 +/usr/lib/systemd/system/named.* -- system_u:object_r:named_unit_file_t:s0 +/usr/lib/systemd/system/nginx.* -- system_u:object_r:httpd_unit_file_t:s0 +/usr/lib/systemd/system/ntalk.* -- system_u:object_r:ktalkd_unit_file_t:s0 +/usr/lib/systemd/system/numad.* -- system_u:object_r:numad_unit_file_t:s0 +/usr/lib/systemd/system/ospfd.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/ptp4l.* -- system_u:object_r:ptp4l_unit_file_t:s0 +/usr/lib/systemd/system/rdisc.* -- system_u:object_r:rdisc_unit_file_t:s0 +/usr/lib/systemd/system/redis.* -- system_u:object_r:redis_unit_file_t:s0 +/usr/lib/systemd/system/rhnsd.* -- system_u:object_r:rhnsd_unit_file_t:s0 +/usr/lib/systemd/system/rshim.* -- system_u:object_r:rshim_unit_file_t:s0 +/usr/lib/systemd/system/slapd.* -- system_u:object_r:slapd_unit_file_t:s0 +/usr/lib/systemd/system/zebra.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/libexec/polkit-1/polkitd.* -- system_u:object_r:policykit_exec_t:s0 +/usr/share/munin/plugins/ntp_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/lib/likewise-open/krb5cc.* -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/nxserver/home/\.xauth.* -- system_u:object_r:xauth_home_t:s0 +/var/log/cluster/corosync\.log.* -- system_u:object_r:cluster_var_log_t:s0 +/var/log/cluster/cpglockd\.log.* -- system_u:object_r:cluster_var_log_t:s0 +/var/log/nvidia-installer\.log.* -- system_u:object_r:xserver_log_t:s0 +/usr/lib/nagios/plugins/utils.pm -- system_u:object_r:bin_t:s0 +/usr/lib/nagios/plugins/utils.sh -- system_u:object_r:bin_t:s0 +/usr/local/linuxprinter/bin/l?lpr -- system_u:object_r:lpr_exec_t:s0 +/etc/ConsoleKit/run-session\.d(/.*)? system_u:object_r:bin_t:s0 +/etc/strongswan/swanctl/ecdsa(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/usr/lib/node_modules/npm/bin(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/systemd/system-sleep(/.*)? system_u:object_r:bin_t:s0 +/usr/libexec/watchdog/scripts(/.*)? system_u:object_r:watchdog_unconfined_exec_t:s0 +/usr/share/PackageKit/helpers(/.*)? system_u:object_r:bin_t:s0 +/usr/share/hplip/prnt/plugins(/.*)? system_u:object_r:lib_t:s0 +/var/lib/google-authenticator(/.*)? system_u:object_r:var_auth_t:s0 +/var/lib/openshift/\.log/httpd(/.*)? system_u:object_r:httpd_log_t:s0 +/var/run/systemd/ask-password(/.*)? system_u:object_r:systemd_passwd_var_run_t:s0 +/usr/share/gitolite3/commands(/.*)? -- system_u:object_r:bin_t:s0 +/var/lib/buildkit/containerd-.*(/.*?) system_u:object_r:container_ro_file_t:s0 +/usr/lib/libjavascriptcoregtk[^/]*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/etc/hotplug\.d/default/default.* system_u:object_r:bin_t:s0 +/usr/lib/systemd/generator/lvm.* system_u:object_r:lvm_unit_file_t:s0 +/usr/lib/systemd/system/dirsrv.* system_u:object_r:dirsrv_unit_file_t:s0 +/var/cache/alchemist/printconf.* system_u:object_r:cupsd_rw_etc_t:s0 +/etc/systemd/system/bumblebeed.* -- system_u:object_r:bumblebee_unit_file_t:s0 +/usr/lib/systemd/system/amanda.* -- system_u:object_r:amanda_unit_file_t:s0 +/usr/lib/systemd/system/auditd.* -- system_u:object_r:auditd_unit_file_t:s0 +/usr/lib/systemd/system/autofs.* -- system_u:object_r:automount_unit_file_t:s0 +/usr/lib/systemd/system/babeld.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/brltty.* -- system_u:object_r:brltty_unit_file_t:s0 +/usr/lib/systemd/system/chrony.* -- system_u:object_r:chronyd_unit_file_t:s0 +/usr/lib/systemd/system/colord.* -- system_u:object_r:colord_unit_file_t:s0 +/usr/lib/systemd/system/condor.* -- system_u:object_r:condor_unit_file_t:s0 +/usr/lib/systemd/system/conman.* -- system_u:object_r:conman_unit_file_t:s0 +/usr/lib/systemd/system/dhcpcd.* -- system_u:object_r:dhcpd_unit_file_t:s0 +/usr/lib/systemd/system/dhcpd6.* -- system_u:object_r:dhcpd_unit_file_t:s0 +/usr/lib/systemd/system/docker.* -- system_u:object_r:container_unit_file_t:s0 +/usr/lib/systemd/system/hsqldb.* -- system_u:object_r:hsqldb_unit_file_t:s0 +/usr/lib/systemd/system/mdmon@.* -- system_u:object_r:mdadm_unit_file_t:s0 +/usr/lib/systemd/system/mongod.* -- system_u:object_r:mongod_unit_file_t:s0 +/usr/lib/systemd/system/mongos.* -- system_u:object_r:mongod_unit_file_t:s0 +/usr/lib/systemd/system/motion.* -- system_u:object_r:motion_unit_file_t:s0 +/usr/lib/systemd/system/mysqld.* -- system_u:object_r:mysqld_unit_file_t:s0 +/usr/lib/systemd/system/ninfod.* -- system_u:object_r:ninfod_unit_file_t:s0 +/usr/lib/systemd/system/opensm.* -- system_u:object_r:opensm_unit_file_t:s0 +/usr/lib/systemd/system/ospf6d.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/polipo.* -- system_u:object_r:polipo_unit_file_t:s0 +/usr/lib/systemd/system/ripngd.* -- system_u:object_r:zebra_unit_file_t:s0 +/usr/lib/systemd/system/stalld.* -- system_u:object_r:stalld_unit_file_t:s0 +/usr/lib/systemd/system/thttpd.* -- system_u:object_r:httpd_unit_file_t:s0 +/usr/lib/systemd/system/vsftpd.* -- system_u:object_r:ftpd_unit_file_t:s0 +/usr/lib/systemd/system/ypbind.* -- system_u:object_r:ypbind_unit_file_t:s0 +/usr/lib/systemd/system/ypserv.* -- system_u:object_r:nis_unit_file_t:s0 +/usr/lib/systemd/system/ypxfrd.* -- system_u:object_r:nis_unit_file_t:s0 +/usr/share/cluster/checkquorum.* -- system_u:object_r:bin_t:s0 +/usr/share/munin/plugins/qmail.* -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/snmp_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/log/cluster/rgmanager\.log.* -- system_u:object_r:cluster_var_log_t:s0 +/usr/lib/systemd/system/kmscon.*\.* -- system_u:object_r:kmscon_unit_file_t:s0 +/usr/libexec/iptables/iptables.init -- system_u:object_r:iptables_exec_t:s0 +/etc/fdo/stores/owner_vouchers(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/strongswan/swanctl/bliss/(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/etc/strongswan/swanctl/pubkey(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/etc/sysconfig/network-scripts(/.*)? system_u:object_r:net_conf_t:s0 +/usr/share/pki/ca-certificates(/.*)? system_u:object_r:cert_t:s0 +/usr/share/pki/ca-trust-source(/.*)? system_u:object_r:cert_t:s0 +/var/lib/arpwatch/\.esmtp_queue(/.*)? system_u:object_r:mail_home_rw_t:s0 +/var/lib/docker-latest/overlay(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/spamassassin/compiled(/.*)? system_u:object_r:spamd_compiled_t:s0 +/var/lib/tftpboot/pxelinux\.cfg(/.*)? system_u:object_r:cobbler_var_lib_t:s0 +/var/named/chroot/var/run/dbus(/.*)? system_u:object_r:system_dbusd_var_run_t:s0 +/var/www/openshift/console/log(/.*)? system_u:object_r:httpd_log_t:s0 +/var/www/openshift/console/tmp(/.*)? system_u:object_r:httpd_tmp_t:s0 +/usr/lib/systemd/system/rkt-gc.timer -- system_u:object_r:rkt_unit_file_t:s0 +/usr/games/darwinia/lib/libSDL.*\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/var/run/qemu-ga/fsfreeze-hook.d(/.*)? system_u:object_r:virt_qemu_ga_unconfined_exec_t:s0 +/usr/lib/systemd/system/pesign.service -- system_u:object_r:pesign_unit_file_t:s0 +/usr/lib/systemd/system/rkt-gc.service -- system_u:object_r:rkt_unit_file_t:s0 +/usr/lib/systemd/system/tomcat.service -- system_u:object_r:tomcat_unit_file_t:s0 +/usr/lib/altivec/libavcodec\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xorg/modules/glesx\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/kerberos/krb5kdc/principal.* system_u:object_r:krb5kdc_principal_t:s0 +/var/named/chroot/var/run/named.* system_u:object_r:named_var_run_t:s0 +/opt/AutoScan/usr/lib/libvte\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/X11R6/lib/libXvMCNVIDIA\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/gnome-settings-daemon/.* -- system_u:object_r:bin_t:s0 +/usr/lib/mailman/bin/mm-handler.* -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/sane/libsane-epkowa\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/amavisd.* -- system_u:object_r:antivirus_unit_file_t:s0 +/usr/lib/systemd/system/apcupsd.* -- system_u:object_r:apcupsd_unit_file_t:s0 +/usr/lib/systemd/system/couchdb.* -- system_u:object_r:couchdb_unit_file_t:s0 +/usr/lib/systemd/system/dnsmasq.* -- system_u:object_r:dnsmasq_unit_file_t:s0 +/usr/lib/systemd/system/haproxy.* -- system_u:object_r:haproxy_unit_file_t:s0 +/usr/lib/systemd/system/mariadb.* -- system_u:object_r:mysqld_unit_file_t:s0 +/usr/lib/systemd/system/neutron.* -- system_u:object_r:neutron_unit_file_t:s0 +/usr/lib/systemd/system/oddjobd.* -- system_u:object_r:oddjob_unit_file_t:s0 +/usr/lib/systemd/system/phc2sys.* -- system_u:object_r:phc2sys_unit_file_t:s0 +/usr/lib/systemd/system/php-fpm.* -- system_u:object_r:httpd_unit_file_t:s0 +/usr/lib/systemd/system/proftpd.* -- system_u:object_r:ftpd_unit_file_t:s0 +/usr/lib/systemd/system/quantum.* -- system_u:object_r:neutron_unit_file_t:s0 +/usr/lib/systemd/system/radiusd.* -- system_u:object_r:radiusd_unit_file_t:s0 +/usr/lib/systemd/system/rolekit.* -- system_u:object_r:rolekit_unit_file_t:s0 +/usr/lib/systemd/system/rsyslog.* -- system_u:object_r:syslogd_unit_file_t:s0 +/usr/lib/systemd/system/targetd.* -- system_u:object_r:targetd_unit_file_t:s0 +/usr/lib/systemd/system/unbound.* -- system_u:object_r:named_unit_file_t:s0 +/usr/lib/systemd/system/usbmuxd.* -- system_u:object_r:usbmuxd_unit_file_t:s0 +/usr/lib/systemd/system/winbind.* -- system_u:object_r:samba_unit_file_t:s0 +/usr/share/munin/plugins/iostat.* -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/munin_.* -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/mysql_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/slapd_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/smart_.* -- system_u:object_r:disk_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/squid_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/named/chroot/var/log/named.* -- system_u:object_r:named_log_t:s0 +/usr/lib/virt-sysprep/firstboot.sh -- system_u:object_r:virtd_exec_t:s0 +/var/kerberos/krb5kdc/principal.*\.ok system_u:object_r:krb5kdc_lock_t:s0 +/usr/libexec/iptables/ip6tables.init -- system_u:object_r:iptables_exec_t:s0 +/etc/strongswan/swanctl/private(/.*)? system_u:object_r:ipsec_key_file_t:s0 +/opt/gutenprint/cups/lib/filter(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/zabbix/externalscripts(/.*)? system_u:object_r:zabbix_script_exec_t:s0 +/usr/libexec/zoneminder/cgi-bin(/.*)? system_u:object_r:zoneminder_script_exec_t:s0 +/usr/share/w3c-markup-validator(/.*)? system_u:object_r:w3c_validator_content_t:s0 +/var/lib/clamav-unofficial-sigs(/.*)? system_u:object_r:antivirus_db_t:s0 +/var/lib/docker-latest/overlay2(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/zabbix/externalscripts(/.*)? system_u:object_r:zabbix_script_exec_t:s0 +/var/run/udev-configure-printer(/.*)? system_u:object_r:cupsd_config_var_run_t:s0 +/var/lib/spamassassin/compiled/.*\.so.* -- system_u:object_r:lib_t:s0 +/usr/lib/systemd/system/hostapd.service -- system_u:object_r:hostapd_unit_file_t:s0 +/usr/lib/systemd/system/prosody.service -- system_u:object_r:prosody_unit_file_t:s0 +/usr/lib/systemd/system/libvirt.*\.service -- system_u:object_r:virtd_unit_file_t:s0 +/etc/sysconfig/network-scripts/.*resolv\.conf -- system_u:object_r:net_conf_t:s0 +/usr/lib/udev/devices/hugepages/.* <> +/usr/X11R6/lib/libfglrx_gamma\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/arpwatch.* -- system_u:object_r:arpwatch_unit_file_t:s0 +/usr/lib/systemd/system/buildkit.* -- system_u:object_r:container_unit_file_t:s0 +/usr/lib/systemd/system/collectd.* -- system_u:object_r:collectd_unit_file_t:s0 +/usr/lib/systemd/system/corosync.* -- system_u:object_r:cluster_unit_file_t:s0 +/usr/lib/systemd/system/dhcrelay.* -- system_u:object_r:dhcpd_unit_file_t:s0 +/usr/lib/systemd/system/ipmiseld.* -- system_u:object_r:freeipmi_ipmiseld_unit_file_t:s0 +/usr/lib/systemd/system/iptables.* -- system_u:object_r:iptables_unit_file_t:s0 +/usr/lib/systemd/system/netlabel.* -- system_u:object_r:netlabel_mgmt_unit_file_t:s0 +/usr/lib/systemd/system/vmtoolsd.* -- system_u:object_r:vmtools_unit_file_t:s0 +/usr/libexec/polkit-grant-helper.* -- system_u:object_r:policykit_grant_exec_t:s0 +/usr/local/libexec/docker/docker.* -- system_u:object_r:container_runtime_exec_t:s0 +/usr/share/munin/plugins/apache_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/hddtemp.* -- system_u:object_r:disk_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/tomcat_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/lib/likewise/krb5ccr_lsass\..* -- system_u:object_r:lsassd_var_lib_t:s0 +/usr/local/lib/pysieved/pysieved.*\.py -- system_u:object_r:inetd_child_exec_t:s0 +/etc/NetworkManager/dispatcher\.d(/.*)? system_u:object_r:NetworkManager_dispatcher_script_t:s0 +/usr/lib/mozilla/plugins-wrapped(/.*)? system_u:object_r:mozilla_plugin_rw_t:s0 +/var/named/chroot/var/named/data(/.*)? system_u:object_r:named_cache_t:s0 +/var/opt/rh/rh-nginx18/lib/nginx(/.*)? system_u:object_r:httpd_var_lib_t:s0 +/var/opt/rh/rh-nginx18/run/nginx(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/run/systemd/multi-session-x(/.*)? system_u:object_r:xdm_var_run_t:s0 +/var/stockmaniac/templates_cache(/.*)? system_u:object_r:var_log_t:s0 +/usr/lib/systemd/system/gssproxy.service -- system_u:object_r:gssproxy_unit_file_t:s0 +/usr/lib/systemd/systemd-resolve(d|-host) system_u:object_r:systemd_resolved_exec_t:s0 +/usr/lib/nero/plug-ins/libMP3\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/system-config-network(/netconfig)?/[^/]+\.py -- system_u:object_r:bin_t:s0 +/var/kerberos/krb5kdc/from_master.* system_u:object_r:krb5kdc_lock_t:s0 +/usr/lib/systemd/system/accountsd.* -- system_u:object_r:accountsd_unit_file_t:s0 +/usr/lib/systemd/system/afterburn.* -- system_u:object_r:afterburn_unit_file_t:s0 +/usr/lib/systemd/system/arptables.* -- system_u:object_r:iptables_unit_file_t:s0 +/usr/lib/systemd/system/bluetooth.* -- system_u:object_r:bluetooth_unit_file_t:s0 +/usr/lib/systemd/system/firewalld.* -- system_u:object_r:firewalld_unit_file_t:s0 +/usr/lib/systemd/system/ip6tables.* -- system_u:object_r:iptables_unit_file_t:s0 +/usr/lib/systemd/system/mdmonitor.* -- system_u:object_r:mdadm_unit_file_t:s0 +/usr/lib/systemd/system/named-sdb.* -- system_u:object_r:named_unit_file_t:s0 +/usr/lib/systemd/system/pacemaker.* -- system_u:object_r:cluster_unit_file_t:s0 +/usr/lib/systemd/system/rasdaemon.* -- system_u:object_r:rasdaemon_unit_file_t:s0 +/usr/lib/systemd/system/rtas_errd.* -- system_u:object_r:rtas_errd_unit_file_t:s0 +/usr/lib/systemd/system/yppasswdd.* -- system_u:object_r:nis_unit_file_t:s0 +/usr/lib/systemd/user/dbus-broker.* -- system_u:object_r:dbusd_unit_file_t:s0 +/usr/lib/vdpau/libvdpau_nvidia\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/munin/plugins/diskstat.* -- system_u:object_r:disk_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/varnish_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/var/log/cluster/dlm_controld\.log.* -- system_u:object_r:dlm_controld_var_log_t:s0 +/var/log/cluster/gfs_controld\.log.* -- system_u:object_r:gfs_controld_var_log_t:s0 +/usr/lib/nspluginwrapper/npviewer.bin -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/share/spamassassin/sa-update.cron -- system_u:object_r:spamd_update_exec_t:s0 +/usr/lib/ConsoleKit/run-session\.d(/.*)? system_u:object_r:bin_t:s0 +/var/cache/ipmimonitoringsdrcache(/.*)? system_u:object_r:freeipmi_var_cache_t:s0 +/var/lib/private/systemd/timesync(/.*)? system_u:object_r:systemd_timedated_var_lib_t:s0 +/usr/share/wordpress/wp-includes/.*\.php -- system_u:object_r:httpd_sys_script_exec_t:s0 +/usr/lib/systemd/system/pkcsslotd.service system_u:object_r:pkcs_slotd_unit_file_t:s0 +/usr/lib/ADM_plugins/videoFilter/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/etc/sysconfig/network-scripts/net.* system_u:object_r:bin_t:s0 +/usr/lib/systemd/system/certmonger.* system_u:object_r:certmonger_unit_file_t:s0 +/usr/lib/systemd/system/pki-tomcat.* system_u:object_r:pki_tomcat_unit_file_t:s0 +/usr/lib/systemd/system/bumblebeed.* -- system_u:object_r:bumblebee_unit_file_t:s0 +/usr/lib/systemd/system/cloud-init.* -- system_u:object_r:cloud_init_unit_file_t:s0 +/usr/lib/systemd/system/conntrackd.* -- system_u:object_r:conntrackd_unit_file_t:s0 +/usr/lib/systemd/system/containerd.* -- system_u:object_r:container_unit_file_t:s0 +/usr/lib/systemd/system/hypervvssd.* -- system_u:object_r:hypervvssd_unit_file_t:s0 +/usr/lib/systemd/system/keepalived.* -- system_u:object_r:keepalived_unit_file_t:s0 +/usr/lib/systemd/system/openwsmand.* -- system_u:object_r:openwsman_unit_file_t:s0 +/usr/lib/systemd/system/postgresql.* -- system_u:object_r:postgresql_unit_file_t:s0 +/usr/lib/systemd/system/ras-mc-ctl.* -- system_u:object_r:rasdaemon_unit_file_t:s0 +/usr/lib/systemd/system/strongimcv.* -- system_u:object_r:ipsec_mgmt_unit_file_t:s0 +/usr/lib/systemd/system/strongswan.* -- system_u:object_r:ipsec_mgmt_unit_file_t:s0 +/usr/lib/systemd/system/targetclid.* -- system_u:object_r:targetclid_unit_file_t:s0 +/usr/lib/systemd/system/timemaster.* -- system_u:object_r:timemaster_unit_file_t:s0 +/usr/lib/systemd/system/zoneminder.* -- system_u:object_r:zoneminder_unit_file_t:s0 +/usr/lib/systemd/systemd-readahead.* -- system_u:object_r:readahead_exec_t:s0 +/usr/share/munin/plugins/asterisk_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/exim_mail.* -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/postgres_.* -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/sendmail_.* -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/var/lib/nxserver/home/\.Xauthority.* -- system_u:object_r:xauth_home_t:s0 +/etc/alchemist/namespace/printconf(/.*)? system_u:object_r:cupsd_rw_etc_t:s0 +/opt/Symantec/scspagent/IDS/system(/.*)? system_u:object_r:var_log_t:s0 +/usr/share/awstats/wwwroot/cgi-bin(/.*)? system_u:object_r:awstats_script_exec_t:s0 +/usr/share/wordpress-mu/wp-content(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/containers/overlay-images(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/overlay-layers(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/samba/winbindd_privileged(/.*)? system_u:object_r:winbind_var_run_t:s0 +/var/named/chroot/var/named/slaves(/.*)? system_u:object_r:named_cache_t:s0 +/usr/libexec/qemu-ga/fsfreeze-hook.d(/.*)? system_u:object_r:virt_qemu_ga_unconfined_exec_t:s0 +/var/lib/docker-latest/containers/.*/hosts system_u:object_r:container_ro_file_t:s0 +/usr/lib/systemd/system/sbd_remote.service -- system_u:object_r:sbd_unit_file_t:s0 +/var/lib/docker-latest/containers/.*/.*\.log system_u:object_r:container_log_t:s0 +/var/lib/docker-latest/containers/.*/hostname system_u:object_r:container_ro_file_t:s0 +/etc/sysconfig/network-scripts/ifup.* system_u:object_r:bin_t:s0 +/etc/sysconfig/network-scripts/init.* system_u:object_r:bin_t:s0 +/usr/lib/courier/courier/courierpop.* -- system_u:object_r:courier_pop_exec_t:s0 +/usr/lib/systemd/system/console-kit.* -- system_u:object_r:consolekit_unit_file_t:s0 +/usr/lib/systemd/system/ipmidetectd.* -- system_u:object_r:freeipmi_ipmidetectd_unit_file_t:s0 +/usr/lib/systemd/system/sshd-keygen.* -- system_u:object_r:sshd_keygen_unit_file_t:s0 +/usr/lib/vmware-tools/sbin32/vmware.* -- system_u:object_r:vmware_host_exec_t:s0 +/usr/lib/vmware-tools/sbin64/vmware.* -- system_u:object_r:vmware_host_exec_t:s0 +/var/run/NetworkManager/resolv\.conf.* -- system_u:object_r:net_conf_t:s0 +/usr/lib/systemd/system-generators/[^/]* -- system_u:object_r:init_exec_t:s0 +/etc/fdo/stores/rendezvous_sessions(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/var/lib/NetworkManager-fortisslvpn(/.*)? system_u:object_r:openfortivpn_var_lib_t:s0 +/var/lib/containers/overlay2-images(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/overlay2-layers(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/storage/overlay(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/named/chroot/var/named/dynamic(/.*)? system_u:object_r:named_cache_t:s0 +/var/run/systemd/ask-password-block(/.*)? system_u:object_r:systemd_passwd_var_run_t:s0 +/var/www/openshift/broker/httpd/run(/.*)? system_u:object_r:httpd_var_run_t:s0 +/var/named/chroot/etc/named\.rfc1912.zones -- system_u:object_r:named_conf_t:s0 +/usr/lib/systemd/system/ods-signerd.service -- system_u:object_r:opendnssec_unit_file_t:s0 +/usr/lib/systemd/system/openvswitch.service -- system_u:object_r:openvswitch_unit_file_t:s0 +/usr/lib/systemd/system/bcfg2-server.* -- system_u:object_r:bcfg2_unit_file_t:s0 +/usr/lib/systemd/system/bmc-watchdog.* -- system_u:object_r:freeipmi_bmc_watchdog_unit_file_t:s0 +/usr/lib/systemd/system/cloud-config.* -- system_u:object_r:cloud_init_unit_file_t:s0 +/usr/lib/systemd/system/tangd-keygen.* -- system_u:object_r:tangd_unit_file_t:s0 +/usr/share/kde4/apps/kajongg/kajongg.py -- system_u:object_r:bin_t:s0 +/usr/lib/NetworkManager/dispatcher\.d(/.*)? system_u:object_r:NetworkManager_dispatcher_script_t:s0 +/var/cache/samba/winbindd_privileged(/.*)? system_u:object_r:winbind_var_run_t:s0 +/var/lib/containers/storage/overlay2(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/www/openshift/broker/httpd/logs(/.*)? system_u:object_r:httpd_log_t:s0 +/var/www/openshift/console/httpd/run(/.*)? system_u:object_r:httpd_var_run_t:s0 +/usr/share/collectd/collection3/bin/.*\.cgi -- system_u:object_r:collectd_script_exec_t:s0 +/usr/lib/systemd/system/rkt-metadata.socket -- system_u:object_r:rkt_unit_file_t:s0 +/var/lib/containers/storage/volumes/[^/]*/.* system_u:object_r:container_file_t:s0 +/usr/lib/systemd/system/ModemManager.service -- system_u:object_r:modemmanager_unit_file_t:s0 +/usr/lib/systemd/system/rkt-metadata.service -- system_u:object_r:rkt_unit_file_t:s0 +/usr/lib/systemd/system/systemd-hwdb.*\.service -- system_u:object_r:systemd_hwdb_unit_file_t:s0 +/usr/lib/systemd/system/systemd-time.*\.service -- system_u:object_r:systemd_timedated_unit_file_t:s0 +/usr/share/texlive/texmf/web2c/mktex(dir|nam|upd) system_u:object_r:bin_t:s0 +/etc/sysconfig/network-scripts/ifdown.* system_u:object_r:bin_t:s0 +/etc/sysconfig/system-config-firewall.* -- system_u:object_r:system_conf_t:s0 +/opt/Unify/SQLBase/libgptsblmsui11\.so.* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/iodine-server.* -- system_u:object_r:iodined_unit_file_t:s0 +/usr/share/munin/plugins/courier_mta_.* -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/postfix_mail.* -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/var/lib/likewise-open/krb5ccr_lsass\..* -- system_u:object_r:lsassd_var_lib_t:s0 +/var/run/dovecot/login/ssl-parameters.dat -- system_u:object_r:dovecot_var_lib_t:s0 +/usr/lib/icinga/plugins/eventhandlers(/.*) system_u:object_r:nagios_eventhandler_plugin_exec_t:s0 +/usr/lib/nagios/plugins/eventhandlers(/.*) system_u:object_r:nagios_eventhandler_plugin_exec_t:s0 +/etc/fdo/stores/rendezvous_registered(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/etc/mail/spamassassin/sa-update-keys(/.*)? system_u:object_r:gpg_secret_t:s0 +/usr/share/mythtv/mythweather/scripts(/.*)? system_u:object_r:mythtv_script_exec_t:s0 +/var/www/openshift/console/httpd/logs(/.*)? system_u:object_r:httpd_log_t:s0 +/usr/lib/systemd/system/ods-enforcerd.service -- system_u:object_r:opendnssec_unit_file_t:s0 +/usr/lib/policykit/polkit-grant-helper.* -- system_u:object_r:policykit_grant_exec_t:s0 +/usr/lib/systemd/system-generators/nfs.* -- system_u:object_r:nfsd_exec_t:s0 +/usr/lib/systemd/system/NetworkManager.* -- system_u:object_r:NetworkManager_unit_file_t:s0 +/usr/lib/systemd/system/corosync-qnetd.* -- system_u:object_r:cluster_unit_file_t:s0 +/usr/lib/systemd/system/libstoragemgmt.* -- system_u:object_r:lsmd_unit_file_t:s0 +/usr/libexec/polkit-resolve-exe-helper.* -- system_u:object_r:policykit_resolve_exec_t:s0 +/var/log/aeolus-conductor/dbomatic\.log.* -- system_u:object_r:mongod_log_t:s0 +/var/lib/kubelet/pod-resources/kubelet.sock system_u:object_r:container_file_t:s0 +/usr/share/squeezeboxserver/CPAN/arch/.+\.so -- system_u:object_r:textrel_shlib_t:s0 +/etc/NetworkManager/system-connections(/.*)? system_u:object_r:NetworkManager_etc_rw_t:s0 +/etc/fdo/stores/manufacturing_sessions(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/ostree/deploy/rhel-atomic-host/deploy(/.*)? system_u:object_r:system_conf_t:s0 +/var/run/console-login-helper-messages(/.*)? system_u:object_r:NetworkManager_dispatcher_console_var_run_t:s0 +/usr/lib/systemd/system/lttng-sessiond.service -- system_u:object_r:lttng_sessiond_unit_file_t:s0 +/opt/f-secure/fspms/libexec/librapi\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/rabbitmq/lib/rabbitmq_server-.*/sbin/rabbitmq-server -- system_u:object_r:rabbitmq_exec_t:s0 +/usr/lib/systemd/system/openstack-nova-* -- system_u:object_r:nova_unit_file_t:s0 +/usr/lib/systemd/system-generators/lvm2.* -- system_u:object_r:lvm_exec_t:s0 +/usr/lib/systemd/system/dnssec-triggerd.* -- system_u:object_r:dnssec_trigger_unit_file_t:s0 +/usr/lib/systemd/system/insights-client.* -- system_u:object_r:insights_client_unit_file_t:s0 +/usr/lib/systemd/system/openstack-swift.* -- system_u:object_r:swift_unit_file_t:s0 +/usr/lib/systemd/system/rabbitmq-server.* -- system_u:object_r:rabbitmq_unit_file_t:s0 +/etc/boinc-client/global_prefs_override.xml -- system_u:object_r:boinc_var_lib_t:s0 +/opt/dirsrv/var/run/dirsrv/dsgw/cookies(/.*)? system_u:object_r:httpd_var_run_t:s0 +/usr/share/w3c-markup-validator/cgi-bin(/.*)? system_u:object_r:w3c_validator_script_exec_t:s0 +/usr/share/wordpress/wp-content/upgrade(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/usr/share/wordpress/wp-content/uploads(/.*)? system_u:object_r:httpd_sys_rw_content_t:s0 +/var/lib/private/systemd/journal-upload(/.*)? system_u:object_r:systemd_journal_upload_var_lib_t:s0 +/usr/lib/systemd/system/nm-cloud-setup\.(service|timer) -- system_u:object_r:NetworkManager_unit_file_t:s0 +/usr/lib/xorg/modules/extensions/nvidia(-[^/]*)?/libglx\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/coreos-installer.* -- system_u:object_r:coreos_installer_unit_file_t:s0 +/usr/lib/systemd/system/corosync-qdevice.* -- system_u:object_r:cluster_unit_file_t:s0 +/usr/lib/systemd/system/systemd-userdbd\.(service|socket) -- system_u:object_r:systemd_userdbd_unit_file_t:s0 +/usr/lib/systemd/system/hwloc-dump-hwdata.* -- system_u:object_r:hwloc_dhwd_unit_t:s0 +/usr/lib/systemd/system/ovirt-guest-agent.* -- system_u:object_r:rhev_agentd_unit_file_t:s0 +/etc/fdo/stores/owner_onboarding_sessions(/.*)? system_u:object_r:fdo_conf_rw_t:s0 +/usr/lib/systemd/system/systemd-bootchart.*\.service -- system_u:object_r:systemd_bootchart_unit_file_t:s0 +/opt/Komodo-Edit-5/lib/python/lib/python2.6/lib-dynload/.*\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system/openstack-keystone.* -- system_u:object_r:keystone_unit_file_t:s0 +/usr/lib/systemd/system/strongswan-swanctl.* -- system_u:object_r:ipsec_mgmt_unit_file_t:s0 +/var/lib/likewise/db/lsass-adcache\.filedb\..* -- system_u:object_r:lsassd_var_lib_t:s0 +/usr/share/system-config-selinux/polgengui.py -- system_u:object_r:bin_t:s0 +/var/lib/containers/storage/overlay-images(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/storage/overlay-layers(/.*)? system_u:object_r:container_ro_file_t:s0 +/usr/lib/systemd/system/speech-dispatcherd.service -- system_u:object_r:speech_dispatcher_unit_file_t:s0 +/usr/lib/xorg/modules/drivers/fglrx_drv\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xorg/modules/extensions/libglx\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/var/run/NetworkManager/no-stub-resolv\.conf.* -- system_u:object_r:net_conf_t:s0 +/var/lib/containers/storage/overlay2-images(/.*)? system_u:object_r:container_ro_file_t:s0 +/var/lib/containers/storage/overlay2-layers(/.*)? system_u:object_r:container_ro_file_t:s0 +/usr/x11R6/lib/modules/extensions/libglx\.so(\.[^/]*)* -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/policykit/polkit-resolve-exe-helper.* -- system_u:object_r:policykit_resolve_exec_t:s0 +/usr/lib/systemd/system/openstack-cinder-api.* -- system_u:object_r:cinder_api_unit_file_t:s0 +/usr/lib/systemd/system/openstack-glance-api.* -- system_u:object_r:glance_api_unit_file_t:s0 +/usr/lib/systemd/system/pkcs11proxyd-softhsm.* -- system_u:object_r:pkcs11proxyd_unit_file_t:s0 +/opt/OpenPrinting-Gutenprint/cups/lib/filter(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/systemd/system-generators/cloud-init.* system_u:object_r:cloud_init_exec_t:s0 +/usr/share/mirrormanager/server/mirrormanager(/.*)? system_u:object_r:mirrormanager_exec_t:s0 +/usr/share/gedit-2/plugins/externaltools/tools(/.*)? system_u:object_r:bin_t:s0 +/usr/lib/systemd/system/openstack-cinder-backup.* -- system_u:object_r:cinder_backup_unit_file_t:s0 +/usr/lib/systemd/system/openstack-cinder-volume.* -- system_u:object_r:cinder_volume_unit_file_t:s0 +/var/lib/likewise-open/db/lsass-adcache\.filedb\..* -- system_u:object_r:lsassd_var_lib_t:s0 +/usr/share/setroubleshoot/SetroubleshootFixit\.py* -- system_u:object_r:setroubleshoot_fixit_exec_t:s0 +/usr/lib/systemd/system/openstack-glance-registry.* -- system_u:object_r:glance_registry_unit_file_t:s0 +/usr/lib/systemd/system/openstack-glance-scrubber.* -- system_u:object_r:glance_scrubber_unit_file_t:s0 +/usr/lib/enlightenment/modules/cpufreq/linux-gnu-[^/]*/freqset -- system_u:object_r:freqset_exec_t:s0 +/usr/lib/systemd/system/openstack-cinder-scheduler.* -- system_u:object_r:cinder_scheduler_unit_file_t:s0 +/ -d system_u:object_r:root_t:s0 +/bin system_u:object_r:bin_t:s0 +/etc system_u:object_r:etc_t:s0 +/lib system_u:object_r:lib_t:s0 +/opt system_u:object_r:usr_t:s0 +/srv system_u:object_r:var_t:s0 +/tmp system_u:object_r:tmp_t:s0 +/usr system_u:object_r:usr_t:s0 +/var system_u:object_r:var_t:s0 +/afs -d system_u:object_r:mnt_t:s0 +/dev -d system_u:object_r:device_t:s0 +/net -d system_u:object_r:mnt_t:s0 +/run -d system_u:object_r:var_run_t:s0 +/boot system_u:object_r:boot_t:s0 +/emul system_u:object_r:usr_t:s0 +/sbin system_u:object_r:bin_t:s0 +/halt -- system_u:object_r:etc_runtime_t:s0 +/misc -d system_u:object_r:mnt_t:s0 +/rhev -d system_u:object_r:mnt_t:s0 +/home -l system_u:object_r:home_root_t:s0 +/lib64 system_u:object_r:lib_t:s0 +/vicepa system_u:object_r:afs_files_t:s0 +/vicepb system_u:object_r:afs_files_t:s0 +/vicepc system_u:object_r:afs_files_t:s0 +/bin/ip -- system_u:object_r:ifconfig_exec_t:s0 +/bin/su -- system_u:object_r:su_exec_t:s0 +/initrd -d system_u:object_r:root_t:s0 +/bin/esh -- system_u:object_r:shell_exec_t:s0 +/bin/rpm -- system_u:object_r:rpm_exec_t:s0 +/sbin/ip -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/iw -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/tc -- system_u:object_r:ifconfig_exec_t:s0 +/dev/pts -d system_u:object_r:devpts_t:s0 +/dev/shm -d system_u:object_r:tmpfs_t:s0 +/etc/ppp -d system_u:object_r:pppd_etc_t:s0 +/etc/xen -d system_u:object_r:virt_etc_t:s0 +/selinux -d <> +/service -d system_u:object_r:svc_svc_t:s0 +/usr/bin -d system_u:object_r:bin_t:s0 +/usr/lib -d system_u:object_r:lib_t:s0 +/usr/tmp -d system_u:object_r:tmp_t:s0 +/var/log -d system_u:object_r:var_log_t:s0 +/var/run -d system_u:object_r:var_run_t:s0 +/var/tmp -d system_u:object_r:tmp_t:s0 +/dev/gfx -c system_u:object_r:xserver_misc_device_t:s0 +/dev/jbm -c system_u:object_r:mouse_device_t:s0 +/dev/kfd -c system_u:object_r:hsa_device_t:s0 +/dev/ksm -c system_u:object_r:ksm_device_t:s0 +/dev/kvm -c system_u:object_r:kvm_device_t:s0 +/dev/lvm -c system_u:object_r:fixed_disk_device_t:s0 +/dev/mem -c system_u:object_r:memory_device_t:s0 +/dev/pmu -c system_u:object_r:power_device_t:s0 +/dev/ppp -c system_u:object_r:ppp_device_t:s0 +/dev/sev -c system_u:object_r:sev_device_t:s0 +/dev/smu -c system_u:object_r:power_device_t:s0 +/dev/tgt -c system_u:object_r:scsi_generic_device_t:s0 +/dev/tty -c system_u:object_r:devtty_t:s0 +/dev/vas -c system_u:object_r:vas_device_t:s0 +/dev/log -l system_u:object_r:devlog_t:s0 +/selinux -l system_u:object_r:security_t:s0 +/var/run -l system_u:object_r:var_run_t:s0 +/var/tmp -l system_u:object_r:tmp_t:s0 +/\.journal <> +/tmp-inst system_u:object_r:tmp_t:s0 +/bin/bash -- system_u:object_r:shell_exec_t:s0 +/bin/fish -- system_u:object_r:shell_exec_t:s0 +/bin/kmod -- system_u:object_r:kmod_exec_t:s0 +/bin/mksh -- system_u:object_r:shell_exec_t:s0 +/bin/sash -- system_u:object_r:shell_exec_t:s0 +/bin/tcsh -- system_u:object_r:shell_exec_t:s0 +/bin/yash -- system_u:object_r:shell_exec_t:s0 +/fastboot -- system_u:object_r:etc_runtime_t:s0 +/poweroff -- system_u:object_r:etc_runtime_t:s0 +/sbin/lvm -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvs -- system_u:object_r:lvm_exec_t:s0 +/sbin/pvs -- system_u:object_r:lvm_exec_t:s0 +/sbin/sln -- system_u:object_r:ldconfig_exec_t:s0 +/sbin/vgs -- system_u:object_r:lvm_exec_t:s0 +/tftpboot -d system_u:object_r:tftpdir_t:s0 +/var/lock -d system_u:object_r:var_lock_t:s0 +/dev/3dfx -c system_u:object_r:xserver_misc_device_t:s0 +/dev/beep -c system_u:object_r:sound_device_t:s0 +/dev/full -c system_u:object_r:null_device_t:s0 +/dev/fuse -c system_u:object_r:fuse_device_t:s0 +/dev/hpet -c system_u:object_r:clock_device_t:s0 +/dev/i915 -c system_u:object_r:dri_device_t:s0 +/dev/kmem -c system_u:object_r:memory_device_t:s0 +/dev/kmsg -c system_u:object_r:kmsg_device_t:s0 +/dev/mice -c system_u:object_r:mouse_device_t:s0 +/dev/null -c system_u:object_r:null_device_t:s0 +/dev/pkey -c system_u:object_r:crypt_device_t:s0 +/dev/port -c system_u:object_r:memory_device_t:s0 +/dev/ptmx -c system_u:object_r:ptmx_t:s0 +/dev/trng -c system_u:object_r:random_device_t:s0 +/dev/uhid -c system_u:object_r:uhid_device_t:s0 +/dev/vhci -c system_u:object_r:vhost_device_t:s0 +/dev/vmci -c system_u:object_r:vmci_device_t:s0 +/dev/zero -c system_u:object_r:zero_device_t:s0 +/dev/bpcd -b system_u:object_r:removable_device_t:s0 +/dev/gscd -b system_u:object_r:removable_device_t:s0 +/dev/jsfd -b system_u:object_r:fixed_disk_device_t:s0 +/dev/root -b system_u:object_r:fixed_disk_device_t:s0 +/dev/sjcd -b system_u:object_r:removable_device_t:s0 +/var/lock -l system_u:object_r:var_lock_t:s0 +/\.autofsck -- system_u:object_r:etc_runtime_t:s0 +/bin/bash2 -- system_u:object_r:shell_exec_t:s0 +/bin/dmesg -- system_u:object_r:dmesg_exec_t:s0 +/bin/login -- system_u:object_r:login_exec_t:s0 +/etc/cmtab -- system_u:object_r:etc_runtime_t:s0 +/forcefsck -- system_u:object_r:etc_runtime_t:s0 +/sbin/ccsd -- system_u:object_r:ccs_exec_t:s0 +/sbin/dump -- system_u:object_r:fsadm_exec_t:s0 +/sbin/pump -- system_u:object_r:dhcpc_exec_t:s0 +/sbin/udev -- system_u:object_r:udev_exec_t:s0 +/sbin/vgck -- system_u:object_r:lvm_exec_t:s0 +/sbin/vpnc -- system_u:object_r:vpnc_exec_t:s0 +/sbin/zipl -- system_u:object_r:bootloader_exec_t:s0 +/dev/atibm -c system_u:object_r:mouse_device_t:s0 +/dev/crash -c system_u:object_r:crash_device_t:s0 +/dev/hwrng -c system_u:object_r:random_device_t:s0 +/dev/iommu -c system_u:object_r:iommu_device_t:s0 +/dev/kqemu -c system_u:object_r:qemu_device_t:s0 +/dev/lircm -c system_u:object_r:mouse_device_t:s0 +/dev/modem -c system_u:object_r:modem_device_t:s0 +/dev/nvram -c system_u:object_r:nvram_device_t:s0 +/dev/vchiq -c system_u:object_r:v4l_device_t:s0 +/dev/vmmon -c system_u:object_r:vmware_device_t:s0 +/dev/vsock -c system_u:object_r:vsock_device_t:s0 +/dev/aztcd -b system_u:object_r:removable_device_t:s0 +/dev/hitcd -b system_u:object_r:removable_device_t:s0 +/dev/optcd -b system_u:object_r:removable_device_t:s0 +/dev/lircd -s system_u:object_r:lircd_var_run_t:s0 +/\.suspended -- system_u:object_r:etc_runtime_t:s0 +/bin/arping -- system_u:object_r:netutils_exec_t:s0 +/etc/ethers -- system_u:object_r:net_conf_t:s0 +/etc/my\.cnf -- system_u:object_r:mysqld_etc_t:s0 +/etc/vhosts -- system_u:object_r:httpd_config_t:s0 +/sbin/blkid -- system_u:object_r:fsadm_exec_t:s0 +/sbin/fdisk -- system_u:object_r:fsadm_exec_t:s0 +/sbin/kdump -- system_u:object_r:kdump_exec_t:s0 +/sbin/kexec -- system_u:object_r:kdump_exec_t:s0 +/sbin/klogd -- system_u:object_r:klogd_exec_t:s0 +/sbin/mdadm -- system_u:object_r:mdadm_exec_t:s0 +/sbin/mdmon -- system_u:object_r:mdadm_exec_t:s0 +/sbin/mdmpd -- system_u:object_r:mdadm_exec_t:s0 +/sbin/partx -- system_u:object_r:fsadm_exec_t:s0 +/sbin/salsa -- system_u:object_r:alsa_exec_t:s0 +/sbin/udevd -- system_u:object_r:udev_exec_t:s0 +/usr/bin/at -- system_u:object_r:crontab_exec_t:s0 +/usr/bin/ip -- system_u:object_r:ifconfig_exec_t:s0 +/usr/bin/sm -- system_u:object_r:jabberd_exec_t:s0 +/usr/bin/su -- system_u:object_r:su_exec_t:s0 +/lost\+found -d system_u:object_r:lost_found_t:s0 +/sys/fs/bpf -d system_u:object_r:bpf_t:s0 +/usr/afs/db -d system_u:object_r:afs_dbdir_t:s0 +/dev/efirtc -c system_u:object_r:clock_device_t:s0 +/dev/evtchn -c system_u:object_r:xen_device_t:s0 +/dev/logibm -c system_u:object_r:mouse_device_t:s0 +/dev/mcelog -c system_u:object_r:kmsg_device_t:s0 +/dev/oldmem -c system_u:object_r:memory_device_t:s0 +/dev/opengl -c system_u:object_r:xserver_misc_device_t:s0 +/dev/radeon -c system_u:object_r:dri_device_t:s0 +/dev/random -c system_u:object_r:random_device_t:s0 +/dev/rfkill -c system_u:object_r:wireless_device_t:s0 +/dev/sonypi -c system_u:object_r:v4l_device_t:s0 +/dev/uinput -c system_u:object_r:event_device_t:s0 +/dev/vc-mem -c system_u:object_r:memory_device_t:s0 +/dev/initrd -b system_u:object_r:fixed_disk_device_t:s0 +/dev/sonycd -b system_u:object_r:removable_device_t:s0 +/dev/gpmctl -s system_u:object_r:gpmctl_t:s0 +/bin/rpcbind -- system_u:object_r:rpcbind_exec_t:s0 +/bin/systemd -- system_u:object_r:init_exec_t:s0 +/bin/udevadm -- system_u:object_r:udev_exec_t:s0 +/bin/unikeys -- system_u:object_r:loadkeys_exec_t:s0 +/dev/MAKEDEV -- system_u:object_r:bin_t:s0 +/dev/\.udevdb -- system_u:object_r:udev_var_run_t:s0 +/etc/adjtime -- system_u:object_r:adjtime_t:s0 +/etc/aliases -- system_u:object_r:etc_aliases_t:s0 +/etc/crontab -- system_u:object_r:system_cron_spool_t:s0 +/etc/dcc/map -- system_u:object_r:dcc_client_map_t:s0 +/etc/exports -- system_u:object_r:exports_t:s0 +/etc/ptmptmp -- system_u:object_r:passwd_file_t:s0 +/etc/rc\.d/rc -- system_u:object_r:initrc_exec_t:s0 +/fsckoptions -- system_u:object_r:etc_runtime_t:s0 +/sbin/accton -- system_u:object_r:acct_exec_t:s0 +/sbin/arping -- system_u:object_r:netutils_exec_t:s0 +/sbin/auditd -- system_u:object_r:auditd_exec_t:s0 +/sbin/cfdisk -- system_u:object_r:fsadm_exec_t:s0 +/sbin/dhcdbd -- system_u:object_r:dhcpc_exec_t:s0 +/sbin/dhcpcd -- system_u:object_r:dhcpc_exec_t:s0 +/sbin/dmraid -- system_u:object_r:lvm_exec_t:s0 +/sbin/e2fsck -- system_u:object_r:fsadm_exec_t:s0 +/sbin/e4fsck -- system_u:object_r:fsadm_exec_t:s0 +/sbin/findfs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/hdparm -- system_u:object_r:fsadm_exec_t:s0 +/sbin/iscsid -- system_u:object_r:iscsid_exec_t:s0 +/sbin/kpartx -- system_u:object_r:lvm_exec_t:s0 +/sbin/lsraid -- system_u:object_r:fsadm_exec_t:s0 +/sbin/lvmsar -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvscan -- system_u:object_r:lvm_exec_t:s0 +/sbin/mke2fs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/mke4fs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/mkraid -- system_u:object_r:fsadm_exec_t:s0 +/sbin/parted -- system_u:object_r:fsadm_exec_t:s0 +/sbin/pvdata -- system_u:object_r:lvm_exec_t:s0 +/sbin/pvmove -- system_u:object_r:lvm_exec_t:s0 +/sbin/pvscan -- system_u:object_r:lvm_exec_t:s0 +/sbin/rklogd -- system_u:object_r:klogd_exec_t:s0 +/sbin/setkey -- system_u:object_r:setkey_exec_t:s0 +/sbin/sfdisk -- system_u:object_r:fsadm_exec_t:s0 +/sbin/vgscan -- system_u:object_r:lvm_exec_t:s0 +/sbin/ypbind -- system_u:object_r:ypbind_exec_t:s0 +/tmp/fdouser -- system_u:object_r:fdo_tmp_t:s0 +/usr/bin/apm -- system_u:object_r:apm_exec_t:s0 +/usr/bin/bip -- system_u:object_r:bitlbee_exec_t:s0 +/usr/bin/c2s -- system_u:object_r:jabberd_router_exec_t:s0 +/usr/bin/cvs -- system_u:object_r:cvs_exec_t:s0 +/usr/bin/dnf -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/esh -- system_u:object_r:shell_exec_t:s0 +/usr/bin/lft -- system_u:object_r:traceroute_exec_t:s0 +/usr/bin/mpd -- system_u:object_r:mpd_exec_t:s0 +/usr/bin/mtr -- system_u:object_r:traceroute_exec_t:s0 +/usr/bin/net -- system_u:object_r:samba_net_exec_t:s0 +/usr/bin/raw -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/rkt -- system_u:object_r:rkt_exec_t:s0 +/usr/bin/rpm -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/s2s -- system_u:object_r:jabberd_exec_t:s0 +/usr/bin/sol -- system_u:object_r:games_exec_t:s0 +/usr/bin/ssh -- system_u:object_r:ssh_exec_t:s0 +/usr/bin/svc -- system_u:object_r:svc_start_exec_t:s0 +/usr/bin/tor -- system_u:object_r:tor_exec_t:s0 +/usr/bin/uux -- system_u:object_r:uux_exec_t:s0 +/usr/bin/vlc -- system_u:object_r:mplayer_exec_t:s0 +/usr/bin/yum -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/zif -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/ip -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/iw -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/tc -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/xl -- system_u:object_r:virsh_exec_t:s0 +/usr/sbin/xm -- system_u:object_r:virsh_exec_t:s0 +/var/dcc/map -- system_u:object_r:dcc_client_map_t:s0 +/var/lock/xl -- system_u:object_r:virt_log_t:s0 +/etc/libvirt -d system_u:object_r:virt_etc_t:s0 +/var/run/shm -d system_u:object_r:tmpfs_t:s0 +/dev/console -c system_u:object_r:console_device_t:s0 +/dev/hfmodem -c system_u:object_r:sound_device_t:s0 +/dev/jsflash -c system_u:object_r:fixed_disk_device_t:s0 +/dev/prandom -c system_u:object_r:random_device_t:s0 +/dev/sndstat -c system_u:object_r:sound_device_t:s0 +/dev/udmabuf -c system_u:object_r:dma_device_t:s0 +/dev/urandom -c system_u:object_r:urandom_device_t:s0 +/dev/vttuner -c system_u:object_r:v4l_device_t:s0 +/dev/hwcdrom -b system_u:object_r:removable_device_t:s0 +/dev/printer -s system_u:object_r:printer_t:s0 +/var/run/log -s system_u:object_r:devlog_t:s0 +/var/run/ndc -s system_u:object_r:named_var_run_t:s0 +/var/run/sdp -s system_u:object_r:bluetooth_var_run_t:s0 +/dev/gpmdata -p system_u:object_r:gpmctl_t:s0 +/dev/initctl -p system_u:object_r:initctl_t:s0 +/root/\.docker system_u:object_r:container_home_t:s0 +/root/\.shosts system_u:object_r:ssh_home_t:s0 +/tmp/\.journal <> +/usr/\.journal <> +/var/\.journal <> +/\.autorelabel -- system_u:object_r:etc_runtime_t:s0 +/bin/hostname -- system_u:object_r:hostname_exec_t:s0 +/bin/loadkeys -- system_u:object_r:loadkeys_exec_t:s0 +/bin/plymouth -- system_u:object_r:plymouth_exec_t:s0 +/dev/udev\.tbl -- system_u:object_r:udev_var_run_t:s0 +/etc/\.updated -- system_u:object_r:etc_runtime_t:s0 +/etc/mpd\.conf -- system_u:object_r:mpd_etc_t:s0 +/etc/ntp/keys -- system_u:object_r:ntpd_key_t:s0 +/etc/ntp\.conf -- system_u:object_r:net_conf_t:s0 +/etc/rndc\.key -- system_u:object_r:dnssec_t:s0 +/etc/sslh\.cfg -- system_u:object_r:sslh_config_t:s0 +/etc/timezone -- system_u:object_r:locale_t:s0 +/root/\.mailrc -- system_u:object_r:mail_home_t:s0 +/root/\.my\.cnf -- system_u:object_r:mysqld_home_t:s0 +/root/\.rhosts -- system_u:object_r:rlogind_home_t:s0 +/root/\.rlogin -- system_u:object_r:rlogind_home_t:s0 +/sbin/alsactl -- system_u:object_r:alsa_exec_t:s0 +/sbin/apcupsd -- system_u:object_r:apcupsd_exec_t:s0 +/sbin/audispd -- system_u:object_r:audisp_exec_t:s0 +/sbin/cardctl -- system_u:object_r:cardctl_exec_t:s0 +/sbin/cardmgr -- system_u:object_r:cardmgr_exec_t:s0 +/sbin/cgclear -- system_u:object_r:cgclear_exec_t:s0 +/sbin/dmsetup -- system_u:object_r:lvm_exec_t:s0 +/sbin/dosfsck -- system_u:object_r:fsadm_exec_t:s0 +/sbin/drbdadm -- system_u:object_r:drbd_exec_t:s0 +/sbin/e2fsadm -- system_u:object_r:lvm_exec_t:s0 +/sbin/e2label -- system_u:object_r:fsadm_exec_t:s0 +/sbin/ethtool -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/hwclock -- system_u:object_r:hwclock_exec_t:s0 +/sbin/iprdump -- system_u:object_r:mdadm_exec_t:s0 +/sbin/iprinit -- system_u:object_r:mdadm_exec_t:s0 +/sbin/lvmetad -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvmsadc -- system_u:object_r:lvm_exec_t:s0 +/sbin/mkdosfs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/nologin -- system_u:object_r:shell_exec_t:s0 +/sbin/portmap -- system_u:object_r:portmap_exec_t:s0 +/sbin/rpcbind -- system_u:object_r:rpcbind_exec_t:s0 +/sbin/sulogin -- system_u:object_r:sulogin_exec_t:s0 +/sbin/sushell -- system_u:object_r:sulogin_exec_t:s0 +/sbin/swapoff -- system_u:object_r:fsadm_exec_t:s0 +/sbin/syslogd -- system_u:object_r:syslogd_exec_t:s0 +/sbin/tune2fs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/udevadm -- system_u:object_r:udev_exec_t:s0 +/sbin/upstart -- system_u:object_r:init_exec_t:s0 +/sbin/vgmerge -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgsplit -- system_u:object_r:lvm_exec_t:s0 +/tmp/\.X0-lock -- system_u:object_r:user_tmp_t:s0 +/usr/bin/Xair -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/Xorg -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/Xvnc -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/aide -- system_u:object_r:aide_exec_t:s0 +/usr/bin/amtu -- system_u:object_r:amtu_exec_t:s0 +/usr/bin/bash -- system_u:object_r:shell_exec_t:s0 +/usr/bin/cdcc -- system_u:object_r:cdcc_exec_t:s0 +/usr/bin/chfn -- system_u:object_r:chfn_exec_t:s0 +/usr/bin/chsh -- system_u:object_r:chfn_exec_t:s0 +/usr/bin/dund -- system_u:object_r:bluetooth_exec_t:s0 +/usr/bin/fish -- system_u:object_r:shell_exec_t:s0 +/usr/bin/ftpd -- system_u:object_r:publicfile_exec_t:s0 +/usr/bin/hidd -- system_u:object_r:bluetooth_exec_t:s0 +/usr/bin/iwhd -- system_u:object_r:iwhd_exec_t:s0 +/usr/bin/kmod -- system_u:object_r:kmod_exec_t:s0 +/usr/bin/kolf -- system_u:object_r:games_exec_t:s0 +/usr/bin/kpat -- system_u:object_r:games_exec_t:s0 +/usr/bin/lsmd -- system_u:object_r:lsmd_exec_t:s0 +/usr/bin/micq -- system_u:object_r:games_exec_t:s0 +/usr/bin/mksh -- system_u:object_r:shell_exec_t:s0 +/usr/bin/mrtg -- system_u:object_r:mrtg_exec_t:s0 +/usr/bin/nasd -- system_u:object_r:soundd_exec_t:s0 +/usr/bin/nmap -- system_u:object_r:traceroute_exec_t:s0 +/usr/bin/nrpe -- system_u:object_r:nrpe_exec_t:s0 +/usr/bin/pads -- system_u:object_r:pads_exec_t:s0 +/usr/bin/pand -- system_u:object_r:bluetooth_exec_t:s0 +/usr/bin/pmcd -- system_u:object_r:pcp_pmcd_exec_t:s0 +/usr/bin/pmie -- system_u:object_r:pcp_pmie_exec_t:s0 +/usr/bin/qemu -- system_u:object_r:qemu_exec_t:s0 +/usr/bin/rhgb -- system_u:object_r:rhgb_exec_t:s0 +/usr/bin/rssh -- system_u:object_r:rssh_exec_t:s0 +/usr/bin/sash -- system_u:object_r:shell_exec_t:s0 +/usr/bin/sddm -- system_u:object_r:xdm_exec_t:s0 +/usr/bin/slim -- system_u:object_r:xdm_exec_t:s0 +/usr/bin/suck -- system_u:object_r:innd_exec_t:s0 +/usr/bin/svok -- system_u:object_r:svc_start_exec_t:s0 +/usr/bin/tcsh -- system_u:object_r:shell_exec_t:s0 +/usr/bin/thin -- system_u:object_r:thin_exec_t:s0 +/usr/bin/tmux -- system_u:object_r:screen_exec_t:s0 +/usr/bin/vigr -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/bin/vipw -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/bin/xine -- system_u:object_r:mplayer_exec_t:s0 +/usr/bin/yash -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/atd -- system_u:object_r:crond_exec_t:s0 +/usr/sbin/bat -- system_u:object_r:bacula_admin_exec_t:s0 +/usr/sbin/fos -- system_u:object_r:piranha_fos_exec_t:s0 +/usr/sbin/gpm -- system_u:object_r:gpm_exec_t:s0 +/usr/sbin/lpd -- system_u:object_r:lpd_exec_t:s0 +/usr/sbin/lvm -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvs -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/mtr -- system_u:object_r:traceroute_exec_t:s0 +/usr/sbin/nft -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/nsd -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/pup -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/pvs -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/sbd -- system_u:object_r:sbd_exec_t:s0 +/usr/sbin/sln -- system_u:object_r:ldconfig_exec_t:s0 +/usr/sbin/tlp -- system_u:object_r:tlp_exec_t:s0 +/usr/sbin/tor -- system_u:object_r:tor_exec_t:s0 +/usr/sbin/vgs -- system_u:object_r:lvm_exec_t:s0 +/var/\.updated -- system_u:object_r:etc_runtime_t:s0 +/var/qmail/rc -- system_u:object_r:bin_t:s0 +/var/run/motd -- system_u:object_r:motd_var_run_t:s0 +/var/run/stab -- system_u:object_r:cardmgr_var_run_t:s0 +/var/run/utmp -- system_u:object_r:initrc_var_run_t:s0 +/root/restore -d system_u:object_r:amanda_recover_dir_t:s0 +/var/run/user -d system_u:object_r:user_tmp_t:s0 +/var/tmp-inst -d system_u:object_r:tmp_t:s0 +/dev/apm_bios -c system_u:object_r:apm_bios_t:s0 +/dev/cpu/mtrr -c system_u:object_r:mtrr_device_t:s0 +/dev/ecryptfs -c system_u:object_r:ecryptfs_device_t:s0 +/dev/graphics -c system_u:object_r:xserver_misc_device_t:s0 +/dev/inportbm -c system_u:object_r:mouse_device_t:s0 +/dev/mergemem -c system_u:object_r:memory_device_t:s0 +/dev/op_panel -c system_u:object_r:opal_device_t:s0 +/dev/opal-prd -c system_u:object_r:opal_device_t:s0 +/dev/papr-vpd -c system_u:object_r:papr_vpd_device_t:s0 +/dev/pc110pad -c system_u:object_r:mouse_device_t:s0 +/dev/sgx_vepc -c system_u:object_r:sgx_vepc_device_t:s0 +/dev/snapshot -c system_u:object_r:apm_bios_t:s0 +/dev/vrtpanel -c system_u:object_r:mouse_device_t:s0 +/dev/z90crypt -c system_u:object_r:crypt_device_t:s0 +/dev/xconsole -p system_u:object_r:xconsole_device_t:s0 +/boot/\.journal <> +/etc/amandates system_u:object_r:amanda_amandates_t:s0 +/etc/dumpdates system_u:object_r:amanda_dumpdates_t:s0 +/usr/bin/passt system_u:object_r:passt_exec_t:s0 +/usr/bin/pasta system_u:object_r:pasta_exec_t:s0 +/bin/systemctl -- system_u:object_r:systemd_systemctl_exec_t:s0 +/etc/\.pwd\.lock -- system_u:object_r:passwd_file_t:s0 +/etc/killpower -- system_u:object_r:etc_runtime_t:s0 +/etc/krb5\.conf -- system_u:object_r:krb5_conf_t:s0 +/etc/mail/make -- system_u:object_r:bin_t:s0 +/etc/news/boot -- system_u:object_r:innd_exec_t:s0 +/etc/nohotplug -- system_u:object_r:etc_runtime_t:s0 +/etc/pads\.conf -- system_u:object_r:pads_config_t:s0 +/etc/securetty -- system_u:object_r:etc_runtime_t:s0 +/root/\.esmtprc -- system_u:object_r:mail_home_t:s0 +/root/\.forward -- system_u:object_r:mail_home_t:s0 +/root/\.k5login -- system_u:object_r:krb5_home_t:s0 +/root/\.k5users -- system_u:object_r:krb5_home_t:s0 +/sbin/auditctl -- system_u:object_r:auditctl_exec_t:s0 +/sbin/blockdev -- system_u:object_r:fsadm_exec_t:s0 +/sbin/dumpe2fs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/ifconfig -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/iscsiuio -- system_u:object_r:iscsid_exec_t:s0 +/sbin/iwconfig -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/ldconfig -- system_u:object_r:ldconfig_exec_t:s0 +/sbin/lvchange -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvcreate -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvextend -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvmpolld -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvreduce -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvremove -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvrename -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvresize -- system_u:object_r:lvm_exec_t:s0 +/sbin/mii-tool -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/minilogd -- system_u:object_r:syslogd_exec_t:s0 +/sbin/pmap_set -- system_u:object_r:portmap_helper_exec_t:s0 +/sbin/pvchange -- system_u:object_r:lvm_exec_t:s0 +/sbin/pvcreate -- system_u:object_r:lvm_exec_t:s0 +/sbin/pvremove -- system_u:object_r:lvm_exec_t:s0 +/sbin/rsyslogd -- system_u:object_r:syslogd_exec_t:s0 +/sbin/udevsend -- system_u:object_r:udev_exec_t:s0 +/sbin/vgchange -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgcreate -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgexport -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgextend -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgimport -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgreduce -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgremove -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgrename -- system_u:object_r:lvm_exec_t:s0 +/usr/bin/ainit -- system_u:object_r:alsa_exec_t:s0 +/usr/bin/bash2 -- system_u:object_r:shell_exec_t:s0 +/usr/bin/boinc -- system_u:object_r:boinc_exec_t:s0 +/usr/bin/bootc -- system_u:object_r:install_exec_t:s0 +/usr/bin/bsnes -- system_u:object_r:textrel_shlib_t:s0 +/usr/bin/chage -- system_u:object_r:passwd_exec_t:s0 +/usr/bin/dmesg -- system_u:object_r:dmesg_exec_t:s0 +/usr/bin/dspam -- system_u:object_r:dspam_exec_t:s0 +/usr/bin/esmtp -- system_u:object_r:sendmail_exec_t:s0 +/usr/bin/gnect -- system_u:object_r:games_exec_t:s0 +/usr/bin/gpgsm -- system_u:object_r:gpg_exec_t:s0 +/usr/bin/gtali -- system_u:object_r:games_exec_t:s0 +/usr/bin/hpijs -- system_u:object_r:cupsd_exec_t:s0 +/usr/bin/httpd -- system_u:object_r:publicfile_exec_t:s0 +/usr/bin/iagno -- system_u:object_r:games_exec_t:s0 +/usr/bin/imapd -- system_u:object_r:courier_pop_exec_t:s0 +/usr/bin/inews -- system_u:object_r:innd_exec_t:s0 +/usr/bin/ircII -- system_u:object_r:irc_exec_t:s0 +/usr/bin/irssi -- system_u:object_r:irc_exec_t:s0 +/usr/bin/kdesu -- system_u:object_r:su_exec_t:s0 +/usr/bin/ksame -- system_u:object_r:games_exec_t:s0 +/usr/bin/ktron -- system_u:object_r:games_exec_t:s0 +/usr/bin/kwin4 -- system_u:object_r:games_exec_t:s0 +/usr/bin/login -- system_u:object_r:login_exec_t:s0 +/usr/bin/lskat -- system_u:object_r:games_exec_t:s0 +/usr/bin/mandb -- system_u:object_r:mandb_exec_t:s0 +/usr/bin/msmtp -- system_u:object_r:sendmail_exec_t:s0 +/usr/bin/numad -- system_u:object_r:numad_exec_t:s0 +/usr/bin/pyzor -- system_u:object_r:spamc_exec_t:s0 +/usr/bin/rnews -- system_u:object_r:innd_exec_t:s0 +/usr/bin/rpmdb -- system_u:object_r:rpmdb_exec_t:s0 +/usr/bin/rpost -- system_u:object_r:innd_exec_t:s0 +/usr/bin/rsync -- system_u:object_r:rsync_exec_t:s0 +/usr/bin/smart -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/snort -- system_u:object_r:snort_exec_t:s0 +/usr/bin/spamc -- system_u:object_r:spamc_exec_t:s0 +/usr/bin/spamd -- system_u:object_r:spamd_exec_t:s0 +/usr/bin/teamd -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/bin/virsh -- system_u:object_r:virsh_exec_t:s0 +/usr/bin/vlock -- system_u:object_r:vlock_exec_t:s0 +/usr/bin/wodim -- system_u:object_r:cdrecord_exec_t:s0 +/usr/bin/xauth -- system_u:object_r:xauth_exec_t:s0 +/usr/lib/slapd -- system_u:object_r:slapd_exec_t:s0 +/usr/sbin/afsd -- system_u:object_r:afs_exec_t:s0 +/usr/sbin/aide -- system_u:object_r:aide_exec_t:s0 +/usr/sbin/amtu -- system_u:object_r:amtu_exec_t:s0 +/usr/sbin/apmd -- system_u:object_r:apmd_exec_t:s0 +/usr/sbin/ccsd -- system_u:object_r:ccs_exec_t:s0 +/usr/sbin/dccd -- system_u:object_r:dccd_exec_t:s0 +/usr/sbin/dccm -- system_u:object_r:dccm_exec_t:s0 +/usr/sbin/dump -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/gpsd -- system_u:object_r:gpsd_exec_t:s0 +/usr/sbin/hcid -- system_u:object_r:bluetooth_exec_t:s0 +/usr/sbin/lvsd -- system_u:object_r:piranha_lvs_exec_t:s0 +/usr/sbin/mock -- system_u:object_r:mock_exec_t:s0 +/usr/sbin/ndbd -- system_u:object_r:mysqld_exec_t:s0 +/usr/sbin/nmbd -- system_u:object_r:nmbd_exec_t:s0 +/usr/sbin/nrpe -- system_u:object_r:nrpe_exec_t:s0 +/usr/sbin/nscd -- system_u:object_r:nscd_exec_t:s0 +/usr/sbin/nsdc -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/ntop -- system_u:object_r:ntop_exec_t:s0 +/usr/sbin/ntpd -- system_u:object_r:ntpd_exec_t:s0 +/usr/sbin/osad -- system_u:object_r:osad_exec_t:s0 +/usr/sbin/pcsd -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/pimd -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/pppd -- system_u:object_r:pppd_exec_t:s0 +/usr/sbin/pptp -- system_u:object_r:pptp_exec_t:s0 +/usr/sbin/psad -- system_u:object_r:psad_exec_t:s0 +/usr/sbin/pump -- system_u:object_r:dhcpc_exec_t:s0 +/usr/sbin/rhcd -- system_u:object_r:rhcd_exec_t:s0 +/usr/sbin/ripd -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/rngd -- system_u:object_r:rngd_exec_t:s0 +/usr/sbin/sdpd -- system_u:object_r:bluetooth_exec_t:s0 +/usr/sbin/sesh -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/slpd -- system_u:object_r:slpd_exec_t:s0 +/usr/sbin/smbd -- system_u:object_r:smbd_exec_t:s0 +/usr/sbin/smsd -- system_u:object_r:smsd_exec_t:s0 +/usr/sbin/sntp -- system_u:object_r:ntpdate_exec_t:s0 +/usr/sbin/sshd -- system_u:object_r:sshd_exec_t:s0 +/usr/sbin/sslh -- system_u:object_r:sslh_exec_t:s0 +/usr/sbin/sssd -- system_u:object_r:sssd_exec_t:s0 +/usr/sbin/swat -- system_u:object_r:swat_exec_t:s0 +/usr/sbin/tcpd -- system_u:object_r:tcpd_exec_t:s0 +/usr/sbin/tcsd -- system_u:object_r:tcsd_exec_t:s0 +/usr/sbin/tgtd -- system_u:object_r:tgtd_exec_t:s0 +/usr/sbin/udev -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/upsd -- system_u:object_r:nut_upsd_exec_t:s0 +/usr/sbin/vgck -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vigr -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/vipw -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/vpnc -- system_u:object_r:vpnc_exec_t:s0 +/usr/sbin/wdmd -- system_u:object_r:wdmd_exec_t:s0 +/usr/sbin/wicd -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/sbin/xend -- system_u:object_r:xend_exec_t:s0 +/usr/sbin/yiff -- system_u:object_r:soundd_exec_t:s0 +/usr/sbin/zipl -- system_u:object_r:bootloader_exec_t:s0 +/var/log/dmesg -- system_u:object_r:var_log_t:s0 +/var/tmp/nfs_0 -- system_u:object_r:krb5_host_rcache_t:s0 +/dev/hugepages -d system_u:object_r:hugetlbfs_t:s0 +/sys/fs/cgroup -d system_u:object_r:cgroup_t:s0 +/sys/fs/pstore -d system_u:object_r:pstore_t:s0 +/var/qmail/bin -d system_u:object_r:bin_t:s0 +/var/run/netns -d system_u:object_r:ifconfig_var_run_t:s0 +/dev/hw_random -c system_u:object_r:random_device_t:s0 +/dev/microcode -c system_u:object_r:cpu_device_t:s0 +/dev/mmetfgrab -c system_u:object_r:scanner_device_t:s0 +/dev/monwriter -c system_u:object_r:monitor_device_t:s0 +/dev/net/vhost -c system_u:object_r:vhost_device_t:s0 +/dev/sequencer -c system_u:object_r:sound_device_t:s0 +/dev/vhost-net -c system_u:object_r:vhost_device_t:s0 +/var/run/ldapi -s system_u:object_r:slapd_var_run_t:s0 +/etc/localtime -l system_u:object_r:locale_t:s0 +/tmp/passt\.pcap system_u:object_r:passt_log_t:s0 +/tmp/pasta\.pcap system_u:object_r:pasta_log_t:s0 +/bin/alsaunmute -- system_u:object_r:alsa_exec_t:s0 +/bin/mountpoint -- system_u:object_r:bin_t:s0 +/dev/\.mdadm\.map -- system_u:object_r:mdadm_var_run_t:s0 +/etc/X11/prefdm -- system_u:object_r:initrc_exec_t:s0 +/etc/aiccu\.conf -- system_u:object_r:aiccu_etc_t:s0 +/etc/aliases\.db -- system_u:object_r:etc_aliases_t:s0 +/etc/ddtcd\.conf -- system_u:object_r:ddclient_etc_t:s0 +/etc/dictd\.conf -- system_u:object_r:dictd_etc_t:s0 +/etc/group\.lock -- system_u:object_r:passwd_file_t:s0 +/etc/ioctl\.save -- system_u:object_r:etc_runtime_t:s0 +/etc/ipsec\.conf -- system_u:object_r:ipsec_conf_file_t:s0 +/etc/irssi\.conf -- system_u:object_r:irc_conf_t:s0 +/etc/kdump\.conf -- system_u:object_r:kdump_etc_t:s0 +/etc/lircd\.conf -- system_u:object_r:lircd_etc_t:s0 +/etc/lvm/\.cache -- system_u:object_r:lvm_metadata_t:s0 +/etc/machine-id -- system_u:object_r:machineid_t:s0 +/etc/mdadm\.conf -- system_u:object_r:mdadm_conf_t:s0 +/etc/named\.conf -- system_u:object_r:named_conf_t:s0 +/etc/nsd/nsd\.db -- system_u:object_r:nsd_zone_t:s0 +/etc/passwd\.OLD -- system_u:object_r:passwd_file_t:s0 +/etc/pingd\.conf -- system_u:object_r:pingd_etc_t:s0 +/etc/radvd\.conf -- system_u:object_r:radvd_etc_t:s0 +/etc/sddm/Xstop -- system_u:object_r:bin_t:s0 +/etc/ssh/primes -- system_u:object_r:sshd_key_t:s0 +/etc/ulogd\.conf -- system_u:object_r:ulogd_etc_t:s0 +/lib/udev/udevd -- system_u:object_r:udev_exec_t:s0 +/root/\.esd_auth -- system_u:object_r:pulseaudio_home_t:s0 +/run/docker\.pid -- system_u:object_r:container_var_run_t:s0 +/sbin/drbdsetup -- system_u:object_r:drbd_exec_t:s0 +/sbin/iprupdate -- system_u:object_r:mdadm_exec_t:s0 +/sbin/lvdisplay -- system_u:object_r:lvm_exec_t:s0 +/sbin/lvmchange -- system_u:object_r:lvm_exec_t:s0 +/sbin/mcstransd -- system_u:object_r:setrans_exec_t:s0 +/sbin/partprobe -- system_u:object_r:fsadm_exec_t:s0 +/sbin/plymouthd -- system_u:object_r:plymouthd_exec_t:s0 +/sbin/pmap_dump -- system_u:object_r:portmap_helper_exec_t:s0 +/sbin/ppp-watch -- system_u:object_r:pppd_exec_t:s0 +/sbin/pvdisplay -- system_u:object_r:lvm_exec_t:s0 +/sbin/raidstart -- system_u:object_r:fsadm_exec_t:s0 +/sbin/scsi_info -- system_u:object_r:fsadm_exec_t:s0 +/sbin/sm-notify -- system_u:object_r:rpcd_exec_t:s0 +/sbin/syslog-ng -- system_u:object_r:syslogd_exec_t:s0 +/sbin/udevstart -- system_u:object_r:udev_exec_t:s0 +/sbin/upsdrvctl -- system_u:object_r:nut_upsdrvctl_exec_t:s0 +/sbin/vgdisplay -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgmknodes -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgwrapper -- system_u:object_r:lvm_exec_t:s0 +/usr/bin/Xephyr -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/arping -- system_u:object_r:netutils_exec_t:s0 +/usr/bin/brltty -- system_u:object_r:brltty_exec_t:s0 +/usr/bin/catdic -- system_u:object_r:canna_exec_t:s0 +/usr/bin/conmon -- system_u:object_r:conmon_exec_t:s0 +/usr/bin/envdir -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/fghack -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/gataxx -- system_u:object_r:games_exec_t:s0 +/usr/bin/gdomap -- system_u:object_r:gdomap_exec_t:s0 +/usr/bin/glines -- system_u:object_r:games_exec_t:s0 +/usr/bin/gpe-dm -- system_u:object_r:xdm_exec_t:s0 +/usr/bin/icinga -- system_u:object_r:nagios_exec_t:s0 +/usr/bin/kismet -- system_u:object_r:kismet_exec_t:s0 +/usr/bin/klines -- system_u:object_r:games_exec_t:s0 +/usr/bin/kmines -- system_u:object_r:games_exec_t:s0 +/usr/bin/kmscon -- system_u:object_r:kmscon_exec_t:s0 +/usr/bin/kpoker -- system_u:object_r:games_exec_t:s0 +/usr/bin/ksnake -- system_u:object_r:games_exec_t:s0 +/usr/bin/ktalkd -- system_u:object_r:ktalkd_exec_t:s0 +/usr/bin/mongod -- system_u:object_r:mongod_exec_t:s0 +/usr/bin/mongos -- system_u:object_r:mongod_exec_t:s0 +/usr/bin/motion -- system_u:object_r:motion_exec_t:s0 +/usr/bin/msmtpd -- system_u:object_r:sendmail_exec_t:s0 +/usr/bin/naemon -- system_u:object_r:naemon_exec_t:s0 +/usr/bin/nagios -- system_u:object_r:nagios_exec_t:s0 +/usr/bin/ostree -- system_u:object_r:install_exec_t:s0 +/usr/bin/passwd -- system_u:object_r:passwd_exec_t:s0 +/usr/bin/pesign -- system_u:object_r:pesign_exec_t:s0 +/usr/bin/pg_ctl -- system_u:object_r:postgresql_exec_t:s0 +/usr/bin/podman -- system_u:object_r:container_runtime_exec_t:s0 +/usr/bin/polipo -- system_u:object_r:polipo_exec_t:s0 +/usr/bin/puppet -- system_u:object_r:puppetagent_exec_t:s0 +/usr/bin/pwauth -- system_u:object_r:pwauth_exec_t:s0 +/usr/bin/pyzord -- system_u:object_r:spamd_exec_t:s0 +/usr/bin/rfcomm -- system_u:object_r:bluetooth_exec_t:s0 +/usr/bin/router -- system_u:object_r:jabberd_router_exec_t:s0 +/usr/bin/screen -- system_u:object_r:screen_exec_t:s0 +/usr/bin/smbmnt -- system_u:object_r:smbmount_exec_t:s0 +/usr/bin/stalld -- system_u:object_r:stalld_exec_t:s0 +/usr/bin/svscan -- system_u:object_r:svc_start_exec_t:s0 +/usr/bin/tshark -- system_u:object_r:wireshark_exec_t:s0 +/usr/bin/tvtime -- system_u:object_r:tvtime_exec_t:s0 +/usr/bin/vmware -- system_u:object_r:vmware_exec_t:s0 +/usr/bin/vnstat -- system_u:object_r:vnstat_exec_t:s0 +/usr/bin/x11vnc -- system_u:object_r:xserver_exec_t:s0 +/usr/sbin/abrtd -- system_u:object_r:abrt_exec_t:s0 +/usr/sbin/acpid -- system_u:object_r:apmd_exec_t:s0 +/usr/sbin/aiccu -- system_u:object_r:aiccu_exec_t:s0 +/usr/sbin/amavi -- system_u:object_r:antivirus_exec_t:s0 +/usr/sbin/bcfg2 -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/blkid -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/brctl -- system_u:object_r:brctl_exec_t:s0 +/usr/sbin/clamd -- system_u:object_r:antivirus_exec_t:s0 +/usr/sbin/clogd -- system_u:object_r:clogd_exec_t:s0 +/usr/sbin/clvmd -- system_u:object_r:clvmd_exec_t:s0 +/usr/sbin/ctdbd -- system_u:object_r:ctdbd_exec_t:s0 +/usr/sbin/cupsd -- system_u:object_r:cupsd_exec_t:s0 +/usr/sbin/ddtcd -- system_u:object_r:ddclient_exec_t:s0 +/usr/sbin/dictd -- system_u:object_r:dictd_exec_t:s0 +/usr/sbin/fcron -- system_u:object_r:crond_exec_t:s0 +/usr/sbin/fdisk -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/hpiod -- system_u:object_r:cupsd_exec_t:s0 +/usr/sbin/ibacm -- system_u:object_r:ibacm_exec_t:s0 +/usr/sbin/iotop -- system_u:object_r:iotop_exec_t:s0 +/usr/sbin/ipppd -- system_u:object_r:pppd_exec_t:s0 +/usr/sbin/ipsec -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/sbin/ipset -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/isisd -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/isnsd -- system_u:object_r:isnsd_exec_t:s0 +/usr/sbin/kdump -- system_u:object_r:kdump_exec_t:s0 +/usr/sbin/kexec -- system_u:object_r:kdump_exec_t:s0 +/usr/sbin/klogd -- system_u:object_r:klogd_exec_t:s0 +/usr/sbin/lircd -- system_u:object_r:lircd_exec_t:s0 +/usr/sbin/lldpd -- system_u:object_r:lldpad_exec_t:s0 +/usr/sbin/lwiod -- system_u:object_r:lwiod_exec_t:s0 +/usr/sbin/lwsmd -- system_u:object_r:lwsmd_exec_t:s0 +/usr/sbin/mdadm -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/mdmon -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/mdmpd -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/mip6d -- system_u:object_r:mip6d_exec_t:s0 +/usr/sbin/named -- system_u:object_r:named_exec_t:s0 +/usr/sbin/nginx -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/nhrpd -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/nslcd -- system_u:object_r:nslcd_exec_t:s0 +/usr/sbin/partx -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/pcscd -- system_u:object_r:pcscd_exec_t:s0 +/usr/sbin/pingd -- system_u:object_r:pingd_exec_t:s0 +/usr/sbin/pirut -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/ptp4l -- system_u:object_r:ptp4l_exec_t:s0 +/usr/sbin/pulse -- system_u:object_r:piranha_pulse_exec_t:s0 +/usr/sbin/qpidd -- system_u:object_r:qpidd_exec_t:s0 +/usr/sbin/radvd -- system_u:object_r:radvd_exec_t:s0 +/usr/sbin/rdisc -- system_u:object_r:rdisc_exec_t:s0 +/usr/sbin/rhnsd -- system_u:object_r:rhnsd_exec_t:s0 +/usr/sbin/ricci -- system_u:object_r:ricci_exec_t:s0 +/usr/sbin/rmail -- system_u:object_r:sendmail_exec_t:s0 +/usr/sbin/roled -- system_u:object_r:rolekit_exec_t:s0 +/usr/sbin/rshim -- system_u:object_r:rshim_exec_t:s0 +/usr/sbin/rwhod -- system_u:object_r:rwho_exec_t:s0 +/usr/sbin/salsa -- system_u:object_r:alsa_exec_t:s0 +/usr/sbin/sfcbd -- system_u:object_r:sblim_sfcbd_exec_t:s0 +/usr/sbin/slapd -- system_u:object_r:slapd_exec_t:s0 +/usr/sbin/smrsh -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/smtpd -- system_u:object_r:sendmail_exec_t:s0 +/usr/sbin/snmpd -- system_u:object_r:snmpd_exec_t:s0 +/usr/sbin/snort -- system_u:object_r:snort_exec_t:s0 +/usr/sbin/spamd -- system_u:object_r:spamd_exec_t:s0 +/usr/sbin/squid -- system_u:object_r:squid_exec_t:s0 +/usr/sbin/ssmtp -- system_u:object_r:sendmail_exec_t:s0 +/usr/sbin/stacd -- system_u:object_r:nvme_stas_exec_t:s0 +/usr/sbin/stafd -- system_u:object_r:nvme_stas_exec_t:s0 +/usr/sbin/tuned -- system_u:object_r:tuned_exec_t:s0 +/usr/sbin/udevd -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/ulogd -- system_u:object_r:ulogd_exec_t:s0 +/usr/sbin/uuidd -- system_u:object_r:uuidd_exec_t:s0 +/usr/sbin/zebra -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/zonec -- system_u:object_r:nsd_exec_t:s0 +/var/log/iprdbg -- system_u:object_r:mdadm_log_t:s0 +/var/log/syslog -- system_u:object_r:var_log_t:s0 +/var/tmp/DNS_25 -- system_u:object_r:krb5_host_rcache_t:s0 +/var/tmp/host_0 -- system_u:object_r:krb5_host_rcache_t:s0 +/var/tmp/imap_0 -- system_u:object_r:krb5_host_rcache_t:s0 +/etc/cups/certs -d system_u:object_r:cupsd_rw_etc_t:s0 +/tmp/lost\+found -d system_u:object_r:lost_found_t:s0 +/usr/lib/amanda -d system_u:object_r:amanda_usr_lib_t:s0 +/usr/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/lib/amanda -d system_u:object_r:amanda_var_lib_t:s0 +/var/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/spool/cron -d system_u:object_r:user_cron_spool_t:s0 +/dev/cachefiles -c system_u:object_r:cachefiles_device_t:s0 +/dev/controlD64 -c system_u:object_r:xserver_misc_device_t:s0 +/dev/input/mice -c system_u:object_r:mouse_device_t:s0 +/dev/sequencer2 -c system_u:object_r:sound_device_t:s0 +/dev/usb/rio500 -c system_u:object_r:removable_device_t:s0 +/dev/xen/evtchn -c system_u:object_r:xen_device_t:s0 +/dev/xen/gntdev -c system_u:object_r:xen_device_t:s0 +/dev/xen/xenbus -c system_u:object_r:xen_device_t:s0 +/etc/dcc/dccifd -s system_u:object_r:dccifd_var_run_t:s0 +/var/run/\.zebra -s system_u:object_r:zebra_var_run_t:s0 +/var/run/\.zserv -s system_u:object_r:zebra_var_run_t:s0 +/var/run/zarafa -s system_u:object_r:zarafa_server_var_run_t:s0 +/var/run/ecblp0 -p system_u:object_r:cupsd_var_run_t:s0 +/etc/krb5\.keytab system_u:object_r:krb5_keytab_t:s0 +/root/\.Xdefaults system_u:object_r:config_home_t:s0 +/bin/dbus-daemon -- system_u:object_r:dbusd_exec_t:s0 +/etc/fetchmailrc -- system_u:object_r:fetchmail_etc_t:s0 +/etc/ld\.so\.cache -- system_u:object_r:ld_so_cache_t:s0 +/etc/passwd\.lock -- system_u:object_r:passwd_file_t:s0 +/etc/rsyncd\.conf -- system_u:object_r:rsync_etc_t:s0 +/etc/sddm/Xsetup -- system_u:object_r:bin_t:s0 +/etc/thttpd\.conf -- system_u:object_r:httpd_config_t:s0 +/etc/ypserv\.conf -- system_u:object_r:ypserv_conf_t:s0 +/root/\.cvsignore -- system_u:object_r:cvs_home_t:s0 +/root/\.hushlogin -- system_u:object_r:local_login_home_t:s0 +/sbin/cryptsetup -- system_u:object_r:lvm_exec_t:s0 +/sbin/exfatlabel -- system_u:object_r:fsadm_exec_t:s0 +/sbin/lvm\.static -- system_u:object_r:lvm_exec_t:s0 +/sbin/mkreiserfs -- system_u:object_r:fsadm_exec_t:s0 +/sbin/multipathd -- system_u:object_r:lvm_exec_t:s0 +/sbin/raid-check -- system_u:object_r:mdadm_exec_t:s0 +/sbin/restorecon -- system_u:object_r:setfiles_exec_t:s0 +/sbin/start_udev -- system_u:object_r:udev_exec_t:s0 +/sbin/usbmodules -- system_u:object_r:usbmodules_exec_t:s0 +/sbin/xfs_growfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/X11R6/bin/X -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/apt-get -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/awffull -- system_u:object_r:webalizer_exec_t:s0 +/usr/bin/chronyc -- system_u:object_r:chronyc_exec_t:s0 +/usr/bin/dccproc -- system_u:object_r:dcc_client_exec_t:s0 +/usr/bin/ftpdctl -- system_u:object_r:ftpdctl_exec_t:s0 +/usr/bin/gnomine -- system_u:object_r:games_exec_t:s0 +/usr/bin/gnotski -- system_u:object_r:games_exec_t:s0 +/usr/bin/gpasswd -- system_u:object_r:groupadd_exec_t:s0 +/usr/bin/iceauth -- system_u:object_r:iceauth_exec_t:s0 +/usr/bin/icecast -- system_u:object_r:icecast_exec_t:s0 +/usr/bin/katomic -- system_u:object_r:games_exec_t:s0 +/usr/bin/kbounce -- system_u:object_r:games_exec_t:s0 +/usr/bin/kshisen -- system_u:object_r:games_exec_t:s0 +/usr/bin/ksirtet -- system_u:object_r:games_exec_t:s0 +/usr/bin/mozilla -- system_u:object_r:mozilla_exec_t:s0 +/usr/bin/mplayer -- system_u:object_r:mplayer_exec_t:s0 +/usr/bin/msiexec -- system_u:object_r:wine_exec_t:s0 +/usr/bin/ncftool -- system_u:object_r:ncftool_exec_t:s0 +/usr/bin/newrole -- system_u:object_r:newrole_exec_t:s0 +/usr/bin/notepad -- system_u:object_r:wine_exec_t:s0 +/usr/bin/pmproxy -- system_u:object_r:pcp_pmproxy_exec_t:s0 +/usr/bin/prosody -- system_u:object_r:prosody_exec_t:s0 +/usr/bin/puppetd -- system_u:object_r:puppetagent_exec_t:s0 +/usr/bin/qemu-ga -- system_u:object_r:virt_qemu_ga_exec_t:s0 +/usr/bin/regedit -- system_u:object_r:wine_exec_t:s0 +/usr/bin/rpcbind -- system_u:object_r:rpcbind_exec_t:s0 +/usr/bin/scponly -- system_u:object_r:shell_exec_t:s0 +/usr/bin/setlock -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/stunnel -- system_u:object_r:stunnel_exec_t:s0 +/usr/bin/systemd -- system_u:object_r:init_exec_t:s0 +/usr/bin/targetd -- system_u:object_r:targetd_exec_t:s0 +/usr/bin/tinyirc -- system_u:object_r:irc_exec_t:s0 +/usr/bin/udevadm -- system_u:object_r:udev_exec_t:s0 +/usr/bin/unikeys -- system_u:object_r:loadkeys_exec_t:s0 +/usr/bin/wpa_cli -- system_u:object_r:wpa_cli_exec_t:s0 +/usr/sbin/accept -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/accton -- system_u:object_r:acct_exec_t:s0 +/usr/sbin/arping -- system_u:object_r:netutils_exec_t:s0 +/usr/sbin/atftpd -- system_u:object_r:tftpd_exec_t:s0 +/usr/sbin/auditd -- system_u:object_r:auditd_exec_t:s0 +/usr/sbin/babeld -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/boothd -- system_u:object_r:boothd_exec_t:s0 +/usr/sbin/cfdisk -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/dccifd -- system_u:object_r:dccifd_exec_t:s0 +/usr/sbin/dhcdbd -- system_u:object_r:dhcpc_exec_t:s0 +/usr/sbin/dhcpcd -- system_u:object_r:dhcpc_exec_t:s0 +/usr/sbin/dmraid -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/e2fsck -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/e4fsck -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/epylog -- system_u:object_r:logwatch_exec_t:s0 +/usr/sbin/fenced -- system_u:object_r:fenced_exec_t:s0 +/usr/sbin/findfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ftpwho -- system_u:object_r:ftpd_exec_t:s0 +/usr/sbin/groupd -- system_u:object_r:groupd_exec_t:s0 +/usr/sbin/hdparm -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/hping2 -- system_u:object_r:ping_exec_t:s0 +/usr/sbin/icinga -- system_u:object_r:nagios_exec_t:s0 +/usr/sbin/identd -- system_u:object_r:inetd_child_exec_t:s0 +/usr/sbin/iscsid -- system_u:object_r:iscsid_exec_t:s0 +/usr/sbin/kpartx -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/kpatch -- system_u:object_r:kpatch_exec_t:s0 +/usr/sbin/kpropd -- system_u:object_r:kpropd_exec_t:s0 +/usr/sbin/ktalkd -- system_u:object_r:ktalkd_exec_t:s0 +/usr/sbin/lldpad -- system_u:object_r:lldpad_exec_t:s0 +/usr/sbin/lpinfo -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/lpmove -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/lsassd -- system_u:object_r:lsassd_exec_t:s0 +/usr/sbin/lsraid -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/lvmsar -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvscan -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lwregd -- system_u:object_r:lwregd_exec_t:s0 +/usr/sbin/lwresd -- system_u:object_r:named_exec_t:s0 +/usr/sbin/mcelog -- system_u:object_r:mcelog_exec_t:s0 +/usr/sbin/mke2fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/mke4fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/mkraid -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/nagios -- system_u:object_r:nagios_exec_t:s0 +/usr/sbin/ninfod -- system_u:object_r:ninfod_exec_t:s0 +/usr/sbin/parted -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/pvdata -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pvmove -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pvscan -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pwconv -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/qatmgr -- system_u:object_r:qatlib_exec_t:s0 +/usr/sbin/qdiskd -- system_u:object_r:qdiskd_exec_t:s0 +/usr/sbin/racoon -- system_u:object_r:racoon_exec_t:s0 +/usr/sbin/reposd -- system_u:object_r:sblim_reposd_exec_t:s0 +/usr/sbin/ripngd -- system_u:object_r:zebra_exec_t:s0 +/usr/sbin/rklogd -- system_u:object_r:klogd_exec_t:s0 +/usr/sbin/setkey -- system_u:object_r:setkey_exec_t:s0 +/usr/sbin/sfdisk -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/smartd -- system_u:object_r:fsdaemon_exec_t:s0 +/usr/sbin/spampd -- system_u:object_r:spamd_exec_t:s0 +/usr/sbin/startx -- system_u:object_r:initrc_exec_t:s0 +/usr/sbin/suexec -- system_u:object_r:httpd_suexec_exec_t:s0 +/usr/sbin/thttpd -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/upsmon -- system_u:object_r:nut_upsmon_exec_t:s0 +/usr/sbin/uucico -- system_u:object_r:uucpd_exec_t:s0 +/usr/sbin/vgscan -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vsftpd -- system_u:object_r:ftpd_exec_t:s0 +/usr/sbin/ypbind -- system_u:object_r:ypbind_exec_t:s0 +/usr/sbin/ypserv -- system_u:object_r:ypserv_exec_t:s0 +/var/axfrdns/run -- system_u:object_r:svc_run_exec_t:s0 +/var/lib/dcc/map -- system_u:object_r:dcc_client_map_t:s0 +/var/run/atd\.pid -- system_u:object_r:crond_var_run_t:s0 +/var/run/cvs\.pid -- system_u:object_r:cvs_var_run_t:s0 +/var/run/dcc/map -- system_u:object_r:dcc_client_map_t:s0 +/var/run/fos\.pid -- system_u:object_r:piranha_fos_var_run_t:s0 +/var/run/gpm\.pid -- system_u:object_r:gpm_var_run_t:s0 +/var/run/lvs\.pid -- system_u:object_r:piranha_lvs_var_run_t:s0 +/var/run/nsd\.pid -- system_u:object_r:nsd_var_run_t:s0 +/var/run/xdm\.pid -- system_u:object_r:xdm_var_run_t:s0 +/var/tinydns/run -- system_u:object_r:svc_run_exec_t:s0 +/var/tmp/HTTP_23 -- system_u:object_r:krb5_host_rcache_t:s0 +/var/tmp/HTTP_48 -- system_u:object_r:krb5_host_rcache_t:s0 +/var/tmp/ldap_55 -- system_u:object_r:krb5_host_rcache_t:s0 +/boot/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/qmail/alias -d system_u:object_r:qmail_alias_home_t:s0 +/var/spool/fcron -d system_u:object_r:cron_spool_t:s0 +/dev/sgx_enclave -c system_u:object_r:sgx_enclave_device_t:s0 +/dev/userfaultfd -c system_u:object_r:userfaultfd_device_t:s0 +/dev/vga_arbiter -c system_u:object_r:xserver_misc_device_t:s0 +/dev/vhost-vsock -c system_u:object_r:vhost_device_t:s0 +/dev/xen/privcmd -c system_u:object_r:xen_device_t:s0 +/run/docker\.sock -s system_u:object_r:container_var_run_t:s0 +/var/run/evtchnd -s system_u:object_r:evtchnd_var_run_t:s0 +/var/run/isnsctl -s system_u:object_r:isnsd_var_run_t:s0 +/var/run/nsd\.ctl -s system_u:object_r:nsd_var_run_t:s0 +/var/run/initctl -p system_u:object_r:initctl_t:s0 +/bin/yum-builddep -- system_u:object_r:rpm_exec_t:s0 +/etc/asound\.state -- system_u:object_r:alsa_etc_rw_t:s0 +/etc/cgrules\.conf -- system_u:object_r:cgrules_etc_t:s0 +/etc/default/grub -- system_u:object_r:bootloader_etc_t:s0 +/etc/dnsmasq\.conf -- system_u:object_r:dnsmasq_etc_t:s0 +/etc/fstab\.REVOKE -- system_u:object_r:etc_runtime_t:s0 +/etc/ld\.so\.cache~ -- system_u:object_r:ld_so_cache_t:s0 +/etc/machine-info -- system_u:object_r:hostname_etc_t:s0 +/etc/mrtg/mrtg\.ok -- system_u:object_r:mrtg_lock_t:s0 +/etc/proftpd\.conf -- system_u:object_r:ftpd_etc_t:s0 +/lib/udev/scsi_id -- system_u:object_r:bin_t:s0 +/opt/kde3/bin/kdm -- system_u:object_r:xdm_exec_t:s0 +/root/\.fonts\.conf -- system_u:object_r:user_fonts_config_t:s0 +/root/\.k5identity -- system_u:object_r:krb5_home_t:s0 +/root/\.procmailrc -- system_u:object_r:procmail_home_t:s0 +/root/dead\.letter -- system_u:object_r:mail_home_t:s0 +/run/cockpit/motd -- system_u:object_r:etc_t:s0 +/sbin/cachefilesd -- system_u:object_r:cachefilesd_exec_t:s0 +/sbin/cgrulesengd -- system_u:object_r:cgred_exec_t:s0 +/sbin/e2mmpstatus -- system_u:object_r:fsadm_exec_t:s0 +/sbin/install-mbr -- system_u:object_r:fsadm_exec_t:s0 +/sbin/load_policy -- system_u:object_r:load_policy_exec_t:s0 +/sbin/lvmdiskscan -- system_u:object_r:lvm_exec_t:s0 +/sbin/mkfs\.cramfs -- system_u:object_r:bin_t:s0 +/sbin/mount\.crypt -- system_u:object_r:lvm_exec_t:s0 +/sbin/netlabelctl -- system_u:object_r:netlabel_mgmt_exec_t:s0 +/sbin/portreserve -- system_u:object_r:portreserve_exec_t:s0 +/sbin/raidautorun -- system_u:object_r:fsadm_exec_t:s0 +/sbin/tcb_convert -- system_u:object_r:updpwd_exec_t:s0 +/sbin/unix_chkpwd -- system_u:object_r:chkpwd_exec_t:s0 +/sbin/unix_update -- system_u:object_r:updpwd_exec_t:s0 +/sbin/unix_verify -- system_u:object_r:chkpwd_exec_t:s0 +/sbin/vgcfgbackup -- system_u:object_r:lvm_exec_t:s0 +/usr/bin/Xwayland -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/atlantik -- system_u:object_r:games_exec_t:s0 +/usr/bin/cdrecord -- system_u:object_r:cdrecord_exec_t:s0 +/usr/bin/clamscan -- system_u:object_r:antivirus_exec_t:s0 +/usr/bin/cobblerd -- system_u:object_r:cobblerd_exec_t:s0 +/usr/bin/cyphesis -- system_u:object_r:cyphesis_exec_t:s0 +/usr/bin/epiphany -- system_u:object_r:mozilla_exec_t:s0 +/usr/bin/fail2ban -- system_u:object_r:fail2ban_exec_t:s0 +/usr/bin/gnibbles -- system_u:object_r:games_exec_t:s0 +/usr/bin/gnobots2 -- system_u:object_r:games_exec_t:s0 +/usr/bin/hostname -- system_u:object_r:hostname_exec_t:s0 +/usr/bin/kdumpctl -- system_u:object_r:kdumpctl_exec_t:s0 +/usr/bin/kenolaba -- system_u:object_r:games_exec_t:s0 +/usr/bin/klickety -- system_u:object_r:games_exec_t:s0 +/usr/bin/konquest -- system_u:object_r:games_exec_t:s0 +/usr/bin/kreversi -- system_u:object_r:games_exec_t:s0 +/usr/bin/ksokoban -- system_u:object_r:games_exec_t:s0 +/usr/bin/loadkeys -- system_u:object_r:loadkeys_exec_t:s0 +/usr/bin/mahjongg -- system_u:object_r:games_exec_t:s0 +/usr/bin/mencoder -- system_u:object_r:mencoder_exec_t:s0 +/usr/bin/multilog -- system_u:object_r:svc_multilog_exec_t:s0 +/usr/bin/netscape -- system_u:object_r:mozilla_exec_t:s0 +/usr/bin/nova-api -- system_u:object_r:nova_exec_t:s0 +/usr/bin/pgrphack -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/plymouth -- system_u:object_r:plymouth_exec_t:s0 +/usr/bin/pmlogger -- system_u:object_r:pcp_pmlogger_exec_t:s0 +/usr/bin/procmail -- system_u:object_r:procmail_exec_t:s0 +/usr/bin/puppetca -- system_u:object_r:puppetca_exec_t:s0 +/usr/bin/qemu-kvm -- system_u:object_r:qemu_exec_t:s0 +/usr/bin/regsvr32 -- system_u:object_r:wine_exec_t:s0 +/usr/bin/sa-learn -- system_u:object_r:spamc_exec_t:s0 +/usr/bin/sepg_ctl -- system_u:object_r:initrc_exec_t:s0 +/usr/bin/smbmount -- system_u:object_r:smbmount_exec_t:s0 +/usr/bin/svnserve -- system_u:object_r:svnserve_exec_t:s0 +/usr/bin/syslinux -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/udevinfo -- system_u:object_r:udev_exec_t:s0 +/usr/bin/virt-who -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/vmtoolsd -- system_u:object_r:vmtools_exec_t:s0 +/usr/bin/wg-quick -- system_u:object_r:wireguard_exec_t:s0 +/usr/lib/pt_chown -- system_u:object_r:ptchown_exec_t:s0 +/usr/lib/rpm/rpmd -- system_u:object_r:bin_t:s0 +/usr/lib/rpm/rpmk -- system_u:object_r:bin_t:s0 +/usr/lib/rpm/rpmq -- system_u:object_r:bin_t:s0 +/usr/lib/rpm/rpmv -- system_u:object_r:bin_t:s0 +/usr/lib/sendmail -- system_u:object_r:sendmail_exec_t:s0 +/usr/lib/yp/ypxfr -- system_u:object_r:ypxfr_exec_t:s0 +/usr/libexec/sesh -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/\_kpropd -- system_u:object_r:kpropd_exec_t:s0 +/usr/sbin/aisexec -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/alsactl -- system_u:object_r:alsa_exec_t:s0 +/usr/sbin/amandad -- system_u:object_r:amanda_inetd_exec_t:s0 +/usr/sbin/anacron -- system_u:object_r:anacron_exec_t:s0 +/usr/sbin/apcupsd -- system_u:object_r:apcupsd_exec_t:s0 +/usr/sbin/audispd -- system_u:object_r:audisp_exec_t:s0 +/usr/sbin/bitlbee -- system_u:object_r:bitlbee_exec_t:s0 +/usr/sbin/blkmapd -- system_u:object_r:blkmapd_exec_t:s0 +/usr/sbin/cardctl -- system_u:object_r:cardctl_exec_t:s0 +/usr/sbin/cardmgr -- system_u:object_r:cardmgr_exec_t:s0 +/usr/sbin/cgclear -- system_u:object_r:cgclear_exec_t:s0 +/usr/sbin/checkpc -- system_u:object_r:checkpc_exec_t:s0 +/usr/sbin/chronyd -- system_u:object_r:chronyd_exec_t:s0 +/usr/sbin/conmand -- system_u:object_r:conman_exec_t:s0 +/usr/sbin/dbclean -- system_u:object_r:dcc_dbclean_exec_t:s0 +/usr/sbin/dcerpcd -- system_u:object_r:dcerpcd_exec_t:s0 +/usr/sbin/dmsetup -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/dnsmasq -- system_u:object_r:dnsmasq_exec_t:s0 +/usr/sbin/dosfsck -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/dovecot -- system_u:object_r:dovecot_exec_t:s0 +/usr/sbin/drbdadm -- system_u:object_r:drbd_exec_t:s0 +/usr/sbin/e2fsadm -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/e2label -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ethtool -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/evtchnd -- system_u:object_r:evtchnd_exec_t:s0 +/usr/sbin/fcoemon -- system_u:object_r:fcoemon_exec_t:s0 +/usr/sbin/foghorn -- system_u:object_r:foghorn_exec_t:s0 +/usr/sbin/gatherd -- system_u:object_r:sblim_gatherd_exec_t:s0 +/usr/sbin/gpasswd -- system_u:object_r:groupadd_exec_t:s0 +/usr/sbin/grpconv -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/gsisshd -- system_u:object_r:sshd_exec_t:s0 +/usr/sbin/haproxy -- system_u:object_r:haproxy_exec_t:s0 +/usr/sbin/haveged -- system_u:object_r:entropyd_exec_t:s0 +/usr/sbin/hddtemp -- system_u:object_r:hddtemp_exec_t:s0 +/usr/sbin/hid2hci -- system_u:object_r:bluetooth_exec_t:s0 +/usr/sbin/hostapd -- system_u:object_r:hostapd_exec_t:s0 +/usr/sbin/hwclock -- system_u:object_r:hwclock_exec_t:s0 +/usr/sbin/in\.ftpd -- system_u:object_r:ftpd_exec_t:s0 +/usr/sbin/in\.rshd -- system_u:object_r:rshd_exec_t:s0 +/usr/sbin/iodined -- system_u:object_r:iodined_exec_t:s0 +/usr/sbin/ipmievd -- system_u:object_r:ipmievd_exec_t:s0 +/usr/sbin/iprdump -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/iprinit -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/ipvsadm -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/jserver -- system_u:object_r:canna_exec_t:s0 +/usr/sbin/lockdev -- system_u:object_r:lockdev_exec_t:s0 +/usr/sbin/lpadmin -- system_u:object_r:lpr_exec_t:s0 +/usr/sbin/lvmetad -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmsadc -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/metalog -- system_u:object_r:syslogd_exec_t:s0 +/usr/sbin/mkdosfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/mkudffs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/nfsdcld -- system_u:object_r:rpcd_exec_t:s0 +/usr/sbin/nologin -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/ntpdate -- system_u:object_r:ntpdate_exec_t:s0 +/usr/sbin/oddjobd -- system_u:object_r:oddjob_exec_t:s0 +/usr/sbin/openvpn -- system_u:object_r:openvpn_exec_t:s0 +/usr/sbin/phc2sys -- system_u:object_r:phc2sys_exec_t:s0 +/usr/sbin/php-fpm -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/portmap -- system_u:object_r:portmap_exec_t:s0 +/usr/sbin/postcat -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/postfix -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/postlog -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/postmap -- system_u:object_r:postfix_map_exec_t:s0 +/usr/sbin/privoxy -- system_u:object_r:privoxy_exec_t:s0 +/usr/sbin/proftpd -- system_u:object_r:ftpd_exec_t:s0 +/usr/sbin/puppetd -- system_u:object_r:puppetagent_exec_t:s0 +/usr/sbin/radiusd -- system_u:object_r:radiusd_exec_t:s0 +/usr/sbin/rlinetd -- system_u:object_r:inetd_exec_t:s0 +/usr/sbin/rpcbind -- system_u:object_r:rpcbind_exec_t:s0 +/usr/sbin/sanlock -- system_u:object_r:sanlock_exec_t:s0 +/usr/sbin/sensord -- system_u:object_r:sensord_exec_t:s0 +/usr/sbin/sqlgrey -- system_u:object_r:greylist_milter_exec_t:s0 +/usr/sbin/srvsvcd -- system_u:object_r:srvsvcd_exec_t:s0 +/usr/sbin/stunnel -- system_u:object_r:stunnel_exec_t:s0 +/usr/sbin/sulogin -- system_u:object_r:sulogin_exec_t:s0 +/usr/sbin/sushell -- system_u:object_r:sulogin_exec_t:s0 +/usr/sbin/swanctl -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/sbin/swapoff -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/syslogd -- system_u:object_r:syslogd_exec_t:s0 +/usr/sbin/tapdisk -- system_u:object_r:blktap_exec_t:s0 +/usr/sbin/tcpdump -- system_u:object_r:netutils_exec_t:s0 +/usr/sbin/tune2fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/udevadm -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/unbound -- system_u:object_r:named_exec_t:s0 +/usr/sbin/up2date -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/upstart -- system_u:object_r:init_exec_t:s0 +/usr/sbin/usbmuxd -- system_u:object_r:usbmuxd_exec_t:s0 +/usr/sbin/useradd -- system_u:object_r:useradd_exec_t:s0 +/usr/sbin/userdel -- system_u:object_r:useradd_exec_t:s0 +/usr/sbin/usermod -- system_u:object_r:useradd_exec_t:s0 +/usr/sbin/vgmerge -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgsplit -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vhostmd -- system_u:object_r:vhostmd_exec_t:s0 +/usr/sbin/virtvzd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/vnstatd -- system_u:object_r:vnstatd_exec_t:s0 +/usr/sbin/wpa_cli -- system_u:object_r:wpa_cli_exec_t:s0 +/var/dnscache/run -- system_u:object_r:svc_run_exec_t:s0 +/var/log/sudo\.log -- system_u:object_r:sudo_log_t:s0 +/var/run/abrt\.pid -- system_u:object_r:abrt_var_run_t:s0 +/var/run/apmd\.pid -- system_u:object_r:apmd_var_run_t:s0 +/var/run/gpsd\.pid -- system_u:object_r:gpsd_var_run_t:s0 +/var/run/innd\.pid -- system_u:object_r:innd_var_run_t:s0 +/var/run/iwhd\.pid -- system_u:object_r:iwhd_var_run_t:s0 +/var/run/lxdm\.pid -- system_u:object_r:xdm_var_run_t:s0 +/var/run/mrtg\.pid -- system_u:object_r:mrtg_var_run_t:s0 +/var/run/news\.pid -- system_u:object_r:innd_var_run_t:s0 +/var/run/nscd\.pid -- system_u:object_r:nscd_var_run_t:s0 +/var/run/ntop\.pid -- system_u:object_r:ntop_var_run_t:s0 +/var/run/ntpd\.pid -- system_u:object_r:ntpd_var_run_t:s0 +/var/run/pads\.pid -- system_u:object_r:pads_var_run_t:s0 +/var/run/pdns\.pid -- system_u:object_r:pdns_var_run_t:s0 +/var/run/rngd\.pid -- system_u:object_r:rngd_var_run_t:s0 +/var/run/slpd\.pid -- system_u:object_r:slpd_var_run_t:s0 +/var/run/sshd\.pid -- system_u:object_r:sshd_var_run_t:s0 +/var/run/wicd\.pid -- system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/xend\.pid -- system_u:object_r:xend_var_run_t:s0 +/var/tmp/kadmin_0 -- system_u:object_r:kadmind_tmp_t:s0 +/var/tmp/kiprop_0 -- system_u:object_r:kadmind_tmp_t:s0 +/var/tmp/ldap_487 -- system_u:object_r:krb5_host_rcache_t:s0 +/etc/udev/devices -d system_u:object_r:device_t:s0 +/sys/kernel/debug -d system_u:object_r:debugfs_t:s0 +/var/tmp/tmp-inst -d system_u:object_r:tmp_t:s0 +/dev/input/uinput -c system_u:object_r:event_device_t:s0 +/dev/loop-control -c system_u:object_r:loop_control_device_t:s0 +/dev/nvme-fabrics -c system_u:object_r:fixed_disk_device_t:s0 +/dev/papr-sysparm -c system_u:object_r:papr_sysparm_device_t:s0 +/dev/vmbus/hv_kvp -c system_u:object_r:hypervkvp_device_t:s0 +/dev/vmbus/hv_vss -c system_u:object_r:hypervvssd_device_t:s0 +/dev/xen/gntalloc -c system_u:object_r:xen_device_t:s0 +/usr/bin/pkidaemon system_u:object_r:pki_tomcat_exec_t:s0 +/var/run/pasta\.pid system_u:object_r:pasta_pid_t:s0 +/etc/cgconfig\.conf -- system_u:object_r:cgconfig_etc_t:s0 +/etc/cups/ppds\.dat -- system_u:object_r:cupsd_rw_etc_t:s0 +/etc/ddclient\.conf -- system_u:object_r:ddclient_etc_t:s0 +/etc/ld\.so\.preload -- system_u:object_r:ld_so_cache_t:s0 +/etc/lxdm/Xsession -- system_u:object_r:bin_t:s0 +/etc/minidlna\.conf -- system_u:object_r:minidlna_conf_t:s0 +/etc/prelink\.cache -- system_u:object_r:prelink_cache_t:s0 +/etc/sddm/Xsession -- system_u:object_r:bin_t:s0 +/etc/sysconfig/qat -- system_u:object_r:qatlib_conf_t:s0 +/etc/xen/qemu-ifup -- system_u:object_r:bin_t:s0 +/lib/udev/udev-acl -- system_u:object_r:udev_exec_t:s0 +/root/\.fetchmailrc -- system_u:object_r:fetchmail_home_t:s0 +/sbin/make_reiser4 -- system_u:object_r:fsadm_exec_t:s0 +/sbin/pppoe-server -- system_u:object_r:pppd_exec_t:s0 +/sbin/umount\.crypt -- system_u:object_r:lvm_exec_t:s0 +/sbin/vgcfgrestore -- system_u:object_r:lvm_exec_t:s0 +/usr/bin/Maelstrom -- system_u:object_r:games_exec_t:s0 +/usr/bin/afterburn -- system_u:object_r:afterburn_exec_t:s0 +/usr/bin/apt-shell -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/blackjack -- system_u:object_r:games_exec_t:s0 +/usr/bin/bootupctl -- system_u:object_r:bootupd_exec_t:s0 +/usr/bin/cannaping -- system_u:object_r:canna_exec_t:s0 +/usr/bin/clamdscan -- system_u:object_r:antivirus_exec_t:s0 +/usr/bin/envuidgid -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/fetchmail -- system_u:object_r:fetchmail_exec_t:s0 +/usr/bin/freshclam -- system_u:object_r:antivirus_exec_t:s0 +/usr/bin/git-shell -- system_u:object_r:shell_exec_t:s0 +/usr/bin/gnotravex -- system_u:object_r:games_exec_t:s0 +/usr/bin/gpg-agent -- system_u:object_r:gpg_agent_exec_t:s0 +/usr/bin/growisofs -- system_u:object_r:cdrecord_exec_t:s0 +/usr/bin/htsslpass -- system_u:object_r:httpd_helper_exec_t:s0 +/usr/bin/imgfac\.py -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/kblackbox -- system_u:object_r:games_exec_t:s0 +/usr/bin/kfouleggs -- system_u:object_r:games_exec_t:s0 +/usr/bin/kmahjongg -- system_u:object_r:games_exec_t:s0 +/usr/bin/kwin4proc -- system_u:object_r:games_exec_t:s0 +/usr/bin/lpoptions -- system_u:object_r:lpr_exec_t:s0 +/usr/bin/lskatproc -- system_u:object_r:games_exec_t:s0 +/usr/bin/memcached -- system_u:object_r:memcached_exec_t:s0 +/usr/bin/nova-cert -- system_u:object_r:nova_exec_t:s0 +/usr/bin/ntlm_auth -- system_u:object_r:winbind_helper_exec_t:s0 +/usr/bin/ovs-vsctl -- system_u:object_r:openvswitch_exec_t:s0 +/usr/bin/podsleuth -- system_u:object_r:podsleuth_exec_t:s0 +/usr/bin/repoquery -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/rhsmcertd -- system_u:object_r:rhsmcertd_exec_t:s0 +/usr/bin/rrdcached -- system_u:object_r:rrdcached_exec_t:s0 +/usr/bin/sa-update -- system_u:object_r:spamd_update_exec_t:s0 +/usr/bin/setuidgid -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/sge_execd -- system_u:object_r:sge_execd_exec_t:s0 +/usr/bin/softlimit -- system_u:object_r:svc_run_exec_t:s0 +/usr/bin/ssh-agent -- system_u:object_r:ssh_agent_exec_t:s0 +/usr/bin/supervise -- system_u:object_r:svc_start_exec_t:s0 +/usr/bin/systemctl -- system_u:object_r:systemd_systemctl_exec_t:s0 +/usr/bin/udisksctl -- system_u:object_r:devicekit_exec_t:s0 +/usr/bin/webalizer -- system_u:object_r:webalizer_exec_t:s0 +/usr/bin/wireshark -- system_u:object_r:wireshark_exec_t:s0 +/usr/lib/ipsec/spi -- system_u:object_r:ipsec_exec_t:s0 +/usr/lib/pcsd/pcsd -- system_u:object_r:cluster_exec_t:s0 +/usr/libexec/boltd -- system_u:object_r:boltd_exec_t:s0 +/usr/libexec/fcron -- system_u:object_r:crond_exec_t:s0 +/usr/libexec/ipset -- system_u:object_r:iptables_exec_t:s0 +/usr/libexec/rhsmd -- system_u:object_r:rhsmcertd_exec_t:s0 +/usr/libexec/tangd -- system_u:object_r:tangd_exec_t:s0 +/usr/sbin/anaconda -- system_u:object_r:install_exec_t:s0 +/usr/sbin/arpwatch -- system_u:object_r:arpwatch_exec_t:s0 +/usr/sbin/asterisk -- system_u:object_r:asterisk_exec_t:s0 +/usr/sbin/auditctl -- system_u:object_r:auditctl_exec_t:s0 +/usr/sbin/bconsole -- system_u:object_r:bacula_admin_exec_t:s0 +/usr/sbin/blockdev -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ccs_tool -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/cf-execd -- system_u:object_r:cfengine_execd_exec_t:s0 +/usr/sbin/cherokee -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/chpasswd -- system_u:object_r:passwd_exec_t:s0 +/usr/sbin/cmirrord -- system_u:object_r:cmirrord_exec_t:s0 +/usr/sbin/collectd -- system_u:object_r:collectd_exec_t:s0 +/usr/sbin/corosync -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/cpglockd -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/cpufreqd -- system_u:object_r:cpuspeed_exec_t:s0 +/usr/sbin/cpuplugd -- system_u:object_r:cpuplug_exec_t:s0 +/usr/sbin/cpuspeed -- system_u:object_r:cpuspeed_exec_t:s0 +/usr/sbin/ddclient -- system_u:object_r:ddclient_exec_t:s0 +/usr/sbin/dmeventd -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/dumpe2fs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ebtables -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/groupadd -- system_u:object_r:groupadd_exec_t:s0 +/usr/sbin/groupdel -- system_u:object_r:groupadd_exec_t:s0 +/usr/sbin/groupmod -- system_u:object_r:groupadd_exec_t:s0 +/usr/sbin/gssproxy -- system_u:object_r:gssproxy_exec_t:s0 +/usr/sbin/ifconfig -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/in\.nnrpd -- system_u:object_r:innd_exec_t:s0 +/usr/sbin/in\.talkd -- system_u:object_r:ktalkd_exec_t:s0 +/usr/sbin/in\.tftpd -- system_u:object_r:tftpd_exec_t:s0 +/usr/sbin/ipmiseld -- system_u:object_r:freeipmi_ipmiseld_exec_t:s0 +/usr/sbin/iscsiadm -- system_u:object_r:iscsid_exec_t:s0 +/usr/sbin/iscsiuio -- system_u:object_r:iscsid_exec_t:s0 +/usr/sbin/iwconfig -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/ksmtuned -- system_u:object_r:ksmtuned_exec_t:s0 +/usr/sbin/ldconfig -- system_u:object_r:ldconfig_exec_t:s0 +/usr/sbin/libvirtd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/lighttpd -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/logcheck -- system_u:object_r:logwatch_exec_t:s0 +/usr/sbin/lvchange -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvcreate -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvextend -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmdbusd -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmlockd -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmpolld -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvreduce -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvremove -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvrename -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvresize -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/mii-tool -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/minidlna -- system_u:object_r:minidlna_exec_t:s0 +/usr/sbin/minilogd -- system_u:object_r:syslogd_exec_t:s0 +/usr/sbin/newusers -- system_u:object_r:useradd_exec_t:s0 +/usr/sbin/ns-slapd -- system_u:object_r:dirsrv_exec_t:s0 +/usr/sbin/opendkim -- system_u:object_r:dkim_milter_exec_t:s0 +/usr/sbin/openhpid -- system_u:object_r:openhpid_exec_t:s0 +/usr/sbin/pktsetup -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/pmap_set -- system_u:object_r:portmap_helper_exec_t:s0 +/usr/sbin/postdrop -- system_u:object_r:postfix_postdrop_exec_t:s0 +/usr/sbin/postgrey -- system_u:object_r:postgrey_exec_t:s0 +/usr/sbin/postkick -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/postlock -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/puppetca -- system_u:object_r:puppetca_exec_t:s0 +/usr/sbin/pvchange -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pvcreate -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pvremove -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pwunconv -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/rpc\.gssd -- system_u:object_r:gssd_exec_t:s0 +/usr/sbin/rpc\.nfsd -- system_u:object_r:nfsd_exec_t:s0 +/usr/sbin/rsyslogd -- system_u:object_r:syslogd_exec_t:s0 +/usr/sbin/run_init -- system_u:object_r:run_init_exec_t:s0 +/usr/sbin/scponlyc -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/semanage -- system_u:object_r:semanage_exec_t:s0 +/usr/sbin/semodule -- system_u:object_r:semanage_exec_t:s0 +/usr/sbin/send_arp -- system_u:object_r:ping_exec_t:s0 +/usr/sbin/smartctl -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/snapperd -- system_u:object_r:snapperd_exec_t:s0 +/usr/sbin/synaptic -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/tmpwatch -- system_u:object_r:tmpreaper_exec_t:s0 +/usr/sbin/udevsend -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/udflabel -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/updfstab -- system_u:object_r:updfstab_exec_t:s0 +/usr/sbin/utempter -- system_u:object_r:utempter_exec_t:s0 +/usr/sbin/validate -- system_u:object_r:chkpwd_exec_t:s0 +/usr/sbin/varnishd -- system_u:object_r:varnishd_exec_t:s0 +/usr/sbin/vgchange -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgcreate -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgexport -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgextend -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgimport -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgreduce -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgremove -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgrename -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/virtlogd -- system_u:object_r:virtlogd_exec_t:s0 +/usr/sbin/virtlxcd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/virtxend -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/watchdog -- system_u:object_r:watchdog_exec_t:s0 +/usr/sbin/winbindd -- system_u:object_r:winbind_exec_t:s0 +/usr/sbin/yum-cron -- system_u:object_r:rpm_exec_t:s0 +/usr/vice/etc/afsd -- system_u:object_r:afs_exec_t:s0 +/var/run/acpid\.pid -- system_u:object_r:apmd_var_run_t:s0 +/var/run/aiccu\.pid -- system_u:object_r:aiccu_var_run_t:s0 +/var/run/clogd\.pid -- system_u:object_r:clogd_var_run_t:s0 +/var/run/clvmd\.pid -- system_u:object_r:clvmd_var_run_t:s0 +/var/run/ddtcd\.pid -- system_u:object_r:ddclient_var_run_t:s0 +/var/run/dictd\.pid -- system_u:object_r:dictd_var_run_t:s0 +/var/run/fcron\.pid -- system_u:object_r:crond_var_run_t:s0 +/var/run/isnsd\.pid -- system_u:object_r:isnsd_var_run_t:s0 +/var/run/klogd\.pid -- system_u:object_r:klogd_var_run_t:s0 +/var/run/lircd\.pid -- system_u:object_r:lircd_var_run_t:s0 +/var/run/lwiod\.pid -- system_u:object_r:lwiod_var_run_t:s0 +/var/run/lxdm\.auth -- system_u:object_r:xdm_var_run_t:s0 +/var/run/numad\.pid -- system_u:object_r:numad_var_run_t:s0 +/var/run/pcscd\.pid -- system_u:object_r:pcscd_var_run_t:s0 +/var/run/pcscd\.pub -- system_u:object_r:pcscd_var_run_t:s0 +/var/run/pulse\.pid -- system_u:object_r:piranha_pulse_var_run_t:s0 +/var/run/qga\.state -- system_u:object_r:virt_qemu_ga_var_run_t:s0 +/var/run/qpidd\.pid -- system_u:object_r:qpidd_var_run_t:s0 +/var/run/radvd\.pid -- system_u:object_r:radvd_var_run_t:s0 +/var/run/rhnsd\.pid -- system_u:object_r:rhnsd_var_run_t:s0 +/var/run/ricci\.pid -- system_u:object_r:ricci_var_run_t:s0 +/var/run/slapd\.pid -- system_u:object_r:slapd_var_run_t:s0 +/var/run/snmpd\.pid -- system_u:object_r:snmpd_var_run_t:s0 +/var/run/tuned\.pid -- system_u:object_r:tuned_var_run_t:s0 +/dev/btrfs-control -c system_u:object_r:lvm_control_t:s0 +/dev/device-mapper -c system_u:object_r:fixed_disk_device_t:s0 +/dev/sgx_provision -c system_u:object_r:sgx_provision_device_t:s0 +/dev/xen/hypercall -c system_u:object_r:xen_device_t:s0 +/var/run/gpsd\.sock -s system_u:object_r:gpsd_var_run_t:s0 +/\.ismount-test-file -- system_u:object_r:sosreport_tmp_t:s0 +/bin/systemd-notify -- system_u:object_r:systemd_notify_exec_t:s0 +/dev/shm/icastats_0 -- system_u:object_r:ica_tmpfs_t:s0 +/etc/apcupsd/commok -- system_u:object_r:bin_t:s0 +/etc/default/gdomap -- system_u:object_r:gdomap_conf_t:s0 +/etc/ld\.so\.preload~ -- system_u:object_r:ld_so_cache_t:s0 +/etc/piranha/lvs\.cf -- system_u:object_r:piranha_etc_rw_t:s0 +/etc/racoon/psk\.txt -- system_u:object_r:ipsec_key_file_t:s0 +/etc/raddb/db\.daily -- system_u:object_r:radiusd_etc_rw_t:s0 +/etc/sysconfig/init -- system_u:object_r:bin_t:s0 +/etc/sysconfig/sslh -- system_u:object_r:sslh_config_t:s0 +/etc/webalizer\.conf -- system_u:object_r:webalizer_etc_t:s0 +/root/\.pulse-cookie -- system_u:object_r:pulseaudio_home_t:s0 +/sbin/audisp-remote -- system_u:object_r:audisp_remote_exec_t:s0 +/sbin/ipx_configure -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/ipx_interface -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/lvmiopversion -- system_u:object_r:lvm_exec_t:s0 +/sbin/microcode_ctl -- system_u:object_r:cpucontrol_exec_t:s0 +/sbin/tcb_unconvert -- system_u:object_r:updpwd_exec_t:s0 +/sbin/vgscan\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/X11R6/bin/Xorg -- system_u:object_r:xserver_exec_t:s0 +/usr/bin/alsaunmute -- system_u:object_r:alsa_exec_t:s0 +/usr/bin/certmaster -- system_u:object_r:certmaster_exec_t:s0 +/usr/bin/cinder-api -- system_u:object_r:cinder_api_exec_t:s0 +/usr/bin/cloud-init -- system_u:object_r:cloud_init_exec_t:s0 +/usr/bin/glance-api -- system_u:object_r:glance_api_exec_t:s0 +/usr/bin/journalctl -- system_u:object_r:journalctl_exec_t:s0 +/usr/bin/kasteroids -- system_u:object_r:games_exec_t:s0 +/usr/bin/ksmiletris -- system_u:object_r:games_exec_t:s0 +/usr/bin/kspaceduel -- system_u:object_r:games_exec_t:s0 +/usr/bin/ktuberling -- system_u:object_r:games_exec_t:s0 +/usr/bin/mimedefang -- system_u:object_r:spamd_exec_t:s0 +/usr/bin/mountpoint -- system_u:object_r:bin_t:s0 +/usr/bin/nova-cells -- system_u:object_r:nova_exec_t:s0 +/usr/bin/ovs-appctl -- system_u:object_r:openvswitch_exec_t:s0 +/usr/bin/prosodyctl -- system_u:object_r:prosody_exec_t:s0 +/usr/bin/pulseaudio -- system_u:object_r:pulseaudio_exec_t:s0 +/usr/bin/rpm-ostree -- system_u:object_r:install_exec_t:s0 +/usr/bin/same-gnome -- system_u:object_r:games_exec_t:s0 +/usr/bin/smbcontrol -- system_u:object_r:smbcontrol_exec_t:s0 +/usr/bin/ssh-keygen -- system_u:object_r:ssh_keygen_exec_t:s0 +/usr/bin/svscanboot -- system_u:object_r:svc_start_exec_t:s0 +/usr/bin/targetclid -- system_u:object_r:targetclid_exec_t:s0 +/usr/bin/uml_switch -- system_u:object_r:uml_switch_exec_t:s0 +/usr/bin/varnishlog -- system_u:object_r:varnishlog_exec_t:s0 +/usr/bin/vmnet-natd -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/vmware-vmx -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/webazolver -- system_u:object_r:webalizer_exec_t:s0 +/usr/lib/VBoxVMM\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/udev/udevd -- system_u:object_r:udev_exec_t:s0 +/usr/libexec/colord -- system_u:object_r:colord_exec_t:s0 +/usr/libexec/ksmctl -- system_u:object_r:ksm_exec_t:s0 +/usr/libexec/mptcpd -- system_u:object_r:mptcpd_exec_t:s0 +/usr/libexec/mysqld -- system_u:object_r:mysqld_exec_t:s0 +/usr/libexec/realmd -- system_u:object_r:realmd_exec_t:s0 +/usr/sbin/abrt-dbus -- system_u:object_r:abrt_exec_t:s0 +/usr/sbin/amrecover -- system_u:object_r:amanda_recover_exec_t:s0 +/usr/sbin/apachectl -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/arptables -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/automount -- system_u:object_r:automount_exec_t:s0 +/usr/sbin/bosserver -- system_u:object_r:afs_bosserver_exec_t:s0 +/usr/sbin/cimserver -- system_u:object_r:pegasus_exec_t:s0 +/usr/sbin/cman_tool -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/conntrack -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/dmidecode -- system_u:object_r:dmidecode_exec_t:s0 +/usr/sbin/drbdsetup -- system_u:object_r:drbd_exec_t:s0 +/usr/sbin/eventlogd -- system_u:object_r:eventlogd_exec_t:s0 +/usr/sbin/firewalld -- system_u:object_r:firewalld_exec_t:s0 +/usr/sbin/firstboot -- system_u:object_r:firstboot_exec_t:s0 +/usr/sbin/grpunconv -- system_u:object_r:admin_passwd_exec_t:s0 +/usr/sbin/hciattach -- system_u:object_r:bluetooth_exec_t:s0 +/usr/sbin/imaplogin -- system_u:object_r:courier_pop_exec_t:s0 +/usr/sbin/in\.comsat -- system_u:object_r:comsat_exec_t:s0 +/usr/sbin/in\.ntalkd -- system_u:object_r:ktalkd_exec_t:s0 +/usr/sbin/in\.rexecd -- system_u:object_r:rshd_exec_t:s0 +/usr/sbin/iprupdate -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/logrotate -- system_u:object_r:logrotate_exec_t:s0 +/usr/sbin/lvdisplay -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmchange -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/mcstransd -- system_u:object_r:setrans_exec_t:s0 +/usr/sbin/minissdpd -- system_u:object_r:minissdpd_exec_t:s0 +/usr/sbin/mon_procd -- system_u:object_r:mon_procd_exec_t:s0 +/usr/sbin/named-sdb -- system_u:object_r:named_exec_t:s0 +/usr/sbin/netlogond -- system_u:object_r:netlogond_exec_t:s0 +/usr/sbin/opendmarc -- system_u:object_r:dkim_milter_exec_t:s0 +/usr/sbin/oracleasm -- system_u:object_r:oracleasm_exec_t:s0 +/usr/sbin/ovsdb-ctl -- system_u:object_r:openvswitch_exec_t:s0 +/usr/sbin/ownership -- system_u:object_r:dmidecode_exec_t:s0 +/usr/sbin/partprobe -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/pkcsslotd -- system_u:object_r:pkcs_slotd_exec_t:s0 +/usr/sbin/plymouthd -- system_u:object_r:plymouthd_exec_t:s0 +/usr/sbin/pmap_dump -- system_u:object_r:portmap_helper_exec_t:s0 +/usr/sbin/postalias -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/postqueue -- system_u:object_r:postfix_postqueue_exec_t:s0 +/usr/sbin/postsuper -- system_u:object_r:postfix_master_exec_t:s0 +/usr/sbin/powernowd -- system_u:object_r:cpuspeed_exec_t:s0 +/usr/sbin/ppp-watch -- system_u:object_r:pppd_exec_t:s0 +/usr/sbin/ptal-mlcd -- system_u:object_r:ptal_exec_t:s0 +/usr/sbin/pvdisplay -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/quota_nld -- system_u:object_r:quota_nld_exec_t:s0 +/usr/sbin/raidstart -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/rasdaemon -- system_u:object_r:rasdaemon_exec_t:s0 +/usr/sbin/rgmanager -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/rhn_check -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/rhnreg_ks -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/rtas_errd -- system_u:object_r:rtas_errd_exec_t:s0 +/usr/sbin/saslauthd -- system_u:object_r:saslauthd_exec_t:s0 +/usr/sbin/scsi_info -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/setsebool -- system_u:object_r:setsebool_exec_t:s0 +/usr/sbin/seunshare -- system_u:object_r:seunshare_exec_t:s0 +/usr/sbin/showmount -- system_u:object_r:showmount_exec_t:s0 +/usr/sbin/sm-notify -- system_u:object_r:rpcd_exec_t:s0 +/usr/sbin/smokeping -- system_u:object_r:smokeping_exec_t:s0 +/usr/sbin/snmptrapd -- system_u:object_r:snmpd_exec_t:s0 +/usr/sbin/sosreport -- system_u:object_r:sosreport_exec_t:s0 +/usr/sbin/sss_cache -- system_u:object_r:sssd_exec_t:s0 +/usr/sbin/syslog-ng -- system_u:object_r:syslogd_exec_t:s0 +/usr/sbin/timedatex -- system_u:object_r:timedatex_exec_t:s0 +/usr/sbin/tmpreaper -- system_u:object_r:tmpreaper_exec_t:s0 +/usr/sbin/udevstart -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/upsdrvctl -- system_u:object_r:nut_upsdrvctl_exec_t:s0 +/usr/sbin/vgdisplay -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgmknodes -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/vgwrapper -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/virtlockd -- system_u:object_r:virtlogd_exec_t:s0 +/usr/sbin/virtqemud -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/virtvboxd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/vpddecode -- system_u:object_r:dmidecode_exec_t:s0 +/usr/sbin/xenstored -- system_u:object_r:xenstored_exec_t:s0 +/var/named/named\.ca -- system_u:object_r:named_conf_t:s0 +/var/run/auditd\.pid -- system_u:object_r:auditd_var_run_t:s0 +/var/run/epylog\.pid -- system_u:object_r:logwatch_var_run_t:s0 +/var/run/gdomap\.pid -- system_u:object_r:gdomap_var_run_t:s0 +/var/run/groupd\.pid -- system_u:object_r:groupd_var_run_t:s0 +/var/run/iscsid\.pid -- system_u:object_r:iscsi_var_run_t:s0 +/var/run/lsassd\.pid -- system_u:object_r:lsassd_var_run_t:s0 +/var/run/lwregd\.pid -- system_u:object_r:lwregd_var_run_t:s0 +/var/run/machine-id -- system_u:object_r:machineid_t:s0 +/var/run/motion\.pid -- system_u:object_r:motion_var_run_t:s0 +/var/run/pesign\.pid -- system_u:object_r:pesign_var_run_t:s0 +/var/run/qdiskd\.pid -- system_u:object_r:qdiskd_var_run_t:s0 +/var/run/racoon\.pid -- system_u:object_r:ipsec_var_run_t:s0 +/var/run/slapd\.args -- system_u:object_r:slapd_var_run_t:s0 +/var/run/smartd\.pid -- system_u:object_r:fsdaemon_var_run_t:s0 +/var/run/thttpd\.pid -- system_u:object_r:httpd_var_run_t:s0 +/var/tmp/ldapmap1_0 -- system_u:object_r:krb5_host_rcache_t:s0 +/sys/kernel/tracing -d system_u:object_r:tracefs_t:s0 +/var/lib/cups/certs -d system_u:object_r:cupsd_rw_etc_t:s0 +/var/log/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/tmp/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/tmp/vi\.recover -d system_u:object_r:tmp_t:s0 +/dev/crypto/nx-gzip -c system_u:object_r:accelerator_device_t:s0 +/dev/isst_interface -c system_u:object_r:cpu_device_t:s0 +/dev/mapper/control -c system_u:object_r:lvm_control_t:s0 +/var/run/charon\.ctl -s system_u:object_r:ipsec_var_run_t:s0 +/var/run/charon\.dck -s system_u:object_r:ipsec_var_run_t:s0 +/var/run/dcc/dccifd -s system_u:object_r:dccifd_var_run_t:s0 +/var/run/fcron\.fifo -s system_u:object_r:crond_var_run_t:s0 +/var/run/gdm_socket -s system_u:object_r:xdm_var_run_t:s0 +/var/run/pcscd\.comm -s system_u:object_r:pcscd_var_run_t:s0 +/var/run/smtpd\.sock -s system_u:object_r:sendmail_var_run_t:s0 +/tmp/hsperfdata_root system_u:object_r:user_tmp_t:s0 +/var/lib/random-seed system_u:object_r:random_seed_t:s0 +/var/run/oddjobd\.pid system_u:object_r:oddjob_var_run_t:s0 +/etc/dhclient-script -- system_u:object_r:dhcp_etc_t:s0 +/etc/init\.d/cherokee -- system_u:object_r:httpd_initrc_exec_t:s0 +/etc/ldap/slapd\.conf -- system_u:object_r:slapd_etc_t:s0 +/etc/lxdm/LoginReady -- system_u:object_r:bin_t:s0 +/etc/nagios/nrpe\.cfg -- system_u:object_r:nrpe_etc_t:s0 +/etc/network/ifstate -- system_u:object_r:etc_runtime_t:s0 +/etc/openvpn/ipp\.txt -- system_u:object_r:openvpn_etc_rw_t:s0 +/etc/pads-assets\.csv -- system_u:object_r:pads_config_t:s0 +/etc/ppp/resolv\.conf -- system_u:object_r:pppd_etc_rw_t:s0 +/etc/rc\.d/init\.d/atd -- system_u:object_r:crond_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cvs -- system_u:object_r:cvs_initrc_exec_t:s0 +/etc/rc\.d/init\.d/gpm -- system_u:object_r:gpm_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mpd -- system_u:object_r:mpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nfs -- system_u:object_r:nfsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nmb -- system_u:object_r:samba_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ppp -- system_u:object_r:pppd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/smb -- system_u:object_r:samba_initrc_exec_t:s0 +/etc/rc\.d/init\.d/tor -- system_u:object_r:tor_initrc_exec_t:s0 +/etc/samba/smbpasswd -- system_u:object_r:samba_secrets_t:s0 +/etc/sysconfig/clock -- system_u:object_r:locale_t:s0 +/etc/sysconfig/crond -- system_u:object_r:bin_t:s0 +/lib/udisks2/udisksd -- system_u:object_r:devicekit_disk_exec_t:s0 +/opt/NX/bin/nxserver -- system_u:object_r:nx_server_exec_t:s0 +/sbin/audisp-prelude -- system_u:object_r:prelude_audisp_exec_t:s0 +/sbin/cgconfigparser -- system_u:object_r:cgconfig_exec_t:s0 +/sbin/dmsetup\.static -- system_u:object_r:lvm_exec_t:s0 +/sbin/modules-update -- system_u:object_r:kmod_exec_t:s0 +/sbin/shorewall-lite -- system_u:object_r:shorewall_exec_t:s0 +/sbin/update-modules -- system_u:object_r:kmod_exec_t:s0 +/sbin/wait_for_sysfs -- system_u:object_r:udev_exec_t:s0 +/usr/NX/bin/nxserver -- system_u:object_r:nx_server_exec_t:s0 +/usr/X11R6/bin/Xipaq -- system_u:object_r:xserver_exec_t:s0 +/usr/X11R6/bin/xauth -- system_u:object_r:xauth_exec_t:s0 +/usr/bin/checkpolicy -- system_u:object_r:checkpolicy_exec_t:s0 +/usr/bin/dbus-broker -- system_u:object_r:dbusd_exec_t:s0 +/usr/bin/deltacloudd -- system_u:object_r:deltacloudd_exec_t:s0 +/usr/bin/kbackgammon -- system_u:object_r:games_exec_t:s0 +/usr/bin/kbattleship -- system_u:object_r:games_exec_t:s0 +/usr/bin/kgoldrunner -- system_u:object_r:games_exec_t:s0 +/usr/bin/mysqld_safe -- system_u:object_r:mysqld_safe_exec_t:s0 +/usr/bin/nova-volume -- system_u:object_r:nova_exec_t:s0 +/usr/bin/openconnect -- system_u:object_r:vpnc_exec_t:s0 +/usr/bin/prelude-lml -- system_u:object_r:prelude_lml_exec_t:s0 +/usr/bin/stap-server -- system_u:object_r:stapserver_exec_t:s0 +/usr/bin/uninstaller -- system_u:object_r:wine_exec_t:s0 +/usr/bin/varnishncsa -- system_u:object_r:varnishlog_exec_t:s0 +/usr/bin/vmnet-dhcpd -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/vmware-nmbd -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/vmware-ping -- system_u:object_r:vmware_exec_t:s0 +/usr/bin/vmware-smbd -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/zarafa-ical -- system_u:object_r:zarafa_ical_exec_t:s0 +/usr/lib/ipsec/pluto -- system_u:object_r:ipsec_exec_t:s0 +/usr/lib/sftp-server -- system_u:object_r:bin_t:s0 +/usr/lib/telnetlogin -- system_u:object_r:rlogind_exec_t:s0 +/usr/libexec/bootupd -- system_u:object_r:bootupd_exec_t:s0 +/usr/libexec/couchdb -- system_u:object_r:couchdb_exec_t:s0 +/usr/libexec/fprintd -- system_u:object_r:fprintd_exec_t:s0 +/usr/libexec/geoclue -- system_u:object_r:geoclue_exec_t:s0 +/usr/libexec/news/sm -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/upowerd -- system_u:object_r:devicekit_power_exec_t:s0 +/usr/sbin/biosdecode -- system_u:object_r:dmidecode_exec_t:s0 +/usr/sbin/blazer_usb -- system_u:object_r:nut_upsdrvctl_exec_t:s0 +/usr/sbin/blktapctrl -- system_u:object_r:blktap_exec_t:s0 +/usr/sbin/bluetoothd -- system_u:object_r:bluetooth_exec_t:s0 +/usr/sbin/bumblebeed -- system_u:object_r:bumblebee_exec_t:s0 +/usr/sbin/callweaver -- system_u:object_r:callweaver_exec_t:s0 +/usr/sbin/certmonger -- system_u:object_r:certmonger_exec_t:s0 +/usr/sbin/cf-serverd -- system_u:object_r:cfengine_serverd_exec_t:s0 +/usr/sbin/conntrackd -- system_u:object_r:conntrackd_exec_t:s0 +/usr/sbin/cryptsetup -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/dbskkd-cdb -- system_u:object_r:dbskkd_exec_t:s0 +/usr/sbin/exfatlabel -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/fence_node -- system_u:object_r:fenced_exec_t:s0 +/usr/sbin/fence_tool -- system_u:object_r:fenced_exec_t:s0 +/usr/sbin/freeradius -- system_u:object_r:radiusd_exec_t:s0 +/usr/sbin/fstab-sync -- system_u:object_r:updfstab_exec_t:s0 +/usr/sbin/hypervkvpd -- system_u:object_r:hypervkvp_exec_t:s0 +/usr/sbin/hypervvssd -- system_u:object_r:hypervvssd_exec_t:s0 +/usr/sbin/ifdhandler -- system_u:object_r:openct_exec_t:s0 +/usr/sbin/in\.rlogind -- system_u:object_r:rlogind_exec_t:s0 +/usr/sbin/in\.telnetd -- system_u:object_r:telnetd_exec_t:s0 +/usr/sbin/irqbalance -- system_u:object_r:irqbalance_exec_t:s0 +/usr/sbin/keepalived -- system_u:object_r:keepalived_exec_t:s0 +/usr/sbin/ldap-agent -- system_u:object_r:dirsrv_snmp_exec_t:s0 +/usr/sbin/ldirectord -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/lvm\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/lvmlockctl -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/mdm-binary -- system_u:object_r:xdm_exec_t:s0 +/usr/sbin/mkreiserfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/muddleftpd -- system_u:object_r:ftpd_exec_t:s0 +/usr/sbin/multipathd -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/nsd-notify -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/ods-signer -- system_u:object_r:opendnssec_exec_t:s0 +/usr/sbin/openwsmand -- system_u:object_r:openwsman_exec_t:s0 +/usr/sbin/oxenstored -- system_u:object_r:xenstored_exec_t:s0 +/usr/sbin/pacemakerd -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/powersaved -- system_u:object_r:apmd_exec_t:s0 +/usr/sbin/raid-check -- system_u:object_r:mdadm_exec_t:s0 +/usr/sbin/ras-mc-ctl -- system_u:object_r:rasdaemon_exec_t:s0 +/usr/sbin/restorecon -- system_u:object_r:setfiles_exec_t:s0 +/usr/sbin/rotatelogs -- system_u:object_r:httpd_rotatelogs_exec_t:s0 +/usr/sbin/rpc\.idmapd -- system_u:object_r:rpcd_exec_t:s0 +/usr/sbin/rpc\.mountd -- system_u:object_r:nfsd_exec_t:s0 +/usr/sbin/rpc\.ypxfrd -- system_u:object_r:ypxfr_exec_t:s0 +/usr/sbin/start_udev -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/strongimcv -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/sbin/strongswan -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/sbin/timemaster -- system_u:object_r:timemaster_exec_t:s0 +/usr/sbin/usbmodules -- system_u:object_r:usbmodules_exec_t:s0 +/usr/sbin/userhelper -- system_u:object_r:userhelper_exec_t:s0 +/usr/sbin/usernetctl -- system_u:object_r:usernetctl_exec_t:s0 +/usr/sbin/virtproxyd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/vlock-main -- system_u:object_r:vlock_exec_t:s0 +/usr/sbin/xfs_growfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/share/vdsm/vdsm -- system_u:object_r:virtd_exec_t:s0 +/var/axfrdns/log/run -- system_u:object_r:svc_run_exec_t:s0 +/var/log/proftpd\.log -- system_u:object_r:xferlog_t:s0 +/var/run/alsactl\.pid -- system_u:object_r:alsa_var_run_t:s0 +/var/run/anacron\.pid -- system_u:object_r:crond_var_run_t:s0 +/var/run/apcupsd\.pid -- system_u:object_r:apcupsd_var_run_t:s0 +/var/run/bitlbee\.pid -- system_u:object_r:bitlbee_var_run_t:s0 +/var/run/blkmapd\.pid -- system_u:object_r:blkmapd_var_run_t:s0 +/var/run/cardmgr\.pid -- system_u:object_r:cardmgr_var_run_t:s0 +/var/run/chronyd\.pid -- system_u:object_r:chronyd_var_run_t:s0 +/var/run/evtchnd\.pid -- system_u:object_r:evtchnd_var_run_t:s0 +/var/run/fcoemon\.pid -- system_u:object_r:fcoemon_var_run_t:s0 +/var/run/haproxy\.pid -- system_u:object_r:haproxy_var_run_t:s0 +/var/run/haveged\.pid -- system_u:object_r:entropyd_var_run_t:s0 +/var/run/icecast\.pid -- system_u:object_r:icecast_var_run_t:s0 +/var/run/ipmievd\.pid -- system_u:object_r:ipmievd_var_run_t:s0 +/var/run/ksmtune\.pid -- system_u:object_r:ksmtuned_var_run_t:s0 +/var/run/metalog\.pid -- system_u:object_r:syslogd_var_run_t:s0 +/var/run/nsd/nsd\.pid -- system_u:object_r:nsd_var_run_t:s0 +/var/run/pmcd\.socket -- system_u:object_r:pcp_var_run_t:s0 +/var/run/privoxy\.pid -- system_u:object_r:privoxy_var_run_t:s0 +/var/run/qemu-ga\.pid -- system_u:object_r:virt_qemu_ga_var_run_t:s0 +/var/run/radiusd\.pid -- system_u:object_r:radiusd_var_run_t:s0 +/var/run/random-seed -- system_u:object_r:initrc_var_run_t:s0 +/var/run/rsyncd\.lock -- system_u:object_r:rsync_var_run_t:s0 +/var/run/sensord\.pid -- system_u:object_r:sensord_var_run_t:s0 +/var/run/sqlgrey\.pid -- system_u:object_r:greylist_milter_data_t:s0 +/var/run/srvsvcd\.pid -- system_u:object_r:srvsvcd_var_run_t:s0 +/var/run/syslogd\.pid -- system_u:object_r:syslogd_var_run_t:s0 +/var/run/varnish\.pid -- system_u:object_r:varnishd_var_run_t:s0 +/var/tinydns/log/run -- system_u:object_r:svc_run_exec_t:s0 +/etc/insights-client -d system_u:object_r:insights_client_etc_t:s0 +/var/lib/likewise/db -d system_u:object_r:likewise_var_lib_t:s0 +/var/run/\.iroha_unix -d system_u:object_r:canna_var_run_t:s0 +/dev/cpu_dma_latency -c system_u:object_r:netcontrol_device_t:s0 +/dev/network_latency -c system_u:object_r:netcontrol_device_t:s0 +/dev/pktcdvd/control -c system_u:object_r:pktcdvd_control_device_t:s0 +/dev/wmi/dell-smbios -c system_u:object_r:acpi_device_t:s0 +/var/run/auditd_sock -s system_u:object_r:auditd_var_run_t:s0 +/var/run/charon\.vici -s system_u:object_r:ipsec_var_run_t:s0 +/var/run/gcache_port -s system_u:object_r:httpd_var_run_t:s0 +/var/run/nsd/nsd\.ctl -s system_u:object_r:nsd_var_run_t:s0 +/var/run/pcsd\.socket -s system_u:object_r:cluster_var_run_t:s0 +/var/run/runlevel\.dir system_u:object_r:initrc_var_run_t:s0 +/bin/systemd-coredump -- system_u:object_r:systemd_coredump_exec_t:s0 +/bin/systemd-tmpfiles -- system_u:object_r:systemd_tmpfiles_exec_t:s0 +/etc/X11/xdm/Xsetup_0 -- system_u:object_r:bin_t:s0 +/etc/apcupsd/changeme -- system_u:object_r:bin_t:s0 +/etc/cups/client\.conf -- system_u:object_r:etc_t:s0 +/etc/named\.root\.hints -- system_u:object_r:named_conf_t:s0 +/etc/pads-ether-codes -- system_u:object_r:pads_config_t:s0 +/etc/rc\.d/init\.d/abrt -- system_u:object_r:abrt_initrc_exec_t:s0 +/etc/rc\.d/init\.d/amtu -- system_u:object_r:amtu_initrc_exec_t:s0 +/etc/rc\.d/init\.d/bgpd -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ctdb -- system_u:object_r:ctdbd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cups -- system_u:object_r:cupsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/drbd -- system_u:object_r:drbd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dund -- system_u:object_r:bluetooth_initrc_exec_t:s0 +/etc/rc\.d/init\.d/exim -- system_u:object_r:exim_initrc_exec_t:s0 +/etc/rc\.d/init\.d/fcoe -- system_u:object_r:fcoemon_initrc_exec_t:s0 +/etc/rc\.d/init\.d/gpsd -- system_u:object_r:gpsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/innd -- system_u:object_r:innd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/iwhd -- system_u:object_r:iwhd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lirc -- system_u:object_r:lircd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mrtg -- system_u:object_r:mrtg_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nasd -- system_u:object_r:soundd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nrpe -- system_u:object_r:nagios_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nscd -- system_u:object_r:nscd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ntop -- system_u:object_r:ntop_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ntpd -- system_u:object_r:ntpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/osad -- system_u:object_r:osad_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pads -- system_u:object_r:pads_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pand -- system_u:object_r:bluetooth_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pmcd -- system_u:object_r:pcp_pmcd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pmie -- system_u:object_r:pcp_pmie_initrc_exec_t:s0 +/etc/rc\.d/init\.d/psad -- system_u:object_r:psad_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ripd -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rngd -- system_u:object_r:rngd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sasl -- system_u:object_r:saslauthd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/slpd -- system_u:object_r:slpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/smsd -- system_u:object_r:smsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sshd -- system_u:object_r:sshd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sslh -- system_u:object_r:sslh_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sssd -- system_u:object_r:sssd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/tgtd -- system_u:object_r:tgtd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/uucp -- system_u:object_r:uucpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/wdmd -- system_u:object_r:wdmd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/wicd -- system_u:object_r:NetworkManager_initrc_exec_t:s0 +/etc/samba/passdb\.tdb -- system_u:object_r:samba_secrets_t:s0 +/etc/security/opasswd -- system_u:object_r:shadow_t:s0 +/etc/sysconfig/hwconf -- system_u:object_r:etc_runtime_t:s0 +/sbin/vgchange\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/afs/bin/kaserver -- system_u:object_r:afs_kaserver_exec_t:s0 +/usr/afs/bin/ptserver -- system_u:object_r:afs_ptserver_exec_t:s0 +/usr/afs/bin/salvager -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/afs/bin/vlserver -- system_u:object_r:afs_vlserver_exec_t:s0 +/usr/bin/anaconda-yum -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/boinc_client -- system_u:object_r:boinc_exec_t:s0 +/usr/bin/denyhosts\.py -- system_u:object_r:denyhosts_exec_t:s0 +/usr/bin/epiphany-bin -- system_u:object_r:mozilla_exec_t:s0 +/usr/bin/gnome-stones -- system_u:object_r:games_exec_t:s0 +/usr/bin/imagefactory -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/keystone-all -- system_u:object_r:keystone_exec_t:s0 +/usr/bin/kismet_drone -- system_u:object_r:kismet_exec_t:s0 +/usr/bin/kjumpingcube -- system_u:object_r:games_exec_t:s0 +/usr/bin/nova-compute -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/nova-network -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nspluginscan -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/bin/openfortivpn -- system_u:object_r:openfortivpn_exec_t:s0 +/usr/bin/pdns_control -- system_u:object_r:pdns_control_exec_t:s0 +/usr/bin/redis-server -- system_u:object_r:redis_exec_t:s0 +/usr/bin/sddm-greeter -- system_u:object_r:xdm_exec_t:s0 +/usr/bin/sge_shepherd -- system_u:object_r:sge_shepherd_exec_t:s0 +/usr/bin/spamassassin -- system_u:object_r:spamc_exec_t:s0 +/usr/bin/systemd-hwdb -- system_u:object_r:systemd_hwdb_exec_t:s0 +/usr/bin/vmnet-bridge -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/yum-builddep -- system_u:object_r:rpm_exec_t:s0 +/usr/lib/cyrus/master -- system_u:object_r:cyrus_exec_t:s0 +/usr/lib/ipsec/eroute -- system_u:object_r:ipsec_exec_t:s0 +/usr/lib/udev/scsi_id -- system_u:object_r:bin_t:s0 +/usr/libexec/Xorg\.bin -- system_u:object_r:xserver_exec_t:s0 +/usr/libexec/dcc/dccd -- system_u:object_r:dccd_exec_t:s0 +/usr/libexec/dcc/dccm -- system_u:object_r:dccm_exec_t:s0 +/usr/libexec/mariadbd -- system_u:object_r:mysqld_exec_t:s0 +/usr/libexec/pt_chown -- system_u:object_r:ptchown_exec_t:s0 +/usr/libexec/stratisd -- system_u:object_r:stratisd_exec_t:s0 +/usr/local/bin/conmon -- system_u:object_r:conmon_exec_t:s0 +/usr/local/bin/podman -- system_u:object_r:container_runtime_exec_t:s0 +/usr/sbin/MailScanner -- system_u:object_r:mscan_exec_t:s0 +/usr/sbin/authdaemond -- system_u:object_r:courier_authdaemon_exec_t:s0 +/usr/sbin/cachefilesd -- system_u:object_r:cachefilesd_exec_t:s0 +/usr/sbin/cannaserver -- system_u:object_r:canna_exec_t:s0 +/usr/sbin/cf-monitord -- system_u:object_r:cfengine_monitord_exec_t:s0 +/usr/sbin/cgrulesengd -- system_u:object_r:cgred_exec_t:s0 +/usr/sbin/clubufflush -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/couriertcpd -- system_u:object_r:courier_tcpd_exec_t:s0 +/usr/sbin/dkim-filter -- system_u:object_r:dkim_milter_exec_t:s0 +/usr/sbin/e2mmpstatus -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/exim_tidydb -- system_u:object_r:exim_exec_t:s0 +/usr/sbin/fcronsighup -- system_u:object_r:crontab_exec_t:s0 +/usr/sbin/fence_virtd -- system_u:object_r:fenced_exec_t:s0 +/usr/sbin/hal_lpadmin -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/sbin/httpd\.event -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/install-mbr -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/ipmidetectd -- system_u:object_r:freeipmi_ipmidetectd_exec_t:s0 +/usr/sbin/load_policy -- system_u:object_r:load_policy_exec_t:s0 +/usr/sbin/logwatch\.pl -- system_u:object_r:logwatch_exec_t:s0 +/usr/sbin/lvmdiskscan -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/mkfs\.cramfs -- system_u:object_r:bin_t:s0 +/usr/sbin/modclusterd -- system_u:object_r:ricci_modclusterd_exec_t:s0 +/usr/sbin/mon_fsstatd -- system_u:object_r:mon_statd_exec_t:s0 +/usr/sbin/mount\.crypt -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/netlabelctl -- system_u:object_r:netlabel_mgmt_exec_t:s0 +/usr/sbin/nsd-control -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/ods-control -- system_u:object_r:opendnssec_exec_t:s0 +/usr/sbin/ods-signerd -- system_u:object_r:opendnssec_exec_t:s0 +/usr/sbin/openconnect -- system_u:object_r:vpnc_exec_t:s0 +/usr/sbin/packagekitd -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/pdns_server -- system_u:object_r:pdns_exec_t:s0 +/usr/sbin/piranha_gui -- system_u:object_r:piranha_web_exec_t:s0 +/usr/sbin/portreserve -- system_u:object_r:portreserve_exec_t:s0 +/usr/sbin/ptal-photod -- system_u:object_r:ptal_exec_t:s0 +/usr/sbin/ptal-printd -- system_u:object_r:ptal_exec_t:s0 +/usr/sbin/qat_init\.sh -- system_u:object_r:qatlib_exec_t:s0 +/usr/sbin/raidautorun -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/restorecond -- system_u:object_r:restorecond_exec_t:s0 +/usr/sbin/rpc\.rquotad -- system_u:object_r:rpcd_exec_t:s0 +/usr/sbin/rpc\.svcgssd -- system_u:object_r:gssd_exec_t:s0 +/usr/sbin/snort-plain -- system_u:object_r:snort_exec_t:s0 +/usr/sbin/sshd-keygen -- system_u:object_r:sshd_keygen_exec_t:s0 +/usr/sbin/sslh-select -- system_u:object_r:sslh_exec_t:s0 +/usr/sbin/tcb_convert -- system_u:object_r:updpwd_exec_t:s0 +/usr/sbin/unix_chkpwd -- system_u:object_r:chkpwd_exec_t:s0 +/usr/sbin/unix_update -- system_u:object_r:updpwd_exec_t:s0 +/usr/sbin/unix_verify -- system_u:object_r:chkpwd_exec_t:s0 +/usr/sbin/vgcfgbackup -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/virtsecretd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/xenconsoled -- system_u:object_r:xenconsoled_exec_t:s0 +/var/dnscache/log/run -- system_u:object_r:svc_run_exec_t:s0 +/var/lock/man-db\.lock -- system_u:object_r:mandb_lock_t:s0 +/var/lock/subsys/drbd -- system_u:object_r:drbd_lock_t:s0 +/var/lock/subsys/ipmi -- system_u:object_r:ipmievd_lock_t:s0 +/var/lock/subsys/ldap -- system_u:object_r:slapd_lock_t:s0 +/var/lock/subsys/mrtg -- system_u:object_r:mrtg_lock_t:s0 +/var/run/ajaxterm\.pid -- system_u:object_r:ajaxterm_var_run_t:s0 +/var/run/auditd\.state -- system_u:object_r:auditd_var_run_t:s0 +/var/run/cherokee\.pid -- system_u:object_r:httpd_var_run_t:s0 +/var/run/cmirrord\.pid -- system_u:object_r:cmirrord_var_run_t:s0 +/var/run/collectd\.pid -- system_u:object_r:collectd_var_run_t:s0 +/var/run/corosync\.pid -- system_u:object_r:cluster_var_run_t:s0 +/var/run/cpglockd\.pid -- system_u:object_r:cluster_var_run_t:s0 +/var/run/cpufreqd\.pid -- system_u:object_r:cpuspeed_var_run_t:s0 +/var/run/ddclient\.pid -- system_u:object_r:ddclient_var_run_t:s0 +/var/run/gssproxy\.pid -- system_u:object_r:gssproxy_var_run_t:s0 +/var/run/ipmiseld\.pid -- system_u:object_r:freeipmi_ipmiseld_var_run_t:s0 +/var/run/iscsiuio\.pid -- system_u:object_r:iscsi_var_run_t:s0 +/var/run/libvirtd\.pid -- system_u:object_r:virt_var_run_t:s0 +/var/run/openhpid\.pid -- system_u:object_r:openhpid_var_run_t:s0 +/var/run/postgrey\.pid -- system_u:object_r:postgrey_var_run_t:s0 +/var/run/sendmail\.pid -- system_u:object_r:sendmail_var_run_t:s0 +/var/run/virtlogd\.pid -- system_u:object_r:virtlogd_var_run_t:s0 +/var/run/watchdog\.pid -- system_u:object_r:watchdog_var_run_t:s0 +/var/run/xenstore\.pid -- system_u:object_r:xenstored_var_run_t:s0 +/var/www/cgi-bin/cgit -- system_u:object_r:git_script_exec_t:s0 +/lib/udev/devices/pts -d system_u:object_r:devpts_t:s0 +/var/lib/likewise/rpc -d system_u:object_r:likewise_var_lib_t:s0 +/var/lib/likewise/run -d system_u:object_r:likewise_var_lib_t:s0 +/var/named/chroot/dev -d system_u:object_r:device_t:s0 +/dev/acpi_thermal_rel -c system_u:object_r:acpi_device_t:s0 +/dev/memory_bandwidth -c system_u:object_r:memory_device_t:s0 +/lib/udev/devices/ppp -c system_u:object_r:ppp_device_t:s0 +/var/run/\.nscd_socket -s system_u:object_r:nscd_var_run_t:s0 +/var/run/audit_events -s system_u:object_r:auditd_var_run_t:s0 +/var/run/bitlbee\.sock -s system_u:object_r:bitlbee_var_run_t:s0 +/var/run/bootupd\.sock -s system_u:object_r:bootupd_var_run_t:s0 +/var/run/chronyd\.sock -s system_u:object_r:chronyd_var_run_t:s0 +/var/run/clumond\.sock -s system_u:object_r:ricci_modcluster_var_run_t:s0 +/var/run/prol2tpd\.ctl -s system_u:object_r:l2tpd_var_run_t:s0 +/etc/rc\.d/init\.d/libra system_u:object_r:openshift_initrc_exec_t:s0 +/var/lib/pki-ra/pki-ra system_u:object_r:pki_ra_exec_t:s0 +/var/run/mcstransd\.pid system_u:object_r:setrans_var_run_t:s0 +/etc/alsa/asound\.state -- system_u:object_r:alsa_etc_rw_t:s0 +/etc/apcupsd/onbattery -- system_u:object_r:bin_t:s0 +/etc/apcupsd/powerfail -- system_u:object_r:apcupsd_power_t:s0 +/etc/default/minissdpd -- system_u:object_r:minissdpd_conf_t:s0 +/etc/httpd/conf/keytab -- system_u:object_r:httpd_keytab_t:s0 +/etc/postfix/prng_exch -- system_u:object_r:postfix_prng_t:s0 +/etc/rc\.d/init\.d/acpid -- system_u:object_r:apmd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/aiccu -- system_u:object_r:aiccu_initrc_exec_t:s0 +/etc/rc\.d/init\.d/canna -- system_u:object_r:canna_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cgred -- system_u:object_r:cgred_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dictd -- system_u:object_r:dictd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dspam -- system_u:object_r:dspam_initrc_exec_t:s0 +/etc/rc\.d/init\.d/httpd -- system_u:object_r:httpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ipsec -- system_u:object_r:ipsec_initrc_exec_t:s0 +/etc/rc\.d/init\.d/isisd -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/isnsd -- system_u:object_r:isnsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/kdump -- system_u:object_r:kdump_initrc_exec_t:s0 +/etc/rc\.d/init\.d/kprop -- system_u:object_r:kerberos_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lwiod -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lwsmd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/named -- system_u:object_r:named_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nslcd -- system_u:object_r:nslcd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ospfd -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pcscd -- system_u:object_r:pcscd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pulse -- system_u:object_r:piranha_pulse_initrc_exec_t:s0 +/etc/rc\.d/init\.d/qpidd -- system_u:object_r:qpidd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/radvd -- system_u:object_r:radvd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/redis -- system_u:object_r:redis_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rhnsd -- system_u:object_r:rhnsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ricci -- system_u:object_r:ricci_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rwhod -- system_u:object_r:rwho_initrc_exec_t:s0 +/etc/rc\.d/init\.d/slapd -- system_u:object_r:slapd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/spamd -- system_u:object_r:spamd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/squid -- system_u:object_r:squid_initrc_exec_t:s0 +/etc/rc\.d/init\.d/tuned -- system_u:object_r:tuned_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ulogd -- system_u:object_r:ulogd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/uuidd -- system_u:object_r:uuidd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/zebra -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/samba/MACHINE\.SID -- system_u:object_r:samba_secrets_t:s0 +/etc/samba/secrets\.tdb -- system_u:object_r:samba_secrets_t:s0 +/etc/sysconfig/hddtemp -- system_u:object_r:hddtemp_etc_t:s0 +/etc/sysconfig/snapper -- system_u:object_r:snapperd_conf_t:s0 +/etc/tuned/bootcmdline -- system_u:object_r:tuned_rw_etc_t:s0 +/sbin/ipx_internal_net -- system_u:object_r:ifconfig_exec_t:s0 +/sbin/multipath\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/X11R6/bin/XFree86 -- system_u:object_r:xserver_exec_t:s0 +/usr/X11R6/bin/iceauth -- system_u:object_r:iceauth_exec_t:s0 +/usr/afs/bin/bosserver -- system_u:object_r:afs_bosserver_exec_t:s0 +/usr/afs/bin/volserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/bin/VGAuthService -- system_u:object_r:vmtools_exec_t:s0 +/usr/bin/cinder-backup -- system_u:object_r:cinder_backup_exec_t:s0 +/usr/bin/cinder-volume -- system_u:object_r:cinder_volume_exec_t:s0 +/usr/bin/consolehelper -- system_u:object_r:consolehelper_exec_t:s0 +/usr/bin/dnf-automatic -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/esmtp-wrapper -- system_u:object_r:sendmail_exec_t:s0 +/usr/bin/gitosis-serve -- system_u:object_r:gitosis_exec_t:s0 +/usr/bin/initial-setup -- system_u:object_r:install_exec_t:s0 +/usr/bin/kismet_server -- system_u:object_r:kismet_exec_t:s0 +/usr/bin/mariadbd-safe -- system_u:object_r:mysqld_safe_exec_t:s0 +/usr/bin/mongrel_rails -- system_u:object_r:httpd_exec_t:s0 +/usr/bin/mysql_upgrade -- system_u:object_r:mysqld_exec_t:s0 +/usr/bin/nova-vncproxy -- system_u:object_r:nova_exec_t:s0 +/usr/bin/puppetmasterd -- system_u:object_r:puppetmaster_exec_t:s0 +/usr/bin/vmnet-netifup -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/vmnet-sniffer -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/vmware-wizard -- system_u:object_r:vmware_exec_t:s0 +/usr/bin/zabbix_agentd -- system_u:object_r:zabbix_agent_exec_t:s0 +/usr/bin/zabbix_server -- system_u:object_r:zabbix_exec_t:s0 +/usr/bin/zarafa-dagent -- system_u:object_r:zarafa_deliver_exec_t:s0 +/usr/bin/zarafa-search -- system_u:object_r:zarafa_indexer_exec_t:s0 +/usr/bin/zarafa-server -- system_u:object_r:zarafa_server_exec_t:s0 +/usr/lib/cgi-bin/check -- system_u:object_r:w3c_validator_script_exec_t:s0 +/usr/lib/colord/colord -- system_u:object_r:colord_exec_t:s0 +/usr/lib/courier/imapd -- system_u:object_r:courier_pop_exec_t:s0 +/usr/lib/courier/pop3d -- system_u:object_r:courier_pop_exec_t:s0 +/usr/lib/dotnet/dotnet -- system_u:object_r:bin_t:s0 +/usr/lib/galeon/galeon -- system_u:object_r:mozilla_exec_t:s0 +/usr/lib/iscan/network -- system_u:object_r:bin_t:s0 +/usr/lib/realmd/realmd -- system_u:object_r:realmd_exec_t:s0 +/usr/lib/udev/udev-acl -- system_u:object_r:udev_exec_t:s0 +/usr/lib/vmware/config -- system_u:object_r:vmware_sys_conf_t:s0 +/usr/libexec/Xorg\.wrap -- system_u:object_r:xserver_exec_t:s0 +/usr/libexec/dnf-utils -- system_u:object_r:debuginfo_exec_t:s0 +/usr/libexec/ipsec/spi -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/mock/mock -- system_u:object_r:mock_exec_t:s0 +/usr/libexec/news/innd -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/sudo/sesh -- system_u:object_r:shell_exec_t:s0 +/usr/sbin/ModemManager -- system_u:object_r:modemmanager_exec_t:s0 +/usr/sbin/avahi-daemon -- system_u:object_r:avahi_exec_t:s0 +/usr/sbin/bcfg2-server -- system_u:object_r:bcfg2_exec_t:s0 +/usr/sbin/bmc-watchdog -- system_u:object_r:freeipmi_bmc_watchdog_exec_t:s0 +/usr/sbin/booth-keygen -- system_u:object_r:boothd_exec_t:s0 +/usr/sbin/condor_procd -- system_u:object_r:condor_procd_exec_t:s0 +/usr/sbin/convertquota -- system_u:object_r:quota_exec_t:s0 +/usr/sbin/cups-browsed -- system_u:object_r:cupsd_exec_t:s0 +/usr/sbin/dlm_controld -- system_u:object_r:dlm_controld_exec_t:s0 +/usr/sbin/gfs_controld -- system_u:object_r:gfs_controld_exec_t:s0 +/usr/sbin/htcacheclean -- system_u:object_r:httpd_exec_t:s0 +/usr/sbin/ipvsadm-save -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/make_reiser4 -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/milter-regex -- system_u:object_r:regex_milter_exec_t:s0 +/usr/sbin/mysqlmanager -- system_u:object_r:mysqlmanagerd_exec_t:s0 +/usr/sbin/named-pkcs11 -- system_u:object_r:named_exec_t:s0 +/usr/sbin/ovs-vswitchd -- system_u:object_r:openvswitch_exec_t:s0 +/usr/sbin/ovsdb-server -- system_u:object_r:openvswitch_exec_t:s0 +/usr/sbin/pkcs11proxyd -- system_u:object_r:pkcs11proxyd_exec_t:s0 +/usr/sbin/pppoe-server -- system_u:object_r:pppd_exec_t:s0 +/usr/sbin/sanlk-resetd -- system_u:object_r:sanlk_resetd_exec_t:s0 +/usr/sbin/start-dirsrv -- system_u:object_r:initrc_exec_t:s0 +/usr/sbin/vgcfgrestore -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/virtnetworkd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/virtnodedevd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/virtstoraged -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/yum-updatesd -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/zabbix_proxy -- system_u:object_r:zabbix_exec_t:s0 +/var/lock/lmt-req\.lock -- system_u:object_r:apmd_lock_t:s0 +/var/lock/subsys/acpid -- system_u:object_r:apmd_lock_t:s0 +/var/lock/subsys/ipsec -- system_u:object_r:ipsec_mgmt_lock_t:s0 +/var/lock/subsys/slapd -- system_u:object_r:slapd_lock_t:s0 +/var/qmail/bin/tcp-env -- system_u:object_r:qmail_tcp_env_exec_t:s0 +/var/run/eventlogd\.pid -- system_u:object_r:eventlogd_var_run_t:s0 +/var/run/firewalld\.pid -- system_u:object_r:firewalld_var_run_t:s0 +/var/run/minissdpd\.pid -- system_u:object_r:minissdpd_var_run_t:s0 +/var/run/netlogond\.pid -- system_u:object_r:netlogond_var_run_t:s0 +/var/run/quota_nld\.pid -- system_u:object_r:quota_nld_var_run_t:s0 +/var/run/rgmanager\.pid -- system_u:object_r:cluster_var_run_t:s0 +/var/run/rpc\.statd\.pid -- system_u:object_r:rpcd_var_run_t:s0 +/var/run/setmixer_flag -- system_u:object_r:initrc_var_run_t:s0 +/var/run/sm-client\.pid -- system_u:object_r:sendmail_var_run_t:s0 +/var/run/sshd\.init\.pid -- system_u:object_r:sshd_var_run_t:s0 +/usr/X11R6/lib/X11/xkb -d system_u:object_r:xkb_var_lib_t:s0 +/var/spool/postfix/dev -d system_u:object_r:device_t:s0 +/var/spool/postfix/pid -d system_u:object_r:var_run_t:s0 +/dev/elographics/e2201 -c system_u:object_r:mouse_device_t:s0 +/dev/touchscreen/mk712 -c system_u:object_r:mouse_device_t:s0 +/lib/udev/devices/fuse -c system_u:object_r:fuse_device_t:s0 +/lib/udev/devices/null -c system_u:object_r:null_device_t:s0 +/lib/udev/devices/zero -c system_u:object_r:zero_device_t:s0 +/var/run/gssproxy\.sock -s system_u:object_r:gssproxy_var_run_t:s0 +/var/run/ostree-booted -s system_u:object_r:install_var_run_t:s0 +/var/log/conntrackd\.log system_u:object_r:conntrackd_log_t:s0 +/var/run/ldap-agent\.pid system_u:object_r:dirsrv_snmp_var_run_t:s0 +/etc/apcupsd/apccontrol -- system_u:object_r:bin_t:s0 +/etc/apcupsd/offbattery -- system_u:object_r:bin_t:s0 +/etc/apm/event\.d/autofs -- system_u:object_r:automount_exec_t:s0 +/etc/apm/event\.d/pcmcia -- system_u:object_r:cardmgr_exec_t:s0 +/etc/bluetooth/link_key -- system_u:object_r:bluetooth_conf_rw_t:s0 +/etc/cron\.daily/prelink -- system_u:object_r:prelink_cron_system_exec_t:s0 +/etc/device-credentials -- system_u:object_r:fdo_device_credentials_t:s0 +/etc/mdadm\.conf\.anacbak -- system_u:object_r:mdadm_conf_t:s0 +/etc/rc\.d/init\.d/amavis -- system_u:object_r:antivirus_initrc_exec_t:s0 +/etc/rc\.d/init\.d/auditd -- system_u:object_r:auditd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/autofs -- system_u:object_r:automount_initrc_exec_t:s0 +/etc/rc\.d/init\.d/babeld -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/condor -- system_u:object_r:condor_initrc_exec_t:s0 +/etc/rc\.d/init\.d/gdomap -- system_u:object_r:gdomap_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lldpad -- system_u:object_r:lldpad_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lsassd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lwregd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mcelog -- system_u:object_r:mcelog_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mongod -- system_u:object_r:mongod_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mongos -- system_u:object_r:mongod_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mysqld -- system_u:object_r:mysqld_initrc_exec_t:s0 +/etc/rc\.d/init\.d/naemon -- system_u:object_r:naemon_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nagios -- system_u:object_r:nagios_initrc_exec_t:s0 +/etc/rc\.d/init\.d/openct -- system_u:object_r:openct_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ospf6d -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/polipo -- system_u:object_r:polipo_initrc_exec_t:s0 +/etc/rc\.d/init\.d/psacct -- system_u:object_r:acct_initrc_exec_t:s0 +/etc/rc\.d/init\.d/puppet -- system_u:object_r:puppetagent_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pyzord -- system_u:object_r:spamd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/racoon -- system_u:object_r:ipsec_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ripngd -- system_u:object_r:zebra_initrc_exec_t:s0 +/etc/rc\.d/init\.d/snortd -- system_u:object_r:snort_initrc_exec_t:s0 +/etc/rc\.d/init\.d/spampd -- system_u:object_r:spamd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/vnstat -- system_u:object_r:vnstatd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/vsftpd -- system_u:object_r:ftpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ypbind -- system_u:object_r:ypbind_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ypserv -- system_u:object_r:nis_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ypxfrd -- system_u:object_r:nis_initrc_exec_t:s0 +/etc/sysconfig/cgconfig -- system_u:object_r:cgconfig_etc_t:s0 +/etc/tuned/profile_mode -- system_u:object_r:tuned_rw_etc_t:s0 +/root/\.default_contexts -- system_u:object_r:default_context_t:s0 +/sbin/pam_console_apply -- system_u:object_r:pam_console_exec_t:s0 +/usr/X11R6/bin/Xwrapper -- system_u:object_r:xserver_exec_t:s0 +/usr/afs/bin/dasalvager -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/afs/bin/fileserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/bin/NetworkManager -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/bin/abrt-watch-log -- system_u:object_r:abrt_watch_log_exec_t:s0 +/usr/bin/cockpit-bridge -- system_u:object_r:shell_exec_t:s0 +/usr/bin/corosync-qnetd -- system_u:object_r:cluster_exec_t:s0 +/usr/bin/fdo-admin-tool -- system_u:object_r:fdo_exec_t:s0 +/usr/bin/fdo-owner-tool -- system_u:object_r:fdo_exec_t:s0 +/usr/bin/livecd-creator -- system_u:object_r:livecd_exec_t:s0 +/usr/bin/lttng-sessiond -- system_u:object_r:lttng_sessiond_exec_t:s0 +/usr/bin/neutron-server -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/nova-conductor -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nova-scheduler -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nspluginviewer -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/bin/oddjob_request -- system_u:object_r:oddjob_exec_t:s0 +/usr/bin/partition_uuid -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/qemu-pr-helper -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/quantum-server -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/roundup-server -- system_u:object_r:roundup_exec_t:s0 +/usr/bin/scsi_unique_id -- system_u:object_r:fsadm_exec_t:s0 +/usr/bin/systemd-notify -- system_u:object_r:systemd_notify_exec_t:s0 +/usr/bin/vmware-network -- system_u:object_r:vmware_host_exec_t:s0 +/usr/bin/wpa_supplicant -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/bin/yum-deprecated -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/zarafa-gateway -- system_u:object_r:zarafa_gateway_exec_t:s0 +/usr/bin/zarafa-indexer -- system_u:object_r:zarafa_indexer_exec_t:s0 +/usr/bin/zarafa-monitor -- system_u:object_r:zarafa_monitor_exec_t:s0 +/usr/bin/zarafa-spooler -- system_u:object_r:zarafa_spooler_exec_t:s0 +/usr/kerberos/sbin/ftpd -- system_u:object_r:ftpd_exec_t:s0 +/usr/kerberos/sbin/kshd -- system_u:object_r:rshd_exec_t:s0 +/usr/lib/amanda/amandad -- system_u:object_r:amanda_inetd_exec_t:s0 +/usr/lib/libbcm_host\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libmlib_jai\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/openldap/slapd -- system_u:object_r:slapd_exec_t:s0 +/usr/lib/upower/upowerd -- system_u:object_r:devicekit_power_exec_t:s0 +/usr/lib/valgrind/hp2ps -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/yaboot/addnote -- system_u:object_r:bin_t:s0 +/usr/libexec/dcc/dccifd -- system_u:object_r:dccifd_exec_t:s0 +/usr/libexec/modcluster -- system_u:object_r:ricci_modcluster_exec_t:s0 +/usr/libexec/news/inews -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/inndf -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/nnrpd -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/rnews -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/vdsm/vdsmd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/audisp-remote -- system_u:object_r:audisp_remote_exec_t:s0 +/usr/sbin/avahi-autoipd -- system_u:object_r:avahi_exec_t:s0 +/usr/sbin/clamav-milter -- system_u:object_r:antivirus_exec_t:s0 +/usr/sbin/condor_master -- system_u:object_r:condor_master_exec_t:s0 +/usr/sbin/condor_schedd -- system_u:object_r:condor_schedd_exec_t:s0 +/usr/sbin/condor_startd -- system_u:object_r:condor_startd_exec_t:s0 +/usr/sbin/courier-imapd -- system_u:object_r:courier_pop_exec_t:s0 +/usr/sbin/courierlogger -- system_u:object_r:courier_exec_t:s0 +/usr/sbin/ctdbd_wrapper -- system_u:object_r:ctdbd_exec_t:s0 +/usr/sbin/hv_kvp_daemon -- system_u:object_r:hypervkvp_exec_t:s0 +/usr/sbin/ipx_configure -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/ipx_interface -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/lvmiopversion -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/microcode_ctl -- system_u:object_r:cpucontrol_exec_t:s0 +/usr/sbin/modem-manager -- system_u:object_r:modemmanager_exec_t:s0 +/usr/sbin/nsd-checkconf -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/nsd-checkzone -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/ods-enforcerd -- system_u:object_r:opendnssec_exec_t:s0 +/usr/sbin/open_init_pty -- system_u:object_r:initrc_exec_t:s0 +/usr/sbin/pktcdvd-check -- system_u:object_r:fsadm_exec_t:s0 +/usr/sbin/puppetmasterd -- system_u:object_r:puppetmaster_exec_t:s0 +/usr/sbin/rpc\.yppasswdd -- system_u:object_r:yppasswdd_exec_t:s0 +/usr/sbin/stop-ds-admin -- system_u:object_r:dirsrvadmin_exec_t:s0 +/usr/sbin/tcb_unconvert -- system_u:object_r:updpwd_exec_t:s0 +/usr/sbin/vgscan\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/virtnwfilterd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/xtables-multi -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/zabbix_agentd -- system_u:object_r:zabbix_agent_exec_t:s0 +/usr/sbin/zabbix_server -- system_u:object_r:zabbix_exec_t:s0 +/usr/share/pcp/lib/pmie -- system_u:object_r:pcp_pmie_exec_t:s0 +/usr/share/vdsm/respawn -- system_u:object_r:virtd_exec_t:s0 +/var/lock/subsys/autofs -- system_u:object_r:automount_lock_t:s0 +/var/qmail/bin/sendmail -- system_u:object_r:sendmail_exec_t:s0 +/var/qmail/bin/splogger -- system_u:object_r:qmail_splogger_exec_t:s0 +/var/run/consolekit\.pid -- system_u:object_r:consolekit_var_run_t:s0 +/var/run/powersaved\.pid -- system_u:object_r:apmd_var_run_t:s0 +/var/run/qat/qatmgr\.pid -- system_u:object_r:qatlib_var_run_t:s0 +/var/run/rpc\.statd\.lock -- system_u:object_r:rpcd_lock_t:s0 +/var/run/samba/nmbd\.pid -- system_u:object_r:nmbd_var_run_t:s0 +/var/run/samba/smbd\.pid -- system_u:object_r:smbd_var_run_t:s0 +/var/run/targetclid\.pid -- system_u:object_r:targetclid_var_run_t:s0 +/var/run/varnishlog\.pid -- system_u:object_r:varnishlog_var_run_t:s0 +/var/spool/fcron/systab -- system_u:object_r:system_cron_spool_t:s0 +/var/www/git/gitweb\.cgi -- system_u:object_r:git_script_exec_t:s0 +/dev/network_throughput -c system_u:object_r:netcontrol_device_t:s0 +/dev/xen/xenbus_backend -c system_u:object_r:xen_device_t:s0 +/var/lib/likewise/\.lwsm -s system_u:object_r:lwsmd_var_socket_t:s0 +/var/run/audispd_events -s system_u:object_r:audisp_var_run_t:s0 +/var/run/conntrackd\.ctl -s system_u:object_r:conntrackd_var_run_t:s0 +/var/run/minissdpd\.sock -s system_u:object_r:minissdpd_var_run_t:s0 +/var/run/secrets\.socket -s system_u:object_r:sssd_var_run_t:s0 +/var/run/zarafa-indexer -s system_u:object_r:zarafa_indexer_var_run_t:s0 +/usr/var/lib/random-seed system_u:object_r:random_seed_t:s0 +/var/lib/pki-tps/pki-tps system_u:object_r:pki_tps_exec_t:s0 +/var/lock/conntrack\.lock system_u:object_r:conntrackd_var_lock_t:s0 +/var/tmp/hsperfdata_root system_u:object_r:user_tmp_t:s0 +/boot/device-credentials -- system_u:object_r:fdo_device_credentials_t:s0 +/etc/X11/xdm/GiveConsole -- system_u:object_r:bin_t:s0 +/etc/X11/xdm/TakeConsole -- system_u:object_r:bin_t:s0 +/etc/apcupsd/commfailure -- system_u:object_r:bin_t:s0 +/etc/avahi/etc/localtime -- system_u:object_r:locale_t:s0 +/etc/pads-signature-list -- system_u:object_r:pads_config_t:s0 +/etc/rc\.d/init\.d/apcupsd -- system_u:object_r:apcupsd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/bitlbee -- system_u:object_r:bitlbee_initrc_exec_t:s0 +/etc/rc\.d/init\.d/blkmapd -- system_u:object_r:blkmapd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/chronyd -- system_u:object_r:chronyd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/couchdb -- system_u:object_r:couchdb_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dcerpcd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dnsmasq -- system_u:object_r:dnsmasq_initrc_exec_t:s0 +/etc/rc\.d/init\.d/dovecot -- system_u:object_r:dovecot_initrc_exec_t:s0 +/etc/rc\.d/init\.d/hddtemp -- system_u:object_r:hddtemp_initrc_exec_t:s0 +/etc/rc\.d/init\.d/icecast -- system_u:object_r:icecast_initrc_exec_t:s0 +/etc/rc\.d/init\.d/jabberd -- system_u:object_r:jabberd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/kadmind -- system_u:object_r:kerberos_initrc_exec_t:s0 +/etc/rc\.d/init\.d/krb524d -- system_u:object_r:kerberos_initrc_exec_t:s0 +/etc/rc\.d/init\.d/krb5kdc -- system_u:object_r:kerberos_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nfslock -- system_u:object_r:rpcd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/openais -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/openvpn -- system_u:object_r:openvpn_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pmproxy -- system_u:object_r:pcp_pmproxy_initrc_exec_t:s0 +/etc/rc\.d/init\.d/portmap -- system_u:object_r:portmap_initrc_exec_t:s0 +/etc/rc\.d/init\.d/postfix -- system_u:object_r:postfix_initrc_exec_t:s0 +/etc/rc\.d/init\.d/privoxy -- system_u:object_r:privoxy_initrc_exec_t:s0 +/etc/rc\.d/init\.d/proftpd -- system_u:object_r:ftpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/radiusd -- system_u:object_r:radiusd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/roundup -- system_u:object_r:roundup_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rpcbind -- system_u:object_r:rpcbind_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rsyslog -- system_u:object_r:syslogd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sanlock -- system_u:object_r:sanlock_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sensord -- system_u:object_r:sensord_initrc_exec_t:s0 +/etc/rc\.d/init\.d/srvsvcd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sysstat -- system_u:object_r:sysstat_initrc_exec_t:s0 +/etc/rc\.d/init\.d/unbound -- system_u:object_r:named_initrc_exec_t:s0 +/etc/rc\.d/init\.d/varnish -- system_u:object_r:varnishd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/vhostmd -- system_u:object_r:vhostmd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/winbind -- system_u:object_r:samba_initrc_exec_t:s0 +/lib/udev/udisks-part-id -- system_u:object_r:devicekit_disk_exec_t:s0 +/opt/likewise/sbin/lwiod -- system_u:object_r:lwiod_exec_t:s0 +/opt/likewise/sbin/lwsmd -- system_u:object_r:lwsmd_exec_t:s0 +/sbin/audispd-zos-remote -- system_u:object_r:zos_remote_exec_t:s0 +/usr/afs/bin/davolserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/bin/fail2ban-client -- system_u:object_r:fail2ban_client_exec_t:s0 +/usr/bin/fail2ban-server -- system_u:object_r:fail2ban_exec_t:s0 +/usr/bin/gl-auth-command -- system_u:object_r:gitosis_exec_t:s0 +/usr/bin/glance-registry -- system_u:object_r:glance_registry_exec_t:s0 +/usr/bin/glance-scrubber -- system_u:object_r:glance_scrubber_exec_t:s0 +/usr/bin/gpe-soundserver -- system_u:object_r:soundd_exec_t:s0 +/usr/bin/insights-client -- system_u:object_r:insights_client_exec_t:s0 +/usr/bin/mariadb-upgrade -- system_u:object_r:mysqld_exec_t:s0 +/usr/bin/nova-direct-api -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nova-novncproxy -- system_u:object_r:nova_exec_t:s0 +/usr/bin/package-cleanup -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/prelude-manager -- system_u:object_r:prelude_exec_t:s0 +/usr/bin/raw-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/start-puppet-ca -- system_u:object_r:puppetca_exec_t:s0 +/usr/bin/vios-proxy-host -- system_u:object_r:virtd_exec_t:s0 +/usr/lib/AntiVir/antivir -- system_u:object_r:antivirus_exec_t:s0 +/usr/lib/amanda/amindexd -- system_u:object_r:amanda_inetd_exec_t:s0 +/usr/lib/ipsec/_plutorun -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/lib/udisks2/udisksd -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/lib/valgrind/stage2 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/wicd/monitor\.py -- system_u:object_r:bin_t:s0 +/usr/libexec/colord-sane -- system_u:object_r:colord_exec_t:s0 +/usr/libexec/dcc/dbclean -- system_u:object_r:dcc_dbclean_exec_t:s0 +/usr/libexec/fcronsighup -- system_u:object_r:crontab_exec_t:s0 +/usr/libexec/fwupd/fwupd -- system_u:object_r:fwupd_exec_t:s0 +/usr/libexec/hal_lpadmin -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/libexec/ipsec/pluto -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/libvirt_lxc -- system_u:object_r:virtd_lxc_exec_t:s0 +/usr/libexec/news/expire -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/fastrm -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/shlock -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/nx/nxserver -- system_u:object_r:nx_server_exec_t:s0 +/usr/libexec/packagekitd -- system_u:object_r:rpm_exec_t:s0 +/usr/libexec/rpm-ostreed -- system_u:object_r:install_exec_t:s0 +/usr/sbin/NetworkManager -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/sbin/arptables-save -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/audio-entropyd -- system_u:object_r:entropyd_exec_t:s0 +/usr/sbin/audisp-prelude -- system_u:object_r:prelude_audisp_exec_t:s0 +/usr/sbin/avahi-dnsconfd -- system_u:object_r:avahi_exec_t:s0 +/usr/sbin/cgconfigparser -- system_u:object_r:cgconfig_exec_t:s0 +/usr/sbin/charon-systemd -- system_u:object_r:ipsec_exec_t:s0 +/usr/sbin/condor_starter -- system_u:object_r:condor_startd_exec_t:s0 +/usr/sbin/condor_vm-gahp -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/dmsetup\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/fence_sanlockd -- system_u:object_r:fenced_exec_t:s0 +/usr/sbin/ldap-agent-bin -- system_u:object_r:dirsrv_snmp_exec_t:s0 +/usr/sbin/modules-update -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/mount\.ecryptfs -- system_u:object_r:mount_ecryptfs_exec_t:s0 +/usr/sbin/openct-control -- system_u:object_r:openct_exec_t:s0 +/usr/sbin/restart-dirsrv -- system_u:object_r:initrc_exec_t:s0 +/usr/sbin/samba-gpupdate -- system_u:object_r:samba_gpupdate_exec_t:s0 +/usr/sbin/shorewall-lite -- system_u:object_r:shorewall_exec_t:s0 +/usr/sbin/spamass-milter -- system_u:object_r:spamass_milter_exec_t:s0 +/usr/sbin/spice-vdagentd -- system_u:object_r:vdagent_exec_t:s0 +/usr/sbin/start-ds-admin -- system_u:object_r:dirsrvadmin_exec_t:s0 +/usr/sbin/unbound-anchor -- system_u:object_r:named_exec_t:s0 +/usr/sbin/update-modules -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/virtinterfaced -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/vmware-serverd -- system_u:object_r:vmware_exec_t:s0 +/usr/sbin/wait_for_sysfs -- system_u:object_r:udev_exec_t:s0 +/usr/sbin/wpa_supplicant -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/share/sandbox/start -- system_u:object_r:sandbox_exec_t:s0 +/var/lib/tftpboot/yaboot -- system_u:object_r:cobbler_var_lib_t:s0 +/var/lock/subsys/apcupsd -- system_u:object_r:apcupsd_lock_t:s0 +/var/run/MailScanner\.pid -- system_u:object_r:mscan_var_run_t:s0 +/var/run/aeolus/thin\.pid -- system_u:object_r:thin_var_run_t:s0 +/var/run/cachefilesd\.pid -- system_u:object_r:cachefilesd_var_run_t:s0 +/var/run/ipmidetectd\.pid -- system_u:object_r:freeipmi_ipmidetectd_var_run_t:s0 +/var/run/modclusterd\.pid -- system_u:object_r:ricci_modcluster_var_run_t:s0 +/var/run/portmap_mapping -- system_u:object_r:portmap_var_run_t:s0 +/var/run/prelude-lml\.pid -- system_u:object_r:prelude_lml_var_run_t:s0 +/var/run/restorecond\.pid -- system_u:object_r:restorecond_var_run_t:s0 +/var/run/rhev-agentd\.pid -- system_u:object_r:rhev_agentd_var_run_t:s0 +/var/run/varnishncsa\.pid -- system_u:object_r:varnishlog_var_run_t:s0 +/var/run/xenconsoled\.pid -- system_u:object_r:xenconsoled_var_run_t:s0 +/var/run/zarafa-ical\.pid -- system_u:object_r:zarafa_ical_var_run_t:s0 +/var/spool/cron/crontabs -d system_u:object_r:cron_spool_t:s0 +/dev/touchscreen/ucb1x00 -c system_u:object_r:mouse_device_t:s0 +/var/lib/likewise/\.lwiod -s system_u:object_r:lwiod_var_socket_t:s0 +/var/lib/likewise/\.ntlmd -s system_u:object_r:lsassd_var_socket_t:s0 +/var/lib/likewise/\.regsd -s system_u:object_r:lwregd_var_socket_t:s0 +/var/run/multipathd\.sock -s system_u:object_r:lvm_var_run_t:s0 +/var/run/targetclid\.sock -s system_u:object_r:targetclid_var_run_t:s0 +/usr/share/alsa/alsa\.conf system_u:object_r:alsa_etc_rw_t:s0 +/etc/cron\.daily/calamaris -- system_u:object_r:calamaris_exec_t:s0 +/etc/cron\.daily/certwatch -- system_u:object_r:certwatch_exec_t:s0 +/etc/cron\.monthly/proftpd -- system_u:object_r:ftpd_exec_t:s0 +/etc/krb5kdc/kadm5\.keytab -- system_u:object_r:krb5_keytab_t:s0 +/etc/rc\.d/init\.d/ajaxterm -- system_u:object_r:ajaxterm_initrc_exec_t:s0 +/etc/rc\.d/init\.d/arpwatch -- system_u:object_r:arpwatch_initrc_exec_t:s0 +/etc/rc\.d/init\.d/asterisk -- system_u:object_r:asterisk_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cgconfig -- system_u:object_r:cgconfig_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cmirrord -- system_u:object_r:cmirrord_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cobblerd -- system_u:object_r:cobblerd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/collectd -- system_u:object_r:collectd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/corosync -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cpglockd -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/cyphesis -- system_u:object_r:cyphesis_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ddclient -- system_u:object_r:ddclient_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ebtables -- system_u:object_r:iptables_initrc_exec_t:s0 +/etc/rc\.d/init\.d/fail2ban -- system_u:object_r:fail2ban_initrc_exec_t:s0 +/etc/rc\.d/init\.d/gatherer -- system_u:object_r:sblim_initrc_exec_t:s0 +/etc/rc\.d/init\.d/ksmtuned -- system_u:object_r:ksmtuned_initrc_exec_t:s0 +/etc/rc\.d/init\.d/libvirtd -- system_u:object_r:virtd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/lighttpd -- system_u:object_r:httpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/likewise -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mcstrans -- system_u:object_r:setrans_initrc_exec_t:s0 +/etc/rc\.d/init\.d/minidlna -- system_u:object_r:minidlna_initrc_exec_t:s0 +/etc/rc\.d/init\.d/nftables -- system_u:object_r:iptables_initrc_exec_t:s0 +/etc/rc\.d/init\.d/openhpid -- system_u:object_r:openhpid_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pmlogger -- system_u:object_r:pcp_pmlogger_initrc_exec_t:s0 +/etc/rc\.d/init\.d/postgrey -- system_u:object_r:postgrey_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sendmail -- system_u:object_r:sendmail_initrc_exec_t:s0 +/etc/rc\.d/init\.d/virtlogd -- system_u:object_r:virtlogd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/watchdog -- system_u:object_r:watchdog_initrc_exec_t:s0 +/etc/rc\.d/init\.d/yppasswd -- system_u:object_r:nis_initrc_exec_t:s0 +/etc/sddm/wayland-session -- system_u:object_r:bin_t:s0 +/etc/security/opasswd\.old -- system_u:object_r:shadow_t:s0 +/etc/sysconfig/cgred\.conf -- system_u:object_r:cgrules_etc_t:s0 +/etc/sysconfig/netconsole -- system_u:object_r:bin_t:s0 +/etc/tuned/active_profile -- system_u:object_r:tuned_rw_etc_t:s0 +/opt/likewise/sbin/lsassd -- system_u:object_r:lsassd_exec_t:s0 +/opt/likewise/sbin/lwregd -- system_u:object_r:lwregd_exec_t:s0 +/sbin/pam_timestamp_check -- system_u:object_r:pam_timestamp_exec_t:s0 +/sys/kernel/uevent_helper -- system_u:object_r:usermodehelper_t:s0 +/tmp/insights-client\.ppid -- system_u:object_r:insights_client_tmp_t:s0 +/usr/afs/bin/dafileserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/bin/cinder-scheduler -- system_u:object_r:cinder_scheduler_exec_t:s0 +/usr/bin/coreos-installer -- system_u:object_r:coreos_installer_exec_t:s0 +/usr/bin/cpufreq-selector -- system_u:object_r:cpufreqselector_exec_t:s0 +/usr/bin/mozilla-snapshot -- system_u:object_r:mozilla_exec_t:s0 +/usr/bin/neutron-l3-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/neutron-rootwrap -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/nova-objectstore -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nova-serialproxy -- system_u:object_r:nova_exec_t:s0 +/usr/bin/nova-xvpvncproxy -- system_u:object_r:nova_exec_t:s0 +/usr/bin/obex-data-server -- system_u:object_r:obex_exec_t:s0 +/usr/bin/quantum-l3-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/rhel-push-plugin -- system_u:object_r:container_runtime_exec_t:s0 +/usr/bin/systemd-tmpfiles -- system_u:object_r:systemd_tmpfiles_exec_t:s0 +/usr/bin/vios-proxy-guest -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/vmware-smbpasswd -- system_u:object_r:vmware_host_exec_t:s0 +/usr/kerberos/sbin/kpropd -- system_u:object_r:kpropd_exec_t:s0 +/usr/lib/ipsec/_plutoload -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/lib/ipsec/klipsdebug -- system_u:object_r:ipsec_exec_t:s0 +/usr/lib/misc/sftp-server -- system_u:object_r:bin_t:s0 +/usr/lib/oddjob/mkhomedir -- system_u:object_r:oddjob_mkhomedir_exec_t:s0 +/usr/lib/polkit-1/polkitd -- system_u:object_r:policykit_exec_t:s0 +/usr/libexec/dovecot/auth -- system_u:object_r:dovecot_auth_exec_t:s0 +/usr/libexec/ipsec/eroute -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/news/actsync -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/archive -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/batcher -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/ctlinnd -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/getlist -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/innfeed -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/innxmit -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/makedbz -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/nntpget -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/pcp/bin/pmcd -- system_u:object_r:pcp_pmcd_exec_t:s0 +/usr/libexec/pcp/bin/pmie -- system_u:object_r:pcp_pmie_exec_t:s0 +/usr/libexec/pcp/lib/pmcd -- system_u:object_r:pcp_pmcd_initrc_exec_t:s0 +/usr/libexec/pcp/lib/pmie -- system_u:object_r:pcp_pmie_initrc_exec_t:s0 +/usr/libexec/postfix/lmtp -- system_u:object_r:postfix_smtp_exec_t:s0 +/usr/libexec/postfix/pipe -- system_u:object_r:postfix_pipe_exec_t:s0 +/usr/libexec/postfix/smtp -- system_u:object_r:postfix_smtp_exec_t:s0 +/usr/libexec/rhsm-service -- system_u:object_r:rhsmcertd_exec_t:s0 +/usr/libexec/ricci-modlog -- system_u:object_r:ricci_modlog_exec_t:s0 +/usr/libexec/ricci-modrpm -- system_u:object_r:ricci_modrpm_exec_t:s0 +/usr/libexec/rtkit-daemon -- system_u:object_r:rtkit_daemon_exec_t:s0 +/usr/libexec/tangd-keygen -- system_u:object_r:tangd_exec_t:s0 +/usr/libexec/tangd-update -- system_u:object_r:tangd_exec_t:s0 +/usr/libexec/vdsm/respawn -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/dnssec-triggerd -- system_u:object_r:dnssec_trigger_exec_t:s0 +/usr/sbin/ebtables-legacy -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/init_repository -- system_u:object_r:pegasus_exec_t:s0 +/usr/sbin/ipvsadm-restore -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/milter-greylist -- system_u:object_r:greylist_milter_exec_t:s0 +/usr/sbin/named-checkconf -- system_u:object_r:named_checkconf_exec_t:s0 +/usr/sbin/netlabel-config -- system_u:object_r:netlabel_mgmt_exec_t:s0 +/usr/sbin/setroubleshootd -- system_u:object_r:setroubleshootd_exec_t:s0 +/usr/sbin/umount\.ecryptfs -- system_u:object_r:mount_ecryptfs_exec_t:s0 +/usr/sbin/unbound-control -- system_u:object_r:named_exec_t:s0 +/usr/sbin/vgchange\.static -- system_u:object_r:lvm_exec_t:s0 +/var/lib/tftpboot/memdisk -- system_u:object_r:cobbler_var_lib_t:s0 +/var/lock/subsys/iptables -- system_u:object_r:iptables_lock_t:s0 +/var/qmail/bin/qmail-send -- system_u:object_r:qmail_send_exec_t:s0 +/var/run/bcfg2-server\.pid -- system_u:object_r:bcfg2_var_run_t:s0 +/var/run/bmc-watchdog\.pid -- system_u:object_r:freeipmi_bmc_watchdog_var_run_t:s0 +/var/run/dlm_controld\.pid -- system_u:object_r:dlm_controld_var_run_t:s0 +/var/run/gfs_controld\.pid -- system_u:object_r:gfs_controld_var_run_t:s0 +/var/run/pluto/ipsec\.info -- system_u:object_r:ipsec_mgmt_var_run_t:s0 +/var/run/samba/brlock\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/sys/firmware/efi/efivars -d system_u:object_r:efivarfs_t:s0 +/usr/lib/udev/devices/pts -d system_u:object_r:devpts_t:s0 +/usr/lib/udev/devices/shm -d system_u:object_r:tmpfs_t:s0 +/var/lib/likewise-open/db -d system_u:object_r:likewise_var_lib_t:s0 +/var/log/audit/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/named/chroot/var/log -d system_u:object_r:var_log_t:s0 +/var/named/chroot_sdb/dev -d system_u:object_r:device_t:s0 +/usr/lib/udev/devices/ppp -c system_u:object_r:ppp_device_t:s0 +/var/lib/likewise/\.lsassd -s system_u:object_r:lsassd_var_socket_t:s0 +/var/lib/mysql/mysql\.sock -s system_u:object_r:mysqld_var_run_t:s0 +/var/named/chroot/dev/log -s system_u:object_r:devlog_t:s0 +/var/run/powersave_socket -s system_u:object_r:apmd_var_run_t:s0 +/lib/udev/devices/MAKEDEV -l system_u:object_r:bin_t:s0 +/var/lib/iscan/interpreter system_u:object_r:bin_t:s0 +/etc/apcupsd/masterconnect -- system_u:object_r:bin_t:s0 +/etc/apcupsd/mastertimeout -- system_u:object_r:bin_t:s0 +/etc/postfix/chroot-update -- system_u:object_r:postfix_exec_t:s0 +/etc/ptal/ptal-printd-like -- system_u:object_r:etc_runtime_t:s0 +/etc/rc\.d/init\.d/bluetooth -- system_u:object_r:bluetooth_initrc_exec_t:s0 +/etc/rc\.d/init\.d/denyhosts -- system_u:object_r:denyhosts_initrc_exec_t:s0 +/etc/rc\.d/init\.d/eventlogd -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/fetchmail -- system_u:object_r:fetchmail_initrc_exec_t:s0 +/etc/rc\.d/init\.d/firewalld -- system_u:object_r:firewalld_initrc_exec_t:s0 +/etc/rc\.d/init\.d/functions -- system_u:object_r:bin_t:s0 +/etc/rc\.d/init\.d/heartbeat -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mdmonitor -- system_u:object_r:mdadm_initrc_exec_t:s0 +/etc/rc\.d/init\.d/memcached -- system_u:object_r:memcached_initrc_exec_t:s0 +/etc/rc\.d/init\.d/minissdpd -- system_u:object_r:minissdpd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mon_statd -- system_u:object_r:mon_statd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/named-sdb -- system_u:object_r:named_initrc_exec_t:s0 +/etc/rc\.d/init\.d/netlogond -- system_u:object_r:likewise_initrc_exec_t:s0 +/etc/rc\.d/init\.d/oracleasm -- system_u:object_r:oracleasm_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pacemaker -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/pkcsslotd -- system_u:object_r:pkcs_slotd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rgmanager -- system_u:object_r:cluster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rhsmcertd -- system_u:object_r:rhsmcertd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rpcidmapd -- system_u:object_r:rpcd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/smokeping -- system_u:object_r:smokeping_initrc_exec_t:s0 +/etc/strongswan/ipsec\.conf -- system_u:object_r:ipsec_conf_file_t:s0 +/etc/sysconfig/MailScanner -- system_u:object_r:mscan_etc_t:s0 +/lib/modules/modprobe\.conf -- system_u:object_r:modules_conf_t:s0 +/lib/security/pam_poldi\.so -- system_u:object_r:textrel_shlib_t:s0 +/opt/likewise/sbin/dcerpcd -- system_u:object_r:dcerpcd_exec_t:s0 +/opt/likewise/sbin/srvsvcd -- system_u:object_r:srvsvcd_exec_t:s0 +/usr/afs/bin/salvageserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/bin/coredump2packages -- system_u:object_r:abrt_retrace_coredump_exec_t:s0 +/usr/bin/ffmpegthumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/neutron-ryu-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/nova-api-metadata -- system_u:object_r:nova_exec_t:s0 +/usr/bin/quantum-ryu-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/speech-dispatcher -- system_u:object_r:speech_dispatcher_exec_t:s0 +/usr/bin/swift-object-info -- system_u:object_r:swift_exec_t:s0 +/usr/bin/whaaw-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/kerberos/sbin/klogind -- system_u:object_r:rlogind_exec_t:s0 +/usr/kerberos/sbin/telnetd -- system_u:object_r:telnetd_exec_t:s0 +/usr/lib/amanda/amidxtaped -- system_u:object_r:amanda_inetd_exec_t:s0 +/usr/lib/libg\+\+\.so\.2\.7\.2\.8 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/opa-fm/bin/opafmd -- system_u:object_r:opafm_exec_t:s0 +/usr/lib/policykit/polkitd -- system_u:object_r:policykit_exec_t:s0 +/usr/lib/storaged/storaged -- system_u:object_r:lvm_exec_t:s0 +/usr/libexec/chrony-helper -- system_u:object_r:chronyd_exec_t:s0 +/usr/libexec/cockpit-agent -- system_u:object_r:shell_exec_t:s0 +/usr/libexec/devkit-daemon -- system_u:object_r:devicekit_exec_t:s0 +/usr/libexec/hal-podsleuth -- system_u:object_r:podsleuth_exec_t:s0 +/usr/libexec/ipsec/addconn -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/news/buffchan -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/convdate -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/cvtbatch -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/filechan -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/overchan -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/nm-dispatcher -- system_u:object_r:NetworkManager_dispatcher_exec_t:s0 +/usr/libexec/opensm-launch -- system_u:object_r:opensm_exec_t:s0 +/usr/libexec/postfix/local -- system_u:object_r:postfix_local_exec_t:s0 +/usr/libexec/postfix/showq -- system_u:object_r:postfix_showq_exec_t:s0 +/usr/libexec/postfix/smtpd -- system_u:object_r:postfix_smtpd_exec_t:s0 +/usr/libexec/sssd/sssd_ifp -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/sssd/sssd_kcm -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/sssd/sssd_nss -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/sssd/sssd_pac -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/sssd/sssd_pam -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/sssd/sssd_ssh -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/tomcat/server -- system_u:object_r:tomcat_exec_t:s0 +/usr/libexec/udisks-daemon -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/sbin/arptables-legacy -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/condor_collector -- system_u:object_r:condor_collector_exec_t:s0 +/usr/sbin/corosync-cfgtool -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/corosync-notifyd -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/corosync-qdevice -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/ebtables-restore -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/ipx_internal_net -- system_u:object_r:ifconfig_exec_t:s0 +/usr/sbin/mkhomedir_helper -- system_u:object_r:oddjob_mkhomedir_exec_t:s0 +/usr/sbin/multipath\.static -- system_u:object_r:lvm_exec_t:s0 +/usr/sbin/pwhistory_helper -- system_u:object_r:updpwd_exec_t:s0 +/usr/sbin/restart-ds-admin -- system_u:object_r:dirsrvadmin_exec_t:s0 +/usr/sbin/rhel-push-plugin -- system_u:object_r:container_runtime_exec_t:s0 +/usr/sbin/sendmail\.postfix -- system_u:object_r:sendmail_exec_t:s0 +/var/lib/tftpboot/menu\.c32 -- system_u:object_r:cobbler_var_lib_t:s0 +/var/lock/subsys/denyhosts -- system_u:object_r:denyhosts_var_lock_t:s0 +/var/lock/subsys/ip6tables -- system_u:object_r:iptables_lock_t:s0 +/var/lock/subsys/pkidaemon -- system_u:object_r:pki_tomcat_lock_t:s0 +/var/lock/subsys/rhsmcertd -- system_u:object_r:rhsmcertd_lock_t:s0 +/var/lock/subsys/rtas_errd -- system_u:object_r:rtas_errd_var_lock_t:s0 +/var/lock/subsys/shorewall -- system_u:object_r:shorewall_lock_t:s0 +/var/qmail/bin/qmail-clean -- system_u:object_r:qmail_clean_exec_t:s0 +/var/qmail/bin/qmail-getpw -- system_u:object_r:qmail_exec_t:s0 +/var/qmail/bin/qmail-local -- system_u:object_r:qmail_local_exec_t:s0 +/var/qmail/bin/qmail-queue -- system_u:object_r:qmail_queue_exec_t:s0 +/var/qmail/bin/qmail-smtpd -- system_u:object_r:qmail_smtpd_exec_t:s0 +/var/qmail/bin/qmail-start -- system_u:object_r:qmail_start_exec_t:s0 +/var/run/checkquorum-timer -- system_u:object_r:wdmd_var_run_t:s0 +/var/run/kismet_server\.pid -- system_u:object_r:kismet_var_run_t:s0 +/var/run/piranha-httpd\.pid -- system_u:object_r:piranha_web_var_run_t:s0 +/var/run/samba/locking\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/var/run/swift_server\.lock -- system_u:object_r:rsync_var_run_t:s0 +/var/run/zarafa-dagent\.pid -- system_u:object_r:zarafa_deliver_var_run_t:s0 +/var/run/zarafa-search\.pid -- system_u:object_r:zarafa_indexer_var_run_t:s0 +/var/run/zarafa-server\.pid -- system_u:object_r:zarafa_server_var_run_t:s0 +/var/lib/likewise-open/rpc -d system_u:object_r:likewise_var_lib_t:s0 +/var/lib/likewise-open/run -d system_u:object_r:likewise_var_lib_t:s0 +/usr/lib/udev/devices/fuse -c system_u:object_r:fuse_device_t:s0 +/usr/lib/udev/devices/null -c system_u:object_r:null_device_t:s0 +/usr/lib/udev/devices/zero -c system_u:object_r:zero_device_t:s0 +/var/named/chroot/dev/null -c system_u:object_r:null_device_t:s0 +/var/named/chroot/dev/zero -c system_u:object_r:zero_device_t:s0 +/var/run/collectd-unixsock -s system_u:object_r:collectd_var_run_t:s0 +/var/spool/postfix/dev/log -s system_u:object_r:devlog_t:s0 +/usr/bin/debuginfo-install -l system_u:object_r:debuginfo_exec_t:s0 +/root/\.google_authenticator system_u:object_r:auth_home_t:s0 +/etc/mgetty\+sendfax/new_fax -- system_u:object_r:bin_t:s0 +/etc/rc\.d/init\.d/callweaver -- system_u:object_r:callweaver_initrc_exec_t:s0 +/etc/rc\.d/init\.d/certmaster -- system_u:object_r:certmaster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/certmonger -- system_u:object_r:certmonger_initrc_exec_t:s0 +/etc/rc\.d/init\.d/hypervkvpd -- system_u:object_r:hypervkvp_initrc_exec_t:s0 +/etc/rc\.d/init\.d/irqbalance -- system_u:object_r:irqbalance_initrc_exec_t:s0 +/etc/rc\.d/init\.d/munin-node -- system_u:object_r:munin_initrc_exec_t:s0 +/etc/rc\.d/init\.d/strongswan -- system_u:object_r:ipsec_initrc_exec_t:s0 +/etc/rc\.d/init\.d/varnishlog -- system_u:object_r:varnishlog_initrc_exec_t:s0 +/etc/rc\.d/init\.d/x11-common -- system_u:object_r:xdm_exec_t:s0 +/etc/rc\.d/init\.d/zoneminder -- system_u:object_r:zoneminder_initrc_exec_t:s0 +/sbin/insmod_ksymoops_clean -- system_u:object_r:bin_t:s0 +/usr/bin/abrt-pyhook-helper -- system_u:object_r:abrt_helper_exec_t:s0 +/usr/bin/abrt-uefioops-oops -- system_u:object_r:abrt_dump_oops_exec_t:s0 +/usr/bin/cups-config-daemon -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/bin/dbus-broker-launch -- system_u:object_r:dbusd_exec_t:s0 +/usr/bin/evince-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/fedora-rmdevelrpms -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/mysqld_safe_helper -- system_u:object_r:mysqld_exec_t:s0 +/usr/bin/neutron-dhcp-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/prelude-correlator -- system_u:object_r:prelude_correlator_exec_t:s0 +/usr/bin/quantum-dhcp-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/rpmdev-rmdevelrpms -- system_u:object_r:rpm_exec_t:s0 +/usr/bin/start-puppet-agent -- system_u:object_r:puppetagent_exec_t:s0 +/usr/bin/swift-proxy-server -- system_u:object_r:swift_exec_t:s0 +/usr/lib/colord/colord-sane -- system_u:object_r:colord_exec_t:s0 +/usr/lib/heartbeat/send_arp -- system_u:object_r:ping_exec_t:s0 +/usr/lib/hsqldb/hsqldb-post -- system_u:object_r:hsqldb_exec_t:s0 +/usr/lib/hsqldb/hsqldb-stop -- system_u:object_r:hsqldb_exec_t:s0 +/usr/lib/ladspa/gsm_1215\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/sc1_1425\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/sc2_1426\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/sc3_1427\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/sc4_1882\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/se4_1883\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libdivxdecore\.so\.0 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libdivxencore\.so\.0 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/pcs/pcs_snmp_agent -- system_u:object_r:cluster_exec_t:s0 +/usr/lib/rtkit/rtkit-daemon -- system_u:object_r:rtkit_daemon_exec_t:s0 +/usr/lib/squid/cachemgr\.cgi -- system_u:object_r:squid_script_exec_t:s0 +/usr/libexec/abrt-hook-ccpp -- system_u:object_r:abrt_dump_oops_exec_t:s0 +/usr/libexec/news/inndstart -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/innxbatch -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/newsinnconfval -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/nm-priv-helper -- system_u:object_r:NetworkManager_priv_helper_exec_t:s0 +/usr/libexec/nm-ssh-service -- system_u:object_r:ssh_exec_t:s0 +/usr/libexec/postfix/bounce -- system_u:object_r:postfix_bounce_exec_t:s0 +/usr/libexec/postfix/master -- system_u:object_r:postfix_master_exec_t:s0 +/usr/libexec/postfix/pickup -- system_u:object_r:postfix_pickup_exec_t:s0 +/usr/libexec/postfix/scache -- system_u:object_r:postfix_smtp_exec_t:s0 +/usr/libexec/postgresql-ctl -- system_u:object_r:postgresql_exec_t:s0 +/usr/libexec/qemu-pr-helper -- system_u:object_r:virtd_exec_t:s0 +/usr/libexec/sssd/sssd_sudo -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/telepathy-haze -- system_u:object_r:telepathy_msn_exec_t:s0 +/usr/libexec/telepathy-idle -- system_u:object_r:telepathy_idle_exec_t:s0 +/usr/sbin/abrt-upload-watch -- system_u:object_r:abrt_upload_watch_exec_t:s0 +/usr/sbin/arptables-restore -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/condor_negotiator -- system_u:object_r:condor_negotiator_exec_t:s0 +/usr/sbin/courierldapaliasd -- system_u:object_r:courier_exec_t:s0 +/usr/sbin/hwloc-dump-hwdata -- system_u:object_r:hwloc_dhwd_exec_t:s0 +/usr/sbin/nsd-control-setup -- system_u:object_r:nsd_exec_t:s0 +/usr/sbin/pacemaker-remoted -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/pacemaker_remoted -- system_u:object_r:cluster_exec_t:s0 +/usr/sbin/pam_console_apply -- system_u:object_r:pam_console_exec_t:s0 +/usr/sbin/printconf-backend -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/sbin/rpc\.yppasswdd\.env -- system_u:object_r:yppasswdd_exec_t:s0 +/usr/sbin/unbound-checkconf -- system_u:object_r:named_exec_t:s0 +/usr/sbin/xtables-nft-multi -- system_u:object_r:iptables_exec_t:s0 +/usr/share/clamav/clamd-gen -- system_u:object_r:bin_t:s0 +/usr/share/pcp/lib/pmlogger -- system_u:object_r:pcp_pmlogger_exec_t:s0 +/usr/share/pydict/pydict\.py -- system_u:object_r:bin_t:s0 +/usr/share/snmp/mibs/\.index -- system_u:object_r:snmpd_var_lib_t:s0 +/var/lib/likewise/db/sam\.db -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/likewise/lsasd\.err -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/likewise/regsd\.err -- system_u:object_r:lwregd_var_lib_t:s0 +/var/lock/asound\.state\.lock -- system_u:object_r:alsa_lock_t:s0 +/var/lock/fence_manual\.lock -- system_u:object_r:fenced_lock_t:s0 +/var/lock/subsys/bluetoothd -- system_u:object_r:bluetooth_lock_t:s0 +/var/lock/subsys/strongswan -- system_u:object_r:ipsec_mgmt_lock_t:s0 +/var/qmail/bin/qmail-inject -- system_u:object_r:qmail_inject_exec_t:s0 +/var/qmail/bin/qmail-lspawn -- system_u:object_r:qmail_lspawn_exec_t:s0 +/var/qmail/bin/qmail-remote -- system_u:object_r:qmail_remote_exec_t:s0 +/var/qmail/bin/qmail-rspawn -- system_u:object_r:qmail_rspawn_exec_t:s0 +/var/run/NetworkManager\.pid -- system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/audio-entropyd\.pid -- system_u:object_r:entropyd_var_run_t:s0 +/var/run/bluetoothd_address -- system_u:object_r:bluetooth_var_run_t:s0 +/var/run/mlocate\.daily\.lock -- system_u:object_r:locate_var_run_t:s0 +/var/run/samba/gencache\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/var/run/samba/messages\.tdb -- system_u:object_r:nmbd_var_run_t:s0 +/var/run/spamass-milter\.pid -- system_u:object_r:spamass_milter_data_t:s0 +/var/run/spice-vdagentd\.pid -- system_u:object_r:vdagent_var_run_t:s0 +/var/run/systemd/machine-id -- system_u:object_r:machineid_t:s0 +/var/run/zarafa-gateway\.pid -- system_u:object_r:zarafa_gateway_var_run_t:s0 +/var/run/zarafa-indexer\.pid -- system_u:object_r:zarafa_indexer_var_run_t:s0 +/var/run/zarafa-monitor\.pid -- system_u:object_r:zarafa_monitor_var_run_t:s0 +/var/run/zarafa-spooler\.pid -- system_u:object_r:zarafa_spooler_var_run_t:s0 +/var/spool/fcron/new\.systab -- system_u:object_r:system_cron_spool_t:s0 +/var/www/cgi-bin/cvsweb\.cgi -- system_u:object_r:cvs_script_exec_t:s0 +/var/lib/likewise/\.eventlog -s system_u:object_r:eventlogd_var_socket_t:s0 +/var/lib/likewise/rpc/lsass -s system_u:object_r:lsassd_var_socket_t:s0 +/var/run/pdns\.controlsocket -s system_u:object_r:pdns_var_run_t:s0 +/etc/rc\.d/init\.d/mcollective system_u:object_r:openshift_initrc_exec_t:s0 +/etc/wdmd\.d/checkquorum\.wdmd system_u:object_r:bin_t:s0 +/root/\.google_authenticator~ system_u:object_r:auth_home_t:s0 +/etc/ppp/plugins/rp-pppoe\.so -- system_u:object_r:lib_t:s0 +/etc/rc\.d/init\.d/MailScanner -- system_u:object_r:mscan_initrc_exec_t:s0 +/etc/rc\.d/init\.d/portreserve -- system_u:object_r:portreserve_initrc_exec_t:s0 +/etc/rc\.d/init\.d/prelude-lml -- system_u:object_r:prelude_initrc_exec_t:s0 +/etc/rc\.d/init\.d/sblim-sfcbd -- system_u:object_r:sblim_initrc_exec_t:s0 +/etc/rc\.d/init\.d/varnishncsa -- system_u:object_r:varnishlog_initrc_exec_t:s0 +/etc/sysconfig/readonly-root -- system_u:object_r:bin_t:s0 +/opt/likewise/sbin/eventlogd -- system_u:object_r:eventlogd_exec_t:s0 +/opt/likewise/sbin/netlogond -- system_u:object_r:netlogond_exec_t:s0 +/sbin/generate-modprobe\.conf -- system_u:object_r:kmod_exec_t:s0 +/usr/bin/abrt-retrace-worker -- system_u:object_r:abrt_retrace_worker_exec_t:s0 +/usr/bin/mate-keyring-daemon -- system_u:object_r:gkeyringd_exec_t:s0 +/usr/bin/mate-thumbnail-font -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/mojomojo_fastcgi\.pl -- system_u:object_r:mojomojo_script_exec_t:s0 +/usr/bin/neutron-lbaas-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/neutron-ovs-cleanup -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/qemu-storage-daemon -- system_u:object_r:virtd_exec_t:s0 +/usr/bin/quantum-ovs-cleanup -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/start-puppet-master -- system_u:object_r:puppetmaster_exec_t:s0 +/usr/bin/swift-object-server -- system_u:object_r:swift_exec_t:s0 +/usr/lib/heartbeat/heartbeat -- system_u:object_r:cluster_exec_t:s0 +/usr/lib/openssh/ssh-keysign -- system_u:object_r:ssh_keysign_exec_t:s0 +/usr/lib/udev/udisks-part-id -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/lib/vmware/bin/vmplayer -- system_u:object_r:vmware_exec_t:s0 +/usr/lib/xfce4/panel/migrate -- system_u:object_r:bin_t:s0 +/usr/lib/xfce4/panel/wrapper -- system_u:object_r:bin_t:s0 +/usr/libexec/accounts-daemon -- system_u:object_r:accountsd_exec_t:s0 +/usr/libexec/bluetooth/obexd -- system_u:object_r:obex_exec_t:s0 +/usr/libexec/dovecot/deliver -- system_u:object_r:dovecot_deliver_exec_t:s0 +/usr/libexec/ipsec/_plutorun -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/libexec/min-cloud-agent -- system_u:object_r:cloud_init_exec_t:s0 +/usr/libexec/news/expireover -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/shrinkfile -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/nm-l2tp-service -- system_u:object_r:l2tpd_exec_t:s0 +/usr/libexec/ntpdate-wrapper -- system_u:object_r:ntpdate_exec_t:s0 +/usr/libexec/openipmi-helper -- system_u:object_r:ipmievd_helper_exec_t:s0 +/usr/libexec/pcp/bin/pmproxy -- system_u:object_r:pcp_pmproxy_exec_t:s0 +/usr/libexec/pcp/lib/pmproxy -- system_u:object_r:pcp_pmproxy_initrc_exec_t:s0 +/usr/libexec/postfix/cleanup -- system_u:object_r:postfix_cleanup_exec_t:s0 +/usr/libexec/postfix/virtual -- system_u:object_r:postfix_virtual_exec_t:s0 +/usr/libexec/samba/rpcd_lsad -- system_u:object_r:winbind_rpcd_exec_t:s0 +/usr/libexec/telepathy-rakia -- system_u:object_r:telepathy_sofiasip_exec_t:s0 +/usr/libexec/telepathy-salut -- system_u:object_r:telepathy_salut_exec_t:s0 +/usr/libexec/udisks2/udisksd -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/libexec/vdsm/supervdsmd -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/audispd-zos-remote -- system_u:object_r:zos_remote_exec_t:s0 +/usr/sbin/console-kit-daemon -- system_u:object_r:consolekit_exec_t:s0 +/usr/sbin/nm-system-settings -- system_u:object_r:NetworkManager_exec_t:s0 +/usr/sbin/zabbix_proxy_mysql -- system_u:object_r:zabbix_exec_t:s0 +/usr/sbin/zabbix_proxy_pgsql -- system_u:object_r:zabbix_exec_t:s0 +/usr/share/corosync/corosync -- system_u:object_r:cluster_exec_t:s0 +/usr/share/cvsweb/cvsweb\.cgi -- system_u:object_r:cvs_script_exec_t:s0 +/usr/share/ovirt-guest-agent -- system_u:object_r:rhev_agentd_exec_t:s0 +/usr/share/pyicq-t/PyICQt\.py -- system_u:object_r:pyicqt_exec_t:s0 +/var/lib/amanda/\.amandahosts -- system_u:object_r:amanda_config_t:s0 +/var/lib/misc/dnsmasq\.leases -- system_u:object_r:dnsmasq_lease_t:s0 +/var/lib/tftpboot/pxelinux\.0 -- system_u:object_r:cobbler_var_lib_t:s0 +/var/run/aeolus/dbomatic\.pid -- system_u:object_r:mongod_var_run_t:s0 +/var/run/initiatorname\.iscsi -- system_u:object_r:iscsi_var_run_t:s0 +/var/run/insights-client\.pid -- system_u:object_r:insights_client_var_run_t:s0 +/var/run/milter-greylist\.pid -- system_u:object_r:greylist_milter_data_t:s0 +/var/run/nm-dns-dnsmasq\.conf -- system_u:object_r:NetworkManager_var_run_t:s0 +/var/run/samba/sessionid\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/var/spool/fcron/systab\.orig -- system_u:object_r:system_cron_spool_t:s0 +/dev/megaraid_sas_ioctl_node -c system_u:object_r:fixed_disk_device_t:s0 +/var/named/chroot/dev/random -c system_u:object_r:random_device_t:s0 +/var/lib/likewise-open/\.lwsm -s system_u:object_r:lwsmd_var_socket_t:s0 +/var/lib/likewise/\.netlogond -s system_u:object_r:netlogond_var_socket_t:s0 +/var/lib/likewise/rpc/socket -s system_u:object_r:eventlogd_var_socket_t:s0 +/var/run/pkcs11proxyd\.socket -s system_u:object_r:pkcs11proxyd_var_run_t:s0 +/var/run/qemu-pr-helper\.sock -s system_u:object_r:virt_var_run_t:s0 +/etc/rc\.d/init\.d/amavisd-snmp -- system_u:object_r:antivirus_initrc_exec_t:s0 +/etc/rc\.d/init\.d/bcfg2-server -- system_u:object_r:bcfg2_initrc_exec_t:s0 +/etc/rc\.d/init\.d/boinc-client -- system_u:object_r:boinc_initrc_exec_t:s0 +/etc/rc\.d/init\.d/mysqlmanager -- system_u:object_r:mysqlmanagerd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/puppetmaster -- system_u:object_r:puppetmaster_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rtkit-daemon -- system_u:object_r:rtkit_daemon_initrc_exec_t:s0 +/usr/bin/gnome-keyring-daemon -- system_u:object_r:gkeyringd_exec_t:s0 +/usr/bin/gnome-thumbnail-font -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/mariadbd-safe-helper -- system_u:object_r:mysqld_exec_t:s0 +/usr/bin/swift-account-reaper -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-account-server -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-container-sync -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-object-auditor -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-object-expirer -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-object-updater -- system_u:object_r:swift_exec_t:s0 +/usr/bin/vmware-smbpasswd\.bin -- system_u:object_r:vmware_host_exec_t:s0 +/usr/kerberos/sbin/login\.krb5 -- system_u:object_r:login_exec_t:s0 +/usr/lib/courier/courier/pcpd -- system_u:object_r:courier_pcp_exec_t:s0 +/usr/lib/cups/daemon/cups-lpd -- system_u:object_r:cupsd_lpd_exec_t:s0 +/usr/lib/ladspa/gverb_1216\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/libstdc\+\+\.so\.2\.7\.2\.8 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/mailman/mail/mailman -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/mediawiki/math/texvc -- system_u:object_r:mediawiki_script_exec_t:s0 +/usr/lib/systemd/systemd-fsck -- system_u:object_r:fsadm_exec_t:s0 +/usr/lib/systemd/systemd-pull -- system_u:object_r:systemd_importd_exec_t:s0 +/usr/lib/udisks/udisks-daemon -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/lib/vmware/bin/vmware-ui -- system_u:object_r:vmware_exec_t:s0 +/usr/lib/vte/gnome-pty-helper -- system_u:object_r:bin_t:s0 +/usr/lib/xfce4/xfconf/xfconfd -- system_u:object_r:bin_t:s0 +/usr/libexec/dcc/start-dccifd -- system_u:object_r:dccifd_exec_t:s0 +/usr/libexec/ipsec/_plutoload -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/libexec/ipsec/klipsdebug -- system_u:object_r:ipsec_exec_t:s0 +/usr/libexec/news/grephistory -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/makehistory -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/newsrequeue -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/oddjob/mkhomedir -- system_u:object_r:oddjob_mkhomedir_exec_t:s0 +/usr/libexec/openafs/kaserver -- system_u:object_r:afs_kaserver_exec_t:s0 +/usr/libexec/openafs/ptserver -- system_u:object_r:afs_ptserver_exec_t:s0 +/usr/libexec/openafs/salvager -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/libexec/openafs/vlserver -- system_u:object_r:afs_vlserver_exec_t:s0 +/usr/libexec/pcp/bin/pmlogger -- system_u:object_r:pcp_pmlogger_exec_t:s0 +/usr/libexec/pcp/lib/pmlogger -- system_u:object_r:pcp_pmlogger_initrc_exec_t:s0 +/usr/libexec/ricci-modservice -- system_u:object_r:ricci_modservice_exec_t:s0 +/usr/libexec/ricci-modstorage -- system_u:object_r:ricci_modstorage_exec_t:s0 +/usr/libexec/sssd/sssd_autofs -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/telepathy-gabble -- system_u:object_r:telepathy_gabble_exec_t:s0 +/usr/libexec/telepathy-logger -- system_u:object_r:telepathy_logger_exec_t:s0 +/usr/sbin/pam_timestamp_check -- system_u:object_r:pam_timestamp_exec_t:s0 +/usr/sbin/zabbix_server_mysql -- system_u:object_r:zabbix_exec_t:s0 +/usr/sbin/zabbix_server_pgsql -- system_u:object_r:zabbix_exec_t:s0 +/usr/share/jetty/bin/jetty\.sh -- system_u:object_r:jetty_exec_t:s0 +/usr/share/munin/plugins/acpi -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/load -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/swap -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/mythweb/mythweb\.pl -- system_u:object_r:mythtv_script_exec_t:s0 +/usr/share/vdsm/daemonAdapter -- system_u:object_r:virtd_exec_t:s0 +/var/empty/sshd/etc/localtime -- system_u:object_r:locale_t:s0 +/var/lib/likewise/LWNetsd\.err -- system_u:object_r:netlogond_var_lib_t:s0 +/var/lib/likewise/\.lwsmd-lock -- system_u:object_r:lwsmd_var_lib_t:s0 +/var/lock/subsys/dirsrv-admin -- system_u:object_r:dirsrvadmin_lock_t:s0 +/var/lock/subsys/lmt-req\.lock -- system_u:object_r:apmd_lock_t:s0 +/var/run/samba/namelist\.debug -- system_u:object_r:nmbd_var_run_t:s0 +/var/run/samba/share_info\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/var/run/samba/unexpected\.tdb -- system_u:object_r:nmbd_var_run_t:s0 +/var/tmp/insights-client\.ppid -- system_u:object_r:insights_client_tmp_t:s0 +/var/www/apcupsd/multimon\.cgi -- system_u:object_r:apcupsd_cgi_script_exec_t:s0 +/var/www/apcupsd/upsimage\.cgi -- system_u:object_r:apcupsd_cgi_script_exec_t:s0 +/var/www/apcupsd/upsstats\.cgi -- system_u:object_r:apcupsd_cgi_script_exec_t:s0 +/var/named/chroot/dev/urandom -c system_u:object_r:urandom_device_t:s0 +/var/lib/likewise-open/\.lwiod -s system_u:object_r:lwiod_var_socket_t:s0 +/var/lib/likewise-open/\.ntlmd -s system_u:object_r:lsassd_var_socket_t:s0 +/var/lib/likewise-open/\.regsd -s system_u:object_r:lwregd_var_socket_t:s0 +/var/run/cluster/rgmanager\.sk -s system_u:object_r:cluster_var_run_t:s0 +/var/run/systemd/initctl/fifo -p system_u:object_r:initctl_t:s0 +/usr/lib/udev/devices/MAKEDEV -l system_u:object_r:bin_t:s0 +/sys/devices/system/cpu/online system_u:object_r:cpu_online_t:s0 +/etc/fdo/aio/aio_configuration -- system_u:object_r:fdo_conf_rw_t:s0 +/etc/hotplug/hotplug\.functions -- system_u:object_r:bin_t:s0 +/etc/rc\.d/init\.d/whatsup-pingd -- system_u:object_r:pingd_initrc_exec_t:s0 +/etc/rc\.d/init\.d/zabbix-agentd -- system_u:object_r:zabbix_agent_initrc_exec_t:s0 +/etc/tuned/post_loaded_profile -- system_u:object_r:tuned_rw_etc_t:s0 +/lib/udev/udisks-lvm-pv-export -- system_u:object_r:lvm_exec_t:s0 +/usr/X11R6/lib/X11/xkb/xkbcomp -- system_u:object_r:bin_t:s0 +/usr/bin/neutron-netns-cleanup -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/retrace-server-worker -- system_u:object_r:abrt_retrace_worker_exec_t:s0 +/usr/bin/swift-account-auditor -- system_u:object_r:swift_exec_t:s0 +/usr/bin/system-setup-keyboard -- system_u:object_r:keyboardd_exec_t:s0 +/usr/lib/cups/backend/cups-brf -- system_u:object_r:cups_brf_exec_t:s0 +/usr/lib/cups/backend/cups-pdf -- system_u:object_r:cups_pdf_exec_t:s0 +/usr/lib/hsqldb/hsqldb-wrapper -- system_u:object_r:hsqldb_exec_t:s0 +/usr/lib/ladspa/fm_osc_1415\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/modules/modprobe\.conf -- system_u:object_r:modules_conf_t:s0 +/usr/lib/nagios/plugins/negate -- system_u:object_r:bin_t:s0 +/usr/lib/nagios/plugins/urlize -- system_u:object_r:bin_t:s0 +/usr/lib/security/pam_poldi\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/systemd-sleep -- system_u:object_r:systemd_sleep_exec_t:s0 +/usr/lib/systemd/systemd-udevd -- system_u:object_r:udev_exec_t:s0 +/usr/lib/virtualbox/VBoxManage -- system_u:object_r:bin_t:s0 +/usr/lib/vmware/bin/vmware-mks -- system_u:object_r:vmware_exec_t:s0 +/usr/lib/vmware/bin/vmware-vmx -- system_u:object_r:vmware_host_exec_t:s0 +/usr/libexec/abrt-handle-event -- system_u:object_r:abrt_handle_event_exec_t:s0 +/usr/libexec/at-spi2-registryd -- system_u:object_r:gnome_atspi_exec_t:s0 +/usr/libexec/blueman-mechanism -- system_u:object_r:blueman_exec_t:s0 +/usr/libexec/chkpwd/tcb_chkpwd -- system_u:object_r:chkpwd_exec_t:s0 +/usr/libexec/chkpwd/tcb_updpwd -- system_u:object_r:updpwd_exec_t:s0 +/usr/libexec/mission-control-5 -- system_u:object_r:telepathy_mission_control_exec_t:s0 +/usr/libexec/news/ovdb_recover -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/prunehistory -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/news/startinnfeed -- system_u:object_r:innd_exec_t:s0 +/usr/libexec/openafs/volserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/libexec/sssd/sssd_secrets -- system_u:object_r:sssd_exec_t:s0 +/usr/libexec/storaged/storaged -- system_u:object_r:lvm_exec_t:s0 +/usr/libexec/utempter/utempter -- system_u:object_r:utempter_exec_t:s0 +/usr/sbin/ebtables-legacy-save -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/xtables-legacy-multi -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/zabbix_proxy_sqlite3 -- system_u:object_r:zabbix_exec_t:s0 +/usr/share/apr-0/build/libtool -- system_u:object_r:bin_t:s0 +/usr/share/cluster/SAPDatabase -- system_u:object_r:bin_t:s0 +/usr/share/cluster/SAPInstance -- system_u:object_r:bin_t:s0 +/usr/share/cvs/contrib/rcs2log -- system_u:object_r:bin_t:s0 +/usr/share/dspam-web/dspam\.cgi -- system_u:object_r:dspam_script_exec_t:s0 +/usr/share/hwbrowser/hwbrowser -- system_u:object_r:bin_t:s0 +/usr/share/munin/plugins/forks -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/named -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/ping_ -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/samba -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/users -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/shorewall/getparams -- system_u:object_r:bin_t:s0 +/var/lib/likewise/\.pstore\.lock -- system_u:object_r:likewise_pstore_lock_t:s0 +/var/lib/sepgsql/pgstartup\.log -- system_u:object_r:postgresql_log_t:s0 +/var/named/chroot/etc/rndc\.key -- system_u:object_r:dnssec_t:s0 +/var/run/cluster/mpath\.devices -- system_u:object_r:fenced_var_run_t:s0 +/var/run/ovirt-guest-agent\.pid -- system_u:object_r:rhev_agentd_var_run_t:s0 +/var/run/pluto/ipsec_setup\.pid -- system_u:object_r:ipsec_mgmt_var_run_t:s0 +/var/run/portmap\.upgrade-state -- system_u:object_r:portmap_var_run_t:s0 +/var/run/samba/connections\.tdb -- system_u:object_r:smbd_var_run_t:s0 +/var/spool/mail/\.fetchmail\.pid -- system_u:object_r:fetchmail_uidl_cache_t:s0 +/var/www/apcupsd/upsfstats\.cgi -- system_u:object_r:apcupsd_cgi_script_exec_t:s0 +/var/named/chroot_sdb/dev/null -c system_u:object_r:null_device_t:s0 +/var/named/chroot_sdb/dev/zero -c system_u:object_r:zero_device_t:s0 +/var/lib/likewise-open/\.lsassd -s system_u:object_r:lsassd_var_socket_t:s0 +/var/lib/likewise/rpc/epmapper -s system_u:object_r:dcerpcd_var_socket_t:s0 +/var/run/gssproxy\.default\.sock -s system_u:object_r:gssproxy_var_run_t:s0 +/var/run/libvirt/virtlogd-sock -s system_u:object_r:virtlogd_var_run_t:s0 +/var/run/wpa_supplicant-global -s system_u:object_r:NetworkManager_var_run_t:s0 +/etc/firestarter/firestarter\.sh system_u:object_r:dhcpc_helper_exec_t:s0 +/usr/libexec/qemu-bridge-helper system_u:object_r:virt_bridgehelper_exec_t:s0 +/var/www/html/configuration\.php system_u:object_r:httpd_sys_rw_content_t:s0 +/etc/insights-client/machine-id -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/likewise-open/\.pstore\.lock -- system_u:object_r:likewise_pstore_lock_t:s0 +/etc/rc\.d/init\.d/openafs-client -- system_u:object_r:afs_initrc_exec_t:s0 +/etc/rc\.d/init\.d/spice-vdagentd -- system_u:object_r:vdagentd_initrc_exec_t:s0 +/usr/bin/gsf-office-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/mimedefang-multiplexor -- system_u:object_r:spamd_exec_t:s0 +/usr/bin/neutron-metadata-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/redhat-access-insights -- system_u:object_r:insights_client_exec_t:s0 +/usr/bin/swift-container-server -- system_u:object_r:swift_exec_t:s0 +/usr/kerberos/sbin/kadmin\.local -- system_u:object_r:kadmind_exec_t:s0 +/usr/lib/mailman/bin/mailmanctl -- system_u:object_r:mailman_mail_exec_t:s0 +/usr/lib/snapper/systemd-helper -- system_u:object_r:snapperd_exec_t:s0 +/usr/lib/systemd/systemd-growfs -- system_u:object_r:fsadm_exec_t:s0 +/usr/lib/systemd/systemd-logger -- system_u:object_r:systemd_logger_exec_t:s0 +/usr/lib/systemd/systemd-logind -- system_u:object_r:systemd_logind_exec_t:s0 +/usr/lib/systemd/systemd-makefs -- system_u:object_r:fsadm_exec_t:s0 +/usr/lib/systemd/systemd-pstore -- system_u:object_r:systemd_pstore_exec_t:s0 +/usr/lib/systemd/systemd-rfkill -- system_u:object_r:systemd_rfkill_exec_t:s0 +/usr/lib/systemd/systemd-sysctl -- system_u:object_r:systemd_sysctl_exec_t:s0 +/usr/libexec/cyrus-imapd/master -- system_u:object_r:cyrus_exec_t:s0 +/usr/libexec/fwupd/fwupdoffline -- system_u:object_r:fwupd_exec_t:s0 +/usr/libexec/gdm-runtime-config -- system_u:object_r:xdm_exec_t:s0 +/usr/libexec/git-core/git-shell -- system_u:object_r:shell_exec_t:s0 +/usr/libexec/mimedefang-wrapper -- system_u:object_r:spamd_exec_t:s0 +/usr/libexec/mongodb-scl-helper -- system_u:object_r:mongod_exec_t:s0 +/usr/libexec/openafs/fileserver -- system_u:object_r:afs_fsserver_exec_t:s0 +/usr/libexec/rhsm-facts-service -- system_u:object_r:rhsmcertd_exec_t:s0 +/usr/libexec/rssh_chroot_helper -- system_u:object_r:rssh_chroot_helper_exec_t:s0 +/usr/libexec/sssd/selinux_child -- system_u:object_r:sssd_selinux_manager_exec_t:s0 +/usr/libexec/telepathy-sofiasip -- system_u:object_r:telepathy_sofiasip_exec_t:s0 +/usr/libexec/telepathy-sunshine -- system_u:object_r:telepathy_sunshine_exec_t:s0 +/usr/libexec/vdsm/daemonAdapter -- system_u:object_r:virtd_exec_t:s0 +/usr/sbin/insmod_ksymoops_clean -- system_u:object_r:bin_t:s0 +/usr/sbin/zabbix_server_sqlite3 -- system_u:object_r:zabbix_exec_t:s0 +/usr/share/ajaxterm/ajaxterm\.py -- system_u:object_r:ajaxterm_exec_t:s0 +/usr/share/munin/plugins/lpstat -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/memory -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/uptime -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/texmf/web2c/mktexdir -- system_u:object_r:bin_t:s0 +/usr/share/texmf/web2c/mktexnam -- system_u:object_r:bin_t:s0 +/usr/share/texmf/web2c/mktexupd -- system_u:object_r:bin_t:s0 +/usr/share/vdsm/supervdsmServer -- system_u:object_r:virtd_exec_t:s0 +/var/lib/likewise/krb5ccr_lsass -- system_u:object_r:lsassd_var_lib_t:s0 +/var/named/chroot/etc/localtime -- system_u:object_r:locale_t:s0 +/var/run/console-kit-daemon\.pid -- system_u:object_r:consolekit_var_run_t:s0 +/var/www/nut-cgi-bin/upsset\.cgi -- system_u:object_r:nutups_cgi_script_exec_t:s0 +/usr/lib/udev/devices/hugepages -d system_u:object_r:hugetlbfs_t:s0 +/var/run/systemd/journal/syslog -s system_u:object_r:devlog_t:s0 +/etc/device_onboarding_performed -- system_u:object_r:fdo_device_credentials_t:s0 +/etc/insights-client/\.cache\.json -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/insights-client/\.lastupload -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/insights-client/\.registered -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/rc\.d/init\.d/prelude-manager -- system_u:object_r:prelude_initrc_exec_t:s0 +/etc/rc\.d/init\.d/rabbitmq-server -- system_u:object_r:rabbitmq_initrc_exec_t:s0 +/etc/xen/scripts/launch-xenstore -- system_u:object_r:xenstored_exec_t:s0 +/usr/bin/nova-ajax-console-proxy -- system_u:object_r:nova_exec_t:s0 +/usr/bin/postgresql-check-db-dir -- system_u:object_r:postgresql_exec_t:s0 +/usr/bin/swift-container-auditor -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-container-updater -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-object-replicator -- system_u:object_r:swift_exec_t:s0 +/usr/bin/totem-video-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/lib/netscape/base-4/wrapper -- system_u:object_r:mozilla_exec_t:s0 +/usr/lib/systemd/systemd-importd -- system_u:object_r:systemd_importd_exec_t:s0 +/usr/lib/systemd/systemd-initctl -- system_u:object_r:systemd_initctl_exec_t:s0 +/usr/lib/systemd/systemd-localed -- system_u:object_r:systemd_localed_exec_t:s0 +/usr/lib/systemd/systemd-userdbd -- system_u:object_r:systemd_userdbd_exec_t:s0 +/usr/libexec/WebKitPluginProcess -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/libexec/at-spi-bus-launcher -- system_u:object_r:gnome_atspi_exec_t:s0 +/usr/libexec/devkit-disks-daemon -- system_u:object_r:devicekit_disk_exec_t:s0 +/usr/libexec/devkit-power-daemon -- system_u:object_r:devicekit_power_exec_t:s0 +/usr/libexec/dovecot/dovecot-lda -- system_u:object_r:dovecot_deliver_exec_t:s0 +/usr/libexec/gdm-disable-wayland -- system_u:object_r:xdm_exec_t:s0 +/usr/libexec/git-core/git-daemon -- system_u:object_r:gitd_exec_t:s0 +/usr/libexec/nm-openswan-service -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/libexec/openssh/sftp-server -- system_u:object_r:bin_t:s0 +/usr/libexec/openssh/ssh-keysign -- system_u:object_r:ssh_keysign_exec_t:s0 +/usr/libexec/openssh/sshd-keygen -- system_u:object_r:sshd_keygen_exec_t:s0 +/usr/libexec/samba/samba-dcerpcd -- system_u:object_r:winbind_rpcd_exec_t:s0 +/usr/libexec/squid/cache_swap\.sh -- system_u:object_r:squid_exec_t:s0 +/usr/libexec/telepathy-butterfly -- system_u:object_r:telepathy_msn_exec_t:s0 +/usr/sbin/abrt-install-ccpp-hook -- system_u:object_r:abrt_exec_t:s0 +/usr/sbin/generate-modprobe\.conf -- system_u:object_r:kmod_exec_t:s0 +/usr/sbin/mount\.ecryptfs_private -- system_u:object_r:mount_ecryptfs_exec_t:s0 +/usr/share/dayplanner/dayplanner -- system_u:object_r:bin_t:s0 +/usr/share/jockey/jockey-backend -- system_u:object_r:jockey_exec_t:s0 +/usr/share/munin/plugins/mailman -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/netstat -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/openvpn -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/threads -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/unbound -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/shorewall/compiler\.pl -- system_u:object_r:bin_t:s0 +/usr/share/ssl/certs/dovecot\.pem -- system_u:object_r:dovecot_cert_t:s0 +/usr/zend/lib/apache2/libphp5\.so -- system_u:object_r:textrel_shlib_t:s0 +/var/lib/dirsrv/scripts-INSTANCE -- system_u:object_r:bin_t:s0 +/var/lib/likewise-open/db/sam\.db -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/likewise-open/lsasd\.err -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/likewise-open/regsd\.err -- system_u:object_r:lwregd_var_lib_t:s0 +/var/lib/likewise/db/registry\.db -- system_u:object_r:lwregd_var_lib_t:s0 +/var/lib/likewise/run/rpcdep\.dat -- system_u:object_r:dcerpcd_var_lib_t:s0 +/var/named/chroot/etc/named\.conf -- system_u:object_r:named_conf_t:s0 +/var/run/cluster/fenced_override -- system_u:object_r:fenced_var_run_t:s0 +/var/run/coreos-installer-reboot -- system_u:object_r:coreos_installer_var_run_t:s0 +/var/spool/postfix/etc/localtime -- system_u:object_r:locale_t:s0 +/var/named/chroot_sdb/dev/random -c system_u:object_r:random_device_t:s0 +/var/lib/likewise-open/\.eventlog -s system_u:object_r:eventlogd_var_socket_t:s0 +/var/lib/likewise-open/rpc/lsass -s system_u:object_r:lsassd_var_socket_t:s0 +/var/run/systemd/journal/dev-log -s system_u:object_r:devlog_t:s0 +/var/run/pmlogger\.primary\.socket -l system_u:object_r:pcp_var_run_t:s0 +/etc/Pegasus/pegasus_current\.conf system_u:object_r:pegasus_data_t:s0 +/usr/bin/pkla-check-authorization -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/bin/swift-account-replicator -- system_u:object_r:swift_exec_t:s0 +/usr/bin/vmware-user-suid-wrapper -- system_u:object_r:vmtools_helper_exec_t:s0 +/usr/lib/cyrus-imapd/cyrus-master -- system_u:object_r:cyrus_exec_t:s0 +/usr/lib/dirsrv/cgi-bin/ds_create -- system_u:object_r:dirsrvadmin_unconfined_script_exec_t:s0 +/usr/lib/dirsrv/cgi-bin/ds_remove -- system_u:object_r:dirsrvadmin_unconfined_script_exec_t:s0 +/usr/lib/firefox/plugin-container -- system_u:object_r:mozilla_plugin_exec_t:s0 +/usr/lib/ladspa/notch_iir_1894\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/mediawiki/math/texvc_tes -- system_u:object_r:mediawiki_script_exec_t:s0 +/usr/lib/mediawiki/math/texvc_tex -- system_u:object_r:mediawiki_script_exec_t:s0 +/usr/lib/mozilla/plugins/nppdf\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/system-sleep/tlp -- system_u:object_r:tlp_exec_t:s0 +/usr/lib/systemd/systemd-coredump -- system_u:object_r:systemd_coredump_exec_t:s0 +/usr/lib/systemd/systemd-journald -- system_u:object_r:syslogd_exec_t:s0 +/usr/lib/systemd/systemd-machined -- system_u:object_r:systemd_machined_exec_t:s0 +/usr/lib/systemd/systemd-networkd -- system_u:object_r:systemd_networkd_exec_t:s0 +/usr/lib/systemd/systemd-tmpfiles -- system_u:object_r:systemd_tmpfiles_exec_t:s0 +/usr/lib/systemd/systemd-userwork -- system_u:object_r:systemd_userdbd_exec_t:s0 +/usr/lib/xchat/plugins/systray\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xfce4/exo-1/exo-helper-1 -- system_u:object_r:bin_t:s0 +/usr/libexec/bluetooth/bluetoothd -- system_u:object_r:bluetooth_exec_t:s0 +/usr/libexec/dovecot/dovecot-auth -- system_u:object_r:dovecot_auth_exec_t:s0 +/usr/libexec/gsd-backlight-helper -- system_u:object_r:xserver_exec_t:s0 +/usr/libexec/min-metadata-service -- system_u:object_r:cloud_init_exec_t:s0 +/usr/libexec/nm-libreswan-service -- system_u:object_r:ipsec_mgmt_exec_t:s0 +/usr/libexec/ppc64-diag/rtas_errd -- system_u:object_r:rtas_errd_exec_t:s0 +/usr/libexec/sectool-mechanism\.py -- system_u:object_r:sectoolm_exec_t:s0 +/usr/sbin/ebtables-legacy-restore -- system_u:object_r:iptables_exec_t:s0 +/usr/sbin/haproxy-systemd-wrapper -- system_u:object_r:haproxy_exec_t:s0 +/usr/sbin/system-install-packages -- system_u:object_r:rpm_exec_t:s0 +/usr/sbin/umount\.ecryptfs_private -- system_u:object_r:mount_ecryptfs_exec_t:s0 +/usr/share/clamav/freshclam-sleep -- system_u:object_r:bin_t:s0 +/usr/share/cluster/ocf-shellfuncs -- system_u:object_r:bin_t:s0 +/usr/share/cluster/svclib_nfslock -- system_u:object_r:bin_t:s0 +/usr/share/firstboot/firstboot\.py -- system_u:object_r:firstboot_exec_t:s0 +/usr/share/munin/plugins/fail2ban -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/irqstats -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/proc_pri -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/texmf/texconfig/tcfmgr -- system_u:object_r:bin_t:s0 +/usr/share/yumex/yum_childtask\.py -- system_u:object_r:rpm_exec_t:s0 +/var/lib/servicelog/servicelog\.db -- system_u:object_r:system_db_t:s0 +/var/run/systemd/default-hostname -- system_u:object_r:hostname_etc_t:s0 +/var/www/nut-cgi-bin/upsimage\.cgi -- system_u:object_r:nutups_cgi_script_exec_t:s0 +/var/www/nut-cgi-bin/upsstats\.cgi -- system_u:object_r:nutups_cgi_script_exec_t:s0 +/var/named/chroot_sdb/dev/urandom -c system_u:object_r:urandom_device_t:s0 +/var/lib/likewise-open/\.netlogond -s system_u:object_r:netlogond_var_socket_t:s0 +/var/lib/likewise-open/rpc/socket -s system_u:object_r:eventlogd_var_socket_t:s0 +/var/run/\.heim_org\.h5l\.kcm-socket -s system_u:object_r:sssd_var_run_t:s0 +/etc/insights-client/\.unregistered -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/named\.caching-nameserver\.conf -- system_u:object_r:named_conf_t:s0 +/etc/pki/tls/certs/make-dummy-cert -- system_u:object_r:bin_t:s0 +/etc/sysconfig/update_spamassassin -- system_u:object_r:mscan_etc_t:s0 +/usr/bin/neutron-linuxbridge-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/neutron-ns-metadata-proxy -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/neutron-openvswitch-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/quantum-linuxbridge-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/bin/quantum-openvswitch-agent -- system_u:object_r:neutron_exec_t:s0 +/usr/lib/courier/courier/imaplogin -- system_u:object_r:courier_pop_exec_t:s0 +/usr/lib/nagios/plugins/check_disk -- system_u:object_r:nagios_checkdisk_plugin_exec_t:s0 +/usr/lib/ocaml/stublibs/dllnums\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/systemd/systemd-bootchart -- system_u:object_r:systemd_bootchart_exec_t:s0 +/usr/lib/systemd/systemd-hostnamed -- system_u:object_r:systemd_hostnamed_exec_t:s0 +/usr/lib/systemd/systemd-timedated -- system_u:object_r:systemd_timedated_exec_t:s0 +/usr/lib/systemd/systemd-timesyncd -- system_u:object_r:systemd_timedated_exec_t:s0 +/usr/lib/udev/udisks-lvm-pv-export -- system_u:object_r:lvm_exec_t:s0 +/usr/lib/xfce4/xfwm4/helper-dialog -- system_u:object_r:bin_t:s0 +/usr/libexec/anaconda/anaconda-yum -- system_u:object_r:install_exec_t:s0 +/usr/libexec/dnssec-trigger-script -- system_u:object_r:dnssec_trigger_exec_t:s0 +/usr/libexec/httpd-ssl-pass-dialog -- system_u:object_r:httpd_passwd_exec_t:s0 +/usr/sbin/yum-complete-transaction -- system_u:object_r:rpm_exec_t:s0 +/usr/share/fedora-usermgmt/wrapper -- system_u:object_r:bin_t:s0 +/usr/share/munin/plugins/plugin\.sh -- system_u:object_r:bin_t:s0 +/usr/share/munin/plugins/processes -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/printconf/util/print\.py -- system_u:object_r:bin_t:s0 +/usr/share/pwlib/make/ptlib-config -- system_u:object_r:bin_t:s0 +/usr/share/ssl/private/dovecot\.pem -- system_u:object_r:dovecot_cert_t:s0 +/usr/share/yumex/yumex-yum-backend -- system_u:object_r:rpm_exec_t:s0 +/var/kerberos/krb5kdc/kadm5\.keytab -- system_u:object_r:krb5_keytab_t:s0 +/var/lib/likewise-open/LWNetsd\.err -- system_u:object_r:netlogond_var_lib_t:s0 +/var/lib/likewise-open/\.lwsmd-lock -- system_u:object_r:lwsmd_var_lib_t:s0 +/var/lib/likewise/db/lwi_events\.db -- system_u:object_r:eventlogd_var_lib_t:s0 +/var/run/amavisd-snmp-subagent\.pid -- system_u:object_r:antivirus_var_run_t:s0 +/var/www/gitweb-caching/gitweb\.cgi -- system_u:object_r:git_script_exec_t:s0 +/etc/Pegasus/cimserver_current\.conf system_u:object_r:pegasus_data_t:s0 +/bin/systemd-tty-ask-password-agent -- system_u:object_r:systemd_passwd_agent_exec_t:s0 +/etc/rc\.d/init\.d/openstack-keystone -- system_u:object_r:keystone_initrc_exec_t:s0 +/etc/rc\.d/init\.d/prelude-correlator -- system_u:object_r:prelude_initrc_exec_t:s0 +/usr/bin/shotwell-video-thumbnailer -- system_u:object_r:thumb_exec_t:s0 +/usr/bin/swift-container-reconciler -- system_u:object_r:swift_exec_t:s0 +/usr/bin/swift-container-replicator -- system_u:object_r:swift_exec_t:s0 +/usr/lib/ladspa/butterworth_1902\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/lowpass_iir_1891\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/pitch_scale_1193\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/pitch_scale_1194\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nagios/plugins/check_mailq -- system_u:object_r:nagios_mail_plugin_exec_t:s0 +/usr/lib/ocf/resource\.d/linbit/drbd -- system_u:object_r:drbd_exec_t:s0 +/usr/lib/systemd/system/ksm\.service -- system_u:object_r:ksm_unit_file_t:s0 +/usr/lib/systemd/system/qat\.service -- system_u:object_r:qatlib_unit_file_t:s0 +/usr/lib/systemd/systemd-cryptsetup -- system_u:object_r:lvm_exec_t:s0 +/usr/lib/vlc/codec/libdmo_plugin\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/fwupd/fwupd-detect-cet -- system_u:object_r:fwupd_exec_t:s0 +/usr/libexec/mysqld_safe-scl-helper -- system_u:object_r:mysqld_safe_exec_t:s0 +/usr/share/authconfig/authconfig\.py -- system_u:object_r:authconfig_exec_t:s0 +/usr/share/cluster/fence_scsi_check -- system_u:object_r:fenced_exec_t:s0 +/usr/share/munin/plugins/interrupts -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/munin/plugins/open_files -- system_u:object_r:system_munin_plugin_exec_t:s0 +/usr/share/rhn/rhn_applet/applet\.py -- system_u:object_r:bin_t:s0 +/var/lib/likewise-open/\.pstore\.lock -- system_u:object_r:likewise_pstore_lock_t:s0 +/var/lib/likewise-open/rpc/epmapper -s system_u:object_r:dcerpcd_var_socket_t:s0 +/etc/insights-client/\.cache\.json\.asc -- system_u:object_r:insights_client_etc_rw_t:s0 +/lib/systemd/system/svnserve\.service -- system_u:object_r:svnserve_unit_file_t:s0 +/usr/lib/ladspa/analogue_osc_1416\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/bandpass_iir_1892\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/highpass_iir_1890\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/man2html/cgi-bin/man/mansec -- system_u:object_r:man2html_script_exec_t:s0 +/usr/lib/systemd/system/nscd\.service -- system_u:object_r:nscd_unit_file_t:s0 +/usr/lib/udev/udev-configure-printer -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/libexec/polkit-read-auth-helper -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/libexec/telepathy-stream-engine -- system_u:object_r:telepathy_stream_engine_exec_t:s0 +/usr/share/cluster/fence_mpath_check -- system_u:object_r:fenced_exec_t:s0 +/usr/share/corosync/corosync-qdevice -- system_u:object_r:cluster_exec_t:s0 +/usr/share/foomatic/db/oldprinterids -- system_u:object_r:cupsd_rw_etc_t:s0 +/usr/share/munin/plugins/mailscanner -- system_u:object_r:mail_munin_plugin_exec_t:s0 +/usr/share/rhev-agent/rhev-agentd\.py -- system_u:object_r:rhev_agentd_exec_t:s0 +/var/lib/likewise-open/krb5ccr_lsass -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/likewise/krb5-affinity\.conf -- system_u:object_r:netlogond_var_lib_t:s0 +/var/named/chroot/var/named/named\.ca -- system_u:object_r:named_conf_t:s0 +/var/run/systemd/resolve/resolv\.conf -- system_u:object_r:net_conf_t:s0 +/usr/Zend/lib/ZendExtensionManager\.so system_u:object_r:textrel_shlib_t:s0 +/etc/rc\.d/init\.d/openstack-glance-api -- system_u:object_r:glance_api_initrc_exec_t:s0 +/lib/dbus-1/dbus-daemon-launch-helper -- system_u:object_r:dbusd_exec_t:s0 +/opt/cisco-vpnclient/lib/libvpnapi\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/firefox/plugins/libractrl\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/ladspa/hermes_filter_1200\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/storaged/storaged-lvm-helper -- system_u:object_r:lvm_exec_t:s0 +/usr/lib/systemd/system/jetty\.service -- system_u:object_r:jetty_unit_file_t:s0 +/usr/lib/systemd/system/kdump\.service -- system_u:object_r:kdump_unit_file_t:s0 +/usr/lib/systemd/system/stacd\.service -- system_u:object_r:nvme_stas_unit_file_t:s0 +/usr/lib/systemd/system/stafd\.service -- system_u:object_r:nvme_stas_unit_file_t:s0 +/usr/lib/systemd/systemd-kmsg-syslogd -- system_u:object_r:syslogd_exec_t:s0 +/usr/lib/systemd/systemd-modules-load -- system_u:object_r:systemd_modules_load_exec_t:s0 +/usr/libexec/coreos-installer-service -- system_u:object_r:coreos_installer_exec_t:s0 +/usr/libexec/cups-pk-helper-mechanism -- system_u:object_r:cupsd_config_exec_t:s0 +/usr/libexec/cyrus-imapd/cyrus-master -- system_u:object_r:cyrus_exec_t:s0 +/usr/libexec/gconf-defaults-mechanism -- system_u:object_r:gconfdefaultsm_exec_t:s0 +/usr/share/wordpress-mu/wp-config\.php -- system_u:object_r:httpd_sys_script_exec_t:s0 +/var/lib/likewise-open/db/registry\.db -- system_u:object_r:lwregd_var_lib_t:s0 +/var/lib/likewise-open/run/rpcdep\.dat -- system_u:object_r:dcerpcd_var_lib_t:s0 +/var/lib/likewise/db/lsass-adcache\.db -- system_u:object_r:lsassd_var_lib_t:s0 +/var/spool/mail/\.fetchmail-UIDL-cache -- system_u:object_r:fetchmail_uidl_cache_t:s0 +/etc/rc\.d/init\.d/mountall-bootclean\.sh -- system_u:object_r:tmpreaper_exec_t:s0 +/etc/rc\.d/init\.d/mountnfs-bootclean\.sh -- system_u:object_r:tmpreaper_exec_t:s0 +/usr/lib/docker/docker-novolume-plugin -- system_u:object_r:container_auth_exec_t:s0 +/usr/lib/ladspa/bandpass_a_iir_1893\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/man2html/cgi-bin/man/man2html -- system_u:object_r:man2html_script_exec_t:s0 +/usr/lib/nagios/plugins/check_disk_smb -- system_u:object_r:nagios_checkdisk_plugin_exec_t:s0 +/usr/lib/nagios/plugins/check_file_age -- system_u:object_r:nagios_admin_plugin_exec_t:s0 +/usr/lib/nspluginwrapper/plugin-config -- system_u:object_r:mozilla_plugin_config_exec_t:s0 +/usr/lib/pgsql/test/regress/pg_regress -- system_u:object_r:postgresql_exec_t:s0 +/usr/lib/systemd/system/booth@\.service -- system_u:object_r:boothd_unit_file_t:s0 +/usr/lib/systemd/system/bootupd\.socket -- system_u:object_r:bootupd_unit_file_t:s0 +/usr/lib/systemd/systemd-socket-proxyd -- system_u:object_r:systemd_socket_proxyd_exec_t:s0 +/usr/share/cluster/fence_scsi_check\.pl -- system_u:object_r:fenced_exec_t:s0 +/usr/share/gnucash/finance-quote-check -- system_u:object_r:bin_t:s0 +/usr/share/munin/plugins/http_loadtime -- system_u:object_r:services_munin_plugin_exec_t:s0 +/usr/share/openvswitch/scripts/ovs-ctl -- system_u:object_r:openvswitch_exec_t:s0 +/usr/share/selinux/devel/policygentool -- system_u:object_r:bin_t:s0 +/usr/share/smolt/client/sendProfile\.py -- system_u:object_r:smoltclient_exec_t:s0 +/var/named/chroot/etc/named\.root\.hints -- system_u:object_r:named_conf_t:s0 +/etc/NetworkManager/NetworkManager\.conf system_u:object_r:NetworkManager_etc_rw_t:s0 +/etc/sysconfig/oracleasm-_dev_oracleasm -- system_u:object_r:oracleasm_conf_t:s0 +/usr/bin/abrt-action-generate-backtrace -- system_u:object_r:abrt_handle_event_exec_t:s0 +/usr/bin/systemd-tty-ask-password-agent -- system_u:object_r:systemd_passwd_agent_exec_t:s0 +/usr/lib/man2html/cgi-bin/man/manwhatis -- system_u:object_r:man2html_script_exec_t:s0 +/usr/lib/nagios/plugins/check_ide_smart -- system_u:object_r:nagios_checkdisk_plugin_exec_t:s0 +/usr/lib/octagaplayer/libapplication\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/polkit-1/polkit-agent-helper-1 -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/lib/systemd/system/bootupd\.service -- system_u:object_r:bootupd_unit_file_t:s0 +/usr/lib/systemd/system/ipmievd\.service -- system_u:object_r:ipmievd_unit_file_t:s0 +/usr/lib/systemd/system/rpcbind\.service -- system_u:object_r:rpcbind_unit_file_t:s0 +/usr/lib/systemd/system/sa-update\.timer -- system_u:object_r:spamd_update_unit_file_t:s0 +/usr/lib/systemd/system/sanlock\.service -- system_u:object_r:sanlock_unit_file_t:s0 +/usr/lib/systemd/systemd-fence_sanlockd -- system_u:object_r:fenced_exec_t:s0 +/usr/lib/systemd/systemd-journal-upload -- system_u:object_r:systemd_journal_upload_exec_t:s0 +/usr/lib/systemd/systemd-time-wait-sync -- system_u:object_r:systemd_timedated_exec_t:s0 +/usr/lib/xfce4/exo-1/exo-compose-mail-1 -- system_u:object_r:bin_t:s0 +/usr/share/authconfig/authconfig-gtk\.py -- system_u:object_r:bin_t:s0 +/usr/share/authconfig/authconfig-tui\.py -- system_u:object_r:bin_t:s0 +/usr/share/gitolite/hooks/common/update -- system_u:object_r:bin_t:s0 +/usr/share/gnucash/finance-quote-helper -- system_u:object_r:bin_t:s0 +/usr/share/logwatch/scripts/logwatch\.pl -- system_u:object_r:logwatch_exec_t:s0 +/usr/share/switchdesk/switchdesk-gui\.py -- system_u:object_r:bin_t:s0 +/var/lib/likewise-open/db/lwi_events\.db -- system_u:object_r:eventlogd_var_lib_t:s0 +/etc/insights-client/\.insights-core\.etag -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/likewise-open/likewise-krb5-ad\.conf -- system_u:object_r:likewise_krb5_ad_t:s0 +/lib/security/pam_krb5/pam_krb5_storetmp -- system_u:object_r:bin_t:s0 +/opt/google/chrome/nacl_helper_bootstrap -- system_u:object_r:chrome_sandbox_nacl_exec_t:s0 +/usr/bin/aeolus-configserver-thinwrapper -- system_u:object_r:thin_aeolus_configserver_exec_t:s0 +/usr/lib/accountsservice/accounts-daemon -- system_u:object_r:accountsd_exec_t:s0 +/usr/lib/avahi/avahi-daemon-check-dns\.sh -- system_u:object_r:bin_t:s0 +/usr/lib/chromium-browser/chrome-sandbox -- system_u:object_r:chrome_sandbox_exec_t:s0 +/usr/lib/courier/sqwebmail/cleancache\.pl -- system_u:object_r:courier_sqwebmail_exec_t:s0 +/usr/lib/mozilla/plugins/libvlcplugin\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/nagios/plugins/check_linux_raid -- system_u:object_r:nagios_checkdisk_plugin_exec_t:s0 +/usr/lib/systemd/system/ksmtuned\.service -- system_u:object_r:ksmtuned_unit_file_t:s0 +/usr/lib/systemd/system/svnserve\.service -- system_u:object_r:svnserve_unit_file_t:s0 +/usr/libexec/selinux/selinux-autorelabel -- system_u:object_r:semanage_exec_t:s0 +/usr/share/munin/plugins/selinux_avcstat -- system_u:object_r:selinux_munin_plugin_exec_t:s0 +/usr/share/system-config-services/gui\.py -- system_u:object_r:bin_t:s0 +/var/run/systemd/resolve/stub-resolv\.conf system_u:object_r:net_conf_t:s0 +/etc/insights-client/\.last-upload\.results -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/sysconfig/network-scripts/ifup-ipsec -- system_u:object_r:initrc_exec_t:s0 +/usr/bin/systemd-gnome-ask-password-agent -- system_u:object_r:systemd_passwd_agent_exec_t:s0 +/usr/lib/dbus-1/dbus-daemon-launch-helper -- system_u:object_r:dbusd_exec_t:s0 +/usr/lib/systemd/system/sa-update\.service -- system_u:object_r:spamd_update_unit_file_t:s0 +/usr/lib/systemd/system/wg-quick@\.service -- system_u:object_r:wireguard_unit_file_t:s0 +/usr/lib/systemd/systemd-user-runtime-dir -- system_u:object_r:systemd_logind_exec_t:s0 +/usr/lib/vlc/codec/librealaudio_plugin\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/vlc/codec/librealvideo_plugin\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/xfce4/session/balou-export-theme -- system_u:object_r:bin_t:s0 +/usr/share/system-config-netboot/pxeos\.py -- system_u:object_r:bin_t:s0 +/var/lib/likewise-open/krb5-affinity\.conf -- system_u:object_r:netlogond_var_lib_t:s0 +/var/lib/likewise/db/lsass-adstate\.filedb -- system_u:object_r:lsassd_var_lib_t:s0 +/var/lib/servicelog/servicelog\.db-journal -- system_u:object_r:system_db_t:s0 +/etc/rc\.d/init\.d/openstack-glance-registry -- system_u:object_r:glance_registry_initrc_exec_t:s0 +/etc/rc\.d/init\.d/openstack-glance-scrubber -- system_u:object_r:glance_scrubber_initrc_exec_t:s0 +/usr/lib/policykit/polkit-read-auth-helper -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/lib/systemd/system/stas-config\.target -- system_u:object_r:nvme_stas_unit_file_t:s0 +/usr/lib/systemd/systemd-network-generator -- system_u:object_r:systemd_network_generator_exec_t:s0 +/usr/lib/xfce4/session/balou-install-theme -- system_u:object_r:bin_t:s0 +/usr/lib/xorg/modules/drivers/nvidia_drv\.o -- system_u:object_r:textrel_shlib_t:s0 +/usr/share/PackageKit/pk-upgrade-distro\.sh -- system_u:object_r:bin_t:s0 +/usr/share/rhev-agent/LockActiveSession\.py -- system_u:object_r:rhev_agentd_exec_t:s0 +/usr/share/system-config-nfs/nfs-export\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-printer/applet\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-selinux/polgen\.py -- system_u:object_r:bin_t:s0 +/var/lib/likewise-open/db/lsass-adcache\.db -- system_u:object_r:lsassd_var_lib_t:s0 +/usr/lib/xfce4/session/xfsm-shutdown-helper -- system_u:object_r:bin_t:s0 +/usr/libexec/gnome-system-monitor-mechanism -- system_u:object_r:gnomesystemmm_exec_t:s0 +/usr/libexec/microcode_ctl/reload_microcode -- system_u:object_r:cpucontrol_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_Fan-cimprovagt -- system_u:object_r:pegasus_openlmi_system_exec_t:s0 +/usr/libexec/polkit-1/polkit-agent-helper-1 -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/libexec/rhc/rhc-package-manager-worker -- system_u:object_r:rpm_exec_t:s0 +/usr/libexec/selinux/semanage_migrate_store -- system_u:object_r:semanage_exec_t:s0 +/usr/share/system-config-netboot/pxeboot\.py -- system_u:object_r:bin_t:s0 +/etc/NetworkManager/dispatcher\.d/11-dhclient -- system_u:object_r:NetworkManager_dispatcher_dhclient_script_t:s0 +/usr/lib/systemd/system/boinc-client\.service -- system_u:object_r:boinc_unit_file_t:s0 +/usr/lib/systemd/system/dirsrv-admin\.service -- system_u:object_r:dirsrvadmin_unit_file_t:s0 +/usr/lib/systemd/system/sanlk-resetd\.service -- system_u:object_r:sanlk_resetd_unit_file_t:s0 +/usr/lib/systemd/system/spamassassin\.service -- system_u:object_r:spamd_unit_file_t:s0 +/usr/lib/systemd/system/stas-config@\.service -- system_u:object_r:nvme_stas_unit_file_t:s0 +/usr/share/rhn/rhn_applet/needed-packages\.py -- system_u:object_r:bin_t:s0 +/etc/dnssec-trigger/dnssec_trigger_server\.key -- system_u:object_r:dnssec_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/04-iscsi -- system_u:object_r:NetworkManager_dispatcher_iscsid_script_t:s0 +/usr/libexec/dbus-1/dbus-daemon-launch-helper -- system_u:object_r:dbusd_exec_t:s0 +/usr/libexec/webmin/vsftpd/webalizer/xfer_log -- system_u:object_r:xferlog_t:s0 +/usr/share/aeolus-conductor/dbomatic/dbomatic -- system_u:object_r:mongod_exec_t:s0 +/etc/xorg\.conf\.d/00-system-setup-keyboard\.conf -- system_u:object_r:etc_runtime_t:s0 +/usr/lib/systemd/system/systemd-rfkill\.service -- system_u:object_r:systemd_rfkill_unit_file_t:s0 +/usr/lib64/security/pam_krb5/pam_krb5_cchelper -- system_u:object_r:bin_t:s0 +/usr/libexec/pegasus/cmpiLMI_Realmd-cimprovagt -- system_u:object_r:pegasus_openlmi_services_exec_t:s0 +/usr/share/cluster/fence_scsi_check_hardreboot -- system_u:object_r:fenced_exec_t:s0 +/usr/share/rhn/rhn_applet/eggtrayiconmodule\.so -- system_u:object_r:lib_t:s0 +/var/lib/likewise-open/db/lsass-adstate\.filedb -- system_u:object_r:lsassd_var_lib_t:s0 +/etc/NetworkManager/dispatcher\.d/20-chrony-dhcp -- system_u:object_r:NetworkManager_dispatcher_chronyc_script_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/30-winbind -- system_u:object_r:NetworkManager_dispatcher_winbind_script_t:s0 +/usr/lib/chromium-browser/nacl_helper_bootstrap -- system_u:object_r:chrome_sandbox_nacl_exec_t:s0 +/usr/libexec/lm_sensors/sensord-service-wrapper -- system_u:object_r:sensord_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_Account-cimprovagt -- system_u:object_r:pegasus_openlmi_account_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_Service-cimprovagt -- system_u:object_r:pegasus_openlmi_admin_exec_t:s0 +/usr/share/cluster/fence_mpath_check_hardreboot -- system_u:object_r:fenced_exec_t:s0 +/usr/share/system-logviewer/system-logviewer\.py -- system_u:object_r:bin_t:s0 +/usr/lib/systemd/system/systemd-networkd\.service system_u:object_r:systemd_networkd_unit_file_t:s0 +/usr/lib/systemd/system/systemd-resolved\.service system_u:object_r:systemd_resolved_unit_file_t:s0 +/etc/insights-client/\.insights-core-gpg-sig\.etag -- system_u:object_r:insights_client_etc_rw_t:s0 +/etc/insights-client/insights-client-egg-release -- system_u:object_r:insights_client_etc_rw_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/10-sendmail -- system_u:object_r:NetworkManager_dispatcher_sendmail_script_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/11-dhclient -- system_u:object_r:NetworkManager_dispatcher_dhclient_script_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/50-ddclient -- system_u:object_r:NetworkManager_dispatcher_ddclient_script_t:s0 +/usr/lib/systemd/system/booth-arbitrator\.service -- system_u:object_r:boothd_unit_file_t:s0 +/usr/lib/systemd/system/systemd-machined\.service -- system_u:object_r:systemd_machined_unit_file_t:s0 +/usr/libexec/pegasus/cmpiLMI_Hardware-cimprovagt -- system_u:object_r:pegasus_openlmi_storage_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_Journald-cimprovagt -- system_u:object_r:pegasus_openlmi_admin_exec_t:s0 +/usr/share/hal/device-manager/hal-device-manager -- system_u:object_r:bin_t:s0 +/usr/share/system-config-network/neat-control\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-services/serviceconf\.py -- system_u:object_r:bin_t:s0 +/opt/novell/groupwise/client/lib/libgwapijni\.so\.1 -- system_u:object_r:textrel_shlib_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/99tlp-rdw-nm -- system_u:object_r:NetworkManager_dispatcher_tlp_script_t:s0 +/usr/libexec/pegasus/pycmpiLMI_Storage-cimprovagt -- system_u:object_r:pegasus_openlmi_storage_exec_t:s0 +/usr/share/ovirt-guest-agent/LockActiveSession\.py -- system_u:object_r:rhev_agentd_exec_t:s0 +/usr/share/ovirt-guest-agent/ovirt-guest-agent\.py -- system_u:object_r:rhev_agentd_exec_t:s0 +/usr/share/system-config-lvm/system-config-lvm\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-nfs/system-config-nfs\.py -- system_u:object_r:bin_t:s0 +/etc/X11/xorg\.conf\.d/00-system-setup-keyboard\.conf -- system_u:object_r:etc_runtime_t:s0 +/usr/lib64/nagios/plugins/check_node_accept_status -- system_u:object_r:nagios_openshift_plugin_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_Networking-cimprovagt -- system_u:object_r:pegasus_openlmi_system_exec_t:s0 +/usr/libexec/pegasus/pycmpiLMI_Software-cimprovagt -- system_u:object_r:rpm_exec_t:s0 +/usr/share/system-config-httpd/system-config-httpd -- system_u:object_r:bin_t:s0 +/usr/share/system-config-mouse/system-config-mouse -- system_u:object_r:bin_t:s0 +/usr/share/system-config-selinux/selinux_server\.py -- system_u:object_r:semanage_exec_t:s0 +/usr/share/system-config-users/system-config-users -- system_u:object_r:bin_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/20-chrony-dhcp -- system_u:object_r:NetworkManager_dispatcher_chronyc_script_t:s0 +/usr/lib/vlc/video_chroma/libi420_rgb_mmx_plugin\.so -- system_u:object_r:textrel_shlib_t:s0 +/usr/libexec/kde4/polkit-kde-authentication-agent-1 -- system_u:object_r:policykit_auth_exec_t:s0 +/usr/libexec/pegasus/cmpiLMI_LogicalFile-cimprovagt -- system_u:object_r:pegasus_openlmi_logicalfile_exec_t:s0 +/usr/share/system-config-date/system-config-date\.py -- system_u:object_r:bin_t:s0 +/var/named/chroot/etc/named\.caching-nameserver\.conf -- system_u:object_r:named_conf_t:s0 +/usr/lib/systemd/system/systemd-modules-load\.service system_u:object_r:systemd_modules_load_unit_file_t:s0 +/etc/NetworkManager/dispatcher\.d/20-chrony-onoffline -- system_u:object_r:NetworkManager_dispatcher_chronyc_script_t:s0 +/usr/share/doc/ghc/html/libraries/gen_contents_index -- system_u:object_r:bin_t:s0 +/usr/share/gitolite/hooks/gitolite-admin/post-update -- system_u:object_r:bin_t:s0 +/etc/NetworkManager/dispatcher\.d/hook-network-manager -- system_u:object_r:NetworkManager_dispatcher_cloud_script_t:s0 +/usr/lib/systemd/system/systemd-socket-proxyd\.service -- system_u:object_r:systemd_socket_proxyd_unit_file_t:s0 +/usr/lib64/nagios/plugins/check_number_openshift_apps -- system_u:object_r:nagios_openshift_plugin_exec_t:s0 +/usr/share/system-config-samba/system-config-samba\.py -- system_u:object_r:bin_t:s0 +/usr/lib/systemd/system/systemd-vconsole-setup\.service system_u:object_r:systemd_vconsole_unit_file_t:s0 +/etc/NetworkManager/dispatcher\.d/cloud-init-azure-hook -- system_u:object_r:NetworkManager_dispatcher_cloud_script_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/01-dnssec-trigger -- system_u:object_r:NetworkManager_dispatcher_dnssec_script_t:s0 +/usr/share/system-config-display/system-config-display -- system_u:object_r:bin_t:s0 +/usr/libexec/pegasus/cmpiLMI_PowerManagement-cimprovagt -- system_u:object_r:pegasus_openlmi_system_exec_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/20-chrony-onoffline -- system_u:object_r:NetworkManager_dispatcher_chronyc_script_t:s0 +/usr/share/system-config-keyboard/system-config-keyboard -- system_u:object_r:bin_t:s0 +/usr/share/system-config-language/system-config-language -- system_u:object_r:bin_t:s0 +/usr/share/system-config-services/system-config-services -- system_u:object_r:bin_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/90-nm-cloud-setup\.sh -- system_u:object_r:NetworkManager_dispatcher_cloud_script_t:s0 +/usr/share/system-config-netboot/system-config-netboot\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-selinux/system-config-selinux\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-soundcard/system-config-soundcard -- system_u:object_r:bin_t:s0 +/usr/libexec/coreos-installer-disable-device-auto-activation -- system_u:object_r:coreos_installer_exec_t:s0 +/usr/lib/systemd/system-generators/coreos-installer-generator -- system_u:object_r:coreos_installer_exec_t:s0 +/usr/lib/systemd/system-generators/systemd-gpt-auto-generator -- system_u:object_r:systemd_gpt_generator_exec_t:s0 +/usr/share/system-config-kdump/system-config-kdump-backend\.py -- system_u:object_r:kdumpgui_exec_t:s0 +/usr/share/system-config-selinux/system-config-selinux-dbus\.py -- system_u:object_r:semanage_exec_t:s0 +/usr/share/system-config-samba/system-config-samba-mechanism\.py -- system_u:object_r:sambagui_exec_t:s0 +/usr/share/system-config-rootpassword/system-config-rootpassword -- system_u:object_r:bin_t:s0 +/usr/lib/NetworkManager/dispatcher\.d/no-wait\.d/90-nm-cloud-setup\.sh -- system_u:object_r:NetworkManager_dispatcher_cloud_script_t:s0 +/usr/share/system-config-firewall/system-config-firewall-mechanism\.py -- system_u:object_r:firewallgui_exec_t:s0 +/usr/share/system-config-securitylevel/system-config-securitylevel\.py -- system_u:object_r:bin_t:s0 +/usr/share/system-config-services/system-config-services-mechanism\.py -- system_u:object_r:initrc_exec_t:s0 +/etc/NetworkManager/dispatcher\.d/90-console-login-helper-messages-gensnippet_if -- system_u:object_r:NetworkManager_dispatcher_console_script_t:s0 diff --git a/selinux/targeted/contexts/files/file_contexts.bin b/selinux/targeted/contexts/files/file_contexts.bin new file mode 100644 index 0000000000000000000000000000000000000000..c0c9795b6370854aaa993c2e1b584539993d8943 GIT binary patch literal 597999 zcmc${ZIdL)aUM8W03;w%I`X7@(VcYHi-UCCyR5F+*~JRr$uxK&#iNO!)&Lz3W;=Vm zSy@?Cxm_;DOVeGk9WS-CZT z%!@noN3qY%AM0{v{@7J}^GAJXA8zXQ;r*sEO^2p7f81s5ADiv|nGiCa?RM>7#pbX! zpH=lPH-9xkfj(Ee=js)R5n`vCVqRv?ejtA~#k$-c9_&BryD~4#E4O&}59N{lVqfXo z%)d6(q}(<{IkU9+!?qJ?>E^sRpae*CX!#6$aHb94Cf-Rzqp-`~`KJ}(y8 zVZFcE|9SJ=yzTlUJoxO{f5p#t@PGN0pZ^WN!>@yxH{ja7+!O{vN%->rnSS;0vu963 zlnaXT`moz)H}jc+_#g1hG<&HZzPi3VG)4V(S?>bnwvf7!2#O8ErvufuM5U&p`f*S~wx*I`M#ufz7( zuZuSNZ|4J6v=SrEgTTKmg!J2o;2m&^ZR}3%*e52*|GJo&fB)~dyKV6w{(~_nu!r_t zGSdBr`MdhP#lP&=<=w}>-X|6RvR@a{{ICBA{~qc}Hs3(mRy%8*{uob9#Uhg7V|8Xi zkyiVCHNU|dZkoIA;%iO-)s`?;CPkE1wU2~hC)2oz`H6h&rgZYZs~{1_w;6>qb{wAJIN!WmPg zjS-%5J>Kshdtl=HObr;C)Q(dLeMpI0zt~qd`EI)~M&!R0Fk=O!#Ty!-J>(YYVZOO> z5_Di+ZkAuoHwmyKs-QqJs+=lVoeGB*2XfjF0C_ef1mdDx!J*n_upq-eUVmg8MVe2~ zo`nqKh(qQ0=T@GVo3hEF`Bjs_6?}Fv9CTNBbf|BO@}ZdD%**Dsrzah5o!tW#|IPR7 z_lWytv)Vk|eKl`Y@arMHTsm$J{qLpc)_69%%U9RND={8HC?W2IKEOk~E9#r|ZfP|7 zUkIoO`pbvq?R{Sj#b_P3C4Ks=8Sc~f^i1c(<6zF=`R{CJjZWipZ+wJ(J;JyE3j~kG z+GMR85n$o-(OCUH3d2kvf7$C}IDhdz#<2SQIt|MSQv2A^)#q1;#jS9*ta_tMA;k*Y zQHuwbS-q#@D*}o2fmq_Q)m$A8Vv8?#Rk6K#nJxSkLug)(u+NPxBMMoGo-bDg>-ZOd zg$(2qkE~zkogLMMo_6-(>Seht_VZWQb6w<8W6FE$1gvP?gz-&XOs_wFb^VRZ{urv^ z@Zxh>bMPFyuFLCPo~>a&!NKWmb5Ovr%UJLd!z`2IVXGqE!a{dmqwBnxD5rnDEq$-_ zG*P?G|Brpk@=bP^C3}B_mkQSjdjJ>q{am;vqpbWfWn~U2^rtuFp+5lYeXb5G_gDWd zg{=;=b(za3+!uC@to=t2XnLu$5hM@I^~O%PP~wwvw`Mp3et&r3^OmpT0jW9)~^rk-ALx>OMK=)b&hlAUTYs_69t#8x-z&%TMIFbEzUXYeiEH8M@AUt~Hqk?> zOW~Wuehvc$YXmcQX72g3{u|sxKV8o!>i&dkfak-PoU8`Z;mbb%?CPa)0jAqiP1m{a zE8*m=b)Rke+b_OYA7JO3=`a4`*XGYx*I9+=$kVWYe3L0J>ULA*xpYgHGV5aB6x+Oh ztoCoEeYV?QO)uBwUGX-n^A-Mo<@r0|jCgXt{$rnyRgSRHyasyRPK)ZWNhVwd$RxHQX~Ft$Fxnc z!rpQ24CCDW$i0M^k5hzD5w>l+4HgqL*Uq7-%Jzm&VfU^npJbJk!ST`sgKjBzT~%PQ zw~a2s*AIqo)(%;{dk?_#o&h)?SYz}Z#W@y16#0VkLWAmViz&d`?&cecHNN`+GKl1i zJ)%Skqsa_>x5ToMuM_uhxqFc{g_8x#_GPu#6+Jv|FiI5CSISGuySmuy?y}iBf?0jJ zSjyVxQ!ISG9%7!;)4%WbzHLu`Oi62Yhb`89-WK+s;yK;QX)bq%tC!ok8o7%hUE^h| zJ0HFVmb+j*V~KrdY>darw}(Cd*06VZIgikNqN*yBjjFzR`FbJRDvCt}I7V3=YIB*- z-_}>d{gv}Yr<+2ZTFegRdY&0O9hy`0g3M=q+Z4bpvFZ1zuRUX-QvM3%Z;tL@8O z(-@A5kO)u5Bkrr$W&Y(SFTzc2OXK*Vpu0^SKj(;27Ij3aPGM+(w=S2f{d|M|pU+W+ zG)nsAs`<*8)CfyYA<=E7nA!NtO}o!VX&led0Df^O=gq2IU}J@_fE(J|!>oWS?m0^V zX#2oB$jNOF7$!jRC-4rl`jL`3o(lo~ErNv;Nwj>r;^Y_Gh zje`$aKZ&|uP!dRurI@=e>7-b4{s(b@r5$zT$-hI^OooJ&K*Vw2_cZ?Nhpy7-x45{sF=Jr82Hqz~(3vcYtmf>0aYV+s zW=e-*7NKbn(Y(v`$UKdXW!$pyeGX@FZ?eOFyeew#Og#FsR_l!Lq1`io$R>j;w(P|-jZa$$`8j0(nehEMX@5uW)7~N3EbD+64o;7OgNp`37qJ_u%~?W|4;F( zO0rrGS7?^L(}d}u4m0ee=KaNrbIEy;sR^sG;(hqT1;zr5AA#P`~ z3gy(Dhj>Tw1}%+zK+LlIu+DDO4x3Q&KNG>4kG;6MJ-uSlKBTIWAF9U7M^Y#W;;;N% zj}P!wnW-$4Y?lnRuFLhP@B6tV4z*_aJr8hM)UcAwLXQB~#pxRgw|%Sb6;toJXJKAz}Yx1VN!2+wOkq-n6cg)0rHex(}CS!nr@)5eMkmAR|ngp1zz-@qZ(bay8 zUSfy7YK|I(F2uCIhZ#dQh@1wZ9UEiI9BMTO>fEA!J(R&&sA_Tzt?$7QX-Ghq9Iafp z35lG%HK#tc?APZH*hR;7>hvC)8twkGdOzO_8ov*4%Bg65rzq zDEN`F@dN!U=BP!1-b8`89&G0D-uuaJ(iL?%HYTS3)Qy2OQK1*=fU>!IRu`uNK__~q z#{tb64NwvwJ}R3H(wg&3Qr0}P=-~1VG`(j!(jAP_g@y)o1Dh6f^m z+`ky^&$v#`o6t*6cQPu))m=V{rs7WWQYqutZDa zW;e&VWZK8=4w*qzxlUi{IJ&AVrudw$Va{;}RfQ`ss}JL$_A%AsUEIt0&#ZqK!O?|= z2*0>aglkm?gof*nDdRcN-Di16v7dKFOBexAVlkd9{@=Db;y>!K|Qqdk<} zlKvr2Vbbv)!lrmV6cl{oQFI!LI|1xy>7V@#QMlkl1#~B>*=A~Dc+b>W9X(j;>1lIM)0i=xSB+ECLJbHv@C&N8*}6j4Bp{Q zwa1oxkAW`8jW$DLSXIN4$stj&LXSpzTj!eWCA!z4&*7A^zBBe7!RJFo2g1qN%5Z;t$?@&>3~r1m z+|WywmQ0rJP`k{`%I+RZuqAyfxj5Uo9Pz==X)Gs4l!XjUb%DN^4W&)B{N%-_iE~`( zfpgM3%u&4e`3?z-+J3ZVm`{*me6;!T#Dj>E_wi4a= zgzXorpy!Tn=Jj3j(EB^G_0oTF+#1bS@0YJ9zIKUh8p_x+mFUFRuBvb5zmM0Vp6Bo3 zwPlWi((lnKoyg>}&VL_F#1(D`=zDyQzLefl>0dY|3#m!8>Ii4D04 zJ~7W8Hk(J<*>Cr~i}yWzPVDdIv3dPo$IprH-J0x{r}yTHpZMNt8SC#^%6#fuQKzJ# zTJ>$dRid)|t!L_T&qIb{ya*9Y7P!+Cwy z06y`(I56DoA{Ohc_sXf96XyJKAwwx5<8SlDvOqvO!Qy>t_4Kqp>%4#S`cMRw39Jn{ ztJ}{{dw03OIr}=nb6MyN1G_xmOtTPWM|G3WA71tn8Gi^E`H}y-G_F6!KQsX!Md~%i zkAF*~RetRkF7Ws8{UWU{=|*v6??6753`+diXnq=JyWdp=M?Q|=3_H-?3uQYXdyjqx zcwRtrm*2>*?rSUkZIIl;{PO^YZvkS*!Gn-26WOzBNf-U`DH)P3U+`{>3BSNem%SBN z{8dSptv7sP-z)F&-y4TY2V^AQ|U zo>gHQdzv_VErnd^(MuojAZtC_Oo$uJyZL4j9(A$g@s6TeB&P}u<5(7EK)e3U?~Jh^ z{o^!6nZLSgV$A1ANa5kVE72n3@ZD)bX5co0G+KHalx&V*@k}yy1jO+jg+6pll0N>M zXKWmin&A!%#l&M^+;9!5`8g@8d)04vC!+NG^ooNh3$z{e8BL*orZ3io=uY zt3un?L)&vj#Slqfa)9fd@f+S7VAXsY7FV!FgUj}=M8#X3nZleo+(`&EQB6VLKESVU zYcKHcq4{=b{q#G5YEL^n4WW)qOq%N@vm}yV6a|{~^C8MP-D_zgXrsj0Wus+{J>+mP zR1vPe!`aipHJHtjjrQ;Q1u3jNxtRtTP-#H`st5!>nWFw1#n z`%dTtJBTW0vvy#pD*p+dF=eOlv6pxk4hwEpy5xE}&|t3ya+tV(kR1TAeg2Tr7nHi_ zz{#V#D~a$T_#6Bd^fxt4v(ZoTBdr8Zf)HVYVsB_EB( zDz~WGDu8|IZi{rJ<8RVdsT9OjAs z3ux+h@N0*`k-1D^v{ZOMe^;!u4|7EaKxamJ>52vv>)^nSd_MraprB@Tj-0t}B*>at zu4eLB7GgyNaF3dv-r*XhOm2EXeQW>d$R7lhaUa%LxM5di6`$vouOGsGpMPB0^8I`^ z?+$(_bqa>hy}pKEY)Xu3M7HYjS2 zo1Nj|X;3h99ypq)Mt3Q~pW=>mb;RJPAi#KS3bIa&_^QOzQ+59+G0MLO8~qKS*q2lEc*3F+nqin@c0Rp zk(XX;R@r>luG|$)RB@jpO84>9v_+W8?XpM}v1m^tU6F0k$jimm%k~kfl_&F64@Y%9 zSGK;o)*H^BhF!k`JBFN%n8B_Dm^Fi2S>_{X@b%Cz92rLL43}#A91D#{&rb-oiaX)! zW-}k2V{oOwg{{{g-QX#cj8FM`giLqysFJzb9qJ^VqtNb);x>tPvdoprK;|AdLw)C? zesET&hx+C1a>Fl&wsunvI1E*(!qK56&Xm3OZwGQ^&sFoA0(W?~k5L(MKIkR5eM72e z`79qUyNhyT+RsT|VE0LGoCHvJaH$9V(RKSwd|(~X1ceiWqI$J~X;>vyAtEx_sPr%M zc83{-3FJcWA3#R_G|ZQ0q6uz!rpE*Y4xiw{%G>(~sKKji{3~LtBc!$`!JGr$;bLP9 zmm=KWFVp(PwSXKCbq5=N_sJ*IFO}Z*SYyOsbFbX!m*ayw*eHDPbSut?BPyVP-8S(Q zmv$}TYkA`~l-5YV28-5yQI-(!f(}_6knwJ*l9%fJ@Unra=6;HUZjB$02<;2sg^_!q z_l1rsrvx2S1-#jOWghZ)5MrOK1qv-AtknY1E`Cth8n7QxZtPcwjX!HUv8f*^bwKrr zEoQJFH^}00e?XnAo{4ds7Vr78gi(~;H`uN&z8`XfYlLI3E1NE|!-hjo#pJjmdfa82 zT6!mx4_zG7=#}Tl$O&Fm5xHzuiJj)lQtIy~1j)?=u8-Kk^mcB$V%t&DV(T+g^XP~P zgB))X`)4zugh5BHw6z@KY)5~MyWB%HG()75&F)RPUT5I@>fNXod*xFN=`Pl|X0OuA zJ4LRop$o@5*YI}IMjXVDFHe~Z3yVb?m!AGsPc^=}mS73iV(q00e}pIf>4XnX!gqaz zmFi{F6fbZ~u5<&*7rNAocH!h#h<^D@YIR?da+=*@fitjX06Yx`z=^8a>jY8F32NyS zRMLC{x4UIUoC0qQXjeLC0fpsoG3O&Lh;46WnJlury@BF`b0s21D#osT^Z92#S(j0M zoh*~oOYR;%|LOB@`z81DZ~rCtb(LlppATB=5Q^On64kFoSr?1lgVDA2A5_6EAx+|o z%iWrT8+=qKqFu7Mzm&2zZ_DcP?(?_spRXpDhw3es!P_f+&)MoFE`d`oQ)c6Yi<7Or zJz2rzLHC+&!jnN?<_9TFm9UN{zopli{#)uIN5LH_TooNHVm5}dS==8WoUWRhzC)#Q zTOv3ht#9?elTESDq$liZT+6T{6I8DQMw?pon>Aslc>k=KI%5|##%IeAqBdWjR zCeYWMEDoq<_ny8u^4+Gw&9v2L%RJW_5byRT+2M6P>c8m@pjwY&yI)E&RCJVH0B$%+<+ypbx2*+QWsJ(lnj4BQ zSrhqB@VET%CH5W#%;sfVCQWhV6Rr0yz8iid*e1S}#gU=y0`2A-n`(k9xlQ^SS|#w6 z{)Sn`=eKZm@oX0jwC~`i2^Z_2E?MW2>&s>JqYbUADRBPFIn)As?Wl<9?&?)2y_9*; zQhaWe9Z^Y3p)r9rO@yEY~)- z3oWcoxb`7>Jyc*6`tVm*^8Tsv9}TargI#VTF3vO>G+0&0)!P2Zj?gO;|hMc9W}Fn40XM^seer zbR}fDDId)3hlFFCF8HOrEnY_#8U_iiXLeCev+1BDRE^fK`h98`b}#l}B5=BsVV~4dk?npl) zXmA&TLX91oTqG4i5jO#FIe;KUR|rRsW=}%7sSL``_JPcRn|23b1l+q;zkZnuT}hV^6KNSUiR=TT^GO} z>YCiRDLecIOmifJxD|GWY(4jU^+K%u{$--)K zdXRakW7&7nC4W}>kakhl-k!IjU^@Fs!{v6_hSfr^fE%Fg9d-+PhEef^E}T@_uQh3d zPMNY`8uCA~>FYo>#Mt)u>!IdG49IN>p>D9jC6s!yP%;-;<7fN|1AQj)!H{9fMc$=| zSd$Z++G&Fqakgq~)h+^em#u_Gt9TupG$i2SnulPo)CLL2o2_q4Kb`9|^2E(uvEFJ! zf;_H)OYP{8clvn(ZES9{^0ZLZnFXOb|s8E)IBN!CdlO@#-IuZY=*4| zi1kgp^_9T#m~%u7F!-N`~560(S}P7_9ltkXo& z@n~B(I7ASQe4aq#U2R?;O8@+<>#8;+;CNSYb`QsKhh5dr6KI^cH^r>Zn6cM}(Qvrw z!p?5pR3!H>Y=fEYd%?`cb-1-mtDT)YG%-+f+FxCxV6I1>&1$zU8fTs&bunchu762K z2zLQ`haN&dF~CRb=L3Xj+~+o7rQQy>>Wb`sYn#{I@1MlK+xY=^S>!eRVQ=o0pqGB; z;Yl#pcdGxQ@Q1S#$8%Dz!gZu^&$bh=gAcxd(;R@%x6m&{_mW2NUet9x8G?WReWu&v9~ z>yM;WA`VYO243JbLsQ=uhf9B!kLQ=4U%e#B_*TB0gC?7<;Nh-AF`W1h1(tFWBtxf3qCP+W>v z*Dtdi$#g<&ek)g8{6n_^W@oaKSs}w32{h_4I>T9)U2Na#Xv zMcE_;=+*V5CdR*Q^MkK&O;m37 z-RjHj>>YVU`vv+6Za~lvv2aITU~=lOa1L)f8JIlV2R`LuAk{k*JUh-P`w~d=R)!z# z1sAuR$?-ZN`Zg4V#mB=Fli~fXzM;hVh=RW1RAGM_bi=6a)!WOqCvPvU2477VsDf#v zPhZJ}j|)N$>#UpKbl*~jiD?K-v6b`Kpp`?N*M}-wM^HJ1;U>9aNqGLicF8S;d`?$i zT+&v0d)pfH*LkS8L-<c7(FV*LItr|>XR$c*hr6nZCNpQowpA?}pVeg72bm4{ zHiT+ChYn8Lgt&`t`n7PQiJNDuIm%?cFSHHWUbVDwA%y#muAjx`r=LF8xsGViu_=LbWlpTSa zO^(eaVcyrn(RvZLBqfJjM*#Gp*x9(uNrDpvSt?y)X-HvFL?KewAPCn^Zk+NMB7kD`3;S>0bECy{_ z+EecM?g#kw=PEw4%ZaJAA5j$6n-7Nv=F_ANcJy5s#-U9PzSvDy_6!z5vLkQ1s zbBHPt6?VtERU&R4+A9f%9WQen!S?S`K23veHw_470yiy*ZgVeaeYd%>$1MUCLKCVv zBoKL*Q8Y}f|FFxZA%VwLM+4amP8$+%5%O?u=p#&mlWH);a87W%>xT?E9eSJS*B)1xJ5lOK1qO!qDrWwwG?fsmn9|n+o!pV?0 zh@(qjC}Q23Qqm!Avb)mf=4ps+kP{;ubj*K%Qy zWN~0n>2a4U1lIBMJ^cC-8wW0vNCG_MGG|AI{W|5R8DL7a%p``#mvU_X>LniX#24Bu zJ|avM&}X#}pf#Ngt1nH?)78sCyfA#h$!rm;q?HcL+-iz~lvt0g*Qjvw5MLiR*ClLdpa*+(31xHQF&H3Qz#PN z6L#ffj)BY}$7I;5nuaQS@|%n~R9DKTkX_1~M6(1PYr;?8es(n#*K+!s|1$aQ3a1uu z?mnSqTKqHY?ze{p6$Q3FGGq&U0^1eE{jbg|2JtJleRV=DzX(g2Xk+x#IyVMYx_FaH_1F{ zJ9epTyfl1#izilxeYt)sTe8@kY_8t6E%Mmy`YPJ{h~;Qg%(``l?%av1)25Nh)QlfH ziP}&&pGTw)D4e}6ZsyS1mI#_yA-B1q8+2)Qs z)Ou3Rh-{=qlZcE-vcj>P;cyxs_0Kjs;=KCGPeW0U=;b!q%L}k@X!IiohaWMJ#j_RG zdqmkTax97XcgZ^1KQV#$c=E|})d@g-7i9Q4!9A=Eil*oySDCIg6tGLT%GM}wrxeM) zrNCH${=pn<8i*0)5E&AWur!r5^9RsD_DBR#!)2p~Oub zi}NfzdeRZr+-E2O)OOPP;Fd5BW_DczrO;mXQu{)%3(7I^Ic{)Irl%QlYbJDTzD4S= zWQ9CEd-jL;?r~Wrs{-6MRx#|XlI~>^>`fGmtG-(TD&xg7l0o!{+VQ4;AxWH9nk(y~ zI|^kjDw)wGwBxFC!}lVv_yN1jz)2pXS3hpAQyC+j;D zOCq^$>8^?elYn<^?0eS$}I^AwQ9UF9-2ehXx}O$8ngO zVu^}QVG^AsQCzqoX7t{}4t0s!Rm!k{&^x1Q(Gr~#NdLJl2@??=iOBZ*`yoNWnsz6)`knc9(`I#p9}>xiDtK^e(H1u>m+Q`c*z$&@-Rsll!@e z_foaFe8$ELk109S#d=p&k2W`p2<0r)>UN*c@9dR}1eL3JgKOaTxI5O{*3j^|7{|8F zTZM);h;y`pjcKsM)v0kdC)a2|76>&MY=qH8WneO$kUog7V#LhDz#$nQcn~F+$|-kgpIE zBK^)yQvxzZ=;4K{E#FHaS|jfN$&BPi~R&O9b3Dk#1VE%LR-hQQ0FEaN9B(QG&B~ zl~*msF|ch(AoBS-k__c=B^m0LrY_mOpO3r0^@Gfzz_~&yy%o;vdTCZYV)s=Fl*=A9 z*7fKwk$u~g;47!IDKr4B>SR+L9i44s0yHv{*?eF|sA)@JawTn0`Cwb%Vx7Uf)3ziK z`9v1h407E*Y-bWlO8|25V8OO68^3^+gKV1;kX$?n1{~I?%dwk%Q{e1uH{r?}vu*T1 zzZ=Zprx+ta!geZ>68vr1O(&@(Lmg&YSJpFc4RhBA(Xs4SW;%^th z^}jeTW(U94SNKJ)$r@-`U>)2R0Q3>{V^095A<8-w#H~DYiz|n!m)sbHrvmq;R##DNNZK!9|8>U~59$ zQz`ty)T2pI$TdfItW82^XQ+iVG|0jC1mLNpiLu`0{w37sb`nSu=1tJ_Ap|^(Kxqw! zZUameL?V^=JUEjhM$R{*Jgcp_%WvejbeWG1`P?c3(CHIwnYgOyJ_#kNlOBb`v*D+Ne;TX@wv}Ll$j6ap|HoN zsGaZ*<@$q6nbVN^&YDH)4~5f^`o4ul!lwzAaS7nNH@eN#XO@htY~~xdkgzK%(7xdu zk}0_P)~~G^;&LCFBq}&<5zINwJ+_M-uFCT~*TFIDIa(5o5llrCS}ARj zq&3tge40Sy!*YwjXICz;M@Zpr zi02LPik<|p1DsP?-|iDsqBTKf1hL)z<3kcAAc4pQEnJM)-XZj*QrI0!z;TPwxf(7}ppTiH za?Zs}*bG5OHN!IP3$;FOWW`W8qU&2&~8&MA6FM#@e=DQ zniA^5M+nBg86oxhJ-TI58=5@+EZ~<9&oYR?h$vK@k!-N|Rw<>myy2w*>a#XXKA6r)oPca4( zJmtb)H(?3Oo|w>_faDC7bfCD1&^j8?dd{4g=XlPz&o)6LT1V4pT~khD+N^QWs3D3o zGHr}FWW9<8W<-I|Ji6c3m*V|?7hfuZnDnLi1i_6Pr+ zuC73*U0vRFai{p)h|s__S|W*qd}$m>rc;w42{OnjlV5u(5)-V19{unmPvu$NBkM*g zu=HvJI@mq70*d|Y+ksttJFu+0xm`mY3HZ6%*SJ7jqKY(U!eVh9HIs$6(dIC1Qkd^h zeh>)h2z~D8qNyN*4YpU%B-8}cthM(5))f0gMZvhs)<3AKb@iH`RJHs&1F=pc za*5dEiq5JjnK18DvAj#TP|j)z|PHAFPr2I$rz0MQGex}O?E;P%Fp1 zCR-C<{_pX|y`WPW`D=P#Ylb>~!4WO|*H)5lW}e`>id{X~*X0uDMHMrY<#^WUYeLq{ z4&{1&i+d6yay?aLDER6Tl`TbYBH$-#x*Q7(G<}~{NWSakGKCBhiiUIVdVbUF%(lyg zz$!m5zpUqzV~3-yO&QO5?Lf$R=LN)AKmI*32u+W~uWOwLE8$6WmOoX-6kf!;#kpo= zcSodrD!jza2Gkq)c5p>rz}0Brx`{L64ubp+!D<2K+O5g{0bL zYw#oc+4Uz=l*z02hXziJ)GC0<%X65Mx^~B>zlZPmYc1ZJwpdJOqur}a%k=VoSKrD^ zj=CvtO;Yleo=q|BbpGYby7pCapRQ;3p4+Y+e;>}-PPT9<-ua!MjC-eEI`ohEQn^`r zvfa#hPfrx&h)(MJDk$qedMBG$C&#GJi*e$_^=k8FLA%N)RJU^Y%)aOssI)uF_Fw*F z^0Tj|zbSBJP%hANl|!oa0XLFLxrMG=S2!HUbnsLA-V?`2u`d_xlKCI;wavC%ELyK3 zeC>%kJEEhiv-c%xUh+{ghQFVm&R=~kwAK_Pr%E*D&Hu-_Z+>-+1sHw(1t5q12|4$z zXV_L7q^xguG6Ukr#^-EK^aVZ}Vrl(pxA4_^0M`AMrWVVtqb-(9!$U0G{pWA6^}yEi zEUa5$!8l=?dcW-An>{RPiV((U;V#z;{*7_$9H1<4k?4OD0hFG*O!D5B8n8R^B|bt1 z&PE?@UFz{?yf5VTk2$xS^{O9W=;NU|LLSH4FHsz~7qIBzNpl2`uj_iDc?Z>2iivTK z8*K~^PijbSoUXyl=@+$KG+4jhsub^`snF-2tyHoEPw(tNxgP1^Q&)7v;$2V)$aYxg zY$=w6q44qK#q&Xd4~r!(=5XwU=a3am&mp7sj08H=&WN_5v`UbaDxENO~hiR~U@{cW)q*ZtQSN}b~% zA*b-Z%wwn$kQk!g_iKk(yDuL{sN*u#p2jUlqPHW9Fenpcs>2Efb?R#EF1Q~~b)3v$ z`3Z+-%1?aLNVf?d7s`Cy6~_Qk?s6W7DmN5O@l*trQ<>|?pmOvgRHduS?)C+X@0& zzJy?&=SAE%%ToCG4@29qD`}U0JJ}!8MVJZ5;=B z?)oFR4?ShH66f+EJ3xAZPy?Otm5@S?LFnRKR>LhQw?D>%=sYh+rH+_YrBT{`aVQJO zMdT!I?}czYg+Hfy*$VyVL)VZa4(=b)UW*z@%e3lciCLLjBKdI4q&P;|+;%6lJIuDp z+f58Hxdn3ZWz8qB=hGdo4GSl5dH3B7)%GyCgUs8e1SIdiS;L8H56DC@vBD^EQFU`z?6=tB9OULKChc z;>A4dyu(N3=COG#6PXpcW+{lqZyr%QQ3}#AW?DPP*D=8<6W4Qmt`%exJ(t+`(ALF| z9ysjX{T5!D~`7vX4{lt1UJleHbW}! z=Czkdq)2h1M zqG*D51l@-4F7Jj}}6Kdxt)X*np4Kk#n-{cza-{#8Z@y5V7$yP(xHsZZ}$maCf(ol8amEaP9FL)tw%F zY5hS!E|->^B*!AUyIe{k#VL`aB_K=b&XHhkg^FXis#Xv$VWN0j2~dniH58FwaA;%xoM{ z-Isl%1Rl3cRas}-Rd$2Bo0tuiF||JAsUgaz4ZDNGwO{rm5~Ol=ZX^yKXQwoe$CRzJ z1SXnCW0u?SglW%2ZHxQysvr3bGeDk60G~5Xn|X4a za$DNWus@q%K(okGQ(pvhcCCuh9s?1jnY|RY8X@-2mOEXx5Q}*?Pip8jo$-PVz4*YA zO})_+cjta>#lW7(q&b1fZI!Kz9w+qyo2?1h3(5!*+ET{ql93)LwVK7Xzdhq^HXy3=R}XJFm8L|8IUjpA-yX~E!5;CVdB5$hdV8a2AF#g&4V_00Xc7{5 z$5Hqy<&|(iGd?-s5ucflOC%J}HR8lEr70mDE^T#lINlK#hvTV>6TwTnH|J{45s!gS zM4gAjX{~nicX1i0njdi)IH8@(zzIF#E^r|=8!VGJo-`$tD599IWDf1PY@8-A`RF+u zazD4OH@>AU0mwV8vl{R8kr|CkhU~;TB6~Zr+?U~;bg`SE?;(N3Be5G!s3}V<(-;Ru zj#NrK9JGs!aL^+*Jpu~59i-$rmP+@7;9_XkPYkzkg5NFN62Uwt++yaTxVVnYMO?4k zYL*i!&4~fUrM1S5$th_`djgdE-ZtXE={yo~;GufGA}B@ZHcQ&4vp9NW^5mFuY9g}o z06(VEoM31K)5aV)N6(8n42q)mhH0cKs&zX#omGVbdvUFo=FxqZ88?Ob?rV6?)FYGf zIhucD4bOS1^L(7AN9KA?W_)ohDjF$an-=|kg>>gQnbMpPePqy^?a2h{=HQAGf>MsDeo36pBfd!lv)Y=%tXw~FlSaxib4=XClNwCYJi700-OlNJ=XHAo zHob1=3lTkoqK8MCYG-eUb7oIJLzZrW16)s?!^d_i<#NL#F5l!C+h6EHL*}YnFWb_Q zEM<6b5_$ZRQBD++%nW?IF0o~O{Sg*d3!09{bNdjT#mxZbyn{>2X|K#ca^$OP+`>cQ zxSua&g1S^W?XFGeL&b=REs^uo)kUz@i5t9Sh5G>fTw;a92UBT5GHYcaLC<#}4*9i^ zN4Cygce{+$?nHi=E5p}GVsX9xDx&SLTH|6~?t@#{EOmUK%XYL3oQ{dEzDswQMKWR~ z_ZL5*>Ab*a!!56VVH+*vVaY_(hS#C7gpPtVhe)bC4at4lvO+SL6hH4e??^T2$<^mC z%_GwLr=b$@WCYwO*wY~e6&;%46trA7h&#}3!!mF^U};uhjCpLVD|B0v6C{@nVHL>dPA>&v0JFhJY3PKGExeA+U(xY*X9J>+~vU0zq{RoNv^bM zi!x7X;fJ=-lqtdi@LWnKsCtCc5ue(eR%l5WsrpdPHq&piy9|o_OZ-I?zqF&I?A;J>+CWKwx3{*O1kO3l?m}~QTiV9yrKZ|rkT-?+n9T@g zyJMn~V5L<&1`L_Hvy^xwWC_p961{fAP?2SDdulB+3N{;3i!yFVwHC#V)Z=K6a>!&k zwWdQ_rE=Upxwz`VL6| zABa{3YX>TN6OJX`8>>FxHx|fZYV1h>VQ*Wf#gtHSN~F*FTNmN0V%^#3QA-GCSGU56 zzogo&%ly&y2eh2}lHt{WGURzrptwkCYLH4FTTYxjtIC5~fri+kW(Pk}hv1cQ=t85! zmxJ?Sksa1;_0)&ei^j;~jYVG^#@F4V{=_%r{?M%U54r|IL5?)qkRn zgJ@&o#cE=`H-9$b&8>NkzWQ`F|M}6kUK$R+MMUgvRpadW?$BH%M$nIFx5csW-48t; z?YkeJVz2h+owH$ALcAw493d6w!N2I(9YJ1~>z$dpT9a%w!k+&+1M^K;t&^DCM0MAp z+l1pk6@J@(=j&_}7CK3H95r{AC?ErX?i551QXdGSLl%--nT|&1d3K0!H&aA%S+_)T zxD-sA_6Q>P(*3H9sN`%Mv>q$(HgIA_ zVMmqEV_a^=y+}xSY+vN0@>D(~dTt7|^V;`R+cLwB?>`{k(;;Q49-pfr(={!De!P znfu!r&MsTs3&A++N`$4ntB7>0>1qlK6>W=<#?_=PBf^Q(#t0lI&Sd*?G;NEZapG?G z+4?rdIcyVUpp&kwedK`{k$mj~zgi;> zDZdt;%Ak;;RcGGyX1i<8_;YVw+at{6g2us;UV?&lTM`tcVO3<6PLz=9cQC%>*AmD% zsR3yOM*O@P2f0~P73eo}=E;z#hOphnASH!jp1*j|1qXrTM$12%#2J|*%%(HRKb#sB zLdh3Y>gXp4_H@Xt$O$AT^Q2Wwrj9tl5Bd(T`aOY1`{mN(3dWmb5C?KcOKh@_%uBc+cWsKk9klXIM-fa{$oDn#g zQc&CX=6YFY+IXGaJ-m1(KjHKoMcn(deTcZv;)q=0W~aMnE)~@FdsVI5i%gZw(>lIw z)^H=bWu_v^(iJ&<6DegdA8y}Si63#XU5~|8m&{s|lR#z7drWqLTzZ^_(&OzEmTb-tNBfE2q3O#T(=efED{yg5o1u?<9}Fp;Wp}OaAQcZ;OY0tTdpt zK3w@V(-Sgxg>M~8(So#dvyw$LzT(fE*8ab^X`B`pXG6p!~xu ze+UGzdv?h_5)r2K7$WDTILn=dmuLc@e)Bn!#r#~c(;OfPor*oSDNiaMfiwl{aFv%Q z>JXA!kzuZ%0~NW?zQKPJpuEp;Y=b@vmhKcKuzo~kyv#Pe)bk#B+L(akgT`z?wP^!{ zP;DQLDpxAZZ{n!hJ{t9as6`4@+Y_i`1oW`Ti_b=54HX=*DD0)A6`a!rT@K`7uyB4Q zK^K>@oOuxk(#ug--4Pekc)iP`QnHeb~XgEY?|DBdo^* zZA?INLdAln2-Vbt(WpqcD}w@-JzBMWJZhQeDN|5Odjj=CYGs>jGc!d@yOo|bS=yFB zdXwnkNGB?k7mN>G#;Dm`M?R&9D4erjqkPF z$0knRZDWXew~rZN9%QTUSG$PzNKwR{zecrnIM8FZKDNa5_uztlH@xY zaevq%Gn*r7TLO{K{$T~7bD=PTGwziV~t4{W#XvE z%sOZ6>K=*y3C3#sXj;3q9H;e|dFQl}Vt_r>()I+cN7r(k*kfxs?#!&)fJOwfs<$bh z>zew->-`>A5aYmlgMtaE;h+yDIKlb5nP>B$DtV8;+CCmtv$o@UtBKp=QT41;0#(`* zs9YCX2O#l&gVyqVFcD0LiG-0ab+?W0l4O3H7=X~hQf z-oJS(oC!~g7Vx3=uF(RHdMsMN6#*Cd-lfK^wvT3Rx3uT99`h=B=&%_S3hn8^F+Y$q zpetz1N!9iQ1NiEGdxx9nuyi!>jR^8SqecJilJuRB7b$O(+w#Bd-##868v6p_pae@e zqm470Kow_qH0l9qYqQ2XkLCm<@4WFs`R0dIhHzf! zOBqnZ#6LdFOmHE-ts=;{nvq_yV+SzLK*DWR*}8m#obIq%kJAJJKQu@?OfZA^xi-4~uL+BJ)!VlyxVV`iNbLGKzQ(kzywjL~>m<;_^1_HB|`4rcDHB8XW9H zHMxT4H}m<%RVj6&%Aw*Dtx-BhhN_%P*4~H1itDQh&&KUwFGBk?)K|_^F#!It0~M2G zur~R+!XDBC)FqDTx5(=Rf@%2LPo;Uwh~xOh`Hp7j;ozq;ZAOE>~A+ z5=o0px+Gscxj}~esiJm8C4Esh5OrY&&uPLYS=lFBebi_HFfPm6lMW{3Xs zt3(DhSESH_D5_?8*F}jG>P2&z-@cVW3d0HY6dn2weyuL?c+LjLWOe7HN2FH$yEGZ@ zl05$Np|21uMSWM)e~ANU2QAC2<}FkVZr;o;1(K-kxfFLmu~}`V+B(5ddoosCEW6F8 z<}+t|^3Ma*({Ji}2;ds0p(gF%6*M1F%%+>i^=nY%Das0<+RpAE0{{;^dnPmdNnfk9 zj$`a=oF4LL^^= zbmk#kg!GW-^`XkNBnCtfQhSBZhK9#Dp|?0KCe8`SGxL5A7MtA7ZCItqa+SL!#%mT= zJH(TG0d0*ifaA4Hb$eDFeK^jZWGFWqU9~3;DW$w*o&?W^oaBlGU!jqNQ4VNYBY?cm zZ?f5}e2Czg#t0tovr!@uGhD7fEb28^azZHr$+ZWOm7OW7l7PiCriuh%WdwGMN`1THkUm_IKf9fuFMs|$1%+V5lk7Yeai|UT_LH@ZB3*+ z=37=y$~Ie;yC9P3#)}BrJP;v;OQdfmxI~g>f**9IhsJxfnkOQ(MnJcc1QbLW`=I*7 zC{S8ZOF`j-nSxqcZc9L)ASV3ylH!wbn*|!1j7@WkC}=+75%*L{lk<#uSrs_cI5|`; z&<6p~1^zu8EB#_$diGqC(TG-&HT;ry15%VavI*Qf;$+a&oqvrPpa8hUXq?NPn-l$JT;A@@Y_Xj}h_rd{TSp`Ao%URfkW@ZmkRG$Z zVw-c*G)8FT-0XzTA2`XE{tM zoVA(fKYjjO`hQ^@Vc!|%8j714IgMzLG}3*hJ~6@LqFN2w->FZDz8ns2Qhy4~lxP`O(rWju=V784d zAVj{&)v&skWRZUVda&k!;U==}ARmd%Hmh)rC6vb<^U-}!SyCYyjaJkKp%<^%bq3c+ zsb7QoJ$u=s^6Hql$}3&F7sCGl-0%kv_v?`?f%43_+QhG%)d9QK1n?zZG*ov<{lL9U zAQ^wT${9YgY4)>KP9ypDFe_@v9px!x2g8K89B|i~AekEy6NDFX1I%@~To9OV0=PIr6+TC*;SDvieVsEy3YP}SXa*WYSe zeP$XH{f$^GR5!;;JU^HE~m9Rz+$0>+>lmnSZ6ao_bU|o5pKGUBeQgs?I-KT zuW1v4MQrM@(vpL9m6kqF^qVWDaq3kki4kc~u^y+kHo1R=c1Z8}z|DQ{G<^vCoDR+wRXX-+#Z*{^$sy`ACNF+KDkxJd|pkx<()O4+4^ZMD@cf z_@!1yHA14Budb!g*CbMx%gzXq(HHS(#Jl7kjg9=Jam^-`oyIyVX~T7yZc=#~VPWlb zbBg7$U~~942mj z_a>YUdbzIrv&LcXIkj5zOm+$b$h$Hx%qDz-+HuN+(Hl`F@%zONSY_fP%4LMcGfg8m z*IRAkxJzu8ha2%~T!dhghk)!HU$HE`7MJ^k!`g2lYF`&ZRBpUm7krLeyv@qZ?eYic zC7$qP7ov0PBGo7T@>>C>G$$}QAGU)NL;ZMb;CWsa19c?smR25yGKOQ10TC z=#JIQuy%}(v_Vd8k63L@4PVX#uVy_b);y44!WEx=o!b@H24uJ17AZb(lHt3m*G-L% z@VBTQ`~GccbNR4X=vklCurN;~c)3VH^T2pq6jjbmgpsrORv#FR>uvFHT=PHzmwOML zCmHp4M3XnW-F(dsKv_${xx9JYulD953Qo0oAVD?9-DZVsrNyOZ9!TJFPjy#ii=cX8 zPub8uS+MejX*RgkT^P7T2Q*7zhnzKz1-Dbhl|pdqGnipQWeHq;AVDuz zHd4o}FT2M#NH|Tva@oC>EvnSyVID}}a%0>nalMP_u`X#-By)$N4ZsJhPOED;Er=3= z33?--sPcbP9cIYX_m;99Xfxfg!ntsgz>93K|ufdsiR+&WvNhVh$B9!TIu^g(ZSW$Qz_%@ew6e0gk2 zopy=v-2j$E_*kJ+%UF(SN|MGfV+BdmnC*Jg8FP{r)nD^7QC3h|}7-{+y>r-F}YQ z?ssv_5`tQ$Mk(+AH?kCK%ly**n+Fnn<+Qf`KBx6eU*Gp`DXmAnTTW~1-EvxwdbTl4 zJv9)+l*R;4xvad*7LI$=k>j)qE*!ZyX3~j^U>YYbf_cn=M{h>pYJw`#DD7=N8@_& zT$hIEvChHs98jtNe1icK^#&fs^CXGX}?OFBoB+h9Qx6yfVJc!^8B&WL4tp+QdW zQ6GUv%s0F6sFsT(;5~>d?dScB1?zXGxBgfmz8)LQ0}1Z(;pPRFI2(>mzg)?>z!Hbm z_SC|elPi`m5AsTTY%mXuWg6vQnVvdT?VjcWs%k@TA20w2L%6ouoS8AVCvMl@3IPAg_5 z=;f@{+QfbtI>%ZAD(#~|2es`&&~x%4PT1KnBrkVO%0cDp38{abU_-gdQX}mwOnGI3 zwH$L>+&2k2rFk@_){|G>1=iN^Q<@W)T(8V^5pmGSg%Nhha?p5OSzG?nBJ{ok5GELb&4a!9Xk_)B6kq*}&J?M1#+1B7Hrzt%^dUz_$9 z)KGC@Nx-2yn4yIfMN{SD?oc0;07i?NDn1h!cgR>eBQ}R@lCCG%XT5yUs|FX20?uKB z?BwPuKZ@MieC|GMXs`L?eT&Nm;P<9FXvKH6Hkar;3q`B!e_%_+f9nS z`PLCGi$?5;Nv0(56LT)NHHIIZT~N9;D_aJ!wqm&5?`q_nMMg0PHh0N&z)G+KHkZjE zaT^6ecU$!Q>D2Ng5+qp3+L^O@{|0_tv8MShY`?qFb zNK@!!F^VHv4cT)V6md zw&+WunxVD%=e^**+oZ-NBvoj`LEUEGyH96GvT+d@AF~jl8P0oIG*vvd1 zM@G3Dy36fuQ%v*)6Mb-t)dc!--K-)4IO0f1Q36FbM`NS_Z_Aifu|_KB#H-H}uU{0$XAQUL)yE6ec$&jN>g)dy|NRbrEjhz4>R=vz(Tdl8@y7re z@pE6WY!F4iz3q`$Pnl`!urL?xl?M z5Zl%WBBxX4?z^f@g{5@1Pef2Tov8Y?#>%L32zqq3tr5hbY*h|J*;)%^Wy?F5v$(b+ zN9Pz6LPzc02syliay-B1{Phs$o8k_K>LQ4oPG4bMB)5-hRB9BeRhT%fX{F)gMJhHW zx{o>nwx$z?n-x=fywp_=?>2?nJ~68Ms0;(!n?h}$7=?N#3%B+PWiG1ri3loJDOh6J zqTiReYpBat5c`aSxL9M)UR|%UHOe7kmV0{k%vxws5&7YgvN?9hiE1Mk&OV!_SJ%=c zgg$kcc0@%m5j{X*r~7V=scI^eN?>6sRYj!meGk$~pZC2@FYFvNMRX3D<`?P}5FpZ; zbc=X_&JRtx4A2N1nkJt-w*-c8oWQm|7(vwOxK|x4MC3kQQ0>ljSn=jXH7s{$JA4Kn zYR<>;xaStusO%F+i&R;YtRkA( zXF2`df5blKPd{(Udwbe%hH@8Ou4exF8D#uqDn~87_=LCRD9pOG4N2mKw_O;D2DX$0T&j9>;c|kae<}KDDrw$ zA$w?T%P6#7XL}0xc-W*AkS}f!>J(Qy?m3wU!UB0##Fx|{l$GA_5R~6`T^D!s!8{S^ z`W1zZl%7*2NY%Yp*HG=rOwI&oWnrkZET`nxjzSKMB8~{K&2ZSfSJO@j7T~U3=Ti^Y z@`3vh>L14-tHXZk9B2Z`<;6+_Iy$99VEceDmVmyO{(s%^)%Ks)2tl?7a!8Dy=ZKWL zgD5(f?`yrJ0SHz|77V15S;otw?rCekG93=D-PXerf$s@=j~gH~GzSV#vnFAfTd8%? z=q@OyZschmLFi)iAra=lMSa&FEgA~RCylo9V(0kvF-`L&Zswwx+$xKZ+`Q{jRq)AF z7GwDTu%Mxp(pW%^V;6NCkdGx+Z_;g|i;*%9d`|8ovy^^FRdpkSuv<7NrYszOjgJ2o zP5l(84}c*utV4jN~O4V zZ+3`5>$=oYijSvAE7@fAW1{0+!!)Xdi(cfgJC>4tV6QO&%vmts-4*$6e?vG6J2`Ee z6RIBsVf|>n< zX^ShtW%=Q|L1m7DzM@qt#Ow{S?pD``@xr~(3M05e)jts{@ogEs*2Cb8-Dfp+(epL7 z4>`1Zz~k&`(5SJrYf9s5!8P@iOiHFn+`fInL;i!7Xlrst-^Zp>w2_P9C2ZkDc8X3o zwB4aD?OqS)9L7TUShMBQcC&8^WP5jG%>uU%cx(vC{1IL@v|dtJK7YJv>h^?mukTHv z*R~}<$MhY6B`AV_IwK@;44RBEgc}pIUC<6M<~uK{3q+2~s(#(SkUtwvR^rMsFsMqiXwT)MK<_A8qFk)zkQT3>9Tsx9k>mYxueU+GLxV zsV&f1(M|)jb#(s+S;m0|gu^QAKc82(cbKPPGhqk1x)>qyKBI;5EDzoZd6CjuZVIYm znKg&T+lO@o%WVCHX-+Vh6P(>kiX!s^M0A4OK9NA?!)#XW*R#S@#Of=Apth|ER8H?~ zeJE_`2{_(_ZRu^F7>(?2hH~WgiSfw0*$lZGX1|-#oSP@kKt7;;aZnwsrx*E7pEw6u z{HY|(p~n>tKJG2s&D?d7HU6r}%CBu7O|f0v0H?c*v&W0!`sOr>jk%2DE>ZmwOVZI4 zFN+;iDySLPqqu!yJaW{#w_F~2_aQI%_*-Sz!G36qNKjpFpGeTm_2L+pQC+-TCnq~j z@i({&RPK+6%ddSRLGcy!c*Th{*D=Jg&@w=wKgD4iCmvxiU|TCmDHr z<@Pp(Y@Rp+dDrabsW}yMt~@as`M5R0iTLgQkTT6&fHnmo&gb@t1kGH4-K^T(<(?Qxzwp>*vN31rUZMwU^? z#Kt;!S2I6+7^4gaAopA(Be=a)$JR;jF}Xd9k|3D77=v0!eN?1Xu9}n{^9?dk`nWD} z)@)O*;@G=E%KbfgCwnF3|b| z+{KWM$QZHnO`RpZdLDYqa_n6&)smC&OWH))mF{!OSC=K*ef!5p@a@Str?pmNnxr#0Xjk9z4b z)bdUuUoli|O~{O=C-u@i`&wX5iX;$Ybeh#fjLu^#iHL6?aiiD8=5Vu&sjak5XkE^C z8Men4D4Y#;fx_8+M$#F$^Em5}{O~LY#Qk>>$^B_a(G)@?3@5p(8`ub2DQbCf4ALCtwaomU2L)Su>ZT7&Qj`MA0rcTzaAbyDJrd_0QE zk(+F*F@`vD`^0E#+!VOmejA+9>G8RJB7rQ$D26GMQlKttnnWlLs)+J4`cwiv!jbj_ zS%M?xi3Bn?$}Y&qM~dla%GUF-Z33Qga*v1kxFyOCa|9)so28#kwLQTEKKfWuRHqdN zcwWp7eqv=flX7xRT3MXjV~J&v0EBq43D6CW@h5l?Ar-2Lf-zD7Hi$$T2I#F+<59!Q zbpo~?%Yowzh$d_rQjyKMStLm1Dr?Hjag{Z=cRToM3EarCizlq^OWbgJG-36;G<9@h zDkU+8Y3iZca&yxQpAL4u75Qk=7nfXXI8g=HD4Cu$ka{xH-|BY4t7|Eci?fXF!K*)l zvHcEy?O6kkn&U$6Tb97Bhwe@5m)YdaSJ*9n8fMpXCg2du!pz8tL`!+bY6Or&_FjSX z;am|p)u}^64qr-&=cGBz@J+3*h8gF=ut8X10}|YxYlVv50Za$0O_RGh?kY^catrAl z9CMq5uBstEaRV3a%9`%`Sw{(Tn)MJ?NI8H)1DMPra;mS1u9a zLe`BbjD*5zyETdgs=j>yX820Xf#LGV=6`o0QH$1T^$jHD;A{`9{^Rt^X7iPKl0tLS zM#|B;T6-cq{K}O?a+>gCDQDH5QT{kIa<+b4 zjgGd6NVi4gs`&}BX`L$V31MD?n&C+7_UqyPXoZ%5{q`h{xd~X`@=>)uAmfEv5U^wb|B+e=gW+;y>a;BQ8%(9$FiOh&va>hV%W{T;9?&ebL zR~2P?w~>=fZzyX{9!MYdXfCm%TY}KAIwKwm<$2y4@?wr`dDP4a-|+Ol-he@c64E~z z_JO=%oJCL#vLmXq2qN0o7=K7xq@v*FvJKF5rFl`4dg^z;k+Xhc2vH^ft5NM~cJh+;2?(NnCY4AxN~5$dL$wvt)V>t1 z9o4B(uMty5Cb;%cxP29U&&j$g8sgru!^&t~h?x>!3BTLz8?Q|5*>lp-mwfU(Iz~ou ztoNc${wkQwWQ77YIGq%+yhj{^KD6%`NKmZKHjC!E+$`Ts8q=gS@-+?#ufnMuUkL>x zFsHb$CsQ(f)9kdb?ed)=g>}U3!GOkRS;1}1Q1$Bad{o+^kW3}H+ zZ*Dd(a{V(pDt-t+S2I_O(P&tN6wS3U5nI@S`$yIVzyi`(QpJ?zWZOb3_*zWP{AGh$ z8QBJ2QCHGIVcTjEu3cv@bja3ou&{jSn~fl-NB?NMR=E;YGGd+Ahbq$oN&vRw!^VYV zEDy(rol$f*K@UZE<-?F(>Ff!<-K|_KCMUL9KcYb4-e#KGWIbhr#NFUeO-+Gh{3V9T zL$++-)ZR85y(FVcdhn>l%?53AfN81anD-e9vCREMiXNtIj$mGb_90i1`d8FtV@?w| z@6zFl$+3@&!j;mAFHn-KzrEJOwU0z_IS<+zpBlq8L&0I1xNcYF)036uYj0czUtG9g z2KnLzWnRBjw-$+#G5P8`EY|(hm2H(mV)Dc1GfahEuQXm%R>iceCiC4rLI7&#P76Va zt{QAxMo z=ku`cKA#+_C>FQ5>Nn)xYRJjA&JnWr2Tj(pL8pnD%e?Lnd<2STuOTkJA~QB|v!7gXw! zXy1h%9F^+Dqt5Y*=YvAW)?kf~bo%J(v#lR;I8Z$Y>Aj-65fE}%mc_#npsAaj8A`6S zN66)VOn1=_LDldP*1Ndo$JPK1$>gIdtWxOMs)%spiv7V>wha-v65u$6S8KoLVn`FK zeQLFebJE<>3CF}U#nx$&wiF^KvAl;T!~vx#1vs8Wya%%d=xn7ebF&x{+i8i=4b?}^ zcXJBYXi8DYyS#1kSeKIN|qxot>eG~nY<8@P&f#}%E(9Ih}H#}y}s zZE51OBXChgziALl@!S%{mE{3$ww(U1ZExv)>YRDY0dDX$1Ff5f71R1oMt9n{74=8> zRBUd|?Lc+wzY8U-5E!c9;o#P>{>G@K^vJTq(P$zQ2CnOOIJqA|Q{se+SzeX+j|8mz z!1f0alFV|JIPTdZ?Oux>$r?^Qa0lDAOoF?oL)cTP)cYpmWlYmlN})wv3fkJRj!Lvl zvvN0;YfHTSu8>OJ`Qxw{Q7PC{JCA54!cm94EUgn%a<>yzfUuW{4&HRt0bKtPsNW$o zLN8fKAoKnYO3gV~ZJ8q4deb|U7_ybem;Zm>-mOWp8#xmsThy4^Y|Qp`A5&v`sA6wq zsEXZ`x<|V;Y*K2qsoBF3O|o7SWjQA!A|rztw~7;y7aAYxr|F;VexC!51K>Ci=VTRC zrV^VB9CyIsa5(&WzhMG@dv)51mw&sMM~6S4aQ?B046V%EE|`vZCj`|+9LpDuG~ac< z#GCeK*+H;nHG5EBx$2uy;Fgrj^=3-`C<}@mtNF|MeSo)!Lp{dXR5|bgcY%7LLf93mN+|aHdr?!gO*$1uWWv9(H$&II8i(0G8z1G!8WfJmk#jJlT)FP}x-l z&KPj}&E#}UJDd-j9p)49s?HAA6ol)tM#cXI-tB8bjtj5)P~FASW72$*whrXe{{==i zTW?BV9Z)H`!c6vAy?y9numXGfD^Px_K(s4Zbe4bI2Uu-a*EWOy{cg8e$8~^mO4u`| zxkr=RGKlV{%8YFp&N#W_eRZyGNCmR(Sm*Ev4O5xhU*55hRYPFc2j}t28@Qw zlG%IcHeF5Dj1F!<1?~$|Lcrg)_ATkku-%{v>i6Tl1n<$3XkOQ^}uFvlZ z!F5Q5B6j$YSz|Dv$83lEy{D~JsYjXGRb?#luzplxp9!~4i)Fy(WvLn^SJCs2&n!Z3ld zUfnGo(C4=@X&q9Tv`y={$*fIl=#Y1rB_N-+twrJ~=WaCXP6sZ&^&n(tca=%oyQtN9 z9v0Wm(9*s6RGzF)v(*%4q6%!rj`d$F-WqqcfszB~Y*uS6IYWL({CdwRV~g4i%z^VY z>aA)0y%enfwK8@4Hs0*M-|;Vd67|(3_}2F~tpK-mH57!6bTzS%C?y~V5R+n8j8$*jdtGXsgqGF3tyGafkJ2(u?BWR=atGXVo8uPVR`2j7*h%qp=ar^i>fv?@U=&288R zlp$XoH@@q=NfaGYnYT^xA&M-Lq7W>abR)~9Nnzr5x5(>)J+OSI9sH2W#BCYwYmADN zU3rIkLT(fb-L034*iM|!+I~~F8}Dc3?P=K__gC`+vs(L?LW>_KcV<-= zWg+3UTdg0Cim}dxl>pG(}aw+LVHw3klT|6G}_4Of-fZo&y%{kZ~n{GJWabM46nwJ1z$Y`sPtvrfGE-aJMnMBM4F=r#Hf@=Y z!1&ezBk0eS85b^}>Bz z4mZdOXBy{dI;hMR)xn0XLn^SJH|YVQ{UtcN|Eg|oprBr#4qI}C)F4Q;GjfLZ{;kZ~ z<_x_UDiqNn71%aKx<{`~>H&{ld(yC3qup^{(>~!ndTBUp{G`{tI*&cT>v@&;>}}Ln zVHPcy0M{{uYh?RGl9-SVrDgz~b!zPk+sBVN*gQC9AMqyk&(F1=wbIV#0a@Gy>ZS`mov}+oHzR zengEV_WkXZ&nPh~OxY!7t!AsOS(I7t?`Ohwh%011C-C|Yb2nj%#A8igwpmVUtHrg~ zGCJ^gv!t8S;n}7*H|_h?;^Dq#54NRJEn)#DNJ@}_@1#Ubh1j+xx|uhK+wU~dP-aPf za7km)bMjpmZmQ{2Ljr;rc8Q0>^tf)Pn^hZV5P?$~UzoQyOr&!O>FX|S!o+{(Uzk_h z(^W{1A)zBC&*ZA2`AGJ^0Pc_RS9jkAy!X}myEzL<2w0MS{O_m+20U2-8ij20fQw)b zFI^!8!T$EJJ0fOpdeb}#r7?mt#-Dt~whS|})!4sWQ}!A2@Vh_c1qt4D(A8G+Ea;p4 z^406l20*u|t?#4m(JN#L45+dF-=nW|F~Hxx<$Oy~IUGT_Cw0a+V!b+|n1NX=M|aZ( z-=HW%kG-WZRiC|IP`7>g2A`N5eu3TUKO#~wBs*%0A%wi2t`opIb9+a<=7%0q!6PTo zh3G7O;5%l$c)PCB#oo~y-0$pf+MS<36sA^xcloeb+@b2-i`mOJerz)L(cH*4Zp`Z_ zhw|zbax-y4C4T>>j=bbuCbQ4g@-r7zGUxB_ zH`DK%`$nn}L8!>RibZuNw7#Fl`RDyRrNIPOPQxlq$901YyZo49)F=2G3q_mRXETG@ z1&P7zFEIM$kNp4hm$)3>^{;W8FRSZVB937*6WQLaWwq3ZJu&c^A)oflQ%<8Y*{4k$Epl09>L8LkjLSQp%xU^)4 zl`_86i?3aVG441NbR2u?nmjOH_?o>52LG$8zd7~)hO!9=!+6)1N!W5@bDbfn$E!T} zCa*Hs;zxOE!ALl_*=VrT5G+bBB%Usohn=UF{M+Py*-#XYSdV`fo#a;Qt~QE;AVz#? z=IM*={&w>6jaodlWNa=0vet^-)-90 zlDglmPsm)XJohe49(a4&9lM|(PDM(~wX8?(YQ{EiWXyM$FDN~J#5SGwZtuq(!9c8l zgqL-RSS_AmAAR&6{g=#O2ID0ew%xqG--sq(U@`j=>8l>eY9iHx-nP|jvfa(0i4;{3 z+kkM>&RrOO?`%>{GS4R3q8xEJ`47bJOPqpzK<((BALuiC>|ZD)d~W=Y?jP{?u*8>* zZ}5Kco(ucsOEdc0-c|lZHIw~*ep8YO_QFETTEyzdk9!h66jAgcC0>~7C#((BAlLj4 z|MSa#5-F7PyB+eTpI^C_7o9zUHRaEul#fQ^TCCt^3z4}tv_9!QvV-&Y6y8?KXT+!yoR^99Z@i;QOFyG-2*yDR{`Q-1q;R&b_}^CRe>WFB_@w@ZtJSMJJ*kUFq>?dP-QPsi z6W`u6qyf@R+tS&+0K~rXDH){@sZLv$(ibe#kFtr={b}8zR{yQk=D^3?JpR>(DUWI} zm&um^j~wU2cCnsHSz_!z#(eY`L zKn`O@LB5t3;`PFXs0ZaEK&J8$#*Bg-b|tkzB#^_H0%ZHL+TYxK&6p zRT;5wLIJ-VuDyDf<7TX092uJ9R+y^I=OO>B1a-Ba-6FtHxhkLNUz*%1PoEM*<*QNi zL}4~D)LMHltJeVqs5U{R6d3O!e!W|5XWhk@fRx{AAnijspZjdJ za7ian=kudo(o836i+O5eyrgUQX&B?lnhPtNsk)%QFySCP@n5DlD5Q#n%qFjvrU%uA zx;<_Dl@y>RWRTx$#I^U!Nmd&q9stK(4WvC&qgY(B{_uN&s`f;k3C^CV{8pQ20i-mP zD}dy0<3VQO@W~FfCp5Gl4>GH`oPd#J!aVN79{3Xnsgz>4yuV+xRM zVMXa5yWzSDSG@f2D;(X;(~HkDAGRJU`>KMbf$h)8AdsoAQ1NvmCfg;dI<6DjhC+T} z-T|FalInwI--uJ6I)Lj=G(p+KMH@%s{0zW8#$N?)OGHf=?Hn`#u>Lfmk2bP#=78-- zGf3&4kOAHXh1gK)&b^B(@GeX$Y~gzOff>6JdlG=+KTn~q?Y8qKNtwzgX>$UrWya2_ z0G5yZe_b7pr)K@TKUC&wgFW1Gw%o03wqOCbhf@rxfE_|oPI0;0Ez$9UebF~@==Uds z_Ff*rQolm;nIxdY7miw>1pEFfZ{@DVo%BYu#i5kW=_+HyVDXlR-&G3fLngi&$YgF+lu*%F;0M?C)8K~=wr?I9P5b8=uh|kp%A7~}@Y$469dC^=x(ZmE z8UoR&_q;Saj_YQ8j6|lBfj}n+u#rNiPCDUMTg}&?N*>D|0 zm*!1#GC-cn8CniXj!a_Tffm zu9b=%c#e+EZ)D6rnIYs#X&d_W`m})S>v&t(M?w!{M$f$_n8?(Gj$J;kriX)-BCB(^ z-xpo^*gpR`$lGl*ov%WuEDm>mz-_9`7uzSs!)Bot3C+Wp3RP^UNU(HXolrm`F2t1} z2*WA}Y&I|7g-UemF3d?|3n|M2mrPp*Ot-D&Sl9iusSXVsA)~BZWXlxpX&6%>$_wms z-*jk~8%d@vDNJ{(J*n;KhcT7u+a`Zz>92S6R#y0A*G|N0Yn5=* z$v^k->|xg2G?40*soNYL{799VhcOlC@3pUpQ#s<tV=B`x zKu`QFHrH4>^02uFXIq8zVa({cw;PnEMVpsp4Z4o0K(|>kwoce|3D$`UY@6y(+tEkq zhw5PpV=B;X5#~(wQ8~IqG@>Q_>ac@-tpeAcb#QQ2=pDvXpxbwx5A7*4xf_rcrp?*V zep_!2$7Pf-(~*NUJ^14U_O{A|OPUa@$PGH3bq4ncG7?@I|9b_pP3WNII6|wpIe{L= zRG{1Q4wpb--r@HOWc$b@Dv&wrAyV9Ck1qPSFzv(b{2Df*q>Opa9`W0S>#`bIN9p^l6e>bf{_4s`LD(NpQLd>)Fu5nD=538}<+# znY$W-W&%~YZiy>nW7f*dY^rV+8+rL=*60L!7*m06tHE~0dIFrMZVquW{@oPLYh}yA zn99`c!_mv4PG-$trFL`$u1)ZuaaCp=##Er&Hu^n!1l0iJ=gDS0s|kG@a6gJfEVX*@ z@H1i|@SL(Bs{z<1NZX*yNoX8upN=r5LXZM<)q^Tj3Hnq8x-Ix)U8yj0@%6xyQ-N*I zJZKb^nTIhI==Oeg?qaPG6ZqQ&@c2$|6~Oki{acu6YH=V>4t?8jLf7?QVBhyMt|ex!1#j4^Sj4{k8G~!rX6WuYUdN z^(B3ptr=%#)5ORH6wvAe;t}KmR&T zB$R~AJJ0Qe4#iua5#wVRKEaUlN5fzPflW3j!_N7@&Z+$4;`p#T+&pveIyUR*a=Xtd83;*kCiT2E&ze$=9{w&*7TWI86RRuD) zR3h^Z3l#r8;5{(A`;p-~xT`VgVSCC4nroo|YD?j*E~-!xxrqgblJ!g6K*=w4(HbV6 zfyBAM!X+8TA`a9`q@pC!Pj}WnQmwozP`ltN(;t*C2io^igJI|WdyRT#y9_A~7{%m1D{tD?L;ZAUQ){@Z$ z`lM-|b;29+h71r;KrlCJ)YSK~EG{wduFs?P=AOfmEu%$O;8}BMr!Gu8KL>+0;;+tb z1U9Z9mYHaAqEu1Ud&fcO6O-{5S3_$ ztL_6ZwD*V4UYm;;%&)wU!kNhU^^32*c1dB>%Ul3p&a-D^k}QIv&X7qnxJ_;ksKR|f zT_RaT4&2V1bg^SsZL^(U?;az$Dog1FnK=RIKAQNCOp*=Sl^jPR2fq=a_!%S$4v2~4 z47rlc$V7PhuO_{0(`~pPqrR3exa+D~Xd@z@Bi?SCJ-kB4+6!V3t#I4dIhf&{i6`0Kpo&;K$^gFXV)IGydp`JHgE;gP@Q33eunc8mN zkuf#w60yc0mlC8DiwVoJ*0W~6z;h6)-G(u^xT<%Ejf?(e0%IAn#U%II7EJb8Q1c2+n-6oR3`@wf zi%Y&oT<#Gi801%8qWGhFFdKIB&lx5O&}a-t1-$7!gw*_SUw}rQ?UN`iC<>ChnRemt z*o3d7H7nwuCLZ+90qSG?RXeABMzhLg9Y`c+98ZVq-Tr_y=mJPPIDye48!4in+6V(| zzP!3Y<6-YuhUy$_88iy^>hKnR;AV>kx3n^aM_n@SZqO*$Xxh4mkNMuW;jv+Ng9@ZJ%&aj_yXv==xOEMr#{xDtKBVwi{LuWwsT-b-b zUrs4Zl|N0_dx$kAf@e^5s`i`BAK$LzNjP=x7w9YV@6i@n_&6ef&UNS+-tYH#7~g+B zVH+uw%}L3r&}?!Zp#GuPSa@@Xb;}Ph(cn>wH1iCmuG^+2!kHxww+mF4h5PvT-+%e{ z{B?I&9VLwx3)d)hohtABzPOPL`d&|Fsd5_iWX9%;(Mse^1e^Iy{A1tN67D=dAw7S$ z+sFBvLJwXte8anlXN*$ddTS~@s2TMqZf091fV&Z%&^ch6&_G2uQlwl2sJs9hbY3{f z|1Utb53ccCl>O7I7NGy(4_|!An>B;0`}b_POSt|kaGym5Po!zvWV6*xv+v*#&ty^8 zn~i)HdI9d4;~Tchw^LqR^Atj#NR+<%Bz@!D#QPw7B}y~yN;kktKhwRk?_XC;*v`A# ztkB+Janr!a=Oj&jrQ4E*su0{<0cJ8!_v3rdGl98(`T@mBYA|iFeQ4&Z6Y`AgnYv$V zP;H7j&xj2Z-Jnsswg%JoIz8SX(M7#Z!cV&I{KY+53wvZA(dFWJbj`nlDiBCY^=Kml zr21C|SJ}xvqH--?Iejrw5?KIcwcVeNC}#3>y=xA0LcMSb;>VDs%Ki3iSJ%xfE3+Pm zz}d?06KLj-1p6PI9a_PjIibP-<4&kItvgHHEoRr*-xQ!dPeY&z=-yMwfp+G@PXIn9 z!MM31b&qAU1mOP3lqevHaaUzN3Mf`?zk=^39T0hh^aY}{ppCtM7gE7?5V;^RV7u%x zQN5|T86cIp?DNWQ(W1a4*>+S3@yoPX?WR(dB{me~bG0QFLM;$H-px4BfPpgX@8ITa zOjv1PD;q3&^6C{rV&*4Qc8!#;fWVE=N{AH%_QNb{bHoko(S^mz+3Cpn^(x?pFdYev zauT~8GI3`IlxwIF+CCs5y0^=g4WtOaO{8!#IGTP3{K@z50{^YgZ|nUby1)gh96OZ0 z*vcD{id{s3{MgwVom6a+@?TN!OJQiQiIN}Tu99&P^jy&`@EroCW(B~!nDOq%|0UDT z0T;|S>VvxSR;lDcDa4`N^as+7iFfnQLE`7gBr2mb=SohgovXRFOwtw)!d>}ps#faS zJWNpoGotqggzqMC2EMII`uU5NrbZGWw$6RO-T%@Js?6OMe$BdV#owp< zS)AyX6Xk_@aI~pB#Z#At5~l5->!8ZC?PCe6Iyw_*G*t#wegw}{pbimC9T66$f*1c}t8Pn*v3Idxd+7m4ma~+@S?-jr{Rit?19Php| zRdh%NwmoSLI)wPm_?wsbH;~$hU9!`ebt`TDrp?cDAP>F`zZ+DUxD6k2b^WkF)Jv9o z72o?A;r~?0`dGqiZcY#V}@`o`s@$vz{$2w&$y=-kn z?*wsy*t9{Bu}QB&$w27Ts>^bKoHOT;X`x@Va=v|BVM$zXvY@$yE0HUFe&+TS&Ak*` zdwP*_##~Z+yQ<$6HdNPiYUA}3dDl>E3DhOJxJ+TAZLREPeW;Jkf=$SQ5?o(DeKCi4 ztT4Gv>Y}C{rf+H5Ig=FLe22wpzl8a35#^Jo6AvRQ6St2~c;!|YJdF8#H29F&Qv(mh z=nf2XV@1C!hySH1Taa0Cwc6lfFs=;zHkIFMhu#+H)QG_ay>#+~=-r?SRcvm7xNCRo z1v_E}D{2QD*7GmjfckY;fZbh3HtY|06{!U{nfsut$hJR#E>Lg5$TOdjt+^W5c^DG1GR{ACB zkP2-3go<0G0+?pH33}gD02dyCW=r>M+H#QWrtYf57B0>86Oz=A=)^1Q&s14QlS=P( z1#Z*3(|o#Uux{dq`z}4Grux`yDD__rGd&nnx+l}fg*sP=Vy;m9*)KNci*9zi`Fe5Y zacocC@QsVQ8TrOt@VdCN=W7>6n|tX#1nj5dDv3wd4Yj%DhS6wJ)WC8`F<7h{@o(%J z38&?|=er%m1hIg-MKacO9}R%E66@S8T`04#p7=*NQ#IvJ{;iq(@b9<;47m1D_YMwl zcb>9`>i|0U^sqo=54)G@lt1b_Zf#9aRD@1j>-xp=4YJ;y=Au5Z?-7*HEEq+%ZZKOg zye7oVgVwXtT>AADBFF2m9D}8E_>ZqY|79gI{k`G;aDTlT0N-Zq{cNxP;f`ZE`qQ*D z+fVmsq0TN$=t{NO`CP;NZnJkbi-Zd8Zn2Nk1_6M#=!Jv|qOZ+Xz`C^~rrsgQr~Z4F z*C7m_&;5fS_!nm|G7$`BPEs*2C)`()o8|g|#@)z6m)r&y5n-HJ8$+iQg>F<78X?an z{Lan&?h=Edvzt@tCBE!?IRgmVRJ#jL7Q$PJ(kzT2nh$k#$U@YszN833JC*~Yb-QE` zFDi1^s!c27C{u?GyYc%kzxZ;!!c$mor!><9<8mZtoXnK50d&aRA${aA9cuKY_`w!dat!Xkd}E=JWn4=gmfAu&JQYlW@OzXbuY=I|q9DkFZA| zK8XUvyzK|0dBN2vni<-I&e|!`i2m)>K0Z~q{tSww zk!658MSUhUhY!Fpm|jV8UT<5lLCg8wREyIY?Q#-{f1!Ms1kLTnm%~g;>R?u4STrYv22tk;lh=FnUVriO3^pE`CH%M*&)ekfxs4 zi)HEYyLr@*DFN$$t$|Hen|!$i>RTSZ<7+T8`Z7Pl5*%BEL%iomeex2qs z$~N{EIW4+V&}F46i90nq&nMB9+ENimHac(}wBvNMK+4v<&9YMz+FvTN@Y|D`@ z(JK;}Vak$L)D0<2dFa-;5Y5eOifZ9Ee5xf^z0Pwe*M^fs<=t^EB4Pqqm34Knp{q!c zEFD>{*P-l*%QYIG+8z?gLL9HMM49&PS_@tMm>v%E9MTKG^JGuq8n)Q@8TX!ezi@9 z`kfQ9_z^X-*tY}g`mMI5+rj@@14~`Be>+HjmA8w{>1x?@#7L&hUnff#e6R@_-zk-C zYWOT0xpM3c^doAZ?E|PqmI_nWpCLLmdssJ6r(A%GvKc7N75P{bQn0E9ey+{8ATixD zFUj!|j-$AccB(G>i@DUK@x@0U{TcQv*4pfQ&Lw$u7Dg!}$lLRPLbxu)>#CX050|r> zr3koO8MMLX*QbEx#UwJgyFY1$GUcWXc7Dyw!S2!shE^)W{BbgGU@zOgn7k^$wa>Hh z!s9g%o?iFOdWjuC9S3kQ?^AQm&xGyzwV^-+?vNsETY#>%5EceGz!h?bZWj;j^f0^R zKg}thx$J}pIKJ!Ys`>0SQiQgr$1J1gzh-P^L&Suf=3_#{uhFAChiJ<))IT^d8kLV3 ziOv%fDmjUc@t3y)yh5n~n0bVbdaLfuR5& zn+33equ9Fa39Hz#iP6i^b7aP3HAj!6SS{aUvH{{|wtz669uF%j5;cgQgTVb8gGPY+ z{q_o#891jcievPOnFeHja3%FkFVuqE#JggNdYEvo2Sy3NF*iq+>7HSi5ew!U$+v8O zC0n!ycT6ay7-;SiPLzG6hwYDlLKW7{V!D0o8MrH-u(`YYEZ4kZXlKWZsJsgXiIaz z&tP-j=@m9t6SVFCC)KA;kccv8eZR8LC)g>wZxo`^+lB}jk$In$r{8-Mqt? z3iJz;F;XXxNNus{;@twf0s0^Ju11};$_!g-U+-4i8CNW&(E+l{c@hRxBr(zyj)&gvWCN zT1qUqUn`&o9UUe18fE(yTZs~_fV2|^Mb*P41`CLL@h49P#So3EV6b0e?r@S-Labs! z5M;)nDK}F8&1MkFDuqMj8!Hfc`qO+I z5{;-pw;vAC^o`R4;KQcQ$fW*d+1}5t__w<*NpaVbsy)F#bdMzD%9L$_uzKkBDU0_@SEi1v9fcM@>05_n z6FO~O2a5R=ZX?ssX?r?Rw*y%+*HA;RHp>lO&r(h|lFP1ynhu(-+IA!1#*hIQ&VWNB zjxOZGAUSQC`A?1{UdjLd&sd3p#AYp&xN5FhxJw!d&LZ=+M4HmVdq5S-x#-05&(O3) zc3y3FYT~sOpB`|DA*KavdxO*r=cnMH%lTwGTkUUIog9C1Ta~S88vX=IuHa9=RkmEC z55#Aad)a9#8cCUo(yXsS1am|J7xfBJH*(6SDuRF+bhId!}R9P^LLkeuHW?|8ti=zhF{)L=DaK6nL2asUY~{Btr@i2 zfPjKK+5p!&0mGtQ)+)aVwifs?Z6!s;N>07Tn9O61`7o$ zlhzu}g!9%H5w@3_Q-v+RZ|)n>DZX!9XNr6oHfN3p-!^h_<=`(cz5c0vd)ghFQ1ghQ zFAyk5ylL}BhJAPWg6i*&%fs%p$Iy3OV2+Z=mYoI56dw-(TNpFfmLaYe%ObX#=7Pe0 zYzI)073>VIN_!Grn!Pl5oleiJtP~Eh0r1hwBv!@gl45ht+!B zOdeelmoHHxo0K1SdnJL+ruy_n47RRF>f(thhfyxdxkBPYp%<0o(15>zHO8B(| zv|y|9k&=noT0qmRLAF4RNaRYmVSc`P(dm3`JN{!9#30P3Q1@?L?JpUWfmLR+$>4lp zL6h&G!cHx}K_*x+hYHnxBE#x|0G}w7F@ZbtKiA;e%y0w0{%hD=I;(vGSbweow#k59 zX;%fP^4n>(t3kD=ixOF@`Fa~gwPEFPm^8VC-A9oaNSE`AP=_9Er z^XAPgVYE{Bb&pn}i098bGb%-FUxilDy>bzUS#%lo9v$JeQqk}M>s^-&rWowKq@xB* zjo?%b&*XhB{RkjH#f_swBudi+eMSWkGjOhq7G9n@TU*k(K!hlE%7F$Qe2BtVI7?68 zE{?CF_kOOg*|QDn58IOC253dgp->mhla_n;i$Hit2t8U`H&gX8IDvwBDSYynfr` z)uBuq4st(N;M-GoOj!nvq_V5!_HgD7}S7P~+#V>C@b?Y~HY4TrUngWPZC8>(S)avjmMG1Iv@w;7VET?IBsBpP5Ahy6ie zuiD*sW*3tcnI=3G5}N3|Ijll=Tei?}SLR1i<>yGChj^%fwwc{+X&E@h7BVHlG)Y=P zPH$S=o!WC1HEL$BtSg4kW+m1W%24%`sL!1l*{sLO=1A9#OWu_=9PzLUiR?oa74c-C zq#f~;$f8~*oGf>0D=*vV@&`aD9CI{A2GiTeIVo8YIS%Uh6!&` zPirn=nrAoD1_=?B@pb|dKUaur^ESMox2x2A66Q;TkNmEAx3Hi1{&6{P59E%%1fY>Ad}eS-_P1v7Sk&)eh3?>^(?=Ccj-EF8=I>ye*5ri%@~R< zd-5D{H(_M!(TXco(QZ$^lZyr5cDuctcg6!3)oc3o@4x>0ucVc(L74i?RSOe9*^zR< zY0CH6=4GxQ^EP#0k*RlDH+-O0=4?NYx?n2TXdi((*p_ebN3FZ z0Jg*ZwLB#I$ZC>S2P;*=`;iIGEMlq%dV(^ z9>XK(7XLKReqrxn>8g}y-PPOa{bmlgXO;Qve5~$W(aYu*c_misTh_^YK-*|I&yZWf zdIw0lF&%!kEN9jPMM>vZ4(y$!PXIXOqrlGPiOq%DFm`t>DP{6VmylC+g)dO-r^WeM zpyw^>Ex!Ej@-8g|p(4eeyASw?<{k(`N4v&@;D5VtLGL`t?P<0!G(6d1?zrKm%iV6d zUMvvAa4Tf*Ih}Rx_8ICu)de{3AOgp)2OQ1SdOp9t{ItUAFYPCW_YS|^EaPsn@%$4P z@r&)tHyms7&0zBIe8d5{oBi_D>(A)g&O%po1N0_+Hiqr}3fZ3nFxdRl=lu&Vftz6P zKF)BF|83nd80Z6KoRv2!GB|x`R>xniZcg@@Jp)%lZ#y{w0eW~~p!M)3P62CZ!FkS8M+h)GW;40VHI?e-a;hlycyvUO~dvqbzA`m#pL)Fu& zP%p5n{nMI8-U%Q2$U6-nv_tQd4+mcxp{Nz=YVdZ&-|vwbX9Qg-XnVr0D}lO+L+AiO zYDM6KNy$$<<;$CjU3gS!s^k5gJci0%YJ#ccv61IVcYUNTtLZO@8*kN zk_Msz_#MmP4W?}Z89;ychxrPRROFn$FXXUmq%Zz%_MhRvS%HJPYlA19gKi&03#~B3 z^FVJm8_vA>l~pqI{bmg>E+C&_V_Qn}L)T~3D#9L6J%c4`7*!*I=j>T@E zch>x{no8S`EBvny5Re_F&h31JrZL^GPjJ!00eHBvp3*Mq$yM_8_R&PPvZbK6W(c z;D>A~nMD1w(pQ>KwumD6xgP>kYWa!HXNtNIcaHrcn7PhtyJx7w;aP|{&gB*nxKZYb z7-zixE5E%)0{|HtQ$y2FROH&H69t=H>}6NoF9shM4#d!C5jlAKsWikg>2SDav`G&z zL&W^bJX7EZaAdXET967pdQQHejuEdZS8a!Ec4t$$Wr@Yv0Xg*XHsmnvZP0LY)XLOH zLpI~@cUv^2%8O;@&?#B_GN*I9XFyqO4Yr4SC<4*e=0L}h;bAqKqw0i|0>U6MIW zTikO_EQb*nIc%CEW9DVwaZi>(!us2DCx=14P_6Wj7~ zb=<8Hh*T^Sr?SNsTdCXVoffx!KA$ona~Yf z;TT(ZZB|U@b9Y@90+P@_8CSt#(|-eceer565?y2vI5&G<3xoagaCQyK_DxICSYN1NwgW$3@dZ9 zscTj-4De}n@l_0+6}keyKwWt8*#tF<2}v-(ONL;5Kdypd=#||U$Xv(JJ+#$SL{6m! zuw(`Nm7SZAglRSyRSvXU=%@`0wkHH@Ky9*b6)wULrI~7FwH#MOc4;(41Xe_MjR9y{ zBpk&rn_QsTd#-4*WUho_x)6@3Vfa7`Va`|$jcvF&ZPr&&iCmknFlcf*uAnrp%*+Yh z5}U6!c#CY~kfuN-7cKQQ?#FMLQk&$w4ciA_XqN8@R`X5_E0moMgP6%rC|caq^l|$^ z7(!~ZSyT67V?+F2InOrC{vG1xsW9>T2ZxCl{b-oMeI{!UrcG&U&VR%23iI827*6@J z4Z#*JtY}h+D^hN=)iT2{dlAEjkjJk1&ZnWajA=d{jNre;2-qlwuBqSsp%Ry)PfYvl zch6&-$E;mmhik{~7eJ&9^JFp3EN3pqKAl=eb+hv>bFNx;!`YO+adlP^Oy-5L1bgA% zFs#4lHopfxqIMN_+WVJ8qny5IU%tVx&t5A-{RF^2|78WZE$6Ab(+J0ZM!vnU4o4%H zDrjZlNS0yROm0y&2MHDh53o(7AQYHkFJU_#xBjYAT$gg7L|P9a;-4n$J23NQo&Dz#Bn1t$?xys_R+G9;`U1S-_bkdGq$um+7Q&2i zgP@Sa54!^z%Pnt@NPoul{v>AXRf6{ zWX@Kv3IyHn*7pS>+x*sxzKH>IPp2;W27wZ#-LrWj4ZjIc8GiGRzx;Cgk6-=v*PmPQ zH_8*#tooeh!ch%gb63Co?BsuGwl*1>y^9DAHWLvR&fbH@y6#ua!tw;xt3|oty&$ui zQV6fiA=}QT#~Xw~YqDiB-_2?;zVz0vE2aD_4Hd3h7a}_6_dpp`hcl z6L03c_nQft2*A2uowt2gWo^s@VTAK^BOhS+K?9CG+Myu8Hrq$#Jo_Gh#H=b)=g(-s zhWw=(X>84j{tR|ZOsp`0@U+7C5zx@2g=98yCA@tQ(?)<%SPWt(yj~*#v+Fk)nJAM= z5Kg6k6vHz@o}<(^mh;W@Pye)7?AtF74a$FSm+}Y_n5u9nOuKLu&5H;rLrYG|rRYux zI6@pn7>ec$tD}iyuy_`Sq#02m&nw>!R+R%?f_>h50yTN9tE9eJpu$Ackw@=Yg>9c9 zl;fEwz@q)$0bkZ^;sj9+9C3%c!7^Q6V$T)j+;1d)&H^7tZp<^08$ zX8%Yth67$DRE3OvUEOV);DQldn&`O?D!AT*a6Vw?{CduasAS?ec(e6liqKzphhiIT zP9*yf`XiRV-4hgg4BbB~wE4BU4|kBE%^HPq>dhTvl%lG2-&If!C6&{tzTVAGs9~2k zs2fJAE;36^!fDcFXRle_&Prv#^lXfqce~lGkr5)-WrY|vZ%UN+0R<^}6Nyp8Jx+z- z)FqsuL=4$}ScF5hH=Vd`Rm}7i-u+PJGdxu8(}5K{wztYvO2Q+l-$yYlhiGIRq`HiY zPer~QTb5&kdo`01_-=qi!<~{yupGX9>c~K-=LX4?^ioVvxEQ7B4xNt>&{Cn)g?Z}I zSQfb@L~jIfG)U>QVw93zME0{qqLidqp|QcBzC72%S2Y% zO%25JiMyM@W`|-Ca|CFcZYO1Tn?Lwc&x_$EOK`z43{onjrz?D0hn9fe9bCF7Oce?M zr3etevYWO0Vt|Pvuw_DopnO&tFU&X@7x!G@KwBoD1_#{pY>spbgRFaPm@*+9SixiO zcgW1Gp}0ld^#giV!+29YuXbcH6GM=@dF5KCB8nS?QHUPYnL%n64_=4xt?LJ$5W=V z3caV@z|pHPtvtyp{D^YHTwR4tCS*LrCX?9)5(F+T(T^Ly-|1PZP%0f*p_IKH+1=3v zE~kreH_Z8~!={#=IUWz2soJ6E&VIG~tKe$2VN=-Zws>LgMpnpGM?`DK{CdvSNR&c) z-gyr7c5)*th~D$Or)Jg)9$VE)o?qfP&NK(-Odk0BvQ?nNV!3!!?Zn_Phr($usE&rg zm1Wpcoot*Gj|%MTfO|HFmed9AK*Oh&Pcxk!cAG|QA3y`0ghG^Q6c4K`z-BCUiopC* zFmUlAi7SBMi{)umLGBRrhe<|?c6l%&JnyP7?c~C2HW#H z44}RXG1L59JH|{&bY@orTxYmKuawDOPo*xFYoG!9`>p9g89Z}xKnTeK@1Q((GhaVG z(!pIQTcwrOLj&tIGhjqabumU&n_Fhoss~XG(oReti|N7hA zmFLJq6C{RO4u3VfCUg{aH4yQ-A*3OZ#cBi5_U!? zT`Z2-s7_G%5T^?aL5IZxLJ<+bPoUZaKBf&i|G57UF&<-+KE~gHhm&VFZ~@YMW@sgZ z#&%TdfdxNyTdzmPRzJ6k6Mawpu&3aJOarU@c<+=|*BAZH{PSUOygk8RecBXo*hWVu zc02D)LLe!xg^;j2_^qe6QX}GBpFnmhwD);|KgjP}cqyE8jr_F z2}6)6!xn_!=wm{0Su^fKV-#)a$w#wmH6E-d3GmHq2d#0&HWNX&z&0vD6u3QWr^4HS zU1XaWZfbySO828ll1by|$?fjQ6H|k29~qw>hY**jKU@OdjhJ#o4ZO{PK4v5-K9d~x zq`b{qM9W2AviZQT245HPra}~1k>%}wd$Z1_ywlfeZSk_F9UD7_AOxvZhtv| zebGZb{+ z9`l<~aOlnWg&*^+dkjQ4^fIXPY(0(zMb=U$Ve42-L>1Ny^75@NZJwi+NyLrr9`66tS5!4AOSx+uGTW`fpK zGJ&&!1rMQoET|Rk(>}J%YT`##7Gf(j60cdNlP>_I7U&9i`+OHX*2xmWn9oZtYbBU1 zcH8@{m_ZD&t6U2O7-o_d?{Gv|?st`C*s7W7cTE-%{I11l5M6|gVZK-&5#9!ljI`|z z1GMdK1P=JYszag}Y^$)gj@9O}vgzu3O)%-mavwIuWN&&JG9H{X0S8?gUoB|Zfmw3G ziikBiV)HGP)zp)ffRAeNab#t~ZJrX(;`(t`L4otgQ4=3qQ$bPK@hz%>v~SO2U=Bai z{VN!rEo-?I!)5K?j1pL6Fnja8Xd583Y|?40a~Xq1Ir{=l71DifuE|M!If``6uC@pi z@F@`XlKclS=F7+mLVHR0KGnUbL{C`ue3iZSv$C%xq_f8FNdkAyJGR+VZv?$Nj+=ePM))szbMn!&F>*g? z-U-Ix4Klco_fu5iVooof+w`s!-p4j|!lRqkzu-n$x;PcsQ+GQQvXYlP8sI#cX0rDO z?0ro+Dgxf#+*LbkS2+tOh_j>r;)Q%N2lvYVIIVUs(Lk)F zi`Zo+4wE@1Bi9gLe(FGwM(%l0G*m76SE-`u{5mFVKdc1XE;t(b)?L_I&%+*Yd3OK{TZ*02mBWaHwk0FZ&sxOjdrj(y=!I#I8Nc0=?io^fKid9 zfkKYQ+%5mN-)+@w>(fuIL;*oJeP$bMCL-V3#`Xg1^lf8y7h%vv=qKP?*a9`Z$#SSF zcrGX;a0Lpuht&)rC+OQmllwK_4#}h838BN8k=B2Ml`q`=RY6;}uML*`hB>z}FAND^RUAUq>1YUE8M@Qy{#+Z?uiUZd&59UH1F8c4X5 zUMgCSgl_<20nKu?Yx`lpf+dJg-}n!UY2o#XD+Q~zqhvbs+)csW9uN_B+Dy=j@c}0J zh(bA7J7U&3extnk_1r#)y$RvH@bmcDkkxo@+!mp%zJcQ>7jmH>9#C z`=BcxU%R`8;p_!6;4YLoo9h^S7uwv-ZnVc88UvfbW`PmnY&HF)LNnWq#S;$)V!uq8 zxS1qIaxps{R>vn1X)^S?%aCyUu4}%nFGE|D1visSzk6yOPlxNB#NqOBuG0tDT>arI z)t!&n2e8J0+_^mn{;QOis5q?ASCiJI!c){1V?c%@pC!AJ@x;pzpLg$m{_c`alV9i> zFjCbAB@N?R`)hy<3{QPd=)Ga#KTmol%zL0DHzNQVyM9C;qE+a9-6~qy0}^KF9fBtGhj4RY-m?gn)e~-lP?MG zZf`eYslb=Yc?!W^a-mnf%#j#)d-^f#8Rz=hlK~A3$s9uxC$<3AJmgBDicEX_?iV-g z`=gWOCtM~^8~@nWDz`7mJrb-v5FE+s(`mI^)7xC6qjuF z&h8Yr1IOHA7ZFLwVX4R*zDDqjS4<+zL6nf7`xY!_WFB z4%+e3@UWGibR+EB)hp_V>O+PL9)W6L?Qq~k_=FEvX2h~k4#ELV4)i{Q107uOsHx$2 zY0}8ALn1KGqF}OW4TY`hSWTH@W-2yj&Y8(xL7_2o8AH^ZImckL>mOYJ-`CO^H|rL7 z0jkQINwQ;nyjmqcrhYI6VUqlq;g|-?Dbb?z!r^N$HU>hLQ<@}}WnIe)le1t=MtBA6 zIM91KDUu-BKea3LT1F>C|38St2kzus^Sot99}=H3GG#kzqfxXjgNLy%M1nFXIvcNv zFY%&6(IMD&n5>JvZcxiUXqf<_H-(;V`>i&=TWvIq-p6T6QC4{h2$_hC=}A)#^#xbh z4mf`FD=uAxtsgS)$2InfVhF>6LUCV+f3EDi%dA4DBGCoet_nxHc@*a&7{sbTsliSy zUb%9Hp-B7uKR~uvMX-$l!Sx6Gdq<|gvfismgtT(RWXiee%w8v4+SQTpmr*qD_koM* zfznW_t+W=dZ>u_o5{qh>yQ8%q!+IekOl9up>_r*i88THs<<$-R#>gkB03J&0+{oO5 zWi2bS66Kk2dwB}a-9$Iv`&($dsQujUJDJ0^HPbveGcsEX#i^V-RQBv_d*K6$_SBjp_ z%?ZWc`Gq%~C|T4*W^cQSl@7ctfZOhW(tl2zPL)B|1r$W1l>h4$Z@bWaPK|sUx~8!Z zRK^1Dz3bj?G#~KKnVl8F=&?v&@6+w(ySy8c62`t~8HUzNNJw}mW76gbXF>8LSK8RZ zHmGHJh;*4*%{8MO$EFD$~Qk~W1;j&W@P+s$NS5hr4g@o^q49a;$w84*R&FXAGLU()8)H`Rcd-^6hV3`M}&zuAuqP z{;dfF4PS}vAMS58u{Q~V&;x2(z*1{L4_$($cG~G_nq3M3bV7eqO{*!Di_GX8(CxBI0eA&5? z%BEu_lFg`mF8S_0bBmvxjTFXtShf}%Xj$nMh5cCTztOuzcn5tHERVZ9+UZ;$w%_Kk z%si~_?$9ALkChLY9N+3dM#@h>(+VbAA#m2%$i6NJsBJj=I{K_m7AR@9K)G{vV2lvt z8VCP9n7#uTo?(U)w16;!0Rw{il(f3b!Pvat@nq6;D?t;+w3WtNy0yER5rXB^|2m*5rap+hUnu;sXC z+o!gd;}bB2Ru9NtmttvC+WRY*>^(8ma6us+oCTr`{u%%88{}HTx;op<7hMs}cU^l1 zCDhOr5HcJiDLq4Ha0^cDd~0N#*H$ndVRK34Q+Ko%=h zHqlzNsL7NmL89tNj_7)xAj$7?8;P+qyc9w$1FUGao$WX6dOiQ__1{vrjVs<@sNzwr z&BhaG-U${mevrfF)-bpTatP!4n`5Inw;U7&U%%#SkN;zSoiFFz(B<6BclqAPateEc z;g_FQcV`q+%MR(iVp5JwP4W4Dq~oN*4i!5rL~&;M6=Tab>op>eTzT>IUnBdwnHZcg zo1ft?PmVI%he7c8tH1s=%?kLFBe3^nzkb^6pf+Z9ybAyjdii_Ck3!4X9Rkk4$sUQ4 zNwo@l6_Og634mY=FeDAfd*eucCJP8qBR}WjDguljhhUGsPGeSp@dX67ruxI;`Y>t< z*USAl4DK~GVh#MDum*bxk3fqfdhjcyE%{j4qFu&K14 zBPnjgA~?RV2phrSw(o$cZ3D*_5PTqBJ*1*T}fJ`-dOyw@7s!T?!vreYyq1tC)>do9}K0x$MQQP_5%;1MNLuA0RTAqA41%0W36cLW@yqUT|U}TJ{AhNHi?!lj!#1lMWOfZRC z^*5A;Jh=V+kzh+H-r>xN2?F`=H_Z&Lfv0J)Q9vDmi(cvs;RyoQDB6e8PC2MXsiDW5 zwvF)aZjY|c|(m`*$Wdbjn|NvbA(06OF!d0_xkS!O-|_G*jQ#} zUENswY*UmxDlF}*xGY{+gdmYPei`!F zYxq7fG(wQeHd}dsO~mbloS$>b11xeQ)CU{3G6QhkU2H zLvB&V@YiB<(?X&cn;U#=MbWIET|>nW5>(ji9F@HnL6N(NSAx*pRRiDg3R#lJ+bOKI z_Y%e!tw8lqPOE?5X$rhTfePfQqIl4azq~}HLr^nRx(($f^xG9|yL>6l4o~~z?oOkI zsC4l!l~(?--?^57@-H#kg`IZ>N*M%EiUO zwPvNMI^!zEU~hJF-`w^pGhc8OibJ{A{c|cGWGHku?C9jKTxn*Rsi9%r()>-WXzZ1k zQPx!y49hO8#74o0r{1%@hC)6Vh2rMnG!BJ)FbaixFpSs>`JjNpzLVV1*eo}_i0c}) z7EM1fDHB0}wum~r(gcC+e#3?uYJdQl zbJC9ioj$W%_ofPH+fDYs8VhsS>dbudcqt-Cb$F%5$yh2msTuY8bUDYtOf#5D!ITna z?Lgn|*Q-4uW4GvRvOb}rLk+ae`!xGW2|0-@75FMJm%H6^y_oP4xzDf1{49syqan0bCa>rKIc-|&d>48aZtkXN=|9T%S=8WTkiw_V@qcm1<4%Kp!jA57cVCq&2M!tbij%;BfzD&7!i z-#Izhmcq}2odXQ_J&YU91H{_s%j2EY2Q_Re1L-AVm14?If` zz~s8o-Ciz`&O+9m;tP*KWs_c$_Vdb@p2^fm6Ny8n1r^*fawOzMH!d!i+s{1_1Uw=x zVWU~2Qp^SpC8=6^q$|s>B0nCs#p(LAxn3`>7mNIDB6#GUaCTU&3K2d~T~ha>PA%^y z8$m7ih1bAxYS~*NG|HvniMsz9=BExy!WA))vAKdI5UMT^|s~{PV&(?9+&)AJG5^ zj>8eB(M5O{@Yp+li*Owz7>+>Vz9=BE3AULdaAXXQ%^cb2|D%AzUI=Rd?M59&_r-q( z67~2DJMo*{5y_~d$R%HlTM6T|#*s_D7=;88Z8zig#C<6Q0<-RB&u^$avgj0-=@K1Z141Zb-k2i-Bq0YQO!v?q) zsMh_!b76M(_Ov^ka-+HKvHgx_;$aB=%f^A0i7+gOuMbT zN5v8m*=-L?s9C5iVH!R4J!7a|*;r z#FnLFrusiFnbmGS8*B?Pll8Ego6rH0bCFmM{4zx|9MoBuBEc0}+5PUsQl_!xDSt59 zGR3l81~hFKGNKhWt`Sw)P9uZOPlE>8`6xeLL33fg<537cDm&h-Bk#)T%l*~J#h5U| zP=H9uELO{%dv@YHU#D8n{_}tz4=CX^X;FN97S|KV)i~S4A%aCZRGCn3R&&^k z?G-MWMZ1Ah>FsH8im|AjL(gB~5gOhJN%XAjgc=;(vp_37?9l0f&1zvhd-(=5?~G?k zESqszo)ty^cbolcjlyTLq6Cev-wG2W+yy$Wf~Fv~cGoc6WUUwy%7tcs`$t#q1|?!{ zta83eIXghb^V^SH1wRZ)r?)v%qyLw)AdG>v|U$m=b z@4gHxH113Hg_#qss0Qy>4UgY1s(wgFGH*?LNv7BC^<8coiM?t#74 zR0?PW73H8)WfL@h3?0kU&1P~7uNp4I0-EtO5)spEam%o{#da}S?C*9DR=+Z(k!_(Y z#`GqO$u0#rKTvBefBDsE*6hvP`YIatNr7he)}R9o9Ope#Xbp}3WE2{to1-fJ+gx1M z(D+YAp}B2P*6y+A0;!?#pA^v8vfrg~j#_+)ewN6)+2_U+-5C2#U>V4&I1W3* zLZ&$EbNP(Te|v&(>e+$nXtbPJW+$ty#(z@S7JD@)WVv8$;}|sVlTm2E4+t&k*%hm+ zao>zWqcyRbgn zAkDJxC4+QzZO|)VD=XmoDc1J(w3?Uj*+vR?kV9CUEQc@b-t&WTapC##uK)btm;F1> zr7d=9b$Az0=jD$Re1nRbd$w+FkF2(p7sXayux)z!Qey;iX49)Z(vV?zhY9zWVQcSd zzK)`EIZz)?xvl$i*L0$9?AEo|ceiDT7CT!Zh_>Gb>Sve~-)oBJjN?XtGlh3~Ixe;V zhxkou_F~6DiRPnOe_4U^o!{T_ADZjy)nmURh2YY6n;SGm;`8FLZPw)i4~ok^m|dQB z9iQw^H@H&MSn=7VR31K?!7jO8p^zqGa~KeUc+`mNxI8DpF%rG44yZ^x2_HlzN`3Px zI-9q<_na1-79#R^^7t?tv$>y~w!0g&guH!G-Fhv0AVOIG-cexWdIeHWNTa9;l;&CCt{=xcgTFM+O?qc1&+-q zSY6li-a!GO^wUzQJ z_lRm;n)2$iT~Un?Wwy~_%wypt$A^X9BUA?ZSP&fzi95SRYEZ-*lxOZXSKgTJpU@=t zelZXKgV*`~DRJ9e;4}WQ%SZjuUDRK@D5A$FG7ka#N9S=eg%y4i68%B{v(^AU0w|IO~L=pf1VQsL?@*8Djlf z8R3-xngxz`3!R3KvODAqsvAu1`gG`d{i>++qXH_M?^VIeA0$;w2jA4c zrgrSruCAd9AB{o<3n#i)q8Z1SRfUfVs6HJ1Q0&N?EdldgcYc*ADB$`s&`cz%(M}SH z*!!}uARCRl2D2wZ4UK#-X?t#MT@7Vae>H{2Tn!OaO>_aoc`mHSX1hbvx?q(tybwMb zhw9j%bmO7W_NHJxI_O6QRJIynWHr=C_q2DZ^7)HL_sC`i7alr<6;6npli<(^y4#m` z$X<&PI2D`xr}y)HbK-?0|KrLPD~Swys@~Br!aw6*9f5S#6Nk?g!!4+!d)~97iV@ll z_V+e_RVhaMc{*Qj#7+(;d)9D8hzXbstqn!aA?he54LU77wo>vrlmL z2Ngp^Uo9RWETD>*Qr4DBF47xC2-$0|LnS(A=X6NS&259)wH$xR8jL2c zGfEPt67;Yy2b7A*S>C>zf{BUhbM&y0w;CD3l^dWj3Bi24DOTHMJ3o{(Xl1}xm~LO9 zyZ?gVc-SjQ4bO$9xn65Q`){WFrhVGR)!%ca%+{mba|&SkZmB?2?bXx&C7>|pswp%YMj z@zvM45K zpWdBF{fvO!S00(tu8u6~(wXg64H>(3`Z#U3vK*N$s6rWyT-B)I3LoWnbA4e_#`=mm zUSp8SSK$6t9^`Tc8M@UU4`}<^Q>bez1HbsMGSxAhW5+#F__0#q^$#H7bUW#!=Dt)+H3HBnJv2NVv)7{ zX8`;${;I4RV2>9Z^j&=Wg!|@*6ts2*1gOGxoc{i+Z@o!0!tqIl!@j|q2fn(`EB1ce z6v>_km=`M{XSya^{&r6ZxS6Pggov}!OJcG)@iF1YMhnc9;D)@PY`<l|kB&96x zv!>BiJ6>Dv<>2rG5&~fYu~KO3xWY`k;>3LGhtR&-y6DV?RSUyAFOFgxbqsh34#G%E zl8a1~XCBic^6QW3)y+xb8vy=i_)AHwBL4#b_wPOf_zV2EJ{!Q{by(q@zTfR51t&4P z`5~xzAVc+^_#(RIQ$V>m#1fLbKeQvHR7{+M&nlEr=^~2X{ zc%#n>cx`Kyw1!2g5nPSAa#};j&nE7(0y=y9?l%w3VR1#4Ep4A00%HdvsHQDUrRXc= z{@YKE>GNOKF>Cl#ET#1*snto7ZK{=BGhdRBb*eI#y1C zE<7!lo>6rCXP+B;+D#y1LA#kh;fIxFN>@boi_f#RSyVgVjDvdOqS}*drUg|v#nv;r zXs8fB6i}tbTby6f)eC1SnhGi^07W_m(Ghf~gp53Y@*lptJlxD){rc7GOPU5+IoQhm zDn82R4O#2xcb3a|j#u?CSD|+EmPsWD!iii2hA^=&7M}6@_F;uUyHQBH&rHQl8OGM} zuTgpEb&f7L%8Xzb`2bO12UKCot`{Zg-`JTlkHQS&pMF=sY;R`S%wAil zGqdxWTIFrab)hy%&Bo|8O!9%P8z`nTdLvZ_VM=E^x|=V4Ic@gHOuK8ohnHrl|IC9% z75w`IjV1>oy?}~=qxxW?K;a*okmma{9C_#W9PIHu$^o05oy0G~A=>HOqcUBL+=p%J zQqWZnCTR^@N>ZczmSVFPsXEK;L%(2D98m8&5@f?lKl}3meiGcEh$LYUpS2s`7 zZ~xaHe%rKC7;3pcw%6-Tds@AE6@{67f)Dt3JKAy-PO(Y>>khB@A7v)xgQ*4U>g9G|%O^zkDYNrwVui0DCAp#!Xe2-j{eaV;dz z1YMV{)4JYhSIEuT9(|cJO>^n4KDljGP$TnvyKFSiWg36!u6AL|zrg<|n|^5QSueMN z*zHr_vwg^|Tef|m84g*m~M+XTU^8oZ4}G)Td)*DaS+s z*FX82CsbL#@5iA9jlv&988+qUhXwk3BXG7{ltDLfkQyk6$f>Csn5t$4Jx~!5Mt^C1 zUfNGu%B9jJ%O|avo)EibKWgh(%L$iq{`FXdVcHn8l6I-*-=^pG25~^$;Y+YMqNwFL zHvHkM>`AFu?D|CMJ11AoDo8T}X8|bz^mnijZePQuxzm%kTjUxRu$5#sswHRoPz@D? zt=D)NYg0gFUx8uwHI=Hcf!tPQ5T8Uf!GE)}b9Do4k>Yx%bl$39vBKG!HVdfiEtQq| zX$CDGQSrM?gI0Q0+%vBs{;{bT-UHEtA)ImQ5qBpfSufBfZ08cgSgITEcK2W9fg;d< zj{hGkE?HSwSP3NzO&Ka6{{{j%Ym@z;Xel+d{t76jA%S(9Ipp!16evj(-Ed zGgO_K-n9FTBsYpYz#%#``<0R9sLH;cP#fie6_}2jw~@^Gf8r(T?@~la{{<{X11Nep zioEdVvM>&nsImb~mF)JiUM2 zVC!bYN3Szsu2^jD@jAxwuv!{ciwf4M`*PyH%x^2jY9}rr-F3CRMWhkJAsO?NU0gM^ z`su`dT39U6_elzK{mm$3-S)|+1!SCVADJ@Qn8oQg_RCahYM+ej9a1dPhm>4hlDWZ?;0EhhL<7O?)shW2knc+ney_6^4b@Y_b4tc<#_T2%cg4*Q+ z?1#I%RU+f^Q*ZN2TAQqAt_&)%yEU!)WR(~-U8${zyOm;ld0RqqcQI-?);Qb651gL% zP>tttpACI1{!X7jdVeMHy1f8cpCI|VfOMcP&Qoajo7$nG zadUuOwW^Nm8te9Y);*owvRG`kx4$C#0(o_B!^b6~z0P6qY5qO2@}Bx9^dFw@CVxLi z-KbwVaRv(!S}cfUlmGep@^k*%1OXltXm);|UST>DTOFW*>xj69oCxwVC=j7jKlJNt zzln-}?5nGsOH)JIH3ggareFo6wuWpOkL3}fcZM2|@l2n};7KzV@9=k*^wQ0*dv%$( zI{rE1F3Ij=$3g1DK)JWo_Vh@51R}_mr&aD;S5k5p`{$MSxlu=yA}z$QhB2Kp(MKSa z!>oQ%ti@<6#acMG`^5r5Ezy%UJGcC-cy8t6N%yh+uGAR}KDAU>0?y~zenr?TK_ISGXC5c?w zPJcLm4$!nX=~)@Y#`0*_^I2x&O1Pk|@TWmrWMoAXnob>nTyS^|CO4eur+0H^vbEAE7Opb|iPmOo46&2My@xdM9Q>khKwkd*LmAxX zq0Q=W*c~*ArNhbu9XUDPrxp*JI{Vr*`8Im}<(SWqHRy#76%v%7p}p?Bu)eUmi=dbP zZ{Q-&@DDkmze;~nu3?!w?eoJD0z9Y)o;xfKM0Q??lz*zoU8K=_A$K4O$cO7^vbQS# zRX=mi{lQ8aRU!TDUgipgC+pe)#)1D_3~XGH30=un806Q7y2BJfZn$- zjzmO%gK0INP829o|6DohQrf$(c8%9+@6 zZv311y?r2PTX7%%7c310We_%p@!BHFdLEqOsFEyT{|Fp+rhYyPG{3dA2qm+N_w!OaM7R0@;}Ws;WPn z^-tkXnSUld?vb9E5&1+G5?u@1?w&}uy;Su5CFI}=y{b7lMqd&~;ShA!rQZelg z$lszGt16`HDCiik6d)fw7Us9TLYOAs|6wua(I5U(3~DSfu1L4fd-?9}?jNuH{hea? zBm4%jQ2pi`{73)OGA8+O0wCb(-_SVj$>|JPtWu=P(H}DY3ATJ@g7`}6Mi5_18pxl4 znlV3%HLk2u2&F$y=#U^(%L3}>lMKRr42Z9%=FA|PGlk$ws^4Rj1UY@znI{`Y!p}g_ zcq|Rv6ZQitc;|>I0Q;@6qsz|b0jj?|$G~i?8+=BF| zG`#|n?5&^f?n0!f-iFh$TLC&O=Z7yXs3ZB%>P z;_vkJ4eGfx^rlRudT(UnR(|R6JP8%FQ$@rq%&*}6$P#&_- z@C}9F>*Ipd*OWzQpfFKNd^IMNs2cmn@k+(`hze0pKV;4t45!;u0CL@)BKkC<3xN^p zvRS&2{Jh|GyWl^=|5?6&+j_6y|MWEfQ~iIjJ5Z;4rJLwob-K_Wu|XT*d=A6&p5n;) zYLx^Bz8i7Y$ZGAK`3&bzLFITe*unBMIDU5I$oCXx=CI0Lgq)c;sNchfH52EQz7EcF zjGilRu*&E)@&>v~_@`a~ZNBCJsWM05Or5b%5bx>4``)HXj-K;%KLR;+s5WxuqCg{k zHcEBjD12|+XQOLjKdfet!|`VmblGr%_+jrPwdjl1vZkcSH*Uhe9ZxvtuxQD?9I&Fu zkx#zz&Yd<-d^d}p`4mt#fL~?7q0a#MKHEtBb8k25kXFdS>upDd#3lN0#szq|t#v?a zw9EinhsV$XP?J+2J~lk0q5Lu>X21&&kvhp%A(CpcWR$+52+ z+%7!#8A+VoyRzAEnxuu&#JMy+_ID&9)`Ih!lN6T#X_-M%T0d7OKDY`FRTODH!>eP> zWq@0Vs#E#o&Pg4AjVuyrnE~_>#kKg@q=f=~g+)9*6G@uIOMO%p-;Ii)Rf zo$N&Gheqzogt*(_#Jox2ZW?RzLu9P?bgYwG-#_+OgrDN4<-_G`^my>!p(_smNdJ3W zH?oU<>i1%~7|4gK^YHL4z13JNhj+Y1ev%(`ADIyOaG(sqUqkbC2c!)%fN*U?6}a9G z-T`R?1-g<;iX^tl6bTGgiu8pW(w&WM4id8Cr3gO>*lkGnKpwBdG)1YWu4bPSq(@YI z4;lZ|pHU5lGke`6D4@uI#F={rkQ6OWDNq#y;+HNdrA=|9ffB?SI6Xd?5OV+6(y>aLW>9swAO#2?pf*t`t`08W_}7h&rVC2_exN{H6x!6U zRIDx~BG@Sw=lVqgSorv~i9*fUgS$~CA5UrKZRs|NH^FU@5AhY@;IEhKo zOJX-tZM(bsu|KHUNckEX9Tfh1=p`H!nsXz$IdTjW%FC=Pa*B`-rwe`^=Tm`->AfP< zV~1G!lDdM|sDe3&yE~y-KKJ-D-UoeuamA61IhVvH&K_Yqv*B>bFP~99X7K!|;}fLv z8Ls6AXFW0~8{ZpBk_(b-?JfE!*pa0-gE?e{`?DhHM!!OdcgJb>L^kFi;Y>HQ)%JYaNy`i*SLQSjO&y)Kyb_XXz)$@tZF=seXez5Y zql-%c5=otK@g_9!gHeKTB`O4sw9Ehs4t)L0Ndq6-8@leK`XP?vAyMsPIu1rk)R*{K z`54E!jv{U}N|=GQt~4PSC+r8LX+S(@j4*k5{nS5>8)4jT>bd23B(<(NAxT`_?IkDs zTJ4mop;X<;m+ya}-+HbK@@wS7pP5!wn_$Gv+%tlYnkBweh=1dLvg39{mf$&pa91-2 zcf*2j76RiGC>$2&^w>J7SaL4Tk+@HMV($Ab&p6Fl1eX!-(9t7Z5W(pmU<`>nO(j!ntNB}IN7&aqjBv~Hy482At4rTG;VHg1IM@Pu<| z=AGkhwEWe7QLiT6zs1Zl6(*24@KfaA@&Q2y&i02J=&p=CW;o>H(;FW_a0Hv-~H8p z`kTN0o8KwMPuk(x*f`5|Y@V-#9AS~h>Vmt8o*%G#eCowY$dwP@Ta)aE-i=yECKrJA zTgCap{rH_x#dWk?mQZLD>0Dcf$R5jmOR@OcX*I2!Z62BmWl{z_6YAPS4@LanLG4&m zXK8AghRUQ0;Ly0lw-k;uEq{_XpKzeEXj&mEx1L2J?sm)|_5R~Jc!M29yQ2+!{Ms{qXu1GS&gbytr~YqnhY8b-t| z&WIGtHPP|Sojg49hxSY(YaY+x&=y-Ue0YC{I__0b-ly?rby2s%ENoh98 z@1;0@bmuNCj~Ma7Mc{uOe+TT2Dsy6BNC17;k_2lo`J0biS; zTQO$s*S>wzCV-C-R^u3u8I)g(u=3>OHN@k$6D^ALAg?;XR&R5OCOVgV3g{8bpz6d$ z+l7>ImPxUm2u*0BG(~{oOVVNzLyGv4v{e+Ls);Ng&Z&)*<&F&yIh>jKAT-SYI-j3nKxm>sdckW{p zy%=WXR3rY$ z9Ud{ny&SI?nbdiNeBmQs%g1aI_xSIze97sHLm}N*BRL)L386$$b`hZZ>*c!XM}gXf z(|-Nq=`wxJmB=FEg_=y-#xu&i2Bnr-QZ#j&0m--spm^{z-csh}-nyp*i_-U*gZ-Ucbri?SH zY_ObhfjgbffqQ?0Hy!pFg)#`615Q~|rRU14BsV~FZ4`~qf;%#$+n!-@Da&dUm0$yu26F}p$+`!L*AGyhhGIx_2bjO>_wkS_ zzVQ-^L(eZbg-e25%6l%aIE-t&Gh^j<-vyO(+*0#-{Z5mB^O3~)dC+cccmY(CvaXvQ~C|6`qRMPe;l*!FLeCW1S$@QzA zteI#?Lrg1jC|SdFCb74RNt}*w-uk|5P!4M2j&~vF=OQ)LewNOWXUzVAQ%_><#`*m( zQ3|pR(F|{#d=Z)Jalm(b<@r7-eA~WF;caNg+MTQIX8U<)mo|trMB_36_oC4a)rKi; zDic>im8W5XPgOe|6xt{hU)of?8djIO={mAfFL`pUJZ`Nr?hz7 zj0^%ae{SzgNgMJ_X^+sgHHsuPIr#U{yg3lZhH1;=Vx@?1+>}+iQ`9 zj5Y`j{?tDT8d-dZlj@>Ni59Y+53#II!&DI-=cSF3#qYWLY7^zxA!*Ypgmm$hMBOz! z>JH{*9Rl)!9_lK(D5Z@KltWc0h8YtJX`@g#uI~!jc_<#gy;W)TfKZI+EJ)jIxFX89 zsx0O(PV)#v){{#lK-K`CgL=Ce#wmJ|A#HS!5h&l=!iPc|g}Py7c1Z?9f#oN~Coipt zM^%%xQ74~|v@c3JKF+G*;6>;7M4j6+XGj#6e98A5dZzezm*b9-b_46Xyo@1je3+-L zm-faZOWG(|5v7=-T72{rbt(gA7gPNFDG&D_5Z1_B74heLjgl4OatWma8V(S9x<*_?jHhYQ-k9pJ&YeCx{;!72G4vKH=p}e zYgG>y6Q^m4`<7buI;3W7Qtw8GHaa@ac9NvkAEG5{y^gTceq^TX2tyksj5Eu3ob+i5 zJtwC{VT$dRKsFp5-4)X14as>E3}2l?Z-N(sQFU;F@*;x7C1`a|3QbFpe|yT zJk)tAm3@)MzjZ;jndpG-L4LO_6%w)QW0(nbRQ93+-PB37EmCaX;M7m<+{cC-TMn2qP9o9~;2kAMd|_x@Ig*S7 z9dT;L4s#M19G{P4mH4U7IW2#sEOc_Eb%9n2 zIC~zd^y{yGiAz644xsjYOBoNZ6c$+!cwR?lzH1}oaV^UYHq7)d4>IL%pV3RAORab7!> z?KJnv(i7;;DV{^!_xRzyR+3ODpGio0z7|)nR#kS8-S-Odh5p@pKJZJEToH$FUkWBi z7fGd|jS6Gu1fwqsb{ZzC3c(~i6Q2<5ExsE&J-BbO2lub<$)dnQVb`d8siNaAqmpZo zQTBuX0Y9R?VJPnU2;aBvP0Uy*f*>D`$4^Hx$C92#OCl(BhGx|LDG6S<5AF%BxDcCAY~pXKl-#t%`U7l{YfmmIkcY;`QW zDi1!GG^%igV0>X02iRr3y43;PF^DWTso>iG1d&8M+e5SMYW(_m%^~+6)eMiH$wu$5 z9vT*Sdr%1n%cmhM*5ZNn1zWBJYbq2n=wBm!FlnUI!1*RRPcJADJiYEvJU-IU%gZBf zbI4P-yM-g=i)vF1-Ijc)Y7-=cw)wn;E=XcAV~}CskVo0JDt_RS#!X(-ozO=-h5m$} zG1em49FBCXU)`}|ReC(v1r96~489Q=DR6GdC?r>K%qU?B4t@iVoO@hEP`n{ZR-OLs z-%_$}fNB~pAUrzLOF!<-CGM?32J+9C%N^1Hxx-Yro^DtKyAvEID7$U}dn^v$%m7o% zMQkE_v&Jh7bKmR&e~sx05L58b3C){LZKT7zP1}}YT%ve<4i4us8Tz_-#A)LUFxfex zi>Z44807vjw#{GTb##sMQNo=eJ_XuHM|lHb72?||R)nzTIes9*?Idy_;_AnD+VEzw zDJ_!ax&_c2aHNi{CT*NC$Vsu##+hJIffX>mkMJw?Z}ZdRvEF@`9B>*NMx=VoJLNG{ zKB-}jA`eU(XN(uALQs?`vTtf51>@QS8BgFu;8n=*h7Ptqk&$)@}q$QtS}tt z1uQ7F_!!YRgI#`=L!Yd!(qX7NIJ*!$6emj>DOpi0dQVZ-1B>5NxOmamfX+{=iweGO zkQ+bl-)ERK(m`@}Ar`6R1EQ8K2mI=e9k|UwbnhkV^dZs4A^Aj<5hbJ(A&qpr{9my0|j){W=4(nl{|~ zI>9}h_$^E)QW_~)5q3%57qT<8ShH?)M})0Mv80jG^@hrSx<5C5wp*WNm6dJ{S;iH| z$9z>&#|9l|RYVjm=UG)v@Jt%%IAd5RdZTu9Rgrr@1Z#@_RgC|fVPOe?fcsXaHsn4h ztVRKXs9;DVWf&)HdM4{)7WYwRb%HQ7Qo?TC0+4!*1M-nZt+px~sF$*()bS~3e6N0g zI;C+A)|9$#=BewZ^!(iey3k1JdP8-Fa$y3u|JG2=SVQwehO8`15!|;|#jk%VBr^ zltzlhFLH;)Sk;V9KC5@Cqet;iEaQnP_F4k*` z#$PXJ!FC_9E7~5;2DhC{WC$$21LsGHO29YE{-NxrkX`whjC_Uv9(x+KzH)GqtW?3;l5{dwiL~g4^Z%)NzXc zw0WKQ}${MS<{D2UG=>E9aTp#Q}+5q=5|`xNbz%ti}* zPX0N5v4#=I_vb^2@-wO=Tgtk;$S>mn8H>0@V&2%?dy-@N}){X_g{a#tm=H-=3Mx~p>zY~bC48iiu6#HhPMkw z(C>*0yZko!aN-2VtB2X+xq6t$at$@|sh2myLgau8=O8p{ z>%^GvG0o!>iFhlB1Gd`|dje~?7fgWh>DY=m(3m-!EDdyG^YqYWe&Of5y|`Gz*!CR;fq}rH#Y6 zRQ?1`8zy*nPpK1ovE-8u_=c~S_!CtET&cuYnQM9f_P_k+zouj5^H3FPI2-8z{eEJo z91SJPFHGq4`w6sb_8sV{rR30AevjjE_J|L71OXxXZ{@ciwrz)sbHA(7fYV94T>nt%eCenYq+`}$>n&Ou#(AQR zRK8f<+7C_uiiYgME+c{t*v|Zhc25WFTV8s~_7_P9j;d9!f>jcSa-)muUvLGNqTwTY zPg|Kb+USHO94F^m`25q&qKF9cC<>>a1n3{A*TrEogSfzq+k;6%oNqj}huLxKiy!wmK!qV! zTPcb2<10)|M8j8Tl@LQqlM}91 z6pa&yZ5B477;&zZ!tu$FEPZ09i%dp-fP&(aaTDHpvrPh*6PsMlyfCJ~W8MZgj3>XC zq@i)(@tCIP&pjb(&iY2bFHrn$5&U3x>FIKS0o-oE2WNa zIwW?=Te0fRpHVm(+sW)#f*^n75b}tjrg52FD!qwKjMqLzS0r%nSLy=rngBw49f5jPufZmxnQ3z zQ%l*k&Vaj=$OshG46bz!oP=3NPi+@%rEq)?c;Vjm^!3+asTNx%+*XjRyg;RHCe$D& zja*tHV17tN0G683F_dJkVA{96vG#MM$;%(*8yC9-`W~@EXL=lWh-GrYvotvd-cudz zhl}}RU7@PwJBr1}O09dM>6Nn8eisBV*qm~-RZXlRJ({#q+HU1sx(@@qrs+eiI?wml z=bg4v`uJ#5n1HFmQ{HLo9JCYSCzv*NXwo_dEpRdnMmq8`G`{i8qJK}0EDC*9oh>%Q91TqF3=Zv&KTKZvNl|NE#oiWnl z=m(VqXwpj2xDI9(^KR`IqYw#W8$W})C-`zx(hW?Pgm$6yaUmu-+k*k)+28klHX8ZV zhEWLtT2lm`ywhk!<3|gHXlSK_<+QaP0+9u#t*?hB_qaJ|lUjHutuxSC?}f-nwUwgr zBOQ*gNJ1G^!_qv9xJRt-IGVIl;`pTQAN_(=zKCe+3^e*2+AUaZeMK}_H(nEM)-04o z^_%!CXzL8xoX-cbU8q*l)){D9$?y`DkOK;Ga|<_@kZF~4*w(Z7c4+qF_q>J+WZ4LVtmhYHW@?%enah0Ds9?IDdW$U7GbO& zAW^B)R*K4{?gQ>uaT(Uu8ECC%P-HH&bq*TNYs1tgzRs+rbq?BgYLl*|bq*S?l0|eD zYH6it{CqQIlU8A=CEFJTe8caV$9=x@YU~EgL;I}ZHrpb8c&(+CQpb;*_2ZVBJ>5{z z$Vua1%n7EV<*|8TB0ikq*BU!ZG}20G zyLBQ)Nv4cEZh<+VzP(iOi`%Zym~s+7198m}`SeN+@;D2%m9mg40_G&tDFSJnLt5(s z8rjLTm6FB>dWJB>2db?z(56p{+Dg&*iDzn86o+QM$MPv~_Y&L!2mam?J%(?VaMa9J z>u?*t6tg5`0BSp{{&`axP>##t@3DbskgLVM;vDU;p;+AKv}?buqVijSK=6ZOAv% zDQO!cm~X(+v2%(`ds#pBF$X$sakQ4ECBnW=c#i+J4^S~0xh(HxP-}z+wNCx&CM+D3 zhWEeF7KQsGnPPn8*U5)#mA23p7V1Nn16B!?r7LdIu7e_e>3}-9nL(hU1q2%0RRoG_ zv`?T)qfcNcjWY;zvh8!w;EX_SZ_~13VkmuRs^f7VEIs{h>FlWA_R(`T$3F*4iOfjg zt;EmxRk(Cs#A{vSK(yV97&K7+xN5IZqdHtYEF976R0264bVUF|DKB7Tc09|Pn@SKV26`7^3DI>qxZFd&V*k(T#w zT@$|Rw-@2Id^jN7ZKSwRUo1xf+u)Y(vwWSL_p)E%W0V;nm+lM#H#~dkWJ@V4X;@_H zyrtW|V&bpq$zDV7wl4SfD4eQmYby^&j(3j)+1Bh$;(iyc@44$4&mi3k4f zH=1kVd!;YDN^oKJy?=DD0w$YLQk@n^QbWP`$>=d(A@9IPFNLxX`M6%6_rBHGM34_S z-QpJUJT$p`fNe9Skxw!XXAhRnpfja-nCO8x#FS!kBG)iT`mRbIVB1UqxzvP#Djpm( zw8SC2BHXFj6%>xIV@<1&c-AAIK;m*eJUUOb;uuV~)B5Hw8MtS^*BB;ZtHE%N7W=dZK zPy(XkTBdZ(6p-&DC^9khl=aDL3emO{jgxms*HR)bCVXx49Kie$Hi#&NsDdEP6mb4{ z5m}22WEn-{N5CpY3GWg*^Jy68=rOTvrl6dOfNPFf9MCmWzzCHz7Qv@dyYQiNs}x*u zPY)mR^8B!g%C|Hxf(SWNhx4bW&Nq2haMi^*i7;wx=cD_kZS!q2-98w;WMH?+Lc_?vl-+`PEjubbAYGK z6pwR{Ugl(RDEHE_Gq;VFbI;j{qqAXV!i4MoXwe!v{eLDL(sNMeMb;TI zd68?YvMwvdpg_U+P^V`?%5VpX0j7ug0^B!IIKFOS?b4hs(edWhGy2f+a#2}JF3k8s zbIla*7XGbqTxiV_;f~AI-lSGRBmAc*aeT0Pzl;yoHB-D>2D^oecFp%RK3MVJjLs}V zFb+Y;l!+c6>?pZ{ziLT#1;gXVT-;=Ewm^Y1U0qg3+hhTgr;3$b&1kssw&2*%7LBJzl9;soQgnG(kt7X~Q=5(l`zQ+b-aGR?95Md#Hu&meDl`!08K9(YYSoCjVJ zE-H0=QM|BWkZc^&lW~w09+wr@{A$A$S;wmE*{|Ldz@5_~<+s53 z>h-dTs#ktzo4lZ28fm87<4f+jiW$_^n&Fyf;i-#HOjw+s55;?P$INmOi@LbzB~R-* zJ2c`}sDM8OfP8Ff`NRI;(Oi7J`z-qcDIU@2utW=m`B8wzKXdE*&K5c!xfYXhB~AuDhaEdz zttqX5;+2M)CNd0H=-^zqLYw#H+ujS=;CO6wvw3=e(RPnoA)a5n!b-rxpo8apJ`F38 z73yyc4|Jfw&t;&E1$NMZ!t%v#er2OTh>qL~9=MZwH7Xco;PHQc9IodFe4Rq&uLuf^qA-V=VjyZggC_mST# zAAY=Y@eYBSQ&MHQ3vk=R^OLuc^9|Ewbn*0@hbZlu5$ngXh~BJ-LqHog508_hwD`gK z=K~pT+oIHbQ%LriO=V9u{y)Jo#mCPHT(g2G=;p-CPmBXc6Ui%7-JOxSsPAHJAGiv27uK*@nnZ8^a2S2CC!MxDpp- zu*7d&c~nl18(USGG#`3D`HsrAWr9jRZV)3;Dw?X$=j0krx2yMW|L$*o_h0_g-*`0I zxH;k|*x+A*>EmF7|K>r;ION0Cj;I!~S@z@Z7}?eNF}t=+w=t4mAj$a-yWeMKJ_srHt2g$ITmksA+c%hW(98x(lRkCFN81XIORkxz8XtcbpZ+ybo~M7 zkdKY?9{)Y2%g-CGXvgZb+-3Q%)G2t^x_|r=fx^eoxO&w%z%_Jiqwxy}qEV6232x(O zv~@6Eix02~=F`z0s4&C547Px~Ul;PcRh*m;lHu8OaODcVry4=ihcM`zw3yc1deVfL zoW>|#mM56ueSWf(tsx$tV_A7RTAdZqsww2LDiBV1Y+v*K&`nA=EByG>he{5OWQyt> z8M;tQCpqTbZ*$FeW~e>yg?fPJRAp{vvg`0dJ5-OCzbi|WBu!2dw)d%zjF_e`j@Ra+ zUX-hv;&CpDYtuu8e97t1_|{W7Xs4+6n5*&nn+Pru<7#L22zkgw24;%E0@2AWcWd0( z(mE-FzyqONKKJnqeSBW}Lv|NO zY*;WV(z+mq)j%*yU~KpE^HP{{=Gmhsj( z6m3(y+IXAe?g*);cwB0TN4O_7)=nXB7;>3xe?To6-`Ubw$Vn_=w?j#@p#{8R6eJWb&E zCCWprHZ>G&;Hqngd~&ShV@yR@I~_Bh92dU?&Try#UX`w$!bT{yJ7q+f*`;z0qy{LZ z(HU~ZR8p?b_=IclQiMW{T-sfH=UAH_4i`kyd9w|lwB}O(>Kz?0U)u84KMel$@S0?? z&y$*KAAV3CJ@)&6IVr_seqg-zrN6ca~lr(=#lqL>D|z}QKzY1=6zXCuA9ba<$K zSsc#3kAsbx&vFnXj+}y@?S*}T{}hO zvn?@s&9E$Kz)NlB%7BxIH{bm#AKBA7`DxoJi4ny84$eYU{6GKun>UBlku{ zY};od!Z~)ZYJ5HlV(2_OEj;NamE%er(Y4Q^Q4;V}^nBz-?b>G{O1hQ!%(#3jd}g>f z!kCF=79X@WbHJ~lf5w(*@kPs4!pb;m+dgC98FG&L<;MN#Zrds1J*AUa^1CIIm3>&lZ7n+0Z9Aop?^@9_p~E{iqoBuW@y?DH7%1sMxJA@bg2_jjK{K0QX+9Q+5 z$SEa5BBzHoHDYX*U?PzRAxbG+48kiVCOvIC9XFSrz*XMAD-?(KZ%5AZ!WH>&JXC)eo+rk5(!rz8@Hh`qD<@C&EZBov1?KK_yQ!w>p~JQ zGxtMO&plAPq^jE=)S^{W68SWXRKt=Kos_nnBHlw7#|KA0(ThLcJu+TF7tcZSf`0=v z6uLM?E|wA6rqM7LDW#3`4r7P4Ixf&cUF@NO3*hu&vD{^HT%;7GcP16hps3gyzDI`8@)Tt}{obf(l+fM1^YiZgvTH{3sd1NSF zgu+pl!GJ>7J_E5y4wFaQwtWs_erO^tRI1ov`@i6o;064hH_1 z9AeK4eDO>lhnmNvIbQF=F4`4#aO)@$&a?1=WkK0`HD+AQQ8SW|Z z?fiu3?|HYHX)a2wwJ>jsk;pZ9>{VLVwlvPO@P$cle4#lXBug{b75t1(BAPmb@VR;? z2Shr-e6Vuki%u_M_a$ush2s(^$?eZiadp$S&qBxjz?JYS@pQpgd<>0uw~yOY>|ToAtP!0z0V&OMA)EaqFQs`lq&z0Xr$=74;*f8lGRJ1&-{z;sW4-$hzCGgq8wY?B9S8`4|}YapV($Zx<3+>SZ7?Ag<03n*m4S(Kuy@u59R8|MAjW7$UbC z?vI!{ydFylQw}UW7Htm-%wMiyW5g4jTp>BEl=@z*anvYM%*%bB-D8^G3Qx@smrHqU}L}xkzrGE4WneE)_?;lqkHo++H5ggQ9XSIMj>esHL;k!J-R=<)`W}$B9b2 zNP*-yLGjaM54#w}<0g=5S3ICV5e&|Q3#0Bqa{rW4U+7^~Cn4^3ce4GQUqIoua7rF< ztZ=L7U*QLJdCM77+ginj@9oSXzf(S3{NW$hdcatqyJE^Rx28d!fG-@>-3yqw31^b@ zqYIwzF{RRURmtXytG6nm>o7AsCKa+$$C%bMK_}P2qZ}Cj8pHE)U{p17=C*H&MyHHL zK3p&P!QaA0Ib1Hkhxc$(v~?&9$)=jye(*9{WP3dC$^;FjTQIF{V#pj+22>n&!z!cQ z+_Y`L9F-Zh`M!3{P4?25`HZxwQ~MF?f{_tJ`#3>eqK_vx#>H!Cll81IHpMz9GHOVC z=>>)^rA&OybvKm17D?(H#s0tvNOxo8t}b1X*g-ZeoeRs+fnjTb*&zRg&Bf2~Tfh}K z;5?lF^0@jTM-i0zFGKU5lBtG)GTG%1uDInl%D_Jk$mGMWuv$Y6rg&&L=8J)gL5O!x z3G{6>I$&oi)QBDk-zcep4fqg;*jd7xbfos@7J;Dh$9nm!x~NRG|*M&k{GUhNSp_(K>kXn=fIk*rF{ zRuIaK@zFJh)_;TKG={D&-k`Nnia<~vMkWTi0AMUT4~^?SC<5`bQ6#=m$p=2RQ+beh z?LQaUCMerrketq5PxS6)9%$F$H3z@O(%DKX0t(8fD0JZPsN58M~*BT=zZw=JBx2_c%evaJQ!h zw|Nw6ptSNS3T?-#e{ES7t0=Ug)&X}hu zq@n6IIk!-VVBBvc%9zf|J@`1@w0$QzPayXdGJ)aX_-X^*Hz=GMrH`wiGRHjzg{Pwm zz3V^+%?}nq(7QKk4SGj#$cf_dYd83=38JSL&Ed2!AEfLpMdtTd^}=c%k!EpN@Wvzf zcxjMTGq$5~u2#pa+2n!H>iiwZFPe)H#jywn1SKKTy~kc-Mi_ z7y(7t*rYhs)`5a@jp-89yA(+=h9Y)-kV7dvYTdM>OGwe&9lhB&r^M)T>N?Qz-$o}= z9PW!Uc)FaPd>D48cT04b*e&_w%Lz%}$)l5W7ON3rS?S=pIoYYyOsrVA5BV{Pp15`$ zC^)CsS($d;%fAOI!JSAFck;u8rg_V%wtJvmhZ&SgzS1Jp4{9AKDBtazFAq6; z%H>xZmrYerKrX4{IOdKq>O&`YUz~9Ct&h8$??~K|If^d~5nTs5@m%QBvZ!m{kv70=JIuj6?)R`8PO!4= zKrwHe_amyvKOgx0=tjtDqw-0qjBv9$H&xDWG){=BGi)FqxDZ9iL?)>Hd01jEm>}2A zA#W#B$1!8*_FfXz9@c?k@@t20)%Ay+mHNiYhkc7O5|7uBm#S$F&c~_kSEoB)A&+{P z+Ho3_#3uU#w+@t#oKE|Z=-g@b?0a zxob-Cj*s)wI?SMRpE)w3bXo_B$;Bx&@%qz)Yk_u{0XTg&+7}z`Kmj=?;aNL;pC2VudV!#k8eIH&om@vcUumCI|wNj%FdQr8q8IozMoRq>)8EQ?|hy@YX0^F4{` zEbBmr{f5$s^^7$iSFHjm9cDm|qfC6I0B>sP(ojgg^JPVi0Kn+D56z<4hlxZ?w)x9K zwkyhU6r)e5ygo=jN+_Qq`H`(SiS;L+F{X5&n0#BAwhvUh(>S@7jh$cSEe<^XUZaP! zN@B%hcCiJOCW{A`e>3r;jj_QxP&RPZ%8y7;=_KYT>hvW}MB>-|Nt0i_3$vZR8nS5l zIeZu=MGmNKJ5bE|8%OoJdpO`;a}TdB6B`G&<2eJ~3udC~@rdm5RsY$EjVgJmnSe(cvM@~jKmkgNc6KNeNk+)+WGq_ApOg`b_M>RnsVk=;O zr+A!^(>sS&B9FbDMFxFHD!dU6r7~b-+kp~!PlYn_Ztmv#8F;6H&ozIVK_CM3OT>9c zLD54mL6k;5G0X$Cv(QVUq*11Lw@eJO0gclsPA@||u4_HQsPtF|N+h4`vt*d_vpo2d zZ5=2kKgf+LH~EMcRIwcehEI{i29(?J{J`EJHyCZ4^-Rd zgI>aj{Qwm0anOi~zyhDZM5zHhhy*gWBFicZlAUI2R>-^W1gNyfiRE+U+-BmS>NPVL zl+@t%*sASwL3b|*fVR&C-4}HjZtqd5?Xy82kz93RqW01r2jwTAQ9cBpPR)nVdCC6N zEzd6MkI((#T%tB>eD1Y9PA3P2GuR|Ywf*-6+7|r|haWLI6?JmhA~y59Z}JH?XnUMu zp7Bg}y9X^AwMizhKWvg=P4$p)&f*Wy$y4*D?Qw!RC=&c2w{Kh+w0$<{_5f4F1gNyn z2F3PKOo2-KTu`+GPk?IsY|uj)rgrdFZ6ob-LEV#PoTu6z2j$vDZZ0reX#jj*DqMo8 zSEqX2(9m}~Sa54uB=lWRXoBl}bQiD{yW~BMnsI*|hkx^R+8i4R3xIa%5-MmA^!v9( zqXC(V6GA8#>!P(F{eSq#ZXmx|KHRkLY<}4TBD7FncyPc}f+hC7?Xhq@^uX!>@48)v z+dvA`;RC6bMnVBa0Ge&NM4M!)YTCRRKWP!|9P~nfutG_wapJ1~pwN3+9-U46ivWs? z{U$rgV}(5F4^C+UndR#Qg(jD-hYt5T$We&;{|HK0i28r?KxGc)!;Mo_yH$ZQiPF~< z+J(Nijm!N7G5YD+gSA=bu+C9@hqnKRMl}1bFR2;%()&;pq`JrB3Ekv#K}>&-g)(pw)&MA zF1&o($_KS}x*iMHLy;{UdzugA0lNn+Dim2)H=c74WprF?E0c_1Ay*8_k~b{jv7F zw`|V&z7dqV>i}gllD6}qgdtfa)8fJmFfu=2(kS7$2P<)NuE!kM;vhwkQSdk1HZ4jw z)gFtmB=8H=?vLjzd?NFyl^%;u^IgY;%^pd7^C@awkD1i|a74a@Wba2#c+~biC~toT z*%~j=Fc8>7+-dUoW05tlhS(rKb$&un$?G9jP)gZ3NVjTJf6J&(=T$Cw$N5^~h%VGJ z&`KtrWl`pG+=(Dwvl(|#QscKeLK{;C@`WCR6?=2sh86Gkd`7qdjz|A`xDx$~n}=!Q zaP4p{higZ3%tohU8+_Xw!{kay_iwksN2aImL3zqa9fxpv!-q|J0pAoj9aBs$M3alL zf!Evu2_6F9ITLg~cvO9k?3l*Wz6T{V0*feE9BPp@BBqfg4A%9au>7>l;$S_lHi#!r zknj3N_2N?c87~Z%i$Zsxk5MZfJ|6ctL{cvN8Qtwp zcr-<}uLtnASPgDtvKS=J_ILm1@#%NpeTVaz?^!R?Dj%+110RG=1_V*s^skJP$q%F{ z>iT%D979N%J>0{k2Zg)`o#TBTj`)m|AW`wq9Mh_tMED;d&Hfam>p@A3Kt7{5#WbY$ zm;s3g{JocFe8foCgF^Dj)}+>C1-UC7Qd%#>)tmxy!%$lxx<<`X2s7iTgD%@16q@fR zVU$8QdWVRE6Cw(N5Pe&gd;yV|u>iELNYI#p^0kgfm7^Ng;)AyybnuZ2IP77oW8;#s zMUlH66q#@RRlZ3YFGrTogS0?Z-8!b3IOaGqIKY(J#UrnDU0@I6_@PTBItThmhx2$E{$VP>S;1HyfX0E@KL)SluSPOHF8Bf!a_~8lrE~S z$2`>LB!`+POM&WoP*nar5OJpUnSh$E#G7`SwX7bgkBVBP$>{{`LdoR^i4^zS0{RcR zouX_gU`ocE2IUcrTE45mV%>Q8X4M!Y8@|q$#5=k!9<4GS`Eblpz~dNGlH>0D4cajI z3J9u`juC5FZyb?p|FHI_KS#)>P4fO2FS+=G_w^C43Gubx_3*f9sQ2LL_-I0`gx&P) zFUTWP?Gryg)92uo#7WTbxN3&#!87*IC&=eync|*@4*uL2Cg-FC@4)4ppP*DQyB?I2 z5mda_;g0MT>k4SK9u$?!QCNP+N7U9uldUKsrxW)K2nrIML|1y(gQ9W`!UKnVYBg}E zOxpCZU&<24XL_!V*dh0M!Vl0oS6z=8)V^Rsakv-obrCzEao%>jZgqof9?{EH-a=eXML zdQkMwCcKgKWfYnpT=C8mCL#&B@rV)$$49Pm`34&#Z4LmdYB3Hyu$hYhVnU*e47Z^D zqTHvP!h1SjQyXD5xe@ZU@ZpTj`r$BfTJ3t!$+<-p)Cpb-MkU{jk(|ytXgZU+V!BQx5$xX%)r~++PA|QHzRcB2)M;PD!wXllyf~OoiWt&K@teYwP%yJ zJ?5ZpkB`$fkH&gXRIZW`%NU>frX0E!U3d0@!_zJgg5P|x?|M)&`P8ddUQ|S-6$k1_ z3Yy3ybv|1$t3>D3Md{@1Y^LHy(dbG>P(ZGeut($IJ26GtzKFaN@}ZyPaS?a2rzk_a z9+c7uDhbx}C%y~kqo|yrF-y6gb~Rcrx^-|P-{E|Ekjg6c1*haF1G*lRRIZw*Hsj0Y zb#JAp$GJPeq{dbKE%ZHN{meUaX}r;tY`P9;%olnXk>pE|w2A{aKO^0WctL7) zj>skbre{n`p6#-)^(T- zTOVN#o1oSunTx~nn~Wv~n?QAm!{Vr%2k_03ohi-(*I_p7BMzLCu-YLG%awi!LogDQ z()wI&+ajn5YFdR4A0CzBnI0d$>ky}t!&Z4yY^Gpchqd3aiEK8nrszONxU%}ZFZ zI3g_nC){m2e`t7}-tnT7u|loGHXj z;KyE!jH#c8nn`{og31+ihN!c3ph=YjA^~z#K?nJRP9CaF6Q`BL=Xxryjn7>dVv8WO z@~N5*Cf#J^gG41sYWo4?G@&H!(<8Kv`;-tJ57nlMD?7=LQX)=dVk<$CPYI$Mg;5#s z{T;JDOD4G>f=X8W7M9(5jSFk?AORNm(Yw1p(!cu%D$Y{8u_2fUdC!nL?%+MgKbO$Tw%R@?(t`Ade62gp0TZbs7{l{JfVD; zRP0#Gi^ z41zN7VWgLFlGCa++lBiUN7aE!%L4ZRm^8tF<}!l;?kR*(ik2nnrNFNen6WwM66*Bm zNJ8Z-qrrJK(yV0~MkfE7m#J}Ah9w{VSeRZK4b<>tKZ1`v3|lLviFkQ>B&|$Fp{CeSoDx|gi%Xl-GK9NUl@G9R zH1q}6NaIh&E+Sp3M#-Icu#M?9;oPOAY}7k=Ov}Fx`wyIE=r%~MfDcbN8Hm$m2#Z>Q z%in&l@o|SXicaU~p9HX+WGMg*!!*j{iODy_R=af@$JzE&>@cQ}&%YHDr>NEl-wKS2 zqTXW!x-nN`0C57!; z7yF{!ghSYwggQ^RMN2PbCPxe&EL2XFn~w>kcn#Hn31~HJNFyJ5R8Ga`jmhbkftLS)DzCob6#0-(T}GS`l5Ya~LXLFjMLLY~>S&eF(?ORR zv}%HPMyo(d<6Y-$IEel z4kG7l^c)d~`Qb&&LzMG8w$lTGCn$}4@V1rg5jfVrQhUH{mj${|V17cuT?NKqw)dHs zN{?Y#`Y!{W!dZY+ebH$;AKC!O$oz9kajPB&w|N|BdmPdxp&a0><lxkCy`lzjafiX`QG^{2LTC2 zAP1E|4|!_jqn2+`nNzz^MsiR@Po&#yH3iysnE|@4YFMc!DQ&yV0NvzAc;->P0-oyd z+b$H8YpS56Rk!dB5rr)pT&5`EpVOmHe^sfD@HL%c>{)y8^~BGB%;lh?S&x@1*tUqz zfk_sB%7{6`1kn5BBL;MCR+JrFU9I+rc^O@QWOX@mwK+Z2eDQNGusEWS)N_uQH+XYX zQX{bE5=HA)ITbNSt@YrreCv|LWRH15E|?t``Yx2*2(DyAIieC1l`*APlcs1Fipz5^ zc6CAB$$+k6hrVtV<1B7iKpy>oJyGvYabv@=tzWbqz?-}Zo z+jpT%;1ZyBieUt(kBK);B)8A-QcW=X&o~~c{A&4dRCnwd3hNlP z?L$$y9xUn)tHh;FiY?Z@i-&7sz;RKcxI*B}Wny*pT_`R;6Ssx0#92AIY~=-Qf$Anf zvK}Ltvv(Y~;7h_DzZnFkVnE`h6f1KW zxHe6qyqL#kzRb!6%q>an$AKE)Eo!>l)j8^bBK0brbbij1nxkqq3w%54O0mD zV$}8E`kBLaZnaS^9J?-b=5Je-l7y^GU|;04a&gkq0I|u^TSbEdCr9KmAI5z943*%l z#W+UE=ASdPi@l066g?JYI*L;@Sib4wASWqNhhfzLu}HFuR|44C=rr+DuXB@dLF(B2 zCeSsGUAjF#D&$%54RcPx-Jx#OKlh`;zLR+BFvwjeW5iK z6M>XNNR+D=X+?JQi1Cg?PG9|=;M|Kifyc<1f>ZjfVje9RYt&tQHS?SdEPIZdl2@WPkPCf76;{SMn zGKccvRBHNJVDz4+9V#f(478B4vGcZ}@_mK4bNaA{M7qRb`SNcQpig)Twms$ouZq)N zj8$<)v^{16?{~5nO#!6?aio|D9y=7H7^)ZZ5B%dRJOoczlJRJeJfN zm>{|B5hpnUT$M#0R!;GlT(}-_V9pC9JtU<*Jmj`Z9GR00l?+`tC2(bq1Q9Iy&6v!s zL~^@}OEFrP_!Fm=gI4fWj)PXE6w)$p^{d4JZ$}sG*Hgf*N1R&zG9&vXulwW8oCKCG zr1p=M^tN5j7|dtR44iR(v_0a${2JA|5PG;m$`apb@Pg;SK47z*arkzJ!ocuT@K8NA zXuEFBt=HdmY(P{%BPmGZz-^B>8~E%=8Ss4pHGw?fQo&RM0sJF{Z2rguDm~-qeD+X^ z9%r9PvR#kaz%MT7cFD(qxefw@#Uo;haBqS0hVINwPU6tnbV-c&4v8INVLgg@PW z0oN0}ZBu4&#d&3by2ew{xF;?YB=F4>3JZKg+0Vj*wf%#`z7&zVNhRqnQgTTp;2(QY zo9644+kP0NXQXmvX%7u?9gm2z!PY;Z)`0npv8_&nHDno!cE_JR(y!ufhqnyKY0n0k z0{L+3o|9*hUMVl^J-q1LiAQGJ2L*dvAH9$|(Edqd8XjS4p=ojiZ+$5I3!X^|Cb|-y zxl25IEWg)R?KYO!l%?_bTClD}mlnZpeI2g@11(N>bs;q_cvxfANFb2S($B!xv5pCo zRQylqr4c~dfEP!2bi99ylmHT${ORt_Xp~P0xrF0 zQ0{`(uVuOPrr@0Annn6rZ0Ss~xpL^em9G8;h@z*zfD@lT6(kfb!gc9PvH7vh>=f6M zF8wJyCta&BUW+ZAXJD&q-?iA%c@Fj?4&GN|qcg?ktH{+oz7|}1Q*h4kvOaCDCR{pG zZ0<$aNcM;8*>XVg#u?}?Z1-x~CA^oSbG{s;GV--Nm(FvrPsmJuH8wiW!e+suk+qNd zPjl!#HYh=TE#1<22Hm2be~$l^W?x3FlJNWg@-$7syZ0U%-iP_A{2M zbe@AYkYnCturotmtd=gf%fX(Ql$L1a61W!eHS^< zd!mbdm%w)^VjSKt?DEN@-;t>|JGS+kyL&c#*HB#K^t?QhXnMOL@@uDDjbX0nbA|Mv zT}b`*5$3eD$6^D$r!4lp+;!aQM|at{;uM}c<{tw>J~nPHZV6luP_8qK0#s_nQ3vfB zuxfpj+Ake)=jj=Tu8=o52rwK$Tc4TG>v4&u5pGm5xELC>LkrHAPn&7A(}?k>dSR=6xbJWIL1p%0vj znuvpoU2Z$zWx@BWm0vHPH~2FietG;@?DxsQyTl_G>7px`pq|BHmok;JAdEKlFtzOE z0{(!9AV;pPGmaU$)_9mGCbU6KR`I0vM{k&1aiOTC(h(cJwJ#7aM2FAy%&utgBpd~G ztr`3y+;u1v0Y3gop6-5t1r-?wQ&hX9gmTPDp1NYP$Fd6RMjKDLcVQ5{?M;(HwhtbZ zOm6WoAw~EoLO5f5J)pLbv`bY{3eGj6I3^?a!>Q1WPhBXCNB6ML4Co5)a^34p?;7ku z5BpGPK69{#7ei&>VQM3bkhPh+r@Fv*+V>Ef3{Lxa#Le-{OR40%Z8kZ|bLJJyxkE>G zA9~P-LURU4jpnG9l}4O6@V|)KijWI!kmE46ee|MleR5r&h4i81enol9gW5f0SF&|g z7ukldVLodU8yNPj#p+z_k@4CcNUzg0>2vKBMC_=PIB9KMlCtk6TYS30;BXJq1&8Oz z+8k7yQC=_*dRGi*3$z7dXdu5|mW1s;EYtdZe5+zDkQ^5NPL87!&f z8)lp3l2aOm90u16IVn2E5@+%w3*WHXJRL+u8J#GzRU~*ypd!yXilVZpdO_8-p;jkU zSwSC)%C~GO&vq)jxR?`#<0{we&mx!qBWrSu|x>0MyxJ1u{X#E9!7cLfD6Y86} zKFQLBp~!wq4*J+v8hgA zZfeQN1rj)iIcDhB-mMSE+x>ZUUa$A(W=rYhTccI<3<^aD(5~#K^r6sPAb6=iA6fb= zAT+V#$1RM=-<4%0sX>DZ&$j7s?W-?)F&WdwQ;|JK&IVjjiVHjHEJr0vlNO7s)|v0( zT%(O5#(j>uD0IC5(7B3;fu<>kUXv82F)nP8S!Rz10#v=E(0sC-vrUiLZNDnD+WP*j z*7@~7WmNLvpwmmC&3d#bSNu@>HE_pTUBcqUN%=wk%5Wmat9g_cgFYVFCS-g`?2mZn zslvo+{sa#CP-MP+!cEzg@`y3oI>3(LUwMtu_mnBV6)d3iQfdZBXkbd|3#U6@5X#+J zQsmZ283g7SeO!;%MVb~+;#un`6`!#|A4)AZ(8%FIbjcL%;Q{6`=|gd^;cLJOJnq8z zMpJ2ckj4uBCXD;HX0&(+;`RJVvtD7`w+SvMSA5%g$qEn=uq-E{`sfRmA#%qyxq6Qx zmVID}SpK~MyHIF8WqgMSlFbFQVmP36lx@zKz}XtPdZ;3L^0{Sil<;yK@Q=8;c$m{O zg&An$yyJRc(1#-PnF_+SeGX{2cC7_a{i!kzaLkRL_=RA??_N52bQ&h-YIA@f4yMXq z{@S`g4fM#-h|7N?&%LlkBl$=i8GRP6k4LS|7v}&Xan8Pg!Sup$9a z^%$T1Q@Rq9C{k}Z|I06(h<49b95mhTra;BnAC?5^LkG`6U!YV$(Z^~BydI?(e6i;5 z6!&1q_{ceRy23l-dLwCOBew%Crcukk?kUphQkippaxq0J4$Lg-4NTl<2Yu*Fy`keD zhrg(#iVHf<25K#!LC_|toCh$rz|O02tCZ&5KIme=V2jF*3zz|{r3;JHvGKO|4M^_PD1S~peLo|e{S98_gf#n0?47{v!}t0l^z-I?T#W&`GzED|^3 z;UZ{6(pRI_Nf^&)xSSVhS=99?lFx^3yUd0@?nTcBp=&;L+a(UoPw+G}B|xr^68iXi zK(00-jwFiq1x{PhdM}>FC%QVr67XR*bcQRalnt5?XzLQ^2bT{VRY;_{N40f{LtkO^ zz?oo5P(%?)m-z4C%ZAj~^k~=ib8(F0a{Vd0*#x(7wAS4)4$HYMH`6T^@C3AVnG0RP z)k8vNC!np%Txeb*%;U3lnF}pk97oD~(AH%xwA!pPBrJ)qN9z)Y{y9BcbP2>Ju&qxV zo2$MJ>PookVBxu4jv0@SkIQsZh;NPj>(0Zr!`SA{J>&4k2@kD7`W6VWd-+5QQZqD5 zG;8?lAGD_y!{f4SvAD_uxoi4S+=6ahmbh%uz}iP+eE^}+9OVH<8c^zLCrfIP z;|VdU7mCNP1EY9X*&+mEsVx$dR>E3<8ZutMs}ad{8uCoRCCLk;?O@xs6^@~gMRwX! zSblgzMWr$3SO%o-(*50CC<9zgYP>~!eZ7CH9V~amkNq^+R(ky@OIaXGK#y;7%6d@C zK16naYn0qOqiwWXgoPf+`mSv)0UCyyM*X!9A4y`LTe9e=J1T9;f z@$s-qPPk?{qlBT^__;h-7A==kzrR5bakXs?M+A>b!{rJC&xReH)Dk|SY_63)^-16EFAYuKMEM7IR6Z4;8Jp(%e#q2fRF zLThZ`8>i+I9XaerR)p+OnFnqwf**PkJcp5h<`}y4o`LQhF|MUud(S~vmx-&Xl0e=OQ3 zvESP-Xo4^&8v$2mE=$F=6QI561VqrAJqs+2aQ`5^XQ0m${9{u|LG-~cGR+xRXZ%{u zXm5(ntwQ#kTb&V{bG7(rZ~9v}|36@FyMFO%?-}Sw0f!t)*K$aE&p}r|{j1TX_Z;-? z9JN+U?>Xq|GjlcV(wn05^G*G@Jzmdtbe==Hd)&B|bnQ(^=K?9)^7SI4z2~5RIK!xT zHSN-S2D(dm(cFU=+3)`9 z|N4)A``f>H|Mu_y_OCr)yDQ!b+!m!CN8cJSzl3hH4AC$sh%!njg)@p=m5R->?cdT$>ND3&LSeasL?P$;a4mkN+MY>iiddl>~+C%7nPveUW;YHes9v6Co^vvcdm1 z+*kkNHwycu(20+c%3)z-6;J=rd?N8SJ#5>F!g4o6336T?$MM3--eHt;*NK924K3g# z7I}n?O0vYyZJHmKQtE6CgYP<6vE={m|M@F$>+j*L2A)uoIX_Yqr$nTP^W@&tM)M@NE1dfRIH|7t0=RSf7!@e+*n(vwo*|?}fq~yc62}Y0cYX9Av%`8JE@~wL zg4{X@1)8sEd*6!jAxA3dYVlaBqM|d%7Yd$mj<}b`VB2OFmpKEr^-_<)%4S=@QE^;M z<n;& z9m)dd!YK01k zQVk!Ch_ns+aBNO-`*YK%6Kjr#$F~)ok&zdb@rK2MJbtuAoiiO6drQMA=&Tc7L%>vp@_PBZC@mG>feGf-wI3r`V>?PZD7=f+2qu)FmWns=}kz))k+# z5`KnLgi8BT{+fXqltLfTsin}nJgK1^@WCS=$9@>|G6HSR*>TzAkysMGX(DJYFX1tb z&4q42dbj;fI(_FlQ6_MLlS{HK7-tn!TNjx|s?Pvj!D;?o6jWQM_M3MQ+VNebiws>M zHHrD7#eWIPELtZ@IoCMidxCHfqH&ZT+ROq$OnUhQ;(C^0kHn$W%U96}hhh&qQHuEl zYFti~V1P<6h<2I*>T*xVxFD^I6{@#2LB-8!E@b;sl%s?w#yLFfL^%mGFx42jgdr@%C4fk{zqgY!P)h=zm z#u4{ZpDxa(j-T-1wQ}4xbHV->dj_}x;G)pb59WYXFms`=<|2E|zdXW-WbmDp9BU^pn}Xv93JdRNkKx%k2M*)=?% z@u`m+2^6($j+>A80#J9dJ~T^D=;{F}$I^Xyf{1<~!EPcW^0^9B1*!vWgWY=9w4XYt z?zw^AQ{3TPa})IBQsmynC`9H`6-K;K(Ecqr1m&B<2Na#%KOp7J15|Ff4ululLGwqU z(*m7zafRSN2XDp)N_C1Jhg5WvC+^c-pK)-4O&$kd7j^!K#Fl|iuLs`snG4?eXHL1t zLdmJ4=Ui}T6fgxR)(P;g&s=bKT0Km%rRx(1=fX{6;XIDloA#s;hkiq4MFZp^aD4?{ zbx;x!6fw~ddCfjD1{MP3!>{4(R^&lA5k{CfuAG8Zz(Udfbp^REopX$r#wU!L{?#ZlzKO6WqYrS8N^bF;q-*S_*2n(%6$w z=f51w(($&b@Xok2AL1~W#ZG{{z_T~>2%@?Sf7|<{8zSc@O4q~33siJLHwud{mN`}< zOgq~mZI=1FcfZ6@^}a8UcQfqicuuznpUU&YvfTaquW{)nuzZ@14!$5vp{Xf%*~NomZerH;T$vmqmI`=t%2ALP2bGaW!U7l3dC}C%`8j z^R^Icgq){-97`EjHn<_<`i*P`8N%ILclvJS;v2C}wjJ6M<##=_tz7<);ZDmB%>h0w z9^oCn5H1n#3w!)BiH(4#9b0GJ z%7z|87I%57Z{s$*VK{}d7rQ#ZWk@_@j@QqD>;8Mj_kG-L ziACstM*Z*^^lSGS^dDT3<7?NL>plyAgBrwz$#PneK!6DOt~({4AA^&026IqY4c#d^&z9{RuJpKg^$fe8p}&OBKqTBC#-Znr z=4%qFI1cX&Zr92`&gRFXO9^-#{Jbp^)#ohP^>y$r-`=&+q=rvr<={BxjU#Rn^le=h%>@GEv3hsq2@ZLJO9sEz^{(z5Ng18Jy$TJ2i?%#vU zr_!x28pC$@T<@Qi9~MVpbaQ@8_#XAa3EwkcZo}p4J`zBnM2oS{O0Z=KEob&R;94a? zi=HV*zI4p)>;_z={MIk|*I#Kn+9i;{?==HntE{WriW+Dl@Y2gUw=8hDrSLz)XvXU% z^iJ}KPVrV%6(=}$jB4Z#i4t=d*Um z&+x<8R1lofmphYmg-Y6Zsy1gv0MB|dWoYUpU- zp?=8A^P;L3B)rIE;U*dTaE2WW&-lbAe;OCHtRO=}=WUPPws{Ko2HtAbE2J&Pggr!f z%jL}J;q2jXM0m$@Y$3P37OoeaI(`6XU5}-JWenSOSwR1e9I%bioOFL9i@`ru$wPwx zntcH`Z!XJR!~6an-W-a12MVjzd5Y|?T#`A-ZOp?4KlYeJx!uNVw7n>|C*j8d8y@v7 zeA{b2JnTeL4=Kj*7QXE@A70-+Jzru*ecOw|b2Y8^A+k|fl9i>NNV{uLc;w=swd7}i z5p;)Ml+wrv6n+3%g6og(UDmNdUL8^85PjNzI5_w1JmHKl;d0FuFoVN>>$5L;(N<~s zAS+fL2R*Wd0{PsGT*~kKAt|EBT=hBk9l~begqXGD>2BHk?}T&54ZQC01=TZ9ZwI?4 zn?}JuYis+@XL8z`Lc}L+P!A$oZmV~dAGv6X@0#~Po4Dsho?MqnmO)Fq3t-3xeilF> z!eULO7{eE)TU|l)^2EWYL8lS`1=`@*1`lzDPL*Pqn3%nC2Pv1{KZ9q8;j(*uc_cKTS79~I#bo_dchk} zdd;9Yj1uVt!J$eFi3W=o5%xx2&AV4nBDad1?xBP)3+Gx+>E+yzI|jDTQ9Q3tx7TYv zy52eHqIR@98eFd%(8US)WpwRD(fMhS$3BL9(JGaTaqy!pmp9m<#^wdXj?ShFs)WrV zEKqN_e8nJV;A(;s+B#)~;?lQ$My8a@?n18-I)mHGgEW)yC!?3|(j={k&tOSy0^x%N z^IY>~_!+>OGX>S!Iq*H5Ip1~NCl+nRu|gD)*deH-aieEioiRp<_KB*avVa3f3R~(! zSP0D+%ujETfHu&vcV^CRD8*Yl`>IhDJLYcffV*0WRDfRuO@sxTs9Kq?Il(+sW3ipsfeD3l)ch= zcyz^S`NTz3VxeT<4S0*<9i`N~Q?4V)=| zDhmxCL*|U=oZ|b{+yVEYB-TqA5dw3wkPB3SsaVf8pv1NgQVg^!+R<$+Hw(sAcn ztmn2<-0l7iSTtVO8om?<*4w$np^~CA!an)%nQUt-#-Y(+i9hA0j?>KVW*U*v%ZK`F z2%p1n4C&%=TGW<&I4ce%j+$|LHPPTwI>qVbz|A$l(kTwiWdk>W4c@_#h-HHAzSCTI z@B)qkTk)ccv!(A8hv(|F6-MVLEFl>KFJz!D)d;!NBHc^r+a`|>S0z6p(F!rTZ3(ng zh(QnegQ}`<=G_#YpqOZL!eKeIs6G* z@nRM_R5UE{X9dq;NmGXtAVuXTj{PHS3Ob9f&d9(tDf|#ioMo$C!v7z=z1RZd2Vd%~ z0RljMjFgfs(6T692OOj>aMXsu?i4+VuRl`hv9j^scDu$rh{#9UG?#2?n3HLIf94DKD zeASDJMdadF*e?)D#Uu9fh*rsQpkLALNBY$+MDxJxO~l8 zotNy&Ei*}~^Z54BWQpt}5657ooQ7iX?XSVGxs^0&xiev53{%(s3Jg}-Y3LYy`)e>r zI3x7`H{r$2l9#YabRJD*WPahX@Ii9_dMw`fE{px`-kHQ&df7({71N#gkWSF5~ncX0aF zsC-*t$NBbj423WY)edROlfldBux(SM*g@Anj>G z>>3Qm_1*sAaX1Foo?_t3l}8kmNCa>6G^C(^5|C+meP*?q3K)EQIsiTi=9)KjL-_XB zU^vWpTtsOMuKg7lAoxSwF`RuL-3!-XKyoWEn!yW6@?2fVn4rUKBz5l4dGPJ&82I^c zwLH@t@0zsu7{#M8$J*I1&V?b z=}!E}SjC*eAbfj@ffLD9R~fpJ?$em?l9_Z*MCBnh%X;e0=(Rad(#TB3zCP|t?jhSoF>c7 zWQRK12wR6<0JW-<Qib73!?_uNG_8w_13|v+5JkD)faikV7!9KVfTyTb_~#mk6rXpMYh*o}H>m zlHvN9Pyw3NwJ@kRbX~_D_EA?4upc0{8gxbG+NA1)0p*)TGPQssmzJ9Un!4T?V9uyd ztMj%SF%$LoIJvL10WMH!ppSv&Y{NN!%(^wIBgl|3aHP0a)oeod2Jdj{yAXlBLuLYm z&EUdN$q`M#7HlcRF*1Ob^YCjl_~RP<+BKx03nu_~e2<_9$9FX@aBj!Xu1vaFFV?L%(x5RogF zKX5cTov~cbM%L5&^=yum^&02_tLb9|Q07A(&e^iE7~Sa;!o$WPH8GGp+Sg-C4=aBA zgq!+!K2?UmHaF<2z|m~vn?;?r`QuzeOuR7P_5oHiubc`6cEmT~;vVi!y1No&5yk#79d-48VgWAplYqNtE5Zr8BiBc*B)Vv{*dpuXFwIFhNNJGtzb^v z-2;rF$G8emPKJlk&d1Hu4&Pu`=PaUdPTP+2XEpqPI7j0<&JqdstTN!Oa5f>EAP3A@ zaWO0~P(!aOaWhH{&WcHL{221&=-vDB^!PS~95SvYDBt}^*+sZs?cp@*n$bRUnwU`J z{U8X<1N`Oyu|P#A3ZFBKGz23dh=yRm{v-T~PbDXaWyxUtLOW~?aP7w8zoNrM4(Gta zL2$pT+)m&fE_#DVXot#d(>rrDlNKPDnKZgUboxly*zpYT%SY?`pdEv{_}%XutVk*sS(0!+DV; zp#^**l4!FFT}RFuc-`j(M`F@QJ}5L}(P0MvC)hgqVSDGw^p!h)fXTP=t*+lUsY`#- zYd4+Dr{8+b4}i3mNetGjrYmThFfnu;;HTh``M^`8^V-0f%#_fxeiL3 z(C0aDLK=t5i6Hvr;&Qm3!0mb=XU=2eQ}?E_E#HE%{8NTsPM=^ag0Ew6_W5-GKmn`& zy>Bp57D8u_U*l){DQXiPoflmc!fu{_Cm0^pFU^HSE9_78q-vG%ywm3Jr1r1YlS%0ZowMCwEeo%_I-+^J#?}Jm9pRtr6r& zz2BUhk+dp9=1W9tM`;B0VM@0N50@yRd|ezV>5%(kgF(W*=$j=&cH z65+H5L8sN#2v*=@nlQ5$0b02%>^}qqXDAj>KpB5&E(nvz_%ULkua9N0d!hj zi@@Bb;UL;G1?Dr2R%HbId7l=^65^2z_F^+j*pH47r)U1MI#3f6V!_&Q2_>+Z=*IGrw4x9 zs0TjpIMU$5+JWSlmepT<0Yq!rs9+%9kK`|x!X76_t67t&mxqh}*b$Jrk4PQb3Sq&~ zK-M*qS>m959EFC;fIo3CUtIu>a8#H5@DgxqNP%-1PhG2uaG{7lt+Wb3*{6!r`W9}F zQXN5b+bYila>zIERvd}%<*A;KZuk*9#; zcyJWY?x7_d{)KCBG#G_=b_~YhU$_E?si_9zuoteuv0WdJ)TydKtC@e{8XQjaCJsX- z9R7u?aBMaz2M(PNSd;Vxii3+fMaS6UFkF_2luHK=fDf%hegE#5Jswtd!}27T zhT&hh0>>P(u)50(oeg{83LHV9J`_hib>Z<>;0Vq+Lvh#(6bBb4n(1aeoE;*&->N=( z^{<^k{S$uMY+VxQp@Xm&t{8;VjSNNLjdgt0aw@rk#lsQ63nz6W?x&IogoBx_y+EnN z83=UZ2rncV$_qPhJA)YuFHjWx?31X@`DQ0+0N1C;x4wkKziJB%t8YJe9QFdm!SyY)NI+o-mIa4`7mkvvr()L_38!r42unrgR`^ZAf5qjs zjsV)tiidvUely?uQf7iurDQ}|Bcs{r5s54{o6oz~C_x_qwR;H{@n_4USf$!>11;oE zxdD_Qv+Gnxz%a;z#~&cN3lZbO` z(bjO)lA|A9z53Tm^jG1s&838bFSyRCXbM_i@Is{o8vxHuIuqwXD3vTRdrE&nAwJu# zT@~6X{ms5|0R=3OTKowUj0;NF_c@G0QE0o$yTc^z0EU7eM@V7^4f^}0miteXkU7TS znt@-rc61PY!&(;lWO*8S{MS{pn;c+JjlD>%?;LWT;XmrLW%%EG?sUOd^m!m;NrWJI z87XA0q)B|M;|@#pfc^A4%!JgEcU&=DDNh88os8O%ZA{|}fql3;P^WF1INsYm+$>Am zMZT*f%>>q(xS~q7qxtmvm!>V!nH@l13YPn}IPFVRWGdSd zlEPD@-NSaqS3@7@C^u*i=p;L+O&u4WL$5P^5yhaKuGINH4Cwqd7z$(H{L_+3KrftK zA^qv149T|}ZP1QRY(MzJ`ap#y&?Evc?VbRBXz!&R1U-IR9Sx6ceFbfXvT9Q=C$mRNlb_H_(*Z9u$m3apEG!Li<6taO3W`JK zEd64q*N3|XJ_!gnFJGiN!xh!M$OXA?cGx*e7FV&OvgVX59D{Rn4oUWlh zxLOc;)y-sz`b?#(jgG)tiAz5s0IwKI_jI;czK#9Ml;GySrr-Muaqi`41pgW6lh0#tE1qs=V>2uD;o8nz#oGCPS;oaV z!hE9@j%B4KPNC6oy3MXdu|&v_U(9_dy3NWcIM;Cs4`n%+fYzlj8iR)WIoQ^fpP2K>CjsrfF+5+mA~MgfzgCEBdR}J<;~+f22JXt=~nE%?hF% z0m-#@=DVP)8?2<$VcAK-T&zhYhINF-M}EE5;UCiuZ(#36a0wEqIJjZXAkJ#aY-A}y zlXriuZ6d%nXMafn%OVrexh1dkR{8o!(xak|opxWOX3)acnDw?eWsu@~V2+#lbcCs+ zFgXPd2b5Thd!^8!>w4T0xHEC$+3d}he`;xA1m>3?pI%1b z2mjy*xHcH+-^78}fENjUVe&vStPD(Er^7aRoI&JO9&{(mDvAbh7#|-z6gBQ+7tSdXK9mLKVzq^j{9r8M zjcc$V4aYsK;>0PeKro!fMZo7K6+YD;+;SDQae0)pLLP2;b8*@tki>!r#7e=rUUnn3qi&mo$E7Fe=+#M6JFcL$&mxWbujD73 zC8p3YNh5`A@~HKhtAI#uxBxsjmx?nXEcNrY^m+=Mcih)`=xBgc?8`kXy9FVB=tvxV z{5WWza``goZf@ojG-uZZ_d)Ht+}_N6u$gS`5Rpv0m25iSVkr5YVlqXBGD!Jgrzj5# zcdz+5a^eh#%)?K7tZH zBXj8*BH@iSr2Xe}+1#%eT`!u5F#4r;AcQlhSFWXm;edM=$^B~5lbh6Ll2aV|xFtMg z88H&~E!U6|gM&WR8wfB1K>LOibYb)JETVzj!gSj#qI1+*JtPU{j4Ffqt;|cvoeB8M zcYlrlUN`%9uiw6V{Wtpe&!Zv8){%$LC_(`iTSj*2JHD(ITV0OYZXN-)zH_}0j)2UY zD({tqn#K1bRX%MFI0;A@Q2aI;>uE)AM2>hPIc6i@qXdR^sJnRDMQ(XLl!c zoqOs2ifsEa=zxk>a3Czu_e;8~e_x;O_s83BCOd3`R6a?^tq6eoD-$oz~ zQ~Yq?E54C(pgok4??>8by@)-r`ghWBxVN({CCGF83m2P@0v8hfM}qrt=+HEL%ka&3 z+Cxo9C01K$uEnV5{=_vz?eQq?4t;CRrAlW`Xtw6KkY@f447R$^v{`zIbCkj6nhqQ$ zlE2j_o`?dk!l|Y>(uQ=c6oeimZG#c1*nM0&_u^k(!H)tK4$i2a33|6btrw4+gFF-T zd$$58L7q6F!P$*Dj@g73U@tIJaVGV6BG-opXtgjOJDeT3x6pp`#nKa^5#tEK8Qply z^a40U@K)uINXO3E?YudyB@q<$T#_!x!x;cvDG&GbNKnv+`xU(H;QrUwl=mCcQO)H;%KAMk6rNb3G?@ z8dLD<7=bHQ$7yVLhSKnJsH#4+{s9J_OGCi`=^RIJ%jqaQ6+_2&EHsV~^b;rW-_|cp z37^7VAHM9Ql=xKEA|8XyX`?l|-Pv>jI$Czzms9Bcb`_NC@KEU`OK3>R!s&iIP2f~} zMD05e;vxcTOcC(jL#Xtbk1zB-G^D`!u5})PX$g)nuc=F*Hl*PB)zg7b1W;KpDPY8> z9PTOLzJ7xsx#Z8lYs0I-zdzUKZkR-oEZXpD@G8uASWOXpEA^-Ay^lD`Y6pQAo=khs zMS}Y|>d?tz&;5|Zu}6KW-=9%#XIqH_h|}JrJ?CrvcHKaY90Lz5Qh@sgPCU(hB87zV za2XY~LMFS_WPD#wdr1ai@(o z(g>1hQVlpiUwxv|dA&g_qD#dbrZ*ab&sFMjnwQDbi$x1P4Z+gD*!Zq`yubn(7(F7Kt}+fkfrGrkiSP*??A}X^a{wl&vKAN z4y+i}DD>HuVm~!_pDE87t29`ZVoj89aEFF*anCp%-@8 z@5lJ5{Pq)t)WYPP5Q59*zMcrL&3r^;Mu;P0`$~jIIwem558@@A%js}D;gxIgz*FOz z@dzG$h2r77ef0=?(B17Fsq9`LTXRgZ~3XVeK+vah*-yfttEefP6$iDy) z2;j1@{cCV#>j^d1{9BEX^UpfS1 z-G+kifs^b<%aJ@l8PHZmvWp#=p(Ei(IvZ$F3(7McTKe-E11lwGY z=BwF(*xwEIh?2vqWk5}iVs>(ZmsYz~%xGKErTC;Fm`l=yAzVG9m_y9v#Tn%sz?BkK zhlUbOoZi*f9L`-IjP!i>q;5{pq&hbzO=ZTi9T{Z47G2#~)@gAuao-k;%Nl4d4yxZO zVO9b-`0&Hd1!pK2j_3;EeO@*1H}h^?*+32jt>2DZBe-iMg_y0+&j$@PJ?}MF9uSvO zm1gZ?wwcV~05@8~RR8Af8*G-7i}9PE{~WGm9|d}?&_91Zbd|Znnpsch>$`_}E&j3s``zo$qK#xS*Wg9Nz)Ojq ze(;==TVPLt2OMSy_LYc(9sGRD9FYqwN1ksb;sn}eq<{AbEF3}e{)`0M&Fl!PONTv1 zTUOhk@Cg*I+a-#O&6ewk`nF}CD%P1xfJ%=lJI-bj68oVIi8Xe{S#aVX)}@Y2irktT z#8>X-dOCdszz?}6*YkUf4vTFW_1S5U{{~Dl7v>U|E5ttDdGV?9zGoB)X99Lt$wRCPxN#t5mO7)}gN{ay~T+1h*K;6yTb2rUa zHUTyY*OH>(`_~91rkf#TLZ~seF-1_Ym_o8Zx*JFvm%zJL6%zMR@Lc3eGbm-0d0%hO zSe$)JlQV_Hbu0tix}-Jdc`Sq2+T?~@;#?HUz*{?G3q$< zuKv)nl9rV2T$7@g?ejsho4PzFY#^#OP_FD+x>P3=3qN^-DWB{v2Rsx!XRbFk4}1vT zMQT?s;cQg8rzw`KB^^THbl)SzKD0HZ5zO58QZ{Eyill6FZ6uh|HIVNp#dvs=r2WVat9 z4mWF9A&RbFRgh#AI&6RMUWaBV2);wglFoWGL76jS7ph!Z=^;DTs-E4-2qMVV^CvO_ zgwjZ6u?l5kDlI@rfeVsc<_Tt#b{T3lz?qcvyBo=md6gy%wEps`jLO0=f+zw>O)7Ws zs2)r@l^6OPByCs0@bEZa&rT!v1NP{6{mB63;Y5}jhW8FKGjRf4S|Dlkv_WDRwT(wq zHt2lub@I+&%pKd87#W2MW`#zgpb`8JP%v?-;6HVJ4z{o7f|rhl`irGKA0u ziro1e@~Sh2q>Ht{-rzxas$=MZO9*t76q6Rd%q-c-#wEDil>384)N%e`I0NUHNw4)v1q`5s0(@EiTol69P?Io1j5Bg!cRq(HPq~@^NV!T-2`EU*5wE6(5nq z=rLYCQUAS*nQvI`Ki|e44Rx1eXneybqVZXWE|11Hd?FfkBErqB%#_S8PrQw4C^k!z z&UuCxM5Q?NSaBuG);TdPVvv_I2gVWZFC%>+ za`rMgfODqp=wEde7Z}G-h-q*%vZ*4arYQyr;I_VNOeJpvfor zBad)1p6Idq0n`Wqyh`vX!ZqCiuG!zf*_@9&Q%9Nto8 zYVe#M+IJ`>ezKV-!O-!TKfz|}G^j>18xN;hp>}XsM@MJ`=CFROPx4b+SIuHJb;nSO zgP#vzH$}gz0wVv)Zq`gF$@r=YS9xVXvZ}zfMAv}yNyi!`Fn62BN>*?L)3z`dy^Lpd zwI&Ka&qNfOD)=9|^?%{wikLnyM8tJ=B=`dO(3FDbTliLdwptB@?lx8RK%l9QkPD=U zLz?~RFMQ8!x4~LU*uUz4EftXj>PKo$9Yf^U<(pQnsgA*v9sM(~M8O6m;fzWhq}pNeol!&OVm$ixBs5e`kX>?8OO63XkZO)10S zIx}CHuw|POZ1=6k0o-j5o5^F6_{S!8$Pr~ODi4cU{l(}ok=nT1^->r!rO8uaO1;rE zL6P;7AA6G-OjEm4WCQAwL5MT5Mt$3ppG!$G&kSYTo9uz_5*E2akhsfV0e`mHpIu(r&f%RA37+6!x@g(M)j9bSmzNB(y1dj6 zh%u}saS!eJGaxrBoaeWaYKTJShsEY?oP8$m^tO^V)L+CFJ7027Iiz@5qIWPZwE+xtWwE0liHIMtdkjJ1n^KB#8R34t1F7d@=p?!lct$Iy z{?t}bU2smv=OlP!@}c!1G|>D&_#PG4GfPY$ zkKVY%#Lyh(6`Fd_hAZHEr-C@IUku+jsS26>tpA++v4Mr{2pt2mt2sTOczv93CyOIG z3uw3}xc~lZ$HX+ggVN{uun$YPqfyxWbm$S7oz)$VznT&WApq_J1e)PW9bu_d$zcDD^*eG>`2c$IEogd6M zJ?%f2(j_hx3LZdf4X0rMVm_MGd$?P{r(zE!$r`%6)JS0i;N(YbnP%MsUi5GbzLrmd%xkCAp*=C&?*rIV*OUS#@vOErcgjvPK+)Nl@N$N9}v2Zd= z*r4kjh6N5;;f*V>1ch~mB@nAS7PYVS*ueNur2561H+ro1ajI@J3DSXgBUG(_YBPlx z!T6q#1FVNp#eU!pK84QhcoU>!00z{h&8#t4lFW{W^XP63FIn-K)1C1N+Q}mZ4|({` zaMdY?BI(wuyavf0@xFscGL_bz?@}ahFdEM^&cEDG)uHP6OO@b!O%hTf=LRn^^XDUE zGyfJv#%&RiLUt(ix-VUUD+;O_iYtq+N|ysa-9c*GO z_ZUA6HkS*t0PYC*c5+-#=2L7Cgm5#3hXLmuPxa#wY!~b6m6Nz@Ax6kgkhwZe6FHCO_+f`WSu=z>tRrzu+ z=v->m=xkfaHK`y}9pFfI4|xfCn~3bPxa8qv*9sI2cwDJMo4tE|dz_+n@Q0S}2Aucb z$A^qX!Pjb4NJMua zzX}&Vq8n=Fsl;^WanVMh!SJPFw{yb&s`J2o~A_$7wYJeebT}5(}wuUmAit#^LATybh~Hpw|*I1C=4+r&neJjDSZr zKq>ZIo!4}#FBt4%pr?A|&hx{GmK3obUjx)x7V$SUC?ofS?_N%Z`E0gclqOPjrf4y8 zwrbC5=GFpqDjCZMZj6JL%_Fd2lnj-4K=45g+0j7m33Q9XwW+xe5&e~ z1}$|9KN4u^`mt`a#ipB|^RJ$K;~8;W+fm3oPKm=gu~b;Qg&qzLc-^qd90iPNQf~!7 zkX_0Dj592%q!@;xhOfAl=8mRA;iqV3`HF%2ul-idODRio^%L}JtB5QzPI>s=c5>j@C6{!*-yKvfjWk+TTLlmC$?U)dt{2Bt6ggfT z6RO7^BI?=H@P)g5JgrW5`DG!QB58);j*Ga`PdIjT4}?MB zH;A}!rqR~mnObfQ3pcG!4nCj6lIRlxCJ6%bEk~L+0S4tf4D6*bL7}wXLiG8wV8Xe6 zk_axJb<8%0jfpG8&cuEwZ*cpeZygyBjrH;Ey}4g|vwb(HEli6@u*RWU10r6DOjb4o z&IJpBbGBoSXBW`|GWU{mslvwk(8hD#2qru~ z!Jm9do^ZUtb@YA=(kBz4U!g`a3>qSuq8Uut+&`(~X)ylj?9+ z;gEwSS9|^gfRe{RUzlTsDmIpXe)HxZztl@PK8+r3r}AgE_hxa^Eg4i!k37UFfET@j zg*ZX-gIf)A2sZG1Zu>*oB2*T|<}Pb2n9We}?VB1dBjB;&l3D2tI6t-!PBYz4j`Oa< zHb$Tf&86%TtFgA$*-htxi@hRKjHky%=b9Ga%LQB=%is^)yfUdMzr5Zf3oRHmq*81)NfSYd{tT$+<7S;?IeZ?m zn|g-Sd$>!A>ITK-=LoAzk`@~=`2E^(W%!_N>bh%ujh2jW6bxqCn9_#d!i43PHd6{) z+RiELYv?XFdIUX8_Yb2#{*V2`H(FhrLgia1GmJ&_$PHuL+gP_~v&scy54~ism*tqF zxZAptHYpF|UYg46QHfl0V@g7b0{vBUt?4UW<4V2dD5dyV)Rs4fv~gJXqBvD(@fH{D zC2qsVr0lJci!%fXlM}OatE%qKhK|5DskU0y9fj-Y2>4vjR=05()(pC9F*?nrWB2h2 z=vk51KIpD7h0d$T2bC~u*=IO+=EA}mX`Mu2+P567&B#7bvT*n$ zd2S$$nlwV$YFCCFj(B(cRDU9T%gO1%=V>`@>2ThY*-YZz`>$QJ5PU}0r}}eBouOx= zGiXeZEBdq1^t|58<;s#3IJZ7u2h}tbfB5>_Um-!+6z1y}=xYb+Z+6(ANc8v;Q12SJ zl7Um=s6Eb_w=k$tsC>gqb&hRrlL%s}qq4TD#44emTJ4;j;4;_pTu0{BJ<229gMo~~ zC)#y>3G}`{DS+-nT~gSkOQRdm}BIq%k!JTc&81CLFNW8 z$io!_qAv1j__3dzM(GBv1B#|r%kT()OPS^KK~Tgt8QYUGq&r!7x1Ai~SeS@jzQw!O=L0g0%7$*tU2Suj^2bWeiw|I`{wj6i&M%xASGL6EI+(U_!>X!QZ>TthoL zNNgm9D|yp6i80!MVO0q?S^6fzNEVax2KH&`PBao3xjY<+Xjs5JlVGF;5pzZVqngyP2*f77I&C*11taL(o4LSRRtKPIm-CJOt289D-m z#0o|=c~dP@*2o+A;m{u?`8DF%#^FPY4F<(TIos?lhU$TRQtt3 zK!*sp#JkC+g+rH%P}dFB?0cHuZzl`u>owV}1nZ2C)df8N{~rX(B1H zNm2*vJ)Z?znPK@N-B(Arv)HL)J%>59LZ}_0&7~N+hV#>L6sRPr>^drtXcW#ICcAV3 zbN5jbI~C@DQ|T6=E|P<%RgdZ}m)^(0S+1dq)k(cH>5x2}J^Co0G%V-_FBs3VNFeo+ z^zG9kS2h=1)6(qpnClKBLg2p-HVDT;ub6~1Bq)aNeIVTaK_wJiu@iS;>pqvR{foHV zi0gM}E_%_p)^rdT(Zo}J2@P6PGR+7;=m(g=nS!+7oJe`AD zSsIt4Na_W_530n=b@rXr#kYr4yWvchkE^xak<514xI$~(qFf$4I5eZaKZ2JP4Bmh3 z_QsgmVXW6&wwZi4c>q7|1|$a&&0A!Ai;*?OO)M^JCOwkpY3lDAys5I9Ll=jcY;d$r z;*8%mo~Nj!dvR@1k?^RmpwEv%C z5zAv3M5&Vt8;Ifv0XH{jk*Ob@vOrpe<&i?>$~)ZAq%NkUrz~sMe4|c+%Cf$e>xp(} zSSG;3SWJVm4I!22Z_u!^;x>2#iuBgTXd@B|$RjW2v|62E(Ai9(@yPw`A`fn9c))20 zYtmP__`xRv8eZIQI*_H`q8D`in2)|gS=ilVBmYLjNMC1D%qb)e+|B?phOfgM+O0K; z3pz|nAyL}-2K$}5f5Llu3@s{bn9xb+YWhUTg6Bs6eu{=m&JwEO!Zb()>36TcYZBLS z*>dvmahYl%=p#DnGD{O4>jBoaIfeJJ7MwR%aN-})r>Y1xcjdv zYafl~MrWwBJ$L)NNk>pq=%$pC?<$cN^W=sGBwLKY7JyzukWiy$4-Da?m1-0EO-kH9Xm&Gyh`5uCIoGZ#K`z zNg|vu55TM`$jK1d&h}n$*@%4eCm<3J4djPo zo1BfvH>Zd=>$OFY1)g`ONbj=$R8N1qK7FhH@82HxqU)x3xH*u!0cS{{Mu#P%nx31= zvBkoE2 zz_~bj3Y{NQ9fy*h2}iPFQDY&yz>cbzY{DP^sgy@HICI3zqK+(M9>{KZPx> z1PVwB#e%H!MI=yt)Q>23HW0~NqN328&H~pZ779IN^zvz$CHB4Y&JGkyL0otbUzpAy zq?MVNlv0f}7&%`V$t2-S@E_VMiF8OFeuE2|t?{<$C01w%R&|2Vu-I_Pif;%Fz95TL zbyXT{0ZIQf*=(xW>~N@7`~58?5{I5ty9+c@=zSIMOe!%NaVEQ!ib!KPkv|?zxEQv> zh!JTs6g#zchvWLr9IR4ALpPoGo1HwO;FMIXL_$XUNa@3sdEdd2rS7J4k@0qvU+#O{ zKBZaZf-2UtdAle@^%O;0FESDDQmx*N>w7Fh^-r~1O~&{BIT4f(Q*(P%flsltNJDO7N_k< zF*I=K!Iy}Wcj5vN)Ui&{FmO#Z3GNIizOQ#0E`VGbqTP5a>N>a!{Va<(G!z%8qwC4k zelEX@-I=T3{QeLB`|IET?XQ(MsVU;td{t&Nyx;Ze&N} z;jBp{W7Jjh5&>=-nCG_6NsLUJiU*Pi5AYQ_)>EtVnn*{*UtfOc-iqU=G*iXQFw zjgI2gE6zGdGMRv(I~&3KmlUKh4E%OpF60oVT`tY>J}=Z`m#)e4SNM}Js}3*edg+Go zWngc&Y~199o6Z5b=SePC@~`EZDAtko!#Bgbe;K zDWTjct^S5%D7D3PSW>t+O*gwL2ws1*o265IjLmFnJ1CEbUT^GapRI|?DmKm8L!vJ@tdFj;)_i1l3vNfQ;mj{ z>KEoKwCki^AD?_luyjLx6jX7d1Dm3!QO-|co7m%kWGY3<-GF*Ie>iQrsWGCtca1HV ze5IK&Mrcpxo)gQ1fD{8`(m6`c+JkDYDm7_OQE{dXR5(XU8kS72?G3cCF3_fL+^cBea?f@=Yv#XoscXlQr;o-qsHz{0+Z+IK6`@-xk+^pvifM{|)j)spp}>HwC9ZdmyQf+K-v`(e`wK z`$3x}TBkO*sLr!#KpgrxoCG!c874T_Tq$p=G$Rl<1NFIShT#x5%|cRW8_vrj)5V*6 zg&H!>1Xy0^Ks~C;W4WP?dR)wf5RUoXBWzLBR9z)opq=OrQe9qnE%Fw%;c!$>QX7gs z&-E(8WP{?1PQyoJJW#T^buFjAIv|VM?cM8Dy+&Hh;}V~Kwn2)J8O{_jLqhTPr&jSM zz~$jfq0dQF-YhtYo_7V;O`*3uLd1NZ>U4J$>^dNEuhlP{qbq!CEBU9BV>>$bPZY4z zAj-!Jhndd2z&_lrafe2RCN*VAd|`!)?)I^gU+5M!$Tstw$!y`^1~b297Y^_-OwSgb zPvBU>n32f=|NEkdDSSTPd3>^>FwLRGCu_-bAIqsRX?}PcP~PjB(Bxh)IW}{GJYK)>PKZIrhY`Q1X4x7%Y2GK!nnNI z?9N+che=Y+O26dcjLV<7V-YW*T7U^#u2P-z->})??0;6_1v;XBWOlH3FN_iSQe@$U zCm@q}67ew}j4ZtH=RzjMcIOn?4d%_!qI<=QQ$t3C>(8TZdSYAZLs-Afzg2U*-+nRj zsv%tFv5jcQIp6d)(!vtcJ3PWWaSF^QBl}Q6prt7I1=W&)9oI?7f0s;($+fJIZBSYw znD>bLKgGlqQ7)g0E8N>RB5hYS%?9^vWUA;P8lUa>LLY{q_iWGx8s{x?c$|OZq9myKlTW^+V3+{?)&Qr75j!bdS+Atex9pM0~K zqO|o(O6CDeQo1Y-f~F-!=M&E)>-`PpBIiVB%)#D%pk6M!J-~K8RVf=QY(1y*!xh+YQ_n4<0gc?`(E>rhmAD_{&g1`?->z*u@@~G; z%qyaGoCtR+bDWs1x9%=AF1t<$aCr)e3|u~&u|G4E9-WgzM^NY{kW_Ji%*U!ST*&`)j z1E)IYDe>mxU^&QL7%W4=&ELHF#piz(EV;2B2(}bNea{dZExyD%1nZ9El?a0kh%bTLW((gV@M^KdceHG_&^$}? ztZjtmm=|KrG%WnC|9&E(&^3tgMn9q(%3b0cRx}~;NZ{}xAsL!3HzL>b_T}9MsiXFD zB#^>*=iB`_NXh#Mi;;_Surz;EcN}^J>g12A=D0%4z|utR`Jpuj+Bo=xXu)8(noSnn z+%*}VPP00l0HshGpy|=C;kK{g_GPMlr#cpDNyAxK)9Kp*S3oV=0TV4NCUc|Ilc=Qnq+#8tKA5H#z-iL+bY5p zw#>%g7u)2&*I(dNi)+`XyTJ>BzgGQn!B9}vnelCItmSAHaD{NF*E&vL!s^z@{ykn zLxs}k?vXeB@_g%*~lDu@eBDSTwx-fWNc3epR>JPGn>#45`teOnQ$YtSq4JMrH9m78#C5eWzK02bpU1VSIQtwhv&p`OIOHjJRuBne0bL2AW zannEuOC7@*uSN}$dI#G=_dv{$hF6dPUtX!)D|CRuI`S#YPO5-|om5(%fE-meF!`C| z@TVP{DUW1-+>7!WvWojqy?0UibRY#JNRkxS8%;*C*zdQ99YF4&=?Jy-{90Hik%l%B z&S3kZLlboIkt;8Xy%KS+bWB_<>Q;4VWr@J_9Py-)yV2uZw2#? zESS70jvG)eU)UH<$9f(xh|^Hp z5V@=OyKh`#OLt75sc}^4ojiPDFA^~w|oKDVg2FqN%(9cU5@%>i9xBiKb%IhHQWR$L^Z>i4)IG~;G5zX7)Ll{f9Qy& zyGA}8NF+uMSOs7u-=0VJ2Y&;ANF?=7 zKICVjkjC+u$UTC@>MNpDQVBT+iox`PKpxJbx(WiUH79-bU=sPF6j5)O3PaM8MzM*K zB2uHCG_EFduO3M3dWMK!J3~FIaa#W>pyTzgs{iwwU;R#vaJ5dA344Z)j|-t#xc(po zXlDtE!h)ElG@?MV^Qhy|rk?D;>sN})1Q*%5^1KW#_~{S8#rGGsmy0${gQS&;#(n4F zWr}<{`lCYb$o&Q`+?CVy(giOYEno0N*i_li@R*gyG#?W)!Q{pf>7P7&b(ppxS4u?V zvSz7LLKPZxT>N5v+2<}oOHC!}tB0y_6fM`7dbBQ}IENQWouF2^KW zc9m(EqBZJXvXI@8zVQ{8=43ST@RM5Jl(HF#l~*U< zuH+NVTRcSgMJP6xAvP9$Y~BW{e!|$8>ZdhQ;2hmVlV)SPpvVt{aNw7_^K63Td$`}r z-LrasMp9Il>mh<}gD6nWiD1P#v@`8w?Q8M7tt z#@A_NnU6;MyQWGjC)xO}qn@v0A&IbSxL>K766xWxYR?9p4+Mo3HYaxh?hGVZ2igd^ zaP*qoK-ci?5k)FCu<|Adc8B&z{;dB_ove}&&VR7yfYh31Y6k8p2x z%_>Q6jzAIrPhISW$w{ns)uk>T%JKmLG^npx?DAG5;1|HX%5gmn#5w{Q<9r_2@Om-4ioC-eu*z}eD0bVPF z$QF+m$-Gi)72HG=T`cR^R{NZ;NDpZ2lb(!SMFqw_8Cw4qNSbMv3~gchoRVrBLP3UN zloyb!S&Ev$E=ITB1$iOb*=bG=@%7&$F}#?ilFS@7pbOx`a&W><>nYQ5nyHqjJaX6; z-%G$houR2ugph&o19`kKx;{aKf&;sx>qTthev9&LBe#W~Mg2Zm*M+}O@ch7lI`w`c zZi%g;Etv;v5hPCgMJBWlq*DUlg$T~;=62M6td>3VAOP|cqTpbz*ox}49xrnn4c~@+ zelc=j7W`uDHRunIkakgscBzwP!kTE9^>HcAi z=&EjAMx8gYsx9~X<)&8a>b8c{DO$Nzu7QD)WXK`?p&N^mPCot&e{vF@ApDOfHPl&1 zE2rKb-gBO;e-(SRsaN;9rYNtm-m&TzHe4>#`;35*g;ED;vY9pTCV-Lso0SPLR2ODW zmqvhpH(9Mm6ZzYNv??t-3C&zZT*HPJ9T8y)T(>~zC?$s$6^5G9@c6i+L#vdv^#$0{jXp@mzm6#)e$citzOVReUhtTVC# zqLaIsPV&^AhyC*Fb&Vc)gAtr_y10_(dTLJD zq3OkV^!k++L$mqg+>4w*(cq#`3>Yg>A!)uY24vXaUI>@Qua$y7 z4A)SuB@5DBC=vZEE@vn*w%MPn`aw#6LEx&lb+k5&a2F5+axu1utu0!m(cuC4)U!*U z4M8yFTMO@E8CW_Zbl-{MijQA5oD^PmJv4k=cx29$6j|5GE{6#&8KPKEEbWGj$7K28 zTCS}KkKd>me3EOc@)`}DrcZ_G;xRm2gW^2|&BY;i6BKnkvA4IOpx#Z;AVe%#&JB5b zal`H7Je|VGpPdCmaT^4RTS%8Lo}%hhDQ(O$v@+c(c6iwj+$ha47X8Tda5aoE>q7dL z2~10RM}o?4azyFZXb%c1dA`J-e2^a4*dL%{Z!_3;{VAgH#@OeToxI`22)T`SC<7>Q z7)TykSSe>QhG8(jjA;3QtX(7TK!%9LH4?TqqaB#$dNQ6LAtA-OcBAEm;RFjns{d(K=?+a@U81-W2Bw)WFpgV;=^;q!oGmN5X z&N0poXRtBsiLQPrL$_Vekbeb{tz($e;Z!1e`EmGV#C!}LKUyqdgB(+v?RxAx)M_j; z)c%dp3{{?f_sws{e}|%k$msx|jl0Q`GhOLIKGJYzq|RMAN@tH7Vwkhh-cXcro|O#G zaWz8>$;=Y^!aN}N@na>Is>Ft5csRo)SNRN?ZM4vKy9P@HZ^mGa@a3_@lNEHX#-VDXGFUpCe9%GFC{q4+&i%dqz(ME=d2 z%HG!D+Wl0y=J%m>uR)iM)Z_hV z3l~*b`EKDPhM4&5+SrFztb@0r+rWGMcsYIj1vySa(2KB>U$P$|=L1D~uNP@6?-lOH zHmMgjO+ex{O%h(ctLu3^H-?a3ybMX92GR}*vV0OiNnoK{BF>jKN)oNfl|@SDA#Y5y zC#0M5{CE7xmuS4rBtfEWPel1Ns5yEgEN{5jk*vMtXg?B2PoCrTcINGWFPUDi}91as1PjBVxMKRtoq0>@%O;9x79K zYD%V|=^iR3(`SBYO=qI$lZTtO+;T$f=;9V7)l<$Y?}RXE-_-jhn0rFy-sF2qX<;49Cs}uI>>@ZBcSNS|;R}(_|~=bn&Y|mx?+62$dBQi4`Or!_U`G z7GxZ-x%E>@hcQO}w|S=wo@qD@8>cCDnp-$w>L_cgmrJR6vc{@)S3k_(J|e30Ql8z7qMhVd(4y@tz)@ox7xi`bkj`pYuN+s|NEl$S*mIq2|B43WXe^A-MF(;2HK z-Q~I3nL#}F^Uo>|Aesy7jQq?ylbARY>$JQRws25TXZX1NG2P7G^4y0%-OFFkV0zslNe{oa7=G??o#7V&?;7lX zaNOq-_JOP<5Sy`*PQHQ?FR{ULUIHVJ<0WAMJ2Y+yO5Mi0b$yRhHT^|)zmR^)!-?u% zpPK?M6L|FuwEg27r>D@)m&)p#L%?T?*v`Oy{LUnp+n9&ow|D#T3-5LV=*HUh*%amC zu8hnY`MV5K?zg|em9bhL5OlhRh>&^eNcZKr9(mxREh^^-pZvSRae_;S_<_5-Ysy8h zy;q8(y*f{H*=RHky`t+INJkz*#7AuzT-zPHs76Q372Qd$y6LLCx;t}n>mJ^npM6%% zJp@XfpJJ`#i&XRmdH7L;HQAc_Mm0Gi6CP9>d)#Z7?bPN(Amvy+$gvgCO9j+E{Qg}i zawMr~UAPY${$b~hsApm?4c#N2IZ@g1e?pAApJ0a;4xE18ceDIt+ID1;?#G_8M@~zUd@4#EGqpSCGB%CAx{Fha=d)? zcN7yp0D@_!oi;rHgz2)wtu+Zb2U$6KL>Zifc*tDH^PJ&HN!@gJ>hI|Az5=#}|j{*FVRg^BG9F1n%Piw$aQ9 zWX)MW?3A@L_IK{Jzk}~piC0)ZF08pgZnnIodQh^X_F)E4~h~qC9a&>4-=={R0TJ5|IezMq^WZk!rawN z^+UvOZ04`Sg~}D(;5GZFGreNJso%A%G>YrLT}x^Bdd3E|zX62Hnr4Ztv+Il9n6yKt zDUs=tN5JJ<-7ldeMMkm)wI>(WV3aPSvj{)5i_m%^(~nef zcN0y}z=apa%veq{*-j@3&(YsyOvlD7Qc6B%qy8NhFM z+3Px#$Gf)uWiawQe^F|WgbVg=el4DkjBXO`{=K9KmQ@<9O6$?JhG%cr?p`<}BK3Cb zGpNhdc5Y?GqJ?2yy1*rR7lxR~kys#E8veHtHd`2S0_F=NJ%N3T_VDcvn#$?l?x8>b zMm>$TV2h;#*arO-?M6(^O9#U*0VAx|_|<`jgRR$J0Fpcxrb3!2LbgZEaGlJB{W_Wq zp{6{~!G~0@h{af@qKN(a#qqV8B#o@Gd$|3Y;(Px77wyonIsV0GQ0u^^fMYGNrd8Cd z|Ex5>NOfseoaLPlU~n76h~R&labsDb@?4nbUX0;3m5^QURv!l=tcpk%cr>}sMv1C0 z?)MQ@ZH(f3k~5Z`#GL;XFWA&7OUV**f{#t65azuyR-yzeNr!_Pb!k;YSts&b-3wWw z)(bo1YzqfBcu6I2M8pb?70e{|M^uLM1w3;VwpujJ3tAVzp6B=qlo6;1tDiuEPrufGSR zuswRu*xg<;orq7@Wmf!mzJou-&zxyUqV0Pm_l##JbcLP1_DVt_`*qJ8SywL1Q7?A$ z^V(<{xA<&`zROmKVdrY&EJEr+FVw`7>ci}W9zcVy=yb%>9!X{X8qpPx{{b*AUn8+Z n{2fHRFV+^*fIgzc`?79?r!~9v;eg!y>xC|EyI_6`1oHfUVu=Hf literal 0 HcmV?d00001 diff --git a/selinux/targeted/contexts/files/file_contexts.homedirs b/selinux/targeted/contexts/files/file_contexts.homedirs new file mode 100644 index 0000000..674d5e8 --- /dev/null +++ b/selinux/targeted/contexts/files/file_contexts.homedirs @@ -0,0 +1,227 @@ +# +# +# User-specific file contexts, generated via libsemanage +# use semanage command to manage system users to change the file_context +# +# + + +# +# Home Context for user user_u +# + +/home/[^/]+/.+ unconfined_u:object_r:user_home_t:s0 +/home/[^/]+/.maildir(/.*)? unconfined_u:object_r:mail_home_rw_t:s0 +/home/[^/]+/.*/plugins/nppdf\.so.* -- unconfined_u:object_r:textrel_shlib_t:s0 +/home/[^/]+/((www)|(web)|(public_html))(/.+)? unconfined_u:object_r:httpd_user_content_t:s0 +/home/[^/]+/((www)|(web)|(public_html))/cgi-bin(/.+)? unconfined_u:object_r:httpd_user_script_exec_t:s0 +/home/[^/]+/((www)|(web)|(public_html))(/.*)?/\.htaccess -- unconfined_u:object_r:httpd_user_htaccess_t:s0 +/home/[^/]+/((www)|(web)|(public_html))(/.*)?/logs(/.*)? unconfined_u:object_r:httpd_user_ra_content_t:s0 +/home/[^/]+/a?quota\.(user|group) -- unconfined_u:object_r:quota_db_t:s0 +/home/[^/]+/\.nv(/.*)? unconfined_u:object_r:cache_home_t:s0 +/home/[^/]+/bin(/.*)? unconfined_u:object_r:home_bin_t:s0 +/home/[^/]+/\.kde(/.*)? unconfined_u:object_r:config_home_t:s0 +/home/[^/]+/\.lyx(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.mpd(/.*)? unconfined_u:object_r:mpd_home_t:s0 +/home/[^/]+/\.orc(/.*)? unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.pki(/.*)? unconfined_u:object_r:home_cert_t:s0 +/home/[^/]+/\.ssh(/.*)? unconfined_u:object_r:ssh_home_t:s0 +/home/[^/]+/\.uml(/.*)? unconfined_u:object_r:uml_rw_t:s0 +/home/[^/]+/\.DCOP.* -- unconfined_u:object_r:iceauth_home_t:s0 +/home/[^/]+/\.dmrc.* -- unconfined_u:object_r:xdm_home_t:s0 +/home/[^/]+/Audio(/.*)? unconfined_u:object_r:audio_home_t:s0 +/home/[^/]+/Music(/.*)? unconfined_u:object_r:audio_home_t:s0 +/home/[^/]+/\.cert(/.*)? unconfined_u:object_r:home_cert_t:s0 +/home/[^/]+/\.dbus(/.*)? unconfined_u:object_r:dbus_home_t:s0 +/home/[^/]+/\.java(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.wine(/.*)? unconfined_u:object_r:wine_home_t:s0 +/home/[^/]+/\.xine(/.*)? unconfined_u:object_r:config_home_t:s0 +/home/[^/]+/\.gvfs/.* <> +/home/[^/]+/\.Xauth.* -- unconfined_u:object_r:xauth_home_t:s0 +/home/[^/]+/\.xauth.* -- unconfined_u:object_r:xauth_home_t:s0 +/home/[^/]+/\.adobe(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.cache(/.*)? unconfined_u:object_r:cache_home_t:s0 +/home/[^/]+/\.debug(/.*)? <> +/home/[^/]+/\.fonts(/.*)? unconfined_u:object_r:user_fonts_t:s0 +/home/[^/]+/\.gnash(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.gnupg(/.+)? unconfined_u:object_r:gpg_secret_t:s0 +/home/[^/]+/\.irssi(/.*)? unconfined_u:object_r:irc_home_t:s0 +/home/[^/]+/\.local(/.*)? unconfined_u:object_r:gconf_home_t:s0 +/home/[^/]+/\.pulse(/.*)? unconfined_u:object_r:pulseaudio_home_t:s0 +/home/[^/]+/\.pyzor(/.*)? unconfined_u:object_r:spamc_home_t:s0 +/home/[^/]+/\.razor(/.*)? unconfined_u:object_r:spamc_home_t:s0 +/home/[^/]+/\.spamd(/.*)? unconfined_u:object_r:spamc_home_t:s0 +/home/[^/]+/\.webex(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/irclog(/.*)? unconfined_u:object_r:irc_home_t:s0 +/home/[^/]+/vmware(/.*)? unconfined_u:object_r:vmware_file_t:s0 +/home/[^/]+/\.gconf(d)?(/.*)? unconfined_u:object_r:gconf_home_t:s0 +/home/[^/]+/Maildir(/.*)? unconfined_u:object_r:mail_home_rw_t:s0 +/home/[^/]+/\.IBMERS(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.config(/.*)? unconfined_u:object_r:config_home_t:s0 +/home/[^/]+/\.galeon(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.gnome2(/.*)? unconfined_u:object_r:gnome_home_t:s0 +/home/[^/]+/\.kismet(/.*)? unconfined_u:object_r:kismet_home_t:s0 +/home/[^/]+/\.screen(/.*)? unconfined_u:object_r:screen_home_t:s0 +/home/[^/]+/\.spicec(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.tvtime(/.*)? unconfined_u:object_r:tvtime_home_t:s0 +/home/[^/]+/\.vmware(/.*)? unconfined_u:object_r:vmware_file_t:s0 +/home/[^/]+/\.yubico(/.*)? unconfined_u:object_r:auth_home_t:s0 +/home/[^/]+/POkemon.*(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.vmware[^/]*/.*\.cfg -- unconfined_u:object_r:vmware_conf_t:s0 +/home/[^/]+/\.forward[^/]* -- unconfined_u:object_r:mail_home_t:s0 +/home/[^/]+/\.Private(/.*)? unconfined_u:object_r:ecryptfs_t:s0 +/home/[^/]+/\.fonts\.d(/.*)? unconfined_u:object_r:user_fonts_config_t:s0 +/home/[^/]+/\.icedtea(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.libvirt(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.mozilla(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.mplayer(/.*)? unconfined_u:object_r:mplayer_home_t:s0 +/home/[^/]+/\.phoenix(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.ecryptfs(/.*)? unconfined_u:object_r:ecryptfs_t:s0 +/home/[^/]+/\.netscape(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.virtinst(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.ICAClient(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.cache/gdm(/.*)? unconfined_u:object_r:xdm_home_t:s0 +/home/[^/]+/\.color/icc(/.*)? unconfined_u:object_r:icc_data_home_t:s0 +/home/[^/]+/\.local/bin(/.*)? unconfined_u:object_r:home_bin_t:s0 +/home/[^/]+/\.quakelive(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.wireshark(/.*)? unconfined_u:object_r:wireshark_home_t:s0 +/home/[^/]+/public_git(/.*)? unconfined_u:object_r:git_user_content_t:s0 +/home/[^/]+/\.gstreamer-.* unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.Xauthority.* -- unconfined_u:object_r:xauth_home_t:s0 +/home/[^/]+/\.serverauth.* -- unconfined_u:object_r:xauth_home_t:s0 +/home/[^/]+/\.fontconfig(/.*)? unconfined_u:object_r:user_fonts_cache_t:s0 +/home/[^/]+/\.fonts/auto(/.*)? unconfined_u:object_r:user_fonts_cache_t:s0 +/home/[^/]+/\.macromedia(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.nv/GLCache(/.*)? unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.thumbnails(/.*)? unconfined_u:object_r:thumb_home_t:s0 +/home/[^/]+/missfont\.log.* unconfined_u:object_r:thumb_home_t:s0 +/home/[^/]+/\.ansible/cp/.* -s unconfined_u:object_r:ssh_home_t:s0 +/home/[^/]+/\.cache/dconf(/.*)? unconfined_u:object_r:config_home_t:s0 +/home/[^/]+/\.cache/wocky(/.*)? unconfined_u:object_r:telepathy_gabble_cache_home_t:s0 +/home/[^/]+/\.esmtp_queue(/.*)? unconfined_u:object_r:mail_home_rw_t:s0 +/home/[^/]+/\.local/share(/.*)? unconfined_u:object_r:data_home_t:s0 +/home/[^/]+/\.texlive2012(/.*)? unconfined_u:object_r:texlive_home_t:s0 +/home/[^/]+/\.texlive2013(/.*)? unconfined_u:object_r:texlive_home_t:s0 +/home/[^/]+/\.texlive2014(/.*)? unconfined_u:object_r:texlive_home_t:s0 +/home/[^/]+/\.thunderbird(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.ICEauthority.* -- unconfined_u:object_r:iceauth_home_t:s0 +/home/[^/]+/\.fonts\.cache-.* -- unconfined_u:object_r:user_fonts_cache_t:s0 +/home/[^/]+/\.config/pulse(/.*)? unconfined_u:object_r:pulseaudio_home_t:s0 +/home/[^/]+/\.gcjwebplugin(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.grl-podcasts(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.libvirt/qemu(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.polipo-cache(/.*)? unconfined_u:object_r:polipo_cache_home_t:s0 +/home/[^/]+/\.spamassassin(/.*)? unconfined_u:object_r:spamc_home_t:s0 +/home/[^/]+/\.cache/GLCache(/.*)? unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.cache/libvirt(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.cache/mozilla(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.config/Yubico(/.*)? unconfined_u:object_r:auth_home_t:s0 +/home/[^/]+/\.icedteaplugin(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/zimbrauserdata(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.wayland-errors.* -- unconfined_u:object_r:xdm_home_t:s0 +/home/[^/]+/VirtualMachines(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.cache/chromium(/.*)? unconfined_u:object_r:chrome_sandbox_home_t:s0 +/home/[^/]+/\.config/libvirt(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.xsession-errors.* -- unconfined_u:object_r:xdm_home_t:s0 +/home/[^/]+/\.cache/telepathy(/.*)? unconfined_u:object_r:telepathy_cache_home_t:s0 +/home/[^/]+/\.config/chromium(/.*)? unconfined_u:object_r:chrome_sandbox_home_t:s0 +/home/[^/]+/\.gnome2/keyrings(/.*)? unconfined_u:object_r:gkeyringd_gnome_home_t:s0 +/home/[^/]+/\.local/share/icc(/.*)? unconfined_u:object_r:icc_data_home_t:s0 +/home/[^/]+/\.mission-control(/.*)? unconfined_u:object_r:telepathy_mission_control_home_t:s0 +/home/[^/]+/\.cache/gstreamer-.* unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/cxoffice/bin/wine.+ -- unconfined_u:object_r:wine_exec_t:s0 +/home/[^/]+/\.cache/fontconfig(/.*)? unconfined_u:object_r:user_fonts_cache_t:s0 +/home/[^/]+/\.cache/thumbnails(/.*)? unconfined_u:object_r:thumb_home_t:s0 +/home/[^/]+/\.juniper_networks(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.local/share/xorg(/.*)? unconfined_u:object_r:xdm_home_t:s0 +/home/[^/]+/\.cache/gnome-boxes(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.cache/icedtea-web(/.*)? unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.config/fontconfig(/.*)? unconfined_u:object_r:user_fonts_config_t:s0 +/home/[^/]+/\.local/share/fonts(/.*)? unconfined_u:object_r:user_fonts_t:s0 +/home/[^/]+/\.cache/libvirt/qemu(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.telepathy-sunshine(/.*)? unconfined_u:object_r:telepathy_sunshine_home_t:s0 +/home/[^/]+/VirtualMachines/isos(/.*)? unconfined_u:object_r:virt_content_t:s0 +/home/[^/]+/\.cache/google-chrome(/.*)? unconfined_u:object_r:chrome_sandbox_home_t:s0 +/home/[^/]+/\.config/libvirt/qemu(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.config/systemd/user(/.*)? unconfined_u:object_r:systemd_unit_file_t:s0 +/home/[^/]+/\.local/share/systemd(/.*)? unconfined_u:object_r:systemd_home_t:s0 +/home/[^/]+/\.local/share/TpLogger(/.*)? unconfined_u:object_r:telepathy_logger_data_home_t:s0 +/home/[^/]+/\.local/share/keyrings(/.*)? unconfined_u:object_r:gkeyringd_gnome_home_t:s0 +/home/[^/]+/\.cache/libvirt-sandbox(/.*)? unconfined_u:object_r:virt_home_t:s0 +/home/[^/]+/\.local/share/telepathy(/.*)? unconfined_u:object_r:telepathy_data_home_t:s0 +/home/[^/]+/\.cache/telepathy/gabble(/.*)? unconfined_u:object_r:telepathy_gabble_cache_home_t:s0 +/home/[^/]+/\.cache/telepathy/logger(/.*)? unconfined_u:object_r:telepathy_logger_cache_home_t:s0 +/home/[^/]+/\.local/share/libvirt/boot(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.local/share/libvirt/images(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.cache/google-chrome-unstable(/.*)? unconfined_u:object_r:chrome_sandbox_home_t:s0 +/home/[^/]+/\.cache/telepathy/avatars/gabble(/.*)? unconfined_u:object_r:telepathy_gabble_cache_home_t:s0 +/home/[^/]+/\.local/share/gnome-boxes/images(/.*)? unconfined_u:object_r:svirt_home_t:s0 +/home/[^/]+/\.local/share/telepathy/mission-control(/.*)? unconfined_u:object_r:telepathy_mission_control_data_home_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay2(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+/\.local/share/containers/storage/volumes/[^/]*/.* unconfined_u:object_r:container_file_t:s0 +/home/[^/]+/\.local/share/networkmanagement/certificates(/.*)? unconfined_u:object_r:home_cert_t:s0 +/home/[^/]+/\.kde/share/apps/networkmanagement/certificates(/.*)? unconfined_u:object_r:home_cert_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay-images(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay-layers(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay2-images(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+/\.local/share/containers/storage/overlay2-layers(/.*)? unconfined_u:object_r:container_ro_file_t:s0 +/home/[^/]+ -d unconfined_u:object_r:user_home_dir_t:s0 +/home/[^/]+ -l unconfined_u:object_r:user_home_dir_t:s0 +/home/[^/]+/abc -- unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/tmp -d unconfined_u:object_r:user_tmp_t:s0 +/home/[^/]+/\.tmp -d unconfined_u:object_r:user_tmp_t:s0 +/home/[^/]+/\.shosts unconfined_u:object_r:ssh_home_t:s0 +/home/[^/]+/\.mailrc -- unconfined_u:object_r:mail_home_t:s0 +/home/[^/]+/\.my\.cnf -- unconfined_u:object_r:mysqld_home_t:s0 +/home/[^/]+/\.polipo -- unconfined_u:object_r:polipo_config_home_t:s0 +/home/[^/]+/\.rhosts -- unconfined_u:object_r:rlogind_home_t:s0 +/home/[^/]+/\.rlogin -- unconfined_u:object_r:rlogind_home_t:s0 +/home/[^/]+/\.esmtprc -- unconfined_u:object_r:mail_home_t:s0 +/home/[^/]+/\.ircmotd -- unconfined_u:object_r:irc_home_t:s0 +/home/[^/]+/\.k5login -- unconfined_u:object_r:krb5_home_t:s0 +/home/[^/]+/\.k5users -- unconfined_u:object_r:krb5_home_t:s0 +/home/[^/]+/\.manpath -- unconfined_u:object_r:mandb_home_t:s0 +/home/[^/]+/\.asoundrc -- unconfined_u:object_r:alsa_home_t:s0 +/home/[^/]+/\.esd_auth -- unconfined_u:object_r:pulseaudio_home_t:s0 +/home/[^/]+/\.screenrc -- unconfined_u:object_r:screen_home_t:s0 +/home/[^/]+/\.Xdefaults unconfined_u:object_r:config_home_t:s0 +/home/[^/]+/\.cvsignore -- unconfined_u:object_r:cvs_home_t:s0 +/home/[^/]+/\.hushlogin -- unconfined_u:object_r:local_login_home_t:s0 +/home/[^/]+/\.tmux\.conf -- unconfined_u:object_r:screen_home_t:s0 +/home/[^/]+/\.fonts\.conf -- unconfined_u:object_r:user_fonts_config_t:s0 +/home/[^/]+/\.k5identity -- unconfined_u:object_r:krb5_home_t:s0 +/home/[^/]+/\.procmailrc -- unconfined_u:object_r:procmail_home_t:s0 +/home/[^/]+/dead\.letter -- unconfined_u:object_r:mail_home_t:s0 +/home/[^/]+/mozilla\.pdf -- unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.fetchmailrc -- unconfined_u:object_r:fetchmail_home_t:s0 +/home/[^/]+/\.pulse-cookie -- unconfined_u:object_r:pulseaudio_home_t:s0 +/home/[^/]+/\.gnashpluginrc unconfined_u:object_r:mozilla_home_t:s0 +/home/[^/]+/\.grl-bookmarks unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.gnupg/log-socket unconfined_u:object_r:gpg_agent_tmp_t:s0 +/home/[^/]+/\.grl-metadata-store unconfined_u:object_r:gstreamer_home_t:s0 +/home/[^/]+/\.google_authenticator unconfined_u:object_r:auth_home_t:s0 +/home/[^/]+/\.google_authenticator~ unconfined_u:object_r:auth_home_t:s0 +/home/[^/]+/\.cache/\.mc_connections -- unconfined_u:object_r:telepathy_mission_control_cache_home_t:s0 +/home/(.*/)?\.snapshots(/.*)? system_u:object_r:snapperd_data_t:s0 +/home/a?quota\.(user|group) -- system_u:object_r:quota_db_t:s0 +/home/lost\+found/.* <> +/home -d system_u:object_r:home_root_t:s0 +/home -l system_u:object_r:home_root_t:s0 +/home/\-inst -d system_u:object_r:home_root_t:s0 +/home/\.journal <> +/home/home-inst -d system_u:object_r:home_root_t:s0 +/home/lost\+found -d system_u:object_r:lost_found_t:s0 +/var/run/user/[0-9]+ -d unconfined_u:object_r:user_tmp_t:s0 +/var/run/user/[0-9]+/.+ <> +/var/run/user/[0-9]+/bus -s unconfined_u:object_r:session_dbusd_tmp_t:s0 +/var/run/user/[0-9]+/gvfs -d unconfined_u:object_r:fusefs_t:s0 +/var/run/user/[0-9]+/gvfs/.* <> +/var/run/user/[0-9]+/keyring.* unconfined_u:object_r:gkeyringd_tmp_t:s0 +/var/run/user/[0-9]+/\.orc(/.*)? unconfined_u:object_r:gstreamer_home_t:s0 +/var/run/user/[0-9]+/dbus(/.*)? unconfined_u:object_r:session_dbusd_tmp_t:s0 +/var/run/user/[0-9]+/dconf(/.*)? unconfined_u:object_r:config_home_t:s0 +/var/run/user/[0-9]+/dbus-1(/.*)? unconfined_u:object_r:session_dbusd_tmp_t:s0 +/tmp/gconfd-[^/]+/.* -- unconfined_u:object_r:gconf_tmp_t:s0 +/tmp/gconfd-[^/]+ -d unconfined_u:object_r:user_tmp_t:s0 +/var/spool/cron/[^/]+ -- unconfined_u:object_r:user_cron_spool_t:s0 diff --git a/selinux/targeted/contexts/files/file_contexts.homedirs.bin b/selinux/targeted/contexts/files/file_contexts.homedirs.bin new file mode 100644 index 0000000000000000000000000000000000000000..f2f52c1fe216b7a90e344d4d2ccec0c8f8a96ae2 GIT binary patch literal 21219 zcmcg!dym`35m(wKMS!+x3-tYR($}3`k>`ukCTArofw7XeEhG+!lIqO&Zl6CuGPAD9ZS{>)LB8GS9#LmvHuCC5MJ-do$ z@VjhgX%bGCb(Wr=!~E_L^SkUrSA-)+xf5H4eF{rvz&>h?A9^7T=y%OwpKpfvY=16G*^wfufd zvx^>Nq4E1e19;-CqL^WraU8`bNty;McDlJ{uxUMJu$K2e&gL1uXK=xH5ZYS^a7IDa z@t`((QH2aT?V2UWVO+JY#|AD}2?I=vLx?3S4)~tI#bw|&<|a$0Td!|(3*R!Rv|%J+ z95l7g@%JpF`_sesKOlTOEr#nT)5KtdMp+dSp!9+cnkXqWSW^yf;rEOjjz@mfh~!2L z?MIe)(FhryX%miSjnIT)BjW%DnYN0|au+uE<6s>y;56G;kR`Ef;{XPEfCII;zUHx? z2kpH6dS2x58*hwEzdrF6>$!l$3I?gGUl_VJR+x?ZA&wZl8V=*i5d`iK?f)32+YOvS zRLnRf(JRdi$~Lwf!5BbCN%rkgJZl!r?KEpLBb`G=+NNYSw)~R8K24~LJYa(Z&H18S zOhp`4aU0HT&KG%8qEx7?nfByK1xfd=hOv>8N(e4gGF)TL#A2sK7;u3N3n+KEESpq7 zXzRucn|V2mQ7Fy4D1(d_Ou6}_;0m!*u&dz9!^W9$DcfmA4#ix2T%y@EMANs!w@`{O zs-)w_I=c$0csftgwoo^*)c^*YR^`I5@t<3+RE{`{&L1%NjL5B)fNA894t4|>bSn`s z8x9li-M1gT^OwIe%+rFGJrlj+vC-8K2K_YV7eN{qSjki68l%}9o#Ngz+Pp7t#3chx zOJK$X*jXzLwPP~f&{D_NsY(8S zW@upI$qaJh-Bf(FX94Rfs^jBIvvmUfkiE~b!J#jVV;K86#XcuqTX-IaU#7vP(=D?3 z&(xUX@U2*AJcFvC(k=JT|x~+p+Vg zcOSm>FiqfL0wW;WIduC~Ho7cI{Y8{9==777Bn+of0PXJm;&PBE(xUQVC_{ptfJEN) zq-}IrO8I1a#IPHJ(Da5D<}e@gbT>SY{@2)ul+y2_Yeij7%Z*wdf8+%ZPnQX zi-|q)f?OoCH1@+%wr)QMYlBN~-O|-S zo6GIJ_AR)z+X+>HA;OW2^#1_&xf@k=oW^BPFE`UgFatiP5>QhIMe?c$R~v>Tf**mkTw2hT7bvb^LWHU&uA;re{$yhL*4s{Dz zJD0l(HffMY?W9n;?Az$tXN&=Nt;XMJ`-o$~+ao<*c~Y0=&5y z5gLq`^!oCKq~S{Q-V<`rP}X&Lo%GeoEi0N_3)lvj6gjVy3%Ku44k-nqi41u%B9|1| zF6(4$>(uf(*s7oxm)z^K-(-8su*UGZn9sql zVq40`vA84pDGY+^8Tffl{xup6O$w1Am(^oxc(AWPCkJMsOp)nTE)Pi!Z9v*%9h!HSQx-Qkobvp)s&jyVlLZc|PaeNG^ zHM4Z+WK?frN#~|^0XxVk*LR}PY2>6ou<7V(lEn`*Exg;UCo_%5rie>XJ(KyDNkY5O zGZjrPFip@Lx=nRAe7qgbOpmq?X@=-Acc%?ZQby|HC!*k%)e+GVxpRqhQ51_b9;>{E znO%S7IVg3qnBz+^u@QBg!Rd`0dg=QeGbF)wypLwgOpR9Dmf*ezXVcPGKs%nHg-1Qy zYhY(EKC`?3e+k8t$a`3#gING$Ki?gNOXGpW=t2l(^CmRyX41hM$XKS zUKD%L8Zxzs>N4Hk#t=QBw~Bor*Nk^$ebtmbk$P)QW^#U*y1J2}-rpr)KeZhdTEby+Nfs>FfKM9~Sta7Rr!M6-jn%#E7(!1SK)aoh?Fn{;(a*)h-mYNx zd>vHcuzmFxxlL5pu$Ex?2gUvX_&?+#&634f*I4y*MWA!D7exPRhEB;at_P4vRMV=^ zg3=#Z7IrrYU(`hfhUgdYU=ucxFg7umhu4qffqP&N~qy147LTE6@5wUbZ6P)_~3f||FI(XSaFIO%*sPcLH(q1`6YE;= z3Qw*YIJm8f$!~OJG8(-JAHb!rz|#OflXx9KItRBOR^h36eN_ju(Al}6n-6l z*u=xL^{z?x#rv+o-^3e^*xguQA7K>B0-l*EIl^yUH?(&$Hn`fTIG}P1lisJ0ZN!sQ zKZa|cG0Qg4F3;yqEzw8yw@=d#=fy}O|*(+Le#fDwIa*Pamz~btLrQy&SozFr9 zhPMIiZOmpDM&MQ%CoZkBAQk$?OZzPVfhb__1EI5lTLoB!c7`HiSBvr&EctDncV<+34FrgeB5^A3%=cAc8%Cab3rilW*Gp+Zl_=b~|F? z!CP#c;B=KWkLz%0@a|COb`&9&fsV!Ah$}ZA!BfCumAKc_5b@aiCgo{lwc7z_&|Z4@ zr6sg`WT>rH2L;%A1P!NE2D`r9c@%A!c;XpKMtpV9HixwLI>v z2RCNnpz*IQjgGwDginX|hRn_<3ZqM3_2}RPP>5bKhxcc}<8XHdfj6rzzy7W*kwY~P z`({+nUb@)*-oP{OwtxNrURDKzAZ=%Ny4`ZZci&dDx8=j{Df&9#;q^TH?A|T0Pjgc! zA|`j{n1PtR7A#`$qT_A1h?1c2dNRLia{0i;|L9`;+Q;B%-c;oY+T*tn5v~q9GLky( z+`gg=Z`5z5qg}g`1>Wn_K;E-ko6`Hb2*9w>=yRLBmw=+%%H}ZX?IAwtbzQLdrjEnY zmOE6b+qc><=g#<~-9DAwyroZaQD}#@-8GZO5kAR9Wa4#Sk7SY=tj1fQ6?_4nX<@$c zsu`0Ioq4q>(LSkrktBgbwbrajWAJ3q#K_5v?=qxlU#^b(@6<0>B>bN*Kaa-kd;dVa zPe-G#0DYVUHhb{uyUb;8!vvMaZX(hthIAZoG$o&kvVi?Y(qGDg3$-gh^YLr-T0zO~ zR^HgE!3z~-yJ4xw3Z5b<$md{?bo7$HFW|ykpT%Er4Tbn@G&&06n?Os2o5>i@AWCMC z0lc>2?>NMLKWgGVE}AM2QZ>5${X+Y1uNmyYP&zgTTQD?8TcQ{srZPS#kxKO=5F|Fc M(9xOEcUtED2OZW)5C8xG literal 0 HcmV?d00001 diff --git a/selinux/targeted/contexts/files/file_contexts.local b/selinux/targeted/contexts/files/file_contexts.local new file mode 100644 index 0000000..e69de29 diff --git a/selinux/targeted/contexts/files/file_contexts.subs b/selinux/targeted/contexts/files/file_contexts.subs new file mode 100644 index 0000000..e69de29 diff --git a/selinux/targeted/contexts/files/file_contexts.subs_dist b/selinux/targeted/contexts/files/file_contexts.subs_dist new file mode 100644 index 0000000..c819832 --- /dev/null +++ b/selinux/targeted/contexts/files/file_contexts.subs_dist @@ -0,0 +1,24 @@ +/run /var/run +/run/lock /var/lock +/run/systemd/system /usr/lib/systemd/system +/run/systemd/generator /usr/lib/systemd/system +/run/systemd/generator.early /usr/lib/systemd/system +/run/systemd/generator.late /usr/lib/systemd/system +/lib /usr/lib +/lib64 /usr/lib +/usr/lib64 /usr/lib +/usr/local/lib64 /usr/lib +/usr/local/lib32 /usr/lib +/etc/systemd/system /usr/lib/systemd/system +/var/lib/xguest/home /home +/var/named/chroot/usr/lib64 /usr/lib +/var/named/chroot/lib64 /usr/lib +/var/named/chroot/var /var +/home-inst /home +/home/home-inst /home +/var/roothome /root +/sbin /usr/sbin +/sysroot/tmp /tmp +/var/usrlocal /usr/local +/var/mnt /mnt +/bin /usr/bin diff --git a/selinux/targeted/contexts/files/media b/selinux/targeted/contexts/files/media new file mode 100644 index 0000000..81f3463 --- /dev/null +++ b/selinux/targeted/contexts/files/media @@ -0,0 +1,3 @@ +cdrom system_u:object_r:removable_device_t:s0 +floppy system_u:object_r:removable_device_t:s0 +disk system_u:object_r:fixed_disk_device_t:s0 diff --git a/selinux/targeted/contexts/initrc_context b/selinux/targeted/contexts/initrc_context new file mode 100644 index 0000000..30ab971 --- /dev/null +++ b/selinux/targeted/contexts/initrc_context @@ -0,0 +1 @@ +system_u:system_r:initrc_t:s0 diff --git a/selinux/targeted/contexts/lxc_contexts b/selinux/targeted/contexts/lxc_contexts new file mode 100644 index 0000000..03fedc7 --- /dev/null +++ b/selinux/targeted/contexts/lxc_contexts @@ -0,0 +1,7 @@ +process = "system_u:system_r:container_t:s0" +content = "system_u:object_r:virt_var_lib_t:s0" +file = "system_u:object_r:container_file_t:s0" +ro_file="system_u:object_r:container_ro_file_t:s0" +sandbox_kvm_process = "system_u:system_r:svirt_qemu_net_t:s0" +sandbox_kvm_process = "system_u:system_r:svirt_qemu_net_t:s0" +sandbox_lxc_process = "system_u:system_r:container_t:s0" diff --git a/selinux/targeted/contexts/openssh_contexts b/selinux/targeted/contexts/openssh_contexts new file mode 100644 index 0000000..6de0b01 --- /dev/null +++ b/selinux/targeted/contexts/openssh_contexts @@ -0,0 +1 @@ +privsep_preauth=sshd_net_t diff --git a/selinux/targeted/contexts/removable_context b/selinux/targeted/contexts/removable_context new file mode 100644 index 0000000..7fcc56e --- /dev/null +++ b/selinux/targeted/contexts/removable_context @@ -0,0 +1 @@ +system_u:object_r:removable_t:s0 diff --git a/selinux/targeted/contexts/securetty_types b/selinux/targeted/contexts/securetty_types new file mode 100644 index 0000000..7055096 --- /dev/null +++ b/selinux/targeted/contexts/securetty_types @@ -0,0 +1,4 @@ +console_device_t +sysadm_tty_device_t +user_tty_device_t +staff_tty_device_t diff --git a/selinux/targeted/contexts/sepgsql_contexts b/selinux/targeted/contexts/sepgsql_contexts new file mode 100644 index 0000000..f8e9b1c --- /dev/null +++ b/selinux/targeted/contexts/sepgsql_contexts @@ -0,0 +1,40 @@ +# +# Initial security label for SE-PostgreSQL (MCS) +# + +# +db_database * system_u:object_r:sepgsql_db_t:s0 + +# +db_schema *.* system_u:object_r:sepgsql_schema_t:s0 + +# +db_table *.pg_catalog.* system_u:object_r:sepgsql_sysobj_t:s0 +db_table *.*.* system_u:object_r:sepgsql_table_t:s0 + +# +db_column *.pg_catalog.*.* system_u:object_r:sepgsql_sysobj_t:s0 +db_column *.*.*.* system_u:object_r:sepgsql_table_t:s0 + +# +db_sequence *.*.* system_u:object_r:sepgsql_seq_t:s0 + +# +db_view *.*.* system_u:object_r:sepgsql_view_t:s0 + +# +db_procedure *.*.* system_u:object_r:sepgsql_proc_exec_t:s0 + +# +db_tuple *.pg_catalog.* system_u:object_r:sepgsql_sysobj_t:s0 +db_tuple *.*.* system_u:object_r:sepgsql_table_t:s0 + +# +db_blob *.* system_u:object_r:sepgsql_blob_t:s0 + +# +db_language *.sql system_u:object_r:sepgsql_safe_lang_t:s0 +db_language *.plpgsql system_u:object_r:sepgsql_safe_lang_t:s0 +db_language *.pltcl system_u:object_r:sepgsql_safe_lang_t:s0 +db_language *.plperl system_u:object_r:sepgsql_safe_lang_t:s0 +db_language *.* system_u:object_r:sepgsql_lang_t:s0 diff --git a/selinux/targeted/contexts/snapperd_contexts b/selinux/targeted/contexts/snapperd_contexts new file mode 100644 index 0000000..4f28a7e --- /dev/null +++ b/selinux/targeted/contexts/snapperd_contexts @@ -0,0 +1 @@ +snapperd_data = system_u:object_r:snapperd_data_t:s0 diff --git a/selinux/targeted/contexts/systemd_contexts b/selinux/targeted/contexts/systemd_contexts new file mode 100644 index 0000000..ff32acc --- /dev/null +++ b/selinux/targeted/contexts/systemd_contexts @@ -0,0 +1 @@ +runtime=system_u:object_r:systemd_runtime_unit_file_t:s0 diff --git a/selinux/targeted/contexts/userhelper_context b/selinux/targeted/contexts/userhelper_context new file mode 100644 index 0000000..2a53efe --- /dev/null +++ b/selinux/targeted/contexts/userhelper_context @@ -0,0 +1 @@ +system_u:system_r:unconfined_t:s0 \ No newline at end of file diff --git a/selinux/targeted/contexts/users/guest_u b/selinux/targeted/contexts/users/guest_u new file mode 100644 index 0000000..82c0cef --- /dev/null +++ b/selinux/targeted/contexts/users/guest_u @@ -0,0 +1,8 @@ +guest_r:guest_t:s0 guest_r:guest_t:s0 +system_r:crond_t:s0 guest_r:guest_t:s0 +system_r:initrc_su_t:s0 guest_r:guest_t:s0 +system_r:local_login_t:s0 guest_r:guest_t:s0 +system_r:remote_login_t:s0 guest_r:guest_t:s0 +system_r:sshd_t:s0 guest_r:guest_t:s0 +system_r:cockpit_session_t:s0 guest_r:guest_t:s0 +system_r:init_t:s0 guest_r:guest_t:s0 diff --git a/selinux/targeted/contexts/users/root b/selinux/targeted/contexts/users/root new file mode 100644 index 0000000..7805778 --- /dev/null +++ b/selinux/targeted/contexts/users/root @@ -0,0 +1,11 @@ +system_r:crond_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:cronjob_t:s0 staff_r:cronjob_t:s0 user_r:cronjob_t:s0 +system_r:local_login_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 user_r:user_t:s0 + +staff_r:staff_su_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 user_r:user_t:s0 +sysadm_r:sysadm_su_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 user_r:user_t:s0 +user_r:user_su_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 user_r:user_t:s0 + +# +# Uncomment if you want to automatically login as sysadm_r +# +#system_r:sshd_t:s0 unconfined_r:unconfined_t:s0 sysadm_r:sysadm_t:s0 staff_r:staff_t:s0 user_r:user_t:s0 diff --git a/selinux/targeted/contexts/users/staff_u b/selinux/targeted/contexts/users/staff_u new file mode 100644 index 0000000..9a62fde --- /dev/null +++ b/selinux/targeted/contexts/users/staff_u @@ -0,0 +1,12 @@ +system_r:local_login_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +system_r:remote_login_t:s0 staff_r:staff_t:s0 +system_r:sshd_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +system_r:cockpit_session_t:s0 staff_r:staff_t:s0 sysadm_r:sysadm_t:s0 +system_r:crond_t:s0 staff_r:staff_t:s0 staff_r:cronjob_t:s0 +system_r:xdm_t:s0 staff_r:staff_t:s0 +system_r:init_t:s0 staff_r:staff_t:s0 +staff_r:staff_su_t:s0 staff_r:staff_t:s0 +staff_r:staff_sudo_t:s0 staff_r:staff_t:s0 +sysadm_r:sysadm_su_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_sudo_t:s0 sysadm_r:sysadm_t:s0 + diff --git a/selinux/targeted/contexts/users/sysadm_u b/selinux/targeted/contexts/users/sysadm_u new file mode 100644 index 0000000..cad26a3 --- /dev/null +++ b/selinux/targeted/contexts/users/sysadm_u @@ -0,0 +1,14 @@ +system_r:local_login_t:s0 sysadm_r:sysadm_t:s0 +system_r:remote_login_t:s0 sysadm_r:sysadm_t:s0 +system_r:sshd_t:s0 sysadm_r:sysadm_t:s0 +system_r:cockpit_session_t:s0 sysadm_r:sysadm_t:s0 +system_r:crond_t:s0 sysadm_r:sysadm_t:s0 +system_r:xdm_t:s0 sysadm_r:sysadm_t:s0 +system_r:init_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_su_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_sudo_t:s0 sysadm_r:sysadm_t:s0 +system_r:initrc_su_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_su_t:s0 sysadm_r:sysadm_t:s0 +sysadm_r:sysadm_sudo_t:s0 sysadm_r:sysadm_t:s0 + diff --git a/selinux/targeted/contexts/users/unconfined_u b/selinux/targeted/contexts/users/unconfined_u new file mode 100644 index 0000000..36416a2 --- /dev/null +++ b/selinux/targeted/contexts/users/unconfined_u @@ -0,0 +1,11 @@ +system_r:crond_t:s0 unconfined_r:unconfined_t:s0 unconfined_r:unconfined_cronjob_t:s0 +system_r:initrc_t:s0 unconfined_r:unconfined_t:s0 +system_r:local_login_t:s0 unconfined_r:unconfined_t:s0 +system_r:remote_login_t:s0 unconfined_r:unconfined_t:s0 +system_r:rshd_t:s0 unconfined_r:unconfined_t:s0 +system_r:sshd_t:s0 unconfined_r:unconfined_t:s0 +system_r:cockpit_session_t:s0 unconfined_r:unconfined_t:s0 +system_r:sysadm_su_t:s0 unconfined_r:unconfined_t:s0 +system_r:unconfined_t:s0 unconfined_r:unconfined_t:s0 +system_r:xdm_t:s0 unconfined_r:unconfined_t:s0 +system_r:init_t:s0 unconfined_r:unconfined_t:s0 diff --git a/selinux/targeted/contexts/users/user_u b/selinux/targeted/contexts/users/user_u new file mode 100644 index 0000000..41ab72b --- /dev/null +++ b/selinux/targeted/contexts/users/user_u @@ -0,0 +1,10 @@ +system_r:init_t:s0 user_r:user_t:s0 +system_r:local_login_t:s0 user_r:user_t:s0 +system_r:remote_login_t:s0 user_r:user_t:s0 +system_r:sshd_t:s0 user_r:user_t:s0 +system_r:cockpit_session_t:s0 user_r:user_t:s0 +system_r:crond_t:s0 user_r:user_t:s0 user_r:cronjob_t:s0 +system_r:xdm_t:s0 user_r:user_t:s0 +user_r:user_su_t:s0 user_r:user_t:s0 +user_r:user_sudo_t:s0 user_r:user_t:s0 + diff --git a/selinux/targeted/contexts/users/xguest_u b/selinux/targeted/contexts/users/xguest_u new file mode 100644 index 0000000..b776768 --- /dev/null +++ b/selinux/targeted/contexts/users/xguest_u @@ -0,0 +1,9 @@ +system_r:crond_t:s0 xguest_r:xguest_t:s0 +system_r:initrc_su_t:s0 xguest_r:xguest_t:s0 +system_r:local_login_t:s0 xguest_r:xguest_t:s0 +system_r:remote_login_t:s0 xguest_r:xguest_t:s0 +system_r:sshd_t:s0 xguest_r:xguest_t:s0 +system_r:cockpit_session_t:s0 xguest_r:xguest_t:s0 +system_r:xdm_t:s0 xguest_r:xguest_t:s0 +system_r:init_t:s0 xguest_r:xguest_t:s0 +xguest_r:xguest_t:s0 xguest_r:xguest_t:s0 diff --git a/selinux/targeted/contexts/virtual_domain_context b/selinux/targeted/contexts/virtual_domain_context new file mode 100644 index 0000000..150f281 --- /dev/null +++ b/selinux/targeted/contexts/virtual_domain_context @@ -0,0 +1,2 @@ +system_u:system_r:svirt_t:s0 +system_u:system_r:svirt_tcg_t:s0 diff --git a/selinux/targeted/contexts/virtual_image_context b/selinux/targeted/contexts/virtual_image_context new file mode 100644 index 0000000..8ab1e27 --- /dev/null +++ b/selinux/targeted/contexts/virtual_image_context @@ -0,0 +1,2 @@ +system_u:object_r:svirt_image_t:s0 +system_u:object_r:virt_content_t:s0 diff --git a/selinux/targeted/contexts/x_contexts b/selinux/targeted/contexts/x_contexts new file mode 100644 index 0000000..0b32044 --- /dev/null +++ b/selinux/targeted/contexts/x_contexts @@ -0,0 +1,105 @@ +# +# Config file for XSELinux extension +# + + +# +## +### Rules for X Clients +## +# + +# +# The default client rule defines a context to be used for all clients +# connecting to the server from a remote host. +# +client * system_u:object_r:remote_t:s0 + + +# +## +### Rules for X Properties +## +# + +# +# Property rules map a property name to a context. A default property +# rule indicated by an asterisk should follow all other property rules. +# +# Properties that normal clients may only read +property _SELINUX_* system_u:object_r:seclabel_xproperty_t:s0 + +# Clipboard and selection properties +property CUT_BUFFER? system_u:object_r:clipboard_xproperty_t:s0 + +# Default fallback type +property * system_u:object_r:xproperty_t:s0 + + +# +## +### Rules for X Extensions +## +# + +# +# Extension rules map an extension name to a context. A default extension +# rule indicated by an asterisk should follow all other extension rules. +# +# Restricted extensions +extension SELinux system_u:object_r:security_xextension_t:s0 + +# Standard extensions +extension * system_u:object_r:xextension_t:s0 + + +# +## +### Rules for X Selections +## +# + +# Selection rules map a selection name to a context. A default selection +# rule indicated by an asterisk should follow all other selection rules. +# +# Standard selections +selection PRIMARY system_u:object_r:clipboard_xselection_t:s0 +selection CLIPBOARD system_u:object_r:clipboard_xselection_t:s0 + +# Default fallback type +selection * system_u:object_r:xselection_t:s0 + + +# +## +### Rules for X Events +## +# + +# +# Event rules map an event protocol name to a context. A default event +# rule indicated by an asterisk should follow all other event rules. +# +# Input events +event X11:KeyPress system_u:object_r:input_xevent_t:s0 +event X11:KeyRelease system_u:object_r:input_xevent_t:s0 +event X11:ButtonPress system_u:object_r:input_xevent_t:s0 +event X11:ButtonRelease system_u:object_r:input_xevent_t:s0 +event X11:MotionNotify system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceKeyPress system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceKeyRelease system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceButtonPress system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceButtonRelease system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceMotionNotify system_u:object_r:input_xevent_t:s0 +event XInputExtension:DeviceValuator system_u:object_r:input_xevent_t:s0 +event XInputExtension:ProximityIn system_u:object_r:input_xevent_t:s0 +event XInputExtension:ProximityOut system_u:object_r:input_xevent_t:s0 + +# Client message events +event X11:ClientMessage system_u:object_r:client_xevent_t:s0 +event X11:SelectionNotify system_u:object_r:client_xevent_t:s0 +event X11:UnmapNotify system_u:object_r:client_xevent_t:s0 +event X11:ConfigureNotify system_u:object_r:client_xevent_t:s0 + +# Default fallback type +event * system_u:object_r:xevent_t:s0 diff --git a/selinux/targeted/policy/policy.33 b/selinux/targeted/policy/policy.33 new file mode 100644 index 0000000000000000000000000000000000000000..7e10facdfa7584e45979d972c02173f8afccc32a GIT binary patch literal 3582388 zcmeFa3%smXS>OMj&5mv);!X?~0m+8h5(8EXsI9iBG29|*wJnOR7Pi()QLI(01+8ekw6s{+v&w6g_S+{@qnV0|dMo|0x=`2KUk)vS-}TlG@>Y7YAY;NgQDJ?@hk2}ZNb$ooP08uc4{tucwnG?d6UsYJkh zfUaSyv0v+sc7T9)0Rl?ANY|*LF+1zgC}?quBTAN0r*C_93eI&zhDB=Hy8i^e_(AtBl2I`b{~5&o=9 zT0u2cDbyL%w)>57hX+t|Fl>)o+)&YOeL!xXudC7T^;(TFC4;?Qz1yl$MM{65E-DXx zcqT6(;ySD~Tl?*XH7kV$BvZqLWMJe&HEG8&F>H1F`vwUR*P8}Bi0#&U^&N`<%t@jc zifXn-<6-{{X+W$>strUGt>O3#nNt(tWV_#(j7UROw)?|ItJatdM}4C-nrD01YTeKR zBv7z3tZ(rpC=3`S8jMm^E<+oo0KQ7LQotJ*OrvBgbHJq1XFL1deI2o{-ihV8x79rld@@8 z%a4*teJlYI3H=MzmIv)MI;ao&JrGEJ5=`LBFi&IEC(ZV_24jpy zd`&`_v31yLbo++;o!~XJc+H*d8uh{D zd_cL~dZQ*99S+;g7Kj7zR4)e>fQ9w#Zodby(nec@ZPJqOL4B`Pt9RO|jN6vliAzw_dYPN~L_|DL?tt_#UERH2zezD5 zlAMtcwNYz`1Ry<)M;-$;{Fv-1X0P4pfKrp<0j0cyg84w$=ugC}Wc+Yl3C+fJSpg~~dzNNf*hCz59x4SLCq~#jBLOZ#c zPEe$%ebQ-BO|W999ro+ZMtx*r{EPLn(~|b2-h3x&o*dTN-R?wMwPUZLqNdObZK_S` z!^SRE2LwSkX*Wqgn}AR*;SapHPkD^3LHT;pYad#!q_##(f*3f+$KuPTB2j%L z&D&NMJW!+nK-qH(3ILH`;Ij|ET{m0^I9|R$7kDH9kPrg@*7PgcIc^PWNwufHw<(EN zj?`RaPjTE=bwQd><(F`2`l+TLJ)bD1x`(p)bHr~^T&Hi>EdxDNc|#!tkN}uPQ31bI z?(O5^#5BEE%U)0%alby*9|cfRtgRQ7N-~#H`eLg0mEtB{MR8`vL-lhKhixon9|BfQ9xZguUh54 zDsortr@AMNm5YE8X#A<_eyV>}eKXZPbXiodJr6meqR*?|vRPD-DSSCq+H}wJ`A6x# zLQYk^s0tYU&wup0p5F7ygOjK~Fa9F!AWJ0maU8bdt764hqKy?_2?-&bi?0wP@YPr7 zihQNcU`NWYBWun&qbrS7m5`fCo>kFI7FHTdXjo~iObv@aZjgMfBG9m01Z>jOX^rciM&KGhd9Mp%+THAaz6oA8s zZzae<>CJIi@u!dth4HSUi-i76T$M{U0C`Tc0IKj#FOGi0EP-TO z>7Bw+wq>|~Ew;=l?i7xaJ)%2hmhB6=NL5`^WkXI?{v=z--s`Chz=Sz>Pl5?pJe*55 zgFnJGy76%TRrm+@=7h*YVVsv0%Xua`dJDzDI_t}<&vI6?X5Wx&#T4Y)bwqN z@J}hK-r1S^cGaP&uG9lEVRO3b&@3|1!ZQ*Z0Sa5k6W zZz!o4qlwn4`TLt1IPI>CR-yhVd1t57V#VO1lof*u2~k<=aVdC5kPbHkt8ggaj2nYF zp2DbQOf1jN829Oh^MTFJ$ZyFE%QwwJ@hKv3ZLf7e8ggNTQ-il@Qitx>DGuR)q~QLZ zZu0={y$$A-&9f4TqT7{76cXUwy9zE6r%Dv9jlIUo%n(XeW`>ZkQ7Kk~{lbHXbMX|u zF|NnxD#rkH?~^wDSFe@=PIJD!T9+4LicNqgE$RE$7>ED3oZf zc26@%ZT37uVlt3uu}>+isZYnPOLRw`Q3lw({w&Iimnz-ekr(#8(mqKSU~v(eTa%Gj ztKK+0X%Abq(S8HjMG~I}PtwKUBIxOgp!-F7KxsA>x^?v8tbfKV``n8|RMOQeJ83I9 zRb34N7R5?Vi78$TCszFtqnuTL#L!UwITxFvLb1@;k zdKBBCuBh0CheNGYT`m7usWuVDY77G;gm5mdLQRndGqAuSW&Cw- z+<{(3c5F|y)5nS%SKJ7(ta|W~WzMbRd`{rY7MZHmYCYw$%b)P1D^{$v>cbgLtyt@` zV=Z@vZRs=oIa~xeu-QcCa#rr+LF)AeHO=+yjoRaOzXwB-vezGJi;obYcS`|1%EfF! z#+wLaIcjya8OWFF)-^4!xxY6$m_Q`f0+s`FB|#7M&~`87iXbLlG9@za8dU4`6YBgM zEejl;vB}h{wL|~+7M4O`9;Ujvw^855y^v#89-ZpSqeE9}wYJpcjmw|-YeOu0f$Ybl z^CDfb3+ZmvVY6Fb*}E%ySLCtkN>&XEvp-R}&)&}N+`h$JlODB;*lpXWjyIY@#*4+k zfGL3t*rJb%OtPU&G*)pQ3&zg1{Qz6zVW-_~m)pUP+B@2TaR7f~S}S?pzz>@dyKuLa zwnrs}689#Zas$9#zdjymzsaHP=!Y>m+N}?5yF0wV%4?v#1_6rV^*B;)w)Y@F&#ZUM zP5e}(kc}^Up7e;C1Z%suOA-cUG)k@Vv}dO6DdM*4Xsm5Z_y!~>m-HDB8%AtRAP}*E zpmNX<^=xPw6l<#z+dq+A(lf!lVGxbxX_cYATZCL{Nkt9kJjA zfI#e8F}>H>j#I&ZZ?ku4;d>j*)q5e#YsLFaguy&68oejZGj%%BR1Y}Y=9}1_Yx80jvK6+ej(hPkElE zdjq=4v+|(es+B&guU?e_P&`Dnxzy&u0olZMuIib*E&E)CURgWnw+u`84tZ@#eiEu& z%XzKwJ_hol2`H|bFE84EdGDd>H~BZ#@$S|gyaxKPERRq^w6TKI2Q+n*=%Z@yOL{LV zrfc<*GN&lI6gH;DNQvl<&@(BVFj}c5TAa~}HtYnDYEI>JBWyU`T&XDNCWY#{(+aRw z1Fck*U>V=aKYdvK{eO$^yNhEK`ej~fCEZm0`BK}TG(Cx*j`DkJ@7(BB-g)CvDD6`S z@8afay65?rO>%jyU_5^IO>!-bNd`8?Ri51EvX3Z3Xy>oXyOW|0qXlh%tCYzlXg5XL z05{Q2wUmiGC%ORob8UKSIT`ItE&0@B4sQj^)aa;U;ANU3(fZ;>w|Y0#mA16b)Lc!Q z*pkg`|0mKUfm`JknPx%1Gdi96hPH|l)tG#%STdv8;>6sBwiZ#+uVkiZcB+3>wHfpa z-B}RLs+jYNvu{?rag^vfwY5H)s$Hy&Qu|EFr^=rYoK$#)&ZF8i0f^!=%IDeg(Jy5z z%78>Oima$i(T{#CxI6%dP7i9B^|Gyt%84igtnDaB;VyMy)tWcxjwBDJe5i0_IJese zmpVl?aM@5*)HLCWMC&|PRjw7C%Lm!Kj{#h)^ku>b^x+}W&=S1_9aqU8RQ0=r@7xYK ziTy0$JLL7*>dU(eFLbd;-$%$zm_Wg4`tPfbLsi29)qFWS@Jy)M-}EQm^XBg2c%|cn ztd)*~mj2FloFxC8PJ_OeWR_%rnWJV4DM3YFMZK2n97X7T*$-Ov>&ylMDF}j62kXJ@ zn|n~dF46(uuION<+fa4YlCGQX=lqVm5^7ydSAgKIpQUmk;uAYSLH)O8@# z=}BwST8-^i1MR54n(1hD5Q+#zY$aW?Itay3kxU@?Y@#cU?T$HCYBfE$Sgk`7VQf^S zs*^KjHDN;dh@EXcE(QD=FxBO{d|yM9mrs~Tr>RBmq9?+jU@xyi>(tMHZ`0FQ;Os3qu2!)L2`d%`2`d%`3$t)87N$Q+fR$k`uFS&iZJeoe zSZtqCosU5zA8@4PKx;@F`=r2xpER|TX+FG?o~-SGLjuGDpS5;$e9H&}jZe}RIZ97j zUbcG{PaF`F9bfY$Iivz9fD~pQYmXgLken|7qN0m??_&dcl}nYQped0G6-}$ zZ)J6m=iiHiJWU3Ps9kfuMEB)X1Kl6iY}ra{cvqWyqErZ9u8RykQ$M&@6A{s}5_Otm z$Eo+OjRyTrmjlRoMw_B>*>N1bj8xQ&Jnd(vIeTM0ECoz>!gF--H5VbBLEr~TWB*gK zrhnGzqw)l9Uh_ekerP&SCp?ezW+^Z)5%^!MEB5WZ8`99)o^gNG%U8quw25g^UAfMX zlABW>{=dqoFio?lDrV(6%ZvuIBQaoS`tBa;y?#$8B+%+!;zGqb zUlDmOe)Qh>_2E1Cakb?(*jw=;NLcYASeS)#@gjaVc=3t4j@!zuJ$Ul=!JMXq3s)|1 zdL)uP{7m_i!b%+q4=WaQa!9}DVnOd6KT64C?^xT^+D`WB9pgPF8!frh1dJh%q*V8p zM{d!BzK1K_R@+Wdze|DAAlPr!MW>!@`9KG4j9Qx3(QCB)unnRqN~PBJ>zzr97hEbg zy+9U_Sx-Ii^yZ|V$P$P&i;KXIh747z=*Jgr0{t9acl1)wK9Qx|ahHE6X0 z3pMt653r=K=%Q4Aridz+^d{At5~)zpRn?2X%OM?Lg0}BTFae8)j2eGj`lSg8U!n_2 z<{}{XhT4J~{L&VI6G+mn_e3$=QGh&x{b7@)0v$RfbjzEn+1i@ykOwejp3vP=a4;UN z7?N`lBwZ%MQ4$rFcM`S~3{*+B00JK@%L(3+_WubtI`Lnn@42TGY9Sdd={4#0TtZU- z1tmqn6Uk>MoKUxP!pTY9k&Q8d;4km>g6hPEySs8389HrdQBNyj*sXg)64A2a;H!lEJx$Xg+NX0#@CPh|Po?R5e=5*!Rb*4DWF9S&kkSlb# zBM4#S11HVia6H%dTrt;*xkMi;<`NR3($V8mz`TaJUZHD_xwcmmj)jtyt42uJsK~^^ z4Zq?kL&DwVDOsj-JT+{NR(fj1Q$|B8o-#C)f6m2I9?xWZI(6O?)iE)2ZFy8Dzt!Gv z(Ral>WR8%2mV#@%ZN)^5*B;2F5XSmfR%CV6MO$e+;~(d~C1%Pmdfv4)@u8yf) zvDHfH8KJC{-aG@Hi>+K$p{86_k%M;3oa3qaT+X3_|5u`&Kp5g_=Q}%Y@ z4>}a!Sn&oBo`JM2)7sFuyl(Yuh4-E=4V1a;VdksA*yz7vNFVlo|WrKNLX16LP7}V;x9Ba!@1w0i+j`; zePfLYbI9}Jh;Zw0Q13NQDghaz_4%T_*9*^pD8fI`#k-i6_lv>D%SlV`fQw)olBm`YECrV+ITYAYRo!;mjy!x$@CN7QLIZ2HT6^-9C$Tm62A@2F*? z-yKZ!SsHc6LIDgVYW1|Ic%$W}jHj#b`vjFvzs#FgB-CdDc2FPIyZAma4E(!1|HP*Z z`D+dD4@pW6`r4{CY@L?HH3mY^>Pfq;?pAB47fXSUK}=m2RrH`;&@Zo1LT|*azmC6H zYk>JeUB}rkqlS)WVk7iHe>GwT;#MM7NLYzjNMRPvC1TmS4K8DLv(INi%4tTQ?3S^l zRClg(1{0H3GOpKZjK_V1i%nr^G+Ki(3l)*nHuI%*K&n-TqPp@t7R9PVA+|UdH)1Zp zjdU!c&Ku|m63steIrLXbPL#1yav&jubFmesEo?Q=HOE$iL4Vad7gAQHqmZyN9fgDt z&c#*Oc?3Gqa2FSWne6R`%~r>4-|E%3I(CQ`cBPh{4DEa{Qa9Tp;<%+S#f>K;p6D{F zTdHm>cXWn1M@&CU!KYJRrkLZ_@*Qpu=M7lw)zwlyJPB$Jex~l+Scw5)Vf%G7Ay4@+#|XehM`l{u z;>C0{jmM!qZkY>lAg!sDljGJ&-GOkvhQ-T!y+8m{u7?k(%DjtdJud#b{e-gs*~vHL zo3{uI(~R6bzz!v~tu}L(rZW&SI8>h^0j0`y4_nT1Z-jZ}WvQ;bEJd;MvPhmFn(it{ z+?Zl{tbUKP8Has_U81vPWi(2ERZ(FQ;rvYblftU+C_JqCj!q8g_gpNe@4}cPgi^@8d+&WA>mwniW`f5%ayuNc%;v6IL&I)9$=GU>59V{NSeH_ z6^~r4!&XC`L;8c{B->Q`T=(0(@ku?AAAT)Zyu8;7Jz6 znqdeyloGZIqM+FxJtSY=qlZcXB-?)Nbj}QR!3rL^yj7UJ)8kTbk@RxKM3K~}x3^aY zx{!J#im0ko?em?fVe!XLQGJ#o5Jg-B%}O}a8}GKp?MBVIz;HW} zcXL^=yJx;#pCBZ-2<#Qyg^Qp)#5!#WMu#}aCz2%7he*nArVR#pq;SnMW^+f~Ed@j_6796ED1JJf)rw4^ zWF>usgpG>CZyJAG8AQT|bG>el4bD?HDK_%dsJr4Rp=8BVLc)rt=2_=lJmsnoUBwa> zlql-W50vAu6Sn=xJ&9VcpVkGzi=>}*DV|X+)+x;ttCS`8_w=FjQ%_BB-kV_F5N;i> z=jyt7I$E{Lbq|}mFcnPqHktwdCCnlmJ(lfpPsQ^b%=Z%BT)7IXtA2S=tSsX!BlWWs zOmFEe+8CL1ovw;54_d4`Tej*i|_kr!<&)ddOF5UVT zc|jtL-R<&t$dr(5h#hL0Y=4hCz-{b~cJ;Fqurm2#UsvqeZRtddv2xg5d2EHwmB)6~ zzpIKvVt}jeDj-`Cq2HhjA@AX^rhTlo`t@P+u1fwgja#gr?iGt2ft)tzp zR%D_>dCPjmzb~7pQXjPX&AOsIIc(0)pI%9kl@t+)tfYvLa4sF~6AAYgcxu=m&9Ay! zG1ZExR!k)fD4dI_+_7|n(ndu!*zL==w6b_tjwK_bRe#dZQ2sd=TlvzSXX^{ndiukf z&Y#xaz4ftM>!(XADqE2jE6}hH(E$u-yXMy>`fvUP#3=vCbLE9cPXG9ae{oc zF7Ek&ytG${ZxiCb7^VzB)f@v6C8wOf(yz;% z`M0wtrUoDmUa2c`*FLVU6<4je%1C9!RfdN0&$+mYc&>-*LT3`te{y!||KArM7pfoG z(bpAaM|;?;uSCa6bcifg15s7O!tBqvM2Gjs+xjFjmCg_xtj-VwkE`)rAz`JFA%$7E zyKKdZ)W}xNR%7MnGBmE(N@!TI)r_UMI~QAF0^;oX8eMpcFmef+?q1(&cXYzlpovrh6OA z(|aMz8`0&M@9*ifu^OwauBH(c#cBdTmN)uY3MT9I78OFM=t2+pG(*N)L)5g5j1ntw4HiyXHwrO zH{=33u-onqI<0QrUxshz9q~)8UwWNt0-F zZ`?W@*Sb4H>O|%Ov^5;{dph}(@2FNo^S=R^XFIxb`|PJ?QuZynVlSuL7_X+CfxjbR zv0ALQ+FEUPBWlRuY)tI&2oJ*3bh(^?Pc!QxUwAaW?1*V$RAX8eW@=EK`{U$aMem)# zb$iy}-vUQm3)*ZC=@g+3cs=au1?-2I`WZ!0 z@dBw9_pWfLNR{iJ*1dXaasIsx=Be;_Z-aT&y()?$wVT3qVvTiUdp%TnLt_$PlBE7C zSSVHQu_h%Xrs=&b%?pYn?$@XKqhJzdZM~>eiYoUheKFO2rMO8~Q5;#CWb~NjQxw;p z&`lK{7cl%x`IEv*(FqS572#yHt6L_C8HtuJ@{L=kXfp2UE=2#^c6+;DbN?Hpc5f40 zQ&s5R2J@V-RjY`{@9~Ow4rT!i&hP2Q!^;0wUHRY8v#Vu%r41vtoeQoYk}fTZZ&WPu zh>H-;D;Q`q3rriL()3~yECxCvgfG>F!Nf&4tjQPB>Wwrv8ri{XZJmP%AwM0zIOJS| zrNByf3cXfWbbI&|VfEB{IuxisT+K?7hCjkAm1Q*5-zqxa!fLy5p<%V%c&3KM9~c%6 z8|iWmBaM8jqdBJHt;eooUx~9S~NUriHf6x0EXaEl@8)zj7MGGq%NJxl$;rtPQ-4=SXUixq# z@x4*Q_T)o|X?T#c>~YzUoJSo`fDGjeZFKzv%#zJ-WGnG6t`IF?*lo;}$W`x5X4$?j*58zj*^5+3XaVfuqsr^mwMWzay zQ~oND?-4hI^NaNRsj|~dFV=CORftlU@)5tqT5*)_r}iRSLu#}mETh_em4G0? z|DoLoHmd|eb)z`)3KiF+kylGIEvmGsg=%r+_v_VLt@)3t25=QpP=G*=^1W_1s`9>6 zX>r9=8KAasUNO}@%8^i2W9Yj}?LNzQsxi&?ASCFGHPgH#p6WeXSXof6jT~nMG1VyY zly?e8zIt(U`UVEspZ5IMll;EbtaH|i>xyZ<|KOF?;;7U`QbDQBucI-l>0Y1SR6r97 zw8%$~bpOEI8i4F5VnjtFCR+3;tABV5eHhRJUf)0;r}Sg@nI?|(Y@wus={y}&iuI}> zIQk7kusKyL`IAT!HlnTfD$eNO;?IH(j%|CoGPLpCXnW&!m3&Nl8>rR)tL-f))s_$Y zT&gZw{4Cm=3Lewm%BC35-WTTf1`UbjWB~Tm;yUWC)m(1tDPJm7`J=XeJimmg{hhVD zwAN92W&B?l|LcVcnI0z#Dix!FD#nt+)MUie?(a%QRK4T{8DX@sQB05WdrOAA$n6y5 zMYWU{>(wM9lqoetMohU~FM^Dab3e$4smqA_N@k^dKG`sDZN@FK!{}#2^uv7$n@74o zksp@nYO_LApsUIh*sCWb;0l)`=bb3l{|$1aOX8`bbzdoNS>y2-nNs0>)#XUBRva&1 zL^LycE9J{o#dVdb-ovFIJaO&%QKmx~x+Y&Xr^R&-Kkuycb{OdmT60ur3$NpKm$wx# zt1YNh*;Z6j?;L-~Di_N=owg($eXOXeD4jx;OK32&!r{;>nyR8W3x+1cq_KvjRm7;( zI2K%ZlThUnYq4t}_s&*Fy0@?)f{N@wf?U<3lz2+I8R>48WJz@cStiSc#L_xWij|7e zI9VP?iX>M#ker3;2~%DE#Mn#*rzAhcW%5haIm!tP{YiBx$-|BOF0pwodQ4%Fdwg|t9Q#_vnH{E zt1~0*{|Aa1L?bm)C=D|n=M*(<OUl|NF_Op&oLO+QurY>1vKqMNDi zjsEp>#698s^^5$S(L%Dz6d^|O!Z#{u6x}{3)~5E}4E(9FGVileKl%fGr!WH;fv2&PlLR~idhdWs`nKP{yA-(YWLyw5rc z)oJc1R1`N;EY)>aENjJ$LGo6EsB>e^42d}*LyqN(ZNuFr`x|hf-fDZ&(v8E2=wB(8T4hrPv zw%u8}C4z`h<&U`Fa()R@`Zj9P_Lx2k?#`DRPKh>-0jM|gp(mSC%nXsM? zYA3Nml$2IT#a@?+$thfKrxvqB;g_0WoT-{5XQS#s$=A&Ka7sQ?cGW=1(X_1`OUY}O z3Vv72LJ>C7*}B3^V>ACIRJz849(BK7Y$}&|DqW&X5+CXR%(hsf%xOl?F_g*IB{gzC zqsF`LE`L<*G~ZoL=B$dk?%8KIXFqx*%Jl9sf+SbBs85>h@v(B*Q&g3@s;_a`AL&v! z6jj_Us}R|AGJO+TRQc%rl=thp%GR1$g`&>6Rur2l=%oTJYC+`x|CLo(r6ZE%$hpjy zMN3d%IMWsVt?M;Lm^z{v%FMYX$fdfGJ{-4>ae`Izhx}G039io1Yj?ip!XK_&@=V^} zcG>Mk1uPapL^*Y*yKc8!Ky7y(_(uYS5#k8!MZ|c~=+W z{7osn3pVbUR=K}??aE^9#0#go|KZ9V7ga8};I<>(Uv=Jeb7S+SO#}RG54mWwa-B(z zqd$0c@wTeTKD zqs42kTD$7XS67fO7hYAIc-Hiq6I0z^vhl3-tJaE3q0846S6#5V{>)pU%gRypl)QT< zs=9yu)i+&wv$WS#_dofz&#OphzV=A>FMjchUsX9NttPs>@5xGW<%OG98jU{l>dM;2 z)$g9_{nZ<{7dLKRWu54gm1nJ8a!vKch4kc|o40M8Sd&83{rYBgdft@}*npKBUp zsJ9}?bkpX>mDB6iPgHfkar28Vc=hIurdMyOp1AFrU%hd9r1v*htLHuQyw6V#zDsZ4 ze9^ROJ)=9Wx#gx;U0U2R6>ogb)f;QCn{KWn$*!uNxaOAPf=|LH>&5FU)#A2lmHTS7 zII(d_b*lSUUGjo!PM!Cf>XGj6ym|AH7hSvNI`;gVrW<$C!+Py>T3l7R?i4+&^X^2d zz2Fwpv7dM2=34Q<+(}>i)33VaVN>MKRhw(~S-bhx*G_f6aist+ikBbhUQ+G$^=mdS zKx%5u5 z-B3Pa6~dIu?ic*W6=6tlmFaZv85`U1F+q7{Nq3yWy`3a(ONg7ZNr}RpdMA8c_h(bM zRahd0YtE{0VTl}!C8j*g`IRocTgn%f@XEjvrikTNg4|O`K519Pkh_KIS~4B=L%7>Y zxhm`(2`Ra8PZZ1M;_bP^e~ePD6#x6YyWwv-UO~&>R5}Y}E-v|-)I19cdd^(@WF}>+ z?_)%d57F#N(D72Soa$kL1zO#DyQ705c4}kEp5hatG>>icJN;p^raeAtV-WwX@&S2V zXTNL9gogc2ZOjnB14SerIoNC0`i+qW(vu@ce6nit(?7qt;$~T$>0so3dK7fvzhg%RGr>N~a@KllQNxbbsH_2|QYbRoky? zLN;P{E$oX{A%pwV`5aN!sY?l9e8E8|`-ww59`!*&ZcWcO@MhR?Wg1 zjkSU6tTtp*(d8*LIjcYEjYrLhE13CT>+-NW9uJz@v9d84C}Cr#UE3X}SzWa;vZxa& zY%&N3Frm=ya#H-)@+@8&sBE~WTEboTiBODoo18bb(-MJ05~pH2 zXquc>F*Wv@MmB86pNRMCVh)pLKl3#$^%aqIcPHJg#1$7Th^W0`{W!Y5BeYhg>+ODH zGO8W6_N|pD;uk`N8zy;7y6vg)oEVx~T-)f6B~&_X-0?{!fy|2ns@24eaYu*woEeOD zcrs-A==ti8viL9=jR<{9thpKeO))0t@71)#6gq+~e?@ROC|f&AvKTu0`Y1>wv&Vx` zLULOeLuC&FA}3Z$8r?+9Tcd!`&_9xIK}dk7-ck-mFRu(uF|0$uNpz}a#Zw{<+r!at zzc%Vg2hH&JTWTS%+M&k%gJ1={@6qMa_2J;4K5p!WuV168d$g8Q=Yxz4yXp-TSB1>? zd(4rLTt>sK#qa99=2ri(cIb7^A`b?BT&VJRM_-r1`=nyuc}(M_`DQh(jy^myC;DiE zcZcjIlZHfJNeKTjU}}5VYPAR5c8xzxX`=>kgO0DIRykyP-eHJS(FmuX@i_f1i`J}} zhayc#?`wm~?Tp7goj#+@dNngvnaza$_o!IM@M*IzghtUvYC#GeE80`kw?|K`v6y&E zT<-XEMMDKH3=&p=_d24pOfTU3%L0N*e0LyWX#Dj-n`-fSZ-3C6(Kwhn6@VQKTb)T$ z3XCt`8wlYrTQW4IWzCnjMj5cv=xFVE((EsnNc7tE>O1Yegf|~_0^gT8F;Mnt>XAd~ zKym4vR=OvyyE^3DY>)P8UD1B8Ht0;SY|K)lpkMRSb+5UQ3Gb9~pHQd$wwj~_1GC|q zqoi&(8f~^+mdYMVtmI6f$p4`tynyyVB$X%d6A?(1$^&Wn$wIUR-8U5Qp2v0Qg8J;65dwKPHx785c2!&2v2Ba%MXD6 zcOZ}LR85I*8ytfe5mFLO%iKeyc7INus2`$x$tx>*fxNf*&6A$o2in zuvhQs9J_8`Ta7QM6By+~0jRc&rlFxbx0}lhRjT;0z-ouGD;APa`8PyrAE;qcC&ViM zg#l^Wo}nRI&lNaYO+EFpHDDv542%11F~`wpw>D-K^PfkU`@Qy|jO?!VSzo9glJ03S zgWXZLp}jn^yvJxFe-Bxb53LxeU^^%SH$CbTosDZ``bSFQ^y7ksO(~LKdV6Su-nJ+J z^PR%JKA>?-|3ilcdMD{i75}RNPtR+O5BkHs=hh|ige{4u0h*WF-CS2kG4Q@Da{6F` z2+J~t_WObuo9s=gM@f^!x+M7`uaEBQ2PkUI`c7>q!_K+_-yZO3^)kwbsO>jIMJYvp(5hn)BS*_l zE#nX#GN@S?Ayy!m`yEs1Bu6RZ{b#2{V-eWvbU>_VazGy}gMcph(_?r;DHTpaNc0E_Y9W?>PN`ZE0?z`0IV7DuQn#QtQO`Z;?vxM8`$a*V)5)}+oANFm z9y#1R6?hfWhX}_X*X2}^CGKo4o3kD|=W7G5%sgARBIt&_CA8^qbVi-JV?@^X2K|_9 zJr0DIos|s6*T$wdv$MUk?4+s2nkAFJ)KNEvR?$v{yp3^ zI%v;294uMBBXVJyJ|!oI3K`3oD3u{f^@31TIzqy1edzm)NX$#Yj+H#x9-F_0?U$0c zJE1&0joA|PEX{7eGBm^1Waox9}${}LodyIa3O$6U?J zPHcetp$~J&?7ZxQg0u1N{G(8Ay<6XJO9N@=D)sy3GX{?r$C{X@L3+Uk$&6x1@>>DG zU3oo*`}-s1=z5DLxjO1Kc^6v4{zMkXLU|RX?5RmSB&I6eSh$`tTP13togNbvL%-*p z_fpW1=9!@_XVdk}hhwsew%7;|j`oMLfET%ss$Paz%3-kA7|975JDiZ`B#I>@^JFj+ zP2_PZGEpg3N`Mh<{~-W#gFFnP+a%qA6w&BZ1A{isAeMH9;-w%R|Gi-GR9QjHkoLa= zjHBGO*3ts6u?gQl2~~9q29qFlxqc>aPG=-%h*$z*eMTe~Cw%-qZi7;T^8>*s0_WBO zB_O>oiLEx#-eb9T6mvW3C5O`!)qK*OmvR9A*Fo&|`up`+GXTV21i}%=FqE4VVA&FA z$oB?uJCuo~>QnR$x;!*Gbr}rhR|xzoLiL0*&~wlySSMEpxg`5c}r-QIO;c}(LzI^b|W^?6ZYpx1$}Z>iIsefWug zpq)9Fr43IuTif+XXI%O$X@Or0jJ`b>s{iC9OdkJCNxT#vRlujwlf0Of^w)v@nw@eC zD9{@aPXj*>2cn|6VHxW4N1?s98rwUUM<*WOXzED`PPd;FR=YQt%<L-i>O;D&A;H zbJ(yIsQ!vjj1A!=f`y%bA24!AF340%K6`TfjLvWR3=%o;Z}gjV)qLfE{V5TZlFCnb zLU!%VG3BXHh)CYts|yAeRs0_Tmj~@0yY)E%SQqU>(ZHz>wbDwNS#B_uEY@J(GM+0lLq$xwNTk~9$E6^ByIGX(3av0Ys;n9 z_+5eM?i>dZ&|1w2V{0;KP|5!!O5^58x+1D%p~HDu-XIw_vUcU`)@X!K=3{fuq_>en zYBn>_^I#IR^9!M(H^^kxKw}zVn92RCLs2etOynZj!R52(D= zRFbG>_aaI@7CxU-i`Mqg<&{AsfhX(H7{$DaI^>{l@xIwt(AtH8nw!nccUCGQ0GS&$HD;L~H6^dVL_p%PP=EuyW{`a3V=!FkIy8GDoVH2a(L|pY^^V+GCW=xt1-v~{ zt@Q)V7ig{fh=|70cr+}-ZdXv_97=7N>uW}U4OP85(9mo|2F^0!Q&9%r9?2w+c?nE} zVY|26-jan-3Rjxy6Tzb;|FslZZYt{g#{uYVBa8A|gvoCPL8Gk_+dI2BV>@kz)=Hp| z1OGI_T}mAzy{8bLLw4151`=cx|I>kBhj7)ndzu#8P9B*%j?Fd5veYtQ_FI&bi;BUd zqYV}{`%*(S@HptjH1)YX+-69Uzt+7#H1S6wNV~~hg_r=`qlhhest(dr1v+m;-yS5Y z+YPc^jnW+aVN_^XJc(-Y}C3HZ{| zgY91vMAyDt7YhbGoxuMRX=KJ13n>v6_m9QZd!0SpWEjylP_#Qwo95(aK-#zf8T-c} zfd;~)qV*+q`9q@2U;uWnBs3Qp(9tV&c}Uj1WldB^^2jM5+s$YQ!CPDsFp%tv+E{}@ zNn(Mb_XNI9(?8~Pkz#G_L@Dt&`EyGi`YbtU*w+WT$s>LEAroc1FJev3nLKjBP!QjK zlddxFBux`#BRGCYmxn|)szTYq_;*QlBD7$8RNoU#F0>vT@LR#E*I>LRi*))EIVek} zN90}+o5IESLS_)nXXcQWMuB5jHK|u9{|Pig4yEjqzo4bzh_Yzf;V*&|pOf|p9W?U` zBPvZ|Gy3*_kV@Ow9+*4t04*Oc#&}CA=xNNh$r2)6u^`1OJp@b4nj#gw1zk zX#TmO9kUA3$PN<@QMSH+RRrSEd$Kua#D(m61{lqOd3lH!liN?#H!e9E zLybpWFE@9yFYBoXKm6K)SeH4&RH8Wv0dRky%S)e8xrslj{)M6HHsE}^)t$)wnwuNi z`&h^U7p~hniC}2*4~80cnIM(~$oYX11_N~>T%!U1`+|Mk-jXk6T)TWxIFRn!1cIYM zBE|+=)HmMOp2;%cvml8b4VD5RxS50(V7;h2|2)HYfe zz;jJZnvV!Yo<&k$*266Gfm^;*C~!1lfM>~>=m}~6>42W-;xh;Eeq^Qj{)#3y;{8c{ z3EN#9TV3-t+C5Dgfqql#1v&D>$Tv&{C?Q5X-zkW_R`Y$lz~?}|9b{vpk!MIT{15iO zJmg~I+o|_~am48MABI*Pb>$Ystv=Fxwk1Uc4Ln`&I1;nBngJm2`^?bFJ}Zgpn1KxW zy*}V~IOwW7n8*(T`svVsY_q}v2x+hqCHglZb|zkYgoK))L|+yFn2FUxb-3(AhuWC7 z`5=9#9Fo@79O8~mMe>nZnMKrxzMo@X-P6)5ZR3ID^2l0+X;_%a7Uv+tv~jAXkG9)XwKUlh()hQ57Kim_o5>T_hZLB_ ztCYfPFdMP)aX8h#IGiJUpB9o}HJ%A-J9p62Oi<|eM+0dM<)Z3J7ivsre#C@Q-Wd|& z|6wZ=9}A)VKM}-B=AoJ6+2{))@WfD?V8NF*0yOxyf#H%Un$4}f1wo!e#wJ`Vl?$$3 zbDR-VvMW%2Q;_G){?540)HB=Wz%6C8-J1eC_8Qw`vyvd3qhJiX!+7C)*!kZ?vK-en z3^>#bcxzI#*JFd#M;+!@EI2nw)`Wa=D0SjE%^}Z{3=)4qXqe=Cf>}QznsKs`p{gly z-dLdc-7rrMOgG3wDP{>iE(j{*Oz>VCTcPg0FrZOwm*&zfAOh(BB(VFO=OIlo0irq$QhZV!Th_Y7NFVjmd+-s)&pmQE7sGv13L*$F&U4%C;8jUn^UP^&>(_1Uf0 zI`TA?)y!4?rasxs1FE3_{MyKjENwm&nWu#PpOA3!F3RcyAzpl00u)3489}c zXKoON6o{d(r2TTpg2qM@eH;Yxf21ID;51ciqUk0QND|`-JSxiJQJ%ynEc#jrgN8(( z2yBqLel1%nA&N;k0rKw#HW+m^)0|~frP_p~-Vn;#F2}B@5S06=&@g$9Z^|5-<-!2L zo_JKKqJlpbzBxS+_t$!nwICuE_Id^LG;p&dK>wcy8XvTF>LX1#GFToL^v8Y|14a=5 zia^7p^l%nFvw4q?3ngPEq)rLec)&g?&2ENpBSAsFUfV0|sPJ)@%}`4GBFw(CukCczo%P&mrH|*N)db48xc& zQwpv2zphA+Plub)eL!gcVyI>3VAxV)mTV7pUKn6P@@VP3^-o_Pv6d$E+ghMqjR7&~ z((5LgD4rG!-KKD*=xiGq2v-MMHLg*-8+g$2pGA!J$68tuoq6Q_w%8=Qq_j|3t}4BY9nOp({ugfg`*!!-)vJRxAbt3B2ynw*t9%SeU43?JtCuRBt|2lX?# z+Q`QrhD~$GJr1joPNYf$%D)wwV$@cH2H*IHqL#4%hB>zgApXTt67Smyx}qH`a7L~( zdAOMu?RF9M|D!0C%wRM50HvM`QHea5R0T66860PPWWNL1&&~I^F<_~+uQ`e8Z6&#e z1p2zb3wtJ;vkLtr$jf15RmXB*@C$D-Z1N4NzLOe0Mc&gae-rxb{r!>j`GS)e0{@;s zjnW>>bIMv2DM$C|IYONWpDR0LVXg)*@!pe!b}ZDL2YSe9P0y8@wDG9 zkymjiXmxfu#gRq^iiblyIqZlgBXJ-PKID=5^^Sg?4Z`Q|ja*}cLYm+;P>(>=2Y_>v zWm7L^)`j}LNMN%OyM!Vz{A3`=A&ELI=}K$NXN!a>rV{axy@qMs|KA1uRD z3QiNC*s;WcH6H}H{GXDID&0cz!Oh49?0l~-|0v-y^*hz_ZV!X)FIO7R#;9(GE;j}I zyhztG$Q3UQASm&F#`eZ7TiPZl(?^j-4)VI`{9UXYLov45DMdX6s>>lk7@UQf@MBky z99dT3VU}&8afHmQoL zzDwD9jy{<}gzEh>5cQX;uV*lG*Utu8E)^;~en(5Zw4X(agn)i4u-6TJ&68`f8H6*K zX%f`)K|p8PP1A;6->iHcI`uZ&k|U7Yuj>+Em6nSEN{BXdnP_G;Lw~<75_0<5s%x<;^G)jG z@v!!UD=4RT41$(qY_!D6a)L2Ntvf-(YJrAN0+`E-0{?X+qU@p^ZtrP{OU5v|Ar9sk z%cUv5$+Qr}#rMY+&omFme13pp<|3T~0`cA*h zEse~WbMJa_us8d#x42&tZT6323U#TnK!x-F5Jt)&@Q^hc=GC(!-kECB?>6dl+a3Ym z=R~5&Ykj0l5}$xbhc8d)N_+y%ekdR*`vPs7Cz|N{gVZS!KlZXfMcZeODf3= zV~3OlGKbnuhn7zppv-YT+zP9 zGV))AjMC&aCUaRd2;5Xv9X^|!vNdcscUry+6;1c&;tx+UWbUbHO}E*9FXAeVqjb=W%#~O|iZ={`<2$zz@zfW&HqOJ*Ngps#H^$=7*?J4!+EIh2DbtZL%@yCV1Z=*E>T`Ng3P z!eEMxtwTdw0mXyP8R^wIm*97YieqGI;+W6gOZBfPkDnC!T;55QvkOS}cE?>nl1PJk z-X1gc(al}0Z(=OP8XqElLxe03MEZh6OGLxGI#kbBR3*TWc0UqSD7(Ncv^p6)DpLAz zykit<*nxuI7u!wUDQW9+(IoNT6%emJB2xg6Ircro7dK)G)+G??2(--45Z|S$u~Wef z+Aqp|6U4ncka)MrypH6<1N;X>@beCtss4{t?DH`Ja!4{)gCE+LDOsTIjtMI#DDI9R z2(>X&SzoB|X2IxS(vR79nFlg%3{t17_02cbMp~bo#2wR49voUj0+_*S`Hy;9TG!Jy zi%h7+e`21xwIHi!P7V<@JIh$(!#Z(>eU|8|)7<=etcSM;2{2@u(Sk5Uf9?e{BVmd& zYmqEns+03f;&DpRa&kyR_ z=R2lNmcBp6WMhR%Ukz=EGG}vRb$ldH$(h07ws1&mekxEe%q_#%Ah1Z5Zh2GBt=Lk* zHn~eb7P5YrQIi?hkBBwT(=3Ei8jr3Vm3v-qoD*@oYB_iN} z%`kG-M3TP)ztCkJa|+v2kh~iPpsPE>cmAdHVg#*MitTKQfeD|C!fl z@ehQkw7%MQ`+3e?3WU-chPj>=xW@OzTcB_l=jVe&*wUVYt;RBgQK4%>t+&b%7G?*`n(RZ0_FzolOPImM zTEON=D{PQi3%Z2te-`S>0k2`+zzABuIrRVO`6mU9xVPa_)+ zXzuq1?#0*+a~Xj7y~p4(s2~tZyIc{Ji#KyeJ)=^Mu|dnP2RKCNwn(C@DOt8}UuZ*W zdS$@zUUSkN>`dee5HQ6&gunsCMzg6?wI!OIkNMrRu38g#ph>^vs0~MupfJ2ewL0&igZF7c!*6+BZ z5;}d@LNl^JX`vZO_CrC=_}z7b6bYDL z97s>Wg4h;w|ilAF1&-TeX#KM*V$4Zh5#!GO+xqZEz|MmbxW z{h19gw9I`&bZ^vA57p-Ud=22`!2A&Hzis^ya{OQ66QB4NI!X@OF|Ue z#fDwvth2`q$`1r$TIhB!$ZIhC)PVjxR92D#sJSw5Xj*iWB?JD9Zwj1M^2MBy0DqD4 zfdRu(N4}l)0`-#e`P4Iqc{i`CF?xI?dPLMGvph@iA<=J*WEfV5Bi9}pnnC-!+d`Vu zm;9Na>khl4oorN);aAhx`HgrDUf&hV;^cW)T0B;}LJoD5@_iK__v644k`HwdF% z&Yq@0O1+!Y?u|i)Ywl}XyHW|$iNk^K9s0<>%addmhytviA2F+KOuZ*H}=Giq_1~zvFw+T~LLE2Sg3}aoxf!+WG20i+=D)Jbfrm7xT#_F3j1yvld(X|ZJgIJJXf1iqO}fG$ zOH1bKgLZCV$nu@y14k2xkk`gm4pE8c2HNg)(w6OW>*i?PAJEsHfm>G#tqZ!gf~fQv zR#01VC;VkVw|2*nD9IpFgLeGX_vlJA3Y4c}LkD+3*&cBEZw4rnao{l8%oQ}~9lAUu zKTi6ax^zC;1JD0-(6uE2hV`uA_2p53Czr4pdB}rbr&c*6ubjEAc{?~(AX;Nm=)*(F zY1WFnRMVC?VETV4A7@*~behJ4_TCPd-YMt3f}%JKlgH)bKn$|v_hL(wZkObifot9w z1od{g-wXA|_@J@AKZtAj(=^e=+aXUzA<>;dZKd5~7gUonDQ=FcM>7v?&~Y=M&$gPF z6CNns3qreScC?v@h{2x11FbNz@lO&^(f^|M@}_d91>+MF?|6Xp`$Y{z&o&5f81Th&qGs5V3s_qZaVn7P z?U|zdQ;~)9Y1;gv6gJfV$w5cu)=zUmkwn*oNS{_cw*|57*Ynk)4iAZS%KboQ{dL*^ zOW#51)wN@L_ME*LGR&dmD~8j2l>_A6*X1AQdgfY!(KpUzt+Q|Fs+rEriA?E6jOOKz zG6R$5HS_CR0|m}Tev;+`h<_4*NL9^)#zrpxQat9(nh7v5Aawil;Zqh{7^Pf1*M_B? zp9Cbxe`lcf&Oy6eBMAY#Bh-0e)YVy!TG!?{U&gsyFzQg`!Aj`$L%KYa_;+U(lIMj{ zA+Wr8fq73V&G~@}%1n+kpZSz=Z+q9(7hpY;k@b((C?_nUhapfo`Fse@Cn3U@HG` zb_Bv>1KrCu(aKR@@BrsK|j|F7*wHla)Mi%hlrzAW|l1|$xC&>w(uTTodLa>KttV<66 zH3)<=1KTDuVHqU+H)ZcRl-rBUp$cq&__$QgmGFMtZ;thFP_!*_l95AC=B1I~%6S6| zHVh?wtNu7V<$;PKFq^&$i@!61(jKUHI|nTl?uNo_ha~3@aQ&9RiL_NeHxkG=dA!aE z)&+w!^&p+|?vLYP+Xhoh0~;kY32drEd2G4b0+&I7KNm##u-qlXED>9KkJO1dX)8DcJfaE zKv<8B6|+6Tc0^X%x0zu^`1i7TUdqz~Ah~x$n$+QG3na(KcLsDA(~Hg0c)-61+4i+8 zan>nDkAGR9k!D@9by9^G;D1O!hFZb~*Mh=w?xUaf7F`~a)-0uvca8JhmY+G6*vxZx z$1z02EDY_8hjR~^`s7IY>12t(8vxC)p@#&?OtLyCnhgm>oD8b+dWnBlbI!3cc-;)L z3&baZ3a=gnCQrKsEt+0%`%7b`r0C>FEBiO^2^5q1oak7IUC8O1W3$Z`$H6P+sQ8T# zpXO|pGs?i!l7B0mJ)Ta3F}eQ1K#%1%mLOUg7cY&7?x~M7(sl_%Vii0tMz-x_I(){T z8xZ1S0W`tV01)!{h5-J|%P3EW=E{_81A$I-xjdMi=V2E5HNve21|}FXECnFQe_3FP zaF&OSYJ68vdEF74;U&sH-tDkN&Y~gN?!`Zed+U#S~5uMrl641PC21C3@~y8sfU zT*RLo+)tz4Yi4K2^rfNYnN+yf^!4$4`V`nIhddM$7W0C_!FY1` zEHtgS?ZLu^OO#EO3&J8EBf*mb$T&+cUO)j60Un zN^Zpcr|0suGr*Wic?c6SQ|(-b4tsk@Ekb%vz zTlkdr_(y!7L#Fz284S7t>GF%A>hAJqB!7ZhC&6~GsU|vX%1v_f0fX^tqlMDdzC!s_ zZ$91%P=+0|lO#ubd`Fb5a`fi~9Z<^Kl({#G^v-0gZ7#F9MuTid!BKjm60yKH&j=0X zTR5iJlZt(?=dAlgs_xbBh6>X(F-GF<{iU*r8~7t8nAYeSFPSw)-(L`rCF2&~W{B@D#h7=>BdUZzwjD249}Q0%1B47^#xQuF(UQmo3s zG=&vAv6QGZX1z<0@>d~QG8d(sWc()40+kFxLBdE{E0Wv6Xz-(f2mDZuIYZ(P0~I^( zB7b4-^P}KO{o`J1M=Senc8GO8*=x>2Lj1Po$431pF^YJ4S*S}MdY)0-M}rC|SJv3v zWN`k*NUuJrtB=crL(l0ofr?Lsn))zB*^{Gbzi7TT5KxH;iYZ{799+}oZ7FPNN2+KyohLMj%)99K%3h41gjN^(T9vsTNp51%2T@-uCXjb#mk=_(`BGhcq zTsGFRxE{M~acQ?DjV{YmJ*TCi;fsYDN9ss}?3$J9>vMUhX`yYv(c3~BGv7Z- z{?o#r^0J^29vTY=X7Wt&@uLGPrKMR3!P3#iE$KV^oA;WrKG#1A9OnDqi)?LT0adF6 zq|4_Z!WF%u>5v24LFl!*+L~F0LsQETbEA{w9Ra4!al+3?6)Q?@UF^h~XLCV(!wq$`kK0pk(R%o)WP7T(KbS=D{ z->j9Qe^QsXyAL`ilrxp<&AL1!K1+X-IkdPL=;cwEnXhD29>D-({nJp9(^_Vbn*jlK zzeuZ)LpmR?Tp{!6Xb~iF?fcQAhhHA}QgnsZnsEAOM{^$krVy+fU&Z-lhiP+ z@K?GVQJUyGV-VQ!7Xua97{xJ|{((?Mt!lQ-%M+%-%}*@>XH5)X9}e{6YAj1_$n!gN zIbf-E=9n83q7l)Pk4vMc(o92!2?}K68&p%zi@wu-K1b7Fp|JZY))UnC>$^JYKJEny z3%@n;f3wTNG_wk6W<||DX9K379}qMbgf>Xdotl=cG2M0np^*46imdq!%gcr(-IGJ5 zg10-H60^#GPe^B#_fzUw22159p&@36ENTd$-_a0)*$h7x|c2GPWNKV#LamCk*Zk%7Rhipidh`$ctj#$->w2P|En`F>e%o&4<7 zneD#3UCHL4WuGm4I!Fy|{GiWhp$`P1Ioj968;)K_NOIhOhfEG>f(JGQ^!}^>X|Hu4 z3r7QtHWQF99~Tj1S~9s_0QGZ21!g1tn30Lm9vMIt&EyS_4S%SilOhkV$-+pDK@Z{l zPGC3NSR}P77~YNYZEm5QeGPR!HPBuuRcv(CT?Zcy)e8qzB!NKv-x(;A>FhoUft?CJNa3 zBc*ZVrfENOs*i^Mp3popwOfb2Sj1d@p9~Uo`+$Ym33$Hz-VoP1)PBk(WOR3)6VReD z!%<)6(SnGk`QOQ(9C9yjTNbv4RnyMRrxf>SBuEa)S_p)aMNOPFO!E7O;?o4@g~E{~ zXF}cc%577cR|RfKjtkpB(;X8u?Mnk@gFh%?hdMnpV5iyYondLWp8>*3B+^WRbl(|` zlJ_vk2cu(Tf=%P5TPdiSnq!!?^)U$wN|6?F6;bvYT-eUfn5TD0XK1ZcO1t<##v zmRlMa9ykYs`Fc`C!Nee0?_T4R zuW)62JaB2+P&BE{1`Qr%lxFz0Uj>}EmSOsS^Oob5dh+i(T0--TOf8S(+$F? z>?;J%kP+0yAs;*SX}OzDg+3FK3DhwrP&(&OGw$}N5aj*)G1W1%<4MD!Ru7BqfL#Fj z9R^A2y;jf*y%!Z+W~9b2)_J|$keBoYy+t4 zm(}dvDoZ0ezzb0Ci$bP-c*rU$9GHofNpWeYks>({7p4?nF#HN>#bx)Uon?Fjq~9G% z815~tlwuH!LykP8dWTMXiF=B=S`c}id_{P|A9D2;MR{!ACS!pU=q3+>ew&lzUXqL< zBZx+z`O=}bAgEE{KOpho#pb2tvyl%Hd`X}fRx{5{Lswk!u|OIUhh+lh`SL!#Kbq^#1yrX^6}_lA1Om7NJb%cx##rdcQ1BqjTb zP{VHx#E>Udo5SQ)K@F7Wg(kQm>^FsS=XZ1j>Yq4Utt1WjIttg|t`OM7ewlFQb(Yjj zn^hZsg3R9u$Ye@Snhs|lJ}Mg6d2iJOG9Nx5ic;yd=FoNnL1uh9d^ooPtX%x~K~b)Y zds{G`<%!HSMEQ3IinLzg0^5O)2kVblD{OOR9anu`JU><&?+mzTsExc_-$yq21&|8w z4z0jW5~;G(=x;(yR&i}+yrmR?JUBaX7)TJu;;Eoop=~DGlOk2-c^l?Or|2h=dk)6m zc|L?_Q$7MPadY6Fw8nELf2j0JLvyfHdbWB2;qdWT_}sw*M$o4t;if%ZjMtwg+?SYa z$?}lOPFf?k;gvynbuW(SR~DJ1APu)cEi|*72}PcS6QT{!2SEX zu|~E({Jn5M#E*7PiAT1T#7x zbhsdM0QK>KEX)Ha$KnB}9vMqKRY@ESDpHr4*7;d5YI_GbeloB`Pv+A?3ADvCl+HnA zgZh$CE>Yxf2TGXjBi`buPg@-_--$$cyeT$q-iC#twuF6*ukTSZFHpL}HkrwNgJ54{ zI6d}wOK@IYL2zFSs&cSyu=W-y>p_`p3hE&ny6)9>{*q>+Sw1h+c$AL*SRjA;K-VH% zb2x6RwJc_fz@+)Wsno-vq$>iQ=UpiTOPZ}XW0e<1X(*4=oJ(&r$djfYMPmMc8vnOL z?3|4=YUv0o>jYf}_HxL2TrjY+TC(MU^CfC5C$gTF1j)*osDpH-#yGIe$^f|+$5xf2 zCpS2FdR(Z&^_-NXDR(s3Gozr@L31+?H_$&r#OY)*+c~;yRmyycE>B{c`6r-Jtj`Y; z8Lp-4opjf}Vm$~eqg@XD&d`F5OJcL=BcY`nG_&zHrmT9YbLPAhh+Fg~$UY4qIb_q2 z)|WRV_j4)krXU8khuRZiYqCAp*S#)cX|}sZi3l?JvydkFjf3K$4bKEQAcX)GEraYJhMgwXK^tSJBMl%lF-MEf2 z3+=dy66$+Gv~XtI3NBy`th_arRO)MKWw*A#8oI)3!}e!d^DYx4VFBX%wa`GRwuxF$ zl`PQnkf?LfZ)_CMQ#oFQ+q0O3xd9(MxEeR1DJ3q*WTpfT-`o)3mjaAG@dMe0xes_ei{stLRM6QONJg9%Wu z_g*~KxAa%~WD2BH#y9A|1LMe=cfJsNXAt%>tgI)0%9J`fzQ&k4Fj z#g6*TyyzTpcz>1Z1*f?=C5kEeb;05&hZv0k!OJ%WD$zXt#cl<9<^6LNldM#|#Zg3k zm9p@nnS4S2>M*S_SP#W&iHkl!w$dKYjWNqx;#!)Y33b|P;4fdcYM-v!xnc^2cCI{? zdu5Q~D75;#(~Tq#3bLX-Vjjwz_yNDqilk_B?kU1LRuFnOw%y!xBYW=X5e z^Mv0Zih%2v0$ky=%n_!Vj3(sK!$P}A=6O1G*pzee$%q46 zTBtfoS42X%t8h7w=HP zE-cc?d`aeie3=F3j+=(Uei=5&AwZFLk$}o!u~WLd1RKCj8?}+aUyF)8YSLrMw4}jc zht;Ba-Ylv94`F8k=G#@B{lTS3OQEjSJPTHq_Nt;yva8uNH9&znaC+?z6SYQp8{q!;qwXrc~lkR@NQ0M^isC{X`lo zjEdNwYl>f6bq7d(qG^7LYqx0G5GE26u54{YL`L?0)D>{xgVr2}d9N;%+X?;OtG0@K z+DNT9U`(&jz7vMppj?0o7%UW6JI70v5y@N{OPeP?4 z-eAw7R!mj!L^7VeIa1Gk25Psf%^)jZxbKq)oM-5u@c(7#r{l#XmNSZS#?}QKT0!&F z1MQLSF!xvk_C2AdeNDF!(eLqrcC9EKNZ?8?X2AQgrg|I8s^TnnMCjYmgzkCO!OYDW zlpKUMA2lPR1h!>`O?Ucze^ft8_0sRDr^xex`tKS@4@<3EWSM`?x$o0_v2sKA&T**IE)?MTRJB2ZfYRPZ+&aIBjWRksQku&=ydkxpNKS zW|p>AIIVrhq~axmZ?Ou|=?dihXT#uiC9SW_Pg9`}BS;f>H2GRtSzX()PXZx4-DtA= zW_X0)1nbB+;vK+1c4-kN0&#=fQoPzns-e2}A4Ixf$s>(xr5r4G!~jl^nij*suxSM> zvmQW8&}R01BtvaiBA|s63j?)8065)Y2St+q;>Faa-CHFIf$n`@a#zDDFJUsTx)~7V zSQq@<(Ih{omAB*VZ<`sIo0%*tgTA*TFH?u=)0*qYUdcVH3#*=o_8g;XD?o3R4rt>3 z)`XH)XBQP&33s01e#)ga+=XnO6`KF6s7hxqQ13ffKX(m><~ISF(~Mf>I$-x%pG97O zpkG~0zpLyW-Mx&dgl@A_f{1%C;z95OYva0CE(oncJmk97&bYysEX4`A~3z^*TnUHWo9cZ;ohdW){pmun8X+oiu{XW{tyjANOjmGFaZ ze9H-{19e8jxRBj$#UBoN4T~2Thx0s^3|k_?g2Sb373F+eR-uz|IC%J{pR9tQ(&M$fO7c<1r3?s??GWYk z74~0`#GRf$#77lV;+TC%9|uLxqUYUCdC2j%`cp%0Gu?ReNZq@!K3doA(Ge=2djMt6+zaQ;I{aZ$lEK`#1K<7{XfdRIw6ZL`BqE{ET&yY?vie3)qDLcPiQ(wzq#qom2f>B(W+hq((p^BNy*rd#WbfaUF) zpMl|@a!ja`*E@g$H70J^*0m0$Grr0b3Z#6q3FT;ED})omzEHms+#J3}0&Ud%)VB0?7V{P|qmI-3}AqJ&P~e1bi+ zJ(;Oke9V&fxldesih^UWp=a%CLK~T-H8(_7r_K5+<~_5n7>Xbci8$FcG>`q%SCC#M z@$tZk`hHPna}nEb(-dTT(;pyrwv$Ol{$$hOT-Y9AC@}F@{i=;*{9xjT3waqMPG7E3 z6(l%RUFXoqThDmH*#`6M%uT>xB$qKir$rxw_;JuYv++w>Ux$0XM}3CmZxLau&l}q_ zN-FME9$W7R!dR@c^Q%x8g#JYiI-&ep%~BSdGH2?rV8(yF0iU+k*HvuDf+9U~f5e0| z_L#;@uX!v2!higv0nZ@G zs1m9BM;|1NDZ-K&GKn*Rv$9$i_v?W35W>^0&Im=gA^{0~|E_-GYh2PtGAkBVnT-CE z3re1JG-5M`;$#D^XqQ+06zVor>P&mz@{=5nwWA~|z@q4{@*7dAESFT!reh7IsFKOMw^clmx@7)3YTr}Zxe0_-PAFz_6zbKf(PS< z6#9sUX#1OPYQwjU0U)N&ciYrLvaM!!9x}KM?$`16l#Zrrs^Vre>4D%T0pyy?t?ziUIHVq^I+p$*3XF(ej9ip zzn?Os$vv0CR+ZTkm;&)fKw4$AN-El?FVWNcMPCF4Ffc9C7w*_PJ*SJH=eb$}J-I#wd?X^>R@%dk)mEO?zg zwXnXiC}$^)9QO9kKEO%|T3=P3Q|ku8vPYjOF$ZFmExfg)?K15VzVplxB{kuyT)*^K z;P;6Rjug=vIdur`Yj=Vj(Qowe9*%YLDwH&ug?vKEdD%;-r!N>g{K4Qy=zfi%-;Op; zt~{?vWX^&|B1u2)q+flit3ldn2x7O-p|APPt*9d=^`spGiShk~HJ+ukBB7{p3)S80 zhP6u6h0Y@=_Z+cFl{LFwfmXAQLcV{(N}DjgPny6a!Y=REzL+MnJaN1!UL8@$v7fza zf5|1EUB4qbLZ!3@l>@J+ z{4Gt3yA%)C5kT`a7s80=jOg)fZ$8L6gO0NGi{W4p}XZOfgx0U z)toy8=nPWtWA23;hlHg&hm3sRRH#cy?OZo{d`*43KHtu5w3*qU$57~6hLRHTRyikp z{g@EG!mLK+WsU{~$FJvTnwv3_DxlNjtxMw4{v|=&=KSpbvF4Hld`matR2_^uXX7VP zhToV1kFr_zFU_|p%6>gqS2o?m6kXiw0(VGhFs+_0Uq8|$BW+Wxt1eBJ+Xpb1Oa4$Z z#OkqD(D?lKO>8p_e=QE~0x6H<^>+0O)7_MApK(QEJ*e@Tbj9LMj8?*l%$*rA2P<@A zL(H6}bxetfWzrwg6 z3CqgGVTx{H9FFY8^;Hu30&_v)*GiqrGUkdmI(-BCo`Of(s->EtOYPVNSh8sf7$v6C zrXzi)8eVKhDywF4g|t9%=MDKZrv+5Hi4M&FjuA5#0n#gm`7hURNVfPiNs{<)PjXWd zt78EV?3k#x+Ah$6HbZT%VVx6(n&|_wDC)#@aaLvdQ@AsC?7QA_WUvIQ(Fclt*VO`h z6<^P?-%$3w27giRF~^JyzQKVjBgW%Hj3C?N%m%iarQQ0+KN(5G@Q*~D9==|`B2vG_ zlPnyt@ll9*yBeCayi<<8yCRJFKlCg4n%>w@P;EN0*HQ!Jdcn+B=vOV~H#?I}6ptk0 zy7G1(3>mNw(cRt!Pr9!`;1{@j_NBP4p<8dOR`lO&sK#&gcYK6c`wjKHMrc+d)AM4R z9Nqe$Da^s<>UMI2Q2pAOyS_Tqp8n7yAmpAtqS820G?T~(^?k9L?MlCi zbf27Q=X&sqT&RgwZYxlvYPBN);bXTMVM?o{)Y4Os)VCWG`XeR>ZWfYyKa+KB>hI`* z;JjZgl}scADHkl4^>bKQ-g_8TquPKr)K=~)4ICKS00qSor=aN@#FnmsHOVHYy#!4e z!7s&=x?A~>_;M>M7m+KZkz?{4dyLyv)U*R5TJlm6fhb*}2&CKhWT(&#cV>5<2~_#6 z>2E^fh(GuWZ`+M@nbhB+KRpEx84KW4p7N2HgSLFcB#%6k^@XmG&e^7x36z>8b`;Anoezpt=HJ(@P z>c1%jl6Aw>IKtsvM7mvhLbZ6YJv*v}&NzQyV!5HXQ}`29!_MA7+IDp@D=e?J{l&7{ z$IXIhi(1Qs3x8s~<665RIttOfkLue+p-iexS;N-?>g!%)rfQex9Q7;rQ;9sEqxW|) znOknt*Ir`JG9E1AaN5arAnjAkqw6rCEHvG?wu$^~Evk-$F9HHPEuHNo>Z1=ddT*mx zt{sJQmc2$1Zf3lTmBjE;NnxX& zZg<-83nS+h0sSkJnzs34ZgW40R5=a?df>3KquByVbWgW5xf2dkV|i`2(WPaqBP` zscqV6SFVG!bzdlPPp8t(w0yYh+c^RseKQB>cu3?f6>f(Dcj}MXJk`3XrTaK+exzDF z_G){q4x1l624ik-^vD#{UB>*jk|n*ct>d)3GYEb{8 zfA>E1Rr(^0hdzJINQ)&IJ8<;*gA$XjA8pxeL0gU%v}n2+hm_>_@b~{D;UPuV+~3d4=5nCXHI*GGy5Uz9w1#k$PjRJ4w7Bi9IuUq4Hf`%9cR=I zV*3nN^yan92r{&u)XU9NcNvicfl7&kgbXzLrpEJ`%@q#YHt2`6ce5vyI;Aj;O8M?N za6q68u$*He9w)A+jDu?r*009gpQgw1u|7HVI%8QzWk8Zw@6vbc5M3T@fQvw!Z&e2a z9=_AO4knWFMS!$>J2AEVr8K!DBEo*%!Og*zkWdIZdt>(|V*krv9)b^fI^x%^JLpA z*%}%<-TjtaV8Zx?|8bUpw>qfp1q1y=#1^cPje|Qj6cH8sAA|mON?f``17YOJf#$Rl zZ3?icnz{a`71f-uZX~Mc>b-1uUBs?odn)0t2ffdNr-GTx zcRJcf-!j!lt-!JCDlS)I#+){{V@L=h_cuL2pAbb}$i_8uE_`EiY4xyM^6+>i^7Bsp>Y?ckZ30d*0Dr%=?t|X3O29kUHY9FV01x3P z-Fm-a`>BU5oFg%0aX%MzE+gqL<(OGtS`(Q=DPXe4%0^6XzRd595)ohTiS$V8ON#|% ztgdW0l)Ragq*~9DcG`Jpa@V69=*jN!7>AE~sz}*KZJgi;#UpltjF93$E%t)s6FpZS z;=q=cnoo`s(0RPcOp5_flVG4BeC8wiMtw%7eX}ZF0t}YD+ts51XG?UAb;`RKm+L5q z($`il9yz_d_eS}+MU`;Gp9r$GYc`De(!$2{rasf;42)YboKotbmM3Slhk8+XBoKsT zkG7uZxYn_(Urmo(!2xD`s@Nc#)`^_i^Mfk#gYc->-D9UUvEC4LVb!q4eL|W9HN5 z19-FNnoNxSOjYXA>8epS`Cp772UXK-{@@0M2-erGKjsase$+l{XU(QVh?ZZ+y0t|T z=s=V)pcj&=mMFJ+DviF`chv8PlC^rKTgV?Q2%+!K1N_^SO4^{IJsEiuw>2GAj691U zp)+qVNEyLfMAmL)9M0tI1B(J~f+EeEXT0~fr#6=t;gqgPhEC0|brEYdVxwqEO9G z8h)(pR{_TE9fXF%M-C@io$q%OYgGSO`TtWWZo4`Y){Zr6+xzLjLya)$doHb=5i>-{ z_G-0W9f;GyM&_Pc<}X0k+SSZYx2YU&w+~T^ep4^8_SWXNg}Q6*TJp$yXt`Yx{!?%# z8qYZgiu5%b^UUnth2tBnBPoP_tIrnm#e)5pb9l#@-^ppz;MM$TSC_w~q;uH?*fPi| z%t>060LU&PEnefLMbWIj3q$;+9xE51kJ-_S?I_}csko)}I7=3;Q)WIFOWE95SI1)9 z|8ABRLIO=^`O~g8fvBTRSd~IRf28gd-C~1kY|y=I{ga+Z?$$=v0mMQ0lN??aCpsdD zjd@YDbTFGt8{^$fs$E^*__(S02u~oOD5W%v#JaznV0flp~PF5leKG6*#@F8RK@}LwYXZXj2!?K z`B8jMQ4hrL?@YuAVcJ19L@WNvnwVo%RjG%(c5xqS9ADWXG`Fv8s9@&{%2^D1{sQZr zFC^OpL(ciswxp>B!DK%*hmoHFL)yiZf;Gr?D)9>?^Cj-XeTWM3Ab|g9Sh%_$97AX? zVp2uTMEpFhAv(F)A6MPUz?nRdbn?GxbBT?ujq6umQRAHpnIwGKQ1ML8V^GlRSgW;^ z*=g90H<*|&?`nvQG^+cB|A+WY$sSXBc_kK~X#+Mk9ABNzUG>%0~ zHF*KFdwOQ+eA)+)1rJXx^G-XL8N`rg5Gb9r9%9H?Nckpq>C{@Jcmm73h48D06V z4Wn|{)SC9~?8#I%nmK6N)8{*+5FMrapEfoh-sDta*XS7vSy%GK)e_d0LX(i!{T-Q}m<*IjxI+FUl(fgGjqy`FR!MWmj z094U4F%Et_=WzT8jQ}TqV`{gwAx^Ay(IXJXCv9x$a=C*TkpeG{*Vg56`6T zIXyDx5ASVkU*4R#!7`gkV%e6Vz1t9L zZ8AIE0-A{AtbG+L)_?LoyL>W32T=3Ie79ZAyC0kp`z&f*J6+9N%bHsB2fUv7Z4B%1#8t^zhdN1GRoMRBuWmk?Q>4Cc1Moig)IQkDr>{v%@C|pz%%JTwg44?w4Iw4beB& z=O!zfB6ejr>8+Qzj)4yfTw}f7VQSv!)>34U(PONi8bBTIW;@$Z#LJj6w6m77=kWd! zqJ5F01#vnIq6y!j-}!oj{rSZ3?q?j#iB;R~m0J~k*1@RmVB`vD6*LIjr1((fmw;%y zCWAAL@a*Z-As@HOen%9KgH$-OJIX!roxd;u=}z=uZ~^f&agAE>> zYaAtV5firm>yW}u13-hzs?*h-wP7W!OS#?X!laY+y-U**CWjFAhc33*POqcJ64l>o zxJ8s2F6nuD`XoC^1E0F2L04{0H6sV0zhR(dnb3+GxNm!YyRt(>wW(V;h2`jPvEL`9 z1uc2JQMRS{E2T|R$xZ4$)RjI`EBpYh@PLX|ZPtsWMmEMX)S@whT=(l$X0X1_0ixec z6sY?Xs{TmxawhpeSAkY$&Im)Ne`J(XiQ|p#tUde(b_UnA!lnI9B$NXTvOFIdXxDB5xi8pOGRnWbDXYh5`?H+{EZHrhL?{dbC)F&F%bb4uZ$ zvJP2xQy|%hpZ&m83ao_HOvg${hX)=9!+)T4P{bqqt5)@Z z?5FS20^jKKc2S|n4yZ6FC)mTv1FSRU%*DJ32K={up{6KN|9VA}pOn)tnW8l}G(S!c zBK@2H>PlFuue8G1D9^R5kvbqQ&c(qa<}1%K@oWKCRU%wrJte2n=*!zou{d3^E9JsC z{%BrTlcpA&pWc$&1wW6}uecrczjG7-_{;R~-7QW_VK?J0hW4xVklqO$%K9i`T%y(c zy@`l#GeR;AU$hH9yP773nvly~nXwZS&c~kv>_QrvPA*8dWL3JE;Y1p-O|9$2) z9Dbsn%U=~@5hJHQY^Xq$?_MPFA~+7Ru7;Lg<_?tPu><-QG5Z9?!5Gkz>zH6jX7lXP zeN4yW3y0@vR(_McLV(Xo%XSf&Lb{9@cd;!d;=XdbFPal=v{$nT9! zG`px~n{BD2T^fdO>cMh2X0W|KBU~AWQ>)MLJ6Ltf`RCs0G07`qo0OrzGZ(30klBDWH(^-<=Fq zM=8^*ZLC1W^NgHqF)Vd2eD?LGPQEiSE(3o++}q9QlN^4=L>5ieEXF_zxmI98yRuZo zj7%r;>m@ZMVM-<^0k)gOg}InE1;H)q>f#i<1>#y0U7xiaG!6>FqoYN@Qm2_|oy{Vc z%6-_x2(H2!D+S&ODEFRDEJe>VYXF}!Yu2@HO0IJWI{R>m-RLGy-c4hg7C|LSY#DI+#^%Is;n_^_E76 zg)G%5SWm?U32%r7v@6N2$pA-wF{y6^&tXBBaDdy>@`(vuMFKOL@;xIeio0)`^AWR# zSqT!2UCxCqw+HlQ`?*r=l8~UPQeRNkI7KDwAnN~FvvDKuCj8qX12T6lsL-x%i>N^) zo`_ea42rTil{A7=gY}0TwF$KsB8-TVjirsYk8ItMPm9$` z^ypH!Sn)v9tl{{b8w)>KnmgRtlX!%+SFJTL$nw*BjTemr#ov}1-x7kfb9QZNU=Iu+p*yd zavkj&6PY7Bdf}VD>#*1kLnCTt7FX%n3j6CA!Z<}_H2tH&4;m~@6b2hT0w!P3`pv0; z&4dHTi%vUM7Q?4LZcO{+85;Ck^FU`-mbJ8`cVP584Y1pgC5@?79#-kxp7M*Nv{ToV zI23#m)X4xaKE{oW7J4H}P~o6HTfe#zF!oAOeCI`YWjBFu?dn>tB`3NEI91sFfRa!8SIx#DOFZ+uZplH_phd#&-1}F@BNJR?Kr)6dn2|H zcan_cec8loLbxhF#kilYUukXYwdUlTIxZ)(zR=g}7|!`ZMC`buv$wE8B``Ger+!Xd z#=)(QE+2I7vI5HLLoU#T$nx?&WV&6$`aP_e0Z=~wXaL&`g72O}R?YHn$ACD(L$w7CzH^>L$9 zo|iSE5_0UdKst?XpjR;#?ERZesas{W5j29HZ#4nkr1IYUrm~>A5ksAD zVtA`2gs~cyOasZ!Z!GQ8KSeRNY-iSXx@%~}YpusI1sjc?8VxV-XRLP4XlMY>o!s(v zlNO*kZQZfPtTV_iJXCq)y#2Rs_GjmD>N={>*~8|gDl7x8!U8WZ-?3^?U>+8HXk@@f zqej(U<$|Gtz1tfh@S`UY&z~7mMsOA#{Q&(6lIuoTN4M%)G|v1EPhsWEK;NgF7N5!A;YN??FpNbIkiwI zFP7ZUvoDv70N#AStUTSmL42e#Q;eZ{l2sV!-*0%eU9}HVsSGV}0(F09Dj8)1wC#}9 zL+-u6q$l_GC$RG6%lWui0Uh{tBHq-^^;q>tGuB*5jRfnL`JHAq+j*jyGmwY@yiH6S zy0r9>BtgF$n|3d6&&+R%$EqKj0V1I1r6wsVIW;+;b(+OJ^U}@H*MweE7jt4ys~!mQ zhUak){c22cTyh5jDAZqwXmz)eQzFKQKD^SjM%tF=hFJ~Nvyt@LyU#yE$fT zE7*~&fmyi=&9$qo?#Mrhf*ZA=5m09-`5%qvEsvsK1+IsIs#m&#_Mkl?DvI+)ljT`r zI5V4CJ3u~eZr|YOvF7MN;?L<<@)1*He2NebUi`TYC~6{5n>*L_K4FZ`CGJs|==^Cm zO2JcwR6YSv=WJ ze7OF!7M|N@s@qwBk%-c*DK|)y*;Y{yYF^%uu}k7eg?fdJ#jqHOyRhln(q#Rl8{Y8P zoDs5lw3sIn_1i`<0S}TcmLRb-x3S)iGlkGEGk72GVclg!-!PfiY%#0whFB9it}Yxd zY7B_q(8kbCsvWfhbo{kpXBWYaWlT`x)+USQ2!+jguumyBHJ=SU=B@i$52aAb=S*dj zS2^`c`(l7QDlt9~P!40KG7RP68gC7mB%}R1a`0*PVGf;yW?M2bEgZ6D?c|+qpzJ)T z7JSbE-oyEfbHfnS$l6Jsrap_%wQF^Js&mUPopH*oP2>>l(Z=tX2L%m*nv?igySn*8 z3)Td(Lzkzhv98xjuUb*n8aW&6&x)#?Hjq9Mit?w< znFB0v$YsHbzTKc|6y7&j2o%4MHB=Fu>^&{4sfAK1QD^T2w+@!xbs%L`d?{a~|DQ49 zbewS4n~(gdo-7Ks4bPq1frbBx9;*A9s%AT38%9PL`rnNZGqXDjfH9OSx~{deki)?b6d0z{8a zGyz)ikUZbMlo^khIz@ikf;1dXA7R5i=oNua_kpNTj1Iijp-Wpjc2Pl)kcFcV%XWE0 zJfMnuuP|HJA0VCG#w~xDe#MAX_gHrE1Zzn8ApPpnghYE6Lhx%w@f;hxCXMpp1mkgP z;WRRRCPcfT=a3MjtaMupx#>zn`*;612&BafOdv(3sk#l@8{gDF3I;ahNR0 zNgB`e(5l-Rg3RcEp_O?K^zJMVtCVlFM`m*yKwtdZG!TJ$tqmXx`q~31fme>|Fuf}t zg~+|w%#=38P1Y+66&mI&Dbo@f27OfrA$k9S`jyyd zNA=p=^qvL9ET%UxDnb#SxrOVf2G>mi0Dk%S>fqF~?3uMqt>pDkepPF}O4G;61hq}- z%D($v-IljYO|-h&yeuapg+k2AAoIi&d!f#F>`)yQdY1`gb3bd(eT?B_*3m@$FuA<- z=A8nuUu$uSV&^y^!I=(6ct&Y2k>2CHZy6D$ri=*+aC|;f@pekICV^<}zqtQd<+C#d zlY!k|a#Bp>+<_Lc?q<skbA95utz5D(qj`rry~GWbDf>2DPcHLk@;@700P&?D3x{ zr_K~QMD_LdP&dEnL>1HaQa2c}W*n1%&zgu0&Vkfv?}e7v(d(ZvZ9KdiR+~M`p~3J! zX~5r29S|Dc?l9B`L>@E=>7yUBnFEy@He$aGth#`Ww*&7kN_KYx(5|+bsRp`rq=BGh zv7P!7g7nE9m_M5DFxkgC)|F7xA#qK4WsjmIBi-ue)VZCI1)+b9^&qyL=ZP{QIp4NPNtAfg>NAUA>C++j_p-MW zFZ+GXK*^xSUYH896FaT?l@Yp9HWK2%u`8KBnMbn8?V2b}MM>$|1;FyL_EaPZj2I#z zp1O$*L<2A8V7v7sF`kC?@N+FjMv)(bE*}xp)dui-cE>&ad{=^ zW|+JdG;Y%BuIe^$fROX&=~q|EdF2GScZN>>gMKA{`J|S=;>;_2q$Q&?MK(ud;*raW z(sgBq&&JC1A<1IKw2<+O8C*q1ODy*BZpFs8JVo%yu>J7XJmTr%3M8z_I!`=*+jnhGc{$1n@g z_)iVA1|W{J9RM@hI}9_Dk9weYkR!@+l!asH!FpYF8onns@@^6nGy>`o@qKtz6~Q1+2Hu9@ih!uEThon2bjVuN+>6E zxcraTvFIPJ#6h^dx(h?Ye&CWk*vY86znJ=E87v(X*KIjCQqO(ZXnJ^~*bWX2IeL|b zBru3;WocPi&&okgA7a9ocF8WZ48nBXK4DVO*BXmy9eVu*8(C-3XS7MI53}MA+*h2a zo+!q6NUJ$?;J=NiQPp&WP&{+K9eTQcrb>Cs++~s@M&ZrY$*|yk;sxaYjeaExO^?#k zLK?nrH$z5J|3RZ8Od5o1;Y8}-?NKLb;kL&4$f0R_9D)r$G6uJ3jfzdEiiYOS=qi;o z>k5@9g$;x5J2ZhB+n@P&M*Q3p-uby-HzR<1v&eptQO9Zaej~A=puSpBN54VPy} zbY>iHw$85gyZ-3oebiEY2Uax=)?7lfC(!x~$HPNs?mW#wVmkFkZvZ6a%^kIqVhzo3 z9*^s7l7njB68Xba;Zi@&aHlQb1PcetHc;yyjgau7n>UTaFx*Lcbg@b16*eK~%8%_MBkwvkc!`M6jk zZZgL@(eUQ5nXRFVblL0BgqnC68ieDsJk_qOd>`)ue6O&n$G+`#Z8}szUzt+4`(u*} z^44~EgAnuUMt8Q=aUc@TKw!(e)NrwWvKDdGS|s+hu5PX|H@|m!TcsN-OA7`5OXpS` zhK}J30|CJNUcYKWC!elvkP038`(LJdt=P)IA4E3qAdc1BaJwA=6Mh&I+Q9)beIfQ% z#sPMJ!P@T@nd5!F|3Z+iUAYt+`YrR66ZmEGv?!7mn;}}r=vWh^xusbJy~CtK6Kqy> zyK_p?TtSm(8Od_3l(;qHp~^?Sn27EHP{#9U>ru|ht4eI>vc2D*rIy0a6!6c@?cA{n zXQ6Gx>zXEdmAW}#5Tg5D1236Y$!CZzs`Nq^uH6>Q!{fT3+t~dI&4m;)QmUobHAu^h zy?#&DaEnr{5DwzL-#Wc-dJ7QC(KDjA=vVJlQSL#$G1BlH4_!ocpB;n#H+`hO6RRfK zX^`PpbfR6gp9xT>CI(PP_H*B%SJ{U`$##RoTZ+!r+R8*)UXeqHd;*rRU7eaXmpUy7 zDDnpri`)&Aecq;xUTRM&+o`}S{>ueWdi`nrbjoJHG zXNQOQO`M}-AgDzD4$>bo475bXl2IK4&|9 zN1u+AdTI95Sxy~^TiS_tSg*^!UuA1qy~^ijTOP!b*p{_R ziS%kj%|*pqVE*z=2dN#kW}|Vqdae!6RuWr&1EjyTe%1W+5=Tn$-pTqW4L`07ql&bG zfSiOetRI+aMv07(clIJPC5W7mQ12sl*~0q<)b0JM6k1Tvi%_MFt3GIXC9!q4aJ!AdwIw)i|@KQH0;gCh7|Ib`C!VAiA zgDDR%NWd0!`-)@m4<6msF&=wWC!d&m$n}zskNrLQVT|M8fcspeSnW=@2WlRvUkxxv zmoF1`STMn<+AU*W7uEa#6l~XBwEuebE>Wzf>QR9me`TOKH!Zh+CJuE?q&gs)FTY(^G(CM zmE!@rC{Ecljsn3Ndj0Hg?Od_hGj~aLRwxSF)B&w z+~^UTVbCLOG$mCns(F$jUAhmsc28wS`te@7-}|lxhcMu^1_eYz5(i+wLkxe2>V=OF zw4LKT+n!ZQM9Z+kAwEA+)2^|<)|T;E90>2_wqjS&V6wHnwl=?#-Yx^5qIc~|l#O)> z`19Y^=PZNXp%Wdyv>|+l%!uR%?Y(9cN2ZgB^}3IHa6X2F?4ZmyX}Y=Oqm5RfJ^i|E%y(}K3)T&8xzkIb{->564 z2q%~7Hb8}kyt^-S^Gg8sN~Wf5bIAb1(1#;kjL99UV_o>bkMU*N)h%lmj|8$%@dF-r zP$;3?NR-&Oq~`$2<81bv0lv_2xRoX`Jx85R7O_gWBC|1}h$g&9x2-nyWx5eJUuNh? zHC$?dqF!MqyW5_L@;W^6Ipb>6fR=LvZb7mO?-Z&5%^C6i4cipoli#|}msW5nlt^~p2+PdZue14oi*R>ScF|9wlj< zi20C>GD7mbulWVLm6=ov8`~Q!ueJe0Yu`P*5n=g0%;43T(vzAYjWcWoGIm)b)*ufv z6D*+EpBR(XZw_%zJ_|~wjvpBP*(l_TDsPwLay=z)mIzS;<;=oSAACAp4}9F+N2&5YIX9@h-p3i8sBNB_z{e5Qx*7}& zg%v>isX^b?EQ-j#GL9O`>{9jihepp_RT(+m^!9)Npk8gI?s6}95cZ~q!m0|iwuR#4 zis;-xakUXkF)E`3GJZ`N$ojS>a$1g6x^*mD^KgzFTln+wpaxzC&h*hnwb?_Ycxb1r z*gP5#5d2I1DZ^Z{ERhNKodHu>tvVGG-_H7>wQ zYmq}d;P9&eKb=*Cygf)`s@rWzv<2nUl|hBRXCiV)m7+H*0f#aFv++*gpmni19Yn8! zi%KJdpzm><6S@vqOAn6LulRw2a;RY@q$C{>5Mt$ZwG5e2$ow250<};3Q8qhwl-~E~ zUwTwMmh>|Nkta^e4HIy6`))hYR^Z9W^-$)CJ~+j>g6aiIFYueO{DL5bGj&17t66ER z7>aQH#{PZp0omz2dHOhve3E`er|i63+ij&T7-rRU>sfWb*k}4t?DNBrS-Rxr2r)VxQ)I3gqs(t3I z-6whR=H9OKj*Vah77>rPd&g}>J`o1u5jn0;cae!)#^eJ(GU8P(ZsZ4sn}db9_}~L! zUw~Nz_)QM890xceEn0A0*OHckQmN3v`I{IjZ7pgqgw>AmxLxQdyl=4d9%4@dckP4{8r5kzwzn zjlB__t9>~*#!vJfFngfQMJGCEF)5m(1#uQb^!U{G%_u|)Ze)ce({Y{t)M?sR!Jl4{ zY$dixrlx*vEtkE>yL90JM%iv&p0^qH&5bHu37bC6m+!yBdbv0^N8&&;eSF})-p6eY zkQ-2*VR~8T+Pc*gGv-jw)F(>WaB)-FAizuYt1BTRT;PH_O~?`LOS)!7gelg-=-t!J z{A(RbmA?idUG(yAs{#F2La|>$(TU}|j5>=46sM+=1N!Ev&s|KT%YJ5B@FsfJuGwi7 zo|CG>j~CIcc6D#2$IhJx*FF8W^=6+|&)DXz=|f=ly742jZM3z3B1l2YpEIO((bVIgKflN`pvsNhr35fOSXFw?H)8Ma;I zaQSDZ~Y6z&btP-O3 zWPQ~=TE!HTw+^9BA9Hcw_d62!0l%YZoN8A zsL=xr^fs3VhY%tWkF$3hRGVwh6PMMW>H|xV!z5pNIgt6bq?d!}E#~>mJ>Jr~ z$A1z9M@gFI*JGph9?YcMbzklA(WwF5o-t(pP7*D^OW=L%6l zGp+eYjCLFX=;>mx|JtS%Qr5Qds87L#d=D~g&v_CXvAeK7EV{3Ob)YQ!JA~St;TIE@ zt6Dqiq?)prBC2~6Q@^b2nuZO!pX_uGH!d`uTW_=RMRX&%#TSoM#|m=tgx5ZfJkbNi zZa)H>cmnTUM>p$T)znrEK3PgZDav(4$xFR!1z3!~$mGoi;J&m!N@%q-)S#H|R|^~c zQP$~3Qdz@mDL3o3BO^~_0KQ<-MZH(Us(`2g9siLjrA5!IU%yqH3Jc~n3~IX)UmFs8PHa#q-G*o z6^0lO(yyNFD>H>>hFIUhHL}}j7GZ)6HMy~Gi!a@XG~%h(nOH{YM{?&7xxe-|3F@it zS2PQ6{p6gq7$mPXe~r)H%`C>se$8qr7lnjfABk<(VB+3KpkKSAOQHp8c(PMpNdpR1 z8gmCZ8ksE~(dc7`I)caa1+L*7h-zo0s#X639 zy9SFhrK=EDYCLrl6YtIGRZIY~IoPh1zG0{(yg08OsOGzj0Kf?mI0R|hB>-f{JADu5 zi2F~X(RQ_|82M)rm*eAqbV!y%IgUxKE3}|e5D=N;4V78O9f2~2u2j-m=5>=!nx%KY+iSb;8H!-iQ)dO3h==b^tuR~GPWm6iroSh ztYODWamH{^ps(AgBezR6P~@9475j?GncJzeFp>(81NC`SYbB)(-s-cNFYFB>1F2hRFGK%(s7bno;46qj-$Z)jB@ z^q244M!%BQ$kk5TGr*f#x9zN`5vdT>Ukr3c;jle@yrGYgpDGlnrq<`?C_`p|#n4am zZjMeSii!IFn8Z%jgz0^N{-q{u%2vz*t(s?Q!GysaW$2NUvOQaJ*GBXw4bpQNI=&7z z-Sm?7B1u}!Y@*g@PP-V(v8I@<-U+KFy>5QU9*7OUopiyM3)vh|Y1$LLiBkaDeq%uG z*q0aV#6Jto|vaGMo(%d@hS9N8)mi9J)NdE93I zS`e^}iq0*1=TtYkvIgng?+o_Rt!}$$Ns(;dz#*K|uLjWy8DZhbIg$BCp1}s z-U{h|+}ddMNjPyXOf;f8I5=g;E;+meMsaZy)wRe85!A?|rg#791ZeA(iwCr8Ef@qI zKEuR#pR(s2gSMdlvr zr_(kp;l&MC(q@l_M2F56wTfWVT49=5(yC>UcC`Hg;XDj>k+(WZ zzKtBRym)qx@ehIV~{YL3YpaOF!T!f{GUtRufjck0?rX4;0y z11=F1Ud!*wc*m({)o$c&K!~%fGs}uj<>TC$)=U=9cz30gkuxJADEUG>B;+ zUhgS3h|NJ5J)-((%Qp-Mb+U{Ubw-JAc?No=fg{G>HgVff!gK2*_~DlwLl?1Ytq$Pdg`P)Js(Q1tt!e zbiFyRBa9T|=kDW8&|)ub2s?LS%JmHnI8~FhA@j_U$cGxa!mk{40gb~tb-bNn#)TgP zDE-_tZhI{b2drc?rILzsn2TrG>kT2cQ&#y5{XEM)L-1PFxqTHEWqXUsEDm{0?Nc(A z#Ea@)ZO0n(o1reimv&|JYPg)uGk|({dLVzD@ zpC-LC=C&hhBbJx3=k$S!CH3Lkztck{enHRH48uF#VK(YDbm)gfU%|ArZJh~&_AXO} z*x8)qkD2w^datfzU;d2|_PU3loMYY=$z9oJIDDpl#iKrc+gT?_{}4S_k6;GcQ6Swj zQ2Fut)ukFad*!T|Jfjc~F+S85#S}KA_(%Fx8!Ou47kUKraP(W{V>3H9pXoM3 zO?D)u+fOrTI511~jA6~JBlXNlCV5Fb`NhNId99c~LU5GcsQ%zXFRd;2&GNN7dY_h* zDA-48dH)~m{e7_#I_Y=XLkXV_tgN?L03W`jOHdt0mK1~*e`X)vAmC67q@db{-}LzK zz}ZEe|HF_e9F=SV&^*OtF-k!ghw1q(MVAu)d`o7H8$UBn%q;1Q7F7(63CAhM+^v-j zGn8`<9V+{%s$^A|iNRjdKc0T?fTV~vRGz*xP_v_F8Xj# zU9Hc{RE9${;3<;xek1dC>_P2xmz9A7#vT!2qFoyE%VTYU>L-iBVcqUCca$xXW)5xo4>vyj>q&kTd=r^&SGJ-F zV(#9qz?~_0%wbKmCQAnoPDJn6^1QO7grqL=ji6mZ94O*f-G~j=^V{||T)MZZoApc< zIm*t_uS-COcBLy4l>u<7o};msE&+S;UoyLt;;=;6TDrg^;Y+(r23tBb8*U)ex%yQn znApR94QryVrltNq(};F8X4LX|CvHH%D~&jtGL^AbVxA;NlU75uHs66VT|LKSt&yx( z-2c$4_4drt-o0ZPL@4|yP@8kRRd}|moQ$bf&~v(p#Qm2k?Zzy}p2T*=e>xn!yLf^K zjv4a>rz$m{97UBrxl`P#=y-3C3F$mSzv6EayoqCeON}95FVe3Fl1~l27iJ!>Go|b+ zjtwvX4}d)ob#;}?LO48CIX+*jMCAm&&UnVI_YoSxmCKt$Ub)&<&gg zAr$2}6P?Y)1-YonG~V_7ryaJmQiM=**{#LW3Prv~?jf>w54T@h^X-~P4S(qdVSQz^ zGlnOgW`LF28c^R%22?o89YnGqhLC}P_=X`9-{GbqI{OWMuvou;E=!7qQ-nU>hd=G= z>-;wJ$=kp7x3#|{BBex$C>{9lokFT<>a^UR(aGoWoaC_U2Vcs>Da`u0CV2<<&TmHd zpu>(x%Ko+42ofc5)4|{ASD)47XX8M{9bos32cj@pWkW^Xr%$)@`{826ya!1*Tfe%R zUd0MpuYGh7U8vTlnK$KOPb|4U@v5MiZv4QMD~mc+C1K3_T}`iK-l>6}OTJZwODvdry}n;fkS1J7Thvae ze`ibeYGGM#fxd5k;pU>iFmExo^ZM9w2dJbzPFDdKP}x)UTs7de@es1pt>-4_!`|~D z9F${hDt$&*#V@A&wDWDdO>Dioi6H$%zv=^~tut%j=W7S%N@4DiMk2-MHDTJjzOcBi z{Z`Sb>qyD!%bDTV0S1gasC#w0?SZms)eGo%yV@SDGNhGfac`$yrd{KT{>N-}k= z!jNj~RHAu9Mbdz)x9V5T?c$B5 zv_Qqz7>lYG1}F{rgyf0Z9KJ0xr%RTxhRBzZhXqcy!=X^F)lO*Lf|bn3@*902z=%KV$=u zmh<@#$4&q&p-)uFsCM`32=p=_*sCX)b=B_7NL#ic0h14-7wyV!_o!PS5d!2{t4(yf zoK+b9a}%(trlk)kiGaKRYj{Nis<+*!fSY!0r+foMvI{WQ+<%6tUdv3WeRUB-ez>{* z-OBea2=EkdN5y8*&rO}Q)fstg;oq2YDcGuleBEtq?ORQNn6Oc9K4x;KIG6ilQ+i&X zV57(?iL<$c1@3&+Se2`YH39TW>kYQN);f}Vb(8p(H$k7<Y`DEabhpwkIqDA63Z1^M6IYWNIRM2&g!veg(=BZ^+p!-8y#K9rb2jr_ zO6e=0R+dzjB2ff^ zyotGqR?jXBCLR0}mxb6NI%*NEd#)3#WnV{54PwU0YsIiw{Y4z$C)D_J~%j8->VaAmYU5(FfYZQ zc13i95F7c=OAEp{ZhpnuQFLvkt-iN~7P1NN;I!OaTGv^}IK*zO z-ITN<-2@2FHGo*!*fA5~k+(Ru=ec?9n6%CV@QPs`tBHbP5bbEgz?vVV1A$Q7ReY_k zjW(I|&eA%5*Wc|$gQCJ+KppzQ|tCH1z`}RNQccX4d&4|&@ zhl*0=2->_-mQG;MCuO`?kJi=nv*rJ^#5%0v>878N?vh9eFT84glVY!%kKOvhF6s(T z=9EJrHOvjlXvBRDcUl_tNEZ>qM;QF7c+F@>FJ${`d!j4b6($}l{BJv@C+^`iZ4We7 znzYTHl|@aZT9w9N4PW`p4&wKa^HZ}Pdig-x=NboHElRSAqRH;rek4W zv9t@0kO)WbJZ9WT?dwT$UTIZ*y-iEhQ(V%7$`98~^_91@3f|rpN2c!Kg0a?Ifhw}Y zD!|PLz#~_I;L`|lAmV*pkhitun1W0+;E85A+vG;_OdzR+ka949_5&e$yPAJhW}e<| z>Q}?j%4Z$QmhZ!i^J6vI72wqEsK--8Wj>|H>J!-uiFrG-x8rLJ$R7+3C?u3t9_zQ7 zmDDa|)%(Ogfjy5>6V*xtP7hjO=2s&e9#Ips%`pgdC3fUt2(@5jnck@7YmE41r;`2< z^qwJy6mEXW@x?=`CeM638( zXVS5D*$$>IIPpu<<8FN$X#{)kW#EFG4o)xb`UFw#ZoOttT1MI-D3>_r8wE1Z^sfgXlZ7Hi_6aNYaFs({XZo}2YwHSWWIJ?p#poWj^+qJ+11tW4T(-&& zpkueS4{-R)j@gQ2Vv1UwrHH+D$Bgu@htW~ZXiHr})Aw0Bx&Bd3I1Kr*(c20MWH*to zD;nshM%ppN0s5EUUDe70r~N=vUQC1SQuX8IdGf-eeq?nR{pQKro5CqLxi-nwr4fnI z+K=m-MWC#w*D7g7zGl9|XTcD9dHY^ax&rs8#Py7HbD5Vv>H@;{eeXi-)zWYj zl)xZzQhasKyxHL@35-6&5g<2tusMZWC)+pj#TWylzly6idAHglo2&zGzB$y@+$|qk z_8H?u6c^pa8~vo?+M$g_g{!2apdR9XI}`2L4l&Xn+JCq8PFSFM0Oy#Zh3D}hwFCE> zy8`W0fIg)L`0{EbeSOCPFu~6MG?*lZVtP@3`nU>=x|7j3v#_%jRCV3V656O8I(d9I zWd53wg57TzhI|!BoHb#^TCo(@b_a#K@;+14syx52EoLF<_jEcc+q$SQTv^6zxsr84 zMABNHGVp?0B*6}{3y##|7qbtyb6R7IT;tO&a(p8rfd*gsyD_^x|1J!(h%qDi1hU$$ z1d7#B2%AFVxUB!_a$y-bBN5_zPjcN_5k@B2@ss|`21vXw&LA9p0x3M&xGvu-PYH}c zt=pY0Yp7qjL8=~WQkB8eO`*(zVn6bETN_QJp~+brbpv~K1NEhlAS;x_X6&cgj9uC8 zKjLO=EIRJc5-0o7uj4HFb=)F|(qxD>_dDn{;F2 z-inqs1Dep*$4j590~H9)uR@f!nAohX&db*ysv2K7-U!!@2y8Bjx-|7Fjk3Ovz7KW+ z!o0zO#gU!h=M~cc%Zv4i;kqK>s5csU4rf;e%f9m|J!KG?^kbZ84i-)sn@Z3ll)1Fy{UcUoL%n7ad{ zJj_%+Y)#aCMY>)%(A&wD3LfF+E5Mr)NE5eruOb}35nMost2h`(k#xB72nN@#ejQxA zj^e1SWgtIy+jWS|>uUxE`Ra}$<^sj6gwlI;EpBMzKq_Zd zRDOz6NVUw;DM1FFFV;!6;)=Ol=xxh~d%eH5rF@PNWgz~Fex*Cw3#h@*$!p}(3qF#z zk1rStnhkO>bGjVKm{9a}CQh@9dkft`8J{OpLo<2{EB>PTp#R@Qe^@{z+@$;1fTFPj^a93S+1O(ItW#Z=55q5?<1c)mQKN_f+~Tcmrk z6a2|bp7zQ%kyh|SZrIk<_3s}tv^xAgJ$X%uq~WyQ((q$N#cfRjI8dm@TREgbR{C*{ zDaWERm20ko;yll7<*aO;j;R=s1FLamgF`8>_^)|%&M*1K^{rpIS#!h@MC=yoUXfHe z!CHQBuvM4G(?5*e9yEuliIrB3T}pH!=(S#0wuB5 zgJyqBtrX3)u)bGk6~w`c#7g*tm(6Q3;f3?y;H}K4cC~Ojdm+*?n!hofh)BuE(nJ1# zG;(s1NLEXt7ay~6_M2C`u|np@s24Sm*#(7in}LB$-!N6_kFSb&5}wk-^-R5*4){ts z;9==rZ!eELrO_DB$_p7Z#EifCfm$46z~j~IM;gR;yxwi2d!~4B^Vim;iWPSC&sO36*<2X20 zs~Pg0Qq8u_-s?z{EGroeT*4%v%vAab#9M#+e>4D2$^}Z1VXVivUWJ34g*jt(_*^|u zSB`bBfPS_=Wh5JgoNqP3U0dIyO4{=i=>}N%6UV|ld2=KYs0XM16<0k6CKyAt#!qa5Boy7@&Pcw5_;tjwzxQVt5@9BZCcbCUBWYWO3Q zl1Luy4CfK*MD?RK7!s^OMPDyyEqj*BGV(HlR$<+s#5eU^y0=uA&gGH`t~&Iw8~AkL3AqF46q z;=BrfQCYNkFwui^_)xoAV6ZAs1@!GP2@2>NsXH`3)-+njdo)kx7~MI?y77NFMzxo( z)D?QKn0)5(KBJbw#z&iJ)q<>cE@~%Rx}bOlchKO9Kr35Y5yXxvPJ_M12*77utMjN1 z`TyNYCr04da0T^$boCC#{QO!gdQX4eVI0}qQYP3uH6%g=xqXU}BLkJ46@ZTSS6@qd z624G_i;uvVHkyZgLgmcd~1r^eHhS|R{@#+^STC_YJ4s`pe0C2k!+~as(YFDuH zlt&)zDCdh_$x>){q~p=@)@&SQGrO+!gb^+sp@*+!-|Hr(-5Elo7wCYWBcBtA=Ig@3 zWbOT(;IUgmvJ|Xk!Qe@vbP+qx5MbV=$=ArJ17cp79J$0TS4dWS3M6M@+SDGm!jXK? zqrnNr)h_ofHIsq(Ub?1$wY-Ur^7XqLaaNRbr;`+Q+I&LME5*_p#_H1M=K5xB*$Je$ zx-&rtnOUDl8S2)2xx+pp;V;pzzPi&p%+AxZZ=2dq!h4ur4%uit6s8}5HcR+F_aclJIuae6!V292m#e0>Xcati~ZDrB<$OfXm^A@ z@m^!%;q7wPdXLe6+HhrVeq~F?tgUa8bz2_P&CF9-+fU{?=C9)di19D>$j0>CNTCs) z3tKCFY%^2<+~gx(ajMCe867?{nDk{F%O`z2;!6XAqbU+Ju=eNm*^UZIZ>;FFgQ#_o zkN|}J&L~}(vUwL_dZXQ)nN}Ul<`;onH`2YrR#GA~E%dc2X2{4K8!q)^T)}DIZ%G?x zSTD84K8PaSKoVCkx3G2!EBN|*vtm`bd*ID7zQ2uz^Utgf&&lK%IL-v(YX1Fs+1V0`fox-Q^>Mi2*>{z*`ti&2+?ubZevI`@;yV4zi#*0uCqSy zNrCi_y8x*qSXWVR1nG?HZ_S;^C_oO0-g;JAsZ11uZhiv@=_Lv~Q;OQOH3OIqJ3XE6 zjOqPKFAs2|nLiGEs#X--Tmp#lr`F9V(P8)b{405=T_NyM$SF+p`|MRE{L5h*$SXv+ zsL4%MP|V&jA@cI-#Zm2+oSsbdKZSEcDv_f*Ae!xpF2wQ2cE08yNigQ-l_Q8^`4+o) zeZ0XAQGA5inG~{g5__kf*~_yG4XKK0+kr+a%g;B_&hJ&CW9IrM8KCXF{uC%wc(#&@ z8Td&i+12wf09Urou@HYrGia!KsyI_0 zR|1#fG4rwtqZ!UuVPCs)#u(la-2c4btnjvS@g)T@AILKag}4adb@i);Vr@3O-cZ=r z8wF-F<om&|N+ z`;-PJ$#lawLXUsf=*47dUmV4gbsu-sH$a2FqQTdos%$}|qutbfSF#XEWge*j0^rr) zJEI@9;L(Hy{p$0rPA$4X>7HaVZ2OM+4Yei-f=jukPB#r>K(l2;;pwOS>&lVVX?eBQ z2~VFfWKA5KY1@%uz~ET1=6#j1N%#N4CO27SIK3{${tIg$4vG!Ms8dYuW-zj)OsQJ> zLhrw5ilMz*OlzppoiyQr6Cq5ynib5XM+n0MzUnlXu9oZhWS1>cZ3YGi6L=f%piT}L zvlsf`#)dfA+Fo0eV;DF^|Bf=@*@_8B4glT^5=WD=g%7;?6vN*|q1opC{jn+zs(sgZ z9_1jzr4CfP*`PapPE%qEko*7})b?ZsB*J{XQ6DZr)HFvGsxtH7g~kX4zhV69bEpD^JYuEhj| z05PX9=ytX6a)$_f;=D%agm=n7b&oK{3z(_s=P@xmyM^His5y=v(D+@AU70r?uX?Gr zU5d0t{Oe?=epf?uAgGMtI0L~v%x3Ti;Ki}sex0SuaX=jw+H+F_(0}wj zH2HQWCltV(URm0&Rk@DKx;^!CdxpJ`@;|TVYabCKd8L&tv>t;P~ad?Sr zvbaUB|HN9dJhcJO`1pBEa5xXON53QO3z_Vgg9)j}7XMBdQd+YXMWMjsTkO;Yn>6@F z$Bu{PUbU@`*n~ay?N*a`GQGDB9Yol!>{Mwr1>5#RnR3p^{>es`b=e0d?cP|P zcJ+>JcJvt2K*^T!`*!#XaPB0~zg@BJA1ekw5a;xMToWz&p?x#jdq-#iKk#;gUJrJ3 zj>w8Syn{dO8lLi=SsRSv{Vu=j6DY<4SQ-+5`4UEonEYY(Djxo92d-AgvfIjgAJ?a8 zRX>>%Gu5CqQ@&VVF zUpQS9j{03adH>+@G10-ebv|_9!ny;brVX>&i&p^vg#U4NpSADx4HdQ@PzDx0M0}{` zl?1_pa$8L~Qg?3&EVV0Dqsy#mQ8Z~i9=aOH^|)7Ct9$3xBU?2lO{bZxbas6N!V1JVD;o@sY zKSi=W3pw_{eA_vesTg)3N<&aOa%mHbrOB)gXz7F+Odl*GWX9BCmJ!J3ImbQ!wq7B* zJg~mGyk|iXX}N4{;-%eRSi7C4lLQE1H15Tb3V91{{<#^aIGS3KXq`!!T%R>Jc~+zk zc1a@nMU-S&87E~dK!E=&LhAp|Z0xPz$e&v`d-8WsZgWkJ!ILY~*%n)!w4 ziCi8&JyvVJ=Y=tvwe^@;q@oT^iA|O2Cv+9!Oxuj2tm;=x=~Ay#8{qeS4Jqc4$dDGEQY&=s}_lOhHc~HH7p2=ng2VJocaB7lvq~ z=iN5x?&~0rzzn7x0pr`%Z#ip7h13m7g(ls6?Fy0j+%CG-CJh=mtX(`N!@2nkC3ZU1gn`3-}Bu>YN*$g<8Nnq6%3C{**VhG#8E z6wq0|K^Uz!sT0N}$DEOY1C&d9GUD^jSs4W$V_YnG)#y60#Wm;qumJYqpuy^n5 z`p(?qWAxD5OwCVCh`&oaCCChoEOOLC?hui&uB)RpmhFJM>_2ooesF9Z)wCIGFNaXNndgHJeG75kb7D6Df;^4aV@#8bFO9yv7!XU~2jJ zU3k?MQ|NFGxH!{COC8uzH(}QU9ipa}Rx||}qV|!dIQ?mz(GK%dsCre6w|cua2&*IA z2aVs6D>bkzynjiV~G6T%c#lxMu*`D z_cG$UKG46c!qX88)cl0KydkT#u`0_p7!*%E)(F!=@*~lJLa()cSCNcSf02!w>Q8aM zKLjWM=CfxXDb>E_f#0i75ccdlTpkXAJ9r#pUP`XHGj z-bDuf+=O%4FpPW0nGe#&5t%gn^Zyz|X=|{O&@^rH8fd%Mo;QJo81FT5MzTOs5{P_( z6GJP!YaAk$-h>o!>eu>}EGRo`Ze2Mr*bV9h*1yM`eUS=zQskUaL6jTnPd%bcoE6o| zFjs-L-{fr%Yi*&5Uoj-;0;MQN3(H}9UMYrFBUN8=V`+AIyRx-m`0emZ+Lf7YS$8Xk za%p|1K5^#!jQsq8dLi-uVBDKq)+X20EEEwF<;UxRdOuxA8z!_m*Cc9gC8{H{FjNjI zwA#7wQ=}v~g^~D>2|{|4p-Uqzr@7CV|49|L(IYfR-OcJU4Q2LSnMP=T0fUOAi83EY zUqMO7Q>3kBB^$SR8m(N_3ELORY5P3k-mc3DK62FKi8h|BxRue5tLxqe^*{~e@Lt7S zC3i>u$c!liSprSkkJRUWEP<>mS=kC%b$j=H-vOF+EBhEhAWPEttVwrw+FXZl&)-FG zD+mH^r%rbkiSTU}L7{c7i?GL)0m(Q09wk+C#GA65nm+luu`)q)atGC>Py3>p-? zAf<1YDd}hx@mlmW(CZuiax1k7g~A?!oA)p=lINmyrF}V{8|1l15>hv-YiTWD{G6y) zP5061XdXFymJcj4?86B>otE3x=Eb3^(Bj8pS$#3XnM3&|~n!9q4Gve!W_3UD#I2PYZ$!#Q?a(lnQ^>W zUqA~l;xek!zV_OJ3-0lnwcHD#V>yDg;KP>7*vSDpI;&rGzIoXBpE#WPYP$Pro1C4w zuF6UC%77@lIdZer->GX@b7ZhE6``eTIBc~l$m(=+H|eOS|AqHkD>RtP+lV05(L~tf z054w4aUiO7keZ}+@!Y>6;?|3}bbD9i?2XJmYf&hHklPLQW-P1JS8K7*R#lGBBi|o&aF_=*qA&pRbrbQ8#o6P9y}9J^X-A#d zY89TrPb6ktAG+F_VHj79SwubrgB);E?hf+#O%uYsaT-A=6m)-)^?Xe$q4E<_XMl-U zIa8?Z5%5dG5fgwf`CVm;4xDIY{~T|&t8JJ(2kP!^ZQBach+H)F1|wG;A2I05*&sl> z>Wql)0s3-jSs-?fWLpnR+%0Nq|_1oa2j*Umfak%~v= ztiSV`b&hBa(=X?u)`IxSGlp`GI$U&$Gq^@-2w(4La1)!8L^2hn7_~)rHb?rGo2@!@ zgF@%ipK5SaLN$8@m4BdLUFmV{nO$7w)Sx)${YGl5zOh9*)b#xNiX=VlZtGXqDnodN zlX93{tePQ}IR~iS#DsWR(f>-jgOsdTckS-aioZF54Ggfs6F&)^3XNZyLA5Isr3ws1fZ|i8h)V2IHM4T&P_i%W zBB&dYkDTtq7fmqE6yA<8oDp1D-S0-A(~7c+aK{{EaF7Tv$T3gi(v{bnUEQRl>cP3q z=>r+erxB)a)e9tuz40ozK zAIvPX6m;r(#-ThD4wvc*dcDS1!kbAYRd)m$o@>nOw$Z>BKJhez$pxlVJ2DX=^F#itnvleOmHsq$S)|irF>PPZwh%gs`7zMy6%Gb_xU4 z31)Qf*8#SkWq_1k$>1m=>+yM{;ffk;y}nD0?3|B6ki7;?qz~gv=}5F~ZJeytr4?rx zJNdhgGLX;fS1olue2dB;+kY@|tBqOR2k>;BZ<>)Q`5lq2WQaiKi*~pw*CcTf=kd#? zi@8A}MBz`Y!wZrRrUwxsquuy82IwfgTpiEMdL0hFsABKA@cLfUNzBcX#AInpNi!oA zfe)|qPpwUF$W_-@pw5+TaFwR0TJ3mykuLKx>*}UVsU#9x_E{5V%di@mV@PmAvwAa| zacWoqhEsiZ@51rJ&$DPoU%Hy{|K}rdxZCZw@IA z++EenB6B}aE0YUs+z2UXmplQWEvoy`i;LShCYm{pJrdr(oppe<_)1_vIR4VB{!p{GJsZryXBs@VhMCQnFUj656Np z7dD4msU}P|;~q@(qahk$8dOBVAlQF3>%KGu2O0H0)xWBL-rV2PLVf!b?;qg^vaRIN z1k+^`Te5(+6mT7s?G4Z3pAn;WZOtE4nydC)M@$mZf6Iaj8SB7zYm+n}?kWzEZECu) zy)p^tDRb+~XuHW`nOjS(K%8Ql)w-5Gd?bp%(Hjf}lG;_tZaVE7&#KIb>d@o^I1q2w zuf*9aANus44%}N0)hwY_STr{v+VTuTmfEs50u{(}DHnacx+nc|@*{JuLVwS38up$; zKcEkoBn(Q?B7l71;rdlan?KXe(@>j8;Xmq6jab_yR<{ohW{r^a;u>*1g7>R3e%S+b zV9ss(A^A0f*LmWK>PNk<-HR*CwdT6$Gkx$qj1|FKWB*_pGUV_Mt_d63TN-MFXYf(| z>hsf^8ySBZtjh5I)6Kb9Jy_>0fI+`NPun&0ZTdmp%v)bQK;Z$~(g-`fL})id@O_04 z@_R-|RmmX7IX9xvg^xIys4&o=0ua8d2}_q&m|_C`PSmd>fmBOL3o>bh9AdXCO`l|H zF;Ow(&PF37gH7t;T-qLWHlbbGU~)%3(a@8F7=Jk+*Om_0R(x)Lg%DTvh%r6UzBwE1 zbycDnldlb@iVv2B0r!Xc7iw*m1{%z*I?r7aD9LA-o7a?jY>A_k5z zM|+HZ#er0_O11(L?(AkNj=xpSqFTsEir|G`*|;o&5Y`@YKF$#(ULWBJFQ4pYvgNJN z|2rE(6}^=Q&#q%c$n#u7zi=1sWVdW@K> zQ^;^-BHI`B_%qkcR#3H*5lHkc{R(7f@Nc$^+51XGYcM@#*;6ra#Asc zUo-9LLcAmWfhAs?!i2(WSJRQdG5MUIU0iQg4%VLu47V#rUZGl%Eo>i`^L#Yzi{!uJmi_P0n%gDl%BT21h4Wpm*gQ(!;CS2xhhXG@dHJ#qV2B zC_z!qDqQ^PE?f+E3M#%-zZyaUNKnG3grMRL#khK`+f&!8GLs8js(NJT*t=XGttUUG z9@mqHUl4EMj8bwW=jsN$GwUmwxOEbVQayYZU6(9VS~bCrk-XL9eTAY1`H|eIoaRd^7ogruvMlkmOk@wzVnjOX2_h2%ZEHK%tKoY^0$VtfLAd#an46~DVw3Bw8nGFJC zA+jwHIU_(sBQh9}03*PF0TWFy*?-cvj1vbGoZ5 zcXf3&{>3j%bF^A@vx`LiB6knux_@CEc%=m7{D-hvYZ>HP-IRh)n0aB*^>~|6H*+|7 zkew5TRA?jDsCx^$byr8<){1IP@1C#IWuWGOe$|qR26_uf9$;N4)q45B{7i4}8RLJ= z-rEgXq17SblT5l-);CeZwP=Hc_ps0VWu2ycKzBZ{x&??&m;zZ+4)Ee031pMJ@X+6F znr@D@f&{*8{O%odJ*-%@ergFb6;GK@X*kD)^B-$_3KOq6)r70N@-wua?s8 zi;WUBruSeWx@2^sJLt7)X|WrIKg-~c(j$pE9zE8ai8xl2rUni1=^f;Au%R7V2{!Pw z=uR(sVl;;0ccvF(qO02%@{sY*#8cJmpmL`I{a%nh*L1-8^zalXY1E#L(!LKJaO{@O z+$koE+J2NVq1K<<;)bZ^i#tZh^DGV%4X1u3bQTFJO(59&`ObP;Q;e(){C5{qVX>Q( z+1IEp{FE!1>asXq-HDmhWYVuO++}t4;NLTxL1z}16zz8Ane}O9=%sCwGOzu^r*g8z zoe*k|5p-Vn#H{FSO@*srt@}7eiJq@2w2+4MSVKux;~vR8Ty;a|T8r9rO7d{MbRF-h zLiy!KjWvl_V(O|soyoF7B{1h({a;&dd-^%3yhJb@urOqwjU_3$b*}P8(ajqb;}}z% zH(JtZP+dubtnb&aT59ZG5MQ^AbX|by+rZsgMV~s)6G~ilN1rGAhPRI}N`*@@VnL|& z3Ny61z6m3sf1SFPc_a~Fjwc#(Y7XXYP3Ps-IsXSb&#Zscf1Bb`Kp^%jI>155A4_+Y z%&cdMd-Toukeh+;*0K-Xd#WO!5rOJ`nIrVdWsM1TxbtQ-TS)bA7uFW=o>hn^Mu+(x zWwd1LhXTXl6NGajQ;5UxL6F;8r}t``IQ?tP{pB6~d4tagB)rof8D~<~l}hyVp6+CWD~2*mK{w?_PM7k={4%;|0b( zZ<}H3nVrkpitb^rvt|h_bt}``yEjx~tX+!mF*8(cJ9&ge0P+(&GfR^kF)cN;+M{2M zJ1R5NrAN=}#d@cY1#eBlq9Q3*b6tT3=>_c%_NZ6Xx~8xhV=#Y1V?8{jIEvHKk1^#B z)pL>7p-vP)mA8?Pkm ztsL6iv$?;lgfB0!M^`fxh0_oRG8Si2LKd<%1BdZ z<&(j{{gWi>)n;WBaS?(3{`wW!X0(n;L4+k=YWz+)G?L{hnV>u?l0+hG^gGSHgHDcZ zY+nRmD9SfEU7PKa6h_v9vBoaF`Xv{lE}v{!=1F#Jq(tDho9fqrt-0)-X_QIK!3(d_ zuUhg>{uyFjUIwUpjWLZM2SlVkX&REx+o~V5f6AygUOj|`gwMX}eK!!L%E3NEKf)eI z;ga?Y_l6UzHAP(3lh&F;_#J1?6~Q!OO2&P=Gi7c0$-=3&EwHaZ;MRIo(vU)GCPsw4 zglapu_gamIbMX&)r{JvDI!_23K0y3eFR1#*oX)^&BPxnxeO_WxkMd58wl#~1eWcr9 z?NMvMJeLDMe->NNTDveXHdjwmchzH4q$Bi*DW}fWuX~Fd(+6HU{olh}i?zAAKt7Cj zx_Lt>Y|tjkg|TG;a$jzmuudKg`X`L@ey6U|KR1umKRQ{GS$85%=cq8)m7LHmwl^4z z_}+6(+qG>YB4U{v)sFP0;DA*xeAPJ*Rr(6adY5a4!BG~IYFPN3fru={Dn0!EyBc;^ z4;BMQLK5otQ_kTEM5_+$%HQq_qwkgw|9+kAe;I0(k9>r3Ur)@;XM)!dAq8YtRb#^7$Q{9lAp*r7Xkw zLzI5&h|#rb7KFU4X)19Di4vpn(F@zd{5YX|*9XK$$pb>i15fIGl)=alFwpZX}5aJF*3yUcQq_nb$E|szoJ;y!J8u ziXh5&&>d7+56h~wpav)#U(?O3A$KUqw%KI}UmsKdM-x&!6%Q^vedW&y|vaj0&#B+1LTGHH_@*M66HYas>bk_9^%B% zA-gey1I|m$8A=t}6kfkD1Ck$U{>30wuZ7cw$sl0&;YK79JC|$E70i7~e-xZsTT9yN z93U4-yT5aH1-_C)iD8|oU$y3!^mnIr8XjeM5ude}SQv2)9_L4l>Tv|ZI1l~t8Q0uY z6z`qYcbMG8t;|viB~n<0J&0^;jexUrl)@yJ2#fYpL)fY+7lm_hx+6-v^J{ZkTx*bc zfa1Rq8Vi$E9V{b#%>6Sq_lX;V(cGcQKRUwW+|Pg}*ukf6w}WxdrjzL>~43xGuy2~YdLD-*b6P#I5dH50N@Y(_3Z!O$YvO#deFd2J|ri(fet*}qX z%FCRV%|9m@ChgynBVN(K;r=y%6W8f5A9t99*9s};heM{i*}o%@O7Wz#5193d_(EjJ z1`DkEIBWf>?^tYsp@Ff;-TQ&9Kwkese-yA>Y__@7_FH0A&qC(ArZAO?6=&lz9QYxl zz-}clt!yoCmM}xc6C9BoG;K%9IyZm`zQkt{XScd#-kkWjU|U~4q@5S?LwXi}mOibP zp}Te;#^w$6&z~`#yx>i&?&gPDxG?2+8kykre(iRSbX$QGcgl{K4!(M_IIrFbZ?Nr~ z-pK$8!5CB%&S{~+?y8SVg<5FX_NQ2&g1aY~6mz}G{!E%?3ilFSs}q*~sej>$D>=dk z#X1rM`@pkK`|HEcv*i!!K}?Mk?*Vxg-GF^I!4?!S>r=pbbe=TMwb zpDbk>OdQW*ST6ghVbSAx+*mhFgQJ#pxwFX(hGOayQ^k98D}A8KM4+i7?VT1Ti|@-M z>y>DBZB1Df7H;C4sS}-V$pMy^7ryh;M6{ZMp8!wXB96BP%+_)h)Yb<91D!v}9S7BP zS<@BOfye(b{4}>)7hI^?=SJ^WK$`~-=)W6Q|s zSPi3H7|CcY%mG&}Wz-gN`ibenP4Y>5o_~{2UrZVrf$iwVc@jpZdRfzUeJWHgtm*xo zwj|$}9I8w;tpBp!70QT)!h%SfqljuWxKg zCjhybjl$0U$TY!Cf8!&qNdyLa;#W3v(n))Q$t-Sd$j&P*J0XM_Z|wZ9V?5N?lSb)v z+bdA7t+lm71;(T}5lv317b38ndm`T%Mera8t<|O-&5y;^{xoijo{q)`2b9*U3G^OI3%wz5%Z7s{aKpH}j3Tr=T(qu^#8lG$ zgP=cSJwWf(E0h-+STeBrKlTDK`{*QMdH2(IB^_DI3mY1F#n5;8BqsB;hm@QLB`RPxw`Pw6wO#ZY|ny zw=?kkq1|gU8(Lr{gF=^wxopL4VX3_d%^mNCtoJ@z(7i>Mk&>6{k0MK7Cpo-noV%au zSv}U(Q?q;X-qjH=(b2S#PbZALXg80)W&}7`XPt8{2*IU|bK?NTNS7cjhglbcO`XmL zqkz9;5VsTNsS`liS54=rfWpc1EpP@CJlA-5V}4QBPPKwJ2_>Zdz4cxD+#^)L>U#{( zK5!cuN2xfTqqhpH-ObctM9(*g%ngdVMR8sgC;)RZQab&?*08f=Ip4#UK%OdVE_p2< z;Ijh`uF8aRAzj@*f$ThfyZ*6*Q&%uQp;C`Jg7Eon{c5r;65sfb)yFlgbMm*SC_+Rk-o*;`gUFCo^=~` znA_V4xKc>NJXzg_J)=-?UUv`Q-`L2d^nhs=*c<$`s!!8Vj`Zmc;z#= z?6Iab$RV8(>N>Q2D3K zL@g_0zvl@Uh}QCrKAv7a$LOH$vkl!@PF-}N?mJ!Gz;*GWsFffQ|{tY$8EPijQ zA+AQqj&#Nd*Fe?%>RqM`VTvL+Ij) z`lA#;aY%+Nc>1n^;3*!{i6yJ2pZl~F14*6qPeMtdYT{M=Q|mv#43`QL?c^-~+@@9K z-E-0)^A)Ct@Kv)ON$elYn>e)`sYC}<`lAb=Qg{eV=R2nV!*YlE{+?m6)sKph0Gi@W z_&lv;4q(W4oqazQaO<(Q+7+mqpIe$au%rcjnJrwLHydQ_Ua*!DJ6iF4(dI{OxFWgo zXGsS`CoBr}MNb8_6`WL7PX=nV27{)*HD_!>K~~jz=&}20n=V%>Hv0%eUf1M9pQWzp z866yZslHAtR<%CBqf%ZmM@Hd1FadZog1&o0>0;U?ZAKA=`fQ`o+`NjylLOqq=W9-Z zSL;?%K`+f~>d$R*`&aT5l(`bIk$Y3aai{%zziXemDe#o;zqPK5Y1sRRfgWkN=Zb`d zIY54k>#6Q$?Zh}C{3{r@Peda-b~th!QBu44qcyz#b{k57eiIuXV;)j%#LrYOiGBb7QT;pU};sZRM_ownO|d5U!Eh1Kv^^3yQ?vG)_xkm z2aA2kUpb&NJE5a4ZIT&c*M`FiTnLJ_R@;=#6W_ly-x6b9;yQapB`V@Fy}{_P@?l1l z)>jpe2;BUwo)`Ao`aWV#Rbw4^-liAooxId`#N~J;S2rUuyOy?nr0nosKe&VQ0ykyR zA2=qII~?;Z!+I5yN*QFlADhy_rf_A*XgoOkKTJ1FbivYiyB1Wh3-oF_SKDf{!~z}c z{mR%UJi?Za$g|VyJN%^!8hflP zt=~f2!HW2Jn~kZm9mwI4Hq)0LZIjlRI_RonZcbIpwf^V9iKa02Zs{Bz){10=Yw@(T zbQi4(qgw{h^F5zNp4AQX@a$_seQ}jiz?YQ(6}kq}|IWZ#T8{$pa*u&cJTY~ceHnKO z#S_r>RvRx*x<emF${o-#nr#OS0O|QYtdvw#j#b2vXIC|ZNCV(7#<1YzV%9$w z&&0ja5~FP#iC_L8dTXuu+wvLoYCBTSEH#a(M;O~>Oe0W-5dEi(ry9lc1Z+7MJmP=k z|7_Pj+|E6(`}xdE{vYG0yv@eevp+TCJK81*SWv&;6}^g#l^d#!rdHG+5xknIk8;F4 zGXrV9nn`mj@ExagRyaS}FR;I6hBqoLjb;q*EV*KAfx1*1;KK_?hx49CEQ6FhzoAXJ z{Ea$=42K=<`YZEYkm?=caN-b>qALuCBK<9NZLO5?+R01H%QJRJ{~wI*^4PX?Yq}%@ zzQ2!;y?-_4p8HuJHNIDR!~9APKG>sTc0V-9+1R5UB=c6Wf`^*`gjlyr#6l&!OsFY8 zb#7xRmmExM+u?u7$K2K|f!0JkZ2uXXdt-YY6ON<8dOgnx^WI%09>q^#iFVle#RnT) z(h-E{HMFLJ$g{VRX!c!a<(=*bO1{`IzF5+I5b2&E3-3ezT5Al~ z)FRY4!+_@COH;r|^-YYSB*>X~5eNL*K$$rSNWVW(t1{CfJ9kiCrJE-_l zs#`>!`nd7Pf|eAkihx8q;^R$s;YMt69Bg?;XJ?v%Lyx?+M$vzBpbW&OZD7+JfG_Fn zqUeQ|MVosnxh7P_ADnZDL6KJ$JoTs@Bw>Vi81`rS6*fmjz*zqRLAAzM+rQ6ItKn1Q_W$#tF09_8yTIHvWxqV{KK#=4mKB9-}za!oqX}WYA3SvJcny&Q6Xw zX1cP!@_Xp|PxjIZTh-zDG43^-`AAMsz4bIku;xR}RD^(xE-37c&Q+Wm+FLayi&fy9 zLoh5b1{iPj&#PW(xXI}3+nc@E+@q7w6>mfYmrUW;5i}eOl+Kkk`64kD=bMuIoF3Ib zcg4!W1=?#Psf^Qpx$5N6gFXr;=zB&8Cp@8d4WFf_$z=PtC`=w{I``%q_6urWZe#N+eE3*1H5+|F-Wz*T2#G*_pr5ZFk*3o zBxH(o&!>9-IvO*W45+!N(Xg%p4Ij7hfSOzkzRf<*{G`M>4(vV?7v&Mj zgI8^e$sYRXMnLp#V)T<|6NT}#jYHX+?heLNc2o~q?Dgk8iokWqXJpGk;>Qiz)fKsU zz!AC+a$VfSX0m_Vk`>-PmtI;cil!1=P`zOt5{F7ZGiK7Anx((_{v86c;LHHhh;87B z(@ht6!XIH-GMOY(sdHyU+)^rvG{q_NK4t#8Bf@oAu*~%(28fP{jZKvBG<8?KSFmbT zsK~^y;?~*DS`i!Wu*tII(T2?k7WMa_k0^uke6+(OZKeOEf5F2i8iS;OHwi+aUl|q9 zS_noYiN)b16zki?VTGfzOYU_@|H6Y`waIE4t4pd)C<*9hgj)Tw`DaVJ74=;~tup)| zH$7A8?9x3H_jRFuYnBAs{AHQBa8_?^lt;c(mf*P)^($gZbG(FU3ADPW|dad4U8yK-rKoaf=IIVRBX1Z~ZqDSeC`nt=b5AHw9 zpWxjGCE=u3JE8iU!V;XKVq7sslVfyl|rqj=>W5_C97*!fR$@Noa&7i!PqsL508-wigI~WLy(bs^BMeIrT&l zqF`IyVB-z!zu9QGCN>)8hoFKy`PbB7p8yQM|Hh`*mEajEZB)cz{s@upwEae8} zH%wCVUe8($2Wjr656ft1r%_pSar8n3=A%YSP|ws~pIz2XpF!?8o)~badIb1eIe>du zbtY$mxi=dH7S~iXXWOxR5c5&PZ=5gd1ZKafUae!OE|>Qof|iSS0+3oG z?Vbr{68J9t>uE0e<3gAter4iMckyUDWudw7SFU9K%4jQl2UULyBT#H<_0f>qy0y@T zk+!h8sAtp(!gv|i>oXfO3tCLDqV5)*2-!z61e35vMrpzw}qCmfL`9=~Q= zUfDz^syOwh^#O|qdU&l$4HxXev zSaQcS{eINWlk~90(rQcB0qB%YhVsD1;r=)y-MFz(@?<0Rp0)=%h_LYezd}=J+*>YVu-2t))W0*$+vTJ8`CqZho)Dfwg_T+FN1R1?TcYR-o67`Ysni{;=M-u zTFS+j$JqqfLeTAJE5th@ zCDQi}rxBYgyEhh^(N`DBh3JRFphfD*yDyk&Lrubv7aM#ynUp61ZeKW38nu>6HXy!r zA;<05xz}ok{n@Yw=%D8qwla%qKl;q%2X?rNariP*X+f)Spx$MqibeS_c@t%G7blu7 zV%QdgfUWLkj)CXUcd)+RdTEytj)=mHP8ODmK`ZQO(`hk)i`$Ii;@MG8Xuo$Es{4u^ zkz4UTJ+4-jcc>Lt)|x#l=5$-@Vs*a)Y1*n$MT7LuAm`bJye6zx9zL{_-YTZ0{ymN( ziCEzENc~aIEYi>yT%dzrnn}#O{uCBC_$?+8Bmv1f6lt;KL0|os7Nm{45}4TK{KNe- zdzPGK0PR*T8(pxI2{Z{|_SeuK1^Sv$nrVm!U$|9C@w+LnI7dUZ{( zIJK^T>GKQjWZa&Skddl_e%EvuhBswkL789ScT`j+wnguL0U~Geq5-DX+9!bx(hZ;ouM{x{Q;Y+7d{4#aEQ)F#10$2?EZ=k+4s+-R2 z(I11WEC1X1XrGF=Bu)74^~Q;8Y8VF+rSLlMZ9O^=Wtfg`u3|(YENr?|hHmPbMqg#k zYOy8|@C>kF)w=w|p&f(kzHY>xu%{sJBMOkA693&gZ`Tm?{wjFC$&MJ1zi8YOz;M)(ID$C;sBUOeBtk_HQWU{1;fVlrKtkh08{-_P{ z-#fgrp@V8#VaA)`8h%2smL6M~3&zEoU@N}lOue*s{(uUF4y_R+ew}$sszIhn>Mmzp zTN8)?g+KOgmgkhkmV9|rr&k_3mUNT-8nM6MyI_lL`>9`O$TM@wE{j!t8xvl5t?`{M zTcV&ti<^MEDM;R0n775afW%eoUmHVYEv~@UVIx`6Bw;W#=&S4tq%{=>82Yw;g<|to z@&&ZSsrr@CYdhx^;gD;F3|tkf)mkTuUHWzc!K7a7Ojm(oru?4y)dus&_pYA z`npMo_Q^&tWib*d-_wJdnKCX8r734J|DiwXlSAu$mOX6m z)j^k5l`Xt*2rTp2pBa|tRQj_-3JRQRjJ8+FdU5&F*a(&czaJDruenJ5cQp7MTvrbwV8Zk zUwIZS9%I)YYpakJX~|)c35xF*X7LoVtWFp1g=?NL>OK>C1~dYSgN{=i??+Ss-vnAMyeOh=aC&eQ9X^yH^ z{+?>Xk(jv5ajk}UX!3rW9t**CzYbHnh>b}upaSp!REqNA_9an&7HR1ozcQ4wdQi*d zOQ~cW_fvNeLs2Wv=fFqzHD+7iw)und@THqY@I$lzz@>LxPZf%m0%WQ;(yxe389?R7 zE-8G>n3wP|y&z%8J=1xEQDzw03Qj{S9NISRSW@;F`<08RQa(~=^XaY4M+>dug^!T# zZ~CWZop*4O|H>FXs{alo6-1nEIBE(Ie-#)WY1TTfg&3(1K0n_2zISZVv<9&XrK()Gcklh~1Tm?5E=ZAKX zfj&>G(?4|hZlgTcW~rVB{%%AhlYw~aAvWi>)Y39T25D2<_|~#&R-zB` zfSe14FyDg*pDS4_eH!8DKKy=;cd^}bS+vt!_zasE(PWWX4V{2({m z8@q4bY(9*4wmoW>H)Y4T6`qscxU%J=gOewlNbWhHeW&R;)p*S#t*07ER+X=rqV{3? zA~sD2kiw}?wpee|C(^@Fw}K%(I8+WhB7~0iEWM^-yF5J{g4>&%XFPK{&f;~v0y=JK z-kNqemX&$aGwd1muo?W3ssWB8h4EqsNl`oQ+#~grk=0eGqy-=`y7w2Ai%ELx9{QC( zD2Rn^Jwe#0LC~jRD0eud!o+7xyv_Lb2_OjLTTNu!uJ=e!i^-5ZA zYeBg(&G16FuNs@7G}^h{Al&mzE>i6<(-aOs^J7hc2(2KM4yW_!b*u>w;x|Sd)d;flq*nWS#H=2!S3WJwQ5TSCRn;mg*#bD(tlS)&Vr!fK`cyeZXw1M+3J98c6x7N&Wl@e?#g@_EFYH~%v z(vy|?xNW}(i1vxGijJA$UqX(CMr0nKU%gQ`Y~Y!*$@e6P(ON>2p^w3$1&DuaC~0>D z(mzV^9i|lToiVW!+d+bDhUSOc>0Yx2dDk{6%2Bw`KAi^m>g)P-Q>lBC$|50#KQ#s@ z%ErOw%Aa5^hnwWbrBA(geI@nY4bTe5z_{Vu^X&soqwd9~fR>=(Q7# z^0Uh;N-AlZ8m4@gyBXaHHBij7K4(PUn3?2N^d23CYcD5uDA-}QR0oXwVUwyRZ3z}K z{aQ27M6sITS6ohKAU2o8F}Wt1a;-yxm5x#B+9VY3Ut9m9#OIMUgJV4|k`j{Pj?_)e z$qgw}=jTuF$%tlb~b0nd)yrjBSn?ee{2XD2O2cd6F-T?Ox zW!4blg0=gVN#)SmjqDiK?ts~`Szm~2wVx~vHl88ESL+N12_T_!(0f-cqU!H;hPnw2 zS=7LOaT6;DFxa}rzd3Y4uzC{?feCu8dy7cs0jeQKh-?o z^qD(r#K)I);mcCb_!fd1ZamJoTMO7`k-+MucM^%l@lCeD)-Q}Y?I=Adv~txGt(=5J-5a}=;}JTEoLRoVlc9B)y}?GRQ~<2xW?i6q^o@iQX8V^qpo>#ie7%7Vp5jf~EMwp5p>hcd8Q9%9aQ zbO;{0dzY!SlXRkHRY#NC7WD{sFyg-(abxSRlOy!&PkoZHvzcXtP*E3lmo!i6)*bK} zi#g5FsaZrJ;__k66Q38ZRc>xkS!>G#qCoA-T^VH%(`%7nKko>BTifPSqeMaFS6pdj z;BJ&ojxfL55Zge|xg!?$MFarz2{8T`TK zM?T}+?pc*dmaN0+XxF#9J0=J-XFP^sgtPr|%Nvh}NWwWb4jj1#abf=yL|xT6fTO z#0=2k=bA==SV@$@#xUARj%3o?areSu7~+~@uDS1$$h{LoZD-hADuS=ja2X7Ae7 zN+Sr-d4mg&LgBI~u=|dH^xYb+P*K};p=2ItLcg`TJVO;I>06*X*4B(=WpZOSypf9- z)unq{MXgE^!EnAtziPSY%s)e8x$1_^9&8Y*OmE!dklGev&%!RPNIgn z&9H?Q^K+!}c6y^8_KAs29l=L$a#rDhRy+R>8(qWHNjlvuRs%(!c2g4992KG>46#>Z z7W1$tLN2O>2#Gc_^|SMzChW}ma|Zjml<4}3^gw@l9|#|5+#LHFDS;6F z683eJe*j;&KTmKi*S5aZF?((;lp?zUYREh+=sf2T6?|Kpza5hb1%mW`%0^GvakjCL z&ogpozMS$Mr*&Ae%^WHExrVKgOZG;p4)pznDT1yhVSoVoPSGDl1H(N$2>$V8Z(`^Z z|B6!Dwj4aM_IjD)Cc`IPdwMr6-k@X2auHK%B6W@YViWUejgLJTcV;xtId zR1oe}Fm!8^t|*{wXAmTVE57Ykg6lhzEBO4kCiPXywNpK!+0<2q*g}2PpIzqmNO;dC|kHz8hg3Y;2Hewwo$>q7ItL~V5T41m}O+-8YrTZ!I4vT=Ga~o(3y|1 zNlVd5?T@Wv@U-5nme-KS{UwnX_70Oq?Yhj=Wjb##^0acWgu%n0gR-xiny4K9u-ND? z-&qOuS8v4UQ0r&HP~onaUDrJT?HAn!&aCWKAto_z+TOqOQOWv=4w0VM=vU43Zs(}T z8x}uL{kuCFc|I4hd7}}dPJ*m!h2O*zh_7hYOOCoW48qX@7x!^xoSSh87zS&>6iUj96RQj<^ewUs--T7>MKyRd^pvDhP$JAECNX3A-54(zyymdke)YB$+797#6DsJ^M z(+vsrP(u{)!)?2axfgn%G<&*%veP!X*z!-!0SpHQd{Id)Drmu`aVP;lC!M8uB6>#> zKZO0D^}Pe0?q!5MaMM{KKgr67bhP@0BmF=wvcS=wnO%uheD0`W_3q~k-Z^||&N~_3bz9{0_HzA(>=wLA*!@}h z_j;6hsx7~7ggv@h8c?T81>dDd9~1Sen_O^3!LZ0|U7TN?*Hw2Ns7TQ!L$tv=Ti1K=_zy;> z=ImFv3~+vCl097TruZUUm$Y{T2+Iar_ky$s!$qxy9ia?b^Yy{X#f_S zVv}Nnh#`i}qe?^lYdO}4*$*9u%CwdDmX0Yp_$zv&J__e96Ujo#uW#zEJ0zG|ggE7` z{c(Sgc%%@S@Dntv8pMu#MnP&g{`)3|u_e)GeSB7r>(iNy^~`87d_tAu43Onx5`+sy@FEun2|{kmG7YMM`+tS5r`*81A{ zrJ(UY5r``e=N`%2Tp=Mlf$ZMhd2Ve*H<@LeYQb@-TrvulbY>7NyxdrLMf00mmd*}O z3zq$?84!X$-KPlH^-ZU=yL*fl%<4Y+btqQGPUCmRy^d?piVKBcp{D1JOXgR0>o|=r z6B9p;ISLxw*eG>UcuocdE0P-ve+5O=je-__+aT{v*`S@y8L2KY*VLEQS@pMjUHh02 z`j947|2V9f7fKfPJ;U%d+mg-)90kTd$CO%&pmQk+2Jy_UL0)vfIRApZc?zcf?95CI^^ARwOT}TTecP>eanhT=Yy(;}t8{C-EpPEo*Fmq*b#jd8|^Sc^u;zIh~C3uGMUE7j2ue~;< zncU0Wf@KsxyMcTD+@u#VM9a6E7bC;s7xrZ$M>6aK_B0SPg)JSxYU*pU%(Y_`RYp+0wu7LoN5***LUasQ0M)pe@5{iU z0Z~-nw?1r}(X23VJVw82Z3WZ9!tnd~CPrGguqex$p4zoPp!QQHE_-FNP$Wnj^Z1!f zzOB`BE454ugWQxqT5F4>mbaT48w+xV-YI=rWm~|(HO#VP!SN0UNc#gtzd}*Bf8VPz zz~5`alH18CXdvgBhQc_^-ceQ$rk-G9cRIcs9?tnaptsgp>O8F%_D|UDz>6Ke*u*@X zPg~nqYyweOMZrH&Sgl$0>xF@Z1im}FxF~+Ku|J|zje~gO>drw~e$UtgMSqkr07b16 zH(>r_*1OF9WHYLZhF8F2%1c)3@23h+lE*JKrs@3KBsbh}9~;){?R60lXnT%{bYq)# zCwW*hwCKG}$o94nT{zK<@f@3cTda1qYA}W9@|){dm~O^i#kj&txwwI-G+}(2k;;OM zN9yb9pzR!YJOqSKa~@jEI@EzfM!%wgzZ4ssF*AhwJEk`Ywe8zhxSkHaVB(j&9kYk@ zYsU8bgtwWt!cGEXhc9};dcB(hgS^S67@?!=f*{qK^sCvY_?x*K1gT)_hnZ>4{V!Yi zr%r)x|7(a3owNhmKO-Kif%_c8bPq6|-xcobd7PIIZFP>iuYYZ6Bg3FA5^;*T03_US zmu_wukg!mncex5M!6E(X!Hm)nwT9n{Bl=pTF!8_FuUevMK_!jY?dT8mkw;f z`Sd7}20u#Gye2n^{FVoiV8F~jF=f*x z-x4iqHS{v0nrJgC{HAw8q~?{bPY1hAzJUvtUnp=2q8T|rBXh_r4>zGDsdn!idtBP- zT3S~&QmjqRH16#7mVgv-{he`9bElTHL6gv8lpY8zTkDOALS*6JdPGvUPEPi)^%H#5 zDZXF3?id_%NXZ3?Qw<7FdXG-v*#nLV5p}l?Ym5XDY5AId9l|QfId%+hp}EwPywX5k z{=q|o^h=2I3wv*Cm5Nfr`ugHzpUzhG1p@$y%H-9WL8v$Ne`AXcp8d2DNJk1aBkF1+ zY3z@2y#!=@HGj0$Sc=`B3c-V;rx;J!;iX=19&h{`Cz$dPU_RDaPQkRvo_Wed%6UT4 zA12`_+_3tU4={~7$dD6WOKTAx)!jm~D%7QrG#G!7L52RzF@g7AOyy4&4^Ho&*B*RL zh)%y_e3_MP(jo)!;2c+$J80*)!0C$&;1&U?i=U;*b$}+KVSi_nX4jE_M?b#QR!n_t zFqsiA^0mf{qD5XTc~EP9DIAs~(aFl)IeRAeHG7`-gZIxCOd?k1mpY{2sodAF z77W)x5W8%@+1))1X!aKy42$!K)o{%K zzr4Z_zN&MYn8RVj84u)_#_5sgUdOS_Nk#CVZlvu=KOh7>{iVHzWQdR(hqa&8n z*FoIx>rtVo3q5uSr_YZ$D&!wGrzWKMV`k!1R)VEbFO0raZOW=&vGU=I#%N4=&>W^7 zBACh%SY10fv$?skFu?@=!hG^pOBWz7rT1$ZGf~+q;lOl$!eon3^3dTy89h>6)Yt9G z&&kY!L>EH75{kFh)MO)M9jrr-{~PdD4>+?#0h$_y6h^?OX)|U zcofbh2MSEL3=H`Do+dLvhef3*$kHHo$En|9!!#okrxqD87^H980C{^BODOpAb|zje zvnu=xSmt{+a7Nk&EQ4l#wth9WbRkJ!2=5WjKHZV25M#@MXfggD4ydroOj>J>?4iv)oAOfHJ%~KNoY{cP^-XC8Kc5sY7aG}OOrIY3zTm7Y z*%WlR&rI$)g0K5XtC0ReUC_>ugK_}D9T7(l#6MMNE6mL-YRGmznn{0SfcPvJoIHmQ zaT_z?!VC8p2g3y2P^7OipGPSx&8l$dqXrZku}wB0Cj{tE_Jlpzne!xjBD1GKjN$W%@qlwQSDLS8hL&#=tX z`ql95+zWyf(Kwj(R@)I*g4 zDByQZn?UKboC1t^oIUMMX9RA)Z^)n9J=xnXlZa>z!g^6>Z(Y4IQf)Boxz_pefhE~O z&{G~a-2M%tLIz5^VA8jpb}PH{xK#p<{rSB0ttglFEQY;<|3A_Yh2U5<&2Cn8Jg|A< z*vng)!*NYvdpN{zEf2_xhvNt{+rX@<|J}$}<)Gk-2N>e`CiBn3YY%7refC_}!?rrl zz`Ng`=+2`oE0j|PKNdCP4AT|k@u|~U2PUF ztrDI8Usv5qb<`=sJ%?nJck3pg#%}%5iu)Tw&aKQ(YUzQ;avf7D+HcW@y!03b^e~NF zWN8L;l-JVI5|_Rp=z z_~yovrA*@`UD9<yF`dEn_+_0L}0Pla9$!CE3E@&oVY02T=k4)h3$S z6`tq_B)C7CFU9hodcbXGQ4R}QzsfjWVF$ir3$1J% zQ~O7sUuKKtEvK_tT^OW&M89IqZnG(@41-+3J*w_P&5o9+g+Dhqx(u3;%z?{kqg=(Y z!aaf^?y6r0#nRk-MyJ5?*GvDZeV7Tlyp?x3x21@eDzYlAH8|Sqb+!f3a4iBm z?Q%nNXo5F{viz*uhe#e4hSL+=rN^H$VNpzMeo6NrO!LQ_u6CdZpRFh1hPT@sM#eZ< zhRMw9*P$Q}x@JL6)Y{7p$*s)G2*u#)R1vhgAUQ>4T$Bx+Ym-+PM^=n5oGixPWr$oq zv^2Y~iZ;Ne3won^Wouv$eRjSGEbw0a>WwO_M|jDjojAew1jyFX?kV3rN;}n7H9<@C z`&W(eNf`)8(GN#xoEpmZKe|oI!NHzn`O(RqUFzkMCf66d8=aFrT!eF^~}n?G7}*5QakFUK^z|ie`kk@`rDZ@mq0PC zqitHVv0~G5UaoIW3w*wx*IJ9Kie|aZB%O`(&0nbNcY97onE>mnO~)LVEY0e2>~RPS zB5w;$WmS&!6HK81&%KOHYZj*K+{#+ z@tRj6W3REerlMN2LtShLxw(;$QMw_3j%9T!1-eF{Yqo^Kn>_Pq%G{{+IriBiZ3?EN z5NNeQ6rra+a9!RIoeMbC(2O&_*%chJ<;>RY$%RG+->)v<^>-sQ`F|5A|W zW_Pn$VPo&?OtQ?~&s|jqAo~S;&{|HQl{0Tq5J~pbV}!pNATFHkSQndlS#?uSi2w@X zQ8XPvImIy0*Af~nI6=eZc2qgx!N6P>aot^q_fY}h=*5DgK;e4LL@p$}yCZk^d{xcj zqet89;s&7@i;pO@RNX}!I~fs-{e^Q&Gp?Pj7RCpMs+!MRRKfVdkv})yX<_o!xh=(J zWD6MH!<^YgK*sRwausC3%)ZA3SqUZ83oZCN@QVTQgn^mL3(1T-&@hAbSep4^(Q2Zf zmvUT;mMcS75XgS6UqL1@o2De3W+$ZdV*aO~r!~u@VdiHVdsNnMhj{qsw;{3l@#>_R ziF7egG*|ISuPdoO4x0UgPhoY160A51k8!(}j$W)6eqyGEJc6nw3xHR571gf|b8-Oq zQ0L(OghaVyQ)US`oX_Oq66sB|p$ea=Kt|fEk%J13ZztnbI2LXrQ&#KKPHZ9V^K1@T zXE5e=uvSFw=-{Q8&rq5nsCtTosfan z*5wfICE!S}cQrE@*Egj=VcA||kVFK&JT+*r=;UrGw2`!x+=jmVrs)+H$=n!Nl}EtU z$u7%z`glYS2HNM?&J7Wdmav#7rJ$zYatY9DcN{1k9obt_I4YOc@HlF(T9~Xsl2~%u zAQ>vnjVD9VjUO@_WYM&PW?!Cex70?IJkBvhhjzlRi@NhH=E9FO?3+1o;(ndR+osSKI0TEA`?|R<8i!) zvy)Q!ITU*Ibl3M<@gC55oe}*pU(YlvV|VQKZ2Hh0rXJD+UQQYC*vax_M%D>hM ziJGIXiPZjyy>*gOsW|Ja)ysHFQ2ADde|(-X^3fQVaolp_z`$bP1}ST8TUY@F0|j`g z7@~X0B^aK+Rqp>?l}NstJ+W(dWDzvxnJLPGoxztF#{Ooz9wTs8&NS}aEFHc zgmEv4R@yPvbxRRDY8$OMFE=&FFK~^kr5V&Z*O-(Hf_c@BvDM=%^-8t2_{tQme)R~G zKG!Y7db?&J)`Z3{l+A+{M1kir5+8DiUI=E@FMeJ;_QLl9LCc z{*9wa#O_OFHr4>dIa-%cngMs5Zt*oUcp$DXz0O3l=uz|S`VcafhF9Ebz& z)(D}e^Tcng?iuBSLU=uo>e`*T;p?a4#kMvZMUmcnY{p&pqR#zhzB)GDHQ`a(+JK-i|UT827F2RJ!y+5WTgO z`bvk|zck-!PM+$xC&0X|!UW)-W~3H3Vv3g=)VyL1IL$g1d)U_U|`0-m%1#&EB}6# z!_#pfm+Nemm(6XD^Bai7uA!O{#dP*>)FWg57PZk@U9c{1yH$tgp`UA0s^r?_kjj5a z^oaGqn{U-iHPelJ2(_=|zH#PQrb<0r4?pfRZ6}Hs#dv+Smk~OzW;!@?xH{g0xHsdE z)*5RyL!PB<0O)b1!g4(pCA2c%@)<_?xxKmyXk}@c8l0hG;O-9?_w~o+8yb+_bs3Oq z)KzUx58CbD4EW``(y*Ni%{U7yG^S8^9IWNIT_U#KLr}iruT2Ca;joYc&d|f;FH$dE zM+$?F{1LeG6An?_<=XXtB;CxJSLfW1IYz!Phdjbmo?s?CvMTqkC~GJpqn{R*ia)z8 zd#$;c+Y8OYMuPbca9!2l>d742&YC1;Ums2k!0Bd85k6v zJq^Zgt?^T*D0m0A;6F^l=61_}o=$BB0v~PMGPfZs*9}kaUoiqHfp*(MoWZZ>J?Nrt z;U2<$z-`1T(b%qMV7jFl@K(4td`z(Nm)>IwTJUkV#q?`2Pw`FUa)<7cz8wE7TVP(|7B@WyOD7F zw;Utu^IBp}o97ja;@6pFQnI{~bz>o*GV1L-G=n_I*t4Z(rM?1phZ}0DHbaMa6!U#V z*TUU!mFfGP?1arabM}$h;Z6wvJ;SgSVe1MAg33JxP(+1$2l-0+xIl@LA3@|&4tFqI zu+=oe1myghbzsGl2F8dq!)0+rwY0YoCM#4bEu~+?^4?pl(>RS7Y{yjIZclVgYh7;z z-(6uK@2lEatlBD3h2R{U%dkY&NVQb0k>_r)*<_3eoXC!O%=5R0F^S*Y&Eog z3xBlM)O&2u5O_iYo@c7P`B!zuyb~t)^HBn<%w6jTuaR7SMmX2Bag(0-yd2hN7;+D^ zm~0}L&aY=YF|ghceY(kE%MfGc0~r}eVDe3k)#v#r#@rYIC*|!Sb+80E?;>~a0eou z!7*s**6QF#CXw=5tl(ge_ZUvwH4Q9P?0Q1zwpV`?!Zy%4hAw&;oSw>kiiY(%Jq0uu zHR|WCx$V9&;a?cfSH9WGnj(0_Xm?#8&Ifv!f&8Ye+*)CE*{bKG1t{cZY+JLUdxNX-J>C&AeEdEWi1(*8J87>g^6&B8jxZ&?8IDe5s2xxIptZD@<4mV;X#UaA1!JC6y9z1$n9RR+23=Q5 zbSi9^>Ia6VEFY6*C>$Z~9xKKUPN`@>-8@DQA2ouiOpmVQqk2T|`b&MXvGZ8QY(+fVSmguTF{XE*zuUda(KOTM6Rhi70Z4H0Pw1SS) zhwM74gym!)T?F>0K!| zkY>i^ruRxma*Bj~%SjWZQL`6J)}4KF+$^E1Uz;AnM!b1IvfZlgy|T}BE0cV___J7) zQVk;rP>sjvdEtRfO5J`pPu4~Yh$x?Eq7eOrd0*B5TAW`~@#^_-%3?(c5gDrbibZ!y zG2ed7)N>{2c6tpj;Y|IiC5QEvN6}NI_@!_2M07%H8HB@`kU&AKyE%jD@_0fzo#y?4 zfe`ghy7AFxS1?L+HEsv03YF?LGh5)FEQ%Ndg#WFH`|KijBM-V@pvMYBMU#k#ZQHa( zC%)Ls#Oj8a9$>@rqE`P`*zWtt8zlz|#9exc?1O5F(aOS4e)Ww^hWs}pZwXU!BTv1I zQ=?2P;soWdr^y#UsiZ@bL6d(rv=`-8Vhis;^%3yQoV7%ApS8YeelL|x}f9e!bc-WLI`1zW9xn3|ZqNztZ zV^&GgE)p~FIr^jCe#579U1wWPa_eri3WW%taedf|rN;2|OEHz|mqe0S z!Ew&0{xNjD`CCxsIQ{B*f8D4!H1^|zxM!QeZ2(5Add^rT2`0|OdyIl{4l!KEpBjLEh+s4q)}3cG zX!uWZQk5|3v$X>;4<0aOY_|@w{6UQ8vIYJ#lP!}kA;910ts=n0tEco9`O!vMfMTRs3x^rhtg9Hfb@Lpsz3gt zn#i?o`HA06N$mZ3ft0{q1W28slozMHBc{Y_$5J~EZSNQV#hOr2)uuQJd zAKl-;rj|92BY-0Cr|xNw_Ri}h?Xo-#%{;e1=>0-AOU^(k2Buw%20R$uXAo+`S*v1M z2{5;1U&hKk(l;QGUr(B*C4~sRczuH?fo;bO0e4&C)c(9;G?4+mA8X1tyB^5}8t6m^ zd3=LJ=Y!DQPuzQ`)t{SbOy-nv<6zklJIuNN_i>w6CLl0Q9W+Ng{BX&R$4Y`t|HqWC zw!GHFM_~(}Yr03b($DC|uObq$st=grAEbGVumi;(?%ZgB^ze0fVcOKPYP8PokqmXt z5Nng)80CA(Xa}@=eenwKXOo)KT`zcc&onosQfAl&R66SB;d=f>(?$0lUWy#`xVD|+ zI_TrAZ)s7pFK^1>NCJ+>Va7Zp-K@=S&mx3>k29g3qdHgHWq^#o+i~v6!^!2$%@04= zZf$t2p!jmK6QvP)47RgRSc+frR%^{iinG6il@D_|&EUycAGMom$F0wHdzg>7wc4%B zVDN7lUM5^;G~ya)j`1&u&G`HF02BX#>E_0Woxn+qVmG$Bsk?ZZHe!^A?3`b>xY9njlfqm}mS~SdQ?-`Z@Ave}vuLZME6HA! z#jop}VnS%4(0SkX- zf*j^CM-u|3PH+TuyB71Svh~Vj#TEFSeZ0!?`A&!6lD*2HrK0u-M=&joc z7Z1k%M!%X>iU8*a5+NURbamVB(LWg9XPmdPqBzQkDhMLiDOL9uaFG%#1ny9*mYy^^ z_!XwF+Cjw85J=GH&6KJT+S1}49gb+4E$F}|;7c9WLn`msoaAjG0=Vrn4s;x{RQ?@# zD@hxeVV7`Q^9sdByboyp)CL+|5}Yn4w0oIRc0;MMP1l%$JYdq->m&s}lnNN>GkKl- z6O6s;(2ux&R{3xvOffI_*9JF9q=bNSLa)_QiYkOxu~(>yD^jzMaMad%+#-?bqJeY- z>PChnsfSwUg0XmOB(YDs5{&ZBqdS2bF zVpnQrvPD8S8VD7@XphzOYhtZt!XPAq*Lei6x0VuPcCy4P!kM>n*jEm4u#B3%IUGv( zOjpmdYvJs5dXGt+Tm$L9wi_HGNY3kbjoV-o6>7%wkF2>710d{|1zW9E5Rmc%n8E$l zm7LB+mDWgxl~$Z0TwHiT!)dXFd3lz>AAA3?AfdMly9l*yKdqY5CZ1)E_P(t(1z%SO zmiwIVFE>*7fm5Zlt29QYUiJowPh|bk6n0X`5=E-=K;wnY_1~|{LTQm!OqI?zbq_*KrO?be@e0A9G1lTa~=ftCS&Us-hV z+h!o>;H3sXlE1$)5dacd|CA{oN^i=8kI*LU`!6Qzt6B$)R0SH-FoBaA zu2j-cNj(1-6j^JOm?%}vxf;0Ys^Y|wimBKKAusyV$1Z>E6tEsS&-4{49WK+=bfdC^wvu{^ihR1H1vMWyu?fKrndWw0G#UR zB8~-rM&z26(Y=j(hKXW>l_?xBxKXE-f{YWom1Q7lnYyEXqq%DnG{Vh~by-1#$a-`IIcl3FM?4&GyrDz>|H+~T?aa^V_jiJM;M3rXGyY)zYy1QWxH@V zM)#1x$q78FxsOzikUsSVdkxIz!f@76pc8l;;ZGY1SKP}MhTN<^?iamsH|O+j@kxYF z2gpN-J;O9lCW)yegI^I229Fpp#&Q>q#?#&9Kq>%c?t-37-Nl&B!m~LIrvA@nQL@$` zEb|^$n?mk}B!+)~iU}us@SNLX(ATdtrO_&Zj~I`o%!f=i22s_~yKuo7M#{WdDZ^C=!~5aL)|z|WD(tmL z1J55mG9fLAw-amtqF_L^^sjc*!4Y8kzOjxHJ~;>4^#yAlW#g@Gt;k6V9I{@8^X_Jk z*C;s?o$fb`?4RF|1H3t}Y8Fve0|)R$CJWRz(Lv!ll`+f^Mk8H8xG6fG9OaNg=*}|E z6Em&vUQ>y&Y1<4%8$a3yk{_CD$X@;*Hez`h^MQea3Es5xKz6%2GO}*0680r$D{>E( zO}R0^q6u!eupz&Bf?+7&&a2q4k*8iY$HR9b_&X>A9hS2e+i_kYXNi=YV8hHV?^hPr zz%|0eeA{KA)m2E&gqI#}lUv@JT^g%Np!rwtVH8K{I0`oZxG_i4bEFG^=M+=AD%fE= zWiTaWt&1gwxf8Lq>;(r*k&H?XK!7(IlJ$65L0%*vOg+n_YBG5oedt$9I5~b|H0ZkX zY0=nfLhrVg66psCD}DpF{j1Tci@I&&$wQ`9+xgOwvVnzeXGp|d&17%=E#j7pcGVr` z*utJ|vA|nTH*~j~0b78xY2{$%51T5`ku)vKQv~$SQ(P)jZQquz8QN+GycvIw9u_s% zRh>+3uV#tm&BVbou6x=*}iXN{H0L zXQW@C@kt{^+zMI5dicGrgsWUU`%9tefQ}re!b?kT0$rzhr;*gvVH1k&bm)&DQaYEc zQU{lMrHBs-w&49T(EW^m*4FDha(Lj-{PG4zuLC;L;lp0n@GIUBe{TyNi?~z&WCJxB z!jY1+Pwhexw{}p{172P+(7AXpfzVa^=SAuzZ<81=Fq6x3n>U7YQ@?V|`&+>>ZICHn z&*Y{y=*(*c{S+oIqNNY#JLb3n7cuW!x2Nc+z8nZ`{p?tyeFyoA+|lF`;ce;%E!JJvF)}kh`udP!K-kl zc?Rxp48%HOP5r~eT{zldz=(vx4&TwQP)wnurrJBsgOVp{h@xa4b4W^pn4hCTTT9cF zwGn&00x|dM*NwEYxiw@dWaLwl(Hf^a6q&=&!C(3$TR{WL`u4uqb4-dxPGKklCbL%~ z6&TG_bRv)ZyxrI`Pw9sKLjx^r|1_Rqo?Xp#Q7E#1IOWnQI{>(W0m&lMuOwlbpYdtd zopIRSh(7Yh%K@gfGNvu^*>bvlE3$*8>R9x9EuS=%a%N2mX8EDsMo z$XIP8Upb8%D`yEXY|4?Q zAJ+G7&d#Yq84Td{)EQ+~y=!|=QGWC>KN~qtkBxd=i%FI&V#b=u+XU^gk_ndUV+fT zSA67#^pHPh^i8Ak?9BQSc9)Ot?}luZWul_0>ngp>M;|nezI0%9+*+Lyfqcd46d7RC)m; zQ@Wa6N6_c&ycSoWwafv@k0H&=MD-&0P}}4?^nI9-uRBT`elOs^8Yyk9gvKNst^0aY zt^I~vPLmX>|U0i4_b z_b;%n7NpOP)om?98-Si)*RKXto&@PsJqaPgBdwd!tsk+Teyw_`4wTE$@5$A+<*D8Q z2?l-tu<0|M%OXLjj*4See=QJ7y;m%$En(Xks5!mXjo%JAwHr8?-?NRFbqjolPDc2K z$+5`Rg$w&t?s+zWg$Nil2oRDN80mE%j_TgUA{SC$#|5y9v4sS}e_t{gu9JzO@E>Q4 zIa^yF?RtAj2C=8Fn04mvgIp7X&fi+Ekrm!4EwHgyuN1P@*Qx-2+gjj-TRS%U>bt2` zV7%K{|LOksTIrT99MmTs=|mX(W`ev3iv9GH>Y^wd_pfHL))cwReg32e_Wlcw@=-{t zQHF5oE0|Af%>y3Xvs>XA@cA4gaaP%dd%@=cN64WG>)@t=(C}B(7==%<9KVpoT`ae;yOV6%hcDvS{77`l-mYBr}=5^@Q z;$%(dLbEqwd*%JtSp)o=`kB~q!!quIX+X`w~8@P=FU=+Vk*C6qFhIjKCBT!cP7|9MA z-22c~>}mqn^kR`VYe_zOZKqja~=W&vHlRSc;zv))KJB?e(iE_UDt# zqd>9`8JhOZY!Yed)Dz0|yQW+Yt*4vYG@f4}pvwcKsCA1#7@*S}xwat`iWWAwCfc^O zR0Nin(rd53vB8@~9n2CrI%5Z3$Q}Uy#jcpd0F4!4<;&TlI?EZ{1A3ohevEeRU<|GL zI?SNQ@C&NdJ?fpdfQjF!Ux)v7Zd50q<^Xw6I1Ojk$NFzmhMldf3K zZtVbfHy3tm*zE@^V!82q>)vy&0x_?l|JHUyj2u6v_gl@R>=q|w(xF7&_7C_bvh@ah z!wjBf^42y!W7iB>JjeC?%-ou`)Vs0{BUywAeqj_+U2i!{xv09n#wh?-6s1q}$)qy= zZ{4L>TVcr)+{esbWg3`khf>8dvr8G_hN;H6O5vS*81%8#J^~rm`A?%!oCG%dYc^BY z5h06)1&hq9x#vvXX ztr1%xD!TfN{-`li*2yPHv;z0H4J)mj%RpFUyQVH=l%Wnl;QM~Ad6mVmsjF-{4N1>; zGK?(G$-fyb`QQhx04(VIbTU@r!g^58`s$(s;CSt!Ho@MMXC3M`Pk}%6RC60ub4F|- zcsP3pK7VXr)ZT76N25JncVU{=b@zpdZ#&fji<^WYCto&j)J>H9m@Ml^U~8G{a zH_*}FDAAw3AFBUG;`+kRWcRYF3M(MKpjvJWp3!O}|V?1oj9IVE5;nmjqOIkv=)UMo> ztcN`_c|gOa1Ur3HBh|d~it(P&ziz^38xtLn@X|BQQ>zk6Bd%q}XP6f37V-^mIUpSO z5)q--Dk~7~z{ZkLOc$$;QdQYs+oC$|9@43Fi?gCvA!Gk)F#Dah;Yp$N9_hHZvw_`~ z+1pGAx$kQ<8z}QK@1r{x7(Jji-)K19(50_YW+PTicQrJ4G&u7apvT|4mCI{QL)}B{ zV{C3GajGvPRk2vZMSq}6NELwTs0GiQk^d=K0O7&86j77H0b5+iaAM!9wyoui`&7N{Nyx{bVt>wCqRekyk=Um(h-T z^dv8^!d~CTL_I1tjL?O2-OJ1Z2UJ^)g5+;h=rsl$xT+%;QnI1_IMG@03^dEtTvp~+ z53!v&87|sj>5m$}=1e>VI)YJ`G~2(vxQ-toV;3hV582N8-dp6I*LSlr8o2|r++Z*xyl4a>JAorzS-pNP=7ZS80nBpaTVeX zOUVRoZevi_w)XW9lW&`~Ti-K#tb9KA$58Nh(ywESICs#E4Rjy2v8#yL;#O_!V`pAx z+Py8V}#9O&H{e;oL4cesgK!AWdX$O zpKb6(#I`93B>cHTUX5Ah%VP~E9UjMRq2HN?qDd^#xk z-mdS8E!=Zar>#}!t}QL2*x((^+F8LpCU+N8uqyc>ACF_3I2}BFivFn4`B!QQ<@|u{ zb%UpQ{o#Op=;F>MNG!X<*NFKuwWphY*sE<(ZAzOEGp#3@?MuRE`Pp*BSn99aB>bGj zNN|w*LlCC5&{plJ(`Pj$CmrNBadykKPpF?F!_0=f_NaS|em&XwXLcUECVfEN9nHXYrnPsSeec(&8ABL?h5k!PJ~Pt^)1yuqM`6{ET!yX`q`mDz|AtYGIi#x!wW zccdXef}d`mS(*fDL;5+w0Rr%E3JJkZ>E7Vo4Nh@ph;eZ6KkNw#meKXD-_)0<%A zQ7&TrYNePTOz$!+t^=i3ECKaY13B%po(3V>tJ{e+N3XHi_c?H@4#bNe&>J zbH<6y!*)p*-yda4#y5U~ouRWI{#0EsWx!IgD0Jk18UDKpoShsTJwR7#&|be@(}B`L z3~o;Og?68H)zIRJODlX`z6KI;zGJCwWXk0%kYCA%;990WlJh?E4rZ6uwYtr*A@j5K zM~Py2cPTrt(3p3v%@YYR%x@mF*ypQ84?VuTT{X}-hk`quQ?s-~|9J#%`P zeXMjC?zEybr-(#&cm#iTs%jNzvFD?_i?>gFmgcL9ACVLuLy&M^VM$D1YF6p~6zdG;h9U!~~uEb19!us$-dXOSA%^~>|WGu_>; zz{vzoVG%L9n4T9@5gF6M5&?X)(WPA0NMb};uEDCUrD{;z<=8!&O62HMArbdG0e)+_ z$44q#UH06|&ZlkmEx~tWyXoj!ZvFam>*403t!f@kPx+P(VsO5(L%&_w6%OQ;E5lf= zb#cPbN_-FlUC(;qsP70)_~r2~50Tx~u~UfS4vK7ENoK ziUQCt*|w4M`+8Gtst-1c2(AnRTtN3Z!BAa@RkC73Pl_{4(7C-yb(nXU;)BI@)l}$U z84oE!5@~4PXw*>RU%5G$iNU@~8rtE;3fy-y`@SvOLT3dIp6qN8HN+Bn#Cc+z+3{pK zQ8J&%>&E}#owgqW3@~7uhFqv-Y*s&-(Ktw8!rB|hP<3#@yZv!9jPVd&KGk$Vh8;#O7*cXs z>!GXay}3(Io@WziI!ofVy17T2qg3muBZsWtA@{5O{n-WG)>)Zhu=THvT5b2eHc~Zp zoyW;eE@Y}DHcL9DQ15}T!npp^5o)^$*P0I}cx z|00&`oT1s3Sp}eRhh{c6H>Q!+sb`vUugFZok2v_T`@wnpbi9%I9}Bi(fQ(5lEBhwm z=wbfutC#9|x7Xi}#mN9bLq8navBThaC`j5Ea#Nb2oGB#s+S3PF?jr;Mc(l2}b}Xse zZoR$rOLTiAk%;XTy^HSJTZ?2s$-~SJib2E-3g~SMOaakJnogm_PHF{2aLt{z`-e6b zZ~XB{CdCP+tPwHad+Bg$yDwmriu~19RhDCm_jkDS=T&DyW{gZ};jPG`jQ7lKhDO3KxlJOWJ4EpKj!?v(ekQ;!XW?BvIAg0xI z%nL6wutA9S@cZ(dQ2PlcO{t_uwgmiML|qjPE2o~bhmCt;lWgAKY4ueG7KhPZ;NZ;f zmIF2#4P4z!LzNhF;f2VdK%j1bo>>7`A2-#YOYF60p7)GmkFIGppzh+1FgUX~+aBI~ zSRlAlkuR`W47ON;U$3iP*37p{9X806Dm`|fU;d+8{=*2oK1*HF0dB$uSjQa`qk+X| zZJ~?)c#*jkEe1WpA)4-+#u#Pib}uU}CQ=x`F0tz9*%ssNf=;+6=87`^reTZ+hoohI z;q&^{_mPytvSlzK=1di(dMo_XmdBW)7x@kI1NWyD+S7%FDVJ;m-ogb-MHZ)L=2hc6 zs%|NTr_DS7hTUIcvXWagrb`Hke!;XrTbtG4%%YqHZs_v;1C_50)7@KrZ5Vj^#m>`v z*0j4aq6hlnJBEvv#n#EG9!*_zfQZN_4}%9&-&D+7cx@1ob%0tN`2S3jD=mY{X!{G<)A6rJsfH zwuCh8V6Z3P@pG{FI}?%Su$F*?lD-ZvwbrjY0w6ZQ&okl9@S5M9X`I3^rx{uI?<+S0 zg8Sub5hoSr%q#FPAm}X(`@1*ThfK=Af3qf>>&u7aNW}6Gx&1FgX`NY&`u<@G_Bu>A z>q|8A<@b$CT6&Hqj&Fd(o@ZKPoW7rK1uEzQYRTMUM&Tz z5vn?g_{k@orDCh5Esqg-%0E?0m0>w61H;X{k3qG!mR@I*k#K0QFF4DV>?Y=xIjZss z;k!Q{N?qH}&>A%oZjxZ|!mUhe1jU!v6);7|t(qpC)4jEdch4`!E=!ml26?^>B3x*D zbJ}lLj1@7`biRItRh1Kw`C_vsx?!H*HO`o5*Q94RnEsCp4!f2iSRXC+Qb%|l?JM)m z=pWELYxI8SClo6>Xv4m*+sLDHK)Z}tU4)nQ6T_%3g?wmobfV8SHdG*wB8k9M~PHj7@~Tg;-rM+95?Wk%!a zV!B+_|4>LOJmrmWBW({rciYCnVgG!^${P<6;;S!-0qRD4@w?pY9Z=5joyLuTSk~wzeobopJvPrSF0vx<5_?>+MnhP zZ`@>Jnij!2+kjYInXhs|Jo=z$QW%=7O*ZEH#ojZGnkxBnXjyqA-8JSc8}4S`MpbDF zG0#>_XnOyY;Xj@7u(^CZZ6B-n$J}sF0I|NL6nwSRJAK8MrUSwzJ;dNt$t|Be!Q!K^ zD6OS*m_{x60MkdCe&4@Bbfc~g2AVJ0dTeR80_2<1$Ci6ucfau7l?$8tdlSZ1qI4LV z-mwsdLWbO{P&I#Gj&lr!el1}f%$LrHl9gh`Xw4FA9k2h#uVC4wztc2__&5Ijc>Ss! z&tKF@S@%D*#=qC!PqDwBYk#N1dgpli`ziMKbM5Z{(Y~qZHgalacf=@u?^V}h4z2b9q;lU zt(mTE{hb?6|KB8DF*qnVcmen>>i*y08`6naqNPsRhVGxV$MDQfT^`T#|DVbVHnX&@ zxrEzrbS^kh`+pHf=vw(p(a1wQUVr0PV*LLy|11az{OVW${DiA1y*oXtS~EvBB;f$G zAYN31=W30)-7nL>(r^=%J*$fMN;0TV@6kTRsfv9A9WAIjop`dBYR@rYSyqcLH{+1d zuJ(+M<*aH*77#qwftdf+Khk)Zg{&61oM&cMcXLc$s(<8TdhNED=2zLtpS!O9jfU^g z7Gjf3#yva!J#XKr<$iNb85B3>r1_cE$!*$utmQLZqJjtEPOYrXZ7HC@ijBs9a~#~& z<|^nqu(&)SLUg1k(r~?$LRd507yqb>cl6)6D9O@37BCyJUYp!jkNB9-_kzwFPHXIW za(!y@IdIN=TGhm^)`ntnYD>*Oi35F=#H08WA)}0Q zrk{E3HUeHghg+w0{$+JKj%NLi@6_ly4@(9qv`kxE(7~lEv@h|!CzItp(QVW_o>|Ql z>)SQZVEup|sKsXYZC~Pz#`QtE{c(Ld?xkN+75|y@+Iz2Sf0=$I4853h;e5 z`r9gZb!n`*9baIa*8h##3(PKOz{8~GRT^p_M>EQL7PocYyL|>F`wueZjk67hx99Lm zLkzb|=vD2!WKe}uPc%rDufPfgJI7Kl*T#orEbSR+b9R01JA9^wfUD-qth7;Z(PYnC zjSop)O(-f+-}fE>(RvXiUDfVV&>5O8`Q9nbjMssD+=~i`Ue2u zTTN7(I=aQS)zu74Z63Od9?@8CX$^QNiWVuvGZQ6#o4UMln?;avl?wxdN^}vVeq3~+ zV1)h~cib0=NXXn;-I$Lsz#M9t)=xzeFgq`uJw4g8wK=zTV09_q2#Ui5J=53yY48G# z1>1I>$ZU)E#2cvzuwhO2u~iA@ozSKO93kgrjGAs0Bi&H1@D@C8j36W~tsdS!4@)>O zN!ZDIwXvBj2;$sk?2$6^wc4j3s=unxvBesG^6u6La~<&>U8-8?A$ud3W}8{KkG-Lq z%}c9W2ZLymjuwMIU2gzS=#5wpxgx&B|3}$-2WV9t|HF4-d3w1|!3M&jF#@7&FBXc} z5U~J?*kD;u!KGut#-e~-5gRBPHGT;iE3T2ah}gi6sEGwBiVZ{!SWp4?ozKjjGmrj~ zKi-FIJabRE=ggUY$_?s6b?KKnCZ0c;T-jy5 z+ZB`mPV`<)$gaf)eOVL-2K{LYWefG#^fr?XVLh0S?8cTkUFf1 zmC6?d6@h;ulF9V#DY^g}QwRPSLe)?cxqLUu?))iZ8eXF; zltTBF-2O}VpQdd5ASeC{577mQ4WkE99-4xdK>r{N&aZDAIpLzCf_?yt|BoRv?mP;4 zwo(p$XkTf%K+e$O$>b?latVOD{o|r+B3yzvHl`cw> zdn1E<)TYS+p%mcYn;;h|CAi@AA`T8h9#5WdXpjxz#-`Nk z3*Ws*&yf$YpxcEd49qqdE+!^vjz#CcQ3?FO^uH$q5{Z*Ji$ZSnU*TYOCI~r!Rl9#M z0Vu$GG5)CZ&Ik%%5ZGB8#Lrklj}G!M{(^`hqmaI1eLg+L4?WXO$Cwse)-iQ|&MI^b z5F-a8KN94CHXEnV_W=UGAmA6+QYX`k@otb!fIZC(H1;P!BRn;H+$q6PTBR#=TU=85Sv<%vn3gKr2hMl3fw)}B=s&5JGZhnh|@u!q>wL()LBfwz!ySWq2 z8}mg_0^QU}U~Cd=5{JwUvcaA5NpCu%OHIJuxo|S?kBtN)VUf-J5qxsAfSf@9_`y67 zL=|Kzty93GE@%r=;)v-S+I&F^lcV6W;RoSmji@9b3mGe~_<qWGn^y+xf;mD^b8?S&``-3tr=&Yi5S;9@IIl-AYRt1)n8Qa+!!|qm))X=1ML~V&FgA|=pj(~`^0|F{r&eDK5w72OL#70y zblxcQzM$rQ^k2fn?;I+S7{0pryK5AVrGozpw-fMLM*JW$)S$ySiJHf8hR9u(#(_9R z8W;Eg@63Nw1_vdgO z3Lw{QbVXIHTu-P8>O#;sz6b{OBR#{9MLi4hKN?JJr2vy6AA*(r%)@za^BF-VShHb5 zBTj14#t0&3b%uk9IzH$EXg)Z{9PkbGGB7WoU-3)QpKvIQgE159|G|$X0`Lb)Wv(%A zmU(ANum3jQz#cq3XbUJ-LmP-9Cfiw%rPgDR)ks-r6v~XJ9=#6quIaT0g9bq3zqhVL zW!)O&gN#)iBA7>{K6&(8K_=oW`ki%L_E|8?$`V%uMZs=r!WPULwC^uL5e&0XchWE~ zF394*fN7o6X^a>qWF%BxFh!>HUJvR*nBsFZ5~}-MKtZP9gkTClR>6G#f#GKcO`(T6 zhydHYf-I)V(GBOr%fNmHSr115u{J1yjux0dV(y+tH-g?v8R!BO6HNt93b1B_*d_*f zHOK}A)nEAo20x=L{MaKC9rEAi0x!T1lwoQ`sh^|kn;|Kn}>YkuL`PR0GNkBsQm#O=LMx8 zLYM(SmI!pwsr`zAJX1%qxQ;95@Pi2pTQ!(r*hToEIl%`maTs2Y?|1$m=ZIeVqdbQ| z2uxKm^ru`Olm<@~2vlLXJAzE09Xn@O9MV1ZL_u~`Wqv@= z0!APm!3d!P7X&$w3k6@3)V|TYofVY88|X1^#`!PG=+1(6NLJD+6W+kfRKa-lleoYY zF~lFm$8kXe$Y%7j;&iSL&bZ=-5kQQ}EFv3E@B_*HPb80^>S&=8{S{6$$#pCbz=II( z9QAi9fnOK;BUX{C3I2=1;0Qo(E*h|+$%n&@dLHePAxgnQGn|p zn=K`_3v8l4=89re(2C)d38SX{!M=SvC;@~NSURMh?hkSx?*7RB7@7*rZb3O?OxmS& z_L$M5o(wYBt|hJ?)i}OhLS#7qNQYc7+ip4I11gP?>`Q-$ozTuKKExzmZ$Z42EM_8u zuY$(G+LOoAv5r6*JQO@Hq5o2^gZLV&Jd(d-NO=+FByv7wcz`*Ov6`6jeWgI*POc1E zgHSVxI_>W-}DeIus--NJ%%J1K5A6snL#5!F_~ugd@N{{Q2axX1L-Tq0Yn|G zpV2bz_dy;sqvWZ66`@H7*^UZ|K&BH_C^3TP@Pi;Jkm*=q`H(Xti`OPGk)oHdzYC** z%#+2cLOqSeZ~UO=3xY;QY1eVKP+B1VaUWs<4;&FR0TulJ2pwW~Y?}O6(259VM+9hv zW!UpUK89AXq%?)%R-5P%-T*Q@2a8EO=MKJ-6KGAJwJF14B|#jToo8SOfiR4&awT(-4z-zi7dT4h*sjIG8#|tEJ6B z28KEgR~G)k7`ZIScd8eI5{=JuLD?9t9c1P?A=ivnvxWwBQJ`TI2~_X}=Yv7XG`u7z z0Onx5Ua)=PXnKaBqcU+hKKCY@M3o0l4hn$S#I@H5EZ+nR5}tB(FP+5u8$a#cpaIZjpv>Jne&-u@qbAYnAC~g}_{}`TjCd*kmY`wKu}&!P zK=Dg-7C&&2ARzFEC|=N$a|#0qs6-^bPcS6R{O>m|F`ds2>ai~YS14G0q}r3GAiRVh z`VwHAPF>O^(PO6GOpnkqM80-&6x2PgqU7_?wDE|Dq95hshu0S}2($NuQ3nOs!RztL z-+8Q?QIURlJ&mMrMfP0I5Y0e%FIb;%7(Maav!~1p@*z}cVkb~Uvp^v37vMyM3c0H! z>PheYffC93Sr{|}dibMZ_ItVibx;z0<+DIQzsP5t62K2EMNVhAlxIHpZq*qfgC=lA0Ji$NO>HYr$xnf-FdImhR{pzQRElwQ`UFq=}!=6`8_g z&Ym`$7N!0wSsn!3A2GnY`LXSZUGFgzV23;p2Q`dM3+Q5W{bX7LMzO;Kto%;&@~O)< z)BrL;T5M#~C1Di*7%ry1G5Y1fi+~C@E~1l?;5o)CRQm^A+C3-$nv?>-2rpTzuu$gFcGK|_Mqh-h4lvFQK^vf%;IrUC13w2jtV#Lh zzZW(yQ9ioQLn~OT#62~S1$7~90^e37#3?}~WQ?3Jh9pN|V!aX6z^o#`$&;eS2BB-p zGeH5dO)nnP*cdpMz&@Fe>w|pYYW(Q)DbDmeqC0{fqqk_k5FL0uFQuG?T>7B^Vh2q9 z_=+a1A86}_pa8}je3uZ%|5*`DKu!8V3gE*5I;t9eDvhc;M>3xG88DThG5jnp!Da@T zTl_&oSxqgLGF-^M>j#dS!vDuMLN4fD7b?t~>;AhXz(bjm3JQbtEQEzy&JiquWCR-U zgF!9g39r&Nh3kLf690=lCtMn2W3HWO1asr%_=AkaZwec*eUPM~DoWg08G5Ygrh@eH zf;5`bGJOitO$F)Y1!=t6l`lv)6{MFJr2qe(-N88UhyVP&E&U(;8tN))0Y7YT9pFlZ zYs(m}Fqq4i8;pixUPcB_f)vH zjN5xi;kpWb-$4r3mQ|p=zbaf;Q407#g=@>o0Y9K{T}2t-9tzi%F|1$PB7AW911z80 zTc~hd1;6hf4z6VU;Qnj;8tN(;Kiw3rEoB(ry5;=ZQZB#0!93o_6|Sq~_PZ)vTgv0r zPySN-+`s)SpYijk!gZBAomc+@E_5=KkWo zF&SSuj|bOa1Teo3U;YbV?#}{)xxaTA%&d2q6!#jcnUi`skQq;dyA9P`xR1+aHty>{ z=JLZGScRALb6_>VBOF)*@JI*N0zArrjHOW|o$za@7OrYAm`8QC!91$b2JPgj`fs?>o@R|h(fY4RWk zGEJ5_kf{#FHhv8vdmkqqDxk>riyf9kRJ*gfzf`OlHSB zkcn`h1DQlmbYLC$-~wp0$T8pQ&o9<@2ol-SWBoB+KXa9=3cgKiTrRy+;yuBO$B*iB`#%VX`V7yt`rMzZwS2XBXU{2IBjfwg>NA(zVfC3yW@!0p z!Osf{*NAthF%x<}OR;%YpQXkXTE1Gm%jXrYDdqQRNRaCD`);%PoPVX3uNM5gq;QRR zw;I)>`ux7ztv>f>rk1Z3{Jf}eO)0zCKCJ{h5Kg~<0c3Rl)JWwg=yRia=2PvPnsp4lH1t`U8rOPFK` zFlW?jdle#2*C|{n{cBaYN^JiJw7qH>-;WB{i2T;m%G5q{uC6K&ei&bCwY^H|pQrV! z#8>#M!qqaqpA@bUeY2a^FPHvl{Fd5he0-q!l`_6|TE9wc^ZOO9mihZm;ToAgY@or9 z`p@_qrErDd?|p?UWqcv6UnTnaK834g{{EwIjm%$O>z51uMk`z)`1?rVO6gx)tzRYj z@Lq+hWqex|u95lEfHC!-@u6FO2tQ13A6olNU&UI#O7!<%6t0%>ZBw{L=I

Um^PQ zT!WcE_E5OIhT*W*uaY>Gu31t4SW-kRpUZF1`jt|DyXM!(`_@}N*Z(48%|_arrDgb`|8a!tU(yS=?~o zm>xBhm5M37kIQHI)LKxV&4Dg1pFu3<;@42YI(&bD2xLs)XdHfI@$<~CR=Bd7DIunq zs48d9zf0ljYNqt}6s{>}PK{{&@@j_PQMj_2C0kU>SBd|&K;i0YrnGkzt`UE(oz^d} zX36lb!j_jTKfNv!Zp(Wkk&7+=JC9zaHYIIuH~!b{dX!{E&X4uaEio}YONR|~%1 zSGYzZo;bA=%rBQ;rEsOZ-`Db0^8VWtt`>a%Tj3h%zg|g0{p0bxZSC=Vr?q^Qy#IEE zs|DZxQn*I?pH;X@Ji&~?OrN@FO7CO%Bh9ao^16CO`OL{5T0WQmm-Ua~e;dr@@7D6w z(*8XLbN=52eZ+kt**;LXTqNK5+Fpf7?$;Eq6v^3J+p7}Ex>VunI&MFz+*>1><6&*T zOeFRD3YUu{zd+ls5J~^4!j+;4`e^%AqA6MwuCC+p$LxJfUyo?}WzzqT6fPIdG)3F5 zknz8waHVLrzS@43^gnFvGrc{k?UhM?KUBC}H0xAtuR_MVQsGL`%!gb1+~0_`&-ACO z%QQdyzW1zs=9g*OUWN2;g~FAhnGUh`nP1yk`z#M1*Y?T;pYJMME|$&3+FpfN7B4GY zDVp_AYoGfQvi6x@p3wHnq<{ZbxLho=3$?up8Q)6^SBhnDn6=OSZENlGcou7WWzxTY zDO@g=1FM6e~Ybs9?z57UYTg-W-VV`$N9~c&-DJJ<#Yco(f3tI z{eM_Kzwc7Z=lV}sK9BcfZNFSru=;6!m9)1+;p#f3mo-+N`QZr7uM*Aww8GVOOiyp< z`zysWf5!5e9^-}&Ztry~&+tF3JnM&qm1iI3KMI$Xma_Gb)ee@i2lHJ)K0EB#wu4`T zxIEt$wuJj&uCLYaelC^-~rnwc`l9$jGwIq`D}{iTt4IXO$E!v zCq6~-Um-s8a|&0AkNmU3RT2Yu!p%=Dx3^j08u7{Bvi6yNPS*Mr;?plzxKe!R?Fv^( zj9{_0S6$2WyGh|1iHWST_L)9T)%q3Ub3dzarIi0k;VOxtY_ay39^bb17#^zSDb%Y)afJ%;tDZ$pKQ zZ>iR=l=1ISxJqIUpIdv}pVzHDmIr5O`3jkje=1xl^YyF3RT6{w%GzUj^M4rKSU$_QZxybQ{=H-6xxbHUeswL=|2GQPNPnN#_g4!1nC4g4 zGX1<@`P|;)me2G#U*A_I`tnN7ocv-(UQ_h|Vtu}5)K20vPs;rv>w&-B*a>NEY^ zCB;b`i#_(0!sW8^P-peIz5T5|_h*5YFB5z5ONGm2CFEeM&+qGM^|?R0+k9|)dl=05 zf6?~J#M9r?^0`0vT0YO`UY5`A>uv96{^(%&Jb!&GpX+zDe4d~GX#3@|642B7&+YAP z<(WRdv+|r@YUR28PF9}j;eIV&CjQe#h0DdiYIOY*|F7D$C;pk<4BSv7{^WgHzfAnQ z&lD~f|L;6&kMUP!?J+)D6|NC~_W`Y6Chz}5;d1fs##(zkU$t7lO8WDg!Zp(0ziRz5 z@lQWhxLo|tG1eZ_Lygw2lK$*cxJLZ{g<8K%+F!45x%l@Jtv$wfxz?`|eD74aM#lGl zTE9%%-=J{0#2+SDdpzG|TE9y0y+h#|8Q&tUUnclit8lr*7sgwAOmCH1ze@V^tHL$X z-@j@7GQr0>h07)WG0xiK`K-|TRnnhd6t0o}KBV=_#J_&fV5Z;6)*jREB!fBsU~R8T z>em^}`JZch<>d^war7_czp#96zsT~r{8gG?Ci3(o_kNN0S6e>gZ;<8ld|zYvJYOeR zKI7*Hg)7Bhzt+lg{S!66LiEA+3Rj9gy3)!sy$;m;3X#7vEuZ=0c*|$`G|Tdt9|u@I zw>R7Jx%_dK&+UDyaAh6me`7GWx5Z#C|Fyx~{&m(q<9nOs^Z2i~e4d}Jme2SctZ;?I z8~>wlrTAk*6s{2Y`JKX*;(yI??TbBFuK5*Wzx~P4lh}K^Ir(T?J>RGVD%ZF6Z4e`hPt_?TOd}hsslOHaIynAGH{9mIgl{ef$aAWaUh2YPI4fxSqyR@ zWBGgq%OuKofx$e=DF!oEhPqLT)SPPhjD=GzpRqQ{@_7~~8_ZNN!C&GvhFCt2_i~pnR?jg?6%}Ho zU1s^*-qDuN{b{m%?$1${&+SjQd@g^a<#T%%TRxBX2+L>uOtXB(Pe03Nd|qn#T>fy& z=k_kKd@kSD^0~b$ET8c+!(hheu~we*`y0&pJrph%t$l#OoZr=8#>f5!^Z2_P%=qhO zFyre_2J?9KHJJPVXM=hC`x(s4G)l))$86f*KxX2R4rDg1cOWzI2nRBo4tF3k@mUUJ zHa*jU{N6Jh$icbO9mu_IRIsd+&FZkiJm&KhDl26tBcd>4XskkIrR*{w*oR*OvlFc)>O^4z~;tvt_ZRLk?Mj8mvgG+{@p z&7<#cwRw(XTAtr^la{U!i9g3+&cDuJ#_jb6GcIp1n8$LX!94b>3})P1Z7}2F8iRSP z*BZ>dze4qFZ5_8a!(e`2lfm4d=>~IuFE^OmyUbvI-=zj~e=aeY`#aNM#>bTgGxjfZ zu-GXV8O;4X-(c>~1qO3}XS?wVM^3SP?%yoS=l4yud>+pvgSo$x4d(G&VfFcaGYsbb z%ruz$d!@mQ-^&f=_AWD+-`8X?_h*{DpZh!A@_9TLTR!7+qJw4K=W~VY>iGQ=6t0zZ zq%Rb%6MEQaFpuXmgL%B47|ieg)L`!KO67(!q5t)k&*OW=^0~hoET8f5vgLDs&(-`| zSw~%A`HbIlET7wd(ek;3&+VOO`TV};ET8)` z-txJ>Un*QD_*rh{dHmxvzgE^wzf!nPH2!FXYh_*kY=aq}XBy1!Kg(clf4IRsz7YoV zc$KPNu&(A1>d3^6GTqpGPp26I|GZe0sb;r{UX8JzGVD8WB3fIXx{mBZ~ zN?iR7h3kYqhA3Psap^Y|u9JNLgB7loxc6HM*U38mX$sd$TzQqkb+S%9OyOFITfePv zovbsTs&K8ug;y(FC-XT};aZ71zoT%StYd%dVDY=w7|i%SN#R;qm-tBGI$6gUq;RdQ zdwi&HT`kY&2L>~K-#3`)VVR>xk)Qvze5RjgEuZJ>UzX4Gw$$>O9tLQBt*oQ9SU!*E zILqh$JY)GxZ~ZNw+yAHK^LUQ6eD2>8%jfn^uzY^s)0WTUJ<;;HzyGj&Zf~IF^ZV8* zTqpQ>%F1*9j@SHJSw~!}aGh9j&pBA)`pXSw{y0YAT8SGSZ7}2e2!k0v|5Uh6_@SS| zwGuacM&UYHH#$n;T3LsBTH!k3ha(lPl{n)Ph3kZ$`Y2p0>m<)ATqpd{Tj5$+2U(_Y zo$%A)3fIayPm98J!Vi5Fu9Z0AQibb;pI&pY#8F>0nDKL%!nG22?PW0Ix6WXm&leP~ zlQ{Fi3fGE<`nFDhIoacK5!h-MmUB@VvA@_9bl z6_R|Wzn3ka`&*-Mt;G3XQMgXx?6nHlO5A>>!gbZvdysqCGu|^E^@==1LB2?gD)K4q zd40Sk=@E$prSokf-o>%S@erkZ99+_-Z+b*#58A4E70W;1Q` z^SwbKu zRSuo~67EB1DmFVefWEm~}qZO(*M#g1`fabZHJ_bya)O;m0S?NAl{D3H&K6%${d|R-N8phB6Z38a_A?<^4IVK zG)JJBh}V*TAeTTp&$YHn8qeE!cg1I9_uw*3-dy^pZO#qtOhl;sZ#0%&k^A%gsSIkg zCL7&c%p&S2r!upN-g<<3gsQ1TYnu2aHYNt#POt5H`4O?b+My3aiB_9pO)+i%%1k5A z`!yNQleEmmSCLH-9m}TlmN@YIb=>n_P7LFDIhD!}${$~>^Vl}suLx}t`FPtx{|tjK zcB6OoP4`V7Non+XYrC!OGL)KrXWJl6cv#=s`hD*E+}`xOm54qYKA!1hAO##cBs#~H zzt#}`F<&F7oiWK>8SvnRzqa)Tg$`*WG#v5ni{0nOwO7$)#dzM2dIVmpp)~q1H~gBT zt7{XfB5nUM?=d=AFJVySCXHJ~*c3zer5vF;*r#Z(025sFt4_+Ey&G#fv(kwf@Ep7DXXM`GGBm765&e#$=S1ejNkV&&4>NN|WVHQ3p@SW-bxYiv zN>X|7{&C?$nFc!1eyat3OH_GqfIoowv@f-DRMC+|z$cMmy0iZl_y0|rqnrF^S>}MR zCq;)cy+J;lk)Fn~jwDLS1<_NAqC}tI$7hqX+kj3GLs^pT-gZw)gD>Xg+UC&DpqU={f6|&HMwhYpttG7N6)ACr2dF(pP%0m2S5HmxZO9uZ+--&y-K>zF5Hc2k8Y$W zZjLUb?cE~ZDkInXiibAs+qK6Sf!jT@9kZGq;6F~~gptm;Okxp*h6~8ZzJ{(Ob zIVbl#9gOk4cx*ojaM@yXU8=MjScnZze ztnh5s9iZVEp&22@A<49_Cd@*B+2=smbeP7?Tzk}iLE%AAFpDgg-kKWrkvM0-Y@O4Xc2+sx5^%=1@ z?kAlaiZ^DI4*TSqqoThe-q`Tiu(mI0!ZYEgQ??7YkMS-ejjeUB$zPLKdAlaNCabnb zMYg-siERiwDtk91K1(Pc^@^RtI6s?kJ~z?B(SKudGRxaZ6l(02J&a@*%#iZqwD>f(SHUlm7Wvl2@8ZfY^GX=E zz|{_~e^zC3$J7^08=n&&HKrTWIxj0zyHckU&3{iczmaTLrHAF|Y!$T-NbVYCPrPN67Pd)Xg zjW@Zi((tIP=_Bwscn5al+PK*&>%E6ae)`^nq>JxK&vSO^Dt|T08OZ8gp}iapd`x;l z`LTNzd|l+7M{_YJJSU9z4)(f|0bsJUceHm@Y39h#N-{0PUznA?F0FGkAlxaBGDN~& zebnUq;>0567s$g|WD}yFH&dCfBKJkzT;#@+UFUmUh#%jHZw(91o4lK|w`MWk>Ew@` zmOm}8_SGz}e^U8wM1DkGak5uYKhn|SQ(TZWyKeXR1lIc}6P?sY>z!WPnb?`oHrMzY zeI3h^bbSJNfZmxE?#+7t8`6n4X3fq&F??dU0evIAe7yI38-4Fd;giBD2lmeF&9c$+ zN<7R3+60|+$lp^Or`BPs)Mp2?{SW%w7Fx)D0pxaXQ7Cw8*_|cplTt z9YiyeQWHpSh>RWQ?_xjeYog)XQ@5vjaNR4twJlcPQ)6)Kk z{GzOunHw6xvIshHMOt(mY|Cf7XPIA4r@FhsyTYocwkJDt|G|T)Y=&tJ^ED}YgLf9a zt2aGAHr$hJc)@cvydiZar9UN{92XnL{kf3ZT;Pv(Htk;Vy|_)%iHVzhv#~pq9#omI zUwFST>^;oI$+452tv)p|HK8)3E-|+)`boDvMlQ==Ms|zHfk7l=fd`Cn&wM%AsA5YD z%kOgbOy18k|ANQ&$?ua_9VBUbFVR~I`O8VF3;lIx?jDv!82i|y*&&h^JkQAWaPKNg zS|5%L9~(X&W1%*C`t!-g5Fc%ecYRWM;e79$xTa_1Vk~Dst3Q&B!DA_ocz1^ewE=z7 zeSF>->3dj@V~lgtbDhkbo}8XMh}wt!DQUss#i7rWij$S8E1a&`9$%X8LTzrLR(r*+ zW}SEy&E41W>Ff(%PDaL5?=rRz!BaDHuad1HzC%70akk=ySf`}Ov`EQ8epg>*%l`TO zSbxFZel`3$%RRKy*}sL`zlqwvCUtGGjH{2gTiSH!&dmMn7lTjd=jVph&g|@WWq)e_ zB-wbOCs}2N)v=4U-13%Ew*W{lR zoD*()#r9y{-<^2BW9ocPPo?z20$Zy-yENaO>Y@*iXC7yN6Lh;UVK(ryiD#V+lTZCX z?-iPSIMIoGcG2%k;!9k7pjYfwF7pZv{_e!x3GH)p6!uAxw}g)RH%G@h|FmD~c^4PD zBYl#K3(YUE!*5F8;`GRUWIt=0`{h4l+h#&-$ywJXu66v?lxYg=!zNGC(7Eed;aBQh z$I@mi{*-;d@yMfzN8NZIDzIVZCFdoNqW+&qxH=?#NLpp)(}7J0KfNek#4@lil_|+L za~uYA{$}EDBD-jghWZydU-E)%3CR=Rn?|^jwD<+piE7p_(6j5K>zFs!5>E}wPj_`& z^5ffq$5)e%SQ`>NK-SI3eZ=(nA<^d@IeR`lKhf!T#7`iLh}^u=d>1F*!0$cjIr#nG z6zhOLyMt_%Hhu}kD15ISwVC&fmrJvyY`en0$mZTFR@)M`E@%?+T++hVb3^m<}V(Fj|_dlV~348G}|+f^Il|h^sg=sd405=#{!u=FFY??Ok-(n{jF8fM62KZ z)LNfCmig#xqK)xsp_6mT36!+Z3FhlS;DP3=GO^tGP>V8)GU{K<4b9Be1vsA*8_zMu z+sI#-n`m_Y&Oxy<)^}ZrR?p6!omCy$lDGKAS&`42Zt4*35Qc5GsE+)^L~qAav%+TQ z)CDn5kEF}k$k>S5JTFBSv5gJA4?9HlX2;a&ER#Y7$bgJYX0_IrSflXT2=Vw#5?H7s;yNbTDTqUGd|7kdII zauO}x^!Riq+gD{)IepYUX}(4muZySse=OP@MeJzzrXteyzi_+)`uf3y;N=^xWN7m}9tuctK; zrQ64HpC@4(V_jxr)^yp3{7etFH|Y7B==sbGSg&c0rd@0b@jA87*XBN9dknn)edha& z%EJeAaUnJcnul*YFZT`i0X#U%`(f0&Cer6RkzI8Vpa+l_n-)cwtqZXbeJ#5)jr`qVMm`4 zvpx2rsGj--PlbFw4gXbsfGUM5AKa5iB>Y_p4F zPmfKHsZaeuV@V%3V@cII&5%0R(bvcy@-6%GuudxY{Haya5<}P?*&ad6oMc+-gp|pp zVg4|;j&n`kVo<9y7rVI7y9t>`%ymiL_-k#>e6GgirOZ>85Z&$`+C8N6vLd^}*(a^- z-fjnfb5C-#HmojI{Hm1aEn<7z*U>zwB_*^L)Ornber6WMxo$vPJ=x->OAth)Om z|7+H#)V#MkHKg6?RDKUichBDMWNhciUCw@Pjvm7H|Ad3RHgm)8u)VRG?2S$7pLl*D z2d;`=<#gN~Ig8mwLlS!@=I~yNY;`uqcggRP%GcX{@l#;uOS;&5cjfx~X5|iMT-6b- zUd*SQ%`-Rr5kH51M{Mv&>OZ()f&Uf9?LQ;=vndDpAo1|6VY9=pP1xGg0&fBHGGwx( zMJA^r?O8rRp6v8P>~q1E-95K^PUmX}MSK;X*|5pvPU#a#zd$c+Uq3fG*Xg4U1+k7_ z6TdqD@vzK1x5lwwXupugSe_!;r8NJwf3V|=asD`eHuVMTCSN3l&Nq`?CuxyUP02&q zhnhgod-_;o^}TX3M7DU35#EH(XL-*PzZZK;Ter71W~MMN_aGUvJ-*%9rJrX%&yx4& zmC(B$PMIzq6mD^`$}6&uIX=DIw;0HE>Deq-XHiERlXKY~yP5jXGkXZF%gBC!?eQl_ z-xYi7iPw$`9~YiU?}E*LXX;LR8>Pu-m$bzFW``>{4ukmEC7yH0GlW>Aq-Dv`FptP(0+;h3AGh(}i&o2iTd|C2Q!!%XjAQq7xchN;u2KHV{)M6>S^6+s)SDuxySjrEvlZeMf_eom(%5K>@htGle zfo}c!T8i1SZ+PdGWb2v?ew0HhF?%FlIi+Rs8?vJDR%dT~tn<#O^R2ly7N zY)p1w8yhlbXLe^+mNaJIKmcU|}fw!2_oJ)2t2V+T*|k=;XNJIUwWXnzZ6{$Y|2 zZ%5vasD96r|1lBHKdSI4&pq zF*>oV-kW6gJ7g)TT)HYZ%h|V!6W=)ZS1tCx?5*K4E^` zK>U~uZ)BPLDaq=Y(V1@Dq-Wf7@$((t(@y?$%MNE>;NiNiZ5or=_85DnJ=XgU2-d1# zPhRV6tqlpW`Jr2Dv*y1%6|yz)*Q2&JcWdHSrSn!v18=mSByuu^dyw`bz2YNTw!^nt z6I&Bg`%2P9-iBh2)?{OD-cQY(%KHkie?!v6-i0K)nvzY9zqb1K(H0&b7vlp;mhPD116SHV8 zM7Cd|AVOW2O>NAc}>`4%^KebeVK?<3}L zQjx_&{#LNY8cJ*l_P|VxOpRM?3VKlFLtAe{csmNzVe-PH%C4;i>rFFq_c*(~TeO>#QJsCG&zZTo z92^ELE^wiG|_lYu-3Ki-g@Mfj0)6YX12p87cozfA0$$=MTKEHt0Gz^&0N zP8`GYdobUxD_WGU80RlnTp-|MTLFef)Br#673 zMSqP-%id0`IWF*TbTrT_mfH4#K{Oy$LBedZSi_apThHQ2!Q=ff_>ET79hnDDFZePU6 z{K&k{_0ssW%2Sd0Z118gs4m7O=^)PIUF%{aebc6wTk@NEzv9qPgmAmm$&t$y@JnYKuBKt?|Nl6PW(SSvS5be!caNkOJD+-GY-LPw+n8+6 z{7#OhcVYBzOjoUST`#}d?;gnfKD0JBm18VZh{jfDj%RrVo@#B^*2PH4S$46eg{eC@ z4&0XdRuQwkQrjZim}jvLQkR>V)A3%JxiX{v(K7F9H;)%a#jZgAd&Nev3~wO&Z3)R< zjl)0WKScc}oVR{B@qXH4sq!S79Y_=?{$u}We`mLh&y3IL*gwsE&bBniYEPri?f$2L+wRW}U^4|01jTA~*)Z{h_1nD`jihf_00vJFG5M0=2mnUA1zNBQ?V z-*$1r=zK$BgPX4xG8Z{p2x~DauUeu_JQs6GFKi5N4D-H6k`)j55BRmfIi>rD`-eMF znoJd1x4nw(+u0QJ85WW_+gW7iNLpljbF|(c8I->!|8Tp5gLF%D3j18tOk{FqvWx4k z4apvI%<$2C8$~+!=+|Ach8QHT3n|xBt=<|xW*b>vJKav((>$&W5jb%j!B}~>$ zjZSrRvV(S4DgFnDcKRVerxv`M;Q>i`KGk!Pe4&OVFl?G^4!JA-boFD=y4_?ecH+W)x60c)|e#WQG{%lQt!!(I~@^fO{+am4(`G0bOZG-i3wIAwZ^)cns z+k&|C9i(5LNlgUrD^strZwuKzm-a8sq*kyFvdmlN_CP-4 zEoB`6nK?BfajI!F*OC_gS{*YRyF;`?lw+7QmX{(EDQ50_`_ttEXGZ&Q3=QMGJZF5} zm^3>I>ps~453h$_cY6R<`F2KTNBk^4%QKGJ*)zVUKWfZ5p%Y|DNqhT&teixg&k2)1gcJ%~9Az!1LVj3buuyr!Eg-uz0>Wu{fb} za&Gtw$NMGuy~u7U@-C;ps@T-F%6FU6o7}#UKNZ-n4>f}>!-OQj;mn( zZgYAw`}pveB`x?|SFqM|QzqtQ`v89q`!cW_J4Zft>Hf)~th>>NpQEp{&I0W{78M)j zB+Br~F96N#Ms+1Ea^Ty?epA{pXg`?Yi(*Le?r!%>bSFL_n!J_lfuUY zF=vXaN$NECTE8JV#-tC`+uLPTr%m?DHx#6QI zy_5QLa-==e9?^;SZuni=i$Xe-&VNa|$on@1^dqTAN_k|Hzlry$LI+)!xh|vnMbbsI zHjh0>C%O1QOXLM!BLHn2L5C{9n~?dE7CJA@Z{heG==nI>Ck)-u+MCVTf;8-k^{vn&Q_()j-VYNWCXNfz@bwfAl9qD~M|iU54Rie>tuL#N zxHVz>FsH>Yb$q%wX|cN@1^b0|McTR;@8ZO_E~n6;Ho7u{$&=H*m8C6i&=PHlBBn&*iuP++jP$)^v`B5a)j5kL zZj5bou|Y|boUHWP>`K}?^@qNV5qp8)Q)6$;e8NvxN<*?jCaYbvTiW7~&CzD|#d^^C zTAeTZOIv$)ZS#cx6w@Tup$;nG-%R`U&gW{5N{sPn8v8A&U>_0rbVboNj8FK3E7B`y zSD?(Vq{ZJnGIWxQ?c5r~)8>(mmbB>Tr*pP9bx?R-z$1|oNy|Fjv`n-}bw^{eihYDi z5)kEd?go1saQ3q$*O{MpqUZfm16U5gHaIAKP@47ruWf1n^NO_c<1SvG5}sOA5Cfkc zw*6*}S=&EzZ?IqJev;d_rxvErp9^U{Vp4KaQt4+~Vz7(#b&JcMQk*for@#(uj{d^y zKJ?hz5w~@g`T6;*i`#m?O_DTtXH9E;N_Y_aB(KSjWg8WC+Tz3}j#FXos$x|!wMDT9 zQtcd^zfgKOC~R@UQ*(#Xo*7v~{5pQQ(|yNfhVow1IYdk3AMw6|2I}ZJ*>keB!Tgry zN^_8b;LZ1w%~9B~_}}LAO>PhH`-%6R4yyL5X=}aEhNOiyW>TbH=M;NK)$iVtx3$+^ zvH2X!nng6znc`P!w=ak;aO<9rge>kfg!alJh67u1VE9C~w@)DbH6}I2?bV;2nC{j_ z*M(=Z9GFF8L7ea~>L=oaTfBqZnT3{Un0@LH`P5iLJP%_bIk_djuak$c0aWL9h*=D6 zPEPF7TZld-ExzZh+|guv$T{faV#m2Nee=U>+&+iZi63c?z3fvuD>#2Wl4wTKvc6N7 zoXzwA|9V2|jI_#@N7Bt~i^8VeEp57fWylA!-SRJSTw z!+Xgfhfk%mlYQx3*c-4ayUN8&uP@kx_hF(p$DawcUTx8tMW8o2%TTm1u`tn|($J6j zl-X?WhWDVm0#K%jbZ!gF2Qb^h@Hj{3TMN!euJPCSx?gDTaOYs3UZmvdoUIY>6Sw_B zUuA56+Pd&pYzH1rZ_B4V7yH`jZ*sB0ZdtS2*Mye8;- z=TaF-6MvDs`o7&f-DeU>279D^D!;zqtlZk@T6dmE(!hg98n@Zm?fb+}bawCJ>;j2J zki3dTl59J{t{dP_;&nsJ>9oua@{5^wS|v?wl7lpx_JPB`!v3i4+1@OlL7x#nLb4HZ zct@+G$>-e{dm+9^s(s!ZecbIWoEo<{2I8*jchAoc^P#Xg=jA?NxrB6EiZf$>$PVggMXWp14E4cFL`_aMCW{#lZ3z#Fa6LU|%35l7|8IAN|ML6dRocud|F#Gr)()!ms@lV_y z`@QmZH$o?tbtP;+NLp-(r$SGKz~ivWf}g{0m9*IN6Y@*ldh0=1^OwhD$GGzX zANe1-GnfOC16&L$l*7D}Wk9;7Il4RBL%au+9DnC?y=2qYRHy^x?i!>V5nqWyas_pZrI;klbkb9ZWHFw4@TX3pL(AC@7w;6}< zi6kvJ{KT8@WWpD;X9Knn&QERfMmhQ)mLJBx687Qa>@Yb3+>I>yYn2vK_p( zrd87LTbsP2qrF^gvqRc^@QvBONj!n*YIgV)ro)wlw~nc6sU4r}M9+IG@-g!!Y~ZW? zYh0XmVQ4ec19%Yr^*+=eoG*T`AZD^#@>{k8FC^T;KUMop($vrOt*zUlGo9@*BJ()+ z;W6q%X?_u>A#WEaK6A3Vd%+p!jro^@Jrbpn9kCre7R;lh1^?&dY_DufbT^hu?TH81 zhHNePCcoarvRa~cCSpY9Zazl|JzJURL#t-uAI%N*;l1L}3o8?5JJl5pX(zh4*gGL( zcU+7vkWnqUT^v&dFJGTCdkL``=xD4ZZKM6q!2b?{XwY%O`0q-B1ejy>)6fpqpw&t}8Rcut?C{Q#8(dzDvb zKH#_k=zdvi&Cf@X%32fqjOTYF&2Le1kc*r3^vjrTAxmT7 zU2YzS`r}=jebXO^Zl!lUm$g_~Xa6y7^HFN^vykbU$?3^yU7J8`xs3P@{z5ivXY0O+ z_AaUjp5v^<$%G%Am1v13S+3GjjdvgIfrNZ`fbj4H>1Cv!CMMrIgLBOi@Aa}qCzA^H zzkL|cz{f-bXGYJAcBAri#DUKHOk_C>oB5K0y?n>yjv;#hWqxawG|ds6bxP0~I+Z7{ zhW_Qw@2`y5*|f%_t*On)9Z7Q}eqU$b_Dmj~JUXfN#-_w(rgO4YBIJuX{^}gD^LJ~a zYoddwKcLUqw0^33VJh9VqW0=?TCY*MlC;p(0{=rN6Q(AnvF?WboG3VJgEKg=Rluk9 z*{|JPuSmDjdMJE$&+F>Tc^TBbBzuCRw`B$K(l^6)E^>HY_8kqT*u_oxTUhTLM0)4n zX|o3gB-gk#lwtWi`+bmOx1<`~+1r^pi&02gVieEDR=N9LuFYQS&I+B8&b#xTcrV5U z9@#r=>w}&6ESSv8QR!njt_Yfk&9AZ6)^@XajTpY(wF$FhB`tO=?h{j4w9)^}$^3Ub zJ7c)K;4YC^I!W*Hy%gCyyA?tWp5iOmoH#hvYKOYse*!}Zbi9G8Y} zofF&F#VdNne&%`HPW;|4+b^sB^0nFPS&zf^zP}(=yp8s!ahupb5E@K%MK;p;<+eFW zmqNxSpJdx(F$wzGtoYgoyR_K4og-~oPGTOrr2fq7FTm}bnC;0Kn>gqc!OSRj(*KH$!5ay(C|=q zR$^4zVhG>2v-tBNX^V5NNUjL>+_v?w$3T6G&i=1#PhwpAXK*(~vDftS`du%_OWeIQ zW$6m0CD>Qk%c`-Ujw#!}I*j7{pn=m#7ClyQ-`dFJId;Y;(h|{_Qul0}sh%U&+|&Wy(4zsza@V=#~I)gEhCSiC(FIo*2Rf` zkbEOqO)&&X3(en}F`d{P#U6X~p^f)_yYJanfqs83`&?G_SFhNMtY2Or{c<+_)A-xr z3GqSj-cOUCCP#2P5jwyBM81UHdj`>fq~$&|oQ+l4E9oNA_hd`wPUU@2q+Tc*^(pUv z_Q)oj>P>fRZH?Z04u^9SaVJ-A@-5vl^#kuY|DM)5ao2(FktoaC+01l2?aulYWwyKh z-Unsxp?xf*cgXg5B`f@by$vdof_-~lemu*0 z+;K4~;(UQfW#S#09kB_oN)Bl^EJ(kQxt97MYaBCjGjdnab5b>QuFCe?w@sUE*)3sv zips(_xV^ZGl7DC3!MJ*RhqDa^dg$!iUIN^i#_Kh$t!=-g^R19|kSER29NPdSILUXj zyR)9lj^{OB_&!VH^IiE*(w{gV`TCr#;g*H3aO)IT#IA5L#`d|{ZZ8M!Qd2z4ip+C+ zy4FxU4RNz|WY4^w{ZDZII^uQ9ze#Qq?HwimVny2(Z8h$_DJ^H#XmP4|-^{*lztB&y zpPaq7$*XZOiZi1l*beVrTXM?$yqyV}k(=Xuhll*f-54LCbCj?pK>zFV>+*Uh(hvT> z_{=P9fCm!~Ce&tLmo8BnSwMCc?5T|Di09Leo@q~@o%^UP*t?FkQT5YnY2T^d zL$Vj0FVj2sHhI_&EVkCPknIaPHE}xIf#99nlXm~Z#Qa2#Ly~`*k~HCp9Kz;ov)gkh zX~7}ld!Qx6_arUv+7^;K+32wceW7$XG_iW#(J>~^^ zd|hN6`_WjpZS+iEx8%|PV()6Y8?cG)i$Gj)38l-za%LI)E@|8aLGcrcZv)S;{hGtg z&IYI>{DAkdPj!BHe)uR#11EQ+?Y@YsQdhZqfi6wW;I%D2J4W$jviX#6EE6!^ZJ|X@U#IEJ6y!Pf182iy*d9BV z=C@M<=f5O=+c`4D>Ar4sCl%X@)cyj0G0AL^;i;tY&V5Po(H0W_Cg~mnUbia28AI6v zhFHO4Iom_~P0o1pu3!)017zb#T5QWYx`z|^2Vdj7b`$jtzT{`o&!TD<;rx!$(z4t# zxl@tGbp@Z#68+d5eU!)Y2(|x0=4xKIf?T>dd@ptq$RG~D`t1A9+Ex8tzTd-kd9?wcwiXz z3=Odrwgf+?wXkz?5AeJGO7GgM2=q*61c)B4&zW4x(h7{)@K0s_!9F{ooZ|Tp@}4p1 z*;LZ{pAG+=ZRUq)jOlnY>kHtyC2D)W&q&*T@|*m3U7R0xn#sI$Ex9#wtFsxd%k`94 z0r|EALj#?B?n&oEVdr2^5$Af7wGD|M+&R`$Gi^z}i7nmPH=DVUBEO*X zBj^QD(jDMs=$aL2xtI7EirMZLek==}g6GGEjwKqCx&AtCcfUkqQMY#7+Rpaoy%e## zcMdPuE55+HlVvYt4$i{B4kvO*zaBL@+~gZyoE8=TtOAjX=c5B>6_(n@33-+$;K`Y|A4t`SPNq08tn*6?uE6`^P`C{5nIDA6|xgv8#rbB@9wXwAYu|7K+cysn;2DlDxOpBbs?R{&IWZ5_khd+ zZtv55nfshfNM%oPXZCTn2(lV`IJ+el(ivpAr~O=7!BkuK-LTyoS(<;->6(QFcTK|| zQD6HL+8wX@Xko$KS)F~*x#)|NGIp-KF*%O)T_fo`>^C?O<0Tn8EF|}^c`; zdal6#h2GaQIOqE32C*#CxuNYo?jMG3+9%V4Wgy1{_}*Gs|JoJYVT-*qs|xOv_$u>_ zi|b~?dpMoDB;C`ksdex>xHYMVY5iSebVH&;qH_26r8_0fbJu34Pp95#T+nNh7QKcw zP59Ta2cGbsowijALqD=_ll!|eCh=ke^{Ng`!xEdZ)N%iFLY0w;q*c*?YmgVk2&=R z`$R4c_QTJl*odUXUad?#?Cy1MjvmUqa0vBtUf%W&E%4{Lc>5LEK_ru*uZw7Hcd?^^ z8R;unuF@Jo;utzRsl4!N_*Lc|@b!kshKTOr=}Z$08Aw4y?^HS?iSkF2XS>87$9C*e zdR~@4%f&4_CFHyw;y;a^oqOF#>(2Pj1vZMZgsqii3+|I#;J@x-5p*`+t+f@!+i*Md4T#91r0HdP4c}GX zMDMyc)tmQ7Lq2@sjc592y+*d6;;JOymTgp&!G0&D|2^}EIl3yzKf*R7{L}8)0Th3b zc+@4COB}!77~Ekvp?06ME(%}d@V{U9S@xIdm1Gmzy~>Tr5iA>rlWfF2v5+BX|C+qr z$GeWc#DMt%ox}GGbny;J7kSGGq34hs5Z;WGj7dpMo`{0JudyPj`&$~5cK`O1`FryF z(7UkKjI(d5-z5ziYbvQv)w6F4UwcQ|_V29?oyRd}qPJq~c~D$ozdCF=_=$@XUvQlB za}vJeb5qy`z};L8sk2=?VVP(5e9p*y$ZO?GDVEhMX5XzCnmpa@>Dn`Ian#S_pSwAl z7@O$qrDfjfPA7istz-U%y;Vi{#C}D(hoP1B-#YpBL&Db0r)Q_T`^+nYy@J)Ge`0?4K++zdZe?h_8_qNnFT3wWQ%RT9tJg1NqSEcM8gNA&A+h5c%^^-dTOE_eE z`yeX6Td2g{Q-OOyRYzd2Anwx!J7^NxwqT{ZVGm48)b59z7q;{D$7Htinh|igDZI(q8z<)M4zW$7 zv-Dk9=hd-)Oe-V0ukWJhMegpe&VCoB;S!?Z@7w*t`&;05gfq7=P0l5LygGEXTZfgj z;Ipy7F71@HyW;;s_oZkb2E|Tg+Z*)uOVZW?`lb3YPeIO0TI{i^yy@9|%HlKA)6?Ca zx6Xb)?(^Z)=PaGr1m5-{oDA@robGFhcH?wcLe>_t+B7zZ`%9JgPl(GIuEDf!b#+K| z3W=q}-+ZHa+?#rGFpm`(yW?wKem}P^*_7C!?D@+`hu-Adnr3mbIJirv zEy=wQ&qX_$i_-kbZvE)Mu$>7S;P+>}109Mr5#5I%X`&_Chp@_jo$X=Ze{Q(U#d&7s zD%`oq7ZbMcv`b22MBPY_ca7G&{bsluO2={+t@A>*)35lW#7DuIqpl@q6x^|VKANDlbkB6>bHGLCVDSYJ_aw-qVOAT2i1>e%X-(pX9U&#Xg1 z8{M)sjyHFZ^`W-w&(T42-c4-I;d!k6L2m45U6S6+^N9UI`^2#}E$#0YUgpm8!VXt| ze{FiLTgQ1JWA}m2@{Z;GsA%UHuRqIb(u0u)6KA?}cHI)^P`p%pRoL^o*RDKc-&q)* zxAmz~x@TMc1v-z(-$cM#=dR2a7YCy|K%5`fl563(Vqe1B{j_%lcKAZ#yDpI~5qnp# zABObTKO##Up5fndyye%n-j|Utc`T3{k`}qqD>jei=N&XLrI}J^+tft*I(w-*twTXy zG!aQ;!`ZODw?n!^x`dwN{-v$)^LfuL=J(G0F-*@#)BNH-jan*$xIrSC2x5s{OInk@ zTgOjCW&Z#L+Nq4p7i?5~3r6jK(5KiuT}uXr$Man%Sl1rlpXOp3k9qdZrX%Q%R@QN? z--QQyy(RWYw1j>2xGx&Ipej?v{ujNL<&UmIK^Cd}?;4%2yb$ReeZZYDS(w5d4xqQ~ z>l>2`oDKYsh{e7(eU{fXfFIxubWZ4@Z`RCmckeHZ*|!+#XuS;UMEFJn z`Q03!=|JNJ-723}WP&(nAFp^o!FK^ZDOj8SG$-qo;G+fppPZbpj912${>P+j?sm~P z6jTR2NVX+#;(1Npld&fyc1N_dgU?&}{4Fy{3x9P_%6@|$G_V(!f^aLg_mlr0RbK)oMRm1Z14CC;cXfAlbwON^ z84$vvA}CRbpExMs0*Y(_3@U@Tj|fUo5M^^f<34VnxS&WhQHeN4%qSolMkUdpNz^Et zAOS@QsDK$@{`Wn%@4fYhe9w2ENq2SCt#i+L&-Nbo6~loLmW9%n#M*#uscnV_V07ko zbx!fTlX8|zq-!u;YWWz)Blgqy3gvqyo^xK_=CxP*HhLG&Hi z52)pEe)e(cS0%{_x%H-3DKCEf!>1GeRV5$&*_at1WBJ3}})epbbHL@6f zMe$m>KJ{}|%5vRc{)IV@>xwFm_D|?Wr`QDS5jy2qU!AgigSR2yr2VOHanD>+Zo3py z=Il>T)NNLHHjXsOzrkl*g0fLwC^x(rWAd+?ISXN2P__)VgL9PBxyuO8A!VEPeNBFa z>dLsa>_257&e^{=_-`m|j3mT)37=?u z{yyV7pY5J4IjDpNKQ48cTA;>*oc>g~%0S!rgN7O%86M^P%CJ+U9OE zoKfee&QIyQ$&$RP86#dLM}gME73m7YM|5ViOwRku5TJ$8LZhoW!%@pvP4+vniMwGF zZ!X?k)c4juQ<}YqdKgrbOYEo&FX_D4#sl*i8+)0awfXA~nZpbYZ^VoSUBA)b+4`$v zg5y9(Yx)ksmw} ze1NDAkvXLJ`vPD9;#+=Zer#iFV-UyC`>?^?B(XT^5YFBjkLz>xR-O@!2#*r7R8-BME_plE6 zQ+;oTCwR%e55Erw;4|#&>5k~6)(^Yg#qxP_w=zb}&rol)E$%>kK-v8R;VkjTIk)$i z$j)x-<(*|PDs7*}MJpWJ$GRkuGujD@r1fpbxT9b*p6icY%OiIXeR;aZb#7*^;>!ib zI4(NQ^pug)V=V5CHu}Zvi-!Masx#HZM&1OshSp=mYaP^SC=>`%GCgFt4Mlded;MW@a zNGz&z5QE&&;@8k0+3%lhdNWzKub!n#C9>V3&;Nw?uGY9u=$7wcXQ}7EgIw*2_Lv&u z=dxA~R|WQ5WOLaZ&kp^9TZ>i)&JJy?pp)BKWP>^4otV{2J4^hw9CHBm-k$4rcL(9` z4lwEt=NNPa#-!i+ursrt-F{$n)zA!)G9x? z1J6!f#GFp6l=W*+EhqZDKn~AZ_uV- zF)I15G=>}K80GVdpjq4q1?l0{Mc)WUcX@;xsnv7YMZnAKXPZ7yu%H- z8-zoEzC#l_fpml3tR%#Ke9l#&#~iR@c@% zZ;EY=2f0LM;JZAt4e{^ccPM`EJ&Cj55ZhYrs&ti!5$(zjHL=|J*}obrG$%F3_-Z_g;~vy4k!$-UX9FKv{)9PX5eqy8fPh2hJ%P#H_&69UJF7 z=zVKA{U}S9V{eJmYKyG||1)kwetzC3-$kQ$r^!*C>{*VK7}Lh|J*&04=jSuen_k-S zc{?9-Lf-nJT?5q%!ycmEQjyz3<=~E(QNN?~T9pRIZEQVe)*Q z=V{J2$LkSWJ_k(p5^S&(KIVm}2hg~BU|2A5`}1-aNL&k#j-HVl47RL}RtZ)l&O9f3 zj>&Jf2wRluX}eTTOVV^l3rqbz#7M5gI$SQ;!jI;=AXkBG@%nz zJqz>5Q^n@q1UXrs`nlN0FY&u-jpuT_nzhkdGlykrs#1I$%GLMM%c=6k)zR-H4z>gb z{-O9`Z6mxpVmpVc!CPi9+il)$CYQt+h4ZjKlwr5n z`d;dhQr~wKbQd%TvS*Q?}_tskPD@gVL&Row24A`j~WFv~z6pwwI018YCxRzMx8tkc7lppY zo=(o#+MD&M^{O8bSh_J+C3W4De}vU>_v(4o8v1J2A=G22ca2b)v#~TYf}aPhE9hr@ zAZL5G$LH<*)`94$(Q&r<@wq03S&^8x%1&I-fE-Qrx8EZ7a{#;hidfq_${l z1J?T1=GFyv255tCduq0(hA5njH~etc_7fddXfL*JgyVHt=zwSs*C#&dnNj&)neXWj z5PzR}f!c)6QWtbHHU+I7Mn81O*coa&ik6%4m|&dT17qw*7xuy~t2oaJhdEyri-_FU zMdvJs&RG^H|B=s5&RD(A_$f30lsHQ3$=&W>#gC)zIwrQfeD9%ml|IfpI16g6ev7q0 z`kDs|YUUlW$LP@J&MM=dq%KbUEU-;zzp@*$Svv02Beu1UN5@B-Si!4>SB3Y9^I>bU z*3W&?ds6c(HLEq=X%FP`az`4Ru(@E*#e2bfX0FXfsjF9KnYHLT?r}rzMpMh-r`{BO z#rL=;5qtbgf{S2D-tzyjZq4|KvW7;6l3kLwTr2hda}o#m9efa!&&PTn4g?($7o`R- z!)y_I&*Y+PgTE2?ehywl=BhY=JaXVi`*6xI|TrD{+0Pc zWQKaUozu?5#8x=A$Maz7puq_pGB#eZ+r3ZZfwQVVO?{fWfcFD`^G2K(U4yzQKL;)` z?|-7VJ~c-481e1H-ovIo|If~!O+A0BRI8NMEia?iRAb${61L#M%){oMU&vWbm2O!Z z|Evg)7dh_^Iqy~CRQv@n%&V}Qdd_33)RQKD@=fL&iM=r9d1rK|iS^ZbwMO@0B#@n1&gw(e&$)+^MeJ>SyOq;6%O-ga>h6A%G#Q=Q!)cg9{h;- zpzIH^#InG0S*W#o*QlebyR$&&2oY{Z$epj8VQ8r^tm-ZS-h z?NE6{T*pB0et*BObKKpcT7!Yxq$V7%**q5aHGmmHq*-hl~iu66_BNLshdPSi}!lespKADlt87CaFA z#`%q4qp=&t+$n)oxE@ZuqF=Knc8XW_-@zs-ZH1A<+)eD z8C430987gD)pU84ALVu-j-lj#MTQ&#u(NpY%Yy%yT;!|nYa(OB66dFeh#sJB=Uf}D zSAU9sg52W%k*iW`wYQI_7Mstnjdn^c6K&jiu8o6j@;X8v^6X%+Q_y5EPcO`A<+(c< zUlRuU2E2 zt(a}0b9a~VW#UW1*UzdBPDLB{Iy}; zX>xtW#P%onrN;n2XuYv1y;y3D8B;wnA)nRZg=)qPzI#{kE`yC55qHw_qbIhSXySNd z3q3`CF{`hk)^%ikCGSTJ@iTcN8$k6U_(##P7@#bESNaf z3~Q`%urOX~3@9_-q-}f~{YQcmX5#=XPum#~&Dr5%TZvbDXDwIr)!F-`canP;mZ`of z-otA}%a_vKvv__KeG8x%efBHD>t#PDVL$8rJJaLvEYy>arJj_ta06sx zU0Tgo#Q+V&86J>*rXC>ggvO$3UFLLjZb$v_%&fkLVV<4W5V^0&dtZk4J|Tal#D88Y z^PCeC{qpa74F(TSOZebdL@Hi-627}Ecu)5EUF!MLAsuSnE6`1ci7x}LyJ$& zibtT6gZifm{d9Jg)92|8#@_9AY))-(X(sh>2)bG;8?hiUyP?8=M%VvHZJ73h7_U$| zf$k4TL>PQj<{!X{$J$V*wnIMo#`EW7(9y9 zb!XzqE{iM&d!1`Jf%BQb)Qxj?D)Tb5QybiV5{Kv61hZ*o$c zajc(lN$xKaZ+{18fp|%97xb!Hmph-l{mH=;_?Ps(-BGy1)Us}JACTBZ74Bgu;+7hx zP0yA|tdGv~)!x+xldH9ohfjQ416do`*il#D2d#%|B1{g!GtwThW`Os=KAJZ9oZ*cj zAB)zFYOQo*ZD9NU8a>+=b0GXwa!k}$YOUnv+?jjX^aE-wc&5dD?hKRT9-U%so~p;=?A@{0bEq-I z+0;A{Ksm(aY`suJZ2KdYxJz`+Pm@~XyZxT(^f%K(%GmgS5i`W^;^tZ;e2_lrK56}1 zzeR1NmVeB+7tG9a{YTXEuvQ$RR9cri6$hG|QHv;N8C=)s8QfN?`Rr0jjt*T9cAj&d z!vBaX#yQIYeto27R8b~x&fjc$TjpeMlf9*08XepE+nuqEcbyoWD7BqDn(Um;N=crkT=wI2zXlK)2+>~HTI=%-p)Ro>s~E5iZZ!3WBcw=qp0eU;9n2-FO;}0>q6V+ z21wkaKa|KOaPp{_PY>_>1a_Siep!kI_3-96uPfgHcA;G&&cnDjYw78m)MW1j9#9-L zOWgs+haK)uGJSauCG^a&#GZGJ-ZwF4>f52E{ZVTrCpCqdg7~eF2ficfXTb*Xe!=k6 zX-)YL&0HkT)KmUl#;F9ak+#L#(fg*))MF_XCwUh8Fdy}SI)=Xmob$vs6zsb?G=|6aW> zobhfgyS1E$d*C}gF@2)wYMxECRyK4;UfG~C@RW@Vnl!5iqF^k=L(+T{p^gb4>hOMlXW{}?33arrbcUF zXlG4+kDL_cnK`LDVjIVv4!&ajF1Y{Hx9l@o8Cl+#7ch55W9dF=>jTz;vqis)Q=L;y zT&_cDb~fdFPQmi4fFo!jm?-c$Kd6}p~7?0{)P`wqb>zh}cXSny( z8g{43aqch8%^3olIMgL)RH<&HI9qb=xV-me_6or{+^c5`Hs|uQ%wn@ABl07Rz35Qv zWPIveq^b(bY2KTusoM=U+nkua zTU-3CyhqN(JKjGYXG-a9wN^2u=L4G`>>34zuY+?RG!DGl`;E-G=G>@<(`S_O$W`b8 zQgcZFQJu4ca|KH?uC>7ZqGU&^q>n@UcPAI@Jgk-O8iVs+OVlzg3#%VA*tJ{k~Rv6kftRIyG99mx9E|t$y$#0vz`F0k>OXWRMKb-AY{L|nM!QVsY0-U2d*Vgt-&pxN* z7H2$i?-$v)4=;(l78+L{<=NVy4w=80m{L>b664byA6cHp%iYUMd+1?q?9+1Isq5B6 zjY^+m{|l{EJiiUNU%pE8U*D6u$N1FkbGD}p+`=t+KUYBhM-|VMxFT_d>$|?juJ;tJ zo@`mbL~eW@n#}3teI@(`)OD+hZ;S3?{A7K~a^kW6P3xSosO!_`cRn}`^!r-jSbY0o zXnC$`oo4W{pf3++{9tyM@evNDn$3*nZkSu7ZCUq3?7G4Km%;6e(~C`gpkLP9O5e|6 zxg$(3Qm!dbA@?W#GUsh^t}F8k)ws7dDHUry z0`_iHaG}I@Bwv=Y{tol1`aacK-6!z2sYAXTd}YLY#8)R57D!D9WsGy8b^WbcmpQrl zWx{=-Z5DYjh+iOD$TM17-!@k?^_H#TRuUJj#66SeXI|-DY>T#;oWlK?`%MgrIbwZ% zwMJ|Q--Yyx4Wd5W7uFdLSkC^|vG@HcD;u1}FbKcJSq!TSw+faZ4(GFs$KP{anbTMx zzpi@Mds06dodZ5h!5F^*#&|w@-qaud0yU_*7IZ%Y=mfp-*W%x0ub6*n%Gg;&?9JDDDRSQuJG%;Y zwke}HvN~cf)VkbR2|RFN{z8e1QkEV|O_SINYWym{&a2!s#4u>^XNk`>6ZvT7IJ7S| z2Y!v#&*SrUu5ml?vTA?lC-A)x_s+!iUvz9;G4m0WbI#OIYn&r+Suj?79sbUk!;$GD z4cA8n{BixRyJor?9+HaiR*4VXf-`$WJlDihK26z~+5@tho2!TOjQ0nL@iMly)wed{ zBj+Q`fW`f^WZZ+XWff2E2rgp%jH6Sd%`9*BOJ0D_)31ND@TlRhR%@jb_IP{nR@Hh7 z_%QXkxGOQkw>mn<^bnm^rt0~*SGRb#m^>hRu66!572rSoUHDDAa+cp_m^aMRXZD-) zH)+k!Fspc>$PCZv^4vo?ZO2E31H@v7O@Af%1bFV)1OC_aUrjCUcF)!#UYNf` zV%oIJS7%xOT<)xZEcGf{8~tEmu6bWig+IHd!j$A)6Y zkbd?#39d`d9@T&E*3#OPq3%4zfBYoe>=42x`Oz7td z+4FYLjU6&J&fh0}k>HRqz#-%yI<53hUoRezcrW+)>ePgUZF)`g{GXubS#zT0ZD%64 zz7Ml4^d7b;v@x8GQ$jUEO0H3{VDxZT61tsO4&Nk@%eWIS5POM87%@Anewwbmf5^y z>=D~q~ zqW`&{oP);a8iwn1&Db;eZpP-g4|@HLkJjC_wYxRhb&^;8JMyYvxJvOYQu(0$ zxVf4v*bs4jsN3de6MPYW#Eckib1~7@_#IDR9wK?;i4Dk^!_N@UzlJEP6J z8yF5Zv0`F2^?9%IE$1!V4bNa@nOYNj9BQ88_fxr1yu0U9&x?K_{$XFg{;hidf1+D{ zf^O;LPBr-R#DuTDgIE4|ETI(E6eL%iv2B17DF@Vd|m>hL%rkmA}fw`Zkqx?+#$O?-Kl(eTt76jLIAV z{V59cF7Qj}eQPWX78yPt`+su+pD)kbm_|it=Yt;yK6!qZ`k^8Iuc`UjlD|9)*=eJX=;z;x#YqIYP9(WIUU@dAawa+^#tzwK*Ad@xOT9MD&ux6ckNw<_u zN>8%fO&QxaL5}NL_$}gC_J``c)s)cIJlq9-41Ld&Gj`4_xkt3E*^_FJy&|q2Uz(SF zJ?v>sHY?{B0ekdnEjHZ0oXw=;7~Rs{Ost7DV_IJ|=0243#XeF@ zzLlyE{2zMj{^2POu`lqu?C;i?c@F$R9XA;7sa{3;eY;)Dg?>ZM#tg?r|r-S`nfSMCse@INLV+d-k ze1yYWsT{#fy!R>L?Pi{Pi=c%$uZ+QTJ@02(r?6;lH=YkwA%`G+W?!~S zARoK7=46Ox`GUwPVeF~@U%^-SDen#BT>9c3I3Ij`o^wyI=XgiG67khPc_)aTp?%ry z4mGiYN$HzR-2SnY<$in{^Mbi2#LsQA*O}bem8mNY&x2Z*Ik#2KMh5N;gH^~!ty>*JU~8e{rQc)#qixCs|T{_*yMvIA)d@LOCOE=^V3W6*)DJS@#eag zv$s53R;o+!Dj&{1VzAll(C+hA=*DrlCgo=u?46F;@) zS*ckmtq)f59i-_4?FRFR*Z$KBd%`Fli|0!IE+@$OiWUP2# z_z&50ex5Tcd7qR$wN|p{6fLgXmgqkk3N~B)zV0aAVQ{`$E1d77EiP@!{7d!$UvfGW zjxsX;esQgQ7e0=6aU%9LI-G2J*}6sdnY& z>oVxVV=+JUD#M34HI*`FuutJvrl%ls$H`t*;|E?!Mxxy4gQ>8RCpMVjybI=u2KsfNSmT<+41r5#;5LF*11f_Z8m{Bi06xE?L7B< z6Hi#+zAhMpGXGuhote|2)+%m16P(XFKl``fZ>7)dZC>p+icVn6@UYxrIc@8|D6Es7 z4hL9haqxTbsh@{W-7Q)oHn;iI$`(zTKbCT%j@PzmYgv~BOH7YjLu_X{*E*X7Px3zd zl&Sn_Gk7@Pj;-$#qv%q{KeuJS5&gq6xZU~G@Q8j|RJpk?uy6Y^PfPCxz06wAa`b&t z;*#Bfn9`C&Kjy&D)_yz=j(y5WCBFMa{w19Y_G+?+OC0+!oa;N&iv&|qpYL|lqHoDb z)du}Ow5@G%eYIBh?)Bp9BE!T9YOT)BTF1s4hq}Ki)3e^Pxq^<>fO}+*sR3J?UTg5r z{Mgpvm*GFU4x~@o_M~&pGS5Eus(--!f&8Q1X$xk2^Y1sp?l;6rU(x1XlfK4W|B6KJ z2HZH}7o(U6u~~br8Gjpr>(CbOK)oxm3T0zY>U2~4G|ru1>NmbZ?W?v0)xh&w2X@HZ zW@3zEBg;S55L+IV%e{#v9y_^cZOuUNUGrHet22G8PpZ?^z_+RffORtZysI_y8Z#?7 zw?fBqFG*iwo;@!0>v2!oWE(xrTYhZH_MY_3PZ9n08$5Bn|GHr5<-pQo(v}~Ly=JV7 zW3O37xI)g$n>a74-PMM}fqN+D>rhM75v?rs-8k;!&I^U~2**n?vqN=sRA+a5QyR$PL6)3&FQ z^E!NhErCFVwNP8rwv!jps~>Z5-?m&L0E|QD3RGdcPM37YY94JFSjRGBMI;JXPlq;_MU8aR2G^ zrt?L?42=DfXHwt)JGpnvtO~W}dAtpM8Mf!tPuYIq1toqz>f1qS&PJDgsO;FfM))o& zQIGLs;Tsc^*_E?-z&`0AqFXM2aL`}YKFj))<#@azbB5d}pKD##_Gx0ysmUYkDB3*x zTHnqTh=VucU*Ud`$^}1(>Ursb`)rk(Wai8Ui5SS}_nhM+0x&M^-z&~JvUc;P3?iFooL9k_ut@eGV#V$sqduM;6})2 zF8f!@vz=D?T%I*@=jvM48*-L^zzK3Cn zJkH3(te+*(dcl*7^K>lhXn1AcMg17D$KP;2H~RMavm^dp%??v*Q!V;>TjGPquqj-ljxT41dm3;WNfp zYF%t&@cf;{I}H!Uy`kk;=!|+-ea0h5DrKpb^5b?kHQ0;`Y1?#JVvgRh?8Sm@C2DGolxzBn()mnY`1gA?0yG}$L@@v6qJAl)A2fcM%)Y+QfYHH4}C|+S^jz{iM zqQ~08FBpp%Tbg&`z0`ZACUA>8MmW}RH_oHEM@?+OPo>3PLw|bjMDGC0VgC_pQfp$@ za?p(`EWw!nK}U1Npng8GxxAfDgW=5lTXuuU{ES<>Aku1aNV}k&;d%RGVK{oX%bgi` zM~4cB3~&7I1Yh4j6SKK%B3n1oD@dC@rWc|YOdSztH)t&Vi-Ntks^T=`qp|K$@4s5B z{crF`iLX5p2C03vy;T_uK5&-y+(Lt5@(|=8=ugtYOVC@vB5=x zPk6>Z3qLb8c;AHINluWy*apm>()*y+Y9Au^zk&}LZyB1pvW0ryD(8pn52nxYhtfPs z&a0|%CQ026KhIi39WVMUvbgk^*w)f8PozIHxIq3Q6^ou#wEdWiF{51D>p4Z+LtPzS zE_G1MaUfzSXC#F)!k$n*3(x*E_ZEpiaDA{~`^dI?dqqExo3~$R<7}JU&GLE3e=s>U z+4L2DnBZeyn3&nIGQZNC!JRk(+E&InTU%HiT`RIw16jJqy~o79HiAJ)*9H%a-ZwK4 zcf&{H-#MEsRY)1mik+yG)Nz|aYb%Ez0b8Dq&-a5~irkk48~hPINbgcV$f>ZWYOS!7 zTC1GqKv&J6$5-JGzAf*1HGF}Oa@%re@S6DhwA50g=c&6iUX9#;$)5icd;UxBmqvdQ zH)!5aDB7b#&1y~g-;0`UTW8CDQjM>`2__ie8tj!?t9x#nyH|AYJ-E@qkaNZ} zM?mQ36l`vheIHtHN3N|2|1xWR{G5}MxDEC2^TA!EUOCQEv9Y5g5;@|1-hPo2Y=id= za#j4@Z?Qk*hu3ki!HHSkEgY3srEaWCjg5wuTk~ z3Vx7XZT#z?&`M(UXX7ToeJ$^ZIkGO8|4zJg9I&xktGLQO%%`CI5RauYww~=fa4+j~ z)IQr$bQ*QS==eiZXVu^~m_D7SF*BWh6LD8Xc&y0qF?cU0q)sri)jDLxNxqwSxP5|$ zvo6KBnL5kM6KAKo)aP{xFyXSm_E5}C&o!|Q#;CR3QES+pqbni9zY`4e0`}^WqT;UP z@0OLBn3Wgjh8zE=Thy+YhUR4+wolr|$|}Nd1t))ld#Eke;C#`>&1ha-u=6WNCGtD7 zP#3Ln=DqRVf|nRK_=oq2;e23ScYEyBPTbETe=R(qJdG#&d0C--PAX-j%hr z5SUdhdEueR3)dui2gc^c3LfAYS%+R)tExo;A1IU1AixcH0Gljhm3RgnY@2Z*5)R<=Z{zZ3ozu~bZF|D zhWkf}&%!g?Cv%4J-Ik>6jI*Z9vpVltJ~Y10EF|`=o6hQDyv~sWD)Ww#Gcw=yer&hOVynGX`t5&3z&3&!OjI z)NW}!LqAK~R<$m3R^ef~gmz9=pY(Nt0VV(gOm-}0JGsExC&l^08P*z0gk`oS9CP7K zOoQ{&wO=-+6!)P2g}K1yo+I}HiT4hMEuLDKZgNtiGryMo;hAcin<+YZ25fgPZ&axd zy2^PY^D`4aj9fdbbWC7YUjFfheGTG#eGks@IMo*ev zR6nbH+iOlit##QECPqFJR#GE=#)hbr`P|D1gs0-4vH#sx8Bm-S4 zM-@kzIM|;Z6?4nOm%pp{iqsf0r`a{t)!<3aEh3g^k9X7^_fOs}-hZETe|hiy@ZQ_! zI!exk*mZe+d0zW6^}gj9I}un&e|KzQi?J`v|LS+w=-K$san5lj$9HM&QZtKfOZsz} zD^337kvSVzpOK#{cE1*O|KH&4*R?2fGuHR1i7a;FOi7L9I(wZQr9F z8Bda50KR4If!G4nX{^8r(70uN%I5d?hU*1O?7$v=ko^EUN9k3yCN^M?aDwkEde!)V z$K;R6YdJsPx17dbq4q{%O{l$5YlSn{WG5mfthg>&f2i+sWJ0g@DfTuw5yaw5d|*dj z)wTgNmw)Pg>gnHY^qzujgie3x|6$%P!xPdq2u*+P64%y+KIA{->+dcL?5rj7r|CR+ zd)R%Q+dbbo-`G>NR`#@Q?px8%I}vw10{^tm+3l+H^1bUgee>)`#{3^(s%qpTs2{F@ z?5Q<`0smbbju-vII1f44DYs8UR*xuahrL2f5(lFR*#nIesw2xuxGb=-*3Wf42Ci8j z-4DG%j9TVgot-T4fftagU0<{{rnvwYK ze-H$J6|+2u{n|kvK9HX-XXj>|oj%~`*0TLwFy7Soed~WK{2QF*aV+d0_x5<`$;H?= zITv^?&hXOju64e(@i#*-Y4W#dy4l~vydL|ThWo<}w{|bj`ib-(_1PrbOUy#n&-l{+sTM9jhTt+Ox2 z&YNrSmCTHVjwK(9ey)+B?FVGdmDZCd`X`!wn-bfeow~rzHJgyPGInkHS`)XqA-=)P zk%`XxoJ<00mXat)`%Il<{EIzenldI<1~+c&Yi9bSt*q8M56S0? zz}3@JwGsp5tR=?%v>d9n(k&aJ4ThI;p)=0R;jQ;Oh)lMJ%=Av!(5rG2MYgX2_C5`> zW%W6lRkSrK?624Qc5lYc`nfTY+iLK-nx5`Y(T}6?^Ao`nf!3Lou-DXS^r`z46rToV z>4)$G!TIzf_DfGk=p2H)vBy@&?Qbqx`+gu)Gn?9Aua==pTz_VD!Okh*%v{P9w%-|$ z9gx*Hlk>>*JK9{>T*?o2shk}xjdbnS>eOFkpZSg!1KaZ~*FbOd4<1*w7TEuLqSqu} zMnCWW?Hs*hzpypuG|7voq&7%HfjT7}}W6t8YPVSWw54-~Q;;1z3i;|zel(^0i zdn~7ap)pnDro|`SgU`1qJKW&>fhC*O4!-J`#4O7f+!u_$44WnAZWYemXp0C#Gp2>%=v3IJNGCY&h3O0whBx)x< zNF}bx?`j=8p;*eRqSl3daI|a0#@_`yjGxjc-A-`(QP5Xj&NHE?ft2-am$}Q#zRizS?>XNo`7vsFZ@^}ML%p|tFPv+C zeo0q1__i<4&-=z69agZtRI^Lmr*pBnD2GS0i9l^^o|>v*YJ<2vBfJ?J_npGA&M+7WVWc8$(Ax@%1S zN%29Ndw07v@U6V{N#7{CWeVQKi-@lhW7OlGYqBlHMnlXUV$0v)85w7o>qv?2OB2!2d=)b_V{BGlq2RbaR4ld|+5D@0Ylu zxfSDhD#uh2+J2B6xFGcVJu$)W&Djv@J$~M-*2>p73RMx>CaSg44^i6KUqu*>wDXqR)5<-~Y5dJPydM0XGVo`}m;c$FsRyeoS^Fnkl<^^X5f-_9>yj_b3I zD~mbT#IAT-&O?ZI@tTj~c{$IQ=XV(Xm(AhklI`nK*$rnz$H6-0JC<^19(dqwtr~j} z_k8{5@`~Q3*wl*P{D6v7>vU;E{ zt)ph3UPAkrv;A5#o4DRrx{eOXX2-_6IGaq@jH$KKlhx77$dQ2?0eh>~D(+G5FBQHB z%5!7E^1*KPZLNN-Q>w9F+1xZT8fj)hj?5{JvWtOXzRG+pu~6RsCd7Yqj+ML$T8C7G zmLvC~=py5jK9T6NV@=mBkV*DmGjp zj#?|7GbaCr;L?9U1}-QL7yUrH^RfG}tIyYM>Dx@4r%r0o6%YL3v7PlvA_6?7&x@Sez)y78Ojfu37qf|-Vo)s9K2YkNgoGw=231t zor6P-tKy*|PNv?YY*6oAm6%Jyd!QbmFUdIPWc+{XlX0k3)^?#L`?T22MK~9nPp9Lw z4-_6SJgWy$1Hk(v)`DA*Ey;P4T9-L%dR01ipuSq4{U`E`(oYI_=o}u_mXl|ab3+am zZ13k#%oyT%ybd3#$>t>PnuYv4S>m608qdYqG5VTnt@O!h(P>6z4uZQ|a~GT#Sy}BB z^fGnSYF*}hi2Hf2@RFQ;;@&rND-G`rXLo8jQEMe9v%wQv(&6PFC+fQ%OIiNIb%lSK zYm&=?y1f}(76UQ^48FQFeWmo9T!*@>Q=(rAKB2t5fnhqi%D&KckIA1Q{`;}F zR;I@1-xu6P8?h{~xZ;QKIl(8)e|?s~oV)W^AkD1o8vCh<@t7-lGdsNG*E{7=&c?@x zsYc*4)H&&V!PNH5D)u(@LeFAP^mA=Y#Mur{^!|`nO`oF;&ez5lo}8Eg#2z&5ckJ=^ z_&+QC?qSgolfPh3&G3@Wxg>Ro%sk@h=?z^(IpqGVE({UOz&*Jlx+2oHAcguy%5#YN zM#{fFzmsy4%uLe5W6LK7-ltLxWEb?gpDVs0uNeobUXH)@j8|o5j=js_48#euA&g#2No%!bhn0 zH;7GK56n5tJqNZ``Q{DruT^~}@a@^IWAeYfLpu{^R?#)_#+vMAx&9_xzah3Y$@gaO zHGXmTY{sF0KCeFMjC?+g&$E_N??YXt&YXAV zf;Apc>oR8*_W9OuqU21gu$}-8Os(@jEZ80{)-2Ia}+IXwZFQQyGO5mZ0A>YjgB$+pZCLiCjRM#ZUg0uu|MK_+5bJ*{|6KArAP5Z$!pN2 zf8l;1*pl-#o=o)k)MV|PpfiFq;JYcDuhvSJj!yWqJ&Tobc6x&HwH~?}`4cALAb}3svbTwN^Ols@zpMjT0LDt3*#;3IFun%)7=6J5chJL$S)4P#3(cGLqd-SEH6s=cB(Ud||k5)LK1bjo(hV0`Q8Qp81|8 z&(bciGZ_bGUuns`x(N1tTcXbS$@G)PH~Bm<`Ee! zV*8?<34T*}v*;7nHEjvk3T~(G*(YslT6!0MDRSaeIYCv?`stBtXYl<4IS9(t571+A zpztsXCrfLEhp&XJY8hCPvb>`^ij3DOTQE7pn5~kf$h}a`&S;z+ay{`gJTD)Hw$GZg z9ksov4wZaz#@U~9pGusW{@`AGUh9*Oa+`DX;rih|KMXz;zksn9wN_YYQ=;#_-nZQQ zDdcK-Z^UeTcU%)^HfJvoe9n00vcSgcy5~E~XNW^M-;HuYyWA7A_VoR%$*(cK|EQwv zTdc|2*+UN_9-`#DrGr#}sp(Z~bw=b2H$vM{ zmQ{W_3O3=t*ttK9;cH)MbfRA9eBbscRmQCacOkYGEKe&NNTZb8q7;&Pd9y{+0kK!tMm8y-{-Yl zogP^(&75cF;BY_rUDoZp^*RY#n!-Oe7lK4N{|$N1L@ zpP7jbx-3#POZ1nwgj>Sy_&a_7Rq_AuT-ZU2SqwJDu&grtGJ4Q)qKQkRPe# zz&<;voQ(tQb}i?B+Dn_ce&k!2g#G0HEDP)`n~iyP*C~5c?@yCBKW4tSXz-sBe*u^G zj))c47VXsb1Sfw@wwqwiu6UL{Xt2hEUOQ>R=Eu6_> z<5;_haf^oE@+B~V>G%8ZyyB_Y08F?h`&Uz!bybuS8v#6DIWIfU#9hBFTEB8WV!4#b zGjVI2o1m|GYr*y@42lPtUbC94t)V3kJY|D+L9LaJogWX8n&CH4dwj4E$iC61*o4}6 zo+|p#-3u{|E}I$Zk?W} zXM4S<=8my;qIGHR=V6HTrAx5_-cLhpaa}|4LL=vsQr!e!aZcqm@dVwA(Q&*tUSfcJ zUbR-wyC%Cvuu5OtKjV!S)Bf9>&A!FHhI8QZ=yKz`T_W{Vs_vKE&h+ER?fh(sTmE;z zb>wPjU6Rj#WdEUKAkAv6xHp+=z5@HeT=Tt{^~U$Yd?I)u#HXgsCI7j`w44)t4n70* z0}h#bl{d$pd>?)v&c$CLO3uRcLW85aWk;I&ikhsQjsB7Isq8;(_d~v_TZZcceiDme zUdX*r@0Q)~6^Scj(V*N$MP;2dJS!^0yDj;ao;MQ=M! zrSlm2n6zCu-#_1Q#vUH$Bu7TwwJ~q);4IX}Ypna*z|IbiT+5lT)IHPG2+@bqXYjZL zk4kf^Ux{uUfz9oZ>1^usYMdjCUTu?Y13L(Pg?OD>!}qzg66f0b8r9KDB9pHpmlwHD z7{9o-*vjxi4@>m!`DIGCWFaVOt?bvp@JsW&y>p5ymAR^m!M>odbW8B5wvxS~Ze$Eu z$77o?k4F0upQda~^1)!f+5ejC@xZ01*?^q1EmjJy=6e~7y7~+8_wDf4K1XbX&$|(N zyT-3EoXlUfsy2C<%RQS1Kf7q{6l1EIqvjjbm}zWqR&j)p^Ml}lp)IC7k4wyTeLP-g z>W!PSP1$+)40YF~xhqUe?eK1MmGLGy7mt>J!MhvR}W?{oZgt zo((S0srWm6e@FOWL#Gwqms%@aJwH3&;9Ip;@;n5y6g7Sr=8|_^)mlgH(}Ix}0lTKb z;Y0mEJX7OrG&-tlWO=-&pg)VX;*_N?3S*@n`<}}VG*9=Z`>pw1V5A`ljY_0EYNlTRr2(b+Z3k{Gr zmDgaNSNn0_VP+70OqgQiUT+oo;cUb&vqMXLF+H67(l+nbJNTvg40=f(%0Fc4Hm4P) z6|^4s8Z(g@H>S;VZdQcZiLqKXokds*VY$wZbRw<4Rg@EQxGy zavz*K<|X-FcE&$5`PqL5Hox{n-qv8REB?#mBeo$&#&@~{b`vvPU?0^y%`t(E19y$i zHMV0+P-S>~_J;qHUe0S_>ua)~OWcq9(A3J}jjjGR$!StQ>`cT|BXACP#QsyapHS#6 zoIE^(o1K0}=WGiYZ)dE#OAF!_t&?XWH>%?jYAx@ja#7(4)qjNk*%g?P$ItV3YZ7yH zIWJZ3;lpY5?9ZU?Zn85?&NAcYZSt4uc(T_c-NV?&4gLmGb5#*q9D9G}0mC!!&*;-A z!0)o&^$YYFQJ$~IJ+Nk#Yt~H8&wgk2f4{#{_Lj0eq^wNikYg_hF9@{{NWMp{Z+jHq z)jTAq4O3X+30(gs@J(r*FrhG^pzBYz1$-8s@s-WY`L@A55TedOu1)XHy7VfU^GhGI zZ`#I-j*o2baG&%%$&t;4oOI1Jicho#0HQ<2&N{gwx>9f;bvXS#eHPx$ziVn0>isol z&Q#<+D%V_qYrcT~O06fWbJZrM{YFOh;}B0S4tE*cbz5+osasg$UMw*ap2v;OAc>!U zA@AMt1Cw`4W47(iDA+-jYh&I}#ji4$tzdI5{|RmXep#Wc&=dPcefW&`yy#UvBWq)L zc4)u41;;C$gZKDVD;tv;;o0@&j*S8CL`Q;t-mbxT!^7Vm-0b{2Z4LV|HU3%TGk>K1 z&Kdybr1&1=oYf&m7nDw;9$Vqq`2vq)P9N>Lk5w&nCQ3H9B z`K@*6L)Yh}!n3tfGcXrJ#}*!ne<|meKJS@Pg^9iNNnaxN=wjHT)+dou&@8TyhBMGr~rXc#`fExW_`M1S)B zgvhaaUuv!NXLWQ|;@)hH;@9~jMSi$%=auR-hC#M3_iX%pac;4(-A6gsi@(Ot_eop- zw@r3~=qSNLdE1vtzl?f}@~PI!jt_IsmA@0W- z?O4^E;2tUmXKnoe>m{_ztk0~^Xg#n8{EEa{KS0T@!JIY91M&R##qW)s-PmfQnbrHV zOoiE#TF3Hl)MSUtI~|61I@BF%W{}NJtDd+!pi9+S^~Bv9PBFebd$lw_#tY#K#?LLZ zwtWr9`*zR!rmgRAZR%Qsd1e-`!ab<7@OheeSj}CUm7kT@n51p)c#-Yyc#mU&ZM3|- z1HKV08)~g&qt;RNkOzP{QPC^FUHUmR#+Rs)60LfQ9R;bMbJXJ>9RcBfat>T2>h z>3Ub}a#X)0W&5^bgXzIJ zy5z$i3m^9DR$m+WY4C3ldB(@R+0lH#b;QQI;$5+p$*HMj20M`lPs=UyVpH&0V&jov z+Q?5$^i`m1Gwwpa5BHhzZO*OG*E~GDS#o)-2LLt}Sse&jja<**lbWop}1wimtu_K45R z_yg^W`tBU$cUV_k?yzrVTY5mr)?>bH@l?6b>rSX_QA`(&t^cUR2|!)clsPDTKFpi< z#P#+4=M%A@n(XUhAD81rK8_hB3h(V}R%?+BhjaaOeEx>GgQ<1A!@I+9K{v#mrM8^D z&%g7QpLvOE_liDOU+5h2XHH4OGTs7blrwkCoqrVKi*(%milc*JcDg76NZ5UtGXH%`!*<=kc|4u!8LV+=*DzGb1 z&X<~eL4BzYtIH|Q&@;WWq#l6!lYK6FuNaHa_jY-Lqk#M*8Viw&K+9_TxV?$Fodyml z%He%@1&Dc?*dXH=I-Wxv#W=$u?B}+u)sxeMI|O_1{*MVRmKew|$UoAL62pgxfivVQ zgCW0aRby(04g{0rJ)Vir{4V@mH~{xB6YJfs#TAiz1nMe7=Wx^>e3kji+|TpTX%d6t zJ(C|m``5!0b2jUOne_d6!A+&;7Nw#Q+4B6cx7s1qDW{PRZY4a1jsR$L>$MLC}x zjgik#pA5x6jeExy#~KcqrmW2$5%cRkUmX0;#6y0ISWr~S9u}CL9G?;{Wwt% zd=_e@hzDrz$VsT}qgpHbxVx3*4|&IHmO3u-pynbwSF3kWXXY9(o_QUv$awp9r=`S@ z`R;bcHYU6+*k<bHLBe(53nJTUwbnIkflShN127viGy&A-Ea`rz=Ro4|b zCB8w%htG_T5}Dz-u5&LF`!ybaZ^~QlkwfWpM%%>mT*ZNQJl;F|0&c=Hj$EyBOd^N< zobr3aLBUT=a+)I})nhUSHl=TR zx72Si$9ZMpO3B^aQe6p5rE0paH~}+K6Wq@Ii?-jVL*};<6Q-^hTXh^qI4A#9qy1?+}^)9Xfo>#I;--P#G z?mShl){uW-r;pKpr}?{TvbOhdQhJ=J!TvF}IhUH~QgGDpJg#hhGxw&6jc;+^lOF$O z)bFK&+q8X0-JRvb-HbR96y zPE1MFKJR(?!KVI=b9MFp>~y-DJn2j6myBK->x?ye_2`1lyYPx=vOAxE;rXRm2+#N2kPpSJ+tf~(l+jt=oHi6)Z~oM==vqOw>--`&Cj)Mw@a;%z1X@&T{0$>wVR`%`h*yo|8|<_edfj*GUV5}(-z&KZrpx1{GAjxxqfhT$`enS2)5eB}}GTEVwG zUsEF6=e`q@hqdfY%GqAdDY4}!nCn)E{%HsOQ}5fp_*dLl%rk!9%IXBhX?6U3sk=;K z$h0pVGAm4+e1&7{`QOO2Q8fd2?|T#6I78k3<{fSKEO$pY6_IaL?6R?Kyi4i2;a1Ho5<2VurJXBO-KeV@?(`0kw~Ynl!X?63Sk$go-~tgSFktZ za&_P=nuY5SFSSk|X7bec6>W~S7q~~X{_mULW$X?)0f=KAM9$W`>x~b!Gycr@R#mAg zgEJ?k&XgP$WuCRlTKCqYpHaWx6~&c;J%%BNa(^_d$UWpQEDMI1{K5s{P?JAxn`A5HpH}bEO({b%lHnp=%&(opf0d+VCortKWfdVnhBXn=QX$U;smc$+uTmUOXMtS z@3;5$cL!uoH~QftXRFEW4k!*VHu|-q)$Qcm(>~zsG9z2ba9_8td0$R&&~SG=pL@%2 z1Ab9>(Da_rm*jb2-e0ZN{-hK0)G(i2bSC4{_5PF5IDDQy;8AJY?=}#8q_o}48LcYK zi(wtbGv14M7mTfyp(pldB0p_lM`pOT&n|W+mE^6;IWu>T$%oD=ZZ-1O0+q!2+zs`A zP<^S4?!eI-6mofEm0at13954k;cyXhl{GLhI^o~hHL(-G59vhiVIxQTmDO)WO~ zpEW`Xo6Q7gn#Hk?Ag@Gyy8zdz$3Lxe8WT0@UC}4SzvIX{pG7yC_(?6Y_Ep?j*u;6L zJJJ|ny>m!x8GRYXcC@W&@NG>+hxiil@rlQ#A@-~7Lbu=-X0})8=0%oxojc-h3_d)R zK9nAW`=Q;LnzDUrP5GfF4mKlogJ7ZSVMl12cyG)*bjMt2{afUs=bl`L>!`JQcL&f9 zsQ2Mu>Y$0S*SSxc{fyiLB0o)d_SNxfgYkMsBSfE9VXwx;A+1opCwdGv99pFxAze4eHVE=o%^ve`B7#Qv~^`cR1 z`^`5eIPR`5+48jp^Ag<=QVh&$B&T6`rlbobS#T9LpZ7OYl$2e^cf@kzwM8>snoBV*bwucAoX3 z5&$BOsz8LTAft=0tzZ<@5^5&mpEw;qWT*269BTunB!Rh)!PVw+i4}21QB4>xa zC)0!J!mZI4zq>qtb4h-xz@=<^G4}h4CylmvWqPHF$@eI#x`Gp7TWgC4<(*dHI^AKH zGmy3_#AgnM2g9-QR*rSnJIAYDEj)V;BrklYJR_*_FnuL&WNiP=LGSNI_SWQW?5=C1 zW>L|n*nl1`eRi(NUt@4GYC(b9LuVo0OO3DUeu=eKIJQ=e9Gf~WS{?mO&JpcwkLYi5 zKjc|jfSG{A59H2TXxwqqbmsYDNZ*Ql%b zUt`d~w!^XW8d!g*u}7V|0{f}X!lHuBt*lMiIM34J9|TtedzUYD6(14rjhyfrQ+3E# z?$FMK&X6(UsHSGM#y+%%FC6YI$!!ns#B_zq3!rYQ-oMej)5*b&h7;r6%w(CB$-SC@ zS>7T)_&j;BG@emwWfNbCpNl);S!Uq#Yf~zIi=!ZZqJG!pA=EmpCfg|XcMa_CZrAb^ zA9S0=rn9DEN<5{+u`>sJlD{>)@juJhI38;+bzW&|s+*~8n_t`@@?k##R1-)12syZ3& zbN58NcW^M+_%*#l%is9Ew^rd*(W~>s*3X46v!mG2>@(&T$$Q}$pW;sxU!HbwwQpl| zs|&w2IC-;UIfOq#e1>}9GkktR{x!qxNuEQ!xAp$xCN|jUjTB#xzje9SWX{6)L@&Re z=*`*SerY(YSpTVOb;#ePu@IO*O)WaPosAEhs6icqStNXqoJF!IYx#tu5A>EGHE82{b-Ec(p!B>oxv63Rx;1SYXP?fS!-AH`qz0scadxJNt>&qetme}%5MX`B0n$XGAP*gLuPau&XTtiI#f+7IUbbgzV3 zmpPmdf_y|NSK>LNl3>hezw`-LB9A~C8FVPoy z5P2URH@G}e|Mr!{pag3Lo!m}tXUYcl@YMXNy1ukYt;?KM04oahs=-X z$NIc%aj%d$xy{HsO!0{;RBzEqsgq1kP*uuuow0sTpRcQOH6{^?9syT z0U~t!V8|2kf`{!|*^!>HPEFzvOym*ICuhL%@ntACt{eUWQL>+`jVd6%rE*D*u2E^`XK;L{aG z2*&uh3^@`1L-QU_&-TsgI1*=<@E)K}0``PzdkXGfbMDwDuCK4wWll$@gEK#7Pa<_f zQ}f}mooRSPyi*_72TYA5?Zn{`=qnW?uqA8`Y{hkMYssO5Z1bfby)K2iQex&Hf~ zF}qypw>g+Gy;l12@Or_KZfDNUD%yQ}JDzFslH-atr@1+STc)9|jB;`dY|v8l66*8# zd}41eN1TehG}ZX6PVN;Fi#P*%X}mX4<0Jj(SekYp!LGr>rl$AU z;O4!ncf zX8m5~6n>KDA_m?Q?J@Da)615$?2qqK&)gB)+OXk}6Rle~mzMi~OHa;HSu5v)J|=mj zwa!#)e5ShGImSoiw_G11O(Zif| z(k`&qFY}pySFyXH@o3bWl{>5{ZA#=EJC-SIh6^}TyvY)$qAq$ne%o*xt}FZ``*sF? zw>p|)>IvKB+ZpcVy(Mmces^8g&g@tgtTuiV^DJ6-RifTc-YNXPhFHzvr62SOYCrV5 z9vRLs7=E&IkI4o6Kc=oUK#JmQ_rNmUJ<~JO)6<|RvI~l`tKm>QNIp44K}AII01O%y zQ4HCD;ECt5fJ#Kf)o^&=nT;mmfon9bqN1`IG)7H4q6h>rq9_3s&;|E5kT*_`k3u^uwr6&kk++8@`dFTZ-Vu5aT{~MnyQsLx^tO5y@`wI#`nXm( ztjZo&(XZWD^sPPZ?&Gs{~p(b}1^qQiX@u987ApP^q zsf*QG>0{lpXH-vke)p2t#%nG~_)!NG?W~+l(I(TM?T5Hc z{3oRI{mQkj>;n+ztzG$U_FuAp<_V1PzftiZ$cpd6?~Dyz8!6j-1dNkM0xK&xPm1S! z2JUfpB6jve8A~(Qmwlc!Zfp#?NxmZaH%7t&$cmK1IrJ|i@)$Rwl1byGmvgEXo;KIg z_)Zg#*qv57?nm(WHF=v`cxj3DtnwjDDA*pJd&73gAz{3DS*&u~Sbwe7kgxy>cV+J~ z^U-dLEEbwunrmiq&B$9`cszLA*c!Ewt?OsM3yl@&lh?ZGKGfP%FEDO6Iv#Ce9H04i zuH4h*eh8E~wb2Bzk$D%3Gs`5tPuxZQsCj>Yw@ZALl%LO(t}y}zv#%=O8YImWJcoWBo)2R#XO*AxROYFSKF_}) zBVN<$VsEb4%X5HL@;P1Gb+LD7Y-@_g6&IK@8HJhheEwPD3$pc;e~kaRC-AVAnG;a&sbj?5qqB-SM$;7hQN<;Z z8?e?NBl|xc``;7HGBK2{v9;xIE8J%61=5wq1N0$i?5fs^hFANqnw;BwWcRbl-DGlK zA5HdoOD`~fr*-~1BL@cOh6!e)9rUZ%);P>7*9aelcfUQ~$Mn#i7&V#Pp;oU|@EhX` z-v#!&UpUrwu5oLO%^T-!JeqU5HCE@0Y280Ca%;r@Rt-$`4(bcE40$bU>ERp9$5Fbh z9-S{NpZ0fuCYWdJn!$)Ej8GU7cfAFJ3AD^V3_Z9sPc1+{ZT_8j6*GE_Po`gdv(eql z3(E_-AL$<8Sn>sJ)eHQK%=tfN;8l~j7XHX1A#fc&f0iciOe z*3Z1AU~|lxU@s^h>|J%1*UQ)%OB48nwg37I@Atn2ZdX35E6`_^^iMqSTDHaX!$02X zCOUe5*sZ?}ZH_T}?x}N5Ilt(jYQ5{RPtN+$bl8@C1G+%fm`CtT>+?S!n3?qdKiC3~ zWxh`R9DBg4JG~OV+&-c5$uMTk8c$8nYMpZ4$LEg-j|esIH~Vi(4pMK_5j3G5oI2yHsr z_)lqpsg0_RT3}x&jO~;hgC97bMenUo!Pbv2NyOT2a32D1hR7*a_M`TzOhG?JZLcAH z!1PfW8NO%oUUr3+PWq#_gU%VwLv9EK;{_Un&y6pAO}P#oJ!f#IHh(4$%%J(Vd(gwk zsMh>aqrWP{*M)vsK|gglo99_Tjs#_RJ>HwV29_(5l_09Gb zKM(0-Z5f}u1v;c}Q}fGPuIz!rzU}bx7IfJsY}d zS}@Jz7&rUYA3iV9V`rXsgXB>R!?}Hx`O3tsS2?yPXPmdQ>h^bS4ai05i%d*^MDA-7 zv*?qE4>qQ4FQ6Tz-DR5epo7@=SlN%PO}GJT`YJh-TFa9-*jIG!Vg0H)@Gi9cL|p)4 zQVPc&n5ZjkF6Yn^OK&R#Ba%Sp!}rIU-~9x zSDJdjy4)hkle`r|za{=a`0kg`9p5K%rRdYp_Pbg`U$lR8@z&V(v)bs`nZ?ciM$>cb zf#7BFzi|(n-1Cj^x+QKg_AldQIxeZ!DlYkPBG0WZcb~|Idm$gz;h(1SU;4lFwH%mP zm{<0@@?8RhAO7szBz6{BaJA1V**@o8V>>ftyKCzK`@8$7KB72t^tm$FX>Q5(S!xB& zCw~41c=jRu)BCB4zZ7~PHeL(D^43-IW;$3Fb{1>r?^sZT@}u1o^yxz zvX}$R=W99{R?eY45$B-R%CGoc_%G25w3qwEw%-e9qs#yu5(Bdrik3y)kZYmWKlwiy zzxSy0Nn(2vYt=+6#J6w+ev4RIpL1<=n8DJcyul_4PTJfYh63e{XWZ`lah~wx9FT+?@u8&(F^{{%W;Wn7;=7owRP6S-)rAf4R6pc_Apdure~X`Ay>FY)KhM9f-^pN)l?ngbq7rRG8>=ljz4rf#T9dYI@?g>`Lz%jXem*888FsE2(AcTEhr9tTaosK&HS(Mpr2$J}+z zBhxS?Q}?P}9;=#GzRR7MaY_2&`sPGE&R%b?r*li5#=Kfh&u^AgzQNnT$!e|g^Eqot z>(+(FhT^RA)q-JO#y&YeTI=*rkWVgr1b+E2{h`rut)8+?s23>PHFmuqyujq^_Qr%V z{l0Zki^y>LUOG5aMMo1e9}!vnIXJake6wfZ9b1YmMLlzEY<{f7j+s-T)>>y>XJjDt zLVuhO{fb9~#~Av5Hqk5o==f;kuV_FYHro5wgWsF|F~*Mg6qW^flXxR?Z68|B$`ro` zu+S%o8u?jiJ3F!#^{|ZHJX=jW$oefgM@-2m#>kZXUk0A7^lWVrXPOMfuQH}t=TsXT zZF|C&Sy5Oa=f-nTYjq9>l;;G|)*Iy=r~ClGb;qOTQQK$-bUMJ~>DA?WiLG=Hve=t7YFA856Tb@1c%J`&Bty7Rr^|f`m!6His;cTlD^I6#2 zP@lu_LPqzo@#xppf8XATvp~wy`R3J zjjb$;txvnss}$R_3THb$wmD84ov#c(w!zX>cSo#cXI(X>m&NCo?`~7V9>2q3Zm_Dk z-V|&yzSin!puti5Ci+Qo=9Io8wFV6w$k}}F8Q<4YX*)k1{mpSEs^)7>qQ0`pJ*R@Q zhv?1G2&S#tBuvetkHOx2D`OLFR7XKWP=*PmIfz+Xl zk2D6K8hh<~%qR6h8;t!i-&no-9M}%F2i@uDqpsse@8+GtFg)i-+uph8!zuRBZNOKrWnVL~gIiFyu5-P%#&(wa z;xhJIinHwr>r~sGHJEe9bsK*7Grx=ATl)XgLE7Xcs&&fw9G_t?eeDZkew|)(27#8( z3*nQYE~X7wpXe#EHMTbRkn{xUA;92AxBOChmnC?Y35Bi3k9WWSoy7gWMclvHw{!05 zB0KAIZ`#K4zV_`5T+Y|f{HWIC$5e;VFNqJ9@@G$*yEx)7RwZvQwMI8Sx zo{FiFH%Dh}|DyVMj^sbkek4C0i*qJFK9`>?y*(`UVrz z-d?y}@EhMnt<}3Ux;A&QG8`u~JQg(kh4)3--<5UVFMKH9Wh{O@>`I-lb-8bAE_ygU zOwT>e&>`)OfQ{MWSBd<=7Q6v6<1%!9hI5-!{GG@U%B7GR&zHqkCj699^O(9oUpyN9O&x-7Q2C}yvHN}1LF2wdD6M37>zMXG=W_YHtJAP3ZB45lz>TN}5 z!CB&5U9k4-%ABq7xvBJ{U|Q1l!^OwtuIXz%s@!AbXwX1qSSg=joU7T;Ql<(tBYes| z49cVh?_q<$)gPI-&*P=%@V?47xFOtN&cDu?Z2aMjvuM7q%Z(QQ&#Ay~^GfZVG@T46 zz6FyeL>?k|Ew*#MzR5h`X?eo>=u^tSwKFpfv!N@Tx1l!|dwg<89^-GsRSGf!J{Ja}^8rsjlGh=;ROG}mF+ayN17yfg-=Twj~SZ;P{ zcIhZQza5x?^Bk|onzA&V{REt%d?PoPY(382M4eZk1mCewyOwqAbE|2rA-Yz*Bc8_j zU;NCY$M)`U2x1vLTW|o;~a`eVB`9=$NA7yFAfom4TgU`dfn77%q@MXY!G+|UkPdj z3-R8U#f?%c0TqWF)RSSiDqX<7`kG%3fG1wteUl5<8_e8`f(CQ0P zKTaLdm|iM$@>{$k?Ml)fNDP1HTFKil3#XYpMm}dEJ_B*s{@2od5<6Jby8iwt&J<%4 z4Nm>R_(S$h_=|q;t61|=$c?&at*P@pBT>6C&pAhEemvfNS}@6+$s6T3^#|Bo5A@#A zw!rh*F(y|nK*pQ)LDe~S#`-aV?aigu;1^s{k3`?*1^)DM9;sKgPq2@Xwr`cSCF~Py4ATEgEF=@t)W=Z7}dKi>JMF$ zLIsNFypet*t$93lmWZ#6*lA6|pWid?8SB`@Azp9gi-TNUiaJonGFSt$z_+teDC-2< zfPRJ-ZLRUjpxvDF=!GYMZ2lk+2V?x*`9JQj#Gs? zpf7~qsW0x1?ly7l8O{tx)6$$oPSoE@)|Rgf?d+Zw-};T&OGL|awN~={1Ql{9*5k1eJ0nYuQk1T8eQARj59Kr@A@cm9e1bOL^e|XbN^aj%q^XX+G-^mheg98 zJx8h0RejeajkDShb8|S8g0;HuZiS!hY*Fig)YeMeo>j5$!`qotszGrTiQF3rHwL^EgYoy5%3k)ieD{oZFS zdFU*GOi*iOE6q#v!Dik4a6JDfDBVWb5%euDh8@xDA0)LZiEVfRID&iJd(kIs*@@2)ZUKZ7eOLmNvSl$h&xd*KejQHY5Itk2T64C^d3 zW*AXYIbD>)#m?4`^ewv5YM#9){i0wY>XC-*_0p$>JUc0}HrmdPJ4Ghc;~b_JrW=`g zxO;Bue7vvY3`w;lX!7CQ!^XF;DO7d4wD+rn&qOX!wjejyj#QGZfl%3xfe?OxBVAY9aaXak3D@>tP!}rOiOXt#l-b)C@Gt9o;*k40e*L5 zW~1rDa6BlLvIXZ5^ownd)_cK6@{Xj*KA0QDIN(qO@2g@J|K;D=%dQUJWiPuk(DR%; zMH;xU9QULw+7fOtSnlr7)?=RN6vT%!3eTBS{FBHQ;>pd~&(&QZmQ?3hT{FPbwOZ}% zJy6G|>v{%wDyNR;+2VgBd%z>TuATo@j%yEb&O#hqzvH%Oo2k2*91#bG4t*&jT$T4o z3L+lUvieGQvGEVDF4tSViq9W{=pSVuKi}*(MU${1#vYt{QtcnH#XFo^4gJq8`Nl4O zDv^70lsiPQI`{m2yxaI2TYQ^8vnPnmb7*Ujzi4YrD?MRymFLH!CGNm``7HgJ=?Odl zGgyf^x8m=siyOqpOFZ*cIKcQYnYXX!jC|tI)=)UGHmVmrbv^VH@_~(g%~|$Zp3g4X zIM=C(ewAm#zTk7{6W~k@;y2PNW6G3=j45-ziN;ZvI<|N5xcoR%d-ZX+-q7=$VwLHa zxHSHQ><5pmxGVi{spTQx{Uh@aL)*)c56~08%YJt)akG5)x8TRUxxHndaPO)K!O>EW zLty=Ep`XDL+g&?fZ=-VwctPcl)#X-+PJaPhYZMu(Nc1 z`kqdEO#HfA{&bNcr-ApI626GFiT+OW5S`Qa*gvWfe`Xp_9UF`_&!1cR6V6%X{Sq5c z?p=HRA;Wp6^x^PMH$`g=9X=U8BmNW0*gfIVCf|d;ag9TMi1!#e?;WaG|DkwLI+1^J z0B%jw&+fu*Bj*QYUJ*UD8uk=txM=*=HMTu2PEFf5-PP{ZCeO3QUn(}*642hH+*>B^ zWk;~v#QVlb?M#q-r#$;Q>`Zwmq5mwx-uSM}*vVBMCz+4w&<1a`&*v5LNUO^L)IZ00Goip}ESeL5xTRbNZLX7F&Yvb^Qo zgj7CdWWoqv)pyhX#uzcr1oFS?U(vtJtdr`1`HIS3sB`*>45Zu}R2pRRlv?5*21`en zf+Vz!y**oawxDyE7njr=XOOuUxgUye_5(cUd*m)kt_%2UW4P4R=yggzWv~R}EX08b zF*!G&e}X!PkK5In=a6!${XRxczL2po1t&Po$oy%gY4|Qae<1yPDz0%A9y$>=yQVSL zO>4WG^@9WPd1AjVg`Da4@@%0^-jO;2y^)0%J^(L#7pPu{yMR%b#>>h+e6Om%^hi{G zm8J2o1mitAuy=>rXtJ@bzVOs{{|BL#O4<6p)u`Xp{=mtJo*QVzVe(PcTJb_%&eq6O zhPEI6rp%^{#*>xdpM)140dEp-Q%Cb%hLpaRGber+8QR$KkLe!`EwvPFtsMKn=x4rz znYLQaoKrkUbRV&hT2~C}ziKEIk74wI zhx?@anD=chD!stozh9$|v6fwPOXr&0-6@f+^IBH=&hYpk^pGSbr(dWtyhm`_-Ec(K z;-99sp#?Ro1wZTkrabSm9{=O-Ia_Nvxp0%v82N6yd%NgR=0bPN+j&4Y=B*q%u-FCf zrTl?weOudgi+7&M+o{V96}>hDe77U8an%;ToA^xj2VWfIA7pZFcV_InpPyIrcc#Fn zq1H;49$Prp=$B6%o6j>n-)7=;XSfzWqlYl!VoDc~PxXDFH>>DD+Bn2%?D0#SHYige zHd;r-K6Yg%lw&<}9Qq~rzO=Q+xEkNKp(fPY6g{&uQP-?;V>mlQ=aQ*4;;KU)>hX2> zwTUa;h?#(TKaV?q)V5y5R~c0k_cgHG2-Lju9?3h4@K4|A%HVGC8<3AG6Lp&NOD%B~ zK3@TO)gQe_8sxn?qI%QzJ-ex_#~0v!3t2ly_4(NLp;{0;CpwN;eXDb!vHM=g*me@>UVxT|>rnTqdFOz{dxeRf z-v15%YwQ%xY1RIX=bRVheh~{esL9=FViU(_Y%XicPnp`!bl%z~?9HY3tk!DJZ-;NI z{(F$m>={CQ#ooyM%e@%~fKCPkFBzS31o9+xEW6SD$=Kr?yr08=uH?*3?oCFg|GuzL z=NfjZkt>LPp3tX{<`rMFCsHeB|B;p`52+KiAGk8K zc-ZUgb=LILEpKO0fgeqM@qVcXCHJ5Lc&R!u<7P;?cIJ4-`~+jS5%1=h|6#UlbQ~(6w)s;lB-Ld(ZvM*rAPq<(EsH ztBu|v9yko|#hK=3d7N(;I=_TIRcj@q29yR!4hCZ%wc-87&&eJ#XW_e)|Kr1-%e>CR ze(pGL7yFplXxG@*7e7;4Z|XR%^%^90OdR!c;pIXkd+6wJ?ilHozopiSJ|{<$P0x*v z#fl>Dg7)u?x!;K#qi^|`!1}MY##QDn-Y?i%&WYhfBd-p@3}214UP`}|*5`06di#?m z7vcHLA7fuus1ax1{Jwep8KP?5HQ$}sQr7{gwa~3IARb`wsuxa>I0fIUSEBDnD)F4h zvX7ZKX?^Z0p@CVj^~kfNjWh6DccLd4{n+@g;t=#N_smY$;k(3#C*{r-y?ho9u?^8n;!N;6dg|Kz-n-H^Hrl0} zkJJtC*cjNls;f)ZZjD@PJ9Le0zQLf(g@T_iz(xK(wz*hiyfG#gKL>NKG!KrCyP9`z zi1slth5a$-o$qxZ0sa~Hz8L;qV$LgY z=8WmEUkYP7GZQ+l#a|`njt%xU>mTFo#m zK&eD-N0BGQMNPoxB!Lg201;41Z ziE8q+-$SPl=s~TO99UDZIfrUp#`BTwUrn6PxgIz<=b7{~2IueR*yj)PhKWsmZI3GK zXTI?DP58pXM1PWoL@(%F;h?gw!0~Q#z7d_f1A7~k`Be1RI_Tv+_^0*z%&6M1{%9Rc-&$7o>IE z%;1lX6;DvZo54&ohr)JNL86wf&Bc_H3;;Vuiv-SK&LiCi>$wy0)(o`#w#FeLE?WId|iv+)3pg6rS@4a3If_y!Pwh*T#=AB|EZ{#!=sP(zJ20 zm&)3>|GIL%;s)4&YOOG8k6aIvM?`wl{>Iyu8tB!_93~Nu@uJ+GSL#pX^WX|@) z=vh3}_{M7@W!G~)Bj=&;cR?K$152E9K{|1~f1{_0rk}B)&6Av!wzVxQqiM$OMt@6l zUsJNZO)RN@qBm)O#CIrLh{qm@9x?oNfA0RA)?b^^>yJ9Zaq68J$V+Fw0b|hr%zZ4l z?%%*XP0{g?t0|`npZYdYceXyW-e88Qx!*{RcNfr%TH`q{wzuD0yxH`#ja;iMSCm$m zo{FooHr8JqTxzg-8@zN{{%i=omY5M~^}$5{gd;Fxi|5HZomaB)olBjMjNQE=w?gnL zF|b-I8e5WGD*6<>;BhAM33v`qqNVg7lRrtn8TUYJb9^{f&Vl^f;@={;ZUJbRxtcm> z_~D%D-Hm-#-R3l^xF?>UN_7%mqwY?3wz9W6Sc3YI3TGi~`L1zS!DjS9adxeiV|V24 zFf%6Vii_lZ*$0m^n)RNW{ehvDrS$9SSl$bX9HdQ=jhF4p?aJx=z^16xUP4prD5 zG0iX)i5_7*>y_{oV;`xtIz!frX_> zR6Y;&!Wh@qq+FbxX=37Q3bwB5)r4=KH7TS4-mhA#y$uLf8+q8^&oi;7i-O-sP9SZ- z&vT!fbC`hqdGa7-$gtGgQVU#<{Va>E-+O2HGw_SLueV$k4<$YLDV4{58GMG!{nNTH z?{zV{><9OU@?7kW4)0Fa(WteOInBQHb!?4aH+c@6+eG>e<@>oW_lVv-R^#1FicJED)GCb-WK_9>&@)-ezBdu%-Jy-OP^5A>lgv7dt%Yf zQv5uy^Fda4w*M-7ljM`}`mL1Nmc2 z9Oo486k|{QDg0B}PML#RPMh;^d;T)hf8dlv&vW)pAvR&}lKQW_z?_u=rpV|EYhafL~k6RY!5W=0u>3n|3u^lZ)}QDFvDkX77RxY6WJ-|zoLa6WnMF>j^Ry;8>Z4OI>UjW1Do#` z#mT-U%TN!l@EiNaYrX$P@qglPr+w7qer>QfV|>)n*ZT8&?Uw zB@J}TcN6~FANJ|0?2`s-v8RES=UZKc$0&bRB`{Sh>h2XD=;sX0*`8F>^V3a^H~VN^ ziT%)CP;2!r)rlDTiH@pm8HvxRwZe*c>r(3(!xL@x`LBd%-l78@Iobq$(+UUXj;TbSP+=WLL>BVRQ8HqVneV?6&V z{C!s1&V8u#Y#+a7U(FN8IR_0HJ);3Vi2UuQ_t&0qPuLUBp}o8pIR@GeIwwA-oI8j5 zAjJFlj;De^k4fA68d6g67s`au(P{d=ys!OXDdyu5=T|2B6|=9Aw(;4wO3SyQ8I_yF zo|7&9EIHdNake`{6+>Z8`wi~fVo#BV|CD`H;wC&F_5&eyWj~N<=(){(UJhPs@$EeN z=g|{e{jOIvz%z8>WlLFuqXIv#{K?lz9;3m=vkNZ?pYnI_N#CRTx`Uppv-^llqu+Z> z#?BLo^Rc1TFHs}Ucch>EJ;Zmo2ilU6I|g?eI;Vs2>Kt2l*_duI_VP=my=9s2c>ATg z3zndKZuV_&v=^h<61yQSF$qcgGu1lfyz10DXZqFH18s_3?ejdFKXxek+G(6aTUFEE z=B)J((8sHF@jtwOcp5KlL(D?g^)x2t12(x$=;8o=2mV)Uh5rwSmreU!nb)f2MjyAI z$z@tv8Yw&?@(|pq_cI1P$(4@ijh?QXBsR@Di*3;#40f%{-7PxhF7V)z(k*4&&Yl>y zZnR4xmika&WlQARS+`+1R}&61t^)cBwtWYF3K!2JtyP5wWH^tUP<%#gYI+_ z5Bl1-eoMwsZp3p)OS~6;p6|;VUae=lq?O%488trqtN9JN+5sw(CTamEVU+s`lSf_gl2WLPCSi};6qRJ06V zU9^1;w;@kh|DC;#_1;#b)jWdT;K$aywFRz9|3`GFdUy8pQ1W4BG{^W!XrJomsI{V{ zk-05I2=cy%1-F~N4IS`?S`R+x+F81<#BOA4xAY@vedbF`ir#3yFN?Ptd+?*s&J1D= zEa{Cl5obzLwk!Z$bw^Dr`L}&w&2_hi_Ze*Ya8AiC(4_Nf@l}H#mL%#s=H%v}oI{>4Y}g#CW1P|DJJo$+@aWefR8ewz1y_ zn)yeL_iX-ISRv|;)LOk`i?>qpB^=0~fx(+5&UJ-v&-}~6m!`hyyHMrKghS|SdPC&@ z>!8)y{%oUFGO}G)XLyYgC*9(C&0UV0Ox$8Z_jG~L=V_0#VO{# zY9f_SMI2HSZ57@jt#)vh<2m3F_$zJ=mm9x9UC!1|Ey$fLSdrKO^FhqqYPGI#7QME9 z?*hNY==yocW+aU{=+-+Zvr+K;2H^S23YVIm$?Vag^~H;kjmxucoqw0v8SY5wXUJVX zpB-ApKaTgU^R4ND)|&aN_=rf)dx9CJM(=>kIQ(7dh4=jT%sHRxv>ILTLgr1$rQtn3 znW)dLE7Y0#)19H6VcP6B%H7?DyX%q2ce=rS(#S@>m&W|x6~8m*&)(Ns20rLL=xNZ`vojP}<8uLN4|c~Uw>7VLqyjw(wwL1w9&$CUAGikjiihy?xKs9$)%N}XFDH16 zc=)#HHse#h(7n*iYh%s0w)a<+R+anE&VkKkZN{y!oy9^8XXsAWj&7dAnMU z9a5YscKsR1`>jpP4GB8`$LRfHXX^{SK6Aavu{p~-TkK-Uv0zy|P|lX|xweAs5fPO2 zi-W(dJW%|**8og$4Bjb$Mls{iU4x~OS=F)3B zdUC-tIYKSy8&A85IZL~;wmxxeXloFVFJb1IZOv_w+|L_O#dM^K>E)YLq+5)pI4(8ZsGkCHluN zO3gK&^RDy0iBoifJRAx+`5FAH6Jv!p7UCUWP0Xh6fnKTFE~xZu+++`G6}f-LN*Y3& z8`j5tL-zkV_TPwF0I`oC-jt)BHe4U1|a0~N;GgxX>5 zhriV~{Ls|iHv4x7ez+YNsZY_y!7p+THh!L)OT>Zbmka)S&|@7+=sXGls@Cev8{JAd z&+a(S6VRKEG|B#N=j6{ZK9e2k9mZzak^Zys1EY3Ze6UTx0ChRrBlo?6jSFCg9rmf- zWo~IUYOKh=o-+osoD|)1#(}L*Z_PhubkHM-`D@P>ZZLTQrzLt6f0ea3c0b4jP0vRZ zO`jHzxskfgH+0lFz&(J|u(dgHAvW>fcXGBafPPx7Q~HMeg=T0o&OmLKmPH@rJ}~_v z4o}qQzUO`*XT{v+t%;sg1H6BjT)x_9yXZmc$1oM9G`$VVOc#7L4R^O7*CKf}l#LZR zi&4KX*zcnEg^_80^Z#aa@ps{IW$f1vUAL|gSwX92lxO2F+j5SnxkmRNv55}5rgwT| z)GqjzJaTDZ=Q#9tPY@p+ZS%L#0RYe<%xjVFW8T-lbciEp|op0y1 zj18@y){8uYr9)TcV1Q{*!*0)NFRCpyjd9jC`$REbv)HRJm`bfFe|D{(k^WMAS!vMx zQ|<~=*TYya>-Pb3P!Tb~U|q&RxKH{+)LQ98NhFMg)UGgXxYwnis2}%eZz;-8xoK^B8{Q%t~l{-fnxTW;J5_@!T zKj?XGeA>5$wr1Qdx>7?;AKe%vBLbz zkejr(xVNZv=-9~O-aWxVrha6ZyG-g*nI95hE*0;E*q+lCwJ)O4{Uz=~ow=WmO^(5& zXp-@bToc?O_7QD?6N?X+bqCns+P+>J*ckl^Z-vxJaen>4a_^%xKhrhXN>Jh9Pu*9!wXTW5PBUy=D08oM^5 z7lD@Bb-7pMPFLejhhv@#&j%vGO=qpG^pyL6(S0rcTk`og@%cfSN5wzzX8@_irDowB z$EkuI=_fj+FKBp1W`^nIzBRYi#EE(qZz}7!e$K?w#FEBKkHKEx-YBnFkHFeY;znd* z$?w+UcR900W7m~|jqhxC|6yo54s0Ft?&#MhK0C2^Gx~}sY=F)Vf+cl44%2)e?siC$00+G3XTf2@2etjb9??A{Mq258{Gbo;YwG&oO@0BCpgX!hj9mD zbH*J`FWP?fjGJqpz;JiC$;Dle+hF|s&Hi}V!#M1L`7J{8=-)CvwmnYkk*B2dnblgI z+pGkgb7nN@{9VxS;>?5Mm!>{q4rmbJa#opdWSDW87nknx5S&TD<{nQj%lY5n`Lvgn981B!ZF?H5%Bq~n)xhvw3SG=RR<(v+=;vTI zQ!g`fye6_etI^%Y)IoGCb}Xtqy~99%#`g|=XXht2WBv&Jb@Y=j&e)kIpJ$F1zc*#w zpv+Fe%->_rb-A9xzddj!>|dv3TJNfEr6bBYAs0J){5=LoJySZ?#3O#l{9t+$RR^O@ zZ=5)=IVAg*_7zz~AItdI&N*6NSdVj{ocyU>t(9%H$X#Ukr7qee{zK}T$ptHyU{M%Z z^sCs;rkR62PI~{G1*7y@))`maU*aPppm-Q}(Dv_%uou+ly{hVK>F_LnQ1MM-7vo84d|Xh#)AO&1Y@{z@o^zV$bj~tcg_=;^3t|Ii+-pq!OzwFVF9wfq z@T|<_{`-~p&-w473xHcH!=0jczK7mn?`}>1YOUnqtDenAZSn6iafj8Iu}FU3jqje4 z;T$61CG=Km_4X0HLp;`2uzQQ#`y_UAFNDsK=o`Q|*Vm|9e=)jS>^|jh8EbIJ#M1II zEqPT9ZiA8Y-#Xt5wj>7lIP-Bv>%rB<|AZ-@Sndo5nMTCi-DM>{;2)y28%b z1NHLklC8P;S7Oe~qHvM%6^{%p{ZrOy9Qe4S{0vWGZ>i2HQx8&?%LVF6pRRJO zU+Xd0R+3XV#-e+r?1Xg3dUnDxqi-; zQk&R}^aF4P@o+qoda5z7z3xve_v(4{>YnL^?m`nsQ)}?r`u6s%vF&dV1(9G;`t5(= zTOaK1NZ0c^-i`U*#-GsS+Fp5A7p^urKWeS)6wXi7`YuygWPHD4TssTq{LJ}=R;yy$ zS8Yk@uS%!GpZN)}E@^2v-f@=TE9I|PjUKH!PwytoGt#jGwN~%g!BMjXY0EHgMAOV< zZ-(?;p&e1{TAM4tf7&;7raw;fDed3$153AaOO4WF>bs7xUmV-tsR=W)w4a$XVszd( z@(_%ST>?LhmbYIdzB>o;1FU)xW~*VA3;j!izGG zRjotR1o88f)tpJ8{Y8zgtxMVy&ckmh?9`NQGBwEWX5YZ7(A1F zI;3Rtl$zW>8vlP&6p1{q!Z{C4br;_ed0}OsddpCbUF)^yhv6OD;TxO}IY!&09W~?I z-2gIE;UCHqjSmN9_DH{oHpGlRbza5uL+2IPYmJFsuis?8$s8too0IxF5o7Ic;8 z;m-FH2JhsbJl;g(U~H$ow9UKFh^*T?{!PL zfBPNapee?)&bev$#f-%QTlgo3Se+<{q&q$Tq80_2lu znwbz-JU_2AucYTM?95sjeh6xp^yfP`YHktwMxytoor%m|2mB0u4tv51(^u-#@KYmi z8`H|iOWtYrFA^Wr6wv3%xs#24XM9j}9Bf9lR=odUdDb)cKQ0(& z4DB&rOJjpQVModTAx`^i{;$UOcu>mDrdMkj9D1dDm9a5;9Y@cg zW-W9c20g2_@?%`)T;`PN2RQIYp|Kx8V=eK&Obl)$`t)ia?8FQ(po(i?4{u{uk(RNvA2t50MSTJ5H>ckT zgo-&$dVb2@qV0uV)A6^Wi|g>rU&p^TH53OV^0K~2%nZ6UF}Ig9uXPWZK8YT@4XDl0 zd8BF$pELOMkfOD_TYOs=*67+=OSM*V$@N`$G?ffgYo%Z6bBl}*e0w5iuOa+v*$3!V zjY9u4t-CqfLf5e#;2vObK65rSuIQHESFpi8#Dqos!|#%|d-+yBK3lM}GcHcVp!b86 zQD@!}Gm;+{8Femnx>{35eB6Fb{u;=$A+RkNci!{l2mRc*B&@FF!TXoBC6g<2E^0s?mZL~`rYgaY~ zHa54W@N?)*>!-n|PZVwZ=)icd_;smw&I`^9^tp9H-UayxvM6{k|DegI zYAJOW`}a8Pzc!qrd>4>QlnK;F#6oJV&TVICXX*`1#2so8s}df>@9qp|!>6R=z`S6a z*c7a}`>|y4L$m+9@)N>GR2ftj6Cz-XkWCoUxA!P%9$@9E6(%2kn^FuJw7v{?9b_W-uOh$^WEq~ z#`~r28<<{)%?i~|Dc`-WK;QYFr%~yPp`o;Si z8c5-eG=0){q0Xwk{iw9fm0~}@%j68(+s7bYNm&#+^|)_q-@RMzg?K!+v9b8M>4|ZC zx!&g_@G|F+YTNVN1nqrY(!QFDy*+`Qk1!N{iAm41a6T7$mq{+x2=Hl_oa%AJSVLXz zRFOraAd6Z`%y$J&0}fGZWeaqVl<(*_$3Pz?;%g7Of0cL;pHmyz8IjD_9VqXpa(DII zYUUUV?;l7y=bF5~zWt@rOQvtn*O(8*J!}OpsI`(UwF!IVqhO5b1NnJQ`M$mco%45( zP5kb$Yt%-9NJ(~Pa;GIk!p1o0VGN&SUdD}2(H?P}^JR~K#E zhqaTsfBVkJ`lITLwswH?!A~o{?>j}CW5YR34dpXgUa&K^`h09nw-+r$qFZk!Kjy7p zrANL;UiVn|F0?tTmpZm@25Tg>-W-r0VC>m13l{&+Dz=$E-lK~)Z)AI?wPMFXL_r^^ zebNrvKPXD9g#L;NiF(X^i?5rSJN6Tnz5Ub?0~}SJB!q!;WZ_5?i(g)NP<)%5Vagd9 z#PghyF}YyhaZzCJWmsfmF0^emW_VHR=AWk6qNHKGi9xCSBpPIe6PD8i_}`lF3x|^ znCIc*!)5!ccNOby_)O~SlM^^mH58sV}WiJT4nr& zbHn*e;zPAo`A@bZqo1 z^IK>8_nH`YF3g2m1|A&Snf2Rp7FRP5P}9j`)Kh4jtk#e%hgM;pyPcWR;`b2jM*;C= z!9H_DO7%h^%{-RyIXnRykai;TCDa=BAkN{6+!dxLrY4dzf`7dYn4t3(wjMAE4L0mKB^Asn3LSofHo7P!pl( zWCdiMS}Q%vc_kXBdHKMc|A5j_f-z{-#o^bmj`oHTmyKF zc{SQ*smr})k->lXJYMpWhV|HGh z|7kgc2rQJFdpJ$HTg_tSBcjRYgdZfe-D2FE&ZM{`>_Av1ku=~O ze=dH%&5(PNA{gW}rCU`vu!Gfw3XUyGCqf zmGh$b)p0ytO>~O9Z-2b+u>5dC&v(YmO$wd=L1xxDw#PMM=;8+(hr8YssaY+=3{Iv( zXpFLm`dZs)%-z*^_#Wg;l2$1bx}$DO%kvNXGfYl###NsoO>#Dt#*?mZbMw9lZ0^}l#h)YxiT3i6Xo5xWry9RR zxBTG}m+6nV%mDG5k$>wEYdgze%VUemKS^veBYm0h5wXMrs2!t!9xh?{Z&AU9H~a~* zbW=3e#N0O}=8AI0gpT$5sfi|U7Bg*)kNVkytudUHwtaQF6m0&+MMZ^4euHyn&nWFP z?3t~Ub0!|x6R6L$0h62*JtZ_ro#g?4@@%2Z;jehY_~q0(<>Z|z%z*og!RP(6{S8*3 zuSx5p5%EmXt^BR6@iI9>V&GGXXCZEgUR5~8d(ze)cu;4R$HhJLb^DrFA!nFsyQ3{@ zd*tr+7n>Z~s@M^XN_xJ+zryUHYv)Rt%}qJq;(sji1lvJ{hU)Xl-y%I|dHyAO%aE_> zBdUqElReto-It9xJJtZ;6?XFv|lhIm668~3i-m9shCZH1g*2F5k|z^BLaB%bdR z+I+U{uJw~YQCumXCvLgI|AXW%K0L5$%*xnA!wC?WcR= zeW6;N)56gq?~d5`#YpuiV@%;C^di&zJ}%+^93MM^<#_L$8LDyMo#?MJ9N*(P&rZ)a z@%_1_$CZDWve$h(&);Iq|7x3(^tA%7nY z8N%*o`ZJ-wSI&g;a7}5AkvYiakeSz%3G+(Ue%YANxf|lIDZ$JJSD9vKIpJ55+$ie7h^GE$~c;Nq85O z&!p|6J=>S5V^q^o`$I;C7AIWl3^o4qX8%sPmt~OK%u(c-fcDN~jE3v6PVa-%TJ^GS za@nIm%{Lt7ltc$b&_Vb6_xqX`*x%+Xe1=%@+wfb&H=*~}qfcWZPTe)OwUaFg-E=wX zp!vI$;jDAi@72NCPySB1Iy!6f>Nmy8AI{vur;1M*TKzV(eRYD8>J!fIR(k8j7Umtz zO3yWzt**Gm=-JwAt&w9NmOhkoU=GY5y+4||`!jtzGi9pxD5Bn~F7I6bT#;`RAQUe5 zZGVGF@gy^YV`*-AL4Ur|JIwg~4tEZBs9Vp#yGQPUvd^Aiw$0IIQ?vGl`-ZD?x#uF* ztab7D_<8f3y=9s2<6bUL#NQ*=&Jn0gNFv%1%W- zp5hnpuo;PZ&&M)P7}+wpuvPibL3?YX)keOxpm(%BhsLz>`%#{cac7(Qf;xYb)Y~$4 z|D1D=nO8!;rC>J5?eXyi_W9{EMHZa_JBu}dI^UoXHQ<_NYW>=BKTOXVR~l#L4A#Tf zs&m3QgH_8J=A(+w4Zn3=>AI566Mzmic!@T+rs1)PxhL-h?@9hMY5V))_XbO_Uo<~o zg}SxA2t4pL7Csk{Z569YVob_{Q$?>zmdCJ{A0V|AL!ay;h7$t(O1E{7UTVt zZ=oT&O7=-PJPp65G2V&JDA-WMd#LZiKaBypM?ECoP5Q(vGlRSOmHLUzNPmS|D{S8Z zbE5e!(_w!N@CKS5p(mtAn0$s=Me8@~RqSQXVR+H@zv2ua&Ep4n2YC9Nhi3i^n?lVD zdZ}b%b1Mrgjjw4`qUXt_rCG-A+dp28SYGIKN9<`p}etbUrqR=)m&!Eh&MaEu)|KrG_wWC)TS0fsr z^g_N^6wE{YwXkGsKRJg>`}CZWBk#g9Z-|BnuaReWg*MNpE@$hJ+jA*n6YY)msvJ4c z?WKsMlOBj$D$tAdFs|XlY$@7ad~4InA4qvM%pYd*Cl5l+nv!pfiHtXL=I%uA^xL8X zjQ%=5(HD2Sd%Wmw>a~l4i%gFKwN7D<2=kz9eZ=^}cyp%{3U=1v1KA%dl*Ac!P1%8=xZwWxf?!+5wsNX2#BkZ7sf4q}<>+S9l=~cvRZ*HRsmx4BH2Ln5ksX|3mLX)1!O0{|F*1 z3VTFRL)q5^|77|A)9bP^xLs@qyrRec38a7a2RkqKBkXP^Pxgg(N$+83p^wOFzz5_O zPA>N$9O5t@s_B1J{>(hzmp;;^vF&$6`LCbDnX~###>cidORLm4D8EyK-(YOCMz>02 zco)dS48C;)3V`GmllR75!{2wB*2GBb+dnC;H~i92WDT;yMNbzy8{E4s_l@a|*_y~tW?k?x_&oV& zdm^rSUFnaq|0e9e*}q-run~OvT_V=w1V2g)j+h@EV z5aS1f8`bb5{m-X!5AdgL&Z@ez{}Q{(TIq}bpkEp3$HBXAEN(Qq@9EOhMz#;mogn^X z%JzkceA=dh%IzEhp$z*snuO;73ZZAdil<{hpYWIVIpkeCckQg@!#RZsra!|h%xPthzU%N?^Pop~N7PwQ=btvY8PDaP z%WM1)rfxMj`OS>=5e*D&9b!8046m_&2>FE=X&wG){|RT8&`-_&@REF~5Rw`JaJDXammoYscK-G0JC{mZR@3_Ie1-eZ2WS$={5M4lhdO)I|TjX9Meh=R1R?LjhIjD~YwnpZP za-55JY&m)Wj=(d?I|s%G#ySskTrl3~h`OA`hp$I(C=87KGZ$3TM)W5q9nxlO?_@Cv=6{Lp!@d2G`$5aeHnnEHVSNwGgcTi8fjzTt zIr)w_P^}gAu5<1+c0J?udY18_(Z13bf>`eT0_!N%9=^#ay5irrXDx0yEj&&3!x*1h ztLJZZ)!c2EQ_w-yKmQeG)AO11|J+}+eNZ3H&8uKu0d0qa6MnE3-^!wusP*7?M}SYD z)r20hpzXd{+efQ1{7_`_2aw5Qqe40EJjDA|dXm_!^jU4oS?qdA{t}Hb+SOX-omDZX zLcM$Msy>)cL^(DDpy$?jk@7F0hsJ7uwXb7ptSPI--u6ITFGajV^bulSJ2TdIy)NBb zaNQv|l%445D)$03a(iKsV6a}5}b(Re<48notZ&BeRUMBwoL>o!9=(2XSiRE4MeOvsO<(V%**zJHnO50P%M0T!Xbuih?T<|cnRqh)6*gfbaGJ!g- z+5f%p*Bzu!^d(>{qaNqaoHrdas!jA_y()86M$-~|L&=%o4EvPhL_Ps|Dk|jL*z3%@7*K(i;a)q{fN|IJQRk&g`9L zKE-Fg&2@RtJzx4mq7QOE zwBP z4jw07MXvzleevG$U&YEm%~B`N&M!S5*Wm9}_&`3HMYuz+6S^(Uu z;)&J1#S9J63el~!(Wd8z8o$swU(LBb1N47@Yd_yT>RqoJ@CO`*new}#fPZwPI_&D)&+i63Sgd=a(L2_h4Y$3`a? z7Ri|t7oCZJT3#WWU+f_MegDGoh~2BWM$haoRD2CmXANSJnto_UP@WK*txN9^yNp<+ z+5frF>OjzHRg9(y_zeHPANs_K{KV(0BWo8gO2qmnqn41*r|pcqS=s-Svj4%UWAJx8 zQn2wc*cVxgP6h<7W+q%y>D|o0^zG=VYeJ^KKxJke|?E z@_CL%UYw?}KJfTxpHk=2R>>hDEd%WCVWq9Y|+#^cA zLvAqPhj+ogC5&BGV@=(?%>CH-+x?tx@|T#)cNOmivSkJ`bxG&skqOAj*FKhk!3v=h z-ZkwPeqP_#RptB2yLr>Q`=&(BcAU38`LA+S?dP?Sd(#RwelgEcv2tSFnn>rQai;2+ zwAM|3MokcHhmXKtYOQROtJ1c{r!E(pIb!2uTNg&XtZ_(Npu!_gi6iYfRhf*?eZ^65Lqc5Bkes+8*c-{v5Sd*yCrpzNQYe z2D9Bs+pMpwOw0%8tP0*2v2g|R<#b*4Uorbb$F`Uksy}m!cZcDr$DO|z?A@MiH+X4o zX|C}(TwO|FGn|mttxqEVM8DU@;(v`lABZ`cTjq-v|94_9%m=XRk+-(t>f(3Ccfq!#|Blw#7=e zbGF5HWWQ>;_j=aGrfG-jx~DbBz0v3PNpUUCR`mg+|4QGNTC4l&n|(rL`{R)9hb3kW z%*xI({qSE&zhe9k8wwju-c+-HipVbXg6MEv(aMKTaVKC!(%#4IYE2rh@30_|i>ubk zKiM-o*7)8zLyEqy6y(MU*%M67?D_cyh0kHT&GY6Md*`pnWz{%*gSWxcb!u&e7_+&R z&v{xf&E#?%TO29(PMep#3wV#Ti(CAn*+T>7UGndcZ^3u?$2DW?_vdV{(L)k>0yEN& zi+_@~Og-xIn72&6Sds7%)#Y9iJwjc;`f*~Uhp+A3VHtXS@%gkJE_KulP09hxIEEiv z)jFM3usLZ*6m3q<67)LYcgf4Ok?o&c9aNio&yO>z_ce9F^1?hv$3#|v-ZZbBl&b>{ zQF3NKcR!Qw@oZw2J!fcY8|pmobBQTzhKxPDcna8G)iZAHR4aVS^BkNyN@N#x#FhS) zzV0{D|;T;+8 zgDx<2cDqZvP0mkCe5J`{W$$H8=PmJmhW9JOcLiI%18l?o?b^;Al2-XMq_;-5&ft@w zh5JMokT3RzdriH+S}R$xEdJ5NxsW$2@5RsmkWq1A_Jki?uE!aM-)%*YciIJS!LKqU zQgK-J0cKp4HX7%mzMRuB^l{Fs;j6~pWPXd5S8A>H@B?NK5m&HANv##GIJI!9iADZ3 zA!ly!)|vdz*}-fR3#iE380*rK>K#Gb(8nx$twWcjml(PCx6-5HtLOcmfjKzZHrbWE z(L8@ic8T%dvR9$rzgnyP=gTz$cmQ&GnFp@qOl4^2PraG3eGfQyM&DiJW+X4m2jQ;C z{Z{l*9nNzdJP=yXqPHa03X@-xQ!z*0^%vgF<@`_ZDtf}_D_Nys#1cSLUF-iUod1v%Xd-A%0FK~MEkAWxw>QGCdhGcCT2Y4$5w{^jgW?vwaU ztrZP4`?e=cYks!r-S>rKePv7CrLLCkCzO66_-*=8y*qrB`6@FU&-@86q_f-E)cjU@ zHrDV^XnPXQgIv{eY-qvG=;`J5a?i$dh`m`4sAV$$uHs@l+toVdyyo0=&^_KrU_6Bh z*_TzvYfeRMRDZW7x?XIb>u^2`qlJ-<3D!o(i!X(`U_g1+%#px~Iryu2KIAFJTQx3K zYnAUE=c~n6$?w+X_7nWvmHs!_GUSWPaCaA?9)WwnbE>AMr^}i5#xuVzSsZd4dQ+3m zyEygE)tReJAK(Ks2b%Q?$M)mhkeH*_>Qx(Ed4B$U@C9{!Tf17TeJ(GkoHxqVyV4Js z+>*N7k%Bh{fZp~`@X_*u%`Y7omSqckxhsPMjow^Ro(+08utBS5;~LHW9Fe6BIFpOg z7p1kXxj4Mo$dd-(WPP?fN}R*1LcVCI=Eaa-mc}-} zWoKeu=au27#tz+5m~CPiLlbkZM>$qEu@^3DgT}5#j3fV~_ylbn&# zx+FhS?qUY+g8id3HaIk@Hg$RQC-dC+9JN;O-srwA-)+TrTjF=)^Y9twji2eCX<{F0 ztv>&L!S;InzVv-*GCog?6uGwM{mD|JsmIwGZ;f?sdC4o8oW>wwkFzJRmW}keHSn3R zi^m1$n7LQh7TZAo zO7@wP$Zd5;%)Qjlxv6lI`K`{S&L&6n@Zxb|6H%UT!E8aT3s`eU z-w1sLt@-7Gk@%SfIV+dmM4x#rKlh~5Vp9{Z-hnwp`Z*sV-lTbLMtXo?Ldv3vd1b@0 zH{jA(}I{ndVKkRx~^@QuBzX|2PMI|LlI|lx*y^F1kzjn!09YZl;M@)a7jNi0Y`t_!yg_ zKTFObeT+-vnP&FEi1;M&D>CnbwaoOHNG&kp>AKfSk75sF7c&=E^PpNQIqjXiQ&>9q2k1EW}qvw`pN`46K+-2S}LmN%`zlaWc8ak*M`6OEY%*f9$vrg0+JifkN`V44& z!TX(CzTa)pHZ#v+S}?=px-ef+$0E-x#{|d17doeCYuJ6n1i4Sz4%;y&k!uH>JtM7p z2~y_QL^fY^er$W3G6!4l`2akhymKI)|4?A{HDe#M@l5tLs*~ObipCb_7w5H{f41;f z% zvEsn?)T(p38cg^S<{~M6^s3mKs59>Lea!vr6ZJ9iFSW*9qrl8htu$B~scqm*C6m=! z$@%7}MP?jRAHC}=HM#N6Cu%ezcRFY<#B4F(;b^-2R{LPq%ubP54`oQ#*yh3=UYss< z(0q5=FZ}LNh#AG`N5}oMHumbM*(bJv%5so%o4yfi?qOx1YIvU$-nVw#73hzuWgvTY z5o5D9=Z5Tjk=yi*bnU#kT;qv+^7va*BQqv#YXHZ`i-fkh=SI{f>-o!-q4mcO4AuM^ z@)zt5Q&>XmbTu z6m|*LrG6ZQ86rG4`l8!1Z6=;RyJTw|Fne8S0}#@A3AIb4dG7hJH0!ukpPc>U{eXGY z**@;rUNKt&YYVexU(@_zf3e9W_@ZcQE!X?jPu}7mDY9z-WY?LAJ}tK;e0R*V)jCwI z%Q`f^#o;~~2i#uVUer9*5bc1zAdjb<1IqD{gTS+&rGGFnwb9wp*@^rv{_C9StZ`#` zt>Vsyr|q1w-eK=h$4$1NUWT+sS@(2tv&o}|H{bYbY9rgf`u03y3hEv^VJ4lHS07*= zF7@Mj;FjzC>&;ntd0*>6Z=-Xp;fn#7bE?04QFxJ=v0EEi-nqfGH4gpbJ%~4{`q2AA zOSkMfteFU;kHc@>mp@KqKKnvU$xba}La*vx z=U(Ht939wN@2$uV*4U;pyieZuUcB!{y%*MZuKo)aeY*DLW}$tNLpWjz|tnV9G1 zjP8TPd6ZV?zM8k|Q~sZ+H-VF)y4uETVCbsquI{d`E>IMh0T*CIKtu%>HWgGv6jU%T zDubg&GZ9h54RsI(C5Ygt2#C8OY6KL=NE|@K1tT$v`o+WzaEYKO0Tna@%=bL!_Pw{_ z@BRJnpRcF8>fUqD@|<&?lkRG44g0LM{vqd&j)Oi+%wb%WS!HU!`xahCjf%RPr-Z}A zSEnD?h=eZR7mfyG%*y0PzU@I?P`uWs&rjJ{TUcxS=d)7Z%l^=>h+NCFeZRli zqhRl$)}Lyv^k)v8*IEZIFD^H^C$(0xy)O~VcTdy<*JdvkdvOu$1^Woh_sd#+KX_kr z8t3^ge9G_y_BTAbj#r0V41Hv8$K;8ff>Q36E{;`?E%RuXMVFZz`j2h)n|#V7#5?q*Cu4u! z4U_%gwg&aXM2_PFw~vws)Uqx~{n22~_hjzL=zUXbV)%7V3ue>s>~Jo~iP(5^MR1Mr zJ&0jy+^IdVLB{*U2Gv^KqxIf;ISZce`t&>E8&j4hB)9}ww{tswi+IB9{A^RN_+aXD z;kto3LBHOZQV$X4oh7irjs=_3|19-ciZV(08DHolu{`3G-^?q1W$ID82ZKz%)#mtH z6N5K_7h2;;4`ddaT4mPHXuoB9{Jr?Y_{%jBRtVU8Qmi2nBcviYXI ztF};W{MDZVi*YSUaCBFM$A}&2i+jNtxVlE-^ERKi(f<7K?C`8U-$s9snS1p>eu0Up zugag-hPgb)8RXP>md|`B@)4AW)1g<@TFJu}+&rxlPC@iWJ;uw)`EE)MKW|ZMd>+ZL zuTc}rJn41_!C64h_?@Hh7iz7rg-NMN;A&8|Os$m-&EtPsmv+c~E-}Jqh+$tyFNGY2 z&P#~P#-%S1nWSFo5xiyMuT_|dplbj&CgzCE@oZk~z{v6lHKf*vZ2TU0Z#v;$buHz2 zk3`(PH2=KlOvZPkvlj^#M}6B-{zFXE8u2XrioT_De<*%OusixQV-hn678MrZZqiq5 zZc%IakVjEx{wOwR7xwDt=m*hP#Gg5LL(5^KZ{v$Ay$uorzKs}=Jc`uq)K{E8Mg2*= zR}mg$?A_PV27`H`bt@Jt8oF}f&dTD}_4g9xagQh~qHv0dO_=0xxr}S!H)gpdR(lIu0V%dMTcH z%sTWXxi0`?EO%DH9--6B#A0h4H8+jC4aPs5vj+g#R#oA6FHvPu>nSX4Lbv3r)T+u^0jlXISFM2 zVeuKFKZz^8kF1^k&aRjau79^CZ)=U%E1~U(T9;xm&(56v-k*muW|aro8?F2Q(PMjj1W>TyPs!AXbuRz`LwU@c+L8j92_p z$n(tNX(A`|-`3|S|4JrVgQR1n{-qk5XVF*HKE7V|na}gS^RD2fyyNWs*Z23vl(jDp zC1%7E*E&nSzoq54gs-?F_|(WP`KI{HteH`36|*2ODZNe@R07|-FZ>)8@BD;%MZLFb zjrqv2)43{YmU@rN7flELuWCgOKy0hlsum*7Sq^P-{_9)}=dBFI_wU7p+#A>$vvI*t z)9Y6e+L--K)b#2)^Y=6F8GAayJK4l6D}tGV&r`1Ii;k&RSy24G#K-GZaxSydb!E=e z!R0t#=xXf4&IGT*@X+r6QIXBF&&*t5aGMUfcS2(L10g?Gf$LbyzgjE#@1N_hd{;cr za|Pzb6vvBNqgJzDWvA`vKGDzcZ16jg6F$$uekZAU_&@kL9df^j&$$P>cU;=aPv6W5 z65kO&VeU`ImE#M~OO6s>gPJQJn4!`q)loN*^RDn8zHVdZq>n1;z4M{>)LPk^@sYg? zgNj=OGr?Ue9}iA%Er)?0m{?{3X58rfEN5?NEM<83t>KGk@;8fbunDsLkL*88ANQO@ zY?AYGr8DhT*)iSG%xgQaaG>F-n-zZtSyl3RcffuVb(c>?t(1N?%n3E~k3I?Cg1swq z#$!)z32rf1!K#@1srnrv_e{AX!-37N3|HdwN{6d8f2+=UIeIzLHu^ivUZHQs{eQ8L zn5|rBG}zj@g6+E@_vShHJZ;m$c!|U3WG-N9cB{#iN5F{qJlFu_`v#l4KR&(}Jv;oo z=P=&Xu@8N3zB_GDzo@^Gf9S(6qjLmPrGCqK*6x3t{n*s2tO&xqmf<~_wx+*>XQ%z% zU8zpOQ%d~_|0>N@zZmy)Om3`+H`fMR4gS;Fv-ru<)Kcja z!6O8FGK#AZI;V0(Jlxo|C76lH=j3dNf#4R_dv#Z0E;hJHP25VqWn$@>2c&Jkz|n=H zP2b}9oaF=HWf$aoeJd^Vh;(jU2A`78{?oV}c*x%(Ugr zJ2l}~>~w4{sot3+u_yiH2jd5!LwGNmThto%`V!y2&rwLt7{vyUYKNa3ab6 zyA`6}j>X*>g&KI?Qz%a4L98D>IDMS>T6~^;j+)28JEGR=cPl*0Rl6Xzbuxd-{3)Y- zp~=PT#da_kLtCbC=^fdb^1ie|_Z99loG@eZV+=m?TKYAULvKjgnTh0tEWPi3wH7(A zJRoy`!Ez&amz?8H#Kj#kH;OXG-(sCD^#gGx+?c3Eq{yp2E;h#4!#?+d0(jL)#;^u3-BRLq9C_ zCKD&zD!E`Hbc|^N{zi#6E}4dw8)qo|<1ndrcon z*|oaTns;qe%ffh=sq5%l=&Lc?X0=A$V0m42gZsL{v3ti;Or7EC94sfE(}Dd0zo^Vb zq5@r>;AfbepKLInDT(~ugDH#UlG}~)#(BZyyw!J5t?}>3i8Q#j_ovaHE4a$t2sk+x zN#C9OGWVH2psmiS3PVO+?v8A$^5gOSjM19n_as(w2BAkddK2%Z;;#o&n++deZT4ij z??d3vko#1hMbDBiIskfr`~%7l$vDHoMa(@v3vqW#n`wfpoQ&UU&WtPJ^V6M2qWelY z-%97%oW*%g39WB=Olfu`?}%EL@>8Cz8Q?rJ+H2~E?it0mKs^II#PqrR>TWa`$fO)G zI`JhAZNSWBUHg5W_ps?p9qXI}-$v=l?e2-i{y$sX~6jL0w^*}LCgAiu?&)Meg~Qf{}m*XSQ9J_CETKF%tx zo-NQV6=7SkYccXBi^D3h_0-P~rEGu4(82#LdnFw2KWWa!QhMg) z+$zys%;Ang4~4#`Q*(@`)cdmMNbB=Uq8}vY<+(Hf>t@`+T5+{jxsnyZTq6VBiZ+M4 z-5F`*jeelESs!O@ZxQjUo|MCNj^n2-Zj%FMuAeP(Yvg<{!TD}+>>TG~vbG2Fo|4_U z7Z18JZ|7*Nai$ynIXtxdcn?a=Ug$gleW=#z-G3kcKGb+uyHvXp*1f-_A+Wwv8og|3 z-0J`!lv*>U^U$+kd+WwTY6ceLmmpEAvp2LcKJ&DyK{jR-zZHII=5WEe zYH~n3-E)jB`+cH*o;<)hM?b!Bleu@SRnR)H(YOBCASgNdDs|W^)_c%bq+fSfs=~-X zhn(d{>K;4`TdDf^7RC$XN_?KRnx7@O;}(=^bsoX<@56s8#`NH~EBuFg@2SGGCg)fc zDZ9@)%&EwwYTXs*Y!4CZ5GaR^Q|Vj*PH)=H5zsR=-b57};&0i{tL>LsEBiGd{jJ!e zZP2~jik920DOPzssA_P4s6H3!ih5_9{1%_{nPQ{p1cHyP^Q|?HM6+6#IqUJ6-I?9S z2kYgJ7yHih>X5Uu*p?Uf2qwT-W@l+;0oUhw=Xv^E$Yn|!$NRXgcx;Ko0loZX>N)H1 zTQgHL1wWyTskPGo>}Ajx-H^->)3>$7xxw5=_Mz*~a3<6p_$}J~^P=-iT)CjAcs?0d zR)kj@n~rIea(DXRjx_l;pVBX5YiW)Rjy1D8ccpfl80|V|v78Hi`12Dp;PypFm^z}! zEtlVFjeGQ;@IMBNj&qiqq9MV%HOEuAa@wFNzVdCZ$DXLQ%2UrzKPr39*o3@)8vpq* zV|lt7{XYs8{UmgL*KAkB;7V_+wbI*d-2+W8d~@auWBclhznJ(!t;?NxZ+x_`Ib;2Y zU!v_sukH+YhPnrY=iUzcPrqe@Z#e^-ov$#bKw*_les{4i*fwutVC%KM!Q4#Z;k56Z z<)QWeu_;xn%zds1pEGCI9lVP=-rt3qI;GFO$}ftxwtQJ&YlqJEZJ%2Ewnxj|VZPvz z=#i4G$)J|+KH)~AoHzQaE~{HVXVk_--O&*AW$3#POi%RH(eQOgxfb89LrqKX(mpJ9 z7n?lkfV9oy5X;gr>@#_r8)c9DiTGQ}aPK%{FvgZP*9sOv%(EriV({k+(-)f9hcn>B zpF}M7j|5Nk?6kFgYf-nL_o_R3i1gj5Phbv=_uKOM5$`*}K8as=e-DigHFt`0HgyhY zc%t7^t(C25@;l)@LSz-$!)xDhPxdF%KiDOs_`ZtpS9@jtDt2%s?BLDCTMQ0!mT$4O zBl3Z%%N>UA(R=vYg8hCs?V3I5ko!q6*dKwxf@j8H#f!spCGH!IxQ{wt+3x*_3%KTe z+0(+_e~qQI^2$Xgb00p!JZQ=%_2wzB zL?7#>{HDD29}q{V`-rpN=6oyqlQF_+n7yTaa_|$14(yDWvA!6H{(QE7w^m&eybAAz z3TvgVxCcG^ti54kX?twzjq8h@4G-s&;nyn8!h0<*j+Q(l?;U*@zAt^4Bl5?am||(( z#=P6zJtn3;Jbk#CY5s)!M5)#VePm%|bl}zK(bhWQ7VmZy2SILs4AuNQ)+3#bx_T{R z%ZqmA)Mdi^s_@Abfvt}nnX!Hsxz2Rls@6DDU{hNYy;>3GzeIA5bq@I!4#pZ1kNmib z9dN#tO(HW2e^cwq((Fab68Uc{M~zEsAKvlEg|6;bx5{avOO^ht2-k?NSPfl4Y+1{j zS}S>L&YURqZ2KXr|3E*NmTht-XrJUb|2R`8Obovd-jdutan9CU(J!JNpgmPs*Z(oq?ZIihp}S{IT(kQHv-#|6u5Ra--?}QERn752b8P<}Kci z64rgSw=#d4sdpNXen>Fe#l$_Fqhz0HudAYh>ASzHxIug^`dzDYFBr`E=K6Q!f)~X?1$nRu{UaSx|6{}rX}*fze)eb=+c^u#cj?6KL%y# zyOSy}nx42LgNiF9?@askT70_kg;*1%b2@4bncvjX(&XFu#bw~b(e>(|rM{Jzk@jwP zTJ@8JK|d)A-qAw4y?@9Q@`);*&zeAa&RjuT7A z?C-Q%mpd~row~0ktTFm^dvpBWyk7tGLc>Kx8r)BFibqBW*&WCwf?6_2p4 z;AXL{#70H|+t(P&2?-pmCU5JkYO{5M88+bAcDg^LwQiq~$b;7>c&@(k&og=acF3~m zTzL+2Nf;|3N$9Axiv5ptkCIrv4kyFe;-xyAvdg?0*h+O@KJzz~uv65!haZ^zKhC=Y zb4ElSys^Pp(RIA1wb{`k8>4vN6SWpYf+2yf^O;f9ee2zXV^i%5~aC~q)6W`Bzk{}ZpE|f93F{UJ%5T6HT+<6P!;JOBk|IT;{ z**>Q%F*jsar0QyZ28O2AO8!|dq`zOSm0g<&4hKHlDM*IO>uvGKjXCt z*$HM=$SGlGkv;0(Cf{;ut@my-ad-Q$eW+_K7Ccp9 ztlf-rc0Teo30rUw__zjRALv`M?}_`&yxWYTnz7D0t^+cbGk;>Pb4u%|9l0H*my>-8 z`dz?CXmH)g-6HyJGxXc7=;PM<@btv2!}G%Pj1O>5d`_%!stUwtJflP4AI^wp#5yjU zot|y*jVn`Mn%?RrRKrjoQg6h$tnqXHp8kj61H5-jO1S+}Jdawd`*;rKiRgX%*8RfN z47A34A6-k+FJtEi)w|a24@>Cb*K-e>oZXVVs?FwEb7m;NpZBpUnq{zsMt_6J&(y2?`2#wJFV*Zd1uGRzsKEC z^>}BM@XxcMZ`E48dwn8TTc4Ph*E_cT6t_n+j68$W*l@(H2pYtPr);kXEWXhbc>(>t zJyJbV8ee^>__pbx?w{aZ_ySlW?bp}964hGWk$fhfp`QR=sdSX+yLsDF`t}{fde`Ky z$!ppB5M0(;epUzT#J_zNzTAP4uG8p^{y~d3_6%2xzFh@Ia{=478KC*Na+mp(i8O>6vcL2P-FPYq7Bb3;7EdpQ()azS{3)Qvb!rSpMnd$M*W zaGSotK+#2%nTvtha^LW$&Vu3!Q=>k#pk#^lLMwt31ViIl4+h7(ezsZpS*G`-#_KKq zKV$Qi(MmHzM6H!gxh9$^_p~0rwce{TzV|PQxoI(KOs-v9o z+k1u2i#+og&hhNJXS%2H+0HDSDLGK)xn>vU2=2{(bIz~Sn15x$F3$_*1&89CMAPFiwCq$5V4;9|dy;@fo zZT9(*M7`pfX~k#4_gWF0FShJF2mxnW@jh~<)wg-ek-}WC_7l`vo#}$~0uvMcGrtja zK`I7c67?6~xDwC&Q|aue$I!PW?@Rl#5j^MmJJni!=T*p^QHM}(b54rJLf=QlqV_YR z=x~WUxFBa(u-(I}_^L{C9?Xuq(I_2d^gog~51P8>wWewX-MG{bemJ^~LYSAE2HYAJ;qjZZ`YP1{;~3h+${vXG+Zg zKYtwRF0>DMWPGHtzk~C)m>6MncC^7)Yo#wNbS5FzP-~^DbJ2yRc%iqmHBleiAy+AK zRROt*+)Z)^KgYq3N{toFgfc$@bK;0iy^eQRYskQk{Vn_Q`%J!dWuo5c)I@Cw=i2c3 zDd#KmlTH8WO3WJ8`NUsQ)2R2P-g!p+O!{We1$M5)%z(9IYX7Sv%e6Afx4Dw~1SdA< z>}cOot(9-t4ht$vGqN;Q0U;L>&IcbJJaQ!=*!s->(ACb7RV4v)f}Ef1Tr=BOF;fASY_AV%3XfZfUu* za^Ieo^GayJQ1MLAiSTWMzZkb^~P zBY{D2t?hD?|2y$HuY`ZqKI~|6H`%n+pPXAQvI_fngMXvOv_0m9HI7|Z;)1~TV4gKG zbA^+m4%~1ilV9aBoD2C?_7&_*oEXe_TFytLM;M)aTH!RAHxxnlvVQwad?zu|%Glbn z-JzWeM%~Wuq3m(qwANi!k?O@>1-q~VTvFOM?i<`{a?rJo?fKmhY%m%{n_dyq1DjU}jC&^bG`hD|>KJ7TowieJH4 zW3xL(;_E?JugZ)zzk5S?gNbYY9of9VUH)CZmKn|o8d^GwU6?tjpZR5HwK>O{{A}}% zwb@%lKTO5FI6YgM3j<7hZ(x1Jov!VhU~FrAQDANnerqN;Z7@F$wl#DX!{1hGWoOC$ zsWBz?dY_H=Wqfg2WVutQ>qP$X@8qpjcCcIJta!G>INaL+v*f6ISvNAmJ6me4k!wCQ zoo^?5H3WM#E?+G?fxKTsvjfFX;QsGQ{cPj`?H9PexSQy6QR_12q-)E{dtz3Ojzed< zf0y`r1McjajOwwX|Gdn5UN8#EKrXU2ZX4!%>V4i?_`%dCydGH&%nI*6CVuQ5geFH% zjugh)PhrMiuSnJ363=Aq5Oo^si24T0OuhYzK*>3uL9NT3CfqwP(3u=)lg#H;``=Ws z_wn*#t?@sP$=VrbYaA={9Sa@JS#Xw$$`NOP%S|@=22)@0Lt=h+ z-{9(2j9-pKY+IWhD?Zg2_*9oi14W*xKl!^FuYNW-#&EDtLUpFT<4yh?@jvf^JnRl_ zT=^h!zB*<(+JDMm@An7yo4$q)xufK7d*g4<$XL!*^z+Jn{0!%~Co@!Z8nK8g!MjU) zfjsgi0PiLrr`Ad~w#NrT50q+XolkN1Rli~6TEG4M(mbzs;XkXjx;v?0ro_CI8P-Q# zf#0HytMDvd*FD&1?9{pbyJk&3x}o?j_6oh9`%mswkDjy3T zGyAX^SOm}aEBwKX;uD7B`Z0g3*gMMAr-gs28bW+)d+_dRKL1U?-gT`=|HSim$PE)8 zawwd+C)~45?AbfEyhc;}J0zDxojE47bLG|+*P8r$bEdWIGqwV?1icKOfLfP1ui5Wn z%)9TgKD}K0Sl-Qw#Jq+k-`0^noLBp^A2x12Y@B2Qu!+NB_5_tX-{VYQacxh>q}&bi z{j@uczMVT?Xd9Wnk^>X-vvy;Kk=Fl57Zhh2>!60k!*p$Yi&~dCGbeKf)~w?Bco%Xk z^ZxR0=^Ko2RqyIxIBG3zY`@a;DT{NCh|d-up7N6`VUG|N>21-^(BRtHB_9?(H2oBZ zVPclHapYOmoKcwiV9x!Q$jfV9o!?TGf3?(!h;C0=XroXy}u z(Z1a9K;;K%vsjCw^-@Q-Li9ZU{Vsow+-vk}dnwGURQCe&@4%JUy|h=g**6UCePHoG zqi?rjMi1YeeJdRc74oIzY4ZJb zkk481tXSE;*3MBG%Uw{LwYKuu#N0;a>$SiAbfT}8I4b>K#-yz6*Y)QIV)mAfB^RKF zLZ994a02FEt2)VRO5A<2Zw1?TusD%78J)F$$UpP;Ik|7To?#?7BDBxOIfL2{pXp8p zZlLmFofBB-uHb)y<8cp9cTabTWpS?-hkp~C;VtONwc*5^-rKu_yG_kZFtlc9{v_}>6h-`OfSZ0PuG1>&TVYl zA!p+h<_omX@M`{5=vCUF<`%V9wSU~V8%z5}Zf(jExwXMrXMAt=#`4|i=iHXR&CFsL zUYd7FFJ?P>{j|+pl6p}3N@)8oO>kg78a^88=ZSOn4h{epH*Fs|bw3V1HZ|UAjXkM^ z&*oX*_1)lI!&f%CVB?oYze-|N?iFjX_{{Xd)LPlupm>ClG1iD`9Fnty&gDM9Z^s-i zvBmuvBY?+V+o?^yR>bg|_WPhhGo<>;&vbP`wGA@@lpkY(1tr*}Chi^4E$lbPa?ua{n&t4Oo+p zht;{H5CHN$JZQ2~3i8V!V&!E?*X0Zt6Pv zCVY$|OEuoTu!r;~wf*`sA_u0rQ= z9aQ$)5>LV)#DEXsZz+Xk*pq8a9V6!iO~r4~7aAT~-ia>7E=4Ves}g;AUT&L_^MPfL zm|Q?5xD&-ETr}OODfwWRL2ta6=o4X{PV3dkZ4ljZ4?Z)xFxqeozM6eCt93$%I$>>J zmU*`Kf&QfC#UgJoW0p6tC-mpf!u!!Tem*gGfIT?+J0sWDeYH=_?QQaJmiu)R?pLj2 zbt8M^^*$_jZEeY(jIHVIh8kL}>z>IxBXJG&fLg0Nb!g^LlY9En`4Kw~J+otf^M&EX z#%Jh`Iwf6K-y>x?KRM@A+Zwf2I(&|&I8^sR4?hSlWfhOKw2VNWl>0`XXNzO)Y`t@$ z_(H=VpX&=}8UM38xCnT5+_xt@%~3GOV=PaZAtwf(SL@zq1DiYESGd;HLCwm|5#3Aw zhx0Y~3~((`&tU7%>m7ThYl}0Dp0CYX-Y{UKBF{O<^PaE`a?0vnr}GwjzcKZmi3Mh) zXW;DAb9TubE_ngo!EAc6#EG!El^~BTPxpBTxezfWndbJU*NZ^wfe1f z={Jqte8;spm+gstdnIaT_PN3RMBe>l=#2xsnTCsrTsJB%YmNH+k43lRp}i*G&YO7K zJI%}$+T?#GI*PVnMfQY}{q5~tRa6-4wb0e<-O%!Xlk|qGGu<1^5kH6aORZIp|CsO} zCTG#)Une=%$%sQ)!=~@xx9+tDe}2(jDsnT>$ zIm%9vcZhZD+Q)7LzN+=u6JA?0?*d%xv-aQMBdu#THkU( zyqdK&rEg`{120m2!2`2HB$vS&r5A|#V!vL5uD+^hc}1H1YXw)o2C>g^o}B^uW&&?K*WV~H1#`zU(2t|@n3I5b^6oRv zwsnl=ABAk5V^6|D-4WlixkW!Tj6>hTCnX8$$mpANalKJ=3ERxkZV~@b%uF%o`>) z*_{86nL)`pW!hfcnC1LpB^x(^qfh)a$j`~SlXE(TLQSl}Kl_(z{HW&#rw57+#k@+? zmeiZNlt$lvevUWC)Ob`!uSoq8XKd9vmIJ)ex4j09{vGmLGa)m?#Q2=-E63e2Ty~Q& zDOAT__vcoK4I+jxwS-aJ3YmX2XJ-~4n~0CTD1Kr59CA_WbF3}Y8lPmLYjX#++5KXh z;H&|&wR09$+M|BZ2Hhs$U*QO9j6lghDtWh!2e%U!D1bUwmr11 zvZvFX2lAFXlpG^Ejyuz}{fsLUF?%26!FhL121YR;JwfhrHSTh4zE1dsl&fJzT4z; zIb%rOxDxo8jS~ zOng@@`>AAu{S^9Ku5qt{PmAwCEUDH?CONNA+tw)hx2f9)j%V^LvtrwK)<01LU--opjxko%k11^j9Gtm5PG>G%?!82P1H=RkfKwPuX4 zyX7C*eu9DU?l4}{JuK(?ADY^y>gYuHsQ5e*)eVU`9g(}-+`%&v_U;+*rYc>Eo*n;0 z@uQG3MXj~!t3``4_>C2R@`cd7O@4>Als){n=wXn$;n~g- z|6v3S`Kd+Ly->HXmQvMOp{KZ#{1xVX}e)u=@<1Y;R)!K_NU2bc;81jrFFFPaU8bIc_6_Xe`WegQx7n*VEfjqkjGSdvK9JCZLQIbDa%jNJ$M^^>k8+r#oX1I z_$`Duz^Z;PKI)0kU23gzF&}0dBtK65#@U732Vziat-Cdf59*?J*>+hSZ%!*(J5rmy zMD}w6_Ol)`Ol+C{z%NlV{LIkVi$9((vZ3VR%G8yHUu%uCLH6oR_$}me)UhY)FmJ*4 z@V@+5d_?9@Fuwc6-(|QN7l#%v?Hl!t^t1JjTT2ZdZCtbS7`|WG*4gfClV=|r{GWNR zAB(DYX$Sn7?eV+vF8te@z@fvQ)PDCbmgKy7gR=p>zmNfJR{KOQuPXY?a9`|-c9~hgYF*~MiRanr+F3Ru z^48b=4Q70B|9N_-TQjlV*uq_=$9%J=cx5Nz4(^xv5vqUiuIviqSD)wUn)a)~hci5+ zUZT#q8~o=wcks8=-^@8yAhWJ>wUPUK`Q2K`)%x^%CMM;)1ARtEMK&($9+4-Xwye2@ zz16w~=5#O7uNpm;(%f+iQ01wgq1LhdNTadIv?D9goBU0Jf3G~-8gVoTnIL0ot!jY= zg@a5j=s}pTp?%KRqu0%yTH}x(UilB~h0!{8U!qRFo6|>PG|osRwyARpY7Ly~5YD<~ zPl}TNszhIW_rb^u-?Pe-x;}_Oh>HE^?tD4(x_&j+Gv`s;er`WH>xYv&t zA2%`V=Dg*0b5LWcedh6n3&oG6&p#nG!Ned3BsdtS6)mUGxA_z0t^q@9b*y`Cn~~Tz z`i(CYt&h>u-3HuA#lK%P5C`o9s}gS`XCfp3lPNDO}sw2;1EO-0M2(yM5B z8|t0Y;Ulr%im|G#4Tv4PKYfEb!MkpQ!Tx>vYQx)qZ(j8&pNzj9RpLmYJsMItL!ONo z>H5I(=T}Eph#jGPZo+?jU;5i>t!(;&1ZU&;-1waK6PmLY>)wKRLHAbV94m(l<2@pW zlvUQ8Yn*>-&i46|OI+)dH}i_ig4n_u$IcyN@3ZubAbxx<|D1{0m*f;~#&;a;+5Gaz z!btcbl5?z7Yvq$vgmyk}y>o)G9jRPOX4J9EKklsMvcx2Uy>YsTf9q$a--ze~=XN<0_2gYE=}xzP-pS4vRQR8}xH$l}K;EaCG|6Jlp!<-$j$(~1IaHiCmrzbc|ksFmc9rW2YL2>n&+JL7+LkL(QV?d~%Mk8MiK z@8(QE_PlIG{53HiEV9je*XY|k$S?j((W`t0@s1_w@UchhZ4LpK;v$L|&#-)J^;=-mf<@ z_HX@^J&SCZg&tG>r&`kot^`KG`M=_OSI$jvbl;VjJ=Z2}Yv+QtL0j!_=OTr#wgSF- zUj96zd;5nfZlygX2BLl7y?Xrgm_6vWnJmocu?D1S0{r?wDDDC08*!sym zU6o(s-xA}}cWp&rYi>6t>h~V;nvA}hb8WuI}5YOS7UR(yx4Gi(TK z{X=zFZQkp~lcMpGyS`{S%$xi=@!Ron z?Csaa-|mgNi@|te){hNI4KaG-?gVE-*X+5#GwJI(<(C%~cRlB5?8SU5#-7*z5A$c; zOC%MSfyI4`1+ct8n%h~(>*OyvzAl3e|CWA%!#mBp&OdK`OKo_x7?EO zv1fq)L}MU7rGG-^S>3h3%^KhSb?<-17y6;Z74u)*&1I!tGv;)*dYel)wue4Sd-op> zZdJYnz3wh=tLQ5SzdJS&+b#}m-*=ac%`cD4yaag&o%4Vr zZGoSub=vXS;|*SSdvrT=xOy+OE_2#;E=L{vHzrqmW{Ee3y`@7kHqUiQ+SYztUc4Nb ziSj4a8sE8NcQfJwx#P5hujpLV#iX>YC2K;55B>R5a9(#6Z!XoI zdEf!IwJ|@XZ5%f)JK(7Ow##Q^&d4xNhhuRn(iKvx%==PaXl-zq{=gooW2fRX z)!=KQ%#*L_pfZh3^>#WZ<^^96k2JZM@)Hpx;mqsu4ne);NW1nALcQOXiv8P(&jv)4&=YB7;w;kVeSgK%h zdDmyZGFSNu_0P%Vz<3PgTx5L5GJ8!M&{8} zI+#;=8SaRx|L+kTYkcgNik-yA8-mY|@DzUz|8{f!Imr_-7dbq<*4)`iIU;|Q|1#vz zEm!aw=Oyfw>Jv$Ofy6A#5LKeJh_*#|uX@^5*fBG>YKhQR1}H(~IdCsB9J`_7u%;gO2pDSO?6 z_HC8@;(Q;=ZPJ`MK;)Bg{f?Ziv2>zV;^T1-U(CH|VuTT;xNJ1^%+^F-{CVD3Ge2cg zev-jh2BbfbcYh!6{)G3me1>pT9+nwmaM}epEU3p(?vv?lL(@yTn~g zE<>%QcA~i~Q)YA;YxpJBMl6Hsf3yGVz1i{%)Jx>5)jDuTsTTJ~D4>SmY|)?mOntFg z&Im3Zcw;^^a`jj5uf{*@XY|k24tsVeW0m+k`D3;GR3x|omtfX_#&ri2^!@Uj^{MqK zU8~UO-!5`K4gSne>7Ny54*akpw0uF&1-5VW%>-x8h{WuSOqelpUJ-7Qcwsa4@V*3> z`=Xq}Z5G2H8(mPnHk6Yo;j4mq@(#``&FL5j1-jm|GsuXI>o{>q0{guvTb*Sc(e?PA zOLCW>!$x5OYOQq9?ZN?t94q844;j#RVSizNL7&SZg_Pj2^lwi|D?I89_})DdeHmR7 z*w<_E|4FP(e{W!!l5Og-Kf|-uvCMbr@6t2zJP=#Vvazy3Eaq^hh*+A4$yt4t<{N3yAV1TKnB!W zMAGbGk5v+lsToK1(pXv3beH$0tA~W0(HbEEJUevCrXXE{< z#6C<;^g!(`yd(Y2oblI;IT1SV#_v2BpT~6v=I~z=N3eH5$;otJlD2ogA7;4d_v!(x zfM*SR?KGwvO&+{g*h{$bc)nfZuEys9)11+_e+yQdeD1L9B7?WI!(1)>orn4QUR>=Q zoIcp_ebI-}cVuDQ-(Yc%Igc6tb7g`%dPOkb=<|c(V@)l3wpCX6j_UC4{W5#ZdsT#X zcE%c~PV7_z?9>Y6efVtTWL}zGYI5SAmu6cyh@n38J~aNATC4lAE3jPg_a$ce&2nay zdyKH%ED3 zTzp`{zKjAkrDf^%XsMCase!6@nt^+VT1~^J(Gh$ddVdxLi%gGFPp_xwF6uP3R=)S5 zxG4C11iz~?R=r4I5Oel9^b-y&+gS^FHH?s}25Bol!a2-q@4Ni)yY7b>k(`CBnH% zF11$?SMu3jhc7fRtMZjYu_ouC-p`I+M{g#+n>O?>-VTG+NABzLF0bKTmU(v0Y#;PW zbI%#CRl7EpS()hR_!PVu8dHsm_Br1M|DL|rm!>W?dlChje+=^$g9pWTr5!mMvzv*Z z)9-EcUlZN64)$W5|Fx-y{7u|oW}#A+v_IB8ur(X&gY~K&5^?A;g=OOB<7=S7-_kW6 zh}oMn+GZV#P6^5|^H!Y0sC}3V{fkXZ^kuxa{CIqZdi9I!7pB+gjf}Q6o^w$)Bl<9n z&Fu`nQ`!i|#oMq~+(YVWVoKEKtR=X}y~y0(19KL4{nAysr3Ewl*aO8q9E|VT;v{18 z{7t4tv0uhwt$Rb8zhDo_zGi&3KIA`bUeU!EHk>_JR1@{3{>%mX5$oMLebAap*Wnf*w)<>}y zN!J{1@@*f`#N2VF7v|=m4)Rm({0jY6o3;H%S&kbxOYO|_6TeZ!`Pzj z7yG%mtCYuNUE;sw^B>{!7sr1!Ih1YrUGNP;XD800Hh~>6zUDp;!vApwCC?qF?fekj zY352-gq3FhS>vJbwB{DIRy|O}aI|jZ%oHu#O|H%RKLCDvVsz}IU!7HT)bthKE!deF z#}|$_cITLQsl*P?LN^W%?cQ#WZ9H;|_Y1fYLI=gGPRD#l6Zh3cb!HC2ySaCbFLbzL z^GZA7!6w&mzCTvZm(Q~xwzG-VT4KGH=TjELe;>S#ln0(Wd-RkY@hY=vJNNuA@Xe^x z{t7>BQ5>1v$FAU5#97KeWDg6^WiE8r?(l!2^XY%y9x$`hQ>cTZ047 ziq-re&H{cac*@wj!%~L{okr~>fR54}p`_r?QOX`#~ zxdbWYtx#7621HqV&e_GY4aRk4@yY~#`=Qc-fHvnB)qJ9p@z>jm|CR4&Ty{u&qVNN7 z4?E;m$eBKmGd&6QGt_|%`232*>`w6Xn&*5iR(akxfrZX1+B%Io-`4-1kmw&-7^|5P z=OGW?A$N_~nn^Gc_rc!LXQ2Fa$=LZdQxg1&+fhxReddR}a*-MO%unYmCe|0d3HmPA z`S$)YKdZS<=__iPQEMeL&B%~wnS3P?NBlj#s&x_11_41F*HiFYVrz^O>5uU&S~<2> z`N{A})06%{;Q^x)FyB`4UqqQVrvGVX8&yRkO`R$^sCm9TqiG4=^%40IrboU@p-TA2 zcy*%cg&+#meU8;`mpb>Hh8 zwN`lD*O-^BbK>k3a9Jh>*aIBHG4yVRmn&N)k3>mSx*>-|T*z{uET zp3RXFznX|=V_xQkcvW15bx%C#sipqD(_lN)TH*XV-AWTT)jHNb_VxN2ZoR7$^TkGI zKb9UV-h~;c_vSv3H)BbnZu8FxjzRLkYu~;$Qhwkh`0&5@($q-@+hD_$yoIQ4dI^t|%Jp}VO6xrf9bvY3IQ*GJ`#GWpz# z0?Ti?He4&8aiEAF4<0x3r&wF7d!5u;VGGUB&%{Od!@ug1u{8;oXD$~T&3K_r>LT+l ztozkAbbGu#*7(5M^jZ_!_Ca=@H6BkP_e$<%y@#9fH;R9C17w4}8#mxH>^(_iCbFCb z?oLHmZ{pDNQ9-F=jb==h(U?_3YDTeF>2Ie7RwjEwr)hcXpXzUX<0ikC=%Sv`MFY}z zh#xW&va~z>lkp+SMDRsHR^@(rv7AcxWVXww-a*{8WVonm#7KRd9Fr(uf$W$ zaJ~oU75+RP*cW@fb$+udS7q?+RBqRR+#wo?~~ZBkG12c~xeu$yIfY zl#MU=pY>(o zWd=hy%3V;r6u&iQU2A7Pask>0@YBAjD|pP`A$U0Dd9m}b!IRs7LxyL>UQ1MQ$-ec) znj8q)PZ%GKm%kl{!N8Gg`!ae1H_#mW9U(pX?5d+rOpVZ?d5bL{km)Fx4E69*Z<4`R zS4K^ut0}jAgL=bf*ge>1I7!ZO78)LvA*h+;GY^GNbp!agw0@gi7$g1|-;rEc)QA5E zJH@(3t_!dQ8`J9yZ`IdrRs^iahTG!AVQgv!dL;Ns`g)Jz|6Rp#T{2x{4hv_IZ@@j$ z`#dx|wA2gMt@5hU430^#1v&H}Xq{Yxd3nUpS`a(W@@5(R);48(qMKq{n@2xf*R+hu zUSML79v<<~wF!`6->@zsi5Oaz!k16!M&=EJp>ZDT#FA`Rc(#WHea)f+sR!62qviAJvXjd0!23eBk?T=C zBdxLC9a(N<*8lL1&{v!r+uYNDwB@7QmftP*g|hKF`swt3J`cW4eeR8ZR_sv#J+sr9 zB(YU*{MH`iAN5^cS6G7mQ9fAL!mna0`JKd#^)qt@nT~(e8uz+o-_@rTtnTWW?`isN z)mrI?@ueDL-sMJgc4^(kx!x1-yL|T@(L(Xr>JjrU%q}!_EEjnf3C7O)gbulFV!O9O z7fpyJ7@fH)^SYb`&%MEIkob-m&I69+J(!xPMQlRfDEA8g^Xf1U@p7z*lkZKjhfd-A ztofOSHP241mG0_V*0oGyM4U6C?{%YZIitoUYN1!9R+&5_Ia;;eSYEU~ZIfqv+n1%E zlY7DazanSnMy1VnJ$T6jiwB8L79JJ!u$+WvhKem~aBniP_EFGdTFyI_ z?j3zpvIc0Gc?M^sKf^quey?{DbzBwUp9L#>2KTq6jg_~<9UJ#~OJR#s!DwRlQj`X36>nfwI(4%)}7_5Wh9*6F$FhNq4>ES_T}K2OX_!vD@;AyA19%z9W7Ld)rR%LlCE-cX%q;%aoo`YslxOmX;IpHon`3 zxr)?3e3ztDsLt%>z8uYvlCSOIx`HEuQl^_=>A*A>rC#tpDlOgdC!yCCcv~?rs$CP{B3evbfXKl^d#e*cCWo*)>l+!21vLL%4 ztL0p+p${*Z-aT^dObt{=nI6@7#Rk!z^syWLx8!cF$K52?pV=$_EVz=oy0pEb}Y|_(%Vbrv9+L*h|g`U+=X~#87Jk%PV_h z=0<~KY%FXv{hrLD={;N=J*4p#Z+vu?(T8KgHO3xY5PxXa8weg9lSKCi-{g-_Xe_H&K(=^LxMrs%56pw>?(hAwJ^X(sw#JcdGbB zw6pgjccA}$Qp)O(3o;iNj=rXNh~VVTAg6qd)5qktD*P@6Pk7a_{UZb6pG<>&Vcus_ z?st+C=vA~ioyKT`K~;rWuw zLamjKYU{SuInWlh<}NtpoWr8A#7}(2;C!~`7PZEGsbsFIgjpfyyF0wo@N67`I9=ON z&VLk~4YGH=e}?$sr$fIDk8CgJde7F)?oV4xZ*!pL2r%xeb<(15={x-+YwOUi_dhiK zM-OBcihs!a_$v78v`rrwbr1}n{e8#5x1sC}fvom)Y)#0t;zwf3`2Ft|R9`c{=dR3M zr8u3uvNl$&NFO4)g>u*wTc6}}*T$YzS;f`R1MmA9{?qp5xO{(ut<4Rs4_xNA=y?-8 z*o&lNN$#!oEs_5fJ&dA7@Y{SRcJ^B+^qzS;A9HGEs^RloidsbN|A)TicDpNU`*$LD zmgv$ualdM_f0y+Jtj~0Np|(xU(%KWwF4Yx~W2cju^EDuCIXcFpN0{eMe{61oo2xc^ zjyXHdOq5&+;>R7S9mdbOs<2RS73w!)^;&+KGxZ|#ltr~JcV59I+2^ehKZj?u+z-qm7seZ_9Zx4Kh9e&5!gPXOMgh0iQc1}d?$046qdCL_mQ{_bB^`-*`6Jq7!=3I1>tM5P>7x5^7*%kkbbv_5cE!p;sY^{~^v zEHBzxpnU~}jh_rXd`9X_$#qhPKat=htaWVv)V1-o#y=!S0r!*q03C{tiC@k6Ci~O2 zckg!8L{UEJWBeTdY<&LONcD5k-}__1Vk~2wo??&K!~Sr7v7={}v5#2GEqPIn!gn(M z8eg#7ccW6HAY)3OsI{sUITi8Lb*0bmN?AN}xI5gv9{*0Ad>VRih$*oLXJ=-osi__r zoFjf6^YXW&o|&H^4q1VDh&ujS=Ucr|8Q*2j`UAI7>@sCD4)bvQ zgz#?BhE_+a7Kr;ivse@x%^2$Yl%4<8jIIT(A8PXUuGMCJk!_E1nBWlW9CbGF=J=e& zT^|mn8m@pxvX7XU#V=EsKWp2bPd%Ty17|@WpelM@`axd9SzH%fXX5$=*~zW7?w#yS zHrU$uMBbTaD*P2V)A5Dz!Y_B*|E8mkTIUEH4?R%EN9vyF%LB)w?EmN3{{^w_ao&;L zAu*Z*zjtY(cV=us`QC6#(VsF(bQJH`ionM`B2KkuQ&-ewQD%;WUS%I8Z6)`)zId8E z!!X!|12VQA^3;sw?_D3*+D^{r)v`COxZUK8I7dd;A%H_td|molha)D^cA+csZd&iX z7UxXgLD$mE&>ryX*fYY<@b1q|&owzd_N*zrngK76<-cmqH|MpVb{6W5wZBBXNXx2P zt3HLBQa7a-50cwTt%+&Zfdj;z%YgJZvj1OW|IZLSLESaAR{J?Tv_9~PU`3#Rw>q*l zUA>|o#CH;38h#r0oOh6Q_&S#S3_QRZw;@(0GXkKyb`^h-ef|}9T&-1Y8+(Dr;Coo# z^{Knr)EJD&oojsc{^50kY12-Pipj%6pT~2;GJD@&Or0%Q%}DrE;{uh_xg0T9|L{Ta z)%na%N8RKcv0YA;UuEK;+p_Zvw!9%R3!Z(BSM%&3^F6&ja*lk4)4fuiGah0*^4E;% z9PByqQhi1%^Op0LxwewuSk^aKgC|!pa!tnC6mlBV7v+0RC=4)l!Uw1AEQ7wme3Ktx z{I0RqS@A@{583-bZdI+T)tb7x9Q=wFr>epXKH9rx=$RSC6Ol)tZhxg^R-(@5^2~4L zF2Ftl)7~z7%Q=$u-ksX#Idq9jJF8^i#+1#$jgM9R9(}E`g|V39iSOUk(lV_$#l+^U z-!9=8&1zldyysMw_Y8YVeH!ubn#BAU_Pp!+cywfE>8`;%bl%@LuybFATTKn&5`T%W zI2l@6XqVNwc$Mr=C)&6NKFNB|_S0=h{ax~UJb=r*F9eI@nLdmxDUv!%f!($Q!`EP*y7O6C1hWi*4w*$>mSaB&!cVn_C!pyG_^D}6yHz2>jkmp zpP!$dpS=VBP8-qaUtFpINLLW&;V^Q1>&JvaQ+HK(8U;PSj0NxSSqLatCA0&V|ch0QTx~L*NME0Qz?qGAq#&_FeTWk7a(c(7Dsqx)$ z?}9!B+vgbOLX%&fj0$iq|4;_Km6xQejclBZ*?(G2 zPI68%G3K?oW}Ll}^M#VnQa1X_czUVkq_?*%Z$DENbrtNC@=ym{q9>l7I!&#WUOKv9 zvGl+{OwO9RYrE^Xc~uD=Yw79IxrBu)Mi@@!RjHtO*6@xD8NAq-E<@q9CD zXU?)dR@>9wv9053NU=Yi@`gAUI6PyM3T(vB@!_R&8HD_fos;!=Fjnv!o(tnRo;CgO zmvb-cTHj{1R=u}P@$XCi3}!mIPs=@h3iv~Zob8XB1HMFJG9-l|PuF=^Ge&zeyFuQU z54Suqr>K*1SD<%8?E^7Gi&-%? zq%Pv`4$azp=mjZ@6E^w%M3#<&EOieSm-s+1{}(mA2jg!UAF+-_;|bk^Po)p&Zp;a7 zAHQyLi?6uWFXGI1eJ-oBtFb@uXR4Wtv9-Y?3nz(Qq8_Ntx^nI*oO@O72p!{t*>HpD z&%Fupi@s}ng;QE#Ann_>Z!6dr_Ge&%_phn=gs1g+bEco*&phALz0*xU1#1F{h4Pd} z1*1%z)%>)o6@LW#|0({{pJ@l)KgtHb=Yzb(4F;rha$ab71^zZqI1RYx3$hPme?&(i z##Fs9a}Zy=TttM|24DM=Ju$9~-&f$Q}6)?#PP3&H`X8qj|2X!M~x; z_vyfLlSZ!1bN%e;K84Cw-(@W4%=Xywo%SqTBsQ1+*j>fdK69h=E1L78Ox|j6VX(=| zH2JLsXU0cRCwa8kwLZ`l)uF0cx*P|2Pk6rEck0rnc(wFhVj0|+vc0j5sMiuXgb%zT zu(iJTC+4c(>)mVO^e?hX?-5%Y@$sX` zVXN9Ca%EFKv9-?C!PN#IXce|H7zp#%#3%Pc-p)kL747B+khj{bog*{aRs0W^AMdoP z$#*ch$fM#%kcYqMz+3p^c6H@qB^a%adhv*&cPTQBE02+wn9?oeZkhlj%r7x9AZ zX2Zvx3Q{I+C6~CatDGC2fqSMn99YMted7)}JI}W^Yx(g`3IA^D4LauzQ#u6C{Cw`O zvL=_E>s!6Iv0!7sCh#89UeJEMfw)iWjgPX5$DVlLDQP>~h1kA+o>}>OjjkI|7;1D> zlYgLzO@8qw8=jNZ!Rvydv4?AOdb9D3)ta}|X*D5d)(kc>{VwYYmfz{A!c%50@R$CVCZ@)`26MifgY!(E$aZv|Y5UR? zpCniTJQ(OStMjWfN0e+aYBKXyPEPV|Pg$yHXJ(y?8gK2J#ksax=c8imPKjIT50e{> za!a15itqrFJ81GZD@*`FIR-SoT2AH`=3@U9=Bd`OJDpV@y2d)XAwQ+}lU$ucv7d~s zqG$x}5OoD@?)~C#6OX+ox(6K_$~RMM6&Ei}aF@k7>krR#?JS|b#lFVA98#)bqo4C` z_^$Z>)Jtlu{6O{s=;xe+zFqBe-dwy{IHEZ(Yznx1iDf}u!C!i~$}n@m#(y{!f03 zF;s_~;y2*;u-~8ei0`G=>b*|R4L1G$?L*aLPP@O{sTK@`d$J?DQ~V<8!-{af*o%Eo zYF{U2qd$Uv1iqu=RD!qUMN?xxD5de1-X7)~nqJi9i5l-~qFqKl$*WBJh1zxWjaojy z`r>a@k3XL0NYnf8VMguS2E(brEGpWp>u>;Hx4FjnUDw7I@0x&GJB>H8HeSo5S}U2n zJ(?l@JY%B%#Q=Pgs;`Z6C$+!9xw<-*tPkuAseKr!N|^_6@k1NUDNH}On2$D3gj)qPQGJloNg;8mcXuVgHr$)lS@$-i1F`JWYkZ}27Z zB%fLO%z*U2i>$K*~|H?HEHYGL1TpO>j2O3+74g3I0Za{9OsV=)+MkGHOG@O)0CKtG$J(uUcWk*K8bl-T{5AZ1@G)< z8RgS%0Up>rYBD--WOk(Ck424>_~HEg63melPZ#>|^lX*X(b1=h+zw(R4hBx!zOAa4 z7=x zj||BSF*Pl5&SEA}ba<@wc1xi}%Sn1^qK2(0ULbdE5Wcg~Cx;C9SZ?)FKeqX?gfVuj zT$Em9aQ=(37iD!!F}^TZ{2BUw8*?A#2I6mT!@6ssYl+`@e~Vg|IcuGCCF=wAeNk)m zUUBYs#-9mF{$4r0>wwJ5hGzg`Ql@2oioeA4(J*hN*u-3|sqN{XJyCQ!@v&v#_2T}s2W@z0=L+4AT~>Fn&Y?_d zeuBp5sWkV@Dg{4+e7wzxMosEBI{MFC}9~l+BpX3|i9po7eLY`E|DSI*(nHq`Xo#PFzwFx~D#7xMa5V;rN*+OS5 z*4II<)bo%R4jnW2PR7D#7OV|DuyCN@oUGNkA-uuFAm{rRh_Axjag+Z)lXK);674gn zwelGjViu&<8^5|!#V+t28^LeJf1ijrg>x9S%{M;U#h)=HmjajdTHS$dbjco)oH6F-^!w2l6I zQftjK8Y>vM${TjcSiT+Jmvc(@rM~!sykiRYh5Z!z?jMcVkb6!{jP+x>$7)PiX=+Y7 zC1#&R=z`Vr8C%k-KKVTOgles7JeWVyd&pT=mH2-0z}Fy?Lwz;`&&<5J#u#UzhlqaH z-M}NG)zr{VUS}q4kDL~43l|h(j?X7)`*0}|CICpet*w?o@Y&; z_w#w)ZJ)KD^*q1J_jfPn#nBeq7R-?z(e!g(5R4aJD~0K>c!bEesW(?=mdDF+KG+-f zsn*1P?VO33Plb;dkJt&^tFhviR6Xy)q+n*g+?B$y@H2@1{RaAX-&D`NY$_LvzHxm= z<5K;3*z;WG1HwnaT7E6l9xE;po+T#SgPHaGTa>Z3uJPY9_C*iml2He>q8Eod3LwrKm<9G%KH9#&L6pUGeSvbLssPB16XanG9I!JS*ecvfb@?+e#zF??jt)l%sMd#^Sfe=dF$3A?jf23R~JMpVcqO8F&{Jw3>f6 z7wq?s$^1|1!O4%kqF3bndFGYg6odU%`R~fT)0fD8MC3>M0PA8qb9r-MeJQPlR+A65 zf6mSu;(Q{lTYsNxF*tTSXjRk3T=WMJJOKXMT%N7)6?l+&O03i5oeo3Kc|D8ytK3&P zoioWCDy=)zTIr6?d4&@yfoIfO$@W_5=&Ss_ErmUz`ykJQ`f!riwiEGVui{?^{4Vj* zuX4XKIewVGAo7_tYs6ZbcbEev=W`%>g=LO0{V^H?JBw;)bhg0>*E!l&b-bs7{fxi; zIOjOSBah}E6I%d&r{F&Y+vntH^kd=sat=<{oSo?$`F0*n=lsValQ%$F&O?tEUAJGG}$P+VK9`Y&VGo)299o^P4okY>icq zHR`X=+S_`E$zE4e%ef%2vr|uYPIfeHvv-g_=h%tywu&!$#MPoJyMs>`=N20t*_~S@ z{K((BAh3BsPX!N&UzGQFbGDr04V&@i;uQJ(M0{R!i{`#QF8;fWA-$?0@Ox`HKO4R2 z#O{FJY02#_+u9DQbFD1;p!k8oZ^su$i>>`NblH5=Bk*0AlSx0@t$Y{6FV1q0H9q#5 zV5ONcTAP|bUKwTNjv%NUSZHON(W|52DVs%H6wip6ryyq9gM*_6!j zqy5KOpK6V}#;ngK^mrl73cLq z=WMUSwW#glZ}GmC2lpCZ!O_K|%^6-6+qrert@OiaJ*(%CK3O_i_RQxDMNWd&cW;Mp zoBBBB_GnBpxG-4yZ%Ykba=wv`&!zI6mKBy6KN$U=djAv3aZ>s~GM+CuVF+Xh>+Ce$ z4l4{Z`lu&*H4MOx=|gS|>}>i3dQ;vVcz$}x#>bz?Ti+?M@ipK<`Y}4>Iv6^iReIN8 ziJI8zyJgw_lGE7pxau~C#s#tI$fw7<#~a#C@^%K_&&kgw2Y6h;_U@z4R>`Q|=+)N4 z*j&SXo6m5L*H(Cq`D0V#spVX|>Z+5_myB|i^j06fFF5V*#A$vX^h8p)?yk~Zrr+9j z=R1?veSA^T2K!tsioP`d_9Ihu@y-6TMz;So`&Z*LLCzuWQQ3nR6zYs!83!E&OOrNc z#NSFE*9Zc%qQcI&|17pOBkZ}YWX??ZCH^jZcn`MBh5k7I6g(fUdf<>qblj!Talb0s zxq*krhYR**{e@a9JV3ii^TpE{TPGE}wvX|F$PT8Qp?~rd*ZQoMp@vcCuRe(!D$Orr zl6y@Ij&{10jXmP7cn)V+|GV&!&^dE{oN~`PVyas+vrKMz=Tc|WC!yKzDn24W3Ct^3 zbBM4V=dbQx4gGA5Y;MwU_bl*lJLhHO%=bviguTU+41K zKQ3CERISxLM)2cl*;|t+-y`WcPNtdMo;J>T;={)_fH&qL%|_`6wN`dnU2J1XoZqK0 zVUz#8(9(B!$GMT6A3eQvm!Yxo$V3!hH-7j2;{7IW^>g@hsAa+(k?M~}JaC}5MgDd( zp1CSqW%PTTiam95JDGlf^HY8Gcf>yk7Nx#^C3w!{|6CkjY;w78^QNmfJACZ)a~@xo z52t%W<#WA&oy}thr`~{xVL}iNU`JC&%6PB3mFSz%y+D7dr*L9%{lBX zsyOUZ$5*!ri=l~M&n(Ww38^zzYjx(8(J{jNM}zm@iT+Z~ckPdvHFJdDhu|VF2y70+ zq*&RcjCoBj{o2HOYJ&dYM>X4*{VIu(2H-Bbx$}(;#dyj@e9m~v8_3hvJW^LYQpGyK zR5j2Yy56b%(EjKH@w( z?cb|Iyp?y#=OYJOXq8y;-t0jpck97IH?w}NwA%Q5)@0TgzkQr6G5vY^WqXT%>~K71 zzr@aiSQlEH6T3Z)4{cn**1SxF?L&-oGxS}LxTmQTtc_|-54ZgiOIJ0io-m1*n7GNh z;3Flsp&wgdDQcb0PVSl?$EW524G)JKUc1V>%J>`i$=RCd#i{uqXS>$+e=lp_>*lPr zRTq}Ng?*~xV(^X`{kt(^^8@>ply9GSfVz+O$hz#)QZp1*!(P@jd4KNyoVJUB*9CjD z!d^bZKcie9T3y8)UCpPLWs zt!h41YsII`hwM<6A>X(Ef1qte^LHcHj(X>1$dKvi(N{W4Cz+vCU-%eQfsA)mqs?fv_7;s>P`N8@-A!e zoWZDp)jYMhVC|hI|9Ht~W)I=T1*P}NcQbM}p2dE=`hG7$KW%-FsAV>GT#vXQ`WIrU z>e1*?F ze%FoQ!PC9dMKACi)LNZGZAsNB6Te;R|HkC}JeOBJNr*#^K#m;yG4g$Xjepu7)e*Rz zcf>PC2MNfHcFwDC*u560*$u=$6VZ1|e`kAgn)og#mnyTCch-jW=6sfTwie?B*!!Aa zu6M6D^QvA&2EE33PZz9zetk5c?XlPou~{aU6Q2_O{D-2RNcWpM3$yw3Gu2x0^?RlF zOgu%cl`h+k2%FXs&FG=cb$|R{m*7AXyLlKfS^dnLGRMpL^BsGp=3>n8RekG;*xPX5 z_8lD>{K@FAi7tKA*bmNdJG_iq*1={mn08EZpV;zG)mFC|8eV4d0glQXmC@L8M!eMY zr1~*COuo-NpW_P08G9s&I*M$eJmH)*?R!u1)|b90vKV_sb_H~nvisDUyxh|I80;y1 z7u^$^%lgOYk7b_{Z8}@?`&{&**gMP(=$5Heepk@gi>aJy)DZ~YxCjitxv&}MNuNU% z=B?X0xMNahyD?*X*0GnM=DU0H^F(GsUR9l3w6Xr5{9eE$AZGj@v7DBNYOUm9Gv+7i zoZ+g({%&n#Yj5-3P|?@4L&p{Dz5m5iGj1p+)w-S24EcF;X12(d27JFcIkhb3y{d7k z9t)lG)$;D$@$L`epWd5VtG)HYoI7nxqWzfhJ*u_h>!Fx)O1@*Pq-)OhGOfm3LM@9v z%(%YslDE(>L&!E=0_qrF}7hx^d8j=u{rgFZ;3g{~-b z)VeI+A}eS9T{uqq?9ooCj6M?FvJQOuN?2k1MYrZ}Q#uZKgLQmb*BnrBfXN4#985NO z5hHRV3?As0Z7XsZ4k71*-~-XQjCIZ`y<}uXi?hk_HS3E>hmhw^x1?Jlwi|4Ro$geF zw{P?A_H@1N0YJO@44V_%AFnoApm+*49s4rr`{jH+wXUu@uW0L(8Vfca#4gvE|o8neAIl_0x;@lywbj z(q|dF`;m;rEvz5cb;k|{LTg)q@oQpW#;=#Smz(}SPv)L1*XXg&7(0zA%&*ppZbzr^ z_N|!3%=?-GT2*U>mo7}@;x@*O#x^`XRX_NBWM^C+lGq%`1BwTjyb-moa1QDJr8fpW zW;G2gO3mcr3Nan?>EGTXZZXfF5={|0=e?`7IxE)GNqzBR@{XNBmMz%W!QX?w%RQ0~)tdCV zsrA78fubWEr^>m4!7U@B{S03`U9h>GKSm!2_9o7JE*hAMgQ%XR6QI`)@N9hi zslfI=iYn$h8v9igS0bLscW>SOMxyfP$;%HFA2PjLr|B6$0G*?g9+K}t9QA(TeS=$` zj5Z3++=d6Och?(#)cVqT)9N;V_CM`Ht^Go*j;yAI^kgUyjOD4)DmB?}#~EI8e1# zy6o45UrW9p_3!1mdhvJhd}bCK#2zFzn}UDs@%(A{&Ii$dOm6vtaJlk1;5!c_=Zbzg z2m0mBRDbeMyid#=?Jpvm6U*LEw4IrcF}^TK_=WhS3;exW?$uzfkiMf4#Sx}2Rt@fp z`l2UdyL~+?i#qvTO#jJ`iyxcZu&wU6;3E9i33z_L?1$o0S_>cb%%bg?SsOS)tDFHb zFE`KVow|6L+1s-|ss!*H#-zpN3~XRk8|R*e|39OGPd(p)Wwiy zfSrO_r4`1XxjmJ0cvs2RVy`Xk7CVb_U|vL9Rpr?K&FN+AySb@Y!-mv+gi~|2PIGSL z85{O7=w;s5AMlcmu9a8kcy`80gLk{wX!IX)?uLH%`K4N8qkS8FYvQL{9NT|yY48U{ zhrnQS3v&xPXOb}~%2m?#TR9agCzd|1FkNCjRrs8F3$ySY+9pR7TSO-CURbZK<9%w4 zyGFckWT^U)Ql^b^tc|>@_^!z%{xE0##)C0)lka{i_+m$B`#GG7SztMQehYrA1Liv@ zdFZs;8gDgyQv>u@(e(dW{F&)n)hF%~YrQrje%QpMs<9s}>vqMv49+YzvgEb%6T$2v^22w zR?mjd8lUQhXoKm!pw<=Wf4Q{J$wk|zv?h2I{oItVz9#;w#M(My4_yM=yPh>fGsuIe zA=;U>RFU{|k|IpF`FSjVx{4?Ts_D!n+h~O>qt4{(3*> z`_{I-AGM{L4mWw5jL&&Tc%R@*%8Gv3ALWjA;f}hYR?E;cbR21tw!`<)_mU%8g>@hF z7rKn^wTeCP749Mru8gb1Zt4iT>67G>WH!D7)zcr)Z5$P8H^VnyPd2!5hIHLGR;P41@KWG2f?XheX2=U$ldmPOV>|LXPN+~d&LbdCE{tr9V_adP=pBB)bKaHy{2BCo;QVf- zzc#e0HT?tABzAK+&l9nm0fhl3r|#8~!itoQ?BA&6&)WqXL*JSlZgR%9IJOtZ8>oR| ze2qDZEr?=iyJ>A{t-L$=POa7XgEEAcF2$Z#7nS^cA9>vk=*6uu!%>h++E*F7`wB+d z2fm>0MeE0y@7b7LU9JywgvxuYgAGM2^cZyUbFQ^h_~+hc(C& zcit4cqa-di629)eMa%mwIhzwcBbotzQP@VU>0cr?v$<_Z|1tB~>Fd`1mWA#La}M3y zW}}<#&3-997S^D>1(~n!k=fEZCNkNdEPe_4(i=0knS7xyi@Hwd8t*b_63q*XQhf%F zaJ9U;#;Y&KMtP^h&>M~Vm%Y(W&Fu+}!d?6Xfik9efx)-zQOQ~7r0wbs)g3f`n1wh| z0q4M;4?`ncYuP1c&I!+FWoxy6wD^CjvFB$}GxfUWYE3@>M1Qu)E6e7x#wWlWE%H9; zU#-<|?JcqwsEQYiDUC7t2HlEx8veR3Z}01nq@ZkM==Zp+7eL?+`-y3J@|bUFsl^#& z@)+mH9F54C2VRTIJu?&FYPD82!ciIPlNpnYGkCJzv9+Ji2Fz_xxk(MFS#`*l1Aayx zIPhvqj`1LspEJjwC+9{SQrV%>^ck)~?GG`w16kB8z2+ik9qx{~Onvb=b%a{0=WyLS z^?C2|^Z#DfJ41kbS7qK5pBR7Zh@z@Npq=#@;PzUE%CL*z3mml3HJU?tX51t9}7{oODj#*T#(P<+2>T#kjY>LiZh&S#0dh zOM^>|Kbba{j{CQ^Z#FWsbKd%^8%hl&Eqm3PJiEIUdQfz02G2hvImE4!u&nrY|qc!+OX= z)@Ts7u(osudO>LYwJA~aS%?QXuiWTy-{u8f@2Gdb1^b^PI7HcBb0a%*ssX5qXE+w$ zSrZ>s?nCHR-R=EGu+3G#HV1f?f2YI8qR*MN58~H_Ut&>Y^G}8(Lkw*RAob`c??>8bB;@m_9R0-el-dE?XjnFk`>+zZUp=qEcyT{nAH)U*Z^G-og@~$a2zVvL~GH3m0 zz4-xpOcCR)18(e>eO~0}a>!5iLZ@$y7~?2NUeYJ^0{frvcWEa!lorce#cBB3?ws|f z)rYnZsvr6$*N8QSygT~e<^gSKd^#*=JGgJGt+-U{_EQyzxdu%M*7nDCE zyjIiS?9Lo=O$vBl4$%Do5cu;)g1p4j+UdWghJ zO$uf26`3nl9{}K=-I4N{JMiMRv~Lml!}C#Vbw1YxH;B#1Jv5YNn%MW6*xGbE-J7$T zzjncvBvx;SAMP7GXyoLbiOsLbct4vnWGqjg`4gEZOy0O!LkGc+lqvo!Jc9BhNY4vQ z%;>klZ%tn#wdR?$b^4W<^QLkhy5_DGdx7--Ra7f?aSUYCJ#je(jrkpSdxx2P$S=K} zk`Kc?pV<9ccwsw;pceU!TK{rBovzE?Woc-HswP--UH`e?oO zd$e-@8cVCSnkAiJj#tpv(=6NHrvb|Tq z&R6Y#98uCR;0*8~XZl1=Eg0!1-{OZY=x57ket|O|4m(BD6kb7WEJ+#|5(3FrXJcVxU~Ze;xci~QG&kMz>yQqxB< z&c!*(3exQlsa|>CWvpHHc=1o7bII>xU~BW-F2--EwbHGJCWj`pn_6)ft*Ji7tBTgo zJf`$}>CepF4T=Vt+{KChB#}k*J$4Vfmt|(o;S5k>Gsn3DeV=S^ z6lWEY{+C9!PGPqD5BOms^rQ#o%&agvt1{K6dTMC%%)6sUAHTmHzjn7b&-CS9;w&+7 zjU=$K>Bhk3Gn3!7Y>eDi$wT9v)~DjLZBg5(<3XHvrZL98`F-)SD`&Ml5 z9l$V^k*(vHf_!h?Uu$BXI!M{zd=6=qe(cei(b9{Uy=BxI_6RPxU#Xw*rKq)%bt~f+ zasH9B3b^aQjK#4N&?80DQeB)AnLr+-pHsg}>^>{!_6&Y^|BC%h&WTzpefL$)_O^W* zb&Fbe=VRTg*+Wglw}!`0DxD;`mlJTO&Hih0CM&_$Z>Q>>IFC>3<+a5_MOIKp?}-}9 zH9<2`k6`OQ&iBvvweH}o#=~${oYlzsVtp5!x1ura>)~D#e`H@o?MK?jy9O~w^oqe* zy_~bTB7K8D%UO|+7P`criZA9x^B}|3Ikf4}zJu0l6SEUdy`EaLUJv#fdf@9iuiHzJ zw(q2`l(uC!CtCXw)fzMaUt;WT78$Y$chulEm>fU$J=X8IC)gvka^#n7&TfNkhDLuf zc;Ff5bK^r;;4UzE^>5{xrB51lccw!IenLfiYOUUpaYo(?<)K?i70Vv>cWAI(h6g{aric#L|1a*VOjEspKu zUELvLc=MRdvBH~_V{;If)I57-zFzW_=%b^pr=D3|h5RCe)2i^f+D`@O{O$70l>X2= zuJ9Cb)Dmx){1&mkDYmmksCS4zDWm=z z{Mq;$yXI_7>#CxiZ+>8?^8b0KtcT*?5*M*AuD1JD6s-TBHC9@0HfB^U3Ewf(LHpl& zJ0tVGOkB7=+(&Gyj?f*P0dXOA_Fu@oTjDz;&IMM(8LHl5{N2%s%{}OsQ}KniIR9rN zJ7@XA%!NkgbJjD@nfYvLt!R>bt@-`2qKz@thrg5kEXICzgnJ?P6dm4&z7YC-_j+o^ zCEu$ux>Io49XQa(8Y7PeD_Mv z)@Uz6-#^B_8St1{npx61cWZLC*nlH|y*uY^9AR&~*YugpqZUBRpBb^Tmx=e96V>|* zKNXA*?998b{V$A6*qE_%#%Dyg3Xh9lF0yvhJLumy0DEIy9_ul+j`$SuYrQ_xKhyNn zZh@af)5%_MX>v0D7Q=<$yPhn(_6s(&G4o%UH$)tJp>KQ5{Tq2Tf_0HMdvDg}lz#2o zJkqDbr;R-Y|EiLuxUZdVA~6o-Td+Qyjp%Ai-X~Ap=~;S4?S|YhXJGZt^)`0dE1{}C zg}Vj#ErUHrPJ7_GMbUi09(;ZStPq`Ru`ayX(DQ!LEz&QM^C`OKY##eK?|O4bUnADf z^I_iUhxuPXs|p+EU6tDa2Y{2wyFz2w0_I58#M-y{Q^wAAnO(YFY){H1)@s$`Ih6l{ zqroOt-cs0W>iZZk<2kg}R!^A}ziM*rj!w-d+UYhKJaBlq$8{~fFXwf5uiyR5Y@btoC1e`C-XC_im$>u}%)#tNA; zKM{TdjRBU$%_29d@Wz|N&BkBd-A8{B7UDW`H^Et%rBDA{W_^uZnTIg=%!^F&WCRTDVa=A5z=~(Po zoQ>y$oSomMdem_Ki1t15es9Bfc)y&Rsp(d&LARGwq2}uZ!3M+|tOM0|#NJRq^-_m> zIOH&YmzZr-Fv?)svoWhh)8r4)52g-iRc2L2>+VK(yy!~4d)J)xMK@sbp}y-^vag5_ zkn}$pz8&IKpG=+v#%}v zpP}1Za<>?rMSQFKCNaOg0dK-u_&62YUG3StsqKl4k4OHuLSsL|fl`%NjPWV_*qV15 z1B-1AjgJ+aQwtf@f|J(w@*r}|gl6E|Ij8V|=><{jfPZ)|p1E2pyQbc;K7`8XZ{o{( z2fnP&+S`1Uk%f^akE?6W(l+P3m;FmEYK^<=Uj>YzdNmWjHT$m!e&#*)^;F%l1MTsc z|Eb)|R@}>HxzEbjySi#aqeOU+LcZY;_?#8LEofav>E0^( zlzenk#>!0QvXUM^C8+VgNH8RHRBuD$Y{LBSxyFPE3B?{v6p zbMszxY<O)&qL-ASr8drG z_^0*V7m>}AtV;Ep+8OLL^z&%xQG-7hBsM=bcI|9}mh5Rpf3a3k`$@ivte^j&q+sT{ zRz|j_^|g|S^qAqH+?Yv;@LbC%r4Jqd4k+>BOjXlIf88{6{eSL zj?JRz??RK5A+%p^DC?u+{eP=?J$R%({;$v{zw?LUABy^p26}@;ZW9l$_Nl`oLm4*u4dC;oViqR3*(GkGF`;3tipbl21m>1#A5^F&qYVmRvIon1XMhQbun6o zP)>F%@00#C#djWZ>THf>$M8K)=3vG~xp!sfZ(dx%F8Jj=958{evUW7%nP{3y~ova zCzl8Ng*vzY<=iScPxe$_5H2$L5A5fx>8i;;LhQIc0J4mw>gViR+SmBc)mokTe$oEM zE*p|qU-y^J*CG>$G3vv<;+s7ZG`uxgRgURggSnYDUf<1C^V(>CJ)bO2x|4r#CM|^u zGjnrM^r*2huW55l8;$+?6y_RV=qK?f@DD5grQN6B>nHywsePbM+*q=98SA69?wFso zSkB9P<+x{c)g#GUCVysE@h9=8oe$ph6W{3Z_d}bbJEo{&iCFl6fe$}&=0eV^HGHAq!Ansuto*~fH{Ir)DDOJ}cX2{|g5h2m*U$6P)_rdRt9kJ8xA~wPSAj)&H*01;~ zra)7k@c9k!W9W6g^Z(4fG$U_^@3j`Vg8WM!Va-TmM%nBSz!!n}M+OhaZYVZ*fSlVc z$rf{-zf0NC&3={8PbKK5$^WSA7jiIH)bpRe|8pA+T?U4riehB)=bKdM;gAg5hR&c+Zq$As@iA7Hchy2#XoK@j^yj0B<3$e+!9lOXJZSE73+RM# zE{!+nQ`Iv0r_9eLzTYqVj`)05bNOso(m?9`GL$S<2dk1vp#Aa~I=mf62BL*+`ij2mg?MP)>jN3fxLl8@LpG_1ofo zohsxxq;TE4o}H7}v0!_@oS34AM%T`N*&Xgiy{D2N3o{Edjo-ds_5tzD-jBF2^PM!kHTjQ= zY-b#yS8U_FeN#Oy4s$O79jYD|Hy{^O%giSK2f?o2LtigU?7V|#e9k&leuMS#dLxGq zP1Qp+C)N)Ar~6O2U&`mNeQRGg`SazjAHZF^zH9vFUqxS;z7PljnRq&NDCvsNN!$eI zLtWX@s@6E?*7es^dbVcg9Pcj4C8OS9PL9U;eM^JOda6J2C2arC-MPo*`{Ivv&lVes zblc!O=J0nZ^LK=6L?_Z;vDeva`Wt-be`of_K52SyYOVOFcd56*;p{=G?WP9D`VF4X zJ`Wzm_YYzog6fZV1N`<4<^Hc(mZ{qw1w3kHngg>+Qa)H z{gX-t?g-fvBSK$ioM*6qa56rp?}hnD+TLkFryNZW%wZ;-(64ese1nMxy&k?UF>C4| zwN^T)Ik7r-eLO&XCjGIu#=y>t92(i2D8^Pg@SITtk^~);4{8wn|M36l+<>XkRO8$4 zo0BZ#4$-;fan{b4?V5@Wk&W-4 zRk23&IQjik`wjzK@C zpYa>qSNN^$|4#5D{b@o2u;VasL@)zuO#W2*ld(NlIxEfJ_Vv`PRr1ck9lFcBKg633 zZt|y~XO5DATjMVTlT){{AD7yjSM^A0c6pbAy}K6+FPfU}+mhQvfAL<_THVV&Ia`Cw znMYc0_RlOVIN-H7ATaU=1B-vGkdx zvqe@@e+?`9F@}RT!|b;TV?cM)Ue>aGJ9?e*nWP`qO>3ULIr~4;1LQ!@&Z--b{dHE` z3-##LNjj&U)#O_{sM%j67#NTAI^cgAhqI5g#@k;O{c;XTZ|}TR&%;OHm*AaJ-i|3Q zmUkiE=n>m~;}2slA%B-P>6pCb*N?M1(6jfGHcZg`n7sXq8y`gxWHw$6?@{6p|L zWg}-^YZ_y(Fs-H+mrtTwpaOe z#SR^f9dUel*4{My@s)X1M_J$tqc}(7(!qsOP0zHNm^Ed5$Lcl@qGt}z_F>44<$=xX z-Y+$0c4%b#_}yPTQTe9uE}irH$Q^YAZfPiGOx+M?QfrK~HCFk|UjZQQliMe!>F}Q5 z9>WVgLOY*pf8^ei4hLfU&B+c|)BN?t>rHI}=T+&utBd9vOnak$qp_Fo_8KdW#dCNJ zuLCJ){8=AbzsE)47$ZxafH+yj{!p1?>c5)&%fb7RbD0aQUh$>r5!AL|?{WW%)p_zY z@$g{O=}ondD*3@+_`bnJ z6JP!*^OKn=lcf4_RY!-3{3j-VBxCJd%uEpsPb$8kU~QKE8Ea4F-M!}do8bdAm@qg_ z;tTu2-@CSWjhs1qmQHdf>AIU1wZ_x?x4~ROixpX;M0&>myfZR(M(5$tN9FjqSJgFl zh{>B>6R#=9opXq@{8xBt3;s9`)SM~Gy|t;i=O?uN2%w3?8VU5j|9H; zjZF4!?%4>$4Yl4}owqq)|8#B5a$}}Z`5Z2($~;(j(9~bE|A{^y)~ai{t=70B=<89X zQ6=3|w@+%m;gQ87i`ve*IC;kK@6ko(TBthHmlGS48WkKbc@E5#x+GO+dRKWi5M?Rz z`E~q}vms{VIZ%C&v8q06h4`{mu52|vZzxHtvnwW50!RE=g&$Kr=A#40KzCNpU{{AM`_DbFr z{Z0%YySDE{ORm-6vD!%WXl0DJTXLQ0jaFN6cKaCTz*!ZH&1sAp`D&(8SNxay(AKT* zD(o`%Tb+vCFejh)Lb@H{+Wr7X7mhYQlWD0Mv|nQuiSRr8Z+(k>(Zd0M3%ywx+1xYc zLThs|7C2ylte2x8uv>s_rzB7IR_Psm$>iJ$3 zYvlEMa8Y4wV!uz?ZxKvFeHV5J4X$31s!43}e2Pq$xhu5HXGICy^ zoesZ;vd7_bPC6y}9v^h-q^^fOG;W4|(eF4T?jkv>JkKMGzsOk;dpAqHgPcRaSmz9$ z8)V)76-xfF|K9hd@AWL#R<*|cw!@6?lB&ySfGxiwH9z9Vto6OKpD^!*_^@lv`g{&? z&IVRg_BH46X_+w29p`F3{W1DcFn@o%`+kX?rQ75?qSMJESLUx4A3o1>e|TZ^-CY}A zYx1KedJ|2*jz31WkKFR$cb@j!-v%1ca)A9S^nQNw`w9(E_kAR@{M1>!n|;^hrSypJ zHg)uzdrtpS2EDcV<@*^NRa?$g=6S}hotwaTsNOSsOOj^Dcdukuir<*$)}>Hq{JMun zc5YykKTZ6!Q{kswnEW8Rk8)|Ht9vtgPS1>;c{(|noK)laa792S{Ll2z*cNQlJ_q!9 zv%P1VllNsm_=L>>F~4mI%ghpit~>c zI`5qST+Z_|yjO#(dbg6VPfW?NL!2HGFC$-k6WaXY+R_-)3vP>ZpwJKZydYHb6CZ(W zSyg<;+CB4eerf-Bj}K4xO>x2@zExpg*c|rQXkM#56s9T{eZu!`UWSNdFVq^ z@_$xI^#i(83YF&W}5vSea!jgj4znPqxt4_OnSwI{`+2tU2?l>bi z&>utWHSn*qA-loU-Jma!$s4aL=TMPPXT+ZfmL^tbE~}OUt5ZE0Ru@+*I_$%k+Qa6) z>K)rZzqWJ^dbKIKnpOIn!+J5%7s1)>M`2BE++1u{b10w_56K>4W{Ygh=)NMoy}Eda zu@Pn>dZF`kHl%v##HpFWNw8FS7QGpVbIyY17qtc^hd-@zJ}dR|J~lBC|9IDoRW6de1K#9 zik04PO>8lYY>cwru{v%}XnPo*wG~ z{{kN0;`B7XwINb|k4?DXJAyk*O|)8*2D(C*%{Km!3;hel4?sTpA^U^mEmOZQOoo)_ zo}+IA^v*3j^HuC|G|U}?^;g{ve!MEx&w;bHwJrR1;ca;)ecfuUbPZ=uhz$k%vB|$m z@OCw7=UG!(&aG_?V8c=u@LpC0t4t2wEu~wPe;ankw!&`VBhv7mXiqc}-*0VokuN>Y z({|99RDJ8l@_bCj=_;e;Lc`DDkI~1&${b@r@0FBXxYD(2b-jKV&$fY^{i}L()5Hn&g zpuXkrzml5Y!CGVO|50n@|7r5=`yS;g{$;&3eM;mP=5)<3eJgmL&%YwD_V|}hi`Y%P z-+IU9`RYoI34h)B*r_r@Cfqi8)zpyV^C+q=i;am)_ z2JMRHYWBB@Zv7Ivl`%&}=RcxfuEiB2qjVkFA@Yvh@Q$at z{iRPM&+4p-6@p#4x4PK+!?yzw>v-|>(subR%ABBdg7FQ$lZtO*hJw)lqoDt*yk&XK zvoqpWhv!dSFfR9$ycf^>1@v3c-#H_9hM}L;nYAVda#3XGG#!#y|5AYZW$G^+D)jzs zCKkpVdu>ziiC!@^o_&#bs^eb^!WI)-+3US*WXl$(%3y|N`IpT3KNqQ(#b5AVBO{yB z{&br>6r~X%hg(zp{m1*fd&{F@BouBne z*7lla9+aZh9CDm&kI)bE+o1cD@1?n9&*9IRKim9F_*ymJaXyz`Z!2so=zK-?LG4M} zcxYzDwcfP`gMAj;nJJlKrtJ5Fe?F-+azzfW7JF8y+1Ink=SH@#8fU3!S@B?Ly76z1jI5nF7c!Q%0A=jB+_;?H!`PHv z%vo~OmH0~QF8_1Gk3VPC>>lc`o$dg^*yP!<$yn?YG8XYxwZ@qv$7Viol)jhmbKmFm zJLbcSm3@ThOdHS6N5E_plV{$qWaHhebtT{Nch#DBqos9O{HEZ;Dtu0i#N26Oq#DRN z(lh7EeGJ=8%bD50>a+{CT=d+b5{sB_-VF>m&-hAxg^qaco)$%>y%^rmC+)s&LOcqEgiq-wRBMG#y5?+8b#(I=e-Z7My9?G1+Tz&w2=R=@8=N1Z z{p9SgsQsdx130csC#+e!2Jg$7wMCBCR?CVV<=lfGvA1RJlPVu_N_B>QPJQn^;@Waw zo$4t&kxx!*^EcSr1;J(F3u63epHyui<0%dJ4sEW98Qas0^@h6EyEE)`%3I1J<}+x! zW2?IrdHdw|wvJjWz2COb*7$@OOV#_Q?jyetC-2vR{Ujr&3UTn|0c-qK9ONqTsX`Hh z_g59I@4Yst)flx!t4!$+%Cl3M->dWm*bY3XdixWvs=zO44g>$xfP`9F{UhB|j+{aCf_)TPPY7Db5 z2~6M1e%Y*?n~!(g?tBW2s`N!|=_KPT;Ouz*E$~3FGgl!w62u0H8$-q_{PSrl*ZRzM zO25^%i=)iV1qqsqX8oSnIB6ZvZk?1@>htx z&wH;$KA7fKYb2sGRy;yP?gVKg37-~`M~qkbgtGK-;OWy z?@VW1Zk^0XrR8)}c$365DL2$w(MhL*ibEX)3{1b!+1LYRY#Z-L6N_AtsJ;X*K?l7O zsQIeA-&;c!-=WWKK}pqh^7GDlo5OHo(e|Nwq46At$_KkG6(8xEv$en{yC=KT@g2&OKNJ_5ysT5o_B-+a zQhEe9zg8GU^fCP7ZcBj86(GnJl=7vJVB zFm*R)yJv}fBh6$wsF;)o`PM$wo2%L1BEP#CzuUR=t?^}DiC*+d7tBNt$sVQ-Vnby8 zUF}mnZ?|Q)8Gpipq?@sYyTmr{@#LbKWkx!z@LN^RJoutM94vm?lYkW`xD!mS^)%nk zP_9Isrp6d*t?s=x>TmKxs@hkz*Sym`3ar>5_d&OAh-^N2L&45*o?hw)dVth_IJT*5|^b5bw zSy5U}cFw;nw!?IQzx|^93=MCHwu>&KuWX!mxnPpZfJv6e%S}H?))pz+o+fohiq|%^ zuJhIzyNSLCZ7-ZqF%vY?&Uq4g&j?ZVE$WGVh_`Q~~ z_@Dlt;dmzLc6+i;hqrg{7*VzjT?I!lQt&c z+)(9#^C#_rK7;oq{zZH3xsr{8uSofD_VM;Hez_+9pW^%Fer`|o7pg1Uxnm%^HYeLf zCZC9l8IlYy$ACCj&d!9I6kjLtwP8-1;Qzw^E7wr4|CPeV#I$Jpq39X(b4TV5laIkz zVFTWUw4v7Otmxak37=EPO^JSQuy=!VwZR)(id)4dCDwg9V{5KiPpx>W8na&?6JHa1 zvy2Qc5X`{*y@{z@-1^Yg|K5e%80H{xKg(R(k91&uh>1nk7u76R=1%Wd)=?Y^@r6rLom*sp_)i7bIl zp)o4!eD^CqpJ&DWP4_aWU52lx0^%eX3W? zD98F1>f<|we@Pqc-KYJieT&v_e@sTlc0Kfk?qlkwsLQmjyfUxqWqyM*S8J6&xdXlW zNi#b^Gr#kGZ}89exm_a9X(PNCUaN2dWc7{UW&OVJ#R*RM8*swi-d2;xh5p#aM|Yub zYvEgAxAGi#CKYjo@ozkxs#Wg>AD22Suc}ivEc-3{d+ZCO&v0fqTVg$+lY=kwE;I7* zHTXO!OF3Vdvl=xGsI{VjOZ`htd_=7)oLLoB?e?G>qp~q~w~i~=x~hK{bp0&yqcUqu zPhho%+(wMx_EbOH8F3_bA9eAo&i|7*1?6*-f0FRaAYj_dJd0O5mv$Kcc~$aT+;xO} z7WThAOmsT$y+^EKUc}@>Q? z+M!MUTEPSV03$t>|EH-dwI;FyrzbGoR&z3i>%E##Hrwc(BkFb!%l*Z+yj#ZWqKlmEFXdh8pjkkg5l)jONR| zJb-)oci}~m`EacTyWsQ5;=X=_ExfB-N3a{%dud?vTH%8eoyGnJPvoC4G^y5#Cg=Eb z%#5mhDoKq21N zfBU9q`ECHP6XhHI6+7JtV(%9r#~OlplH*7G**QN)c=Ims=2B;w!{4QSy);^?>XN_< z^h0W#>1X_m<~y}ke7Aopj&NhjK4Lurb>dX$+|kg9TK63ocGGgK=a}NHhCaK*R|_sB zZ*D|Apt2Xx+Y|oedOU~zx0S>G|P5P1L?=<;;6uw>t zzTW8!k{MgQ@wfexlT6Hgddc>w+v%Pua+37fIbXm&BL@HtbK6(0%f{4v*sFBB z0Cc_z^?=ly>)u$m_k-dGCg*%;bcexs&Hl4;=6EeHPQH;k+#7IKo%8n0*?aJ2ygO&! z9hvIog&sZ;upk#ZW&heiVdBR%t^ZoOHC)M0E;!jNj^{)-#$MB8tUP#-urRk=}LM_f*-&Z!(uXq`JW&E7BKnrR`b-b)5=pk_^ z%El{0bko6iIM=nJSYdLK{j9J1c(u;tXHyr>YO9N^Zau2m0V2`%E$P)%an$C-&X%FWUN`?iCgfFz%q^jD5ZS z#;@L(Q8?#**fo^rx0c_l8Mz0PC;Tnin;H)=4mca1)0az|x)auIv1Xkbu?K6`y5{zp z-1X|H+W6$vTHy!ae7TpCaWBn@^2NP}bKCCNzQ>az&XjED`~qFTJJL8rt<`hbi(m%! zK;H{}A1b(l{B^Ex>%xXcc81Och26ME)xYZv z#EkeHi6N%??T_`w8Xw){WTC_stMJUbig%fMs3U{$M`4DNI=3)uV=iyURwmz^ zxmn_9^fyim@sGa?-uW$h8EN^J`}Kt|*dLNo z*9Cu`{oMFHj!4ZT{@PbGvkm&4v_~E!Pc04>nOOXi{1P))VnB9)$=PO44}GUV# z*VE)RJ(5{u`u{9(k2kj1O&OaTz`l#*qX`eq#2rm9=Q1HjH&{ImE`S z&D8puvQFig{nDz|s@He##P;Fun(La={Ju5%lZshDKR%OJv8s;v-TC3?qW zlk(|dKXG!0?2Xu9DsT~>Lo77J9pVlye_yRtuKNn~9MiP41ubsKBRs3g$xTvU!?U6u zWZxl5M735J^~6*zYu8-0snI^CKzkYb8Zu`P@_4mQUliG#u9J((mqnUaYZdq3>HgQ~ zl;y!J@eeaz-!C^%`~%e2!@?(J&-l}Jc}$7by)ya+e-$2I0UjTQIM?X%o+l)`(`J4MU z(-Y>HjEb8d3!SCbiZ7OUe>ApIWn_DJZjEn{7$xylV_^HtY;*dH4CLO%NGT zBhHN7SB>3qyx(7Zr<9o&`se7F8t{}O@4_ByJHoF`?SK13>DFJsn_IK0_rfQzyB9?^ z2kDl0AL(uG;H;_=8*jbczuoj9MBRtUseZbk=>fVj876m4TKy^ZjeSuQGcKU;!x6fAvc$8y_NXeRmC@qu75ezAA^00NLTcMoB=JZX`p|pzwtkeDb*QYI%@+p z#!zdevv!qUZd=0dLS({k7Ku-Wd!AleVB}I|G}^q&&v*)XkbLn!_eV1~YFo+ToVN?~ z?JIrJ;N5QUOs_&OJ>RoctyQdHdg)kW-^~tYn_ilyXHJKIOvS~z6sp8lC7q0kACp>m z_I9|h@QI=SYRqm6@O|3O==+*zT-4xH%UqIHQo6PkRW8UG zp9xS`cuo292K4_YozRwfsA%(h^TqQ_kDzVACc!PFAJ!3TtjKm$e-b!X|vDI%s0JFI%fWEW_B+}4+_2K zuDOS0?g{yNRPG|#8}D&>Fk0w;6zD$=W}A4>7SxGooy$3K+6VP%s%|dHTVL5>;o;){ zCIecXH65GODv^ZWMSx7W7J_-MR|t?$mQ6ih;S@?!X+)T|A_TW*MS z>;}33yJWlM^9ylvv7=4CL*2?h5e3diC*IiqB&-BvdJXX?YE9P3RD*jJm9Kh;M z#>*grp=66%E4!8b_cXqJ-hJN0arW=9zv(&98a^-lMSS7}Hom_ed2X8D$LV+?1k+OI z4|2}Lx~q$}PI+K#>yOxfmH9vPuLdQR&q-TjLNdX`>vy_08of;agT~&g^J=~@<;j??&G=j4VIZ+@oO+`O!Hvp{3N-HiMWe1e7he^#}xkz zG19e3Wlrng?{nKl?|emiYp<}@ZulS0_if(eNg2+?Q1W&i=FDmvN39h$X!2i?-+dXs zOZ+LeHt^@#?AolhAMf_Y7`fN%Hj8~hS)|rV7I7{K@02{wp8xvX{^Hr*1+(3c1plmq zpYvpyZ>!=pM-&e?7;I$T_Uu|#_?Pe+XeszE{too7-bJkyZke93G5Xc{{u#Yz=8)@r z9?m+~pN~oAIy`gMBK_#v8r64GeuJUG=^}3#qips^2yNr)y!z1gCH~a6IX3;WcMEQr z1HPN+w%~7-O`+Dfb-ch!m|Cdi|MK`*ne$6}Xl>tM@|Q}$J79J z_pA-_aq&9nWOa`>__hzphnWwJA7e~@4CWCizN-mNM?I;kqkJlQO6&sKm_5R3gNvGd z+YbTeGH|0hbG24yUYpb!`8lg}5yrGDOgIYu4gHSSBUhX{g7Y}oYen;WMTNy|eR6$F zUB=DXn@#=5iA5Wy{?fB@yPMa|_?nJN^|o!F!$0g{8h&eQG6MXounKEPwe8sgo0Q*S zj??s#t=oMPwcC2n{YwMIFG?D|yKuLuePgdGt>adEb{6*V%;To_^)mqZl!0yV3+&;k z&zwDqJK%HTtM7u7jm-QJHj&=X>g?a--KleTx(As3-wFQ){fe|fCdIW9r(k^f`oi_1 zN63R}t$45{_Z!5v6wNHiFEG9!#-OzytR3=5kHB|kUwZ2vwI&rhZFZvnIro1PbPc?R z5*Hf?o37-SOl%Ib;02TX01W(S{vsuxv4>CM|0nW|vf3@$KA-)vV??%G4B7H(YQ`wz zlKMPfD9(|(8)A&jLsJ6QA&=*M4_SYpVpIh7SG#GeFWapdDh(9-elJ`UFYl>5I>KTKWinC=5 z;>WD*J=o+g3p5STk4l?`w#HSSt;Zw=*766r)57D#36)U~k=r$RU$h)BGUUmU^_TW7 zo@4S`PH|6h$Kd&_<8Jm{6OZT;93uLHIBiC8hKUo^M#{H;JT|1(#JAOLzK_0_xPKc+ zEVZVL-PHPG=|#~sJiQQ9r{A46KRisfqT(;6thaF8_dtRkB*PjrDi?XBzA7^$Bz0f{4DJH zUrQb!W!D4AIVSgpJ}c@4`mgpP2BF{OGIx9#SMXjg5qoefc>kSLeokF#rd8+scfwOU z!Ban!XF_qFU6Qx`F?PU@p`XuQ0UH0Pwdmz4&Z*RV+AnK;7w4yDnN7%B{Qp8KE<6)C zC&c`}$2;DSf8>4Mom#8ABNo!nZ}u+~`FR24=ZQIMi*@o3Ful~~qraS%Ar0s)#(QCo zN~cu+w}!Ic{$V_)DK*z`AbO{3|70~{E_@E{)2m$Tuc#FKp!VDj$Uys=ew95=`WW!H z9(2w#w(YIBb@K8w(8ibL9&zNaX8$AMops=y0R_wBmpNC+?~=}0PuGk42cGmZfxH(n z)q|M5#rP@x0Ly~~W>(jhRL%7#?JZ8|o~xGq@NXw4J&Yanx})gijIu}SR zl5(sD`7@od2hQDlEBBVs9e!wQkS{MiDfjXO&T~iDUVKeFw~Fvhlb5(7{vP&`!WH*q ztX^P0Oz9_Z_R>q$8t;W%!Evc`ehGPQybGR5AIzs<%;H$Y`_x+bZ$B=6V*FqoD-=eh z50*I+ntsL?tS)1JJo#PpF;HvuyEnTx8+vOf+c*wxuU&qJ@tG`&Y>fN$@J)#ia&MjU zHn-XO=|h-Rx=GH2dTmV6=9_Izz7l)99YhZMJZKy>IJEZKd)cQAw%Jgg>%`ex z&$!Q+*;OZ0bVlzur8oO!uNECtkC*RM=qLFVPl2x&BoE|FMRqYsU^ zZb)gI>;d~Z?G5)0Q_B;lX3iq#*2tVLfgNyHoHFCtAOPw$6m#~w_tjq_C+)}lT5#h9if#EXQk!^ zGbVl--lcWZO!N&~Zt|=~r{+2}`B#d5xdQs-3*?p2Ki?Z?GAHG~`q*h_e025k9Gtnb zv$kff-|W`V_EbFG=^*KDh;OS?H4Y=ZTEQOR5$O-9 z^FP@ulJCe|!AftCk)O4tg{DXJi5634(8lE8?Ul@V}Co z9m9^M$JFzvZPz;G8BFcw{^|GopxDdA5W9Qb1zXZSZ5LJ;9r0Vt3)VEoyiH9%NlM4H zaRvxBn}ECcw)m~-r#-|~d5_XJ5TW^*(CJsrcG2@CB*0>g)TB^mdM%?-6%XYo%+#>~)5ZI_GNy161Sr zo%0_GrdkV3^<3#W$>ktD^vk|1pEu)k`n`!6TJT%%W&bVmkThQ(+8EZ9(hBjbzX;iQ zC*njJgEhKm8T+EiuQ7f$_F2-jw7X&9iP% z+ivah)<&BY>)a&zeC*7l1>snwTY)!bWoMZj56;QbdOryhW8ZCY9y8}Q%C-4>4;Iuc zPWq+q&CXML3V8_C(*HSfdf_hATG7BVw@GB+^N@k8t9)~5Na%;>d~exipNnT=W)Lu2SUGAWLbW!kv~b^_9fn$(h*l>t}6F7_mB&bk^X6X_exLoCgq-=2&}$X zkeUl~Zh0On_s@7%2gn@8v%19Jn4Iv)k3~oD9v>`>Gx#%rJ)&iM5}XUaXglX++B>oq z>{N9}VD0WD-cpGR6GIaBYW`AdVnxjU_Lupyu?Oa}y_dE8)xE4MF9g3gcnwAlH~Gg( zUI+2p2^Eu-{|B;YRBEPVMPB)=DiHsz^Xr69Z#%FGSVjA#@qNr=rLL!~q}Iw-+7r2^ zf5_hC7nPR_KMCu4bgs^>lpXYW__>KAG?eZ%Ht#m)+)(=@`(--{og)a0oRBkxen!YM zt)KSFJl7DsP>NB~B665AZCE_a^Z_77(tOR_d>xycT$*h1@R_%N4E`JQ_E{Ino(8mi zn*E-_<2Yuo0rWte%=%a6K)m^L4)*b1>+3+9z*`P0`^ z`~|h?EK21+*TiSbnKM88$?!=dHy-m}6M0Vh9P3)2YF%7!>XctDzHD^mns^_dGbwN? zPF=K7dUtHYd;Oz4=i;9rtd;S~Sn1FoTh*GfWm=p2i?b!~i0?=m({_qlD?6nkwE6$H zrs~dyXNT*Y-d43%_wwi9Qxi97m$$iyb+PTcxVf;|^y_X6n#86fZ+3J08eH^v@o}-U zNPB9nXpi{}+9x?Tl@Gto*)DX>eD59QnSitxZVm1dnjtUmi5$t{{{c4UeDs^*9if|x zb4%eC<3nEPE;PNP8=R*FTT*^b%umes#P=ERyCi#w@qsTcD4D=|*zxgr6HAJNeGJa; z8w?lBMl3hG^t0%=pKvcH7p?s@t}xZ;i^YY-(#LfGzJFlmK=Fw=*yl5@^^=T@Mw&V! z_EXh9rIFG33IpIg`(nO4F*BURz!lc_dqLL9pF5(v1cT9L@0RM#+rhPd_-6k!qoY?9 zZ7<&dvokctTjCW2SM!{24Q!v=(^Iuk-9uZ~KiQvT`n~r|%~@!4H{%=>7Ckj*eO#Zq zpSn6Py2)4hMa;HG?U-P;Ljb-vz*oj|z&Quo3M#*PH!{QD%l=*KS#MH2+xS}!aSkzg zr$-c(UgqEaUua{9m7c9JugF#8G>)Ad|9_^g1WbzR+}5ykRdrW)S63Gbip+o-7L`Ro zB`ORGVnjqhL<~^|h$xOIE+|G}00%@7kQV`wxW7p>qLGYGl3|l5s6-J>Vq8H$g@_VR zK^<`3Isff@Z-w{1@21mJee2$TU(U~-Wy(g*78xV=#h6SE^+?*^?3cFrLH3_ACJEMT zTI-|@&F=}Vy)iCr`w({k!&zhwX!!H=bm?&>J#Pb!sK)&KCbTg<)<0{x$C_R(x7Awl z&Tdc9Dt*tfvBFH40A2r3{8Ic2>R2eZ$Y4W>rxm@=ayVOniTT z$sU8)F0ETQ<%gS^IGbME=V}f6yo&L+<+wGuBd2$%?}@VRrs#9YYk!8^Xf3)|`+_sK zvoV;FG zH+vVYzP=OvAUrqHaD)G&s{*YNeRKB9p54&zi0CHf1xBG#(){yB&}a&PZq zKf4RN4KB1=mpQvyIPF;%tb8Abnj>qs`LkhMI zc04eDNN>aO`LpP!Ag+bu)Hv^CY<_k@I0-sb)!tO)Y+SM4Z!k5Vdr=jl>8*94t(k)} z3v-q=ZI4RXdaY5h#mD}pxW@Riti{zlrPk`*d&Fm%S{L?G>DuECiCWEC=U%Zx=Hd-D zNYwO&Jdnu4e&VJ?2ORo_>Pn_p^JZ5v+iPL&`+0e4SLT@T(YVj?5qXwR~A9W(J$h7ZpN6KO;>Nk|Ld>#-FAVk;rTQ?X!1u#+#`l}4hIb;X2>~`nkLm+(d5#s)$iw^ z229iWw8C^#zi~MDtm z9VP50e*ZbIUi=Z(N*y1onLg*?4ByFEoRf8~t@$~oG((f|sBvjqKm5FZhsZ)J28u-9QYVK zljHHj-Q(`D&g)H2PcPM4eAuMcv{h;ZdtcM!A@7jEve=x6dob=al)MAEH#dGpuwMou z&dk1Doe%91_cgkhHD;QgyTUus{Vd%QScp?W=2`}J$o$vT4^PP0_g$S?D}E(o@{a_M z1Ug>PGnioJYj@5l+%3l3)VhV!0KM~MWO3?tVRkVn^Kt+_QU)7u(XEUyBYOS(Km))Mn;z_`v*SY0{qi4x+RW%uYP$| zgG72$YxX7_0*=aA23P7uSIwBnG%DUEH4l_&SEbg8Ps;bI_aBVL;ybj3 zzG?ZLkvR>;27_rZqiAy&&PDci(rjQzjX`L(eRM~3}Fv*(P(_j@~fJJR=f02pPO$Ez?wS=%8aLmThi<}8$4 z%mQqVxIlV#xmqh5V|p~*%wK*h+fRH7oJqwi2^;>2M6KzSSycyB1wGX#W3g?2ET|Ye zadC-}uI=`^h;xKh{$&zySF}AgF?);HY0vhqxbmjF#bbORd{}IoPG@&&hDu-2O|;D> zCuZT5hqhmSQ|@@N|LL38`-8-1xezwYq0q*i?)2}JJ_YKv;}bE8YRszEwLs?-u9CP7 z`c1aAjBk}a(?$*Ok2ZV-=!7v7ef|$;9yZv^`xCtw>^0W5RvgA=Zu?2VHm|^QuKKJD zz0aJjsp1^LJf(Yprx_RWn7TRk9?i37CRQaQ_(yMgdh3*!-0)^OfB3c zI)yU%{n9KC`WM}RW31jCc5Kky*bn95JF@4k*z;t6vccIP9oFC+$UADSXmU&VPcy@G ze13pC@-o}w-3Cv%4zq+v zpS0xH1=5z5pVFsAqkjUL6w%S{$&e~dq=6Qv6KpXh{!ubYAqCRSA z=F;v7ZN9Q|v`A{>8K=6^`@O_20LzG3LKf3(A}~(r-`xNk^#Jsy>>0YUThvWreU1Bm zYEo;`hI7K{PES+YaCD|zVr5O!J2l&#$dx?gTDzzrKHJm<&Bn|%&C3fCeIKpTtxV7C z@5A3i`>8YOR>HmE%-<-sv7ooTx21lJG^W<-PB{;n`l}x{x+lL`W@kiTyBBgV7+-Qb za`EKNN_^+F?9Zh}vwW!tb;>dxtBG?rsyeiRa*NK}x{owtX>yANV?+ z(>ql8)?XdZ8ZfSvJsJ8Ik92TO%>ugwF@#BlNd}jrnRA?x;q`u2>@hGp?CRa}Ui4v~ z#2hHi7t3IYvbbPgjn$Qrhu_?))lF^=_BdtlZTX`8c+Udy~L zI_@>-xFs3un_TW(Q;H{40{2PPwuO+lCzNtMo!|$}NXIoe>m)dng>;T z+{{sVG@jdr!at3ji5fPEi&D=%hEtWl`s0n+MzP;O0|7A{NDp^`J{t;Z zR#A7-M);<&0XhdE>SPp+H70sCPl|0%N_l88i1s*RjD1`0?=*4mdViXkW6~kBLTdF- z#cz$zeZ0AYzfa^0~m3vThJ?ZwA%oNktb5(3-)-3iGds=T2LxZ}HcH@D< z0drQZV2hFt+kn4j<=MxfY`IN2TaQ{@>ht1njZ5URPY>*Vi1VXm;A6Q|E3IdzyVb~N zDc@n6V|zSMvwGjoX3d6q zv7c$b)kX89)(GYd>NYiIQJGVh{)6bF>3x7N?LF-29^M{qw^BU8@qS3FxsCW!#Gq6x zlr*!a_+OQ?!{6TO+8q6%%=aosi99&wp_Fo|D1|G{4gfLvvOAE_wO@u_b)&D>q-`!9HO7XIK5;*RtRoFqIKy3ABZ0a*vAyeX z=7)nA&!lce&tY+msjoZE>1cY`Z!68Fr%l@!H=16IH0sZ_zZU1zOsk{t%-e(8O?~^u zd}rgEKa#-nWG+nWj>Cn+CVs2dWvD-C;k@gfZTbYqN8^p3xZj;7`zK#ybM~COC9t80 zH>-L7r@~JLd-)ybUt-IVHi$o?<@3zw5i>WTA7+2h&!vp*kg@Yy#~~*|ImsHlu*}Zq z>WJBMT6gphFEDogM}-+uhfIFiU9kTCv96U57dV4tKh*VA(RRrl@V&0~Zj`ta<^Sdc zrsBn^i&Hv(*EVNoE>QpKnhLd6Hq14ljU!b>cK$EsMG75~wmAnx+nh%VwmypS?J=N> zeXKu^72Y+^Tc@%BiH7ewuE+0{h+kX`+S^`12;t@#HSzMzc%%P0#U+$i$!+D_ifYE&uA{(Pf0aHSs z?TINnU$4R6C^pZl*xMJSxk#j|D-tu&9?7%rqRcq~9LjUhIg|s)r)b*FXB2MXc{n%r zR*)ZQr$w&C$7a1Qd&Cam?iPfXns`xT#?J3kYt={ACG28)U`K=_jGlTCcy9Ee7H)cP zMmc81>bOTPY9;Xj(r}!!vAc;`@{6hsTb)sPoDFziwH8||ID-Bi-W{To&U1mCxz-}n z!pOi2+!hAwraGGuJ&vFy?8I5I3J0wfx1JiqbXp$M_;Vdc^miR3~SObV*;yznV|Q% zIK9~H^Kj5Z?vym&7gGVW4q~5$mK*=cD@=R(?4Px?nCJa43z9rV`9C?daRB1OYnnOH zZIIc}q{{ch_d_jjgHjxZf9v|L$)Da+yvNKaQEMf8Ymj52Kh7Kzee)Z!rf+_C(dt(A z2y4Dxl$s&+Z|tr9B>u$2));TsKF$=Mxk$y!eF~3=>?N(XMn;u)#JJ*8*Ve?&N!Z5J z3(P-qKW*YKP5k7g(kx)wHp|21C7?D@5f z@>@4UhOmxH*|D?W%iN0i8E>n`nUwJ9_Pd`8pAwffa_yXviugDq6E=A^9#t3Am1=!G z)EHZTq`|j+g^%U_B(}%%kQ*xlHAm^M=;K(NTWo6Ax8-*m+1NHWK>V-%5DIN`wg+l| zVm|DU!l&YsZilb^aOz`K;{nBdhDY2m*v!BSQfu->r)EbAf0P&({l2LMi(`DLd#S5@ z)t{Qwns!u$b4K9|GkiE z^n&41QJHQ1h3)ZQP0b!LX9nQjdGo~T(K2c<5L5K$`?6NQFpi;pA7Y_vx$#2yLa4t# z5wS8ACv0kZFnrL+*f(7}+hPo`mH1n{i?P|UM&?XSeQtE?GH02Qw`Y{MxCggKF2YNOZu{W2QIkWA77om0TDQ-`(&p{rjjn+9S;1@`>OP z$w8CehM~_w)6ap_fztanHmS9WSA19a4zW`u+tpgh(ox|R!jHVu`w9b)A5=B~`+Bsz zEf0?t+BgczkNtYQciL%dodKXjx?79*l-^s?kB)sNRAvG6R}1Gk zK z?aTx50ppJoTZyvW0l&BRHi>NC2-!ZMc)jRc{1256IG8K}-O8G@J;j3L4rnv14_`Jk ze7bAvUN~n{*Fs;Dy2jM74GO=}c@S?<0+)W5Z}DS)%>HO{DDULR7PS;YuKtJq(eG}R?TOQgT-pl;0;tMk_)Z{lAKlk2XsKHYBDgBd~kD%5{ zCd@6qBK-0<@Jn6p|HS^Gj^6Frn!5F|wUdu?JBSRw4fIfk{|LPyr=Zq~kM`vMY+}gu z;6bfJcVw?Ly5sHK+r~EQSY~HEUld+s^jDV%6IVzZ?Hy-*Z0mK)!!t!+oI!ozKPl(= z1kQ7^uWXx}p`#b3?R>`dsXnG|rz7T>Y8lcYqp&Vj9OGtFzp*d7U%o?Htu3ngdN1L8 zWyTVnnZeN`==>w#OY>8eL! zF59edmN}E=QFCMSw?i)^{ge}6yGD_nYcNnS7%9)8yHT&G_t3*_SL%&&yeWy9<8u-* zx)V^OsO{2wi}%7$qz-LtQfn2LV?DM$hwAKH(GmARHb(A5v6rsJxxJXs*RN$>lNc}0 zq%qTI^xbasozZ@vF8h7v_Y#L>eoCzsE%nZxE%9yUJ6QX78^4eEM!j!mRd-IzGaZnq zXXb25eb>a%I+=gFY!-R|RsY3J^v5wTm3&IS%r8@Qzsxl^_@@g!^n%`bKYYl{=6E=^ zv9*JdU2hJqG_fFJm+>Cy57zs~$_%(;K*o<}Z4B+r;7ysuiI1Ik^R|AHx290L+2`ognY2)+$%Hx)jS=51oR#2(d91 z;)ScT+e9XO0=k_a*gCZHA|O%mcd^fM&^+bFO#Ix!z~YJwDcC-sG4Wr7W_Vv$p$?6* zm$W)5__L|^V}HGliPZ+RfsSwd6*IoI{d^>Q#N-z+KTGuEX2_5R|69?C-(dgG2D?kV z<3R`6`|6YK1G%bX>0!(z)chNfvhXgvUtl7MuXG$_c$er7$uZGpemwiQ*rl{ZCqx&? znN;CS-f{jUa+o^qF3-*#el3HkWH^(H@yyxoza&n}*kher=bn#WT8j0}n9)g@N!c~l zz1rYXHf9ti0Btq3ZsDxM?@mow8-sB_%?lr=RPG!0VT+b27jZ~P6Yx0mv%G8OxYfE0 zy|Xi6t2Y?EKQ7&feJcC8M?ApvYV}EXmibwoP%k>MFwx|37Ns;+s^dMJc}(sUWf{PO zwfKkQ^A?|Ta&8^YO87!zjHDTCt+ZA&SzA0PHvBZ$Nbd)#KZ3Sy=jbZIk>L4vX|Cg7 z#P!-G_C_bzW`j%led^rRzz`D|f^#5Fg_a@J2~6Fs*{xaq`D2MX)mmqi&?I?;ba*TF zN!fKUtc5;OeW^9Tc_7{H1KsX*FD%uEdlloNab{KmXANk6ToBqioS}t*q6g219*kfI zYB_(v-z(3d%>3WNpG_R{Na~2Oh1Q|JiSI=k8<@4T8(u8hm_MuObbMZ|6`gPQZ12PR zV0}=5=dhmY+UQz?!8JO+0ee$-wAR@qJ{tG4$-75*fqr!7;Mtt!k-2e$!LXf*dN38& zLj73w4#_Rj-tJWFRMO+XP=%kx{nMYtBy5S9;251j&~el$O?~kl%#5bI3PEpbtz;>4 z1QYnTxC_pq*1GH<@U`@wpY-&69@Y&qw&jz0sH4Q?xO_s!SKta~-*ZMR!~T z-Lcl0BK8U2_lm+5awe=!WA8;#b4ETY-1^CZl{(R{HewbsPks`J%({r#%wI+4S?(~A=|vGY^& zOL3}B6$>*9O&p-B+f{G?kV*xnrK(%_BW#bCvVRrZhI;l(*Wzz~T(onC_qu_}na*}? z{ft^G89SypR_s;k!GowFp+1`b>%&bKBxWL?=$|O>#j{mwWnU4iS?j@jgAt|L703H5 z`qtE+v*%P~AZWhMwRf>6*eA68HEeHAyryoV-T}r=sUOO5J}q=8)nR%S#6i{eq*}wC z99!WGf}Kyk!{ae~XsO`kvZlAezZohA^oAtRu*r_8f*Y{ z&b390E%Rnz>$P6O97!d^o0?|jW|==1oHZvX-BW;opG$k3j5g6ScBz_C8v_x@(1ryk2ameY1%pY;F9{l19%y)$cNNaS8EcG|DO zgZE*cl;-`_8Jqta?hTiiCuv@-70v${bt8QD7a^Z}XKn83>D1FHt;<%VEY9u9z}6>x z3H&RKD>5N^8uYJdV|4I_soQBpR#Tt<^we~b2{>ioCRq&R8O5ylO_U+W#CxTlmOYhq z?kcJCr%%M%Q7vB{$b`>EDzQFJ_?3>CjX3) z?IW{SNDPg7vrqa{q5timf6jK~J(7Rx(C4Ui3VXCq!ROSK>*Mu^kSX~;EVh31BFuQL z#pkqhx=x#R#^5>lO4BCKGqLo0i=oyXUZ>F3dhJZ_QaJ_KZ11B!)6iI9 zw!~HF+XAz~#IkyaTa2Cg32@X&52V$PQ=NqdXy>d?SzqId{MZtYclU@1pk<4n+A4NF z<-oq|_fpGr2!gv``UzoW6-7p9e7APql(*~+|M^67B}l{aB8OoM-$*r@o5_o-v! zmNSaqitWeGd*qjz9;=m6gUB)30K_PxKEm(|$gy#-okC|UY@T2H*9x7GHjWggNzDdx zm&bsfwcPtx#`eyfo|3;IWt|`2`#cM z%>L_g+=KetdjDSW*?B&F(pDGO`(K$_>u-u{g{Rhlrz+!0GoQCSJXdVyevrxNd6(}D z!gt!{y2~@Wff+tU1o&6D#~rxS9ohXRCbKfIIjqT!J;S;Axkm1>CsE6gsVN)lqkiP9 zF6zgrsiS2N-2W>%r6V@rx5h?4O1_vqGFQY`z^+htt=7%gp6~vZZ*!N6OZZ4n;$GBR*-j^yaw1(J zLmE+`ul3y`AnTFW`s2OckKQ+Yq1KEawg7G1Dl+F5$eg)|Eo&bqoBq4}0Efdp3J zE5PE`bn;U=Ei-PK5Gy#VRKML9eAF(mdE~aaQDUE54tZN1TKT{_UhQ}ME&QA5HT!4q zPt%8TFtR-tn>>4u9Wr+A$%U?!ldDj3MZ0A!h~{ei(|&8t$$_@jIe;Ea&&#*rN0J|* z?)xT74fFM5gAsXR)V=_3d{L8XIGA_K2x>WsQ)2ulJ+P65E`HcV`WxwpI2= z`%N$59}x%B_cA0q#LNJ#_wN!qyc6{H0_uWjqmmbhox*n{b_y{+wQfC9Q1}eYP1Hqg z#Xh9Na7)J4$vhlCWOVn!1bz$S_M|c1_2Bq*lM|`RbQb%KwDCo#W;`kVK2`R1JNEW; zqIWwe1O+VvN5vKg_(}JVrU!FaY-58j7S#MK`troSqr7DvZE3cl)Vu9?(-ZZjTQRp+ zpY2Vk(Ip*HU$8z$e~uX{re1oAZ|A9>ZEmaBw{OF~UF2?pJ)ms$s?66WKG5J-C|n~D(=lb%ZW)q@W85Cr<2982 z9ftXRx@Ii&Up4geEc(~9u4L`g^`$+tPKJL=9<0H9N$uZFPV`_xcZfWs?46B#AL;*I z=n=-6lpmCVjwqOT-Fdn5q~2^e&hWhGdEAS7ubzo`%iefzJR6@wTp?HTJkAXU8=hP4 z7356#Tl-5iHWYmH&&)rKA9`=bVhj$?4mUh|NvQnji@~UBt?Cc6C0`?t&nKrQm;Ani zjcN^>zoy1HKYu>{XWS$53zLeI3_b5bFQKwS&^M~{ec0-Y1%(?)`!Ei)ob*t`f40f# z04GFz{2!2yc-%i|WYoN@&gXXb7~jynFlt@qtPeXl#H;7M(B@QYB@ZL_InjeFaBvr; zZ7lR>;m=GCj{cP9$Ay8lH_-ngclUSvty(LZnTeiU9s9b}-vV1ybQ$b1tLv+?m&v`1 z0If3Dtj}tf|GDgwx!vmQXF~tGaCgMJ&~}JgmpNxOHQu-fI6V5dmS%5}TtEfRuwC>Q zlLP%EI$rQ3*_+TPxk6R9rq&hWJA5A48IcjMsq zZLQ`KXMyOc5sr6449NAdY5bcN^Qa zcVKfaGZS%`I`=H2U%EzJP3^i`D_^XcW9u#`6SRCgKR-}vErz4dqHWH`DtiXCr~_2K z^WeOig-ze2OY>@xv6PdnWzzb+-hb7^go8qJlOJR(RO_ZMGqxsVTyBf(ney;4;408J zd=h-B*2<>(EHldZzXwtWOSO?+MaM)O_$c7_YT4yyeN$Ur9oZf|)|PAkg)`K2tYA}a zi`2dFz1jus%v^)|XsOs{jA?%td}sPE`l7m~BumT6!=Hr5kATO^!`H-*+XO#uXu;+^ z-%Ruxd{pQw^}UoEd50e#GDkTt(Mt!QIAYZEvRV+xB*UqgdG z!r0!SZ{s(MOXeCy0SWZhs08*B1btRGsDR6Ht~(do^My0J>kGQSQl*& zJA^e4<-m5JtxjF=f8PHYdv!(1p6$w@jj6e6mui>NI;Bl)>pD`wmqwpnUKncRTb=uy z)QZsNsf*q-JxxpF(c+hZ^_{xN_HLY7Q2jXUDTv%- zUdlF@Sbdl1I@R|L!|~VtuSK^KU#lvbo*s+u)6V2s=~zdUv2o4|iZ*xFgnDxBvxeV~ z)Qm04&sl}JDxNc~Q|=Pq_E@z{A1TFWx_h6)Z`D5C3n?21W^JwJ!M%w)VwReB4c3?0 zVM-=@z>er+@DsLU){oXrSApv^zaJl~+$d>gdAMGl!+Tj8&yiXb+RsP4783Jk+_Ix* z&wsh|jL2uwdFWdFndj0YWELTNC?3GfVx6<@leY96mTVyi6{jI=F#5M`?gXKY;~@vi z!#1*RjWvCF_U(>@FVB4I-Ml;8`=D^R@C*0sC$PT9x{XH0l1?;6dV{Mlf*5aM-H6up zWx!b0HiKF#o1sI|`uH=7wqGf5RlNk50Q>BXvkie+&ORxN751EGbzNA zPBl4>v0`(oyhbX>m;6VsVmN$N-Zf?29VuJ?6FaR`tOK#re+i~X=)4b`M6H!Pc`$Ef z{>zB`XJx_im|~>-n-^5s-rr2Cci(jIMUej>`CF>kyadyIgVKqWj&oAfM&7G6_O=H38p-|p3oMd#?0nEYCa{lRveO{$nj$p3*Eq$no zsU4*n&KsTPg_fq5r?&W`v1uM)~Xy#mqa?W@tLpA@i2uk*E-vI+-(En@=B<9b~ZLyT^70@%5Oe ztlx$8qT2pEGw3UFgFIM=K4pE*6>&>r*Y$|4zf&IGB(i8SWYJxTIgHiOMiUPonfs-w zXKtNqZF2f*jnk>9aat#Q^FHaNVyi5Htx_JIW9*aWd5f(yHfHUX!fhTIS{s0v%-WuO zHsN=yO22IK9cm4kfKkGoqXv_Yqh4T-8}&lx%zq`WLfdaqkjP)4cT%5KU35h1D;Qrw zm$=DQ)%yy^^<=@}yj}FpSjhAG$j)AWFaMswns~8j`MRo51)Z*F@9tuk<|@BagdxVTlafsX>RWf*v1_)HaAWB)K~$_oxP@pd}e;8dB>wt<#L|Xl~3lL zH2%)1g`TG8rA=(-v@T44Ek5j5*#A!Vb-|HqLVR^u916|nAwNf>hEu;wz5kTx%_nir zLxOWe4sd>4C-lYZTz>r9|6Bq%ZJm@=S6;@ z-8C8isOwp$(JEzmVR8avXK{A1@LdJIQ}3T?=4!RgJtI2tY3RhAi8>bAA(X4MLtb|` zn>gW))DF{kyfsn(-=@`nM4nSlb}X~@ZI`Hr*k*U&ce@0WMaS_wor58zdSJ$0dP*-X zj>@4dB8^cN%>iZwd5XA~fRd6L*szQ5%0L^dB+uCC%x1&VdF5|1*2FqV zy=TUCwahsR^WaFsl+O>RK9Srvzn>~L7k@AfzEErIlX^DVV`A*g(ci)SgT^MKcb?DT zdsU{a&A&A<6YZvGQeNA8ebPtET^xnGNagIA*Ou@iYVbNQ0Ix%Te15JZ<3zbA9_B%a~Q_opm34N z_pOf=js$I<3hY6j;YW_0H`+ee+Tg&ym3=GAdIr+`nfWt~Jlq!@C$Vnw)LP{6*(b%B zYv&dQ8F@(T4$h!tzF4i5tuouSymm~PvN_!uRZirRB8;2e+ zFVAV$!>s4r9X&KcFmYlNR?nR!8Yy9rMZ<`Kf{?mfEZS0fkm+ohHO|6xVu65=a z8v8QrEi##R%Kky^*Au%y_azZ4i9QRll9uF`nZBwuS`IcGa6>FAl5~{E%_Z4 z&b-V#(-Sc&(K9k8GBy9+Q>Zu7G`TX{QS5EXf#L2yqO?;9luPz#FESXLN6-_;?~{Ir zWv%N#?lygJ9&+pG^u>2b#hlBg??|oH9gRw0V>TpaTQjz=^~<}M%b?|aU4D(vv*rAY z$*Jxp&($(zV<2^D_UTaGRy3RA%`x`s$w3dXQOScHGaXDH{i;&E)?Z4Wo} z?N-8vQvNJyL+7baES_k5)w@s&&AMwQS{`zL5I*`Ia;8(dQ<`=~4bJw?QvG2K>?^fa ze(OW-V-g?ZK2LNNWqvNWxb`HybO1g&j z*nW4bu}|2qq3b%{M4hBQ!)C42Z?(j4jSQ_!zA9d2;z)xMv(!&a#FyU7zGvdVgY$M? z&xXQ<#)qmco@CB2o4~{d6ndHN#aNhMXyoUhXt3BM)Wy}&VRbKfm+I_VdG|GV_wW4g zOfBU%nK4oWLpnczIoF!zQ^8jzCRtg+Eb0&2Os&=V&oAC$`b5qtvor3$kL+x?<<1s) zK4sc->E}#eVV5W`J$epqIC75{n&|+V=^QPVJLUI}&KzxW<*(#kF+EeXTQu+V40<9? zu4JQHYreDj)<=Rzg)gYnnG@9CS8MhCwnaNHZ(6~||CgXPRb&4S_6EcLK@8_4#AjrU zzeWA|{}z64_@xoK8`?sopHsq942^Ntn2sUrb-zzwq5mj)_6Nr3&>y7z%CG#sWfwu- zvLGAB1nM!;<<3-)$ zM~z>GGDAZ@-9kIN;YHXC{C+=t-zhXRx=gK6Zv$|L$4b3Uq@T!LY3TL=RMd|K5B`Mu zpC0iO@dbDeciJEShg*zyygfz!|zre#G{^sMBFx#tC_&Cop>#QD^5 z#bblEM*i$~Uyywg|6y<3+1N{MVr$QQi`l;V`N(q#&6D1U1IfFi3{h*P%Q_Wp47p8g z{n`1&1!AiVN4$u+DxFVMYtYGQ6@n4LGaQcnvu`wyJ0&L1?cwd_x71pF&RQw%0r-}w z(+Voz)B~~EdS7AT-T>cuox4tSJ@={B>Tf@GKE?@x7vQrD%Jwz(Qf<-dzOU0?r?t(@ zIE>y~wPP`y>C5QPITupNgiaOD7oS)D0_d=#XZ2CORlb#$)r@s>|E#6|q=dmpf9gul z)&vrFTHhV<&)LgETdtWyKRslr1!zRq*Ezw>@y+7n^L^D?z3+s~6rs0U@%?cvt^6rV z;GawiZZN!mWpJg*oe?KZ$3uA6dOw%?|1q|GHZg~BSIb?JpRK`fwFl)>+o3~A11FOPmd%1p_`5u3GoHhm3eHxhzJAWLzIpFbOrR6qYo7mt z=nmG^cTL2srlvwur^>jirU&YDO-rj1wK409ugaNF2gNx%yKQ{l)@eMSs1Lja^Q}m4 zq?7iEyCd$FzL%Mi#j2g1nhnoP$$Yg|GJJgA)`0CO?kLqQ{M4k@WzNP*)>Ybm(#1LA zSBK7e$SAc|dTmm0qtFcPitFO*r51?iU+3ysz?e-5n~lB_KfkAhrFlP0jt)he(`=hN zPR^|@p3nIplz`Xa9p_~4m0Xy_hYPOg4%Q2u7M`Z(syC^%ifv9SP7|LLwt6r;J>1wu zywi*DOwJ*FKW}kmpBB7&e2%!#n4HyRlTh19-Xs>sv~Zf4PeF_njTu#2RCvGe%PLMN zv-8W;8WJ3vXcu*om{Lbv*kW%MWUSID!{TA49(8WLtws`qWIoAE>PT@zw2tg%%7-A_$w&AV=a9A>4&VW{61r4sXN z3ci`261g@Hz9GHA_=9S#WOXWm``RP6Io6Mh9~)cla>Vf{TWavr7oz8jHeSVx`x}wlcR+5pj$4~NTAbS=wj#fC0R8OTzvJ8pKC+m)i`*yi9mS8tX3_7c z*6JM>C2$&d6!R+Q1-cyvnM`?j4R}_qRj%`{__rqi_+H^XlTVozekt|6?1$=)o+d3@ z)LPy95Y&_C^I4UMp^Zq)^4^=>TcUH~Unzg;9QgaY(DOAG@4~nII<0EM_QNC*VAX`NND&$Qn7l=MVB9 zKt8BW|KXq)5 z=CK40M)#<@iFfrvT%G>KmpJF`u8L(<;%^USni<`Vz6r4p_u})eX=Ph>2mPqE()Gun zcaQJO{SZS;+cqy0UNCh2Q`*Kbn>oWI20j$@xeC2z`mDM@m#M$?D%v~k%^VYAP*8^d zp*Q+fi*`m{@1nZLvv7~ZjM8-SWya1B9O0d4bPDEznLPM@*T!8JpmvlzyBLS~m9J)K zvJZl@&h>t-D*5l@AWzgWCT?xwz17+NqQ}p}Idit7^1Elj z*0nef?a=F|?_z82edsUH8y<8^@it=z9x37QG(pGhi!6Tc*2J7&))m}^za@r7wPR;J zhh;Vgv7%IuQ4d>Jt(A-_5C1Omb2IearLN71)cbb-tuw7n?xT0Hx6wN{MUR@;=~Vdd zn)l~rmxv$DQz;%4`7xnWEbiL z)EXxkI~6Zwt^ADK*MvSdfu0AYZSB^v>0=S&qD&*cisFl7!56>sf8}2$`*hJ~ZR^Ck zL_dn$yAAYKhuQ8*pLWO09o^gLc=NJ$Hr$AKgwe%&(OIZ%vlD>7Bzys%3kcUH{<9{1 zIcy>J935&JTr@M+It zFC~9abIba!ad`gppNJh~aUI`9?Wle}b&a++)LPja<({=U@AvkKO+|T&Sh2(;`#>h| zacmvz%xIV7WvFKlr0PsOa8OWZ;;!2qdoOnvUxx%#dW7@Hh`&djvNTq453o+fySYnS z_Q&U(x$`adsbynJFbw&fvGk@wljtV$?7nE9hKAvbKUhdt(+7ls#*`NZGyw`zeC#b=T?hr7d#t*+LvJ%E>Z zXI9l#@x4w?+1&jKXNBl2(o76S(Y`C?>{QP^$6%3fmY+&o)p>ogzD^6$-&)@muZ`8 zE^8c^^GE#C`nPSar+j`IK3|cy^?pyZc%p^YxsA|BnitB$zsT>d!tYM;rbvFDdsb_; zXW|!WxjiqdW*qdxnLnGrmh2f!G&!Jp|DWO~{sVp@=hWG_M8EuhrN(R@YRou`ir?pX9#vKpT}*l?53Md{ z{7~~6aau^XO?`=xWo_WLIg82gT1L$>Ag^_ST}r#LJM`BZ-W%q8)LNZSn^s>Kd$NB5 z->ktuM(&~w?t-)FbxdYV!Pf13n$U6I`1EbGsQ^DpVM#Zh=Ug!r+L)J~#<-U}_FkwECGGXM#vz#a$85s*J%FuQlFrPI& zuwF>(opa z%>N*<9mbzG6fBPVU6io|B&=d_=u@e0;pn747hwqSK*gm2Lcq_ep6c&QDEh zt#WgROPB!UwO*xpJ!eCn6PHivN6d2pB8a}nMZpJ>>*3vv4z^1FID<+*xEfatb6vw< zn7GF*;OJ`E_)JFiPdy96NUfC}TOQhcH{(T`KEF(VDSa`NjSE8SQ$V|luEgig<<4)w z%dGeCoL@)3mfCo}`$X?n(T~g-b&2MQOvcjtd)me>%6*H|QXSd(&VHGlLs1uX0j(;% zd|~QBsrBVqskNew3li8M55rV|4XCS)LPvI z`=^GMeyiU1<$OGx4{_#a@*EI%BIdC6qt#m3oJ;ac@>+(dHRL=FrB$(&!M)t%U18|| z>-2t!m9aPNd%Q+-@SAuH)3WV>5Bf{>i8+igD@5WA4L2_@^!gy zZCBJLN#D>1$lW*iQ$$DK3fVQGI6-RLI4f;XXmJ(x0I89`OCC{c^)Bn8btP=W3}y;^ zA~6T#IH2Kni4NTf9h%Oo9%SmxYG55`43;x;XBcdUcY}8g-uqwCw@Z4X?5&O-7CVqR zh+A{F<}~ljOZ3jncH5a;qek(eW zGN)bM=3ll1TO?jVf9)Ip8-qRDCp}K|%UHM`6#Qb2(!2jhS;r4&(98 zIR#tiKO;XQug_ssv`YLq-kn;jyNh#=8=ZTg)Q`zK8X2B$@&c=o|I&7NwPSmuF7a($ z)76pn6R$~Gd|<|)w2s^5?h;weJ*c(XLnmN0@EmwYGeafwxre^ca$3hth@KGMB!=Xm z(AL~Ooxn2cUgSh3<=3dSk_oI;(0=iB^yBFLEOEvfKH8PCwc>}vjKoFhcRUt8X8H); z$$g3(cbU__B`_#lI~%2$qt2YR+{)~6#>Z?IwKI6Ok!y8aHvMMF2kGwhNn0$?dlP-B zYjSG^KL`1~fO!+m@6?0J=9%RjbPuXtTF5>6FPb;iTAl6aU_3-5WF5}sgS@SQEDwuP zV-P`K??$JK?)$DRepSjTdlfIbXPf*&gTGW_I7@K;uNGc4@i(5W)+uUT=Dc_79|lZz zEZu&V`OKXE9fdngJhN?XtjO>x5bpkPzxaLBQ}j;*?3wcCq`aM{kWFU|&a+ypyQcqp zBk2cvko_Q(8xHuoGVW)3Mlj=5WF2K-t@DVS6>04A?B@mpP_5N7M`lM#9+13W9v&8( zwh_KYW1=o=PwX8gh6^ zes%LAo&%u;Sz$58N5z|s4F581dr?m;{7k(I;xjW6v4X2hG|Bxe$^TAj>e%D{U>h8>d31Epn~j!TJP!wz=pDnPbiy z?pRQL)+gcnkNZbVZq5rm6YEfGb*Bx!wc*#KZJe`r$$uyR4ne;F_cj!Fq1MWd{iSce z&wd}$*g()~ga04lcl@cxm;iZU-@a*0YRz3bokr(J=R4s0<@hh7!b?Qvv)+>V`ZMu4 z?UvC&t*2uS8!?A8jXi9~pU*{%UB|ww{LV)7)N7r~ehM8AA;xBj$D7m|G7#T? zDy%d1Np;rRt7{T<0>8~H7QdBe^_};f@l$rXSBtK1LLR){x4a2#E7P-6p1_0sFzhL_ zLL8?CwDFkOD&*zg2fsIcrfp(7U*PWIWfG^l5bs~^Ef!tL@86NSBc*+x6J3jWi1}G& z)>~KPhP2-KxA$*MDOY!-){2(sFOzOr_odd#cTN>kMSYK7X1_GOD&>iJRX4}Bma8RA_W)~@S5!M6|x(7No1+a$V%ag`tZAB=s~CbsY_R$d&lQR{ktR5fqK7wR*=@ zi5cJfVC#}LptCBbV`iVWpVwxNHugpj_uo=`K>O;g?3oe+gzsEI45HrnTb|EYcdV=L zVweAgiep0$68B8|bbZpdiA^{K^7#<81YYO7scR9)_R;jm5du#^yZW+y0AQ+0&%vjk;`OmbJu+*ZPMG zO&u)zPxT&lxpv-P>zs}G&kyc2^<8mbZ7|m2YF=yaS$(~uGz<7M=>6BC*NiQ9V`83c zJGTC9c-F=e zCx>=!#iP-qk>*F{7PbBYPN4C@KPr4w&^14Y^M_3xEa$!I`x=}dtgv^$kI#g5&Q7+N zHRt?&qSv@{#5xwzPh(S`w4KS~C+PN+1UATR{x2j(#IxG(+L;LTpc%&cc&FT_roGCd zs?$ThtOe(Bm(HqDt;?KO(EUw}Yb_Jhy3F}i6>F<@Mp}Mu!Q4;s9rfnR`Ik+fWA}Kp zk!c4r)((6i^FT(Q=g3m6$S*;YYOQoid#}AmTaNufoLkL#+>G~bNNq6v4zR%w@PYx?kRr zv*#A3|6^>$RGc!oyeXlzf7F`#Ze7!g{EEDO-{*qo0zH#%Ps08o!n=+?kBP=ejN*o6 z8D{|M(zSm79`nKVbB-i%7Y8M3SN@#7*7TOfb1n6tv zUC>Ur$hCe1X1j=-q~BVe?$`Y1_ztcb{RP(Utt_gZR_cfYsh8yZ8CM*awz#tUGy6+< zsOHY+2|U0Ud)72r>(&}<`Hu>A2H$;&`BsdL@cZqaS7eQezW8FLXDg4v9r-s7I5>q12E_7>5 zFL{RyYgyrEfzBs6ImxSL5r@A&|Df^3I!ALe^m*CW|9Sdz)2FG{kg-k$=8xN4(wO*e zhu^3D+_y~W8rt(4^S1W2I(vfn*R+2ciZ+Mai0Q}rE-p&Qy~vH+3OtiF0G)wWrTe41 zCF;RiCwQt+<~5Ta8=J1p*| zW^%RF(b016^pAFi+m(NTscNh8w;P*w6?`}P$S`&s`gi*LN2k>@ufo~Z`-jDzZ$zwS zNm13K-iEVP>lO~uwoO}M+bG{t)tB--8FM%ks@WN&4bGd>GI_1@jM0^~#ers~L%m-V znH(X`xe7SvtY>hpp}tUcr^KK;tAvqA`s|ZFTWIMl$cj~YZHG9(wXl9rOZ3dP#B*SR zVK%yYucz@|YOVCbyLdk7iZYqKZ+w>A#P>X|y{EpBbe-}7cdNyB+qq0XCoZC&M z9<@3lnv~}zK zapEJ4g&l<%5XQf|-{JxQ`i8_!wV0xD-6PRpsa$QOo#g)#U z{AR(k#TlZue1**HaB=2Uk)2gqnL5|tffElw>)DT-=5juiv3s4H48M=ek1XN3cdGa} zHBsak`S%;hXT9eG-T_lv(%xab5xu|w*cyh->^h5dIHg~en z+ex4|FZPUXy{~wm*irrPo$}D)rJvzex>^>E&fEEqA3GMWyTP|uyE}?Y6`!IWMy*>o z@BQt)BeUIk!Y}uM$Jd}1h3`dOaJ6@}d9PYTUH}~<8t-i~Io2f!JfHHgtTAMlj2t_HZZj>P zUn;7Z9keHp_K!9`a!0qLq4QH*Ra>|RGVPK0x%g*z7qFUhX6h`-X;Oz0KV0j(-Gw(w z^CfR|qMXflOhe9scSJh8-&-iTa?<<;e}nO@*lSEV!+O*g6LX3;M)pj)CTO)C`nB0p zFa6r?WMkV$?oiQ9m%xB-Z26mJ8Uq~hJ=i}joM%v%HPq|TocUkwVSOStQkAhYB2Or@ zxL)=Cza)BC{s3GO$)WAp4tYydTYZ!lD9RV#Hl_Rzsvf}y6AblrOFG}rJt62 zCoR!W;rTdD1@dJ%i7n&5cq@ay2<8U+O$LP%j1Rjs`)HPY#Ls79uA;VcnAg*E{!(_S z!L;0!m;s7P0`r{T1on;?w^8RmOY*jgK{R4LX)}EYrE;#idyE z!%#4{`E?HcDfSvP_%BQBVm)+g?*yjzg&9?UelhX|)!8@2uBKfgSd?j0e>sV%eqNk&$O`d&8@u1XL((Zk!sO&fPYB6@I_4`s_+GzT}%s<=ocKyoF z8GYBSXnX5+r9L;9w@17qCI)hxvr6dvCFEXLXKa7pCd}Ntg6E8P-{7lyiA^{|wbnY_ z#!p5ia1Ofx`$E&t_`Jno^U6Gf)xQKd{Ms+Bi^dq-65_P*Z~5+Ot#U(``9C6lrEu44 zi*roB`6-z7sj(eufb*bprgvrooP(MH+96|Y%kJ?d#x~~c8!aO^I#pCfUrSzl9PIN&z(l29{s(^Hd4DBjk@%a4uYN1}P>4Neabo7=wB5#90M#%FBayl2Mt33kC8 z6UGqOD_0(#CbIEV$j14JTpMecHO*fkbwTPJf}*vzdt>gErmIn?E!XkeiwYN+86u3; zUt2np+F+ZBIjjsUF6)Ci&OT6iw0HAX7PX6(O205;q*o#~u6gIPmX1J@82FHWV{PZ)+E-l&fHO`+P549|+&RWdU^6(y!33IUN>WDp$${zT6`sYT5 zoPb$)q_+y-JaCp1zeCynUe?n5BL5w!C8G?y%ezZz?U?f#pSLyYJ5eXhvmJ}iyT=w! z>9tb*#v7n#)*#hD2J#$6#iL*YC|SySd)^)E?W?nsL_S=P@1Ik!^#%>@C=;*FC207i z;_(Leby8qw?;eSdlX<)IFiOKKCGRCFO z{An}e6@m=^v}{ppC0o8q*jl+rVINWM9SCd;WKd$B#rAl+p~+otx#V>ryc)i%rmUfgJT4sGu_{#=pIT=x#n7aFF|+f>T8 z(x;&Ru5FmEuz|VeVO3{aOD^VU*l8<+J4HUz?i!a~YT|oSQx@ZBe14bk3%~P1f@WqE zCyFlM=jEP_A=59@@yu&WbJMPeth*_)b5gove&tx~hrZ;OnH@sgpMti#L?4Nb`XQcq zT6m_!2B}l7c1DXm$vEUr%r4P>*{lLFW0eltu={ZIwoRzo!2r)@WljQe2=0}iUpemh%nS&beauQVxIQsJXY>u>L9h$@C!P zvUbkGldhT(K$~`6_O}Ly`OQSnI0;?r=(W*WlV|B1Ofa)=dPKH&V^?ao#3C4zX_>Y& z^{#gAH8Bn9U(O|={^eYxyG#7lGiT3@7!mwk?(H4N#;N|3?^{-l&v6WxF{gUj_?_y4 z%0)8P*N~_Q*$ZqgK8Lj7r+hOzPpwJkHHf8DMI-SY)-ddfcNrgfS)#6zn6BE6YUQ>n z)hTtV;7nWcW#`OV2FrqVP5R!|TCm_6x0L3ObjR-w$Q)(zzqb@_F?CtZyq`o?9Ko5a3^oYQlJ~zx z%v0M@C%Se{(Bia>?Hno8nD}t7*w*0P=HF&=C6mL+#?EI?TnC&2>s$P^Z)QfTwbDWF z!1~tq&zXstM2iuB*7|}yr>EdKq^q{g>^Zzxu>S9&ldx)6K*PO zGIMwrgf{NIH-UHBCbqq;HQn0b;(^EGY`*u`pXR}uMRlc^d zZ;G0bk5GE&6;H))N$2D9cK*nB`5*F(7hQKIvG*;8Mnj>Y(2DzkE%%*o<6W$))HGJ@ z*qWK0?&y-f@G9cqkjXhVW_}Wz6imstuznhr-TJL{m_=t1Zb(}VKju!n+ z9S0v)Vhe~*22)cDjb0uU+CHEi+5c@GWB++vcAxYm@|_`|+ZWvz4Uc@9kZJRa3ZtH9 z&R$(@KP(7s9s3&eoKiM2R{2B8A2|#g_2sOpA)Em}bY<|C_`K&i6;2etEU{49T~(3A zAG<2GB+vI^-Q)aVzNvY8(6=(@U}XI)?pg0AESoKTrlc|I#5-g^(1|(SH{p0+XAc;i zUh60fN$N_@XH-5TYA}L-8QZUa`WGTwSW`46fnO21e-OU-J?u~F?ppj7b$5?=osoOJ z(r24k<%G;cW5-^Yxel=`Wk27Ut1-Fh^6&+T&;JQ=hV7+z;7-_?^g~6CP49SqpW^yb z9F=vXHYU>nvyX)b5%aJ2|0Fa(Zd+KiI(Mz}zgkYV=$Ef6VG}X`b-CmLM}mMVi=3mU z_=1?~d?sT=YOQ#!O>8lHYm28rhLkxI@&C)>0Dg+{g=Z9>GIC>7Y-Pwlva?MNcR&Jz z{ng-A)fWsNpMqWq#xACUevZx@WzKD_V{PW=5`AO~fjy<=PcEM`bt#{x&oF*>Jb zty3lO5X$N)zKvt6bqiJolBa|n^2G_E&);mr7EY6MEiux|f zDEJz|2v`YPe`UirO7;JhUcLW@Hx}Q)H3Bnyw25!LlG|wFTE`WSGqp_2D`}gv!T(lr z+}|L_{Y^{T@7568`P${-0=c94h!u=Vjlx>lIclxq1_u#a*5_95+xYn_k*(cY8CV?h zMtGlk4~H^VPOf#Vf7&PgfW#0MLJm&`cBST*HQ6<#`~~8E!T-n^(l1_>=*J(QUu)=U zGG=7xy&dt?%zDyoU81I|-bZgI?vZr(Q#vw!TwUJ!S&XGT=Gq>e!4g8)` z-ye0&VCW|0M|c&Tik(ak=GMgA9L~Gv9g&`ir>bkis(@F<&p8u$w%cCpfeOgUo1)~s zTm2Z}KT5B8=p$>7*oBhMGoy~;ceAFVOLT|mtY>?7YIccld#;BDLrpFB%3!p2CBEAi z`)?Me#Mhv0`CjHdWAiL@7aE%+@O_yp?ciRBGcW>wOZ#eNVB>h~`O>yuRbuY;TF2H~ z_DK(y`x=J(S_4cZ?jQUMyJe@?EjwVhjEaA0=reK$O77!)*vzBzS75F3hJQ<7(9KNW zfO}W@mlSGdT4K$*4%SrY*vng4+ZS*I^`hF(U6bgKSX#6*7Ss6$QO}_2h0tRwdi+G_ z@jc-l)BB*-${zm8w{^S?=#|izFp@h!wXAaEjZ`1Ta#BV|`Pgd?1iUPW3sms0LN)e;}u;kAYyXl{j z^P(?so3C|W8FIUWN->0kO=``vs=>@7+fT7FSQ&K3GtvK8b};>C`CZzme~kWU@R8WB zN}i&9tJZ4&M8^6DSSaW9sUmeef%$$_458p{(PIeB4nfifS zoZpE}#dzk5M811x_>RK~-+VjNq`QsUKU z`{d5-G?QEZd#Sc(3utm(RAK7JR^?Wi9CTfZGFgvfaI|@6D4cR-<|K8J6 zv(NfKh^uv(GXY1tJ^z{fEqUq*?+Jt5G^uct%#%6_{N6ngA9y-Yn6b1))mqJZ=##eh zRTVvCa_hrVH%OfMa@?a^NJ-6k4M<{CY-iJx&b4i}6LLe_T@$m_Vgpl`sWq|Vnwnas zZ49$h@np%xbN>@lDo@Q=StBZ%^)p*zRyFx_FP<|xZSBVE(=AK1cO$R?O>P?RYi9y} zROoK(^G}^mj1AL>?5p;LdzyK;)VYsI?&DFM^T~-mU;2{TCS=Tzu@UO})g`U+9A2-g6-x&62DNampfv7;F+SG^TK$elChmC`iHg$As4NV_1!JWEHU#CXBLX$ zzf(S}bu4z}sCd5UN7~YpUDe|NRxYhuIOT_%nl}4(w%uN61}#^g4W2c6S*?{`dn!@e zGcBHG>}~YuN&Joaq7m5-z0a(T;R7E`$5Of@x1#bak6}OMVF$^}x5qtp#w<&%Uw}U* zvVwC|d!Ua`)BiipU*%3o8(R{1ZtQ^_h&yVIXP#QHSc1pIwwG#ZcB<(GCf={UuliE0 zd#5v;A}M==VTw8mOnd+6=Dz5j~?MYF8N>j=3Nu@2KBJn zR1V@`lUfTct?QGvb#9zhq3Nx8-u7Rxzhgp4-c~1Swuuj^btva`YRvY(1%Eg3G3Io5 zZj4v(tn?Z74DNs)Q92a3`r21&u_&;!oQR{VaNkP8p{EJ$bIqPvgC#S5BGblYs&KWW-=;1CjwSu2GgYX<>hdffMbs?Yr zCV{y@TrZuE7!*!3Jq6{Soh|#bxWd>`Q*al2_e$*H*_`$9j|Jw8KA(}H#n8SrfeUmL zW)^6ByHDEIucC#^KAY$mf1|$F{kD8q9}3m1cSK3|9vB z-mB0r={gls+o{&7&a_lmDgIbW5lGVz?oOs!yC--f=SYRAU(_PaI*-MVnBkuAgn)I82Si}vHH zB0J0G8`PC)dDW+w$eW}BQ}Z)2w7AV}fD5Gg^jhRewVcFV%b9S`Uih8S5%(e|qVXJR ziWYbDyxe&?jV0bCvNK;Ea<>@2tYXBdSz1Lr*I^Xw9-_&MMA z6wG312^ydu-79M`MPDvqkiH6kT&)$&yyLv@kasAbkBt>x3jP$chitt1i$px9+_Stq zzcAnM(TV z7vOtE?w4Zk{RjJ>f?4p|&Z+m07v4Gf%w|^(jBRbklDyK1%kce?IqRqQF0Pdr3x9WK z_&B0vs#pE7M7{Sr$m;7nS7*PQ_C3A#LyK3o96CR4OXa=0S);@jCsT=S8zH_-f-Bsu8v!83PeVxjD){^~qH&R`@nHT$b3JK!?H}lc#zHHbOuDI$&|RKZCGWmEm^7El}ybW@^@}+%<;t z@Qh*yi4oZU^%C$5tVg^C$E#CrqVbv8JFn#d{Tgydw&RWrLD#O%&&+UV7_6^atNZn0 zUgw}N&o{+yzXrO3x|H>lj=@9Xm(su8>6dLWZIEm6c+64jXSmQGYho*M4{BZav(${9 zW$s%>4`c${uk=>_6N%GryR|yA!T&$WVG^(McJb{pk8w-q_|ox$O?6;nCVk#slU54*r?d(|GcYQ{Kyags+W{;u&YalagqBW*3U}P}TaE@_Lc;ES*YOTJL zxI}H&>YVco7unjOfZ z8T&gSvUQN_;_D12_MuEpusv{ok*D1tGXDy4K_92`PV@40CO`IeX^Zhs>f(}cyHU?{ zORg39oPofji)(vQF7)RcpKYuEiO3#(GulwfJoE76rPq7gL$DJH^E@~^*zgc`aV_sO zdqa5c^wn?6-j>xd6mfm3kE6MHU!ZUTy&yBJsp_UDEp4YlV1u=s{24RR_`A%bb|@@Yu@dBe4U`n%a+ZYlhnY{)es53AXyE=F z2VXi$VQGF+`U&D?>>+AWYOV5br#d#j@k|N_*gn~2bk4Bg9Jw#F7mHFgg4W3O={idt z`W+aH@%yJHGei&Y^9PCtj1MrTVvOlw+38!%&&TC?>(oW(Aj+Uk9ECmkS1K2GBybCS zug=hEyBs?gW)1q*b)9#4*a5k8RUhOWUY-{*25PPDc#y({=D|tJ&(K$?F|}I9`zQKM zwC=j5G*fI7b@Ic`!zSLT59-CQpqy8R?~5<@9(=QN<58x@I=(bRd_u~=B=<6dpJ`0C z%Kr2OKBrU8a#JJ)%hAmoj=pz)#EfIUS4Z66u}NNJgSMtk)W*njhr$%`4X(s*{g};4 zk9jkC#{XV?1Tk{xOvOH^HKYxD*gLT`){%j|BTr{9D0ATS^0pufp58gT z|EmhC1n+m-f9C-=Vq-4$d+NM;mr|FKUiV4)lbmIsWjLP=xSIhBT^jxX9JVTd^`2S?%eKN6+Xj0_fB!A)SP9@!FXayp3%o- z=5ihZ4n5tw(Ye&w#0Af}&l#?*G2tDEca*%1@E$Ga`aJa0ohBG*%1q=g71?+YvT

S__w<1DE}z)J)h<+XUm)Mn`YkAXRU2r{{K>ae2`!y|@W^6a>I5Y8E%-QZo zT~&YoN5w6oSMm7XNu`s_yj`_c&qSEHknH zSkxBvZ(SW;BQXVkiXt##ryuE zX!B{SqAud|SK$XfNcEC<;YjHrx*l?JCT7NITY%ZMqI*|i&mSqSkbU4(o!b02BDeb> zx2QYI??UvPE-5=TAZxKY;EXc9F*)jW{&RT>f7=8Nr~Lghmi{C$CeM9qrmLyH?{#eqH78y#I^jiJ)ZS6==m`8ReIc*}8hpj) z!7og{`pW!OQj`4(y~Cj&O3Y6GS*?|AJqQke?IYcVSvK7NI_RIBZWH!IxZ9VujL%fIi>v5M)Zqpp1BEVO}*#KgXKmiAD^n%AkS}N=k<=A72Cbg ztHAvipEfV# zpBwx~j1RCSRD3>+tq!?|Tp8tiEZ%M92ZQnVsRzJi3aG<%%Bis=NgF&6iJOs~ufotoABfKFZtCRuu z-(6kSKbR3yGFlnw-(v6oczh?sqvx>uT_<=>+M}KBX#AFv?URa@6S#GTT>7f#`nK$B zIY)>ps@IlNC`tMDmEl>UH_pU|8hzEDyB9`c6Y3y3C)}a%gxuNR;?ADvp5J;t_Yiic zDzW^ruf(sIGYYVW%1`jBx|MUt%u`J&+B)*m_&V7i%Fi(bhMZ?m_wzx;msIpnp_HcPFQEohs!J^qnvd)9g-byB~hy}QVnBzKCwdL}+b@(J|o z=EOFKMywZg1??$yApH&6&{fgnlGm!j`ovUC`RMG?QZrID2s^*yiu@I2PK^GDqwU?? zle{B)%jcO|u>CxwSv7qK)GB>g;*{@=DyaoG5wB64X zFiZ>2MgMtY!PW@gNO2}qr7*D#{&r8>k+(~>->oj*Z{pUT=$6s4U00q5M-G!2(I)Yw zDTn>z{^ooy^OfD9{v74n{QNHP5@^5W8T4*zd)*$`W5z5UAh>F+aCG&-5fal;-n#kS z%)BjPN{8ben;&lJj7ZJs?CJCrA8$0C=k}CsEww4NQP{$kn3rKOhYfy7Y&1fpRzd3B zL6hHxd&oQwd2jS{w$8RTIM~`$9~OHAM8|$S&-rUfIXXAc%tswy*g>{wDEH zC^M_QqR#W6)?@t;%BSv$*ppZs`{Y!u{4(z{6N4P>9E~SddiCr4H`1rW9NOXdk9UXt z*KJ%oKW=x{^8By#P7(|)?`)@>oiQ<~c$c~R#}to2#aQV^wN}5y8kw%qypgkYWafFa z{7>@61qwIV3jFhHps&>Pus=wD2L0WVx0wK6Vuf#U(I4bLFnltf$DbP;v7ux+lOHPC zy}cxuU~)d>dEhyc=i$bTo##H;vs?s+N|pz>kJm>qTC|~ioNXcxyhrPb8%!Q`M|OwF zAMQ=|8h`%O_*C<3@x6`*ghqd{qMYpep{H%8@ z@8~Cv?cwU3{MyuNoAOPjAAuNM?MJCKbZ6)x20TLa#^HFcwHZ5y2oo~$8qb``0ol#7 z{`&7tYF*)!TF;&^Ir>)VcIf23x&9K5)0f!mS}vf|OJgK{ycgfU)88d`nSK2Y{@0P# zX}u$h6TT}I&$6zqWn*4hSFleiaxXJBx2aT$0?IkgXj5uNC%Gduuk4RmTbo-LHzw8i zJoJe(H#*bctJml3{hF1k`*bM$QS{q7 z*%GcW^=RU+G-hB{!TJ?@-Iq;Wo0vn5QT$2C_H?suqJ6~!-T`j`-UKNb%!#%$USACU zAUQqiw=K~Ybsynhv4=wEIhRMvMdwftFD#sB>ZITMYvjK0?jK%(|M30f|DnvBfi?Y> zRni~LnEJrBUwglnJ3>1$x$F~ieX3Jw_#rz+>A0z*$lHhejMsW3v9?=)Apm^{%b`EpT6voZHKIhQJLB|MrQQ zyG`E~vBX+ecgj6puJu=4!uOq4e$KV!e%{sC!?y#4{exU#Ch4h?x8XZZir#{|jM-th zU%$%yN_-XCrlu69To=fjKKHZ0Zg2dYLY?7Z7+18o-^Jl&CZD;>YnFXxEH=J0UVJbn zj<_1D7ivFbh+$6JZRZYA$|2HKMkg-YLr-qlHTcC5Bj`M3UtLYp* zalAZV{%&Px=jiQ2otoN*`lmMkr18~153FAoxQBpOQFm=pYKFz)6wk>!seLGbJX(GW zdbN9SoYZ8g&o7N8;oR{{{hd~;^S?B_ZI=X>l;>*gZ&qt?3plfZ|36P+`2(0Zvoytr z(3G1Ya~1~SJFhHUX>{`SzU4;S5H932e!Y(7vlZuX! zLt<#P&)hfrOVNS#kk6sQG#iqOjfrEjKBKJ!iNUS(KkCnbk}ew z#~1UD$UczU&^xWyDUa--#XZ=ulz61ApJua^=(6@6Bf0aCE>P_QQGTABD-sC-=3ZD|4!1vmc;=`<{ zSS@vjr;xkrnjDb)1Ml)%sP-rfD&|mlBcOq>pWB+7)mr)gj|PvLeB*}FNF)DAp`G;g za8JG~+5Y+`!zau0s&c61^%f2{&I(*ro*73x7&*tN|M{GwOZ_BQ1B}zCy4Ww{Grg)K zTpOo98Qc5bm{>lvfyqF@y3oE1%iFy4ZPIrfI@4e`H)c1P`W<<$bd0$q)q6NRYiBfE zn8KUY=B?j5r)cAswXk2hmiKmXfaqlUNX!lD+C*b27rN22xXmT0o`t^Iu44O+#y-@$ zdn7*Ejrgc4Ar73mP`z&D?1Gy^EWO4IuXnCBIIg47KhF1JzH0~Oi?zg>z7YGJ^?mFH z3DEKuMYf0cZf}raP$>^j6fACJCwPIV(->neaIY7ic_uFZ$>9FtY@kz7Yp9D0<};h~ zoAWwmFO>PWQOE+H?NXDYXpC2ueM|Z+zn1r9+%z{@D|era!_Tm{w0rQFybI%w zYW$~Ts|}?$jqf+BaGU96J5;h0H=2NKo$ zL%qG%y;blw5I3i5$`9!tDPMXB@X22m$-@Rr0`Bj9(S4DwqY=Nve`k(Vt;;nR@S5s) z=SS_g!=F)W#dF&_Iox2?KFV8+@#g%y;{S{Wr^l-3fZ!_WC$z0-D?N$q&l*{lvGX8f z%)wrx_dnO&^wG>s<%ipc_z$09UV2DwsIr@Qo~~XG!+}5^PVJZeJh9vng;L4XtvH)i z@Bfe4jM2$Sp}mpk^-c%VOGplZR`^}^;HWipEP8O3hc<_N7H0CY?$Z(2JYr(C{MW?) zk$Ayzs+{-pD%bG|-uJrrMkA|J3#wMgyHgoHVSEX4zGznnfAXY@x5r_>_dz*9I*fn_)AM94NmE$2-mEI}F=b2gV zTcQ8C-r1=9dEhYX-JHS6RJW;aqks2rf#NZyF1jbauBCqFalw3vS!j#`{WBRE##Yx^uc+U({1kB_rB#)7+JD$#GR@6 z7vqyh1#8y~pBAzq@B0_L@4JQF(8HV~!+6I&=LX;M10V8KE}HwiC%M*~d+%KDoW6q} zg6ooN-s^qHBT-iI`Kq1nB*7~0K#bWpYi9whE84SrEoZSG8w+zJE`zRU)!^3|4&klf zcBYNqj+k_7rknARi0jk28uH{*ma6a+BRpHzSQlE~b$#x)A`d*r&s~dSuXk-P`SYXXa*+7@p!cVu&!Q=0bo^ommr_ZqQbx^AV`$~RkAtTwjn zionh*X+*55fA{+Mdh`7uVo#k{nO?@XT#s{{>8t!0ad91kj)Bf;{4DvI>Cf6%*l%R% zS3oXk-=kMzd!@fZAvWYYy&CIg@SXOn=qR`a?%~(@-4ZAAp7L*X zPJ>tx${0U$Qn5y6Wimex`zZ2Bj^75qAht3OLw+8ZQ8bqR!JLhSF(Y2y_b|L~JFlJL zt672m5$&HG%Gj7OTg)QQtl|{4R&mPB1Dw4m}_{{IXXI|-@(t_v0+{O0nR*B{5XSOWfZ(^wL z{dtCuYqEE>$Q5Jldbi5h^qKyJre?Itwfs@syFE-?Nz4`Zc8pWqS*;a@uwSZf`*rknc?K5v=t{P~V2`^A`=hW% zUECh-nOIZK--+HeHHE$IE~AUS^7~cH!MPK|6SMi#(i1b* zcbX8|T;Jun%SGN;-_NFMuP0B$(}}@AZ1e_MeVT zej?At7;R&5qdCVqr>nBLkm!DHKNHLBNo=gtnAn={n!xg>ZO;D9#N*WAH{ltm!#{Sc zJa5TFyV%bmX?e5V=!LQ;ds-6QMpw7cA@l=ffI3i3|dlpqNm5+TWvH8-A zeT6?Ck9T3+MAuvc2G8gt)dfA9m-3wHMO?S)H)kBD>Mj>sO7)jEM(^n8XYoZU0A zt%%Fpwy%n>GX6jVbf%7-tCB?~|JlAxrPSXg zhv4lnw!6-WMFyyg-bis4J>%FO|H^Qh+~28q$8IU!X0>kRU}RA9c6Ynrtf)25ahAo} z*BusG-wc+(a1$Ms=_L0Kew{ZJ->&l*+f(sro%4#qu0syb&Yhh*17~p%7k*I6k0Pe) zbo@K*0x&{S2kC`#dD7JI=xC$If1h*q#Y;_nBq_`{ z@q2gh3D7rq>F4OvFR9!h^BdphzBPHvf)`2tnfTA%so6vGW6KS=FS2=_BuIiz_)hY> z5>wFzYwp#txnqq_vI@C({a(Yu;U>;qQF>gSpZSMB#(y+<8BNSjH2Lb4-pwtneztQlS{7T1Uq@RuA+ns| zn=)2!&q#4;_N!

uUCuzbCRmT{lJWc&(hTAh%mHp5eSbvvj7(Th0w{F+4o8eaoYA zJ1~k`|I`5&p>@Tw#Lgk&Og){08k?GXH7td*Wq+UcPp0HgGI+U1iiew6kC<>BBdE2C z5h_Y8RP2fThFU9M3m{w_OE#&s%46@(+PMC@-1R0`-{_w!KFmm5{`d0lnfZ^GX0H?- zPPsiJ-%oyv@eX^C%X+oqo)orrs6Q0Q8ue^1xi1+#fSE`5TUE20jOhV7E^7qlf&K|& z&wAJ9oa->ZjB-VJ_&RTEqtAxVnjVlJvMQfUzwwmt6ypznn2P<6L>-gZr%uqNYOQcb zopP$K+66lKP)YT+^LzSuZ<{>l+3wk{^jYJM99KG4a)ZYs*&4*pn0@<`_a~!2;XCCf z;+g4(oRF%){g7w9lJAJwSiv5XW4zb3ILrm$qSQQ2wT@@*-EVTgF+3`zHnz4^$QMlh z;i-bvZrKet5>H6oMc=sI{i~7x&TWo1wt)CdJ}3J@&M01M>My&) z-QvqJ=b+XqkFg}v-Q1VXZN|%7D&}pvN2eKVYT_m)r}TAxp~-1q9A0er_D@dn`~Ab4 zCOuYL;Xse@Mj8yyglK2EelgowQg~S~c;pLWUWM;PA8fYYMSKS4XYL3Vsu&qIgS z+!4Q%xnJ#Ds&$3)_6g()xXJhu8^K$sKNF!Aub-_p{|4@FSq_t{48C`NswY>i6&B^2 z+;|f=O+&1z@#>eymrE?q`1D9j@6$SVk#A=*?(%jS9Lw+VhC2Q|;8~1TMSirw%Kid3 zfI0`RpY%fN*k_N_=2V_@lxyP`wN`Tm8{xn4jzIQW{1r31sav)o9t8Kh__0UAk3BhO zb8($=mzrG7oY-=Q);e}36leNq{a@$Qi>}~V&(F^{dbrd^>9MxRnW(kWW0T7mY1WU< zM=vdVbAF3?c58gaVM3kub&3=Igzec1k@r(~a9Q%0(YM{fg|7XX?m;i{-{|*# zp0{(uuT8Ese66nqYDPS3A9b;MHey|RM4KcZqGrcip0q=r=8Wp^eUp4+e0$Ebri}3( zReHA9@0r5=hMT%mE-TN;-p?-X49O4h+&^+YGWj1&WidFn4uv!2jt@ocU~V`>`~;rS z*d!}wM}H=h3&l3c_dqY{Jvpg(vgkL;1NrOpJ$g%ISe`Q&l)ArP#Z9K}z?f8@wOaG; z%&vGadeGDyGx0&OFWlP!tp}Lg=AWDwB)7~n9UR*JqqU{a$~c^9Ui&r{^SLltY;xB_ zk|Ab4UoT!G`_K2iC}-#0a5gb@PIFE5tuy_Z<{ov8I+ig`s5|6rjdf?mPE*GxhejX# zZM)eOsC9197%*pL${sao0`*l zLFob$Ki2p)W_IVb1>2i*S9u0vZ}>2mdbY3ji}>H>tUDAQm;Cuk*xxPT7K1UkrZ~B5 zAHAxdCqFl}{tt5>=5#J%A8yzk5-=@>z+)$^}Q`5QlV z`?#!wqwCeVKgD(PRN*r5IVZs%j$GTjw4$)W;Pe1jG0y>0)m5ygXt_P37@AnGN7%!} z6yKFBr~Uryl9+xzcX2QNQ*z~@*Wd`lxuMqBf7E~b#tNU`fW57C4jF!)Q7&<4_zdbY zE8V4uwo}Yw)Z*J2n~x}{zJt-ow=_hpu|NFP3e41dsoWzEYH*yT*5`}-lSCd^3z(P~ zKLlsmQgRD$>YYQLvTLm%|9{2I0)8j$6!qbJtf>#lcdcs~YOQJ+i^BnuBjVk;27GRm zH^-Tc{-BGDkGe3n*uveZc^};i$BK<34&gdyfBC!|kNI|;|2#JLQ?XyPiQR&U#+Hpu z{%icnzS)mOR<~k52ZJY;`jhg{o-e%*n@fLJaWU>!gWp zALDK1&#XuOP1m;WFV(fuxZ-Y+<-;7Aqm2ul3$ULrnBI2GvH|z3z89mC3&l?H?0N^i zjUG6&aHi1@@VmrU=WgDV{mR_CZb8A!5s2Jh%Q-#*Uv6Q%Fdl^xz6AI6?4|~Gxtg|Mpk=nw2WYu(rPWiRNb4LAMc-O+zHKfbaotM590GqK5c;MQaA z`Uku(c-qZ=ZZ6$w`gaz?SLCxXFQL{dFEJ*xv!Y%~)so)G**(9{xepmN;Zk;vDs(e? zsV=_5+`Ia~&ZZ=vz!~`bY`juXxSc$ znKk-ORlq;wenR&K>%A0jz~a!>k7lFC zje3c;Y+h{h5*^|dKI6yhQ3u(R+-GuMH>dDOV-s8Vtj*h=-1^J|V$0|wjm`ba@Gu_? zssy*dyMIaQd&Y#XNo|z2X%Xrjt?|3F@tFqSa+|-9`$}vFv6r8tE~arQ^W$^Oth!Ob zsGtgeOU@Sdk@39fLtf|De%so7wbX*UV$aVE&Ngvn|5)*e4uU>cYZa$=D7+yu25Zpj zv)2DHGEkM`T_omB#|{I7frhVdZQ*(OTiV2~m>r`&(-J+=e>43-%aVg?#?V9aFmrsR z(YLKit)$k>JtPK0%i)2%?dh0QwEC*izgF}WUe`MqJY(we#Ng3R5re1J>b(k)<;Ecf zKnrnbj2~cD~Quo~ic&cUJWy8+)% z+c!SN;n|p6ju=Y$gckviP2EEOWK2Ol!_VPI^#Oifz8~+79EHSLP<77M6sGzTPvMjK z{Oo8EJ2<3c%7SV^`(0tuYE1@tFxxS&(B8ht&Z=OCY(>5&yhHtwm_|we*3JoMny3~c>wUG^_o z{rN7*X~Olv?{DxYiZ49@5Bgqe_G_bmzUYL}xFgT!pEn$#mB`;R7y1-FzdT$XYTdFt z93}ejJlN~X6rXdgWBFjG2h)wOH6eON&V~ET*$tiX%*4iA9$zhbuNHc5P{H;N+~WP) z*vj<|@z2U{ER@e^v`Cv+}$6K)ymjm4p@uW{ai#y%0>MO*>x%Xi5E z;~#dDIX=o3Y%X)2{0;I`7k?qoe-oa6QEFaxx5)C4H2RlG{$UcFv#ps=ME`e(oo(>% zG5WAFv|MCILB>QjPrFkg zTC=8E1?NN6iCVzejE}~f861>D+78O<^6*|cciNrrir<-j_7h#3$3EUW-qeX0r%=v0 z)8zHyoAR9WC2GR+Opf}oK=qozHvpHl!nf0x*pnkSOkhq55e{7`k*vtz}D%yUfH}h|rIDHLf4DoL%4@*-$8n5In zuVx*rrM@p;re^3=dZF2$M&Hghnh0KH#$3&){cZH_l5^)Cet>$D)<5K~)V;tP3$~x- zn|Pn`uli;!-&Ad>wxoHd+lTaZ)fv5*w>iLt$tY8&IGCCjwmq@-eU)#0n3GC_1T(<1 z?jCWz25PLxv8y#}+#YH!M@rtQ1NOg9?j+e~?o~(NleHhRE^Fsct?{3c7=(AZCay7D zXI=AM4Yw+BJB+W#Y;c@ezSX6~aO#``eE{vpW{Xz-f0zHAIXmK%bpBSY(LavgT@%>6 z@p{MhAfJ#wUSaYflaq=s7@umdYkOyA=V#|9Q66yjqZEe>ZRq^6o>>Ci6zw&ANY3rm z&$+s^+TtioLJf4HA#=SISRQ+fWivEmcv9`;V% z{qev9=$QAS6t~{<@sTD6I3zQ~;6?e&lgiHw1i9I__fzY#&kOV z>W^BL&M`)AJGrNAai=;K)jTZvLaa4td$%Ke#b6uu`TNAzVjU9yNjg2C99bM&ITE9xU3NUQ+nIi7{(1Cqm_;a@0>I?hdzX%L>fR zGEQM`mip>g{4%kulZsCof1sz=Q*akNyB0VV>LS*-YvR*Iukzg4d%`{BXSQT_N?gGB z<<-RYpRUWkYd)^0 zevH5M1#~;-m|TdzWsYJ=u4x z{fBd$bES?$n|lEBs`Pz%8yG4jCtg(xuZ78nGxw!`w@utebU1x%wN^TRd$Qf+<8bZ_CV1VQ0Di#&w(4EmBZPK*X8Vd?K+v?)XJHSo{MbpH&Q!T z1s(D-a#_?BdWc8Jyf#X z1sw{uPkB?u_9OSro+AEO4V2V8@E+6d+zB5>t<`UR@3%8G(`E4&CRdpcHHU3~@2&h+ zli%2y+gjfL>Z%PHCEI_-J?$2Jj=Q7wbDq-#8=>%lY7O0mjef8Ao|$#H);-PCm%$?> z_l|P@U{1}n<(aOAmDHH$?s?54?RXP%D#jU)yq{XDd$h~5KJD`GJm^wo%a*whN!)b# z8D22G(5)ON!v9C_u*5;A*Z;z~TzpZ=LuF{Oi??OF1)mq)hm!gl#w#@5MgFY!8r>x38Zv5Crze@H2U*l~}@ogq4&bqe)jV(l+ z5%(WNGD z(>>qI#3|#7<4nA-*6O$B$8Shpi1GFG(CVDIDSUgQXK}V`0?Qpy6L%}e$Q8g)SdbpHK59Hne6RS?ClR(tB3cv ze-~YS9%aK(@gwDjbDXuFKdhkVN;uxGlEn}AjCw}Zcm`Z4@U9$faDZy9?(g*MOtB-Z zQT7M^gm!Hp_H9;~Q;5Iyi&XF1gy=Roci!un-X^2BYr>P2E=3I36MVCB2eF=$;!EsM zxKsXiA!MehM4ws3o_({gN({RJ-w6@`yU5AxjVEvyl?hti78g2hBYR%oON%;Zzvst=iijsBys3( z!TUNQ87XxQ_9~7Gx(T+Ew(_-exu)DQu}#-QZg25!H$C#d_U1@lf zk&ePS^RAtf`AYN^nJD^27Kgbg|A3hll0fG(|HE8d`!;>V7Vv$0WO^XBQulXYaHF{k zk!yLJ{*(WYiFb}GT?+mO)fZVEs%Ptgi_z%+Q+&KF@bNHFPx{R(AeKu7pRekw9SV-v z_h#ISqw+S!dOt7&L509hfDd!n`7G()ZkmZ z$Fk%zqvz*FtBw5MQLfd}uBo+>nMskw)w70Di|?nNoES|scxJV(aQ;&9DCW`3H@J=y zN{Z8rcez`1Nk+?Oqi;DXYx6TipG?O)_KW(79;UB#FxX}4*R}cI$a$^8d9|%*C;10F zg2x$r{7&LD?!;WkA?0`H>{=Zk?Mlt9o)G;Y_#EB~?tc&dE%L@q#lYkuHk53fzSI9q z-BJg zV@7nW=__1-4{AY00_4k`0p6D8+@$$|b+xnj;nw47|y zGuLOBcRCfn`$@Rl@P=LBDJ&vw#FyDG4Ts@zh|4rj4rl2qUDpe>;FBe;;q&txkHB|A z6EHIbz}pWhcZiw$L5{7pPf{FVc-cT)@3OD>xG{{m|6C*p6vhkbAG+e!YRE#jJI!*#}Q zVPCfPz13Rjs9$9^m9caEfz`3GJaIC#Bdm#h5qu$ByZw-7u5-GH?dHGF$<8t7^#FVo zZFhztmejFNV~P`-oD%wdiC5J5>WPqBJ{vLZ4gRT8vzXe~Yw-ubZuLD{5ACS^jRt?T zSwB#;v2ah!5agX20A1JU+d9Gm_c*~?^u}GQ0VYuVsF#|WJH&kq2WAvod;0Ul&X@PV zSxsLthl3&4gq9Pvh7Os)J+BKU;`u3uwRu~AS(RN?#$$U@$JF}v)A%#vcg@MnF+Fz= z!ylkO!@k8;?(gKzGG^}{{YPy2XiVB_bSz` zym|)e?FSu;ej*} zS}fmh3coS_4Dl^|7v4v;R`+XF;U9*xHz);We%#=2u<5nu{4AX(AC|Q|{Id$P$~_v@ zRjV>;Mp8BUeTco$y5*V_&+`r8buyche(WcX<$jr3m|D>OA$1hxxjlT*wxzZu>WyaT z4eFd)thN5BE$ge}Q@qNY1FkUx)Ct-S*5-dAaYrZUrI#}=8-C!+%UoW>mrjTj=5r{X z?V5OL%Tw@Myf25vo5e?^{LCrNDd*U$tH^6NxBLuEMb#tEv!0T-{_qNag|DCIch2uj z9-BPCIya@(&@FhelXL1$@wdnet#h+`U7Oz{zE1DekJ$=S<0DQ_@A>v%yXZsq)SrX@ zv@gWJ)jF+R&elMgchY&z%J3JGFS-t~^IliYE!qctMW081rYfA z&xet}qON!pdcM(rQv6bU#9J$Tv!SyN|2{0VIoPJ$k75fL|GroFxX=&#KO2AWKjHrv zZ26g}r)zGLe+Ro&tps~Dskp-EgvH?`iQjp5rb};E=v-^o%Jwz-7l_Y!KHlpi@FMa# zx5F^Mh#8&wj;J+yMxZNp0H2_J&Q^t1X12%=d5hzn5n0Zq4{{5{C*e6>nV)TP8rL{B zHvGmpRpM@ZrfOpulkgUN%Lac{M(gT!DL-LPV(T4&|C*`e052!+z7a}rIsVgfb%lF{ znSC~>pk_!7LvB{BRZQ2^x~aAPyjnvJk>UTSXlG{}U$Pt&kB7FNwbQrUo(IEL;_tC$ z^l|B9Q?urrXzl+n*Q90dp6orwE)NUsJd|f*RrgW&4a=joHl?47U;@`ZVYldPljmHN zUo0}l+BZ2gPR6q|gF~YRzN^kLlBZ7Vgy*trCEr57XSbd|6uYS`+UnyLB2}r>i*bi_Gs%kw>CdX;_FLsMvdsJ zm3rCxcV4a5ut#72z4>wHaic??#r$Y~5AWT8>;MxZuP$@p65rAhy?6MmO7$f!e@LyO$U@wXv*yd3A@@7^; zGwGx99+Cf0t(C3$I{$;ox76ls4Y9#LR&4RqQ@j=r8-H∾s%9{!`klwU}p0yYLv^ ztBZTIvfc0##uYEtaZS)S`;6$Wr=h#5<1!yF?qDWHqc5I^x}^#^e{CzDPvIhJq|OW9 z40>3tm9FT5UM=m{%?hkMY>IwraQnTJDGKwJ@rVJIIFb72=~T`fZRo}yR%^8<-C)<` zjDXn-ayG6Xn^-ImYo^+cpcY)x`eBn}IckWN(lP0C?oT9krk#Bp^OSiO)J0nzi(l#w z%!&SYB5ZWcg?t5Co|j}El-m7h>~m1gS0H%?PI&4}RpU6zJIm9xUA3mH?r%OUKCGPQ z!Q3&#_53{V#b>R*kl$q=-&g)uW^Q|3ae+QZuQEJb;+pn|YdG_WektE2a&H&Cy#RW9 zlzT|}$BCCFZdTicO3%&^tn=zjzw`P2Y4Sac&DUnuN`C?4pbiCPr#eFZIpnATpeB=o`LUSPNq6lcbgIU@Z?plX|dF{)LH*e;eU)j`Bd-}5JPwu zgFjZVYCVuuJI>X!gQsCGs^x9o zk?bhPjGi+ZI2_6_?KST#aYy7rnH$XkT1wTzIu;kWdfztr7S}YjaHQetxh};leOt<^L1N6~5vGe}dslSpxP$ z+9t*VtBVhqxgLk5=085;4ifAcbM?e#>v*5o>C5ph{9AIVY0Lom8K?v4Gmmy{o_v9O zi`eB^&<`(WU(~akEBa>pNlej~_9#=5IUv+69Rn4Q{{(xx4!t>))t3;z49pEgh_1f> zc%Uxy^Vb0ruJ!PI^ulXhu_v*4)VBl6``76I+2F6bMOFt+%Uxq~Dd+o&D~8Wg9Uo)z zGaEh2OK?g467iR4Th&_0K(EAN-d+UvHP79F_G+Kl`8!|4|D(9LVeftg?rXl|QLLti+#%Fuj~L$@gV!KH0M}JT_zxtisRWeyJKRdXXdd9kHix!#8eBYz>!k z$o-^D?#`7%q=%#UJBcBPW%Xs|nz4($7$v?=R=x51;9i zn`8R#=7xJrKJ)3|1jBjQ1PN8P7@R7lGtBc34lk7T1rXvdz^$rtp~Ku^u5eJpzRWAl zGd(PeQ*%Ie`u{b2`wLS&!kjs!?=NvC`W!!Y>+sAfms{uble`Lj?BUr?vbTfqE=|r$ zl6&V~{Q*2beBYt4t+xmcCv@gRHaOdh`BL6HwO0AVprmqQFiPk%vbea1N|vAh0`&Fk zJF>^M^ZuSl&2styoU!IJiRB0TFdSH}L-q1b@@yaUn_eHo7qKQ-Aif!Wq*X;#55>C# z6C%oFf9HR3$JH9|h5K@PX|UnETAP}4+OI-kq97)SYOVHdLhcw7Q$Lin7d>+ro`Jm*I$l%j3g?h>N5vD!S#fWf^IR9MlQ^Aq z(z8747tP8mA9XZv5l_apzW;UJH96-8{3W_3;+^T(y}HEPRE}|2pS2wOzZRIBd@J;Vek{JVzDoE$1khZ&9;Is0T*5y62*)nOyF=cJ^ma>jC(&K`Ktf z%s!>7=Sfa)7Va{0dSQj_v5H(<2ds0R7TrjhytXjE>@QU~mqnKuAMeF1^EL|ObW3=P z$vLp!R{I!gt$d7?n8l#)_1P7QBLXSI+c-OexdINXniJc*PaMAX4L%QSjcI&hxoRgz z3Wq?Swmz^}-wDwxatEnfb~!f2tV+HV?qBNp%J6QfwJn1G*)wZ%%XejMO#MpU)*8-r zRZlBrz8k7X`o90n`_h9=qOMDmswM-zvcoNB@M_wiW&atkrK#_9jW+%Ju)92Ta;#@hz$IS*to1pJA;kDOlcy zyGj--_)Jt#!O!DITH8UM+kK6~n%PIY-); zn~>^RzR*A4*Yfsq@Uqk>tMFTw`BOxv@fsC0e-#!d;14{!&a210u$SnXmPx;|$ ztzsF@dee7Dt#NmL!dlPYq5suhMebGNTTX$(I^0n+BY5xH<@!rLig`=M7qoYLHew+4 zovn+98XgAnL1|xWaB6n*ZN=NZ1!pTK2lebqDDOYRP3n6j$#GwZ=ep>reTuGI0k zTC4Y3R$ONCkU_2}^#b-4Hu$!8azAoJ`nPuawtkd_-=+V3Li8WO2=Pn<#LkpYzI&fC zKjeuJ#DAebRO!#^sz0Q-n0h+LIC9_dyNmMnjJAX|TK572c~7F>WpBApmNm6Sn02Lp ztBY%Su?7@hQND`UuW_dLVSF;)^bPIwr(q96=NI@Q_7mwnXHApe>A(l8^lZ<5+x(Fd z6Y*|Nawi#nHqK1fe>*o)ehBaQwTa~r7?q5IH?8(uts!HGP2P1ZzM>}XFV9THy~(jP zWpYL8@1K{iGkI+CLsIYY+>gZ!L9Xd9AF(q@A$v2LaIYdhTaNdg6fz3{{vA>(Mo3oV9(Rj|< zd>^q{$K#<72iGxcI!9r)AT+^?iTT#K7wuC?v6Ay_W-EXGs@>uk^52f zKlSaTqMci@%(eC9i~XfBeL2UOjXI$1+wGIWSZ*loHyll!i@i)g-I}1mV1yb=T_vwe z87{a5m(M`Cnh>2J{$w8nOF#$8c~!th)aE~zJnCn-v#m2OWMv0b}p%l>rBu4 z=jh*|-k^WGIgT4z0jVcrgIb6xNIJg{|*r-Fx!OwRN*HzVe}l!nOnP&V4QMZ>9kl6$hL z^>mCZ-eYRP&b%WBl(tj5TJJKPiXY_Fv++AG^e;3VFXJI$TDHd(Z#1$0sO<6OGwttv zomU*cj43u2Y;5vHyiVCH#L?|A>x6sD9GY6I9NLJ~EW9;=^@X-(EEf&uscCzy*2;Di z@>Z^HjTEOMpP`G}#nrLQttouk*yL0bFEp2$Wo{t-y$bwK>y5ryi(lOlS)TCgOaH~Y zsQ#U9!6v~|(TCZZv9UHerg~FOV9TCypA~&Y|82Od&Wjp$qqou1_>f6On-f@Fv~vXd zX1^7j&o_{nF76t`Q9$h3Wq1Z+&kp2XNXFo|JYYYDA?BhzdJK7wcT#@-!)5Me?#c0~ z+1wK%)u+${>h$k{nm^s=@^EXR8!kF}=(wl<+ zQ8@}*FZ&q%<~o+|9rZ59xs1UdHM!YY!EEE}u6OJlF=9cf)5wLpB(ucSqxp3=di1^cA+gxM zp^4?RTo5ma_4y8oE#GgW-%{=)wgFk%`@}z|uf8RmsBAR$e-h$B?GLDRg>#@)s|xY} zFpteVSOV@oy}miV+0+DwCPR~`ELS5-7Khxu(A(77SRdDZi&|GWTj6kEwv^~n=5vnn zRKF_E{a>kGyvp!pu_G@*H)4*h$wll9Eq<6Bq#8>TR>bnYv{Rg=rFID!%)3!RDpOtDv7*t!X3f=-d`OEt;!&ZnRZ$P~6Yj{IBFWm*Y8W;sNjv zL+3Qeyjsiem)D5tfR)|kw>32#;LwcyW$stw%9e*Vcf{H^brj$0!{|d3yG<`N;pQs) z*fp{9!H+_nUHc^Db=N+vTGL*D1E(}lYVndbB^9X$S(3uKhU7XZQY))NzL^4)t z92X%6-YJz+B1a|nmbnzXs*`iO4VL?fz~=PMZ*BdVD^fFkSR2(obA#Vo@DD>^2ZJ3f800zE zHdL*Z4Xw>TCf~UNI`&ZB@+)SG_nICGzoMJrWd16%S9BWVKH`Olzx@h*9Mf~tjqa@u zZLNy+GX1-1t$w#5YA~E*@1$l8H@B{k@25N*QM5ey-xYr_zHzI3E0cq&iI*i>Z{HFB zS7Pd?zRzAxHP&{^x*)!z%9uwhJTE+wz>a|E00RmnwMlbAzArCYOT)w z!JNf84-1E(x~o2;*6K53QaYJ95bZarwYtlFvwbBla}aZ>HU1W$iXrhY#E0+MtGdNK zsKiqzP@gQyTmOpl8ua;+_uv}HFny}}%=qYr^11=sI66n#6MN1Wif7R}6G}dWx@eVa z=Q`bAvNNU|{0-vUyaHWUi<%wp@(k!JwN`ie2KNS6V>Z?n)@uHNCbi~#%=ykDf03{K zoH41{UL!nJXB?0BT8aK;U5n{Zs1Y4_GW6S;;OBC$FTuTDTRKKd z>fPT9Y@hqQ)U4{JTs!g2$n&sBIENJuAq3x-#7dA!_SR`!lUm~}fNT0FuX??=;u&_y zjIGew4_&0z$~I-)tT|t`R_9ymE1u`;p(iK1lZ9iAc!MiSSCme}^V5f!5Kb`jJ{nSf zFX!XveIw_&x(n4+YOQ$u_PB?c{;a8meb_hp9^^oNL-KwDxwqi)(BIP`?qEJYsW{Hu z(~p9W)O~@^Gb)AatMjOTxVHzkEe>ss^<`kHwLGh}df%7BmnCK-4p6Ptzkla{C%8@C zuk|_3qgUs}Sxd*`dFf+J&rZ*_fMGXB%Jh}Xd%t2v7}7no=CS~wdku6ag3Ha#9p zSNSopJ3du-%3#a8xW^lvMqX=eD?1c6h+MsbGhK$6Q<{HE#|C!4rH$L^r)u%Wux<&OFt=lWZtHnmw!bUfN^M{{jT)!6c zBDEa8pMT%P1${hQZ`uqD*f@Ni7_g)9pVn9B#g8hkv7I`D|Ar7N*RzCi0zsmc+K)tAT;y zgyiqeOkOfr{XK{Vv>oY@vAMVfI60ozVEk=u{u{{)?ZbOr;GJo5J1bFdqJH}w?zLL0 zdrkbgu08e5o-8?{laM2d+(>Y$thx8io-2Db68qUT*VW+a7l)^t*l>J2-sEQ%hmV`R zt#d9mIFRnq?-3(}n4t$gz~E~WzkCtDAQ*ej4;_^m1sx?a->lXZxGA$y2T{G5tSA0D zvbKIkG*#*~^s8%9Tx35@%{?L49M8S^)T$QUqd@NUQ#I8sX2+JJc#1d3+}TdKC5Fpx zr@Pbm+aKjVGQQL81&y!kg&8_r)2_YLJR!95ytZWL$f&iNBXe9yadqOX1HZ!d`5vB} z2iyz4r>U8-&nWyu_^?x=+o6LPb3B6Z5(}6fIwN^F@+Clv1r{OPEdNy~l(^oi+ ztC8owJogX7ud>zu#MBe}1np7VQg?QgKT7i6yzk5>Yac+Z@toV5n?gXFUk#{KEWO@f!zoyLd-A_ioLjP8`=niB1SdY_w+ELzq;I9-fS))Hh?($&V z<=Xr{i4*t2_rAS&dr`~GgP2!40DE!}@4hI-v79Xyj9=QhP5U<5ha8@@`Qh5g;&V1d zOAR)XG4dSB4`O8ExAkw$k8Q1)^);<~JGbdG5_CKl|^{Qx*=>N|6_vxvgxSjqNcxIIc?pLu` zusY0TskOqtjRO{i=v%xNdZlNJT+xoNP0jc0p6{O5xr+wL6Nb(oU`K|#!`*54Ebqd{ zt!>WdY42$hTLIB7wdp=M_sD%$V$aRk^S|cDNgPLv6KCyde{!$;neh!4Bnu2*^x37e zO|Qr8@i0}7L!P;7>8Fy1oQku!&-ta;1;$q7RiJJmhJn3ZXJAci!w&aq**7R`bTQd} zgny^-DvilIqTAVTxU00w^w4o8qpsZ#imF7PS3>XgEcP`0CeyRlc2Cb;nE-kms#E#V_3 zFCDpei;uAgKE?s>0P@Dl7h+ylpJS)ElZol3CDSZ+1-e4}A;k4b+zr2Icy@%&?FX;= zuNvNF)q4yqmS23npEgEykq)l~;ex{tNF`6RH}>F22o*NV^6fCuUxsW~HO<0+Q8%S^x0 zY|N!qSkME_tnu-0nPXRLwQt}1KZ-xVeI5?nFYn7$_#XBx>Rdsi-(P;KAAakYVjvu_ z!~+xedon&x-;$ggdY<4{{)}iM{v9IeJeGUR*ly0QWsZfh(zxR3rst?Oe}?GuA^3M_ z3bEtuVD}4=>I-9jQmqxPY<@hh$nWQ_pOD!6%wEUNyO|PAG5V@5wjA2TU~nH8<7_C6 zgD;`tg^j8HCic7WIj@EMw?OZSK9^UMS5>YC@7vWo#^9so!Z*p)LEDcVBh`~TKxRGg?-SUYX2MjYsC+o0RuoD zHhw4X*K^4uNjI#?N5>d^GVVL$@wF)qAM$TgACAW7Ya_>V|@A=tC%&!UH!cl{g~d+lTQPWqU9W~ZF(lVYxqGReGOQn*Xb zf^o!2#gmF!Z}*WIb_$a~E>?Yi52f(B$CZYPojL<{>i*LG2D|ITj`Sw*jMQ5BTBnw| zBI!Hr&FvNaOdX=uN{5_Ro{`P-IyyCvwf=ZLYh~ z?Ko?~K}JxNY%9MAVYXHQ`eKHUr-$Py0~my^i>Qe2*NLmdT$+KNXqhxvRB0 z_p4L=7vyl`?^Z)c-ITTZ?IrlM`gw)~Jxv{Lch2UYmphj0;0na-THoH1xkX}p-s|>> z?ML8j$6L9dkktl%jpPcRMP6%ecA=@8lk-sf%xcY;jx#GQmU~TLF_t^Zyz9H65TA*s z3J#n#-0$N5;`!0niM`zzY&3n}2g3@3liwWMd&(YX#scJky)&2<=si3h-|sqAV*Auu z*}<8}Y3RJ`GWQYT5MXVEaTE7}_l`a%_mKOq)@uJ3hwm9V8K2_t*#-Vd*>m_&O*u7Z zihX~W@MP||S}PguQ0P#`Z&YDFZ!&%T7r7Ui{F_><-yKx2TwXPKYg2}nXM!`^cgU9>bJmgAwKih*q_?`yYl>-;UgW&sQMHVa?rg)CB{DkInsmSLDLKKcJj9I znTflQycYcPVUgwWVB9nhzss597nJo9{f7qsNcmmxZ#l2!6uy)g{=wP7A~O!o=F_~2 zRcRB~me!h@=5>y(%6QT=o}++FS~_q;U7?7=-*( zygNLXQJFE4uV$a}jkz0*pY~<(OEVj5Rzb~2o{fD|Yn8*P&0D^#7xOPl-Guiv0D4#Z z9(RIMUCV!6e6PuCZA;xj&RK3(ejeI!eP`90^3S~V^HS%fO=r)k_OCdTUEAxoFfV}n z&$FH%TfF7(OX*tt%f@crQ@BTDo-xRJrzHBH`nIQQ_0nCbd6Dx<%6Gj3``IzmQE-e9 zTjzn|d4{*`_{ehCQ2v=q;XV@|tMmEfD<UQ?&XkYrS_$zt- zJ^0S)Syc;T4UQN~eb)(qCUrns_%*gU>R)^IF6Z?2zc_(-;=np{Lpl>@!j_U~Ixaxy#M&1^< zmS>|ru(QJZlq^49EifwjU4})LOQ#N&L_ZsC2Xz8#G@VKolb;mYn|sH34LUX-SG+{H zCFv(~7LUeru8qmVpnB+PBReyw9yV9++nv#!k=7wV)os$zfbup)m3*FtzSC3G+XkVRkF92iX2Xa z9Bxg`t8Mgcf9Q9K>UBMU{6JmYB=Pm-h)u3@GA1XSPt7sko!bprQg>l4eoO0E%A}UD z*NdmXri9MTP@2GsNPNxvwaZ&*FoCtvDDnMhcfNFYo0zmdWBFHK$T2rq0qY38k$u(N zFLDiOe1cjNpHR`F)aKDvIv?^>*7^opoiXK{5AjrXw#%Kt8igCgz4*>Q4tu3!lGs#r zF=OY=y_l2({uyZE|)~`5}`BB9PgS}vLegbNdlx?r7*4ZQP%jay$HkmqUw_G>q1f}!UTGiv$ zz_-_XUhCMp%=P&x@awd087y~v5NzB_QhN%W4R|)SroFBTy5_owZe(tAA$nCX z(QovLUt;g`9hp0f54Yxi7TojOl38y9Fa8r$oKFB|Oaw@bC1! z|LobGi)&D$(Xy@9t(cyuP z`P^mhacFH#qi^SzjSDPC*-?(oP4$R+7(d~Aa9?X3 z+mz#MCUqAcjQ?orjB8z$t0dNR2zawuPZ^4{>mPTJeZBy_?bjA8K9IO#tsf3J2TWZa zcTdipcklx5BC$2BYkU}8FZX&T?oNGXS#my}fq5|Ul=3X-dv}a_mVH{UihX(1!?ao4 zH)Vh4A?G>V*!KqidegT!JT>p;3t;*9j^ylG5-l-#)N#S|Q2S0-7Oc;6dg(=9d{;c@ z+^DNLuVcVfqU9Xz8iwEL@j&IVo52S-s4!IYKkey+$a25bI+hcojn~GUOGlz4A!d=yp)Xf?!|L{=P6EOoNra%Y+m~N z0`zXQ&XhzyGk5yW{67sg;9_6-=gbd0lpK=xVoY>VsW0|Wo!7FW^7VE}u&) z=RxN;Qd8i42R=deY8CF_v8i0#ZJFB)j+#9V8n>g?ka^&C7#C=rNz69&1N{fJRz6AF zG8f#D*sH#!G2+kjGedJjO)a}N|GqrKdw7Q0Xnh&aj6NFV{P~^ap>5%8F#YE1l66TZ z{5#|NjVa9Smh3;pCmD@;89D#85BZGqjEM`9;DzKU{4IU;uP`r?GRa(Jr<}bDm-*C< zp>q|^r8fVp*ume!?q>qanXnJ}Y9-IrRf}?q%q+axd`I!0kA(lcwp<5)9`SOcZ|9xW zc?;w&<7Yi$V|4z1QDA#l7r2(I^HI!U*BGI_sh;t!i1kD#V}Djgmal$`Z*%p3FDh;g z-u;(RpJo1v`2XHzPNd%OGu2wvMn{%Lnln;sb&k_B(?t$>c51Euoqc)QpI?R8ithq1 z%pq<~zgJCuj;UW@b};ft>Tf^KYYanwe5Z{OF7q!Fo6g@-YxVgxfyK#GhE_kkoU!M! zKV%<-s@LC;>b;s9-eNd!A1&M}e#kBGLmK@XOx!Ux!+lnHgO#4D>+wFGm|0|c6FyG$ z820hzn;Kk$UyyUpjW)PpqG|5t*%)+thKwkR7*`M& zlmta5%A&YMGA>b393ycQl^AeK2pS(zWOIdx5>OU1z`XxIx9+|5c<;+izn?bY-+6C%oNY?8>t?{djCneA6(x1(6RkoalvBC z#{e&?&ul|7-{srW=w1(YZII;W=}SyYV$$i*733b7ki3`cBE`*uG8Am9^({9#`^0B!!sic{o8kQMtPu?enaQ))^o5=|X*i?I%~je36HF zkcVS~iHN6EKkPHPXT@LTJ_K!SZt$#>|8ri(=JuWF)}%+CaQ*R?dz7wp32l z;s$rPR-cT*{DuCIZPtm%C8hqhpBK3s1!J}W2aLJ;8*ok9@ihrn{1f;jYOQqg?A&bQ zQ(aS-ggs||tit&^ur;;UQoVk2^N8>Yv3>NnnPb$p>`P!5wU1Qev@@9AekuOXKNkLI_z!10w%4gkw9v$r&dw2ksH6nKU65ap*E*pl|Bb`~U&9xziEQuiA;9Bl8C&iQ zl{^^n)obz=D^fs=Z}pO`KVpuXoQ0)03p2Ab4c{HH=-mI?deFzXQO@8LoIxksLiwnW zJ!0U`#CM3-+Up-|W>M{M?=t%NbJPMTlRQU#vQJ8GydL`;7Y-8tll7V^@bGibp{bo8 z!*@(xqJJu1{e3V;<{dNt(109;-jh1N4%bvUoRdoGy!XPhV6L~EFXE`z;at-OZGdc$ z(}4Dlk20?Kdy$#B_#Ar7;Mr=NVd66ng?u*nr^xdX<41o|=O|A0UIng0^_!?QY(36q zrcI`e{?6gf(Nc3H&tao)IRh{B*!RTet-|x}GP#Z}shJ4m*VR7K^k|m63+mn@<0E5j zYwq;#O!#d)!H#O1LL4dM9p-I*6WTid%<{=52f|r+S|@X6tJV*k?V^8oTWse_KUI1P zbZjb?RBPDljm^#LGe?Ww;5+zV_`gv55=(<6BC9-8J2SRsQ5jm?IPtOi9%iQI6<*|9 zZm3tvwiZJyhtA!pwR-Q>g|00rKOy9YGyAmM-k-|P_X=JR9liuQ>OPrgr*zJt6&4%c zC8vCk<6*C>qq~#m!kn54r8A#GuVsxh#Kh)vOLI+Ly)jmE(5REQIrqx@;{G?GBUzuj zbEUqZe0$FE)PC~(vgIIMQED*zc4BDb@pa+HqW{%-In-d<>wT+xmj=H!zG%h5LIyg7x~PDPFkx=ppHOslvPHll`xp@$K-ny2qBYuF08Ze1mocOdZ5C zQV%nKF8KlEPllF;%GoELzrnY*ZzJZP>U)?JZZ>;WFFb+Nd!1Ws0)|}Q|8cIuH}d-J zlRnK#IFT2COH-enM*nZduilyBmnN=NpVMWi#p^oJn0T7xLpV=rq%&IVHTsxZun&mO z($YCFNv-K)uWN2sI8*%6Ga%=zmFsJslt0Dv3|`=CPCVw`&yzi*JadMKwlxnFA24{@ zoS!pT(hd$Xu0$w^u_CEA)lDevH!k!tHj9kE1aOo_+8HxRSqBKMSPMg@QjQH8+|)}b4_0L zKW>Iif84h-1vnc>`vd0zV?cYs7_(E{$;>6M3@gJi_#BVhJidINoTGaYpN1(Pm@^u* zp1IBI8ui6hHbDpa;1kp5k-ZX!;W{wm=(BrD@{shadm=v4zRJ=dlxL)V!@L{uyUv0T zZwjt5+@byAeui7DYoV*@&mC8^Jf+VS8{|5S9Rk16#1vn9ged(Rz+hLxW zc5P*=$GF5A-$8HJ&R^M5ub22;OdP~qtA2NX!mjJsXHBZ#v)a8z&JOppcW61T*AzZO&u@kE2A;iL z;UKXoZ6RY%xK9{NHD_ci`8m*x8BE3p9*G$r%=upe9m{&q@wg7_L1&iK>~-pat>yhH z20^T$)~%dZVJ`-Se>1kGwm8Ggx1E=_JvjTLS&&s_o6d@t2Ipcu4cEM-c$<;2HK@Pn zy{(G(iOp?-uf9IB$@Iz%^OHF&xQ8B*jb(a=7b+Wvcg;ME*3SjtDz!YXDy#+u75W)` z#g$<%u?r``E=2W@b_G90O-Y|aGu-NtvEG;cH`I&RG7m18fPp(YW)W~lp&jR^W zYvdabG&eW;cCL4~6pz9A`SVro=zlHYw=0?9xu|o0ZFKJ=sNd-r@cYy(#et#4CY9Q( zOlF+*^XP}@dhU)C&gb3W-K6&2xoQ(;!D!!-GDaOv8QT`yxv}HC(I$?5GgO#%r$q&3 z16jWM_2^Hee0~YtzCW3h!Wt`M9OZi>rjArSf;zJaEC^a}PYs+Hk2qE{#4`sDo7HQcqR3-JEg6EQd*B6<%wq9eDaX3!iK9A=)K=T1NS ziLRQL!CqtX7V>=2M!XZ+IQOsd0O4U{-ifmSw9V~_d)1i9B^GNny0|Uj@9KyBc}#53S+Lh_ zN^OixexCO+KTEz3Ed6*>`$ke?~ISeBZI4Kjan;P z!#O_M-y=>&>*OY26}11>;M=@0=NxHyd#~Kp;A1(PSnKV`^(5wn(sejXj(YFL=B8`a zn*LZ*^9t0^soPn1?qBS0Fz}0fi}4KiaefO5h;sdE$Fb?72u0Q5cg0GH8pe1F6W)|D(qYj>78G38&Km_5;O*s3*Uz^Qn- zWMg?^inMP@Ij_YvDd)S&yG)+8v3!U4?Ud(L-t7{j(f6AUUN6c6{rNTJHRk(Ar}!s- z9skPY+w0u2=w$vaXRzw`vZG}8@bGNTa7WCBj@9zk81EFlw*&Xax{to+A6naaI?b(Z zzU7T*p4eRaLUqYJ6!9w%r)V9x72M{Gq3DY?`uCbVLsM?QJH`N;q5b*c zrQs#*lXMVn0hI&1qingycV>1Qeuj~`OUyOf6>Q!ka(^jy?PA!qh4Gn!D`1T9rF*W( z1|HYDJydvLY_-!bWB24a^z*jHhs={Kin_Ms8N}BS&;DrSykGfdBV(NPNqNH~JI^Ka zyk03~sIY*sR9HH#z)%&m3O8y6;%&6>+<4w)lnM%8}O?XEtE_(+#BE3KRf)|WU zpHiA)^wLwM=Oo^wUqqfL>L_Akws=2^{T&W_*RC){bl?rJK@GsejKz281ACbJ!`J}^ z5PHVO#d{-FPvLjAN1w>vzJ|U1O=$hb$xaW^`LsLaN7A*1&r1Cb_UX;|O_ReJ82&=? zKb^6+L8(*H57p@|5daAdVXLG*HIpTTTv++H|LE4^f0w2ESl>2*r zy*wB3y2RdJfa|blxo5D=V82%tto*P>rsQgd^OwwD%v{<*p^fhbg)59d`~*p@gOmWTIci(9)o-;?)n`mF0Z#x`=CFJcO5+LFO_S)2>F~-K2{>QK+>m4nd#tJtSM&+-ImmXwecD1Gq)SR9rzYgPppov z5dVA}HhqV?%cTte`V{cMr()`X=uOZzSFM%JT?f7?>J9qg^NSCg*l==ripV*1Y}Fvd zaoU#E1=jvHrs{*0*-DX5=9$%6$>bx!<3>L$4gM>8$g|ledq85M{qW!Z?fu)>sixe$ z=yzt0ZV!0XzLPx3x9~&yWT(oW-;O;$H*2}wF3XHF_?EYd_C8N4 zKOlB0KiuT@ukfv&A)gX;<8ZvAJBxLK4dXpmM^*=}DzGnJ$wT1S-rg5O%R4mK9qj5H z#cc_H#T`)SYOVhEIOHEF|Hoq=T1G8pJ`V9hhgKXRXN{c3_a`-3;`dr-JY#o;#UsS; zrBC=&f|L0ZuA|nDPE9`-ssAjsDZ(8$5-0ZBAfusz;|VfrBxZhrZ%) z$goya@Nn{>?8^JZbw=+=k@#(fU)ZRgU@>-Z=&{)8Nk+-8B!oi#=#M z2At)-A%4hm?9YzkPI>Rt`8Q?$Au$MLhP)`+ZcfK+Af5}_xVD+L8SN)?Hk{52Rffk) z?WP;vdu^cd+kB5T`N!n*NAY=GaHIS#uh0GtEvw%L7Ta)rZ0AI*DcxYWQa>#Gfc%Ey z#5=m;Xu)tYM>@GY+2qiEk^hB}^PZ{RF4k_e9j^@6$$9(~^3y4U=}ELf8=ITeTFJ&; z8H>+vO7T#QFQ0GZDkxbUTLnH4?hk8WvC9$0iN_Zm}u5a2{urEcWC5K+m1QT&?Jzx^~v; z)xxW07W@Oz1Cl#pKh&boV#_;tHup~634L~s4HhP6(}N#n=d+AXX7NZuYPu_aBJ?X@3WWpNY&<-p0h%x8GW>klG4sox5|p zbF;9A^k+JF7E||nuu@`t^1JqRY!Bf3zKsou|2z?YOTBtGY&~NWUWhz+e0Ih!7qz;m z75&US9`cqVmT{F2eDKAm5_z`Gis{!8{B=4)8j> z7oF#6@a^7qF1Jj0x~`SkK-VPxRoh}-@Wv2f=WIuD2rv%)$z5amP%aHF6@T7=pF9Qm zJ$)WIYgM1q4CW^5{fu&v>5tp%>@`^E%CIQ%%y<1}xW{nvg#H*{c#spoyQc4YB-X_L za89Du!<#TeT+32zVDaZQ`9|XUjCN$jP{YqqpQT(eH{0C&Wcf*x*J@qD zKl~Qo`vUN}>HGgv^e2;twVbbZP8e!Cbh=>4_sXRXY_pO>lgBN z9@%8)z9eVpc#ZDsCXVi!ngMZL@jBD9d33&u)TH=c{_I&FX`pk4#BokP#~Tyb8pIFf z1%@wTq1)BS%oFZn^;_r@c_B3$WqZN)I3FCnVDM2j`PFhZ{{eec4?L3I2enrF@Md_i zoMq-G?+WjN9l__w=cu(hN8o~!935w!R6}1;XL1JC^wNHFZ(!b+_gI1V_;%q0IoC)2 zys8EH<@mb}-qIxCVe|~F`oMC<4@&tn?8&7c#h%p@BD3&H(=elGVEdOYgl8-jd2yO(+Wc%K0#ec+s*F-%Wv5NU1mHl#9mH`)oc#p`5!Bc zm3LH)ca+asF7&0r>xQ@d=-3gTnRt&+GoPAxa9nnr@kN*B?F_X^nd4Ny0Q|S^v8`|J zOx1VRXSRsW;U1ouw=%Ofw^n4;fnMTl!DIQp9-NV^TRAJQxb?s}xpSlsn*LZl@U)sE zk+{=q@r=w(k!y53{+4m*qDbL~2jH5MQn~0B;Vd&x^Ke9XT2~aJ7qOoqxNXR9!?k)x zmEpf-uhwF(_60|pnEmza-^^T(TEEuRQ--H-4!{{29lP0i-N+mLQY{ZXgO3cB>FC&E zHE#efiq`*w;B)G@;DfBK#e9_1w$>u&Ga#}(GLd8R*yPmG*Qo6%YeD8|0~+}dz`!1U>Hsv~>jzVq_=?9uzmY#m+Ztqkqp|o^=D4;v zBcV6QKeng&UhrjUUBok}V~r2MkHKf8jvDAFJ|c1v+~-uI@20|O3%m9p`b6|uI~abu z?giKh93A(TvF-j;zAG}m6Rw)S*Z7c2Qgh`v*FfI`xi$2F zl-^f91J3E};_pq3@^|I0^1NsIT{X@HCO1X?v|;$1XQU?ox%j%Y<0qCZZ}94rO?fm@ z+}9W4I_-;fMwUu#)Qpn0umzRgCngUtA^)K9&(~ufF7@YU*ip>PGCA$3shP#p;aWBt z-9}T-9TD33Vp9`b!8Lflhoty9S)`gF$U#v8tcZSh@l_PIaXfSA)~5VNJkF5H0UnjKsJyz8q~XcC{}y85cj_(I}){5h0|m2 zm^#ayt8NYMc649rE2;h8lHxl$*?U=LPgAxJWDjI@9l1I;R^$h_>@}7fH8)F>TC?Up zr$e`BaeOx3<14s_%5bE_h9lrJ@5%ko;FixVjeyBV{}e8SUR2SO^ygQH{}JD&+s`|< zSPv{Z^$B%Lb*OTW1F#ysU>#V+p7{#W^m108R6{B-M6@w?P-y}Vv#57z(}r+ZH#^qJD% z=6*g9KOo$y^vU_WlauE?C3i|r=gif*!l`XVOzAJpnQipXHF7d3^Bn9*=-h~!NaR|d zuqJkaM+G@p3P>m*}V}T%Y|@I=8bRH52EI+~k(pMvTrb5Py~THnV(<*i+V? zx&#W#hi!&#QP?)F>!Y67L)F*+88oN%6E@&kbWM%(8E=Bz(&wp(E|BZNngr>yIGm_03V+-k(pqqDYN&p4O&K)iJK_&1`vr~~hd z&eC{z%&UDu@uJ{ao(^W48s+J^_e{-e0XQ^h%Q(*w`rqicJvpnZBc}=ehVoI>8ghb- z80Ophe!Id|a;C=POud}qt8Z7Z=d{s#%k)0eu9-kl*?Pev3L#`8+cagVVH4|ZealWa2SB4$sI~{Od zh{@Nnm0Dw;k3d}#SsCqnT zY;=1?#W3Vd_*~5!YrTa@-lMyBjdP93MGURzCOHjaOVFMxz901=`zCk>uZMiryU)v- zI^+THr%@((200T%pZy8>)rN0jPT9_os&U4fT*o#u_phZ z-2X!C;j@Uf`A#`cwsV`#ZFF6%OYo-2?HrXo%J@GohMSCkb#9Uq=9zsff1Uhp3rzZ1 z=;}2%gyRRL7D*k;83D|XF;-P;r61a-?yY-#j@&2Z#|sa(JqX~Y)B0+*=sl(DY8~50 z-{8M5y8S)q7IO0N`>g4BuIK99NWT<*<+LJ}I(P4_T@}?NVa}r}@^`8kI2^7;lH$UUHuFsaj`SCwwNIs}76RJev0K4aOAk z4|f1rY9@ECI@c}1E7eWxERebZ>S*%2`|-P{M5maZwdV@Y8GoBSZrVQ&QatwGg!Ii& z`-2=lig%&+v%&wX@Okn*Zg!3}_PrsQm2eg?)r&&Q{Wzz*)A&du%U0(P$`8tGn^?@X zHW-PWQ4iw-)CIqloDARZx1r^ni5=CyL-}Xkaw6`Na`Hmy0@$Ng&Q$El>{Lx;MalN| zR`@L>uHkd-Xs!4JSeN`wc(ck^;~bGwi!lYSIVN5xxnk;^Tm4&AJrv(pYo#})qaMLL zA^DIWO8JUSMa9p|>pPLPN87-9tMijzLPt?=Y{ffLYbC4K=B_pP#=oRy4k9OG@`tQV z+?3pBt)tF6{e<1w|6rb4h0`7DpW^?id@}H6fp2^E&yUVGI4iYQd7gWNdjsurjxJi< zLbjMS{14yxc9!d8u)Jw|w6$pU{LNY0H@zpnSNtNx!d|7%xxMm?GAmi=}Fro297jZ+&dctTfkAYwD;y8<9gmPQJpK zfc;;WU7XRe&&i&}JKa$x2Qp3({`cVoQ;OR_bUi?P8~RS)2U`uEXHCiShaBx$U4c0- zW`BAHzct@~DD#lvoVhc9m)ZXT!Vd|~5ICBRDNK8P;UkkPXp9?;9-fr+l}|x^;gHyJ zW$eckXl?h^TIEz{rf~S=n9_P6B~H0Hko-tJw1C5D~nr^Cs(oOaId%N zgZQeo>OK4peUXo*uvO>hECy_D_)p`v?DbV|5oNL|S8KQk4vjC9JUsm5s&U>GBHNJv zpfYsDpMg*~Tb*B+S>gLjb`Aym4b|SRYgTJY$~5f1_1TC+(0PV2C7XNS6Y3sM$E!y^ zjdjvx*oXTdS-QVqQUQ}^AfFDd+0(N#?hndc09~YHxJ#t`;T!Q>YTe2KY`M98RH<-f zc$V8drMsqM|J7RQF4kvRDm)y?Vt@hD%;uA3dvVaCY$F3afrIc*T%5%+6AeD3KKiTV0O=DR zo3ZgxC3?s7?_TOv8?17dpufqpUFluv>3g^T3>*nL7N^Gq#uTy(suvq1K$qwfrVOTAZb@*(rQo+<{%x!{a2`fmr}9u}nLgaY@K_}Ikc zoGAOlyem0ZDd&vQ)SB_g#^$!x{{$c4t>Uxs`|Qv9Ilj+592?Iyxlqn%)9>Z=?CZuy z?VYlf{SbH14`HsL(z6`GU&J369|k@K;tr)-Haix76}oD+2mnoZceXEbX<)JOQ~V2B z=aTcjEgo*{;7DM8BzFfDx2B}@`NxQzi9^t`{V8zcy7#BI)7#7?RBPo6HO9-0ABCP2 zGt+r@_Ef1ut%g2)7V~jbovypLG_d!7Zr0*+n&8c7ee0!ocZa!W$eH3KvM?{D>^2*W#A=>gA9fwikHc|cm=cjAL!(<%O{chc@Eh z#AeYJzlq5PTK~^1%rx;%5BE5iJsl%f_7zSKeNFm@df)ED{9G;D%!z4Rtk%jF*SqX7 zSMkv;(fP*DIX&h7w=G(q|G{{#Q)Ci~>x0Y@FbZd$m{M($Jk+BdpIO;?0{~X`uPG^-Z_am{;*Wx?O6<_UMZQ|b= zr^?`_*5<8F?%LA!LK2gp<>Zs#lce^PgKuejrSC2O2e~!nKUaFzU)|x@`IxNbotKZxRyxuLKm8rhXdL6lKZ88 zdnfl!PUAWr%6y&V9~q63TlAo9Dfwsgj&xL-cSeDMBw z6XXx6K|dG$y2;R`BMK@{Mcq|hP;)RTlO54_Dc8g^{>J}}JfqAvPvHdOg5~t?9oSs% z@Nl^49iVLM^Vl=r)8JLcrEs>L!*0OpDBJXt`;(agw9~VgrIq=Wct>ha_Jwxd+`YiR z>HGXuWM?7mXl-%GyADXY+j-|ddR%% z)>)f(MGqI`JajrCKTqCf{kQBv5KIwt@`E+=t(qj=Uv(A^LUfanR?eXVlZ!zQz<6)1q*Z^aNGm`^fbP=8*e* zc&blJ-$s zhdUz-9%g4|PtrSot!KOc=#`zIGzv>(H zGq1%Xa7~ctqjqL{i{|9#7`*qY(g)(pF>V@{>a`)qptk91Em(r4*@fA77u@HjX0=v& zwJE3Y%(T~P-OAYuzclM*#rNa+QfsA)x*=D?Gc_K2{&0Mf_}Ki;s_Y8!@f_>~=iTUg z_@Vrx)aI%n8$F^*vE7uDzm&D_M?b;h^t#6uo3z8(A-*@?Z*_Ew*uI;QYuyGPOy^+N z=4P3Gx3LMn;!5azp22arPx?iiy`^J^e&r9;JpfC?+^^1cs5Nv8@*$5Dw@7{S0Cd_W zPt82V_ISbIMag2Pw!?Lx$ljOi$2 z=YjK62+tjR`7r>r<9bXV%O`FBIyD`2-bnI%p(`~WkI+&Z9mHcYq zO?fYr!vzZT9G3N0Vh%How`ANgEgBDbmYw~_mA$y=_4Tzwm|&Zypz zT0;+1qt;*eJi*QObM|{y-oDHHSLE}T*xP*>+mHELY;#jxz;{jCM_F1I)|>p~P34|^A7fg zNKT9xjGdVu<({bV;SIm0@)B>Z?G zOzH#i-4b`xFKt)0y>jTWmDq|k@yAQHPPEP8`%?Lt#i{w2JKQ}Io6vulSD0sP)&;(u zVYDc;HICSg&1_k<=6reVbF@?HiNmozK04m;z3g@!l{3eCxjZ}G`a;4OShMF zt?HzduXTB(3Z3HS)FC* z#x9ZNz*(QMISOKCx+i*|Lz0I-5_abj;7qjLf6r6C<=^pnC%22~bBtVzlVpz%{ZIDz z%uCJD=u=)`Y8f4z4)~=Crw6{L){uX2`vm@%2K!Cia+~CS?#SF><{DI{IK;-fmIr29 zJk7)@YOQ>O+sk&Qz(bjJQb&XRau^%(T{upaL*69Ob=aT%m|Lp%bFaVG7c3}revjhM z5?$2Y`wseiYI1LLF|$C=4_#fdy%LLoZPwSh5)&P1)33s>#f8}T#=kGllvrs7UhrG_ z6}qMdiBa(#W8uxo{HCvABidwD4)b96U}~*w@#@m*lJ+Gg7Htl^!Jk(ii)Z9h4o}Tb zTm(Y{|TdJL)GZpU?wL+np`LCkzzVEx0thAKv;zFkpV zVXgzzuk=J@fP=jlGd(r7>dO>w5^M4Nt!?;Q@S4iLk^6#NyBbHaHdu=cjnb1FT+1DF zS**B&h$~)|;#Jt0vG#6HuHNu_KOHQWXQ2$tj_X8sQRlEeav`3P_kT@cBJ2WpjkB(7 zpJta}gu$FQmKse@#3G=RbX;%)Vjun9dq`ba<@6f;d4j`y06xR?R1DSVPZhm{AM=`9 zw-Oz~IwpAxwC{0b@kmqW8s^(PLpS7vbuIY1$lBkE3d{3L!$>$h9?^F{vKII}3N3nOQaY#U|db@oRh?M*=h^TWFPMdPL+_5u{f?PrJ^W2kV zS<6$}GnsqdAA0zzU{Qkm>IYtKTem&CY%xXK;k8h|Ie5cwz;D;Fd2RU|Q!ikSnsrk8 zw|#*r>V|j6TENag;Z6|?wE9Q>A12nTjy6mFVH5nNp1IR(9U;%T&$tfcXNqtA)eoHy z4Oa8Suy2yb^QtPt;c_m9;ao(now2gSU1IFJT30x4wweY`%L(F7vhSb~_K14*P3(hO zDYJ5%oFciuH>i;W^~FJ_&yN#rWGT@Oe7s9+h*)7_iZ|wfL>hm*PXRFaB%H zCf4s%t<^j28h16gtWSea&794e$mVSte9NoQ;M-nmOd?Uu60gca{Mag7|3l{!gU=Zhoo8^`HIBt#56p7*R_L5Vj7NBg@$JEa@$(^YEuJfEB#xMFJbq1daZT<8=IKPwu z>OJ<@QnwTTpw`^yjm>?sedX-;f$oY614SlzZ{&E?e;c{Bm%qk2UwmeM=izdHg8}Ou zo-Td`{o$aE#pnE(noqRf)w3kJBTu+V>I)ljodcxA7E*z+%99gB7Mnt(Uc_rv~c{f_F~PbD`_IXsZ9lzn4;e~Y(U@(gT$%U}bfm z@Xug&F!oBV)$bk>+xo&B|6Y-KzSC|cd)7YiJ}|g~M~Y)jeX0O`#rvloW`;=T^Di$f zmE0F~?8)BG#1|rF@8pv50g(8_{NKg+TX=YgDb!l|3G8LldQz=b{;*$pGD^;>N8mm0 z?{ZDX-Ro1_abNn}H-*zH@4^>-T<0 zsAhOESMv?>06Jeczj%R(D_;*jkUeK_(J1(zn(t^>=HpiC`~ARmY3o`2vkDu}nOPMT z#Lk6I2FLLEz~T@FMC~Mh&U1aK_qeGUg}}WlT?%}DXnp(Z3zL-(3``VxX7t|H7LPZ& zXhO!$JwFUwYFeMuSIpube!!2dDYPgKz@E>*y&dFP{c}>jm-vd5rNh0$(UZ)g}Ku5ysWFD2hDtc zV3_J3EKL$W>PVc;Vqh^*gNs9r{`n@{q%exm6^n!aNnM6|V14FWW0%QwpZJ^=Yrv?e z&&czE)kO>ACd1jXIHeEaw@5B)HR8m*;4G!gFeX|YE;h04o0+$ipM$(EqCR6g>Rije z&ADdO55$4`6^<-?Ldz9Hu0PJ0 z;~5-=`GdR%gl^85a>7rG^~J@0#vkYwb;ImzRo@)xj1^zy*gjP)o`{|>d8%&CbuBe! zqp8>=_D<}Atd*bH;440#yW#5|p7I~o=GPkj$?ehOK5OpGf!8|I<+tc3lLwXZ!2JKR z6mQj3cd_I;I)me-N3jQT5jZ=@ldHATrOX5CICOgSq{f@Ing+awo+o%1Fo!y>{}J^m zoi}LkbCTbHvBLZ^#h;deeg7ivWO~h7rZ6q^b#*?oJ$jsV-%aG6Am^?Je6!GRD|^eB z=wRS^7|Zb84Je#p@JO#92c>%=sw3MEGRdDT=ZZ-S#7PtBz_+ zKYNtxDs~^Y@9atPPC@cE-sGqRs5Es^(2zlitG{ihD>os!jO6ApplqKDr_9#rL>re?PoYz&5e z8~pA5lErgof}HFXIVA7)?iSyMvZvNcSIkdhPkz3#sPbUUf$Yp!Jo#d$UgU>9KQV0G za1X?=5tDW&*0l9a`6j_6PzO%%6pw-Q4B}h*U5`ukpPra~-^hQqXlrfXhNs~Cs%!SG z__L|EPRJ|XRO*~BqA#GImHts{p1W4gQL)xhom(8{9_H%W6ZjmAjd<66*W?Ns{EedL zH^66RPiTM0GqFZDA~#DJqo0{ATN}M8=xqF=tH8mcaNKJmMU@EE+gSRU@p5V~>p%!_w#GAB(t2{gB zF>)=(dx5ycr@N#putg2sp2YaN}Dz51gU14;~{*u)Ro1MJDw%t+wm-u7c zx9ele`OxT><=!IPTZ6wr*6Xp}+{+Swi9j!^4_?yd$V#Niwh753$Bag-_rY;dgP*A7?){GDfaQjca`}vHN_kuUe}! z{yqAw7UQ3mrFI3&3tExlaGMTpE4|N+DIa@EY;)JkA#v2n{qTR^rskM$0=JcZk2jZY zlX~tn+(Yley~_87{@-NsW)5^ehGgR!JQqhNGX=W9xUTYSe6b@;__YvJ#Dx_SbMbtw z7Mz~a4{^cHB)YsXPRH8bQ~9SPE~cOVhn%uyIDCj-{w8+kZP*?5A8DV&DKW3YSv*yj zvR1D3tq(px?Kd{%7D`=}?+E?pQa|Oqy;{r-5AdJ#ADXZ~$`|D<%f1G4__p`9@lVuR z*^Wh_!e>5;7q$`kkk+^k_pQ2A4b22Su(7$Bc?0dURi|>N8^etT|2E0LTkSLMZJ290 zFl+J?1Y5#=`!V{_U|nv`D4&hFj_r}Fa6MZm*@?imzw-LqLWuaCqG+wU*aszh8_`(5?e_pf{KwKC4NqF1texHbP;5Ebj*e7pPP@DubJn!(T@W+IR61=d z`Z&1f5C`yb+Zyhpo;r{8^NH)z@^EkYUikdVH&biIhE<3Wl+B`^!Q2_Km2Dw!yL78z$VSe z&yqX?)H!sTo!54A%Epa>&E-3y54OX-)9CO9|0lWUy|`y`)Q}&5@m*!OK#@Sir9U}KhIgesn-`SV3@d9yc+{4bNc+TUg zS;NPtaE6ilfL!N(Jnu*DT7xqurW2xhX&Q51juOy~dU$f2)jjz7Lweogw z>2t$Hd16*!NEm+|6a6Id$X?vr6!bxBJ=s3`Sab_>K^;qn8-HVcd3`d6x}|epcpo&M zy3f&wCH3D%uH_SZrF@$4U1{HM!hX^YzL~uFhVa^m)xdeR-99XC=NfFl@qaD%qQ^Z7zJgSMn;(Wu0hIXzPIUGV>&N z%6F>P%9i!5xZ3oL^bF=HdxYyA5mvJ~4bo4#c6t6V=w4;M% zMeSGY4i}4^rLMR)d!fPY+)}vBtk?PLl+J{{osefOM$JubjK@n(jQaWh1joAo&o!ew zqpaiTgK`Q})E;MFt(8B#K4T^BIJqZ4ZdKaBi{S>P_JFB;;XzLw^mku{|F11!?m-<_+}c>Sx~-?=^Vfo#nmaC(zfT zoNF6b0gSG;*WZMnK>yPh1!sQg9O*IS`+ckUmXVoGrA}h+$n8vhtL+zO2_cUtFegsiGw0QRQw86Bqzywm-d&$uKf_P;tAdq(a(@*e=X>Bg?RNJX zo7JvR6#WbUweuF3jkL}r?nUo;hl&oepVROJ4gNxjsRwiicavjz&!V#OpYbv9z&6Li zzA&wqsv}!dm{V4BeqrA+VYk}Mg_#{&n>aXCPr1z-Blvcn>meyVmdLfUDYH@5_^v&n zIf%RCT-s&DWkoHY&tcZQ_Mg`ahlV;wmj>$k>>ZelnNZy4vv6;-QXIJ-I_pe4GO@HU zsS$Wp-8|c8Is@FQ+D5O$oOJe)QRXQFx-QTsYiAzK^A;MuoqTqYS+5D!B=*Y#zQWE- znH#<-@PqP69cTT55`;Qd4)eb5?DAs3uBxH-*S~#hEIuK^dyX5wy5U1o{o37 zJQW+ZD|ZmN)*Q9wHRIcgo25JPdGRpY-VxRmWwhM11hj;cX&W_ z2+!b)g)t^aaY$_WJP$_S4SoB=pmWq(y^ESsU}|}+JM+0HKa36eea42NyB~~h%BHg> zbtl#>@LWT}ABx(Cj04M=+$qyV?v3{Pw36-Rf3fg@=_xpnZ7KOl>g_psTl@GfW4Wg9 z_BI&%(&*c>AExV@v7I+ZZU?PD{~B1{xkrl12WUbLHcHJ3JUe@~k=qZQwW23^KdVZs zOm34tfR;U{+*;lp5>@CbkUNvx(9NdN^cbi(}_(_6$~wyb%*}OL?g2(_fzI z`(Uj>+e)=owvw3eF}xobhD^b}qm@NFZ*;4pdUB~}D#P|7Cx=51KYqThnPH1x9An&)??lC{`h{A-@7Se`)*v{Mb3)8bW^ih zt9tIH1Uvc_?q_MROnf=kk{AoqJ~Bsm<<$B%Rm#Gk=F!_p? z%a$8Wty?*bI6Ds%?-BnKHN;kx-b><_E`?t@Je4cEyJ%;H{4Mxfpks>mnJRhLur3~R zw%VSu9-+T;Qps|ycPJcfYU|`gBA$UcE7qX(-)@T^GWqaL*)Oup8^AuI_s3$82>UUI=?rn5Vo6M;qa~U;pBgt+$>9dN?;?h_R#|V_%hikCFRViHTMqCi(|>*Qw7pOAg=04qc-{5+8Y0 zpXV)qRHOe0bh3(}`WNq(n3uZiImob<+b?3vt+AzKF_Z1!L+a;v<(TgyX4pEK9GJ!Siv1W(w?Sq9LROoJn6{rvZ% zU80Av<>db*#K6|V&PwrGyqdB>=jG2c`KyoI4~=ZxoZ?WLT(*1> zM|;n1bc8Z1i6cTeAeQ>cpb$r@NzUXEP0VZLaCc z)a>#Nm_0<_=5*}mFn5@%d9k`CzEF4g35UeCmN5{YjT-3I?ld0$`PeXa2CQ2GtJ@muuuXpZ#8 zazF9O`Q96f4aSCM0?lRJ-J6;rH+bmO;#|=8yB7CD-|wK@K{?@_cyLC`yF%sv{0_gh zq+D(4+BJFGOM*`C#4fPrJHo^)CzQ^Vy@DEWI+i;o7#{X(Snde+muVd7c+7p)GE9uR z&i$&j$``RVp>2d(D;sfih2=$W1l~{gM{`D%K7;7{HnsIt;Oye{!3GWvXVsI^0XfE1 zg-1+IW=9Gid$wb1RqYB#iC*diz4Q$@;`DW@LpzUhm%mH6ruhq_;!*LL_^o|#{+xa8wyU50Ws9Bax|bG|vRYZDV4JIC$c$?VI|V0dL{lm*s0RN7&)1v%QQHkx8@%yma02igeF=F`YjvHq;dNqnCgFT7 za-I<%hUfhn%!t(QXivDy;O=VjyJbIjVLyrg*FJoGq~1{#p1z_~Vd{yM;T(D1-{EkTqDO887ty+X_x>KO1KK@f|sKo*s5UT>l=d`4L0(c!cNowi+EpZuXHSSmj5gA$vCTPWOZ`n+PwmH z*VG8eTcu_4;KnGtpI4>k`khp=oGK$zyu??!S0*u6 z=c-IHZxJMjz>`?q5%*T>?FY+Nht%XN<$2rV`!mZqQ%f3Gv>di4CNolb|Ll?1*V&)3 zoVxphR}2Rf`x$lK?=kS7XdmFd+7zJRG6iAo#Svnl;M0KZ}=*&Dg0>aR>YiZ-Kf@($nbM?BaD=@GXgi!B}#IP z5T=7m_{V4bUrUF%XuT$&R4~+jGr*Y?_~Ov+ZAd>5A?(R)Pk>==T6DnYIAmO zN%{6SXDk-3I>EGb$KUS7>EiEFM>WB6YMFmN7-(|Nr&L@}ae4Bc?s0chJ3b~lCQ5vg z?Bv{JQ^zDvDdm}R-mdVjJo`I%_Ei}@JFg#V6T>8*GZgw~n7hQBm!{lKgKOeEabm@r zF;9F(VMamQsRqA`_*$LuGDZ|fnEH`gE1k11ti?n))i>QcycTuv&^aC7uXQ?_IBrSO zCvwm<_NUt#*@5gq$g@@8DJp~~R_rEp6y{kNoL;-am0}mJfL&M=T8`6NXQU2f_nMugVPPcje!i*&;ntwe=nDaJm0sxc^}m7vYgFMV~vhR_CrVJR0&A zI!EEToU&8aas2|<#;Qw$Z%r<@Ccj_w%s%Lu+3`z~+ovymaq&`9pWRySWw34Jyk))- z^Y|(TKp!fdfVx$7sQ3m$;2Rw8*C)C3e&A2GaU$ylIu^sM8G|cWpE=s_#taJWOa$Vz zd6tROo}BxQ$R6!Qb!2;rkB%)4VVkRR*N#&qJXiYOmPU1^FM#t~Pr)^*9~vUfon8gp zqs>w51m7nAmOkE{sr$Rr#mO5 zPomU}m3D=D#Sfngzw6=B!zTCmaxz2k6~uQ=)W+1i>)iKE|L;R_M(X(VS8L0*M`nqC zhkRazKYc4d%*epoV5(`2?@q(#U0Zf-NgIR|0_x_9KZNo|EF8}r=Q*POBEBE@b7`b> zLIeEFQ^0GXb>Onl_C)&`J2QPs%0~AL3Z@VAYhbbXPFulux;DPn*rSQXiBey4ATw<% z+E(bedlcqz^PZW{d7<=z;TvI(m9`yfO`YsiG^F~`-b>9XINLef)DF6~w0N7HkH6a_X!q#8teQxH_ z432FK{&0M$>>JPNR!kMsvN0REBl2PX0lH{Vc2HJhKQ^Rh;I1mHk@`CWGx7uLcdFJE zkk^i0%T%5Oz05|Qf16;*=D=2VPU_|@5vPz_W?Z7@-}m1)^#bBmw4X32v^<_>OYkf5*m}BCjFMW#{>l&%vXX>s2g|kiWv_qkT{52r{PmkchL^+Ks`eH2{(b4NvgcKp+^6AM$dHcI*3g2%5dx1-u{HrryXu>s-NMIKTbz?Ci(6rf{D5{HDys zVk;@#u?Q zpOwPJO)T5G)eg6-xret4Z;LE3CMEx#_J26bTk;qn9Q``t z=)uJ_ul`5HvDgzFU*u;t33ilgWTNH%sauXq>i);${y)!uE_DY7dYJPlRi0;Evsza; zmjHt|6*)R>mlwpg#&m4v*o;2oucPimxutABR(MQ!)u?|uf>(-v%h>sc)<3k??}$9o z+|O(JcrDsydYZr8liQQ)g3pQlYaI`hzh#WyCFo(!MWcThvW%f~C``b8DVyFKyt2$` zoCXGUZt@Zj!cX8HvR-pp ze3`+A+>q!l>@E5Q6y|&#&RWl45p172@70)NsP*&A@&g82IHo+Nd{MH`?W0%3f53Tn zeAIok&oJ3puk{c5%TAWRWj$-Dx72Vi40bH$ZFYIBJR^h`y-U}}iQTN|kXP9CDtt~} zV(lB#*V1`KwMH)DmJXRU*;S_Jx=;3g+4JAShQ@^r;xqI7W(ti`Ov)`ij;<}OES-}%$MAKy zn0cqq@1Ze$4Cp{`mtEpt;-7`Tyn)Bb4&S_B<=%#z&%s^-ZNk;pD90Pa(y+?)pEx9TU(t;mPe%+NR0qrcdFtxl5=2x z%9`?;vd(|50>5-W{ML7{L7TE|h0lsU)n5Nm$xTt8PtVR4AAq=sLTYZv{{g3=_p@cH zzhG@N1*pqHFFfj<27sH?;{l%HXlk*5B;zohu#2S6U)&uo_1a}ykE)@}6}Y*+Y~ z?Dvy(ekn65AA>!^ zyc2WQBKLsE2?WsjWA=|GUZ@LfexP;cYLkzxaco^|ivN_!S1fe@Dfd8KbY{LRz7}oA z--43ZM-W#7L*7O(Av|AIF|Uagd_uK`-o@t&!7Za>it`+v$Iuyy&!5XYm#M-ta>n!q z2)@=8m!)!&L7Sq)NAwTt0(+lZO1qO@>}xUKc9?$#u0v@ZhyD)!7WD&X+32${uBc{J z)3@RLBc9DFtmivQt`=hbTt=;5zbcZRX|lyHIQOF0Mk4y!P|6m{+LJ`x&`2 zOioy>)jPc@WBrN--{P+#*VfVQDcobQNthFjT!+%beX=_x=dc4ghb4Y5^WMoxMc-g5 z`kUClL%mAd6elxZ_Re!2iT@OL!rvZ_eOMY4MOHt7 z{73FSsa-aqpW?@?<;w1uYbExJzIRRZf$=MLxPKC#kn=;o^S2oN7P)WAHQ#_h3~goS zR<8|)f_G8j`c{-|t%39VwB5fYnU8iW?rj?oyZZC_DLmDFZ@gOg%?&06O@6`SDxmj;&GVMu9+v0rOSYf6XVIxq#mV_1Ct zX2){d-YD}KtE5Lyt(D$WYni<@jQK#uajXqp9ok$U;t_e*)WZ{mn+S7Hp!3NGtL6EH z;CdDN;65)7FE(|<9+AR|P|nZK+uoKdJv%#lgSWxVm;lF@!M2S|^>J*^XEYYVyDf7Y zY^&NUwdNkSLQdP(xR>}AlQYYkWqiw8r?b>7w)d{O^t;TrCPr>oZf9^c4gL@l-{rIK z8@W1Ld?Ebq8_ms)Zlmcx%Czy?@NCj&nB&bczjc~mS*bHQC*A5sVrKNd^~9`j{jT?C zBG^q8@62-9f1&)1`O$pSS57<$bL6b!+?27sx9c;X8ynp{g>zn3oMd{edbp~`VF2Dm z9=Iv3Pr9dY8e?ONsiw`+daN?sDCcei&fWB|otz`a@_`?iy{ZLHl{p03@y7};NgPU_ zWL;=`PIvmMZZg zdW7x!Aa|V3&+IDgGMGTO&Qdf5@|3%3UaK$?uySH~2H<|mNUJ6X!pig## z*s}FFYddl~a@tpk3pU0d4tt^HD{|XU3ghI^Wdsd*^!t_pb8WOWXkl=d;5-U*5}k zc$WJeHT#d}y?vxOWc?KW-#jniMC5Zze30R(-Pd^HOTYK%BY+_a|qN+ zZIXS?qxEBL{sFRjS*+$wP#5hBW|$n{hDi4# z^mER0-Z8v?3-UGMPd|yVdT_HKWxA6Tzp^Xc62A1Q3 zaf01oLP;Z#RMI)B!nCl?- zKsmX-e7&iakYhyo0PC978a_Y|#4qq4v`#)RbDs1c@!8c{?d_t_&hq1252cs9s$-A` z)_JPEkvd0=7kcD+7#*e7Dt~)V!Qx4rWR`Rb{K1aU=8Gm3ZZy97ocy)Gl>x(y@6=~* zH}>VS_#(s0H?B0!_;o`|Lxl?(;)DK?rbG@sXKMBi$b8{6jFni+Wu!2zXlAj4gY zfhT_j&meVvj9=ILQ&TEPe_|{6t}QLWW} zh85~;M)-+Aq3!G6k=utk#cEzg$MTVKu4#WcS6%BjwHEybtaum65pmBW*Yf1t7u;v^ zmT`En#L?6hhxtb<+y!l`YdLdH%Ach61n-@AZ(YZk6x!U;!KHR4|2Z__+iZpXIR-N( z1UuRhbA0kD_q!f1fc;I{=TvKnyPXFMzZDFIgPZ_&hdE@*_5%qQ>wNeyoDD>dGJgI- zV0rHw{CamRKBwQ#SGV!p3>C=Q}vzmQ}eKRC;Gj= z5iOF~nZC*yx%W+un)q;?Kd*5fH&}wWFxBKm`^9I7KR|zmvlRJ#-ZSTqC$_uk=8Tmq zVnV0~hyh!cU1s`c)mrHy@;cJ57>?`I1(s`QZv2ypTfLM|bxP(P(Jj;ijlS(|Z_52e zbZ=Y8=bFqKlgk>L%qJQTTmKrk)O6l#cZvf!idBB54c<|WW3gD{ighOMbW_H1WmkvW z4c9kw%ZYxgs70NK&&zvTTv}|-Z@a=Sxz3Ns|BUl2m(;+l!nB`-&ws@3Xqh3VQOlTG zS2(9#U(u>Pa=H2)9p%`*>8+`r>qh?y$!U*6PW$D;%ccedeTZ^qlG}tYME$_nVP4j9 zg+`hAVU z+(T_UzRP@vI9)ya@i`jx2CKg$)$`lrd?CIfW%4fYnGeA= zY13aUzgX7s>C)&WoqzCV$M)VhKV9p<27im`2|Xr0CZ2`s;8i%KHm@7KO3e0gygp=` zdS3f5kHiY^%J=eGvgZhe!EL2%-&)A_^@W?|+?|Cz|FidJ(T&@|3#ZnIYw!RabGF`h zVtAtHWah-wTKRGl^Ak6X_wk}^8{#t4r6OfK9hUS8l{RW z(Z%mq7(B+IsrnIp-SPNc%EpcP8x!nJOXruFUmCkm9afv!WcA>y=QZgUP0#ifAM88S z*J_ciWzF|7{D0J1)ysB*=O1ZpbV^_zB9M++Z%^~JrZ{h!@=3qw+5EF+pNqMoiTxXV+uwJ$XM2b~jy^U%Hse8F^J=`)H6_bexnt*cZSl64`_BY6KQlVjV?HTmi#h+4`78RRqk}^$^s_hm&q!>Ak3A&e zMK+poNI2(_@<6@Rz1-d47=OSyVobLSHf25jX+6*<8%Zvxgj~=!VT0)8DqOTz&@0e! zO4q1g(tG7q&CA%iw|A7)oNM00<9X|czn79p;t=$?CeNPMs~2Q1Ffr7oV3XvinXkCg z>u<1p?FxB0BPfz!2DIfX=6TdQunK)8`u#2}EB;KLi*vIh5gUfiFJT|mTD|w$@{uM7 zSeL?y)kL<>cY3rK$Z>ujvj|;PTj#mJ`4Smpj%9FxJRYGl1bGIvR{H-Jo~<_>;~iu2 zlRaEJf8jqxYu_tF%h6Yh6QIu>vAe_u6T3@}DV>`-B)(PjIqzXPrJBnIq5- zap*RqyMD<1VD$DqDSnChMeaXy`+J%>-+?m8IGWg9weDOsDRY+URfkS!@GV!^%<^oB zl^6$onX!1kA>}H39y%AIegSSVlkaLPTt=$ibYsr;0t1?7_W%1-UErYHYLhR`XY&Sk z`Up7BwJbf5f57O6$n7F$q%+P)k9aY9>O-e5{Mc50D}w_Z3p_LTA6SuA-+14cGyYZd zKa=a2QL_E=4ZiI?sd4TyK5$)%U-zi^InnJr%e9W3DbN08?W3;Au8|&U>fv?Kda1|J z52S6?HR36; zMRZboW{N^l4NUodK0iMKG9vMivoqM?nJ`LR=js9+?9-{r=IU2s7W1Qaj>%>TY$byanE@;sH3GkvP7zI}PW+&_)1 z!yHUGTO6TtYT-1~o3Pqh9m@pF5q53Oo|A4au`lYfdx7o1^XGa+alG**!$j>m@XyV? z^i5lgg57x=?_HF&eaD@{B_?+^-qz1M-tGy_+%_8Za3mA!}Bk2vo1Uu^W-;2EJq z%tRQp)wkHo9WotEpUBb#U!w*<I% zcj}e?LUOpDgMaTU%oIN5y`yEv*kJShW%65Z(`d)N$PgnatXrSBeVP zg+9oL(h}oaEe9GF-J#QKOpVcABsO1USrLbwt3#jS-<8`a1fXT-p-YHXuHgNMt|+V3?0fq z_66^SPp5JD*e{@;zaX~&GDP{vYK=SU<}{mLI#=lAZqUQJ;v;w$<&QAep!w(wU?|ak zJ{PtStWQ%reRFuTp{t1ryy)8zJLS3YJa5j}@1O6SZ*nN-=Pwf7P1?&kD+M!_bTZxj z1hl7Q$(AL3X?vyFv~pj*E0+9tK;GbaNh$mZq_ zMokhcBhL;Gh8y2%4szN0+-AF~9`7mef?BJ)8fIE$Qox+q&Ocnf{_d1PlHjrVPD_~ODXCSRXQ)RirZmKnU7OC#Hd z4wtTsG2xwE%TYDRHO?8nb63o;;9a!GZ|(MfR(1>ceL`xh=r6Goy!FPWx~%X=WhbCp zWR%jeRyDggfv5K?;MZy7|CjNcPOB+$DLoLs!*IX2lHs?BjZ2i#TN5TpFZ#>O>7GD#N}`C z9q;<|SivXc->xj!eR4J{&z!SakHd@=om1` z+Alae_npDmX@sTBGaro0TU@YyC}Y(6F4h&-6?Gio`ONc%exP?mzfj+ChMm5bD7#ej zAbSvI#CeuS;Gezjff^{o9c7V#@tZ*1R169 zh!%JySz}n4Ga2{;`dx^_$ulIcskP#@cY*J!^2`N?RO#2B$3;4WJ18qSj7 z`Lpf{K8wgk`dP=OY%Fe1N#Tnk6pB3HUWr%V3C-DvsIcDu1=$Ns9#uOQZH;Uy*k>LtMwW z9(EL;9)L|g5ZF!JThpY@sd1@-sSRUplyq_i{@VbXma!)0j~0iAXLOwTEMU{|Z|Sov zFW58xPeJuBBTkq-I)NQ`zPsJz-L{o1p1@%_YisRCzFza`FU5Uvof~U}o|5`fJQH$2 z>G!da$(6whdB^3jVLD}w6Wz*u`k3rk;X!=en}wJL>9z?Nv*!j6o7mdU+%E>_;p+-( zhyQQ*zoC{7LjpS=>OY15nBJW4yv3##uBq5$a2Qr3aP@cQcZx4hS#)XC;E%)}Am(8o z@gHznu-;l$W#$t(iJ5M@(cj9mr5wI79BQyKPAXbkw@zy0RPDrwlEsMoGh%UCFAzIr zES^I;906=+K9jtr)`|{K&z^2D2_H|*GPReN`>KDLeoF7MzlyHMT|2kuY|MXa>|b*p z;-c(pO76i<$d>XFZ$W)y>WIWV=n?r5`Ma?P%A65JWp87NSp#-v{m5t}x&sk!0S~IR zqUQ%Z+qeE=slUnTgsv+wnN-$sjw@KZ;ss!>)86}Ee13NBJTrH1jhPkbIDhfftU8`g z3UPH!d+&NpCSTk&vUMQi5WnKtQjTqktbXa6?`!b(mt}2jSetw+kvT2#1Gl4AMC-mw zJcSw36~7zCb9Uh5VRqrua&D|YY?J>#sbTmOXM07;%8HX?yhPFl>%rP!KeQjt&Z*vi zo^89*S0Zm|E0&e19K8p#XLQ_Say{(8ZG~!)?c}Kj|5f3OS71}UmcUVbF|$B;igx&l zqQzNVo?9;U@YtF&wAf(i^YQ#FlOGu$y(RjKai=YDoxpnNg@f6HMt2aKSL=>mY3nDp z%C$1_;p;qAV-J7ivZkDs4+}innTkh{$}kuvJ+d~&MeGZm6X_b+c>auFsgVP1{iCIS zlXAP>A13w>=k#^)x#ht=VKja+S$pC~eI0&Ly3j-}80FFeTt?XKR3=?_hg=AG<2CP#Bieyp4!_k-C4as8@S^+WKJ6oHHS3?k@E!Mp7P|c;OOHB==S}T4$wrK0s-}c`& zIiuHQewKInAndxPTuF2v)(^P8QCf`vst@#fM*!MnQ^=lPlcndlMfT(wp@_w(p;liz8RA0`-Xe8+_)+bi)M z&WiW-6V9sMf6U-JeG~KV_uyZ(R=H8yE&9w)&zvFl3Go*CXZsu3GOu7U%+GQik?r)m zM}^i#YS}``hqlPaskM53=-NJ-(ZF@ozr`7pJVW|NS?5AyzioFFPf~>MV9_+al<@A72~z?;oR&<(>uH>|7pHA zzJoR_hq1EXW6j@XeVxuBF3Q^3=*MGTgXXCQ|4h+S{h_B`4J=0b*P-pBsrRR6w2gW! z=ChDDIiF>z^QpO`kDZTAzKp-C?c^!p6jQ%(aRQ6}xZH6@j}t>i$Jo_c`8aQ(wt+G& z3qJZdW3kjW0~JQcQtI+g$@#-p$rfY!JOcEo)`~u7z+cunr82Pbz=h7M;-^raZ${Uc zjztsuy$61maK{FpJD9DV+yuznLR;TN3dsK^I(mC zaZGzo`TK#blY9`kNt7WEfMz(0gy+n2XkBPsxEpKI&)eY~6X(3Z;apc01FUtHo4n!5 zf~qh5H}vms9Xki@iGt#34rSwAf$FWvjS^haBP@bA}&fJ~B0vA9!61&K`5bieL6N zs&yIsFsIWmg$qSy(w_}oi}&)I@Oz1$lQ;k4{>S9jI~6;b{Wth&$@TlN2Z%SWWy^Nw zXR*ORx2UOjU*c)2Ah%PcKB5;U0fYU5)P-{X#EV{(-Dhf;XXWOZ-m4pmH<;gApBgH$ zJML$3;Z5WS5Ie&8tF^L+|518V`CoWuGq0J!9sM@pw;m`SFm*m{{kFc&#oq}#U-$To zOIhqk;we!^(H8(Fq1a0A;(Dw~dMWO=Yc} z+%=jjz6t5Gq6PlpZzp3t(|ulYuXUj3Z-e=!SEVAg*W54SUBdM(x01RR*rq#-t$YE=DduV<682 zCQ=7HpYvF$k64pWeN-9PTKCP)AtT4yMeS6L_l9X@?W54d{Z1+l#@>`1=%2a>x?Az= zxxp+`KfgWNju?@8uPmgrmWTJ2ZkE{WO|YwHx;Dnxs;nROspOkltGL-guMzS`^?|B2 z&J&lxx;4se#&y}-qMzTp>`~}+HLIe3=~U?%8G90Z-q7asH@TZkT&p@%_Sjg+w{z1L z_xt9|-z7HAdcx&76?Y;(j!eWhDF@;{vNUaJP0t$~o3H7f?XKr@0r%48eHMrRF!j1M zxz{BQS&zFr6Ec&w$64SJwN`P1XJah8#h@$JY-l^@7thw$-4@(t>bM&Gdhu!c(Z@wer6*fs@=D^h_Dm7iZEPHPTu(w#o02`2TL`*$yo_ z7#=^>JJsYs$49m%XHoXw#^0P*u$U@GBA=-JsaAd~WB*_0TEE}|->#o1*qKdBOZNFa zvx7udQ|7#g-T|%4UiPdERBJWY??BKQ_pW-r>Jq&V#K&fQo%q<5ft^Lpo*>E}+Mj;< zaAS)OE6fu6mUp%nSoHdQXiMvLNft~B$GZ%p(+5ras7=cvTY zR`z5C_+92B&O}^Je`jFE#sHbqyc>5*x>{AVb#$G>AwvIu;QMCm46kk3dki*9b=X7l zHT>K5UVFnAmnLxOJNbRJ?dRQ9`loXhev39I>pf1un)UzV154+91y4iy#d|7jeb=UV z4niONZG*4yEyv=AHz6OV?W@Bx7a8AeDzMYFoZJ>{Gqvaq(O!q=!1zp0;4W%?r`Af} z?Sd_>WzkECyY3y@n!~+;rPa?8{5vOQu|1zGy&!fD`-tx@jS}7M^l{3^d?jsL)XqOsZP-Flv2jzsehNq>s^_)Go%_5 zI8Nt#)h2GR7d2g!pU2?LySaVDhaHUgdFbZEU(3Q@`z`)y-Z|E_d6s(LVq)|zn}QsN zqUY^yPtyzYy38vleeT=%uKTXBUAOxEq^^K7xGzUdj+S-5x;EGRicjoH#Zxu8b;6r# zA;Sm8^88|~-w)q6ae(u^--}&J8@@54v6>xkVFF*5cwgFHQfp;bEHBs^En=tW@2Iu< z&f>tvpEo-x6N5cD-Bav0=54=14W53Nis-*4zkI7dPx!a#)T(B`6m5Rwh5T}fO|j?h zJLm7_9G0O@Ozb@<&d#BoBmY$Nj)})^E4^ZRANHsAo7j|ED>`TWs`deY$ZR$??f;-o zL(7WwsXvGfNx!4PpDgD*31>_FqU-%Qn@QrX|0N#RaLFlL4kn*g3PdNeu7kY*nocGb z6;|X3#E$MP-YNAww0qwu**baRGwb-ktHG4BA-Fd-hk5MW_|%}er;d1_S;CTgK;P7%DeDe)RpYF(s#$1GNR*p zdzcCSpybvk<1R)f@N)OXu~W*%(IxA%_&MLiocjiSP2Jkm@NUBw+e)W4tHAFvHuXQD z)tlQ&eX+N4=b=>_=cnRXy)ew-TMaQWz|rA$$Z{pmR}>EypN=}KCQ+wdAJ!YbXzApNsE9e_=SD$Zvs}W9f`qJH89?z-w~>{wNNI>@EZqIASUcahYA3;@48R(LGN9rYYyJL^3^lYPd-RF~&$4zU%e zpXW^9{C&j4Ogzf7IMtoQ{*rTN-1r{oEXD?F@$Q&sYOsRO&RNWs>wt|w-ltAK-y0yZ zf^pruQ0KtkA|Lfg{MM*KmGS$wM64fEf7>#!bzj?~md3wpo1ZQ`3%yg`5FIOZXymDS z_?whb#8PXMpCB^lHf(}3lJv~qXA`|hX9U)NALZR>_SxWHBf4xfbXfy>0d)QC89|lU zz5K1W!#7YTgSnHCdpBpU7u%TU-w3oh?O$A%yFubSe*+db>nLGVnp1;h18L znMc_n*HPsJQ9E(Dd%4klHjiDO8?hMTblX7{aM*R;0xAe>1Xas-~!F}Ew1T##q&%obVgv~ z-h(h-M#mXm3SKfj5k1|Wh6d{WVjL52nhhwOt!zlpKjZc~H{_?5NPX|8*yg_A$+#ZU z@x~O!i49Ep;k|3W8)*K<-Z(r_*L?xBlagcfQ$`!?wKqx@u7>LjU8tAri?z59{*TVxBwCa0`x zM3zaP17ngpKCIS^4|Ar>Kb_mKH_AHBG|@ahB(T`~4gLf<=i9J{=dzR=Dt9>|?q41b zo9DssK|_;++@&T?I4H6>v5T_RCa-a1v90P~Ml~H{WoJSc(5I^d9y0gL{d`~OBR&G{ zDCUl}E@+c~S)Q{1xx&hz-uME?lpP~BB;V`qoT`bv7kO3MgxdD24u3H8fEpMR-)O3^ zG(0_J^~jWxogwl)_Ga@47VED=)FHM}J63&?=xKT*$9{Pg+s}u2GcSq#I}`AZ^b_gJ zYd?s6k7|t!VXvaTuf{}P`yz`Ze6uhz;>+*{mhawXRwf2z;FW2uYW1@m7ciZjJNA%61E>`)VO*Q3lnwb+uiYE=g`+U7qbcE#Ifg9o~>`+ zf?2&e}gsNMXIE@Ln6kjmAzM zm^oMYg);3r?`ng2&N=U~4b!OBN-qp@ZM|7T^m~abGM=*|ZFO`_&eq*=-a5~jXFDsr$~nIVzZ(CmCTB5KszaNfEfZ`a6~|5&*!QjMlh1?C6Mt)Mm5Jzf;Q5djDiZyt zvr1=+U&*s7&)3ITk)E?U^@!-K8Tf-ki8$?}&~aLBe3Q2L)tm>-J@7eQirr*3H2ova z4blGfF=e*Skow|Je0RvtF{m=qdbv~f(U|_JqiruzgKzz#kXTP0^Qmg;`l8sPB)LDvR6ompCNby1q-Vq!uaDpTEpU;(7Zgzdm#^HJe%0*< z)EWjVVA7r_^cPvjc-`!1e=Ktxk3DNzFQ_$oL~g2b&cwV?ty4Bc8=`Xj7O||=8hi>Y z>&l>Le3_F|C!4tRe1DsK{v8-^MKLcvIPI3HVT0H|%;m9{TtB}}{#?=H=Rl92Yz>>_Inxg{7&s@qBmBo(nH#5c5c|2(c0L6$ zb(Ne!pJT97Zh!Zn4uFLfko0fOfHTtcw!DdBv_E3X=j)}drNG(90Md@q2FjuFjqfzgXsY-B&-f|-bd>J6h;q0z z!syu{f$b%%_xH%z?#9^;c6I!u%y}69w4K>M)kAonc6G0`ofYznf0D_G?DK41k2R>; zM;MZbuioK34I4wrvCgQ0(L8>0X1vhb@x7{=o$sG-@3YSNP-U#&WmsW}scoo59k1(DNp483Ri5b8;8LL_%B}|VV(YVg*nQaeKI6T1V(XHI zyCiA|Z_M9lbT?<`X<0}4qxnv)72oYoHJYA|UG8eJlWFI#0nP*InQ@7RNaY{N7t`H0 zw5$tV2GBv6M|&TNl(fZFR)%l&#xWYb66`MZHbTD#|}3 zc_Q+D9p(sVd!RmCZR%c*X)!|LIsC2h2~71@fafpv7-C|(Ds0^g>l?NG#sUXgW47HS7p%^tE&N&CH}rAlMAL&t+zic|pJYEV=TjGQ?u_ce9FMrY&e7L| z|1>rjYyUJatF_|gk*=M+UhkhE@5^}L>#oI$+!tflG)J6Mt;--s=*!qX`ssz~W{xCl z;6?A?t{*E{+4XH;aj+Mm21e7~fgof0I9|uB0p`TtfbD&9`gany=b871EvNZ(YsxY4 z$$oh&V~+*iqxPHX6Z5{?WmF#u-)mWLnW-&#tYGmI?kRl;Gf~Ca4$DsR!)^Ka=RM|oTK(lb%3*(#prNcq4x677v0kO{*I!wP@E-x6nj zW@0AbilUu^>4arUzhDmy{#fxn$G}#(Kc08YXMR=s)%aXT1A9mB^P$pAWB=1`Aq~@x zQfnnQIwQueX>4p{an3*RK9KrA+B~@^XKHu9NMQ0r`O{2Jihip;=eDV_X6``uVs|sM z@4ZZe>5o|I6wKc)juuCq;&V7RZEH3vQZ6vZz%5|TZP^_rzIVHSyP46z871xTx5QpP zsi`2a z6p0i$U)uGCt6XT85i z@;>w{SM{R)EnZysd6Sz{8nYY7#QESCt_5Nm| znN9fNL8x8PKEm9@e69n?*U+we5E$bRcn=tRqvV#1JuoA%{g}u#h@FYK(oGHi-(_#F zV{g|adX6}2hIGg{^X%vm`OZx4A8`^bm!iCl$6gJTEdBXC{yj$SZ7eJhe#EhP)nTIE z%-LxA3)&TJFAw8{TF0ri(s9+{B2zzqu&8=Q=zCsRx)8{AO1`PJ`u-VC8;KD)s1xXu zvU~eo(dxuq?hcU;7eVIt3rC8*U5)c^hdK@39qpVtw@&gz4(zZfZ}CRhb2^E?3xBXW zm~Ck0N8d5|;$CT+ul!B%km!Yj*mJFuq{&WVFHv8tD1LAG3v;WrZ21AbHaZ8P)@9Bz zY>0N0uCHi>M$+F0mY3YuGThg=yv=DIEFKhliSJS!J}*8<9efbRC64F2Adj{T*rfV7 zcX(4IEa;wOdn4wq|Bk-rC8) zsgv^o%c7R@9^-c`iB17e1NHFTiA+ zNt^s;$@gu-0bP_h&wCTKDE;!UDgOd=yUVq4r&+nbh_AC3;;GO*QE0vk z?16FUNRDX_bDVpLtw_6KNqULto4doiL+FsTyHiTT#LwdS{Kb35)AHX5-||(?-4ndu zLGd~NIe~jQ+no)%qAjsdqO@8 zje9wVLk>sTi=n4fEuxdCLwKWP{h(~Azo`!#R#;~0r7=ar_(b2ky-Yr+Ph@+vTc=x_ z9{*kN>NLMhD|Hqhjk^At;2M=f!9LYm>AsJO!?N_#=>yha{)Nt)5SLQ>@2xTxU*ePe zR$$$fIelTnPCsP_3u;ZxBOu=%}rf_LJ1=*_`9KbZXZR==z9 z*H|OXcfn&2xB1`Lr|5$j88&wGMCJ*R|Fng=XP-1NjdO$1XkAu0tm=dvet&LLZ1eDb zRXsWDl-6e~hRL(8t!J20vNIZvMZYlZmQIlK3lsgkZ>6nG#XdOAU%TA9Oibx0Gv5kw zCcQ#@Pu|_@#l@l{$by$Xy1G=>i>1VX>p=|c2BS; z&@)_^lhW@#7d0?_@#dTz{6ppkgo*LYjhG?j|135$_tOw5JBoWaTXK%d&pHrPh%5z3 z0-wCOiC3t#dQRss5Z&4px^;VGXM#5-=8;uJ)|Xk5vG`8ap_L)+61wS*c-ABh^hs&^ zo%yH()OzO&nT@N?tyg-vV>#gHEgV- zn}{{*=xR$v@tbfJRjfHb3>%~Ub4el|*d?vv{3pT2n^&;?O{|^McfGK*(9HOwP0OA~ z+9$*f(0TlNU*VZkK8(rM7(Kovw6n(Q+|x|$*_6T*si(r;P)lHIq6T}v7e1w)Jv(=q ztSRTCyzMJ#>)HCxS@EoJ+WEWv?~Gnslzq&^w`T+@<}(-kGAU(ehIWW-Jo!ks()74> z_tuE)qL17zV{@tX;R2%{*`K0y)+p3b>t4cc|Ela&CzA))wQaH(ADjo#>q^84u`Ev~xVx?zmPVA}nAs>tm8vGEoj%7=(tHk|O4CE8DPtGKzZmNb3S{9@bw^Vl2NcS4S_2NwVpVB`W zo3q}xc*3t2cS&Ei<4lGOw;1W;{Gp~Mnf>@TkarMg<9t9(KfAr%CigTx8XsfAH+Rxr z+Ss(ya4;pPf}OY6?8Hec|e}eUqC0U&Cq)J#;~bE)5+%IW)s({_iY~J zDa87;jBQBF#rq8XLHwLN{y4A*sIwgG=snCy*UxW=)Vv|m9&3U0xwV3R(KLLk|Gm)9 z6|jp^F$Nd!cUz&2!6d2l{$}F;8w-ub#v_&mbsXb1tVP%K)`;0&+IL>(tjb4$W zzkvP2?>jH8dQo}K3;hL#XTQqXxaEBRafvlOhQn&@w>D>Wv(v@&A6@NS?dUuDop%bt zlz{`t2WK|wMzXS>M&u2zl{h(lv~j`g80({}7sUN02=F_9Lme0W_l59}YEV1JGvt|1 z$lNKk#68c6<`^DVYsKTEOYe#O@Gb=0oRqEWzBqfaskMGH{ifmNyJ3rJJ8(uY+1S8C z5vAk#Fg~o-%9mj-TkGXxai{co$@}%b?YZE*c+D5%(66EC|9jWY?AYqtTIE&w_eH+J z*T{CtD6AXWPM1cu)~jV?&#eJCc$#O20}n^j2|krP1^(2lbxtud^XI_gQHSnr#tu2s zJ<`NC)Ee&+Om>I|rQcnx)w}n={6uYA5~D-&DKP-GeXiD^tEMk*p#P<9>E;C$d+|X( zdtf)}JH4>9GRDK{17FYjzh@TDF?9mJ32zfVA`N_9Vg0G|^MlkoPVAW4OWfmgd%>$7T9 zYn5MqwD73Oi>)c%=4g!fgGGz|GABL9&>L|NJbmL_IHuTI&1XW|xWf3PNJac&o< z$4cK2@wl2Ql>LUF0_3yB52Rkua;(9l&qX=V*t98upFAr!$HZ{n%3Un|$UFz?=QH=W%G)5mCqMrfwX(by{HJ`nYw2@AB3{uu zfn`^#<2m59$8(Rz^%avHwdR>`Y&skhnMmh+_nOdRH7^bqhiBsR$@shxxmVhdhmbd< zUwjxo=gi_om~p20dSG^-iIYq#Ox1CT@_T{@VGbVg>Oy``Vr|!M0_mlgR$%!mPf0mZpzer9N zIZB+{lhI)!6Ix(B-L<)=H{CbQ-+qK1CF;J7c$qq22xwcSgSTGnF7ES&%ngF0NSpB6 zK-a^tcIZb_1HU{`)6yRKI4xtN2Px3l|EVYV0Z9lvBe^z zqj!6|#I~f3#Cfu3#^O~@6&}6^A)H5KJ*EFhNedLYKYSc~#u+Y$Nn6)y0 zR&G|V1>TqE)*7*N9gCP!8g25Yb@`EEV^o6RyAO#yz`DVdXZtSE8!P%^Ed2L3@sB*tnP{`Jvy6>F?3cm#9DnMJkA5sW1#5^U z^wRzywE?`Nce1Z%sV^Wh5to>ho{lwb(K`1GHERR5$8|aO?Up-BaXxMG%S6UmeTVQ2cC(NeNetK=`&*IxMP76dE@qM_i$qg1h9RxkH7g$)d^O@JH z_s=tZTfiYHXd1pbbF+#0+=1F2Z4dMep4YVj<=5r@6k`i`Rm|^bKXFyw*3d3S98&lT zb%6VFmgaBD+x~81;%Qs!x2fNzwBAu`5Ihcdb@mFedFV%6mwOufSH1a96y}OdAihdI zJUl!*KL0mmuD9yJ-x=$#UEq-`Qa_tJA}*+Yuk&5o%k!Yjp+hbh_pa6|5Bo~d=5Y?C z%O%!9nS2fWM<{UguJlK$*Vq_veZ#nva~U- z4Q;>nf<%084=7CMLAJPCT#a)z6Y(_4Rnq6c+(6^Evi?Eab;m@D|&Gte^&CjBr zxYSW|1W-G%aaYF1Qg-H2!bcV0Bi0P)90z0aI>vqh=3{DFWvqki!8r5U(wTA>J9~D# zGatSuXF|HIE7S?S@psi)>9u;F^&7yi#^;qmWuWchPMJ=|-ncS*V#7QJ`FvgOTCuT7hia|x=a0%(s+cq4rLz*fT~XfR zHm?r1gRWG5trK{kGm&9hqL#qM(}?4t_xx(YerO$8%)>8oUl=*O2R=3Vlu~3?ZolzQ zkByEsy;oUZ%_1QmagMO2!+8aZJ@ruOA)9YSjh5a6x<*Yb;^WL3qf=^88OQS>4RHP- z&ycd{?XacEM?6`4vZ(WV;AFASQQ&}@vF%dhO8LLZeHG7FHva&3fZG#m#7emzMiuOA(8h|!3LVF|H2N0zsOmHOBIYKuv#T6uSrE^yXjX<3UIt@Upsw29{NQn6(Eu!bah(_YHHWWMht zFyEL5)O+4mI!$m0d7f3#SEetXnCe=F56%rXI1jftePRDAU%S?MLF5(px!JKk!rY** z*cH@4HC~O$7uN!RfOaqa;!jcU$JpZroPSNu&N-#erTBLm`nKkQF9K&QWYoC{9O>!q z8R82tPW79#oi#?8pfS2xCqUT_vT~k`F*?wD2YXxL0NjZ^Yap#E?=uId zX?0rhM#x4L7u^yl9YlSn*6;&xZq$96KIi&#eSL0-CL5dKwe$j$r9{$kD$xiF^Z zn=#LYXEGlClv+bRLoeJLO*gT}cd~Dp`t7nznaC^h$cY(S&(;YTvy{X1C0Pfnd0(v+ z@1NwIWbTE1vaF+{Y&nqaVRDP_phi^dO7w|HZ092g^kId0Mo0IDEvIGI=*%_ERGhYt zb6DXp(^LFm{zGH)F#bP;dqYjaZ{xou&7TDuhO}`3?xkClmzfU4N#-0hO%L_{8adB@ zgJ!z9C%D(*IYUiCt_l1p~UD_^x5^9S2vZ`-juVqEjA zSR>KJwK>-IrS?WJQa()EdvZvdY<0vB$_yV4aElTo3-5jM{R^7sF2Q`>xpw@PyH7vin#tA@5OjBBdd z(|T#-iQPzfwac~k4D0JOUvH0W++#zwsmg;#y95nDBW=MvD#oyaroToe5{z zSZv#mq#rYI)`OmRxqHNirOj|$!P@^z9ovszo$%K_Dy}uW_OfSlQZwDQ=H6>dKg(V3 z!8sh3v+?;mAv1N%nKLxCZt5CYA7@npyNNLt_E=Fq^hWIv--Y%-ga3um<0rz$XKs$N zy-UIRl}{9uoSzGSP_30r>jW$y(hq6uu+(8GO-o@mG&RgUb3KjTnGt+#?xswRmUi#9;5(5moI&$v#BKClk90?x*#6%1 zD+cG}+l0@u19QFgy>G<~9WA43iWUc^O@5Nt9(Q67LxLBLE_giAx6YX_I%jtx@b0vJ z$bV&vUYoznoX_Zt#Xj9u*k*d2W<|DFZbfkx>^g;E zg?=}af1HVoHJ^D4e(Tucu?G9MBC>kF(!0>aQ8zdn9PKBrFWDGfS!|<%V4W`uHYYx% zWOIwXij3{^Uf{!KACTC^{jhWL_^0JwL$SfoaOZHf_^sHQ_h2|f#RlQiF{h(#!Uq3y zdCq5ePM2_8>{^h4GHs=`uX1%zBjf3 z@l>@erGKPrhL6OgaLuz{WXG90&ncyIgpba~nbiBWBJ1vg9^VlAS*PR0u1i@ApB?Cj z()y)m$<9-weWH1`U;Zq?7$;B74OSR`VO(J61$4@eF})IZ7w$IuADWn#$C?Vwv&2nO z&u@<0ld_lSckrC`?>0K!3{DGeNNsbDDp;(KKOlciTaLES)Z!p>*K;!eF#2V`e~-kO z>HqGi*kNSC7ugo3M|GE5G_|jr9oz5lap_}Ydt4U%QTgVehv{x-v5h;y7R`sJ#XbI$ zo%V^E-W};hGFP2G^1{-s;8Ud+cKiE8*OS*~1Q#2*-46ZxV`BO_)>Si)7;BmuhT>yV zh7?;IAvNCgDHarLy!0;M#F8HPj>8K7&%_WmJGSO(QP%!eW5&)A`=w-Kuv7i1zSPDe zPPHs${oD<){ZHGTcp9zoTeKe<{IA6a-wGd`vuO1ly_$Med^G66?6cvsrk0iQjjoUh z^ru<|EfsDFerrN%iQ#wFcxyUo>pvUk#cn{vp%czr>BQR7iDGZx2YtE+|Md5XpWF@K zAy#lBYBKeH%F14APQ5^VI@65=%bNB~pHiQ=?t=9*uZUb)i0{0Rzye)an2kCLH52gu zjH+vT2=^YkZ^^qa!Mk7RUuf*ZwsCy|?`VIx-|S(luXv4l^C|f$#^yh%Xk{1XKZ*@T zYrO*11e6I}7hBjpoa&xxa(taarAIgm=3LAS)igFFI9lF?@3=mt_PhoA+~jTYbbr?4 z-dxF9a5mPLs3Fub?R|n7rSuniHl?@aS)8+4tGhegE1H~I*U092qO8TL!o)klJ7TZd zx$Z^cqp{bfLz(r3zjxOgxmR8+FZRIOGN;xMDP38Gcc;GNdy)P}c{j_Ri34^OW|NWT zDK`eCjx=k|GSEI|yOQloy)m@-md8WRQwMcMOs{{UX78p%FVaI<8*?N6r`DC6kE~-0 z)uD~shkj^kqNWrks=N>Q_W^G#e89kY1T^_BCX8vHac^M#$6^cHmoWqN2DAreK|q|4 zJHh0Oi7Cf(;F+A98)9(48vGkYCXd7Sj{$x)<@p~W54QzCBFCD#Z!L18{9F1p-4k{7 zYOSy}YI3&TxF+|x*cG3FexAxaW$Mxo&)Ax`+ko??-{oKFf0;TQ*6?UsNUaquUG3T0 zgCo;NrnOFIoQg6$#Hp@M`0uA@RJ|GHq*|9dJ3!|x+!nDt2|DrnN<6<0=+ntI8GkKw zcT1nzF7#wgP0X}CrbT->AIjA`0~=T5Or@*9QLoGC|7&utiI?~>Lu?! z7(dII$hvoIWO1a%v4MO$QsP>a13gPq%zV;rz{fs;_p*XL%eLo*GY6GU_o`Nhs<)0b zKQ48f_=Cs)zGJgD;y66_(<0Sc>fx!Ei5H}4zAkIyY~#K0rdLs|m5<*_<_)PF)@go& z=$9(I%YBGJk@o1PeC$}8ZF0_HuT_UOZn-*Zu~Pr-|J%?%XXR-72L?)_Oi>ttcx#=4{YS4L0W;nl^yJaE;3CqN#*A33s4 zVaIYE=NS;=ah;7gX9wUq(tlykZ*|yO`fwSCX^8#@Yn3Nmjd=|`|4+ep^eemKOi2Ha zW4;)l{}^O=z5k-@86TJT%vxN67lRjZ&gyK}x$9z|8ndn(TX(uIV==lJ15{@|8S!?m z8CTiZlywi9KE$?8J2_9*1Qx@hskNvM2Z{c@2(c8}&-#AVTJ7PTXqK`0zr<`Eol{$# z+Jszyy6b@%)z^G6^l4o|%?P9KSq6Tj@4y^Zb$+C-OT?558&7-Kd)UP2s>5lbi>dGa zQTm6O19EHnR#Q9FvPE0N`}O`aVkggsoxBq?pym0QW&H)G6k?$H>eOmHlV`HFNv*l( z$Y=8l z?%4}WkLr|?^;J8R5#K=ZY%L-Uy2fBeU~viN=jJ2-qG-OnSRr;VF&uu)+5F&Ex3{Wk z1nuq29cki|_Z4P}PfZ)|I{!Mu%bfA2eO~5tw5@d#Fcr1DdOp!Fc9OGP{6y;IY+|m; z`M^Bk{!c{R$U#tyJ`=_swas7eTMTp7rRy`ir7&LfDd^C<1pl;8#2K|ZE^%2jTx1UA zZ41mW)pvSXVYpzs@f^M{%odr|GJ%r`Y=4aK+RY>o83Y)KspCC(&y>JHT2R0lTJT>zG^wp)%tJtyyry5raAfSeWM=aqrY zmEVY-O|8?%d#gt@erIIVX6H^*Pdhtml({za z6KispitHK+*~NJfiuTYGQL#mMf&4hCVB={|lx_?7{0{i#k24m}u*R7y&!Nm&<=I(X z^l^weMjvNxU@?Cx1KTrR8CY8@j3&nT5?Cvs1i{O=lnjp5Vh zoH~)!tTpNedt3KVugWW3MmxMSWF2e0;Fmd{mp(VX&#vMw6Nl*(?lt$=;ExtNkncFA zWMc)Fcn#vG@T}GZ-3^W(V<4yD`HX?A_H7O~jBE_NUw*mdb4#eXdca#?>YZ4>r)`*7 zrAncB@(ZTi$vG2W<;KE|(7&Xg#wN8U%~#=0ZGL%BBh2GfHnlmcEp| z-{ed~_Y|?!dqNr90-P(#z;Un{4gp_+zf0<#kg~Pb128Y1GP6IRD)V)IDU1IlU9~GHHJMAFmp?s z*;jrp-*IGEZ7|=~q}Lcbq#ba@Y0Di0n@6qH*?yM$EH{GB!Gl=ut$m8d%oUKON}gQp zsQD4p1zj=ATia31k$cke_Rc`n5%KPxO<=IJ^`C2Y3ZCB_pa1BeCp^gSH26z}-?0Rq zK#g-ZzJqH)yn2htB@r7(olnQATQFfs%i&sQl6>ADf7=OlHQWzn3wqN;rXAnI8GdD6 z)w&#k&$}dMcb1i@GvsfzY@zJHsuqli*?O4a3Hvq=dB`*8?2J{YN$ZO>aKSdzX#FGf9VPt>}DQ0>^cBG#fMH%AJ*0-F`@|XLJ13L$#PwMnoK6mw=%c>fF=EYu$>karWgV4WIfjvyd`s<1xg{MdZ z?K0CvU({mV3M*~fHz04DiTUxUP}#IcgCW&g=s(*zw0J}(xSWZj&dm$bVt?|?+hG2P z{@oOSkc59>-*Vn4>AVWR%bqDs+s}H>db(awtx>aGUgb?IPBYk~+X}YcBbB#uY-MO| z!r#U7acKL^j+9?Xe;?g4qK}RMPhFkA+MEey$4k7lC3y3-=%uJV_Qv|~2LBT|pO3LF zLo80qL)HWLh|h;UI6tTSJf_7lE%bU&YLJa z?U32|*=BEyGi$#17^q;Zl_D)&;P*1V6?-T79NcM^dTna_ok@vV6`gY`eoj3F*c-$9 zJX`JWH24ph9OaDSOwqp`A*)|aU`6&Wn}^)1il?bH_wPCDiksy7tZitMuaI*t$2k*U zSL`LohecUCcWivZhTm4&A@Ys-v@BzNuHl}>59x!uQ`lT@;C#Bd>aMBp)&%o}erWTv zH-9wVoxSM<7PQc)qrU_M_I6XGq&)Q8qB=FuF9lM4bgww`q1{ zeSylLx5%GfkUxv#*vpq#j|R4qmfM^=DZU%x|HQtS`YThN})id#YjVu&! zhm4(_u_e))QwJP=MQ`XGOJ5;*MhvrdIOj$Cm1?bYL9epY#LsGK+UYjq1M^9KqK8vlAx_CeD(v7lh_3Jzq|yiV$)nW=~4 zyo}>xjJQSC)Ne&*u~70tsD7w_-|u#E_G~PjB`wQzmvhX z%!MiXM~@HcWV8&qDf-#))N%fCMuub7s>x>^2-e1VVbA%}`_lLk6H`_W*ZXau-vg%# zvBBlYzcAj#`DpYX$H=;=X`nmM;Bj5<-(_+o+kxz>>Ez7ZnWhe81F+V$9!YsNw#+$e zluMkm_H*#FnMKkj{~G8dK%XCRPU?l;C}ZpW{}+zLInY*|9jRGPlp&ua=DwZeSWKsG z?inu6jk2!Nvwm?Gw~KowK4*Q=Nyr%bM~&@5#QadMOBBxIVNxB-^}Yc)mrqz$Q|LVhUA8* zKHN7c|7}d{u9CIkD}!y~|9%Jm_pimj8b7@eH=|=*^$9HZ`9&*-N4YltRgc&XX}BNG zAO5n@r>nfJMxIa2Ov-3EJTYZwdOqM;{NCNZtxLHj?x&uBJ6a4pG`<&O0!L?#HaR2s z!jMa9e(osm7O~l=%RVW5B0R;q@u8)mr7HaG6^N1<0@y$LeFyp5 zO)RLN*U!`bIQ=z^cRf8jU1Ai}gKDk(zOPD_@4iW&XYOKM@e7H$F-An)r+tK!=X?50 z#$?ABOuX%`^7}eMr|%8yJc2fP+x!1Mc#SkqdvaigSQg5@U6g&u^tEj(t&w^&xQ|XD zQ!swkCityd{t#DF>qNCyI&pMnqtFA`S9)4`{`BS9-^w%J2Y$aRt?nK6UiqQ4iZ#*B zSy`|+id*CQqV3@Qvx>H+;?w9;<40eJS$MpQou{=Mz9q1=WMR0#)3Rt6YPR)Rb&F0F z-!GKh!NfmV3#w`R za^Lz~WAlr|x1vt0ajaeRKw`eYUGNul4IBIvGne7+{M{yB@FZ$e8RvNlJg(NtUVS%w zH_qV#R|K_Zd`IDz+)xt(tn+Qn(v*^&7k?D&Qf+IED%iLR>r8Hm-*>YqXB%Ghyejj=Gzyn*%RJ`(KW?)?X_&qyt{2 z4Wns0bYGF*T8Q5w=AnMa*YiN>#&br4PF~8tl-Kr;S}Xg9^BnnoKJ)&}gXWGt$^R$c z2cM&i+Hw6ywOs+4vY2dL1cP1WBLcU~=mq-nq))~JFGN3-;$QTqr8;}s_W03Py+xEQ zHANM(B~7Zes(T+(vY4*K9@q5KH8F?%EcYzMTyuKivhUzO`e@iygIvD zV_r423)-2U?#6ib`XQWyTC4XORj_$3_Uw#`^+I(bK3{BM?|oNd?hj|(YF2^;*Q1hfypdB1?BvQuIj;>1}WNH5K0gea?#d;0(*11C9Hd`sMpb zd>DUP^%ul~6z_XgqYAH>Tw8~t!o@lc_xl6%j{eS?qOG5)$^BF8nfLJm)HS-UzzHq3 z18cnbx3quuW%io5U$69a^6uB-^Hsnx&@!`QsiTo^YK^l+f9Rd@e78HWpXY;{rLK(c zUhmsEBUk1vrg{^6Pe%5s-?vATjE&t+YB1D(c#qoN=z^MaEpzq;YfLZR{9wMJtDdD7 zaSp2Ykn^xE!1H-`^9ql~wV=S<5bSz|hp*O(_EtN#9)3EoA4$(nAE$go(PEOf_K#L| z5s*cH3jbt$rC|lzADR#Ca~?`y*tSoz+fvbqS}Xcll36A?nzr|5=LM1Z^flNAs`;*O zLDdzHz}YrBX=B?D%-Fv5+LDTYLZnsg%>63yN#=>xC$KW=^2-z^4{Xs?F$Mb>dq5sv zt;?L#ZYnG1%n?1iM6Ffb%dzhCI3GuBjTI)w-ry~j+OsC~4^ED3-NjY@HR`Nz!;hyP zm)t$$7;A&Irgpa`XM3sOTS=^=UsuG#1MB~8Pw*hICbV9DE4y554BAVN||9^SOwP>lq)Fex->~4|QzJgjj+)wz)I6NAf|8Q>`mn`@cH0 zKJpL1+|#&Ztcz3p*s*G>zs|?Stho;tz>bkPtTl=jtxa8YOUy`CbvZV zod(cA?=sHfQGW56g(FPff%Pid9#(7oEn-B~p{<8+@TW>XXbSQ*kEj14z6ou=?%4rG z4{j{j^Z!#~2G+}-jTQKqt4lisTmt-@ns5YHP|V}<=g9jGcCuA>m+m(G5$G3I`v-0B zN!)4o?9-5eus0CTQES!}G&TL*+i7Ao>k=~p8vMuPIgjETIA@CVP=!6*0sT%}aWVvo zS}VS8h&o7~i`bPnVy29?$y3O!udmtaj{hW&XRcmE4KkM3B*+p4vw{RX-Y@?Q8 zj;HbWfAOA?_$qM^y164I*U7x(x}uGrkUq6t5#=uudw{a*)zWK5{*3egCbl}?i#RG; zZ(J`%PT@u6IybR4 z_|)WB&x-TZ#G<^o;$o=*9s!!E3tucT&c^$#4;3DT18VJ=zz(YS?aaqeWIq@GmiZm_TxdH}t;?KS+7b_cUr-y% z%vGN4%dQNb7rk7EbNgL!h}a>t6Sk(dnwgtwtz=X#T}W$RAao}SJxqdqxXSyZ;r%tm zHFDSV$JJW-v?3f!RHWKGw9FN&yI(GD-YiHsN%GzGJ z27ip$Ki9(uI2W}6+RkAQn&@|2OpSAiiSzuNwK1Fvd|QW57uLlw|K{ki{k!OE(&x&Q z<&5HFVv;Fxg`7 zqpw?~?R=}HQUgrgJ*i2p`M2nMP1NKsO3aiWnY&u_7v)uX-o_&8eH%k-g}k|@t8)We zGtee)aIBTWo>5O3E*w|J9TmCOG-@4QriYiofvrw$dwR zy&rwnyd&nMc4se?&q=rcEdA5;n_S>1c{>PaH6-}J&=s*+^d7bqeik{l2ekwbx(}K< z2enr8w#z+AXbdw0F~_#Mu_YGzBSI~!U&y|Y)$4|mogFqIW$o~G8C!2q6Eb$H@?1O8 zJ7O%p4NYo|Ubn90Wlt1rpYkqeukbkSb`lc=Yyzaf8$Q`KJ&EMnsy~}=Y@=)8|0pM%pU-U}b-n6T| z(PFPc*Pu2D=nnV}`^qo&KNY?!2Th)sIWeQ-Hp2>bHuwJULzCa>iP^PU#;(e)GBH)P zRy6jvoSi#{+V8kGp${zhr6y1DpF|yzTC04-C$8nA#WI&xy^C6_=WnRksPqEfg>?=( zZ}_9XRqXSt;lNB!O^ZlOzaG&d_!S_!Nz>Rvox^2G&$}UL%mI5K|$wu!m#Ll_`Wm#&w0zi`-fLplj31Ims0$by z*D+hphoY^^Sy2y`9yGNpy%YBEG+?4?e!MHX%gEKb)bhAb(2@Qu>3PJv6Q7*lr(9KQ zMH}0)*4`VGz~)L9Y%Qf)tGL{}g2wxGJodcn{r8FS0QoM&Ow+dL)y_5Yj`U^D&!3MP zeibX@+yVYAW%%`l>kW+&zl)z!4$O*r!hfd^zOSjKVC8=~=5c7Anv=499|1U9pUF4g zH-`5&JA+MLwbr$E={c!$3?7|YmpLmT>s~LtZt8yP($5(i_4v~9M!&R*K5tGPcR0>7 zmACUC<`t}MP?vv4;xl~rHu)}MKb!!&v?8Ty*r2opYoZ3vA=bne%xR)5V(hfuZ!bFQ zSoklTlcjZ5=g{U@(}l|n#^4v3FN_U*i8tT$r7m?W{z)s$g3&ba9A@6}oJpUH!#)zr zq8>RcVH><3%r`lm?inl3t3!+3irxXSou-0T2f5ZBZt$&MXz&`mi|||I!9`h{`>P3i zN=}4(s0sffwN+ey1lra#KLLxvS>Z_XIU_8i??nq_cl7G?jaWIi%wJxexEff+HTUu<7)pP8*dta~lrB1hH6 z^RBBiI}J8qhvGxxyFrhXPfhqlPTKZ#-0R&hze~HT-d`y;$$PL#>M>hN)AP1qo0$>W= z7{&UoHzM+__4pR|N|7y1sI^;=zy_&ApO=0n=ML)}%K4t9fuWA7E4u>krPfN$w2Exb zZeL*QoiLS3Y#1~#I~N8Q7=LYUFxT`1p}xz+RA;7UrnFD7-v3JED(~+8jJ4aBI=0uF znD+YoM@Azftqa!1^E);`Ck~1RnOYadE42ShTqbQ}Oh~nsdIS19?+5Rjc}ACJp1>`r z7)$GHYxDj6zUr5!U#Zrr?`B;7HiO|-gSatk-RUc>@~lq$G0}Guy6=cyUV(kSpXh}o zPVD5EH@}A8N}aU>M(Rx0KJ!-J*2q0lxL@jIXsa(sEkM3f>7d%uU&Z%iY>;^e(g0=A z&5-B%uG>2{SF#Ir6q;sg{2Ji2C^}bbMORn(w$`gdu7jC(Fr;v)!9iV{ep+M><;Kei z+>8;$i7*vZUwlpYoa9w`zi;JHsg2K>Q)^XLDe{y4-MPV@g8u%Z+-u@P(Qe%3ye;y% zE52Xv+g^rOiuK~#z6ATWws4}!Rkg{_l3c?Rux&o@Y~4;x!N$PfPs|CTEYh?zFM&5c z6Sbqfi)oOJ+Z^?`f5ILPh6jy*%DJLE!{d9j8{RSKX!?M*N2iKBCymXH9#VDqxUb6K zUD+EypPQJMG^I2JeiM4@@LQt_HdgtP_ma`S>x%27u9!WlqdXfIo#}ofb*EpW&vdh6 z=e~{3oG!oB7w6DEfvr&!mYKer1(4x7j#?MjW(>ePwoLR>-x%I+eAOd?ox&O$+NICB zzX#7Mn%|n)YHBSSic55S$(vk!S9Hfa&>hV2@vI!k*q*`GvI?x3kC<1OW$KV?4c-WI zoi-n|6*jh}nMaZ9A#GRTZ$B@6p>jH)lgs^11~csf{{n;YwbaQNd)O;@#zw-7PSX=X z{iu0xO<-pkbZ%~QmKl6J+4;=c@S zb4E6MDq+Mq)Ny|0MqYUdX!Hk**QtJgncEUYo=5w~U=02_3!NeNoPk^ze1~ zwTTJbS9rwKF|ucQG@d_X1$Z#ViKX0Nz0=jP{N()NYw;b{cx3V!^X@~lmx#~EoWlH^ zz0;+R#cb~r^)dQl1Z)h_DrMTw>E%YZUhP_%+#XpRr;@5VjzZ|A`uUn=rnlNPB=0Rz;S#I&kD0{E&f$L%9}c$>hL+x zBxa*SZm>sBW5aH!uyMS8Za;%T@qlM-hTU0P-?%T+T{eb;5yLQ6B)bDDW&V>^BR0UEBBMRFWM?y zVqUuj{kEEZQ1@%%x|n$+bh`w1$GIn3Cge~9ruky2W9N*_4dVPSHgu$8`)HPA)Y($k zM0uOL{48tni?WdUdJp%dt=#5pDJ>6YCF1|A)zLonN0=|5dG=V~w`<$7CTDeY-@+|Y zcgK7O<+-N+Lgvj_cX$r#V`)F{+<8c9WtkJif4t6N=dc^roMEBX<<4}(`u>pmgW-{d z&fmp0pk36=$v8Zpv9M>tP|Z^S%Q|XZ?o=M&Y{642GN6sOaW5mn22+1HBe1??%fQab zZ5G#E_d^c-lEln~fti6)w^N1Z_jVL!bpedpEqqyGvk=?PiQ$O`BRWKVIAt{s4Ee{u z2wg!oA_mgCY-~&qD+?~~*sOI~SH=mAUHP7O* zuSnELH$=7$@L9~!)ATd2XlEk#O53`N2LB4tal@fVzVqx{p}pzda?SuBDW8*=RkS(S zZ1Usz1kU!sgzvl;@>&1x7x4^MzI!LXld&J77{#p3rBn_Z6M6zU!&fbAl5^-7&g!3i=KLpk$za zJGVU69h{ZGK1VexAyE z-*JCxzv=DjTHMSh8w(J#%Z*<_W^v(7W#8g1%5y2@r(nG(Yi)^VvKF`M@J#3CaXm2N-WU7Y z*H-H?=g)l{=P`e_@_*4cz284zXyE>m^*j2eb!|B?b;Bj%?=a?YXE0sn12V611u!i& zt!_eWO54~enJWi74RoT`;7962_n`Rf2VlQ-!CVh5OS`1Im>62y{F{hBs96%v3Ko;% zd?2T9}I%ZyzyF&EEaK!O`6WG}z#LLn;v2VJs z*r@codzO@(Cr!S9-U>5EBlUaK8d2uF-E>BpvlU=dL8sRu>!s>>rlE&!9BfNP!_#up z;(A@ox<$T5*HkcPq+=0plvIw1zH@hA*J~Zo+O_e?ZLpNJKe8QFHroE@>_YYZj#ay} z`^DyDy~lCDXw|*6#2wN!z`3IIdFj)g7$}{>-~GN&Tb{w^%xk%=GX(vN@{H(M-uB&~AAmp3}qzIqEy|9eGf#6^{_3QlAyOI(6OM%&f&jZkJJYZnO`_<}Z{S z2YsLa6uyvW9^b2~*};;X3w+oAr|L_fq^QoeYhb3Us=KD7g-eC z5D`#Wg317HID&|v7)7>0i6}aW0s(h3F~${#Kr(9M8F@Pfzu&d*6L|-r{S<&z+x`pZJV-GR`4%R$$X=Ep|0@;sJ@#?T7upsj$i5 zA2vBQ9$S~PvUg!<=kgpETO6dXO7UCPL$=QSM|{0akWtK8YkfTzSR9%!Frmc66HZ9X z3akrk%}fObPx9QTm%S3MPJlcMaprXl`TEHEZhtBM#l*BLL)$ywI+qf=u?e<%P1a&g z!taoLB5nIdZ-L3nJdxeklJ_otS^B>vyUX!r6?=$1#_vycterNuXz`pI{8vTyZNNFt zMlTqjL))n`{8s+<8~knLTHK`RsV~ekF+0P=f7Dv(ri1B&1|Mms%XtTi_7*1mi;=PI zNj%dz(_s9*8V)kK&IJjdXilP5^PNP$$!^!?d5?8Fifu-H`d)%Q-*Oek(Yvri))%Uc zjeT;Vi^NE2J3St-)`c>Pn7vA8?ZNjsA5iO{&WTwzqtN%HX=7Eq%G7l{n3%(|KeJzI zZ+I__Mbb0w2(p^>Ej*JdoHOmfh@Zpv?2TG_eusNt&4%W8wFZX&b$5Ust`X zTadfs{iZQ{TJQ57;5Ta7(hIh?-sf&NX>Y5Vt4Y7`T3~Jka=xL{4$ou_su` zU|KSMa(~w5Ku-_)8z2AvVr40x*rDqDl*P_EG}BJ!g}vRb#Vl$7#)Xc_-xpio9~QjC z+<5ODFoOUk77l&{bCy;8C*S48sMhGs$%35)8o=jmf}_Rvi79$pp2=JL3FzyZud!VuR-! zdD0`b$Ixv6+fUPN57YzeTF|=GIVK-8-n+oy&Yc~eZRqeb*V_MIC+4R-58OQc%z5rF z#D?hw8)ixTYuFEJW^udB5yls8>$Ek!A;fl5yosJHSu34LJaf%!e@D(y^TM;a`^@L( zrQ4O}oc2XEynV0HfvWpreyVlO){3lk9v2-)zMhnOqvWerf%g}R{J$GI<=9jwv6o0E zjZUMHpTEu7=a0{fH#2MeGAqYwvNck7;UJ=*)}*nm&D*1|OzyH%*48*tj_EuU=hBi+ zXa}P6T=toQEQLTJ*-4b)@uhs(`oODWF}4M`E7fUXzFIobN1hn>pe*XEBi)Fl$WPikv;I zW4UUr=zmHgmVRdbOcPJo?OrQ?TLWGHw)eL2JNg!F9oIc++jHj>%SCSR-j~Fz-9qdL zzVj97D@@<<>daPCf6jU3T5g;W0j&Y=MSHk0wzX1|6El>%2Zy)P`K}a3V0Mo`hEIiEc;0=z&OYB7)C1_;L|eD5iS=Dl z!X~{8I!>*X-?|3)eu^HPV=5Ezkdq?LZwj3*xR+JlDw9w7BoP^SM9$SeiCJbqX<6 zs<39yDf3XuXKCpy$Sx@Lzjvs5A-$o5MT~i}#knOJ!W_-vX4d)bGN(YD1LxZCeL2@= zLAJM%v9-nXFsit(Lmb`R?&TsgDVMfKS>YG*_(u4`nyy|>%+B~YG1H2@b=p^&ot`as z>VVhw0B@iCLRrKJOY1wZC3E6ovj5cF_aJj?9=%YvPs$XO(p<2kGk*^&Q5&YAlh9cUbzs!Ml8 zyG$Ir&K)LtZ79xgWCH)QGPHHGpZR@7)=@`u_S3a^KDOZ0Bafr~+;7p#z;|KZBn97% z`lT=a2lA}R>GwedPUOtbEwSQS$(du_8>Q}rf4d`rd$u@UE4DE|?^ft$a96$zzBKg= zaS)riLSv#{MpkeR+U@v#n5CF4yU<`}s-Ct|Hlse(L*vGKSR+owD~tK@sK?r~w^w-T!%ZMTmtUZ0=FztY}jBx-}l=k5Hp zg`veFnCaVIjH#%jDA8y62G3#^{Vw>O*gV|Bx}vq=fAno! zY>(lBthJdZq$Ze}cC}Wt2me%JH60+M2E~I+J>Kc@nG#o_j_4Gzrl{QcD{!ZV)!mWsyKIXZu|$txWm+xn9s(Gb&<^+DFg%{E4Fij3uXZVvZ|twqVb z9=Mu1PQ|`LO%L^HrR#@)_8v$*DzcY6b!y>M;Gd{kj-RqWYZ?Z^_zsDC^O=Jq)hl!{ z-d(MgY;P>?lJh?f@-vs1EA(LgBop`G40nA#YR&m~4sy`X8hSe-WA(@@*&4B7X5e>m zKA?xtc?mXcEEZ)7d~w~yLKI*)cRJZNfeXGi%`EmmLP`TuNcl2K!3 zde(-AZ<+lt2Yn&VgmD1Q?4~_=J>LDg%;Zvy8S0dRVdAS|o8G+QK@}sycTP;7Xl%dM zxnE0d-pwwsuuu!C`S&&C6m*QVZ|V$*jpI+9E7Mn+zrDmCW$chyrMX?qCvt9%w#nCp z>kQUqMXc_q8Q+>(mwupgw*s$gpV8{^St-b$ml)YJxaj5Jw?ESy_CIc0sxCBTR%$?)JYcd?0|H~Kbrc31vb`406gFd;Kz zai`2>&&B*xC0phoopdtjO7a)TzYt@j44D=5Mx{B`7pDTVg^GB8^W)2PvZCxBOi!@*F3p>GIQ@sqd-!wlq_%;W(Jh1aq1{4)m zHZf=B7B4U9h?%I8X%Cx9*&e&ys}1f1Z3FFRskPDt%RO4@%1R5XBK7_bPei8$L8S9$em$q z)b_~TXg{$rCO%A=(;aetb~roK?>No3xRxK!(o-1j|!?WyN{L+x{|FIa#7%mmJJ@ATUeAA1Wi zjmiFGk#7#@fxVwv?{nst=8=;!cAjtNMC}k~bgKL6P(}Ym(}`LuI_X`sxIJsUHO4<( z94 z^Cc;Z=)X)#PcnLBO?r!o4^PTf2>&uZu)RXt!+o7i_^0n0GQq@8m`C6|T+%~he5dHR z-#}5dE~=gg+OdoCi;dkQLUBz*(Tox_riDI+^p94{ODug&u|W@%2DnM ze-@fy?m(^i{ify(ft~%a(O300o8bR;%63xtSJ)?Kh-jHSJDMG7`ltNVc#<1^Ya<<* zm|1hVZ*#t!jjnw_v}xwAE1kpq{H>;LmNkmnpXIzZO&e;hXk&P2F~m;Ij~1VfcHrxQ z?epE@ZblwSl zMtWX+MLbR7mQ%sYa|(72dxL+g_zu{Db7%Ta<6E`PeJ1z*Deip{>Th{R#J_DSsM-(O zw-gOLyi_C9p=x$!wyCi^ zkn)5dxu4qnT_#4?6?25Oj{8RtioehMx)^mzv;m$#ZCG_=XMeOW{Al8<_3kPYL;J%0 z!o<58{Jlm`^~*n8iba<>E3+#lw%|Z6os+0boRh7U+zQVymsNdLJm+n}S7zoivHCUb zv0g&UgvNM-_*`A^{Uvc}?lX?1(z7#mUw17w+A!d8(dNN_-VyQ1=+RTL_jRbZ=ZvQx zB_^!=4(6j*XROUo#D7|DT!s0kdL2WmYn!S%vi-sL7jrzu!F=WcGZHcZ%?GcktIt%#)S*XpmPO5zDo@+uD0uFne16)|bw;GCSZ(oYjkw z!dPg4Pc*S;>v9)o|EXjMez(#8N%A;9f-ipbZ)mCQjbq|tOk9Gvlv-|lh~J{VCI%*Z zvGrXLH&5%w27kHe<>zsp*GKBN_>L1&_RM!W{SDT4P1I!0;ekX?+;`!3p`IOfXy(ui z>&>L-4y(Vmr6)n6hI8$AEfDt(EMZjk!zA zBa@Gw^%=ud@A#(#rdjJ$Yg5Zt7c4dMV#_=4dA2@whCjn#QeBj{bz+o7n%-6?>g(EI z?i=+^CE`ULgSEI3Wi$Vf`4xN?B@ZjZoamG+_I6y_*6vdO>iqH@;a#Sm=*j$(B}|Ey zh*w-7zUpAmGi!D9Sq+a=Z{SFrXFV{)^yh67c*`U5BaH1)=W?dA@=eBj*Bk$Wu{cd{ zM`n*SHf?2if!x<%JilXbb3wn?hSUa$jYv(Jtd;M4bm3?dYgKDSW7AW1F4DGmy_QSf zt0k-w<{fGx>#J5{t`lX2dLg; z{)1;}V^LAf9fp{}1j>%a7Uf-NUj957Z)ROJ`WCa|TKHDFE(<*!#vlLC`4E#rp_k!2 zx64?J^aqNMN{*hkJ>z(^H-_PNN9SXqTl&Z~&NZ@U>gbiFS=FqEyd|sVP+62_yc;+?J}X91E13}Z}Sn0D6{9G0dgsT>(FpP75rJkl!N%J>c=x?P`UH{NWFib+HA871} z!c#^E-QzA4n}j?*C3nBELk`Uxre(OdD3K?cAKz#E?s3sT*$?+wnec^)i7^CcNPRju z8fQG{2yU74 zgZG2Sd#}Rpo{fK+P9~Ic!Ph}KXi>!4tSDF(-Oz{%8~PnSr`r%_Hm$*M8iOet(SiRC27N%!5|A!PLt) zl+J;5@{=LoNLPzti8y1-ZScj$Lq8a!y~TQ-L_9^NDDVeF!9={6D{=6>jJ-i+Vn zo`<5|M&IM)+)FL=%%Cyx5{I37>ybv8&Rv;0w-=(>BbVg*#1M;__&@;S1E^Lw|+N8px9d zVEdD2xrfT|Qn7O`!HXRi+ZcZDbXIHw7>wwPw|zRSKiBV-DoaWJYbKuaVyU))cKfZV zTTQM+t<_!BWNmHsg6wbQY}wxwxnG!m!1q#ZCAL2ton_a%Cx@yo&cj~QB75m0SB7g% z9o-?Rw@TQ3eLc?Z(K7jIuc>tAj>n#2eJ>}4Cz%*gW%!unlpjSM&JktpOkd}+FekZG z%3k8GYg@O_%3|ycO6aTy6ZzTd=sAfGKa2R@9$*@1I@y`P$fE2bJ_Bi~d+?U=``#>E zBzEkD_}$lo*UjALXWd7n){*m2Saa2?#HX}jwEQV6d&k%tE3>n7Y^}V;w>qNHKS5$d z$HT7~k?@HQZ*`Q+_@nN=D7?s=&!)l;LIe9i1O3BukS|bi<67qt9|Xi?b?F8s&^l^mKoS zT3jvPP?u%!4erg{3tJ1ni@1|oGxh?%vSOQwCo^uWC*AY5fkV}2HG;4k<*2Mpz zjH1l>Q#4NaVkWK<)4mOl{E)Tz-zDzzCZ|>tT_@*H%KJ#;i%oK%PlE{1w!2{SUtkCe%GCT6=dmT;>S&b%qI@9M@m!(X z=H}6;aM64;C7xn>6>H#ub3dFH_GzN;gBTt9x2hvsCvZh%@oFl=w?)psg?CvV*m>){ z(|zTceeldz@|{|WEJZ9-t;?J-`24H<*OJr0(%a^5Grl(KmnPyoS-*5oaIeW7hh+yK zb5vY{{kfNy?&7ebjSE$VHa~uN+|u-OjS5DYdZF6l+mWu}3Clu!NAcz%`JBozf#!E5 z@U<#Ei^J9rGY832#IF1ZeJ{5Xi%{p_D*-kX#{Eu6;M|s#eIxRXzeW3ycg+|M^Qx`6hM{~~f!Js&c5z4WYtcKT=cmG_ zOwB;OU+?Rl<@22jmE1%8a8FA4YyAGfv@bG>HdsyeLc^QXHG0p7x`!IQ`LUB0`--xq zA9$8AM&><7C-`@GXy;4510K{ekZ}q9%$fpowF;AYRKe<5_TtUMJHniC1{W@nGv^(R zjBVeIgFG*73Am)dC7$PU#wc8zAMOrpy?TRh`#8$ua-&m5#g|B|m~qs4^kqzV&}x2Z*|mSSshpCbylm^t;4d#2cp18_bo z+!cmrABr9_@~um3=MnS@6~0Oz2(0IeM+@#Edw$0h#}sw0a7E$vl5Kn)>ZVQ<9;7bo zo$e)j?g?M@0q+6vXNTc@nB&vF+ts<}OkZAu-$wlXqu~FxFX3d8=J!?XGj>!cv$Rx> zW>kKi@e$TKw+XHz>F3YUpGA+;-cxI(Un;{|(bsbke||YdI`pMdPbj`#wLi1d_yU|?Pa312@*i|zYFUatDf6A`Xsfx? z2A^?1JQMMdLHQ+u-3pe%T+y>kUnJ$&tkQnwxsQoGPkpzcpz2y*M}5d)sA*xJ%MrNW zK4n)K%*Kr=>$kGMQv1>GmT(#&Rxvx$Vvh{SSbM%HE|b|7)G522uS}2Ftm0`#r@xna zPxtcdS8M3Ru*zGC`GA@)x(6vUKkIwoZ|l$RPvFOXAHFVr8Sn9@Y$Iq@*>Yowc4iYT zejTsdklU6Uh4=jue(U4m4GC28atzt6gr57uCi{Ij`I-Lt! z6*Wq%gYP>U_0QTbJ2gDj`0Ovb7H1|G*<1P zPB3wXQ({GjJy9pjSb^sE$hFw=#D~%T)CTWL@kuGei6g3MH}rwNcIhpw|uW3{XyUtwKwLrl+5uk zOKz0V^9Ve@B33qP8P2U++|B5SrK!!P)_q`NuKk7nyP}WiUvRz>?~eWQH@TCHe*aVS zC&6u_?0r6b9++c_{?!_KYAf**9v9o}G3cGcTiL#|CklTu`tF?UFoWxbc?xo09r0eB z5^?ys#WT!2ozRVpjN&{&t!H<;=gRx?Ois<8Wa=nb+plf=_XFaoO3f$cpEZa*!2W`# zQcsz@Qmvz6R(IpQ#(U#E?IVBY+ZaCX$oNeI6Ey>Sf|Tf7%8JJ`kDI!<1*pwXd2r6c zm~Hs0sW3xgfTV%#6}!-ngEIvEPxYr7TeLE~RnFuVyjSGjW@6W;U^;09zCROx`;W{& zOuy1=h1bmN^-H}=P3_{o^sy$Uw-Nn!x@V-(e@9~4c#QW@VqVy&!l;6_slLYC3T^*< z8g7?d1LYX!C}~|bJe*_n&QrlHupgAomh!A$KQ8yC&=PYH14BC(qgS?r&H<*FWm#r1-% zXyi6y`@KL*jP1w4VS(n6OM_~;Bhpf*mTIO0zcUE4eYKo#@GmlTvu8Ut*XE}bjvRmY zr^I~EHqo`AKIcx+*|LYTKx2EnJ(62tyy)!0*(JR*$2lac^wCk!5qlDT%`n$B{@oDo zD^picll{n?`SjFR5;rCd*XMpKJ~d2QnM0>zdYnneUW_-Lnbn_XJ~#3tF3mop9oSS@ zXY9JjS!42IiyVvL{8&_~Ek_)wGW>$ znbrlLq6brAv-soniMp~jsjsAdkMena!RAJfLgq~Cl<8R;^L*K}HE+F(y$$`pR(!3f z^$0OA^%*j^rRi;8I7H5w^zbs~UTNEAL}8@t6ZO4bpRyT{+e)s+m_2r%0n^^JJ;nyY?xeeXq+K#FWt&PFhl(s|ETG=7v^Zzw*{;uwIBF{M&_>sax z@>`Sxo71Wvb_@1N92M z4~P;Xuiya5%uw+!Ad_ErZT`K{&k0YV02BTGU1WU{*1w4^Hug;9+Vh-Sw6*$bUGCiT zkF8D2*=hRxZO--uOi%SNJi9PnXt2lsnX>WWQwnxA{ZFnd_6)8<;)Fv=d>X|n7mOnb z<`%8ZHY0%}>ZI*F;@2=kfxJw6^+$id#9_!62h+A!j=huo4sCL^RyM|`i5iue=oh1% z!x?AW5_K2jGd6byyeYB0x4;*!E#4%xUhVPAXD6^68w*2>pMF_=l*ZWUQ|JPcAUPLQF3Yt?>*yCw&<9lS~D)RwVCtm zw47NOb}{zwqSndZ^Iv|rjBzlY591qZtr7;#pt@`JuZ?YEZ0%Y(F$IVYonO2Yd&%|w*bLZL8-b3%d=$ZoV=-a}#=6ps6tI&zhItQC$ zQftPGs)kO^DQsl!;b8utp{qmkwqF%2C3JY0=>VosO$>*#UDEs zvt?(z*2G~Ne2cv{Ik(50&&=#SrjC7m!PXM@PTw!K&3&Mam026(T9e3+kBmneETB$N zrOEU5O}%OQvfpwioBpO9c~#R+-Fwwg=Q&*#mwe56*sA?Xw(( zIpA7HM6R7>usCb65Eq~?Rr3qy3Te6YP3jvXS35gaUm*NrYONdNXCubtD!`ln$$gVM z9qX4Ne&5Z^6S>OR-G;!*fg@tZ$rYZ)e8j#e6Yc~Ls2&<*Yu*y0#}~U6SM9j8;{8srms;nn zPf_RY5jxq8xbY>$OH9o<YQiEUkCcTIrn~#s4AZp#1I!QV*CpFFl+d z#`YeZv36j6i5{q1+rrn=&!>*lGGP&BG;5k?O@i*dy*s61)Vvq!5uLA0WisNQij9q) zcfJ1&g?}2~p%!(O+g!q|XH+1hr=iL!BqO z$F+GY%}bHr0qQ%(Hvmf&`gKl31e?(*tH4tK!c)}`hayW$LK2ae5-HMW*o zt23YAPLNm}Z7{V~pSJ)P>vL$Av2m)GN*FAMzy?SaQ)YJU$&Q_qJ0Uw=Y^Mp>E9~|z6T3{?-X|A2 z$oJdhy&g-%^hg80#`8%7PdgT8V32o~8l%Y>*uFyPVI-7kv*P~-J ztDL+{8oScJ(!_puS9~dS$j{qn*gGFOCxWgnDB7Ib$ByOS96;Fh`_g{C0?(xVJUO>o zWiZbvfiJVk{;O+~5y3HQpZ= zJ~p^06J*x5ntya<(aPB7tgTPpUSZ>i7aTf!M14O1xLcF&=UvK2q5@5{gySTe( z>t?s4K9@VCZ8kglpQ$asF>7=Bky|BpAnEg&w5g*2&O=5%hjPHXTO9i@3sweR8C_|5 z%~qsVpq5qHJp1!%ZZhR(ZNfh3Q#Q`%;uoVA4c5eAIop>MMYi^PS!nx+z0ebWWNxT; zdcD~5FToc5A~C0CsQ)spElT<10-r;Qfr9Lpmm&Y4qvx-~tnCx;A~S!ExQ| z>mF^#2{WOg`5+sZy0trtD#qK~tJ93Z*&6ZdhrqVqp83M)^yw+fvp0oPq!*ihVq^Sw z;aS>F*GE5!jR&@XU(h?P`%|ic<3u{4oy-{%w_?qnrv4>N$aBDWFMIzG`9BOXu^z#d z#$R3%eIqrDs_ol)cb36XIn}eVh+f$SssABuuwT0*=gSsnRqT+x$Ux<%z7G%`p=+&j}rY;)|>>#emzs(hPKKp>g-%c)J?Lxje zALMP`e^qXk!M}PsPrNwV(&+I-9$7#08=tni+E1;+SefdHp608$THM>DSjiAjs?)#N z-`K-vMwz|0>OKcoTLta{)TX^knp;=>fSfZ+mC1@YH+(=2#h% z*Y8!ITPu5G9oq2F;>hjJ>=7MA{+*b>RHyBv&s?oJgAer~nO_S%k@w>wBj17id zlF4Q7i>&|7x+Bda-=u8a-TQ$$f6D)F(~Xj2r5-FRJTA{??Rr_k)>~l`y3^xR?O06Jyws-okat^Byqga~ysN_>~4$Dj8kFSH=pg%hgGy~BHU-(Y3 zKgBOd#PJ4}{4B-+mJ}~G_6g<%0B=*t{Mq5BrF>}BrPI7=YF;hu0nQA)y+qrehBhuV z4)GJ#&0dYY^-W-Ix62$Scg?e99jUGpBNkA5Jm)s-vvtnaG(Hg9nYI^%Hs3T8{c+@L z+9Z<`vnHQS#N-czDsI4-YMnd5Uy)iP>dnQ-U$8cbe(M-SMucbCXYH4ZY-x#u z`#iftE}Ju$*j2IRi#YeNkx>o)ZP8eKza`%Br9`atS?5{o zpv>tHp{v%^cl(-$l&Kk!JgZaUQ%W}5%#>OyTjQfj z@w$nqjMn+$1EDMVzVETQb{X5x$R2r~32Oqk#b1d(%l!;45Pt){A)=!jqa#hdVqKu{ zJ&4c4eQMeu7E@_%MVfg)jcpG9SM1L!oJp-SS7QFmKkm=(H?jJxpEbTlI+r#+@8r~p zqL)dxAG)82&A_`Jmm6d3!};-5rQXKA$Q!<(^d0VTer#vYaW<}&8}s8)V)xRX|E9QK zbSU-dHSsm3hhh&pzO)}V2)SJybL$@b$JA=ZIXlmbGcL96t4G}z&y8m|wK&z-OAWro z_FrGvEcP?`^d;D?`i?NA*wm4xGPdu2T4Zq#M!^2$y*tnnYOV68r^hz7KQo+Zrr;mt~d<;w0`WJK3~2+2y)|(h(GB44-B4`J=4Bzm)RxpNybmgvMoinkRHx*&vF^Z zqC6Rt8zQvLI)OF0D@-lHr?IYu?&8gN=9?bpRK~^}8vL7uex}3!Vtp6)z~AZxo1ABR z8P4|a=>6g6jFEonC|nED{4@DyOz!62-dw{w>kHPWTNkQ04`V(Df|;gGR1pR9}q%~?Yc;=MDoTaPtXdf1AEo)^M365Ez75XBJBZ|l1`|O)& z^lc8yPpNu)95B!UK6H-6cPL}ogP{G{=ES^)s2It-d)BZK>yNxoxi>NYOJEUDuD;mJ zxHr#-{k&htUmF?Qz1UssG{yvuLT{#yfviujH!*G2scKtPt(7ghFJogewMEslNtQ|YU{}KMeVqgyIGimhml50TG2YQYc8F|>~A0v4~{He!zshY-mWO|rbL1p-`(D_54 z^RWqjT!?zJsKnR(oijz(!^dy&Y1+z%{jdkf?~lTM*k5r_d`!~k^O$8xn#X_TpZT_K zob$hEui~nmeZZ^9;Q4PtpYBZbdVG?-RGvdWs5-1R^|WfO&WAHrR9t-y=Fxm+=7cT` zEw0+}z@Fk+oe2ISc96z%Zl75$cKh?tJ7eP=(0!^WWohb<;yb`zDkpZO_}zG~2H)m+ z&+#nA!l&*VIV}_BI1l4|fX{<>*`HZl>eq0*zvusMcw|LkiOJ#ac7H2t=506SK7g%T zhFCoMUxLA=kL)AQ_MHuFIkcswpS7rP)Nzal^UauZ6gtg#mzxVWOFtlK^}+lB(L4L` z%%O#$CNDgqpm3t-<3HltnBlX)xZqvTwxRDpf6aqEwkun1>W9(aZS4O}QC?!mIT*?v zF~3012YkVOT6_@VweCyX9*~-BU-^C?e7`;FSCxN6f2ybOHP0c=*?w@^c$7cno%Q~D zksG83wN|-+L%r4#Q|bhnuq+Wf-G>@oO_N9Fe+mCl-EX6B>(;_J6dUQ*YUW{;epwBo zRBNSQ4umO#19n1SXA19hItYE@vCi9xKG_=QNs||5{8Psp2Zpug^P5vQn|#x{z|I40 z>)6`hd!yeOJ^Qj}V~@1cCgV&fGv_BTHU~zJitf7>a=Ulh=6yITfwp3E^TB4d2JgUD z{2}v0>HIz9xcf=0k9Nz>c&4#?sb7ZSZ>e9t0WP|>Ll`U2`K)^}?}>W$AZV{E<}G%V z-*VyGhQ`mWk2XNpD?hYz!PxxXjQkA47yUy!-~7i!E?`PwilN&z*~dly0#3jg9{x(= z^RyqDJUcTzm%z5VH)IT1;VK^<+wZ@Go(mPbo{4zNLng2K*YK~#&Z*B^JiVKZ(ay+zCI2sjgS4q&w#nl!=U$O`4)aGn+#W7t z6kze@g`wTgixKB^DBiy}x)*#(y@pL%{DGaZjqA2b+xKb{v@<<5(-K%5pO$(wzJ`ti)`9RoUd0<8R+&5t=c?;>S8F8` zSR*~V^e(OA)#3Q zb<1VWF*xTPMIE1q{gBxywXC$q=BDSG`Cp$wzbk#=Ih(SZ3?9Pp(BcEs!?xFQhW*q! zCaKo2LqJRHEh3$hw*Tz>8C@eP&bHcJZF*hn0y{hSfq1RC-)CV3Q0_6lw;6K}Ni(#8 zZ_jR%zC!x8hsQNWE>(Iq-nc(QS_1wg_^#1!Cp6p^GPBV?MRa0!=)|t>Jtof3t*}vI zVgPwAuXo$QK38=wH#iH;>`Ug*r|1&anWJcjc@dawK zIf(^jq2K4nMkYH?d#$98iLtL`;j-}d()m=Ownx4DOyu$J)_I)ZNX*gDbmgbi++;ZY zz_i>V`tC#6q7nX6a;ZZV{V&%1P%bU-E#3wDq)x!+xBY&OGd3|#WLW~+oV5xA@EzX3 z^we-ucUKo!o8cVvmXe-nCt$99QUBI$(QO7BaCTvKNv9J7!Nx6_zn;p!MgICTf2YVC z_SkY3fR3-`3OQ5fOnpjQx(fU0Rk9WT54PfQ3EP-GQ(8w%PERh?En}u+_=Y^6zDx)F z)8}&lSkRgu>r?fn&Zoh@U3|28@X_|;pZ0ww;4T9gt&tQ+zO{iEa3oy51IOlF+`^%Uy_YO-5RoaEHJu32U8&;KF*qvjgVDq7s{ zdf?7!d2&R20q~I&|5DfJ^Z(JGV)X2!+$0m@Z4>o1ImDe#eW?eWI6^iS^lQQ2;Q9Zs zwRO%Hnc(3apU%Hv><8u$HT_%>eI;~4nR9e(=TveQp0>yKdV5P4ydL7WBTM>aW@$~i zx3zg9>4uPF89kn;wXPK0nE;b4MMCLlRY`>y}?>z}~F|Kg#G<17Y zxL9gM`r`SAMYf-PBIcCwUCzMgCuJPdKh-X?(bx$eRoHmfo>aBSB7Xny*xKF;!*@(h zidcC)`M%JDsRWkAj$nt0fh+*djHbPHQj4hahHnOI3=U6c%(2z9IupH7tXH`X{zX$k z)oeS?O!QWC7n_Q78|Stf8UB2((fG4Zdy&u~zjIRNc$2Rm7>t$pC+@B)9j1-#IzB%> zuj3eRV-}b`^G(4fvwvd6m*j2PChVDXPMLgJ>IyU8`G~R&CTH5{uQdJ(`*3;Yq{E}& zz3F@Z+56eVliBa4b?ZvxaCyIcep%Tea&GL~J-VQ9u#boAs*aSs&39Dma_2?r%6PfR z0p?g6{LjQ+rc7uo_2~%iM@9Qm-03<{;e7E^IFAx`orwn$6I-7{gm}BYyY1=i#=h#E zzFu_VWaz{X5s}d`+hK_wB4P~cJ7sUXe)q9iH3OG=hjQ{fyl?Z?ImmU|9+10Tn;Ys~ zm?U{gz87PIH_CZB&e5@|WulH78((YU=fuF&vQ({=EX|dA?r^})-MPD^*N-u}z`xM+ z-K(|Y$7gfTn(yp(?R=bJCI9zgJV&kNzJk>m+rw4o*NM*JJF2zP3*W}6R@ydT&xJnc zdk}-wa{D~@JRo2xnZF{t!uV5-$XSz?I$+OZVms>%Ib!37E+|_59hn(f;_(huto_!! z&)mwDrRP^iw$G(^`YPe6E1{RqD4t>L&j?XKIe9P-&JEQr#(kz&7aTgm3Ha6Ilh!u}@uQhp@9igpjYAiO&T{}*dQ=fWR>=W=l z>N714;Ro5x5*x?QdaQ5PI{F#!LX+!ceS(%tgA1xp7WnPW#HrKv=k2-MP2ZeatGk$K z;$!>aJD+UgVD-5_iY_~&zZcx>Rth~MFAqGa3o9m<&iwR(o(qhc#>isV{}&M=Eobft zY|N@0aemS^&v|HI^mwK3BPg_`s3J#NFQWz z0&jeEoXlTf8gPmBh$o2BXD70Md6xB&wh4G4d z)F|qAK{t!B+fR&c5}z06hFZS=6TUv7r*r9-p3N0@E^HB;H^x+N^ly~hUrXoUWVOb< zpa%PfgnSt1)fnDvm$9=oS7+9X9%;UTZ)=;=5gJ9ZvK zm)K&kY=nQI&$-sEb+unm>DgWb&UDbSVs#>4KQ%Yi#1Kw^Jl8qC!5I~Mya={^V_}`a z{@s(?V=#O=!S>_X=Abv*dN#MxHQyB!r1)B`6|FvpTFug#kGZ4xv)BeO!Qg8v%=`|w zbja02{}NwyBmA|`+|P^*JRA7TVo5_8kBwAaF1~_@v&ABwp0f1cF)?4h(f?8I_Xqsg z@X+>oEy~wOOkf$}@SO{auW!Ve-wYdGpC>6#^TO=nY$Kx@{IR0Dh&ClAUL(g zr|^+KbM5Sd)ft7OMSogyym$qFi!-FE9=`Yh}R`=D?+2($U{g*j?@mtHn zGhy>6pP~tvz_j1s^f;-U<*!}9snGF|(diDQxME-Up0+OZF7Muw9oyHbiBzu^cqix; zS`7Ryv8}6_oI79Woc7WM;RTSxr1SmFYK>Uj(U`>v98qnv@!m-rq+zvIdW1P{eomex zR-3#d{A=O|>Um5J{#2oP*h@}RqQ-zYNW?Xzk2V81UE0TAQBeLG{ROoycb@z_g=nsgX9` z^N%RnT+(lI)-F9ReH?62_3mmdd3IoCsv0o*Vmpd}O-1}D?Q_+q9uqt|o_}QmZ>cJKz@Vk1aUy`$3hr`0m6j`%Y?Unosh=(g$ZJ%jxa2q~Pv*r`^(zwS)|7(e- z;RU?*-ifj%&yL7kCTGZdS&5mRq)GaEyQ1&KH~$U|T1NxhU;86R$45)7lKHaGkBmRQ zJh0f*gWN$v=V-ui)LO}k#l?DqnNVnTsNmYsuA7&-S8Ofvdrfw=@{u6}8=?mIq>4V( zn)F#N&zy&SLd-kkqH!WyD3>@lLEBx#)7G>!GQQF9U|nFb=!b`Qm{?6s*3NdH7Ed?0 zSa&4spN(Z34Ssd+w8etHs$lDy)LO+`UQS@-rdrva{r3Y~S6t^REK2&M>_5`{a+jz4 zngfW{LFIZt7OB_4eH&J0trX%#34foVoI+^A@+0*zC&h_^4T}F{c;waBozn zZ7uIW*u%trH>Ee3p0ZsD|8!z$PBiI+_#~P(8vNf#JY+uh+&$Ob*deWR*9ebH0MFK@ zYE9qPn}s(`|KpnA-=ZtugfBBaWno%t z&+Q|}#ssb_UT6NcW1#I2{+7i=;!L;O@f_a8joBOFa zImuu1z4=DJxA3fNS(ma{=-(9!h?Su(7CC}f@@>Tip#JSr>?U?BV`BA*`c>kX={V|+ z;zi=qac>I~a}3W(%(j>vJuPu>;;)X&jmv2{^OpOTsY6z4@YL33>1EJ%_y^e!V8bgu z?T+~cjA!Sc6M}`>GR5_ZLYQ~f!|W=%rNzGRf!oZ`!g*{@e{|3Tx;u2 z#f%lvm8fy5b7z+1hU0x-nsET~bXdDiyNJ0JwN`PkG-?m{x3t0P+&Xs**4SqA$pwWM z$M{c&;_>Ee?@#ngZm+O(zQkSP>T`Z9Hw1ATmCxOpw>&jDeWS!WD6bm)4<&}PnK7LF zhbH%NAhehd`|~4A{b9ZPjM4juxIvGE4gy-3mpVoK1@>~jAG{xE+0_{TSLoS8oz)`+ zo69>lV|!=*9(OagJ@FZ|Z8;B^rMe#J@$e5~)6(}D6Tz~^`8du@^wjhhK0O0G!aSFf z3HzGWn%GC4V3umxOZ-yB3ylBwkp0u1ISrU*+8^Irw3s|~t}DFB@AS{~H}yYlB5U(- z&)TnHzk`<5#OmZTr(h4nVAtPSmACcbYE8ZHVsr13ERs6mgq^>ju)x?s>WtZVT*araLm&YTE%&OS(@d#3$Y8eRy-2L#~9t( zt7!W*no@S|Rr@j<6aFf%>;PeDsin(phqZU^&Ops*;4#1 z=5B~b*9&Xf@Tpd*RyvPxTfWxFtKp&T#n_U%NcuGC%byTfjM**4EvU#=a_M~MBH?S= zC+#wJZyR#o%ICB>CnV;geiVNsxif^LkfXXrViD}ct_*E2b_eGo6RTVhERc9YKYYJ^ zX;#Y#kaZuR*IUT5oJo=H=xa5C^-$ z+pc0GpsSA)_#O{<3k@AcuEnfg7^-?LY|X>$S`!aH1^7H#r_Ui*wdTk`$LLYoc*%Kyqw-4C7!jCxHb0XV6_@4Kkk%w!HkK=cVQOUpU3yf$!lm2PP zOh=i^#(KZm(LLfAzsvj`?}9x0Q~D<}W3(Yr3%97KY7g*Qh!wXMexcm1 ziE4}uc}lia4+A+?@7g$9EqaYf{}1DDC+BRAG6H74rh&KIBC18>TA6{>YZ=!{aCA}`TgTW|J~lAs^iMTeq$b)XF~t+V&GS6AAfi>N`7fO zbW6LA_0^=YD!ly?_W`jDC}-M47Zo&q@5iBv*GoAfGg5em&;NJ$Z!+Mk-o2PW#!IwtzZH=rhyF&6T|?b+K6R>R2H_RxJB?2@x0UrfzU zHFGEHg1TTH&X)0ty43HKj)o00qF`fO_vM}k|EfD`mr?d!d(aH<0ZdI1dkM9^o?C1Z zJV4HX+n+hroVtcFyRfr&8E+LBkUiwRzB}h?ompfW6ys{)FGea zog?yu{5u_WFIw)+Pvrjo4vYm&=i@zF*WqB6H2sK{cz5=+YQNy)M4kB<)C_1nJ2_ET z{C@a|!56Is{uTQ;=3RcEdAIwV$!p9lJ}dZ{xKihx=p9pcdT0JlnH5g^;r^_}D8ApD zD{_f4a7V=slly3!Yin@$ABbO)x&?lx(5lc%zgL5Q7W@ui;(^(K#V7XFQrK5vykB%T z5tCpS#b*m(*JMamzxBk2lY?@-1?${alM$ME)-Mt}?t({HbBkBgbPl zG3CJjVBfYbwwCWuZw@F<75jP8$-qMZeu9<*oBhpFJ4zchn^tx50EBkVOWX704EK_b zJG(A{4>_lBLrb0yebSn&#k7APvn{BnXfJUNAZdU$gIcRt*=pb;XE{ta4&S@WcR%%vC=NE|CrQ$zx zoOy}9=7DMJ&u*{S4%=Ss|8oBtsdJ`Y7#NnD*!ZB_Ad#hxQ{`L~-Xk%bh4|frd?o%A}T$`S**wznD6)Zs?KcdD6#OmA3tK#5qwk)}iWOi5^Vm0Z+vDX`_Cg z-5~jB2RgcanXMVXyejd94@11={sfkLV{Gwq)mq`@KA8VO>M5omH#VK z<2|i}?>8O%ILP~jiQ6>#^X1*|z`J*fzLRS}QuN zMRlaMy=O-gMOFjc!s(NpTC%sjs_DQ_&@)z+2UcD!k=arz2glhix@KT{=15g@&fmg3 z1Qc`)SGz$3fo-kqq7T_;&)Yz-;&tQHmwZL6}fQ^T-iOTJ*l498*Pbs2^`4o z37n`){Lv;R_Ck7v#8v1o--r3d+D27t;C1(PDu%j^CZ@C{wI!v`;mqur2DAN6;9cu; z>lI9rHR+Ie!rE56G`iHp5(ni@*Zq>-jaiFFaYyQoR4eSCeNXS94uSIOL+H(&iFs-p zyqzW}6hEiXl+8f8+lkbNwjuCuA*F;pf5UreAVdXybM7C+f#OPoHOK z_zm>->U(LKu(4N!D~!H4445rqSHSm~TU4}hF7E*KFq#J&{1?RjTn^n3E1EK91 z=@r`Nv;ZbH{nP!ZzfGbWOc@8#4W6|PkeeBp76YUc7 z99N<~lREmw-_OBsXN3NlH*A;bXL9{}g2|?ahuE!JU$@JsSSbC$yF5E{>ZtTlrr!87 z-}ZH~23y<1?31E>!niJL#*}@sxmm5H-UIbutP@t4DkF+t8-4dh_=V|-R%>O~)wv%_ zoM9UtI;OZfz8KGUt^%$jVolsLW!eUByvStI!+Gg$C7ILLt94Wj2JdSO=6Yy({!H+U zt`&Fwo`_Qo3~i157RO@mbcug9aqQmd7V=v#%$+H*!l&i^HpaF-uy=Z~_yvpL7jVXh z)>&2Pec&GW{d%`v;!FLoURkuWd$#&kH#PXIu|ZueUU?{fi+Ae4R%!4pw#F>f=kx<@ zu$Sah%v#m7w5!xpzXy7gbgt?D!@?{xuVioD_Po!J@0L6uWmKG~Ll_x9Byy5xyAiXw zb-wSF5+?aZyyGF+))N1@5&lkF$IdPNDEe6Z2*%JF{IuwCAFpsc`rP$7+*!O+X7BRN zI(wZ>EZvE$u4$J!TJ$D!i@!&XUgQ|4jC1-l|5hgAIn4KIdVa>UHS;~wJx#3O>fF_+ ziB&YF)=Hl)%3E2A8ZD7CP%@66da+cC;#JKo&MfBfw?81B^On2a^b}krIy!W&fxcF2 z=vK)2wy0;|o+{ z@qO|d9xMJhjdvC&=@?`Mn}@=+}&lE$%mGOO^bZvSHpZbN(|D zeZjrc?Su#0;>TtcEfzt)MBnT3z~(gnTKsEK*HF!lmI}=?hQG+MI;GMp8vV}s#rk~I zTAl4Mx4+9;CZ5}VN8x8uj&W`XdErXPH}p2Us78PN82-_(X2eQ*v8-WFS* zVpV#mi7hSdYOOmh0=guEP%a41*y+(I)u8sCRJ0|MHW+vv1 z?k?;u#c4ZKwFq07+V6p(&7ogV9IAYO{1))IBriN`*x>0CeYEe)#p#9%E z%o4g5XUX{LhD6QDPo+4+0T_ajYx_`6D=6GTo?)YZoAB%m{BWgb@$flIlr%%1omfoT zcUEhqo93ZgQp=^teMFw~FrHK6*x6^S)x4&(wBS)Poi2e;WD8SiP1-%R-AgG~36-41E7e zeE)CGDo4M2@AP*fm-av|%_+_)QXX=iTI5#B{@Y;x?*{LhIQEL%3X?A&wt$>JXomE5 zTj@^cmFlIrw~?XE>upF`9IXwx4JI}?4STM_@0O!>tF6}-e!Y@i^W57_ebG^cqfAZL zp41Z2BeY50%D*K(8uR|W)2E1@?GC$ZL(bxM_C$Rq&z$!2uINQQQ^r}7yE7BubKYb3 z1U($ygX@jH z<_s?-D>!q+;&jbQ_#J~vbq;6YUesE}lbZ@Ur%a5L|4ROX7%A1!E7B)Uzw9&g#Y;RB zd^*&(eR=h+ny*1!u+`sZYA5~}{!#QD-;ud*O_QIZrpwBcxy4!feu3Z4d#5ciCpX9B zTO)U*sdHGGT54uS^hn($v0wUVYOVTBzN^qUrCmH?3~Jw`H}DOpb2q?NZ-|B(zpN^@ z_|J|042i2?%ii{Ar}#Lm^{R8H3Ju%<8bE;1;QH3Nw$6F2V{s>dBWmhBD$w(y>$GPS zY|T&P+WM;gL3sF{L_4`){3v|OIW^7 zKtJ{eUMT6UAO4nj!rHc(?OVMzJDhFiF9VyRsPsGP2mIffzAfgPcz4VJ^a7t=uy%E)=x2lb@my&8(Z=L#t$sb~ft5|t#Y<)WW_|2KvXH!k1TTr4tu~3ydAI511R;=E+5N_S~(W?LEH|@dPce_GiYH z@`H}|N%0fOFOz?VVjdsQfiiYs_<+Q^vGnG~a}CyX&#Td~ofD7?wN zF)ul|L_f=-Ri+mG)l#q1Yv9=i|6|w{A#6bEAY0@8Q>^1ueVwy|vrTM=bF#F&!dy|A z>%>^=9}0gkaS8fF`d-u;_tKSpRY#flTjY)qeK#EXZfE>IQ+x1DYPZ}q?J;6&55bwx z9#d;&Uv-TBrt-+JLslf>`JZBrApwRH8%kIK8K=%&imqAVC{DwkX|Phm+PP2ZfG)xne2Q%0$|RSz%I~rGHV?> zw{#g$xbz(n|4Q4C$41ARIA`y4Yq6z|ge|=}e9X)v+naBz@;C@|cEtP<{%r{VeNAqS zu|sA@?J}D7rg;iC`)2HCWVj9Yu4uS(w8`W?hPpQXc3=FY)H4vLWmRZxF!sV|y?<)K z+KOl7RGxPLVg+ig7ljT1-Le_vY1sCT>lr1pvQ z&<67zs0&z=_D=AQvGY4d77vX%IBmD6wX$0pF^7eJi~l_0xBQy#3mLL1TovlM*vvO+ zzxdnW+d$i;Kl*9J(3HMDBzvUM*Ih9$o_NvJq05{Hl<$V;x6U0RGPxCO!uEys5)DdWJKAeU7BAv5$tcPo7jSUP2iO!S$~Y>mG)he|nWXEzUkr`*DYKm=fD{p<1jak z-{E^*5Zc*}cZ7Es90ta?v@Wg;tzG(MVWZ)fA&J=Ui{6Vy*Bl=o4|-O7w=`w@9sUv6 zc_@tka}S&^Gac9t8fSG#!D9Ho61@`j#CMp7?e6`{*e7uimuykbxvFrLiM=li4>vs9 z!#Nw{lF`F=bkhSB5i0*W3zS^N{zDr~Qu6>CvWdZUy3Fyswpz zy@N~jU>D=AcV(BGexKv>$D6olliOtck>O#+*p26u>bmK_pO-(+^c;Qd?ltvS`<#8I zZa;Eu9H1uquJGf3!H;u`zcP6)%1>?k{VDe+Q`^b8Kl&XTU0Xj;8QR{==fl66zPw(+ znPO`VfUQ*@y(P9NL?-+f+hdhV%pc@D1uYX^^ArXzZGd?Rd391~XJmf{+yKpMYOUt8 zFLA2{--f>Md1;&1?pw5HOPrjkqzCAc4y8FkC*sGJrnX3Z2z{{$d9b8)iU;$ zV287&OWLZcPt0SzEWfzF=_-t_>}g-HC~w(CZ^RFPJsq`Z>e_ zmHK)AoZ} zEBhf2{CV0}v|G;iI~rT1J8*-wA4=J%_jY;Puh<(UEvgOPuXhLA8nX z(cjeZ3f9tGg8h5~S$YfVE=WIfK>y@@ZIg72h&{zvA7cB_AH_behd)UFr~;qQ#Pch| zXM{H~?+7zBzBhS?Ty((N28DvyC-mw1rB4xCi}uD5acQOra2^f>OT-@FZ%r&rG}wb* zdf$6I6V?JX_^RiHF};)XCmR{kCQn>e>=XX`5%Fbm7v#rh{rhA;v>$qfzmPTe&?ySU zhusCgwgHm7A1bxvlnkRiX4k%?ddY#A@v@s6z4l{alSG-63P|Bzi0^5@n=SInM$S+4h z>T4Tmyf>g!SMNBqv2`3zt(BbIjJii{V-p8k$HxZc2jwLe{rfp(s2?-@NLx>K1+-j|2 zAR|+kieFFuD$Dc{8v~*O^3LYwc4fadwR!9*sKWCv+g=8~ChiUDhVXr2QgPi6>nJ`^ z@_HxWw|2X>$LB-$BZ=+MAD@r@CVek=V!jyV0QX!M91T6CZ)7!q@pc5l|p8eZ5ISbHOKZ7!R3j@Buy(ya_W>IN?*vX?wE!JA<6 zxd&1eBI{V6_M75w5P?&)r`Af>d=PwK>QzoFSRBP#=Zuow$g{oLU@3G89u?aacw$30 zhi?eY@cH%b<3evvU&NPyJE!HLS}T9NAL_m|U9tWg?GvI;hbL-xXQRH3=TG{f->vz* zg)^ZgSgednLzpG#kaY;!r>j9d`Tt|;%LAk+&h~p?ce;C~XQrp8K{;es6k$=h zM1&YQwS?FMwEfz(scu94&b=*7Uo zoqgw|wt99p2eFQ|Y*%Z=UuR-&BkdxXDts>!>tM`H+q4%%%$q3szcFpUGqCiq$WQ9= z@5?w*KjMI@AZJ+ncL?MR<`x;7aH9KL(??92(X#6?Xf^GF2iYS;zA>*sJP>^*YOT(M zHP~9VOmr01=p^iaSa_oJ(_IT%Vz0XHYwMG?vz&;%to`Li&-O!gO?6F;z&S8)epJTV zLd%?G#=onLY~T0#%ok!49*^H`bQ`tb(WKUtla%D4sd+B8S!Z(AowKKzxbcdd&0lo& zPB1<@>-qVP^t&5l^^X4m4XCw>lW@-LCHM|?$GPzip-;vQM#fjl^RIwBsV}K~aW%f< zL^qlm=DlhAj#c4xVz>Mr_K%N$+D=}Ho?K0De%hD2X1q?V)m=7R7?$PDhE9Cbhb4qvj#5oWvjCgCr3frBrHqYez(N%ZB2fIzg}VypTJgW z@D=aB2>pIu#>&7iqwhq%QCHRn^@(|@p{W6&Z?0nk8`6I_I_PAljH8J6RcmFp3`ahT zzWhkM%lz!vNqZBbvrP?Zb;3{Vk(fh7 zocz)F{)fQHza@W%+>65Au{{VAOXDRTG7bvkiTqO{hZ!qaAHHv}#9N_WRL&pvIWg5W z57y<WO+NmJ5HE zu}$qe*95mgwkV$Z!TCYH!+W6*rS<-r^cqvwR2B9U|LADM`M)Ws*benn7?7h0& zO`?x(gg&}B(XY+<#oA6*>y+~kXU4$|z-iPnzb0r~#?M5&D>zowgg|$A7%Hak=$pbf z(nC$YtBx(MPP^Fl;Iwk42rpo!-Z@RsiaJlK*2<3_Wj|SRPKFHCr)ko}|*YS$FXurH8?QPZ!X!)?l z|9?6@iEd=;v(F0E91!{ooGUa9&u8AJW8Pv-RC%@sxl^>x;F126zzJt>BWakujoqX+ zNzvyjd|%6fC$kF-?&2HBe)97QFco_SHQ%YV;=9%1YLmymx!6l=+8(fJughMq;)l>j zwb4}J#|yB3_F-uo>|6Io=|f@shxl4NpDS_i@04e+e*oWbMevZR*?zHP=Wq=~?>701 zelF(NntR-q$nmWXR!c7Iam>%XIQJ{qY!%K*$Pmg#{w-cBXv#I^Mqo`JWMy`>@GRw9 z-m!lDsLcQJZA>p<<_+7y;5{&`z&z!qWi9g?yGa`e3?a= zMaK467rl>mZYAG1-;-y;^WnTv&F`BE7CUHBqTlnz{EcEiP&TTyx}yn+UYpws7N7rD z>0g=H0%QKV?!8~SpYhj5`=d>5GN*i36|} z7LexsBXdW>wp90})+*N2>?vQ5x}GuN-{YJq+aGh58Xea?x>Nbf;M0!-+uvPmV`~h; zRA&>bWWG$>5-mB)`wtf%l{^Jy4(V+!ehX?Ab8oHPHM3-UEf=`|mO26YHM5Fsj19jw zzbV!YUNon)!0`Jg1>1X0|4YX(o3g5>fHM&L z2CIxrsCO(*DfFV`*<0Xq9aVfpWCiijW{#^fVL zg`gvC z?(lc`y|^FbMDEYsZ)E0nx5?BHQs(Fw!dBpzY5OOYI#tCYpaniDd{UT<=inM!8vL*2 z9=`XW?jzO67|kP(TNY>y@EDD8_m~eWhR=Mw+Z3JVpGxn{GoD>&<1@&_DV$j zt^KWGs;LUr&2p|JF!&>e|TWy5-Xioh0a%luiFBTj?biw?d$b5Jy0jeoSM)X z4O#tIXmgtEt0hJ{peRJ@_*E%G7LZcB4+AarK)$TZ4T^&h}iiPj%4oOpm<}{YfX-&jE-h>v!B2?hAE~@LczL(4n%!H)J)& zm*eFl+anLCPGi%mwK`|UPlPWfJI>E;8uXx^Qx%?O@_M`6#bWF7eFv9pZru%CQ&%?4 zpXRHx-QA+r^nE<=>}hh>r{b>nd;5)z#Mm`?mOhS;DM>oFwIRDj;GBGC>ODJOV{&|t+%Ie0AB`*))8Vk^wXEKd-Jo&OTGSfv3xU!(Yipv`BxWt0 z6L4~o;sv!<_j_GpF5w*|JCi+C)`^T4ttr}B20Igd;-41ZGxeEk(`!+mpq{VR>iPX# z6>sOA_J|aZ)As%Wy#QLzc5!Wg;!;=j(bMOxjIH0A!hfR6z{_(=S4b}&Wddh-X0w*ck+Mxdx*j>zyk_7hHk++KC!$)=c7I=ox?6#FVbj{7-ZW_i$l&VW?#Y z>xeW>5+jlFgtAwyl}za7A7k`gsRSz0JnlNn0B>yfoa@y0AxE+rS5+ zmqF9g{;=7^PyT`WdHwka%o)*o>TdMWYaKnt36wm?`EQSJ7hOsD#-0v+7XvdN3y*w+ zv+W=CH~qG1t!N`tur|+vw0d8@`?CC}^1F;_58STWsPpJ)`~R zzKCt8<$Oin);%r>H;E0&eO854;Ru{3efdfc|FE8c-|A7GLtVh2;4TE$Z_h zMbe&LsZkEhR}ImW0RJd<+x`b53uYlY*a z&zkmLN8n@Vb9gc_+v^(SjQF<@Ey1$D)Mz2sX=lD}i|m>5=K$0(>UX&hu?6mjpLfjL`7f=b)+X1p)NK$s z;0#9m#Q(GSu;kMkNC6#x?i4i|yL}yM7d4IDuCa>;I~5NXACcS~e#)yWrj7q{h+dzTcU`W(-1{-O_qpl0rgow(*H7r}XvoQ4 z_^0opce&n}?;GcBoz=f{YfUa*t-(_mGB-6l)$DU#Y;l0E7C$R=ZpL#sM?=%+pvc-< z#I?|VSs&5k%1=~lr++8s&wIZF8FBqyc|ULB zMS~J?)T!ZAV-H-G|GlZLx(&Gl%}4C{)iP>N_7&+Vpxjsr3{p)S9sJIUW>DvIFZ$zj z?DU7qUxa>$A=9U*=4CJz@nxl*Blb?_J@Ku$=XXjUh#a1dd@JLkz45+`i%!Yfne{;3 z5}Sc{M7&nou>&BiM-&Gl&Zcrzh(8;Dp>?5B>}uKr|H^zIHNCX$$G~19o%45J&i=#b z`Y!ItzUHZ)b3dEf!X4$hj$M$kYOQ!Yk6eTDYnTVO_Rpx$&RAa&*!amGvR1Zla&Lzo zOp$e*lM*#cU5Z_d?u*@6{0qvr(V5X1E%z3kY z4nLC^0?%Pye7DqPQU9)VJ~z6%Ljpr!Vm#5rQ8{N*>pt43+NbN7-zPG^32_6?#n5NF zykPwW&bVYBAL136`%4cCFFQ^(Y9u&2Qq>pLBhRaC`?CsXn;F3e054S2;r7_#Ts8WA zU|y?yC1Zxn^U_z{0a;30aTjz@V{GlcS99h05!9!}?WT`!Noac(+Qm1BJx~3$B3Ni> z={@%)^Ily`T}_W6YrQlt56r9X z;3BbsN!y%FrgJ(oOLi7~hr$~8(W+MA3ik?E>b+s7J&k-ZZ9)gy^&GEJ;w{ucvof;` z9)9G$FY=J@^=-MosWtwByfzDeOJ19no@V@%ZPIh3>inZ}jx2`ERBNR-hbCrrbaBrz zwSRxk-(-BW9sVwn4~*^HS+H|^)mrf^Yjks!>C zHs=h??6^?s_vlwvlqw93t#pn&vrLxQ8B6&I`JN&OI@EqQMv>4x5tUzJ=@-v&x)r+_9@&#Uz~liBPV}K%=w4|0XBVVz zE!Uqr-bTmr{<8dX$%6oABVfPzjW`F&CAC)XMZ76>=H04aD-4!eS?cuWw5nT1;lFbS zFhwa_6n@NiP_J~J>b2(QRtgv zuIKTafRXN;A+|2_;7^q0|1!w`2LDF!HEw{faj<`|;7gMm@;T+>^uqeP-1j1TsbBUd z<}&;%v$k9V%-Z;cCZ6zY@mbRs);ZhYx5gfvYQ!@^KiY>qy|B&LQLmI|&N5!qF@KTp z^@Xr=Sih>zkeJx4xw;JWc2?oM!iiXu-+P8O7IaZm#{0!Po`6{itRotO_iFTS6B}tB z_?lu@Ks=Iflf;J ztrvI~c$#1C^gc5EWgiE&e-n7uCf>d_flE^Zr&aH#cih|LW$JRjm3KK4?=m@RG}sQc z(P9%jdMEf%YBG7Ae~J{&%urmw>E79fADQpd`j;5{+CSy2aDC>5Y->}mbyi`H=r}%y zy=6EajUUcla*Hj~ zg#V>&zXP(1g-?k^aFb_ib%^((-}h+Pz0}eDK(`BX3k{C_DB#rbJgL7})51HYPodW8 z9J;t&4etcmw5iWzt&8?|>Py!s-vkbo6DXe-GPAtqT-TPC%VXOsO8jvBx1VFStkyw$ z!e*1h;tWLI5g*y$zah30IJKf47$e$l{H*dbU5DJF*8B$TkY9@)JYryVs~7S%&)D0w zayW8ViVgM(4E?~L2pyy_x;vMSF||+Wd>XQv`I`MLYR!A!-7+lHF^XQ^Z4qr_{4TW0 zgu;Y^rrTlR3F7}!F5Q#wQO?U?mSRTv!aQ@-51V(H5ZaoMON%y-S%pZYt`&JQ`=puC zgL5eJf>*s6o;}ZmyQs?zG2g$lVC!AK0luQ<*^3i(K5C8k!W~_fuMyr*H!te?gH zf+3(=*7{D%+q`qv*v|P{7N~jXj3b?$J=^Hz$h|>i&h@CXIweaiDP{kh1HDH1z}zl# z{o0=4Tr*9RwaESP%!!NsM*0n7r!hyb&w=xiHGhrser$Qk9=)P}a!cXY8 zUWk41jXT@WcB-iQGN_wQ%ndj1I4rdENt|JAR~+EknMC=hyTr_|g>JnLSnImRU`2GP zqvd>UvG)+y&BXGVIPzsk>4yxKY)xDvb_m2?usbtZ;nF~cuMcgn zG~b1GAn$!6aJqCZ%q_SkC%)3LbHkUq)}EXdjRL>(d=Oi7_ZeAT75+|gE_I;8douT! z9KkL5Tg11L+SHVl`B5C1xg@|@75|Pssvjn1AHR~nTH>GV?M3;U+#~(*y4*2B^Zj5G z9_i9AfV@Ir=#<>}%8A$)cegXP^#&a)mF}K_&#yvsi04T={}bRU(7xITKe2t*#)zup z&xMbuYi`e|di6UYH}d$WX>xQ%;aQ!6&(&J#&0)?^6K@;@IZRu{ab`G2CouUZlyd~X zh0NSq+**z~%$EG7wmBd6AC{bTHU7F=n?U3|Y5vGWPvY>b$~BAx4KG2B7G)!6;2sR5 z70N5pNuzJ)>aylg>&op8n?>N}GE72F$%{fxy9^{eUiTWk>S!-Km3T8}j57dbVmJT#Ij@Jt7B<{yM>K(5a zT~EcZ)q6yq$=c@0(N_`=;oexoHW$xf9TBkHo_%7DY5R6w5<9Mqojb57ZW6oeW=OpIkyBtCW(VZbMR_|zd}Vee zGLSf1(2QEEcbVuCdrIM)pY1;f%*@a^8$7Glst@bcL>={$B~>fD>YK+~! zE|?_ohjU;X%!`-H9vEk6^#35gi^qGPpuR%)TWxdfe(H*rA7eKyw86inZLfLZt>7*3 zk7(vU ze!eEAo(&z&I_VT0X5s@IP#a9XLjbhm{oMN|*7`_d=J+ASL)D#P4?E+X=-5#2tJaE^ zR;QSW8t zqhUW&5_$i1zO^xCWo(bOS}VS*&2BM%%Ank!@@(b(EuBl9O)tZO;2DWY(oTCm^R$s& z8T_a3t2RoDjS8g=dbwZfIjIwG42T;R0$*0)hikg+lkQ`1EpGD8GJP(cOE%7MoIhCn zf=Q6W0cNRa+51*t`&iwgCwI*_p<1gMd7GWPOl>?WjAajL=$9kQHW>BGc2qlR`j1?j z?^}v<)3*9OsMXhUgLOMfK6}*<6~2>aevfCa2(B?P@D$>rx@L84ajoo)ys6fT#@e_C z$oVi2o(s2_9@3_)>Nlh;VjZ<$7r@SG^zW897-hxA0_iGr{t3P~y7-Lz?$bD1&brbu zNwrQnui*pce6=sIuDH&`9H<#0yf0pQd z2>eE4hx_SQj81QdS}fkhBjCHdn>RDX)LQ-4F82g^-_syhU(Ox?t*7e12bM8E2ZOKG zTIr?%!8nmi^qcy*ws!rD#Jr)(j4N?w>iW^e(UMc6%`mZK>2^GHna1j2kCm1ctT{ZD z@(pw~Dzumb|MA|F*b(iSL*lDilg{buO>?bYo{*?HzZf}U%DQTNhyDAS_S9PWFJs{) zY8!G%sAfmfR%!5m&YX+CrEZ<=SX`zB{^?TB&lvT?{wnb?`TfQO=9r(cxD5+&KAKPa z7W3Mx6&4MO#k$DSyW-c)kmNYkO|H!Sg|#n5pkNw9TQC zFD5S&gH*>GugqT!IiUWwF86@w`ujn+c`t8bacZr2zt*i&weFy2&V}c5m{H#9*m+ND zkp~%$&-wphZe;{kFb!cGr|rm{;2)3 zinoKe&EKjub^XScF|p;HpcoXj3^~oS@x4a>Q;An&Yp`Kdy!|uyBW(+9#RleCskM6d zFOb8cOyD_xQy471Gh^}tGrtqNv<~)F+oHYG8Mzrb?NjV7QsMa_u#0nbxhm4+mDEPC;F3OO1 z;E(A2{|y-UwB=p~5f99KE_b~dcl`x=4KzJJ5!jes;9Fdp!{Wn??|eY^0Ex}gW>afL zS2gH~*0w<|(Vw0UY;2QqZzj(la<9SfBzrgrd$=mFbHiJC6{auX*<$zBHppYCL#M+wO&^1 zl=GD{qhd{Vjqx>(5M1lf=>Zz(n;j+?Wt7`Lm41=@T@&_S6I<-KbwWR(^FC;4H}KoF z{P|~A$t%)K?8G>I%7^`kyPgJKQ!@X_!jlE%1GaYjjGxi#$tBzOH^sA9WUQIga!jp3 zlbBC>r)TRTHaiW*emg7CGdngj*3>X`z-$q1CtQ}V61#;l!1sc6;v>`E_`I~;^{MAJP9JH1HK@U`KjKx#w=SgI6@RG3ZC^0bIMs zx#Zd>Rcobpx<|Ht{($T@@jJ+0Z@O<9y}!{}g8iuTyg1R96zA=Xtp@)D$z6_wk8o@0 z){@rUYxBw<+zxwto%0{D0eD}>cov)VOZQ9jTi?1CpYSEj1LdA+tMrcss(d>9m#yio zhUQVJgSr~Zjp|mc|D?=h4B@)8ohi^UZ!tQEIiuxOuh`DcXrHq4XsToD>$Pk1Ysoct zYU4Of1)B?F43Krgy|BBPr9HAYo-;ABC}*yN&Yf3M@uGR4XSG)T#ZvcClgl8^q1gYQ z%?6g;FjK4caL(qB=$Dnhlj;r(ZQcd#kCW1)O&wj|LSGY$zACuh=)`B7=jF`l_toX@ zHguc!V$ttBxBn~t%U}^4hxrba!_+DD&f$V_%9``WgkR5IJf8VDeCzM%9iu<;65erJ z={V?a74z>NDIKvN_dYN^(A?Kj^p%qb`TV}YyO3{6_MYpid6#K?{(bsNIZw#^igmye z;q(84zo?Wt*wASW8f!?%t5wlr>4SrKa9$|BP}KS^a*JXopzs#hXg7=Axd}37VFGWE zaS3hPsI`jqG1pVT-e@~L7=I`BGdIn6)ChczEdbk4;aVfU=bT!O8&J2hCW`Sc%G=G3 zjVJF*SIBcH>*~>iOr1ORmn<*`x>YDTAMC_|s$HRty25`_{J3ZseDmx{*=l^BSazKI zLo6NUR_@K-o7L}&S;@Bc%(>mvVC3?7@#U#Q7o_)u7nJ{YJ@AUPZ`kPf6Ftj!tP1}k zvSle`%dALaDRgt1y=ISd3|kP3+w53h?=82Rp`RB^&%=*Xx!`T+yVPg9GxsBWoY46m zdReViJab#=5Ztxup?D1WEYcqJ_!m(}kwuh~7e#5wFHnAR9-Q#PgR`CAW`ApR%8-n$ zH67y(6}iXfjL6yE-nZPhOzmjs+xorX>6ON3+>yuyyn|VC`g}TJ=AHJBo+~{k_6hx8 z&V$zeLc7@3lXuK_6nWSIgt8zpi<5I{wVqOI)-R!-*Bv7=VU{x^uh!HB8(WryTMW;> zl)$DKl{?Yk1}t}$!_-&uyct*lS}%8x4wafu(&qqFYLnMa!uqc4UFO_~!ARO8t#Woe z&!4ugS}R-khWwDS&**sHV+M`3OFxf4H}#hFrOGtMLZSq~0&ItCpLhRhkjF4Mm?2fawt`}E(R44)MpN_*_(1fFe}4vm~? z%Kk;<*fQ`DbH{!0x9nqW_LNL+hQF-VN+xeWEwrxRTLhdpeTI)E>VF19j%oT_7xgnf z^~LVR22V__l}xJ&?OcgeE~W80K-&wke~Hs>taBW(yBO!(kiJ#&HPpWw{f+))>=`WH za%pkC=-+C*dvDmB6Y#kQ-Ym9J`M3k2n;QL-B{nz)^0r5&hwu^Qj9ROE9GvcKe2N9> zn&>9%fik2zwlf<3;dPZW$F&5sjdiT@?c&>_n;fSa^Gq$q%X9e^LNlzFn-~8^{1M9S z*K(`_RCLugXYJ45AV;tLuiwYk7waGWN@PA`s{7sj#vW*edP3H@kv>_+t9gG+;S{NL zq|C3&T_Li48f5#71Xj}e(8fAW$)2ieY#`s-1Ak1*r48B5;@eVguXI zd3F|IpY&0R1|UnT;j`#>IVv&3dSGUl_&!6ixz@$jutiD#>s!=1%_yLTBbds=Ay@j>XUVH}{k7qEQpvGunDGd(4?+yf5S zKEwp{-yR-CqIVz;Vf&q8aE6xvKZkOF{H4~4zc~L_+eO3|((%tbayEW-O+v55z+GfM z{Xo3$ISHGjTVmem(0Hhku>-;Z=*3oYUaggVvevU$Y6DA`<+XpbI=woreMUrHB!@+v zSQY+1;g>bwm$&@4jK6SWaHolT&x#Zd32o_B<@HdU!zq#N*LF&Wo7{BY#2lOzf!)K} zd~bu%{YLnPq35lhjkkZ5)A7T>u7;w~g4mD^Sl@-b4DV|JXlxi} z#_8v%HJ)>9wUfi(H||+t6p_LNyA03Vhk1zPg-iO=cHJ(z30SPHegKw&wtqS#>Mpvt zuSi`A<&x{;AO4p1#+}}s$P%b~S8GKNh~J7I&HJ5MvRDE42KJok&uTf-F19)Mx$ZWJ zA#a6Fye|Es;gJt>ADZ0XQAImbyC!%B{6zXk4}S2N$QknZeg1vEme0-Ug6PK*birn) z-aM1|X~%(vsdolu2bz9_Ym2&86Foa+JeJ47kIR8epylw;Xqfg3JYwcZP8qSaX7AUc zyD`KD_oZqc9v@IWc6)rc&^hmM0%`^Ip7#KsM9Zb|uC3SoB>u$k8gtecm(Tg;(#<8U zi|_DlOle@|N2#U%0lg#}(s%1PRR!@kw4ChXJ|;4-E$DDz?ro`;AdMZBStouRZL`MG zB{EBhXE*@S8{K1)&RW^Nrg*E^aD0LHlLTy3ZPYO`H&Z zhr!dT@L92`oPSFAI5p?h+Baym!(-(Z)qA^V~WQ{Pwj=p>2x zkaxOA1({>Zny!m-m&oVK;E(SLZCq|v*dV>njH`T?`$1@l-#<5gQ0z(W?M_d{qgd~B zTv6fLjl>1iMx39hVmpn#?c049p0u_@#`_jexCxyN`n@KE!^AEn4LA6=K*(`a`k_>uUy#5)CTknSsRRgE7&=g7VTW-27jmM zsi}C!FXHX+v(*0ofT-#qJZBT$kvyVhCTA#XnW@%FW{wI*iR_||I5j*~boUUv%aB5E ziT84EgOR7x=g_BkrsNkmQ)zkOIk9zl=KL+?(;+t@Ytmu0L%dMN^d3iTFl{F-dx2Lk z`I-PRCVskFX zm&OKT#g?na=SN1rz*YoK?||xa>T=dj_>J=$V}rE|Rc%QJFxxKoC$YhP#5$MBWf(W+ zbEe@`^(>D);rC`1A^DN#LrjK+rH@Pv(u1+Blfo_4Bxs*y7*f;v+Z_@4V-8Pg^U`*xb)BjWS32a2)W z4snNg1m25%<#S3`%6E>(c~&6rqkV_om@7)XIbjWA@96W=wxwDtJEu0930V<3_kl+S zrRIkR;rZEpEiKQ5wqKrp1bKmZw>#1IL_D7qbm*hriMsa8Ywy_kDSt`SjuMMc%cc5K zv&7{npC_Uwockf2e~UTkTr)=ZY+&QGe@N6Z(jL&~+&!}ODw`c^Q>}7sT&2Eb?W?{1 z5F-!SgU093<{^z~-Sn5x=FSd}PB3zkGi7+r)EAu7t!@5#*UmdwQ?&W43E>Q(bISZL zV3#uY@jCvv2QXeJi&$sHye;=Y{sJDF%o^?nU;D|hSz?Sb=NCD5&8L%!lT5A4yo7zb z)!XW6TJ7T6xevQsD{t54RlVQ8A-mLC`DmNLcf+usjrjcj#H^^9B|EEParzs{aX{QU zoiMM5cSJkzi+GEw8yV(!OC!~LQjK@nl)&_>LmjNPuR53G|0BVJwb5viCsW}NE&#r( z@Hk>_pE++KJQN}d3f&RfzQV@Ru_B}JyTHG-I&=W$0`Ls^%q5}4Q$jvebo4=>XH1|m z`gfzV5wxdxN3B!Nu`NxPw?!f!R7v))~MtClc{g4%N-^*Y8UtstkuzW?9$BA%y8_V5JvPCu1w zZSx{`uCi(IjtAk4FC@tV4W;*&N;(My7G5yp9|6%>EHEqR=@K z-)Z*JzSduyeZw=ntWR|-#u;dz(*|CPJ_1cM?D_45&)M^PzxRNO>mv4YKXAEe!}rJD zCP$N_j#x8(a#3ELVIBB|vo`qrA$Z4KSrZHLSd*Z2R{NNCql(4VqXS0sJ8OINIXC*Y zmU2qL;#b^Vwk;QcCig~T47SzDrISsK!MNf$iJMW5eOksr+63B2?CLGju&@U_NsqkTRA??|8PO#e*d z?-Nf+$D-95R1O6^*R?%&w-;{*UnqW5Yo%W*(>6CZ)*ownOIg#R`Q;;Tz1$ad$C$R4%0k)QRX63^RPH=vHhncYI<37qJ5$xbE>A1cHKF- za}2-l&Zs(syYZU667#0#lqMRxqQ3M$(RZvPeLeenR_9yUdqR9}>X*NS>x51y>)78) zI;6clDz~+aGXO08?0F^@w=cBvq0X`Oy%X~6Ee)MBL91%5?4J&xNy>2i=dqVi-;r9U zoK3i+Wx$cvv;mJA-&c3E9THmmxl^Nl!l#shBTKfQC0&+LS@7egf~^7Tkmzl>FM+A` zRP>ag6Sby1tab*J9uoVOcFxSwkD@QAPp1@=F1rx6M-!?}w7)Pd&)!DndVXj*I#FBr zal$72Tl6>M+qQ=u;rB_m4N+a$p7*NbK*`U+c&~k+C6zmy;jAp#9)YEqHK1D+hi8o? z&y)0^*2<BiQU5MZ zTif#9;sf$b>OtZMYM=M?avr=Fo--ZnTEPH zBlK+yc2)u(Os$1426w<56D{9Z=P&jla!;d?6W4b2yII>KkdKBK`OLYc+NT(j8Jc3w z8ZbF6`SOea=CBU%4v;)P^S{&5L-YJTW8)3}KZVZ!f&X!8aH=_20q2uH5N6 z&?8UyPZ)VVvvj`bV%{}lr~1C?kgKJfq3!faW;t?0q4O$in75G^;QGIK&PVBk#ZN>( zUAMa2`zCJ2nt%PA?$O~APk>mej@;X1&-1Y7j`{VHqx=N6&2`zEAy$+gpIp2VI6z7^ z5`(vInU^E?FnN9##Ge`eA>GoJP-`W}=9DgjudVPyR-#IhHU{6lcVWJx?_ytI<6XoP zP;$?M9@%Z;X&wA_<=ClLeRjCOKJ<-a{x(8^t&fR)@i%? z*ut@<)>N&PJo!tacXda4r_>~{zM_k(bLbu>pV@aI4m01~ab^IIm}|cK#uj43YF)O- zU1aP%&Z5$Lz-&7c4E%Xfr$ z0`M*MeYFB@=zZQ-$QqitH8B$h_JG6^N!!OD-mCAWDbr-;@GgZ;9D&~@ov8%&Pl;p_Q3G20u!?WgLE& zJ`}%Co98`ulCl3M#WO4TzSIi`7OgJ6BWL@y8E4QlRtmt@;GXHzO~s57y@%0|1L|y1 z=U&FDVw`XQX5#2L)u3D(=?$knxx8R)_s>f&_6Q`oW z`J41IPct*bH>Won8O!=@EgvpGy%x`$^;)dcCV%n14)$%`)C0~VCdYJMVwTO|lIS+mqzW}QT4`Z(Tl|E=N=`2J4RtqsBcnNO^XUQ+c`$W0GT)VKc<{SxVCuFbrHy{S0l z#NfAbo`|;}%GsL6_fN#1hX=zUtCg%%Yb664ecM-cR>8)U_9Sqny0}|R+2PVH z4!O2mGs#-e>F!MNbFW4G|9-(wR=hbmzSGe;Xy#>3$9`yQ5tB#z8o4kMACUAsFWxKh z5c-nO6rM4DO0U?~i@uyy^Gq3Y?w@$y`3Y>#9*)u@oN@4QqVH*1{$NkrwCtbNHc|!V zIV!txPs_`wf4HT5&gXdRObvEEhhaW~hb?D9nuhHk#@`tlaw2iIS zDd(S{;<4@(rYGgPw5>P(I{mew|FwBrv-D6Ru2LKQBJp$1c9|8OC$vF(tje>q8+ylU zOx^PHuBy$TPZ7nj

O2{5A7e1umyab1w(DBIXx^&g_;Mz8e^?#JEf`Wahyu_9=e{ZQ7` z7kZldoF$>{FJ2UXBfLKec7Esh7l{|KmbhK~v5`e50T)QP6o%I|{uU+Qn)kGP?tgCV zD9Rkt+j_{HP4PCl3)1||(v#*nN9B()y<@qsDEI@Ew?AipHgbl&w4^cWqbI^Aj7_-J z`=9uU{Qk9=`J#2-L*;o2jM=`I=pkAZZ#OdS{xYT_>EwiRZR99CpIF4YueonY`CrH2 z-PKyf1b#rRCS#l5;q%DtD)!G|_}imUFQItBf%mw_^m(lh|0}#t9GKl1tG`B;EbjfD z+!mv|8(nKJZ7cIQ&kcBeQVU0ZZ1${uau#N89wD?e8+oYjMZfPtu8_5+y1#()yeNz4 zH~DGHFDE-Tuhi(jF81(R*s-kRRXV5wSOmwEeZ$M02a69H+^VHfPU^s^TUVA=nm+nn zZU)&v;An$x>mpk(_i_RQyxFrgmivnP46n^8y#cMK?wXiRq+!&JUvpi~_L$6z#|nlF z{m@okD}w>sIcsCN3lcNMnsOF{^rWnfhnxiLFValQpz2n=Vq0U@J!&*Iz-*c6pmJ*6 z!sQY#1qK^tIBs#vH6dBV4@Ezcr_fU)GV_lxc87Wjt6`*BtMlKPQ?=`q+dsxXnq2v| zgq=n^|CBPnbDpD;tGip&8W>QOPBnV##Fhr>dB+qxO6^St(0qe$=O|$whpA^64tykK z^EiY5m02kE9(}PJgE>ksL%#J)#8^5-Do@Q?3j{-qjrv{2`tQ>c^%9Z$I${(d;_j-B zmuE}6{nCQU9bbaIHToZjZ}nfqOzz0tVQM(l8hx+h=N#%5QE-gE9fzO&E)f&{K7p6p z;M-Zl|H{0b(Y_Ke`i%W>ZgHyEdp$7gZHsIBZR>J2Hy640%DLTxy*&^uG<6aE)3(;G zi>qoKyCAlv*2I>tu#wO{;-*$l5>J z$S9x z+nvBI*)2SHE%Hrj zt^W4a+!N(E>O{eH(e`{@?n#jePe3M6?$zP9Xy@$kcS?OAeZ8ivod>rqI1m02pSg-X zO8711AAMPAW0;XUSmH~AAm9$hKP^w544=d#bNnr0Wv{^3(C4YvYX1%Xog(M&fPQCP z_w_g*+8(bZFmUQiKj7XKzn_R+7=8Y$5_M2h3U)rlg!}|kPY91x^z4Dqv)kj_OpfV2 zL`?WD{H>3W6H#)5ImB~KZ3g2ZTGs9Hh^Z1fKZ6%I6L3y>pWi3yy zXZs=IoceR-;C_d{Wju3Lw93>DVKhfd=WYgOW(hsa1U=N{{wnJiuB!4l zT)Ua28znDETZJ={j^OhjoDCcDNfSryoS0Q{bmlm*msndB=Pfobdp}Pv@2zur_HI|y zdmK{65+Fb zX3mToO$_rV?G8?j7e35_wL{jkake)0lrD z&cDt9Mec<{+fzZ?HJCk3J<@{O=9AM_r~jN$HUs~5Owt!a|GSo5G4Q~(EFGKZH}4d5 zGBKPc;K!2h*n|93@hOwj=WOeK{9VYy0YM%78YK_!4s4C$f^S5l4SJpQ z`mSJ+*e%@W8sxP#4o@zhGrTshG_R!f$oRr|<7;CMU@O+Gaoz#rgj&9-wTdCUj9yFf z<4Vxm3q^|s{Xn8lqc7%W>iwVr#N;|(Ovs7}c{Ru6EZ9Z!kq^>w9%3M~E@%~oxX%jz zZsLuoE0%cL8t_h>xA)%F>*|fb_h*0}E{`vdbxsX9&tk*8hx4p=+Lh03Fk)y6Bql>; z`FQSe;RVWnwN|q3oubuQkC*G)p8`**wX#>eoM&vmx=7XO(I5FU^6U~1hrpWQD@^Yu z=o+_p?G5(l-h%y8=Z?&&niIwu=E$r`p#kUq1V+SmOdZsGlnzcczFVfS%g`b7 zciQJ-+*ReHXLJ6z%DKaruglpvAjB>%%l{^|PC17{c+C&(jFR=C?Um?IIJn#!9^x)6 z=Ee)fvxWYdC)(uMnyv=FzsS8~V86{O_bd;`nKPD7eqjvZvG6hIpp?@*%$cm#N*|31 zUlHGdGPAe)QESTi1Ms&Eeo>x@!~*E>6zRKUo|G{PU6;NgYx(!N#Ec0iU>&K#KJ8!5 z7jq^HagcPM&i2^)3j<3F#m1n{?dJSS^btmPI@jY~$jkH>x}e8j^M3zye>11@`?SS9 zSQJ|y>dEZWLfd?I;?+d4tQNbS@A55b{`EZ`mg{Y7k}d8Ra@V9cC^Ap$zIO4y zP3_9s{H4-Q!KC|H!381{81uZwxyH!YH{7*mZdWc-65ofu3FF(^CZ}A|vVxfHI(Kl5 zuj=8c<8~mfI~Bh}9l9sfm^O~5*0f3Hw`@e+wLaTc<=6s52z>L}Nb~IUjP3iI6}>6? zf^n@gV%w*N$+#kaNDt3so-y&OD7N?ve+liG&kyf6y0u+w?V?+9x0o8pb-wNAJ)~&+ zc~211C>-%Z_7 zO;%x8^~42S>YQ0T7iY|z3-N)q-dW?@yz|6ztcfwV7ZWjuftif>0!X$%Z`ztYV$bq9 zkg>q!UN3U^6UgD3AcQPZ^SCRD&z1e|YNu7$%H&hVB;w2mfjYF$!kTUN*@+$KeN?W6 z@PHfLzFd<43%+epJ+jwdXzJJ(ryrAgNb(@#(zpgJSReBf&3P1zwa>L zO7lKvThP8@y=!%B`{@ENFttydyQg_`9?nPWf_l&5lC@N-9wo{X%ySeQlIyR-Y2_S> z<8{qV&~=;WFR(q@eX|yepc8B%$`;x}pXWZ$QP19r=S>&<$&JtT+1I()TO ze;en&7TbU_VN<--)Xb0fzX9zjJA7(shscd@LGx9aDwEe+>%D2@LtU<;=#&o7DWekj z>a4}pvGGTOM*{7mrExJ@f1MG2EA}?^cvs98Bvw@o_@XJ>J)&*18}EBRVs6&vJYV=? z3ix7ocw}@e&S4Aq`k$G98ksf)bEar(HRG8*+;J}Xlyrz%dhz3KgZ%k1_(}Fao8gqA zs@G!7?ZD!j22=6;1it<2(d)7w*0a?Y>VdMOWJPUc=Sr|XoW4oko0($1Rp}t)vp~1R zA7(wnr_P@xCJfW2Wg_A;w0S1s+|*jmJYZeZ)p!nhc1kow^dtL!)mq)%@bqx_P1F%h zEo!aoOxP-=>G<0TYg)rrNz3~-!v-TJD({r_QtVyQ{L%yQN$RPJgHz5`rE5k0Fi*7H zd(_lTy;G$9&zku?El)X58BD^BiF%Ja5TrHv1Ki{Zw>7HO4dZNXNt5m82AR-)@n@5kDF4Kfs;WeeY1UqAL;+nFVOP5WByNa zM-PGTW|r*l);lWROB-)({Hs>l53NHV6J<61g)XthLGr>?vIll{CXBkf zt&o{Yu8t^h|lM1H|9q{%fM&3az#b=yo%Em#C+6%?Z&9NzGLUmf zIiE%Q`1cldf3AoA7b_FakIpx8_#p2fv2{^v=cqMlW@F182^_F5(0iiuR-@g~;=}SB z&dWE7zGLi^vV!uKvf?z@mb!-Rl%mDVXHHhr*rtq~5y{WBEM4gwB6^3i=vjZcnLm|E zd1CW0w-~vzMd!}KcV5muB=H~Gnac~R_nGTG$X9AU<$GyAVs(0|$Z+}&lr7rEdm@@7 zvWtGi^~LMW48*F?#dc`sGw#F zP)BbqYAm(Oy$1>pm|5_jBgV))=2xJTQ5lP~)G_~v@W{j9k?YbqBdfbd511Ofu5s6L zJe;$)tc>E`^qG&$ePeJ!BK)W2D(_UsK)PnTX7ze&qNZy|;W42-`e;99R8B`~+lt=` z5Aw|GU2CJV=BK_)4{wxlu|5EytF@y4LsN(1%vJnct(9zPa#URb@2CmWur+VCi~nh2 zvm4S~rT3Gxx6ZM>+x^qFM*1pL6zW*egYknhuLP!t;Q3HC@~&&5TZCu%TYG^qNLfv} zIs(21^$VZB(y@8=s_@c9dK#>HkshG2It{sFvN&V&FNGPR8InYK?i_Agpn@abhQ93y9RH zet{qHot{}GA9}(5TogYme)=<@u^jsJX*;3mr@U78!r1}0V9%u05y%ztJ10SBskQpf zz|4JO)830`w$HXlJ`}ck%l;O%h719o;k5i^rj~nOFvH}w8vG7oQ}G=+vz6!UIMwJ| zStz_Y82_tx!NxsElZ@rk$5d-Pe`8BaG&DVG*rH*wCB)2fd2RM71f-`XUfx@vX?vG0hJqkXsKh2>@@QHKI& z&8T{_%ko_e-yP$zwnX{SjsAOb7d(ds|NlgPu|Am?xmqrrRQfGcG&PS~)oc-AIH-+uS5BeK^*BTt`& z`IIL7BQKzxuDm8M>~Fa^cLwsm%6~!X-o(Mi#A8H9(0)^EB?E8F*;w(?1g_@m*^|MS ziZ=(RZQQRpQIj^^wX&rRuq?FvWUr0RBcG9|S(@n7iVkJ{!z5GJ)YQTmuQ!zGjW)36 zugU03(sJ@q)KpL>J^`TZ)8Hs4l1<4+k9O+iczz&%Xf_ct3Lmb3G4L&FC){lu^ zi7ADHjbHy&<}0)324IgUdw2$N1U5HUnZQ&eehc51y6MnF-Tv}|ntw`~x!S#2Y+wg6 zXL4zBX+n7q=+ZHD(d|N2Cqo(d5n?{tPgHC5{8@>4;x`v>F3!bsASRtdVv7sfFZd&J z(5gqQQ=wBq(@BFrTXfkh$li}b6(^yt`LgoMN_|Jno9Ol53RjB!q@Eof^j3a1^i*wm zW-kBs!PxeVa-LT&><2WN;=Bp%b7cxjW)eewb!j!^5BaXCMXl9)4a~Hcy|u&MehjTG zF|+h5kyittJN5;!&@6@jV=WNvOoi8iO=_a8zVQ~h3QZxn6Z?A>g5{O-WUKRHWF zpW!ao)`(8azlz+D+ULf^{M>$NT~mSCCBb@A&#=I?^ExBf#sE2oUE8I^PvE@}KcOw= zL6bfiqYjGuB)>p9=@nbN%JYinnS9w9zz5JWv(e9rPnW^PKa%J>o|rwy#MoD32D;AU zZzydrF|-GPn@S&n@%EM31B7>YkA7;7sh4;n{Y3gue1|a;V%`prJ8kXUQL?iwwmVmp zZAjXOD@{zPT^rLMjX1^+qI188G8mNVXJmVr3R9XUTP0?svTj!A{SU|)>oS{kL_#_4}sh?l$?#Gvcl04F8zW zp%<6+S{?M-Kwz}$n9Ra>p*hdZK#QagMS5PBsH5&&v^mxjJzJOCH=*N(MmEmeJ5n;a zALxIVt8!1&J5jt!Y!%Y;qh+k)6h5yCZ5-@qgE8eG0`-isLx>SUJvbQOzZ5;Q+J9e= z!1;eJfhEgX###>0f7iY9js8lBo8d9Q&%8=}pDW?}+?ccYhs1kS^3VgO%|7whSijNe ztr2?TJn_ez$AmtK;h@%vmrqKcl-4@##=yqAYO>be80T7_Wm@|8LK~#FrLM~Lkggj1 z$7OG{rK`f35+9g>b?AqJK|$M$7`DoW=~m5|zqjCgc+Tue*EW3DXt=yD{deLClYWNa zJ22=B#!GWiVTSJ<(D|HQZVT#r)pJN#W(yDXzA-j?Qw)T1(ccS zEAiUJ7aO_VB{3hTx@?Pf>yOwVdN;KGdIY`FnzmnnETs+h2y_|ibFRZP$)^*ulZ*~x z?K;2DoY8K7x2Xxgp|C*wCichOoT$4yx_C4y9BDta#%vU>l}ux7Ji_OUjgRqa(dVo9 z8a{~lQ)}TX-R0VuzZ+l$>+@L>S~=6`ZKgDL|9TD&GeC&-rQG@@4sd1`L_=C04UO5N+skf_gi;*W)W&igOC@|VxI_?qY z-@=|%4ciy)RFVJm7skXVOT3GFn3lO(Vy9Q57iMZ!$w2DvspwfIFU-I>9})DD7&U42 zMBtj1>l|9tTJdI0u-MeA99rlqcfs%11 zpy(UX(Tr)#Lhe=cCXywS(&roA8JMwooJsL`@lAM!>(UcJhl-vT1XCm~L7v*~*nZ(V zN@}JF-?vMgk~5*rf0$t1gw7Grvudqk1;-YwpG7-aJ%5Iy)|3MqF-y_nnasef3T@}4 z^-Ln@JGI74A|!$OVMdkIy5LN9xfbtwZ*+{Q+mFk>8!=CQ&RGm>qcLTic} z#sB4b&P>lN``yH|+F@d7oZm+tXRpM_1it8d?p?w!wA=mEts-NqvFGm5D5<@t4HlFF zV_P=(orNC{20u3Xi{u^`LQyS+Psj7;`_>ie$}y8})z>Hb%kK27ukYN+QJF@?aGG`n<-|i?J70T*w!}rAYAf5kG_{GF(YNOTIv!cE4 zOS23H<2%K)r~ST_j-5SvW!}y<9g-Q6(LN6FHpQM?hO_!pbfS(?2uAeGvaF~II|}X% z@8Yujr6QwP?-9jz4~*SifX{fgeS^NHAMl0J3sRFqJ5a5a9XP|EfefCKlWMKx=l-zS z)OJP*{YyM~z30Drwy*q%z~&08!jr|n7z27(ntm1UrS9&g_@;8~y<0VN#Iy;yAGKEd z864Xf!kiLu#;~_lElneGIu}0}vCt%DQE#C`=G5k*Ut0hvSZj};y{4LYSJxC(VID#pcH@&4Qc zblK#hnzcmwkK7vhK55{t-~r)l^6$6d9%G{p2d0Fk?b_&7vFBIAp0Dx_H1WeG#8;U& zY{s7b)BrQzc1pqK{W*J@&+%}!(=ykJ?jZd?8a-xu9F8lF$8(^gvA6Tf@!N~Aw?hSY zLix^rKvji~Y41qz?5LCksnf?-Lu4zvVd9PM@O1GVLAzTIiPVzSgrc zq|tv<&hrgiB=Z-F-&u!d@$}jzW>xo3+c}Jk$%yZX`<+;vBJm&I@7R($k23^|Px<2;TW-N@Uv2+i6MbxQpwpun zhPIal51RRan;m;r4;3Dfcnh)e8vM&7zH}*mce7*p>p;O5Qa0Ylc)pf(YOQ4535kB3 zJAgs0=-jLR+5OqbMzvPoZ}h(uA7Kk<{?gzIW2g1V*nZVp3Y!hSA9TH`^I?tFEx0e* z57RTYmxQ=XI;ZwY;S*WYH;i11X;2$kESCwGJ4_qqxA>A;D|@NI|BLX#Qt-l0g({=# z13xe^?R}xe(H-R2I56X@+K*cj+S>A=`9Xr?!CLet%=%%C(0<6P`_Q|m<@w3ZHxlQc z0E?8^N<3%E6Q`Ieo{KfdfIU8-AG|R-4~#lbBO8NANin=GDBytwLAe z>xzp|gG9cr1=Gg)f0}zd+dtdX@Jx5_6FTVz9$a0rdNXqD>^9;VPQ!amSOYs8zK=ei z8xf<>>!s0B6Kg#>R(AUU=nG)>8vm5D#>hvEQL8m=;HH*8MSl{yb)0Hog{>7{<9F1W z-`R+mlEo^yr*x0$U;aGz8&lJQn48Ekk>|lf1`G6Z?{X7&t#|89UU+UP6uv8f@4imV z2j3L$5Pi2D`wvr!&XEQwuPdA?;56=XEr#2m)T|ji`atch@QU%;XSjB8z2oe9_iA?oIDC_0>y48-J^d{-R}F#gu}z zEteM*zBKjSJ^4SHm_YYP#iD8FABcb41MN4pR_E3!QZec-pxa&U%gR>4;V$w2EVcyg zv`qnfj+E^^04U2^{&a9V2oFLJBC2Bh&1uu#gzxiwu1gJ?ns}N>7wbM z8kjj-Y~8bPCgXq|$34(rU<`aR)=)t$#Ga*Xa4q6Fsnm1g>s^L8z$xVz8vP^GjhkH6 zlVv^lG+y|J%G=AnKre4`dU0Bx)$r1da{ia~K}EoSbEUlz)XnF7CA%u zxv6+lQQLbXfUm+cr|q$@G+bzm>p?l2->HF5r*u8@p|d1TPI_1per0~EDv@Vt56acP zTNFQT@LPJt(~VuaA-lmmXG-CGk=uBr*HlQ$T~y*O&c;8z&rWV9(_eY5Z~KcE=4@{@ zP;o`3r6JQ;=RX$jbs6l#D$maLnpv`a=wo7wsa1zajgJ2;E-W_wX}7SOiJ23>SJTfQ zWj>dZ;cBgXv{9K+8BMqS18Y~@7u{!U7`0aX-cqUJjkGO^Lp}nu$CwOpz;s-(XV^2; zGHqqN(%9#$<7G_?>tpM33&eK)gUAh=6K4+he4GP$|CqvBnIAzLrgL_+dEYhY^PP+D zfCZg5JzE>|u>Xkoclg-bl)y2rj(3ROB=4^XECygrK)h3R4tyr*in1tn9yD<(Vi;;$ zr8nk$QEt#iJwAJbnfF9nYXm-L&GsgDlfkg6%Z(RXcN}cpHW`Z*vpL*sY6e)}Lcfgl zEguw4lNi@B#KF4f6iztnH=abij=4pibDh&&XohmBy<_Vx&UI}(gz{PY8k_@2+GZ|$ zL0Z>7g}`96JtH;1*io|7tKQ*XWw6fbasz~4`oqQ>>%OUcH`pqpLfc34M*0oG+9H3A z!N1Y`Ezod-Z!x2m7UoL5C;+YD+fFuhYplPL+3WDTncLFyi#a!nHYa0ZFUP9qXg&C= z!B;iCLwh;S=!}Yi6L;mhoIQsqj?5g)zdC<4{P?c3s4Q23drN*F=TBUZ$bT}Ubp0)7kNcK zy*_=bx;xPSX@%2_tYE#(MZ7PZ|MQvWCGSbCI4XQYV$qC~>`BZ)*y}e!<|}^b2D)W# z`f$)~=-b|k%W{{QzQ5V|*?BD!w)i#0z!A-yXU=44<_YO-;a&6%rhzZiIRFa|_(jzF`&-l+G8Xy1;li`(9^0p? z#Rm8tbl>q=doS;M3Xg&`Ow2>gr(KKeLsT<)r$%>(A8{9q+A)RB@H^D+?sjd>ST6I& za<57+kF`CT4)eJO9Ze4_9cxFi_lNDo5pL)E-Z zDOg?5r+AX^4(&AZENA@9J%3-bTJybTXJ&h|jc-y5R93BjKPks6K7~Ts;wzkU_P%W_ z*gW;j(yih%Qf`dQDSMJN6*EhAF2KsH>djvbzf!GLOeU56rl5V#M}jjX_eb9B8Vwem zMZ0~ewe5q8y+Ly3r04pwA9pTJt|ezNXRbyTT0fJqso^+7o^D-q3G{yGT!#ItHRh(K zfSrh%1jlCQN4^m$(pX>K-cmM(Q+J|GzJU1Ay<7hF{6Mg#c^bU7cgG*N6eG=Wl)y zDQw}dafWKG_CK{`<1hmgxtq(O<9Ozz=LZt?Eq${iOl)U7u%menlbmix>$Iy3X25a zl6?0Xu;9j*d3K>|`ml&&njIQV>R-p;!p>nbch?*HjB z?&}KV92-HahvL0hD|K+bqx4^pme%<{OWa^D5j&S^P-M@XGph9c zVvd!enRJ`iO`q%;*?LGzWuH8rvot)fFwe{@jNA{z@B1%gV~2!Yu_XM^)Hu<8&~XON zjn(fmC^tyrEvyH-KWA;1A9N4{yc~bWl?=9-@RC#tTA>+x{ zm*rc1X}6iDb9Awfk^k4FZH%raS|D{n%Gt8Go&Q)9omJ4k6`{b0HV<4e(A&U_zN0AxoA<8@zmVsD zj^~doW4yp!b2=*ijS~s;zU}(Hp_5ojl&owPQQt|?nCyl=CckY?M zUq!En?CoCs7V;p9J|VA&TTZz_-Ky4*tN8rcGXC}o_~z}9AJjEVcOoxFUAzF_nOU+q zjz#W&C9cAF)W@lhO<&&2S=%r0pTd8PZ}m)h#x(1Vuk}@5Vau`ITFp)Lsr4!L68nuY zy4i)<1+7yKi<`}ir!ld`Y;5q)keDH7Bt0Ei+@y1YNh0fzM+nwKsgd3)AQJ|qE;0HA zxYI^<(bv#}|{|7N4_1(<^jsbo1x!_;5RyOJh<^H~t zan8gC*0jXgPdbnJb+}#PDzpJu-(KEBQyl_=q$}bi_^B0vrZ>()rF}RKd+3-ySL8!2 zbm$D&jhd%`@Gdn2%Yc*IDcvc33%*a;_+{k|;XBq#(|+UG{s^7BEwFVyXT}H1ekPy; zXfJx$LHkhTS_O2Z12{;dTc|qLS(Xo|6jK@|DUNZfs>**+wbL= z?w;wH>FI6`71;$v4i!OBAw~`_RJ;HUU_3xk)T{@HD2mFp;DLZ>P!WwHe-eyHB#ZK8 z6cLX_NmSItc!3HkC`ixoPyD>iuYMEI|Dyl59zP1tr+%!>A1gfG3w+wH@OR<;^*GOlg2Lwg2jonH_ko-neXb?0 zool~2WgADX#oqied{^iJkMVYgoO`G+@QH2Ca~=%&**HgUlg6kC3>>;qV!^mPQ$SX}n|e!bg^lG;wd@dt8s-Lb%20 zowN4F@Y3tXHej!f_NPXH2PafMuhuGlNSsE!&j!!N1b)bL6FowDKDjVRazN}e`og)w z=;cF7KbuV zLjS@0gZYeFtIv$h*qr7(w>9L3qT4cR*D0?+4h}IH^gG^Lnk~AUa|7pub4AXO9@-V` z%*1-%_A_$+l-AKVrDl$dimadBn6nr@ZE{B$AF~x=3+f%cnvS{SjJ$m{eAUnfailf> zHWqI~{ewD(PNhRk9(kU7uEbr>fnhN&8W-uf%7kQ5at1!nlm0q2TXswZuZDT0Kb4-9 z_hmiv{*uM&?CEZi^MNnpTp3yWVQOig@iD*kzBTcU?p_Z$f6ButvGtJ~3Ko0k+2Gkq z+_+24knB)ppFjtFl*(Olj)p#yCrf^nrjt%?CwCa$gnd<)!-nB~LCheodx*j9KTm33 zl{_K#IBB~EpIMY+O@jLSpuDXWyuP3?QK<*3JzIOzB|O5^@*Q9Lf3iuxs|2v_pYd}|jKn=5&6|Xqjeg=jQ{%Jp`PX(*3FJ4})m9F2O*xd1_ z=r7aHIomlM)S~ESww|TSb@Qu3LN;+OwLFEKW|xZB2raO8iW1Q@xtJT=7#JZ*Ik2 zL>^~rNyX3q1D(zoEaTpc!7dDKO;K0Bn~I&H?yIS#%{7cIj5YeDHhR+ZUwjm*o?pt< zb>TX2q0*IVjTp{}dT_JQj7*vCbSO9M;{=xgCw5_{TXaIDe$uNs z2eBrtn=p^bU}4So7K$Dx@86rf*Wge+nCh1qT-s{loV#7e^!^V`s$TUGu7W(?R_k~ zPu+K)XKTjRmONAEa1iQgwI6f>CcKibX?yoWbb{wb--o>h{5vso%Kk-C6Nry^>rk&n zzv*qz{ML#OwHtdL>?z-qG_wg_n7-57J!|uH!n^?b6r2|T-0!0HP1L#y85v?Gw-SAt zKo+eCZ2k5NaVKMsJ?71kJQwj5zjfzkwGFTu2*LW^Hv=0`zgM@Qn~~uol6Q@5P)^M} zVy&|7=~HX)RMXEl%*v}d$ed%sc!jpr+heu@y@IdJ`K&G3I7w4Wi`9QiMMvC*dudS^WqNHE z<(8P5oRNi*1?@+S%}x;gOWicQbQtJg;Y}@1#dzn(H;Ww}f=@XwOv}}>e?ENq7C3)Z zi=yp^*7;gr`*$zI7MF%`V7?1uAZ;OUNn`CGZ`E4a4-+$XKEfTqs?t4Zs~tNpl^CiO zdF9-azs2M??=ILJ+yvjw%<2|ce9^yze=&WL5oWh(*-{tZE56}L*xL|)sFCvvLz`co z688|>lKeFx0>T#Q2fk0wqQWNPdo9JB5xyhrIsvSMmq6F+XJw^v(W9cwr|TmF-EbksIxc7E^0Z@}T7SC=-Ymq4}D#X0!}>yl88! zI}|z;^gZqle+#=;-FuHz?1l9tx9}Yy{}(#%NbMr)Jikrh3C}FtC+|BDD!NahkF3cH z-J(XpgrScgxoae6`ZD6u*JM<_fVo%Jv1q=_7H#gPb*8o9$1@SrrY>f0FXt<19=Q;* zSKEiXb2cA38g)C`KIv6BUiL#B@k`d$5wZX4ca`&}?$$J*)=GyG!+dDvGhaov9_g!= zm!mJ6^5o^F1Czn1eO0oB7^?a?YOS7A@3#@ZvNin5x_q6X)gH-TOrE{$D_Ol7x?r{Q zSIpUweCVe494nK*%-gthy+2>aWatSyMlc6rA$8K(}STx#$Hn zLpaB#`lBxhFEDjbW#87T^hoYEF#+b4w0!tWN!6$jH@k1v&WT=xnj#$s8)x5;~Lg?y{Vd_%4KF3(;m^0o`UyVbLC zEzbPayl`yk1rw(_xOA}O*(qm6WUQ{CuW>o{Mqgt)JEgE5gMD&lsMgnN4f`sraW3#| z{^E?N(Zs|Sq-M6VrjESB+NA1mwaA>881IFRq-99UtSkHHyZ6n`lQX;@XLxj}Jun>9 zyrh4)oh!XCH#qkMe=)VV#Ff(LK%8g&zAH;VnjG%Oc{@94SaF!KJ=B{0J1v|Oib`&C z4^d)!LLc)UGjUY4R`xCRozC(79sP!47eS}*k8JH<2fqXQu#`MkYh|BLNG8F5Q8d8X zMcu1)R@TlhXeiiusmsyzrDGsxxJS8^QIuU{GhFEBV1JJ*CXcAI;khb))4ozy>%Utuh+6=MR1)whxYBiiYH6GTqA6- zp?FixzoSBn$$VPzG;`N#jk|^teJN{WX#0Yd#{R!5yvoc59S@9XIYY?9djBk;+d-h) z!&5k-yR&vaIBUPh<4joljYC8f2WLPeWsE*UQO?uZ+e!Q8`Af3M=F+TN%Rj~2Pn z6LNz!40;~-hWMW*e%m$I)#Qa=N%?ej&XHMNJ5=y&-eG6nH8G!O3eOmwuGUHy-xgSY zXWjK_*e7G@JNzBeJI1*%D}s9^212^snV%zZdk1mU?pa%dcU@rX8^4B4u4U#nRG{;m zYw+&GP13SLt(9!KD}|AGddc!W=Vt2MLFasD)Ay~`s&BC=-(>PHiJK9fOWFX2hSeU6m3U2xZ*06&E1GZN?1KA2(V8Zgd4tW?^WJ@HS= zhjVk*Hy@ciBC}ANfbCrN3qsp@(DrwgSU2zPmHaZvyK(=!T#IdceX8bdR^H~bZqD3n z@;l#!wx5(3H9EG>S@4?Q_eOigwxoV6doLPWo%R*qk@i(N)kA%{!^juj3!h&SsW=;D z<`EgIPtiUIJApRjCrxTy<(zn9Rf~gC^>Q~RHdiv+wKV*;_o?iGchRmeT;%OAFkU&i z!^G%n^LepDz(VMKQ1-^jIR9;_IWKKXHa9&iJWF_!^bdbFp-<=GoHvK-O`NA!)CNTkkiQnhNF%=6n4R`z7uTa*L>QqioFJJiCX=_rDW%*Nuf63rFMctPd>v z2ga6HDF&D|_*Whh;69EiHT|XZtDWiZj-=ebNunDgEv*1@Fr9IcuPtSZprFd?-&~ z7CDy$qa?1#8i0-Xr)|Q0!PU?^q#4iwFd68-Kry0|xtFOEKD>B@s`Y~3QSaNCi7)25 zo8IttsToX{Nz6gT8CC>#)^me5*4RryHZZ!rIvi|ln11NJ8h|~pUSbsTBU%r31tt$^ zlJO<_efsXyx(XITO)x5Vx!Az;Lto6OU;{&5f9rnF5AY*tzPY2;iZ_o*f@g&+u_xR6Uir7v|LT9@JXxfioq^`}DbvjQ%Gwgt5wesN?p;QcxJ4 zyzAd3S646!yqa3nUDFqy+py`$^L^Dr&3N6olx!S>nQ^p**r&NPW3jn*hb_&F=CXe~ zY;xovkdND6I#qNi?GxtH8SmNynea+wzTxZe(?cgKvV}3R*7@sA@Ah`r<`X0L8hIvV zOaF|Ofk~JcKeua;t?(mrAJ#9JD!s|72If4(f_SHt8x4g9gT*u)u_o@hJI?mbjLkK0 zu7{RaQ(}uzQ}2H$@q~Y2|6Ox$V6E<4BS>U?bN z(1;`_HZ9MyCu%kInbbiu=v>tp!D0oSgO8B^HJ`7|TTIsusTr)7Cf4V@xl+G$8+4Oe ztK3t}iIu1M*0lR&5Nf)PUlBW|r}H zDV(S}&*B?17p85?$Q>uP(^%;AhQg}isdyfx?EaF)PuK<>q0fIMYH#!!Hin$}Fq|Q= z-L&30E;-J`TUKUPnwp;}v8~DPk(z^ZW1?avlw;*o%<7E%G*c(=T&U{4R^l#pxI0Wg z!sudX{E^$@+l98-Z}@rexv5j)d@(KSSU0P9VX~vvl+~M>o+>;-$Ja z{+N=*2Cw%&GISfcr^*?gf-|fR@0ayltcOK5{&rCDal|L_TQ4^?ZBA@{=dbQxA-$Ar ze9L>w%!Of0@*Mn~_6cJ_I?lNrnKw=UYfH0DFLNPpbD%d@a6ed6SDV7R85M04dmE&L zo+DfTxi5%Jj;7wXIAi@2n>${ZiV2KNW=mZYZJ7Cpv1r}5Ej1&xYebx6#haA*T5ceY zA#qV`!Fw?GpuuETYjqCY@>dz`l*z!6(|UGdZemXBre47d6}&j~LuGBPdssEt_^r#G z$1B(!H+ZaX(ck^4WcxH9EZI0}RIs(voUx+iSatZd=#;OZB$i}t?(*t_#$fN^eG_gr zHpW}tE*1ZT4F9p^k1e%7I5C56X`Bgt_8&uQ6_wtnJOqAerT&DqQVl?> zRp&D%6(3j;ylw8TA>}`w313O)O7l~mAO|5>4NXf>Gef@&A4kmG=0qAxC8@Kej#%zb zH#5cR0^6(75_X!VjdJq0N}R`Y4y`)0QZLk{W4RI7s~b=jg-L ze)P4WjWMDcKx7(-4mzkc{6}RAmHkge7o&bwY+8LjZBn`WeHl;c2e`Lp&eQNWRWI{) z;Q#A$J{|MHS^w75&%=x-t7qRUd<{8Y<(vXTwmP(NylXPofL6hGu;q;jU`yH?iqL*=8EA)|}77qyFXoW%A8OEZ}wwmRj1J}fAk3bj}( zQ#0e{W#$VuMQeQKA=EVL+|wEE84BBT&Q-j>qo=cKS+@66w6 zY?bDbwa<@B%?gR!UrQ|U1e|Tzw>>hOT~$*`xv|Stb<4aX@PdiG5Pw_yQ);dDJR6t* z!XxnA+9#@pa5BC-+r3YCfpTwP{%~V6|JJ|A^k!3j9e%e$hXux6 zRV?>;Pu0JH1)YPl=Nmgvtrf4WPt~Gd7GGxS)t`%3C>s*KdAoweqwD3_xdzLeWoAD; z5{rv+vu|@rwfVXeFcs;~R)*o`dqXZtASkBKbS-?w9N@rr(^i z_9$~6?uy(;{4aARrB=50q-W0h5nY3~j8A=Ra;&MVd=2xesK>9s?|zxW@o1e|18v#Z zgbAYV+BTbR9vD2EvPJ7b-x?<-OM~JiDR1Ts|u1!w+ zvtv^AB)h}K@QGOS(A1O(@DHD-K2>Wa-@1hC)q*|(uc@`_0e`B35xNS#IcpfSzEEqG zJ3bRL0SDo`qz%T{M`GQv)WsR=KOsH~bs}j}^J5L>WAa`o6V{eKHNI`PyzPNqRa|AT zH<`oggU>UEb$6m_fcf1I^Pk9fKgPLTjd>879u}iNML&OQrPpQ$Vt4Cc=j$4zAXa_K zy!UnmJ1cy8JVWU74rhe3FM~n#_+82w_E^<%jkx{fWQxj(gWrdQLrjg$kkl;i`JQ8X zMfah`N#D^0;ThPo%1^Z`Tq|+KTI}u5kbs)6zlv1;h4rO_TBzE9$vE4E=$zBN&mBB# zW3Ttui(SW=n4GJ{d!*k@yi*-_1(u`O7+oMZmSh(T|I+T-<=T4My5J7+YpB-_Ne(fw zS+&Oe-PVCr&V8^a1PB3yQDOg-G)(gehCujTq zI{LNACyq?z(Wa(idY5>Yz(>G)A?~NvN=H9xmpjlzf;$V7tfXV z;%vui&&uJ46Wi0Y-LW~-eSyklJCMD{NDQz>`ry=B#RGTvmQUwpI1i}GITdt8>|ZTs z)LO|I);VaO>wv`8?lO0v<1 zfw=c8@>iHznp48Iz`3FxnT%R=izV1IU0Z^_C(cGEj^7!GIg=hpGd&WUV?8%#V}`#k ztdf{NWu}AqmHKz9LyLv@eE7VPEnOqqe?2c_dl@#m_X*9<0?luWL!Ji4vn|)c(l7PVIQxU85rxX{m+o;Sb6x(L26#H2&a99?VI zt}s!~=N6n#w`ii|HFg4*wR;5%j(+Q$M9l}Bhh*5h{=3F!T<_al#wCawx5V=&!Dqd@XAG9>Eyt6K6Ypz!3h()jb z*;TL&^t*gpv@=uM73_RNVr?;2$^CH7DQh!mOK)_h8@W2WFxz0ga#p71>$Xu_Q~!BK z$=3REW=(HAhk9*hai+0(7!%X-U#*q=Ul`h2%6iPc)V}}j>|UW6>izA(b~Eb-Ok{Am zS36c_o)4Qr)9t3B#h+Z_+kE{D*T&U*=2V{o=O7FVFA$kS88XYvCAq=t9yV5V7Io+e z()-*OvVz!pTHj60m5p5#xwnb#z7@KAiErF+ZxgBNsZXU z+yiT9wS8V4wvq3)#&_3YuGz()hcCfXwBdEWPp#G65hq{UgnNCPe_`D|ZT}kQiNn>p zg>&1^-HnR_i`jTjbg$gI)1R|HT8Q7>9Q5{~Z$HzRV+{lD4z{;itC-K4MBxY0*7_#- z#^e;3;m~gx`YqSEhQV znwOdb`VF)Px%71WlK5h@E2u;D-;WAyJ#g=gjrrI6Ps{l)#TV*M9IA$Ars2Jou|NA>a>}MVn4){(lSl0D>5px%;aB^Ldocq zC0Y6%s@G{qs!yLi-8$FsK;{8c4|7RyNuc%1bLh9#=T=)BWpdwFIyN@Gsko`A{p*Xe zPYI3(^;ARQP2qj|fS=(X_dfvpUl`h%Q(L`7*c@nzhWUb4!*wE%=vpmNEXLQV2J8)a2_m(zuZGMHs0H1@B zSe4lLLsiueVjHlQd%ve)RpP8y$t>%&w=}ia#j}?QZcmZ z@D7uw8|)5t1#=I6V%g7#OrVTn-JSN$mqhPCMyZ+>-m<2*6~S23H#8+az}Tx>TwBjc zj1m2gYOUUJPwrxgCDK+u7&taMKSB&i&5vrW?3O#i?~IQ_98MkQ>=m%DT=5QZ(sT{d zd(JtILzl+bE4%~yH@Q?etZ*Z{H6!iT|!CZBacVzK2%MSbLKdxNjXMLSK-@!qWRA1OEL;<~s7dm!%a?9BNluF^Gk zq>BH;j$ImAS@cHU_Gk}rRi7jC3#%R5lin3LgnTdhNBuL_W}fFxGCt7*m`$cXQ})+N z%mE+wR=R&O`NumjpYB4)rLB--gR(Z4dR}PpxMs$77O+~YS-|sL+jAGWYhlwWyODK| znqSmf@k>6;n?Cxo|Bcw0Um@oIU1)0thUJIlwSU^H65peJ_(*aVs%%uhz{--1H>$OY zH}=h5D>hXvj7!cj=ev{6*~?7%Kpp*aX}|cP#C3T+XKjqzy?=- zJFilYaSqqMioYQ}<+Kai8Gn3DV!yl7*=g!{dn9%a!iA*^OZ3-J<^ZfSYx8#r4;LLr zpQyGpPU3Z}`Mf{6zY-ViQq#ff0DFcu|0hjq&G_nM^q!n4c2_Uhw^jHLWy?_L?yaZ~ z*D=O(oC`!&GltK4vI?uUWi*&yv82Yb1Qqh zuc+ov(H?GB_@mtQ63|s+?j#j&@9(sj8P7B}$u8H{&omT1LeCD~5xk5mE&ps+zYu=@8+!hr;xG&7# zsmiHdc*b^a%`iT%=2y;e2jF}{r$21nb}{)B{W6GA9FW*~z73wm#M_>trLMqz)jrg@ zf%Pj7OirrO_dX;w^J_u{cb(^17c0yb`r{3yw@rL_Kyiu4TTqhVtm?j}M$}P|u4u>h zLG8NMDYv@H4!i?*y)IP~vJO3o`n#Nmayj0Y^H9qEcg7~KNs2g|!ZH1~Xre~hnX>7lI-ZKdssC9cgs_RY=_`8FH!?a<^f zwBHt|W^nf@^)WGxqYmKc)==Y>u%HJi{6Z>??r*G%m89f`hzcbG~yJ&0UH>Ua>HstN> zZ_XmrcIIoCyRG-H*4Y0sHOMd52%pw~J{KelOzd=OG(lnlqz7UZYI;^{+94j|%nK^H zwrRi~vGa)vUSco`=)39O^YQV8rjELqV`Fy_`u+8}-RW9Pp-n{_3+j|Ki9JT_qk%Xp z#)X*oT$53K{oKzmRO0f?`S(jPkDfY?cRf8`WArtBMzOol=cv|{tBp;+_dmznWEI2A z7A-#W0j=5#rWW;My?=qoxAQ^s?5E@Npx==D*Q4rGs)N?KP5jUI(Ax4c8mW@`Lj=2Y)qQh3eyK_U9$wQu!u%5L1^Z}D|q z*6~G)ZIUVUkTYRz@I$e}3FLl`#*9(=t=B_Ft-+jb9WzmD6*H-GR2}<1*oPnaADMXL zion*T&q4fwynjFBQe*BBQL_<`ta(!*BoEYW>2{H&?bH$qqBm!0Sx)^hmX z*kUK{ugvwM-F0VihVjwb6?Tg*_zAyza;om4Z+3*d?{K_tz0X~L?m@g?6#%}QR8Us1sV zY7X3NgzflxnSZCR`gXpxk@=GfQ{{ar$1a7wpl{B+UcKNSD)~mt1j-QlP^ZSH z8rwsys}S}Du6xenv0UICCbk^?_r`3asoxj~`$1>`=Xptfr0_M*nfi`@XTCtKRh;4R zqMeyF4>-)HfOj^5zb0j-n;!hF&VLL}6l3-J9jE!z3=jHMRVLojBHzMbt1ikdl9&(A zWP5V7

ux^u(|j)}@}EL_?W_bB1TGf>OH)>W-(120Hm|H;K}O66_4*jj-5z z)p)Omcv1W~!UgZ{|yu?Y`j-GgKYsyh&i@=1O^rNhXm?@H2Y+c&+U4H0Kvo9hNh4 zxw1x-9Raqb$mO2`>=e-PuD^W{1=2U*f*8GY4TD%|&@i~K+_G?|N5>3pAC|1^QucB% zO5CqN;*#WXl=r`d$!y?5e15#^6|zKd?~?`I=M3Hm%u7yIJ*ie89XQZ83extK6Mr;M*|E|%}!6JMWT&nfo42YMTQuV=bMFzz9y1_cNPp(v&X zDbb3l@dTO-7sJcL{wPCd?d#G|mIRZ=iX;Lwu##@)tCQz9_Y3|M| zhVe{k(UNj%iFjW7gU#KUY?b6#b8<`8-ZfNQ>U;y24ri`830|n;{$D~O;jG_fvx2nb zT0xR6v)=`>vcx|P8BtNG4@4#7MSuz+F0-k-x}z92G-<6hw)52Z=UN zdQADjA?UMoXbFAH1SF}s>|T}(Uf&YaL=foIKV9dd!aaCb0&@aBr{H5?&IsQ@;s;U* zEa-EJKC(WNJnD^PwOhg7eC#dAFY`~~f}s~?h@KmfFBQK6x%rTT3y;HiK`suzsa{^} zx?5D&vb><$sVPDSrGDl54kjHEVLu;&ze?}6S_ z@(_!A>&^S(AQbpHh2Ps?eT3gv^PPd8?=|Utck!|ro_)~vVQJd}cJ5mOjA4qDoUVG; zszlhD9Ck4emkHB#hYoN;X_Fvq&?y_NlM;$F&f=GwxS*s?8?LuBsnaewpN0^oUn>ax zpgTa-W|+N?03Z$G$&~09%@x4LvlDF}uDl>FDNCwOd1K6R-X*ss3so^*P;0AW&R6*o zMxBU?U#dAjff;IzPa^H^;}2s}DBI;kxc7D|0=mRvFdQB?Kf#SXQ*GyFxsB4!J-#@$ zb9<(i9-8}gMVoV$c0K_%oHEHzqn?hJA`e1I**^i3=9bs2u)z zye&B#hS_#9>?M8{M8nSQ;QP?ACUwd&zKIok zmF`9AtI2XJ)}xYza{LM2OZcLf*S$vgihX40gu8scLMp=F(CFO4|G1aemJ|$#+;%Fr z*~`nwZFnWcF(lw~3O+JE%J3|IJnWlwaGzQ^0yYn2^q7LZ^0NFL_!D5Nt3Dz+Fptdp zzK!E1Wj}MtuCm7I@z=my!)R$iaeOjubkR8VqRQ%j9~h$>FYWJ`RZc`!3%hj6E`JD4 zNLlR%c`BVZ1$<7y$NX&ytTf&j711Cc0*R9j$#Z0Hdt-bKhq1mZ6I^o#&2yXPu%C>EJ)Lv zg5K9pg5KZ452dDeTq#`m+XgI3rP_`ye}Hwn>0!pIV)+i*7?+j*rRm;8HX-+vX3p$I zHJQCwnp=~HfkA2BruJ*ktrZ#qn-B9Evln@q+H%DCoRSLC98OtIaLqC1mJ~SO84e1` zw8qz%$w+OBStCWxjN&tB>z2pkVtZo zKFcC9a8Gx#iT6t;arz?lo-;6%dgTu;uDz-tm6J}Vfj7spN=;d=_u~L+khdK9A zN7@rOYqPXS1kK6js;lp>6WOop5^!KtP4mU=_yzqO2 z@HLpDQ|N_RLq1TF!I~N7*hfTj{08>(Vr5~T3=T|=*vDbv@#vZXYdklH(;~F|MUCKT z;&m<#eM#>jA#kzf1~7Cuw%S3H$vT2X-2g11A;jafxZ5uV!ha3f1%4I!+737V3PLiB z%G}wMV54w8r@_Xj{X~BUNSqY+Vl3g#Tr%a;b;O6vFW;5wKVg1OnI9{#W-JwETrm7r zTPn{f_w(=*uE3)99dQ*AN+k^BIgZNO>fJl&ON>z1pHuc%wP6&uU;w= zeIK@@Ijw-tDfr0xs^Ij?(y&Ru=Nx?2+dR5=XH!-Q7x+1aUtLZbhr50d9yBU`cWFOz zcxJ1#eYm9bTKnZC?wQLfC+*y~=P-u5pyYJbYfPQRE6=6LYaM>U+oU^`b|4b}+z>*~ka|fMe^sDS1cy6U>>F5+#TecXR(B zq{nbFx8XVU81lzm0gvJH$v$1O%%s9w#w_p97Ay>$71%EuL57WIC)z$-lI3C{a%{Okd$3CORO`7bQW*HI6b1q;GlhY( zDTWs<2K*5$M|4J1!+0au>l^rPgvH)nlOM~DPNG9fzN;&<`wvmfLB<&#fQxR4uj zsU&|0oRj2i`7XKEAOzCdCDq^1q4iXMM*fJsAl@*6KjweY$)oWnt{c#R1gRXrn)CbS z`PA}PQj~9La^9*`S}-)8v%oAvDbN$P2SnK6Akad~)9+=)Mi4zp8+_eTkZ&%9xg^5+ zDzOL`ONoCP4iy%80ycKQlX0GYBy`+R?B;nMcwl_9Zkx^OW3PtW#-7Zv+Xl}Y+%`OF zjQyGR9&jZ#hM|KK8-wjK(k$7D2H|#` z1mTwf>`512T`^DpqTwId{!(>JcXv2SP20O!HYwh1km-VGUP|w_wqpFKg1IH{_P>op z3Ie(Ns9H631C39TEZ_Ldy#;h{T%&<*taLnR&S^z)bns{IDvuIcb8bhqS^*B2vs%Hr z=T)l}SUep|`;VzH?>h|hN`vG-Az-tvnNy-}Lphq%2-JByIeO|;L;P*qD$@kT@LR}n z6bS-$QZ?(rv(wYjC@9f<#xw84S!0e-n$5(V4QebY@Cy5OROG38c`UM%o&~jh3nOoS%la(t4tq*r5`}Uy@j1!+s9-h5BsAmG~t?V zFvRj#{f#1vc6Y<rE;Oq-Ll;ycnz$^;dODZY>biFppT+D{FWe7djL{xLH^>*o9ux36jW;sp zL+vyRhe7zxK{Cp>D>XI$9Wcd7-bsHBd1pyxiNP!NyO>k44Ent+k|q@bUgzM2DmtAw z6ieQau3gG7S;VmgfN-=NMXK|L{5X0PW>PpStk5YdWb!$^BL8OCd)*&EnES@|o|NB` z!U6i6>N#rm7U7*@$0!A_5C}n$Ysb{$TwEcE&d0~2SVHKAJ|cWAOs0fySqoy=5{&Sa z_@^s}B+Xzm&KW}gkKs}V1H>BCJ#pWV5Tf`gIQZ?T@dldcYECnDQP`seZEA1wp`Ye^ zNs<3Y_;?Y#%WZm;CNu+>l}gPmfn5;yFaq!#o^yVbj zcxM3W>O$&lH1w~<7A1K6X=7WsaNqn)#M3ae+1RKvXSD-MJQhUGR$4QRvxp&1xGW3;bbd9r?BZBOn%j%%yAj}5- z#*Of$S5k^d1$|D@ zN7hG@cayCD+c0Hj&0KLG)>@Df_u+HmJ|u?wNv}6R6B97kDM;f9JuzeJaWVeU{}pq( z(xbHS@t*uzu7C6eimAmfb(h3nG&o zqJ>W6ODhObLEC11QxQKl(V;jV<-I{FHGqP?w$V3L`uqmyP38ym#mP{Xe-rpQh2J)q z-*gG;e}%~3l*xi5o-F{>49`Aj`!Fww$7t4eLxmSZg3Yci5A`gTM`^4OT(=UYD&~mK z*)gdJE-3KK5>)2#ba%7CMjRG?;1~WzUL;xA)Z|tiLiM$nYbZ-T8M06a+RB)IGHFcH z`*LK^+)`6jHf`mTO*2?e7%Z>BQk&PV8LSELaA|8%Fh#+1s$kXuo?-IN9dRs@@hvy! zo2yP%swL&~Y%Vu!6g$q@+bM_HLC$v&55qz{JHq*#a=vd=A(ehGGCpm|s1?rFXh^rf z`PkotP8?*Ez4hjO38@I{bISVOu0kqB8fWnWvLBbmujD`(AQ65gj80bG*0@n zHJ%$MkX0tlrRiW!7Lf;`6u$_sbjmC1c2IEgi7I96L`{#uee-j+ijP}BZAqPrNLr_omMx%+q%9u5Dh9ED&nfuG_z1p!=I49jjWH5cyfId>I8KH^ z+-o(BDOR|L(JP zJfkTrlkv(=?+gzq`A`Bo4RU2fjs|OHP-ooUSjzisl`UN>TA33hQ&q`o03z z$10{`Zxr{2el*CNdcD7bBh2vZgSHQs6fL$8DZ!#`Ph#Zwp!o~N1E&9I&M{fT?OSqQ zHEJ1SuCc3B59aiDSF6?93^+`chAfz1JX7PEh4go)qhqoC-OUeMOn-OK)s&U4v|W#f z2H0M`)HpBoRJVtph18}7iOksMln04Gn`>^Qnna*&uHd44;dLMe;CoX{a*^RqWjMjd zYN))I_HCn2I*5!cf_*96(IB5e8&M3e~K=Brk?oFert9AsQ#~C)tK1zq)|v z?MSwvA)T7)t@K|YiHxD=A{>ONU+g{p9G=a(Y|d%4T!RIw&TYV)rJ)GaY+eBxiC$w$ zEKq$qNUyX3(>b>RGpjdVbWy4wgV91^jpm#|5&9d4VXw*lewkN*!!ui@?St6grw19| zz5eipU_Yn*eGd4ZXmkGv^e5X*Qa{fRgC@~`w}z@`C%S$tmFqdVX@bLJ6hh)tbbNwe>J95fch5 zQ$p7QJ*U1O#&4iQs<3C*7(h10a3|XBCWA(4{5%`tU!d55_$g`mVZ5N$CIU94HBrnf z&la%JM(SGLQF2~(jL18K1b%*28USWW{L@e_O3WEJG2@(4m#Yhq^X0oz^e3FpDd%J1 z6`{8q#IuXBjDcdhA18Fh)&B+ic!lzyZvr&pA{YJ8@_2y4fqqEr?H%+b!AIDnQ#N@N z9E{T<6!S#T=M;VQ0;p&Uu_evw1bj}xH<6U{vUFe)@Hqz`LnCoIx_4*uB`MAaE#SQw zGmgwbIG!H8YYaH!ou>z!HNIg^#_aPK4#6)zr(=eKmsvS+xa$YuL8Ib#fzX__tMR!S zf7fmCpU!>$D1^d*%aW5-?^@xnG+{cT0>2S+*XD0t+z~z~V%Vt|?!rOMY{ZOfq=*F~ z=yQrbN@3<$>~rNaMCJ-V8irXu04Qg(6`$wGoHp`O&xy?8_t#1vqD`7}f#G}@E+{hh zNhpjAkMu`Uk0NlJ54S4xVY2lX1U>p)2)#57z700_JaIY?r)}(}nPO7z9z%21!s%4W zg4#u70WJt`zYl<+#tGdUl4N%fZu_HRFB}$8-^Ws;@8e5mt5LRauo<3x(DvbyvZ?Kt zm-rF3ni@Dj8Arie97>vj z=zLCfKBhpE)rAKTy<6hu6ZkoW-$THUBuAcsRDTHeoMMmWE=eB58z#$u3XU6QG{jfLJh2Q}va!sahfT``Ahn8kSj4FZL30x0J7S1D zw+jep^WjekWwjuo3_(xtG*1#^F&=4rP$hh!%_zq}kG8K&(~-ao=dppXQHVjZwTh52LF_%P}9;j91|M zbi7hd&BEruHQl+{q}Y3{l@xpU%Oeh7zWwz%NcSTfCkzj~Q9gUML+k(L0G zEJ{oG9#|P!QNIX!v+0RsRm3jY7Y3*5KgHZ6UF7-RHd}vg2f4ou9iy9$dQE-6u2+8J z6tA7@YZ}))n3SzlToP~LK<2fZqcY5@2K;`CoADXd0dSlnb%5`^D)#(GpehrOKaVvF zf+(X3z^4SK#vj31s{kF3JF5MhTng_rf_}o)3EqD`u|H?kg2^U0XA=8IP}F)p6puC8 z+l`i22khVs4RKD@WIbGtb7-cF{jNPKh7Txf~I9x zua>fRHGL_ro@TQ(H@2BMa<*S@pom=IkHwwe!#+mwgHo1LTNRvRE zO0|5u3SS2OUKUC3J7Jv887IRbQ5r{iI0(9FWVj)DBcZDCr@&7+CugbI&i{ltd8{8t zkHSoPq6loA!j|Q*j68IMaK|4Fifxv}hL4K(VZ2X47smVb@)wElCKI}l?+Dl^@lQi> zps$_!q8ad?083}?5B~;?db;EGN4+qE!WriDQcfzIbQuZi3~fOf2$3ZY#6N?1J*6go z1^^>x%fdJ*LJt(3MckGlI5wW0X!~$UPD=abB~H>!F(SUNO~3f_Vx-_^Taa^S3Vp;I z>%qR-i>3dVfwuS+?H%5F#@p9`J3?>N^96bWy*i{~C;=y4HCo|%ToQwZogefhoI*lC zx;TqOFS*36Tc6}XK(D| z!k3c;4wsq@4rbx;jQ$87ZF;v+q4<(Cu@DyOl!ew6iuvw62@4DMoMMkF`B8kwVG#ME zJPP`pqHiBE_g^yT+x0U)3bu1U-;R=gG1wj^LD=NIzKg@n@a%)O4@(=f>)f{l7{ljK za=Pj@77gH)vlIG8VeNOT!T;nEqD zMVTL)IEpwF#i3|!G~RL!9E#+8{wRnNF-SxubgB|EPnEfXOi#^{!RuQhdj)~c5lCO) z-a#ITMJ(WR3O@P*2|m<>-W5l*fX_MjjOI5;{6H#_1$|D@N6n9>&CyzY8(+k+MEv4Xsky$K1to-ifQl!QH%{J(1_QsF20Klu5ijEqGd%mC?ZYKGvn{_nE#_PW>X@&BXo| z_&J3il~BTOh=yR1FU>^+er>~VO7PY#!O~qcS(@zyN~7f-SulrZwo2QFOVSwammh14 zP^@|LU>Mw(?k8%hwK89u?6-8@C1kEbF%^3zYW@%o+gHi_Ty5vfCpF!_@!;XlUB9K4 zMDicw_tGsi%6o%U%KC&Qw#^c!3hCbfy~$L7zBn1m;;I5ar|{cGG{*SEVI>1OU0S+Juq2^Zvf9(|IRTA~F+nG!87*g<$>3B$ogngo46FY>0=^Wszo zl`h7o#imT0apOZB^US3N>@mkE&2|YKNZ)`BMUwY}k@2WAGENmz<4-a%Km!tF zi83+fW?!@zPeelHTW{W%fR3;}rw07nRX#6^X$lYbIbE4G?_<^#=e++tK4Pq5PDx#) zaTdQSdZHnU^w2Y8z@}wAQ3I~@gP7C6NuSVd5SF1R@{jMmPZS4v)?#4RZCCj;&% zobn))l2?(^PNj6+zcDTX3GoQ_oMR7CSD|_1W@D|ZtcwBah|pcwa?@X`OcM0EyVnS~ zEkkc?JUh|$;mYKgnFK3!{qo9|A(!m9*WH#B7>cBIDrwp4&Pdwg@vGul5%4($9~mE3 zg;eiE>7a`e*Bvf_Mn_-m45WWWR6V0=h<{~4K9xHF7&+b!n(5>LX0r~xyN2G_cy^-g z!;+|a_|eaULysK7R<@hVqpK?S6+D)lqo?+oDosyqJj1|+Hie^}c~%vXcJMKi9B+M| zFS)FJ%y`2yIQORNTK+cZ%(95OAYbAd_R?I1a+YN$KZsMKAbT)IFWD6 zGCcCxzlA%3*Q*%pOWMBx*C}whzQ%MTyw5^H%{qZZcAHyuX=Hb4oJ07{rBY+e%?~FD zD%p+M!h+3gga;6^pKWt?gMg2ex7R>Y3afC)g52K|&6M91*(DA7(|g z6ZQQflyc=&r9qO?C?%L+c$x~z1+ghTKta2fdVu~Om@sXdyqETEGjPVrj9rgMsRjTI zo`>Keuhj|uM%<4_{ze{p#^B+!u2|`fi}d-h4Ja8ynnlBYl=_1^zlf)kwl)#C$ZmLJ zs;L-;So|XJCelXRIi9Ypl=b}PO*Q7+@-1spsm`kMys1XyB}^?(J>h5B_~$8Ei<)jO zGti#5n!ljdCi^E_ve<*3iFaxWC#!d=lJnBo0avz|S)VPe-8wSA3>=!4Ja7UH{Ks1x z*o0aBIb5z;!+O(RCSt%0Z6B5-y8=H}7$mRw!i?!pq6H3_;_q%I-26-ng3cy~=E=&tQ@e2X&!FB~Z1Z1eW|^R!v`cdt|Ng+bD_e;}2tudCAGD zXFU|0tJ|$~x2YDPUszIc0XN33)NiQA zY5a+A8Z;n5mdFU6o5#?Cl2>;N**oY<8L99+r+lwYX+ZOaEoo*b;JXy?A(`uC>60Yj za}GWlv~fDRcW3iusUS59o^-}EWWc6n&mLD|F-0hYQIT*_at|6d-7QB}2O@KvkE^&n zJ-YuGbFzuNxFdiSe(987c9G9Qk|+HrXj(~9oPi*YSjY=YPWUv0GgGKCKi)L44{^!J z`Xh@Ip*c<7$2KhaiurLPKH5a8;9U$WML^P*F5S#WkN5!Gd(+}}J z2BrHWDftsnI|Vg^Gla0|?-}h<2c1N;#HB$SiA#eBC<&P0WO`BQI28wlb8;sdgnx`x z24~@Sk6+H=nXS>*%04tgL+EA)bm&*HO6((=BHufJ|}jz4`}PQ`S{KArEkus;)nt?n{lRxztnS;IZm zRIFF32TC&ng+e;2_s52bn(W@ND9?CRxJM6~*I2m6)6^g3`C#C8lxFU!6+9i={Wt`% z4k+gyCLEK?(pQChCHK={v82G08G{9%hs6i*`Pg5_QO5R|`+V<7y+=CQoY`cr-Myg78A?>z@|cr}+=hFTSUmFP%kvduM>? zsxr-&uCw^=C{~Apd9@+FzphGeGUzw8*3jpnhEWxP_1K(>5`{i3>$@-WY%WVjJ#S(4=&pLvM_eX3#s4RaPQ&{v=uz#!E8B0H*vIWRZp zbWL3MysB&BLIwJIWsf7JPd|%2eg=X5_I0(#*OU?B9 z^*GP+rqXb;V9W~iZ!-G_!(izLm{aZV?`6sG@kX%MPlrG`J?s2LjlUA%bgGuM+Xd6r zF?1~ZjX0)GA_6pj8_=YFupRh?&#d*y52B4FdBUKMndBV+8*KI@i`Wo^-3NFCJLT5$^;8vc{0}Vi+G@;`1>FNbIQX14!ycrQ>qxt7!!O&rsR~fy-SL z>l%R!&d0m{_CXX#k(bEewq@{CB<4d{9yC7CFX}~!#0dD>2H#Y5HZv(0iRli*BJcaD z6lX7X@ii&Vrsmk}@}^IEj>~(pwSYG_hFuqD2mM|aNpodkoz7V&b3|jmzZVU|+^luZ z;+d)FA`3E2n1yYv^fnGJ%yf$;~b3 z##FyC*GsNxo>!(iaWuzNpNKF{vRe?sMiuc+HKi*g@B=W2lJCW@!9bt2(Kq=94$o}K z-R)@3db1EWIL9gS$cqJN?01Nl$RYGr=0Xn_V_}{lU17|Rqeo#Topj9wUT(M0TxaCz z-0s|ctLm^!k;W1d6zn-wEj6riO2bjFCmo!PfR_%=R?j&u>pGi~cW$=#6+jRFP0Ojq zdPK>EtgnQc*R@Y_A&m{tsq=Z7iyJ)9@m8ayQfe3x&yoxIUst(ge$bO}j>vAOvYQ@t zVoSp6}k1n6O~aDfYex zdXwaP#T|(W3-+91k1JI&+b<4-$QPAQ(B~9=Y?wom_t9L0*2iStsm61Y$7fV-jiZq2 z3iE`?vAcPZg?=1n8=Kv&*~N<(4|&xbj*Vw0+CI!{>ma@INaXvLNMp=PPFKCf^vcsv z>*u(yOYFxexfx^51ZFd45?=v?$yT=>k2!0NYG=Z&UE+N_9fkT(3y#jo;bb0mYuesX zaB){-Wi|=+={7q@NwBkRcBZPe?pF!kNsi^JUlgCCp|4opHO^XgcvA`Z3;3@5abAS+ zhFueGV<*bOLw_*nCWAmiev3n-g#2n)tEobOI^>5%tWA0iMUvz=RJ5X&WE3G~qF_{x z8sxROzAJJax4Ao#zbn)-<`tnZI|hj# zNS7u-pHuWv>0|egD7AV0;^+f07KlM{^nspsJmu(Pifh#G|5ig^*oBvZGSGu-q3PhU zqgoaNPv$I(p**jRWijR~Qz`3Q;Yw&;n%Pv@&Vplii;CC1fp{HLWmCV1cQdh=7sxe1 z)yt}gdJ293C7Jk{+8fWUh-x8Io01zRrZWF<^X{wnBx_9Y=TviK-VWK{5S@)9UwR}8 z{Mv@!RJIIz8&jDZ<-I{Ftr!G-ZKH3>e0c-(Ci4UO;$--$Bx`{d(A=d=%FvNDq1EabW*9s+8r!oh4}F#t8fmQ!V$P<#p2KWLnvGYd+3@mC3GTYJHkxk+k#J5C z+)f2It!9#Zn7p$kQk%EANNox@Gg?mZVp|6a(t{XFVu;BioX;ue`v!DIlDr>`jI%~k ztA+Eq;(YG`c*L9kaFi5&ca(?OCZf({hDQCzqjWF?4J5mtNNA*);w^GObB{iDwhUkxEUrwhb3O;u^fL= zy*KlRK_VUM1kO(3{O^F?BzYc$Ql}@_bBaAC%#!4B5s3Rxu;(0mRMNY@h}H7;k}N77 zGxjoT$Sgd4aYfCEz2IJ$lfJm_d2OUGu4~3y)NM3!))U>b)p_GE-s#59+cq^>vG*c= z3)7U9wOC8e%MPENo+rk_qQ$lz;fXv;>yfoHw;u8EMKi5OsyIxkK@=*4Pq!PnskB{Z zZ?@gYH^+AM3WKFT!W>GeVw=y#TGQvbojZtAswsd@<=3{_&K)#89h6!?F$oHbR=e=Q<*XCl_zF~)vP z8VTS?0#Kv8a@n%1FI~m8%6GS<#)^c%m6B{7Lx87L_xSA`p4nPla(aQ~1jZEb z7+gulSVjC)ibtD3hMgmvO(vrsi{go!kj3<2r2U=#AnEUmJ}CO2QzzmNA>c{! zVz4hch=M(**kjcmZIL2QKL^<_wun=?JJ%7dW_n%Y3K_klN~-Oc1chg}GvC4|Mln z*q4~GQZE2aRic|FevE9u1Y_O`%MvqI9>`OR@RcW%BAi$?rZW$@rJ79VQiHY^i5cS) zjT`R=b7Z=MjLP&bXOeV8EMO`TY05JsAhdduiWx`lO0QzOC^mp+L}p1QGqS z752#*ESleG77hDR>JK)55l?3`7bO@75?zpYHf1Q{)2^&#bX9_ZUj`0&;|Ie$_Vb6` zGzwNKR#`JgCNvra7mp^kjKjYSFBe^zX+P%DRN_clZb#Bw=TQr``~$#_OrkjSC3?6d z+|sxXjkD6jm50t|=I&D`SpGt`cV|mlehT!QTHs%)f`@55lB6BW1jbaUIS56uUPy^n ztd|!-Uy`_=j-=DJusx@2?-P~8&3C12MWE*tdMq6v$@8FZ;w|DZ6eAbh$c~otWNB#7 zsgnA6ei&>tE&qLie2G=-$EkeYG-NpVn{0`|Ou2w+yky~ka)ZxhW(%Eua6+l%Aj}5- z$~nSy2{ zZ?5q*7BoY+c|7K<1Gs1>I0~B@hrEbm%<$}kwhtHTgl*tXM;8nwP3YUvN;+#vW2`ER9`pN*LryQG z`?bc0X-1&#;}2tudCAGDS1r%OC%0Q^3syN7t+#N-p~!FL&!$5W!{g?x4n+_MZ!J$- zq+-gU$j@)PGw~gObQY&<6*g-ii$fgO;shRgI%XN+Z^mo~z&L{uJvSY@c8GiUhGlbz z6TiGHNZFRM_!IC663ykQ&s!4_6V7=$7}J5%#;J^_fkTo9@rFs*mZS*@#ekRFQ8^Ov zq?O`iCQTT=mt=($#v77L7_fp~+dAV{;Z_9eqs)Cp+&Ut3oeN!-Paa0Y%nzbOJUaqF zrvT(~7BG-i_fa0^d6Wz{!YoU&eB(1OOOI{ov0XXEG!UY6-8T@ACH^`SPN0&ns~eZP zE;CNSI1AZhn~tq$m_nWG#iCGx7`Qx=S7zwYx)YLdYATd@HVj0bi#&HK&yQ+P17AvC z1ba@gS9@_DCE4z5*~=J086M545{6n($GiUaK@>;=xZt&Iynci@#4w8Dhmg_~)JQ0M zQ9M5azP7syIk~rGEIVv(p;1}^n(!1 z}hC~WPNd3yxK1Y;`*kL71uX(H#=%&4m6om z=1wUNJaZ$8U#VQ*qfrzDtW0GxZmsrlty<3Oe!+~=`~zr_w8)`@7Jf7gvtXlYoU)UD z8bF@ZNU1hT=M-}t&Gnp@RK64mkiboee_B1;lBn#Q!uYFDC~tC>Ptt5L5nTA~rEk|1HofKAIh-p`G7(~9Pe1blw z=wo5&^fExwsTeook|!g$UWkhPFUheG-%AqY5cJJmhouEaGo>#*e1oL#55g{!teX}9 zzh|xrHlCem`*7tuCXN@;&;uHtqb8-szP|Bxim|8S~tYmj$Z5Y z;%sFde_QEj)0}}{3WPjEmey3=(+8kAwIQsJX5w$+h!#h*OGh+?vOhw%8*#^oQR37n zVQM~&5@z~k$>8-ZQ40lu&JoDwG+kES<=vpEJMk-c-3-q@X!|fvCtRa?Vlu1opgCuP z0|%M9Exa@J&YE*OsxI0%;O0#==6;IDW0+U? zW0ZQpbI_b)vWAZ>Ik!5Ks&&OuJy>U%A$|y6(MO5kFW{q?9F7mv*q&wSKJRqB@$IU+ zHt%=*7G|O=oES#QdD-E!(>oP2aD`?0JiZY_Pb}A0cPi%ob95@^;b-o&-GOdNl8mWq z;(hvxG+APqCljarLFA)zSkT+Z3qMY~Agx6lPZa|>`&)eE@XXfk=TufZHJ4PadX4Y| zg-(a3R&!T7t>9_NZkxQXlI+^fiL1+N{=T4et_|P~hPK)}$Rlxao69S<4EVYowH*!2 zw^8lHz%s#y{vmfIt3kl$RFSN~H%O9HI(-TFoPv+3thF6&%Ql;Wds3`v#E=n3noidH zRxFJ%FF9>V@iU4!ttkvg%HFJRd%A{XLCW51usf-==6j1DKLzw1_*r)l^}0zK4*S{Tv`F@&ZR8ph`S!h6es;zK$fngyBq{M% zC7(>J9lv5TTC8JK*-R81sI)TKCzw&+Jj%+24{b7P$cEQunO+<++3Lar;NUf8O5jSJo+)wl5_u{-c>oWfX0WyLWJMh> z`;7T99B-W*#QwNB7}&-w0O-%O?DQrfJEdg2g*Xmb+c0_OuGGko;F3ULq6efz%Lx=Y z5)~On?B+v1&G(Wb|Lgc_s=NfV#-HSmfd-T=OBB*^T_ebJxNh9vhM_+U`vulO&0m8O zF&kN2cvdbGBB5|-evutjRxX~*$;wrp*G5)ur3>B07weX@a=q)Cl{+EKJ8cT{ud8yt zF#i{!qY_RB@h~jJWD}Fksmb;YSYsr4KNuNj73G!)au9)ogjq5{?y}sP?Tks@iDjq$ zE_BIRAuhED#G(RaAnHl4`a1SvH0}Ehtrp z%T9e1gxXD#-9fm~-^-FXq$W9O(2VhAq<(3%K64!uJxe?hj^Dt39*>;zx8A%jK7X=J zKy^$rkwe(1r2}X(>70Cq)&Nsp*SD*XQ&ra0)UiTXsJQ~pS?IEqbCHEc=}U#*8-#f` z83aure4f*MzX0x!+jqjyUYqcmJzu~gv_=>J0GAw1~T+{tgp0{nv zv{!OLviqmO_i!>QO#>8V`^EEyIS=Pur_o3$zbAAxVNbryZ%LVeeYlpcO?3H?*(mV*I4U}NdsjH9$gtUOWyF)+UYifcb z`4S+{#ZdXKUlOzw5W+!PEGt0&_=*v?TmYk zfD?xds3Sh@R{Vj-YiDdp@$1E;vBXo%?TJleW+EgG_E%%d7hSKNfda5b+xTw%F3(PM z{d`ILigoT=0$kTvp3MuR#{@ntWXr;Yu%oh#@uU?VNLz&=x%_cngmLh>nTVb&OAp#G zl)UUBmcwDRs!@dJIpujQ_&1)t;&HQQPaG{| zA6D;{rIpur=9~!l*VZ0IS^#>8Em^Z>=@19w; zs;SGOa6)sB8xMqV!o_mJKdhDz$a`tuc3h-$!6a&v=(3=Icw5ZP*N(G~btEhZ4Td{x zJCTKH(j6qb9xy1iB$9{Ufqmmz0Os9(j61}5DqBNYl2=IB_QO0 z)W3^EU);`Oh&VMw7-}QiyR#+jJ_UMCq4yPtYD(+ek9&TC*<{tGLb#b0$k@8k&87Jt zF=vP*4~rri?&jTeFa2A1E^4C4>IKSb^!u2fBJ(Zajd9|Gy(BL-(DOq&c!3&F!=+x> z&|$h(uCh~%D`i1$>&IY}ccQH5i(zfJoEX-I4A|5`KR6pEh3BFIfK0$9=VKBCu_v5QIG-!d#|R)5 zM^qedNe4pSh2l|EuE57!L|PniI=Xjf^Hq_%0za3A+F3K0Gc3~ zA8(q#ve>_3|GF|kYR_LcPyIM}AK?&cgp(?uG$#Z>E-0RtvpM0)8u4@FHDs@l6WHcO zn-l&i@)Vi;kg=h#xNa_pP;G*wmfMt^mu4e-VYyl(@}3WE9d&Pi&GP;m*57x?3E;_ zn4WVLvN0=uU3E%2LG7dPG~=AjLq3AfWM9N?l=b7J2xR?vr9qC8ShN*8&$g1za+)mG zNPtfNSeRZBgcz|w8TN3OO_&J5&L&#h* zKMOx`)_@e^ta0Y7A^Ld3$9X0-CBpffaz2)glH|y4mHsw@J*U{C(nlxH{=+aHiO>Zl zMCdvbx-o8cHVeu9VbDt+h54tE)-apdAgk9IP|_o%mb#jAK@CDa30F45a(AS7*k~QX z@0{_wx}z5rJ@K!IrsrJKqp&@UhM6BkiF8L206GOAS2JNFkM5&9%=0K2ZiHEuWckKt zUTF#szk)-}@a%)O4@xyJrf9PnO-dsq8jq!r=b+|9$Ks0e7?akV+p$ubIS#maQ;j*d zkg!Uq>a4DNp3+oE*X;`>=AL?j9UoI;?#D2%*fjtj@ar|_n5^MrOU|o!@0j0>U8Q=k zu6ZM>+jvE*(#(~50UtHye3geO6Dr0dhc_qT-!nznC$4|;wrvS%av;3Mg+Fp?vfvOHiE~mIO6!SKLr3#tOVjPL z#Aj%AV~rg!K^pvZls5B~C-{ydNb~$nsF;T|XSbFbAHe1^PiME@RNCegqT8WY=NIxL zzd5%1J)Y4IFz3%t4#I5UKi$<~wMnJ$@^e`=NIyprR5J=6e-nQy6+R4)o3ko>AOYT5*6q#lPF(0C zg%1?63SS2rnN#dBm6+Je17C_jNeEnuah+ey=d6l7(ID{}jS#%&bR%TRvBx4%lDeA@ z{WRZ8iu_gVnaBO?{YG9=jb^i1xZiVLPFEUEh-+MeyJ8MV*wKQ~@c}-c96jFkw-2H~ z$~lDtwk>@>GU;ylurfQ4AN``lPXv5zgKupTe9V-gWiWWuUxD*wQtoOzhbC&8)xe4K zE~h_*eH1NzzQ2+Bd48B=!FS=_oqXT*tGp9yh1dQ<*2;p?8@>&>PmGPyLE;BF*MFLY zTx}qWiU{?X2Frc?VT>^^Iaw7W1^SToMWm zjl@K*pmJ2Yi5u^vZZjvK@5HFc{{ZWU=nMM2ERxkvL_>70A(G@p8cR?_u;&ze8Z47~ zUYr*9`o%y5uaP(+cnuk_ne+x$b6Tv6S{&k6U>Q?r5B)d{h7}gg7hor|nmDh6T9~f> z-#CWWbc&YNGlxq@YtTjFC?G;RO5y{2F!SvEejj;=-JsWnpN3jvjaLC6h;c~(tg;D} zhf}zOfbvuZAx~k7aW2S3vjMyrSsnL#gMHKIgVYxI8G_pY`z68e5+LV1hk=Xf{L3Kq zfuD5;QLme%;jo`QPK#te+Rh8V$hYtOEM)Q|OQa*5JhQ|f+(Bk&9$?0b&2>?g&d&qQ z&_?ug%BbPdtpp=|()ecr?oklax|MhjuI_6|^da0ZS~jNYNMj!C(vBD1Kyu6g13OxV9&^liw*z{{eJ~Q7J?LEMtjh0+XRMzRurzl8;mP4a>*TyLh5j|nX{n&D|0U_*B)D~o zTWX6Wc{kmUSVv7v>h$Y=fq^PPVY0uAQE&VD;)uAwqI0nfLdARia_9xFgYW;h9c(ChJ$} zy+p7w@!tT7 zW{*Ags%m|L*H0DM{2(P2tkhUAp7#pY*P$j65=o8~onMwbAzoAQ@sLrN(XxM$f|t@} zC-3jirU^+k3m_kHk&Y>__KxA zx#D$oy?#F#7FjZQeM_V*Z$*)|$`u0HDTiLMVR)E#`&m?Y;D1#9=#0_)!*kB9*x??f z{yyG8cDr|wM`9WaVx5}C^>PHL@V_gO6an9*fNzi_sdRS|@Hqt^wMB|%pJn^f+(gjl z6n)ebnS*`2V7M$6KCkO`yG|PVE6&+q@p*SibFpx;zBn1>p)7kVtj{UyW2QfIX1crn zAWVjrn?i&0I5i$;@$sCb(7Y=tG`OZMrO^DSa_7X+qc9W3DU8!84<*47>I_zC!&g0BvhAUo@=H}8wb zMd0TYes5QDH%)U{@m8?s6nj5Jn)IKi#nI3-5nU9E@Tzo7q(^*|?q+@v%GxiWg_IjC zvfSX*wO<$z^n*A?NJi9C;n7ZcbiFWi9)wctC)jg}y}H=%cyV4f5u-4!Ypo<617a*$ zJjV6nyzKi?#3@680zIj8c2#HkS+F`fCDFEXv$4o|6EB+K*#~VOq@fM?VM$u7dP;M( z*h*I~IWNuSEA>aY9|Nj&Y381hDPz08qcnmM=d2hgf5LpC$F0-qfd#d7_!7`&vLEuH zpXPf>k^h#oQR2m1>Ik%JX-k%emaq33S)TOpA|5S2W19hW-#nK^cERwqdbX}Mb<5X$ zcS|Zo#n5$X=zb6MCdrxg-<0-s*WTtpxSi~Xc!1WNH6ZYX1xnL z*PQQJp-Z~0J7$JW%PC-VxUjcP+TZC9lK#FhLSckX86hKr#^@~`Hygd80UB0d z7=mbkl_PjT2Jl3mq&Fq|S~#Cm&R3fsBe*QtkV@(D}IPPFnbbjWmmf zMX)i5_QMonMsO%NbY*_9`iXeUduiXc>!Oc~cC5yq#Ck!4C5!dCE%e5sbVO`tXPoekZ}{Ty*pdduuGul z)Nl9|_zIbLwwI@2wiEb;znvvX!R*1=Y*k4Z1f3*%M(YJ}z2C;?@NVy?BU#f#*q&3i z_lZj4=DU(8DA02XJtk{Whm4US;}>B!@T0+FI9u%Ei<90KdM~MFmUyiEX6mnF&I^_Y zeG_9A6Io1TS0-{@PnY_6ei(Fr;jg~Y6yXy!5x1wPi3?K`e*|JOr>pzM>%Z`TD|1h> zNCx#@Cb>C0vsKzYTv8#Em8K<(Cr>@WnP72Ln~3?qcnmnlWDWOh$vNZZ7-P&ec9rUZ z(oCULxACV{Y35430Iomge3gf(MTJ$AtONjRwiH(Rd${xjF3M51q%V`bFP6F%%4IZq zA{p@&Y0MjyWeMnP4&q260p8gq;j*O;%BMyxTvX`G811#!^arJ@vvd{xCE*V;+D(lR(kkV+Ig^bgC;#S96Wm{&mc02W4#PCCa79 zcc=25O}&US=2uAveUOPY=#&nfcQ<(>K-y1c*nR|I{6 zKBwp--=oMKJnGLHGYr5;#1FKQh~L5@et#LpFb&}yWJc6^5t9bAU=GBgLrXBXFwFfB z#H3Vd!W#px4BpnkSRTqw!t~R0^L%f6FUgDTEcdtf!^cgY?(4-M)np{vI{HBfjAtqE zyLjyYuiH6WZ8~kQS$XYD^nXE_vme1{;wP*8abAS+hCeFyHvE1Q^0v%{;kB_7Z67Wv zH^P4Tac%^j8;7Tw%8lSrbv^{$qxEg~f?B&;$kXRX-la8pZ2^Tf-ok@$SV#u9*d$JE zl811_kmPZmHTFCd&PP6K+*L|bS-fwaORrZ|LZ&=huUA$N5PQh%l3G#WdrtWteKGU| zzO#{z@;%DnS<_fJpW$?%475k#e8zM=N6p^X!5~#>b8JY$wXvOh)YZ9sovBoog>H=m z0K&%1bmJf+6t4^^(MnbgE0vi6e;5t1kYbdG#UYZ{spQ=U07>$=$g-v`>mqk~?<e#OsbdE3oZSPna5`stG|ci@n3ZxgK>dF&f;D{F+Jn$aiA-5Wpfl}ku64?8=IT%;}D8Kt= zo!<>T)T{MS9`(&hJ@f}So|it&!hI~Gf2SK$okp>ACv#tG0Y!CKJ>|;w~-fqoYv7m!)5U@ zHA#`cBm~qXj20yD+`Na9$pIK1H+ET3bCYO0H=0w6k?1LHkf$)k525vy_@^rkkbKOH zBMtCu5_khf4}Vl1_)_3!uCBNu&5cGdwJd*G;798t-u1T+qCo2J1b=Od;EzmNzaN5W z()xH54tt|qe3886h5NbUe%}H5=xaeO%4@IxywraR^J|;=O}So}073Y5^L`eF!`VgV z$IvgSQ;zY60kayzcquu-wW@Uk4VF>ODa+}NGzuji?o{5Lpx?_PX%H#^cMfpo6m;{U zpXPf>k^eJ9RK&Zz+!DU5c~}YFhIym3UyyD60Y0BMeUZlEUKH-2E2Z)Q<-camX| zcl*h3M}pKBY5*!hYU2Q{gM{vb)Zc?kb6Sw+9~D84dwZz^g{}oT6~{R4_Xhi>Zv=U( z#ArYS4$5{(*(D`fiBs2Ws`)`reB`1>I@KfTCL+o6z%KD3d~dnM?p&L>@&Ou|xFGwv zZU73ITlne!&)(a|NRpoSVed3&jV2+;9rs8fe0Ody+_Ob< zbw^5!KDbxYRWnoEuCBVO>e*caHtSY*(n+8kivNUG0Afj#!kI!4CLk;UgpVa7PNIMG z0Xsy308xPCk3a$l1c71uEExIy-nVMDyQh10KDuglrk{6rs@|^ts($KM&-e4Z(xy&W zU!$y#0UEl%QJ(so)Tavg8U^2;+}(awLW6?6MzP1G)kyN4Y*qZ$g1ttu$DC~D`vR=teQUKA+#H~hWOganm%OjG6hl-@^+LpeRwdV zrcXIeS<`3Vki#=+*GR)-reG-P16Jm%Xc9x)+!d3@8YshHLs8e-qU`TJQZt5GrDlZFGg*5pH5))o*dEF$>WK5VEBNAG(B`m~Iixmg--4VNIp?{V=Z9DacV@->DOAZH?5C;0YG&gGy7AI9?Zbec6x!kcVBE31G9xrfo@XnegiBI+)nN6rh$az zMC3LamSZvu!G}`$E0T#N;5!xY^`j`37D)oWM!{F5KzGCY-QM&P&MQU{!p5-^ZFi@X zlVI_Y!zwyTPJ-HXB8 z#9>-oAF41;oYkP_;b1$X#jtarvzpz?qr~m?eK!qhIgdJR3KSC)>^b%vIsVuw#AG3& zC$=x^gp1H`ROoY+dXp7#H%R<+$4%}`MhA1`>5v!ibzuUg$1;TQyd93ZhdFP6JIUs= zrVqrl7PD6$z23}p_4u;s-)$cuVXi2T^M)~Z4R)Gyb2ixHL<*W}7$(2YCN@qaIWE%xK4et4gFj--;jWSt=ahNTgxOdmCJbzUR zT?BuP;*X^U)Hu6w)DPllrRVl`{D%`+KsnehMeV3;e-mBFslN`;GC6Rit)k$zZrqL~ z|5Qzrhv{ZNmUbk9zPiyj=7hQddV@!*V2}peJ6XEY>j(ZI>&AgM07IoZY4|1f1zyLi zLtkXo=dqwEU@zGiPtEaKW76R1e}&iZC4=bm&q|aXgn;-dXpVA_Fw*IXl&Ga5CoTO> zyCKp>^)~RnSMgag;_lX0@R2H^4zj@}4&|YNh1$3g?4A&yJe0#~ybS)JXC8^eY=; z)d=frRIhv$tdH!c%9R4wM&bGcfRRvi zy)c9qNSx<_zee##=ecoSrs>Y@ohZ$2-|_EHiz}Y5Y6vyDz`2dl;wHp!G!5jYLC9}} zGuYu7U}(EsWo{nKSgx|L$2ZJtYy%X{c`Z#+YKR&B5I)m{#(T&^-yTGXKW$Zm#VDK| zi)KGrxkwB#&p>8Ag3Qlr|pz$zsipUZ(*C}$2)dRX+fG(R>sEq-#mZ$`v>Y=KpL z-y;Kiez{0v-pl_HIwhGz>iJSQ+cdY-N9UHr9)`osVX+6W?O~7aGw3}^`X=By8t&6@ zP3QQhaUOJ2<6f`>X+2=z7u1`hMca7oUh0n;!yYq<{}a5Eg|luj@Dp!k3(0LO(XOBL z-TPbV&j6gGHV;>xK40Q{jA5R>_&!U3oD&E?1aK0-=&!dnwQySiXKrrXt6&54ziybv zs=z$wblFi0QMf%Pz_Gy|K1y}(rGA(l!TU#oQ<>d{A?UkQNLLvLJ@f+t2)7=1t4{QOMt+F<_$!jCYl$Msk`^0}00jJ00HRu`=OoaHa60Hv zp&RvgXBO6;K_=^vg4CY1(Twyd70|Y%6D19q92a3mNM{JX$ftt%xy;?{`>2L6>1*An z@13_~jGG5y5k#sg6rexPI~fDF!f9b~sg}fyIkCW>1Pf%{f4pVq!(vZo`Wa+> zJo6`j^_?2r&P*N<)5QtB)paS{7R9g8+{a%9*P|s8#kXU3;P<6QkW5o5WsDzzlqjuL z(xeW<<9`F+<5yV2Vqbk!H;)@yxIxbK{{HCKSRDXK$ zP@0m99@wZJ_(2GKnjq=6WaJ3+8in5XKyOA@`f(IzNNP;qMlg9Ym+?uCCp$QKV?@bX z)n%VdI@@6|*pjR#a;@s$2gb&=y~(bm;`GBMq!(1Qy>TmePX1=*(2OIn4FNovMNy z*o}emHgUr>6WS1EPn5kTl|A5CrGDrR+-<*`CGH^Y{@f>D_P`rL0_ZjBcEi>K^T2L==a_0NW_{< zL6A0bpwIDO`G%~84%%HhxOC(Ll*Od*)RrJlRWQs~jkS?`7fwWC)!)UMX;&nF;dl^T zj0T)Fw;zhu6?USl#|zp)vkX@(Uf1gygf7d~>CQ&t*7KtAiOg+O=F(PXq0-%8khoqD ziP9$kY!rY@nP$)6?n^Jc=nk`;C<(IrD}!l^MqR6fu45;05jWu3y@uDht+`_?H<*K#ZaU7*-p?B;PIp(&7`ctalaSZbe8<0%Y z&b9HeIggh$WCgz)hjMkRqj?jm%XmhQbaPWjT?fEFWUSCDR=^xdu@fOWE(h zxu~@5^7gvQol1{f!Y6&Pu*VIS{srcQLFlcmKNp+mwB&_JUYNbXfQwRp#H^OqGb{oi z{F31y3qpTdk3lhIK%WJw|17`>n}T12FQU-Q;@5(n7}8cnkm@^g!(mf1^Xry|bear2 zv10^$joL9xN+iis&y{Kb!Cs@-qt?eod+#Kh&)#0`COx;eUz8VDdiNHtL4_crS^rVX!k8Gsg}ke(@%+ed}D#n z$8b98g60=>mKa^8^j!{y-^|xS7zgn8p zIX<$bawxCP!v{;x=#DO^$l{**JL>6+G(#_4(zmWVZKY{KFLj*DEvJ)nei5h8ah40r zZ$5Y{&-rU%PU~FVSh~KfO4Ir&)qcI5<9MsxX+N#(QlqV9{i$~6K~8J9)9GlQs>b}i zKh$b3t0kRd-dc9>B}x^vm~leRvhy^}Z0DwKZCuYCjrsdG)Y3~htDMK%FD>JBmkZ2u zl62WKITNrC9j+Ball#l+!DYOrO_RIx7Jm6pweo`Ix1lhWRfd`U-lrY2umVkS=K@Zx zt^Q}4;=271KVPc?bLG6$a1MM918&5kAo_Xna-d|vT zli$Drm&*3`+0p;;O=A}=YpuTU-b*^i@%LQ%`J2yN_$^&v{`MQ43(M-kmlRBN z=jNB&fT3A0;7fU)YtWab`@i`wdGOXZ3(SE*WgHqX%R8!dAuHG7)%e&}?pQP4pjVkZ z3|zQ}%Qrh0*(m2ydub`hNBjb=J3U8nFCJX5<`qb!H2xIffgNFMXMhPHrU(FxzrZEp z!-0P<>-D3dY5LCB?tOrC;a<3gJO=kf2L~`+j^p|R;EnPZuJV8ZzUwc1LMp`sevQKq zCXe!Zn@J!YXa#+ZqmLxd;!u2{g1ttur%N-rdw;kY^rFdHMH<&qfP;H;A1s|i8N} zk^=|FG%k4QQPrS}anxhaF>4h`$$>NX0`8^hJk&aU98hpN56v}bdy*Wu@532Me$h<_ zZk+B!S^B@ie=ctC#ZH6E4H^N99Bdl%7N%y5x*!p<$?;E@2qY^s!-Q|Z8O!huj!n89 z$K2lRL%)m{x!$I@yh#WMyh22{A;g{r37Y5y{Wve2JBVo zzc5`gH&yTK2`aa?hSuQ{yY-5N2xbG(nIql{+g;1M31`98nTqd@g^n`KX9 z++VkIIKR&az>WEvdPy|s_M>eFVw=GmqZ#nL@R)N&ac(XvlAQo z%ylO|L*ENr5%hw-M$yNjU2@Cq#Eo}?UMlNsffx`AVq+URJd)O+$((HLu_z7G%9vNX zbN4p--g{9f05pUb0G9Zx+sX3}AaE#iU}aCuD_g71!?6=xJ)YjGz^ax;zbutYCY*D$ z@JBgMH5(jP+c_VXtqL%k(W*c>PFY*QmqT5Ly6UJ0_5r!~M0)}rDEJ+CDYrTAFpR2J z0zX)r1C=8YAE!AN;X7OS&dH(ua;fe`X_~D*FWk=HP`I5T12&@}lp5TMG&XpXW2qw( zP7#;3sCuo2ut%3R3%Pm1gT9R|-BzS)ktdBYl*A`5o{tN3Od_~=xt?tzzeA!rlnz%PeLpOb`JGF-N zEVDg*Alt()7kdLlfJJ6QBM0Xs&WY`P2J!%$Pwnicfq0jN<2B0hShq*;^`j`3UMd2< zM!`pWg9+>IYr`mWyW2@LjMs2r($HAPYs_%$PTL(De5kydBh$Pn=f=5bHpatdTT1Xb z8dBD)Cmudq9nex5?uHpj3Th%5fh2^mI#*QyZ{s)8$I{(`)nV=3#m%KrN6r6lE|-R4 zY6eV?nM*@7pZQ#xcaW`3`P~cGS54Cg@fV7}kYdh^ntj!*prXO}sQBa`0gjVth$6ks zwJ;ZjscmY*JU+MUdE~}+#&68QUNN7F#yQ!}EIy$^7e>R>m&Gr|ereQxsg_<1gL{4= z=o9ociat84X^kcB-L)&vUzN0I!C#~JV`3_Gy#bmX2Cg(+68O~(zkPYBRQ-nOW^ zJOtJZJ(A^XIewOHkMxu( z_!BYAGnV4Fcn+F#Ot|iF&Uv}4NP)S=pWApHNyh%@}0S9!4ef^+Sfv&@z=jG1AcqJI58JAWc zy$fhRi5hBXjynU$X8?A?JU+K21x>PG;*Gp$H|zzH*<)}enLYOQdc+5D+s&!h=2%wQ zuLFDd&-nIqzojrfb0viF)u4M;tsnrtS0ty=DyqWy8sdBepRr?DhQGk8StzN%r!j{y z*{QCjX%^&1UB&c~%$~4aj$p5#%ZM{`71MtXpE-Mm#Yr&e1+m-z4AP({13p*zi#Qy! zwZD+lWB88>Y6uv{9_APEQ)v|2IUX+6-mh5m7n=dvl=BJ0dtrNtX{vC>kai4(N~8MV zUSc)K^IrxI$E)+NRf8nvdZzi@j&6}KgDbK+IY+O==sTfO5;zQLZAT&BC*L@ z4D82HRQ^k$Y^VqFd{uEZ6y$B7y*a{9v~SI))6u% z$;+0=l)UM-)O1QxaOeDvZ1<(u$?+l*skCSW6(~o*Vc8;hO3#hw>iTavprjP3CD6ChppRI zxrrz9`EgsfQ{}==hV43gxv*+!&-l=I_hdYo&N?$5A2b=O!TPs&lL?xbjPCB|(r9qf zpa~&?2#lWu>77YvGw?!6RZ(0_m;ZNcNFgr7<^}^l@m4moWGnp{Ky321Si|egaO_Uo z-K^Wfe3#wu3SiWHThx0i;QS@(!mFrH0ROQRNXAvj9nnSOstE0oqW3BpFNb5c)_CCb7%8-M*x&UU8u-y?LG<#19oy!H zTs5)gr2}m4anYMsfxxAfR`7n8!#ROEIA)7~2Q(i~q5bR>&yW}-hVBbvkTjh_OLN$) zjk-dXN9-0y-e^kd%fhG86HHVM8}JZXkwciQgGs8Cj;#aE|azd~08+Iy6wRob@w$PI~S ztjt^3;~VBRQv@-EbLITTY=-lDrXYS)Oof-6K*)}H{C>8qm-;V;n?Wzq(EBER%-77% z!N#!@ZFjR!b`DyYj3F_9dTeT_`ae()vdY8_*G$qF)ph7e&My60=~Jj&C+Hu*qA1# zc@B?{8IG|~x(>(f6c5r1`~{%Wp;KwXdElVFK} zuW|5E()NbZq)DLHDD)U4rrx}}?cR2i%>WsN(jgJ_fOc5W{Nf-a#nL4u=9MHf7Lj`g z5G0AiOezEnAq0C0_NEJy+M4HHK=lO9#pP;W%^i};l(;XMgvJa_!mRy3kZNw#5`N!*yhs-Gk!om@H zBi$gnjl!j^V0)Oj8J1%ECS>+#-U5BPMod$dV~{iaUilh-*B@lk^Ff$pqs;O(Xow_v zm?l$KACkZw?^CPiFGAq103U10sA0bmX2F&HMogZeG#oK_6Q_utefKlV^tbOd2O) z8gKURNZ%1r{u)*O*jku(5Sq>1_Coh|-_86%@4f_9Koc-;39J}8)GmX+0e2zwz$6Y6 ze{&f0J#TZG+eT~=b3KfDzR0%7qtZLvq;qoNdDNA$hJr0^&<}<(kCN!qWUeC>eqDr2oV_c(5TSO z(%Y*)3rvoN?KIZ?zF{r^oa1l**89KaTzXOC@ms68a(?Qf$}#UOz0_`hN?j^2Us`V6 zTWVi;im|?>*PYf)92<257WjM&r=u?1;1_k49Oq*D>$&E9y>&frExnRsj_-NOxp?ud z0`rXvd8gfZ&@s2hxBk{s9p_c0ahnu>@!RTKtuME7%vT>iSb9c3b)(?zb8-3YzoVYM zs1RPfbV=X3?%Xu%+Am-HfOEO!baEW;Ty$8CEX|L852plr0?->ynfTFd%V?ar4?foSJq=TnaJl%qk$_x@0;eWA0okz@Y8 zHyq_SZ**u#Z?u=*c;=bQKfw&er*CewHm?7sLnG$>8*1sLyuFlTeyRP^@YCzx6)nr+=#Tr2_L$fBMtE<~)tIny8t7 z@6(RD{{GH&jrprD-f&uN{l_`xH`))?>z$2Gf%((UORY;c^{456e7o~jd#TknWzNeT zonN^Afp(7LH=cGLJoD1;yuZNwCa;)=?FEO)a?5$9{mk`cjrr4^TkZDc_ursf^3$IN z8Q!0(g2(kU|3bZ|v&{Ov2c7oy{MF?pjd}ZxPhEVy^SYDsxL$he=KEgH3(Vip`ofDB ze)ta=NDePQ?0ian))bU}{pOnwe(kdQI`4?TaiiV(oxHQmAkBteYQL^7{yRFzmz@WW z{*S+HvL2VUR$qAUB~2sgJ(qs|<}(+5OBa~G{YK{}p3)D#q`+OBn_q4}$lG6|@${uU z&$ZKjCdd5W{I~p#KmW}FbM?O0J1zC2wjMBVz4;H{yqIgmxi>nkUu(Vb%$IV^+t)ip z+7}DVmz8?Be6w?r^`@8FOG|IziT@gy!KG0>KgohE++UfWehkO>CgVoMp6{ha%kSqg z4t{nymj5Y^1O6(DUkiF-n}N(2;+isKzy`=J$GmcW$MP<_;MDl9(q!O?YAoPuR5fO; z7ujdmPs1#}{o2qU`hSAQqwG`T1%_?%g=VzXD(1XYspm>N0Ksgdm}NTvXaEXp$Lt0@ zzaMRPz0H-+MZ;v^_UY88EZ>v;(0e$iE@VfpF5@+AJP1+fgGS6!U@HKw8^HUjd?@je zyZ)SbV+DM5gKtdTq&Jq*9pJnE!Y8D@Tj19?{HRCX%iPVrpLWp{*DTsGDzhow*YO%N z9J|wYH>)X{RZvUg-n^EPRt_5e{BWfl3Vm(oe0-wyXp90O>#f4UM^Y+nHkFQrz0tQc zsg$3r4PR+}8+{IbnjHV|We$Bgl%Zz8mxHgopx*2#ZT&h+c-g3rXN(2@HT*+_f!Eti z0$BuZ+0an@J%$X})a>t}048&aw@or8!vY4}{CZ)0(q4c#07KO^Fg_+@A}*o2+r7`- z^*7`Ga61@$4V-k;-9r$5*qj44j-6<`J0XwNz;pFk89%*!@MjPUqC=*`5VWLdxczn@BlMveA$0)katO|k?;XH3Co+hJ4 zX5btdHR5ZRuw~Q;122IzLqy2oBMgl>Ms7AEb4HE$lg&Ux2*aE;qel2VgsSi+%qvOB zs1e47*;+bj&UHyM(k{neYeaJAe4d|xh){J#+RT?G+mJruotF*<@BwW|A-SDOa+4%u zmh-!a+Cg|Lx1YLQmO*+rFHs#OSi?KUjGBe_Eqn=Y?QS}7<8&v=(qF(0H_1NN?YUHU z3vQosEW~0S_^r52G0a6_0KQ~6(ux!uTmuy+FzkQI!2NU`kF%Dw}3vHWga}$ezL*>#x$E&J0>F6 z0MlHTMbP?YvcNfs+-f~?)3s+!oP{EF8;#VlZ4a%A1Qk20f<8fCqv)fnnr@Xa?4fOi zY4Au5n;t=pKZ%rp24Zp$3AIH^Xql(kaC2qE)$%o%I&?sf;_wR3g2ORei%(9UTyLK_ z(<(s1JBp<@998KJOj>OYR3aEs*4?w`~$;L>7w!rbS?L zlz79e7Fo=EeepJgld_& zv8*&B+_X{ShAu@SI_t*+Oh?1V1sFCTKSHruHkl(hMvr@85KY#OyKRKg^G?7pPf+3D z(D-Ah(Y_i{*z&WxyWw5*EuT#MVd^CB>Cum6u8kc_>MG_qTQ-sTu=oSymTB~ssT7c% zY*pfqg1ttu#|mwFLPOsRTu~MTeT|~8>Rxm=UO~nqx~FEp3oMT64B`w0LBtsfA{^TQ zdtK$w759`qHC8Y4ReUgSdYDR6>jfq74dN_Nx?|me@0THO>1&RoG~0&r{k8r+D+x{j zS~a6q(x1USN0cURXxyXXq7oMs%~>-Va#7t$LrG6F1efH<5_zg-=sgQZ61_4zyJ;Y{ ziP$EM+9veM5PWDRaaCM`0=`oLUq6asX+kF8YZQD{6S6_L;_dYM0o*bxSm5hfQ;kuAn`T~2JtWx3&a3dED%EmY-+YZ zm?%yquotecns#>Lc@fV`Q=S**iIerYy)4-EKZdGAiHtOgzL|YWnoEmpnJ)HVLM`}& zr)q)vaFLN^rn?}A?9iRW{x0xlBE!)z^-Yli{nqqM;~S+&fi{W6<%on@5+lC=*B`SX zq!gqkh3IbOe)(ZUUhTmAz#dk{KJ4`qGu~Z%k`szmCSn}Zw(3>P5M4$h# zc(y?ZF*{UK&czf4HqDORaNuXc`GoT|%K3f+a+f6Uc|)nW7VI^Oy{c1u?1s0qAVkMI zH{4&V3U4{xy9NF*G&cne6%5+Td)_hSR1FY}m$B+|YFv}H|EYPsf;Zicj$)4a-h(~w z($ZdWs>YKe^$N@X7LWPW$VB_}D;r`X$^Fvk{qkzbtK&G81%w5AjbiTy;G+x!g`uBq zZ71%gm`R|9m`RP9N$=o>r@VK)FocIv;xobk8)blu&yeK(;Eog_2=*GqUezVn>#g6r zC+HLOHHtn;UXncZe5rXB>@|u#R>08X;>NvUoO)pyC9JZ@*py@qPn+S`owmCtxihXg z!vfkY&Nb(@YBA7kXWVmE^Mb~6IsSpBCtCaJzr)obbUUQDk6aYUbf&I_if10b7ODoWpRm@; zc@>?&kE^>I4j24mL(lHL)KAkO8m#z95+&)%N7f(W_-MYjEZuvuF7?VZSLN+K9j>jz zz?J1AGvJ!zI7ZG*fjOOKW=wPthd?`bOZR>s!9vQXbo+`a5|lz2DIdW7WXE2Bx1I#< z?*Vv5h_ivB8w~t}oO4o$i?w1dhPf!3YUGB!I0fc8r{_$F*Dbg|3V@O0p=@AkNaPA> z%Hf!;(ssA7)^Y2cja3l73w{d-GdcSeDdH05**Np0t0&s^lfHYuT2f^&-jdorrE z+;JSGd14*=M2@+m9^k-JdxhQRnJLn^jgQTFye#OhBy+BAbu`Np)nz=RNAhXaGCNJ; z95lAMQJ68oaP)Myxbt{BjJ4T@>>~X%~ zNz37BE0c2O;M7`WyW6D)xcqwfoQp~WlNeYC&>8jP ze6g^{4VK=)oY%h>4`rz#dy7ce#=r)fnnQ>m#9c`i7kbiTUZA(f_6+)Jh8`0rDA|HI zb2s~bI@xCVth*3zLJBISM?`abL^R_mieo!wiRNRw5GjElD~>g!4h%=9JPD0CMsBvp zH=38KJ~UKWa;hzwmpNBOslu3`#h%#3(`LRjv&%d`VO~+{pDZnvER5qRzMFOP+p%%% zMBCjgZBZ@pd9&fK#F*3;`APWk`?W>9c80d79H-P4`GFwZp0C0b%=GR49mZ#hwg-zQtvcZQRrVUR~;bZ!Y8W&whLaM z^2(0oyv)_XRDA`<`4svj`_a^;%7t%|PKJmJ5p!uW&z5bv$sSU#XObMqCMx7oMHK82 zdV;+=_$EyhVlPVu+mhUEa3(U_kO7;T&EtOn;DPn2IJ>_tjW>B0LR%4q(a@oG@G&*k z2;J>9F;)b7jrs*yR!YW)wAO3V^;N*vDEP?u=w$1AY=skSitH$zwh8f?J`mvvcK{ojwTFF1bNm)fbu9*6i6X_#-ilgWGKC@^U+8!_&wMU;`!^Go{Pm$rAQeP^AsL zO%JMcW(8F`kF1uZy<7%KyUFo5YE-OnH+XD3R6?EXrhMOAblj=F6mF$V;( zV^;J}5_6OT3N@dY1D(quC;FF2%pq>URJ}lKaF7KtiHlxO(?#{I3)AaMp-1&IJqBff+X&31_N)>reTgV)ybS3(vIaXLN}(F(i=)O zw4k+7w9;)vO)=eZz348TMx*u)6D-I`3;dO1c~tn63G#euX*7(I-(1Eurw>u|@t?vgS~A=g<;LX%h~;j4#%Eq0xyYRu6;bLu8&g%X2~V0cjQa zNI!}KbDI^4pEl8(VhK<2xg5t~wmO&|x}jrB^J8;k{p5HbPv;SuACq~8*H5BZ?M3Vm z$(yi*_P2-HL-u5Qs4--3;F{7B3e$MAe@EK%*gHmC;DjGX&B4DnL2qVN^mjupMm_2S zD&YTU;VDf&h{hjAZha!0wqM4aZ(Us#Emlz5s0GEAr1;P3+2^HYg@CV7@X>otMeJ@c zNL(+7#D63JY!ra(new9mVCW8pTW&8KCc$9)cDc}X`c0_3V`3bSp+wt0v)J=u{T_~) z@MHX1&=ct`_-z!w-BNm|$-oolDd1}qd<^~2i0S)T>JNI!{WzPp&c_wJ#00?(vd1!v?d+#!RM7Nj_;jx|IivS z1I|pG#s&4}p8E%mO-SEIRXAhrpKpWCF#SUuD8nEpftJ*$-xR?6N~rF0(E2G^_zR0^VrLz^u&(}UYjlsvu(Wr$~7)%1=BuJKga zg9^W9R?C!Q%VWqESug>F#TbJg7fhg9=B5$WNM{F%Neyt_ya^k}PPE;f3B=)C^Vx{Q z52+Dx`1I34+=-IFo6JSK1tJk|kh<4j_=NPJ5V_m9+#Roic~ux7ZpX#$0hJra45*MR zHIo@mR9`oSPgJ}3-98c>aah45d zZCIC{VL0P5iWvhUfZrR*y)T?MCO%I9w=rJ$9C#spHr?@pglQ!;QjlP-4mY#>I?f?D zrW7QQf)nL6Bb;=u1qnd6%HmLxb4UnqmZD;@e0&z9JI{KGbbrz#(i)Z&Eud~12R*+x zjh%j&KaImNTcz#pl$1-0j~wS*)pwPJOk<08BWnq( z!_;&g29|HkrKXG73#iv}O1kTjI<9%KP3g9D)38cC+e@nVhBQAYAR zc!bAR3uwGT@m;V5LKjJ8X_QDGJ$q*e=QNy;HDSLLz4F3vl1qxl$$7fAE;v#e#jUZC!5`JOWL+!q41#rrp5294)j z{NH#9d8jZ=5P^e0UNEMa8=nn+civpi1q62H#VbJ}mZ%fUi;T zQD~Fo-TwW15?e7gn#5Lshbk=C8u2RTIQ%5VR*2i3Y*j+i!ZRD?nQT@KHE`qX!&i#l}Tcl%TsH# z&T>3i8=r&T^HGf#rQ%0diC;)~(VPqao6Y~`6iRXQs*#qlaD?0}ZQJZuM zl3HwRgExCG3-(BiTCm4fj4WRb23yl4^^z zie?fY9P_9wTxld_`}dJ?gKt+myJ;XkZSm>M_UV+qMI#62l|zA>ca| z@b#l8mWJB`zDB`EEpI&gwF3iJvR@awz`p71SIXXAxV~x{9gC5>*x+k2kj#1&lS&i8 zy=SVW$PC5B0wQow7>kRAl&HnU@&));=%&cRcqJI5*<`oH0-kK5v)BvyJJmwN2Bf-d z-a)*Y5^U`GdAx(l(HZfEFMkw#mZIGcuU%PP6+=gK%|>-i1^^AS4et4gFk3-iqv+!* zYh;dzdw1>1^H(KnTkzK?{>c5fMsFAm?j}Jd`8P(pgl4s;-4KwXZGs5(Xq)$-ZBqOW z)6IS?)%n8y8fAYsKyTjMiSO;WSvT?HXj-H0CpoOlJJYBTGs4O@VTH{OE90p>Gj9Hw z+t6%It6Th1WrkKYdx)&_bW~BAr>7ZKW+yP->4WI=*CgQ;gb;zN5c062<|>u66u7(L zz|TbB@-`IoHHN<50OzB<+uKQ^Fc^lq%>J*O+XZqbcqio43Cpv}ag5J%dKP@ zDxA}hL`)S!25f5PoId~v`4y=jx&wFHhq~x`-Jkp93xDrpaBUN?6^faGeU^1bO+^U` zlcXX(IXdGnmKY0?ew<0$Y?0fI8_Ja1t`~-Z7f75$@Yg8*7$+gg`@tQF5DWGi#U8sC zQ@ite>-X*n`UHKAqVJuO^QE3I)pmltMzO~{Y&dLGcGq1KlS9CFI^c8T^{L3*b2|zM}9ViHacfNJC$#)<4H3dyVG_zt1Fm|z1Wk1PZ)y*_#Ds< z%w3_BLqDnJ9b(5)Ud=CFR0Zc2C^pkuwU(9RD9xlEM{9B_x|LqvrVB_rPPwQf_|gQ@3ufUtwLzq|Clr zo(Xu38QSjlSfAlW*c9b)-Wrzw@s7h7VSNReEQWcHWp@*7aH)1S$nd!x=-5-vrEiF( zh^7=o(2RnGL!0?ymc6fmCH?|CW3(yP)&7=Z}b=bS&GYT^)lmf~|b3_Ndu8Ra≫SygLB@F{&=k1YpTPhp z6TP?FlL!n60a8hcilIa8d0(_?h|e(2p2eEsl6GjwF7PYSS9jXsua^niUevqeCzH%l zQVnq#q&|;WoSP&3I=CIBGaAoLkGz~g)sO^w0#w6OtA{!>sv)HD?m zh`kwjz@FJ?iLJWvu%G%Xy(qd9_*@HP()Dvr!!=Oy^`55uG?Zj&&rp>$wsTsu@6`oZ z{{mFB?x6?3)LxjIVA~V#HHB+Fi&cY4X8Vd11Bz+02R>qN4}6sFCD$V;=NYbHh$h%{ zdto<)hDn}Fermo2`)S7bKL(2dYRRH^gCv6sY2a-}_pamcs2xw$^qg{C{P?=Lu45Op zGv(RNR0n7a9G*)=m;t9(Zsv};bcH>Rmw>tah*FMymC~4FyJ5IxWk#a@;t!PU|UE@Fv1A z&)DF>*uti5d~D9+Ohm;fFxNPgt6Lq-D7CtL(&)AG_|%_Q&ubi|tqg`8(6M!J9EC5r z1U&B#Am$pEGe<0Bf3e|3rI{_R6qYY{MvD!TI7#44Q$(T|7N$?l4wcWt;qbuUdCV?a?9H6kH zX7q984Bqgm*E4B5^j1&;Yy2_uVV!#p$87C!PA?l!+k=36VQ1#Oc2j=Fr1a(|QGyck zcGO;8SXE$1Nnu5DT=YGui)&%#&6gBbeR;fIG}!tE#P_5*Gk4YTMBuY>aZakEDpf~Z z5j~Rl*gk6F;~`W>X8{r)AEP=F_tRBJGPD`0wG$N%*QAfUfUi-HBr6=4blXh_Zk+B!S^7m-IFlk=^hfdm)#7FmLV>x_ zCGlf(*aVoHAI={?$_kUNZVFvAIE}1uKMY8nNWJT>d~*M&6T<%Th96=rAs% zOMy)mHm?vOmp`CCus4(vL4jW5)(T19z2lj>>PeX^uEvrDKquE!QTF3gT#X1_JT^*A zGS=*B3^U0;n}W}U(;H{n*ENXlDpu2T<3Rk}`P`rL0_ZjquNLG`MdrglVU$XU!&;bdZ{FNm?l#fJP?f!#95%sh9^}PvtGfuac*frnzZUdF_6qtMMPC=_!+(_~15a3=fUi;TF*lH%yt~^2H{FT*!)*xR-n51y z(u^HsIvzUTkQK{8yW^*4q2}GG8aXgAcB~TgU8Jp(eePslu+6rJ5+jz>YQ}BND08wf zKW>T)%8*qBK7Qm_7m?q^0rG^@bB*YhJ`RGtIbsitZ#MR-+(1N$pA(axi zp8>$ggD3lNKE&tKcSyTL<4@Ktn_0>grj*~X=nXUWqZaf4ke^{OhrO- z%_r63M&+F6W-hKN!Yv0mW_0$}VA>>knx@{gc#wDoKpbJ0bE^}48cOeYrK$sVIH_lf zkX|g*HQil|cyotYw3SM!z6jh#o$=o;*QXO7x_-UNVPeT{sSmN$y|E87O;F_5mOKVz@+l|WYZ^2E7{|Y6q z9~Pxiz}G1Fn7>An?_{eI9}(;|iapjFQezB#FK|Wd3i=vFA8W0l_^CT?=B{7`%FGQ0 zev*C+0prP#i3I9ECkfQeEl~F%1dN$Imbv}@eXJccnaIG@-RBI+v2pA~+uf{%cVDGd zgK)GNnp@`SaM1oIm*pqnOSPTz@rf4REqIe)@ORjay0wIf=7I7&3Vxqbc|K+!KU(9o z&68uq(vH2fFL1(Y zMlDT&9gCA~CiTc%Hv2xeH|Y5Fte+ zpZQoIXJ}GK_=Jt`Na~*3+wr%8zMp=iWsgvq()?a%g_68QLMTuMG$9%{ID@u@dCtkQ zQ)z;HBNZibkCt$BRU_5z(FvI)j>+^dHD=B=G07rNn7-^bayhh*Ynf#>v%v9 z@hAY#Y2FrTI+C~b$SsX0@@Z~qzTv3murlsv8g|nS6Ie2bsiV6v%PpOcw0ok9+W5cm zZIdo)Tu-=}@nvvJL(g*fl06qSA5<=COe+^PkI_Zlf{U6YDfpPr^Ak+2mV-xlTwmVS zfz`xY${KNnYee?t~`HL zGF%0JjpC2ok0c*NpMPG$c_4%+iwYLM9aW+hXi`T&Ifb%F?8R;($qd5x8s&R8KyQP+ zIF(hb1bdBQ?+37e88Nu;ZbnhoMP~mNn{Q1zwIyfONFgJQ7CMvW_@2SB?3q;njDGOF zN)m5n;AX+DFS)A*XyPO^WWZ)r@0%0&SWsdkA%iT5`eJGbDqGQ!?&pqTQt@SB@K&OvQ}p9EK?wsSr{ zQI9U;7FF!ah0mmmloO1C-=S2_ZO-y9jHlID0hE=c_Nl$TTzGh37_YTq-%vo&&N*Fn z&Q&*toB`gFs7=OKXzK9th3E}}CWYxA;+l7D8DowF)K$5U`>uvuO#<#QNktG!IpafJCb%KUyEW(EB<=%qB>&%JK$ z4s0Ad(RR16c8h3z^V9mOMqX(@%F+))29F9}jmO3YH3qIlpMyCKmF`}**WUz79(|WI zJ_LD~(!M~A53Q+WmX8TzRvT#jwHuW}x@s{Ee& zF;};gHtxsEcv8=DMdn64@Kf=XnxbMqM4dzM#|2nJuT_~mb*!OxU@xYZN|OiOv*9fl zf6so1E}RITDYk2{xY<3M831>X1paIn&A>8u^D|%-)HBHmHU6kZUge&{F27Eg%+O*Hb*7bj-}e8H=rO{LC6 zY#ehrw3+W)Nu_pg&@Tdqgi6m%JV~Dr##py{Io7c59UzY@5e0)Z*xt#~m0mya2iZq) zc+|u$pmy@gP_3)##tQNid%4tTgNhulEm@-a*LV%J%hh%1ts}^;8`)z8*A)3Ac`qKy zY6XJ5MzQxnShQq&p(h=?1$vD_kGVipWV@dm4uaTEZV&wIZj{_fr+JPfqa2hv9zfra zjB?QKk~*+A*$1p1xIDd)t)p^ej$`muV_NCEh-UDzc>PdZMaRSExk{{T(pB_HFi<+9 zcjG9@R%1zv6#O+Rz;oCw3}VDlnr$b3`dWXojrY7AmBtH7m*<#sQk}>-`M8)5e&Al5 z=YZIbB?VuM^P3UdIW@;Q*VEAE)UdJ3Ih%V$+qvN)xt%+FSz+fJoR_gK&8aTqUObj_ z{)DEj{V{$oeb>8z=SNc)dX~f?UQY!Hf{VzE4129*`AL-n)XJf25bVtk=zakEp_iYm zdL^e`&m>`xyi^=DKTQ&LPmK#M0_USqP0x4e^{%b1ib^OdVWTP``>0UxZo8YCeg8j9 zNq=0t6d-lfHUWo80a}1I0j*O@0s3p;mck!x01a}qSk0izg4NA58AiaG?Nks z#-u5U%{Zd}@f+Zx1ZMX$?l9Ylk|4XkGGI~#E%Q-F6GO-@Z0KeJqK5Vj8EH~^XcU{e95J$ zV9s^vOy8eiaZzcTR54kO^Th(kfd&)i`f?Wl#5vhfd9 zQrJTx#0{MVdL`b*7C$OsxP<34}iK{ZVqzqDD|J?*pFe_y_foF8bpH?KS`n_ zT}d-HjD1gxAQsgsF@gXez+_)OTWchrE$8#RHOJyVSh+CO4P!Q{>sM% zeS*G5(Z{?Zu78&Ly~NMbZW{IO_!(1-nDRjvlExoXjMlj4aLm>o=kypo)ePWE^Ia4C zcAThG(bVZpw4~(67A%KUD(6;ur;$qe$vWxJDTebCFwL3svW1mv;K^hg-vr zBdP>%g5FdK;;0|QkyDyR<{NNS<1y!@X{t!m*KxDb)xNqa`m2DoQQL_Pq6u{LBY0lA zSqbWU-sWGyA{w)Opd3(Cvs{=X$KPLK z&UZw8FZ4sH+yN<|(@4Ukp+oHnlb@@i-SKNdPjp4$mW^`DF1RJ_z0EAy!Wub z+btk$6okJ57D$q(o@>-a`r0bnT6(#F7$k^v->s!)yQ)_}ve|QDEDPgnl=0D6rgZ}F zU4P*d(yv0`*Esx0@+;ofJu!PJV#Vw=@gP#73RQz9dOi`Av49@e=j6vmu|L?22Q0bH zhG`ew{3fF-1?&@QgC;Ij#y@`t$H+MQ!RBs|nC#p!FORg%7o`#Kz&Hwc-&Ajo=2-x8 z2osiLYzfXK9A|JZ-ZqhFChdy7QWA;+MeG$4<0#NO^lBkhBs#s15-)L9i^kZf#&`?r z0YfDS?fKC_bVlChqBGX0GmeSfU&a?Pk*GVK-#BdnSjlfR(Bx*;@^a20#I)o$l7g4U zMR{HMjWmb4K^jKGLAH|lX|}Qz^!=|w#F6FhDVTT}=c5g;{|7{{DG9SUlzag4*ZaeXob#eYZBCGvY0O{6oUzBz#?!rrNFE-8J4|^gw*Zxn z3G2lyx3DbIIG6~x2?joy6?{Na`hn#ZY&K1|6Z)n{Td6dBIVMCUDV-R_IAT)zx1k0Q zeyKl5qePmm3H%xr{4CL>JAQK*^u0U5R44ozVa?%~t^^p z)B=7IzEo31utQp8l!VYDrD9K9O%AlW9RD<~UyeC+Mmvtk@~W=BrYXUiINyckHO}(L zdHTU%+fNR%amcSY-h_=q86Ac_)GeB3R+8N&9@7dQdlm{rnzp8~5r2~w%5nK6qeXl# z9ZBg8c!?&X$QOLI<_oyF**F((22Vu>*@yUdMcEfNvXjSA>* zf!UG8m3cv2)oqgFi8GO0jjZkHVpyDspju7N#CJ=x2vyr37Q^P402NoFxv`JzN@OBB zNxqY~tt++RtDgLEet_|x*(=Dz0ki2^8=H{~#?=CJ0rqIHHy5dQQ?A97X0 za&yjkU32?HeflPyj0dDa9N3%hgTOQ6ba(yDX%JovgS&lH*dD4%VlD=^h6@<6LEHpp zjK&G`k(gnDd0Af7V0%g2{BRi}UuXJK@qFs|2KRxm{W?CHKfmu`jfZZW_{>}ThcP7G zWd51x0K5zel)=>!9RT9$WKryIpkRz{$zieaD_14TBH%j}@b#l8mPTg+zDB`UH9G5s>#L^G84bB5{Av72mp#yc1Q9E@wmd}o zT0S3yn~6J2{RD=uySUy$Rfo6mjk$OWsUP7|IlLDzG%uS{x!H`&kKirjTMxYgNK4ZR znVS_ra=eeuOJzKS4j$ogecr;QgO*l$w{+5=Iy?1cQDPC^jS6oriA|S{A6~n%x+;c? zz^_sGRck7Q!970_<|pWD6n%dQdNVMYxOdmCJbzUZ6a{~c;*Z>qK0~g{p30K!paj(L zN6W)FXTx%)t7FQ_gJ)?;_V2<5;k_RWg6wCY4pJi=_25XJ0tg}=96hf<@rMvtCf+u) zFrJpA@SGtxHjbTWyPMVB;Z?XCacM&Hr-mnBh9%v8TchI*Kj!G z*ybi7QK_fZqin9WYAMAAzjo|3(*s?O%LC1sMq_dyQg`EoWIN<@MI@-4pZ)`Wi*wJ0<5!y)ENmqy}#+dF&;D7BqOg zNwW|&dvo$Ij#=7O_I7sHT@!0X7+<4|Zx4KKygn6t5_qNvP|!}`BUyKeTs*ak01!#G|wbzA0TE$Q+gM%^F(2S1mo$?JK6-PZp^@asXyAWOfbM`yLc@;;oww+&JBdvh+)3 z0gKqnhT~Zm>VnzJxe>$o{W&ya%njQoIZ6a#Hn-Hp@8I*t5%|B9v1&meNsd7yS`cVR zQ5OP9VpOe6jnQ4P-^^4@Gql~!N}e^IM!Ugn!q?WEJZplCN+Dqu-^YL>Cm03h+T6o> zYQn5}(UgQ)96vAtqP1b(d2VfH%l$~m1Grxevbb{I42Nj?VUS&Qr zwESnVuz8x@cqj4)!9B_9G54Ef^#Bvh63_A1(u7FQd9_jY@dAtBgn6npeJvPX~?g>Ep&+|9n<^){!q z)Ly4h;&9B?S~Q$We`A%C4mCv#bKAnnlKpWdf;f%65<#9*RU(LKRU%j^gt&lv3L#%= z0w2cTU@PchX@OKvR1`2zQPL$qq+?=JS}cNgmk_5pfOQ_Qj?jT6S^pG{N6PKH zQSZ+E>r;R$i(!E}cI@?`z{63ux^tM2&iMy%tInLC*AMCw`q#KISQ49T^`bBo@6R#$ ztTruCjE1Um&T})*_q9iXCBp#5VcMgZio25Y>uD`f_&HTe6wK#f?@YEt8IN@zz(dIg z%|Hqn%&rS+b{mwjJaMX@gdf&+LEupwKmxx;RZy<&LXvMrQTDMZ5?oYI5a*bfJpWP~ zs*G_N)v^}gfvV?!C{@p%n|P9`drW|e%r+8xuXWi0GJ9Y5D3h!98PDHx(Geh>R^+f= zezQ0tvn4=H+y=(Jp2m*&dC{2JF7nQb=6;x2L~w$4eg(7{itEmiXH`8q8z zn8_(~_zz%6mt)Le9>NIcE#HfWvKXcCzD9Z92jSDA*bO~dkWHZ1DD;>WPLg~5P@IH< zy+*P3NnnpE-)UyZisUsUnVaO@7bzy|LqoAEB6mgZHY#@?H56MDm!V*< zQS7my7#SZ*`mV_;R|399!B^!}N4tK~ckfTjYhANKUrBNnd=An88ID5bRH&`4bVAckYec1&N9X?`)KJR{g&EvGn>7=rsyGE+S5n zhndum7(zfdFDi*m!Yr7BrpX*Y){oF${#5*P(e}2VObd!gyDkvO4r$kQU?z2|&c+`H zw(GjE*Z3n2B&$ILc%uTGx+9rr&+Dz+^~81&A+8$5Uy9;mIvxA4ou%uMFuz8@_aeZ@ zW{ZiRM*UsW`=gtM@z)SdoD95Nu}aig%C2#E$_1FaHeNuzx5C!bsy(`nvkkQK#rSoa z#>-q`cz*kTlz9)Dgqv3oki9^VYNPJ>_ctSSf)kIvw(Yyw$8vj)&ZMXz^ zjY{J$KpIo*BEkBVj|=()eT|}zhA`3R@A`vG+HeW_8bu$aE=eAy$<&paCGQKwk$U1< z^1j#tj-0QXxSx-bhh;9qXqvUOOb2<6$q^T`W%^Q^_^G=G&0iozo0nyGGY~uZnD~^A z=>#gq5zC|YI?$x?X8(>f&lLDIsxWe)J*FHQr**JBEn9Z+av#Rr+K0)UJ;Ui|ZfiftA z2p5U7VIGea7Kj3AX>wErk`kPq*H>4?<0Hyrqsk+f$YatCdU!oAty=|rje?JX7G^ly z4F-wp1(C#B1b~eKke(Z+yng=q)n0Nx&ZL7Thyndh>Q)RL9(k=nlRA1=e+cTd$#aNb z3woma3HNK1`*p$nNb=NkjpP-RS2&-s@5%g-d|HlLI3FwaO1ooC0(Qdq8fAR6I|x3c z7d|IOuYj*{@G)Em@Lhl56VhEt;MX|(uquffge%@ouOA@Ab;Zwio-@(o0k|UV5ea;N z2pj~b^lcy|YS99}`$N|Mk_Dmv`DidT=zEpl&f%D?(srlRWfRY{k2*>f<#Cg3W;Qr! z9%E#MgQ_jT%}-(}oSpOWQeMq3UQ`9=mMPi13e{Rxj-xc0Hok`=$J|j5>;pQGl)A;Q z)SPpIF`uBXb2jkD-)w24F;lvv(-QVM=UTPfDpy5$+^Ap3*sCt8HuI$xK4z2|c4k>2 zd1aj}wX{N(YB`(}l-`Z4Z1Nr4^W!ate-xaN0N@YR{5o0L>1-gA*UF+!b6O#j$MO=H zm>mk4xj`vDB*)#2IT?x>6&msJCqUrXLhx)kOeQoK_GMis5(2apue6~UW!cjbdq(m*AzzTk0*h3ASY55`P2x9V1b+MH0 z7Q>q0{LArA!;_d}4i(OhBbIP71E1{9?FVk^r(Mr1FAF=1)aK|ov zrGsAExk=&7?cCv$g`ID3J_qOD17KjbES?hrR}c#MQJijiKh6Abr56phg6);9Ao1_I z{rw`ZvaSAHuxWK7@$ToL1|%rIWay>vlQ+B$y{a zsNC0vQRa5HlV})wI3`?Bf@?X|?Q&+JUAFot~&I>-n!=hfpz5 zx}`CpO(kwGmVD`83+A{hKeeGhQtt?ZG!3EwC3u!Z{r5mWAfiY0$i-{Nphmk4&#N87 z0xV?KsuRu!E=BP^;P!`s+c*gZnV+O4KkRKFc~TvClGRWLKfqWAwdLpF^TjJfD$gzR z;rD?tn(?Se{;;?qX?26RlKNoi@JNUga5eaWSQ)_Z^R^c<7j{%|)4gPbIQASGe}4`) z6R*%twknwt0@c}0q8gyea5dnkutILIy_2OYHkrE{$AR}zJU1$*3t*O)CnunlHRcMs zUhFkfqqkCpbH4Il<26(QJbyRn`75Ct$9^)cNcsw2&Ec4>xjD>iA(C|QODB|o)`q1+ zf#W%+%Z@rv-EnLxq|JPu>6fYj^eh`BW-~XQS~>G1E2D&gD5J{W8FNa>oryg#yd3{D zIMPYtLNAw0cC1<^lwujpU>R>jCAukCk{u<#BTYsHs-6=TSu8{OJ&52M4F=OfLhI$3 z94LlwAwX8Xj{2-oYO&LtpXpi|od1LvE}4xqsha~UWP?QB_1$#f#_3L!rGJVeqZX3X z#4H{Hts;ouor9~u^FEas&WQoCCI<3Y^)heMi!mDoUx5c?XE_g+Ozk1&OdW{s4*cZy zZZz!ez?1n+sI6n~#AEYLtIis+_Iu@Pb^;H!kK_W2sBhG^XIDmw;?Jd01tHLD6nb2G zjf~KZ!`qudluq;Z97@fEg;(HnI7H0^5pp9MPb>52M1`+21$zx1o__+c&^h4wTkf!* zt?Wc;HgH4#58#R%b!k%B6mJjjE~|5Cnm!xm@#2{~b5bz>8SqR66Rml!O6XApZ=-^@ zYD(6RqFCB73iuiYALA;Nt~dVvE4SC5oeUpR*3PpHPeCS&VS)hsTBRH+o!ZXvaH;l| zJX~(Z4zv*}=i^!Ec$WSyJ5H2#dDbF-noNqqeH2%cf2pWjLn@Ff7+`^JD+Bb=xM*Urr{@C4$SF$iZcI4&BGKn3Mt{~er-dlZ2 zY_KIJF_~J9i@Yu()mc5Kfbn$* zV>+mJH=}!Nk|_g9KoFgG#&;~h%_mc4Y>|R@fIP~U*i9rsRqT>R?UEayHxpE&SZor3 zUZc=sOESau;#5}573?*Ny&oXxMpJGiCd{fl`lru$IL^UOkYF&009!JrJ*nyW$PcwJ zP?P!5RWLY6`f(;*;)MY=$^fbN(IM!1VHkLU#Nz~ijpC2-IFh^{+>uNK!Cs@-;}Qkb z^t|5sy?cT_L0_Zjdk6Gpd)a$fp1|~%^^+t@(ueS5PnsW#+94U#;W$yMzH~?i1uq>O zO+Idis!>1WRa1pK-I9czXiO=2KhH;LMa2v%rawx*!e%>8T*HyHVNw|CQj& z?z(H@vJvn#3ciZ-p=IX!RPad`1tZ0AkHYCoon*s2mM#jG45rI49O4($n;oTXiPC}P zO6-{lt3-7tOqG?7JSWzQ(xA*?7Qi@E&Y)N;pk|HM3N=QoL-6cWzPXMk&2a2a+ugAe zUyTjV6k0gfHSKvjYOjKq%J(NT%Ex9P)RWTfE2i*W3O*&T&?qS63uP`LX0;T2eh#A(zHoJ6-V_dLxRCGlhH>i2@>3)Q zZ%f?ul3{J=FwP0*l+w@Tr`R(XtN3NN&C+LEZqJw8enW9VUJ1OqW$*{V`)GWmJ8t5? zi1t*IRiBHugk-ypB_x;6zXjc@+IP)f5%s4>6iEc+CKs&uG=p>$K5+g_ID%eRxl{G6 zAzsG{R6bVXHr~FCCC%gi6KwUD@EU%a#vcpv9#=ftQP;ZwpOFiJ^ik7{5iN54$hZDQ{0(z z#`$Be`ACDHOgAWhy0&u~%PO~XhffxEzQK7(1I?)}>A_<;=O@jk1&ZrfQ|14~?*$B1 zcRPx<`~GcrnCDW(j%7Aa)wbe zW{;n~QKQvNqb9cojx~6iH)_UoK||2d0M4A;mMbVjr2&qmE2d}pNVM9J9%e0c!bQ&V zDZxiOXVTF_0GYAh(Q{zN54j%`gVNz<+Dn2s3!*`4J7)j=x8XsVG@_s6j5CJ>pqoRf zNl(w2XM|6bM+fkm7ycNtp(8L&q^>{|zeW{5t`b0!duc3X1%kasu}6cK@rh)s7lont zTLgZM!mr9v+|BL@>l5rXiaqwlrX}C)xmeS?`?)k4bltS~C-A|H8XELvD&CzmfSU9z;QOqlo5`-?YDbZsJL~fq<`W@Qr2au$3$vh{}C! z7-epEJBfzpWtB7hsI9hCC+&jEDWy*QGEvUP@j;BJ z4v~5T+B`O?;nf95a|9Jl8qU&KxWy=URk)?5)SJ%&xKuJ%*JXJik=u34?Xi_1sWdWH zao5dyJ6^OcWeOk$IDzDR89Iy?$kZUSzYP4*X5KVrxbXr}7>!Ep_3})VV<)K(ir<=g&-ww=*jBfB6%B?yj5{( zHyyZfx)WvTAK?m+7Yg&^eTqRuKGrljU(C;zO5=Cu@HxyXm7Y_^*LU#wB(c{I#aT^4 zDAD_@3IR$~CNF3*8t<4_!p$e~MYKD1<0#2iW2rR}{52|lbJ!h>^X&$nA3Y~lFGwNW zPc_B;7<}dppL(8{yu$e!<$Sa|Xk~<6@7n6B2ws6-qwwP@1ccup>POqbfNLy|=G({` z%b?AI*}QezxxWru1~6kE&MU(2gx@vF@2VWvbbC#lEP}m8vBy4~WPB*;ye2E%3iuiY z9~mDNnKC1AnEFXPMcI?+E@&hTWomIUR|$cGt@QTlN2h@As-ZnLj-6<`J5~esf}9q^ zw0@#V!%u~aTiZDvF4f+Qok@>&AnIMtpH^q5&%%7NRP(6~<1|H~N$_(FiL_1jYa!a& zC|~>qbdw?^y4!rMEqy^^+yyx^6z(yMBhXBft0T*mw?pl-A#<(KeY zzI7NxQeq_b6gC7pR7k@zZz{E zJEvj*=Z*8<^B7dL`a$Ex0Pn(RB36ThHTmMN6u#Lg-=x{jjM#oG?H~ktjY97R=uMJ` znPg*^_MX(C01sx=oR7$?2&#)cHx49DBaE+6#z&b;@b#hdN#_OuU!&lA5!xQXx7oiF zcudEcG?dp2|Ha0!6K!|La*`Y0=03-`s@*ZZxXy58oZ&6aP(*GPov@b=7y78q@Hv&8 z{9iZ|y12KqB<+b)TG(Bq?CuAM_b{Gv$G^WBp;MArxdOmO0r(m$4g6Q3^!gCwHHy41 zK+~h(MLO6k9~blq`Wi(aja)9I^{C$cMKooYG&Uq13?y2hbggI;M6b0rvr^}8snz1A?tCb+r?}B=>qqJ=gvr} zh7>+70{>tJya2rrTXm*CygstzGpunn)<~9#kI)p=Tk<&U#h-D9I9c2;Xaz?^Vu3cbG+6sZ>G>{2GPd zw-J`1q)q)n8YR*NLg3dZ{8$)B!Hab=!~+W&h*oNlV>vjXq~K`Ygu*!+<(y2xA-ml6;U;vmDER|C5}SFk zqjWQ?32TTG|2Ozd;w=n&r~@#i)hr_tSqvg@kRLw2u1Zo64Y9B}VhSSb0LIf4{vD18 z16*tdcp7O6-5W1_@>V0Ir%TEiUtL3$O~jy=Uc9IZHoCBCn7tEJYq{e%O7pJh*e7z# z9reK6Zv~HIm}l&=3%3mW<{XnYJ~rpvEbjq}40DY`xw_TS)IHQ?Jfrt26Q9OM(Q3m7 z;$`YEowpBBdipAgCGlzIX2)+abDS7P&UxNac$DiZsSf9uo4I2|QJHMVH(XFZ!ryL( z#vCIzn~`~eIe)Slf75IYc{JuE37^aVfA-!6IFjtX4{MBYE-3`??#m0A-tfS0p7ltg@nVN*^i9M@14D zs+3|vR%n&1<47qda$HuFR9O`t#mQ6il2K=ta-=9$j(ST z_3;NcS}os|!cSu0;8Qp`wAB+b`lQX#o=!de{UI12;d_b8qc<=e zk;EAl4k;WzGjn<_4u3`A+g3}@dExlK1^7}5NWvgYbSey8hZE?<%|{E9CW7^?-H5xGSoc>>-=k|mF+aZy36MhIdw=i; zU%vOu?Tc&|$6rJtXUu0bEr%FkgqPe9Up{v*rk0xY-;hX?^b#7TkC(Dt92No6AOyJ? z!m4Kk&SRmJi^#iKoueAPp+*%5v@s;%>*o;rjKPSfszd}-T(RonmFe4!LBvJV7<86R zeT7%9X$;DtO>4dzjW!UG@lF_qXkz0yOzn-q>h;C1#WmhiR+`rs(6%`w-tYCH_zv6gKXanq@%;T;8Dh6=OUL1zeNJ8Sw4R@{64_zwaEb~K)(JO@n0}J$= zN}jB1K}i5PIM0XyQo!dFeAWQj9mKs+oR@8q=yL$4ZoYX^=IN41q7YwNB+*mcnDv(P zH}Nafu?X@sq?Pgc+?e7A@_dbi+IZ>Q5A-z{L`gXN$@Zqs+NMv_%9s)sjK$!BNLcVv z!h#u!M7q=6fA*k=^42osLO8KN7i8$-K*!q6r}8)AKbkfAeVh46k~mR%{DZZreHfMZ z(|mtgJtyfDb0-!}NT*T@aytHb&`Mg6k`&ZZwq&{>QB*B~a9Gr{1K||N@FVaoYWeKE zZtf-c7O7%0V(7TUO2PVlO_OAW7afeyZ}QoPcEAC(3&9p+iIUs5HaA607XUj|)4BhG zCZF+PlneP3^f^TzedDx^6w#{((Xb!oQu-OI0R}N9Q(+?@McL*`EJfKS0BPwN_0q#_ z0Uy^{z^BDEu7veEFAjVY+VYz~9`Elg$i*$qg%Ip{OT^wpaK>G%HwhL`+d^nrvvMepZtNJou)g%+n)sO`9*L zDe0^r$%?L{+O#xAALm{1(MH5QOrDIwWQxkj9UN$5^ec8&{W`0bFK)JG)#8JPGA33g ztJYkOB_=J*Ff2~Ep!qA8ARA8b=S_fg8mDbp;n%|xxOU+XinB3GO}iblo%t|(W+u3g zZy3*?3C`hjC*5=uoyAo%6TB_yW&*z;fhYJ~k|&V(rCqT|g1kKXS@fnU>^9GW&DW2f zGEbMD!Y-Ps@@LPYs^XTZL4jB-Ftz4h@u))p+~fVaO;Ar(;3fLve2|q=hH_P}kr)+g zs4SazQ@1Aic7tAT5WN5c_cZOhZO_Cv9c5p)r{Jtwdh=X@* z2KO>J_;f9o3G3v)fc2A?9;GmtH!HqDp`uPTb!#OW#QPEzA=q<@J(lJrD-HYGhlheb zL7!9fy@~bak{98Q_DR#^M&VE4kn97jfdoVl2}=ox_z_S(21LYJ5=+9W5I(1b@2fTV z%KO2VSZxG+PQhm>AL{gMw}MYHSIBid+@s(U5ZuW!MQ(7s|K37AhhWcEaC<4~7yW%G^HN zN;k#Pht(0fxfFGURVK8myn9QwR~LcNslfOptT&guI~w+dVGF}nb=Vyv6)GH^OB$L( zhRx8j(Oz1V8>27_Hl!%7&`zhc^Qh+AukMtBJ;9z+>~W85E_oi@Zw+d=h0k>J&66@u z*ETS*bH^;exDoDsmFzr~R-8?glgl(18XSqkQNIWz1xsU0LKH2nS$yj0M1U;y=5NM# zJz#q*${@+2Q1ltmXC5bg#@67;)4_{dl1wcUrBjL0mN8)!C?ZfQNeBR)1CUF8IO@Bz2!0-}9;Trd2fd=7$61L;of&2&5sM2Vf!uYK8w?e>Bnyb>=T!8wTNM=jU^t9&@#G2qoZ^p(QndVa zcVKwgI2gu<+;e*A$@VLrPx7xGNVbQF|KyY2nC}}Tn3M53tLwgBSN%30R5(df%ITq! z?bj8n=Xy86mQ7Iddf2f4DC3#P!B+VE~DzRT{5izv}SS*(IJXU$Xt0r~QAv z{ynD#(Q?R*Rw1%dSdL=PB~N;a(xK-~C)}A=_}Jd6f6Nx=TZoc-w9gDWe$r>GW`~aH!SI+!rO8-re1>5OpgiaTla^8 zgK|&2&7cb;3k#xxI=oX)=3gaFeJKjt{Vi~6N|^ahKTQ(x^a-oNlB7e4Sj0*|r5RhEO)yGf61^tNaI^dbEhk0J>>w)o(+?mwEeY08m%afn0&iP{lf?v$7RaLvp6K^{uhzJPDp;F~BJ!HutI zAco&2zYhS)#s=r-+e(3V&8Wh2V*ini4FEIkh?owyc+gWb-xlZZg13u&yVno;dy&?` zc@?zNgWo05W}*fW2e>`iTIu&VI6Zja%n2K=34h$sqPnaX?FtK%&2u4?$Oy(Pq1_*XT~qM>znPS?7z1T*3+ zcs*L;EILyg!}v3cl|6-fgx5A4B%*S2ApmHxVCr=^*%AwDvJBS!eh_MEJ)zcT6Hi%N+V*J6lpUk^;t zv?b&3cko4II7JwW(MCA0Q_f4H4YlPY?BCwp6v0p6=M;WSlOg;DVUXQ>_F3l0Oy?FX za=Y^}=4V6xgZU!p>}36lU#i>6IX0&>e^KH5AKdzU?SVW4<#`ppskYbfZ&ABk=g4^8 zyj!1FI-U znv`{hTaUQ8G3ik9A=vJvA zd3`I;w;zg2Dd8i}CHMxA`J|A8fX^xTUV^koePbAv_tSiT1+@{UBMZf| zf%U0NWzVYD&{jrhXIQq^w&=>93mv@gVO@*+NfYHO{qdg~DIVQiG*zAy#uLLi!w$ z(8zT3XBIwU*+No_Q7;yuQOM@9$>v1i8J7Ma*-VP8H`tfDg#tgP@Z&C}v>0{|Wv?kL zgX|ITK;(X>5xHMsi4;9*mtcJsY8ndrqZYbYXZRNSy7}fwnWtHqc_@W| zrXT7#I5%4d2k#K(_)QdQ@D^040pG_2lKQ*H{0_>Ecsy@$hLeH}{^L<+n7>(9!Z4T3 zCXKA%y^8MxdTUsUu^EFmTA?>xkYRmRxvt7))Zu%lWk<|x8eoO5YZlFf?1=Nh`*oX8 zd;SKJM+lY8O|kiam!L`2IK2#buyDhgsJc(YKLqq9L`S<#1?qx4FC_~Fd`<;NhSrd6 z(b^N{X*R|N!PH|k!12u2>{obZ^KtOKug7x{<)gSC4bt6i*c)J?W?Te`z5c^vqF;G8 z>oH~aYTOq(D^Pa|^)Aqd|6Unnk^a3AGY3fdMhUh-i>5bKQP9URz-ua2-m#9p;yr^t*-{tMU6M2z^bfKk?4mx-PB)Bpf`dW%8E9EeeTf3-WsW2F z@hh~ZC>3&Ajhz;WG2Qr9_Uv&pG^{czAi%@5RHgTcrJcR^;S+ zO@sGk);DmfqHlQK9lZ|5ho;z9)}K~uzL!bg_$1DWPL&taVUZ4^?~BXnILNI4)%BV3h zY^|Lw;3Jf^r(kAk&9$g7QG<_5v8ed75_9t2?(RQ}U2}(JTpqmv1LU-E`Wbx%@Zg({ zGEW!cy<>tMP0KR;BF@T)S<}bMMQxvkIT_wWLXOtt!|GTBIsf))ClR`s^a|2NMQZe5 zaQJkD?xfLr33Ty;kR}8uhhD=9HRg=xoX$Z}F*2tQ^R#90ybyEyWwET#>D6v8Rj zS43uo1MQzcsHbi*NU<-*20BeEj>79&5kSxU&7Z_G{{TMf=LF_LWt~!4`lt!eZk7(> zES(N)977A&cbvW3@S?(d)&uY{Q8Dh3=QJ-h^(La1$7*Q7Z6r3O{ZF z!zD*9S8H^Ic($=PVlP*VvXOrPoSJyc%1l_T&^o8Ij`f)77fG^Gg1F6X2(Qjncfn}2 z^b)vW7{pBlyITx{tk_G-;s&PDxXe+E%$lOp`7lgg zfH`rR)IG=ZXY=)=r_9qMf}4@WDx9S6y^b?Mx@-&F)@V86`?cxF#z9ox%btmYxQP!{ zBR=%n+TE>bJhv7Oun7R5bju;e0FI_qEk_Y~IHZ7;Itr@;L@g znaVU3`*oEX-Di~=vlRG%@ujuspwNdzg^FYtk3OxxY-2O#j(%a*NwGf-)sE6b0Y zVq(a;^<+sLrEmz3#u{8R9zByUFCkEe^+!o4_u?>&MiMPy$g(IYBt2}_g8^#Ptn{!b z^9)Pqk!8P9NSv5J@0jhnfZj)eJF;D*`aL5KWC5R3@X>)xF+B^Cdr5jQd?4S7a^Ed| z8{ok=9c7+oDJ)9MpZcMe9Z6Z)AX6?{KjyS!3Jz#mST_>;%UW(_zdnyK`U>(oA1nT1 zw5PqbrjlaJROTaJ(PZ@i82!gX2IOyUQ9$M^r@U?zkm+FUMmgn`V7PGqIFpWkA|HO2mt#m3sWyChK&=YP%Eb*1gr_}vw* zDf+F{b3yEyE0Zrxl!EYwymSC-BIb?d1y1V&cBTK`6P?W`V^fgtM z=P^h(-#jVvG)r|}TP_VWD5-GcSYO|mHxZitq(yZ;zu#{{rJl#{=g&bWR~O>ZOObL=NTU6*Z`pkuQd- zPS}6Ab1-GTEDNVowMa|1^wq$FZ#v36&7!47l+*+j*N|hEC{OyFzlDDC?ZucLG0`=X zCucJB1<8;M(;?r>f?WK~B0xIzyWGWkYwTr(Y-1(ZbBaBt1CUkirA0XmlIUHagG>(~ zt5i5HJFn#_3a|C<=yhmu^U?KJ@qNWrsxHMw0`G*yknX(hUK#ZJQBnLNUQC1TdIZLv zTS1;n@Voj7GVrVoj7tfOJyj|Gk7}&O`5-H$l8&%zr|jB_ii3Dx?A(Gqr`Tf|9ZC|T zI4=*dTW=Zk1`+n^Z8Oh^yAKQX2r}mDloewYn@UsR2~pH%nhKiFhk4D_bBd1>=4#GA z;jLbfsb&Kk4^UbR``d?yLIs5iI;DbdV!gTKMYyAVA`%)VJ`pfR(`r8mUMwXpk(-~= zZ?SV<%7zHpb4vD@6GdNeoF%bjMG5$vg72%Kdjwy3KiCqJi-6B5_{emr_GSr!yY5GM z5saelAl>yL`Ar+GMeW5xJp#4YbFb=7CqzxEx{C>jSsTMsg630i{|+3Q2nN}9D-pcR zAu;-A(D)#gYg)7ME~A@{RSFqZ*gY)Zql?qwMwI7iUTl2#?KklLH0`?{4m+=zBsxz- zt2>7s$-`nJTJ`-puZghJ@Gw{SOGRp>ope54E!AO%6cYc;N;as;{%kAV6sE1O55yc? zB$~7C=-1vD{fgaHzqPy)J~_L*l7g{p1}Lus(`HIN<@I9smTVg?ii=al5pk?JD`9!tk8bLl6GiTn!QVO~0Ms(2PsOk^&T zqN3RC8Cp}ZU+Mm1X|bua8Iixi^Ol_m%3>l!Aj&V5c{+G;OVU9_W^^huayK$EWQ#y4 zy&wQ|4nQvX;ixa+)q*{z*rU>d|15yr9_1jGLadHh3YVraGrqdWCA44Yo>RKVs;`WX zD*C~280BK97W_HIpG|8Di%i1%1$$1hM}?OrzI>;jCW)xK0zaqlvoTtu@=!>hV9zP` z=D~jyrMcv=GD{@|!QQg5H<8Clb%Tty*AM!8k=8h*hK%rCSA5sjkV!(>*-j{*Q_4r^ zamm9$BATvX&nfoa5A4yuHpl}Z0zR7!M##+%@;P7eSumTc_%om%oM!cY`m;k-^cFSQQZTavJU zdvj9+KY^c9_%X0bXS9_;z8jVOLCoS=O;6hxuNigP%mE$O1et{gD}2uEH@4r$`xGO0 zhh-RzM2ysnB4VUo20Sd8jeizmB>sCSrFBaPsSr}9gw%#<6}wwvJrwLY#U4v(k?_G^ zd|S5Y6!19(9|<4j!>lYQ@HIt8DTaV`5xXH4VL2saz6W^I#b5?OB347O8hXwNpH?@D zTcJ*flQwq`McokaIRziHF)8!qJNxlq zASPzbZN$WEnC{X|%zqtpj~Z^AGZ$El%tHK}5{8+A2U#r6H6eUX2_Jbb!8d@+Cz-$kKBwS&37$0_P*vtdUkrVMKBwsW3gY@$ z>Ulpp>ZK@zAWDY-&?x|4tpz`B5m>3~AwGzSV+{pWuy=?xGMo%SXGt$#>kG?SS(4YQ))qgeJ8+2j18mmewy!p5fGh*+%3K0c<@a}nJ3S?sc!}I z3OC8PexDH6ILDJ>pOIc{9ULUaoQbr|^!a+Fvi&EY^v3KPx@Atr>#Tad?ufz^d!&lasrimW%-mohQ}zq!cZqDUW0PVi;t_ zURoBP0HK~{#M|~}@J&bA*O!+O>oa`xjM#fD6&Kfg#8GiU9^CU%%R|VYQ}Rc52?L?` z^WL*v7!J#z*JikR#?m|Abd-I40s1#4*wM5++^UqUELthi-`Avtigr@nph(qyw+5Zd zOBWT*C=a2aEQ&M#TVTtCN*QF4>|i5w(J5WDTdfb$-Qwo~!fAooG!?D4 zY_y%|zVA`%9Gmw$IL#-#f8}`jJ%v76r5_soG5TgH@X1^Gsizl9p^y32_*sQM2#wDV z$7akO_Um<0>?&)$!E=S9qx6|+t4_tw+ll7u_>N=T^8Amr=^LkO(@*KaI9FUsd|lHD z{+d_$)(Xy16Sb&6jW@_s^B{~NX#-0GK->?8!xDFOThoW0bSVMp8&FP?zUDfn!vQ&GqkI08MV(EHCI z%#iM(oYuR=e3O>?3+FN#maxcmmcG%Q76wK%pwP`UzGlnQ_TKBvk#2ep*KF0&P zFTD8uQk+4+>m0nqWH$-oK^W(6AhNLuUlxRW7N6_pndn|ZZ1WUu8eWpXv|XvZGJ0%HVxWnJ|7mWR8JVRIsdUi8%weblj0_v1@spL zuO6gj(A~|`gY56Y>`kJJC)fhefKxH-a3M6enTgFdXAA!3u{7+AYu2iNbsd(7{!%db z8Qf1~O}qI)YjnhxJ_$VdrlZW$rKgc&5DT1Z#Yc&PAnBaXs5ldQ3(5@G1aUJpTE&hd zBB4`}kZ}*+4D!|8i{j*7n(ub^o*i`e`^iR;_V=Tb8V=cUll2Pu!-5FwU07n&w}YKi z4G9j)bf=Ia4nhK*lEBY_wh?|sG%V6w3fKtzoWhSu^xq2jje@*8h+%lfdcKSMoUaS$X5SPpiSPCXW+nYVsAN zS}0q()ydcVT5r1!t;6n7!C;W~rMRbFB1s(7%YcU^YvtTOigY>}MZUgpq4s!lr3HFK8yXpnK#wc26zJIki-`1jPUxP+xoh zr+b^zZ-OLx zP%hB)RajKw;D;avk|^|(L&<;<>gbd@ei`dcr6f$a-HMa|75F)YAGcfKk|SrjHJVIZ zHCP-`h!^In`2fT-;w>vPVYNc*oYFd$JEki-gCc@7{dl+$^xJBeZ1aw1^YtSn*t%Vy zc8S-jf_O`>S0d3lR1uEV4qQMG9_^Iy^~F@WzcQhA=ns}`gC^c6?(M~47>&eLEhNw> z3H)K)1++oGQb?efK+h@kK3Zp+Ch5UYM}?6L(s-tDkT0{(ta9COasGGoC-d|F5F~x# zuOy87+PO`tS)0&KXL1DFD!2C2PBirg3ahnLebV@JjHX-=>$@ZqsQWb}> zY(L*h?P|)WdFg^EAB!Bba9Ve_DDx;tqI_d(^HZ37n*Ba+i0{0*@)}Q4b9y`}_9>0B z@s~Zcu53tDg_ATJ4!q49^Muj#C)#N=>AG`J;?AEVvSC#lCbYQYw`KuidFIKwy2K^! zI$o`FPhbq#UyE}+qBq1%13RK+bVk?)OHWSbmzm(0_j|Qsj zJ_aVB_tNfxGj2Bl;Ufywrae?uMnzkizHjk`>{lIabD5(O<1(r~tys^q*YG@ZDQeF% zP7v%=OOHPKSRvg%!vwS-ditICYDUiPW^vlzi!-TtVo0^bzG^7q!O}qBvKdP~P4_4f z>h@rnPrbuW9dFGc6PsOq9t?!+uimg~TlTBct0?%>%YcU_{uV^^?0!{Ia{JcirYO)t z@|-Hr+$V_Sa@0!?pOIV>p?5RQg^N+3C(3HS3FJ}r>?TLu{&43FkW^~7RCg2(M!nwR zGn=m;AF+;Mh|`JcjB{#HmwBdRyss!&h@CQrOH!%A=YVk7kjpInyh3Okp z>hHAZSF5~w4^pT&%?j^L(T@dS;68OgJ)X^WXe}_FF z9sP=(Rln6JgHNsw`miR;P&~F^;Nuc!K`zk_TnNFQr*AZ_L{sTl3=^K9e0QZvUj^MG_{#gimZ-V{KBwR#(|tR@*II(ExQ|M7m!# zjKy5Vg(76FBM^>w#r_3lhlNCNQ-(v8R3E3orp(?g75i1AKdvjO^8M*zO)#`HH!0Uc z&MMYqUD%xlbSwO&qDZOfqmNg3t@|r;M{v(@VYh8k4i~mRbCdGlMYJP@Thy<6wv}!Q z)7IBV^DZSGY-4R)5DjG_7HLAUdrNi;ydZIG%N4+qO7sK`;}sSH1g>rq9_%k+y_s4u zV)4X{QJ4iAQX)(+=v28s0{x>ektK6_iNufT`&8n`YI3#g7#^05(EgmBA$zXK9-&9`KT3j>c{+G;OVU+@_&Fthti`U2F1_!?m#~%T zUYf_{5sNO-`l2~J2?8=lZ}XYW*N>huPqQ)y&MvyNf|;1r$uBakE>Mh{@5v{okKfW#%?7{z zYzy_}bJ?w(xa>NoyX<^i*Bc0Lcu`deT$ITK(FT%kGn7^S;K?Z=z2x zt0kwBfiKk5IW^^yACCHx03+CQialGq6NO{jFJ*U`XrA_U%+to2zQtm;#b}*frRx7x8(Pn0T zXl0ig2e~fx)60YVV(1gf=all z0S`;&zSiCXKZjIX66&{X>i2+~gOXpbAN2Pkt@DcFA&Q49#lzN_OG4S4Q7E5N%17vN z$-_Y+3a?<#DfZqE?9szJ%F?{t%p^uy@aGhN6->>HMjpjsls+%|E|vn8)v>K%L^Miq zVZA0TLCp_sZKk7xOI(DZC>%ohoKikYebjf8uz!1VQy8zn&nf(9>I3y-X67vcpMcLP z_-t@XvAZQ2uVBw9_E>_AB6YXiJ4kxNARZLV$s{X&h@4FQx8?!zJLb{>G<*h|*BTD8 z0NQgh@%fCLOz)JOOs%zh-pl%&sllVOhVQD_M|uI<7=4AeD(~fbXV05>S3OJ~=3MHC zlupGmPvv3ivb}g4ZDmnqRNupVPE0sVHp0FBAdZIRMpW)S*F}=%&al?3H9+{a7%6E= zTnK$jdQw)kCU^i*g?|bJiV4CL3UxbYn$oY;+tL<;AdyTF4_pRKEIE1^@UY~_1xl3U zeBC4)1V>Tc#?poQ>5Bm&0l=gPbVt8#Zi~En!n!f0rGx_h;_MO%3h19v^?bUzInRLC zt$Hhap3jGQtDA#l;ZLiF+pKXx)bE?HR{R}l77RABJQPbducXjFeY0^TmQ4SC5Aphx z`it_Qw~2fo-cs^{te#C85x68XJiO(|};|5c_;qh3p775zZ-deMi zj4AnKK6yW!g7CN{D6X0*-_womhda+PMp@>c?B9q}s zQj#L;4fdr9lEBX?{8;&y5@8+%VX%h>CNMR5@))0z$J)?ObXR{5e1K8v-7-2H#G`0? zb8EXT^#7bYEH0Us8)TjEa@ed|`1d8r=4+$`_~LN}*0h|5sD`>dOg7&{0mM&ZPICh! zX&DvWFoWROyaAZOw`IT9HyvePU*6bleTEc7--~;f;+(yKCu6tqk*#_I8CS8tKnjen zKRYZ!;Ts`<`S@x!g+5xPA1^L^uBbX4mjU_}`8VX^q za6CwM*Suc^PO05&Zi%0Ifgr_-J}QuUO9AN;G$dQ09d%2dmwI6WKBqD&9X6zv-C`JI z#a>z#{*;g^S@u{ShJaq9Ec@z7{d={fFmq#22zM3!DTo&jlV$$}d>7P($&wF=RD4*p zyoe$;wD9 z&w@Uu=wn3@3VpCVZ%J^DfX^xTY^nfuW_-7}Jp_Et!N&lVB-#zaXw=GiZ{c&@eDkEt z)1`@)ZHutsDK5*>*STXBU<_wS#qO%#8a;zg9!qnJae5FHSVK4^Aex!BWbN0=fP42@ z=H7`zS`eTyddq z!L0T*O2)II3*NwTYGdDC5T^I98og7(YA+qV`@exWvf6YM<=8}Gdm~PQ-KY>L4{HKn z=GX=u(E4)CLi}bDz6FK#QOcVPEX@(xBJB2hqppHoMYrk{8_R+a$iPxYQ)Q+2HpIN_ z)V$1q7OFnIq`z@LDEoV1y4%ej%tT^#9J7*WDAVE-9{&gQaR+$CtAn_VHo~9`HeN{& z@?kLeLs%jyK-xqm#-pAy4|I)xt0%ydVxPAN8%2Ij&hSE zn>QxON7J9^pXq#uM}HpPe)X#mcRZ!3@5<}I!13*%@n9|7H@s8hyPnd6aVf#u0q-Zg zkFR^mgi=HC@vY*+QGax7-q%=KtrhLypiFlPsS765_!xegHdy$9>MSF?@N)npsZbFO zi!_&-hyp*S@MB#jGQR#^4j0Qo@&cHCQx6)0I+FQTn&YyEKHf9L*7JTE?{j=K!fv=* zx{3)ED}JnSJf=x0JoBZws=YgU`sO~6;vh6ja_)Mvwyan@j7zf%BrPR^zIr)HOvQA> z#aIgOW^e>Glsw#$Jv5Z5;^k-Ve{~^9t zBR9^AA{OL&3OKD8I8e(64^=ktdLp;B94;BTUx#Z%g3?b8C1d}BlvT0NZ!Mx#>{nV` zdn~hOTnd|C#(Gm33X>!bW7+9N;OEq#!?bB_lROx*Y|gY=zRjDO&DW2brRm-!R?B&Q zi&n)s=PXrRC?8h`?VL7AR*>i2o|Tz!T_Jl;$sRYj`g&q7j|TB@zuRXHjbt(KE*7Uu ztDSK{j+k$Sos`-P67}PLw9(I_5RnjZFev^WAW8KZPnyk=g|S~51E?mIpGKc7x{K<@ zMOn1z*i$i-s|v$)Yv4|~eTOITLRekze z-{vT^S^BobPC6Svzvu0#_@<-m>&H-c z=Bb~pJFhK6cV5h%lnR23BM_!pE!g>&_kwNOe2Uo|LENBHpRvc%$U@t<6o5CqP6(k4rv?_eJdx>^a4rP2vyx+lPmOK0%*T^u3Ao=8_lTj@CECha&pM z67`LVEuC!viJkirFe_xwDcNJp4DBp&mc$Y@Bj9rizORD75`5+TU`te80iRRwk?9hA zS-E@d!Wu7i|trMQ2btlsqYJc$4 z-h>O;*x$|XnH7F5VK!!clv+?u!3TggjnMMw*;c?w7N1^mEv8ErUmf$eAn-A$Q0v3H zw`Av2Va-li^OvyR3_ut$8){<|X2FIe&kw$TpwvST7;_lxH`>T`(_1N6DCd@N8Q?k|3A#H(BFe6#r{GQ=Q*M0RXAs} z`4FrxJbyI(tISV(c?GW&`}$-~EHo9)sLevN=7D8clwxYdKGp~S8|d}VgI;|m&4OQJ zT?h>G^4wTsgAJo9_SbxUs$=s$qUiC}GlKlbcwg~v*-X$rucW6;pHu3V*Srb$uPPpZy7ag6E@ z<1Z?kw}L-twdg2yTpCB6Y%(-mu6rV|@GF=X`6yl<4a4XoBf$J#9__}c-Hmz?zldK> zEbw{uLxX}3i?8smEi;4uy~#fJ%PL`%O^_Z2>= zFb6@;_HW>QDoaH!5tKrhof2kNq0mt82g6~Mi`i80=M;Z7dOR#LiJ}zjImI3oBHE4e zoqn1mqK^ywoWjor3XRG`A$@{9r`Thq5{iA@Bp7BvxyQoEO_iL+c8SWx0@XXXTx$(` zL0a{FI2Yi;^3qY14}znOI0<&6;(P0oP1boM$iote8-{n@!s5Z-iPDU;uVlNj&$KXF zr;L{N73vtM?4Aer#qT2Ua|%D3rP>ejP%>cze9H#kM9>bafiY-jm~4c5{XvXg7@oR{}W3XEm6vh2C4>y8?a&IH(PX|j9v4TUv zAy!~1I3(W4hZxu(apD?hjYwO(7TuSNvJ~vuIPsp|-A@~xx!O(Bi;zC9z9(Td2uWdE zBn!6Hnvzg9TM<=c*{a9`g~AyA-z|nghP@)o;x*_W&7=X5`>;IMjQ3VHPOn1z9{QT< zV;N3j_7-P@{sQKwzFTHVo@|Qb$7Pn}lUBqnf%Pg-JF=W`kcbUhc&}65`+k6&u?C|o z&CAV967K|mPVraOmgesLs23f!Z4v$)c@dkhA3bHB9#Q={1CI*AsmXMP^P0Dh=OMcp zER%h7)^Jxlwd{zvVdV znYlhQvYso3j9?BvFaz2w1zt>LKyyj>S%vp;!F4;%faWW+PKsSsuNmK~aC8)>t!8X( zhVfcXTzMVeag1D^|FN8S<8*t?Q+lws>a}hW>3bF4N8_jo2g=tVj}r|=7>com3xP{9 zrW(h_*Vjy6nW>{JL1Lt_hWc?5_HS=)3ey(&9g{xZeaEB^x1>#LBmHVE_`vb4q|dXY zk0T}wHp~l|G}!!AfLshV*P8&kHrP;*$jYNzLjHvOIVFEKH>B9z5_^qc&nfm;M3#gP z5emJY&xUENUwY zdP`Axk4YbDAxP;$_n??ayJDUR{XeL@nHL z;`661#&Oa)x8uY^uz%fFrY(u5I8k2nD&JZXiL?nP${i#aYdcPHE7awU=rrIcg+rpg zum<8qArh9t)9FPaAv%atsqtZGb(2sE_K3VCVXs$f&vDN3Mq<;ByMTm!N6TZM<9NMPJN(f+XA>G+Z}6jF}^I>?!1w2oNhooB~S}{ zeETy4wQRQgs27V4b1{6jR$#ytJG%md!W}WA0>gBr1wz19T0qz5>v;nP5p;K4X@P&I zL-TZX1z*2XrqaUnUh_+jz2<&6I@`U-dV_r_PblznsK2-Z&NmeJuL9!1-mTesQ@ z)!f!M2_AgYQRZn@?6nSaH4hNKICjag*L8K4hm5!OR>w4Gt?E;rC*FD16A+6;6AM3 zZ98`}-v1Ux=;oUzWu6`p5j9_alE8x3ElDdJHOBi&6By-HB#>xNdlShi=I5J_W+kW0 zLo6S?9NEE-Fjcw~dMncvyRZ-ol_M)_6oNBlI`M=-4Z5APgw0Rk{7L)ss7MDRz3EA} zOfs4%ufWD9K9}UtL$V{P4YQdl&;?UOj+bSEA0GhP6is#`?C&0wY2FsrA1C6jB;W`r#pqUrQ36V2?arH_Lp%dzVp5j@tF4N9Mm4>c@o_j|^9#f*b?0 zV=EdLwD}l||5K`mR+7iV-Qs;M_&cX3&bv+7?1J5T5Ay!!8IP|_Ba z=7V^TtJPAKvzbdz&1WK){?7upq@-~#=qKHxj;?6Rk+j@#a;u;c_dkR8s0elM2SzT{F1_MBpmDTUN*vLLxv6nhLKZz?($@FXg&bs5#m2#yO4$H2LwH9d)Ao-mqr zDC&pFJ%sq#Vq7@>;~@ZY?N7Xl$NK=S;63gGgo}bbgetuc5MH6-q8~@6ty{HwIy!Cr zq%!Eru>h#>*VEbuW;5+tHf59NH;!-g9nR=T{ z>~6Is**3z4ovYTA|C4Ap2%}M}7${M?y!X8h9~1~-=MH-y_UKpaton~WN|)zBy&0#d zA534rXZ2~G?byCQp-q{xZAeRAc$-!w) zeZ8@rba!dk3EzNjJ#A(bIZ$7SV^Zi{aZ>1#{JjMG8P$ZW6e&=oK&Mh5!x{*^^1k@? z1bR-PXE(PG4$5?=kb! z#q_K-lxnO44UN@aLA%opCWcD)eZ5R$^M1!uFp114C^20)g7eT)QJI1gK3|Vb{|@_$ zvc$|(KcJdc_^0sG=mLiL1{2Q9PqZWvX#YfI+`b$&;e`7d-XQ#uO}ZB*NgT$qU7EnpDg2lM!X?kjOh}(# z&nfn}RUZYwk8ETI#a^2LD4~8>o<`KOg!-LJ=tJryd~`GXZa<5KCF9+TLj>JR(2Ed1 zr^JuN+3A~jrI1Kdfu2+7eH6H()vqj%o)N2`fX^xTX!T>XPj|N{^C(E7d}C|7t$fGx z7^ItTo|Ji-wJ*il3GMLXb?7LjEJv8p*RLJ`X|9NHztjU z9^$p?wlZx*e6W-UD%}_v67r;Pz#@4-nKaX@k%`|~0qyAPAI>GPW^90Y8iC}^x&d{ttUuv>{1}0!MiR2DHtYZFW^sy$ zhD--^Ni3nblUqSo1CVrVQ2_irzKGnlNQXy#T}Os@xc&w_OAQaK0T)CJI!meH!F?^r zZlmP(t<6nQY(%j+mId`q*W|cMAbuc>P8Q_iO%dknl=>P78tQU zi|@mg?}N$gjOW_9FLBgD_MDPEh7!{99A`-^!Gr=nr{Mc4=pMmW-Ve4!)fMnL1s|EN z249eEw}NjA$kfd@Ps%*a3L?}NLi4~NGc+k5b2ZAxzye(1AFk<1u{K`cvn_iQ#o9gq zwDBH)rPz`979n2UNx1dVR{blrM~F-3F2nX2U@+QC zi*jQWX2FK!stW;hN&t_5LB=D?;nRX|r}%yyu;h}D`b8uGguG?Nd<{sLW=R*;q)ED_Ll#K> zbUUYFL;g+@7-#QB1mPemHq6G_Z9#;Ovr_$D>Vck`k#&cUm@i}6tWC2o9K_EQHg$Fd z^kvj!T~U_5;kjbJkx^%UE&u@5XO#z~`zzCXyPvR7;&4Gq^>^Z{b>`e2%76^g-FW!M z6k})V$TQ|N?Fr%s)U92+ahwkdp@X>xXqssn(c@(uaK=76Xk+vhE&v}*4k+JMGth{S z&PJpESOjwMXBq@5cF%{#j?M3!jm8_NQ^h)`v(4PotP#SiG-2-f1FSzU0cc^Fr-K)_ zB(PP(TljK^FlJjaUuJzS>O2;Kl35}EbgGot0&$04Ta;E}E#6VjD8$`#(7Hc_Xv6xJ(*n_XDtd@E zT+^y4orBsi$x@LVh!IdPkz^5Dq%2w4coy=FhF&h=(<16Q74=xWgL>{D9;98Gp0AqW zS=DC0ioX)=X>X$3+dQVe3mcyCb&tyMd`?pzOoI*$&zo=_(>h!9gW)jBC7?lwo>QV{ z^OeFPlem4so>T16u1AkmzSB>WM9j(pKd11cb%jelDi4M93HF>~kCocq0qn)YBHrCA z5$ZCCQ7mR7+TGpAqd^oD(QiXapN=e~W;~|!ZZ6jY5rnl}+52xWhGVl`*-=}N?G)M6 zqFIhR3F1MNYrAzf>~#^i-2}4~V#N|YqC%{7wRGdKdMnPOCMU}DwK`gvzRwTmt&k4a z7Y*vVLOTCWJI)@A=bEUHu7@>EiVKS8+5p~o;~!va9Wi0+RTdMrUIsig@wNo7-M0s6GF-sy^)?bkvFo|fnLY=>kOVT`U-DV-pe!g5%X4SGZlt;)f_n_b7{jm{aa7w zw`S4vG|$X#qFM?Ag^v?sQ;ogDYR$Of`(wOsmI5!Pv}9b*HGW1d8CPAmd9~zDLrbpk zmx?o-p(W${PPCT!@=R9S%Zm6j_YV6SG;h5rUX~8xEZyh_{k>>6{x8rc zxjZ^Zx-F-#jVvG|R=JzrsA!Hb!TDKYSm5zqaYabc;UDwc=x&-%tMxYlil` zh1ZM4{AWj0oZ{=dZ06}>*kFAZRi){tU@nKE;$c&aTf(b_UOJ_hHi@;^-4gSlV9zP` zzJ&EA;e${3dGU(~_?&`|gpZ+{VTw%Cq2!rfKH0C1ruBSWrAHtKPK3zt6ugGYuqfG& zd8YIY7lR;?;!U2=K<6|N`mxsyiu7O@KDZl|Bpf^(S(JnWpzGohg)3g=HxmvfoXa1= z)RZ0rlpd3P&V+J0rJPI^&^DXmR;X((N)coJ!#_ zA$(2=Uk_A|I1hUpc%;`vBOA}E?&C?f3XgvZ2gk%YD>RC6TfpiRthDivOUFex6cJIt z=Nx?W`VKOwOe@fH3cb5nZ$dBIkGTgylS|X0a|<8o=9?#Fo~}tS1Ag@5knBXUswLO% z>||y9KC~Ho5HymNCzG8P6xcA4xcoV+Gw*y9)DicdkU*y-@T7`e7E54*fX^xTtllwz z-YX>(1$<7y_Yx#Ox|Dazyy%O4P|)WTeP4mxN|*9}bks{xK~{8M0iaU=z6ynxaa~!m zQ5+OmGz=xCAIl*qbc(|7K;8u{F!6Bb?|>psTVS^Ek#4?uQs(JWSYY%iF@tc=7cE`W6kSk`%!!R#9R1WH{U!d^K>aLrJyD}@%w8Pz}4~xin zr=vVi^McOl>A;AEZ`{1%%?OFaIX(HLH|7Z#QfBTcud}-D`<~+cwQfGB(6=FxW4@23 zKWTyIDH}JhD;+6v6B?a5jv9FyQ!$bR6DmAbZ99(R{U(q1&lV~_d{v#(Yg+Zd)gXA4 zhV#lqRoWGNqU8V%xzTDRuT(9BKIoi&(o+yH(Waf#pB$U_HI{xCeOimMQbbU5hcw|S zI*&$BEA)7eKU7u&UDJeKd0%Yg0zIb!sP)erK$>JMWK#gGz{xv+U=M;X-za}vprm&PB^fvOSNC%@X4Cp(* zR&RDdu~p%q&HOP8ZS;BSk3KeBl4)=mR=f&~*r+SKEECyWOs3)8-%ZWV22CbT>^;xF zVDt5(!6dsk^|ajs6&YV~M~g zG_%y!357oB${Ihb(1*q?|w6_6W41YHr zRI-hsy7}fwnWtG+E%O8QudFQz6tCHMPMqBHeEwo(`h2}o+5U{663_SRpb`$pPs0kC zpc1^`>PfYYQ>{^6!y2VmYr-0ZYhi*xI=F03?-t^Xe6d>$gRIy~%i=>o<^=r34t4Fs zg-W9lu&6w5JS);}L3XGwV1828;-FXb^EfL}|E190rOyC{)3k64BX#r5lQK`2f)?si z5?XjiUlN)YLDuwx>1+B}vA+mfxFGbg&MK+h9!g|IBMI#gVbv-7Wr;RQXRj0ziz(1^ z3cZg4cdYUoyn2w9L3cM#53=8YG&s$1Mf<=aiK%EQzMs#)mrw3{5GFzIU`Je!8fs#x z)XRVe>IJ4P1%5BriFZteIAVSDc$qlO1(=LEhJvnD0ZVXO2 z*Ez6hB)Jn4AtF;+)Z$Ze&1#(9#Mi0@PQCL6yUl~sk7+4L8^Qe6Vg?`*XBRVI;0;{K zK358D0l{v1p2Y;a;d~61+jGtMO;bL}a|F17koY!Wa|JU^1h{<`SSEuHhdZ)q6V^d= zoS8aKWtlxdG!4I+b9&x6W88iUyq2VN5ESLc{xH3-D@*UhyC`hl-ycLw1Zt8}h3ePW}?BCyXNp9Q(N zZGd ziFJ`!7vccid_l2R6SZw$hn`F5?eByV=4Y09%=?dxR8T55aV3@lz25@#7)%fxgmEfz zpYU9#JeLv9ywSNMYn~2X+>&rUL7;O4G8xh$P~z+bfX)Fp8BfY&WO_YB`@kZw5s}wS z1auuws+n+pl$AwP9%R#-WYJ$hG*-r+pfAV=>r~_{D2n@`%?^1;%&zLM!8a)!S|#E$ zL{u%Kdfr1MCUYYEg2%*IJ*G7b&BwvaMBT9ZmG1j`na1Y*4i;->0a6+-`k! z-E2R8APOI>gNt72ggL$Zy0$sL25t2}#yOBH4AOouh;+5h?l8LF#=&ptzrcfUI?6m< zllTVw=*L0oq{!9cZeGEAw&LcRSDiP%bKR?5%$R+`@L1XR@x2d`=suBa`~|Et?cYT% zas8rxJ5|3wj`gNiQ}l!3Fv`X2EckPZzc;boT=KBUqztTJ&nfokefbt(ZxrO+LEP)6 zSv2g^2$b%}-6-4ILgziuaVSVq%1}7QkW^_euW;DFHl-y^yn#`QI=DtO#@AH_`IqCm zuPsPcgn)3`bf;I4Opo)Z@jYn#T5lU=FgR_#(@&E`Ec9}lIK54*vNb9Xg+vSXoMLak z4ob^*Wrs|Go>S;iGon(SWm(eVk(AsQiYA`6uU%{N=7LO`e+)KB+SB_%9!lVT#~ly?Mrl7*ybMKr-N|0YpS46h~Kh_-$eES%|Kjoc(SFo zjbP6y_Gnunh@-okrn`gaUT{$E zMZ+@g2W6W7rB6Y-ZpM7k3M0FWV!0k5l>S`Sna5(6QJPhZbw;6gT(!=o5puHd5HL0hRwmBdr_oZGK0kSg-N8L?tmDON)~bWUy_fm*iv9XL#{53qg?wzr zlvj03`2}{d_pd%#?AV>ZXYXP^A5U(}PJNA6qn0jtl_sRiKL9KVk75ucl2PReU35+t z$&>@6R7oXI0iRRw*)6-X;#R10Nhy76euig>X22SVIzl8Y#h*;WBJcNuIF&>tA$(2= zUk@yoqI{e)M^h{@0zaqlvzC~+2!|r{3HY3Yk7klVCb{VXJ*UvSi}mJ`BXLO#(1Jau z*yFym6#0r^81~Y`pTqL=rD(fY1UAA^v|X;mQnX!`$)=re0F^@$hK2SyrF}0!-lL0S zx6F&a7+VB=PSN)j@L2jj_oJg;ih2p6b_f8S0`OH>nhC%p?&oPg4I@dN!)id#88ae- zO@u$Q4oedL-T?qk*8l&9poyY>TyF%ruK&-QeAJ7D{R;ba%6@HCz|Af3bqMsFLXSp2 z?jEt9_ny7??6cim7w*`mF^2lEHU252jJ#M&0G+B@$NQ^_uQw~tN1j22?z;EF+S*;u zAEWQBb`HI@C*H;hR#rT4ch4Ksy5o8Ny7z?QTPT5uU8aS*4Nh+PSsQBzXhX^t)(jTJF7lV#2Ztf!3p`E|1=GU{(F^o=Y`5w z=zqfYhnu_nQy^o;3IYz(YGOphJ7*k9Tm+Lb-OrigiUUd^=)++R|AYSKBbi6V8 zXs}!$lLLE4z2#|NmtW@oQvMS-HP8Dk?k}a*DsN?7d3t{-|9u@S;R_y0F#p*4kFBkA zus-Oo;`3GY)LMo9-KYK6zwLeh{x^)#e=jD{4H#MN_*l&sRu%eBuj5O7tUvm=#J=|p zl{e=5_=)&3Ts03@Z4JK`>x2H<$Gnx-)+@i_`^x*VwYAr(G5R0F*S_?`+E06^6P>J8 z>vz3>SBJS)?|q``-1IsX-v1+a*E&B@t*?&J?3r+z@SH5nY5M8YKb4GkVT;INe4euhsbL5dOB?d7p_`W>rXNi?8e&4N`)ytgzFCI zdfgrDf?6<$ds>dYjZby+&66@uyx2s5X;_`H>753h?~n;;rn=%*~a{Cyj6KGuPfX!_#ya2dAxhr zp2oM2*#{W#sP7&;v-!Mx@IG5p+nOVw`@={b;-7H>-&4Ae6GN-muk>}ScsJ;VbL8E? zu`77gcLS~}x-)lM(f3j{sI+{Lf-VK-!w;%?h|AhVs?ytO#?>J@*Jb&H+ddLm0%^Y7Td`fgbn27bH zMl}BVHLvoULEoPo1L63HF@wTn2no;wzG@jKm5m=yQrbruk8U|42HF;^9sj0*%u~n_Hy2Y`%Up z(jdF-MjI^^n1@<&grQEi4jzr6Ml0IN^!d>_GVk?F4WkWS8|%cW+4d&}nYE@t#@JBI zlrs!6{^KF_ksU(OL{s{~^kI>NbjH3qsd~fDwTa`{*n*FZu?0rJ6JrYoom9QSkS6D? ztR{j#pjq*P65vDy9B!Tq_^|@cmUtqC5IQABjP z4Qm0uBI>VRhozTqw?beN?FL~qYE?q6w-AWyFlBz}+%eat_Fcn7Xj%(rYG$F9k0-=$t$LM$XMQm2^!~NM5 z2p>WSoN$0xQ%q5A3LO+S?34{#=UZBoc@#++puXRQ3+rWAKINn7h4i+FiXu*j#TOAb z(lo`4L3yEVdsMwGHU1d-B<7V~~8;y`F!;dq5ZoOf7*DGu)4;lhA> z;{A%9C2{aNmd3DZ_uPCUeuh7Df`eb&bTh%VH-I-Xt8Re`p1^Svx5VC5+}En&d9byc z5YLYLqU3{{MP0~*XxQpSrfXHbPa;ql5T1r4) z+1KqNq*i^*Lp}Df_Cn*wJ|gwSbFZ>Yd!Z-!?}Aj8cOo*I7>h>OFKAnAjY9aG5QhITje?xvQbaEP@AYarx~NLY%xL79)-Fb|)ht688Yu4cf%v?Xi07J9>-f_6ft zMp~+;V8~`)8?FUjgwhqE{EN8Rsd;tZ z_u@<3)HKcG@@S*qwlmt4bH!7> za|*qW0(U^4hm`1N#rY!Oa|%8>U)}-mb@Ql52cs?m#CE#juqdMbMw!REyHTD&2)zQj zh>u@+oKQe{^y0NjFwup>COT)^wy&lnIHe5FmIMzVT~Zf0j#X^cMI=sbF~n7y8baY>Ry1dOMN#;;=?GH(j>x%o$_H?ugPS)dV7R70BSM5i1|-bcc5a~ ziBT`W_)HaKgl&0mO9&2ET)?+P@J%>B-URZ8w)|7~2C7;p0;+|j&N@&bg{E|J$xc-d@Tz|MUM4-{7Gl-1J1Mja#0 z64?M%GXT*sj8H-8V#)C>Uj>1sT!-TS+x>DNDlXSt*sd$K`w6&swaB;oj98Y1?>gnX zU&4BGyUNiX>TPa}!YtU3*nGjDQw$zK@I!e*ZOirGBDJ@=Eh4!5G=-pLt6xT8cLNnGsyXM2%N-Q zw-^Rlv6q&`2gTEi^|;=eNCktiZWR~^`mI{Yg2G(BfcbfYH^Tis1sXfee{Y!+@;u*k zlzn}9Gd=W~+JeDAl*IQnlHJVZgP^6MrkBblyPaMIuEBpR(^s5pQN9qy`XT8BzTcv_ zA9jQAm4jiwY>PPE;@7hI`VrT+ZkHF4`UD?6BCi-*UJxPt8m`}XBv{$~#pHqR4x-OUe)hIdm8VKri_WJcGdG4)_>C9Z!VL_FaKFq!ED@r04#H5y_ z^<@6VOPM7~9y4xuahg*O+3T+k5GT z=L$!s5d~J^1H~C0i~?KGHt?8y&XVVU2&}Rc@I*>LA{hY>gV$?O?`;VJBr^g?B3OY{ zQbVy2AQNLzmi0m$2N_^ZmZ7}RSV*4T(}mx(y-*5*2>e_rFDwW`ybZ!`k(%OzVlLD- zzED6z|4zcJNC6jQviSvY7wXJqmgLDT;kkminTbzJkoOdLF7>HVmgePVCb8ES)Q?5q zs7WLgS*Y4mx-aza8GGGSz#o^q2tyJ01ba^Hg%tRxZzN&=_U5LLK7pT8_}Q?)qzuJX zBG_|^J(50fUN1Q+ULCaUZ+NR_=a(bL*r1~VvG%>!&6ybo!OPlt&OSS6%^YJzKZtJX z5oN$%p?u>Tr`!CVs@I>6j8o)4j+&^#`r*0)P2BH)FD}=#%kFl40X^SzlzrWv>b|DW zqCOQpmMJG}z`NG6i6Fp5QR6mkrLz4epY+D;8?>2|@j9!X?|X_TwmuERw|Qf}kETCq zf#e##x8nO)6E+La%6r)}@Vtq4XTozH_nkjS{MPE#ci(kv5r<{C?_TpN->NV~*F@3& zyTC1JX;vQH5+TyuBVsWGAaq-D#ElKGE_SyirBkryRET6bO%gu%ik}z5wSdnl_(=G) z1`~yG(5As`*8~^>pKi)Ld0xBdXcP!CcQnO^g^G@x5Tf8YHJC@UFXt7~T5u_s5vh;^ z8w@(zjgU_qlxg0Lf_!lF#TE@lV5pH#{mWByuiw$Hy)pU~yQ_X{Kp{T4TAOn&!Fl&9 zn3GFd92J9fcV>cm9A^>y>z^{PMlJ^EEEF<;%1$<7y$7DOI!09N; z2f@+y1|Fikco!@j^ocb^K&e-a1rZT&VG+~sgpZkYFDq_^x|o~j9FirXwR_%XwUUe8 z(sT~8nu9o%ible7o$}lss2-VXoU@pl#2N_voWjq#+~Oh}ioPM>a}GXwWCxiPu@vYz zh2CAPH`(q^5D(yIYult#R9vi&sJIJLaleAa~p&jbR4jSz}lX(~kMp8P}cu6+33u z`Jgn?nPXTGgU z4`$qN&3oyrv7DFpRrB8Z;Zx?FcP!`Seb&6!PCMUu$8uiYFU@=Aw0Y+p%Xx{{CT35Y z_dH{X@g~lH{FL=2)|+_$_f8p0%r|lW|IDCe!~?P4#Q&`s_chmn_dxSLc>fG+a^CZd z<$cqP5BvF_nQ;yrd$&I9*t;{va((9=%Xwd_4?FL>XRI&B{^|O# zV?TGwIh<$g`!O#MJMZX}d0)mj9(L^CJ!R|uLL#`3rQP<`03H&3~T&NKEE%*(^h z`yDgxAzrtnKIR!a#8@6@jpc7k>%)%yu2at8JY!$Qygcl@{|P#_ukgNY{B8H^!+!pc zW?VO(?~l}n9s74?Tnmo<(fY7sUzss4&tcxNocG7;!_NDkpK=a=8Dn{zHJ0b_SL(x# zorMRU!+%;IcI>BT+?$+t-m#qb^Yvlp{V&n6eTC0#w*8V=Rxe#&R9L7lU}%vH#AD^X1qVF^Gp9`@c5&3ZL7?u^-20 zJnYyzGqA(oHt$%@OJ36CCvQ1r9nLfM*Dx;+d%ma9)L+LS9(L^CKV{8+2ZMOnvEOmZ zI-F-*0!h=(0Zh1&KNKDUiybzWM7*05wu+gP5% z^w?Q)D(79{JdL?NKVyA4@ATN8o-vm5b}%Oodye0J3U;Q){=$rTc@AHPIeFN5Uz#zN z=kNr^@vvi`J7s*jpzFoe8$6`!)f!*JC^gl z9dq)q^ZwOFU)dADGtYP4v7GlEn1_d*_fzQDzQX6Wao+Qc{T9s0!_F0-f}M9_91lD8 zKRD%D_!!5-jy>(ZxPfsz?AX)f-+9M!&Hgy%42-m#qbFJMj{^UQmmu^-2rJnX!G zbOtZvIs7Wd@vvk6!&BC5-m#qbf5eX^F_dfG8eDL>+5DzyUg2 z3^RoqWNfrn9BVshu`o_`7+y{tWUlvb=a)Xall8gp$3L6r^;+aE>$=x(t?T+;-|Mh` zcXF((b-!rVH1@Tgz0jF;kCnCVznL|SecfMNoXxt&%3AlAXH8>Y_Zv=qKAHLb&$`FT zTKBik7mR(~KN0I5D{I|5W=&&X_Z4BcV`Z&-=d5Y$>)spd9xH3zzcgza`?|j~>~^fI zb-#bsH1>6WDD-=*taX22)-?8Yzj=XQvOhR-#v$1eIrl^Je~exBd*;Lb`DEtzKeB&& z{*STG*B*X&`^EGw`__f*Ecf^& z_90nk`|w|VW$d!$L&wTm_akOqV_&y?=vZ0n{+?OW*w=j^Y;mltbuY}C#=h=*13Smc zTK9Fcrm?TPs$1CYEV4g6Ya08yeE6l7zUcgu9^N%_#xDC%aMZD~*8RCz)7aPjTe0q0WdGf)Y3%EM^?cYrpUiXjKYQ@6 zPdE1YZ&~bt>{G~{lKq>Z-?PX*Z`L&SJ$!ZG_p?UM*k%9pLe_r2XylAt_Tv_^uyYpK z*UXy6zV1I*=*+r*cI1p*cEyuq|J=wK$H=~8;H*$kCnCVXV03(zV7FRe$OKNyJt;fU-t__zpooPW0(E9#UAYUFOQtD%dYs0 zem`$s8a8&>e;hva4I^jlvVUu_Uwe4>$Qirrf4h*ihht@}`wO$Cv9J3b^I`vdGV}YN zbEhht?ooXwh_eQMpG44u7rwfLX z8N2MuV%=k9t^1l;)7aO2TIk^{vOh9w8vD9WU94*lKRR;8F1ykLTRc2+#x7fTUq3!_ z#xb(*9yw!|UG)a-;a`uOvCIDaeAqvq%>4f6Y@aqS3mg0VUtHMOy2r{|_w#2>V_$cL zb?cr*_Akwv#=h=X#D3p2a>g$E>lQY)ho2ZZ=N(`|yHG?BQ5h>)tkN8vDARve<)lkCnCV%V$kvU-xNYw_|0k z`|zx3?CXBSV!veHG;+o+d-@%$lbPTDob6ay>;A;7Y3%D>o)7!ylYPmP@W&mw#6tZVG+{==}vbt7l&veke1?vXQg+0S11o3s7Zku!GL)AuwdGr#|B z`W?BSI3@d@`O^NqlU;EBNxvU7KlU;9`JV~dKQeO0E_?dU;r-XWapa6$c6By;xOL== zUH0!U?B;Cm7&&8?t#|X!BKz)H)7aO&Zs8a9`|~4b?6Tfn+drSygZ<8bDQ+A4{2dEf z>mDm>-H)FCW9;jGT&#PntabnJ{2yaqx89XFi|qBYrm?U4oCVhD;ljunyX;RbWJl!O zx6J=BcG>ra9?l~B?X#w_uloZFOxo{%H*&@?vTq$ZW0!r=f=fo^+}q~=7`yDMW+40f z=f`%&F8evL-(zL1d+V%e?CX}@j+M3UZL_AauX|(c_gGo${x`Fxv9Ejj9e|UW-~ZU{ zSXt}7Vb(PEb^q>s*gv1_i_Sl-d#tQ=e`eM+_O&YSJ66`ZUp_xRGxl{KT=&nGj#|FPRyWM4LG z8v9z$2>sqNa>gN9`+fDu8N2M)$GT^c{nN9iv9J4~vF@K6IpdJ5{l0nRj9vC;0>5XG zee0}g?CbvBSoa+xXY8_H7-#$6N6y$~pS6&6wtqEp#xA?s1KFP+Ib)ao{KdL(cC4&* z|BqSI*w_8;MLf3dv9i|vnE8ROv9J4AW537BTK8jTP2-q#&m#Mov!=1Hdu{N}e=%~# zF8eWYwl5wzg$E zcNRLc-)lzB*kxZB`#p>7@0m4?eceB_u(3V7bL5O&_Kl1E@{40-t^1Yp19M|v_c?L4 zv&h~&Ya08yPhFhNe$S7bvCBR!WG|1LvCICM#eSXb)$>DlW0(E(kbTX_8HZ%;_h&}V z*kxZE`~CTmGj`c;2-z3R5ABUz_Dv!CDI;eblBI{cN6y$~PrpNWGV}YNvzhRYo{)Xd$QirrzYp189yw!| ztvx(*{>352F8j-Yvrig1W0(ED`LKU}|Fb=R#p8$aklrDt@rR=JZl>Jy7$h9{qxDJ zwf|Z7SXujh$*gJYYkhsJd#tQ=Upi|V`?{}QtV{L}kDRf~er?G9mm_EFvMc>s_xh1D zcG*`f)}^x_898H@{TmDHkp162=E~S*>)z>~jjXZD{-MD7zaBYbmwmxv56<>)N6y$~ z-xKSeMfMFJJ3WXQ`?}S$`3ECs?6PlM?7@C-{0&#eF8lKfS^7Oz*1G>-);0EZKP=Wg zi|o5*O=DlTe(!Yh8_%6HcG+KuSopg}&e&!DYS{R{7&&8?{nm&9XOaE9S<~3peI#`D z`6Fi>Bl~3|XY8^+9P57h$Qirr&x9WS;K&)f>{~()XOX>m)-?8Y|83aq^&@BOvUQjL z%_C>*vY#JkdvN58UG}95S$=V>EWh|uv!-#(x@VF7mRZx-*L_LY;xCMxvCCc;`u%~C zGj`e1?+=fhaY&XPestuFUDkinY5#mO^ZOtD{=Jbi_WAR%-~W5$j9vC!3#{A2)1P}~ z?6O}RdpL{ijkB(?uUqeM-aK-~F|z-D!U_p!3p{Vl)g%GlTa z9Si-k+gW5kch)ubbzcN>ku#2w{gII~cG=p)kB*$N%hn$L-N+fc?8C9&|7YZkUABJ5 z`tL{1*k!-`KY8EhlhObF$8Mkayengu{oC_l|9r9w&Oh1hEV7?8>l*u7D}S@@^GD9u zWmh#0*-suhW0x&keA>tvyX>P2Jy`ceBWLWgwTG9CoN^F^^aY)wLUN>^aF8c%XVgG!x zD`Ec0ZpX@6_b<$v#=ch70cVl@OS7i2ulpepW8XM(#x7ep`==vk?6RwW?}4+uYvhbw z_Im>B$I4pwJ+r2@2b;v!=1HTW7m&-ZyPydmwk80e&)y-yX?PM z$kM}uBWLWg&kQ}BMfRW1n#R8FDwlJ%cZ{5IjO@P{Ib)YCj`~xdF!kGvUG{JPs`q_9 zndk0*_HY*2@0~S`ecjbv9sT~`$Qirrvp?v4pHKD;%s-!Y23hO=#H?xT>%Mh9?4M6& ze*d%XS!AE~iL;j(`&t#VK5XQSV`M*R=!QfYY%6Uea0uvzsF_9zV7P%RC{>#^RJ9uw(hgeBKyd! zYwYW;^x$m&=990CU3T^Fak1Z9e)E;F%f4=*U+bPl_OH#l#=h=HEY`J$H;!pUi8?6SXcAxjTm@n2{GnIPzoTZxF8h|n z9_;t2_g@*i>?baAd$J$@Kv0pkn zR@S<={!drNzV6L&wzJ57$=@B{oUyN4b@%TdIpY}FmyDdT%l=U4;dyVG_u6LcvhSP^ z`{$E6`~F8~|Mn-ZjD7xTPhHD?<-6xSu^GGUr-xsB_pJTrXY8`|@0UAPmfgO6{NVKO zi@quLd#tQ=uYJb3bDuh6-*5f97mk&+?hie4{+&=W_I2MB`#o0Hx_@Hc8~>9t_H|GH zd-P6be*a_Rv&eb}`nylPd;4W!`%cOJj)kl}94qT=pE&P0e$uJ;94j|Ei|pT- zcLsm#)O&+>2dBPn-urs}sdvBrY}oCm=Y59%_0&5JzhR*VXZxE|H$60Cw_EweS!Dmv zr_K9GGxl{qGWPJM7ft;?W0!r!LYCc*m320G$(PR9*R6kF&{<^v_^kcFjD6kuZw-9q z==R1_`h8%&w14kp*4Y1??T_C!>(1Ec?+Y7$)g9-~U7B%7mLC4#-<@~RX6&-7_+}5s z%3AkD<7=OP%HO_i9-Wajrj>z+mSGw0pZ&pGve>W772(Ci5l4%m37=dcJDu z@0%L(2WIT&sao$FKI7cEKQ?2RUDbMY_DRF(FF2CdkCnCVpZ~b|ZwJoU_fY@d@w3SO z?;k&RC^PnTSG`O&zV2J+J*FAE>|cwV;Mb1LKI)X+R_}p0+qw5nA7;kB?tdP5xMBG8 z;weu3<01PsA2oMnGxl{?xu>(;HEX{5)Vlvutoy(Gm-8<6jD6kG!*~AD+@sIfWxqXq z{@mrcLz%J5eogG*LuRknpW5$A5AB-b?q~ef}7w*~P^H(9y@cc=H`c!I<$b-go})3pc#- zn0*kxbn9&|yXUw=KArei-Fw5OTaTB&@3y<|x$Q{!fAFk--z#pqaPiLb$2|Z_?t8^? zvW$5K(N`T_b?9Wfd>c=>>z>EW^EnHaAx(iJea{`I(E8aSPa(J7d&~KIF5LLO?fm`t z0vO)$Rrj91_i-5h_QBc?g_D`x|7-^g@4n%V_bpw*^mpmjJNC6o)Vf!laV2ccss7KM zzwi8=_uO^y!iD#3WkuG$;*@vYcGnRg*`+UCyy^DCYtOQe|9#$kqNC5cYd`Td=Jx;b zeY5iZ`NYIye;#;<; z-&}kRvV851i}&7n&%W+a-{f;Qo(c|Eed&i6kF(1gZ@cs6^P0umIj;KJBa5%$r)#c! zZ$3SK{=c^ncc^P_{iDZ!VJe?<*W7pK&BuQOT1Wb2cieOR9k*S&=?OLWQ;Y4v#*KHq z>P@RX{;S2q zwl7`0`G%SP|081MUl{bJi+8^4wo`e;Ra^Yf1v_qvyzAae=bsquA6s9$iX*Rj+Mk(2 z?E62Nt?hps(ckc@dv9O)a?_C}5GZ*{x!1FiV{mQ#eh4QO*`jz#?m)&;X z4W|<2tG;-{;)_WB{3~8|!xQWCC5vzIfwO)GP+m5c+ZBD)_P%NHAd2**8!z1cAN9SP z?z!+E@x6OSBadeSSMBq4i+wWOEjQdeF@EvI6;f#OR33KK!&cg-l=;qGlc_%8;a1F+&!$zlzT>`yKE7qKLyx-irc?Rj zQ5yu7I~Pw{9m@9RJC7HQM?L7VFWtPGiJ)f^zZh8*aLA ze(kNlwD_)5-gU!&3{GaRH$88@O+8nc{7c8SyUtE#a{sfRgN{`%SS{=E|ukNs_#;O#eDxNzx}cU-mj^A}&>_}AQi)5W{bTVY@F z_b#?VQPAG+r~Z*W7*AO{drXn1xEV~7FHvo+6 zHCxhh@$`m1eDRg-0KPJTdvHXo! zDSP$s`L`fk_3-)by%)}3y8h+ibls;__K zLiz7+yt^*`(eo2DUUvOWcU<-T)e+`W{;J2{JvrLNJ8pZ``Rnhy;rdH=-Eh-YidY@u z{UI<(_uZq6^S7SAaM$^(SZuYA#~u6qnCzn#=l;-r-`MQlJ8yf%{O`wg{n3jrJ==s$nQ#k*g5dV$}tSYSWYeYagrx2uRalydHx zSDe4f>wf?IKlfO4;-QcIiB@-Ax@UZKpS>#R{=vo9Z0YXvw~c)k`N%32oFksQ`{F8@ zUKPQ1dH2POs~qjS7P}O8CPa-BobK>lb->gA3C)uc-~W8|()pY2z5BL%Ub#5p-&s6W z#&GHU@btZ_3U2jH%DHsMsRr#;TU~WOwr|~a?_!s~xY*_Ptyiv6<>$`y4v3T4)&4h& zotwb+_~+23U{L~v+;cPeRt^ZP4nz;2>V=^y?^nqSwH{7XU>0uX|+H0e^z{-{oWG# zdCuVLRe`S`oA3M2t*xHVzIA^1dT)H6{(d3+%l;pYdH5)N|C_PD|IF!X|6f10{ifL8 zgM*I?2kiHyVITJW(!uEJ`TxsM?7xilfA8q0{FDAmfB5Oc!vE>_9|bj&fc{HOQ_fByQgujfAy z_Q5ZeKhSUC*YiIz&PTtug#O^S&L@8;e&=78;`!Tr=!gCOY1of`o<2HU`5*uJ)&uq{ z|K%Sq4*OgfetK{4AN_xH@C*IFJoZQbwLkH#_#1wIB*M>|eAtJ76#lmPc)s{o`W62w|AXIu9`S*F-WdAlAFl}f;P*!l=;y&W zpZHt$7hmdp>|gmGd{=z|zr`==m(LCS@$c^p{lRb5KlWewAOC%B;A@)?`@r`v#ytKy z6u;jZ_VfIYi+T7h{mNgS5&MJRpAG({|L+QZ;a`Pc`mg*Df7}rGw*P0w`QfYhQ~XN& z&;GwQ?9c!HN$ijQ>-qSj@+ar3`kQ^K{>Lv>U*Z3%PuQpOt8G5;abe=4*3c?Gt3Rtg zRUcP;#ZRR__^JBa`KvyV-<5yZf7NH(eE1jp9;&aa{uTeeBk+&k%f8NE^#%Ve{Ih@M zXY^P82_L_DWLEf)|CIj4$LxR1`cI!TuGZ(jZx8?V{MtYNtNNJ!3t#Hn!Z-h|`iOpu zAKen1tN&-(zXX5Pzo7r(U;g(cQNO`o)sOh6?qBfhq57}tNBFD!nf@w&5dW(`AikG>JAc)m z@KgSS|BD~-Q}sW#`N$vPtLzIuPY-^TKYUNbPxh<&5&sl_(NFm|{S<$)Z{;82OX(N> zEB@f$!YBXu1B3CE|HDVs$M~)KW7~Y_AO5SpkbhNuOh2Vx_%Hs!zg6GEU+EV=Rexri zA04jr%YUms!hVHM=PP~?A1eREZ*_mge$~HYzp6jrzxbPes(%E3RsV1Ekw4;>>i_V+ z%CF$7_D}!izxbj2W1A2ExG?KK=Rka}{W_j^~*oyht*%k zpQS(kRp;C0<9z(P`a_;y=NDh9{`LGiKm1kw&VTCui+v99OW{-gQuXsTKR&*~Cw{N~ z9sYUl$gI9ke^tM#uPgthpSpi?e^T|c_*3~W{;B>0e3bs3?@;|&=M&$mezxT2Hd?j---&bVJQMbQedF=0G{@4Eb{!^bXpZa|6Desdx zIraJeQ=c!N`fQ{7nkT0|-+$`!bHm|6|cpk z^0yy;vgv#D_3;CoF&QXq<7EE1|H%)ke~UjWer)p*Kk#GK_xPv!2l%J*ch5f*KdS!6 zPj$X+KF)`~s(zLKReuRyi$6TS&S(AV58=1c|2qZ<A-7m_oieI<+;8*sq`k4JI zf0jQL|KpqL&*7WupKSBdKaqdla-jcJ^|$!&`~&qz-9N~m>iqCg{T=6ua)mQXa{R#e6`r$uyzem4^>c8?|`A7BN z;P+5{{=Bi#%KqxZ%D>dVb-z!)Re!-p#V7n!_`x4lA8zwwgVp)uU)3L%Usrz2{$)S@ zeQoF$eye}6&5sRN`=|eUKVh4X_$7a?{)PBj{PN%d{fKXcPx|@P1N>M0XZ~INH~1-h z;7b$ zpFOP3&pzcJ@|UVFod36f$a;PLQT6RMANhg!^3{=_%MU9*g8!<&@Jr=y+x+Nwr9bA&g|_^SF{{#5*hpUOYrr|w_ySLtt?5B;%E)o=W}>JR*1zfW+! z@-O~h^^yHmeTTme-7lB^`G3Vf_^$ZQ|E`;{!Vmtc{6_q!{u}+iHTnJKzHIe+03zUzK~eTu)f`LHkh)qN^{D}JHh zIzRnY{Q@5q-|4T;x6Q}-=(q3zUsXTSf88&@U)6WpeAIXNwfd9zrRsnDQT`>qSA8ab ztNsl96u*hThwA6b58$i(-~OxqqMzzdz(?&LKiBUI;HT`n&4+#2zv?sRFaPJCb^o}{ zNB$2VU-sMP!+z?I>d)cV>YvCzE5BmDIzN0BKl87`5C1Cv z6~F8LM*MqpYLpc}IA7&A@KyCO{8xPoU&SBnSNh@KRe!3lzI`yXIv@L2|BC&qzk%U5f0ch;82y}|GpynR{;U4pHa|YR`aXUseq^6R`2CCFf9k{PPt$+Z zXZ)w)JN(xDFaNCb@sGkM{1txiL-~jO9lHOl`hkAl7WD&sR(-$CM}5zKYya?3{!M>{ zfBGr^f$x_GzPI^VV})P(t@~T}E&Sl$zcL)VT3>vu`V7BR|HuAspRrnBepLMj_$~d* zA1c4x=EFbPzwDzvuKs}h<6P)Z{HpjbepP)1|5e{uzv8$2rS7l9|I*(!ANphe>Oaw6 z)z{m6zhU zt@bZ}ss51j7k|NT*^m9}{suo){lmX5%^p_gQ-4?eOMg!fei6S4zv6HCCwx|Y#Q)0w z#i!~&uwUsP{;U4rpB4YN`Oq(XRDTV>Reytis{X?7)t{2zR{zufZ=bQk2mdbp^WW+p z!1p11-Zy7hJs*DmXzb7VzG!sh`>QohX6^&&_rr(!5mnFOqvG>zKKPuytDnH%i_iT2 z_(^52f!-@3zu|wC|KQi+pKU()NB&v)<2E1suD+=HA3s%nji0LjC%zxzuj=39_rmiw zA9%*U)nB6D;z#kh?g#Zxsy-3livPv8>MzNE>iq=qt@;Pzd;NaH`3~JL7Qc&s)!!6f z>iqOq^~p9L^@;dU{dfAQ{($KEs${wF@I_z7R-|NNu;hyCmQ1^iO^A3m@Cll=Hc zB0q+Yx*x<3)xUV~fPVRJ>5qM?zTw~1e}kW@Klo?ygZ$*{g5S6KvEeE=;osH2liwfe z57hZR|Nc3{>iP2j>hHi$KFcB{K3CoJu<8PL25$>JM)7(I2G0;veTL{*xcn`xX4R@^|N} z{xy7*e(_)N|BFYz#eeKm{XhDv{-6Doe#D3B@40G=U>$?u)oS**suC~>{I-N|EfQ1{}0Sq?SGq( z{13lBcXYJ+KK)hxhTkeb=l{ho+kEf~d{sXQKUDtCzbiiA@2ZdKzxvDYQS~MNuJdp6 zaen+-{;|!^9#{6$AF2A@`4834#V`1y^v}M8JctepdI>`0tSa zy)OIAPSlkt%cl=}zvEPs)Y zRXM!Gu>Tlxr z>W_(Em0!YR^+)l4I3;}#Si&G*_VDQf8FLIzVg@l{TzO+ z{?s-f@yGd!|M5-PXPXcEuwTW0_W6eqU+lm7OV6I~R{v_75BrP1Re#Fwick4}^{>RQ z^uNK!w}t)bxAZ5!s{P@I!pAlr_`rYV-|$oXL;uxZqW`KN@pIi@@t?|1ov-lYeC40p zeAq|+Q}qFS9O{o1KRSQiZ>i6!e}f;Z|B2rZ_1~($0)MrC{{2tF|IGhP#5eWJq5JRZ zk2qiTuk`2MID1&dSNg5~1$-3#_(%EQHXr^cepi2*|5San%}0GCK39Lz{>p#kHTe6L-l>( z2Y*)lVZZWk{9g4l{2j{A-WmN(_OJTb^Q%4;zYE{^weAn-zs@f|ul_51SN}(RD*N&O z>R;M_-4Ecu>JRYW%AdCRz(4*k{qmomjqmf{>OawM^=Ij~`WyJU@XbH#{M&r&AHP(6 zK!270*nidY@Llx_{Z)U&{wlv$U)1lfoWJ%jzb$<7|3mpl)t}-|`3L<}{UE--IqDPm zI@I5*`hb5{KZX7)KgPes|L{}!jr~{u4S$z^!e7;Q+kEIx{Hyqezbn6ouR0(6RDOV; z51p^-C-|xSlzprIhX1lZ|E&6t{i^?fzX~7X|DpW2^6Lw;{u^cwtNd4d`EN!?=2tQ& zGxvegU*)fruW$2_uj`*ane+u8)xX^4BfqB4L-j@Fm-waXpKU(sAN6J3AM%ffW~{J} zpDX{A-<5yj&&ofx`N%);XXyt&6@TH^%1_15djEm`>i%n+4}ZbGRex>s2hLymXTR?s z9jxq!f2)6^KCb=%`&52Jzm=cL&#Qj*{mKv7=dFQn_^kYqe^hl&8uksJ)J5;|^ea${~KW_iEKlN+jPySf(oBpeQg|Ev0w)x2a z;P+7dR{at6W1SB^zGQT`@?Z7kdt)Act3NOPRDD6e#sB=L>Kpp2{1ZR@Xyjk?TlF1$ zSN`h!)qjT1L-%{dpPpa&CHwt>;BWbD;g^3_eB(cLe&4V7;QO_I_PIP`g+KXy)xXYH z_z_>KK83HUf7B;czuW(h%`;Z}m!DPtihV0SZ}VYa^=J7v{S>~~ulOClt3S-Xwf}8C z_D?_6f8w82->FaQ{P?-*SM}YY{Pf4ezWlrHci6AuH~+2QCv5YfKm0uZ>EI>)*tg=J z{I&3nUn{@hpH-jpugZVvzw+B{e%4s|7krg|#rN`m_N)6V@u}hm`&RxU|E>Ow`lay4 z|EfRFf2zMG{@3~8=T`^5*{||z`mgiDPvuAUU;Q=uDST}6fe+_<`mC|SkMmXj4}X=P z!++I(@}J7D;p=kvulQB((j9BzWhV{ zeI)b;U)BHPpVc4O=7WFPr|LuTtLhi_xg7h4&#E7``FY05e)yyM>+oIqJN=jcZS&!O z&mR0#{eXY#{tSL9{<6=*v&QQD@}ooi_iN^itM9{q-g&{_~T`Uh?bmANfV$8^0gom*Ri^QT;>t zalOAUzWv&$|M_p_kMftQANY6iKYpwGSNv7|G5RaK@|WUA@$u0aD{f)G+CTl)``h$a z`5%9({*wBm{7w9<`X8TEe+3`Z{lzvP{ayAgz7n4*|G_s^KZ~E`AJ(t@hW%=P^k4lU z@v;2Z{tAEMd)1%pTlVMQ)xYE))t}-YrC;%)>R0?$=lA^TZ|N^o|ABuNKJe3Xf}h~C z?hoLr>O=S~|KML$zr)8Nez+_0FXu1(!cWzo@KgBZ|J8rtA9a5GR`379Pt~vXU-hN> zu=*?TSNhdosQelJ%l;Qe|Nm@sxZ;2O^5~4!Jp5OGkp8QG0zbu1_@(@peycux@PK~s zU-j3v`N-e-N7eV@d)+Up|Eqpw|I!crSN{$_)cuI(SN*olNBxGMo*VeVKUH7ipYl)m zd}pk`&CfGd_{1-d27ckI`~$wK{=+|opKU(ygMaG${G<4Zeyg6L-||29t^68)l>ONM zd7)qS`4_Xs%0A+I^*{Mf-EZ=b(hvWr{ulk1ew^>)M`pEu{#Exw@Kg1L{Z;=Ae^&oP zeERActNpQG;Y0kY`i1_V9_x!gmEXyKsy?*;dVgB{srUr{mA`NEk-v)%wSV|MEZhEBnhos(*psiy!2dRX^j;vOoW;_`A)|8CUp#ui{tn zx%?Y`4&5)6{ov!_s6W`h@<;wv{U7n8^l$%%?vJW|6F;i{gOBRJ;O|5C<7FTCEd8*5 z#drFv{*V0V5Wb7Q;Jf+<;!oA@{I~QEpN0QzKJd@~i$Avc;1Bq%{vUp;`Ut)&e}&)D zFaE!Fbg=So_AC6UkE*`4{-*~2^Pjrk+UDmOtNp=mogaRxe*iyKf6HI${p)Q$@+bHy z|9Q^Xx9T_ct^5-I7C(vKmH*Ih-KXHEs{im)^?%^E>M#6K`2qha|7HKukNs7DNB&p& ztN2;^m48+J4_{T^V6wOi+}8|;yeF1 zRDV_dhQA7*{Il@q`-LC;QvHE#etc|YANV??pNh}$RrN7^mHzlw;ZOcq_=b<_5Ay#* z^-<+N{Hyu{@c%g@v(m5nx9U6bvCe1x-#!>vt&czJegS@~KH`5>f8n>%&xP6ke~A6D zPxTMkr|K8_ul@l4t@w*yD?h^@&z&_^`lY|D59aKL`Xi-(_N)HB=U0Buf6BkapXz_e zpQ?VN-->VaTlowBE&stERUhJy(m(&WZZNpAAACObDeHOoto|K*R(`$BM}94Ts{Doj zmwueT>@PkP{^-B_$N8&2D1H_{v0v49^3!_%9RFM!_QOA=Kj$xe!)N6`@L%;Ee)xnL zD}1Rxt3QRmsy=4_vJZU!?!mz7`S_vgmu)`k7yMED#6DF&$sYU{k>@RSo*8_gMNyC;Iq!hzpB5w%}0I)pH)BNpQ=yPHx-}pOW|jmKY*X&C;BP- z;O7q>9j)xc{#F0;&$=HKzbb!`pH=;ZKPtb)kHz2cUGK-!Z{bgVQ1>VNv+6JWU;IP= z&y4uE&5sRM_JQB(UpjxiU(Y|kVD_+DAHS4-`G4iF__fZ@e#O7yTh-s{xAHIfSM_hU z`O(qp{PbJ>P5xc^4gMoYR`u&PAN(l(R)0zSt^NRf*8BPN zQ~t^Ss{Z3Y&kFy+Z`B`wzeDwTg>Uw+ z{t|w#`p^C^#gzu`q_-Dm8{B`Zftk!qF>QCXX;y3Z7>@Pl6{sKQ$pVH5V zf5dwK&R6*(|Eu?_?XU6&{8aiA|H}XISLu)aDn4%W;ot06{WJ0J%SOj5`@?V5*ZlXo zzz_YD{_$h=Kg7?{AAA))#IJundvLzh8Bb;oiO-|9zh8Om?_~bh{`vk>pD&;Kd~R}= zUFPJ}=lf56zI^JlO*}4t>ht}lK3_id`P@@a$)Eas|EbTHPknyJ?5+IW?>C-I`oIq# z8UBGktN!F4Uok#3CSmGroXkJ>KmJkmz4%@H$A7B6#$T0R^Y7|E!b9=LHXr)If0cjH z??)YoPgTF-ugXv8r|M_?Qu+~JD}NUMtA7O_RbPr9Z;1X3`xifn55<4<`!NH&75=vQ zh=0yk{VDlv^*7YFb-xXN)t|-h)xVNoR{sV*D*q85N`LZ`iXZ&@508yj`sLqMf6Gs* zK2~2<|B?Qyzu^3b@|(*4`S&6Js`{7zRQ@l2DgENF%J2Da?VtXtKgU0-zTD=czJ$-} z-^ee@zWDLl(eVmD`X_H3jIHLKzx2a?g@4bl{7QXP_`^TtpY&JtCwx|X<=@pmalXR0 z{H^-i{J-`OKh^)DpTd{(ReXc*>qcf}U;J48Km1huMSs=bz)w}*I)C-Q@K4qM;#c7x ze(U`3RsQAqRe$4`(hvJoeB9I$YV8|5g6MK2_htPvw8`UHX%M)b9)6 zyYMeRsQ$_}AN>{jEB|=*oUiIj_^I>5Z}rEVukd|g_V@hpp_TpUzw%4|S^VPsg}-e+ z@aO#XeDSyPBl%g~pX2YUKk!ra@9H_zyo-f3fciCPu8* z7eA&v-sV>_Co}(nQvc)2!Yg~+{+K?VGXFGAX6%3LQTYgeD}U5qcrxi5zN-I^Un;-G z-}U>CZ9eWFKURDa|Em7Rf2AM#ecJ5N^H+N~0p1Ug z{vAHA_d(dB`qA+6aP%Yi|DChON|*fi$)s=is{0%HY4wNjZQ)=1s{VrbUiFdv)%}b8 zReuMcUl+cE&x;?#*H4>0tndP_^?nHdul|AaKRxnG=db&VZT?Bb59*o9XZ16xUxy#+ z_cr=j)vv%0&v+8)8{by{8=qbpov-|Z{~fAts(&p1uKpVTd|~(}yi|Uyzg70O|Ef>q zA9cUYKkI%%epL0L`l;|v|Mv}tt@JOyss4rU|IvBI>ihDO+8_Qb`{{p_KdP^*KZjrI z{giD!@{syvJ}ZBfzZCxIzwWQ`XXOX{v+l3N$HG7TJUn|?>6d?3e;Yqn{R|gy$ z{&QW#Z~R;Kv;PO;``i3HV}(!tS@{M09Lm2df9D@n@3Y?_|EYc>|E~ONn;#pk&d-0! ze(+tt@4&BBU&ueJzEU4n{%!xahkf~PoqwB;^TTiP3x2&T_zixmzd(QW`wjRme8FGk z|ISzX!LM(K{j*QiPtITO2jJ(bkGJ{YC-^J<%Rh_X`Szxh}BAAYR-5&kNFWdG{V zh@Zt@__6w1^3ys${1iUKpF{UQbw2!6{R{D->YHtT)>!e6^{YPspH&~iNAVZ`srrL` z%Kz-Y>Kpi}{Pe=)qiom>aU4kb$@98mEZEO$}hJ0(b3Ak*}wF2VQll#(b4Mr_Fwml z@~5iLoUigz`>*@~e^!0ye5F75Equ#Qsz1TM%0E57&L{t<{)F>YeP;iKKmJqoEB-0| z+UCRm@l)xa{VIOrud4s>N7aA)ulhs$ulk4E{G0*4R~SE;xet{0NA!~`-izne&x6#e_-FA4eyje?HXrNb@5-;Y`SH;e9^kF| zkK*rl2VUfFb^n7Oiy!2d#lQAn`L+Id`4j%D{7U>N{^T!JKR$Rs|J!`%AAeT=aGMYN z({K6fh0)K=QD5NS>c7L^!_gm*UsU}n|1SHAKUH7TU)djiiVvOteB@8gU;TOUyZR&e zyz(>so%(%@{G#e__$>Yq5AF*4(0}QNe^mYnf7Rck-&;n9D}Irm*8TG~KRQ}{AHJ&o z#t&8B;J51E(qHwj=;u)WTK>yF-yZ&}KT!1#|EvC#`sq;rr|{)`l^^rZ>R;ghx?kkK zWgqye{wIDf|KdN@KY-7dAMpRWUx2@=-<|*IfnWA7|B>GpKjOFYZ}zYLi~6AS^X#!t z)z|i4_OZY6AN*SVZ~0T5pMO{Vf!|6$^jrLgU&}w>=g#0a{#pGg@uA|c^HsjS%}4&_ z{H1^XSNdb0>Q6gg^_SSM^vi#$KBu3G&+uLSCGoX>-+|vMKi=jC-~PuFZ|N)LnBl8D*do;#V`C;{0CnZf1SVjSMXc?&24`6usWap6+hAMGs6Gq zxA0BB-yh$XA5?uR{#AX8-%7vut?EbmxjpQU->Sc`%^%1gEB_Op%m499^&htRcs~7< zeLcVYTmFCO{=e!U{!#H+e5~`!j|v~~SN=yoRUfl|^r|#e3zxr?DfAt5p`Pe`IE>MKN|Q@e^!46 zeyhIU=7S&Ur|$2?$KogWuKWN#s(&j!Rej_6#Xt00_`(0RfA+8b68l^Z|EAxnpFO|! z@A=ig;s4Ja9k2XD{ag6pe^vjn|6dIJ+F$iw#Q&;~>F>uz2dn+_@A41vx%_XNkNvYx z^#|yu>PPsj`ayiJ_$Gc-{)V6H_XGH`>KplC)kpZT^0#e1_(A-B&8)GqAOEiYrTn4n zx6OzB;H&C)_$mJvze@k``Qw34`mOp1|CD{;tLiuYSNHGYbKwjBR(!@EpD@o@+0Xf^ zJ`sPaf8l(G>a*%^;FqtPXRP)oKdSn{_p3j_zv}&c=d1c%{3-ly^9S%-^%?tA{~Epv zU-n=1zxYu0<6l)D@sGb3{&8XO`Aw1E@miI1h@Q*|F%^Si$#h2n=_^FZ`5$u>b2P#;)}1{8e9xua)0>e&O5m zzd7QQ^H=?dzstV(wc-bUs`>-JR(>!3R{jKERbSIj;gA1Se{7o%`^#S{zYw1apUzkD z+w*UqH3~mf-@sShU&432pUys)zkuJWU-8?cv48wk^#goW ze}I2|Yxo!ct^D2j9*F&I^CPpezw=jpDt|2fi=XA+>|gZ>`6|6#u|~_21yT z>Pz^l{7rnX`j`ElK0dP2zxY$}o&M{5o?rDZ{w;js*Q#H(`KVvmuk=H|RUg7f)d%dK z{xh+$>T~+7_{l%2zrsJNe#gI+f5K<+i~8iy{a(di{CjQqKYptE#QrNkwg2J={Pmr) z#tPs3ulj%RUHWmpdVgPhJmf#MfAz&7ek=dM@6}(RpYIwStn|Y_%RbIm_@&?KugUN0 zeE6yAANa5Onf{8O?7#3UzW%e(;YvU1x9Z=+chz_BTmDOb)gQzk6`#e2%0K0|mEYmN zs{ib-`h)nR?(eqw;BWXS`|;1xAOEcP`<<`qL-C{ZhyTmJ_)poN{wu$rpNFG9WZ%n! zffYW*kLnNckK#A@e`nx-o1ZhTo-h9@{?MPT{)GJ%Kgutvf3VF*e#8IEf7qw;2ly!c zTmGhIzRud_rKxqUj+Wxr}X3e zm7l_A^*{J$-EZ1|y}!*qRUh-8;t%+${uh3({_8d${_XtLe_{X1AKA^)xV$nzfwe6ru=nCJhsfA*{X zfb-S+&DO8|!GGZgKI;Bae6IT5`73_H&zHTme0_mkB(WncKI_y|9B ze`5dDU%@YRe*Rze2mDoiv(3*MD}2Gv4~Bj4%cBSMU-hl{TmA`uhx&t6fAjzP_XCR0 zh0kq1&X2$9{P?Tzi9f5p7JsUKI3$D zIQZHAtNu}clz;Qj>aWNTtG|SQs=no4KQb6!`5*gNeP;ctU-47LZ~RpE58M36)c&e| zqMwI?ANW_{)BY4WDn1_`A)=`uwlrFZ@=0&3_7i@KN;>{a1g7 z|Cj!@`8c2WS?@=yZ~nuaVTB+3QS}f1tNsZ4mjC0|s*mLt#ee*(>QDQt{)hNg{Ym(# z`%m~e6n`tfWWUmn{I%*M`A6x8{pdS3D;v4@g`)>1LU;I$- zPve(5-!>oTqrZyZ@K^b%_*nfb`YrzCpM@XzI#mBv{|A3m|AYTj|3m&(_apM(;urQU z{o&6;{!#fa{w)5(KR-D>w(>vmwfeL0Q})9T<$w6~gM(7if3FSyWB=;^@z3hd@SoC;_*uU%fUojj`Y(QPzUt4|fAweh*Rw)@&R5UJ4~O`v z?2o@*684Ax%3rqmS!2Zy`0uXhFFkwKulkn%lz+kBTS9;IQ~Zh_%YW>@?vKQ$%Af7; z(TKnJsqDwUD}KYzuZ#8ZW7Y4TU;2UH>fdbhfgk=?zc1M4=NT*fINyiIf8QMbD!<~t z#UJeRj{-mZyZT4=fBUSl+P~+Q|Kq>vFY^D|KYSPesZXl@#(%{R+kDuU|5p7Bf7O3* z{zpQ8@KyaC`YHXYZ>#^p|I5F`_v+8V&)Xuu-R1*d^6%<@(_i&J^uG?>uNOYxr{W8I z*Y6Mb=SRl*;IHa?{8sq``&a)7|5pCX|BAo1`M@{(RR0}6RR0UVmVW8)qk_NjTjgKy zS^Y!!`=?+0${JrX1{#W|l=0m^o&#JG*|MEZfss22CRenJKA9JAo`Iv}5@Llz} z{Nby|hgR_ce^z}ApT&Rpq52!nU-<|BulRyLtG~3(hkfx!{eA-fmjBal)&KNc_ml8d z^|$!*=9JKY{W|rf^;h7t-tT~~%76HO)i3Z>{O|nLA7J0| zfB9?GC-C{M(c#K|&R_43z+d^_HXr!MAJyLwpQ`_WUrN95Rr;m>;$Qq)__M$2AHe73 z(NXF5(EB0PAGW{3hxk_gN%ntt#Ap6f{W1D2{o(Jb|F`+@fBseZ1AeUjmiSh`KiTF- zM=SflZ~3?U{`s?q)%WF(b-%mK&mLFbho8E?z+crrqMz!&Ie-2B1U`Nt&WGQszTh8K zzvHLM|F`+T2Y#yeOXT0xU*6^iqbvQh?+bz-@o(`1ek%QlujQZYU-uXMqw)*(sr-MN z4}OOK@<089%5U-e8^%T}{nB6Y7yMNJ0>4%NcbgxMT0I}W9*+I-pXzV%pZa|d`i@}44)q_Z|G~c1|8TzQAHjd+FYH(SG5fFj zp8x&C$k6}F1}8J8h#6IFf4}nB-^u*1{qy~&K3_id`P@_9Cv$S@^ZlnjUq1EOCiXQ? zPJO=r)aT2mKA(H)Dfv^M??3hV@~O}7n7tLBz+?4mA3ETV+x!84ta`_PU+u|c5Byy9 znf$N(PyG6{h+p`-@@Muc{*fP6|CE1Lerf;ZfB3P^&p+#a3qRNIui(A-Lw~FI@4|fl zmm+_*zeh%9T#~DA<7EE1|KYdm=6|f_>F-efRrL{mul_!Mto|GQJrMib=I0r!{lic3 z1^iThQGHPT3;t2{m;PGW&-tr=$A4ZJ{sW(-{|D#%)t?rh>-{45EdP-|mH*pc=|}!k z^%Hzne~Nvo|A1dA|F!?}fBUQYh5x-b>?41v{v!O=@7L(R{7-&c{T24F{w@7he+s^< zeuCfXuWj>DKe12cr`vqwr|Q?b|9AfCFXM;u5ByO5NBA!Nc>baO>@OeS??;3G*r)0f z_^bXQ{nh=o{IvQ9+x%d7#lO#<{Z)U0e^q^B|JDD~KRd*))qi8Z(jR;r@}KHY;n#XU ziT$cR+2-SZ*8U3L^jr0Z{G#|tf35V3f2;o>f2jO~eXIY7KdQece=B@$^MOzNQu!Tz zt^Uw9AN&UY)xUwivi~-J!2ZQA>{I;>`AOLyKh*s{d_OPviGCg)nH4`+zwW=`v-r#N z>-{0|wSHg6{)h6X>fhq``uDfnfAJUpIFvtBf06x4KhK)nT&yj<}=pMhyS_{+UAD? zR{M9p+vgdpdGWsLasE;Ihu?}P@LT?gAL>3G{toq9svegQS3P0>#jo;#`aK}~S3b7Q zM?Qu>tDnI?%YXS#)hqm`_z(U*bb3ZBe87L%*Z!;DAs;RM!*AW^z;E^A?62&HpQ>LB z-=!b;sQ93sJ=9OAelGh}y&`^G8~zL5RWFEt)vtSS@by5fzs*O#6n>sHKDxq>{eNnF zpZyN$xB3n6Rp-Ya)sIo{mHptm`VH{=uO2(!N(U#SBSB=2y8S(VA2$DM|9t^p4AIbhIKf}LO zzwnoeFZN&k4EU&iBK=f9e4C#&#^q7THcsZB`=9tw{YLSz^rzoe{XX|mUmnj_pBDe( z_tLNU^XnsjroZZU!e`ls{VPA>pM^jEQ~qcF9~t?V{U7SrRsAo&f9>S3EBo7j;qM)@ zzw%G~Q~eG0E&k#^RUg4;^$YE<{8Rp2`KSF?|AT*4|3ZFI{TuvJ?>oU){s}d@6~-W|Ec<({mZ}cU-jR%`LWST zfBduhKimB5VfB6Sq3lP0)gR`+)&FDv`n@Lol>hVZ=SKat&4>Tf-=Y5B?SW7Hab3*w zkFu})q55m^UHuL5wfxihKQ8hE{9E~h{g?jnQ{kKc6@Pht#ee)&`49b6{{X(Lf5LwC zz6^XQ2OMmq~4Et96rQhlwT@c*S4%x9V~6t@@kzuk3^0uAM!up3i?uf9zZRALlRsaQ^eN#_IX}r}88CczA5M z`ab_H|5pFj{RjJ2e|VdZ{xJPk|BU|>zw-a;FZh1(oA^|}SHypXFZQ`*bhOeh|Ec$3 z;IGc7zNz{Ve#-xzJ@}~lRD3D_z;D&hvj5UAeyI4p%}4y^Kh@4BD0{|CZF z%6{-w{R#G|`p@|)KEvPT*dKhoJp3PjUmM?-AG{#)C;nac2hLyp1^!$8CHpJ?wtm(B z__fZ*zYp>^U`9;-#ubSNZJ&*a{ibGCj{sZNH1Rg6N=I_M^ z_@?^Z>{b05&#!!0ysh^+`0JtlRlnK(pBecmKC60uo1d7w!U}(=dP+W3{XTqn?PGX+ z%KXzfnX&)LX9~~qhwdvsbk?BXm5xs+;{)Wr65i|m z5&U0xke^h301pq1%u1K;GoMWQ#%~o*=)3UEf2&`M|E>#ti--05I{s1jrQ%uj6SnzT zV`XpWFMgJfRKLo7NYx|wx%BJ&kA!~oi>lutAE|xy5lt6mX5>b?PgRzFF6 zsCu3L%0BFSs2@=Af&Qu=@!$dbUKrbbcJwRh=hx17vhX*5ul}TXS^0{1UjDqzhd;~j zi~r&M5dS}!>?PjT`&R0qS3QQ`C(6J0PxXuBS5>d_kGjtie+n<~R{dQ0SM@{TsrW%_YNkGhZF=EMH*QT!mks(w3s6hAqC*+>3Y{WAVn{VMjU`zrdY{mHMY zABEqmzJ>4V=ZQb{K8|{>@+SwwStNH>y zs(%H)<-g+BA^aA<;D^G8{NXio##Q}g|JDCu-?}enzv_4MuhPHxSM?MBICTEPm-VZ@ zfREy@cO1Y!{Z;=8{;R(vzSa5Rqx^&a*84i!{G4%RfAPD1FKB{tX|c zfA*{VR{X90Ec+hf*XnQ3f8iVd9?Eaa{`jTx8~joJ%|4|c`mOWJZ>m1WkJpC%;J^A4 z_Fw)fK2?7Qe(HT3_^A9BKB}MTeAQp$AN6~}ZGO(U@-O^+2w&wt@KyOYd>22;PpW=| zpVFV_SAKe7u<^xX!`1o4pKqENzM6-hs!#D})qnE4@_+en_1E}E>5qNu_jdMI^&k9~ z|KrcgufA*{X z3;jPlHe7ul{%Zf?W93Kuuj5} z2m34k#lMdRfAZfKM|@V_SN!Imb$l%pO*%|@&D@o z(qF~rZ9d|&_*4BC_$hwG-<7}8U)e`}U-z5vSN^@thkxU@M@#<`KdS!$A9a5DP35=z ztNIV>`@%nd`p)1d{8{hkZ1baoRs6#rRo}r+#b5ZZ`~W{zeJZ~w{lS0rf1R)1&vCx0 z|LDK`XPXcIVW01sJ+AZ%pT!^Ym&>z<)%W$ktN+J;tN*gikIZU){$2bEzttb%|COJL zU&Sxt!wtcI_Fw%Q_^SGp{)>O;zxpfuzw{$M)%obJ`XBIB{^fjC|B7!_--^%GU*kWA z-p{D|5kFLXXTR#7*nib`@NvHC&#_R;gh;xF}E{a%WG%0J+%?x)26(hq!9{|i2fU+Cw7 zz{fU!;QqbpGx<;DFV0{0Tlk~uPySQ>x6OzDiC<-3{8#lI{;T*5zomcq(f1BVul#eH z9}ZZ}|Qeivr$LgWwPd-YfNNA*wG?-^r*)&8viNbJx0)gNKM!ngC?IUKWkKK$1G zy60Dah5r{nZu29vdOm)r-&^6wYePTmTlppbF8+ewst>pMvEgd}@Llf*<%_-S6Sgs*mBT z@^9xa`-$I`U&Ckdhy0}a3-DR>A^lhX5&nvQ^Nk~?~nK-|Ihm6fPLg2mA~45^*7nCe&4yx$NuTR`d{+PZyOt|^e6sQ{MUc0_#-~N zBJx}Msr(n;Rez5CesE+~`{#ePfBseV8GIhuUepme$_No3Bd{qCAeJWmv2ZcZW zU;P>WU;4q1<)7Pp_^16J;;&}~zQwb;pY{CmFZd|^;g34sHh%l|5W+vX#GbN2fxN8yl_c!@kvD;h)8C;#0k!f*-3t z>U@PS_N)8`|CN66clDpxr|K{Je<1X?%}0FZf2BY1v-*ShrTl-J5C5mX%1>WB`Y(Qi z@2Y3`Z}msF`FX|)f9&%}=oi0LegZ#*U-+;7miTn&e!TFZ|5N>W{P+#yqpS0auNA+x z`G{ZmqkjLzzYq0qs{ez(>we4rD!$Nv^?%^6_zixlKPx_z{== z-vwWX?#GM&@Ne;_^OgSbOZ6YO`B`IyPySW-!9V4n;?s{ueu1AVf2F^VkNv^-p?*pE zCw{B?h5n2GxA_D7U-qN_+k^k$tA78s&ByQG_*d~G{;K-}{Po(1FZj9gKk={hx6OzC z@Jq!{{8If5`CIi5#Ggk)|L|Y(WPcAtevV(OpU8iI za`v#|2mV?2@9V8Q4I@CWZexjesfADYB_v~N(BY!XbZ1bTX^+&y5gg=UZw)x;6{#X4e_No5gHa|YL z@*nZ1@_+vO`rwysKKvU#>i!BpmHp*M)nDbm)jwdLhvp2c^Lu{TXPXcE;OD|0|1bZ< zZ$BOO!9V4H^#5SQNBY0*G5oG{a58Hs!bTO_-{b#1s`+30=lf56zI^KQxu?8O=H%4p z`%itoeCjhp>}#H!`h5SX&zDbqKI?z)3LjR!fbXi_;BVFM6Ys0vA|72kdzd3o%{ETv zpZg!YR=>pk*^|j$@LBge@}ug{@$Y&+4!>4>X7B2MvgfCU|BDZWC;nUfyv>LI%daYa z%HOJg!XGL>bpAvA&HDW${(4L7U;L^5y!cb~;Wj@ySosrvF8exv<)8Am(y#M9I(u9_ zA0JeIN`6xP9p}4!_PAP~f86nyepfOl^ZgGL{(i?CrTAMuSMe5qKAH3dA9eqTKdV2w z&5ur3*upQ>9}`cjzLo!1e_sEfe&5Rf{?P$`srwiEul|<&t^5-ni$BGOdOw2ySN~1? zDE;Bjx}On04)JT%@AB)qpK|`JMI+^M6O=|Lj}$SK@#5uebTZ*y{ZJ=McV2zwlfBE5EDv zC)u~^ALp<8C;4H;f9J3Mw(}SM`ET8iIDh%K{O=Hd*6)Mi^PdJj@mIZ{BHk81%3rEK zabfK9U9*Q3e)RvUKQ6y3`{0M_@5%2N@?f2w}L&()vhAJt!`zw%G`I>aBffBLEWiETdaC-`6aCwx~wfd1?KIryyp zBl}c80Dsl}l>DiFAB~?1fB4~_f6y8~>{I+kKUF`=Z|Z#XU--6u)u-~`x^ar{yJ zU;3~2Cp^FUGw@sZ7hmf9{IBk3?7#ZQ+x)Dt;%E4%{0Kg(zj9%8|2+|(*uUa0{;B+& z{i=VCU&{XQ^RCFB`Cs*aw)xq^N`LTC?|0B&^>6S)_1E!t^&8-$?x*Od@F_l)e>#8l zhwy9J4}VsEzs(Patn|zN)nBFGs?V)o`7`}je{`D<{=vWXejWd-{vdq5JK`UHsrp`i zUi@Z%j|4xmfB7eVsQd>$s=ntR^?m~Xul!T~T<4>|Ul<*)@PmJ^jq}4#)z{m6*k68E z{b}|o{*ph`{UZM@`?F8wH_l)F&woq*{HOA3_NntZfB7%}s{RrFtNM?BRQfmHw)Kp?<3R7C$^1{z3m$AMxMHAMtnfPvE=k2fu}X z=db>S{a5`U|15sN-&OzHf7us4s(ypds(<)r=@)(qzx=oITlquv2evFV$bCpUO|g z*I$bK1U^f@{ImKS_^Ik+_AULhU-duOulO6k6#wwgsz05-^e6rm|FO^OM@Ost1%Flj z$bOao;-|t7{2jVKuKJh$ivRd;<-g8f{c-rI{tSGSeeqZI7sdCo4}Posi2Y0d{ImLF z_`CcUzN^2(Ki@k#T;T_Q9I8*NK8D}oNA{`y&^90aA^5HQdz%mcfbYVm{HEUDVgEXx z_+R}Q{9g6#Ha|9A*#~~={M&q-pM8q|E=+uS<6vay`RB;#owM^`5AoH`S3&a-}&FO!vE;E z_6MI;-#TCM2mh_#Cpv%SC(c*>WA?B77yhe1h~Mjei~S4V_@VrV{;U5%|D`|um5Pu2 ztLkU?DgD@g`G@?d`ajNB{SErB{vUoR{lQo95ByYqvdstn>96YhZGO(M;&1V>>SO#+ z?+3td<+u3j(cmxoEBlFmRUga0-aIy3osa+h`5ER{GAA?lf%1MWe=NM=!>Y&So6i_b zt#rj7%iiK)<@4U(eKOet|5X2wJ*vJ}A65TN{!;#{e^&g<-p_o-+TQr5@=Nij?svEO z!Q={0_^0|K___L9_^0X<{8#-E`@4N~wAvs2KNR!y_n|XZ-^X9oKj2Tbf9J3MjPqB0 zAb+_z;s^Yc{>9fv%<&v-+#_|MJiu|Ec>|_OJdA z{Z;*mpR0ampSK=}PnD0rNA;)KulgU`{G4HhFaG)H>~S^EKYxAfpMLB962Djei$ANs zz`phSA^Ab!$NoPu{KNk1{tye&NOr^}=6l`Z(gM?Yq-CyH0_ zQu&1QRX&NYs^6_1{}1CctNr1N$~VQM!lQovA%85sDdDuWj?Qhn4;4uj)m7Uj0(| zu6{oJR=#O}w}*eiU->`$RXq-Wm2a?L^?UJ8^~>P1`ZM_DxslIr^T9vjQQenr^T8kN zTlFmdF8ko8dfxb`*8>IwYqP8@$9eo)&2^<@LlyP zelGu#@09-JJ5}$&f8|r~U;XNBerkf1{^6_YRs2x*9rD>%jm&C&_AUR#&;K&`8UBiY zxB1cG>iO(j_LCn}{=+}(z7f9_ztCUZSKz;@*Wsh;P4=yRApDnqZu8-v;%n72?Duow zpZKTVx8NUT-)%nZi@!?$_`Uia@LB%F|Eu1nzv2(^xB7kjyYdtGE`D~t>Zf>q_3PND z-nZE1gFpDsq5SOfoN?u!@L&B3_OJ89fAt&rf7y?HtKMhd;t%{;{RH~2ej5L-dK~}M zeXRXgy>EZjFA%>9pZve_cllxE@BFLqExx}X@+ctFKb4=uXW>u%Q1!R`uk;Up)lcN#^*#sxs(vVbD*ko8L-?%v-T6v?>{I>)zm?x# z80@?!;un6d{DgfgKgZ9H20rCahkg%L_=Jy#VtxEo{D)u5e*CBI>)5Bx4`21Z3jJ38 z0Dsj_cK)jW;lKK=@KgT5zpG#GeD%Hxd{lnTKIQ-L`HOSL6@RI3tN(<53%~fU>eFq0 zbhLWD{U7r0s-MND=f?TqtMuo-qxxgwYt?`7RsCe=KU80qe>z{)uk2I!htI+a(BC#6{3pIw{VKjze^Gp@{>wHW`~-j1 zAHfgxdmsK)`~V--U*6_pf9k{HU;I?~;XmcS@}u$({804||F8UXn~(g|{tG|beBcK@ zt3DNf>;6#ut^SSruJrGGm7l`@q57}%$Nww8$4|vC@Kyb7=db<@|EvC_{nh#L)6*u0 zS@9EmRsF_)tG|NZ>iqOm{IJc3|IttNN9@1qH~w4vi+`$rfPd=uMEs-hh2JYb!e7N7 z?DzE9!^(d0&wBrXeyYBMuj)^-Z`p5~5BoWP{zsvjaBu6)b>tDhxa9qKpK`yB9G`JnY5nJupT z72g$~vVZXj`&T}{&CeRE=fg+!!})XV51$s_KWCm@^|pNH5I(A3#J<%Jl5Z70=gQ@;4XeP891_@nYk`CQpoys!5y;IHhz&4>Nzr|fJ0m2a|7 ziNu{FQ#>ANBj4ZGJdxWncLCvKgy+@wfb+eyU%I zKdYW#|Kcb9S@xyB>esS=`5*h&eWUnY^}6_7_-DU5AN&^o(ogZjHXr;zKh=-*{Ngv~ zEBs#={XQq^G4btCKcmi%KP$hW-_p-EANmpB4%xTxEq||mmGf6W1HMcD_^;|=^?LP# z_<#LAi~qkk;y3@Uexv<85d68#NBst$)$gUh>UY3z@uTy-H26*YuKYrLtol;^S@|>m zDg3g3?ce!|Kk#$mSN>G{{InC`&a!Yzo~u=d{=!A-}QSQ{9gBU`0Kf& zqgDK4pVB}36#s1V!9Va-_3Ji2I$Z6Ke^x)v{%e2ReC&^ZR=qF{B_^Of6M;zgYqx&tNIW8uj+UC zQPl^|SM|v@KRR0Bn}2>n^cUE-`nBv+{VDlD=?6Z~M}0;Ag+KbM`g5C)`hx$|?={4i z!YBOHeH8mW6#fN2<=^I3{x^|}1(5PqsYQD0R4!@jkD`mNt{@ZYLm=&$Mr`2FOu z!3y8_rQ#3$lzrqc72n~%`Y+pj_@DXeZ?JFGxA0x{oAZ_a#Lq+ic_HG5{OAzAD*uJA z%0Ku=;TykJeaL^y{`|N4^WtCC|J(eWVTC{Z`DFTiym(*rntZ76hEK}g@Lu(-cyed> z8+$(zd<@UU2jXefJO2G(PbPcwzv^G$-^wrWPsI=RuKHbkso#^>U-cKn*Q)Q}q4*O& z6+gp!olkvR`KkC<^_Bdn_-UIzz)y$zqjkOq59}X5R(}NlSN@AXtN*C~d+7eQ@&o#> z{CS%XK7r5bFNi;de|&W*;_Ega`7!+0?=8gt!Vi314nD+pRX?(S>2I44{jq=L@7w(N zaK+c^zw-a;zu=!k@uvC{;>n|-KlrKqTK-r4G4?rBpO$~&pF`)X{sny3f4>pF3P12) z{s$kWAN*1MC;U+TP5$$Wz#n{9{VAWR`W^q&{W5$Nf6`ysm;I~0eDTbefAgQJ5AerN zhkwz3^_Tcp^+({Z&d)!pK2RT4{VBc`J}wOYJ~#Rs^nXadg>U$+{nLNttMpg>4f?5k zll|)V4xWD~f2!Xb@Sm?8A6W6P`nd8J_$++WU!9MA3xE8-`ls@{s!#EE-9O-ms(<-M z^^feY`j_lizbByIim%&z@EiZB`WnAf{Y!rjjSsEt@B5F$Jo}e_(Qnmj^jrNS_^$j5 ze^-A1f7ksf`&EC__v`+V{;Gc9-<4m%NBy2)n-BiRZ)IQp{S7l#_JyyC&-|zESGM`t z!)ks0UH-$qm4C5s)t~aK>fgz4svkjrg>U>-_OrjLKjEkDU+L!%{wsf@zsld#=M^8} ztA0;_U#fm%|3mjPRsZ0JOHu#upUU6Zx9V^HUH#i_KKPaW>VB4gy*BpGzbb#A->Q$c z`S5@I{OAFGE`EUT(l36l{tNw8e_Q@j{fljWY`EeN@umEe|5g2`zh3oo z?Ej4i__gw%3$y+g&K_3h$4_Nn&wpTau=+m#s`?1N>;6`JtNMfg*ZmHDEBx@^s$b#1 z>Kpj1{s??k{fu8K|AUWuzn%TQWOTUFKmA=Enbkc1tLN)K7JlKs>NDr7{EL57eG6Z& z4}5R)fj|6L@soY4e&YXyfBLQZ!+k^P5B{otW&e8r-2SWn;(t|Nv47cz|0KQ#TYq4D zaD^}UsQQ!r9*p=UzEu4r|ETL2>A{0D!Of3r{3-}G1SXTwL;2iyF}tnkS{sy^W#rQdBn^b23rKfw>B zANsHQ#QN1=;lG7%@we_%^%sl3E(|_jGCEr6cbgA>fbWW5>Z|Jih#ys7!*}6hn-6@* zzsmpEr|P3^KHkrR&#GV8xB55wpJgBZU-=jPRe#~dv%lg8_$qw!@2bD?XVnMnU;U|V zer&M9pZM|};h*@o@*n(A^%egw{nAhQC;qJblYSl<46e?{e=7d6Z`J?se+YloAA--f zjg43PWB=+e@UQZJ_Nn}YeX9PU|MDOCN!5qj{Mcx9KKQHt75*%KhtKbd{FeU}e{J(4 zv)Uj1RDC8s7k|P}^&iw<|6z2zdOm)u`V4-m|HD5jKeqqkFZ@{g$B&gCi_fJW`ANNB z58vgV@LB$~&4+*4U!5O5(!UR!pMHx!#P8K#;UD$>KK`itBls)+ z;lGu?(|`59=%?z>3uE6~qQAmEwLke^)u#_0*uVI3h=1z+dHhrO-R1+o{IBvG{8Ii6 zUq2iC1z&|f`oC>3w2CkMzv_GXD}EGzzbE_y{>ne$zxpHMPuUMXs($wU+CThPehQzp zfBGqY;h%N?!oKgC7*O`9`ksGQe~y3D`QWGUh5x@P_D8>Ue)_Hal78y`WSbBCi$7Ig zd4A<@>{tB5e=EPC-#Q=rR{x5A>wXl!R{iDqbw2hjd|eoRxGVUXe;(?8)cq-Zlz!p2 z`gh`c^;h_R)qnI~{V(VLs^D+@SoOF3rQ)0ZboCeDx9XE^eq>hs0Kdgg{O4KWKk!xc z6Z{l@;iLK&^jGyO{Z)M8zm=bD^AUgeZ{;`YtE#`8ulf)0UHXU5s=xSeoo}0u^RZ9i z8^6^3DtuLaL%)^Z$xrM3boo*F2YlB3k^G_jpM9!7VSn|0y85c@Z+~?^#6G1T{8s%j z`9+-%e^mWVzvVyb%j*BqPraYbe=2|AKUIIQPu1t!{K%~MjsB{C<$TrO+~&szSL@@a zs=x44#Yg(7_zypI|06zC|3iHG>d4>ucikWJ@2W4Hui~HhTlGKu)cf81tMEa8mA|Nu z%0KDnYi5m=ec`L>Z}zGCA@Q;58~CdJCHvIdjFk%3m@Bj;Ddgvf5<Ip#SO**k9H6;_qt*!^`+ zf8lqV5B=L;)qmo9-G6TLW5dx``q=)< zKj^>eJMpvhBfeDrhTrS_{HxwS-{zyffZxKW_)z(U{HpFh*su75eX2jezpFpseD!{~ z^A*12S8pC0uJAAZm3^GA_=o-K{P>~jFaBTr0{_*YgwLvPxB1`~{80C=>bI(Y@JIEx z=%@4tf0cj0U)`^$U#tHkK34w9K2?8Nzxp@UKa?LHvVZv}`&IpD|5YDt^HCqcU-^&o zSAWL&E5GAE<=^s?ir?FO#Bcmj{Ri=@_!WPY{ng)9pUKY(fBdWNH~Cl9FZ`?eU;L}| ztN&Z|q5T)W#kbNQ{a1g1{)->!zwo=w2Y&Ixq5GHW55aHcxA?dEr~I?(Yxb-D9Q_nO zieHaLe}MlMzp!ululQX34fw75U-&5dI)C-o{tC;`!D^=KkD}b z^k4je|B9d3_pQ-C6CW!-f&aSSVgEz;ul)GJ=>OXX1FQTA{;Ph*Z&m-{uhI|xs`{4x zi$Avc;1BjG{^B3i|KPvHzx4MVW5bpH_*dQU(qGk&+kE7A{IB|R+x*yYwLkVL{lM=( z34VHT@K^mQ{#pIyZ9e=1{;Ge#zso-MSN$jUul@`B)%`O4R{!leW8bQ;;OEZ`Cst|e7-&K>3n5>_^bXV{a1af z{;&K|{Hy+f{HO2%KUE*Wf9Z$*%D?e%)lcf@Iv@L2eIviG_~Q9hU$I}|7e4=D_z(ZB z`&ara{WxFMPwZFr!9UgC+2%(FEBwn}D}SQjia-3T>VNr9y&uj#RsY$4^>4)A^8al< z{2#wo|4RHX|KZ=&{}lgff7^WQPkvhX#!vq;_=$g4eFJ}$|FcikH{wIp7yPU6xy=VY z`QKleXRPqc|LXn}ek=a5fAx>(zwl50KNtB0{FMJXf8ksHQ2hb+tNOwDE57pI>Mw{d zRlnn>!WaK5esI3(ABc}tU&43QFYsCQ5&y0JBmGu=u+2w(z`yJK^jq~W|I7Mn^jGyc z`&Rw!`BlHdfB6r5ReY4cRQ@P`D1O}LgCF6q>~H^tfAw+YAMjK434B(4ho63WY_#Gp z{80WQKPvr+-W~uKM(aU>wNh6J;BfHcc?zA z`(6H3^*8^j`Vl_Mf7q}5mwu{02!D0|%YQ4rijUPl;-AHD@Lm4NzpB1+zUu$cf7Q?U zxAZ6e7XIk((EV+lAO3!^@|*Fms*mw!J6{$2bIUzH!xf7P$* zyLvyHe^-4%|CRsHZ}q?6v+8&FtNTyXtj_(gtE@f$u%|MXM&nfU!9bH>77 z)gSCv@1Jk;!C&lK^$&cOe&Db2EBsacd;C}Urr%m${!#r2`9alR@KyJB^!H^^pMUaG z&z-w<&d7c%8=lPExnDJTn19aSuRQj5a_aN_r#@dk_4(XWPRXD8eE+G>mrs4RiO1JJ z_4)o&pD&;Kd~WvtxcsTl_n-QF`P66rTK#}+KJdmKRWI`A>Id-G;#>Y!`5HbhzOetQ z=j8+E29u*grrE~H{B!@~&p&o({xQ5f(f8@6>OuZk=NGT49^tQ*ui?wm5B(RP%E!td z`CHu={(sE9yUry|mK_##rut`TBvD0aAdDFz8bX_GlHUF$8Z^h1Hw|4t2r~ExF+dAw zYt*JJVje*z%{0c4AxH!yIT8Vaf{b|x8d_^#;*uE=ndhsIJqlEw%#2*IW9_wfL`LR0 zRmJtd?szn%n_21I~JuNfRy^V@#`eRuN@$M-J3 znV-Ao2j<`ZgE?~5Kl5v+FY{;j{*v+Ay}x39?ed5I@5Vp#XE#4_eV8`-a(wT8uh01H z#t-v<_k7IxdG~zH`0d6ASprNE1V(QjwJ)2Hw{?Y|sXeBa{*bv-6|-;VjpAFvQ}V0=Ws zVX(&(Tt|`k7;L(jj@KR(h}?)Ue{rD?8gLGE|20`|xSblW0$vaEA%2LX_Ct{92NICm zB_BXQK`R z*37h+S3Wch`bUjmj=CX-=Y3(iLjYdQ=XYfV3< zEYcPuU<KwHBJ83&HVa9Ch4kPKLX!?R<>C$H$y$Hn)66J?&0H z{+O%lyw~5q;I9VtzyWpqo$t9r8OKqKeK4xp9{1YD{R{RownyWu+V}g{$uFTD_lt*` zC;fd2RYmK~cOItmeTq7SOS}%Kal=803hqxjRBq)h-xE^iJ>S7d*rvO8;}o$(Az3T) zd;myzy}P&al(RywTQ?UK;Wcc{v?T}Y`ni{l_n^8iqIWXbDeO1qLtZ-PXDVxa9Xr$kumW3yh9FG)y@vFwkI{FwIQ!*@^ZJ?g z2VaP5Z7;r@#|uYH&*wZ|Xn*AYeZbSlEC1Yc7;^QVKP+zeU-^^=d|{D`*ktmJX5c_PTKyD`fkg&mmfIaE6c5=;%xGB{=VPJGR`$+OHD z-;^D%Jqj%#KVuERQxxg=4CAiy5%{$kgU4ykht1O2-1-=8(M4-=rw@h&@dY@J7amu? zYgt#?t%P#i$6b71#}bdCt<~g%v&z^SEHs()f5jSoPrVBF}};Xdio+X1_7ksvVFc zzRv+A+}l{S?Q$S|OdeGCQG2KTf}_Zj8q~&3#}vD)cDfvhfE@&&P4PWi?uqB%|gXn&1oJUVr>~?;~nVVv4t|xrW$Mc`c+xfSj#@v1?_8$+}c5N zCawAsV-2Rp@fE1Xq0slhR}QenwxjO|8H#Jg!|QX3ui-_n+Gy+XT@Dvw=nHA{7)1lt z;{}z1_otn|8C3&^gzG3YqjpXRy2B@Gv{?n0gk~I2XlY$SXIWp*(rkK$REKawk3?m zECm}ez5e9+6YH^Q!S#a&*lUS>onx)K=4SzZau2F=AmJc!_@29J8Df(ELIm51g}1-&MY@?Hqkid%{C>zcN*9a5hSPG6&hkVmkf~t#OFnFMzcK@J$ zfvNWU5x?M(`$gvJZ^52U3N|Zv2IN7%-p~twTJx~*T$Rxa!#q%PPoUX@H9ufpa&L1! zM&PpmeHmY@ZG7f!eSDqnN3d2#O-}dX0=q;0v!~jZjBRNR*FaNwV#o3l)b+X4ufr9A z%Z}00PPZbcnb`c+v?Z6iGwvzL{a4+Y1!B)B9 zn5FQ8jace;QfBo@-rBrm>;xtv4-1YnHZ5Tv-3g8__Xso>01K|sQo$zJScvcMal|n9 zif`C8{%Cc^bIj74(&J#m%gvgC@KsxoV_WtWzQ^;_ z*_Rlng?2rV17xb;vo#3fe>t)REEbT;f7})xqtn4&AfTkS7s*FbDS}$fYlW{#;xF!WMV-5mX`G-wPEU zYZ;$qI=_nGy5Ki;gSJQrL0=dnI)@}&XA$47{OfmH%89+7|Y8o{Pw%U~@i~ z=MmaGVaD&C(DstgDdmIpD1{#j{x$dh?9F^mNjjT@U)3f^3%b7MDkwER^R^J4ZDUS5 zaQG$K#6H%3z_N6CJKUoM*9zJ&E(f+3cxh>N1`dLY#1nR4bMr}1H(LV}qYDY_6|-0a z_cnbQ9{9_>m^L#umfoh|ytl)17RRVZg7X+V2amC_40cXqC!r-99|Wou;QhGPyKY*K zG4d0xAH+bQ!o9b{(J)48J_zs+=F9^Is-Vqg5gfT;`Y zE)Wy#UC+w+qp#%$)v%4U7n4V1qJ(*zQ<;ha-B ze@VHZu5xbgh%&2J_J#ScicC36VPn6Z{^a{3&T3OxR?a$I3rrQ*V!#e;D1{$_x>(x? z&SOn`;Fx{?L*H{(f9HJn-2uk2PL$le`F+8`HXuo!)pu|u&zKJdm&)i1e5k(Q2*>;Y z27kg|on~kC9G$cJyr?IZ+u43Wm0&y9^IYqPF%H}d^|%&uZ6ARuwQaLXc^ZEM@GY292Eh~;=PTwWl&Pe zUE51v1$M{SB@xucTp_e@o=-rj$8^3I#rNX^%?mbiz#o<&4{Ht!d}-r%Ixd)#G-7Uz zx>Y;42vc=!Ks>cX8GNsJTohgmyV%d3JIsAa`#n*;JDAp0pr0qV-8;*Cfdo^P#nXW=6m*jp?l>iL{z*TpW?!CT6q?Q z{5%_v6{AE(tpv>q*ffkD1<%X;X(miW_eDDnJLF%mnH3zUr(M)gj2`6_sZH9 zf)@7G-*3F|-t+BZ2aZkg5N=wZ7xe&7@numD2d4P+TGW4C)Z6cfE`DLDHMgG^^|Gih zi+Zd@Q@X|l8MUbYx~TuQsQdy5q)UgP*9&fYfwVq>wMX>dF zox~>f8Fegzt;h46MX>et1?Mb+t*=i$HZJuq08s?nfOiKj_3pr>-W|Bq=cMIQ&k7X5 zHuPIifg;$3dUxPjZw_4R&4FvZIdH8v2d?!wu?V)24{K)iWl?Vq2(FHHk~%P{R|h8b z>cFI49hlVTgfgjT)vUfO>eT_k#S?#ZU{+5DX7zMnR!;|J^?6ZGEVnbCvZ$v6Gkkh2 z>fyi?4+p08a9~=W7xe&7@numD2Lk^}C_bifRR5j}Z_f7^yDw0;(N5O68H&QB-6O7; zq~9m9Pri7JzDPxsPXRC3Nfwv2eOX|7`+rd}qkX%NT)Fl9(`(M5xBo@&FSK*AulJW5 z`+BdrVg~y;IGpTD)V~r6FKQY17eU>DYg~6V%wWIfJ|TjQc-j=TS+rg8I#gH8XfroF zFvRQRv&3IH*sR*@&p7A=wX}KVkbz|pZ1ij7+&J*(0_02_i(n&u#-ZREi(m^(0@llS z+KF?)Au(gW`J$C}1neB&c+#-icX0zh<7vY`5aGDLBnYn>S(`FO>R*bLfu72f)?`=ZdusQ0s z;E)@B$pHq#CNb2-OU;>7MvMUSC*_|itonk6f|>)@Ms9iTOR{z272ka6^NN`p_Q_L} zXHmYTa<(<()#i$Wy??mkR~%pmeG|XtAQkgWhqA!0IHWK49MbEIu{%nadk{1*&v=4Q zn#Fg?Q`f6|tx}%bgw7FP^jT_r@qO8Q918Ia7XCDwut#2DHZVIKh^Gw};RjAe{HO!* zzU-=awioTRXy?TA>)5N!-0)~ie8f?3e#JKq?3?&Z9E$J*1ZEuc8ZPS|fYGmf;ZT5O z5q@0ojRP-}L*j-a`~V(*noV3&3@cgB4;=R#3YM_~T)ZDvyo(!nZSMWR!gs~ExIKn; zLPN#)$r%%CEyZM5L=k?RxTTbvFSx9D1-^kVXow>GxY+OY#NRVjAI;IgqeI z5MR$wA@I^~Zrb9qX-ibIdC$|P0%0Sx3=Wvt>O6oeDz4xlFv-Hq8p~%-U15#enP4(6 z3qQKPPX6lUz?}HUZ?pCLQ1`dMTD3Xi^GqM5wXm;oglkBSh@)%5PCCvfeN@D-37GbK z@~f^_Y3B(~W@y+P@h#tCE(KIGH1NUU%#+v8m|^b1_0nNZ{T6{Z|FN&Hj>rM*!{&(3 zQ~eXj&GF5zUVn-kcrPt%$0FQtjz1R;A#PyqIH(cY;Rb^vzHv~Y*`W&^_$db$_lyY*wNF0@ z%-C;kexXanXC9>IJVoIZKjm3Q%q<5Om!<^SBbi_|}Qwai3o)g`Y z)=zEbhR1aUV#i@F+#Yh^kPp1}b&Z`q#|CEfD^EG(&gO`p>!7yT1_V|d%F^bX1I1Ol zF!+Q6I}SV!n_tv}6)X@}uoIk*Hgm%h7kFRCUh#7sD0JATiCI1{a|82;1Hg0qf41Ezw&j5c$_qpcd?9^wi<1qMg_iUaI8 z9!;9fJ|BQMW8yh6v5}TiF@3)U*XUQg$7uNUMR*PEPk4P^zS>W(z_Ux*oM7ztW&jX_ z@I~=^gr3@O&rbcOl$-B_sR6~?Z_+OKm7ewvR)D7o@=TmExo#Fq`yslbdDm}Xp@-m6-VDi8?o{RQxsC|-1_332%53q5#M}? zymDsMzS27D>4MH}=B7XT6dLH(t2+)grn*W%TeKv8&LQJ!!;F6A2?yEWn+}ab8Srxs zCN3@aJmY&tVIvn*a1fYF+&x1BbMH%AyVB-}Z@w_?or7j**kAaP0Z%<u6$jemRsaYL zB(-?4g4eJK_c(vTlj6?tjc1n|+Hv67C1a|+(he(F&_J*&IDf>!*Q-~2RVXBt-R2hxF<(X&Ntk*Lw9GJ}SN> z7J2E8ANIReoR5Arp8Y%ny#2-%c$%m-hj`g~wOnlGhG$zEup)x}72h}vV+T;;545L= zo&#-!EIp=Hfu0LLQOuK4B`{V(W0bPPPJLKR9(XiqHa#~YLjyC~%ngsWX46ER;~R&nxo2qL=NwFxz}$1liAAs-k8~ii;pZI6 zfVt;j;tE7J5&6Wg9;t?R~$GM1m+0`X7L<9=a859Jd3s3e#d_4?5}*J&|!0l!G*v) z(ShR5@pB!R#eqjx&G$M-p%UWu7@yj3!RKTi<%W60Q&#xKlLNAl6iaFNB~K6&Ko0=4 z8GP_!_YOU=wd)>Z>s4YN`2rCIwy*f+OE(Vy>A!b%o}xU9-s_4I2Lyr&KCd=WA9!4E zcv;|$1DYU;ac@FH2rBqI&>#LZn*bJ8SotE@6Z1@m^qS*WIwbq;>z;%C-t{>L`@QQ0 zzvPgEGn%Y)kSivAZ}(X=glxo6s9vjrD#i=%v2}GrEj4_s$9Bf2lp6Nx_1ou zdHGH|#ZQELV8(uP^9z@WkM@GYEB>lgVjC3U$AV`F8kk!SF76!PI51Ai*~JY!Dak2b zA?O(s-({#By*T<3dcdUW8G`n9E*P)aV@$Zf+-l+?&hbqX22g$R3=RBL6I)W%*xhr; ziADGU@Q9yrP-Ml=ITTvEU}C(OFD9rEcO^Q5?eN7Lpz z`aM{|0zrj)a2PPCsu%>h$INnrA_nG(<^<323tvjZzY>n&Lt@(YzTiYy{Z!B7zh!mb zr+z`ixy{D28;|JRf6IE-bKvQ}UwzCozsW%={sl&JtxCm!hU&;&LLe(1X9o>f`6Aq3 zI5!>oF#_aE@NvnjL5F0&U%l8|a(`~k;7=oV$_HMIIbQ&~ z;*A4L1BOrFGjJ@z4d?XX%z@WfgjqaJ%5IS|t)AmK*Rq zJ@X7f19QuvTbDlK;Nph;DTfSVD8lXHS8kjMB0=H73O~`ID7@OAa&U2lcAs!awDJZA z7h2c`_U9Z-+`!P)h+i}Lc0Ku_{M?vcf06$ z==cQ(6;~WH+RT%jY-`#phdG{EJh$IC>%6a>b0jqUinH1y?x7ClflZ1_y9fS#!awF7 z8%zK16XM@s|8oKESFc}`@>^VV&Iv^8zaPtE8nE)A|G)L>SDwa#!4vdz#W!u^zNU0A zG6D~p%_e-Rz93+Md6Ewd*c`v$0C3=!9Lk8%#7|njSDvU0JCArK{|)WKoZ)ID>@Rux z`kDF@Gw12Qo4xd#oBnL8PVfNr_@qs(Vr;C`_jvsn2eRVHK@?w%OSM@lX0(|bo_$n& z`XV^paTxLn?gxI&A=z(e(FZYet&lUg#D2q$FEM&<_PbeN@TaqrSH9%1IpP=jiS7d* z91>S^)Kv{&j|$<(4F~!W;hW`O0NpL6`2 zXJK1xJFUp8$IN&pI2o8HJSpfLKj+EJ4LrJPzLT5#PCxN^&(iQq zo**`}iKgmT{GF!iSF*Kh#Axal1PzJY(I7AH0=u2*T0@eEU-_Qa);upRnTf=^E zKxXM}rP-7LGxw!b%-ApNBi?EgpUr0aBCLJPGra=8=4tEItIZ_`UAtcKE3N!DwBWqq zkb9nUt!%w|?RUwu(B^TY7450izy|)zlNi>q2)3)ukpuA<_F4p=SNy0I@%`GB_!$RZ zUR4gtDahmAM>|=2ea@5oSOnV>o&`7-!M5TVf(8b(n#f=%%DJ#sb2+Ia&E|-|Y8B!N z+Ale{pn(}}PB^%@bNqxuM&~GkZOMTbQ3TsWTl;s7;@?mu!GaA%uwC&J&Mx#EKjEBA z=)m)=#sV=ZDw1XH8ROrMImW~d%&oTm)HTP?c;>_+*p}Mr)rPs}P+)C^pK&m81#Q+G zk_sA_dk&VlbNrNp3LW@)yiDA{Jm8QM${auCKxoA;IFugqfP;!FXmri-62p#s9 z9FnbFCw>*iF8=+r8ViVfwi&-+YZ(7MErflfEyN9*Bfj~?*}d7%6~FdNDrU5aw(twq z_|e%c3w-0i#BChX7eV_2#@8Iu>x_vte`m*jLp#{9`&5U~wJZC=pZ%JI*ZDpHA6NX+ zmmK(wFA|uC918JBmlNla1379q01f<^12L>)5q?~3<{_rUGhbMQ9~b+Tgx%DNHO|v=TC%(9#VSnn2KWPPKw3)AZ+VZOUHR5L+G8i|`a}F}a#Qd*%x}b_& z>S=-oX5=>WC8?lu{LB{pT%||>jMFc)LBxXq;FJHS}IbaP2+&DKTlw56&98eFu+Q(6x41oUfHVn&;J(1G|E zM`3fsUpZv-%_7_u9C(dIxIN%dfMXGE7yOk&2p#wr+r@a{9ySsyQH0yYW^QJGVLEkkL7caNBUu-xQHAfhfXl#i8ILig3Hw%vT*;+&O-tLwdn- zv(K|jEE35!%$Q@j;R#Zxi7RY#;XLDDLI-}%A;a1`9Atx^aVP_R&cVc`<*Q#a9g>PW z$Im#JdVybXP;mou9}Alz=J+XxoKOP4;K0ij^MFHH`_ zO}qUBa)HNT8`m)>qmG&d<`D;oJI6N;dgl!em9j9)Uk|2yI|41!l*Ac>K{4c-pKTA^C{0)xgST(@KAr3%oD8Du)@*%zjV= zTS1#Up2V>Twky7IAbEkk0vwBABYwsq{JdhcncC5YQ#&07_E`km*jI;f5w{o@Zi~t2 z1Vykd`{G3u!M4N{TtpFUJqFLntTNwSAXfAk{N{>Pj(PF0+PRBkWSpQ4ZI1YB93%Sz z&)y{FH0(vSH{s5hc-}WmM$312$_78ljC+uSMw>F*cfbVD~9IYIdGzmGTO|;3*Bi` zCo%n6G%%GIG$h8CQLBFayMTYHeG#AaXvH%(4!{vFTm03pa>CF23Lj|uKpzd0zT;H; z)k+)(X4ErZcqTSP5p1-1i|^K`SNzql5IXEP&P9`@u>Xt=MX)`xNg#?~BYtYL;3A4( zyV}fG9bDWwe&Uz*+U!p`BolXTbH>5Mo#Pt^K0_5XZCM=nIfo2%<9QojRcwWyaVUfR zIR_J0fP5Bvsz%sfa8Pm2n3xAlPs`T8^jeh!KAh|P-xYLxM)iVcp5&N9 z7x<}PrMJKEOT`rcsa0U&xyE@~y<>X65(XdrN~!R}^UCH~!8vV?_$kl2rX@Z&s7=@| zsAHklf{mEb=A1)b;^!P_n;Y$~IFt_agagG5n`X%_dYP;f)?02vi z-Ig5eH?hEPIOzJ89Ed@BMA0>ypJc(o4MwII7%i~vr4W;T@-=1j1q}6x`IG&`rQ;Xc zQg0dB7UzHudRAVn$CiNE#gzD#F4ophtpxx`oYFsDF+`v5Gpi<89jRWuR&LOGqIA6{!xJ2Cq+cgh!%X3@~ zo17v9+ZEq9bg`&w+8u`sbAs(^bIyTSZdZKcz{|n8;8?KjI8fXkGs#=c+`v4E7sZ|9 zd!99C>bu!3Ph{@gW}e22bM749IP^I~aNu7F$LIMLb}B-L zBHR`nc#TE4J>XD)V-ao_eB+@0<9Y}k_!rwno^wwOD^Y~o#b$1Jf{1r<1&3FB6T8rNt{1HW6-*^2&zo96!q|A5(7s#r=7V zqmIG}w}%`k;vC;N)G-b$GcNEe4!Ohh^Jn=Y$~nHvbKT4y+nhKT_(vbl_|n-A4!{Vi zee7V*w%E~TVCuj1jXEv3AUHVpn^JDt5*T=hJI6Pz>RiNj5I6AXs@Vj$Y7>I?81nY= zy<&31^m;CN$_l^WSsH%H6U1QlxmL-4r+SJhObqLp>La2Y_SYQzcd8egxoL|Inoa-B z>IJ{z06S8Q@9TF>9kL_wRH#{-mkX+n3e!{_p4*ZmZiyN3x+X;u9w9N4n z4g{hIHu^Z_P;e1NumvXcL)CZn-7EGOTEDYnBKCF|m$-*oUnblc1Jh6o^E_i=OQ*{D zR=1SdXn~*TrpSh;XXFWm>NwJ4*0a{Nb(v5Tx>-$N?s+D5Rc(&=8Ba*p;paSU$O~{A zo|=h0hW^Hy#56Y%d(6aNUatJr8P$!oRg=OK!M5R}rtdK7Z)b;`QAF1^nkP1F1(ocp z*R#a;9scjaxsNK=44>e>*)On$PTW3)6KrSusH$rT99MkiF*f3rzj7{JUfK1)^qf~5 z(7M_j@r?u5$-z0H&#=GZkZ_^Lu#Fd=6L5y?6YS2u7t~QJ-0Nw+^^2h`IA7v__iMr% z9^wklm-zB)WmWykH~94HujxPR?8Eqtee~Yp%N)Ooi_TYQf98*>E;nLMLv6BkDe)AJ z8lv@(8x&nw>zHX=ki~%+^C35zuu*lxd^*Rkc)||a2ZuRN88CC6gl zI2OTn#b5o6{sJGqKs^$$0&~Y9M4aO%9J+O8=pYeC?3IHH8aBx@xZ_Cm3_$~P z%acG9!S+b20w9WDTk>>LJ?6sG1r5wCPZxBKpXlis8hC1T(X(5BUVYCEkG876iyJma z&NB`~-f2|^%xH7Q!ITuVx^iwDIEIaL(liPDTn7_3Fb_Crw$Aa51C!G^Xyyif!67G< z9&^nZy<9O5c$VJgh@bM*E_)7g9)mEb{IS34KaH1)8#bSCptyn8z9t+fXkbR0a}Ifl zZ#r~2qqf8TibGl2oO7VKz0FB{RouXgel?z5Ue&cLW3l4NsUU0yroT_Y4a}YmGxnP& z^8oO9gFYj?kuQ`6jA?bQ`uLIhqck;p3t6_6GzL2?dn@gS&_>ESD znDoy* z^kVain9v4C-_@7G%7(e+=>~+2Hu0)jxwwI!^7PCN%smGacaEQE)va%rIl~(nityv& zS8j77E~{>aT;OLM3N2Usi^tu3Yc@?>A@C80L^IXqsN0N#2`y~28aw_-8yHe_ZknN5 z|94aRJFLgXQuq-QT1r2wUtevIc-u@!`FHqb&(V+87X7j+i`NM!!`;k9APcT5Y4|slUcI2KX!rt4Qju8gCazlc`>^is8 zuX(lQ2?8uUe>OJ)nOk4XNz|lqT#Pvb#00}u9fx9=U9LifE~aH-bId&iOfiTN==B=v zoF*!4&mn!S8lqv>*ED~g#U*{KHeaUIbDi2&=-OF%KqV!-a4$H2aS#4+&myLvjzzE?_`lcdx(m31x}Cpq zZ8b&;?4kTB9cG^#7z3Od8Sa~&!<=Wg6-zaGe{IY_hZ zz~P(CpNh}8h$7rpJb4jCxb+xcW2l{iizvda$0YmSRxvIZF{gVpYEaNFggdVl8Q)jM zFcPp~G16EI&PR+1=a|A!5kqboHtoyAV*R`0CHXz5>I@^RT%!F)u~UZdE9Oi%{Jd>J zFJ0SN-1(h2T~^;s2Ei#cL04^jWt

)yiRrS08tun!0%D`>5HP&24I6I<1PJkHNlc z>v#=PXa7Y!V@;V3Y%KqPA2A;P`Y(SYIR4e^ODVraz4?*}srLwYcHll!XV$;RV=dpx zf24cu*YhV6C#aTDt6ooDo?%!W910JGA5Yd@=u?aFSNCde2>9PTr)cZY1QJt|cs9X- z7RYePx08AR^IR8C zL!S3}^1+;E91r$M!YmeX9!>L#^Nir4j5-W?lJXRTRw$vBG|ZEjGGJ&j$$@15H|RJA z0_o4un_Q*SpOLE^4b={GB+p&$F_3TNo<9e1+)=&*Ta8nTm#_VJ5hZj+Fe=i?EV zgx5xlsaiEmUy0e=`*`(R$G-?F_BnvOoyBhmf zP_y`+JCq^k)!(f3TOSJy(uIRi*Qe8Mn3vS15NJNm<`Bgch4lRvK^6OA7Xt1v4=CO{ zBxdjtr-gNzIXrM5l`-tVUXZT(OPbynG)&FT)i1YM?SLpu-98f;2Y-%>XCidQwo83{ z6n5jT5MP%1WL!0yCyaVz9At&Ddey2_40V2I-atd`tLh`EkMD=(4cLUr@H=$F8O%P^ z+yYkH-fC_m@44m{B=T8no-!^g=g8ZAt{Sv*mQT^JkVCcko`y=dwsj5Z?=UZcwjlcB znDw#DzQ??+_bKw?xD#wAOrmn4IcfJZV%Fou?px>B?eH+)=VuX|pEzhf2M1o~cHp_X zjtfPgGWK=;NjalB+7=vl+=j8>&*?fr2yg{HQghPu0N1v#!?p!>VP=|F9C^2xY?xgR&`1}TGO?-Z zRUeDne1C3C3`F&D?03iqayT&GF$cQX&EuZBXF7=WUfb?D?uq7njsvArTt z?-5Gr;XAisY=#!Gk9k9b4liR&q313?FL_dcdtc}DRluHY*?rg7H`bG9o!@X;Sa;!R zM7y?sTJ@3CkEsji=eeD7wF&)U_M_bXakcY#+)B0CapNR@U}Gu#xYzAl@i-7(ZOV^n zNSmOgrP_3!$IaZrwiexv4=O+@9d5TDo5T;#o0IR3iHYaRE}si+4&wr+g>?(vXeaYJ zO7%<9+xINmK{GAYj_dPI{?kr5+Y#`oFADH|?wj{h+6@2C+@8cP0$}K~t?F-jg zI?fuG13Vx}%)=TH#e1-YZGhRW0~POqC;r`7N3g3eF!CWiwev1#Jl2o&EZ~h&Ik=vW zeD^>K+VdX7&>q+#zI9*ce+xz-&;!}~>)+$l?{g2}*y3pLW*d|RQHytmX4C8o+n{Y1 zU%hV{#sWOSB*w!q7F1#w)A~+TvjlaquYM62ZL=QtehF&G=RIH83i*kRYw~W*piUak zf~)A)z6;Ad7Ho_KeK(A;b!}5Yyn`+MRC z*3XaTY7&JORW}@?>*+h>;G7Wnn_L=V%Ebi#T(G0mH!?)j*qTw*VP3G#;y?8o5qxbe()0dB< z2hVGyjgsrU$2koZ$6ga5W>~{Ok-|Dvh6nR|6Y5LttK9qk^gczt(RH}@c@=Dhpiua@u`agL`s+f$6DChb1WK%JU7d^B*oUDx% zQw-D1Z$+D}@IHbs_{CU=psLLg(|k`BFk&9%iNBGm+M@ZyKCHo>CbEe;!Dtp6CKJBb z%C7eJ0@Dg(c^EJJ9v_wuwTQi5EP7Ts3+nqdb2oNy>7fo5jB4{`{GVxx&pt(;47=C)Wz8Psa?z5GnM zZyWk=^aSOe^R1o*c(ys|+2^wciJ0Y_%=Yx_^!qp3WS$hej89--Io_FsKB%Z19^w7@ zl<~d){hM}M^M@ns{GNe4K|y)e=|~mOw!=EMa?WpZmN)UG;UR74Hsm=21GD;Wkgq%r zY@7{?@3}*2_R<%VhdRVC^ADoYK8?R{Ky zcIG*To&x_uGeN(I;z^(MnqZV+^F4hH3@>!`-?V-=Pe%S+d`zGAeQ3ugx7@HCJH_|O?BD%Czh#3*f+IF!YDO%GWh=XeOYaKV5&{@0kgVh_%KfoUbXodJU!Ue=4bHCbo7(;6gAmm z^cg(M$tL>fa{gm+_oO@P$#<3de{xxu)4#tH@4AnA-@$NY&L=pFa_F(0R{MX3`)q$d z#avrwg@?bZId0}R<6sG0`|b26-Gkj?ycOSbhcev1%#J1T!1?rCwp~|GZCVmnZt@v% z%;bN~x5b?4qq~nq5wsV?jL{Ql6Zclrp`g}UoiH|QS*-O~fLqRoo*d`-kom^6IIuA; z(|6w0E%&VvCH`By!Pc@DpF658CX@`Dz`PuOr_==a$hOdt!O4}%a7yHn6lwg`$7cRb`xur;2i7O^RMfZK>sc$O;wLOlYkuPFWU;Pe(mn# zsL~(__U9ZcsOw|Iw#nCZ!G{4mBFE5K_5B!l4s&n+Tu_kLDDC$fZ#*LehYSO?-*`q? zj%(ASo3DzX{h$y3o-&QPUxnAPF$b74s$sXzL6yywxNZgCf8k&k_k>`a<4*liUHeVc z)AUIN)q?GU!Sw5x!tfA7Uw9n+xd3E6+d>wbL$Dv-3ICh_;WzZF{+-i^DWo{!804zX zFxY7*ADK_c6DC7X9HB&C;+&t2I}q!*!6=$vb$}}Kdi%FA$!E|lSsbtR_KeAT=EH$4 z(Ge7C7{4#7zWDPd^=FD41fo2c!-2|!{vXkq^X*TtbYNpC{7^@E;P-U+swMP?QbVjy z_jHa0ZPDzMx$mXffkuK(s2k-X9`{hQQ2VuK*wD7|l)x*^rfqr&YWV$2H#W_gX7j7h zIT_H(;lcb*xIXg^oKN#7FyDp9&76a)xf?Hq_`zoU{pH44CKy;j!-i2i1?Ml?>-3~; z6W07)Vc3pEu+8Qx+VRY|%vZEIY6u;?Q{{u}{)l7tajx}-;jKe8&;uT0Tk*`e#v=T{ zIAT6m2jkr=45?}KV+G?K$Kq%Gdpzcg7PJu_oYy2vn}4J>3)`UdHiZ>$+6fE_%r)yp1kl9DqFE|J*9_NGQsx|tNymC8*oqvKIPnL7M3bf`}Q{O%L zg#E3)2Tv(Cyk_r<}jLPnjJ{plZisx0(;(3Rz9( zLo~h2!>A$LKH&?!KUjfM_@R>)560(f<5u)SBzg` z!)CQD8h!>J2CUkAlh1$BxBVnOF!NzPf6=%7BtFcMkLvRUde*j|#RmygZF;;>;AJdx{=k-K5JiBDXR+FE!3F&f zhry2+Y_w0K6@xR@4`UgC!aD7p2eY}F)qm7bXriB^ z!k^ezzX$C8H z@n`%Flfw?vuB#W;AGiU1K=X3;k#hpah3AiwCa;?6J`b=@Zb$D|{5z0dhs!gJnxajO zgJWjv9Ae^GxVxVgq2cTL_CF`*c-P9d{)ltUPdp3LjRPCY@J{bv{^fs7JNO>zugY&N zZdp<0s~)~kAL|4`eZTequj*O%+$8br3`uOQZuAPcpk%fY959Z%{G?yRu~ZJ=BRGH3 zwgAUc+eUs))^hAC0xzev+$m4~J$j>faM5zglM}w?fH{j6C;WlFsl!2IVN+YNA`N3! z`}IT-Tx44|VH{%(tQb!S#ULJRa$uv6#rNEy4By!ab+968C)>#o_ihgK_-Ysh&?O&U zL=kMqkMJolfbx{jDHe5%*I=JxfgD}F1CM`SH2#i~YGnbV-&$~5^X<=0JQw3-J4X8W z`dq4UL9|%}+fs9%QHWXV;E8h9q3^ew>vZ_i9=21zEzk9;W1uIej{_Ua>AlT=$-Iq! zuhsl2ilc2U(DV3+ZhelyP@yqp$b&KGtzWykjNLWobrcGW9S`O)z~D)j8#oi3KWwYP zuH10OwyXOHt|+%|j1=Ne@j?ywn9iC6g7Xtbe;?(TjLXJ(nHxq+fIHb?)99=4Sg@Ti zUH(|80>cZ=A-!}yzifC9F!_c`O@2ItBlar6iJa{rn$^rB3 zDX)GG%nMig=cfLCr)@8JHP1-~Df)U_Pb}J28akgpg~Mk5F`r!VFSdm;!y1eRfe?J2 zG(72C41@8~J&&Ap?w%RZ3vJHcKZoYH{5r2=Ik#{QyyPD2v2<MEi`hU_bwLU$H-IZv0q;`Du(O%E^oC9VlvyK`1r~^7Jk4c z@dX<-VDYh|$80Nl^c-J$Jo20|VqN%q%>iq`zT#RxM+q;3C)*cnb$Jj0LNz(ZeN*kY zGXne*AA{Uuyaz_{tFi13D<2P1%?&hM&4IMZe0!SPYCoe9O0^IF1?RM*G=?Iih1K6ZEa2H${$AVw7u1Y&Y)DApa-+h z^z;!~+lHQ_J~XfMOiEdg1)rz;NT(sMfBqVw=cbH$h@MURD_W51o|HrfKSoBz$G z1u5{17{?v%vp5Q0aEc=QKpc5;@K}58_L%?OrV70p@7k6fv4joC#D0hI?$e+U=X1`% z<7gB6df(y2$~o)t=~;uiRsPR72<_-cpTp62?B^T`+t!@H*MyRY_fCOALk z25USg{hr8k+*2@(EY{55>zbMNJ*KK#?Q2}C4{PQFIz^D|-gK}+xv^g+$H591FTUq4 z{YmXN^ECQZe7!-8f5%P7j%Fup!8VHKp7;?%Ea)fJjbW2hw_?DRYqkR$OW_Bdwo-NA zX|&BeUhyFi490Oc&28;p9KYgOaD9SNhQWt?1H%io9!972&}&)`-cdjDm(UQ_JNpok z_~YIC8jWOV%>>k9d3%~C^-A?c&{vx$UpPJIc{i`(T5)c>eDg7T_;0FfUl6o%`~5oB zo^P6cf-XF8nk1K1OZ2GGwdDad*h!?hj=zQ2n4$L zo;wuFb68?&edXIcXN!Z4Ui?5&CVDiR&v8L&jS0&QR1BUX`<)GShh z80H}#2@W2k6n+FC^3Y=%dJ|H|qoD0(?&VxW9Xgvs9@3^>?`?uK%%1sc?1;x7ErL(M z$;?OIPgsN>Z~B!XT>W}oR}1hU$^@i78P{!1S{ zki@+0V`igI_EFSi)2;JycaK(Ii?yYRC*vXpP1O?vg>7fgjHV^XpmgK02+mL1)^QXg zZ-PN96dhX|C{5{TQ$vP@bPj_d8Tb4oo3VH_^hps zymMSmzN>xHFlk@}H3KI8-h@f4(;zYH_?oqIeEC~(PQeG;Lh;jgj=vGq{mTCx&U%md z30Uh_gI9flkpuCG+<5wL*HgEr&r05JW-qnh_|B;RJ{r7--*240kDmAMu?@n;)EWV6V6N-khUjyYlgS!A>^@tkdlU7tXOj z4T{H$0TY~_;?>yq>O82Zf z*VAC3dGfz&iE~i9tkn(d&!M~f=IOig8dDrp-{o_1n6Ck=P1kdqhY0F951AXhU+BbU zPWrnYJ8Ar-^(EkcdVlylE~VLV&dh;MbL+UqC4E76yL&OO_W$=v5!P(xC0za5%^`|E zaTv!DMka0EVDugJfEm{nu#ob^4(r?4M>m4gQyj;!kIP*gwcm2qFdJWU1jn>_#-J|v z;!rVn`9M5|la`u$@_s(h4*raGUVEOlx}9KLXWGneQ?M^MhshYrsv$AF#v<5GI7$d|>@UU&eV7IRJa{y@1-MvnYZs@CCU&i-J6j)SW!-FE zb0cN;+Vp`Bf^+J8-X!_0AD(Oc`;_)Ou}ArA zfvomjH^!8&91d(Og&(R04<_?ADu0P>H;+-bag0pnZP*asb~+cw9Fz51=tjN;*R{w4 z{TF_Hg(kgU@%JMV>$~;sS^ua0CL{;wZSyKYyTFVZ%4{raP>DYt=0M8mA6PAOK6s8B2og-~eNXnxMLm~&K}6cw%$d0Ot&d|N{$x`#ym9k?XLWba5*rKg z9cXKto1W;X&!0YL$l-B};9-psgm|xQX>Fgx7o(l_2YtHrGcK{b1Rnz?{;r(fO>hyn z8NtU1Gt8N|Z10Hv16%7Ks9-7lxS4Z+X#c;4taUyR!&s~U_J-!&|H1LL=H2f$UGsf@ zrqbm}QJ#~WrvoYWVMNNn7z$yZRz`!IfsIZF~o2J4Y+S=I9tSp- z!jBf0;h9d`da!F>GWuTcr}$#KpBwuzd%m~w?~B#-2??__4wu}BF)^SKX6-5OQUh*~{;pWuFFG;28zBEkyHf#-L^ zj@QeT1I{`Puk-wqap$gAn{UP4riR+q<9>{B>|>;XR3|1r3Xn&#;{Iw-t9>+_X|93S zUbO9XjzTp9U+sjCsNAjjg9AsZV5478@VUdItC;g~1P&yEBEE6Xr%n2f`+~X>n1Xtr zpEC|Cht6i7+Zqf3ZuV>*HWM13-$l@`&L+F6JV9#K?}$NrVGUwh?;Y@`u&%{rHl}n` z?Q%G5UhI$qJT3pm_#PVMjL9rs$jc|RhH z?(ge)?mf-({+aRZJWpBJ`*NMeix|uMydCF5$R=zB{x3F$-uhgYp&Nn_DI~ad!ssPp z*p5Z8&E{2NG#`mMeOJY~tNy0+9P86q=wnTr_@kxf@bAI-2i6<3>5mI-TtER~FQY!H zA@P~lPy`#lcjGI+0~>`KzIXdy{_;11y88bb&}kNkM?0b?&=37+p)W0tANn_<57>H| z+vHHZ>&l_?eK#ktE&XK?ejui-I(Urw;(P8;hI`yOrqqL_ayU*p{9t^OCt|hlzfDSG ze3gUxMMqGCA0wvbKqO6ID22AoI6x78plz+!il$Y~f4~a1&=N3)#+w=n=&t-=X~0)ZPk;`20|dPGv>dhyMAovaQ{u|-{AMLzyB@z zJY69w9ednQtIdSxL2%bn;8z!4 zK_zvrc3z5V`Ll{|`r2#;pI)D{?+{)4LauU5b@|ir#J|nbar4~6O4BvjjO&zgKmQa# znCa65Nx}{g) zLY_q?xmSLzmzpN&D`5Nag%Q?qcoEN7Kw6ulB1dCCTl)cv@_on$&4iErA3z=dTw^-V zTkW{Ri?9Z{Ju;T3Le>S;v0QYpxSNom>)qeavm(efnTJhNq1v?or zH78XVUdJ}%34AWByZHV!vs&#JJ!&z<`KS8pomYQxF6ffJ+{QgI(&pFTd;I|Re~$A|Sy-E*Sr`5_%r_iXrCI$)$$Z6E1??;lV1uj6T6VMNxx zLWku&8UaC6x>y&ue9l9HS{|mNag<%IVwek>oG>=}B3F^>fzb=C{_CP%p9g94g#RA+ z`?XDC$;9vGVO;*l{`{VCtp48Me>cNJ{x+6rsQLJ<`hn_?w0+SY%17Fg7t2T5`cnNv zZEb~j?YBS|`XdOe{%(YG9qKYkq6j}8Jd+ZJ@|A5x5BKvJ`=u5Ku_34?7c0hRG1@Fz zZMF}87gRa(8ZcfozR7K!b!NYvzuJWMgM;9Zn0L4-812~h5jPLynH$><>l2SfJV-m9 z-PFG7GjeDbd#pYBXFc^Xv!(f`2M73e?+V<$vJ(If=up=-4`QUG(2n|PiSG?R_n9UFDW%+%gf%c>OpxQTzO)UyO_(Uj00VE2uSX z*BJ9cfTNGY7-U<^XAQh_&ZxF@Kdt`@FZ4O1#};e1qbL2i6Eq>W_u|r?EBQW+6c23d zyZD|vlu6E5P**u4_K44uS6$I}OQ9^NvGG8GIbC^)MOlDx;pAxeltcOfVdgjwuX3G33U%REcoUxOiW@ zHy1x9co`Sq4&c;b%_~%(so*%?TZYZd3tf z4TmP_&zED??ib_#HC*qZxKLp`BcpUKOS?tn_nrT4;!2!>o z%nyL-Gv+oAtIlT~y5E$d)6bYE!KeNG#8>kLhcVVpIcCqWvv*T1fADX=oZcbOU*^(* zt>#mVyY60qtEFmNp80s7Q6gcMW^jWHco~Q2OtE)+Hg{epRkTQVaP5jb#UPPJsPFVy3#P>w1Lm|3x7%&Va*;D9_wJ+Jd5V40~x{Or43_gyb{Iaye7(xKP0;IeVRb0UZO!3var z&X3@~`nNz|J{AZSwC(2#=&A#myYByQ^=D+AuKhVE6DNQ@)FHjlFYy~4C{@p=5P#A^ zpF3PP9bpqpua!<^iupmUGK~D8v=Y~9=X*(>1M6|8xuCuSLs3Gv)Y%{EJy+T9P>-AW z)Q(L}8lwT97kC(%+9`{Au$bbL{re;ro}QC}-0j!of0a;3kmcX}kj~zzY7PPY>GmKtpm{Kt#H?)Pd;ofRS zIsDJ#>tr*%1U1KQ?ED}0cYOZlzxl=Z`$;%cxqW-}|E}YQ|6b4N*L1$6qu-SCHAeb7 zJ?cQ6D>now@T^~Gl`oirzmtpn@9YRMyZH@QOE-rU#bf^M`qj7};I0Q~pcu@{eLfe| zSHNr?$m`N#%hRsk%Wo|bIB@RmY|id|N|f9b3%IZi+KzFNK||vEXMx9kp%b>%n~wK2 zTU!#7$phuG)|#wgh!;f%Y#Cz|e8ln~;)4>8G1max`=N#h4*jZp^I@EU~Xj9PEtnpxcj`qHk z+WC1Q#>l}|Odgg6f48Fn7UFiXkdZ_69Sz-%CP6ojes~TCql_&Hw)6dc_&dCR{m*_w zo#X#xuirt#{|Qf;`_TW75ZbQvtbL(h*QBs7;m0`MH6o5ta~I4omMxUTZ1M_uhQ3bk z0Qo+d0Y0#?6n;cLoZh`x{!;l{TX6R>#MGa;;BE6!lQQh1JI3WQUYb7j+2^E>b{G2O zckP2jw3V(ciIUH0JgO$d&DKR>hnjV{T@>HNG&HSvbauv|-)>$-f8aU6sCv~7f~S~% zYywfxJo?1ZjCFjsht4uk#PMYf&b8G>;<)RG!&*?(&n4obz*t`zhz? zB${l;4nH&CY!sQ?8uHHFFxCO={eM7WUEWkNyhlTEFxB1gP05xBCB>U-~LZ zWAP}C05xvuB?)C4$MkiAQ3X0X-yUG}S#Rj;JTB7u`=G8bIgd5o3x0wd2R6p0_?|nI zAx52@(&w1Z`SrIw0!^srK?^teMxP=j1aP(;a}2ozK+Mmf0ZkK6{@t2N!$^!Bz#m*k z$@~y(E4(gvaD9eEx5*V_LpOp z{??$>9AG8zG3N+Qz$I`8kF8wpBjImg0h`Y`FI=G=?oosr&NY^iB&)Urv8@L_+R~I* z{+I<~JlMnxa}-Vs>!L3i^Z(+z2m7E+D?jdgc0<_B?wjhPIOepjqgK^lpC1%o9M9e4 z-GXA=>7)5l1n|LT{9P@@uqRyS*7wW556+?(3x?qIglVzxU=Xv7Ma@IAd5MLOyrc2| z@mQoxR@F!CIdbDJ54BZmOSL=?)u!oF^jPq@*2e-9813GCq)F>#Ic8T{*%1F+tt^n_ zxt>Fod^D3knNKDa;YYs?!D(S#i{o&QyXIB;&j|lyZiP058)ErhUK#ah`=Sl_(%&CZ zm9(A*%kgggc77EBoO}kGJn=EbX>)=xB^|>lk(kJVgU2X^AI~*U8SwrdDmZ_vRmWM| zd0SS`v?{E}w$qB-Z?w|qxX>!0GukBQRlf}U1T*N#QAN!1UVv+y`p)aRA?HK)*w?v~ zjo}wx(zAe1&Hn@E9@CWPv3Ps!jo-9an=jX{M7i4?9)&&%$J>T_fOT82^%CYv)+7_3B^Xkj>S&w|G zUraofut|Mze0ldmK((1`PTsA<&A3!NyQBT{Ttsz+*U-lrW6xs5P|sV=1Xa%IB{=2Fk>6?C@T2@EGwfzUK}_@2BzqTvUHSsQUXatRFPh zGWdHMUj=;L&S(DJ8TW%72sYX|`$dfEU+s~2QMB8{Ir$u{Bba5ujctnpTHDUP<_R&; zUT}Egpkx)}eG$X4!$-;k8_R6$%--Rv9ToHcJz&3I))L zc)}AO0SYbdY_!khyb->9oL5^Tf?$ zEq^GQ1oZ@?P9)}I@wE}NS-;fw3GuZNBh+>@UUZfj@~RL&+1utTbH~ajZM;AnDilMX zsDs*gY0u#W7`K;~=d~g^OtPo*Kl^;43J=il;df~+$C}UcpBoDeFuC2f3&w|kII1Xn z5=R|LTjN}aXJ6_QI5^gsp_A7a7>!h5${N$>gWeNV51vYN&z2$C_>;uyo=bc|B}W!n z@C5P7^A_IsfXo4|g$gQESW)Zr(C=T?9QJa=9OYpFw7R$H8FI4f$qzZpLp;bpMDv{Y z<&DSSRQ#Q9DC>K4fox~U%HGFoNOazG+McnX5B2+julDy!Qhrmrj_)tT;BSLWpHrNT z3$6^eYOk%y$&ESZ`8MWr$~E7PF|xvtT<3?f!l*ZzuWTO|xyl%N8S=CGN_ze2wTj&> zpTn?@!yDAUFX^rP|K+1UQ3A{2IfGW8GNSAk#t8EsWIzW4q*|L$C; z^Idzxf;@RV7DnF|wPnmVTB81ra1(QS&pH~*5F|%*sb#~lm)-h-*Y4&9bt)FhgbFY2 z|||hd@?nB zvOh(2@^w4PF&}va*R_b{1LNBHL@yan3ld<;_1e#>CI$XkOf5*1J0$^GTLdkm*rgXcs&3DVT(X9EBjFY zfLrX#0#nwQ!T+?0dJ_KDN}sER?F*gkY{T4%lKCQhxhsnfW?Aw_H`OjqLDYF>7pEX% z7^6pXIAwk|-8@8D#-;ZIFvGsA#u|PIKa&jp&75gg!;~e4kcNRL1m~x=r}jD8W81$C z|6kkZ*p7fLIFGg?U<(W^?QPFDFrt`U+%NAn=;&KfziOul#k}94&mYGfsVh)8#cQ%X zy%rcq^|mM7H%)qG%r{}ndvg98{vJN;^YU4?XMw_r^K82;FiN8|K7|YP(0;6tsKA9?rS?yUI!^^v8ES%G(cnzQFxNM>5hsQ6J&@e$g;h7ku zd2e--CvEu@p1glt@zi|^o{M;S2@ia(*m#Um_%i3!n|ge>SGu25{v`f_ZdsXEQ+(HJ zX@G)5fta9D_Im6C2m1p5!l~dK`yjPCbS7LNX86tn5O=@xQ1y@}eC$@;{+lP^hmE2n z$)XJPXz)qx3rQfnJdVwNKC$l~5_4}HrIbG>KS>P#-WA_enk-%6@gldH19Xny+GIOh zI*fldG(HYp1wcAXHorU z%^P_Ix4*5Q!DX~|e#qmTW1nXcBL3NyS|gOfHI6BPPJJ%QHob@903Kg`7FJ_4+!Ki} z8Y9Y7&d~d3UOM2s_9y;Mb^n~d<1f^O{QsD5(@UTx#>mFw;1}!8T@b4>y`QNwlOxK?C(4__u`=XR^|Nym2l1W!Z^;q_Y{46gu;RS> z$M2QIXp%T)wMJ451&Nu~9+OVJPbpqWTE85F)t|7rP*Jn}@H+;xKVyTv^5=VVECMf} zG}&Sd>7R^>B7Et`2u=&z4s6-+7lPOMFs^yVXOHU7qN1xf+6D4-BEm!G*|>c%KmWvw z;2rlk*^lKIc`H9_Sew14c^jh>UCh31dD86-5B={!3O%E*#OH)x&!M=$(~a5UI!oXW=SBe7!8|vf=bqo+=iK`vd|TIMplO^F{r2(kXt5J=?fv8Hljw`V z*kR(gsLqGMSYXhK;+Tv>LESJ0sdGc6ql&-t4P}`BSGEgLf5jIRDC+%CpgZo~f}_E% ziF4s~)FCbxe9q@d=z@IDhx*Ck@%`upLHAq2ap+;QppW>BuVOH&c9|J~VLi z;VoH!)F+-00{{$?Hpbq{7V)Y&7Q-2od=(9q) z8zhVNTeMrXi~c#A0~PN{CJ-aO`qS4rhGDDuYQXq?)-aYc0^Bjig15l5xODr_Nsrzy ztgnn-oX^qNQ4at!JxifZc4m4C)fn=@+_HAKA-1v0@R-bj=t^vpQuw%pWK5Md7?pDalVl!Ix@)NjAzDmVm{B$ zrfm zBfHQ0=(ktk$N7^zs?J+u_9yM?@Y!IUm1@&qyQ;)_CSV5)inT^Ev`>#9r*k@5cZT!l9c#Kl`5>BY& z+8EWG5#Z2oCKlz$-cHXjUsXK_0`-V$Y4&Pwjl)_NAj+0WmT?uxVy~eZhzTBo!wu)W zpzQ>s2;zIeb9}=xv+SuamYg8fdv*P%&(e`ovHVVmY zgI~HBb^J4~nvJ*kU#!W^|DrlS&cCQ0YCGm{BV~b6S>@wXF)<&Riy*DZ_i?*yIwc?4 zb#@?fH(VEj_(IvU`>gj>0Im2JkI~mKAEJ%j z3u^e>BBhP@=QO~n{}X(!J`w7A?jH?U$li!o-J`LuBmZP@p-%c|UhAIDZ!Y&4J}Iti z_1xHFt%01MpO7a>z`8me+P3IW@9oc9v zyJ~j%-sfCTzQITK82{YAg#S~yfk|Hk{LcBL*8 z?A8?uO5Z*upV6C8pO5{G$1|T;`^7!C`fdNY68%%huu+{iH2W68Dj?iI;^hI}Q?fUR9m_K83#J`NoSuF5ate zc@Y>cz**qLI`?j9@79*&6Z@Ju2gvRDo*JKnLuY2cD1y40hl$}emU$k&^O?oZXP*I; zy^UznvcZ3rRe0Nf282(az*k>sg3Ukg@&kfH8zV-7!=rpiOcE5~%Z+>hEiJ;=F~_uB z`}L$*U}|nh;1?JTpz6u0vT`F;LB1iMn;um#@-M)-S%F6j;zFMk9zDRj6NN%Pw-g+@ z8>)}dG(0ENzMRD>w<%9ObvU$fRA^&7Cp10Qn*bj%DmXl}(Vs2|F!%6nUqd{pSihMX z%>Qn?yMxWE-#sbZWPj!HZmmN7YR!SYb*_MMrl+VL;VU?N<$IGId|qV*vemKp{Rrcp zvPvDrqSHC}zv`@f%kSxO`$hC<7xf&h>v*-{eXn%t ztK4+LZ8292dB{%jZ}#~Zm*Nb8*}oUR4|?o&_dcRzh+{wJ_?q))Di=cE72i^2$NZP(PpEEw z@O|jw^S%!Aa-NyA1oh*7NN;^UyMFbU`+?n5Tb}26`bGuYY!}9RXV-V{mr%3o9G_?W zE?3#7-@m9*@Dl6QjmOB9;_rMz8FQw|mfk-CpghP2@`|(!*%x)7G1l$D9nESx^{+6N z&4yvziJ`3CC~@fVQo97_Jw_Ki4O7TTG4OL8N4$<&2~R#bx{s4XrW{J|E02-V7F?rU zkMAio5^|Jh5mubD*?ov36topRXqdBcM|{{RIHXP`8o`1(>W_K5+D;Htx3{p}UWm9t&8{&Euk^d!9Zv>pkT;XA8W59%V0cJ7pj* z;;2#H$8pNNmY=DZ&MEi$c?JOWyxXf1g2oAB{(1N zInc#!J$~7<=9NvG;xE8i`oQ22pJ`|vCP7vpifgEyMa86qu&yyrz zc2R};lX@n9u6;s~$(COBhELRNfe`zmYiWD@?H$)??T#7dG_-X-DS;;)aeUPozjZR6 z8oUJtQYen$h!NJFTl`kqF}cHN2)$k9T()m72Y5O{Wgy?<6AW0k!^mYjrj%%h=x|R7 zyO@cAxf7$54bQo^^S`D>)d__@UjcmsU-tOH&-^Tg2Dm@z6`@|7SG#r?+Y=GK|;G@{>4X=<~Y1LShuOS%UCjT66C1FF<_D!~D>5 z=pUo^>rG!}x7}gXAa7&+PXlc%fal@*Go7;NKwE z@xPk)h}L~d^d+!e_q@2!TNQnrb9SwQ_an}{#v**V;pZdHh4LsL^>f5PpzDaUIv>}GnK`p5 zbl_-M>&||TpnjOM2VT(OA!iTj0+UjPEzAMDvj|_NSg`4~U83lZ$D)`XsynpHNfE>K zFsJ(smCeiNW{b~NcX9CmZ+dU?k+=UWRXyr!^2`w`=$1U6jO!TLA^U<30rz;0p>gq% zeU7mJ2ZnQdL8U$x*J;N(-m@L!m7K5fQt^=+1uZczZF<%E^pLP+$bYk?DDo)hd9~iM z;Ri3f`4H`TRd8^Rzq#T8UQHvO_SU@#P7B+D+s(gsWVTx%k8H0x(S<<&?l}p9>3THS zLLO(_CjTF;Fn6tHt^S8brzgm+AhC!Xz zvpk9K{Qu(8GWU`}VQM_^#GMfzKVj^I^T$3Utw~r#?wAEMz+y`#e#lfw`WeKm-AMghybA4<8mBsvT@=@pXT) z5qQhtl=86;3vf5*F(n|t(}%Zggz`st7!vpw`jIa8sx8U(iNT@A^lSBoxBFfA4P8VT ze6`9w2I*6B&-a7m{5bazylbCG#V{_{J}DJ{?C11l(XV>1`8K@*!wX%z?!`WF&WHB2 z`)=fIf5OO)oBf8%bGYS$41VkIIc$6$JKNup=e@Y#ehNc3;Jdi!TuL30x(ke6B8GA- zf;#EZi^RmdvBW@*n0b$OxURT)@1{;$`R(T-=1ISA1%+m8)vv969N(xjTk~$5Zf@ts z>*17eAWY;Ksp}SCg*X)9%MCu_P87&`Q9i{_=6T~Op9r>4U%z$=8{&QPPd5k3%q{%z zVQyi&bL(SQ*tX+l0y{pQWFO|^i6!j&M(kn$?D%9V*yrct*omsKF?egQ_ob9SpGwfAW650LXz zPJM3ApD)n=@A+IN^fLy68gbcp9Px zIPUNDgfUTs2M^|i$_IkMCqu=G&tqR9DMBaIE4S5tKQM)uzs8G|m+&379Ogh>C(u*q zD|}nPza}$&<7{JJWAiC?A;?uHY!vjpp${C!c<<&tG=d&6pK1$|=F@HAeeJV(<{!Wl zB*~LL=a8teCVDWdpp$yM$>beE7t9kXWkX_|fdJVDgdFDl>f=Zsx z$4-}HNTAT8nSL}6ME;X=2lsy}F`q}O@?#TJZ{SlgT<#rD*172WD+#fsNmd3wS z{0qG~ejHzjCT%3=4uh8759uX1pD^ml)>nGFf%!(vJeJwSobvLAW&UjFf0;k{zwo;6 zg9((7=f`r!KC7i3<_x;NeIKDa1#qsD`|+||C%+c!Wb~<}q_VwZJxt$L+ry{vj&WM! zRm@LuY4%})Ppcj#21|gE8qB5n9!dax7I2}=Lq0l2A@-Skd|R2`!-wkvme1sqRU^hD z-yix%WgzyMd5I{SaJul%_|@afm*q*#4MU&Zqu z2&&dR5#PT?!!*ymVbTbE

EYAj?G3ro12e%w!WYHB>kduZ7E3LhFAU8DqAG{^c) zHCWs&nTT1fQ5~bnvD+Kof`WKjcsH1IS!*E`~YFRZfhn`Gm$-A13=;o^#jOZu{{$x6y5zZy)A16YW#- z1fx(ubSZ#a$< z!6ExS%X7-co;vUyPwO3+3|%b3it`S`X3cBSgC$1iYW7t+%xA?be6&ITY`glm`LNLc z^*Kqm#v?a13U9)S^INh6QC7iCw)0Q*;mqyq-lsY}Fy!-TzRFaFas5$WiK=;@ugWNU z=?4!myJTEC-`2c};4LuL8SV8TEif%c9;5|^3M|$>Vua`YTn#OSZKjP!!*lpLS8wot zw`bH?r%e3E(_hoZpHy9b_Cd7=qK2SgX#XSPRTKiHp*sesb&L()&{b6BxbV+%n}*hw+8e z!Zy>uqxJZb)%Z&3R|tHD-wN~y>u6V>Z_1IF&*Y!s#LwW*ppx4u|JYCU^BZIe>dyaE zh*IY_S^GcZe)cK+^9}ysfPZxkX`E%Z1_MkD6TD468FH0|6LU6RnCVC3r9c)T)FRLv zV<&mevqf-~95|O2)N{Q5Eg+vmh_^`K;9!ijzP=yEf_m!hsp%QkPEAjK$XOoZi{g*w z$qigt`rK>W(*C!u@U8mjz^e~`IEk{@~7+9 zm^W^jI*jy4UpUH};i@McHs19Sa+LY;HUbUGWZ`vmPN1 zW!6)mmo{&_NT;zhJ;T@}pP~Ts;b0fq^;*dO?eRU7dZLdbK5?CD1v*!IE7jwi1weim zjf9MM2av=Q?* zsc9biR={!$&o7w&jv>S_Sr2#jg~$#1z{~JARd)7@p?Z7SL~iPersq5s#q@-1XO~`3 z+nv+`(`-)`RAL_6VvL8_MPH9>@xk^;79E(4Hu^)h^FwE2PAtNgJ8Pkf&r_^l)%FRt z7qU`r%z<(4m3-->#`5~oDNq~3r1H>7x-d@0-&kvAccaLNtAoMc|123pyJL45=-Hvk!JV#;R$-l=3 zCa*D?34x&wR`#p@bUx*vouCyyfyA<%HbU3%n+u!|p9B8OKm9%V|BUaF{o|j2jqeOV zXN}z-u}5%jbk>HLM?Nq9*1Ann`2HFSv_Ov?XUYiAp^NcSqxp^|ayYyf69KJ4AY`eO zc*Lk5zbWM<#@d5Fl;Gc}r~LA7RexaMhfBj3p{a;H$D?-Pdi8+}*2v;kg8~CaRIwN)khZZ3mgu*G$ z*;inC&H@ph^IAczOZ}#2h$Hp5JCguUS;oDfR&JAxHjyHKfVqRuz_AElK4I-g&Z-OQ z*nb$nHlC|rj_i&5K8&ND0vQ%Tr7W6b4#$yUA_jtUV$S9_>Qp6oBfc!wY>H8mz~H)< zm*9Xo%y?|5EQK#&OXTpy+F12_P{}v^Ilm-fx*bwZ1O#qVQ+j zV1U|NM%l|4xl`FCZJ|?S%JT^10;BhL?KfE<19RQ41t#!azZzxJX(LQA{rBzD@fxZ8 z33l{rB*r~uzT8?D&1)h0WQ^B%e>9$=`t|i}T#L=^+nu~kMRl_O$Xn{?xq3Rr0>aLC z#r?Xj3E@!VW&sY_(UwK7dawiE#Ra`rok}4v*ReJW0^jNE^2bKi0;Az`TXI5KV7i>q z%ldLS=fDirGtW85vHII*0REYv@N-><|8Do&?do$ueCmw`zpc~UGZov7HTf#{9>&_n zFK9DQ4*Z;`6I5qR?`I8IU~a@$gBSR&-##uWqfcT^;-c5*dqJ!RYAk#Wu&HyPFYaYf z9zHMVhd%h=*wNrY?fr2FPQifz2w5D)yxQly4(7nz7@KMj@$|`8ylp&2DSU}st!pH6 z(8@my*r)g>HygFL#$i1#_5P72dndekpD+j&laR;G}XC{XS z{*fNv;wX^=&^G8V#M8zpCl5b6AeS$`u0D`mkA2t`{$`gUdlq-%l~;#{ny^LVMU2y_ zIs*f!E+UEP_iIDWN3O?voj)OsaujRo%pdTBsP^WE;2isC>Mu7i5o6VdICgrff3y+0 z0z;o}sL>ue&@#l193lXML;8(MwSBU^w!5PPe|4Xdi}kSfr4L0%{zsf^yx<6xRU!{% z;UJYQFcwAl^3Hp1KR>9>-&>-EPR(y?VlRXLceZ%I9?6C+9>|cric18(a)9987E6NA z`OFqelt;4FmYi6GFP|0{)mC*rv!#&9Gudj3WwJn?p9OFWv7xfOYY)OP``r>{gKr{^ zN1p}E`wsf^ne7G_c6C>_*{%r`vRC&4^q@%-_!k-kW2c`p(UehZEIN#iG980{SqKE@ z4x?)c#}r-`zKj^{!7&=Vz^uP}sop%jkMIVj9K5fG{?`Bmhg-7E|9bBX+0Os!t2*}4 zL)gmz1paakxih!J_T1^b#UIWJKIFo>+E)gq5Hs!f8B^M;0pvTh2&|rRNv{hp&pCjm z(4W9(f$8&22UTEb(%>IP+RHblG!A*)J>S^ff0-Lus-DMwhNA^4=I8CheW(7NF4ca64+7KvzF+p|?ZdqN zoM(C|&*>SRE(>Gq#520Di@&>a=0n(zP`qu3zYbEqHU8gv{-1EKr1ryorO+00^Bq5b z7it6VclZ-oW3v5tFKi2c`gq@dx*c~B%D<0Kp{zjm#dmPPJgnoC`hwB|12l@u@laSt zJtmGecWuSg&tV}`P-{nZuDfl!a^P@e5!UE0$fFC|wR%=h{yIQhmg_+N$&3w^XkfIRXtc2o?aH9GU;1`lqy7=&qWc_2*GMt2wO_j! z{ob;dR8`hSdC0Q4+M5IO6AqeP9j4`^TGud-ZImk;|MS4%nT-}Abg_?VMx*-Sjb^D8 zj2%zh51oycO2TWvJhl&d}ds`W&eHQ*yYRi_jkfv(SlF6z7(4D6BZ| z`fc-bTzAZ!eoM$WPtRwx4t_4dfzB0NBZte_nfI^PgzU_1q+y}|Y3$hDBUyG3{bE#w zEGWdd#t}+j5G27VZLgSbzYx(dxnb!4OMgnkSDpQR96C~2VurZ$4g*yqH-3jRqcQj= z+gBd02LR=WS*-_tNUVKNN`F3%HAakp?YS*^X-ns48r=CuRz4iYHG?4#A!of%eVe`< zw7(A8-wxV!pS94h`zE&E$}2=Z^dH-s1!VQgErbANpMF^RScsX0jI4kfkP-?c?sFVTbYi zi|MgoEHTunoHLG^AAV?VsJB~Rk8&fGf#)q*fXqeaKmw;Ls&u|F4MR1tjswpOaPQ}{}K#GUt-|s zz>rqukXw75CjltHRQ}T%Y2zZD1>9=fH`spgT&VW-YwN4}{6$452fnKMU)XneK9HP1 zWEkT=igU*Qr+~QxMMtXOfU)=x|K$54=&AdinSaa`bTa#l&uGdGKWFT%DDxhk2t@TW zOb$IihNthXKFl*$o-f!f@MXV#MiX0Cm~k8-u>?r^?O0FxvcPEeHov7;V0fWxe~b3& zPh2mkUH;qr3=3Fl+~r2x@v#VC?~6MO?s)1Ru)q(>Lal>hsHSh@zEimY)X8Qc5VD-B zn_Y4c7uy>Wf8z5(otx|Ihkg!k>p4!?RvLH!xJSmyoLhHIC3I6wcF<2+Y{b`h7Fhfr`7BkGU13J%Hb@f;2Xst0^o1eJPj*$9xz zD!9o~mB7CEJXbNE5TU=rs3#TUNf4OJ^`5aD=aX)|r#dsppa|-A*DjD#Sqh;D>TTKZ zNr4cGpi=g1-q5~0kbwt<@L}^$Vr$dM3nps;5S+8G)^1MUx0|D*{nF1qUQY8c{e<2d zx6$5djs-_UHhgEV-oMPQLSXe_htY}EFyGWa0vv7s99!Ph(V_F&7E8pycRV{=x;gV! zKD7NK?IMQ_H7PUr1XkC3mijYgUKUj1I}U92JkiUB>F*J|PLO(%2eGHKyz1kwUs50f z9rX7Li^W^vC7<(u&tpLi{+<4D&NTjdIq*;)`QQ7{>~fto*5F;x*6APC8$JI$XPfH; z;^aw-H&pG2@69Jm&KzNaI{AFy%+VGY;x|;5!k4E1cn{m{L8|{jbZ^UB%1|k&VN0if zT&# zHFVzMiG&FJA(O|m5g|)+1bxK5DRPx9*BJl(9XNbip7`f( zxAQsW70+RAVI;zq%JV@i*8VS5=X3w3FFQVnLqYBG>M%Ffe9}uGe&28DE$}bMc@9i| zOZr(MbymLtTTnm1Q}>t;cxFL&#Gmk#1x5u5OV_vIcT(Xdlty~cg+i%vj1i78fv6S^~#L5=U z0b;WD)a-w#`7gM&F=!(By zAtv|eL2DgEeNo$ksGG6VtPgn zzd#h+`=j64Y(JHt);(tX$(ROirYV2s_ z!bTAF`GihLFTu;GQ*TweR+-vgK8}dJK(O$sXQAr{@WE9v1lL;2ui-9LFre8t2+MTaWLdl#TU+07%&}-z4rG)T6ej zXK^U3cl#niU^CuWgcav6zJsUU%Xoq|USko~8N&-`D||;0))8Y?qs^mIF|>0-Wqa{= zzM+h3YzBt~oU8x;_1ypIWg>z%@_GDh8J};`F80YHtT-QIfqXXWtUKa8c!5`O$52c4 zEugWUBv$+KK=M5LI>l!IQG^wJk9{5F7(wJoArwJft&0>>a1mu*7qPDw+hJF%c@&?_ zP~kOT=&K&njhAA0Y5|6|*BRffB~K5)4imq(Qj9r$fiXggG3N&6v&VZ%Ik5;U`nwei zny=g_)nu>zRt7xPxSu7sAVELV#v)?Bc$Z|dJF)~~H zUB@UpOzQ<`}$Bd!>H;;C*Gng%x_Hd7ua= z#h%FVgbsLOV!Z6fg3+N6^>?=D9>H}g-32D43_-}Ts4U(mJ$fxL%ujL5=Z^)O21Ea| zv0!`PN3!g|ZO=Fi+0KXN6vyaw;&6UF)+|pJIuT72*U7*vFbb&{5DE;R+h{NiG2HL! zJr3Y5Ph^pkI`jZjTb}xv_o|QuwbdM=!3fNfGcuax5$D|ceau;!>^KG`_>)eHOKJEY zk>?DepgZQ$V_TB#5h&aFe;Du78u~lTn0vl=pdR|9pc2a>K*pR?^U(Jc_wl)MpbrbG z+KTrLm8I~-Sn+7c=gS<1c7YK2P;Wu4OY5d{HODGi@Os~t^yMM`75E>MKj|&>t4|N? zt>cSW>M?65W{D%ym@b^ zN)cgTa%2I|! zP$_$5Zvl=)P>F|{uop)-Mq9)~a5!OMHIr*aF|_Y%%qK zEif&nK4JnxyEfG7i{nm^C0V& zQt%<_LU!nD9$%1vRFm!eX6+m=&RlRn{WQb+O={Vqou(_FdEZxfq4{B)dpRIjAYFNu zVNM&?rOrV|n9q$mmHBtJe`eqW>d3k7#gs7`8;7-j0C4?vPj@swLt92&&d=;l&{sd- zvI(_v>o9DNev2OCh5S2=GIwrjh5$o9E5_ob$L@Cw5qIi^r)U@rgG_t)S3R{n%O zBVOpZ#_Nw$yt+MmaMpm`+_Tem@>E0lj;`p>7(2CJa0vYjm=Flr%XtjAj4G(N`vRfp zi*g}*Jx8IB4iCz!+)!IXXNLj0^_y^Eff;fmktbwmSIvJ#pfTR-`Uh<&^EyWx5ir3) z_-A7y`q$F*3~>qna7q*aDSLRoo1TZ%m_qPqJzw?brvGW4kQn||yE>l?wp2b{+!@G_ zeL)9vavI}kwf!1x|BAB>m3{o#-}#1Ob0DNyF6~XWkE2dXY!o5^maAAmLI9&|$62MS zKYf1}`m0Xq{{9}6Eb|1x4*hD)0iWtmkZAqpDtl+lLelU@>n_*{OLxzc&uvd%fKS?B{}|ofmjOhW1TPExkYmjcN%vWMJnV%(V}IS@b#F!d3FjOfrnvl} z?s1^|fWL(7WbYCGLOk!4oaZ-Gmco~o5958mZordNKCh7v?F(_g*Vpg5Z2MRY+`>1c zAgJWV`LHU)7(DA&eFpe@`qg_KWCfKx=YIR~UO7y$Ab(wibb8KWL3{?5MNrxA9CuM? znq__5DN7j^L8a_fUj;Z8L0#a7aY6mz_XGSccIgEf6hXbE-vf4l-|P1v9pLx;Js1c0 zz5blE9N_o*2}BXpg}r;0FQ)o1R(he4X3O;IPu!iGx1 z8tjOdj|<^7l%p7h{tS!|_jqiYT*#_Vz+s%zU>kH_VQ52O4)-82-qo|v8)FlKS2iY) z3;m3X2AS_rBj~%%IiVBy@DIBa0O=nzNB*d{D+U1w%pw0ej+DVO{z!t*|CoO^*|Qv@ z@>P!A>Io^JQ~LKP{iCBv&_1kPXGI9O{f13VvOT3uDOZ} zJ>!~6BJN<`+mb8(g?8qW=6~)nki|9H(&xsX(N^>DBe{`E)qg8qAliK5`zh?vMp;Zoj%#!~ z>zwe=FmNs%{w2JKvD?SJuuXg6!Sgi?eHr3H4bXqfw+Iqt87mgy3uMpooOspU;cxW? z5M}kg)XB1MkE5DE3@B(3zTWT^|EBjZfZmz^sXtRMitq*cZ}A6F%Bl>+^!=`^+g>2Y zB7A}Dm7gQ1#IJIUd=hxEta6N(+_yTXDPE0j96F3TMll{FpM6)#{_ye=9>70b zo4E=e4bKm6+i00uc|NkyN1mYbWBwM@75^G9bHmOSv2e9`l_3YD-*ag`_$VYF`lmkY zrt?{%AJAnicIz*fX6>mQ*f*QN5l00 zs3O=krrYF)?z0u|%PhY6*~+_oh3_hRUm7K$4WqBx{NPjc0z;|Lqlt2X$;1;wA97o` zp|afaA-vMv)206&soNr|Y~?q|`e$UBv%3PpcsU0B??2Rd0X+2EJscsGolFai+Ka! zi=5GkDRioMaE2Pe@os*5HJ>L4Q1;AMoZe?&o%x^Ff)BcC_q*Kni{rrD$sd9P-|19K zBR5iM7+$FD2x7>N?Y8eD-?6=o>#^N`Ck1@HXQ3Z-+wvstzt6`$l>85s=i@l0TxC1| zBs6z^_>UEH%jfAoSA3_FF6nf>eGxXmC$~5Q)Z&s}0#V9d`Sa@kg5R$JsQAm9@a--) z7};^t{UBvK+b4g1`yTr5`SXqejEvlL4kTYy$m@>b+`FN& z6ut!DL%9ki-al0eE6#7_zzg8OcCv#Ha~}&>06gtr5muKM(1>S%-8@-Z9MKuD_@_ni zO4+V2^+vb`N!cO)j zH~nvk(PXduAHj~kexwf>GZtZWyTUhUTF08cpj<{p5muaccCCF#Ad0YhU$=c&AcP{U zV_(Z0j)5L{Qttaw{)w%obF~IAjAqqt4L}Y*G%lV5LVoV6q?VHLMO=*d%2(^ScpwFe zqp#jqXLE~r&t56p<-kE)3VLbyD<8h|-WQXeauD|S*oR4zBV;?f4t!{%Jn)a^hi-3p z&xZ-tG#{>W+k#3y+$VCowV|@C_KE-d*J-Z}rF9+t$Laq_+V8cY6|PoRns$eOC!G5X z7D1i&lJAI7fg05{`Ryo1WLfbKW0YQy^p5MHm>Dd}NU#&~igLQt`Rh$p?(_9S*-$7Ae<7&Savcw93 zN1ug-@Wuc{Ly1mY8B@H404z;tnk6vh-Ez*s3&C;Ah#G1m`$IDHP) z=^6IaRcD6Xv8RSH)KAVIefCoILt*HA9GB8$L9N|qGfu$KitR(mnLg~|KK_=!;%$FQ z{GktH4R4v$<|`TEvi2ur0J}dnX;|fEdtq|x>>cw8;79tqv7b^_+0#4+VwLBkZ-D`; z*dsLlrE;tHUt{0m68ZTP>_*ub1QzhD_l50_pVJqC7=88lSv3C^MD=-kg`QjaIruZ_ zUYHzijbGf4qpw#2clt2?HbUd0`(Ns;m}!27Xx{1Z|EHs~OO_Z2cbGy<8T-I)H3>^>I6|yTMZbp9e+(O!?3mSpY;28zbz&D=XfS-K??nsG3xe= z^ws?RYUVZz-%fKQsd3fk*ZpRyt@!nt#QLp1L>K2AWYBrdp$vF(*t7*f*$`doax zoO3WKfjIqn%^_*91J4usJnkJ9)1*P&Vf338z?|rhEeW?mx8xOvn{B~t~ zQhPzE>|;HwQKMh#7gXBC+@Npu-oaywquT4-GMdeAxTbv>p3N0cF+nAV4)d099y;?H zqn->5b+A&;r_Y(xizgRm>XDJpxMdrD|t8fxOF~*?ltFIOGfs#J}a>r!{^jcuXe1q5mGx+efd7C>+5^yIrLSx2T3ST?j0%R9QxnkD|sY41Anf_fCk2+S^yxECLOKk)zkzyF@`{mVc6?zjK?C-{SbV!@57 z^87Do@7ImpeObAQO5DCLZ?NU@^D6{R`zqEKyBzeWXVDn%7{8T&0k->&oa%AlP7j^W z()1L;@ot?Dfax&-fylt;u^!DrjW6|3oc+fA!uqn&9DQ||w*(o(;DEBIJ3TotI6x6p zV!Hffb06zsIz`+0y3>g^!xS7fogFuAH;j2z&_X?3zvk_~QmFEBJk?a5ozBi)xF|4v zo}+DCa~|Y5l-4`}r_(%-k$Q9e88({LWH~(pu~6x&;3Dw{HfCI2`5`4-abHP~xtwp! zZOwK_54P{dODes7b-G23&Fe8j-GUhm=VkXD zOLAteUc@ocR6(6=L`(BS#<8FhGe1+Rc?iH2XX;?3o~N-WE_-+%!FAfYyN{qR+!k!T z6tR!@x^7IFO;`NWYvjK{hHYA!&M~j(U=|oGc%$t#&mmLL*2QT3`vrh5xy2q9`rmz@ zA{WRD-pF&xpWzuu!F4U!@r!356(g|Iauw(s__D_HPO_o0{FyJ!=l&d3v+BwGph}#Z z-lzmEwEeLUkq6b@WP4TW8GR^=`y)C`wm&7F=_IggyoVBF`_s_bW4hcZjf4Nba@6^j zaNaPv#=7fQz1lF~jNbWdq^`$sKHjJPN!MdP|HH|5NT8(SIsERR^;I6N$DYn1p#23j zYHnZqFuekQ?4R_u!^CfF;cG9p&pp`dIi~+jh00-mAh(P*7U2v0KVY1LUc+U+Z__%Y zpzWjnQ5{g@bE(o6oRiNJUj>hl?QGHXpuK7!-U4$r$12`~7x-Iz-2eSPceVCV{T`%w z?LphgO~5?n^KK3-Dw_d75xxN5uT=`$Vo*$Z+vyoT6H%Q)!KRb;Zfu}4S(?s5Zm~~P z*`kQbha%2j?;VP91w!bYZ)h@%b#{)iz?@@j^qgZX0D+l(UU=hTk>HkjR&A{Q3BSZU zeBSTD%`REXnz`q`O=T?`{l)vTUvs+l?qh1Bwp;xgDr67m#&Z#8oU313w zllOUIP$3e1jdRqv_w;@>NP(~O0K^OG+;4pM@^l`67-J!*cR4T^fq(HBp26JJjeUEp zx4`s1)L;9`I9nB9aeyax8D;0)EBc`Gzv=m#crEzRu781+rIp?t4;ls`DfhfF)uv z`KRg!p!whSs?#nWyU zVZFoWevDMVMf8Dw|6KS+4yb-zn05TG?2WMgD0?%wun6lNe?GLAdRc_^Mtlo!EP~20 z{^AMbBF}uBYVHY|2aJM|mo}CQbBh@E%S-)uQJo&_z|`CZwxC9zI2zWab-oq!e~{;@ z--8X9a?tJ~;n4;8#67O+BvIPyfe%^U3wk~k55OshOhNR|3cZgwPzXg>Av@0h()>vf zITs!@eCKnsniw}ih;yCv!)h)rfhkla_9a;!MN@>Tjtt!;Y;2%gUK(EIPHoAn*s%2Qd=bGztQp*+rCe8)NF z^L|X}g#`v^l+Xj6g40RQkcSNF0+UjPVCcaV9T+7M?Z8Ak>2Ij%#TOJ~%cJ4GTy=`c zuJ$z*Qy@HjCOg?O`UIUqt?rfjeE1D*mCxJ1t?OzEU*!M{^83X`Eqnb?Qh1@+8~QVw zFZJiQu#qlQ{hVhi|5<;#k7VL6^>hErLFW8~GW};Ov;M#N{)|5sR;pjw*Ldk7fPGEz z8gnmYwU-zQY^dZp+&5z%m#l-0j$y%RooBW?evsPND9r5j-OGlrC3hE&HVk=50$7T9I*8G&UENQY7A%@Nr9s{Gv z$zxRNUtxT^P%$-UqVISwFCQ;ZhBDidwYBwC{lHFHLeIh$Q9zUZit~+akSYGoxAZsl zSy|?3mt(`{ZnV7+fFh{0{RyAo8nP?DsWUtM4byT%JMA!a?2{8}^aEVXMQm;3U5;%` zu*u6e+8esBD z!Fj`R`1Xju@+kzGEca0L`!Ha<{65Ur-;Mt_91N&_*e0I4{gig~v-azx{C=%Z4E(u4 zW|j${w55)tm&&$Si+e8H@Kirr7w{KfgCVMP-HZ zAM%f}q8{cdw+b67%ks05uZz!0`u)W^Kb^CU9?ws8`YJy)^5H9($9V1L2Y}2E@Ft3& z(hoH*@mo}lugyS#Ia?37PURN(PN%L19Fx)Is$XU97^+YV*L(F@3J`@CnvLr@7NGt< zQva_j%n$QD4%&dmi>=jv&tpMlO#6P9F}?WwE13_e(&lp-w2k)JuD1w0B{n z#TTjyIBDRU57&8u;CU<*k1m$KF$oOEtgfZ;j`9+`-0lm6LJt!tWI@5^9N#|%CU=+{ zIjQb&H?$vxF$dylEFNl&hvNwn#g+Riy=Lro;Zq891VF#j~! zQe{V-wm&7GA2CmY(Z3PAP(L{z@vL(N>}j0STgcK(0r6cv@Lqsx)ZbyI*d^Wn4(kf& zTHb@+x2~x7BT)IftNYRO*x4TZzY+g`JmbH495)!M4(B@)%F2*?j7eM)T&FDW7aJ-s z6o2O%%CPq6*Bkx)H{whIL8Z>m%v|85S{IiWzV+oP#Yb!^l5_`U-pRF4NNxRGjai())53k+_D!$P1b__NVfVaCl*27;ODjNyt>3_yKyLbEO?#t=zYyF7MQ?X`Ou^O zz=uk|+VaeY7U1A^OSby3?U5(jyZo`KGW2(ThQ}g~HX;MVye+82vh2pVg{0bh17B1R zUdWSk8XMGBy!)`>(fCZbe?~FSX)Y#sr%viBs8vKgfCe;^e|;7KEQ|U9@07j4U-ioa zJV#aF@6O@pq`FYL{L2$b{{5@_^NhtO^lR*oILBTX zK`I_E+V@Bn9aLH93EAs8IcYKl9-^!K*Tu^MqZZYEF+DCY(AaUyOUw`#D#1UEU5yKR z`ZL4pKpBr>6#!)Iw|Kqg*KI5zQf{cLD=3`30G1g#RZkL9)y=35< zEwc7Gw1xf``swvIo&H-|aHzflwxCx1`HT7L9XZTVC{RVt>S>KQl~40b_#8wVxBN_& zv5WkNq@WY_dn<=wao}H&b6<`536Cr=K==Kom*AZJ9{Mxp?W7)Q`3Au*?u)et6vK^x zz0;pb_p{-X8ejUV%f049-`n1e-QfR}gXcZ}`#uzXb^ag6HQY>{3Ewm5Fd8G;6se{C z;+Zi29La{t3;*ozd`tiGfBik}{rP`B`HeQ_q9GRDGk>xFe}@!?&&SEZ8bQ>aQR{+l ze*RDXjQmFV5D4f8cENhpfsL97XlT=n6GzUpEx z4Recf5Q;W?-*aD6Jw?^1-?skyKWNrVS3Ko{ryJ_yOVb`A>VLJk=|9b-7#E|gbFHc>3pU3x=vn>`$Fci@CEwmM9;l0j;Zjnpi<{@?p5v38EYqi z`}L~#tJK{mgI&+ZIP_cGjk9w*uvbTq_nQH&_I7wSFUEoeQgH1g_w*h%=hBHkHAvJs zVG=KdUA)dpOwCE07Pdvs)bBP}00#e`&9SaWs0;d4I&`87=0M!{t4<_GaAW@=i{{7~ zYHJu=5H{S)TO|?rTYLbjd@%cl?46i0V1WnC#y@vDalF9v<3a%ojC!(iD@{+$^YC@N z<6c?)427$)!=OiBRS(ItG(Fd`OSX55xD<$o8peIR?@;+$?U%kSsONaw$5B6d60h;Z zd&kq(Y`%|M+w0%I^!%irn$idMR-dQ*kh46*mx?Eq*01f$X#3Ru65tl?Z*1qhN?%p~ z{C@n7Xs7?b6JWiF&uMk-K|P#;HwSDa!OHTEzvbTb``2gvMlRL9kk9LwroR(%+06-u z_&*R&yJ+Nw%07y}^9^Olr8r53*W%i+X-fp}ei5@;g*Mj5S+(=R$bBYNo z&M8hj#+1$*#DvPg@P4|XvJ}3wzSedL@ZDa9I%9m{lJ=|TP0yM$i9lA9hjOR|=kxqY zjI9VwH()F;!HY!SH~Y$vVG&mEtFw3bTXyW1I2K{W`HS!7&y+Gw&{puqBCI3ESfMTY z2+S@25JXvaiXx~5=PUn20NB5mm*8OHW0#0=r=Mcn>BR6e@w@qdl=Es!hB6e-c^w`8 zOrZX5ot$a9~>T<*W0CF8ZI0g^YfcMrBZe&q0Oa^avxOD% zoI|=8J$@cyzADsGb>12yG(h=V??QQ;(+`c0gx}a2cr{&cO8l+92(rEu9t1a(XZ+l;vYCH!9{(91Kco<*xUe^39 z)Wa9@z9mbL*;sH?WpBht%@)c){=m=HzQ>>i#eGW(!iw{5jGzVnZujUCc=}&hPx@u> zh$#!5p(hjL9B}v&yzsp4r{MR3wi@4QEzxls_V~&7o{-GZm*7Mz^wZuAHNE(PauDB; zEr19sWEC2mal&@a19e@8wt}{*v*l#|Ux;n~95~zG*l|LkAHlGk{Oy0FN}pT)50V$0 z4`X5OclH&X%7Wk>aR__qARh~LoZjtA{S(g_@Jpb}zR<(m7ybOv9FUp=Qu93am5dh+ z+fZ2wUz9ixe7#C1pv-GIZT!37T(lRlIbVbF&KPCw>mWC3J`)wWA;H0j;`DAlWIzvd zV5@$E-sr2;zV7A2-QR46emI{oH%sDvO+ttZhTwp%wanHbJ99MT&q%j&zne_8zAWXP-T^Taw2aQbR~5YJUzFZukFIZ_0D z(m(I;f1zxF?CdM*i_~3UAZ2}0jzv(Z=QDGx+SKX4Ya?ZK66<7{Kh-EO=6H|3^a`iuq^8#P3@TqXCdTCeeK3X(_YBK+Z9By)^KN-@aL2Ix;Tw zpx5*gyi9t~Qu`7;#tSht(m9l9=l$sLyDtCff70g?-@d*j?o)(;wIX#)foXSdUF=_U zg*1HEB{-0e-KYLPT`kY+WOA;#1aM*B6tXfrYdzv1b?qu)d(s?$j;()gaHT(NNAwQ+ zve+e#LcjmkSl{d`)3hV~^X$o_Op8>1<`@vjeI!D zH&i9Ycl7CHSZ~yM1K(w>oRL@pF!g8>U&+!&V725Xd*~BcV!HbsG?gVrnbf{u6jUkC zyYo`D7y2*#nQY%mKRos)xrI;Q#o$?eQtVl4!}xDPA#*GDuviP7KgRZ4^?%HEsd^sg z5|SWnyk7GpmM?*4qBP&8*FpQ+LA&lT8TU!g_XB*6_8N<%Dcp~{n0s*r*J6&6J9(J? z17P>Z<7=?JPzs!3f?9R@oc84J4GQ#m`H6kO z3@w6J_H`?NAVgWkLM~*fOJHw&#zBlu_#I}>F#*QQH{yA}Wf9a3=PR8V*H{Gg2*YbE zg39|^*RRrMUj^4#{9c)PEU1G{{6Da4BR>4jb7BtT^6oW16vKVm*GrEppC@ra0JI2R z2V3~dz3jGlV3rujDF+WmVBR(Ey4)7}(2C|Bxv&T-c|Nj{LMVbt*)G0p9_A&rrD$`- z|Df2JU7jd{E+5;KUP?4%FYWSR2cFV82L0Zrw)-dy%qPata@9v|=zkPPPlAyBd~Vd- z^5hw}GRR)X!U8XlV%%#ie4lHvumCSGZEX5b2+ZgE#1bO(Kl6zNJ7hZ>6N}rJc`T^( z!zc3h@ujM({)hYvXjR!4k9p4;#*0n$f@|b|Bkmg1z#rNxb#DmG@KwJ)Ih!YerHz70 zJ`e5HV2A7-TR80p{>RRfn)0=;r*@HJ@O<%@aU925DjkOI-cVTzUx3%*>!|HN+0*VJ zE(iO;`dk9b06|Q=_n=oY-aCteB0gzRB1ovks}xzxD9(V_pT&zVdidncDTTRg(& zhj=J|q`x%$E8!S%s-HR5INF|vD zuOHp$O21V9r|+TvCg&XZ$9eci*m^L>O5@YTB1!c14%-W5)3_gG%dlUdZ{pSKKW@FEBvc7_o$HoPW?5(O5^YgU_Q_d$2=xX|D%(fzfC0ngbrBz|hZ; zM>raOUto9}*@5r<^XF0a_!;AkIoA5JphjQM{FBMX!g*&bc;JOXz_0yTc(v;M#PMSJ z;GP$D@^H?C1S$VWZt8wvC(pTQ(u8d1TWZsL6W%n~!UpKqPpx(2vLW`WdVDy~Th7=h z7eb%&RI!k~oO67-4t!@qOT z)6J{s4^F?tU}O-pjkajG!Y3RV1=mqBUxY6>fAJVx<2ggc=Z0C1BN9V7TFX^E()3LC zg&~d=UmCvSHu?n4g<9o*Ie$9OVO@7{@2DJ-?P2L3wG#gEGH|XsLA1%*9`?2@I%u-~ z8{RQ4+I7R&-jn)CtF`Cqld)a2eFMJE2>=voZFUX!+5WrnP5*C^Kf^ps|7_F+A82Vh z2VXTk@BQY9K zTrW6A$$SyiBfOHw^}Bdm`K|GF-heR$Iy>8MjD@Uzz^fML^C`X+*U5KrKlZti&{jIk zhVzwg!yf0BDI%zccm@&WHr|6b;{|+f`}T4k&g$oWA4mP~&D(e=Ah45qX!7h^%R=)N zF&`Xv#-AOc2Z)6M6LG^T`M9iz1 z&2{Z0=;vS_NTz?7S2cq$XL}je7*!`NFj)<};FR2GOXV{?mvDS0L|B2R8bM$2Jl`?A zyu#?c+cD(;W6X`4QV{?*oYTk+m8I~d*%*Ff>l42z|6+Z8#D}ndY42bQI}p}mzv=XQ zg~`;x3O!@IWEBg;I-X-~_8a%Pzo5D1hFs>G`X4am@G#%B|3|Xyz+$8c7qTz*Z@Jg! zm5#gxCZ!C4(1TzsF@RJIM#cg&#FRP%qZdLy8l#;8_IDURcBgjcx@O#%fA*}=v-Mrc^;S3-6*r-_n* zv*Otoz&B!1sI%;CIpjm`5t@)CO~xq34l!(F5mf5$Fl=r<;4vyOU5wCzc7B#*UwyQZr8L4bNPxu6ItdD35O=Q)d@^7mQw z|Hs7n__v7v>F)(XKYu;>Tf|T@*mCgOVfMR0KMT2_sG0L`hk0$v=hGZeqo7PsDf{BF zGwip!4u^<0JdHBnwR7Z}kO`@=S`ZF|9GecgR@`V?hf2HSUht z#ob5V0clFDB$6f&$(w&AFA-(W1+#pIh*L`SZ9j+ir0k~cX)}oP}b)q9Kc?|+Y}eH zbQlCra2`6@Z>*iFuh3FCAdrEF`sjDa2L?4T^FF2O1Yq!gw??gf<)#NT4|BWf1fePm z{rFeyYQB}=jH?~KH2kf;=(mUqlnZnfoP)wzKduC(8+Skteke^Re2#0>S=WAuO+j0; zWxT)lpNlm;{u@l_p)|IWj|w0*=s{s}r` zPR8MKeg>mqez=&QNy~Ws1{OHc*OZx2g7XcW>4^zfZ@1-|vQgFaei{BM1)mcJn#= z%5H*C2IqJ5Yk1-r!pYzCqkiaB7d_DrDuNRkmDk%T&;GzMGq<8q2ZX zhiERm)N!MY%kNzumgg8@SQ!a5Q0f(e>E4 z5S$a!tt$u__RH3<1zvECc+$0Y3*^2%1JP`3csXb<2kmAsrN(~M^cth4AFe=I;D>S7 z;njczK10n)523aF#bYSL?!Z@l>83-qIpI*;l2LL;0gc%!`}x1k1J1Iu%$U&_Lvf{X8x z%}utSGYj<9e%oj0Y(2cUdhAr85ceKi%9;<yr3@lu=V&^ zU$;&!(C4KH53sk=>7v;<&ZV&*f#b*}V2@Wjz=NvO`~W z9snnm^&mZx^<0YJg)Ge!=2915b4K$?hpBmz3ItJvFR;DdgK%2drbr&tv9Bl97J)4X z^QzkD3IJRA_S`=nyhpO(AI*Sf*V)?4cv>K%ug+IG{~N{vw!pwRkEsV{foVSXzyt=A z2R{$K?dC4yP>8Panq)8hX~7UG*ys6Lw))e85we|sI=js2fw`Oqx@S1#!+TtxZ-XCB zbIhi@==Y&dGP`{w+kB#8A$#DHl28J3!zb#3z<>UDOzGcud>;Br1039L$u?iY+2$lbu8O4T|_%n#{AsP zCusb6i5Yy7{N3-k5I_t;`XwoU$>O1Guggl(AlleRWM-o@!Jnk=N-|PG1;1fCeJh51w z*kTBM+5wz`W0Xwhf&;<%6w_hOsq+S%0W1Wy2wo{W-z)p?RuNAei?H79i-dqJcw-S( zoRdPI8^lB)1M|cdRY;wz&~-L`wJ%lP@ExC;R}t)9XU}=|PXs3LxA+r8+cPSPu#Wy| ze0UK>Sb>@J`?DY-kXPM0R`nNcuCk+l#yy(iJs1Kp_VsvOH0SorC(+}Fww&f|j8vig zk*_>>ftho=+d~zz*G5&~$-M{(I?Jx` ziGSqBF5lMxOwZ!NwwLpsLdLkhpS*i;ocEyGN`7VMXP(zJ_sgbq`bB@~WaQnW?HDVL z#BeNBE-)Pv|C9d1cx|BYI_humQNx#wS8DB}W|wbt!B^TqU(5#e-(p6Y7jh_~a!2ty z3GPWh#nd(NE_!p9Np(OTC8% z{&~*-&tDmbciux=+6?3L#O56~+>JkrSO6EuINtz+J; z2MWi3|L=9v2Gud1%;PvlVAfdAKJNZz)aQL#fJ0`zi_SQ|9h2tw{^T8UL^1iB>1OJ1 z-CJMx@8RRORPc{uaIV|_UZVaR`N=sPMNnfwK>yr+0A~O0w4OOWqfK*2>1837@0-;R zV?}b*r%Nb|tT1y8H!aK%Lo;LWQM=yuO{njs-u6fgWp=+{kB=i#2VdHU;Ojx=!OmvS z0WL80ek@}$*t}`PM5zaT5Bmp<1V$M|Vg#7WabeYYsE1)6GRRlTqz zvXnB7`y>t}6UI5O>w1e9EY9mmP2R!Z#^xALSYlqS1&-gyS~(hI_FA>89YYUxG7-#n z;=9XNg9tu%#GiGuqq8m7>+kSv!S%XT%CXbh#>y3(@cZe#&tWW7?tZ?i2aiO`f3F^3 z7}{IBRS!NDCoj_>$c6n*wBg)+w}Mz;hWs)<-3DF=UK#1Og)%Nu^Bpixf5i&g&c=?< z$x7ywzuP%Jn3utR+cSg>mPiQ<$M23#qQ;R2w0Rz@2?~FQa#%MBHeEPUFB7n%8?`g6=u8^>Trk;;<2qPQ7Pxc>M~a1Lktw0haL)9MWIK zIrXy%uI2BN=?gCkt`UE|?obNizsL~;mmJ1i(JQSNIm-LQ+cu+ag*qaq)CD)JEq&ZN zo~D%V;`AMI&hM$?-efV?-FbFex^}l0>NjQqs?C1JYDX^zu407*3*hN{_)9U<{aWdT z;KUm!<;(E56#y)Adax6!vrYSlnop2~t~dVXF>(}k8vl6j-|_Kxj=4za#HFf3D|SsM%82;FoC}WJ+R=_Eaqau&zny zZSL=Z_p~Nyd%B#wLmnXw@@lfe-!KAC+t~ztkM9B@m_JPvF{XdO9O5%Q*Cjr-`6cs! zpX~?UHUsDK>pc_NO8Fa(Y=Tak5Ai8HF}wd>Y>twbJZyqaUdjxAapv;X&N_zcdj)n_ z(`omV#~#~heW%{!7o09^o@0`~LBKfUrIBcYez4ibnqeYIPnfv>HOz4TMLAcsk%?Kz ztlG$AB&Oyx*sAF1H_m)cYi{W6xCw=H-w(Nd9XB=B*KrF21<)zBW89i2ATgJ53m+3t zZb8JxF_ohvF$cd+-}|*ZMq*BQU&ka8mb`1*c(uoz$#%U;a>a8!F4{)?Fwe|m!N%i% z?e9`U=0CYH5b~fVS)%xAb)#|Q0c~CrZQ~Cr7+&l0>Bx08y8D(c`qFYd;;G*ox-6vv zcKX$0==Ln=HVrQ58$^`NgB(IvbUmS)4T6gYdz3+0(dod7&TuT~b-!?sZ*L5(@IRl( z(K9-nU&+zO2^|is@XWxHj$PG~{-+Z-CoExJG%yMnP?J}o%tYjiF!E5T@;)R0bwfu(OT2t^{ zN$WODYf9N5kTa|=87tb4OP}(Eh4L2f;0vd|;Y4n|u*OqsHd*{130-Bb|F0LoLkL_}jjv4e$Hg z9?5&JX4*&M9}V7nd=53!>>ldt^6U3pl>Z5Tx3vGJzmoVD{wgst*MN-?+GxSy^}ulL z*wNXP9|`#Uy4>0ZIia5-h5e2Akk?{4@V<%<@xEK_x{mQ7Cbs!y&sX}s!FD!bPk(xB zPv=kCNgg&~$M-AW6*x9w2mZk$bmg;O%FMhjFjX7INM80?4k&1p6NwR=67!WY%%rBS zyW`93jASS8RSd0W=@a|xyJwBQ^CFtC&zK%V#YHq>2j+XuvF2AKGUdM&llFjB-8RM~ z>w?s%8B#shk!-0^SNB|a>NMxP5ZYu@g_Uu*SLTk j3Yu3nPr~1bMBNK0_7&yG{O(!W4@lYnnP)XAhqn9zc<~J+ literal 0 HcmV?d00001 diff --git a/selinux/targeted/setrans.conf b/selinux/targeted/setrans.conf new file mode 100644 index 0000000..09a6ce3 --- /dev/null +++ b/selinux/targeted/setrans.conf @@ -0,0 +1,19 @@ +# +# Multi-Category Security translation table for SELinux +# +# Uncomment the following to disable translation libary +# disable=1 +# +# Objects can be categorized with 0-1023 categories defined by the admin. +# Objects can be in more than one category at a time. +# Categories are stored in the system as c0-c1023. Users can use this +# table to translate the categories into a more meaningful output. +# Examples: +# s0:c0=CompanyConfidential +# s0:c1=PatientRecord +# s0:c2=Unclassified +# s0:c3=TopSecret +# s0:c1,c3=CompanyConfidentialRedHat +s0=SystemLow +s0-s0:c0.c1023=SystemLow-SystemHigh +s0:c0.c1023=SystemHigh diff --git a/selinux/targeted/seusers b/selinux/targeted/seusers new file mode 100644 index 0000000..8bcb135 --- /dev/null +++ b/selinux/targeted/seusers @@ -0,0 +1,2 @@ +root:unconfined_u:s0-s0:c0.c1023 +__default__:unconfined_u:s0-s0:c0.c1023 diff --git a/services b/services new file mode 100644 index 0000000..470bf86 --- /dev/null +++ b/services @@ -0,0 +1,11473 @@ +# /etc/services: +# $Id: services,v 1.49 2017/08/18 12:43:23 ovasik Exp $ +# +# Network services, Internet style +# IANA services version: last updated 2016-07-08 +# +# Note that it is presently the policy of IANA to assign a single well-known +# port number for both TCP and UDP; hence, most entries here have two entries +# even if the protocol doesn't support UDP operations. +# Updated from RFC 1700, ``Assigned Numbers'' (October 1994). Not all ports +# are included, only the more common ones. +# +# The latest IANA port assignments can be gotten from +# http://www.iana.org/assignments/port-numbers +# The Well Known Ports are those from 0 through 1023. +# The Registered Ports are those from 1024 through 49151 +# The Dynamic and/or Private Ports are those from 49152 through 65535 +# +# Each line describes one service, and is of the form: +# +# service-name port/protocol [aliases ...] [# comment] + +tcpmux 1/tcp # TCP port service multiplexer +tcpmux 1/udp # TCP port service multiplexer +rje 5/tcp # Remote Job Entry +rje 5/udp # Remote Job Entry +echo 7/tcp +echo 7/udp +discard 9/tcp sink null +discard 9/udp sink null +systat 11/tcp users +systat 11/udp users +daytime 13/tcp +daytime 13/udp +qotd 17/tcp quote +qotd 17/udp quote +chargen 19/tcp ttytst source +chargen 19/udp ttytst source +ftp-data 20/tcp +ftp-data 20/udp +# 21 is registered to ftp, but also used by fsp +ftp 21/tcp +ftp 21/udp fsp fspd +ssh 22/tcp # The Secure Shell (SSH) Protocol +ssh 22/udp # The Secure Shell (SSH) Protocol +telnet 23/tcp +telnet 23/udp +# 24 - private mail system +lmtp 24/tcp # LMTP Mail Delivery +lmtp 24/udp # LMTP Mail Delivery +smtp 25/tcp mail +smtp 25/udp mail +time 37/tcp timserver +time 37/udp timserver +rlp 39/tcp resource # resource location +rlp 39/udp resource # resource location +nameserver 42/tcp name # IEN 116 +nameserver 42/udp name # IEN 116 +nicname 43/tcp whois +nicname 43/udp whois +tacacs 49/tcp # Login Host Protocol (TACACS) +tacacs 49/udp # Login Host Protocol (TACACS) +re-mail-ck 50/tcp # Remote Mail Checking Protocol +re-mail-ck 50/udp # Remote Mail Checking Protocol +domain 53/tcp # name-domain server +domain 53/udp +whois++ 63/tcp whoispp +whois++ 63/udp whoispp +bootps 67/tcp # BOOTP server +bootps 67/udp +bootpc 68/tcp dhcpc # BOOTP client +bootpc 68/udp dhcpc +tftp 69/tcp +tftp 69/udp +gopher 70/tcp # Internet Gopher +gopher 70/udp +netrjs-1 71/tcp # Remote Job Service +netrjs-1 71/udp # Remote Job Service +netrjs-2 72/tcp # Remote Job Service +netrjs-2 72/udp # Remote Job Service +netrjs-3 73/tcp # Remote Job Service +netrjs-3 73/udp # Remote Job Service +netrjs-4 74/tcp # Remote Job Service +netrjs-4 74/udp # Remote Job Service +finger 79/tcp +finger 79/udp +http 80/tcp www www-http # WorldWideWeb HTTP +http 80/udp www www-http # HyperText Transfer Protocol +http 80/sctp # HyperText Transfer Protocol +kerberos 88/tcp kerberos5 krb5 # Kerberos v5 +kerberos 88/udp kerberos5 krb5 # Kerberos v5 +supdup 95/tcp +supdup 95/udp +hostname 101/tcp hostnames # usually from sri-nic +hostname 101/udp hostnames # usually from sri-nic +iso-tsap 102/tcp tsap # part of ISODE. +csnet-ns 105/tcp cso # also used by CSO name server +csnet-ns 105/udp cso +# unfortunately the poppassd (Eudora) uses a port which has already +# been assigned to a different service. We list the poppassd as an +# alias here. This should work for programs asking for this service. +# (due to a bug in inetd the 3com-tsmux line is disabled) +#3com-tsmux 106/tcp poppassd +#3com-tsmux 106/udp poppassd +rtelnet 107/tcp # Remote Telnet +rtelnet 107/udp +pop2 109/tcp pop-2 postoffice # POP version 2 +pop2 109/udp pop-2 +pop3 110/tcp pop-3 # POP version 3 +pop3 110/udp pop-3 +sunrpc 111/tcp portmapper rpcbind # RPC 4.0 portmapper TCP +sunrpc 111/udp portmapper rpcbind # RPC 4.0 portmapper UDP +auth 113/tcp authentication tap ident +auth 113/udp authentication tap ident +sftp 115/tcp +sftp 115/udp +uucp-path 117/tcp +uucp-path 117/udp +nntp 119/tcp readnews untp # USENET News Transfer Protocol +nntp 119/udp readnews untp # USENET News Transfer Protocol +ntp 123/tcp +ntp 123/udp # Network Time Protocol +netbios-ns 137/tcp # NETBIOS Name Service +netbios-ns 137/udp +netbios-dgm 138/tcp # NETBIOS Datagram Service +netbios-dgm 138/udp +netbios-ssn 139/tcp # NETBIOS session service +netbios-ssn 139/udp +imap 143/tcp imap2 # Interim Mail Access Proto v2 +imap 143/udp imap2 +snmp 161/tcp # Simple Net Mgmt Proto +snmp 161/udp # Simple Net Mgmt Proto +snmptrap 162/tcp # SNMPTRAP +snmptrap 162/udp snmp-trap # Traps for SNMP +cmip-man 163/tcp # ISO mgmt over IP (CMOT) +cmip-man 163/udp +cmip-agent 164/tcp +cmip-agent 164/udp +mailq 174/tcp # MAILQ +mailq 174/udp # MAILQ +xdmcp 177/tcp # X Display Mgr. Control Proto +xdmcp 177/udp +nextstep 178/tcp NeXTStep NextStep # NeXTStep window +nextstep 178/udp NeXTStep NextStep # server +bgp 179/tcp # Border Gateway Proto. +bgp 179/udp +bgp 179/sctp +prospero 191/tcp # Cliff Neuman's Prospero +prospero 191/udp +irc 194/tcp # Internet Relay Chat +irc 194/udp +smux 199/tcp # SNMP Unix Multiplexer +smux 199/udp +at-rtmp 201/tcp # AppleTalk routing +at-rtmp 201/udp +at-nbp 202/tcp # AppleTalk name binding +at-nbp 202/udp +at-echo 204/tcp # AppleTalk echo +at-echo 204/udp +at-zis 206/tcp # AppleTalk zone information +at-zis 206/udp +qmtp 209/tcp # Quick Mail Transfer Protocol +qmtp 209/udp # Quick Mail Transfer Protocol +z39.50 210/tcp z3950 z39-50 wais # NISO Z39.50 database +z39.50 210/udp z3950 z39-50 wais +ipx 213/tcp # IPX +ipx 213/udp +imap3 220/tcp # Interactive Mail Access +imap3 220/udp # Protocol v3 +link 245/tcp ttylink +link 245/udp ttylink +gist 270/udp # Q-mode encapsulation for GIST messages +fatserv 347/tcp # Fatmen Server +fatserv 347/udp # Fatmen Server +rsvp_tunnel 363/tcp rsvp-tunnel +rsvp_tunnel 363/udp rsvp-tunnel +odmr 366/tcp # odmr required by fetchmail +odmr 366/udp # odmr required by fetchmail +rpc2portmap 369/tcp +rpc2portmap 369/udp # Coda portmapper +codaauth2 370/tcp +codaauth2 370/udp # Coda authentication server +ulistproc 372/tcp ulistserv # UNIX Listserv +ulistproc 372/udp ulistserv +ldap 389/tcp +ldap 389/udp +osb-sd 400/tcp # Oracle Secure Backup +osb-sd 400/udp # Oracle Secure Backup +svrloc 427/tcp # Server Location +svrloc 427/udp # Server Location +mobileip-agent 434/tcp +mobileip-agent 434/udp +mobilip-mn 435/tcp +mobilip-mn 435/udp +https 443/tcp # http protocol over TLS/SSL +https 443/udp # http protocol over TLS/SSL +https 443/sctp # http protocol over TLS/SSL +snpp 444/tcp # Simple Network Paging Protocol +snpp 444/udp # Simple Network Paging Protocol +microsoft-ds 445/tcp +microsoft-ds 445/udp +kpasswd 464/tcp kpwd # Kerberos "passwd" +kpasswd 464/udp kpwd # Kerberos "passwd" +photuris 468/tcp +photuris 468/udp +saft 487/tcp # Simple Asynchronous File Transfer +saft 487/udp # Simple Asynchronous File Transfer +gss-http 488/tcp +gss-http 488/udp +pim-rp-disc 496/tcp +pim-rp-disc 496/udp +isakmp 500/tcp +isakmp 500/udp +gdomap 538/tcp # GNUstep distributed objects +gdomap 538/udp # GNUstep distributed objects +iiop 535/tcp +iiop 535/udp +dhcpv6-client 546/tcp +dhcpv6-client 546/udp +dhcpv6-server 547/tcp +dhcpv6-server 547/udp +rtsp 554/tcp # Real Time Stream Control Protocol +rtsp 554/udp # Real Time Stream Control Protocol +nntps 563/tcp # NNTP over SSL +nntps 563/udp # NNTP over SSL +whoami 565/tcp +whoami 565/udp +submission 587/tcp msa # mail message submission +submission 587/udp msa # mail message submission +npmp-local 610/tcp dqs313_qmaster # npmp-local / DQS +npmp-local 610/udp dqs313_qmaster # npmp-local / DQS +npmp-gui 611/tcp dqs313_execd # npmp-gui / DQS +npmp-gui 611/udp dqs313_execd # npmp-gui / DQS +hmmp-ind 612/tcp dqs313_intercell # HMMP Indication / DQS +hmmp-ind 612/udp dqs313_intercell # HMMP Indication / DQS +ipp 631/tcp # Internet Printing Protocol +ipp 631/udp # Internet Printing Protocol +ldaps 636/tcp # LDAP over SSL +ldaps 636/udp # LDAP over SSL +acap 674/tcp +acap 674/udp +ha-cluster 694/tcp # Heartbeat HA-cluster +ha-cluster 694/udp # Heartbeat HA-cluster +kerberos-adm 749/tcp # Kerberos `kadmin' (v5) +kerberos-adm 749/udp # kerberos administration +kerberos-iv 750/udp kerberos4 kerberos-sec kdc loadav +kerberos-iv 750/tcp kerberos4 kerberos-sec kdc rfile +webster 765/tcp # Network dictionary +webster 765/udp +phonebook 767/tcp # Network phonebook +phonebook 767/udp +rsync 873/tcp # rsync +rsync 873/udp # rsync +#rquotad unreserved in IANA! +rquotad 875/tcp # rquota daemon +#rquotad unreserved in IANA! +rquotad 875/udp # rquota daemon +telnets 992/tcp +telnets 992/udp +imaps 993/tcp # IMAP over SSL +imaps 993/udp # IMAP over SSL +pop3s 995/tcp # POP-3 over SSL +pop3s 995/udp # POP-3 over SSL + +# +# UNIX specific services +# +exec 512/tcp +biff 512/udp comsat +login 513/tcp +who 513/udp whod +shell 514/tcp cmd # no passwords used +syslog 514/udp +printer 515/tcp spooler # line printer spooler +printer 515/udp spooler # line printer spooler +talk 517/udp +ntalk 518/udp +utime 519/tcp unixtime +utime 519/udp unixtime +efs 520/tcp +router 520/udp route routed # RIP +ripng 521/tcp +ripng 521/udp +timed 525/tcp timeserver +timed 525/udp timeserver +tempo 526/tcp newdate +courier 530/tcp rpc +conference 531/tcp chat +netnews 532/tcp +netwall 533/udp # -for emergency broadcasts +uucp 540/tcp uucpd # uucp daemon +klogin 543/tcp # Kerberized `rlogin' (v5) +kshell 544/tcp krcmd # Kerberized `rsh' (v5) +afpovertcp 548/tcp # AFP over TCP +afpovertcp 548/udp # AFP over TCP +remotefs 556/tcp rfs_server rfs # Brunhoff remote filesystem + +# +# From ``PORT NUMBERS'': +# +#>REGISTERED PORT NUMBERS +#> +#>The Registered Ports are listed by the IANA and on most systems can be +#>used by ordinary user processes or programs executed by ordinary +#>users. +#> +#>Ports are used in the TCP [RFC793] to name the ends of logical +#>connections which carry long term conversations. For the purpose of +#>providing services to unknown callers, a service contact port is +#>defined. This list specifies the port used by the server process as +#>its contact port. +#> +#>The IANA registers uses of these ports as a convienence to the +#>community. +# +socks 1080/tcp # socks proxy server +socks 1080/udp # socks proxy server + +# Port 1236 is registered as `bvcontrol', but is also used by the +# Gracilis Packeten remote config server. The official name is listed as +# the primary name, with the unregistered name as an alias. +bvcontrol 1236/tcp rmtcfg # Daniel J. Walsh, Gracilis Packeten remote config server +bvcontrol 1236/udp # Daniel J. Walsh + +h323hostcallsc 1300/tcp # H.323 Secure Call Control +h323hostcallsc 1300/udp # H.323 Secure Call Control +ms-sql-s 1433/tcp # Microsoft-SQL-Server +ms-sql-s 1433/udp # Microsoft-SQL-Server +ms-sql-m 1434/tcp # Microsoft-SQL-Monitor +ms-sql-m 1434/udp # Microsoft-SQL-Monitor +ica 1494/tcp # Citrix ICA Client +ica 1494/udp # Citrix ICA Client +wins 1512/tcp # Microsoft's Windows Internet Name Service +wins 1512/udp # Microsoft's Windows Internet Name Service +ingreslock 1524/tcp +ingreslock 1524/udp +prospero-np 1525/tcp orasrv # Prospero non-privileged/oracle +prospero-np 1525/udp orasrv +datametrics 1645/tcp old-radius sightline # datametrics / old radius entry +datametrics 1645/udp old-radius sightline # datametrics / old radius entry +sa-msg-port 1646/tcp old-radacct # sa-msg-port / old radacct entry +sa-msg-port 1646/udp old-radacct # sa-msg-port / old radacct entry +kermit 1649/tcp +kermit 1649/udp +l2tp 1701/tcp l2f +l2tp 1701/udp l2f +h323gatedisc 1718/tcp +h323gatedisc 1718/udp +h323gatestat 1719/tcp +h323gatestat 1719/udp +h323hostcall 1720/tcp +h323hostcall 1720/udp +h323hostcall 1720/sctp # H.323 Call Control +tftp-mcast 1758/tcp +tftp-mcast 1758/udp +mtftp 1759/udp spss-lm +vdab 1775/tcp # data interchange between visual processing containers +hello 1789/tcp +hello 1789/udp +radius 1812/tcp # Radius +radius 1812/udp # Radius +radius-acct 1813/tcp radacct # Radius Accounting +radius-acct 1813/udp radacct # Radius Accounting +mtp 1911/tcp # +mtp 1911/udp # +hsrp 1985/tcp # Cisco Hot Standby Router Protocol +hsrp 1985/udp # Cisco Hot Standby Router Protocol +licensedaemon 1986/tcp +licensedaemon 1986/udp +gdp-port 1997/tcp # Cisco Gateway Discovery Protocol +gdp-port 1997/udp # Cisco Gateway Discovery Protocol +sieve-filter 2000/tcp cisco-sccp # Sieve Mail Filter Daemon +sieve-filter 2000/udp cisco-sccp # Sieve Mail Filter Daemon +nfs 2049/tcp nfsd shilp # Network File System +nfs 2049/udp nfsd shilp # Network File System +nfs 2049/sctp nfsd shilp # Network File System +zephyr-srv 2102/tcp # Zephyr server +zephyr-srv 2102/udp # Zephyr server +zephyr-clt 2103/tcp # Zephyr serv-hm connection +zephyr-clt 2103/udp # Zephyr serv-hm connection +zephyr-hm 2104/tcp # Zephyr hostmanager +zephyr-hm 2104/udp # Zephyr hostmanager +cvspserver 2401/tcp # CVS client/server operations +cvspserver 2401/udp # CVS client/server operations +venus 2430/tcp # codacon port +venus 2430/udp # Venus callback/wbc interface +venus-se 2431/tcp # tcp side effects +venus-se 2431/udp # udp sftp side effect +codasrv 2432/tcp # not used +codasrv 2432/udp # server port +codasrv-se 2433/tcp # tcp side effects +codasrv-se 2433/udp # udp sftp side effectQ + +# Ports numbered 2600 through 2606 are used by the zebra package without +# being registred. The primary names are the registered names, and the +# unregistered names used by zebra are listed as aliases. +hpstgmgr 2600/tcp zebrasrv # HPSTGMGR +hpstgmgr 2600/udp # HPSTGMGR +discp-client 2601/tcp zebra # discp client +discp-client 2601/udp # discp client +discp-server 2602/tcp ripd # discp server +discp-server 2602/udp # discp server +servicemeter 2603/tcp ripngd # Service Meter +servicemeter 2603/udp # Service Meter +nsc-ccs 2604/tcp ospfd # NSC CCS +nsc-ccs 2604/udp # NSC CCS +nsc-posa 2605/tcp bgpd # NSC POSA +nsc-posa 2605/udp # NSC POSA +netmon 2606/tcp ospf6d # Dell Netmon +netmon 2606/udp # Dell Netmon +dict 2628/tcp # RFC 2229 +dict 2628/udp # RFC 2229 +corbaloc 2809/tcp # CORBA naming service locator +icpv2 3130/tcp # Internet Cache Protocol V2 (Squid) +icpv2 3130/udp # Internet Cache Protocol V2 (Squid) +mysql 3306/tcp # MySQL +mysql 3306/udp # MySQL +trnsprntproxy 3346/tcp # Trnsprnt Proxy +trnsprntproxy 3346/udp # Trnsprnt Proxy +pxe 4011/udp altserviceboot # PXE server +fud 4201/udp # Cyrus IMAP FUD Daemon +rwhois 4321/tcp # Remote Who Is +rwhois 4321/udp # Remote Who Is +krb524 4444/tcp nv-video # Kerberos 5 to 4 ticket xlator +krb524 4444/udp nv-video # Kerberos 5 to 4 ticket xlator +rfe 5002/tcp # Radio Free Ethernet +rfe 5002/udp # Actually uses UDP only +cfengine 5308/tcp # CFengine +cfengine 5308/udp # CFengine +cvsup 5999/tcp CVSup # CVSup file transfer/John Polstra/FreeBSD +cvsup 5999/udp CVSup # CVSup file transfer/John Polstra/FreeBSD +x11 6000/tcp X # the X Window System +afs3-fileserver 7000/tcp # file server itself +afs3-fileserver 7000/udp # file server itself +afs3-callback 7001/tcp # callbacks to cache managers +afs3-callback 7001/udp # callbacks to cache managers +afs3-prserver 7002/tcp # users & groups database +afs3-prserver 7002/udp # users & groups database +afs3-vlserver 7003/tcp # volume location database +afs3-vlserver 7003/udp # volume location database +afs3-kaserver 7004/tcp # AFS/Kerberos authentication service +afs3-kaserver 7004/udp # AFS/Kerberos authentication service +afs3-volser 7005/tcp # volume managment server +afs3-volser 7005/udp # volume managment server +afs3-errors 7006/tcp # error interpretation service +afs3-errors 7006/udp # error interpretation service +afs3-bos 7007/tcp # basic overseer process +afs3-bos 7007/udp # basic overseer process +afs3-update 7008/tcp # server-to-server updater +afs3-update 7008/udp # server-to-server updater +afs3-rmtsys 7009/tcp # remote cache manager service +afs3-rmtsys 7009/udp # remote cache manager service +amanda 10080/tcp # amanda backup services +amanda 10080/udp # amanda backup services +pgpkeyserver 11371/tcp hkp # PGP/GPG public keyserver +pgpkeyserver 11371/udp hkp # PGP/GPG public keyserver +asgcypresstcps 11489/tcp # ASG Cypress Secure Only +h323callsigalt 11720/tcp 323callsigalt # H323 Call Signal Alternate +h323callsigalt 11720/udp 323callsigalt # H323 Call Signal Alternate +bprd 13720/tcp # BPRD (VERITAS NetBackup) +bprd 13720/udp # BPRD (VERITAS NetBackup) +bpdbm 13721/tcp # BPDBM (VERITAS NetBackup) +bpdbm 13721/udp # BPDBM (VERITAS NetBackup) +bpjava-msvc 13722/tcp # BP Java MSVC Protocol +bpjava-msvc 13722/udp # BP Java MSVC Protocol +vnetd 13724/tcp # Veritas Network Utility +vnetd 13724/udp # Veritas Network Utility +bpcd 13782/tcp # VERITAS NetBackup +bpcd 13782/udp # VERITAS NetBackup +vopied 13783/tcp # VOPIED Protocol +vopied 13783/udp # VOPIED Protocol + +# This port is registered as wnn6, but also used under the unregistered name +# "wnn4" by the FreeWnn package. +wnn6 22273/tcp wnn4 +wnn6 22273/udp wnn4 + +quake 26000/tcp +quake 26000/udp +wnn6-ds 26208/tcp +wnn6-ds 26208/udp +traceroute 33434/tcp +traceroute 33434/udp + +# +# Datagram Delivery Protocol services +# +rtmp 1/ddp # Routing Table Maintenance Protocol +nbp 2/ddp # Name Binding Protocol +echo 4/ddp # AppleTalk Echo Protocol +zip 6/ddp # Zone Information Protocol + +# +# Kerberos (Project Athena/MIT) services +# Note that these are for Kerberos v4, and are unregistered/unofficial. Sites +# running v4 should uncomment these and comment out the v5 entries above. +# +kerberos_master 751/udp pump # Kerberos authentication +kerberos_master 751/tcp pump # Kerberos authentication +passwd_server 752/udp qrh # Kerberos passwd server +krbupdate 760/tcp kreg ns # Kerberos registration +kpop 1109/tcp # Pop with Kerberos +knetd 2053/tcp lot105-ds-upd # Kerberos de-multiplexor + +# +# Kerberos 5 services, also not registered with IANA +# +krb5_prop 754/tcp tell # Kerberos slave propagation +eklogin 2105/tcp minipay # Kerberos encrypted rlogin + +# +# Unregistered but necessary(?) (for NetBSD) services +# +supfilesrv 871/tcp # SUP server +supfiledbg 1127/tcp kwdb-commn # SUP debugging + +# +# Unregistered but useful/necessary other services +# +netstat 15/tcp # (was once asssigned, no more) +poppassd 106/tcp # Eudora +poppassd 106/udp # Eudora +omirr 808/tcp omirrd # online mirror +omirr 808/udp omirrd # online mirror +swat 901/tcp smpnameres # Samba Web Administration Tool +rndc 953/tcp # rndc control sockets (BIND 9) +rndc 953/udp # rndc control sockets (BIND 9) +skkserv 1178/tcp sgi-storman # SKK Japanese input method +xtel 1313/tcp bmc_patroldb bmc-patroldb # french minitel +support 1529/tcp prmsd gnatsd coauthor # GNATS, cygnus bug tracker +cfinger 2003/tcp brutus # GNU Finger +ninstall 2150/tcp dynamic3d # ninstall service +ninstall 2150/udp dynamic3d # ninstall service +afbackup 2988/tcp hippad # Afbackup system +afbackup 2988/udp hippad # Afbackup system +squid 3128/tcp ndl-aas # squid web proxy +prsvp 3455/tcp # RSVP Port +prsvp 3455/udp # RSVP Port +distcc 3632/tcp # distcc +svn 3690/tcp # Subversion +svn 3690/udp # Subversion +postgres 5432/tcp postgresql # POSTGRES +postgres 5432/udp postgresql # POSTGRES +fax 4557/tcp # FAX transmission service (old) +hylafax 4559/tcp # HylaFAX client-server protocol (new) +sgi-dgl 5232/tcp csedaemon # SGI Distributed Graphics +sgi-dgl 5232/udp +hostmon 5355/tcp llmnr # hostmon uses TCP (nocol) +hostmon 5355/udp llmnr # hostmon uses TCP (nocol) +canna 5680/tcp auriga-router +x11-ssh-offset 6010/tcp # SSH X11 forwarding offset +xfs 7100/tcp font-service # X font server +tircproxy 7666/tcp # Tircproxy +# IANA claims 8008 for http-alt +webcache 8080/tcp http-alt # WWW caching service +webcache 8080/udp http-alt # WWW caching service +tproxy 8081/tcp sunproxyadmin # Transparent Proxy +tproxy 8081/udp sunproxyadmin # Transparent Proxy +jetdirect 9100/tcp laserjet hplj hp-pdl-datastr pdl-datastream +mandelspawn 9359/udp mandelbrot # network mandelbrot +kamanda 10081/tcp famdc # amanda backup services (Kerberos) +kamanda 10081/udp famdc # amanda backup services (Kerberos) +amandaidx 10082/tcp # amanda backup services +amidxtape 10083/tcp # amanda backup services +isdnlog 20011/tcp # isdn logging system +isdnlog 20011/udp # isdn logging system +wnn4_Kr 22305/tcp cis # used by the kWnn package +wnn4_Cn 22289/tcp # used by the cWnn package +wnn4_Tw 22321/tcp # used by the tWnn package +binkp 24554/tcp # Binkley +binkp 24554/udp # Binkley +sdtvwcam 24666/tcp # Service used by SmarDTV to communicate between a CAM and second screen application +canditv 24676/tcp # Canditv Message Service +canditv 24676/udp # Canditv Message Service +asp 27374/tcp # Address Search Protocol +asp 27374/udp # Address Search Protocol +tfido 60177/tcp # Ifmail +tfido 60177/udp # Ifmail +fido 60179/tcp # Ifmail +fido 60179/udp # Ifmail + + +# Updated additional list from IANA with all missing services 10/04/2015 +#spr-itunes 0/tcp spl-itunes # Shirt Pocket netTunes - no port allocated +compressnet 2/tcp # Management Utility +compressnet 2/udp # Management Utility +#compressnet 3/tcp # Compression Process +#compressnet 3/udp # Compression Process +discard 9/sctp # Discard +discard 9/dccp # Discard SC:DISC +ftp-data 20/sctp # FTP +ftp 21/sctp # FTP +ssh 22/sctp # SSH +nsw-fe 27/tcp # NSW User System FE +nsw-fe 27/udp # NSW User System FE +msg-icp 29/tcp # MSG ICP +msg-icp 29/udp # MSG ICP +msg-auth 31/tcp # MSG Authentication +msg-auth 31/udp # MSG Authentication +dsp 33/tcp # Display Support Protocol +dsp 33/udp # Display Support Protocol +graphics 41/tcp # Graphics +graphics 41/udp # Graphics +mpm-flags 44/tcp # MPM FLAGS Protocol +mpm-flags 44/udp # MPM FLAGS Protocol +mpm 45/tcp # Message Processing Module [recv] +mpm 45/udp # Message Processing Module [recv] +mpm-snd 46/tcp # MPM [default send] +mpm-snd 46/udp # MPM [default send] +ni-ftp 47/tcp # NI FTP +ni-ftp 47/udp # NI FTP +auditd 48/tcp # Digital Audit Daemon +auditd 48/udp # Digital Audit Daemon +la-maint 51/tcp # IMP Logical Address Maintenance +la-maint 51/udp # IMP Logical Address Maintenance +xns-time 52/tcp # XNS Time Protocol +xns-time 52/udp # XNS Time Protocol +xns-ch 54/tcp # XNS Clearinghouse +xns-ch 54/udp # XNS Clearinghouse +isi-gl 55/tcp # ISI Graphics Language +isi-gl 55/udp # ISI Graphics Language +xns-auth 56/tcp # XNS Authentication +xns-auth 56/udp # XNS Authentication +xns-mail 58/tcp # XNS Mail +xns-mail 58/udp # XNS Mail +ni-mail 61/tcp # NI MAIL +ni-mail 61/udp # NI MAIL +acas 62/tcp # ACA Services +acas 62/udp # ACA Services +covia 64/tcp # Communications Integrator (CI) +covia 64/udp # Communications Integrator (CI) +tacacs-ds 65/tcp # TACACS-Database Service +tacacs-ds 65/udp # TACACS-Database Service +sql*net 66/tcp # Oracle SQL*NET +sql*net 66/udp # Oracle SQL*NET +deos 76/tcp # Distributed External Object Store +deos 76/udp # Distributed External Object Store +vettcp 78/tcp # vettcp +vettcp 78/udp # vettcp +xfer 82/tcp # XFER Utility +xfer 82/udp # XFER Utility +ctf 84/tcp # Common Trace Facility +ctf 84/udp # Common Trace Facility +mfcobol 86/tcp # Micro Focus Cobol +mfcobol 86/udp # Micro Focus Cobol +su-mit-tg 89/tcp # SU/MIT Telnet Gateway +su-mit-tg 89/udp # SU/MIT Telnet Gateway +dnsix 90/tcp # DNSIX Securit Attribute Token Map +dnsix 90/udp # DNSIX Securit Attribute Token Map +mit-dov 91/tcp # MIT Dover Spooler +mit-dov 91/udp # MIT Dover Spooler +#npp 92/tcp # Network Printing Protocol +#npp 92/udp # Network Printing Protocol +dcp 93/tcp # Device Control Protocol +dcp 93/udp # Device Control Protocol +objcall 94/tcp # Tivoli Object Dispatcher +objcall 94/udp # Tivoli Object Dispatcher +dixie 96/tcp # DIXIE Protocol Specification +dixie 96/udp # DIXIE Protocol Specification +swift-rvf 97/tcp # Swift Remote Virtural File Protocol +swift-rvf 97/udp # Swift Remote Virtural File Protocol +tacnews 98/tcp # TAC News +tacnews 98/udp # TAC News +metagram 99/tcp # Metagram Relay +metagram 99/udp # Metagram Relay +newacct 100/tcp # [unauthorized use] +iso-tsap 102/udp # ISO-TSAP Class 0 +gppitnp 103/tcp # Genesis Point-to-Point Trans Net +gppitnp 103/udp # Genesis Point-to-Point Trans Net +acr-nema 104/tcp # ACR-NEMA Digital Imag. & Comm. 300 +acr-nema 104/udp # ACR-NEMA Digital Imag. & Comm. 300 +snagas 108/tcp # SNA Gateway Access Server +snagas 108/udp # SNA Gateway Access Server +mcidas 112/tcp # McIDAS Data Transmission Protocol +mcidas 112/udp # McIDAS Data Transmission Protocol +ansanotify 116/tcp # ANSA REX Notify +ansanotify 116/udp # ANSA REX Notify +sqlserv 118/tcp # SQL Services +sqlserv 118/udp # SQL Services +cfdptkt 120/tcp # CFDPTKT +cfdptkt 120/udp # CFDPTKT +erpc 121/tcp # Encore Expedited Remote Pro.Call +erpc 121/udp # Encore Expedited Remote Pro.Call +smakynet 122/tcp # SMAKYNET +smakynet 122/udp # SMAKYNET +ansatrader 124/tcp # ANSA REX Trader +ansatrader 124/udp # ANSA REX Trader +locus-map 125/tcp # Locus PC-Interface Net Map Ser +locus-map 125/udp # Locus PC-Interface Net Map Ser +nxedit 126/tcp # NXEdit +nxedit 126/udp # NXEdit +locus-con 127/tcp # Locus PC-Interface Conn Server +locus-con 127/udp # Locus PC-Interface Conn Server +gss-xlicen 128/tcp # GSS X License Verification +gss-xlicen 128/udp # GSS X License Verification +pwdgen 129/tcp # Password Generator Protocol +pwdgen 129/udp # Password Generator Protocol +cisco-fna 130/tcp # cisco FNATIVE +cisco-fna 130/udp # cisco FNATIVE +cisco-tna 131/tcp # cisco TNATIVE +cisco-tna 131/udp # cisco TNATIVE +cisco-sys 132/tcp # cisco SYSMAINT +cisco-sys 132/udp # cisco SYSMAINT +statsrv 133/tcp # Statistics Service +statsrv 133/udp # Statistics Service +ingres-net 134/tcp # INGRES-NET Service +ingres-net 134/udp # INGRES-NET Service +epmap 135/tcp # DCE endpoint resolution +epmap 135/udp # DCE endpoint resolution +profile 136/tcp # PROFILE Naming System +profile 136/udp # PROFILE Naming System +emfis-data 140/tcp # EMFIS Data Service +emfis-data 140/udp # EMFIS Data Service +emfis-cntl 141/tcp # EMFIS Control Service +emfis-cntl 141/udp # EMFIS Control Service +bl-idm 142/tcp # Britton-Lee IDM +bl-idm 142/udp # Britton-Lee IDM +uaac 145/tcp # UAAC Protocol +uaac 145/udp # UAAC Protocol +iso-tp0 146/tcp # ISO-IP0 +iso-tp0 146/udp # ISO-IP0 +iso-ip 147/tcp # ISO-IP +iso-ip 147/udp # ISO-IP +jargon 148/tcp # Jargon +jargon 148/udp # Jargon +aed-512 149/tcp # AED 512 Emulation Service +aed-512 149/udp # AED 512 Emulation Service +sql-net 150/tcp # SQL-NET +sql-net 150/udp # SQL-NET +hems 151/tcp # HEMS +hems 151/udp # HEMS +bftp 152/tcp # Background File Transfer Program +bftp 152/udp # Background File Transfer Program +sgmp 153/tcp # SGMP +sgmp 153/udp # SGMP +netsc-prod 154/tcp # NETSC +netsc-prod 154/udp # NETSC +netsc-dev 155/tcp # NETSC +netsc-dev 155/udp # NETSC +sqlsrv 156/tcp # SQL Service +sqlsrv 156/udp # SQL Service +knet-cmp 157/tcp # KNET/VM Command/Message Protocol +knet-cmp 157/udp # KNET/VM Command/Message Protocol +pcmail-srv 158/tcp # PCMail Server +pcmail-srv 158/udp # PCMail Server +nss-routing 159/tcp # NSS-Routing +nss-routing 159/udp # NSS-Routing +sgmp-traps 160/tcp # SGMP-TRAPS +sgmp-traps 160/udp # SGMP-TRAPS +xns-courier 165/tcp # Xerox +xns-courier 165/udp # Xerox +s-net 166/tcp # Sirius Systems +s-net 166/udp # Sirius Systems +namp 167/tcp # NAMP +namp 167/udp # NAMP +rsvd 168/tcp # RSVD +rsvd 168/udp # RSVD +send 169/tcp # SEND +send 169/udp # SEND +print-srv 170/tcp # Network PostScript +print-srv 170/udp # Network PostScript +multiplex 171/tcp # Network Innovations Multiplex +multiplex 171/udp # Network Innovations Multiplex +cl/1 172/tcp cl-1 # Network Innovations CL/1 +cl/1 172/udp cl-1 # Network Innovations CL/1 +xyplex-mux 173/tcp # Xyplex +xyplex-mux 173/udp # Xyplex +vmnet 175/tcp # VMNET +vmnet 175/udp # VMNET +genrad-mux 176/tcp # GENRAD-MUX +genrad-mux 176/udp # GENRAD-MUX +ris 180/tcp # Intergraph +ris 180/udp # Intergraph +unify 181/tcp # Unify +unify 181/udp # Unify +audit 182/tcp # Unisys Audit SITP +audit 182/udp # Unisys Audit SITP +ocbinder 183/tcp # OCBinder +ocbinder 183/udp # OCBinder +ocserver 184/tcp # OCServer +ocserver 184/udp # OCServer +remote-kis 185/tcp # Remote-KIS +remote-kis 185/udp # Remote-KIS +kis 186/tcp # KIS Protocol +kis 186/udp # KIS Protocol +aci 187/tcp # Application Communication Interface +aci 187/udp # Application Communication Interface +mumps 188/tcp # Plus Five's MUMPS +mumps 188/udp # Plus Five's MUMPS +qft 189/tcp # Queued File Transport +qft 189/udp # Queued File Transport +gacp 190/tcp # Gateway Access Control Protocol +gacp 190/udp # Gateway Access Control Protocol +osu-nms 192/tcp # OSU Network Monitoring System +osu-nms 192/udp # OSU Network Monitoring System +srmp 193/tcp # Spider Remote Monitoring Protocol +srmp 193/udp # Spider Remote Monitoring Protocol +dn6-nlm-aud 195/tcp # DNSIX Network Level Module Audit +dn6-nlm-aud 195/udp # DNSIX Network Level Module Audit +dn6-smm-red 196/tcp # DNSIX Session Mgt Module Audit Redir +dn6-smm-red 196/udp # DNSIX Session Mgt Module Audit Redir +dls-mon 198/tcp # Directory Location Service Monitor +dls-mon 198/udp # Directory Location Service Monitor +src 200/tcp # IBM System Resource Controller +src 200/udp # IBM System Resource Controller +at-3 203/tcp # AppleTalk Unused +at-3 203/udp # AppleTalk Unused +at-5 205/tcp # AppleTalk Unused +at-5 205/udp # AppleTalk Unused +at-7 207/tcp # AppleTalk Unused +at-7 207/udp # AppleTalk Unused +at-8 208/tcp # AppleTalk Unused +at-8 208/udp # AppleTalk Unused +914c/g 211/tcp 914c-g # Texas Instruments 914C/G Terminal +914c/g 211/udp 914c-g # Texas Instruments 914C/G Terminal +anet 212/tcp # ATEXSSTR +anet 212/udp # ATEXSSTR +vmpwscs 214/tcp # VM PWSCS +vmpwscs 214/udp # VM PWSCS +softpc 215/tcp # Insignia Solutions +softpc 215/udp # Insignia Solutions +CAIlic 216/tcp # Computer Associates Int'l License Server +CAIlic 216/udp # Computer Associates Int'l License Server +dbase 217/tcp # dBASE Unix +dbase 217/udp # dBASE Unix +mpp 218/tcp # Netix Message Posting Protocol +mpp 218/udp # Netix Message Posting Protocol +uarps 219/tcp # Unisys ARPs +uarps 219/udp # Unisys ARPs +fln-spx 221/tcp # Berkeley rlogind with SPX auth +fln-spx 221/udp # Berkeley rlogind with SPX auth +rsh-spx 222/tcp # Berkeley rshd with SPX auth +rsh-spx 222/udp # Berkeley rshd with SPX auth +cdc 223/tcp # Certificate Distribution Center +cdc 223/udp # Certificate Distribution Center +masqdialer 224/tcp # masqdialer +masqdialer 224/udp # masqdialer +direct 242/tcp # Direct +direct 242/udp # Direct +sur-meas 243/tcp # Survey Measurement +sur-meas 243/udp # Survey Measurement +inbusiness 244/tcp # inbusiness +inbusiness 244/udp # inbusiness +dsp3270 246/tcp # Display Systems Protocol +dsp3270 246/udp # Display Systems Protocol +subntbcst_tftp 247/tcp subntbcst-tftp # SUBNTBCST_TFTP +subntbcst_tftp 247/udp subntbcst-tftp # SUBNTBCST_TFTP +bhfhs 248/tcp # bhfhs +bhfhs 248/udp # bhfhs +set 257/tcp # Secure Electronic Transaction +set 257/udp # Secure Electronic Transaction +esro-gen 259/tcp # Efficient Short Remote Operations +esro-gen 259/udp # Efficient Short Remote Operations +openport 260/tcp # Openport +openport 260/udp # Openport +nsiiops 261/tcp # IIOP Name Service over TLS/SSL +nsiiops 261/udp # IIOP Name Service over TLS/SSL +arcisdms 262/tcp # Arcisdms +arcisdms 262/udp # Arcisdms +hdap 263/tcp # HDAP +hdap 263/udp # HDAP +bgmp 264/tcp # BGMP +bgmp 264/udp # BGMP +x-bone-ctl 265/tcp # X-Bone CTL +x-bone-ctl 265/udp # X-Bone CTL +sst 266/tcp # SCSI on ST +sst 266/udp # SCSI on ST +td-service 267/tcp # Tobit David Service Layer +td-service 267/udp # Tobit David Service Layer +td-replica 268/tcp # Tobit David Replica +td-replica 268/udp # Tobit David Replica +manet 269/tcp # MANET Protocols +manet 269/udp # MANET Protocols [RFC5498] +http-mgmt 280/tcp # http-mgmt +http-mgmt 280/udp # http-mgmt +personal-link 281/tcp # Personal Link +personal-link 281/udp # Personal Link +cableport-ax 282/tcp # Cable Port A/X +cableport-ax 282/udp # Cable Port A/X +rescap 283/tcp # rescap +rescap 283/udp # rescap +corerjd 284/tcp # corerjd +corerjd 284/udp # corerjd +k-block 287/tcp # K-BLOCK +k-block 287/udp # K-BLOCK +novastorbakcup 308/tcp # Novastor Backup +novastorbakcup 308/udp # Novastor Backup +entrusttime 309/tcp # EntrustTime +entrusttime 309/udp # EntrustTime +bhmds 310/tcp # bhmds +bhmds 310/udp # bhmds +asip-webadmin 311/tcp # AppleShare IP WebAdmin +asip-webadmin 311/udp # AppleShare IP WebAdmin +vslmp 312/tcp # VSLMP +vslmp 312/udp # VSLMP +magenta-logic 313/tcp # Magenta Logic +magenta-logic 313/udp # Magenta Logic +opalis-robot 314/tcp # Opalis Robot +opalis-robot 314/udp # Opalis Robot +dpsi 315/tcp # DPSI +dpsi 315/udp # DPSI +decauth 316/tcp # decAuth +decauth 316/udp # decAuth +zannet 317/tcp # Zannet +zannet 317/udp # Zannet +pkix-timestamp 318/tcp # PKIX TimeStamp +pkix-timestamp 318/udp # PKIX TimeStamp +ptp-event 319/tcp # PTP Event +ptp-event 319/udp # PTP Event +ptp-general 320/tcp # PTP General +ptp-general 320/udp # PTP General +rtsps 322/tcp # RTSPS +rtsps 322/udp # RTSPS +rpki-rtr 323/tcp # Resource PKI to Router +rpki-rtr-tls 324/tcp # Resource PKI to Router +texar 333/tcp # Texar Security Port +texar 333/udp # Texar Security Port +pdap 344/tcp # Prospero Data Access Protocol +pdap 344/udp # Prospero Data Access Protocol +pawserv 345/tcp # Perf Analysis Workbench +pawserv 345/udp # Perf Analysis Workbench +zserv 346/tcp # Zebra server +zserv 346/udp # Zebra server +csi-sgwp 348/tcp # Cabletron Management Protocol +csi-sgwp 348/udp # Cabletron Management Protocol +matip-type-a 350/tcp # MATIP Type A +matip-type-a 350/udp # MATIP Type A +matip-type-b 351/tcp bhoetty # MATIP Type B / bhoetty (added 5/21/97) +matip-type-b 351/udp bhoetty # MATIP Type B / bhoetty +dtag-ste-sb 352/tcp bhoedap4 # DTAG (assigned long ago) / bhoedap4 +dtag-ste-sb 352/udp bhoedap4 # DTAG / bhoedap4 +ndsauth 353/tcp # NDSAUTH +ndsauth 353/udp # NDSAUTH +bh611 354/tcp # bh611 +bh611 354/udp # bh611 +datex-asn 355/tcp # DATEX-ASN +datex-asn 355/udp # DATEX-ASN +cloanto-net-1 356/tcp # Cloanto Net 1 +cloanto-net-1 356/udp # Cloanto Net 1 +bhevent 357/tcp # bhevent +bhevent 357/udp # bhevent +shrinkwrap 358/tcp # Shrinkwrap +shrinkwrap 358/udp # Shrinkwrap +nsrmp 359/tcp # Network Security Risk Management Protocol +nsrmp 359/udp # Network Security Risk Management Protocol +scoi2odialog 360/tcp # scoi2odialog +scoi2odialog 360/udp # scoi2odialog +semantix 361/tcp # Semantix +semantix 361/udp # Semantix +srssend 362/tcp # SRS Send +srssend 362/udp # SRS Send +aurora-cmgr 364/tcp # Aurora CMGR +aurora-cmgr 364/udp # Aurora CMGR +dtk 365/tcp # DTK +dtk 365/udp # DTK +mortgageware 367/tcp # MortgageWare +mortgageware 367/udp # MortgageWare +qbikgdp 368/tcp # QbikGDP +qbikgdp 368/udp # QbikGDP +clearcase 371/tcp # Clearcase +clearcase 371/udp # Clearcase +legent-1 373/tcp # Legent Corporation +legent-1 373/udp # Legent Corporation +legent-2 374/tcp # Legent Corporation +legent-2 374/udp # Legent Corporation +hassle 375/tcp # Hassle +hassle 375/udp # Hassle +nip 376/tcp # Amiga Envoy Network Inquiry Proto +nip 376/udp # Amiga Envoy Network Inquiry Proto +tnETOS 377/tcp # NEC Corporation +tnETOS 377/udp # NEC Corporation +dsETOS 378/tcp # NEC Corporation +dsETOS 378/udp # NEC Corporation +is99c 379/tcp # TIA/EIA/IS-99 modem client +is99c 379/udp # TIA/EIA/IS-99 modem client +is99s 380/tcp # TIA/EIA/IS-99 modem server +is99s 380/udp # TIA/EIA/IS-99 modem server +hp-collector 381/tcp # hp performance data collector +hp-collector 381/udp # hp performance data collector +hp-managed-node 382/tcp # hp performance data managed node +hp-managed-node 382/udp # hp performance data managed node +hp-alarm-mgr 383/tcp # hp performance data alarm manager +hp-alarm-mgr 383/udp # hp performance data alarm manager +arns 384/tcp # A Remote Network Server System +arns 384/udp # A Remote Network Server System +ibm-app 385/tcp # IBM Application +ibm-app 385/udp # IBM Application +asa 386/tcp # ASA Message Router Object Def. +asa 386/udp # ASA Message Router Object Def. +aurp 387/tcp # Appletalk Update-Based Routing Pro. +aurp 387/udp # Appletalk Update-Based Routing Pro. +unidata-ldm 388/tcp # Unidata LDM +unidata-ldm 388/udp # Unidata LDM +uis 390/tcp # UIS +uis 390/udp # UIS +synotics-relay 391/tcp # SynOptics SNMP Relay Port +synotics-relay 391/udp # SynOptics SNMP Relay Port +synotics-broker 392/tcp # SynOptics Port Broker Port +synotics-broker 392/udp # SynOptics Port Broker Port +meta5 393/tcp # Meta5 +meta5 393/udp # Meta5 +embl-ndt 394/tcp # EMBL Nucleic Data Transfer +embl-ndt 394/udp # EMBL Nucleic Data Transfer +netcp 395/tcp # NETscout Control Protocol +netcp 395/udp # NETscout Control Protocol +netware-ip 396/tcp # Novell Netware over IP +netware-ip 396/udp # Novell Netware over IP +mptn 397/tcp # Multi Protocol Trans. Net. +mptn 397/udp # Multi Protocol Trans. Net. +kryptolan 398/tcp # Kryptolan +kryptolan 398/udp # Kryptolan +iso-tsap-c2 399/tcp # ISO Transport Class 2 Non-Control over TCP +iso-tsap-c2 399/udp # ISO Transport Class 2 Non-Control over UDP +ups 401/tcp # Uninterruptible Power Supply +ups 401/udp # Uninterruptible Power Supply +genie 402/tcp # Genie Protocol +genie 402/udp # Genie Protocol +decap 403/tcp # decap +decap 403/udp # decap +nced 404/tcp # nced +nced 404/udp # nced +ncld 405/tcp # ncld +ncld 405/udp # ncld +imsp 406/tcp # Interactive Mail Support Protocol +imsp 406/udp # Interactive Mail Support Protocol +timbuktu 407/tcp # Timbuktu +timbuktu 407/udp # Timbuktu +prm-sm 408/tcp # Prospero Resource Manager Sys. Man. +prm-sm 408/udp # Prospero Resource Manager Sys. Man. +prm-nm 409/tcp # Prospero Resource Manager Node Man. +prm-nm 409/udp # Prospero Resource Manager Node Man. +decladebug 410/tcp # DECLadebug Remote Debug Protocol +decladebug 410/udp # DECLadebug Remote Debug Protocol +rmt 411/tcp # Remote MT Protocol +rmt 411/udp # Remote MT Protocol +synoptics-trap 412/tcp # Trap Convention Port +synoptics-trap 412/udp # Trap Convention Port +smsp 413/tcp # Storage Management Services Protocol +smsp 413/udp # Storage Management Services Protocol +infoseek 414/tcp # InfoSeek +infoseek 414/udp # InfoSeek +bnet 415/tcp # BNet +bnet 415/udp # BNet +silverplatter 416/tcp # Silverplatter +silverplatter 416/udp # Silverplatter +onmux 417/tcp # Onmux +onmux 417/udp # Onmux +hyper-g 418/tcp # Hyper-G +hyper-g 418/udp # Hyper-G +ariel1 419/tcp # Ariel 1 +ariel1 419/udp # Ariel 1 +smpte 420/tcp # SMPTE +smpte 420/udp # SMPTE +ariel2 421/tcp # Ariel 2 +ariel2 421/udp # Ariel 2 +ariel3 422/tcp # Ariel 3 +ariel3 422/udp # Ariel 3 +opc-job-start 423/tcp # IBM Operations Planning and Control Start +opc-job-start 423/udp # IBM Operations Planning and Control Start +opc-job-track 424/tcp # IBM Operations Planning and Control Track +opc-job-track 424/udp # IBM Operations Planning and Control Track +icad-el 425/tcp # ICAD +icad-el 425/udp # ICAD +smartsdp 426/tcp # smartsdp +smartsdp 426/udp # smartsdp +ocs_cmu 428/tcp ocs-cmu # OCS_CMU +ocs_cmu 428/udp ocs-cmu # OCS_CMU +ocs_amu 429/tcp ocs-amu # OCS_AMU +ocs_amu 429/udp ocs-amu # OCS_AMU +utmpsd 430/tcp # UTMPSD +utmpsd 430/udp # UTMPSD +utmpcd 431/tcp # UTMPCD +utmpcd 431/udp # UTMPCD +iasd 432/tcp # IASD +iasd 432/udp # IASD +nnsp 433/tcp # NNSP +nnsp 433/udp # NNSP +dna-cml 436/tcp # DNA-CML +dna-cml 436/udp # DNA-CML +comscm 437/tcp # comscm +comscm 437/udp # comscm +dsfgw 438/tcp # dsfgw +dsfgw 438/udp # dsfgw +dasp 439/tcp # dasp Thomas Obermair +dasp 439/udp # dasp tommy&inlab.m.eunet.de +sgcp 440/tcp # sgcp +sgcp 440/udp # sgcp +decvms-sysmgt 441/tcp # decvms-sysmgt +decvms-sysmgt 441/udp # decvms-sysmgt +cvc_hostd 442/tcp cvc-hostd # cvc_hostd +cvc_hostd 442/udp cvc-hostd # cvc_hostd +ddm-rdb 446/tcp # DDM-Remote Relational Database Access +ddm-rdb 446/udp # DDM-Remote Relational Database Access +ddm-dfm 447/tcp # DDM-Distributed File Management +ddm-dfm 447/udp # DDM-Distributed File Management +ddm-ssl 448/tcp # DDM-Remote DB Access Using Secure Sockets +ddm-ssl 448/udp # DDM-Remote DB Access Using Secure Sockets +as-servermap 449/tcp # AS Server Mapper +as-servermap 449/udp # AS Server Mapper +tserver 450/tcp # Computer Supported Telecomunication Applications +tserver 450/udp # Computer Supported Telecomunication Applications +sfs-smp-net 451/tcp # Cray Network Semaphore server +sfs-smp-net 451/udp # Cray Network Semaphore server +sfs-config 452/tcp # Cray SFS config server +sfs-config 452/udp # Cray SFS config server +macon-tcp 456/tcp # macon-tcp +macon-udp 456/udp # macon-udp +scohelp 457/tcp # scohelp +scohelp 457/udp # scohelp +appleqtc 458/tcp # apple quick time +appleqtc 458/udp # apple quick time +ampr-rcmd 459/tcp # ampr-rcmd +ampr-rcmd 459/udp # ampr-rcmd +skronk 460/tcp # skronk +skronk 460/udp # skronk +datasurfsrv 461/tcp # DataRampSrv +datasurfsrv 461/udp # DataRampSrv +datasurfsrvsec 462/tcp # DataRampSrvSec +datasurfsrvsec 462/udp # DataRampSrvSec +alpes 463/tcp # alpes +alpes 463/udp # alpes +urd 465/tcp smtps # URL Rendesvous Directory for SSM / SMTP over SSL (TLS) +igmpv3lite 465/udp # IGMP over UDP for SSM +digital-vrc 466/tcp # digital-vrc +digital-vrc 466/udp # digital-vrc +mylex-mapd 467/tcp # mylex-mapd +mylex-mapd 467/udp # mylex-mapd +rcp 469/tcp # Radio Control Protocol +rcp 469/udp # Radio Control Protocol +scx-proxy 470/tcp # scx-proxy +scx-proxy 470/udp # scx-proxy +mondex 471/tcp # Mondex +mondex 471/udp # Mondex +ljk-login 472/tcp # ljk-login +ljk-login 472/udp # ljk-login +hybrid-pop 473/tcp # hybrid-pop +hybrid-pop 473/udp # hybrid-pop +tn-tl-w1 474/tcp # tn-tl-w1 +tn-tl-w2 474/udp # tn-tl-w2 +tcpnethaspsrv 475/tcp # tcpnethaspsrv +tcpnethaspsrv 475/udp # tcpnethaspsrv +tn-tl-fd1 476/tcp # tn-tl-fd1 +tn-tl-fd1 476/udp # tn-tl-fd1 +ss7ns 477/tcp # ss7ns +ss7ns 477/udp # ss7ns +spsc 478/tcp # spsc +spsc 478/udp # spsc +iafserver 479/tcp # iafserver +iafserver 479/udp # iafserver +iafdbase 480/tcp # iafdbase +iafdbase 480/udp # iafdbase +ph 481/tcp # Ph service +ph 481/udp # Ph service +bgs-nsi 482/tcp # bgs-nsi +bgs-nsi 482/udp # bgs-nsi +ulpnet 483/tcp # ulpnet +ulpnet 483/udp # ulpnet +integra-sme 484/tcp # Integra Software Management Environment +integra-sme 484/udp # Integra Software Management Environment +powerburst 485/tcp # Air Soft Power Burst +powerburst 485/udp # Air Soft Power Burst +avian 486/tcp # avian +avian 486/udp # avian +nest-protocol 489/tcp # nest-protocol +nest-protocol 489/udp # nest-protocol +micom-pfs 490/tcp # micom-pfs +micom-pfs 490/udp # micom-pfs +go-login 491/tcp # go-login +go-login 491/udp # go-login +ticf-1 492/tcp # Transport Independent Convergence for FNA +ticf-1 492/udp # Transport Independent Convergence for FNA +ticf-2 493/tcp # Transport Independent Convergence for FNA +ticf-2 493/udp # Transport Independent Convergence for FNA +pov-ray 494/tcp # POV-Ray +pov-ray 494/udp # POV-Ray +intecourier 495/tcp # intecourier +intecourier 495/udp # intecourier +retrospect 497/tcp # Retrospect backup +retrospect 497/udp # Retrospect backup +siam 498/tcp # siam +siam 498/udp # siam +iso-ill 499/tcp # ISO ILL Protocol +iso-ill 499/udp # ISO ILL Protocol +stmf 501/tcp # STMF +stmf 501/udp # STMF +mbap 502/tcp # Modbus Application Protocol +mbap 502/udp # Modbus Application Protocol +intrinsa 503/tcp # Intrinsa +intrinsa 503/udp # Intrinsa +citadel 504/tcp # citadel +citadel 504/udp # citadel +mailbox-lm 505/tcp # mailbox-lm +mailbox-lm 505/udp # mailbox-lm +ohimsrv 506/tcp # ohimsrv +ohimsrv 506/udp # ohimsrv +crs 507/tcp # crs +crs 507/udp # crs +xvttp 508/tcp # xvttp +xvttp 508/udp # xvttp +snare 509/tcp # snare +snare 509/udp # snare +fcp 510/tcp # FirstClass Protocol +fcp 510/udp # FirstClass Protocol +passgo 511/tcp # PassGo +passgo 511/udp # PassGo +videotex 516/tcp # videotex +videotex 516/udp # videotex +talk 517/tcp # like tenex link, but across +ntalk 518/tcp # +ulp 522/tcp # ULP +ulp 522/udp # ULP +ibm-db2 523/tcp # IBM-DB2 +ibm-db2 523/udp # IBM-DB2 +ncp 524/tcp # NCP +ncp 524/udp # NCP +tempo 526/udp # newdate +stx 527/tcp # Stock IXChange +stx 527/udp # Stock IXChange +custix 528/tcp # Customer IXChange +custix 528/udp # Customer IXChange +irc-serv 529/tcp # IRC-SERV +irc-serv 529/udp # IRC-SERV +courier 530/udp # rpc +conference 531/udp # chat +netnews 532/udp # readnews +netwall 533/tcp # for emergency broadcasts +windream 534/tcp # windream Admin +windream 534/udp # windream Admin +opalis-rdv 536/tcp # opalis-rdv +opalis-rdv 536/udp # opalis-rdv +apertus-ldp 539/tcp # Apertus Technologies Load Determination +apertus-ldp 539/udp # Apertus Technologies Load Determination +uucp 540/udp # uucpd +uucp-rlogin 541/tcp # uucp-rlogin +uucp-rlogin 541/udp # uucp-rlogin +commerce 542/tcp # commerce +commerce 542/udp # commerce +klogin 543/udp # +kshell 544/udp # krcmd +appleqtcsrvr 545/tcp # appleqtcsrvr +appleqtcsrvr 545/udp # appleqtcsrvr +idfp 549/tcp # IDFP +idfp 549/udp # IDFP +new-rwho 550/tcp # new-who +new-rwho 550/udp # new-who +cybercash 551/tcp # cybercash +cybercash 551/udp # cybercash +devshr-nts 552/tcp # DeviceShare +devshr-nts 552/udp # DeviceShare +pirp 553/tcp # pirp +pirp 553/udp # pirp +dsf 555/tcp # +dsf 555/udp # +remotefs 556/udp # rfs server +openvms-sysipc 557/tcp # openvms-sysipc +openvms-sysipc 557/udp # openvms-sysipc +sdnskmp 558/tcp # SDNSKMP +sdnskmp 558/udp # SDNSKMP +teedtap 559/tcp # TEEDTAP +teedtap 559/udp # TEEDTAP +rmonitor 560/tcp # rmonitord +rmonitor 560/udp # rmonitord +monitor 561/tcp # +monitor 561/udp # +chshell 562/tcp # chcmd +chshell 562/udp # chcmd +9pfs 564/tcp # plan 9 file service +9pfs 564/udp # plan 9 file service +streettalk 566/tcp # streettalk +streettalk 566/udp # streettalk +banyan-rpc 567/tcp # banyan-rpc +banyan-rpc 567/udp # banyan-rpc +ms-shuttle 568/tcp # microsoft shuttle +ms-shuttle 568/udp # microsoft shuttle +ms-rome 569/tcp # microsoft rome +ms-rome 569/udp # microsoft rome +#meter 571/tcp # udemon +#meter 571/udp # udemon +sonar 572/tcp # sonar +sonar 572/udp # sonar +banyan-vip 573/tcp # banyan-vip +banyan-vip 573/udp # banyan-vip +ftp-agent 574/tcp # FTP Software Agent System +ftp-agent 574/udp # FTP Software Agent System +vemmi 575/tcp # VEMMI +vemmi 575/udp # VEMMI +ipcd 576/tcp # ipcd +ipcd 576/udp # ipcd +vnas 577/tcp # vnas +vnas 577/udp # vnas +ipdd 578/tcp # ipdd +ipdd 578/udp # ipdd +decbsrv 579/tcp # decbsrv +decbsrv 579/udp # decbsrv +sntp-heartbeat 580/tcp # SNTP HEARTBEAT +sntp-heartbeat 580/udp # SNTP HEARTBEAT +bdp 581/tcp # Bundle Discovery Protocol +bdp 581/udp # Bundle Discovery Protocol +scc-security 582/tcp # SCC Security +scc-security 582/udp # SCC Security +philips-vc 583/tcp # Philips Video-Conferencing +philips-vc 583/udp # Philips Video-Conferencing +keyserver 584/tcp # Key Server +keyserver 584/udp # Key Server +password-chg 586/tcp # Password Change +password-chg 586/udp # Password Change +cal 588/tcp # CAL +cal 588/udp # CAL +eyelink 589/tcp # EyeLink +eyelink 589/udp # EyeLink +tns-cml 590/tcp # TNS CML +tns-cml 590/udp # TNS CML +eudora-set 592/tcp # Eudora Set +eudora-set 592/udp # Eudora Set +http-rpc-epmap 593/tcp # HTTP RPC Ep Map +http-rpc-epmap 593/udp # HTTP RPC Ep Map +tpip 594/tcp # TPIP +tpip 594/udp # TPIP +cab-protocol 595/tcp # CAB Protocol +cab-protocol 595/udp # CAB Protocol +smsd 596/tcp # SMSD +smsd 596/udp # SMSD +ptcnameservice 597/tcp # PTC Name Service +ptcnameservice 597/udp # PTC Name Service +sco-websrvrmg3 598/tcp # SCO Web Server Manager 3 +sco-websrvrmg3 598/udp # SCO Web Server Manager 3 +acp 599/tcp # Aeolon Core Protocol +acp 599/udp # Aeolon Core Protocol +ipcserver 600/tcp # Sun IPC server +ipcserver 600/udp # Sun IPC server +syslog-conn 601/tcp # Reliable Syslog Service +syslog-conn 601/udp # Reliable Syslog Service +xmlrpc-beep 602/tcp # XML-RPC over BEEP +xmlrpc-beep 602/udp # XML-RPC over BEEP +idxp 603/tcp # IDXP +idxp 603/udp # IDXP +tunnel 604/tcp # TUNNEL +tunnel 604/udp # TUNNEL +soap-beep 605/tcp # SOAP over BEEP +soap-beep 605/udp # SOAP over BEEP +urm 606/tcp # Cray Unified Resource Manager +urm 606/udp # Cray Unified Resource Manager +nqs 607/tcp # nqs +nqs 607/udp # nqs +sift-uft 608/tcp # Sender-Initiated/Unsolicited File Transfer +sift-uft 608/udp # Sender-Initiated/Unsolicited File Transfer +npmp-trap 609/tcp # npmp-trap +npmp-trap 609/udp # npmp-trap +hmmp-op 613/tcp # HMMP Operation +hmmp-op 613/udp # HMMP Operation +sshell 614/tcp # SSLshell +sshell 614/udp # SSLshell +sco-inetmgr 615/tcp # Internet Configuration Manager +sco-inetmgr 615/udp # Internet Configuration Manager +sco-sysmgr 616/tcp gii # SCO System Administration Server +sco-sysmgr 616/udp # SCO System Administration Server +sco-dtmgr 617/tcp # SCO Desktop Administration Server +sco-dtmgr 617/udp # SCO Desktop Administration Server +dei-icda 618/tcp # DEI-ICDA +dei-icda 618/udp # DEI-ICDA +compaq-evm 619/tcp # Compaq EVM +compaq-evm 619/udp # Compaq EVM +sco-websrvrmgr 620/tcp # SCO WebServer Manager +sco-websrvrmgr 620/udp # SCO WebServer Manager +escp-ip 621/tcp # ESCP +escp-ip 621/udp # ESCP +collaborator 622/tcp # Collaborator +collaborator 622/udp # Collaborator +oob-ws-http 623/tcp # DMTF out-of-band web services management protocol +asf-rmcp 623/udp # ASF Remote Management and Control Protocol +cryptoadmin 624/tcp # Crypto Admin +cryptoadmin 624/udp # Crypto Admin +dec_dlm 625/tcp dec-dlm # DEC DLM +dec_dlm 625/udp dec-dlm # DEC DLM +asia 626/tcp # ASIA +asia 626/udp # ASIA +passgo-tivoli 627/tcp # PassGo Tivoli +passgo-tivoli 627/udp # PassGo Tivoli +qmqp 628/tcp # QMQP +qmqp 628/udp # QMQP +3com-amp3 629/tcp # 3Com AMP3 +3com-amp3 629/udp # 3Com AMP3 +rda 630/tcp # RDA +rda 630/udp # RDA +bmpp 632/tcp # bmpp +bmpp 632/udp # bmpp +servstat 633/tcp # Service Status update (Sterling Software) +servstat 633/udp # Service Status update (Sterling Software) +ginad 634/tcp # ginad +ginad 634/udp # ginad +rlzdbase 635/tcp # RLZ DBase +rlzdbase 635/udp # RLZ DBase +lanserver 637/tcp # lanserver +lanserver 637/udp # lanserver +mcns-sec 638/tcp # mcns-sec +mcns-sec 638/udp # mcns-sec +msdp 639/tcp # MSDP +msdp 639/udp # MSDP +entrust-sps 640/tcp # entrust-sps +entrust-sps 640/udp # entrust-sps +repcmd 641/tcp # repcmd +repcmd 641/udp # repcmd +esro-emsdp 642/tcp # ESRO-EMSDP V1.3 +esro-emsdp 642/udp # ESRO-EMSDP V1.3 +sanity 643/tcp # SANity +sanity 643/udp # SANity +dwr 644/tcp # dwr +dwr 644/udp # dwr +pssc 645/tcp # PSSC +pssc 645/udp # PSSC +ldp 646/tcp # LDP +ldp 646/udp # LDP +dhcp-failover 647/tcp # DHCP Failover +dhcp-failover 647/udp # DHCP Failover +rrp 648/tcp # Registry Registrar Protocol (RRP) +rrp 648/udp # Registry Registrar Protocol (RRP) +cadview-3d 649/tcp # Cadview-3d - streaming 3d models over the internet +cadview-3d 649/udp # Cadview-3d - streaming 3d models over the internet +obex 650/tcp # OBEX +obex 650/udp # OBEX +ieee-mms 651/tcp # IEEE MMS +ieee-mms 651/udp # IEEE MMS +hello-port 652/tcp # HELLO_PORT +hello-port 652/udp # HELLO_PORT +repscmd 653/tcp # RepCmd +repscmd 653/udp # RepCmd +aodv 654/tcp # AODV +aodv 654/udp # AODV +tinc 655/tcp # TINC +tinc 655/udp # TINC +spmp 656/tcp # SPMP +spmp 656/udp # SPMP +rmc 657/tcp # RMC +rmc 657/udp # RMC +tenfold 658/tcp # TenFold +tenfold 658/udp # TenFold +mac-srvr-admin 660/tcp # MacOS Server Admin +mac-srvr-admin 660/udp # MacOS Server Admin +hap 661/tcp # HAP +hap 661/udp # HAP +pftp 662/tcp # PFTP +pftp 662/udp # PFTP +purenoise 663/tcp # PureNoise +purenoise 663/udp # PureNoise +oob-ws-https 664/tcp # DMTF out-of-band secure web services management protocol +asf-secure-rmcp 664/udp # ASF Secure Remote Management and Control Protocol +sun-dr 665/tcp # Sun DR +sun-dr 665/udp # Sun DR +mdqs 666/tcp doom # doom Id Software +mdqs 666/udp doom # doom Id Software +disclose 667/tcp # campaign contribution disclosures - SDR Technologies +disclose 667/udp # campaign contribution disclosures - SDR Technologies +mecomm 668/tcp # MeComm +mecomm 668/udp # MeComm +meregister 669/tcp # MeRegister +meregister 669/udp # MeRegister +vacdsm-sws 670/tcp # VACDSM-SWS +vacdsm-sws 670/udp # VACDSM-SWS +vacdsm-app 671/tcp # VACDSM-APP +vacdsm-app 671/udp # VACDSM-APP +vpps-qua 672/tcp # VPPS-QUA +vpps-qua 672/udp # VPPS-QUA +cimplex 673/tcp # CIMPLEX +cimplex 673/udp # CIMPLEX +dctp 675/tcp # DCTP +dctp 675/udp # DCTP +vpps-via 676/tcp # VPPS Via +vpps-via 676/udp # VPPS Via +vpp 677/tcp # Virtual Presence Protocol +vpp 677/udp # Virtual Presence Protocol +ggf-ncp 678/tcp # GNU Generation Foundation NCP +ggf-ncp 678/udp # GNU Generation Foundation NCP +mrm 679/tcp # MRM +mrm 679/udp # MRM +entrust-aaas 680/tcp # entrust-aaas +entrust-aaas 680/udp # entrust-aaas +entrust-aams 681/tcp # entrust-aams +entrust-aams 681/udp # entrust-aams +xfr 682/tcp # XFR +xfr 682/udp # XFR +corba-iiop 683/tcp # CORBA IIOP +corba-iiop 683/udp # CORBA IIOP +corba-iiop-ssl 684/tcp # CORBA IIOP SSL +corba-iiop-ssl 684/udp # CORBA IIOP SSL +mdc-portmapper 685/tcp # MDC Port Mapper +mdc-portmapper 685/udp # MDC Port Mapper +hcp-wismar 686/tcp # Hardware Control Protocol Wismar +hcp-wismar 686/udp # Hardware Control Protocol Wismar +asipregistry 687/tcp # asipregistry +asipregistry 687/udp # asipregistry +realm-rusd 688/tcp # ApplianceWare managment protocol +realm-rusd 688/udp # ApplianceWare managment protocol +nmap 689/tcp # NMAP +nmap 689/udp # NMAP +vatp 690/tcp # Velneo Application Transfer Protocol +vatp 690/udp # Velneo Application Transfer Protocol +msexch-routing 691/tcp # MS Exchange Routing +msexch-routing 691/udp # MS Exchange Routing +hyperwave-isp 692/tcp # Hyperwave-ISP +hyperwave-isp 692/udp # Hyperwave-ISP +connendp 693/tcp # almanid Connection Endpoint +connendp 693/udp # almanid Connection Endpoint +ieee-mms-ssl 695/tcp # IEEE-MMS-SSL +ieee-mms-ssl 695/udp # IEEE-MMS-SSL +rushd 696/tcp # RUSHD +rushd 696/udp # RUSHD +uuidgen 697/tcp # UUIDGEN +uuidgen 697/udp # UUIDGEN +olsr 698/tcp # OLSR +olsr 698/udp # OLSR +accessnetwork 699/tcp # Access Network +accessnetwork 699/udp # Access Network +#epp 700/tcp # Extensible Provisioning Protocol +#epp 700/udp # Extensible Provisioning Protocol +lmp 701/tcp # Link Management Protocol (LMP) +lmp 701/udp # Link Management Protocol (LMP) +iris-beep 702/tcp # IRIS over BEEP +iris-beep 702/udp # IRIS over BEEP +elcsd 704/tcp # errlog copy/server daemon +elcsd 704/udp # errlog copy/server daemon +agentx 705/tcp # AgentX +agentx 705/udp # AgentX +silc 706/tcp # SILC +silc 706/udp # SILC +borland-dsj 707/tcp # Borland DSJ +borland-dsj 707/udp # Borland DSJ +entrust-kmsh 709/tcp # Entrust Key Management Service Handler +entrust-kmsh 709/udp # Entrust Key Management Service Handler +entrust-ash 710/tcp # Entrust Administration Service Handler +entrust-ash 710/udp # Entrust Administration Service Handler +cisco-tdp 711/tcp # Cisco TDP +cisco-tdp 711/udp # Cisco TDP +tbrpf 712/tcp # TBRPF +tbrpf 712/udp # TBRPF +iris-xpc 713/tcp # IRIS over XPC +iris-xpc 713/udp # IRIS over XPC +iris-xpcs 714/tcp # IRIS over XPCS +iris-xpcs 714/udp # IRIS over XPCS +iris-lwz 715/tcp # IRIS-LWZ +iris-lwz 715/udp # IRIS-LWZ +pana 716/udp # PANA Messages +netviewdm1 729/tcp # IBM NetView DM/6000 Server/Client +netviewdm1 729/udp # IBM NetView DM/6000 Server/Client +netviewdm2 730/tcp # IBM NetView DM/6000 send/tcp +netviewdm2 730/udp # IBM NetView DM/6000 send/tcp +netviewdm3 731/tcp # IBM NetView DM/6000 receive/tcp +netviewdm3 731/udp # IBM NetView DM/6000 receive/tcp +netgw 741/tcp # netGW +netgw 741/udp # netGW +netrcs 742/tcp # Network based Rev. Cont. Sys. +netrcs 742/udp # Network based Rev. Cont. Sys. +flexlm 744/tcp # Flexible License Manager +flexlm 744/udp # Flexible License Manager +fujitsu-dev 747/tcp # Fujitsu Device Control +fujitsu-dev 747/udp # Fujitsu Device Control +ris-cm 748/tcp # Russell Info Sci Calendar Manager +ris-cm 748/udp # Russell Info Sci Calendar Manager +qrh 752/tcp # +rrh 753/tcp # +rrh 753/udp # +tell 754/udp # send +nlogin 758/tcp # +nlogin 758/udp # +con 759/tcp # +con 759/udp # +ns 760/udp # +rxe 761/tcp # +rxe 761/udp # +quotad 762/tcp # +quotad 762/udp # +cycleserv 763/tcp # +cycleserv 763/udp # +omserv 764/tcp # +omserv 764/udp # +vid 769/tcp # +vid 769/udp # +cadlock 770/tcp # +cadlock 770/udp # +rtip 771/tcp # +rtip 771/udp # +cycleserv2 772/tcp # +cycleserv2 772/udp # +submit 773/tcp # +notify 773/udp # +rpasswd 774/tcp # +acmaint_dbd 774/udp acmaint-dbd # +entomb 775/tcp # +acmaint_transd 775/udp acmaint-transd # +wpages 776/tcp # +wpages 776/udp # +multiling-http 777/tcp # Multiling HTTP +multiling-http 777/udp # Multiling HTTP +wpgs 780/tcp # +wpgs 780/udp # +mdbs_daemon 800/tcp mdbs-daemon # +mdbs_daemon 800/udp mdbs-daemon # +device 801/tcp # +device 801/udp # +mbap-s 802/tcp # Modbus Application Protocol Secure +mbap-s 802/udp # Modbus Application Protocol Secure +fcp-udp 810/tcp # FCP +fcp-udp 810/udp # FCP Datagram +itm-mcell-s 828/tcp # itm-mcell-s +itm-mcell-s 828/udp # itm-mcell-s +pkix-3-ca-ra 829/tcp # PKIX-3 CA/RA +pkix-3-ca-ra 829/udp # PKIX-3 CA/RA +netconf-ssh 830/tcp # NETCONF over SSH +netconf-ssh 830/udp # NETCONF over SSH +netconf-beep 831/tcp # NETCONF over BEEP +netconf-beep 831/udp # NETCONF over BEEP +netconfsoaphttp 832/tcp # NETCONF for SOAP over HTTPS +netconfsoaphttp 832/udp # NETCONF for SOAP over HTTPS +netconfsoapbeep 833/tcp # NETCONF for SOAP over BEEP +netconfsoapbeep 833/udp # NETCONF for SOAP over BEEP +dhcp-failover2 847/tcp # dhcp-failover 2 +dhcp-failover2 847/udp # dhcp-failover 2 +gdoi 848/tcp # GDOI +gdoi 848/udp # GDOI +domain-s 853/tcp # DNS query-response protocol +domain-s 853/udp # DNS query-response protocol +iscsi 860/tcp # iSCSI +iscsi 860/udp # iSCSI +owamp-control 861/tcp # OWAMP-Control +owamp-control 861/udp # OWAMP-Control +twamp-control 862/tcp # Two-way Active Measurement Protocol (TWAMP) Control +twamp-control 862/udp # Two-way Active Measurement Protocol (TWAMP) Control +iclcnet-locate 886/tcp # ICL coNETion locate server +iclcnet-locate 886/udp # ICL coNETion locate server +iclcnet_svinfo 887/tcp iclcnet-svinfo # ICL coNETion server info +iclcnet_svinfo 887/udp iclcnet-svinfo # ICL coNETion server info +#accessbuilder 888/tcp # AccessBuilder +#accessbuilder 888/udp # AccessBuilder +cddbp 888/tcp # CD Database Protocol +omginitialrefs 900/tcp # OMG Initial Refs +omginitialrefs 900/udp # OMG Initial Refs +smpnameres 901/udp # SMPNAMERES +ideafarm-door 902/tcp # self documenting Telnet Door +ideafarm-door 902/udp # self documenting Door: send 0x00 for info +ideafarm-panic 903/tcp # self documenting Telnet Panic Door +ideafarm-panic 903/udp # self documenting Panic Door: send 0x00 for info +kink 910/tcp # Kerberized Internet Negotiation of Keys (KINK) +kink 910/udp # Kerberized Internet Negotiation of Keys (KINK) +xact-backup 911/tcp # xact-backup +xact-backup 911/udp # xact-backup +apex-mesh 912/tcp # APEX relay-relay service +apex-mesh 912/udp # APEX relay-relay service +apex-edge 913/tcp # APEX endpoint-relay service +apex-edge 913/udp # APEX endpoint-relay service +ftps-data 989/tcp # ftp protocol, data, over TLS/SSL +ftps-data 989/udp # ftp protocol, data, over TLS/SSL +ftps 990/tcp # ftp protocol, control, over TLS/SSL +ftps 990/udp # ftp protocol, control, over TLS/SSL +nas 991/tcp # Netnews Administration System +nas 991/udp # Netnews Administration System +vsinet 996/tcp # vsinet +vsinet 996/udp # vsinet +maitrd 997/tcp # +maitrd 997/udp # +busboy 998/tcp # +puparp 998/udp # +garcon 999/tcp # +applix 999/udp # Applix ac +#puprouter 999/tcp # +#puprouter 999/udp # +cadlock2 1000/tcp # +cadlock2 1000/udp # +surf 1010/tcp # surf +surf 1010/udp # surf +exp1 1021/tcp # RFC3692-style Experiment 1 (*) [RFC4727] +exp1 1021/udp # RFC3692-style Experiment 1 (*) [RFC4727] +exp1 1021/sctp # RFC3692-style Experiment 1 (*) [RFC4727] +exp1 1021/dccp # RFC3692-style Experiment 1 (*) [RFC4727] +exp2 1022/tcp # RFC3692-style Experiment 2 (*) [RFC4727] +exp2 1022/udp # RFC3692-style Experiment 2 (*) [RFC4727] +exp2 1022/sctp # RFC3692-style Experiment 2 (*) [RFC4727] +exp2 1022/dccp # RFC3692-style Experiment 2 (*) [RFC4727] +blackjack 1025/tcp # network blackjack +blackjack 1025/udp # network blackjack +cap 1026/tcp # Calendar Access Protocol +cap 1026/udp # Calendar Access Protocol +6a44 1027/udp # IPv6 Behind NAT44 CPEs +solid-mux 1029/tcp # Solid Mux Server +solid-mux 1029/udp # Solid Mux Server +netinfo-local 1033/tcp # local netinfo port +netinfo-local 1033/udp # local netinfo port +activesync 1034/tcp # ActiveSync Notifications +activesync 1034/udp # ActiveSync Notifications +mxxrlogin 1035/tcp # MX-XR RPC +mxxrlogin 1035/udp # MX-XR RPC +nsstp 1036/tcp # Nebula Secure Segment Transfer Protocol +nsstp 1036/udp # Nebula Secure Segment Transfer Protocol +ams 1037/tcp # AMS +ams 1037/udp # AMS +mtqp 1038/tcp # Message Tracking Query Protocol +mtqp 1038/udp # Message Tracking Query Protocol +sbl 1039/tcp # Streamlined Blackhole +sbl 1039/udp # Streamlined Blackhole +netarx 1040/tcp # Netarx Netcare +netarx 1040/udp # Netarx Netcare +danf-ak2 1041/tcp # AK2 Product +danf-ak2 1041/udp # AK2 Product +afrog 1042/tcp # Subnet Roaming +afrog 1042/udp # Subnet Roaming +boinc-client 1043/tcp # BOINC Client Control +boinc-client 1043/udp # BOINC Client Control +dcutility 1044/tcp # Dev Consortium Utility +dcutility 1044/udp # Dev Consortium Utility +fpitp 1045/tcp # Fingerprint Image Transfer Protocol +fpitp 1045/udp # Fingerprint Image Transfer Protocol +wfremotertm 1046/tcp # WebFilter Remote Monitor +wfremotertm 1046/udp # WebFilter Remote Monitor +neod1 1047/tcp # Sun's NEO Object Request Broker +neod1 1047/udp # Sun's NEO Object Request Broker +neod2 1048/tcp # Sun's NEO Object Request Broker +neod2 1048/udp # Sun's NEO Object Request Broker +td-postman 1049/tcp # Tobit David Postman VPMN +td-postman 1049/udp # Tobit David Postman VPMN +cma 1050/tcp # CORBA Management Agent +cma 1050/udp # CORBA Management Agent +optima-vnet 1051/tcp # Optima VNET +optima-vnet 1051/udp # Optima VNET +ddt 1052/tcp # Dynamic DNS Tools +ddt 1052/udp # Dynamic DNS Tools +remote-as 1053/tcp # Remote Assistant (RA) +remote-as 1053/udp # Remote Assistant (RA) +brvread 1054/tcp # BRVREAD +brvread 1054/udp # BRVREAD +ansyslmd 1055/tcp # ANSYS - License Manager +ansyslmd 1055/udp # ANSYS - License Manager +vfo 1056/tcp # VFO +vfo 1056/udp # VFO +startron 1057/tcp # STARTRON +startron 1057/udp # STARTRON +nim 1058/tcp # nim +nim 1058/udp # nim +nimreg 1059/tcp # nimreg +nimreg 1059/udp # nimreg +polestar 1060/tcp # POLESTAR +polestar 1060/udp # POLESTAR +kiosk 1061/tcp # KIOSK +kiosk 1061/udp # KIOSK +veracity 1062/tcp # Veracity +veracity 1062/udp # Veracity +kyoceranetdev 1063/tcp # KyoceraNetDev +kyoceranetdev 1063/udp # KyoceraNetDev +jstel 1064/tcp # JSTEL +jstel 1064/udp # JSTEL +syscomlan 1065/tcp # SYSCOMLAN +syscomlan 1065/udp # SYSCOMLAN +fpo-fns 1066/tcp # FPO-FNS +fpo-fns 1066/udp # FPO-FNS +instl_boots 1067/tcp instl-boots # Installation Bootstrap Proto. Serv. +instl_boots 1067/udp instl-boots # Installation Bootstrap Proto. Serv. +instl_bootc 1068/tcp instl-bootc # Installation Bootstrap Proto. Cli. +instl_bootc 1068/udp instl-bootc # Installation Bootstrap Proto. Cli. +cognex-insight 1069/tcp # COGNEX-INSIGHT +cognex-insight 1069/udp # COGNEX-INSIGHT +gmrupdateserv 1070/tcp # GMRUpdateSERV +gmrupdateserv 1070/udp # GMRUpdateSERV +bsquare-voip 1071/tcp # BSQUARE-VOIP +bsquare-voip 1071/udp # BSQUARE-VOIP +cardax 1072/tcp # CARDAX +cardax 1072/udp # CARDAX +bridgecontrol 1073/tcp # Bridge Control +bridgecontrol 1073/udp # Bridge Control +warmspotMgmt 1074/tcp # Warmspot Management Protocol +warmspotMgmt 1074/udp # Warmspot Management Protocol +rdrmshc 1075/tcp # RDRMSHC +rdrmshc 1075/udp # RDRMSHC +dab-sti-c 1076/tcp # DAB STI-C +dab-sti-c 1076/udp # DAB STI-C +imgames 1077/tcp # IMGames +imgames 1077/udp # IMGames +avocent-proxy 1078/tcp # Avocent Proxy Protocol +avocent-proxy 1078/udp # Avocent Proxy Protocol +asprovatalk 1079/tcp # ASPROVATalk +asprovatalk 1079/udp # ASPROVATalk +pvuniwien 1081/tcp # PVUNIWIEN +pvuniwien 1081/udp # PVUNIWIEN +amt-esd-prot 1082/tcp # AMT-ESD-PROT +amt-esd-prot 1082/udp # AMT-ESD-PROT +ansoft-lm-1 1083/tcp # Anasoft License Manager +ansoft-lm-1 1083/udp # Anasoft License Manager +ansoft-lm-2 1084/tcp # Anasoft License Manager +ansoft-lm-2 1084/udp # Anasoft License Manager +webobjects 1085/tcp # Web Objects +webobjects 1085/udp # Web Objects +cplscrambler-lg 1086/tcp # CPL Scrambler Logging +cplscrambler-lg 1086/udp # CPL Scrambler Logging +cplscrambler-in 1087/tcp # CPL Scrambler Internal +cplscrambler-in 1087/udp # CPL Scrambler Internal +cplscrambler-al 1088/tcp # CPL Scrambler Alarm Log +cplscrambler-al 1088/udp # CPL Scrambler Alarm Log +ff-annunc 1089/tcp # FF Annunciation +ff-annunc 1089/udp # FF Annunciation +ff-fms 1090/tcp # FF Fieldbus Message Specification +ff-fms 1090/udp # FF Fieldbus Message Specification +ff-sm 1091/tcp # FF System Management +ff-sm 1091/udp # FF System Management +obrpd 1092/tcp # Open Business Reporting Protocol +obrpd 1092/udp # Open Business Reporting Protocol +proofd 1093/tcp # PROOFD +proofd 1093/udp # PROOFD +rootd 1094/tcp # ROOTD +rootd 1094/udp # ROOTD +nicelink 1095/tcp # NICELink +nicelink 1095/udp # NICELink +cnrprotocol 1096/tcp # Common Name Resolution Protocol +cnrprotocol 1096/udp # Common Name Resolution Protocol +sunclustermgr 1097/tcp # Sun Cluster Manager +sunclustermgr 1097/udp # Sun Cluster Manager +rmiactivation 1098/tcp # RMI Activation +rmiactivation 1098/udp # RMI Activation +rmiregistry 1099/tcp # RMI Registry +rmiregistry 1099/udp # RMI Registry +mctp 1100/tcp # MCTP +mctp 1100/udp # MCTP +pt2-discover 1101/tcp # PT2-DISCOVER +pt2-discover 1101/udp # PT2-DISCOVER +adobeserver-1 1102/tcp # ADOBE SERVER 1 +adobeserver-1 1102/udp # ADOBE SERVER 1 +adobeserver-2 1103/tcp # ADOBE SERVER 2 +adobeserver-2 1103/udp # ADOBE SERVER 2 +xrl 1104/tcp # XRL +xrl 1104/udp # XRL +ftranhc 1105/tcp # FTRANHC +ftranhc 1105/udp # FTRANHC +isoipsigport-1 1106/tcp # ISOIPSIGPORT-1 +isoipsigport-1 1106/udp # ISOIPSIGPORT-1 +isoipsigport-2 1107/tcp # ISOIPSIGPORT-2 +isoipsigport-2 1107/udp # ISOIPSIGPORT-2 +ratio-adp 1108/tcp # ratio-adp +ratio-adp 1108/udp # ratio-adp +webadmstart 1110/tcp # Start web admin server +nfsd-keepalive 1110/udp # Client status info +lmsocialserver 1111/tcp # LM Social Server +lmsocialserver 1111/udp # LM Social Server +icp 1112/tcp # Intelligent Communication Protocol +icp 1112/udp # Intelligent Communication Protocol +ltp-deepspace 1113/tcp # Licklider Transmission Protocol +ltp-deepspace 1113/udp # Licklider Transmission Protocol +ltp-deepspace 1113/dccp # Licklider Transmission Protocol +mini-sql 1114/tcp # Mini SQL +mini-sql 1114/udp # Mini SQL +ardus-trns 1115/tcp # ARDUS Transfer +ardus-trns 1115/udp # ARDUS Transfer +ardus-cntl 1116/tcp # ARDUS Control +ardus-cntl 1116/udp # ARDUS Control +ardus-mtrns 1117/tcp # ARDUS Multicast Transfer +ardus-mtrns 1117/udp # ARDUS Multicast Transfer +sacred 1118/tcp # SACRED +sacred 1118/udp # SACRED +bnetgame 1119/tcp # Battle.net Chat/Game Protocol +bnetgame 1119/udp # Battle.net Chat/Game Protocol +bnetfile 1120/tcp # Battle.net File Transfer Protocol +bnetfile 1120/udp # Battle.net File Transfer Protocol +rmpp 1121/tcp # Datalode RMPP +rmpp 1121/udp # Datalode RMPP +availant-mgr 1122/tcp # availant-mgr +availant-mgr 1122/udp # availant-mgr +murray 1123/tcp # Murray +murray 1123/udp # Murray +hpvmmcontrol 1124/tcp # HP VMM Control +hpvmmcontrol 1124/udp # HP VMM Control +hpvmmagent 1125/tcp # HP VMM Agent +hpvmmagent 1125/udp # HP VMM Agent +hpvmmdata 1126/tcp # HP VMM Agent +hpvmmdata 1126/udp # HP VMM Agent +kwdb-commn 1127/udp # KWDB Remote Communication +saphostctrl 1128/tcp # SAPHostControl over SOAP/HTTP +saphostctrl 1128/udp # SAPHostControl over SOAP/HTTP +saphostctrls 1129/tcp # SAPHostControl over SOAP/HTTPS +saphostctrls 1129/udp # SAPHostControl over SOAP/HTTPS +casp 1130/tcp # CAC App Service Protocol +casp 1130/udp # CAC App Service Protocol +caspssl 1131/tcp # CAC App Service Protocol Encripted +caspssl 1131/udp # CAC App Service Protocol Encripted +kvm-via-ip 1132/tcp # KVM-via-IP Management Service +kvm-via-ip 1132/udp # KVM-via-IP Management Service +dfn 1133/tcp # Data Flow Network +dfn 1133/udp # Data Flow Network +aplx 1134/tcp # MicroAPL APLX +aplx 1134/udp # MicroAPL APLX +omnivision 1135/tcp # OmniVision Communication Service +omnivision 1135/udp # OmniVision Communication Service +hhb-gateway 1136/tcp # HHB Gateway Control +hhb-gateway 1136/udp # HHB Gateway Control +trim 1137/tcp # TRIM Workgroup Service +trim 1137/udp # TRIM Workgroup Service +encrypted_admin 1138/tcp encrypted-admin # encrypted admin requests +encrypted_admin 1138/udp encrypted-admin # encrypted admin requests +evm 1139/tcp # Enterprise Virtual Manager +evm 1139/udp # Enterprise Virtual Manager +autonoc 1140/tcp # AutoNOC Network Operations Protocol +autonoc 1140/udp # AutoNOC Network Operations Protocol +mxomss 1141/tcp # User Message Service +mxomss 1141/udp # User Message Service +edtools 1142/tcp # User Discovery Service +edtools 1142/udp # User Discovery Service +imyx 1143/tcp # Infomatryx Exchange +imyx 1143/udp # Infomatryx Exchange +fuscript 1144/tcp # Fusion Script +fuscript 1144/udp # Fusion Script +x9-icue 1145/tcp # X9 iCue Show Control +x9-icue 1145/udp # X9 iCue Show Control +audit-transfer 1146/tcp # audit transfer +audit-transfer 1146/udp # audit transfer +capioverlan 1147/tcp # CAPIoverLAN +capioverlan 1147/udp # CAPIoverLAN +elfiq-repl 1148/tcp # Elfiq Replication Service +elfiq-repl 1148/udp # Elfiq Replication Service +bvtsonar 1149/tcp # BlueView Sonar Service +bvtsonar 1149/udp # BlueView Sonar Service +blaze 1150/tcp # Blaze File Server +blaze 1150/udp # Blaze File Server +unizensus 1151/tcp # Unizensus Login Server +unizensus 1151/udp # Unizensus Login Server +winpoplanmess 1152/tcp # Winpopup LAN Messenger +winpoplanmess 1152/udp # Winpopup LAN Messenger +c1222-acse 1153/tcp # ANSI C12.22 Port +c1222-acse 1153/udp # ANSI C12.22 Port +resacommunity 1154/tcp # Community Service +resacommunity 1154/udp # Community Service +nfa 1155/tcp # Network File Access +nfa 1155/udp # Network File Access +iascontrol-oms 1156/tcp # iasControl OMS +iascontrol-oms 1156/udp # iasControl OMS +iascontrol 1157/tcp # Oracle iASControl +iascontrol 1157/udp # Oracle iASControl +dbcontrol-oms 1158/tcp # dbControl OMS +dbcontrol-oms 1158/udp # dbControl OMS +oracle-oms 1159/tcp # Oracle OMS +oracle-oms 1159/udp # Oracle OMS +olsv 1160/tcp # DB Lite Mult-User Server +olsv 1160/udp # DB Lite Mult-User Server +health-polling 1161/tcp # Health Polling +health-polling 1161/udp # Health Polling +health-trap 1162/tcp # Health Trap +health-trap 1162/udp # Health Trap +sddp 1163/tcp # SmartDialer Data Protocol +sddp 1163/udp # SmartDialer Data Protocol +qsm-proxy 1164/tcp # QSM Proxy Service +qsm-proxy 1164/udp # QSM Proxy Service +qsm-gui 1165/tcp # QSM GUI Service +qsm-gui 1165/udp # QSM GUI Service +qsm-remote 1166/tcp # QSM RemoteExec +qsm-remote 1166/udp # QSM RemoteExec +cisco-ipsla 1167/tcp # Cisco IP SLAs Control Protocol +cisco-ipsla 1167/udp # Cisco IP SLAs Control Protocol +cisco-ipsla 1167/sctp # Cisco IP SLAs Control Protocol +vchat 1168/tcp # VChat Conference Service +vchat 1168/udp # VChat Conference Service +tripwire 1169/tcp # TRIPWIRE +tripwire 1169/udp # TRIPWIRE +atc-lm 1170/tcp # AT+C License Manager +atc-lm 1170/udp # AT+C License Manager +atc-appserver 1171/tcp # AT+C FmiApplicationServer +atc-appserver 1171/udp # AT+C FmiApplicationServer +dnap 1172/tcp # DNA Protocol +dnap 1172/udp # DNA Protocol +d-cinema-rrp 1173/tcp # D-Cinema Request-Response +d-cinema-rrp 1173/udp # D-Cinema Request-Response +fnet-remote-ui 1174/tcp # FlashNet Remote Admin +fnet-remote-ui 1174/udp # FlashNet Remote Admin +dossier 1175/tcp # Dossier Server +dossier 1175/udp # Dossier Server +indigo-server 1176/tcp # Indigo Home Server +indigo-server 1176/udp # Indigo Home Server +dkmessenger 1177/tcp # DKMessenger Protocol +dkmessenger 1177/udp # DKMessenger Protocol +sgi-storman 1178/udp # SGI Storage Manager +b2n 1179/tcp # Backup To Neighbor +b2n 1179/udp # Backup To Neighbor +mc-client 1180/tcp # Millicent Client Proxy +mc-client 1180/udp # Millicent Client Proxy +3comnetman 1181/tcp # 3Com Net Management +3comnetman 1181/udp # 3Com Net Management +accelenet 1182/tcp # AcceleNet Control +accelenet-data 1182/udp # AcceleNet Data +llsurfup-http 1183/tcp # LL Surfup HTTP +llsurfup-http 1183/udp # LL Surfup HTTP +llsurfup-https 1184/tcp # LL Surfup HTTPS +llsurfup-https 1184/udp # LL Surfup HTTPS +catchpole 1185/tcp # Catchpole port +catchpole 1185/udp # Catchpole port +mysql-cluster 1186/tcp # MySQL Cluster Manager +mysql-cluster 1186/udp # MySQL Cluster Manager +alias 1187/tcp # Alias Service +alias 1187/udp # Alias Service +hp-webadmin 1188/tcp # HP Web Admin +hp-webadmin 1188/udp # HP Web Admin +unet 1189/tcp # Unet Connection +unet 1189/udp # Unet Connection +commlinx-avl 1190/tcp # CommLinx GPS / AVL System +commlinx-avl 1190/udp # CommLinx GPS / AVL System +gpfs 1191/tcp # General Parallel File System +gpfs 1191/udp # General Parallel File System +caids-sensor 1192/tcp # caids sensors channel +caids-sensor 1192/udp # caids sensors channel +fiveacross 1193/tcp # Five Across Server +fiveacross 1193/udp # Five Across Server +openvpn 1194/tcp # OpenVPN +openvpn 1194/udp # OpenVPN +rsf-1 1195/tcp # RSF-1 clustering +rsf-1 1195/udp # RSF-1 clustering +netmagic 1196/tcp # Network Magic +netmagic 1196/udp # Network Magic +carrius-rshell 1197/tcp # Carrius Remote Access +carrius-rshell 1197/udp # Carrius Remote Access +cajo-discovery 1198/tcp # cajo reference discovery +cajo-discovery 1198/udp # cajo reference discovery +dmidi 1199/tcp # DMIDI +dmidi 1199/udp # DMIDI +scol 1200/tcp # SCOL +scol 1200/udp # SCOL +nucleus-sand 1201/tcp # Nucleus Sand Database Server +nucleus-sand 1201/udp # Nucleus Sand Database Server +caiccipc 1202/tcp # caiccipc +caiccipc 1202/udp # caiccipc +ssslic-mgr 1203/tcp # License Validation +ssslic-mgr 1203/udp # License Validation +ssslog-mgr 1204/tcp # Log Request Listener +ssslog-mgr 1204/udp # Log Request Listener +accord-mgc 1205/tcp # Accord-MGC +accord-mgc 1205/udp # Accord-MGC +anthony-data 1206/tcp # Anthony Data +anthony-data 1206/udp # Anthony Data +metasage 1207/tcp # MetaSage +metasage 1207/udp # MetaSage +seagull-ais 1208/tcp # SEAGULL AIS +seagull-ais 1208/udp # SEAGULL AIS +ipcd3 1209/tcp # IPCD3 +ipcd3 1209/udp # IPCD3 +eoss 1210/tcp # EOSS +eoss 1210/udp # EOSS +groove-dpp 1211/tcp # Groove DPP +groove-dpp 1211/udp # Groove DPP +lupa 1212/tcp # lupa +lupa 1212/udp # lupa +mpc-lifenet 1213/tcp # MPC LIFENET +mpc-lifenet 1213/udp # MPC LIFENET +kazaa 1214/tcp # KAZAA +kazaa 1214/udp # KAZAA +scanstat-1 1215/tcp # scanSTAT 1.0 +scanstat-1 1215/udp # scanSTAT 1.0 +etebac5 1216/tcp # ETEBAC 5 +etebac5 1216/udp # ETEBAC 5 +hpss-ndapi 1217/tcp # HPSS NonDCE Gateway +hpss-ndapi 1217/udp # HPSS NonDCE Gateway +aeroflight-ads 1218/tcp # AeroFlight-ADs +aeroflight-ads 1218/udp # AeroFlight-ADs +aeroflight-ret 1219/tcp # AeroFlight-Ret +aeroflight-ret 1219/udp # AeroFlight-Ret +qt-serveradmin 1220/tcp # QT SERVER ADMIN +qt-serveradmin 1220/udp # QT SERVER ADMIN +sweetware-apps 1221/tcp # SweetWARE Apps +sweetware-apps 1221/udp # SweetWARE Apps +nerv 1222/tcp # SNI R&D network +nerv 1222/udp # SNI R&D network +tgp 1223/tcp # TrulyGlobal Protocol +tgp 1223/udp # TrulyGlobal Protocol +vpnz 1224/tcp # VPNz +vpnz 1224/udp # VPNz +slinkysearch 1225/tcp # SLINKYSEARCH +slinkysearch 1225/udp # SLINKYSEARCH +stgxfws 1226/tcp # STGXFWS +stgxfws 1226/udp # STGXFWS +dns2go 1227/tcp # DNS2Go +dns2go 1227/udp # DNS2Go +florence 1228/tcp # FLORENCE +florence 1228/udp # FLORENCE +zented 1229/tcp # ZENworks Tiered Electronic Distribution +zented 1229/udp # ZENworks Tiered Electronic Distribution +periscope 1230/tcp # Periscope +periscope 1230/udp # Periscope +menandmice-lpm 1231/tcp # menandmice-lpm +menandmice-lpm 1231/udp # menandmice-lpm +first-defense 1232/tcp # Remote systems monitoring +first-defense 1232/udp # Remote systems monitoring +univ-appserver 1233/tcp # Universal App Server +univ-appserver 1233/udp # Universal App Server +search-agent 1234/tcp # Infoseek Search Agent +search-agent 1234/udp # Infoseek Search Agent +mosaicsyssvc1 1235/tcp # mosaicsyssvc1 +mosaicsyssvc1 1235/udp # mosaicsyssvc1 +tsdos390 1237/tcp # tsdos390 +tsdos390 1237/udp # tsdos390 +hacl-qs 1238/tcp # hacl-qs +hacl-qs 1238/udp # hacl-qs +nmsd 1239/tcp # NMSD +nmsd 1239/udp # NMSD +instantia 1240/tcp # Instantia +instantia 1240/udp # Instantia +nessus 1241/tcp # nessus +nessus 1241/udp # nessus +nmasoverip 1242/tcp # NMAS over IP +nmasoverip 1242/udp # NMAS over IP +serialgateway 1243/tcp # SerialGateway +serialgateway 1243/udp # SerialGateway +isbconference1 1244/tcp # isbconference1 +isbconference1 1244/udp # isbconference1 +isbconference2 1245/tcp # isbconference2 +isbconference2 1245/udp # isbconference2 +payrouter 1246/tcp # payrouter +payrouter 1246/udp # payrouter +visionpyramid 1247/tcp # VisionPyramid +visionpyramid 1247/udp # VisionPyramid +hermes 1248/tcp # hermes +hermes 1248/udp # hermes +mesavistaco 1249/tcp # Mesa Vista Co +mesavistaco 1249/udp # Mesa Vista Co +swldy-sias 1250/tcp # swldy-sias +swldy-sias 1250/udp # swldy-sias +servergraph 1251/tcp # servergraph +servergraph 1251/udp # servergraph +bspne-pcc 1252/tcp # bspne-pcc +bspne-pcc 1252/udp # bspne-pcc +q55-pcc 1253/tcp # q55-pcc +q55-pcc 1253/udp # q55-pcc +de-noc 1254/tcp # de-noc +de-noc 1254/udp # de-noc +de-cache-query 1255/tcp # de-cache-query +de-cache-query 1255/udp # de-cache-query +de-server 1256/tcp # de-server +de-server 1256/udp # de-server +shockwave2 1257/tcp # Shockwave 2 +shockwave2 1257/udp # Shockwave 2 +opennl 1258/tcp # Open Network Library +opennl 1258/udp # Open Network Library +opennl-voice 1259/tcp # Open Network Library Voice +opennl-voice 1259/udp # Open Network Library Voice +ibm-ssd 1260/tcp # ibm-ssd +ibm-ssd 1260/udp # ibm-ssd +mpshrsv 1261/tcp # mpshrsv +mpshrsv 1261/udp # mpshrsv +qnts-orb 1262/tcp # QNTS-ORB +qnts-orb 1262/udp # QNTS-ORB +dka 1263/tcp # dka +dka 1263/udp # dka +prat 1264/tcp # PRAT +prat 1264/udp # PRAT +dssiapi 1265/tcp # DSSIAPI +dssiapi 1265/udp # DSSIAPI +dellpwrappks 1266/tcp # DELLPWRAPPKS +dellpwrappks 1266/udp # DELLPWRAPPKS +epc 1267/tcp # eTrust Policy Compliance +epc 1267/udp # eTrust Policy Compliance +propel-msgsys 1268/tcp # PROPEL-MSGSYS +propel-msgsys 1268/udp # PROPEL-MSGSYS +watilapp 1269/tcp # WATiLaPP +watilapp 1269/udp # WATiLaPP +opsmgr 1270/tcp # Microsoft Operations Manager +opsmgr 1270/udp # Microsoft Operations Manager +excw 1271/tcp # eXcW +excw 1271/udp # eXcW +cspmlockmgr 1272/tcp # CSPMLockMgr +cspmlockmgr 1272/udp # CSPMLockMgr +emc-gateway 1273/tcp # EMC-Gateway +emc-gateway 1273/udp # EMC-Gateway +t1distproc 1274/tcp # t1distproc +t1distproc 1274/udp # t1distproc +ivcollector 1275/tcp # ivcollector +ivcollector 1275/udp # ivcollector +miva-mqs 1277/tcp # mqs +miva-mqs 1277/udp # mqs +dellwebadmin-1 1278/tcp # Dell Web Admin 1 +dellwebadmin-1 1278/udp # Dell Web Admin 1 +dellwebadmin-2 1279/tcp # Dell Web Admin 2 +dellwebadmin-2 1279/udp # Dell Web Admin 2 +pictrography 1280/tcp # Pictrography +pictrography 1280/udp # Pictrography +healthd 1281/tcp # healthd +healthd 1281/udp # healthd +emperion 1282/tcp # Emperion +emperion 1282/udp # Emperion +productinfo 1283/tcp # Product Information +productinfo 1283/udp # Product Information +iee-qfx 1284/tcp # IEE-QFX +iee-qfx 1284/udp # IEE-QFX +neoiface 1285/tcp # neoiface +neoiface 1285/udp # neoiface +netuitive 1286/tcp # netuitive +netuitive 1286/udp # netuitive +routematch 1287/tcp # RouteMatch Com +routematch 1287/udp # RouteMatch Com +navbuddy 1288/tcp # NavBuddy +navbuddy 1288/udp # NavBuddy +jwalkserver 1289/tcp # JWalkServer +jwalkserver 1289/udp # JWalkServer +winjaserver 1290/tcp # WinJaServer +winjaserver 1290/udp # WinJaServer +seagulllms 1291/tcp # SEAGULLLMS +seagulllms 1291/udp # SEAGULLLMS +dsdn 1292/tcp # dsdn +dsdn 1292/udp # dsdn +pkt-krb-ipsec 1293/tcp # PKT-KRB-IPSec +pkt-krb-ipsec 1293/udp # PKT-KRB-IPSec +cmmdriver 1294/tcp # CMMdriver +cmmdriver 1294/udp # CMMdriver +ehtp 1295/tcp # End-by-Hop Transmission Protocol +ehtp 1295/udp # End-by-Hop Transmission Protocol +dproxy 1296/tcp # dproxy +dproxy 1296/udp # dproxy +sdproxy 1297/tcp # sdproxy +sdproxy 1297/udp # sdproxy +lpcp 1298/tcp # lpcp +lpcp 1298/udp # lpcp +hp-sci 1299/tcp # hp-sci +hp-sci 1299/udp # hp-sci +ci3-software-1 1301/tcp # CI3-Software-1 +ci3-software-1 1301/udp # CI3-Software-1 +ci3-software-2 1302/tcp # CI3-Software-2 +ci3-software-2 1302/udp # CI3-Software-2 +sftsrv 1303/tcp # sftsrv +sftsrv 1303/udp # sftsrv +boomerang 1304/tcp # Boomerang +boomerang 1304/udp # Boomerang +pe-mike 1305/tcp # pe-mike +pe-mike 1305/udp # pe-mike +re-conn-proto 1306/tcp # RE-Conn-Proto +re-conn-proto 1306/udp # RE-Conn-Proto +pacmand 1307/tcp # Pacmand +pacmand 1307/udp # Pacmand +odsi 1308/tcp # Optical Domain Service Interconnect (ODSI) +odsi 1308/udp # Optical Domain Service Interconnect (ODSI) +jtag-server 1309/tcp # JTAG server +jtag-server 1309/udp # JTAG server +husky 1310/tcp # Husky +husky 1310/udp # Husky +rxmon 1311/tcp # RxMon +rxmon 1311/udp # RxMon +sti-envision 1312/tcp # STI Envision +sti-envision 1312/udp # STI Envision +bmc_patroldb 1313/udp bmc-patroldb # BMC_PATROLDB +pdps 1314/tcp # Photoscript Distributed Printing System +pdps 1314/udp # Photoscript Distributed Printing System +els 1315/tcp # E.L.S., Event Listener Service +els 1315/udp # E.L.S., Event Listener Service +exbit-escp 1316/tcp # Exbit-ESCP +exbit-escp 1316/udp # Exbit-ESCP +vrts-ipcserver 1317/tcp # vrts-ipcserver +vrts-ipcserver 1317/udp # vrts-ipcserver +krb5gatekeeper 1318/tcp # krb5gatekeeper +krb5gatekeeper 1318/udp # krb5gatekeeper +amx-icsp 1319/tcp # AMX-ICSP +amx-icsp 1319/udp # AMX-ICSP +amx-axbnet 1320/tcp # AMX-AXBNET +amx-axbnet 1320/udp # AMX-AXBNET +novation 1322/tcp # Novation +novation 1322/udp # Novation +brcd 1323/tcp # brcd +brcd 1323/udp # brcd +delta-mcp 1324/tcp # delta-mcp +delta-mcp 1324/udp # delta-mcp +dx-instrument 1325/tcp # DX-Instrument +dx-instrument 1325/udp # DX-Instrument +wimsic 1326/tcp # WIMSIC +wimsic 1326/udp # WIMSIC +ultrex 1327/tcp # Ultrex +ultrex 1327/udp # Ultrex +ewall 1328/tcp # EWALL +ewall 1328/udp # EWALL +netdb-export 1329/tcp # netdb-export +netdb-export 1329/udp # netdb-export +streetperfect 1330/tcp # StreetPerfect +streetperfect 1330/udp # StreetPerfect +intersan 1331/tcp # intersan +intersan 1331/udp # intersan +pcia-rxp-b 1332/tcp # PCIA RXP-B +pcia-rxp-b 1332/udp # PCIA RXP-B +passwrd-policy 1333/tcp # Password Policy +passwrd-policy 1333/udp # Password Policy +writesrv 1334/tcp # writesrv +writesrv 1334/udp # writesrv +digital-notary 1335/tcp # Digital Notary Protocol +digital-notary 1335/udp # Digital Notary Protocol +ischat 1336/tcp # Instant Service Chat +ischat 1336/udp # Instant Service Chat +menandmice-dns 1337/tcp # menandmice DNS +menandmice-dns 1337/udp # menandmice DNS +wmc-log-svc 1338/tcp # WMC-log-svr +wmc-log-svc 1338/udp # WMC-log-svr +kjtsiteserver 1339/tcp # kjtsiteserver +kjtsiteserver 1339/udp # kjtsiteserver +naap 1340/tcp # NAAP +naap 1340/udp # NAAP +qubes 1341/tcp # QuBES +qubes 1341/udp # QuBES +esbroker 1342/tcp # ESBroker +esbroker 1342/udp # ESBroker +re101 1343/tcp # re101 +re101 1343/udp # re101 +icap 1344/tcp # ICAP +icap 1344/udp # ICAP +vpjp 1345/tcp # VPJP +vpjp 1345/udp # VPJP +alta-ana-lm 1346/tcp # Alta Analytics License Manager +alta-ana-lm 1346/udp # Alta Analytics License Manager +bbn-mmc 1347/tcp # multi media conferencing +bbn-mmc 1347/udp # multi media conferencing +bbn-mmx 1348/tcp # multi media conferencing +bbn-mmx 1348/udp # multi media conferencing +sbook 1349/tcp # Registration Network Protocol +sbook 1349/udp # Registration Network Protocol +editbench 1350/tcp # Registration Network Protocol +editbench 1350/udp # Registration Network Protocol +equationbuilder 1351/tcp # Digital Tool Works (MIT) +equationbuilder 1351/udp # Digital Tool Works (MIT) +lotusnote 1352/tcp # Lotus Note +lotusnote 1352/udp # Lotus Note +relief 1353/tcp # Relief Consulting +relief 1353/udp # Relief Consulting +XSIP-network 1354/tcp # Five Across XSIP Network +XSIP-network 1354/udp # Five Across XSIP Network +intuitive-edge 1355/tcp # Intuitive Edge +intuitive-edge 1355/udp # Intuitive Edge +cuillamartin 1356/tcp # CuillaMartin Company +cuillamartin 1356/udp # CuillaMartin Company +pegboard 1357/tcp # Electronic PegBoard +pegboard 1357/udp # Electronic PegBoard +connlcli 1358/tcp # CONNLCLI +connlcli 1358/udp # CONNLCLI +ftsrv 1359/tcp # FTSRV +ftsrv 1359/udp # FTSRV +mimer 1360/tcp # MIMER +mimer 1360/udp # MIMER +linx 1361/tcp # LinX +linx 1361/udp # LinX +timeflies 1362/tcp # TimeFlies +timeflies 1362/udp # TimeFlies +ndm-requester 1363/tcp # Network DataMover Requester +ndm-requester 1363/udp # Network DataMover Requester +ndm-server 1364/tcp # Network DataMover Server +ndm-server 1364/udp # Network DataMover Server +adapt-sna 1365/tcp # Network Software Associates +adapt-sna 1365/udp # Network Software Associates +netware-csp 1366/tcp # Novell NetWare Comm Service Platform +netware-csp 1366/udp # Novell NetWare Comm Service Platform +dcs 1367/tcp # DCS +dcs 1367/udp # DCS +screencast 1368/tcp # ScreenCast +screencast 1368/udp # ScreenCast +gv-us 1369/tcp # GlobalView to Unix Shell +gv-us 1369/udp # GlobalView to Unix Shell +us-gv 1370/tcp # Unix Shell to GlobalView +us-gv 1370/udp # Unix Shell to GlobalView +fc-cli 1371/tcp # Fujitsu Config Protocol +fc-cli 1371/udp # Fujitsu Config Protocol +fc-ser 1372/tcp # Fujitsu Config Protocol +fc-ser 1372/udp # Fujitsu Config Protocol +chromagrafx 1373/tcp # Chromagrafx +chromagrafx 1373/udp # Chromagrafx +molly 1374/tcp # EPI Software Systems +molly 1374/udp # EPI Software Systems +bytex 1375/tcp # Bytex +bytex 1375/udp # Bytex +ibm-pps 1376/tcp # IBM Person to Person Software +ibm-pps 1376/udp # IBM Person to Person Software +cichlid 1377/tcp # Cichlid License Manager +cichlid 1377/udp # Cichlid License Manager +elan 1378/tcp # Elan License Manager +elan 1378/udp # Elan License Manager +dbreporter 1379/tcp # Integrity Solutions +dbreporter 1379/udp # Integrity Solutions +telesis-licman 1380/tcp # Telesis Network License Manager +telesis-licman 1380/udp # Telesis Network License Manager +apple-licman 1381/tcp # Apple Network License Manager +apple-licman 1381/udp # Apple Network License Manager +udt_os 1382/tcp # udt_os +udt_os 1382/udp # udt_os +gwha 1383/tcp # GW Hannaway Network License Manager +gwha 1383/udp # GW Hannaway Network License Manager +os-licman 1384/tcp # Objective Solutions License Manager +os-licman 1384/udp # Objective Solutions License Manager +atex_elmd 1385/tcp atex-elmd # Atex Publishing License Manager +atex_elmd 1385/udp atex-elmd # Atex Publishing License Manager +checksum 1386/tcp # CheckSum License Manager +checksum 1386/udp # CheckSum License Manager +cadsi-lm 1387/tcp # Computer Aided Design Software Inc LM +cadsi-lm 1387/udp # Computer Aided Design Software Inc LM +objective-dbc 1388/tcp # Objective Solutions DataBase Cache +objective-dbc 1388/udp # Objective Solutions DataBase Cache +iclpv-dm 1389/tcp # Document Manager +iclpv-dm 1389/udp # Document Manager +iclpv-sc 1390/tcp # Storage Controller +iclpv-sc 1390/udp # Storage Controller +iclpv-sas 1391/tcp # Storage Access Server +iclpv-sas 1391/udp # Storage Access Server +iclpv-pm 1392/tcp # Print Manager +iclpv-pm 1392/udp # Print Manager +iclpv-nls 1393/tcp # Network Log Server +iclpv-nls 1393/udp # Network Log Server +iclpv-nlc 1394/tcp # Network Log Client +iclpv-nlc 1394/udp # Network Log Client +iclpv-wsm 1395/tcp # PC Workstation Manager software +iclpv-wsm 1395/udp # PC Workstation Manager software +dvl-activemail 1396/tcp # DVL Active Mail +dvl-activemail 1396/udp # DVL Active Mail +audio-activmail 1397/tcp # Audio Active Mail +audio-activmail 1397/udp # Audio Active Mail +video-activmail 1398/tcp # Video Active Mail +video-activmail 1398/udp # Video Active Mail +cadkey-licman 1399/tcp # Cadkey License Manager +cadkey-licman 1399/udp # Cadkey License Manager +cadkey-tablet 1400/tcp # Cadkey Tablet Daemon +cadkey-tablet 1400/udp # Cadkey Tablet Daemon +goldleaf-licman 1401/tcp # Goldleaf License Manager +goldleaf-licman 1401/udp # Goldleaf License Manager +prm-sm-np 1402/tcp # Prospero Resource Manager +prm-sm-np 1402/udp # Prospero Resource Manager +prm-nm-np 1403/tcp # Prospero Resource Manager +prm-nm-np 1403/udp # Prospero Resource Manager +igi-lm 1404/tcp # Infinite Graphics License Manager +igi-lm 1404/udp # Infinite Graphics License Manager +ibm-res 1405/tcp # IBM Remote Execution Starter +ibm-res 1405/udp # IBM Remote Execution Starter +netlabs-lm 1406/tcp # NetLabs License Manager +netlabs-lm 1406/udp # NetLabs License Manager +tibet-server 1407/tcp # TIBET Data Server +sophia-lm 1408/tcp # Sophia License Manager +sophia-lm 1408/udp # Sophia License Manager +here-lm 1409/tcp # Here License Manager +here-lm 1409/udp # Here License Manager +hiq 1410/tcp # HiQ License Manager +hiq 1410/udp # HiQ License Manager +af 1411/tcp # AudioFile +af 1411/udp # AudioFile +innosys 1412/tcp # InnoSys +innosys 1412/udp # InnoSys +innosys-acl 1413/tcp # Innosys-ACL +innosys-acl 1413/udp # Innosys-ACL +ibm-mqseries 1414/tcp # IBM MQSeries +ibm-mqseries 1414/udp # IBM MQSeries +dbstar 1415/tcp # DBStar +dbstar 1415/udp # DBStar +novell-lu6.2 1416/tcp novell-lu6-2 # Novell LU6.2 +novell-lu6.2 1416/udp novell-lu6-2 # Novell LU6.2 +timbuktu-srv1 1417/tcp # Timbuktu Service 1 Port +timbuktu-srv1 1417/udp # Timbuktu Service 1 Port +timbuktu-srv2 1418/tcp # Timbuktu Service 2 Port +timbuktu-srv2 1418/udp # Timbuktu Service 2 Port +timbuktu-srv3 1419/tcp # Timbuktu Service 3 Port +timbuktu-srv3 1419/udp # Timbuktu Service 3 Port +timbuktu-srv4 1420/tcp # Timbuktu Service 4 Port +timbuktu-srv4 1420/udp # Timbuktu Service 4 Port +gandalf-lm 1421/tcp # Gandalf License Manager +gandalf-lm 1421/udp # Gandalf License Manager +autodesk-lm 1422/tcp # Autodesk License Manager +autodesk-lm 1422/udp # Autodesk License Manager +essbase 1423/tcp # Essbase Arbor Software +essbase 1423/udp # Essbase Arbor Software +hybrid 1424/tcp # Hybrid Encryption Protocol +hybrid 1424/udp # Hybrid Encryption Protocol +zion-lm 1425/tcp # Zion Software License Manager +zion-lm 1425/udp # Zion Software License Manager +sais 1426/tcp # Satellite-data Acquisition System 1 +sais 1426/udp # Satellite-data Acquisition System 1 +mloadd 1427/tcp # mloadd monitoring tool +mloadd 1427/udp # mloadd monitoring tool +informatik-lm 1428/tcp # Informatik License Manager +informatik-lm 1428/udp # Informatik License Manager +nms 1429/tcp # Hypercom NMS +nms 1429/udp # Hypercom NMS +tpdu 1430/tcp # Hypercom TPDU +tpdu 1430/udp # Hypercom TPDU +rgtp 1431/tcp # Reverse Gossip Transport +rgtp 1431/udp # Reverse Gossip Transport +blueberry-lm 1432/tcp # Blueberry Software License Manager +blueberry-lm 1432/udp # Blueberry Software License Manager +ibm-cics 1435/tcp # IBM CICS +ibm-cics 1435/udp # IBM CICS +saism 1436/tcp # Satellite-data Acquisition System 2 +saism 1436/udp # Satellite-data Acquisition System 2 +tabula 1437/tcp # Tabula +tabula 1437/udp # Tabula +eicon-server 1438/tcp # Eicon Security Agent/Server +eicon-server 1438/udp # Eicon Security Agent/Server +eicon-x25 1439/tcp # Eicon X25/SNA Gateway +eicon-x25 1439/udp # Eicon X25/SNA Gateway +eicon-slp 1440/tcp # Eicon Service Location Protocol +eicon-slp 1440/udp # Eicon Service Location Protocol +cadis-1 1441/tcp # Cadis License Management +cadis-1 1441/udp # Cadis License Management +cadis-2 1442/tcp # Cadis License Management +cadis-2 1442/udp # Cadis License Management +ies-lm 1443/tcp # Integrated Engineering Software +ies-lm 1443/udp # Integrated Engineering Software +marcam-lm 1444/tcp # Marcam License Management +marcam-lm 1444/udp # Marcam License Management +proxima-lm 1445/tcp # Proxima License Manager +proxima-lm 1445/udp # Proxima License Manager +ora-lm 1446/tcp # Optical Research Associates License Manager +ora-lm 1446/udp # Optical Research Associates License Manager +apri-lm 1447/tcp # Applied Parallel Research LM +apri-lm 1447/udp # Applied Parallel Research LM +oc-lm 1448/tcp # OpenConnect License Manager +oc-lm 1448/udp # OpenConnect License Manager +peport 1449/tcp # PEport +peport 1449/udp # PEport +dwf 1450/tcp # Tandem Distributed Workbench Facility +dwf 1450/udp # Tandem Distributed Workbench Facility +infoman 1451/tcp # IBM Information Management +infoman 1451/udp # IBM Information Management +gtegsc-lm 1452/tcp # GTE Government Systems License Man +gtegsc-lm 1452/udp # GTE Government Systems License Man +genie-lm 1453/tcp # Genie License Manager +genie-lm 1453/udp # Genie License Manager +interhdl_elmd 1454/tcp interhdl-elmd # interHDL License Manager +interhdl_elmd 1454/udp interhdl-elmd # interHDL License Manager +esl-lm 1455/tcp # ESL License Manager +esl-lm 1455/udp # ESL License Manager +dca 1456/tcp # DCA +dca 1456/udp # DCA +valisys-lm 1457/tcp # Valisys License Manager +valisys-lm 1457/udp # Valisys License Manager +nrcabq-lm 1458/tcp # Nichols Research Corp. +nrcabq-lm 1458/udp # Nichols Research Corp. +proshare1 1459/tcp # Proshare Notebook Application +proshare1 1459/udp # Proshare Notebook Application +proshare2 1460/tcp # Proshare Notebook Application +proshare2 1460/udp # Proshare Notebook Application +ibm_wrless_lan 1461/tcp ibm-wrless-lan # IBM Wireless LAN +ibm_wrless_lan 1461/udp ibm-wrless-lan # IBM Wireless LAN +world-lm 1462/tcp # World License Manager +world-lm 1462/udp # World License Manager +nucleus 1463/tcp # Nucleus +nucleus 1463/udp # Nucleus +msl_lmd 1464/tcp msl-lmd # MSL License Manager +msl_lmd 1464/udp msl-lmd # MSL License Manager +pipes 1465/tcp # Pipes Platform +pipes 1465/udp # Pipes Platform +oceansoft-lm 1466/tcp # Ocean Software License Manager +oceansoft-lm 1466/udp # Ocean Software License Manager +aal-lm 1469/tcp # Active Analysis Limited License Manager +aal-lm 1469/udp # Active Analysis Limited License Manager +uaiact 1470/tcp # Universal Analytics +uaiact 1470/udp # Universal Analytics +openmath 1473/tcp # OpenMath +openmath 1473/udp # OpenMath +telefinder 1474/tcp # Telefinder +telefinder 1474/udp # Telefinder +taligent-lm 1475/tcp # Taligent License Manager +taligent-lm 1475/udp # Taligent License Manager +clvm-cfg 1476/tcp # clvm-cfg +clvm-cfg 1476/udp # clvm-cfg +ms-sna-server 1477/tcp # ms-sna-server +ms-sna-server 1477/udp # ms-sna-server +ms-sna-base 1478/tcp # ms-sna-base +ms-sna-base 1478/udp # ms-sna-base +dberegister 1479/tcp # dberegister +dberegister 1479/udp # dberegister +pacerforum 1480/tcp # PacerForum +pacerforum 1480/udp # PacerForum +airs 1481/tcp # AIRS +airs 1481/udp # AIRS +miteksys-lm 1482/tcp # Miteksys License Manager +miteksys-lm 1482/udp # Miteksys License Manager +afs 1483/tcp # AFS License Manager +afs 1483/udp # AFS License Manager +confluent 1484/tcp # Confluent License Manager +confluent 1484/udp # Confluent License Manager +lansource 1485/tcp # LANSource +lansource 1485/udp # LANSource +nms_topo_serv 1486/tcp nms-topo-serv # nms_topo_serv +nms_topo_serv 1486/udp nms-topo-serv # nms_topo_serv +localinfosrvr 1487/tcp # LocalInfoSrvr +localinfosrvr 1487/udp # LocalInfoSrvr +docstor 1488/tcp # DocStor +docstor 1488/udp # DocStor +dmdocbroker 1489/tcp # dmdocbroker +dmdocbroker 1489/udp # dmdocbroker +insitu-conf 1490/tcp # insitu-conf +insitu-conf 1490/udp # insitu-conf +stone-design-1 1492/tcp # stone-design-1 +stone-design-1 1492/udp # stone-design-1 +netmap_lm 1493/tcp netmap-lm # netmap_lm +netmap_lm 1493/udp netmap-lm # netmap_lm +cvc 1495/tcp # cvc +cvc 1495/udp # cvc +liberty-lm 1496/tcp # liberty-lm +liberty-lm 1496/udp # liberty-lm +rfx-lm 1497/tcp # rfx-lm +rfx-lm 1497/udp # rfx-lm +sybase-sqlany 1498/tcp # Sybase SQL Any +sybase-sqlany 1498/udp # Sybase SQL Any +fhc 1499/tcp # Federico Heinz Consultora +fhc 1499/udp # Federico Heinz Consultora +vlsi-lm 1500/tcp # VLSI License Manager +vlsi-lm 1500/udp # VLSI License Manager +saiscm 1501/tcp # Satellite-data Acquisition System 3 +saiscm 1501/udp # Satellite-data Acquisition System 3 +shivadiscovery 1502/tcp # Shiva +shivadiscovery 1502/udp # Shiva +imtc-mcs 1503/tcp # Databeam +imtc-mcs 1503/udp # Databeam +evb-elm 1504/tcp # EVB Software Engineering License Manager +evb-elm 1504/udp # EVB Software Engineering License Manager +funkproxy 1505/tcp # Funk Software, Inc. +funkproxy 1505/udp # Funk Software, Inc. +utcd 1506/tcp # Universal Time daemon (utcd) +utcd 1506/udp # Universal Time daemon (utcd) +symplex 1507/tcp # symplex +symplex 1507/udp # symplex +diagmond 1508/tcp # diagmond +diagmond 1508/udp # diagmond +robcad-lm 1509/tcp # Robcad, Ltd. License Manager +robcad-lm 1509/udp # Robcad, Ltd. License Manager +mvx-lm 1510/tcp # Midland Valley Exploration Ltd. Lic. Man. +mvx-lm 1510/udp # Midland Valley Exploration Ltd. Lic. Man. +3l-l1 1511/tcp # 3l-l1 +3l-l1 1511/udp # 3l-l1 +fujitsu-dtc 1513/tcp # Fujitsu Systems Business of America, Inc +fujitsu-dtc 1513/udp # Fujitsu Systems Business of America, Inc +fujitsu-dtcns 1514/tcp # Fujitsu Systems Business of America, Inc +fujitsu-dtcns 1514/udp # Fujitsu Systems Business of America, Inc +ifor-protocol 1515/tcp # ifor-protocol +ifor-protocol 1515/udp # ifor-protocol +vpad 1516/tcp # Virtual Places Audio data +vpad 1516/udp # Virtual Places Audio data +vpac 1517/tcp # Virtual Places Audio control +vpac 1517/udp # Virtual Places Audio control +vpvd 1518/tcp # Virtual Places Video data +vpvd 1518/udp # Virtual Places Video data +vpvc 1519/tcp # Virtual Places Video control +vpvc 1519/udp # Virtual Places Video control +atm-zip-office 1520/tcp # atm zip office +atm-zip-office 1520/udp # atm zip office +ncube-lm 1521/tcp # nCube License Manager +ncube-lm 1521/udp # nCube License Manager +cichild-lm 1523/tcp # cichild +cichild-lm 1523/udp # cichild +pdap-np 1526/tcp # Prospero Data Access Prot non-priv +pdap-np 1526/udp # Prospero Data Access Prot non-priv +tlisrv 1527/tcp # oracle +tlisrv 1527/udp # oracle +coauthor 1529/udp # oracle +rap-service 1530/tcp # rap-service +rap-service 1530/udp # rap-service +rap-listen 1531/tcp # rap-listen +rap-listen 1531/udp # rap-listen +miroconnect 1532/tcp # miroconnect +miroconnect 1532/udp # miroconnect +virtual-places 1533/tcp # Virtual Places Software +virtual-places 1533/udp # Virtual Places Software +micromuse-lm 1534/tcp # micromuse-lm +micromuse-lm 1534/udp # micromuse-lm +ampr-info 1535/tcp # ampr-info +ampr-info 1535/udp # ampr-info +ampr-inter 1536/tcp # ampr-inter +ampr-inter 1536/udp # ampr-inter +sdsc-lm 1537/tcp # isi-lm +sdsc-lm 1537/udp # isi-lm +3ds-lm 1538/tcp # 3ds-lm +3ds-lm 1538/udp # 3ds-lm +intellistor-lm 1539/tcp # Intellistor License Manager +intellistor-lm 1539/udp # Intellistor License Manager +rds 1540/tcp # rds +rds 1540/udp # rds +rds2 1541/tcp # rds2 +rds2 1541/udp # rds2 +gridgen-elmd 1542/tcp # gridgen-elmd +gridgen-elmd 1542/udp # gridgen-elmd +simba-cs 1543/tcp # simba-cs +simba-cs 1543/udp # simba-cs +aspeclmd 1544/tcp # aspeclmd +aspeclmd 1544/udp # aspeclmd +vistium-share 1545/tcp # vistium-share +vistium-share 1545/udp # vistium-share +abbaccuray 1546/tcp # abbaccuray +abbaccuray 1546/udp # abbaccuray +laplink 1547/tcp # laplink +laplink 1547/udp # laplink +axon-lm 1548/tcp # Axon License Manager +axon-lm 1548/udp # Axon License Manager +shivahose 1549/tcp # Shiva Hose +shivasound 1549/udp # Shiva Sound +3m-image-lm 1550/tcp # Image Storage license manager 3M Company +3m-image-lm 1550/udp # Image Storage license manager 3M Company +hecmtl-db 1551/tcp # HECMTL-DB +hecmtl-db 1551/udp # HECMTL-DB +pciarray 1552/tcp # pciarray +pciarray 1552/udp # pciarray +sna-cs 1553/tcp # sna-cs +sna-cs 1553/udp # sna-cs +caci-lm 1554/tcp # CACI Products Company License Manager +caci-lm 1554/udp # CACI Products Company License Manager +livelan 1555/tcp # livelan +livelan 1555/udp # livelan +veritas_pbx 1556/tcp veritas-pbx # VERITAS Private Branch Exchange +veritas_pbx 1556/udp veritas-pbx # VERITAS Private Branch Exchange +arbortext-lm 1557/tcp # ArborText License Manager +arbortext-lm 1557/udp # ArborText License Manager +xingmpeg 1558/tcp # xingmpeg +xingmpeg 1558/udp # xingmpeg +web2host 1559/tcp # web2host +web2host 1559/udp # web2host +asci-val 1560/tcp # ASCI-RemoteSHADOW +asci-val 1560/udp # ASCI-RemoteSHADOW +facilityview 1561/tcp # facilityview +facilityview 1561/udp # facilityview +pconnectmgr 1562/tcp # pconnectmgr +pconnectmgr 1562/udp # pconnectmgr +cadabra-lm 1563/tcp # Cadabra License Manager +cadabra-lm 1563/udp # Cadabra License Manager +pay-per-view 1564/tcp # Pay-Per-View +pay-per-view 1564/udp # Pay-Per-View +winddlb 1565/tcp # WinDD +winddlb 1565/udp # WinDD +corelvideo 1566/tcp # CORELVIDEO +corelvideo 1566/udp # CORELVIDEO +jlicelmd 1567/tcp # jlicelmd +jlicelmd 1567/udp # jlicelmd +tsspmap 1568/tcp # tsspmap +tsspmap 1568/udp # tsspmap +ets 1569/tcp # ets +ets 1569/udp # ets +orbixd 1570/tcp # orbixd +orbixd 1570/udp # orbixd +rdb-dbs-disp 1571/tcp # Oracle Remote Data Base +rdb-dbs-disp 1571/udp # Oracle Remote Data Base +chip-lm 1572/tcp # Chipcom License Manager +chip-lm 1572/udp # Chipcom License Manager +itscomm-ns 1573/tcp # itscomm-ns +itscomm-ns 1573/udp # itscomm-ns +mvel-lm 1574/tcp # mvel-lm +mvel-lm 1574/udp # mvel-lm +oraclenames 1575/tcp # oraclenames +oraclenames 1575/udp # oraclenames +moldflow-lm 1576/tcp # Moldflow License Manager +moldflow-lm 1576/udp # Moldflow License Manager +hypercube-lm 1577/tcp # hypercube-lm +hypercube-lm 1577/udp # hypercube-lm +jacobus-lm 1578/tcp # Jacobus License Manager +jacobus-lm 1578/udp # Jacobus License Manager +ioc-sea-lm 1579/tcp # ioc-sea-lm +ioc-sea-lm 1579/udp # ioc-sea-lm +tn-tl-r1 1580/tcp # tn-tl-r1 +tn-tl-r2 1580/udp # tn-tl-r2 +mil-2045-47001 1581/tcp # MIL-2045-47001 +mil-2045-47001 1581/udp # MIL-2045-47001 +msims 1582/tcp # MSIMS +msims 1582/udp # MSIMS +simbaexpress 1583/tcp # simbaexpress +simbaexpress 1583/udp # simbaexpress +tn-tl-fd2 1584/tcp # tn-tl-fd2 +tn-tl-fd2 1584/udp # tn-tl-fd2 +intv 1585/tcp # intv +intv 1585/udp # intv +ibm-abtact 1586/tcp # ibm-abtact +ibm-abtact 1586/udp # ibm-abtact +pra_elmd 1587/tcp pra-elmd # pra_elmd +pra_elmd 1587/udp pra-elmd # pra_elmd +triquest-lm 1588/tcp # triquest-lm +triquest-lm 1588/udp # triquest-lm +vqp 1589/tcp # VQP +vqp 1589/udp # VQP +gemini-lm 1590/tcp # gemini-lm +gemini-lm 1590/udp # gemini-lm +ncpm-pm 1591/tcp # ncpm-pm +ncpm-pm 1591/udp # ncpm-pm +commonspace 1592/tcp # commonspace +commonspace 1592/udp # commonspace +mainsoft-lm 1593/tcp # mainsoft-lm +mainsoft-lm 1593/udp # mainsoft-lm +sixtrak 1594/tcp # sixtrak +sixtrak 1594/udp # sixtrak +radio 1595/tcp # radio +radio 1595/udp # radio +radio-sm 1596/tcp # radio-sm +radio-bc 1596/udp # radio-bc +orbplus-iiop 1597/tcp # orbplus-iiop +orbplus-iiop 1597/udp # orbplus-iiop +picknfs 1598/tcp # picknfs +picknfs 1598/udp # picknfs +simbaservices 1599/tcp # simbaservices +simbaservices 1599/udp # simbaservices +issd 1600/tcp # issd +issd 1600/udp # issd +aas 1601/tcp # aas +aas 1601/udp # aas +inspect 1602/tcp # inspect +inspect 1602/udp # inspect +picodbc 1603/tcp # pickodbc +picodbc 1603/udp # pickodbc +icabrowser 1604/tcp # icabrowser +icabrowser 1604/udp # icabrowser +slp 1605/tcp # Salutation Manager (Salutation Protocol) +slp 1605/udp # Salutation Manager (Salutation Protocol) +slm-api 1606/tcp # Salutation Manager (SLM-API) +slm-api 1606/udp # Salutation Manager (SLM-API) +stt 1607/tcp # stt +stt 1607/udp # stt +smart-lm 1608/tcp # Smart Corp. License Manager +smart-lm 1608/udp # Smart Corp. License Manager +isysg-lm 1609/tcp # isysg-lm +isysg-lm 1609/udp # isysg-lm +taurus-wh 1610/tcp # taurus-wh +taurus-wh 1610/udp # taurus-wh +ill 1611/tcp # Inter Library Loan +ill 1611/udp # Inter Library Loan +netbill-trans 1612/tcp # NetBill Transaction Server +netbill-trans 1612/udp # NetBill Transaction Server +netbill-keyrep 1613/tcp # NetBill Key Repository +netbill-keyrep 1613/udp # NetBill Key Repository +netbill-cred 1614/tcp # NetBill Credential Server +netbill-cred 1614/udp # NetBill Credential Server +netbill-auth 1615/tcp # NetBill Authorization Server +netbill-auth 1615/udp # NetBill Authorization Server +netbill-prod 1616/tcp # NetBill Product Server +netbill-prod 1616/udp # NetBill Product Server +nimrod-agent 1617/tcp # Nimrod Inter-Agent Communication +nimrod-agent 1617/udp # Nimrod Inter-Agent Communication +skytelnet 1618/tcp # skytelnet +skytelnet 1618/udp # skytelnet +xs-openstorage 1619/tcp # xs-openstorage +xs-openstorage 1619/udp # xs-openstorage +faxportwinport 1620/tcp # faxportwinport +faxportwinport 1620/udp # faxportwinport +softdataphone 1621/tcp # softdataphone +softdataphone 1621/udp # softdataphone +ontime 1622/tcp # ontime +ontime 1622/udp # ontime +jaleosnd 1623/tcp # jaleosnd +jaleosnd 1623/udp # jaleosnd +udp-sr-port 1624/tcp # udp-sr-port +udp-sr-port 1624/udp # udp-sr-port +svs-omagent 1625/tcp # svs-omagent +svs-omagent 1625/udp # svs-omagent +shockwave 1626/tcp # Shockwave +shockwave 1626/udp # Shockwave +t128-gateway 1627/tcp # T.128 Gateway +t128-gateway 1627/udp # T.128 Gateway +lontalk-norm 1628/tcp # LonTalk normal +lontalk-norm 1628/udp # LonTalk normal +lontalk-urgnt 1629/tcp # LonTalk urgent +lontalk-urgnt 1629/udp # LonTalk urgent +oraclenet8cman 1630/tcp # Oracle Net8 Cman +oraclenet8cman 1630/udp # Oracle Net8 Cman +visitview 1631/tcp # Visit view +visitview 1631/udp # Visit view +pammratc 1632/tcp # PAMMRATC +pammratc 1632/udp # PAMMRATC +pammrpc 1633/tcp # PAMMRPC +pammrpc 1633/udp # PAMMRPC +loaprobe 1634/tcp # Log On America Probe +loaprobe 1634/udp # Log On America Probe +edb-server1 1635/tcp # EDB Server 1 +edb-server1 1635/udp # EDB Server 1 +isdc 1636/tcp # ISP shared public data control +isdc 1636/udp # ISP shared public data control +islc 1637/tcp # ISP shared local data control +islc 1637/udp # ISP shared local data control +ismc 1638/tcp # ISP shared management control +ismc 1638/udp # ISP shared management control +cert-initiator 1639/tcp # cert-initiator +cert-initiator 1639/udp # cert-initiator +cert-responder 1640/tcp # cert-responder +cert-responder 1640/udp # cert-responder +invision 1641/tcp # InVision +invision 1641/udp # InVision +isis-am 1642/tcp # isis-am +isis-am 1642/udp # isis-am +isis-ambc 1643/tcp # isis-ambc +isis-ambc 1643/udp # isis-ambc +saiseh 1644/tcp # Satellite-data Acquisition System 4 +saiseh 1644/udp # Satellite-data Acquisition System 4 +rsap 1647/tcp # rsap +rsap 1647/udp # rsap +concurrent-lm 1648/tcp # concurrent-lm +concurrent-lm 1648/udp # concurrent-lm +nkd 1650/tcp # nkdn +nkd 1650/udp # nkd +shiva_confsrvr 1651/tcp shiva-confsrvr # shiva_confsrvr +shiva_confsrvr 1651/udp shiva-confsrvr # shiva_confsrvr +xnmp 1652/tcp # xnmp +xnmp 1652/udp # xnmp +alphatech-lm 1653/tcp # alphatech-lm +alphatech-lm 1653/udp # alphatech-lm +stargatealerts 1654/tcp # stargatealerts +stargatealerts 1654/udp # stargatealerts +dec-mbadmin 1655/tcp # dec-mbadmin +dec-mbadmin 1655/udp # dec-mbadmin +dec-mbadmin-h 1656/tcp # dec-mbadmin-h +dec-mbadmin-h 1656/udp # dec-mbadmin-h +fujitsu-mmpdc 1657/tcp # fujitsu-mmpdc +fujitsu-mmpdc 1657/udp # fujitsu-mmpdc +sixnetudr 1658/tcp # sixnetudr +sixnetudr 1658/udp # sixnetudr +sg-lm 1659/tcp # Silicon Grail License Manager +sg-lm 1659/udp # Silicon Grail License Manager +skip-mc-gikreq 1660/tcp # skip-mc-gikreq +skip-mc-gikreq 1660/udp # skip-mc-gikreq +netview-aix-1 1661/tcp # netview-aix-1 +netview-aix-1 1661/udp # netview-aix-1 +netview-aix-2 1662/tcp # netview-aix-2 +netview-aix-2 1662/udp # netview-aix-2 +netview-aix-3 1663/tcp # netview-aix-3 +netview-aix-3 1663/udp # netview-aix-3 +netview-aix-4 1664/tcp # netview-aix-4 +netview-aix-4 1664/udp # netview-aix-4 +netview-aix-5 1665/tcp # netview-aix-5 +netview-aix-5 1665/udp # netview-aix-5 +netview-aix-6 1666/tcp # netview-aix-6 +netview-aix-6 1666/udp # netview-aix-6 +netview-aix-7 1667/tcp # netview-aix-7 +netview-aix-7 1667/udp # netview-aix-7 +netview-aix-8 1668/tcp # netview-aix-8 +netview-aix-8 1668/udp # netview-aix-8 +netview-aix-9 1669/tcp # netview-aix-9 +netview-aix-9 1669/udp # netview-aix-9 +netview-aix-10 1670/tcp # netview-aix-10 +netview-aix-10 1670/udp # netview-aix-10 +netview-aix-11 1671/tcp # netview-aix-11 +netview-aix-11 1671/udp # netview-aix-11 +netview-aix-12 1672/tcp # netview-aix-12 +netview-aix-12 1672/udp # netview-aix-12 +proshare-mc-1 1673/tcp # Intel Proshare Multicast +proshare-mc-1 1673/udp # Intel Proshare Multicast +proshare-mc-2 1674/tcp # Intel Proshare Multicast +proshare-mc-2 1674/udp # Intel Proshare Multicast +pdp 1675/tcp # Pacific Data Products +pdp 1675/udp # Pacific Data Products +netcomm1 1676/tcp # netcomm1 +netcomm2 1676/udp # netcomm2 +groupwise 1677/tcp # groupwise +groupwise 1677/udp # groupwise +prolink 1678/tcp # prolink +prolink 1678/udp # prolink +darcorp-lm 1679/tcp # darcorp-lm +darcorp-lm 1679/udp # darcorp-lm +microcom-sbp 1680/tcp # microcom-sbp +microcom-sbp 1680/udp # microcom-sbp +sd-elmd 1681/tcp # sd-elmd +sd-elmd 1681/udp # sd-elmd +lanyon-lantern 1682/tcp # lanyon-lantern +lanyon-lantern 1682/udp # lanyon-lantern +ncpm-hip 1683/tcp # ncpm-hip +ncpm-hip 1683/udp # ncpm-hip +snaresecure 1684/tcp # SnareSecure +snaresecure 1684/udp # SnareSecure +n2nremote 1685/tcp # n2nremote +n2nremote 1685/udp # n2nremote +cvmon 1686/tcp # cvmon +cvmon 1686/udp # cvmon +nsjtp-ctrl 1687/tcp # nsjtp-ctrl +nsjtp-ctrl 1687/udp # nsjtp-ctrl +nsjtp-data 1688/tcp # nsjtp-data +nsjtp-data 1688/udp # nsjtp-data +firefox 1689/tcp # firefox +firefox 1689/udp # firefox +ng-umds 1690/tcp # ng-umds +ng-umds 1690/udp # ng-umds +empire-empuma 1691/tcp # empire-empuma +empire-empuma 1691/udp # empire-empuma +sstsys-lm 1692/tcp # sstsys-lm +sstsys-lm 1692/udp # sstsys-lm +rrirtr 1693/tcp # rrirtr +rrirtr 1693/udp # rrirtr +rrimwm 1694/tcp # rrimwm +rrimwm 1694/udp # rrimwm +rrilwm 1695/tcp # rrilwm +rrilwm 1695/udp # rrilwm +rrifmm 1696/tcp # rrifmm +rrifmm 1696/udp # rrifmm +rrisat 1697/tcp # rrisat +rrisat 1697/udp # rrisat +rsvp-encap-1 1698/tcp # RSVP-ENCAPSULATION-1 +rsvp-encap-1 1698/udp # RSVP-ENCAPSULATION-1 +rsvp-encap-2 1699/tcp # RSVP-ENCAPSULATION-2 +rsvp-encap-2 1699/udp # RSVP-ENCAPSULATION-2 +mps-raft 1700/tcp # mps-raft +mps-raft 1700/udp # mps-raft +deskshare 1702/tcp # deskshare +deskshare 1702/udp # deskshare +hb-engine 1703/tcp # hb-engine +hb-engine 1703/udp # hb-engine +bcs-broker 1704/tcp # bcs-broker +bcs-broker 1704/udp # bcs-broker +slingshot 1705/tcp # slingshot +slingshot 1705/udp # slingshot +jetform 1706/tcp # jetform +jetform 1706/udp # jetform +vdmplay 1707/tcp # vdmplay +vdmplay 1707/udp # vdmplay +gat-lmd 1708/tcp # gat-lmd +gat-lmd 1708/udp # gat-lmd +centra 1709/tcp # centra +centra 1709/udp # centra +impera 1710/tcp # impera +impera 1710/udp # impera +pptconference 1711/tcp # pptconference +pptconference 1711/udp # pptconference +registrar 1712/tcp # resource monitoring service +registrar 1712/udp # resource monitoring service +conferencetalk 1713/tcp # ConferenceTalk +conferencetalk 1713/udp # ConferenceTalk +sesi-lm 1714/tcp # sesi-lm +sesi-lm 1714/udp # sesi-lm +houdini-lm 1715/tcp # houdini-lm +houdini-lm 1715/udp # houdini-lm +xmsg 1716/tcp # xmsg +xmsg 1716/udp # xmsg +fj-hdnet 1717/tcp # fj-hdnet +fj-hdnet 1717/udp # fj-hdnet +caicci 1721/tcp # caicci +caicci 1721/udp # caicci +hks-lm 1722/tcp # HKS License Manager +hks-lm 1722/udp # HKS License Manager +pptp 1723/tcp # pptp +pptp 1723/udp # pptp +csbphonemaster 1724/tcp # csbphonemaster +csbphonemaster 1724/udp # csbphonemaster +iden-ralp 1725/tcp # iden-ralp +iden-ralp 1725/udp # iden-ralp +iberiagames 1726/tcp # IBERIAGAMES +iberiagames 1726/udp # IBERIAGAMES +winddx 1727/tcp # winddx +winddx 1727/udp # winddx +telindus 1728/tcp # TELINDUS +telindus 1728/udp # TELINDUS +citynl 1729/tcp # CityNL License Management +citynl 1729/udp # CityNL License Management +roketz 1730/tcp # roketz +roketz 1730/udp # roketz +msiccp 1731/tcp # MSICCP +msiccp 1731/udp # MSICCP +proxim 1732/tcp # proxim +proxim 1732/udp # proxim +siipat 1733/tcp # SIMS - SIIPAT Protocol for Alarm Transmission +siipat 1733/udp # SIMS - SIIPAT Protocol for Alarm Transmission +cambertx-lm 1734/tcp # Camber Corporation License Management +cambertx-lm 1734/udp # Camber Corporation License Management +privatechat 1735/tcp # PrivateChat +privatechat 1735/udp # PrivateChat +street-stream 1736/tcp # street-stream +street-stream 1736/udp # street-stream +ultimad 1737/tcp # ultimad +ultimad 1737/udp # ultimad +gamegen1 1738/tcp # GameGen1 +gamegen1 1738/udp # GameGen1 +webaccess 1739/tcp # webaccess +webaccess 1739/udp # webaccess +encore 1740/tcp # encore +encore 1740/udp # encore +cisco-net-mgmt 1741/tcp # cisco-net-mgmt +cisco-net-mgmt 1741/udp # cisco-net-mgmt +3Com-nsd 1742/tcp # 3Com-nsd +3Com-nsd 1742/udp # 3Com-nsd +cinegrfx-lm 1743/tcp # Cinema Graphics License Manager +cinegrfx-lm 1743/udp # Cinema Graphics License Manager +ncpm-ft 1744/tcp # ncpm-ft +ncpm-ft 1744/udp # ncpm-ft +remote-winsock 1745/tcp # remote-winsock +remote-winsock 1745/udp # remote-winsock +ftrapid-1 1746/tcp # ftrapid-1 +ftrapid-1 1746/udp # ftrapid-1 +ftrapid-2 1747/tcp # ftrapid-2 +ftrapid-2 1747/udp # ftrapid-2 +oracle-em1 1748/tcp # oracle-em1 +oracle-em1 1748/udp # oracle-em1 +aspen-services 1749/tcp # aspen-services +aspen-services 1749/udp # aspen-services +sslp 1750/tcp # Simple Socket Library's PortMaster +sslp 1750/udp # Simple Socket Library's PortMaster +swiftnet 1751/tcp # SwiftNet +swiftnet 1751/udp # SwiftNet +lofr-lm 1752/tcp # Leap of Faith Research License Manager +lofr-lm 1752/udp # Leap of Faith Research License Manager +predatar-comms 1753/tcp # Predatar Comms Service +oracle-em2 1754/tcp # oracle-em2 +oracle-em2 1754/udp # oracle-em2 +ms-streaming 1755/tcp # ms-streaming +ms-streaming 1755/udp # ms-streaming +capfast-lmd 1756/tcp # capfast-lmd +capfast-lmd 1756/udp # capfast-lmd +cnhrp 1757/tcp # cnhrp +cnhrp 1757/udp # cnhrp +spss-lm 1759/tcp # SPSS License Manager +www-ldap-gw 1760/tcp # www-ldap-gw +www-ldap-gw 1760/udp # www-ldap-gw +cft-0 1761/tcp # cft-0 +cft-0 1761/udp # cft-0 +cft-1 1762/tcp # cft-1 +cft-1 1762/udp # cft-1 +cft-2 1763/tcp # cft-2 +cft-2 1763/udp # cft-2 +cft-3 1764/tcp # cft-3 +cft-3 1764/udp # cft-3 +cft-4 1765/tcp # cft-4 +cft-4 1765/udp # cft-4 +cft-5 1766/tcp # cft-5 +cft-5 1766/udp # cft-5 +cft-6 1767/tcp # cft-6 +cft-6 1767/udp # cft-6 +cft-7 1768/tcp # cft-7 +cft-7 1768/udp # cft-7 +bmc-net-adm 1769/tcp # bmc-net-adm +bmc-net-adm 1769/udp # bmc-net-adm +bmc-net-svc 1770/tcp # bmc-net-svc +bmc-net-svc 1770/udp # bmc-net-svc +vaultbase 1771/tcp # vaultbase +vaultbase 1771/udp # vaultbase +essweb-gw 1772/tcp # EssWeb Gateway +essweb-gw 1772/udp # EssWeb Gateway +kmscontrol 1773/tcp # KMSControl +kmscontrol 1773/udp # KMSControl +global-dtserv 1774/tcp # global-dtserv +global-dtserv 1774/udp # global-dtserv +femis 1776/tcp # Federal Emergency Management Information System +femis 1776/udp # Federal Emergency Management Information System +powerguardian 1777/tcp # powerguardian +powerguardian 1777/udp # powerguardian +prodigy-intrnet 1778/tcp # prodigy-internet +prodigy-intrnet 1778/udp # prodigy-internet +pharmasoft 1779/tcp # pharmasoft +pharmasoft 1779/udp # pharmasoft +dpkeyserv 1780/tcp # dpkeyserv +dpkeyserv 1780/udp # dpkeyserv +answersoft-lm 1781/tcp # answersoft-lm +answersoft-lm 1781/udp # answersoft-lm +hp-hcip 1782/tcp # hp-hcip +hp-hcip 1782/udp # hp-hcip +finle-lm 1784/tcp # Finle License Manager +finle-lm 1784/udp # Finle License Manager +windlm 1785/tcp # Wind River Systems License Manager +windlm 1785/udp # Wind River Systems License Manager +funk-logger 1786/tcp # funk-logger +funk-logger 1786/udp # funk-logger +funk-license 1787/tcp # funk-license +funk-license 1787/udp # funk-license +psmond 1788/tcp # psmond +psmond 1788/udp # psmond +ea1 1791/tcp # EA1 +ea1 1791/udp # EA1 +ibm-dt-2 1792/tcp # ibm-dt-2 +ibm-dt-2 1792/udp # ibm-dt-2 +rsc-robot 1793/tcp # rsc-robot +rsc-robot 1793/udp # rsc-robot +cera-bcm 1794/tcp # cera-bcm +cera-bcm 1794/udp # cera-bcm +dpi-proxy 1795/tcp # dpi-proxy +dpi-proxy 1795/udp # dpi-proxy +vocaltec-admin 1796/tcp # Vocaltec Server Administration +vocaltec-admin 1796/udp # Vocaltec Server Administration +etp 1798/tcp # Event Transfer Protocol +etp 1798/udp # Event Transfer Protocol +netrisk 1799/tcp # NETRISK +netrisk 1799/udp # NETRISK +ansys-lm 1800/tcp # ANSYS-License manager +ansys-lm 1800/udp # ANSYS-License manager +msmq 1801/tcp # Microsoft Message Que +msmq 1801/udp # Microsoft Message Que +concomp1 1802/tcp # ConComp1 +concomp1 1802/udp # ConComp1 +hp-hcip-gwy 1803/tcp # HP-HCIP-GWY +hp-hcip-gwy 1803/udp # HP-HCIP-GWY +enl 1804/tcp # ENL +enl 1804/udp # ENL +enl-name 1805/tcp # ENL-Name +enl-name 1805/udp # ENL-Name +musiconline 1806/tcp # Musiconline +musiconline 1806/udp # Musiconline +fhsp 1807/tcp # Fujitsu Hot Standby Protocol +fhsp 1807/udp # Fujitsu Hot Standby Protocol +oracle-vp2 1808/tcp # Oracle-VP2 +oracle-vp2 1808/udp # Oracle-VP2 +oracle-vp1 1809/tcp # Oracle-VP1 +oracle-vp1 1809/udp # Oracle-VP1 +jerand-lm 1810/tcp # Jerand License Manager +jerand-lm 1810/udp # Jerand License Manager +scientia-sdb 1811/tcp # Scientia-SDB +scientia-sdb 1811/udp # Scientia-SDB +tdp-suite 1814/tcp # TDP Suite +tdp-suite 1814/udp # TDP Suite +mmpft 1815/tcp # MMPFT +mmpft 1815/udp # MMPFT +harp 1816/tcp # HARP +harp 1816/udp # HARP +rkb-oscs 1817/tcp # RKB-OSCS +rkb-oscs 1817/udp # RKB-OSCS +etftp 1818/tcp # Enhanced Trivial File Transfer Protocol +etftp 1818/udp # Enhanced Trivial File Transfer Protocol +plato-lm 1819/tcp # Plato License Manager +plato-lm 1819/udp # Plato License Manager +mcagent 1820/tcp # mcagent +mcagent 1820/udp # mcagent +donnyworld 1821/tcp # donnyworld +donnyworld 1821/udp # donnyworld +es-elmd 1822/tcp # es-elmd +es-elmd 1822/udp # es-elmd +unisys-lm 1823/tcp # Unisys Natural Language License Manager +unisys-lm 1823/udp # Unisys Natural Language License Manager +metrics-pas 1824/tcp # metrics-pas +metrics-pas 1824/udp # metrics-pas +direcpc-video 1825/tcp # DirecPC Video +direcpc-video 1825/udp # DirecPC Video +ardt 1826/tcp # ARDT +ardt 1826/udp # ARDT +asi 1827/tcp # ASI +asi 1827/udp # ASI +itm-mcell-u 1828/tcp # itm-mcell-u +itm-mcell-u 1828/udp # itm-mcell-u +optika-emedia 1829/tcp # Optika eMedia +optika-emedia 1829/udp # Optika eMedia +net8-cman 1830/tcp # Oracle Net8 CMan Admin +net8-cman 1830/udp # Oracle Net8 CMan Admin +myrtle 1831/tcp # Myrtle +myrtle 1831/udp # Myrtle +tht-treasure 1832/tcp # ThoughtTreasure +tht-treasure 1832/udp # ThoughtTreasure +udpradio 1833/tcp # udpradio +udpradio 1833/udp # udpradio +ardusuni 1834/tcp # ARDUS Unicast +ardusuni 1834/udp # ARDUS Unicast +ardusmul 1835/tcp # ARDUS Multicast +ardusmul 1835/udp # ARDUS Multicast +ste-smsc 1836/tcp # ste-smsc +ste-smsc 1836/udp # ste-smsc +csoft1 1837/tcp # csoft1 +csoft1 1837/udp # csoft1 +talnet 1838/tcp # TALNET +talnet 1838/udp # TALNET +netopia-vo1 1839/tcp # netopia-vo1 +netopia-vo1 1839/udp # netopia-vo1 +netopia-vo2 1840/tcp # netopia-vo2 +netopia-vo2 1840/udp # netopia-vo2 +netopia-vo3 1841/tcp # netopia-vo3 +netopia-vo3 1841/udp # netopia-vo3 +netopia-vo4 1842/tcp # netopia-vo4 +netopia-vo4 1842/udp # netopia-vo4 +netopia-vo5 1843/tcp # netopia-vo5 +netopia-vo5 1843/udp # netopia-vo5 +direcpc-dll 1844/tcp # DirecPC-DLL +direcpc-dll 1844/udp # DirecPC-DLL +altalink 1845/tcp # altalink +altalink 1845/udp # altalink +tunstall-pnc 1846/tcp # Tunstall PNC +tunstall-pnc 1846/udp # Tunstall PNC +slp-notify 1847/tcp # SLP Notification +slp-notify 1847/udp # SLP Notification +fjdocdist 1848/tcp # fjdocdist +fjdocdist 1848/udp # fjdocdist +alpha-sms 1849/tcp # ALPHA-SMS +alpha-sms 1849/udp # ALPHA-SMS +gsi 1850/tcp # GSI +gsi 1850/udp # GSI +ctcd 1851/tcp # ctcd +ctcd 1851/udp # ctcd +virtual-time 1852/tcp # Virtual Time +virtual-time 1852/udp # Virtual Time +vids-avtp 1853/tcp # VIDS-AVTP +vids-avtp 1853/udp # VIDS-AVTP +buddy-draw 1854/tcp # Buddy Draw +buddy-draw 1854/udp # Buddy Draw +fiorano-rtrsvc 1855/tcp # Fiorano RtrSvc +fiorano-rtrsvc 1855/udp # Fiorano RtrSvc +fiorano-msgsvc 1856/tcp # Fiorano MsgSvc +fiorano-msgsvc 1856/udp # Fiorano MsgSvc +datacaptor 1857/tcp # DataCaptor +datacaptor 1857/udp # DataCaptor +privateark 1858/tcp # PrivateArk +privateark 1858/udp # PrivateArk +gammafetchsvr 1859/tcp # Gamma Fetcher Server +gammafetchsvr 1859/udp # Gamma Fetcher Server +sunscalar-svc 1860/tcp # SunSCALAR Services +sunscalar-svc 1860/udp # SunSCALAR Services +lecroy-vicp 1861/tcp # LeCroy VICP +lecroy-vicp 1861/udp # LeCroy VICP +mysql-cm-agent 1862/tcp # MySQL Cluster Manager Agent +mysql-cm-agent 1862/udp # MySQL Cluster Manager Agent +msnp 1863/tcp # MSNP +msnp 1863/udp # MSNP +paradym-31port 1864/tcp # Paradym 31 Port +paradym-31port 1864/udp # Paradym 31 Port +entp 1865/tcp # ENTP +entp 1865/udp # ENTP +swrmi 1866/tcp # swrmi +swrmi 1866/udp # swrmi +udrive 1867/tcp # UDRIVE +udrive 1867/udp # UDRIVE +viziblebrowser 1868/tcp # VizibleBrowser +viziblebrowser 1868/udp # VizibleBrowser +transact 1869/tcp # TransAct +transact 1869/udp # TransAct +sunscalar-dns 1870/tcp # SunSCALAR DNS Service +sunscalar-dns 1870/udp # SunSCALAR DNS Service +canocentral0 1871/tcp # Cano Central 0 +canocentral0 1871/udp # Cano Central 0 +canocentral1 1872/tcp # Cano Central 1 +canocentral1 1872/udp # Cano Central 1 +fjmpjps 1873/tcp # Fjmpjps +fjmpjps 1873/udp # Fjmpjps +fjswapsnp 1874/tcp # Fjswapsnp +fjswapsnp 1874/udp # Fjswapsnp +westell-stats 1875/tcp # westell stats +westell-stats 1875/udp # westell stats +ewcappsrv 1876/tcp # ewcappsrv +ewcappsrv 1876/udp # ewcappsrv +hp-webqosdb 1877/tcp # hp-webqosdb +hp-webqosdb 1877/udp # hp-webqosdb +drmsmc 1878/tcp # drmsmc +drmsmc 1878/udp # drmsmc +nettgain-nms 1879/tcp # NettGain NMS +nettgain-nms 1879/udp # NettGain NMS +vsat-control 1880/tcp # Gilat VSAT Control +vsat-control 1880/udp # Gilat VSAT Control +ibm-mqseries2 1881/tcp # IBM WebSphere MQ Everyplace +ibm-mqseries2 1881/udp # IBM WebSphere MQ Everyplace +ecsqdmn 1882/tcp # CA eTrust Common Services +ecsqdmn 1882/udp # CA eTrust Common Services +mqtt 1883/tcp # Message Queuing Telemetry +mqtt 1883/udp # Message Queuing Telemetry +idmaps 1884/tcp # Internet Distance Map Svc +idmaps 1884/udp # Internet Distance Map Svc +vrtstrapserver 1885/tcp # Veritas Trap Server +vrtstrapserver 1885/udp # Veritas Trap Server +leoip 1886/tcp # Leonardo over IP +leoip 1886/udp # Leonardo over IP +filex-lport 1887/tcp # FileX Listening Port +filex-lport 1887/udp # FileX Listening Port +ncconfig 1888/tcp # NC Config Port +ncconfig 1888/udp # NC Config Port +unify-adapter 1889/tcp # Unify Web Adapter Service +unify-adapter 1889/udp # Unify Web Adapter Service +wilkenlistener 1890/tcp # wilkenListener +wilkenlistener 1890/udp # wilkenListener +childkey-notif 1891/tcp # ChildKey Notification +childkey-notif 1891/udp # ChildKey Notification +childkey-ctrl 1892/tcp # ChildKey Control +childkey-ctrl 1892/udp # ChildKey Control +elad 1893/tcp # ELAD Protocol +elad 1893/udp # ELAD Protocol +o2server-port 1894/tcp # O2Server Port +o2server-port 1894/udp # O2Server Port +b-novative-ls 1896/tcp # b-novative license server +b-novative-ls 1896/udp # b-novative license server +metaagent 1897/tcp # MetaAgent +metaagent 1897/udp # MetaAgent +cymtec-port 1898/tcp # Cymtec secure management +cymtec-port 1898/udp # Cymtec secure management +mc2studios 1899/tcp # MC2Studios +mc2studios 1899/udp # MC2Studios +ssdp 1900/tcp # SSDP +ssdp 1900/udp # SSDP +fjicl-tep-a 1901/tcp # Fujitsu ICL Terminal Emulator Program A +fjicl-tep-a 1901/udp # Fujitsu ICL Terminal Emulator Program A +fjicl-tep-b 1902/tcp # Fujitsu ICL Terminal Emulator Program B +fjicl-tep-b 1902/udp # Fujitsu ICL Terminal Emulator Program B +linkname 1903/tcp # Local Link Name Resolution +linkname 1903/udp # Local Link Name Resolution +fjicl-tep-c 1904/tcp # Fujitsu ICL Terminal Emulator Program C +fjicl-tep-c 1904/udp # Fujitsu ICL Terminal Emulator Program C +sugp 1905/tcp # Secure UP.Link Gateway Protocol +sugp 1905/udp # Secure UP.Link Gateway Protocol +tpmd 1906/tcp # TPortMapperReq +tpmd 1906/udp # TPortMapperReq +intrastar 1907/tcp # IntraSTAR +intrastar 1907/udp # IntraSTAR +dawn 1908/tcp # Dawn +dawn 1908/udp # Dawn +global-wlink 1909/tcp # Global World Link +global-wlink 1909/udp # Global World Link +ultrabac 1910/tcp # UltraBac Software communications port +ultrabac 1910/udp # UltraBac Software communications port +rhp-iibp 1912/tcp # rhp-iibp +rhp-iibp 1912/udp # rhp-iibp +armadp 1913/tcp # armadp +armadp 1913/udp # armadp +elm-momentum 1914/tcp # Elm-Momentum +elm-momentum 1914/udp # Elm-Momentum +facelink 1915/tcp # FACELINK +facelink 1915/udp # FACELINK +persona 1916/tcp # Persoft Persona +persona 1916/udp # Persoft Persona +noagent 1917/tcp # nOAgent +noagent 1917/udp # nOAgent +can-nds 1918/tcp # IBM Tivole Directory Service - NDS +can-nds 1918/udp # IBM Tivole Directory Service - NDS +can-dch 1919/tcp # IBM Tivoli Directory Service - DCH +can-dch 1919/udp # IBM Tivoli Directory Service - DCH +can-ferret 1920/tcp # IBM Tivoli Directory Service - FERRET +can-ferret 1920/udp # IBM Tivoli Directory Service - FERRET +noadmin 1921/tcp # NoAdmin +noadmin 1921/udp # NoAdmin +tapestry 1922/tcp # Tapestry +tapestry 1922/udp # Tapestry +spice 1923/tcp # SPICE +spice 1923/udp # SPICE +xiip 1924/tcp # XIIP +xiip 1924/udp # XIIP +discovery-port 1925/tcp # Surrogate Discovery Port +discovery-port 1925/udp # Surrogate Discovery Port +egs 1926/tcp # Evolution Game Server +egs 1926/udp # Evolution Game Server +videte-cipc 1927/tcp # Videte CIPC Port +videte-cipc 1927/udp # Videte CIPC Port +emsd-port 1928/tcp # Expnd Maui Srvr Dscovr +emsd-port 1928/udp # Expnd Maui Srvr Dscovr +bandwiz-system 1929/tcp # Bandwiz System - Server +bandwiz-system 1929/udp # Bandwiz System - Server +driveappserver 1930/tcp # Drive AppServer +driveappserver 1930/udp # Drive AppServer +amdsched 1931/tcp # AMD SCHED +amdsched 1931/udp # AMD SCHED +ctt-broker 1932/tcp # CTT Broker +ctt-broker 1932/udp # CTT Broker +xmapi 1933/tcp # IBM LM MT Agent +xmapi 1933/udp # IBM LM MT Agent +xaapi 1934/tcp # IBM LM Appl Agent +xaapi 1934/udp # IBM LM Appl Agent +macromedia-fcs 1935/tcp # Macromedia Flash Communications Server MX +macromedia-fcs 1935/udp # Macromedia Flash Communications server MX +jetcmeserver 1936/tcp # JetCmeServer Server Port +jetcmeserver 1936/udp # JetCmeServer Server Port +jwserver 1937/tcp # JetVWay Server Port +jwserver 1937/udp # JetVWay Server Port +jwclient 1938/tcp # JetVWay Client Port +jwclient 1938/udp # JetVWay Client Port +jvserver 1939/tcp # JetVision Server Port +jvserver 1939/udp # JetVision Server Port +jvclient 1940/tcp # JetVision Client Port +jvclient 1940/udp # JetVision Client Port +dic-aida 1941/tcp # DIC-Aida +dic-aida 1941/udp # DIC-Aida +res 1942/tcp # Real Enterprise Service +res 1942/udp # Real Enterprise Service +beeyond-media 1943/tcp # Beeyond Media +beeyond-media 1943/udp # Beeyond Media +close-combat 1944/tcp # close-combat +close-combat 1944/udp # close-combat +dialogic-elmd 1945/tcp # dialogic-elmd +dialogic-elmd 1945/udp # dialogic-elmd +tekpls 1946/tcp # tekpls +tekpls 1946/udp # tekpls +sentinelsrm 1947/tcp # SentinelSRM +sentinelsrm 1947/udp # SentinelSRM +eye2eye 1948/tcp # eye2eye +eye2eye 1948/udp # eye2eye +ismaeasdaqlive 1949/tcp # ISMA Easdaq Live +ismaeasdaqlive 1949/udp # ISMA Easdaq Live +ismaeasdaqtest 1950/tcp # ISMA Easdaq Test +ismaeasdaqtest 1950/udp # ISMA Easdaq Test +bcs-lmserver 1951/tcp # bcs-lmserver +bcs-lmserver 1951/udp # bcs-lmserver +mpnjsc 1952/tcp # mpnjsc +mpnjsc 1952/udp # mpnjsc +rapidbase 1953/tcp # Rapid Base +rapidbase 1953/udp # Rapid Base +abr-api 1954/tcp # ABR-API (diskbridge) +abr-api 1954/udp # ABR-API (diskbridge) +abr-secure 1955/tcp # ABR-Secure Data (diskbridge) +abr-secure 1955/udp # ABR-Secure Data (diskbridge) +vrtl-vmf-ds 1956/tcp # Vertel VMF DS +vrtl-vmf-ds 1956/udp # Vertel VMF DS +unix-status 1957/tcp # unix-status +unix-status 1957/udp # unix-status +dxadmind 1958/tcp # CA Administration Daemon +dxadmind 1958/udp # CA Administration Daemon +simp-all 1959/tcp # SIMP Channel +simp-all 1959/udp # SIMP Channel +nasmanager 1960/tcp # Merit DAC NASmanager +nasmanager 1960/udp # Merit DAC NASmanager +bts-appserver 1961/tcp # BTS APPSERVER +bts-appserver 1961/udp # BTS APPSERVER +biap-mp 1962/tcp # BIAP-MP +biap-mp 1962/udp # BIAP-MP +webmachine 1963/tcp # WebMachine +webmachine 1963/udp # WebMachine +solid-e-engine 1964/tcp # SOLID E ENGINE +solid-e-engine 1964/udp # SOLID E ENGINE +tivoli-npm 1965/tcp # Tivoli NPM +tivoli-npm 1965/udp # Tivoli NPM +slush 1966/tcp # Slush +slush 1966/udp # Slush +sns-quote 1967/tcp # SNS Quote +sns-quote 1967/udp # SNS Quote +lipsinc 1968/tcp # LIPSinc +lipsinc 1968/udp # LIPSinc +lipsinc1 1969/tcp # LIPSinc 1 +lipsinc1 1969/udp # LIPSinc 1 +netop-rc 1970/tcp # NetOp Remote Control +netop-rc 1970/udp # NetOp Remote Control +netop-school 1971/tcp # NetOp School +netop-school 1971/udp # NetOp School +intersys-cache 1972/tcp # Cache +intersys-cache 1972/udp # Cache +dlsrap 1973/tcp # Data Link Switching Remote Access Protocol +dlsrap 1973/udp # Data Link Switching Remote Access Protocol +drp 1974/tcp # DRP +drp 1974/udp # DRP +tcoflashagent 1975/tcp # TCO Flash Agent +tcoflashagent 1975/udp # TCO Flash Agent +tcoregagent 1976/tcp # TCO Reg Agent +tcoregagent 1976/udp # TCO Reg Agent +tcoaddressbook 1977/tcp # TCO Address Book +tcoaddressbook 1977/udp # TCO Address Book +unisql 1978/tcp # UniSQL +unisql 1978/udp # UniSQL +unisql-java 1979/tcp # UniSQL Java +unisql-java 1979/udp # UniSQL Java +pearldoc-xact 1980/tcp # PearlDoc XACT +pearldoc-xact 1980/udp # PearlDoc XACT +p2pq 1981/tcp # p2pQ +p2pq 1981/udp # p2pQ +estamp 1982/tcp # Evidentiary Timestamp +estamp 1982/udp # Evidentiary Timestamp +lhtp 1983/tcp # Loophole Test Protocol +lhtp 1983/udp # Loophole Test Protocol +bb 1984/tcp # BB +bb 1984/udp # BB +tr-rsrb-p1 1987/tcp # cisco RSRB Priority 1 port +tr-rsrb-p1 1987/udp # cisco RSRB Priority 1 port +tr-rsrb-p2 1988/tcp # cisco RSRB Priority 2 port +tr-rsrb-p2 1988/udp # cisco RSRB Priority 2 port +tr-rsrb-p3 1989/tcp # cisco RSRB Priority 3 port +tr-rsrb-p3 1989/udp # cisco RSRB Priority 3 port +#mshnet 1989/tcp # MHSnet system +#mshnet 1989/udp # MHSnet system +stun-p1 1990/tcp # cisco STUN Priority 1 port +stun-p1 1990/udp # cisco STUN Priority 1 port +stun-p2 1991/tcp # cisco STUN Priority 2 port +stun-p2 1991/udp # cisco STUN Priority 2 port +stun-p3 1992/tcp # cisco STUN Priority 3 port +stun-p3 1992/udp # cisco STUN Priority 3 port +#ipsendmsg 1992/tcp # IPsendmsg +#ipsendmsg 1992/udp # IPsendmsg +snmp-tcp-port 1993/tcp # cisco SNMP TCP port +snmp-tcp-port 1993/udp # cisco SNMP TCP port +stun-port 1994/tcp # cisco serial tunnel port +stun-port 1994/udp # cisco serial tunnel port +perf-port 1995/tcp # cisco perf port +perf-port 1995/udp # cisco perf port +tr-rsrb-port 1996/tcp # cisco Remote SRB port +tr-rsrb-port 1996/udp # cisco Remote SRB port +x25-svc-port 1998/tcp # cisco X.25 service (XOT) +x25-svc-port 1998/udp # cisco X.25 service (XOT) +tcp-id-port 1999/tcp # cisco identification port +tcp-id-port 1999/udp # cisco identification port +dc 2001/tcp # +wizard 2001/udp # curry +globe 2002/tcp # +globe 2002/udp # +brutus 2003/udp # Brutus Server +mailbox 2004/tcp # +emce 2004/udp # CCWS mm conf +berknet 2005/tcp csync # csync for cyrus-imapd +oracle 2005/udp csync # csync for cyrus-imapd +invokator 2006/tcp # +dectalk 2007/tcp # +raid-am 2007/udp # +conf 2008/tcp # +terminaldb 2008/udp # +news 2009/tcp # +whosockami 2009/udp # +search 2010/tcp # +pipe_server 2010/udp pipe-server # +raid-cc 2011/tcp # raid +servserv 2011/udp # +ttyinfo 2012/tcp # +raid-ac 2012/udp # +raid-am 2013/tcp # +troff 2014/tcp # +raid-sf 2014/udp # +cypress 2015/tcp # +raid-cs 2015/udp # +bootserver 2016/tcp # +bootserver 2016/udp # +cypress-stat 2017/tcp # +bootclient 2017/udp # +terminaldb 2018/tcp # +rellpack 2018/udp # +whosockami 2019/tcp # +about 2019/udp # +xinupageserver 2020/tcp # +xinupageserver 2020/udp # +servexec 2021/tcp # +xinuexpansion1 2021/udp # +down 2022/tcp # +xinuexpansion2 2022/udp # +xinuexpansion3 2023/tcp # +xinuexpansion3 2023/udp # +xinuexpansion4 2024/tcp # +xinuexpansion4 2024/udp # +ellpack 2025/tcp # +xribs 2025/udp # +scrabble 2026/tcp # +scrabble 2026/udp # +shadowserver 2027/tcp # +shadowserver 2027/udp # +submitserver 2028/tcp # +submitserver 2028/udp # +hsrpv6 2029/tcp # Hot Standby Router Protocol IPv6 +hsrpv6 2029/udp # Hot Standby Router Protocol IPv6 +device2 2030/tcp # +device2 2030/udp # +mobrien-chat 2031/tcp # mobrien-chat +mobrien-chat 2031/udp # mobrien-chat +blackboard 2032/tcp # +blackboard 2032/udp # +glogger 2033/tcp # +glogger 2033/udp # +scoremgr 2034/tcp # +scoremgr 2034/udp # +imsldoc 2035/tcp # +imsldoc 2035/udp # +e-dpnet 2036/tcp # Ethernet WS DP network +e-dpnet 2036/udp # Ethernet WS DP network +applus 2037/tcp # APplus Application Server +applus 2037/udp # APplus Application Server +objectmanager 2038/tcp # +objectmanager 2038/udp # +prizma 2039/tcp # Prizma Monitoring Service +prizma 2039/udp # Prizma Monitoring Service +lam 2040/tcp # +lam 2040/udp # +interbase 2041/tcp # +interbase 2041/udp # +isis 2042/tcp # isis +isis 2042/udp # isis +isis-bcast 2043/tcp # isis-bcast +isis-bcast 2043/udp # isis-bcast +rimsl 2044/tcp # +rimsl 2044/udp # +cdfunc 2045/tcp # +cdfunc 2045/udp # +sdfunc 2046/tcp # +sdfunc 2046/udp # +dls-monitor 2048/tcp # +dls-monitor 2048/udp # +av-emb-config 2050/tcp # Avaya EMB Config Port +av-emb-config 2050/udp # Avaya EMB Config Port +epnsdp 2051/tcp # EPNSDP +epnsdp 2051/udp # EPNSDP +clearvisn 2052/tcp # clearVisn Services Port +clearvisn 2052/udp # clearVisn Services Port +lot105-ds-upd 2053/udp # Lot105 DSuper Updates +weblogin 2054/tcp # Weblogin Port +weblogin 2054/udp # Weblogin Port +iop 2055/tcp # Iliad-Odyssey Protocol +iop 2055/udp # Iliad-Odyssey Protocol +omnisky 2056/tcp # OmniSky Port +omnisky 2056/udp # OmniSky Port +rich-cp 2057/tcp # Rich Content Protocol +rich-cp 2057/udp # Rich Content Protocol +newwavesearch 2058/tcp # NewWaveSearchables RMI +newwavesearch 2058/udp # NewWaveSearchables RMI +bmc-messaging 2059/tcp # BMC Messaging Service +bmc-messaging 2059/udp # BMC Messaging Service +teleniumdaemon 2060/tcp # Telenium Daemon IF +teleniumdaemon 2060/udp # Telenium Daemon IF +netmount 2061/tcp # NetMount +netmount 2061/udp # NetMount +icg-swp 2062/tcp # ICG SWP Port +icg-swp 2062/udp # ICG SWP Port +icg-bridge 2063/tcp # ICG Bridge Port +icg-bridge 2063/udp # ICG Bridge Port +icg-iprelay 2064/tcp # ICG IP Relay Port +icg-iprelay 2064/udp # ICG IP Relay Port +dlsrpn 2065/tcp # Data Link Switch Read Port Number +dlsrpn 2065/udp # Data Link Switch Read Port Number +aura 2066/tcp # AVM USB Remote Architecture +aura 2066/udp # AVM USB Remote Architecture +dlswpn 2067/tcp # Data Link Switch Write Port Number +dlswpn 2067/udp # Data Link Switch Write Port Number +avauthsrvprtcl 2068/tcp # Avocent AuthSrv Protocol +avauthsrvprtcl 2068/udp # Avocent AuthSrv Protocol +event-port 2069/tcp # HTTP Event Port +event-port 2069/udp # HTTP Event Port +ah-esp-encap 2070/tcp # AH and ESP Encapsulated in UDP packet +ah-esp-encap 2070/udp # AH and ESP Encapsulated in UDP packet +acp-port 2071/tcp # Axon Control Protocol +acp-port 2071/udp # Axon Control Protocol +msync 2072/tcp # GlobeCast mSync +msync 2072/udp # GlobeCast mSync +gxs-data-port 2073/tcp # DataReel Database Socket +gxs-data-port 2073/udp # DataReel Database Socket +vrtl-vmf-sa 2074/tcp # Vertel VMF SA +vrtl-vmf-sa 2074/udp # Vertel VMF SA +newlixengine 2075/tcp # Newlix ServerWare Engine +newlixengine 2075/udp # Newlix ServerWare Engine +newlixconfig 2076/tcp # Newlix JSPConfig +newlixconfig 2076/udp # Newlix JSPConfig +tsrmagt 2077/tcp # Old Tivoli Storage Manager +tsrmagt 2077/udp # Old Tivoli Storage Manager +tpcsrvr 2078/tcp # IBM Total Productivity Center Server +tpcsrvr 2078/udp # IBM Total Productivity Center Server +idware-router 2079/tcp # IDWARE Router Port +idware-router 2079/udp # IDWARE Router Port +autodesk-nlm 2080/tcp # Autodesk NLM (FLEXlm) +autodesk-nlm 2080/udp # Autodesk NLM (FLEXlm) +kme-trap-port 2081/tcp # KME PRINTER TRAP PORT +kme-trap-port 2081/udp # KME PRINTER TRAP PORT +infowave 2082/tcp # Infowave Mobility Server +infowave 2082/udp # Infowave Mobility Server +radsec 2083/tcp # Secure Radius Service +radsec 2083/udp # Secure Radius Service +sunclustergeo 2084/tcp # SunCluster Geographic +sunclustergeo 2084/udp # SunCluster Geographic +ada-cip 2085/tcp # ADA Control +ada-cip 2085/udp # ADA Control +gnunet 2086/tcp # GNUnet +gnunet 2086/udp # GNUnet +eli 2087/tcp # ELI - Event Logging Integration +eli 2087/udp # ELI - Event Logging Integration +ip-blf 2088/tcp # IP Busy Lamp Field +ip-blf 2088/udp # IP Busy Lamp Field +sep 2089/tcp # Security Encapsulation Protocol - SEP +sep 2089/udp # Security Encapsulation Protocol - SEP +lrp 2090/tcp # Load Report Protocol +lrp 2090/udp # Load Report Protocol +prp 2091/tcp # PRP +prp 2091/udp # PRP +descent3 2092/tcp # Descent 3 +descent3 2092/udp # Descent 3 +nbx-cc 2093/tcp # NBX CC +nbx-cc 2093/udp # NBX CC +nbx-au 2094/tcp # NBX AU +nbx-au 2094/udp # NBX AU +nbx-ser 2095/tcp # NBX SER +nbx-ser 2095/udp # NBX SER +nbx-dir 2096/tcp # NBX DIR +nbx-dir 2096/udp # NBX DIR +jetformpreview 2097/tcp # Jet Form Preview +jetformpreview 2097/udp # Jet Form Preview +dialog-port 2098/tcp # Dialog Port +dialog-port 2098/udp # Dialog Port +h2250-annex-g 2099/tcp # H.225.0 Annex G +h2250-annex-g 2099/udp # H.225.0 Annex G +amiganetfs 2100/tcp # Amiga Network Filesystem +amiganetfs 2100/udp # Amiga Network Filesystem +rtcm-sc104 2101/tcp # rtcm-sc104 +rtcm-sc104 2101/udp # rtcm-sc104 +minipay 2105/udp # MiniPay +mzap 2106/tcp # MZAP +mzap 2106/udp # MZAP +bintec-admin 2107/tcp # BinTec Admin +bintec-admin 2107/udp # BinTec Admin +comcam 2108/tcp # Comcam +comcam 2108/udp # Comcam +ergolight 2109/tcp # Ergolight +ergolight 2109/udp # Ergolight +umsp 2110/tcp # UMSP +umsp 2110/udp # UMSP +dsatp 2111/tcp # DSATP +dsatp 2111/udp # DSATP +idonix-metanet 2112/tcp # Idonix MetaNet +idonix-metanet 2112/udp # Idonix MetaNet +hsl-storm 2113/tcp # HSL StoRM +hsl-storm 2113/udp # HSL StoRM +newheights 2114/tcp # NEWHEIGHTS +newheights 2114/udp # NEWHEIGHTS +kdm 2115/tcp # Key Distribution Manager +kdm 2115/udp # Key Distribution Manager +ccowcmr 2116/tcp # CCOWCMR +ccowcmr 2116/udp # CCOWCMR +mentaclient 2117/tcp # MENTACLIENT +mentaclient 2117/udp # MENTACLIENT +mentaserver 2118/tcp # MENTASERVER +mentaserver 2118/udp # MENTASERVER +gsigatekeeper 2119/tcp # GSIGATEKEEPER +gsigatekeeper 2119/udp # GSIGATEKEEPER +qencp 2120/tcp # Quick Eagle Networks CP +qencp 2120/udp # Quick Eagle Networks CP +scientia-ssdb 2121/tcp # SCIENTIA-SSDB +scientia-ssdb 2121/udp # SCIENTIA-SSDB +caupc-remote 2122/tcp # CauPC Remote Control +caupc-remote 2122/udp # CauPC Remote Control +gtp-control 2123/tcp # GTP-Control Plane (3GPP) +gtp-control 2123/udp # GTP-Control Plane (3GPP) +elatelink 2124/tcp # ELATELINK +elatelink 2124/udp # ELATELINK +lockstep 2125/tcp # LOCKSTEP +lockstep 2125/udp # LOCKSTEP +pktcable-cops 2126/tcp # PktCable-COPS +pktcable-cops 2126/udp # PktCable-COPS +index-pc-wb 2127/tcp # INDEX-PC-WB +index-pc-wb 2127/udp # INDEX-PC-WB +net-steward 2128/tcp # Net Steward Control +net-steward 2128/udp # Net Steward Control +cs-live 2129/tcp # cs-live.com +cs-live 2129/udp # cs-live.com +xds 2130/tcp # XDS +xds 2130/udp # XDS +avantageb2b 2131/tcp # Avantageb2b +avantageb2b 2131/udp # Avantageb2b +solera-epmap 2132/tcp # SoleraTec End Point Map +solera-epmap 2132/udp # SoleraTec End Point Map +zymed-zpp 2133/tcp # ZYMED-ZPP +zymed-zpp 2133/udp # ZYMED-ZPP +avenue 2134/tcp # AVENUE +avenue 2134/udp # AVENUE +gris 2135/tcp # Grid Resource Information Server +gris 2135/udp # Grid Resource Information Server +appworxsrv 2136/tcp # APPWORXSRV +appworxsrv 2136/udp # APPWORXSRV +connect 2137/tcp # CONNECT +connect 2137/udp # CONNECT +unbind-cluster 2138/tcp # UNBIND-CLUSTER +unbind-cluster 2138/udp # UNBIND-CLUSTER +ias-auth 2139/tcp # IAS-AUTH +ias-auth 2139/udp # IAS-AUTH +ias-reg 2140/tcp # IAS-REG +ias-reg 2140/udp # IAS-REG +ias-admind 2141/tcp # IAS-ADMIND +ias-admind 2141/udp # IAS-ADMIND +tdmoip 2142/tcp # TDM OVER IP +tdmoip 2142/udp # TDM OVER IP +lv-jc 2143/tcp # Live Vault Job Control +lv-jc 2143/udp # Live Vault Job Control +lv-ffx 2144/tcp # Live Vault Fast Object Transfer +lv-ffx 2144/udp # Live Vault Fast Object Transfer +lv-pici 2145/tcp # Live Vault Remote Diagnostic Console Support +lv-pici 2145/udp # Live Vault Remote Diagnostic Console Support +lv-not 2146/tcp # Live Vault Admin Event Notification +lv-not 2146/udp # Live Vault Admin Event Notification +lv-auth 2147/tcp # Live Vault Authentication +lv-auth 2147/udp # Live Vault Authentication +veritas-ucl 2148/tcp # VERITAS UNIVERSAL COMMUNICATION LAYER +veritas-ucl 2148/udp # VERITAS UNIVERSAL COMMUNICATION LAYER +acptsys 2149/tcp # ACPTSYS +acptsys 2149/udp # ACPTSYS +docent 2151/tcp # DOCENT +docent 2151/udp # DOCENT +gtp-user 2152/tcp # GTP-User Plane (3GPP) +gtp-user 2152/udp # GTP-User Plane (3GPP) +ctlptc 2153/tcp # Control Protocol +ctlptc 2153/udp # Control Protocol +stdptc 2154/tcp # Standard Protocol +stdptc 2154/udp # Standard Protocol +brdptc 2155/tcp # Bridge Protocol +brdptc 2155/udp # Bridge Protocol +trp 2156/tcp # Talari Reliable Protocol +trp 2156/udp # Talari Reliable Protocol +xnds 2157/tcp # Xerox Network Document Scan Protocol +xnds 2157/udp # Xerox Network Document Scan Protocol +touchnetplus 2158/tcp # TouchNetPlus Service +touchnetplus 2158/udp # TouchNetPlus Service +gdbremote 2159/tcp # GDB Remote Debug Port +gdbremote 2159/udp # GDB Remote Debug Port +apc-2160 2160/tcp # APC 2160 +apc-2160 2160/udp # APC 2160 +apc-2161 2161/tcp # APC 2161 +apc-2161 2161/udp # APC 2161 +navisphere 2162/tcp # Navisphere +navisphere 2162/udp # Navisphere +navisphere-sec 2163/tcp # Navisphere Secure +navisphere-sec 2163/udp # Navisphere Secure +ddns-v3 2164/tcp # Dynamic DNS Version 3 +ddns-v3 2164/udp # Dynamic DNS Version 3 +x-bone-api 2165/tcp # X-Bone API +x-bone-api 2165/udp # X-Bone API +iwserver 2166/tcp # iwserver +iwserver 2166/udp # iwserver +raw-serial 2167/tcp # Raw Async Serial Link +raw-serial 2167/udp # Raw Async Serial Link +easy-soft-mux 2168/tcp # easy-soft Multiplexer +easy-soft-mux 2168/udp # easy-soft Multiplexer +brain 2169/tcp # Backbone for Academic Information Notification (BRAIN) +brain 2169/udp # Backbone for Academic Information Notification (BRAIN) +eyetv 2170/tcp # EyeTV Server Port +eyetv 2170/udp # EyeTV Server Port +msfw-storage 2171/tcp # MS Firewall Storage +msfw-storage 2171/udp # MS Firewall Storage +msfw-s-storage 2172/tcp # MS Firewall SecureStorage +msfw-s-storage 2172/udp # MS Firewall SecureStorage +msfw-replica 2173/tcp # MS Firewall Replication +msfw-replica 2173/udp # MS Firewall Replication +msfw-array 2174/tcp # MS Firewall Intra Array +msfw-array 2174/udp # MS Firewall Intra Array +airsync 2175/tcp # Microsoft Desktop AirSync Protocol +airsync 2175/udp # Microsoft Desktop AirSync Protocol +rapi 2176/tcp # Microsoft ActiveSync Remote API +rapi 2176/udp # Microsoft ActiveSync Remote API +qwave 2177/tcp # qWAVE Bandwidth Estimate +qwave 2177/udp # qWAVE Bandwidth Estimate +bitspeer 2178/tcp # Peer Services for BITS +bitspeer 2178/udp # Peer Services for BITS +vmrdp 2179/tcp # Microsoft RDP for virtual machines +vmrdp 2179/udp # Microsoft RDP for virtual machines +mc-gt-srv 2180/tcp # Millicent Vendor Gateway Server +mc-gt-srv 2180/udp # Millicent Vendor Gateway Server +eforward 2181/tcp # eforward +eforward 2181/udp # eforward +cgn-stat 2182/tcp # CGN status +cgn-stat 2182/udp # CGN status +cgn-config 2183/tcp # Code Green configuration +cgn-config 2183/udp # Code Green configuration +onbase-dds 2185/tcp # OnBase Distributed Disk Services +onbase-dds 2185/udp # OnBase Distributed Disk Services +gtaua 2186/tcp # Guy-Tek Automated Update Applications +gtaua 2186/udp # Guy-Tek Automated Update Applications +ssmc 2187/tcp # Sepehr System Management Control +ssmd 2187/udp # Sepehr System Management Data +radware-rpm 2188/tcp # Radware Resource Pool Manager +radware-rpm-s 2189/tcp # Secure Radware Resource Pool Manager +tivoconnect 2190/tcp # TiVoConnect Beacon +tivoconnect 2190/udp # TiVoConnect Beacon +tvbus 2191/tcp # TvBus Messaging +tvbus 2191/udp # TvBus Messaging +asdis 2192/tcp # ASDIS software management +asdis 2192/udp # ASDIS software management +drwcs 2193/tcp # Dr.Web Enterprise Management Service +drwcs 2193/udp # Dr.Web Enterprise Management Service +mnp-exchange 2197/tcp # MNP data exchange +mnp-exchange 2197/udp # MNP data exchange +onehome-remote 2198/tcp # OneHome Remote Access +onehome-remote 2198/udp # OneHome Remote Access +onehome-help 2199/tcp # OneHome Service Port +onehome-help 2199/udp # OneHome Service Port +ici 2200/tcp # ICI +ici 2200/udp # ICI +ats 2201/tcp # Advanced Training System Program +ats 2201/udp # Advanced Training System Program +imtc-map 2202/tcp # Int. Multimedia Teleconferencing Cosortium +imtc-map 2202/udp # Int. Multimedia Teleconferencing Cosortium +b2-runtime 2203/tcp # b2 Runtime Protocol +b2-runtime 2203/udp # b2 Runtime Protocol +b2-license 2204/tcp # b2 License Server +b2-license 2204/udp # b2 License Server +jps 2205/tcp # Java Presentation Server +jps 2205/udp # Java Presentation Server +hpocbus 2206/tcp # HP OpenCall bus +hpocbus 2206/udp # HP OpenCall bus +hpssd 2207/tcp # HP Status and Services +hpssd 2207/udp # HP Status and Services +hpiod 2208/tcp # HP I/O Backend +hpiod 2208/udp # HP I/O Backend +rimf-ps 2209/tcp # HP RIM for Files Portal Service +rimf-ps 2209/udp # HP RIM for Files Portal Service +noaaport 2210/tcp # NOAAPORT Broadcast Network +noaaport 2210/udp # NOAAPORT Broadcast Network +emwin 2211/tcp # EMWIN +emwin 2211/udp # EMWIN +leecoposserver 2212/tcp # LeeCO POS Server Service +leecoposserver 2212/udp # LeeCO POS Server Service +kali 2213/tcp # Kali +kali 2213/udp # Kali +rpi 2214/tcp # RDQ Protocol Interface +rpi 2214/udp # RDQ Protocol Interface +ipcore 2215/tcp # IPCore.co.za GPRS +ipcore 2215/udp # IPCore.co.za GPRS +vtu-comms 2216/tcp # VTU data service +vtu-comms 2216/udp # VTU data service +gotodevice 2217/tcp # GoToDevice Device Management +gotodevice 2217/udp # GoToDevice Device Management +bounzza 2218/tcp # Bounzza IRC Proxy +bounzza 2218/udp # Bounzza IRC Proxy +netiq-ncap 2219/tcp # NetIQ NCAP Protocol +netiq-ncap 2219/udp # NetIQ NCAP Protocol +netiq 2220/tcp # NetIQ End2End +netiq 2220/udp # NetIQ End2End +ethernet-ip-s 2221/tcp # EtherNet/IP over TLS +ethernet-ip-s 2221/udp # EtherNet/IP over DTLS +EtherNet/IP-1 2222/tcp EtherNet-IP-1 # EtherNet/IP I/O +EtherNet/IP-1 2222/udp EtherNet-IP-1 # EtherNet/IP I/O +rockwell-csp2 2223/tcp # Rockwell CSP2 +rockwell-csp2 2223/udp # Rockwell CSP2 +efi-mg 2224/tcp # Easy Flexible Internet/Multiplayer Games +efi-mg 2224/udp # Easy Flexible Internet/Multiplayer Games +rcip-itu 2225/tcp # Resource Connection Initiation Protocol +rcip-itu 2225/sctp # Resource Connection Initiation Protocol +di-drm 2226/tcp # Digital Instinct DRM +di-drm 2226/udp # Digital Instinct DRM +di-msg 2227/tcp # DI Messaging Service +di-msg 2227/udp # DI Messaging Service +ehome-ms 2228/tcp # eHome Message Server +ehome-ms 2228/udp # eHome Message Server +datalens 2229/tcp # DataLens Service +datalens 2229/udp # DataLens Service +queueadm 2230/tcp # MetaSoft Job Queue Administration Service +queueadm 2230/udp # MetaSoft Job Queue Administration Service +wimaxasncp 2231/tcp # WiMAX ASN Control Plane Protocol +wimaxasncp 2231/udp # WiMAX ASN Control Plane Protocol +ivs-video 2232/tcp # IVS Video default +ivs-video 2232/udp # IVS Video default +infocrypt 2233/tcp # INFOCRYPT +infocrypt 2233/udp # INFOCRYPT +directplay 2234/tcp # DirectPlay +directplay 2234/udp # DirectPlay +sercomm-wlink 2235/tcp # Sercomm-WLink +sercomm-wlink 2235/udp # Sercomm-WLink +nani 2236/tcp # Nani +nani 2236/udp # Nani +optech-port1-lm 2237/tcp # Optech Port1 License Manager +optech-port1-lm 2237/udp # Optech Port1 License Manager +aviva-sna 2238/tcp # AVIVA SNA SERVER +aviva-sna 2238/udp # AVIVA SNA SERVER +imagequery 2239/tcp # Image Query +imagequery 2239/udp # Image Query +recipe 2240/tcp # RECIPe +recipe 2240/udp # RECIPe +ivsd 2241/tcp # IVS Daemon +ivsd 2241/udp # IVS Daemon +foliocorp 2242/tcp # Folio Remote Server +foliocorp 2242/udp # Folio Remote Server +magicom 2243/tcp # Magicom Protocol +magicom 2243/udp # Magicom Protocol +nmsserver 2244/tcp # NMS Server +nmsserver 2244/udp # NMS Server +hao 2245/tcp # HaO +hao 2245/udp # HaO +pc-mta-addrmap 2246/tcp # PacketCable MTA Addr Map +pc-mta-addrmap 2246/udp # PacketCable MTA Addr Map +antidotemgrsvr 2247/tcp # Antidote Deployment Manager Service +antidotemgrsvr 2247/udp # Antidote Deployment Manager Service +ums 2248/tcp # User Management Service +ums 2248/udp # User Management Service +rfmp 2249/tcp # RISO File Manager Protocol +rfmp 2249/udp # RISO File Manager Protocol +remote-collab 2250/tcp # remote-collab +remote-collab 2250/udp # remote-collab +dif-port 2251/tcp # Distributed Framework Port +dif-port 2251/udp # Distributed Framework Port +njenet-ssl 2252/tcp # NJENET using SSL +njenet-ssl 2252/udp # NJENET using SSL +dtv-chan-req 2253/tcp # DTV Channel Request +dtv-chan-req 2253/udp # DTV Channel Request +seispoc 2254/tcp # Seismic P.O.C. Port +seispoc 2254/udp # Seismic P.O.C. Port +vrtp 2255/tcp # VRTP - ViRtue Transfer Protocol +vrtp 2255/udp # VRTP - ViRtue Transfer Protocol +pcc-mfp 2256/tcp # PCC MFP +pcc-mfp 2256/udp # PCC MFP +simple-tx-rx 2257/tcp # simple text/file transfer +simple-tx-rx 2257/udp # simple text/file transfer +rcts 2258/tcp # Rotorcraft Communications Test System +rcts 2258/udp # Rotorcraft Communications Test System +apc-2260 2260/tcp # APC 2260 +apc-2260 2260/udp # APC 2260 +comotionmaster 2261/tcp # CoMotion Master Server +comotionmaster 2261/udp # CoMotion Master Server +comotionback 2262/tcp # CoMotion Backup Server +comotionback 2262/udp # CoMotion Backup Server +ecwcfg 2263/tcp # ECweb Configuration Service +ecwcfg 2263/udp # ECweb Configuration Service +apx500api-1 2264/tcp # Audio Precision Apx500 API Port 1 +apx500api-1 2264/udp # Audio Precision Apx500 API Port 1 +apx500api-2 2265/tcp # Audio Precision Apx500 API Port 2 +apx500api-2 2265/udp # Audio Precision Apx500 API Port 2 +mfserver 2266/tcp # M-Files Server +mfserver 2266/udp # M-files Server +ontobroker 2267/tcp # OntoBroker +ontobroker 2267/udp # OntoBroker +amt 2268/tcp # AMT +amt 2268/udp # AMT +mikey 2269/tcp # MIKEY +mikey 2269/udp # MIKEY +starschool 2270/tcp # starSchool +starschool 2270/udp # starSchool +mmcals 2271/tcp # Secure Meeting Maker Scheduling +mmcals 2271/udp # Secure Meeting Maker Scheduling +mmcal 2272/tcp # Meeting Maker Scheduling +mmcal 2272/udp # Meeting Maker Scheduling +mysql-im 2273/tcp # MySQL Instance Manager +mysql-im 2273/udp # MySQL Instance Manager +pcttunnell 2274/tcp # PCTTunneller +pcttunnell 2274/udp # PCTTunneller +ibridge-data 2275/tcp # iBridge Conferencing +ibridge-data 2275/udp # iBridge Conferencing +ibridge-mgmt 2276/tcp # iBridge Management +ibridge-mgmt 2276/udp # iBridge Management +bluectrlproxy 2277/tcp # Bt device control proxy +bluectrlproxy 2277/udp # Bt device control proxy +s3db 2278/tcp # Simple Stacked Sequences Database +s3db 2278/udp # Simple Stacked Sequences Database +xmquery 2279/tcp # xmquery +xmquery 2279/udp # xmquery +lnvpoller 2280/tcp # LNVPOLLER +lnvpoller 2280/udp # LNVPOLLER +lnvconsole 2281/tcp # LNVCONSOLE +lnvconsole 2281/udp # LNVCONSOLE +lnvalarm 2282/tcp # LNVALARM +lnvalarm 2282/udp # LNVALARM +lnvstatus 2283/tcp # LNVSTATUS +lnvstatus 2283/udp # LNVSTATUS +lnvmaps 2284/tcp # LNVMAPS +lnvmaps 2284/udp # LNVMAPS +lnvmailmon 2285/tcp # LNVMAILMON +lnvmailmon 2285/udp # LNVMAILMON +nas-metering 2286/tcp # NAS-Metering +nas-metering 2286/udp # NAS-Metering +dna 2287/tcp # DNA +dna 2287/udp # DNA +netml 2288/tcp # NETML +netml 2288/udp # NETML +dict-lookup 2289/tcp # Lookup dict server +dict-lookup 2289/udp # Lookup dict server +sonus-logging 2290/tcp # Sonus Logging Services +sonus-logging 2290/udp # Sonus Logging Services +eapsp 2291/tcp # EPSON Advanced Printer Share Protocol +eapsp 2291/udp # EPSON Advanced Printer Share Protocol +mib-streaming 2292/tcp # Sonus Element Management Services +mib-streaming 2292/udp # Sonus Element Management Services +npdbgmngr 2293/tcp # Network Platform Debug Manager +npdbgmngr 2293/udp # Network Platform Debug Manager +konshus-lm 2294/tcp # Konshus License Manager (FLEX) +konshus-lm 2294/udp # Konshus License Manager (FLEX) +advant-lm 2295/tcp # Advant License Manager +advant-lm 2295/udp # Advant License Manager +theta-lm 2296/tcp # Theta License Manager (Rainbow) +theta-lm 2296/udp # Theta License Manager (Rainbow) +d2k-datamover1 2297/tcp # D2K DataMover 1 +d2k-datamover1 2297/udp # D2K DataMover 1 +d2k-datamover2 2298/tcp # D2K DataMover 2 +d2k-datamover2 2298/udp # D2K DataMover 2 +pc-telecommute 2299/tcp # PC Telecommute +pc-telecommute 2299/udp # PC Telecommute +cvmmon 2300/tcp # CVMMON +cvmmon 2300/udp # CVMMON +cpq-wbem 2301/tcp # Compaq HTTP +cpq-wbem 2301/udp # Compaq HTTP +binderysupport 2302/tcp # Bindery Support +binderysupport 2302/udp # Bindery Support +proxy-gateway 2303/tcp # Proxy Gateway +proxy-gateway 2303/udp # Proxy Gateway +attachmate-uts 2304/tcp # Attachmate UTS +attachmate-uts 2304/udp # Attachmate UTS +mt-scaleserver 2305/tcp # MT ScaleServer +mt-scaleserver 2305/udp # MT ScaleServer +tappi-boxnet 2306/tcp # TAPPI BoxNet +tappi-boxnet 2306/udp # TAPPI BoxNet +pehelp 2307/tcp # pehelp +pehelp 2307/udp # pehelp +sdhelp 2308/tcp # sdhelp +sdhelp 2308/udp # sdhelp +sdserver 2309/tcp # SD Server +sdserver 2309/udp # SD Server +sdclient 2310/tcp # SD Client +sdclient 2310/udp # SD Client +messageservice 2311/tcp # Message Service +messageservice 2311/udp # Message Service +wanscaler 2312/tcp # WANScaler Communication Service +wanscaler 2312/udp # WANScaler Communication Service +iapp 2313/tcp # IAPP (Inter Access Point Protocol) +iapp 2313/udp # IAPP (Inter Access Point Protocol) +cr-websystems 2314/tcp # CR WebSystems +cr-websystems 2314/udp # CR WebSystems +precise-sft 2315/tcp # Precise Sft. +precise-sft 2315/udp # Precise Sft. +sent-lm 2316/tcp # SENT License Manager +sent-lm 2316/udp # SENT License Manager +attachmate-g32 2317/tcp # Attachmate G32 +attachmate-g32 2317/udp # Attachmate G32 +cadencecontrol 2318/tcp # Cadence Control +cadencecontrol 2318/udp # Cadence Control +infolibria 2319/tcp # InfoLibria +infolibria 2319/udp # InfoLibria +siebel-ns 2320/tcp # Siebel NS +siebel-ns 2320/udp # Siebel NS +rdlap 2321/tcp # RDLAP +rdlap 2321/udp # RDLAP +ofsd 2322/tcp # ofsd +ofsd 2322/udp # ofsd +3d-nfsd 2323/tcp # 3d-nfsd +3d-nfsd 2323/udp # 3d-nfsd +cosmocall 2324/tcp # Cosmocall +cosmocall 2324/udp # Cosmocall +ansysli 2325/tcp # ANSYS Licensing Interconnect +ansysli 2325/udp # ANSYS Licensing Interconnect +idcp 2326/tcp # IDCP +idcp 2326/udp # IDCP +xingcsm 2327/tcp # xingcsm +xingcsm 2327/udp # xingcsm +netrix-sftm 2328/tcp # Netrix SFTM +netrix-sftm 2328/udp # Netrix SFTM +tscchat 2330/tcp # TSCCHAT +tscchat 2330/udp # TSCCHAT +agentview 2331/tcp # AGENTVIEW +agentview 2331/udp # AGENTVIEW +rcc-host 2332/tcp # RCC Host +rcc-host 2332/udp # RCC Host +snapp 2333/tcp # SNAPP +snapp 2333/udp # SNAPP +ace-client 2334/tcp # ACE Client Auth +ace-client 2334/udp # ACE Client Auth +ace-proxy 2335/tcp # ACE Proxy +ace-proxy 2335/udp # ACE Proxy +appleugcontrol 2336/tcp # Apple UG Control +appleugcontrol 2336/udp # Apple UG Control +ideesrv 2337/tcp # ideesrv +ideesrv 2337/udp # ideesrv +norton-lambert 2338/tcp # Norton Lambert +norton-lambert 2338/udp # Norton Lambert +3com-webview 2339/tcp # 3Com WebView +3com-webview 2339/udp # 3Com WebView +wrs_registry 2340/tcp wrs-registry # WRS Registry +wrs_registry 2340/udp wrs-registry # WRS Registry +xiostatus 2341/tcp # XIO Status +xiostatus 2341/udp # XIO Status +manage-exec 2342/tcp # Seagate Manage Exec +manage-exec 2342/udp # Seagate Manage Exec +nati-logos 2343/tcp # nati logos +nati-logos 2343/udp # nati logos +fcmsys 2344/tcp # fcmsys +fcmsys 2344/udp # fcmsys +dbm 2345/tcp # dbm +dbm 2345/udp # dbm +redstorm_join 2346/tcp redstorm-join # Game Connection Port +redstorm_join 2346/udp redstorm-join # Game Connection Port +redstorm_find 2347/tcp redstorm-find # Game Announcement and Location +redstorm_find 2347/udp redstorm-find # Game Announcement and Location +redstorm_info 2348/tcp redstorm-info # Information to query for game status +redstorm_info 2348/udp redstorm-info # Information to query for game status +redstorm_diag 2349/tcp redstorm-diag # Diagnostics Port +redstorm_diag 2349/udp redstorm-diag # Diagnostics Port +psbserver 2350/tcp # Pharos Booking Server +psbserver 2350/udp # Pharos Booking Server +psrserver 2351/tcp # psrserver +psrserver 2351/udp # psrserver +pslserver 2352/tcp # pslserver +pslserver 2352/udp # pslserver +pspserver 2353/tcp # pspserver +pspserver 2353/udp # pspserver +psprserver 2354/tcp # psprserver +psprserver 2354/udp # psprserver +psdbserver 2355/tcp # psdbserver +psdbserver 2355/udp # psdbserver +gxtelmd 2356/tcp # GXT License Managemant +gxtelmd 2356/udp # GXT License Managemant +unihub-server 2357/tcp # UniHub Server +unihub-server 2357/udp # UniHub Server +futrix 2358/tcp # Futrix +futrix 2358/udp # Futrix +flukeserver 2359/tcp # FlukeServer +flukeserver 2359/udp # FlukeServer +nexstorindltd 2360/tcp # NexstorIndLtd +nexstorindltd 2360/udp # NexstorIndLtd +tl1 2361/tcp # TL1 +tl1 2361/udp # TL1 +digiman 2362/tcp # digiman +digiman 2362/udp # digiman +mediacntrlnfsd 2363/tcp # Media Central NFSD +mediacntrlnfsd 2363/udp # Media Central NFSD +oi-2000 2364/tcp # OI-2000 +oi-2000 2364/udp # OI-2000 +dbref 2365/tcp # dbref +dbref 2365/udp # dbref +qip-login 2366/tcp # qip-login +qip-login 2366/udp # qip-login +service-ctrl 2367/tcp # Service Control +service-ctrl 2367/udp # Service Control +opentable 2368/tcp # OpenTable +opentable 2368/udp # OpenTable +l3-hbmon 2370/tcp # L3-HBMon +l3-hbmon 2370/udp # L3-HBMon +hp-rda 2371/tcp # HP Remote Device Access +lanmessenger 2372/tcp # LanMessenger +lanmessenger 2372/udp # LanMessenger +remographlm 2373/tcp # Remograph License Manager +docker 2375/tcp # Docker REST API (plain text) +docker-s 2376/tcp # Docker REST API (ssl) +etcd-client 2379/tcp # etcd client communication +etcd-server 2380/tcp # etcd server to server communication +hydra 2374/tcp # Hydra RPC +compaq-https 2381/tcp # Compaq HTTPS +compaq-https 2381/udp # Compaq HTTPS +ms-olap3 2382/tcp # Microsoft OLAP +ms-olap3 2382/udp # Microsoft OLAP +ms-olap4 2383/tcp # Microsoft OLAP +ms-olap4 2383/udp # Microsoft OLAP +sd-request 2384/tcp # SD-REQUEST +sd-capacity 2384/udp # SD-CAPACITY +sd-data 2385/tcp # SD-DATA +sd-data 2385/udp # SD-DATA +virtualtape 2386/tcp # Virtual Tape +virtualtape 2386/udp # Virtual Tape +vsamredirector 2387/tcp # VSAM Redirector +vsamredirector 2387/udp # VSAM Redirector +mynahautostart 2388/tcp # MYNAH AutoStart +mynahautostart 2388/udp # MYNAH AutoStart +ovsessionmgr 2389/tcp # OpenView Session Mgr +ovsessionmgr 2389/udp # OpenView Session Mgr +rsmtp 2390/tcp # RSMTP +rsmtp 2390/udp # RSMTP +3com-net-mgmt 2391/tcp # 3COM Net Management +3com-net-mgmt 2391/udp # 3COM Net Management +tacticalauth 2392/tcp # Tactical Auth +tacticalauth 2392/udp # Tactical Auth +ms-olap1 2393/tcp # MS OLAP 1 +ms-olap1 2393/udp # MS OLAP 1 +ms-olap2 2394/tcp # MS OLAP 2 +ms-olap2 2394/udp # MS OLAP 2 +lan900_remote 2395/tcp lan900-remote # LAN900 Remote +lan900_remote 2395/udp lan900-remote # LAN900 Remote +wusage 2396/tcp # Wusage +wusage 2396/udp # Wusage +ncl 2397/tcp # NCL +ncl 2397/udp # NCL +orbiter 2398/tcp # Orbiter +orbiter 2398/udp # Orbiter +fmpro-fdal 2399/tcp # FileMaker, Inc. - Data Access Layer +fmpro-fdal 2399/udp # FileMaker, Inc. - Data Access Layer +opequus-server 2400/tcp # OpEquus Server +opequus-server 2400/udp # OpEquus Server +taskmaster2000 2402/tcp # TaskMaster 2000 Server +taskmaster2000 2402/udp # TaskMaster 2000 Server +#taskmaster2000 2403/tcp # TaskMaster 2000 Web +#taskmaster2000 2403/udp # TaskMaster 2000 Web +iec-104 2404/tcp # IEC 60870-5-104 process control over IP +iec-104 2404/udp # IEC 60870-5-104 process control over IP +trc-netpoll 2405/tcp # TRC Netpoll +trc-netpoll 2405/udp # TRC Netpoll +jediserver 2406/tcp # JediServer +jediserver 2406/udp # JediServer +orion 2407/tcp # Orion +orion 2407/udp # Orion +railgun-webaccl 2408/tcp # CloudFlare Railgun Web +sns-protocol 2409/tcp # SNS Protocol +sns-protocol 2409/udp # SNS Protocol +vrts-registry 2410/tcp # VRTS Registry +vrts-registry 2410/udp # VRTS Registry +netwave-ap-mgmt 2411/tcp # Netwave AP Management +netwave-ap-mgmt 2411/udp # Netwave AP Management +cdn 2412/tcp # CDN +cdn 2412/udp # CDN +orion-rmi-reg 2413/tcp # orion-rmi-reg +orion-rmi-reg 2413/udp # orion-rmi-reg +beeyond 2414/tcp # Beeyond +beeyond 2414/udp # Beeyond +codima-rtp 2415/tcp # Codima Remote Transaction Protocol +codima-rtp 2415/udp # Codima Remote Transaction Protocol +rmtserver 2416/tcp # RMT Server +rmtserver 2416/udp # RMT Server +composit-server 2417/tcp # Composit Server +composit-server 2417/udp # Composit Server +cas 2418/tcp # cas +cas 2418/udp # cas +attachmate-s2s 2419/tcp # Attachmate S2S +attachmate-s2s 2419/udp # Attachmate S2S +dslremote-mgmt 2420/tcp # DSL Remote Management +dslremote-mgmt 2420/udp # DSL Remote Management +g-talk 2421/tcp # G-Talk +g-talk 2421/udp # G-Talk +crmsbits 2422/tcp # CRMSBITS +crmsbits 2422/udp # CRMSBITS +rnrp 2423/tcp # RNRP +rnrp 2423/udp # RNRP +kofax-svr 2424/tcp # KOFAX-SVR +kofax-svr 2424/udp # KOFAX-SVR +fjitsuappmgr 2425/tcp # Fujitsu App Manager +fjitsuappmgr 2425/udp # Fujitsu App Manager +vcmp 2426/tcp # VeloCloud MultiPath Protocol +vcmp 2426/udp # VeloCloud MultiPath Protocol +mgcp-gateway 2427/tcp # Media Gateway Control Protocol Gateway +mgcp-gateway 2427/udp # Media Gateway Control Protocol Gateway +ott 2428/tcp # One Way Trip Time +ott 2428/udp # One Way Trip Time +ft-role 2429/tcp # FT-ROLE +ft-role 2429/udp # FT-ROLE +pxc-epmap 2434/tcp # pxc-epmap +pxc-epmap 2434/udp # pxc-epmap +optilogic 2435/tcp # OptiLogic +optilogic 2435/udp # OptiLogic +topx 2436/tcp # TOP/X +topx 2436/udp # TOP/X +sybasedbsynch 2439/tcp # SybaseDBSynch +sybasedbsynch 2439/udp # SybaseDBSynch +spearway 2440/tcp # Spearway Lockers +spearway 2440/udp # Spearway Lockers +pvsw-inet 2441/tcp # Pervasive I*net Data Server +pvsw-inet 2441/udp # Pervasive I*net Data Server +netangel 2442/tcp # Netangel +netangel 2442/udp # Netangel +powerclientcsf 2443/tcp # PowerClient Central Storage Facility +powerclientcsf 2443/udp # PowerClient Central Storage Facility +btpp2sectrans 2444/tcp # BT PP2 Sectrans +btpp2sectrans 2444/udp # BT PP2 Sectrans +dtn1 2445/tcp # DTN1 +dtn1 2445/udp # DTN1 +bues_service 2446/tcp bues-service # bues_service +bues_service 2446/udp bues-service # bues_service +ovwdb 2447/tcp # OpenView NNM daemon +ovwdb 2447/udp # OpenView NNM daemon +hpppssvr 2448/tcp # hpppsvr +hpppssvr 2448/udp # hpppsvr +ratl 2449/tcp # RATL +ratl 2449/udp # RATL +netadmin 2450/tcp # netadmin +netadmin 2450/udp # netadmin +netchat 2451/tcp # netchat +netchat 2451/udp # netchat +snifferclient 2452/tcp # SnifferClient +snifferclient 2452/udp # SnifferClient +madge-ltd 2453/tcp # madge ltd +madge-ltd 2453/udp # madge ltd +indx-dds 2454/tcp # IndX-DDS +indx-dds 2454/udp # IndX-DDS +wago-io-system 2455/tcp # WAGO-IO-SYSTEM +wago-io-system 2455/udp # WAGO-IO-SYSTEM +altav-remmgt 2456/tcp # altav-remmgt +altav-remmgt 2456/udp # altav-remmgt +rapido-ip 2457/tcp # Rapido_IP +rapido-ip 2457/udp # Rapido_IP +griffin 2458/tcp # griffin +griffin 2458/udp # griffin +community 2459/tcp # Community +community 2459/udp # Community +ms-theater 2460/tcp # ms-theater +ms-theater 2460/udp # ms-theater +qadmifoper 2461/tcp # qadmifoper +qadmifoper 2461/udp # qadmifoper +qadmifevent 2462/tcp # qadmifevent +qadmifevent 2462/udp # qadmifevent +lsi-raid-mgmt 2463/tcp # LSI RAID Management +lsi-raid-mgmt 2463/udp # LSI RAID Management +direcpc-si 2464/tcp # DirecPC SI +direcpc-si 2464/udp # DirecPC SI +lbm 2465/tcp # Load Balance Management +lbm 2465/udp # Load Balance Management +lbf 2466/tcp # Load Balance Forwarding +lbf 2466/udp # Load Balance Forwarding +high-criteria 2467/tcp # High Criteria +high-criteria 2467/udp # High Criteria +qip-msgd 2468/tcp # qip_msgd +qip-msgd 2468/udp # qip_msgd +mti-tcs-comm 2469/tcp # MTI-TCS-COMM +mti-tcs-comm 2469/udp # MTI-TCS-COMM +taskman-port 2470/tcp # taskman port +taskman-port 2470/udp # taskman port +seaodbc 2471/tcp # SeaODBC +seaodbc 2471/udp # SeaODBC +c3 2472/tcp # C3 +c3 2472/udp # C3 +aker-cdp 2473/tcp # Aker-cdp +aker-cdp 2473/udp # Aker-cdp +vitalanalysis 2474/tcp # Vital Analysis +vitalanalysis 2474/udp # Vital Analysis +ace-server 2475/tcp # ACE Server +ace-server 2475/udp # ACE Server +ace-svr-prop 2476/tcp # ACE Server Propagation +ace-svr-prop 2476/udp # ACE Server Propagation +ssm-cvs 2477/tcp # SecurSight Certificate Valifation Service +ssm-cvs 2477/udp # SecurSight Certificate Valifation Service +ssm-cssps 2478/tcp # SecurSight Authentication Server (SSL) +ssm-cssps 2478/udp # SecurSight Authentication Server (SSL) +ssm-els 2479/tcp # SecurSight Event Logging Server (SSL) +ssm-els 2479/udp # SecurSight Event Logging Server (SSL) +powerexchange 2480/tcp # Informatica PowerExchange Listener +powerexchange 2480/udp # Informatica PowerExchange Listener +giop 2481/tcp # Oracle GIOP +giop 2481/udp # Oracle GIOP +giop-ssl 2482/tcp # Oracle GIOP SSL +giop-ssl 2482/udp # Oracle GIOP SSL +ttc 2483/tcp # Oracle TTC +ttc 2483/udp # Oracle TTC +ttc-ssl 2484/tcp # Oracle TTC SSL +ttc-ssl 2484/udp # Oracle TTC SSL +netobjects1 2485/tcp # Net Objects1 +netobjects1 2485/udp # Net Objects1 +netobjects2 2486/tcp # Net Objects2 +netobjects2 2486/udp # Net Objects2 +pns 2487/tcp # Policy Notice Service +pns 2487/udp # Policy Notice Service +moy-corp 2488/tcp # Moy Corporation +moy-corp 2488/udp # Moy Corporation +tsilb 2489/tcp # TSILB +tsilb 2489/udp # TSILB +qip-qdhcp 2490/tcp # qip_qdhcp +qip-qdhcp 2490/udp # qip_qdhcp +conclave-cpp 2491/tcp # Conclave CPP +conclave-cpp 2491/udp # Conclave CPP +groove 2492/tcp # GROOVE +groove 2492/udp # GROOVE +talarian-mqs 2493/tcp # Talarian MQS +talarian-mqs 2493/udp # Talarian MQS +bmc-ar 2494/tcp # BMC AR +bmc-ar 2494/udp # BMC AR +fast-rem-serv 2495/tcp # Fast Remote Services +fast-rem-serv 2495/udp # Fast Remote Services +dirgis 2496/tcp # DIRGIS +dirgis 2496/udp # DIRGIS +quaddb 2497/tcp # Quad DB +quaddb 2497/udp # Quad DB +odn-castraq 2498/tcp # ODN-CasTraq +odn-castraq 2498/udp # ODN-CasTraq +rtsserv 2500/tcp # Resource Tracking system server +rtsserv 2500/udp # Resource Tracking system server +rtsclient 2501/tcp # Resource Tracking system client +rtsclient 2501/udp # Resource Tracking system client +kentrox-prot 2502/tcp # Kentrox Protocol +kentrox-prot 2502/udp # Kentrox Protocol +nms-dpnss 2503/tcp # NMS-DPNSS +nms-dpnss 2503/udp # NMS-DPNSS +wlbs 2504/tcp # WLBS +wlbs 2504/udp # WLBS +ppcontrol 2505/tcp # PowerPlay Control +ppcontrol 2505/udp # PowerPlay Control +jbroker 2506/tcp # jbroker +jbroker 2506/udp # jbroker +spock 2507/tcp # spock +spock 2507/udp # spock +jdatastore 2508/tcp # JDataStore +jdatastore 2508/udp # JDataStore +fjmpss 2509/tcp # fjmpss +fjmpss 2509/udp # fjmpss +fjappmgrbulk 2510/tcp # fjappmgrbulk +fjappmgrbulk 2510/udp # fjappmgrbulk +metastorm 2511/tcp # Metastorm +metastorm 2511/udp # Metastorm +citrixima 2512/tcp # Citrix IMA +citrixima 2512/udp # Citrix IMA +citrixadmin 2513/tcp # Citrix ADMIN +citrixadmin 2513/udp # Citrix ADMIN +facsys-ntp 2514/tcp # Facsys NTP +facsys-ntp 2514/udp # Facsys NTP +facsys-router 2515/tcp # Facsys Router +facsys-router 2515/udp # Facsys Router +maincontrol 2516/tcp # Main Control +maincontrol 2516/udp # Main Control +call-sig-trans 2517/tcp # H.323 Annex E call signaling transport +call-sig-trans 2517/udp # H.323 Annex E call signaling transport +willy 2518/tcp # Willy +willy 2518/udp # Willy +globmsgsvc 2519/tcp # globmsgsvc +globmsgsvc 2519/udp # globmsgsvc +pvsw 2520/tcp # Pervasive Listener +pvsw 2520/udp # Pervasive Listener +adaptecmgr 2521/tcp # Adaptec Manager +adaptecmgr 2521/udp # Adaptec Manager +windb 2522/tcp # WinDb +windb 2522/udp # WinDb +qke-llc-v3 2523/tcp # Qke LLC V.3 +qke-llc-v3 2523/udp # Qke LLC V.3 +optiwave-lm 2524/tcp # Optiwave License Management +optiwave-lm 2524/udp # Optiwave License Management +ms-v-worlds 2525/tcp # MS V-Worlds +ms-v-worlds 2525/udp # MS V-Worlds +ema-sent-lm 2526/tcp # EMA License Manager +ema-sent-lm 2526/udp # EMA License Manager +iqserver 2527/tcp # IQ Server +iqserver 2527/udp # IQ Server +ncr_ccl 2528/tcp ncr-ccl # NCR CCL +ncr_ccl 2528/udp ncr-ccl # NCR CCL +utsftp 2529/tcp # UTS FTP +utsftp 2529/udp # UTS FTP +vrcommerce 2530/tcp # VR Commerce +vrcommerce 2530/udp # VR Commerce +ito-e-gui 2531/tcp # ITO-E GUI +ito-e-gui 2531/udp # ITO-E GUI +ovtopmd 2532/tcp # OVTOPMD +ovtopmd 2532/udp # OVTOPMD +snifferserver 2533/tcp # SnifferServer +snifferserver 2533/udp # SnifferServer +combox-web-acc 2534/tcp # Combox Web Access +combox-web-acc 2534/udp # Combox Web Access +madcap 2535/tcp # MADCAP +madcap 2535/udp # MADCAP +btpp2audctr1 2536/tcp # btpp2audctr1 +btpp2audctr1 2536/udp # btpp2audctr1 +upgrade 2537/tcp # Upgrade Protocol +upgrade 2537/udp # Upgrade Protocol +vnwk-prapi 2538/tcp # vnwk-prapi +vnwk-prapi 2538/udp # vnwk-prapi +vsiadmin 2539/tcp # VSI Admin +vsiadmin 2539/udp # VSI Admin +lonworks 2540/tcp # LonWorks +lonworks 2540/udp # LonWorks +lonworks2 2541/tcp # LonWorks2 +lonworks2 2541/udp # LonWorks2 +udrawgraph 2542/tcp # uDraw(Graph) +udrawgraph 2542/udp # uDraw(Graph) +reftek 2543/tcp # REFTEK +reftek 2543/udp # REFTEK +novell-zen 2544/tcp # Management Daemon Refresh +novell-zen 2544/udp # Management Daemon Refresh +sis-emt 2545/tcp # sis-emt +sis-emt 2545/udp # sis-emt +vytalvaultbrtp 2546/tcp # vytalvaultbrtp +vytalvaultbrtp 2546/udp # vytalvaultbrtp +vytalvaultvsmp 2547/tcp # vytalvaultvsmp +vytalvaultvsmp 2547/udp # vytalvaultvsmp +vytalvaultpipe 2548/tcp # vytalvaultpipe +vytalvaultpipe 2548/udp # vytalvaultpipe +ipass 2549/tcp # IPASS +ipass 2549/udp # IPASS +ads 2550/tcp # ADS +ads 2550/udp # ADS +isg-uda-server 2551/tcp # ISG UDA Server +isg-uda-server 2551/udp # ISG UDA Server +call-logging 2552/tcp # Call Logging +call-logging 2552/udp # Call Logging +efidiningport 2553/tcp # efidiningport +efidiningport 2553/udp # efidiningport +vcnet-link-v10 2554/tcp # VCnet-Link v10 +vcnet-link-v10 2554/udp # VCnet-Link v10 +compaq-wcp 2555/tcp # Compaq WCP +compaq-wcp 2555/udp # Compaq WCP +nicetec-nmsvc 2556/tcp # nicetec-nmsvc +nicetec-nmsvc 2556/udp # nicetec-nmsvc +nicetec-mgmt 2557/tcp # nicetec-mgmt +nicetec-mgmt 2557/udp # nicetec-mgmt +pclemultimedia 2558/tcp # PCLE Multi Media +pclemultimedia 2558/udp # PCLE Multi Media +lstp 2559/tcp # LSTP +lstp 2559/udp # LSTP +labrat 2560/tcp # labrat +labrat 2560/udp # labrat +mosaixcc 2561/tcp # MosaixCC +mosaixcc 2561/udp # MosaixCC +delibo 2562/tcp # Delibo +delibo 2562/udp # Delibo +cti-redwood 2563/tcp # CTI Redwood +cti-redwood 2563/udp # CTI Redwood +hp-3000-telnet 2564/tcp # HP 3000 NS/VT block mode telnet +hp-3000-telnet 2564/udp # HP 3000 NS/VT block mode telnet +coord-svr 2565/tcp # Coordinator Server +coord-svr 2565/udp # Coordinator Server +pcs-pcw 2566/tcp # pcs-pcw +pcs-pcw 2566/udp # pcs-pcw +clp 2567/tcp # Cisco Line Protocol +clp 2567/udp # Cisco Line Protocol +spamtrap 2568/tcp # SPAM TRAP +spamtrap 2568/udp # SPAM TRAP +sonuscallsig 2569/tcp # Sonus Call Signal +sonuscallsig 2569/udp # Sonus Call Signal +hs-port 2570/tcp # HS Port +hs-port 2570/udp # HS Port +cecsvc 2571/tcp # CECSVC +cecsvc 2571/udp # CECSVC +ibp 2572/tcp # IBP +ibp 2572/udp # IBP +trustestablish 2573/tcp # Trust Establish +trustestablish 2573/udp # Trust Establish +blockade-bpsp 2574/tcp # Blockade BPSP +blockade-bpsp 2574/udp # Blockade BPSP +hl7 2575/tcp # HL7 +hl7 2575/udp # HL7 +tclprodebugger 2576/tcp # TCL Pro Debugger +tclprodebugger 2576/udp # TCL Pro Debugger +scipticslsrvr 2577/tcp # Scriptics Lsrvr +scipticslsrvr 2577/udp # Scriptics Lsrvr +rvs-isdn-dcp 2578/tcp # RVS ISDN DCP +rvs-isdn-dcp 2578/udp # RVS ISDN DCP +mpfoncl 2579/tcp # mpfoncl +mpfoncl 2579/udp # mpfoncl +tributary 2580/tcp # Tributary +tributary 2580/udp # Tributary +argis-te 2581/tcp # ARGIS TE +argis-te 2581/udp # ARGIS TE +argis-ds 2582/tcp # ARGIS DS +argis-ds 2582/udp # ARGIS DS +mon 2583/tcp # MON +mon 2583/udp # MON +cyaserv 2584/tcp # cyaserv +cyaserv 2584/udp # cyaserv +netx-server 2585/tcp # NETX Server +netx-server 2585/udp # NETX Server +netx-agent 2586/tcp # NETX Agent +netx-agent 2586/udp # NETX Agent +masc 2587/tcp # MASC +masc 2587/udp # MASC +privilege 2588/tcp # Privilege +privilege 2588/udp # Privilege +quartus-tcl 2589/tcp # quartus tcl +quartus-tcl 2589/udp # quartus tcl +idotdist 2590/tcp # idotdist +idotdist 2590/udp # idotdist +maytagshuffle 2591/tcp # Maytag Shuffle +maytagshuffle 2591/udp # Maytag Shuffle +netrek 2592/tcp # netrek +netrek 2592/udp # netrek +mns-mail 2593/tcp # MNS Mail Notice Service +mns-mail 2593/udp # MNS Mail Notice Service +dts 2594/tcp # Data Base Server +dts 2594/udp # Data Base Server +worldfusion1 2595/tcp # World Fusion 1 +worldfusion1 2595/udp # World Fusion 1 +worldfusion2 2596/tcp # World Fusion 2 +worldfusion2 2596/udp # World Fusion 2 +homesteadglory 2597/tcp # Homestead Glory +homesteadglory 2597/udp # Homestead Glory +citriximaclient 2598/tcp # Citrix MA Client +citriximaclient 2598/udp # Citrix MA Client +snapd 2599/tcp # Snap Discovery +snapd 2599/udp # Snap Discovery +connection 2607/tcp # Dell Connection +connection 2607/udp # Dell Connection +wag-service 2608/tcp # Wag Service +wag-service 2608/udp # Wag Service +system-monitor 2609/tcp # System Monitor +system-monitor 2609/udp # System Monitor +versa-tek 2610/tcp # VersaTek +versa-tek 2610/udp # VersaTek +lionhead 2611/tcp # LIONHEAD +lionhead 2611/udp # LIONHEAD +qpasa-agent 2612/tcp # Qpasa Agent +qpasa-agent 2612/udp # Qpasa Agent +smntubootstrap 2613/tcp # SMNTUBootstrap +smntubootstrap 2613/udp # SMNTUBootstrap +neveroffline 2614/tcp # Never Offline +neveroffline 2614/udp # Never Offline +firepower 2615/tcp # firepower +firepower 2615/udp # firepower +appswitch-emp 2616/tcp # appswitch-emp +appswitch-emp 2616/udp # appswitch-emp +cmadmin 2617/tcp # Clinical Context Managers +cmadmin 2617/udp # Clinical Context Managers +priority-e-com 2618/tcp # Priority E-Com +priority-e-com 2618/udp # Priority E-Com +bruce 2619/tcp # bruce +bruce 2619/udp # bruce +lpsrecommender 2620/tcp # LPSRecommender +lpsrecommender 2620/udp # LPSRecommender +miles-apart 2621/tcp # Miles Apart Jukebox Server +miles-apart 2621/udp # Miles Apart Jukebox Server +metricadbc 2622/tcp # MetricaDBC +metricadbc 2622/udp # MetricaDBC +lmdp 2623/tcp # LMDP +lmdp 2623/udp # LMDP +aria 2624/tcp # Aria +aria 2624/udp # Aria +blwnkl-port 2625/tcp # Blwnkl Port +blwnkl-port 2625/udp # Blwnkl Port +gbjd816 2626/tcp # gbjd816 +gbjd816 2626/udp # gbjd816 +moshebeeri 2627/tcp # Moshe Beeri +moshebeeri 2627/udp # Moshe Beeri +sitaraserver 2629/tcp # Sitara Server +sitaraserver 2629/udp # Sitara Server +sitaramgmt 2630/tcp # Sitara Management +sitaramgmt 2630/udp # Sitara Management +sitaradir 2631/tcp # Sitara Dir +sitaradir 2631/udp # Sitara Dir +irdg-post 2632/tcp # IRdg Post +irdg-post 2632/udp # IRdg Post +interintelli 2633/tcp # InterIntelli +interintelli 2633/udp # InterIntelli +pk-electronics 2634/tcp # PK Electronics +pk-electronics 2634/udp # PK Electronics +backburner 2635/tcp # Back Burner +backburner 2635/udp # Back Burner +solve 2636/tcp # Solve +solve 2636/udp # Solve +imdocsvc 2637/tcp # Import Document Service +imdocsvc 2637/udp # Import Document Service +sybaseanywhere 2638/tcp # Sybase Anywhere +sybaseanywhere 2638/udp # Sybase Anywhere +aminet 2639/tcp # AMInet +aminet 2639/udp # AMInet +ami-control 2640/tcp # Alcorn McBride Inc protocol +ami-control 2640/udp # Alcorn McBride Inc protocol +hdl-srv 2641/tcp # HDL Server +hdl-srv 2641/udp # HDL Server +tragic 2642/tcp # Tragic +tragic 2642/udp # Tragic +gte-samp 2643/tcp # GTE-SAMP +gte-samp 2643/udp # GTE-SAMP +travsoft-ipx-t 2644/tcp # Travsoft IPX Tunnel +travsoft-ipx-t 2644/udp # Travsoft IPX Tunnel +novell-ipx-cmd 2645/tcp # Novell IPX CMD +novell-ipx-cmd 2645/udp # Novell IPX CMD +and-lm 2646/tcp # AND License Manager +and-lm 2646/udp # AND License Manager +syncserver 2647/tcp # SyncServer +syncserver 2647/udp # SyncServer +upsnotifyprot 2648/tcp # Upsnotifyprot +upsnotifyprot 2648/udp # Upsnotifyprot +vpsipport 2649/tcp # VPSIPPORT +vpsipport 2649/udp # VPSIPPORT +eristwoguns 2650/tcp # eristwoguns +eristwoguns 2650/udp # eristwoguns +ebinsite 2651/tcp # EBInSite +ebinsite 2651/udp # EBInSite +interpathpanel 2652/tcp # InterPathPanel +interpathpanel 2652/udp # InterPathPanel +sonus 2653/tcp # Sonus +sonus 2653/udp # Sonus +corel_vncadmin 2654/tcp corel-vncadmin # Corel VNC Admin +corel_vncadmin 2654/udp corel-vncadmin # Corel VNC Admin +unglue 2655/tcp # UNIX Nt Glue +unglue 2655/udp # UNIX Nt Glue +kana 2656/tcp # Kana +kana 2656/udp # Kana +sns-dispatcher 2657/tcp # SNS Dispatcher +sns-dispatcher 2657/udp # SNS Dispatcher +sns-admin 2658/tcp # SNS Admin +sns-admin 2658/udp # SNS Admin +sns-query 2659/tcp # SNS Query +sns-query 2659/udp # SNS Query +gcmonitor 2660/tcp # GC Monitor +gcmonitor 2660/udp # GC Monitor +olhost 2661/tcp # OLHOST +olhost 2661/udp # OLHOST +bintec-capi 2662/tcp # BinTec-CAPI +bintec-capi 2662/udp # BinTec-CAPI +bintec-tapi 2663/tcp # BinTec-TAPI +bintec-tapi 2663/udp # BinTec-TAPI +patrol-mq-gm 2664/tcp # Patrol for MQ GM +patrol-mq-gm 2664/udp # Patrol for MQ GM +patrol-mq-nm 2665/tcp # Patrol for MQ NM +patrol-mq-nm 2665/udp # Patrol for MQ NM +extensis 2666/tcp # extensis +extensis 2666/udp # extensis +alarm-clock-s 2667/tcp # Alarm Clock Server +alarm-clock-s 2667/udp # Alarm Clock Server +alarm-clock-c 2668/tcp # Alarm Clock Client +alarm-clock-c 2668/udp # Alarm Clock Client +toad 2669/tcp # TOAD +toad 2669/udp # TOAD +tve-announce 2670/tcp # TVE Announce +tve-announce 2670/udp # TVE Announce +newlixreg 2671/tcp # newlixreg +newlixreg 2671/udp # newlixreg +nhserver 2672/tcp # nhserver +nhserver 2672/udp # nhserver +firstcall42 2673/tcp # First Call 42 +firstcall42 2673/udp # First Call 42 +ewnn 2674/tcp # ewnn +ewnn 2674/udp # ewnn +ttc-etap 2675/tcp # TTC ETAP +ttc-etap 2675/udp # TTC ETAP +simslink 2676/tcp # SIMSLink +simslink 2676/udp # SIMSLink +gadgetgate1way 2677/tcp # Gadget Gate 1 Way +gadgetgate1way 2677/udp # Gadget Gate 1 Way +gadgetgate2way 2678/tcp # Gadget Gate 2 Way +gadgetgate2way 2678/udp # Gadget Gate 2 Way +syncserverssl 2679/tcp # Sync Server SSL +syncserverssl 2679/udp # Sync Server SSL +pxc-sapxom 2680/tcp # pxc-sapxom +pxc-sapxom 2680/udp # pxc-sapxom +mpnjsomb 2681/tcp # mpnjsomb +mpnjsomb 2681/udp # mpnjsomb +ncdloadbalance 2683/tcp # NCDLoadBalance +ncdloadbalance 2683/udp # NCDLoadBalance +mpnjsosv 2684/tcp # mpnjsosv +mpnjsosv 2684/udp # mpnjsosv +mpnjsocl 2685/tcp # mpnjsocl +mpnjsocl 2685/udp # mpnjsocl +mpnjsomg 2686/tcp # mpnjsomg +mpnjsomg 2686/udp # mpnjsomg +pq-lic-mgmt 2687/tcp # pq-lic-mgmt +pq-lic-mgmt 2687/udp # pq-lic-mgmt +md-cg-http 2688/tcp # md-cf-http +md-cg-http 2688/udp # md-cf-http +fastlynx 2689/tcp # FastLynx +fastlynx 2689/udp # FastLynx +hp-nnm-data 2690/tcp # HP NNM Embedded Database +hp-nnm-data 2690/udp # HP NNM Embedded Database +itinternet 2691/tcp # ITInternet ISM Server +itinternet 2691/udp # ITInternet ISM Server +admins-lms 2692/tcp # Admins LMS +admins-lms 2692/udp # Admins LMS +pwrsevent 2694/tcp # pwrsevent +pwrsevent 2694/udp # pwrsevent +vspread 2695/tcp # VSPREAD +vspread 2695/udp # VSPREAD +unifyadmin 2696/tcp # Unify Admin +unifyadmin 2696/udp # Unify Admin +oce-snmp-trap 2697/tcp # Oce SNMP Trap Port +oce-snmp-trap 2697/udp # Oce SNMP Trap Port +mck-ivpip 2698/tcp # MCK-IVPIP +mck-ivpip 2698/udp # MCK-IVPIP +csoft-plusclnt 2699/tcp # Csoft Plus Client +csoft-plusclnt 2699/udp # Csoft Plus Client +tqdata 2700/tcp # tqdata +tqdata 2700/udp # tqdata +sms-rcinfo 2701/tcp # SMS RCINFO +sms-rcinfo 2701/udp # SMS RCINFO +sms-xfer 2702/tcp # SMS XFER +sms-xfer 2702/udp # SMS XFER +sms-chat 2703/tcp # SMS CHAT +sms-chat 2703/udp # SMS CHAT +sms-remctrl 2704/tcp # SMS REMCTRL +sms-remctrl 2704/udp # SMS REMCTRL +sds-admin 2705/tcp # SDS Admin +sds-admin 2705/udp # SDS Admin +ncdmirroring 2706/tcp # NCD Mirroring +ncdmirroring 2706/udp # NCD Mirroring +emcsymapiport 2707/tcp # EMCSYMAPIPORT +emcsymapiport 2707/udp # EMCSYMAPIPORT +banyan-net 2708/tcp # Banyan-Net +banyan-net 2708/udp # Banyan-Net +supermon 2709/tcp # Supermon +supermon 2709/udp # Supermon +sso-service 2710/tcp # SSO Service +sso-service 2710/udp # SSO Service +sso-control 2711/tcp # SSO Control +sso-control 2711/udp # SSO Control +aocp 2712/tcp # Axapta Object Communication Protocol +aocp 2712/udp # Axapta Object Communication Protocol +raventbs 2713/tcp # Raven Trinity Broker Service +raventbs 2713/udp # Raven Trinity Broker Service +raventdm 2714/tcp # Raven Trinity Data Mover +raventdm 2714/udp # Raven Trinity Data Mover +hpstgmgr2 2715/tcp # HPSTGMGR2 +hpstgmgr2 2715/udp # HPSTGMGR2 +inova-ip-disco 2716/tcp # Inova IP Disco +inova-ip-disco 2716/udp # Inova IP Disco +pn-requester 2717/tcp # PN REQUESTER +pn-requester 2717/udp # PN REQUESTER +pn-requester2 2718/tcp # PN REQUESTER 2 +pn-requester2 2718/udp # PN REQUESTER 2 +scan-change 2719/tcp # Scan & Change +scan-change 2719/udp # Scan & Change +wkars 2720/tcp # wkars +wkars 2720/udp # wkars +smart-diagnose 2721/tcp # Smart Diagnose +smart-diagnose 2721/udp # Smart Diagnose +proactivesrvr 2722/tcp # Proactive Server +proactivesrvr 2722/udp # Proactive Server +watchdog-nt 2723/tcp # WatchDog NT Protocol +watchdog-nt 2723/udp # WatchDog NT Protocol +qotps 2724/tcp # qotps +qotps 2724/udp # qotps +msolap-ptp2 2725/tcp # MSOLAP PTP2 +msolap-ptp2 2725/udp # MSOLAP PTP2 +tams 2726/tcp # TAMS +tams 2726/udp # TAMS +mgcp-callagent 2727/tcp # Media Gateway Control Protocol Call Agent +mgcp-callagent 2727/udp # Media Gateway Control Protocol Call Agent +sqdr 2728/tcp # SQDR +sqdr 2728/udp # SQDR +tcim-control 2729/tcp # TCIM Control +tcim-control 2729/udp # TCIM Control +nec-raidplus 2730/tcp # NEC RaidPlus +nec-raidplus 2730/udp # NEC RaidPlus +fyre-messanger 2731/tcp # Fyre Messanger +fyre-messanger 2731/udp # Fyre Messagner +g5m 2732/tcp # G5M +g5m 2732/udp # G5M +signet-ctf 2733/tcp # Signet CTF +signet-ctf 2733/udp # Signet CTF +ccs-software 2734/tcp # CCS Software +ccs-software 2734/udp # CCS Software +netiq-mc 2735/tcp # NetIQ Monitor Console +netiq-mc 2735/udp # NetIQ Monitor Console +radwiz-nms-srv 2736/tcp # RADWIZ NMS SRV +radwiz-nms-srv 2736/udp # RADWIZ NMS SRV +srp-feedback 2737/tcp # SRP Feedback +srp-feedback 2737/udp # SRP Feedback +ndl-tcp-ois-gw 2738/tcp # NDL TCP-OSI Gateway +ndl-tcp-ois-gw 2738/udp # NDL TCP-OSI Gateway +tn-timing 2739/tcp # TN Timing +tn-timing 2739/udp # TN Timing +alarm 2740/tcp # Alarm +alarm 2740/udp # Alarm +tsb 2741/tcp # TSB +tsb 2741/udp # TSB +tsb2 2742/tcp # TSB2 +tsb2 2742/udp # TSB2 +murx 2743/tcp # murx +murx 2743/udp # murx +honyaku 2744/tcp # honyaku +honyaku 2744/udp # honyaku +urbisnet 2745/tcp # URBISNET +urbisnet 2745/udp # URBISNET +cpudpencap 2746/tcp # CPUDPENCAP +cpudpencap 2746/udp # CPUDPENCAP +fjippol-swrly 2747/tcp # +fjippol-swrly 2747/udp # +fjippol-polsvr 2748/tcp # +fjippol-polsvr 2748/udp # +fjippol-cnsl 2749/tcp # +fjippol-cnsl 2749/udp # +fjippol-port1 2750/tcp # +fjippol-port1 2750/udp # +fjippol-port2 2751/tcp # +fjippol-port2 2751/udp # +rsisysaccess 2752/tcp # RSISYS ACCESS +rsisysaccess 2752/udp # RSISYS ACCESS +de-spot 2753/tcp # de-spot +de-spot 2753/udp # de-spot +apollo-cc 2754/tcp # APOLLO CC +apollo-cc 2754/udp # APOLLO CC +expresspay 2755/tcp # Express Pay +expresspay 2755/udp # Express Pay +simplement-tie 2756/tcp # simplement-tie +simplement-tie 2756/udp # simplement-tie +cnrp 2757/tcp # CNRP +cnrp 2757/udp # CNRP +apollo-status 2758/tcp # APOLLO Status +apollo-status 2758/udp # APOLLO Status +apollo-gms 2759/tcp # APOLLO GMS +apollo-gms 2759/udp # APOLLO GMS +sabams 2760/tcp # Saba MS +sabams 2760/udp # Saba MS +dicom-iscl 2761/tcp # DICOM ISCL +dicom-iscl 2761/udp # DICOM ISCL +dicom-tls 2762/tcp # DICOM TLS +dicom-tls 2762/udp # DICOM TLS +desktop-dna 2763/tcp # Desktop DNA +desktop-dna 2763/udp # Desktop DNA +data-insurance 2764/tcp # Data Insurance +data-insurance 2764/udp # Data Insurance +qip-audup 2765/tcp # qip-audup +qip-audup 2765/udp # qip-audup +compaq-scp 2766/tcp # Compaq SCP +compaq-scp 2766/udp # Compaq SCP +uadtc 2767/tcp # UADTC +uadtc 2767/udp # UADTC +uacs 2768/tcp # UACS +uacs 2768/udp # UACS +exce 2769/tcp # eXcE +exce 2769/udp # eXcE +veronica 2770/tcp # Veronica +veronica 2770/udp # Veronica +vergencecm 2771/tcp # Vergence CM +vergencecm 2771/udp # Vergence CM +auris 2772/tcp # auris +auris 2772/udp # auris +rbakcup1 2773/tcp # RBackup Remote Backup +rbakcup1 2773/udp # RBackup Remote Backup +rbakcup2 2774/tcp # RBackup Remote Backup +rbakcup2 2774/udp # RBackup Remote Backup +smpp 2775/tcp # SMPP +smpp 2775/udp # SMPP +ridgeway1 2776/tcp # Ridgeway Systems & Software +ridgeway1 2776/udp # Ridgeway Systems & Software +ridgeway2 2777/tcp # Ridgeway Systems & Software +ridgeway2 2777/udp # Ridgeway Systems & Software +gwen-sonya 2778/tcp # Gwen-Sonya +gwen-sonya 2778/udp # Gwen-Sonya +lbc-sync 2779/tcp # LBC Sync +lbc-sync 2779/udp # LBC Sync +lbc-control 2780/tcp # LBC Control +lbc-control 2780/udp # LBC Control +whosells 2781/tcp # whosells +whosells 2781/udp # whosells +everydayrc 2782/tcp # everydayrc +everydayrc 2782/udp # everydayrc +aises 2783/tcp # AISES +aises 2783/udp # AISES +www-dev 2784/tcp # world wide web - development +www-dev 2784/udp # world wide web - development +aic-np 2785/tcp # aic-np +aic-np 2785/udp # aic-np +aic-oncrpc 2786/tcp # aic-oncrpc - Destiny MCD database +aic-oncrpc 2786/udp # aic-oncrpc - Destiny MCD database +piccolo 2787/tcp # piccolo - Cornerstone Software +piccolo 2787/udp # piccolo - Cornerstone Software +fryeserv 2788/tcp # NetWare Loadable Module - Seagate Software +fryeserv 2788/udp # NetWare Loadable Module - Seagate Software +media-agent 2789/tcp # Media Agent +media-agent 2789/udp # Media Agent +plgproxy 2790/tcp # PLG Proxy +plgproxy 2790/udp # PLG Proxy +mtport-regist 2791/tcp # MT Port Registrator +mtport-regist 2791/udp # MT Port Registrator +f5-globalsite 2792/tcp # f5-globalsite +f5-globalsite 2792/udp # f5-globalsite +initlsmsad 2793/tcp # initlsmsad +initlsmsad 2793/udp # initlsmsad +livestats 2795/tcp # LiveStats +livestats 2795/udp # LiveStats +ac-tech 2796/tcp # ac-tech +ac-tech 2796/udp # ac-tech +esp-encap 2797/tcp # esp-encap +esp-encap 2797/udp # esp-encap +tmesis-upshot 2798/tcp # TMESIS-UPShot +tmesis-upshot 2798/udp # TMESIS-UPShot +icon-discover 2799/tcp # ICON Discover +icon-discover 2799/udp # ICON Discover +acc-raid 2800/tcp # ACC RAID +acc-raid 2800/udp # ACC RAID +igcp 2801/tcp # IGCP +igcp 2801/udp # IGCP +veritas-tcp1 2802/tcp # Veritas TCP1 +veritas-udp1 2802/udp # Veritas UDP1 +btprjctrl 2803/tcp # btprjctrl +btprjctrl 2803/udp # btprjctrl +dvr-esm 2804/tcp # March Networks Digital Video Recorders and Enterprise Service Manager products +dvr-esm 2804/udp # March Networks Digital Video Recorders and Enterprise Service Manager products +wta-wsp-s 2805/tcp # WTA WSP-S +wta-wsp-s 2805/udp # WTA WSP-S +cspuni 2806/tcp # cspuni +cspuni 2806/udp # cspuni +cspmulti 2807/tcp # cspmulti +cspmulti 2807/udp # cspmulti +j-lan-p 2808/tcp # J-LAN-P +j-lan-p 2808/udp # J-LAN-P +corbaloc 2809/udp # CORBA LOC +netsteward 2810/tcp # Active Net Steward +netsteward 2810/udp # Active Net Steward +gsiftp 2811/tcp # GSI FTP +gsiftp 2811/udp # GSI FTP +atmtcp 2812/tcp # atmtcp +atmtcp 2812/udp # atmtcp +llm-pass 2813/tcp # llm-pass +llm-pass 2813/udp # llm-pass +llm-csv 2814/tcp # llm-csv +llm-csv 2814/udp # llm-csv +lbc-measure 2815/tcp # LBC Measurement +lbc-measure 2815/udp # LBC Measurement +lbc-watchdog 2816/tcp # LBC Watchdog +lbc-watchdog 2816/udp # LBC Watchdog +rmlnk 2818/tcp # rmlnk +rmlnk 2818/udp # rmlnk +fc-faultnotify 2819/tcp # FC Fault Notification +fc-faultnotify 2819/udp # FC Fault Notification +univision 2820/tcp # UniVision +univision 2820/udp # UniVision +vrts-at-port 2821/tcp # VERITAS Authentication Service +vrts-at-port 2821/udp # VERITAS Authentication Service +ka0wuc 2822/tcp # ka0wuc +ka0wuc 2822/udp # ka0wuc +cqg-netlan 2823/tcp # CQG Net/LAN +cqg-netlan 2823/udp # CQG Net/LAN +cqg-netlan-1 2824/tcp # CQG Net/LAN 1 +cqg-netlan-1 2824/udp # CQG Net/Lan 1 +slc-systemlog 2826/tcp # slc systemlog +slc-systemlog 2826/udp # slc systemlog +slc-ctrlrloops 2827/tcp # slc ctrlrloops +slc-ctrlrloops 2827/udp # slc ctrlrloops +itm-lm 2828/tcp # ITM License Manager +itm-lm 2828/udp # ITM License Manager +silkp1 2829/tcp # silkp1 +silkp1 2829/udp # silkp1 +silkp2 2830/tcp # silkp2 +silkp2 2830/udp # silkp2 +silkp3 2831/tcp # silkp3 +silkp3 2831/udp # silkp3 +silkp4 2832/tcp # silkp4 +silkp4 2832/udp # silkp4 +glishd 2833/tcp # glishd +glishd 2833/udp # glishd +evtp 2834/tcp # EVTP +evtp 2834/udp # EVTP +evtp-data 2835/tcp # EVTP-DATA +evtp-data 2835/udp # EVTP-DATA +catalyst 2836/tcp # catalyst +catalyst 2836/udp # catalyst +repliweb 2837/tcp # Repliweb +repliweb 2837/udp # Repliweb +starbot 2838/tcp # Starbot +starbot 2838/udp # Starbot +l3-exprt 2840/tcp # l3-exprt +l3-exprt 2840/udp # l3-exprt +l3-ranger 2841/tcp # l3-ranger +l3-ranger 2841/udp # l3-ranger +l3-hawk 2842/tcp # l3-hawk +l3-hawk 2842/udp # l3-hawk +pdnet 2843/tcp # PDnet +pdnet 2843/udp # PDnet +bpcp-poll 2844/tcp # BPCP POLL +bpcp-poll 2844/udp # BPCP POLL +bpcp-trap 2845/tcp # BPCP TRAP +bpcp-trap 2845/udp # BPCP TRAP +aimpp-hello 2846/tcp # AIMPP Hello +aimpp-hello 2846/udp # AIMPP Hello +aimpp-port-req 2847/tcp # AIMPP Port Req +aimpp-port-req 2847/udp # AIMPP Port Req +amt-blc-port 2848/tcp # AMT-BLC-PORT +amt-blc-port 2848/udp # AMT-BLC-PORT +metaconsole 2850/tcp # MetaConsole +metaconsole 2850/udp # MetaConsole +webemshttp 2851/tcp # webemshttp +webemshttp 2851/udp # webemshttp +bears-01 2852/tcp # bears-01 +bears-01 2852/udp # bears-01 +ispipes 2853/tcp # ISPipes +ispipes 2853/udp # ISPipes +infomover 2854/tcp # InfoMover +infomover 2854/udp # InfoMover +msrp 2855/tcp # MSRP over TCP +cesdinv 2856/tcp # cesdinv +cesdinv 2856/udp # cesdinv +simctlp 2857/tcp # SimCtIP +simctlp 2857/udp # SimCtIP +ecnp 2858/tcp # ECNP +ecnp 2858/udp # ECNP +activememory 2859/tcp # Active Memory +activememory 2859/udp # Active Memory +dialpad-voice1 2860/tcp # Dialpad Voice 1 +dialpad-voice1 2860/udp # Dialpad Voice 1 +dialpad-voice2 2861/tcp # Dialpad Voice 2 +dialpad-voice2 2861/udp # Dialpad Voice 2 +ttg-protocol 2862/tcp # TTG Protocol +ttg-protocol 2862/udp # TTG Protocol +sonardata 2863/tcp # Sonar Data +sonardata 2863/udp # Sonar Data +astromed-main 2864/tcp # main 5001 cmd +astromed-main 2864/udp # main 5001 cmd +pit-vpn 2865/tcp # pit-vpn +pit-vpn 2865/udp # pit-vpn +iwlistener 2866/tcp # iwlistener +iwlistener 2866/udp # iwlistener +esps-portal 2867/tcp # esps-portal +esps-portal 2867/udp # esps-portal +npep-messaging 2868/tcp # NPEP Messaging +npep-messaging 2868/udp # NPEP Messaging +icslap 2869/tcp # ICSLAP +icslap 2869/udp # ICSLAP +daishi 2870/tcp # daishi +daishi 2870/udp # daishi +msi-selectplay 2871/tcp # MSI Select Play +msi-selectplay 2871/udp # MSI Select Play +radix 2872/tcp # RADIX +radix 2872/udp # RADIX +dxmessagebase1 2874/tcp # DX Message Base Transport Protocol +dxmessagebase1 2874/udp # DX Message Base Transport Protocol +dxmessagebase2 2875/tcp # DX Message Base Transport Protocol +dxmessagebase2 2875/udp # DX Message Base Transport Protocol +sps-tunnel 2876/tcp # SPS Tunnel +sps-tunnel 2876/udp # SPS Tunnel +bluelance 2877/tcp # BLUELANCE +bluelance 2877/udp # BLUELANCE +aap 2878/tcp # AAP +aap 2878/udp # AAP +ucentric-ds 2879/tcp # ucentric-ds +ucentric-ds 2879/udp # ucentric-ds +synapse 2880/tcp # Synapse Transport +synapse 2880/udp # Synapse Transport +ndsp 2881/tcp # NDSP +ndsp 2881/udp # NDSP +ndtp 2882/tcp # NDTP +ndtp 2882/udp # NDTP +ndnp 2883/tcp # NDNP +ndnp 2883/udp # NDNP +flashmsg 2884/tcp # Flash Msg +flashmsg 2884/udp # Flash Msg +topflow 2885/tcp # TopFlow +topflow 2885/udp # TopFlow +responselogic 2886/tcp # RESPONSELOGIC +responselogic 2886/udp # RESPONSELOGIC +aironetddp 2887/tcp # aironet +aironetddp 2887/udp # aironet +spcsdlobby 2888/tcp # SPCSDLOBBY +spcsdlobby 2888/udp # SPCSDLOBBY +rsom 2889/tcp # RSOM +rsom 2889/udp # RSOM +cspclmulti 2890/tcp # CSPCLMULTI +cspclmulti 2890/udp # CSPCLMULTI +cinegrfx-elmd 2891/tcp # CINEGRFX-ELMD License Manager +cinegrfx-elmd 2891/udp # CINEGRFX-ELMD License Manager +snifferdata 2892/tcp # SNIFFERDATA +snifferdata 2892/udp # SNIFFERDATA +vseconnector 2893/tcp # VSECONNECTOR +vseconnector 2893/udp # VSECONNECTOR +abacus-remote 2894/tcp # ABACUS-REMOTE +abacus-remote 2894/udp # ABACUS-REMOTE +natuslink 2895/tcp # NATUS LINK +natuslink 2895/udp # NATUS LINK +ecovisiong6-1 2896/tcp # ECOVISIONG6-1 +ecovisiong6-1 2896/udp # ECOVISIONG6-1 +citrix-rtmp 2897/tcp # Citrix RTMP +citrix-rtmp 2897/udp # Citrix RTMP +appliance-cfg 2898/tcp # APPLIANCE-CFG +appliance-cfg 2898/udp # APPLIANCE-CFG +powergemplus 2899/tcp # POWERGEMPLUS +powergemplus 2899/udp # POWERGEMPLUS +quicksuite 2900/tcp # QUICKSUITE +quicksuite 2900/udp # QUICKSUITE +allstorcns 2901/tcp # ALLSTORCNS +allstorcns 2901/udp # ALLSTORCNS +netaspi 2902/tcp # NET ASPI +netaspi 2902/udp # NET ASPI +suitcase 2903/tcp # SUITCASE +suitcase 2903/udp # SUITCASE +m2ua 2904/tcp # M2UA +m2ua 2904/udp # M2UA +m2ua 2904/sctp # M2UA +m3ua 2905/tcp # M3UA +m3ua 2905/sctp # M3UA +caller9 2906/tcp # CALLER9 +caller9 2906/udp # CALLER9 +webmethods-b2b 2907/tcp # WEBMETHODS B2B +webmethods-b2b 2907/udp # WEBMETHODS B2B +mao 2908/tcp # mao +mao 2908/udp # mao +funk-dialout 2909/tcp # Funk Dialout +funk-dialout 2909/udp # Funk Dialout +tdaccess 2910/tcp # TDAccess +tdaccess 2910/udp # TDAccess +blockade 2911/tcp # Blockade +blockade 2911/udp # Blockade +epicon 2912/tcp # Epicon +epicon 2912/udp # Epicon +boosterware 2913/tcp # Booster Ware +boosterware 2913/udp # Booster Ware +gamelobby 2914/tcp # Game Lobby +gamelobby 2914/udp # Game Lobby +tksocket 2915/tcp # TK Socket +tksocket 2915/udp # TK Socket +elvin_server 2916/tcp elvin-server # Elvin Server +elvin_server 2916/udp elvin-server # Elvin Server +elvin_client 2917/tcp elvin-client # Elvin Client +elvin_client 2917/udp elvin-client # Elvin Client +kastenchasepad 2918/tcp # Kasten Chase Pad +kastenchasepad 2918/udp # Kasten Chase Pad +roboer 2919/tcp # roboER +roboer 2919/udp # roboER +roboeda 2920/tcp # roboEDA +roboeda 2920/udp # roboEDA +cesdcdman 2921/tcp # CESD Contents Delivery Management +cesdcdman 2921/udp # CESD Contents Delivery Management +cesdcdtrn 2922/tcp # CESD Contents Delivery Data Transfer +cesdcdtrn 2922/udp # CESD Contents Delivery Data Transfer +wta-wsp-wtp-s 2923/tcp # WTA-WSP-WTP-S +wta-wsp-wtp-s 2923/udp # WTA-WSP-WTP-S +precise-vip 2924/tcp # PRECISE-VIP +precise-vip 2924/udp # PRECISE-VIP +mobile-file-dl 2926/tcp # MOBILE-FILE-DL +mobile-file-dl 2926/udp # MOBILE-FILE-DL +unimobilectrl 2927/tcp # UNIMOBILECTRL +unimobilectrl 2927/udp # UNIMOBILECTRL +redstone-cpss 2928/tcp # REDSTONE-CPSS +redstone-cpss 2928/udp # REDSTONE-CPSS +amx-webadmin 2929/tcp # AMX-WEBADMIN +amx-webadmin 2929/udp # AMX-WEBADMIN +amx-weblinx 2930/tcp # AMX-WEBLINX +amx-weblinx 2930/udp # AMX-WEBLINX +circle-x 2931/tcp # Circle-X +circle-x 2931/udp # Circle-X +incp 2932/tcp # INCP +incp 2932/udp # INCP +4-tieropmgw 2933/tcp # 4-TIER OPM GW +4-tieropmgw 2933/udp # 4-TIER OPM GW +4-tieropmcli 2934/tcp # 4-TIER OPM CLI +4-tieropmcli 2934/udp # 4-TIER OPM CLI +qtp 2935/tcp # QTP +qtp 2935/udp # QTP +otpatch 2936/tcp # OTPatch +otpatch 2936/udp # OTPatch +pnaconsult-lm 2937/tcp # PNACONSULT-LM +pnaconsult-lm 2937/udp # PNACONSULT-LM +sm-pas-1 2938/tcp # SM-PAS-1 +sm-pas-1 2938/udp # SM-PAS-1 +sm-pas-2 2939/tcp # SM-PAS-2 +sm-pas-2 2939/udp # SM-PAS-2 +sm-pas-3 2940/tcp # SM-PAS-3 +sm-pas-3 2940/udp # SM-PAS-3 +sm-pas-4 2941/tcp # SM-PAS-4 +sm-pas-4 2941/udp # SM-PAS-4 +sm-pas-5 2942/tcp # SM-PAS-5 +sm-pas-5 2942/udp # SM-PAS-5 +ttnrepository 2943/tcp # TTNRepository +ttnrepository 2943/udp # TTNRepository +megaco-h248 2944/tcp # Megaco H-248 +megaco-h248 2944/udp # Megaco H-248 +megaco-h248 2944/sctp # Megaco-H.248 text +h248-binary 2945/tcp # H248 Binary +h248-binary 2945/udp # H248 Binary +h248-binary 2945/sctp # Megaco/H.248 binary +fjsvmpor 2946/tcp # FJSVmpor +fjsvmpor 2946/udp # FJSVmpor +gpsd 2947/tcp # GPSD +gpsd 2947/udp # GPSD +wap-push 2948/tcp # WAP PUSH +wap-push 2948/udp # WAP PUSH +wap-pushsecure 2949/tcp # WAP PUSH SECURE +wap-pushsecure 2949/udp # WAP PUSH SECURE +esip 2950/tcp # ESIP +esip 2950/udp # ESIP +ottp 2951/tcp # OTTP +ottp 2951/udp # OTTP +mpfwsas 2952/tcp # MPFWSAS +mpfwsas 2952/udp # MPFWSAS +ovalarmsrv 2953/tcp # OVALARMSRV +ovalarmsrv 2953/udp # OVALARMSRV +ovalarmsrv-cmd 2954/tcp # OVALARMSRV-CMD +ovalarmsrv-cmd 2954/udp # OVALARMSRV-CMD +csnotify 2955/tcp # CSNOTIFY +csnotify 2955/udp # CSNOTIFY +ovrimosdbman 2956/tcp # OVRIMOSDBMAN +ovrimosdbman 2956/udp # OVRIMOSDBMAN +jmact5 2957/tcp # JAMCT5 +jmact5 2957/udp # JAMCT5 +jmact6 2958/tcp # JAMCT6 +jmact6 2958/udp # JAMCT6 +rmopagt 2959/tcp # RMOPAGT +rmopagt 2959/udp # RMOPAGT +dfoxserver 2960/tcp # DFOXSERVER +dfoxserver 2960/udp # DFOXSERVER +boldsoft-lm 2961/tcp # BOLDSOFT-LM +boldsoft-lm 2961/udp # BOLDSOFT-LM +iph-policy-cli 2962/tcp # IPH-POLICY-CLI +iph-policy-cli 2962/udp # IPH-POLICY-CLI +iph-policy-adm 2963/tcp # IPH-POLICY-ADM +iph-policy-adm 2963/udp # IPH-POLICY-ADM +bullant-srap 2964/tcp # BULLANT SRAP +bullant-srap 2964/udp # BULLANT SRAP +bullant-rap 2965/tcp # BULLANT RAP +bullant-rap 2965/udp # BULLANT RAP +idp-infotrieve 2966/tcp # IDP-INFOTRIEVE +idp-infotrieve 2966/udp # IDP-INFOTRIEVE +ssc-agent 2967/tcp # SSC-AGENT +ssc-agent 2967/udp # SSC-AGENT +enpp 2968/tcp # ENPP +enpp 2968/udp # ENPP +essp 2969/tcp # ESSP +essp 2969/udp # ESSP +index-net 2970/tcp # INDEX-NET +index-net 2970/udp # INDEX-NET +netclip 2971/tcp # NetClip clipboard daemon +netclip 2971/udp # NetClip clipboard daemon +pmsm-webrctl 2972/tcp # PMSM Webrctl +pmsm-webrctl 2972/udp # PMSM Webrctl +svnetworks 2973/tcp # SV Networks +svnetworks 2973/udp # SV Networks +signal 2974/tcp # Signal +signal 2974/udp # Signal +fjmpcm 2975/tcp # Fujitsu Configuration Management Service +fjmpcm 2975/udp # Fujitsu Configuration Management Service +cns-srv-port 2976/tcp # CNS Server Port +cns-srv-port 2976/udp # CNS Server Port +ttc-etap-ns 2977/tcp # TTCs Enterprise Test Access Protocol - NS +ttc-etap-ns 2977/udp # TTCs Enterprise Test Access Protocol - NS +ttc-etap-ds 2978/tcp # TTCs Enterprise Test Access Protocol - DS +ttc-etap-ds 2978/udp # TTCs Enterprise Test Access Protocol - DS +h263-video 2979/tcp # H.263 Video Streaming +h263-video 2979/udp # H.263 Video Streaming +wimd 2980/tcp # Instant Messaging Service +wimd 2980/udp # Instant Messaging Service +mylxamport 2981/tcp # MYLXAMPORT +mylxamport 2981/udp # MYLXAMPORT +iwb-whiteboard 2982/tcp # IWB-WHITEBOARD +iwb-whiteboard 2982/udp # IWB-WHITEBOARD +netplan 2983/tcp # NETPLAN +netplan 2983/udp # NETPLAN +hpidsadmin 2984/tcp # HPIDSADMIN +hpidsadmin 2984/udp # HPIDSADMIN +hpidsagent 2985/tcp # HPIDSAGENT +hpidsagent 2985/udp # HPIDSAGENT +stonefalls 2986/tcp # STONEFALLS +stonefalls 2986/udp # STONEFALLS +identify 2987/tcp # identify +identify 2987/udp # identify +zarkov 2989/tcp # ZARKOV Intelligent Agent Communication +zarkov 2989/udp # ZARKOV Intelligent Agent Communication +boscap 2990/tcp # BOSCAP +boscap 2990/udp # BOSCAP +wkstn-mon 2991/tcp # WKSTN-MON +wkstn-mon 2991/udp # WKSTN-MON +avenyo 2992/tcp # Avenyo Server +avenyo 2992/udp # Avenyo Server +veritas-vis1 2993/tcp # VERITAS VIS1 +veritas-vis1 2993/udp # VERITAS VIS1 +veritas-vis2 2994/tcp # VERITAS VIS2 +veritas-vis2 2994/udp # VERITAS VIS2 +idrs 2995/tcp # IDRS +idrs 2995/udp # IDRS +vsixml 2996/tcp # vsixml +vsixml 2996/udp # vsixml +rebol 2997/tcp # REBOL +rebol 2997/udp # REBOL +realsecure 2998/tcp # Real Secure +realsecure 2998/udp # Real Secure +remoteware-un 2999/tcp # RemoteWare Unassigned +remoteware-un 2999/udp # RemoteWare Unassigned +hbci 3000/tcp ceph # HBCI or CEPH monitor +hbci 3000/udp # HBCI +#remoteware-cl 3000/tcp # RemoteWare Client +#remoteware-cl 3000/udp # RemoteWare Client +origo-native 3001/tcp # OrigoDB Server Native +exlm-agent 3002/tcp # EXLM Agent +exlm-agent 3002/udp # EXLM Agent +#remoteware-srv 3002/tcp # RemoteWare Server +#remoteware-srv 3002/udp # RemoteWare Server +cgms 3003/tcp # CGMS +cgms 3003/udp # CGMS +csoftragent 3004/tcp # Csoft Agent +csoftragent 3004/udp # Csoft Agent +geniuslm 3005/tcp # Genius License Manager +geniuslm 3005/udp # Genius License Manager +ii-admin 3006/tcp # Instant Internet Admin +ii-admin 3006/udp # Instant Internet Admin +lotusmtap 3007/tcp # Lotus Mail Tracking Agent Protocol +lotusmtap 3007/udp # Lotus Mail Tracking Agent Protocol +midnight-tech 3008/tcp # Midnight Technologies +midnight-tech 3008/udp # Midnight Technologies +pxc-ntfy 3009/tcp # PXC-NTFY +pxc-ntfy 3009/udp # PXC-NTFY +gw 3010/tcp # Telerate Workstation +ping-pong 3010/udp # Telerate Workstation +trusted-web 3011/tcp # Trusted Web +trusted-web 3011/udp # Trusted Web +twsdss 3012/tcp # Trusted Web Client +twsdss 3012/udp # Trusted Web Client +gilatskysurfer 3013/tcp # Gilat Sky Surfer +gilatskysurfer 3013/udp # Gilat Sky Surfer +broker_service 3014/tcp broker-service # Broker Service +broker_service 3014/udp broker-service # Broker Service +nati-dstp 3015/tcp # NATI DSTP +nati-dstp 3015/udp # NATI DSTP +notify_srvr 3016/tcp notify-srvr # Notify Server +notify_srvr 3016/udp notify-srvr # Notify Server +event_listener 3017/tcp event-listener # Event Listener +event_listener 3017/udp event-listener # Event Listener +srvc_registry 3018/tcp srvc-registry # Service Registry +srvc_registry 3018/udp srvc-registry # Service Registry +resource_mgr 3019/tcp resource-mgr # Resource Manager +resource_mgr 3019/udp resource-mgr # Resource Manager +cifs 3020/tcp # CIFS +cifs 3020/udp # CIFS +agriserver 3021/tcp # AGRI Server +agriserver 3021/udp # AGRI Server +csregagent 3022/tcp # CSREGAGENT +csregagent 3022/udp # CSREGAGENT +magicnotes 3023/tcp # magicnotes +magicnotes 3023/udp # magicnotes +nds_sso 3024/tcp nds-sso # NDS_SSO +nds_sso 3024/udp nds-sso # NDS_SSO +arepa-raft 3025/tcp # Arepa Raft +arepa-raft 3025/udp # Arepa Raft +agri-gateway 3026/tcp # AGRI Gateway +agri-gateway 3026/udp # AGRI Gateway +LiebDevMgmt_C 3027/tcp LiebDevMgmt-C # LiebDevMgmt_C +LiebDevMgmt_C 3027/udp LiebDevMgmt-C # LiebDevMgmt_C +LiebDevMgmt_DM 3028/tcp LiebDevMgmt-DM # LiebDevMgmt_DM +LiebDevMgmt_DM 3028/udp LiebDevMgmt-DM # LiebDevMgmt_DM +LiebDevMgmt_A 3029/tcp LiebDevMgmt-A # LiebDevMgmt_A +LiebDevMgmt_A 3029/udp LiebDevMgmt-A # LiebDevMgmt_A +arepa-cas 3030/tcp # Arepa Cas +arepa-cas 3030/udp # Arepa Cas +eppc 3031/tcp # Remote AppleEvents/PPC Toolbox +eppc 3031/udp # Remote AppleEvents/PPC Toolbox +redwood-chat 3032/tcp # Redwood Chat +redwood-chat 3032/udp # Redwood Chat +pdb 3033/tcp # PDB +pdb 3033/udp # PDB +osmosis-aeea 3034/tcp # Osmosis / Helix (R) AEEA Port +osmosis-aeea 3034/udp # Osmosis / Helix (R) AEEA Port +fjsv-gssagt 3035/tcp # FJSV gssagt +fjsv-gssagt 3035/udp # FJSV gssagt +hagel-dump 3036/tcp # Hagel DUMP +hagel-dump 3036/udp # Hagel DUMP +hp-san-mgmt 3037/tcp # HP SAN Mgmt +hp-san-mgmt 3037/udp # HP SAN Mgmt +santak-ups 3038/tcp # Santak UPS +santak-ups 3038/udp # Santak UPS +cogitate 3039/tcp # Cogitate, Inc. +cogitate 3039/udp # Cogitate, Inc. +tomato-springs 3040/tcp # Tomato Springs +tomato-springs 3040/udp # Tomato Springs +di-traceware 3041/tcp # di-traceware +di-traceware 3041/udp # di-traceware +journee 3042/tcp # journee +journee 3042/udp # journee +brp 3043/tcp # Broadcast Routing Protocol +brp 3043/udp # Broadcast Routing Protocol +responsenet 3045/tcp # ResponseNet +responsenet 3045/udp # ResponseNet +di-ase 3046/tcp # di-ase +di-ase 3046/udp # di-ase +hlserver 3047/tcp # Fast Security HL Server +hlserver 3047/udp # Fast Security HL Server +pctrader 3048/tcp # Sierra Net PC Trader +pctrader 3048/udp # Sierra Net PC Trader +nsws 3049/tcp # NSWS +nsws 3049/udp # NSWS +gds_db 3050/tcp gds-db # gds_db +gds_db 3050/udp gds-db # gds_db +galaxy-server 3051/tcp # Galaxy Server +galaxy-server 3051/udp # Galaxy Server +apc-3052 3052/tcp # APC 3052 +apc-3052 3052/udp # APC 3052 +dsom-server 3053/tcp # dsom-server +dsom-server 3053/udp # dsom-server +amt-cnf-prot 3054/tcp # AMT CNF PROT +amt-cnf-prot 3054/udp # AMT CNF PROT +policyserver 3055/tcp # Policy Server +policyserver 3055/udp # Policy Server +cdl-server 3056/tcp # CDL Server +cdl-server 3056/udp # CDL Server +goahead-fldup 3057/tcp # GoAhead FldUp +goahead-fldup 3057/udp # GoAhead FldUp +videobeans 3058/tcp # videobeans +videobeans 3058/udp # videobeans +qsoft 3059/tcp # qsoft +qsoft 3059/udp # qsoft +interserver 3060/tcp # interserver +interserver 3060/udp # interserver +cautcpd 3061/tcp # cautcpd +cautcpd 3061/udp # cautcpd +ncacn-ip-tcp 3062/tcp # ncacn-ip-tcp +ncacn-ip-tcp 3062/udp # ncacn-ip-tcp +ncadg-ip-udp 3063/tcp # ncadg-ip-udp +ncadg-ip-udp 3063/udp # ncadg-ip-udp +rprt 3064/tcp # Remote Port Redirector +rprt 3064/udp # Remote Port Redirector +slinterbase 3065/tcp # slinterbase +slinterbase 3065/udp # slinterbase +netattachsdmp 3066/tcp # NETATTACHSDMP +netattachsdmp 3066/udp # NETATTACHSDMP +fjhpjp 3067/tcp # FJHPJP +fjhpjp 3067/udp # FJHPJP +ls3bcast 3068/tcp # ls3 Broadcast +ls3bcast 3068/udp # ls3 Broadcast +ls3 3069/tcp # ls3 +ls3 3069/udp # ls3 +mgxswitch 3070/tcp # MGXSWITCH +mgxswitch 3070/udp # MGXSWITCH +csd-mgmt-port 3071/tcp # ContinuStor Manager Port +csd-mgmt-port 3071/udp # ContinuStor Manager Port +csd-monitor 3072/tcp # ContinuStor Monitor Port +csd-monitor 3072/udp # ContinuStor Monitor Port +vcrp 3073/tcp # Very simple chatroom prot +vcrp 3073/udp # Very simple chatroom prot +xbox 3074/tcp # Xbox game port +xbox 3074/udp # Xbox game port +orbix-locator 3075/tcp # Orbix 2000 Locator +orbix-locator 3075/udp # Orbix 2000 Locator +orbix-config 3076/tcp # Orbix 2000 Config +orbix-config 3076/udp # Orbix 2000 Config +orbix-loc-ssl 3077/tcp # Orbix 2000 Locator SSL +orbix-loc-ssl 3077/udp # Orbix 2000 Locator SSL +orbix-cfg-ssl 3078/tcp # Orbix 2000 Locator SSL +orbix-cfg-ssl 3078/udp # Orbix 2000 Locator SSL +lv-frontpanel 3079/tcp # LV Front Panel +lv-frontpanel 3079/udp # LV Front Panel +stm_pproc 3080/tcp stm-pproc # stm_pproc +stm_pproc 3080/udp stm-pproc # stm_pproc +tl1-lv 3081/tcp # TL1-LV +tl1-lv 3081/udp # TL1-LV +tl1-raw 3082/tcp # TL1-RAW +tl1-raw 3082/udp # TL1-RAW +tl1-telnet 3083/tcp # TL1-TELNET +tl1-telnet 3083/udp # TL1-TELNET +itm-mccs 3084/tcp # ITM-MCCS +itm-mccs 3084/udp # ITM-MCCS +pcihreq 3085/tcp # PCIHReq +pcihreq 3085/udp # PCIHReq +jdl-dbkitchen 3086/tcp # JDL-DBKitchen +jdl-dbkitchen 3086/udp # JDL-DBKitchen +asoki-sma 3087/tcp # Asoki SMA +asoki-sma 3087/udp # Asoki SMA +xdtp 3088/tcp # eXtensible Data Transfer Protocol +xdtp 3088/udp # eXtensible Data Transfer Protocol +ptk-alink 3089/tcp # ParaTek Agent Linking +ptk-alink 3089/udp # ParaTek Agent Linking +stss 3090/tcp # Senforce Session Services +stss 3090/udp # Senforce Session Services +1ci-smcs 3091/tcp # 1Ci Server Management +1ci-smcs 3091/udp # 1Ci Server Management +rapidmq-center 3093/tcp # Jiiva RapidMQ Center +rapidmq-center 3093/udp # Jiiva RapidMQ Center +rapidmq-reg 3094/tcp # Jiiva RapidMQ Registry +rapidmq-reg 3094/udp # Jiiva RapidMQ Registry +panasas 3095/tcp # Panasas rendevous port +panasas 3095/udp # Panasas rendevous port +ndl-aps 3096/tcp # Active Print Server Port +ndl-aps 3096/udp # Active Print Server Port +itu-bicc-stc 3097/sctp # ITU-T Q.1902.1/Q.2150.3 +umm-port 3098/tcp # Universal Message Manager +umm-port 3098/udp # Universal Message Manager +chmd 3099/tcp # CHIPSY Machine Daemon +chmd 3099/udp # CHIPSY Machine Daemon +opcon-xps 3100/tcp # OpCon/xps +opcon-xps 3100/udp # OpCon/xps +hp-pxpib 3101/tcp # HP PolicyXpert PIB Server +hp-pxpib 3101/udp # HP PolicyXpert PIB Server +slslavemon 3102/tcp # SoftlinK Slave Mon Port +slslavemon 3102/udp # SoftlinK Slave Mon Port +autocuesmi 3103/tcp # Autocue SMI Protocol +autocuesmi 3103/udp # Autocue SMI Protocol +autocuelog 3104/tcp # Autocue Logger Protocol +autocuetime 3104/udp # Autocue Time Service +cardbox 3105/tcp # Cardbox +cardbox 3105/udp # Cardbox +cardbox-http 3106/tcp # Cardbox HTTP +cardbox-http 3106/udp # Cardbox HTTP +business 3107/tcp # Business protocol +business 3107/udp # Business protocol +geolocate 3108/tcp # Geolocate protocol +geolocate 3108/udp # Geolocate protocol +personnel 3109/tcp # Personnel protocol +personnel 3109/udp # Personnel protocol +sim-control 3110/tcp # simulator control port +sim-control 3110/udp # simulator control port +wsynch 3111/tcp # Web Synchronous Services +wsynch 3111/udp # Web Synchronous Services +ksysguard 3112/tcp # KDE System Guard +ksysguard 3112/udp # KDE System Guard +cs-auth-svr 3113/tcp # CS-Authenticate Svr Port +cs-auth-svr 3113/udp # CS-Authenticate Svr Port +ccmad 3114/tcp # CCM AutoDiscover +ccmad 3114/udp # CCM AutoDiscover +mctet-master 3115/tcp # MCTET Master +mctet-master 3115/udp # MCTET Master +mctet-gateway 3116/tcp # MCTET Gateway +mctet-gateway 3116/udp # MCTET Gateway +mctet-jserv 3117/tcp # MCTET Jserv +mctet-jserv 3117/udp # MCTET Jserv +pkagent 3118/tcp # PKAgent +pkagent 3118/udp # PKAgent +d2000kernel 3119/tcp # D2000 Kernel Port +d2000kernel 3119/udp # D2000 Kernel Port +d2000webserver 3120/tcp # D2000 Webserver Port +d2000webserver 3120/udp # D2000 Webserver Port +pcmk-remote 3121/tcp # pacemaker remote service +vtr-emulator 3122/tcp # MTI VTR Emulator port +vtr-emulator 3122/udp # MTI VTR Emulator port +edix 3123/tcp # EDI Translation Protocol +edix 3123/udp # EDI Translation Protocol +beacon-port 3124/tcp # Beacon Port +beacon-port 3124/udp # Beacon Port +a13-an 3125/tcp # A13-AN Interface +a13-an 3125/udp # A13-AN Interface +ctx-bridge 3127/tcp # CTX Bridge Port +ctx-bridge 3127/udp # CTX Bridge Port +ndl-aas 3128/udp # Active API Server Port +netport-id 3129/tcp # NetPort Discovery Port +netport-id 3129/udp # NetPort Discovery Port +netbookmark 3131/tcp # Net Book Mark +netbookmark 3131/udp # Net Book Mark +ms-rule-engine 3132/tcp # Microsoft Business Rule Engine Update Service +ms-rule-engine 3132/udp # Microsoft Business Rule Engine Update Service +prism-deploy 3133/tcp # Prism Deploy User Port +prism-deploy 3133/udp # Prism Deploy User Port +ecp 3134/tcp # Extensible Code Protocol +ecp 3134/udp # Extensible Code Protocol +peerbook-port 3135/tcp # PeerBook Port +peerbook-port 3135/udp # PeerBook Port +grubd 3136/tcp # Grub Server Port +grubd 3136/udp # Grub Server Port +rtnt-1 3137/tcp # rtnt-1 data packets +rtnt-1 3137/udp # rtnt-1 data packets +rtnt-2 3138/tcp # rtnt-2 data packets +rtnt-2 3138/udp # rtnt-2 data packets +incognitorv 3139/tcp # Incognito Rendez-Vous +incognitorv 3139/udp # Incognito Rendez-Vous +ariliamulti 3140/tcp # Arilia Multiplexor +ariliamulti 3140/udp # Arilia Multiplexor +vmodem 3141/tcp # VMODEM +vmodem 3141/udp # VMODEM +rdc-wh-eos 3142/tcp # RDC WH EOS +rdc-wh-eos 3142/udp # RDC WH EOS +seaview 3143/tcp # Sea View +seaview 3143/udp # Sea View +tarantella 3144/tcp # Tarantella +tarantella 3144/udp # Tarantella +csi-lfap 3145/tcp # CSI-LFAP +csi-lfap 3145/udp # CSI-LFAP +bears-02 3146/tcp # bears-02 +bears-02 3146/udp # bears-02 +rfio 3147/tcp # RFIO +rfio 3147/udp # RFIO +nm-game-admin 3148/tcp # NetMike Game Administrator +nm-game-admin 3148/udp # NetMike Game Administrator +nm-game-server 3149/tcp # NetMike Game Server +nm-game-server 3149/udp # NetMike Game Server +nm-asses-admin 3150/tcp # NetMike Assessor Administrator +nm-asses-admin 3150/udp # NetMike Assessor Administrator +nm-assessor 3151/tcp # NetMike Assessor +nm-assessor 3151/udp # NetMike Assessor +feitianrockey 3152/tcp # FeiTian Port +feitianrockey 3152/udp # FeiTian Port +s8-client-port 3153/tcp # S8Cargo Client Port +s8-client-port 3153/udp # S8Cargo Client Port +ccmrmi 3154/tcp # ON RMI Registry +ccmrmi 3154/udp # ON RMI Registry +jpegmpeg 3155/tcp # JpegMpeg Port +jpegmpeg 3155/udp # JpegMpeg Port +indura 3156/tcp # Indura Collector +indura 3156/udp # Indura Collector +e3consultants 3157/tcp # CCC Listener Port +e3consultants 3157/udp # CCC Listener Port +stvp 3158/tcp # SmashTV Protocol +stvp 3158/udp # SmashTV Protocol +navegaweb-port 3159/tcp # NavegaWeb Tarification +navegaweb-port 3159/udp # NavegaWeb Tarification +tip-app-server 3160/tcp # TIP Application Server +tip-app-server 3160/udp # TIP Application Server +doc1lm 3161/tcp # DOC1 License Manager +doc1lm 3161/udp # DOC1 License Manager +sflm 3162/tcp # SFLM +sflm 3162/udp # SFLM +res-sap 3163/tcp # RES-SAP +res-sap 3163/udp # RES-SAP +imprs 3164/tcp # IMPRS +imprs 3164/udp # IMPRS +newgenpay 3165/tcp # Newgenpay Engine Service +newgenpay 3165/udp # Newgenpay Engine Service +sossecollector 3166/tcp # Quest Spotlight Out-Of-Process Collector +sossecollector 3166/udp # Quest Spotlight Out-Of-Process Collector +nowcontact 3167/tcp # Now Contact Public Server +nowcontact 3167/udp # Now Contact Public Server +poweronnud 3168/tcp # Now Up-to-Date Public Server +poweronnud 3168/udp # Now Up-to-Date Public Server +serverview-as 3169/tcp # SERVERVIEW-AS +serverview-as 3169/udp # SERVERVIEW-AS +serverview-asn 3170/tcp # SERVERVIEW-ASN +serverview-asn 3170/udp # SERVERVIEW-ASN +serverview-gf 3171/tcp # SERVERVIEW-GF +serverview-gf 3171/udp # SERVERVIEW-GF +serverview-rm 3172/tcp # SERVERVIEW-RM +serverview-rm 3172/udp # SERVERVIEW-RM +serverview-icc 3173/tcp # SERVERVIEW-ICC +serverview-icc 3173/udp # SERVERVIEW-ICC +armi-server 3174/tcp # ARMI Server +armi-server 3174/udp # ARMI Server +t1-e1-over-ip 3175/tcp # T1_E1_Over_IP +t1-e1-over-ip 3175/udp # T1_E1_Over_IP +ars-master 3176/tcp # ARS Master +ars-master 3176/udp # ARS Master +phonex-port 3177/tcp # Phonex Protocol +phonex-port 3177/udp # Phonex Protocol +radclientport 3178/tcp # Radiance UltraEdge Port +radclientport 3178/udp # Radiance UltraEdge Port +h2gf-w-2m 3179/tcp # H2GF W.2m Handover prot. +h2gf-w-2m 3179/udp # H2GF W.2m Handover prot. +mc-brk-srv 3180/tcp # Millicent Broker Server +mc-brk-srv 3180/udp # Millicent Broker Server +bmcpatrolagent 3181/tcp # BMC Patrol Agent +bmcpatrolagent 3181/udp # BMC Patrol Agent +bmcpatrolrnvu 3182/tcp # BMC Patrol Rendezvous +bmcpatrolrnvu 3182/udp # BMC Patrol Rendezvous +cops-tls 3183/tcp # COPS/TLS +cops-tls 3183/udp # COPS/TLS +apogeex-port 3184/tcp # ApogeeX Port +apogeex-port 3184/udp # ApogeeX Port +smpppd 3185/tcp # SuSE Meta PPPD +smpppd 3185/udp # SuSE Meta PPPD +iiw-port 3186/tcp # IIW Monitor User Port +iiw-port 3186/udp # IIW Monitor User Port +odi-port 3187/tcp # Open Design Listen Port +odi-port 3187/udp # Open Design Listen Port +brcm-comm-port 3188/tcp # Broadcom Port +brcm-comm-port 3188/udp # Broadcom Port +pcle-infex 3189/tcp # Pinnacle Sys InfEx Port +pcle-infex 3189/udp # Pinnacle Sys InfEx Port +csvr-proxy 3190/tcp # ConServR Proxy +csvr-proxy 3190/udp # ConServR Proxy +csvr-sslproxy 3191/tcp # ConServR SSL Proxy +csvr-sslproxy 3191/udp # ConServR SSL Proxy +firemonrcc 3192/tcp # FireMon Revision Control +firemonrcc 3192/udp # FireMon Revision Control +spandataport 3193/tcp # SpanDataPort +spandataport 3193/udp # SpanDataPort +magbind 3194/tcp # Rockstorm MAG protocol +magbind 3194/udp # Rockstorm MAG protocol +ncu-1 3195/tcp # Network Control Unit +ncu-1 3195/udp # Network Control Unit +ncu-2 3196/tcp # Network Control Unit +ncu-2 3196/udp # Network Control Unit +embrace-dp-s 3197/tcp # Embrace Device Protocol Server +embrace-dp-s 3197/udp # Embrace Device Protocol Server +embrace-dp-c 3198/tcp # Embrace Device Protocol Client +embrace-dp-c 3198/udp # Embrace Device Protocol Client +dmod-workspace 3199/tcp # DMOD WorkSpace +dmod-workspace 3199/udp # DMOD WorkSpace +tick-port 3200/tcp # Press-sense Tick Port +tick-port 3200/udp # Press-sense Tick Port +cpq-tasksmart 3201/tcp # CPQ-TaskSmart +cpq-tasksmart 3201/udp # CPQ-TaskSmart +intraintra 3202/tcp # IntraIntra +intraintra 3202/udp # IntraIntra +netwatcher-mon 3203/tcp # Network Watcher Monitor +netwatcher-mon 3203/udp # Network Watcher Monitor +netwatcher-db 3204/tcp # Network Watcher DB Access +netwatcher-db 3204/udp # Network Watcher DB Access +isns 3205/tcp # iSNS Server Port +isns 3205/udp # iSNS Server Port +ironmail 3206/tcp # IronMail POP Proxy +ironmail 3206/udp # IronMail POP Proxy +vx-auth-port 3207/tcp # Veritas Authentication Port +vx-auth-port 3207/udp # Veritas Authentication Port +pfu-prcallback 3208/tcp # PFU PR Callback +pfu-prcallback 3208/udp # PFU PR Callback +netwkpathengine 3209/tcp # HP OpenView Network Path Engine Server +netwkpathengine 3209/udp # HP OpenView Network Path Engine Server +flamenco-proxy 3210/tcp # Flamenco Networks Proxy +flamenco-proxy 3210/udp # Flamenco Networks Proxy +avsecuremgmt 3211/tcp # Avocent Secure Management +avsecuremgmt 3211/udp # Avocent Secure Management +surveyinst 3212/tcp # Survey Instrument +surveyinst 3212/udp # Survey Instrument +neon24x7 3213/tcp # NEON 24X7 Mission Control +neon24x7 3213/udp # NEON 24X7 Mission Control +jmq-daemon-1 3214/tcp # JMQ Daemon Port 1 +jmq-daemon-1 3214/udp # JMQ Daemon Port 1 +jmq-daemon-2 3215/tcp # JMQ Daemon Port 2 +jmq-daemon-2 3215/udp # JMQ Daemon Port 2 +ferrari-foam 3216/tcp # Ferrari electronic FOAM +ferrari-foam 3216/udp # Ferrari electronic FOAM +unite 3217/tcp # Unified IP & Telecomm Environment +unite 3217/udp # Unified IP & Telecomm Environment +smartpackets 3218/tcp # EMC SmartPackets +smartpackets 3218/udp # EMC SmartPackets +wms-messenger 3219/tcp # WMS Messenger +wms-messenger 3219/udp # WMS Messenger +xnm-ssl 3220/tcp # XML NM over SSL +xnm-ssl 3220/udp # XML NM over SSL +xnm-clear-text 3221/tcp # XML NM over TCP +xnm-clear-text 3221/udp # XML NM over TCP +glbp 3222/tcp # Gateway Load Balancing Pr +glbp 3222/udp # Gateway Load Balancing Pr +digivote 3223/tcp # DIGIVOTE (R) Vote-Server +digivote 3223/udp # DIGIVOTE (R) Vote-Server +aes-discovery 3224/tcp # AES Discovery Port +aes-discovery 3224/udp # AES Discovery Port +fcip-port 3225/tcp # FCIP +fcip-port 3225/udp # FCIP +isi-irp 3226/tcp # ISI Industry Software IRP +isi-irp 3226/udp # ISI Industry Software IRP +dwnmshttp 3227/tcp # DiamondWave NMS Server +dwnmshttp 3227/udp # DiamondWave NMS Server +dwmsgserver 3228/tcp # DiamondWave MSG Server +dwmsgserver 3228/udp # DiamondWave MSG Server +global-cd-port 3229/tcp # Global CD Port +global-cd-port 3229/udp # Global CD Port +sftdst-port 3230/tcp # Software Distributor Port +sftdst-port 3230/udp # Software Distributor Port +vidigo 3231/tcp # VidiGo communication +vidigo 3231/udp # VidiGo communication +mdtp 3232/tcp # MDT port +mdtp 3232/udp # MDT port +whisker 3233/tcp # WhiskerControl main port +whisker 3233/udp # WhiskerControl main port +alchemy 3234/tcp # Alchemy Server +alchemy 3234/udp # Alchemy Server +mdap-port 3235/tcp # MDAP port +mdap-port 3235/udp # MDAP Port +apparenet-ts 3236/tcp # appareNet Test Server +apparenet-ts 3236/udp # appareNet Test Server +apparenet-tps 3237/tcp # appareNet Test Packet Sequencer +apparenet-tps 3237/udp # appareNet Test Packet Sequencer +apparenet-as 3238/tcp # appareNet Analysis Server +apparenet-as 3238/udp # appareNet Analysis Server +apparenet-ui 3239/tcp # appareNet User Interface +apparenet-ui 3239/udp # appareNet User Interface +triomotion 3240/tcp # Trio Motion Control Port +triomotion 3240/udp # Trio Motion Control Port +sysorb 3241/tcp # SysOrb Monitoring Server +sysorb 3241/udp # SysOrb Monitoring Server +sdp-id-port 3242/tcp # Session Description ID +sdp-id-port 3242/udp # Session Description ID +timelot 3243/tcp # Timelot Port +timelot 3243/udp # Timelot Port +onesaf 3244/tcp # OneSAF +onesaf 3244/udp # OneSAF +vieo-fe 3245/tcp # VIEO Fabric Executive +vieo-fe 3245/udp # VIEO Fabric Executive +dvt-system 3246/tcp # DVT SYSTEM PORT +dvt-system 3246/udp # DVT SYSTEM PORT +dvt-data 3247/tcp # DVT DATA LINK +dvt-data 3247/udp # DVT DATA LINK +procos-lm 3248/tcp # PROCOS LM +procos-lm 3248/udp # PROCOS LM +ssp 3249/tcp # State Sync Protocol +ssp 3249/udp # State Sync Protocol +hicp 3250/tcp # HMS hicp port +hicp 3250/udp # HMS hicp port +sysscanner 3251/tcp # Sys Scanner +sysscanner 3251/udp # Sys Scanner +dhe 3252/tcp # DHE port +dhe 3252/udp # DHE port +pda-data 3253/tcp # PDA Data +pda-data 3253/udp # PDA Data +pda-sys 3254/tcp # PDA System +pda-sys 3254/udp # PDA System +semaphore 3255/tcp # Semaphore Connection Port +semaphore 3255/udp # Semaphore Connection Port +cpqrpm-agent 3256/tcp # Compaq RPM Agent Port +cpqrpm-agent 3256/udp # Compaq RPM Agent Port +cpqrpm-server 3257/tcp # Compaq RPM Server Port +cpqrpm-server 3257/udp # Compaq RPM Server Port +ivecon-port 3258/tcp # Ivecon Server Port +ivecon-port 3258/udp # Ivecon Server Port +epncdp2 3259/tcp # Epson Network Common Devi +epncdp2 3259/udp # Epson Network Common Devi +iscsi-target 3260/tcp # iSCSI port +iscsi-target 3260/udp # iSCSI port +winshadow 3261/tcp # winShadow +winshadow 3261/udp # winShadow +necp 3262/tcp # NECP +necp 3262/udp # NECP +ecolor-imager 3263/tcp # E-Color Enterprise Imager +ecolor-imager 3263/udp # E-Color Enterprise Imager +ccmail 3264/tcp # cc:mail/lotus +ccmail 3264/udp # cc:mail/lotus +altav-tunnel 3265/tcp # Altav Tunnel +altav-tunnel 3265/udp # Altav Tunnel +ns-cfg-server 3266/tcp # NS CFG Server +ns-cfg-server 3266/udp # NS CFG Server +ibm-dial-out 3267/tcp # IBM Dial Out +ibm-dial-out 3267/udp # IBM Dial Out +msft-gc 3268/tcp # Microsoft Global Catalog +msft-gc 3268/udp # Microsoft Global Catalog +msft-gc-ssl 3269/tcp # Microsoft Global Catalog with LDAP/SSL +msft-gc-ssl 3269/udp # Microsoft Global Catalog with LDAP/SSL +verismart 3270/tcp # Verismart +verismart 3270/udp # Verismart +csoft-prev 3271/tcp # CSoft Prev Port +csoft-prev 3271/udp # CSoft Prev Port +user-manager 3272/tcp # Fujitsu User Manager +user-manager 3272/udp # Fujitsu User Manager +sxmp 3273/tcp # Simple Extensible Multiplexed Protocol +sxmp 3273/udp # Simple Extensible Multiplexed Protocol +ordinox-server 3274/tcp # Ordinox Server +ordinox-server 3274/udp # Ordinox Server +samd 3275/tcp # SAMD +samd 3275/udp # SAMD +maxim-asics 3276/tcp # Maxim ASICs +maxim-asics 3276/udp # Maxim ASICs +awg-proxy 3277/tcp # AWG Proxy +awg-proxy 3277/udp # AWG Proxy +lkcmserver 3278/tcp # LKCM Server +lkcmserver 3278/udp # LKCM Server +admind 3279/tcp # admind +admind 3279/udp # admind +vs-server 3280/tcp # VS Server +vs-server 3280/udp # VS Server +sysopt 3281/tcp # SYSOPT +sysopt 3281/udp # SYSOPT +datusorb 3282/tcp # Datusorb +datusorb 3282/udp # Datusorb +net-assistant 3283/tcp # Apple Remote Desktop - Net Assistant +net-assistant 3283/udp # Apple Remote Desktop - Net Assistant +4talk 3284/tcp # 4Talk +4talk 3284/udp # 4Talk +plato 3285/tcp # Plato +plato 3285/udp # Plato +e-net 3286/tcp # E-Net +e-net 3286/udp # E-Net +directvdata 3287/tcp # DIRECTVDATA +directvdata 3287/udp # DIRECTVDATA +cops 3288/tcp # COPS +cops 3288/udp # COPS +enpc 3289/tcp # ENPC +enpc 3289/udp # ENPC +caps-lm 3290/tcp # CAPS LOGISTICS TOOLKIT - LM +caps-lm 3290/udp # CAPS LOGISTICS TOOLKIT - LM +sah-lm 3291/tcp # S A Holditch & Associates - LM +sah-lm 3291/udp # S A Holditch & Associates - LM +cart-o-rama 3292/tcp # Cart O Rama +cart-o-rama 3292/udp # Cart O Rama +fg-fps 3293/tcp # fg-fps +fg-fps 3293/udp # fg-fps +fg-gip 3294/tcp # fg-gip +fg-gip 3294/udp # fg-gip +dyniplookup 3295/tcp # Dynamic IP Lookup +dyniplookup 3295/udp # Dynamic IP Lookup +rib-slm 3296/tcp # Rib License Manager +rib-slm 3296/udp # Rib License Manager +cytel-lm 3297/tcp # Cytel License Manager +cytel-lm 3297/udp # Cytel License Manager +deskview 3298/tcp # DeskView +deskview 3298/udp # DeskView +pdrncs 3299/tcp # pdrncs +pdrncs 3299/udp # pdrncs +mcs-fastmail 3302/tcp # MCS Fastmail +mcs-fastmail 3302/udp # MCS Fastmail +opsession-clnt 3303/tcp # OP Session Client +opsession-clnt 3303/udp # OP Session Client +opsession-srvr 3304/tcp # OP Session Server +opsession-srvr 3304/udp # OP Session Server +odette-ftp 3305/tcp # ODETTE-FTP +odette-ftp 3305/udp # ODETTE-FTP +opsession-prxy 3307/tcp # OP Session Proxy +opsession-prxy 3307/udp # OP Session Proxy +tns-server 3308/tcp # TNS Server +tns-server 3308/udp # TNS Server +tns-adv 3309/tcp # TNS ADV +tns-adv 3309/udp # TNS ADV +dyna-access 3310/tcp # Dyna Access +dyna-access 3310/udp # Dyna Access +mcns-tel-ret 3311/tcp # MCNS Tel Ret +mcns-tel-ret 3311/udp # MCNS Tel Ret +appman-server 3312/tcp # Application Management Server +appman-server 3312/udp # Application Management Server +uorb 3313/tcp # Unify Object Broker +uorb 3313/udp # Unify Object Broker +uohost 3314/tcp # Unify Object Host +uohost 3314/udp # Unify Object Host +cdid 3315/tcp # CDID +cdid 3315/udp # CDID +aicc-cmi 3316/tcp # AICC/CMI +aicc-cmi 3316/udp # AICC/CMI +vsaiport 3317/tcp # VSAI PORT +vsaiport 3317/udp # VSAI PORT +ssrip 3318/tcp # Swith to Swith Routing Information Protocol +ssrip 3318/udp # Swith to Swith Routing Information Protocol +sdt-lmd 3319/tcp # SDT License Manager +sdt-lmd 3319/udp # SDT License Manager +officelink2000 3320/tcp # Office Link 2000 +officelink2000 3320/udp # Office Link 2000 +vnsstr 3321/tcp # VNSSTR +vnsstr 3321/udp # VNSSTR +sftu 3326/tcp # SFTU +sftu 3326/udp # SFTU +bbars 3327/tcp # BBARS +bbars 3327/udp # BBARS +egptlm 3328/tcp # Eaglepoint License Manager +egptlm 3328/udp # Eaglepoint License Manager +hp-device-disc 3329/tcp # HP Device Disc +hp-device-disc 3329/udp # HP Device Disc +mcs-calypsoicf 3330/tcp # MCS Calypso ICF +mcs-calypsoicf 3330/udp # MCS Calypso ICF +mcs-messaging 3331/tcp # MCS Messaging +mcs-messaging 3331/udp # MCS Messaging +mcs-mailsvr 3332/tcp # MCS Mail Server +mcs-mailsvr 3332/udp # MCS Mail Server +dec-notes 3333/tcp # DEC Notes +dec-notes 3333/udp # DEC Notes +directv-web 3334/tcp # Direct TV Webcasting +directv-web 3334/udp # Direct TV Webcasting +directv-soft 3335/tcp # Direct TV Software Updates +directv-soft 3335/udp # Direct TV Software Updates +directv-tick 3336/tcp # Direct TV Tickers +directv-tick 3336/udp # Direct TV Tickers +directv-catlg 3337/tcp # Direct TV Data Catalog +directv-catlg 3337/udp # Direct TV Data Catalog +anet-b 3338/tcp # OMF data b +anet-b 3338/udp # OMF data b +anet-l 3339/tcp # OMF data l +anet-l 3339/udp # OMF data l +anet-m 3340/tcp # OMF data m +anet-m 3340/udp # OMF data m +anet-h 3341/tcp # OMF data h +anet-h 3341/udp # OMF data h +webtie 3342/tcp # WebTIE +webtie 3342/udp # WebTIE +ms-cluster-net 3343/tcp # MS Cluster Net +ms-cluster-net 3343/udp # MS Cluster Net +bnt-manager 3344/tcp # BNT Manager +bnt-manager 3344/udp # BNT Manager +influence 3345/tcp # Influence +influence 3345/udp # Influence +phoenix-rpc 3347/tcp # Phoenix RPC +phoenix-rpc 3347/udp # Phoenix RPC +pangolin-laser 3348/tcp # Pangolin Laser +pangolin-laser 3348/udp # Pangolin Laser +chevinservices 3349/tcp # Chevin Services +chevinservices 3349/udp # Chevin Services +findviatv 3350/tcp # FINDVIATV +findviatv 3350/udp # FINDVIATV +btrieve 3351/tcp # Btrieve port +btrieve 3351/udp # Btrieve port +ssql 3352/tcp # Scalable SQL +ssql 3352/udp # Scalable SQL +fatpipe 3353/tcp # FATPIPE +fatpipe 3353/udp # FATPIPE +suitjd 3354/tcp # SUITJD +suitjd 3354/udp # SUITJD +ordinox-dbase 3355/tcp # Ordinox Dbase +ordinox-dbase 3355/udp # Ordinox Dbase +upnotifyps 3356/tcp # UPNOTIFYPS +upnotifyps 3356/udp # UPNOTIFYPS +adtech-test 3357/tcp # Adtech Test IP +adtech-test 3357/udp # Adtech Test IP +mpsysrmsvr 3358/tcp # Mp Sys Rmsvr +mpsysrmsvr 3358/udp # Mp Sys Rmsvr +wg-netforce 3359/tcp # WG NetForce +wg-netforce 3359/udp # WG NetForce +kv-server 3360/tcp # KV Server +kv-server 3360/udp # KV Server +kv-agent 3361/tcp # KV Agent +kv-agent 3361/udp # KV Agent +dj-ilm 3362/tcp # DJ ILM +dj-ilm 3362/udp # DJ ILM +nati-vi-server 3363/tcp # NATI Vi Server +nati-vi-server 3363/udp # NATI Vi Server +tip2 3372/tcp # TIP 2 +tip2 3372/udp # TIP 2 +lavenir-lm 3373/tcp # Lavenir License Manager +lavenir-lm 3373/udp # Lavenir License Manager +cluster-disc 3374/tcp # Cluster Disc +cluster-disc 3374/udp # Cluster Disc +vsnm-agent 3375/tcp # VSNM Agent +vsnm-agent 3375/udp # VSNM Agent +cdbroker 3376/tcp # CD Broker +cdbroker 3376/udp # CD Broker +cogsys-lm 3377/tcp # Cogsys Network License Manager +cogsys-lm 3377/udp # Cogsys Network License Manager +wsicopy 3378/tcp # WSICOPY +wsicopy 3378/udp # WSICOPY +socorfs 3379/tcp # SOCORFS +socorfs 3379/udp # SOCORFS +sns-channels 3380/tcp # SNS Channels +sns-channels 3380/udp # SNS Channels +geneous 3381/tcp # Geneous +geneous 3381/udp # Geneous +fujitsu-neat 3382/tcp # Fujitsu Network Enhanced Antitheft function +fujitsu-neat 3382/udp # Fujitsu Network Enhanced Antitheft function +esp-lm 3383/tcp # Enterprise Software Products License Manager +esp-lm 3383/udp # Enterprise Software Products License Manager +hp-clic 3384/tcp # Cluster Management Services +hp-clic 3384/udp # Hardware Management +qnxnetman 3385/tcp # qnxnetman +qnxnetman 3385/udp # qnxnetman +gprs-data 3386/tcp # GPRS Data +gprs-sig 3386/udp # GPRS SIG +backroomnet 3387/tcp # Back Room Net +backroomnet 3387/udp # Back Room Net +cbserver 3388/tcp # CB Server +cbserver 3388/udp # CB Server +ms-wbt-server 3389/tcp # MS WBT Server +ms-wbt-server 3389/udp # MS WBT Server +dsc 3390/tcp # Distributed Service Coordinator +dsc 3390/udp # Distributed Service Coordinator +savant 3391/tcp # SAVANT +savant 3391/udp # SAVANT +efi-lm 3392/tcp # EFI License Management +efi-lm 3392/udp # EFI License Management +d2k-tapestry1 3393/tcp # D2K Tapestry Client to Server +d2k-tapestry1 3393/udp # D2K Tapestry Client to Server +d2k-tapestry2 3394/tcp # D2K Tapestry Server to Server +d2k-tapestry2 3394/udp # D2K Tapestry Server to Server +dyna-lm 3395/tcp # Dyna License Manager (Elam) +dyna-lm 3395/udp # Dyna License Manager (Elam) +printer_agent 3396/tcp printer-agent # Printer Agent +printer_agent 3396/udp printer-agent # Printer Agent +cloanto-lm 3397/tcp # Cloanto License Manager +cloanto-lm 3397/udp # Cloanto License Manager +mercantile 3398/tcp # Mercantile +mercantile 3398/udp # Mercantile +csms 3399/tcp # CSMS +csms 3399/udp # CSMS +csms2 3400/tcp # CSMS2 +csms2 3400/udp # CSMS2 +filecast 3401/tcp # filecast +filecast 3401/udp # filecast +fxaengine-net 3402/tcp # FXa Engine Network Port +fxaengine-net 3402/udp # FXa Engine Network Port +nokia-ann-ch1 3405/tcp # Nokia Announcement ch 1 +nokia-ann-ch1 3405/udp # Nokia Announcement ch 1 +nokia-ann-ch2 3406/tcp # Nokia Announcement ch 2 +nokia-ann-ch2 3406/udp # Nokia Announcement ch 2 +ldap-admin 3407/tcp # LDAP admin server port +ldap-admin 3407/udp # LDAP admin server port +BESApi 3408/tcp # BES Api Port +BESApi 3408/udp # BES Api Port +networklens 3409/tcp # NetworkLens Event Port +networklens 3409/udp # NetworkLens Event Port +networklenss 3410/tcp # NetworkLens SSL Event +networklenss 3410/udp # NetworkLens SSL Event +biolink-auth 3411/tcp # BioLink Authenteon server +biolink-auth 3411/udp # BioLink Authenteon server +xmlblaster 3412/tcp # xmlBlaster +xmlblaster 3412/udp # xmlBlaster +svnet 3413/tcp # SpecView Networking +svnet 3413/udp # SpecView Networking +wip-port 3414/tcp # BroadCloud WIP Port +wip-port 3414/udp # BroadCloud WIP Port +bcinameservice 3415/tcp # BCI Name Service +bcinameservice 3415/udp # BCI Name Service +commandport 3416/tcp # AirMobile IS Command Port +commandport 3416/udp # AirMobile IS Command Port +csvr 3417/tcp # ConServR file translation +csvr 3417/udp # ConServR file translation +rnmap 3418/tcp # Remote nmap +rnmap 3418/udp # Remote nmap +softaudit 3419/tcp # Isogon SoftAudit +softaudit 3419/udp # ISogon SoftAudit +ifcp-port 3420/tcp # iFCP User Port +ifcp-port 3420/udp # iFCP User Port +bmap 3421/tcp # Bull Apprise portmapper +bmap 3421/udp # Bull Apprise portmapper +rusb-sys-port 3422/tcp # Remote USB System Port +rusb-sys-port 3422/udp # Remote USB System Port +xtrm 3423/tcp # xTrade Reliable Messaging +xtrm 3423/udp # xTrade Reliable Messaging +xtrms 3424/tcp # xTrade over TLS/SSL +xtrms 3424/udp # xTrade over TLS/SSL +agps-port 3425/tcp # AGPS Access Port +agps-port 3425/udp # AGPS Access Port +arkivio 3426/tcp # Arkivio Storage Protocol +arkivio 3426/udp # Arkivio Storage Protocol +websphere-snmp 3427/tcp # WebSphere SNMP +websphere-snmp 3427/udp # WebSphere SNMP +twcss 3428/tcp # 2Wire CSS +twcss 3428/udp # 2Wire CSS +gcsp 3429/tcp # GCSP user port +gcsp 3429/udp # GCSP user port +ssdispatch 3430/tcp # Scott Studios Dispatch +ssdispatch 3430/udp # Scott Studios Dispatch +ndl-als 3431/tcp # Active License Server Port +ndl-als 3431/udp # Active License Server Port +osdcp 3432/tcp # Secure Device Protocol +osdcp 3432/udp # Secure Device Protocol +opnet-smp 3433/tcp # OPNET Service Management Platform +opnet-smp 3433/udp # OPNET Service Management Platform +opencm 3434/tcp # OpenCM Server +opencm 3434/udp # OpenCM Server +pacom 3435/tcp # Pacom Security User Port +pacom 3435/udp # Pacom Security User Port +gc-config 3436/tcp # GuardControl Exchange Protocol +gc-config 3436/udp # GuardControl Exchange Protocol +autocueds 3437/tcp # Autocue Directory Service +autocueds 3437/udp # Autocue Directory Service +spiral-admin 3438/tcp # Spiralcraft Admin +spiral-admin 3438/udp # Spiralcraft Admin +hri-port 3439/tcp # HRI Interface Port +hri-port 3439/udp # HRI Interface Port +ans-console 3440/tcp # Net Steward Mgmt Console +ans-console 3440/udp # Net Steward Mgmt Console +connect-client 3441/tcp # OC Connect Client +connect-client 3441/udp # OC Connect Client +connect-server 3442/tcp # OC Connect Server +connect-server 3442/udp # OC Connect Server +ov-nnm-websrv 3443/tcp # OpenView Network Node Manager WEB Server +ov-nnm-websrv 3443/udp # OpenView Network Node Manager WEB Server +denali-server 3444/tcp # Denali Server +denali-server 3444/udp # Denali Server +monp 3445/tcp # Media Object Network +monp 3445/udp # Media Object Network +3comfaxrpc 3446/tcp # 3Com FAX RPC port +3comfaxrpc 3446/udp # 3Com FAX RPC port +directnet 3447/tcp # DirectNet IM System +directnet 3447/udp # DirectNet IM System +dnc-port 3448/tcp # Discovery and Net Config +dnc-port 3448/udp # Discovery and Net Config +hotu-chat 3449/tcp # HotU Chat +hotu-chat 3449/udp # HotU Chat +castorproxy 3450/tcp # CAStorProxy +castorproxy 3450/udp # CAStorProxy +asam 3451/tcp # ASAM Services +asam 3451/udp # ASAM Services +sabp-signal 3452/tcp # SABP-Signalling Protocol +sabp-signal 3452/udp # SABP-Signalling Protocol +pscupd 3453/tcp # PSC Update Port +pscupd 3453/udp # PSC Update Port +mira 3454/tcp # Apple Remote Access Protocol +mira 3454/udp # Apple Remote Access Protocol +vat 3456/tcp # VAT default data +vat 3456/udp # VAT default data +vat-control 3457/tcp # VAT default control +vat-control 3457/udp # VAT default control +d3winosfi 3458/tcp # D3WinOSFI +d3winosfi 3458/udp # D3WinOSFI +integral 3459/tcp # TIP Integral +integral 3459/udp # TIP Integral +edm-manager 3460/tcp # EDM Manger +edm-manager 3460/udp # EDM Manger +edm-stager 3461/tcp # EDM Stager +edm-stager 3461/udp # EDM Stager +edm-std-notify 3462/tcp # EDM STD Notify +edm-std-notify 3462/udp # EDM STD Notify +edm-adm-notify 3463/tcp # EDM ADM Notify +edm-adm-notify 3463/udp # EDM ADM Notify +edm-mgr-sync 3464/tcp # EDM MGR Sync +edm-mgr-sync 3464/udp # EDM MGR Sync +edm-mgr-cntrl 3465/tcp # EDM MGR Cntrl +edm-mgr-cntrl 3465/udp # EDM MGR Cntrl +workflow 3466/tcp # WORKFLOW +workflow 3466/udp # WORKFLOW +rcst 3467/tcp # RCST +rcst 3467/udp # RCST +ttcmremotectrl 3468/tcp # TTCM Remote Controll +ttcmremotectrl 3468/udp # TTCM Remote Controll +pluribus 3469/tcp # Pluribus +pluribus 3469/udp # Pluribus +jt400 3470/tcp # jt400 +jt400 3470/udp # jt400 +jt400-ssl 3471/tcp # jt400-ssl +jt400-ssl 3471/udp # jt400-ssl +jaugsremotec-1 3472/tcp # JAUGS N-G Remotec 1 +jaugsremotec-1 3472/udp # JAUGS N-G Remotec 1 +jaugsremotec-2 3473/tcp # JAUGS N-G Remotec 2 +jaugsremotec-2 3473/udp # JAUGS N-G Remotec 2 +ttntspauto 3474/tcp # TSP Automation +ttntspauto 3474/udp # TSP Automation +genisar-port 3475/tcp # Genisar Comm Port +genisar-port 3475/udp # Genisar Comm Port +nppmp 3476/tcp # NVIDIA Mgmt Protocol +nppmp 3476/udp # NVIDIA Mgmt Protocol +ecomm 3477/tcp # eComm link port +ecomm 3477/udp # eComm link port +stun 3478/tcp stun-behavior turn # Session Traversal Utilities for NAT (STUN) port, TURN over TCP +stun 3478/udp stun-behavior turn # Session Traversal Utilities for NAT (STUN) port, TURN over UDP +twrpc 3479/tcp # 2Wire RPC +twrpc 3479/udp # 2Wire RPC +plethora 3480/tcp # Secure Virtual Workspace +plethora 3480/udp # Secure Virtual Workspace +cleanerliverc 3481/tcp # CleanerLive remote ctrl +cleanerliverc 3481/udp # CleanerLive remote ctrl +vulture 3482/tcp # Vulture Monitoring System +vulture 3482/udp # Vulture Monitoring System +slim-devices 3483/tcp # Slim Devices Protocol +slim-devices 3483/udp # Slim Devices Protocol +gbs-stp 3484/tcp # GBS SnapTalk Protocol +gbs-stp 3484/udp # GBS SnapTalk Protocol +celatalk 3485/tcp # CelaTalk +celatalk 3485/udp # CelaTalk +ifsf-hb-port 3486/tcp # IFSF Heartbeat Port +ifsf-hb-port 3486/udp # IFSF Heartbeat Port +ltctcp 3487/tcp # LISA TCP Transfer Channel +ltcudp 3487/udp # LISA UDP Transfer Channel +fs-rh-srv 3488/tcp # FS Remote Host Server +fs-rh-srv 3488/udp # FS Remote Host Server +dtp-dia 3489/tcp # DTP/DIA +dtp-dia 3489/udp # DTP/DIA +colubris 3490/tcp # Colubris Management Port +colubris 3490/udp # Colubris Management Port +swr-port 3491/tcp # SWR Port +swr-port 3491/udp # SWR Port +tvdumtray-port 3492/tcp # TVDUM Tray Port +tvdumtray-port 3492/udp # TVDUM Tray Port +nut 3493/tcp # Network UPS Tools +nut 3493/udp # Network UPS Tools +ibm3494 3494/tcp # IBM 3494 +ibm3494 3494/udp # IBM 3494 +seclayer-tcp 3495/tcp # securitylayer over tcp +seclayer-tcp 3495/udp # securitylayer over tcp +seclayer-tls 3496/tcp # securitylayer over tls +seclayer-tls 3496/udp # securitylayer over tls +ipether232port 3497/tcp # ipEther232Port +ipether232port 3497/udp # ipEther232Port +dashpas-port 3498/tcp # DASHPAS user port +dashpas-port 3498/udp # DASHPAS user port +sccip-media 3499/tcp # SccIP Media +sccip-media 3499/udp # SccIP Media +rtmp-port 3500/tcp # RTMP Port +rtmp-port 3500/udp # RTMP Port +isoft-p2p 3501/tcp # iSoft-P2P +isoft-p2p 3501/udp # iSoft-P2P +avinstalldisc 3502/tcp # Avocent Install Discovery +avinstalldisc 3502/udp # Avocent Install Discovery +lsp-ping 3503/tcp # MPLS LSP-echo Port +lsp-ping 3503/udp # MPLS LSP-echo Port +ironstorm 3504/tcp # IronStorm game server +ironstorm 3504/udp # IronStorm game server +ccmcomm 3505/tcp # CCM communications port +ccmcomm 3505/udp # CCM communications port +apc-3506 3506/tcp # APC 3506 +apc-3506 3506/udp # APC 3506 +nesh-broker 3507/tcp # Nesh Broker Port +nesh-broker 3507/udp # Nesh Broker Port +interactionweb 3508/tcp # Interaction Web +interactionweb 3508/udp # Interaction Web +vt-ssl 3509/tcp # Virtual Token SSL Port +vt-ssl 3509/udp # Virtual Token SSL Port +xss-port 3510/tcp # XSS Port +xss-port 3510/udp # XSS Port +webmail-2 3511/tcp # WebMail/2 +webmail-2 3511/udp # WebMail/2 +aztec 3512/tcp # Aztec Distribution Port +aztec 3512/udp # Aztec Distribution Port +arcpd 3513/tcp # Adaptec Remote Protocol +arcpd 3513/udp # Adaptec Remote Protocol +must-p2p 3514/tcp # MUST Peer to Peer +must-p2p 3514/udp # MUST Peer to Peer +must-backplane 3515/tcp # MUST Backplane +must-backplane 3515/udp # MUST Backplane +smartcard-port 3516/tcp # Smartcard Port +smartcard-port 3516/udp # Smartcard Port +802-11-iapp 3517/tcp # IEEE 802.11 WLANs WG IAPP +802-11-iapp 3517/udp # IEEE 802.11 WLANs WG IAPP +artifact-msg 3518/tcp # Artifact Message Server +artifact-msg 3518/udp # Artifact Message Server +nvmsgd 3519/tcp # Netvion Messenger Port +galileo 3519/udp # Netvion Galileo Port +galileolog 3520/tcp # Netvion Galileo Log Port +galileolog 3520/udp # Netvion Galileo Log Port +mc3ss 3521/tcp # Telequip Labs MC3SS +mc3ss 3521/udp # Telequip Labs MC3SS +nssocketport 3522/tcp # DO over NSSocketPort +nssocketport 3522/udp # DO over NSSocketPort +odeumservlink 3523/tcp # Odeum Serverlink +odeumservlink 3523/udp # Odeum Serverlink +ecmport 3524/tcp # ECM Server port +ecmport 3524/udp # ECM Server port +eisport 3525/tcp # EIS Server port +eisport 3525/udp # EIS Server port +starquiz-port 3526/tcp # starQuiz Port +starquiz-port 3526/udp # starQuiz Port +beserver-msg-q 3527/tcp # VERITAS Backup Exec Server +beserver-msg-q 3527/udp # VERITAS Backup Exec Server +jboss-iiop 3528/tcp # JBoss IIOP +jboss-iiop 3528/udp # JBoss IIOP +jboss-iiop-ssl 3529/tcp # JBoss IIOP/SSL +jboss-iiop-ssl 3529/udp # JBoss IIOP/SSL +gf 3530/tcp # Grid Friendly +gf 3530/udp # Grid Friendly +joltid 3531/tcp # Joltid +joltid 3531/udp # Joltid +raven-rmp 3532/tcp # Raven Remote Management Control +raven-rmp 3532/udp # Raven Remote Management Control +raven-rdp 3533/tcp # Raven Remote Management Data +raven-rdp 3533/udp # Raven Remote Management Data +urld-port 3534/tcp # URL Daemon Port +urld-port 3534/udp # URL Daemon Port +ms-la 3535/tcp # MS-LA +ms-la 3535/udp # MS-LA +snac 3536/tcp # SNAC +snac 3536/udp # SNAC +ni-visa-remote 3537/tcp # Remote NI-VISA port +ni-visa-remote 3537/udp # Remote NI-VISA port +ibm-diradm 3538/tcp # IBM Directory Server +ibm-diradm 3538/udp # IBM Directory Server +ibm-diradm-ssl 3539/tcp # IBM Directory Server SSL +ibm-diradm-ssl 3539/udp # IBM Directory Server SSL +pnrp-port 3540/tcp # PNRP User Port +pnrp-port 3540/udp # PNRP User Port +voispeed-port 3541/tcp # VoiSpeed Port +voispeed-port 3541/udp # VoiSpeed Port +hacl-monitor 3542/tcp # HA cluster monitor +hacl-monitor 3542/udp # HA cluster monitor +qftest-lookup 3543/tcp # qftest Lookup Port +qftest-lookup 3543/udp # qftest Lookup Port +teredo 3544/tcp # Teredo Port +teredo 3544/udp # Teredo Port +camac 3545/tcp # CAMAC equipment +camac 3545/udp # CAMAC equipment +symantec-sim 3547/tcp # Symantec SIM +symantec-sim 3547/udp # Symantec SIM +interworld 3548/tcp # Interworld +interworld 3548/udp # Interworld +tellumat-nms 3549/tcp # Tellumat MDR NMS +tellumat-nms 3549/udp # Tellumat MDR NMS +ssmpp 3550/tcp # Secure SMPP +ssmpp 3550/udp # Secure SMPP +apcupsd 3551/tcp # Apcupsd Information Port +apcupsd 3551/udp # Apcupsd Information Port +taserver 3552/tcp # TeamAgenda Server Port +taserver 3552/udp # TeamAgenda Server Port +rbr-discovery 3553/tcp # Red Box Recorder ADP +rbr-discovery 3553/udp # Red Box Recorder ADP +questnotify 3554/tcp # Quest Notification Server +questnotify 3554/udp # Quest Notification Server +razor 3555/tcp # Vipul's Razor +razor 3555/udp # Vipul's Razor +sky-transport 3556/tcp # Sky Transport Protocol +sky-transport 3556/udp # Sky Transport Protocol +personalos-001 3557/tcp # PersonalOS Comm Port +personalos-001 3557/udp # PersonalOS Comm Port +mcp-port 3558/tcp # MCP user port +mcp-port 3558/udp # MCP user port +cctv-port 3559/tcp # CCTV control port +cctv-port 3559/udp # CCTV control port +iniserve-port 3560/tcp # INIServe port +iniserve-port 3560/udp # INIServe port +bmc-onekey 3561/tcp # BMC-OneKey +bmc-onekey 3561/udp # BMC-OneKey +sdbproxy 3562/tcp # SDBProxy +sdbproxy 3562/udp # SDBProxy +watcomdebug 3563/tcp # Watcom Debug +watcomdebug 3563/udp # Watcom Debug +esimport 3564/tcp # Electromed SIM port +esimport 3564/udp # Electromed SIM port +m2pa 3565/tcp # M2PA +m2pa 3565/sctp # M2PA +quest-data-hub 3566/tcp # Quest Data Hub +dof-eps 3567/tcp # DOF protocol stack +dof-eps 3567/udp # DOF protocol stack +dof-tunnel-sec 3568/tcp # DOF secure tunnel +dof-tunnel-sec 3568/udp # DOF secure tunnel +mbg-ctrl 3569/tcp # Meinberg Control Service +mbg-ctrl 3569/udp # Meinberg Control Service +mccwebsvr-port 3570/tcp # MCC Web Server Port +mccwebsvr-port 3570/udp # MCC Web Server Port +megardsvr-port 3571/tcp # MegaRAID Server Port +megardsvr-port 3571/udp # MegaRAID Server Port +megaregsvrport 3572/tcp # Registration Server Port +megaregsvrport 3572/udp # Registration Server Port +tag-ups-1 3573/tcp # Advantage Group UPS Suite +tag-ups-1 3573/udp # Advantage Group UPS Suite +dmaf-server 3574/tcp # DMAF Server +dmaf-caster 3574/udp # DMAF Caster +ccm-port 3575/tcp # Coalsere CCM Port +ccm-port 3575/udp # Coalsere CCM Port +cmc-port 3576/tcp # Coalsere CMC Port +cmc-port 3576/udp # Coalsere CMC Port +config-port 3577/tcp # Configuration Port +config-port 3577/udp # Configuration Port +data-port 3578/tcp # Data Port +data-port 3578/udp # Data Port +ttat3lb 3579/tcp # Tarantella Load Balancing +ttat3lb 3579/udp # Tarantella Load Balancing +nati-svrloc 3580/tcp # NATI-ServiceLocator +nati-svrloc 3580/udp # NATI-ServiceLocator +kfxaclicensing 3581/tcp # Ascent Capture Licensing +kfxaclicensing 3581/udp # Ascent Capture Licensing +press 3582/tcp # PEG PRESS Server +press 3582/udp # PEG PRESS Server +canex-watch 3583/tcp # CANEX Watch System +canex-watch 3583/udp # CANEX Watch System +u-dbap 3584/tcp # U-DBase Access Protocol +u-dbap 3584/udp # U-DBase Access Protocol +emprise-lls 3585/tcp # Emprise License Server +emprise-lls 3585/udp # Emprise License Server +emprise-lsc 3586/tcp # License Server Console +emprise-lsc 3586/udp # License Server Console +p2pgroup 3587/tcp # Peer to Peer Grouping +p2pgroup 3587/udp # Peer to Peer Grouping +sentinel 3588/tcp # Sentinel Server +sentinel 3588/udp # Sentinel Server +isomair 3589/tcp # isomair +isomair 3589/udp # isomair +wv-csp-sms 3590/tcp # WV CSP SMS Binding +wv-csp-sms 3590/udp # WV CSP SMS Binding +gtrack-server 3591/tcp # LOCANIS G-TRACK Server +gtrack-server 3591/udp # LOCANIS G-TRACK Server +gtrack-ne 3592/tcp # LOCANIS G-TRACK NE Port +gtrack-ne 3592/udp # LOCANIS G-TRACK NE Port +bpmd 3593/tcp # BP Model Debugger +bpmd 3593/udp # BP Model Debugger +mediaspace 3594/tcp # MediaSpace +mediaspace 3594/udp # MediaSpace +shareapp 3595/tcp # ShareApp +shareapp 3595/udp # ShareApp +iw-mmogame 3596/tcp # Illusion Wireless MMOG +iw-mmogame 3596/udp # Illusion Wireless MMOG +a14 3597/tcp # A14 (AN-to-SC/MM) +a14 3597/udp # A14 (AN-to-SC/MM) +a15 3598/tcp # A15 (AN-to-AN) +a15 3598/udp # A15 (AN-to-AN) +quasar-server 3599/tcp # Quasar Accounting Server +quasar-server 3599/udp # Quasar Accounting Server +trap-daemon 3600/tcp # text relay-answer +trap-daemon 3600/udp # text relay-answer +visinet-gui 3601/tcp # Visinet Gui +visinet-gui 3601/udp # Visinet Gui +infiniswitchcl 3602/tcp # InfiniSwitch Mgr Client +infiniswitchcl 3602/udp # InfiniSwitch Mgr Client +int-rcv-cntrl 3603/tcp # Integrated Rcvr Control +int-rcv-cntrl 3603/udp # Integrated Rcvr Control +bmc-jmx-port 3604/tcp # BMC JMX Port +bmc-jmx-port 3604/udp # BMC JMX Port +comcam-io 3605/tcp # ComCam IO Port +comcam-io 3605/udp # ComCam IO Port +splitlock 3606/tcp # Splitlock Server +splitlock 3606/udp # Splitlock Server +precise-i3 3607/tcp # Precise I3 +precise-i3 3607/udp # Precise I3 +trendchip-dcp 3608/tcp # Trendchip control protocol +trendchip-dcp 3608/udp # Trendchip control protocol +cpdi-pidas-cm 3609/tcp # CPDI PIDAS Connection Mon +cpdi-pidas-cm 3609/udp # CPDI PIDAS Connection Mon +echonet 3610/tcp # ECHONET +echonet 3610/udp # ECHONET +six-degrees 3611/tcp # Six Degrees Port +six-degrees 3611/udp # Six Degrees Port +hp-dataprotect 3612/tcp # HP Data Protector +hp-dataprotect 3612/udp # HP Data Protector +alaris-disc 3613/tcp # Alaris Device Discovery +alaris-disc 3613/udp # Alaris Device Discovery +sigma-port 3614/tcp # Satchwell Sigma +sigma-port 3614/udp # Satchwell Sigma +start-network 3615/tcp # Start Messaging Network +start-network 3615/udp # Start Messaging Network +cd3o-protocol 3616/tcp # cd3o Control Protocol +cd3o-protocol 3616/udp # cd3o Control Protocol +sharp-server 3617/tcp # ATI SHARP Logic Engine +sharp-server 3617/udp # ATI SHARP Logic Engine +aairnet-1 3618/tcp # AAIR-Network 1 +aairnet-1 3618/udp # AAIR-Network 1 +aairnet-2 3619/tcp # AAIR-Network 2 +aairnet-2 3619/udp # AAIR-Network 2 +ep-pcp 3620/tcp # EPSON Projector Control Port +ep-pcp 3620/udp # EPSON Projector Control Port +ep-nsp 3621/tcp # EPSON Network Screen Port +ep-nsp 3621/udp # EPSON Network Screen Port +ff-lr-port 3622/tcp # FF LAN Redundancy Port +ff-lr-port 3622/udp # FF LAN Redundancy Port +haipe-discover 3623/tcp # HAIPIS Dynamic Discovery +haipe-discover 3623/udp # HAIPIS Dynamic Discovery +dist-upgrade 3624/tcp # Distributed Upgrade Port +dist-upgrade 3624/udp # Distributed Upgrade Port +volley 3625/tcp # Volley +volley 3625/udp # Volley +bvcdaemon-port 3626/tcp # bvControl Daemon +bvcdaemon-port 3626/udp # bvControl Daemon +jamserverport 3627/tcp # Jam Server Port +jamserverport 3627/udp # Jam Server Port +ept-machine 3628/tcp # EPT Machine Interface +ept-machine 3628/udp # EPT Machine Interface +escvpnet 3629/tcp # ESC/VP.net +escvpnet 3629/udp # ESC/VP.net +cs-remote-db 3630/tcp # C&S Remote Database Port +cs-remote-db 3630/udp # C&S Remote Database Port +cs-services 3631/tcp # C&S Web Services Port +cs-services 3631/udp # C&S Web Services Port +distcc 3632/udp # distributed compiler +wacp 3633/tcp # Wyrnix AIS port +wacp 3633/udp # Wyrnix AIS port +hlibmgr 3634/tcp # hNTSP Library Manager +hlibmgr 3634/udp # hNTSP Library Manager +sdo 3635/tcp # Simple Distributed Objects +sdo 3635/udp # Simple Distributed Objects +servistaitsm 3636/tcp # SerVistaITSM +servistaitsm 3636/udp # SerVistaITSM +scservp 3637/tcp # Customer Service Port +scservp 3637/udp # Customer Service Port +ehp-backup 3638/tcp # EHP Backup Protocol +ehp-backup 3638/udp # EHP Backup Protocol +xap-ha 3639/tcp # Extensible Automation +xap-ha 3639/udp # Extensible Automation +netplay-port1 3640/tcp # Netplay Port 1 +netplay-port1 3640/udp # Netplay Port 1 +netplay-port2 3641/tcp # Netplay Port 2 +netplay-port2 3641/udp # Netplay Port 2 +juxml-port 3642/tcp # Juxml Replication port +juxml-port 3642/udp # Juxml Replication port +audiojuggler 3643/tcp # AudioJuggler +audiojuggler 3643/udp # AudioJuggler +ssowatch 3644/tcp # ssowatch +ssowatch 3644/udp # ssowatch +cyc 3645/tcp # Cyc +cyc 3645/udp # Cyc +xss-srv-port 3646/tcp # XSS Server Port +xss-srv-port 3646/udp # XSS Server Port +splitlock-gw 3647/tcp # Splitlock Gateway +splitlock-gw 3647/udp # Splitlock Gateway +fjcp 3648/tcp # Fujitsu Cooperation Port +fjcp 3648/udp # Fujitsu Cooperation Port +nmmp 3649/tcp # Nishioka Miyuki Msg Protocol +nmmp 3649/udp # Nishioka Miyuki Msg Protocol +prismiq-plugin 3650/tcp # PRISMIQ VOD plug-in +prismiq-plugin 3650/udp # PRISMIQ VOD plug-in +xrpc-registry 3651/tcp # XRPC Registry +xrpc-registry 3651/udp # XRPC Registry +vxcrnbuport 3652/tcp # VxCR NBU Default Port +vxcrnbuport 3652/udp # VxCR NBU Default Port +tsp 3653/tcp # Tunnel Setup Protocol +tsp 3653/udp # Tunnel Setup Protocol +vaprtm 3654/tcp # VAP RealTime Messenger +vaprtm 3654/udp # VAP RealTime Messenger +abatemgr 3655/tcp # ActiveBatch Exec Agent +abatemgr 3655/udp # ActiveBatch Exec Agent +abatjss 3656/tcp # ActiveBatch Job Scheduler +abatjss 3656/udp # ActiveBatch Job Scheduler +immedianet-bcn 3657/tcp # ImmediaNet Beacon +immedianet-bcn 3657/udp # ImmediaNet Beacon +ps-ams 3658/tcp # PlayStation AMS (Secure) +ps-ams 3658/udp # PlayStation AMS (Secure) +apple-sasl 3659/tcp # Apple SASL +apple-sasl 3659/udp # Apple SASL +can-nds-ssl 3660/tcp # IBM Tivoli Directory Service using SSL +can-nds-ssl 3660/udp # IBM Tivoli Directory Service using SSL +can-ferret-ssl 3661/tcp # IBM Tivoli Directory Service using SSL +can-ferret-ssl 3661/udp # IBM Tivoli Directory Service using SSL +pserver 3662/tcp # pserver +pserver 3662/udp # pserver +dtp 3663/tcp # DIRECWAY Tunnel Protocol +dtp 3663/udp # DIRECWAY Tunnel Protocol +ups-engine 3664/tcp # UPS Engine Port +ups-engine 3664/udp # UPS Engine Port +ent-engine 3665/tcp # Enterprise Engine Port +ent-engine 3665/udp # Enterprise Engine Port +eserver-pap 3666/tcp # IBM eServer PAP +eserver-pap 3666/udp # IBM EServer PAP +infoexch 3667/tcp # IBM Information Exchange +infoexch 3667/udp # IBM Information Exchange +dell-rm-port 3668/tcp # Dell Remote Management +dell-rm-port 3668/udp # Dell Remote Management +casanswmgmt 3669/tcp # CA SAN Switch Management +casanswmgmt 3669/udp # CA SAN Switch Management +smile 3670/tcp # SMILE TCP/UDP Interface +smile 3670/udp # SMILE TCP/UDP Interface +efcp 3671/tcp # e Field Control (EIBnet) +efcp 3671/udp # e Field Control (EIBnet) +lispworks-orb 3672/tcp # LispWorks ORB +lispworks-orb 3672/udp # LispWorks ORB +mediavault-gui 3673/tcp # Openview Media Vault GUI +mediavault-gui 3673/udp # Openview Media Vault GUI +wininstall-ipc 3674/tcp # WinINSTALL IPC Port +wininstall-ipc 3674/udp # WinINSTALL IPC Port +calltrax 3675/tcp # CallTrax Data Port +calltrax 3675/udp # CallTrax Data Port +va-pacbase 3676/tcp # VisualAge Pacbase server +va-pacbase 3676/udp # VisualAge Pacbase server +roverlog 3677/tcp # RoverLog IPC +roverlog 3677/udp # RoverLog IPC +ipr-dglt 3678/tcp # DataGuardianLT +ipr-dglt 3678/udp # DataGuardianLT +newton-dock 3679/tcp # Newton Dock (Escale) +newton-dock 3679/udp # Newton Dock (Escale) +npds-tracker 3680/tcp # NPDS Tracker +npds-tracker 3680/udp # NPDS Tracker +bts-x73 3681/tcp # BTS X73 Port +bts-x73 3681/udp # BTS X73 Port +cas-mapi 3682/tcp # EMC SmartPackets-MAPI +cas-mapi 3682/udp # EMC SmartPackets-MAPI +bmc-ea 3683/tcp # BMC EDV/EA +bmc-ea 3683/udp # BMC EDV/EA +faxstfx-port 3684/tcp # FAXstfX +faxstfx-port 3684/udp # FAXstfX +dsx-agent 3685/tcp # DS Expert Agent +dsx-agent 3685/udp # DS Expert Agent +tnmpv2 3686/tcp # Trivial Network Management +tnmpv2 3686/udp # Trivial Network Management +simple-push 3687/tcp # simple-push +simple-push 3687/udp # simple-push +simple-push-s 3688/tcp # simple-push Secure +simple-push-s 3688/udp # simple-push Secure +daap 3689/tcp # Digital Audio Access Protocol +daap 3689/udp # Digital Audio Access Protocol +magaya-network 3691/tcp # Magaya Network Port +magaya-network 3691/udp # Magaya Network Port +intelsync 3692/tcp # Brimstone IntelSync +intelsync 3692/udp # Brimstone IntelSync +easl 3693/tcp # Emergency Automatic +bmc-data-coll 3695/tcp # BMC Data Collection +bmc-data-coll 3695/udp # BMC Data Collection +telnetcpcd 3696/tcp # Telnet Com Port Control +telnetcpcd 3696/udp # Telnet Com Port Control +nw-license 3697/tcp # NavisWorks License System +nw-license 3697/udp # NavisWorks Licnese System +sagectlpanel 3698/tcp # SAGECTLPANEL +sagectlpanel 3698/udp # SAGECTLPANEL +kpn-icw 3699/tcp # Internet Call Waiting +kpn-icw 3699/udp # Internet Call Waiting +lrs-paging 3700/tcp # LRS NetPage +lrs-paging 3700/udp # LRS NetPage +netcelera 3701/tcp # NetCelera +netcelera 3701/udp # NetCelera +ws-discovery 3702/tcp # Web Service Discovery +ws-discovery 3702/udp # Web Service Discovery +adobeserver-3 3703/tcp # Adobe Server 3 +adobeserver-3 3703/udp # Adobe Server 3 +adobeserver-4 3704/tcp # Adobe Server 4 +adobeserver-4 3704/udp # Adobe Server 4 +adobeserver-5 3705/tcp # Adobe Server 5 +adobeserver-5 3705/udp # Adobe Server 5 +rt-event 3706/tcp # Real-Time Event Port +rt-event 3706/udp # Real-Time Event Port +rt-event-s 3707/tcp # Real-Time Event Secure Port +rt-event-s 3707/udp # Real-Time Event Secure Port +sun-as-iiops 3708/tcp # Sun App Svr - Naming +sun-as-iiops 3708/udp # Sun App Svr - Naming +ca-idms 3709/tcp # CA-IDMS Server +ca-idms 3709/udp # CA-IDMS Server +portgate-auth 3710/tcp # PortGate Authentication +portgate-auth 3710/udp # PortGate Authentication +edb-server2 3711/tcp # EBD Server 2 +edb-server2 3711/udp # EBD Server 2 +sentinel-ent 3712/tcp # Sentinel Enterprise +sentinel-ent 3712/udp # Sentinel Enterprise +tftps 3713/tcp # TFTP over TLS +tftps 3713/udp # TFTP over TLS +delos-dms 3714/tcp # DELOS Direct Messaging +delos-dms 3714/udp # DELOS Direct Messaging +anoto-rendezv 3715/tcp # Anoto Rendezvous Port +anoto-rendezv 3715/udp # Anoto Rendezvous Port +wv-csp-sms-cir 3716/tcp # WV CSP SMS CIR Channel +wv-csp-sms-cir 3716/udp # WV CSP SMS CIR Channel +wv-csp-udp-cir 3717/tcp # WV CSP UDP/IP CIR Channel +wv-csp-udp-cir 3717/udp # WV CSP UDP/IP CIR Channel +opus-services 3718/tcp # OPUS Server Port +opus-services 3718/udp # OPUS Server Port +itelserverport 3719/tcp # iTel Server Port +itelserverport 3719/udp # iTel Server Port +ufastro-instr 3720/tcp # UF Astro. Instr. Services +ufastro-instr 3720/udp # UF Astro. Instr. Services +xsync 3721/tcp # Xsync +xsync 3721/udp # Xsync +xserveraid 3722/tcp # Xserve RAID +xserveraid 3722/udp # Xserve RAID +sychrond 3723/tcp # Sychron Service Daemon +sychrond 3723/udp # Sychron Service Daemon +blizwow 3724/tcp # World of Warcraft +blizwow 3724/udp # World of Warcraft +na-er-tip 3725/tcp # Netia NA-ER Port +na-er-tip 3725/udp # Netia NA-ER Port +array-manager 3726/tcp # Xyratex Array Manager +array-manager 3726/udp # Xyartex Array Manager +e-mdu 3727/tcp # Ericsson Mobile Data Unit +e-mdu 3727/udp # Ericsson Mobile Data Unit +e-woa 3728/tcp # Ericsson Web on Air +e-woa 3728/udp # Ericsson Web on Air +fksp-audit 3729/tcp # Fireking Audit Port +fksp-audit 3729/udp # Fireking Audit Port +client-ctrl 3730/tcp # Client Control +client-ctrl 3730/udp # Client Control +smap 3731/tcp # Service Manager +smap 3731/udp # Service Manager +m-wnn 3732/tcp # Mobile Wnn +m-wnn 3732/udp # Mobile Wnn +multip-msg 3733/tcp # Multipuesto Msg Port +multip-msg 3733/udp # Multipuesto Msg Port +synel-data 3734/tcp # Synel Data Collection Port +synel-data 3734/udp # Synel Data Collection Port +pwdis 3735/tcp # Password Distribution +pwdis 3735/udp # Password Distribution +rs-rmi 3736/tcp # RealSpace RMI +rs-rmi 3736/udp # RealSpace RMI +xpanel 3737/tcp # Xpanel Daemon +versatalk 3738/tcp # versaTalk Server Port +versatalk 3738/udp # versaTalk Server Port +launchbird-lm 3739/tcp # Launchbird LicenseManager +launchbird-lm 3739/udp # Launchbird LicenseManager +heartbeat 3740/tcp # Heartbeat Protocol +heartbeat 3740/udp # Heartbeat Protocol +wysdma 3741/tcp # WysDM Agent +wysdma 3741/udp # WysDM Agent +cst-port 3742/tcp # CST - Configuration & Service Tracker +cst-port 3742/udp # CST - Configuration & Service Tracker +ipcs-command 3743/tcp # IP Control Systems Ltd. +ipcs-command 3743/udp # IP Control Systems Ltd. +sasg 3744/tcp # SASG +sasg 3744/udp # SASG +gw-call-port 3745/tcp # GWRTC Call Port +gw-call-port 3745/udp # GWRTC Call Port +linktest 3746/tcp # LXPRO.COM LinkTest +linktest 3746/udp # LXPRO.COM LinkTest +linktest-s 3747/tcp # LXPRO.COM LinkTest SSL +linktest-s 3747/udp # LXPRO.COM LinkTest SSL +webdata 3748/tcp # webData +webdata 3748/udp # webData +cimtrak 3749/tcp # CimTrak +cimtrak 3749/udp # CimTrak +cbos-ip-port 3750/tcp # CBOS/IP ncapsalation port +cbos-ip-port 3750/udp # CBOS/IP ncapsalatoin port +gprs-cube 3751/tcp # CommLinx GPRS Cube +gprs-cube 3751/udp # CommLinx GPRS Cube +vipremoteagent 3752/tcp # Vigil-IP RemoteAgent +vipremoteagent 3752/udp # Vigil-IP RemoteAgent +nattyserver 3753/tcp # NattyServer Port +nattyserver 3753/udp # NattyServer Port +timestenbroker 3754/tcp # TimesTen Broker Port +timestenbroker 3754/udp # TimesTen Broker Port +sas-remote-hlp 3755/tcp # SAS Remote Help Server +sas-remote-hlp 3755/udp # SAS Remote Help Server +canon-capt 3756/tcp # Canon CAPT Port +canon-capt 3756/udp # Canon CAPT Port +grf-port 3757/tcp # GRF Server Port +grf-port 3757/udp # GRF Server Port +apw-registry 3758/tcp # apw RMI registry +apw-registry 3758/udp # apw RMI registry +exapt-lmgr 3759/tcp # Exapt License Manager +exapt-lmgr 3759/udp # Exapt License Manager +adtempusclient 3760/tcp # adTempus Client +adtempusclient 3760/udp # adTEmpus Client +gsakmp 3761/tcp # gsakmp port +gsakmp 3761/udp # gsakmp port +gbs-smp 3762/tcp # GBS SnapMail Protocol +gbs-smp 3762/udp # GBS SnapMail Protocol +xo-wave 3763/tcp # XO Wave Control Port +xo-wave 3763/udp # XO Wave Control Port +mni-prot-rout 3764/tcp # MNI Protected Routing +mni-prot-rout 3764/udp # MNI Protected Routing +rtraceroute 3765/tcp # Remote Traceroute +rtraceroute 3765/udp # Remote Traceroute +sitewatch-s 3766/tcp # SSL e-watch sitewatch server +listmgr-port 3767/tcp # ListMGR Port +listmgr-port 3767/udp # ListMGR Port +rblcheckd 3768/tcp # rblcheckd server daemon +rblcheckd 3768/udp # rblcheckd server daemon +haipe-otnk 3769/tcp # HAIPE Network Keying +haipe-otnk 3769/udp # HAIPE Network Keying +cindycollab 3770/tcp # Cinderella Collaboration +cindycollab 3770/udp # Cinderella Collaboration +paging-port 3771/tcp # RTP Paging Port +paging-port 3771/udp # RTP Paging Port +ctp 3772/tcp # Chantry Tunnel Protocol +ctp 3772/udp # Chantry Tunnel Protocol +ctdhercules 3773/tcp # ctdhercules +ctdhercules 3773/udp # ctdhercules +zicom 3774/tcp # ZICOM +zicom 3774/udp # ZICOM +ispmmgr 3775/tcp # ISPM Manager Port +ispmmgr 3775/udp # ISPM Manager Port +dvcprov-port 3776/tcp # Device Provisioning Port +dvcprov-port 3776/udp # Device Provisioning Port +jibe-eb 3777/tcp # Jibe EdgeBurst +jibe-eb 3777/udp # Jibe EdgeBurst +c-h-it-port 3778/tcp # Cutler-Hammer IT Port +c-h-it-port 3778/udp # Cutler-Hammer IT Port +cognima 3779/tcp # Cognima Replication +cognima 3779/udp # Cognima Replication +nnp 3780/tcp # Nuzzler Network Protocol +nnp 3780/udp # Nuzzler Network Protocol +abcvoice-port 3781/tcp # ABCvoice server port +abcvoice-port 3781/udp # ABCvoice server port +iso-tp0s 3782/tcp # Secure ISO TP0 port +iso-tp0s 3782/udp # Secure ISO TP0 port +bim-pem 3783/tcp # Impact Mgr./PEM Gateway +bim-pem 3783/udp # Impact Mgr./PEM Gateway +bfd-control 3784/tcp # BFD Control Protocol +bfd-control 3784/udp # BFD Control Protocol +bfd-echo 3785/tcp # BFD Echo Protocol +bfd-echo 3785/udp # BFD Echo Protocol +upstriggervsw 3786/tcp # VSW Upstrigger port +upstriggervsw 3786/udp # VSW Upstrigger port +fintrx 3787/tcp # Fintrx +fintrx 3787/udp # Fintrx +isrp-port 3788/tcp # SPACEWAY Routing port +isrp-port 3788/udp # SPACEWAY Routing port +remotedeploy 3789/tcp # RemoteDeploy Administration Port +remotedeploy 3789/udp # RemoteDeploy Administration Port +quickbooksrds 3790/tcp # QuickBooks RDS +quickbooksrds 3790/udp # QuickBooks RDS +tvnetworkvideo 3791/tcp # TV NetworkVideo Data port +tvnetworkvideo 3791/udp # TV NetworkVideo Data port +sitewatch 3792/tcp # e-Watch Corporation SiteWatch +sitewatch 3792/udp # e-Watch Corporation SiteWatch +dcsoftware 3793/tcp # DataCore Software +dcsoftware 3793/udp # DataCore Software +jaus 3794/tcp # JAUS Robots +jaus 3794/udp # JAUS Robots +myblast 3795/tcp # myBLAST Mekentosj port +myblast 3795/udp # myBLAST Mekentosj port +spw-dialer 3796/tcp # Spaceway Dialer +spw-dialer 3796/udp # Spaceway Dialer +idps 3797/tcp # idps +idps 3797/udp # idps +minilock 3798/tcp # Minilock +minilock 3798/udp # Minilock +radius-dynauth 3799/tcp # RADIUS Dynamic Authorization +radius-dynauth 3799/udp # RADIUS Dynamic Authorization +pwgpsi 3800/tcp # Print Services Interface +pwgpsi 3800/udp # Print Services Interface +ibm-mgr 3801/tcp # ibm manager service +ibm-mgr 3801/udp # ibm manager service +vhd 3802/tcp # VHD +vhd 3802/udp # VHD +soniqsync 3803/tcp # SoniqSync +soniqsync 3803/udp # SoniqSync +iqnet-port 3804/tcp # Harman IQNet Port +iqnet-port 3804/udp # Harman IQNet Port +tcpdataserver 3805/tcp # ThorGuard Server Port +tcpdataserver 3805/udp # ThorGuard Server Port +wsmlb 3806/tcp # Remote System Manager +wsmlb 3806/udp # Remote System Manager +spugna 3807/tcp # SpuGNA Communication Port +spugna 3807/udp # SpuGNA Communication Port +sun-as-iiops-ca 3808/tcp # Sun App Svr-IIOPClntAuth +sun-as-iiops-ca 3808/udp # Sun App Svr-IIOPClntAuth +apocd 3809/tcp # Java Desktop System Configuration Agent +apocd 3809/udp # Java Desktop System Configuration Agent +wlanauth 3810/tcp # WLAN AS server +wlanauth 3810/udp # WLAN AS server +amp 3811/tcp # AMP +amp 3811/udp # AMP +neto-wol-server 3812/tcp # netO WOL Server +neto-wol-server 3812/udp # netO WOL Server +rap-ip 3813/tcp # Rhapsody Interface Protocol +rap-ip 3813/udp # Rhapsody Interface Protocol +neto-dcs 3814/tcp # netO DCS +neto-dcs 3814/udp # netO DCS +lansurveyorxml 3815/tcp # LANsurveyor XML +lansurveyorxml 3815/udp # LANsurveyor XML +sunlps-http 3816/tcp # Sun Local Patch Server +sunlps-http 3816/udp # Sun Local Patch Server +tapeware 3817/tcp # Yosemite Tech Tapeware +tapeware 3817/udp # Yosemite Tech Tapeware +crinis-hb 3818/tcp # Crinis Heartbeat +crinis-hb 3818/udp # Crinis Heartbeat +epl-slp 3819/tcp # EPL Sequ Layer Protocol +epl-slp 3819/udp # EPL Sequ Layer Protocol +scp 3820/tcp # Siemens AuD SCP +scp 3820/udp # Siemens AuD SCP +pmcp 3821/tcp # ATSC PMCP Standard +pmcp 3821/udp # ATSC PMCP Standard +acp-discovery 3822/tcp # Compute Pool Discovery +acp-discovery 3822/udp # Compute Pool Discovery +acp-conduit 3823/tcp # Compute Pool Conduit +acp-conduit 3823/udp # Compute Pool Conduit +acp-policy 3824/tcp # Compute Pool Policy +acp-policy 3824/udp # Compute Pool Policy +ffserver 3825/tcp # Antera FlowFusion Process Simulation +ffserver 3825/udp # Antera FlowFusion Process Simulation +warmux 3826/tcp # WarMUX game server +warmux 3826/udp # WarMUX game server +netmpi 3827/tcp # Netadmin Systems MPI service +netmpi 3827/udp # Netadmin Systems MPI service +neteh 3828/tcp # Netadmin Systems Event Handler +neteh 3828/udp # Netadmin Systems Event Handler +neteh-ext 3829/tcp # Netadmin Systems Event Handler External +neteh-ext 3829/udp # Netadmin Systems Event Handler External +cernsysmgmtagt 3830/tcp # Cerner System Management Agent +cernsysmgmtagt 3830/udp # Cerner System Management Agent +dvapps 3831/tcp # Docsvault Application Service +dvapps 3831/udp # Docsvault Application Service +xxnetserver 3832/tcp # xxNETserver +xxnetserver 3832/udp # xxNETserver +aipn-auth 3833/tcp # AIPN LS Authentication +aipn-auth 3833/udp # AIPN LS Authentication +spectardata 3834/tcp # Spectar Data Stream Service +spectardata 3834/udp # Spectar Data Stream Service +spectardb 3835/tcp # Spectar Database Rights Service +spectardb 3835/udp # Spectar Database Rights Service +markem-dcp 3836/tcp # MARKEM NEXTGEN DCP +markem-dcp 3836/udp # MARKEM NEXTGEN DCP +mkm-discovery 3837/tcp # MARKEM Auto-Discovery +mkm-discovery 3837/udp # MARKEM Auto-Discovery +sos 3838/tcp # Scito Object Server +sos 3838/udp # Scito Object Server +amx-rms 3839/tcp # AMX Resource Management Suite +amx-rms 3839/udp # AMX Resource Management Suite +flirtmitmir 3840/tcp # www.FlirtMitMir.de +flirtmitmir 3840/udp # www.FlirtMitMir.de +shiprush-db-svr 3841/tcp # ShipRush Database Server +nhci 3842/tcp # NHCI status port +nhci 3842/udp # NHCI status port +quest-agent 3843/tcp # Quest Common Agent +quest-agent 3843/udp # Quest Common Agent +rnm 3844/tcp # RNM +rnm 3844/udp # RNM +v-one-spp 3845/tcp # V-ONE Single Port Proxy +v-one-spp 3845/udp # V-ONE Single Port Proxy +an-pcp 3846/tcp # Astare Network PCP +an-pcp 3846/udp # Astare Network PCP +msfw-control 3847/tcp # MS Firewall Control +msfw-control 3847/udp # MS Firewall Control +item 3848/tcp # IT Environmental Monitor +item 3848/udp # IT Environmental Monitor +spw-dnspreload 3849/tcp # SPACEWAY DNS Preload +spw-dnspreload 3849/udp # SPACEWAY DNS Prelaod +qtms-bootstrap 3850/tcp # QTMS Bootstrap Protocol +qtms-bootstrap 3850/udp # QTMS Bootstrap Protocol +spectraport 3851/tcp # SpectraTalk Port +spectraport 3851/udp # SpectraTalk Port +sse-app-config 3852/tcp # SSE App Configuration +sse-app-config 3852/udp # SSE App Configuration +sscan 3853/tcp # SONY scanning protocol +sscan 3853/udp # SONY scanning protocol +stryker-com 3854/tcp # Stryker Comm Port +stryker-com 3854/udp # Stryker Comm Port +opentrac 3855/tcp # OpenTRAC +opentrac 3855/udp # OpenTRAC +informer 3856/tcp # INFORMER +informer 3856/udp # INFORMER +trap-port 3857/tcp # Trap Port +trap-port 3857/udp # Trap Port +trap-port-mom 3858/tcp # Trap Port MOM +trap-port-mom 3858/udp # Trap Port MOM +nav-port 3859/tcp # Navini Port +nav-port 3859/udp # Navini Port +sasp 3860/tcp # Server/Application State Protocol (SASP) +sasp 3860/udp # Server/Application State Protocol (SASP) +winshadow-hd 3861/tcp # winShadow Host Discovery +winshadow-hd 3861/udp # winShadow Host Discovery +giga-pocket 3862/tcp # GIGA-POCKET +giga-pocket 3862/udp # GIGA-POCKET +asap-tcp 3863/tcp # asap tcp port +asap-udp 3863/udp # asap udp port +asap-sctp 3863/sctp # asap sctp +asap-tcp-tls 3864/tcp # asap/tls tcp port +asap-sctp-tls 3864/sctp # asap-sctp/tls +xpl 3865/tcp # xpl automation protocol +xpl 3865/udp # xpl automation protocol +dzdaemon 3866/tcp # Sun SDViz DZDAEMON Port +dzdaemon 3866/udp # Sun SDViz DZDAEMON Port +dzoglserver 3867/tcp # Sun SDViz DZOGLSERVER Port +dzoglserver 3867/udp # Sun SDViz DZOGLSERVER Port +diameter 3868/tcp # DIAMETER +diameter 3868/sctp # DIAMETER +ovsam-mgmt 3869/tcp # hp OVSAM MgmtServer Disco +ovsam-mgmt 3869/udp # hp OVSAM MgmtServer Disco +ovsam-d-agent 3870/tcp # hp OVSAM HostAgent Disco +ovsam-d-agent 3870/udp # hp OVSAM HostAgent Disco +avocent-adsap 3871/tcp # Avocent DS Authorization +avocent-adsap 3871/udp # Avocent DS Authorization +oem-agent 3872/tcp # OEM Agent +oem-agent 3872/udp # OEM Agent +fagordnc 3873/tcp # fagordnc +fagordnc 3873/udp # fagordnc +sixxsconfig 3874/tcp # SixXS Configuration +sixxsconfig 3874/udp # SixXS Configuration +pnbscada 3875/tcp # PNBSCADA +pnbscada 3875/udp # PNBSCADA +dl_agent 3876/tcp dl-agent # DirectoryLockdown Agent +dl_agent 3876/udp dl-agent # DirectoryLockdown Agent +xmpcr-interface 3877/tcp # XMPCR Interface Port +xmpcr-interface 3877/udp # XMPCR Interface Port +fotogcad 3878/tcp # FotoG CAD interface +fotogcad 3878/udp # FotoG CAD interface +appss-lm 3879/tcp # appss license manager +appss-lm 3879/udp # appss license manager +igrs 3880/tcp # IGRS +igrs 3880/udp # IGRS +idac 3881/tcp # Data Acquisition and Control +idac 3881/udp # Data Acquisition and Control +msdts1 3882/tcp # DTS Service Port +msdts1 3882/udp # DTS Service Port +vrpn 3883/tcp # VR Peripheral Network +vrpn 3883/udp # VR Peripheral Network +softrack-meter 3884/tcp # SofTrack Metering +softrack-meter 3884/udp # SofTrack Metering +topflow-ssl 3885/tcp # TopFlow SSL +topflow-ssl 3885/udp # TopFlow SSL +nei-management 3886/tcp # NEI management port +nei-management 3886/udp # NEI management port +ciphire-data 3887/tcp # Ciphire Data Transport +ciphire-data 3887/udp # Ciphire Data Transport +ciphire-serv 3888/tcp # Ciphire Services +ciphire-serv 3888/udp # Ciphire Services +dandv-tester 3889/tcp # D and V Tester Control Port +dandv-tester 3889/udp # D and V Tester Control Port +ndsconnect 3890/tcp # Niche Data Server Connect +ndsconnect 3890/udp # Niche Data Server Connect +rtc-pm-port 3891/tcp # Oracle RTC-PM port +rtc-pm-port 3891/udp # Oracle RTC-PM port +pcc-image-port 3892/tcp # PCC-image-port +pcc-image-port 3892/udp # PCC-image-port +cgi-starapi 3893/tcp # CGI StarAPI Server +cgi-starapi 3893/udp # CGI StarAPI Server +syam-agent 3894/tcp # SyAM Agent Port +syam-agent 3894/udp # SyAM Agent Port +syam-smc 3895/tcp # SyAm SMC Service Port +syam-smc 3895/udp # SyAm SMC Service Port +sdo-tls 3896/tcp # Simple Distributed Objects over TLS +sdo-tls 3896/udp # Simple Distributed Objects over TLS +sdo-ssh 3897/tcp # Simple Distributed Objects over SSH +sdo-ssh 3897/udp # Simple Distributed Objects over SSH +senip 3898/tcp # IAS, Inc. SmartEye NET Internet Protocol +senip 3898/udp # IAS, Inc. SmartEye NET Internet Protocol +itv-control 3899/tcp # ITV Port +itv-control 3899/udp # ITV Port +### 3900 tcp/udp reserved udt-os/udt_os +nimsh 3901/tcp # NIM Service Handler +nimsh 3901/udp # NIM Service Handler +nimaux 3902/tcp # NIMsh Auxiliary Port +nimaux 3902/udp # NIMsh Auxiliary Port +charsetmgr 3903/tcp # CharsetMGR +charsetmgr 3903/udp # CharsetMGR +omnilink-port 3904/tcp # Arnet Omnilink Port +omnilink-port 3904/udp # Arnet Omnilink Port +mupdate 3905/tcp # Mailbox Update (MUPDATE) protocol +mupdate 3905/udp # Mailbox Update (MUPDATE) protocol +topovista-data 3906/tcp # TopoVista elevation data +topovista-data 3906/udp # TopoVista elevation data +imoguia-port 3907/tcp # Imoguia Port +imoguia-port 3907/udp # Imoguia Port +hppronetman 3908/tcp # HP Procurve NetManagement +hppronetman 3908/udp # HP Procurve NetManagement +surfcontrolcpa 3909/tcp # SurfControl CPA +surfcontrolcpa 3909/udp # SurfControl CPA +prnrequest 3910/tcp # Printer Request Port +prnrequest 3910/udp # Printer Request Port +prnstatus 3911/tcp # Printer Status Port +prnstatus 3911/udp # Printer Status Port +gbmt-stars 3912/tcp # Global Maintech Stars +gbmt-stars 3912/udp # Global Maintech Stars +listcrt-port 3913/tcp # ListCREATOR Port +listcrt-port 3913/udp # ListCREATOR Port +listcrt-port-2 3914/tcp # ListCREATOR Port 2 +listcrt-port-2 3914/udp # ListCREATOR Port 2 +agcat 3915/tcp # Auto-Graphics Cataloging +agcat 3915/udp # Auto-Graphics Cataloging +wysdmc 3916/tcp # WysDM Controller +wysdmc 3916/udp # WysDM Controller +aftmux 3917/tcp # AFT multiplex port +aftmux 3917/udp # AFT multiples port +pktcablemmcops 3918/tcp # PacketCableMultimediaCOPS +pktcablemmcops 3918/udp # PacketCableMultimediaCOPS +hyperip 3919/tcp # HyperIP +hyperip 3919/udp # HyperIP +exasoftport1 3920/tcp # Exasoft IP Port +exasoftport1 3920/udp # Exasoft IP Port +herodotus-net 3921/tcp # Herodotus Net +herodotus-net 3921/udp # Herodotus Net +sor-update 3922/tcp # Soronti Update Port +sor-update 3922/udp # Soronti Update Port +symb-sb-port 3923/tcp # Symbian Service Broker +symb-sb-port 3923/udp # Symbian Service Broker +mpl-gprs-port 3924/tcp # MPL_GPRS_PORT +mpl-gprs-port 3924/udp # MPL_GPRS_Port +zmp 3925/tcp # Zoran Media Port +zmp 3925/udp # Zoran Media Port +winport 3926/tcp # WINPort +winport 3926/udp # WINPort +natdataservice 3927/tcp # ScsTsr +natdataservice 3927/udp # ScsTsr +netboot-pxe 3928/tcp # PXE NetBoot Manager +netboot-pxe 3928/udp # PXE NetBoot Manager +smauth-port 3929/tcp # AMS Port +smauth-port 3929/udp # AMS Port +syam-webserver 3930/tcp # Syam Web Server Port +syam-webserver 3930/udp # Syam Web Server Port +msr-plugin-port 3931/tcp # MSR Plugin Port +msr-plugin-port 3931/udp # MSR Plugin Port +dyn-site 3932/tcp # Dynamic Site System +dyn-site 3932/udp # Dynamic Site System +plbserve-port 3933/tcp # PL/B App Server User Port +plbserve-port 3933/udp # PL/B App Server User Port +sunfm-port 3934/tcp # PL/B File Manager Port +sunfm-port 3934/udp # PL/B File Manager Port +sdp-portmapper 3935/tcp # SDP Port Mapper Protocol +sdp-portmapper 3935/udp # SDP Port Mapper Protocol +mailprox 3936/tcp # Mailprox +mailprox 3936/udp # Mailprox +dvbservdsc 3937/tcp # DVB Service Discovery +dvbservdsc 3937/udp # DVB Service Discovery +dbcontrol_agent 3938/tcp dbcontrol-agent # Oracle dbControl Agent po +dbcontrol_agent 3938/udp dbcontrol-agent # Oracle dbControl Agent po +aamp 3939/tcp # Anti-virus Application Management Port +aamp 3939/udp # Anti-virus Application Management Port +xecp-node 3940/tcp # XeCP Node Service +xecp-node 3940/udp # XeCP Node Service +homeportal-web 3941/tcp # Home Portal Web Server +homeportal-web 3941/udp # Home Portal Web Server +srdp 3942/tcp # satellite distribution +srdp 3942/udp # satellite distribution +tig 3943/tcp # TetraNode Ip Gateway +tig 3943/udp # TetraNode Ip Gateway +sops 3944/tcp # S-Ops Management +sops 3944/udp # S-Ops Management +emcads 3945/tcp # EMCADS Server Port +emcads 3945/udp # EMCADS Server Port +backupedge 3946/tcp # BackupEDGE Server +backupedge 3946/udp # BackupEDGE Server +ccp 3947/tcp # Connect and Control Protocol for Consumer, Commercial, and Industrial Electronic Devices +ccp 3947/udp # Connect and Control Protocol for Consumer, Commercial, and Industrial Electronic Devices +apdap 3948/tcp # Anton Paar Device Administration Protocol +apdap 3948/udp # Anton Paar Device Administration Protocol +drip 3949/tcp # Dynamic Routing Information Protocol +drip 3949/udp # Dynamic Routing Information Protocol +namemunge 3950/tcp # Name Munging +namemunge 3950/udp # Name Munging +pwgippfax 3951/tcp # PWG IPP Facsimile +pwgippfax 3951/udp # PWG IPP Facsimile +i3-sessionmgr 3952/tcp # I3 Session Manager +i3-sessionmgr 3952/udp # I3 Session Manager +xmlink-connect 3953/tcp # Eydeas XMLink Connect +xmlink-connect 3953/udp # Eydeas XMLink Connect +adrep 3954/tcp # AD Replication RPC +adrep 3954/udp # AD Replication RPC +p2pcommunity 3955/tcp # p2pCommunity +p2pcommunity 3955/udp # p2pCommunity +gvcp 3956/tcp # GigE Vision Control +gvcp 3956/udp # GigE Vision Control +mqe-broker 3957/tcp # MQEnterprise Broker +mqe-broker 3957/udp # MQEnterprise Broker +mqe-agent 3958/tcp # MQEnterprise Agent +mqe-agent 3958/udp # MQEnterprise Agent +treehopper 3959/tcp # Tree Hopper Networking +treehopper 3959/udp # Tree Hopper Networking +bess 3960/tcp # Bess Peer Assessment +bess 3960/udp # Bess Peer Assessment +proaxess 3961/tcp # ProAxess Server +proaxess 3961/udp # ProAxess Server +sbi-agent 3962/tcp # SBI Agent Protocol +sbi-agent 3962/udp # SBI Agent Protocol +thrp 3963/tcp # Teran Hybrid Routing Protocol +thrp 3963/udp # Teran Hybrid Routing Protocol +sasggprs 3964/tcp # SASG GPRS +sasggprs 3964/udp # SASG GPRS +ati-ip-to-ncpe 3965/tcp # Avanti IP to NCPE API +ati-ip-to-ncpe 3965/udp # Avanti IP to NCPE API +bflckmgr 3966/tcp # BuildForge Lock Manager +bflckmgr 3966/udp # BuildForge Lock Manager +ppsms 3967/tcp # PPS Message Service +ppsms 3967/udp # PPS Message Service +ianywhere-dbns 3968/tcp # iAnywhere DBNS +ianywhere-dbns 3968/udp # iAnywhere DBNS +landmarks 3969/tcp # Landmark Messages +landmarks 3969/udp # Landmark Messages +lanrevagent 3970/tcp # LANrev Agent +lanrevagent 3970/udp # LANrev Agent +lanrevserver 3971/tcp # LANrev Server +lanrevserver 3971/udp # LANrev Server +iconp 3972/tcp # ict-control Protocol +iconp 3972/udp # ict-control Protocol +progistics 3973/tcp # ConnectShip Progistics +progistics 3973/udp # ConnectShip Progistics +citysearch 3974/tcp # Remote Applicant Tracking Service +citysearch 3974/udp # Remote Applicant Tracking Service +airshot 3975/tcp # Air Shot +airshot 3975/udp # Air Shot +opswagent 3976/tcp # Server Automation Agent +opswagent 3976/udp # Server Automation Agent +opswmanager 3977/tcp # Opsware Manager +opswmanager 3977/udp # Opsware Manager +secure-cfg-svr 3978/tcp # Secured Configuration Server +secure-cfg-svr 3978/udp # Secured Configuration Server +smwan 3979/tcp # Smith Micro Wide Area Network Service +smwan 3979/udp # Smith Micro Wide Area Network Service +acms 3980/tcp # Aircraft Cabin Management System +acms 3980/udp # Aircraft Cabin Management System +starfish 3981/tcp # Starfish System Admin +starfish 3981/udp # Starfish System Admin +eis 3982/tcp # ESRI Image Server +eis 3982/udp # ESRI Image Server +eisp 3983/tcp # ESRI Image Service +eisp 3983/udp # ESRI Image Service +mapper-nodemgr 3984/tcp # MAPPER network node manager +mapper-nodemgr 3984/udp # MAPPER network node manager +mapper-mapethd 3985/tcp # MAPPER TCP/IP server +mapper-mapethd 3985/udp # MAPPER TCP/IP server +mapper-ws_ethd 3986/tcp mapper-ws-ethd # MAPPER workstation server +mapper-ws_ethd 3986/udp mapper-ws-ethd # MAPPER workstation server +centerline 3987/tcp # Centerline +centerline 3987/udp # Centerline +dcs-config 3988/tcp # DCS Configuration Port +dcs-config 3988/udp # DCS Configuration Port +bv-queryengine 3989/tcp # BindView-Query Engine +bv-queryengine 3989/udp # BindView-Query Engine +bv-is 3990/tcp # BindView-IS +bv-is 3990/udp # BindView-IS +bv-smcsrv 3991/tcp # BindView-SMCServer +bv-smcsrv 3991/udp # BindView-SMCServer +bv-ds 3992/tcp # BindView-DirectoryServer +bv-ds 3992/udp # BindView-DirectoryServer +bv-agent 3993/tcp # BindView-Agent +bv-agent 3993/udp # BindView-Agent +iss-mgmt-ssl 3995/tcp # ISS Management Svcs SSL +iss-mgmt-ssl 3995/udp # ISS Management Svcs SSL +abcsoftware 3996/tcp # abcsoftware-01 +abcsoftware 3996/udp # abcsoftware-01 +agentsease-db 3997/tcp # aes_db +agentsease-db 3997/udp # aes_db +dnx 3998/tcp # Distributed Nagios Executor Service +dnx 3998/udp # Distributed Nagios Executor Service +nvcnet 3999/tcp # Norman distributes scanning service +nvcnet 3999/udp # Norman distributes scanning service +terabase 4000/tcp # Terabase +terabase 4000/udp # Terabase +newoak 4001/tcp # NewOak +newoak 4001/udp # NewOak +pxc-spvr-ft 4002/tcp # pxc-spvr-ft +pxc-spvr-ft 4002/udp # pxc-spvr-ft +pxc-splr-ft 4003/tcp # pxc-splr-ft +pxc-splr-ft 4003/udp # pxc-splr-ft +pxc-roid 4004/tcp # pxc-roid +pxc-roid 4004/udp # pxc-roid +pxc-pin 4005/tcp # pxc-pin +pxc-pin 4005/udp # pxc-pin +pxc-spvr 4006/tcp # pxc-spvr +pxc-spvr 4006/udp # pxc-spvr +pxc-splr 4007/tcp # pxc-splr +pxc-splr 4007/udp # pxc-splr +netcheque 4008/tcp # NetCheque accounting +netcheque 4008/udp # NetCheque accounting +chimera-hwm 4009/tcp # Chimera HWM +chimera-hwm 4009/udp # Chimera HWM +samsung-unidex 4010/tcp # Samsung Unidex +samsung-unidex 4010/udp # Samsung Unidex +altserviceboot 4011/tcp # Alternate Service Boot +pda-gate 4012/tcp # PDA Gate +pda-gate 4012/udp # PDA Gate +acl-manager 4013/tcp # ACL Manager +acl-manager 4013/udp # ACL Manager +taiclock 4014/tcp # TAICLOCK +taiclock 4014/udp # TAICLOCK +talarian-mcast1 4015/tcp # Talarian Mcast +talarian-mcast1 4015/udp # Talarian Mcast +talarian-mcast2 4016/tcp # Talarian Mcast +talarian-mcast2 4016/udp # Talarian Mcast +talarian-mcast3 4017/tcp # Talarian Mcast +talarian-mcast3 4017/udp # Talarian Mcast +talarian-mcast4 4018/tcp # Talarian Mcast +talarian-mcast4 4018/udp # Talarian Mcast +talarian-mcast5 4019/tcp # Talarian Mcast +talarian-mcast5 4019/udp # Talarian Mcast +trap 4020/tcp # TRAP Port +trap 4020/udp # TRAP Port +nexus-portal 4021/tcp # Nexus Portal +nexus-portal 4021/udp # Nexus Portal +dnox 4022/tcp # DNOX +dnox 4022/udp # DNOX +esnm-zoning 4023/tcp # ESNM Zoning Port +esnm-zoning 4023/udp # ESNM Zoning Port +tnp1-port 4024/tcp # TNP1 User Port +tnp1-port 4024/udp # TNP1 User Port +partimage 4025/tcp # Partition Image Port +partimage 4025/udp # Partition Image Port +as-debug 4026/tcp # Graphical Debug Server +as-debug 4026/udp # Graphical Debug Server +bxp 4027/tcp # bitxpress +bxp 4027/udp # bitxpress +dtserver-port 4028/tcp # DTServer Port +dtserver-port 4028/udp # DTServer Port +ip-qsig 4029/tcp # IP Q signaling protocol +ip-qsig 4029/udp # IP Q signaling protocol +jdmn-port 4030/tcp # Accell/JSP Daemon Port +jdmn-port 4030/udp # Accell/JSP Daemon Port +suucp 4031/tcp # UUCP over SSL +suucp 4031/udp # UUCP over SSL +vrts-auth-port 4032/tcp # VERITAS Authorization Service +vrts-auth-port 4032/udp # VERITAS Authorization Service +sanavigator 4033/tcp # SANavigator Peer Port +sanavigator 4033/udp # SANavigator Peer Port +ubxd 4034/tcp # Ubiquinox Daemon +ubxd 4034/udp # Ubiquinox Daemon +wap-push-http 4035/tcp # WAP Push OTA-HTTP port +wap-push-http 4035/udp # WAP Push OTA-HTTP port +wap-push-https 4036/tcp # WAP Push OTA-HTTP secure +wap-push-https 4036/udp # WAP Push OTA-HTTP secure +ravehd 4037/tcp # RaveHD network control +ravehd 4037/udp # RaveHD network control +fazzt-ptp 4038/tcp # Fazzt Point-To-Point +fazzt-ptp 4038/udp # Fazzt Point-To-Point +fazzt-admin 4039/tcp # Fazzt Administration +fazzt-admin 4039/udp # Fazzt Administration +yo-main 4040/tcp # Yo.net main service +yo-main 4040/udp # Yo.net main service +houston 4041/tcp # Rocketeer-Houston +houston 4041/udp # Rocketeer-Houston +ldxp 4042/tcp # LDXP +ldxp 4042/udp # LDXP +nirp 4043/tcp # Neighbour Identity Resolution +nirp 4043/udp # Neighbour Identity Resolution +ltp 4044/tcp # Location Tracking Protocol +ltp 4044/udp # Location Tracking Protocol +acp-proto 4046/tcp # Accounting Protocol +acp-proto 4046/udp # Accounting Protocol +ctp-state 4047/tcp # Context Transfer Protocol +ctp-state 4047/udp # Context Transfer Protocol +wafs 4049/tcp # Wide Area File Services +wafs 4049/udp # Wide Area File Services +cisco-wafs 4050/tcp # Wide Area File Services +cisco-wafs 4050/udp # Wide Area File Services +cppdp 4051/tcp # Cisco Peer to Peer Distribution Protocol +cppdp 4051/udp # Cisco Peer to Peer Distribution Protocol +interact 4052/tcp # VoiceConnect Interact +interact 4052/udp # VoiceConnect Interact +ccu-comm-1 4053/tcp # CosmoCall Universe Communications Port 1 +ccu-comm-1 4053/udp # CosmoCall Universe Communications Port 1 +ccu-comm-2 4054/tcp # CosmoCall Universe Communications Port 2 +ccu-comm-2 4054/udp # CosmoCall Universe Communications Port 2 +ccu-comm-3 4055/tcp # CosmoCall Universe Communications Port 3 +ccu-comm-3 4055/udp # CosmoCall Universe Communications Port 3 +lms 4056/tcp # Location Message Service +lms 4056/udp # Location Message Service +wfm 4057/tcp # Servigistics WFM server +wfm 4057/udp # Servigistics WFM server +kingfisher 4058/tcp # Kingfisher protocol +kingfisher 4058/udp # Kingfisher protocol +dlms-cosem 4059/tcp # DLMS/COSEM +dlms-cosem 4059/udp # DLMS/COSEM +dsmeter_iatc 4060/tcp dsmeter-iatc # DSMETER Inter-Agent Transfer Channel +dsmeter_iatc 4060/udp dsmeter-iatc # DSMETER Inter-Agent Transfer Channel +ice-location 4061/tcp # Ice Location Service (TCP) +ice-location 4061/udp # Ice Location Service (TCP) +ice-slocation 4062/tcp # Ice Location Service (SSL) +ice-slocation 4062/udp # Ice Location Service (SSL) +ice-router 4063/tcp # Ice Firewall Traversal Service (TCP) +ice-router 4063/udp # Ice Firewall Traversal Service (TCP) +ice-srouter 4064/tcp # Ice Firewall Traversal Service (SSL) +ice-srouter 4064/udp # Ice Firewall Traversal Service (SSL) +avanti_cdp 4065/tcp avanti-cdp # Avanti Common Data +avanti_cdp 4065/udp avanti-cdp # Avanti Common Data +pmas 4066/tcp # Performance Measurement and Analysis +pmas 4066/udp # Performance Measurement and Analysis +idp 4067/tcp # Information Distribution Protocol +idp 4067/udp # Information Distribution Protocol +ipfltbcst 4068/tcp # IP Fleet Broadcast +ipfltbcst 4068/udp # IP Fleet Broadcast +minger 4069/tcp # Minger Email Address Validation Service +minger 4069/udp # Minger Email Address Validation Service +tripe 4070/tcp # Trivial IP Encryption (TrIPE) +tripe 4070/udp # Trivial IP Encryption (TrIPE) +aibkup 4071/tcp # Automatically Incremental Backup +aibkup 4071/udp # Automatically Incremental Backup +zieto-sock 4072/tcp # Zieto Socket Communications +zieto-sock 4072/udp # Zieto Socket Communications +iRAPP 4073/tcp # iRAPP Server Protocol +iRAPP 4073/udp # iRAPP Server Protocol +cequint-cityid 4074/tcp # Cequint City ID UI trigger +cequint-cityid 4074/udp # Cequint City ID UI trigger +perimlan 4075/tcp # ISC Alarm Message Service +perimlan 4075/udp # ISC Alarm Message Service +seraph 4076/tcp # Seraph DCS +seraph 4076/udp # Seraph DCS +ascomalarm 4077/udp # Ascom IP Alarming +cssp 4078/tcp # Coordinated Security Service Protocol +santools 4079/tcp # SANtools Diagnostic Server +santools 4079/udp # SANtools Diagnostic Server +lorica-in 4080/tcp # Lorica inside facing +lorica-in 4080/udp # Lorica inside facing +lorica-in-sec 4081/tcp # Lorica inside facing (SSL) +lorica-in-sec 4081/udp # Lorica inside facing (SSL) +lorica-out 4082/tcp # Lorica outside facing +lorica-out 4082/udp # Lorica outside facing +lorica-out-sec 4083/tcp # Lorica outside facing (SSL) +lorica-out-sec 4083/udp # Lorica outside facing (SSL) +fortisphere-vm 4084/udp # Fortisphere VM Service +ezmessagesrv 4085/tcp # EZNews Newsroom Message Service +ftsync 4086/udp # Firewall/NAT state table synchronization +applusservice 4087/tcp # APplus Service +npsp 4088/tcp # Noah Printing Service Protocol +opencore 4089/tcp # OpenCORE Remote Control Service +opencore 4089/udp # OpenCORE Remote Control Service +omasgport 4090/tcp # OMA BCAST Service Guide +omasgport 4090/udp # OMA BCAST Service Guide +ewinstaller 4091/tcp # EminentWare Installer +ewinstaller 4091/udp # EminentWare Installer +ewdgs 4092/tcp # EminentWare DGS +ewdgs 4092/udp # EminentWare DGS +pvxpluscs 4093/tcp # Pvx Plus CS Host +pvxpluscs 4093/udp # Pvx Plus CS Host +sysrqd 4094/tcp # sysrq daemon +sysrqd 4094/udp # sysrq daemon +xtgui 4095/tcp # xtgui information service +xtgui 4095/udp # xtgui information service +bre 4096/tcp # BRE (Bridge Relay Element) +bre 4096/udp # BRE (Bridge Relay Element) +patrolview 4097/tcp # Patrol View +patrolview 4097/udp # Patrol View +drmsfsd 4098/tcp # drmsfsd +drmsfsd 4098/udp # drmsfsd +dpcp 4099/tcp # DPCP +dpcp 4099/udp # DPCP +igo-incognito 4100/tcp # IGo Incognito Data Port +igo-incognito 4100/udp # IGo Incognito Data Port +brlp-0 4101/tcp # Braille protocol +brlp-0 4101/udp # Braille protocol +brlp-1 4102/tcp # Braille protocol +brlp-1 4102/udp # Braille protocol +brlp-2 4103/tcp # Braille protocol +brlp-2 4103/udp # Braille protocol +brlp-3 4104/tcp # Braille protocol +brlp-3 4104/udp # Braille protocol +shofar 4105/tcp # Shofar +shofar 4105/udp # Shofar +synchronite 4106/tcp # Synchronite +synchronite 4106/udp # Synchronite +j-ac 4107/tcp # JDL Accounting LAN Service +j-ac 4107/udp # JDL Accounting LAN Service +accel 4108/tcp # ACCEL +accel 4108/udp # ACCEL +izm 4109/tcp # Instantiated Zero-control Messaging +izm 4109/udp # Instantiated Zero-control Messaging +g2tag 4110/tcp # G2 RFID Tag Telemetry Data +g2tag 4110/udp # G2 RFID Tag Telemetry Data +xgrid 4111/tcp # Xgrid +xgrid 4111/udp # Xgrid +apple-vpns-rp 4112/tcp # Apple VPN Server Reporting Protocol +apple-vpns-rp 4112/udp # Apple VPN Server Reporting Protocol +aipn-reg 4113/tcp # AIPN LS Registration +aipn-reg 4113/udp # AIPN LS Registration +jomamqmonitor 4114/tcp # JomaMQMonitor +jomamqmonitor 4114/udp # JomaMQMonitor +cds 4115/tcp # CDS Transfer Agent +cds 4115/udp # CDS Transfer Agent +smartcard-tls 4116/tcp # smartcard-TLS +smartcard-tls 4116/udp # smartcard-TLS +hillrserv 4117/tcp # Hillr Connection Manager +hillrserv 4117/udp # Hillr Connection Manager +netscript 4118/tcp # Netadmin Systems NETscript service +netscript 4118/udp # Netadmin Systems NETscript service +assuria-slm 4119/tcp # Assuria Log Manager +assuria-slm 4119/udp # Assuria Log Manager +e-builder 4121/tcp # e-Builder Application Communication +e-builder 4121/udp # e-Builder Application Communication +fprams 4122/tcp # Fiber Patrol Alarm Service +fprams 4122/udp # Fiber Patrol Alarm Service +z-wave 4123/tcp # Zensys Z-Wave Control Protocol +z-wave 4123/udp # Zensys Z-Wave Control Protocol +tigv2 4124/tcp # Rohill TetraNode Ip Gateway v2 +tigv2 4124/udp # Rohill TetraNode Ip Gateway v2 +opsview-envoy 4125/tcp # Opsview Envoy +opsview-envoy 4125/udp # Opsview Envoy +ddrepl 4126/tcp # Data Domain Replication Service +ddrepl 4126/udp # Data Domain Replication Service +unikeypro 4127/tcp # NetUniKeyServer +unikeypro 4127/udp # NetUniKeyServer +nufw 4128/tcp # NuFW decision delegation protocol +nufw 4128/udp # NuFW decision delegation protocol +nuauth 4129/tcp # NuFW authentication protocol +nuauth 4129/udp # NuFW authentication protocol +fronet 4130/tcp # FRONET message protocol +fronet 4130/udp # FRONET message protocol +stars 4131/tcp # Global Maintech Stars +stars 4131/udp # Global Maintech Stars +nuts_dem 4132/tcp nuts-dem # NUTS Daemon +nuts_dem 4132/udp nuts-dem # NUTS Daemon +nuts_bootp 4133/tcp nuts-bootp # NUTS Bootp Server +nuts_bootp 4133/udp nuts-bootp # NUTS Bootp Server +nifty-hmi 4134/tcp # NIFTY-Serve HMI protocol +nifty-hmi 4134/udp # NIFTY-Serve HMI protocol +cl-db-attach 4135/tcp # Classic Line Database Server Attach +cl-db-attach 4135/udp # Classic Line Database Server Attach +cl-db-request 4136/tcp # Classic Line Database Server Request +cl-db-request 4136/udp # Classic Line Database Server Request +cl-db-remote 4137/tcp # Classic Line Database Server Remote +cl-db-remote 4137/udp # Classic Line Database Server Remote +nettest 4138/tcp # nettest +nettest 4138/udp # nettest +thrtx 4139/tcp # Imperfect Networks Server +thrtx 4139/udp # Imperfect Networks Server +cedros_fds 4140/tcp cedros-fds # Cedros Fraud Detection System +cedros_fds 4140/udp cedros-fds # Cedros Fraud Detection System +oirtgsvc 4141/tcp # Workflow Server +oirtgsvc 4141/udp # Workflow Server +oidocsvc 4142/tcp # Document Server +oidocsvc 4142/udp # Document Server +oidsr 4143/tcp # Document Replication +oidsr 4143/udp # Document Replication +vvr-control 4145/tcp # VVR Control +vvr-control 4145/udp # VVR Control +tgcconnect 4146/tcp # TGCConnect Beacon +tgcconnect 4146/udp # TGCConnect Beacon +vrxpservman 4147/tcp # Multum Service Manager +vrxpservman 4147/udp # Multum Service Manager +hhb-handheld 4148/tcp # HHB Handheld Client +hhb-handheld 4148/udp # HHB Handheld Client +agslb 4149/tcp # A10 GSLB Service +agslb 4149/udp # A10 GSLB Service +PowerAlert-nsa 4150/tcp # PowerAlert Network Shutdown Agent +PowerAlert-nsa 4150/udp # PowerAlert Network Shutdown Agent +menandmice_noh 4151/tcp menandmice-noh # Men & Mice Remote Control +menandmice_noh 4151/udp menandmice-noh # Men & Mice Remote Control +idig_mux 4152/tcp idig-mux # iDigTech Multiplex +idig_mux 4152/udp idig-mux # iDigTech Multiplex +mbl-battd 4153/tcp # MBL Remote Battery Monitoring +mbl-battd 4153/udp # MBL Remote Battery Monitoring +atlinks 4154/tcp # atlinks device discovery +atlinks 4154/udp # atlinks device discovery +bzr 4155/tcp # Bazaar version control system +bzr 4155/udp # Bazaar version control system +stat-results 4156/tcp # STAT Results +stat-results 4156/udp # STAT Results +stat-scanner 4157/tcp # STAT Scanner Control +stat-scanner 4157/udp # STAT Scanner Control +stat-cc 4158/tcp # STAT Command Center +stat-cc 4158/udp # STAT Command Center +nss 4159/tcp # Network Security Service +nss 4159/udp # Network Security Service +jini-discovery 4160/tcp # Jini Discovery +jini-discovery 4160/udp # Jini Discovery +omscontact 4161/tcp # OMS Contact +omscontact 4161/udp # OMS Contact +omstopology 4162/tcp # OMS Topology +omstopology 4162/udp # OMS Topology +silverpeakpeer 4163/tcp # Silver Peak Peer Protocol +silverpeakpeer 4163/udp # Silver Peak Peer Protocol +silverpeakcomm 4164/tcp # Silver Peak Communication Protocol +silverpeakcomm 4164/udp # Silver Peak Communication Protocol +altcp 4165/tcp # ArcLink over Ethernet +altcp 4165/udp # ArcLink over Ethernet +joost 4166/tcp # Joost Peer to Peer Protocol +joost 4166/udp # Joost Peer to Peer Protocol +ddgn 4167/tcp # DeskDirect Global Network +ddgn 4167/udp # DeskDirect Global Network +pslicser 4168/tcp # PrintSoft License Server +pslicser 4168/udp # PrintSoft License Server +iadt 4169/tcp # Automation Drive Interface Transport +iadt-disc 4169/udp # Internet ADT Discovery Protocol +d-cinema-csp 4170/tcp # SMPTE Content Synchonization Protocol +ml-svnet 4171/tcp # Maxlogic Supervisor Communication +pcoip 4172/tcp # PC over IP +pcoip 4172/udp # PC over IP +mma-discovery 4173/udp # MMA Device Discovery +smcluster 4174/tcp # StorMagic Cluster Services +sm-disc 4174/udp # StorMagic Discovery +bccp 4175/tcp # Brocade Cluster Communication Protocol +tl-ipcproxy 4176/tcp # Translattice Cluster IPC Proxy +wello 4177/tcp # Wello P2P pubsub service +wello 4177/udp # Wello P2P pubsub service +storman 4178/tcp # StorMan +storman 4178/udp # StorMan +MaxumSP 4179/tcp # Maxum Services +MaxumSP 4179/udp # Maxum Services +httpx 4180/tcp # HTTPX +httpx 4180/udp # HTTPX +macbak 4181/tcp # MacBak +macbak 4181/udp # MacBak +pcptcpservice 4182/tcp # Production Company Pro TCP Service +pcptcpservice 4182/udp # Production Company Pro TCP Service +cyborgnet 4183/tcp # CyborgNet communications +cyborgnet 4183/udp # CyborgNet communications +universe_suite 4184/tcp universe-suite # UNIVERSE SUITE MESSAGE SERVICE +universe_suite 4184/udp universe-suite # UNIVERSE SUITE MESSAGE SERVICE +wcpp 4185/tcp # Woven Control Plane Protocol +wcpp 4185/udp # Woven Control Plane Protocol +boxbackupstore 4186/tcp # Box Backup Store Service +csc_proxy 4187/tcp csc-proxy # Cascade Proxy +vatata 4188/tcp # Vatata Peer to Peer Protocol +vatata 4188/udp # Vatata Peer to Peer Protocol +pcep 4189/tcp # Path Computation Element Communication Protocol +sieve 4190/tcp # ManageSieve Protocol +dsmipv6 4191/udp # Dual Stack MIPv6 NAT Traversal +azeti 4192/tcp # Azeti Agent Service +azeti-bd 4192/udp # azeti blinddate +pvxplusio 4193/tcp # PxPlus remote file srvr +eims-admin 4199/tcp # EIMS ADMIN +eims-admin 4199/udp # EIMS ADMIN +corelccam 4300/tcp # Corel CCam +corelccam 4300/udp # Corel CCam +d-data 4301/tcp # Diagnostic Data +d-data 4301/udp # Diagnostic Data +d-data-control 4302/tcp # Diagnostic Data Control +d-data-control 4302/udp # Diagnostic Data Control +srcp 4303/tcp # Simple Railroad Command Protocol +srcp 4303/udp # Simple Railroad Command Protocol +owserver 4304/tcp # One-Wire Filesystem Server +owserver 4304/udp # One-Wire Filesystem Server +batman 4305/tcp # better approach to mobile ad-hoc networking +batman 4305/udp # better approach to mobile ad-hoc networking +pinghgl 4306/tcp # Hellgate London +pinghgl 4306/udp # Hellgate London +visicron-vs 4307/tcp # Visicron Videoconference Service +visicron-vs 4307/udp # Visicron Videoconference Service +compx-lockview 4308/tcp # CompX-LockView +compx-lockview 4308/udp # CompX-LockView +dserver 4309/tcp # Exsequi Appliance Discovery +dserver 4309/udp # Exsequi Appliance Discovery +mirrtex 4310/tcp # Mir-RT exchange service +mirrtex 4310/udp # Mir-RT exchange service +p6ssmc 4311/tcp # P6R Secure Server Management Console +pscl-mgt 4312/tcp # Parascale Membership Manager +perrla 4313/tcp # PERRLA User Services +choiceview-agt 4314/tcp # ChoiceView Agent +choiceview-clt 4316/tcp # ChoiceView Client +fdt-rcatp 4320/tcp # FDT Remote Categorization Protocol +fdt-rcatp 4320/udp # FDT Remote Categorization Protocol +trim-event 4322/tcp # TRIM Event Service +trim-event 4322/udp # TRIM Event Service +trim-ice 4323/tcp # TRIM ICE Service +trim-ice 4323/udp # TRIM ICE Service +geognosisman 4325/tcp # Cadcorp GeognoSIS Manager Service +geognosisman 4325/udp # Cadcorp GeognoSIS Manager Service +geognosis 4326/tcp # Cadcorp GeognoSIS Service +geognosis 4326/udp # Cadcorp GeognoSIS Service +jaxer-web 4327/tcp # Jaxer Web Protocol +jaxer-web 4327/udp # Jaxer Web Protocol +jaxer-manager 4328/tcp # Jaxer Manager Command Protocol +jaxer-manager 4328/udp # Jaxer Manager Command Protocol +publiqare-sync 4329/tcp # PubliQare Distributed Environment Synchronisation Engine +dey-sapi 4330/tcp # DEY Storage Administration +ktickets-rest 4331/tcp # ktickets REST API for event management and ticketing systems +ahsp 4333/tcp # ArrowHead Service Protocol +ahsp 4333/udp # ArrowHead Service Protocol +ahsp 4333/sctp # ArrowHead Service Protocol +netconf-ch-ssh 4334/tcp # NETCONF Call Home (SSH) +netconf-ch-tls 4335/tcp # NETCONF Call Home (TLS) +restconf-ch-tls 4336/tcp # RESTCONF Call Home (TLS) +gaia 4340/tcp # Gaia Connector Protocol +gaia 4340/udp # Gaia Connector Protocol +lisp-data 4341/tcp # LISP Data Packets +lisp-data 4341/udp # LISP Data Packets +lisp-cons 4342/tcp # LISP-CONS Control +lisp-control 4342/udp # LISP Control Packets +unicall 4343/tcp # UNICALL +unicall 4343/udp # UNICALL +vinainstall 4344/tcp # VinaInstall +vinainstall 4344/udp # VinaInstall +m4-network-as 4345/tcp # Macro 4 Network AS +m4-network-as 4345/udp # Macro 4 Network AS +elanlm 4346/tcp # ELAN LM +elanlm 4346/udp # ELAN LM +lansurveyor 4347/tcp # LAN Surveyor +lansurveyor 4347/udp # LAN Surveyor +itose 4348/tcp # ITOSE +itose 4348/udp # ITOSE +fsportmap 4349/tcp # File System Port Map +fsportmap 4349/udp # File System Port Map +net-device 4350/tcp # Net Device +net-device 4350/udp # Net Device +plcy-net-svcs 4351/tcp # PLCY Net Services +plcy-net-svcs 4351/udp # PLCY Net Services +pjlink 4352/tcp # Projector Link +pjlink 4352/udp # Projector Link +f5-iquery 4353/tcp # F5 iQuery +f5-iquery 4353/udp # F5 iQuery +qsnet-trans 4354/tcp # QSNet Transmitter +qsnet-trans 4354/udp # QSNet Transmitter +qsnet-workst 4355/tcp # QSNet Workstation +qsnet-workst 4355/udp # QSNet Workstation +qsnet-assist 4356/tcp # QSNet Assistant +qsnet-assist 4356/udp # QSNet Assistant +qsnet-cond 4357/tcp # QSNet Conductor +qsnet-cond 4357/udp # QSNet Conductor +qsnet-nucl 4358/tcp # QSNet Nucleus +qsnet-nucl 4358/udp # QSNet Nucleus +omabcastltkm 4359/tcp # OMA BCAST Long-Term Key Messages +omabcastltkm 4359/udp # OMA BCAST Long-Term Key Messages +matrix_vnet 4360/tcp matrix-vnet # Matrix VNet Communication Protocol +nacnl 4361/udp # Navcom Discovery and Control Port +afore-vdp-disc 4362/udp # AFORE vNode Discovery protocol +shadowstream 4366/udp # ShadowStream System +wxbrief 4368/tcp # WeatherBrief Direct +wxbrief 4368/udp # WeatherBrief Direct +epmd 4369/tcp # Erlang Port Mapper Daemon +epmd 4369/udp # Erlang Port Mapper Daemon +elpro_tunnel 4370/tcp elpro-tunnel # ELPRO V2 Protocol Tunnel +elpro_tunnel 4370/udp elpro-tunnel # ELPRO V2 Protocol Tunnel + +l2c-control 4371/tcp # LAN2CAN Control +l2c-disc 4371/udp # LAN2CAN Discovery +l2c-data 4372/tcp # LAN2CAN Data +l2c-data 4372/udp # LAN2CAN Data +remctl 4373/tcp # Remote Authenticated Command Service +remctl 4373/udp # Remote Authenticated Command Service +psi-ptt 4374/tcp # PSI Push-to-Talk Protocol +tolteces 4375/tcp # Toltec EasyShare +tolteces 4375/udp # Toltec EasyShare +bip 4376/tcp # BioAPI Interworking +bip 4376/udp # BioAPI Interworking +cp-spxsvr 4377/tcp # Cambridge Pixel SPx Server +cp-spxsvr 4377/udp # Cambridge Pixel SPx Server +cp-spxdpy 4378/tcp # Cambridge Pixel SPx Display +cp-spxdpy 4378/udp # Cambridge Pixel SPx Display +ctdb 4379/tcp # CTDB +ctdb 4379/udp # CTDB +xandros-cms 4389/tcp # Xandros Community Management Service +xandros-cms 4389/udp # Xandros Community Management Service +wiegand 4390/tcp # Physical Access Control +wiegand 4390/udp # Physical Access Control +apwi-imserver 4391/tcp # American Printware IMServer Protocol +apwi-rxserver 4392/tcp # American Printware RXServer Protocol +apwi-rxspooler 4393/tcp # American Printware RXSpooler Protocol +apwi-disc 4394/udp # American Printware Discovery +omnivisionesx 4395/tcp # OmniVision communication for Virtual environments +omnivisionesx 4395/udp # OmniVision communication for Virtual environments +fly 4396/tcp # Fly Object Space +ds-srv 4400/tcp # ASIGRA Services +ds-srv 4400/udp # ASIGRA Services +ds-srvr 4401/tcp # ASIGRA Televaulting DS-System Service +ds-srvr 4401/udp # ASIGRA Televaulting DS-System Service +ds-clnt 4402/tcp # ASIGRA Televaulting DS-Client Service +ds-clnt 4402/udp # ASIGRA Televaulting DS-Client Service +ds-user 4403/tcp # ASIGRA Televaulting DS-Client Monitoring/Management +ds-user 4403/udp # ASIGRA Televaulting DS-Client Monitoring/Management +ds-admin 4404/tcp # ASIGRA Televaulting DS-System Monitoring/Management +ds-admin 4404/udp # ASIGRA Televaulting DS-System Monitoring/Management +ds-mail 4405/tcp # ASIGRA Televaulting Message Level Restore service +ds-mail 4405/udp # ASIGRA Televaulting Message Level Restore service +ds-slp 4406/tcp # ASIGRA Televaulting DS-Sleeper Service +ds-slp 4406/udp # ASIGRA Televaulting DS-Sleeper Service +nacagent 4407/tcp # Network Access Control Agent +slscc 4408/tcp # SLS Technology Control Centre +netcabinet-com 4409/tcp # Net-Cabinet comunication +itwo-server 4410/tcp # RIB iTWO Application Server +found 4411/tcp # Found Messaging Protocol +smallchat 4412/udp # SmallChat +avi-nms 4413/tcp # AVI Systems NMS +avi-nms-disc 4413/udp # AVI Systems NMS +updog 4414/tcp # Updog Monitoring and Status +brcd-vr-req 4415/tcp # Brocade Virtual Router +pjj-player 4416/tcp # PJJ Media Player +pjj-player-disc 4416/udp # PJJ Media Player discovery +workflowdir 4417/tcp # Workflow Director +axysbridge 4418/udp # AXYS communication protocol +cbp 4419/tcp # Colnod Binary Protocol +nvm-express 4420/tcp # NVM Express over Fabrics +nvm-express 4420/udp # NVM Express over Fabrics +scaleft 4421/tcp # Management for Cloud +tsepisp 4422/tcp # TSEP Installation Service +thingkit 4423/tcp # thingkit secure mesh +netrockey6 4425/tcp # NetROCKEY6 SMART Plus Service +netrockey6 4425/udp # NetROCKEY6 SMART Plus Service +beacon-port-2 4426/tcp # SMARTS Beacon Port +beacon-port-2 4426/udp # SMARTS Beacon Port +drizzle 4427/tcp # Drizzle database server +omviserver 4428/tcp # OMV-Investigation Server-Client +omviagent 4429/tcp # OMV Investigation Agent-Server +sqlserver 4430/tcp # REAL SQL Server +rsqlserver 4430/udp # REAL SQL Server +wspipe 4431/tcp # adWISE Pipe +l-acoustics 4432/tcp # L-ACOUSTICS management +l-acoustics 4432/udp # L-ACOUSTICS management +vop 4433/tcp # Versile Object Protocol +netblox 4441/udp # Netblox Protocol +saris 4442/tcp # Saris +saris 4442/udp # Saris +pharos 4443/tcp # Pharos +pharos 4443/udp # Pharos +upnotifyp 4445/tcp # UPNOTIFYP +upnotifyp 4445/udp # UPNOTIFYP +n1-fwp 4446/tcp # N1-FWP +n1-fwp 4446/udp # N1-FWP +n1-rmgmt 4447/tcp # N1-RMGMT +n1-rmgmt 4447/udp # N1-RMGMT +asc-slmd 4448/tcp # ASC Licence Manager +asc-slmd 4448/udp # ASC Licence Manager +privatewire 4449/tcp # PrivateWire +privatewire 4449/udp # PrivateWire +camp 4450/tcp # Camp +camp 4450/udp # Camp +ctisystemmsg 4451/tcp # CTI System Msg +ctisystemmsg 4451/udp # CTI System Msg +ctiprogramload 4452/tcp # CTI Program Load +ctiprogramload 4452/udp # CTI Program Load +nssalertmgr 4453/tcp # NSS Alert Manager +nssalertmgr 4453/udp # NSS Alert Manager +nssagentmgr 4454/tcp # NSS Agent Manager +nssagentmgr 4454/udp # NSS Agent Manager +prchat-user 4455/tcp # PR Chat User +prchat-user 4455/udp # PR Chat User +prchat-server 4456/tcp # PR Chat Server +prchat-server 4456/udp # PR Chat Server +prRegister 4457/tcp # PR Register +prRegister 4457/udp # PR Register +mcp 4458/tcp # Matrix Configuration Protocol +mcp 4458/udp # Matrix Configuration Protocol +hpssmgmt 4484/tcp # hpssmgmt service +hpssmgmt 4484/udp # hpssmgmt service +assyst-dr 4485/tcp # Assyst Data Repository Service +icms 4486/tcp # Integrated Client Message Service +icms 4486/udp # Integrated Client Message Service +prex-tcp 4487/tcp # Protocol for Remote Execution over TCP +awacs-ice 4488/tcp # Apple Wide Area Connectivity Service ICE Bootstrap +awacs-ice 4488/udp # Apple Wide Area Connectivity Service ICE Bootstrap +ipsec-nat-t 4500/tcp # IPsec NAT-Traversal +ipsec-nat-t 4500/udp # IPsec NAT-Traversal +a25-fap-fgw 4502/sctp # A25 (FAP-FGW) +armagetronad 4534/udp # Armagetron Advanced Game +ehs 4535/tcp # Event Heap Server +ehs 4535/udp # Event Heap Server +ehs-ssl 4536/tcp # Event Heap Server SSL +ehs-ssl 4536/udp # Event Heap Server SSL +wssauthsvc 4537/tcp # WSS Security Service +wssauthsvc 4537/udp # WSS Security Service +swx-gate 4538/tcp # Software Data Exchange Gateway +swx-gate 4538/udp # Software Data Exchange Gateway +worldscores 4545/tcp # WorldScores +worldscores 4545/udp # WorldScores +sf-lm 4546/tcp # SF License Manager (Sentinel) +sf-lm 4546/udp # SF License Manager (Sentinel) +lanner-lm 4547/tcp # Lanner License Manager +lanner-lm 4547/udp # Lanner License Manager +synchromesh 4548/tcp # Synchromesh +synchromesh 4548/udp # Synchromesh +aegate 4549/tcp # Aegate PMR Service +aegate 4549/udp # Aegate PMR Service +gds-adppiw-db 4550/tcp # Perman I Interbase Server +gds-adppiw-db 4550/udp # Perman I Interbase Server +ieee-mih 4551/tcp # MIH Services +ieee-mih 4551/udp # MIH Services +menandmice-mon 4552/tcp # Men and Mice Monitoring +menandmice-mon 4552/udp # Men and Mice Monitoring +icshostsvc 4553/tcp # ICS host services +msfrs 4554/tcp # MS FRS Replication +msfrs 4554/udp # MS FRS Replication +rsip 4555/tcp # RSIP Port +rsip 4555/udp # RSIP Port +dtn-bundle 4556/tcp # DTN Bundle TCP CL Protocol +dtn-bundle 4556/udp # DTN Bundle UDP CL Protocol +dtn-bundle 4556/dccp # DTN Bundle DCCP CL Protocol +mtcevrunqss 4557/udp # Marathon everRun Quorum Service Server +mtcevrunqman 4558/udp # Marathon everRun Quorum Service Manager +hylafax 4559/udp # HylaFAX +amahi-anywhere 4563/tcp # Amahi Anywhere +kwtc 4566/tcp # Kids Watch Time Control Service +kwtc 4566/udp # Kids Watch Time Control Service +tram 4567/tcp # TRAM +tram 4567/udp # TRAM +bmc-reporting 4568/tcp # BMC Reporting +bmc-reporting 4568/udp # BMC Reporting +iax 4569/tcp # Inter-Asterisk eXchange +iax 4569/udp # Inter-Asterisk eXchange +deploymentmap 4570/tcp # site deployment information for Oracle Communications Suite +cardifftec-back 4573/tcp # CardiffTec server/client communication +rid 4590/tcp # RID over HTTP/TLS +l3t-at-an 4591/tcp # HRPD L3T (AT-AN) +l3t-at-an 4591/udp # HRPD L3T (AT-AN) +hrpd-ith-at-an 4592/udp # HRPD-ITH (AT-AN) +ipt-anri-anri 4593/tcp # IPT (ANRI-ANRI) +ipt-anri-anri 4593/udp # IPT (ANRI-ANRI) +ias-session 4594/tcp # IAS-Session (ANRI-ANRI) +ias-session 4594/udp # IAS-Session (ANRI-ANRI) +ias-paging 4595/tcp # IAS-Paging (ANRI-ANRI) +ias-paging 4595/udp # IAS-Paging (ANRI-ANRI) +ias-neighbor 4596/tcp # IAS-Neighbor (ANRI-ANRI) +ias-neighbor 4596/udp # IAS-Neighbor (ANRI-ANRI) +a21-an-1xbs 4597/tcp # A21 (AN-1xBS) +a21-an-1xbs 4597/udp # A21 (AN-1xBS) +a16-an-an 4598/tcp # A16 (AN-AN) +a16-an-an 4598/udp # A16 (AN-AN) +a17-an-an 4599/tcp # A17 (AN-AN) +a17-an-an 4599/udp # A17 (AN-AN) +piranha1 4600/tcp # Piranha1 +piranha1 4600/udp # Piranha1 +piranha2 4601/tcp # Piranha2 +piranha2 4601/udp # Piranha2 +mtsserver 4602/tcp # EAX MTS Server +menandmice-upg 4603/tcp # Men & Mice Upgrade Agent +irp 4604/tcp # Identity Registration Protocol +sixchat 4605/tcp # Direct End to End Secure +ventoso 4621/udp # remote radio VOIP +playsta2-app 4658/tcp # PlayStation2 App Port +playsta2-app 4658/udp # PlayStation2 App Port +playsta2-lob 4659/tcp # PlayStation2 Lobby Port +playsta2-lob 4659/udp # PlayStation2 Lobby Port +smaclmgr 4660/tcp # smaclmgr +smaclmgr 4660/udp # smaclmgr +kar2ouche 4661/tcp # Kar2ouche Peer location service +kar2ouche 4661/udp # Kar2ouche Peer location service +oms 4662/tcp # OrbitNet Message Service +oms 4662/udp # OrbitNet Message Service +noteit 4663/tcp # Note It! Message Service +noteit 4663/udp # Note It! Message Service +ems 4664/tcp # Rimage Messaging Server +ems 4664/udp # Rimage Messaging Server +contclientms 4665/tcp # Container Client Message Service +contclientms 4665/udp # Container Client Message Service +eportcomm 4666/tcp # E-Port Message Service +eportcomm 4666/udp # E-Port Message Service +mmacomm 4667/tcp # MMA Comm Services +mmacomm 4667/udp # MMA Comm Services +mmaeds 4668/tcp # MMA EDS Service +mmaeds 4668/udp # MMA EDS Service +eportcommdata 4669/tcp # E-Port Data Service +eportcommdata 4669/udp # E-Port Data Service +light 4670/tcp # Light packets transfer protocol +light 4670/udp # Light packets transfer protocol +acter 4671/tcp # Bull RSF action server +acter 4671/udp # Bull RSF action server +rfa 4672/tcp # remote file access server +rfa 4672/udp # remote file access server +cxws 4673/tcp # CXWS Operations +cxws 4673/udp # CXWS Operations +appiq-mgmt 4674/tcp # AppIQ Agent Management +appiq-mgmt 4674/udp # AppIQ Agent Management +dhct-status 4675/tcp # BIAP Device Status +dhct-status 4675/udp # BIAP Device Status +dhct-alerts 4676/tcp # BIAP Generic Alert +dhct-alerts 4676/udp # BIAP Generic Alert +bcs 4677/tcp # Business Continuity Servi +bcs 4677/udp # Business Continuity Servi +traversal 4678/tcp # boundary traversal +traversal 4678/udp # boundary traversal +mgesupervision 4679/tcp # MGE UPS Supervision +mgesupervision 4679/udp # MGE UPS Supervision +mgemanagement 4680/tcp # MGE UPS Management +mgemanagement 4680/udp # MGE UPS Management +parliant 4681/tcp # Parliant Telephony System +parliant 4681/udp # Parliant Telephony System +finisar 4682/tcp # finisar +finisar 4682/udp # finisar +spike 4683/tcp # Spike Clipboard Service +spike 4683/udp # Spike Clipboard Service +rfid-rp1 4684/tcp # RFID Reader Protocol 1.0 +rfid-rp1 4684/udp # RFID Reader Protocol 1.0 +autopac 4685/tcp # Autopac Protocol +autopac 4685/udp # Autopac Protocol +msp-os 4686/tcp # Manina Service Protocol +msp-os 4686/udp # Manina Service Protocol +nst 4687/tcp # Network Scanner Tool FTP +nst 4687/udp # Network Scanner Tool FTP +mobile-p2p 4688/tcp # Mobile P2P Service +mobile-p2p 4688/udp # Mobile P2P Service +altovacentral 4689/tcp # Altova DatabaseCentral +altovacentral 4689/udp # Altova DatabaseCentral +prelude 4690/tcp # Prelude IDS message proto +prelude 4690/udp # Prelude IDS message proto +mtn 4691/tcp # Monotone Netsync Protocol +mtn 4691/udp # Monotone Netsync Protocol +conspiracy 4692/tcp # Conspiracy messaging +conspiracy 4692/udp # Conspiracy messaging +netxms-agent 4700/tcp # NetXMS Agent +netxms-agent 4700/udp # NetXMS Agent +netxms-mgmt 4701/tcp # NetXMS Management +netxms-mgmt 4701/udp # NetXMS Management +netxms-sync 4702/tcp # NetXMS Server Synchronization +netxms-sync 4702/udp # NetXMS Server Synchronization +npqes-test 4703/tcp # Network Performance Quality Evaluation System Test Service +assuria-ins 4704/tcp # Assuria Insider +#pulseaudio is not registered in IANA +pulseaudio 4713/tcp # Pulseaudio +truckstar 4725/tcp # TruckStar Service +truckstar 4725/udp # TruckStar Service +a26-fap-fgw 4726/udp # A26 (FAP-FGW) +fcis 4727/tcp # F-Link Client Information Service +fcis-disc 4727/udp # F-Link Client Information Service Discovery +capmux 4728/tcp # CA Port Multiplexer +capmux 4728/udp # CA Port Multiplexer +gsmtap 4729/udp # GSM Interface Tap +gearman 4730/tcp # Gearman Job Queue System +gearman 4730/udp # Gearman Job Queue System +remcap 4731/tcp # Remote Capture Protocol +ohmtrigger 4732/udp # OHM server trigger +resorcs 4733/tcp # RES Orchestration Catalog Services +ipdr-sp 4737/tcp # IPDR/SP +ipdr-sp 4737/udp # IPDR/SP +solera-lpn 4738/tcp # SoleraTec Locator +solera-lpn 4738/udp # SoleraTec Locator +ipfix 4739/tcp # IP Flow Info Export +ipfix 4739/udp # IP Flow Info Export +ipfix 4739/sctp # IP Flow Info Export +ipfixs 4740/tcp # ipfix protocol over TLS +ipfixs 4740/sctp # ipfix protocol over DTLS +ipfixs 4740/udp # ipfix protocol over DTLS +lumimgrd 4741/tcp # Luminizer Manager +lumimgrd 4741/udp # Luminizer Manager +sicct 4742/tcp # SICCT +sicct-sdp 4742/udp # SICCT Service Discovery Protocol +openhpid 4743/tcp # openhpi HPI service +openhpid 4743/udp # openhpi HPI service +ifsp 4744/tcp # Internet File Synchronization Protocol +ifsp 4744/udp # Internet File Synchronization Protocol +fmp 4745/tcp # Funambol Mobile Push +fmp 4745/udp # Funambol Mobile Push +buschtrommel 4747/udp # peer-to-peer file exchange +profilemac 4749/tcp # Profile for Mac +profilemac 4749/udp # Profile for Mac +ssad 4750/tcp # Simple Service Auto Discovery +ssad 4750/udp # Simple Service Auto Discovery +spocp 4751/tcp # Simple Policy Control Protocol +spocp 4751/udp # Simple Policy Control Protocol +snap 4752/tcp # Simple Network Audio Protocol +snap 4752/udp # Simple Network Audio Protocol +simon 4753/tcp # Simple Invocation of Methods +simon-disc 4753/udp # Over Network (SIMON) +bfd-multi-ctl 4784/tcp # BFD Multihop Control +bfd-multi-ctl 4784/udp # BFD Multihop Control +cncp 4785/udp # Cisco Nexus Control Protocol +smart-install 4786/tcp # Smart Install Service +sia-ctrl-plane 4787/tcp # Service Insertion Architecture (SIA) Control-Plane +xmcp 4788/tcp # eXtensible Messaging Client Protocol +vxlan 4789/udp # Virtual eXtensible Local area network +vxlan-gpe 4790/udp # Generic Protocol Extension for vxlan +roce 4791/udp # IP Routable RocE +iims 4800/tcp # Icona Instant Messenging System +iims 4800/udp # Icona Instant Messenging System +iwec 4801/tcp # Icona Web Embedded Chat +iwec 4801/udp # Icona Web Embedded Chat +ilss 4802/tcp # Icona License System Server +ilss 4802/udp # Icona License System Server +notateit 4803/tcp # Notateit Messaging +notateit-disc 4803/udp # Notateit Messaging Discovery +aja-ntv4-disc 4804/udp # AJA ntv4 Video System Discovery +htcp 4827/tcp # HTCP +htcp 4827/udp # HTCP +varadero-0 4837/tcp # Varadero-0 +varadero-0 4837/udp # Varadero-0 +varadero-1 4838/tcp # Varadero-1 +varadero-1 4838/udp # Varadero-1 +varadero-2 4839/tcp # Varadero-2 +varadero-2 4839/udp # Varadero-2 +opcua-tcp 4840/tcp # OPC UA TCP Protocol +opcua-udp 4840/udp # OPC UA TCP Protocol +quosa 4841/tcp # QUOSA Virtual Library Service +quosa 4841/udp # QUOSA Virtual Library Service +gw-asv 4842/tcp # nCode ICE-flow Library AppServer +gw-asv 4842/udp # nCode ICE-flow Library AppServer +opcua-tls 4843/tcp # OPC UA TCP Protocol over TLS/SSL +opcua-tls 4843/udp # OPC UA TCP Protocol over TLS/SSL +gw-log 4844/tcp # nCode ICE-flow Library LogServer +gw-log 4844/udp # nCode ICE-flow Library LogServer +wcr-remlib 4845/tcp # WordCruncher Remote Library Service +wcr-remlib 4845/udp # WordCruncher Remote Library Service +contamac_icm 4846/tcp contamac-icm # Contamac ICM Service +contamac_icm 4846/udp contamac-icm # Contamac ICM Service +wfc 4847/tcp # Web Fresh Communication +wfc 4847/udp # Web Fresh Communication +appserv-http 4848/tcp # App Server - Admin HTTP +appserv-http 4848/udp # App Server - Admin HTTP +appserv-https 4849/tcp # App Server - Admin HTTPS +appserv-https 4849/udp # App Server - Admin HTTPS +sun-as-nodeagt 4850/tcp # Sun App Server - NA +sun-as-nodeagt 4850/udp # Sun App Server - NA +derby-repli 4851/tcp # Apache Derby Replication +derby-repli 4851/udp # Apache Derby Replication +unify-debug 4867/tcp # Unify Debugger +unify-debug 4867/udp # Unify Debugger +phrelay 4868/tcp # Photon Relay +phrelay 4868/udp # Photon Relay +phrelaydbg 4869/tcp # Photon Relay Debug +phrelaydbg 4869/udp # Photon Relay Debug +cc-tracking 4870/tcp # Citcom Tracking Service +cc-tracking 4870/udp # Citcom Tracking Service +wired 4871/tcp # Wired +wired 4871/udp # Wired +tritium-can 4876/tcp # Tritium CAN Bus Bridge Service +tritium-can 4876/udp # Tritium CAN Bus Bridge Service +lmcs 4877/tcp # Lighting Management Control System +lmcs 4877/udp # Lighting Management Control System +inst-discovery 4878/udp # Agilent Instrument Discovery +wsdl-event 4879/tcp # WSDL Event Receiver +hislip 4880/tcp # IVI High-Speed LAN Instrument Protocol +socp-t 4881/udp # SOCP Time Synchronization Protocol +socp-c 4882/udp # SOCP Control Protocol +wmlserver 4883/tcp # Meier-Phelps License Server +hivestor 4884/tcp # HiveStor Distributed File System +hivestor 4884/udp # HiveStor Distributed File System +abbs 4885/tcp # ABBS +abbs 4885/udp # ABBS +lyskom 4894/tcp # LysKOM Protocol A +lyskom 4894/udp # LysKOM Protocol A +radmin-port 4899/tcp # RAdmin Port +radmin-port 4899/udp # RAdmin Port +hfcs 4900/tcp # HyperFileSQL Client/Server Database Engine +hfcs 4900/udp # HyperFileSQL Client/Server Database Engine +flr_agent 4901/tcp flr-agent # FileLocator Remote Search Agent +magiccontrol 4902/tcp # magicCONROL RF and Data Interface +lutap 4912/tcp # Technicolor LUT Access Protocol +lutcp 4913/tcp # LUTher Control Protocol +bones 4914/tcp # Bones Remote Control +bones 4914/udp # Bones Remote Control +frcs 4915/tcp # Fibics Remote Control Service +an-signaling 4936/udp # Signal protocol port for autonomic networking +atsc-mh-ssc 4937/udp # ATSC-M/H Service Signaling Channel +eq-office-4940 4940/tcp # Equitrac Office +eq-office-4940 4940/udp # Equitrac Office +eq-office-4941 4941/tcp # Equitrac Office +eq-office-4941 4941/udp # Equitrac Office +eq-office-4942 4942/tcp # Equitrac Office +eq-office-4942 4942/udp # Equitrac Office +munin 4949/tcp # Munin Graphing Framework +munin 4949/udp # Munin Graphing Framework +sybasesrvmon 4950/tcp # Sybase Server Monitor +sybasesrvmon 4950/udp # Sybase Server Monitor +pwgwims 4951/tcp # PWG WIMS +pwgwims 4951/udp # PWG WIMS +sagxtsds 4952/tcp # SAG Directory Server +sagxtsds 4952/udp # SAG Directory Server +dbsyncarbiter 4953/tcp # Synchronization Arbiter +###UNAUTHORIZED USE: port 4967 by Rockwell FTA####### +ccss-qmm 4969/tcp # CCSS QMessageMonitor +ccss-qmm 4969/udp # CCSS QMessageMonitor +ccss-qsm 4970/tcp # CCSS QSystemMonitor +ccss-qsm 4970/udp # CCSS QSystemMonitor +ctxs-vpp 4980/udp # Citrix Virtual Path +webyast 4984/tcp # WebYast +gerhcs 4985/tcp # GER HC Standard +mrip 4986/tcp # Model Railway Interface Program +mrip 4986/udp # Model Railway Interface Program +smar-se-port1 4987/tcp # SMAR Ethernet Port 1 +smar-se-port1 4987/udp # SMAR Ethernet Port 1 +smar-se-port2 4988/tcp # SMAR Ethernet Port 2 +smar-se-port2 4988/udp # SMAR Ethernet Port 2 +parallel 4989/tcp # Parallel for GAUSS (tm) +parallel 4989/udp # Parallel for GAUSS (tm) +busycal 4990/tcp # BusySync Calendar Synch. Protocol +busycal 4990/udp # BusySync Calendar Synch. Protocol +vrt 4991/tcp # VITA Radio Transport +vrt 4991/udp # VITA Radio Transport +hfcs-manager 4999/tcp # Hyper File Client/Server Database Engine Manager +hfcs-manager 4999/udp # Hyper File Client/Server Database Engine Manager +commplex-main 5000/tcp # +commplex-main 5000/udp # +commplex-link 5001/tcp # +commplex-link 5001/udp # +fmpro-internal 5003/tcp # FileMaker, Inc. - Proprietary transport +fmpro-internal 5003/udp # FileMaker, Inc. - Proprietary name binding +avt-profile-1 5004/tcp # RTP media data [RFC 3551, RFC 4571] +avt-profile-1 5004/udp # RTP media data [RFC 3551] +avt-profile-1 5004/dccp # RTP media data [RFC 3551, RFC-ietf-dccp-rtp-07.txt] +avt-profile-2 5005/tcp # RTP control protocol [RFC 3551, RFC 4571] +avt-profile-2 5005/udp # RTP control protocol [RFC 3551] +avt-profile-2 5005/dccp # RTP control protocol [RFC 3551, RFC-ietf-dccp-rtp-07.txt] +wsm-server 5006/tcp # wsm server +wsm-server 5006/udp # wsm server +wsm-server-ssl 5007/tcp # wsm server ssl +wsm-server-ssl 5007/udp # wsm server ssl +synapsis-edge 5008/tcp # Synapsis EDGE +synapsis-edge 5008/udp # Synapsis EDGE +winfs 5009/tcp # Microsoft Windows Filesystem +winfs 5009/udp # Microsoft Windows Filesystem +telelpathstart 5010/tcp # TelepathStart +telelpathstart 5010/udp # TelepathStart +telelpathattack 5011/tcp # TelepathAttack +telelpathattack 5011/udp # TelepathAttack +nsp 5012/tcp # NetOnTap Service +nsp 5012/udp # NetOnTap Service +fmpro-v6 5013/tcp # FileMaker, Inc. - Proprietary transport +fmpro-v6 5013/udp # FileMaker, Inc. - Proprietary transport +onpsocket 5014/udp # Overlay Network Protocol +fmwp 5015/tcp # FileMaker, Inc. - Web publishing +zenginkyo-1 5020/tcp # zenginkyo-1 +zenginkyo-1 5020/udp # zenginkyo-1 +zenginkyo-2 5021/tcp # zenginkyo-2 +zenginkyo-2 5021/udp # zenginkyo-2 +mice 5022/tcp # mice server +mice 5022/udp # mice server +htuilsrv 5023/tcp # Htuil Server for PLD2 +htuilsrv 5023/udp # Htuil Server for PLD2 +scpi-telnet 5024/tcp # SCPI-TELNET +scpi-telnet 5024/udp # SCPI-TELNET +scpi-raw 5025/tcp # SCPI-RAW +scpi-raw 5025/udp # SCPI-RAW +strexec-d 5026/tcp # Storix I/O daemon (data) +strexec-d 5026/udp # Storix I/O daemon (data) +strexec-s 5027/tcp # Storix I/O daemon (stat) +strexec-s 5027/udp # Storix I/O daemon (stat) +qvr 5028/tcp # Quiqum Virtual Relais +infobright 5029/tcp # Infobright Database Server +infobright 5029/udp # Infobright Database Server +surfpass 5030/tcp # SurfPass +surfpass 5030/udp # SurfPass +dmp 5031/udp # Direct Message Protocol +signacert-agent 5032/tcp # SignaCert Enterprise Trust Server Agent +jtnetd-server 5033/tcp # Janstor Secure Data +jtnetd-status 5034/tcp # Janstor Status +asnaacceler8db 5042/tcp # asnaacceler8db +asnaacceler8db 5042/udp # asnaacceler8db +swxadmin 5043/tcp # ShopWorX Administration +swxadmin 5043/udp # ShopWorX Administration +lxi-evntsvc 5044/tcp # LXI Event Service +lxi-evntsvc 5044/udp # LXI Event Service +osp 5045/tcp # Open Settlement Protocol +vpm-udp 5046/udp # Vishay PM UDP Service +iscape 5047/udp # iSCAPE Data Broadcasting +texai 5048/tcp # Texai Message Service +ivocalize 5049/tcp # iVocalize Web Conference +ivocalize 5049/udp # iVocalize Web Conference +mmcc 5050/tcp # multimedia conference control tool +mmcc 5050/udp # multimedia conference control tool +ita-agent 5051/tcp # ITA Agent +ita-agent 5051/udp # ITA Agent +ita-manager 5052/tcp # ITA Manager +ita-manager 5052/udp # ITA Manager +rlm 5053/tcp # RLM License Server +rlm-disc 5053/udp # RLM Discovery Server +rlm-admin 5054/tcp # RLM administrative interface +unot 5055/tcp # UNOT +unot 5055/udp # UNOT +intecom-ps1 5056/tcp # Intecom Pointspan 1 +intecom-ps1 5056/udp # Intecom Pointspan 1 +intecom-ps2 5057/tcp # Intecom Pointspan 2 +intecom-ps2 5057/udp # Intecom Pointspan 2 +locus-disc 5058/udp # Locus Discovery +sds 5059/tcp # SIP Directory Services +sds 5059/udp # SIP Directory Services +sip 5060/tcp # SIP +sip 5060/udp # SIP +sip 5060/sctp # SIP +sips 5061/tcp # SIP-TLS +sips 5061/udp # SIP-TLS +sips 5061/sctp # SIP-TLS +na-localise 5062/tcp # Localisation access +na-localise 5062/udp # Localisation access +csrpc 5063/tcp # centrify secure RPC +ca-1 5064/tcp # Channel Access 1 +ca-1 5064/udp # Channel Access 1 +ca-2 5065/tcp # Channel Access 2 +ca-2 5065/udp # Channel Access 2 +stanag-5066 5066/tcp # STANAG-5066-SUBNET-INTF +stanag-5066 5066/udp # STANAG-5066-SUBNET-INTF +authentx 5067/tcp # Authentx Service +authentx 5067/udp # Authentx Service +bitforestsrv 5068/tcp # Bitforest Data Service +i-net-2000-npr 5069/tcp # I/Net 2000-NPR +i-net-2000-npr 5069/udp # I/Net 2000-NPR +vtsas 5070/tcp # VersaTrans Server Agent Service +vtsas 5070/udp # VersaTrans Server Agent Service +powerschool 5071/tcp # PowerSchool +powerschool 5071/udp # PowerSchool +ayiya 5072/tcp # Anything In Anything +ayiya 5072/udp # Anything In Anything +tag-pm 5073/tcp # Advantage Group Port Mgr +tag-pm 5073/udp # Advantage Group Port Mgr +alesquery 5074/tcp # ALES Query +alesquery 5074/udp # ALES Query +pvaccess 5075/tcp # Experimental Physics and Industrial Control System +pixelpusher 5078/udp # PixelPusher pixel data +cp-spxrpts 5079/udp # Cambridge Pixel SPx Reports +onscreen 5080/tcp # OnScreen Data Collection Service +onscreen 5080/udp # OnScreen Data Collection Service +sdl-ets 5081/tcp # SDL - Ent Trans Server +sdl-ets 5081/udp # SDL - Ent Trans Server +qcp 5082/tcp # Qpur Communication Protocol +qcp 5082/udp # Qpur Communication Protocol +qfp 5083/tcp # Qpur File Protocol +qfp 5083/udp # Qpur File Protocol +llrp 5084/tcp # EPCglobal Low-Level Reader Protocol +llrp 5084/udp # EPCglobal Low-Level Reader Protocol +encrypted-llrp 5085/tcp # EPCglobal Encrypted LLRP +encrypted-llrp 5085/udp # EPCglobal Encrypted LLRP +aprigo-cs 5086/tcp # Aprigo Collection Service +biotic 5087/tcp # Binary Internet of Things Interoperable Communication +car 5090/sctp # Candidate AR +cxtp 5091/sctp # Context Transfer Protocol +magpie 5092/udp # Magpie Binary +sentinel-lm 5093/tcp # Sentinel LM +sentinel-lm 5093/udp # Sentinel LM +hart-ip 5094/tcp # HART-IP +hart-ip 5094/udp # HART-IP +sentlm-srv2srv 5099/tcp # SentLM Srv2Srv +sentlm-srv2srv 5099/udp # SentLM Srv2Srv +socalia 5100/tcp # Socalia service mux +socalia 5100/udp # Socalia service mux +talarian-tcp 5101/tcp # Talarian_TCP +talarian-udp 5101/udp # Talarian_UDP +oms-nonsecure 5102/tcp # Oracle OMS non-secure +oms-nonsecure 5102/udp # Oracle OMS non-secure +actifio-c2c 5103/tcp # Actifio C2C +tinymessage 5104/udp # TinyMessage +hughes-ap 5105/udp # Hughes Association Protocol +actifioudsagent 5106/tcp # Actifio UDS Agent +actifioreplic 5107/tcp # Disk to Disk replication +taep-as-svc 5111/tcp # TAEP AS service +taep-as-svc 5111/udp # TAEP AS service +pm-cmdsvr 5112/tcp # PeerMe Msg Cmd Service +pm-cmdsvr 5112/udp # PeerMe Msg Cmd Service +ev-services 5114/tcp # Enterprise Vault Services +autobuild 5115/tcp # Symantec Autobuild Service +emb-proj-cmd 5116/udp # EPSON Projecter Image Transfer +gradecam 5117/tcp # GradeCam Image Processing +barracuda-bbs 5120/tcp # Barracuda Backup Protocol +barracuda-bbs 5120/udp # Barracuda Backup Protocol +nbt-pc 5133/tcp # Policy Commander +nbt-pc 5133/udp # Policy Commander +ppactivation 5134/tcp # PP ActivationServer +erp-scale 5135/tcp # ERP-Scale +minotaur-sa 5136/udp # Minotaur SA +ctsd 5137/tcp # MyCTS server port +ctsd 5137/udp # MyCTS server port +rmonitor_secure 5145/tcp rmonitor-secure # RMONITOR SECURE +rmonitor_secure 5145/udp rmonitor-secure # RMONITOR SECURE +social-alarm 5146/tcp # Social Alarm Service +atmp 5150/tcp # Ascend Tunnel Management Protocol +atmp 5150/udp # Ascend Tunnel Management Protocol +esri_sde 5151/tcp esri-sde # ESRI SDE Instance +esri_sde 5151/udp esri-sde # ESRI SDE Remote Start +sde-discovery 5152/tcp # ESRI SDE Instance Discovery +sde-discovery 5152/udp # ESRI SDE Instance Discovery +toruxserver 5153/tcp # ToruX Game Server +bzflag 5154/tcp # BZFlag game server +bzflag 5154/udp # BZFlag game server +asctrl-agent 5155/tcp # Oracle asControl Agent +asctrl-agent 5155/udp # Oracle asControl Agent +rugameonline 5156/tcp # Russian Online Game +mediat 5157/tcp # Mediat Remote Object Exchange +snmpssh 5161/tcp # SNMP over SSH Transport Model +snmpssh-trap 5162/tcp # SNMP Notification over SSH Transport Model +sbackup 5163/tcp # Shadow Backup +vpa 5164/tcp # Virtual Protocol Adapter +vpa-disc 5164/udp # Virtual Protocol Adapter Discovery +ife_icorp 5165/tcp ife-icorp # ife_1corp +ife_icorp 5165/udp ife-icorp # ife_1corp +winpcs 5166/tcp # WinPCS Service Connection +winpcs 5166/udp # WinPCS Service Connection +scte104 5167/tcp # SCTE104 Connection +scte104 5167/udp # SCTE104 Connection +scte30 5168/tcp # SCTE30 Connection +scte30 5168/udp # SCTE30 Connection +pcoip-mgmt 5172/tcp # PC over IP Endpoint Management +aol 5190/tcp # America-Online +aol 5190/udp # America-Online +aol-1 5191/tcp # AmericaOnline1 +aol-1 5191/udp # AmericaOnline1 +aol-2 5192/tcp # AmericaOnline2 +aol-2 5192/udp # AmericaOnline2 +aol-3 5193/tcp # AmericaOnline3 +aol-3 5193/udp # AmericaOnline3 +cpscomm 5194/tcp # CipherPoint Config Service +ampl-lic 5195/tcp # AMPL_Optimization - program licenses +ampl-tableproxy 5196/tcp # AMPL_Optimization - table data +tunstall-lwp 5197/tcp # Tunstall Lone worker device +targus-getdata 5200/tcp # TARGUS GetData +targus-getdata 5200/udp # TARGUS GetData +targus-getdata1 5201/tcp # TARGUS GetData 1 +targus-getdata1 5201/udp # TARGUS GetData 1 +targus-getdata2 5202/tcp # TARGUS GetData 2 +targus-getdata2 5202/udp # TARGUS GetData 2 +targus-getdata3 5203/tcp # TARGUS GetData 3 +targus-getdata3 5203/udp # TARGUS GetData 3 +nomad 5209/tcp # Nomad Device Video Transfer +noteza 5215/tcp # NOTEZA Data Safety Service +noteza 5215/sctp # NOTEZA Data Safety Service +3exmp 5221/tcp # 3eTI Extensible Management Protocol for OAMP +xmpp-client 5222/tcp # XMPP Client Connection +hpvirtgrp 5223/tcp # HP Virtual Machine Group Management +hpvirtgrp 5223/udp # HP Virtual Machine Group Management +hpvirtctrl 5224/tcp # HP Virtual Machine Console Operations +hpvirtctrl 5224/udp # HP Virtual Machine Console Operations +hp-server 5225/tcp # HP Server +hp-server 5225/udp # HP Server +hp-status 5226/tcp # HP Status +hp-status 5226/udp # HP Status +perfd 5227/tcp # HP System Performance Metric Service +perfd 5227/udp # HP System Performance Metric Service +hpvroom 5228/tcp # HP Virtual Room Service +jaxflow 5229/tcp # Collector and Forwarder Management +jaxflow-data 5230/tcp # JaxMP RealFlow application and protocol data +crusecontrol 5231/tcp # Remote Control of Scan Software for Cruse Scanners +enfs 5233/tcp # Etinnae Network File Service +eenet 5234/tcp # EEnet communications +eenet 5234/udp # EEnet communications +galaxy-network 5235/tcp # Galaxy Network Service +galaxy-network 5235/udp # Galaxy Network Service +padl2sim 5236/tcp # +padl2sim 5236/udp # +mnet-discovery 5237/tcp # m-net discovery +mnet-discovery 5237/udp # m-net discovery +downtools 5245/tcp # DownTools Control Protocol +downtools-disc 5245/udp # DownTools Discovery Protocol +capwap-control 5246/udp # CAPWAP Control Protocol +capwap-data 5247/udp # CAPWAP Data Protocol +caacws 5248/tcp # CA Access Control Web Service +caacws 5248/udp # CA Access Control Web Service +caaclang2 5249/tcp # CA AC Lang Service +caaclang2 5249/udp # CA AC Lang Service +soagateway 5250/tcp # soaGateway +soagateway 5250/udp # soaGateway +caevms 5251/tcp # CA eTrust VM Service +caevms 5251/udp # CA eTrust VM Service +movaz-ssc 5252/tcp # Movaz SSC +movaz-ssc 5252/udp # Movaz SSC +kpdp 5253/tcp # Kohler Power Device Protocol +logcabin 5254/tcp # LogCabin storage service +3com-njack-1 5264/tcp # 3Com Network Jack Port 1 +3com-njack-1 5264/udp # 3Com Network Jack Port 1 +3com-njack-2 5265/tcp # 3Com Network Jack Port 2 +3com-njack-2 5265/udp # 3Com Network Jack Port 2 +xmpp-server 5269/tcp # XMPP Server Connection +cartographerxmp 5270/tcp # Cartographer XMP +cartographerxmp 5270/udp # Cartographer XMP +cuelink 5271/tcp # StageSoft CueLink messaging +cuelink-disc 5271/udp # StageSoft CueLink discovery +pk 5272/tcp # PK +pk 5272/udp # PK +xmpp-bosh 5280/tcp # Bidirectional-streams Over Synchronous HTTP (BOSH) +undo-lm 5281/tcp # Undo License Manager +transmit-port 5282/tcp # Marimba Transmitter Port +transmit-port 5282/udp # Marimba Transmitter Port +presence 5298/tcp # XMPP Link-Local Messaging +presence 5298/udp # XMPP Link-Local Messaging +nlg-data 5299/tcp # NLG Data Service +nlg-data 5299/udp # NLG Data Service +hacl-hb 5300/tcp # HA cluster heartbeat +hacl-hb 5300/udp # HA cluster heartbeat +hacl-gs 5301/tcp # HA cluster general services +hacl-gs 5301/udp # HA cluster general services +hacl-cfg 5302/tcp # HA cluster configuration +hacl-cfg 5302/udp # HA cluster configuration +hacl-probe 5303/tcp # HA cluster probing +hacl-probe 5303/udp # HA cluster probing +hacl-local 5304/tcp # HA Cluster Commands +hacl-local 5304/udp # HA Cluster Commands +hacl-test 5305/tcp # HA Cluster Test +hacl-test 5305/udp # HA Cluster Test +sun-mc-grp 5306/tcp # Sun MC Group +sun-mc-grp 5306/udp # Sun MC Group +sco-aip 5307/tcp # SCO AIP +sco-aip 5307/udp # SCO AIP +jprinter 5309/tcp # J Printer +jprinter 5309/udp # J Printer +outlaws 5310/tcp # Outlaws +outlaws 5310/udp # Outlaws +permabit-cs 5312/tcp # Permabit Client-Server +permabit-cs 5312/udp # Permabit Client-Server +rrdp 5313/tcp # Real-time & Reliable Data +rrdp 5313/udp # Real-time & Reliable Data +opalis-rbt-ipc 5314/tcp # opalis-rbt-ipc +opalis-rbt-ipc 5314/udp # opalis-rbt-ipc +hacl-poll 5315/tcp # HA Cluster UDP Polling +hacl-poll 5315/udp # HA Cluster UDP Polling +hpbladems 5316/tcp # HPBladeSystem Monitor Service +hpdevms 5317/tcp # HP Device Monitor Service +pkix-cmc 5318/tcp # PKIX Certificate +bsfserver-zn 5320/tcp # Webservices-based Zn interface of BSF +bsfsvr-zn-ssl 5321/tcp # Webservices-based Zn interface of BSF over SSL +kfserver 5343/tcp # Sculptor Database Server +kfserver 5343/udp # Sculptor Database Server +xkotodrcp 5344/tcp # xkoto DRCP +xkotodrcp 5344/udp # xkoto DRCP +stuns 5349/tcp stun-behaviors turns # STUN over TLS, TURN over TLS +stuns 5349/udp stun-behaviors turns # Reserved for a future enhancement of STUN, Reserved for a future enhancement of TURN +pcp-multicast 5350/tcp # Port Control Protocol +pcp 5350/udp # Port Control Protocol +dns-llq 5352/tcp # DNS Long-Lived Queries +dns-llq 5352/udp # DNS Long-Lived Queries +mdns 5353/tcp # Multicast DNS +mdns 5353/udp # Multicast DNS +mdnsresponder 5354/tcp noclog # Multicast DNS Responder IPC +mdnsresponder 5354/udp noclog # Multicast DNS Responder IPC +ms-smlbiz 5356/tcp # Microsoft Small Business +ms-smlbiz 5356/udp # Microsoft Small Business +wsdapi 5357/tcp # Web Services for Devices +wsdapi 5357/udp # Web Services for Devices +wsdapi-s 5358/tcp # WS for Devices Secured +wsdapi-s 5358/udp # WS for Devices Secured +ms-alerter 5359/tcp # Microsoft Alerter +ms-alerter 5359/udp # Microsoft Alerter +ms-sideshow 5360/tcp # Protocol for Windows SideShow +ms-sideshow 5360/udp # Protocol for Windows SideShow +ms-s-sideshow 5361/tcp # Secure Protocol for Windows SideShow +ms-s-sideshow 5361/udp # Secure Protocol for Windows SideShow +serverwsd2 5362/tcp # Microsoft Windows Server WSD2 Service +serverwsd2 5362/udp # Microsoft Windows Server WSD2 Service +net-projection 5363/tcp # Windows Network Projection +net-projection 5363/udp # Windows Network Projection +kdnet 5364/udp # Microsoft Kernel Debugger +stresstester 5397/tcp # StressTester(tm) Injector +stresstester 5397/udp # StressTester(tm) Injector +elektron-admin 5398/tcp # Elektron Administration +elektron-admin 5398/udp # Elektron Administration +securitychase 5399/tcp # SecurityChase +securitychase 5399/udp # SecurityChase +excerpt 5400/tcp # Excerpt Search +excerpt 5400/udp # Excerpt Search +excerpts 5401/tcp # Excerpt Search Secure +excerpts 5401/udp # Excerpt Search Secure +hpoms-ci-lstn 5403/tcp # HPOMS-CI-LSTN +hpoms-ci-lstn 5403/udp # HPOMS-CI-LSTN +hpoms-dps-lstn 5404/tcp # HPOMS-DPS-LSTN +hpoms-dps-lstn 5404/udp # HPOMS-DPS-LSTN +netsupport 5405/tcp # NetSupport +netsupport 5405/udp # NetSupport +systemics-sox 5406/tcp # Systemics Sox +systemics-sox 5406/udp # Systemics Sox +foresyte-clear 5407/tcp # Foresyte-Clear +foresyte-clear 5407/udp # Foresyte-Clear +foresyte-sec 5408/tcp # Foresyte-Sec +foresyte-sec 5408/udp # Foresyte-Sec +salient-dtasrv 5409/tcp # Salient Data Server +salient-dtasrv 5409/udp # Salient Data Server +salient-usrmgr 5410/tcp # Salient User Manager +salient-usrmgr 5410/udp # Salient User Manager +actnet 5411/tcp # ActNet +actnet 5411/udp # ActNet +continuus 5412/tcp # Continuus +continuus 5412/udp # Continuus +wwiotalk 5413/tcp # WWIOTALK +wwiotalk 5413/udp # WWIOTALK +statusd 5414/tcp # StatusD +statusd 5414/udp # StatusD +ns-server 5415/tcp # NS Server +ns-server 5415/udp # NS Server +sns-gateway 5416/tcp # SNS Gateway +sns-gateway 5416/udp # SNS Gateway +sns-agent 5417/tcp # SNS Agent +sns-agent 5417/udp # SNS Agent +mcntp 5418/tcp # MCNTP +mcntp 5418/udp # MCNTP +dj-ice 5419/tcp # DJ-ICE +dj-ice 5419/udp # DJ-ICE +cylink-c 5420/tcp # Cylink-C +cylink-c 5420/udp # Cylink-C +netsupport2 5421/tcp # Net Support 2 +netsupport2 5421/udp # Net Support 2 +salient-mux 5422/tcp # Salient MUX +salient-mux 5422/udp # Salient MUX +virtualuser 5423/tcp # VIRTUALUSER +virtualuser 5423/udp # VIRTUALUSER +beyond-remote 5424/tcp # Beyond Remote +beyond-remote 5424/udp # Beyond Remote +br-channel 5425/tcp # Beyond Remote Command Channel +br-channel 5425/udp # Beyond Remote Command Channel +devbasic 5426/tcp # DEVBASIC +devbasic 5426/udp # DEVBASIC +sco-peer-tta 5427/tcp # SCO-PEER-TTA +sco-peer-tta 5427/udp # SCO-PEER-TTA +telaconsole 5428/tcp # TELACONSOLE +telaconsole 5428/udp # TELACONSOLE +base 5429/tcp # Billing and Accounting System Exchange +base 5429/udp # Billing and Accounting System Exchange +radec-corp 5430/tcp # RADEC CORP +radec-corp 5430/udp # RADEC CORP +park-agent 5431/tcp # PARK AGENT +park-agent 5431/udp # PARK AGENT +pyrrho 5433/tcp # Pyrrho DBMS +pyrrho 5433/udp # Pyrrho DBMS +sgi-arrayd 5434/tcp # SGI Array Services Daemon +sgi-arrayd 5434/udp # SGI Array Services Daemon +sceanics 5435/tcp # SCEANICS situation and action notification +sceanics 5435/udp # SCEANICS situation and action notification +pmip6-cntl 5436/udp # pmip6-cntl +pmip6-data 5437/udp # pmip6-data +spss 5443/tcp # Pearson HTTPS +spss 5443/udp # Pearson HTTPS +smbdirect 5445/tcp # Server Message Block over Remote Direct Memory Access +smbdirect 5445/sctp # Server Message Block over Remote Direct Memory Access +tiepie 5450/tcp # TiePie engineering data +tiepie-disc 5450/udp # TiePie engineering data (discovery) +surebox 5453/tcp # SureBox +surebox 5453/udp # SureBox +apc-5454 5454/tcp # APC 5454 +apc-5454 5454/udp # APC 5454 +apc-5455 5455/tcp # APC 5455 +apc-5455 5455/udp # APC 5455 +apc-5456 5456/tcp # APC 5456 +apc-5456 5456/udp # APC 5456 +silkmeter 5461/tcp # SILKMETER +silkmeter 5461/udp # SILKMETER +ttl-publisher 5462/tcp # TTL Publisher +ttl-publisher 5462/udp # TTL Publisher +ttlpriceproxy 5463/tcp # TTL Price Proxy +ttlpriceproxy 5463/udp # TTL Price Proxy +quailnet 5464/tcp # Quail Networks Object Broker +quailnet 5464/udp # Quail Networks Object Broker +netops-broker 5465/tcp # NETOPS-BROKER +netops-broker 5465/udp # NETOPS-BROKER +absolab-col 5470/tcp # The Apsolab company's data collection protocol +absolab-cols 5471/tcp # The Apsolab company's secure data collection protocol +absolab-tag 5472/tcp # The Apsolab company's dynamic tag protocol +absolab-tags 5473/tcp # The Apsolab company's secure dynamic tag protocol +absolab-rpc 5474/udp # The Apsolab company's status query protocol +absolab-data 5475/tcp # The Apsolab company's data retrieval protocol +fcp-addr-srvr1 5500/tcp # fcp-addr-srvr1 +fcp-addr-srvr1 5500/udp # fcp-addr-srvr1 +fcp-addr-srvr2 5501/tcp # fcp-addr-srvr2 +fcp-addr-srvr2 5501/udp # fcp-addr-srvr2 +fcp-srvr-inst1 5502/tcp # fcp-srvr-inst1 +fcp-srvr-inst1 5502/udp # fcp-srvr-inst1 +fcp-srvr-inst2 5503/tcp # fcp-srvr-inst2 +fcp-srvr-inst2 5503/udp # fcp-srvr-inst2 +fcp-cics-gw1 5504/tcp # fcp-cics-gw1 +fcp-cics-gw1 5504/udp # fcp-cics-gw1 +checkoutdb 5505/tcp # Checkout Database +checkoutdb 5505/udp # Checkout Database +amc 5506/tcp # Amcom Mobile Connect +amc 5506/udp # Amcom Mobile Connect +psl-management 5507/tcp # PowerSysLab Electrical +sgi-eventmond 5553/tcp # SGI Eventmond Port +sgi-eventmond 5553/udp # SGI Eventmond Port +sgi-esphttp 5554/tcp # SGI ESP HTTP +sgi-esphttp 5554/udp # SGI ESP HTTP +personal-agent 5555/tcp # Personal Agent +personal-agent 5555/udp # Personal Agent +freeciv 5556/tcp # Freeciv gameplay +freeciv 5556/udp # Freeciv gameplay +farenet 5557/tcp # Sandlab FARENET +hpe-dp-bura 5565/tcp # HPE Advanced BURA +westec-connect 5566/tcp # Westec Connect +dof-dps-mc-sec 5567/tcp # DOF protocol stack +dof-dps-mc-sec 5567/udp # DOF protocol stack +sdt 5568/tcp # Session Data Transport Multicast +sdt 5568/udp # Session Data Transport Multicast +rdmnet-ctrl 5569/tcp # Management (RDM) controller status notifications +rdmnet-device 5569/udp # PLASA E1.33, Remote Device Management (RDM) messages +sdmmp 5573/tcp # SAS Domain Management Messaging Protocol +sdmmp 5573/udp # SAS Domain Management Messaging Protocol +lsi-bobcat 5574/tcp # SAS IO Forwarding +ora-oap 5575/tcp # Oracle Access Protocol +fdtracks 5579/tcp # FleetDisplay Tracking Service +tmosms0 5580/tcp # T-Mobile SMS Protocol Message 0 +tmosms0 5580/udp # T-Mobile SMS Protocol Message 0 +tmosms1 5581/tcp # T-Mobile SMS Protocol Message 1 +tmosms1 5581/udp # T-Mobile SMS Protocol Message 1 +fac-restore 5582/tcp # T-Mobile SMS Protocol Message 3 +fac-restore 5582/udp # T-Mobile SMS Protocol Message 3 +tmo-icon-sync 5583/tcp # T-Mobile SMS Protocol Message 2 +tmo-icon-sync 5583/udp # T-Mobile SMS Protocol Message 2 +bis-web 5584/tcp # BeInSync-Web +bis-web 5584/udp # BeInSync-Web +bis-sync 5585/tcp # BeInSync-sync +bis-sync 5585/udp # BeInSync-sync +att-mt-sms 5586/tcp # mobile terminated SMS, not visible to client(ATT) +ininmessaging 5597/tcp # inin secure messaging +ininmessaging 5597/udp # inin secure messaging +mctfeed 5598/tcp # MCT Market Data Feed +mctfeed 5598/udp # MCT Market Data Feed +esinstall 5599/tcp # Enterprise Security Remote Install +esinstall 5599/udp # Enterprise Security Remote Install +esmmanager 5600/tcp # Enterprise Security Manager +esmmanager 5600/udp # Enterprise Security Manager +esmagent 5601/tcp # Enterprise Security Agent +esmagent 5601/udp # Enterprise Security Agent +a1-msc 5602/tcp # A1-MSC +a1-msc 5602/udp # A1-MSC +a1-bs 5603/tcp # A1-BS +a1-bs 5603/udp # A1-BS +a3-sdunode 5604/tcp # A3-SDUNode +a3-sdunode 5604/udp # A3-SDUNode +a4-sdunode 5605/tcp # A4-SDUNode +a4-sdunode 5605/udp # A4-SDUNode +efr 5618/tcp # Fiscal Registering Protocol +ninaf 5627/tcp # Node Initiated Network Association Forma +ninaf 5627/udp # Node Initiated Network Association Forma +htrust 5628/tcp # HTrust API +htrust 5628/udp # HTrust API +symantec-sfdb 5629/tcp # Symantec Storage Foundation for Database +symantec-sfdb 5629/udp # Symantec Storage Foundation for Database +precise-comm 5630/tcp # PreciseCommunication +precise-comm 5630/udp # PreciseCommunication +pcanywheredata 5631/tcp # pcANYWHEREdata +pcanywheredata 5631/udp # pcANYWHEREdata +pcanywherestat 5632/tcp # pcANYWHEREstat +pcanywherestat 5632/udp # pcANYWHEREstat +beorl 5633/tcp # BE Operations Request Listener +beorl 5633/udp # BE Operations Request Listener +xprtld 5634/tcp # SF Message Service +xprtld 5634/udp # SF Message Service +sfmsso 5635/tcp # SFM Authentication Subsystem +sfm-db-server 5636/tcp # SFMdb - SFM DB server +cssc 5637/tcp # Symantec CSSC +flcrs 5638/tcp # Symantec Fingerprint Lookup and Container Reference +ics 5639/tcp # Symantec Integrity Checking +vfmobile 5646/tcp # Ventureforth Mobile +nrpe 5666/tcp # Nagios Remote Plugin Executor +filemq 5670/tcp # ZeroMQ file +zre-disc 5670/udp # Local area discovery and msging over ZeroMQ +amqps 5671/tcp # amqp protocol over TLS/SSL +amqps 5671/udp # amqp protocol over TLS/SSL +amqp 5672/tcp # AMQP +amqp 5672/udp # AMQP +amqp 5672/sctp # AMQP +jms 5673/tcp # JACL Message Server +jms 5673/udp # JACL Message Server +hyperscsi-port 5674/tcp # HyperSCSI Port +hyperscsi-port 5674/udp # HyperSCSI Port +v5ua 5675/tcp # V5UA application port +v5ua 5675/udp # V5UA application port +v5ua 5675/sctp # V5UA application port +raadmin 5676/tcp # RA Administration +raadmin 5676/udp # RA Administration +questdb2-lnchr 5677/tcp # Quest Central DB2 Launchr +questdb2-lnchr 5677/udp # Quest Central DB2 Launchr +rrac 5678/tcp # Remote Replication Agent Connection +rrac 5678/udp # Remote Replication Agent Connection +dccm 5679/tcp # Direct Cable Connect Manager +dccm 5679/udp # Direct Cable Connect Manager +auriga-router 5680/udp # Auriga Router Service +ncxcp 5681/tcp # Net-coneX Control Protocol +ncxcp 5681/udp # Net-coneX Control Protocol +brightcore 5682/udp # BrightCore control & data transfer exchange +coap 5683/udp # Constrained Application Protocol +coaps 5684/udp # DTLS-secured CoAP +gog-multiplayer 5687/udp # GOG multiplayer game protocol +ggz 5688/tcp # GGZ Gaming Zone +ggz 5688/udp # GGZ Gaming Zone +qmvideo 5689/tcp # QM video network management protocol +qmvideo 5689/udp # QM video network management protocol +rbsystem 5693/tcp # Robert Bosch Data Transfer +kmip 5696/tcp # Key Management Interoperability Protocol +supportassist 5700/tcp # Dell SupportAssist data +proshareaudio 5713/tcp # proshare conf audio +proshareaudio 5713/udp # proshare conf audio +prosharevideo 5714/tcp # proshare conf video +prosharevideo 5714/udp # proshare conf video +prosharedata 5715/tcp # proshare conf data +prosharedata 5715/udp # proshare conf data +prosharerequest 5716/tcp # proshare conf request +prosharerequest 5716/udp # proshare conf request +prosharenotify 5717/tcp # proshare conf notify +prosharenotify 5717/udp # proshare conf notify +dpm 5718/tcp # DPM Communication Server +dpm 5718/udp # DPM Communication Server +dpm-agent 5719/tcp # DPM Agent Coordinator +dpm-agent 5719/udp # DPM Agent Coordinator +ms-licensing 5720/tcp # MS-Licensing +ms-licensing 5720/udp # MS-Licensing +dtpt 5721/tcp # Desktop Passthru Service +dtpt 5721/udp # Desktop Passthru Service +msdfsr 5722/tcp # Microsoft DFS Replication Service +msdfsr 5722/udp # Microsoft DFS Replication Service +omhs 5723/tcp # Operations Manager - Health Service +omhs 5723/udp # Operations Manager - Health Service +omsdk 5724/tcp # Operations Manager - SDK Service +omsdk 5724/udp # Operations Manager - SDK Service +ms-ilm 5725/tcp # Microsoft Identity Lifecycle Manager +ms-ilm-sts 5726/tcp # Microsoft Lifecycle Manager Secure Token Service +asgenf 5727/tcp # ASG Event Notification Framework +io-dist-data 5728/tcp # Dist. I/O Comm. Service Data and Control +io-dist-group 5728/udp # Dist. I/O Comm. Service Group Membership +openmail 5729/tcp # Openmail User Agent Layer +openmail 5729/udp # Openmail User Agent Layer +unieng 5730/tcp # Steltor's calendar access +unieng 5730/udp # Steltor's calendar access +ida-discover1 5741/tcp # IDA Discover Port 1 +ida-discover1 5741/udp # IDA Discover Port 1 +ida-discover2 5742/tcp # IDA Discover Port 2 +ida-discover2 5742/udp # IDA Discover Port 2 +watchdoc-pod 5743/tcp # Watchdoc NetPOD Protocol +watchdoc-pod 5743/udp # Watchdoc NetPOD Protocol +watchdoc 5744/tcp # Watchdoc Server +watchdoc 5744/udp # Watchdoc Server +fcopy-server 5745/tcp # fcopy-server +fcopy-server 5745/udp # fcopy-server +fcopys-server 5746/tcp # fcopys-server +fcopys-server 5746/udp # fcopys-server +tunatic 5747/tcp # Wildbits Tunatic +tunatic 5747/udp # Wildbits Tunatic +tunalyzer 5748/tcp # Wildbits Tunalyzer +tunalyzer 5748/udp # Wildbits Tunalyzer +rscd 5750/tcp # Bladelogic Agent Service +rscd 5750/udp # Bladelogic Agent Service +openmailg 5755/tcp # OpenMail Desk Gateway server +openmailg 5755/udp # OpenMail Desk Gateway server +x500ms 5757/tcp # OpenMail X.500 Directory Server +x500ms 5757/udp # OpenMail X.500 Directory Server +openmailns 5766/tcp # OpenMail NewMail Server +openmailns 5766/udp # OpenMail NewMail Server +s-openmail 5767/tcp # OpenMail Suer Agent Layer (Secure) +s-openmail 5767/udp # OpenMail Suer Agent Layer (Secure) +openmailpxy 5768/tcp # OpenMail CMTS Server +openmailpxy 5768/udp # OpenMail CMTS Server +spramsca 5769/tcp # x509solutions Internal CA +spramsca 5769/udp # x509solutions Internal CA +spramsd 5770/tcp # x509solutions Secure Data +spramsd 5770/udp # x509solutions Secure Data +netagent 5771/tcp # NetAgent +netagent 5771/udp # NetAgent +dali-port 5777/tcp # DALI Port +dali-port 5777/udp # DALI Port +vts-rpc 5780/tcp # Visual Tag System RPC +3par-evts 5781/tcp # 3PAR Event Reporting Service +3par-evts 5781/udp # 3PAR Event Reporting Service +3par-mgmt 5782/tcp # 3PAR Management Service +3par-mgmt 5782/udp # 3PAR Management Service +3par-mgmt-ssl 5783/tcp # 3PAR Management Service with SSL +3par-mgmt-ssl 5783/udp # 3PAR Management Service with SSL +ibar 5784/udp # Cisco Interbox Application Redundancy +3par-rcopy 5785/tcp # 3PAR Inform Remote Copy +3par-rcopy 5785/udp # 3PAR Inform Remote Copy +cisco-redu 5786/udp # redundancy notification +waascluster 5787/udp # Cisco WAAS Cluster Protocol +xtreamx 5793/tcp # XtreamX Supervised Peer message +xtreamx 5793/udp # XtreamX Supervised Peer message +spdp 5794/udp # Simple Peered Discovery Protocol +icmpd 5813/tcp # ICMPD +icmpd 5813/udp # ICMPD +spt-automation 5814/tcp # Support Automation +spt-automation 5814/udp # Support Automation +shiprush-d-ch 5841/tcp # Z-firm ShipRush interface for web access and bidirectional data +reversion 5842/tcp # Reversion Backup/Restore +wherehoo 5859/tcp # WHEREHOO +wherehoo 5859/udp # WHEREHOO +ppsuitemsg 5863/tcp # PlanetPress Suite Messeng +ppsuitemsg 5863/udp # PlanetPress Suite Messeng +diameters 5868/tcp # Diameter over TLS/TCP +diameters 5868/sctp # Diameter over DTLS/SCTP +jute 5883/tcp # Javascript Unit Test Environment +rfb 5900/tcp # Remote Framebuffer +rfb 5900/udp # Remote Framebuffer +cm 5910/tcp # Context Management +cm 5910/udp # Context Management +cm 5910/sctp # Context Management +cpdlc 5911/tcp # Controller Pilot Data Link Communication +cpdlc 5911/udp # Controller Pilot Data Link Communication +cpdlc 5911/sctp # Controller Pilot Data Link Communication +fis 5912/tcp # Flight Information Services +fis 5912/udp # Flight Information Services +fis 5912/sctp # Flight Information Services +ads-c 5913/tcp # Automatic Dependent Surveillance +ads-c 5913/udp # Automatic Dependent Surveillance +ads-c 5913/sctp # Automatic Dependent Surveillance +indy 5963/tcp # Indy Application Server +indy 5963/udp # Indy Application Server +mppolicy-v5 5968/tcp # mppolicy-v5 +mppolicy-v5 5968/udp # mppolicy-v5 +mppolicy-mgr 5969/tcp # mppolicy-mgr +mppolicy-mgr 5969/udp # mppolicy-mgr +couchdb 5984/tcp # CouchDB +couchdb 5984/udp # CouchDB +wsman 5985/tcp # WBEM WS-Management HTTP +wsman 5985/udp # WBEM WS-Management HTTP +wsmans 5986/tcp # WBEM WS-Management HTTP over TLS/SSL +wsmans 5986/udp # WBEM WS-Management HTTP over TLS/SSL +wbem-rmi 5987/tcp # WBEM RMI +wbem-rmi 5987/udp # WBEM RMI +wbem-http 5988/tcp # WBEM CIM-XML (HTTP) +wbem-http 5988/udp # WBEM CIM-XML (HTTP) +wbem-https 5989/tcp # WBEM CIM-XML (HTTPS) +wbem-https 5989/udp # WBEM CIM-XML (HTTPS) +wbem-exp-https 5990/tcp # WBEM Export HTTPS +wbem-exp-https 5990/udp # WBEM Export HTTPS +nuxsl 5991/tcp # NUXSL +nuxsl 5991/udp # NUXSL +consul-insight 5992/tcp # Consul InSight Security +consul-insight 5992/udp # Consul InSight Security +cim-rs 5993/tcp # DMTF WBEM CIM REST +ndl-ahp-svc 6064/tcp # NDL-AHP-SVC +ndl-ahp-svc 6064/udp # NDL-AHP-SVC +winpharaoh 6065/tcp # WinPharaoh +winpharaoh 6065/udp # WinPharaoh +ewctsp 6066/tcp # EWCTSP +ewctsp 6066/udp # EWCTSP +gsmp-ancp 6068/tcp # GSMP/ANCP +trip 6069/tcp # TRIP +trip 6069/udp # TRIP +messageasap 6070/tcp # Messageasap +messageasap 6070/udp # Messageasap +ssdtp 6071/tcp # SSDTP +ssdtp 6071/udp # SSDTP +diagnose-proc 6072/tcp # DIAGNOSE-PROC +diagnose-proc 6072/udp # DIAGNOSE-PROC +directplay8 6073/tcp # DirectPlay8 +directplay8 6073/udp # DirectPlay8 +max 6074/tcp # Microsoft Max +max 6074/udp # Microsoft Max +dpm-acm 6075/tcp # Microsoft DPM Access Control Manager +msft-dpm-cert 6076/tcp # Microsoft DPM WCF Certificates +iconstructsrv 6077/tcp # iConstruct Server +gue 6080/udp # Generic UDP Encapsulation +geneve 6081/udp # Generic Network Virtualization Encapsulation +p25cai 6082/udp # APCO Project 25 Common Air Interface +miami-bcast 6083/udp # telecomsoftware miami broadcast +reload-config 6084/tcp # Peer to Peer Infrastructure Protocol +konspire2b 6085/tcp # konspire2b p2p network +konspire2b 6085/udp # konspire2b p2p network +pdtp 6086/tcp # PDTP P2P +pdtp 6086/udp # PDTP P2P +ldss 6087/tcp # Local Download Sharing Service +ldss 6087/udp # Local Download Sharing Service +doglms 6088/tcp # SuperDog License Manager +doglms-notify 6088/udp # SuperDog License Manager +raxa-mgmt 6099/tcp # RAXA Management +synchronet-db 6100/tcp # SynchroNet-db +synchronet-db 6100/udp # SynchroNet-db +synchronet-rtc 6101/tcp # SynchroNet-rtc +synchronet-rtc 6101/udp # SynchroNet-rtc +synchronet-upd 6102/tcp # SynchroNet-upd +synchronet-upd 6102/udp # SynchroNet-upd +rets 6103/tcp # RETS +rets 6103/udp # RETS +dbdb 6104/tcp # DBDB +dbdb 6104/udp # DBDB +primaserver 6105/tcp # Prima Server +primaserver 6105/udp # Prima Server +mpsserver 6106/tcp # MPS Server +mpsserver 6106/udp # MPS Server +etc-control 6107/tcp # ETC Control +etc-control 6107/udp # ETC Control +sercomm-scadmin 6108/tcp # Sercomm-SCAdmin +sercomm-scadmin 6108/udp # Sercomm-SCAdmin +globecast-id 6109/tcp # GLOBECAST-ID +globecast-id 6109/udp # GLOBECAST-ID +softcm 6110/tcp # HP SoftBench CM +softcm 6110/udp # HP SoftBench CM +spc 6111/tcp # HP SoftBench Sub-Process Control +spc 6111/udp # HP SoftBench Sub-Process Control +dtspcd 6112/tcp # Desk-Top Sub-Process Control Daemon +dtspcd 6112/udp # Desk-Top Sub-Process Control Daemon +dayliteserver 6113/tcp # Daylite Server +wrspice 6114/tcp # WRspice IPC Service +xic 6115/tcp # Xic IPC Service +xtlserv 6116/tcp # XicTools License Manager Service +daylitetouch 6117/tcp # Daylite Touch Sync +tipc 6118/udp # Transparent Inter Process Communication +spdy 6121/tcp # SPDY for a faster web +bex-webadmin 6122/tcp # Backup Express Web Server +bex-webadmin 6122/udp # Backup Express Web Server +backup-express 6123/tcp # Backup Express +backup-express 6123/udp # Backup Express +pnbs 6124/tcp # Phlexible Network Backup Service +pnbs 6124/udp # Phlexible Network Backup Service +damewaremobgtwy 6130/tcp # The DameWare Mobile Gateway Service +nbt-wol 6133/tcp # New Boundary Tech WOL +nbt-wol 6133/udp # New Boundary Tech WOL +pulsonixnls 6140/tcp # Pulsonix Network License Service +pulsonixnls 6140/udp # Pulsonix Network License Service +meta-corp 6141/tcp # Meta Corporation License Manager +meta-corp 6141/udp # Meta Corporation License Manager +aspentec-lm 6142/tcp # Aspen Technology License Manager +aspentec-lm 6142/udp # Aspen Technology License Manager +watershed-lm 6143/tcp # Watershed License Manager +watershed-lm 6143/udp # Watershed License Manager +statsci1-lm 6144/tcp # StatSci License Manager - 1 +statsci1-lm 6144/udp # StatSci License Manager - 1 +statsci2-lm 6145/tcp # StatSci License Manager - 2 +statsci2-lm 6145/udp # StatSci License Manager - 2 +lonewolf-lm 6146/tcp # Lone Wolf Systems License Manager +lonewolf-lm 6146/udp # Lone Wolf Systems License Manager +montage-lm 6147/tcp # Montage License Manager +montage-lm 6147/udp # Montage License Manager +tal-pod 6149/tcp # tal-pod +tal-pod 6149/udp # tal-pod +efb-aci 6159/tcp # EFB Application Control Interface +ecmp 6160/tcp # Emerson Extensible Control and Management Protocol +ecmp-data 6160/udp # Emerson Extensible Control and Management Protocol Data +patrol-ism 6161/tcp # PATROL Internet Srv Mgr +patrol-ism 6161/udp # PATROL Internet Srv Mgr +patrol-coll 6162/tcp # PATROL Collector +patrol-coll 6162/udp # PATROL Collector +pscribe 6163/tcp # Precision Scribe Cnx Port +pscribe 6163/udp # Precision Scribe Cnx Port +lm-x 6200/tcp # LM-X License Manager by X-Formation +lm-x 6200/udp # LM-X License Manager by X-Formation +thermo-calc 6201/udp # Thermo-Calc_Software +qmtps 6209/tcp # QMTP over TLS +qmtps 6209/udp # QMTP over TLS +radmind 6222/tcp # Radmind Access Protocol +radmind 6222/udp # Radmind Access Protocol +jeol-nsdtp-1 6241/tcp # JEOL Network Services Data Transport Protocol 1 +jeol-nsddp-1 6241/udp # JEOL Network Services Dynamic Discovery Protocol 1 +jeol-nsdtp-2 6242/tcp # JEOL Network Services Data Transport Protocol 2 +jeol-nsddp-2 6242/udp # JEOL Network Services Dynamic Discovery Protocol 2 +jeol-nsdtp-3 6243/tcp # JEOL Network Services Data Transport Protocol 3 +jeol-nsddp-3 6243/udp # JEOL Network Services Dynamic Discovery Protocol 3 +jeol-nsdtp-4 6244/tcp # JEOL Network Services Data Transport Protocol 4 +jeol-nsddp-4 6244/udp # JEOL Network Services Dynamic Discovery Protocol 4 +tl1-raw-ssl 6251/tcp # TL1 Raw Over SSL/TLS +tl1-raw-ssl 6251/udp # TL1 Raw Over SSL/TLS +tl1-ssh 6252/tcp # TL1 over SSH +tl1-ssh 6252/udp # TL1 over SSH +crip 6253/tcp # CRIP +crip 6253/udp # CRIP +gld 6267/tcp # GridLAB-D User Interface +grid 6268/tcp # Grid Authentication +grid 6268/udp # Grid Authentication +grid-alt 6269/tcp # Grid Authentication Alt +grid-alt 6269/udp # Grid Authentication Alt +bmc-grx 6300/tcp # BMC GRX +bmc-grx 6300/udp # BMC GRX +bmc_ctd_ldap 6301/tcp bmc-ctd-ldap # BMC CONTROL-D LDAP SERVER +bmc_ctd_ldap 6301/udp bmc-ctd-ldap # BMC CONTROL-D LDAP SERVER +ufmp 6306/tcp # Unified Fabric Management Protocol +ufmp 6306/udp # Unified Fabric Management Protocol +scup 6315/tcp # Sensor Control Unit Protocol +scup-disc 6315/udp # Sensor Control Unit Protocol Discovery Protocol +abb-escp 6316/tcp # Ethernet Sensor Communications Protocol +abb-escp 6316/udp # Ethernet Sensor Communications Protocol +nav-data-cmd 6317/tcp # Navtech Radar Sensor Data command +nav-data 6317/udp # Navtech Radar Sensor Data +repsvc 6320/tcp # Double-Take Replication Service +repsvc 6320/udp # Double-Take Replication Service +emp-server1 6321/tcp # Empress Software Connectivity Server 1 +emp-server1 6321/udp # Empress Software Connectivity Server 1 +emp-server2 6322/tcp # Empress Software Connectivity Server 2 +emp-server2 6322/udp # Empress Software Connectivity Server 2 +hrd-ncs 6324/tcp # HR Device Network +hrd-ns-disc 6324/udp # HR Device Network service +dt-mgmtsvc 6325/tcp # Double-Take Management Service +dt-vra 6326/tcp # Double-Take Virtual Recovery +sflow 6343/tcp # sFlow traffic monitoring +sflow 6343/udp # sFlow traffic monitoring +streletz 6344/tcp # Argus-Spectr security and fire-prevention systems service +gnutella-svc 6346/tcp # gnutella-svc +gnutella-svc 6346/udp # gnutella-svc +gnutella-rtr 6347/tcp # gnutella-rtr +gnutella-rtr 6347/udp # gnutella-rtr +adap 6350/tcp # App Discovery and Access Protocol +adap 6350/udp # App Discovery and Access Protocol +pmcs 6355/tcp # PMCS applications +pmcs 6355/udp # PMCS applications +metaedit-mu 6360/tcp # MetaEdit+ Multi-User +metaedit-mu 6360/udp # MetaEdit+ Multi-User +ndn 6363/udp # Named Data Networking +metaedit-se 6370/tcp # MetaEdit+ Server Administration +metaedit-se 6370/udp # MetaEdit+ Server Administration +redis 6379/tcp # An advanced key-value cache and store +metatude-mds 6382/tcp # Metatude Dialogue Server +metatude-mds 6382/udp # Metatude Dialogue Server +clariion-evr01 6389/tcp # clariion-evr01 +clariion-evr01 6389/udp # clariion-evr01 +metaedit-ws 6390/tcp # MetaEdit+ WebService API +metaedit-ws 6390/udp # MetaEdit+ WebService API +boe-cms 6400/tcp # Business Objects CMS contact port +boe-cms 6400/udp # Business Objects CMS contact port +boe-was 6401/tcp # boe-was +boe-was 6401/udp # boe-was +boe-eventsrv 6402/tcp # boe-eventsrv +boe-eventsrv 6402/udp # boe-eventsrv +boe-cachesvr 6403/tcp # boe-cachesvr +boe-cachesvr 6403/udp # boe-cachesvr +boe-filesvr 6404/tcp # Business Objects Enterprise internal server +boe-filesvr 6404/udp # Business Objects Enterprise internal server +boe-pagesvr 6405/tcp # Business Objects Enterprise internal server +boe-pagesvr 6405/udp # Business Objects Enterprise internal server +boe-processsvr 6406/tcp # Business Objects Enterprise internal server +boe-processsvr 6406/udp # Business Objects Enterprise internal server +boe-resssvr1 6407/tcp # Business Objects Enterprise internal server +boe-resssvr1 6407/udp # Business Objects Enterprise internal server +boe-resssvr2 6408/tcp # Business Objects Enterprise internal server +boe-resssvr2 6408/udp # Business Objects Enterprise internal server +boe-resssvr3 6409/tcp # Business Objects Enterprise internal server +boe-resssvr3 6409/udp # Business Objects Enterprise internal server +boe-resssvr4 6410/tcp # Business Objects Enterprise internal server +boe-resssvr4 6410/udp # Business Objects Enterprise internal server +faxcomservice 6417/tcp # Faxcom Message Service +faxcomservice 6417/udp # Faxcom Message Service +syserverremote 6418/tcp # SYserver remote commands +svdrp 6419/tcp # Simple VDR Protocol +svdrp-disc 6419/udp # Simple VDR Protocol Discovery +nim-vdrshell 6420/tcp # NIM_VDRShell +nim-vdrshell 6420/udp # NIM_VDRShell +nim-wan 6421/tcp # NIM_WAN +nim-wan 6421/udp # NIM_WAN +pgbouncer 6432/tcp # PgBouncer +tarp 6442/tcp # Transitory Application Request Protocol +sun-sr-https 6443/tcp # Service Registry Default HTTPS Domain +sun-sr-https 6443/udp # Service Registry Default HTTPS Domain +sge_qmaster 6444/tcp sge-qmaster # Grid Engine Qmaster Service +sge_qmaster 6444/udp sge-qmaster # Grid Engine Qmaster Service +sge_execd 6445/tcp sge-execd # Grid Engine Execution Service +sge_execd 6445/udp sge-execd # Grid Engine Execution Service +mysql-proxy 6446/tcp # MySQL Proxy +mysql-proxy 6446/udp # MySQL Proxy +skip-cert-recv 6455/tcp # SKIP Certificate Receive +skip-cert-recv 6455/udp # SKIP Certificate Receive +skip-cert-send 6456/tcp # SKIP Certificate Send +skip-cert-send 6456/udp # SKIP Certificate Send +lvision-lm 6471/tcp # LVision License Manager +lvision-lm 6471/udp # LVision License Manager +sun-sr-http 6480/tcp # Service Registry Default HTTP Domain +sun-sr-http 6480/udp # Service Registry Default HTTP Domain +servicetags 6481/tcp # Service Tags +servicetags 6481/udp # Service Tags +ldoms-mgmt 6482/tcp # Logical Domains Management Interface +ldoms-mgmt 6482/udp # Logical Domains Management Interface +SunVTS-RMI 6483/tcp # SunVTS RMI +SunVTS-RMI 6483/udp # SunVTS RMI +sun-sr-jms 6484/tcp # Service Registry Default JMS Domain +sun-sr-jms 6484/udp # Service Registry Default JMS Domain +sun-sr-iiop 6485/tcp # Service Registry Default IIOP Domain +sun-sr-iiop 6485/udp # Service Registry Default IIOP Domain +sun-sr-iiops 6486/tcp # Service Registry Default IIOPS Domain +sun-sr-iiops 6486/udp # Service Registry Default IIOPS Domain +sun-sr-iiop-aut 6487/tcp # Service Registry Default IIOPAuth Domain +sun-sr-iiop-aut 6487/udp # Service Registry Default IIOPAuth Domain +sun-sr-jmx 6488/tcp # Service Registry Default JMX Domain +sun-sr-jmx 6488/udp # Service Registry Default JMX Domain +sun-sr-admin 6489/tcp # Service Registry Default Admin Domain +sun-sr-admin 6489/udp # Service Registry Default Admin Domain +boks 6500/tcp # BoKS Master +boks 6500/udp # BoKS Master +boks_servc 6501/tcp boks-servc # BoKS Servc +boks_servc 6501/udp boks-servc # BoKS Servc +boks_servm 6502/tcp boks-servm # BoKS Servm +boks_servm 6502/udp boks-servm # BoKS Servm +boks_clntd 6503/tcp boks-clntd # BoKS Clntd +boks_clntd 6503/udp boks-clntd # BoKS Clntd +badm_priv 6505/tcp badm-priv # BoKS Admin Private Port +badm_priv 6505/udp badm-priv # BoKS Admin Private Port +badm_pub 6506/tcp badm-pub # BoKS Admin Public Port +badm_pub 6506/udp badm-pub # BoKS Admin Public Port +bdir_priv 6507/tcp bdir-priv # BoKS Dir Server, Private Port +bdir_priv 6507/udp bdir-priv # BoKS Dir Server, Private Port +bdir_pub 6508/tcp bdir-pub # BoKS Dir Server, Public Port +bdir_pub 6508/udp bdir-pub # BoKS Dir Server, Public Port +mgcs-mfp-port 6509/tcp # MGCS-MFP Port +mgcs-mfp-port 6509/udp # MGCS-MFP Port +mcer-port 6510/tcp # MCER Port +mcer-port 6510/udp # MCER Port +dccp-udp 6511/udp # Protocol Encapsulation for NAT Traversal +netconf-tls 6513/tcp # NETCONF over TLS +syslog-tls 6514/tcp # Syslog over TLS +syslog-tls 6514/udp # Syslog over TLS +syslog-tls 6514/dccp # Syslog over TLS +elipse-rec 6515/tcp # Elipse RPC Protocol +elipse-rec 6515/udp # Elipse RPC Protocol +lds-distrib 6543/tcp # lds_distrib +lds-distrib 6543/udp # lds_distrib +lds-dump 6544/tcp # LDS Dump Service +lds-dump 6544/udp # LDS Dump Service +apc-6547 6547/tcp # APC 6547 +apc-6547 6547/udp # APC 6547 +apc-6548 6548/tcp # APC 6548 +apc-6548 6548/udp # APC 6548 +apc-6549 6549/tcp # APC 6549 +apc-6549 6549/udp # APC 6549 +fg-sysupdate 6550/tcp # fg-sysupdate +fg-sysupdate 6550/udp # fg-sysupdate +sum 6551/tcp # Software Update Manager +sum 6551/udp # Software Update Manager +xdsxdm 6558/tcp # +xdsxdm 6558/udp # +sane-port 6566/tcp # SANE Control Port +sane-port 6566/udp # SANE Control Port +canit_store 6568/tcp canit-store # CanIt Storage Manager +rp-reputation 6568/udp # Roaring Penguin IP Address Reputation Collection +affiliate 6579/tcp # Affiliate +affiliate 6579/udp # Affiliate +parsec-master 6580/tcp # Parsec Masterserver +parsec-master 6580/udp # Parsec Masterserver +parsec-peer 6581/tcp # Parsec Peer-to-Peer +parsec-peer 6581/udp # Parsec Peer-to-Peer +parsec-game 6582/tcp # Parsec Gameserver +parsec-game 6582/udp # Parsec Gameserver +joaJewelSuite 6583/tcp # JOA Jewel Suite +joaJewelSuite 6583/udp # JOA Jewel Suite +mshvlm 6600/tcp # Microsoft Hyper-V Live Migration +mstmg-sstp 6601/tcp # Microsoft Threat Management Gateway SSTP +wsscomfrmwk 6602/tcp # Windows WSS Communication Framework +odette-ftps 6619/tcp # ODETTE-FTP over TLS/SSL +odette-ftps 6619/udp # ODETTE-FTP over TLS/SSL +kftp-data 6620/tcp # Kerberos V5 FTP Data +kftp-data 6620/udp # Kerberos V5 FTP Data +kftp 6621/tcp # Kerberos V5 FTP Control +kftp 6621/udp # Kerberos V5 FTP Control +mcftp 6622/tcp # Multicast FTP +mcftp 6622/udp # Multicast FTP +ktelnet 6623/tcp # Kerberos V5 Telnet +ktelnet 6623/udp # Kerberos V5 Telnet +datascaler-db 6624/tcp # DataScaler database +datascaler-ctl 6625/tcp # DataScaler control +wago-service 6626/tcp # WAGO Service and Update +wago-service 6626/udp # WAGO Service and Update +nexgen 6627/tcp # Allied Electronics NeXGen +nexgen 6627/udp # Allied Electronics NeXGen +afesc-mc 6628/tcp # AFE Stock Channel M/C +afesc-mc 6628/udp # AFE Stock Channel M/C +mxodbc-connect 6632/tcp # eGenix mxODBC Connect +cisco-vpath-tun 6633/udp # Cisco vPath Services Overlay +mpls-pm 6634/udp # MPLS Performance Measurement out-of-band response +mpls-udp 6635/udp # Encapsulate MPLS packets in UDP tunnels +mpls-udp-dtls 6636/udp # Encapsulate MPLS packets in UDP tunnels with DTLS +ovsdb 6640/tcp # Open vSwitch Database +openflow 6653/tcp # OpenFlow +openflow 6653/udp # OpenFlow +pcs-sf-ui-man 6655/tcp # PC SOFT - Software factory UI/manager +emgmsg 6656/tcp # Emergency Message Control Service +palcom-disc 6657/udp # PalCom Discovery +ircu 6665/tcp # IRCU +ircu 6665/udp # IRCU +ircu-2 6666/tcp # IRCU +ircu-2 6666/udp # IRCU +ircu-3 6667/tcp ircd # IRCU +ircu-3 6667/udp ircd # IRCU +ircu-4 6668/tcp # IRCU +ircu-4 6668/udp # IRCU +ircu-5 6669/tcp # IRCU +ircu-5 6669/udp # IRCU +vocaltec-gold 6670/tcp # Vocaltec Global Online Directory +vocaltec-gold 6670/udp # Vocaltec Global Online Directory +p4p-portal 6671/tcp # P4P Portal Service +p4p-portal 6671/udp # P4P Portal Service +vision_server 6672/tcp vision-server # vision_server +vision_server 6672/udp vision-server # vision_server +vision_elmd 6673/tcp vision-elmd # vision_elmd +vision_elmd 6673/udp vision-elmd # vision_elmd +vfbp 6678/tcp # Viscount Freedom Bridge Protocol +vfbp-disc 6678/udp # Viscount Freedom Bridge Discovery +osaut 6679/tcp # Osorno Automation +osaut 6679/udp # Osorno Automation +clever-ctrace 6687/tcp # CleverView for cTrace Message Service +clever-tcpip 6688/tcp # CleverView for TCP/IP Message Service +tsa 6689/tcp # Tofino Security Appliance +tsa 6689/udp # Tofino Security Appliance +cleverdetect 6690/tcp # CLEVERDetect Message Service +babel 6696/udp # Babel Routing Protocol +ircs-u 6697/tcp # Internet Relay Chat via TLS/SSL +kti-icad-srvr 6701/tcp # KTI/ICAD Nameserver +kti-icad-srvr 6701/udp # KTI/ICAD Nameserver +e-design-net 6702/tcp # e-Design network +e-design-net 6702/udp # e-Design network +e-design-web 6703/tcp # e-Design web +e-design-web 6703/udp # e-Design web +frc-hp 6704/sctp # ForCES HP (High Priority) channel +frc-mp 6705/sctp # ForCES MP (Medium Priority) channel +frc-lp 6706/sctp # ForCES LP (Low priority) channel +ibprotocol 6714/tcp # Internet Backplane Protocol +ibprotocol 6714/udp # Internet Backplane Protocol +fibotrader-com 6715/tcp # Fibotrader Communications +fibotrader-com 6715/udp # Fibotrader Communications +princity-agent 6716/tcp # Princity Agent +bmc-perf-agent 6767/tcp # BMC PERFORM AGENT +bmc-perf-agent 6767/udp # BMC PERFORM AGENT +bmc-perf-mgrd 6768/tcp # BMC PERFORM MGRD +bmc-perf-mgrd 6768/udp # BMC PERFORM MGRD +adi-gxp-srvprt 6769/tcp # ADInstruments GxP Server +adi-gxp-srvprt 6769/udp # ADInstruments GxP Server +plysrv-http 6770/tcp # PolyServe http +plysrv-http 6770/udp # PolyServe http +plysrv-https 6771/tcp # PolyServe https +plysrv-https 6771/udp # PolyServe https +ntz-tracker 6777/tcp # netTsunami Tracker +ntz-p2p-storage 6778/tcp # netTsunami p2p storage +bfd-lag 6784/udp # Bidirectional Forwarding Detection on LAG +dgpf-exchg 6785/tcp # DGPF Individual Exchange +dgpf-exchg 6785/udp # DGPF Individual Exchange +smc-jmx 6786/tcp # Sun Java Web Console JMX +smc-jmx 6786/udp # Sun Java Web Console JMX +smc-admin 6787/tcp # Sun Web Console Admin +smc-admin 6787/udp # Sun Web Console Admin +smc-http 6788/tcp # SMC-HTTP +smc-http 6788/udp # SMC-HTTP +smc-https 6789/tcp # SMC-HTTPS +smc-https 6789/udp # SMC-HTTPS +hnmp 6790/tcp # HNMP +hnmp 6790/udp # HNMP +hnm 6791/tcp # Halcyon Network Manager +hnm 6791/udp # Halcyon Network Manager +acnet 6801/tcp # ACNET Control System Protocol +acnet 6801/udp # ACNET Control System Protocol +pentbox-sim 6817/tcp # PenTBox Secure IM Protocol +ambit-lm 6831/tcp # ambit-lm +ambit-lm 6831/udp # ambit-lm +netmo-default 6841/tcp # Netmo Default +netmo-default 6841/udp # Netmo Default +netmo-http 6842/tcp # Netmo HTTP +netmo-http 6842/udp # Netmo HTTP +iccrushmore 6850/tcp # ICCRUSHMORE +iccrushmore 6850/udp # ICCRUSHMORE +acctopus-cc 6868/tcp # Acctopus Command Channel +acctopus-st 6868/udp # Acctopus Status +muse 6888/tcp # MUSE +muse 6888/udp # MUSE +jetstream 6901/tcp # Novell Jetstream messaging protocol +ethoscan 6935/tcp # EthoScan Service +ethoscan 6935/udp # EthoScan Service +xsmsvc 6936/tcp # XenSource Management Service +xsmsvc 6936/udp # XenSource Management Service +bioserver 6946/tcp # Biometrics Server +bioserver 6946/udp # Biometrics Server +otlp 6951/tcp # OTLP +otlp 6951/udp # OTLP +jmact3 6961/tcp # JMACT3 +jmact3 6961/udp # JMACT3 +jmevt2 6962/tcp # jmevt2 +jmevt2 6962/udp # jmevt2 +swismgr1 6963/tcp # swismgr1 +swismgr1 6963/udp # swismgr1 +swismgr2 6964/tcp # swismgr2 +swismgr2 6964/udp # swismgr2 +swistrap 6965/tcp # swistrap +swistrap 6965/udp # swistrap +swispol 6966/tcp # swispol +swispol 6966/udp # swispol +acmsoda 6969/tcp # acmsoda +acmsoda 6969/udp # acmsoda +conductor 6970/tcp # Conductor test coordination +conductor-mpx 6970/sctp # conductor for multiplex +MobilitySrv 6997/tcp # Mobility XE Protocol +MobilitySrv 6997/udp # Mobility XE Protocol +iatp-highpri 6998/tcp # IATP-highPri +iatp-highpri 6998/udp # IATP-highPri +iatp-normalpri 6999/tcp # IATP-normalPri +iatp-normalpri 6999/udp # IATP-normalPri +ups-onlinet 7010/tcp # onlinet uninterruptable power supplies +ups-onlinet 7010/udp # onlinet uninterruptable power supplies +talon-disc 7011/tcp # Talon Discovery Port +talon-disc 7011/udp # Talon Discovery Port +talon-engine 7012/tcp # Talon Engine +talon-engine 7012/udp # Talon Engine +microtalon-dis 7013/tcp # Microtalon Discovery +microtalon-dis 7013/udp # Microtalon Discovery +microtalon-com 7014/tcp # Microtalon Communications +microtalon-com 7014/udp # Microtalon Communications +talon-webserver 7015/tcp # Talon Webserver +talon-webserver 7015/udp # Talon Webserver +fisa-svc 7018/tcp # FISA Service +doceri-ctl 7019/tcp # doceri drawing service control +doceri-view 7019/udp # doceri drawing service screen view +dpserve 7020/tcp # DP Serve +dpserve 7020/udp # DP Serve +dpserveadmin 7021/tcp # DP Serve Admin +dpserveadmin 7021/udp # DP Serve Admin +ctdp 7022/tcp # CT Discovery Protocol +ctdp 7022/udp # CT Discovery Protocol +ct2nmcs 7023/tcp # Comtech T2 NMCS +ct2nmcs 7023/udp # Comtech T2 NMCS +vmsvc 7024/tcp # Vormetric service +vmsvc 7024/udp # Vormetric service +vmsvc-2 7025/tcp # Vormetric Service II +vmsvc-2 7025/udp # Vormetric Service II +op-probe 7030/tcp # ObjectPlanet probe +op-probe 7030/udp # ObjectPlanet probe +iposplanet 7031/tcp # IPOSPLANET retailing multi devices protocol +quest-disc 7040/udp # Quest application level network service discovery +arcp 7070/tcp # ARCP +arcp 7070/udp # ARCP +iwg1 7071/tcp # IWGADTS Aircraft Housekeeping Message +iwg1 7071/udp # IWGADTS Aircraft Housekeeping Message +martalk 7073/tcp # MarTalk protocol +empowerid 7080/tcp # EmpowerID Communication +empowerid 7080/udp # EmpowerID Communication +zixi-transport 7088/udp # Zixi live video transport +jdp-disc 7095/udp # Java Discovery Protocol +lazy-ptop 7099/tcp # lazy-ptop +lazy-ptop 7099/udp # lazy-ptop +font-service 7100/udp # X Font Service +elcn 7101/tcp # Embedded Light Control Network +elcn 7101/udp # Embedded Light Control Network +aes-x170 7107/udp # AES-X170 +rothaga 7117/tcp # Encrypted chat and file transfer service +virprot-lm 7121/tcp # Virtual Prototypes License Manager +virprot-lm 7121/udp # Virtual Prototypes License Manager +scenidm 7128/tcp # intelligent data manager +scenidm 7128/udp # intelligent data manager +scenccs 7129/tcp # Catalog Content Search +scenccs 7129/udp # Catalog Content Search +cabsm-comm 7161/tcp # CA BSM Comm +cabsm-comm 7161/udp # CA BSM Comm +caistoragemgr 7162/tcp # CA Storage Manager +caistoragemgr 7162/udp # CA Storage Manager +cacsambroker 7163/tcp # CA Connection Broker +cacsambroker 7163/udp # CA Connection Broker +fsr 7164/tcp # File System Repository Agent +fsr 7164/udp # File System Repository Agent +doc-server 7165/tcp # Document WCF Server +doc-server 7165/udp # Document WCF Server +aruba-server 7166/tcp # Aruba eDiscovery Server +aruba-server 7166/udp # Aruba eDiscovery Server +casrmagent 7167/tcp # CA SRM Agent +cnckadserver 7168/tcp # cncKadServer DB & Inventory Services +ccag-pib 7169/tcp # Consequor Consulting Process Integration Bridge +ccag-pib 7169/udp # Consequor Consulting Process Integration Bridge +nsrp 7170/tcp # Adaptive Name/Service Resolution +nsrp 7170/udp # Adaptive Name/Service Resolution +drm-production 7171/tcp # Discovery and Retention Mgt Production +drm-production 7171/udp # Discovery and Retention Mgt Production +metalbend 7172/tcp # MetalBend programmable interface +zsecure 7173/tcp # zSecure Server +clutild 7174/tcp # Clutild +clutild 7174/udp # Clutild +janus-disc 7181/udp # Janus Guidewire Enterprise Discovery Service Bus +fodms 7200/tcp # FODMS FLIP +fodms 7200/udp # FODMS FLIP +dlip 7201/tcp # DLIP +dlip 7201/udp # DLIP +PS-Server 7215/tcp # PaperStream Server services +PS-Capture-Pro 7216/tcp # PaperStream Capture Professional +ramp 7227/tcp # Registry A & M Protocol +ramp 7227/udp # Registry A $ M Protocol +citrixupp 7228/tcp # Citrix Universal Printing Port +citrixuppg 7229/tcp # Citrix UPP Gateway +aspcoordination 7235/udp # ASP Coordination Protocol +display 7236/tcp # Wi-Fi Alliance Wi-Fi Display Protocol +pads 7237/tcp # PADS (Public Area Display System) Server +frc-hicp 7244/tcp # FrontRow Calypso Human Interface Control Protocol +frc-hicp-disc 7244/udp # FrontRow Calypso Human Interface Control Protocol +cnap 7262/tcp # Calypso Network Access Protocol +cnap 7262/udp # Calypso Network Access Protocol +watchme-7272 7272/tcp # WatchMe Monitoring 7272 +watchme-7272 7272/udp # WatchMe Monitoring 7272 +oma-rlp 7273/tcp # OMA Roaming Location +oma-rlp 7273/udp # OMA Roaming Location +oma-rlp-s 7274/tcp # OMA Roaming Location SEC +oma-rlp-s 7274/udp # OMA Roaming Location SEC +oma-ulp 7275/tcp # OMA UserPlane Location +oma-ulp 7275/udp # OMA UserPlane Location +oma-ilp 7276/tcp # OMA Internal Location Protocol +oma-ilp 7276/udp # OMA Internal Location Protocol +oma-ilp-s 7277/tcp # OMA Internal Location Secure Protocol +oma-ilp-s 7277/udp # OMA Internal Location Secure Protocol +oma-dcdocbs 7278/tcp # OMA Dynamic Content Delivery over CBS +oma-dcdocbs 7278/udp # OMA Dynamic Content Delivery over CBS +ctxlic 7279/tcp # Citrix Licensing +ctxlic 7279/udp # Citrix Licensing +itactionserver1 7280/tcp # ITACTIONSERVER 1 +itactionserver1 7280/udp # ITACTIONSERVER 1 +itactionserver2 7281/tcp # ITACTIONSERVER 2 +itactionserver2 7281/udp # ITACTIONSERVER 2 +mzca-action 7282/tcp # eventACTION/ussACTION (MZCA) server +mzca-alert 7282/udp # eventACTION/ussACTION (MZCA) alert +genstat 7283/tcp # General Statistics Rendezvous Protocol +lcm-server 7365/tcp # LifeKeeper Communications +lcm-server 7365/udp # LifeKeeper Communications +mindfilesys 7391/tcp # mind-file system server +mindfilesys 7391/udp # mind-file system server +mrssrendezvous 7392/tcp # mrss-rendezvous server +mrssrendezvous 7392/udp # mrss-rendezvous server +nfoldman 7393/tcp # nFoldMan Remote Publish +nfoldman 7393/udp # nFoldMan Remote Publish +fse 7394/tcp # File system export of backup images +fse 7394/udp # File system export of backup images +winqedit 7395/tcp # winqedit +winqedit 7395/udp # winqedit +hexarc 7397/tcp # Hexarc Command Language +hexarc 7397/udp # Hexarc Command Language +rtps-discovery 7400/tcp # RTPS Discovery +rtps-discovery 7400/udp # RTPS Discovery +rtps-dd-ut 7401/tcp # RTPS Data-Distribution User-Traffic +rtps-dd-ut 7401/udp # RTPS Data-Distribution User-Traffic +rtps-dd-mt 7402/tcp # RTPS Data-Distribution Meta-Traffic +rtps-dd-mt 7402/udp # RTPS Data-Distribution Meta-Traffic +ionixnetmon 7410/tcp # Ionix Network Monitor +ionixnetmon 7410/udp # Ionix Network Monitor +daqstream 7411/tcp # Streaming of measurement +daqstream 7411/udp # Streaming of measurement +mtportmon 7421/tcp # Matisse Port Monitor +mtportmon 7421/udp # Matisse Port Monitor +pmdmgr 7426/tcp # OpenView DM Postmaster Manager +pmdmgr 7426/udp # OpenView DM Postmaster Manager +oveadmgr 7427/tcp # OpenView DM Event Agent Manager +oveadmgr 7427/udp # OpenView DM Event Agent Manager +ovladmgr 7428/tcp # OpenView DM Log Agent Manager +ovladmgr 7428/udp # OpenView DM Log Agent Manager +opi-sock 7429/tcp # OpenView DM rqt communication +opi-sock 7429/udp # OpenView DM rqt communication +xmpv7 7430/tcp # OpenView DM xmpv7 api pipe +xmpv7 7430/udp # OpenView DM xmpv7 api pipe +pmd 7431/tcp # OpenView DM ovc/xmpv3 api pipe +pmd 7431/udp # OpenView DM ovc/xmpv3 api pipe +faximum 7437/tcp # Faximum +faximum 7437/udp # Faximum +oracleas-https 7443/tcp # Oracle Application Server HTTPS +oracleas-https 7443/udp # Oracle Application Server HTTPS +sttunnel 7471/tcp # Stateless Transport Tunneling Protocol +rise 7473/tcp # Rise: The Vieneo Province +rise 7473/udp # Rise: The Vieneo Province +neo4j 7474/tcp # Neo4j Graph Database +telops-lmd 7491/tcp # telops-lmd +telops-lmd 7491/udp # telops-lmd +silhouette 7500/tcp # Silhouette User +silhouette 7500/udp # Silhouette User +ovbus 7501/tcp # HP OpenView Bus Daemon +ovbus 7501/udp # HP OpenView Bus Daemon +adcp 7508/tcp # Automation Device Configuration Protocol +acplt 7509/tcp # ACPLT - process automation service +ovhpas 7510/tcp # HP OpenView Application Server +ovhpas 7510/udp # HP OpenView Application Server +pafec-lm 7511/tcp # pafec-lm +pafec-lm 7511/udp # pafec-lm +saratoga 7542/tcp # Saratoga Transfer Protocol +saratoga 7542/udp # Saratoga Transfer Protocol +atul 7543/tcp # atul server +atul 7543/udp # atul server +nta-ds 7544/tcp # FlowAnalyzer DisplayServer +nta-ds 7544/udp # FlowAnalyzer DisplayServer +nta-us 7545/tcp # FlowAnalyzer UtilityServer +nta-us 7545/udp # FlowAnalyzer UtilityServer +cfs 7546/tcp # Cisco Fabric service +cfs 7546/udp # Cisco Fabric service +cwmp 7547/tcp # DSL Forum CWMP +cwmp 7547/udp # DSL Forum CWMP +tidp 7548/tcp # Threat Information Distribution Protocol +tidp 7548/udp # Threat Information Distribution Protocol +nls-tl 7549/tcp # Network Layer Signaling Transport Layer +nls-tl 7549/udp # Network Layer Signaling Transport Layer +cloudsignaling 7550/udp # Cloud Signaling Service +controlone-con 7551/tcp # ControlONE Console signaling +sncp 7560/tcp # Sniffer Command Protocol +sncp 7560/udp # Sniffer Command Protocol +cfw 7563/tcp # Control Framework +vsi-omega 7566/tcp # VSI Omega +vsi-omega 7566/udp # VSI Omega +dell-eql-asm 7569/tcp # Dell EqualLogic Host Group Management +aries-kfinder 7570/tcp # Aries Kfinder +aries-kfinder 7570/udp # Aries Kfinder +coherence 7574/tcp # Oracle Coherence Cluster Service +sun-lm 7588/tcp # Sun License Manager +sun-lm 7588/udp # Sun License Manager +mipi-debug 7606/tcp # MIPI Alliance Debug +mipi-debug 7606/udp # MIPI Alliance Debug +indi 7624/tcp # Instrument Neutral Distributed Interface +indi 7624/udp # Instrument Neutral Distributed Interface +simco 7626/tcp # SImple Middlebox COnfiguration (SIMCO) Server +simco 7626/sctp # SImple Middlebox COnfiguration (SIMCO) +soap-http 7627/tcp # SOAP Service Port +soap-http 7627/udp # SOAP Service Port +zen-pawn 7628/tcp # Primary Agent Work Notification +zen-pawn 7628/udp # Primary Agent Work Notification +xdas 7629/tcp # OpenXDAS Wire Protocol +xdas 7629/udp # OpenXDAS Wire Protocol +hawk 7630/tcp # HA Web Konsole +tesla-sys-msg 7631/tcp # TESLA System Messaging +pmdfmgt 7633/tcp # PMDF Management +pmdfmgt 7633/udp # PMDF Management +cuseeme 7648/tcp # bonjour-cuseeme +cuseeme 7648/udp # bonjour-cuseeme +imqstomp 7672/tcp # iMQ STOMP Server +imqstomps 7673/tcp # iMQ STOMP Server over SSL +imqtunnels 7674/tcp # iMQ SSL tunnel +imqtunnels 7674/udp # iMQ SSL tunnel +imqtunnel 7675/tcp # iMQ Tunnel +imqtunnel 7675/udp # iMQ Tunnel +imqbrokerd 7676/tcp # iMQ Broker Rendezvous +imqbrokerd 7676/udp # iMQ Broker Rendezvous +sun-user-https 7677/tcp # Sun App Server - HTTPS +sun-user-https 7677/udp # Sun App Server - HTTPS +pando-pub 7680/tcp # Pando Media Public Distribution +pando-pub 7680/udp # Pando Media Public Distribution +dmt 7683/tcp # Cleondris DMT +collaber 7689/tcp # Collaber Network Service +collaber 7689/udp # Collaber Network Service +klio 7697/tcp # KLIO communications +klio 7697/udp # KLIO communications +em7-secom 7700/tcp # EM7 Secure Communications +sync-em7 7707/tcp # EM7 Dynamic Updates +sync-em7 7707/udp # EM7 Dynamic Updates +scinet 7708/tcp # scientia.net +scinet 7708/udp # scientia.net +medimageportal 7720/tcp # MedImage Portal +medimageportal 7720/udp # MedImage Portal +nsdeepfreezectl 7724/tcp # Novell Snap-in Deep Freeze Control +nsdeepfreezectl 7724/udp # Novell Snap-in Deep Freeze Control +nitrogen 7725/tcp # Nitrogen Service +nitrogen 7725/udp # Nitrogen Service +freezexservice 7726/tcp # FreezeX Console Service +freezexservice 7726/udp # FreezeX Console Service +trident-data 7727/tcp # Trident Systems Data +trident-data 7727/udp # Trident Systems Data +osvr 7728/tcp # Open-Source Virtual Reality +osvr 7728/udp # Open-Source Virtual Reality +osvr 7728/sctp # Open-Source Virtual Reality +smip 7734/tcp # Smith Protocol over IP +smip 7734/udp # Smith Protocol over IP +aiagent 7738/tcp # HP Enterprise Discovery Agent +aiagent 7738/udp # HP Enterprise Discovery Agent +scriptview 7741/tcp # ScriptView Network +scriptview 7741/udp # ScriptView Network +msss 7742/tcp # Mugginsoft Script Server Service +sstp-1 7743/tcp # Sakura Script Transfer Protocol +sstp-1 7743/udp # Sakura Script Transfer Protocol +raqmon-pdu 7744/tcp # RAQMON PDU +raqmon-pdu 7744/udp # RAQMON PDU +prgp 7747/tcp # Put/Run/Get Protocol +prgp 7747/udp # Put/Run/Get Protocol +inetfs 7775/tcp # File System using TLS over WAN +cbt 7777/tcp # cbt +cbt 7777/udp # cbt +interwise 7778/tcp # Interwise +interwise 7778/udp # Interwise +vstat 7779/tcp # VSTAT +vstat 7779/udp # VSTAT +accu-lmgr 7781/tcp # accu-lmgr +accu-lmgr 7781/udp # accu-lmgr +s-bfd 7784/udp # Seamless Bidirectional Forwarding Detection +minivend 7786/tcp # MINIVEND +minivend 7786/udp # MINIVEND +popup-reminders 7787/tcp # Popup Reminders Receive +popup-reminders 7787/udp # Popup Reminders Receive +office-tools 7789/tcp # Office Tools Pro Receive +office-tools 7789/udp # Office Tools Pro Receive +q3ade 7794/tcp # Q3ADE Cluster Service +q3ade 7794/udp # Q3ADE Cluster Service +pnet-conn 7797/tcp # Propel Connector port +pnet-conn 7797/udp # Propel Connector port +pnet-enc 7798/tcp # Propel Encoder port +pnet-enc 7798/udp # Propel Encoder port +altbsdp 7799/tcp # Alternate BSDP Service +altbsdp 7799/udp # Alternate BSDP Service +asr 7800/tcp # Apple Software Restore +asr 7800/udp # Apple Software Restore +ssp-client 7801/tcp # Secure Server Protocol - client +ssp-client 7801/udp # Secure Server Protocol - client +vns-tp 7802/udp # Virtualized Network Services tunnel protocol +rbt-wanopt 7810/tcp # Riverbed WAN Optimization Protocol +rbt-wanopt 7810/udp # Riverbed WAN Optimization Protocol +apc-7845 7845/tcp # APC 7845 +apc-7845 7845/udp # APC 7845 +apc-7846 7846/tcp # APC 7846 +apc-7846 7846/udp # APC 7846 +csoauth 7847/tcp # A product key authentication by CSO +mobileanalyzer 7869/tcp # MobileAnalyzer& MobileMonitor +rbt-smc 7870/tcp # Riverbed Steelhead Mobile Service +mdm 7871/tcp # Mobile Device Management +mipv6tls 7872/udp # TLS-based Mobile IPv6 Security +owms 7878/tcp # Opswise Message Service +pss 7880/tcp # Pearson +pss 7880/udp # Pearson +ubroker 7887/tcp # Universal Broker +ubroker 7887/udp # Universal Broker +mevent 7900/tcp # Multicast Event +mevent 7900/udp # Multicast Event +tnos-sp 7901/tcp # TNOS Service Protocol +tnos-sp 7901/udp # TNOS Service Protocol +tnos-dp 7902/tcp # TNOS shell Protocol +tnos-dp 7902/udp # TNOS shell Protocol +tnos-dps 7903/tcp # TNOS Secure DiaguardProtocol +tnos-dps 7903/udp # TNOS Secure DiaguardProtocol +qo-secure 7913/tcp # QuickObjects secure port +qo-secure 7913/udp # QuickObjects secure port +t2-drm 7932/tcp # Tier 2 Data Resource Manager +t2-drm 7932/udp # Tier 2 Data Resource Manager +t2-brm 7933/tcp # Tier 2 Business Rules Manager +t2-brm 7933/udp # Tier 2 Business Rules Manager +generalsync 7962/tcp # general-purpose synchronization protocol +generalsync 7962/udp # general-purpose synchronization protocol +supercell 7967/tcp # Supercell +supercell 7967/udp # Supercell +micromuse-ncps 7979/tcp # Micromuse-ncps +micromuse-ncps 7979/udp # Micromuse-ncps +quest-vista 7980/tcp # Quest Vista +quest-vista 7980/udp # Quest Vista +sossd-collect 7981/tcp # Spotlight on SQL Server Desktop Collect +sossd-agent 7982/tcp # Spotlight on SQL Server Desktop Agent +sossd-disc 7982/udp # Spotlight on SQL Server Desktop Agent Discovery +pushns 7997/tcp # PUSH Notification Service +usicontentpush 7998/udp # USI Content Push Service +irdmi2 7999/tcp # iRDMI2 +irdmi2 7999/udp # iRDMI2 +irdmi 8000/tcp # iRDMI +irdmi 8000/udp # iRDMI +vcom-tunnel 8001/tcp # VCOM Tunnel +vcom-tunnel 8001/udp # VCOM Tunnel +teradataordbms 8002/tcp # Teradata ORDBMS +teradataordbms 8002/udp # Teradata ORDBMS +mcreport 8003/tcp # Mulberry Connect Reporting Service +mcreport 8003/udp # Mulberry Connect Reporting Service +mxi 8005/tcp # MXI Generation II for z/OS +mxi 8005/udp # MXI Generation II for z/OS +qbdb 8019/tcp # QB DB Dynamic Port +qbdb 8019/udp # QB DB Dynamic Port +intu-ec-svcdisc 8020/tcp # Intuit Entitlement Service and Discovery +intu-ec-svcdisc 8020/udp # Intuit Entitlement Service and Discovery +intu-ec-client 8021/tcp # Intuit Entitlement Client +intu-ec-client 8021/udp # Intuit Entitlement Client +oa-system 8022/tcp # oa-system +oa-system 8022/udp # oa-system +ca-audit-da 8025/tcp # CA Audit Distribution Agent +ca-audit-da 8025/udp # CA Audit Distribution Agent +ca-audit-ds 8026/tcp # CA Audit Distribution Server +ca-audit-ds 8026/udp # CA Audit Distribution Server +pro-ed 8032/tcp # ProEd +pro-ed 8032/udp # ProEd +mindprint 8033/tcp # MindPrint +mindprint 8033/udp # MindPrint +vantronix-mgmt 8034/tcp # .vantronix Management +vantronix-mgmt 8034/udp # .vantronix Management +ampify 8040/tcp # Ampify Messaging Protocol +ampify 8040/udp # Ampify Messaging Protocol +fs-agent 8042/tcp # FireScope Agent +fs-server 8043/tcp # FireScope Server +fs-mgmt 8044/tcp # FireScope Management Interface +rocrail 8051/tcp # Rocrail Client Service +senomix01 8052/tcp # Senomix Timesheets Server +senomix01 8052/udp # Senomix Timesheets Server +senomix02 8053/tcp # Senomix Timesheets Client [1 year assignment] +senomix02 8053/udp # Senomix Timesheets Client [1 year assignment] +senomix03 8054/tcp # Senomix Timesheets Server [1 year assignment] +senomix03 8054/udp # Senomix Timesheets Server [1 year assignment] +senomix04 8055/tcp # Senomix Timesheets Server [1 year assignment] +senomix04 8055/udp # Senomix Timesheets Server [1 year assignment] +senomix05 8056/tcp # Senomix Timesheets Server [1 year assignment] +senomix05 8056/udp # Senomix Timesheets Server [1 year assignment] +senomix06 8057/tcp # Senomix Timesheets Client [1 year assignment] +senomix06 8057/udp # Senomix Timesheets Client [1 year assignment] +senomix07 8058/tcp # Senomix Timesheets Client [1 year assignment] +senomix07 8058/udp # Senomix Timesheets Client [1 year assignment] +senomix08 8059/tcp # Senomix Timesheets Client [1 year assignment] +senomix08 8059/udp # Senomix Timesheets Client [1 year assignment] +aero 8060/udp # Asymmetric Extended Route Optimization (AERO) +toad-bi-appsrvr 8066/tcp # Toad BI Application Server +infi-async 8067/tcp # Infinidat async replication +gadugadu 8074/tcp # Gadu-Gadu +gadugadu 8074/udp # Gadu-Gadu +us-cli 8082/tcp # Utilistor (Client) +us-cli 8082/udp # Utilistor (Client) +us-srv 8083/tcp # Utilistor (Server) +us-srv 8083/udp # Utilistor (Server) +d-s-n 8086/tcp # Distributed SCADA Networking Rendezvous Port +d-s-n 8086/udp # Distributed SCADA Networking Rendezvous Port +simplifymedia 8087/tcp # Simplify Media SPP Protocol +simplifymedia 8087/udp # Simplify Media SPP Protocol +radan-http 8088/tcp # Radan HTTP +radan-http 8088/udp # Radan HTTP +jamlink 8091/tcp # Jam Link Framework +sac 8097/tcp # SAC Port Id +sac 8097/udp # SAC Port Id +xprint-server 8100/tcp # Xprint Server +xprint-server 8100/udp # Xprint Server +ldoms-migr 8101/tcp # Logical Domains Migration +kz-migr 8102/tcp # Oracle Kernel zones migration server +mtl8000-matrix 8115/tcp # MTL8000 Matrix +mtl8000-matrix 8115/udp # MTL8000 Matrix +cp-cluster 8116/tcp # Check Point Clustering +cp-cluster 8116/udp # Check Point Clustering +purityrpc 8117/tcp # Purity replication clustering and remote management +privoxy 8118/tcp # Privoxy HTTP proxy +privoxy 8118/udp # Privoxy HTTP proxy +apollo-data 8121/tcp # Apollo Data Port +apollo-data 8121/udp # Apollo Data Port +apollo-admin 8122/tcp # Apollo Admin Port +apollo-admin 8122/udp # Apollo Admin Port +paycash-online 8128/tcp # PayCash Online Protocol +paycash-online 8128/udp # PayCash Online Protocol +paycash-wbp 8129/tcp # PayCash Wallet-Browser +paycash-wbp 8129/udp # PayCash Wallet-Browser +indigo-vrmi 8130/tcp # INDIGO-VRMI +indigo-vrmi 8130/udp # INDIGO-VRMI +indigo-vbcp 8131/tcp # INDIGO-VBCP +indigo-vbcp 8131/udp # INDIGO-VBCP +dbabble 8132/tcp # dbabble +dbabble 8132/udp # dbabble +puppet 8140/tcp # The Puppet master service +isdd 8148/tcp # i-SDD file transfer +isdd 8148/udp # i-SDD file transfer +eor-game 8149/udp # Edge of Reality game data +quantastor 8153/tcp # QuantaStor Management interface +patrol 8160/tcp # Patrol +patrol 8160/udp # Patrol +patrol-snmp 8161/tcp # Patrol SNMP +patrol-snmp 8161/udp # Patrol SNMP +lpar2rrd 8162/tcp # LPAR2RRD client server communication +intermapper 8181/tcp # Intermapper network management system +vmware-fdm 8182/tcp # VMware Fault Domain Manager +vmware-fdm 8182/udp # VMware Fault Domain Manager +proremote 8183/tcp # ProRemote +itach 8184/tcp # Remote iTach Connection +itach 8184/udp # Remote iTach Connection +gcp-rphy 8190/tcp # Generic control plane for RPHY +limnerpressure 8191/tcp # Limner Pressure +spytechphone 8192/tcp # SpyTech Phone Service +spytechphone 8192/udp # SpyTech Phone Service +blp1 8194/tcp # Bloomberg data API +blp1 8194/udp # Bloomberg data API +blp2 8195/tcp # Bloomberg feed +blp2 8195/udp # Bloomberg feed +vvr-data 8199/tcp # VVR DATA +vvr-data 8199/udp # VVR DATA +trivnet1 8200/tcp # TRIVNET +trivnet1 8200/udp # TRIVNET +trivnet2 8201/tcp # TRIVNET +trivnet2 8201/udp # TRIVNET +aesop 8202/udp # Audio+Ethernet Standard Open Protocol +lm-perfworks 8204/tcp # LM Perfworks +lm-perfworks 8204/udp # LM Perfworks +lm-instmgr 8205/tcp # LM Instmgr +lm-instmgr 8205/udp # LM Instmgr +lm-dta 8206/tcp # LM Dta +lm-dta 8206/udp # LM Dta +lm-sserver 8207/tcp # LM SServer +lm-sserver 8207/udp # LM SServer +lm-webwatcher 8208/tcp # LM Webwatcher +lm-webwatcher 8208/udp # LM Webwatcher +rexecj 8230/tcp # RexecJ Server +rexecj 8230/udp # RexecJ Server +hncp-udp-port 8231/udp # HNCP +hncp-dtls-port 8232/udp # HNCP over DTLS +synapse-nhttps 8243/tcp # Synapse Non Blocking HTTPS +synapse-nhttps 8243/udp # Synapse Non Blocking HTTPS +pando-sec 8276/tcp # Pando Media Controlled Distribution +pando-sec 8276/udp # Pando Media Controlled Distribution +synapse-nhttp 8280/tcp # Synapse Non Blocking HTTP +synapse-nhttp 8280/udp # Synapse Non Blocking HTTP +libelle 8282/tcp # Libelle EnterpriseBus +libelle-disc 8282/udp # Libelle EnterpriseBus Discovery +blp3 8292/tcp # Bloomberg professional +blp3 8292/udp # Bloomberg professional +blp4 8294/tcp # Bloomberg intelligent client +blp4 8294/udp # Bloomberg intelligent client +hiperscan-id 8293/tcp # Hiperscan Identification Service +tmi 8300/tcp # Transport Management Interface +tmi 8300/udp # Transport Management Interface +amberon 8301/tcp # Amberon PPC/PPS +amberon 8301/udp # Amberon PPC/PPS +hub-open-net 8313/tcp # Hub Open Network +tnp-discover 8320/tcp # Thin(ium) Network Protocol +tnp-discover 8320/udp # Thin(ium) Network Protocol +tnp 8321/tcp # Thin(ium) Network Protocol +tnp 8321/udp # Thin(ium) Network Protocol +garmin-marine 8322/tcp # Garmin Marine +garmin-marine 8322/udp # Garmin Marine +server-find 8351/tcp # Server Find +server-find 8351/udp # Server Find +cruise-enum 8376/tcp # Cruise ENUM +cruise-enum 8376/udp # Cruise ENUM +cruise-swroute 8377/tcp # Cruise SWROUTE +cruise-swroute 8377/udp # Cruise SWROUTE +cruise-config 8378/tcp # Cruise CONFIG +cruise-config 8378/udp # Cruise CONFIG +cruise-diags 8379/tcp # Cruise DIAGS +cruise-diags 8379/udp # Cruise DIAGS +cruise-update 8380/tcp # Cruise UPDATE +cruise-update 8380/udp # Cruise UPDATE +m2mservices 8383/tcp # M2m Services +m2mservices 8383/udp # M2m Services +marathontp 8384/udp # Marathon Transport Protocol +cvd 8400/tcp # cvd +cvd 8400/udp # cvd +sabarsd 8401/tcp # sabarsd +sabarsd 8401/udp # sabarsd +abarsd 8402/tcp # abarsd +abarsd 8402/udp # abarsd +admind2 8403/tcp # admind +admind2 8403/udp # admind +svcloud 8404/tcp # SuperVault Cloud +svbackup 8405/tcp # SuperVault Backup +dlpx-sp 8415/tcp # Delphix Session Protocol +espeech 8416/tcp # eSpeech Session Protocol +espeech 8416/udp # eSpeech Session Protocol +espeech-rtp 8417/tcp # eSpeech RTP Protocol +espeech-rtp 8417/udp # eSpeech RTP Protocol +cybro-a-bus 8442/tcp # CyBro A-bus Protocol +cybro-a-bus 8442/udp # CyBro A-bus Protocol +pcsync-https 8443/tcp # PCsync HTTPS +pcsync-https 8443/udp # PCsync HTTPS +pcsync-http 8444/tcp # PCsync HTTP +pcsync-http 8444/udp # PCsync HTTP +copy 8445/tcp # Port for copy per sync feature +copy-disc 8445/udp # Port for copy discovery +npmp 8450/tcp # npmp +npmp 8450/udp # npmp +nexentamv 8457/tcp # Nexenta Management GUI +cisco-avp 8470/tcp # Cisco Address Validation Protocol +pim-port 8471/tcp # PIM over Reliable Transport +pim-port 8471/sctp # PIM over Reliable Transport +otv 8472/tcp # Overlay Transport Virtualization (OTV) +otv 8472/udp # Overlay Transport Virtualization (OTV) +vp2p 8473/tcp # Virtual Point to Point +vp2p 8473/udp # Virtual Point to Point +noteshare 8474/tcp # AquaMinds NoteShare +noteshare 8474/udp # AquaMinds NoteShare +fmtp 8500/tcp # Flight Message Transfer Protocol +fmtp 8500/udp # Flight Message Transfer Protocol +cmtp-mgt 8501/tcp # CYTEL Message Transfer Management +cmtp-av 8501/udp # CYTEL Message Transfer Audio and Video +ftnmtp 8502/tcp # FTN Message Transfer +lsp-self-ping 8503/udp # MPLS LSP Self-Ping +rtsp-alt 8554/tcp # RTSP Alternate (see port 554) +rtsp-alt 8554/udp # RTSP Alternate (see port 554) +d-fence 8555/tcp # SYMAX D-FENCE +d-fence 8555/udp # SYMAX D-FENCE +dof-tunnel 8567/tcp # DOF tunneling protocol +dof-tunnel 8567/udp # DOF tunneling protocol +asterix 8600/tcp # Surveillance Data +asterix 8600/udp # Surveillance Data +canon-cpp-disc 8609/udp # Canon Compact Printer Protocol Discovery +canon-mfnp 8610/tcp # Canon MFNP Service +canon-mfnp 8610/udp # Canon MFNP Service +canon-bjnp1 8611/tcp # Canon BJNP Port 1 +canon-bjnp1 8611/udp # Canon BJNP Port 1 +canon-bjnp2 8612/tcp # Canon BJNP Port 2 +canon-bjnp2 8612/udp # Canon BJNP Port 2 +canon-bjnp3 8613/tcp # Canon BJNP Port 3 +canon-bjnp3 8613/udp # Canon BJNP Port 3 +canon-bjnp4 8614/tcp # Canon BJNP Port 4 +canon-bjnp4 8614/udp # Canon BJNP Port 4 +imink 8615/tcp # Imink Service Control +monetra 8665/tcp # Monetra +monetra-admin 8666/tcp # Monetra Administrative +msi-cps-rm 8675/tcp # Programming Software for Radio Management Motorola Solutions Customer +msi-cps-rm-disc 8675/udp # Programming Software for Radio Management Discovery +sun-as-jmxrmi 8686/tcp # Sun App Server - JMX/RMI +sun-as-jmxrmi 8686/udp # Sun App Server - JMX/RMI +openremote-ctrl 8688/tcp # OpenRemote Controller +vnyx 8699/tcp # VNYX Primary Port +vnyx 8699/udp # VNYX Primary Port +nvc 8711/tcp # Nuance Voice Control +dtp-net 8732/udp # DASGIP Net Services +ibus 8733/tcp # iBus +ibus 8733/udp # iBus +dey-keyneg 8750/tcp # DEY Storage Key Negotiation +mc-appserver 8763/tcp # MC-APPSERVER +mc-appserver 8763/udp # MC-APPSERVER +openqueue 8764/tcp # OPENQUEUE +openqueue 8764/udp # OPENQUEUE +ultraseek-http 8765/tcp # Ultraseek HTTP +ultraseek-http 8765/udp # Ultraseek HTTP +amcs 8766/tcp # Agilent Connectivity Service +amcs 8766/udp # Agilent Connectivity Service +dpap 8770/tcp # Digital Photo Access Protocol +dpap 8770/udp # Digital Photo Access Protocol +uec 8778/tcp # Stonebranch Universal Enterprise Controller +msgclnt 8786/tcp # Message Client +msgclnt 8786/udp # Message Client +msgsrvr 8787/tcp # Message Server +msgsrvr 8787/udp # Message Server +acd-pm 8793/tcp # Accedian Performance Measurement +acd-pm 8793/udp # Accedian Performance Measurement +sunwebadmin 8800/tcp # Sun Web Server Admin Service +sunwebadmin 8800/udp # Sun Web Server Admin Service +truecm 8804/tcp # truecm +truecm 8804/udp # truecm +dxspider 8873/tcp # dxspider linking protocol +dxspider 8873/udp # dxspider linking protocol +cddbp-alt 8880/tcp # CDDBP +cddbp-alt 8880/udp # CDDBP +galaxy4d 8881/tcp # Galaxy4D Online Game Engine +secure-mqtt 8883/tcp # Secure MQTT +secure-mqtt 8883/udp # Secure MQTT +ddi-tcp-1 8888/tcp # NewsEDGE server TCP (TCP 1) +ddi-udp-1 8888/udp # NewsEDGE server UDP (UDP 1) +ddi-tcp-2 8889/tcp # Desktop Data TCP 1 +ddi-udp-2 8889/udp # NewsEDGE server broadcast +ddi-tcp-3 8890/tcp # Desktop Data TCP 2 +ddi-udp-3 8890/udp # NewsEDGE client broadcast +ddi-tcp-4 8891/tcp # Desktop Data TCP 3: NESS application +ddi-udp-4 8891/udp # Desktop Data UDP 3: NESS application +ddi-tcp-5 8892/tcp # Desktop Data TCP 4: FARM product +ddi-udp-5 8892/udp # Desktop Data UDP 4: FARM product +ddi-tcp-6 8893/tcp # Desktop Data TCP 5: NewsEDGE/Web application +ddi-udp-6 8893/udp # Desktop Data UDP 5: NewsEDGE/Web application +ddi-tcp-7 8894/tcp # Desktop Data TCP 6: COAL application +ddi-udp-7 8894/udp # Desktop Data UDP 6: COAL application +canto-roboflow 8898/tcp # Canto RoboFlow Control +ospf-lite 8899/tcp # ospf-lite +ospf-lite 8899/udp # ospf-lite +jmb-cds1 8900/tcp # JMB-CDS 1 +jmb-cds1 8900/udp # JMB-CDS 1 +jmb-cds2 8901/tcp # JMB-CDS 2 +jmb-cds2 8901/udp # JMB-CDS 2 +manyone-http 8910/tcp # manyone-http +manyone-http 8910/udp # manyone-http +manyone-xml 8911/tcp # manyone-xml +manyone-xml 8911/udp # manyone-xml +wcbackup 8912/tcp # Windows Client Backup +wcbackup 8912/udp # Windows Client Backup +dragonfly 8913/tcp # Dragonfly System Service +dragonfly 8913/udp # Dragonfly System Service +twds 8937/tcp # Transaction Warehouse Data Service +ub-dns-control 8953/tcp # unbound dns nameserver control +cumulus-admin 8954/tcp # Cumulus Admin Port +cumulus-admin 8954/udp # Cumulus Admin Port +nod-provider 8980/tcp # Network of Devices Provider +nod-provider 8980/udp # Network of Devices Provider +nod-client 8981/udp # Network of Devices Client +sunwebadmins 8989/tcp # Sun Web Server SSL Admin Service +sunwebadmins 8989/udp # Sun Web Server SSL Admin Service +http-wmap 8990/tcp # webmail HTTP service +http-wmap 8990/udp # webmail HTTP service +https-wmap 8991/tcp # webmail HTTPS service +https-wmap 8991/udp # webmail HTTPS service +oracle-ms-ens 8997/tcp # Oracle Messaging Server Event Notification Service +bctp 8999/tcp # Brodos Crypto Trade Protocol +bctp 8999/udp # Brodos Crypto Trade Protocol +cslistener 9000/tcp # CSlistener +cslistener 9000/udp # CSlistener +etlservicemgr 9001/tcp # ETL Service Manager +etlservicemgr 9001/udp # ETL Service Manager +dynamid 9002/tcp # DynamID authentication +dynamid 9002/udp # DynamID authentication +golem 9005/tcp # Golem Inter-System RPC +ogs-client 9007/udp # Open Grid Services Client +ogs-server 9008/tcp # Open Grid Services Server +pichat 9009/tcp # Pichat Server +pichat 9009/udp # Pichat Server +sdr 9010/tcp # Secure Data Replicator Protocol +tambora 9020/tcp # TAMBORA +tambora 9020/udp # TAMBORA +panagolin-ident 9021/tcp # Pangolin Identification +panagolin-ident 9021/udp # Pangolin Identification +paragent 9022/tcp # PrivateArk Remote Agent +paragent 9022/udp # PrivateArk Remote Agent +swa-1 9023/tcp # Secure Web Access - 1 +swa-1 9023/udp # Secure Web Access - 1 +swa-2 9024/tcp # Secure Web Access - 2 +swa-2 9024/udp # Secure Web Access - 2 +swa-3 9025/tcp # Secure Web Access - 3 +swa-3 9025/udp # Secure Web Access - 3 +swa-4 9026/tcp # Secure Web Access - 4 +swa-4 9026/udp # Secure Web Access - 4 +versiera 9050/tcp # Versiera Agent Listener +fio-cmgmt 9051/tcp # Fusion-io Central Manager Service +glrpc 9080/tcp # Groove GLRPC +glrpc 9080/udp # Groove GLRPC +lcs-ap 9082/sctp # LCS Application Protocol +emc-pp-mgmtsvc 9083/tcp # EMC PowerPath Mgmt Service +aurora 9084/tcp # IBM AURORA Performance Visualizer +aurora 9084/udp # IBM AURORA Performance Visualizer +aurora 9084/sctp # IBM AURORA Performance Visualizer +ibm-rsyscon 9085/tcp # IBM Remote System Console +ibm-rsyscon 9085/udp # IBM Remote System Console +net2display 9086/tcp # Vesa Net2Display +net2display 9086/udp # Vesa Net2Display +classic 9087/tcp # Classic Data Server +classic 9087/udp # Classic Data Server +sqlexec 9088/tcp # IBM Informix SQL Interface +sqlexec 9088/udp # IBM Informix SQL Interface +sqlexec-ssl 9089/tcp # IBM Informix SQL Interface - Encrypted +sqlexec-ssl 9089/udp # IBM Informix SQL Interface - Encrypted +websm 9090/tcp # WebSM +websm 9090/udp # WebSM +xmltec-xmlmail 9091/tcp # xmltec-xmlmail +xmltec-xmlmail 9091/udp # xmltec-xmlmail +XmlIpcRegSvc 9092/tcp # Xml-Ipc Server Reg +XmlIpcRegSvc 9092/udp # Xml-Ipc Server Reg +copycat 9093/tcp # Copycat database replication service +hp-pdl-datastr 9100/udp pdl-datastream # PDL Data Streaming Port +bacula-dir 9101/tcp # Bacula Director +bacula-dir 9101/udp # Bacula Director +bacula-fd 9102/tcp # Bacula File Daemon +bacula-fd 9102/udp # Bacula File Daemon +bacula-sd 9103/tcp # Bacula Storage Daemon +bacula-sd 9103/udp # Bacula Storage Daemon +peerwire 9104/tcp # PeerWire +peerwire 9104/udp # PeerWire +xadmin 9105/tcp # Xadmin Control Service +xadmin 9105/udp # Xadmin Control Service +astergate 9106/tcp # Astergate Control Service +astergate-disc 9106/udp # Astergate Discovery Service +astergatefax 9107/tcp # AstergateFax Control Service +mxit 9119/tcp # MXit Instant Messaging +mxit 9119/udp # MXit Instant Messaging +grcmp 9122/tcp # Global Relay compliant mobile IM protocol +grcp 9123/tcp # Global Relay compliant IM protocol +dddp 9131/tcp # Dynamic Device Discovery +dddp 9131/udp # Dynamic Device Discovery +apani1 9160/tcp # apani1 +apani1 9160/udp # apani1 +apani2 9161/tcp # apani2 +apani2 9161/udp # apani2 +apani3 9162/tcp # apani3 +apani3 9162/udp # apani3 +apani4 9163/tcp # apani4 +apani4 9163/udp # apani4 +apani5 9164/tcp # apani5 +apani5 9164/udp # apani5 +sun-as-jpda 9191/tcp # Sun AppSvr JPDA +sun-as-jpda 9191/udp # Sun AppSvr JPDA +wap-wsp 9200/tcp # WAP connectionless session service +wap-wsp 9200/udp # WAP connectionless session service +wap-wsp-wtp 9201/tcp # WAP session service +wap-wsp-wtp 9201/udp # WAP session service +wap-wsp-s 9202/tcp # WAP secure connectionless session service +wap-wsp-s 9202/udp # WAP secure connectionless session service +wap-wsp-wtp-s 9203/tcp # WAP secure session service +wap-wsp-wtp-s 9203/udp # WAP secure session service +wap-vcard 9204/tcp # WAP vCard +wap-vcard 9204/udp # WAP vCard +wap-vcal 9205/tcp # WAP vCal +wap-vcal 9205/udp # WAP vCal +wap-vcard-s 9206/tcp # WAP vCard Secure +wap-vcard-s 9206/udp # WAP vCard Secure +wap-vcal-s 9207/tcp # WAP vCal Secure +wap-vcal-s 9207/udp # WAP vCal Secure +rjcdb-vcards 9208/tcp # rjcdb vCard +rjcdb-vcards 9208/udp # rjcdb vCard +almobile-system 9209/tcp # ALMobile System Service +almobile-system 9209/udp # ALMobile System Service +oma-mlp 9210/tcp # OMA Mobile Location Protocol +oma-mlp 9210/udp # OMA Mobile Location Protocol +oma-mlp-s 9211/tcp # OMA Mobile Location Protocol Secure +oma-mlp-s 9211/udp # OMA Mobile Location Protocol Secure +serverviewdbms 9212/tcp # Server View dbms access +serverviewdbms 9212/udp # Server View dbms access +serverstart 9213/tcp # ServerStart RemoteControl +serverstart 9213/udp # ServerStart RemoteControl +ipdcesgbs 9214/tcp # IPDC ESG BootstrapService +ipdcesgbs 9214/udp # IPDC ESG BootstrapService +insis 9215/tcp # Integrated Setup and Install Service +insis 9215/udp # Integrated Setup and Install Service +acme 9216/tcp # Aionex Communication Management Engine +acme 9216/udp # Aionex Communication Management Engine +fsc-port 9217/tcp # FSC Communication Port +fsc-port 9217/udp # FSC Communication Port +teamcoherence 9222/tcp # QSC Team Coherence +teamcoherence 9222/udp # QSC Team Coherence +Mon 9255/tcp # Manager On Network +Mon 9255/udp # Manager On Network +traingpsdata 9277/udp # GPS Data transmition from train to ground network +pegasus 9278/tcp # Pegasus GPS Platform +pegasus 9278/udp # Pegasus GPS Platform +pegasus-ctl 9279/tcp # Pegaus GPS System Control Interface +pegasus-ctl 9279/udp # Pegaus GPS System Control Interface +pgps 9280/tcp # Predicted GPS +pgps 9280/udp # Predicted GPS +swtp-port1 9281/tcp # SofaWare transport port 1 +swtp-port1 9281/udp # SofaWare transport port 1 +swtp-port2 9282/tcp # SofaWare transport port 2 +swtp-port2 9282/udp # SofaWare transport port 2 +callwaveiam 9283/tcp # CallWaveIAM +callwaveiam 9283/udp # CallWaveIAM +visd 9284/tcp # VERITAS Information Serve +visd 9284/udp # VERITAS Information Serve +n2h2server 9285/tcp # N2H2 Filter Service Port +n2h2server 9285/udp # N2H2 Filter Service Port +n2receive 9286/udp # n2 monitoring receiver +cumulus 9287/tcp # Cumulus +cumulus 9287/udp # Cumulus +armtechdaemon 9292/tcp # ArmTech Daemon +armtechdaemon 9292/udp # ArmTech Daemon +storview 9293/tcp # StorView Client +storview 9293/udp # StorView Client +armcenterhttp 9294/tcp # ARMCenter http Service +armcenterhttp 9294/udp # ARMCenter http Service +armcenterhttps 9295/tcp # ARMCenter https Service +armcenterhttps 9295/udp # ARMCenter https Service +vrace 9300/tcp # Virtual Racing Service +vrace 9300/udp # Virtual Racing Service +sphinxql 9306/tcp # Sphinx search server (MySQL listener) +sphinxapi 9312/tcp # Sphinx search server +secure-ts 9318/tcp # PKIX TimeStamp over TLS +secure-ts 9318/udp # PKIX TimeStamp over TLS +guibase 9321/tcp # guibase +guibase 9321/udp # guibase +mpidcmgr 9343/tcp # MpIdcMgr +mpidcmgr 9343/udp # MpIdcMgr +mphlpdmc 9344/tcp # Mphlpdmc +mphlpdmc 9344/udp # Mphlpdmc +rancher 9345/tcp # Rancher Agent +ctechlicensing 9346/tcp # C Tech Licensing +ctechlicensing 9346/udp # C Tech Licensing +fjdmimgr 9374/tcp # fjdmimgr +fjdmimgr 9374/udp # fjdmimgr +boxp 9380/tcp # Brivs! Open Extensible Protocol +boxp 9380/udp # Brivs! Open Extensible Protocol +d2dconfig 9387/tcp # D2D Configuration Service +d2ddatatrans 9388/tcp # D2D Data Transfer Service +adws 9389/tcp # Active Directory Web Services +otp 9390/tcp # OpenVAS Transfer Protocol +fjinvmgr 9396/tcp # fjinvmgr +fjinvmgr 9396/udp # fjinvmgr +mpidcagt 9397/tcp # MpIdcAgt +mpidcagt 9397/udp # MpIdcAgt +sec-t4net-srv 9400/tcp # Samsung Twain for Network Server +sec-t4net-srv 9400/udp # Samsung Twain for Network Server +sec-t4net-clt 9401/tcp # Samsung Twain for Network Client +sec-t4net-clt 9401/udp # Samsung Twain for Network Client +sec-pc2fax-srv 9402/tcp # Samsung PC2FAX for Network Server +sec-pc2fax-srv 9402/udp # Samsung PC2FAX for Network Server +git 9418/tcp # git pack transfer service +git 9418/udp # git pack transfer service +tungsten-https 9443/tcp # WSO2 Tungsten HTTPS +tungsten-https 9443/udp # WSO2 Tungsten HTTPS +wso2esb-console 9444/tcp # WSO2 ESB Administration Console HTTPS +wso2esb-console 9444/udp # WSO2 ESB Administration Console HTTPS +mindarray-ca 9445/tcp # MindArray Systems Console Agent +sntlkeyssrvr 9450/tcp # Sentinel Keys Server +sntlkeyssrvr 9450/udp # Sentinel Keys Server +ismserver 9500/tcp # ismserver +ismserver 9500/udp # ismserver +sma-spw 9522/udp # SMA Speedwire +mngsuite 9535/tcp # Management Suite Remote Control +mngsuite 9535/udp # Management Suite Remote Control +laes-bf 9536/tcp # Surveillance buffering function +laes-bf 9536/udp # Surveillance buffering function +trispen-sra 9555/tcp # Trispen Secure Remote Access +trispen-sra 9555/udp # Trispen Secure Remote Access +ldgateway 9592/tcp # LANDesk Gateway +ldgateway 9592/udp # LANDesk Gateway +cba8 9593/tcp # LANDesk Management Agent (cba8) +cba8 9593/udp # LANDesk Management Agent (cba8) +msgsys 9594/tcp # Message System +msgsys 9594/udp # Message System +pds 9595/tcp # Ping Discovery Service +pds 9595/udp # Ping Discovery Service +mercury-disc 9596/tcp # Mercury Discovery +mercury-disc 9596/udp # Mercury Discovery +pd-admin 9597/tcp # PD Administration +pd-admin 9597/udp # PD Administration +vscp 9598/tcp # Very Simple Ctrl Protocol +vscp 9598/udp # Very Simple Ctrl Protocol +robix 9599/tcp # Robix +robix 9599/udp # Robix +micromuse-ncpw 9600/tcp # MICROMUSE-NCPW +micromuse-ncpw 9600/udp # MICROMUSE-NCPW +streamcomm-ds 9612/tcp # StreamComm User Directory +streamcomm-ds 9612/udp # StreamComm User Directory +iadt-tls 9614/tcp # iADT Protocol over TLS +erunbook_agent 9616/tcp erunbook-agent # eRunbook Agent +erunbook_server 9617/tcp erunbook-server # eRunbook Server +condor 9618/tcp # Condor Collector Service +condor 9618/udp # Condor Collector Service +odbcpathway 9628/tcp # ODBC Pathway Service +odbcpathway 9628/udp # ODBC Pathway Service +uniport 9629/tcp # UniPort SSO Controller +uniport 9629/udp # UniPort SSO Controller +peoctlr 9630/tcp # Peovica Controller +peocoll 9631/tcp # Peovica Collector +mc-comm 9632/udp # Mobile-C Communications +pqsflows 9640/tcp # ProQueSys Flows Service +zoomcp 9666/tcp # Zoom Control Panel Game Server Management +xmms2 9667/tcp # Cross-platform Music Multiplexing System +xmms2 9667/udp # Cross-platform Music Multiplexing System +tec5-sdctp 9668/tcp # tec5 Spectral Device Control Protocol +tec5-sdctp 9668/udp # tec5 Spectral Device Control Protocol +client-wakeup 9694/tcp # T-Mobile Client Wakeup Message +client-wakeup 9694/udp # T-Mobile Client Wakeup Message +ccnx 9695/tcp # Content Centric Networking +ccnx 9695/udp # Content Centric Networking +board-roar 9700/tcp # Board M.I.T. Service +board-roar 9700/udp # Board M.I.T. Service +l5nas-parchan 9747/tcp # L5NAS Parallel Channel +l5nas-parchan 9747/udp # L5NAS Parallel Channel +board-voip 9750/tcp # Board M.I.T. Synchronous Collaboration +board-voip 9750/udp # Board M.I.T. Synchronous Collaboration +rasadv 9753/tcp # rasadv +rasadv 9753/udp # rasadv +tungsten-http 9762/tcp # WSO2 Tungsten HTTP +tungsten-http 9762/udp # WSO2 Tungsten HTTP +davsrc 9800/tcp # WebDav Source Port +davsrc 9800/udp # WebDav Source Port +sstp-2 9801/tcp # Sakura Script Transfer Protocol-2 +sstp-2 9801/udp # Sakura Script Transfer Protocol-2 +davsrcs 9802/tcp # WebDAV Source TLS/SSL +davsrcs 9802/udp # WebDAV Source TLS/SSL +sapv1 9875/tcp # Session Announcement v1 +sapv1 9875/udp # Session Announcement v1 +sd 9876/tcp # Session Director +kca-service 9878/udp # Certificate Issuance +cyborg-systems 9888/tcp # CYBORG Systems +cyborg-systems 9888/udp # CYBORG Systems +gt-proxy 9889/tcp # Port for Cable network related data proxy or repeater +gt-proxy 9889/udp # Port for Cable network related data proxy or repeater +monkeycom 9898/tcp # MonkeyCom +monkeycom 9898/udp # MonkeyCom +sctp-tunneling 9899/udp # SCTP TUNNELING +iua 9900/tcp # IUA +iua 9900/udp # IUA +iua 9900/sctp # IUA +enrp 9901/udp # enrp server channel +enrp-sctp 9901/sctp # enrp server channel +enrp-sctp-tls 9902/sctp # enrp/tls server channel +multicast-ping 9903/tcp # Multicast Ping Protocol +multicast-ping 9903/udp # Multicast Ping Protocol +domaintime 9909/tcp # domaintime +domaintime 9909/udp # domaintime +sype-transport 9911/tcp # SYPECom Transport Protocol +sype-transport 9911/udp # SYPECom Transport Protocol +xybrid-cloud 9925/tcp # XYBRID Cloud +apc-9950 9950/tcp # APC 9950 +apc-9950 9950/udp # APC 9950 +apc-9951 9951/tcp # APC 9951 +apc-9951 9951/udp # APC 9951 +apc-9952 9952/tcp # APC 9952 +apc-9952 9952/udp # APC 9952 +acis 9953/tcp # 9953 +acis 9953/udp # 9953 +hinp 9954/tcp # HaloteC Instrument Network +alljoyn-stm 9955/tcp # Contact Port for AllJoyn +alljoyn-mcm 9955/udp # multiplexed constrained messaging +alljoyn 9956/udp # Alljoyn Name Service +odnsp 9966/tcp # OKI Data Network Setting Protocol +odnsp 9966/udp # OKI Data Network Setting Protocol +xybrid-rt 9978/tcp # XYBRID RT Server +dsm-scm-target 9987/tcp # DSM/SCM Target Interface +dsm-scm-target 9987/udp # DSM/SCM Target Interface +nsesrvr 9988/tcp # Software Essentials Secure HTTP server +osm-appsrvr 9990/tcp # OSM Applet Server +osm-appsrvr 9990/udp # OSM Applet Server +osm-oev 9991/tcp # OSM Event Server +osm-oev 9991/udp # OSM Event Server +palace-1 9992/tcp # OnLive-1 +palace-1 9992/udp # OnLive-1 +palace-2 9993/tcp # OnLive-2 +palace-2 9993/udp # OnLive-2 +palace-3 9994/tcp # OnLive-3 +palace-3 9994/udp # OnLive-3 +palace-4 9995/tcp # Palace-4 +palace-4 9995/udp # Palace-4 +palace-5 9996/tcp # Palace-5 +palace-5 9996/udp # Palace-5 +palace-6 9997/tcp # Palace-6 +palace-6 9997/udp # Palace-6 +distinct32 9998/tcp # Distinct32 +distinct32 9998/udp # Distinct32 +distinct 9999/tcp # distinct +distinct 9999/udp # distinct +ndmp 10000/tcp # Network Data Management Protocol +ndmp 10000/udp # Network Data Management Protocol +scp-config 10001/tcp # SCP Configuration +scp-config 10001/udp # SCP Configuration +documentum 10002/tcp # EMC-Documentum Content Server Product +documentum 10002/udp # EMC-Documentum Content Server Product +documentum_s 10003/tcp documentum-s # EMC-Documentum Content Server Product +documentum_s 10003/udp documentum-s # EMC-Documentum Content Server Product +emcrmirccd 10004/tcp # EMC Replication Manager Client +emcrmird 10005/tcp # EMC Replication Manager Server +netapp-sync 10006/tcp # Sync replication protocol among different NetApp platforms +mvs-capacity 10007/tcp # MVS Capacity +mvs-capacity 10007/udp # MVS Capacity +octopus 10008/tcp # Octopus Multiplexer +octopus 10008/udp # Octopus Multiplexer +swdtp-sv 10009/tcp # Systemwalker Desktop Patrol +swdtp-sv 10009/udp # Systemwalker Desktop Patrol +rxapi 10010/tcp # ooRexx rxapi services +cefdvmp 10023/udp # Comtech EF-Data's Vipersat Management Protocol (likely typo in IANA reservation) +zabbix-agent 10050/tcp # Zabbix Agent +zabbix-agent 10050/udp # Zabbix Agent +zabbix-trapper 10051/tcp # Zabbix Trapper +zabbix-trapper 10051/udp # Zabbix Trapper +qptlmd 10055/tcp # Quantapoint FLEXlm Licensing Service +itap-ddtp 10100/tcp # VERITAS ITAP DDTP +itap-ddtp 10100/udp # VERITAS ITAP DDTP +ezmeeting-2 10101/tcp # eZmeeting +ezmeeting-2 10101/udp # eZmeeting +ezproxy-2 10102/tcp # eZproxy +ezproxy-2 10102/udp # eZproxy +ezrelay 10103/tcp # eZrelay +ezrelay 10103/udp # eZrelay +swdtp 10104/tcp # Systemwalker Desktop Patrol +swdtp 10104/udp # Systemwalker Desktop Patrol +bctp-server 10107/tcp # VERITAS BCTP, server +bctp-server 10107/udp # VERITAS BCTP, server +nmea-0183 10110/tcp # NMEA-0183 Navigational Data +nmea-0183 10110/udp # NMEA-0183 Navigational Data +nmea-onenet 10111/udp # NMEA OneNet multicast messaging +netiq-endpoint 10113/tcp # NetIQ Endpoint +netiq-endpoint 10113/udp # NetIQ Endpoint +netiq-qcheck 10114/tcp # NetIQ Qcheck +netiq-qcheck 10114/udp # NetIQ Qcheck +netiq-endpt 10115/tcp # NetIQ Endpoint +netiq-endpt 10115/udp # NetIQ Endpoint +netiq-voipa 10116/tcp # NetIQ VoIP Assessor +netiq-voipa 10116/udp # NetIQ VoIP Assessor +iqrm 10117/tcp # NetIQ IQCResource Managament Svc +iqrm 10117/udp # NetIQ IQCResource Managament Svc +cimple 10125/udp # HotLink CIMple REST API +bmc-perf-sd 10128/tcp # BMC-PERFORM-SERVICE DAEMON +bmc-perf-sd 10128/udp # BMC-PERFORM-SERVICE DAEMON +bmc-gms 10129/tcp # BMC General Manager Server +qb-db-server 10160/tcp # QB Database Server +qb-db-server 10160/udp # QB Database Server +snmptls 10161/tcp # SNMP-TLS +snmpdtls 10161/udp # SNMP-DTLS +snmptls-trap 10162/tcp # SNMP-Trap-TLS +snmpdtls-trap 10162/udp # SNMP-Trap-DTLS +trisoap 10200/tcp # Trigence AE Soap Service +trisoap 10200/udp # Trigence AE Soap Service +rsms 10201/tcp # Remote Server Management Service +rscs 10201/udp # Remote Server Control and Test Service +apollo-relay 10252/tcp # Apollo Relay Port +apollo-relay 10252/udp # Apollo Relay Port +eapol-relay 10253/udp # Relay of EAPOL frames +axis-wimp-port 10260/tcp # Axis WIMP Port +axis-wimp-port 10260/udp # Axis WIMP Port +blocks 10288/tcp # Blocks +blocks 10288/udp # Blocks +cosir 10321/tcp # Computer Op System Information Report +bngsync 10439/udp # BalanceNG session table synchronization protocol +hip-nat-t 10500/udp # HIP NAT-traversal +MOS-lower 10540/tcp # MOS Media Object Metadata Port +MOS-lower 10540/udp # MOS Media Object Metadata Port +MOS-upper 10541/tcp # MOS Running Order Port +MOS-upper 10541/udp # MOS Running Order Port +MOS-aux 10542/tcp # MOS Low Priority Port +MOS-aux 10542/udp # MOS Low Priority Port +MOS-soap 10543/tcp # MOS SOAP Default Port +MOS-soap 10543/udp # MOS SOAP Default Port +MOS-soap-opt 10544/tcp # MOS SOAP Optional Port +MOS-soap-opt 10544/udp # MOS SOAP Optional Port +serverdocs 10548/tcp # Apple Document Sharing +printopia 10631/tcp # administration and control of "Printopia" +gap 10800/tcp # Gestor de Acaparamiento para Pocket PCs +gap 10800/udp # Gestor de Acaparamiento para Pocket PCs +lpdg 10805/tcp # LUCIA Pareja Data Group +lpdg 10805/udp # LUCIA Pareja Data Group +nbd 10809/tcp # Linux Network Block Device +nmc-disc 10810/udp # Nuance Mobile Care Discovery +helix 10860/tcp # Helix Client/Server +helix 10860/udp # Helix Client/Server +bveapi 10880/tcp # BVEssentials HTTP API +bveapi 10880/udp # BVEssentials HTTP API +octopustentacle 10933/tcp # Octopus Deploy Tentacle +rmiaux 10990/tcp # Auxiliary RMI Port +rmiaux 10990/udp # Auxiliary RMI Port +irisa 11000/tcp # IRISA +irisa 11000/udp # IRISA +metasys 11001/tcp # Metasys +metasys 11001/udp # Metasys +cefd-vmp 11023/udp # Comtech EF-Data's Vipersat Management Protocol (is listed as 10023 in IANA) +weave 11095/tcp # Nest device-to-device and device-to-service application protocol +weave 11095/udp # Nest device-to-device and device-to-service application protocol +origo-sync 11103/tcp # OrigoDB Server Sync +netapp-icmgmt 11104/tcp # NetApp Intercluster Management +netapp-icdata 11105/tcp # NetApp Intercluster Data +sgi-lk 11106/tcp # SGI LK Licensing service +sgi-lk 11106/udp # SGI LK Licensing service +myq-termlink 11108/udp # Hardware Terminals Discovery protocol +sgi-dmfmgr 11109/tcp # Data migration facility manager +sgi-soap 11110/tcp # Data migration facility SOAP +vce 11111/tcp # Viral Computing Environment (VCE) +vce 11111/udp # Viral Computing Environment (VCE) +dicom 11112/tcp # DICOM +dicom 11112/udp # DICOM +suncacao-snmp 11161/tcp # sun cacao snmp access point +suncacao-snmp 11161/udp # sun cacao snmp access point +suncacao-jmxmp 11162/tcp # sun cacao JMX-remoting access point +suncacao-jmxmp 11162/udp # sun cacao JMX-remoting access point +suncacao-rmi 11163/tcp # sun cacao rmi registry access point +suncacao-rmi 11163/udp # sun cacao rmi registry access point +suncacao-csa 11164/tcp # sun cacao command-streaming access point +suncacao-csa 11164/udp # sun cacao command-streaming access point +suncacao-websvc 11165/tcp # sun cacao web service access point +suncacao-websvc 11165/udp # sun cacao web service access point +snss 11171/udp # Surgical Notes Security Service Discovery (SNSS) +oemcacao-jmxmp 11172/tcp # OEM cacao JMX-remoting access point +t5-straton 11173/tcp # Straton Runtime Programing +oemcacao-rmi 11174/tcp # OEM cacao rmi registry access point +oemcacao-websvc 11175/tcp # OEM cacao web service access point +smsqp 11201/tcp # smsqp +smsqp 11201/udp # smsqp +dcsl-backup 11202/tcp # DCSL Network Backup Services +wifree 11208/tcp # WiFree Service +wifree 11208/udp # WiFree Service +memcache 11211/tcp # Memory cache service +memcache 11211/udp # Memory cache service +imip 11319/tcp # IMIP +imip 11319/udp # IMIP +imip-channels 11320/tcp # IMIP Channels Port +imip-channels 11320/udp # IMIP Channels Port +arena-server 11321/tcp # Arena Server Listen +arena-server 11321/udp # Arena Server Listen +atm-uhas 11367/tcp # ATM UHAS +atm-uhas 11367/udp # ATM UHAS +lsdp 11430/udp # Lenbrook Service Discovery Protocol +tempest-port 11600/tcp # Tempest Protocol Port +tempest-port 11600/udp # Tempest Protocol Port +emc-xsw-dconfig 11623/tcp # EMC XtremSW distributed config +emc-xsw-dcache 11723/tcp # EMC XtremSW distributed cache +emc-xsw-dcache 11723/udp # EMC XtremSW distributed cache +intrepid-ssl 11751/tcp # Intrepid SSL +intrepid-ssl 11751/udp # Intrepid SSL +lanschool 11796/tcp # LanSchool +lanschool-mpt 11796/udp # Lanschool Multipoint +xoraya 11876/tcp # X2E Xoraya Multichannel protocol +xoraya 11876/udp # X2E Xoraya Multichannel protocol +x2e-disc 11877/udp # X2E service discovery protocol +sysinfo-sp 11967/tcp # SysInfo Service Protocol +sysinfo-sp 11967/udp # SysInfo Sercice Protocol +wmereceiving 11997/sctp # WorldMailExpress +wmedistribution 11998/sctp # WorldMailExpress +wmereporting 11999/sctp # WorldMailExpress +entextxid 12000/tcp # IBM Enterprise Extender SNA XID Exchange +entextxid 12000/udp # IBM Enterprise Extender SNA XID Exchange +entextnetwk 12001/tcp # IBM Enterprise Extender SNA COS Network Priority +entextnetwk 12001/udp # IBM Enterprise Extender SNA COS Network Priority +entexthigh 12002/tcp # IBM Enterprise Extender SNA COS High Priority +entexthigh 12002/udp # IBM Enterprise Extender SNA COS High Priority +entextmed 12003/tcp # IBM Enterprise Extender SNA COS Medium Priority +entextmed 12003/udp # IBM Enterprise Extender SNA COS Medium Priority +entextlow 12004/tcp # IBM Enterprise Extender SNA COS Low Priority +entextlow 12004/udp # IBM Enterprise Extender SNA COS Low Priority +dbisamserver1 12005/tcp # DBISAM Database Server - Regular +dbisamserver1 12005/udp # DBISAM Database Server - Regular +dbisamserver2 12006/tcp # DBISAM Database Server - Admin +dbisamserver2 12006/udp # DBISAM Database Server - Admin +accuracer 12007/tcp # Accuracer Database System ñ Server +accuracer 12007/udp # Accuracer Database System ñ Server +accuracer-dbms 12008/tcp # Accuracer Database System ñ Admin +accuracer-dbms 12008/udp # Accuracer Database System ñ Admin +ghvpn 12009/udp # Green Hills VPN +edbsrvr 12010/tcp # ElevateDB Server +vipera 12012/tcp # Vipera Messaging Service +vipera 12012/udp # Vipera Messaging Service +vipera-ssl 12013/tcp # Vipera Messaging Service over SSL Communication +vipera-ssl 12013/udp # Vipera Messaging Service over SSL Communication +rets-ssl 12109/tcp # RETS over SSL +rets-ssl 12109/udp # RETS over SSL +nupaper-ss 12121/tcp # NuPaper Session Service +nupaper-ss 12121/udp # NuPaper Session Service +cawas 12168/tcp # CA Web Access Service +cawas 12168/udp # CA Web Access Service +hivep 12172/tcp # HiveP +hivep 12172/udp # HiveP +linogridengine 12300/tcp # LinoGrid Engine +linogridengine 12300/udp # LinoGrid Engine +rads 12302/tcp # Remote Administration Daemon +warehouse-sss 12321/tcp # Warehouse Monitoring Syst SSS +warehouse-sss 12321/udp # Warehouse Monitoring Syst SSS +warehouse 12322/tcp # Warehouse Monitoring Syst +warehouse 12322/udp # Warehouse Monitoring Syst +italk 12345/tcp # Italk Chat System +italk 12345/udp # Italk Chat System +tsaf 12753/tcp # tsaf port +tsaf 12753/udp # tsaf port +netperf 12865/tcp # control port for netperf benchmark +i-zipqd 13160/tcp # I-ZIPQD +i-zipqd 13160/udp # I-ZIPQD +bcslogc 13216/tcp # Black Crow Software application logging +bcslogc 13216/udp # Black Crow Software application logging +rs-pias 13217/tcp # R&S Proxy Installation Assistant Service +rs-pias 13217/udp # R&S Proxy Installation Assistant Service +emc-vcas-tcp 13218/tcp # EMC Virtual CAS Service +emc-vcas-udp 13218/udp # EMV Virtual CAS Service Discovery +powwow-client 13223/tcp # PowWow Client +powwow-client 13223/udp # PowWow Client +powwow-server 13224/tcp # PowWow Server +powwow-server 13224/udp # PowWow Server +doip-data 13400/tcp # DoIP Data +doip-disc 13400/udp # DoIP Discovery +nbdb 13785/tcp # NetBackup Database +nbdb 13785/udp # NetBackup Database +nomdb 13786/tcp # Veritas-nomdb +nomdb 13786/udp # Veritas-nomdb +dsmcc-config 13818/tcp # DSMCC Config +dsmcc-config 13818/udp # DSMCC Config +dsmcc-session 13819/tcp # DSMCC Session Messages +dsmcc-session 13819/udp # DSMCC Session Messages +dsmcc-passthru 13820/tcp # DSMCC Pass-Thru Messages +dsmcc-passthru 13820/udp # DSMCC Pass-Thru Messages +dsmcc-download 13821/tcp # DSMCC Download Protocol +dsmcc-download 13821/udp # DSMCC Download Protocol +dsmcc-ccp 13822/tcp # DSMCC Channel Change Protocol +dsmcc-ccp 13822/udp # DSMCC Channel Change Protocol +bmdss 13823/tcp # Blackmagic Design Streaming Server +ucontrol 13894/tcp # Ultimate Control communication protocol +ucontrol 13894/udp # Ultimate Control communication protocol +dta-systems 13929/tcp # D-TA SYSTEMS +dta-systems 13929/udp # D-TA SYSTEMS +medevolve 13930/tcp # MedEvolve Port Requester +scotty-ft 14000/tcp # SCOTTY High-Speed Filetransfer +scotty-ft 14000/udp # SCOTTY High-Speed Filetransfer +sua 14001/tcp # SUA +sua 14001/udp # De-Registered (2001 June 06) +sua 14001/sctp # SUA +scotty-disc 14002/udp # Discovery of a SCOTTY hardware codec board +sage-best-com1 14033/tcp # sage Best! Config Server 1 +sage-best-com1 14033/udp # sage Best! Config Server 1 +sage-best-com2 14034/tcp # sage Best! Config Server 2 +sage-best-com2 14034/udp # sage Best! Config Server 2 +vcs-app 14141/tcp # VCS Application +vcs-app 14141/udp # VCS Application +icpp 14142/tcp # IceWall Cert Protocol +icpp 14142/udp # IceWall Cert Protocol +icpps 14143/tcp # IceWall Cert Protocol over TLS +gcm-app 14145/tcp # GCM Application +gcm-app 14145/udp # GCM Application +vrts-tdd 14149/tcp # Veritas Traffic Director +vrts-tdd 14149/udp # Veritas Traffic Director +vcscmd 14150/tcp # Veritas Cluster Server Command Server +vad 14154/tcp # Veritas Application Director +vad 14154/udp # Veritas Application Director +cps 14250/tcp # Fencing Server +cps 14250/udp # Fencing Server +ca-web-update 14414/tcp # CA eTrust Web Update Service +ca-web-update 14414/udp # CA eTrust Web Update Service +hde-lcesrvr-1 14936/tcp # hde-lcesrvr-1 +hde-lcesrvr-1 14936/udp # hde-lcesrvr-1 +hde-lcesrvr-2 14937/tcp # hde-lcesrvr-2 +hde-lcesrvr-2 14937/udp # hde-lcesrvr-2 +hydap 15000/tcp # Hypack Data Aquisition +hydap 15000/udp # Hypack Data Aquisition +onep-tls 15001/tcp # Open Network Environment TLS +v2g-secc 15118/udp # v2g Supply Equipment Communication Controller Discovery Protocol +xpilot 15345/tcp # XPilot Contact Port +xpilot 15345/udp # XPilot Contact Port +3link 15363/tcp # 3Link Negotiation +3link 15363/udp # 3Link Negotiation +cisco-snat 15555/tcp # Cisco Stateful NAT +cisco-snat 15555/udp # Cisco Stateful NAT +bex-xr 15660/tcp # Backup Express Restore Server +bex-xr 15660/udp # Backup Express Restore Server +ptp 15740/tcp # Picture Transfer Protocol +ptp 15740/udp # Picture Transfer Protocol +2ping 15998/udp # 2ping Bi-Directional Ping Service +programmar 15999/tcp # ProGrammar Enterprise +fmsas 16000/tcp # Administration Server Access +fmsascon 16001/tcp # Administration Server Connector +gsms 16002/tcp # GoodSync Mediation Service +alfin 16003/udp # Automation and Control by REGULACE.ORG +jwpc 16020/tcp # Filemaker Java Web Publishing Core +jwpc-bin 16021/tcp # Filemaker Java Web Publishing Core Binary +sun-sea-port 16161/tcp # Solaris SEA Port +sun-sea-port 16161/udp # Solaris SEA Port +solaris-audit 16162/tcp # Solaris Audit - secure remote audit log +etb4j 16309/tcp # etb4j +etb4j 16309/udp # etb4j +pduncs 16310/tcp # Policy Distribute, Update Notification +pduncs 16310/udp # Policy Distribute, Update Notification +pdefmns 16311/tcp # Policy definition and update management +pdefmns 16311/udp # Policy definition and update management +netserialext1 16360/tcp # Network Serial Extension Ports One +netserialext1 16360/udp # Network Serial Extension Ports One +netserialext2 16361/tcp # Network Serial Extension Ports Two +netserialext2 16361/udp # Network Serial Extension Ports Two +netserialext3 16367/tcp # Network Serial Extension Ports Three +netserialext3 16367/udp # Network Serial Extension Ports Three +netserialext4 16368/tcp # Network Serial Extension Ports Four +netserialext4 16368/udp # Network Serial Extension Ports Four +connected 16384/tcp # Connected Corp +connected 16384/udp # Connected Corp +rdgs 16385/tcp # Reliable Datagram Sockets +xoms 16619/tcp # X509 Objects Management Service +axon-tunnel 16665/tcp # Reliable multipath data transport for high latencies +vtp 16666/udp # Vidder Tunnel Protocol +cadsisvr 16789/tcp # mainframe External Security Managers +newbay-snc-mc 16900/tcp # Newbay Mobile Client Update Service +newbay-snc-mc 16900/udp # Newbay Mobile Client Update Service +sgcip 16950/tcp # Simple Generic Client Interface Protocol +sgcip 16950/udp # Simple Generic Client Interface Protocol +intel-rci-mp 16991/tcp # INTEL-RCI-MP +intel-rci-mp 16991/udp # INTEL-RCI-MP +amt-soap-http 16992/tcp # Intel(R) AMT SOAP/HTTP +amt-soap-http 16992/udp # Intel(R) AMT SOAP/HTTP +amt-soap-https 16993/tcp # Intel(R) AMT SOAP/HTTPS +amt-soap-https 16993/udp # Intel(R) AMT SOAP/HTTPS +amt-redir-tcp 16994/tcp # Intel(R) AMT Redirection/TCP +amt-redir-tcp 16994/udp # Intel(R) AMT Redirection/TCP +amt-redir-tls 16995/tcp # Intel(R) AMT Redirection/TLS +amt-redir-tls 16995/udp # Intel(R) AMT Redirection/TLS +isode-dua 17007/tcp # +isode-dua 17007/udp # +vestasdlp 17184/tcp # Vestas Data Layer Protocol +soundsvirtual 17185/tcp # Sounds Virtual +soundsvirtual 17185/udp # Sounds Virtual +chipper 17219/tcp # Chipper +chipper 17219/udp # Chipper +avtp 17220/tcp # IEEE 1722 Transport Protocol for Time Sensitive Applications +avtp 17220/udp # IEEE 1722 Transport Protocol for Time Sensitive Applications +avdecc 17221/tcp # IEEE 1722.1 AVB Discovery, Enumeration, Connection management, and Control +avdecc 17221/udp # IEEE 1722.1 AVB Discovery, Enumeration, Connection management, and Control +cpsp 17222/udp # Control Plane Synchronization Protocol +isa100-gci 17223/tcp # ISA100 Wireless gateway to client +trdp-pd 17224/udp # Train Realtime Data Protocol +trdp-md 17225/tcp # Train Realtime Data Protocol +trdp-md 17225/udp # Train Realtime Data Protocol +integrius-stp 17234/tcp # Integrius Secure Tunnel Protocol +integrius-stp 17234/udp # Integrius Secure Tunnel Protocol +ssh-mgmt 17235/tcp # SSH Tectia Manager +ssh-mgmt 17235/udp # SSH Tectia Manager +db-lsp 17500/tcp # Dropbox LanSync Protocol +db-lsp-disc 17500/udp # Dropbox LanSync Discovery +ailith 17555/tcp # Ailith management of routers +ea 17729/tcp # Eclipse Aviation +ea 17729/udp # Eclipse Aviation +zep 17754/tcp # Encap. ZigBee Packets +zep 17754/udp # Encap. ZigBee Packets +zigbee-ip 17755/tcp # ZigBee IP Transport Service +zigbee-ip 17755/udp # ZigBee IP Transport Service +zigbee-ips 17756/tcp # ZigBee IP Transport Secure Service +zigbee-ips 17756/udp # ZigBee IP Transport Secure Service +sw-orion 17777/tcp # SolarWinds Orion +biimenu 18000/tcp # Beckman Instruments, Inc. +biimenu 18000/udp # Beckman Instruments, Inc. +radpdf 18104/tcp # RAD PDF Service +racf 18136/tcp # z/OS Resource Access Control Facility +opsec-cvp 18181/tcp # OPSEC CVP +opsec-cvp 18181/udp # OPSEC CVP +opsec-ufp 18182/tcp # OPSEC UFP +opsec-ufp 18182/udp # OPSEC UFP +opsec-sam 18183/tcp # OPSEC SAM +opsec-sam 18183/udp # OPSEC SAM +opsec-lea 18184/tcp # OPSEC LEA +opsec-lea 18184/udp # OPSEC LEA +opsec-omi 18185/tcp # OPSEC OMI +opsec-omi 18185/udp # OPSEC OMI +ohsc 18186/tcp # Occupational Health SC +ohsc 18186/udp # Occupational Health Sc +opsec-ela 18187/tcp # OPSEC ELA +opsec-ela 18187/udp # OPSEC ELA +checkpoint-rtm 18241/tcp # Check Point RTM +checkpoint-rtm 18241/udp # Check Point RTM +iclid 18242/tcp # Checkpoint router monitoring +clusterxl 18243/tcp # Checkpoint router state backup +gv-pf 18262/tcp # GV NetConfig Service +gv-pf 18262/udp # GV NetConfig Service +ac-cluster 18463/tcp # AC Cluster +ac-cluster 18463/udp # AC Cluster +rds-ib 18634/tcp # Reliable Datagram Service +rds-ib 18634/udp # Reliable Datagram Service +rds-ip 18635/tcp # Reliable Datagram Service over IP +rds-ip 18635/udp # Reliable Datagram Service over IP +ique 18769/tcp # IQue Protocol +ique 18769/udp # IQue Protocol +infotos 18881/tcp # Infotos +infotos 18881/udp # Infotos +apc-necmp 18888/tcp # APCNECMP +apc-necmp 18888/udp # APCNECMP +igrid 19000/tcp # iGrid Server +igrid 19000/udp # iGrid Server +scintilla 19007/tcp # Scintilla protocol for device services +scintilla 19007/udp # Scintilla protocol for device services +j-link 19020/tcp # J-Link TCP/IP Protocol +opsec-uaa 19191/tcp # OPSEC UAA +opsec-uaa 19191/udp # OPSEC UAA +ua-secureagent 19194/tcp # UserAuthority SecureAgent +ua-secureagent 19194/udp # UserAuthority SecureAgent +keysrvr 19283/tcp # Key Server for SASSAFRAS +keysrvr 19283/udp # Key Server for SASSAFRAS +keyshadow 19315/tcp # Key Shadow for SASSAFRAS +keyshadow 19315/udp # Key Shadow for SASSAFRAS +mtrgtrans 19398/tcp # mtrgtrans +mtrgtrans 19398/udp # mtrgtrans +hp-sco 19410/tcp # hp-sco +hp-sco 19410/udp # hp-sco +hp-sca 19411/tcp # hp-sca +hp-sca 19411/udp # hp-sca +hp-sessmon 19412/tcp # HP-SESSMON +hp-sessmon 19412/udp # HP-SESSMON +fxuptp 19539/tcp # FXUPTP +fxuptp 19539/udp # FXUPTP +sxuptp 19540/tcp # SXUPTP +sxuptp 19540/udp # SXUPTP +jcp 19541/tcp # JCP Client +jcp 19541/udp # JCP Client +mle 19788/udp # Mesh Link Establishment +iec-104-sec 19998/tcp # IEC 60870-5-104 process control - secure +dnp-sec 19999/tcp # Distributed Network Protocol - Secure +dnp-sec 19999/udp # Distributed Network Protocol - Secure +dnp 20000/tcp # DNP +dnp 20000/udp # DNP +microsan 20001/tcp # MicroSAN +microsan 20001/udp # MicroSAN +commtact-http 20002/tcp # Commtact HTTP +commtact-http 20002/udp # Commtact HTTP +commtact-https 20003/tcp # Commtact HTTPS +commtact-https 20003/udp # Commtact HTTPS +openwebnet 20005/tcp # OpenWebNet protocol for electric network +openwebnet 20005/udp # OpenWebNet protocol for electric network +ss-idi-disc 20012/udp # Samsung Interdevice Interaction discovery +ss-idi 20013/tcp # Samsung Interdevice Interaction +opendeploy 20014/tcp # OpenDeploy Listener +opendeploy 20014/udp # OpenDeploy Listener +nburn_id 20034/tcp nburn-id # NetBurner ID Port +nburn_id 20034/udp nburn-id # NetBurner ID Port +tmophl7mts 20046/tcp # TMOP HL7 Message Transfer Service +tmophl7mts 20046/udp # TMOP HL7 Message Transfer Service +mountd 20048/tcp # NFS mount protocol +mountd 20048/udp # NFS mount protocol +nfsrdma 20049/tcp # Network File System (NFS) over RDMA +nfsrdma 20049/udp # Network File System (NFS) over RDMA +nfsrdma 20049/sctp # Network File System (NFS) over RDMA +avesterra 20057/tcp # AvesTerra Hypergraph Transfer Protocol (HGTP) +tolfab 20167/tcp # TOLfab Data Change +tolfab 20167/udp # TOLfab Data Change +ipdtp-port 20202/tcp # IPD Tunneling Port +ipdtp-port 20202/udp # IPD Tunneling Port +ipulse-ics 20222/tcp # iPulse-ICS +ipulse-ics 20222/udp # iPulse-ICS +emwavemsg 20480/tcp # emWave Message Service +emwavemsg 20480/udp # emWave Message Service +track 20670/tcp # Track +track 20670/udp # Track +athand-mmp 20999/tcp # At Hand MMP +athand-mmp 20999/udp # AT Hand MMP +irtrans 21000/tcp # IRTrans Control +irtrans 21000/udp # IRTrans Control +notezilla-lan 21010/tcp # Notezilla.Lan Server +rdm-tfs 21553/tcp # Raima RDM TFS +dfserver 21554/tcp # MineScape Design File Server +dfserver 21554/udp # MineScape Design File Server +vofr-gateway 21590/tcp # VoFR Gateway +vofr-gateway 21590/udp # VoFR Gateway +tvpm 21800/tcp # TVNC Pro Multiplexing +tvpm 21800/udp # TVNC Pro Multiplexing +webphone 21845/tcp # webphone +webphone 21845/udp # webphone +netspeak-is 21846/tcp # NetSpeak Corp. Directory Services +netspeak-is 21846/udp # NetSpeak Corp. Directory Services +netspeak-cs 21847/tcp # NetSpeak Corp. Connection Services +netspeak-cs 21847/udp # NetSpeak Corp. Connection Services +netspeak-acd 21848/tcp # NetSpeak Corp. Automatic Call Distribution +netspeak-acd 21848/udp # NetSpeak Corp. Automatic Call Distribution +netspeak-cps 21849/tcp # NetSpeak Corp. Credit Processing System +netspeak-cps 21849/udp # NetSpeak Corp. Credit Processing System +snapenetio 22000/tcp # SNAPenetIO +snapenetio 22000/udp # SNAPenetIO +optocontrol 22001/tcp # OptoControl +optocontrol 22001/udp # OptoControl +optohost002 22002/tcp # Opto Host Port 2 +optohost002 22002/udp # Opto Host Port 2 +optohost003 22003/tcp # Opto Host Port 3 +optohost003 22003/udp # Opto Host Port 3 +optohost004 22004/tcp # Opto Host Port 4 +optohost004 22004/udp # Opto Host Port 4 +optohost005 22005/tcp # Opto Host Port 5 +optohost005 22005/udp # Opto Host Port 5 +dcap 22125/tcp # dCache Access Protocol +gsidcap 22128/tcp # GSI dCache Access Protocol +easyengine 22222/tcp # EasyEngine is CLI tool to manage WordPress Sites on Nginx server +cis 22305/udp # CompactIS Tunnel +shrewd-control 22335/tcp # Initium Labs Security and Automation Control +shrewd-stream 22335/udp # Initium Labs Security and Automation Streaming +cis-secure 22343/tcp # CompactIS Secure Tunnel +cis-secure 22343/udp # CompactIS Secure Tunnel +WibuKey 22347/tcp # WibuKey Standard WkLan +WibuKey 22347/udp # WibuKey Standard WkLan +CodeMeter 22350/tcp # CodeMeter Standard +CodeMeter 22350/udp # CodeMeter Standard +codemeter-cmwan 22351/tcp # requests of copy protection software +caldsoft-backup 22537/tcp # CaldSoft Backup server file transfer +vocaltec-wconf 22555/tcp # Vocaltec Web Conference +vocaltec-phone 22555/udp # Vocaltec Internet Phone +talikaserver 22763/tcp # Talika Main Server +talikaserver 22763/udp # Talika Main Server +aws-brf 22800/tcp # Telerate Information Platform LAN +aws-brf 22800/udp # Telerate Information Platform LAN +brf-gw 22951/tcp # Telerate Information Platform WAN +brf-gw 22951/udp # Telerate Information Platform WAN +inovaport1 23000/tcp # Inova LightLink Server Type 1 +inovaport1 23000/udp # Inova LightLink Server Type 1 +inovaport2 23001/tcp # Inova LightLink Server Type 2 +inovaport2 23001/udp # Inova LightLink Server Type 2 +inovaport3 23002/tcp # Inova LightLink Server Type 3 +inovaport3 23002/udp # Inova LightLink Server Type 3 +inovaport4 23003/tcp # Inova LightLink Server Type 4 +inovaport4 23003/udp # Inova LightLink Server Type 4 +inovaport5 23004/tcp # Inova LightLink Server Type 5 +inovaport5 23004/udp # Inova LightLink Server Type 5 +inovaport6 23005/tcp # Inova LightLink Server Type 6 +inovaport6 23005/udp # Inova LightLink Server Type 6 +gntp 23053/tcp # Generic Notification Transport Protocol +s102 23272/udp # S102 application +5afe-dir 23294/tcp # 5AFE SDN Directory +5afe-disc 23294/udp # 5AFE SDN Directory discovery +elxmgmt 23333/tcp # Emulex HBAnyware Remote Management +elxmgmt 23333/udp # Emulex HBAnyware Remote Management +novar-dbase 23400/tcp # Novar Data +novar-dbase 23400/udp # Novar Data +novar-alarm 23401/tcp # Novar Alarm +novar-alarm 23401/udp # Novar Alarm +novar-global 23402/tcp # Novar Global +novar-global 23402/udp # Novar Global +aequus 23456/tcp # Aequus Service +aequus-alt 23457/tcp # Aequus Service Mgmt +areaguard-neo 23546/tcp # AreaGuard Neo - WebServer +med-ltp 24000/tcp # med-ltp +med-ltp 24000/udp # med-ltp +med-fsp-rx 24001/tcp # med-fsp-rx +med-fsp-rx 24001/udp # med-fsp-rx +med-fsp-tx 24002/tcp # med-fsp-tx +med-fsp-tx 24002/udp # med-fsp-tx +med-supp 24003/tcp # med-supp +med-supp 24003/udp # med-supp +med-ovw 24004/tcp # med-ovw +med-ovw 24004/udp # med-ovw +med-ci 24005/tcp # med-ci +med-ci 24005/udp # med-ci +med-net-svc 24006/tcp # med-net-svc +med-net-svc 24006/udp # med-net-svc +filesphere 24242/tcp # fileSphere +filesphere 24242/udp # fileSphere +vista-4gl 24249/tcp # Vista 4GL +vista-4gl 24249/udp # Vista 4GL +ild 24321/tcp # Isolv Local Directory +ild 24321/udp # Isolv Local Directory +hid 24322/udp # Human Interface Device data streams transport +intel_rci 24386/tcp intel-rci # Intel RCI +intel_rci 24386/udp intel-rci # Intel RCI +tonidods 24465/tcp # Tonido Domain Server +tonidods 24465/udp # Tonido Domain Server +bilobit 24577/tcp # bilobit Service +bilobit-update 24577/udp # bilobit Service Update +flashfiler 24677/tcp # FlashFiler +flashfiler 24677/udp # FlashFiler +proactivate 24678/tcp # Turbopower Proactivate +proactivate 24678/udp # Turbopower Proactivate +tcc-http 24680/tcp # TCC User HTTP Service +tcc-http 24680/udp # TCC User HTTP Service +cslg 24754/tcp # Citrix StorageLink Gateway +assoc-disc 24850/udp # Device Association Discovery +find 24922/tcp # Find Identification of Network Devices +find 24922/udp # Find Identification of Network Devices +icl-twobase1 25000/tcp # icl-twobase1 +icl-twobase1 25000/udp # icl-twobase1 +icl-twobase2 25001/tcp # icl-twobase2 +icl-twobase2 25001/udp # icl-twobase2 +icl-twobase3 25002/tcp # icl-twobase3 +icl-twobase3 25002/udp # icl-twobase3 +icl-twobase4 25003/tcp # icl-twobase4 +icl-twobase4 25003/udp # icl-twobase4 +icl-twobase5 25004/tcp # icl-twobase5 +icl-twobase5 25004/udp # icl-twobase5 +icl-twobase6 25005/tcp # icl-twobase6 +icl-twobase6 25005/udp # icl-twobase6 +icl-twobase7 25006/tcp # icl-twobase7 +icl-twobase7 25006/udp # icl-twobase7 +icl-twobase8 25007/tcp # icl-twobase8 +icl-twobase8 25007/udp # icl-twobase8 +icl-twobase9 25008/tcp # icl-twobase9 +icl-twobase9 25008/udp # icl-twobase9 +icl-twobase10 25009/tcp # icl-twobase10 +icl-twobase10 25009/udp # icl-twobase10 +rna 25471/sctp # RNSAP User Adaptation for Iurh +sauterdongle 25576/tcp # Sauter Dongle +idtp 25604/tcp # Identifier Tracing Protocol +vocaltec-hos 25793/tcp # Vocaltec Address Server +vocaltec-hos 25793/udp # Vocaltec Address Server +tasp-net 25900/tcp # TASP Network Comm +tasp-net 25900/udp # TASP Network Comm +niobserver 25901/tcp # NIObserver +niobserver 25901/udp # NIObserver +nilinkanalyst 25902/tcp # NILinkAnalyst +nilinkanalyst 25902/udp # NILinkAnalyst +niprobe 25903/tcp # NIProbe +niprobe 25903/udp # NIProbe +bf-game 25954/udp # Bitfighter game server +bf-master 25955/udp # Bitfighter master server +scscp 26133/tcp # Symbolic Computation Software Composability Protocol +scscp 26133/udp # Symbolic Computation Software Composability Protocol +cockroach 26257/tcp # CockroachDB +ezproxy 26260/tcp # eZproxy +ezproxy 26260/udp # eZproxy +ezmeeting 26261/tcp # eZmeeting +ezmeeting 26261/udp # eZmeeting +k3software-svr 26262/tcp # K3 Software-Server +k3software-svr 26262/udp # K3 Software-Server +k3software-cli 26263/tcp # K3 Software-Client +k3software-cli 26263/udp # K3 Software-Client +exoline-tcp 26486/tcp # EXOline-TCP +exoline-udp 26486/udp # EXOline-UDP +exoconfig 26487/tcp # EXOconfig +exoconfig 26487/udp # EXOconfig +exonet 26489/tcp # EXOnet +exonet 26489/udp # EXOnet +imagepump 27345/tcp # ImagePump +imagepump 27345/udp # ImagePump +jesmsjc 27442/tcp # Job controller service +jesmsjc 27442/udp # Job controller service +kopek-httphead 27504/tcp # Kopek HTTP Head Port +kopek-httphead 27504/udp # Kopek HTTP Head Port +ars-vista 27782/tcp # ARS VISTA Application +ars-vista 27782/udp # ARS VISTA Application +astrolink 27876/tcp # Astrolink Protocol +tw-auth-key 27999/tcp # TW Authentication/Key Distribution and +tw-auth-key 27999/udp # Attribute Certificate Services +nxlmd 28000/tcp # NX License Manager +nxlmd 28000/udp # NX License Manager +pqsp 28001/tcp # PQ Service +a27-ran-ran 28119/udp # A27 cdma2000 RAN Management +voxelstorm 28200/tcp # VoxelStorm game server +voxelstorm 28200/udp # VoxelStorm game server +siemensgsm 28240/tcp # Siemens GSM +siemensgsm 28240/udp # Siemens GSM +bosswave 28589/tcp # Building operating system services wide area verified exchange +sgsap 29118/sctp # SGsAP in 3GPP +otmp 29167/tcp # ObTools Message Protocol +otmp 29167/udp # ObTools Message Protocol +sbcap 29168/sctp # SBcAP in 3GPP +iuhsctpassoc 29169/sctp # HNBAP and RUA Common Association +bingbang 29999/tcp # data exchange protocol for IEC61850 inn wind power plants +ndmps 30000/tcp # Secure Network Data Management Protocol +pago-services1 30001/tcp # Pago Services 1 +pago-services1 30001/udp # Pago Services 1 +pago-services2 30002/tcp # Pago Services 2 +pago-services2 30002/udp # Pago Services 2 +amicon-fpsu-ra 30003/tcp # Amicon FPSU-IP Remote Administration +amicon-fpsu-ra 30003/udp # Amicon FPSU-IP Remote Administration +amicon-fpsu-s 30004/udp # Amicon FPSU-IP VPN +rwp 30100/tcp # Remote Window Protocol +rwp 30100/sctp # Remote Window Protocol +kingdomsonline 30260/tcp # Kingdoms Online (CraigAvenue) +kingdomsonline 30260/udp # Kingdoms Online (CraigAvenue) +samsung-disc 30832/udp # Samsung Convergence Discovery Protocol +ovobs 30999/tcp # OpenView Service Desk Client +ovobs 30999/udp # OpenView Service Desk Client +autotrac-acp 31020/tcp # Autotrac ACP 245 +yawn 31029/udp # YaWN - Yet Another Windows Notifie +pace-licensed 31400/tcp # PACE license server +xqosd 31416/tcp # XQoS network monitor +xqosd 31416/udp # XQoS network monitor +tetrinet 31457/tcp # TetriNET Protocol +tetrinet 31457/udp # TetriNET Protocol +lm-mon 31620/tcp # lm mon +lm-mon 31620/udp # lm mon +dsx_monitor 31685/tcp dsx-monitor # DS Expert Monitor +gamesmith-port 31765/tcp # GameSmith Port +gamesmith-port 31765/udp # GameSmith Port +iceedcp_tx 31948/tcp iceedcp-tx # Embedded Device Configuration Protocol TX +iceedcp_tx 31948/udp iceedcp-tx # Embedded Device Configuration Protocol TX +iceedcp_rx 31949/tcp iceedcp-rx # Embedded Device Configuration Protocol RX +iceedcp_rx 31949/udp iceedcp-rx # Embedded Device Configuration Protocol RX +iracinghelper 32034/tcp # iRacing helper service +iracinghelper 32034/udp # iRacing helper service +t1distproc60 32249/tcp # T1 Distributed Processor +t1distproc60 32249/udp # T1 Distributed Processor +plex 32400/tcp # Plex multimedia +apm-link 32483/tcp # Access Point Manager Link +apm-link 32483/udp # Access Point Manager Link +sec-ntb-clnt 32635/tcp # SecureNotebook-CLNT +sec-ntb-clnt 32635/udp # SecureNotebook-CLNT +DMExpress 32636/tcp # DMExpress +DMExpress 32636/udp # DMExpress +filenet-powsrm 32767/tcp # FileNet BPM WS-ReliableMessaging Client +filenet-powsrm 32767/udp # FileNet BPM WS-ReliableMessaging Client +filenet-tms 32768/tcp # Filenet TMS +filenet-tms 32768/udp # Filenet TMS +filenet-rpc 32769/tcp # Filenet RPC +filenet-rpc 32769/udp # Filenet RPC +filenet-nch 32770/tcp # Filenet NCH +filenet-nch 32770/udp # Filenet NCH +filenet-rmi 32771/tcp # FileNET RMI +filenet-rmi 32771/udp # FileNet RMI +filenet-pa 32772/tcp # FileNET Process Analyzer +filenet-pa 32772/udp # FileNET Process Analyzer +filenet-cm 32773/tcp # FileNET Component Manager +filenet-cm 32773/udp # FileNET Component Manager +filenet-re 32774/tcp # FileNET Rules Engine +filenet-re 32774/udp # FileNET Rules Engine +filenet-pch 32775/tcp # Performance Clearinghouse +filenet-pch 32775/udp # Performance Clearinghouse +filenet-peior 32776/tcp # FileNET BPM IOR +filenet-peior 32776/udp # FileNET BPM IOR +filenet-obrok 32777/tcp # FileNet BPM CORBA +filenet-obrok 32777/udp # FileNet BPM CORBA +mlsn 32801/tcp # Multiple Listing Service Network +mlsn 32801/udp # Multiple Listing Service Network +retp 32811/tcp # Real Estate Transport Protocol +idmgratm 32896/tcp # Attachmate ID Manager +idmgratm 32896/udp # Attachmate ID Manager +mysqlx 33060/tcp # MySQL Database Extended Interface +aurora-balaena 33123/tcp # Aurora (Balaena Ltd) +aurora-balaena 33123/udp # Aurora (Balaena Ltd) +diamondport 33331/tcp # DiamondCentral Interface +diamondport 33331/udp # DiamondCentral Interface +dgi-serv 33333/tcp # Digital Gaslight Service +speedtrace 33334/tcp # SpeedTrace TraceAgent +speedtrace-disc 33334/udp # SpeedTrace TraceAgent Discovery +snip-slave 33656/tcp # SNIP Slave +snip-slave 33656/udp # SNIP Slave +turbonote-2 34249/tcp # TurboNote Relay Server Default Port +turbonote-2 34249/udp # TurboNote Relay Server Default Port +p-net-local 34378/tcp # P-Net on IP local +p-net-local 34378/udp # P-Net on IP local +p-net-remote 34379/tcp # P-Net on IP remote +p-net-remote 34379/udp # P-Net on IP remote +dhanalakshmi 34567/tcp # dhanalakshmi.org EDI Service +profinet-rt 34962/tcp # PROFInet RT Unicast +profinet-rt 34962/udp # PROFInet RT Unicast +profinet-rtm 34963/tcp # PROFInet RT Multicast +profinet-rtm 34963/udp # PROFInet RT Multicast +profinet-cm 34964/tcp # PROFInet Context Manager +profinet-cm 34964/udp # PROFInet Context Manager +ethercat 34980/tcp # EtherCAT Port +ethercat 34980/udp # EhterCAT Port +heathview 35000/tcp # HeathView +rt-viewer 35001/tcp # ReadyTech Viewer +rt-viewer 35001/udp # ReadyTech Viewer +rt-sound 35002/tcp # ReadyTech Sound Server +rt-devicemapper 35003/tcp # ReadyTech DeviceMapper +rt-classmanager 35004/tcp # ReadyTech ClassManager +rt-classmanager 35004/udp # ReadyTech ClassManager +rt-labtracker 35005/tcp # ReadyTech LabTracker +rt-helper 35006/tcp # ReadyTech Helper Service +kitim 35354/tcp # KIT Messenger +altova-lm 35355/tcp # Altova License Management +altova-lm-disc 35355/udp # Altova License Management Discovery +guttersnex 35356/tcp # Gutters Note Exchange +openstack-id 35357/tcp # OpenStack ID Service +allpeers 36001/tcp # AllPeers Network +allpeers 36001/udp # AllPeers Network +wlcp 36411/udp # Wireless LAN Control plane Protocol (WLCP) +s1-control 36412/sctp # S1-Control Plane (3GPP) +x2-control 36422/sctp # X2-Control Plane (3GPP) +slmap 36423/sctp # SLm Interface Application protocol +nq-ap 36424/sctp # Nq and Nq' Application protocol +m2ap 36443/sctp # M2 Application Part +m3ap 36444/sctp # M3 Application Part +xw-control 36462/sctp # Xw-Control Plane (3GPP) +febooti-aw 36524/tcp # Febooti Automation Workshop +observium-agent 36602/tcp # Observium statistics collection agent +kastenxpipe 36865/tcp # KastenX Pipe +kastenxpipe 36865/udp # KastenX Pipe +mapx 36700/tcp # MapX communication +neckar 37475/tcp # science + computing's Venus Administration Port +neckar 37475/udp # science + computing's Venus Administration Port +eftp 37601/tcp # Epipole File Transfer +unisys-eportal 37654/tcp # Unisys ClearPath ePortal +unisys-eportal 37654/udp # Unisys ClearPath ePortal +gdrive-sync 37483/tcp # Google Drive Sync +ivs-database 38000/tcp # InfoVista Server Database +ivs-insertion 38001/tcp # InfoVista Server Insertion +cresco-control 38002/tcp # Cresco Controller +crescoctrl-disc 38002/udp # Cresco Controller Discovery +galaxy7-data 38201/tcp # Galaxy7 Data Tunnel +galaxy7-data 38201/udp # Galaxy7 Data Tunnel +fairview 38202/tcp # Fairview Message Service +fairview 38202/udp # Fairview Message Service +agpolicy 38203/tcp # AppGate Policy Server +agpolicy 38203/udp # AppGate Policy Server +sruth 38800/tcp # Sruth - University_Corporation_for_Atmospheric_Research +secrmmsafecopya 38865/tcp # for use of the secRMM SafeCopy program +turbonote-1 39681/tcp # TurboNote Default Port +turbonote-1 39681/udp # TurboNote Default Port +safetynetp 40000/tcp # SafetyNET p +safetynetp 40000/udp # SafetyNET p +k-patentssensor 40023/udp # K-PatentsSensorInformation +z-wave-s 41230/tcp # Z-Wave Protocol over SSL/TLS +z-wave-s 41230/udp # Z-Wave Protocol over DTLS +sptx 40404/tcp # Simplify Printing TX +cscp 40841/tcp # CSCP +cscp 40841/udp # CSCP +csccredir 40842/tcp # CSCCREDIR +csccredir 40842/udp # CSCCREDIR +csccfirewall 40843/tcp # CSCCFIREWALL +csccfirewall 40843/udp # CSCCFIREWALL +ortec-disc 40853/udp # ORTEC Service Discovery +fs-qos 41111/tcp # Foursticks QoS Protocol +fs-qos 41111/udp # Foursticks QoS Protocol +tentacle 41121/tcp # Tentacle Server +crestron-cip 41794/tcp # Crestron Control Port +crestron-cip 41794/udp # Crestron Control Port +crestron-ctp 41795/tcp # Crestron Terminal Port +crestron-ctp 41795/udp # Crestron Terminal Port +crestron-cips 41796/tcp # Crestron Secure Control Port +crestron-ctps 41797/tcp # Crestron Secure Terminal Port +candp 42508/tcp # Computer Associates network discovery protocol +candp 42508/udp # Computer Associates network discovery protocol +candrp 42509/tcp # CA discovery response +candrp 42509/udp # CA discovery response +caerpc 42510/tcp # CA eTrust RPC +caerpc 42510/udp # CA eTrust RPC +recvr-rc 43000/tcp # Receiver Remote Control +recvr-rc-disc 43000/udp # Receiver Remote Control Discovery +reachout 43188/tcp # REACHOUT +reachout 43188/udp # REACHOUT +ndm-agent-port 43189/tcp # NDM-AGENT-PORT +ndm-agent-port 43189/udp # NDM-AGENT-PORT +ip-provision 43190/tcp # IP-PROVISION +ip-provision 43190/udp # IP-PROVISION +noit-transport 43191/tcp # Reconnoiter Agent Data Transport +shaperai 43210/tcp # Shaper Automation Server +shaperai-disc 43210/udp # Shaper Automation Server Management Discovery +eq3-update 43439/tcp # EQ3 firmware update +eq3-config 43439/udp # EQ3 discovery and configuration +ew-mgmt 43440/tcp # Cisco EnergyWise Management +ew-disc-cmd 43440/udp # Cisco EnergyWise Discovery and Command Flooding +ciscocsdb 43441/tcp # Cisco NetMgmt DB Ports +ciscocsdb 43441/udp # Cisco NetMgmt DB Ports +z-wave-tunnel 44123/tcp # Z-Wave Secure Tunnel +pmcd 44321/tcp # PCP server (pmcd) +pmcd 44321/udp # PCP server (pmcd) +pmcdproxy 44322/tcp # PCP server (pmcd) proxy +pmcdproxy 44322/udp # PCP server (pmcd) proxy +cognex-dataman 44444/tcp # Cognex DataMan Management +### UNAUTHORIZED USE: Ports 44515 & 44516 used by NI Device Protocol############ +domiq 44544/udp # DOMIQ Building Automation +rbr-debug 44553/tcp # REALbasic Remote Debug +rbr-debug 44553/udp # REALbasic Remote Debug +asihpi 44600/udp # AudioScience HPI +EtherNet/IP-2 44818/tcp EtherNet-IP-2 # EtherNet/IP messaging +EtherNet/IP-2 44818/udp EtherNet-IP-2 # EtherNet/IP messaging +m3da 44900/tcp # M3DA (efficient machine-to-machine communication) +m3da-disc 44900/udp # M3DA Discovery (efficient machine-to-machine communication) +asmp 45000/tcp # NSi AutoStore Status Monitoring Protocol data transfer +asmp-mon 45000/udp # NSi AutoStore Status Monitoring Protocol device monitoring +asmps 45001/tcp # NSi AutoStore Status Monitoring Protocol secure data transfer +rs-status 45002/tcp # Redspeed Status Monitor +synctest 45045/tcp # Remote application control +invision-ag 45054/tcp # InVision AG +invision-ag 45054/udp # InVision AG +eba 45678/tcp # EBA PRISE +eba 45678/udp # EBA PRISE +dai-shell 45824/tcp # Server for the DAI family of client-server products +qdb2service 45825/tcp # Qpuncture Data Access Service +qdb2service 45825/udp # Qpuncture Data Access Service +ssr-servermgr 45966/tcp # SSRServerMgr +ssr-servermgr 45966/udp # SSRServerMgr +inedo 46336/tcp # Listen port used for Inedo agent +mediabox 46999/tcp # MediaBox Server +mediabox 46999/udp # MediaBox Server +mbus 47000/tcp # Message Bus +mbus 47000/udp # Message Bus +winrm 47001/tcp # Windows Remote Management Service +jvl-mactalk 47100/udp # Configuration of motors conneced to industrial ethernet +dbbrowse 47557/tcp # Databeam Corporation +dbbrowse 47557/udp # Databeam Corporation +directplaysrvr 47624/tcp # Direct Play Server +directplaysrvr 47624/udp # Direct Play Server +ap 47806/tcp # ALC Protocol +ap 47806/udp # ALC Protocol +bacnet 47808/tcp # Building Automation and Control Networks +bacnet 47808/udp # Building Automation and Control Networks +presonus-ucnet 47809/udp # PreSonus Universal Control Network protocol +nimcontroller 48000/tcp # Nimbus Controller +nimcontroller 48000/udp # Nimbus Controller +nimspooler 48001/tcp # Nimbus Spooler +nimspooler 48001/udp # Nimbus Spooler +nimhub 48002/tcp # Nimbus Hub +nimhub 48002/udp # Nimbus Hub +nimgtw 48003/tcp # Nimbus Gateway +nimgtw 48003/udp # Nimbus Gateway +nimbusdb 48004/tcp # NimbusDB Connector +nimbusdbctrl 48005/tcp # NimbusDB Control +3gpp-cbsp 48049/tcp # 3GPP Cell Broadcast Service Protocol +weandsf 48050/tcp # WeFi Access Network Discovery and Selection +isnetserv 48128/tcp # Image Systems Network Services +isnetserv 48128/udp # Image Systems Network Services +blp5 48129/tcp # Bloomberg locator +blp5 48129/udp # Bloomberg locator +com-bardac-dw 48556/tcp # com-bardac-dw +com-bardac-dw 48556/udp # com-bardac-dw +iqobject 48619/tcp # iqobject +iqobject 48619/udp # iqobject +robotraconteur 48653/tcp # Robot Raconteur transport +robotraconteur 48653/udp # Robot Raconteur transport +matahari 49000/tcp # Matahari Broker +nusrp 49001/tcp # Nuance Unity Service Request Protocol +nusdp-disc 49001/udp # Nuance Unity Service Discovery Protocol +# Updated additional list from IANA with all missing services 05/05/2017 done by Karl Vogel +mit-ml-dev 85/tcp # MIT ML Device +mit-ml-dev 85/udp # MIT ML Device +rap 256/tcp # Route Access Protocol +rap 256/udp # Route Access Protocol +pt-tls 271/tcp # IETF Network Endpoint Assessment (PT-TLS) +meter 571/tcp # udemon +meter 571/udp # udemon +dlep 854/tcp # Dynamic Link Exchange Protocol (DLEP) +dlep 854/udp # Dynamic Link Exchange Protocol (DLEP) +accessbuilder 888/udp # AccessBuilder +webpush 1001/tcp # HTTP Web Push +pip 1321/tcp # PIP +pip 1321/udp # PIP +csdmbase 1471/tcp # csdmbase +csdmbase 1471/udp # csdmbase +csdm 1472/tcp # csdm +csdm 1472/udp # csdm +ngr-t 1528/udp # NGR transport for mobile ad-hoc networks +nmsp 1790/tcp # Narrative Media Streaming Protocol +nmsp 1790/udp # Narrative Media Streaming Protocol +uma 1797/tcp # Universal Management Architecture +uma 1797/udp # Universal Management Architecture +raid-cd 2013/udp # raid +dls 2047/tcp # +dls 2047/udp # +nvd 2329/tcp # NVD User +nvd 2329/udp # NVD User +swarm 2377/tcp # RPC interface for Docker Swarm +msp 2438/tcp # Message send protocol? +msp 2438/udp # Message send protocol? +unicontrol 2499/tcp # UniControl +unicontrol 2499/udp # UniControl +nmsigport 2839/tcp # NMSigPort +nmsigport 2839/udp # NMSigPort +fxp 2849/tcp # FXP Communication +fxp 2849/udp # FXP Communication +epp 3044/tcp # EndPoint Protocol +epp 3044/udp # EndPoint Protocol +creativeserver 3364/tcp # Creative Server +creativeserver 3364/udp # Creative Server +contentserver 3365/tcp # Content Server +contentserver 3365/udp # Content Server +creativepartnr 3366/tcp # Creative Partner +creativepartnr 3366/udp # Creative Partner +udt-os 3900/tcp # Unidata UDT OS +udt-os 3900/udp # Unidata UDT OS +npp 4045/tcp # Network Paging Protocol +npp 4045/udp # Network Paging Protocol +hctl 4197/tcp # Harman HControl Protocol +hctl 4197/udp # Harman HControl Protocol +trinity-dist 4711/sctp # Trinity Trust Network Node Communication +trinity-dist 4711/tcp # Trinity Trust Network Node Communication +trinity-dist 4711/udp # Trinity Trust Network Node Communication +intelliadm-disc 4746/udp # IntelliAdmin Discovery +gre-in-udp 4754/udp # GRE-in-UDP Encapsulation +gre-udp-dtls 4755/udp # GRE-in-UDP Encapsulation with DTLS +RDCenter 4756/tcp # Reticle Decision Center +converge 4774/tcp # Converge RPC +mftp 5402/tcp # OmniCast MFTP +mftp 5402/udp # OmniCast MFTP +cbus 5550/tcp # Model Railway control using CBUS protocol +storageos 5705/tcp # StorageOS REST API +ricardo-lm 6148/tcp # Ricardo North America License Manager +ricardo-lm 6148/udp # Ricardo North America License Manager +ieee11073-20701 6464/tcp # Medical device communication +ieee11073-20701 6464/udp # Medical device communication +nexgen-aux 6629/tcp # +nexgen-aux 6629/udp # +rtimeviewer 6900/tcp # R*TIME Viewer Data Interface +spg 7016/tcp # SPG Controls Carrier +spg 7016/udp # SPG Controls Carrier +grasp 7017/tcp # GeneRic Autonomic Signaling Protocol +grasp 7017/udp # GeneRic Autonomic Signaling Protocol +pon-ictp 7202/tcp # Inter-Channel Termination Protocol (ICTP) +openit 7478/tcp # IT Asset Management +coherence-disc 7574/udp # Oracle Coherence Cluster discovery service +bolt 7687/tcp # Bolt database connection +nfapi 7701/sctp # SCF nFAPI defining MAC/PHY split +wpl-analytics 8006/tcp # World Programming analytics +wpl-disc 8006/udp # World Programming analytics discovery +ucs-isc 8070/tcp # Oracle Communication Indexed Search Converter +mles 8077/tcp # Client-server data distribution +opsmessaging 8090/tcp # Vehicle to station messaging +robot-remote 8270/tcp # Robot Framework Remote Library Interface +aritts 8423/tcp # Aristech text-to-speech server +ssports-bcast 8808/udp # STATSports Broadcast Service +CardWeb-IO 9060/tcp # CardWeb request-response I/O exchange +CardWeb-RT 9060/udp # CardWeb realtime device data +pumpkindb 9981/tcp # Event sourcing database engine/language +abb-hw 10020/tcp # Hardware configuration and maintenance +tile-ml 10261/tcp # Tile remote machine learning +xpra 14500/tcp # xpra network protocol +vdmmesh-disc 18668/udp # Manufacturing Execution Systems Mesh Comm +vdmmesh 18668/tcp # Manufacturing Execution Systems Mesh Comm +cora-disc 19220/udp # Discovery for Client Connection ... Service +cora 19220/tcp # Client Connection Mgmt/Data Exchange Service +aigairserver 21221/tcp # Services for Air Server +ka-kdp 31016/udp # Kollective Agent Kollective Delivery +ka-sddp 31016/tcp # Kollective Agent Secure Distributed Delivery +edi_service 34567/udp # dhanalakshmi.org EDI Service +axio-disc 35100/tcp # Axiomatic discovery protocol +axio-disc 35100/udp # Axiomatic discovery protocol +pmwebapi 44323/tcp # Performance Co-Pilot client HTTP API +cloudcheck-ping 45514/udp # ASSIA CloudCheck WiFi Management keepalive +cloudcheck 45514/tcp # ASSIA CloudCheck WiFi Management System +spremotetablet 46998/tcp # Capture handwritten signatures diff --git a/sestatus.conf b/sestatus.conf new file mode 100644 index 0000000..7ebca9c --- /dev/null +++ b/sestatus.conf @@ -0,0 +1,18 @@ +[files] +/etc/passwd +/etc/shadow +/bin/bash +/bin/login +/bin/sh +/sbin/agetty +/sbin/init +/sbin/mingetty +/usr/sbin/sshd +/lib/libc.so.6 +/lib/ld-linux.so.2 +/lib/ld.so.1 + +[process] +/sbin/mingetty +/sbin/agetty +/usr/sbin/sshd diff --git a/shadow b/shadow new file mode 100644 index 0000000..457a32a --- /dev/null +++ b/shadow @@ -0,0 +1,27 @@ +root:$6$WcGqGUzv5BU8uOGN$HrwGZJ65jwb/3AG623RjyVJBnDcWGxi4DoqHcyGX.f59kNlrnZ8cY.6cHGUeagHUB9N1b2f2ow5fFoVfz5Yxd.::0:99999:7::: +bin:*:19123:0:99999:7::: +daemon:*:19123:0:99999:7::: +adm:*:19123:0:99999:7::: +lp:*:19123:0:99999:7::: +sync:*:19123:0:99999:7::: +shutdown:*:19123:0:99999:7::: +halt:*:19123:0:99999:7::: +mail:*:19123:0:99999:7::: +operator:*:19123:0:99999:7::: +games:*:19123:0:99999:7::: +ftp:*:19123:0:99999:7::: +nobody:*:19123:0:99999:7::: +systemd-coredump:!!:19313:::::: +dbus:!!:19313:::::: +tss:!!:19313:::::: +sssd:!!:19313:::::: +sshd:!!:19313:::::: +chrony:!!:19313:::::: +systemd-oom:!*:19313:::::: +frank:$6$KfW7RcxVL97p1lKB$jC8rbO4.4DB/2wrL8AR8bII4uuh3TMlTr6IKyi73WUUe0i5Nh2rjYsFLDSUiUR.BV7KPamd5KD63CX3FMMyRf1::0:99999:7::: +postgres:!!:19762:::::: +redis:!!:19762:::::: +netbox:!!:19762:::::: +systemd-network:!!:19947:::::: +rpc:!!:19956:0:99999:7::: +rpcuser:!!:19956:::::: diff --git a/shadow- b/shadow- new file mode 100644 index 0000000..4ac019d --- /dev/null +++ b/shadow- @@ -0,0 +1,26 @@ +root:$6$WcGqGUzv5BU8uOGN$HrwGZJ65jwb/3AG623RjyVJBnDcWGxi4DoqHcyGX.f59kNlrnZ8cY.6cHGUeagHUB9N1b2f2ow5fFoVfz5Yxd.::0:99999:7::: +bin:*:19123:0:99999:7::: +daemon:*:19123:0:99999:7::: +adm:*:19123:0:99999:7::: +lp:*:19123:0:99999:7::: +sync:*:19123:0:99999:7::: +shutdown:*:19123:0:99999:7::: +halt:*:19123:0:99999:7::: +mail:*:19123:0:99999:7::: +operator:*:19123:0:99999:7::: +games:*:19123:0:99999:7::: +ftp:*:19123:0:99999:7::: +nobody:*:19123:0:99999:7::: +systemd-coredump:!!:19313:::::: +dbus:!!:19313:::::: +tss:!!:19313:::::: +sssd:!!:19313:::::: +sshd:!!:19313:::::: +chrony:!!:19313:::::: +systemd-oom:!*:19313:::::: +frank:$6$KfW7RcxVL97p1lKB$jC8rbO4.4DB/2wrL8AR8bII4uuh3TMlTr6IKyi73WUUe0i5Nh2rjYsFLDSUiUR.BV7KPamd5KD63CX3FMMyRf1::0:99999:7::: +postgres:!!:19762:::::: +redis:!!:19762:::::: +netbox:!!:19762:::::: +systemd-network:!!:19947:::::: +rpc:!!:19956:0:99999:7::: diff --git a/shells b/shells new file mode 100644 index 0000000..f427b27 --- /dev/null +++ b/shells @@ -0,0 +1,6 @@ +/bin/sh +/bin/bash +/usr/bin/sh +/usr/bin/bash +/usr/bin/tmux +/bin/tmux diff --git a/skel/.bash_logout b/skel/.bash_logout new file mode 100644 index 0000000..af7c6fd --- /dev/null +++ b/skel/.bash_logout @@ -0,0 +1,2 @@ +# ~/.bash_logout + diff --git a/skel/.bash_profile b/skel/.bash_profile new file mode 100644 index 0000000..55136b9 --- /dev/null +++ b/skel/.bash_profile @@ -0,0 +1,8 @@ +# .bash_profile + +# Get the aliases and functions +if [ -f ~/.bashrc ]; then + . ~/.bashrc +fi + +# User specific environment and startup programs diff --git a/skel/.bashrc b/skel/.bashrc new file mode 100644 index 0000000..ad4581e --- /dev/null +++ b/skel/.bashrc @@ -0,0 +1,27 @@ +# .bashrc + +# Source global definitions +if [ -f /etc/bashrc ]; then + . /etc/bashrc +fi + +# User specific environment +if ! [[ "$PATH" =~ "$HOME/.local/bin:$HOME/bin:" ]] +then + PATH="$HOME/.local/bin:$HOME/bin:$PATH" +fi +export PATH + +# Uncomment the following line if you don't like systemctl's auto-paging feature: +# export SYSTEMD_PAGER= + +# User specific aliases and functions +if [ -d ~/.bashrc.d ]; then + for rc in ~/.bashrc.d/*; do + if [ -f "$rc" ]; then + . "$rc" + fi + done +fi + +unset rc diff --git a/ssh/moduli b/ssh/moduli new file mode 100644 index 0000000..81afe33 --- /dev/null +++ b/ssh/moduli @@ -0,0 +1,450 @@ +# $OpenBSD: moduli,v 1.30 2021/05/17 07:22:45 dtucker Exp $ +# Time Type Tests Tries Size Generator Modulus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diff --git a/ssh/ssh_config b/ssh/ssh_config new file mode 100644 index 0000000..d3dab1a --- /dev/null +++ b/ssh/ssh_config @@ -0,0 +1,55 @@ +# $OpenBSD: ssh_config,v 1.35 2020/07/17 03:43:42 dtucker Exp $ + +# This is the ssh client system-wide configuration file. See +# ssh_config(5) for more information. This file provides defaults for +# users, and the values can be changed in per-user configuration files +# or on the command line. + +# Configuration data is parsed as follows: +# 1. command line options +# 2. user-specific file +# 3. system-wide file +# Any configuration value is only changed the first time it is set. +# Thus, host-specific definitions should be at the beginning of the +# configuration file, and defaults at the end. + +# Site-wide defaults for some commonly used options. For a comprehensive +# list of available options, their meanings and defaults, please see the +# ssh_config(5) man page. + +# Host * +# ForwardAgent no +# ForwardX11 no +# PasswordAuthentication yes +# HostbasedAuthentication no +# GSSAPIAuthentication no +# GSSAPIDelegateCredentials no +# GSSAPIKeyExchange no +# GSSAPITrustDNS no +# BatchMode no +# CheckHostIP yes +# AddressFamily any +# ConnectTimeout 0 +# StrictHostKeyChecking ask +# IdentityFile ~/.ssh/id_rsa +# IdentityFile ~/.ssh/id_dsa +# IdentityFile ~/.ssh/id_ecdsa +# IdentityFile ~/.ssh/id_ed25519 +# Port 22 +# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc +# MACs hmac-md5,hmac-sha1,umac-64@openssh.com +# EscapeChar ~ +# Tunnel no +# TunnelDevice any:any +# PermitLocalCommand no +# VisualHostKey no +# ProxyCommand ssh -q -W %h:%p gateway.example.com +# RekeyLimit 1G 1h + UserKnownHostsFile ~/.ssh/known_hosts.d/%k +# +# This system is following system-wide crypto policy. +# To modify the crypto properties (Ciphers, MACs, ...), create a *.conf +# file under /etc/ssh/ssh_config.d/ which will be automatically +# included below. For more information, see manual page for +# update-crypto-policies(8) and ssh_config(5). +Include /etc/ssh/ssh_config.d/*.conf diff --git a/ssh/ssh_config.d/50-redhat.conf b/ssh/ssh_config.d/50-redhat.conf new file mode 100644 index 0000000..73fecbf --- /dev/null +++ b/ssh/ssh_config.d/50-redhat.conf @@ -0,0 +1,15 @@ +# The options here are in the "Match final block" to be applied as the last +# options and could be potentially overwritten by the user configuration +Match final all + # Follow system-wide Crypto Policy, if defined: + Include /etc/crypto-policies/back-ends/openssh.config + + GSSAPIAuthentication yes + +# If this option is set to yes then remote X11 clients will have full access +# to the original X11 display. As virtually no X11 client supports the untrusted +# mode correctly we set this to yes. + ForwardX11Trusted yes + +# Uncomment this if you want to use .local domain +# Host *.local diff --git a/ssh/ssh_host_ecdsa_key b/ssh/ssh_host_ecdsa_key new file mode 100644 index 0000000..38211a6 --- /dev/null +++ b/ssh/ssh_host_ecdsa_key @@ -0,0 +1,8 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS +1zaGEyLW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQSMOrCrzNmIHxZzSeC0ruKuUVTqNnVJ +lRn6O0KkmLYK6fAtLD5ifrgDdxbOUnC4su1A1beS5sFC1C22s5zkTzDjAAAAoCHL6zwhy+ +s8AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIw6sKvM2YgfFnNJ +4LSu4q5RVOo2dUmVGfo7QqSYtgrp8C0sPmJ+uAN3Fs5ScLiy7UDVt5LmwULULbaznORPMO +MAAAAhAIbUr5LuMQGl8Y+wJZ7KXocAG8N5f4iapbg9+TsJzPJpAAAAAAECAwQFBgc= +-----END OPENSSH PRIVATE KEY----- diff --git a/ssh/ssh_host_ecdsa_key.pub b/ssh/ssh_host_ecdsa_key.pub new file mode 100644 index 0000000..65253a5 --- /dev/null +++ b/ssh/ssh_host_ecdsa_key.pub @@ -0,0 +1 @@ +ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIw6sKvM2YgfFnNJ4LSu4q5RVOo2dUmVGfo7QqSYtgrp8C0sPmJ+uAN3Fs5ScLiy7UDVt5LmwULULbaznORPMOM= diff --git a/ssh/ssh_host_ed25519_key b/ssh/ssh_host_ed25519_key new file mode 100644 index 0000000..4362c0d --- /dev/null +++ b/ssh/ssh_host_ed25519_key @@ -0,0 +1,7 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW +QyNTUxOQAAACBB+V1c3POQUXdwXtwD5CKD7UEXjsdRmrJkZne1/Jn+ywAAAIhXwg87V8IP +OwAAAAtzc2gtZWQyNTUxOQAAACBB+V1c3POQUXdwXtwD5CKD7UEXjsdRmrJkZne1/Jn+yw +AAAEAAlnpFk6OmtNWJPzChYkrPlpiMbKnskj/dRV8BKjvZDEH5XVzc85BRd3Be3APkIoPt +QReOx1GasmRmd7X8mf7LAAAAAAECAwQF +-----END OPENSSH PRIVATE KEY----- diff --git a/ssh/ssh_host_ed25519_key.pub b/ssh/ssh_host_ed25519_key.pub new file mode 100644 index 0000000..efc0763 --- /dev/null +++ b/ssh/ssh_host_ed25519_key.pub @@ -0,0 +1 @@ +ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEH5XVzc85BRd3Be3APkIoPtQReOx1GasmRmd7X8mf7L diff --git a/ssh/ssh_host_rsa_key b/ssh/ssh_host_rsa_key new file mode 100644 index 0000000..74767a1 --- /dev/null +++ b/ssh/ssh_host_rsa_key @@ -0,0 +1,38 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn +NhAAAAAwEAAQAAAYEAt9an7/JpSepYCa5CPxqBsbF5RXeQa/RLYQ69Z9ImmRE11p5kKJ4U +mjHVAbczZtsqRH98/Ru5BA+BddQZ7wQdK+JmqFgcSaZmUqIhL1oYcCTBcaR4cxDl6/aMz+ +O+B+Tl2PzaWoJEqbNHqkokuhTQMTUUO074qR/SMEzbD6pGBqF/3Q1V2ZmJD4YJxZEJ4jad +/EJbXfQFn2jVWSW0L5vtHKADudzIQ4sfGgpM6WeuM+0fZp432FxwYog0JFaSa8gjzT3Pxo +wx22hu2AArQQIQPcwe/CdmeAeb/28ERGAEyqal8ls7W74Q86VERIAI7eiV+/u/tSyFJ/xt +w0ZekMmbQB6EkCh6UIqjDvP+qmXe9CX2dVL63QnFH7wSw+rj0kgPRXK1rokmIQffucZ4TE +Ruu9O5OXExGjPOAu96898yalQ/OMYjx59rlQJswGXr8U4SxZ9Sgp4tJxM2eLHgxnh3riya +99C18KFWQaRsVc5LEuG/G3A1NakuZjOYaiqudqx9AAAFeKU4v5ulOL+bAAAAB3NzaC1yc2 +EAAAGBALfWp+/yaUnqWAmuQj8agbGxeUV3kGv0S2EOvWfSJpkRNdaeZCieFJox1QG3M2bb +KkR/fP0buQQPgXXUGe8EHSviZqhYHEmmZlKiIS9aGHAkwXGkeHMQ5ev2jM/jvgfk5dj82l +qCRKmzR6pKJLoU0DE1FDtO+Kkf0jBM2w+qRgahf90NVdmZiQ+GCcWRCeI2nfxCW130BZ9o +1VkltC+b7RygA7ncyEOLHxoKTOlnrjPtH2aeN9hccGKINCRWkmvII809z8aMMdtobtgAK0 +ECED3MHvwnZngHm/9vBERgBMqmpfJbO1u+EPOlRESACO3olfv7v7UshSf8bcNGXpDJm0Ae +hJAoelCKow7z/qpl3vQl9nVS+t0JxR+8EsPq49JID0Vyta6JJiEH37nGeExEbrvTuTlxMR +ozzgLvevPfMmpUPzjGI8efa5UCbMBl6/FOEsWfUoKeLScTNnix4MZ4d64smvfQtfChVkGk +bFXOSxLhvxtwNTWpLmYzmGoqrnasfQAAAAMBAAEAAAGAIJgO22SD1WaWqFS8ixqkfwBDy5 +S4xuMf0DwASd2BGWdrP7uCb48jgPkv1meIVgaqlk1yOCAHrBghsGXkGTQGBgdUgyloDojR +oHn9XztelNd3crIh5ujKkwz6B0vOH/Et7UxbXGu3R80w+hi+LT3OccMC7McCIF4zcnvV5Q ++f7cIJfQRFwdhObDGsHtqpwXFEjnqnX1+J9artFKqyKTTAk/As6PGjkhIi+Ad2fnVy9eLn +S9bmeNZe2KFkeULeH/zySrjigc1x2Bf3EQu5QbWYLTtbUnTjFBw1cFdeKwBRQpC3sirUsV +xYjSei5cHwL2Tz4sNwYegpSafggwWChJpJYiX/0AOZ2FEK9OzmpI6os5KzatyZbfaZIA+Y +3ePcP9CTccBM0DRGakfsFoXvfZZK7uf5DNIYZagZ7xZTsLBENKz9PxASR9ctwapoQckQZE +gfTCFHYTBySDDLto0Jf2DsZAD9tVZxiUSjsLxzqQZaxKS9rIwjybCiHiXyNzXDeCGRAAAA +wQCLyfBjRkPOFQkVH1n9ZnilvpJHH3dhY6LoFBtXup+4Arg8yDFnwLhtl+w4d7wf/g2pVC +W0M5k9flytBYSIAVJzGbHSMkex+XfpnmbndpEQaLsbcWZRvnuAJ2hDxHe2GWQYJLTF+5Nw +OLfCamQH6cKbdLLQ9rBytt2MkTdXiZiCoUiehV9+qxzPI+2SUEVSrHfvUYgcAx7O+zDmAX +uYJby0VIRoFtfKTMt33uNvxTwb2WygH6O01CkZQ9cJFQAMtJQAAADBAMP5q9uBeKkytBJ8 +Lgj8py8FwhrBim/pTm8WWXt60ocy56ppDfZv9LtqCPNrqLfudVuMaC1Y1k5B0aLxxqpRWw +ajL20KK/wER9ogV7aGGsZ3gvwpQEot3K93qpF3u6Niv4e3CZU9Jz7icuVUGSCfLdJXdU93 +ENgsZVfCy6PrRlGqHkh0n+P2OetOskDSOMBmHbJSAlL+D2wT50x+tN7IW21yVXfES5QPT4 ++xGxT8HZJx4gcduq8vd6VHAyWKVwfiuQAAAMEA8CVYe3Cx6eqTPCmCI5FZQ7/47PtpVWOX +olQjrUSALpagBdELXPnn+I4SE0XLcaXC0i0FyNTE8Qj8GYAEdcqvA3ZJweS04//NH4ZoHl +V/zunLVdLLoAAdkKY1Vi487vOxUDfPS3NaYXjoMBaK2SmqPgj2T6ERcmk9WYeMpQ1Wog0n +I7vjiCb2DETxUhAcQPHsztBnKoHBu623VPyK0ghD48+BbkmUMhEj6YXaokHDVHM0mElZmj +IdReKr9R/kNUXlAAAAAAEC +-----END OPENSSH PRIVATE KEY----- diff --git a/ssh/ssh_host_rsa_key.pub b/ssh/ssh_host_rsa_key.pub new file mode 100644 index 0000000..7277ffe --- /dev/null +++ b/ssh/ssh_host_rsa_key.pub @@ -0,0 +1 @@ +ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC31qfv8mlJ6lgJrkI/GoGxsXlFd5Br9EthDr1n0iaZETXWnmQonhSaMdUBtzNm2ypEf3z9G7kED4F11BnvBB0r4maoWBxJpmZSoiEvWhhwJMFxpHhzEOXr9ozP474H5OXY/NpagkSps0eqSiS6FNAxNRQ7TvipH9IwTNsPqkYGoX/dDVXZmYkPhgnFkQniNp38Qltd9AWfaNVZJbQvm+0coAO53MhDix8aCkzpZ64z7R9mnjfYXHBiiDQkVpJryCPNPc/GjDHbaG7YACtBAhA9zB78J2Z4B5v/bwREYATKpqXyWztbvhDzpUREgAjt6JX7+7+1LIUn/G3DRl6QyZtAHoSQKHpQiqMO8/6qZd70JfZ1UvrdCcUfvBLD6uPSSA9FcrWuiSYhB9+5xnhMRG6707k5cTEaM84C73rz3zJqVD84xiPHn2uVAmzAZevxThLFn1KCni0nEzZ4seDGeHeuLJr30LXwoVZBpGxVzksS4b8bcDU1qS5mM5hqKq52rH0= diff --git a/ssh/sshd_config b/ssh/sshd_config new file mode 100644 index 0000000..e1824ee --- /dev/null +++ b/ssh/sshd_config @@ -0,0 +1,131 @@ +# $OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $ + +# This is the sshd server system-wide configuration file. See +# sshd_config(5) for more information. + +# This sshd was compiled with PATH=/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin + +# The strategy used for options in the default sshd_config shipped with +# OpenSSH is to specify options with their default value where +# possible, but leave them commented. Uncommented options override the +# default value. + +# To modify the system-wide sshd configuration, create a *.conf file under +# /etc/ssh/sshd_config.d/ which will be automatically included below +Include /etc/ssh/sshd_config.d/*.conf + +# If you want to change the port on a SELinux system, you have to tell +# SELinux about this change. +# semanage port -a -t ssh_port_t -p tcp #PORTNUMBER +# +#Port 22 +#AddressFamily any +#ListenAddress 0.0.0.0 +#ListenAddress :: + +#HostKey /etc/ssh/ssh_host_rsa_key +#HostKey /etc/ssh/ssh_host_ecdsa_key +#HostKey /etc/ssh/ssh_host_ed25519_key + +# Ciphers and keying +#RekeyLimit default none + +# Logging +#SyslogFacility AUTH +#LogLevel INFO + +# Authentication: + +#LoginGraceTime 2m +PermitRootLogin prohibit-password +#StrictModes yes +#MaxAuthTries 6 +#MaxSessions 10 + +#PubkeyAuthentication yes + +# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 +# but this is overridden so installations will only check .ssh/authorized_keys +AuthorizedKeysFile .ssh/authorized_keys + +#AuthorizedPrincipalsFile none + +#AuthorizedKeysCommand none +#AuthorizedKeysCommandUser nobody + +# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts +#HostbasedAuthentication no +# Change to yes if you don't trust ~/.ssh/known_hosts for +# HostbasedAuthentication +#IgnoreUserKnownHosts no +# Don't read the user's ~/.rhosts and ~/.shosts files +#IgnoreRhosts yes + +# To disable tunneled clear text passwords, change to no here! +#PasswordAuthentication yes +PasswordAuthentication no +#PermitEmptyPasswords no + +# Change to no to disable s/key passwords +#KbdInteractiveAuthentication yes + +# Kerberos options +#KerberosAuthentication no +#KerberosOrLocalPasswd yes +#KerberosTicketCleanup yes +#KerberosGetAFSToken no +#KerberosUseKuserok yes + +# GSSAPI options +#GSSAPIAuthentication no +#GSSAPICleanupCredentials yes +#GSSAPIStrictAcceptorCheck yes +#GSSAPIKeyExchange no +#GSSAPIEnablek5users no + +# Set this to 'yes' to enable PAM authentication, account processing, +# and session processing. If this is enabled, PAM authentication will +# be allowed through the KbdInteractiveAuthentication and +# PasswordAuthentication. Depending on your PAM configuration, +# PAM authentication via KbdInteractiveAuthentication may bypass +# the setting of "PermitRootLogin without-password". +# If you just want the PAM account and session checks to run without +# PAM authentication, then enable this but set PasswordAuthentication +# and KbdInteractiveAuthentication to 'no'. +# WARNING: 'UsePAM no' is not supported in Fedora and may cause several +# problems. +#UsePAM no + +#AllowAgentForwarding yes +#AllowTcpForwarding yes +#GatewayPorts no +#X11Forwarding no +#X11DisplayOffset 10 +#X11UseLocalhost yes +#PermitTTY yes +#PrintMotd yes +#PrintLastLog yes +#TCPKeepAlive yes +#PermitUserEnvironment no +#Compression delayed +#ClientAliveInterval 0 +#ClientAliveCountMax 3 +#UseDNS no +#PidFile /var/run/sshd.pid +#MaxStartups 10:30:100 +#PermitTunnel no +#ChrootDirectory none +#VersionAddendum none + +# no default banner path +#Banner none + +# override default of no subsystems +Subsystem sftp /usr/libexec/openssh/sftp-server + +# Example of overriding settings on a per-user basis +#Match User anoncvs +# X11Forwarding no +# AllowTcpForwarding no +# PermitTTY no +# ForceCommand cvs server diff --git a/ssh/sshd_config.d/01-permitrootlogin.conf b/ssh/sshd_config.d/01-permitrootlogin.conf new file mode 100644 index 0000000..edbab6f --- /dev/null +++ b/ssh/sshd_config.d/01-permitrootlogin.conf @@ -0,0 +1,3 @@ +# This file has been generated by the Anaconda Installer. +# Allow root to log in using ssh. Remove this file to opt-out. +PermitRootLogin yes diff --git a/ssh/sshd_config.d/50-redhat.conf b/ssh/sshd_config.d/50-redhat.conf new file mode 100644 index 0000000..e7f7c00 --- /dev/null +++ b/ssh/sshd_config.d/50-redhat.conf @@ -0,0 +1,22 @@ +# This system is following system-wide crypto policy. The changes to +# crypto properties (Ciphers, MACs, ...) will not have any effect in +# this or following included files. To override some configuration option, +# write it before this block or include it before this file. +# Please, see manual pages for update-crypto-policies(8) and sshd_config(5). +Include /etc/crypto-policies/back-ends/opensshserver.config + +SyslogFacility AUTHPRIV + +ChallengeResponseAuthentication no + +GSSAPIAuthentication yes +GSSAPICleanupCredentials no + +UsePAM yes + +X11Forwarding yes + +# It is recommended to use pam_motd in /etc/pam.d/sshd instead of PrintMotd, +# as it is more configurable and versatile than the built-in version. +PrintMotd no + diff --git a/ssh/sshd_config.rpmnew b/ssh/sshd_config.rpmnew new file mode 100644 index 0000000..6240f99 --- /dev/null +++ b/ssh/sshd_config.rpmnew @@ -0,0 +1,130 @@ +# $OpenBSD: sshd_config,v 1.104 2021/07/02 05:11:21 dtucker Exp $ + +# This is the sshd server system-wide configuration file. See +# sshd_config(5) for more information. + +# This sshd was compiled with PATH=/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin + +# The strategy used for options in the default sshd_config shipped with +# OpenSSH is to specify options with their default value where +# possible, but leave them commented. Uncommented options override the +# default value. + +# To modify the system-wide sshd configuration, create a *.conf file under +# /etc/ssh/sshd_config.d/ which will be automatically included below +Include /etc/ssh/sshd_config.d/*.conf + +# If you want to change the port on a SELinux system, you have to tell +# SELinux about this change. +# semanage port -a -t ssh_port_t -p tcp #PORTNUMBER +# +#Port 22 +#AddressFamily any +#ListenAddress 0.0.0.0 +#ListenAddress :: + +#HostKey /etc/ssh/ssh_host_rsa_key +#HostKey /etc/ssh/ssh_host_ecdsa_key +#HostKey /etc/ssh/ssh_host_ed25519_key + +# Ciphers and keying +#RekeyLimit default none + +# Logging +#SyslogFacility AUTH +#LogLevel INFO + +# Authentication: + +#LoginGraceTime 2m +#PermitRootLogin prohibit-password +#StrictModes yes +#MaxAuthTries 6 +#MaxSessions 10 + +#PubkeyAuthentication yes + +# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 +# but this is overridden so installations will only check .ssh/authorized_keys +AuthorizedKeysFile .ssh/authorized_keys + +#AuthorizedPrincipalsFile none + +#AuthorizedKeysCommand none +#AuthorizedKeysCommandUser nobody + +# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts +#HostbasedAuthentication no +# Change to yes if you don't trust ~/.ssh/known_hosts for +# HostbasedAuthentication +#IgnoreUserKnownHosts no +# Don't read the user's ~/.rhosts and ~/.shosts files +#IgnoreRhosts yes + +# To disable tunneled clear text passwords, change to no here! +#PasswordAuthentication yes +#PermitEmptyPasswords no + +# Change to no to disable s/key passwords +#KbdInteractiveAuthentication yes + +# Kerberos options +#KerberosAuthentication no +#KerberosOrLocalPasswd yes +#KerberosTicketCleanup yes +#KerberosGetAFSToken no +#KerberosUseKuserok yes + +# GSSAPI options +#GSSAPIAuthentication no +#GSSAPICleanupCredentials yes +#GSSAPIStrictAcceptorCheck yes +#GSSAPIKeyExchange no +#GSSAPIEnablek5users no + +# Set this to 'yes' to enable PAM authentication, account processing, +# and session processing. If this is enabled, PAM authentication will +# be allowed through the KbdInteractiveAuthentication and +# PasswordAuthentication. Depending on your PAM configuration, +# PAM authentication via KbdInteractiveAuthentication may bypass +# the setting of "PermitRootLogin without-password". +# If you just want the PAM account and session checks to run without +# PAM authentication, then enable this but set PasswordAuthentication +# and KbdInteractiveAuthentication to 'no'. +# WARNING: 'UsePAM no' is not supported in RHEL and may cause several +# problems. +#UsePAM no + +#AllowAgentForwarding yes +#AllowTcpForwarding yes +#GatewayPorts no +#X11Forwarding no +#X11DisplayOffset 10 +#X11UseLocalhost yes +#PermitTTY yes +#PrintMotd yes +#PrintLastLog yes +#TCPKeepAlive yes +#PermitUserEnvironment no +#Compression delayed +#ClientAliveInterval 0 +#ClientAliveCountMax 3 +#UseDNS no +#PidFile /var/run/sshd.pid +#MaxStartups 10:30:100 +#PermitTunnel no +#ChrootDirectory none +#VersionAddendum none + +# no default banner path +#Banner none + +# override default of no subsystems +Subsystem sftp /usr/libexec/openssh/sftp-server + +# Example of overriding settings on a per-user basis +#Match User anoncvs +# X11Forwarding no +# AllowTcpForwarding no +# PermitTTY no +# ForceCommand cvs server diff --git a/ssl/cert.pem b/ssl/cert.pem new file mode 120000 index 0000000..6f3a038 --- /dev/null +++ b/ssl/cert.pem @@ -0,0 +1 @@ +/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem \ No newline at end of file diff --git a/ssl/certs b/ssl/certs new file mode 120000 index 0000000..a9755ed --- /dev/null +++ b/ssl/certs @@ -0,0 +1 @@ +/etc/pki/tls/certs \ No newline at end of file diff --git a/ssl/ct_log_list.cnf b/ssl/ct_log_list.cnf new file mode 120000 index 0000000..40e628f --- /dev/null +++ b/ssl/ct_log_list.cnf @@ -0,0 +1 @@ +/etc/pki/tls/ct_log_list.cnf \ No newline at end of file diff --git a/ssl/openssl.cnf b/ssl/openssl.cnf new file mode 120000 index 0000000..b2aada8 --- /dev/null +++ b/ssl/openssl.cnf @@ -0,0 +1 @@ +/etc/pki/tls/openssl.cnf \ No newline at end of file diff --git a/subgid b/subgid new file mode 100644 index 0000000..f1ee3c1 --- /dev/null +++ b/subgid @@ -0,0 +1 @@ +frank:100000:65536 diff --git a/subgid- b/subgid- new file mode 100644 index 0000000..e69de29 diff --git a/subuid b/subuid new file mode 100644 index 0000000..f1ee3c1 --- /dev/null +++ b/subuid @@ -0,0 +1 @@ +frank:100000:65536 diff --git a/subuid- b/subuid- new file mode 100644 index 0000000..e69de29 diff --git a/sudo-ldap.conf b/sudo-ldap.conf new file mode 100644 index 0000000..d8f8e4d --- /dev/null +++ b/sudo-ldap.conf @@ -0,0 +1,86 @@ +## BINDDN DN +## The BINDDN parameter specifies the identity, in the form of a Dis‐ +## tinguished Name (DN), to use when performing LDAP operations. If +## not specified, LDAP operations are performed with an anonymous +## identity. By default, most LDAP servers will allow anonymous +## access. +## +#binddn uid=sudo,cn=sysaccounts,cn=etc,dc=example,dc=com + +## BINDPW secret +## The BINDPW parameter specifies the password to use when performing +## LDAP operations. This is typically used in conjunction with the +## BINDDN parameter. +## +#bindpw secret + +## SSL start_tls +## If the SSL parameter is set to start_tls, the LDAP server connec‐ +## tion is initiated normally and TLS encryption is begun before the +## bind credentials are sent. This has the advantage of not requiring +## a dedicated port for encrypted communications. This parameter is +## only supported by LDAP servers that honor the start_tls extension, +## such as the OpenLDAP and Tivoli Directory servers. +## +#ssl start_tls + +## TLS_CACERTFILE file name +## The path to a certificate authority bundle which contains the cer‐ +## tificates for all the Certificate Authorities the client knows to +## be valid, e.g. /etc/ssl/ca-bundle.pem. This option is only sup‐ +## ported by the OpenLDAP libraries. Netscape-derived LDAP libraries +## use the same certificate database for CA and client certificates +## (see TLS_CERT). +## +#tls_cacertfile /path/to/CA.crt + +## TLS_CHECKPEER on/true/yes/off/false/no +## If enabled, TLS_CHECKPEER will cause the LDAP server's TLS certifi‐ +## cated to be verified. If the server's TLS certificate cannot be +## verified (usually because it is signed by an unknown certificate +## authority), sudo will be unable to connect to it. If TLS_CHECKPEER +## is disabled, no check is made. Note that disabling the check cre‐ +## ates an opportunity for man-in-the-middle attacks since the +## server's identity will not be authenticated. If possible, the CA's +## certificate should be installed locally so it can be verified. +## This option is not supported by the Tivoli Directory Server LDAP +## libraries. +#tls_checkpeer yes + +## +## URI ldap[s]://[hostname[:port]] ... +## Specifies a whitespace-delimited list of one or more +## URIs describing the LDAP server(s) to connect to. +## +#uri ldap://ldapserver + +## +## SUDOERS_BASE base +## The base DN to use when performing sudo LDAP queries. +## Multiple SUDOERS_BASE lines may be specified, in which +## case they are queried in the order specified. +## +#sudoers_base ou=SUDOers,dc=example,dc=com + +## +## BIND_TIMELIMIT seconds +## The BIND_TIMELIMIT parameter specifies the amount of +## time to wait while trying to connect to an LDAP server. +## +#bind_timelimit 30 + +## +## TIMELIMIT seconds +## The TIMELIMIT parameter specifies the amount of time +## to wait for a response to an LDAP query. +## +#timelimit 30 + +## +## SUDOERS_DEBUG debug_level +## This sets the debug level for sudo LDAP queries. Debugging +## information is printed to the standard error. A value of 1 +## results in a moderate amount of debugging information. +## A value of 2 shows the results of the matches themselves. +## +#sudoers_debug 1 diff --git a/sudo.conf b/sudo.conf new file mode 100644 index 0000000..27ccc72 --- /dev/null +++ b/sudo.conf @@ -0,0 +1,124 @@ +# +# Default /etc/sudo.conf file +# +# Sudo plugins: +# Plugin plugin_name plugin_path plugin_options ... +# +# The plugin_path is relative to /usr/libexec/sudo unless +# fully qualified. +# The plugin_name corresponds to a global symbol in the plugin +# that contains the plugin interface structure. +# The plugin_options are optional. +# +# The sudoers plugin is used by default if no Plugin lines are present. +Plugin sudoers_policy sudoers.so +Plugin sudoers_io sudoers.so +Plugin sudoers_audit sudoers.so + +# +# Sudo askpass: +# Path askpass /path/to/askpass +# +# An askpass helper program may be specified to provide a graphical +# password prompt for "sudo -A" support. Sudo does not ship with its +# own askpass program but can use the OpenSSH askpass. +# +# Use the OpenSSH askpass +#Path askpass /usr/X11R6/bin/ssh-askpass +# +# Use the Gnome OpenSSH askpass +#Path askpass /usr/libexec/openssh/gnome-ssh-askpass + +# +# Sudo device search path: +# Path devsearch /dev/path1:/dev/path2:/dev +# +# A colon-separated list of paths to check when searching for a user's +# terminal device. +# +#Path devsearch /dev/pts:/dev/vt:/dev/term:/dev/zcons:/dev/pty:/dev + +# +# Sudo noexec: +# Path noexec /path/to/sudo_noexec.so +# +# Path to a shared library containing replacements for the execv(), +# execve() and fexecve() library functions that just return an error. +# This is used to implement the "noexec" functionality on systems that +# support LD_PRELOAD or its equivalent. +# +# The compiled-in value is usually sufficient and should only be changed +# if you rename or move the sudo_noexec.so file. +# +#Path noexec /usr/libexec/sudo/sudo_noexec.so + +# +# Sudo plugin directory: +# Path plugin_dir /path/to/plugins +# +# The default directory to use when searching for plugins that are +# specified without a fully qualified path name. +# +#Path plugin_dir /usr/libexec/sudo + +# +# Sudo developer mode: +# Set developer_mode true|false +# +# Allow loading of plugins that are owned by non-root or are writable +# by "group" or "other". Should only be used during plugin development. +#Set developer_mode true + +# +# Core dumps: +# Set disable_coredump true|false +# +# By default, sudo disables core dumps while it is executing (they +# are re-enabled for the command that is run). +# To aid in debugging sudo problems, you may wish to enable core +# dumps by setting "disable_coredump" to false. +# +Set disable_coredump false + +# +# User groups: +# Set group_source static|dynamic|adaptive +# +# Sudo passes the user's group list to the policy plugin. +# If the user is a member of the maximum number of groups (usually 16), +# sudo will query the group database directly to be sure to include +# the full list of groups. +# +# On some systems, this can be expensive so the behavior is configurable. +# The "group_source" setting has three possible values: +# static - use the user's list of groups returned by the kernel. +# dynamic - query the group database to find the list of groups. +# adaptive - if user is in less than the maximum number of groups. +# use the kernel list, else query the group database. +# +#Set group_source static + +# +# Sudo interface probing: +# Set probe_interfaces true|false +# +# By default, sudo will probe the system's network interfaces and +# pass the IP address of each enabled interface to the policy plugin. +# On systems with a large number of virtual interfaces this may take +# a noticeable amount of time. +# +#Set probe_interfaces false + +# +# Sudo debug files: +# Debug program /path/to/debug_log subsystem@priority[,subsyste@priority] +# +# Sudo and related programs support logging debug information to a file. +# The program is typically sudo, sudoers.so, sudoreplay or visudo. +# +# Subsystems vary based on the program; "all" matches all subsystems. +# Priority may be crit, err, warn, notice, diag, info, trace or debug. +# Multiple subsystem@priority may be specified, separated by a comma. +# +#Debug sudo /var/log/sudo_debug all@debug +#Debug sudoers.so /var/log/sudoers_debug all@debug diff --git a/sudoers b/sudoers new file mode 100644 index 0000000..e847331 --- /dev/null +++ b/sudoers @@ -0,0 +1,120 @@ +## Sudoers allows particular users to run various commands as +## the root user, without needing the root password. +## +## Examples are provided at the bottom of the file for collections +## of related commands, which can then be delegated out to particular +## users or groups. +## +## This file must be edited with the 'visudo' command. + +## Host Aliases +## Groups of machines. You may prefer to use hostnames (perhaps using +## wildcards for entire domains) or IP addresses instead. +# Host_Alias FILESERVERS = fs1, fs2 +# Host_Alias MAILSERVERS = smtp, smtp2 + +## User Aliases +## These aren't often necessary, as you can use regular groups +## (ie, from files, LDAP, NIS, etc) in this file - just use %groupname +## rather than USERALIAS +# User_Alias ADMINS = jsmith, mikem + + +## Command Aliases +## These are groups of related commands... + +## Networking +# Cmnd_Alias NETWORKING = /sbin/route, /sbin/ifconfig, /bin/ping, /sbin/dhclient, /usr/bin/net, /sbin/iptables, /usr/bin/rfcomm, /usr/bin/wvdial, /sbin/iwconfig, /sbin/mii-tool + +## Installation and management of software +# Cmnd_Alias SOFTWARE = /bin/rpm, /usr/bin/up2date, /usr/bin/yum + +## Services +# Cmnd_Alias SERVICES = /sbin/service, /sbin/chkconfig, /usr/bin/systemctl start, /usr/bin/systemctl stop, /usr/bin/systemctl reload, /usr/bin/systemctl restart, /usr/bin/systemctl status, /usr/bin/systemctl enable, /usr/bin/systemctl disable + +## Updating the locate database +# Cmnd_Alias LOCATE = /usr/bin/updatedb + +## Storage +# Cmnd_Alias STORAGE = /sbin/fdisk, /sbin/sfdisk, /sbin/parted, /sbin/partprobe, /bin/mount, /bin/umount + +## Delegating permissions +# Cmnd_Alias DELEGATING = /usr/sbin/visudo, /bin/chown, /bin/chmod, /bin/chgrp + +## Processes +# Cmnd_Alias PROCESSES = /bin/nice, /bin/kill, /usr/bin/kill, /usr/bin/killall + +## Drivers +# Cmnd_Alias DRIVERS = /sbin/modprobe + +# Defaults specification + +# +# Refuse to run if unable to disable echo on the tty. +# +Defaults !visiblepw + +# +# Preserving HOME has security implications since many programs +# use it when searching for configuration files. Note that HOME +# is already set when the the env_reset option is enabled, so +# this option is only effective for configurations where either +# env_reset is disabled or HOME is present in the env_keep list. +# +Defaults always_set_home +Defaults match_group_by_gid + +# Prior to version 1.8.15, groups listed in sudoers that were not +# found in the system group database were passed to the group +# plugin, if any. Starting with 1.8.15, only groups of the form +# %:group are resolved via the group plugin by default. +# We enable always_query_group_plugin to restore old behavior. +# Disable this option for new behavior. +Defaults always_query_group_plugin + +Defaults env_reset +Defaults env_keep = "COLORS DISPLAY HOSTNAME HISTSIZE KDEDIR LS_COLORS" +Defaults env_keep += "MAIL PS1 PS2 QTDIR USERNAME LANG LC_ADDRESS LC_CTYPE" +Defaults env_keep += "LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES" +Defaults env_keep += "LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE" +Defaults env_keep += "LC_TIME LC_ALL LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY" + +# +# Adding HOME to env_keep may enable a user to run unrestricted +# commands via sudo. +# +# Defaults env_keep += "HOME" + +Defaults secure_path = /sbin:/bin:/usr/sbin:/usr/bin + +## Next comes the main part: which users can run what software on +## which machines (the sudoers file can be shared between multiple +## systems). +## Syntax: +## +## user MACHINE=COMMANDS +## +## The COMMANDS section may have other options added to it. +## +## Allow root to run any commands anywhere +root ALL=(ALL) ALL + +## Allows members of the 'sys' group to run networking, software, +## service management apps and more. +# %sys ALL = NETWORKING, SOFTWARE, SERVICES, STORAGE, DELEGATING, PROCESSES, LOCATE, DRIVERS + +## Allows people in group wheel to run all commands +# %wheel ALL=(ALL) ALL + +## Same thing without a password +%wheel ALL=(ALL) NOPASSWD: ALL + +## Allows members of the users group to mount and unmount the +## cdrom as root +# %users ALL=/sbin/mount /mnt/cdrom, /sbin/umount /mnt/cdrom + +## Allows members of the users group to shutdown this system +# %users localhost=/sbin/shutdown -h now + +## Read drop-in files from /etc/sudoers.d (the # here does not mean a comment) +#includedir /etc/sudoers.d diff --git a/sysconfig/anaconda b/sysconfig/anaconda new file mode 100644 index 0000000..5132562 --- /dev/null +++ b/sysconfig/anaconda @@ -0,0 +1,5 @@ +# This file has been generated by the Anaconda Installer 34.25.0.29 + +[General] +post_install_tools_disabled = 0 + diff --git a/sysconfig/chronyd b/sysconfig/chronyd new file mode 100644 index 0000000..31daf6d --- /dev/null +++ b/sysconfig/chronyd @@ -0,0 +1,2 @@ +# Command-line options for chronyd +OPTIONS="-F 2" diff --git a/sysconfig/cpupower b/sysconfig/cpupower new file mode 100644 index 0000000..8629a4a --- /dev/null +++ b/sysconfig/cpupower @@ -0,0 +1,3 @@ +# See 'cpupower help' and cpupower(1) for more info +CPUPOWER_START_OPTS="frequency-set -g performance" +CPUPOWER_STOP_OPTS="frequency-set -g ondemand" diff --git a/sysconfig/crond b/sysconfig/crond new file mode 100644 index 0000000..ee23703 --- /dev/null +++ b/sysconfig/crond @@ -0,0 +1,3 @@ +# Settings for the CRON daemon. +# CRONDARGS= : any extra command-line startup arguments for crond +CRONDARGS= diff --git a/sysconfig/firewalld b/sysconfig/firewalld new file mode 100644 index 0000000..08196b9 --- /dev/null +++ b/sysconfig/firewalld @@ -0,0 +1,3 @@ +# firewalld command line args +# possible values: --debug +FIREWALLD_ARGS= diff --git a/sysconfig/irqbalance b/sysconfig/irqbalance new file mode 100644 index 0000000..96acb39 --- /dev/null +++ b/sysconfig/irqbalance @@ -0,0 +1,44 @@ +# irqbalance is a daemon process that distributes interrupts across +# CPUs on SMP systems. The default is to rebalance once every 10 +# seconds. This is the environment file that is specified to systemd via the +# EnvironmentFile key in the service unit file (or via whatever method the init +# system you're using has). + +# +# IRQBALANCE_ONESHOT +# After starting, wait for ten seconds, then look at the interrupt +# load and balance it once; after balancing exit and do not change +# it again. +# +#IRQBALANCE_ONESHOT= + +# +# IRQBALANCE_BANNED_CPUS +# 64 bit bitmask which allows you to indicate which CPUs should +# be skipped when reblancing IRQs. CPU numbers which have their +# corresponding bits set to one in this mask will not have any +# IRQs assigned to them on rebalance. +# +#IRQBALANCE_BANNED_CPUS= + +# +# IRQBALANCE_BANNED_CPULIST +# The CPUs list which allows you to indicate which CPUs should +# be skipped when reblancing IRQs. CPU numbers in CPUs list will +# not have any IRQs assigned to them on rebalance. +# +# The format of CPUs list is: +# ,..., +# or a range: +# - +# or a mixture: +# ,...,- +# +#IRQBALANCE_BANNED_CPULIST= + +# +# IRQBALANCE_ARGS +# Append any args here to the irqbalance daemon as documented in the man +# page. +# +#IRQBALANCE_ARGS= diff --git a/sysconfig/kdump b/sysconfig/kdump new file mode 100644 index 0000000..09d7350 --- /dev/null +++ b/sysconfig/kdump @@ -0,0 +1,56 @@ +# Kernel Version string for the -kdump kernel, such as 2.6.13-1544.FC5kdump +# If no version is specified, then the init script will try to find a +# kdump kernel with the same version number as the running kernel. +KDUMP_KERNELVER="" + +# The kdump commandline is the command line that needs to be passed off to +# the kdump kernel. This will likely match the contents of the grub kernel +# line. For example: +# KDUMP_COMMANDLINE="ro root=LABEL=/" +# Dracut depends on proper root= options, so please make sure that appropriate +# root= options are copied from /proc/cmdline. In general it is best to append +# command line options using "KDUMP_COMMANDLINE_APPEND=". +# If a command line is not specified, the default will be taken from +# /proc/cmdline +KDUMP_COMMANDLINE="" + +# This variable lets us remove arguments from the current kdump commandline +# as taken from either KDUMP_COMMANDLINE above, or from /proc/cmdline +# NOTE: some arguments such as crashkernel will always be removed +KDUMP_COMMANDLINE_REMOVE="hugepages hugepagesz slub_debug quiet log_buf_len swiotlb cma hugetlb_cma ignition.firstboot" + +# This variable lets us append arguments to the current kdump commandline +# after processed by KDUMP_COMMANDLINE_REMOVE +KDUMP_COMMANDLINE_APPEND="irqpoll nr_cpus=1 reset_devices cgroup_disable=memory mce=off numa=off udev.children-max=2 panic=10 acpi_no_memhotplug transparent_hugepage=never nokaslr hest_disable novmcoredd cma=0 hugetlb_cma=0 pcie_ports=compat" + +# Any additional kexec arguments required. In most situations, this should +# be left empty +# +# Example: +# KEXEC_ARGS="--elf32-core-headers" +KEXEC_ARGS="-s" + +#Where to find the boot image +#KDUMP_BOOTDIR="/boot" + +#What is the image type used for kdump +KDUMP_IMG="vmlinuz" + +#What is the images extension. Relocatable kernels don't have one +KDUMP_IMG_EXT="" + +# Logging is controlled by following variables in the first kernel: +# - @var KDUMP_STDLOGLVL - logging level to standard error (console output) +# - @var KDUMP_SYSLOGLVL - logging level to syslog (by logger command) +# - @var KDUMP_KMSGLOGLVL - logging level to /dev/kmsg (only for boot-time) +# +# In the second kernel, kdump will use the rd.kdumploglvl option to set the +# log level in the above KDUMP_COMMANDLINE_APPEND. +# - @var rd.kdumploglvl - logging level to syslog (by logger command) +# - for example: add the rd.kdumploglvl=3 option to KDUMP_COMMANDLINE_APPEND +# +# Logging levels: no logging(0), error(1),warn(2),info(3),debug(4) +# +# KDUMP_STDLOGLVL=3 +# KDUMP_SYSLOGLVL=0 +# KDUMP_KMSGLOGLVL=0 diff --git a/sysconfig/kernel b/sysconfig/kernel new file mode 100644 index 0000000..8da1970 --- /dev/null +++ b/sysconfig/kernel @@ -0,0 +1,6 @@ +# UPDATEDEFAULT specifies if kernel-install should make +# new kernels the default +UPDATEDEFAULT=yes + +# DEFAULTKERNEL specifies the default kernel package type +DEFAULTKERNEL=kernel-core diff --git a/sysconfig/man-db b/sysconfig/man-db new file mode 100644 index 0000000..e7449df --- /dev/null +++ b/sysconfig/man-db @@ -0,0 +1,10 @@ +# Set this to "no" to disable man-db update triggered by installation +# of any package containing manual pages +SERVICE="yes" + +# Set this to "no" to disable daily man-db update run by +# /etc/cron.daily/man-db.cron +CRON="yes" + +# Options used by mandb, we use "-q" as default, too much noise without it +OPTS="-q" diff --git a/sysconfig/network b/sysconfig/network new file mode 100644 index 0000000..0dc1c0e --- /dev/null +++ b/sysconfig/network @@ -0,0 +1 @@ +# Created by anaconda diff --git a/sysconfig/network-scripts/readme-ifcfg-rh.txt b/sysconfig/network-scripts/readme-ifcfg-rh.txt new file mode 100644 index 0000000..b69a681 --- /dev/null +++ b/sysconfig/network-scripts/readme-ifcfg-rh.txt @@ -0,0 +1,31 @@ +NetworkManager stores new network profiles in keyfile format in the +/etc/NetworkManager/system-connections/ directory. + +Previously, NetworkManager stored network profiles in ifcfg format +in this directory (/etc/sysconfig/network-scripts/). However, the ifcfg +format is deprecated. By default, NetworkManager no longer creates +new profiles in this format. + +Connection profiles in keyfile format have many benefits. For example, +this format is INI file-based and can easily be parsed and generated. + +Each section in NetworkManager keyfiles corresponds to a NetworkManager +setting name as described in the nm-settings(5) and nm-settings-keyfile(5) +man pages. Each key-value-pair in a section is one of the properties +listed in the settings specification of the man page. + +If you still use network profiles in ifcfg format, consider migrating +them to keyfile format. To migrate all profiles at once, enter: + +# nmcli connection migrate + +This command migrates all profiles from ifcfg format to keyfile +format and stores them in /etc/NetworkManager/system-connections/. + +Alternatively, to migrate only a specific profile, enter: + +# nmcli connection migrate + +For further details, see: +* nm-settings-keyfile(5) +* nmcli(1) diff --git a/sysconfig/nftables.conf b/sysconfig/nftables.conf new file mode 100644 index 0000000..c3d9649 --- /dev/null +++ b/sysconfig/nftables.conf @@ -0,0 +1,8 @@ +# Uncomment the include statement here to load the default config sample +# in /etc/nftables for nftables service. + +#include "/etc/nftables/main.nft" + +# To customize, either edit the samples in /etc/nftables, append further +# commands to the end of this file or overwrite it after first service +# start by calling: 'nft list ruleset >/etc/sysconfig/nftables.conf'. diff --git a/sysconfig/rpcbind b/sysconfig/rpcbind new file mode 100644 index 0000000..4b35e37 --- /dev/null +++ b/sysconfig/rpcbind @@ -0,0 +1,3 @@ +# +# Optional arguments passed to rpcbind. See rpcbind(8) +RPCBIND_ARGS="" diff --git a/sysconfig/rsyslog b/sysconfig/rsyslog new file mode 100644 index 0000000..bc65731 --- /dev/null +++ b/sysconfig/rsyslog @@ -0,0 +1,5 @@ +# Options for rsyslogd +# Syslogd options are deprecated since rsyslog v3. +# If you want to use them, switch to compatibility mode 2 by "-c 2" +# See rsyslogd(8) for more details +SYSLOGD_OPTIONS="" diff --git a/sysconfig/run-parts b/sysconfig/run-parts new file mode 100644 index 0000000..e69de29 diff --git a/sysconfig/selinux b/sysconfig/selinux new file mode 120000 index 0000000..a373e2e --- /dev/null +++ b/sysconfig/selinux @@ -0,0 +1 @@ +../selinux/config \ No newline at end of file diff --git a/sysconfig/sshd b/sysconfig/sshd new file mode 100644 index 0000000..ee44ae6 --- /dev/null +++ b/sysconfig/sshd @@ -0,0 +1,10 @@ +# Configuration file for the sshd service. + +# The server keys are automatically generated if they are missing. +# To change the automatic creation, adjust sshd.service options for +# example using systemctl enable sshd-keygen@dsa.service to allow creation +# of DSA key or systemctl mask sshd-keygen@rsa.service to disable RSA key +# creation. + +#SSH_RSA_BITS=3072 +#SSH_ECDSA_BITS=256 diff --git a/sysctl.conf b/sysctl.conf new file mode 100644 index 0000000..41c0c41 --- /dev/null +++ b/sysctl.conf @@ -0,0 +1,10 @@ +# sysctl settings are defined through files in +# /usr/lib/sysctl.d/, /run/sysctl.d/, and /etc/sysctl.d/. +# +# Vendors settings live in /usr/lib/sysctl.d/. +# To override a whole file, create a new file with the same in +# /etc/sysctl.d/ and put new settings there. To override +# only specific settings, add a file with a lexically later +# name in /etc/sysctl.d/ and put new settings there. +# +# For more information, see sysctl.conf(5) and sysctl.d(5). diff --git a/sysctl.d/99-sysctl.conf b/sysctl.d/99-sysctl.conf new file mode 120000 index 0000000..2b0036b --- /dev/null +++ b/sysctl.d/99-sysctl.conf @@ -0,0 +1 @@ +../sysctl.conf \ No newline at end of file diff --git a/system-release b/system-release new file mode 120000 index 0000000..780b78a --- /dev/null +++ b/system-release @@ -0,0 +1 @@ +rocky-release \ No newline at end of file diff --git a/system-release-cpe b/system-release-cpe new file mode 100644 index 0000000..c5c8e62 --- /dev/null +++ b/system-release-cpe @@ -0,0 +1 @@ +cpe:/o:rocky:rocky:9::baseos diff --git a/systemd/coredump.conf b/systemd/coredump.conf new file mode 100644 index 0000000..b934c2a --- /dev/null +++ b/systemd/coredump.conf @@ -0,0 +1,24 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the coredump.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# Use 'systemd-analyze cat-config systemd/coredump.conf' to display the full config. +# +# See coredump.conf(5) for details. + +[Coredump] +#Storage=external +#Compress=yes +ProcessSizeMax=1G +ExternalSizeMax=1G +#JournalSizeMax=767M +#MaxUse= +#KeepFree= diff --git a/systemd/journald.conf b/systemd/journald.conf new file mode 100644 index 0000000..3544da2 --- /dev/null +++ b/systemd/journald.conf @@ -0,0 +1,47 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the journald.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# Use 'systemd-analyze cat-config systemd/journald.conf' to display the full config. +# +# See journald.conf(5) for details. + +[Journal] +#Storage=auto +#Compress=yes +#Seal=yes +#SplitMode=uid +#SyncIntervalSec=5m +#RateLimitIntervalSec=30s +#RateLimitBurst=10000 +#SystemMaxUse= +#SystemKeepFree= +#SystemMaxFileSize= +#SystemMaxFiles=100 +#RuntimeMaxUse= +#RuntimeKeepFree= +#RuntimeMaxFileSize= +#RuntimeMaxFiles=100 +#MaxRetentionSec= +#MaxFileSec=1month +#ForwardToSyslog=no +#ForwardToKMsg=no +#ForwardToConsole=no +#ForwardToWall=yes +#TTYPath=/dev/console +#MaxLevelStore=debug +#MaxLevelSyslog=debug +#MaxLevelKMsg=notice +#MaxLevelConsole=info +#MaxLevelWall=emerg +#LineMax=48K +#ReadKMsg=yes +Audit= diff --git a/systemd/logind.conf b/systemd/logind.conf new file mode 100644 index 0000000..ca6f1ae --- /dev/null +++ b/systemd/logind.conf @@ -0,0 +1,49 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the logind.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# Use 'systemd-analyze cat-config systemd/logind.conf' to display the full config. +# +# See logind.conf(5) for details. + +[Login] +#NAutoVTs=6 +#ReserveVT=6 +#KillUserProcesses=no +#KillOnlyUsers= +#KillExcludeUsers=root +#InhibitDelayMaxSec=5 +#UserStopDelaySec=10 +#HandlePowerKey=poweroff +#HandlePowerKeyLongPress=ignore +#HandleRebootKey=reboot +#HandleRebootKeyLongPress=poweroff +#HandleSuspendKey=suspend +#HandleSuspendKeyLongPress=hibernate +#HandleHibernateKey=hibernate +#HandleHibernateKeyLongPress=ignore +#HandleLidSwitch=suspend +#HandleLidSwitchExternalPower=suspend +#HandleLidSwitchDocked=ignore +#PowerKeyIgnoreInhibited=no +#SuspendKeyIgnoreInhibited=no +#HibernateKeyIgnoreInhibited=no +#LidSwitchIgnoreInhibited=yes +#RebootKeyIgnoreInhibited=no +#HoldoffTimeoutSec=30s +#IdleAction=ignore +#IdleActionSec=30min +#RuntimeDirectorySize=10% +#RuntimeDirectoryInodesMax= +#RemoveIPC=no +#InhibitorsMax=8192 +#SessionsMax=8192 +#StopIdleSessionSec=infinity diff --git a/systemd/networkd.conf b/systemd/networkd.conf new file mode 100644 index 0000000..38dc9f1 --- /dev/null +++ b/systemd/networkd.conf @@ -0,0 +1,28 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the networkd.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# See networkd.conf(5) for details. + +[Network] +#SpeedMeter=no +#SpeedMeterIntervalSec=10sec +#ManageForeignRoutingPolicyRules=yes +#ManageForeignRoutes=yes +#RouteTable= + +[DHCPv4] +#DUIDType=vendor +#DUIDRawData= + +[DHCPv6] +#DUIDType=vendor +#DUIDRawData= diff --git a/systemd/pstore.conf b/systemd/pstore.conf new file mode 100644 index 0000000..68fb04a --- /dev/null +++ b/systemd/pstore.conf @@ -0,0 +1,17 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the pstore.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# See pstore.conf(5) for details. + +[PStore] +#Storage=external +#Unlink=yes diff --git a/systemd/sleep.conf b/systemd/sleep.conf new file mode 100644 index 0000000..4c8e8b9 --- /dev/null +++ b/systemd/sleep.conf @@ -0,0 +1,27 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the sleep.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# See systemd-sleep.conf(5) for details. + +[Sleep] +#AllowSuspend=yes +#AllowHibernation=yes +#AllowSuspendThenHibernate=yes +#AllowHybridSleep=yes +#SuspendMode= +#SuspendState=mem standby freeze +#HibernateMode=platform shutdown +#HibernateState=disk +#HybridSleepMode=suspend platform shutdown +#HybridSleepState=disk +#HibernateDelaySec= +#SuspendEstimationSec=60min diff --git a/systemd/system.conf b/systemd/system.conf new file mode 100644 index 0000000..8fafe91 --- /dev/null +++ b/systemd/system.conf @@ -0,0 +1,77 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the system.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# Use 'systemd-analyze cat-config systemd/system.conf' to display the full config. +# +# See systemd-system.conf(5) for details. + +[Manager] +#LogLevel=info +#LogTarget=journal-or-kmsg +#LogColor=yes +#LogLocation=no +#LogTime=no +#DumpCore=yes +#ShowStatus=yes +#CrashChangeVT=no +#CrashShell=no +#CrashReboot=no +#CtrlAltDelBurstAction=reboot-force +#CPUAffinity= +#NUMAPolicy=default +#NUMAMask= +#RuntimeWatchdogSec=off +#RuntimeWatchdogPreSec=off +#RuntimeWatchdogPreGovernor= +#RebootWatchdogSec=10min +#KExecWatchdogSec=off +#WatchdogDevice= +#CapabilityBoundingSet= +#NoNewPrivileges=no +#SystemCallArchitectures= +#TimerSlackNSec= +#StatusUnitFormat=description +#DefaultTimerAccuracySec=1min +#DefaultStandardOutput=journal +#DefaultStandardError=inherit +#DefaultTimeoutStartSec=90s +#DefaultTimeoutStopSec=90s +#DefaultTimeoutAbortSec= +#DefaultDeviceTimeoutSec=90s +#DefaultRestartSec=100ms +#DefaultStartLimitIntervalSec=10s +#DefaultStartLimitBurst=5 +#DefaultEnvironment= +#DefaultCPUAccounting=no +#DefaultIOAccounting=no +#DefaultIPAccounting=no +#DefaultMemoryAccounting=yes +#DefaultTasksAccounting=yes +#DefaultTasksMax=80% +#DefaultLimitCPU= +#DefaultLimitFSIZE= +#DefaultLimitDATA= +#DefaultLimitSTACK= +#DefaultLimitCORE= +#DefaultLimitRSS= +#DefaultLimitNOFILE=1024:524288 +#DefaultLimitAS= +#DefaultLimitNPROC= +#DefaultLimitMEMLOCK=8M +#DefaultLimitLOCKS= +#DefaultLimitSIGPENDING= +#DefaultLimitMSGQUEUE= +#DefaultLimitNICE= +#DefaultLimitRTPRIO= +#DefaultLimitRTTIME= +#DefaultOOMPolicy=stop +#DefaultSmackProcessLabel= diff --git a/systemd/system/basic.target.wants/microcode.service b/systemd/system/basic.target.wants/microcode.service new file mode 120000 index 0000000..8d0fbe5 --- /dev/null +++ b/systemd/system/basic.target.wants/microcode.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/microcode.service \ No newline at end of file diff --git a/systemd/system/ctrl-alt-del.target b/systemd/system/ctrl-alt-del.target new file mode 120000 index 0000000..220afbb --- /dev/null +++ b/systemd/system/ctrl-alt-del.target @@ -0,0 +1 @@ +/usr/lib/systemd/system/reboot.target \ No newline at end of file diff --git a/systemd/system/dbus-org.fedoraproject.FirewallD1.service b/systemd/system/dbus-org.fedoraproject.FirewallD1.service new file mode 120000 index 0000000..91b6be3 --- /dev/null +++ b/systemd/system/dbus-org.fedoraproject.FirewallD1.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/firewalld.service \ No newline at end of file diff --git a/systemd/system/dbus-org.freedesktop.network1.service b/systemd/system/dbus-org.freedesktop.network1.service new file mode 120000 index 0000000..4c158e6 --- /dev/null +++ b/systemd/system/dbus-org.freedesktop.network1.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/systemd-networkd.service \ No newline at end of file diff --git a/systemd/system/dbus-org.freedesktop.nm-dispatcher.service b/systemd/system/dbus-org.freedesktop.nm-dispatcher.service new file mode 120000 index 0000000..a7e5cd4 --- /dev/null +++ b/systemd/system/dbus-org.freedesktop.nm-dispatcher.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/NetworkManager-dispatcher.service \ No newline at end of file diff --git a/systemd/system/dbus.service b/systemd/system/dbus.service new file mode 120000 index 0000000..fc6fe00 --- /dev/null +++ b/systemd/system/dbus.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/dbus-broker.service \ No newline at end of file diff --git a/systemd/system/default.target b/systemd/system/default.target new file mode 120000 index 0000000..d321622 --- /dev/null +++ b/systemd/system/default.target @@ -0,0 +1 @@ +/usr/lib/systemd/system/multi-user.target \ No newline at end of file diff --git a/systemd/system/getty.target.wants/getty@tty1.service b/systemd/system/getty.target.wants/getty@tty1.service new file mode 120000 index 0000000..7bfe080 --- /dev/null +++ b/systemd/system/getty.target.wants/getty@tty1.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/getty@.service \ No newline at end of file diff --git a/systemd/system/getty@.service.d/noclear.conf b/systemd/system/getty@.service.d/noclear.conf new file mode 100644 index 0000000..52671c7 --- /dev/null +++ b/systemd/system/getty@.service.d/noclear.conf @@ -0,0 +1,2 @@ +[Service] +TTYVTDisallocate=no diff --git a/systemd/system/multi-user.target.wants/NetworkManager.service b/systemd/system/multi-user.target.wants/NetworkManager.service new file mode 120000 index 0000000..e874a9b --- /dev/null +++ b/systemd/system/multi-user.target.wants/NetworkManager.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/NetworkManager.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/auditd.service b/systemd/system/multi-user.target.wants/auditd.service new file mode 120000 index 0000000..0638fb0 --- /dev/null +++ b/systemd/system/multi-user.target.wants/auditd.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/auditd.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/chronyd.service b/systemd/system/multi-user.target.wants/chronyd.service new file mode 120000 index 0000000..c77d179 --- /dev/null +++ b/systemd/system/multi-user.target.wants/chronyd.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/chronyd.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/console-login-helper-messages-gensnippet-os-release.service b/systemd/system/multi-user.target.wants/console-login-helper-messages-gensnippet-os-release.service new file mode 120000 index 0000000..06cbb69 --- /dev/null +++ b/systemd/system/multi-user.target.wants/console-login-helper-messages-gensnippet-os-release.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/console-login-helper-messages-gensnippet-os-release.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/crond.service b/systemd/system/multi-user.target.wants/crond.service new file mode 120000 index 0000000..39642fe --- /dev/null +++ b/systemd/system/multi-user.target.wants/crond.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/crond.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/firewalld.service b/systemd/system/multi-user.target.wants/firewalld.service new file mode 120000 index 0000000..91b6be3 --- /dev/null +++ b/systemd/system/multi-user.target.wants/firewalld.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/firewalld.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/irqbalance.service b/systemd/system/multi-user.target.wants/irqbalance.service new file mode 120000 index 0000000..2bf4adc --- /dev/null +++ b/systemd/system/multi-user.target.wants/irqbalance.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/irqbalance.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/kdump.service b/systemd/system/multi-user.target.wants/kdump.service new file mode 120000 index 0000000..2fc35ca --- /dev/null +++ b/systemd/system/multi-user.target.wants/kdump.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/kdump.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/nfs-client.target b/systemd/system/multi-user.target.wants/nfs-client.target new file mode 120000 index 0000000..0343fe2 --- /dev/null +++ b/systemd/system/multi-user.target.wants/nfs-client.target @@ -0,0 +1 @@ +/usr/lib/systemd/system/nfs-client.target \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/postgresql-16.service b/systemd/system/multi-user.target.wants/postgresql-16.service new file mode 120000 index 0000000..358349b --- /dev/null +++ b/systemd/system/multi-user.target.wants/postgresql-16.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/postgresql-16.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/redis.service b/systemd/system/multi-user.target.wants/redis.service new file mode 120000 index 0000000..4ff86f2 --- /dev/null +++ b/systemd/system/multi-user.target.wants/redis.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/redis.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/remote-fs.target b/systemd/system/multi-user.target.wants/remote-fs.target new file mode 120000 index 0000000..2bc8b1c --- /dev/null +++ b/systemd/system/multi-user.target.wants/remote-fs.target @@ -0,0 +1 @@ +/usr/lib/systemd/system/remote-fs.target \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/rpcbind.service b/systemd/system/multi-user.target.wants/rpcbind.service new file mode 120000 index 0000000..bbd35b8 --- /dev/null +++ b/systemd/system/multi-user.target.wants/rpcbind.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/rpcbind.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/rsyslog.service b/systemd/system/multi-user.target.wants/rsyslog.service new file mode 120000 index 0000000..f2d9aa9 --- /dev/null +++ b/systemd/system/multi-user.target.wants/rsyslog.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/rsyslog.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/sshd.service b/systemd/system/multi-user.target.wants/sshd.service new file mode 120000 index 0000000..d21ebd9 --- /dev/null +++ b/systemd/system/multi-user.target.wants/sshd.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/sshd.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/sssd.service b/systemd/system/multi-user.target.wants/sssd.service new file mode 120000 index 0000000..b04dbbf --- /dev/null +++ b/systemd/system/multi-user.target.wants/sssd.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/sssd.service \ No newline at end of file diff --git a/systemd/system/multi-user.target.wants/systemd-networkd.service b/systemd/system/multi-user.target.wants/systemd-networkd.service new file mode 120000 index 0000000..4c158e6 --- /dev/null +++ b/systemd/system/multi-user.target.wants/systemd-networkd.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/systemd-networkd.service \ No newline at end of file diff --git a/systemd/system/network-online.target.wants/NetworkManager-wait-online.service b/systemd/system/network-online.target.wants/NetworkManager-wait-online.service new file mode 120000 index 0000000..b78b586 --- /dev/null +++ b/systemd/system/network-online.target.wants/NetworkManager-wait-online.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/NetworkManager-wait-online.service \ No newline at end of file diff --git a/systemd/system/network-online.target.wants/systemd-networkd-wait-online.service b/systemd/system/network-online.target.wants/systemd-networkd-wait-online.service new file mode 120000 index 0000000..7d6ad92 --- /dev/null +++ b/systemd/system/network-online.target.wants/systemd-networkd-wait-online.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/systemd-networkd-wait-online.service \ No newline at end of file diff --git a/systemd/system/redis-sentinel.service.d/limit.conf b/systemd/system/redis-sentinel.service.d/limit.conf new file mode 100644 index 0000000..a792937 --- /dev/null +++ b/systemd/system/redis-sentinel.service.d/limit.conf @@ -0,0 +1,14 @@ +# If you need to change max open file limit +# for example, when you change maxclient in configuration +# you can change the LimitNOFILE value below. +# See "man systemd.exec" for more information. + +# Slave nodes on large system may take lot of time to start. +# You may need to uncomment TimeoutStartSec and TimeoutStopSec +# directives below and raise their value. +# See "man systemd.service" for more information. + +[Service] +LimitNOFILE=10240 +#TimeoutStartSec=90s +#TimeoutStopSec=90s diff --git a/systemd/system/redis.service.d/limit.conf b/systemd/system/redis.service.d/limit.conf new file mode 100644 index 0000000..a792937 --- /dev/null +++ b/systemd/system/redis.service.d/limit.conf @@ -0,0 +1,14 @@ +# If you need to change max open file limit +# for example, when you change maxclient in configuration +# you can change the LimitNOFILE value below. +# See "man systemd.exec" for more information. + +# Slave nodes on large system may take lot of time to start. +# You may need to uncomment TimeoutStartSec and TimeoutStopSec +# directives below and raise their value. +# See "man systemd.service" for more information. + +[Service] +LimitNOFILE=10240 +#TimeoutStartSec=90s +#TimeoutStopSec=90s diff --git a/systemd/system/remote-fs.target.wants/nfs-client.target b/systemd/system/remote-fs.target.wants/nfs-client.target new file mode 120000 index 0000000..0343fe2 --- /dev/null +++ b/systemd/system/remote-fs.target.wants/nfs-client.target @@ -0,0 +1 @@ +/usr/lib/systemd/system/nfs-client.target \ No newline at end of file diff --git a/systemd/system/sockets.target.wants/dbus.socket b/systemd/system/sockets.target.wants/dbus.socket new file mode 120000 index 0000000..3e13c68 --- /dev/null +++ b/systemd/system/sockets.target.wants/dbus.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/dbus.socket \ No newline at end of file diff --git a/systemd/system/sockets.target.wants/dm-event.socket b/systemd/system/sockets.target.wants/dm-event.socket new file mode 120000 index 0000000..3ef3886 --- /dev/null +++ b/systemd/system/sockets.target.wants/dm-event.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/dm-event.socket \ No newline at end of file diff --git a/systemd/system/sockets.target.wants/rpcbind.socket b/systemd/system/sockets.target.wants/rpcbind.socket new file mode 120000 index 0000000..d2adf96 --- /dev/null +++ b/systemd/system/sockets.target.wants/rpcbind.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/rpcbind.socket \ No newline at end of file diff --git a/systemd/system/sockets.target.wants/sssd-kcm.socket b/systemd/system/sockets.target.wants/sssd-kcm.socket new file mode 120000 index 0000000..8673ee6 --- /dev/null +++ b/systemd/system/sockets.target.wants/sssd-kcm.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/sssd-kcm.socket \ No newline at end of file diff --git a/systemd/system/sockets.target.wants/systemd-networkd.socket b/systemd/system/sockets.target.wants/systemd-networkd.socket new file mode 120000 index 0000000..51942c8 --- /dev/null +++ b/systemd/system/sockets.target.wants/systemd-networkd.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/systemd-networkd.socket \ No newline at end of file diff --git a/systemd/system/sysinit.target.wants/lvm2-lvmpolld.socket b/systemd/system/sysinit.target.wants/lvm2-lvmpolld.socket new file mode 120000 index 0000000..cb0cae3 --- /dev/null +++ b/systemd/system/sysinit.target.wants/lvm2-lvmpolld.socket @@ -0,0 +1 @@ +/usr/lib/systemd/system/lvm2-lvmpolld.socket \ No newline at end of file diff --git a/systemd/system/sysinit.target.wants/lvm2-monitor.service b/systemd/system/sysinit.target.wants/lvm2-monitor.service new file mode 120000 index 0000000..aa0c71f --- /dev/null +++ b/systemd/system/sysinit.target.wants/lvm2-monitor.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/lvm2-monitor.service \ No newline at end of file diff --git a/systemd/system/sysinit.target.wants/nis-domainname.service b/systemd/system/sysinit.target.wants/nis-domainname.service new file mode 120000 index 0000000..9684b20 --- /dev/null +++ b/systemd/system/sysinit.target.wants/nis-domainname.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/nis-domainname.service \ No newline at end of file diff --git a/systemd/system/sysinit.target.wants/selinux-autorelabel-mark.service b/systemd/system/sysinit.target.wants/selinux-autorelabel-mark.service new file mode 120000 index 0000000..70837b7 --- /dev/null +++ b/systemd/system/sysinit.target.wants/selinux-autorelabel-mark.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/selinux-autorelabel-mark.service \ No newline at end of file diff --git a/systemd/system/sysinit.target.wants/systemd-network-generator.service b/systemd/system/sysinit.target.wants/systemd-network-generator.service new file mode 120000 index 0000000..3077651 --- /dev/null +++ b/systemd/system/sysinit.target.wants/systemd-network-generator.service @@ -0,0 +1 @@ +/usr/lib/systemd/system/systemd-network-generator.service \ No newline at end of file diff --git a/systemd/system/timers.target.wants/dnf-makecache.timer b/systemd/system/timers.target.wants/dnf-makecache.timer new file mode 120000 index 0000000..c47c5c7 --- /dev/null +++ b/systemd/system/timers.target.wants/dnf-makecache.timer @@ -0,0 +1 @@ +/usr/lib/systemd/system/dnf-makecache.timer \ No newline at end of file diff --git a/systemd/system/timers.target.wants/logrotate.timer b/systemd/system/timers.target.wants/logrotate.timer new file mode 120000 index 0000000..3bd6b36 --- /dev/null +++ b/systemd/system/timers.target.wants/logrotate.timer @@ -0,0 +1 @@ +/usr/lib/systemd/system/logrotate.timer \ No newline at end of file diff --git a/systemd/user.conf b/systemd/user.conf new file mode 100644 index 0000000..4d3435f --- /dev/null +++ b/systemd/user.conf @@ -0,0 +1,50 @@ +# This file is part of systemd. +# +# systemd is free software; you can redistribute it and/or modify it under the +# terms of the GNU Lesser General Public License as published by the Free +# Software Foundation; either version 2.1 of the License, or (at your option) +# any later version. +# +# Entries in this file show the compile time defaults. Local configuration +# should be created by either modifying this file, or by creating "drop-ins" in +# the user.conf.d/ subdirectory. The latter is generally recommended. +# Defaults can be restored by simply deleting this file and all drop-ins. +# +# See systemd-user.conf(5) for details. + +[Manager] +#LogLevel=info +#LogTarget=auto +#LogColor=yes +#LogLocation=no +#LogTime=no +#SystemCallArchitectures= +#TimerSlackNSec= +#StatusUnitFormat=description +#DefaultTimerAccuracySec=1min +#DefaultStandardOutput=inherit +#DefaultStandardError=inherit +#DefaultTimeoutStartSec=90s +#DefaultTimeoutStopSec=90s +#DefaultTimeoutAbortSec= +#DefaultRestartSec=100ms +#DefaultStartLimitIntervalSec=10s +#DefaultStartLimitBurst=5 +#DefaultEnvironment= +#DefaultLimitCPU= +#DefaultLimitFSIZE= +#DefaultLimitDATA= +#DefaultLimitSTACK= +#DefaultLimitCORE= +#DefaultLimitRSS= +#DefaultLimitNOFILE= +#DefaultLimitAS= +#DefaultLimitNPROC= +#DefaultLimitMEMLOCK= +#DefaultLimitLOCKS= +#DefaultLimitSIGPENDING= +#DefaultLimitMSGQUEUE= +#DefaultLimitNICE= +#DefaultLimitRTPRIO= +#DefaultLimitRTTIME= +#DefaultSmackProcessLabel= diff --git a/systemd/user/basic.target.wants/systemd-tmpfiles-setup.service b/systemd/user/basic.target.wants/systemd-tmpfiles-setup.service new file mode 120000 index 0000000..6658c78 --- /dev/null +++ b/systemd/user/basic.target.wants/systemd-tmpfiles-setup.service @@ -0,0 +1 @@ +/usr/lib/systemd/user/systemd-tmpfiles-setup.service \ No newline at end of file diff --git a/systemd/user/dbus.service b/systemd/user/dbus.service new file mode 120000 index 0000000..5e6c9c0 --- /dev/null +++ b/systemd/user/dbus.service @@ -0,0 +1 @@ +/usr/lib/systemd/user/dbus-broker.service \ No newline at end of file diff --git a/systemd/user/sockets.target.wants/dbus.socket b/systemd/user/sockets.target.wants/dbus.socket new file mode 120000 index 0000000..d03c09a --- /dev/null +++ b/systemd/user/sockets.target.wants/dbus.socket @@ -0,0 +1 @@ +/usr/lib/systemd/user/dbus.socket \ No newline at end of file diff --git a/systemd/user/timers.target.wants/systemd-tmpfiles-clean.timer b/systemd/user/timers.target.wants/systemd-tmpfiles-clean.timer new file mode 120000 index 0000000..ef1b9be --- /dev/null +++ b/systemd/user/timers.target.wants/systemd-tmpfiles-clean.timer @@ -0,0 +1 @@ +/usr/lib/systemd/user/systemd-tmpfiles-clean.timer \ No newline at end of file diff --git a/tpm2-tss/fapi-config.json b/tpm2-tss/fapi-config.json new file mode 100644 index 0000000..a4cc4f9 --- /dev/null +++ b/tpm2-tss/fapi-config.json @@ -0,0 +1,9 @@ +{ + "profile_name": "P_ECCP256SHA256", + "profile_dir": "/etc/tpm2-tss/fapi-profiles/", + "user_dir": "~/.local/share/tpm2-tss/user/keystore", + "system_dir": "/var/lib/tpm2-tss/system/keystore", + "tcti": "", + "system_pcrs" : [], + "log_dir" : "/run/tpm2-tss/eventlog/" +} diff --git a/tpm2-tss/fapi-profiles/P_ECCP256SHA256.json b/tpm2-tss/fapi-profiles/P_ECCP256SHA256.json new file mode 100644 index 0000000..b5a3835 --- /dev/null +++ b/tpm2-tss/fapi-profiles/P_ECCP256SHA256.json @@ -0,0 +1,40 @@ +{ + "type": "TPM2_ALG_ECC", + "nameAlg":"TPM2_ALG_SHA256", + "srk_template": "system,restricted,decrypt,0x81000001", + "srk_description": "Storage root key SRK", + "srk_persistent": 0, + "ek_template": "system,restricted,decrypt", + "ek_description": "Endorsement key EK", + "ecc_signing_scheme": { + "scheme":"TPM2_ALG_ECDSA", + "details":{ + "hashAlg":"TPM2_ALG_SHA256" + }, + }, + "sym_mode":"TPM2_ALG_CFB", + "sym_parameters": { + "algorithm":"TPM2_ALG_AES", + "keyBits":"128", + "mode":"TPM2_ALG_CFB" + }, + "sym_block_size": 16, + "pcr_selection": [ + { "hash": "TPM2_ALG_SHA1", + "pcrSelect": [ ], + }, + { "hash": "TPM2_ALG_SHA256", + "pcrSelect": [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ] + } + ], + "curveID": "TPM2_ECC_NIST_P256", + "ek_policy": { + "description": "Endorsement hierarchy used for policy secret.", + "policy":[ + { + "type":"POLICYSECRET", + "objectName": "4000000b", + } + ] + } +} diff --git a/tpm2-tss/fapi-profiles/P_RSA2048SHA256.json b/tpm2-tss/fapi-profiles/P_RSA2048SHA256.json new file mode 100644 index 0000000..2423b7b --- /dev/null +++ b/tpm2-tss/fapi-profiles/P_RSA2048SHA256.json @@ -0,0 +1,54 @@ +{ + "type": "TPM2_ALG_RSA", + "nameAlg":"TPM2_ALG_SHA256", + "srk_template": "system,restricted,decrypt,0x81000001", + "srk_description": "Storage root key SRK", + "srk_persistent": 1, + "ek_template": "system,restricted,decrypt", + "ek_description": "Endorsement key EK", + "rsa_signing_scheme": { + "scheme":"TPM2_ALG_RSAPSS", + "details":{ + "hashAlg":"TPM2_ALG_SHA256" + } + }, + "rsa_decrypt_scheme": { + "scheme":"TPM2_ALG_OAEP", + "details":{ + "hashAlg":"TPM2_ALG_SHA256" + } + }, + "sym_mode":"TPM2_ALG_CFB", + "sym_parameters": { + "algorithm":"TPM2_ALG_AES", + "keyBits":"128", + "mode":"TPM2_ALG_CFB" + }, + "sym_block_size": 16, + "pcr_selection": [ + { "hash": "TPM2_ALG_SHA1", + "pcrSelect": [ ] + }, + { "hash": "TPM2_ALG_SHA256", + "pcrSelect": [ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23 ] + } + ], + "exponent": 0, + "keyBits": 2048, + "session_hash_alg": "TPM2_ALG_SHA256", + "session_symmetric":{ + "algorithm":"TPM2_ALG_AES", + "keyBits":"128", + "mode":"TPM2_ALG_CFB" + }, + "ek_policy": { + "description": "Endorsement hierarchy used for policy secret.", + "policy":[ + { + "type":"POLICYSECRET", + "objectName": "4000000b", + } + ] + } + +} diff --git a/udev/udev.conf b/udev/udev.conf new file mode 100644 index 0000000..07d7f0c --- /dev/null +++ b/udev/udev.conf @@ -0,0 +1,11 @@ +# see udev.conf(5) for details +# +# udevd is also started in the initrd. When this file is modified you might +# also want to rebuild the initrd, so that it will include the modified configuration. + +#udev_log=info +#children_max= +#exec_delay= +#event_timeout=180 +#timeout_signal=SIGKILL +#resolve_names=early diff --git a/vconsole.conf b/vconsole.conf new file mode 100644 index 0000000..f93cbda --- /dev/null +++ b/vconsole.conf @@ -0,0 +1,2 @@ +KEYMAP="de-nodeadkeys" +FONT="eurlatgr" diff --git a/vimrc b/vimrc new file mode 100644 index 0000000..fb5fac7 --- /dev/null +++ b/vimrc @@ -0,0 +1,147 @@ +" When started as "evim", evim.vim will already have done these settings. +if v:progname =~? "evim" + finish +endif + +" Use Vim settings, rather than Vi settings (much better!). +" This must be first, because it changes other options as a side effect. +" Avoid side effects when it was already reset. +if &compatible + set nocompatible +endif + +" When the +eval feature is missing, the set command above will be skipped. +" Use a trick to reset compatible only when the +eval feature is missing. +silent! while 0 + set nocompatible +silent! endwhile + +if v:lang =~ "utf8$" || v:lang =~ "UTF-8$" + set fileencodings=ucs-bom,utf-8,latin1 +endif + +" Allow backspacing over everything in insert mode. +set backspace=indent,eol,start + +"set ai " always set autoindenting on +set noai +"set backup " keep a backup file +set viminfo='20,\"50 " read/write a .viminfo file, don't store more + " than 50 lines of registers +set history=50 " keep 50 lines of command line history +set ruler " show the cursor position all the time +set showcmd " display incomplete commands +set wildmenu " display completion matches in a status line +set modeline +set showmatch +set ignorecase + +set ttimeout " time out for key codes +set ttimeoutlen=100 " wait up to 100ms after Esc for special key + +" Show @@@ in the last line if it is truncated. +set display=truncate + +" Show a few lines of context around the cursor. Note that this makes the +" text scroll if you mouse-click near the start or end of the window. +set scrolloff=5 + +" Do incremental searching when it's possible to timeout. +if has('reltime') + set incsearch +endif + +" Do not recognize octal numbers for Ctrl-A and Ctrl-X, most users find it +" confusing. +set nrformats-=octal + +if has("multi_byte") + set encoding=utf-8 + setglobal fileencoding=utf-8 + set listchars=tab:»·,trail:·,nbsp:⎵ +else + echoerr "Sorry, this version of (g)vim was not compiled with +multi_byte" + set listchars=tab:>-,trail:. +endif + +color delek + +" Only do this part when compiled with support for autocommands +if has("autocmd") + augroup redhat + autocmd! + " In text files, always limit the width of text to 78 characters + " autocmd BufRead *.txt set tw=78 + " When editing a file, always jump to the last cursor position + autocmd BufReadPost * + \ if line("'\"") > 0 && line ("'\"") <= line("$") | + \ exe "normal! g'\"" | + \ endif + " don't write swapfile on most commonly used directories for NFS mounts or USB sticks + autocmd BufNewFile,BufReadPre /media/*,/run/media/*,/mnt/* set directory=~/tmp,/var/tmp,/tmp + " start with spec file template + " 1724126 - do not open new file with .spec suffix with spec file template + " apparently there are other file types with .spec suffix, so disable the + " template + " autocmd BufNewFile *.spec 0r /usr/share/vim/vimfiles/template.spec + augroup END +endif + +if has("cscope") && filereadable("/usr/bin/cscope") + set csprg=/usr/bin/cscope + set csto=0 + set cst + set nocsverb + " add any database in current directory + if filereadable("cscope.out") + cs add $PWD/cscope.out + " else add database pointed to by environment + elseif $CSCOPE_DB != "" + cs add $CSCOPE_DB + endif + set csverb +endif + +" Switch syntax highlighting on, when the terminal has colors +" Also switch on highlighting the last used search pattern. +if &t_Co > 2 || has("gui_running") + " Revert with ":syntax off". + syntax on + + " I like highlighting strings inside C comments. + " Revert with ":unlet c_comment_strings". + let c_comment_strings=1 + set hlsearch +endif + +filetype plugin on + +if &term=="xterm" + set t_Co=8 + set t_Sb=[4%dm + set t_Sf=[3%dm +endif + +" Convenient command to see the difference between the current buffer and the +" file it was loaded from, thus the changes you made. +" Only define it when not defined already. +" Revert with: ":delcommand DiffOrig". +if !exists(":DiffOrig") + command DiffOrig vert new | set bt=nofile | r ++edit # | 0d_ | diffthis + \ | wincmd p | diffthis +endif + +if has('langmap') && exists('+langremap') + " Prevent that the langmap option applies to characters that result from a + " mapping. If set (default), this may break plugins (but it's backward + " compatible). + set nolangremap +endif + +" Don't wake up system with blinking cursor: +let &guicursor = &guicursor . ",a:blinkon0" + +" Source a global configuration file if available +if filereadable("/etc/vimrc.local") + source /etc/vimrc.local +endif diff --git a/vimrc.orig b/vimrc.orig new file mode 100644 index 0000000..4530498 --- /dev/null +++ b/vimrc.orig @@ -0,0 +1,128 @@ +" When started as "evim", evim.vim will already have done these settings. +if v:progname =~? "evim" + finish +endif + +" Use Vim settings, rather than Vi settings (much better!). +" This must be first, because it changes other options as a side effect. +" Avoid side effects when it was already reset. +if &compatible + set nocompatible +endif + +" When the +eval feature is missing, the set command above will be skipped. +" Use a trick to reset compatible only when the +eval feature is missing. +silent! while 0 + set nocompatible +silent! endwhile + +" Allow backspacing over everything in insert mode. +set backspace=indent,eol,start + +"set ai " always set autoindenting on +"set backup " keep a backup file +set viminfo='20,\"50 " read/write a .viminfo file, don't store more + " than 50 lines of registers +set history=50 " keep 50 lines of command line history +set ruler " show the cursor position all the time +set showcmd " display incomplete commands +set wildmenu " display completion matches in a status line + +set ttimeout " time out for key codes +set ttimeoutlen=100 " wait up to 100ms after Esc for special key + +" Show @@@ in the last line if it is truncated. +set display=truncate + +" Show a few lines of context around the cursor. Note that this makes the +" text scroll if you mouse-click near the start or end of the window. +set scrolloff=5 + +" Do incremental searching when it's possible to timeout. +if has('reltime') + set incsearch +endif + +" Do not recognize octal numbers for Ctrl-A and Ctrl-X, most users find it +" confusing. +set nrformats-=octal + +" Only do this part when compiled with support for autocommands +if has("autocmd") + augroup redhat + autocmd! + " In text files, always limit the width of text to 78 characters + " autocmd BufRead *.txt set tw=78 + " When editing a file, always jump to the last cursor position + autocmd BufReadPost * + \ if line("'\"") > 0 && line ("'\"") <= line("$") | + \ exe "normal! g'\"" | + \ endif + " don't write swapfile on most commonly used directories for NFS mounts or USB sticks + autocmd BufNewFile,BufReadPre /media/*,/run/media/*,/mnt/* set directory=~/tmp,/var/tmp,/tmp + " start with spec file template + " 1724126 - do not open new file with .spec suffix with spec file template + " apparently there are other file types with .spec suffix, so disable the + " template + " autocmd BufNewFile *.spec 0r /usr/share/vim/vimfiles/template.spec + augroup END +endif + +if has("cscope") && filereadable("/usr/bin/cscope") + set csprg=/usr/bin/cscope + set csto=0 + set cst + set nocsverb + " add any database in current directory + if filereadable("cscope.out") + cs add $PWD/cscope.out + " else add database pointed to by environment + elseif $CSCOPE_DB != "" + cs add $CSCOPE_DB + endif + set csverb +endif + +" Switch syntax highlighting on, when the terminal has colors +" Also switch on highlighting the last used search pattern. +if &t_Co > 2 || has("gui_running") + " Revert with ":syntax off". + syntax on + + " I like highlighting strings inside C comments. + " Revert with ":unlet c_comment_strings". + let c_comment_strings=1 + set hlsearch +endif + +filetype plugin on + +if &term=="xterm" + set t_Co=8 + set t_Sb=[4%dm + set t_Sf=[3%dm +endif + +" Convenient command to see the difference between the current buffer and the +" file it was loaded from, thus the changes you made. +" Only define it when not defined already. +" Revert with: ":delcommand DiffOrig". +if !exists(":DiffOrig") + command DiffOrig vert new | set bt=nofile | r ++edit # | 0d_ | diffthis + \ | wincmd p | diffthis +endif + +if has('langmap') && exists('+langremap') + " Prevent that the langmap option applies to characters that result from a + " mapping. If set (default), this may break plugins (but it's backward + " compatible). + set nolangremap +endif + +" Don't wake up system with blinking cursor: +let &guicursor = &guicursor . ",a:blinkon0" + +" Source a global configuration file if available +if filereadable("/etc/vimrc.local") + source /etc/vimrc.local +endif diff --git a/virc b/virc new file mode 100644 index 0000000..6a36735 --- /dev/null +++ b/virc @@ -0,0 +1,35 @@ +if v:lang =~ "utf8$" || v:lang =~ "UTF-8$" + set fileencodings=ucs-bom,utf-8,latin1 +endif + +set nocompatible " Use Vim defaults (much better!) +set bs=indent,eol,start " allow backspacing over everything in insert mode +"set ai " always set autoindenting on +"set backup " keep a backup file +set history=50 " keep 50 lines of command line history +set ruler " show the cursor position all the time + +" Only do this part when compiled with support for autocommands +if has("autocmd") + augroup redhat + autocmd! + " In text files, always limit the width of text to 78 characters + " autocmd BufRead *.txt set tw=78 + " When editing a file, always jump to the last cursor position + autocmd BufReadPost * + \ if line("'\"") > 0 && line ("'\"") <= line("$") | + \ exe "normal! g'\"" | + \ endif + " don't write swapfile on most commonly used directories for NFS mounts or USB sticks + autocmd BufNewFile,BufReadPre /media/*,/run/media/*,/mnt/* set directory=~/tmp,/var/tmp,/tmp + " start with spec file template + autocmd BufNewFile *.spec 0r /usr/share/vim/vimfiles/template.spec + augroup END +endif + + +if &term=="xterm" + set t_Co=8 + set t_Sb=[4%dm + set t_Sf=[3%dm +endif diff --git a/wgetrc b/wgetrc new file mode 100644 index 0000000..9a73ada --- /dev/null +++ b/wgetrc @@ -0,0 +1,137 @@ +### +### Sample Wget initialization file .wgetrc +### + +## You can use this file to change the default behaviour of wget or to +## avoid having to type many many command-line options. This file does +## not contain a comprehensive list of commands -- look at the manual +## to find out what you can put into this file. You can find this here: +## $ info wget.info 'Startup File' +## Or online here: +## https://www.gnu.org/software/wget/manual/wget.html#Startup-File +## +## Wget initialization file can reside in /etc/wgetrc +## (global, for all users) or $HOME/.wgetrc (for a single user). +## +## To use the settings in this file, you will have to uncomment them, +## as well as change them, in most cases, as the values on the +## commented-out lines are the default values (e.g. "off"). +## +## Command are case-, underscore- and minus-insensitive. +## For example ftp_proxy, ftp-proxy and ftpproxy are the same. + + +## +## Global settings (useful for setting up in /etc/wgetrc). +## Think well before you change them, since they may reduce wget's +## functionality, and make it behave contrary to the documentation: +## + +# You can set retrieve quota for beginners by specifying a value +# optionally followed by 'K' (kilobytes) or 'M' (megabytes). The +# default quota is unlimited. +#quota = inf + +# You can lower (or raise) the default number of retries when +# downloading a file (default is 20). +#tries = 20 + +# Lowering the maximum depth of the recursive retrieval is handy to +# prevent newbies from going too "deep" when they unwittingly start +# the recursive retrieval. The default is 5. +#reclevel = 5 + +# By default Wget uses "passive FTP" transfer where the client +# initiates the data connection to the server rather than the other +# way around. That is required on systems behind NAT where the client +# computer cannot be easily reached from the Internet. However, some +# firewalls software explicitly supports active FTP and in fact has +# problems supporting passive transfer. If you are in such +# environment, use "passive_ftp = off" to revert to active FTP. +#passive_ftp = off + +# The "wait" command below makes Wget wait between every connection. +# If, instead, you want Wget to wait only between retries of failed +# downloads, set waitretry to maximum number of seconds to wait (Wget +# will use "linear backoff", waiting 1 second after the first failure +# on a file, 2 seconds after the second failure, etc. up to this max). +#waitretry = 10 + + +## +## Local settings (for a user to set in his $HOME/.wgetrc). It is +## *highly* undesirable to put these settings in the global file, since +## they are potentially dangerous to "normal" users. +## +## Even when setting up your own ~/.wgetrc, you should know what you +## are doing before doing so. +## + +# Set this to on to use timestamping by default: +#timestamping = off + +# It is a good idea to make Wget send your email address in a `From:' +# header with your request (so that server administrators can contact +# you in case of errors). Wget does *not* send `From:' by default. +#header = From: Your Name + +# You can set up other headers, like Accept-Language. Accept-Language +# is *not* sent by default. +#header = Accept-Language: en + +# You can set the default proxies for Wget to use for http, https, and ftp. +# They will override the value in the environment. +#https_proxy = http://proxy.yoyodyne.com:18023/ +#http_proxy = http://proxy.yoyodyne.com:18023/ +#ftp_proxy = http://proxy.yoyodyne.com:18023/ + +# If you do not want to use proxy at all, set this to off. +#use_proxy = on + +# You can customize the retrieval outlook. Valid options are default, +# binary, mega and micro. +#dot_style = default + +# Setting this to off makes Wget not download /robots.txt. Be sure to +# know *exactly* what /robots.txt is and how it is used before changing +# the default! +#robots = on + +# It can be useful to make Wget wait between connections. Set this to +# the number of seconds you want Wget to wait. +#wait = 0 + +# You can force creating directory structure, even if a single is being +# retrieved, by setting this to on. +#dirstruct = off + +# You can turn on recursive retrieving by default (don't do this if +# you are not sure you know what it means) by setting this to on. +#recursive = off + +# To always back up file X as X.orig before converting its links (due +# to -k / --convert-links / convert_links = on having been specified), +# set this variable to on: +#backup_converted = off + +# To have Wget follow FTP links from HTML files by default, set this +# to on: +#follow_ftp = off + +# To try ipv6 addresses first: +#prefer-family = IPv6 + +# Set default IRI support state +#iri = off + +# Force the default system encoding +#localencoding = UTF-8 + +# Force the default remote server encoding +#remoteencoding = UTF-8 + +# Turn on to prevent following non-HTTPS links when in recursive mode +#httpsonly = off + +# Tune HTTPS security (auto, SSLv2, SSLv3, TLSv1, PFS) +#secureprotocol = auto diff --git a/xattr.conf b/xattr.conf new file mode 100644 index 0000000..a28ed3a --- /dev/null +++ b/xattr.conf @@ -0,0 +1,24 @@ +# /etc/xattr.conf +# +# Format: +# +# +# Actions: +# permissions - copy when trying to preserve permissions. +# skip - do not copy. +# +# Note that libattr functions attr_copy_file() and attr_copy_fd() by default +# skip all extended attributes that are matched by any of the below patterns, +# regardless of the specified action. + +system.posix_acl_access permissions +system.posix_acl_default permissions +trusted.SGI_ACL_DEFAULT skip # xfs specific +trusted.SGI_ACL_FILE skip # xfs specific +trusted.SGI_CAP_FILE skip # xfs specific +trusted.SGI_DMI_* skip # xfs specific +trusted.SGI_MAC_FILE skip # xfs specific +xfsroot.* skip # xfs specific; obsolete +user.Beagle.* skip # ignore Beagle index data +security.evm skip # may only be written by kernel +afs.* skip # AFS metadata and ACLs diff --git a/xdg/systemd/user b/xdg/systemd/user new file mode 120000 index 0000000..1c75bd3 --- /dev/null +++ b/xdg/systemd/user @@ -0,0 +1 @@ +../../systemd/user \ No newline at end of file diff --git a/yum.conf b/yum.conf new file mode 120000 index 0000000..5f21e54 --- /dev/null +++ b/yum.conf @@ -0,0 +1 @@ +dnf/dnf.conf \ No newline at end of file diff --git a/yum.repos.d/epel-cisco-openh264.repo b/yum.repos.d/epel-cisco-openh264.repo new file mode 100644 index 0000000..442abca --- /dev/null +++ b/yum.repos.d/epel-cisco-openh264.repo @@ -0,0 +1,33 @@ +[epel-cisco-openh264] +name=Extra Packages for Enterprise Linux 9 openh264 (From Cisco) - $basearch +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-cisco-openh264-9&arch=$basearch +type=rpm +enabled=1 +metadata_expire=14d +repo_gpgcheck=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +skip_if_unavailable=True + +[epel-cisco-openh264-debuginfo] +name=Extra Packages for Enterprise Linux 9 openh264 (From Cisco) - $basearch - Debug +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-cisco-openh264-debug-9&arch=$basearch +type=rpm +enabled=0 +metadata_expire=14d +repo_gpgcheck=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +skip_if_unavailable=True + +[epel-cisco-openh264-source] +name=Extra Packages for Enterprise Linux 9 openh264 (From Cisco) - $basearch - Source +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-cisco-openh264-source-9&arch=$basearch +type=rpm +enabled=0 +metadata_expire=14d +repo_gpgcheck=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +skip_if_unavailable=True + diff --git a/yum.repos.d/epel-next-testing.repo b/yum.repos.d/epel-next-testing.repo new file mode 100644 index 0000000..136562c --- /dev/null +++ b/yum.repos.d/epel-next-testing.repo @@ -0,0 +1,30 @@ +[epel-next-testing] +name=Extra Packages for Enterprise Linux 9 - Next - Testing - $basearch +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/next/9/Everything/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgcheck=1 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 + +[epel-next-testing-debuginfo] +name=Extra Packages for Enterprise Linux 9 - Next - Testing - $basearch - Debug +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/next/9/Everything/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-debug-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 + +[epel-next-testing-source] +name=Extra Packages for Enterprise Linux 9 - Next - Testing - $basearch - Source +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/next/9/Everything/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-testing-next-source-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 diff --git a/yum.repos.d/epel-next.repo b/yum.repos.d/epel-next.repo new file mode 100644 index 0000000..f917c44 --- /dev/null +++ b/yum.repos.d/epel-next.repo @@ -0,0 +1,30 @@ +[epel-next] +name=Extra Packages for Enterprise Linux 9 - Next - $basearch +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/next/9/Everything/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=1 +gpgcheck=1 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 + +[epel-next-debuginfo] +name=Extra Packages for Enterprise Linux 9 - Next - $basearch - Debug +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/next/9/Everything/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-debug-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 + +[epel-next-source] +name=Extra Packages for Enterprise Linux 9 - Next - $basearch - Source +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/next/9/Everything/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-next-source-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 diff --git a/yum.repos.d/epel-testing.repo b/yum.repos.d/epel-testing.repo new file mode 100644 index 0000000..fcd9bef --- /dev/null +++ b/yum.repos.d/epel-testing.repo @@ -0,0 +1,30 @@ +[epel-testing] +name=Extra Packages for Enterprise Linux 9 - Testing - $basearch +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/9/Everything/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-epel9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgcheck=1 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 + +[epel-testing-debuginfo] +name=Extra Packages for Enterprise Linux 9 - Testing - $basearch - Debug +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/9/Everything/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-debug-epel9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 + +[epel-testing-source] +name=Extra Packages for Enterprise Linux 9 - Testing - $basearch - Source +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/testing/9/Everything/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=testing-source-epel9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 diff --git a/yum.repos.d/epel.repo b/yum.repos.d/epel.repo new file mode 100644 index 0000000..06f2c52 --- /dev/null +++ b/yum.repos.d/epel.repo @@ -0,0 +1,30 @@ +[epel] +name=Extra Packages for Enterprise Linux 9 - $basearch +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/9/Everything/$basearch/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=1 +gpgcheck=1 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 + +[epel-debuginfo] +name=Extra Packages for Enterprise Linux 9 - $basearch - Debug +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/9/Everything/$basearch/debug/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-debug-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 + +[epel-source] +name=Extra Packages for Enterprise Linux 9 - $basearch - Source +# It is much more secure to use the metalink, but if you wish to use a local mirror +# place its address here. +#baseurl=https://download.example/pub/epel/9/Everything/source/tree/ +metalink=https://mirrors.fedoraproject.org/metalink?repo=epel-source-9&arch=$basearch&infra=$infra&content=$contentdir +enabled=0 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-EPEL-9 +gpgcheck=1 diff --git a/yum.repos.d/frank-brehm.repo b/yum.repos.d/frank-brehm.repo new file mode 100644 index 0000000..916fb91 --- /dev/null +++ b/yum.repos.d/frank-brehm.repo @@ -0,0 +1,7 @@ +[frank-brehm] +name=Frank Brehms Yum repository for Enterprise Linux 9 +baseurl=https://repo.uhu-banane.de/Yum/el-9 +enabled=1 +gpgcheck=0 +repo_gpgcheck=0 + diff --git a/yum.repos.d/pgdg-redhat-all.repo b/yum.repos.d/pgdg-redhat-all.repo new file mode 100644 index 0000000..4fb1cf0 --- /dev/null +++ b/yum.repos.d/pgdg-redhat-all.repo @@ -0,0 +1,360 @@ +######################################################################### +# PGDG Red Hat Enterprise Linux / Rocky / AlmaLinux repositories. # +######################################################################### + +# PGDG Red Hat Enterprise Linux / Rocky stable common repository for all PostgreSQL versions + +[pgdg-common] +name=PostgreSQL common RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Red Hat recently breaks compatibility between 9.n and 9.n+1. PGDG repo is +# affected with the LLVM packages. This is a band aid repo for the llvmjit users +# whose installations cannot be updated. + +[pgdg-rhel9-sysupdates] +name=PostgreSQL Supplementary ucommon RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/pgdg-rocky9-sysupdates/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# We provide extra package to support some RPMs in the PostgreSQL RPM repo, like +# consul, haproxy, etc. + +[pgdg-rhel9-extras] +name=Extra packages to support some RPMs in the PostgreSQL RPM repo RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/pgdg-rhel$releasever-extras/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Red Hat Enterprise Linux / Rocky stable repositories: + +[pgdg16] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/16/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux Updates Testing common repositories. + +[pgdg-common-testing] +name=PostgreSQL common testing RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/testing/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux Updates Testing repositories. (These packages should not be used in production) +# Available for 12 and above. + +[pgdg18-updates-testing] +name=PostgreSQL 18 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/18/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg17-updates-testing] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-updates-testing] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-updates-testing] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-updates-testing] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-updates-testing] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-updates-testing] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Red Hat Enterprise Linux / Rocky SRPM testing common repository + +[pgdg-source-common] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux testing common SRPM repository for all PostgreSQL versions + +[pgdg-common-srpm-testing] +name=PostgreSQL common testing SRPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Source RPMs (SRPMS), and their testing repositories: + +[pgdg17-source-updates-testing] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-source] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-source-updates-testing] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-source] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-source-updates-testing] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-source] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-source-updates-testing] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-source] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-source-updates-testing] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-source] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-source-updates-testing] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source update testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource repositories for the common repo + +[pgdg-common-debuginfo] +name=PostgreSQL common RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource packages for stable repos + +[pgdg16-debuginfo] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-debuginfo] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-debuginfo] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-debuginfo] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-debuginfo] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource packages for testing repos +# Available for 12 and above. + +[pgdg17-updates-testing-debuginfo] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-updates-testing-debuginfo] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-updates-testing-debuginfo] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-updates-testing-debuginfo] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-updates-testing-debuginfo] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-updates-testing-debuginfo] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 diff --git a/yum.repos.d/pgdg-redhat-all.repo.rpmnew b/yum.repos.d/pgdg-redhat-all.repo.rpmnew new file mode 100644 index 0000000..3ad4e97 --- /dev/null +++ b/yum.repos.d/pgdg-redhat-all.repo.rpmnew @@ -0,0 +1,400 @@ +######################################################################### +# PGDG Red Hat Enterprise Linux / Rocky / AlmaLinux repositories. # +######################################################################### + +# PGDG Red Hat Enterprise Linux / Rocky stable common repository for all PostgreSQL versions + +[pgdg-common] +name=PostgreSQL common RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Red Hat recently breaks compatibility between 9.n and 9.n+1. PGDG repo is +# affected with the LLVM packages. This is a band aid repo for the llvmjit users +# whose installations cannot be updated. + +[pgdg-rhel9-sysupdates] +name=PostgreSQL Supplementary ucommon RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/pgdg-rocky9-sysupdates/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# We provide extra package to support some RPMs in the PostgreSQL RPM repo, like +# consul, haproxy, etc. + +[pgdg-rhel9-extras] +name=Extra packages to support some RPMs in the PostgreSQL RPM repo RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/common/pgdg-rhel$releasever-extras/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Red Hat Enterprise Linux / Rocky stable repositories: + +[pgdg17] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/17/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/16/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/15/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/14/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/13/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/12/redhat/rhel-$releasever-$basearch +enabled=1 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux Updates Testing common repositories. + +[pgdg-common-testing] +name=PostgreSQL common testing RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/testing/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux Updates Testing repositories. (These packages should not be used in production) +# Available for 12 and above. + +[pgdg18-updates-testing] +name=PostgreSQL 18 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/18/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg17-updates-testing] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-updates-testing] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-updates-testing] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-updates-testing] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-updates-testing] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-updates-testing] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/testing/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Red Hat Enterprise Linux / Rocky SRPM testing common repository + +[pgdg-source-common] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG RHEL / Rocky / AlmaLinux testing common SRPM repository for all PostgreSQL versions + +[pgdg-common-srpm-testing] +name=PostgreSQL common testing SRPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# PGDG Source RPMs (SRPMS), and their testing repositories: + +[pgdg18-source-updates-testing] +name=PostgreSQL 18 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/18/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg17-source] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg17-source-updates-testing] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-source] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-source-updates-testing] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-source] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-source-updates-testing] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-source] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-source-updates-testing] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-source] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-source-updates-testing] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source updates testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-source] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-source-updates-testing] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Source update testing +baseurl=https://download.postgresql.org/pub/repos/yum/srpms/testing/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource repositories for the common repo + +[pgdg-common-debuginfo] +name=PostgreSQL common RPMs for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/common/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource packages for stable repos + +[pgdg17-debuginfo] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-debuginfo] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-debuginfo] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-debuginfo] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-debuginfo] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-debuginfo] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/debug/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +# Debuginfo/debugsource packages for testing repos +# Available for 12 and above. + +[pgdg18-updates-testing-debuginfo] +name=PostgreSQL 18 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/18/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=0 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg17-updates-testing-debuginfo] +name=PostgreSQL 17 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/17/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg16-updates-testing-debuginfo] +name=PostgreSQL 16 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/16/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg15-updates-testing-debuginfo] +name=PostgreSQL 15 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/15/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg14-updates-testing-debuginfo] +name=PostgreSQL 14 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/14/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg13-updates-testing-debuginfo] +name=PostgreSQL 13 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/13/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 + +[pgdg12-updates-testing-debuginfo] +name=PostgreSQL 12 for RHEL / Rocky / AlmaLinux $releasever - $basearch - Debuginfo +baseurl=https://dnf-debuginfo.postgresql.org/testing/debug/12/redhat/rhel-$releasever-$basearch +enabled=0 +gpgcheck=1 +gpgkey=file:///etc/pki/rpm-gpg/PGDG-RPM-GPG-KEY-RHEL +repo_gpgcheck = 1 diff --git a/yum.repos.d/rocky-addons.repo b/yum.repos.d/rocky-addons.repo new file mode 100644 index 0000000..e4260e4 --- /dev/null +++ b/yum.repos.d/rocky-addons.repo @@ -0,0 +1,177 @@ +# rocky-addons.repo +# +# The mirrorlist system uses the connecting IP address of the client and the +# update status of each mirror to pick current mirrors that are geographically +# close to the client. You should use this for Rocky updates unless you are +# manually picking other mirrors. +# +# If the mirrorlist does not work for you, you can try the commented out +# baseurl line instead. + +[highavailability] +name=Rocky Linux $releasever - High Availability +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[highavailability-debuginfo] +name=Rocky Linux $releasever - High Availability - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=HighAvailability-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[highavailability-source] +name=Rocky Linux $releasever - High Availability - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=HighAvailability-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/HighAvailability/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[resilientstorage] +name=Rocky Linux $releasever - Resilient Storage +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[resilientstorage-debuginfo] +name=Rocky Linux $releasever - Resilient Storage - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=ResilientStorage-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[resilientstorage-source] +name=Rocky Linux $releasever - Resilient Storage - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=ResilientStorage-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/ResilientStorage/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[nfv] +name=Rocky Linux $releasever - NFV +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=NFV-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[nfv-debuginfo] +name=Rocky Linux $releasever - NFV Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[nfv-source] +name=Rocky Linux $releasever - NFV Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/NFV/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[rt] +name=Rocky Linux $releasever - Realtime +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[rt-debuginfo] +name=Rocky Linux $releasever - Realtime Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[rt-source] +name=Rocky Linux $releasever - Realtime Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=RT-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/RT/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[sap] +name=Rocky Linux $releasever - SAP +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAP-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAP/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[sap-debuginfo] +name=Rocky Linux $releasever - SAP Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAP-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAP/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[sap-source] +name=Rocky Linux $releasever - SAP Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAP-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAP/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[saphana] +name=Rocky Linux $releasever - SAPHANA +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAPHANA-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAPHANA/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[saphana-debuginfo] +name=Rocky Linux $releasever - SAPHANA Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAPHANA-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAPHANA/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[saphana-source] +name=Rocky Linux $releasever - SAPHANA Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=SAPHANA-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/SAPHANA/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 diff --git a/yum.repos.d/rocky-devel.repo b/yum.repos.d/rocky-devel.repo new file mode 100644 index 0000000..2e38a77 --- /dev/null +++ b/yum.repos.d/rocky-devel.repo @@ -0,0 +1,30 @@ +# rocky-devel.repo +# +# devel and no-package-left-behind + +[devel] +name=Rocky Linux $releasever - Devel WARNING! FOR BUILDROOT ONLY DO NOT LEAVE ENABLED +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=devel-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/devel/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[devel-debuginfo] +name=Rocky Linux $releasever - Devel Debug WARNING! FOR BUILDROOT ONLY DO NOT LEAVE ENABLED +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=devel-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/devel/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[devel-source] +name=Rocky Linux $releasever - Devel Source WARNING! FOR BUILDROOT ONLY DO NOT LEAVE ENABLED +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=devel-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/devel/source/tree/ +gpgcheck=1 +enabled=0 +countme=1 +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 diff --git a/yum.repos.d/rocky-extras.repo b/yum.repos.d/rocky-extras.repo new file mode 100644 index 0000000..399f9b8 --- /dev/null +++ b/yum.repos.d/rocky-extras.repo @@ -0,0 +1,65 @@ +# rocky-extras.repo +# +# The mirrorlist system uses the connecting IP address of the client and the +# update status of each mirror to pick current mirrors that are geographically +# close to the client. You should use this for Rocky updates unless you are +# manually picking other mirrors. +# +# If the mirrorlist does not work for you, you can try the commented out +# baseurl line instead. + +[extras] +name=Rocky Linux $releasever - Extras +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/extras/$basearch/os/ +gpgcheck=1 +enabled=1 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[extras-debuginfo] +name=Rocky Linux $releasever - Extras Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/extras/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[extras-source] +name=Rocky Linux $releasever - Extras Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=extras-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/extras/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[plus] +name=Rocky Linux $releasever - Plus +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=plus-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/plus/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[plus-debuginfo] +name=Rocky Linux $releasever - Plus - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=plus-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/plus/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[plus-source] +name=Rocky Linux $releasever - Plus - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=plus-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/plus/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 diff --git a/yum.repos.d/rocky.repo b/yum.repos.d/rocky.repo new file mode 100644 index 0000000..e054571 --- /dev/null +++ b/yum.repos.d/rocky.repo @@ -0,0 +1,93 @@ +# rocky.repo +# +# The mirrorlist system uses the connecting IP address of the client and the +# update status of each mirror to pick current mirrors that are geographically +# close to the client. You should use this for Rocky updates unless you are +# manually picking other mirrors. +# +# If the mirrorlist does not work for you, you can try the commented out +# baseurl line instead. + +[baseos] +name=Rocky Linux $releasever - BaseOS +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[baseos-debug] +name=Rocky Linux $releasever - BaseOS - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[baseos-source] +name=Rocky Linux $releasever - BaseOS - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=BaseOS-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/source/tree/ +gpgcheck=1 +enabled=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream] +name=Rocky Linux $releasever - AppStream +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream-debug] +name=Rocky Linux $releasever - AppStream - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream-source] +name=Rocky Linux $releasever - AppStream - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=AppStream-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb] +name=Rocky Linux $releasever - CRB +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb-debug] +name=Rocky Linux $releasever - CRB - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb-source] +name=Rocky Linux $releasever - CRB - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=CRB-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 diff --git a/yum.repos.d/rocky.repo.rpmnew b/yum.repos.d/rocky.repo.rpmnew new file mode 100644 index 0000000..a8f8c6b --- /dev/null +++ b/yum.repos.d/rocky.repo.rpmnew @@ -0,0 +1,93 @@ +# rocky.repo +# +# The mirrorlist system uses the connecting IP address of the client and the +# update status of each mirror to pick current mirrors that are geographically +# close to the client. You should use this for Rocky updates unless you are +# manually picking other mirrors. +# +# If the mirrorlist does not work for you, you can try the commented out +# baseurl line instead. + +[baseos] +name=Rocky Linux $releasever - BaseOS +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/$basearch/os/ +gpgcheck=1 +enabled=1 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[baseos-debuginfo] +name=Rocky Linux $releasever - BaseOS - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=BaseOS-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[baseos-source] +name=Rocky Linux $releasever - BaseOS - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=BaseOS-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/BaseOS/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream] +name=Rocky Linux $releasever - AppStream +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/$basearch/os/ +gpgcheck=1 +enabled=1 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream-debuginfo] +name=Rocky Linux $releasever - AppStream - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=AppStream-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[appstream-source] +name=Rocky Linux $releasever - AppStream - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=AppStream-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/AppStream/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb] +name=Rocky Linux $releasever - CRB +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/$basearch/os/ +gpgcheck=1 +enabled=0 +countme=1 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb-debuginfo] +name=Rocky Linux $releasever - CRB - Debug +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=$basearch&repo=CRB-$releasever-debug$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/$basearch/debug/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 + +[crb-source] +name=Rocky Linux $releasever - CRB - Source +mirrorlist=https://mirrors.rockylinux.org/mirrorlist?arch=source&repo=CRB-$releasever-source$rltype +#baseurl=http://dl.rockylinux.org/$contentdir/$releasever/CRB/source/tree/ +gpgcheck=1 +enabled=0 +metadata_expire=6h +gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-Rocky-9 diff --git a/yum/pluginconf.d b/yum/pluginconf.d new file mode 120000 index 0000000..3492a32 --- /dev/null +++ b/yum/pluginconf.d @@ -0,0 +1 @@ +../dnf/plugins \ No newline at end of file diff --git a/yum/protected.d b/yum/protected.d new file mode 120000 index 0000000..205d480 --- /dev/null +++ b/yum/protected.d @@ -0,0 +1 @@ +../dnf/protected.d \ No newline at end of file diff --git a/yum/vars b/yum/vars new file mode 120000 index 0000000..382042e --- /dev/null +++ b/yum/vars @@ -0,0 +1 @@ +../dnf/vars \ No newline at end of file -- 2.39.5

Q0w@dkhpG2Pt4NxBb}~ znr5EOUQ^jmf9LSR;bzv}is1hwHp2OCH~Vu%&NGJ7ztrE@C+PDPzl_+MpJj$gttsiB zb075c*#o8TORd#?5%-4r@l))lM`Ght^W0bD?`vRtJdRl>ItDe?pCP)5bhXP}DSI1? za|^3foHoKSst%< z$n+-nNGx6u`w>+9gmoHEhzG#r}IRoW(LFmWsO#26YZ$pxEJbKCpBw(uW$Xe zA2PPi@Tkbze!D~FLC}|jci-mplX_R4!>H(G)AI#93faT&v4^_2N##0m7Z0UoFRpfM zU*UPNjT!ECH<)^@2UD`*0*_cvszz%v@c*yl{-NK8=7*XdSk|B1QhBdGW&dR8mUG{< zolxi8CA>x+AB0*^o*QdH_xdlJ*wME|h4n;P7gjYIoU66Iwez=Q%9%QI<~KDi95AR6 zm)5*|M07-@?he=p@uRTA$zN4YFVD`U9bJ6M*#F=A-y7Z^nArIv=OYG7o}$bl#^x1V zvqaBg*9!?W3EO>eSVtLOLf zjDBoU?c3h8Y0h-18KaE>-vKq)q4P7|Os$cZ#A_ZCy(TnI9y}tlxUBuEUQqOa+&60y zG(W1f;>XDSTH+F4Auh2d)$2`PK>Hwjqo0MBAqTw1RGnwn$i~D5#$TG=^Svod+B5QJ zD&HL6?U7hNg}E4gcdIZjmA~~8Y`L;;=c+IFmzh5O?vAzPzRdsK)K3yCM)z)T?f~P% z?BjSidBoVOe=Gd0plR}rqQwB55l@$1-PUW+Lnn2!Eu5|R?%m03gVQoEu<_mznGq(Q zuh!}etHXE2o_q)UCpP10pcCftnY+<6@KbF2^e5+SjE?i>crUauXe)Nd8vV1VVX%0r zRj|o*-21z5r`Ue9b*Ex>jEP4TK1Lll_zU#F{G+x%)mqt~*B4$lJsl@kDgR|MXoQ&^T));nE1xMsrf#vxzaI^uEDXAzhImV z_1F?On}hwJm)Z2itiT)!%K3WG`B|x${~px%@%*W~zw!2)=kzUUIm3MV9?50nk?1A) z(bNERNY#dM)^^1|ZB%ReWi`ObTx(`l)&+M$Z|7|e?(TxEeSJ0jYYXKc z-2j|hb&sdPc3M-Z)p-p%adtdA);fK^r(#49>WF9B*;^mxZ&mUEGW>oZ>gk%m1@L8v z!SWyMf2?m~2*ke7@so4BbBsMqj2eBXJ%S#_=6Sq$kzh|Tesywmq3{c3T^;ZobWEm` ztNPYy9}X-0)|_pRBwdeTW1$yim7cv6K1iRSH)Noa?c;OS?|v(O%V3u74tEC=*yV~si1(5e~MYOU&N2NV?^3(u!IJY9Ucf$-^$bk8;KIL;j>xFw9? zH+VOjcn<54biAl8#p9!L4~qRy9mIT=_Qlj1F`UaCXL-EC+{?6*otb-Tyi#Hy*nWRv z1M0k9-|PgDnKwZwEcaE8kM+sK#J;^E!#@IMg{G59!CfY|RSUgC*+RRbYw#%Q3RFD? zF)%56$*22ZJCUztHmQkFy^eTV*|RYScT6aCgtef0ft{`EiSH&!7FmS`YS2 z)icxuPnvp_zVQ}QS5xPlq~g-x159~C|n)d zR1Xv%Kz32-qbaeiL#X%riyhk!m%7Q_WO`297cEBdXQ^K7SCKE!G;l#^F?JfAQN~tm z@CF##emMWQign=KpBBvI(0LZRK&=(eZb{Y2loOk;VU2-~J*st;vj((OAJiKeMa*{b zuVE|Jq-Hetkvc>AAWeG~hl)p7Z!j>nGQ8HYJxbpP-<$fV(M8*@)FBm1+3NiowTpb_ z%T1$!V@bV68vZW3UGx;T=Ji8wxRPmAhy%PQyh+)j){1^0RZY(z?RG6o{~7$#VEvsE zmMgQ}Cp+^~aRc@!-40r!U(-5o=NUcezaTdD^AK3;Qa#btp`8WH?=nWj?`}nvj=o3q z?1)S_0WtyD@3Lp|`?ENioqsi0Vk-x*#%`V5B z`abyGHj^QtU-(zyWbOwC_ld9TYJhE$wYGiP?<_H^!=Nv^ghxvLmo^)pd1vLB z*Lc@>T0SpG*#^gDY+p<*vco!_88{Xn__)+8j6vZ@k;9kbU3%qunfOE3=w>5_H@mj) z?{m!1(RcS*{8_AJrk_bNr( zQ%t|6Thu{h9cvrVpKJUD&L`z}DQ}0R=E*K8Y&JQ~&oZ9rp&OJ8GIeEs<-V{H)PQ{s zno;`q5^t2mOqh!#RzGW3_DcQWw+xfNTIc4AWvj@JOb?A6&v#*K_q29U4u{bkd zIJTFT_ycF*9GW&wLk!3ECteg>DgHR$3-+_Y}J-1jH+qlZ>IZGSNUuZk_u~ZzG zG!x;bG2gIBtrh)z6k6V7zt0hT-=?OjImsOJoSpfL#D1e(ZPv=>0e8E*U0n~;H*5F5 zBCx%Fqar)!mo+Vn5pmve|JcqyeJok6Y(ivO&&^risxSJWNe_(2veuokGGcJO@0%GuI!}~OE#v&THl`hE`GPv>hGqWd5dp-(sNSt(Z_&A8`1IqMe$enIpU_dF=PRN_nA!|9lW@+<6zGPY1E$-U6dImkcM ze15yDYE)>$JLu=qv8-FODt*Lb&i!SA9)`cpX;*xl_tjicK&TMqiti<(b#?)O5Kg_ zSQyqD|Mc|O)?*JYjSxR*IOJ7BLCrfLfYGSP_D9$IUx{AZA~Js^K2IB_v1w(A>ni8s zLtwWfC&D`=U5yHD9yW4qUsY}Nj>KUolP|}d0@~+S!Eard!p}b-*=o+DQ?8SVW6TS# z6Z+&?d9i0=3-jC~%)L)5+^%eR$iQKR?xt6+M{=X_kNSkambx$6Cu1{~emK*CcSM<> z*2>lzm<%*><6_Lf(sWB(=ooySwoqNFpN_LF_!;_K7ld=g-k?wSK;c%?hjNZ@Yt@eT zY=35tmNW~K&pmuqYLpDx;3HP?4dJw{DpYr3{$r#g16)~a9T!4mx!1jkNsTGS-AK4E%1 zPwLV^l9*|jNWC=kGMmHy$oWHF0g=u23aPcSz3)u{!i2H*3 zBvwQIB5tAPS+!O?%Nf?n4w>wzHSc{>)4Pwk>3}|BZ@Cp7FL>B!&jAlXKJzXDSDV5mkkYU@ooO7eN;Aj z;g#a+Qo~8R{hi`FMQ#6F5sij?27#eoZgmRJmU9GjtdDhlJQMQTXBiuh1%8p(5AVbF zD|=-#qrnOOC;khuKIViL3-0o4#+;#FrRt{g_-V%5^_kcEb~flXZ=2DBGmEPK7t9Bg zLtD47Cui?vcX+&sX$QJ>-{75Wxor9pSt#z4ND_u4> z`=IG1pNKqyzW1`fSmH}hA-=RBg{Ps`if6xS`I*>tywlDp*BL?x5CKnAHp9@eQ$NxOYDL_)aC>g*p~sL})vov+y*J*ZaSgI3(ppo%>Im34P~1n|cLDim%GM+vVDN z_;*qmHO(C5Pq7ZCUBT8QZ-cJk`?g*)89MzsgMBouG~dYTzFCXIzpb>*)DP@(t!+ju zCdz8=f%p%-xrRT|P3A+@I8Q>qsI`i5sdbg}r#>}9I;3)jxy3dS-i?SoEk$F0VQES@tK3F1r(ahZ$<% zeI+-DSE=u}8K{Ko0r>n1=xhDHUpVO*I=>fR;6d1L-6G|$q0j5Wd!l=Qo5XXT23yYh zJ4>SrM7}j)HtV){kDLkR`F!B_@=Vy@HzoeX&{El-0NM_noA55%!Z{V2)2o>k&ocFI zYOQ#)Z*1$_I4@7fOIM{Zd~U(4b8Rc$n!DA=u9g{FPu|m2y#_p$nfaNOJ`v1VM2)dN zpR3^KYMp+tXZtcnMhe&Tec+l-%-t?>hVvlG$#x^3Kg2vo{hWnBxzO>Y9U0ESR5dn( zLd&O9uz#h?a?YiRtv9F+uMk}@8u_oX|AOdNY}woFUMoJ%saVtB(ZAIu-^Ro$=Y+O@ zFiFiWS8Fx9{G?oSGaGkgJX-Py^iMnII_I=}U_Gs_V?4p>D|f^@omreGb|z))wqiRI zliA@b>ArZjyIFjZib<%94MZfKNEV9}e52g|lk^o+i$S z(fyTmah1>v92eB`nJI@fqpAuL!Kae-1i>$>a1v zHlqer?{ju$wy8HzYo!PK#J2COW6sWOss|P&?*hl;^odE&Dn_c-N`{<-K4{9HQ*aln zodb+7Ty|GWEQPc&r8LFJ>Ulwp@Hlk`aS2$TaQ%X5RnK}VK0v#7h`K6O02ebiCjk-C-mA==I_ z!?~7>iD?~uT&n)Odn&fS*SGU1=}T(9cKw{hJZZo6Ol-cg!JBVi6Y*&+996vN5_rXyXeUE@!7w*3tKT19=}U1J{-;9!R&y;v=12^{Zz5JnlE> zSn6iJ`v7=~vXMmjZuG9vJM~_@vAxUQsWPL4_tluSHqxlbV#v2EJSu(-V<7d>^TKP? z*F#`?Gj2@XdQ@(O(CTy0NAoc2O5PDP$-bVcd>6!6)|PBsVnpT=>Hi|lkIvm?XrM>Z zBbkBEla@FOL&uFjFIwARN^I++GOaSL^k)uewN23^?j=ZJFt#pPJ3q*El{g;Xg|p1G z9jn$#SME%9n*NbSXm9P$vWH9a&am(iLx=4O7R&L!!5&lhavJ(am`6ARFEc8#=W|cI zNc?wVl1xJ0S<_W@_%GqLe}V?+qwx%>Bh*^SpYE8|u4UAz=M0LiQFZ+a5ln@WS0V!{bZGBc1@dLNAzFF(X)m$9Q=kwbY?CfdMc@O?BustW` zPY{{O7}V*Ql|a3GHhy=xKQiL)lAfo;+l61gL#!2ZorH$PkBbYYmV-Jd;xnOxx<*eK zdML*)85^E>`?_wtUEwXc$2W10{qjo3HOI>gcP^E?W}okixmS%GJ1cvb$+hkEEsl^{ zQ$8T(kNBsS6>6<`WLADwUdzU{B`dGs{hB%Hi~$}A`eY1nS_%)Om@OLr=>5Rznk~Mi z`H30ZTemL!)Y!w!)#_TKy7(&b>xmUMtrBnH+4f1zHhn3djv?=q+6nT0*OpzS&ucQ) z`%4yQp0)>ROl;}G%z~DmT_c;D?wjjt80Rk1N=Z(0822p?lL#NZ|k+RD4>_ z6I|ge#=BF;(MPWLXNoT1-nN!(UhIvc;v@R$9a9*sy*wMcD97p@Y1{X7ZBPBpzN*os zJ|Z49V~^7vr$((sZZ!7IT6r=kJOs3xErWa;u;m;zgY0u91ZUwoykH zZO)=~#?A@qj$Sa*1ADHk!@G=rXN*F}88%lit|#F>wq%s7+Xng5K4@?JuX@OHK4&s? z^beUIjPIk?>K#|)EuQ>%=MJNrIG;<~^DQ%3`7X}61^dlKr~lF%Gov>v+aB~VDHY@W zF8p5dYowF=QJ=$FeG2_S(H@~&{vG~{*qoG&LCW7`AH+GNG1!(f+}0vDC|mB#&o!~Q zDY2b*^HN^dvEP860vl&;3k|Au(6iaADt>nl*q?S**B7{F&3D9(*8FviH(u73(NEp5!? zrGjr}Ykm}cWagKhiu{q5OA~y1{vC@QO>S;Q@GJBJEC0P?&dzyUmg)viSP6e~ zwPRY;RsTqzB0H={Q;rGz#)bENW|JXFvA8T-j9z=Bp?}gYJ zyGph%esIT+MoY8&qcZdT5E<^Xjoj`QsafIjUapnl~VYR|(a%rkFZY;N$4 zUxHsBwD5$BSP>*?Uxkj!FF17@R`} z^*s7_JLZ-NuaPF#h1W?R%3C<+pW>fnE{Qt-w&EMMfp1ty*_MIWZ^#J(Be8R$`mpGu z4ag2Ka|2g8D-B=oFIgMu{tC7sF>tmgHb+4Jjxi1TcRTz?jh_;^^(LRvGqJrnewD@P zS{$gJM9PZJp3T2so4wZb+uny61Uk=EF8#{X-xhPWu47Cpr}=T-Vo@^Ap!?<)r)m`2 z7QQt59OCyk^=!li(sy*TbF(>zqfn!$`JzWE?_c(9z0k z-6lE8XPBcb^)mP&MZ~m8^Kez2k?7gfzg13jjFfYnZT-?zf2yx}Fmi2OVi4Ooq(5X% zG0({aFPgs2Zu!|_4{%n<^ZxTjFC3TZF`pX#pXv9czjFch#{I7?*%|9sU=A|hi!<_i zVFHtW#~vvRs87P}_`BlwS^l*Wf2+mkZ_QYGSd1!8t;cKg{UxW+53+hJ@SpWL{1Dr? z5a!RC*#399?<60Dk2}{v4l~X$0X9Q*xLKa_CH{w=?!$2(>|xm2=1x$-LT4=m@lN%; zm4gzc>ko!3+8As!y$?UON{_jz@gLK%Xa9Or||+_%s1{9W|GHTZ!j*&hwtdY3Y$zxp${)Y5TpL?UfjvqQir;2b<>g6aYMS|b@^@3OzP4mz{`0f*4K8AB-eQ%1ggG*N=B42MATAhLv@JCU(?#8y z)))IS0QAS_DaSUuZ;76zzcw|x$oNE^6BT#jXRc21FZGDF^VM3}Q4>7Y0)@^**kfv~ zV)C?ewEfQ>D`LE`Pj*rTJB81$E!sTJ(V3%-UWnWug(iOhO>&MK>8%E|RQ9dh-jcBx zP>b9XOirKk$N7$wU24r*i^isgq`{o+ir`7{t*ATZXa6Ae8{AJ*OMAa70*l#l66P`K zGc5bx8jR&JvDKTsqGOe<#r`RGqsaNsAm@o4q2ujp4I6J$Qxj(u@x6BRt7&$3{423T z`ao761pFELgS4IYMrsxVV+cp%pO%5d8ySP|5^scYMbZF$#wS9RYg+`NFe(}(zU|dG z!ybvn)Oz2YC$&S&kJQG$YNloQt)*LyAE(y1-(wJiLL5WuyG}S*{#FZocR*Ipd2ed! zm9x0GcZ8k9E@F%#lWSq(A${Zj3hhy^ZB5mTEpe^fgM`gqhUZh>Zpd2MvMSYoHzsFm znSPC&g5Lk66wdAD@MM#}*zR0p>Qbfvze4v5pOv-s_CcywZhrnr@R6$h7#PpjaY*m# z!VZJG$Xt(>fpg>gRjn!ReO7Lkxofpncl~qApG{1!simEVc(-%6k+JPjf1;ns_^`g~ z3zG{?FP>VfxWqE#S;%+KA#R}7itl#2d(=L$pX$)!znu~N40}xZ%VR@}BR#E9Cvt$k z!^Qr^2Cx3I(q)F`?=B9OSR!qHzL(xxo%4{9y?46GhvH|B4URRkx@)DsmA3Al@P^8H zI*3PIA#_5!F%Dx>cf`32+P58DwDpJes1u;Ab#f2V#s(u}iD#>4m!DVRsV4B$fTG`u zpJxnzY{A<09a4S`oE~G}_H+*tS<1N{W%Sf*AK|O$TjR&AgKf_ur8;xCkMhc&ex$jmu6Z+SGjy^K=lcS^2#-?po$cWE{!$6<1?cw@e z^1Dj@Xc}_UcjtJvw70i~TOl`u_JH`j9)7pNTKPWvefBi`eKPL-VCO~Q5&8lLdv*rI zhIoV6)y$imp6V0ni28ZHBV*mS_{TsOsONXhsX7hPQrq}Ic_wjV9?RHS9xrAlR{aW} zrwmyU*!bbLz@F{c(B`k#V?MiVY|YaV$Ylb zd!sHs#?8q)BT zSk3r*3OeFhZ#Z<8@bad}wY8eaGgj&69|hly@ks|aFgu!UdM&rOUzwVa&x2V8r)YVq zUi7={g>t7nXU?e7d7OPgDD~tHp36RB-Vrf*7`NAX%=W1DrQJyVQua4WoQMDAx!B6> z`PnBVE=`^FOfU<2O5N|e(CU%l&c%>dp>qYkd{^dviC@vT`qo`+Y!%M0)V%X_tnjp1 zquVKC=TeP|*2^8efjb(Dx@&ztpM-xl@_Z_0)96_4*vxXHvqq!FN$Zz3DZl1v%)8Mr6 zUIWh)n%kLDshgslT$ZZW9TnNxxZ9H(O}*}5?;7b5YdD_LVe-tPi@ z(a3#We1X?s6Mo^WGdarrp2b3}i-(DQ@*Biv=LQx(b7JOR<40i5wT=)Me zb!=8)jk0EdIBB#`XnWl5-EL|L)LQAy@s5o%eC>X1=%-@}rzl%|OrFCtf67}T&mmnA zKVRSJxTqTYv~r2ROZt2xMSJHsw&toj93^sk$QgmSwa50aP|*DnJvOX=t?HJlkrL_PXGyHb5~D}v`yGlSd&{C%~CJ@0fmg7Z^I zOQdJDR&>jFl>WO~tG`!=o5a^3Ej<$NH$B2>v^M`J;%q8E+dm#-dXT4Pr&XihGu*`_$!nzJhPuCy6`ihmSTszr<1J;yn9j`kLHm zSPTuVmc5b2zvvd7Y2JN5FdH={c2cnWzq@d^sb8Ir`AR$!%9DEn>mzrJZC++%!TPFq zC$|496E}yf2%Rism1)bfz8|2M?Xo7 z!f|SxLHQKMY02(?W#JLYk&)l`5eiXzK8;lUw;+%S(A#1JG8t=%O z-r_FXmzTBv@}?p&Jk=aVwN}{U*k9v<9I*fpXN2SRuv=CYZG9GUTI4Fv?N3?qaMT|Yh9l-*cn33v7RGC)DWbS~9g(v3g>mUybKbr+gh)T`;nAs?a~rhrRsT$GIkRjj5Y$ zS2#>;yiTs@2x9{rS2)hp;}I*E{Kz>SYE6FJBseGZO@`w63!{Z5mv;=XXBlf{j{fCn zzKIXFLI1w?Wmrp~dFrraNCmSF^}zYF#6B5>m)Tjc{v&5)YW^*tn@`8YUJBk4ef=iw z?MU&0*Z^YRDmk+~RZlWAuj&@=LEPXJsWnpe!+vMJ-?&&U2NzCcS`!_zMAV0`mBR1NS9`{S%O6VZ7<}QNGE-ugH}7I$-PsbPR!UGS-Zlk5>Hr*zmE@YG5rXQS=IZ7vkK;A7G&tV zHOD)$-%6j=(-o|BVxD~B+qy^2^U{7?AE%Gui!VS|I*+g!b3jhRGs#o6k=Ccktz>GA z9A?~A-_Zo$=DY?~W&}f(Ip_PsO?}t4Vt>iAFrM(o(4GnX8f`mu%-O!1mWi$BkK8YW z&OZm8{}@`o{$k(enr|yk5`G_wyNlf0MW#)H@6!cXK*Wb+T&r``-_%P?LcE&vMn93Y zpgJE!EQpc#J4~>qK4BkIM-ibXQS0u`QD>+)?V*HSs#bQ$rGKKc8MY9dcON z32I&C+}8BT4UMq(L<)efsmBN4Mz`Qhh~s3>T=n=LhCO#o`4p?;)dqiFt*e~Zu;-C+ zt;t0;re>{j-q6w512Leki?1_&y;>{X`c3!;vGLd!R`zouZ?m`n#?1BEawZ_{{J!}6 ztbAid_5yPfIV>F;`Ksj(*f7dA{;9az+W2jf{>)+*`#5Mi*`W6l?9YJ%4Ftq^^(k&I1mi*d(B)i5ZI_`DDrB zA?)yN-|ke*0?_urpzwbtmY4;OG2e@}L4#*|2K#0&lbGQs*sk|^-79znz}!eI20rWh zrptGkC*@knWMab5W_BQb%loKNR`uJ{!j8bcbY0#xr zMsnZmiI|DL0Q!ui|F+VPsceRo*bmQ~wA2?q1!XvAOC1%dd`&k9p!>Z0yrcP<1=G+G zXR+)!bCY|c{5&NbYHSk9cI`v02!0kjlRQ}V*Nf~TT`kQlH9eA?tFG-9wN`cuZ6Q9N zbaiO4tI0{RFPJtJWzp!IqKzJSXxAV#`GSX&`Nj`oU3v{Z&p8EAYNqXE)RgKo?+c$= z>zA`r_1M<{Erxf*yF1vmHOV(5H%N}Y27iA%uy^!K_>A?N>>0HL z#ERFt_2CLG${!%e)LNYs`OfeJgPx?tcULRG-zqE4Un=ASW2a z_n3aDA9FwEv@R%@$|Y^{ypyuq8;d^+?a|k39~>jPX(VERee%B&I;Z{cP$f3|7-YU$ ztMl3J&>vL1_878!T8FZSrC9m<_*Cu9vH9L&x5KVD^nM^i>s-&+Xsq!mRs=RCv&*$u z1YKHoF**8e=9_5OQe=WoC}Zpo+| z{Z^ctTC4Z^$+vY`mlrIKbZxQLVAXPllzv~@U|Qz0XH(lP>;olVGk&7h>a5n~)**+b z))V|GEyzc#?`0j1(q)Y2|3Tsg%xQk%d@1)rSybmd?eN|i-(U=r-=$x(I`^`wU&VdZ zrg9&w>(etRcSbv3Q+GEW)1uF=_4!G_d{J%$9sVs;QV6heaDCxq*#wo!|0& zL)+VAMjrLuo=u!@djnpaF|-Y+JtihC$kthsv30W(ya}GBw?)AsgWuB0wX=1)10Pe)%ys5*Yrfub~lj7kYhBaFwxFSx=(v8DKjI_ACps=X(n(G0Yxbzp4eOby0Zf z^W*(CYDU$kCBCnU`PBR0h`wtsdbW?8ZEu|0IrvB2 z`r72ll{Izi#zy$C#;({FHy1g^_wDDT=B4_aCC9z(X<9C8B~Pw$Z4Km8(NiWr-YvRX ze)lT;?n}tK(JxyATf*}_6aV?D<$7~IGb{M31?;ajUn90hH9p@e^?c6p(J_YsMe9G( zf7f8k$IB8=BIxpqe1 z)jF2n&+*SOF@&ek@2~H7Usz>)qPC^OOs&Yt(Ll-fQNGP7%`tO-T4h^hHUBd9(yOw! z(K*}GF(^{=n`k?=$tk{W2b=S3?qoQ+-EqAkj8~jk^oAk@|Gx69} zMH^qbD5w*hH=gs<++?NW!28?cZ(C3%5YPY88^QK>p){E`RSW08Dv8ZE5M^);YD7R}-$$T-M|0QI5$J|0A+dr=4 z?>@zSMQ%atlRWmYUuHgr4j3JMEBhsez*r?~hP6CF&R6s=dH=5PE;9$`!<7CVhZEI3IBL6w0UH$p1Cko z^^MeJ=f&qq{E)h%S-4VizNG)2?rf3gv~4>1onVDQPHt*yT3dQY_>22*8x1kNkjx+H zGdwD`yUHJS1VXsnmvu@$NR1Uomy(DKv zdwvUWbtw0~!{>kS{ww%4^n=jrDmrc^{yrkHSjT;1&JI>O{WZ)y)wW`Xe24r&I4g)c zXOm<5ou5R%iH>zlt<+T91DX6=|F;HrrBB#dWCH76Ci!<5y6O{JKfMUNYn7u!T^#DM zwSKJ4`$C^6*nyp|>;%TLs!CNQ75A95uQvZj(IZQsN9z5F@?N*#y+$TWML#y7ce|I@ zPRA=S*ZU8qu5VTGZzA8wkM;gI(J5oG|B;n`fu(rg4W&u)9MaXq%xxwQ#aNuqO&o_g zhWZ@FJJyC_@0F&F6~VnG=6_V-C=-j=p4d1^_h^x+32DkJY)s0c=~)%)V153a(8mAQ z#QRLY%$M z(pxiUmDDOzz7cO(%bY7Co3m?^yG+GkaYxHMTc3j&6Xuy4^39s*oa~$Ko1zoRgKDjK zknvk>tDtAiV4~9R7$Wr9)I{v@&fF*VQ}4GEem@BOzQb4Zl5T2cwG#xZL1y@h9whuo|8{~ljfq4U}C-<1qU4ZxqHKS$b!s*7JXIpyKbsU|KLrRoHp zC_G_!XG&~w?LKvS2)(gag0=B{M+f#B>(I0;QfqY%kF|KLg^pRhRN=3eL7%i~_2<=E zeZID6>&c%guufRb?xbC({p-<1+qXr$cOAo2Yn9)5#2sC+4f;#Yl=~!))M3_)+B5pO zB86#2zW7`2Z$>9>E!kR#oBh8?-NkaqD8_}fPFL$H=baW#hp!@g&UKEe@u2=XCVz~n zCoKENDc=f0t*1K}eyEDOKAO4S_-j+63k4?``*fCIo{rWXcf%9aKGzH03#P{wJ>8&b zrC+ASwr{jo1<#~6_WU9K>GR(Ute(>|ciOQm-v^{v+~vCvHiX5hnQ0t0pgiWRGlZD|2IA@g;C$^!^i7yOo zJnED1{ZM>!oH=s}dT-ar47<=751(DFRWC-z+<#5{^Y!3$GuxCwK<)Ch~1^=VQR>}>Hp8v zm4Hc6ob6uNo$j9Lnd#|iRA6NnBEljnC>|sR!3!1f01?TL3W%a+BccLgJh&D$qToh3 z6pdHbBT)obMHdl4#UqA*F`fvB7rGwc0l2RFzwcL5RUMu@fBlo$p6aUaKHe{M>R>DO z%_wXN^6UuD_J6fxZSCKD*Y>Wm{EOb*be&hO{pFtqnHOD>rRyKlMZv)=fuvTP9zRIf2$hjxja~DJ_KUvIhZ zi5}rQ)@JSebo!WDCil;(dOzCX?2*@g%}24-M~kve#y>qG|6BQ6#?m8qn&`W$pzr!? zOnW>ha_5N+e=8K^$nZU};Ynjn@jY>S?Ad`#=<6y>IqD|%mvzJERd|=~Zg2M_tSQ4; zQ^$QWesW^L(!kID&nBi+722MHUqjVX+yk4W$ovV1NIJiY9ii!OZ=FTfmNZk0bWb}Ph!8^{|Wh%CC@@T zocY{?`Cia>UuA3^%jEo2<=5a0U&KFsN7n$ahP-ec&aeS}n$$tm*9%Kn0jKz9b z2b$TJw|KqaJ%rNJ-7i>Os&8bj*3Ok46I*#w@2(gB`rpuxtRL3A$#@rK(Qce)f6NT! zxzPr@I)NMZXaeu(V9*s~JAFY{-&gFGb096%2cL@W5Zd;CBeroj*qK?WEkXPWw!K;_ z9rR`1)?GLHr-?i~6~Fs_@P43unMLvM1%s4x?JIK=g@!K$4L3XEq(7JW+~vU}v5SVI zdK^85#$P_H@K?E0%IAfd59JK;b?4V~7ZcAM8`(Yd%Js_WION1!TZO*U>s`h)%AF?g zrdq3eUsQb8s`BiVDiy>Pq6&umfaGUvjw zZXRorxo5^CThJH7vm#~%W5rq~bcsGPvL)@lX?*sX(J`jJXrRWb#reGHT70uy_;&|kb~$y# zK>SvHP%XNWbl#lsxrUZ{OwND|S8Lfb;?>u~=2ZUd9Cw_l!@nod=ex?WIF@7L%j6xQ z7lLCGGdOxjHlKK(f1KDq$HM->JUgS8U&$U_HVyB{7-?;Goybh~Mb>6N5xaLAI+dipx zi~lvW!5ERo*V>twRr+RjtEt6hZi3GwoiyYYicPx!=UIk+TmAVabRjbrhX3rR*6^u; zL(91yIv=z%F>kKPw-~Cd_0lxP*s`V#&UMoE!0h5{(z6c|cJ2>UZf+3PHPLGhXF>Aw z5uVkd{k&bqmY#`vSJn-(-u2T8+sDy8?jGxY@R`wAsjZ?seqP9xg6?b9QD$n-s@C&xMA4`ma_Heh1#p>)I{$9?CclV_Gq~s_` z8^cmIroA&|XL@dR-ZH<a;YFxurB;;1k?wRX9TK>rC8NtJ^BSOFG#QY{0ZtmFuYw z=8KG?d_EcPLVNE7eE-Odt#z!2{jX^(a#alv41DLFyv5DntV4dM8qenp8hvgn@+-{D z7tY8aEwLAd`QJZcP5H38_?mpqydluujW78~@Q9jGf^%4xvozl^wlfX)LVjG|-GKDd zViP`vbLL##6Y%`icz(CcM$w79_f6={p--_DboE5xCxau@KOA8Ef?koGm(l2dUoj5P zA+7$s@T9Se&P$zdd>qV}ko>}b5qp_cP|yDhY*)30E<@~*zJRuMJES@rKCN^17J8=K zs0wXf=9RpP9nnAix3|gkK5sAT`Y77=(~MutdM7Qbfyr-T{tc;yRB!Abaho#s;Ol#= zD_Sgt7ErXluV#ny@dS zv=|&eVCfk9XL)dm&?ooY=+_AE^aKrbO7y;MK>kR_Hh&1;49~@H9gXiZSF3g9U8(!c z-4WZC^O0%KGk&i5omdk*w`1_%&VEM|+g}nc2@l6-oP9hsdr1icnfCwt!uyORhGn)s z;gEU;H zm$|4*;cv}HUCLtjd(eCdj|;f9d?u}}G4ZY9BeWrJdy1=iJ(ztQn3%ydCbF1pUGiN_ zUv2+ve}maRFf|bUO_0^F**-_F7G>9WAcD`*U!vAXy*qo@`(Vu;_65L$<@?eeX0NW+ z3nvzBeikxcLlks7=O#U9c}*r!`#H!Yl57aFNQj8V;|OLE5!aR zhyB?J8B5Iz>q?lY>+w13_w>7{HBJgNaI0(Q1NL`%nmlPs0()v~v_g3H8PMKMo;pwZ zL~r=&-Zx2UBVZ4$maefDpVqu1w971~(h2L{`JAaa+DK5L&wu7T`w-!it@ zO!PC7_ZcfwYt=vaS$3R>T^t`AZ}4g;KRMTl@{_SpokLM;HIMiw#FVsL8sXVqq(=Wt zv0H}Y?gpg)D|XIXuu1xP7B6&VhE=|b9|z|Ln?CgObJn)mm1!?~qdhh+R&y>WPty5w zO|Kd4y+3iEkQ-YQbG3-|q;2dtXZ08Rk~H7Z))hYb^=9XX;0N>W(?v#n!{ePdfgcwKmnu}e3hdqK%wYJT|BK3lb52&@$5sir$!qH_- zz(!O4;E4&mi&3${^`fq4Z~h-k&-r6qYwAwfL&TgZ=}N7YO+Fzr#hml_yq#b0Yufh9 z^vAq5En|B{r>Qs?-j_75buQRAbn*dfFipMB{&p=hNP1oK~NYTC4L}k)LdG%?}rdvllv#gBR3V#hf{hjJ)|UaBOB2&onm1 z4)=Yd``B+jgYS!e^QL^0l@IRu2FrH=s+DzIaYJE4f%YNovHKEpW5-4omuW@X&U2~B z93XT!5kB1oiMhR>_^+G(g?ZtPrWWho-2Eo+Gd8mQM0WzGk>^GkzRg`Pcnie$9u`>q z=c@1_iEA}L51y7iP3(E%095847diPDf`u|Gq}<_rG}Kg> z{XC!j#{6!tL@naL%s^8o^Y84z#-Cl0Ki=RB{4=n3Zu(Y+CE~*^70Op4FYlkOk@ymI*;~O|CPun0x1ZFP zvH&-7j}-ZN1ZXC3dbQX5(vY(;0rnRN_C9pePie+XlpfjWs2NEgfIe3_3WJ@!19KC- zX*Izr!-HGmFXi32pJfT0y~&BWw49AX`8gft&_kJrO8slhzgylPi#`Y)gB_o-KGbes z_1TdJ&(0_ef7&ptRo1e4XgpN^JkflfOvb`Pif2h<-i2vc@D&X_jh`U9GeFEuTOQ_VzJD3uy-oS}R^=zls<<6t9yG}vDqrR=u${(6 z7PEQ)W+!RctJX^Pwx(K5T$J|P1nv_&Qkg4=4Tc~JYN~Cm!gzPQ+}*W(SjtxcEXoo9)$EpS@%QJ|r+#}-&mAS8sA4I&bT5y8O3%n-w_N%bBcT~J#;@%6; zYoO0?sB7ynCgy5P9_=5PPo#a!Mn7XP?#4!|O-#E6=m@MCdl-H?eJ<@EsdX80?Ci}~ zb+f#$_2}W^?=nu<Zb_jfs9kBPbzTTADlv1@i?VXLe&AH?7{q;DLM&H%~-Gkau zy|+6Ovb0;~b&-v{qod-Zj6YI~J|=A^prgt3{yc*mincSmBzi9D9BcD8`tOO{V6EVT zj+#aFf8h7q@Ev`I2jp!p!(9n{8~W`04(~{#%#JEv2Mm8>s=eGp91__%IE*$J3l67%}mTq zG;x)Rn6fu?c7bl^`Zk7niDxmXh;w^9orFY!~`J5sxPgpI>^%0co3~=j>q0a6YHe?<}&t6TZJHfxXtR@EzsYC8>!LHyDB1m~XQddtrG{C3Yrs3i_0vLEgFCxfMPB{V^|w z&y+ezS>r?oI^_e4$B4bby)6$uHF^2v0quWvr@;0!GInjaR?Yr~oUF}STj;QY#qJyK zwu-(Rh&>R;hO|Vzc6l@&H5(#J(fiGLD2fLg{c|MuHyXLWZQ;|#m)}q*<$occ*B9oP z+KI0+UyF^0$9tdnw!UHyGX2^&>>H~(ir<5m*As*W8M=#r;RbR6f-#rwuf3PeR@@Rm6;rbOdGZ z7lkKEe$8dh>QL2PJMB=v72Y8B>Kw!a@AGY+>5BCK#1@r$wrG^Gb>oDtc{h63*tCZM zLqMMo^CK5v&y-`s0vo$S2c0}~FeJze(GrR0lTUvQe>FN~dw#pYOUy;9q>rX2&i}ml z7@_mF7us6(iP9x|tdF-h{%KvW)=Jk;N=-^>8-}x_dFJ$~)mr=Pb;2*R!7t;zLnPM3 zTt+Hqb!(s4_LW4Ky-s>V(8#HCZN7~0F73~@rm~_#8AI+B4RrP0?Qk8rm$nLGv-B)V z>>a%SY|+lsVST&o8K0krnj&3e-zDfKd!uY=M&?S}^Dkzv6kcxUR9AP5ZCyb*ru^#K z9`?KO-H9R0xxxzFLV7n@bch$ zCC<}?^LaY;w9(P6&ac9=@cTT*ZFCGltrhQ2K@SdTV;Ts0x^Htsy|N0MbOdOxBDOMi zuk2nT&qSa1DpWN>q`g!wmAe7oq24?xA&WXA z5~S(vlkgLhn;4KL3bm>SATB-Wf%O||T?QY?*{{L3J(2^`v&0XY3HxnJyiW2a{4FOj z*SmY6yNP3boVC3S3qXhZu2EKy)47uId4*HKSvxmc65c6_U%~ z?+(hVdc0$>zRJJK^b!9#VcQUUhxEz($k*}L#^zjCcvaCDXl7ol{GfWAvsx>;JqC3q z7vpa!C)?+(JYnuw@f7+5(^ZgB%HB|G)gQDAv+cCJJ>5TDY5paU@hpcs3YPUzXc4s2G`n1vx>V#N6Y|UY>B@z`OpFB)uN|f zz(w{b;rvryG!?AguX7HN`n@(_Q?xI%H<)IAnT=NvyIaR#@66q4a&yFgCZE#Y=2>aJ zdo=T?%p~He4+sXB`n?;ASILTxYOBp2@CI{wA>C)+go&|1VF>0rLK?&C7$q@hN!bbnK^N)Y0g~&VFZK%fPDe zFp(|&aE3L&siQy6dtaBc^!5fU8PXDCAQ!n88Q=38R|MdPP3=PcA zE6$SG8t?ZG)E-l|F9si}wW2rX+-bAXXFmdS&?@kMr{n)?^~!~Qcz4@e)xW^|D$Be9 zd7|WJu3&wfR;ShMp-Z6fE{FqjUg~r+6X6Qr^XohU?fHY`tlHXoI@VuU;w(`2g8QvW z%qeSX-_&03ZE$vuz7#`xj462{Dm>tKVzGub7o9VC{PBfJ=bPu8=t+&pD*`_ zuLI-mL`UEI==377Nnj&Y*P(AzpFisfHBA;eSiA_*9?y_@x)tFf*f7i&Y;I*;dt1{ae=+E&j}D*{x<)MZIh5+q-4{BYKm*EisF< z&7;=J=GhV)1OG8!Y%l*#-_F5#!yh5K<4l|n<|RoSk23t>tnJOI zE2hNW1K0p^0UgX;vo?UWL#z#GDdopoVGsYg_-COp-t~>aji&BsE&86+UBiyb+kT%B zp0&-+^^~tP4!Zlgg0&}!QBQwxI?m_v$o5Cv;oo6u>RK{&A_qv5CuC1B{?R(m#?3wf zo*V7M7R0^l6SZOOoGz;O9FEY|(9~CW#C-0I-=%)v8g4anpwM4q{DocFDrGBzk67QX zd8E;|GrNa`)<^y&w0-XDJljWbP@?~IotHQL1&0*wK|KSoA8|2it>hA8faC>iIrzxk ztZQ@;<;;oSk%iB-(XklRYOUzJuK1Ji5zneJ*Gp)i1~f1_Kf&Y>-*PSPP^Yqk4Aw-w zYjIYW2X;PDZ`8bzU;0Ae&Ue);=HWQEL!;;Ad}!NWlfB0DU$Z_+*W{lUpBHO9t9=sn zhqM*Rv!rviR(9hpo~=>b+v_B?)0D$|;yn__;P29>9)Z7Qys-wjrdsbe`V-9A(uUN% z@VhcU%RXuAPD@$e?ZZMJQ}0CmsAY&+D;csVQICC9>MCOcugcii&W3`;V86L&>mNP= zW;^eZ`(GWdHn_xUO&rC!h-2hRwL_TAhq(z_&W}o+V``IDrdDEaYCmd?cZW|@SNx6m z^^~iV!Z%F5W<_y@(PgaNrR~RaCMGBML)rjJvf!rv00tPD9cgATsdX7TcgmfwD!ww< zO8tU6O|D@AaE*9Y4zy)`aE8QGB@Ub&Y<_-6ZNT|5O};CB83G2*m(iET4mr78 zVR28#w=T|IZ0xHm6L(sfn<6&+WPFD+hO{ng^glKj(qn4>8|*W9cPrYyKO%Z) zzx%={DyTb{X@)mnb8*} zSNmoD%e=Pj)w;|{JKef24=xtlo_E^h9;a|}U=IvP+nmM7u+i8aI}`IL&re&s`n=SI z^1D;P`(G4nZ~mG7BEeWD@2qlcZ0g38_3Ix@%V$s5s`ioakd%!Dt){?OGEh%eDw;_9U5de{2h zi{mcEv@=lRrNrFOdPl9*`LK48JWE?tt(7f0vNQ*FG~z|~g!J~!IfJk6-)({^2LcBOgWmBC7*r>-m7 zcwnl7^<^Fd&alQ%y*_RG9R{S25u0-mY|bO2-%Af5=G?VA2=kk?eSR_GhuUYEjX6F# zwo@Hje6#w%_S~g_(MP?;_kAYwjHzenAK3WzuFTD*CoAXX+%fXzz-`Fdp6l&62j#=I zwK1-u?Y;4dT-b%tg=XGdKkt6=l}Mk{k>?eg1bP{B0VK}37w+QA)R)F)xIBNk#2HwV z)-y5FYHr42*2Sm`rL5Zr3cDuw#9(ebmD?n_ybs}5)}m)z+dOv`EL}DEC|Z(KlB#8~b6EGfC=lVS6~WG8atcXlk>+Gd^iwkBwgH1%St()DJ-d2ix^sGJ-z6sBnwEDHbO!X;4cW`!zK9dujp^lCpo}X6O?2a?t zVJ|sjS#U$!cZ@BDe~-9_!HZLCb$7$!Gs=0kJd;~p>%TYpPlzo9j|*{E8fN~_Pi}@hS%6uMyi>=ime`Tz z9mbJ(R@b+^cUddEG|l^i;}c7GZjM(UtTwcFA@;_&6LWJ@ebqlmnY=Apgm?@2aaY^S zNXY?W8+Hl0Acmmil3FXiX!4ITwECv|rlEPYR_8|Cfa7rQE%1eNQB%x3NO{*X;L@)Y z8XJh;J=3o-dwwi|{XX7XZ+MC`J@q}_mAT8z|83`4o9)QxNa6QEc;;2^RP(pXax37E zD;_77ICUj$&V3Vcvmv3?Q~g8EuT(WiYOQQ?`m=(i0NFAwYjX$dJlh-9=$|FICkJ=r zpf^+RS*?|wHlujGIk%Q{tI#v(DroQ06QTe-BIBzQ}*Uex~gD4}7s73%g7$2k<~d7rz97^-V(eHI*=_Sf{t9aJbQ%oRy>Z z!(LInhi@Z`nN}4RWS>yx&YPJ3!t);t+Bm#;xRLFrmg*-5;w^s)Z7i-1^#J5w{w{w@ z>)Z$22h5#5Q;dvkKe}v�hyXEAnb46b*v)sPEGDB<=7&V-M7)?A<2HFKe_`fTy%f z%cfPH2nq`IJX|Zivpl;z(bKV5`1enk=|=mZ7rs-C-`(cgob0oSdW?T(tv+3s$hX#F zrkjo%OhxWh>!#+|;tO@dyl;JO54iu3UJ1r_hI)e~{y?AWAm>1d;Zp~_pM5{8_4~L; z&4?U}I~@`{XK;d1hbaDHTLS$-g8DjUR}y}UkmxqS+_Uf+~`9M39TO43`MFJ0y4A5h%MCgE{HpLm;iC({M`NN2pd| zccF*R{3KyxG!=hqK5z72HoAbd;VB64kC&oc=OgfG*-l|DOu ze@)>CdCuXmA#1a?uWfy}-ry&%h*p@G>V(MlM%4pTNb_17Fhv#Jvc^Ewb^MC6`oggo z0)3--pdUr^tXHA$(2Cd0XY!_ouvhLNgO~Mw?sL$v(ifLU{iP0^y#GP;fjRTb5`7}S zgQci#b+uM@%gitf6It1o(+ksuCaIV2jLWcR5Ht2UHaFJDz;y+6*KdMP#}&pIpEM5G zt5UN4P)E%>qWmE)%_&&7ZJs4{xjJX}kLaIr*EnWO1hKX>`z9vh`|O)&$($=O2i8J! zmZi`Dgo0YD{j+wId6uuC3pS;!ZS1F-;-01bta2siXRdDXpu<;ydquHTaWNNgvGp*hb>Ja8rU)2>6i4ocRw2XFNe|C;?E zHRz4ivZY@@%z5RbU7DC_Seff6{J0O^lJ=g)4%%ASR*LePZgISL9d8{SsrAG158sK7Hrfg7S%~ zvEDzny;qkdax1;Ey$x2$k(ohKn@2nUqSQqxea?;1B9R;Pn;L=!Qxn_dw@Q2rkN4R7 zT!-JKO;}g_Lit(nts?8|;T{h)^<#Y#y`roE)^ha=V1$wSl=1m{@>d$!SQE^FO{HY=rH+lg^oeZ^d@5sY$g0rh z*(3LJvB^I}Jd<_c`tFVk?f0W7kl$jy{@kpcBi}A;F?b8>(c{eb?LDBnU7unflZWk* zxf}S3p>rUfPybH)`^?>IeK8vuj z|6uUcRsKN++pSaFEIAI=4yE%!o_xf(H^hdCAvAdw=bu>C`{6rnFcc`q$eWa7Gg4Mp z_KJMTaa@NzKk2IZmE`dmMe7$l;5}2)7l_jahZ{ZEEBdXOh5BfCKA_MBI*)^Jhxr>s z{_{EiasOlLW;usQ$9B|O@$&77T9Jm_TBB3W^wkV6>XCbbdkmiE*zgXG*9uIkJ_bLt zU$D{4YB}8PC-Tt2-J^dN_eJ~p$IUGX%!ga@bA;bvkCh|wC%I$dtWNPQRw`$I_s6-> z4&RulMR_6WZu-6_L`#K+9|w)CF0M0qrQ>Z?&fHQyr{@zo2#KD#z}5NU*o$3wUk~X+8Il?{59mI;W?^tA#JTzQQ|vmv^$g z+P9axXluhvPt(hJT&OU4P6GX?wer7y35?(2O~TA;-s4Kh^BwNX#=pDIx9_sebt9cS zh+I2kuF4_92t&IVL#9U?M$LRCYLR z1J*OsccTn{FS7B#yAw8NGwkyUd}lho(-Z&n{q_&LnL3{>fyLV=_NJCsjG^(~f!v20 zDpjL99ya0mIW_Z|GXH(V0eGkP!+scCnkhhgSgqCB4)yMpzBBq4tZ~w@Cbd@dbAH;! zFfT@rt)|s6Q9Y38lzqkdhRion&kpsTF}e@7sL2z3-0ovz$1-lFe@m^^Z*@-F`rdnU zHkUWM_(!S1U|g5AaM})8;@mC!ryPF5f6VCdYCDJ5X)0)JXUCfa%uK!i(Rqu@y(^qx zKCjGKTcW(c%4o$qYOVH3+d%iTa~`6eYoOMY?M}P7C9H<|pn0`czWJIG&gX0R{GWl< z(GU6$8eMQZkgc`7#C}+P?;R6!AL>&$mC~7i8$AvFQnvbg`S(n2x*uw8S(n24|9=(# zWpaPaCGiZYYfdZJe&;Q*ovkn=w0Yhq3d<$-g7*q~MJEU^{Ih@0c6F#f)O&06S4&Lh z1;~&kp{<{pQMCR3s}lIDBO{e(|37?xB>rh$I0HTDyd(BN?e^O$G>tv#J!){qsLMDz zkGiZMV$pneI>Uz)*zbuuYWtu~t%0im%;aB!#S(jQ@V!asW720kE*fWYuWGIC_r1b< zCVu`+aK5RL^HaW=58g9;OlXEV)28?W6Z2&Kn~o2wHFGQF_}v|%kI0*;4y_UsaKQba zMn9O?J2B6-eM|gmp6zfP`e)hCOzluZ?r!KuWzVR!I;#y`6a6g8Otn_>q$Pcd#C1U?=)t#r z{hV2>eT^mH7j0iv=FSzpa1I_cx-@@b4B|ZZ0Xu@Rcjgx9?`YesCw8fMq1oLnF;%`x zjl|?}{)joKb-DA-+IL#d@fF>U0skJJI^4v5)mquljsDZBpXewLJks0LGxrXzH*pop zaAHMMhOf)LCN>QB_Fh@F$q62lVc#+4T0-v43x74S>m8Y2l-{{>mUB#ejPczTW6r78 ztqYMC*8Lzi<^EE#mj)u)<~T|Pvq}5 z`=WyIPeiw1GnV18s zVvJ7t3}D*pXR5V&=C@g!15#_{)nw5>O8&01ezWyaP^e-M6PYCfY#^^;O|T^HK#W8SOj^IGL}G<88A zI_*t8A?hf~#+UZc0(3epdyh-l(p_`ZJF1p`IrgJ<^zFc4*ZO5pn*B1+ap1>BU&V@P zPc9Ee8r$;K@D%x5p686>Bc}FjajDN8AA9U$)v=CNPschOZ>wYbg)hd8McPiakXLH0 z?4>4umE=vHhmX+cmu4t~pr^zam1-x@7n#~^Y>8u|<4rwblW%Li-UyyCwFl>fdJlcP zDPg7fm9)pc55Gq}B;~`eZE6j9i$04cugUnZ|IS)WLguo0KGd6Pt@vde@Z`08+k^gM ztxuccX(EStr;Ywn$=y)4zZAV>;&rbe7NO7ou)<-5O6~^?bGmP_8Gl6XSkqXIUxV&y zr6bf@>C>MJ9poGsd#Q12j6b+5Yjq#(nQK7TH2>c4&$9-GE?`EyOu3Z@d{3uOtDdc$>EAU_^b56I`Upt)brbnhH z`qO!yv^m>#C^r}~YYKLL$G_75N^5(5sWZmduAF_qJW&g3`Sx{xBlZAe&i#T9P3-+< z?1B27wmN4sDZS=ZM~S}se8%FRM>rFmzh++#ZK3X68LzN**SWzA(MR;xo)7*jdgLwW z{hCA%W*S%oq_!C2Ei+J{a%*#m&pAxkapE8_nq2XRFHh!V!&Ea&dx@g`1Q8(FNaD$my2 zoGrK?ylc<#)4uq#)NyL9`0JMN7Ng776o}2D@_=IscCP)Dc#6r_%!}Zx!=QL zyXQ~*?Q&o2BL+TI`xtl1nU$*?J2$*rhBc*%Ush$TJRg<7W!)#YkBJAqlYPhZWn2?X zlp3m8xFgPfJsQtv-1V)*{Oh|?|1#KIk=q$IUI?r~$9X(`iNQNs8@#0C82YCg{WV73 z(*LC%ryTxY;eW=KuFSn4dU+K-pAb!mN;6h6g$|vJ+}oJ3vwa7nURv{MlmDyy7XH+$ z%$*_elhYyp=Y_V{U|`Dn9q)SYO1zgewk?6@#@=WB%t!N&A|9pWm0Bx#bxvq!a*YkY z6Wf^cC~tMYmi;$l6Dvyds%R(lMgI49xQovryMDo(FD)Mqch9V#?xS3-L*2WUGxJ?L zzrM*|F1Exn9M%_3NzX#ZvA#&v-~QU7*66_rtG%^_wdOpTH_I0$R)Z%t#rw0e2_dg; ziWLpe=NgOn$t=7t=dci`UB|(;I+l+bTvdZaS=S}9_#Ve6@QO!n z(>R~2aXz)#DIyalBj;Wd**Rs*Bk)d%>-9t0=Gur?S;Noav!_t`q;2@Ag`;p6O8y7V z=@LJujWjm0@x2QX+t;?`@L+hL;|a|7iLZxwrhOwd>*N-k+q`(5p-Ht?G6jbljJw|(d-xF4 z6luCj=VO&?h7It#XEF4a!T-`{?j-sFJH}T2Yz=L!xGKCt;&PWGfWlsBt^0l~Dj5h9 z0C-SO$#)v@osRKv!`DF}F!iyRM*w-N?u-5MTJO{W8D{+;MKnW=Nk<7+`#v-a%iHCyWu@ zp6Dgno#^j4+OayFeyH9vYw*s;d(l>zl(IFAH^G0`=UkbwAhr-6Z06x1~E1&(-jOuOQ4m&}ul|RzxFT=To z@M+*bmi?5|er08DzSK+1L%jrhob~>rz+&YQtLJpy7vyaZ^g-x*X-GGuHGh2&z9%&~ zq>cOhheQuHKo9;N^(xHUzSG`wewV+&^dzn+*jXgR?5YFt&=*F}X7Nb=7WB)v-nS+O zzA(Sg*k)?2?xI&@dmhgyoGr9Lol@mj`Px^i%-P)f0Z~d~P5jO#(3PgcS(sg@>Hq%B z{g7%(KdQCb&xAzJRCSy;a=1@iDgFX&gGT>Pa?Z6lXCS#7o|+xcHvOs#5T~Wz{Q&D2 z6Y}k1%uJzAIuy?t;r*Z3^YjggQLOQBs={AI=e9zDElk9j7dwlMj-KL8GcyI2I@U+n z1{vR-Hf?S80MUuPKv!FUZ>Do#Qeb43`63ZJF3imD89)D5RONnPF0@| zvDtZF#AbiaX%d+L@&VT6V-j2VC*;gr^gVG8jFY4i{%Jqpg=#yEIaY0dj?E27Ynx%`JLf-(v(QcA7V<_7;?W{Kf%`E zcV=a0Nv@nSQ>_)Bjw$pNdy?^=irCgYu0r0Oa*2Ds0dae^=YdY2_+ZmhP?eaEGc>kX z3ilQ4`FD5iETJZUqUiKX@h+nha}O^})G*8oYmB@lp3;G(vt0x{C@lw0O`U2mQVs;3 zJbB?@oXO<;w0wXwVg4d2&BFpXio+P7rkTpzLb)Sq#V_-Nq<0DGF<27XI`F$wf0KL) zeV-^3W%S?H0vliRU0uTGBF#_c??N^$MIo94bBFjCs!WFDdbqS55uGzoo9ZC{T735-+GRo+7ehGCq%U z_PtIkC~Pju^P8N%=vmZDex>B~ zsB@bzBbev;0(_`?_cszN=ms00GN)%jdey_?k-}4a_m<3jiKn%qZgZ7$rjhMCQxA)e zLtW6R%wjV>pMF8&6}%%SxEJ=S>M^+@y298?#Anm?l3FX?-;wC6y*9oUeyGx|tbfzA zSD9O>_!0Z3t`u3_)p4E={w?z1O~}~Oiz6hTH5Dfe@CzA?+)*X{`Ji0<&3V` zt_f0@@2u+dx~6Ol=c(dTMQwW@UsUy(U|-ajbr2ha^^hH76z1YQ$wyxlzA`cM4vG4u zmW;(7+>~lHv4|JYf23tdqi=I+l%>}SJztMrGc8MrVb$HxF^ zAf3Nk>}T4L15=hC`@~k3uJde9-$${HSJbch=7M`>?RtRvG^UN!)mwM*rolm)>i)} zeU#J&KqR2n-P$lUk-~K4JlQyB{r5)yJCR+zk95w3oEN>odWQ8D=f`1hFVB{`;{e#( zl$qaw`3I&JnfU)l?sD;SX`}89ECqd@-xpPkk+Gwy(9STb$=EuLHH8~ZUSK0?Zpkmy z1uekn<2~+&zkNLYxam7nYg!5H1L`k1-{JV(Nr=hI-(vr(GB#h+HGzTlW@%pYM(kg$ zm9MuatK#b9g&9R#liWVt-uU3tv(~TNUaF00hKyBf+t!wf~o<#5dK%a`(Ma##XIk&ej^x$jAKy#YdR-i z>sg#_6>Sxo=AQ^`UE%?Bz|i~sHIQTURX=D`Ytq|v(5=GD zrH&pI+gaYX=596h7@WH*^aeS3cdOZ#-Z=X1|X zod&<7*6KU`i~XgZlRnq-;3DlKmsfc<_Hsy}S#sz+b71ldeZt9h-tm=<)CcGDerYb) zR?zwSf}OcDEImx>saTiw2lVNP)PQfodLhj_5zyzkre2s2eOiGvbrW-Z+TOUXVEY8O zxf7(nm1o;A?kL~E&!V@hqwJs0`3m_L#z5#RjSj5;I5$1l$m$BI@9uWQKlS&k!mVP%Y=K=-=rFD1 zZw_>Zxwn`c>zabas-mx_^=W0!#t$duE>|^IsF~S@^VfFNyTuR1*I@j=Iljcm^8x9u zViQ(FZcOoKlrvUF8txp}Sts>@?aOG2mmwYq9}VAsENlBW+qvz`T|Ab3LTYT7_wQEd zC4L;wjhNe-r=BQ0DW6kEzY)D*?(0X?XBM#sI6deCdP(SkXLW1pRx`Izt(jl0E+1K% z=Q0}nqSlIEJ_v10X;F5G*zl}%IW9a-WaA**1!u+b{MkzjoN7~JR#n20-VgV?%CYmU z8vSP^w=&@n$N9+n2r^mG(ks#HVsG#rGi8}F%Bbmh{whRswJp?=nEyK}wippz{4S;@ z|EBy6V)KxH8*)z}&ZF$8lT#-NzwqvkOvHj-0)7|u2<@x09g8zin|)Yf5f332u`c}> z_&0RkK-`1!(hbEMj6JpmxGS_Li9`5&&c-Tt`gXQB`*tz^{4!*NqU*KL~X!1(;O0$jw+s8C4W$|el^OqbqVtseVFNuDn zzVN~}vHf_?&u8SV^m^MOgC z?6F0_QD=^iarox=dUHNYLaXDJI@T9n5v~YzypGsAI!3xFHKJ6Tgg(0j{uoHX)RHX^ z9@9Fd{Jm(r&Cw7 zma%j)27V>w5^dm9+#y0U>^H1)4isI}hCWB)jgvPiS6RD4y5bqCwK~JSvP(>U|B=Ar z7&Q5}3D(nm(0rrcSM*&Uyw_m`J5RY|Z1HW-`f28hR(Uz&Blq+A%NdgI`UPs1F7566 z{J)Fteh>nkm{hDEpifbet`I(=zg7cmCB`l9$M3$JxkB!j`{!H<)fWKfL}!SOFO70dYcD`U+gEx-@d=h@`nSn5f1yvSWB^s@kR40#jT z^FOiYbHa1v+=wB3rDJu_Qb*nIlQ{EUQI+Ur-qBr&9&^&LuDeicVyH5YaHG~c9(AIY z^O(UcdX1PEUpOmF{rr#dF2hHk#-AD*`!T;qa<$CC5esWZ$xdsC8cckKI5wId)LPL) zSzno|10sTA6njFQ0pNH1|@0O`G^6ezxMev-d z*NBIp&q1vzS7#$`VC~z6=t}Vss`0xmnNlq`gm0t&n%u>!xQnK^P1_;8S7lZ~Zj<*v zXj5z4`=L%M4&q=iewVUzm1FVHCKPSm#i)31p?S*Ernp)9M*02KsnuF3*^ z*Y+ATCusHB)V0Po>lAkpOljJ;Q`{*=eqw%;=;%Ip{yv3DrQZ?1os5niZ6~X>(vR#R zJresTk90)MhK}*Bf*hkfS&QeeHhXyKu8BocTUu|9Ep2lSqmFz05Ze0W{qjedSSa)9 z+V;B~bxn#d+My<72xJJ)wry9R*kU7e%XBmGx6=}_lypL7)}sDg>CH0m;1*?%p$}qO z!S>P~lsU-MORPxrKAf4DA(GCg^SyZvm>oYpZ?R=sJ)1w>lU-^2lrBM6C7)rB{WW*G zv4^YTD#I_V%hI)HbASm>| zwnCfKCQ8P073uk=wjrJ0TjJ#0 z=a}3WvEi%nx94Wh(|yDNYw&Eo&te7dQ&hg;aKr&7VUDE!&dKh{Mz*sKR_9Gdh87cS zPHv9T<8L_sHa-GlsysK=uyxCnn{%F!n_#~GT&V|SC2ZI8!t;z?E-#E1x^x6Hm)?%v%2Nx}t z?8Kadr|ty2`!7%) z%Y(U?F-Lha-8n2V*XD=t2Qw$G%ClHiUu7)b?APh9O)Oq}Ix=;GA)7kEu27vHcv@E-E^ig`Px9KNlvj zbN^EOi_ivbKeblRTc({|3bBTj6V~+K=hZS*GU zB7Xf`?6WC8OY{rSS-}no z?hpPT=XR8n9#0%OO{*!-+UkwbZ6=SfIktBAgTW7mUpkfbG&M`-r)^H{P~;YwZ)M-a zm>B=?yXHS@a$2plS<~1RsF!_*BZ;+Y@t_n%>e2y$en6?XbYsQB>wE?)^~D zVqlI9#{wHfe2R2G%tj=yQKl^qJab1g6WEL|mcLkDf$vPmceX{_N_HUfp`Pu_ez@?k z$s3}sPxR@fu=6>iP5bqe{7I&tsBhdi?uKWw--mOzxd+Bf_J&*~P3{YM)e^Lrei`6f ziG1Lhv;Ix*pFMrE@wX6lf+eEkKg5dHcBWdF0pZibJETsXxzxJghPHK%HlE zPtPW1BfgW!E#8>A(b!AB1hY)M>vQk(QtY&6bxky)LfJ?I!BcOB%?G>^|u z`+_&_fU8yqFNh6^uXsbN)PS!fPwQ zYZb8HsLLRDoD-uHjcqo`xAPObX1hwQ#W`Jx5ocqG%L7}JHaA#ras4Rr zGX3?li=&NftjyW?UhFDdLCUE5)FRO}jBWNy^)q{$>DNj9JZ0u7z^BqWbVxA7(8d>q zUrhXjIV`PnTN5?m4Y?-q*`I^$O$-Oh%+_yzZBc8yV_)DGr4BLiu|a7o^D9yf#(rZh zC}j(M7PVG`u#-?)5e%xB<4&RCaYE;O{m^{72c_OPxlMX^dANl&D$qQx>0pLE7ra9I$+~{lK~@{qAEU zYoDB5Am&e*GauwsmzX)O*2)&$P^t%e4;RM#2zxeRmcoyCNa(Wx^w~a-DM|R8z4Ox( zz1VLDi%iVn?ci-Q-|+GTw$CMq4^x%`3w`rmrL*dYvl^ZsZsf)~&tkWB&Hcv23}=SQ z9z(3Je2_QD#1Mw1ZS0h_<@;f8%;Ve*d_vN;1KA#Vk@-GKJmhS-e`2s}JK>njF&Q0~ zyF9qu*gT{GeebndJ74K5$YHI=k4qny*19+N`zyaqEyF&IjRd-z(vxvX*<8|De1V@vG-0;-wwn6Y2Ar7)>;KZ7^_JNDs6L zzb}&Jm99KEF%SBitc_FMggt0qZ)WsEpwGWHvVMBx{v^KekB~n*F$Yke{}jYqbl=V8 z5oO~5 zCz?=?q2lnn+KBVOd#6vawz$^F%vZ9Bm_}%0Q-?@@hvGZnQW||46mQlsfA3!ZUQB{lLC%Wt=c;hH=-FYgQLhPR8$W{cjI@6F zDs3?hCg+Kvs{GvPn0awE_k-MhgKKde>6_@iec>6LPsrhoj^?#{g6Sna>s7Pw^3c+I zeG`0RWZ=H(eZ~G~&Qz^c>}x#YW7>ZipTK8eo>xDAiSswPYtD@BknSKkZt7OGR=RaS z`d*1O{SC3EZK0)&S3~QYZ$N#ul9^sL`f7^@VV@({w3pe4nx}3~TkN$tZacBrP}BoI zOi!9sfewAG~Rns>v)El>?l*F64g9v~WEH!HZ(EtOF&x(J&cXXq-ukJRjW17| zQ}cUm#JCptnlbS7E8>s53}3j)d(ZeI*96y?SR!ZDQJyo;($1+ASwwrAxx5j44&)Vk zLUmr|sgkYoENqn;|6x;i#~Bv-J5BB?>Bnat{2k!eDY|l;OR}Ze*|6D0Bv1) z?7Bl>ll&5<42A%6JyJgppCZo9lUO(H+XvhgLc^p(=6bZA8WN5b-p-0U3&cdII#Dd#f-=W|2$ z22+=Q6Y^;K-5U~q))L>I31#X}%$?>V&@r|3>cqB0qUw&G@JJrH6O1sXaJ8bG+C> z^nceS;)DZ=FUtF_#`|t_72aA~|DM;4jcm=&Po>%t-gQUVCp=H)gZ`C%IUQhc%*A}@ z^pW^s8)}<(10znq`*h6R*0VS_6o}obbmExAy1V;=>5qFW;ZvN4dNY+HYXJ^`o@YH! z>M{C(kLaUycPE)R*!aA)NopON2WM}Z)+0B0qXd6|c{JJ#yi=aZV1KaqxwM(*q;4=d zh!y#{CdTsjg6*|@CI48&cnfdlx!^ftOYcndtlgWw*Tkqt=WWiSGB-@R0ro6&Se&WU=x-1n`41eGPouAehAB5#ho)t36j?l$r#PNH0jx z@I2(X7%RR5_cb~gZFF>>L_TX=sYa3Wo8C$EtUV*Mv_j`u*g0yga-GEe*84{;PjWYp zAa}DcZ}X3z_@DT+PiQw1gGkB4p4Cn9gXnWX-7I{ENyujESZ;lgmgi6ouy0i2U|oU5 zg#IS|TdZNAd|-TUI_y&NBkx76)xGSUu^4E?LecTR8k-k%qaWcQWso{9|Xo()6%5`Zr46jXl>ZGf_#tvB%tE zhAb*hGJOQoQZ^>WzB8U1?YFg|!bn+%dsJ(67rPR(lSl*FkLVfNoay!M{df-ROg7)g z*q63xkBsIRTaJAzT81x3EZ{6<}WsMfT5*|W1=>_hTzSI_38HWcl= z`>oDq6DwYV`7GoYVsSr{==&g+LZ8w(JXM#N595V=KpW(0dL za_wyNva-F6?z_Ffx?dG5Xin&<^_Z`u;x?YsDL!57Z9Ed#yhk9e$df9A>?)cVV@)vG z%yIk7{apDJs0Vul^9cBT%Hi6q#blnGo^13E`n!!SdW3g|sYz?Xyuussw@`zSISY+` ztSkN^@703$s?04B+u$zP25-8yj%#Od8os0cw!BbbYAn@S`5MP2=zK54&~&{qWt!Hx z^{(yr+?K#^AB*=o0nh(0_O_|GN&Gv?D798JiP`j$XF)>4`8odC#Den0yum-I&8CIk zcEVOUKW*#k$3!+qKeI5iplyR=Bik!|aOz;ggG+P0rB9O>clEBFHNZKrd>4p(hjpa1 z)4n}yzlXab&Pf^A9WtMFoBBK7q@R-9r323XOYSemUpv%4)YOoxwR*=Pp{;dqK^K&k z;ZyvX#xHv=_Z&`I@vmCLzu4T?Hq1TF)aGpo>|D-qg#l(p%p;MCUDJpCA+%UGzsuWM z*q?{J+Viff@tsywFHn}!4jh@V+gFDZO?_9Rf48w`S{#d4&^hibct?EBi`kP(aiM|E z5ryALT$k9$v{7|^>?w(U?KiWVC0|eZd3DOh*)H@Jm!8uHR?Ckj{&TSZkfC$ttWOXg zY-_tCzN2Jk_N*S2u|0sSv(ICTS_(9q=9`zKG5Ev{AA3BdgKlND*AQL&U~ z5L4B(z0{c__ATSRoOhL9ReW-I!w+~?ps^X4>pc@|%9htXJJ*bu7}^JXF>m=4a}Px? z%!8iopP2W`*c#;kpYvkyqUnRE&05;%7~9!ilX4qOOrxLQ&%|c$EX_mw4!QE-h2srx zF3T@7`HLFFv1!ZUKjou?PG#g->X9S7$#Qp$&kV{RD>)<5C+om9rVa64bo^vX@T0^o zXy@OYo@eTmo-IDBWH{dC+^oX$VK3e{@Vk`_>{Z{Cqm8O;e%85-DDn6l_Zs7OAg^j- z3%3@ZG`u{&sQie(f_|1_rfMzrzxVVq=h-6dG4LRIe8xsLM)V~5)W{1@Bc=fiB{TP@ z+3jg+!Ve7(4NJ6&8I8@RU+zn##wJvjBcBYrTgxYLvN2#@<+cLk* z=;f|nS5IS^M()vK4-9}k&@tQ5M#`pTXbma4n`vZFYpz?VJf&)GjO++0NgpN?@LU;n~`QTRbasn&Ojp*(qvU-ZoF{8vb*wDTWy&;tR_40M@9vA=-B~Obn}PJ%0?nrN!tRRQh@UGT z?YvmoIa6^~YOUnb=-_;j|CEilxs5Gh z1ko<)3!EQK4;>Qtd$m!M)LD^M&&3>4{hVIyZLFi8_gkqap=|V18R0d?*hi&o?;G=~ zw0UTsRCyMYZGmTdcBc9**qhS76M#7>E1Yx34!XY#{OJ5wc!Bxus(h8v<6RPUo{i9h zT8{0Xh;Ofe?&JO$KdHf-4*kBjg?Aab&6^)(t(DvukhZg%{p>N? ze(=u7oMCFH=4NgcdLE4Y(Y(<5zi&tHid{h;0hr#Rk7#o)Pt1=S6W=2D_|N{;=Ux-s zCg)EXI3R7YZG%E2`hsVEblKBF!}Q%wE6f+!I}ftACKzfk2~R0J3B9ar)b6Qn@?NY? z?AW182igg&C8%|5OoMYzcwfWu%-7sEjBKPn)p_3MgN?E`=QyYQUuoN;cSHhjp{`gV zxiHc*XJFAj=M1b_iTmx2IodiOH$9#y{KfaG%yIT`i2nlrAwC4XODf0L3H}%5{M0*V zIdjlc#_#L{8s0y>zlkYzcdcDYT(V>FeW)^EN4#E&jeFH~#kAP`ASmd*UM44XP}=&r zP5xCv+xSzD^%6Qpy*1pbdUJke-I}e>WL=7;y~usu*lf##jN~=aVE7#3oEoFJCEt?Q z=iDp0TKr04{oR?UCHQ})z64B)>T0_NhOVma>h9|50#Sh(5M@zWbTpDrSriaOL_q`+ zqKpu?j0gr%6k%8fHx!*H0YzLhQ6nMZ5HW+O#E4roXyS$<2r4LsfQrk2^S$r6eebRK zKmT)o{+{ltd(S<~d(L^!0nCx_jOVAWt147MZdKk*t>N<=(FJ(yGm`hAe*0T)ovFil zKCm)#c)Ei+3)sp+STKEXRjAL=GQgP{ItEv36@zyz>sZRid6ipB{Zn7U#;LWcgKF~s zCm6*Z{QE)hpL2FVGvu&)XnQKV6dyG4QImh2$p1{(2+kO#eq+w1+$}e{i~QsoYkj)N z*|qB3)f#f!a&RhZaj(a}Gl#M^KOs>5e7Q3=`i0=|)J5QkFkJEN%Gyh96=N3GCF=89 z<}MRC=Y3aeb>H_U^x@6I>&sXeIW_#Jb!?+=>k7gIFG2rwYmotbrPI2swc)H7mpN6i zGS)}2-dke@Tit`Amj>djzc0<5JP7@u)@q;orzcB&*Cg0Y^jjI8%)J@QTdvm7V*u2u zg40dSUX5dC8&yYt5RCm1VD$%rdWkEkLmo$8hQjn}og)(O!ko+DI3r@4t@BnVH~DYL z9o&RFSQ9N5{ZD;$7V@N&EBs&R;flltQTI+PPBill)SA9WZCN_s#>A@IoE--1n-D0@ zI__1!1V15boV3sLaPDF454Whb>X#?>t7Fg2=|ki@+aZX3I(w=3^Q;xAfmf^T&ULBn z@|jQYnL3AaSX3-Sz6%}KuPt#WHbJ&`_!eh-I;&<6tdY$yV zs`-xf>-J}C-B-8FGa{>NA*-w*q~F3C!bX3Y;drS9ZodF;PQ2yz;C90!*URf=a+>TV z)OY0O;#i5l&c~iOh2Mz|ug7=xjJ68j7h~{O+*jo;;}hOl>0gT8qm5&&qt>?-VJGqJ zJHofWE`6P;JL=iGXKQWa`o=e^nO{Q@*B34B8pTnp;;;QJYR!|YJZeRP>oU%rDfWwJ zhiUiNTY5BQ-~`@e7x}L=*DmyV+d%%7&o(G;xg8FA8&rIR-y*-Xj`tTQ`2XKay=VTt5xBj+ zcMFOO3|2NcJxtDvIz+9@9l*dXHIeGaA)Yq6pk(QM81=s;_<0&q>fIm4KFkhhh&cpBd zJi)iz=y#EO+8OtBg!h=p5B;mB+y+-HYtP9%+<%-t;eB9gFb&V-fJu7aPeF| zg@1LK^B=Ks#8>MBix2--<`^p9X@7_cdgz25IIjWO0R}5mYvu1%gBw=srBU%HlV`y! zV6io8pj$SFwl0Nz5ZVvHJDA*7lmBz^ulm6sX!PHfXMPLMd?2(nMSFrhrrzfG^zkO< zIy!H2LvK0%(cA*w#KL<9XQmG4+3_6JT0KAK<>@*HwWe&Kt}-)4?jY|-XWw#J9~0D@ z_!kKi!9fW!1at-HRu?MpL;Ww+pT{(ft#iFn;aZ{PW`@Wt={*t-0S8uppY~(No%rw zgsJy@!C?le!3;JUFBOi2QI*!22!FNqJ~0 zbQImo`_5WW-YLdt_atVEpABqB$KVt46ATVHzo_O2bH36d^igV?8@YB?@7lbb)mQ+g zq(5_O{#JvXZccAD9PF4=EH%2czddtSCY$`xqOV3l_qJqh&a_*M$)$K^`bEPM9K6hd zo>bbyitrHG=XTiVCg1i}-&h=AFy6D$ChrNGZr^uyaduJj^iIwE)?hyC!}TVXZ$>ql zKI_BZBwqeITlS$M^LL40YR3u-e&2hM>G z?49Y283Z^ZU?7}9qw^7JUFQ6=ycTEOP3-bf@Toq_erb4I$H)6kJpR2uy|q4z^^ToG z{aw~#I6fL#wLG65tK1y+IoO)tniu~K&#*eUO=OR<^tJP~*gneJHvFgeZANHoUwh?k z?@4X(e5vguhA_^t+%?VMucm!z!FgQ`-ZtjWuE&1v$?P#c8)vMrE}eh-NwKroQ$E8z z;XUSDwmH8-QiIDiR(5LP zRKW`9!(Z9zO4IAHtN4tOjd9Mc7_CSBKM;KNyK|@UUEs$y#ZQ^~heqG#VfVV$kK)`S zeJ-4vpyle@{I{m>{%rqjU(3=T5_6^=OFf2|McJd8$kuUzj?whIPssO>+K<+Fx|XcX zvrkG-O6xN{Gh=NH`(ZWSKCWo(MP)pugxxtFYfiL&pwF*$&ZVxdx$Wa@DPb(9;&)%c zgg|{~X}fj26SQu?lvoH*Xy(cOk8 z_N>BLh971wX6NaCu7#&D$7!Yx)6Gzwv3t@($Hxr%GIWCEjOU*Oy9NKe3o*sm+y$mq@ZQuz@?Mm;?=os$NhSW4b++248jK#s z$@m^(Cat5XqUWg(`={$f-!6c@?VnyR^6)JD&%=QQv5${+CSQm4P90b1E4A+IryGj- zCOU2n3JXP_z^z8EXfLF;%sJGo;RB%G8U1mBZN7*PEhsKAeT8LZx>m5IWm$Z$VA_m- zn=?N_e=3{4IJ9%tI46R4gnq1AE4@(_JYYD%x@0UT^SVThYgxe&9Y~wo;3j+t|9pA2 zF?hDqa;F+Ryb8H9*6;lc4|GnkzwvYSCi-Yb0q@eer?!b%NNe0Ru9m|F^pbF|ct*#S z`aw|B>ZmomSp1)=sLI@KySLlj?IvcwFuqXgYT!CK$7goOmdoo+)TL7| zZGyd1Yo#k@W{KyQJ3FDf7>`qie~agA^p!seRH#**v(m(ClX8#0B@1W+E^L`f%{D(dW-abkMC)%H6 z-Jo9QqMX#gkH&Yd@}Dc^bCIgZqLUKO!@ImTZ{y9yiFq_#id{_nrPeAQ;e1A|+n1yj z2h!%<4C2ZD9Da!?vi`ohX*d4jHW$`jo=djhaGQZIMi`eB= zu**ICUUKe?Ppg6|*eUgnYRz}7MBd8sP7g^9Nom_hu662xS8=}o$^XaH0PM=oHT{zF zqSX=$^Zt$uPLaN2o_p80YpKTvn2CF>!9!jOUNU!|oc~&uPAQyeI9eAYFT>t^`uX6I z7W+b9i}I}NJ$9fbybpep+_U4r7O#Ed38+KR`}wdpM)VKgeSCbm@!4Jnx03!$bu?S{ zir;@2{?jqIS}U2~n6mX4Kl4r!{RX|{orq|Mwu%1XBY~}}UzAn-EYwBM7cbMc&-*a? z(DWO2$Ze4L^abeuzR2^^R{k7u?%{q%b6#mTZS3Iw(ANK`HP7+87V z{z&^U2TPn4Ex6YU5K@i`lP`^>-|TV-%|*W=P&hEpBgEU_xzy?1EyfTxt%y1U8VQ5q|DxaS(5`O4odHKoMU?sM-mej{@zv-w-_ zGq*<*41a!uZ|!E2Z)cbMzJ!O|2mQcVfm+T_FD@1An)YIBG}d6hHTla0W2CMd1>8o- zn=&#*YI7wm<<^=$fI z=JTvekMNGHC$Gs?h|ceX2d(q$96eM{%UP_Id&D(yX|L6p3H)tmA~s(o^-E>WZ}7fH z;6JSg*5-F1=UC>Pihm!5c$x3Wn5##$Ut&7ipq^1*)8}<;Wc3?sVu#{yS=&jD1@5im zR5~w*FPnJ(%#`)RuZn<*;WPB5pUz$`a>)9M_oMgC{&Qx8)>n1KyyWzmA3rrvXH8%6 zC8_IH`f7OivC8*hANIPo_rJ!mcB;vLLwxmrLT>lOd&Rfm@78306wHcuc1iIKxkn+M zze7&(I^u20m&N3Kkm$-89FCJZG-73^CV0czl{m&}%T}gVrWWG!5I5)I=whSu)mrKN zNjZzfhD6%$eC4F=lj{yf1BTzu*j0v-fG6PuuWJxzDvl*8JdapKEC* zCaf{8IA?2JB3I@95QyVmyev9rBkWfV{^L19-v;fnTcnPWn91tk9ntOF^PbTP>Fa0x z*grCXu^r=M%kgztPS5!3@JMmBPud>K0Oo zy11vamam}7Q?rSQA*i+Td!J48UV%Nt__XUXy$lcDzdhn_q4N|M71t=n&69Wb9xFkPM^OjU@fA;7&rPGO)m^F zG;M!(6;C#LKFY-MoU~u8XVx_vgTakMKYur#ZB8`D$h=z9zL!_7a=$C#u6;0@+j8fA zhPLzpEKRw>_V;d%e-NyId5!nd@0mVR@>9|Ohr8rF zndnWv&AH9Ue23ioq9@|b^>J4V&g}?K@6V3$6`C4#(>iBf8d#=bH`_cZHwY~~CFvS*7|BR21 zG4H-R&KiGdA2<*B%nl^ITgEXl&KmemT8C7Jdklu~Y_`l`h69}UO8!hAuNoMX{`}#w z#Z1;EW7vgtmJ6_7ZB5~`>h+FrfCSfT4ojSRd*UI=v_3qQMKYzvj zB{!YA3mM$aed15ic;&Q<>JH6O?_qU+UjZhhAMBjPZ0lGBPp8 zuuI0~wrWaPC=Ml6=V66n*!wY9;QQ1L3Bw)8BJc z+oRg*J2Ie5@xxHRZ7OauxS3k3XUL|lec6v1NbOI)=nXM-@^P-U=_i_+xyoSpoF}OB zBddcsMzw%2K|Omr9T9kAEu3b2>^m`^T0j3@ zcX>$N#n_=bcaF%@H_)ps!@>B6|iETE;n@pc<4mMi*;m>1Ml-A+H zfhp4aUdL_PxKI*I9tDb&G=CZX;+u_?BXq!}fNA^-RLiu_qrGFwWw(EjrzoyHYNIoexLb$M(ct8#YWK;tnnj18|O`vpUp38 zL4IFhxz&a0g6_d|3vOW|{+%39qcL+(+n06)%R4v5`>Vp(A-4;PuQ>DYdFqhS-X6o_ zeR)>pP?%?Foo{1mHEVGP^;zu6D*H}dQRhuG7~od;0DAws6)aEJ+o);RXHgM8COZF7 z=H(+5w>|;CdU0s^PPd1)-)cVQJJ4TZ{mC|eoAJB0q_&v)oQ>(f3#PFF_IjFQb8sgG zirX3L$5HEYr{X|M3pv~MK6lHg9MEmhtJOK%o7_J=Lca4XeCNiT%AdXoe06JJ>(fT$ z?u&+(#@Pq$@OkiBndVK(%b(!&SAZL9V9%FIerM=>zb`*uS56tNvV zyEO%sllmLZLakLCv^2XyVqV&X@$ph~-y5QVlDnzIeqyeZ$zygc>sqFLzu)D5XYT2! z_<-orX6Vv0UDcO?KlP4uE#GOQf0fkXPlF&14{dK?S=ssWF619z-6mrJ)@?FxuJK8= zR{Hjr{x5y4s~g;vCWlxNZWbK)1LSIJ6Ej45Mg~U;-bL@B*6p)`>m^p5g$Hf&ZNFy| zhGghElXHre)3PHv6?q5g3pK@)EJrBrBeBhezn*n~ceA9QTm2OOWPWR}Yq?DpWi5WY zF=ze2<>5$!S9dFPEBUDN!EXOs!$HJ3K3X^aF=KHF#z8t3m>5@!@5lVqQp{eVtWx&= z>{&Y-x#J|}9gBUw$h|`9A&G14Pb(j64s`P0<67hMOhms)7rZ;?CNM|FygBs=xcyC? z_E*7I2LJEcwrg9B|2HN2&Z>g@kfRTsV{t}D=Pm!t4c*c770f7_^Q;7EpTh*b_I(Re1X~_Ti3wbLGC!_d6xQf7=nWt@Zs~m$Ki(*$_IGPk~&O zXUF()3Oo$T9{2X<_;TZe^-s@`7~yItxV`Sb1fx3_&S-UXmWr2g*Vt=Tx|_{vjsBhT zTJWRxHT;JU7#iveA4uF zsYrNF8h3fm{vQwV4iSHYn9t<=IP<&J{tCfr zxFLnA@bZ1lx@y&(6(R&>KN(Y zQXWY{mx`t63?9_?#^lWL90%lAM$u6%OTL;F8Sd`B$q-uNCac<)Rs>N;o4kOJ!u&zhJ3 zag|vmo6_J;RJ~o$rO%ac*B2p^AA_Sw+gbds!B;=dUyE~8&v~#g)zq@?jz2V?sg5p@ zxR2+uulR%57wUlsdXFxAJ?xw=}+ND;B zon?>Vw3Mw2st7AZ=T|`IA1sU&e3)`IGBXk~tn}M!$VTet?-r~27XI!yXPf-(R{U)$ zV{?B^v7NE|d1!0Qs=QNGt{J+qXS7A^9d-T}`5Q%7^E(F?FO`3%KA}&p0A$obFsA*f=>t_op8g-i9|}_p75*%${5Z?W66>_}I=#34~udbaL>$>91Z_I^T(r z?KSS7w%86iiuLoTwLDMrHNL{rh~-Z9>^zqR#d=d`Ncovw`u>i%n}Z;G>KS*1Uq*6J*7aBeVIVma!v7)RG4EE)h_T#+ycP|hWfy~2C%1lJ#b>i~YM zDYi2>I;AX6AnRSVjo6soXk@s5`ZVM+Lg!TE+PY-yT;NNJ7DKB@FEu%Zd8M2Pv5RRr zWotOcc6TC2(+0H%`q}E;8$>2&;o0s@Js`b`?6s_nZLiSZoOO=Yx66T0YTsC`l^u!P zizE)MMjZN_732wTBiT(U4VSleLD!-KYTfJ*_%Y})0o9gIRxeLTy*@vR_$-Zcx<{3ku5$8>) zyva^*N7I-4FJh=B|Gy%uU*T_WN$?%Lo_XEGV&{S*THO(^vNEbPHg0qx$GteTwc?ZW zHecT-v4@M%7p!$@3h{;3KdhV5xX{6ZnlHfoMWe538^{y#QuLB}mu6H}YHXxuZkp*; z{~9(z`>4NnelI>1>-2KK{P|ndMXa&ZcTlZy2Y+g5xi_V1g!mb9ENI@3TcX>@ z(NDWFcc!WLc*Fa;guCLed}5obKm9!4_T%hwScj%;U;lKK_)Ev*$4-m>D6-T5S>mh; zjeouvzi8seEp57+oY%dX6@nLCh+I#nK;=5S!j`>}dc)u(wf?i>Kd>$lcFn|Jx&$*w9eJ8%xD=`OcMX*B7kv{*Dgx=u%g^{Jd?G&k*2=v3phX01ltGJyID+Z|)h|H%KBZ`} zprcWnp?!>=*`ApBg?9mNsn$xzJ{hhN{mIzj^w`#hk=s-2^BM6YQY$_a_F}&azA$_b zeW!!oLHG&G{V|T)VB)EISM^*kfbVpB@pj|ytqyFj&CBrp^!GdqjEFjcda}y1GdMN{ zn+yl|^3e9q|0DQ^;DNkHYOQRjpU5NM6xy6%SY~IyHTgY6Pj<&|4J!;Yvm@VxKSRAS z7P#42>2nO$l=jl5e__32=RDS@mc_krcElnUnOVu6Lzx+cH=)ebWd9?6;J<-OJQ0)u zGgtcOJpT=ox1E_l=Zx%N;}0w-THoxSuH`E1kh45~^{$<>^C0F6561qGo9ngcFsYrO{^bDQv4@_*b5_~&4Z!)p)n#9_# z!pEx!H<-A4U}@$!@9eYbCgGyt-CrG8IXpIdY*yExP6Dql?HBjCCc8!Aj*k#`ToGOo z>Rz)0m`$T){uAKp`hN9rdKjD7Ew=o(oIB6jiCTQ^pVOQJ#qaOqU7Ekt;Itb{^D$33 zp7r_m&Yt9-WH9GOzn942v5>t{o+nSAC(dV+;3vZW$}L7 z69jOO&&khR7@yaMeX_i372ytvySGCDedJhO(d2iMXX}WVr6F+^0~}SaNIkzKW%uWu z=pEz3e3jZ``fHvIHVQ@|@mhAD@tHZxp3g&_qt;62aE6QawGM;_OF1L2@{mlm^v;OC z>f2c3K(NZ#*+s!3{Fc)HYOQqX%!2J-%y1l9+MluL?V=w0 zCGIJ6omxJ-WK{n+ZA49WsqEqJv4_W^rhPKr3lSRP#GefIc%L^s&^`m_T6CUg%3o(JGnu`jvN6j9eplm;dwZ> z=q*Qa*=@$tHTpk_eEvX;H@e8wR((?Z#Q3`1!zRPk{6qYM;EFsiwN~eq1<#e1tNPRu ziA{*<4ReRN5#{Zt)~L&^m;JdD`_r}Uk%G125xg@Jb@-#)xft)HVzD<99G-j8W2^5t z_(SA-*5Z4bz{jrd-RI!U=Ut#~+2~zv>?X0qO8h%}`c}CQ3Kqv%x_jN9%QLgq;^^Q3 z@x!_Q`_lVNjmkxFyW#{|n``T}B^t;O$b;B7=DPj^kKEr#ortpm9 ztoge;6TOfX-c1tUQJ>tLzZpKTlK)vj9sZ6oiGA>UNL?I#wx;59qa>qOvgB!Gp=KB#<@7czIF?#QOV*6Gy(pZN_wPrvcP*wzM2aV##eDQj_?{%PBHxv5~efXHEW zUTJ@hNpSv8OV1G7N=*Bk;2XnvH92p2u6Cf0k3KW`J(~P~3eLcT+!kIbI+nR+Vl_N3 zVm0IA9mamqcjA2qjkda{BmQvC*+$YhN{H(RH0{0%Ly?G>IcUA zji~kF`t35Wa#o`6@6Ey=Su=?#r{(N?{&X5`lQ0M zJpA(uw@3{h<@}}mcvBC#xA3LuS>EeDEp_9R&x)|8+}|F+XSO6bKaGdW02~MYDfQ2I0Dj19jq90)yI+x$W$bi3BK zH)3`Vzmw-kOi9bkp|SPVtE1Z?|7!p1T|0aFME6*+5#7<#HyZf1zAtCSXPVf2XhGF7 zjlsKLmb=X4N`4bxA#!kS}gH$uSPIr;&=_Exo=f?26Ay&f8OSZPs*HRcxKdEo%>dAE4Xe{ZceT7 z?|b&Qj4q5e`FFKepZ_GmH{P6CX3k|sqIa)drk%mTRtL7XlyxjOmiDLTZI2Sfc&AJ+a-b_8$hB))D@wbc<&&*7cKC%`Rf_E%jk3JnGd-O@Bl|HjN zu-xFcN4Fc^zf%h5i9FO|&nx5G2rCt z_=L%I4o*)J`%8T9yTn|Z&_8J6?wKiDSJNl{m+UR|_M*UY2#-w6cX+MD4}g%-$)OHh z-@%uG2U5=2bFn99YwD__8u2$MtG5>H{aTQaheKoAS6hpD1iDV<>FmW)D}wEDPKx@= z9jBa6FU~YM#GTHo(x*l}+35F{*rXR?ldXyV(>`t=6O-PTy3g<@-09pY&rkiM)=K{z z#H?PeKO243gX}o9&bR2-;5&Yg`^9-TI#;+mULjZ<_pQmt&`O*;{^xa)o^J8qVCfGt zGcKuPsaq&NgF`#NiSdq>lWmUWE?x+2tMe~=!3m)Kz=6g0O^*KI+#f_&^Io@PTe2D> zC2m69rD_}KDPS9rHbjL*GY9@ZHQ zrzyTwY)5O@rtf@PpWG#5xqrK5=Zas)vl}1VUccS(G~>6-0k^ZpC`Lx9QoYtx=XW`q zlO2bdP5N$j${%5T!v4hp;wQs5@GeYQ9_FUl_Q$=DT`9iM6Tm$8M0%yI?r-YLZ?CjR<7{M_U?rl;*(m07`U@>`4WTYo87eD#F% z35FYRa(1%unWJ2HBZtJ(_zb)YYOU@9<7JJJsx@$uuB`X4If#1-_ZXd4R%SV8_64I% zZNP-Q#bL-jLYZXTF)cmKa1ZtjdW%oOdvOBt9h42$X*?cU|Mp1Nawl#t)iaPkaEH4X zd!=mgE$%JmzK;i|8RPT|;XAQrRo|Tl+y~5Oo)4cFyl4=f=s5iDM0^ixPKc}DfHiFg z_oS+{u9DcW+*wDQ#9L)_=7C_oqxHrmnL$SHU6=Yo^h~dlySFOKwh)IOr)zJs0-mES^NA{{5-?JU@rp`C@&75ND;m3G3XEYeyKU#0p zyVmC{E1PV3ew+L=l3|@;GBWYQds?E+22U5EN2JQWUr7tsllF%%${rN7AD~HJV(YI zi^IMK>thd;_FY-?c?v#*s}DVSi1;4-e0gq_%nTiXe;=M5ZgLH3t#nJT(8jjg!PTRm zZEn%lJKYrAWO#jt6>W|5PRxDa=ZWRgf7XB70Gveo|D5N@f9JljXa8J&9#i{ z`|DiG^HY=PG1=yvY+}#Ta)S*2%xKgsQ4T3%O&)!6rDJc;Ss(I#ugS=5qd!~h&JBoF zyJYMg?*-pd&*^?S^KwSxy1U&8c^xC56Q)eBhdHX|>MZ>3GN~(2KI*mM^%9HmE_VX< zt2u(2{0{Q`heO7yyn*JvpA$BfaFtr;$=s7tM@qb6M%-jD!xLiLkA@kdVn^1Zu46`I zZP{Me_M)EUD&LjS!ghC3n05vNRd(Rtc9gq7{HGSUgy@GKTT6aZ?_rhK-#pv?@VS!R zbiB6;Zy8@SKz@qx3xpROM0Lh~QMTFp%yTE!s_l+iE4#B7z9Qv;zC?ZM$+!}quE$xZ zwc`4y$##*u(;5EWIqo?oCRJ;7$9E=XB5?MW_N4=VukrCJJR8%EkCzx9gEcLhe_%u+ z=XH7ZU_tmO<{Xf|2JO%19GknDiJPf?wyUuJ+P+i&2+jljbGUc7(fQ;!65E7*Cbup3 zO>^Gz9ua#{|E@ThHxxdwK1`{PY%26jr@+=<##}j<^8@;o6uQEH8dhyOlf>)FUDt$q8+c~wh)8Ej<@ zYLZz`$b0%!`e_q0=E2>;=Vx!u+C-i6yiA?o*yQ%VE4WL1Imf94rd=KJ-LJ&w8>0<) z9^UIRsav3Lxo3~^wTLI+|LL)wQ~Ne=WF0d*`+MJVSbc~(Uae#IhZmV1M&>28oIIOW z^S|I+gS%jm^i@&cF3noJy+_<5);in?mO<|+PU%AuT--JAU9~Mcm^vu-bP(QPn{$Wp zujc3GmvnM#fm&fTe&$NAimsJ z(BXd$EGF|n_<-@j$Y-VXGdaN3b9S%X4Q4^Dt0$yw4SA2CLG&uQ3nF)=#1~KCfI0V5 z`yT6^`^8=}=3;J9@26TT8J?E1dAFLZ{d_K46#tg{e6Dw{*a+5a9Lydxv$|>=i!(e8 zP8FSV>=Ya!xkz$_^>uHTzS=pnf1ZmIbECeEzm2sHKRrIx_+6jnKQnl59Z(Z3V=p9n zi}t$vOwYoUVsDd!`zihJNZY=!j5AYs7T5B14B2C)e3H*lH$wTLZhxjo znNgTFa|&mb-j|%oItQfIDhKpYYNudL*Wm6?ioO>;z+5o61+qi&J)QD2gXA>MpE8=x= z4}AX~_&hy=X{P^uA~3N*cuLl+&dkm5`xDH~0z7nf2o1vBu+q z1jfERBqx~q-I)bnWX3@ZzALc2JriTwb1~W*Z8*=>n!3Fe<`5k;9I)g9)w+c-HGA0@ zf02uu^U9(2z(e?!+^%k;KkfO1fxT*U(lRxHkeEa zrT7aj@xI@Q%cjumwci|ns&b`j?uK$43)q3Oc5@*p9 z^d$>bo|BcuHgwJvkMI-&g0KJjBFPt96=c{bEnkn>-~ zs+hqMepu@9alC%vX(p!YR%n%YBQP9|QTM{16MOD>mSctM^6UpL~8F zbjaWQzZpLhpAmeCILs_?HtK!uRu5Q25Z&l@f zX1I3KZbqFEu+z2SGZF*x+&ko|MD~t{?@^Vw<7;3~wG1pMjy3i9t25F zW{983yu+KJ@@Y50NX+tQi*2QDyep_P_O~X{+x}4SP@sK`P1);2C)2(#7Oue=(TBes z^O7hJ%&n-kve9F+6O8}Ex=rny5$hoC#P1nbINZeS2NQ83>)cK%eg7!j6LQ zF!9q4#UFE?BV~_u+EodA=cEsouvW+GpZ-AnxA$=tgYu7xU%`8NX(EqshIfYXlgEZr zMW4{$t8wh?;3of3Qv=+P=mD9OnA3N*%r@eCd6nB;%OO7`GgQ^I;C$(O=)2!Dm?m|t z#Fv7?FU-6%V&giFZf>(s<~yDt;Dfcn7lOuky|Y2+l% zJ#OMD&L8C85>qxcn60ShZS!uJ@dPXK7wA6ombdYXwsa+&1$XcJlEq+>3eiY`VeCi z-^p99zy9fda<5Oqz5YAoP}#MXme2gpj4lG_q1fwr&@*@EuQq*NyW`);8Bvx7L<1tt zKhQdAE%%6aO|8{^sRmAX3EqYGLaj@2P-Oj$*QBN~bl$>u9`saC7VYdO#kq2qX*+)H z{~9+~`PDrlo4cHxnT)%jus*ehzj_4on~Ti6vkirw21^-+x!&{{&Vqk6%+dLaKHf)} z3S*-;6xy3}A?KSu$MNV}(RQa(Ue#_5#Jg<{6&LhrwC|qfg-&IxKS^Iyf6tKAP*pF7 zyW^*AuQ$2Kct_yAIp-E^|Hay9t*JjGH;DH0H+qebTP25m!KX*vGIoRGOm(N4+{X>x zY}HeS-#QL@p3l#@FkLd18;y8{zQ5HO+c)>;^eSz;z3=^{C3!|KTL~uz!MVd(a$1)* z`nKQmj`U8Whru~-?&;Iu_v15g=3P^X3x&F6bu>l%0pbR);XnBdWJ#@+EKQ8-OxbljCkMA zHoa78tz>U~X1(FAU*s<`TxzVD(RnoTo$CGE9&d*pQ}U_Skk8{QQP*MnP5L6HI3Lf? z*|=NMTg;tpjI0k+hkj43$AAG0#Z*Gk?q3`&*ydZTzdZ6YrAF|JHD+y_fpX;EKeZwEWMDYGqF-Gc&yDCdYaT za?O+h_QIT%RMbUYk{qKw!V5nVy5csg5nZkZ9rLBO8gV% z;_pE0z?y-(peH+mZ&t^EaS)fDb3Sr>o8`Pdz{MWpv6lpO#rQ3?R{L*JMF>5~Kx z`5B(ADSpGmkE??VOppA^{L>~sUV+w7%3cfJt4l`Jns&jRdO>m`kSiGVx#(w9-;Z9K zQ1wL5nSD}fgl9Q4Cg%?kTf^rJ61*bKV1?8&voAPb>#_3jsqtp6)0Dze8r4>jd%RtSU346%iY1!tH@QDdO6lq>$|Vk$~LV_*yy*M4@}?3PVXV{|LNN_#YY<- z>FxxEJlUHj`@lX>*0k{4=d`>(Rjrkt=@FeTxFYe!x7~M)oKGxVA#zLH^7%xK_o1=P z8-5_Q+2~KfnQ|VD_E*;wj}-gPd&E2!^J~N{o51Br8Q6!jdo1BYV$O?^y?YZq+Dp<8 z8JxL)*x$_YsZVLXYvzNvE_c=*Y-wp<;(9$C_PW8fT(2WsdmnfBJq71+oLXmbX!YK> z^f;qS*`KKW&z-2bB?id+{tVQ14#OVO7Mxo+*YGKw6rF6anzQ|@Of0-BfuS|}zYyI! zPGq2y_>CRWH$+TH$EuxE3YVshYx3=^4bJb-vR&tVmZ$H^8mG4d)k_H13^m)0KI_&F zsRf^1{v^@K#9hBG+FI)odCPx(QpV13ALAV>3*LLWrCf^smOb*!)71 zZ|6ou?mWSx<^qo*2fN1Vw>fr>(t78=k~^S0)MVA1!F7m#f1l`w!W>U|2I56sGCho6 z{fP63qkV?E60 zS0?iNy%QWN~ZeV0-Wz{RUIZM~-@}2Ux>41J6%A z`Finnv7zk2oEVQ6SsjPFToEpi^?a-+;XlUgwRo|4g?WZ&^`6{E@|h3u8S;?m?`J+m z%lTf{&gT0F6WpjXKg9RkoU=8nixWMqTjQ-J4^jgg$C}C7e|&tfDcfY~yQ(AAUrchD{CtF(eEJ)oKsMA``5TK89CwxRVB`0)A6DaO%!TQ7uLK7&^Q!Gj z`!)^ufW~0g=9{G6hW6{j!bb{+1QvQpahK#=z(Mix#+>DLk0Q_3IJ=2`(V$j1nW~aWv^>% zR5}!uU8}@rE_E*vTTHBmyn@P)osZgh%cU?pVlAcOkyC3`ceLC6%G5J-N-5jN*?F7^ zqHT?XoRNlU9hEuDNTi4xJ7)qn{mHbOTfP+4!JUsCw;JSZV!`&sH~E$~8~(ZApX7xYjQ?1N5DcuWRBPBT)F;$rw?qF!PvRNKMbjIfqFtDo zvV1|Ez!R&vmFhe@SB3pzd>-B@wN`S)ya07C^8yQUwl0N!i^hT){jVf8+zo$wL_E^y zt1iG{ln&qjlUn0GIyZG5;f*jdxi_=d%zho?eIh;veWcE9JDdKR_fkhl&Vv8mzHp|( zUhte#@^;p3kIa*hLxquMvKeDvdIYaYd;#0-ti}9X{f=s_-toDpQE*`98FwW5R&voH z5&dfVNc~DWkoz;YxLag^hj)Bh%VZ^Hf!Q9Pw{o1PNqz1({|po^N}pskY8!M-2xco7 zUDqQzTKsML%&ec+_P2lW!IYkpdsq4{bFW)r{+GsQo(LX<9#cMBI-fQ+MXiz7?(;}x zDrfU7tHI}>^(y6LOi4~2LtmuMv+s5lrVSP4TpC^)>NtH(VX9yS$XZ0oBy&a$ zk>dC0itpT$wY7cU$@+W#nf(B|LOsvi;<Y<{=Lb!TxUI_o>5o) zJGlia!e2;?Fdlwjg{OSNBO#zyrLQvgVo!FD;bC|zfzKbG;3hgefzh$YTxutNY7MQb z?lSf>xHh!8Jn{r;A5X1`f6`}Yl$i7>#H5`9%Z)RxX#J}O*ZPW#rb7SQ$II!Q< zk?ohMN#tQG!vD%0-wUveGZuAhRi9cXxw(OO{-wpG;@gacTt)7G#BcdGr*e7 zyI=4B&S25wu~%{vu(?gBuj9Et2Rn{zjo4WvSDi;N<4OCs)vnELEy^yCIF#qupU#Va4oD8?vPbUP ze{t7-0(XkG<7%z!`0Bv&*G29%=6`N=BANE|uIBngw63b8rs&&bi4i!ft z{n#GSg@VIV-VVC0j6AF<+8&=Kf1RmCiQG@*nYZDYmw;13`~T#m5*<6K75qJ}sbfEG zxw&ZbCWG>d!?ycLmA^PD5#PNKzhM0BH3i$J)&O1t?kDrDSLRd=GoQ14beNHWt-;4q z(wZLZ;-z$Vs|@Y1UwSMTJRHwm5h;b*F~inUu|;2!1eO87`e2ewxl z7DAqZdv#igZ)6zGeFylgv@Xgb->v1U$+H|R9X%@p2Md-Pmi_fQC(F2%I4$GWaqf79 z1G6>>D3Sio`SEX+BxSYn5>w^g*^VH#g4*rZRx7ts&#`%8S($XO}Ui8m6=$}Ume-b=_{95&?$K?Jp z--lV-a!;R!{;A2UUQ}W@^otnRv(M{};_uAenU%<=r}H_J%jlTtXnK>cb7u?Q$aC+Q z=&N0ie6Gg5JLFChS^XJg^@6P8j@Sh~L%&hS^+zXWkq-~oXdP94yMMchB{$}_#>CAC z@bygfG<&!!wAj~|=m+FopfAK45-l73!a2Ct%I-(*!%`FS5Nbl$N2B%ap=}Q}oZIIl z>Xa(NA7%f4fX->i;yB9Hj?@l=UoA;5(X%R=)w;~t(UpC~wx^>a zwDm2|2hU6Y6s|S=?GxlXtKc(FNccZ1@^%hO`(k^M$6Yzg>X0{jmBvTiP_T71eItc`_C&zeGuKxzALdefM66L!{V$Wz$3Y!MdE4t+zTBtc zKg37l-zh(b77sObzpF~v5pcqwb3!+A9-Nk?)1uD}{uUJfV=#^FvF(Gnx%eRRK`NHv zOdP%!aY*)-DxK+p7k$6r3Ex7`A69l)sb;u)C4GK=o-$C08LyN{`ooXlzfvsUqSlaS z+?Oq2*Vg{P!~`es+~Oj6PJ9jOB<;NBFp&q`?MycL^kK-G@V-+wmKDlGPtq={wX)0g z=qJ^>;uL?7=py1U#7_B~cw)rYwg$=1R>}M(-a9|*n||}}BbD#|5ofn7u7~a|lU}dx z$R+W6PQy2C2QQQOY}hyY{90daD4Zytr{5bC?VRgc)ZIyaFYM`6(MU7vb8cj7B$lMD zt?Usk6--0<7+jY-Z*Tng!DoRXaR2%JHO^Rrq4mt!`iDa@D|0@M^VIcy*t6nW?X1O~o`k18XWS@Gg`X z1i?|TC*D)?57q1>9sAdSSBk$i75B^aZBG20;uyKh?3Fk?;nS|mJZ$O!=eR8rt1_N_ zH<7pf7~PiotQUt{OpVaj;n%Wnl*zYU+ZWl{>1yQX4!73$1|wX{127}BKKu^qnM7KdSZ{nK(?p1r$=E;f2lk8^e89vW7j2k1DZ4KO7YG>=YseG z;uet9J79KP;Gk(hU)V~c*Gd?FCAG0J*29IBv^Da8$ zIJ;Tcd1r~; z)nsj5;=|q_rS_gaSff87xCo!2&fgkr4KyAyJhXRwa(P>bJ<} z#6CMxiWij6_KR3yv%kXKC%($(=W{-rGkmAs(U^ayxjLycwcKt(4I%yfci<1GwbJwL z%i5bcP?PhPUza^-8i)C$sCW!2@h+$36nDXJ`249%Dx>qK!$X@ZC%=t68|0sLu$SXG zSqIxB+|H`6VVl#z%n=(NT7HI4y-yAP-<)Yyc=D?An+N4Bhs?c&dkt3bm%@`OZ#&rW znqr;1cY;>MR>sbr?Wmc^yw}(G4I)ddv;8u`bFv=nAo@;mUb&W&JHrP=rwzh=c{t%` za>lEE_kOvXO8A>sIkNC4xnIN*pUys`>T__W>=o7e^O)dN!QOd~4vlTk>?X_zqyDMI zbM6Emf|jwUJ}0Y+hvj zlj`t*>>A(e zJA9_XvphxZvfIwXKP)TdlqWfc}Iw6Mv3!1 z1~{aSiGo5XGRC_JjzqJc%ry{0zWvt+T8Ph6S5vpEwbJcf+p2q4*_M2gT&wtfCuWXt zjo5!wH(+91^N#=3Qyg5hM-$S6%*^y-0$X!i@7nxMlV2&iq5`^NY0Bnn7N&N{y{7I3 z{g}b?>r3;+n1^iwwxjhkYg+W43@vmj<$Bl`FiY+Qzb92pnRwx)ytS>HkpI&6Wo-0I z!->=e1j>|Q`l8#z)8JPtTX0Bbsd=v>-9@HOuS;>QnYH(S_pI>I6i-4s?EhoY80kl7K|k{R?0ob6PbaX)-tY-^9#E}S9`NeCmD>Zs zWn!;!E>361)~eEAZD7jw4gKD!lRM7d_D-ozsY<*r`8*%WJY;ZG%7*sIzw&n) ztm)AB7?W2$Gf^{n9QtT@e|O_MzX#7D<-ZyB;t}+ZFwSEBF^&36-a8D?0|xlK#4pdm zI9*wqi%LIX1p169pL~}Gvkzuh$68aF~`|-Ze&aQH7k3hHB_8i4+&Mnuvbem&&4u6l?8LWjUgZ#5b zNax+^oNDRq<^HV5W11PhA1VR%-C{LkLmQ`$&W;w{&ik&`>c002R8JQ5|3+`C;q-ej zYis{{M4XXS?f~M#96dEJiM~XmKQAKRFaHnobi(I=&s^wVXt0+d@N=}TD9_p4dVOGX zD4WA}=Bz71JBwkxWAi~*gq9C&B<8MWuqW3;P!_q1Odb9i+2JOav<9<92H`X870sq& zsS{wFzR|Pw$$jHy!&fjQGo&=PXg+*P%X7XgR{MZ31%4OTYQEu1(Ms5_(0LUbF+8+7 zwqH0`Y#h&}-mf>9o?4?fH>?!SoKn2pO#U3^%AHEb`4IilS_Ur4USwkYr%=1z8K3zt zo}tNqN6ryTuOaoY!hI_e=Evj`tz{)6aRaXL0z$3Wpg#XI+Xs|EgE+r9_|gf$%`6 zWtDtByyLth&%>SJ zCO5G$x82nk>QuZP(!Ho z;eFnHW|nbN{E^{j>!1FI=&KhYlc-k_UxhwWoQq8!ig=xtfd+gIke9P=}hg@1> z_I=RR9diGan2z#%PB=YrNlr^i0urc4>6aMvO%Bukpy?sF~Joj zt_JA#K>441mrpah#IK|5eN@<_i8fuGbyW3y&s2Vtlh$M!j?5*=BCE?CKgrhZxY_|xx{^J4<pKWt`o9JiWwJC)fc^3y~#6C^#1O5jd z!au>^=6WFJQ%nQjsrvWj;9k(RNi~kmtxU_kYUYegD)qTv2LGW3`$IqEO6*TBaB`NDhH)bbgY)f;?Zy7QyhN9utW zvWja90_Yryh5liU`o%a4 z)^Kt*F>Bc9N7W>-npV#A)|7wR>sGMbTvHzE1Djiq0?)*!FXT69tjU`ZEj0XfYYGEZ zz7^;7UhzFMr|FFZ4@Q@aogaO3@n%f)h0H_$sI~GRs-xcGCr^fstt(yytOh-LsK4D- zuy{+8KUeVWTFBvqKyljhj&x4cbX^)+PUDR^`<$}^t8;oeN2AXe7%$$P+>+WC>e{xG z!d?(0My}<*Vy`Rr$8jpr&-fDXD}|ZA8QyRDJ$J`;Cf5g98{-`29cFy;)1r>zKXkyE z_Dc6kYmC|lp|-a5=)V?y%e!`0aJR`hUK$u|7QRqyW?GS7UHk3LK(-Vn;5g66YEB>f zyv_q3i2iqC-TFSNwYo?5(8+r%<6Vm({R@i-Sio*(jG zm#-H&p`0%dZ7t2@yj?#AA4cay#)fvD@;9NysctO{ft)M3-31;GsR6^goaNg2P4}km z#a_|B+Kjn-T;rK1Rid8LaGaJ`c~(cwh;2V9a|HbUK{!>`%xnJJSKQZi{X^H+P^+fv z+~()!n>uH;R{O?TAv(wUs`t9l6*GLLyQqiNTIE$;-!--@1D+5aH{FGvcO93hwZbK~ zV8(~;xws8JnAS@}^V(l^y#1JiruVB5%~C zYOUU-LFyHiY_rFl{CJPvz?u`QGkIS${=ChxTwClH)BB*-oQ>WcY-LxNSe1I|l#*WR z9rZT7bys6Pk+#Jf5_#V9{9lM~Pg$xD-W7b3_hN^?!PFA$OVq+$71`Q&wN|z9Wr^Ov zr;87pS}gWJ>AAg~B0HO#7y@OZJ@$?K0NVE$o|p%BAmx?%%{^e(XS%cSdD`)*nW?4P z^`BaL1ka1FNc+pW9lj%d66RJkpH+2a=M)bKh8P^+h3pH4n@+9q{Xe#LSi7k2J2|E< z!FRT_%)xw|#fER>>Fm?8=j`=RYjwWW(F&tmt}9$;V(PC_Ul~7VduV%yXBSf9_a215 zcXU1_b+&w$AsIV=p=V^d8Ruo@iLRhrskQpuo{{SJap2GAfQR#*@_WFYD_H$>;P72C zPZ`YixI%0Bp3@L3{WbclsTtl-u)1P4cr5iE?f~AUb@;i3Q7Vtacp^K{mwEH+-_ zZxI}uF;|D&=Yr{dikXsExmQVl6Jxacl+{sJMJE`&jhq_xBy=uCTz{f7uk7b|Hu|e| z&fVg7--UJ0XpnFKvX>V8)usmEi@d7!W&UECZ)d)AL@rhPFkj?p_Z3#TByD5%s$7-f zPV5o%1T?HZGrDk|>@(w+`cnLO7h(r;qiMTFjv&3a<=JwhbJSYN#<;>i#AcliS)JwE z{M78?Y{Bg-@m|}D+f5E`j%&}c&e4uMEI|CfKo$k;7`<)?ZnYi05<^qFdXP9C-rcG05N_#Q;2 zS0{QRMkeaj|Ka?@U|-APGmY-;2-~5174Jc9kJ7hZWmlQ+89F^6S8Ai5k4>xZ30&$z4Mkqik0eDh&>~u=s<) z)-FV?vi51qawFVQz2SHPzqLCXp*Y6Kt4_ zgXwP%DC2Bj_$SRREwrcH^F60@xnO_#8`-O`u~+wI?h{={?Ca?G==er_23Nrug)Ex> zp846YBqri#IKSTTX?snkUhekXohIkPI!wXG@SJPF0j@BUTIb9BmnMc?2!1eqm$!$X znb@S!SNJ5Q_0Qgsrl;U}^muCDqao^-)$-inu9Rn^e|ULzy2SF2f**cDuvVUdMJL}P zpUd-NKKDq+;$z>LxZ6vRvI7Mc^SXWEmc?w_Gf@& zYsQ8Z$WN|vvW@=Hk{9a7QgjDCg&CzhGBU6UT&CK8W{skb z#g0#_@8{mGHsoh& znU-73E)-qFn$^Ym#ez5TPVEMZk3PpI!^ZF&JU?ZxyW8FPmd_WTH$C-gUFJLw#fSWz zoD1XJD)g6WyL?81w~hF)&P}T|C8HMi{YH^z>b+^XBTHB=o+sX6bnK=C_sa^*ZR9!P zf90I%FcE9G^DQ0SBTNi+j&FHQUvqv{ns?9#m4fTV59E7o4s9Ouj`SU+`f$%VvV=+Y z08XXWN{>wnCK;Jw?VPrEYF+N!fxhycs5PZ*{|`FtxCCF*&%Be3KhJ!G*2zaDo^5#o z2l$iogu!h41vbx1?3A{f`^*{%-fPaGTO3+$_J-U>zbGdAMsM8CitiT;-y zde8NDKAN>SUS(|it>%I=a1efrxi$y2kvw1O7V@#{7+kHD+^+HuDBhlX=A+hkLcTjb z4;2MWEMYgD*UdXNyUj+%P6oR+BNDH?(I%Y*VKMsRiUbI96pbpsZ4cb^KNrf za}CFJ=ptYjW20Bi{Fe_=&8lT%O>Pa^PWZdj zymW5S^bean>tpyS%LB6`WqYo>WUiDw=RQ9l z{~Wrs+}VjcTkG3+urX5H6n}+N+dJ$n{nw0Bn*5LDnR&j0F`q)83wsmj&yW{gtyOOE zCfFmbV;{`g+9Ae(0rwMr_?qIHqMij`<*8aD;)INYH0CxS!E1MDZ2PQ-q5o8$(Ob@D z^w+BIywkCLk&8ptr{TPSC#W^=OD*_FtzSAYb-VaKkR)q znRie8ZE$*UIx5KnXEF0ETKaXL{Y{BGm%UU+#z$(ti?Vg7&7&^b3_ZU+!2z;4ZF7RJ zMem7S{tagEb;xxTyFUod<)oa75iY@fS8F^Qf>`*&5iknB4BV?cGIgZEX4P8x_D#r->;2i`?~?tet(=xS z$IQW5lDb>`aQbz`fwc{4^rtu%;W-)OtP=h=o=bC!TI2a!4oe`8+TV&czQ#@<3S z%zvk@`$gW)F5i&gLEY{@tyabSBZaTz0i`hn$47=Z<#vU=-OS0!w<2-6z21Y6RtCnAVMr7m18J_M5b-YdKO(kB4?v)KuBt626 ziEi+3F#E~5iuxQomuz}h*mSj4Hk~~k+Fyz=4?^Q+;Dr|3%02lqv^)&tPSJ5eRpCtK zb0TiN!MhXwVu;BmzyR?dW$%W*%&S%#oaEa?zKOi1dav%nBuMR_4+d8%br;`dTtRW} zkq@)ZIUX{gxUCwZiIO9$#HT94ZzT5r8nOQjpZIyXbD;UVmVQOG=cmAybpuCS5r5kU zpP!TNiDy>zuEX4N6EE}#>Pj`qzt+d7XyIQU!gq_s)?KULoXZ`GLhzfPCE_S$>x zz1LoQ6=u>orPK*2GBh(PLP$#G5)GA<;Y=4&qTv)FLXM%L36nYQ899cTlS)jX*SO7v z2_a08C?r!k|L^zr?C1CF|Mb3}_j&j1v-Y!|=Xbw+e{Ob9`<$~$F34Y?^;)c5w|vC> zBY%r|oXyEgiuLq*G(~cDxa#nn@GQ+8PfZ=HzQc;}7@b@F`;?m(us-#c@HlNn&X40+ z;W_AcFtt@&@AEyKxid56^zYC7pZPc9`{d<=st%I;NIlk@(Fe-AAgzv#|DpHQ9CVX= zIT)Xx?18_n!RPaHzY`ys{>zGRMQCO9RjILB6S6BZGx(U(d@*tJ z+E@=`?O4XyjQ*l--7EGg{k2ia0^M8e|4Mv{(a;_2^&5{pkl%?LPy7}mlO3<2mQU;X z8&ZptU*ps$tNUe)4!RW^s>`{$+@6ukxAydUYLE75n7v}@a20S8Y#$$Tsk)w1jK!|t zIsd2dv7F&YSZ|D6o$Z6sS9&IOITyb=Dr0IL8Q0nhqz>K-<1Hg{E}zx0P_6l+ewlvg zM>BfgtRdSmU-cCD$lPa3|FpN;->r66zsyXrXRgFWt^{6z^?y4e$7*R{U~ZsdcRW|P zSZe}L_e|{sX>4BNdMKKL|I--bOBEOwW^L+eyCx1-Gs!!DaC|&obCkQotj^p zRG3t-akgGTFO{EnRK$Xo=9emuj|~2&`uf>YtoVCP`6m5NDr+#xXj6Taa~NW01!nF5 z={c7V?Ve%dy&(ClHIP?c-qYt)ht=wHT~%REo*lWF+Sj4(MSL#Ux|52N#hyq18m4tR zdlh}$Vuzzp-TPbC`G%)v-F(S;iSsKrMs5}%>#5q44ws_Np|}A&Xk^ZT#STI`WZyo-XAxVUJBJtduxLGyt_*{)t*=LOe99?^cBGh-~2r`qBD{k4DTX8=3ih__E{{(Vx|ZwgmS;x?SMY%j7$@F0ae} zOFUWs_I>Yu@ws{-FL0n|Y+BHU^t{-3#g)O8f%r=B1!e@k&Y+=RX?4x-ik}Oe^KVhB zss6%J;J4V?+IgiHB<`^W_VDO%lK6v^QFXZmTIakvo}|9gFVM@`7W=QqcMd8Zr1OK; z79Gw5-_iODG*J9UlT|sxu^*&L2f1VHVmZ@8b`BR_NYhT-$g}X$* zQ_kFhNW8Txe&+R2dAK+1EioVRQFCd4&^+Tmv~74_v~#-SpV%R=w`=3t_?P%CzV8HY ztmY#cV-t(6!RLE1ABuaP0h(Oxuh!oAR^BmUYfQy+F33kK!o1d=)g-2VhA|4i=xd*Hb1+KjZDGm9Ej#2pn3w?Q zoVgF$0485);@EdX*Q2^cX?q!ZSjdl$LGGEg`Tp39i~keb%JRig)D zvh8s~o{6={zgQndV@cobBbX z!`o%rWvmQYgnCZW!xG5HUD(p+C0QL zw7QZrCb$Ro>8uD>sckm98~+Gg77 z%->7Xmul_De}G?P{j#~G?jqB=L8d(zPJzuFc~`)AiW5_V*8tjBQ*v>Jz0uLKXY$~5 z_|&}90XT=w+1A?owkUBpu_r`sZ^uY~O5`1j=O2o?LH<^6&+%;;fmcSi9O`CZDWL(_-qS?x}_UWTc8hl_i6szLhB*ca2)?<%o~oThy$LE&64}Jicz}Zd%v96gDUI z3tTskF+*cBTvuM>ZxN%I6xOMK)H!SFl(>g6MQ69KEYClB8#FM4RYGt1jn!M)tbe_>5Vjp0g9qIXqhJuGyvLU>x?z_zC@*at?8iS>t`DJy>&na(!aY zfjmC3%;VF-gEa3G`*(fi-w$zs!YVn~ei+a^{Ye539U7q173P^VG$c zlw%9&n&rAjogaP znrw_4b=Jl-??$b!z6ZS(ycfpa&Dz8V))rrr_oWRyHa7Lr_zG$mT#j!7>?{5)b>h** z%hbo*KXw?BV@hMxP8b{iRO{R(Ky@aH~3r1u6J9# z+sfLO&j3r%#`h3skRD!{8HySz8wY4#_)_aMt}l%?{x9z3Wz06>nUo*{Cm@f*=Uj~E zU!1yFKmJap;;>{Udx%@Qu0(|W~tUu-%_|m?e?|Btkz;3Rdn@rCqyp4P+yT3d&hrA&-@(Z z&S*2BssQmBt|>EDw@gj-5#2%B-H_g(bbEd{L2;;_D?Bgt9*iwqU+OLX3+bvU_&fM3 z@?OLJHU;fvZ|xB4hBGO#amJj@+MH+4c)Y~lh{3Wex=H-3F4$3z*x8@Y6c=l*@WkvO z@tyg*q`e7c+Uu77T6`kP_M!1ev1z%VOLD)~I+<5Xud2_!Fm`ny&Hg!MKYEIHdE$KA z!?TCUZ&5B)Rn(IZN5a~%b3JSG4Df!){h+bU>WW^xHTYdCZ-1BlUDnpH)#a|1v$_gr zRhN5A_~lXXON{;+%cpTXM{!6A+FHb3;P-iM z^OAWs$Kj1BjhDD6^;#>>*#>h<4#RL!@)xOPVjpe_^Cj)Q03T)vci}%TXTF~b^3H?4c{!Bb@>nFBN6=dEe_k3jW zNcAg^F3;ZqDS1iW)r~Zy{wMLJ6S4m``8HY)|86{2`V=TnHUd|K`(zCB=%R}uEQy?5 zdUDalOP2wkf&5P1q2A};dR`6Y|2jWtBWgkIeK9_7&*a+pTA@$!f>|40_(k#yt=0Kd zY(-N`^HA|2tRbE!@PsHL(%o+5*Grv=1;IjBQ)r0HvM{7;U zA!WPtYvEZJ7kbMZ=Gpys$WIZ!U^4FO)^rPSaWQWN>yJDaD;R^AIsK{euurz38;tfR z?j7~6EX#0Wi7yDn1%NUG$`1@_XY5R@#2AZ{besk~)^nQf-*pxX3h@R#CH^%#k zT%xVQI(94H;_wFbCGRTSrFv&t*4YfZ0~2GXygd-PQA;zi?=X2d|JT-)HCDtS8~qI; zLnt42Gj*EYt|IqPPa_Klp+LcTL{pb9<3roZxZ@bciu$*Tqar-JFn zT8Po%)ZiVNWBss@dSBxSwV}&j-xNDsj@s}k#pFCB zZZEz$V_A!mvoyB+dEx&gf3yL-)~8}VY@E0nkHOIw*r)N?`(-W?-W(4b_-L6eW#&m; z>AQK&JA5}U>FJ7kq}ab%VjA<{&u*`%RoEQ47~_rk8x;@jtl(^uBSV~UVtlL8-m^J3 zqqz#cGi5LDWng}w>Xa2>0KHQMG$+p+85rzS(#*u%M9l$hgimVE{JH44$lljb#L)OT zXQ1z2bQsG^!=+Mp$2y03GN;Vg4}03~X=`=pn7qS8;!GUNzx~i#%9z6d*qr0D7m3~{ z&3hI8OP|o;4mHM|Rqowuu>$b*<>5e)pPo0sJHDc~eMs8*Q>k_-jc49iF`IH`%Hir% zN3O0Z@!b3rvo?5Bx0G&y{xbY%)+UBf$UauK&j+MAd&ufO#F0cdQI2g2K9sxTJF<7) z_&f9g>s2?sn%+^Chr}CiPP*g1Xsv8WJ*#^2Uj^osjNEu2*o?n5bohPld#&TzzvwV^ z$Ht-d1urb^lNzc4cxIPE7mfeVF1Z<<$ArHSxk1`!o63rPLLRv^xm5gF>N~SGw$Q?o z;~maWw(rhZ(;)1Pv6PMF+Uzs&x6hWI6}vIU-H`^UD@g>e*VzURw_^IC6Hv*!Xm@?T5go zV*ZQ16v^;s@z1n}qH}h=oCEO(cE`KX%4>9lSsNX}I%*q>*gtl(_mhmXKSxA+aJGhz zPAqj0`Ps7<=SW_tv!B)$*Jym8DOfG*RoGDqn#tBqOi89BHcq$*IDR~n`w&xNO)Sr! zcVyP)jwa`)i_E+NGP6(IM`M)-7OOR%as%+<$eT6zt=mejH}k9HYjdZNIVr^UtsP6N z#qKA`yIO+571$k9J!iAcEuATHbtL5K&7rGv7+x`x{rvRt8p~Q8uaOrI%j;92=unkQ{YU0p^}oTCepd4XGW9F@k=1<*5m2hZDs(o6W5d%aQ!ZSR7-9HV$mo=+{F{ zLhQdHXWoo6pA}9K{$lOl4Suca&AQxsBKJ0emx!ZvXJQ!7Z>k5hD&-5%W3lpLh;%B&49G=xqUk3kHa`HuEDMAnK7E6Y{RWw3Fx z_4&U`JcP9_dvZ>f{jQ>io%0K<&(avPSHkd7uA=_!2~CXtfX=^QZ-TWGUPdn7#te@r_9{|u5=XkH-&1oCW(_$E z+S?etEiowO^k1&1Eo_@|bzH1xw)RP z1!BI*%679h^xPqToygTWkgI#6cckWlag}w!I<0S66fe?y-{E(}yHt6s;XGaDuA2Jf zrr=4DA=J@VrLNNRL2rxLE!2uT3KvK&iTsuKfkKVvux`07H&kTu>G;lO{|)g;ISXt_ zbi4YkwLvZRX>2F6HonZ3^c$LUyf7Xt@A7NBK%-!f8#(h<_6@DyJE?H8#xoy<9=CiK z`-{Y1UWmUP5sei22ECsi8(*w7=lwmGFMhP}xW-@WzSPaSGm%HVp0I zE?9Fm%Gh|9?DIRE`I5-x9G}fUtMxob6b(I)Rxg4NLLD>~d#jGBrJk)L>nV|lG_g)Cj3aXR#Xg}w3G|lDN(`(_|nzixozQM2Avwbi+O>&xp@dI-+b5+*8S2S}K ziQSq2Tb?q9Gt(OjjoP;k+*i>N^pCEtn6*mGOv{h;s24Ik-o54q%nhWidp&IRgEI$f z?hlwwiuHG0-e3sO1|DB{TlPj?Aa)0J3hkvG{wm?Y=fQ*brv9t>CiX-O$9G!L8{Q{8 zpo|r1unuhetZ0&(^qSba$&*YjkLv_ zN~2z-yO|3EQVxG|vwyhOdL5TB zISA$lFN!bHobN!yJ@#{vm8QSj46)MzTolM2Cd;IF2tNN-L9>ed3r?Y2({bydHeM4 z{$7Cr*df13boU21!&Uf4+49@2c1@dMV+-db+P%@9xBR%MWN@|_|DP4QI&<1`tkt0( zH?3smM0^RJB4(rIBl6l|9*V?UqE=d3R1lXmkI z>Iz4S?HvsuroEfWOMSR_%f_JWqjMt zE$xOGc1AX)YwF?;bYsqVx|2ifdpt#4y2+sF5>gH4y6{6-pk8x~XT8wY$d0WK82Y+#UNv zcL&b?ys~1BRmX5C{1-Emw_nNifb_3=K>Q&3M1`!&0rihL`zG>^1O5Lh|0}g2hj>GT z7p`r2cZyjX`+05fs`T>E$7u={#^bOzysoz%@k8ceY2EB!ba9DJxvmmx;#u7u9V__E z_4v}7RD0DstGt8dUY4T{u-SKZazp5HLx)GMhp|(t6JjsmFUVoDHadc{uBMki-&e-C zU=2wlYMCf!XoH!xv2zmN`8azDt~b0PTp_ZQG+CQ9`=suk8eJi|Nb-9WxY|hC%s<8R zc@AdN#uut~B_!Pxa{8RQ% zI{RsG=&&6aL%59J8%0FH|9?Mp=Oa@NO;K zYVu+@=ek^t*!I;plP#X9GbE3gwW$-X$BanYkeuN)7ZsP*kA5oil6_)QDf4On zTlqG(VrE}$e3#bM5TD%IDx8mLzMlowx5IDmni$M;(%v1wRcMR-*JFK4{uW&mcbzoA z-q5=J?>Mt-(V&z+N@Qvt>o!}kxN~pc} zmgo9ej?X#_I$~K<_F7zPYd;)Q5trzkbvPvGsZ@VzcBx+E%(aj+8-tBn%P}~*THb}U z+UTzpx_trfKFxDIlCMXvYd`P#<=M5g0qQ(A7wMLg>k%04H=CRYY=g`5mup_qtPQVm zp4w?REArre*^XKR!~8zqk@@`}GA1_2d{A$Hs?K4#uJ{|xr4o0Mv`4vT)+R>Xy4YI% z;(ovZw*IME8~?pFbh*)qC70{}82Io!TjmNeCrE2MC!x1m>XNk@Nn*!6=^uO?I=VBhH%_$5)j}PSr z_rqEX%C6(EUX1SI79_h{T&1wq~_uKNwQ_%{IFU>AFJ+)s2?)@E}nM=za2Bl9>~Au5TH5Bzczm{jKqf^BHJsIcRD(!NJvrB6wpF+A_5xTk~)|%R9HV5vmkBpC0EbIA! zo3HUu^iafk2Q@ecVvAYd>Za07C97M%job{uUZq|oOEYIj_bTt~i|;7MSH1N1%nt3D zx;cDOd=2J(x>ewGjg3$9G9LT@yw`>K3$@nNtc^@-@E!ht�%$%(~nek~10x0f*VO z>R%rP6d~((4?%pM@{lsT0dpKK1(ng}Zw?$L^K*qywN__7W(`{#X;CsmVxg2v-7#B@ z=fLB+4%kPAp3^mJQce#1EnF$S&midWq5e>X7roi|+=vQqsFEvkb6|MrFHh-5gbBCoj3jY2P<=7XW$sQu!9c`^|feB!J@GGM$BTLV}#mrV>q5lYk83k)6}QT)jSV(GH(&55TJCM_9g}tWwVu(d+6&VVy594?USH{*q&`hm z^xyrZypdm=!kub0F|fsAuaz z8=LTt^gjaYeYt&#pJ~?Sy?|vYu|#5GOw3M{crrO-pTAFi^Xb4~VL#?o$oc*w=dc|R zRfldeF^$oMH{@N&U*ijI=4r=VM~zoA$9+bbXMvrl_tlbfw!{lLLra|H+9Td1boc@2 z@VnqU#g#Q{>=Lpf7v;1cuygijYR?~z-d;=dPvu|GJQOj$$anPn7K?r~eE~_{)s1ZV z|1gvsp2lg#AtolwnP|Zy5~ILTrMm`QwHJeZ=+@Sa%QhHownxHwqRYs$jJMc(*--9B zcpEZ*HhR^q-W(YmtM+`aq*r1w@E;Fd%=0bJ)k}xoFtxpF!{NZ0G1y8kL#-+08*R1@yvi1_pH~oa>=ZXZmKI@Cb?SL9;{il za=3q0E%s)7sCT2K>O1U9JgGsVjQT`y6b&!1#(-yg?f2}dPIB{yI{FloK*sqHGmyGMs;JxQbgxz@dROS)+fesge=^o^c~ z!V%8sw6WRm3J%Z53tP0;IQ9<^J-9#g;FrKK7d{2Q-<6ytXH~*_M$yU1y4(ligTD{o zkUb7o2HxO1>~Uf(vZt~hVxc)XTWM(%;yjk$n}SsmLwFu>(e?Rp5(6O}{v_EZF+c`o z*5@5A^fjf|gr~^k3kwVNcbCLV6z^hR1^(5Fu&8#++o79Nus-eNVFt5Atxa+=@I5H2 z5km9A?4fcmhu{K;InxH8b6&YwLr0_j;Sk(~mF=8KWa;NFU=#6k`c~JMoLxFIRnZra z+$y=q7Q}n6tf*6M4yxoXICS$S)Zmd0Z-u}zYol8m;}dk|_?>x|^IhdR9^dBmQCpYi zV{M5A8E1PunZHYW9;XM>0~^!(yx{Dgs1&KJ;0$HUgIm4BMfTFhXfC6s@c_>niW{HrKZ~r|d(W51Dp6Fr0Zu*jvrC*3(+syKBs^(A-cXaC;clg}6ek znv=cFfy2+gJh?ofzs6Y5{G7wfT^&1{wsSUVM?0Bv@1o%6t*Ear#rm=eyOg-u_T4{0 zF3ie**1Pgu_5g#z_O&K2Kiu2rB=pg<(^A3A)CXB@)3=K@++f*N&Suk>p_T&ft`}*!Zi%$1dRede?EitG+ ztMH*X>tr0>mp5>JxU>!XEJ%BAmM&N9sUa0TR!2rhM%JhMBID-%j1KQndOjrHE%KB7 zeV63UlHLvaO=BwNl25=KcFJMuP}aWMIB-kb$wI5-FY>kZ9n9MJ4kxD008XsgCuhsr zI8x#}8|=;8--Y%(Sf+EmH26+m_lOL4K5lzvyY>k_T5>Y^ZNHo5e^ks_5R4#SMFBICo8?;UQv=i|i-gW!b0b&o3 z&KHCWLTm4_Ps-{G=0U74Kg@U7=BvD$mHwLogFi{X@`BWOwJ~l=-=s12bG!$%K5&QM z44q|aCzvy(OkmxtSsVZQOT>%p9_GYuu4u=&S!&m5)9yisne};Rm)z_^+B5d7W)_E+ zaj1Hs*Y88^rM)$MC*t-ztF%WojtqpIN`UJ}1zNPWv?|WX2x2RODaoQ78C+eM|*A=~@WL1J)OyOHyNteoduX8tZQHV=<~6#2Ff_cgo%`|E(@e`*ts zDUFlgq7BS^BJZUh1UeJ-0M^&rS~A$(q}9kb^;#e_@4eze$Qfe;9~+z^`j>vkocKnu z+xh+P1;fPjTzr-}L1omm>@cy}*oRVw`div;mx1s0uZV%9!kqZ&#POR{?h~gUH#3~6 z@#?vyE`qU1zx%k%!}7a>c;*%Ogl$u%=AjqPfw9nIv1i6YA1pkmHB`0X-D&GXv4@Dh z3GQptkC`7cf-+0c)kSjz9~N8<{JYS(mY0`AZU#Lt zqm(b6^`2GC{A1!{%JZ6A15@!o%Htce8617qmBsjcjG? zw9+(*Khw@JYh&lk&n=bDX-C}@-V|EdGCz1+^B|npW@Yk%in-ObiNk9h8&}9E&*fgP ziT*03L035|<^o0~Yt)weBz1wr zqiAnbN5e!H4}~uN1L`g)$0!3g`%N0JXz;W09ooHHfhi}xB>uKX9BS@~c{fWZtff2# z&zTGz_gb6R+E`ul7Glf1mv`_2-HP4HI9Hg-mAJl-+Q7}@UJ^Oqa7nZTe!B73%o_9q zf9<*WIklrUMjJIw#e5duh5CqC)2Cof%6g`vpM6`!T=*XG(vtOUJLQdR?1Fe^bIH}! zyb`>kd8p=+!=Ny0=AMA7mUcSj*JV7JJbsyYn`7{Qzv$ZKVftJ=L(-L58@f6qJ_LRu zZM=;wX3ZRNm52GW>f?M^_*COUK5R2f8_cI$-84M;nbu@(_MN@@czA%+LerL5SAi`* zI&}3{PZX#lOb+zy=rN%s^4i$g`MKl#N#Y}10KK!W@QUPcse|f*I-wcX;57yBioNs> z;uW+d%6{A)v##>i45+X95Ewz0X5R7wl~J5?$2~Bg{^$Ik)m9mkIQ+vQ$r*Bnq;1v} zTOQm~+M~Yhd&N7|7j9i>t=N^rO2ZT%qc+|r@%9<@0GV>nd-3 zR9|&m!Pi>i3o{o2zmzopV~bgnn!Os%bCJEFUuj-p9_B}z?=UWB-(_*)`spSWjr^pK zzXLpOZLmFsPGT#b>7}~^gIaXok?=#Cq#nl9mhUOK{0Lx9VAGOT_q3R`@!3!JPWSBZ zZYl06$3mx|2C|*vqrMit7TR3fo8>zE)}WJbD`t0IQIXeZhJR{h$W-Jt_J-k-<5|(RdAtIvEzUdnN&G-7w`;StSxcXLfzr!6MTP^h zEMokYYm9M^)L(o)>rQ`*HS13MggqcLjh#kJNK2p9(FGz)&xgFlOl`%5I4XCv#+t^) zu18>IDkHHY%HHY8^Fs6dE#fU$`PLVBkMdsdgFY|ZDR*}}?ru5|(`;UEUgBy?diw*w zzh;KJS#$rbfCXo2*jnNFYk)^*ecq;EgJ5o41AW>$Xst4Ef;U=zmwh_@V^=SIWadb< z8TwT8j4wL*Z{%%DPn)o}+TE>|1- zw@OZVKF*;rUM#kH4Ssi0ak}`P*ItA9(ZHbQx#2%;Vt={Z^%J;jFSA#9d3Uf|`wgGY zJYAlT49r-dT%U-)W@acc5U$7HvL3i?;(GJHsp$LuneQ-i-}4*> zxXf9)iJABl%^sHo4~CgSPEHYs0=`M{%EvfVXLN!92uL7z?@$HvAZgPZ~M! z0P^+c;`1%g*O&RzgvTj|@9`FFYsQk`LC(&YeE04rKN|FH{_c1HaEOl?&V~Bzhgze`O@@K zrOz=%SKsw2d}^K>b6CxocVO>#cxr^n3*g<)&Yi8Xi>AO~;IE6!%{0Ug!1Rj{Eqwpd}j^vP~AO)FG?C%R1trxj+|WGlkFjPFuEH%VL9x${1;LaE{3Tvq3Y<(q;}R-|MZ4nNyv!F89Iy z2*zzFayV<_TF?OFkn;nhEAIdu5_i$!wX)8C4$l^RO$-F1LwB{9HO>>ynUHpI?AU)u z-m4LtW1Ys~<-eU+nkX?_i5&qW(Z-QBmFr19#B(wQS3lD^J6wAqiIr`AnP*ZCcdJ7_ zC1=tWXR@mFg5vzoOu3j9=k<_2X-k{6v86fj*Xq90WOkd0DecKxo5V{azo|apo8_M9 z4{&h%at^co;8CtJALEoPGTkPkRV(nXIl~UQw%42V8N!J9}ytBI0Y$@FgI-)Ar#1?uuq(es>%1 z6VSjTsYiwHa24sDn0siS`Am7n`g72ID=K0^%Rz5;pNmSDt3SA3wkWY>&Vu1wF!P-5 zHLdck)K(u@9H>}cKMj9c#%fD@gZ;s(M`i?HKqi|rB(3%=)9M7Fl)&R zdwru{icd|M^G5u-#-jUIHOZNG!QtNK-=?|-GjUXZjVazNHF%y^?{#VCVlPjY+zf@W z@d%9-ZweeQ^hqBtSYedg&B3FpQyxVSU~JXYGxR zy^QqFHnuVBu~peMnnzv*3}nU$*W5uc|a4FOQUw{TaB@QoEsr_bq)4&eg)3nmC>0}JI7eo z@YGrQ{WH>MzzT++vZ))KjS& z@HyjJUgmga&NbgX+;{V0*mp^K<8%5|V1!OAIn0Ww z`H$s}=qo){YSNfeb+k+5?RPlP$D_xU$AQl#I*zpp&B-#!HP68N_AJlb?2SB*SsNL? zKK*O4|0xGhS+4Pib%je>lg5ZE@~^_xtz-?UIK+4Hz>hpP8)XZsAQ{6aKRyhM^tM>n z&0iCB72BKf z`SwLqr}qWuq*vnlut&W1X_7OYEg$tP z_j0nd5KYKBZ&ioXIaEgFnc+`!O}cWBo2 zcc%|>VEVxH7_4#p=-+=?a$z7zZwG3pExk=oUnTVkd`@%VuxAHHj`z<-(1ClS47spE zR~{NJk-u$&XRc3Qr#at~C0}WL^F7(QYR{jUHa&?0y&6n_a~yXvS`Xt+E0_rI7G$mhHT9ao(mp|m}> z^uEUYJLLNdCLZN{Qw6Q|jeagR(g^r>h#$t|@ZZC20@la9l5gd^Z$o7$We(5z@x1d- zW51o~vIIQdIlEl+#S_pMwGtbz@~-hlc{|gtN26YPP9tv)Y;vJ)x(}+Qgme za(@!O;CoFfn))dAq{sewNt1>M&ie4=@xzNN)lr)t(l-~AC>ZFS#kxlMxi#oB-^ z_$^C^NBc)Be!}zl)l#EE`S5wU|DF6kw`A&dao24c{F9WY>WeNWb7;!ZIeN@Zojkt( zk@v3XHJ;lE(Khi{$jiTpej|At`mm{XUOVQ;scU{;;RCkvj2+HcrI)EP@p;f2{9nXR zOzw{}WGzDhv31hQ$p6dk|UvP1fiz{%3Ps%yJ27Q;BTiM~QlK5vY{J=-i$Cfuk#{DQC zC@0wyYJG$rwoVEA8BsCkcMLG|ZA^G(GE@EB>P&UU#x(XNM%Gm!KGPw;((pUqx2*eS z;kx!z%)(w(Sf%vxv_V2PuEngf7RlC$~rJ z>Q=B)&6@PHspU7h-{`x{D$iq`4ce>Axmhju6z|bq)NeB`rtu+o+44L4FRbm+IqT|v zn@gAKoG;=?SfBCf_-VbP+N>vj0r|IY>3Z;*sf{;lBXb&4jVWs@-kttIbBnctUu1ZJ z^$%7r>)Hvpgix9xw$XQ{{fEw4sv&#EJ*zgBs!-|&UP z$zu0X2O*&(z7=y2(<*x2>vGSlY#(1ZL%z><90N>6_J1M8g#NNtX-gYxLg&MF&br*e z@{H5t!&1XkzgOj4e_TUY!t;$yGQ@MA4=BB>zQZE?uJ!lX6K!*FW^MXjk1w8T@)4lV zR#mNZe&y|$Q)ZvvKUWYsr%i?YvgGJFU*^W(MvXoMd)UKoKbX`Ia7msH7;}` zaM&!*cF3Fi#R;`(PJW8GlhI`jDfY&ixcxGJ8RUbxce6J8A79v|7!gU{)t$~QTqpek z#6Vb&?htENoD~=!nR@fa{H>y=DASHB9H;fCYkm&^8&O_SPM$qm^sZJ zaWBO}d?#h*2N4r;7v>__{r@EUldR3{Zb^Twa|dRZ97Yi9vdCZD&$AUhk6%PzL`U%R zd#=mu$vPbVThm+e#A#>HVPffMu^)bh+$eL7JX?qgkMW9=u&&3N_(GN!%o;PWqWh~@ zYiH#-IS0mZhGkFzO7mx;i75z&42OrEmsIs@I!r#ICIPo!Q+f?B{ zR<6ERe5dU1r)!QYxL)S1$cU3SNyC(r#%Ab_y0te&{=9*Uk9}X(2$p+)1s;gC?Y9Nn zG*)nX6F&ORcE?rzLi)*eaid@94C!|KT>)`YbTlmhtbD;hn<1GIGHMO6~+O! zB_F6S^N3)T8@ubWc(l&u=$jvoa5?x3cQiJ3SPf_?({p=I`)JarS^cNtPf}k~7yS0x zZYQ;^sGB+ZdJb2Yt}fee-D?ghIQ*8EvoDLjtHFH{dxSjBxPe(4-+Zojh{PnnLOuNa+=}ot ze5W4Yr|oCu3}@F``LF;v6dNNNlsNp2*nd>c`4KqMxu{Hi*? zI#TsxQ{Z~3J`6w9IQGdU*B@P1&Z|y=U$(VmFlwly>x=cplkiO9G}gwe6nA2E%(^C{ zk8bdXii|xSGImnI}`75g-840)T>9vh#FwQ45U-^P0@{}FKQfYFEFWgV2| z_oIu>zS`lR3$bG8B^=`~5OsN(^=z9G=nP(-M#3Ii$k8#>v;`4ORd@KM=i> zHaB#1`e?O1j>XJ7o$llS&K=nwvU*>=ETR-5pI^^pmu6`}};@`o)1FOra^wPLou#32lI2Sz2sr0 z4E^_ZI0v%^4C^lculW%CbpCBUzRnqNmY#3P+>){Dn^HH4j`loY zJA3X7$03Je?ZfLz&KDSx3{m?th5y*+?*K*w?*%^#A9;i55%Tz(MaM5q!P6oiRzN=7 z9{mI7YJ3FFf44Hqtc^V1;SU#CeFkK8?7Mj@lQ7Fz^y!hDZQ-y@s!=a(V*qv8}`1;+UV2H*?-CYX$!4PTn^>Y>|^GA5x1$! zy&-nU>#%!o0M?4d`tFo=u@qvPTm9Z4KR}+@A7?TlJs4|4OK%n(reczJ{#Up3Cx*^p zzY#~s-aF>#;eCzX*_*1?T~rlNU=I)yTaY z{6?X-KZ4#SW=)RfQphy3HnFlhym1wA8VX z{wXJ|9NvQ}c>9h?KGB)Z+bVj6CWn)?_H_hoxnt!-+Ms^;KFD^SP8E6vUF>%%Zrsv9 zzYM&8N;rJ&`Ea$^kZWK=K3iHQvX}3BGUSZ4?c4dsm3ub5^zp^PIP=Im6?baZhDSc~ z4$$1|P?@o7?5L`8{+cnX>gXHsQ+DD^fF-Lvv+VCMG?w)SC4)f4=Dy6@$gU3ge~Hfe zCuH>vKBLrzuP2rmD=_P^@dKzCF!B6`iul;i!=LL}EwAVW`!x7ebg0t?k}^R*~24m+>WUl7dZs zZO+Y^ial2!zNz5omNkb~2KKM$jlI6qkm4P|9QO8Pe<`unt8qSF#?{|;iMnWxyGQ(x z*aq~S<1jAI{Qa@z8SKsSaKOoK`(!(wb>(skrKnF-skyPdAkPKvo`M9J2_VBOBsv!iN}A48-Oq7 z=jUt95^=XIO`5f#$)8lY`m6DU2bKQ2Rm^O9uHbN(=Ov#D?=xSsumZ>I`|SBT*OGJY ze9y>dvo^l7S+fVTW_Yi}VaI)+dn{nBCh@^o+fVsSIb+sFK3`X1^9-!WDI*RnHUnvU zbYYeB#W3Hxwm4el(yFYnGfB5g3yV}Q%q}_mq_!#BO0P!>$bLb4(pzeXc$yI8ONf zP|P->E*K6Q$*hg<)?CqRe`fkwl|{65$va5Tkioc%jV8HZJlH@;De#v0?5znLz_SwGBUTYv93?DLf8tmlS*wyOPq3*@n*wxVyV(a#X zt-G_dU1SAy%EsV569a*rGb0!;_9`zUmvQfMS?prM*JhktU6v*eK;%6R!WtYoeQ|%@ z)iiFezzM0Ua`L=m*j3}S&y)-{%fWcBM$C|+E+9QLCk8JOG*DyKZM?S;M;+x#ark`eodl6#6?> zhToq*PGV4$Z^ZZJ+$i!|=$SKtI)%++=9{y}^9hf5AXwmkj?7RF3vJhojVItEYh#R4 zdw{W4Yo{%VT;F|%QnlLuA0{6vetwLeJNquR;Z($zgzu1-cfZ@S$XK-b-5dP<#a`ME zcXv7RJJvp261n{N@xa)$@7oHsdAw^hS0P^7Uigb=KD*>(=@Yp-CC)?tePDW^)*PM? znO;9)k&VV2Nj_&HY(mnK%~|it%t4H|jrSU2J0E#2{x+%Pa#)yjuC>A2Dtc_6id+tt zy|LC`exUe(*m9Udhu*_ckv&i99i9Vq%B*l~D=TN_ho+bIRD8a+=&+#Y=iF@K=D=ab zj!HJFUjAFw%>ld^=gfE6f_I54ddXLW+r{4@ZC@0am^Srk-^iRvKb-B2u(`I4O~dbMVSbJP~v zU9Q{T1AX_OoXd+fl>6)1k8oRjoB9-Uy}LCA^$q5c**L?a{-YYx__XaP=?&R~GZ|4~ zr~MeUNUb1!-mw{naj^|r)Y9;h$kqKaS3>>5TuCbL>W(IPle`df?)6#NoI1{uy)@<>VL8S(ve<@sP7C@)|!4ek!#zq$RV4PC?FY3TmIM%{jXw z_VSkZu*IT5ZtN7Dlinl#2Wpayy>V{wT%EPSI4Aky5$y91*+!LPx1zt}IDEbr^iUVq ziOwSZTmf5xzk3b7|9QdHx|~)#Q)*ck;Pa|nmG-%G^=F8!LVcPkn3*gwbiuN6jl?66 z17>aX=1GOYWq-MQs|%8S;zO}_>E6`6ib26z4$1NT*xI`m|LnczGUZ+##61Q_4g+v& z!O7A$;x`oA@XW%Q@>}Euvo!uSD6-naI}W+@ASPWBbkM zzp(aOhx~S-y&b4Osg7I@rC-Kj!%ju~&DLEs1?Q@LcyiJ8#+tQ>MXdH$%lBDFv_JmY zoa5aogZIvNFQ8DI^n3=+utVO}SC4`1L_4Pi`INok7C968@86Z@CeTJoB3Ji#eW}0H z2w{eA%hc4rRb~$NpVWTvmbNWzt*yHz=`VQ}@^8M` z(9b5IGg{p`K0Qo(7Sp?oKOWxkO0=j7RFnfk*0G8fBvPQ-aWS#tJO&y2A{dO=Q(jZH5qF{vh` zO^k@Tn|0SbL;6#FOMBsKkf*L~=>m)q`(Bgt4%?(D7$EwH{^0q!^HsKV3{9=tLD1=D zZDdI2(m}>nfo-`EoszUqh^;*;>-vW7!CWMs|6!gi22CYmUy=0W&{(P!ro&HeP?rL-<7^A+kV|^YQxnUZ)DHD z#fIt|EtOhL#BIWtV$=>*v^omBwk7>b(Fhi?{piVe>cN5_K0 z5jr_MIkfSjF>&9LwJmpLoKMst|2MHeU&20TmmKEjWAS5ZSIo)G5&EPb^lj*DfNh8% znzQx1t1`b(-#a=fC5ctsyftG05l zIoKpJ7O$SJ4yqNegY)C;`!d&Tb0}tQawz}K{u}RT))Tx5YG<0Yk+HS$D?mgx^w1Qv zO^w4E>e{Q%%@>~H?=DUnwAb>;;*mvbpC21MD7--3adhEz#qu4M8ZGuMXEr?nTq*Jw z^;Dm5cc4#9liAL(Z-3mDt#p>r{ekkdXdSoJI1X%mzf|Tp;YY4Y!T#>lDmNvf6 zxm;n7_*;>y-{7#$3(nKr-}R*y$purt|KNL?Qy82%Sz>WK+fz%YYTbwzw-UdGetqn_ zJZy77R7F#NW!8}MsK1KQJ8xs2f6qC+us*X&o=0`nkoV%>K9+t=^CR$sBu4!uK7Xd@>QQ^gPf47Oc!mcjPpDltDrr)? zt~qh|6&9smfk=9 zvRo(7D?KoFv)Wf7qhV>LRXc;JMfrSpW|7nn@XXIge;jF*y7hvT@hK*P$2+CmxuJU* zc4Opqgua_sfuS@bSf(*;@>DN8hc@Tj(lZjD;azOOER6Dd?K5k<*QGVUt-_#ne4FQ- z&*ZfyWl7|Ed+Umq%R9o>0xpxQ6Z;wZh$;U`^P44q5qa;!W-x0LyBm`%7XOY|bA#g{ zN@J_=i}p;ODVZLBp2-8~zp$SZm#G_`e=Xi+e!%#l$=xiha$L6U@BV0Mz<+Z)5m<0QBr^>4PJ_;(HanEz{G})jr(pYY#&B z-{@6S505kNn{)l?L)#cSsmDJ1gsz9TL*Df{?w2+`@)cCNnKsg|O8K)hbhXV3AaktT z+XLKA%L`_Wvz<|s`b|Y&A;#iqOrWt~o=^O=M?yF2`S#-N<(ii6i21m>L15ge|MF;d zxyWkr!jq*ZwXUpp;Yf*9^7G3Ib453SPQ2Ne>1=%&v##SLPX{h$a8~_?1ZypH7 z1I(C-Q9~wNoO8cb9epaY>l5(WU1bb0@_S=N4({$!llYjPSK|>!&gwhPK%|WalLtQ9 zT_RV12m2xR-R#Q={)Hmb$nSNz5u$^JLskru9!68cd`#BO-&t5XR(OiBh`FJQ{W90a zxv1o$ak+7tv)CLtAAz%MtZ!o0MyJm%xf!hE%kyF=i`X}0%eqFpo?BshPlZ)+EXb$3z=njcNu?FmZ^ak29IXik+ z_srOfwPW|?ew1D(>Wf+6Q!77F6R2^&&c#DS-f}-TVrD)4!6A5e@}PabS(`H_j#C}( zi#Sf*(#|&63~Xe^9NNP^`Dx~-TB|lRc5||7!?%>D_NLtZ_Kscrfjz~X@yDLxhS25s zVt=2;jh_$K%9#)=xN~-#o=@w7JM+G!K`HKsbt79mS0ioKrbhb766*k2ulRk-qGWa( z%1`Q-=HyM2qq(L#CPsWMbj~`rCn|8^))vR>ng0ZHo8N=&S!UrqD&N;pOdEsjl?}9&gO3q++(_dKS zEfszz-QEzIx*hTY^El)M*4_2Y^b$XX`MdAZoCjy-G0l$6d_D5}yP=z>+#5Ck|CTmw z@4|sfKaKJG61T6B-(9J{%Xq2H+nTk>+nTk>+pYypAn%2`fc}@^)9y9Z(LLgKEQZa) z{yrPaGHauYrvv-Z>bPd$oAGSdz|Ub)&3oO5L5{3`DO@%wn58-fkNNq7$9dp|}$ViK=;&f4PIqWyfT?{rXI(O`PB z-s9e6u;#61cK`PP`w>wOJiS+XdNLg{jWL!z z`^*~l+l8LjHE}lKb;Wt2XQ?Y^W_Rhla@Ks>yPKbTNbKZBYpk=^ymh$ zXDI7p{|`d958!^;|7h>stgF2D@j;k%^Nd=dvzW9x5GS-Etg!Rp-&y~3wXbIgte6JP z!=70&7h`Q|ZOZyqwb?CVhx3`KiW=aC(8U>Q!?oC_kqJsv%+w6XeB%cZQ{C$8^{MsR1DL6pWqE39u4jfg8qQLkyEDDB-1qcj zOI`egd`_G2nbb3|nT;=R*5Fh4@~gZJD#!j_QQN#G<$Tfx|3T3O%OIeiE36iMM>?77 z)wHv^?6;}krtCRSjK7rg+=jhPMc&Y!=gO3edCo1}2pw%`a%b>A#oJt4JXUOM%J~n= z^@^WB5i&+skGp1!?!~01<`7SHE%#upsk{_>2wyYI_-Z8!Xd zo1&Y_vwMDQF>BzaLZ%%a^c8)?T*jS<`&qfMw&;9h`Z)G%dwPe7Pfa;rm;1NYhrEz8 zwfgKaXPuS({9b*oNShwJ@(m+iX48_&cM|Z5^uQhl%$>`9JxW-CHeBuMj;;y}&vOTN8-bi|B6h1##@H&DOfqT5Sx@W#cnB zm#tIU#l736j?p~G*tiP1-sHtjOuZ|<(n@^)Z&@dYU+|WR-OKa*#D7rEd^31|aE0Dk zhPWJgpD~lG3Rh_yb!c{|$YJmc5ItPo$Tq*A@%%v*a(+X~&C1-6a`6XZ*X&omqvn$9 zFTSei;v0{oeu*3+@A3Ohi;~Hx$7tihoNVa{d~Ct*f+&6}a&h1hz`LNFKL@&r^O}vV zo36PeeTj{awV1WRqHpxw{oWT3FWa#LkmK7R^5Ip;rK!O*%_nw@|Dv&r|3-h;-az_* zwB;x(p7t9hC)@w?*4}fOH^lekU5|^$neRZq|0?)ZU~QNN%(a|UJ_lk2TYa$}GZCoA z|BiPtYvap&UU<;pO5vI73gy1<8qR}0%%@*}_PYM~T{Bya=e9nxUh@}KRSt{0M@;*9 z06NGR`?B>&Y1EUunOU9v&gw^xNpABfOF7f_J^wwO6_}u=*Pio=@N1Pi+{-Lb zyxF#ywu%wN8E3}s-6-?UNVlw`*cBNZ(JtW4TPtGA^b2b6oeMs#k{(+dzhaNA{o4a7 zW5poeq2WHuB1FF)|hxHM__Vy}pu{4(s8PN_~Q8=s+%@KgLQL=I{^ zx@r8dL;e`in@59p4n%K=?Gt&$e^qSJf%twaj~K$Jk^kGKeP(TVb5+*W=56zK>U@@_ zV7K_W-y`8r^@iF=QtIN;lY%>;;=ftj zBl7nNM)XAR;O~mRE9U`$MOpfz&55*Wn|W1z)iD({LKtGJ`R=*sAGCJDu#$@d^sgE% zu^`IB)|f3$IgCIfwA6;O4jmvi%ygUyZ5ZOB+r52U`dIN^UdWxGw$NPP^?)pi9F8da z@vVG7+*N*yao5hJ&LvBe!vcrX_)gkj&9NW6bE&J^FrBk5hQ@wCt5dcXz7#tD0(73s zlr%oJU)I?JgCkdieN&jzS~$+9vogvQ?rlWQ z*_;c#zv$=8e_1{FNy^L@An$nLc@j5cyeRhHkv;z#d;U1*FiTt7o(WlP=<}uQOX?GG z{-(7b&I+zap54TqZp+`McmhMip<2gyD*7&Mo#dpFt2gFsh%xxv7Sz4arm`}}tc|=H z9R5}NI*H9KBkIM7+Q+vyCj46Z~! zZ-`w7HRKH~I-jCv(bT~*|Jys+10ToufMyM)594ET@~mQYvbWmOWObC5cSoa)cTGjz z-97O=8i%<&xLo5izfV@`T};DVA<8k@-Z%JfN^FGhvduH|M(GdM#u{@-PmgDcAIiSD zj_8jo$29hsb(Qx5{`Q{aN3rYnK?kAcM}4ui!P;^yN)}k$Mn}{`M=S?EHf=@vbSuKU z#owX*Ftq|d^P}h^oh?#Vya2Ix6Ia}qcDlH4+*jY1cmh^Objx+qK25VW{=$Nc>j$46 zybn2Scs|VfDQ0w z<{ZdUBWJ$F{1?6#@9qR-t|+7EV_t!OR<>^qF~J6(GhX^cVY&F-q_JgjZ?W-M19lna zG*Q<~1N~fFyjbVd3$XqUwUQI1M3?6e{;Rt#n#1Cm%Rt+l)gEq>ayXNq5mYkmt)a8}yx7XFD19LjCw^>2bxGVII@!VzY)W?!=z5 za|`x7fqkJds0YIbm4+9T7L+UxGFLbj&)*9&Xz(wW_vN|u38w&?H1ZBZT@dj?ufcaH z6Z&Q5i;r`Q)K9uTtiv&%#oCRGE82Jn=9R?b@VDfev3d%Z126aA54_*>>ID8ub<9T~ZKWUSdU_;Rh`&pPbKN#Rt{ak!T*%>A)Hg}J}W z;>)Dh>^SU`v5pz|obOBA9!tZME3nG1&Tmi~Ai#fYT&rKk;ZYx6a`jHlrIp4mg?wYJ zAY)Lx(=qWV#oq6neNSuyp8sY3Ws3LMCp=y2#FhhZ#GcQE8D|4G1ve?pkB!~@vQ+6< z<*%lobJ5bqPRvHJv9G?lzM8YRJ9Cfv?0rk+c=!OX4P#2zlx0*y=;DX9z-**!AAomh zOue8z@{d%+I-316Bo;xNmcEtnK4kvfw8J}n()*LGX9$}E7q`h2+DSh?^LM9~pF^*5 zYW@o8Tcl3;DmO)HJ9j|74TT+R<7|D3?tDg8#P-jsh(`^KpOU&|%A8tQD)xM)07KsP zc>Xu-Z1sK_7aQ5;tyaC(D*CJDweMEUf8-;oHYvu@`RGw4PmP7+eG6s~TOEO1zt)O0 zgntwJjWp0N<9y-HS%+)NniKoCGjlG+J2`J=(0GvIf6Y6*{pS#4v~@4Lfj?~cl(mNV>Ic)i(a%vxXSNK_ybvp2HZ_S{ps+rH2%5lh_yM4xF2~=M0Vp%li_C z!K{s4(U@=2x(MP;S>I=IV(@8Mzirm0zGZf)R-VuM9hID`JiE3yQf2Q@%-peiqpUVP z1=oSj+e*xzw7RzFFk1rnMAm*g*?YU3mmJ^?OAk|>vVUoR^;MaJv-WUfc`jZTJo6G@ zky&5kfaDH|C32sAqvJJ?*&jW*)~@?c!QJ}|%;vCrh<%6iRvq0gbuYKU-q?_GIoW#j z#`dO+g&dfYHCWA;!M8PQlS4cawSu($20{P6UXjb#oO~fVbTV=@v_)-x)~t;^e+8@< zYjb{>`A})htj*mWoH;mS`RF=yfyg=Ea~)=vJgB+3FCte*y^uWNChFD5T)e5qf?;nMVuU5!dA{FSwb+uRnqp3`-x zHKMLz?5;<=K;#d5c~C2**bdt=+cZDhFXMcNhq4cqW0l=&K5ct`xi_CU_U=xb{pND~ zs(a1T6}S!i(rdL|C`bh<>lYBe&gzBrc{l6l;^^1L{)Y@dr6E>%yet<<7gi)s^}qQJq+obenG#?g~B7_ z5C@y6z)N@m}EMfF@CCkKa0{-19ybYu2CJzMDUS*##vWDuSXyj0*^Y3IqidNKgTZs98}IQHaVSE?y{RqXLSz!Q&TE zvLqyHxK!2zm8db^fI$r)ifBa5g8RR3)znuVo;*)wGTT#K^_}l`y`t=^CfHY9)U09c zLuCtg#$}Ud_3!p@yZCn>L^i(sh3e;k+C9+Qr5SCzP6Hq5wYFWCXO=_e5Zn2nMX!k? z)q;j?jx=Whn7#d2{88ivXLRx$_8|9_z6R-^Gnfv_9j<1m-Ur zyM^{@dwid~KR&W`C`sNI-8ZoCjOh0vskm*W=ZMT)lv^Y{e)I7|z7-5EO|I=mC;J2N1n%Ba|RP-ApL?rde#TuQQRSRV1sY#@5Z^~T;q@b zyVO?l!K$;X)bkq@hGTo}GAG&SrdG}(#qY#|dZl{u)VsE4EayfU9kDQ4D0+}FP2-O+ zMnF90F4VK@wZYr6*-J9`! z%9BQausXLvIJcVcpNekZ0#34_7>cf6RIs(Ti&FIYOn!>QF&E?(s&}D0c|HHS;EGEU zE4Mckt$o-^^&R5;?v@t4*7~$h&?hi-{z&*pX!bcivV9?zI8; z&R_2B7hO;jFP50#z`|gqv#6VhjgS{;FX^?`x!aQE%I16q_7&xc(F^FRu52*Qi>Y&t zR)5=qJ~khfY%coL+*V~{^BfL%=Lk-_)W1*pmGm#Vp)iM&{HOt?iM?b#KS- zP%q?*d5M*L9Q~i*jR%+J3l{fU#cN{2kMaj7ypFv-hM_+^>3Jx4ynW%~a%{!%x+FHA z=T_%dv<=ZV3HqCX9u(bT*6=u`rxYd-Qw~>P_Z7}*!BD|q*&k^>K11jO{d2sF*Nq>8;%$~=OwlDr+l`xS~DCQ6a29FVbRb=Rq}7S(?`y8A-_^4@57|Oi?Tx;JUTYeA)A>|tST$K72HNcd`48;@__!WB;0(VSQuVQP~WPQ!Gr?$8}5f zT3j2g72LHlvb@mf&r`DEM#ze$jP*O_mNtvN>*@ED^XcO1-a*9bnWL`ny<63+oQ;KH zG@RtEEpluv$>7M=XB~_S;`=hMraJqXsyY1>wY{uu;pflv>(=VpRE_-j#NrGOx(|xH zWvPU*!S)vSsyWWg2N;#uxv0Y;+qe9^c%Z^VNdHG?j~08i(Z5EW!%UpRk6A~_y_Wvn zT5U;ee0dmT4)5Yr5aofQ#o=#8&Xu{xcBP{ve}*<{@3I_&W)<06pRutOy#^0LVLun} zbI>qkkzQ+gxB+n)>WfEV&-|`%lcGKDpE;|>9)3K!QRtR){R}P5c4sSFow~Trog?$v zKk-*89gUyG426+WqdA#S6DaY=f(ohT+4joWAwF&kM%2^D>V)kUWNFTN5OY6 zGInL~j`VarE7f~sc=l(W@sIjf5ChS9aU%-0A5QCHYw4}jly8!}W%epDw!zEZ%ksOO zOaE4Ri69f_&V0R^TSUHlDx-6)nUmHHvzW;jnn&z>z@S~IEW|x}V?B0*%EguY{UkN-xNTznxCHs|#z#BbJzKET@yYn)L_DVjd)wsS zg?o&U>k6CAyGwAtu5G&t2C}R?7n?F_ZpmU42ge7CKh@lJzQpCLv(?#~@qF4IHx_Rc z-8wpz^T3(u7N@oHzdl3si}DS15PrSP|6-il+}FH(o#gAb&r~TN`Et}O^oVWV^6KJh zkvTW#ZNAM8XEA19Ryb3!x0Q$m@Lou7d)sc3+z-Uim3_`03twP%Jb8zlr$~D!*9aCw#}f=$T{g=r7KL!|Z&z4@O?HV~{96G(Hsb z#CWIV!DVp>Iiq7qQwp{}^C9i3+L4y1i#KF!e5Y+@sK~>{a*sInw*3O~nM) z1?!|Iz#S=jV6SUu@4n@}tImgZTIbvnseKq-oF=iVk1}3sL)#rO|J|(DyX!@-4bBeE zwo~WR8ntQN6rXm5JuoT0Q1MGEc=E?*O|E{G(+jgI%$Xo>U-+8x#MpsPhM!CQCgon= z^7HFTXDZ)>I;C%>FZ7hYN4?hce`Ue;W9bp=Sv>T?>zs!*{(v0Ins~Fw#)=9%KYeA; zPRWhSaQ=+HT!P=FkMm3Sm-4>*qXWveWQ=TBWb?t=A`rs6pe(v6dz0kfvUk1l89!}n z@ARPDp$ea&Ey~b9x6tB^4oSm^bPE&I>pZ1ZW$x-a(T@>FW zcIIR5?qU~+_SZw$CdCKPBAJmH-KE>-QKF*5#MBqHy_B%5= zQ|z}6`EQlo`(N0-%kobv*+{yb8k>F>=no$pE_$538I4T)0kh1Q-*_&tqptB#g(D5Y zn*H9*S^dhlag(pnugu6yc;Jc$VfG^LTH^x?aFKeg_8DwF^Pl()6`KJ&QvF03o;jGSJ^L|FIT0DHsm&R*BXSxyU1lRV+q!Yv9j zqzri@u>DE)2a&`LSto92JIUKx#g{xAE9stFDfe|r*j?FR1F*NDC2O;>j=Kgh4vlU;nwyQ^ZrXKS}^;+Z1?_s_?_gR8Hc^hnFW6P}!^2(kJVSloJg^^c! zt#gbyJHXuOOn-&g65VruQ#y!w8owx5+;V$lb31z_cZp6P=boqJIq}sdHUClf_gI#i zz1YXoc>=We*elqaPagJi3#J2C# zxZoVY1isE(sm^3NaIlr(N|_z3*Wmpsl)ocJZ1TprAI2b5v1q`I6-=2e~T5+Bxe zZFPlusek0WMbp1=dNN()#?{XBvOF9>yHM!@?x!-cJ%OjB=3%jqH)Sm4MpLm#aH>AV zK4Nz@WnWWg{wjFzQecnN(Zr2EOUdYxZcEKN3pfGyBDf; z3$XOVTOF?Y2-V`Lw|cjFM%O=AY*79MZHZ2fwV64KX9)Jd+SMD-L!R+F(o7%Z){@Tg zpEfI8tA9Cv_G<7Bbw{6|M>!9HeVpD@ehu?y*h857OMSt9O-9b>wYH1a#wRMjfEXHk z{E`M}+tfI>%ez-soKivA#m^gjJv)qN`+@g?_?7eWH;JA9pUC$9ZS-xf`zGJkm^Aph z=fE|vpNFC~zL7cm1I|Td+yU>E>I?C9=53if@Kp9G!9Ca)%V1@Ct?9fns*DW(9*mqT zeGXn#RbuQ{{ZFj7Mpm1>>VfetJ2lkv(R|%N(wesa)S6)f=j3(dJlk2AsK5+K|R4y&$pu zJnt($sP<2JenQH>9_`vV;O*IkijSxlmc_#qHd2Kv)c@sSGuM}q|g4goC{_! zqU-WD&Xwff7p#wY>_%T-kPypaeB`^W!{A5oOz6u`EFQ0MKj?*%3jM@)_&Rfw!dK}R z-vhogJbt2kqOvjYx54${^+G2rgKNb{zR0n0bLM?9kB;)^^VHnom4VGmuL&)dJ}I`g z<@&;U(<`7^uPdC-dco!lAC>yJ=aF+|a-W7KoJUOEI=qMm~w5jW_fEL2Xfma}&<(HTMg3=JOA@m>~2 zFN{3n@gLNzJQzB<`3>4ls)E5#Hu1hwk*b{N25&02$ zqtkbmZ2!GJ9(@%{*e>@Hse|^jzT`aI;T}r)|xC=-V1Q=P_5uc}YK~6z%=irFsk= z>mMsNq+aWL9PRE_mE3fE#CJ>m_@ zzk^>>H9h~e!V@T4K6G4#GiLz&y_u@bWRLVq@$QrffTcx-Z1631x~1(F#Gy1j|J`en zb8be|%it0xIwz`k;o0i7KHG7@$;x*izwE;-Y*V9G8U3ha6r5(KPpOaeqtNRLXC3y_ zr`!X102t=sRGe$KJ5&0ruPUxWzBld;u^zqFXS>6*{>y0B`T~B2y*sq;#@u7$Uq6#S zRn^50gv_aNtlUPsS;-mxS7K$|hGJ1&iYwGuC8e(yQl^On|_ zfo11e><|7dG2cr=7yYQU{Op;EBlHV~ON^jC^JsDgzC$jI-Tg`?G(*R|0X{PJz}%AU z19n%rkM|Co`Co&L3Ojlk*b(DL%&Vl2v!nR7(oN(q)(K9;=ggHF~C&g9{H~8#54&4VP9}PR)=-jvRW7~5-;sL2rT)^guhb3uxlqM1C&PDc@~oY3aD1rf z)BnKtH+$$(>>@r+|G0l_Y~VwZO=8dg8}ri*ru1z1tnkh;;an9T9Dx0^Pnyvq??vxL zL-1bYwPBIv-{&*WXO6_@tf}uFOe>haqvv8asL6kLzFar40e(08z8d|a*P7Qpc77tg z9coY?YVs)Nr0^5Y%P{*nD5r5_+UE`a7-b7l-d-1?VC_RHU;_>1yk9I$L7V_ytjlz9P7 zo}D`|qeQ<(^F?*`SL#lu;7;2nww`W{^S1h&^0OH|0nD8~kW5lG74sx9tqpesS;5>Y zwFaLa!MIo-Wj`Db`(X;~TVv1cZEI`oyC>Zho>_(S8CkSBht=pmOg%!`+u*+!nRmIl za5L^y%P8s{<9AH)W~jI)_0G0}#fbhH{xdYOD(09O{AyVAwCMc{D%A-Gs!r_`Z+Qnew=Gq&Hw4peR#n|x@=)(_50)hO);zZhLPDrEG8J>I!T;#ddX@5X8z2*E;v-?7GpC}ZWn6>|ZjlP{r@@%k8^)4p;u-}XE4VS^* zGxQdu>OmHVR$teI3)Piw8YKU3+)tD&bB#tTK}S7&WZe0t_VsUiAB!S-gEow0i1g2Dw-EBa-y zRq+D-g+~8Z%1^|r!`JJo)q~ZP2I69J5b4L#yBp`T$(Y@N%A%Zy)-p1^})jT#_sZ#xi(H3Mo&vV zSYs-0{Ke$>a=r~|%;x&4kaPK_h*Iov{pwa)cvL9B%1|FZ-TDwm4Cp79F_v2hQ&_?cjv$mdV|X5ph+f0D9QD4)Of&k@{=bzVlM5mPey_t0dptL+EQ zKByFa2R;!&D6Xz`nE>K9t9i2)G-Y}|1|Oo$I}IOu??n%)exbBIUJq}VGg*#YS(DQ>rC?`{Oz|#Ja+`M1O^6v88|>-QNsDLFhEn_J+|Remw!5p941Q|^(*V%O^H z!w^SSe~TF0XzzqFUP@VNd*JLvw>9&(x2JN&k4WXCJ{dlv&WF5wptxG)*f3@trt;D| ztNx-IyIUDNq4rE%=uO;=v7I>U#MoDyg-ZK}$#Z+%YOxI_#e)|>CzPsQw)uI1jo=oZu{>7M`0ed2FXW_FL)iC&oD=sXQp`d+DCH+x+>8}7(< zN47I~_@T%>qkKLBTU}6EP%^kjr_7Pkvy`!N{w{68?a8T%#~Gt+@P{cZ@l3?E8%tJ} z?oMn@-62Vp*u8${aaE7d9y}Ghw)SUM@j8j8Pe30qV*~3o?SYA^uI)JP;l6oU_HH$2 zUKtgX&x-+QPIXT2jda48g`ulBvA9`}a&0E%5__x}`JmTYJ~XA~R4&Td+PCAQg`jOM z(>Pnl=+M=vxgP)V{v)`Pll{H;1+TezWgC#!b`{Q&oaC!fvuSvFL(%&96N2j%k8_{I zXN>LrU37@ZbM_?|0@|Qo+&}COJ6!wqJqtF6>Ogova6DAc_Vm8`MktQ zitVi4Z17)HzQfUdTb-XRXj^eG_Oq*??OQl8z=zpKOJl_|P|ILs0(;#UTKY1y`0%%o z8>F{Aunn#Y>>R_Ig68+p;3?KJ_rf#rS`|kj=3?aA;m{=fEl4!*lO<+JuxMq@UJ~UhBJl0lJ2=?nUUDw&+!8_CEkU>Wysao%~hNKlzS6 zxOuO;gS(}6;L+enb*CPr&8?+d%fH+0NWIp6X!p1)WURKC^;*YX>r!?7ZwGISkLkz0 z*eXfBMsWL)sa{X>UE6D-U(ikEXVT7OKM=!5daY?=c6PSpDP`LED(7J+{Hy_`-4ZYE z7ua4mopV-~HTu1jJ%h)4{hh0nyt)!Uw$mA|M<3FC5xmE1U#fgnguqKiBORS(n{x+pIZ-w5h z32#+8=oScqkAQL-`QP9#D@?}s0cjwY<0~bL`c`<(s#JdLx#$mI--MQa*AIU_p)k$4VYJU&QQyo-f{2P$i@vtJ9}$lVsVD5#LoWc;+`&bUVGgwpik}l*Mz&p z#y%{2I@bF6Bih(G3)|zfghx6C4?|Yy84$ga<0M|$8NCV({cJ#wT=V?jVq&eqOm=uS zKmVfmHJHn&e+LcBE6kIbFa07bGhxjrI)pQgnWr{S;4$xUWslJpSmm!0jBAJYmC7xr z9oT{#LeeesAO4#EYu?B}z1A|YV`@GE>sY(u`<%h?r|=3ztMoVDExjx8MA~~sPHrvO zUY!dI3nkBLUFjty18Fm~0=1YsVvW^&JRhtBn?cK1=G&Z+JwxLDEoh=ST3d_P-=4sy*<0W@TmxowN6;xua%eotV2m%(e7G{Id%C zq%UxL$<|SxfO&=H-LFpdy5AC)=a}Q1dxW}oB7604uA-5{dadPf;9x5_nASM?ZnYq;YK0gS&&;l9WDc@b$x}={Km`QXvo|!{`_|@6L zD*u7D?!hTLZD(O;!SGkltnF_+BpecIxt((kF4}tG(e7y1eE%QbKV)Y8oXi}RCp-{) zzA^rd!c1uEc1KR2!NBXl%Vzf0XW7rB7w+}w6l?fPuQh*l$J|fjPc@coz1SPYt;%O1 zpMIJBQl2xiXmu`f)D@3cfg`#H1EuHuD0h@#2$@uEMVn$9$Q=AG>X-Gp!a3!tiZ&mh z_mnw@E~#4JEr`OI*msBgXeGx+;jT|EoGg00v2?bQhm`pb7XBf#w}@M6-Pf&(wN9jA z+K_s!@ys`hHKHH46}G9^E_0Ta`POgU;%$+-xwwoMwFkCvP~jlKTlS;>C;esS6!k6~ zC%O7hhEGbLmgD2&WfmLX*U%etYs>WCtk)IJx;AZqM`cBaa;Dx8JfAsQlj4Jf=BE@6 zlkZ%L-V1zR_|yUO4a{BZwZ7|}B@`dxJG|441_L=t5Yr0Q4kFhUo0KL}l`)KaboWU;c&**+)*Wj*4275%79*!(+ z+5=6FH$bm(CcsfYM=iY3L3^XUDkqBe#y918%}_7MV_YKG!n{kU+2FTzi$R6 zgc_R3yLsX3M*j%0w>KAUjOkdvN#y69`QJ*P|C;b!WzW2W10Ca!@%v)`^mjHC?W}~u z;JYcx1My+*o6_&~utocL{Z)Pl_31~MZGy?H51*FU?ncDyc(#LZqCvshx~E{qmcApe zYLjm)%$bx%a@I{WX@uOA6S z&)5cMd-hCr1-qoCU|3`^ho7YSD{`Ku@!7w`TzjK;mibR8-)b2Q(;pJ;5AKKjc|PR> z?sX3pTW+UgafZ324I1l)%w&Yg>}?YIu^auu`93@!>ax4C_hijo&rD3cw&M*$$}|6# zdiJ}_cajfzdg=6%u|r-(-(5|gt)1_@@1Se6%&Cm*e97IoNh8l6j~w)IR?X zzV3_O7nBJ<#ruBbeUQB z=zpr>1=zB8cG23R?-%q8*>7M=ycEAAeYRh7UvrHdyCJ$EGWO)vm|0-Xt!vU1)70BI z{UN*bTG?h*_2|o8i_dA>Oe;-Owk37hN$yF=P}aPr*ZN-A!@>A&n*&|%##q27seI-> z`96||c|qnZ(14aX9rAX5eP#54@;Bdy(Y!EPBRIf~ss2K@Cif~#{vOb6oue@m8rhLs zQn)U$%IfR|3M)GwSlM28uZp?T&SCBZZO+kHGd5vx>0e=H4fPi=8ShYZ_%*cMl$yU> z8U0q#)m@;gZ*qEW5q*tmrOQPJ4U1-re{@D{G2w4=-$<|KO7Gv|i+%4usN^=W>xGf^ z%O(^jNFC)NiJePzt$(fRRmlCEvPHbpuU}k2f|Yix!momfQnA z(rc|-XJUp3^*-rpPxyuSm|y!gZt_I*gyeg#$r;)}&P-_QB0E-el%5QnzhLY!z1H^F z(DICF(qUa`y`q_QpqT^Zxf^h95WkzMd?L!{cT)8=z=DMKYLJm+TlVrXK*xF ze2250v&BE9O-uRAnrpq*w1GSj<@2_*tZnI$?i#m=>due;T zU3|0)v$|iYLGSD-&nn`amp$(nv2VaRc(1V=z$32BSE))mDSCsh2{>=d_}at`%zf## zzAyG>F`w(T{=92q^BKO(j#s`X?S};^O#3M0O7R{k-?m4OK!#|YOaIZ>26q(h5gqg| zVQZOsg?W%=WjEzNs*AX%s17xz9&;ZA!0 zvohB1ih@XN+OPeurML6lDU7in=DTrkjFT>l_bObp3eT_4r243rMvARV+kidoD{x0& zXLKy)Tj;(EGPbUb^LCBxy2i0HmpkNNR6M%@-+uvivcW%hctC z?M&7>odv&=7|6L;_eAfwfmnY6`M(?4ZRY$pWH(5T^oiLM1&^9ov~&F?V3ryC&k&>D zS+cod{|)}D&X)LtUhDImin`<8yd%iiGtl#garP&#@74-4z9nz%a@c-`{`I=TdC9rO z*_S=8?0YhI)b`L=k?OJVUi@A;Uua*8UQ;GJ6;0kPf+6&XcMGnyvvjV)F31a&(HgNs z_PRFqbXY3pMZItCVt?ca-?h!|7ay>@>J_Q|vIh$f7KY#*Nn^*N&ol9J&J(N&Z6Ai3 zuu1VL`kFX%3N{!0T;KG&aDYe6Rk2{&a_nDi?sQqjPvv*Ll-D^w z8*#sl{%_Pf&W648rgN5(W0c#+gvY3wW!h|$;&J$n=Ep&Ki_Nlr$MCpb>pR^OW)SPq z-|twkIQ*nwlJLvl+*g&|`%BP6WAdC}{*8%^b>0^DXl*dkcb#`d&ex>+kM%>&o6)~B zg4v25=*KlCzc=r4^b435z!(<&rUrkJva#=ljeQ>aa(Bb$P@Cv6HCFOK8vLFz2ZXa4 zP5un?%}hQ|bHVnh_(ky-MT7k|Vpgfy^NsNe9izk@-I!}EW5~4YeDUAe*N*$=IXC!w zq`%Ex_f$on1EC9MXZK;P&+};1#`60JM>x-=@YSvUR^Q~MS4KA8`dRpy9g4r0D?0*xKS+DDlcyAH z9HidW@`}1+ZZcQueV)m$7hH6wbEdLaDU0eeT6QrO_CT_>jN^G#Zz3^7^QPm)kcTG5 zU6p()_Q_EdM^&6$_6rt9wtsc6#Lk}Eha7d*Z2>dfx~8-S)B!9DI=9j9ukN=R_uGiR zi{{L4D)kl`URBcg4C62C!%Ul;eVFxH+XmmG9*{D8KkjHqafsxfZ!EM(-deF;N%s!I zSshleST}7X<4ewQAC=hp+|s2Y_ijtg8DXD56HnA@*jI=ra%MVxv1a&3Ga+w{zVI^- zsk5StnwVJs`uS8mw=%j|>E)@=7ZZ#3>6$EjpSdMvncu9}c;CUbofi1IhXCo}xZ*=< z&zIwTV)qcC)eV?AJCWy%|J8Q?) zbTT`8qlz_f{Ve9p@-F^>yU=Tmw=65un9lF&Bfcl=l6Y=g+tgOQ68%lraKUG1EW`LO zdQIE44eBX&NG!&$@GA_>Fot6A&u>cKlyiY{s6n%}37oTI_+qWAZRQNl6Fp`X{rn8? ztJiwZ`Ox}4-BSG=24`)3P|t$RHy#$*nxk1M-(f=GE9qSjyI(5YaxZYp>CyDa#E8F6 z^^}_&UZ`XOY!c``TkpKasTG`!b3BdS*Xs)S0K_r&DH%n%(K$Ck`N)(}!vZ_!`s(~u z3U8+_TLzhF@a;Os#z(&Qe^hoa{gJ(HL9nbXDg9pW&Jo;WUU9zCca%9xT-)crrg*0M zoW0AMbH6QP-H!KNXzTvQ#uFqSx~f>AVi3$V>f$b!*$2x~Hq0BvchoakBYZNVvj$gW z?-9}->&td0yVX3?N}Nd}Y)&IX=49t&4gDXQ940xCPZysSe5PliSK0q%?6oBPJ})I7 z=9X+vfSIXTHcLQD?0-TVZy5U9w*_qz3#tzm3lBE>w>C=7J@_WpW*1on^^ewpPsb zqRgzpEK%cA>~z|deO|AsCj7H{m(_TeCsMhfi^HYTGlwzjYsz#Ipr;V2jq`Cnaet?1 zfc_(A(N4$boa6REe6Gf$fVBSy^;3rT_k?>@O%3lfa;?qq`&2xu4ky5~nuz^ZXDw#S zJY-{&M1JHO-K5vZLvX6vcF2FAWX1c4@6c`}zCk;mJ&5>B@<^k9lal{fdJ~J6iT|4^ z&!>y`bzQCPU0J>Jxq#i zjdpK$2IgGrGvpi}qhItIJTkGB(;j$&k)`#i9Hgy@t+^Oi{9gRxPte>T9vUqYHGp<6%RfD9=tSTa|Kx`NBXJ4f2U_{4rhO4 zISj{VyleDr^MO)2_>#kzg^^dpG|YLvk^cxiUMf^CclLPK^0QkNv2s!7J`4@v`^xFC$JWta3k?0MmpXpV#FSajozs%2JO@UcgXKk(h$EljxS((>F z9(IgB6x(}XVXE|x+v)xAeI-bPoAT$N)2OoB^2uDj$#i zy`Kp_Q96z?gmD?;uMG*?iCxh#-mfrHVi#G@VwJSjkHntocMNv4Uf_M5n$vVR7!Ght z7)d>Q9{ELvX1b#Pn6W3H$UI^BE?KF*;~}1YR_QG1lQ}26R^c|+z}c?O<`g}ncpCJ1 zqSBAlclE(@>fE@#E!D^1OU&soeD`$pY(y;R8qncZ{4?*{EoFyr)*J14+S@Z6U;4Fv z7x@*2{=0g|C`^7R@Q^S39opVwAMBJ&Tjo9?wkzY0#QN=J~HdMh$s{`>79XP5t8JK2>AO zdtsiT>2Lhs=ugU?q|aDD{i&g`?TOWiJ@VSFJ`Q?hg{pO>o!Q)?*YL}ZXFSp7@FYPZ zeKz!3pZOal!SsNe)eAjrk1TIqkX#@(d2`qt8tkZ3M(Z8=HD|bIxOJp$VAt$T$2||k z{x@ef3lBEuYmp2 z_2&R>*WB(`N^@@rM&Kz=_aJ|;Fi$X;6)mFc81vb|aE@N9pEpk!+$I>sGER?iAA z6%3>@%0Y{2nwgauF1&CO`d}FOHmDq99SV6>owaqNJ!1P?b=SqC1dlEI^-`@dSo&|+t}n0dCq=szx4GYhDrHPd}(CP`jw5zDkbL`bD8Pa z2u{d8w+2hu9&MN0lDAwt!-zE_X3yuKhoRvkzoH=TI5x7FL%+!Oxabsil3E`2L_G|9 zgD8bn)poZjPrHTpdtc!`!Aon@{9K)@7Q42V*d_bGK*8MfvZGSZMw!?CBD|J6v_J45ih%++N7E+ZfGTFZwTXSBrQ?)UGP-1xTHa-X!p zPMb~fVS>jtf;Y_^oW1TWrE{-^yQfg>p#| zv5^UHN)IYzO94ni5vrCCoglCxh6;V)*}?>-znY{@hLdx&U{C&^><##SiYNDnp!e8>V)hs#Roa8a9F{7o{#nH8{$rk zxl?CRk1#*n=!-`GX{C3b0t0;0R>#x7Z)?`d2M_)b{z3Y#3`b9O%EmT$(yWZlL%1!r z^RRA24+q{UeVrmW9>o~zH^66p zaDM=n4*Ee3n_gEq>+t*r|DM8R{1)ZLZ&W`<;wOmDMn6|r$2G8{4pR8Dmemcu?g7qo z80Gda$44B8dXqi{?bX>?+jqB>W9@`HFe%Z{>IihlGk(XVp`GjWv14;nI|rRb908((>7sH1d7gS*;T*Vnw|_=BSmo^TeAXq*f73qKy`Hrv>jR6q ztqeTDlb57=WcBm<$@@}|n>Ygdx*L7Lc&mA@LsB)i?6+^e^Iq^?VER97akfa^O;6X_ z%pF>FkUF)V@k?qyFM^hSNPb9+pS}j&?hQ}rwdSd=;V05B&O;v_>UR{!J9@2YhV^Jh z26C>Vkri!|PPjYGQ+wSGVq;v5{tW7lU@Kk{Un289=zkgcaA@vO$SD48t)thpA-A^7 zb8PSB@BM>i7BFgRWLEMyg>$6WP3N4o)4V9FWDD(|6H~b;6N}HO{m`%ZB=d>XgN!Qk zGG!F;0dqcjtPZe(T=P7eTWX3rH~0!*M>CuylB+hQVB=qt{7Jr%hr=RUv;1Y&*335eB_(5Z zop=vLW8FbxXQleSRz@ExS^5EF>CZDGwSR|r&Cta5W4{OSN1oLZ=)SwMjS6dGjy?J^ zYdi#4efxs8Md53-*&pnXTq(|CGjWZ;-z(V5+>+&mxut?&1+3XI=b+cxw)wQ}r>IEN zHm6=|y?l7~aOw9xt7!4Y*u7ch$;?ME>3jbNrDy2}@%zS39+tB4CZVQ)@AxS64rYBS zxkMZOgv93R?@jfMSzoX{c(05<5u9*g(c1RS*=Fbkz5kayTeJ2z_ith|k1mdu*!tB# zbNPMP-p=G?a(ND{r)nb1T{CxUHoh}<19fqO%qXG%Xz-I8<9RwK0r&Wm#9~LxLo;|9 z`d}-2gZYHbIa813czfL*t@)jbTI#7Il>OEjXEFypHVuw3B$Z=7uQ;PM&y)PvK4~wp zc;d{z!soPq4it5cP!--Qmj0i_nO_he`C>IMK# z_{QNy+pA}7Z0p&VWp0p}3rX;ul3hI81-_=?L0ErV{I;CW)2-^c!1B(ToVF`A;C%F2 z?`>z{DSf*qXI4^f(2vk-Ez>HaC)IbJz;`Al6J;(~x023LAwJe2KU4A1)xatr@+{s??84}R z529fr|D%et1z%!JLE9?(TJ*ZY`2^=v6TYnE!%L74#4A_>!aHr1>Rmrc)#&M(`epGl z@#`Ctj|8)2o}`hn9rBkcoUjJ+q#f`O(hu+A3-qQNUAAYoyS6XQce&Q8w?E(UgzO1s zE=FYhhgRK`-OoNti1X5wgf=I@lAX6!$v^eN7;20iCV4-WJx z>uQaB(`zl?J_~HU8|GQaY+UBm@Z2beUrZiQ7!hfkJ&p|h=(VOF_V}gTpl<4rU#ISL zEe>dZv_|lULz0;i2OpKSxl$jM7K6_9c`m_hHU2KKzEg_KCDs@edn%g!>$ToL{UFlS z9@uPpjrVQic$bFkd9L-{3uV9NBj~2Fv8}ybiabeTj6VWH7+V}GJ~Dbe3I4yKXy<6q z_Av6Z&b7IbHKFYf*_f;hjQ*|kY(G`@n>Dt&UcKfmTaIxnvxgIs6O=Bay;K?XRXFoW zkb4UPi<3B69j9mmzlr(PDt=Afk!evj34LVJkILiyv9%Kvt^Yo+aHEoYb0PQkM;Ya( zkoT*zMRn#lB+Oja@jK3v;B%BsvL%Q9CpSpHj>cq^;9WJ4W2B{1@ti%$Na>Z4KvvM+ zZVyJfw`AwqUyxV~it}&{ztsBWnsnri^Z|DnnXn+VbtU!g60v_eq`yjjS4DM7I1#zL%0-bM$JF2QjPk1v=r!unr`I|%A zllg<}Ch3)0Y{%H8#$K2wZ1&&EvA)%xOPr^yec0O6Y~p2coyuu}$?UW%?UugK*P$<{ zIiF*~V^xk2@3+B!OzF5sq2p#aHz=B?Z^%BDhG(ahdX?jby}Z@==f&3;fV?I?liyz$ z*%-}R`S%s(vli!5TdFPn4Bw%j_#4b_Gx}&&#?HgKE`MF#ob7$(UQe`bX8LO+esn5k zo|<#utXQMd5hoJ)*(z!!*du#4QBIOCnxkfkeK^_H%68?R$41satmxi`BwmJ7;DJXwuS7D&~E#@Mg zh#m-mJGDuz*nWL-R)+7#+!@2C^WFLG5d1E&*{hHvXXu%EJCt3_+tF)n)1FW~PT9bu z^HKgkB)+x?m>B7nvfYRLq0Vw(t1M1*P9}SGa*m@@F&Bg}17jm9^ zcm#4jcC!jM^Rf0bA1EH-`P`p7tL;zmTiCwSt#q`a0oofLd<51Vpzsv?x47%d(AJpD zE$P0I_*0MhLU}x=5)3dnlg(6;zv@mJlJEP99kDlAg>&c4BVt?iso+^3XGru_L=;WX7(ll=0S_k!XP z>h4c`TaPm@KMypl|5mTHFIiXmlj!kv(Ng7mI;~jW_XlOyt%QzyJg{|7jmaNW+>r8r zBzo7A@0eRSJo^)o^R2vA5*u!$*oJJSiUEHO5wUOS2Vveezy&AVh;*yI)E0-q4 z*CsKMnpaC98KLk844weZ6|Tqh4#iAcm%} zzAf{dU;DonEQq~}jqaFMn6CJj`fI+sMzGeoCEM$-IaM!T<3tjVxT$1wAnQtjii2}z zBJeT6lbKU(WO$=*bBEfZp9y(^cm?el)&;<%azZzhvzqKqRd@^Os#ocF#YglPCIHPe zIPk5W&A;lG`uxKbmeS}iSNVI-fLNQnCe%LO7VTkJv0nHQBeiIqu{0<$4Ec%de&+TF3F*afNLaz-* z^qlk^eFgojj88o$)Hd7Y*u(0w{k9hG(%{<|A7#ZT{0?&qFY>Ndeir>r)-fp>xNjch zw#D=gN3N!kht=7INsZoowc&-*;G%?2H(~T^Bk@zpTkwbRT8HNih=Z8(reUC4#1=z z_~4pP9n6}sdGb4oD4FJJ}R*`A?qkl!TS>1>6prm z{Iu;3!BWWkH{(0hUpJL>EdXh$Caeif?%x8`2phV3D1Jy{&HURT_*>c}?F-!`_m6*T zVxyIj&9z&dJx%<$nsA4bKmP&G)`Yfq_Zxx5dFGaEZosUZ#gxuKuTgW4&CW%Fp9~L& zOMEbPW3iX!yKgIA_$Ooq?HMCy^jgcAm8F$Z%h@(#W3`iDFHKQ2!+JWdwH%uncaSpy zJu4kee5pgBgT&Jxcb-u62EI6QAM9uT?pnyA(@XZ=Svzm+sPj^J)FYtNsS5_c&#eic zQa&%A-{8+u=XNcP4DhUxW27;j33b5?=URvQr9ZxMz_T?V%d)zrk8(K9#gdE2d{N_z zy)tem_KtcO#En1YTnZ(%*8YE5FHBCJ}<^TA1K!i;Z@3O-Or>Z zt|?>J^MGINQ}q8W-m%%yF%-xa^w6+2`G|tWLl~>&`7l=6W1s`&SwroA7IlLq9(jo-Q7K~uQ(^p_y}`LHh1WL#2+bp>4QuIoogL2z`3$; zrS$h0lepJ}6fPs;FmcfQiyb=VuRR)hI}nzMP8kGVGq zR=EiNxXG#bY5Y_1eMaUuce0JM2CG-2Mawng6w zUzfUx9;v?2t1$zbyia@Muld`gH^Os)&13HncaS|S%Go@SPUYOZBjB%X%50K8d&Dse zUF}BqIAddvk6u-0NWXYwU}tbV6>OE-%w;ii0wd>1+?QTgpobA^W@F+Nk@Fbjyk2WQ z)oX3jo=_YOoJz~OyTZFfR;)mOPUcNL4+71X@yXAz=ZE6Eb<6^~a*gApcyPY@{OIGH zR<{Ka#l1|?Ay_)e0a_m zBY%wsov_D_q1BU8b{+bPD7>0>7qNQkO4>a4XST>ZlocgA!(wuBq1I)Hqb-fHf_40< z^arKWNuTRV>&okHRW&L5g!LWQVb7E&6&0IT zvUft^6oqfoN0{mTMA<^LCD-KW~8;%h3K6EdIYViBL*?T1}e5N}@-Ph%P zJD*P(bz^GBSCUTeQ{dnzCD@xa!^z2$ZgTx)@Usg@^@Z_k&WFV`=4 z&SUXoK;pIj(rc|FPAQI2HpW|^fA$9f$MajLf+uvq1S8wD~y~ zkNzo+0lkv`8j{EJ-dxlM-c&liEEC=+*UP*EJGQGg9k?8Mc>pB-Bt@&V!_W54mK?C# zay`p24zH>@yI=W+&G>;$zU`BFQt>32J=(uQ_q-yn?Q}+q{<`&&D+GY>-+>Ab$1^QIr*0Ec-dMn}&> zPKBX?Zl!LeA^2PN-JOqIUnAQWCm$*KOblU-^MayD-q#e*VwIzEqeM6TCG!`-NjAYx z(Xn99xh1+q?xjyE5C6q-E&0taHabkOztj?}3_i~vBf9+h+P4({o zWN+Kh57yAw=|y`N9r9aM-rW}DRkEjn!Mk=RzYy8m=-a-mJ3Kp6zB>DfvXi$%4u9y_ z+<4}M^v1c-$D9x}D;t|~dsJfk(Qzh}!C;4HZ9aKZrb+dVro7tX-YxxGmZB!p_z}nE zjurg2sccVfhJ1e3vvqb?k zJ2GpvF*!xyv3xJ;P=k{s`DsdbkRDDi+PnhxIy3R3-O1U4`~9MDzSv;*qfW={ZCAn0 z_#RTQ7!>)1HN$GadDP1~cp)->YH@)C=2^^@6uore?9R2bbYT zz1IA=GS%z&j_?lot$u;+Q?$mhb8ndsY;25*3R`QowP5X{ro4^?vktDVWOGz7TSUco z;25Ds@5z|DhBoRK$R(p6N-44%n$6%mjU|iounx=gM;e>Tkpl@SJBKm~trvVl|5wIC zm7PZ2_eRm?+cSsIdx?wa3!ETz-`5x=Q)E1%ynJ`*}!%bafuYn2YA zjrvXWO>{GMPdZr{{7P);@t7xW?2667=5l|GeJw8{&y#+~M)3H`;79pBYphJoT0QiR zkwvUwBt6jnXU@NolP9`X-yMpu9IhD#Et$a zMbBqLr!@N0mEOcpc^eBB&%7uVBioM#!c5xR=FTt}bE)zL$I_ffv4h7bM&k=9J=K6YlCBOGCj;-N} z-ES4&{TFelCCNVJ6VXRl8d+JF2`rBHVbRX_`6%;|%w<52P5IkdIV;n;dLJW}q5ZW^ zUMGb?F}A`S7~`AoD)eYgT|;`lG4384jOCIl@ik=reQFIjRj_8l>IWl68-IU{VaP^ zYdPPo>KoMhX?OQ8VTdjX< zP-=d}+>FhISQ=UR|5Hz1eREkF*b~On()0$FRL6ugFc)=MTPaOx{-S z&Kv{Qrx-bQQ%TnpfbE>K{IevN_;g^2lrxMEGPl9#{dvye(0!C+En6QCY(MJunJbh$ z)CbldWS=fW!+Nb~xOqKdK%^h?*99v6sPoxgMNd4w?>}&le+vH; znwS*p>C8U$8gvEB@Rd~m?PH_&6g}{Ld&JKwS~?TYXO7=2{1WMqxjOWBSd%`WT>Hs0 z?}+;vh~H)ZJ@m>Jd5+mMYP}8Tc_U_88QLa3KeznM=5W8dcRa@1?OX&~OZ#gp;|6u_ z#0vO*lV|v3_}cHn0MTk-6AyhnmeYP7tOhHHom_eJ@!Qw6;3J`9^w31LraX2 z89TW;dx_H57eimiZm4it01vA7yTNnFU)(eMAWg|lk-2_jBU|&x92=w4PYgaO*J9wA zK^&MpG&@(c;@$m#gV1Y@lU#^oB+7qgTd{|X(FLEjHN4yl_OsO&LzAK98nkXzf5hGS+ZQaR`e68=*k&`F zcQp=%Gnt6{HFj+GptsDLyrW=ibL!nw#778xo6p=owDAts#+v8Mg-kQHqF#gVwzgm{ zt(`@3Z8Tl%r5)ZD*T~_UN~V{xSCuVXjyu)&*eg|IKBZt~V@>$6vJ+pRwCb`Hx-UKhE@KsW=Gz#75udG*Af{k$gh@lg`)>sPXr<>nh8QQx06N)FQyCBxb`gdcSEdjPnTj)X9mh3HW;$oPM zuI}P6;v3~2?7ct(6N2ulPLuKRI(V_>Jh#W8Iz!r@4gSf>H@O@(b6u&fbUn`Ga>%i& z#A4CUM>clT8J09R(RR$v?;7TJT8MikvyFsOtzW#~F6V%q-q7 zco{jRd3Enl6wajLB!wRmTUb}Jdax;D&$AJ8DCmRifxWshWBWKAhFneV8R`o&fIf!3 zs%a*|Tm$kH@vgZwfS1{bKlChDh$H&=RtYr zkr&PL2jM%u>r1Xk?AjR6UVpFX<=CCA?3r26#b?C2PcnUhW$_Hj?VMjKDeO0f4t+N@ zpM@Bv(O=i6aH^+Ex?e7^#5S`tvt@qnW8OJRp3n#Bm+GU^%IODs*7rUjvsrpP&UZU2 z`w*fLIj*M(-gRSCr({0qe_5eHXlZw1=f%I<`rX!sW}Zi{A>J?k<1O>;{DS_4{t};U z^cSkUojakg8-2~EYoXWP%jq*AZ4lo$2G611Uzb>$u))`~#28TDxUbmuXQk?)Slz_9 z0O`EJ|Bup}#0nbxrD|{7U3*nOuJbx7qs0niSp;LEDf_aTXTf~P&N)5fgIF|k$c=0{ z5FL>DQ+i#YYEj1__s{6N%EWPUjH??3VU&)m<-{6fAcDVZEYPO_G* zFV6vT=5Lw5NnYiSR6mExXuaa2b$H=B%6%{I0p04g#_MXr$CNGfC~Tn)`H2euzW{*6 z!ss@Uy%Fq2ql0F^AK|(Rdz+W4FPm7NH#z{HfA8N5nV{dLbJ_Mg5_H?sJ5I+w;CC#5 z&N9zzOqQtl6rY(7|5A<@uorO~(e@?uh9R*aH8n*sY(*8H zg6w?|O^rzBw2SIp+e^8pa};LZM9wjInF`ELH1FOOa~`=SEghRXO4*j=sdZ5X_k#Uk z7TD$a#}wv3EVsd5qcBFw!zIwm^cUC@br^Di3@!b+bU@wde%$G+_-A$S$oiKUBvS8FY+cLS?2HF1?5{^2>wzjmzeGcg{k{7~Bb=qjannRLNW2p3nbT z$=lU<-&+x*G(5Y!@Vw-3vNt0?XP)i8*yeuB%FW6dxi=|4NyYm{tM_g2hv56nLHZMN zXibgw(9#piexp9Bao!Wz+mzRH?s)zi3qNa3JA^sIFX!xUUDoz8rN?Xeo!myjLn7<~ml{NdR7TgTd(raW)`r}RIwnJJw{&R&%W?K71*zJ! z5f035$NEQY6FZZoW1*wu^Te+0iMptCZrR>zY1vttuVg9T<>r#EKdOVSSr~;%M(O)~ zTxvp_@~4_J_mXJ8_=6qeqZBXn056OyE>>9gQ1E!(%X>!e#O_p~+xyTX%U})gqb3D%{w>!gVU&jC%`mf#i1~r&`HL?(JCgnp3(1_xs0G94hN(U4tQXE45eh zlYVZUbFzvFl3yw#8ygy*881EV7NF-db({n5nKdJfQ`6?z=8i05O~9)wx>i)-bM_T% zOl<6I5`L8OguRZ5u^9fXjQ*qW+t1)rY*wyR9^`Tj}2`%rlSGK<;p%L4*61?E+-c8Heh$GLPZP%(P?{vPJwCZ#VSuC= z#vKgKqt}qnlbA=R=e1GB{-*RB>5+a~utL!`@xx4TmSb$Ej~%X4+(#YzUtDUPQ_uxSB%Gmtw(&%;N>+!Cuv*)OLAA|Gf+z`Vfn~R&JKk5S1 zWEsBuyJvHfYfH4j+BksI&`Zsep!^xi1|SB0a5;a8_Zz#m=TdEHOk3tdGVkmD+{p5L-YZa}ZD*{n40b3v z!*`F9N+tIw>*|BA7=F1Dvn|ZIF_**WphulY#qOO_(0Irtuu<3L*NM;G(6tq`?s>urH>(UPjH|G0(Sezj=Qxn>LTLYE2CQ^*X0X;a4Xs#jxzu{rKIQ$42Ry@zfw3e z@1k9{9lC3S*FX3O7o>(1ZUi9-^Z(Z z409-qk8pPOY_XU2q_9xt37C1rYn&I=S&^?N#TuU{z0r>_wDGZH`$q0ZT)^-zXUiIz z`QATC@?BSy{;SU)@^h!NSlRGAlMea3qP-C3d1-j6_!^Z_g|e^M1mR=H#+Q2~wwLMG zsXl~zLS0Wy`P{F>em=T~(#PJ%5;OfKr{}QK-iuwEvt8#{-Fk0nfbtz2rwWrN?Dy|U z?2POwDLHURV(pgosO{o8&_7+3>YwB0T(PT{qW*$1|6$y_UTdsib=KxTKOH?C8CldC z^?;N=wb*k-g~rD+ASd>7Fg~eXS2%AYr6_i1Dt&Y{?4@>YJLwb4nM6hx?2GD3#-{yM zN-jMeb%abC;5-Y1W?8%ozNf|_*dx)%^ADZgD#wrVxe5K84P7-yc9!e9(#r~;9|{{_ zLC(Z124Fsv&IKh8GRN;%cz#RE9OoR=p=chdb$S+iDIG`OZFD%gJa@ab^LG5U^xtUk zZT}7SE;tL%p$#@In6CJm^Ll#Z?Ht%fe~+TEFF|8dVvT(%H7oLoFvFxW2c z7RT77(~+&lH95F*?*A0l%3c`*3j-zpd45?w+z!4Tk-RFnF?;ftd9&hm?<2wLIRnM; zQK#}8)g$2V|0Un3>R*^w+z&0vh(B;%$(y-1m3|~{sn^<0V=e(@K642g{7&9v>=Le_ zb9uQJ7Hz6s1zkVb27k*Mu{roY^Sc^-J2!{6pLySpQgzd7i)-afzVN?N?@pP}FF03n z=X&IiQ+*v(3_|s+0EUBe$a^-<(&*d#z!`z%ss88-&2ylfXU&DFv)Gp1CUM>d|0#w4 zJPG`#L*C{|o`l~b=5s23t1=}^SwCgoWhdtIk{{{&ALJb-IWtEVj+J`n*nLLHng4^F zS>aeLZbGnG#UREaD)D3X5RvE4dVf&Q=?0o1?GdXd?cJKH+uay%EYI`$u|=;*J*~V+ zxru@gpMg$AhOUN1bHwjskD9(b6WCqsyJ&nmy)OH7$bT@rU+i3g1<@hpkm@CeeUfDboZJ)Gu`k_A$b?z64ZLv49 zp-;W8a9*u=*jZ5OFEQMG(JsNtTH3a>HT$7_=6#X&ozH`gT|XiASGvxaoM-Ojk6VciaAjx7iDm?uw0LJ zg)=KVOYGP?UEAvk^XNq$E+~DbWHrxfm^V!9K;kwRmCvxZTd8Ei=)ngEy9&DsqwqQ7 z%i}Xv4)k|ypXz$o`cNM`zZDyv_Ke}9?lEVb>$t<2IopTf5$_S%Ll}k8kn$d$FWFqX zSE7fM9GHXt|DU$~QpsM@8}q&U;rpbGnsB?)iT}o#zmn=%IzG8U*?#mXMtFmjy+M5J zl-8$6tniM)d=*ougRjKC@kUqfb*CwQ;oowuw~Ewj0a-8%x(CK=ueV=Wqc~vJM7H}T+{BN8aYkmzKj!zC1Ui%hy3u*Fu z&_HAIH__>=XCb{oT{uq{o>sg}ej$Eq^vm*axvJk`J{#A@p1CD6NZBNm6$ezzPGejX z3KKwYT3_fju(%7WoWw0D?36Zkb@nr5AAX7)gGKmfbj{Gv>Qm;Hklz`*`D7H#d=X7rKfIlqbL|1NK9rbfAc7CKqu zSi5l>Vwy(obNn@|L~NQLAY3+wWF=zcrrriTjDJv%ubBceIiZ zqaYuWyu}3!RfYM|}Cp=#PpfR{=-eA264XHb52hvdvL{3p4o4nH+~) zg#u`ay+^JK=K~AUw95F7xeLA4cfmeOM&902ctm=a-5Bo^I}L$v$r~A-wLO$DC0X)U zFUZ`l?w!8d2=8a=e7J7(*Qm3leCrx^m7L)i*wY*SX zGWT%$QPs%7-6yd>ZRoW*n`&OJZ z5PMyzlNaE7>H}MM_xJqYP0#Z834S@h;!T4gle0+6+sB2E4L;N8|5mW&oAEN|y5~y2 zDr-4zD_ULmJTOUh?wB{4(lsQE5nhphTf)EnAhfYSFHhBB60ck4qskS}Obz!{R_k!o zn?-LTPE>X$a&4XG-_o`|GlC(fZiG$_i0SEj@l4P*)OTv7WBYEHd%6jqCkE2hwRIh+ zLo;|gxdCFMbvj-XG@=j7R`wbIpn zq=r9q1|Zl|Yjy5D+~eJdpI_Y%T&8voQKLUf?)6CA>s<6?d?u_^8^obkCitnA2gey- zy?3^^$>%aQp)H_Y>*{s&wEr`+XmRgclr#E=_>#K68D~t|&io>OsrGsPiTRRx&(&J_ z?NbZ324h&FhW4$T_4yx8{a$+ciTAe5v+h*A`!ZoeROf!bzes#e?*E*W<+3I|#ym3L zg*IK=IJH(bj=r~+=NHn?n>xTozfUj@|CToBYtQy|UXz(3x`p;Doo^C-PCa>Aplh&M z7o>PiJNIree7Ad*!R{KPM#DEkj#lP~nG0xNJX~-d`V7O+r$+4SJUn#oOm9`&4;?$U zVCy&dcWp0LI(Ok2%5%QlyNu5>E?O(I32Jffw}Q`5+nra<-MPl=U)*8hqve6^nR+aD zi`Z!5%!dVs8>}^SE#Fa9IA3(&J^220MO&+US<0U26YlTD_v6{E5Z{1j;Z^T;$ep5W zU&;Ts;5=VJwo#5@as;0j{?~AmuJLSrPQQw`1XJSoydA%7?8`9d9Bt!H&RgCy#&NC7 zGVoqt`^($a z1-uDnoBl`YtQ_3=oU7{Mpx~kFZ2U;>bUrhCHiv`*%sJLZeN2rhTH;_ z|4m~46lY}UdWi=21v%@}@D%&P+r@vo=hp|Cug_nf*ZPxjjkdpaS^GQ_v$l3|erR)@ zRbdZ_r@BLTmHbbYuBNR=4s_1d z#+JCi%pcX@Ih&hZXOw%H!Z&b#-%aR4)~?9+{EWH7(Uqo-i1S;u?Vga}aGsW(rsKGZ z1?~dXEA-Ip^meh)N=KDqHTRhkF(A$OPUTbXD%_=>8TYz2+9&75J*+C%YaI=xa4-=E zy%Q?VaLRmbWP2)C0e_&Z;tDzqeuJ;=(Z*<_;gCN)W9vd0XX(#embuKx{7c1S%=^|k zmM5WSIld#$PhIxEVpDd(ro0zeTZvfM#24K{#cz2w&ftqOm+Y7Lx0m=k4c0o!8HHT{ zZ$V`>R$N1#!EJtnccij?InTK`zEomr>e#yI4%2V=MD7WL7qxZUn%et^Q-3wQ9J^iB z2Soh;q4;MLBcETP<{Q$#x*}tHc@||Y&*!XYh1d~(W>I#u#8#saTRm8uSxKLke#q{` zT)8WS&o*@a2cJ=Eb?y;3CwaekUIX&B_x!HnUB-v$7g;_)?6Y8)l-oFpO>TW!p#7Zg z-VrHVf6H9?VfcR9CgQZ(XHaY9GfeRMNdAtqmd2-N8GC(K(bl^@8FVuC^f}MsBxe*} z1*NR=Lx?A9efW97`ieJ%6DoLL9B95qf2jEX=izSdc7G7t!To$3NYExr#p$%Om_6CXY3tT4U*9Wr+AYMYG8zf>Z?Ygh51)QvNbIRmx3+AsPIIHvS7 zbj{o6A03aDxV0MZ+dlVa(e2Byt_t51UHUhi^%nFaXg-1A!El_TI=kmQn=5&-@M3|O z3~kB}{vhO$W#0r}(mH&R%ve$Xwh5Ve{h6-|@0(okT68{X|3|Hr|8qp)2;;-QnZN_j z1K+a#p36PkGt$YkJt?!&swP3{E{j!e&fA)zG)VmUob=5OsW?Px!vOU;19Sb=e&Wsg zNX@6xWBsCj;v*5mtV7SQ#(qa8W`eBFzAJTr)DKOV{HdR_PiXTXp&yGp5NlfKJ}-O1 z=iC`@lKrP086Eygbk3pJTXOg-Tig<#vGsUQxRyVBw|kfInZdV)JFepBgPDUym)5{a z>F4=vbhXh}P5Gw0_BW0L_mqy2gMytkc0*`6WR6I1L^S#@$(^DU48v?D`iJZA*~4`Y-oPAT>OIQL99PxPb3GuhbV6syRlkag z3LQUA&YfMJnOg}ivbl1;#DzY~s2c3gp>z7CYXpDj4Bx)cy3o38`?p=K`_<`kp*8wY_AE;%lKEWNqdFx8vz#E)f zF1n7m7U$nxSKj|=ft|56BupE8Bk;$X`pl}()@;;dI5$U~-5(2oG;;Vz>V1<3sq%j( zI1=~a%Z%-T{lPysulFr>WA~i$+0{9==6PoEL)okEuvc3gdmkCEb;jqhotPtkdzo{| z@k)Ms!O!t$@2srl%;}oQzn2QOeljXX#uh&nD1F-<|CqHXTCY9{EP`v|EhD@UCKg`o zE|$2P@^)zMP!mU_fHDxznSswUH?8-4MShX-Pl}nM(G{D6z2;6$Xf?s~L9p&u+mtX4 z%lvXJoquJmZ@kQD6ikD;xt`HqO&$9!gctE?SIwK>8Z#pAzge zv@>eA=eL8;2Y&dV8NXI*<@=pkIMd|5yE+#CSsuKGJ*;$|2KIQe+uvaR52PM2+$`I` zjizIYv6$D%^CGuc`<$)AWS*LN7Wzw!5p;gPHrj3C-zDKYlGmf&C>1TwUYxTtZmx)y zKqi$=_&M#!J!0)pyR_xcXP#8YSvA3VCLeTS;ckN=H)Spro5<%J9WRx0;qPusVIeqWI;%EZE-c%K+s5V_Zgzj`%% zq%K(-yY0&E!n>&FS8Ejud|j}$qoqU*!w$@6mp8%742y=D_%w2@Zali;Xo&}j|M=Og z(Jc?7zLfIzICPO(tGJKRruLH;V^$sW5yS~!1Q#@An0cAoi?~yR@`2iN0^~_lPB4hB-}qM+erpRjME|jMy_sCF)`Rz1jKM##e9j zBbm=zz-d@QVBlluHFz6f4zY^CF)PiP!1-iZ2x|T%(asD zC+$p=@RUeuAtKqS{A^NB3dATXP$@b_Kc9wm%Yn<`vZpK&K?kIeldZue= zYw)(Ew#(VE{%r>0ZkeA5-S`}6VR%npfUet?vNh|WJ51{TybT7{6x{U4n zIMR8={M+w}yUU+(yqQI->w3g?rdUJTVlU5@ds|+_{`ZLRANHSip(cUpJr(pR*PnRK zS;*OOPgpCpJZo{eDc%%Q_jNh?DYS3-P3jxN3Aq$88qblw?yR)J73td?2!53N2$Ksg z;zJy5AN!{5Op|mmZR!b!xx-v-3x*emo4?lttBudUKCL(zc*m!vEN;Mg=-OvK9z3q} zEonD5yPM5-j>_2nopV#?n&;o`+8ORQ`8OFqrjuuJanim6pd~Y;l741N5V=&Z#`?&A23Lt#sPp#B88*!B4L9+6RJAFe~nD zrQp9fpbsv-o9AI9$$uSQfu`Lds6*G-Uc9V zzBZ+7{d>3zoF}gT?UmUZME^TZf7pdCrZ@A5@Ceh>N8PJ+-LL&$8;-}%vUWb~lF-(} zbjeyyzcz_juU%~G*y-a@#(0;H1fPk%kL@ZHzC>*81;lF_6Kj>ex2#XPdmD-+k#l0O z?4#FpN)72T@DnPXzaT~!o|qfhl(#izUnk=}_h#cud=EXK<52eB={&-dq0Q_4oYr|g zuXrsK)0{S*}3+kckQ+2o@we;{1)T~{g?*Jo#N&}4r*Vd=@Jsp5ZTQYFvU|-;io4Ri zP0U;J(^AK{2YTt4*z&}VOz@?2s`xsmd-Er!EEau7aEHON#wF&IRil4j>#(B8 z>JUrnnz3~S>yOO`jz@j65cl!RRs#$+&N@0>_Y%PO=4a6O?mU}%Hl<~Fa(c4qK>&NJ z@r$}dO&R@;b=id?SNB4$HWoJ;z1lw437-$0WAL1l)0UU){ltvjrQ&0&IDKt#t@*b* zt?yUo*co0W|2N`?*I{p8F8)Q%mw57O z@P85yq;1;iY&EqUt=;#92gZT#_ae?n`z;Qk=vUa@*htU6{yzV`;g@I|x0POr7T86#R(Jop%you$ zdTXfo%~%&V33ExbE;_Sd_xa|O%}LEfjG%4DBXOdxJ5ZPspKV)uo2l*Dm9=@dTiyFj zt=GhauAAdNZSW}iQQRx~Eo!a&mM>e`UhjI8x9Kyg%YGqpy9IaTKyV-^%WC?m)KjT5 z@IAx>Yok(3?36o4KTu;7><`ku%KC7xU|f~>40)@x573mU7hARu-}6yocI`>-N#K7_ z_1J2Sy+u9tmzgh3-k&~~lEJf-($?ltuoYkkX)P3*cJ za?2R-yH?5{`w8)~S}VI8xt1gAt;p)7KL-}C>yWX%y~I_Nd`cQ3*J58=aFQB}o1CNH%in6=wAQhF?5yY4dwWGR-{6z8k<*lSfgPV8&sUtK@GakW z-#1vn@tpA1#a0QJlxMQcw>F>6O92CQC_`+M#*o;!r8bGS%&mKeLKb)~al z&1W+?^GkicbM^T21kDiyMvU`KZ2L5_uo~Ok<{x5W%pS4DfydbA1eR#+LX|h$*sq1D zzNT+td$CELlRAgBA6m|5MO{q&UQXii(7{2WwjnFeKwEzY-dD#^O*koi$4mZCA{+RK zH_jbrzH>=vXZx(&d$umXDIWR_!o$O%k$lqz*Pnp$$Oxw{k)equ_rkS z^nP9&cTjr*`TQ6?S=={bgBvp21m~pP99tXmr0`!m-rHl3_PdK zGP8#KqBp0OnVkNt%nY-hn!3i|X;UK0@4+5M&4WndrN4 zzRadnaW{E&$RR;L|H<%4ct+~^)mlA&qi^v&&Nb6<*%|pECRct$@JC?6O23Uw%pQ6= z^R(%m{Ko&voXeQ}X|iTc;nvixs1{MbtJeB=e-?Xs5cV{5EpN=af{i=wF4tc*A;uxj zHo5!^wb7#DY{?KX4Dh81eZ{j_vW}3}ubk?sj(? zzpgs0Ha^w2?zcuC_D#Pp{^5I&CCOLol>kq0jG#FP4~{ z{_Ps?x8keQhulz9`2xmzy9>6@?vd0ZWn8^;bw974xg%4eZKlruS?5{lg(Szwq2(H( zi{KM}o~Q-=!B@Fp?&pWzhbBk)e9G#vud@G9xfSFW>Kx0JU0?hZGF<79({*|9u)G(a zv!ie4%{`K`GYz|jZ%GVJ+~#+_o#pzs^xx1Kpkz#~mF&HkklQm-XBeA4uAHZ%J|X9` z#(a)K4=inHHQuErT4wNy@AGOVCVipPFq=~B8uoczurAQLZfxN+xz_`r)Ea#oE8XBv zX{kTouEP3q#|5@`;Kp)~Dr+Pf{d+}sEx@|usk0WnSB~9w;7m*Le?>lc^W7}V|CEPCY9d&-_|3>0aIQZZe z_}Sn9oZqcFIuHZ4z7!!{lU15E# z`^&RaH5RAqZP?YReSr1gTvd6)8P1`RU!m6n%Y8$s|_fV_RXH$-_qRT=DaHr%L|cM4zmMKDjh~ zsfitG{aVxK-Z`|G!?(dT{faB1|CPUUmfwKH%w^6C;J%H(XO=jBF+Ka$afQ?j4@Rz}1fF3XqcvrkGG|~9 z7z><)3K)@pU}A$pm3ul9->=pxE@<@cFmq4lW#?%;zv2fU9UJ&v>cG>%C%}DE_u7{{ zng^SBT*~(K%n#?oPf)%AyREbgA659l*u+vopR7aQCGXCsxI1yq_99JotS^vk^Tkogt)sfIsfo-@zXoHY9OyvSY2eV}ZswR+AWq2&kblItS8Ufk!2 z-Z-&YwZNBNPraVf{$$DjK;-s)$Ze|%{D<$HfzMwS&osGm_8{xuQfu{F+rt$mMy|_R zobV*qp530DcvShh`&>e3{83lUrZ__LlWv zw+GYA?Chrk+h;c=deqdAl;SVy3p9EC~7kDaAk0%>2sWg z{z|?t@9b^Gd!$B)x_x5ys_ZHF9%3mS%Qa@?NRM-t8@x-Tc&PYqFAWrCcsT-(;jy*3 zuV(XNXD`9CedO5M%U;EkMXp%WxIW}eI>nvxqx+-jm+zZCOXToO>|ul3VDfS7P1Aik z&Dqtk7s|KaUYx3OUchhfO3Z#@9$Ck>YOP}1y6h!_Esuc=mlB*C?Q;|4@0cBdIUp9> zDfyP$vtzv2@bPvGI~pIXKBzCxxohb>22KFpBk~!lwR+B>!B@)eW8cnBon7X`Z0W2j z5LZ+@ewUZ$b6tsd=llX(?&;MS|i?(BV@QLvQCjiqHU4g%M4ZDVd|BJk-UUm9i zrJ|}U5S>%BJ%*nJtbJAUS>}g1(TCJ;oC&D!f?BJ)z&V(`@OkQ}4Jp+h1ltjOpYY+^ z7uy%LKXZTneuH2AH8I2bHgGQS4g#9RTs&)!j&_bVdf-XaOKZFHL+S_9d;Vr%XA`W> zo&(%KJx_CXgxG!Ry-tNr!VSe3XK#9MTE`|^f-MGzpO9Z-_OLEea?5vNtfc*OwXQ(U z4ZKx}*!CXx9+T%{j|}-suYPED1?LayXMPv62DpbX4pKXzV;R;_Xg`zlaIY#q|2)W# z##`7^qxWB})&8&XY@U&S*Y>5+e^>P0JJ5Tq>EfLt_vvkBZc%rK^H2GmxBj9FYRiY2 z+~V=sON}qeXVdbtFttBCzx-^(8~L5wpG8H*J6DZ8>76bw?;r?EK6AKIj zzdGZZi{Oi@wfdflLJPri8H2Q|Sd&wA_?6&t{I%dM{5vrOJ~Q=pINHuT5oJ&6(=Bj5O{Z-Vi~?a}SVuOlY|bqHgyeictDYzMLYn4rJ#)zc?A%RNH; zpBcdAxF>p6>3z=af@4$O>ay1w45tS32en?RE9X-tLw_C-9bx+B$oa|rBtFn5r+Sl1 zxKkC0xN>`TyTOnj%DpQ4L$1qfbGDDKd(^#*(Rrv7ZY%P9D1Pg(*v`@#8@+AvFY}78 zAs?;m>HI`}>~J@O9Ff9vs=_MKZ#?T4!T(ITb(|TfDOG(*oN2xjT3KTtsf?XX-#(|- zcjIDrbjO&PL3P=Qu)j(No{rdu@6NMW;w%;W&Kxm$8g)NHujpinHMl>(63cidczeQ~ zBIi3G=Wl0r8-2Jlwz?}9y%HaZ@85~<9}?R7?Hm0YeT^rpb)_>0bvT=x6%s4G1o?a= zL#`FXEY0hi)f#8ia}=W71F*%)CU(X5U&K9uf*u+SHTBHs05|t&xa81PFThuV!BR)< z-_#+qQEGdrV{5}JWS^;%R~78+st%bBhKIRlx~JKb-$cJLa!XEwGw=+=!}o@^Uv*0K zC2FqJJ{K~DM2+t4CLY-pwHKME?|N-)bDgnx zDE1ok%c?o2+ab4WavvHWW~F1XlubY~H2%Q+5$j$?t^$`=_IFwOW^l*Q3vBCNRu#UG z7?AtZF4Io(8nj>6IS)BnufFG=u6$|S)3yn&p05gDnRw)#@EtQdwMFX|tp)3buXSzi z+MKop{jw?!9RVNvu0$Q?fc)uF$HWyg&aTqAkAb<<#UEzf%T1xpRdGI-mVf4|{s;TdT-D8mTV+3~V>=gH zn0)tc%x<9WrN7ayT<lSF0F@e3Lh`e=IC5qa&67+ zxy}LO|L+KP7`yyQ@e`9vy`p$UQRfck|9|<}J*Kw22ku%coD1u^)w%*c1oK4yl6y^A z>gl&C`;d+|xM*u}|Ka_^#AuWmEgL0&l$^y#oW*YUQ;7k2Use^YKAD~UM*MKzi`j`e zHFGgvN$=YiSU7wqT9L8H-W-=MyQ@ziekt|w+sG+dqCLR(|-h*xQ_-xqT) zN}VugCES=*d?0*=mlE8t?0Mn-SL2x@*K)(60?*uK&Tdopx^wls;*^$LGuN;)wlkHU z3N9=A)!?tlF3JwaXBf*62j=G;{K6IB5TG2UU?VCj$l0a(L;ns8N9&Cr(>BLFCSNjf z>$!-bbp6aJd0lsRjklsa=kzZOT+>~ECy37geDWmNS*73Bp`Me!#ooXL!2;8F*65EH z{Bs=ePxe9c*;vnce{_GO@sPUgG4h#?_{>?^bH(4F9=<9%OJuln@9N>yfx4E4oHK{v zd$8rsHh-Iud0^lMcPg~Lp`5$v53JyC1}k9CGM||k!W!=eqyNX}Y9;2P|1dUwOzhw@ zeb5Wm>VS?By#K?0I`1|$HPQI1+OUz=K;m&&^073d1)1+-0X zpL;=K@a6dX`tW1n(xl(G+50*-2J*iHcdbwEf^yA?Q#r!5y$^qi{%LCax4GvCzO)r* zcSylv4%a!hR=i7Me%Z|8(`Mi1=I5GtByw%d(%fRo)Cpi_L~305tf#nBOwC@;Nav`zik!N(p2TQ>RJ1jU1&#a!aXVBB=@ar-*FLrDGR>Q|K zCjEf$%s9{$%h9VvxuOhwpC2l9HN<&d#~cJ5Kh|Zp%h`PmpY}EM#`1aS6J8xpR&{i+ zS$)xGq4mJnqT&g;9D6c4w*3*)Q`1e2<qSRd;gwmX(bVitIt^}XAX zQRlb|?|XRqbW?xw9B?q^cb>;SkBe>+8#)la#JX}$b~EI>H|jjKE%+V!$h6OPLh1yQ zH(44yX1FQn`;Fy(f^(^Lq7HBaVlKWrb;VUV%OAygzT89lNMobG#B`1RhvG+l0HFLi z??u4}s2{F!t^$rm9X>nFdI^1YYR$ic_W<=Llkp6U@eh<|o6<-6C}X*3W)*Dz;D6k! zjXtl5$kV85GfJ_oKkVw+`5mJi-Ua1PF7y|oj!4N*3#Ys618q=U*7jSSBYIxN3zq;3 zrLDXSLOcv{8Dp70P6zLCaJ>9m>TT*wjrpjx(!EC{czZaXQQL*K>=iMdyG zk>v;Yx}dlyX(KL5aD6WcEmtJxtm!*AvuJY`cf<<6od-Rj*6Mzdr%wC8w-hbz*SBc7 zN0vDEiGHTtg(;nGIpLU>ur9^vqlbgIOe))IaF(9qbKC8 z%wOR4kY1GwaR)E-)a+5p%wWvr)OO@{@oki^6$k%Ou_XGN*h6%4`M16j4mUNARjq-w z!c~ZaxQvfwoS*O?zjFrO3*5dY|8icXvRV8)zq57uJF60L-%E()^}k(K#`+lh&+^qi z*TdgaYlSn6!K@j|n*(2EUEy=n%TQlDTksS5?cL*Qu_^Qw|LRSZScZP@o0zA@{!s3D zonw3Jz~KOncgE5Dw-=b$|Dr@aA#2^W?W;;~3N`va82d6bF}GrA{yMSI9%Q&rIMeha zw9i@YzFDE_72?~hM*Z0Tl<#Sma-ZWBKV`t9YdP@WNBz9E7ma?k*o7+E1@8svTc_@& zoQPisIhk3sv%**Tt8D*NVO56jOWW~t_;aXz`v($SdFT1(8T~UTp}P*rTCA_$yIT14 zs9O$&4$(SoP-yuQ_junaJQF(SqyQ5<@Vk`%Q}Ca*gZt5!cPakf4}T|5FJ=3gQ#-dn zj3a&&^i?J6_p}|^71hEYQ{U4mQaYS91{+<~`%jtQ>Hb2#hjGxz(C)(ps2kDG&?~sl z^p=i}ZLV-*^o7)c@V=CaC6kXk&pA)-@ARGyR$NoJH#K+iI~f^foxDDy$qA0cD4GS^ zr+hQo?i;b@{x8FS+Gn5)^e)RlUDooeFLdpkn#qWHwO_X{>;fOS(%FXnKeMo3WQ;at zOi=G>{O$JeZizklE?eC-<}P%~bTTy?w-hZ0+N|hnse_^oJr}VUxitI3H=6^#rm^@N zeyVwF!PZ>W1Rn`LR*84H2z+STUaSahf7azrtzc`k^^=M=cQ73l;`%v{ZhcH^Vpf#l zi~NhsoTjNM>+j_pI}iPV+yglsBi|C_ny(nDhqudwZTvg|FRq-kl!@h=kMV=$~hrAG!dHma8Uh!R3+Xi_XkQre7?VuQl z4>{ONTo)b{ier`rd1E7C+zMU#D`oz(y`A=lVzC-*Vqh$M4EhAoeF_ z&iT20)7@}(Avn@FkIdH2fzQg+iIw~wav$+H-m_U-XEocg*u{jrtw*YJ)=KP5T{^BX z&dgk9ZKTGO4oh1fCIqh(Z90N!=eIeF4{!#7_J`G4`3Yx5mP72G;yngenHJn*;`AK& zXQ&g1;ru3jweSp6PFVMND*jHJcz52$&hs<#&Hfi!A8O=kbhsm<<+I6AxsoOT4THi# zrl$J&kodMb(+T;ramN*p*`?V_O%2-zg=8-2N!jx!u;;DHd}749$?>k`?c7BF_~ew$ zCGAaHe!Ow9<@4X^8jc<3E$=N8Gp-ZtT|L{V!eJtZlw0mYpYlF1kD%?;7RS~&Ep!*U zbMP6~TAZ5TXu36P@#i-ab64w}Nd^~UZHe+XI=5(_`Q(0W^qH!)I@6NBSmHa% z7facSE1*`skQP^v*A*cpWW@|4SqN+H_hNAOXEMp$KpE~zki(n z*w_WeLA|*T@OzIyPF&B{JSG22c^>+`U0T{%z|ZHNM;E*LyjrX0A5j=>FtobtK6!@k zv2lIVQw3+Z39>yP|D5Pa?*Gi9t@%8d3QaA+&;$PW+?UN=E7!!i*ojNXM7Jr8RrSl*0dZzZ7Saj-VAtb6xT6p zJ5j%6aHrYMe3S1e6|JA2ugIHxdjB%EhUYvQoM5K5p+iRH><}MS9u*&ju3WW;YOVH= zH7a%dJMQL+wCw|GpKBxgc?kBihih}MPJ(l(9atK*KmS|gca-dbJ2bdcbOQJMis(66 z!~JpCV@{h37Y`hF{VFcUnzohvz}i+eXYD-D@#!a|#)*64r+mZpdRDexuylU^{QP_~ z17aR#J!{)k9oyda2lGn=e;_vdBf8f#RudHLOqOfoA4T`_zR(BL*mZ}@2*G){hn#Q1 zx%S+v{h{S8Wc`WlBUl_ygr29b#k|#p<@FM8iOJ244izsSe~bJTT0g6Gh4Vfj#Jf-* z%je|G%6r@^%K0X6kApu@+Z4`d(>~!oUbfJmAHenX0uKD@j+$!n2VO+V%x3OF3h969*LU{O)T5?eWkq_0 znG0~9Kh^XSE=%+a98$2j@k-1?(f;#JR66MWiBggI&XQX)vr0L0ho2vScUS95a9K1r z=QFLuX7Q}4WA$B7Yf9k^#P4^+=Ww54FFsCvY`z~I_0sF~U+DSiiQb|Iya&p&yl0cU z0JXKDb2WmQwyoQ?rapI^YUjL^bX1HIJRJw)Xw78RK)t0r!g7qgtz4i@K;e(0Av0$MUqtj^)QYP_{4h?FZ)arpJ)}s*Y9PM6QQi z1pME&v8{z8@0s482fT+wcM9Y^7U53(HfQU5CZ%h-at=r4lR(9ii0 zvvnvl1Nm&3IVLAgdp!Yvr@aOni}|f~xppQWF)4qw@!wYG6(0g|`+W({fBKMDmA^-= zl??9)|6}}|o72`8dMNjh>07zMw=?6Ii`Q{($^Vu3fp|3UwxX&n;Y^U{!^=eWs9Vl+ zRK9OGKNMPQ?X<#a29G5sqwga)isddy9@F4FEm6PC`7agDeoPl7Ccr&s%=kL$9(A01 zcE;9u)?gN@KD)WO3tK6FufM~ZF6}2!pX)g(D;+z7fZT2x1NpvSW4CFjQPej2UhrK| zzdekD!8{A&hl6iT^i^j(+q%LR=8iDms=xCX*du+`_Z9AwJ*2FvwUX7<`TnLCwJzE$ za>5v4ZgH;RS4ow*XVH9sIh&iLo|AiC8(BTpJ+^%2v_V?uOoM*rGr-3Pc4l{&o{o=z zSGU67@s-Zzc&pe))&+G5Y6Zt2HZ>$ryqfe6$D{9+d7mrcXsWgP&Mwgna!>gK?;xkZ zy?PIhcw5v$>-$ojsWx#a=N{X3wztI;tG5T_3hN`RKxi&7I=lmyROdN zZ0a%2uTZlXc&9EdC|%8Yh+jsQ^Qz>(CTFw~?{aL=P4(v$ zcZ=ygxySw1+?~ta%Z(3%zEOF1`kBuJef~eaEp`gKdtI3y{$}U|wO0GaxIl6i@NJHb zkB!g3p0Mtv2AGxhiyD2)AJ{3jGl|CJA22mS-7@u%Nu}S&F{tkg_m(qI=sOWl;PX)S z)LO~j=-Bq_P0Y^6zg2zclk#?^)uFk=#8;sXKPI;N@WrCC`#)lD)mq`GCC;Vq+K@j1avM6F!~0Fq)EXUMgiF&++uI=f# z#l6Lx*Gom^Cme@(riHHM#hRD382E5-1?#)qC$zk; zGms0TPk0S-Vf`Y;u&N(wR=CyVr0TM>1(%+M`|=Vv>$Hxl%XSbP=}7EP$zLk554I2- ziBkk`pA7%JKEbRvoD zG~g!^zkdwBZb!!Yv6rSUHNKx;vD^5@qY5JoW=r0TvJcs$*1$psvERhnl&4VRs{Nv& zWuBk&A^%^cPc}K((Xp)=n4G|2$VEUuoIXqkiN_TV*(dC8@Y^1x?Oz)v`1ln(TrudA(V9$1~KfJM($`ftDGpn`IGsi|n!CNB4xyNAE zHlL>p_D8MN^DK_XhiRw3LoV@mqjya`9_^z#$IjK06SL$lF4*4Zu~8q{bM{p}mh%N; zq`jCQ4mEgbRoGwhQ2h{??FiqOb7XF7dD#~5o=$Wp8ol~R%HF$$ZhNUK<2fFgQ+d*3 zaCaL0t3wr(nH9k!eMXye;MLkBM_jX<3@219eOo9ivTcY=;C+cdnf4(4XYZ1@L+8&=C;F48w;%sMs z<~5b~hs=|cKf<#y7JE3;WNOJqxCN#Tsi;YlSsko4?lZVvR|UF*ECLPt4uu zn|@IA(gV;-$7GH%b{Y0sWa9|@fLbg0sVlS*ABH{&>sz>Q5KQOH;7n5^IwTq=TptVY z|2hGDKD~k3w4l|seH~5bNLx7&dyvtO^#|#l=*AByT z@;)Ao=NytABKQDn9yX+Ejjz%_W$$=hWcj_jh23QjM<9-VFS}m%B~>05a7L%FIE#MIO_(NVnPTO&K8@Ur+ab4O+- zI8|Du_{{1#t3uoFHYBn!+HNGFa+Gi78gkSXH~usm^*=U7ZV|RHu|~_hD?P3Bb4G@i@AtI?KJZS4e2lbr z>zmb@e&dW5%cGNwt*?z{nVj+k?gh#}|EVSFnwFa$%p>wg0MS%BO0AXt85!D|fmef1 z#3o{(K;@uv3^f?Kr6zh8oHQ!V{n}Ce(X@BnFjty)p$9(GF1B1Q>%keN_rC@{w#E&> zKO;Kf4g@glLC`Tm*K(}X6MtXnSUy z3C_TivL_i`RPR`OdMW0==y>f3?+MdOUYAAX8or0|UAO7@)VY5p|BH%s1QElUsPcT4@A125pc>}J_R#wk71_A|dN{#Iu6 zkk^9!jNE5_W;%9B-`TdUt6TFK7|+%OgT)uZS%AmP+JeZnGZ3dlpP5|DyY5=4LFJu2 zw3V$9IwWgz!7t|CFz47MYA|)eb=lhmKb(tqyxzUu_)Z%f<L2zF zFg_yg(Uh?@VE+tk%sVo7iIIVle~ZLx)A3^4d^;ziO`^VZfjiIq?!oY&s&|F_Pl--6 zb90FKhz!FvHMq*=uD}^B%h{gai{pz8M-XdQDF4&&e-GyGE7uiY;~k&i6s^fvo4Yb| zKH?X3UaW7|HmDv?p<~i9;5*WLvc|K%y;@f~RR@}zskik^)r$+3ueHjvGt}CIZA{ ze0>`-8%)o8qi=iF*;B9W?~VTV;_L2(E*jy!Ah~9q^&#Nu)cUy&`B3KO8t|DPv)0EO zT(p?p$i#fcuF>Q1S=f8ZPwQf9Q%m#bf~~1Q{g~v%Sf_Dfd}6G7Jr2pIC8nT$sLNVD z zZ{JDyGs}Z6swNGx7YAw{^r48;uZV08WuiyirouV;m(?vENG~=%Ja{}Lrn?t0-R~0| zo;~vOMJKnwcRpBDSjvsKvudqk`KQCDrO$%=T492N;yO%1p^oJl&B$7Rav$nHbw9<> z!cdc6NayWmz5@4!wu3cM$;_MUo3=TZ+ltMSk054P6Wn5O<38aGk%3zw18Y(riB6+F zugg}8k5L7ieqYAM0)9HJ@}96eO(U& z=erwyaLg-Fw*N2lf5vCn01t=%ma}WsTE%*=WKIJXglB%OxoLUujltQT363ze4VQy+ zSnH?(Y0GW9A+=ol6_wlbsuq!YyLD3)p-8PzJ&h){m*wHb}=+y&8PBXXLvKrogJ3w=PDISrXQhC z(avye8*eh_@^ARJI={?0aax97NpLBLkP$5dX)kSjzsNluzIq7$49*Bv^U<*X0cTrS zKY5qz$+x)Ivm!f3W{qe0MHi$N7~GG1U#H={$oEx>8w`)@N8tM4vk?cVjh>3eVNE$X z0`nb|9HIvqyu=!(QfuH><6D5c;|E`38XZw1%I~2cH9l=+Y*oQx@|+u}?a{E}MG`yH zN8+3&odYWQ>&3qO3-+Z2n4a}Hc8@2@o=^rByS6^(u=rHWHc}Y%UC>whU7jyKU)0}u ze|*2xuJgT^1JW^$TB{g`ePMiG%J~HEQq7T$J8Ny(A*uFqe<>#qr|ewL3DE>2Z<_-f zhfaxFnYw~rJsq|xG7AYj{U9I<9$c2!rVizb2-n|-|GlHL%BT;u|I2sv^^aF z|DXQbK4}CTx?`%N;X3FO+8RqgwNiXA%0u7uT)7u>px++x9u(dC0CexrL`~5* z{BF_>co^R)kMEU zeH!)lYt0YEu6h2kg^5P*y;wXb_LuK9Bf;r0DQ|h0_vCD^*?ooo6g7Un%r8kT%8l^n z>A$gW0;&QS!hgly@s4aZ^V4UP*LgOLw@&T? zb?CxdaFli;>pn(t<8H24k7KCB2=$gE-JN50R0 zXZXQ5FS{1cd;m(}*63F031#0UZSK*07sv+rMQIlpo2a$2aSL6ASI>e!-`c&{a1`th z|ET)`J>n|5R)I0dMA@HP(Q9dESPY2<8Ncq$u+cpK_}q9i-|AQXuT0(1kZ`eicOUz& zZOS6#t#~&d!Amy!?d9DM!#yqemN%w%#@@}2W`yAVJdj{Xx1AEfGqP?jl{vi0k#M(~=C(Gwg!e^fIte$+! zQ}=W=_NV0EYE);d2{Mr=fK_XKr$T@ITd@hpTG|M!+}V-v{FVfmz`# zW32PAiG%Wkj6VDpwL`pL-@(>&4ecC(HM!}Y#(a9ay^Vfe7z~0xtolvnhqiwqa@z_H ze<*AOXWr?!du__jgPtGS`5L>jBgF2|KdJJrFg9_EWBYm<&_AX1`6z#sxfczojCl@>9ojv^C_KMjE=htZbqN&iQE{mP4t;B2G76FBM%8}Y+jFg zJYoxv;rrR+R+hlygq-E)cz4K8tM*p zZ{(gszx~yF*7U6}OxT^;^f=>VG`F&OqQ`QNOPtR8-st}yY!EOO{MOg7PTVWUnE`$n zYrE?l8;_U#P;#mGkXIf5XmFAl;C3U9x(oL48-JJS(`25ARs^aVd54osUGcF|jrhh0 z<4}Y8naJMXf%8mG*&Yho5iKXfpr3Ufd17v2t`)v>2L5f|g2lSOD1KpP)^v#!M=l?e zxH|ous}Unth26xj>x#QJF#3b(xd8uz`14Dk2y%s-@gLM$`42ln%Qdkp+GYCM)EfH+ zh5o(&z3E9T#lIGxll!^QeL(h^^10Qu^_lF=VV&@6mmx-L)lcRNvq!Hgyj9{me!fS> z_U!abaHlT^2P5T>@`Ij1(dXnNon5r^g>P~#?+URI?W3x-@=@owHdgvJ{ivDO_EEWB z@dL^T_({QPSPxGQD=oL%T-68BALsSkqU8i=pZk}5 z=RfhC3lhD<%YzGAjmCRX5+nC+k(qhehZdf-(fhsqo}TYKHl8m$X3eM{_)DUfuzPIt zTqVe})<5IZ;|(S}A!B8%f6C&M9g#=Sx_xJSs?m)l@IX?p(q7afrqkbfWTI~NAe18i zo`TfhAKSU!)$uVB%fl{L|D3K;xhJvXjbg`n*4<+}NBEFLU)adV&VF?3#sd)LMmWABH2H+!xJ!1v?KQ)S~?I$uU# ziqFP(QEPRk{jxT`9-JL4J`XW@&L5|b!Mj$4iapu_`ahlGPKH~o){Z_2bJL8GwQM}#S^RBG{t>}K@mhG_2KZ(w zCROVSr%z9Qr>$G459S!GZ)9lkf&N7+OHGB6$+z+>Xj7;+2BocSt;<>+I6AgG%*Q48 zRY1pRo=2^fJY3?xA~@kEc;-p@m!Rtu*1;T*{w>ynDO>L$CbIdsCNL)I97n5^tv}C( z_z&MhIp3F7KK4*p;K==l=+e({FZ|Twa=x6wy(0gbaOkm4dq`+!6Tjx#9NEIuOu@Pl zZlXTZ=1O2(3;dq6hrMM1FI8G`@_p%?3{Oma$C>1AD$Z<9oz^AQy3$=v#@WXpffW7pvS5 z)}0a<^(!e`Q^EJua;4Td$D^DSd!Myl+8TZ--$T9qx5D2{O>ZN5WOy$0jcX&zwRwUc*fpg(qyA0>s=x-DsU<2%9x3W*t9X`W5!8?X~ z>dDZ?&Ubs9SFY}bTI2b9AWMb+(Rw45IZpQNSe(~qSv50=cDdf0D>BL0;jp~ryC4@d zp9lZr?MthF)Rv3g!FkmLJ5lqgW=T&)ow<%Nn_Jl&-*Hh& z>>cr+hG@LhMmq4$h%xH#InOy??iX<+)@A8^TadOh+D2waLT=SPQfsBpuLozK*2zON zLlHYOXYq5hTI2J(_BE|ctu!|AiQFUdUi_^CsPoa!uqCv;SKGX8CQsCaT!!Sn5lgPA?H}**@$#IiW}7wqH~E_& z+sgLs1-3vOV?X3=RodF(uidYWZ@kcbQsN`V1xJD}QRj480IAZk$lUg0ea>qmUy#Po{)w3aI*tb4j@&7Pt%xyuil0nB>VecEso7u-;vMw$^IeFy@O*Vn zXAOA#s6(hv{*}l-)@F`1eO|0fypZyYy2O3%K2s}8oNWaDPF=A+T5tGI?!lhW|9KF5 zqSh+59qtZy55wmHn?e2um^~!FpS~|@t@eL-!cV>e&#(6fO#S8_Z9{#vmP7W@>w4Gj z@xR5^aL-p~HzSTvxItJE3Red0lv*pj@j&`9sZHWu?RIV7>)7}y6O*n>+Zb?fxK`Os ze11*N&Q&}YULT*QGwkUfQ17ard0}94dG~-TUf;WiGY^~kuBNQ5rJS0&SoAHQe@I~K zafGbU!pTg!NIq>75Cnwe`D{3U+qe!od2Ok((8JfkFdd>=}74IMmLB@+`ty z$o8ZJ*VBnvJBxg}_n5(sYJ%5`T4#dGSMDL`x;I_8vuK0PN${3%P9;1Ir}9YTM1z-%AGkjKu=MBRR}s(NX=HL$;R1u@ zvPVPv!;Ss`^PD}ST}oHOF0l6R*Elc6o3-IU;q7PsnlmMDE&siTd%R$SBUkrxZbwd^ z_S%8|zbkzgCJrfIORbd*Ggqs1xLS)2Z@$!f*!1mk9-qcY)w;r2eP3s%WmKu+7sN#5 z-qGnoJkS^Ad1+g$*2)%-i^fGd201;^SID{r>X2&u?)GA{ z=oZReO|S&MqOw6Xk*#f;nwf4e^ZUR*sWE{rk*yKEFu~_JIvgG99PTR_n|mU62hW|p z$6JxDH@LyKd>!BCRh{0C@bQAeFtKq%1!KHOY%BMQc#f8(-@&G9j;2AWLB_9W$~H+K zG<$+D&rbBiLg5y3}`}PPh zy4Cr=<~47|fnbfqPy_M4eTqBHT*YNYr4uL{*h7PdbM}PBa(6o0%;%@L*BZRVPg#uO zm5k+9nvA(Q+CTZmzghC6;C!fN|9E%o`K_3Bdq`f#MBSYpdFyNa2?(zCd*4WKxsNLR zVCEP$tR9OKvZ&h$32!CpnJ zW7Qh{2yo7NxT+qH7}SNH^;bFfQ|Z9j&eC9ssgwVpVE17|#?HsA3a^kmayjnE3~*s- zeRvA)BhMN?h1$qzh^ z*{@8TqSi_`4v#IS@tWJ&K9dv|ifn-f8Y>S41{ipMO!bbJaQ1 zQ|l1+gld1Rm2Zc+I%-LDnw-jcGOu`(2E2*XFzb+N5KIszm zGI@<@xjE%$gC0xFnPMNh#?Wr??}opm@QPj;J5!Idag0qSSs%V^a#9Z#*GgUw4*~sS@!rX~zm{=quX<#7 zmh3-c>P9~@vf7Y-O=_zcC(?J)dS0!?KleTeo{eZjSqIyuqK(P1Hn>NLz32cxWUy~* zuJ$DAPlf{Tq73gkwZo;uio;CJ_Sx>)%1;J|OkMVJIg4N8EUIILanYA}sc5;pmIt;^ zuqw2(7`7s3JqU8X39(`OoXywoPVmz<`uCgs<84LTU)kv2XmGrLhnwNk!j8bnQ)@MU zgdF(v0k{+O9yyMb4D@jCX`yk3u|+#Gs8`0u6kiuCFC}Z#wO+kEy4?6tYE2!|!8w>Z zD0i7X7iz6=gI>kn;wMuE?u_P{y3mi^7tMXy2l>>v=m=Nw8*}E`5B|A^vui?Tj^Qdi z=%FecZ-t|CV%O$3x4P#z+TOtqnwqiDf7Mrb@BZe`3;%HW?&OPzqS*LFTcRx{j_wgz zzq%G&E7}+8SHYR8itjygmkU1pJofw|f1Tv(iQA;nZ>8_f?pC{C%hYe}3)y=De-$`z z+t_j&9#ydUm%8k^;=i4P*gV32TBlWcwr=5Y;IZ0v^a>s}_T|~U<)AM4e-N2$fK1l- zHs43?%InKAu*_FHX|x^8PqDYP88eJ_f^$H>@1wa#4c2`_xp$tQZ$fppw#6;V`Fi53 zN4K^%ZeUK?sk0#4*XC@lpC~>+FZjK0q~0*`$Xms?OfKNER5|Yq zAG>Q|t@IHSZ(o_Pryn_ug1I^H7KdcNHkfK3aER%BBaWo(Z0B2ENWWk>E653~&#P@~ z%i%COJ`#3Q)rPS~NT172WPbEMG)BWs&;Bva3o-+UdSJ2ph~zq{hc~Am6ATcrhqEKS z1K&xTGNZg^Y_h3&YRdLcRmZB|hc#W1yHC#adz@+i@(gi)|CDH&k%5iwbc31KM86lT z06$e(<=OhlPMGJ&cjx{bTCl$8l;}y}`rtV(4_-FD$GohKFQ%rZn*3?Yyl;B{iStat zchVndo0!!#&>Lv@YCiElF*OX^i~4QommWx z-#8z-LicHoj{hq6h5jVib_@>LJF;``I%MqZttFwI4VTZfR5c8cr8PNQ-`I$m2pXT< zk+!{NH@Y_(3^~S3CB}(uaQF9P?uo|Sz@I7pKlz;w2g|tDnXKE?auQ^6hKqyT(Heu@ zP_*-{rhBJ}-7KP>WKYV*`?K@2&HR^z!K=n+UKm)e={>1EWqBZnmGzfUH7K@^HDkM7 z%LiEUZT;#N=V`OgtNd-IKjKC3+3M$?m_6ClT5N5#)zo}G8Fn#^sc$F?Nm;)CIj@;yJ}d-kTs;O;P=xW9Q!-tNQtaD}PoKN*++l27HfxdFDI5#rw|A%{H8h zCwu+GZ>P;|pKEVwc-DfKTl*Ug?q3uR0R4F$a{4-MeKv3BJ`79L@b@aJzLJyhTlq|= z?hgF+S>Q0CY%u4zuCU7ViTuZX&&b1?oSmz9N37oQZp2N`ChAn1@-}{CKatkeCxcsq zckNUN?wn#Mf9Jhe<|xia>Z{e!>T*AY;-%L!I3@r`;+_-BnicI4+?dZvu0I{eb;$fu z_MbZBgFNR5D82M$t8Ioep*|7M4$TcUHgQE>^~XVOomA_za56Afx;(PBxEB1nIzBxk ze}=igRi4dju)kQxvonh~2{z8>nShv@w)iqQI^E-bCf+%-X!D_U*~M~a7a>;d5?$9) z<56|l&&6h~hb*xdej?tBz3}~u17!~>8=NV|edZpjwes11AN}6=LZxz#z%!>*x0r$2 z20qVp-0N3^_a*jc?xWGq%Y8>t26T?)SZm0QGxhE5bH9=2tiyAjoIg>1m-}{gZa?&x zlAm5tFOj9`)x;Y=HCW1n#hC^-WACKKsL}r@I*`56#Ds}W@qU$jJ2URE#BA}&xL@>> zug9LKwbDP^1Dh*3=vlsKXX;HI-JHx^bH5saIgG=#YyH) zbtoKH(0lSh{sS|=AaZ@t=SV=I4&2Ven&;2MUePyO->lYx8{@92yFi?3LYe>PddOiK zxxZF8BP^ZA5}4izgBmn{B=`#A&O!#Z${(UA*L>-M_BBFX;_gfFMomCk2xes-|l ztv5OSgN3Z=yJ?lOw&N7n^6EU{{n6AZ-Bad8xf{>+W8t81P}476hnidN8~ynu&Nzb) z_YeA;x~baeHjyRj@J9dBK=0>)P~m&@bDjz;|9`5GGWn6pob}U~H=K*#BEIw*YIXR# zJl}<`s*~a0_h+tzpGNtd-#i0&R5d^)V7OR0e@*8^=7)+OhMbnwvBf9<;;fK3j{8|(7u@4jbus7T*cZ$A& zTB|*Lz_T{-rQ$6{Z;#Je8`>^DUV8i)=XQ!MKVB*RET(@#ysqS1zNV{V%i}r+GY$qo zPRM82KG#Jsx*GUD1Hh5R{io0HKvB)vJQVdxtmV*haz1u}GC(`hJM%|VWBgam;LDUxHQZ&~v5;;SH;;M|d0gt=OZL+0DyzjEIx1CeXF!dW%(GsTv+usg-=pfQagH@X7b64EvA9!}P6m8OFJ=ECeL(afk8XXm_>HtT#7#BeoKg4yd!{xTz4Unj z!x->+o?TP^2jeFklRL)59n8P5){A({qHM|Z7f(Wbs{8mlWNf`9Yg2Vht=2dr#MJ$x z{^nfz7p)HL1z$zy%T^Ui#{WE6Xp;LyyEELivjSPeEItfmJ91Aj`^Fk4jg^7f+1SL| zM2*V+%>E2xTiS>ove zV{94woweO(9aKI3E$g6Gr&pVN^aNLN^(U^ zYp%upM#rPXU&VHMPluL&lC`qhPR(#<7%VQI$!9d)J~S9Ad`biGk4xU^l2c&42kJ{r z&A|0}8-q*>>RK`PdRsuw7WMqAAwS^FHnoDWADeiG_{k;s{1>oI>=!8Kn|@YnT2`m} zUhw3wuI3;=2_#t z;Z#=4(vA<0E!KB$c(0k4y4GJS`%sO~9PX+bMHmfW zo9CNY@325|Q!tL`2z{mWvsc{%@1=2)uM7W?J4<`L+npf#+;OTA->rupQ+8?v_=Wgy z`8^w3ZIpQ*^vBd%*}JEUr<-%>67`V$2z}AYoaM)unzA*eeTsd`&(pcOU&V_iAG$oq zncBto+`R^)`?A%St#n;VQ@Saw^>eG#3+CUBjVw3Cj?BB_JG}$n>7CH#@}7&HGde%# zSYN9FRT|nCea?HX%w69S^DHf{-Z%YQvHa~K1Jt+cvev$ji+&Q$Okx!MD*hi+*B)rq zl>hhbarWNl>~qdO`|MJ>y0^T#Aw?cBa-|27M@2F*-88~n1tIL3e zt8K8gh5OAuk42n8>v8r(Ps zCHgzIIW~XyM)Zc%5>r-;F53B7CjqNppEKrq8`-iewsuIzu%oF3-BH*fGK#k4-nMpj z>S4}G6A!WvstO=1St<m+w%HLOOB_BR>D@>e$y+t}k@kJ?4wFB?I zJ=|`5d13|7mSauAs*Lrmre^=FV$0y`OM$t~_}fVAZNF=Mu?oLZ`P%SPHl%h7&3_F& zvJ+T;djCx&98om?prz36LT%wH?L6y1F<<1Kd!=Y~d(Erf%k*T$M z_t(9nCAZ6dpBY6v!|TY{<~zy}ht%C@-s7u@+S#uR|!@^;v=eIxRbCG6fm)1#KE_7~`T#22TI|cmC=g_w7 zn7}@rHu1OKH%_s@7*m)y}3Pdj#Mx761Bmr|EP8+&f{K7$RFFXmDIqhy_0tG%@pTEr${ z%tx(N>}zOjZJ6@hH=?6=gNA`6W$ya=@cM8xo{25Av_}m#>8&GdHpVFQS&fPJi+@49 z=zhU!!ARu(?P>WW5ma zuNbR&K4t6t>k~ZtdFFHDUw3b9V>k`|9}VWu*u1TQ>E+f+ZLQFDQRUO$gdT4$+#vqu zAg5JuV*W&fg~bj8?u~rigqggI)!@H24|$eWdGFfJDbM{=?1%SpZjYk&fI6D?;i%w% z@EV^pIDFsewLwK2OJR?#*6GA5C*86)=at|+u|qb3mRR?tb82c$KWjRA_iVpLU3jC! z${1^XKY6Hkb)%dpZ0%zz_3&>p^{ zI9%C0p!3^2+u!lm;$MxQzQFASzEClNVXmqxCTBGGY0+Q2i&f}`=9$x$I4QRLevyBX znU6UjJ;21x2DyXW>+yZchb@Rzl21RzGvCO*Ve+2aP*ca6G~VMwMKzDlaVlZM+dKtp zdfVbV5I@d^iJ81*Qv0g@HgxeHzJtTS{9GIB9+4ku>M{H>i;tQLY%kjvfyLJ7>Gd=* z(wCf>o;BJ@Xd|I@Mmn#kId|4S>Z zvtQx!MX}va-{PxM*G)P+D~~B~_*>?iD!fY!Uv!Ty5gjoc_fiwtxGN>0-op!pcE)b3 zOW$nzE7#>M*2k{c;?Gp&stnyO0FJ1(Io*Qkhw`2PK9b(gi{XpL_o>a=J@m;boMZ=Y z{E7F8$Q;`0lOS(3Z?4SW+Jp$eMamb)OW4c>aMT!uJp9ut=8BxGF%JX z&&*xSF4`F}oI5YS1-)>1e0a>f6?H`Cy!Go3OCM%pT#MsDxJNaAhdC+U9rGy_UfTG! zebd9l_8y9J_`K~p=_}{Cy^wps^gK@X|4(?c1vnwchy6tt(AVo$s%<+CI<$NAmGC?C zUFH7teuLxmwrh3zWf@yrJI1yB7Zu?)*~3=sfju2s_p$GlJWf4zc%iMCqrC*PlgN+U z!^fpMcIHMq2Nw5!O}NHjL$%4-oX-5B%5yEio*Oa^#s{wk?u~vXaD5@uR9zzbfB8B6 zodqTAS=O$!YS*frj-Ss9t$dpl-xBlQNs|jwcVHHh;#1zczH7Axy@ALY{2ksHd>^4` z)DPQwTGrB#7h2A&Y(-owbtbc%YolF~H{tg;_-Y;dqhtyS*c+UC*Djs^*@QLbK_ zvlty$r7h0MdhbvZ=XouBE!6hjqwy+z_HgB=cdd9X_ZZFlkaY6t7HP43E&@ctz^R2 zz>d?oq+{~O>X5_I`fLq;>k>mPBA$n7x@S+yOu;t zjP0S;O6CxIT*q3$vl71@ihYjCjWTj|O7<3!SM=GZ;h)wEOW_yOp8q41+{wXT#b#TH zJj)+)e=wNj&xclSABQ+6R394olI{#lE{kA5qqqOEVk<2a4+IZ zYX1$stvx<0krU}1949d%+WcPxJ48kef?wb0FBkdt9OT>IQ-3%5dTw^E$<1BuoiBGs zJN)yu51ZNO`w-XFd)}N;m>8eJK38i+pVvc5>bqX=*}2K1f#I+3s3No&`oDX8cYAtqStCgq=(mePl^w;x_ zSo^xlIZt?ye9byIuS6jVmdO}$vs_mjZr8ye=5XUIb{X=Bq+u-W~nE@G*&o8xhF7bYDa)=8Zn?D`v z-DEyz42|~!EH%tgQvUvX_}xa>W6E~w2|L8ndGAbblXFpPWqYvS~M^c{&kqtWNba*go~nLk{1OI%RWayXp0KK4*J*h*hZVD79AnxWlnE z!?n&&#H1C1rip<-Y3ad#bsmrE5m@WZ~6OubY+g1mij%OKq^y``tnF`uuZY z&e)|x;~V7r#I>88{k8BfF>@Zt{8i|17;;;)i|xfXX$N}S0=#J2oWH{wbJ&H3DIa)- zy-R2Kgg-|3t_H-!T0WhNneBE(Y)$!4yL~(RpnK~EvGG`oI4NE$`kFDB-({AnJwO*s ziYLVv^K8LK>yV@8z0h}CTd$0{E zb4Y%O#IGFO`=1KK!FLL`v%x>i*gTA-lcyL)1KGGyOZ%Gk?~t6>|q#?x{89UZu=2*SS=FuJsywmnLv;@ackfK|3v< zXB2I3b#3-uiKEVioZpb>X{`#@nZC|OzbLea#0$C#ZQtdG(93$ZSLf)1P|HBtD*8;0 za*irtHMEAEla|_b>Yd1)BD8liXz!lerhr`axaYS*QM%AeRvu%c70Y+G*i|3 zg2o!%E6wM>imx{|i6F7&D~X%a2k)pd9E+KE%#12Gu;2moM&~hT>M!gLCr)@0pANY z{}KPl>bZ^89&<6*gNB)>TNc<{?PK}J^5To(-D|U++#U5=OWT&V)U!={kV%s@bRVj- zSX;vHQ(v&gQs>u}=9U_Jtbh0zYL7!_0_>Rv|6-9L7eQ{^kjRzq%CGa; znZGzvdW{u+(XIZirq0I+UX^$qWy|2e+IWX%EM^XS^EJ(|zh3)C?`3Q*W@Ay~FjRZ{ zPCT6!aLC%x@9mq-2v*t(6f8>4` zV{ghU`-HsE?6xvJu!p%_rJjUx=JxP*!^<6GJ8PqttLR7BpFaw3qLv5qaUK(&i1hHA z+(y&8JvN_+jYMjO@?_X8=sy*VP3B$?L0vRu8f!@x7MGWJ(5qzZOZSZuuSxl9t(~da z+a-?8ckzLBtmWI@1isBBNYU!gJNZW_IfnNdR6JkoOv+x`&zdHe1Wpf!CCtoszOS**8!ZB(^Jz`^g1cPkS&?lYexfo6=d3nIlsp zQ<_$HI!aFRY-_W2R_shP(rfvDeAr9qiZfv>qg^p)>y2lsBn|{5>9V0$b z4SXWt28-T#4aCuush8XbZT{M9JE5N#`}s2b(!?ch^K7l)wgl$hJ^A0{wfrY`3Tu5w ztmXdI-I1>`YeU7-Ay1gs>xAzxmhzTYhu>27KHDwG49XCs-aElB2R!9}H9^MiOQA9s z-={CRBKXAEoSe&Ci_d9m)jKNI^anh@(SJ_l?X!@#RnbHP5-NbNevp30pZiHRhJ;F3m>}LY@GaCNj(cByMLw-C1Yw}|& z8h=<*b}e)ki;kuYnUb0>=TEvymvVybz;|`%XV+&{Tj*|ZMY<*Ww&un2V$HJ?a-Ry{ zF>Y`xF!A(z^^7guvL2Otpzo&EO24-+YhR{))!T~}Q>Ba3#b6U105%k#Nxf5xxxmz$ zw6UKKm#eyQ-1U(BP~ipUyD=A4=#B4nF!Y3HY5)I}jzz}u-MM5 zw(zsyXQsyN{lMb1+>*XkV*bM*>w-d=#44Fbh+G@bnHR2*bK^O`l>4*kp}5Ai`P1^; z(;{d7fIlWyjHUs#Ry5ED^)vjOHo#Z;A;uoqSolEhj(WK&fj!bc>|d%C+25kp%#W<8 ztcfgsR}(S=$_8+pt{H244=S=x3TFu4P_5PPHu_bDzbeA4*mwc#$=a;NV0;<%LcCx4 zbd>*Ehkl28R82FFCVaFvGRp6MOX4}!FZ;ah2ST@aQPjpCklJ9%`QzM+&?Bkp98x8l zHiN%SyUn1`GN%qap3b*TX&HE5@xBt4vIo8J5T2>(7Mjqttl#}z?_E<@JQy)mO`jj7 zJ~IAb-?YWpp^vZg9cv4AZt2~?8YLaJ0Szp5mzo?X=4D`Zl8SX4Rq7+I0*$G)I;;0G z?-_gS$59rc~=ELIp>;{QThC;wIc2Eoo^-_6Ov z$>27n7t~rkXG!Q7-Q8Ruu7dKBN24#5Gc}e%j;XbZi7g3jU0(xmEXfy)iSe+BDYK@*^By7IOer0UzVV=c@9GJkJrf$6$&!lc$nN#?^ z)JdbQREqFS-m{B zRdULt;l)LCKg(|sN3pljzrf-UeMCAOoS4l~1q>)1-5Ac>GlG_*tm`S9II6w5Hx)4ZIf{2P3vE_d{%3 zwN^U4K3{L*1{VXvQ|s0tPCJ9kIxRI#FrsP4hNZg4b~wXXi5gwvW@|n2FYjOG9Un@U zi_W5)X%)5#HGPiF-)`*5)~VJ;zufEn+vMObFZ2}J>jB^S@!WsKr`Q9US>Qfp{&sQv zx_tf`KA$1I@RbtJS8Em9AMK7dI`xHiFfG(?wjyC&$tW@9oJDmA%qwh^0%HsIX=A6GTd=Fbf#onI@ zro$gmx#soWa`6#JtL3@&at`fq4rP9sseySCxEY$3BFFY+VDh)v9?-wRH)(4_ZgVWQ z?R&Ys=&>qu-U0he%gz@aLHx2NcsW{kuR@Oibp-8=g^sP&-|oI8wIb|&>kfNW+X-Lg zI~bc`uK%p~R_qyMuch{X*X8@k-gy3;N3V6$V)Uiz=M0uyo6>QO#YR)#sMhNIyGMh> zk6?e$!1O><3xt%N;a}pFX_Si6J&49@3%+H zpFObj9m;dA=p!geXQwk-;#%DQY}dxwmikLg>}v}$tNOia3)a4EjGq#n!W=r!MAy&s zNcS>vr>oHKta*@g$GGQm{H|JqK9NV5mgsluP+*)*oz(_RP~mJ5>Y62?wNY7iW@1G>Bkj}ea<4Udze@V|RXibz z?F>!Mpd@V{KrG^5;b6($Mtn8AQ|w#TBrtx(xRA)1vVz2-VVec}z=2vP_JQu^y_}AF zQESD&(~H9mHY4j)d4`n9YOQ{^v1oB84#_C|ic9dF@?2MurClIPD?*F;a~yE>^?+3SIln}&G-YoAehv9u%kZwiCertU zS>9rYa86T$Z*gev3Tveo`(9jXg=gn(5W`v9-b+H;6MAfPtifI1<|KXgwx;&rIP~c8 zz3`v+ZK>iIC zx|+qjxwyMz^Rq{OlHu{O8I6bLcs0@Ukl{++{x$zs6PKRkO%?l)^e{5Ea(;WM&ylwJ z4o6`ZaBpM1(IP)7w+93kOL=&1xQQQL;$0$l$DBp8qjHGk5w%u+(DDB9riP(=R_V%K zh|m1sH_16Lm&bZeO;>8I=!#gTwDA}>V;zOQm(SZ;+}bEEO5YIqZg%FHQvGnX^GpAi z1`qin-`1}#Dn2gp0s4=ting9`UTE|3{W2+o1JmGNB)%}?HuHdotb5r1nYDPik9vuS6fjj)Jw{st<#XbZlqq*?`bp zsN6mM> z9C^KYaeE_6dqg*i{q}2|E&4k|x03djMRN@%Oz4M(AL|k`>Ap#K6&+0XYo5P0Y|aH?-Y!|-YBaZ zZR`3>W>&^WW*5C-$VWPx?qa@Koqc@;h}a z>Ax~=5<8jarq+--Fm_i27N3E=`P%nf?u^AbVZ~8rs_^YhpWfgY?dvVg*_z&(Xsh@R)E%q` zqkN`bP-|tQt_c1jHZc3eYO`I$cdLZ&_HgcDGs}tf##%SM8NX@zgV;Z)ee=(J)zd*6 zZ;PX1?fteVm)cg%hn+Spnzyik0hsBO+o;rpfzqy~6s z%=a-Lbg6G=V?6-ueZ7Z5J4K%z+HvmKnPo$J{7g@aV$(#%6fXf6&Y*`7Ss`WW~v_)sIb`4x1k` z8S9DB#Hc6Ug_!x3@z4_PZcpzrSM@MbU(`EW4Mx!5=t{|_^UN`u+{C!{$!u07PyPWM z1N|dlcAh)mp{jmxLCdvtw-K^PJe8Nf*BhGXKi{U*K8{ zF~+HM%tWn~&%PqCGnj5D>*Z?Qw9A<;zC7Ow|1q(Vh;za`_4)Wt z%a&Qr=G5oFsHaTB49;vp;<2Q+x!LnXzq3YVR$@-~$IkP@%lIkpI@i_;c24vaPK>S> zIm!K;U${hO?ajw}W^|wU{(R;IsS8qK=l_TrC%=<<<``#;k;x15U6tH`&yLum(Q!># z`s^W)rV!T(e`o5A2gtkwB{Tb`zYyK`IS6hq#YL-L&m@ty9` zY-1xe`Zh=Kz4yK88|s>|^W7$glZ`$31LBQZ77^D}%a%&SE=Ws^1=S|%TBj838Ge$; zkM}H|ApQ&OfqT7!LZ3}I!$$vY;fufH-HBC8IYXaCt(7g&Bb*{W7wNOX-)iXO{z%2L z=%4O&E5**F%-QDHI{$6X2ZopHojb(_Bj)EFz>3lKK;QH(@!#2x|8nN#jIO08ew3Dz z6BD>(5Bdu8b`j22trd@4m$iQMeMO5QbAI6h$;D8|t@rHgj`YU2{H~#YLH#s8yTmt9{Zg8taWM)eg;a zj)`pzTY2tt;p@+!gRb+=6d8-W($H$uZ;-ZWuRa{NGj&AsP+z2V%KF5NoATTY;os?? zF=B1$b5Lt_4uKn#;ws%LYr-bEQ`%Z%^AQm|U!0GA9MP@ly_#csul|O)?b?6;r}t0cN7`d*t$2AAd=2fhJeRh8 z)0`Vl8m3;RAED!BobRkL9|ouGIs4gW<8F}T~EMzdt~wY z8bPaC&h#mcj1pC)O^&XQg=_@Q z4|&0HraSDB)Ox&iWM`@_aQlm`&htSiy1@5sjlWpyD?5sMZBOon*a?hNr$g`zPWd|cTB(MFT|qp=%;DfD6+4^XN;lb7+sf5q@C& z;=Tpzmo>&#-qxk-OfTwEced~gj^Fvx`_j|;WnsqVg-7I+-oFBTs@6*H?@G+>`6(Sq zJcQ@`Tw;dx=)$k$Jg>ufo&y{xDWzEer{le@aj!A9M|tjT$tV6D z{z4DTN#Wl@rUh*iKGdp=?NM#;Ul4lb>mxF|_cWUZ1 zQ(OCBJk;=eO<1Gqj-X)FTFLWu`Eh0@`}*8Fg5gOU<7M<*>z+8;=Tos~%ENOo_e9g) ztEJdG{ZnFE>N97*r|ui-n{F1{;~;$b5uvT6&5 z)3IFz($dtqm96##6HVTsJ8)*y-+Gl!0!Qw%l5T_E{c{_TmF?W^qv&VOO7hO=NEi9>CtwON^8X=1~(xGhxvo3U+;7cxx z-jP0E@)vXKTAtKqEw=XSIm;u&sL}Lrrem>*SZhQ%MmtKaL5C=aZv^JEmWOJs z+iS28npQt^PrL^Z8+Z=m@k>b?jE_a`--J&|&*)Pyc0&Jj|MW%N zGvYJb92;+G7mwJCuaj?O`UY~kj`qO#WtUcCtNTYwY=(2u@J1q&jo991`*go|j zVy)NI#(WMze<6`vm?3{gAuT8C$cV~`o2zv9WH>+`X72%5_hyMaOyes>)#0MB#rY)^)Y_(Q4HfLGt zb6b)4#ZI zvDETaVxOGvd_DHe`OfIU5x>B}8*ISmS~vZaKE(8xFvh5DX0=xQ-lbHNb~w&B4+8-o}Ag@2khZip>r=KHR#Lx|ko!uu!U zZy5v8wXABbWZD(s6=tsPy`Jg=EyISIGB2SPNb%-@tj$Z#iSLc+7f>$~SDAOg7>in~ zyI5a%)6{mRg43nO0Kr1g@VBy`eb~>-sA1DJFv}h5yVZMliLdu_+;0W;a~5clc__}< z8iC*PV7Kgv&jQb?n07^YQ07QBVSp&C7Gp!M2tGG)o*SK8O`r8D$6~3iay(;)R~K#E z=ChQVjZ69YaPA)I5vDw>cl3;DoTq2&1BaDl0`nTzgx6pXw56L`)Eakv6@0z$K7(ib zPC?B|W-fbGW^IP~BZ+-wmy0}k4m3a8Ef=}e33tIdf30h3omIv@fle3NNWliaIaGD0 zZ6F(2cc)`(hm~-%D_{qzwVYcp-M2V<{o;PH*2~Xh_ABp{J;ibEQ=xOx-tD1^rBmL{ zj3$}<>E!HWv2AF#Y=e)cW6N`Lb4;G4L)5|Ga1tw9(;?>H$vd(>mibowj`hGj=5t7g z#PHN|@7UmaQx9`TQOzBoZM+P15u^u@p+iiVUOZ3eHTJ8@yWl&Vr%V~keV!VhYVtmB zx^J3VsSRb;Pj8HM{H+rCO|Dfv{NnfrBhxnfo6XFK?TOj(wAr)|J2D<YVDF8i+Gt&YJm`b|rrAj#WvLCN zT0yMSoWY@D^@o<(nTG5~*0$&gsS}J%J}UpN>Ek%svoZg{iFn$kkhNq={yYn83N0(H z2}X;pPM@7UnEHN~x{Jl9AU!N9s{A{@Lkt|vk7})CZyVUXJVV+NujFhTZ>wkXBQuH? z%c6(WS*iL@wN`n|@tN_azM6B9xF7OJk8}@%b^NdVzYIS%VIs7;JI1C?7G7h_b6K?4 zCC_p{?Xw$7SiaSWrP%tD!IAaX#uYCx{%kw<5W^Q$5%sL9k^3UpB6%hH9m`Tr8eeR? zyI$%L$S)mp9ZfA0XLr)xraeYGhczm+bDr}oc1PEuoiE?uKPh(XQhevi%$4RGkRvm` z-b&2-;By)wOlJd^o;KmMA7_D9Z4D}Cb8C5iZSFc%uY#EH^P$C4osfGOvYO|E8A8Eq z$R)+^qw-gZUB|dR>!NAH{0?$>fon0}+NbQ?z{Yru!QeeNf3AsF&`+ct!hS%tR_CxJ zwDU5~DA+!@27iLk9`oQ|mF8ydfxJ>{C1VTi4v|9DKU)!66VirtD@-kumu5uJE5 zWb7n=vWYpb_d1FFN!iQZQtb~ul6oYid1`Fl(&zYss)xA@a-K0IZR-vz)C!%@CK;8t zGeH^W_Af3(idBmv3Z{v`H$sZNGDTsQ>8AK^0Noim=V;}3fcDtW zNS|&3Z0SX@o%vEzP<_EIxa+=Y+f&B+AMJ;3kB=(F277u-LR;rkp0oX@#GIK{diP0* zTI=PxHPXL^`wD0WPUrq%2R8V#agQNv5Y~YGU@(oV0*ebx+R%FE!VEFHD7QDE4oBm6 zO@~co>-RQ9|1dEwx8NEKWc2I{?Oh0?c`QMcW3=}c$E@A0c76{Ta+AzV zQM~*}3A^S=II+#%yAn5`uDL5US1>&$K<2Lq>}(6p@>4wMRjM`R$$>5JIh*7hs3YEX zcbmHXLc4QHG*j*LDI4Ba^G-8xzqM`!u94hDWtkJ4l0U`tYYamlqW(@Fr%x#tMobtR z<9(~RtTYn`gw-x5v#XdZ>=*Pin5B_BS7L+rz$V${j5T(`B;VSE#C*{DRIQah9qwDK z$UmTellKcV7WRy#4W7BueV)_WZEa#iebbjqo@*q|c4@TK_$jw1=BO@9Ei-*0jQgpx z?N%8S15?AV*2;e*7OSS2>#`Gp>4DD?KVK2p8mg<^t4&;#-FKv6(!gHl=Ykc`6YDb_ znrB#0xXa+q>yNxfv zIvl;vPC@t9`ulB5b9h@ohZW&cvGaci`>;7~7TTl#tJccr+MW7FViafd%(Hv4>YUkM zaI)O#Nx0K`r%K`g&-LlnDk$1q?Q7Dzr+OzJh5suy73_b+(}b@lfv>O1slH3{)Q5@r znm6kbwLRx%2Z-G6kBjM> zo+#@&tmy;lcjRnkO%LSd>+yWvn|7`v7;TZ3&npXfEB?n1}7h*PBb8go&F z=GTMf+h=VqjI~($y?Vpnp|4Hf^V*!X!FIvl*M4z~7(Q(t&N@Fcdp<^NR6A$EN4N^u z{yY=X0}%9tetLs`m`9+U;~*yUVsVj)JF)(O@5Q=;k-$;sGe==>qw+7u-SK%P{-S-# z_JYmG&oFV|^_am;`}`gF>Cfh$HSrv^R{S^zu?y11eTZGCwUVo~&RN2Dv~x~CobY`7 z7G?W7#2mE!U!RD#u#Z^NRafAvXgjbxXR-Z13O_P=%-ZZV5|bPUJ|d=y{@Y!MpYv}i zqlmz+d4EvR#v<68ul?EU!(=R?U~;1i0-MYJL(0y5e!^FHU(`oGrEP8wJ?3(@XE1hD z>>2|sjEyhwb3QAm))Ih!}EOa08#{8Ag$ndehaDW39x({;JvIPuI^1h&5P z7UvcdPn+bQEj7%H;WVO8ihCY}yO^24?`5rswzXbKt2!k#NFmSoC)gVyW;wE7Ue&)r zFhdTXDRQ_k5>X+~n0z5~p6(6w= zm+`tL$gVATW~uHdvm~^!Zt6|RQ{XN}gnR|Ef=eQ;|4ZW6^&OdpEU^kA@8 z&WASP;usST@F~Qnb1-wz_{DwGKNC4~IzDgo_sDyFgZEm9Dk@#GF*vJmk14kY2+b>9 zc6ec~>G63Mzea2#`XD^F6S)SaC1WF$+rPpy)mrJeD2RXwpycq<1Xlk*_`jrW=5($r zVK#FAw6V2~r`C*NR$@A@t>eASAugrb+fhIdoJTto5VA9?n**F04=xX^}@MV^k zat*%+UrdbDyixk6>++{b{^f1Fms%^#fnmjArrxH9)5GAItF?NsUchUTyM_!LT^Mcf zA^WC_qWdD~z9@QDHI*PA!8%G z6FHiue5HyzftR<3woixgG-9~%`!6MCuI+THP2UauozXZGe5ECF|0i*PAHWwkCFaIn zm#xj7j^_}ki!;p`OCg_LmA(oYdnH%ZTAf3mz{Y207hTbPDSZFvQZG60_kY3vOs~Ny zo~>v2wAd{1EA|}KL^hs~&!`#z=0R$+Hs+HJt<5$wJ=4sTj9gpi(+T`V*}|BNpYu(u z>54@C81o?7S5<3epG?iEoYYL5f2Y9Ku0QA5-X+$V&&D~Ni95X@b+OpMjJHgR*c*s5 zfecq`<)`cqFB01iU-woy)<$Ao!EGh_e879a#A@mtEB`s$RO2}H56=@FO}%iIf0prQ z>9bENJ%_XKw2r{|==8C2U$dOfiCO9!qE5z_+>Ln$T1M3ue-c^IjE&BP@*;n+x8e`L zgW@xJLade2@-1?E3jG`p`Wfyk+0MIe^mm!~%qPx~^0#19)FyQ`eZkv9+xvEzd!>mb z-j$fyJsY!Nw61TA-!(a)N4>|yo(FAsJBxdTen=-xZJVTan*Q}MQI*Ky_G?gMoT&SH zs?-BZUto#DK2Y9Q%a+FCSE2`LC-|wC<1TpHUD$IjviiCy^LbY5`Vpb6v0NO_7idI?iQ?9`ZbPoZ~lJKBmCW_d<>jnMbCR(`r}I84nc1V@08!^7~5Fop(R@) z58brbeM0O6>S*Q%`M1nLZ^_%5XOwlA{Kd5VG=uxGIc0HCPDHLj)79fSi@#kLs@_|k z^M=$0lMCpaS9R=s_wJGHo5&?ocnZ~bKBG~#7vY=hn`%MGg@1)y~9Ji(@c-^ zD{0$*bXD%WQq6-`N&ImcJW$p7g_b180(LUMX3^%wU+cEc?GgEd$7VSlCJnw?%_UoLb zLt;Q_Ii}W-Iftv5hK}D}gt-9J(U)SMV?;KpxX{*MYoO)B7lHcD4(RbyT#J3W*|+pr zmMzQbXAX&nNZl;s>eI3+en_1@H>)s+inzze@)jHC;rLUr}x$$Xy)3t>YKLMeR0mlMaz)eqK-fVF=DO1 zmUvx1&=qGb@vNvj8vLsSYuAC_3LG92WBI=A_iY(#A{{m+dW-&%=&!Gn`Kn5X0wZ1O zDtW)P*`DGb9S>n~OX@C1^9Vd%xnJ;RWvX4Ooz7RPb(!-y<_I_XwkPiH;@u{%@oA~& z?sL4$9SNL0^z|6N7@M~}FC%j!jZSQZlhQg}trcxErooyw%Cvg)*eW@UxexvV9a{w# zJ#@Cid2Y&R3{}TFDLTo_^ugROJcse&11+`LHX80mi$YRI)6 zcuYQ!7zp>@;9p?!@^2<)B2;)5U+bi-t$&-6sxf^-pCRU^>AxPRX?#c0+)#J9(H&tF zn*04zLFJ5yvHuPtKAOi57SxKYY((O z>e%i`iM>;|UgnGz{$k9HeJI*TQ)^}0F9Gf-^$v@K{*k!wyExt|n-M2ge+<2W&Y09*id*^&8jU_%7*rZw}q;e_A z333m2L0{|7kBV(gRIQUS@;1)d`ARjBogXnWLZy#WMX}vbs9c<{tL#&dzCV(DSYl#(XDd0b?M+PP8y1TdT z-kLPbcdUslp69%9p7bfRw*0ZYefJj%YDPKuF}Njx=UJQGFZBOCWFYm3w%gGpUdpqe zZm0Nv@{W7@bi2Jg*IMWwVhr-!(r3qZZyEo(S7M(_y_I7Bya-*%+B_ZSd^w}~>&a7# zWA*$NJby)C=i=4p7Z{wb8AY4#o>j0tzr-HV&z$5m*V`@TE+ARr>(Bv;#e$1wMN}FE}%AVXHlJ= zSF>p-Z+izH8T_%n>FdS+s)gLBNX#6hoZ&f~h40Tt4v2R0WIS^xFzYnG5Fg+oe9qX& zq(oo&ZK>PLnd}E1ul|0mV{M7q?i3RPZ*n$^ZsOj)^z4k|4w3DnWX}CM@EYS1z!Vjm zVIypY5EY9`j(L@DdDb?l_f$P3<@tAk&E++FcE)t)d}ou3{331b#u-K1XYsd;lF8K3 zaS#XEK0L(RW@6EUV&YhaK&C~GKKs4+p?H zfq%<;=Y26Irq;?1`NY|y@<*WO$o)X%)juJxUP$!oJsmy+d8llR@kQN3*VB8y6gT?_ zakJHt_0e`Y_nF+&>A?L{d6NTM^6=TUPqEsyy(h1vUNODiqY}MxM`w;U@rv@C@*P08 zZC>|&Ff~OzqQ``1TYy({ehC+vfzd9h!zB++|GH=VFC+8Ib3e-Ze|X0T@=DX#5a1YV z`7p25JTrr4YkHH|9;9K;XV?3m6eW7?i@%G{#rZ&cgV&TldoSeVQ8DLFDWCfJ(CVNS zrJT!3_)|@oV5w!xGsw4UOtV8WFNz;ZyP}8Nwq&0;&PRz}kDjo9G(-rt}r)!6#4s0wx4zR7q}vwoO&=xcFIoeskdogWcN7nXG!@ zL7(Hmzy0yITc9f=_f)C%It8>x>}zc&R7ImqtfL0?z|?CK;D?USkJtIZvT;S*zh9gE zLgKNX!=~a~MV=vT$yraUi z9g>TT9X>C#b7#&0<|Jv4@~6R9m@R{Fp6fk}&oBbL=bC<=Oki}}Sxkw~#oYHUpjc`8 zS?(;C8J8$M2L7bdFK7-ft(AURi~3vouD5~KkL*v^v`SnH>cL(}PTXA_E49=0 zkdw99^My|bgHIO(7MFFlYio1|hYg0WcVfPeKC4^O7K?bUf4}eo?X+e@s`(u{dmVBL z`{hv3(j0G&V4sqn7rTqitjSygTl<~x36uMN%j+OLlJo%&k1ZD5l$5QvIjj^{yac(k zYn^LF#`5`Utz_@Wgl$|`iq$jDc1>`N;lZk4tl_&2k;)PC-cv<853zk&Y;@)FM0|KH z`Y7)#-PbGGRWe5gc7AZYV0|mORGV!rai>-GMD7b>=QKcXuE!iSMW3vnKVNu_eAG2#>tlzwL&R6A#CZ~@i1{PN z7MR;2f6;Rt8rwVF9zG?ynEp=W4i_3220G~;**rLXXC>RaAvU6VoLA#__lFi6s=;p- zdgFe|bL9q;CjdS-)4GsX>m?9Dy`%7Co&r6nwW8Z^(s!2dkR7kyxmeLE-enge zj#>`aMAm12Ao2WK$NGAWiCO1e3zo)e!rkJ>?ZWTgkAFHIbug$C+lD+iE_zaIts2nz z$kdglp85LFp7WpGKbsnfGZ0hKKHbRh=aR3Xe0aL3`Z#FQa(>4Jc=m|3$io6FL-WpK zz{}M#^Tf2R51*T{81KymWh2oCIW~K&=}~I-nmzWa5C^YA!P%pG1cio(_v*aGiJ!Izps2hq_uL)uXez7)A> z;THrZvHrE;)0<293AC?>wWZ^1#J9X2e@owIMbsen()EakoSPkHVq$+z|Jn4fskPeY zhTH}dJKd8#OJZ)+#b=h{$^EbgwN|=#40529QQSkHkh20+y~HhP8!xRd<_uOL^HZ7z zYN9v9ABVjFnfWVY@69e|g(d^&P~dfok9jZ7N3GTGK40u?dPW#yp*_Z!_MO=~v)aD> z$oa_BpPZDyxf&6Th_rn;8#O0#&RrdcwTqOKlxb?M&g3`wTSb3SSB^owD{YUfaSo}B z?W?7oum4u9)!)tww-}jL3yd25?#E@XH0w3RSCtfvbKf)ki0qlg|T^CL)8O)2gKc~hMjqH_=&MCuk)@mGpyCR z%vl4WusQW#xl`J8yJFkxT3uALco=8vn?6hKs2XQ}Xnb)S*2yr|bXOuiGt{-`!`>Dx z)2_`|_nT59^uvojx z{n1iqPLRP}?s>+~s?B~Ycd-w4+A}$eTRt^A)y$$|?-Tb3O=rtS(oV(A|F!JD+^*r--GXAr8>h0z=LY7X!4}+B=hd=ip0!OG@#bX#~+nnBzXkN z2j-Hrtf+OmNbZ1pW51h@T?~mYlv+*Z6Srb+2z3_zYcm7q#=oV0S)WtAnY(b#7rGa^ zJ@GkZ-HyT@sRN;%yfSW#yWw;GHD{5tc8m5{S#+^&yhU5aFqDD%(<)w z4R8;XW1|cIXRrdU46ZbJ(v8J`7<;&Tbc^`rlqc+I)j2!0#&6+38~r0hXB`e-tSNuJ z$VPr%m+GhQ4md?W%3c2td7^L9-sAOpeChzAt`n;x?3Zy7u^W^vdZy#7^vJ zI{Z3wmGo_KF2n1I8BY(TZ7oobw4LR;6ByTg4r9W#(K?wCMtZA72fse^p@{8h-d|R# z!&wU&eiA(e+NN5cenrm5ai%*br}i1Y__5$IRf~lLK};47o&4Fmh!*+|BSv{TgVuUqX&Surtf8Q z@eYYIFdxL&zSiBGr8OJB3)Sazj%>XR`JHt~JpTtpb}4x^FP{O+D?TN6ipJok7`+Z7XH8^dSsx&HhiZ?VMHyMgzANHvu5$fSY&#z$-P|15X3 z0(ZnYbebOOok!)q=*zUuwl;h{GPL==lhUV{_;#GT$oNfPV2-(d4(l_u9axLm;`|){ zc}FF1uxouA_m13oq9g8uzIZKuE!KZ~YUVK$8$TG{W#rX?L?6VqaGU9K9}%8m_QT#f zZHFHW?YxQIKJgip{E6II;$P2%-@&*FzfWB@F0%3D4(M&vGGSj40d9PUdVzL$NftG! zb(!5#Q$zbf^lu~6f=poI-raL2h&-gMTbErYacKwl zII1|x@Fr&wGB5T9o<9vfGWF~P*nvmIN11tfpGRK_ty14Lr&N5EI_puKt(HqqWv%U+ z^XyEt^`6BOIH6&*15G#_OGd>pQEH>i?)beS%>KNZ4GM4%p^-HF{w>IKT1Xahb)~Xkb zSbth?s?Vu|H=zFMn$*&0}EgaxQ^(ltDd{)^yW#Zy0}+lvoE8a}$9>IV6~Lr~*Qx;+_o zW`$>QX>L#S`i%%J-szN-?HBkyk#`18qtGGgnOGbb;2w#^F$(i)HSH09mFxG*x>a7` z50`um&$+?3vuuco#P2Zng?yHgjeB9qai63y;y-9RHjg+VV`vU^VxylHTf&DeG0Fd< zk)L;GY|VT+KRg~L(8Ft$l-sr3s+!w@;qYd*_-s%y~&KQP0&aKS8I9ZPrv3U5JO`qZAZB92i z!Nz#MhXecp=9$>AsX1wt$o&y#iGDP3 zmegA9=clxt=YDFYkC{c-=)WvHg;((ghqg9#2`Z+w4(g1)0G)H3o}He(wRA^g3S$H( zjrYZwP*?MF*uC{di_P2YshJKE(_Ty~Z5M<#}6=_a<^`+BZCO-BvmGN&N=p zd4*qLW-`7Kyd}99*10|JJa1xjh;zz zv%ZvfeZ`5)-t!;tsHr8+{n6axg!nt7vxpHynL})`7m7+B(SB&3S2Zovc*OV6wsdXw zA<^RxLN5I)Z+nH*TGguk&HtO>7o=!Re5M2ZP4Y-5@VHtl9^uS5z6))J9&QhJG}fT2 zmIbK=DSPk7xs*}FMeLilK4w+WHKXnGQxbE=IiFPR*>Nr_URH_=ZE8_#+A7n5vpQPx z9i;7fVMmiwTajL2@EBJ|k4Wzc<=7d8)$pg!fZ9d?>s|`$4T0t)7nhI!(_<7LGI+ z0>8}t(wsv@*jD(l4far#=`Fq|^D?P0W$0>^V`IF1Wd<&()`RU@ZS3%Fp~_tz3k6(T zP(2##dE5hEQu{c>*CHKqpK7i4`L_GE>BV@=f6UPKWx-{p-szs=Jz@(vP9@@#^GY@< za;EVd(ffSnVb0sq6GS>6pXl{_7G9(7{n_hkEHV!|+U76%r>#D1<=H$D>oIhk>YBo} z%6~_0`sKtdm?^18Ozd|_XmRH_XIcBOYF+01&6(cj#iFgjR%_h#ncZ4V^e38kXU!7n zkTpwct$2BGVwTog~kz&Y}?kzhUp!*HM2|9g>S>K!bWGbH`2 z4c8hPBb{h@tJaD(Rs{3q9k0W4wgFFA^K5PQc!@>yfZeky8?Shz zso$9IPRnXJ#(9*QCTBwnk{@X|t_ZB(v;lq`&;NJu7a9`roV}T{GRnPS&y)^fj?cv`;iLW#bR0CT!X%smF|60Y6l1Z_=Au(+4@QWv@Fy;?m6pwfs?QMPnTkGYtnvwCl>8TFjw713rb8pCfX;1V4@OnT>^qjSpUy zwKnuru(Ss^D&8V-x##5S~L{?2e*}jnJ0s99;rPKDFnnu*&dwy<_cF=GJvT)KYh) z_)|QSy>4rvVa^ais?gv$?{F>^9%sJtwRn+{Kg5rs&CLA!OyvE!f7*Dn-Ko%PiuS$- zZk4{rSF;-=K2N)JXZV%wL58o_QRF}e?7wf?=BzJphKmoyd#?blMK#Woy=;Bc4~xuS z4EcPRcNk=;+QT!6n16Zh6R~+V!-r~LRy4FU2eMJ`=eq2r_`Hp?1^XWpjWMyN2cri~ zox_Zx#opS)UzcW)KU>z+|Dz6Ro6$mYlmn1TkA@7 zZa0I7s}eJ1>f9!wfAZjDzjTHW;;$xZZ05W3&D_I^#H^zI;g6szHPdri_8Yn16z=Gz z+^-F`5^LMEOdw{Ojw`A)XbA^2#vNm7-iU*$>j66Xoy86TZ5(kR(^~Q=v=!4{*3))l zZ|@E{Px@aQ{1Zi|K!iIhvMY>zQWaY}p-s}}1;`Q$?MNNpNH!o*n z+V#$1(yKxp_d4c}=BZ$j%6;2yOlIB6pEH5c?$7#Op}LXXn$&KFxJG=eu$QvIQGMZhYRG#raeEkRK<3ddY{0~KB&b^6J0+{`Nn>$mX@Dd z)Ed07XMf9()R2^>ft&pv5dp-#~_sj%&nDK6Yxi z)Uy1qVRwZNYfFxjIvkZ>*o1m={a$m@bBw>XzvEq;4n<^$(`ft`#>06I zq_GEMD~lFo7iAg$tilLelFW?8Yaqh#c3eKm{ zK7QY{o%K@_*?if={EZ@G2f?N~CU5&VDq}mR_)h=MlK;}Ja<9AB)Bvcpk~zJ--eyiQ zu}Srr_f2mU+I|;);`8BO#4e?dcs;>`<+-h5!)$>)%z7>6Qt1z#9Gq*8nnB8b( z>4|COOTy;#nlkk!$8=t1FggcSPjTyf8<9Eu&cy(zCXbVbho;sV*%hO!MeDVeY%;gL zET``xD)q>a4o3yH&*&?6kjW4BO=m<`!iWIY=*42Ulg3UeoFw!{nZ}w@O_P&L{g||8 zx@K(b;*pfKG0u+0i2S77ZV#QSb^4G*?uI>dA`?EDRrU$0KDA8}yEaBWyXctw4&&9s zaSn`EACX^N@)3G^+ZLJMFo{k8blQr>MAW;ZM`HQSME@kNR2!ZQR71jpx(H*%YE{nXiZt2{4Jd$tjH z;9B0+M(tJIIOuj{W}%!jX{k1AF%WLZ-(a3OGR{eyjd9Cmx!+1&m^7cyJZ$qTd)|jjlQk@=;FMBl$DBa#0k4-y=VK@d&SB4u+0IDj;&2~YRLxs z8Emj2=pf}D#$ykR#c4fT6%9w6R`FfE6Pg(-t0Tp~lfl>BBa4|+5v~_{SOch;38Evn2&Dc6v;zVgVFfK74VJdL)>8H;? ztwn>GDNv36COb=u^A0q9t}To-@#j?;HT#&d>wj5Q3(j zql&QrRIy)hrir;79UYB#gd9d3SglpP{nPnB8u_-qu-?p4q0GFhba%gvek;B?sSZvZGDEDqD{sY?V7Q@ zc0xo>T9ZOoi**7%XGXonw*`g7jV5b)Y` zf4a^QG^sV^PbF+Qo10*7#fA7=+7JB#JEOcTn-U(UY#9(dAUw zv+jcS192m1H(muCA$^9NAE%$+lx@mt`*2JNM`avj_+Gca(AC8_lYW_MGmith!_Zs% zcJ13~de{(dFtM6i$6}8U^&8Dx>|uprhWB4aKdkHr_S>GUo%zySXi#w#-1Sk;pT(vn z1)+ygVt}L>%6XmF=p76)xzSW{fY{`WGnD6kAvAU+-USup;`aeO4;TfbOLD0UcE}9l zU3z7D32n51Hr@!| zvN7kd)|}6~(Yq#A6S?PN{~`P>%+M)X4Ce~Z&Q)3ESYLQHaIv%)OIoh`s;a?Fm36ZA)9!n-CH6gSaM&wleZEw&s=Xq(GB$nX7 z63svA%@e+6E`T+bS{MH&fq!x-dfzB-FT*)Joqt;8T<~6}6fC~qVXm5K)fF~;O{DO4 z=%*7OSlfZbRnRt4u7m-?cwLulm#nrc)Ea*1^t;frX|Z&gGOE9ovVC=KwaJmy76PGF z2imV+rrGq#rt>G8+KfJdolm!~*v90c?n&PxvWPVy&t`ukvHE%V0mg##e$<-vjht=W zy)}I<#*it~^jXzruND908oWDWdRjhDjFg_b5r?bRN>A0LCK}%CLe z{hh?3scVR$4DdRP)Y?z}6=>ewRm6Z<@ESQgb~hhuJS&I{zlMCcod|bSUB<_XFFk7PT(CJJMTi)Isi=f7?5_ zu#{7v?P2@n8FM%T-)GFB!M8E+I@GuGnWV#t@G$Y4${|Y+b-okY;PXF9%zzsj*uSlb zHW)u^4zSmb=HBq6-$p}QDSNxxIX!c_sl%+z{zq)xkH8G)rOp-EMLF{oay0sUx<{{y z&%Oq=F^>d~nE2|yi~ly5!=u7c=KB?12caw8DQUQld%%6o3;!#+jGtfOU*Vhj5cHX9 zIly@zI@UpdWD5S4_f?*=GQ28i25+jEWMfg`cM)gcr1+%x2z;ORLyrVLZB&v9z z_i6dC5BP+n2kQNw(hBQ-DgKr@7cIw{6Z167bKB+lpW-{S3O5@0zsmWu@h^^!t#4JA zdrRVJ-0Pv4PLe|;(X7v{FXeY2V@ufPlwF)buk{ykrSmn8_>>17skyx<{G*nllnT>{Ek##7DRre@ow7>tD5oe6Dt!KcK=__h`&XCHRB5;D%-cDz!@;LK2fjP7Cge;=lQq%b#BLP*nD1fed275|-km(ixqg(N zr2p}W`c<`7G*g~CMSQ@MVc<^5s9e=;@aY=8MvuLXJkR}UOOwpSXj<)_m^I%a*FpR> z?oF)~zsxAc2A_7aZ!v}1rrVmC@^88-M)5jqX{cg}!#J?*7q~zFf2OVkOp4-c_rmUU z_e{@BPfvp)$S#O-hzN=YenR=WRiFgy^8wux(mrTbq2uVsEkJl(~PkR{Q7t2+}J3 zg^N%>Nju?coYm@r?af&lER~qg0G#uEpbf1bA1y34dE}9~kvJdq%yos0Vyjcuy_cBZ z7sU#PhZ-Ij%f|j6o|q@d{HC^}#z9u7y+MYTuv};Za5kmZp}SFiula6Q#>(o4^N*NV z=(dWlxTzS1z< z@9_9X<6qZiZO-li%y-bTg}8a`ADNt*oYK65_@3C(pW8YpUC;pscLaj!C(&t=mRyj8EO~BR=gWF&({fzj(Yb4u>rW} z2zawv&z6KeRKsznE8RN)v?JNS@}ee^HC?(7!mPaDmtiC&8!tq7-BQAO2Xam5$!(TiWJKBECEE@Y!#20@jqV zYl1)Mn#S^)NYClx9NUvjJiIcrG&VRoEN9L$tPg%+?Ej&z$^kKVGbFlPp2-myb`{mXNbUdx>;&Vo<~h@y?X=bQ`v!iGiOO0_)ORg z^s~;v=ZyJWmgqNZ%FH)01maOshjJeD7MF8g;FlrBve~h@71l6o`QIn7y$>UT>*U@! zBlU{-3PTU8bE{2kaB9)ks0?$4nckv0XP)E~7~9#9+AMO37)p!WzZ;(dd?frn2>I^D z*xHS=ipvFGi}Vxv86#t_^$tmli1IdauQRsdUkbmHm@soIf6x8h^sskutQ`fJ=8VF- z^O>x-;r&MS})6EhPtT2_A$)R=zWr@av-c2^hFVb6-r z)tYo(g}5<&jdEwo8ygRQ6MSQ48rDPy#5VX2wm}EX(x=V0!G?J4`4XXjsh6WW-})S|^es0@L6OPU0IGQXyE z+z7~gEkBQmk1>73r=$*i>iw(06v{8pR2H%Sqo9tV>fph|!e4kq>K0f`&zq%HG>~(LfnS<~Wa4mGN#F2#~ zO}`22;q^U6I4L=E(CUO>g2B7kg4h@1|DR!>E8sim?@U4bt**3(>kBrHR~cH|#co;K zudyt(ELDZ?U%jo&A;!3l-CdBrRK-Z~yK1d4thxbno^c+^J+&4;1(oa8_h03_BIiRp zgfnRLY`aUsOAKDzX2-_BzfRSO4R#jJ>i**WMQuMHE*w^K#1Nya3~js%^J_#7K$c>@ zyv413IXczkZn_5#ioZY}Pi1T`|A`q#?2{I>OA(8v&SK6za_0*#*MXPME@9JwwlR?D zol<|R;~ncCD>g87>sisM#;&OI>I5&8b1}A~?oP?ZE>)QOCbF03(C9yDBbZTC^JLG&7JlLXLgI>yRW2zmG5*e)z{Wa$n2dtWh5n4l;4b@rgR>?h*d+jvk%v^e?_B zw$KVFiIbe(!WZQ0moqP$y}gpM{Ti&7(04HvaaS$()LPj{Cl+m8&F>QP*XG4`9>Es$ zhHDz`lE94|77a7D#1WYzOwG(6LW{ky6mbR}6P|;(x@ctx1%&j>``(Uu+#~Uhj2)rO zDyQ{AZDf6}%J3DD!!JV)@6D?IJLwm>L8yne+th3Hv^oq|gbw0JwedL#$LC>q4(Z;`P@NF$Y--61q5}Rmc zg0?r6avzlcA!_F+Pw=1jXzo!{v${LGJF8`Bb!hRs9!T_6)n@-A_W8fzm=QbWWZV(! zyAFp-iL3!2K{Jf zX+7dSUc$y<4UCPuzM7pXvJQ{0T3xWU>+G4;am5oO+n*Bnc3vB2=_-C-k9Xm^%sJzh zvhqI2)oR&$wA;zpbrrFl-?}qDUa(V0OJlNQ#jd7oTpIjc>|x3rK2!N4(*;M1&;Ru? zRVm^H@%f}@wN~^zsW{2_AZwlXBp$+Nc8%UKwI#z-!%Oj*E>%ZlY~SU$+(P6imCd#^ zP`KIDYs7ib=fGLa+7{wG`jhbenZG!6Sgl2Vra9kdD)vU-vsKFajMJheCcZj5Guz0q z#`rpk8FC)nJE-f>e%bY@>rIdO>VnlH`zv-EoU}!ye#{pkuhd%UpxtrG=)v#PqjU{P z`O&5P+F4E&?0@U4hHe+*pH3~lXW|>I3B0{TtNT#p#PcT|QkF*Q-J7SuR*~6}pzX@A zqtJN=tUJSZBj0t0&HP}Z-*XnQuyjmDt;?Jl6P~I#4H#4U-Rm6N6FRl{h=~zhlO7oa z*aQ9jb`=+w>+g3@bx+O2=P*~D4|11Q48WQ_Q=ht@8cd97s4FAQkgjMmYkh|*Vbg!g z`VH-K^^9*Yc17RxKjl2%#}9PyJD3`$O{q<$=K}cQrkA8PJ5yv)9ri$5@nZfi?A0?c z^M(7L!_PBQj6NlfqW;~bL06P>g}+sFg1G~d4_XAhF{vc1|{V_H;fHUy^oFgKuX>)D=TH zpL=0@_ejJI+=3@D1b+X`{QH8>!`#`;(apv_K^K9cnboO%l9$I#qxL}A^JgHJv>?oy z_y*%tqz%f7w?f<7tJdl+b~vEpQibPzQr{ini?v(Y05*jR^P8fZM^Oa%?zmU;MnH#b|ApJ4xQ97h)QNLyJjuxG>)2>w()`rsZKx^artp7QwdX zyaWCDwcfP`lWjoSVn-Ybe+rqb^3F38_4D1)e>wmsLi~ZT@pz#(%J3r#wjc1I&-x#Q z$$)w2a$mhc&nwb5moP@ET3qSR7kO1hTJ3t$Y@Oa>NsTw)Tzz5=5!HKHJoz^+COdVrwV&1`m(AFMocek6IQFXZ7 z$h4ur|JU!^;GZvX7~Tcr(pJQ9`EwRys$Q{@UQf~A#k>7my-Sug|AfnUuh3#JI4rS zS2<+Pt@*X`j{HvGlzctN+gf0hQI9Ob|AR3H{Y=K*c|O&v8TT$1T|@u9B4K-PtJqed zX)>LE*!T-u3R_G)-l-|dc_l*{{8z>1q=ino+6&L8TzxrWzks?UwWd#6fx6#=;tL#r zA3ZL0r|Ey+oR|~6CE+8Vm%T7c-OV`04#dQ?jyoZHLaE=dOVzVkD-YRksO>=Rhwsk) zJQy7<{6aeXy!g4n+EQ!mb7OP!*SW6^jnx(HjIc)E=DQy*JZ#RPYw%}d+oJ|v?6?0y ze{D)XCVngH$s7EqBTYZd$7x$=Y;LmnYm6JT%s;MdMeL3HXU`Y+{8eCk6|X4R`7iIG zuA5kS8+nFli%r@!=w^EKxEH8vXNjz4nz&G=3mStlDN=%Tak$J+{TAX>RgMBiL{jFrs1YW!TaE_WL7198sI0sI)fX*#z2TKuN5ul$ss z(s9cLh&t=OT4Hr-{sL;DykiXdxfB?iI;PrOVdD}TosHlYRR^oq;2qQl?r_$Y_Uu(H z2-_GsnFfp_*1tWE*|JlM^NruSG_bz;@XT<7m&;ta=0~+AKUO(VcZSz4^e!|x@jk_` z#NKeAkJv9sdf<#swFW(4_Ey{UUyT0h?WuZxhes0mhQ?Mo_ZWM)H*j+FJ`Wd;l737F{%M=AjmdEz z6}OeMWzEUIoWGk~$;Y9spI_vDC31}Kc#q^d)qd_Q{7UIB?Ega4OY_$AsTa;2h_>-Wqy*WF}@`D7{*5fH<&pdT_UeA0 zs3#nn9%_8FqvEx)PuhfgOY?X3!^WGNn``&u+Bn8%&NNe_bjtW{+?6Y`)mH1YuAhNDV`2w%wB=vMiivN@J8JMhl;`{h&ly%|6!|;|JlMxMU2Ge% zd0d6*N?CCY@Dj;K{G2teS|_Tt^368|TZGs69mdV{nLm=Xb!FF~hee+c=3NRl5p~B% z)Pc}WxDxTk^=WI%jm}v7z53MqrvBl4SH)vFvuS+Z;y|`ZwK0C~NA5?)j=j#k&aC(5 z_8NQai_q$$!-dYG*x?=T9n;_XSfV$Cc}Xp+$48q4vxvQ`O{m7w z=dj1$V=w_0=B>>$I&brO_vh+`ZmBEVN9x_lUmsh{L&O+~ja=rC-y_%RP}&SbN;ZR& zm`^$-o?>dYIkQ{KtJggn%k7(PC%MSBi0wa6e8BiShr%CJUaxPL7Hl@cCTtlAZ53 z+bV25%)p?Je9m`lm%C5+@m}!by26^Ajy0_=*!&}BerZ3Yi~p{vVPNc9=dy{tp!sWg zak;6xKqSuCTDvm4GBfdx%wN=GehL|`V!v$?IKcI;on5%Zxmjp~akEB$v-Bx!f-WGg zg{JLkz&@qjemCx&7*N^<;~YSK{w#h=t<_y%qJXJ6?;T7sczX4L&69Gj1Zjr;X;VUO zr}M4Ehoz2N8Qc6j<4F45e-Hds-aGBFIW6ZHOrg8;vy8reD`PPMvL*Zk6sI`T!rM)J zY+~wcd0*c3)$u#Rcb9!>6 zqxAma=y0Uv5-|^TZm~8yU2NuQc(2)6T@TaKTN*4=HX+WOH8A=-*}taa!^4m-(=pOI zXSviR!hLb3V-~!=FV-=tTxv^a7vgVRk32YC{8PQ3BcnFTZiM|dtkBZXQnyIaa~aNI zWoBhYe;>UV5~reX8@aX@zC35^;uv4mzR9xmGLz%02F@z=KJW3>V70M(FL4zP?MnEA zHv>;k_f>re+;4s6x5c-MF2=nFVObD*=HR>@sg;@uxf&ow!S378ztdm;Vw2I{Kfmo8P~a%x^J^*((%z31=JYbBo;fj066 zubXu#eTt*-9NL6)iUVPj!@q7i&^#iq`m$?qk7})WzgK*f;mymu7gcRJYPZT;l^Yy} zOEJ5L`(aEBHmAtOZIF$FLpyVMcf8x=HC7jHH#Yw&$M)kt5ZeB%+Q>fhQ|AJqJv`o< zAJYaW#bx@w)E{&R z=Wr(Q==dG_UnjWlN>4Y>?JuP|s6vY=&hhyZL?%-&_X+w+T$HxKX@%2Ny&rzJW9A-5 z`;Q%RcD)sItEp$dfFHy=(lX@3#9W)L?pndL*@FH2-2b_;wTNM>WmK0$A0H;8m^{>g zw5?epK8dz}SYv!1-ivg5a&$=OrwQww`JM7E4mi8P|H||$Elb%N`$pf+t9?Ij=ZE%6 z;8##D=)0?T?Og00VHe=PsrU?QjYL<%*SNTFF{;;9On#65gXs}okz0{dvUIvro?D`5 zkMg-tXJQw>iU!J^@{TG}mcRB??2#UgDR{4ynUhT}mH7^yGj*0)t5{{KgqQ0(@MHL+k&W!NXHJm4_7!nOtm7U(!_*N) z=Uu9Hy9$4RI%|SsW0-2KVwjh@_WAqV{Swog2pjk?CNyaO@oeZp%{yI#H;rt6p=fQq zGQZ5XG+=Sj1J~+{R54@Z##^OckN((OgKzPmPD<4XJ@bD1rvEGQ{3FQob5Rd0_lVxf zc8QrU&!wI-F`sYI$E{;li_*5At7GO46KB}s{yR!L{T=p1uW{EHUy1nwO_OS^WJnaZ zHnH4M+3Sp*f24b)`P*(;>!;6%>$DE_jw#qanr~%>2x6ptt6DTyG#i>!Yekcbg0W(6 zuwHJKXYCwd5ldY+b^40LoFig56hJeSb!x46in9)hDMVc8`SEzEZyAT&@#;j+2mMT;3b zEvzdi&C}N1=l;^@GRy}zdS{8VOvT$_fA&q(;e3>}@$kFz8e5>J(>|Ce->0A02eB_L zduz~FrLo1-TE&?!_pcJVx)SG^Dtbbb#7E`qQ9WbmT<2WFM{Qy&1BsQbs z4;md!zk{-uSgfDqZ5_fFCA`)>;Mwoob@;xrk?P%v5_=@?6E{^q{}8|<_#MWJhzq3U zKUl!yJ2GeVlxyR?wb{RjPG17uF)nBOM>x-sIT6NrE-o7;_rh4s#RZE!Oa9gN=c=OZ zLjiV&;lah8!jb0RHes@g-v2{|o?_Q=KTo^Qik-mkoSevAZbL3Z>pS+CkHmgp<^!kt z0ux7FpB`)Cu1fM4bUuf|a+52(9yunyM5v49j5AmVPn_$H3l1jH7ELhD?K|qU_ic$nN#*=UY`lEgD#ML zQm?7Ck|C^b*K+tZ^tMxO({>_;v-YW{0^3CMeob@`_p9_yZFZvE^&Q}gu0j7&og{D% zVjFv@bL&if$bOj{rJldWvoVSW|2^>?h<|c&WO60Qi5Hm{qXoGWuO-zQkDB3659pmZDPh;pPwA7JW9&E9?dW^yo8ByPcoXWD8x!-M21mAsg}%Ao!>EK^u|C|S;!B9R z)n;!IJ{=D}9T_c=nhmr7I^#k+PpxI%6Wfe@#Cnwra7Pdu&YRhOWg1IAaxDfLaIlSz z=oPJ0QekJ+(M*J@M`uyO0<3En} zE)rc&9YOur9p7OOMeJBxg?Uv?&lQOozEcV|cf2K3eNW_(Kc`olIlMcIGX;aX8t3_a zR`veyx7zxhOq{=G{Fph<2gAP@-+?{dB1?Z{@4xNg`V2m`&gU|Qpn34)XuG^G_b}8| z`2X<1H?~XkArjL@fB!(Hh4}0|pBJGwHJ{cwV@%B9zs2>&j#^z&=dCBU;{Oe)vu#%72rRu6g-m_a| z{g>8-)5RSN#GkWo~&uUePC-5 zha>(#zMyZ;864U^RBL5-1;DAJPlqp}$H!tNHK)6^q%RX9=1^WxKAHnRt2TSQaV z?^EYm?5Tr@1L!^c0ezR+-kzMbd4U(gtHqC|%v_nVGUo*Nj68q*hl!O(!=_U5{Ixh| z=!e*_n#R75zc;nwYRx)5_E5|)7_(}v>?QWTDZi|x)1sC23+9*V)NJeXZ1DdeHt-_Yz|`H^zHRg^rtvZH1cT4EGhbu;)~>-ggZo53 zS8zWdi^vOFW-iP>ExgIST>{J;y*I?KB%jz0f_r#;uZc@@K9|-hyJIV3Tfv&wKG*7k z?LFTc%@>(K`}Vc)HN^MSJF2zf&6Sx;L`G4sU6Q@ZynCUQtzZ3F%Em+P@b4&L^M2N> z)})^ns70Jwr0>AE?qtmD(|mm>_=}1qLQXQ5p>^C*j>SW$b1ZKB^SO5r-&1rrH&OR8 zFShfle&$>(Ha2w}@dxxXyEt8S{5hBwJt=FDw#-S_GUPb)wsUVh^L_4N6T8@uv3&;% zW#+h=O-u|}%~O|!ml;2Le6(Baz{?sL-g7~wx(|Tpj7HrImafYjaoX!3n z+SnI+HaBq;W}-@D(_f7{>>kla>(*n7uEc4lv#%`xA zN}X~E_D|iU>LN0TW2~3E_yl*+=pQMurXwIM9xd3|7b>&;QTSWNV3(D!AV5|@-}G^^ z|6{TL>Rh$1pKn%c-~pCT!T0UFLSn6GzKh&#CTDj~aF5ArFeb0#LTU}Z+t}Q^C}nZB zFZF*gwRw~kS|2UX{@v7LbNYzZM=dbNoOTY52cK~beF2*3jUVEgeRjmX*L*$ApJw{G z;#`fN; zU(kK#2M*2lZQ&9euHO4J$^7c80oWmB!TbL zK5B2`JYC~%rZ%R*Z#481x&7r{`r)^_MpuhoAQt6X;40Jh_%|+TR{{_AJ2*;GJB0ks zYo)v=eaVryIYBQh+hbxQE7HeGp8{)IR%UEo za#*1g^dogH`{VkR^}%!aTQ5f?tW^Bptoi3TP+Zzdz$J)SYdWDnNIlDYkK8_zzdIfIyYg%~p0D3`sN)!DX9cNAVDZ9ErjlKv*rUN)W6JQ$3Ven3?RQfO6Z zCB8g)qgv+_^Hqs z&*Zt_PhzXkuOE=_C-lR3>7+!x?njx{BKJUtRky{BaTh$3R{6HXOoThrcS;2k4;xc7p)2^;7J|#BxvwfYBXdk(TO%1@gPR$J^qkiwct; zGk0R-H`G*Qo)qzf^C?yx7iWIwD~Uy^(oCat9JGLOm+K ze>vi2m0?==3qyyHJHAEiQr^o?@_ohk^Dij6l5LVuV$)8O2` zkg~a+eeU}rlSwmeVnv6jo$Rd)^*Qrd zRYNcHF7rw@Ta#L2&UJ6(7V%HZ_8Y_YQkTWwx~pLQqf-*~d+(x$NXIs_>6?UKVGlch z!au!dzihq9o9}bK7P_T>^lbK7lOr1$Ta20!=@BN^L%e9(t^ssMga0du_i{g%U|xWZ zWi1VC4aPO;>m)BmA7ps^iK%-WFF74$!w_SH{s?{B$BSwnI{D%$V0CK$?)kK>vmKou zDztqum$}Z&Nm-13ZC&g5FTs}xoe%LHwO04uF83qk zUg#W#Vtyu2^F$~=se^if?ZO6WqsIgy@v+<3)5!2AL(J?V=j98;uSH6|0fN!gM z&$mUp#YP$g|L6qiEh={~inDoW`OtFxoC%;(UC(*YZ^qmK${EmYOkYXGeEyhOEPPEF z4tz*spRm_bpKU|*ps6z%mpj(gH2FsU4dXMir-S%G{GHf`Rd~_|h*#6j`51Q2 z40LhpIPjsA>b2*6wTXKQKl1rGua(65_?&UhIHwbyNu2*Ro~>IrJG?@C!{IPA`=hwmx%yvzn~wsKoR7bv}{*3g?Bs+_OV`;EOyywkRLKF>K-I3zX<=jbgBtgin@ zdNIBqI{$=)ceyiM5W!Q>`oRG8pwQq+Y=9((al9JH4Mn8D6Lk-x7b5=XPCYqtpSCXRk@WFFks+8@mRrijU9u_JS~P&ZJLpfzb9~&~|<54SCK0@Jn^L%Ghu0JU0}Y?xT3Nj^b401$#;dB1tZ&FZ5zWizr_MKeYK>?6%GZasf8=n=&X`z~deZdD zG1q(|&a-;8@3Pz`?)f-x#?bUuXqslLw;}cuMr*`1s<%<{!e^B(%bUv@~l3$)6jE4--Mqt zX3ktQW9Ex;kIDJ)z6RuPHG6KGZ);@x>1D$tFU*-NQ?hr+Z{3c+eK2I*Z<)h-zq$Fx zB#uP;=Va(y@+Rs0ME@b<=MKt#>*`#_1jqK&)D}K3^>#U43_*5R-g2YyD_q!f-#7!+ZR#l8fj2ep^&EcfzH5wEioR~)40om!rWrZI9JIDASLAf9o#$Men5**V;Lj3gpkItRm7*_L z6H@0qFM8om_?#FHJ+V*nX5YePrVi&b_cMcm(5Y3GnbZ24yv?Is=vi!7`ocPP)TcP3 zsBMn|Y%MKYY74)S=M%f8cc!=L5ul%SI`+Ug$@IcK@*Tz&PC&m{hUbIa{m|I<+fFaq z-kBg1Nc@xUcx1HC^y3c>pD{lE)Z#*;M-~PP&6%`HS-Y-%^q9G$kAO>{{q$22FVgj> zvrt*DKJQZXT<$seAZl-F4Lx`=^i*O7!Qe>U3u8(%Wk#Ed53nXyVhecR9o{~P<1r3% z24)x$U#s4TF|2q`(-U6pK~gD+_W5S?YA~@sxevC zz7qTKz()4;Dc@nb)T`5n8h|rgk(h5@8yzae;k~MwP|b`!3$H#R=F$_3D#TKIN zbSO~!ahxh=emp;}#%ImVu5*cdiJ_mj(YspG9bO0I7I}9E;j8{RQG+_NVD-xb;SWZq zFDou9>R8`%Dchse;J>YM6Yy1cgs_l;zASuc zVtuD3=C?iwUq<_|QG9~w3x2eqW^OKo&&3(FS|42vzs7vuon(CTy*aCkYqR%C4rmtq znn%*VGjl>~qobt;nEuEssn!Oo5Pcc)Io>O{*uB{8jdP>V#d&1f&L5Xja}W?eFMlT3 zidrmX8*fcud~K^xxs|Wbm)}6qrHLnJ}slOayLu) zVOX<<@Td4Tb=KX*yA4j!R^R3w`sDg4eTo@sebeKG$H&1&g^6l9;h$25A7~zv8e@9*j&*mMxz$Y>=2PVEnwcMwcs}@|(YJG6M&yA!gx{sE zALm}dcA$myEu z1>tb9SBK$UewF`~sWqKi{F$8Lg*e0G5_N{(yC0SA$a9E~q3OKRyU*l{TYzG;oZ)P4 zeb?=BZ;9ONkNxb8pOp9;W#CB#_KqpM6z)OWNDK2LOe}?SPIYc#qjQP)!sP4g(cew_ zycYZHmFs2Veu%3`Zjp9iW!P4Fh>ikdaHjCD@LQBiTVYe_ys%m;JE~o-pTxWRLI-gc ziKeS<=V7~ zF~&o5Zl$f;PHaECqBlA*kFR6K_66S<+-Pj<24B^w@=RvBGbOf9IZVB#YX)9)UNk=1 z2vibj`>Fyxr}`Y!TAjn6FvDHjUCXm01h3w4rT}?oBTih|TI@;G=YxqXhR1uLFPJ@* zv=!SXW>5FX^)PqzXna-~{ZQs@_g5S;a+UbidOvEd_R}>HFGVe-#2F}0I7?2`Sm$`J z+V)|=XfpbbIL~bx#HiE_|9lhrItn8)7BQ6={_JlPCC4=Xl=F{&;w&Nq=(1jcU8X( zPN^wV!gc_kzLBwa#F(D;^)`8%1bYE4n)5!eS;$kgJ${n+OMX^QZ(DYov7M$CEjHs( zzz^j2seijhBaDtX6PPyojyjcDJU8Zfwfwoz`*iyQp4K(zWzQ4)fw*whk&QJq zXDxaMTH5;T8p~G94jZ91YchH=}nnxk-fb4$AL+% z`3_^lOFfm$0lh9dh_t$_VCRStS5w((-vM`;>oVuW@~VKi96Yxk$f>c0oHA-G_M_HH zMm-li7o3C7r{J0FantwpwD+{>KRq@+R?eUKHMLgq=V)N}Y5g)7^T_nOydS=A;@iEW z(zJjGZ5caXLnBEDRSK`hOwwg25Y1=e2*= z6TX1^T#`z!V%4hb5-KGj;~f~h0) zo&F7&RQh}-IG2@ToBf@+n1!wRk+mY4R@WqESuTp!MvT>f-5tgf)icr48e5#S_WAjy zHh}%bLrQ0eSyvL{qOJ@}c_Ly;oLf+_g^yZ-4uNyq5#O)GFLcN$S=|}F)xgYJ63GM$IO82r5m~xbpPeCVMA6y@3dfSD$ht#>ZKRO+8wlk%!gSv+Cjj{Ng z@r_2`&JtzaLW%YctF@xNX_@I#wPdKM(kyg6&{@zMB5lW$s@z)$-i|AFx-*uSsOWMTdpOA2!dN zSg^pfV<;8a-XDswN~^W#TEx(Uuf$e z)_Cp2Hz98hb1m-8rHOj5_pXqo=VQl(!X^urSSB4=9~#mAByXtf$h1Qp1(`( zl(8Mw_-UK`i|{G&ZO1}yvaf->KLCH*hK6&jM!%U+sSUT z&>QdZ5YS(=tUEbTd&ZfzI)1*&u{Qa@%(+sp!Z>Q=X2l+ZU~oode<862#yro@oDW`8 zw2@Bq1XfVF8OFC|P2K7E{7A11wr;nUw8P0qA4eaH4x0RE2J=wPGrV?nsTcBE z*n6*LUo~e!{itc6A23D~?|W4fQ?@sAr(^3z-U{cN*!yP3#-$%AURuflRXLM_2SwM+ z5lpHzqSxMpW8i0fQ^!I~V)+}VHs+fR%dj4dkJd%m@|3-_tF@@4INbG^v63M zU80RnppB`(#LzZIp_PqwFu$zh`8&Ls#x|}D-xB|K4bFjcFtr}PDVS&GXN>?pDsx8U zogS!@r0zQvduWL24gP<B(hFQ^-2#0|;Ir~H6^UdrD z<(WH9mD8rxPC0*tt@;h_PUTF;rN;}+fMo`4Q+vCO>f6Sp&O@mD)$?A+4& z!1lk?IZw*o$nV=C+n3rqfv0+RR`rU`!kMeJ@~=M%J~D9?*7}l`NI$Ims>7M{zUH8Y zQ)6erOv78@tNohZf^Q+i6a#+Z_kq7a3;9J@}`13g`*5E+~>tAQ;#&axWw4) zOHdV}d2JQbJVhWsQZMR4`*W5IsL>IB@KKATGHpX$+dlL zV{^Bgy!?n@VP4Ds`+)7KpZ{9S{)KX92k7Ss?+LFv_w(rVGR{TicgQe6$C?t@ihAE!LgxovzlKO?iv2wXI^U={uX3{oY`tY=}3QJVlRuXLDa$ zQx=2$?p!y6JMl?=v*-)b_L+sVB$f#I>9xznz&z8skRm*?5K6QQ+Wup z?TYi1oQJNTAKN(g*uq$oPn=V<_lO8}D`gu@!OX8`@w=h(Cp=WG%bZ)FAXhmS`}gaF zjnTiTu*6gNtxow)d7Td>4jAc*{>XhLtS9Qh3g{^vb6^bsbGVdyPi3BxSSWGuC=bO4 z$LIB~%_Z^sI#zJ6!JYP;^(CwW?qON6$=uf(&*JC5pU5ArF#VgHN7-HWNjZ}Z3!#=X zLrYjLj6W>)>o zQpUIKo3`~roNq`OatZd_F877#{p}FeAGkJ`{aO5(!SYJSX~U=Aq;2osv_xIXZq!g| zxl{uzVtxK{w6Llq+shUn<{Kxqam_$i`dUQp`>e$OC4wWb0?$Y zj^|H$=Dcie`!z(%R6Q-^1F+yE_Czy}by3j1xGKhD>Dv*I=9v?$Z1?fMB|6Pz)aik%L^<9{|(DY!cHTYsBHKekR)i41HH z`x#FZKZSA52LDBo)!qNEMT@_AD!;@2O2&0{j-V0s7{vDPiSI8B-pJ^4SmrKrb*{Y9 zvpz*_*4By-jx26cgRf%CU7(j2gf^$sH{BQVQ|Y5s3G6u5aB9B(1!lmJ25PYB!J(~% z-kZHt^68i0nT`G$sl9mfGtM)PrlkkMDr57nfxkw6Ux#y6YsK$pqQ{e;pN%|wWjZX?PxkjZ7do4H z*2EI0JSUyght+=2-bAc;TEv;E>Ml4FN6U)#!IRL5%GOPL_RPCRmtwY~vL|oP-Xi%3 zW#hGx{0KB&`2-+xDEr^>*5qt|G;0*w@!jE|-WA>zo>SV}mhef?q>4WebABN<@Qtv6 zNvqTG9mY8)WF{DUL#@^Qc7%^Wp5pwD!J(~f{wroERN(U|_*>SXGH$?gP;0gS7g9DZ z^g-U*SM72|kvVX(k)O4gFswb(_G)E#r-{`A4@d6nNYK*4{KCApk-kKXmo&q7aZndM z3Ts*fjQ?mqs5-QBT?2oH*zMH0r^KfK=Y(|9+^p90o4#ur8Vr@3#UY$wx9BU`=kfU6 zy2PBvV+wbhKDdqL|JfZJ;-m?ROxnX1EN3z9!ZXV;9s%``lH=rn=N! zEcH&DHQ8KYdvA$dqx_4Oh*w)&yDv~fOB!IVXKK;TB|NfVYcqcB4FE5zTplJpON;_B z)vCIpimQ`0+U3T}osNUduZe7auy6WVscHEGc#X5YG%r^t>iL^8hlM_g#i!Qg&SczO zy}QH2$Ld|%^IjR23(X*a>huYp)%DLFv8}ZIzZ&xjbzR>h&Lbwz*geIWhN|Co4C)8; z*$$5_4mQtr5Z)JL0?ZSO)tpUtDeC7>PFsANRgRT81A}_W?@(^H%N-;26&>L#y$IQ^ zd5U&IiOx~)+OMp(L=S_aL56;EiGJQ~6<5hQP)@chZjjzd&T%G|DdiZkOuMzT_C`%; zXFD=)tM5Gy8VwHEodqTHM3);QR3t&{2saa($$~1lso3?AIm#qh4%R^(Ef8XQVnRJ(-e_88`LD@lB zP3PTOTK~EsQByQFr*LbTJDwa(jx=u$PhDZK0+uCe6lvQKW1N1y6ReV2KF;r}48IV) zwhi@o$HhgFjm#sA&Ucf0qWy)QdWhptX^T zy;F{LOvE%I_ZYFG_)KCjk`8GPA1>H;9~EC`^69Jnx5PG}Ke#*5tFj@bXkZI;+>POl z2Cw_E%wtC0zJwmYlFV#UYtDL@0p0zqx!*?rTZ!|013SDXR54P@(s7A=X#4!pD(>wO zul_{vppr}M_n(0^<-iIWNYtC_~bk)~#~=Gm4z zUqe=FALl@Lor#Au;cYaJ98MihX`lKqW-i-UO<%+N)zLiUAIqINYd)IVA9K_6I}&F} z@9nAJDKi7KAzH0`XY9E?xXYY*6j<9}0s3}HS3kn1F2`I{ou_y(v$$jr^an<0Ta)8p zuBr;}&KZ20^0t<{Rk4-9LL{ENy7%vz)fyTUd{>*b7~_@UmvZkr>3{il4sWA>sqhYt z+^fz0O77@R+!1C_%KnL|wKT9ZUmAUjeKa`y$mlipY--w`UYK6cbg0&#!=6t%Pxwz5 z+4x-a95MjvPSsl7=@(&d!J#Ej)j2B-R>=vN(V+SLLG<+Lc*4Y#wYP_3{;WRFaj6~> zx1o&cA6r}|_CRU-nX^8%ozEFtvi}T{sgL9xlRdtcz6wgc-04@Ak* z&5p&{J2qu;7wdxi0~i7$T`zWm^DtJFVGrd^i5EU)i~wW*!?Onlxhw+6hU z@-I%n9&pv;aBAvQQ)Bt(#EiU|shQ^Um$EO(Y?R!=mZ()2h&}Kenwr&`@~sM3-?o?Y zuxD|S$@|)F+3H^)@k!FykZ6eE9pVn@XR5W_W9mWFrR($Oj6a?aYk|~SozF=rh3~`| zOUI10X&Zdo^Yvo!MWHdyR#=kTAaT4;C67aV@^WXz;RDSxiWaNP7&TV_7nHof8p!fOc|o7U(qOiUA=G9quMLiD zefZIit<&HPM5QC9!{+Q``qSUdZj@LPW9)PNxkip{iZ&Trjy9N<37=PdZg38v@5EpJ zC;a85!61nzjKRH3C{8f^qSor1Cnfr1cX&P)V6t`~Vo*|NnQE%iu@?LP;s2EFIa z&Jy8Y+F&EnSD2p4;jyjpo>x>e%Xq)lp~bA2fteuut-J8Qr;9%^eOv8vQ$=o1f!t=z ziH_UMcb_zP(KlyqGC757G0$DoRSL7rN-^Y?zm0!uVt|WMwmx=`_?w}#4|`T?%Fiw> z5L+-Z`E^WM({{)h?;?>)jO8v%U<>>+de79CZg$e5%Xki}3j>T@`YG@SH197;zbwz} z0zYwX(c;;%pG)8AxWrtu)4T!VBhaU~%Cj{L4cT^C{#P zXoInKsAI;?dG8VKHuS$0^&Ygr=#w7E+Snay9@vAxnukNd4HAQex(3dht%2ce2yH(M zO${~m;cBh;?zj2r#{X^bUogF{{ee+d(vM}m12rdzKH5HayYVBg^j|W)LT&RF^Xk2< zm37^tl(9wkS6FP}6OpIT_jq;6`rWnJOXS>!g8m)W zKh2-y-sa5>oe4heieS017SajZ`GPJ!;&jE{4+eMG1tX;&su*Tl>F+-g34I}_T5Bnu9^fi3L zQwpaToYkWdYtnrE`@)UJe;HP^{`I5rVBvTAzg;t|ty1>qxZFIUXWBXZUCpzYabRe* z&gp61Wlq}Gp6w`DTkEfqYg2yQIMjIP{nUilN^K|Y^KZhjM&|F#_ct=3duq4XV4NQ` ztT4~?1rRGkpMMmu5W3?288f7;rhh#lF>hsuV`o(#U9f)Kr|`iw-_aJ*w5`^Pwxi%F ziFI^2y=o|DMd@=mKXZ}nZ3y;8A6(m1YOQSJaiv*o6JUf@h70759>X0qIa`h2M?6DK z+l-~?b)2&?nH2KcdY_{Z-&6KKeN0O~$CqOD-5~fXLtEdnAH0wToqPkiy2INmvYPez zb&kc>=A0VFx7m|hov$`H3>`C%i>*Z-oCypEo)78vA4MyBcgMdlx!SX$O=fQ&qxOk+ zLD{k!RH=QIdGXY8`U12Mhq^X?GRvEV-@=*0)>UhDk5gh*2Rj{lc7pS`k?j|u(@E#2 zI3JdN0cV>oMm@0BBMU-TVl|Y3-=yt~<6*At(W{PL1vb92N#+*kwB$L^X1)bjF~EHs1NHc6`97uwm3Wo>TiVrXt$fT+@}J0eaKFJYN97sW!yZMp_vEND zi_QK}^pLTWf&ONCPwp+=YiuXxeb{3Q3l*_tiw#m8+WBbfitE7RicZv8=%fYxO05e* z^mlX5)HN>!?;Bh3l~Bzzaaxo)bHlkN*L+(<9#?rB)}o7#`9n)*MZCiFQ`b7SPpxC7 zAif5B@kY5e$J*#0g&2N_+BDP)C3;BJTJ?~!j-9-~y*2tb$v$xb-qWR8o!=v$qSnGY z0ecx}^DuujC$KTe5qZ|2DmN3E6Y?Sxtj-XniYtrhJ>35-7an_B+{{xHdDJ_{eSGTbSAu>*Xu zJ%N3+*t4u|FLNCSMNehRm-=NP}!mE z;VxB9+S-|FtuUNxvoDIjwgUdz>t3bU0E6)S?ZNgEzHv*`r+p=N%2;c?Yw?YFzq)5| z4r*Yu46ll9T_xo$?GW1SZwK#4tvGynuQqzD6w~mk#$@gJa2C&PyldnLy5+hV+?c6F zm8YAI=gdL9x|Y2SzMUs~C}rzFXp@`{`e&?cBt-x>5Cciv$xycK^Qv9i$ zXB9plk+!}`oA^k{S>R*udd#SmJ>#zjrv7W>)wrCUi@`n@-7|G4SYpoVa$nW$&?cFj zwe?_=QCBknbj7}a(<9qQ@Fiv`Qb$wQ^i9tY+haQ7OO5_{Vh@~)4G|k$>(GZI&V*7j zY{GRB`SA>ufo9V3lL>gjr>z?Ox81 z(tF?>NuB#x5Kb|+9P70C9p=6VrUsf?yGK&QT%|pOc`fmc;vX>&vf24ubQ%61-p;&@ zC)^a=EcKJ*(!)|Ppw$L3|(-vyV*qM5F_!|x8-X*TBF@`}c z^#GUPZ)+lp;nug<*VGR;SJ+zmqfs%Z&-}7Ptz(6YT+`R4M7>)i` z?wP)xTW}3V@o)2+j4yLrIMev8=O*UNF3R^ZGMv33A`fv6m~)rYm;mD=i(^?CJ}mO; zA?$90zt+UxUIK2aJ_of{_W1?q2c(|;8D!mQo~_xa^lUHQ(qNM43%>76_Z+#qfw;Sq z!&8i&x)wOwvNy;aMsu_e^%8m^`8n$u>Qf`5Y2Z`p*7f1P%-8s`t*#B_Bih4it#sD@inooux~;C+r%BKFy7M3~mUTR5 zRd$s*lX=smpne27cX1-$ zHzS@AYq{43F#O~}o^72o(DWlP|6AH;lUl=8xwWeNIOlwkv7~{XaZjns#Va~1V;gfG z7mkzqkdiJiH7dlt*R=OZ!UrKnjo#1b{6evrxu0#Bcg%a$V3xhM$6kw7Z$9mi-k2Ax z@2huWj#A{Vm-GJwn|mbth}45|pIgE$rp|LYvR_*M9FKV!`hNSz{SA-TW+#YWb_?Y8 z=xDU)xB++$dv%Q*i!A2PBDX>GHDfH>FoTKmoOGCtvL^n}FMGDh<*iKJQHrbIj2dQ@ ze{7GK-k&mmGWJhd*sDr;bzI)K#4~ohQOX*9jlyy zzA$1SGsg9N@O&^D-=_}h2uuJzhcc5s0?)Gxh_AtCuV@*1Qyqu-BTctzUFNLmKcxdO zd5WX(otF4cIq=YUCZr9uR`TI>;Kr2n+7*$zS^VNn_^~C9sxyTBSrrts>OASYW$%@E z*DTmh#Bvk^LIZf3spSn)X(F8<*=Q}DiPyjbEb zq}55mbdi&+o9Y(bA(#oB@twJt`>dZ&jAC6|dtw4hxnsuGw@ge~+}#buO|pN+sOQJF z|8Ada@lqo9Gb0<@p+}xH+#kRDz5Bi70m*|Gm-Q3doBQYNU>!I3Iyg;gZ%C`R#5P`c zFiIP}GqS+=t?DfrA5Aj&B&abE{$j5vu_E=otF^lK4GI3*QP^Q{7*+|^w~BW?lfbcg zIQ_86$sP~Asq=kX!bPT!^$+32CT2c9Z)M%|QjY$AF7tO9_a1WFds%dAH&Az@|DD7l zz6F!qlDft88n9lA`)5onowxBc+6hvN2p&1hvoRCQ%Qmv;f$#~5!;=PXac?oS(I-%G z(cVy0L!!$h2g-Y7O|L#HwN_^}D?VuCNw3&P-Jr6&I%X_x@Bv^F@^2X@iGw((#+q1* z|HXVyB?E!q0{Z87_`bAPHP5Pb8F<5~*qRz*?zcX$Gc-38Rc#67)#7lm(OG@dzQ{li zGH{i%Rqmbd8{i**i$1Jct9K#BzW&|DqOxf@)u~m=_L3|?{GU9y4D@-VW6!pOcPTzs zwqIkc@MDR?tk&huN3VT!m^}jeeY-^p%X$)?vlVy|nm23x8|6+J3;HJf20D&%Z+){` ztJr?6^GEY83lj5}|4~#JCjW%(s@5tNIw?YZ=F&y?RahnzZKk zD-(4TbECNiUvz3w%@ukY&;L9A>3DBHpl47{GQZs5m*x^ePS!cL&#Ol2M$`-iwN|k& z)DM`slW%4f{SU&uH28O>wfx-TULf*wD~Moc@eVaV1+sctG{fYYYn{nPp0MAa_7YyJ zWqk^n|I$0|3g0t6NTp|EF$T39d$ypk?5H2tho6eQP5QhB_}Drowxp==pok}P(7(m_ zmH)+@bWPix+)hT$REE#Uoj#2hUKgyx-Kn_HIfcIFd}b6M!Hm%|@G9$nmIke{Rx$I2 zkZanvqw`zEUn5^H4i+0eYSZdV(S5w5-Lb84;w%hBt6i!tEnaHo2=pm-6(4~zYDI2^ ziS56Up&n7T!E$%G*?-@(#c^f*;RPicYa6sR@!?jfwuVkdCh*lM2Q;s(fnBZdx=T34 z(8Gq(oVBgEqt9F$lV4ZZYwonxvGq3FDt1HuC>c91J5OriI1A~7NYxoKzj>>BtJwLh zKRi_GPoyonycFjr|Mn|8Y|cN#Y(Aai=pIZG`-Jq<3HFJ;Q^pXue?DhKp!6Cs_pXhu zjkMoX9a=oSHNl!d)77U1<@@uQJ3KWTg1T&E{G8NRG^5^fO|HMpvxZp&3|Om2dd7Bc zMa!sVRH|V>eU8;@E7E6{^hHmvIdod$QM9(7k{}2 zVo+mJH>tj9ob#7?Ydnd_!2YVwBNeFLgkl#fKR#~|Jver zX-l7qyg%uX7%!U(n+yCt-&DuEa?O8Wc^34JEi?X9A2b!Gw zOEn3=R4IGU%n=^t-e}Gt?WT>b&ikE+cjW!P7QSip?4`b{yCV&JP^xii2Fo;6sC)$F z?RV*ILVH|Shc-UY3;pR@rZxBrqEUE0X^ggqmf^&N)bX^Ih3`QF;8eu=#$=TbNZ*ii zTXd{Rt#P&+o0~Cz!T3RIa_^bC_vWn4v;QmeZ=*-v%)V`U60h|vrsYGxf^Xx{IgImOsB zCpleAeLiM)ip|5BAS3eYOZhTj+Dl)y>g9YXYx53U-L0nI@QgyW@YEcfLv0Cz_jd5t zzksu+WOaXFm}9ai_D0D~d@zkOz#4LGpVwwH#>SqS|E2i;V?a#r0*688$kbZN+j&_v zSFswNW{*UF^f&2_#x{N^Q1&qSD-M1tXMQB)!`}F7)5r9a^iPa0Ssl)iyclJ;UuH3~ zUUqHY<+mj{@D=31TFi&#J^lyZ=iHn-@P^D6^L(_uabpQ{j5zk~6ZLyrkryNHY=Mo< zK8rs1TiREj;@<^)4rE~a=n3)HsF#69A-ais8(3T@x(r|MpNn$QAbg*E+Af!Y4h;3h<*0aY) z=gNHzf?vNY+@x$&$dffWi&;9dxKip;Jm|sKf%(bjPsDq1W}l|X@4_DphC`ztfOk}% zDSf4JCED(lsDpaHU@=LEGp}M4KQ>?PUm<&@O z0`<#Zq`y_!a?Jk@Dg7>OOYNWTPxPJb3-^UpcqV(DM#V3hoJeP{v&SA5-rd5y!mpsN zS)R51K@(H9H}hEc8sl@Vf_CMZ55T?jjO}clC7AzCxk0;nO!f@;S&(&z%iZqVdWJ^C z0krQ{5nGJzMn5ICN(FqPvk^*_%zQWx16;Nd_LoiKXWcu_Xyci8QQs`)uD|)urE)`r8>{{ z94&JHCbkow^JdoKa&!%DGPwZap{X2e#%YTfl;)8=B@B7$;!_G2$ot}|z0XQ@L~nqn zB6q*!Ail;K66=!o0Bd@?r&KJIdU=>j+vES4y6yles{21j*_qj$-JP8sK=j}a1Sug% zQz8CBQ4keS0Tnc;oT6Ax5IZ)ShZ+lt4HPhzoFyWPXCOI6LD^|QZlRT$_0tBmc?&TsigbdX zb)L$;E%J)*@|;&Eu}aD=CxPd@AiKo87w3QJSOInJXgr6ysWxS6hhB#dMR@`?Y`^Nn-8iCfnDoy6WF&0s!)$N{d`1u8yIJv#-pg8B?=Q%|a%&7qDr8}p7W zjaf|ok2BUD`>ODj@n7!9)+67CJtN0AC}BH|Oj|6q^4v0^z2`uCt_y#}Y@x7cg2(6u#$-J{=#uT6RQmD5#ZX&2l(b-lJp)LNbG z5s8_P&78qP&#al5l()T~?Gkf0mS=5G+z|MBlsP=Z;|e1r4o})+9TD{c_i&BRc_o9L zKZD;_6fI8m_2Km<220#vt-IS~IvcFx$o;SEe+Tx@URUxLiL0<1-<8fC^D9FkOu@7BddL?J!n8Ze{b6;j(M%zde z(pHu>79K6dhnX||v*=mmbjHjJEj~|uY%y(ek*!%eC$_qHM6lJ!-r1P*rRB*vsdr5* z@qWY-HD4SBD%5L)=S^SLB1h%!8=xzRdD{x_OIzYjZz6b2*=#$aohC;xFx^LZvo~T^ z?1ST-(jF#8jh01qe!19$hd}<^pT8e+SniZ*R{1M9dc(HUA9j8LlsY{ zb&03K6$V%Hj;!^|&de)Ja?n86g(X{S34V9Kukw|RpsQi%)uL=cqlR;D=3a9qC;1k? zuHI92^=tSJa*HB!RzpX$4J|fB0gdIF&R=zHkJ7%(%W-!+zY>(yn94L$GFG$?lQfQk!$h2=Y@YTe!d^I{;7*> z{u&VeCN5D^yxU+Xjd3l0{!Z7%zKAWOa{=3mJEW#m>^;xc$F2@6&Ty2#>EbMvxp+s$ z2HQt3nSPdaxuc{ufbY)wM(sx&4B2}$5#gW7(_Zgd6M*HDEzd|?q-8wejr$EaIxw!KSlLHG&E6u4#RW!q-w`vjSfsd zCp5DZ_T(<#%0uS6we9_Nq88$#f<5Qztc@LUCbibZ6N?iKCTB(XJnlb4Zk+R8Z4K)E z`9~#&d=2c(kDbee_nBMlh8bR(uHaXTEioFh^rP%Y*@-wS_ORFaX9#b4hy*^Gz2Vto+Ig>!`gXS31(Efq z;@oOEL+ZQ#r2k`T9o1UN-pdlXjE))GTQ}dW75nGU@PoQXe-_?n4+47tH7zwqy@$4A zm$}En-&Zoc4d|bK=pm4A^@(|N#IDyij9M#syDL%e-7ekE>{G4PJ{QKdpf`0Fz0Ev# z$|=>F@I!0@dwkRgq|{^b8ii9mAb64xZh5gIYoKMyDmfB8uvyY zCzYu4yxMOR-AdYK%@u80h*;;l^hnsTif7wL7nWo`>$o}!F6)e6Z%3@g`eI+ZLnZcd zEOIpExrc;S7lKwRywUPG>0w~n75@n8)Y+7tYT_Xc&IzV3cwubkp}YqyN1n-tc+Rlm zadK9ex9G7ST=->BWwR~*Z=~*pd)|vaDW#iw;rZW~IQgt%rP#FG!(jCDDqEttGobi? zaxbi(zcDepVUKTn7WTw@%pCIx!PlmD53}7(&TgBtTX>&6K_k;A%kQ#g?~4+?`f#vX zU(8<7It6kguh%yN$3w?M_T=}N8m$j7(?`dYD#C>(4+2~)!(Y8!HE(DJ=KT@7Ue9fR z-d`?pRK}y02X>ytX4HF7hyELfRfEZFdJjuc!=rmn&q*ybIn&6scrQEMjO-x|ATs25@YkAx!i*yQuM`YP70ca{+G6lkre~&S^!ckbwN6LW z9$r<_5$J2kTxn*SY;mn^wjf^RYWul5`>nYn)}8Vl=?5)z7n-=`Z2x8xXXsn7amb#) zbD-W~e)EIEndUopde52JomVA#5+mH6mV2`!g|En54}EqO18FYv$CX~LJp0iE7CP&! zbgm(b9#zH)3ZRGIy7U2+T{7xyZ%&#U|d>)9Yzs zZhfQIjbFJSzQp99Pw`JN@zq_aT8UloUiOBZdDOzW>-+;vvoMK-=RXC%JKz0_*#FPK z{$CrZ{0`%sz2a*O-#y?Bl3G62)^7EFF!jTMBReBI7I#8l<1=7A>HGRV;j_1m z+nQYMQSMPD{yzs;1lo?eG_~JF@d7heezDs=SInz?Q4r8#NgJD9+WHoWh?Ae>U@#YNL0*-{x?W;`< zW8woMTNuw-nOAiCD&*CuL>%Ce=uzVr93ENUd1Tu5t$&YLqTc5#ft_1D1Mv-gR(A$> znmUcK@S*hQ8yt&IOI#ow|Gx+EQY{m@WV)Js+^UT26MQsl{h$*t(@OWk90V^FvAN4Gi5?c>b8^q@ zd8A*a-mzKCD%XVf-qFZ(AwU+hhj`f8XS zz`L{Yv1|O12fvj3PXvqg1(8CjlCmVSI?SE&DR|>)@FD&WqEL?+g#3p zI;ekQ?#UEL8_kc5m2timV`cARHkQtF%}+g4%J(_mF_~kGo>FVkQ(i@A=gG21n|I_m zm53X2jwkE+yEdza7o}-nyL*=DuPo2alRUy*(Bo|~f0ys`ebrjkYYi;g{`4aqYhT@i z-Rt}9m^s(jKcl_TroV>%wYDMID|ZC;!*jSLXL)T*3BUI=_;hNm>eH%AcJdXX$KNoz z6*CD$*Yi1>@lVHmK8!vzm~v_jUA7T1*wETJ>5@GOBgkRRzm63U^FiyH9Z{{xLAOiz zt;9mn-yad$IW@QBtdH3}Q0GAT!#F?l2rAA$sB9K^kg;pv@`+#2gqoAjQ=gk&McUQE z*I#Ea2g>SAV#Q0%7~;%c=m|YjAE~wC>qX(wCWd@(&iW?*6k1hwNWFipiMQAJt3;2y z0zGnHp_k+}=ok297UP#OSke!FORd#!{VDgS(#*j*&i2F%lx`WT-yaDcF|u(-R^=dg zCcnkZWqn^adYHg~^VtO2`xf&qwOqOky*Ap8^~-F2VE}3@Ros3i>~^kctITNX7NpUa zr1bcZyuyMW3Yo9gik8-9{~AHLP$*~3k)kXWgd8#m7Aa@<%~^}~{$ zEBp%Mv%iq5lJ{+m&+GkX#D94jF^7qWSLl0DYjrQ9JS)>!1FY@9mlAzmxoDcPC)bCz zZtCF7!Ghz;9*x`L+r+n`4R(LN&et+|K$ch;s>W=)dyA=Atq3m?+Pe^fp7Tv~+$Nj0 zeS(~IrRDs(gdICB8fSP`trgE+3|v9JBmVQAOJHjs2pf%FW(~H^7w-;jET|%EEwtSV zw0$soj=1L?1A3i(M*OJwp1jA3^r7OTady>AU*Q`wracoi=fB1GX|oMXUoU>db&x+} z3l^J;@wb~xygWZO+VoywUaincS8Vz~*j#chq_RKJ$x~wh!w#@khc=PxEVB<#<7m>cqjvY5`RBJiI zu7^37ON@?n;149`s<(}AHF>CY>5t{yKEk;zbS+jxT3t@XU~ypiYa+;(ObVV(b} z$p25k*NU*DwG{9WX%JvC>o62H|x;gi;;elYpFUx6*4WQd2jalOHsk8FzRWA8 z*68QNY}s|5ozFfdQLp$}IL*Yk)+Ml;h82$%8`bMyc{-qrB^JaxrL5rnR${%?`;W<) z);Pr9P`c*evI?P3+Kor$CrZwdIi`0@SS5I`%5Tt_t?i$C!ug`tMkBVf)A`7}J9+JT z(zEEz7D5BfK?B<{+fl!J^PsuWDeJ=}#`olWRecxr#aR+dq#d}qgv<0DO2+ zq2w<#;rSDFP66-8dSkxt5UlUbSzf-uA8uk|t5M6UpECje3u91}A!@B;8fz7_{cyE+ zn6XRS#*4+<45uNki4C-`;NE8*zj*dN@@AID74uA)!Ba;KfPOG&LijM zsQq}AM-_f2ekJ5{&?{bJ-qDeHPq6)Pw*5Sd=hKkMr!-ITU9K&i^OXDrW)}H#p0$T( zN0$ig@j1lmNRjY_T}~99v+&5+8c|VI4N&)k*%}u>s+n3(0wn| z{rk73?v%O<=FOklV)1^KbZdM0SC}%IoZIFt$_Q zH0w81jD1EaUq1`_x5oLsvOn=#Tb*IXmRKC0o#*>fme%{PBIn}!tn(ZZwh{Y> z^6E5?s2ECytF@AW!2U9{+N?BNvnBZVpu%j^|FzJyeYNj++Z^rlvIeqmNp4hx7T1V% zYvT7oUvS2v&T~-~U0M46@x>FAtiWBbOJF_>%36%Ig|Wrst%^<*-ai3yeuO{5(CUDY zm@uJp3=T-G6;D-1)h6a}UCQP+2d2*wzheUYj*8IAqG|raQtyXhmB6C0^0}ML2Uqg; zws>v}Jr6wxn@Y>)iZCsDVHarT*R+lMweb!%w#0bX;@O_)p6HI@T|k}>$l5-aWsaqD zWUn#9OWl`RtNSX?S!~QZ(|4NOJ$vwV%zth6cQRY*Eu2*Yre|wCJ~kYS>QwcdHHFZ~ z(y&bRc#o5aR^XYrpO`Gu$62xg^?tO)ZsvL?R1xYvZNQ<~}z$tRK@q zN}dI*0PHe5gKSf<$>fxm2bW4dw;IlE8UE99RjnackFIo%D;p;9aERL()!E+(?+n00 zm-)6YwLE9B=_pO*4Up^lH2n_YlAHhY~8|>nS-Uajj^>K5M$9k>3laW@|HR% zpRuzB4n-}!wiC)SUm4%Ctn4T8&54oAdO5w%j~$CU*D{qewD*1ZllVc5#XXjO%*exY zQWwZ~xemfw4Z7_G zZ0AJ12YX;uY-$efh50EZLz=+{Cq1LZ2Qetyga1p~()Pgg7}39@@g3$>wQL!Mz433k zxB0;p#;14*SZX{I+5<@?7^N@YeSGPn-V4r?U2JyC>=ZtFzC@^PdJE zRd_Zh*g4f991P*8D4l!}L!yKLOc0A7J)_xP?T|6t& zj9M!>@KVuY(sD-jaD0a}{HNUWBEwme(9i2<>>0IIdaWw@BWNjfZo~KM{C?uUqrRfW zD#zyRo(P|io`NCxPHpNj$?4OcryZ{Cz4?L7`<&#A5gMbuyCWECY6TA}9As*`+QyZV zcOab;yg=JXBMYZVoPk)xG3M~{eW}+tA7Lcc7~u|_MjPjxnj0uJoaFJq4NN`E16ix% zUd+E}bneRZQoLj6ybK!~eQl;LrEO?q*L?~@g})$vfN6iOj~~!X_gV>ilENX#enC=DU;RUGPZcafX`Q->ZpP!>0$Qn>a>|GfDfcpB&Wc zpjKLslc)4qMed6tSC>PsqAcCS&AR5g8oj@(xWL#3EmIc1?rPwf=(DYH6-ESOTvdtv z3@@tM5}yAr-Y>=`-|GF_=--CSDwStPL62Iinx*^D^P=gzZzSyiZKO=ehB@ zs!r*Db1*yj2h;1<5xvs--G5H~Y-07x1J&PpG4_UDV~P1p{hib71oZvs9PYq$S2^=8 zIP)omouzo4SJ^AJe!<=8i;PZr#eK!}+V?`ECV7oCPd%dh2wp0@WacHQwcsVTn1ebE zty88Y;@h-yw2!c&XnU*A@=rH0_S!_w{jBgTgSk}azii?azotFO*-;nN`4%g6MRA4X zVP`y)0TynZ*!iRZ-j|Lu#9?f3+tgaglj>|=k&S&I8&@UjHc6n`&O8>F+gg_ezOCWe z;@gu3jy}c?wds}QV;aOjyZ4b3Z9~=@wL-Nm+YC=#$nC))*G>2yw8Z09x zZTq{sMgJ8aneu8j>OJ({h(9?O^oejFbYf2ARTjCb?eTX;zg$;Pb^8;MBRC{;h>1x~ z52qU&n0Q>;k5Fsnr&Rl`v%JUM5Z3f@#CC;`GYRn%y@y4ijoD7l*!tmqnSL3iLot8N zx4p*fTkM8s5|^f9#`axqM+c#{+fM{eIO(7E4P-}I+=cV_F zj-WnW=RI$HVb1;3`{BDpc>auEn`8de(6q$6;M+#-@k0N@5uf?Vw|N9&VQHE6M)Zb> z#T}BUA%6gP(UjW@aQ=@+k4MD9t;8OFbZxECiW0sSW5xe&X|Y7s6fC~Poa|hYC(N5n zLCu@aN4x5Os$jPn# zRuivSAKJ63@N8d9ov(T>M32PQMjhqaSk@Mt72kb3&PuIC*96B#-^+f!!+!F`-0Pi>=J3?d>;|xK@=2)Ne6s8>Qz_LPF zLF1|+o-Z+t*$@!t#Ek`cum3f7o|f4k>f9bqRg3g<_vFK0l%ED9}F;ZAp`sa;{ui`MVs!e=ChOP$O4l{ex%DZ37e4np2p$uzZA zGI>*={D{qncl8U{7pCH+H7?`x_zvRCeG~oTlto&PGf#I7zXKV*%Bez}jlbnpjtD;x zdgC6(#5QI!F#VS7Z5?#S0rYEd&+IeW>ipBxIW#8fK&rx#Vtb5$?NRUlNo4OM@PoR< z@0dJhMWMpf&5n1*o4&mA+)1*BQK0!7f_dU&-i3F(y{P**fTx`qXkzC7NZY*jwIT7N zRNQ7u%I5OQb6<*_`2uq0i^M$lwb`{Zq{OVXK6R*i;R2j+!2B zPQ;y3z}VMu8|Dji{7|hGZ7^;|ewoqq#bs)Z&yjcD<{Tw{CF3f8Phbl-7HnK}S8kWk zA?34LEBVaYEz$<_Uk?^-pLJEL%GjdJq3iD~g3O^Dqs*BcohJI1^0`}Vdx7iydnHda zA2i0A2igzp32Fc)C(n~{?`eojsAqbW&w0m)JRbsiUY@&EWY;Z_U7QOnHdSLolUl1d zd3o-y!gnu$@20s2l>ZKSwcUMK^aZXCz163iyY3#Pdg3TF4?lOtnKL?+#uRFR0 zeI@FJtNp*3oMuJnnK}o??RlPz+pD$G3&&P7TS{7g~I+#ks}CFP>hoG9hv!@%1Wk7uDI9l}(HL?TLT-9@Sdi<6z8d(|p95y=(a{ zkog@m<4kU}OSX%tpC4PI`6s}?Juq`b|LuU>t&Xg;Nf)vrQUvp!SXIRh{oNYm2XgzZ$7vwm5W zDJppjAAC*0_Hp+MJ~9|<*MTqiUdQ4L*{{U+8iMsj(RPC!I|2$yh)3=>jrG0Y7lk5Sn!`|o9@j1#Du&;BBEwQGs(f9~w2WJP`4(y0| z&6>xb37;{2F5M%AK|whXxfZXcZ>F!IdFEj?&u)+H46KQzUPbDlRlr`;yf!WMf6`kG zaRp1|WfRl>(EG47Z?rk^4eVUATI3ouE~r|oTovzVa_QZJR)N@2q${;nbTu+<>xwtK zb|%sK@F`Ps^+932#NVjXS@+8`oCgB>ck~~T57Y}?GF_mHm8?^1+8C92@xFSDiE{0efKSAgWOt%;M zX@|r5G5pbBq)(8zqO!e-HKhI7orRsKoK-R;axWD7VKVY8H%M)as`uC(>^3-=_5O!) z{`gsMdu;PKv!lCAPPWFGD>?=7%z*e*BTHw#2-90MU#}^}sMo@tnGIUicYOhJG_-AI z;s=&F-MV^GVSj+wlP^)XkXAO^GMPsM>7SHyEL{9uSQBh*){H=cm|CHP} zF-YeJw(pPmS&^TRKl1~N@zQ|khmOD1y0tEQJ#LTIE zndXuMqJFQOqZASR5GGru;eHEC=nx{s>G*PvZg z@4qj6grD*_|54u&YQ0Qc>vqg$Rrl4ju_Am@=&BZUHP%(RHrC+vj{AwdM4#v!)Y7xI zjkWZRz>49XiFf)@;R~T{ey4wQWphodn=pq?eD;id7#UqjXvWjsbj?~Zlo!IvD>9z&i%#5nJ?!V#J zE1m_umhk2-TsE;-c@B)h*18Hm;aS*Jk!$mDEAxLh^@pQMF=WO)<|gpHpUv6W;1j@U zAy0{&16`?O=GD>K5-ug@$h=po0cZ}sQ?dQdkcXjfYji)r3|TERX;%8N{PNNS#JL+$I%s*zTbsa3Mt4$K0p}&7P^6y$Mec*mz>;(2LY8!Y+{#lbNWIm`B z-j_adulNB)tN5*KsPKzW^z9&>XfPHgXReceQu<#Xr9U#b9BQrf1#uneQ_#-;JA4go zs~jHoHu#72{+W{7!mE3I3jIvo+LZ|$!c)R4M7CTG+48FUs_D~j8@4q$)8&D!{r)&H zS9){!Uy=VjlNH6AjE>vx^b_8PTy;8l7fLLBa*^|kw;P?c(|tkC;d$`vMC1^8p0q0_ zx(eCRt2FMcch z&h1*~_}VpCEgOyY0j;rWO7~ z&}8tX7df_;6kce*b9w#4PA3&s}4ie4c7tF@BhT?)TQ?v=6AzUV(?u7~GS z5w4Lq)oajk)!F|O8GbZmIO9B;_xEL9kXZ@)V9Tks(x<6R%HSXoTUFas?b1U<*YGa> zR%{fzjxU zI%Q}$LUO6J6^To%eXDMfiWQ%T-(x&n)7}8g5!SM$-nTQ>hhat%Kj&RXm>^5P@+z$7 zWc@&&gcF)cT(5< z90%T^jvE0Q80Fb{wMXZV&g_up93txY%x_F8J&X-C%9fpErm~K}lqc2ErE(XfljmR`GJogb`Ol@FGqdc=i#rU~ z&HTiy_6g8m`hM4;UrFbkCl(d&OvLZ1wc;Jlch)w*@xZgyHe1Jxl^d*2(D(9J&(Bw7FgSo+{RwK`!Zg;qmXlM~5TF$GadN7kl$Lhe&$!VgK-Rs0(1- zuM!zfz1h|2D>T^$pLY$rie8{>QENp@@A@x`t@sS)Q-2DcrEDS34ob{pJqgA?EYw8$UdCt!Ks&U>kJ!^Nlca>rSzc#6L znezdTA8>TW=D9O5x2~DfU*sq81P-Ju_B%1ewCq)DC3}w!jyCmdr+F+ zV#H26WbGb+Apja~;jDztVx9jm{1&Mgu}u?ao}RKfqjl-OiEdg6-89yTVlUiTm6%$WD(`{9>&iK^l#+Qn|ru;l7b&8<} z=3f;3cdZ;BoGJQ(=QFc}H+~~*iEp!;O}*TN{LQB4s2}PCG+nLpddQiOZjT98nOsjb zYMwQJje!lo+&68}s}O19-!i5*G8$=gN-i6lc;k(p#n`OPEtluNfHPkM|C;va8}P6H z6IDUS|ATOY)R3?ap--Wg z=ycNOdAaj)^g|mEYf@|Ozf%j!XMN_!=8iRVtJaEc-%rr|9(RwqQ_kGfvi%eH6BB2v zDcTu@w-+s54duE1t;_Q@I6XyU^~Gn6Px>6X+qKR70I-Yo`OhlOD(d=SCt#mo=rqEv zc&4~d#Sihc)`>YL9~J&3eQ@;qZpQp^O^59Y%4fL-vZw)+t7+iEY**9Mu_ON3(Ayow z?#=Z+hZV1qm>&CoPcEEna*LCr3b7gJzYOz+nYz$!rT)8~@U4Ext9f=U@VlRSpPJc) zYR$W7hP=O(QJkl&&uU(1>zz8sccWcF>HVKu+WF3d92@iO9!!w^(B^p}^@NH4IBBa3 z#-zuX_~hW?VAE$YAyBof+$ZHcb9t2WHNeT#G{4kcYG`1&|Geb5X%AFq$BP{}4mJRB ze#YT%S$9_fY*OAMV`yJt*1SH?nxMwSl)A*@O8fCDwtBB3y3d#`{@|3r9Q?t-sV-$$_`sw@nR3quXeFL-ytAKECt)^Gyt=B0M1H-+=Rf zu*4&zfoUmQOV51qB%CvS;mBQW_OsM0n!31|z@X4N?w9P#>Rq5m1_T2P{WNnde!|q8 zjop>!Y!3a&=t*-&^Fll4VqMPG8g+%`A~q8A(QhPHqimZa(*1=#se|^!d&SPj*#bFY zqdD6NfyF`E=BWBc_8QEK$A~-{Ie3df3%k-RVPxhe|lo%|Y?!3awT_ zr`MtfO8?fp@OimM($A~KSB*{5BQW@=UccZ0u|>JJ#;l#)*)cQE`0ovw33!gmt2!m@ zeV*ZpY**v!#kqf)JV>2StV{F`5A>R?M8CGyi4CxlwA`*w^hDeSOszCdhjR>xAENxV z=D^FkOW6S6we7LReylF2dmoM(v$mKKK%G(!UtoKDkjZ1tcWpmDb7A_-)f(}}DrNJN zhAAr;-==Iq*)?Q-h1qjsDc6ibV8lk$45Lf%7wz0brPqvl>fecXtn;rHo8c<(X*OMD zYUe^XG_m^b(NeL^o<&^{=4BW;b9?%B6QA!H^^~~oIHzkTwN^7^cLQrz`A~?@7FFzv zvZyxN>~jCKZTba`I0xnb*7>twuZGS{=(6tUm7{!S{=GNmVv|nD7iY$*R`6_mXEy3! zwGVqe>PWTBA77XZeo@b4|L>F%tv;Q=UB41G1AT$%xJS+c(|8v*g*TZP)XvOKlZ)w_ z?hET4dw>nB){3?{kKk&44%t$jwSBekxwf9?5dV;pAKJBYA@sG5Z*)k^2E8u5TkJ0S zIJ1gXhBoRjmxp~8e+OS2Tz0U?Tk^PCD<9`tU)z(HIVWSzEMxNIP2gG^TXaBiqB*O; zpD4ZzC>VMCHe<7NW)MRm@8!SDfRvnl2ar9 z(kInE^=+m5x(oMJgNd^Gj?j-Rejh++oVN>a8-2>$x0a1{{)gfZUW$H@K}gnVSux6C zK1juKTW1xn0%>EuYx(YK|8&^Zf}6c@WeK0^73c`HR(3*{To+TD#JHBOySOwxRrb$# z6m2IZ2XN+&jl&Q_M#ojy1EqE4-Dx|QWODHhIcM4}>^Il+qt=Rk+QJUe@pIRAB_}l& z-`^XmI2G@rJhxbC-WK6(BmC30!NFz9KJNfldKdp%;7nHc(rY|_$FB_?6S4aK8C6fq z+Gh3+>$|9NbZl_2)4|tsggwO5Y+UHN#4Nc1u#LHDCh?6kgdtwneg!$cO8lSldsQ+Ep|$#RmSvxeU#{dx;T58$oXe6FMA$x2h0hQ z*S;!#Wpvge{}JK$tDsMJx)zU`d1_53dn0Q<+)}*7V4>Hbe?iAOI%a-A{z&;;^tH8a zT2m+&UCF)x#$9zxzB+H?65EP44z|X(b_+3Q^mArHH%WvJcekcs`&Ou5m@B7#=^OPm zF&x&@Qm%3?%<|weqp!Oqu;2fczZm`a>P%KAW?>&1FO(bs<=b1~TR>A*^r_Y$V91Bf zu8j@W`L=KCko+OAITc-<2n=fSW78ndIX5D<27Cw5^T71yB7Z)EzgFkJE%}AF@MBe_ zS*YjXbDq^ye4lsSfC?Q=|C{2U#1|tyvo21{u5qEQgC*`tU;ZuR{N%{arJ5MuDZXJ7 z@X~MdZZrL!YOQ$uaj#aMNz6>f$F46u=Zr+1?Y~PiF?Rr;FmnGY_TEd-P5ZokUMGB? z^%w&%=a;>W@VlLBvUc9$=icY0mhVOMxv&NU4jk}TN15J=%k!5TAG|l}b#;C6X5GJ4>QA{e;AYh$}TFWosi3E~^xM#LqcTLHpFl=8lv47V3)?#Uo6;V%t(r zVmsJBy-}A%J<Kr2+P7UEuZNF>X_|-qVnsH#@VWM3+G29lGgz9miu`V@f`MZkw-{ZYOQGR zLCgx5_!VM_HHZ{y8>8O;SYnbN;cqKE+uuYS2`#J9gK6THr}(3FZpGV~z+CDUJSZ`9 z6|b{BHT0wPbKc6dgxprROgTiykHkKSo%KMGy{kNhN+*)oMVZqT=l@W_>MUY`>i1G> z^dv$$WRc(e+~sCrUnLCVu*P9|J$I2kMt@ zn0-wB%Xv(*ig$~yr)|(ZYkM&U6c?KOV|Dg!vHj*j4m7&<9;c&+g|RH|=R2uC6uS=o z-Df67w>=S?>YG-$bKqrQtqd^r16Sp2f6Bb@T@#CQ3l_^|Vq|AVH{{DC?nk>~T~1>e z4fbv++TOH^aFpEXNZfnm?vZ@%ZqW9P#T$(-=vlC}tP}E6P2S}05}ytNpVs-R?wxkR z-q7|qY)jMyu^yFn0vjV|`W7STCiIPx4*9pe;-aCkicr<_vqy48(au)xRjP+9fTvvF z=E2X6ZT)0bWM>_&%Y7iam3+4WlcTiEtSNpi^(5F4Fcaz|J~J5m80peKA{~0p@L;%! zMUx-3T%8yVKy99yX>uU2etJ5e&iBFJqQ)MG7`A8m<;-G4}YhCc74{F`DI zk*?Nxwl0*|gLsa6Pf~^&~3OR1dkn8aFKNTCqMk4)ecFz;vlR9D+Fq5^tw<$PO{3iOd ztf%GQc7t8rKDyM@IgBnlUCCbXGV98E<9rajfiHHm?0*jSzu8suXNd*HSf>ye?<^&VI=MzSIMPI=YmOQ5-Upc8kQHjJWFTk9Uxyvg{_GyvdDBm3ocI<$;==`Y@K?q z-uP}i(Z8wba7cQH>5E^ISM%B)hg@xF`K!no<~7!5*Bkn|vZ#F`^4bSdW7C8=wv&rC zSI+uLZId))Z2faC%4gwOAf8&nxj9&Ul@cs`J^$jSpb|5RXFD?^S1~%Dqeh zuWgTyG`zMcR@lzpLochf@|{^%ply=X@dA-`lw<9qPNi6o*JE6IoarSzCuRFeYCMI} zN*z6@>;;LjKs*C~yWYeJIs04t%WAFYdAqaQ%n0ij(8f@HXltJwH=^g#~6XE3o53wpfteGhus;`Q|lzLoenjty0nHimqSZ)MTXs2A1y zxvlsF@H0ba1Cbh)p=W=L;Pp$%M8lenCH{Mo#LDDY(xLQ!Xvc7f)X#} zgcmx9?No{1>g)IQwXM4{fqTptS5%S}>{XTPY2eWbwBRa+82*Oy`!=N_}c<=mM_#Hvyo*}XE@vuXx zqZf_bZeD0EejMX7cO+!~D(6oo4p5t}HM3uxs5#DGo(WpAak+uTfkmZ5_cp0DZAGWq z)xNa}TjyGvxZE#b3esvbobCIbt$$eLFE&0@L)z9#1%6;+XsmD4GWq1p$(gx$4#d1e zyiKiVw?g;v-Fb#D$8U??e+znlzN_Y{@ZQT3y-{ntH757kCZlH0_58oC%?2S?qIv%q z)bJ}_rpC2MPY2Bv3;A|d;Fiw zSXv#DK0;`c@?ngtW^?QSoqyxlUi;zMxn}=v!7XT6G|IF7#qz+;cRL($Dt-PR! z!~`3Tzip0td7#L%B2QI9UmtE_r`sLcr7fJTkZ&W?Cy5+pe5Nh%44Ge`fBjxyV@l(~ zMiYCa?W$Z zsDC&yb7E#9&I)^LYKe2uyjBsuEx!C)Pz;zUFFgW`X|Q*U7}wMn#8GFwy{YL}&_CDM z!;Za8jh>o=lgDK&OT-H1yS87c-naG14`-H`xc3dgy`?%Fud+H@C%)&4xc7l++po0K z(e{kz%*l5T=#zqdopIqMkdZ1@yi?|MD;nrnG`0lhzbIUqJHX@b2JgymIiM5HQq;D` zUBGS7HaY9PH80Fa&w|WUw&EGFmH7=BJulwzz7OpTrt)05$?vN*&Szs&)Asm%qc=~; zY8~V`omzEjrEP!@3LA|b`)yXmk*Jr;bNwaHdlYovyQod#oqj5J`n5cB18BI$QL>b_ z<><0wMJAJv{_6eJ%*PoQ{%Y#Y&IrFTb>Jrh>xsN@8e}8y^f;U?v0>+@{#UBka=Zoc zbc1u!H#%VKv1_uINM3;REWRmNUEIG}e^V!4@6Q*Tg{4;^Q!`cj;cWw;t6*)g2M6f)#+dPM}#`Jd>L(}~rOd#pHlq%GF&%rx# z)(P`jlpBm2sI}VLLd@)e%U_b?{KCG5}SV>WHeHwxXx#C(bHbyn+U&i-{*sN#wTX#q*5)JRp4E z*iq~O*R;K-xJPm;WAR(8C%F{+Azdv(Z0!%YcO*TW^U~)TyXz-k;U3Vp8ee$K_#KSX z>iAMsWNQy7=XqA7w^f+3Kz^jGcq@^+iQMyrh9}{Lm*!VUOqFva%iVHQ?=&fI`^Qrm zJI`g6^O?!NcLs)==2Oli=3UGHj>mY38HUaT{H|Ineb-d5`#B8)Gd{w~w2hf836`K! zP02dOh;+=bb-}(1&!1;PJ>`Xg#4~9deCk;|%w@TW3daflSC_IMq;{8ifeCq=x4k%f zjXdXKJZp9QnyD9B=h+(RliZUGU9rwepHG`a-Q&l(otPVrI%FKhCeQA(#+ifrErYe` zNX^L%teF$+je1nlHs@w8j4eJ=qu1yS$9Ety9o9v(#Cj&yyG!+c)S+H3ZQ{xGzQw3N zIs2l_$~gx)(}l%T98KG^inccR_3Z1$<{6r{z1Uy3{JN#KD}aS1dz+2DEl$~7{04u6 zi6^MFx}$nOB|M02ddr+kg_bDm78FmFcoDg1R`CoYR~HspJE!tZ=O$#`p28ku>#i=o zZeqV*M?Fftw}YJpF=w@){u%kBgUi;Ibjo1#DB0SiVHum}9TOry009%?}^gPKKd-(12vb2YtC`jG=Cs$5_+S}kV?!B>lNEsZ(IC78f-n* zJ(A`r({`m)4G(3SQ&75_asI*ad=uBY0RFPRi*+Ij8FOvaC$Q;hHPZp!A`UI&4x zTZd<6iVT?nIe$iM^~=eTJ^v_ZZEUbiR~U!w+< zv3lm32ZWZcZZ4i9wM>lF_e0!6(^5@wjPJ}>^W20wnO)v4qjS|->0Dy` zYB^Jz>nZ!EJfwWndww~ATOPQ!=4yFhb0|}D7N4h8@gY+m@>_Si=ocKJN4+^2G)%p@ zr^tA3=#W6*x?tp;{}R9TW|UwC%0d_#C$P7=M@4xwVFz`P$j7=mfg^&a7N zQsazl-{$N$GKceb^gT8J1Bz!z8)m+1aY5U77L(_1@VWTDJo6Em5hlKOT!Fb}+RRN& zBSKp*(ZTEBX}{yXg3X7XolS#2%bXK&(Cyq#QddL0&>=D3ydgi@d zY+RnTHSPZ>eqdx#dCua*hJNU4JFw1QDY}oiyMQeR9V)u|Q~0>#K-qt^E@$H~LrQ&E z!@x)5!o9{%Tu`*Qpm)1A*VY1cJG4)zi~X|xrtj>G_(WqrbPJY2rm1;?-?`f)mPk1~ z-W_jht8Rmhr+JNdO*&@ISwdQ`^~m=ydUI`wK*m zu+L7dTR5M+{#oNaj_wz5TJ#IHo4o3f{1D8G#QXjaHe?}?b8uiCbSTYp=>*8zGI*g8cpBsp_V_;%{YmFmyiI8p=h*<8P^}d|Hne=Kg_eQ9Je1fb z6p`~h@aOqCby>fH#cJ!1oGg77+A73Y)_We3{=nF`+Y)my+Xt$Dzax}cjq{Yq5avM7 zFPv{`8r!GZn_lvY@MrPYc0mCH@7l~H>YAvPssZ#D<;f1{h$`2{HouO)mh*fHcn)`C zo&wJSG6#O{V-jPej;=xHEP1U3{*RYX!=q(gc>*6}5bC=q!|9971#Xh&%~csC&sW3$ z9pl=({3z#mu{Vg7y3GBXk+B_es%GX;$kO%hdSmagUPYgIBXDf^F0`4ea#f}Nbk;&w zOB}mBE?^4kf6l~BY{hdn1$N%nl6X0A1InB&VBmcj)#K9~=Um}UGyM3I|C7P57?c`h z?DqYFztqBE-yh?^dOw`^t?7S6WU;Te1$N#R^KQE4syh3V@c4G{cthq%k)=H#4+o}g z%wd0ezsYme`;UlxCf`*>w$8k~ge3(T2>jkL3cnpRMjuDtQMX9VeWsk80^AR61HTv8 z8BA4C7sU3JKSlf{{a#N5Kb86>yvp6dKJn#y+|U)#%)c4C=!p18@e#PUvqFo-QSU!1 zHuGO#GjGao5nf|#kT(2D_$~T;1C4$S^gdFHXSJgi-cGtVm+t57iAKp9l zIBT{Ut6|NyS}WdM4qQR{5ySzQf-XSHb9!U^UHTgQ-Fkn!$rlF_*HX2|D@yZi>6_nP zv^566ArxDJvihRbMTQ=ZD6ABkSpi$6#;I(j;}WkXVy%sdctTZV`=L7c9gIEjuJgX( z@vHsLCg(B{^I^MU&tM(Ur|s7`4!T(L*Uu&vH`rSg+Is1n)HNY<1Gz-r>|Nr`Ms&og z`-Pp1*tmYqbMAA7*Vg53Hu3YF?z=Bibz=JAaoxHOjOg^Bb`-Sfg?a z@Q(B|YvFHdTeMdqzPB&aGB_UZMIB0fv$>K5G{kfuA!6ROgpVZtD=x(!Ve}lJ@5p zutS2xERQ;Wl)>iRf_V^(dpAJV?G7!*PQCxBsUK)8C`=yO8|)v{`}`60Dtta;<9=$G zi79cWypm~^z?`xDI6K|D)7mDvub}q!AaV*pBFD7OdrN!}(kJ^Y_+E^;skO4ZC_lAr zc1{BS;dabkB)_1K7JOm*s%E5TNX)7dcSHjXm?K zYvZ@o*;C9uA5L*rg~Wb0l0MlhLESMEJyX;0OxiHZ@UMrg=U`fuogMI1;mVSXVlUWn zvj1V&KVwbWwpVLq+y4lhd?h!$%Dv&O$W5qyc6Ki?{R^~FwS3-&9J>Dgu#}CT{9V@t z!9Mx9rTx5Hu-442ULKqyJ~i{{3u2XrqI^CqKFs(&>|NC~U+=dOnrRK)Jq`1ewf?Pf ztnZmi^hXR#zbA33f50Z0pPCq*ig%&k#M(=JRwKe)2A^bc{JO~YV{ne!-Nh{!KVe*y zwOBefUSC`yGd1o8{k)KRLGWjwnqY_9xc5Bt{3`lH?k~L0_>#M#UZq&XW$5)#bt9D9 z?Mi*btPPu=+8171+UK^s%}LS6)O4lRDt>ic`Z^OYB^Kqiqyfn76EhYkxyDJg;u$)y z_c~(UmgbTEDa9j4<2>01dMUocKG2!yL(#f#0_M8v9K;c&UXr80`}ZMdN8Vfr{#u!T zRq9kJ>$U}!9xBt7MlTPAup+NP^&wYfWqWn@B#G^e!n^-DfuqNaMmkN?e6I{%g6T>Mqyz zzD>&8dcqNbqM1>!A=d-fop(gu$GlECpG`QQtHP@czjVwzC;E}KrjPoM`nos#XVj2u zAK{tevtn=44k3ml-<@_i>&ClaJp=n05Zd~~SNx+*J}8Q-)!%|9+hi&X&wk{6WMpzb z)E{a&lLBpX&$JIaWIJRvF7$*1MqK*@hDM{8@=w6`c_tk*`{cJ6PiTQTEIKy(bIS*f z{9#;zd{>F@S7&WMZv%SX)t!2k{k+!LCw=FpjospIX5QB35}w$-k7m+nboxrQdg-LobOs)(?4VDl#K z-PE<&q`bw0W!_Nd#191PB%VOptHz8ZO(%U|JMmsvmvu|t`l=%WJG0=R;vt6i>iqrC zq3TY1IyV^FJJ~viIsxH$`6SftVQPBO4!WFJ@Lw zz&-v5eNhoE5E=d;_D~glW#rh@QXKm_e5b5zmB>l@>FaV!1pkM%BE*L3jpx&LS{~TB znS0Y#f3aVQ7&!b+o6O;c9v;99LDB%_%-a0hCN|PBbFt7EdF`Z>)nECHwZoaqW32+Q zqtzN`+k(ET&FkHP+9WL-Pe}CWRYjXb_fh8W_w8K8z3yJoL1XcGg=ceuH^6TtZBQ>y zj7Gx`QZ@gZFfWocKwsdI=yijQGaE5{EoZ26Z{pvAM|#9POnr6t=r0D}>_2In10Cs( zbO)5a|HtTbQ^W9i@n7Oc(5~AJq0RSFe#92}4tq;Gqz*N>2a__^M_5%{C3H*sT&@_+B{41OHFUZ z?%)UU%_%>(Cgz5Bk1USLDaEm-=6|Pqx#T7a&~bYc_1F()9?WQYRU6otWPkMjsG3_3 zxXp@BXG89F%G7r#C=T_?iJr>K5X?ebHC_&O2|yc;wW1hcI<6X zYt$wkaVv1Z>@(XT&ZGCdHdY)|x!g4+*=DGf%ZnKifOo^po~LznHF_qkktcAIM~4v*_P_IP~75d=@w=%6@|nlDG5U=Lfddl)W$);Z4S^VK3VZV>ezMD|>q&=wVE3@i2dOO1MnO zqJEnF)YP<$lzI%MAFDD|1_yGQ|CG=(ZD91SLf3>&dmNlvE1A3#_5kUVHr|4GrOLIz zk6V$b#ln0CiCZ3vxaFW=km+%QJ`lM<{kyoRYL)5Z{Il$z2Geg7@Jy6F(+hs<4W>SG zA9_Y~jOBI20ThpPt(@y#Cv{NM;p4C_OVfXy{~xhYf5LB7XTK2M{2aXbgv`&vyF*FW z$8{-uVk~ zRx*{w!E$H0nYH?Q ztS~6vg#PtH&(!mbFWNe{<*4A$`tkDUHi@fHN2k%DO&v=9x;#3SY*B8WyZF=x%jrzA7{?}-&wfR#M}3VcFzmrh0+tvSoGQOok>fi z!`6A*t2i)`Z(8cvKCIZa@oLlw8^5nxFdXNp^0RBR>ipk^9#L!MlU|*e`@sE^-HLdz1?MuSH%X8_2$awHTZm6{$#0nz-)pRHN~1@E4<6v^A9wA9DHo} z@p$KWhjN~Jjd!FmA&Et-eegN?ON8GqMm*%?!X@ZiQNHb)nKwnAP%o>s(#xEyOS_sF zAZo2XM~q$eMtN8r?KJo{qYKuD;y&q@kvAU;{vfg6{$*a}*#YM~GS1M@q}J*?o1^cA zkH|0W!Bcz}h+*VI?=I?l*@N0|%67)>dqurWZ2@4-ZE{Dp-}B(6f)xWHW?av1awe1U)ZPJhT-zG$9rDeuU8k8`~Y zjkQZZZ~VvQ!6s9eQWe>H?{%n3*YbZuQO)QfJ*&0K7w>d!@530^)}vmR()H?;dxOeO zEAd5Bwz9wIA^>S?+)_n=={6JcR13u zahSJ|lhU=^IkC+u1uI*v6>j!xz_*`-=OD5yIXiuZ2f~_Sh&|s0nb1CwPh_3HjtQ%^ zvLT-hpDkf5&~moe4y%f9Ne>R?Qg!}9sb}L|caMgN-9kTTcsv}s70K^H z`~0D&Z0QY0*wc10iYiDhIl(ln?4x}E z7?1gk&7sdk?X=<}#xvFIHu^rC$8;Iql)ClVU<(l2lwIAFsHa*}SR>D`#CMnjRkFfE zjpY|o7eP9|B6o$U%bK3GG(~sLw++cDI z9a0@E4mo=2uf!QLPxln+c{HD{a_n5lyVF0x)>X5rU&+-;Y=knT4l^v29wg2x*Gdl( zCqc{7Ykm7JXJi(cI7}+YOU#Y_AiMXqjCwcqZc67mX9B~Dxoqmh?$P1mBjdHa>8a_d zTd*JA_3fA~tM7VEV!q4;&SbF-7`qq|?v$LSof=Hi-UC$ILd#BT&cj-u37E{V@^?ML5$LlK-#RB+Tz@KwYA?6KeCQs<*Nyl-<-_~o`^J}lBY`WpGFpkz8j4@G#}>ok zhMbMZj)_kfIY}Gls@zr5L&v(fw^MH$Uo48+n|Z{XVXgSWtE_cfrnH_NRf;o@hJ0(v zS{>aZuy|PR>~sek9+~OSG?=UX3brR` zcZ=PUr=E$wz0jRvYF4M@rzeKu`#4HNR+#6KE}zv=BVrmcL0;qL#$W^MqTJnrt4`=$I@ zS6Eljcl1(9<%n0p2Cgqwi2ULCjP>4=-=gmR4dScXzu1*hu|Yhi@{mNV^(fcYFmNWR zmXmcp=^s7_-eo)Hn{&-P4s8G}H&z!{8#?KcvY5#)gfE1e29|m@4qW5fzN&#~J0F}F zZu+byB=Fw5C;ApwB3K@`nG0v2X8kZEfweT!#`K3up4$m_y6BrSXr{8afXC(Os!~OpKJ64?6ZmyiL94 z1Us&&%O+ZXg=Za!`Q0Cth zDjSLV@gn@w`s;M`v@+j19((9gX6^i?DT}4U+=r&sn~S!l0>3M?idXbb@lWwJy)7uk zY97Wp)J1iXwheyBKPdIvsAX+-W_%{%#!6?YwX#Ktqe~tf4k5B4p}RR>L!ak*f4%e$ z48afYbS?f^+t|)BWA0wtKi#8lM(?jlmGBI44jWQxMiS3wQvzS2eZIZO3Z9i(EBW?t z%Gwf3y``ocE$C)2 z4fZ0=tZmM#93_ix!gsz(;K&^ae{1sHRgs-{`IB$!7BEv=e1FpO#L|p_Dx3-NpnBnV zp-0Ll#&?PRNqd;N=8NTX&W771zVlARzW$T7dA-%ecOV~>zRPFw*fVX>^-XFGeOd)x zi$@vUu%}T!pkoy6qZ6gynYQb8po;3}yb!9KGIeOL*uKj{#n(i?@V@4ScFxg)5^l*g zpa->9ScsQLQ;fctkgqcJV0Wi8LO+z@n}SV2DVE!y){q(_$ z7>0SE+U`298pIACfPye4qbC;ss3szo)3&Tu`9?sOX8*RVfY!L-dz8=n1m3IVR<8&E&M4t@9yXmZllv;Porr zV?X2>wQLy?T8#age2v5mX#-3toGSD`7CiExa|~)iaL%tbH7voL%I+c`z z*q)%ZSsVMB7nTc#8)a-4%%szIR2A8tg@I)j+mLZB?Yni%*q9`105mPBHE8Kq&d#nB zo1_AEMSWCn=1Q>tmvl~@%Q@-Pt)F7eIab=v-|zP{_APbIwfGKsc9f@d%5Yr9*z9Pz zYtl)#%qL-mZYO>gDw87pJz>rMWxZ#$ zR(rn2e^O|Gv(n<=bfIDTXlkwEDzO`zzU+4~WsJ`uKOP>wfM+Tnv!?iG^PGBrv&fTg zAy0n6^fi8;^03bTO610R5YWM~8>!e1s%8=x3oG-lm^!`jiFs|DFT=Z|j}V}zSld@; z#%Gxr$c%V~scqPX8NvE@tFu>%Eq4X<@`&_^w8lEFj5!NT<+v-nPmM17yriSoLpD}t z`xswxmAA^=#bR%Z93-|Mb2^>fs|-%>$Ecju@??4{WAd=mQ|FuC z?H*hr{sLv-m-#RAm3Stx7ONtQq4AD)p6Lxav|wjp5Nlo6@h*&Q-voM2MIKVNbo0BJ z8mC2}s@n&tdbEd?J+l|_e6AJV!urt0PG7=Ic{xwS{r;V43wfpJoV6l4uU+lfT*-kj zT{s@!X^tOg+e+0$wFgG!_V`q}3-0Gm&&IOax$TfyReDOTl^>DHER}joSXd6_24%hj z4*n&pu)Kc3|6)zG{@Zb(#d+wLIZ9%Qyo({}sbUAR=kDz6*(Tn&reJGXmnCqg7Xdd+ z_tTw_J;Bt#%nv>^ch}7Mlh|6ETV3HMIG~ zc^dkRTH+n4<9N1OR%~`RtC|_a&)a~n>E9K=*YCiV*3V~Lk$yep^J|6IOuVr?_m=b~ zp!XWME3w!!j1~0H{AjSRQM)eju}$!2j{}w|<;Drf_uXCO{0PeAeH&Lf7CVc!y0({U zqt7I6Uy0vshiVb6nT_2dw90S#G1w=a4q0JiY};! zF6e~JoQ}=b`BvUmgckFy9@E{loLm%MCbFv^XmV%EhYc2AHEMoz?evSN`60~^vuH^A zOcP5SRHpE#8Bgn+vh}?mWj_*M%z+H4MxBYSl{ygYl$E7c z79C1mHYl>Ol<`Gd8(HC5`PMd6z24lz|FiZk@LCn+9{<|Fe(%@yE>!Ts7DWLIK`Av8 zw^uN42zt;YV-qSGN23%kVZ2;6N&+dz3#fnd7O9zt;nCB^OV*K6OVP>{Q4%#s%_Evv zu-*UXH_!S#v-S)4Km9*v@p*Z_@3Uvk%$k`smuF_4*{$@LD_4(7zXIp7A-~Xv#F!d7 zK#Zwx3DgecDbj)H$ohW%o{4n`!_vAQY21@y`$Fc9v6cqybw_L~`xla@$BFG7)?L{9 zcBr^{Q{3DWo+hW?$Qnfn_w?%NrmLKgonU&lbbNk+EN_y%v^eodZPO`B*%p1;d*%0R zZUtw0QYTZW`ZA*|wv#2?^=Uo#xl8u>7V-mK+kt(f)3VcI{Zd}`YSA8@)bnZWTfQZI zv-veYhQfLk)-CP9?XF*ed=I11ZoP-pX)Q8OVeR$JsU_}wSd4!c78bfO`{A-aR$28A zm}8}%n`)b6UR&E8obifrD9(7rxS$@VbCip0FBr}l=ew`0@BTxgXFD4AN`2drechE$ zdE88ME~Wb{qz!G4&yB(vqp)kozTC$ZJd5s;#2%=95g)l3cHr6nc{cs5)o)`Zt)Mf6 zKO=J9?r0GDv0F#xE*B`cG*imgJY%e9%V)zrOmZvfuxU^f@d}pC?j}Io-0{ z8thWt?AGz3e#ZJbo>QRg*6nw$P5JerN9V4z^+h;$o9*M4;2j&IEhsOrKE^Y}XKY>W zs>B|Oa&14;_00?B1%r+{~7KdD28XP&k_)GM;9Tpjq7yi+*8NyqH7gO@74A2KFA#_2}J zcZrR0nMXT9{K2}5wW;wL?z_R+*^GZj_P4GcKqehlRl7qkN`4(*@iun)ie{YUP+7}i zN5+rAA4sexoKo~>BH&CD>K0Cx^-lEX^@P4Wek@~K?PK@p-KRJE17DAHY%8bR$yuB;T{>XA zd4`<-g1SpuFDKV~PY=!$``bt>%*pN-9`EYL&&iK#a`E~}S(7}YJi~NTTjWF|j@e%- zbT~Z>-p3zQe0z66jW*$jX4(UPo_qg<&9Qm19|Zjnw5Qmo!~A+7?`^&ARyy2`RYypH z8=F~gd!;+FzjX0@Qrfa+U1B@#?c&=-)|o+}OXq83&jQx*GX76i{T}%! z?e&&(Y7Z7z=YNpiBz+-G=f@(ypYgY8zrNze@J5%0N653>RnT$A#gc~oDt+B}wvTkU z-<6%99Fq84-`oTjklqynl~=5`M|qD26S9^=a16Lo+2Q zIjHCFkn;0-uw3-s718!!d^)ALH_}83&Ggbtrz=A_d?b1#;`s56n!eX>%e~6_USnSj z`-gLCH|Y3I-kpbJ-ki^JV#co@K);3k=i_93JNgnhKkJh0tu=66ieH%aXD?1EzNmda z$;aJF-*bJ=E2I+aS2@p(H6}~HZkMX=1x6p{t!BR`dQ!Y@mWPz=V?rG(hBRc}6Rgj*Bzi~QeLd%B zSpER*XG%X|W^JZ>kEARWlvUq?aXR~5ZK3b)&8g{m<#l<+w#wqT&-^VZhb^wmpwItc z;Y>Hrb&S-R`{(^U>@%?q%s}cX*#2U@F|Oim`dv`?md(}9ta)1~d!&4OJ*v9V^@ zp03R6{2=zqeKGw-*LGtq_Xi2PpeKjk#@E)w`tyrw*UNdzs*5`EtOZiv5Vm;WHIKvV9Rv3p+F4lFa*nXG9v*oJlRW=@fEclgckMN$hC)NvH zD*NLQhpE!u?Ooj4+HuS;d_&3x-jTkt*PHpWso-_&Q!C!i(kijP&3?j&+;gtY{hhSA z*<8Wtsh|&Omi6RLham6cF$F#23FEB(`7M$TS|9eST<>&K*GW6xR`GSzPUW2}orhG0 zR5(ZcV(vxj8?VUv{rHirG-O$wl==5~jy2QrL0b2do+5eio6K+QUHg8)pGn;+=Y1nS z*yE`z@3lK(-w?SC_ha*cv)GE^l{K@36eiruFh{t_t|(8oR^ z`lz)jU6WRm_I**>w}ZQt9(48aa#s)E>*|Diq%GSwK7*i#xc^)DH=84vBQ`eC7T{fL zPq(}EZ)4@xx6|LYb=sX(zqaJYvY+EPv2>DakH$*+PcQm?i$9imAIABjV6p2Ppnozj z8ffDJtOaFT1G^*w%+kN>8%!#qhjuBf|7Rmv{ThyYRI1XlsQV)4>$+* zREdvt4P;z@uj_B)8TWH`b@csOl3rqVDV4ST>d1cT@~Bht=+?4-ALV=j*WW-L{%Uoh z+gpKmc1iknw`KzZ+?l?A?wO>Y`@srlz*>>gfF>wL;{g@ z>>cr3aHeHzVVRx9aCzz)S9eLC_PVQbmpE+-F8)prAu!&}EnTqD&H8Ft&5w`vlQU}B zpFbx&M|DRsHdNL=`TiAeYxk+LKb!TMbY1E(&EF}-L9SmhQ2I0LbL-_iWlc9_9ltNH z-0p0IULtdygM0eEEAr*sIA1mdYG(suv3?bQM$g*R-tZH=*+#Z2unpUCOGao3hq*`zQ8= zwaGanELUq}Y|i?BX*%1)x~MbNnWDaQc){CB+Ei;c-C%FA4UW2QSJA6r&Xn!ce-!`2 z+M3CU{>;8jetqEeGR8#uGw7stC-;0Nf7uwp1p;6x1 z7DM{nP`bf%FAo;H?fRjS-}^r`b&1nIV6V-_@(kO1c!;bMfR6gh(yo16!PrW5o|h$T z5kFV)ef}UZXS6C|N9%&x^R};KQ=!>(eGeA=oG;o+ge5PK^hLkp=4db$zA*Z>OIyrI zVVxEG=djTL@wv%m^Mk>xV55Zhe-t~X*I~%Yq~_*EM+a9Q&Zm7N?SNj z>MMQ6qf*7{vA@U~b>s#5tC%AQh0(4lt3NBUe>C@F(uawj8S*V%Vt2^a!u>yT))L$O zl;ju6)e+)Pn7+WZYyU2uu9W@t2n%!T%GxeGka@uRhtDMX%oD0=Qx0Q|RkG%UWp!%y zB6m&}`ns9;ykI%xMAlMHcXc4@pFW9mPQxcI*>FXV0|zrXv^EYGc$^-xZ0Yub_R z5PM&`mv-;+U{@!j9-C5~Vsim!B=#D7C4GeSD=NXU(q1U*+MeO1gI%48wB1zj_N%YR zT&Z=V=;XheupPH&>Il#v?H9jTeA znbzJ-&0XaBkf?{ZH^>K5jnr62y+1^#dXdGIiE=9M!ULjMmFn*j;ud#^kUIbaE|Zm(bpr+(Wgp&&TEgt zeWsVF%X~ET*n`8@Y~SwE)LpI}L?5rC)?s^8S4&&QXMydzp(uM|`)*^c)7kgKIQO~y zbEdEUO5WQ?eYx_ot^NB&F+R^xnyN7HPau#h{wXHf= z!j+~*`omvv{b4s=2=;S&QMkER`oMhm#}vjCsI&TUqCZm+d-6=HJHtDz&R5nt|0m&3 z%tp;?fqx&Lte)-q`FO8~Ms-)8fX5cc7TH(dN$e-1e#=Rk42}BQSPZrYnRnO4Hg*7FJ~j-U8{>OXlib%q@lK7 z%38MfNZ1&}ekkhVlqDmEw)C18ZMFX1itKAP_S{M4qoMl>q)l0oJ=@i3ljJ?US@x$; zH_{UMIqPqf&eXO^QdpLd+xY8=)CkuO_7b0PHXq6o=4+I-?hR#5nf=URX|E52-k5Rj z6ZtXbIhk1&PwB$&tlKW-rr-$)OP0jiJ`Oo)&-$_FmHax-U87yiPW7VnsjlyVJl#+1 z3!y)TIj{3m=cgD4WtU&Qri9+ERGZA<12nm%O#RNeBP6T zlkHu8Ct(Zs!pQHBJ6%@gAl*=|I;-D~`?QjZSwElK7M|LChPXlM-d1|w@(6qU_1>o7 z8TrSxg0sS5rgIoxxX<-f;D1xq+Xccn^qAOB8H?$>r@Zf*YX7izwnuN(dG?a^NbltI z{O+&H`~HQ<_rZ!4U9%*H)`F9Qo#ovTy{jBT-xe-#{e=0_PZ*KA!qqv`Wek3I^`~}5 z$?|yb&k9L@*wjTCka!ke$iE;vG9~X`@9I+4vFeGXQ*BSjaiQO%7e;$KT^Z{9!<&9! z{lH=AW1M~! z_jR*1G^(a)b-a|xDS=}%U^c-Nxb8)R$nzcx1$2DZ_nnuKDI;7W`#Zz?(Zwiw|>QA z!62*WPp*E+wb$q?zAL+tI9@oiaHQD>I4s*?YYRWDt&lw_y@L0|{er}qN_PcIWm-Y< zPTE17nT|RWZQPoQw`u=Q#p{jxRs0#6b7hW zRU4b*Y%uDM}7NL+3)SzkU7ofnzKzsx5fkeddBAl_54!&yu%AO*cz%0`3=_3 z!TFnP%apY(J1pz#idL7uIyd^=+IL+$J66(gg4keZ8}YZCuhUMFmX@~bM@b(^`|z^9 zDEq1D(c23|A@_I`6hI`-9MhuPT_zsk^q#XBKTuw+?m45GOnLBMi3v`2=J5$zr>Eg`A zHqP3uG}etJ$H+TACjD)*b+$C?`>2;>FLC>}kZwm;eqi%WV^RZct;O%%T%N{fMRsTR z?(Zb^=lrZcyY|EqY`Rv0Q>Cx2toia#^~!iX@V8`7+$W`@#7&pDIXU$Dw;}0vmtQRs z2b|T;d{@?d$KDXWJC~*W-jExEcg@d_WgQ*sgcpLp_Ht{3rOZdAjGL!MdEO=5#cUdk ztF&03Q}%$%8WpW8P7FfV-boWGYn!*&8ki57{aMv#=FYUal6)?2j5UfAB!AI=mN`>b zhhHIcpl_z{bz$8jZ4LGvv(KZfa~VStHW>er-s*J1cwaE~p>A+k-tVdZsGxS*;U-n` zy4kC0SGjdlu+{KDyru%<2-tGr`<~0>Y+c7uvet-o&gHV75$^^1$?L;wL~qb5c(-Ho zmX1i@ap?;cZY=wA?iLjmxp5ZsV7tgamh+Bm+Kt^(lGi5%zc!nDPiH=|x%*#*!<;_w zH0iG%7ak`2iS#|Xpo%?Wy5{_~^lSF+99KKe`n?;f7;iQOM@qO;iY-HcUa%WanKF9JKfj~>+5zZ?&{V|LXR;r@^P|>;3loRgm+2Ug%dlyt_*LMGQ72tmNrHE(mxM=9Az&&?eHx$**XO|2(2Z!&uck>-tM=@CTY7G>Buzsl{^81K~RCHYpLOw6} zgKJ07A3I*wb#uIlb6r_Ki2c%xwym}kY-P50Y^Y=L&7xZbc;f(bEj-=avhyQK!ZXH>F_9AT2@co@w9bxN>Ti{~d2&oD9e{947&TMemP>iX>{SAQ+< z;>sT0{Si5TFP@R_=@pslT;EmPw4iUv_pYhf>};Ik8TYUF^%Bp;`^#2K*_#k9b7v`H z^W-&&zT7Ppum6XgXDu5&gO>^~+5X?diicU5Uz=a=(i8p0?^VB7y;7bR@&6?J#B5;= zPn=J5VD3OW8~50%*MD9sZrG-;kU1Cf;^Jbn33*P!?%$-mKdgWo8srY-_LT@*FO8A`9`5^B`OFtaCxYMM4SJpcAhK$!M zel!0~>;Eh&JZ$}5vH5KMlP}2G>ufuerCqK}lrh2@YvWdAk90bpBV@l=zlxt9f3f_c z?P-O*Ydmk)jKQg~6}96bb$jq(ZM5mYr>1>dvq;XMS;EwFm6RZ0qdY}4lnDCX<6)3&^f7H%YOas-3gm)un&g!`kMzs z$LrT1{k8m8XVdt?n|jI`a{nyNsTI~|>rCi=Kd5-Stiub7Y(Htg$~4#CyIA^rSpPXz z!h&A+lk9I?`9wc$w~{|!era}Tmi4)uMr8HpV(GQBuGpOar<<=q8+~2%HYt<6f)`i4 ze!H@kf!3(i_K9E}!mK#l^KJb=Yi3^5Vtt#VD|@`e2c*62gidO&RjtI`(M)j4vWt+lVlbfq~Ec*zpkP`e_@aC za5o;uoO?a0+d8)?#s73+JtSfE%=EOr?ugv$E}pN+4Ubg(*)g&nN!r|sv|VVwz`8eQ zbrr`f>GO`r`SV;b?~Hym=2RZt`=HYiqB$bQmk^BF@b}Y47Ia;UuS1MSVLU zF}?`XZ@aj?C2^Czx-RclO5P2NI-Gq@v}?D^9%sH^4;CIOaINemMX#?LSMldby`A3R z`lZktJd*P^@jAr5H2VXv6G&Z?vXtkpm%lYVGu_f{LSnDk#p#RVcD!eBZg_4yJ{s6^ zWAHcEm)j(LxoO!>J&#z%BkjRHZp@3ep&NM0SMD%>{)mu8)Dgy&HMEPtB2z(PTN7 z*n;zCh-^sAK|G#%-132r~Q+D=>++k3T5mH(1~ zO`pi0`}}b2L^m&qycilyF`f3*v|m#(GQoOO7UwhO2mZwamy`&kt^?J)@E;^mVIU-+CO|4DaP z_MEEiQ}n^eXhX@ADf09K(p?AThiC|Nzcgna&?;ggTQKz%r1ULVP{$Y$YQAkh7 z-;drmhMyY$7C99xWeh(lho5BlN#;7MAZQ8TC*=qP7ed3QP5wh7tdlV>=1@elmSC~x z7Jbp3JA(%&!xb+uJ`?4?{_?#(irbo_gI?<+Eimy%& z)nxt@67gIo@nnAq%yPai5$AOhPq@K20?cv_X8hMB;;=3ef5?6O*Cpb=&f?$w-W`|o zuStF(-#en)+*sp}(%ykluPW;pgiN_i^@=+;uU1F>3zmL>v5Z@cr5!Ss`yI2q;QLIA zgWJPn0ITcdwV@Sp?_6vlc5 zxY<`2dn|8_?t_h+Sbldjz~m2D+~B^y$oo0>E2BMy|K@m^i?fF7?7!59h#VK6_Y46r z*MkY7dbGdeZ>PzB!{u96nV|gF(cXcjJ*p#}!19iuJP1#OzP&D(SrR#&VZFu4m1W2x zZk%2ymMg2g2gcWRaU%D+^{c`|#l0JM$NX{ZKjc@(?!nG3MC^w5!XMrX=Dpx65@FFF z$mtJwa>9+9_YwagADDQ?cN6?9_8ZobW=kSvl))v@ZxV84mH!>%tk}J>%CAhgS62DQ z3AwV$-$R`r`=hLK#J`u6yXVBdCE`y;{K<6lc)|^sZor!o&*=7A)-_+qNE5ez&AoFE z7M7r{bG#(_ImYRAjKRqmTahXEjJ6{#^W$Kf zD}EQoLAP1Q{5aNeB^l3!`jB$WM~JuG!W}2!y86(aLoIpqcvshAVcc7j_7@C4k#39S z>=>6;8dZ1|;7JgF_=E4`{a2t<<)rq3G#>T_iuE4aJ?UU zs1lb=ts|sz9)HG zsb3*&Aed=0FS^3zIiB+hv7yEG0IcnV%26)xOz>0hmp;GP$V!GaMt;B!^t`Cug*8XQ zniI`IpQ4Ui!CJmroE-HQ$`RcA_^2DiXHFtMV8#c`_{@nGxblm10K=bCq-~oMElkK4 z#`i+*^f!o4FYyO$nsBSg<9NzL&WY~DT(@f@$;i+-(N8gstYiE^Mjn9?F52@s(RGP% zuZu)aS;rW0j?DRsZa~7S$7zUX)-;s3Se}iRG(>s&R`jiCg#2C1es#^O&8v}zghN6y z?!(1AI7t9`Jwf)rN_CmM&T+#12yu`6 z+E^<%ofdooGb}LTk2C}$T%;QqdZs|i(#BfV>B3RQcriXlT72Gc=d`PPzka0A{a3_2 z?%gD3uwx(aXgZK@`gu_7=EK^Du8%2y!XvngZoVL(>2S2py-VCS*3?E2pE5m=dfqTl)z9IEDicMMX=ULFN#9^J~g7yV0@rlc`GTcLsas^!o80m@l^Ip_ljdHkQ zdLm$kd%OVhD~$ZPnqaus_YwBzwA?nz;RaI4IypLhDGwRaV&z(`XyLX{c z&iBQ6lJMs^i>Ladb%OeX=cPZCGkqH6hy&{UM*mL~|4~~*8{Em?>SN?@@C!10z9|18-*-)n+nN(Be{vVy4;MiCudY#_(JFkN=`hG}@7)BM z)itl@Aj1tW`u}+W%)PhQ{_57AW2^{9I!K9Y0i%A{o}78n=pJc;G^c!|)X(G#C2h$` zIri-#Zj2Ychsb|Oyg732z37i!Uk{9QMfnFyJY8RJj?}%7i*u_S*;j)<@UOA2H>alk zE$BnQc;@80+IW9sUvExL`+9nR_r4y&<7cn{#;r4JP0)?jQ9;eDZH2zLzC{v$OMa#s zkGF^$SPYQ9Lj6AI%ALGdUAnlA(Wk&17389C70x@Bx!C&05?RP)o}eyfSR5m5@cu!L zv_abfmV9${6F*9A?(Gj|EbU^$<_{JA2*(-ZvN1Ye%u%MyHPf-gz%v;>R2 zU<*smi7}p<;BO`P!UT&|E_46y37(SRZzlNs1fQ4Sa}#_{g2i^T`9CSavZvSNa%PqB zsRBLV^!V@F594IKg7K*X}(q!EzR|$%iF)XoB}o@Q?(5 zKEa<$aGwN={WbGn_97bhPH>oDSu74dmiGf$#m~Kh&dh)4!E%aFzN@(ItMI z^ZbtlZ!CNHT@}w;tDZZ%G2flKtjkv(Euqg4J0p0f(4NewIs12Y)J5{sU5wx71i&-J z)}*)>s=L4AKf2jR05^`VO*LDtU>P%sv{mH3%^~A2yy(xq0^rd#?yqj86ANoEaezMB z$eOn!2}b>kJ_T6n5ZC@U%Hale+Q`~s=LV4mvn>L9f7A`?y+*nB2kRZh&$yjNWce%u z1dyjAYqO!>!Jje`A3Ni1WR13dApg*hocbN|E`YfP2#h&h$~pJhzt&&ugld0Q-8hzb>Rxe; z+rP@EnO*q)wbQKM3T7E=l(TH~m;MEG?$|Q`hFs%-{>b*_OrJ*gK0Ukp13xwWy&V0H zIKApjBhEcQ&bbG1=K7?_W28U6lYN|K`Q1P6*P!1EMm*3rqa5!N8SfsL?~>f^F7|^M zMzSBIVQAk+!_YpFhM{r|Ls`SvXnDdg5O;ibm;a<|E$aZeX0?*w7RUNd3{7y5=}fry z+!BE4-gA&CNPimh+G4dW@Z920R*{;n*I?pb(yS5Z**cK+` zZMIHhcFFGt8QjgyV9Qgv-Cc~&EAk6%@8Hm%$=hB_a?b3uHws=wI2o57)%4-WmkgF}Dsj@&fHXRZjeyyrKGO*W`QHcz?3Lp!a*d$)Iq@dXr%icyAY;J2Rn< zJwt;+W%TI>g?|1JjORn2m2%V*gTk-b{7zf!9{nva-BT`UR+v-sVUZEmoSF{{%zG(E zSaWJVti_S{hYWufC+0lC@CSV*%HhxA$oqq|T%vwq+#_Y)`RjPFriEj1X79%Vl5U#L zpO426trCCFaEl9hiw|`F2xm~}$9`=Io|708iZgfd-cSI%M>x1A_Tr@DzvGK;YUYOH zNqLa?qMOLvxMz3z#zr?4af9dD#oD(Z<9R5ZTe#J2+_xs~-PV0s++(fZ`(aAz@`{YL z!JYBguhq#Vzg&ARa$B3+S$*Hy2Qb=9*fauTY=(CcjD8>VcU=i)q$Ozit7N|Xhqj_5 zhbABnp;YW(hFcO_mGBek5XxF_nZtGWff+8C;fgbN(f^a>m-_FY3+u$$KPpMSYyY&> zl?O7)0~zIk9DDELfG~>kpFZ#P@wilMaMn7jh#OS1omG`1{+(4_yVNSoi}5T8Ku54u zY|XNM+3M^D=@<-*G{O7cDCZcgQI0rZEY~RKSgyO=k25Jpy}@|0jzc^V=VTp;!o9WX zZ6<83Y8{Drh3&~PZh{*;59)%?a)W0}u5oRQN3yO(e{`#}>niuSu>CjOD>uqy8wX|98jw7x+ouwywy_je74}wr5(RuQg?qo(`_-!MXTkH3kruB?9*FK!>_a{-@kD+o%b(l@_xRvBk!Ou@^I`2M zT<|=_MDbQp`i&5GS5~0c#4dBdC{L{0o1wIi7kt~)al=q#J#S1UAzvUm$2@A zK*_zX>ethPQ3hbc0gRg78cy+#{>vX6UuN<2&giD60M@|IitDAL9Q%4{R$NEny#*s& zytkA~Icy=L-w0+|y)1T*aW0tsd@}9@C*AMJ4a4QVh|gt-x|DL%HQnV}-y$q|GnI;!x!Bc$XL#eD{$5P)8h4^?mOHq#SaL50-e=amJ!Ja~JCr+zUUF?G1h(5a+>X-IHt^ z^d4;klJ`LFKJp))`Rdx$PAB`k@T72(>nDKs5BE1duzH}YS0P_3|4_$*dC^aJjI_YM zYPi9}?NY^A?pn_^y8l!J=uZ}^zI`F1T!2|#C`bO2QBJ`ucVMiS*xoy|Rl>m-u8=5e zg}5xEtZh%Oaq#a7-BZqf1?3ty|9(KuxJl6NVp?^|FT}HuXurwozi+=A$l#wrB zzAue(rn&m5y0`xe4uTd*2j7PWv&`$W>)O}<3$D1Z{G81@6`fPTvxE6wG|KtxjdG?{ zqnzbGDPJT0b9@1Y8}v=U47X9v^42J4xQ%l7iM~%#F2&4Ud>3%GBKl2hDq7EAy$u=b zZNT1tbwfGRq0zm6uI}#nTp9!4#{E+SXs^~(wBFV@C~H{0-bTD*cXjCN;K2^pt9b_xs+CML-y4>{n-@z$MU?r`u}5b(_cQnuKZf;!fM;}PUTz~Bk37> zV6_{%`E@eR34EvG*TsR6N2u$-NN1^grTll7!wu@>?sBIKirqV1lk?}-i8z262QuRD z>qH#Dj02c)Xp}P!-Q_+GzpnT=tVzTHj5u^jxa5_NeLAd3!~x7WG|Cx=?s6Z8HE|qR zE+l&-<@B>zzOhdD|4)7)T-1$7f0lXXh1L}sXY_x&%QbE)*Ytt=|7{*IT% zKHTndA1?C+?*F&>!f=t!43}xH{`hda%YC@a3%tLQ?CxS-d?LT}ecvSZnJU2t6}+>X z+`0;^ja*atz}anLKREu|HftmQCjOuuU!G{k$!N#PXve`QS7^r@<#@*Jwd3!L-{|8l zubk%2v4<`QjPyY|fLYfy%9(DBa>N1Up;68>Ps$}|cQM`mM}C2qSC+dvCkR^H-|-*a zyeEwMYI()?li?@g13dx#N1X%ayVfX2d{E~smv_p$@$a~JiOq=8LlCS9iJ3ukP|4<<~nBKE@#5vv#EAEHc_wFw>v%qhj|= zANlDnKG$F67s}YIL>VI^&SX3bm~n2DC*w@N@x4(#7_(ejxeIffZk;7q(!UNr!Qy8f z_Ps83c9ojy$l*&XZjVMCc?5==q#XGx-nxt7ZIEB!$(70O{Sw40<}SKfFTdn<47QZF zxHF=kaJ<#oFM*paWo6vBrR?+6^H7od^FY8z6SQkv%D!xDDeHa>#Gi~fgS~roLpk$k zOWBVRz+UeAiV{6{@wwiXUwAM2Rr=Yp_mQ(bq4$=nM^uT7ijy@jto2)DU z!OqcISAN3ga>2-7tP5CI9xm&fb#7vKVO^PX6JXSR~~5gJHbpViITgRzw6`|_>uA>R+jv4>@DrW5Z}3h{B`-D4ZSr{mTpayB{JOd z0^{?Vd@yFepzP<^!OXi0%6=`t1!X^1|F66EbLJP6{hav)Wq*Fx1?BC#k?6ULamG1_ z;A6|(*NO7)_+BF)l#@d>P3q9UdJZy&YWmcX*JRwsi+;T<0{D|F`?GezD7VmA=F0v| zQOey7u}Adh5Ar)NpH(Ga@2x8NdXJ3y4a|D4QO+{6s^sfEu$TLKZ&k_H$*W2a?r^Q@ zOA;@{6KCti^;nDibTY>OkMbLJ<_o0_a)Me@y)J)vp|n-bcWSERxn3wWmCrQ(RL<)b zxpUJc_Ewwf-*Rq(@{#5yD7PASIzQnLE{2KkKgkE-t}d;WGnSj`Pe?&uU3$fZdzF)~ zaop$Hb?J{K_^(&55&G`eyn!~MPdM!w%xa<~+R_6oXS_Qd5nk; zSm$fBfi6b$jNUPxgL6`_@nj<;fAdKk9W3X$@Fu4!G{H={O#iS z0{w@a{C1J+uo2c`o694^e_l-UXGDO$-|8asu{HQzf>#&)8h0}8{ar#%hMX7ue^vyj z!++=ONQqPm9~t&y!FUyDGW=SF9@_XcUO z<`-{tcF-_JoL{^_4LN%BaOgFV~qbO$GdfY(a*<2j_1YL z@w41;4A=eM?(u^nFrL3W-1RXMQ zwO@hqre;RcL0ZB6B2xBde0dAPR5&LIG^j{`=Uqm0l!>S=`Q{pm1& zIuibX=?~cZ^Ph=(AF_KNO56+Py*~^bl=U7m{8E-%?3sTde42cw7yQ{g(+lrOS+2+#+45Wod3!hco^ITLcd)&n zj50~49BD3c@n}(xAww`&VRh` zWa##U7iLyW67^3Fl~Od7rf1{_SkN_ zrir(uh4h3!cxT%S?@F3$9r&(1F~=NWzAs>w^Y#LCLTbMrdF1`sV*YGN_yeXt;6{H$ zm)zA}@aqr2@YC)66~>#1r))2Hn_}$+Z;uReu^l5};~brKv-u82SSWGb?`66LEl9Tm zTbLnw7NgL|LEqI@(cRZ_JZ%j zg7I8&`skltQCIDIdb?l#C%f$BFFs|a2 zyBfnw_KP(U7pDq4cGDOh^L(X*4jmuw#XKk(^C)1J_eMGVOs?~!pO2cK z`uysrvij-YA*LPWjeas+elC7C<^x`k&3WzX9_852;cw1scql();OYW7XV~h6&H1^m{m^)JXP@rf<&5X%yjxS|>JBi* zHtLVErh}KGUf-ODEoJ7xj`9iN(al_G)A)?2hbT|-t@1p~W5kK>5w^N#df@vZ`QUqt z+CQ!fZc}$ZEJE~w#f>|+3j5N?El%$3S#HU1$-BMuZ{lvmk3a{x8$2`|Mr%=-&=ua;kw!_`7hhLTDVcYM=QN_&yM*0r+g4lcYk*5 zeucQjyw78K->!g}?_}gV8Rg+I_YP`1v{K3*+@rs{GQL;YuL0}sM%Q;qoz#Qw;V0Z6 zt&pIPCCVY#$H$k$q+A}sU3|~+Tu6^(n}IxAnfK@Ru1wThE91HfV-7Ilk<`aE`kSmj zkcZv<()s}P;Yz6+_|Adx92$nN)5V#)SiXKHzhDRE=0u)=nFeI!2^r~kb0SY}PSgk8 z{qc3i&3WH0gI(IoYeTvE>Fa}=6Zt^aIQaa*ONV&i9mSdxjg!8|H^=pa%Jp5}mi>E= zF!aJUu<{ z?PGyi#=$HfjdHj_Uljh~qMtt%M)^B3VW0iTyr0J-!@YO2Z5?)>{5_J7oOmYl5|!Xk zX$XX+{;dRGiWzd{gYul)IXLgnO+PsQWhW2Cdoart<(S7iI6vId6O8drs|)u_&OP4m zgY(LGUNYrKADlmdcrx8I&iY<;mmlWbpe!AnKg`Xy2umCe+eQz{^!$m$1!Zke-p~7y zk=KLres0k7P?7sNK(e~`^Mr%)Y4q5^nAk#{2I5X-ROVg>sa6GU{8o#a#?*sr*uZc6H}Q^p$sf=lrfVC%JRJuX{K3 zdHcd1m&G%7S05|sMgQ=9TkPkjIlr&q)12Q|0G4#FBb~ugKI_T2Az$bZzK@UnlP{O< zpXRjOAdkV!GyEM_bp*1g*3O+$C}k>OxWOB5cNJ|WnB`$vc7Q7nD4)x+`#47Wf#C+}x-7d_LcW)iqyAo&ooM+2_U@I@-X`Tp zm)Ng5$~RcL^Uy*fnVZ9}0DKmAv>6GuCVE=ac zyt`5EgMTaJoN?9H2Ceeb(iMNZRz9~$A=GnKWZjF*PgHwX<-8ANJrhJ(&jeA{GeMN~ zOb}%~6GU0h1X0#AL6mXs2K~p`7Ub)r>y2?PGv)J~jcL8NF6WL>{+;MM#$S!TYCI+y zV|-+Er12M`FBlJs1{uSyG5u_gnvFNrHp%>$hWkeC4db=7wZ?y{{mFQBZME^UwP%f= zs6AnPP3;yMi>vT4L2TI8)`hT zHqaP0y%>kxYP%V43OC6dj{5&r_?GedaJ}(s;cLcg!ZpS(hc6rdA^d~!^WpQx&xFqy z|2q7&@l)Yb#=i=GW&C*fxbY+5BgQMj6~+&S4;ud@{E6{B;XTGn!==V|hIbnOF#MtM zE#WQ3H-)w_*vs@`O*`)xJOKdAn|IudNRSz=Wx4N(Kfa(C_y{dZ|<1A^W8}><(cdG7W zT&k9g3su+?*XR064x;|K0*9R->`e0?8L&`X;D`U;5%3mqJ zVvI9bDSxi~obglTr;LA5{)Mrw8C8FNTK=iY?=9bJd~5ku;~UF28vjT6Ka4LfUu=9q z`2yof)SBzgOzGVFS;_r=D7grnquJ}9Sr;1M*|DyN{ z<422+8sltD#`&kkpBmp?yxaKp;_b#bi<$1{7v~#aS-jGCN^y$u#NtHbvx;XKdI|;B<3%@o?iqiia3~zW90L!NtMG`xf^#-m|!;@lM5^j3s-Gv&F1& zQ?bc-YhkPCFf>m;Dtu)8x5D3yHx@P;zg>9ScwJ$g@hgQ_j2|sLYW!f~LF1)`rN&r8 z!EklmgvJ5qHB&yhFxmL5!db@S3*(IsDI8+FYhhR8R3T;jR{kx~PpJQE^J|S?&cAH@ zQvN05|IYun@sIOAHohZ&hcV8?q@OqDZ#2Fxf1UBQ`D=~m=jR*G&CfN4&Y1pOl)uRM z-2A!5ZTU9iujIdCd`$ir;}LnB+pf_lWV&az8V^ zKX<2kuG#jA!I#7+;>d-1r;0Zy2}b+Kk8N#v6~xjWIqU zcY-nWDom>*az_}C$c-=_k{e>YPi`OMez|_eyXST{-Zi(YaqnDj<6^F8oXus8H)S`8 zy*|yaH?waVzn*>Fcx`sA@k`m4jGxIqWBg?HNn@NLPCswY-fnzL_7>yov)3Ch$}TdV zpPg?!D?7`0dUm?;rP)i3r)H-bPsvU(K0AB1@tEuw$&|1`co zbHDMOnLCYft}es9A#;QAg3JQrd6{{}S7fd*o|c(rJSj8D_^ixX#;0XYGd?PFl<`5C zgN%n~h8qvb3^Cp}v#;@# za&E7d=ijD(Yy5cnapR73hw-xXGUKJ`rN(!r?=)VLUShl`y~ucOdam*1>C25TOCm{6t{9inCF4T6V4O?mjB!>n{n?b-Wc+68P2;txwZ?x+{mJ;5)HBAvN&Uun zRce*-lc^_-SEg1PKa_gNczJ5M@lR7fHNGcxkMYf^n~fKy78+lby2^NNYOe9j)J)?U zsTsysq^>ZYnwn~Se(HSVucy9ld`9XF<1wi*#yIPo>2^%&7~_Le2OA%dI>2~9YJl;c zsXdK%O6_FaoN6}iYVK;L|67{37=PIOq48VIZyCSV{F-s!roM81g1$T1rmS(3T$H~M zydYXrb@NQ{jPYY~(m3VIWOkc;U2vUod(dutad5Hm>A~s7qk>V!N6Q9A`g6FPu1!8P zIMjGxFwl6PU?1b%gWZk$27QfpkyHKXPY)q7^tWQOPWCO%aQa)ao)fKdJttZj`dhlu zbD~wQ=R_;(Inl~`PPDR~p{xx3E&YN1mJIzZ8Twl?^tWW_Z^_W#lA*sPLw`$#{+0~= zEm_Z{)A&GtOF8tnWaw|n(BG1wza>L|ONRcI4E-$``dc#ew`AyV$L|ONRcI z4E-$``dc#ew`AyV$L|ONRcI4E-$``dc#ew`AyV$S)=x-^9{+0~=EgAY-GW54( z=x@o;-;$xfB}0EphW?fe{Vf^#TQc;wWaw|n(BG1wza>L|ONRcI4E-$``dc#ew`AyV z$L| zONRcI{6_H&W9V`zhc1^4T`n2ATrzaI>x;lA+5bLzhd2E|&~lE*ZL9GIY6Q=yJ)><&vSlB}0Ep zhW?fe{Vf^#TQc;wWaw|nZ;Sqx4E-$``dc#ew`AyV$L|ONRcIoD%&l8Twl?^tWW_ zZ^_W#lA*sPLw`$#{+0~=EgAY-GW54(=x@o;-;$xfB}0EphW?fe{VjQp=x@o;-;$xf zB}0EphW?fe{Vf^#TQc;wWaw|nx-L%3GxWEVLw`$#{+7It=x@o;-;$xfB}0EphW?fe z{Vf^#TQc;wL|ONRcI4E-$``dc#ew`AyV$L|ONRcI4E-$``dc#ew`AyV$L| zONRcI4E-$``dc#ew`AyV$L|ONRcI z4E-$``dc#ew`AyV$y@*C^GWlb_{kT^RK%d&32Ma+lx z@bXjK-b?Jscp%~afvmG}g7x_=4)L%0E?N#3(`+(IimFxY=a=WcF zzD^ix#g}Dobv6}rJ@&0`udJ+d#?o$g@wu*%UwBw;uSF`3Zpr#}`?qBM+I2GS^=?{) z{Tg_3cQ=}z3=`i!kPp^fPs{o}8DOlt#-0o?*LP3L`aK+Si@UhL0{+0i#{C)7vVKnn z80*WA(p$HCf8+j)X<5G~1KfB&pJk!=hPCN!S+%#1HSc7sVJB10y$FqR?xA87>HmBY zpxh12`tusV+*1Tb+^~m(jPeC$Sd=3UTOi>eU3GpNF$hvRzpbqE+sgPOF2?g} zVcfgFm7O57f1+HF-QBoRF5dfnVb~ZNkoC4Y2V}ji&H-6(t8+khnXDJ9i0w?cPukcV zkfn{7;e`QN+8+Vaj>#ZlZ{O0pfjsGk{tU=^`<7s)IpU6s@oyJKS>Ds0eW)<^h_nj( zcZj^bbhuLdz`NKl>-WKe8E(I1(WKeq`l`Oay08=HK1`p#*1+p>n|_bh36 z_^o^B5gugt%#si4#9b5V3TC>>pWMatfP386m>#<((gV!&*fs0-W_6dV8^jg<;cvX=G*1sH|o|68Gn`u88!&W z@>~Tl$~SBfG|G|B+uPGQ-Te3Ixgn#B^aS($p&aFrOgB3!NAMrdg6BZm<3c&){iu%_ z2KSx84WIuCVWjVdjNfxg9_gOh*YS;V#A$mrQ?O}U)6|#W4H;if!Ty}E&L4F9+P z%<7juvxc#~Xa24|v$xN`A*1_L^5(ZO9xX&w{c7rW|gL5jp&XoV+1J zTce1Bw>3)EGUsiLZpe%;(9iMm<}fTU<#0p)At!Ih(AFrz^0r3F8rBUxz7)rELq=KU zH<}HQ4VeXIr!7a_MgGD5wIZR?LRM& z^yD7Lf8D*$JNUzNTUAdqE zaWCUDzTo2trW|e zLC{V{H`C-d>;}!toGSfy-KPqcy4CGRotGKy&JXDH0e{IwTsVj^wH zcrY@~hUUfiTr2`GbbF@=&5*NqdC|>9B0zhyZ)S0heGM|=0A}0JC};k{Px^=N@5l#f zzCP{8aO=~4%m>EvV$26-TFEW$Vjl_qz`tal42ixzt?kNDF(ZEPOMbem@&05VOYhhA zUhmiTK6yW%Wvcjwc5{7N?f0PVBI5z$=Zl}!+niaS_BLn0ENdD&pH|-%0mgZBgL1K> zd*d{7{rWh~T=^yIy}n#GhV?BG;JF@8?|2{hh4Oc#kFITn>ma3TUX>xh#q_yA815IQ z7s|R%NP7h{bj@qT(+_a1rh25Fr@TZQx zo18BW`zLtMTEK9RcMi;V5e)Z;>D=^8+0(1GaAzj`pPP2)*4GhkTj;}W3w^kA)9ws= z=Voxi&ESL^Ipf^oHaA_DJvJIvz3Ba{7rmeLqIVDGvw-<5U_J}o>$A)-|7RrppONr? zM#6tE{Rh*3F#V@{^?$KEORu`9ySnD47pKMkaQ)MmMdMe$M!3JEm*!coK;5<1pbf-< z5t@HEd#h`+=3lR1i#XE!=oQR%ejz`2@5~x)93!9L55mxVQh#Q;a-jZbp7Gu`Ia|C} zpz&)9d9UWB-m7`3_qMrwVjPgK^k=Z$t9h*VY98yon#a5sdCYt3MIVQHk#W$xSAR6` z)gR4E`h&crKQj{k%rJj6kJTT|WA#V#jQ$|c^nK%diSIAVe+S5SOXTX}I{M&b^x45E z52!OK$2&zv+X7}e*;G@1AP3`K*sHlt&meX0;K-=w!6>(=|G~|| zXgtVxJ}}~j@f6)-`~{YNrN}eR4g8^;&)eu8ZeVw4WBgo_EddzeqS6C19l(qmm|;j057f zqvyiCsCyZI#4XA4(_M%gK8MMF=;OCU+IDLh)3!s)*k{YN?5P_qd;SdA>*6zJ;bwcR zWlZl)x`BL{wO=S>zApimba47-u%v?BLw*yoYDq1>mx zmun2PY$6^L<8PLgC&#Ccmw8`2MN7~>>M!g2l^flkD+2U~ho#?i+!XhIqGQt8^#67~I9AS|W78zl+;khJD z@myqtMMhX;ghfVJWQ0XVSY(7nMn2*~9^x}eKB!xUr4MV$i)361{iVZn9$lCh-JdN2 z)SvyM$J{(RZ1<8er%pyigNyg!`yBabSZ88Bz799T(lNW56?gc1z9HN!pU&z~>DyL< zA!+55_}WwYhn-dIlhi)%kaTAi^NKCvepa|u=HIkWEkC=(LF!}iDG0`Sbkd<}Rks*X0+|rgz$}ukajXdZ+#T0U7u5 zqCXQvfVQ`H+Rr=oj?)7D6fn{V{Y1*qS0y9u!RX`Qj0Ilw|11$8o?BBso}Pou)|8JY zd3*8vn)rcuZc1rBq0J|Y{{=AOiT+@toc%AlaS;-~a50|ag%Qs;6Y=yMWZq1~lf1on zo-TeMo@-Nno{@|=lM!by4moY4;wuiV9Wo*};w&$WqodJZyc6Y(T(FP>i&KTsyu zrnKCm4@gEI5X^jUlruf$c6TvuXUZ@2Q}amuR8~KISy~(CBjr2t^Ca}v z9*nvMZYan5MLFI(GR6~^RMkCNqnm5`yofWH{@fDFQ8>VSb}-z)Pr5-^jdHlz-hAhY z5_jlhIwI}w3rd7HfdrkakoP)@+iQ!?%aGyasrpPLi+f_X0)_kwvZ<+%5j_+IFuz`mTQdpslLeD+2+ zEHjj&{E(3^8{>Q74_S2s8Wz%49@$-NYsbki)F;Wd8lCycDQ%zdJd;zfm#;byFw>E4 z@NARg`bFJq9Yi_P;CO%uT9|8RW z(2v!`8@E~KM(7BJP*dIlT-eTgvlwt77EPrNY?l# z<;nc>XR>tn$Dh42In|wgUUrxBc_*j*{4ChVM_J>Ol>7O%$tgeI2Ijq59{m|EJ1!so z3>U=Przf7D$fJUnlOf-n_i{4i zU(0$q8S>7Imy;nM5RZZJyky81rM!DG>A8rn&Kt>;&EKzWBDgSQ1p;0b%h?}=)^#3a&K*Kew z;?|Y9brfLugL-&YWn4E#97Ge_GOKbF^x86B#l1&Czv;%VWYk4q%pZTY8>jDx-8emn zWAV0I`8-a3%QJpPe0JD-uxOa^zR|wM`$YQ~?;Y)J+!D1I z!=4cR6f+jaf3N+$M)`-e4~=1Gh;rB&BE!xQ8Fq%qurox4ogwnmwWp0?bBOZCYL6Lr z)H;m+tM*^U57!=dwek0B-#5Ohc9rp! zwJVM1*5(>RFGc@hCy9Jf?IL5?Orm^3ZGtiEBvF1$?HFU&NunHflE|==M24LtGVCOg zVJC?UJ4xhSYP%TsuJtw!YoT$uRyHow3dX5g$~dS6#+_kjNdG?xKQV?)Cd%Ir-#3PR zCd$`~eI_#OGm&ARi46NpWY}jS!#)!k_L<1A&qRiOCNk_Zkzt>S4Es!E*k>ZcJ`)-C znaHruM23APGVC*vVV{W%`%GlmXClKs6B+iI$gs~uhJ7Y7>@$&JpNS0nOyp_dG~;iF z-!_KbCb~H_U-Y7m5s9 zP-NJGA|DtYXgn+&W;`?;YP^5Azwzh8&l`U({G9QA;eN)@6Vv~F!+nimcZzb@og#;F zkxOC881|?r7v+?3SG5as60WWMwEC$rY*taewYt^#@72E>!D!<*Gq#>gmQ~t7DB%uAXcR`&hhpRCSc`vDIUZkE|YP z3>#W>|Ap!ojE7f;8y{Fb(D;Dr0miVo#d~3Miwv7vWZ2vy!{!zlcDBf{vqk=>@==BS zPURirjg^hYu*F3;>nrPx|6KXAF>G|v&C8XSjbEy~Wc*y^Ib+!IqI=l!B0o`i!WeeE zD8H|ApYgqwdyQe=i*D|!++_?~UzA^4xz-qVzbJ>@FEZ?Ykzx0X47*=s*!m*F))yJJ zzQ|`(&M+QV8E1T2!pN`_MjlcbVho#Ml*3LK z8Fs?RuoFgxoiH-&gppwhjgb^UCv#uPk3_ z++J=so?V`8JhMF0ct&}K@psGLHHHl{#sN0W$WzKwjK`P98^fL%-JDiF%^0@LD2Ht` z@)6}DjA7@D@`K6;8N=oo<*<21hRrkb-eU8NyhnKtW7t2V9QM!1uzv<_k@4E5(xwvS z@0Z>;hFvtue^vUG@uQ_jjelPHx$z^VM~ojTJ!HJRwA^@EX_@hTrTdKUDcxhdRBW&@ z+&fEm8sApB&G@F$O~yBrZZL+;Hr_k0G|w3J+bEx1nr#eQZj@hKy4d(TrSBNS#v9$h z#vA#((s{9V`;83SZ)DhhBg6I^8MfcZu>D4c?Kd)PzmZ}4 zjV#vQjA8GMa@cz#!^RsKHr~jv@kV~P_^vVRy-^N(Z)DhbBg4iU88+U?u<=HIN^HE5 zVdISq8*k)?iw_&a-W%nx_eO@jH!^IzkzwPF3>$Cc*~Qt$(~HxMFDqVVd`a;V4xTI%wdBjVgOMzi6Y)mbT!b@^`NS{ z8*=WIE$t=}9|6AeS&+0uOot>Sn)i_dn3SIQ5o5SU^Efxgh*6HfQDTUK8bt2+&9VM- z&b_)?d32Xi*M{o)%~4}M*W7ciG1nY(aSoiAbKu0B11IJjIPsaQ&Wy~NaFV}b)hiPTak!J2L0VNzQq4 zV$PEjbDo@-^W?-|vh(D`oF^ydJUQ_{4*g@~|26c#BLDr+-$(x2p}&p%si99r{^Zan zBi}uAcjQkDeIoM5hdv(puA#dke{ASuk^kq=|BU>Rp^rr7tUHyHv+l$n9Qt77-y8b9 z$iFl6JCQjLPx?0v-4yx14gI&s?;d)01__fFn4L%f^a{;BpxqxEM z1r&2Gp!m~+pN`BKfs)@kcxz)c;G7IX6-AR(~rpXDCX}8H!@|DvCKzQOtRYV$M?(PxMbj zepCOOBEPZ!jgfz@|K}pVuK#tBIg3&0a2BJOvlzv%=zm3I&K;7RbBDy7J0yNVe>k@% zT%*JL507%rYn0BR{f9;#?jMfKIgZld97l0ie^=zk`X1|({NcWbBmaBfzenb*N9o+x zcVA@AeUzMYAH|&eDCXQp@n7`)MP$x^l$oD(U2bKjdIU(|O|WX_M24(CUT@i7;_w(qr(U(@%R$Y=MR z9hoyGrOz3YV$PKmbFQSAGb6>E87bz>NHJ$dia9e<{8;Z}!Pl2(i{I+~R^&%|ABp@> z??aKl)cd8#_x9c!`HQ_@jQsiD&qw}T@8=?aw)eAnR6>8=iEy1 zpZ5M~_@za*P-P?}L*_M)XwxxJ`@Ak-Zy>pQ{ z^HMsTc`4@1OEG6&iaGOA%$b*B&b$<}hg!^;mtxMj6m!m{m~$@0W4&XMIpA_%-pHJDDILza6m!m{_-Z@nQp`D*V$Qh~bIzss7khp&@@01BrQ~n6GcU!L z^js2|^Diam{7W(CUy5JV^Qy>a_naM>b1|jExtQW+Pct%SWJ-Qw&xw&aFH>^P%M^27 zrkMRy;{Klg$ef)iIcH~zIXhF#*_q;p4t^*y=V(gKIhx`lx{e5YKNwFqQ&aLox($Vh<9my-bp`*Ywn`=d1~G+rw_#Yr;o+Zfq}pICJEbwYP?IUGQ2O8~U5za|MrP z{Bqm#6ZZC){Lw+*pNY=8(ZubwiOa0w{+^#K1)M|km9ejszJOiD=f*x4`A*x*XudNo zb_MzSs+?!XW~2NKV{eGOVQfR>7md9rvcIp&;~qM8Xp}!|>{*fh-Bqr$Ywa%ldP2T$ zUHjI^Z&~}6$QOtAOu3G~XUf^%E#=JK0;R*=0u{Pwc)SXJ71h18h$9UzbnV(yN7p2`L7KBN@Rb> zjqCV(XPoa@bC132#M$2qdnla!JsQqSLreDV2IuRCu8(}}(6y1z9XdDiBZH6FI}2R@%Y$Ez{Fj4&8Tp*S zb0YgY6kPw=gU^ogFAsd#&eC_ezazl;%z-nb+|ToOxu2`=?C0t``&s(Vcl6(Z?^x)2 z*o0y~SKsA+uD-LMIq&@WzR%m2+WD@&yCVB}@-FxD-ko3B_sXbqcsQHg<$gB1v!BiG ze1o0KqV)YNbeH>C=+1sVx$}v=Cq{igpWNk#_8uDLeh#_I{cLb&KkM7s&-!-uv%a1E ztZ(Nldakf@u$^Dr^Ww!Md}Z&B3-Xmk*-&(IJRruL1ACG z?TI|LYk@tQt?|N{eXjVPAlIH$SaU#Cjt=vLMTukbe<5I>gYDQyN8SS+lJr=)+C-7PP`}M$3~L; zjz#9NN5}DCq==Y5WD8ZNHHE5Ut%`Mo-uMnIFq~2>VC$^)eSp`rPP1v z!7y59j5vEbZy2FH@kKks_N9;xZTNcMb5gv*0x)v)ug=cKVs9#CD69;@6Md$Gu8fw)aM<_`-<}dcNe7d#=u8eWa$iBZjy6fB>k5b1C#d^>3Y52QliX1 zZ-s+Xncr`HMrHnuaJC_3K4au)zb|@uVVufy#z-p986&AY(xE((Qy%G4o>z{h`if}> zePDi0upiFIxW70poR>&@iuwEf#p&^!%)}c^{{L`(VDPKEzu45L^Ca&tUfRbQE@Spx zzrT3TK$8E)K$71uAU~b^3qL22^278`_R?47_Ps_vZbb?omH&7P!4DLdb&UjShQITV zbT%0?K0Q##ccADybM(ucofyu<5#yHzQ-*Ek8<)#TkB`#)Y2!_nD0|5542|OPM<0LO zza!4&J5huD+_8J&nU=8X4y(TBj@_wt?uNZCt>WCVOUm<3o5nwTu%EFBAJv`sl7{Mz zPU54w6MwW@=c%4M=FGKbueHh#hcqvc+-hqBf$KQ4w^{nI^x4lWIov7txUS>O-e&2; z(sy~T<9y0m+Jv*ku6&%mxQYu?N6vQn>S$_bSnUj}oxeKzn+J`VJ|{+q8SB0}dgnoF zqug0?Z^M@9q-*ij(R3}oI-0HpI%;!t5~pjC(kc2-*KwbbZTrqK1A5tDV^^t2TrsXaB0?aHrg_h3hz%?==nS`#k0SA68t=U-YG%*{`U) zVCk3d`3z~oopR6Db)3uhdu~C0w+^dsG%arGW9X=l zp_5qY6n!ZjSn0s2kBR9^w+^R1CU$x1W48{cK6dNy_EE-C#&9^bRi`|)XQy0ayWdxM z|6z}%u9x3qxV(JdX}H#~`o<~QwS$!xtn!?aweu-iJD-xZ^C_`?ngu#)PjnKec24OO zeJLF{weu-iJBw-0Q?hmzyF9h?DOo$0?{p1yhgJ7uv%15oJFL1NoAo!?>tgmn)(*#J z?Qm=?e>3Q)?&u^=?Qm>aPV4@rpZW%SN_8D!mD%O~-OSnVA^lpz()Tq3mw&+D0UO$( zeD7=E@*S#y%Xg?|?0LD|nY~ylTltR4pbslwm%Dz><$ElHKKqN5&Xuph z>PxWt(x$;Qhl-giHw~saR4lpIt7ST>SJODP&!$1u3wdfEbkrv3Bvv{_UrGm7I&f+q zG3~HvFtv}^<>`C3X)yI+_ME8QVD*iS)+QReV14gkwbjO~t;Dp+#;mQxl85wdUO=vP z+nBZ6#;n~o#`-ob&D3t_sIAaRoa(qSt0Oj->IkcjF8BVQbNL?2&}W=oC+G5=mO-a{ zk7dcJ-Od_F?FOse&Kl75Z5C$@q<(VNfUYm{R9|#dM|2V^ouV(L11lXk^%F7u;jDqw zPsA=yZFtr|>L=xUHA5W_v%08n!0H>Y>Uh{dy1s{H^*t=B?_sf=%>o_O3!TKNzA2re zFQo&g`W}|mS4_PQ%jzq3d8+SWS$)~}qCNww&#(tZa#-^6-JzjH|&V)R$WQY7^wCZP8KNqLWzZ6n!ZjSn0s2FNtZx zR)6YCVwb13ZS|+VRK5!|w3V;X`rOCf3AGQb_Hns?2Xijpu^G}~PlDpYip#Tm$zkN& z8^hEc+p680+877no1F(njK8@Ue{(VZ=3@NK#rT_x@i!OaZ!X5)TU@gM!Ii}4v3=j(p>eM^q7w-{e<@h3+<8QJ$Kcp32fmJWX3 zV*I|vziocsV*I|v_wVtlv7`8q28+LHH<^hWL( z>51GuV*eFh{)0viirh8Q71<=MEynL#jNi8yzi+YcPw~3o11>o};NpC}5npe~eLsuG_5Cc)`I;nt-_pnL zTa4eg*!RD9+)K>wTk?E86JKx1@#7Zb$1TQ>Ta53vIA2@CUt4nDYvcLiyDj;c`EHBx z-4^4!Eyj0SjPJG>-)(WeMwhS4`CcB+7awiuzbwXoS&aX(82@E4{>x(gm&Lc3|FRhWWikHCV*HoI_%Dm`Ulw0u z{>x(gm&N!mi}7C;3PqF@C;c{Cvgu`HJ!L73XX6`FcBkyVAjLSB!707~fbizOmwb4gCE>?~ii)UZsOi zs~DeFG5)IJeEt0O=C3L_eyL*oQpNbCicc9jCGv^pqbfN*s$zUp#rUO)@kJHemfpyZ z4n7*!sPRjc4t}X(-?!-f2VYdleGj9{|7`HjqWsRmJ0s&;Dt&xQ#rT$r@huhOTPnu4 zRE$5V7{5{Rr1_1CC(LhDjNho(_g8v3eSf7h{-n~upHz%LsThA!F@B?B{6@w2jf(Lb z72`K5##dB~uc)}kd_~3hhl=qD75n*HVmsrP%k4dOG-5N}jLD z=WFlyQA+3K<~u1q&3q@t#}6DI`Gw{$DLMXvG=%>+E}AoqZ3iGyal_i@&58A4xHOkz#xy z#rQ&s@qZNK|0u@KQH-CX7(YibevV@N7RC52ijOwGMe*V0t0;b+`6`O>RTSf^D8@fg zoUbSUf97K-IX;GBd<@0-7>fVGd<@0D&(z!SznhPtlbe7@tA0 z?_Kru@fnod*R)-Z&!FV^42tm?6zA*S_y9_d51`ohFMFE4f7uz|K* zp%ddnC&q_PjNhCXzd3Qf4v&AF+Fy#Q3R+@l6xsk0!<+O^gqk7#}n-K4@Zm(8TzciSY{) z;}<5z7fg)Lml!`UG0$l9ypLxzVxE-J*S?ZvFyi&?i9vu-bD-CoSPy_j`-G3)kX*6qct z+lyJZ7qf0JX02Y#TD_RHdNFJDV%F-#tksM2eW$F|2l;qWuvRY}*6PKq)r(o57qdPu z&iAacJ})`z@Zx;`Dr@PIvz9Jq&0NfyxtO(aF>B*u*2BfDhl^R?7PEFOX6;(c+O?Rq zYcXrrV%Dq0tXGR!mlm@YEoS{$%$l>9HD@tv&SKV_#jH7t^ZmE1GfU2TvN+$1%X+fp ztoMpp?-jG&D`x#x%$lv3HCr)jvtrg`#jKr*SuYi{Mk;1qRGjZKWL;Ep)<4Cpd5T%v z6z6*mS;Lf^HB2$Jvo8Qg)&Rw<0g74E6SJl#W=&7bnx2?7Ju&NbV%F=#thtF< za}%@XCT7h|%$k^(^)4}MSz^|*0ypiQLbjGAIcr&B*002@Ux`_p60Ob zO=8xX#H=rgSvwN5UL1A!Z#z z%sPg+x+hKYeD4`+4wAFxAZE=$%=&`gH?rWjjKykvHq7~4&Zy(Y$96JxK5vDd`dYhvs* zF*cVN+e(Z*CB}vlV>gMheZ<&4Vr(BVwvQOwM~v+w#`Y0o?})K$#Mm-oY#A}Oj2K%+ zj4dO^HW6cwh_Oe+*dt=>5i$0NIJe#My13l;F6Nxuba@>=S4>71-ZI`NB&7kxULtzHu<+1uGqwdmR&xn@>b4=cX(!thg@sxQU62 zjV27QrTdo|Mg7&+gUoW(s}2qls+u^U8|EEmi(qQNe)Z?flLld z{y-*&C0{?B(t#yEb~x1qR$W}~ZIyW3e7;gUoRYUu%lFnSUs(CN-1AL5ZvKEN-}|!kVdeYGk<>o0Z5PrX5MveN9##SmhB@ zUorKC)wWeR<>B4qRk_Mjm8(4MtPHTqAm-hRV)Jnuf>nm9TxF=rRfeiuWmqWlrTxXU zKdknz%Byjuuj}%hGEMGJ`0l99`A&(~8>>ISs=Ju>7t{W*>Ry$r?p3+!UX`o->#{Py zDubBz7t{W*%21W73{|iR?Ixz( zVAA1xT9xa1RplykRjx9>Z*^JbX3_nvRjE9%%JZ#N{{CtDfaLVC<>d4qbSNj^_wS~o zGAm8RRhg@DmHCjeY_#DY4W)L5$(OTJ#*B3xM~&&9oOc0JFUl__Usz?X%2m!s2UA-e zZA>~`-{)t1%Ye%%+wmFi>`!eAt8K+xYcbavR(Yy&m8U9KyH(|Cx5LXa&<-$Vpq$Gw z*BZIn^Zq{9r`^P~8?16x8#nc^EnpJt8Ch16Db+78H?#MMpNr(AY zyb@)&zI-n`eFmnE4V%BNFW>J@n=h-A>GN*ist#?!8D^d)_VqU&=U#~PnIBK>f_b0t zE6e$UbbhUzD=nP@R{6!G|7&YgImO6# zmvODB3s`*>CLPMKJBurQ#>wxdLtM(-8Q04|zPFa?^Pc71<-Oc%?4A==`MKNl@3X&G z-GY{?|D0vNzi2=ITs+W~?w_6g{@K~@pPl{w+1c-(9|-Fh^zA#w9tdZ7`TeuY{r)-X z*nP6=`2BOIT8bdag`Eo79 zTvJ&6xhhv)l5@T8Sexnst1e>F7n44$^s92EUzMvaRk`Z&jxtTZe@^AOCM%DawiVO1 zu-djNr#ycD?Ddkq%2U->dD@nyt}m=M5&QkK%l-a2l|ed^s|;1S%21W73=3txw7;14 zht>X7c{Q%|bzPoQrpeecIqK=q=Er8d-dJ^qRd+G%FQz?VwSQHvx>x0@dsVLTugl5+ zs|;ele@^X>TxF1s-&a2n-fvDHsLEA_s$69_ek8Tew}(A1+D*)NM=UvIFuC1VyFNPS zuSx9*t1e>NQ%rlpy1rGpu47fMx>V(=%llTBbqV*?sXX6WmC7TgzlrHTu*y@Ft2|Y? z%2SoAJcpF|(msDQIVLRjx8rSc__1(J_)Nm@9%RR z+Dc4Y!767}u5!M%H`N_h-Nn>hOxrxma@Q&Y7;rVa^?u&c5_b{#|uwH@~kYP2E>}`hH*Sa=)+k?~dPBr!v2|{Ju~I zSl38$`h%E$a-NMv$`|H(QAaW9z)DAQ(h(~ieP}{5uHq*6zrZH{#WA>x#!MV8Y;-Bp-WqWpD&kNf2ug)m`>`2>sxSzKSGd41| z!00FqOCqF8+RwEg*7|lAQ@ydD8*99^KZTF3>yKNg-+tP~oW&b1E(?5GJlnQi%!hM& z8MnoZy<*AfH++w(a*h9OOIh`zeCY9g;5!VPUW@UIkIFV^?7G(sQWwwbnnC3ilET6RkUsYsvHyjseNI!FTAhzeY>U2eEhs@Zie;UT#oskBB$J5 zU)O(`rPH?W9C5|cp$$CF-Zt|!u?%T#@p;*r+H&k=@Ugxvk z)8BQ1l^^c!YTJ3%&K3+GUCU=%$n~E)DxK$!?puF-)PK$heV6mB+lB3bH7<&l{rE@e zbIv{MQ|;mlJ*lsJp+|kCDo_2gQ=ho>Z!c?zU-r>2^eop$*I1sEp*2#RFDYn6fc$TOSDLu#@Kl!>Lcg>XWegr1YDn&qr;*?^X75h(Wt} z;WMl*E&CqW_trVsu@$+Mp~W059qCh7>?q{c{;fko`yZ(^yW7Q)&mb-r6)y9Na=s(& zVrndv!P(2uDNkkSl&3OGjioY7D^1I5dMuS;Z@HJ@9O+v-IC~j7<*5vv@>GU%vNF6{ zX<8Xxot0s4xtHM^BdHyny$qf5READ@D#JJUE|k~en@ZEl@J-$;P+p6@u45zF~?eG$%X=Qjx zcu$h|$-U)XhW4sd24^orr#zLRQ=ZDuUX{vlwbHaQT)iq?i@oJuhLfak*TUJ$&?!%4 z=#-~2oRpQ}WTk0kI5{iB-f}O)``Bkzjt|aWhE91ZL#I5I;eA7?9d1^dR)(87o3HGX zd&|8Hv(mSAaP~5E%2OFS<*5v_Ss5-RmEnz98TOWY8UBv@oAO#Xdl@?AsSKU+REEDBOxNP?m8O;9@406xuf^VSFT>lU zZ|&ghW$2WrGIYvQ8Qzwap{+En4DGB8d&|8HbJDjmIC~j7<*5vv@>GVotPJx?)5SDIFaxA&zo z>@D{)oFjef56)hOPI)Rrr#zM6oU9D5R+?6ZS7&9|Tkd7}1a?&U-E{Ucbjnj1I_0Sh zpTGty+u^U3rj_BZds92?E%!2fm3!K<49;GLPI)Rrr#zM6t39a<|E4sp4FAS`a@i;M zmU|gam%d#KXD>siJe8qSp2~1~R)&`;O)JC8vNG%~_cA;aTd8aZXD>siJe8qSp33md zuG9|CQkqtVXJMn2?Xb7p%Wx<5a9IXtFGHt1m7!Cf%5bN-52-(VSZP`rJ{;^~zlYgd z?q#?o=(|1a>^6C)oHDpg-YKUHtcA6UTe33zR#t}J%F3{}+{Q#*9Z zQ#;(0mEqTwrnSSbXJy!1?q#?tt{b$At3q7t*~OBzzLwiZtP!jW_R)K-iHBRegMQ+6 z@tZ-uC&&}Gi#vk+_8?E(E`E&X)-7zV#f;mm*deQ&5 z8H$S;w~JTxAwSzHyqK}wX9jsY$P>4V=djk%I@FBL#f*3M=XII3_j?VurUuYSZ1+op z$Y*WgWijJ+u`9^03i8D5;%|fe(?OoNUA%#Jv$bAt?`B)fxLwQy`E-ycwrd^aHwAg( zc5&h=(mBD5+Qp3R{v^nE1$kn-@3nWB4Yy7*qkJ*rcJY4J*IGB*`r2Z~?c$Lje>lh! zuN%$UYHh~FtL&X>b}hz8Cvm&j7UY)(dEy(#^0+T}262yg25~!??+EJvi^UP9)74@f z;D~1|vi8@a@4~hY&|>WmM#t=Qv#(#^Hh8n>Zg<4>ck#Y9*ycw(<5{N9sukrSFPu*<6INVUacQ5BZzyLTH!tU83UTwR+YLoWbyiM9`Q=7EcDz81Z%B{TUCyKjnG>^M( zG{s#vn&Pe-Roq4Ed#R2Ov*z2PJs%!P?FlO`thn^skZ-7C9yhP!!y~CZ-=F1mbIj}J zEH7Aj!6`3~>+PAx&GWiB%j@J|gL{8IiFXQydY!Z;)eBZ$aLUW$dR}?lJg<}1qx7us30YpS@`6)d9@q2ASlkmdFInAhvGykO-8r@TC_=at9J^Ll-j*WU(P&)e|RHcxpQetIyqA*{UM zl$Xc#yz;ntUY{OJZMZAT>#CU7RasuJ@`6)d9@q2AQ`qse#mnu=0XaULM!;%H!sFO%13Gxj)fZy0bqY zOLz9Cv2T}|*V`nIo9ET;OL@I2%j@iz*V$QKu=0XaULM!;%H!sFot@?N zSHTYTYyEM%7xj95yf@VgR$g$*%j0@pdE7j&kN2i}{cEuGJg*1se%SMRuqWjOD=#?Z z<#9c)JZ_%XgFPv))3UspF|THp7p%PCl$Xc#yz;ntUd=489}D)Q*Xt0o3%p*3bftR1 z$_q|;d0fvckDKRpNLQ-Y9pU@pdEFk;X;`1X-R>^+eSwu1obvLxo>v|>&+B%3*6;U? zi)It0KA(R#Q(k+ryx^2q`d-^Jf>=(wj|ye;d(=HyUb~~tZc9gXfmIhcrT<acTC@!D12lS+O2>2{4Twlwp5AF)m~r%zu#_?uZ6~~^lg*Dg+29LUd|u+C@-E* z`ZLP^!I~s#n(gfDwsWW4+C1!!k&g7ub`JYoL*iNbJYyuUcENkNyNjA*?{uBOAjnyhWd;o~fwD}QyDS*!k0d-C37>XV&+g)`)hCs8gxyE9+h}(oIV?FkKV|x) zgIv73*ii1b*kEaji@x2(vGEl5fGue(++#(WoJ9XFUxs_$Y}U$N(#>buxc-<0q9 zcCV=VqN99~ix*=Z$v4$^F{`hbe6O?etDRw`f7j~kvig?ibXa}SQC{eXuZwluU^=P3 z*Jbq;d%mf@*LBo4<$L~6o^M{?JYUt3e8olIbyq{xjNg^@ zb7$B8dZzQWOvl-Ec0?T;e`5NJS^A4v`eNcP7AgJ3BBd`z=ejJ->#{Vj%hD9PeoFJY zEKM;w?JUi9mS($1b!lhmi#={izn!HoMn@lwljhnU#=3TKNo=dCjxCwlD@`cdAH+6n z7w^b8&C9k%n#mt2$IPNHPrqIKenao)7JK=BDU&<9{I4^)v&%o8$(>#Pa2%7{g|o{~ z+voltCa!}*9d(~j^lEo6>2oP3g4PrgYkCQ#v<}rF3o_OX=J= zmeRR#ETwbfSW4%{u{@n{Uu*3Z*HS~jFV|ATJyW@s8m?iv&RFV)b;eRZtTUGSVVyDP zmuriqepp*9^~2g?sUOxBgMMj0m-@keF7<=`TeVz6x@99H%%6s}yp7NePlxKI*;<=9PC$;_B#+2>n z*{^ME&&*72{)H7ed4+x46*+O)$DQjhnvU*Mk;9g;)um*s*UtW=vu-qTdu`$y#}d;R zd^GlLH0EA^cX@x`ZEY*2ZN-vP2KM1q<<)zA#u4(+Ue{xdEsgN;F~-jo;XB{X_J+5! zYf!51HO9Qi{?M70`&fEfX>a%wN$bUXrS;|zfD-Pce^%3Ii zF3LFe?8}1TqkP6KgwC1vqd#(Avb%6U=a&Ue{ujGTUksivi}9rpBVWwoE@r+PV%JIg zu_Y%Rv2+*%usJ1PPDlNro#o5-pZ-JnH5M$l_gm?kTKLcw{4loQtFT-<_?YVH``GMt z@iDAZt}#sQ^F-Q;^i^Ndhp8jqqpFOl4S>E@c>XV=}y~gSLj6Vyj zBa6i>dl!mLL-4!Vmr(NYJl8Mz_g9N|XZmK3Mg84H(%)SqecLk^)3>=J>bEm}yVsBD zZyI6_aNo5}LpO!70{^9Uv9y}H|9sfXzKQ2gVLaMo_N3OiV69KVX?@D|o0iUQt5J%( zJBzzJi|g|QePOXfKdfn5&V@z$ZVT`$?OehA46Z5>AWD*aYpB8OOrPf zynD;HABR;hSb4#!`(klaJcsgVyIUddO(AZo7xEN0)%|E|tE8XW5P8y1?cC1tvZ98M z#vSfM81M8Q@v+AHs*g4PUGTA{Q%+ySZ$bUv$C0FiJdGora(%ZIce(FZ^}FL^ho|FX zL`q-ZBgvJ%*EW5RxL5MA;@u7Ut=HGt>+APRet+93SDN;{i*d!og;RY~T;$cbKF;L# zX0GpbboRQWG`W{c_b4gNY8@FT@B#YWV(MV><@)|^v3@miDJQIQR^@6FtqTvg%$BtE zCi>O5rDH3^A@1|K`+^*Ot{pn0X&mIrS8=%lwpJDISK7skLOR1CO)s0*HHyog*`keLORL404%>BY6-}>$m9O*@yJMA= zDflvyX3!~Gmj3O*SHt^6r`+n_@;-5U*kkhIlkuaxJ@|7-jt=c&S;u=_*?>F;p-g=6 zHOtSG-kqIG4EyzHnNE5(BBs8(vu7i)o{c0P&vf`!`-iyvjN1?Ee(mBTVO;Qg&zslk zySJFh7mJ(mgSOtwJ#W(4lj-cqbYP{kJCnnbw~M#BZD0)olfIYXt=2X^?nsAmVUPJ@ zOAe>7?{x4o`W->Mlts{7#Wbc{`jS1myU_g9y>eo!y^yJcWmE0 za&zSToy5CV?TYV7Jz>=ek#8EhDZUeQdT2T_@0?IxpC0^ld{^aFgI7hK9h{9kH82(5 z>6pJ?u-(^=@47p?@9fAQ@BMguAKQaH561V0HG7(o59vB2zW3|);&y8VZ-;%oTZ^{h z`3rvjw3V2)3eROOV87zS@jW!OmE`$5S7qs=vY!>Gf*QRWCPN!?5uw{ zU6*v$zZE2WC=oyF?5Ed$+Qmie!L$1g{NKN+^4l}7gUe@OO`DI8jq=^aE%6!I?hbve zvspsrM|m+maxb<}{A3sRgWUhZgOOi`zf38ASvaqN{_NB+&m(I_{^@#=B zqoRIT7RO?H-C6&&CbYNqZMWY@i$>1rZ+5oI;{pYMr`mpq2>GO^>rO!Lk z61%=7Q(QEf^v@YRC+eJIa+L>G`moaHooY(+_)H&`J}iCSyC(g|Mji`$zp2apBll;V z^1Xi~r2{J+-eIP6cyF1Q_m(A2b=;K2<-KLnd1jeD?EowNC!+ID!~euN3E|rP({L&? zth&QWbI#6yqz0?ewm!obOumt~Hd6dHG#y!Z_SwycIJJi>=beVLWd!Zi^Yu#fNi(B-)D{F^$W$hrQzVFJ~LG1F>4tK4-%hol$&-0GA#HkNlwmS6z zSl5^Lz)63`%&iO;Cs2Evw6ISzT_+ z>LRAhw`Fw^yIf`4U^=NTiHAd6eV2)=dZD9w-Imqswya)a%70r{FR{y0z1}nMp4boH zGm!c@tbPlt-)TL=uW<}kJHSe3s9)D^ zLjn6W9nW~!IM@O$t712->z?8keM9}}yE)XKzMEp&VW>ZSH^nYb?Q?(M{WcZ(82-V& zH0FG;FO4}L>`UcLJY0ORFO?HkIX~E!(x2>`jOkDIrS^fFt;2bRvg_Fh1h z`R?9S=DT}SneXmR?F_4(6Au@6_ogx@{i5&g-qf~t_olWL(}s8VrnVKkJk|Y{-dkch zIZsgi2c|sqAKulcy6_&m#Hp`-u1IxfEm=CYjv4zKthR#HR`(a_9!AVP&;5nhi!zH{ zp6YJzw2R|R`98T8_f+NkP!bxn+A&9x>%P zw`_lxr)zO;c8$)B*ShFCH@l{=#!qy-4-8wH;_<+)v%$EWH!U+U_h4e~&Cc!h`PUja zGWT+lbC0*9KhO)oVxgz1|VWilT2vHV(k57dom};&DqqwLki{ zR?y-eQcS(X)N4n7s+X90iK*8OW2s&@jHP}hrd~IUrG6!LdFod;jHzrz-wk8wI|!>@ z=%`+a$1Q!u-C&&RC8l0t>UG0ds+X90iK!PK%BY`@8TVM=#<54kSxGOm@Qq{N9y-z5 z@bk790n7IX9q!Y(j?yU(wr5sZ+-tJ9u;QYlxY8l+xmnzEv$(M0qNBLdA@12(+_ST| zu;QYlxY8l+#w_l}EH13L=qRpqh&!Ie9na#zii?ioN{6`9Yg0QUD;?rK zb2P<$=4grwD=s>UD;?sFW^qTexUk})qqx!`?!zM~--kz1zOdq=qqx!`?#)@;o3psE z;-aIt(jo3;!ztg(hEu+<;-aIt(jo4fvbb-`;=+oHj^av(xTj=sPs!rKii?ioN{6_| zW^s?r;=+oHj^av(xSwB>>ihXMslKq{qNBLdA?{)pcQK0#D=s>UD;?sl&*HAn;=+oH zj^av(xG&1$z9@?eD=s>UD;?r)U7hN?b#D2od#E;@=U9pavl#XTX53o9-N^DhsjGQ*0Cj^av(xDO4cxDO4c zxUk})qqx!`?x(Z3pU&dKii?ioN{6_AJ&^MK>w%OnthneXu5^fdZ5H?1EH13L=qRpq zh}-H<`L_B~zOdq=qqx!`?obwYD2od#E;@=U9pXOLm-2nAFXam>E;@=Uou?c3gIT^G z%<_emFFMLsI^=s&7WbqqF08odD6Vvfdv|ZD@7=wrzOdq=qqx!`?(4F+ugl`Xii?io zN{6`b?MeB*wUD;?rqpT)gCiwi3*I*KbD;{HMw_ZPCbu;QYlxY8l+5nZXw zM|7n!!-|WJ;!20O!&%(nEH13L=qRpqh&&cA!ii?io zN{6_oW^qr=;=+oHj^av(xG&7&zA%dmD=s>UD;?sFW^qTexUk})qqx!`?pPLgEQ<>( zE;@=U9pc_!>N_VLsb) znkQ#-3UbAj4sp@Zdd?N)eHwAE$nMRME3R~ii;m)&X%IfLFJ5Y)3H$lV*jL8>i&-7W zKR5Qd$ajw28F_YWc3FPI*c+n!gs~GMZy4JU`9)(dihT6g(UG4u_N>TfRG`})XdtUV+0siUWkD$Vty>mz@3NAmV zUUhTi_pEwPJ6IJNoa4d`tf= zk#Fw5Ir2C9zR{<+pYQv8w8}0!}<=3d_(UIy-M@?-s>Y@ z-FtQ9vwP2ud}8m3k=OUGk9=tFp^-;>M&vPTMJ80cOO8>~NBfG@^Qv6FH{y_18$d?tDMV>CEBX6_QA*8>$ zSRFYGQ1*|;sMCyp+kP0M8n)tSpFU?aiay3G$(>!!*d@8M%NfTcXYA@^*I^u!+}Y)f zX_7m;obgR^XO}b9N$%`&#y!cMUCtONxwFd|4<&bYIpd+N!G?BVJQOn?O5fRa7#k&b zb~)pu~h9c$(>!!7%RE6%NcJacXl~rujI}y zXB?K?+2xGMk~_Pc@mX?bmorvN?(A~LZM8Y$wwQ5S%($(%&K{RBTsn;5(s6bj#&hW~ zo=b=Eypvs@v0ZX!mov^w?(A~Le94_%&iF66v&)$aBzJZ>^McCBydWKC*I|y3+}Y*K z7m_=>oVi1CXO}aNNbc-%<`l`DUC#U>xwFfeYb1AeIrEO>&Ms#TlHA$l%txv_^O1C% zU5B|za%Yz_Pf70Va^@__on6lSCAqW9nad=1b~*E!!!{3yAz%b6=BcXm1RrsU2pXAYIz+2zcqk~_Pcxm9xJR+XQ* zRdVLmPWHIWvywZzoHd6UCz8LxwFfeqa}BCIrFvT&Ms%}mfYFp z%;S)?ZBKa9cR~JewPmOyL6mghq+!l%=KdCdNFgo;yQa=CNW4qFE_r#e#*JN zW!PQL?}5uXJ#gB)SoH9&HOni=bG~5gf++WS-*w7)Jm{Bmci?iq4qVRBfy;S0a5)zT z<{fOx_qdVcY~JzozccV1#)qKu#ojN{-vWQO_$+M_n0La7%Q-#B%Q^kKayh>TopMeO zT+ZWx%egynUe0pv4szZVr!tgtcaWF!b>MQ2_H@D=?d31$;vg^Q-@xUZ8@QZj1DA7a z;Br0}zCWUn3ju8rgW)$i}-yHr_R|@vf1Lca3bkYh>eHBO5y!*%;Tz#<)f{#x=4ru91y# zjckl-WMkYuIUC~|*|^p?W$h^%H#^FfjcfLf>o~48vT?1Ejcbi;Tx*o}M$4MNk&SDO zY+P$(<65J4q*r5oqi3Wia`#AgTd7L9B?ZDiwVBO6Z}rTq}% zX5(oi8&4bAc-qLu(?&L)HnQ=wk&UN~v7s@u2fS>fL!*(iaki0-vyE(=ZDeC>BO6;A z+1T31#@0qQwl=b{wULdjjcjafWMgXwXX9)m8)qBYINQj^*~VjikJ-Ji*D)J&8`+rK z$j018Hs&_6F}IP8xs7bhZDeC^BO7xY*_hkN#@t3W<~Fi1w~>vrjclB4WaDfj8)qBY zINQj^*+zK}8v0B&&Ni}fwvmmqjclB4WaDfj8)qBY*lK4f@t?P6VIPgL{I)GQ_P2DF zteA7B#I}XU`q}^BEb(yeR8@|T66Yw8HXo(WRvv_nVvYR_+Z`{=eXpOTVZrc`ezOdp zVZSw=w~TF1Pq>GGFBtRvcJK?vUJ&kO;U6FS@yO2~dwyh%&**4;hBZFJ8lU0z+INJp z)OlCf6YreLVDBFe_p&Z8GVV9KqO0ZdYr{P4d`TuhJlszpUpIPexYu+}d952wd9540 zGuGYSX&m!fH=6QYH=6QYH=6QYH=6QYH=6Q2Zshnd-jc6;OW@Y36!*%ETdP{EYlM37 z4rDva*wp(9Sn}@-_`ZD7`Od&-Ec15;eE&W2FZQ~Bg0t`Shx6<8n%>vMc6)X2t0SM& zdrsuDde4e{X78Dif2Q|mBEPctm66ZrJtOifdS4Owv&BEt7yWt_FN|$_s(G*>w|;MD z$b~Zjg3hU3!Ilg1*{&o%xA)wb=8pay@%oJbLu#*awat zeNp5KMlXnbYM0wolxJcz<@>g^Z;NTZZSB>Oe_`wwV*kHk?1qegHL|{Q{N_7q$MM*i z8(|!1amI$2^F_pxv#*u&MXGWe2TVS`mz?KrPbD2IQgO2tknB{xgfFXv&#Q!ATM4hLguh;C@5?LU=}P!DmGF2a zd}t*+Pzis<4!z0SbyQ*sD%Hr68?)y_|8iB4=UmJRl+w`!n2j|#g*`@E8(B4gkM+*uc?H4D&bGq z%}-w6->!tOt%ToE3BRQhenTaEP9^-}N_e~y9 z-&6^|yAuAzN_e^wzPJ)Tu@XM65`J+d++PWQ*=~OF`hB<({)0;R=1Ta6O88eQ;dfNR zS60H8SHjbk@XuGm8!O?XE8%BV!XuUN-&-D&Y;4@Q+u**nX;?HC>V0D}-}Y`K5YFut!nwUdIJZ{_=k^NW z++HD^+be`~dxdaruMp1d6~ei_LO8cq2Y`K5YFut z!nwUdIJZ{_=k^NW++HD^+be`~dxdaruMp1d6~ei_LO8cq2Y`K5YFut!nwUdIJZ{_=k^NW++HD^+be`~dxdaruMp1d6~ei_LO8cq2Y`K5YFut!nwUdIJZ{_=k^NW++HD^+be`~dxdaruMp1d z6~ei_LO8cq2Y`K5YFut!nwUdIJZ{_=k^NW++HD^ z+be`~dxdaruMp1d6~ei_LO8cq2Y`K5YFut!nwUd zIJZ{_kK4^=e!oc|59js@`nkPAIJZ{_=k^NW++HD^+be`~dxdaruMp1d6~ei_LO8cq z22|$48PGO%yVmgE4;7Y zJUi0gNQ3dkNJ$8W`#j`Eh=mS{s9@*pn1`Jrt|1J-ZS(BB7*DFeSr zi*)%-Ih6M6tno-^$Aw!@eu)WbOEZy+ru`K5?CUsw^BE8Sx*R;Jt7y51<4}vGl8GA< zuwPA>%=lQ^p#Y?0g=$h5|8%v)BO}EUOo8}Nk)qLEjE@&h*z)1iG9E9k@&FaI+g|c* z!hn62$ir0mx5Wjv&*4R1_Y&OApX@_r{WIQ#J>TY%Z@$+!h}TiIy* zqQO5!3vLB&HMv-PtSqg-d;1Kz^S z+_ZIW#;n+#t$V|%3m4r#XI~!FH*DNg_f%_#x~Hz#*!w2yo{ZafN#ldtbK>`{{P!Pb_`9 z?83zCmJ{po(psV(FIQ~5TyH&(d)2v#$*nVW?+Z8P^?l_^T1qte?B>bi82OlGbYodh zyVe*#V$<$Er`qg>t+}73-L`c+`riEHg<;&Q`(8cnt<<=OJx$-cWXI;?>pMPci29Ci z#qRiCQ{M5-Pt7iDsn=)t8rHpU#d_cWDQDe@ZSxb`tS8nBE%mIsQnT*s?2FE_^u-rl zUQfD=dUe-3fL(7WeY&l!7>wxbIYqA$Cd~BOi$@LyF zZ;>W5VR*PZ9t6$6E5AqVXKfCqUruegcw%zPj%C+jj`t$(mwp*K{a$^sIN*J8fA+t| z>E0kqHeI*C?(rY0J&LW+7wHwnzBe5lfF~hZjhnY98Pk$Wr4$`uFTHmW}8-M*P+p$;M4)`lt$jiOSOU732R;ze* z;q&uR_Qz&6KNtBP?pD~7=JkA9d$_~ap8L5mANR4JyOr(jUNZKku!2|i zd3V{L_#6AY%Uh%;ywAJQB-vKj=iRb2_A!TFWqHKDYn*n)KL5L$HqQvkMR#GBa_@cK z<3+j88?BB-9p>=Pt%H+RwR%PSN87sbS={$}Y2`)LmYTL*EvSpWKo?F*O8%xzt` z;+SpAnK<gp_E~oJwqe-h z<)>q1h&#{V)3USPf>U?Bc;gtlN@-*pACNV13~tut%td8l+rrkVEwd&#kgJkU-|F#i zP_lX~?6>+IRu5XTbhuA{>Z?EFKNt^XunFA4YZ^rl)h?5@kelVwXE%aNu44ilbiViM z<8ZN$4w(Ew8_mM*ATN-YCiy_9tweXZ^aX+ONNhrT*5UHLkgyp4QQ?PcQrM zmK|HB7mlkJIqUg;Md$m=Y?!0TZTC;@x?lIb743WMzo5w{r;e#ztm?kEqJ2+x&h*0U z(laJcQkQYOgKuV%!?$KaT}&ccR54w*kv7DZRx0 z7(V0vtLeY?bsJDGDRJ9yx;Ij`A#VRHDX~tuf0vX(LBC&1N=tD$wRJ7aOXFu;AIh`8 zmY3MjL+3X8{^WXbY44G^zQ^_N=>fUN#lSz*(%&&Lw|?8!3)j!gZkgUZcg5_&%%xk` zZ{9p%zh7!9`QxP}dnC$jam#-6WTKfisQaO$no&^ow8e&X35-1x9s~B zo^Zha=oN8soQ)?uu~>ik{FeFotuxcdY?+&znVUc6B^#F8^LH|F_>6~ti>Cj2>eE4& zrDWw!)hx=r&sP3@oXRmcng-`1V!!W~zRm57pnLQyZp6vd=Cvbmrfj`a( zyVR^M%j^`e+W#Q#|LaRn(Z0w1&A2u7^NZ!ad99}PF1qX9PZdUV&TI9l!aMou*eCR* ze=w$JY@WKjJ~^u%^;dLh?K9Ti*o2c)Q(Gsuo>aTl@vZ#P-gvrX)2Hf~va$3aR25=EY+) z)(y!9(Q2(sNHAzSk%^&-7b^5lT{_} zPRsZ9S07wF$=?1gs{`itUM0MTUc(@tlrme?PGJ1eV+6~ ziv6~}Avz*0PhW(ixTjsV+m^0qQ6?W*zskY#k zn@9D{qBT*y?Zq0w?3Mj=v-mt4CNbBxO|GAxSwB0sW!uce*ZVK>T_Ic%XURATb}qa-tD+>=JHeO`#fuj`aZ8%cD&m^YkD32yBwcx57>(7sbeND z*}QG5dGQ{zW#N+Jf>Y6QkK&FC*T?=DcWC;r`ca%2ye-CkjPv8GqRIJ>Av1DxJZt-uc-1+%*juCEJ zV*6Tf@n>6hiRIKLc~=WpanwGZHqg^t4y$gjg9IRJh1*s_oA+`4&kU)vSx zF*00<2LJA>U)BpVp^cvO!VF_1W8#*}XJ_UXZnAsF>UvDw`$Egsz3%{wejLNf?t{&< z+i`th?y^l5HjUXv3=6=T&=~sfH37Tfre-F$Z`(3od#W$*Pgy^*vp!;1Q&KWK*+F84?@Ex?T_!2`PAHsFl zqa_YV*L#yq&-Q<@b#`iNy;HF6d@H)7{WTl+=zQk3ePVqsTiy9qwDaj)w)u-U)z9+k zzPF-%@6WBhF?e@eGBdw$%#O*~iDPOH(z*|>Xdk@7X5L_QTo_JS<9@rgcdZfl&=qT= zgO)fTM#oil-$xVAZJC`}?u|`9$UCIZD2kRfTU_7ld|+pPl3`oy^W3zj-1qDu+V^XR zbXQYutvWe*l zn|>!J#?7j$H^S8SerACBr`-HvfdgXc(%)EQnV+jS71TrDiVl74a_F1iJTYyKnf3Z| z-Tzj!|NWV@x9!2|bQzhdJw}@K=DvnKXjsv{$Zlx9{*&{w^(L2k99+@9hY5noF?Z4C znW?FI@vrWFE86|E&1J{J<@L~4_q`SEdzaeUA9p+PbeMV0!^+oRS{4YlI6^+-W{AV( z)5Mn=vwkzPb9(c(neE{`E&g2ZRIo?v} z=P#U^nLfTgb|JJ;{pi@c$^n0L{0n+`!aFAF-d9iGD>{8+xzObH+_?5js{7uG_C3rN zCf*A-Pi($qOR!wH&8hGE%9)4mSl{>27*F-Sud8V7`@Rp4Om;0S%udZsZK`kkXz2Q> z@k%{4ZkBfQ`uXXJ+4)Om7Ur+E?|W_c{%H5W)=2mk+Mrbw`+U{de%dkpCzcme%>3kJ zJ@?WO_2^fu)ab|D%dO4imTlXPnV-6F>&$#T0oPq{pF`dOIKOD#>{n&$+ zI3SNbe%nrF$DE#+zx0^diTU}RGxkES3%AW|zVt)p!CtjNevpspXck4w8gU=TbXXG{ zz+*Zr_3zg)9mRj*7@x*i85%x=EOHv4V9v^GBK`@a>v|NB>)XE8n|%ul2~6szuh zE86*VO2_Q{@sq(>llz?d#?KmoPkrO(?Qno@{B#2O)Wr0xjeylVz2lYnxI zTc0(>Qt4U|rn<1DU>xoC%Hzl=nbb{skG~S`!@tV0mwK0#&J~?&KRQ=4? zFUykpCk<2EzBI}Kv3<4MdHdFx+EI?aX6;<}z0eK^+|T1en{zQdw$4vZ*M>*k`Bv2M zVBMMfvu(4rb9&wNR)R-XiQBB-y>@v%HMm+h;a*3wdeh$p&r}uP&M_uiG1b?ba@{hl}nd08F>=1vWFviRHvTqcon9Wu8XFgWmR^ahqx-YrhRP45BH7WR~X>6ZX_$T8f zV{Z!kOXcmtW}f!(H{LGHJrJ8b4gGn6dY%q>%HlEU6LbI03-Ex&ZX z`26o~t2`qp7v0OhtZ-az>1cJ>$$xH_o+Xlt7v|d1 zv#&&T+^nArTl3T}%WOW4b-|8fIG$_c9aGe$TdufpW@2u#HdN{%Z$*c^%j{N!A#eV| z+0A~6dHr;*ULNHBG<@_Z#O@HAC3DZVzlJ}K^5u?r{p|K_^IMMDJTr6Y)-CTduMoOq z$cR!rqbTZmmxd_9b!qYqJw1erCF2&@J-)0hVt@JGwn)?N)AwPERBaBjlFeZ_PWXx1 z97Sex5HDCQd)pk<=XA;DpcC#VH{k!v>?G#hh3(T@Cf9G9xp>?fGVgRP%Sb)FY~tcg zCd1G=jkhh`Y=P?CVQp1g>paB?ytb;X?VkVLhuNoURo`NLmCLf@!mafU=2PsSOnc*SK<(sD}1~m(Qp%EEJ`Hb5L50?vkKWWU>TG%;J@0hK- z?TXq(+BddgWBu5=?s_ZQ_4NGa!tGnPO)R_V9S-nDi^-yJGp(LnDpe+)w^09nYn2v?Uns{pKcYskVa=X2R_yeX>xlc9Zo6ai>_Iko5FhJvj(ZHkOTHen!Yzbd139WT#tJzI_|OPOp{-- zV{`2_Q1`tR?R)WvxT)ENE%h^xy7#SU?~7-IEL^d%-l9-Qm9{ z&bQ*7k5%ZY+3lM)Y&@<$9K_n9e%M=teNnVTxh0D>IS@OrnRwaIJGJHFiODTHmc8*i zo^tRR5C0ZT|Merg(A+rP8(_)SrCMP3_z%_Q>sHv5?QW+l`EnAOzw-+l>T$51hF5eN z=2;ul@FhDpPtMJRGrHVua*bfIHoOUJ|B|FGueHq-9^wr(~rytyrt zTc#JbPHda6_QWN-DF|C+{N^AmR{xeU!7Z0>*}Q#WW{$0djHLMkyV`xv8l-+;x8HVg zJn~t6uj!I-7mChkP32<`Wnzf8-oTPqU$oiF*Cy zh1=(s^8r1XhUYUL{{3FYavz;F^jQ1Vg!k)-!fr*RU0Gwr5@WM{!e4wC?>Jrf$)B>+ z_he658h-+vvO9c}!;wwP8`pMc_Pu@YxK{g^%v+2fmInVU8J9EK3ZAmm(8oW4w+-po!dTr zlQlgDFJY53?Wf+(Z*5TD@6i(u$o(E`f_&R&ZDV0=>C()#rE8;+e-7{sANvaFdy`Yg z)NV}ml)Iu+uFfx-n>>+Wj~S+(a?7thU9p~WX^aCh<YM@lbg59nIGr+ z*{zez#T^IAm=>LKsXXtkY5cForpA1Ia&4#7gXW43noQWX9$ie&95cVL{la7Bw#?6L z+p(T?>YMFep`-7b8}bj}zSwcA-G730>c;nebl0?7r+qxS`%iZ$ad{ufSk`iG($4$q zu;T5OCf#!Ve#k{`Y&(0%DWKi}gC^td(k z^OwCxXf=ysyk&iF?-Pkfil%MOu}}30^gB6U$v&Ykajp_QWAoJI_30w@EWe_&{AaAa zSqz_?n%X+KwSLJ|-ThXy`{8lLV)&cq>nG54*IUu9cct|^7Cx@nKDB;s%j}H39FiU0 z)%`a=$h)=Auv_rXo5Otnjr~b4owpm2CcGcJpxq;XzwDZ>X1RvK+4(KF$t`;;uC0Vs z6;@^J{)kTdmRQ*lPV{6EOB&IJ0dbEP&^mAC@dYy;@;a z!@$PuAGcK&I_Uq;-uuT$lAh;b-?V0f5kf+<0_nhJWY(<-Xd`5rJF|PgNX7ha?+BBE z6>WGpM+rsERd?0Q6sN1JwyJt&_ke`O#hoYwjI9VktQZJ$QY3+*{)yp3m`KR6Z9s8^ z0F)EN3}PSO0L&k842TATJkR%4&2;xx&#&$JW_J4hcBlI5>gw+5x1M@`zwejj zk8`X`l~nNMVH$suF98}n4|wIZYQQV^mE6Aw`FsLii8(V)$LmxrpaAzpm=YxS6P{ zTCsI@HGprO4B)4|+LOZGtA#yf@|3XuQy5ibn0_2R3NvXXc0q`0Q?GBiPRV&`=3?ql zTP#5i8%P0R)RgR|XOSfLds)%s*V*DbI6Sk33Q~>R=40&>=qBT8H}P%sQ#@$S>9*wH z<*>m(uQ@P?*XINVmFG>Z@mJ!0kp%-lb1X=Uao=p8L%or3pcOMbKupE&7XwMQHJ4JV zs|*>isbw#C$w`LxIh4mK+4~{hNdB~QC;?@WyH3L@T(FU_jnY`wS2h|5?(uOQXdxKI zVFMy8jPFe;eg6-XG1?sc-Dsm14Sx&MS)a{vn9GxKK2@q3eo!y{};8_XKl!HVJG>Wd9D%g?c0U zj-^FTg>e$OP0sPp;uvyTWQV^bor?LooGahGC$1gAo>T075A^#@`tEADowXPZa(zWd@m_-Sy+;^S#EW; zH1Z!*D1jQxA!O~S~i}^!k zTDYHT)D&CbevE8W*JHo$EE&AMCGuAg=+pqOtF{gg50^J1ODFc+TblxNamPG`+tVZ=4Hb8*&y2poi>m@A}2E9MH#Wd;+w#X%9p;qr=X zb>7w}XM*KIqT-ZHi;apCPR~PB9O<@RoyALzI29G|Rc>&f-f=0H6`Ac+X4B50!We|T z(XIps$xy_}?aIwV7Z07>dEXymQ8#JLBh1e!^ZO9=Cdq?5mEJspJ*U{Ki?T1YL*x5%;CqKr77oy2bR!Ro0?B2$X?@F5LJ2jC7U)U~`~#HyG9xWNjCP9cJj@QT zzVDz~-&cSrKy(Gf@1hQuCP^MX9EC&lu@`TQ2xg~(xz2ky&e#5@xB`<^GLrX&8+6G6 zDX#OiiMLVSi<6-&Tqz9DDFfVwWkQt?9d&|8&?o3~ioV(>gX|e;Dk0c&ioLpTZLjb5 z_d??mlmr^FeO=kUT*Qrnw@BkGeo?BOKne*2D_7{#Q2Quv@*oh-CxX|h;3elH$>Smr zgF~?A9DB^ZD*SY_vBYT;FPh=m2W=mgWT^uD*d=rI%`GuTl4yy4xc<*nR{SNPjetW# zrF)Hl+o}QP*@>>7OV3!4A7j;1(yzDz#W`!*j~gm&Nn}kVty4+MhDt`#7LQ*Q^H#v; z6ntcS?DxH&^lJJ5l;t`~MOHPR-zk-cg=9)h*VSul zYi}rTjJaCvJW^{nKE^7$l@)8Oj|p-p3G3>H=7+DZcxq)0iUa2!mVfK4JSZ{$O%IX` zA34Tcud4Mm^<>=yn!ocGaGbV1+wqMZ{3{U<^xp5Rd`hqDF@uA!m;P1t!cFFG-@2vs zYu=jD%;Uy8Z+E=)lJlGR^mT7_jQQG=Up42>hT*zYZ>+qwsGsFe+Sk`g%sXrA zYcD8UaNJqdA6r|0VtRV6udi#Is?tcz_;DPys#bJ~d1uw*7pgH6HgH0o@?M~_=zT$} z`>&Or#{4JmtCcT;G$r@1eQ_1X-5z6Jl8mcwyvwR4Ppx^>rYX~ZU6r?S%vy;#2%Ko_Vsd%`Mdbq&)-=44TUVL zc&%K2L;bSp0a||HM%lToIwki13vaA-eyv*{(zs5#i-WPs-t%D!K{$amXmZer$r3>@__iu3L zgWnlr4h$;dN*Vp3vs&QCY0NcV>ELIY^$rYrm8q1%g)3L}`c39O+*(^%De)114c8se zRr$b=rEowI+aO?dH{i128IX>_i=lWo05fJ(cYwLH+MwGUqKJA~d1HOvDsNN0!N}0b zz|#IspP7oH&I$mXY7{>N%LE2h7g>tMEJZ#L{5aJJ8qc7l*<5_xuuPVb8saSZ8wmwgj z^4|=cBjrDj#ZR#E-*R24b~b8@mEnd!pw;g|{u8)9YObWEr*KWDT$A}dI0WgV}g|acqyd&v_+aG^e@}Hr!X@ucP^~rCCV5zd7)A9NX)|AW zg6}xOF6PJU9o)3{9dM&@IN*)aVOlQ;Bc5m(AckMXx45 z30jD@b3R`w>-niVBM*lLL#Mqlw(-O&N>j!*j~VkjsO(@{(vZfeo$$&U)%NGxm!8F_ zZqx_yv8Nl-8fP*`A5=4XA5W7%m3kkB$IV&wK9B%!EsfsC_Zg=1wB85T^|9V(4x2P6C9W z(K9EFf?>r#Ys}IyDAtL&7UrVN^IR`QBE*8Mlh?o_jZHjAM!`ljj0&QTjI%}^IVH(G zCTp}pY>I1+a4&Foap+6tga~=3LY}T{x?ApSiZfB5=M;K0t?8ah` zzUw0$>@aL6Aow2|38GPJtOX3)5*i!z(FTSZ2WIr^>8Rmv%4akX*}WquGP!b63JI_05Uq=>qszmtCpq@QJ= zTfFZ%JhP?xZ%4DWZ4GT}HQ8eqYHi!EKK4`Md4q+`qr_AJ5vp1%TnJF9e72n1N{{5F zowbr_{+jW$mArzlt(WBGAyefp8L+`To^;e3ME&i(B5ri}TvJy$e)wD~dO@yoZ!vOP z!?c}~8eUeVg7`7lu~hIxx&2%C%@kI7(346*5(0o8Q$^(9bEy<0C0a=zuPX)j4*F8M zAlP%NG1l4Rd7KuZWcLXAoT87-C8%(6@fc|&F5q(tKC(Vq$Z3T^!2 z5@?wxv=;>35AgX6!WD<&DHJ*FR8CVzB&&;tdr>bcz6)MB$@$pSp8T@JW39G+19Rq@ z?B+!l`lv$K*xY(;=6y`;c@@W);n@dmALg}3ku30LC15dG;8!|8c>cs51Mz6FdQC)!(vM;CgH?RIq^gASCSkH(n%`-!Jbp>(P>VS2l0jp*iaIgG$Qg? zh;lK0NC>L|Eranh*WiKb$Fay1GisnTzpE6p-RP-RJjM|ACP%UQc3uZPaV8~RM;@IS zf2k7UaT1IMVg5N-R#W;c4y8Z9EKX(Lv7&H{9km`(xge^q(0Fn7>#8@b{#<3bWx>mg zG|7DvjvB2%&m??i)zypoyLjKQyX*FL(Chkx$j`&P8}wMrIOXvY_I+t-ZdK}~ z@(2jqiPtDL+Rlylv9xn@$k@*B^YDtJX-;*`-OiUSJXKT6&ry?*1Sc%9I9eOw5 z3gBrc2VpkwA8&0$vA+w(+u#t`^~Zw$^f(;&=ZH=Le-zbsxb}$)jYr5oTGE@Vf97AP4b& zP3y>xYAF%ib90swIfkEQPsi~4m>ScsfMH&-$z4;+ikz^9=emY=j5ruBoSx{?qRuPA zJ){1d=$CqXG4*AXREw=IBLU95BuQtYJhH_55Y1Y%ZW|BJIwy;89?~qrOI;a1PmA!I z_3Fp7A){}Op><*yEd2m;UjKglNUFj`f;;uu|0B?wEGUTMD2QZ<2!Wqd_|-)|y}^Fe z*gJkeeBr*KozU4*L27sXv9(%z}Gr@P32FMJg5G%fsj7sxcjvk%%n%uDt( zeA#X+ueJexya}A$#4mBTG+XOYmSKTeTJy_loRO>;WVcMC+PRG zNLr~18+6VFnTa%rdMWOWsmvm{^mu>OO_vq87a1kF=3Z3v%^D|?A0!bT%m0Cjnmd9y z>Its-44iVRbsLw&Blv!Plt+Dui$l2K<}{gxm|#4^`X=6z8akH49Rar`L+5v4qLZ`w zar7w6q=Agcc&9R+j!lw0dUaE(F$H^0vG-*t2h=a~z?XD#&;hE^SlU$@LL5ommefV2 zlk;xR1G_?rm@0xjSEdTFN4B?fC|MLDah*zBu0%^K8A-S=N!hJ{&nfuovfF(3o|w6U zJ*U{?s$fRu_Dtm}wQRbtHU6aH8#JK)dtzp-clq%=o?$~gkNfI)9(|tYjOVrPnSKIw zk1@O?M`y}S>Cnr|D8_~>V}qS3>0ZueMq-02_|d)0XkQ%oLEJ_8)lSzR z`u(22|5W8Z*f=G$CR$CcxSH%+p;;~N@gR~KC|6J z|M9>d237Mg=^Uoi3($hif@Z7KaG>YZDbrAQH0NZDxGWQ?)ZXcg^6l$d zrRnTon^?L`hG619x!@@8#mP|0?Su>bGaYhKMYc7Oc3SKq`p*5Xm(Xa@!+$JLa!nYxeXI+Y$yc`^!*%}km%&tHmPjgBQ zy|;OOW9-*PUDHQRd0tR!la{j0TI0dgGc~&G#UyKS1UU^+qv~4PRYK z6WRKy@%u}q=9MwTbmhGDGGP2gLkd)hLXYa17yD`Tr{SEGw9i2WTmL)wx;Cb2f0 zS{rPJWOTja@vGuy5%4($9~mF>Z@PKDx4oC-#deVU+xy|;ry7EMT&e42bf~KpjiXIH zXO&wMEwwhc(u|y9(7qbmxf?^H1*!WHd?r22`M{5*fYZ1;q1sJkN-v$kaTz*azX+aQ zPzRPT^~;hLa21w&A9F69o%VP7gQUMNilWGBr?UEoKqM7KKgd(*ne zQdp%^R!N(h;PZ>9*I41Sg%{26?1Q!sOR`=qeyk){^NP2^`M!os1>WzdY7%FnFg~Y@ zuU^jt*{aQ13&Qw#-z%d9NeIu{42$ZIRHv)vy|iz;5sJYf28SzygEdXGh=*Zum}L7a zXyP?#AZt9QfvjxPFV57L;lihYDh_>dC5ohWDyi$*_c$$H=@$b@?l*U&gkB68uxZ&n z^D8h?*vs(FrZ{JW^Eu^wv{9%SPV_QtN_7xR#jpagR4PtLvKQ4u{8$ z&AKssdomlRwEN8=3(m}W0&FB7$axaU6=?L%abVCB+&rB%J=9xD0mClLWbwL#dyO1E{sHo@*WvvQfkxp4;y;4u+V}(XRpP!~L=6NHPXs4De< zI;`d#leJEz&(2udrFx(=Q`FUM9zD@{PEFRjoTW$mnR0Zj)y=YTuhHt}Y3h&id@ykC zrI~yD3H4&aI0S0ZoVu6F>Mn7N8sivC3Ot#yz)2FmMhl!e7ROmF@QyZTW{p|APdDp` zQx-VS|Hwst>*PG1kDG(lY8CmLS?>czak4KoMQ>Iy0L+^|R z5*ifjImO;TfEUqta}b&iB|0eRbBeyY$^}hGwxm0(fX^xT>be1>&%P`@4+VVA!AH5f zcd)&GkV--rNC9I|YVi#nj;&qLM7NL<@!!J_z^GlEj_%#ryeIH8WEc2V=sR+@v;@C; zE%`Xy^@H%B(d@WepNnTFx_*8ImZC7HV!dNijzaDqW50%PjN8&U2f1kDvj>Db_xb7g zd<4%+PFB4}Cm>!q-3h4Gxtrh6*@xkAb5>^`NC0Y-#@WaB8F%5FfN*K{TcWbAy<^|d zIxD2dnz~P3+z~!VLIAiTh7BEB#~$Ov^wD>J(H|9iNfs54H~O;5t*mle<#cMoP*+hW z?kn-vnP93VUspFSb(LH243BL7j}SqjMU!!XJ#pp;D|Kp5Q>A2`K``9uW@$Vx%~0wL zKqIM$)@5Z>Gd8}cI)lFn<_sRFx{vZO&!c2mEnDAB20>HNfuur!SQliIk_rLZwU`RQ z+JfRxG9fMqPi^XBtO;9kUYhxHX_&h<#_4C+_X~fcp9~8>8e+xLrz&EuU327T_YbN2 zpc}?@^$*R3;erYVJ_*qcSgF__`nzGak%vVQ4R`Hoxl*!fuqBQmLk4VW^%2@*8}XSx zfXrZgCOim-#g_ObMGQMNrXNCEVVW@)D9F1(IBZ;=;5oFVJ^ZNFA~a{0z#UNpnOI*! zFQ&n4$J*G=jWcls2FsfsiDA;LNw}X=?pLQ{2l0kU3!__+^#U4yR1u#;zQ;4a0(|fJ zj7-n9JSrv7U}Hg62&2)A2*yc}W=SvX!U*0G>%-tztPev5Y%1Vk){6D<-+|-N`pEbE zAUWJ3ge*|8@ zkX;tM!dz~0hDq28+XO)*>!B58kroS6ck|fKioTx(8_Z?g@cT__qX1EW2nw_UMB