KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /proc/21585/root/usr/share/authconfig/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //proc/21585/root/usr/share/authconfig/authconfig.pyc
m
(Nc@s<dkZdkZdkZdkZdkZdkZeiZdkl	Z	dk
Z
e
ie
iddZ
e
do
dkZnde	fdYZdfdYZd	efd
YZedjoaeieieieide
do
eZn
eZeieid
ndS(N(sOptionParsertcCstidi|djS(Ni(tsystargvtfindtname(R((t#/usr/share/authconfig/authconfig.pytrunsAs"ssauthconfig-tuitUnihelpOptionParsercBstZddZRS(NcCs|djo
ti}nti}t|dd}|p
|djo
|}n|i	|ii|i
|ddS(Ntencodingtasciitreplace(tfiletNoneRtstdouttlocaletgetpreferredencodingtsrcencodingtgetattrRtwritetselftformat_helptdecodetencode(RRRR((Rt
print_help)s


(t__name__t
__module__RR(((RR(st
AuthconfigcBs}tZdZdZdZdZdZdZdZdZ	d	Z
d
ZdZdZ
d
ZRS(NcCs"t}t}t}t}t}dS(N(tFalset	nis_availtkerberos_availt
ldap_availt	smb_availtcache_avail(RRRRRR ((Rt__init__3s
cCsdS(Nt
authconfig((R((Rtmodule:scCs$tiid|i|fdS(Ns%s: %s
(RtstderrRRR#terror(RR%((Rt
printError=scCsyd}d}x\|D]T}|djo|d7}n|o|t|d7}n||7}|d7}qW|d7}|S(Nit<t|t=it>(tidxthelptltitemtaddidxtstr(RR-R/R,R+R.((RtlistHelp@s


cCstd|i}|idjo|d7}nt|}|idddddtd	|id
dddtd|idd
dddtd|iddddtd|idd|iti	t
dtd|iddddtd|iddddtd|iddtddtd|iddtddtd|iddddtd|id dddtd!|id"dddtd#|id$dddtd%|id&dtddtd'|id(dtd)dtd*|id+d,dddtd-|id.d/dddtd0|id1dtd2dtd3|id4dddtd5|id6dddtd7|id8dddtd9|id:dddtd;|id<dtd=dtd>|itit}|id?d|dtd@|idAdddtdB|idCdddtdD|idEdtddtdF|idGdtddtdH|idIdtdJdtdK|idLdddtdM|idNdddtdO|idPdddtdQ|idRdddtdS|idTdddtdU|idVdddtdW|idXdtdYdtdZ|id[dtd\dtd]|id^dddtd_|id`dddtda|idbdddtdc|idddddtde|idfddgdtdh|ididtdJdtdj|idkdtdldtdm|idndtdldtdo|idpddqdtdr|idsddtdtdu|idvddwdtdx|idyddzdtd{|id|dddtd}|id~dddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|iddddtd|idjoB|iddddtd|iddddtdn#|idddddtd|iddddtd|iddddtd|i\|_}|o$|itdtidn|idjoL|iio>|iio0|iio"|iio|idgndS(Nsusage: %s [options]R"s <--update|--test|--probe>s--enableshadows--useshadowtactiont
store_trueR,s$enable shadowed passwords by defaults--disableshadows%disable shadowed passwords by defaults--enablemd5s--usemd5senable MD5 passwords by defaults--disablemd5s disable MD5 passwords by defaults
--passalgotmetavars&hash/crypt algorithm for new passwordss--enableniss*enable NIS for user information by defaults--disableniss+disable NIS for user information by defaults--nisdomains<domain>sdefault NIS domains--nisservers<server>sdefault NIS servers--enableldaps+enable LDAP for user information by defaults
--disableldaps,disable LDAP for user information by defaults--enableldapauths)enable LDAP for authentication by defaults--disableldapauths*disable LDAP for authentication by defaults--ldapserversdefault LDAP servers--ldapbasedns<dn>sdefault LDAP base DNs--enableldaptlss--enableldapsslsenable use of TLS with LDAPs--disableldaptlss--disableldapsslsdisable use of TLS with LDAPs--ldaploadcacerts<URL>s load CA certificate from the URLs--enablesmartcards0enable authentication with smart card by defaults--disablesmartcards1disable authentication with smart card by defaults--enablerequiresmartcards0require smart card for authentication by defaults--disablerequiresmartcards7do not require smart card for authentication by defaults--smartcardmodules<module>s default smart card module to uses--smartcardactions(action to be taken on smart card removals--enablekrb5s)enable kerberos authentication by defaults
--disablekrb5s*disable kerberos authentication by defaults	--krb5kdcsdefault kerberos KDCs--krb5adminserversdefault kerberos admin servers--krb5realms<realm>sdefault kerberos realms--enablekrb5kdcdnss'enable use of DNS to find kerberos KDCss--disablekrb5kdcdnss(disable use of DNS to find kerberos KDCss--enablekrb5realmdnss)enable use of DNS to find kerberos realmss--disablekrb5realmdnss*disable use of DNS to find kerberos realmss--enablesmbauths$enable SMB authentication by defaults--disablesmbauths%disable SMB authentication by defaults--smbserverss	<servers>s(names of servers to authenticate againsts--smbworkgroups<workgroup>s'workgroup authentication servers are ins--enablewinbinds.enable winbind for user information by defaults--disablewinbinds/disable winbind for user information by defaults--enablewinbindauths,enable winbind for authentication by defaults--disablewinbindauths-disable winbind for authentication by defaults
--smbsecuritys<user|server|domain|ads>s*security mode to use for samba and winbinds
--smbrealms5default realm for samba and winbind when security=adss
--smbidmapuids<lowest-highest>s4uid range winbind will assign to domain or ads userss
--smbidmapgids4gid range winbind will assign to domain or ads userss--winbindseparators<\>sthe character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enableds--winbindtemplatehomedirs
</home/%D/%U>sGthe directory which winbind-created users will have as home directoriess--winbindtemplateprimarygroups<nobody>sFthe group which winbind-created users will have as their primary groups--winbindtemplateshells</bin/false>sDthe shell which winbind-created users will have as their login shells--enablewinbindusedefaultdomains[configures winbind to assume that users with no domain in their user names are domain userss --disablewinbindusedefaultdomains_configures winbind to assume that users with no domain in their user names are not domain userss--enablewinbindofflines)configures winbind to allow offline logins--disablewinbindofflines+configures winbind to prevent offline logins
--winbindjoins<Administrator>s>join the winbind domain or ads realm now as this administrators--enablewinss#enable wins for hostname resolutions
--disablewinss$disable wins for hostname resolutions--enablepreferdnss3prefer dns over wins or nis for hostname resolutions--disablepreferdnss:do not prefer dns over wins or nis for hostname resolutions--enablehesiods-enable hesiod for user information by defaults--disablehesiods.disable hesiod for user information by defaults--hesiodlhss<lhs>sdefault hesiod LHSs--hesiodrhss<rhs>sdefault hesiod RHSs--enablesssdsOenable SSSD for user information by default with manually managed configurations
--disablesssdsVdisable SSSD for user information by default (still used for supported configurations)s--enablesssdauthsMenable SSSD for authentication by default with manually managed configurations--disablesssdauthsSdisable SSSD for authentication by default (still used for supported configurationss
--enablecaches-enable caching of user information by defaults--disablecaches.disable caching of user information by defaults--enablelocauthorizes1local authorization is sufficient for local userss--disablelocauthorizes1authorize local users also through remote services--enablepamaccesss.check access.conf during account authorizations--disablepamaccesss5do not check access.conf during account authorizations--enablesysnetauths0authenticate system accounts by network servicess--disablesysnetauths0authenticate system accounts by local files onlys--enablemkhomedirs6create home directories for users on their first logins--disablemkhomedirs=do not create home directories for users on their first logins	--nostarts+do not start/stop portmap, ypbind, and nscds--tests>do not update the configuration files, only print new settingssauthconfig-tuis--backs<display Back instead of Cancel in the main dialog of the TUIs--kickstarts1do not display the deprecated text user interfaces--updatesDopposite of --test, update configuration files with changed settingss--updateallsupdate all configuration filess--probes)probe network for defaults and print themsunexpected argumentis-h(t_RR#tusageRtparsert
add_optionR1tauthinfotpassword_algorithmsRtgetSmartcardActionstTruetactshelpt
parse_argstoptionstargsR&Rtexittprobettesttupdatet	updateall(RR@R7R=R6((RtparseOptionsMsf	LcCsti|i}|i|io#|iod|i|ifGHn|io#|i	od|i|i	fGHn|i
o-d|i
|ipd|ipdfGHndS(Nshesiod %s/%ssldap %s/%s
skrb5 %s/%s/%s
R(
R9tAuthInfoRR&tinfoRBt	hesiodLHSt	hesiodRHSt
ldapServert
ldapBaseDNt
kerberosRealmtkerberosKDCtkerberosAdminServer(RRH((RRBs

cCs+ti|i|_|ii|_dS(N(R9treadRR&RHtcopytpristineinfo(R((RtreadAuthInfo,scCstititiotititi|_tititi|_	titi
tiotititi|_titi
ti|_tititi|_dS(N(tostaccessR9tPATH_YPBINDtX_OKtPATH_LIBNSS_NISRRt
PATH_PAM_KRB5Rt
PATH_PAM_LDAPtPATH_LIBNSS_LDAPRtPATH_PAM_SMBRt	PATH_NSCDR (R((RttestAvailableSubsys1s
44cCsThdd<dd<dd<dd<d	d
<dd<d
d<dd<dd<dd<dd<dd<dd<dd<dd<dd <d!d"<d#d$<d%d&<d'd(<d)d*<d+d,<d-d.<d/d0<d1d2<}hd3d4<d5d6<d7d8<d9d:<d;d<<d=d><d?d@<dAdB<dCdD<dEdF<dGdH<dIdJ<dKdL<dMdN<dOdP<dQdR<dSdT<dUdV<dWdX<dYdZ<d[d\<d]d^<d_d`<}xv|iD]h\}}t|ida|ot|i	|t
nt|idb|ot|i	|tqqW|iioY|ii|i	i
jo@|i	i|ii|i	_|i	i|ii|i	_nxV|iD]H\}}t|i|djo#t|i	|t|i|qqW|iioS|iiidcdd}|de|i	_t|ddjo|dd|i	_qTn|iioky,t|ii}ti||i	_Wqtt fj
o&|i!t"dfdg|i	_qXn|ii#p>|ii$odh|i	_%n|ii&odi|i	_%qPn:|ii#ti'jo#|i!t"djdk|i	_%ndS(lNtshadowtenableShadowtlocauthorizetenableLocAuthorizet	pamaccesstenablePAMAccesst
sysnetauthtenableSysNetAutht	mkhomedirtenableMkHomeDirtcachetenableCachethesiodtenableHesiodtldapt
enableLDAPtldaptlstenableLDAPStldapauthtenableLDAPAuthtkrb5tenableKerberostnist	enableNISt
krb5kdcdnstkerberosKDCviaDNStkrb5realmdnstkerberosRealmviaDNSt	smartcardtenableSmartcardtrequiresmartcardtforceSmartcardtsmbautht	enableSMBtwinbindt
enableWinbindtwinbindauthtenableWinbindAuthtwinbindusedefaultdomaintwinbindUseDefaultDomaintwinbindofflinetwinbindOfflinetwinst
enableWINStsssdt
enableSSSDtsssdauthtenableSSSDAutht	preferdnstpreferDNSinHoststpassalgotpasswordAlgorithmt	hesiodlhsRIt	hesiodrhsRJt
ldapserverRKt
ldapbasednRLtldaploadcacertt
ldapCacertURLt	krb5realmRMtkrb5kdcRNtkrb5adminserverROtsmartcardmoduletsmartcardModuletsmartcardactiontsmartcardActiont	nisdomaint	nisDomaint	nisservert	nisServertsmbworkgrouptsmbWorkgroupt
smbserverst
smbServerstsmbsecuritytsmbSecuritytsmbrealmtsmbRealmtsmbidmapuidtsmbIdmapUidtsmbidmapgidtsmbIdmapGidtwinbindseparatortwinbindSeparatortwinbindtemplatehomedirtwinbindTemplateHomedirtwinbindtemplateprimarygrouptwinbindTemplatePrimaryGrouptwinbindtemplateshelltwinbindTemplateShelltenabletdisablet%iis(Bad smart card removal action specified.Rtmd5tdescrypts;Unknown password hashing algorithm specified, using sha256.tsha256((t
bool_settingststring_settingst	iteritemstopttaivalRRR?tsetattrRHR<RRRMtgetKerberosKDCRNtgetKerberosAdminServerRORtwinbindjointsplittlsttjoinUsertlentjoinPasswordRtintR+R9R;Rt
ValueErrort
IndexErrorR&R5Rt	enablemd5Rt
disablemd5R:(RRRR+RRR((RtoverrideSettings:sF
&"
'




cCstS(N(R<(R((RtdoUIscCs%|iio|iitndS(N(RR?RRHt
joinDomainR<(R((RRs
cCs|ii|iio|iin|ii|iio|iin|ii	|i
|i|ii|ii
dS(N(RRHttestLDAPCACertsRtdownloadLDAPCACerttrehashLDAPCACertsR?RERtwriteChangedRRRtposttnostart(R((Rt
writeAuthInfos




cCs|i|iio|itidn|iio7tidjo$|i	t
dtidn|i|i|i
|ip5|iio|i	t
dntidn|iio|iin|idS(Niscan only be run as rootisdialog was cancelledi(RRFR?RBRRARCRTtgetuidR&R5RSR^RRRHt	printInfoR(R((Rtruns"


!





(RRR!R#R&R1RFRBRSR^RRRRR(((RR2s				
		
				X			
t
AuthconfigTUIcBstZdZdZdZdZdddZdZdZ	dZ
d	Zd
ZdZ
dZd
ZdZdZdZRS(NcCsdS(Nsauthconfig-tui((R((RR#scCs2|iio!|iio|iitndS(N(RR?t	kickstartRRHRR<(R((RRscCs|\}}|ipdSnx|oyti|dtipQtd|d|d|df}t	i
|itd|tdgn|d}q$WdS(NisThe %s file was not found, but it is required for %s support to work properly.
Install the %s package, which provides this file.iitWarningtOki(
tdatatcomptwarningtselectedRTRUtR_OKR5ttexttsnacktButtonChoiceWindowRtscreen(RRRRR((RtwarnCallbacks
%,c!
CsDtitdddg}titdddg}titdddg}ti	tdddg}titdd	dg}ti
td
ddg}titdd
dg}titdddg}
titdd|
g}titdd|g}tidd}titd}|i|ddddddtitdt|i i!}	}|i|dddddd|i$|i%||ftitdt|i i&}}|i|ddddddtitdt|i i(}}|i|dddddd|i$|i%||ftitdt|i i*}}|i|dddddd|i$|i%||ftitdt|i i,}}|i|dd ddddtidd!} titd"}| i|ddddddtitd#t|i i/d$j}}| i|ddddddtitd%t|i i1}}| i|dddddd|i$|i%||ftitd&t|i i3}}| i|dddddd|i$|i%||ftitd't|i i5}}| i|dddddd|i$|i%||ftitd(t|i i7}}| i|dd dddd|i$|i%||ftitd)t|i i9}
}| i|dddddd|i$|i%||ftitd*t|i i;}}| i|dd+ddddtidd}|i|ddddd,dd-d4|i| ddd.dd,dd-d5tidd}ti?|i@iAo
td/p
td0}ti?td1}|i|dd|i|ddtidd}|i|dddd|i|ddddtiE}|iGiH|td2|iI||iJ}||jo
|	iK|i _!|iK|i _&|iK|i _(|iK|i _*|iK|i _,|iK|i _1|iKod$|i _/n$|i i/d$jod3|i _/n|iK|i _3|iK|i _5|iK|i _7|
iK|i _9|iK|i _;n|iGiL||jS(6NtcachingtnscdtKerberostpam_krb5sLDAP authenticationtnss_ldaptLDAPtNIStypbindsshadow passwordsshadow-utilssSMB authenticationtpam_smbtWinbindssamba-clientsWinbind authenticationssamba-commoniisUser Informationit
anchorLefttgrowxsCache Informations
Use HesiodisUse LDAPisUse NISisUse WinbindiitAuthenticationsUse MD5 PasswordsRsUse Shadow PasswordssUse LDAP AuthenticationsUse KerberossUse SMB AuthenticationsUse Winbind Authentications!Local authorization is sufficientit	anchorToptpaddingtanchorRighttBacktCanceltNextsAuthentication ConfigurationR(iiii(iiii(MR9R]R5Rt	warnCacheRYtwarnKerberosRZtwarnLDAPAuthR[twarnLDAPRVtwarnNIStPATH_PWCONVt
warnShadowR\twarnSMBtPATH_WINBIND_NETtwarnWinbindNettPATH_PAM_WINBINDtwarnWinbindAuthtPATH_LIBNSS_WINBINDtwarnWinbindRtGridtinfoGridtLabelRtsetFieldtCheckboxtboolRRHRjRitcbtsetCallbackRRlRkRnRmRvRuRRtauthGridRRR`R_RrtldapaRtRsRtsmbRRRbRatmechGridt
buttonGridtButtonR?tbacktcanceltoktmainGridtFormtformRtgridWrappedWindowtaddRRt	popWindow(!RRsRkRRRRRRRiRRRRRmRRRR RRRaRuR_RRRRRRR
RR((RtgetMainChoicess(((((.((((((%%/



cCst|}tid|}d}
g}xx|D]p\}}}}|djopti|t
t|i|}|i||itidd|
dd|i|d|
ddn|djo|ti|}|i|d|
d	dddtid
t|i|d|}|i||i|d|
ddnO|d
joti|}|i|d|
d	dddddy#t|i|}|i|Wntj
o|d}nXd}g}x*|D]"}|i||||jfqWtid|}|i||i|d|
ddnV|djoHtid|dddd}|i||i|d|
ddn|
d7}
q1Wti|odpdd}ti"|}	ti"|}|oti"|pd}
|i|	dd|o|i|
ddn|i||odpddtidd}|i|ddd	ddd|i|ddd	dddti)}|i+i,|||i.|x)t/o!|i0}||	joPn|}x|D]\}}}}|djo&t2|i||i3di4q|djo&t2|i||i3di5q|d
jo&t2|i||i3di6q|djo|i3dqqW||
joPn|o|qqW|i+i8||	jS(NiittfvalueRRiRtsvalueRi(thiddenRtrvalueRtlvaluei2tflexDowntflexUpi(iiii(iiii(iiii(iiii(9RtitemstrowsRR
tquestionGridtrowtwidgetstttdesctattrtvalRRRRRHRtappendRRRtEntrytseltindexRRt
buttonlisttvtRadioBartradioBartTextboxReflowedt
anothertxtRRt	canceltxtRtoktxtRtanotherRRR RR!tdtitleR"R<RtwcopyRtpopRtvaluetgetSelectiont	anothercbR#(RRBR,R?R@R>RGRRRRARR7R/R-R4RCR0R RR2RR3R<R1R:R.R9((RtgetGenericChoicesAs
$
"
$

% 


 !


&
&
&


cCsldtdddfdtdddfg}|itd|td|o
td	p
td
S(NR&sLHS:RIisRHS:RJsHesiod SettingsRRR(R5t	questionsRRHtnext(RRJRI((RtgetHesiodSettingss0cCsdtdddfdtdddfdtdd	dfg}|itd
|td|o
tdp
td
S(NR%sUse TLSRpR&sServer:RKisBase DN:RLs
LDAP SettingsRRR(R5RRIRRHRJ(RRJRI((RtgetLDAPSettingssEcCsldtdddfdtdddfg}|itd|td|o
td	p
td
S(NR&sDomain:RisServer:RsNIS SettingsRRR(R5RIRRHRJ(RRJRI((RtgetNISSettingss0cCsdtdddfdtdddfdtdddfd	td
ddfd	tdd
dfg}|itd|td|o
tdp
tdS(NR&sRealm:RMisKDC:RNs
Admin Server:ROR%s"Use DNS to resolve hosts to realmsRzs!Use DNS to locate KDCs for realmsRxsKerberos SettingsRRR(R5RRIRRHRJ(RRJRI((RtgetKerberosSettingssocCsdtdddfdtdddfdtdddfg}|itd	|td
|o
tdp
tdS(
NR&s
Workgroup:RisServers:RsShell:RsSMB SettingsRRR(R5RIRRHRJ(RRJRI((RtgetSMBSettingssEcCsdtdddfdtdddfg}|iipd|i_n|itd	|td
tdo;|ii|ii|ii	t
|iint
S(NR&sDomain Administrator:Ris	Password:Rit
Administrators
Join SettingsRR(R5RIRRHRRHRtsuspendRDRR<tresume(RRI((RtgetJoinSettingss0


cCsdtdddfg}ti|i}|i|i	it
}|i	i|o.|i
td|tdtd}n|o|i	in|itS(NR)sSome of the configuration changes you've made should be saved to disk before continuing.  If you do not save them, then your attempt to join the domain may fail.  Save changes?s
Save SettingstNotYes(R5RRIR9RPRR&t	orig_infoRDRHRtrettdiffersRHRRSR<(RRWRIRV((RtmaybeGetJoinSettingss


c	Csddg}ddddddg}d	}t||}d
tdd|fd
tdddfd
tdddfd
tdddfd
tdd|fg}|itd|td|o
tdp
tddtdd|i	S(Ntadstdomains
/sbin/nologins/bin/shs	/bin/bashs	/bin/tcshs/bin/kshs/bin/zshcCsti|tiS(N(RTRUtshellRW(R\((RtshellexistssR(sSecurity Model:RR&sDomain:RisDomain Controllers:Rs
ADS Realm:RsTemplate Shell:RsWinbind SettingsRRRR>sJoin DomainRG(
tsecuritytshellsR]tfilterR5RIRRHRJRY(RRJR_R]RIR^((RtgetWinbindSettingss	o)cCsd}t}x|djo|djo|ii|djo|i}nn|djo~|iiom|iipK|ii	p>|ii
p1|iip$|iip|ii
p
|ii}|i|}qn|djoq|iip
|ii	oS|ii
p1|iip$|iip|ii
p
|ii}|i|}qne|djoW|iioF|ii
p$|iip|ii
p
|ii}|i|}qn|djoJ|ii
o9|iip|ii
p
|ii}|i|}qn|djoX|iioG|ii
p
|iio,|ii
p
|ii}|i|}qnE|djo7|ii
p
|iiot}|i|}qn|ii|o|d7}q|d8}qW|d	jS(
Niiiiiiiii(RJRtrcRRHRDR$RlRnRrRtRvRRRtmoreRKRLRMRNRORa(RRcRbRJ((Rt
getChoicessH



Z
@

3

&
(

cCsBtd|ii}ti|itd|tdgdS(NsTo connect to a LDAP server with TLS protocol enabled you need a CA certificate which signed your server's certificate. Copy the certificate in the PEM format to the '%s' directory.
Then press OK.RR(R5RRHt
ldapCacertDirRRRR(RR((RtdisplayCACertsMessage,scCs|iiotSnzti|_|i}|ii	t
d|iidd|d|ip|ii
tSn|iio|iio|inWd|ii
XtS(NsN <Tab>/<Alt-Tab> between elements   |   <Space> selects   |  <F12> next screenis - (c) 1999-2005 Red Hat, Inc.(RR?RR<RtSnackScreenRR#tpackageversiontpushHelpLineR5tdrawRootTextRdtfinishRRHRpRRf(RRh((RR4s


(RRR#RRR$RRHRKRLRMRNRORSRYRaRdRfR(((RRs 				r_							
			7	t__main__R"i(R9tacutiltgettextRTtsignalRtlgettextR5toptparsetOptionParserRt	setlocaletLC_ALLRRRRRRtSIGINTtSIG_DFLt
textdomainR#RRA(RR#RRRoRRmRnRRR9RRrRTR5((Rt?s*$	
		






	


Anon7 - 2021